SlideShare a Scribd company logo
1 of 30
Networking
Essentials
Created by:
Vikas Gupta (CCNA),
Network Support Engineer,
Pune, India.
Network: Collection of inter-connected computer system.
Networking: Inter connection between the two or more computers are called the
networking. Using three types of networkare Intranet, Internet and Extranet (Eg. LAN, WAN
& MAN)
Bandwidth: Every line has an upper limit and a lower limit on the frequency of signals it
can carry. This limited range is called the bandwidth. Every line has a capacity of transmission
of data; the maximum amount of data that can be transferred in a single line is called
Bandwidth.
Collision Domain: Collision domain is an Ethernet term used to describe a network
collection of devices in which one particular device sends a packet on a network segment,
forcing every other device on that same segment to pay attention toit
Broadcast Domain: On a broadcast domain, a set of all devices on a network segment
hears all broadcasts sent on that segment
Interconnecting Devices
Bridges:
ī‚ˇ Breakup the collision domain in LAN (Per port collision)
ī‚ˇ Same as switch
ī‚ˇ Bridges had only 2 to 4 port
Hub:
ī‚ˇ Represent one collision domain and one broadcast domain
ī‚ˇ It create congestion to Ethernet network
ī‚ˇ Speed is divided with ports
ī‚ˇ It is dumb to identify devices in a network
Switch:
ī‚ˇ Provide more bandwidth to user
ī‚ˇ Single broadcast domain
ī‚ˇ By default switch break up the collision domain
ī‚ˇ Each and every port in switch represent its own collision domain
ī‚ˇ They uses the Hardware address (MAC address) to filter the network
Router:
ī‚ˇ Router provide internetwork and provide communication to WAN
ī‚ˇ It Break up broadcast domain & collision domain as well
ī‚ˇ They don’t forward broadcast by default
ī‚ˇ They filter the network based on logical address in Network Layer (IP address)
ī‚ˇ Packet filtering (By using Access list)
ī‚ˇ Packet Switching
ī‚ˇ Path selection
TCP/IP Network Model
TCP/IP (Transmission Control Protocol / Internet Protocol):
ī‚ˇ It is occasionally called as DoD Model (Department of Defense) due to foundational
influence of ARPANET in 1970’s
ī‚ˇ TCP/IP come into existent before OSI model
ī‚ˇ TCP/IP is based on protocol not a layer based model
ī‚ˇ TCP/IP model is created on the basis of protocol
ī‚ˇ TCP/IP provide connectionless service in Network layer
ī‚ˇ Both connection oriented and connectionless in Transport Layer
Fig.: TCP/IP Model with Protocol in each layer
Application & Services
Telnet (Teletype Network):
ī‚ˇ Telnet is chameleon (Changeable) of protocol
ī‚ˇ It’s specialty is terminal emulation
ī‚ˇ It allow a user on remote client machine called tenet client, to access the resources of
another machine (Telnet Server)
ī‚ˇ This project is actually software image-a virtual terminal that can interact with chosen
remote host
ī‚ˇ This terminal gives option to User to select the menu and application on server
ī‚ˇ All data even login data is sent in clear text format, this can be a security risk
ī‚ˇ For telnetting it necessary to have telnet is enable in both transmitting and receiving
party
FTP (File Transfer Protocol):
ī‚ˇ It just not a protocol it’s a Program so that user can perform operation on transfer
ī‚ˇ FTP allows access to both file and directory and operation to relocating in other place
ī‚ˇ FTP work with Telnet to login into FTP server
ī‚ˇ After login User subjected for authentication and probably User name and Password
enable by administrator
ī‚ˇ FTP only access the file and folder it cannot executing the file
TFTP (Trivial File Transfer Protocol):
ī‚ˇ TFTP having less feature than FTP it is stripped-down
ī‚ˇ It is very easy to use and fast too
ī‚ˇ Can Use only for send and receive
ī‚ˇ No authentication, so it is insecure
NFS (Network File System):
ī‚ˇ NFS is a jewel of protocol for file transfer
ī‚ˇ If NT is the Server and Unix client login into the NT then NT use the portion of RAM on
NT server to transparently store the Unix file so that Unix user can use the file it
format
ī‚ˇ Unix user and NT user can access the file in their normal file system
SMTP (Simple Mail Transfer Protocol):
ī‚ˇ SMTP use to send mail and POP3 use to receive the mail
ī‚ˇ Uses spooled or queued, method of mail delivery
ī‚ˇ Once the message is sent to destination then mail are spooled to a device-disk and
regularly check the queue for message, if destination found then sends to it
LPD (Line Printer Daemon):
ī‚ˇ LPD design for Printer Sharing
ī‚ˇ LPD with LPR (Line Printer) allow to spool and sent to network printer using TCP/IP
X Window:
ī‚ˇ Design for client/server operation
ī‚ˇ It define a protocol to design client/server application on GUI
ī‚ˇ The idea is to allow program called client to rum computer on Server
SNMP (Simple Network Management):
ī‚ˇ Collect and manipulate network information
ī‚ˇ This protocol can also stand as watchdog over the network, quickly notifying manager
of any sudden change of event into network
ī‚ˇ This also called as agent, when aberration occur
DNS (Domain Name System):
ī‚ˇ DNS resolve host name – specifically, internet name such as www.vikk.com
ī‚ˇ If you don’t have DNS then you type IP address to communicate with other
ī‚ˇ DNS allow to use domain name to specify an IP address, and can change IP address no
one will know the difference
ī‚ˇ DNS is use to resolve FQDN (Fully Qualified Domain Name) such as www.vik.king.com.
DHCP (Dynamic Host Configuring Protocol):
ī‚ˇ DHCP assign IP address to Host
ī‚ˇ All type of devices can be use for DHCP even Cisco Router
ī‚ˇ There is lots of information provided by DHCP if host requesting to DHCP and that are
o IP address
o Subnetmask
o Domain name
o Default gateway
o DNS
o WINS information
ī‚ˇ A client sends out a DHCP discover message in order to get IP address send an
broadcast at layer 2 and layer 3. Layer 2 broadcast look like FF:FF:FF:FF:FF:FF and layer
3 uses 255.255.255.255
ī‚ˇ Broadcast saying “Help-I don’t know my IP”
ī‚ˇ DHCP uses UDP (User Datagram Protocol) at transport layer
TCP (Transmission Control Protocol):
ī‚ˇ TCP takes large block of information from application and breaks is into Segment
ī‚ˇ It numbers and sequences each segment so that destination TCP can put back in order
ī‚ˇ After this segment are sent, TCP wait for Acknowledge
ī‚ˇ The sender TCP stack contact destination TCP stacks to establish the connection, what
is crated is known as Virtual Circuit.
ī‚ˇ This type of Communication is called Connection Oriented
ī‚ˇ During the initial handshake, two TCP also agree on the amount of information that
going to transfer
ī‚ˇ TCP is full-duplex, Connection oriented, reliable transfer
ī‚ˇ TCP Segment format:
o The TCP create lots of Overhead, to save this overhead there also one option is
available i.e. UDP.
Fig.: TCP Segment Format
UDP (User Datagram Protocol):
ī‚ˇ UDP is connectionless service therefore doesn’t create virtual circuit
ī‚ˇ Less overhead, But unreliable transfer
ī‚ˇ Doesn’t sequence the segments
Fig.: UDP segment format
Some Key feature of TCP and UDP:
CDP (Cisco Discovery Protocol):
ī‚ˇ The best way to built and troubleshoot network is CDP
ī‚ˇ CDP is Cisco Proprietary protocol design to help administrators collect information
about both locally attach and remote devices
ī‚ˇ We can gather hardware & protocol information of neighbor device
Fig.: CDP’s CLI snap shot
Protocol Port No.
20 FTP data (File Transfer Protocol)
21 FTP (File Transfer Protocol)
22 SSH (Secure Shell)
23 Telnet
25 SMTP (Send Mail Transfer Protocol)
43 whois
53 DNS (Domain Name Service)
68 DHCP (Dynamic Host Control Protocol)
79 Finger
80 HTTP (HyperText Transfer Protocol)
110 POP3 (Post Office Protocol, version 3)
115 SFTP (Secure File Transfer Protocol)
119 NNTP (Network New Transfer Protocol)
123 NTP (Network Time Protocol)
137 NetBIOS-ns
138 NetBIOS-dgm
139 NetBIOS
143 IMAP (In ternet Message Access Protocol)
161 SNMP (Simple Network Management Protocol)
194 IRC (Internet Relay Chat)
220 IMAP3 (Internet Message Access Protocol 3)
389 LDAP (Lightweight Directory Access Protocol)
443 SSL (Secure Socket Layer)
445 SMB (NetBIOS over TCP)
666 Doom
993 SIMAP (Secure Internet Message Access Protocol)
995 SPOP (Secure Post Office Protocol)
OSI Reference Model
OSI (Open System Interconnection):
ī‚ˇ OSI is published by ISO (International Organization for Standardization) in late 1984’s
ī‚ˇ This is design to help Vendor to create interoperable devices in a market
ī‚ˇ It describes how data and network information are communicated from an application
on one computer through the network media to an application on another computer
