SlideShare a Scribd company logo
1 of 36
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 4: Frame
Relay
Connecting Networks
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 4
4.0 Introduction
4.1 Introduction to Frame Relay
4.2 Configuring Frame Relay
4.3 Troubleshooting Connectivity
4.4 Summary
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 4: Objectives
 Describe the fundamental concepts of Frame Relay technology,
including operation, implementation requirements, maps, and Local
Management Interface (LMI) operation.
 Configure a basic Frame Relay permanent virtual circuit (PVC),
including configuring and troubleshooting Frame Relay on a router
serial interface and configuring a static Frame Relay map.
 Describe advanced concepts of Frame Relay technology, including
subinterfaces, bandwidth, and flow control.
 Configure an advanced Frame Relay PVC, including solving
reachability issues, configuring subinterfaces, and verifying and
troubleshooting a Frame Relay configuration.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
4.1 Introduction to Frame Relay
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Benefits of Frame Relay
Introducing Frame Relay
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Benefits of Frame Relay
Benefits of Frame Relay WAN Technology
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Benefits of Frame Relay
Dedicated Line Requirements
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Benefits of Frame Relay
Frame Relay Cost Effectiveness and Flexibility
 With dedicated lines, customers pay for an end-to-end connection,
which includes the local loop and the network link. With Frame
Relay, customers only pay for the local loop, and for the
bandwidth, they purchase from the network provider.
 Frame Relay shares bandwidth across a larger base of customers.
Typically, a network provider can service 40 or more 56 kb/s
customers over one T1 circuit. Using dedicated lines would require
more CSU/DSUs (one for each line) and more complicated routing
and switching.
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Frame Relay Operation
Virtual Circuits
 Switched virtual circuits (SVC) – Established dynamically by
sending signaling messages to the network.
 Permanent virtual circuits (PVCs) – Preconfigured by the carrier,
and after they are set up, only operate in DATA TRANSFER and
IDLE modes.
 VCs are identified by DLCIs. Frame Relay DLCIs have local
significance, which means that the values are not unique in the
Frame Relay WAN. A DLCI identifies a VC to the equipment at an
endpoint.
 A DLCI has no significance beyond the single link.
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Frame Relay Operation
Multiple Virtual Circuits
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Frame Relay Operation
Frame Relay Encapsulation
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Frame Relay Operation
Frame Relay Topologies
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Frame Relay Operation
Frame Relay Address Mapping
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Frame Relay Operation
Local Management Interface (LMI)
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Frame Relay Operation
LMI Extensions
 VC status messages
 Multicasting
 Global addressing
 Simple flow control
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Frame Relay Operation
Using LMI and Inverse ARP to Map Addresses
1. The Inverse ARP request includes the source hardware, source
Layer 3 protocol address, and the known target hardware
address.
2. The Inverse ARP request fills the target Layer 3 protocol address
field with all zeroes. It encapsulates the packet for the specific
network and sends it directly to the destination device using the
VC.
3. Upon receiving an Inverse ARP request, the destination device
uses the source device’s address to create its own DLCI-to-
Layer 3 map.
4. It then sends an Inverse ARP response that includes its Layer 3
address information.
5. When the source device receives the Inverse ARP response, it
completes the DLCI-to-Layer 3 map using the provided
information.
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Advanced Frame Relay Concepts
Access Rate and Committed Information Rate
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Advanced Frame Relay Concepts
Frame Relay Example
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Advanced Frame Relay Concepts
Bursting
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Advanced Frame Relay Concepts
Frame Relay Flow Control
 When the DCE sets the BECN bit to 1, it notifies devices in the
direction of the source (upstream) that there is congestion on the
network.
 When the DCE sets the FECN bit to 1, it notifies devices in the
direction of the destination (downstream) that there is congestion
on the network.
 DTE devices can set the value of the DE bit to 1 to indicate that the
frame has lower importance than other frames. When the network
becomes congested, DCE devices discard the frames with the DE
bit set to 1 before discarding those that do not.
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 21
4.2 Configuring Frame Relay
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configure Basic Frame Relay
Basic Frame Relay Configuration Steps
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configure Basic Frame Relay
Configuring a Static Frame Relay Map
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configure Basic Frame Relay
Verifying a Static Frame Relay Map
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configure Subinterfaces
Reachability Issues
Frame Relay networks provide NBMA connectivity, using a hub-and-
spoke topology, between remote sites. In an NBMA Frame Relay
topology, when a single multipoint interface must be used to
interconnect multiple sites, routing update reachability issues may
result.
Reachability Issues:
 Split horizon
 Broadcast/multicast replication
 Neighbor Discovery: DR and BDR
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configure Subinterfaces
Solving Reachability Issues
 Disable split horizon – One method for solving the reachability
issues that are produced by split horizon may be to turn off split
horizon; however, disabling split horizon increases the chances of
routing loops in your network.
 Full-meshed topology – Another method is to use a full-meshed
topology; however, this topology increases costs.
 Subinterfaces – In a hub-and-spoke Frame Relay topology, the
hub router can be configured with logically assigned interfaces
called subinterfaces.
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configure Subinterfaces
Configuring Point-to-Point Subinterfaces
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Configure Subinterfaces
Example: Configuring Point-to-Point
Subinterfaces
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 29
4.3 Troubleshooting Connectivity
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshoot Frame Relay
Verifying Frame Relay Operation: Frame Relay Interface
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshoot Frame Relay
Verifying Frame Relay Operation: LMI Operations
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshoot Frame Relay
Verifying Frame Relay Operation: PVC Status
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshoot Frame Relay
Verifying Frame Relay Operation: Inverse ARP
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Troubleshoot Frame Relay
Troubleshooting Frame Relay Operation
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 4: Summary
This chapter described:
 The fundamental concepts of Frame Relay technology, including
operation, implementation requirements, maps, and Local
Management Interface (LMI) operation.
 How to configure a basic Frame Relay permanent virtual circuit
(PVC), including configuring and troubleshooting Frame Relay on a
router serial interface and configuring a static Frame Relay map.
 Advanced concepts of Frame Relay technology including
subinterfaces, bandwidth and flow control.
 Advanced Frame Relay PVCs, including solving reachability issues,
configuring subinterfaces, and verifying and troubleshooting a Frame
Relay configuration.
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

