Channels lising page
All videos archived of NETWORKING WITH H
W-7K2PpMxWw | 21 Nov 2024
#udemy #cisco #ospf #lab #online #onlineclasses #onlinetraining #training #education 🎓 Master Cisco CCNA 200-301 on Udemy Looking to deepen your skills in networking? Join my Udemy course: "CCNA 200-301 v1.1 -Complete course with simple approach."! 🚀 📚 What's Inside: Network Fundamentals concepts Ethernet switching Technologies IPv4 and IPv6 addressing concepts IP routing and protocols IP services and protocols used in network Network Security concepts. Network automation and programmability , AI. Practical Labs, Step-by-Step Guides, Real-World Examples, etc This course is designed to fully prepare you for Cisco’s CCNA v1.1 (200-301) exam and to equip you with skills for your networking career. 🔥 Special Offer only 12.99$: Enroll today for exclusive discounts and lifetime access! 👉 Enroll Now : https://www.udemy.com/course/ccna-v11-200-301-video-training-course-2024/?couponCode=38604E9D684B3F861EFB Thank you for supporting the channel and investing in your skills! If you have questions, drop a comment, and I'll be happy to help!
xXL-DPv1RYs | 15 Nov 2024
#udemy #ccna #ciscopackettracer #cisco #lacp #onlinetraining #online #onlineclasses #education #netowrkingwithh Overview LACP is an IEEE standard (802.3ad) protocol that dynamically negotiates and establishes an EtherChannel link between two switches, making it resilient to configuration errors and automatically managing bundled ports. Lab Objective 1. Configure a Layer 2 EtherChannel using LACP on two Cisco switches. 2. Verify that the EtherChannel is successfully established and functioning. Steps to Configure Layer 2 EtherChannel using LACP Part 1: Access the Switch and Enter Configuration Mode Step 1. Open the packet tracer file shared. Step 2. Access the Switch: Double click on the switch on the packet tracer window, Step 3. Click on cli tab. Step 4. Enter Privileged EXEC Mode: Type enable and press Enter to access privileged mode. Step 5. Enter Global Configuration Mode: - Type `configure terminal Switch# configure terminal ` to enter global configuration Part2: Configure LACP EtherChannel on Switch 1 Step 6. Select the Interfaces for EtherChannel: - Enter interface range mode for the interfaces you want to add to the EtherChannel. For example, to bundle `FastEthernet0/1` and `FastEthernet0/2`: SW01(config)# interface range FastEthernet0/1 – 2 Step 7. Set the Interfaces to Trunk or Access Mode (Optional): - Depending on your design, you can set the EtherChannel as a trunk or access link. - For Trunk Mode: SW01(config-if-range)# switchport mode trunk - For Access Mode on a Specific VLAN (e.g., VLAN 10): SW01(config-if-range)# switchport mode access SW01(config-if-range)# switchport access vlan 10 Step 8. Enable LACP and Configure EtherChannel: For LACP, you can choose between active and passive modes: - Active mode initiates the EtherChannel negotiation with the other switch. - Passive mode waits for the other switch to initiate LACP. - On SW01 Use the channel-group command with the active mode to enable LACP. - The active mode initiates LACP negotiations with the connected switch. SW01(config-if-range)# channel-group 1 mode active Step 9. Exit Configuration Mode: - Exit interface configuration mode and global configuration mode. SW01(config-if-range)# exit SW01(config)# end Step 10. Repeat the Same Configuration on Switch 2 with passive mode : - For Access Mode on a Specific VLAN (e.g., VLAN 10): SW01(config-if-range)# switchport mode access SW01(config-if-range)# switchport access vlan 10 Step 8. Enable LACP and Configure EtherChannel: For LACP, you can choose between active and passive modes: - Active mode initiates the EtherChannel negotiation with the other switch. - Passive mode waits for the other switch to initiate LACP. - On SW01 Use the channel-group command with the active mode to enable LACP. - The active mode initiates LACP negotiations with the connected switch. SW01(config-if-range)# channel-group 1 mode active Step 9. Exit Configuration Mode: - Exit interface configuration mode and global configuration mode. SW01(config-if-range)# exit SW01(config)# end Step 10. Repeat the Same Configuration on Switch 2 with passive mode : - Perform the same steps on Switch 2, ensuring that the corresponding interfaces are configured to participate in the same EtherChannel and are set to passive mode for LACP. SW02(config-if-range)# channel-group 1 mode passive Part 3: Verify EtherChannel Configuration Step 11. Verify EtherChannel Status: - Use the show etherchannel summary command to confirm that the EtherChannel is up and running with LACP. SW01# show etherchannel summary Step 12. Verify Port Channel Interface: - Use the `show interface port-channel` command to check the logical interface created by the EtherChannel. SW01# show interface port-channel 1
OGISWJPkvAg | 05 Nov 2024
#online #training #packettracer #cisco #lab #udemy #ccna #certification Step 1. Navigate to the Resource Hub here: https://skillsforall.com/resources/lab-downloads Step 2. Packet Tracer is available for Windows, Linux, and macOS operating systems. Click the download link that is appropriate for your computer and download will start. (To download make sure you are logged in with registered credentials) Note: Packet Tracer is not available for mobile devices such as smartphones and tablets. Step 3. c. Choose a location to save the installation file. Step 4. Step 2: Install the Packet Tracer application. Windows Step 5. Navigate to the location where you saved the Packet Tracer installation file and Double click the Packet Tracer installation file. Step 6. The Setup dialog opens to the License Agreement. Read through the agreement, click I accept the agreement, and then click Next. Step 7. In the Select Destination Location window, choose a location or accept the default location, and then click Next. Step 8. In the Select Start Menu Folder window, you can choose a different installation folder, if you prefer, or accept the default location, and then click Next Step 9. In the Select Additional Tasks window, you can choose your Additional shortcuts, and then click Next. Step 10. In the Ready to Install window, review your installation settings. If you need to change anything, click Back to navigate back to a setting you wish to modify. When ready, click Install to begin the installation process. Step 11. Launch the Packet Tracer application. When installation finishes, the Launch Cisco Packet Tracer checkbox will be checked. Click Finish to launch Packet Tracer. Step 12. Alternatively, locate Packet Tracer in its installation location and double click the application. Step 13. The first time Packet Tracer opens, it will ask Would you like to run multi-user when the application starts? You can click No to this question for now. Step 14. You may get a security message, such as Windows Security Alert. Some advanced features, such as multi-user Packet Tracer, require network access. However, if you prefer, you can turn off private and public network access. Step 15. The Cisco Packet Tracer Login window opens. Notice the toggle that allows you to Keep me logged in (for 3 months). If you would prefer not to log in each time Packet Tracer opens, click the toggle if you are not on a public or shared computer. Step 16. Click Skills For All. Step 17. If your web session with Skills For All is recent, a web browser tab will open with the message: You have successfully logged in to Cisco Packet Tracer. You may close this tab. Close the tab and return to Packet Tracer. Step 18. If your session has expired, a web browser tab will open for you to log back into Skills For All. Step 19. Enter your credentials to login. The web browser tab will now display the message: You have successfully logged in to Cisco Packet Tracer. You may close this tab. Step 20. If necessary, return to Packet Tracer. You are now ready to explore its features.
