• Main Menu
  • Cisco Networking

    • Interior Gateway Routing Protocol

      Interior Gateway Routing Protocol

      The Interior Gateway Routing Protocol (IGRP) is a network routing protocol that is designed to enable routing inside of an Autonomous System (AS). Cisco developed this protocol in the late 1980s in response to the existing Routing Information Protocol’s (RIP) shortcomings. As Cisco routers became more popular, a number of large networks began using IGRP,

    • Distance Vector Routing Protocol

      Distance Vector Routing Protocol

      Routing Protocols Whenever different networks connect with each other to communicate and to share the data and resources, it is called internetworking. For internetworking, routers must be used on each network or at backbone to route the packets. To route a packet, a router needs to know: Destination Addresses Sources it can learn from Possible

    • Understanding Cisco IOS

      Understanding Cisco IOS

      Cisco IOS As you know that Cisco is the worldwide leader in providing the hardware solutions as well as the software solutions of LAN and WAN. The hardware solutions mean that the hardware devices such as switches and routers etc but what is the meaning of software solution? The software solution actually means that Cisco

    • What is EIGRP?

      What is EIGRP?

      Local and international networks require information to be constantly updated in order to properly route communications. Routing protocols were developed in order to help keep information flowing to the proper locations and to maintain network connectivity on both LAN and WAN. The Enhanced Interior Gateway Routing Protocol (EIGRP) is one of the most popular internal

    • Understanding Data Encapsulation

      Understanding Data Encapsulation

      The sending and receiving of data from a source device to the destination device is possible with the help of networking protocols when data encapsulation is used. The data is encapsulated with protocol information at each OSI reference model layer when a host transmits data to another device across a network. Each layer communicates with

    • Cisco Switch Configuration

      Cisco Switch Configuration

      When executing an inter-network installation, many mechanisms and components are usually involved. Cisco is superior because it is the only inter-networking company with a well made end to end inter-networking solution. Cisco switches makes the LAN more competent by creating multiple collision domains. Each switch port is a split collision domain. With only one device

    • Spanning Tree Protocol

      Spanning Tree Protocol

      Redundant Topology A Local Area Network may consist of more than one segment. Each segment of the LAN connected through a separate physical device mostly switch. Switches use their uplink ports to connect different segments. The LAN administrator can connect the switches with each other through more than one uplink port using redundant topology. Redundant

    • Ethernet at the Data Link Layer

      Ethernet at the Data Link Layer

      Ethernet at the Data Link Layer Ethernet provides services corresponding to Layers 1 and 2 of the OSI reference model, and IEEE 802.3 specifies the physical layer (Layer 1) and the channel-access portion of the Data Link (Layer 2). In addition, IEEE 802.3 does not define a logical link control protocol but does not specify

    • LAN Switching and Switch Types

      LAN Switching and Switch Types

      Switches represent the features and technologies that can be used to respond to the requirements in emerging network design. Some basic operations and technologies of switches are as follows: Fast Convergence: Switches stipulate that the network must adapt quickly to network topology changes. Deterministic Paths: Switches provide desirability of a given path to a destination for certain

    • IP Access Lists

      IP Access Lists

      Access lists are used to control and manage access of interesting and non interesting traffic. Access lists are powerful tools for controlling access both to and from network segments. They can filter uninteresting packets and be used to implement security policies. Using the right combination of access lists, network managers will be armed with the

    cisco-networking
    170 queries in 0.422 seconds.