Clases
Clases
Introduction to OSPF
Open Shortest Path First (OSPF) --- includes single-area and multiarea
RIP using hop count does not scale well in larger networks with multiple paths of varying speeds
OSPF offers faster convergence and scales to much larger network implementations.
A network administrator can divide the routing domain into distinct areas that help control routing
update traffic.
A link is also a network segment that connects two routers, or a stub network such as an
Ethernet LAN that is connected to a single router
Information about the state of a link is known as a link-state. link-state information includes
network prefix, prefix length, and cost.
2. Components of OSPF
routing protocol messages to exchange route information. The messages help build data
structures, which are then processed using a routing algorithm.
Routers running OSPF exchange messages to convey(carry) routing information using five
types of packets. These packets are used to discover neighboring routers and also to exchange
routing information to maintain(continue) accurate(precise) information about the network.
1) Hello packet
OSPF messages are used to create and maintain three OSPF databases, as follows:
Database Table/creates Description
2.3. Algorithm
The SPF algorithm creates an SPF tree → calculating the shortest path to each node.
OSPF places(put) the best routes into the forwarding database, which is used to make the
routing table.
3. Link-State Operation
To maintain routing information, OSPF routers complete a generic link-state routing process to
reach(alcanzar) a state of convergence. Each link between routers is labeled with a cost value. In
OSPF, cost is used to determine the best path to the destination. The following are the link-state
routing steps that are completed by a router:
1. Establish Neighbor Adjacencies
2. Exchange Link-State Advertisements
3. Build the Link State Database
4. Execute the SPF Algorithm
5. Choose the Best Route
EIGRP supports classless routing and VLSM, route summarization, incremental updates, load
balancing and many other useful features. It is a Cisco propriatery protocol
Routers running EIGRP must become neighbors before exchanging routing information. To
establish neighbor relationships, routers send hello packets every couple of seconds.
Hello packets are sent to the multicast address of 224.0.0.10.
Note: On LAN interfaces hellos are sent every 5 seconds. On WAN interfaces every
60 seconds
Each EIGRP router stores routing and topology information in three tables:
EIGPR uses the concept of autonomous systems. An autonomous system is a set of EIGRP
enabled routers that should become EIGRP neighbors. Each router inside an autonomous
system must have the same autonomous system number configured, otherwise routers will not
become neighbors.
The following fields in a hello packet must be the identical in order for routers to
become neighbors:
● ASN (autonomous system number)
● subnet number
● K values (components of metric)
Routers consider the neighbor to be down after a hold-down timer has expired. Hold-
down timer is, by default, three times the hello interval. On the LAN network the hold-
down timer is 15 seconds.
Two terms that you will often encounter when working with EIGRP are feasible and
reported distance. Let’s clarify these terms:
● Feasible distance (FD) – the metric of the best route to reach a network.
That route will be listed in the routing table.
● Reported distance (RD) – the metric advertised by a neighboring router for a
specific route. In other words, it is the metric of the route used by the
neighboring router to reach the network.
EIGRP has been configured on R1 and R2. R2 is directly connected to the subnet
10.0.1.0/24 and advertises that subnet into EIGRP. Let’s say that R2’s metric to
reach that subnet is 28160. When the subnet is advertised to R1, R2 informs R1 that
its metric to reach 10.0.1.0/24 is 28160. From the R1’s perspective that metric is
considered to be the reported distance for that route. R1 receives the update and
adds the metric to the neighbor to the reported distance. That metric is called the
feasible distance and is stored in R1’s routing table (30720 in our case).
A successor is the route with the best metric to reach a destination. That route is
stored in the routing table. A feasible successor is a backup path to reach that
same destination that can be used immediately if the successor route fails. These
backup routes are stored in the topology table.
R1 has two paths to reach the subnet 10.0.0.0/24. The path through R2 has the best
metric (20) and it is stored in the R1’s routing table. The other route, through R3, is a
feasible successor route, because the feasiblility condition has been met (R3’s
advertised distance of 15 is less than R1’s feasible distance of 20). R1 stores that
route in the topology table. This route can be immediately used if the primary route
fails.
OUT — Puppet
With traditional networking, you can only manage network devices one at a time
using SSH to the command line. This process is time-consuming, labor-intensive,
and prone to human error. While this can work well in smaller networks, it does not
work well in a large enterprise and does not also scale very well.
While SNMP uses MIB and OID to collects useful data and can also be used to push
configuration to devices, it does not build for real-time programmatic access and has
limited functionality.
SNMP also has security concerns and can be complex to implement and operate.
● Scalability Issues
● Management Complexity
● Slower Issue Resolution
Controller-Based Networks
Only controller-based networks decouple the control plane and the data plane.
Note:
Controllers can also provide central aggregation points for monitoring and data
analytics for more visibility and easier troubleshooting.