mJxSKIRDpPQ | 01 Nov 2024
#ipsec #onlinetraining #online #shortvideo #udemy #education #vpn Please join me on UDEMY for Full CCNA 200-301 v1.1 video training course with practice exams https://www.udemy.com/course/ccna-v11-200-301-video-training-course-2024/?couponCode=286861D1C723B9A4128C CCNA 200-301 V1.1 training videos only for 12.99$ Enroll now and avail discount
YMGxkYAKyjk | 30 Oct 2024
#udemy #ipsec #online #shortvideo #shorts #short #security Please join me on UDEMY for Full CCNA 200-301 v1.1 video training course with practice exams https://www.udemy.com/course/ccna-v11-200-301-video-training-course-2024/?couponCode=286861D1C723B9A4128C CCNA 200-301 V1.1 training videos only for 12.99$ Enroll now and avail discount
enJV7jWXrog | 15 Oct 2024
#ipsec #udemy #training #security Please join me on UDEMY for Full CCNA 200-301 v1.1 video training course with practice exams https://www.udemy.com/course/ccna-v11-200-301-video-training-course-2024/?couponCode=60A23A07B1A310D3B4BF NEW CCNA 200-301 V1.1 training videos for 12.99$ Enroll now and avail discount
PaYxIFFWf2w | 06 Oct 2024
#datacenter #udemy #ccna #training NEW CCNA 200-301 V1.1 COURSE https://www.udemy.com/course/ccna-v11-200-301-video-training-course-2024/?couponCode=60A23A07B1A310D3B4BF
O56ru9iaiZY | 03 Oct 2024
#ccna #udemy #networking #protocols Please join me on UDEMY for Full CCNA 200-301 v1.1 video training course with practice exams https://www.udemy.com/course/ccna-v11-200-301-video-training-course-2024/?couponCode=60A23A07B1A310D3B4BF
yE2hbUzDy7c | 27 Sep 2024
#bgp #udemy #ccna Please join me on UDEMY for Full CCNA 200-301 v1.1 video training course with practice exams https://www.udemy.com/course/ccna-v11-200-301-video-training-course-2024/?referralCode=2DF7526C408423A5485A NEW CCNA 200-301 V1.1 FULL COURSE ENROLL NOW
l7QnAMqCyS8 | 26 Mar 2023
Join us for the launch of the CISCO CCNA 200-301 (Implementing and Administering Cisco Solutions) certification course a comprehensive training program that teaches you the basics of networking , how to configure small networks with Cisco routers and switches and much more. Our First online based learning Program -  CCNA 200-301 (Implementing and Administering Cisco Solutions) is going to be started on the 15th of April  Enroll into CCNA certification course  https://learnwithnetworkingwithh.graphy.com/courses/CISCO-CCNA-200-301-63ea2b6ae4b090a146306bcf What you will get from this course?  Course Start Date - 15th April 2023  Mode of the Course - Recorded and Q/A Live Sessions (Weekends)  Practical sessions.  exam preparation questions.  No of Recorded Lectures - 60+ excluded Q/A live sessions  20+ hours of Content Only the First 100 Early Birds Participants will get a 50% discount Registrations are Open Now  https://learnwithnetworkingwithh.graphy.com/courses/CISCO-CCNA-200-301-63ea2b6ae4b090a146306bcf Why Choose Us ?  Simple Teaching Style - We focus on clearing the concept of the candidate so that after completing the course you will be able to build scenarios on your own.  Course Updating - Our Course will be updated with every release from Cisco if there is any new thing came in CCNA we will also update the Course accordingly and also provide a live session for the changes/enhancements. Go and Get the early bird discount https://learnwithnetworkingwithh.graphy.com/courses/CISCO-CCNA-200-301-63ea2b6ae4b090a146306bcf Share this with the candidates who want to learn networking. I bet this is going to be a very Amazing Bootcamp and worth your money  keep supporting as you are right now If you have any questions, please don't hesitate to contact us at  - [email protected] We can't wait to see you at the Bootcamp! #ccnafullcourse #unacademy #ccna
J4ItSosHQPA | 30 Jan 2021
#ccna #ipv6address #dhcpv6 #static #dynamic #configuration​ @VideoScribe @Sparkol There are two ways to assign / configure the IPV6 address on the router interfaces. 1.Static Unicast Address Configuration 2.Dynamic Unicast Address Configuration Static Unicast Address Configuration Cisco routers give us two options for static configuration of IPv6 addresses. In one case, you configure the full 128-bit address, while in the other, you configure a 64-bit prefix and let the router derive the second half of the address (the interface ID). Configuring the Full 128-Bit Address To statically configure the full 128-bit unicast address—either global unicast or unique local—the router needs an ipv6 address address/prefix-length interface subcommand on each interface. let’s take a basic example. The figure shows the global uni-cast IPv6 address manually configured under intetrface fa0/0 with /64 prefix length. interface Fa 0/0 ipv6 address 2001:DB8:1111:1::1/64 ! The second option to configure static address is by Generating a Unique Interface ID Using Modified EUI-64 This second method uses rules called modified EUI-64 (extended unique identifier). people refer to modified EUI-64 as just EUI-64 The configuration that uses EUI-64 includes a keyword to tell the router to use EUI-64 rules, along with the 64-bit pre- fix. Configuring a router interface to use the EUI-64 format uses the ipv6 address address/ prefix-length eui-64 interface subcommand. The eui-64 keyword tells the router to find the interface MAC address and do the EUI-64 conversion math to find the interface ID For interface GigabitEthernet0/0 we have configured this prefix along with the eui code. ipv6 address 2001:DB8:1111:1::/64 eui-64 The mac address for this interface is 0013.1234.ABCD To generate the unique interface ID EUI-64 rules are as follows 1.Split the 6-byte (12-hex-digit) MAC address in two halves (6 hex digits each). i.e the mac address of gi0/0 0013.1234.ABCD 2.Insert FFFE in between the two, making the interface ID now have a total of 16 hex digits (64 bits). 3.Invert the seventh bit of the interface ID. The final step requires that you convert the first byte (first two hex digits) from hex to binary, invert the seventh of the 8 bits, and convert the bits back to hex. Inverting a bit means that if the bit is a 0, make it a 1; if it is a 1, make it a 0. After that you can have this IPv6 address Dynamic Unicast Address Configuration Cisco routers support two ways for the router interface to dynamically learn an IPv6 address to use: Stateful DHCP Stateless Address Autoconfiguration (SLAAC) Stateful Address Assignment Similar to IPv4, IPv6 can use DHCP to state-fully assign IP addresses to any clients. Cisco IOS routers can be configured to be Stateful DHCP servers. Stateful DHCP means that the DHCP server is responsible for assigning the IP address to the client. The DHCP server keeps a record of all clients and the IPv6 address assigned to them The server can also offer other network parameters such as DNS servers, a domain name, or any other option that a DHCP server provides.. The command used to get the IP from dhcp is interface FastEthernet0/0 ipv6 address dhcp Stateless Address Assignment This is a unique feature only to IPv6 also known as Stateless Auto-configuration [SLAAC] It is a method in which the device can obtain an IPv6 global unicast address without the services of DHCPv6 server. Stateless address configuration means that the client picks their own address based on the prefix being advertised on their connected interface. All Cisco devices have the ability to participate in Stateless Auto-configuration (SLAAC). By default, SLAAC does not provide anything to the client outside of an IPv6 address and a default gateway. Moreover, it is important to note that SLAAC most commonly uses eui-64 format for address assignment. This means that IPv6 addresses will be built from a combination of the Layer 3 subnet prefix and the MAC address of the client. The requirement for SLAAC is that the LAN segment must use a /64 mask. The command to configure SLAAC is ipv6 address autoconfig Both methods stateful and stateless use the familiar ipv6 address command. Of course, neither option configures the actual IPv6 address; instead, the commands configure a keyword that tells the router which method to use to learn its IPv6 address. IPv6 routing There is important but often overlooked step when configuring IPv6 on Cisco routers: IPv6 routing needs to be enabled. On Cisco routers, IPv4 routing is enabled by default, but IPv6 routing is not enabled by default. The solution takes only a single command—ipv6 unicast-routing—which enables IPv6 routing on the router. A router must enable IPv6 globally (ipv6 unicast-routing) and enable IPv6 on the interface (ipv6 address) before the router will attempt to route IPv6 packets in and out an interface
LU9Dz6WF40A | 25 Jan 2021
#ipaddress #ipv6 #types #multicast #linklocal #globalunicast #anycast ​ @Cisco @VideoScribe @Sparkol #ccna #cisco There are three major categories of IPv6 addresses: * Unicast * Multicast * Anycast * If you remember the types of network communication in IPv4 are Unicast, Multicast and Broadcast. There is no broadcast in IPv6. Unicast is the term used to describe communication where a piece of information is sent from one point to another point. Unicast is a one-to-one type of network communication. In this case there is just one sender, and one receiver. For Example 1) Browsing a website. (Web server is the sender and your computer is the receiver.) Multicast is the term used to describe communication where a piece of information is sent from one point to a set of other points. Multicast is a type of communication where multicast traffic addressed for a group of devices on the network. IPv6 multicast traffic are sent to a group and only members of that group receive the Multicast traffic. In this case there is may be one sender, and the information is distributed to a set of receivers or example, TV channels. The multicast server generate only one stream of data and that stream is replicated to different devices, who are interested in that data traffic. Anycast is a type of IPv6 network communication in which IPv6 datagrams from a source are routed to the nearest device (in terms of routing distance) from a group servers which provide the same service. Anycast, also known as IP anycast, is a networking technique that allows for multiple machines to share the same IP address. Every nodes which provide the same service are configured with same Anycast destination address. Based on the location of the user request, the routers send it to the machine in the network that is closest.
