SlideShare a Scribd company logo
1 of 39
Release 16/07/2009 Jetking Infotrain Ltd.
Establishing Serial Point-to-Point
Connection
Chapter 9
Release 16/07/2009Jetking Infotrain Ltd.
Chapter Objectives
 Explain wide area network
 Explain data-link protocols of point-to-point
leased lines
 Explain HDLC
 Explain PPP
Release 16/07/2009Jetking Infotrain Ltd.
Recall - I
 ACL are the statements, which are grouped together
by using a name or number
 ACLs supports the following types:
 Standard ACL
 Extended ACL
 You can use the access-list command to create an
ACL. The syntax to create an ACL is:
access-list ACL_# permit|deny conditions
Release 16/07/2009Jetking Infotrain Ltd.
Recall - II
 Wildcard masks can be used for matching a range
of IP addresses in ACL, instead of manually
entering it
 A wildcard is similar to an inverted subnet mask
 the extended ACL filters the source and destination
IP address, IP protocols such as IP, TCP, UDP ,
ICMP etc. and protocol information such as port
numbers or message types
Release 16/07/2009Jetking Infotrain Ltd.
Wide Area Network
 The terms and components of WAN are:
 Data Communications Equipment (DCE)
 Data Terminal Equipment (DTE)
 Customer Premises Equipment (CPE)
 Demarcation point
 Toll network
 Central Office (CO) switch
 Local loop
Release 16/07/2009Jetking Infotrain Ltd.
Wide Area Network (WAN)
Release 16/07/2009Jetking Infotrain Ltd.
Types of WAN
 WANs are available in four types, based on the
distance covered and the equipment used
 The four types of WAN are:
 Leased-Lines Connection
 Circuit-Switched Connection
 Packet-Switched Connections
 Cell-Switched Connections
Release 16/07/2009Jetking Infotrain Ltd.
Selecting WAN
 While connecting a LAN to a WAN, you should be
aware of the connection requirements
 Some of the major factors that help to select a WAN
are:
 Frequency
 Transfer rates
 Traffic load
 Cost
Release 16/07/2009Jetking Infotrain Ltd.
Data-Link Protocols
 Data-link layer protocols are commonly called the
data link protocols
 These protocols communicate between two devices
such as, routers, and bridges
 Data packets are sent over the link created by the
protocols
 Data-link protocols consist of:
 High Level Data Link Control (HDLC) protocol
 Point-to-Point protocol (PPP)
Release 16/07/2009Jetking Infotrain Ltd.
HDLC Frames
Release 16/07/2009Jetking Infotrain Ltd.
HDLC Frame Fields
Field Name Description
Flag Contains a single byte which indicates
the beginning or end of a frame
Address Contains the broadcast address which
is a binary sequence
Control Contains a single byte of binary
sequence. This calls for transmission
of user data in a non-sequence frame
Proprietary Contains information about the way to
carry multiple protocols on a single link
Data Contains encapsulated data. The
range if this field is variable
FCS Contains 2 to 4 bytes. Improves error
detection
Release 16/07/2009Jetking Infotrain Ltd.
Types of HDLC Frames
Release 16/07/2009Jetking Infotrain Ltd.
Configuring HDLC
 The encapsulation on a Cisco synchronous serial
interface is HDLC
 HDLC needs to be configured if the data link
protocol is change to some other protocol, and
HDLC has to be set back to default
 To configure the HDLC protocol to be set as default,
use the router CLI
Release 16/07/2009Jetking Infotrain Ltd.
Output of HDLC Verification
Release 16/07/2009Jetking Infotrain Ltd.
PPP
 The PPP allows computers to connect to the
Internet using a dial-up telephone line and ISDN
 PPP was originally designed to transport IP traffic
over point-to-point links
 PPP can transfer data over synchronous and
asynchronous links
 It supports a transfer of data over different network
protocols
Release 16/07/2009Jetking Infotrain Ltd.
PPP Frame
 The frame format of PPP is similar to the HDLC
Frame
 The only difference is that, PPP includes a Protocol
field
 The PPP frame is made up of six fields as shown in
Figure
Release 16/07/2009Jetking Infotrain Ltd.
PPP Stack
Release 16/07/2009Jetking Infotrain Ltd.
Link Control Protocol (LCP)
 The PPP Link Control Protocol can establish,
configure, maintain and terminate point-to-point
connection between the devices
 LCP uses following three classes of frames for
establishing, configuring, maintaining and
terminating connection between the devices:
 Link Configuration frames
 Link Maintenance frames
 Link Termination frames
Release 16/07/2009Jetking Infotrain Ltd.
Communication Between Devices
Release 16/07/2009Jetking Infotrain Ltd.
LCP Configuration Options
 The LCP configuration options are:
 Authentication
 Compression
 Error-detection
 Multilink
 PPP callback
Release 16/07/2009Jetking Infotrain Ltd.
PPP Session Establishment
 Point-to-Point protocol is used to transmit data
packets over serial point-to-point links
 The three phases of session establishment are
given as follows:
 Link establishment phase
 Authentication phase
 Network layer protocol phase
Release 16/07/2009Jetking Infotrain Ltd.
PPP Authentication - I
 Point-to-Point protocol supports authentication of
devices
 Once a link is established between nodes the
process of authentication starts
 PPP supports two authentication protocols
Password Authentication Protocol (PAP) and
Challenge Handshake Authentication Protocol
(CHAP)
Release 16/07/2009Jetking Infotrain Ltd.
PPP Authentication - II
Release 16/07/2009Jetking Infotrain Ltd.
CHAP Authentication
Release 16/07/2009Jetking Infotrain Ltd.
Configuring PPP
 Cisco allows you to configure the PPP to be used on
WAN interface
 You can configure the PPP using encapsulation and
interface commands in the configuration mode
 The syntax of the command to configure PPP is:
encapsulation ppp