What's hot

CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11
Irsandi Hasan
 

What's hot (20)

CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1CCNA 2 Routing and Switching v5.0 Chapter 1
CCNA 2 Routing and Switching v5.0 Chapter 1
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
 
CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8CCNA 2 Routing and Switching v5.0 Chapter 8
CCNA 2 Routing and Switching v5.0 Chapter 8
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
CCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communicationsCCNAv5 - S1: Chapter 3 - Network protocols and communications
CCNAv5 - S1: Chapter 3 - Network protocols and communications
 
CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11CCNA Exploration 2 - Chapter 11
CCNA Exploration 2 - Chapter 11
 
CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access CCNAv5 - S1: Chapter 4 - Network Access
CCNAv5 - S1: Chapter 4 - Network Access
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
CCNAv5 - S2: Chapter 9 Access Control Lists
CCNAv5 - S2: Chapter 9 Access Control ListsCCNAv5 - S2: Chapter 9 Access Control Lists
CCNAv5 - S2: Chapter 9 Access Control Lists
 
CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5CCNA 1 Routing and Switching v5.0 Chapter 5
CCNA 1 Routing and Switching v5.0 Chapter 5
 
CCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan RoutingCCNAv5 - S2: Chapter5 Inter Vlan Routing
CCNAv5 - S2: Chapter5 Inter Vlan Routing
 
CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
 

Similar to CCNAv5 - S4: Chapter 4 Frame Relay

Chapter3 frame relay
Chapter3   frame relayChapter3   frame relay
Chapter3 frame relay
juliusbangaw
 
Week12 frame relay
Week12 frame relayWeek12 frame relay
Week12 frame relay
libra aziz
 
Wan Technologies
Wan TechnologiesWan Technologies
Wan Technologies
AKLI
 
rsinstructorpptchapter1final-141024021337-conversion-gate01
rsinstructorpptchapter1final-141024021337-conversion-gate01rsinstructorpptchapter1final-141024021337-conversion-gate01
rsinstructorpptchapter1final-141024021337-conversion-gate01
Lema John Michael
 