bDjP6bQLy3M | 26 Oct 2020
As we know from the TCP/IP protocol suite the The transport layer is responsible for end-to-end delivery of data from the source host to the destination host. TCP and UDP are two protocols that determine how data is exchanged over the internet. Both built on top of the IP protocol, they share many similarities, but their differences make them suitable for different purposes. They are the two most widely used protocols that internet users interact with every day. Each TCP/IP application typically chooses to use either TCP or UDP based on the applications requirements. TCP stands for transmission control protocol It is one of the main protocol used in a TCP/IP network. It belongs to the transport layer of the TCP/IP suite. tcp guarantees that all the data is received and in order because without TCP some of the data send by sender could be missing or out of order . because if you download a file then you might not get the entire file or you could get the file out of order which would render the file useless If you view a web page without TCP your webpage could be all messed up like this. the image could be missing or the text could be backwards and out of order. this is where the TCP comes in. TCP is a connection oriented protocol, which basically means that it must establish a session first between the two devices that are communicating TCP connection establishment occurs before any of the other TCP features can begin their work. Connection establishment refers to the process of initializing Sequence and Acknowledgment fields and agreeing on the port numbers used. so the two devices verify a connection before any communication takes place and it does this by using a three way hand shake. This three-way connection establishment flow (also called a three-way handshake) must complete before data transfer can begin. so the first step is that a client will send a message called a SYN. Used to initiate and establish a connection The Server receives the packet and responds with its own sequence number and the acknowledgement telling the sender that it has received the message Host acknowledges the response of the Server by sending the acknowledgment once this has taken place data Transfer begins. In case if you have finished data transfer and want to close the session. FIN is Used to terminate a connection. another important thing to remember about TCP is that it guarantees the delivery of the data. so if a data packet goes astray and doesn’t arrive then TCP will resend it. Some of the application that uses TCP are FTP (20 and 21), SSH (22), TELNET (23), SMTP (25), HTTPs, and HTTP (80 UDP is very similar to TCP UDP is also for sending and receiving data UDP is a connection-less protocol Which means that it does not establish a session and it does not guarantee data delivery so when a computer sends their data it does not really care if the data is received at the other end and that’s why UDP is known as the send and forget protocol because it sends data and it does not really care what happens to it. UDP can be used in applications where speed rather than reliability is critical UDP is faster than TCP because of the less overhead that is involved of not guaranteeing data delivery. Some of the application that uses UDP are tftp 69 , ntp 123, syslog 514, rtsp 554 Comparison TCP characteristics include the following: It is a connection-oriented protocol. It guarantees that no packets are missing and all the data that's sent makes it to the intended recipient. It sends packets in order so they can be stitched back together easily. It's slower and requires more resources. It is best suited for apps that need high reliability, and transmission time is relatively less critical. It's the most widely used protocol on the internet. UDP characteristics include the following: It is a connectionless protocol. It allows missing packets -- the sender is unable to know whether a packet has been received. The packets don't necessarily arrive in order. It is faster and needs fewer resources. It is better suited for applications that need fast, efficient transmission, such as games. It is used for VoIP, video streaming, gaming and live broadcasts. #ccna #TCP #UDP #CCNA
tZbayqSJISU | 10 Oct 2020
In this session we will look at INterface and cable issues (collisions, errors, mismatch duplex, and/or speed) and more unusual cases in which the interface is working but not working well, as revealed by different interface status codes and statistics. Cisco switches actually use two different sets of interface status codes— one set of two codes (words) that use the same conventions as do router interface status codes, and another set with a single code (word). Both sets of status codes can determine whether an interface is working. The switch show interfaces and show interfaces description commands list the two-code status named the line status and protocol status. The line status generally refers to whether Layer 1 is working, with protocol status generally referring to whether Layer 2 is working. the show interfaces status command lists a single-word state The single-code interface status corresponds to different combinations of the traditional two-code interface status codes and can be easily correlated to those codes. Such as connected state for working interfaces, If you see the line status as admin down and protocol status as down or if the interface status is disabled then the likely cause is the shutdown command is configured under the interface. If you see the line status as down and protocol status as down or if the interface status is not connect state then the likely cause is there is No cable; bad cable; wrong cable pinouts; speed mismatch; neighboring device is (a) powered off, (b) shutdown, or (c) error disabled. If you see the line status as down and protocol status as down(err-disabled or if the interface status is err-disabled then the likely cause is the Port security has disabled the interface. If you see the line status as up and protocol status as up or if the interface status is connected then the interface is working normal. Next lets have a look at Interface Speed and Duplex Issues To understand some of the speed and duplex issues, lets have a look at the output from the show interfaces status and show interfaces commands show interfaces status lists a one-line summary of the interface status and tells us more about auto-negotiation. show interfaces gives many details but not much about autonegotiation the show interfaces status command implies how the switch determined the speed and duplex settings. The command output lists autonegotiated settings with a prefix of a- and the manually set values without the a- prefix. Some of the Common Layer 1 Problems on Working Interfaces When the interface reaches the connect (up/up) state, the switch considers the interface to be working. and at the same time, the switch keeps various interface counters. These interface counters can help identify problems that can occur even though the interface is in a connect state, like issues related to the duplex mismatch problem Whenever the physical transmission has problems, the receiving device might receive a frame whose bits have changed values. Lets look at some of the known counters and errors in brief Runts: are Frames that did not meet the minimum frame size requirement (64 bytes) and Can be caused by collisions. Giants: are Frames that exceed the maximum frame size requirement (1518 bytes) Input Errors: A total of many counters, including runts, giants, no buffer, CRC, frame, overrun, and ignored counts. CRC: This counter increases if it Receives frame that did not pass the FCS math; can be caused by collisions.These frames do not pass the error detection logic as implemented in the FCS field in the Ethernet trailer, Frame: This counter increase when it Receives frames that have an illegal format.Packets Output: this counter counts Total number of packets (frames) forwarded out the interface. Output Errors: this counter counts Total number of packets (frames) that the switch port tried to transmit, but for which some problem occurred. Collisions: this counter couts all collisions that occur when the interface is transmitting a frame. Thats it for this session i hope this was helpful for you and please do feel free to ask any questions through email or comments. In my next session we will have a discussion between TCP and UDP. Thank you for watching please do like share and subscribe and hit the bell icon. #ccna #interface #cable #issues
mwVX62wx6jo | 20 Sep 2020
