Documente Academic
Documente Profesional
Documente Cultură
Section 1
XX
modification
observation
A
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
Topics at a Glance
log/
alert
Denied
Filtering
VPN
Network Functionality
7 Application
6 Presentation
5 Session
4 Transport
3
2
1
Network
Data Link
Physical
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
___ segments
_________________
___ bits
_________________
___ frames
___ packets/datagrams
___ , ___ and ___ messages (another generic term)
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Datalink
1 Physical
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Datalink
1 Physical
En-/De-capsulation
Transport
Internet
2 NW Intface
1 Physical
10
Metric abbreviations:
5 Application
4
3
TCP/IP
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Datalink
1 Physical
11
a thousand bps
a million bps
a billion bps
a trillion bps
12
Bandwidth in Perspective
LAN Topologies
Only three basic (practical) types
________: Data travels through every NIC
OC-1 (52Mbps)
T-3 (45Mbps)
PC
NIC
OC-24
(~1.25Gbps)
PC
NIC
V.90 56K
modem
(~50Kbps)
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
NIC
NIC
PC
PC
NIC
NIC
NIC
NIC
NIC
NIC
PC
PC
PC
PC
14
Switch
LAN Topologies
PC
NIC
13
LAN Topologies
PC
PC
NIC
15
16
LAN Topologies
LAN Topologies
PC
PC
PC
PC
PC
PC
PC
PC
PC
PC
PC
Answer: ______________________
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
17
18
LAN Topologies
LAN Topologies
To PC
Ring in
a box
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
19
20
LAN Topologies
LAN Topologies
If it is a switch then we have a star
To PC
To PC
21
LAN Topologies
PC
Repeater? ___
Hub
or
Switch
PC
22
PC
Router? ___
Hub? ___
PC
PC
Switch? ___
23
24
Collision Domain
C
C
H
C
These two
networks
behave the
same way
C
C
C
C
25
Repeater
011001001
H
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
26
Bridge
27
28
Switch
Switch
Host Port
H
CD
29
CA
H
CD
CB
CC
Host Port
A
1
C
3
CB
Event: CA sends to CD
Event: CC sends to CB
30
Switch
CC
CC
CB
Host Port
A
1
CD
Switch
CA
CA
Switchs Table
Switchs Table
31
32
Switch
S
CA
H
CD
CC
Switch
Host Port
A
1
C
3
D
1
CA
H
CD
CB
Event: CB sends to CD
33
Switch
H
S
1
CC
CB
Event: CD sends to CA
CA
Host Port
A
1
C
3
D
1
B
2
CD
CC
34
Switch
Table entries will eventually age
out unless more traffic is received
What if...
Host Port
A
1
C
3
D
1
B
2
CB
Event: CC sends to CB
Switch Action: _______ ?
Switchs Table
Switchs Table
35
36
Switch
S
CA
H
CC
CD
CB
Host Port
A
1
C
3
D
1
B
2
A
2?
CA
H
CD
Think through
this attack-chain
using CIA
CB
CC
E,F,G,H,I,ZZZ
B is an attacker who
spoofs ~thousands (or
however many are
necessary) of MACs.
E
F
G
H
I
.
.
.
ZZZ
Port
2
2
2
2
2
.
.
.
2
Switch Table
____________________________ ?
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
37
Broadcast Domain
38
Gateway
Unlike hubs, switches can intelligently block or forward based upon layer
2 (hardware) addresses
The result, is that each port on a
switch is a separate collision domain
However if a device on a switch sends
a limited __________________ packet,
this will be flooded out every port
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
39
40
10
Router
Router
41
Router(R) vs Switch(S)
I connect hosts at
layer 2, thus I
create networks
I connect networks at
layer 3, thus I create
internetworks
Router
Routers are multi-lingual when it comes to
protocols. They make Internetworking possible!
NW1
Ethernet LAN
running IP
FDDI LAN
S
H1
H2
NW3
...
