This document provides an overview of networking fundamentals including IPv4 addressing, subnetting, routing protocols, and VPN technologies. Some key points:
- IPv4 addresses are 32-bit and come in binary and dotted-decimal notation. Subnetting allows dividing large address blocks into smaller subgroups using flexible net masks.
- Common routing protocols include RIP, EIGRP, OSPF, and BGP. Interior Gateway Protocols like RIP, EIGRP, and OSPF are used within autonomous systems, while exterior protocols like BGP route between autonomous systems.
- VPNs create secure tunnels over public networks using protocols like IPSec which provides encryption and authentication. IPSec can operate in
2. IPv4 Addressing
The IPv4 addresses are unique and universal.
An IPv4 address is 32 bits long.
The address space of IPv4 is 232 (4,294,967,296)
2 Types of IPv4 Notations.
Binary notation
Dotted-decimal notation
3. SUBNETTING AND VLSM
Subnetting
Divide a large address block into smaller subgroups.
Use of flexible net mask.
VLSM-Variable Length Subnet Mask
Technique that allows network administrators to
divide an IP address space into subnets of different
sizes, unlike simple same-size Subnetting.
Subnetting a subnet.
5. ROUTING PROTOCOLS
Routing Protocol
Protocols used by routers to make path determination choices
and to share those choices with other routers
Autonomous system (AS)
Uses Interior Gateway Protocols as routing protocols
A group of routers under the control of a single administration
Interior Gateway Protocols (IGPs)
Routing protocols used within an AS
Exterior Gateway Protocols (EGPs)
Routing protocols used to route information between multiple
autonomous systems
6. ROUTING PROTOCOLS(continued)
Examples of IGPs
Routing Information Protocol (RIP)
Enhanced Interior Gateway Routing Protocol
(EIGRP)
Open Shortest Path First (OSPF)
Example of EGP
Border Gateway Protocol (BGP)
7. ROUTING INFORMATION PROTOCOL(RIP)
Routing Information Protocol (RIP)
The easiest Interior Gateway Protocol to configure is RIPv1
A distance-vector routing protocol that broadcasts entire routing
tables to neighbors every 30 seconds
RIP has a maximum hop count of 15
As a result, RIP does not work in large internetworks
Enabling RIP Routing, the following commands are used,
Router(config)#router rip
Router(config-router)#network 192.168.1.0
To troubleshoot RIP Routing,
Router#show ip rip
8. ENHANCED INTERIOR GATEWAY PROTOCOL(EIGRP)
EIGRP is a Cisco-proprietary Hybrid routing protocol, incorporating
features of both Distance-Vector and Link-State routing protocols.
It sends routing updates only when network topology changes instead
of its entire routing table at regular intervals.
Its convergence is very fast
It supports classless inter-domain routing (CIDR) and variable-length
subnet masks
(VLSM)
EIGRP Major Drawback
It is Cisco proprietary - it does not inter-operate with other vendors'
devices. This, of course, is the big one. If you are working in a mixed
environment, EIGRP doesn't make as much sense
9. EIGRP(Continued)
EIGRP uses Diffusing Update Algorithm (DUAL)to determine
the best path among all feasible paths. DUAL also helps ensure
a loop-free routing environment.
EIGRP will form neighbor relationships with adjacent routers in
the same Autonomous System (AS)
EIGRP traffic is either sent as unicasts, or as multicasts on
address 224.0.0.10, depending on the EIGRP packet type.
Reliable Transport Protocol (RTP) is used to ensure delivery of
most EIGRP packets.
EIGRP packets are Hello,Update,Query,Reply and Ack
10. EIGRP(Continued)
EIGRP, much like OSPF, builds three separate tables,
Neighbor table list of all neighboring routers. neighbors must belong
to the same Autonomous System
Topology table list of all routes in the Autonomous System
Routing table contains the best route for each known network
Enabling EIGRP Routing, the following commands are used,
Router(config)#router eigrp 100
Router(config-router)#network 10.10.1.0
To troubleshoot EIGRP Routing,following commands are used,
Router#show ip route eigrp
Router#show ip eigrp neighbor
Router#show ip eigrp traffic
11. OPEN SHORTEST PATH FIRST(OSPF) PROTOCOL
OSPF is a standardized Link-State routing protocol,designed to
scale efficiently to support larger networks
Special routers (autonomous system boundary routers) or
backbone routers responsible to dissipate information about other
AS into the current system.
It minimizes routing table entries by dividing AS into areas
Fast convergence Protocol
Low bandwidth requirements
Supports different types of areas
Route summarization and authentication
Cisco's implementation is fully compliant with the specification
OSPF v2.