Release 16/07/2009Jetking Infotrain Ltd.
Configuring PPP Authentication
 Once the serial interface is configured to support the
PPP encapsulation, you must configure PPP
authentication on the routers
 Before authentication process, it is required to set a
hostname for the router if not already assigned
 Also, you must set username and password for the
remote router to which the router is connected
 After the hostname, username and password is set ,
select the appropriate authentication for the router
such as PAP or CHAP
Release 16/07/2009Jetking Infotrain Ltd.
Verifying PPP Encapsulation
 PPP does not begin authentication until the Link
Control Protocol (LCP) process is completed and
open
 PPP authentication needs to be set up on both ends
for the authentication process to work
 Using commands, such as show and debug you can
solve problems for PPP
Release 16/07/2009Jetking Infotrain Ltd.
Mismatched WAN Encapsulations
 Routers can communicate in a network only if their
encapsulation methods are same
 If you connect two routers in the network using
point-to-point link but the encapsulation methods are
different on each router, the connection between the
routers is not established
 In this case, if one router sends request to the other,
it will never receive a response from that router
Release 16/07/2009Jetking Infotrain Ltd.
Mismatched IP Addresses
 Routers configured with same WAN encapsulation
method such as PPP, HDLC or Frame Relay
connected in different subnets will have connection
established between them
 However, the data packets do not transfer between
the routers. It becomes very difficult to identify this
problem, as the link appears to be functioning
properly
 To resolve the problem, you can use the show
running-config and show interface command on
each router
Release 16/07/2009Jetking Infotrain Ltd.
Case Study
The Blue Diamond steel company, Gujarat branch has
all Cisco routers connected in the network. The router
of the Business Development department is
damaged. The computers in this department cannot
exchange data with the other departments in the
network. The network administrator Robert replaces
the damaged router with a new non-Cisco router.
Release 16/07/2009Jetking Infotrain Ltd.
Problem
The Business Development department still cannot
have transaction with the other departments
Release 16/07/2009Jetking Infotrain Ltd.
Suggested Solution
Cisco routers by default use HDLC as the serial
encapsulation method on Cisco serial links. If you
connect a non-Cisco router to a Cisco router in the
network, data transfer does not occur between them.
To enable communication between the routers,
implement the Point-to-Point encapsulation method.
You must configure PPP on all the serial interfaces of
both the routers
Release 16/07/2009Jetking Infotrain Ltd.
Comparing HDLC and PPP - I
HDLC PPP
Fails to provide a method of detecting
errors
Uses FCS to detect errors while
transmitting data
Consist of two types; ISO HDLC and
Cisco HDLC
Based on ISO's HDLC frame format
Supports synchronous and
asynchronous links
Supports synchronous, asynchronous,
High-Speed Serial Interface (HSSI),
and ISDN links
Release 16/07/2009Jetking Infotrain Ltd.
Comparing HDLC and PPP - II
Used to perform encapsulation of data
without using other encapsulation
protocols
Used to transfer data. PPP cannot
encapsulate data without the help of
other encapsulation protocols, such
as, HDLC and Synchronous Data Link
Control (SDLC)
Fails to provide authentication
between two nodes or devices
Provides authentication using
protocols, such as, PPP Authentication
Protocol (PAP), and Challenge
Handshake Authentication Protocol
(CHAP)
Release 16/07/2009Jetking Infotrain Ltd.
Comparing HDLC and PPP - III
Provides a frame format that contains
a proprietary field. The other six fields
are similar to the PPP frame field.
Note, the ISO HDLC frame contains
only six fields, as the proprietary field
is not present
Provides a frame format that contains
a protocol field. The other six fields are
similar to the HDLC frame field
Fails to check for quality of a link
established
Uses Link Control Protocol (LCP) to
the check for quality of an established
link
Release 16/07/2009Jetking Infotrain Ltd.
Summary - I
 WAN is a network that spans a large geographical
area
 Leased lines are a transmission line, which is provided
by telephone companies to a particular customer
 Frequency, usage, traffic and cost are factors that
need to considered when selecting a WAN connection
 Data-Link layer protocols are commonly called the
data link protocols, which communicate between two
devices
Release 16/07/2009Jetking Infotrain Ltd.
Summary - II
 Configuring HDLC only needs to be done only if the data
link protocol is change to some other protocol
 The two types of HDLC:
 ISO HDLC
 Cisco HDLC
 The Cisco HDLC contains proprietary field, which
defines carrying a multiple protocols across a link
 PPP enables computers to connect to the internet using
a dial-up telephone line and ISDN
 Configuring the PPP is to specify that PPP is to be used
on the WAN
Release 16/07/2009Jetking Infotrain Ltd.
Summary - III
 Features of PPP are:
 Authentication
 Link test
 Error-detection
 Compression
 Components of PPP are:
 HDLC
 LCP
 NCPs
 Authentication protocols supported by PPP are:
 PAP
 CHAP
Release 16/07/2009Jetking Infotrain Ltd.
Summary - IV
 By default the authentication is not mandatory but
must be specified to
 PAP is a insecure protocol because the username
and password is sent in plain text
 Using CHAP protocol the server sends challenge
messages to the node. The node calculates and
sends the results back to the server