R
Frame Relay
WAN
Hn
Ethernet LAN
running IPX
NW2
Switches are generally NOT multi-lingual;
however translational switches do exist
42
43
44
11
Aka IP Switch
Aka Router Switch
Aka Switch Router... you get the idea
Its actually a ____________
But is built using _________ technology
Basically, this means that routing
decision are made in ______________
rather than_______________
45
46
ASIC
Layer 2 Addressing
An industry trend !
ASIC = _________________________
Idea is to move functionality from
software into hardware
Hardware runs at ________ speed
and will always beat software since it
does not incur the penalty of all those
memory lookups & inst. decodings
Market demand justifies development
Each NIC (not necessarily each computer) has a factory built-in hardware
address
The hardware address is the layer 2
address
It is also called the _____ address
MAC addresses are ___ bits in length
which is ___ hex digits in length
47
48
12
Layer 2 Addressing
Preamble
digits
49
46-1500
46-1500
4
CRC
50
Ethernet Frame
Ethernet Frame
Preamble
synchronizes
hardware for
transmission
of frame... we
can think of it
as the layer 1
header
3COM Corp.
payload
Just a few of
the more
popular L-3
protocols
46-1500
51
52
13
Layer 3 Addressing
Layer 3 Addressing
53
Layer 3 Addressing
Layer 3 Addressing
A network part
Possibly a subnet part
A host part
54
55
Class A:
Class B:
Class C:
Class D:
Class E:
N.H.H.H
More networks...
N.N.H.H
less hosts per
network
N.N.N.H
Reserved for Multicasting
Reserved for Future Use
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
56
14
Layer 3 Classes
Layer 3 Classes
128
57
Layer 3 Classes
64
32
16
Layer 3 Classes
18610 = 1 0 1 1 1 0 1 0 2
So its a class B address
What is the network address in this
class B IP address example
Ans: 186.56.0.0
What is the host address in this
example?
Ans: ______
Ans: 186.56.209.32
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
58
59
60
15
Layer 3 Addressing
Layer 3 Addressing
200.100.50.25
class C mask
61
Layer 3 Addressing
11001000.01100100.00110010.00011001
Mask?
NW addr
62
Layer 3 Addressing
64
16
Layer 3 Addressing
Layer 3 Addressing
65
Layer 3 Addressing
66
Layer 3 Addressing
200
200
96
IP addr
11001000.11001000.11001000.01100000
Mask?
11111111.11111111.11111111.11100000
67
68
17
Layer 3 Addressing
Layer 3 Addressing
11111111.11111111.11111111.11100000
11001000.11001000.11001000.011*****
200
200
200
.011 * * * * *
11111111.11111111.11111111.11100000
200.200.200.97 through
200.200.200.126
69
Layer 3 Addressing
96+00001 = 97
through
96+11110 = 126
70
Layer 3 Addressing
11001000.11001000.11001000.01111111
11001000.11001000.11001000.01100000
11111111.11111111.11111111.11100000
11111111.11111111.11111111.11100000
Ans: 200.200.200._____
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
Ans: _____._____._____._____
71
72
18
Layer 3 Addressing
= 12810 = /25
= 19210 = /26
= 22410 = /27
= 24010 = /28
= 24810 = /29
= 25210 = /30
= 25410 = /31
73
Some Special
IP Addresses
Seven you should know about:
1. The network address: e.g., N.N.0.0
2. Directed broadcast: e.g., N.N.N.255
3. Limited broadcast: 255.255.255.255
Sent to all hosts on this network, i.e.,
the network of origin. Example of
usage? ________
4. The this host or the I dont have an IP
IP address: 0.0.0.0. Example of
usage? ________
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
75
74
Some Special
IP Addresses
5. The loopback address: 127.*.*.* For debugging purposes allows a single machine
to test its protocol stack by talking to itself
6. The IPv4 Link-Local address space:
169.254.*.* for hosts that fail to get an IP
from DHCP server. (RFC 3927)
7. The private address space (RFC 1918)
- Class A: 10.*.*.*
- Class B: 172.16.*.* 172.31.*.*
- Class C: 192.168.*.*
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
76
19
77
131.120.0.1
Router
Server on
Internet
212.74.206.47
Registered IPs
Host in
intranet
212.74.206.28
Un-registered IP
78
The Internet
79
80
20
NAT
Pool of
Public IPs
210.46.10.5
210.46.10.6
210.46.10.7
210.46.10.8
NAT
Private IPs
10.3.X.X /16
10.3.6.19
10.3.5.26
Local Router
(running NAT)
210.46.10.6
210.46.10.5
Data
Data
Data
Router
keeps a
table of
public-toprivate IP
mappings
No
No
Yes
Yes
210.46.10.5
210.46.10.6
210.46.10.7
210.46.10.8
10.3.5.26
10.3.6.19
---.---.---.-----.---.---.---
Data
Public
Internet
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
Local Router
(running NAT)
81
NAT
82
PAT
Private IPs
10.3.X.X /16
Public IP
210.46.10.5
Local Router
(running PAT)
Public
Internet
83
source port
number
84
21
PAT
Router
keeps a
table of
externalport-tointernalIP:port
mappings
From: 1.2.3.25
To:
1.2.5.17
2610
2611
2612
2613
Unicast
10.3.5.26 : 3705
10.3.6.19 : 4912
---.---.---.-----.---.---.---
Switch
Router
Switch
Hub
1.2.5.0 /24
1.2.3.0 /24
Local Router
(running PAT)
1.2.4.0 /24
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
From: 1.2.3.25
To:
224.4.8.6
85
Multicast
From: 1.2.3.25
To:
1.2.5.255
86
Broadcast
What kind of
broadcast is
this?
Switch
Router
Hub
Switch
Switch
Hub
1.2.5.0 /24
1.2.3.0 /24
Router
Switch
1.2.5.0 /24
1.2.3.0 /24
1.2.4.0 /24
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
1.2.4.0 /24
87
88
22
From: 1.2.3.25
To: 255.255.255.255
_?
Broadcast
What kind of
broadcast is
this?
Switch
Router
Collision/Broadcast
Domains
How many collision domains
here? _______
Switch
hub
Hub
1.2.5.0 /24
1.2.3.0 /24
This is a
a) LAN?
b) segment?
c) network?
d) internetwork?
1.2.4.0 /24
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
89
Collision/Broadcast
Domains
Collision/Broadcast
Domains
hub
switch
router
hub
This is a
a) LAN?
b) segment?
c) network?
d) internetwork?
switch
90
91
router
hub
92
23
Collision/Broadcast
Domains
Layer 4 (Transport)
Layer 3 (IP) provides no guarantee of
message delivery
Layer 3 simply provides an address
infrastructure for best-effort
delivery by routers
If a message is lost, IP wont tell
you... because it wont know
The responsibility of tracking
message delivery is pushed up to
layer 4, the TCP part of TCP/IP
93
Layer 4 (Transport)
94
95
Packet-Switching
Message divided into packets
Packets need not travel the
same node-to-node path
through the network
Circuit-Switching
Message may or may not get
divided into separate packets
Path will be established
before transmission
All data will travel the same path
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
96
24
Packet Switching
Packet Switching
C
1of3
H1
2of3
HE
C
H2
97
Packet Switching
H1
LL
C
C
3of3
H2
O!
LL
C
H2
98
Packet Switching
H1
99
100
25
Circuit Switching
Circuit Switching
HELLO!
C
H1
101
H2
102
Frame Relay and ATM (Asynchronous Transfer Mode) are two such
technologies that works this way
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
Fm:H1
C
Fm:H1
H1
O!
Fm:H1 HE
C
103
LL
H2
104
26
Connection vs Connectionless
Meet me at
12:30
TCP/IP
Connection-oriented
The sending TCP host numbers the
packets and sets timer at time of packet
transmission
The receiving TCP host reorders and
accounts for packets
Receiving TCP acks received packets
If timer expires before ack is received,
sending TCP re-trasmits that packet
UDP
TCP
105
Layer 4 (Transport)
106
UDP/IP
UDP is Connectionless
Packets are not numbered
No accounting of packets
Send and assume reception
If not received . . . UDP doesnt care, let
the higher layers figure it out order a retransmission if its important enough
Layer 4 (Transport)
107
108
27
Some Well-Known
Ports
109
Ports
>1024
2340
8045
3992
Ports
<1024
1.2.3.1
Ports
<1024
Ports
>1024
Ports
>1024
4807
Ports
<1024
25
23
80
1.2.3.2
1.2.3.3
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
21
22
23
25
53
67/68
69
80
110
123
137139
143
161
443
110
Client
Server
20
Ports
<1024
1.2.3.4
111
112
28
Host B
Seq#: 327
Ack#: 0
Flag: Syn
Win:
Initial
Sequence
Numbers
are sent in the
Syn
packets
Seq#: 477
Ack#: 328
Flag: Syn/Ack
Win: 1000
Seq#: 328
Ack#: 478
Flag: Ack
Win: 600
time
time
113
As timer
expires, so A
resends the
packet
time
114
Host B
115
116
29
Host B
Seq#: 328
Ack#: 478
Flag: Ack
Win: 600
Seq#: 478
Ack#: 428
Flag: Ack
Win: 900
Seq#: 428
Ack#: 478
Flag: Ack
Win: 600
time
What should
A ack now?
___________
117
Ack# ______
time
time
time
time
Seq#: 720
Ack#: 1228
Flag: Ack
Win: 1000
118
Seq#: 620
Ack#: 1228
Flag:Ack
Win: 1000
Seq#: 620
Ack#: 1228
Flag: Ack
Win: 1000
Host B
Seq#: 1228
Ack#: 620
Flag:Ack
Win: 700
Host A
Seq#: 1028
Ack#: 520
Flag:Ack
Win: 800
Seq#: 478
Ack#: _____ ?
Flag: Ack
Win: 700
time
Seq#: 628
Ack#: 520
Flag:Ack
Win: 558
3-way handshake
Client sends Fin-Ack (client finished sending)
Server sends Fin-Ack (server finished sending too)
Client sends Ack
B will keep
receiving Ack
620 from A, and
will realize that that
segment mustve
been lost.
119
4-way handshake
120
30
ICMP
ICMP
121
122
ping
(ttl=1)
ping
(ttl=2)
ping
(ttl=3)
3 <10 ms
10 ms <10 ms 131.120.248.3
10
70 ms
70 ms
70 ms webster.usna.edu [131.122.220.30]
Trace complete.
1.2.3.4
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
123
124
31
Application
Example:
_______ # 25
SMTP
TCP
?
IP
Example:
______# 0x0800
IPv4
Example:
___________ # 6
TCP
Ethernet
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
125
126
ARP
127
32
ARP
ARP
129
Routing a Packet
Bob
Bob
IP
Various
Layer 2
Routing a Packet
Pass data
down to
layer 3
App/Data
TCP
Determine
local subnet
address
Compare local
subnet addr to
destination IP
Sam
Error
Internet
Is there a
default route
No
entry
Yes
Send to DGW router
(ARP if necessary)
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
130
131
Route
entry for dest
network?
No
No
Yes
Check ARP cache or
ARP for the appropriate
GW router
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
Are
they the
same?
Yes
Check ARP
cache or ARP
for dest MAC
132
33
Bob
Default
Gateway
Router
Internet
Data
switch
Switch Action
Port #s
Data
Port #s
Data
Port #s
Data
. . . 10010101000101101001001011111101010 . . .
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
...
on Port
7
3
2
134
Dest MAC .
MAC-ISPRtr
Layer 3
Fm: MAC-DGW To: MAC-ISPRtr
133
Router Action
Dest Network
Interface#
NW-Prefix IP-Sam ethernet 1
. . . other entries . . .
MAC
Rob
Alice
DGW
Layer 3
Layer 2
Layer 2
Layer 2
S D
P o w er
C IS C O
S YST EM S
C is c o A S 5 8 0 0
S E R IE S
135
136
34
Internet
Legend
Thats me,
my MAC is
MAC-Sam
Sam
Listen up... if
any of you owns
IP address
IP-Sam ? Tell
me your MAC
5 App
SMTP
SMTP
4 Src
4 Dest
3567
25
3567
25
3 Src
3 Dest
IPC
IPM
2 Src
2 Dest
MACC
MACR
MACC
MACR
IPC
IPM
IPC
IPM
MACR
MACM
MACR
MACM
1 Media
137
138
DNS
Legend
5 App
POP3
POP3
4 Src
4 Dest
110
29034
110
29034
3 Src
3 Dest
IPM
IPC
IPM
IPC
IPM
IPC
2 Src
2 Dest
MACM
MACR
MACR
MACC
MACR
MACC
DNS = _________________________
Related to ARP in that it is also a
resolution protocol
ARP = _________ resolution
DNS = _________ resolution
Specifically: DNS = map (Name IP)
Why do we have such a mechanism?
1 Media
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
139
140
35
DNS Summary
vulcan.cs.nps.navy.mil.
individual
machine
name
DNS Summary
root
{ Name space }
With exception
of top level
domain, fully
flexible
fully qualified
domain name
(fqdn)
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
141
DNS... a
hierarchically
distributed
database
of fqdn:IP
mappings
W.X.Y.Z
{ IP space }
Fixed 4 octet
number space,
but flexible via
variable length
masks
142
DNS
System
fqdn
We know the
address of
all the root
DNS servers
and all DNS
servers one
level below
us
Non-Root
Server
Non-Root
Server
Client
143
144
36
DNS Resolution
Each
networked
machine must
be told where
to find its DNS
server.
Note this IP
address does
not have to be
local
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
145
3
4
Domain Server
.usma
Root Server
.mil
Domain Server
.usma
Domain Server
.navy
Domain Server
.nps
Client
Herrmann
Client
.Patton
3
Domain Server
.army
Domain Server
.nps
147
146
Iterative Resolution
Domain Server
.navy
8
Client
Patton
6
Domain Server
.army
9
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
Client
.Herrmann
148
37
Authoritative or Not?
Split DNS
149
150
DHCP
DHCP
DHCP = ________________________
Requires a DHCP server to lease out
available IP addresses
Allows a host to join a network and
obtain an IP address w/o administrator involvement
Permits Plug-and-Play Networking
DHCP is an improved implementation
of RARP and bootp
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
151
152
38
DHCP
Frag-men-ta-tion
153
Frag-men-ta-tion
IEEE 802.11
IEEE 802.5
1,500
1,500
154
MTU = 500
IEEE 802.3
296
PPP
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
155
156
39
Frag-men-ta-tion
The IP Header
Ver
IP Hdr 1
data 1
IP Hdr 2
IP Hdr 3
data 3
data 2
16
TTL
157
The IP Header
Identification
Flags
31
Flags
Fragment Offset
32 bits
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
158
The IP Header
Fragment Offset
24
Total Length
Protocol
Header Checksum
Source IP Address
Destination IP Address
IP Options
Padding
19
159
Identification
Flags
Fragment Offset
160
40
Assume
each letter is
8 bytes in
size
Frag-men-ta-tion
Where should fragments get
reassembled . . .
MTU
8
Router
MTU
5
Router
Assume
each letter is
8 bytes in
size
ntere
Frag Offset = 2
er
e
Frag Offset = 6
Monterey
0 1 2 34 567
Mo
Frag Offset = 0
Mo
y
nt
Frag Offset = 2
Frag Offset = 4
MTU
2
Mo
162
Frag-men-ta-tion
MTU
2
MTU
2
er
MTU
5
re
Monte
Monterey
161
nt
ntere
MTU
8
Frag-men-ta-tion
Monterey
nt
rey
Mo
Assume
each letter is
8 bytes in
size
Frag-men-ta-tion
163
Frag Offset = 7
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
Mo
Frag Offset = 0
y
Frag Offset = 7
164
41
Frag-men-ta-tion
Oh great, I never
received
fragment offset 6
Mo
Now what do I
do?
er
Monterey
nt
ey
Router
MTU
8
MTU
2
165
MF TL
1 180
FO
0
MF TL
1 180
FO
80
MF
0
TL
95
FO
40
166
MF TL
1 180
FO
0
MF PL
1 160
FO
20
MF PL
1 160
FO
40
MF PL
1 160
FO
80
MF
0
PL
75
MF
TL
FO
MF
TL
FO
MF
TL
FO
MF
TL
FO
MF
PL
20x 8b
FO
MF
PL
MF
PL
320-479
FO
MF
PL
Question #3: Assuming that only one fragment is missing, what would be
the correct values for its FO, MF, and PL fields?
FO
Now subtract 20 (IP header size) from each of the TL values to get
payload lengths (PL), remember that FO is in 8-byte units (slide #199)
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
640-714
20x 8b
FO
160-319
And here are implicit byte number ranges of each fragments payload
167
MF
PL
168
42
MF PL
1 160
0-159
FO
20
MF PL
1 160
160-319
FO
40
FO
80
MF PL
1 160
320-479
VLANs
MF
0
PL
75
640-714
FO
60
MF PL
1 160
Missing fragment
480-639
Question #4: What was the total length (TL) of the original
(unfragmented) packet? ________________
VLANs
Ports 1-5
assigned to
VLAN 36
169
Ports 6-8
assigned to
VLAN 25
170
VLANs
2 separate VLANs (2 broadcast domains)
36
25
Trunk Line
25
Communications between the 2 VLANs would
require layer 3 service (e.g., a router)
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
171
25
36
36
172
43
Before . . .
After . . .
VLAN
2&3
LAN 3
Trunk Line
LAN 2
VLAN
1&3
LAN 1
VLAN
1, 2 & 3
173
174
Routing Protocols
175
176
44
Routing Protocols
Routing Protocols
My route
info
My route
info
My route
info
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
177
Routing Protocols
Routing protocol
updates from
neighbor routers
e1
I can reach
A.B.F.0 in ___ hops
A.C.0.0 in ___ hops
B.0.0.0 in ___ hops
A.B.E.0 in ___ hops
s0
A.B.E.0
178
Routing Protocols
I can reach
A.C.0.0 in 2 hops
B.0.0.0 in 3 hops
I can reach
A.B.F.0 in 1 hop
A.C.0.0 in 4 hops
s0
e0
A.B.C.0
A.B.E.0
179
e1
e0
A.B.C.0
180
45
Routing Table
s0
e0
e1
Code
C
C
R
R
R
S
To reach
A.B.C.0
A.B.E.0
A.B.F.0
A.C.0.0
B.0.0.0
default
Forward out
ethernet 0 interface
ethernet 1 interface
ethernet 1 interface
serial 0 interface
serial 0 interface
serial 0 interface
181
182
10
4
I wanna be the
root of a
shortest-path
spanning tree
8
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
13
Cool !
8
183
13
5
184
46
3
10
Cool !
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
10
185
6
8
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
13
5
186
10
3
10
4
Uh oh!
8
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
13
5
187
188
47
Convergence
Convergence
189
Routing Protocols
10
6
2
X
1
13
8
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
190
192
48
Autonomous System
?
DV Routing Protocol
193
DV Routing Protocol
Heres
what I
know
194
LS Routing Protocol
Examples:
General characteristics:
Heres
what I
know
196
49
LS Routing Protocol
LS Routing Protocol
X
A
A
197
D
A
AB link
just went
down
J.D. Fulp CISSP, ISSEP, ISSAP, CSIH
C
198
Finished
199
50