13. OSPF(Continued)
Enabling OSPF Routing, the following commands are used,
Router(config)#router ospf 1(process id)
Router(config-router)#network 192.168.1.1 0.255.255.255 area 1
To troubleshoot OSPF Routing,following commands are used,
Router# show ip route
Router# show ip ospf
Router# show ip ospf interface
Router# show ip ospf neighbor
Router# show ip ospf database
14. BORDERED GATEWAY PROTOCOL(BGP)
Routing Protocol used to exchange routing information between
Autonomous System
Exterior gateway protocol and path vector protocol
A Path vector protocol defines a route as a pairing between a
destination and the attributes of the path to that destination
Types of BGP Messages are Open,update, Keep-alive and
Notification
Two types of BGP
External BGP Peering (eBGP)
Internal BGP Peering (iBGP)
15. BGP(Continued)
Internal BGP (iBGP)
BGP peer within the same AS
Not required to be directly connected
iBGP speakers need to be fully meshed
They originate connected networks
They do not pass on prefixes learned from other iBGP
speaker
External BGP Peering (eBGP)
Between BGP speakers in different AS
Should be directly connected
Do not run an IGP between eBGP peers
17. SWITCHING IN VLAN'S
Switches also have enabled the creation of Virtual LANs (VLANs).
VLANs provide greater opportunities to manage the flow of traffic on the
LAN and reduce broadcast traffic between segments.
VLANs are groups of computers in an intelligent switched network.
Allow us to split switches into separate (virtual) switches
Only members of a VLAN can see that VLANs traffic
VLAN'S Types,
Port-based VLANs
MAC address based
Protocol based VLANs
Application based VLANs
18. VIRTUAL TRUNKING PROTOCOL(VTP)
VTP reduces the complexity of managing and monitoring VLAN networks
VTP maintains VLAN configuration consistency across a common network
administration domain
VTP allows VLANs to be trunked over mixed media
VTP provides for accurate tracking and monitoring of VLANs
VTP provides Plug-and-Play configuration when adding new VLANs
VTP switches operate in one of three modes:
Server default mode. Sends VLAN information to other switches.
Client receives VLAN information and forwards it to other switches.
Transparent forward VTP traffic but do not originate or use it. They can have their
own VLANs, not shared with other switches.
19. VTP(Continued)
Command to set the VTP mode:
Switch(vlan)#vtp {client | server | transparent}
VTP Pruning-VTP pruning increases network available
bandwidth by restricting flooded traffic to those trunk
links that the traffic must use to reach the destination
devices
VLAN3
VLAN1
VLAN4
VLAN2
20. SPANNING TREE PROTOCOL(STP)
STP is a link management protocol that provides path
redundancy while preventing undesirable loops in the
network
Spanning Tree Algorithm
The switches use this algorithm to decide which ports
should be shut down.
Choose one switch to be root bridge
Choose a root port on each other switch
Choose a designated port on each segment.
Close down all other ports.
22. STP TYPES
1.CSTP-Comman STP
2.RSTP(Rapid STP)-RSTP(Rapid Spanning Tree Protocol-802.1w
Standard): it is the enhanced protocol of STP,the main caracteristic
of this one is Faster than STP (it converge in less than 6 seconds).
3.MST(Multiple STP)-allows multiple spanning tree domains to be
configured in a network and on a switch.It is based on RSTP, and is
backwards-compatible with RSTP and STP.
4.PVST(Per VLAN STP)- Maintains a spanning-tree instance for
each VLAN configured in the network.
5.PVST+ -Per-VLAN Spanning Tree Plus is a Cisco
proprietary spanning tree protocol based on STP.
23. VIRTUAL PRIVATE NETWORK(VPN)
Creates a secure tunnel over a public network
Uses the Internet as the public backbone to access a
secure private network
Remote employees can access their office network
VPN Protocols
PPTP (Point-to-Point tunneling Protocol)
L2F (Layer 2 Forwarding Protocol)
L2TP (Layer 2 Tunneling Protocol)
IPSec (Internet Protocol Security)
24. IPsec(IP security)
Provides Layer 3 security (RFC 2401)
Transparent to applications (no need for integrated IPSec
support)
A set of protocols and algorithms used to secure IP data at the
network layer
Combines different components:
Security associations (SA)
Authentication headers (AH)
Encapsulating security payload (ESP)
Internet Key Exchange (IKE)
25. Ipsec Modes
Tunnel Mode
Entire IP packet is encrypted and becomes the data component
of a new (and larger) IP packet.
Frequently used in an IPsec site-to-site VPN
Transport Mode
Ipsec header is inserted into the IP packet
No new packet is created
Works well in networks where increasing a packets size could
cause an issue
Frequently used for remote-access VPNs