DNA Center can be the “controller” or single pane of glass for deploying and
managing on-premises Cisco networks including routing, switching, Software
Defined Wireless Area Network (SD-WAN), and security devices like Cisco Identity
Services Engine (ISE) and Firepower
The Cisco Digital Network Architecture (DNA) Center is an SDN controller that is
used to support Cisco’s Software-Defined Access for network automation. The DNA
Center provides centralized management on your system, automates configuration
changes, and performs analysis of the devices
Cisco DNA Center Assurance is a tool for monitoring and network management. It
monitors traffic statistics, the health status of the network, and an overview of all
issues in the network. It also correlates issues and provides recommendations on
what may cause such network issues to help you assist in diagnosing and
troubleshooting.
Cisco DNA Center also enhances network visibility use that visibility to improve
performance, It enables proactive prediction of network-related and security-related
risks by using telemetry to improve the performance of the network.
It support numerous extensibility options including cross domain adapters and third -
party SDKs
Network programmability
Git: is a distributed version control system that tracks changes in source code and
files.
1. Self-describing
2. Simplicity and compact
3. Ease in learning and understanding
Data representation
its simplicity in sharing and storing data. A nested textual format that is human-
readable and can also be edited using a schema-based validation used in metadata
applications and web publishing and services transfer of data.
A lightweight text human-readable format that supports comments and is really easy
to edit. Considered as a superset of JSON that supports complex data types that
enable ease in mapping native data structures. The structured data is used in
configuration settings, Apps that require MySQL self-references in relational data,
and document headers. The serialized data is so readable that even the content of
the front page is displayed in YAML.
Perks(advantages) :
The two main types of APIs used for web service that runs over the Internet and
typically use HTTP/HTTPS are SOAP and REST.
SOAP APIs are standard communication protocol systems that permit different
operating systems like Linux and Windows to communicate. It is commonly used
with HTTP transport with XML data format to access web services
is an architecture style for designing a distributed system that gives guidelines for the
structure and organization of an API for web service. REST is protocol-independent.
It supports any transport and data format like HTTP/S transport and JavaScript
Object Notation (JSON) or XML data format.
NOTE
Unlike SOAP protocol, REST APIs do not require a new message format. The HTTP
API is CRUD (Create, Retrieve, Update, and Delete).
Encoding methods : JSON y XML
The NETCONF protocol enables the device to expose an entire formal Application
Programming Interface (API). Applications can use this straightforward API to send
and receive full and partial configuration data sets.
The protocol messages are also in XML and the mandatory transport protocol for
NETCONF is through the Secure Shell Transport Layer Protocol (SSH).
NETCONF uses a remote procedure calls (RPC) model wherein the client inputs an
RPC in XML and forwards it to a server utilizing a secure, connection-oriented
session.
YANG
YANG is a data modeling language for NETCONF as per RFC 6020. It is used to
model configuration and state data manipulated by NETCONF, NETCONF RPCs,
and notifications.
RESTCONF
RESTCONF is a protocol defined based on HTTP used for configuring data defined
in YANG using the datastore concepts defined in the NETCONF. RESTCONF uses
HTTP methods to provide Create, Read, Update, Delete (CRUD) operations on a
conceptual datastore comprising YANG-defined data, which is compatible with a
server that administers NETCONF datastores.
Ansible
Chef
The Chef Server is the device that manages all the nodes on the network, while
Chef Client is the node that the chef server is managing.
The collection of codes or files in Chef is called Cookbook. Recipe is the code
being deployed on making configuration changes, and Chef Workstation is where
users interact with the management tools for network configuration and create
codes/instructions.
Puppet
typically uses an agent-based architecture for managing the network. support both
agent and agentless architecture.
When using agentless architecture, the external agent will use SSH to communicate
with the node (network device)
The Puppet Master machine is the device that manages all the nodes on the
network, while Puppet Agent is the node
The collection of codes or files in Puppet is called Module. Manifest is the code
being deployed on making configuration changes, and Puppet Console is where
users interact with a configuration management tool to create a block of code or
instruction
CRUD is short for CREATE, READ, UPDATE and DELETE operations. Only
UPDATE operation modifies an existing table or view so it is equivalent to PUT and
PATCH in HTTP methods.
PUT: fully update (i.e. replace) an existing record
PATCH: update part of an existing record
PUT is similar to POST in that it can create resources, but it does so when there is a
defined URL wherein PUT replaces the entire resource if it exists or creates new if it
does not exist.
Unlike PUT Request, PATCH does partial update. Fields that need to be updated by
the client, only that field is updated without modifying the other field.
REpresentational State Transfer (REST) requires that a client make a request to the
server in order to retrieve or modify data on the server
GET: retrieve data POST: create data PUT: fully update (i.e. replace) an existing
record PATCH: update part of an existing record DELETE: delete records
Sylog
Emergency : The most severe and results in the system being considered
unusable(inutilizable)
● Delay
● Jitter
● Packet loss
● Packet sequencing
● Path
● Connectivity
● Website and server download time
● Voice quality scores
The protocol determines whether the QoS on the network is sufficient to support IP
services