Networking Basics
Networking Basics
• A computer network is a system of interconnected devices (like computers, servers, routers, and switches) that communicate wi th
each other to share data, resources, and services.
• Networks range from small, local networks (like a home Wi-Fi network) to vast, global networks (like the internet).
• These connections can be wired (using cables like Ethernet) or wireless (using radio waves or infrared signals).
• Here are the main types of networks:
○ Local Area Network (LAN): A small, localized network, such as within a home, office, or school.
○ Wide Area Network (WAN): Covers a large geographic area, such as connecting multiple offices in different cities.
○ Metropolitan Area Network (MAN): Spans a city or large campus, typically larger than a LAN but smaller than a WAN.
○ Personal Area Network (PAN): A small network for personal devices, like connecting a phone to a laptop via Bluetooth.
○ Virtual Private Network (VPN): Provides a secure connection over the internet, often used to access a private network
remotely.
Networks use various protocols, like TCP/IP, to define rules for communication. A network’s key components include routers,
switches, hubs, and access points—all of which help manage data flow across devices.
Network Types:
• LAN (Local Area Network): Limited to a small area (e.g., office, home).
• WAN (Wide Area Network): Covers larger areas (e.g., cities, countries). The internet is the largest WAN.
• PAN (Personal Area Network): Small network for personal devices.
• MAN (Metropolitan Area Network): Spans a city or campus.
• WLAN (Wireless LAN): Wireless version of a LAN (e.g., Wi-Fi).
Network Devices
• Router: Connects different networks and directs data packets.
• Switch: Connects devices within a single network, forwarding data based on MAC addresses.
• Hub: Basic device that connects multiple devices in a network (all data is sent to every connected device).
• Access Point (AP): Provides wireless connectivity to devices.
• Firewall: Secures a network by controlling incoming and outgoing traffic based on security rules.
Network Topologies
• Bus: All devices connected to a single cable; easy to set up but can slow down with traffic.
IP Addressing
• IP Address: Unique identifier for each device on a network, either IPv4 (32-bit) or IPv6 (128-bit).
• Public vs. Private IP Addresses:
○ Public: Globally unique, routable over the internet.
○ Private: Used within a local network and not routable over the internet.
• Subnetting: Dividing a network into smaller sub-networks, enabling better traffic management and security.
• Subnet Mask: Defines the network and host portions of an IP address.
MAC Address
• MAC (Media Access Control) Address: Unique physical address for each network interface card (NIC); essential in data link layer
functions for device identification on local networks.
1. IP Address
An Internet Protocol (IP) address is a unique numerical identifier assigned to devices on a
network. It can be IPv4 (e.g., 192.168.1.1) or IPv6 (e.g., 2001:0db8::ff00:0042:8329).
2. Subnet
A subdivision of an IP network that allows logical segmentation of a network into smaller parts
for efficient management. Each subnet has its own subnet mask.
3. Default Gateway
The device (usually a router) that connects a local network to external networks or the
internet.
4. MAC Address
A Media Access Control (MAC) address is a unique hardware identifier for network devices,
typically used at the Data Link Layer (Layer 2) of the OSI model.
8. Routing
The process of selecting a path for traffic to travel across a network, typically performed by
routers.
11. Protocol
A set of rules and conventions for communication between network devices (e.g., TCP, UDP,
12. Switch
A networking device that operates at Layer 2 (Data Link) of the OSI model, used to connect
devices within a LAN and forward traffic based on MAC addresses.
13. Router
A device that operates at Layer 3 (Network) of the OSI model, used to connect multiple
networks and forward packets based on IP addresses.
14. Firewall
A security device or software that monitors and controls incoming and outgoing network traffic
based on predefined security rules.
15. Bandwidth
The maximum amount of data that can be transmitted over a network in a given amount of
time, typically measured in bits per second (bps).
16. Latency
The time it takes for a data packet to travel from the source to the destination across a
network.