More Related Content

What's hot

PPP (Point to Point Protocol)
PPP (Point to Point Protocol)PPP (Point to Point Protocol)
PPP (Point to Point Protocol)Ali Jafar
 
Introduction to VIP with PCI Express Technology
Introduction to VIP with PCI Express TechnologyIntroduction to VIP with PCI Express Technology
Introduction to VIP with PCI Express Technologyijsrd.com
 
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...theijes
 
Transport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP PortTransport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP PortNetwax Lab
 
Five Port Router Architecture
Five Port Router ArchitectureFive Port Router Architecture
Five Port Router Architectureijsrd.com
 
IBM Flex Systems Interconnect Fabric
IBM Flex Systems Interconnect FabricIBM Flex Systems Interconnect Fabric
IBM Flex Systems Interconnect FabricAngel Villar Garea
 
Iaetsd implementation of hdlc protocol using verilog
Iaetsd implementation of hdlc protocol using verilogIaetsd implementation of hdlc protocol using verilog
Iaetsd implementation of hdlc protocol using verilogIaetsd Iaetsd
 
IPv6 .pdf
IPv6 .pdfIPv6 .pdf
IPv6 .pdfniran10
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdfniran10
 
Unit 4 tansport layer in the internat
Unit 4 tansport layer in the internatUnit 4 tansport layer in the internat
Unit 4 tansport layer in the internatKritika Purohit
 
Fpga implemented multichannel hdlc transceiver
Fpga implemented multichannel hdlc transceiverFpga implemented multichannel hdlc transceiver
Fpga implemented multichannel hdlc transceiveriaemedu
 
TCP/IP Presentation lab encapsulation and de-capsulation Nick Raston 2143803
TCP/IP Presentation lab encapsulation and de-capsulation Nick Raston 2143803TCP/IP Presentation lab encapsulation and de-capsulation Nick Raston 2143803
TCP/IP Presentation lab encapsulation and de-capsulation Nick Raston 2143803ArtistMuso
 

What's hot (20)

PPP (Point to Point Protocol)
PPP (Point to Point Protocol)PPP (Point to Point Protocol)
PPP (Point to Point Protocol)
 
Introduction to VIP with PCI Express Technology
Introduction to VIP with PCI Express TechnologyIntroduction to VIP with PCI Express Technology
Introduction to VIP with PCI Express Technology
 
ACIT Mumbai - OSI Model
ACIT Mumbai - OSI ModelACIT Mumbai - OSI Model
ACIT Mumbai - OSI Model
 