ī‚ˇ The OSI reference model breaks this communication approach intolayers so it is a
layer based model.
ī‚ˇ OSI is a set of guideline that application programmercan use to implement and
develop the networking standard
ī‚ˇ OSI having 7 layers out of which top 3 layer define how the application within end
station will communicate with each other and with user. Other 4 layer define how
data is transmitted from end to end.
ī‚ˇ OSI have connectionless & connection oriented in Network Layer
ī‚ˇ But have only connection oriented in Transport Layer
Fig.: OSI reference model and their functions
Port no. at transport layeris use by Host to create session with other host in form of Virtual
Circuit
Fig.: Port number at Transport Layer
LAN (Local Area Network)
Ping (Packet InterNet Groper):
ī‚ˇ Use ICMP echo request and replies to test if a node IP stack is initialize and alive on
the network
Traceroute:
ī‚ˇ Display the list of router on a path to network destination, This will not working with
DOS
ī‚ˇ Tracert: Same as traceroute but it is work in DOS
Arp (Address Resolution Pointer):
ī‚ˇ Display IP to MAC address mappings on a Window PC
CSMA/CD (Carrier Sense Multiple Access with Collision Detection):
ī‚ˇ CSMA/CD is a protocol which helps device toshare bandwidth equally and sense
collision
ī‚ˇ If host detect another signal then it sends a jam signals inform other devices that a
collision occur
ī‚ˇ Each device on Ethernet segment stops transmitting for period of time
ī‚ˇ If collisions keep occurring after 15 tries, the nodes attempting to transmit will then
timeout.
Half Duplex Full Duplex
ī‚ˇ Collision will occur because single wire
is used
ī‚ˇ No collision will occur because
multiple wire use to send and receive
ī‚ˇ Typically 10Base T- only 30 to 40
percent efficient
ī‚ˇ We can use it for Hub
ī‚ˇ 100 percent efficient
ī‚ˇ We can not use it with Hub
LAN traffic cause:
ī‚ˇ Too many host in the broadcast domain
ī‚ˇ Broadcast storm
ī‚ˇ Multicasting
ī‚ˇ Low Bandwidth
WAN (Wide Area Network)
CPE (Customer Premises Equipment):
ī‚ˇ Equipment owned by subscriber and located into subscriberpremises
Demarcation (Boundary Area) Point:
ī‚ˇ This is a service provider end point, from this CPE start
ī‚ˇ It is owned and installed by ISP, It is usually connection toCSU/DSU or ISDN interface
Local Loop:
ī‚ˇ Local loop connect the Dmarc to closet switching office
Central Office:
ī‚ˇ This connect the customer network with ISP’s switching network
DCE (data circuit-terminating equipment):
ī‚ˇ is a device that sits between the data terminal equipment (DTE) and a data
transmission circuit.
ī‚ˇ In a data station, the DCE performs functions such as signal conversion, coding, and
line clocking and may be a part of the DTE or intermediate equipment.
DTE (Data Terminating Equipment):
ī‚ˇ device is the terminal (or computer)
Fig.: WAN Connection type
Lease Line:
ī‚ˇ Point to Point dedicated connection
ī‚ˇ Pre-established WAN communication path that goes from the CPE through DCE switch
ī‚ˇ It synchronies serial line up to 45Mbps
ī‚ˇ HDLC and PPP are frequently use in Lease Line
Circuit Switch:
ī‚ˇ Circuit Switching support only phone call
ī‚ˇ We pay it when we use it for phone call
ī‚ˇ It use Dial-Up or ISDN and is use for low bandwidth
Packet Switching:
ī‚ˇ This is WAN technology can share bandwidth other company to save money
ī‚ˇ Packet switching are only workfor you if data is burst type-not continuous
ī‚ˇ Frame relay and X.25 are packet switching technology that can range from 56Kbps to
T3 (45Mbps).
Dial-Up:
ī‚ˇ Dial-up internet access is a form of internet access that use the facility of PSTN to
establish dialed connection to an ISP via telephone line
ī‚ˇ User’s computer or router use modem to encode and decode Internet protocol packet
and control information into and from analogue audio frequency signal
Fig.: Dial-up Connection using modem
MPLS (Multiprotocol Label Switching):
ī‚ˇ MPLS using both Packet and Circuit switching technology
ī‚ˇ High-Performance telecommunication network
ī‚ˇ MPLS is a switching mechanism that imposes label on packet toforward
Frame-Relay:
ī‚ˇ Frame-relay is high-performance Data Link and Physical Layer specification
ī‚ˇ This is more cost effective than point-to-point link, run at speed of 64Kbps to 45Mbps
ī‚ˇ It provide feature of dynamic bandwidth allocation and congestion control
LAPB (Link Access Procedure):
ī‚ˇ Link Access Procedure, Balance was created connection oriented protocol at data link
layer use with X.25
LAPD (Link Access Procedure):
ī‚ˇ Link Access Procedure, D-Channel is used with ISDN at the data link layer as a protocol
for D channel
HDLC (High Level Data Link Control):
ī‚ˇ HDLC is bit-oriented synchronous data linkprotocol
ī‚ˇ HDLC can be use for point to multipoint connection , but is now used exclusively to
connect one device with another
ī‚ˇ Each vendor’s HDLC is proprietary with regards to specific equipment because HDLC
header’s doesn’t contain any identification about the type of protocol being carried
inside HDLC encapsulation. (Not necessary as Network layerprotocol - IP)
PPP (Point-to-Point Protocol):
ī‚ˇ PPP is pretty famous than HDLC because all multiport version of HDLC are proprietary
and PPP can use to create point to point links between multivendor equipments
PPPoE (Point-to-Point over Ethernet):
ī‚ˇ Use to encapsulate PPP frame into Ethernet frame
ī‚ˇ It gives you lot of PPP feature like Authentication, Encryption and Compression
ī‚ˇ PPPoE on Ethernet’s main feature that it adds direct connection to Ethernet interfaces
while providing DSL (Digital Subscriber Line).
DSL (Digital Subscriber Line):
ī‚ˇ DSL is use by traditional telephone companies to delivers advanced services (High
Speed Data and some time Video)
ī‚ˇ It typically has lower data carrying capacity than HFC (Hybrid fiber-coaxial)
ī‚ˇ Data speed is depend on line length and Quality
ī‚ˇ DSL connection are employed in last mile of local telephone network, the connection
is setup between either end of copper wire that run between CPE and DSLAM (Digital
Subscriber line access multiplexer)
ī‚ˇ IN SDSL (Symmetric Digital subscriber Line), Upstream and Downstream are same
HFC (Hybrid Fiber-coaxial):
ī‚ˇ HFC is telecommunication term for broadband network, which combine optical fiber
and coaxial cable
ī‚ˇ It has commonly employed globally by cable television operator
ATM (Asynchronous Transfer Mode):
ī‚ˇ Is created for time sensitive traffic, provide simultaneous transmission of Voice, Video
and Data
ī‚ˇ ATM cell of 53 byte long instead of Packet
ī‚ˇ It use isochronous clocking to help tomove data faster
Media, Cable, Port
Cable:
ī‚ˇ EIA/TIA (Electronic Industries Association/Telecommunication Industry Alliance) is the
standard body that creates the physical layer specification for Ethernet.
ī‚ˇ Have inherent attenuation (Loss of signal strength due length) measured in db
(decibel)
ī‚ˇ Higher quality cable has high rated categories and low attenuation.
ī‚ˇ Cat5 has less crosstalk (unwanted signal interference) than cat3 cable.
ī‚ˇ IEEE 802.3 standards:
o 10Base2 (10=10Mbps, Base=Baseband, 2=almost 200 meter):
ī‚§ 10Mbps, Base band technology
ī‚§ 185 Meter in length
ī‚§ Known as “Thinnet” support up to 30 workstation
o 10Base5 (10=10Mbps, Base=Baseband, 5=almost 500 meter):
ī‚§ Known as “Thiknet”.
ī‚§ Use up to 2500 meter with repeater and 1024 user for all segment
o 10BaseT:
ī‚§ 10Mbps with Cat 3 UTP like 10Base2 and 10Base5
ī‚§ 4 pair UTP
o AUI (attachment Unit Interface):
ī‚§ 802.3 define AUI which allow 1 bit at a time transfer to physical Layer
from the data link media access
ī‚§ It allow MAC to remain constant but physical layer can support any
existing new technology
ī‚§ Original AUI is 15 pin connector, which have transceiver which convert
15 pin-to-twisted pair
ī‚§ AUI cannot support 100Mbps because of high frequency
o MII (Media Independent Interface):
ī‚§ 802.3u specification created one called MII
ī‚§ MII provide 100Mbps throughput
ī‚§ The MII uses 4 bit called nibble, and transmit 8 bit at a time
ī‚§ 802.3u (fast Ethernet) support 802.3 because they share physical layer
ī‚ˇ Expanded IEEE 802.3 standard:
o 100BaseTX (IEEE 802.3u):
ī‚§ 5,6 and 7 cat UTP two-pair wiring, 100 meter, use RJ45(Registered Jack
4 5)
o 100BaseFX (IEEE 802.3u):
ī‚§ Use fiber cabling 62.5/125 micron fiber cable
ī‚§ Support point-to-point topology and 412 meter long distance
o 10000BaseCX (IEEE 802.3z):
ī‚§ Copper twisted pair cable called twinex run only 25 meter
o 1000BaseSX (IEEE 802.3z):
ī‚§ 62.5 and 50 micron can go up to 250 meter with 62.5 and 550 with 50
micron