26. Ethernet
A family of wired networking technologies used in LANs. Ethernet standards are defined by
IEEE 802.3.
28. Ping
A network utility tool used to test connectivity between devices and measure round-trip time
for packets.
29. Traceroute
A diagnostic tool that maps the path packets take to reach their destination, showing
intermediate routers.
37. Packet
A unit of data formatted for transmission across a network, consisting of headers
(source/destination) and payload.
39. Segmentation
The process of dividing data into smaller units (packets/frames) to optimize transmission and
improve error handling.
50. Tunneling
The process of encapsulating one protocol within another to secure or facilitate
communication over incompatible networks.
OSI
• Open System Interconnection.
• OSI is a conceptual framework that standardizes the functions of a communication system into 7 layers.
• It helps in designing, troubleshooting and understanding networks.
In short,
Hub
• Purpose:
○ A basic device that connects multiple devices in a network and forwards data to
all connected devices.
○ Operates at the Physical Layer (Layer 1).
• Working:
○ Does not filter data or maintain a MAC address table.
○ Sends data to all ports, resulting in higher collision rates.
• Usage:
○ Rarely used in modern networks due to inefficiency.
○ Early network setups (now replaced by switches).
• Common Models:
○ Netgear: DS108.
○ TP-Link: TL-SF1008D (unmanaged).
Switch
• Purpose:
○ Connects devices within a LAN and forwards traffic based on MAC addresses.
○ Operates at the Data Link Layer (Layer 2) and sometimes at Layer 3 for advanced
switches.
• Working:
○ Maintains a MAC address table to direct frames to the correct port.
○ Prevents broadcast storms using Spanning Tree Protocol (STP).
○ Supports VLANs for network segmentation.
• Architecture:
○ Backplane: High-speed circuitry for data switching.
○ Ports: Gigabit Ethernet, 10G Ethernet, or fiber ports.
○ Power Supply: Supports PoE (Power over Ethernet) for powering devices like IP
cameras.
• Usage:
○ Connecting computers, printers, and servers in LANs.
○ Creating isolated virtual networks (VLANs).
○ Aggregating access switches in larger networks.
• Common Models:
○ Cisco: Catalyst 9200, Catalyst 9300, Nexus 9000 series.
○ Arista: 7050X, 7500R series.
○ HPE Aruba: 2930M, 5400R series.
○ Juniper: EX series (e.g., EX3400, EX4300).
Router
• Purpose:
○ Connects multiple networks and routes data packets based on their IP addresses.
○ Operates at the Network Layer (Layer 3) of the OSI model.
○ Enables communication between devices on different subnets.
• Working:
○ Uses a routing table to determine the best path for data.
○ Employs routing protocols like OSPF, EIGRP, BGP to dynamically update routes.
Performs NAT (Network Address Translation) for IP address management.
New Section 1 Page 11
○
○ Performs NAT (Network Address Translation) for IP address management.
• Architecture:
○ Control Plane: Handles routing decisions (via routing protocols).
○ Data Plane: Forwards packets based on routing decisions.
○ Interfaces: Ethernet, serial, or fiber connections.
• Usage:
○ Internet connectivity for enterprises.
○ Routing traffic between branch offices and data centers.
○ Segmenting large networks into subnets.
• Common Models:
○ Cisco: ISR 1100, ISR 4000, ASR 1000 series.
○ Juniper: MX Series (e.g., MX480, MX960).
○ MikroTik: CCR (Cloud Core Routers).
○ HPE/Aruba: MSR Series
Firewall
• Purpose:
○ Monitors and controls incoming and outgoing network traffic based on security
rules.
○ Operates at Layer 4 (Transport) and can also inspect higher layers (Layer 7).
• Working:
○ Packet filtering (stateless or stateful).
○ Deep Packet Inspection (DPI) for Layer 7 security.
○ Works as a physical appliance or software-based firewall.
• Usage:
○ Enforcing security policies in enterprise environments.