Notes Cisco IOS uses the term interface to refer to physical ports on a network device used to forward data to and from other devices. Each interface can be configured with several settings, each of which might differ from interface to interface. IOS uses interface subcommands to configure these settings. Let us begin with a discussion of three relatively basic per-interface settings: the port speed, duplex, and a text description. 1. Speed: Speed is the rate of the interface, usually listed in megabits per second (Mbps). Common Ethernet speeds include 10 Mbps, 100 Mbps, and 1,000 Mbps. 2. Duplex Duplex refers to how data flows on the interface. On a half-duplex interface, data can only be transmitted or received at any given time. A full-duplex interface, on the other hand, can send and receive data simultaneously. 3.Description The description text interface subcommand lets you add a text description to the interface. It is meant to provide a reminder in the configuration to describe what certain interfaces are used for. It is a text description configured by the administrator. The show interfaces status command lists much of the detail configured even with only one line of output per interface. Configuring Multiple Interfaces with the interface range Command to shorten your configuration work when making the same setting on multiple consecutive interfaces. To do so, use the interface range command. For example for interfaces from 11 till 20 end users will be connected. Administratively Controlling Interface State with shutdown As you might imagine, network engineers need a way to bring down an interface without having to travel to the switch and remove a cable. In short, we need to be able to decide which ports should be enabled and which should be disabled. Cisco uses two interface subcommands to configure the idea of administratively enabling and disabling an interface: the shutdown command (to disable) and the no shutdown command (to enable). . In this case, switch SW1 has a working interface F0/1. Removing Configuration with the no Command you can revert to the default setting by issuing a no version of the command. switch SW1’s F0/2 port has been configuredwith speed 100, duplex half, description link to 2901-2, and shutdown. Let me give you an example the no speed command on that same interface reverts to the default speed setting (which happens to be speed auto). -Same idea with the duplex command: an earlier configuration of duplex half followed by no duplex on the same interface, reverts the configuration back to the default of duplex auto. -use the no description command. to go back to the default state of having no description on that interface, WHAT IS ETHERNET AUTO-NEGOTIATION? Auto-negotiation is the feature that allows a port on a switch, router, server, or other device to communicate with the device on the other end of the link to determine the optimal duplex mode and speed for the connection. For any 10/100 or 10/100/1000 interfaces Cisco Catalyst switches default to a setting of duplex auto and speed auto. As a result, those interfaces attempt to automatically determine the speed and duplex setting to use. Alternatively, you can configure most devices, switch interfaces included, to use a specific speed and/or duplex. Ethernet devices on the ends of a link must use the same standard; otherwise, they cannot correctly send data. For example, a NIC cannot use 100BASE-T, which uses a UTP cable with a 100-Mbps speed, while the switch port on the other end of the link uses 1000BASE-T. the link would not work with one end trying to send at 100 Mbps while the other tried to receive the data at 1000 Mbps. The IEEE auto-negotiation (802.3u)protocol helps makes it much easier to operate a LAN when NICs and switch ports support multiple speeds. IEEE auto-negotiation defines a protocol that lets the two UTP-based Ethernet nodes on a link negotiate so that they each choose to use the same speed and duplex settings. #ccna #switch #autonegotiation #training
GxeC1vVOcw4 | 07 Sep 2020
Power over Ethernet is a revolutionary technology that integrates data and power on the same cables.As you can see with non poe device you need a power cable to power on the device and copper cable for network data.But with poe It allows devices to receive power in parallel to data over existing twisted-pair Ethernet infrastructure without making any modifications in it. Lets try understand this with an exampleWhen you walk around any building and you see electrical power outlets everywhere. When finishing the interior of a building, electricians run electrical cables and install electrical outlets to any and every location that might need power. Such as fridge, tv, pc etcAs a network engineer you might have taught that the electrician might have provided enough power to the wiring closets to power on the networking devicesPower over Ethernet (PoE) changes that thinking so that the responsibility to provide electrical power to some devices can fall to the network engineering team. the LAN switch connected to the cable can supply that power over the cable. Power over Ethernet Terminology Let us understand the terminologies used in poeWith PoE, some device, typically a LAN switch, acts as the Power Sourcing Equipment (PSE)—that is, the device that supplies DC power over the Ethernet UTP cable (as shown in Figure A device that has the capability to be powered over the Ethernet cable, rather than by some other power connector on the device, is called the Powered Device (PD). Why use POE? Advantages of using PoETime and cost savings - by reducing the time and expense of having electrical power cabling installed. Network cables do not require a qualified electrician to fit them, and can be located anywhere.Flexibility - without being tethered to an electrical outlet, devices such as IP cameras and wireless access points can be located wherever they are needed most, and repositioned easily if required.Safety - POE delivery is intelligent, and designed to protect network equipment from overload, under-powering, or incorrect installation.Reliability - POE power comes from a central and universally compatible source, rather than a collection of distributed wall adapters. It can be backed-up by an uninterruptible power supply, or controlled to easily disable or reset devices.Scalability - having power available on the network means that installation and distribution of network connections is simple and effective.Since it supplies DC power over the Ethernet cable, so the device does not need an AC/DC converter Devices that use Power over EthernetSome of the commonly used devices that use POE areVoIP phones - the original POE application. Using POE means phones have a single connection to a wall socket, and can be remotely powered down, just like with the older analog systems.IP cameras - POE is now ubiquitous on networked surveillance cameras, where it enables fast deployment and easy repositioning.Wireless devices such as - Wifi AP’s and RFID readers are commonly PoE-compatible, to allow remote location away from AC outlets, and relocation following site surveys.PoE Operation Every electrical device can be harmed by receiving too much current into the device, which is why electricians install circuit breakers and why we use surge protectors. Applying power over an Ethernet cable could have the same effect, harming the device on the other end, if the device does not support PoE. So PoE must (and does) have processes in place to determine if PoE is needed, and for how much power, before applying any potentially harmful power levels to the circuit. PoE, standardized by the IEEE, extends the same IEEE auto-negotiation mechanisms. In fact, the mechanisms need to work before the PD has booted, because the PD needs power before it can boot and initialize. By using these IEEE auto-negotiation messages and watch ing for the return signal levels, PoE can determine whether the device on the end of the cable requires power (that is, it is a PD) and how much power to supply. Step 1Do not supply power on a PoE-capable port unless negotiation identifies that the device needs power. If yesStep 2Use Ethernet auto-negotiation techniques, sending low power signals and monitoring the return signal, to determine the PoE power class, which determines how much power to supply to the device. Step 3 If the device is identified as a PD, supply the power per the power class, which allows the device to boot. Step 4. Monitor for changes to the power class, both with auto-negotiation and listening for CDP and LLDP messages from the PD. Step 5 If a new power class is identified, adjust the power level per that class. The negotiation processes result in the PD’s signaling how many watts of power they would like to receive from the PSE. Thats it for this sessionIn my next session i will discuss about interface and cable issuesThank you for watching please do like share subscribe and hit the bell icon #poe #poweroverethernet #CCNA #training
iqAxYW7RoOc | 29 Aug 2020
Ethernet was developed at Xerox PARC between 1973 and 1974. Ethernet was designed to accommodate multiple computers that were Interconnected on a shared bus topology. Ethernet is a shared media where every device has the right to send at any time, and if more than two device sends data then a collision could occur. In shared media the collisions were managed by CSMA/CD Also known as Carrier Sense Multiple Access/Collision Detection To understand the CSMA/CD lets take an analogy of group conversation: for good communication, it is important that the participants should not all speak at once, which can be confusing. Instead, they should speak one after the other, so that each participant can fully understand what the others are contributing to the discussion. Without realizing, we actually behave like this ourselves in conversations: When someone else is talking, we stand back and listen. After the other participant has finished their contribution for the time being, we wait a short time and only start talking when the same participant or another participant in the conversation doesn’t start to say anything else. If we happen to start talking to someone else at the same time, we stop our attempt, wait a bit, and then try again. The CSMA/CD process is very similar. In the CSMA/CD access method, all network devices that have messages to send must listen before transmitting. If a device detects a signal from another device, it will wait for a specified amount of time before attempting to transmit. When there is no traffic detected, a device will transmit its message. While this transmission is occurring, the device continues to listen for traffic or collisions on the LAN. After the message is sent, the device returns to its default listening mode. Later on The physical topology was also changed to a star topology using hubs. A hub, also called a network hub, is a common connection point for devices in a network. The hub contains multiple ports. In a hub When a frame arrives at one port, it is copied to the other ports so that all the segments on the LAN receive the frame. However, repeating the frame to all other ports did not solve the issue of collisions. Hub is again a shared media and only one device could successfully transmit at a time. This type of connection is described as a half-duplex communication. As more devices were added to an Ethernet network, the amount of frame collisions increased significantly. As the number of devices and subsequent data traffic increase, however, the rise in collisions can have a significant impact on the user's experience. A significant development that enhanced LAN performance was the introduction of switches to replace hubs in Ethernet-based networks. Switches can control the flow of data by isolating each port and sending a frame only to its proper destination (if the destination is known), rather than send every frame to every device. The switch reduces the number of devices receiving each frame, which in turn reduces or minimizes the possibility of collisions. It allows a full-duplex communications (having a connection that can carry both transmitted and received signals at the same time) Switches are more advanced than hubs and treat each port as a separate, point to point link. This means that bandwidth is no longer shared across the whole LAN. Therefore the switch acts as a boundary to prevent collisions from happening across the network. Thats it for this session. In my next session i will discuss about Concepts of PoE #CCNA #ethernet #training
YvUdHzvMVuA | 24 Aug 2020
Network cables are used to connect devices and transfer data or information between those devices on an ethernet network. These cables are essentially the carrier or media through which data flows. There are two types of cables we can use for Ethernet networks: * UTP (Unshielded Twisted Pair)/Copper cable * Fiber cables UTP Cable UTP cables use copper to transmit an electrical signal. To create the electrical circuit, we use two wires inside the UTP cable to create a loop, which allows electricity to flow: To send data between two devices, it uses encoding scheme. when we want to send a 1 we send a high voltage. When we want to send a 0, we send a low voltage. When both devices use the same encoding scheme, we can exchange data. One issue with electricity when sending it through a wire is that we get EMI (electromagnetic interference). Twisting the cables helps to cancel most of the EMI between the wire pairs. Breaking Down a UTP Ethernet Link The term Ethernet link refers to any physical cable between two Ethernet nodes. The cable holds some copper wires, grouped as twisted pairs. Many Ethernet UTP cables use an RJ-45 connector on both ends. To complete the physical link, each node need an RJ-45 Ethernet port that matches the RJ-45 connectors on the cable so that the connectors on the ends of the cable can connect to each node. The cable with connectors is then connected to a NIC (Network Card) or a switch port: PCs often include this RJ-45 Ethernet port as part of a network interface card (NIC), Switches typically have many RJ-45 ports because switches give user devices a place to connect to the Ethernet LAN. UTP cables can be wired as straight through or crossover. straight through cables are primarily used for connecting unlike devices. such as * Switch to router * Switch to PC or server * Hub to PC or server And crossover cables are use for connecting a like devices. such as * Switch to switch * Switch to hub * Hub to hub * Router to router * Router Ethernet port to PC NIC * PC to PC three most commonly used Ethernet standards for copper are : 10BASE-T (Ethernet), 100BASE-T (Fast Ethernet, or FE), and 1000BASE-T (Gigabit Ethernet, or GE). You can identify in IEEE standard name if is the copper when it includes the letter T The advantage of UTP is that it’s cheap and easy to work with. The capability of many UTP-based Ethernet standards to use a cable length up to 100 meters means that the majority of Ethernet cabling in an enterprise uses UTP cables. One of the disadvantages is that you can only use it up to 100 meter. This is where the our next topic comes in to the picture Fiber cables Fiber optic cable is a high-speed data transmission medium. It contains tiny glass or plastic filaments as the medium through which light passes varying that light over time to encode 0s and 1s. Digital data is transmitted through the cable via rapid pulses of light. The receiving end of a fiber optic transmission translates the light pulses into binary values, which can be read by a network device Components of a Fiber-Optic Cable Fiber is actually composed of two layers of glass. • The “core”, which carries the actual light signal.• The “cladding”, a layer of glass surrounding the corecladding and core work together to create the environment to allow transmission of light over the cable. The three outer layers of the cable protect the interior of the cable and make the cables easier to install and manage. When using fiber cable To transmit between two devices, you need two cables, for tx and rx one for each direction, as shown in Figure 2-18. Fiber Types There are two main types of fiber optic cables: • Single Mode Fiber (SMF)• Multi-Mode Fiber (MMF) • The difference is basically in the size of the core. SMF has a very narrow core (typically around 9μm), which allows only a single mode of light to propagate. Single-mode allows distances into the tens of kilometers, but with slightly more expensive SFP/SFP+ hardware. SMF fiber you can see on the right side in yellow MMF has a much wider core (typically 62.5μm or 50μm), allowing multiple modes (or “rays”) of light to propagate. Fiber allow for distances up to 400m Some of the commonly used ethernet standard for fiber are 1000BASE-LX sm 10GBASE-S mm 10GBASE-LX4 mm 10GBASE-LR sm 10GBASE-E /ZR sm #CCNA #fiber #UTP #copper #singlemode
_nC7Op12Tw8 | 17 Aug 2020
The cloud’ is just a shorthand term for 'cloud computing’. According to National Institute of Standards and Technology (NIST) “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” If the official definition of cloud sounds a little hazy, don’t worry Let me explain you about cloud computing with an analogy A good analogy for a cloud computing provider (like Amazon, Microsoft, Google, or Salesforce) is a utility company. Utility companies store resources like water, electricity, and natural gas so they can deliver them to you when you need them. When you open a faucet (a request), water pours out instantly and you can take as much or as little as you want. .It can be Just a glass/bowl or A whole jar full? Utility companies meter how much water you consume, so you pay only for what you use. It’s all very convenient to the point to where utilities are always available and provide you the resources you need, when you need them. And the whole system “just works” without you having to think much about it. The utility model holds true with cloud services too, but instead of water, the cloud providers deliver computing resources in the form of access to servers, storage, networks, and cloud applications through the “pipes” of the internet. And instead of storing water in a reservoir or a water tank, cloud providers house millions of computers in datacenters all around the world that you can access by simply signing up for an account and clicking a few buttons… all of this without requiring you to set up any computer hardware on your end. You simply pay for the computing resources you use, and they “just work”. 