Common Metric: The One
Common Metric: The One
Common Metric: The One
Common metric
A common metric can either be: hop count, bandwidth, delay, current load on the
path, reliability, or the combination of two or more of these standards.
Hop count
Delay refers to the time taken to send data from source to destination; this
includes the time taken by a router to process and send a datagram to the receiving
interface. For protocols that use delay as their metric, the link with low latency is
considered the best path.
Bandwidth
Bandwidth is defined as the number of bits that a link between two devices can
send per second.
For a protocol that uses bandwidth capacity as its metric, the protocol determines the
bandwidth capacity of all possible routes to the destination subnet, and the route with
a higher bandwidth capacity is considered the best path added to the routing
table.
In the figure above, Router 6 will prefer to send its traffic through router 8 rather than
send it through router 7 because the route through router 8 has a higher bandwidth.
Load
Network load refers to the extent to which a network resource like link between
networks is used at any given period. For protocols that use load as their metric,
the path with the least load is considered the best and added to the routing table to
transmit the datagram to the destination subnet.
RIPv1 RIPv2
3
. It does not support for authentications. It supports for authentications.
4
. It hops count limit is 15. It hops count limit is 15.
5 It does not support for VLSM and It supports for VLSM and
. discontinuous networks. discontinuous networks.
6
. It is less secure. It is more secure.
7
. Not send subnet mask to routing table. Send subnet mask to routing table.
Interior routing protocols are designed for use within a single autonomous
system, while Exterior routing protocols are designed for use between different
Autonomous Systems (AS).
The main difference between the IGRP and EIGRP is that, Interior Gateway
Routing Protocol is Classful routing technique, while Enhanced Interior Gateway
Routing Protocol is a classless routing technique.
Difference between IGRP and EIGRP:
IGRP EIGRP
1 IGRP stands for Interior Gateway EIGRP stands for Enhanced Interior Gateway
. Routing Protocol. Routing Protocol.
3
. IGRP is a slow convergence. While it is a fast convergence.
4 In IGRP, Bellman ford algorithm is While in this, DUAL algorithm is used as its
. used. computational engine
5
. IGRP needs less bandwidth. While EIGRP needs high bandwidth.
6
. The least hop count in IGRP is 255. While the least hop count in EIGRP is 256.
7
. It provides 24 bits for delay. While it provides 32 bits for delay.
EIRGP features:
Establishing neighbour adjacencies: Like other routing protocols, EIGRP
establishes a relationship with other connected routers to track its neighbour’s
status.
Reliable Transport Protocol: EIRGP uses the Reliable Transport Protocol
(RTP) to provide reliable delivery of EIGRP packets.
Equal and Unequal Cost Load balancing: EIGRP is the only protocol that
supports unequal load balancing. This capability allows the administrator to
better distribute traffic flow in the networks, thereby reducing delays.
These protocols do not use periodic updates to send new routing updates to
their neighbours; instead, they advertised every detail about the
internetwork to all other routers such that all routers in this internetwork
have the same information.
Like all other routing protocols, OSPF uses routing protocol information to help
build its data structures, which are then processed using a routing algorithm.
IS-IS is a link-state routing protocol, which means that the routers exchange
topology information with their nearest neighbours.
Uses Dijkstra Shortest Path First (SPF) algorithm to determine routes.
IS-IS evaluates the topology changes and determines whether to perform a
full SPF recalculation or a partial route calculation.
This protocol originally was developed for routing International Organization
for Standardization (ISO) Connectionless Network Protocol (CLNP) packets.
Like OSPF routing, IS-IS uses hello packets that allow network convergence
to occur quickly when network changes are detected.
The protocol recalculates routes when network topology changes, using the
Dijkstra algorithm, and minimises the routing protocol traffic that it generates.
It provides support for multiple paths of equal cost.
IP address:
IP address is a unique global address for a network interface.
It is 32-bit logical address, composed of four 8-bit fields, called octets.
Each octet represents a decimal number in the range 0-255. For eg- 17.112.152.32
A single address is never assigned to more than one computer.
Network Masks:
A network mask helps you know which portion of the address identifies the
network and which portion of the address identifies the node. Class A, B, and
C networks have default masks, also known as natural masks, as shown here:
Class A: 255.0.0.0
Class B: 255.255.0.0
Class C: 255.255.255.0
Understand Subnetting:
Subnetting allows you to create multiple logical networks that exist within a single
Class A, B, or C network. If you do not subnet, you are only able to use one network
from your Class A, B, or C network, which is unrealistic.
Working Principle
A bridge loop is created when there are more than one paths between two nodes in a
given network. When a message is sent, particularly when a broadcast is done, the
bridges repeatedly rebroadcast the same message, flooding the network. Since a data
link layer frame does not have a time-to-live field in the header, the broadcast frame
may loop forever, thus swamping the channels.
Access ports are part of only one VLAN and normally used for terminating end
devices likes PC, Laptop and printer.