○ Protecting sensitive data in DMZs (Demilitarized Zones).
○ Blocking malicious traffic.
• Common Models:
○ Cisco: ASA 5500-X, Firepower series.
○ Fortinet: FortiGate series.
○ Palo Alto: PA-220, PA-3200 series.
○ Sophos: XGS series.
Modem
• Purpose:
Converts digital data to analog signals and vice versa for internet access.
Load Balancer
• Purpose:
○ Distributes traffic among multiple servers to ensure high availability and
performance.
○ Operates at Layer 4 (Transport) or Layer 7 (Application).
• Working:
○ Uses algorithms like round-robin, least connections, and weighted distribution.
○ Handles SSL termination and session persistence.
• Usage:
○ Web applications with high traffic.
○ Ensuring redundancy for server farms.
• Common Models:
○ F5 Networks: BIG-IP series.
○ Citrix: ADC (formerly NetScaler).
○ AWS: Elastic Load Balancer (ELB).
Gateway
• Purpose:
○ Acts as a bridge between two networks using different protocols.
○ Converts data formats for compatibility.
• Usage:
○ IoT environments (protocol translation).
○ Connecting enterprise networks to cloud services.
• Common Models:
○ Cisco: Meraki MX series.
○ Fortinet: Secure SD-WAN gateways.
Proxy Server
What is an IP Address?
• An IP address (Internet Protocol address) is a unique identifier assigned to a device on
a network to enable communication.
• It serves two key purposes:
○ Identification: Identifies the device on the network.
○ Location Addressing: Helps route data to and from the device.
• IP addresses exist in two main versions: IPv4 and IPv6.
IPv4 Structure:
Each IPv4 address consists of:
• Network ID: Identifies the network to which the device belongs.
• Host ID: Identifies the specific device (host) within that network.
Example: In 192.168.1.1:
• Network ID: 192.168.1
• Host ID: 1
• Subnetting is the process of dividing a larger network (IP range) into smaller, more
manageable segments called subnets.
• This improves efficiency, security, and performance by reducing congestion and isolating
traffic.
Why Subnetting?
• Efficient IP Utilization: Prevents wastage of IP addresses by assigning only the required
range to each subnet.
• Improved Network Performance: Reduces broadcast traffic, as broadcasts are limited to
individual subnets.
• Enhanced Security: Segments networks for better traffic control and isolation.
• Simplified Management: Makes large networks easier to troubleshoot and manage.
Definition
• A switch is a network device that operates at the data link layer (Layer 2) of the OSI
model. It is used to connect multiple devices within the same network, allowing them
to communicate efficiently.
Functionality
• Frame Forwarding: Switches receive data frames and forward them to the appropriate
destination devices based on MAC (Media Access Control) addresses.
• MAC Address Table: Switches maintain a MAC address table (or CAM table) that maps
MAC addresses to physical ports. This table is used to determine where to forward
incoming frames.
• Collision Domains: Each port on a switch represents a separate collision domain,
reducing collisions and improving overall network performance compared to hubs.
Types of Switches
• Unmanaged Switches: Simple, plug-and-play devices with no configuration options.
They are suitable for small networks or home use.
• Managed Switches: These switches offer advanced features like VLANs, QoS (Quality of
Service), SNMP (Simple Network Management Protocol), and more. They are suitable
for larger and more complex networks.
• Layer 3 Switches: These switches can perform both Layer 2 switching and Layer 3
routing functions. They are used in enterprise networks to enable inter-VLAN routing
and advanced routing protocols.
Switching Methods
• Store-and-Forward: The switch receives the entire frame, checks it for errors, and then
forwards it. This method ensures data integrity but introduces a small delay.
• Cut-Through: The switch starts forwarding the frame as soon as it reads the
destination MAC address, resulting in lower latency but potentially forwarding
corrupted frames.
• Fragment-Free: A compromise between store-and-forward and cut-through, this
method reads the first 64 bytes of the frame (where most errors occur) before
forwarding it.
