background image
590 Chapter 8: WAN Protocols and Design
details of the LAPD protocol between the router and the ISDN switch. The debug isdn q931
command lists output for call setup and disconnect; the output in the example shows output
typical of what happened on SanFrancisco when the call to LosAngeles was made. The debug
dialer events
and debug dialer packets commands provide similar information when a packet
is a candidate for causing the dial to occur--in other words, when a packet is routed out the dial
interface.
A Comparison of WAN Options
Networking professionals need to know about many WAN options when designing networks.
Certainly, Cisco requires CCNAs to have a solid foundation of the WAN technologies in this
chapter. Cisco also expects CCNAs to be able to compare and contrast these different WAN
technologies. This section summarizes many of the concepts found earlier in this chapter, with
a focus on comparison.
The permanent WAN connectivity options can be categorized into two main groups:
synchronous serial leased lines and packet switching services. PPP, HDLC, and LAPB are
the three data link protocols most typical on leased lines, with Frame Relay being the most
pervasive packet-switched service. In fact, Frame Relay is better named a frame switching
service to imply that the protocol is a Layer 2 protocol, but when talking similar services as a
group, packet switching is the typical term used. X.25 and ATM services also fall into the packet
switching category.
X.25 and ATM are not discussed in this exam guide in any depth. (For more information, refer
to the documents referenced in Appendix B, "Decimal to Hexadecimal and Binary Conversion
Table.") X.25 is very similar to Frame Relay because it uses VCs and has error-recovery built
in to each link and each end-to-end VC. ATM is similar in its use of virtual connections, which
are conceptually equivalent to VCs. However, ATM includes the concept of segmentation and
reassembly (SAR), in which the device at the edge of the ATM network breaks the frames to be
sent into smaller cells (53 bytes) that are reassembled at the other end of the VC. The details of
how each of these three packet-switching protocols are implemented is different; however, each
creates a multiaccess network, with direct packet forwarding allowed only between pairs of
devices that have a VC between them.
Table 8-33 summarizes these types of permanent connections and lists some of the strengths
and weaknesses.
ch08.fm Page 590 Monday, March 20, 2000 5:17 PM