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Transport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP PortTransport Layer Port or TCP/IP & UDP Port
Transport Layer Port or TCP/IP & UDP Port
 
Five Port Router Architecture
Five Port Router ArchitectureFive Port Router Architecture
Five Port Router Architecture
 
Module 3 INTERNET OF THINGS
Module 3 INTERNET OF THINGSModule 3 INTERNET OF THINGS
Module 3 INTERNET OF THINGS
 
IBM Flex Systems Interconnect Fabric
IBM Flex Systems Interconnect FabricIBM Flex Systems Interconnect Fabric
IBM Flex Systems Interconnect Fabric
 
Iaetsd implementation of hdlc protocol using verilog
Iaetsd implementation of hdlc protocol using verilogIaetsd implementation of hdlc protocol using verilog
Iaetsd implementation of hdlc protocol using verilog
 
IPv6 .pdf
IPv6 .pdfIPv6 .pdf
IPv6 .pdf
 
IPv6 Routing.pdf
IPv6 Routing.pdfIPv6 Routing.pdf
IPv6 Routing.pdf
 
Unit 4 tansport layer in the internat
Unit 4 tansport layer in the internatUnit 4 tansport layer in the internat
Unit 4 tansport layer in the internat
 
OsiI model
OsiI modelOsiI model
OsiI model
 
Fpga implemented multichannel hdlc transceiver
Fpga implemented multichannel hdlc transceiverFpga implemented multichannel hdlc transceiver
Fpga implemented multichannel hdlc transceiver
 
Mpls101
Mpls101Mpls101
Mpls101
 
Ppp
PppPpp
Ppp
 
MPLS
MPLSMPLS
MPLS
 
Forouzan ppp
Forouzan pppForouzan ppp
Forouzan ppp
 
TCP/IP Presentation lab encapsulation and de-capsulation Nick Raston 2143803
TCP/IP Presentation lab encapsulation and de-capsulation Nick Raston 2143803TCP/IP Presentation lab encapsulation and de-capsulation Nick Raston 2143803
TCP/IP Presentation lab encapsulation and de-capsulation Nick Raston 2143803
 

Similar to CCNA CHAPTER 9 BY jetarvind kumar madhukar

CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsVuz Dở Hơi
 
Packet Guide SONET/SDH
Packet Guide SONET/SDHPacket Guide SONET/SDH
Packet Guide SONET/SDHscribd1
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame RelayDsunte Wilson
 
Cisco discovery drs ent module 7 - v.4 in english.
Cisco discovery   drs ent module 7 - v.4 in english.Cisco discovery   drs ent module 7 - v.4 in english.
Cisco discovery drs ent module 7 - v.4 in english.igede tirtanata
 
Week10 wan-2017(1)
Week10 wan-2017(1)Week10 wan-2017(1)
Week10 wan-2017(1)trayyoo
 
HDLC and Point to point protocol
HDLC and Point to point protocolHDLC and Point to point protocol
HDLC and Point to point protocolKinza Razzaq
 
cisco-nti-Day18
cisco-nti-Day18cisco-nti-Day18
cisco-nti-Day18eyad alaa
 
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014Đồng Quốc Vương
 
data link layer.pptx
data link layer.pptxdata link layer.pptx
data link layer.pptxHarshalBodhe4
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocolKirti Ahirrao
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2Waqas Ahmed Nawaz
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelJacqueline Thomas
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxgadisaAdamu
 

Similar to CCNA CHAPTER 9 BY jetarvind kumar madhukar (20)

Ppp
PppPpp
Ppp
 
CCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point ConnectionsCCNAv5 - S4: Chapter3 Point to-point Connections
CCNAv5 - S4: Chapter3 Point to-point Connections
 
CCNA CHAPTER 6 BY jetarvind kumar madhukar
CCNA CHAPTER 6 BY jetarvind kumar madhukarCCNA CHAPTER 6 BY jetarvind kumar madhukar
CCNA CHAPTER 6 BY jetarvind kumar madhukar
 
Packet Guide SONET/SDH
Packet Guide SONET/SDHPacket Guide SONET/SDH
Packet Guide SONET/SDH
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
 
CCNA CHAPTER 11 BY jetarvind kumar madhukar
CCNA CHAPTER 11 BY jetarvind kumar madhukarCCNA CHAPTER 11 BY jetarvind kumar madhukar
CCNA CHAPTER 11 BY jetarvind kumar madhukar
 
Wan networks
Wan networksWan networks
Wan networks
 
Cisco discovery drs ent module 7 - v.4 in english.
Cisco discovery   drs ent module 7 - v.4 in english.Cisco discovery   drs ent module 7 - v.4 in english.
Cisco discovery drs ent module 7 - v.4 in english.
 
Week10 wan-2017(1)
Week10 wan-2017(1)Week10 wan-2017(1)
Week10 wan-2017(1)
 
Computer network
Computer networkComputer network
Computer network
 
Ccna 4 chapter 2 2011 v4
Ccna 4 chapter 2 2011 v4Ccna 4 chapter 2 2011 v4
Ccna 4 chapter 2 2011 v4
 
HDLC and Point to point protocol
HDLC and Point to point protocolHDLC and Point to point protocol
HDLC and Point to point protocol
 
cisco-nti-Day18
cisco-nti-Day18cisco-nti-Day18
cisco-nti-Day18
 
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
 
data link layer.pptx
data link layer.pptxdata link layer.pptx
data link layer.pptx
 
Network access layer security protocol
Network access layer security protocolNetwork access layer security protocol
Network access layer security protocol
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
 
Unit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi ModelUnit 3 Assignment 1 Osi Model
Unit 3 Assignment 1 Osi Model
 
computer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptxcomputer network and chapter 7 OSI layers.pptx
computer network and chapter 7 OSI layers.pptx
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 

More from ALLCAD Services Pvt Limited

COMPUTER Motherboard by jetarvind kumar madhukar
COMPUTER Motherboard by jetarvind kumar madhukarCOMPUTER Motherboard by jetarvind kumar madhukar
COMPUTER Motherboard by jetarvind kumar madhukarALLCAD Services Pvt Limited
 
Keyboard and mouse slide by Jetarvind kumar madhukar
Keyboard and mouse slide by Jetarvind kumar madhukarKeyboard and mouse slide by Jetarvind kumar madhukar
Keyboard and mouse slide by Jetarvind kumar madhukarALLCAD Services Pvt Limited
 
Overview of ip_security by JetArvind kumar Madhukar
Overview of ip_security by JetArvind kumar Madhukar Overview of ip_security by JetArvind kumar Madhukar
Overview of ip_security by JetArvind kumar Madhukar ALLCAD Services Pvt Limited
 

More from ALLCAD Services Pvt Limited (19)

Command which is use in CCNA AND CCNP
Command which is use in CCNA AND CCNP Command which is use in CCNA AND CCNP
Command which is use in CCNA AND CCNP
 
COMPUTER Motherboard by jetarvind kumar madhukar
COMPUTER Motherboard by jetarvind kumar madhukarCOMPUTER Motherboard by jetarvind kumar madhukar
COMPUTER Motherboard by jetarvind kumar madhukar
 
Technologies slide By jetarvind kumar madhukar
Technologies slide By jetarvind kumar madhukarTechnologies slide By jetarvind kumar madhukar
Technologies slide By jetarvind kumar madhukar
 
CCNA CHAPTER 1 BY jetarvind kumar madhukar
CCNA CHAPTER 1 BY jetarvind kumar madhukarCCNA CHAPTER 1 BY jetarvind kumar madhukar
CCNA CHAPTER 1 BY jetarvind kumar madhukar
 
CCNA CHAPTER 2 BY jetarvind kumar madhukar
CCNA CHAPTER 2 BY jetarvind kumar madhukarCCNA CHAPTER 2 BY jetarvind kumar madhukar
CCNA CHAPTER 2 BY jetarvind kumar madhukar
 
CCNA CHAPTER 4 BY jetarvind kumar madhukar
CCNA CHAPTER 4 BY jetarvind kumar madhukarCCNA CHAPTER 4 BY jetarvind kumar madhukar
CCNA CHAPTER 4 BY jetarvind kumar madhukar
 
CCNA CHAPTER 5 BY jetarvind kumar madhukar
CCNA CHAPTER 5 BY jetarvind kumar madhukarCCNA CHAPTER 5 BY jetarvind kumar madhukar
CCNA CHAPTER 5 BY jetarvind kumar madhukar
 
CCNA CHAPTER 7 BY jetarvind kumar madhukar
CCNA CHAPTER 7 BY jetarvind kumar madhukarCCNA CHAPTER 7 BY jetarvind kumar madhukar
CCNA CHAPTER 7 BY jetarvind kumar madhukar
 
CCNA CHAPTER8 BY jetarvind kumar madhukar
CCNA CHAPTER8 BY jetarvind kumar madhukarCCNA CHAPTER8 BY jetarvind kumar madhukar
CCNA CHAPTER8 BY jetarvind kumar madhukar
 
CCNA CHAPTER 10 BY jetarvind kumar madhukar
CCNA CHAPTER 10 BY jetarvind kumar madhukarCCNA CHAPTER 10 BY jetarvind kumar madhukar
CCNA CHAPTER 10 BY jetarvind kumar madhukar
 
CCNA CHAPTER 12 BY jetarvind kumar madhukar
CCNA CHAPTER 12 BY jetarvind kumar madhukarCCNA CHAPTER 12 BY jetarvind kumar madhukar
CCNA CHAPTER 12 BY jetarvind kumar madhukar
 
CCNA CHAPTER 14 BY jetarvind kumar madhukar
CCNA CHAPTER 14 BY jetarvind kumar madhukarCCNA CHAPTER 14 BY jetarvind kumar madhukar
CCNA CHAPTER 14 BY jetarvind kumar madhukar
 
CCNA CHAPTER 15 BY jetarvind kumar madhukar
CCNA CHAPTER 15 BY jetarvind kumar madhukarCCNA CHAPTER 15 BY jetarvind kumar madhukar
CCNA CHAPTER 15 BY jetarvind kumar madhukar
 
CCNA CHAPTER 16 BY jetarvind kumar madhukar
CCNA CHAPTER 16 BY jetarvind kumar madhukarCCNA CHAPTER 16 BY jetarvind kumar madhukar
CCNA CHAPTER 16 BY jetarvind kumar madhukar
 
CCNA CHAPTER 17 BY jetarvind kumar madhukar
CCNA CHAPTER 17 BY jetarvind kumar madhukarCCNA CHAPTER 17 BY jetarvind kumar madhukar
CCNA CHAPTER 17 BY jetarvind kumar madhukar
 
CCNA CHAPTER 1 BY jetarvind kumar madhukar
CCNA CHAPTER 1 BY jetarvind kumar madhukarCCNA CHAPTER 1 BY jetarvind kumar madhukar
CCNA CHAPTER 1 BY jetarvind kumar madhukar
 
Keyboard and mouse slide by Jetarvind kumar madhukar
Keyboard and mouse slide by Jetarvind kumar madhukarKeyboard and mouse slide by Jetarvind kumar madhukar
Keyboard and mouse slide by Jetarvind kumar madhukar
 
Networkdevices by Jetarvind kumar madhukar
Networkdevices by Jetarvind kumar madhukarNetworkdevices by Jetarvind kumar madhukar
Networkdevices by Jetarvind kumar madhukar
 
Overview of ip_security by JetArvind kumar Madhukar
Overview of ip_security by JetArvind kumar Madhukar Overview of ip_security by JetArvind kumar Madhukar
Overview of ip_security by JetArvind kumar Madhukar
 

Recently uploaded

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 

Recently uploaded (20)