5 Characteristics that define cloud computing According to the National Institute of Standards and Technology, cloud computing has 5 essential characteristics, which i have already hinted at in our analogy. On-demand self-service With cloud, you can request computer resources easily, like opening a faucet or flipping a light switch. You automatically get your computing resources with minimal human interaction, meaning that you don’t have to ask someone from IT to set up computers or configure anything manually to get service. Shared resource pooling cloud resources live in giant data centers and are shared by people across the world, just as the water supply for a city is shared among its citizens. You don’t know exactly which glass of water in a reservoir will come through your faucet, and you don’t necessarily know which exact computer in a data center you’ll end up accessing. Rapid elasticity cloud providers can quickly adjust the amount of computing resources they deliver to meet your needs. If you need 1 web server or 100, they can give them to you. Similarly, a utility company could easily deliver 100 gallons or 10,000 gallons of water without any problem. Measured service cloud providers like Amazon Web Services, Microsoft Azure track how many computing resources you use in a given time period. But instead of gallons of water, they meter cloud storage used, hours of CPU usage, number of active user accounts, etc. Broad network Access you can access your cloud resources using a wide variety of computing devices or through various networks (like the internet) just as you can get water from any number of connected faucets, hoses, or dispensers. There are four cloud deployment models: public, private, community, hybrid. Each deployment model is defined according to where the infrastructure for the environment is located. The world of cloud computing has long used the terms private cloud and public cloud. In more recent years, you may also find references that instead use a different pair of terms for the same ideas, with on-premise meaning private cloud, and cloud meaning public cloud. Private or On-Premise This deployment model is defined as one in which “the cloud infrastructure is provisioned for exclusive use by a single organization The private cloud network is usually implemented on premises, meaning all the computing resources are located on premise and belongs to the organization and can be securely accessed by only the employees. It is like the corporate IT network Cloud or Public cloud This deployment model is defined as one in which Cloud infrastructure provisioned for open use by the general public. A public cloud is one based on the standard cloud computing model, in which a service provider makes resources available to the general public over the internet. A public cloud typically is deployed by a service provider with global reach and an extremely easy service engagement It exists on the premises of the cloud provider”. One of the well known examples of such clouds are amazon web services #ccna #cloud #training
jpQZdhKv5tE | 11 Aug 2020
SOHO is the abbreviation for Small Office/Home Office network.. These days, many budding entrepreneurs and small business owners prefer to work from home or to maintain only a small office. Budding entrepreneurs and small business owners need small network and access to the Internet for their daily work. SOHO network is a solution for this type of network requirement. SOHO refers to designs and implementations that have such a small volume of requirements—few switch ports, few APs, router and WAN link. The term SOHO refers to the two most common cases: a user who works from home or a small office with a small number of workers and devices. It is meant for use in small businesses. SOHO networks are small LANs (Local Area Networks) with less than 10 devices. A SOHO network can be a small wired Ethernet LAN or made of both wired and wireless computers. In a typical small ethernet-only SOHO lan a device called an Ethernet LAN switch, which provides many physical ports into which cables can be connected from PCS, printer and a network device such as router. The router connects the LAN to the WAN, in this case to the Internet. Typical SOHO LANs today also support wireless LAN connections. You can build a single SOHO LAN that includes both Ethernet LAN technology as well as wireless LAN technology, It includes another networking device: a wireless LAN access point (AP). The AP acts somewhat like an Ethernet switch, in that all the wireless LAN nodes communicate with the wireless AP. If the network uses an AP that is a separate physical device, the AP then needs a single Ethernet link to connect the AP to the Ethernet LAN SOHO network might also includes Firewall to prevent from attacks. However, most SOHO networks today would use a single device, often labeled as a “wireless router,” that does all these functions. Thats it about SOHO NETWORK, in my next session i will discuss about on premise and cloud #soho #SOHO #CCNA #training
6TF2ph6jiEI | 07 Aug 2020
In its simplest form, a wide-area network (WAN) is a collection of local-area networks (LANs) or other networks that communicate with one another. A WAN is essentially a network of networks, with the Internet the world's largest WAN. A WAN operates beyond the geographic scope of a LAN. WANs are used to interconnect the HQ LAN to remote LANs in branch sites and telecommuter sites. A WAN is owned by a service provider. A user must pay a fee to use the provider’s network services to connect remote sites. WAN service providers include carriers, such as a MPLS network, telephone network, cable company, or satellite service. Service providers provide links to interconnect remote sites for the purpose of transporting data, voice, and video. In contrast, LANs are typically owned by an organization. They are used to connect local computers, peripherals, and other devices within a single building or other small geographic area. Are WANs Necessary? Without WANs, LANs would be a series of isolated networks. LANs provide both speed and cost-efficiency for transmitting data over relatively small geographic areas. However, as organizations expand, businesses require communication among geographically separated sites. The following are some examples where we need wan. Regional or branch offices of an organization need to be able to communicate and share data with the central site or HQ. Employees who travel on company business frequently need to access information that resides on their corporate networks. WAN Topologies Interconnecting multiple sites across WANs can involve a variety of service provider technologies and WAN topologies. There are four Common WAN topologies. Point-to-point topology -:•Employs a point-to-point circuit between two endpoints Hub-and-spoke topology -:•Applicable when a private network connection between multiple sites is required Full mesh topology -:•With a full mesh topology using virtual circuits, any site can communicate directly with any other site. Dual-homed topology -:•Provides redundancy and load balancing however they are more expensive to implement than single-homed topologies. WAN technologies are either Circuit-switched-: Such as PSTN or ISDN Packet-switched. -:MPLS,Metro Ethernet WAN, ATM, or Frame Relay. #wan #CCNA #freetraining #netowork
xjc7WLBb-nI | 02 Aug 2020
#ccna #spine #leaf #freetraining Many things have changed in the data center over the last decade or so. In fact, so much has changed that the “old” three-layer model of access, aggregation, and core is no longer ideal. As This model was designed based on a “south to north” flow of data. Currently a new architecture is replacing the traditional three-tiered network architecture, which is known as Spine-Leaf architecture The spine-leaf architecture was developed to overcome the limitations of the three-tier architecture Given the prevalence of cloud and containerized infrastructure in modern data centers, east-west traffic continues to increase. Spine-Leaf model is the ideal choice for building the modern data center network. Spine-Leaf  is a two-layer network architecture  composed of leaf switches and spine switches. The leaf layer consists of access switches that connect to devices such as servers or storage devices and WAN devices Those switches are also called as TOR or EOR switches in modern data centers. The spine layer is the backbone of the network and is responsible for interconnecting all leaf switches. In this two-tier Clos architecture, every leaf switch is connected to each of the spine switches in a full-mesh topology. Leaf-spine network is more useful for data centers that experience more east-west network traffic than north-south traffic. Advantages of leaf spine architecture While in a three-tier network, one server may need to traverse a hierarchical path through two aggregation switches and one core switch to communicate with another switch, which adds latency and creates traffic bottlenecks. With a spine-and-leaf architecture,No matter which leaf switch a server is connected to, it has to cross the same number of devices every time it connects to another server. (The only exception is when the other server is on the same leaf.) This approach keeps latency at a predictable level and minimizes bottlenecks.because a payload only has to hop to a spine switch and another leaf switch to reach its destination. Each leaf connects to all spines with no interconnections among neither spines themselves nor leafs which creates a large non-blocking fabric. Another advantage is the scalability If oversubscription of a link occurs the process for expanding capacity is straightforward. An additional spine switch can be added, and uplinks can be extended to every leaf switch, resulting in the addition of interlayer bandwidth and reduction of the oversubscription. If device port capacity becomes a concern, a new leaf switch can be added by connecting it to every spine switch and adding the network configuration to the switch. The ease of expansion optimizes the IT department’s process of scaling the network. If one of the top tier switches were to fail, it would only slightly degrade performance throughout the data center. Thats all about SPINE-LEAF for today. In my next session i will discuss about WAN characteristics Thanks for watching please do like share and subscribe and do not forget to hit the bell icon
