SlideShare une entreprise Scribd logo
1  sur  27
NETWORKING
FUNDAMENTALS

K.GAYATHRI
IPv4 Addressing
The IPv4 addresses are unique and universal.

●

An IPv4 address is 32 bits long.

●

The address space of IPv4 is 232 (4,294,967,296)

●

2 Types of IPv4 Notations.
Binary notation



Dotted-decimal notation


SUBNETTING AND VLSM
Subnetting
Divide a large address block into smaller subgroups.
●

Use of flexible net mask.

●

VLSM-Variable Length Subnet Mask
Technique that allows network administrators to
divide an IP address space into subnets of different
sizes, unlike simple same-size Subnetting.
●

Subnetting a subnet.

●
ROUTING PROTOCOLS
Routing Protocol

●

Protocols used by routers to make path determination choices
and to share those choices with other routers
Autonomous system (AS)

●

Uses Interior Gateway Protocols as routing protocols
A group of routers under the control of a single administration
Interior Gateway Protocols (IGPs)

●

Routing protocols used within an AS
Exterior Gateway Protocols (EGPs)

●

Routing protocols used to route information between multiple
autonomous systems
ROUTING PROTOCOLS(continued)
Examples of IGPs
Routing Information Protocol (RIP)

●

Enhanced Interior Gateway Routing Protocol
(EIGRP)
●

Open Shortest Path First (OSPF)

●

Example of EGP
Border Gateway Protocol (BGP)

●
ROUTING INFORMATION PROTOCOL(RIP)
Routing Information Protocol (RIP)

●

The easiest Interior Gateway Protocol to configure is RIPv1

●

A distance-vector routing protocol that broadcasts entire routing
tables to neighbors every 30 seconds
●

RIP has a maximum hop count of 15

●

As a result, RIP does not work in large internetworks

●

Enabling RIP Routing, the following commands are used,

●

Router(config)#router rip
Router(config-router)#network 192.168.1.0
To troubleshoot RIP Routing,

●

Router#show ip rip
ENHANCED INTERIOR GATEWAY PROTOCOL(EIGRP)
EIGRP is a Cisco-proprietary Hybrid routing protocol, incorporating
features of both Distance-Vector and Link-State routing protocols.
●

It sends routing updates only when network topology changes instead
of its entire routing table at regular intervals.
●

Its convergence is very fast

●

It supports classless inter-domain routing (CIDR) and variable-length
subnet masks
●

(VLSM)
EIGRP Major Drawback

●

It is Cisco proprietary - it does not inter-operate with other vendors'
devices. This, of course, is the big one. If you are working in a mixed
environment, EIGRP doesn't make as much sense
EIGRP(Continued)
EIGRP uses Diffusing Update Algorithm (DUAL)to determine
the best path among all “feasible” paths. DUAL also helps ensure
a loop-free routing environment.
●

EIGRP will form neighbor relationships with adjacent routers in
the same Autonomous System (AS)
●

EIGRP traffic is either sent as unicasts, or as multicasts on
address 224.0.0.10, depending on the EIGRP packet type.
●

Reliable Transport Protocol (RTP) is used to ensure delivery of
most EIGRP packets.
●

EIGRP packets are Hello,Update,Query,Reply and Ack

●
EIGRP(Continued)
EIGRP, much like OSPF, builds three separate tables,
Neighbor table– list of all neighboring routers. neighbors must belong
to the same Autonomous System
●

Topology table– list of all routes in the Autonomous System

●

Routing table– contains the best route for each known network

●

Enabling EIGRP Routing, the following commands are used,

●

Router(config)#router eigrp 100
Router(config-router)#network 10.10.1.0
To troubleshoot EIGRP Routing,following commands are used,

●

Router#show ip route eigrp
Router#show ip eigrp neighbor
Router#show ip eigrp traffic
OPEN SHORTEST PATH FIRST(OSPF) PROTOCOL
OSPF is a standardized Link-State routing protocol,designed to
scale efficiently to support larger networks
●