KPUCC-Rs instructor ppt_chapter1_final
KPUCC-Rs instructor ppt_chapter1_finalKPUCC-Rs instructor ppt_chapter1_final
KPUCC-Rs instructor ppt_chapter1_final
Fisal Anwari
 
introduction to switched networks - JARINGAN KOMPUTER
introduction to switched networks - JARINGAN KOMPUTERintroduction to switched networks - JARINGAN KOMPUTER
introduction to switched networks - JARINGAN KOMPUTER
hasby if
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_final
Fisal Anwari
 
AD-WAN-Tech-Chapter 1.pptx
AD-WAN-Tech-Chapter 1.pptxAD-WAN-Tech-Chapter 1.pptx
AD-WAN-Tech-Chapter 1.pptx
RahafKhalid14
 

Similar to CCNAv5 - S4: Chapter 4 Frame Relay (20)

cisco-nti-Day19
cisco-nti-Day19cisco-nti-Day19
cisco-nti-Day19
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
Day 20.2 frame relay
Day 20.2 frame relay Day 20.2 frame relay
Day 20.2 frame relay
 
Chapter3 frame relay
Chapter3   frame relayChapter3   frame relay
Chapter3 frame relay
 
Week12 frame relay
Week12 frame relayWeek12 frame relay
Week12 frame relay
 
cisco-nti-Day18
cisco-nti-Day18cisco-nti-Day18
cisco-nti-Day18
 
Wan Technologies
Wan TechnologiesWan Technologies
Wan Technologies
 
CCNA Exploration 4 - Chapter 3
CCNA Exploration 4 - Chapter 3CCNA Exploration 4 - Chapter 3
CCNA Exploration 4 - Chapter 3
 
Chapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched NetworksChapter 01 - Introduction to Switched Networks
Chapter 01 - Introduction to Switched Networks
 
rsinstructorpptchapter1final-141024021337-conversion-gate01
rsinstructorpptchapter1final-141024021337-conversion-gate01rsinstructorpptchapter1final-141024021337-conversion-gate01
rsinstructorpptchapter1final-141024021337-conversion-gate01
 
KPUCC-Rs instructor ppt_chapter1_final
KPUCC-Rs instructor ppt_chapter1_finalKPUCC-Rs instructor ppt_chapter1_final
KPUCC-Rs instructor ppt_chapter1_final
 
introduction to switched networks - JARINGAN KOMPUTER
introduction to switched networks - JARINGAN KOMPUTERintroduction to switched networks - JARINGAN KOMPUTER
introduction to switched networks - JARINGAN KOMPUTER
 
Chapter 12 : Introduction to switched networks
Chapter 12 : Introduction to switched networksChapter 12 : Introduction to switched networks
Chapter 12 : Introduction to switched networks
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
 
KPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_finalKPUCC-Rs instructor ppt_chapter4_final
KPUCC-Rs instructor ppt_chapter4_final
 
Chapter 04 - Routing Concepts
Chapter 04 - Routing ConceptsChapter 04 - Routing Concepts
Chapter 04 - Routing Concepts
 
Chapter 15 : routing concepts
Chapter 15 : routing conceptsChapter 15 : routing concepts
Chapter 15 : routing concepts
 
Chapter 3 frame relay
Chapter 3   frame relayChapter 3   frame relay
Chapter 3 frame relay
 
CCNA2 Verson6 Chapter4
CCNA2 Verson6 Chapter4CCNA2 Verson6 Chapter4
CCNA2 Verson6 Chapter4
 
AD-WAN-Tech-Chapter 1.pptx
AD-WAN-Tech-Chapter 1.pptxAD-WAN-Tech-Chapter 1.pptx
AD-WAN-Tech-Chapter 1.pptx
 

More from Vuz Dở Hơi

More from Vuz Dở Hơi (20)

Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.Ceh v8 Labs - Module18: Buffer Overflow.
Ceh v8 Labs - Module18: Buffer Overflow.
 
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
Cehv8 Labs - Module17: Evading IDS, Firewalls and Honeypots.
 
Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.Cehv8 Labs - Module15: Hacking Wireless Networks.
Cehv8 Labs - Module15: Hacking Wireless Networks.
 
Cehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL InjectionCehv8 Labs - Module14: SQL Injection
Cehv8 Labs - Module14: SQL Injection
 
Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.Cehv8 Labs - Module13: Hacking Web Applications.
Cehv8 Labs - Module13: Hacking Web Applications.
 
Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.Cehv8 Labs - Module12: Hacking Webservers.
Cehv8 Labs - Module12: Hacking Webservers.
 
Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.Ceh v8 Labs - Module11: Session Hijacking.
Ceh v8 Labs - Module11: Session Hijacking.
 
Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.Cehv8 Labs - Module10: Denial of Service.
Cehv8 Labs - Module10: Denial of Service.
 
Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.Cehv8 Labs - Module09: Social Engineering.
Cehv8 Labs - Module09: Social Engineering.
 
Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.Cehv8 Labs - Module08: Sniffers.
Cehv8 Labs - Module08: Sniffers.
 
Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.Cehv8 Labs - Module07: Viruses and Worms.
Cehv8 Labs - Module07: Viruses and Worms.
 
Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.Cehv8 Labs - Module06: Trojans and Backdoors.
Cehv8 Labs - Module06: Trojans and Backdoors.
 
Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.Cehv8 Labs - Module 05: System Hacking.
Cehv8 Labs - Module 05: System Hacking.
 
Cehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: EnumerationCehv8 Labs - Module04: Enumeration
Cehv8 Labs - Module04: Enumeration
 
Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.Cehv8 Labs - Module03: Scanning Networks.
Cehv8 Labs - Module03: Scanning Networks.
 
Cehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and ReconnaissanceCehv8 Labs - Module02: Footprinting and Reconnaissance
Cehv8 Labs - Module02: Footprinting and Reconnaissance
 
Cehv8 - Labs Module 00
Cehv8 - Labs Module 00Cehv8 - Labs Module 00
Cehv8 - Labs Module 00
 
Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.Cehv8 - Module18: Buffer overflow.
Cehv8 - Module18: Buffer overflow.
 
Cehv8 - references
Cehv8 - referencesCehv8 - references
Cehv8 - references
 
Cehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testingCehv8 - Module 20: penetration testing
Cehv8 - Module 20: penetration testing
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