Benefits of Switching
• Improved Performance: Switches reduce collisions and increase bandwidth by creating
dedicated communication paths between devices.
• Enhanced Security: Managed switches offer features like VLANs, port security, and
access control lists (ACLs) to enhance network security.
• Scalability: Switches can easily be added to expand the network and connect
additional devices.
Verify:
Verify:
On PC/Laptop
Benefits of VLANs:
• Improved Security: By segmenting the network, sensitive data can be isolated from
the rest of the network, reducing the risk of unauthorized access.
• Enhanced Performance: VLANs reduce the size of broadcast domains, decreasing
unnecessary traffic and improving overall network performance.
• Simplified Management: VLANs make it easier to manage and configure the network
by logically grouping devices based on function, department, or application.
• Flexibility: VLANs provide the flexibility to move devices and add or remove segments
without changing the physical network layout.
Types of VLANs:
• Default VLAN: All ports are initially part of the default VLAN (usually VLAN 1).
• Data VLAN: Used to separate user-generated data traffic. Each VLAN can represent
different departments or groups.
• Voice VLAN: Dedicated to voice traffic from IP phones, ensuring prioritization and
minimal delay.
• Management VLAN: Used for network device management, keeping management
traffic isolated.
• Native VLAN: Used for untagged traffic on a trunk port (default is VLAN 1, but it can be
changed).
• Guest VLAN: Provides internet access to visitors without granting access to the internal
network.
• Security VLAN: Segregates and protects sensitive data and devices.
VLAN Tagging:
• IEEE 802.1Q: The most common VLAN tagging standard. It inserts a VLAN tag into the
Ethernet frame header, allowing devices to understand VLAN membership.
Inter-VLAN Routing:
To allow communication between VLANs, inter-VLAN routing is required. This can be
achieved using:
• Router-on-a-Stick: A single router interface configured with sub interfaces for each
VLAN.
• Layer 3 Switch: A switch with routing capabilities that can handle inter-VLAN routing
more efficiently.
VLAN ranges
• VLAN 0, 4095: These are reserved VLAN which cannot be seen or used.
• VLAN 1: It is the default VLAN of switches. By default, all switch ports are in VLAN. This
VLAN can’t be deleted or edit but can be used.
• Trunk Link
○ It connects 2 or more switches together.
○ It allows 2 VLANs of different switches to communicate to each other.
To create VLAN:
Home-office VLAN:
Verify:
How it Works:
• Single Physical Interface: The router uses one physical interface connected to a switch.
• Sub interfaces: The physical interface is divided into multiple sub interfaces, each
representing a VLAN. These sub interfaces are configured with unique IP addresses
corresponding to their VLANs.
• 802.1Q Trunking: The switch port connected to the router is configured as a trunk port
using 802.1Q encapsulation. This allows the trunk port to carry traffic for multiple
VLANs and tag frames with VLAN IDs.
• Routing: The router performs routing between the sub interfaces, enabling
communication between devices in different VLANs.
Before configuring:
STP Operations:
• Root Bridge Election: All switches exchange BPDUs to elect the root bridge. The switch
with the lowest Bridge ID becomes the root bridge.
• Path Selection: Each switch calculates the best path to the root bridge based on the
lowest path cost. The ports that form the shortest path to the root bridge become the
root ports.
• Designated Ports: For each network segment, the switch with the lowest path cost to
the root bridge has its port designated as the designated port. This port forwards
traffic towards the root bridge.
• Blocking Ports: To prevent loops, some ports are placed in a blocking state. These
ports do not forward traffic but can still receive BPDUs.
• Port States: STP ports transition through several states—Blocking, Listening, Learning,
Forwarding, and Disabled—based on their role in the network.
Enhancements to STP:
• RSTP (Rapid Spanning Tree Protocol): IEEE 802.1w, an evolution of STP, provides faster
convergence and improved performance.
• MSTP (Multiple Spanning Tree Protocol): IEEE 802.1s, allows multiple spanning trees to
coexist, optimizing network resources and traffic flow.
• PVST+ (Per VLAN Spanning Tree Plus): Cisco proprietary protocol that runs a separate
instance of STP for each VLAN, providing VLAN-based load balancing.
After backup, make some changes on the switch (say changing the IP address on VLAN 1)
• A router is a network device that forwards data packets between computer networks.
• Routers play a critical role in directing traffic on the internet and within private
networks.
• They work at the network layer (Layer 3) of the OSI model and use IP addresses to
determine the best path for forwarding packets.
Importance of Routers
• Connectivity to ISP: Routers connect local networks to the Internet Service Provider
(ISP), enabling internet access for all devices on the network. They handle the public IP
address provided by the ISP and manage the distribution of internet traffic.
• Connecting Switches and Other Routers: Routers link multiple switches and other
routers within a network, creating a cohesive and efficient communication system.
They ensure data packets are routed correctly between different segments of the
network.
Connectivity to ISP
• WAN Interface: The router's Wide Area Network (WAN) interface connects to the ISP's
modem or external router. This interface uses a public IP address provided by the ISP.
• DHCP: The router typically receives an IP address dynamically from the ISP using the
Dynamic Host Configuration Protocol (DHCP).
• PPP (Point-to-Point Protocol): Some routers use PPP for authentication and
communication with the ISP.
• IP routing is the process of forwarding data packets from one network to another
based on their IP addresses.
• Routers use routing tables and protocols to determine the best path for packets to
reach their destination.
Key Concepts:
• Routing Table: A data structure stored in a router that lists the routes to different
network destinations. It includes information such as destination IP addresses, subnet
masks, next-hop addresses, and interface information.
• Routing Protocols: Protocols used by routers to dynamically exchange routing
information and update their routing tables. Common routing protocols include:
○ RIP (Routing Information Protocol): A distance-vector protocol that uses hop
count as a metric.
○ OSPF (Open Shortest Path First): A link-state protocol that uses cost as a metric
and converges quickly.
○ EIGRP (Enhanced Interior Gateway Routing Protocol): A Cisco proprietary
protocol that combines the best features of distance-vector and link-state
protocols.
○ BGP (Border Gateway Protocol): A path-vector protocol used for routing between
different autonomous systems on the internet.
• Static Routing: Manually configured routes that do not change unless manually
updated. Suitable for small networks or specific routing requirements.
• Dynamic Routing: Automatically updated routes based on network topology changes,
using routing protocols.
Routing Process:
• Packet Reception: The router receives a data packet on one of its interfaces.
• Destination IP Address: The router examines the destination IP address in the packet
header.
• Routing Table Lookup: The router searches its routing table for the best match to the
destination IP address.
• Forwarding Decision: Based on the routing table entry, the router determines the
next-hop address and the outgoing interface.
• Packet Forwarding: The router forwards the packet to the next-hop router or the
destination device through the appropriate interface.
Routing Protocol:
• Routing protocols are used by routers to dynamically exchange routing information
and update their routing tables.
• They help routers determine the best path for data packets to reach their destination.
• There are three main categories of routing protocols:
○ Distance-vector,
○ Link-state, and
○ Path-vector.
• Here's an overview of the different types of routing protocols:
• Routing metrics are values used by routing protocols to determine the best path for
data packets to travel from a source to a destination.
• Different routing protocols use different metrics, and understanding these metrics
helps in optimizing network performance and reliability.
• Bandwidth:
○ Definition: The data capacity of a link, typically measured in bits per second
(bps).
○ Used by: EIGRP (Enhanced Interior Gateway Routing Protocol).
○ Characteristics: Higher bandwidth links are preferred, as they can handle more
traffic.
• Delay:
○ Definition: The time it takes for a packet to travel from the source to the
destination, typically measured in milliseconds (ms).
○ Used by: EIGRP.