Special routers (autonomous system boundary routers) or
backbone routers responsible to dissipate information about other
AS into the current system.
●

It minimizes routing table entries by dividing AS into areas

●

Fast convergence Protocol

●

Low bandwidth requirements

●

Supports different types of areas

●

Route summarization and authentication

●

Cisco's implementation is fully compliant with the specification
OSPF v2.
●
OSPF(Continued)
OSPF Packet Types,
●

Hello packets

●

Database Description (DBD)

●

Link-State Request (LSR)

●

Link-State Update (LSU)

●

Link-State Acknowledgement (LSA)

Different Types of LSAs,
Router LSA

●

Network LSA

●

Network Summary LSA

●

ASBR Summary LSA

●

AS-External LSA

●
OSPF(Continued)
Enabling OSPF Routing, the following commands are used,

●

Router(config)#router ospf 1(process id)
Router(config-router)#network 192.168.1.1 0.255.255.255 area 1
To troubleshoot OSPF Routing,following commands are used,

●

Router# show ip route
Router# show ip ospf
Router# show ip ospf interface
Router# show ip ospf neighbor
Router# show ip ospf database
BORDERED GATEWAY PROTOCOL(BGP)
Routing Protocol used to exchange routing information between
Autonomous System
●

Exterior gateway protocol and path vector protocol

●

A Path vector protocol defines a route as a pairing between a
destination and the attributes of the path to that destination
●

Types of BGP Messages are Open,update, Keep-alive and
Notification
●

Two types of BGP
External BGP Peering (eBGP)
Internal BGP Peering (iBGP)
BGP(Continued)
Internal BGP (iBGP)
BGP peer within the same AS

●

Not required to be directly connected

●

iBGP speakers need to be fully meshed

●

They originate connected networks

●

They do not pass on prefixes learned from other iBGP
speaker
●

External BGP Peering (eBGP)
Between BGP speakers in different AS

●

Should be directly connected

●

Do not run an IGP between eBGP peers

●
BGP Configuration Example
SWITCHING IN VLAN'S
Switches also have enabled the creation of Virtual LANs (VLANs).

●

VLANs provide greater opportunities to manage the flow of traffic on the
LAN and reduce broadcast traffic between segments.
●

VLANs are groups of computers in an intelligent switched network.

●

Allow us to split switches into separate (virtual) switches

●

Only members of a VLAN can see that VLAN’s traffic

●

VLAN'S Types,
Port-based VLANs

●

MAC address based

●

Protocol based VLANs

●

Application based VLANs

●
VIRTUAL TRUNKING PROTOCOL(VTP)
VTP reduces the complexity of managing and monitoring VLAN networks

●

VTP maintains VLAN configuration consistency across a common network
administration domain
●

VTP allows VLANs to be trunked over mixed media

●

VTP provides for accurate tracking and monitoring of VLANs

●

VTP provides “Plug-and-Play” configuration when adding new VLANs

●

VTP switches operate in one of three modes:
Server – default mode. Sends VLAN information to other switches.

●

Client – receives VLAN information and forwards it to other switches.

●

Transparent – forward VTP traffic but do not originate or use it. They can have their
own VLANs, not shared with other switches.
●
VTP(Continued)
Command to set the VTP mode:
Switch(vlan)#vtp {client | server | transparent}
VTP Pruning-VTP pruning increases network available
bandwidth by restricting flooded traffic to those trunk
links that the traffic must use to reach the destination
devices
VLAN3
VLAN1

VLAN4
VLAN2
SPANNING TREE PROTOCOL(STP)
STP is a link management protocol that provides path
redundancy while preventing undesirable loops in the
network
●

Spanning Tree Algorithm
The switches use this algorithm to decide which ports
should be shut down.
Choose one switch to be “root bridge”

●

Choose a “root port” on each other switch

●

Choose a “designated port” on each segment.

●

Close down all other ports.