CCNAv5 - S4: Chapter 4 Frame Relay

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 4: Frame Relay Connecting Networks
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 4 4.0 Introduction 4.1 Introduction to Frame Relay 4.2 Configuring Frame Relay 4.3 Troubleshooting Connectivity 4.4 Summary
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 4: Objectives  Describe the fundamental concepts of Frame Relay technology, including operation, implementation requirements, maps, and Local Management Interface (LMI) operation.  Configure a basic Frame Relay permanent virtual circuit (PVC), including configuring and troubleshooting Frame Relay on a router serial interface and configuring a static Frame Relay map.  Describe advanced concepts of Frame Relay technology, including subinterfaces, bandwidth, and flow control.  Configure an advanced Frame Relay PVC, including solving reachability issues, configuring subinterfaces, and verifying and troubleshooting a Frame Relay configuration.
  • 4. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4 4.1 Introduction to Frame Relay
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Benefits of Frame Relay Introducing Frame Relay
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Benefits of Frame Relay Benefits of Frame Relay WAN Technology
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Benefits of Frame Relay Dedicated Line Requirements
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Benefits of Frame Relay Frame Relay Cost Effectiveness and Flexibility  With dedicated lines, customers pay for an end-to-end connection, which includes the local loop and the network link. With Frame Relay, customers only pay for the local loop, and for the bandwidth, they purchase from the network provider.  Frame Relay shares bandwidth across a larger base of customers. Typically, a network provider can service 40 or more 56 kb/s customers over one T1 circuit. Using dedicated lines would require more CSU/DSUs (one for each line) and more complicated routing and switching.
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Frame Relay Operation Virtual Circuits  Switched virtual circuits (SVC) – Established dynamically by sending signaling messages to the network.  Permanent virtual circuits (PVCs) – Preconfigured by the carrier, and after they are set up, only operate in DATA TRANSFER and IDLE modes.  VCs are identified by DLCIs. Frame Relay DLCIs have local significance, which means that the values are not unique in the Frame Relay WAN. A DLCI identifies a VC to the equipment at an endpoint.  A DLCI has no significance beyond the single link.
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Frame Relay Operation Multiple Virtual Circuits
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Frame Relay Operation Frame Relay Encapsulation
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Frame Relay Operation Frame Relay Topologies
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Frame Relay Operation Frame Relay Address Mapping
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Frame Relay Operation Local Management Interface (LMI)
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Frame Relay Operation LMI Extensions  VC status messages  Multicasting  Global addressing  Simple flow control
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Frame Relay Operation Using LMI and Inverse ARP to Map Addresses 1. The Inverse ARP request includes the source hardware, source Layer 3 protocol address, and the known target hardware address. 2. The Inverse ARP request fills the target Layer 3 protocol address field with all zeroes. It encapsulates the packet for the specific network and sends it directly to the destination device using the VC. 3. Upon receiving an Inverse ARP request, the destination device uses the source device’s address to create its own DLCI-to- Layer 3 map. 4. It then sends an Inverse ARP response that includes its Layer 3 address information. 5. When the source device receives the Inverse ARP response, it completes the DLCI-to-Layer 3 map using the provided information.
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Advanced Frame Relay Concepts Access Rate and Committed Information Rate
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Advanced Frame Relay Concepts Frame Relay Example
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Advanced Frame Relay Concepts Bursting
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Advanced Frame Relay Concepts Frame Relay Flow Control  When the DCE sets the BECN bit to 1, it notifies devices in the direction of the source (upstream) that there is congestion on the network.  When the DCE sets the FECN bit to 1, it notifies devices in the direction of the destination (downstream) that there is congestion on the network.  DTE devices can set the value of the DE bit to 1 to indicate that the frame has lower importance than other frames. When the network becomes congested, DCE devices discard the frames with the DE bit set to 1 before discarding those that do not.
  • 21. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 21 4.2 Configuring Frame Relay
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configure Basic Frame Relay Basic Frame Relay Configuration Steps
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configure Basic Frame Relay Configuring a Static Frame Relay Map
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configure Basic Frame Relay Verifying a Static Frame Relay Map
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configure Subinterfaces Reachability Issues Frame Relay networks provide NBMA connectivity, using a hub-and- spoke topology, between remote sites. In an NBMA Frame Relay topology, when a single multipoint interface must be used to interconnect multiple sites, routing update reachability issues may result. Reachability Issues:  Split horizon  Broadcast/multicast replication  Neighbor Discovery: DR and BDR
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configure Subinterfaces Solving Reachability Issues  Disable split horizon – One method for solving the reachability issues that are produced by split horizon may be to turn off split horizon; however, disabling split horizon increases the chances of routing loops in your network.  Full-meshed topology – Another method is to use a full-meshed topology; however, this topology increases costs.  Subinterfaces – In a hub-and-spoke Frame Relay topology, the hub router can be configured with logically assigned interfaces called subinterfaces.
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configure Subinterfaces Configuring Point-to-Point Subinterfaces
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Configure Subinterfaces Example: Configuring Point-to-Point Subinterfaces
  • 29. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 29 4.3 Troubleshooting Connectivity
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshoot Frame Relay Verifying Frame Relay Operation: Frame Relay Interface
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshoot Frame Relay Verifying Frame Relay Operation: LMI Operations
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshoot Frame Relay Verifying Frame Relay Operation: PVC Status
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshoot Frame Relay Verifying Frame Relay Operation: Inverse ARP
  • 34. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Troubleshoot Frame Relay Troubleshooting Frame Relay Operation
  • 35. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 4: Summary This chapter described:  The fundamental concepts of Frame Relay technology, including operation, implementation requirements, maps, and Local Management Interface (LMI) operation.  How to configure a basic Frame Relay permanent virtual circuit (PVC), including configuring and troubleshooting Frame Relay on a router serial interface and configuring a static Frame Relay map.  Advanced concepts of Frame Relay technology including subinterfaces, bandwidth and flow control.  Advanced Frame Relay PVCs, including solving reachability issues, configuring subinterfaces, and verifying and troubleshooting a Frame Relay configuration.
  • 36. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential