• Main Menu
  • Cisco Networking

    • LAN Switching and Switch Types

      LAN Switching and Switch Types

      Switches represent the features and technologies that can be used to respond to the requirements in emerging network design. Some basic operations and technologies of switches are as follows: Fast Convergence: Switches stipulate that the network must adapt quickly to network topology changes. Deterministic Paths: Switches provide desirability of a given path to a destination for certain

    • Understanding Cisco IOS

      Understanding Cisco IOS

      Cisco IOS As you know that Cisco is the worldwide leader in providing the hardware solutions as well as the software solutions of LAN and WAN. The hardware solutions mean that the hardware devices such as switches and routers etc but what is the meaning of software solution? The software solution actually means that Cisco

    • What is EIGRP?

      What is EIGRP?

      Local and international networks require information to be constantly updated in order to properly route communications. Routing protocols were developed in order to help keep information flowing to the proper locations and to maintain network connectivity on both LAN and WAN. The Enhanced Interior Gateway Routing Protocol (EIGRP) is one of the most popular internal

    • Understanding the IPX-SPX Protocol

      Understanding the IPX-SPX Protocol

      IPX/SPX is a protocol suite that is implemented on many corporate internetworks. IPX/SPX was developed to operate in Novell Netware in LAN environment. But today, the IPX/SPX is also used in Microsoft NT, Microsoft XP and Lotus Notes environment along with Vista. IPX/SPX on Cisco IOS The Cisco IOS also provides a wide range of

    • Understanding Ethernet Networking

      Understanding Ethernet Networking

      Ethernet refers to the family of Local Area Network implementation that was jointly developed by Digital Equipment Corporation, Intel Corporation and Xerox Corporation. It consists of certain specifications and standards as well as hardware devices and components. Ethernet Connection The Ethernet protocol provides for a verity of cabling options, one of which is a specification

    • IP Access Lists

      IP Access Lists

      Access lists are used to control and manage access of interesting and non interesting traffic. Access lists are powerful tools for controlling access both to and from network segments. They can filter uninteresting packets and be used to implement security policies. Using the right combination of access lists, network managers will be armed with the

    • Ethernet at the Data Link Layer

      Ethernet at the Data Link Layer

      Ethernet at the Data Link Layer Ethernet provides services corresponding to Layers 1 and 2 of the OSI reference model, and IEEE 802.3 specifies the physical layer (Layer 1) and the channel-access portion of the Data Link (Layer 2). In addition, IEEE 802.3 does not define a logical link control protocol but does not specify

    • Spanning Tree Protocol

      Spanning Tree Protocol

      Redundant Topology A Local Area Network may consist of more than one segment. Each segment of the LAN connected through a separate physical device mostly switch. Switches use their uplink ports to connect different segments. The LAN administrator can connect the switches with each other through more than one uplink port using redundant topology. Redundant

    • Understanding Data Encapsulation

      Understanding Data Encapsulation

      The sending and receiving of data from a source device to the destination device is possible with the help of networking protocols when data encapsulation is used. The data is encapsulated with protocol information at each OSI reference model layer when a host transmits data to another device across a network. Each layer communicates with

    • What is VLSM?

      What is VLSM?

      VLSM (Variable Length Subnet Mask) is a technique that network administrators employ in order to use their IP subnet(s) in a more effective manner. By using VLSM, a long mask can be used on a network that has a few hosts and a short net mask on subnets that have a large number of hosts.

    179 queries in 0.701 seconds.