●
STP TYPES
1.CSTP-Comman STP
2.RSTP(Rapid STP)-RSTP(Rapid Spanning Tree Protocol-802.1w
Standard): it is the enhanced protocol of STP,the main caracteristic
of this one is Faster than STP (it converge in less than 6 seconds).
3.MST(Multiple STP)-allows multiple spanning tree domains to be
configured in a network and on a switch.It is based on RSTP, and is
backwards-compatible with RSTP and STP.
4.PVST(Per VLAN STP)- Maintains a spanning-tree instance for
each VLAN configured in the network.
5.PVST+ -Per-VLAN Spanning Tree Plus is a Cisco
proprietary spanning tree protocol based on STP.
VIRTUAL PRIVATE NETWORK(VPN)
Creates a secure tunnel over a public network

●

Uses the Internet as the public backbone to access a

●

secure private network
Remote employees can access their office network

●

VPN Protocols
PPTP (Point-to-Point tunneling Protocol)

●

L2F (Layer 2 Forwarding Protocol)

●

L2TP (Layer 2 Tunneling Protocol)

●

IPSec (Internet Protocol Security)

●
IPsec(IP security)
Provides Layer 3 security (RFC 2401)

●

Transparent to applications (no need for integrated IPSec
support)
●

A set of protocols and algorithms used to secure IP data at the
network layer
●

Combines different components:
Security associations (SA)

●

Authentication headers (AH)

●

Encapsulating security payload (ESP)

●

Internet Key Exchange (IKE)

●
Ipsec Modes
Tunnel Mode
Entire IP packet is encrypted and becomes the data component
of a new (and larger) IP packet.
●

Frequently used in an IPsec site-to-site VPN

●

Transport Mode
Ipsec header is inserted into the IP packet

●

No new packet is created

●

Works well in networks where increasing a packet’s size could
cause an issue
●

Frequently used for remote-access VPNs

●
THANK YOU

Contenu connexe

Tendances

Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
Muuluu
 

Tendances (20)

20407473 ospf
20407473 ospf20407473 ospf
20407473 ospf
 
OSPF
OSPFOSPF
OSPF
 
Xpress path vxlan_bgp_evpn_appricot2019-v2_
Xpress path vxlan_bgp_evpn_appricot2019-v2_Xpress path vxlan_bgp_evpn_appricot2019-v2_
Xpress path vxlan_bgp_evpn_appricot2019-v2_
 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
 
VXLAN Distributed Service Node
VXLAN Distributed Service NodeVXLAN Distributed Service Node
VXLAN Distributed Service Node
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
ospf routing protocol
ospf routing protocolospf routing protocol
ospf routing protocol
 
VXLAN Practice Guide
VXLAN Practice GuideVXLAN Practice Guide
VXLAN Practice Guide
 
Operationalizing EVPN in the Data Center: Part 2
Operationalizing EVPN in the Data Center: Part 2Operationalizing EVPN in the Data Center: Part 2
Operationalizing EVPN in the Data Center: Part 2
 
Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPN
 
Scaleway Approach to VXLAN EVPN Fabric
Scaleway Approach to VXLAN EVPN FabricScaleway Approach to VXLAN EVPN Fabric
Scaleway Approach to VXLAN EVPN Fabric
 
Vxlan control plane and routing
Vxlan control plane and routingVxlan control plane and routing
Vxlan control plane and routing
 
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5   finalVxlan deep dive session rev0.5   final
Vxlan deep dive session rev0.5 final
 
Ospf
 Ospf Ospf
Ospf
 
VXLAN BGP EVPN: Technology Building Blocks
VXLAN BGP EVPN: Technology Building BlocksVXLAN BGP EVPN: Technology Building Blocks
VXLAN BGP EVPN: Technology Building Blocks
 
Comparison between-ipv6-and-6 lowpan
Comparison between-ipv6-and-6 lowpanComparison between-ipv6-and-6 lowpan
Comparison between-ipv6-and-6 lowpan
 
Dynamic Routing Protocol OSPF
Dynamic Routing Protocol OSPFDynamic Routing Protocol OSPF
Dynamic Routing Protocol OSPF
 
OpenNebulaConf2018 - Scalable L2 overlay networks with routed VXLAN / BGP EVP...
OpenNebulaConf2018 - Scalable L2 overlay networks with routed VXLAN / BGP EVP...OpenNebulaConf2018 - Scalable L2 overlay networks with routed VXLAN / BGP EVP...
OpenNebulaConf2018 - Scalable L2 overlay networks with routed VXLAN / BGP EVP...
 
