RAS English Course
RAS English Course
2025
General Introduction to the Advanced Network & Security course
The Advanced Network & Security course for students enrolled in the Master 1 – Data
Science and Intelligent Systems program, in the Department of Software Technologies and
Information Systems. This course aims to provide in-depth knowledge and practical skills in the
field of computer networks, with a strong focus on advanced networking protocols, security
mechanisms, and modern addressing schemes.
By the end of this course, students are expected to have a solid understanding of the underlying
mechanisms of complex network infrastructures and be capable of configuring and managing
advanced network components. This knowledge will serve as a critical foundation for future
work in data-driven systems, cybersecurity, and intelligent network design.
General Introduction to the Advanced Network & Security course
The Advanced Network & Security course for students enrolled in the Master 1 – Data
Science and Intelligent Systems program, in the Department of Software Technologies and
Information Systems. This course aims to provide in-depth knowledge and practical skills in the
field of computer networks, with a strong focus on advanced networking protocols, security
mechanisms, and modern addressing schemes.
By the end of this course, students are expected to have a solid understanding of the underlying
mechanisms of complex network infrastructures and be capable of configuring and managing
advanced network components. This knowledge will serve as a critical foundation for future
work in data-driven systems, cybersecurity, and intelligent network design.
Ministère de l’Enseignement
1. Introduction to Routing
1.1 Definition
Routing is one of the main functionalities of the IP (network) layer. It involves choosing
how to transmit an IP datagram across various networks. Thus, a router will forward datagrams
received on one of its interfaces to another, whereas a computer will be either the initial
sender or the final recipient of a datagram.
In general, we distinguish:
Direct delivery, which refers to the transfer of a datagram between two computers on
the same network.
Indirect delivery, which is used in all other cases, i.e., when at least one router
separates the initial sender and the final recipient.
A routed protocol is a network protocol whose network layer address provides enough
information to enable a packet to be routed from one machine to another.
Routed protocols define the format of the fields in a packet. Typically, packets are routed
from one end system to another. The Internet Protocol (IP) is an example of a routed protocol.
Routing protocols support a routed protocol by providing mechanisms for sharing routing
information. Routers exchange routing protocol messages.
A routing protocol enables routers to communicate with each other to update and manage their
routing tables.
Examples of TCP/IP routing protocols:
• Routing Information Protocol (RIP)
• Interior Gateway Routing Protocol (IGRP)
• Enhanced Interior Gateway Routing Protocol (EIGRP)
• Open Shortest Path First (OSPF)
The router's network layer process examines the header of the incoming packet to determine
the destination network, and then consults the routing table, which maps networks to outgoing
interfaces.
The packet is re-encapsulated into the appropriate data link frame for the selected interface, and
then queued for transmission to the next hop along the path. This process occurs every time a
packet is forwarded through another router (Fig 1).
When the packet reaches the router connected to the destination machine's network. It is
encapsulated in the type of data link frame used by the destination LAN network, and then
delivered to the destination machine.
1.4.1 Static Routes: Information about static routes is managed manually by a network
administrator who records them in a router's configuration. The administrator must manually
update static route entries whenever a change in the internetwork topology requires it.
1.4.2 Dynamic Routes: Information about dynamic routes is managed differently. Once a
network administrator has entered the configuration commands to enable dynamic routing,
Route information is updated automatically by a routing process whenever the internetwork
sends new information. Changes to dynamic route information are exchanged between routers
as an integral part of the update process.
2. The Router
A router is just like any other computer. Routers share many hardware and software
components with other computers: Processor, RAM, ROM and Operating System.
The main function of a router is to direct packets destined for local and remote networks by:
• Determining the best path for sending the packets,
• Forwarding the packets to their destination.
The router uses its routing table to determine the best path for forwarding the packet. When
the router receives a packet, it examines the destination IP address and looks up the most
appropriate network address in the routing table.
The routing table also contains the interface to be used for forwarding the packet. Once a
match is found, the router encapsulates the IP packet in the data link frame of the outgoing
interface, and the packet is then forwarded to its destination.
RAM is a volatile memory: it loses its content when the router is powered off or restarted.
However, the router also contains permanent storage areas, such as ROM, flash, and NVRAM.
During this self-test, the router runs diagnostics from read-only memory on various hardware
components, including the processor, RAM, and non-volatile RAM. Once the POST is
completed, the router executes the bootloader program.
Routing is one of the main features of the IP (network) layer. It involves selecting the method
for transmitting an IP datagram across various networks. Thus, a router will forward
datagrams received on one of its interfaces to another, while a computer will either be the
initial sender or the final recipient of a datagram.
In general, we distinguish direct delivery, which refers to the transfer of a datagram between
two computers on the same network. Connecting the router to the local network (Ethernet,
Fast Ethernet, Gigabit Ethernet): It has a MAC address and its own IP address and An ARP
cache is associated with each LAN interface. And indirect delivery, which is implemented in
all other cases, meaning when at least one router separates the initial sender and the final
recipient. Connecting routers to external wide area networks (Serial, ADSL, Gigabit
Ethernet): Each WAN interface has its own IP address and the layer 2 addresses depending on
the technology (encapsulation) used.
Examples of metrics used by some (dynamic routing protocols): Hop count: The number of
routers to reach the destination network and Bandwidth: The speed of the link.
A router can obtain information about remote networks based on its configuration:
Manually, from static routes configured by the network administrator.
Automatically, from a dynamic routing protocol (this protocol is configured on the
router).
Advantages of Static Routing: Easy to configure and More secure.
Disadvantages of Static Routing: Risk of configuration errors, Manual route updates and
Maintenance becomes difficult as small networks expand.
In Router 1:
Dynamic routing allows routers to automatically learn and exchange routing information with each
other, without manual configuration. Dynamic routing protocols can be classified based on two main
criteria:
Advantages: Dynamically share information between routers about remote networks, discover
remote networks, update routing tables whenever a topology is modified and determine the best
path to each destination.
Disadvantages: Consume processor time and network link bandwidth and security issues.
Algorithm: To determine the best path, Example: RIP: Bellman, OSPF: Dijkstra and EIGRP: DUAL
Convergence refers to when the routing tables of all routers are perfectly consistent.
Time (Convergence) = Time (Detection) + Time (Transmission) + Time (New Path Calculation) + Time
(Routing Table Update).
A network is not fully operational until it has converged. RIP takes longer to converge, while EIGRP and
OSPF are faster.
• IGP (Interior Gateway Protocol): Routing protocols that operate within an AS (Autonomous
System). Examples: RIP, OSPF, and EIGRP.
• EGP (Exterior Gateway Protocol): Routing protocol that operates between ASs. Example:
BGP.
• Border Gateway Protocol (BGP) is an external routing exchange protocol (an EGP), used
notably on the Internet.
In general, routing protocols do not have knowledge of the entire network topology or the complete
path to the destination. For this reason, regular updates are sent, even if there is no change in the
topology. These updates are sent to neighboring routers via broadcast to the address
255.255.255.255 and updates contain the entire routing table
RIP Characteristics: It work with Distance Vector Routing Protocol. In addition, the metric used is
Number of hops (Maximum hop count: 15) and Administrative distance: 120.
The Broadcast update every 30 seconds, and It Does not support CIDR. The Classful (In RIP version
1), subnet mask information is not included in updates
Cold start
Initial exchange
Next periodic update
a) Network Discovery – Cold Start: The router initially detects its own directly connected networks.
a) Sending Hello Packets to Neighbors: Each router is responsible for detecting its
neighbors on directly connected networks. Routers using link-state routing protocols utilize
the Hello protocol to detect neighbors.
b) Creating Link-State Packets (LSP): Each router constructs its own LSP containing: The
state of each directly connected link and Includes information such as router ID, link type, and
cost.
Fig 19. Creating Link-State Packets (LSP)
c) Flooding LSPs: Once the LSPs are created, they are transmitted to neighbors. The neighbor
retransmits them to its neighbors (flooding). LSP packets are sent at router startup or routing
process startup, when there is a topology change.
ІI
Routing is one of the main functions of a router. The implementation of rules for traffic filtering is
also a function performed at Layer 3 of the OSI model. Access Control Lists (ACLs) allow network
traffic to be permitted or denied. They can be based on several parameters,
ACLs (Access Control Lists) allow packets to be filtered based on user-defined criteria.
To summarize: Rules are tested one after another. If no rule is applicable, the packet is rejected.
Defining a Rule:
access-list number [deny | permit] source [source-wildcard]
To Display ACLs:
show access-lists [number | name] : displays all ACLs regardless of interface
show ip access-lists [number | name] : displays ACLs related only to the IP protocol
2.1 Example :
Rule 1: Router 1 must not communicate with the 192.168.3.0 network, and all other traffic must be
allowed.
no access-list 1
access-list 1 deny host 192.168.1.1
access-list 1 deny host 192.168.2.1
access-list 1 permit any
interface fa0/0
ip access-group 1 out
exit
2.2 Other Request:
2.4 Notes:
1. Standard Access Control Lists must be placed as close as possible to the destination.
2. By default, each ACL has an implicit deny applied at the end of the list (deny any any).
2.5 Extended Access Control Lists allow filtering packets based on:
Destination IP address
Protocol type (TCP, UDP, ICMP, IGRP, IGMP, ...)
Source port
Destination port
...
3. Conclusion
Chapter 2 introduces essential concepts in network security, focusing on the role of Access Control
Lists (ACLs) in regulating and protecting data traffic. By understanding how ACLs are implemented
and managed, students learn to enhance network security through traffic filtering and policy
enforcement. This knowledge forms a critical part of securing enterprise
Réalisé par Mr BERKANE MOHAMED LAMINE
Chapter
In this chapter, we focuse on advanced switch configuration. We will present VLANs, the VLAN
Trunking Protocol (VTP), and the Spanning Tree Protocol (STP), which are essential for efficient
network segmentation, traffic management, and loop prevention in switched networks.
The following figure shows that the students' computers are located in one local area network (LAN),
while the faculty's computers are in another. This setup works very well because each group is
physically in the same location, making it easy to provide them with their network resources.
However, the IT department now wants to ensure that all student computers share the same security
features and bandwidth controls.
How can the network meet the common needs of geographically separated groups?
Should you create one large local area network and physically connect each group?
Would it then be easy to modify this network?
The solution for the IT department is to use a network technology called a Virtual Local Area Network
(VLAN).
A VLAN allows a network administrator to create logical groups of networked devices that behave as
if they were on a separate network, even though they share a common infrastructure with other
virtual local area networks. When configuring a VLAN, you can assign it a name that describes the
primary role of its users. For example, all the computers used by students in a school can be
configured within the “Student” VLAN.
Using virtual local area networks, you can logically segment switched networks based on functions,
services, or project teams. In the following figure, one VLAN has been created for students and another
for the faculty. These VLANs allow the network administrator to implement access and security policies
for specific user groups. For instance, the administrator can allow the faculty administration—but not
the students—to access the e-Learning management servers in order to develop online course
materials.
2.3.1 Security:
Groups containing sensitive data are separated from the rest of the network, which reduces the risk
of data breaches. Faculty computers are on VLAN 10 and are completely isolated from student and
guest data traffic.
Fig 28. Advantages of a Virtual Local Area Network
Used in small, medium, and large enterprise networks. Identified by a VLAN ID between 1 and 1005.
VLAN IDs from 1002 to 1005 are reserved for Token Ring VLANs and Fiber Distributed Data Interface
(FDDI) VLANs. VLAN IDs 1 and 1002 to 1005 are automatically created and cannot be deleted.
Configurations are stored in a VLAN database file called vlan.dat. The vlan.dat file is located in the
switch’s flash memory. The VLAN Trunking Protocol (VTP), which manages VLAN configurations
across switches, can only learn standard range VLANs and stores them in the VLAN database file.
Allow service providers to extend their infrastructure to a larger number of clients. Some
multinational companies may be large enough to require an extended range of VLAN IDs. Identified
by a VLAN ID between 1006 and 4094. Support fewer VLAN features compared to standard range
VLANs. Are saved in the running configuration file. VTP does not support extended range VLANs.
3.2 Versions
VTP Version 1 – Original version
VTP Version 2 – Added support for Token Ring VLANs, FDDI, etc.
In Transparent mode, the VTP domain is not taken into account when propagating VTP messages.
VTP configuration:
VTP Status:
VTP Password:
A network protocol used to define a loop-free topology in a LAN made up of switches. Standardized
protocol: IEEE 802.1d
4.2 Versions
Bridge ID: In PVST, the priority is a multiple of 4096 added to the VLAN ID. Example: 32769 =
32768 + 1 (default priority for VLAN1)
Dangers of Loops in a LAN: Broadcast Storm and MAC Address Table Instability
Fig 34.STP Loop
Root Bridge Election: The switch with the lowest Bridge ID (BID) wins the election. Each
switch initially declares itself as the root. When a switch discovers a better (lower) BID than
the current known Root Bridge (initially itself), it updates the Root ID. Once the election is
complete, only the Root Bridge sends BPDUs.
BPDU (Bridge Protocol Data Unit) Structure: Root Path Cost: Represents the cost of the path
from the root to the switch based on the path taken.
Standard Interface Costs: Ethernet: 100, Fast Ethernet: 19, Gigabit Ethernet: 4, EtherChannel Gigabit:
3 and Ten-Gigabit Ethernet: 2
For example, Switch S2 receives two BPDUs: one directly from S1, and another via S3. The one from
S3 has a Root Path Cost of 8 (lower than the 19 from S1), so the path via S3 is better. Therefore, S2’s
Gig0/1 interface becomes the RP. The port facing an RP becomes a DP. So Gig0/2 on S3 will be a DP.