ZmLxb8HzQX4 | 27 Jul 2020
Building a Campus network is more than only interconnecting physical network infrastructure devices. The most challenging and important part of it is the planning and design phases where different technical variables and technologies need to be considered that could even affect the product selection and the design entirely. Network designers do not just plug in devices to any port and connect switches to each other in an arbitrary way, like you might do with a few devices on the same table in a lab. Instead, there are known better ways to design the topology of a campus LAN, Cisco’s hierarchical network design model breaks the complex problem of network design into smaller and more manageable. Each layer or tier in the hierarchy is focused on specific set of roles. This helps the network designer and architect to optimize and select the right network hardware, software and features to perform specific roles for that network layer The two proven hierarchical design architectures for campus networks are the 1.Three-tier model 2.Two-tier model A typical enterprise hierarchical campus network design includes the following three layers: 1.Core layer 2.Distribution layer 3.Access Layer Three-tier layer model This design model can be used in large campus networks where multiple distribution layer and buildings need to be interconnected Access Layer The access layer is the first tier or edge of the campus. It grants end devices access to the network. As shown in Figure, the access layer network generally incorporates Layer 2 switches and access points providing connectivity between workstations and servers. The access layer provides the intelligent demarcation between the network infrastructure and the computing devices that leverage that infrastructure. It is the first layer of defense in the network security architecture and the first point of negotiation between end devices and the network infrastructure. When looking at the overall campus design, the access switch provides the majority of these access-layer services and is a key element in enabling multiple campus services The Distribution Layer The distribution layer in the campus design has a unique role in that it acts as a services and control boundary between the access and the core. The distribution layer on the other hand serves multiple purposes.  It is an aggregation point for all of the access switches and acts as an integral member of the access-distribution block providing connectivity and policy services for traffic flows within the access-distribution block The distribution layer aggregates the data received from the access layer switches before it is transmitted to the core layer for routing to its final destination. A distribution layer switch may provide upstream services for many access layer switches. In Figure, the distribution layer is the boundary between the Layer 2 domains and the Layer 3 routed network. Either a router or a multilayer switch is used to segment workgroups and isolate network problems in a campus environment. Core layer The core layer is also referred to as the Network Backbone The campus core is in some ways the simplest yet most critical part of the campus. The core layer consists of high-speed network devices such as the Cisco Catalyst 6500 or 6800. . The core aggregates the traffic from all the distribution layer devices, and are designed to and interconnect multiple campus components. As shown in Figure , the core layer is critical for interconnectivity between distribution layer devices (for example, interconnecting the distribution block to the WAN and Internet edge). It provides a very limited set of services and is designed to be highly available and operate in an always-on mode. In the modern business world, the core of the network must operate as a non-stop 7x24x365 service. The key design objectives for the campus core are based on providing the appropriate level of redundancy to allow for near immediate data-flow recovery in the event of any component (switch, supervisor, line card, or fiber) failure. Two-tier layer model This design model, is more suitable for small to medium-size campus networks Many small enterprise networks do not grow significantly larger over time as large organization grow. In such network the core and distribution functions can be combined into one layer, also known as collapsed core-distribution architecture. A “collapsed core” is when the distribution layer and core layer functions are implemented by a single device. The primary motivation for the collapsed core design is reducing network cost, while maintaining most of the benefits of the three-tier hierarchical model. In my next session i will be discussing about leaf and spine Architecture. Thank you for watching please do like share and subscribe. Do not forget to hit the bell icon. #CCNA #2tier #3tier #collapsedcore
_hdtdJWJGtA | 22 Jul 2020
What Is a Server? Generically speaking, a server is a software component or a dedicated hardware that can accept requests from multiple clients, providing suitable responses after processing these requests. The device that makes the request, and receives a response from the server, is called a client. A server is a centralized machine where multiple clients can connect through LAN or over the internet through which they can connect to a server to request for a specific service. Requested service can be anything For ex-:the video which you are watching was uploaded by me on youtube and is hosted on the youtube server and you are able to stream or watch by using youtube app/webpage on your phone or laptops Client requests youtube server to stream the video and the youtube server responds back with the content. Server is not just a physical computer but rather a role that computer takes Lets see some of the common Types of servers Application server Database server Domain name service File server Mail server Web server Some servers are committed to a specific task, often referred to as dedicated. Like they are only dedicated to handle one of these requests only Such as one server for website or one server for database or one server for email server. This can happen only in large organization. But in small organization where the requirements are not as much as large organization you can set up a server to handle all those request in a single machine. which can take on the responsibility of e-mail, DNS, and even multiple websites in the case of a web server. Can my Home computer be used a server? As i said earlier Server is not just a physical computer but rather a role that computer takes That means you can setup any desktop computer as server. Any computer,or laptop or even mobile phone can act as a server with the right software. For example, In home networks, personal computers can be used as file server to share files between other devices on your network. Hardware Components of a server Central processing unit (CPU): Unquestionably the most important component of any node the CPU (aka processor) is responsible for the majority of processing jobs and calculations. Main memory: The CPU uses these fast, volatile storage areas to directly access data retrieved from files and programs that are being worked on. Main memory can be also referred to as random-access memory (RAM), mainly because the CPU can possibly access any part of it. Internal storage: Most servers have an internal device that allows the recording and reading of data for multiple purposes such as loading the operating system and storing application information. The most usual internal storage devices are hard drives, Network interface controller (NIC): This is a hardware device that controls the communication between a server and the network. Peripherals: These are auxiliary devices that perform particular functions such as data input, output, or specialized processing. Some examples are the mouse, keyboard, and printer, among many others. Server can host different types of Operating Systems Microsoft Windows Linux FreeBSD Apple Mac OS Android Two different models of servers offered by Cisco are Cisco UCS-C series Cisco UCS-B series in my next session i will be discussing about the different types of network topology architectures #CCNA #server #UCS #cisco Thank you for watching please do like share subscribe and hit the bell icon.