Ospf
OspfOspf
Ospf
 
Ospf
OspfOspf
Ospf
 

Similaire à Networking Fundamentals

Ospf and eigrp concepts and configuration
Ospf and eigrp concepts and configurationOspf and eigrp concepts and configuration
Ospf and eigrp concepts and configuration
IT Tech
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ans
Ravi Kodoli
 

Similaire à Networking Fundamentals (20)

Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
Basic Introduction to Technology (networking).pdf
Basic Introduction to Technology (networking).pdfBasic Introduction to Technology (networking).pdf
Basic Introduction to Technology (networking).pdf
 
1Routing Basics.pdf
1Routing Basics.pdf1Routing Basics.pdf
1Routing Basics.pdf
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
CCNP Route
CCNP Route CCNP Route
CCNP Route
 
CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2CCNP v6 Route: Implementing IP Routing Chapter 2
CCNP v6 Route: Implementing IP Routing Chapter 2
 
CCNP Route EIGRP Overview
CCNP Route  EIGRP OverviewCCNP Route  EIGRP Overview
CCNP Route EIGRP Overview
 
Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01
 
Network interview questions
Network interview questionsNetwork interview questions
Network interview questions
 
CCCNP ROUTE v6_ch02
CCCNP ROUTE v6_ch02CCCNP ROUTE v6_ch02
CCCNP ROUTE v6_ch02
 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
 
Ospf and eigrp concepts and configuration
Ospf and eigrp concepts and configurationOspf and eigrp concepts and configuration
Ospf and eigrp concepts and configuration
 
CSC427_Week_11.pdf
CSC427_Week_11.pdfCSC427_Week_11.pdf
CSC427_Week_11.pdf
 
CisCon 2018 - Overlay Management Protocol e IPsec
CisCon 2018 - Overlay Management Protocol e IPsecCisCon 2018 - Overlay Management Protocol e IPsec
CisCon 2018 - Overlay Management Protocol e IPsec
 
1164 Routers
1164 Routers1164 Routers
1164 Routers
 
All in one q & ans
All in one q & ansAll in one q & ans
All in one q & ans
 
bank network design.pptx
bank network design.pptxbank network design.pptx
bank network design.pptx
 
Ospf
OspfOspf
Ospf
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 

Dernier

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Dernier (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Networking Fundamentals

  • 2. IPv4 Addressing The IPv4 addresses are unique and universal. ● An IPv4 address is 32 bits long. ● The address space of IPv4 is 232 (4,294,967,296) ● 2 Types of IPv4 Notations. Binary notation  Dotted-decimal notation 
  • 3. SUBNETTING AND VLSM Subnetting Divide a large address block into smaller subgroups. ● Use of flexible net mask. ● VLSM-Variable Length Subnet Mask Technique that allows network administrators to divide an IP address space into subnets of different sizes, unlike simple same-size Subnetting. ● Subnetting a subnet. ●
  • 4.
  • 5. ROUTING PROTOCOLS Routing Protocol ● Protocols used by routers to make path determination choices and to share those choices with other routers Autonomous system (AS) ● Uses Interior Gateway Protocols as routing protocols A group of routers under the control of a single administration Interior Gateway Protocols (IGPs) ● Routing protocols used within an AS Exterior Gateway Protocols (EGPs) ● Routing protocols used to route information between multiple autonomous systems
  • 6. ROUTING PROTOCOLS(continued) Examples of IGPs Routing Information Protocol (RIP) ● Enhanced Interior Gateway Routing Protocol (EIGRP) ● Open Shortest Path First (OSPF) ● Example of EGP Border Gateway Protocol (BGP) ●
  • 7. ROUTING INFORMATION PROTOCOL(RIP) Routing Information Protocol (RIP) ● The easiest Interior Gateway Protocol to configure is RIPv1 ● A distance-vector routing protocol that broadcasts entire routing tables to neighbors every 30 seconds ● RIP has a maximum hop count of 15 ● As a result, RIP does not work in large internetworks ● Enabling RIP Routing, the following commands are used, ● Router(config)#router rip Router(config-router)#network 192.168.1.0 To troubleshoot RIP Routing, ● Router#show ip rip
  • 8. ENHANCED INTERIOR GATEWAY PROTOCOL(EIGRP) EIGRP is a Cisco-proprietary Hybrid routing protocol, incorporating features of both Distance-Vector and Link-State routing protocols. ● It sends routing updates only when network topology changes instead of its entire routing table at regular intervals. ● Its convergence is very fast ● It supports classless inter-domain routing (CIDR) and variable-length subnet masks ● (VLSM) EIGRP Major Drawback ● It is Cisco proprietary - it does not inter-operate with other vendors' devices. This, of course, is the big one. If you are working in a mixed environment, EIGRP doesn't make as much sense
  • 9. EIGRP(Continued) EIGRP uses Diffusing Update Algorithm (DUAL)to determine the best path among all “feasible” paths. DUAL also helps ensure a loop-free routing environment. ● EIGRP will form neighbor relationships with adjacent routers in the same Autonomous System (AS) ● EIGRP traffic is either sent as unicasts, or as multicasts on address 224.0.0.10, depending on the EIGRP packet type. ● Reliable Transport Protocol (RTP) is used to ensure delivery of most EIGRP packets. ● EIGRP packets are Hello,Update,Query,Reply and Ack ●
  • 10. EIGRP(Continued) EIGRP, much like OSPF, builds three separate tables, Neighbor table– list of all neighboring routers. neighbors must belong to the same Autonomous System ● Topology table– list of all routes in the Autonomous System ● Routing table– contains the best route for each known network ● Enabling EIGRP Routing, the following commands are used, ● Router(config)#router eigrp 100 Router(config-router)#network 10.10.1.0 To troubleshoot EIGRP Routing,following commands are used, ● Router#show ip route eigrp Router#show ip eigrp neighbor Router#show ip eigrp traffic
  • 11. OPEN SHORTEST PATH FIRST(OSPF) PROTOCOL OSPF is a standardized Link-State routing protocol,designed to scale efficiently to support larger networks ● Special routers (autonomous system boundary routers) or backbone routers responsible to dissipate information about other AS into the current system. ● It minimizes routing table entries by dividing AS into areas ● Fast convergence Protocol ● Low bandwidth requirements ● Supports different types of areas ● Route summarization and authentication ● Cisco's implementation is fully compliant with the specification OSPF v2. ●
  • 12. OSPF(Continued) OSPF Packet Types, ● Hello packets ● Database Description (DBD) ● Link-State Request (LSR) ● Link-State Update (LSU) ● Link-State Acknowledgement (LSA) Different Types of LSAs, Router LSA ● Network LSA ● Network Summary LSA ● ASBR Summary LSA ● AS-External LSA ●
  • 13. OSPF(Continued) Enabling OSPF Routing, the following commands are used, ● Router(config)#router ospf 1(process id) Router(config-router)#network 192.168.1.1 0.255.255.255 area 1 To troubleshoot OSPF Routing,following commands are used, ● Router# show ip route Router# show ip ospf Router# show ip ospf interface Router# show ip ospf neighbor Router# show ip ospf database