All ports on a Root Bridge are always DPs. Thus, Fa0/1 and Gig0/1 on S1 are DPs. To eliminate a loop,
only one port needs to be blocked – in this case, Fa0/1 on S2. If the Root Path Cost is equal on both
sides of a loop, the Bridge ID is used to determine which side to block. If S2 has a higher BID than S3,
the link between S2 and S3 will be blocked on S2’s side. If both Root Path Cost and BID are equal, the
interface name is used. The lowest name wins (e.g., A < Z, 1 < 2). In this example, S1 is the Root
Bridge, so all its ports are DPs. The blocked port will be on S2. Since the cost and BID are equal, the
interface name is used: Gig0/1 < Gig0/2, so Gig0/2 will be blocked.
•
STP Port States
(*) When transitioning states, a port remains in "Blocking" for 20 seconds to prevent unnecessary
STP recalculations (e.g., if a cable is unplugged and replugged quickly).
STP – Configuration
Allows you to verify the current STP topology, port roles, root bridge, and more.
5. Conclusion
Chapter 3 covers key aspects of advanced switch configuration, providing students with the
foundational skills to manage complex switched networks. Through the study of VLANs, VTP, and STP,
students gain practical knowledge in network segmentation, efficient traffic handling, and loop
prevention. Mastering these technologies is essential for building scalable, stable, and well-organized
network infrastructures.
Réalisé par Mr BERKANE MOHAMED LAMINE
Network Addressing with IPv6
Chapter
IV
VI
1. Introduction
IPv6, the successor of IPv4, addresses several limitations of its predecessor, including restricted
addressing capacity, limited routing capabilities, and lack of advanced functionalities. With a large 128-
bit address space, it enables better route aggregation in Internet routing tables, offers greater
flexibility in address allocation, and resolves the inherent weaknesses of IPv4. Additionally, IPv6
supports improved features such as Quality of Service (QoS), enhanced security, mobility, automatic
configuration, although multicast remains a challenging aspect.
2. Introduction to IPv6
IPv6 uses 128-bit addresses. The subnet size is fixed at 64 bits (variable in IPv4). There are three
types of IPv6 addresses:
Unicast
Multicast
Anycast
Note: IPv6 does not use broadcast addresses.
Fig 40. IPv6 types
3. IPv6 Structure
Assignment via Stateful DHCP: Traditional DHCP, provides the full IPv6 configuration of the interface.
Assignment via Stateless DHCP: Interface is auto-configured based on the prefix announced by the
router. Only options are provided by the DHCP server.
The network identifier of the address is called the prefix. The prefix length, in the form /x, indicates
the number of bits in the network part of the address.
Example:
Note: IPv6 subnetting follows the same logic as in IPv4. All addresses in the same network share the
same network identifier (called the prefix). The prefix length given as /x defines the number of bits in
the network identifier.
The subnetting principle for "unique local" addresses follows the same logic as global addresses. The
Global ID is chosen arbitrarily for the entire private network.
3.7 Link-Local Addresses
These addresses work only within the local network (in the strict sense — i.e., machines within the
same subnet, same broadcast domain, same VLAN…). They are not routable.
They are used by machines for specific protocols (such as routing protocols, Neighbor Discovery,
etc.).
Format:
Note: An Ethernet frame carrying an IPv6 multicast packet will typically have a destination MAC
address in the following format: 3333.xxxx.xxxx (IPv6 multicast MAC address).
4. Conclusion
Chapter 4 introduces the fundamentals of IPv6, highlighting its importance as a modern solution to the
limitations of IPv4. By exploring its structure, features, and implementation, students understand how
IPv6 supports the expanding number of internet-connected devices. This knowledge is crucial for
designing future-proof network architectures and ensuring seamless connectivity in next-generation
networks.
General Conclusion
The four chapters of the Advanced Network and Security module collectively provide students
with a solid foundation in modern networking concepts and technologies. Beginning with
advanced routing techniques, students explore key dynamic routing protocols such as RIP,
OSPF, and BGP, gaining insights into how data is efficiently routed across diverse network
topologies. The module then delves into network security, emphasizing the critical role of
Access Control Lists (ACLs) in controlling and protecting data flows within enterprise
environments.
In Chapter 3, students focus on advanced switch configuration, learning how technologies like
VLANs, VTP, and STP contribute to network segmentation, traffic management, and the
prevention of switching loops. Finally, the module concludes with the introduction of IPv6,
equipping students with the knowledge to transition from IPv4 and to design networks capable
of supporting the rapidly growing number of internet-connected devices.
By the end of the module, students are expected to have developed practical skills and
theoretical understanding necessary for managing complex and secure network infrastructures
in modern IT environments.