o 1000BaseLX (IEEE 802.3z):
ī‚§ 9 micron run up to 3 kilometer to 10 kilometer
Straight Through Cable:
Usedbetween:
ī‚ˇ Host to Hub, Switch
ī‚ˇ Router to Hub, Switch
Crossover Cable:
Usedbetween:
ī‚ˇ Host to Host, Router
ī‚ˇ Switch to Switch, Hub
ī‚ˇ Router to Router
Rolled Cable:
ī‚ˇ Rolled cable is to connect Host and Router serial communication port
MAC (Media Access Control):
ī‚ˇ MAC is 48-bit (6-byte) physical address to the Host, it is burnt into NIC (Network
Interfacing Cart) by Manufacturer
ī‚ˇ MAC is unique code, written in hexadecimalformat, which is divided as
Fig.: MAC Address format
ī‚ˇ If G/L (Global/Local Bit) it 0 the Globally assigned if 1 then local assigned
ī‚ˇ I/G (Individual/Group) if 0 then Source portion of MAC, if 1 then represent broadcast
or multicast address in Ethernet
Ethernet Frame:
ī‚ˇ Encapsulating a frame into different type of frame is called tunneling
VLAN (Virtual Local Area Network)
ī‚ˇ VLAN create a single set of domain
ī‚ˇ VLAN Segments the broadcast domain into many segment
ī‚ˇ Generally to divide the broadcast domain we required Router, but using VLAN we can
separate or segment the LAN in single device (Switch).
ī‚ˇ The User’s wants security then we can create their own VLAN, and other user cannot
access them in single switch. So VLAN enhance the network security.
ī‚ˇ By default switch have VLAN 1 (1 is ID) this ID is of 12bit, 212=4096 ID’s
ī‚ˇ ID from 1-1005 are normal range, ID from 1006-4094 are Extended range
ī‚ˇ ID from 1002-1005 are already available in every switch
ī‚ˇ So we started with 2 – 1001 (Example: VLAN 2, VLAN 3,â€Ļâ€Ļâ€Ļ, VLAN 1000, VLAN 1001)
ī‚ˇ Host in VLAN can communicate with other in same VLAN.
ī‚ˇ If we need inter VLAN communication then we need router or VTP.
ī‚ˇ Feature of VLAN:
o Broadcast Control
o Security
o Flexibility and Scalability
Fig.: Switches Created the Physical boundaries
ī‚ˇ VLAN configuration:
VTP (VLAN Trunking Protocol)
ī‚ˇ Basic concept of VTP is to manage all configured VLAN’s and to maintain consistency
throughout the network
ī‚ˇ VTP is use to delete, add and rename the VLAN
ī‚ˇ Accurate tracking and monitoring
ī‚ˇ VTP provide plug and play VLAN
ī‚ˇ VTP only manage normal – range VLAN (1 to 1005), the switch must be in transparent
mode if they are in extended – range (1006 to 4094)
ī‚ˇ To manage VTP we have to create one Switch as Server and other as a domain so that
Server can share VLAN information to other domain via trunk port (we have to create
trunk port in all switch by which they are connect toeach other)
ī‚ˇ Modes of Operation:
o Server Mode:
ī‚§ This is the default mode of all catalyst switches.
ī‚§ One of switch must operate into server mode; Server switch can create,
add and delete VLAN and VTP domain.
ī‚§ Configuration saves into NVRAM.
o Client Mode:
ī‚§ The switch working in client mode can receive information from VTP
server
ī‚§ Client switch cannot create, add and delete the VLAN
ī‚§ Configuration not saves in NVRAM.
o Transparent Mode:
ī‚§ Then can add, delete and create VLAN because they keep information
by their own database
ī‚§ Basically the transparent mode allows remote switches to share VLAN
information those are not within the same VLAN.
Fig.: Modes of VTP
ī‚ˇ Configuration:
o To share information they must have same password
o VTP management domain name must to be same, and one of the switch as
Server
Fig.: VTP simulation
Switch Port Interface
ī‚ˇ Switchport mode access:
o Keep the port in permanent nontrunking mode
o The interface become nontrunking regardless of neighboring interface in trunk
mode
ī‚ˇ Switchport mode dynamic auto:
o This makes the interface able to convert into trunking mode
o If neighbor interface is in trunk mode then it will change
ī‚ˇ Switchport mode dynamic desirable:
o The interface become a trunk interface if the neighborinterface is trunk
ī‚ˇ Switch port mode trunk:
o Keeps the interface into trunk mode whether neighboring interface is in trunk
ī‚ˇ Switchport nonegotiate:
o We can use this command only when port is in access or trunk
ī‚ˇ Adding and deleting VLAN:
Case1
Case2
Case3
Case4
Case5 for Native trunk
ī‚ˇ Inter VLAN routing
Fig.: Inter VLAN routing
Port Security:
IP Addressing
ī‚ˇ IP address is logical address given to the software where as MAC address is physical
address given to the hardware.
ī‚ˇ 32 bit address scheme is used in a network, so we can have 232=4,29,49,67,296
address
Network Address:
ī‚ˇ Network address looks like 10.0.0.0, 172.16.0.0, 192.168.1.0
Host Address:
ī‚ˇ Host address looks like 10.10.10.10, 172.16.1.1, 192.168.1.1
Broadcast:
ī‚ˇ Broadcast address is used by application or host to send information to all hosts in a
network.
ī‚ˇ 255.255.255.255 it means all network, 10.255.255.255 means all host of network 10.
Class of IP address:
Class A address:
ī‚ˇ
Routing & Routing Protocol
Routing: It is the process of selecting path in a network for sending traffic. There are two
type of routing
ī‚ˇ Static Routing :
o It uses the path which network administrator manually configure in the router
o Topology change required manual update
o Allows precise control over routing behavior
ī‚ˇ Dynamic Routing:
o Use a route that a network routing protocol adjust automatically for topology
o Router learn and maintain routes by exchanging routing update
o Router able to discover new network by sharing the routing table
Routing Protocol: Routing protocol is a protocol that specifies how router will
communicate with each other.
Three type of Routing Protocol;
ī‚ˇ Interior gateway routing via Link state routing protocol
o OSPF (Open Shorted Path First)
o IS-IS (Intermediate System to Intermediate System )
ī‚ˇ Interior gateway routing via Distance Vector
o RIP (Routing Information Protocol)
o IGRP (Interior Gateway Routing Protocol)
o EIGRP (Enhance Interior Gateway Routing Protocol)
ī‚ˇ Exterior Gateway Routing Protocol
o BGP (Border Gateway Protocol)
Administrative Difference:
ī‚ˇ Administrative difference is the feature that router use to select best path when there
are two or more different routes to the same destination from two different routing
protocols. Administrative distance defines the reliability of a routing protocol. Each
routing protocol is prioritized in order of most to least reliable (believable) with the
help of an administrative distance value.
RIP (Routing Information Protocol):
ī‚ˇ There are two version of RIP i.e. RIPv1 and RIPv2
ī‚ˇ Metric (standard of measurement) is hope count
ī‚ˇ AD is 120 it using bellman ford algorithm to fine the best path
ī‚ˇ It support auto summarization
ī‚ˇ RIP work up to 16 hope count
ī‚ˇ 16th hope count is poisonous hope count means dead
ī‚ˇ If router sends it information with hope count 16 then it is dead and is called route
poisoning
ī‚ˇ Split Horizon: In this router sends the information to other router by interface is not
duplicate with other interface.
ī‚ˇ Hold Down Process: If router R1 sends ACK with hope count 16 then router R3
understand that R1 is dead and it keep the detail of R1 for 180 Sec. this is call HDT
ī‚ˇ Flush Timer: After every 30 Sec. if R1 again sending dead then flush timer start and it
flush the information of R1 from routing table.
Classful: Router doesn’t send subnet mask. It works on default class subnet mask. In IPv4
class A, B and C are called class full network, because these network are define by class rule
for IPv4 addressing.
Classful Routing Protocol: Does not transmit the mask the mask information along
with subnet number. And therefore must consider class A, B and C Class boundaries and
perform auto summarization at those boundaries.
Classless Routing Protocol: It sends subnet mask in its routing updates
OSPF (Open Shortest Path First):
ī‚ˇ OSPF is open standard routing protocol
ī‚ˇ It crate three table
o Routing table
o Topology table
o Neighbor table
ī‚ˇ AD is 110
ī‚ˇ It uses Dijikstra algorithm
ī‚ˇ Hello timer of OSPF is 10 sec.
ī‚ˇ Dead timer is 40 sec
ī‚ˇ It support manual summarization
ī‚ˇ It support two type of authentication
o Pain Text
o MD5 (Message Digest ) Fig.: Hello Timer
EIGRP (Enhance Interior Gateway Routing Protocol):
ī‚ˇ It is Cisco propriety routing protocol
ī‚ˇ AD is 90
ī‚ˇ It classless routing protocol, support for VLSM
ī‚ˇ Create three routing table
o Neighbor Table
o Routing Table
o Topology Table
ī‚ˇ It uses composite metric, which is calculated by 5 parameter
o Bandwidth
o Delay
o Load
o Reliability
o Maximum transmission unit
ī‚ˇ It uses dual algorithm to find best path
ī‚ˇ It uses multicast IP address 224.0.0.10
ī‚ˇ It support only MD5 authentication
ī‚ˇ It support equal and unequal cost load balancing