  • 14. BORDERED GATEWAY PROTOCOL(BGP) Routing Protocol used to exchange routing information between Autonomous System ● Exterior gateway protocol and path vector protocol ● A Path vector protocol defines a route as a pairing between a destination and the attributes of the path to that destination ● Types of BGP Messages are Open,update, Keep-alive and Notification ● Two types of BGP External BGP Peering (eBGP) Internal BGP Peering (iBGP)
  • 15. BGP(Continued) Internal BGP (iBGP) BGP peer within the same AS ● Not required to be directly connected ● iBGP speakers need to be fully meshed ● They originate connected networks ● They do not pass on prefixes learned from other iBGP speaker ● External BGP Peering (eBGP) Between BGP speakers in different AS ● Should be directly connected ● Do not run an IGP between eBGP peers ●
  • 17. SWITCHING IN VLAN'S Switches also have enabled the creation of Virtual LANs (VLANs). ● VLANs provide greater opportunities to manage the flow of traffic on the LAN and reduce broadcast traffic between segments. ● VLANs are groups of computers in an intelligent switched network. ● Allow us to split switches into separate (virtual) switches ● Only members of a VLAN can see that VLAN’s traffic ● VLAN'S Types, Port-based VLANs ● MAC address based ● Protocol based VLANs ● Application based VLANs ●
  • 18. VIRTUAL TRUNKING PROTOCOL(VTP) VTP reduces the complexity of managing and monitoring VLAN networks ● VTP maintains VLAN configuration consistency across a common network administration domain ● VTP allows VLANs to be trunked over mixed media ● VTP provides for accurate tracking and monitoring of VLANs ● VTP provides “Plug-and-Play” configuration when adding new VLANs ● VTP switches operate in one of three modes: Server – default mode. Sends VLAN information to other switches. ● Client – receives VLAN information and forwards it to other switches. ● Transparent – forward VTP traffic but do not originate or use it. They can have their own VLANs, not shared with other switches. ●
  • 19. VTP(Continued) Command to set the VTP mode: Switch(vlan)#vtp {client | server | transparent} VTP Pruning-VTP pruning increases network available bandwidth by restricting flooded traffic to those trunk links that the traffic must use to reach the destination devices VLAN3 VLAN1 VLAN4 VLAN2
  • 20. SPANNING TREE PROTOCOL(STP) STP is a link management protocol that provides path redundancy while preventing undesirable loops in the network ● Spanning Tree Algorithm The switches use this algorithm to decide which ports should be shut down. Choose one switch to be “root bridge” ● Choose a “root port” on each other switch ● Choose a “designated port” on each segment. ● Close down all other ports. ●
  • 21.
  • 22. STP TYPES 1.CSTP-Comman STP 2.RSTP(Rapid STP)-RSTP(Rapid Spanning Tree Protocol-802.1w Standard): it is the enhanced protocol of STP,the main caracteristic of this one is Faster than STP (it converge in less than 6 seconds). 3.MST(Multiple STP)-allows multiple spanning tree domains to be configured in a network and on a switch.It is based on RSTP, and is backwards-compatible with RSTP and STP. 4.PVST(Per VLAN STP)- Maintains a spanning-tree instance for each VLAN configured in the network. 5.PVST+ -Per-VLAN Spanning Tree Plus is a Cisco proprietary spanning tree protocol based on STP.
  • 23. VIRTUAL PRIVATE NETWORK(VPN) Creates a secure tunnel over a public network ● Uses the Internet as the public backbone to access a ● secure private network Remote employees can access their office network ● VPN Protocols PPTP (Point-to-Point tunneling Protocol) ● L2F (Layer 2 Forwarding Protocol) ● L2TP (Layer 2 Tunneling Protocol) ● IPSec (Internet Protocol Security) ●
  • 24. IPsec(IP security) Provides Layer 3 security (RFC 2401) ● Transparent to applications (no need for integrated IPSec support) ● A set of protocols and algorithms used to secure IP data at the network layer ● Combines different components: Security associations (SA) ● Authentication headers (AH) ● Encapsulating security payload (ESP) ● Internet Key Exchange (IKE) ●
  • 25. Ipsec Modes Tunnel Mode Entire IP packet is encrypted and becomes the data component of a new (and larger) IP packet. ● Frequently used in an IPsec site-to-site VPN ● Transport Mode Ipsec header is inserted into the IP packet ● No new packet is created ● Works well in networks where increasing a packet’s size could cause an issue ● Frequently used for remote-access VPNs ●
  • 26.