○ Characteristics: Routes with lower delay are preferred, as they provide faster
delivery of packets.
• Cost:
○ Definition: An arbitrary value assigned to links, often based on link speed or
administrative preferences.
○ Used by: OSPF (Open Shortest Path First), IS-IS (Intermediate System to
Intermediate System).
○ Characteristics: Administrators can assign costs to influence routing decisions,
with lower costs being preferred.
• Reliability:
○ Definition: The likelihood of a link failure, typically represented as a percentage
or a number between 0 and 255.
○ Used by: EIGRP.
○ Characteristics: More reliable links are preferred, as they provide more stable
connections.
• Load:
○ Definition: The amount of traffic currently being handled by a link, often
represented as a percentage or a value between 0 and 255.
○ Used by: EIGRP.
○ Characteristics: Links with lower load are preferred, as they have more available
capacity.
• Metric Combinations:
○ Definition: Some protocols combine multiple metrics to calculate a composite
metric.
○ Used by: EIGRP combines bandwidth, delay, load, and reliability into a composite
metric.
○ Characteristics: Provides a more comprehensive evaluation of link quality by
considering multiple factors.
Routing involves many specific terms and concepts. Understanding these terminologies is
essential for grasping how routers function and how they make decisions about data packet
forwarding. Here are some key routing terminologies:
1. Router: A network device that forwards data packets between different networks
based on their IP addresses.
2. Routing Table: A data structure in a router that lists routes to various network
destinations, including information on how to reach them.
3. Static Routing: A type of routing where routes are manually configured and do not
change unless manually updated.
4. Dynamic Routing: Routing that uses algorithms and protocols to automatically update
routing tables based on changes in the network topology.
5. Routing Protocol: A protocol used by routers to exchange routing information and
update their routing tables. Examples include RIP, OSPF, EIGRP, and BGP.
6. Hop: A single step from one router to the next in the path from source to destination.
7. Hop Count: A metric used by some routing protocols to measure the number of hops
(routers) a packet must traverse to reach its destination.
8. Next Hop: The next router or gateway to which a data packet is forwarded along its
path to the destination.
9. Subnet: A logically segmented portion of a larger network, often created to improve
performance and manageability.
10. Subnet Mask: A 32-bit number used to differentiate the network portion of an IP
address from the host portion.
11. Autonomous System (AS): A collection of IP networks and routers under the control of
a single organization that presents a common routing policy to the internet.
12. Interior Gateway Protocol (IGP): A type of routing protocol used for routing within an
autonomous system. Examples include OSPF and EIGRP.
13. Exterior Gateway Protocol (EGP): A type of routing protocol used for routing between
different autonomous systems. The primary EGP is BGP.
14. Administrative Distance (AD): A metric used to rate the trustworthiness of a routing
information source. Lower values indicate higher trustworthiness.
15. Metric: A value used by routing protocols to determine the best path for data packets.
Metrics can include hop count, bandwidth, delay, reliability, and load.
16. Convergence: The process by which all routers in a network come to agree on the best
routes after a change in the network topology.
17. Default Route: A route used when there is no specific route to the destination in the
routing table. Often represented as 0.0.0.0/0.
18. Route Redistribution: The process of sharing routes between different routing
protocols within a network.
19. Link-State Routing Protocol: A type of routing protocol that maintains a complete map
of the network topology and calculates the best path using algorithms like Dijkstra's.
Examples include OSPF and IS-IS.
20. Distance-Vector Routing Protocol: A type of routing protocol that calculates the best
path based on the distance (number of hops) and direction. Examples include RIP and
IGRP.
21. Path-Vector Routing Protocol: A type of routing protocol used for inter-domain
routing that maintains the path information. Example: BGP.
22. Route Flapping: A condition where routes are repeatedly added and removed from
• Metric:
• Definition: A metric is a value used by routing protocols to determine the best path to
a destination. Metrics can include various factors like hop count, bandwidth, delay,
and more.
• Purpose: Metrics help routers select the most efficient route for data packets.