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 

CCNA CHAPTER 9 BY jetarvind kumar madhukar

  • 1. Release 16/07/2009 Jetking Infotrain Ltd. Establishing Serial Point-to-Point Connection Chapter 9
  • 2. Release 16/07/2009Jetking Infotrain Ltd. Chapter Objectives  Explain wide area network  Explain data-link protocols of point-to-point leased lines  Explain HDLC  Explain PPP
  • 3. Release 16/07/2009Jetking Infotrain Ltd. Recall - I  ACL are the statements, which are grouped together by using a name or number  ACLs supports the following types:  Standard ACL  Extended ACL  You can use the access-list command to create an ACL. The syntax to create an ACL is: access-list ACL_# permit|deny conditions
  • 4. Release 16/07/2009Jetking Infotrain Ltd. Recall - II  Wildcard masks can be used for matching a range of IP addresses in ACL, instead of manually entering it  A wildcard is similar to an inverted subnet mask  the extended ACL filters the source and destination IP address, IP protocols such as IP, TCP, UDP , ICMP etc. and protocol information such as port numbers or message types
  • 5. Release 16/07/2009Jetking Infotrain Ltd. Wide Area Network  The terms and components of WAN are:  Data Communications Equipment (DCE)  Data Terminal Equipment (DTE)  Customer Premises Equipment (CPE)  Demarcation point  Toll network  Central Office (CO) switch  Local loop
  • 6. Release 16/07/2009Jetking Infotrain Ltd. Wide Area Network (WAN)
  • 7. Release 16/07/2009Jetking Infotrain Ltd. Types of WAN  WANs are available in four types, based on the distance covered and the equipment used  The four types of WAN are:  Leased-Lines Connection  Circuit-Switched Connection  Packet-Switched Connections  Cell-Switched Connections
  • 8. Release 16/07/2009Jetking Infotrain Ltd. Selecting WAN  While connecting a LAN to a WAN, you should be aware of the connection requirements  Some of the major factors that help to select a WAN are:  Frequency  Transfer rates  Traffic load  Cost
  • 9. Release 16/07/2009Jetking Infotrain Ltd. Data-Link Protocols  Data-link layer protocols are commonly called the data link protocols  These protocols communicate between two devices such as, routers, and bridges  Data packets are sent over the link created by the protocols  Data-link protocols consist of:  High Level Data Link Control (HDLC) protocol  Point-to-Point protocol (PPP)
  • 11. Release 16/07/2009Jetking Infotrain Ltd. HDLC Frame Fields Field Name Description Flag Contains a single byte which indicates the beginning or end of a frame Address Contains the broadcast address which is a binary sequence Control Contains a single byte of binary sequence. This calls for transmission of user data in a non-sequence frame Proprietary Contains information about the way to carry multiple protocols on a single link Data Contains encapsulated data. The range if this field is variable FCS Contains 2 to 4 bytes. Improves error detection
  • 12. Release 16/07/2009Jetking Infotrain Ltd. Types of HDLC Frames
  • 13. Release 16/07/2009Jetking Infotrain Ltd. Configuring HDLC  The encapsulation on a Cisco synchronous serial interface is HDLC  HDLC needs to be configured if the data link protocol is change to some other protocol, and HDLC has to be set back to default  To configure the HDLC protocol to be set as default, use the router CLI
  • 14. Release 16/07/2009Jetking Infotrain Ltd. Output of HDLC Verification
  • 15. Release 16/07/2009Jetking Infotrain Ltd. PPP  The PPP allows computers to connect to the Internet using a dial-up telephone line and ISDN  PPP was originally designed to transport IP traffic over point-to-point links  PPP can transfer data over synchronous and asynchronous links  It supports a transfer of data over different network protocols
  • 16. Release 16/07/2009Jetking Infotrain Ltd. PPP Frame  The frame format of PPP is similar to the HDLC Frame  The only difference is that, PPP includes a Protocol field  The PPP frame is made up of six fields as shown in Figure
  • 18. Release 16/07/2009Jetking Infotrain Ltd. Link Control Protocol (LCP)  The PPP Link Control Protocol can establish, configure, maintain and terminate point-to-point connection between the devices  LCP uses following three classes of frames for establishing, configuring, maintaining and terminating connection between the devices:  Link Configuration frames  Link Maintenance frames  Link Termination frames
  • 19. Release 16/07/2009Jetking Infotrain Ltd. Communication Between Devices
  • 20. Release 16/07/2009Jetking Infotrain Ltd. LCP Configuration Options  The LCP configuration options are:  Authentication  Compression  Error-detection  Multilink  PPP callback
  • 21. Release 16/07/2009Jetking Infotrain Ltd. PPP Session Establishment  Point-to-Point protocol is used to transmit data packets over serial point-to-point links  The three phases of session establishment are given as follows:  Link establishment phase  Authentication phase  Network layer protocol phase
  • 22. Release 16/07/2009Jetking Infotrain Ltd. PPP Authentication - I  Point-to-Point protocol supports authentication of devices  Once a link is established between nodes the process of authentication starts  PPP supports two authentication protocols Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP)
  • 23. Release 16/07/2009Jetking Infotrain Ltd. PPP Authentication - II
  • 24. Release 16/07/2009Jetking Infotrain Ltd. CHAP Authentication
  • 25. Release 16/07/2009Jetking Infotrain Ltd. Configuring PPP  Cisco allows you to configure the PPP to be used on WAN interface  You can configure the PPP using encapsulation and interface commands in the configuration mode  The syntax of the command to configure PPP is: encapsulation ppp