More Related Content

What's hot

TCP IP
TCP IP TCP IP
TCP IP muh kemal
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol Akhil .B
 
Ch02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts ReviewCh02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts Reviewphanleson
 
Tcp
TcpTcp
Tcpgiaolvq
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference ModelMukesh Tekwani
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slidesAnaniaKapala
 
FEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionFEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionKae Hsu
 
More on Tcp/Ip
More on Tcp/IpMore on Tcp/Ip
More on Tcp/IpRakhi Saxena
 
Network layer
Network layerNetwork layer
Network layerHasib Shaikh
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocolN.Jagadish Kumar
 
the transport layer
the transport layerthe transport layer
the transport layertumetr1
 
Application Layer
Application LayerApplication Layer
Application LayerTutun Juhana
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocolsRaja Waseem Akhtar
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP ProtocolsDanial Mirza
 

What's hot (20)

TCP IP
TCP IP TCP IP
TCP IP
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
 
Ch02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts ReviewCh02 TCP/IP Concepts Review
Ch02 TCP/IP Concepts Review
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Tcp
TcpTcp
Tcp
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
FEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP IntroductionFEGTS IP training - TCP/IP Introduction
FEGTS IP training - TCP/IP Introduction
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
More on Tcp/Ip
More on Tcp/IpMore on Tcp/Ip
More on Tcp/Ip
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Network layer
Network layerNetwork layer
Network layer
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
TCP-IP PROTOCOL
TCP-IP PROTOCOLTCP-IP PROTOCOL
TCP-IP PROTOCOL
 
the transport layer
the transport layerthe transport layer
the transport layer
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Mod5
Mod5Mod5
Mod5
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
 
