Skip to main content

Posts

Showing posts with the label Protocols

Routing Protocols - Define Top Network Routing Protocols

Routing is a process in which the layer 3 devices (either router or layer 3 switch) finds the optimal path to deliver a packet from one network to another. Dynamic routing protocols uses metric, cost and hop count to identify the best path from the path available for destination network. Below are the types of Routing Protocol: - Distance Vector Routing Protocol RIP IGRP - Link State Routing Protocol OSPF IS-IS - Advanced Distance vector routing protocol EIGRP Distance Vector Routing Protocol: Distance vector protocols usually send the complete routing table to each neighbor (a neighbor is directly connected router that runs the same routing protocol). They employ some version of Bellman-Ford algorithm to calculate the best routes. Compared with link state routing protocols. Distance vector protocols are easier to configure and require little management, but are susceptible to routing loops and converge slower than the link s...

What is LLDP? - Benefits of Link Layer Discovery Protocol

What is LLDP? The link layer discovery protocol ( LLDP ) is an open and extendable part of the Internet protocol suite used in IEEE 802 to advertise a device’s identity and abilities, as well as other devices connected within the same network. LLDP Link Layer Discovery Protocol LLDP is mainly used in wired Ethernet-connected devices to facilitate management of network resources and simplify networking tasks for administrators in a multi-vendor network. The protocol’s multi-vendor support enables network discovery of devices and management tools like Simple Network Management Protocol (SNMP) in a network made up of devices from different manufacturers. LLDP makes it unnecessary to use a larger number of proprietary protocols to support a multi-vendor network or, on the other hand, limit oneself to the hardware of a single vendor. LLDP is also known as Station and Media Access Control Connectivity Discovery, as specified in IEEE 802.1AB. Simil...

Do you know about NTP and How to Configure NTP in the network?

The Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. NTP is designed to synchronize the clocks on computers and networks across the Internet or Local Area Networks (LANs).  NTP analyses the timestamp values including the frequency of errors and the stability. A NTP server will maintain an estimate of the quality of its reference clocks and of itself. Network Time Protocol - NTP How to Synchronize NTP with time? NTP server usually receives its time from a trustworthy time source, such as a radio clock attached to a time server, and then distributes this time across the network. NTP is extremely efficient and there is no more than one packet per minute is necessary to synchronize two machines to within a millisecond of each other The NTP client initiates a time-request exchange with the NTP server. As a result of this exchange, the client is able to calculate the link d...

What is WPA? - Explain about Wifi Protected Access

WiFi Protected Access WPA is a security protocol designed to create secure wireless (Wi-Fi) networks. It is similar to the WEP protocol, but offers improvements in the way it handles security keys and the way users are authorized. Wifi Protected Access WPA referred to as the draft IEEE 802.11i standard became available in 2003. The Wi-Fi Alliance made it as an intermediate measure in anticipation of the availability of the more secure and complex WPA2, which became available in 2004 which is a common shorthand for the full IEEE 802.11i (or IEEE 802.11i-2004) standard. For an encrypted data transfer to work, both systems on the beginning and end of a data transfer must use the same encryption/decryption key. While WEP provides each authorized system with the same key, WPA uses the temporal key integrity protocol (TKIP), which dynamically changes the key that the systems use. This prevents intruders from creating their own encryption key to match the one used by the secure network...

What is Zero Touch Provisioning (ZTP)?

Zero touch provisioning or so called ZTP is the way to automatic configuration on Cisco vEdge devices for which almost zero manual intervention required. If we talk about the Zero touch provisioning, Networking traditionally has been a complex and manual for IT. The advent of SDN changed it all. Out of all benefits of SD-WAN, ZTP is among the top three. With ZTP, networking is automated and an intent driven process. Zero touch provisioning is a switch, that simplifies provisioning and configuration of devices automatically without any manual intervention. The switch (ZTP) downloads and runs the centrally stored configuration, which it acquires by sending a request through DHCP or TFTP. ZTP seamlessly allows IT to update OSs, deploy patches and bug fixes and embed additional features prior to connection. Using Scripts, ZTP can also connect to configuration management platforms or a custom tool. ZTP relies on below service which are: A license file provided ...

What is GLBP? Explain the configuration of Gateway Load Balancing Protocol.

Gateway Load Balancing Protocol (GLBP) is a Cisco proprietary protocol that attempts to overcome the limitations of existing redundant router protocols by adding basic load balancing functionality. In addition to being able to set priorities on different gateway routers, GLBP allows a weighting parameter to be set. Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) is one of First Hop Redundancy Protocol (FHRP) which provides redundancy like other First Hop Redundancy Protocol, also provides load Balancing. It is a Cisco proprietary protocol which can perform both functions. It provides load Balancing over multiple routers using single virtual IP address and multiple virtual Mac address. GLBP allow automatic selection and simultaneous recovery from first hop router failures. GLBP provides load balancing over multiple (router) gateways using a single virtual IP address and multiple virtual MAC addresses. The bandwidth/traffic load is shared between multiple ro...

How to configure IPSEC static route?

Secure data traffic flow between vEdges, IPSEC is the mode of transport for data traffic to flow from one vEdge to another vEdge as overlay network. IPsec tunnels that run the Internet Key Exchange (IKE) protocol provide authentication and encryption to ensure secure packet transport. Internet Protocol Security is a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks. Tunnel Redundancy: The interface is the IPsec tunnel interface in VPN 0. You can configure one or two IPsec tunnel interfaces. If you configure two, the first is the primary IPsec tunnel, and the second is the backup. With two interfaces, all packets are sent only to the primary tunnel. If that tunnel fails, all packets are then sent to the secondary tunnel. If the primary tunnel comes back up, all traffic is moved back to the primary IPsec tunnel...