  • 26. Release 16/07/2009Jetking Infotrain Ltd. Configuring PPP Authentication  Once the serial interface is configured to support the PPP encapsulation, you must configure PPP authentication on the routers  Before authentication process, it is required to set a hostname for the router if not already assigned  Also, you must set username and password for the remote router to which the router is connected  After the hostname, username and password is set , select the appropriate authentication for the router such as PAP or CHAP
  • 27. Release 16/07/2009Jetking Infotrain Ltd. Verifying PPP Encapsulation  PPP does not begin authentication until the Link Control Protocol (LCP) process is completed and open  PPP authentication needs to be set up on both ends for the authentication process to work  Using commands, such as show and debug you can solve problems for PPP
  • 28. Release 16/07/2009Jetking Infotrain Ltd. Mismatched WAN Encapsulations  Routers can communicate in a network only if their encapsulation methods are same  If you connect two routers in the network using point-to-point link but the encapsulation methods are different on each router, the connection between the routers is not established  In this case, if one router sends request to the other, it will never receive a response from that router
  • 29. Release 16/07/2009Jetking Infotrain Ltd. Mismatched IP Addresses  Routers configured with same WAN encapsulation method such as PPP, HDLC or Frame Relay connected in different subnets will have connection established between them  However, the data packets do not transfer between the routers. It becomes very difficult to identify this problem, as the link appears to be functioning properly  To resolve the problem, you can use the show running-config and show interface command on each router
  • 30. Release 16/07/2009Jetking Infotrain Ltd. Case Study The Blue Diamond steel company, Gujarat branch has all Cisco routers connected in the network. The router of the Business Development department is damaged. The computers in this department cannot exchange data with the other departments in the network. The network administrator Robert replaces the damaged router with a new non-Cisco router.
  • 31. Release 16/07/2009Jetking Infotrain Ltd. Problem The Business Development department still cannot have transaction with the other departments
  • 32. Release 16/07/2009Jetking Infotrain Ltd. Suggested Solution Cisco routers by default use HDLC as the serial encapsulation method on Cisco serial links. If you connect a non-Cisco router to a Cisco router in the network, data transfer does not occur between them. To enable communication between the routers, implement the Point-to-Point encapsulation method. You must configure PPP on all the serial interfaces of both the routers
  • 33. Release 16/07/2009Jetking Infotrain Ltd. Comparing HDLC and PPP - I HDLC PPP Fails to provide a method of detecting errors Uses FCS to detect errors while transmitting data Consist of two types; ISO HDLC and Cisco HDLC Based on ISO's HDLC frame format Supports synchronous and asynchronous links Supports synchronous, asynchronous, High-Speed Serial Interface (HSSI), and ISDN links
  • 34. Release 16/07/2009Jetking Infotrain Ltd. Comparing HDLC and PPP - II Used to perform encapsulation of data without using other encapsulation protocols Used to transfer data. PPP cannot encapsulate data without the help of other encapsulation protocols, such as, HDLC and Synchronous Data Link Control (SDLC) Fails to provide authentication between two nodes or devices Provides authentication using protocols, such as, PPP Authentication Protocol (PAP), and Challenge Handshake Authentication Protocol (CHAP)
  • 35. Release 16/07/2009Jetking Infotrain Ltd. Comparing HDLC and PPP - III Provides a frame format that contains a proprietary field. The other six fields are similar to the PPP frame field. Note, the ISO HDLC frame contains only six fields, as the proprietary field is not present Provides a frame format that contains a protocol field. The other six fields are similar to the HDLC frame field Fails to check for quality of a link established Uses Link Control Protocol (LCP) to the check for quality of an established link
  • 36. Release 16/07/2009Jetking Infotrain Ltd. Summary - I  WAN is a network that spans a large geographical area  Leased lines are a transmission line, which is provided by telephone companies to a particular customer  Frequency, usage, traffic and cost are factors that need to considered when selecting a WAN connection  Data-Link layer protocols are commonly called the data link protocols, which communicate between two devices
  • 37. Release 16/07/2009Jetking Infotrain Ltd. Summary - II  Configuring HDLC only needs to be done only if the data link protocol is change to some other protocol  The two types of HDLC:  ISO HDLC  Cisco HDLC  The Cisco HDLC contains proprietary field, which defines carrying a multiple protocols across a link  PPP enables computers to connect to the internet using a dial-up telephone line and ISDN  Configuring the PPP is to specify that PPP is to be used on the WAN
  • 38. Release 16/07/2009Jetking Infotrain Ltd. Summary - III  Features of PPP are:  Authentication  Link test  Error-detection  Compression  Components of PPP are:  HDLC  LCP  NCPs  Authentication protocols supported by PPP are:  PAP  CHAP
  • 39. Release 16/07/2009Jetking Infotrain Ltd. Summary - IV  By default the authentication is not mandatory but must be specified to  PAP is a insecure protocol because the username and password is sent in plain text  Using CHAP protocol the server sends challenge messages to the node. The node calculates and sends the results back to the server