TCP/IP Protocols
TCP/IP ProtocolsTCP/IP Protocols
TCP/IP Protocols
 

Similar to Networking Fundamentals

10. tcp ip and do d model
10. tcp ip and do d model10. tcp ip and do d model
10. tcp ip and do d modelSwarndeep Singh
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.pptssuserf7cd2b
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptxazmerawAnna1
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptxkebeAman
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesSerious_SamSoul
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) pptDulith Kasun
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdfeyebolloptics
 
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptxCSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptxVivekTripathi684438
 
TCP Model
TCP ModelTCP Model
TCP Modelmanojkum22
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptxmashiur
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manualJaya Prasanna
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slidesadam_merritt
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationsAnyapuPranav
 
Chapter 1.2 OSI Layer.pptx
Chapter 1.2 OSI Layer.pptxChapter 1.2 OSI Layer.pptx
Chapter 1.2 OSI Layer.pptxNetworkRhinos
 
COC to-manage-and-monitor-the-network.pdf
COC to-manage-and-monitor-the-network.pdfCOC to-manage-and-monitor-the-network.pdf
COC to-manage-and-monitor-the-network.pdfhabtex1230
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2githe26200
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)Jeff Green
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)nnmaurya
 

Similar to Networking Fundamentals (20)

10. tcp ip and do d model
10. tcp ip and do d model10. tcp ip and do d model
10. tcp ip and do d model
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
 
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptxCSS (KNC-301)  2. TCP IP By Vivek Tripathi.pptx
CSS (KNC-301) 2. TCP IP By Vivek Tripathi.pptx
 
TCP Model
TCP ModelTCP Model
TCP Model
 
Week 2
Week 2Week 2
Week 2
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptx
 
Final networks lab manual
Final networks lab manualFinal networks lab manual
Final networks lab manual
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slides
 
presentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunicationspresentation on TCP/IP protocols data comunications
presentation on TCP/IP protocols data comunications
 
Chapter 1.2 OSI Layer.pptx
Chapter 1.2 OSI Layer.pptxChapter 1.2 OSI Layer.pptx
Chapter 1.2 OSI Layer.pptx
 
COC to-manage-and-monitor-the-network.pdf
COC to-manage-and-monitor-the-network.pdfCOC to-manage-and-monitor-the-network.pdf
COC to-manage-and-monitor-the-network.pdf
 
Mcse question
Mcse questionMcse question
Mcse question
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
Computer networking (nnm)
Computer networking (nnm)Computer networking (nnm)
Computer networking (nnm)
 

Recently uploaded

Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESNarmatha D
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 

Recently uploaded (20)

Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIES
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 