Inter-VLAN routing is the process of forwarding network traffic from one VLAN to
another VLAN.
Bit rate control: The Physical layer also defines the transmission rate i.e.
the number of bits sent per second.
Physical topologies: Physical layer specifies the way in which the different,
devices/nodes are arranged in a network i.e. bus, star, or mesh topology.
Transmission mode: Physical layer also defines the way in which the data
flows between the two connected devices. The various transmission modes
possible are Simplex, half-duplex and full-duplex.
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Blockchain:
A blockchain is a distributed database that is shared among the nodes of
a computer network.
A blockchain stores information electronically in digital format.
Blockchains are best known for their crucial role in cryptocurrency
systems, such as Bitcoin, for maintaining a secure and decentralized
record of transactions.
The innovation with a blockchain is that it guarantees the fidelity and
security of a record of data and generates trust without the need for a
trusted third party.
Benefits of VLAN
Tracert
The tracert command prints the path. If all routers on the path are functional, this
command prints the full path. If a router is down on the path, this command prints
the path up to the last operational router.
tracert www.google.co.in
Ping
Ipconfig
This command displays all current TCP/IP network configuration values and
refreshes Domain Name System (DNS) settings.
This command is mainly used to view the IP addresses on the computers that are
configured to obtain their IP address automatically.
The ARP protocol broadcasts a given IP address over a local network. The
corresponding host responds to the broadcast with its MAC address. To avoid
repetition, ARP stores the answer in a table known as ARP table.
To view the ARP table, you can use the following command.
arp
Netstat
This command displays active connections & ports on which the computer is
listening.
The output of this command is organized in rows and columns. Each row represents
a new connection or an entry in the output. It contains four columns. These columns
provide the following information about the row.
Proto: - This column displays the name of the protocol (TCP or UDP).
Local Address: - This column displays the IP address of the local computer and
the port number being used. If the port is not yet established, the port number is
shown as an asterisk (*).
Foreign Address: - This column displays the IP address and port number of the
remote computer to which the port is connected.
RARP provides the opposite service to ARP. It is used when only the MAC
address is known and the IP address is needed.
Nslookup
It stands for name server lookup. When we want to know the IP address of
the domain, we can use this command.
Syntax: nslookup google.com
Router configuration:
configure terminal
Example:
Router> enable
Router# configure terminal
interface gigabitethernet slot/port
Example:
Router(config)# interface gigabitethernet 0/8
ip address ip-address mask
Example:
Router(config-if) # ip address 192.168.12.2 255.255.255.0
no shutdown
Example:
Router(config-if) # no shutdown
This command will display the content of flash memory, used space and available
space. By default, router stores IOS image file in flash. We can use this command
to check the available space in Flash memory while updating / restoring IOS
files.
Router#show ip route
This command displays routing table. It gives you detailed information about the
networks that are known to the router, either directly connected to the
router, statically configured using static routing or automatically added to
the routing table using dynamic routing protocols.
Router#show interfaces
This command shows the status and configuration of interfaces. By default it will
display all interfaces. But you can limit it to particular interface. To view the detail of
specific interface you can use the following command.
Features: Advantages:
Scalability -> speed
Quality of Service -> wireless
Range ->broad Coverage
Coverage
Bluetooth
Wireless Technology Standard. Used for exchanging data through radio
waves
Short distance communication.
Able to function in a noisy environment.
ZIGBEE
• Zigbee is a wireless standard that defines a set of communication protocols
for short-range communications.
• Zigbee standard is especially build for control and sensor networks.
Zigbee is a standard that addresses the need of very low-cost
implementation of Low power devices with low data rate for short range
wireless communications.
One of the most commonly used standards for Internet of things (IOT).
Security: Uses AES cryptographic algorithm.
ZIGBEE Application
• Home automation
• Medical data collection
• Industrial Control systems
Purpose:
• Collect information
• Perform control tasks inside a building
IOT
The Internet of Things (IoT) describes the network of physical objects— “things”—
that are embedded with sensors, software, and other technologies for the
purpose of connecting and exchanging data with other devices and systems over
the internet.
It is also known as Machine-to-Machine(M2M) or Skynet or Internet of Everything.
Concerns of IOT
Scalability
Workload issues
Network limitations
Application of IOT:
Healthcare
Smart cities
Environmental
Commercial
• 1) Sensors/Devices
• 2) Connectivity
• 3) Data Processing
• 4) User Interface
AR and VR
Application of AI
1. AI in Astronomy
2. AI in Healthcare
3. AI in Gaming
4. AI in Finance
Machine learning
“Field of study that gives computers the capability to learn without being explicitly
programmed”.
Application of ML
Image Recognition
Speech Recognition
Traffic prediction
Recommendations system
Self-driving cars
Email Spam and Malware Filtering
Cloud Computing:
Cloud computing is a model for enabling global, convenient, on-demand network
access to a shared pool of configurable computing resources (e.g., networks,
servers, storage) that can be rapidly provisioned and released with minimal
management effort or service provider interaction.