• Hop:
• Definition: A hop refers to the movement of a data packet from one router to the next
in its path from source to destination.
• Hop Count: The hop count is a metric used by distance-vector protocols (like RIP) to
measure the number of hops to the destination. Each hop is counted as one.
• Example: If a data packet traverses three routers to reach its destination, the hop
count is three.
Static routing is a type of network routing method where the routes are manually
configured by a network administrator.
Unlike dynamic routing, which uses protocols to discover routes automatically, static routing
requires the manual entry of route information into the routing table.
• Default routing is a type of static routing that directs packets with destinations that are
not explicitly listed in the routing table to a specific gateway or router.
• It serves as a catch-all route when no other specific route matches the destination IP
address.
• Default routes are crucial for simplifying routing tables, especially in scenarios where
specifying routes to every possible destination would be impractical.
To configure a default route on a Cisco router, you use the following command:
Router(config)# ip route 0.0.0.0 0.0.0.0 [next-hop IP address or exit interface]
Example Scenario:
Imagine you have a network with three routers: R1, R2, and R3. R1 is connected to the
internet, and R2 and R3 are internal routers.
To configure a default route on R2 and R3 to send all non-local traffic to R1, you would use
the following commands:
• On R2:
○ R2(config)# ip route 0.0.0.0 0.0.0.0 [R1's IP address]
• On R3:
○ R3(config)# ip route 0.0.0.0 0.0.0.0 [R1's IP address]
• Dynamic routing is a method of routing that uses algorithms and protocols to automatically
update routing tables based on changes in the network topology.
• Unlike static routing, which requires manual configuration, dynamic routing protocols
continuously monitor the network and adjust routes to ensure efficient and reliable data
packet delivery.
Key Concepts:
1. Dynamic Routing Protocols: Protocols used by routers to exchange routing information and
update their routing tables dynamically. Common protocols include RIP, OSPF, EIGRP, and BGP.
2. Routing Algorithms: Algorithms used by dynamic routing protocols to calculate the best path
for data packets. These include distance-vector, link-state, and path-vector algorithms.
3. Convergence: The process by which all routers in a network agree on the best routes after a
change in the network topology. Faster convergence improves network stability and
performance.
4. Metrics: Values used by routing protocols to determine the best path. Metrics can include hop
count, bandwidth, delay, load, reliability, and more.
Example Configuration:
• The Routing Information Protocol (RIP) is one of the oldest and simplest dynamic
routing protocols used in computer networks.
• Key Features of RIP:
○ Distance Vector Protocol: RIP uses distance vectors to determine the best path
to a destination network.
○ Hop Count Metric: It uses hop count as the metric for path selection, with a
maximum of 15 hops allowed.
○ Periodic Updates: RIP routers broadcast their entire routing table to their
neighbors every 30 seconds.
○ Limitations: Due to its simplicity, RIP is generally used in small to medium-sized
networks and is not suitable for larger networks.
• RIP has two main versions used in networking:
○ RIP Version 1 (RIP v1)
▪ Classful Routing: RIP v1 is a classful routing protocol, which means it does
not send subnet mask information in its updates.
▪ Broadcast Updates: It sends updates as broadcast packets
(255.255.255.255).
▪ No VLSM Support: RIP v1 does not support Variable Length Subnet Masks
(VLSM).
○ RIP Version 2 (RIP v2)
▪ Classless Routing: RIP v2 is a classless routing protocol, which means it
includes subnet mask information in its updates, supporting VLSM.
▪ Multicast Updates: It sends updates as multicast packets (224.0.0.9),
reducing unnecessary traffic.
▪ Authentication: RIP v2 supports route authentication to enhance security.
Configuring RIPv2
Open Shortest Path First (OSPF) is a widely used link-state routing protocol designed for
larger and more complex networks compared to simpler protocols like RIP.
Advantages of OSPF:
• Scalability: OSPF is suitable for large and complex networks due to its hierarchical
design.