Networking Fundamentals

  • 1. Networking Essentials Created by: Vikas Gupta (CCNA), Network Support Engineer, Pune, India.
  • 2. Network: Collection of inter-connected computer system. Networking: Inter connection between the two or more computers are called the networking. Using three types of networkare Intranet, Internet and Extranet (Eg. LAN, WAN & MAN) Bandwidth: Every line has an upper limit and a lower limit on the frequency of signals it can carry. This limited range is called the bandwidth. Every line has a capacity of transmission of data; the maximum amount of data that can be transferred in a single line is called Bandwidth. Collision Domain: Collision domain is an Ethernet term used to describe a network collection of devices in which one particular device sends a packet on a network segment, forcing every other device on that same segment to pay attention toit Broadcast Domain: On a broadcast domain, a set of all devices on a network segment hears all broadcasts sent on that segment Interconnecting Devices Bridges: ī‚ˇ Breakup the collision domain in LAN (Per port collision) ī‚ˇ Same as switch ī‚ˇ Bridges had only 2 to 4 port Hub: ī‚ˇ Represent one collision domain and one broadcast domain ī‚ˇ It create congestion to Ethernet network ī‚ˇ Speed is divided with ports ī‚ˇ It is dumb to identify devices in a network Switch: ī‚ˇ Provide more bandwidth to user ī‚ˇ Single broadcast domain ī‚ˇ By default switch break up the collision domain ī‚ˇ Each and every port in switch represent its own collision domain ī‚ˇ They uses the Hardware address (MAC address) to filter the network Router:
  • 3. ī‚ˇ Router provide internetwork and provide communication to WAN ī‚ˇ It Break up broadcast domain & collision domain as well ī‚ˇ They don’t forward broadcast by default ī‚ˇ They filter the network based on logical address in Network Layer (IP address) ī‚ˇ Packet filtering (By using Access list) ī‚ˇ Packet Switching ī‚ˇ Path selection TCP/IP Network Model TCP/IP (Transmission Control Protocol / Internet Protocol): ī‚ˇ It is occasionally called as DoD Model (Department of Defense) due to foundational influence of ARPANET in 1970’s ī‚ˇ TCP/IP come into existent before OSI model ī‚ˇ TCP/IP is based on protocol not a layer based model ī‚ˇ TCP/IP model is created on the basis of protocol ī‚ˇ TCP/IP provide connectionless service in Network layer ī‚ˇ Both connection oriented and connectionless in Transport Layer Fig.: TCP/IP Model with Protocol in each layer Application & Services
  • 4. Telnet (Teletype Network): ī‚ˇ Telnet is chameleon (Changeable) of protocol ī‚ˇ It’s specialty is terminal emulation ī‚ˇ It allow a user on remote client machine called tenet client, to access the resources of another machine (Telnet Server) ī‚ˇ This project is actually software image-a virtual terminal that can interact with chosen remote host ī‚ˇ This terminal gives option to User to select the menu and application on server ī‚ˇ All data even login data is sent in clear text format, this can be a security risk ī‚ˇ For telnetting it necessary to have telnet is enable in both transmitting and receiving party FTP (File Transfer Protocol): ī‚ˇ It just not a protocol it’s a Program so that user can perform operation on transfer ī‚ˇ FTP allows access to both file and directory and operation to relocating in other place ī‚ˇ FTP work with Telnet to login into FTP server ī‚ˇ After login User subjected for authentication and probably User name and Password enable by administrator ī‚ˇ FTP only access the file and folder it cannot executing the file TFTP (Trivial File Transfer Protocol): ī‚ˇ TFTP having less feature than FTP it is stripped-down ī‚ˇ It is very easy to use and fast too ī‚ˇ Can Use only for send and receive ī‚ˇ No authentication, so it is insecure NFS (Network File System): ī‚ˇ NFS is a jewel of protocol for file transfer ī‚ˇ If NT is the Server and Unix client login into the NT then NT use the portion of RAM on NT server to transparently store the Unix file so that Unix user can use the file it format ī‚ˇ Unix user and NT user can access the file in their normal file system SMTP (Simple Mail Transfer Protocol): ī‚ˇ SMTP use to send mail and POP3 use to receive the mail ī‚ˇ Uses spooled or queued, method of mail delivery
  • 5. ī‚ˇ Once the message is sent to destination then mail are spooled to a device-disk and regularly check the queue for message, if destination found then sends to it LPD (Line Printer Daemon): ī‚ˇ LPD design for Printer Sharing ī‚ˇ LPD with LPR (Line Printer) allow to spool and sent to network printer using TCP/IP X Window: ī‚ˇ Design for client/server operation ī‚ˇ It define a protocol to design client/server application on GUI ī‚ˇ The idea is to allow program called client to rum computer on Server SNMP (Simple Network Management): ī‚ˇ Collect and manipulate network information ī‚ˇ This protocol can also stand as watchdog over the network, quickly notifying manager of any sudden change of event into network ī‚ˇ This also called as agent, when aberration occur DNS (Domain Name System): ī‚ˇ DNS resolve host name – specifically, internet name such as www.vikk.com ī‚ˇ If you don’t have DNS then you type IP address to communicate with other ī‚ˇ DNS allow to use domain name to specify an IP address, and can change IP address no one will know the difference ī‚ˇ DNS is use to resolve FQDN (Fully Qualified Domain Name) such as www.vik.king.com. DHCP (Dynamic Host Configuring Protocol): ī‚ˇ DHCP assign IP address to Host ī‚ˇ All type of devices can be use for DHCP even Cisco Router ī‚ˇ There is lots of information provided by DHCP if host requesting to DHCP and that are o IP address o Subnetmask o Domain name o Default gateway o DNS o WINS information
  • 6. ī‚ˇ A client sends out a DHCP discover message in order to get IP address send an broadcast at layer 2 and layer 3. Layer 2 broadcast look like FF:FF:FF:FF:FF:FF and layer 3 uses 255.255.255.255 ī‚ˇ Broadcast saying “Help-I don’t know my IP” ī‚ˇ DHCP uses UDP (User Datagram Protocol) at transport layer TCP (Transmission Control Protocol): ī‚ˇ TCP takes large block of information from application and breaks is into Segment ī‚ˇ It numbers and sequences each segment so that destination TCP can put back in order ī‚ˇ After this segment are sent, TCP wait for Acknowledge ī‚ˇ The sender TCP stack contact destination TCP stacks to establish the connection, what is crated is known as Virtual Circuit. ī‚ˇ This type of Communication is called Connection Oriented ī‚ˇ During the initial handshake, two TCP also agree on the amount of information that going to transfer ī‚ˇ TCP is full-duplex, Connection oriented, reliable transfer ī‚ˇ TCP Segment format: o The TCP create lots of Overhead, to save this overhead there also one option is available i.e. UDP. Fig.: TCP Segment Format UDP (User Datagram Protocol): ī‚ˇ UDP is connectionless service therefore doesn’t create virtual circuit ī‚ˇ Less overhead, But unreliable transfer
  • 7. ī‚ˇ Doesn’t sequence the segments Fig.: UDP segment format Some Key feature of TCP and UDP: CDP (Cisco Discovery Protocol): ī‚ˇ The best way to built and troubleshoot network is CDP ī‚ˇ CDP is Cisco Proprietary protocol design to help administrators collect information about both locally attach and remote devices ī‚ˇ We can gather hardware & protocol information of neighbor device
  • 8. Fig.: CDP’s CLI snap shot Protocol Port No. 20 FTP data (File Transfer Protocol) 21 FTP (File Transfer Protocol)
  • 9. 22 SSH (Secure Shell) 23 Telnet 25 SMTP (Send Mail Transfer Protocol) 43 whois 53 DNS (Domain Name Service) 68 DHCP (Dynamic Host Control Protocol) 79 Finger 80 HTTP (HyperText Transfer Protocol) 110 POP3 (Post Office Protocol, version 3) 115 SFTP (Secure File Transfer Protocol) 119 NNTP (Network New Transfer Protocol) 123 NTP (Network Time Protocol) 137 NetBIOS-ns 138 NetBIOS-dgm 139 NetBIOS 143 IMAP (In ternet Message Access Protocol) 161 SNMP (Simple Network Management Protocol) 194 IRC (Internet Relay Chat) 220 IMAP3 (Internet Message Access Protocol 3) 389 LDAP (Lightweight Directory Access Protocol) 443 SSL (Secure Socket Layer) 445 SMB (NetBIOS over TCP) 666 Doom 993 SIMAP (Secure Internet Message Access Protocol) 995 SPOP (Secure Post Office Protocol) OSI Reference Model OSI (Open System Interconnection): ī‚ˇ OSI is published by ISO (International Organization for Standardization) in late 1984’s
