• Main Menu
  • Cisco Networking

    • LAN Switching and Switch Types

      LAN Switching and Switch Types

      Switches represent the features and technologies that can be used to respond to the requirements in emerging network design. Some basic operations and technologies of switches are as follows: Fast Convergence: Switches stipulate that the network must adapt quickly to network topology changes. Deterministic Paths: Switches provide desirability of a given path to a destination for certain

    • What is VLSM?

      What is VLSM?

      VLSM (Variable Length Subnet Mask) is a technique that network administrators employ in order to use their IP subnet(s) in a more effective manner. By using VLSM, a long mask can be used on a network that has a few hosts and a short net mask on subnets that have a large number of hosts.

    • Distance Vector Routing Protocol

      Distance Vector Routing Protocol

      Routing Protocols Whenever different networks connect with each other to communicate and to share the data and resources, it is called internetworking. For internetworking, routers must be used on each network or at backbone to route the packets. To route a packet, a router needs to know: Destination Addresses Sources it can learn from Possible

    • Understanding the IPX-SPX Protocol

      Understanding the IPX-SPX Protocol

      IPX/SPX is a protocol suite that is implemented on many corporate internetworks. IPX/SPX was developed to operate in Novell Netware in LAN environment. But today, the IPX/SPX is also used in Microsoft NT, Microsoft XP and Lotus Notes environment along with Vista. IPX/SPX on Cisco IOS The Cisco IOS also provides a wide range of

    • Enabling IP Routing

      Enabling IP Routing

      WAN connects different LANs with each other to communicate and to share data and resources. As a result, routers must be used on each network or at backbone to route the IP packets and IP routing should be enabled on the routers. Routers must learn the destinations that are not directly connected by building and

    • Spanning Tree Protocol

      Spanning Tree Protocol

      Redundant Topology A Local Area Network may consist of more than one segment. Each segment of the LAN connected through a separate physical device mostly switch. Switches use their uplink ports to connect different segments. The LAN administrator can connect the switches with each other through more than one uplink port using redundant topology. Redundant

    • Understanding Frame Relay

      Understanding Frame Relay

      Frame Relay is a protocol for transmitting data over a wide area network (WAN). It was designed to use across ISDN interfaces but it is now used over an assortment of other network interfaces. Once one becomes a master of frame relay design and configuration, it is much easier to obtain a strong understanding of

    • Interior Gateway Routing Protocol

      Interior Gateway Routing Protocol

      The Interior Gateway Routing Protocol (IGRP) is a network routing protocol that is designed to enable routing inside of an Autonomous System (AS). Cisco developed this protocol in the late 1980s in response to the existing Routing Information Protocol’s (RIP) shortcomings. As Cisco routers became more popular, a number of large networks began using IGRP,

    • Cisco Switch Configuration

      Cisco Switch Configuration

      When executing an inter-network installation, many mechanisms and components are usually involved. Cisco is superior because it is the only inter-networking company with a well made end to end inter-networking solution. Cisco switches makes the LAN more competent by creating multiple collision domains. Each switch port is a split collision domain. With only one device

    • Understanding the Cisco Three-Layer Hierarchical Model

      Understanding the Cisco Three-Layer Hierarchical Model

      Understanding the Cisco Three-Layer Hierarchical Model Hierachical network design helps us to make networks more reliable and predictable. Level by level design help to understand networking factions easily like, we can use tools like access lists at specific level and can avoid them from others. Cisco layer model consist of the following three layers. The

    174 queries in 0.286 seconds.