• Efficiency: The use of areas and DR/BDR reduces routing overhead.
• Quick Convergence: OSPF quickly adapts to network changes, minimizing downtime.
• Security: OSPF supports authentication to ensure the integrity of routing information.
Configuring OSPF:
EIGRP Metrics:
EIGRP uses a composite metric based on several factors, including:
• Bandwidth: The lowest bandwidth along the path.
• Delay: The cumulative delay along the path.
• Load: The load on the link.
• Reliability: The reliability of the link.
• MTU: The maximum transmission unit size (though MTU is not used in metric
calculations by default).
Advantages of EIGRP:
• Efficiency: EIGRP uses incremental updates, reducing bandwidth usage compared to
protocols that send full routing tables.
• Scalability: It’s well-suited for large enterprise networks.
• Flexibility: Supports various network topologies and can integrate with other routing
protocols.
• Resiliency: Provides rapid convergence and route redundancy.
Syntax:
Configuring EIGRP:
Steps:
1. Becoming neighbor.
2. Exchange routing info.
3. Choose best route.
Access Control Lists (ACLs) are used in networking to filter traffic and provide security for network devices. They can control both inbound
and outbound traffic based on a set of criteria, such as IP addresses, protocols, and port numbers.
Types of ACLs
1. Standard ACLs
2. Extended ACLs
3. Named ACLs
1. Standard ACLs
Standard ACLs filter traffic solely based on the source IP address. They are simple but not as flexible as extended ACLs because they
cannot filter traffic based on other criteria like destination IP address, protocol type, or port number.
• Number Range: 1-99 and 1300-1999
• Syntax:
Router(config)# access-list [access-list-number] permit|deny [source-IP-address] [wildcard-mask]
Router(config-if)# exit
2. Extended ACLs
Extended ACLs provide more granular control compared to standard ACLs. They can filter traffic based on both source and destination IP
addresses, protocol type (e.g., TCP, UDP, ICMP), and port numbers.
• Number Range: 100-199 and 2000-2699
• Syntax:
Router(config)# access-list [access-list-number] permit|deny [protocol] [source-IP-address] [source-wildcard-mask]
[destination-IP-address] [destination-wildcard-mask] [operator] [port-number]
Router(config-if)# exit
3. Named ACLs
Named ACLs are a more flexible way of defining ACLs. Instead of using a numbered ACL, you can assign a descriptive name, making it
easier to manage and understand.
• Syntax:
Router(config)# ip access-list standard|extended [ACL-name]
Router(config-if)# exit
Summary
• Standard ACLs: Simple, filters by source IP address only.
• Extended ACLs: More granular, filters by source and destination IP, protocol, and port.
• Named ACLs: More flexible, easier to manage using descriptive names.
• IPv6 (Internet Protocol version 6) is the most recent version of the Internet Protocol
(IP) designed to replace IPv4.
• It was developed to address the limitations of IPv4, primarily the exhaustion of IP
addresses. Here's an in-depth look at IPv6:
Transition Mechanisms:
To ensure a smooth transition from IPv4 to IPv6, several mechanisms are used:
1. Dual Stack: Devices run both IPv4 and IPv6 simultaneously, allowing for gradual
migration.
2. Tunneling: IPv6 packets are encapsulated within IPv4 packets to traverse IPv4
networks.
○ 6to4: A transition mechanism that allows IPv6 packets to be transmitted over an
IPv4 network.
○ Teredo: A tunnelling protocol that enables IPv6 connectivity for devices behind
IPv4 NATs.
3. Translation: Techniques like NAT64 translate IPv6 packets to IPv4 packets and vice
Benefits of IPv6:
• Scalability: Vast address space supports the growing number of internet-connected
devices.
• Simplicity: Simplified header and no need for NAT streamline network operations.
• Security: Built-in IPsec ensures secure communication.
• Efficiency: Improved routing efficiency and multicast support optimize network
performance.