  • 10. ī‚ˇ This is design to help Vendor to create interoperable devices in a market ī‚ˇ It describes how data and network information are communicated from an application on one computer through the network media to an application on another computer ī‚ˇ The OSI reference model breaks this communication approach intolayers so it is a layer based model. ī‚ˇ OSI is a set of guideline that application programmercan use to implement and develop the networking standard ī‚ˇ OSI having 7 layers out of which top 3 layer define how the application within end station will communicate with each other and with user. Other 4 layer define how data is transmitted from end to end. ī‚ˇ OSI have connectionless & connection oriented in Network Layer ī‚ˇ But have only connection oriented in Transport Layer Fig.: OSI reference model and their functions
  • 11. Port no. at transport layeris use by Host to create session with other host in form of Virtual Circuit Fig.: Port number at Transport Layer LAN (Local Area Network) Ping (Packet InterNet Groper): ī‚ˇ Use ICMP echo request and replies to test if a node IP stack is initialize and alive on the network
  • 12. Traceroute: ī‚ˇ Display the list of router on a path to network destination, This will not working with DOS ī‚ˇ Tracert: Same as traceroute but it is work in DOS Arp (Address Resolution Pointer): ī‚ˇ Display IP to MAC address mappings on a Window PC CSMA/CD (Carrier Sense Multiple Access with Collision Detection): ī‚ˇ CSMA/CD is a protocol which helps device toshare bandwidth equally and sense collision ī‚ˇ If host detect another signal then it sends a jam signals inform other devices that a collision occur ī‚ˇ Each device on Ethernet segment stops transmitting for period of time ī‚ˇ If collisions keep occurring after 15 tries, the nodes attempting to transmit will then timeout. Half Duplex Full Duplex ī‚ˇ Collision will occur because single wire is used ī‚ˇ No collision will occur because multiple wire use to send and receive
  • 13. ī‚ˇ Typically 10Base T- only 30 to 40 percent efficient ī‚ˇ We can use it for Hub ī‚ˇ 100 percent efficient ī‚ˇ We can not use it with Hub LAN traffic cause: ī‚ˇ Too many host in the broadcast domain ī‚ˇ Broadcast storm ī‚ˇ Multicasting ī‚ˇ Low Bandwidth WAN (Wide Area Network) CPE (Customer Premises Equipment): ī‚ˇ Equipment owned by subscriber and located into subscriberpremises Demarcation (Boundary Area) Point: ī‚ˇ This is a service provider end point, from this CPE start ī‚ˇ It is owned and installed by ISP, It is usually connection toCSU/DSU or ISDN interface Local Loop: ī‚ˇ Local loop connect the Dmarc to closet switching office
  • 14. Central Office: ī‚ˇ This connect the customer network with ISP’s switching network DCE (data circuit-terminating equipment): ī‚ˇ is a device that sits between the data terminal equipment (DTE) and a data transmission circuit. ī‚ˇ In a data station, the DCE performs functions such as signal conversion, coding, and line clocking and may be a part of the DTE or intermediate equipment. DTE (Data Terminating Equipment): ī‚ˇ device is the terminal (or computer) Fig.: WAN Connection type Lease Line: ī‚ˇ Point to Point dedicated connection ī‚ˇ Pre-established WAN communication path that goes from the CPE through DCE switch ī‚ˇ It synchronies serial line up to 45Mbps ī‚ˇ HDLC and PPP are frequently use in Lease Line Circuit Switch:
  • 15. ī‚ˇ Circuit Switching support only phone call ī‚ˇ We pay it when we use it for phone call ī‚ˇ It use Dial-Up or ISDN and is use for low bandwidth Packet Switching: ī‚ˇ This is WAN technology can share bandwidth other company to save money ī‚ˇ Packet switching are only workfor you if data is burst type-not continuous ī‚ˇ Frame relay and X.25 are packet switching technology that can range from 56Kbps to T3 (45Mbps). Dial-Up: ī‚ˇ Dial-up internet access is a form of internet access that use the facility of PSTN to establish dialed connection to an ISP via telephone line ī‚ˇ User’s computer or router use modem to encode and decode Internet protocol packet and control information into and from analogue audio frequency signal Fig.: Dial-up Connection using modem MPLS (Multiprotocol Label Switching): ī‚ˇ MPLS using both Packet and Circuit switching technology ī‚ˇ High-Performance telecommunication network ī‚ˇ MPLS is a switching mechanism that imposes label on packet toforward Frame-Relay: ī‚ˇ Frame-relay is high-performance Data Link and Physical Layer specification
  • 16. ī‚ˇ This is more cost effective than point-to-point link, run at speed of 64Kbps to 45Mbps ī‚ˇ It provide feature of dynamic bandwidth allocation and congestion control LAPB (Link Access Procedure): ī‚ˇ Link Access Procedure, Balance was created connection oriented protocol at data link layer use with X.25 LAPD (Link Access Procedure): ī‚ˇ Link Access Procedure, D-Channel is used with ISDN at the data link layer as a protocol for D channel HDLC (High Level Data Link Control): ī‚ˇ HDLC is bit-oriented synchronous data linkprotocol ī‚ˇ HDLC can be use for point to multipoint connection , but is now used exclusively to connect one device with another ī‚ˇ Each vendor’s HDLC is proprietary with regards to specific equipment because HDLC header’s doesn’t contain any identification about the type of protocol being carried inside HDLC encapsulation. (Not necessary as Network layerprotocol - IP) PPP (Point-to-Point Protocol): ī‚ˇ PPP is pretty famous than HDLC because all multiport version of HDLC are proprietary and PPP can use to create point to point links between multivendor equipments PPPoE (Point-to-Point over Ethernet): ī‚ˇ Use to encapsulate PPP frame into Ethernet frame ī‚ˇ It gives you lot of PPP feature like Authentication, Encryption and Compression ī‚ˇ PPPoE on Ethernet’s main feature that it adds direct connection to Ethernet interfaces while providing DSL (Digital Subscriber Line). DSL (Digital Subscriber Line): ī‚ˇ DSL is use by traditional telephone companies to delivers advanced services (High Speed Data and some time Video) ī‚ˇ It typically has lower data carrying capacity than HFC (Hybrid fiber-coaxial) ī‚ˇ Data speed is depend on line length and Quality
  • 17. ī‚ˇ DSL connection are employed in last mile of local telephone network, the connection is setup between either end of copper wire that run between CPE and DSLAM (Digital Subscriber line access multiplexer) ī‚ˇ IN SDSL (Symmetric Digital subscriber Line), Upstream and Downstream are same HFC (Hybrid Fiber-coaxial): ī‚ˇ HFC is telecommunication term for broadband network, which combine optical fiber and coaxial cable ī‚ˇ It has commonly employed globally by cable television operator ATM (Asynchronous Transfer Mode): ī‚ˇ Is created for time sensitive traffic, provide simultaneous transmission of Voice, Video and Data ī‚ˇ ATM cell of 53 byte long instead of Packet ī‚ˇ It use isochronous clocking to help tomove data faster Media, Cable, Port Cable: ī‚ˇ EIA/TIA (Electronic Industries Association/Telecommunication Industry Alliance) is the standard body that creates the physical layer specification for Ethernet. ī‚ˇ Have inherent attenuation (Loss of signal strength due length) measured in db (decibel) ī‚ˇ Higher quality cable has high rated categories and low attenuation. ī‚ˇ Cat5 has less crosstalk (unwanted signal interference) than cat3 cable. ī‚ˇ IEEE 802.3 standards: o 10Base2 (10=10Mbps, Base=Baseband, 2=almost 200 meter): ī‚§ 10Mbps, Base band technology ī‚§ 185 Meter in length ī‚§ Known as “Thinnet” support up to 30 workstation o 10Base5 (10=10Mbps, Base=Baseband, 5=almost 500 meter): ī‚§ Known as “Thiknet”. ī‚§ Use up to 2500 meter with repeater and 1024 user for all segment o 10BaseT: ī‚§ 10Mbps with Cat 3 UTP like 10Base2 and 10Base5 ī‚§ 4 pair UTP o AUI (attachment Unit Interface):
  • 18. ī‚§ 802.3 define AUI which allow 1 bit at a time transfer to physical Layer from the data link media access ī‚§ It allow MAC to remain constant but physical layer can support any existing new technology ī‚§ Original AUI is 15 pin connector, which have transceiver which convert 15 pin-to-twisted pair ī‚§ AUI cannot support 100Mbps because of high frequency o MII (Media Independent Interface): ī‚§ 802.3u specification created one called MII ī‚§ MII provide 100Mbps throughput ī‚§ The MII uses 4 bit called nibble, and transmit 8 bit at a time ī‚§ 802.3u (fast Ethernet) support 802.3 because they share physical layer ī‚ˇ Expanded IEEE 802.3 standard: o 100BaseTX (IEEE 802.3u): ī‚§ 5,6 and 7 cat UTP two-pair wiring, 100 meter, use RJ45(Registered Jack 4 5) o 100BaseFX (IEEE 802.3u): ī‚§ Use fiber cabling 62.5/125 micron fiber cable ī‚§ Support point-to-point topology and 412 meter long distance o 10000BaseCX (IEEE 802.3z): ī‚§ Copper twisted pair cable called twinex run only 25 meter o 1000BaseSX (IEEE 802.3z): ī‚§ 62.5 and 50 micron can go up to 250 meter with 62.5 and 550 with 50 micron o 1000BaseLX (IEEE 802.3z): ī‚§ 9 micron run up to 3 kilometer to 10 kilometer Straight Through Cable:
  • 19. Usedbetween: ī‚ˇ Host to Hub, Switch ī‚ˇ Router to Hub, Switch Crossover Cable: Usedbetween: ī‚ˇ Host to Host, Router ī‚ˇ Switch to Switch, Hub ī‚ˇ Router to Router Rolled Cable: ī‚ˇ Rolled cable is to connect Host and Router serial communication port
  • 20. MAC (Media Access Control): ī‚ˇ MAC is 48-bit (6-byte) physical address to the Host, it is burnt into NIC (Network Interfacing Cart) by Manufacturer ī‚ˇ MAC is unique code, written in hexadecimalformat, which is divided as Fig.: MAC Address format ī‚ˇ If G/L (Global/Local Bit) it 0 the Globally assigned if 1 then local assigned ī‚ˇ I/G (Individual/Group) if 0 then Source portion of MAC, if 1 then represent broadcast or multicast address in Ethernet Ethernet Frame: ī‚ˇ Encapsulating a frame into different type of frame is called tunneling VLAN (Virtual Local Area Network) ī‚ˇ VLAN create a single set of domain ī‚ˇ VLAN Segments the broadcast domain into many segment ī‚ˇ Generally to divide the broadcast domain we required Router, but using VLAN we can separate or segment the LAN in single device (Switch).
  • 21. ī‚ˇ The User’s wants security then we can create their own VLAN, and other user cannot access them in single switch. So VLAN enhance the network security. ī‚ˇ By default switch have VLAN 1 (1 is ID) this ID is of 12bit, 212=4096 ID’s ī‚ˇ ID from 1-1005 are normal range, ID from 1006-4094 are Extended range ī‚ˇ ID from 1002-1005 are already available in every switch ī‚ˇ So we started with 2 – 1001 (Example: VLAN 2, VLAN 3,â€Ļâ€Ļâ€Ļ, VLAN 1000, VLAN 1001) ī‚ˇ Host in VLAN can communicate with other in same VLAN. ī‚ˇ If we need inter VLAN communication then we need router or VTP. ī‚ˇ Feature of VLAN: o Broadcast Control o Security o Flexibility and Scalability Fig.: Switches Created the Physical boundaries ī‚ˇ VLAN configuration:
  • 22. VTP (VLAN Trunking Protocol) ī‚ˇ Basic concept of VTP is to manage all configured VLAN’s and to maintain consistency throughout the network ī‚ˇ VTP is use to delete, add and rename the VLAN ī‚ˇ Accurate tracking and monitoring ī‚ˇ VTP provide plug and play VLAN ī‚ˇ VTP only manage normal – range VLAN (1 to 1005), the switch must be in transparent mode if they are in extended – range (1006 to 4094) ī‚ˇ To manage VTP we have to create one Switch as Server and other as a domain so that Server can share VLAN information to other domain via trunk port (we have to create trunk port in all switch by which they are connect toeach other) ī‚ˇ Modes of Operation: o Server Mode: ī‚§ This is the default mode of all catalyst switches. ī‚§ One of switch must operate into server mode; Server switch can create, add and delete VLAN and VTP domain. ī‚§ Configuration saves into NVRAM. o Client Mode: ī‚§ The switch working in client mode can receive information from VTP server ī‚§ Client switch cannot create, add and delete the VLAN ī‚§ Configuration not saves in NVRAM. o Transparent Mode:
  • 23. ī‚§ Then can add, delete and create VLAN because they keep information by their own database ī‚§ Basically the transparent mode allows remote switches to share VLAN information those are not within the same VLAN. Fig.: Modes of VTP ī‚ˇ Configuration: o To share information they must have same password o VTP management domain name must to be same, and one of the switch as Server Fig.: VTP simulation
  • 24. Switch Port Interface ī‚ˇ Switchport mode access: o Keep the port in permanent nontrunking mode o The interface become nontrunking regardless of neighboring interface in trunk mode ī‚ˇ Switchport mode dynamic auto: o This makes the interface able to convert into trunking mode o If neighbor interface is in trunk mode then it will change ī‚ˇ Switchport mode dynamic desirable: o The interface become a trunk interface if the neighborinterface is trunk ī‚ˇ Switch port mode trunk: o Keeps the interface into trunk mode whether neighboring interface is in trunk ī‚ˇ Switchport nonegotiate: o We can use this command only when port is in access or trunk ī‚ˇ Adding and deleting VLAN: Case1 Case2 Case3 Case4 Case5 for Native trunk
  • 25. ī‚ˇ Inter VLAN routing Fig.: Inter VLAN routing Port Security: IP Addressing
  • 26. ī‚ˇ IP address is logical address given to the software where as MAC address is physical address given to the hardware. ī‚ˇ 32 bit address scheme is used in a network, so we can have 232=4,29,49,67,296 address Network Address: ī‚ˇ Network address looks like 10.0.0.0, 172.16.0.0, 192.168.1.0 Host Address: ī‚ˇ Host address looks like 10.10.10.10, 172.16.1.1, 192.168.1.1 Broadcast: ī‚ˇ Broadcast address is used by application or host to send information to all hosts in a network. ī‚ˇ 255.255.255.255 it means all network, 10.255.255.255 means all host of network 10. Class of IP address: Class A address: ī‚ˇ Routing & Routing Protocol Routing: It is the process of selecting path in a network for sending traffic. There are two type of routing ī‚ˇ Static Routing : o It uses the path which network administrator manually configure in the router o Topology change required manual update o Allows precise control over routing behavior ī‚ˇ Dynamic Routing: o Use a route that a network routing protocol adjust automatically for topology
  • 27. o Router learn and maintain routes by exchanging routing update o Router able to discover new network by sharing the routing table Routing Protocol: Routing protocol is a protocol that specifies how router will communicate with each other. Three type of Routing Protocol; ī‚ˇ Interior gateway routing via Link state routing protocol o OSPF (Open Shorted Path First) o IS-IS (Intermediate System to Intermediate System ) ī‚ˇ Interior gateway routing via Distance Vector o RIP (Routing Information Protocol) o IGRP (Interior Gateway Routing Protocol) o EIGRP (Enhance Interior Gateway Routing Protocol) ī‚ˇ Exterior Gateway Routing Protocol o BGP (Border Gateway Protocol) Administrative Difference: ī‚ˇ Administrative difference is the feature that router use to select best path when there are two or more different routes to the same destination from two different routing protocols. Administrative distance defines the reliability of a routing protocol. Each routing protocol is prioritized in order of most to least reliable (believable) with the help of an administrative distance value.
  • 28. RIP (Routing Information Protocol): ī‚ˇ There are two version of RIP i.e. RIPv1 and RIPv2 ī‚ˇ Metric (standard of measurement) is hope count ī‚ˇ AD is 120 it using bellman ford algorithm to fine the best path ī‚ˇ It support auto summarization ī‚ˇ RIP work up to 16 hope count ī‚ˇ 16th hope count is poisonous hope count means dead ī‚ˇ If router sends it information with hope count 16 then it is dead and is called route poisoning ī‚ˇ Split Horizon: In this router sends the information to other router by interface is not duplicate with other interface. ī‚ˇ Hold Down Process: If router R1 sends ACK with hope count 16 then router R3 understand that R1 is dead and it keep the detail of R1 for 180 Sec. this is call HDT ī‚ˇ Flush Timer: After every 30 Sec. if R1 again sending dead then flush timer start and it flush the information of R1 from routing table.
  • 29. Classful: Router doesn’t send subnet mask. It works on default class subnet mask. In IPv4 class A, B and C are called class full network, because these network are define by class rule for IPv4 addressing. Classful Routing Protocol: Does not transmit the mask the mask information along with subnet number. And therefore must consider class A, B and C Class boundaries and perform auto summarization at those boundaries. Classless Routing Protocol: It sends subnet mask in its routing updates OSPF (Open Shortest Path First): ī‚ˇ OSPF is open standard routing protocol ī‚ˇ It crate three table o Routing table o Topology table o Neighbor table ī‚ˇ AD is 110 ī‚ˇ It uses Dijikstra algorithm ī‚ˇ Hello timer of OSPF is 10 sec. ī‚ˇ Dead timer is 40 sec ī‚ˇ It support manual summarization ī‚ˇ It support two type of authentication o Pain Text o MD5 (Message Digest ) Fig.: Hello Timer EIGRP (Enhance Interior Gateway Routing Protocol): ī‚ˇ It is Cisco propriety routing protocol ī‚ˇ AD is 90 ī‚ˇ It classless routing protocol, support for VLSM
  • 30. ī‚ˇ Create three routing table o Neighbor Table o Routing Table o Topology Table ī‚ˇ It uses composite metric, which is calculated by 5 parameter o Bandwidth o Delay o Load o Reliability o Maximum transmission unit ī‚ˇ It uses dual algorithm to find best path ī‚ˇ It uses multicast IP address 224.0.0.10 ī‚ˇ It support only MD5 authentication ī‚ˇ It support equal and unequal cost load balancing