gcn4H6igDN8 | 20 Jul 2020
An endpoint is a remote computing device that communicates back and forth with a network to which it is connected. An endpoint/client is any device that is physically an end point on a network. Endpoint refers to a unit at the end of a communication channel. Laptops, desktops, tablets, mobile phones, Workstations, servers, desk phones, , IoT devices and virtual environments can all be considered endpoints. Endpoint functionality. Endpoint devices are designed to perform specific, limited functions. IP Phones for audio or video calling Cisco offers wide variety of endpoints *Cisco Headsets Cisco Headsets integrated into the collaboration platform ex-:Cisco Headset 700 Series Cisco Headset 500 Series *Cisco Web-ex Desk Series The Cisco Webex Desk Series includes the most powerful, all-in-one collaboration devices designed for the desk. • Cisco Webex Desk Series *Collaboration Peripherals phone and video conferencing peripherals. IP Phone Accessories * • Wall mount bracket * • Power adapter * • POE splitter * • TelePresence Peripherals * • Cisco TelePresence Microphones * • Cisco TelePresence Precision Cameras * • usually you will find this things in meeting rooms. *Collaboration Room Endpoints * • Cisco TelePresence MX Series * • Cisco TelePresence SX Series *IP Phones * • Cisco IP Phone 8800 Series * • Cisco SIP IP Phone Software *Software Clients Cisco Jabber for android mac and windows #CCNA #endpoints #freetraining
-eH9RpVNvlU | 15 Jul 2020
Cisco DNA also known as Cisco Digital Network Architecture (Cisco DNA) is Cisco’s architecture for enterprise networks It provides an open, extensible, and software-driven approach that makes the network simpler to manage and more agile and responsive to business needs. Cisco DNA is an intelligent system that encompasses policy, automation, analytics, and open platform capabilities to deliver on all required aspects of an intent-based network. In case if you do not know what IBN is. Intent-based networking (IBN) is a form of network administration that incorporates artificial intelligence (AI), network orchestration and machine learning (ML) to automate administrative tasks across a network. The goal of IBN is to reduce the complexity of creating, managing and enforcing network policies and reduce the manual labor associated with traditional configuration management. Cisco DNA is your team’s bridge to an intent-based network. Cisco DNA Center is a powerful network controller and management dashboard that lets you take charge of your network, Cisco DNA Center is at the heart of the Cisco Digital Network Architecture and is the only centralized intent-based network management system to bring all this functionality into an integrated controller and present it through a single pane of glass. Cisco DNA Center has two notable roles: * ♣ As the controller in a network that uses Cisco SDA * SDA and DNA Center go together, work closely together, and any serious use of SDA requires the use of DNA Center. * ♣ As a network management platform for traditional (non-SDA) network devices, with an expectation that one day DNA Center may become Cisco’s primary enterprise network management platform Cisco DNA Center exists as a software application that Cisco delivers pre-installed on a Cisco DNA Center appliance The software follows the same general controller architecture as shown in the fig Cisco DNA Center includes a robust northbound REST API along with a series of south- bound APIs. For most of us, the northbound API matters most, because as the user of SDA networks, you interact with SDA using Cisco DNA Center’s northbound REST API or the GUI interface. Cisco DNA Center supports several southbound APIs so that the controller can communicate with the devices it manages. You can think of these as two categories: * ♣ Protocols to support traditional networking devices/software versions: Telnet, SSH, SNMP * ♣ Protocols to support more recent networking devices/software versions: NETCONF, RESTCONF Use fo Cisco DNA Center enables you to do Automate: Allows Configuration and provisioning of thousands of network devices across your enterprise in minutes, not hours. Automation reduces manual operations and the costs associated with human errors, resulting in more uptime and improved security. Secure policy:- Based on business needs you can deploy group-based secure access and network segmentation With Cisco DNA Center, you apply policy to users and applications instead of to your network devices. Assurance:- Cisco DNA Center uses your network’s wired and wireless devices to create sensors everywhere, providing real-time feedback based on actual network conditions. With a quick check of the health scores on the Cisco DNA Center dashboard, you can see where there is a performance issue and identify the most likely cause in minutes. Extend ecosystem: With the new Cisco DNA Center platform, IT can now integrate Cisco solutions and third-party technologies into a single network operation . Cisco DNA Center allows you to run the network with open interfaces. #CCNA #Cisco #DNA
0lDiFNIKepM | 09 Jul 2020
#CCNA #wireless #wlc #free #training #wlan What Is a WLAN Controller? A WLAN controller is a network devices that manages wireless network access points that allow wireless devices to connect to the network. ole and function of WLC We have so many wireless devices nowadays which access wireless network or internet. We have almost become accustomed to expect wireless connection wherever we go. In Your organization you certainly have more than one access point. You will have it in every room or on every floors or probably have them in different buildings and in very large organizations they could be even at different locations. When we look at large Enterprise networks, a single access point is not enough. Imagine a network with thousands of users. You might have tens or even hundred of access point that you have to managed and to take care of. And of course all of these access point has to be administered and you may need to make configuration changes or update security policies on those access points. When you walk around the office, you want seamless connectivity and don’t want to get disconnected every time when your wireless device switches from one access point to another. You want to have a stable wireless connection, wherever you go. Switching seamlessly switching from one access point to another is called roaming. This all requirements can be met by using a device called WLAN controller It is usually a software loaded on one of yours servers or it’s an appliance like this one that’s centralize the management of these access points Some people call this as a single pane of glass like i can go to one screen and I could see everything happening with my wireless access points . By using WLC’s all management tasks are moved from the access points to the wireless LAN controller. It takes care of authentication, roaming, creating new wireless networks etc. this also makes it very easy to deploy new access points as you don’t have to do any special configurations you simply plug the access point into the network and the wireless controller takes it from there and allows to configure everything from the central point. if you do need to make a change or configure something across all of your access points you can do it in one place on a single wireless controller and that wireless controller will push that configuration change to all of your access points of course The main objective of the WLC or Wireless LAN Controller is to be able to centralize all the control of the access points, The access points are only responsible for forwarding traffic, we call these AP’s as LWAPs (Light Weight Access Point). the wireless controller can also provide statistics and performance information so you’ll know exactly how well your wireless network is running. Most wireless controllers have some type of reporting mechanism so that you can get long-term information about how well your wireless network is running With all those feature i can say by using WLC AP’s are Easy to access Easy to manage Error free  Lightweight Access Point Protocol (LWAPP) is used on between WLC and AP to manage access points in large quantities by the network administrator or network operations center. WLC is regarded as on of the important element of wireless network that is quick and effective. I would like end by sharing one interesting fact about WLC Despite being called a wireless LAN controller, a WLC is connected to the wired LAN and to the lightweight APs by wires. The WLC does not have any wireless connections. In my next video i will be discussing about CISCO DNA Center controller. If you like this video.please do like, share, subscribe and hit the bell icon
POd9c5JI25o | 02 Jul 2020
Access point(APs) also known as Wireless access points ( WAPs) are networking devices that allow wireless devices such as laptops, tabs or mobile phone to connect to a wired network. which include devices such as servers or printers or the connectivity to the internet. Devices connected to AP form a network called as WLANs also known as wireless local-area networks . WAP is One of the key component of WLAN architecture. The wireless access point serves as the interconnection point between the WLAN and a fixed wired network. An access point acts as a central transmitter and receiver of wireless radio signals. Access Points works at data link layer (layer two of OSI model) An access point is a networking hardware appliance that can come as an independent device or as a stand alone units capable of being transferred and moved anywhere. It can also be a component of a router. Such as your home wifi router which also includes features such as switch , router , firewall, DHCP, DNS and AP feature. WAP devices are widely used in the following environments: * Corporate Corporate organizations use a number of WAP devices and attach them to a traditional wired network, in order to give wireless access to the office LAN. Within the office setup, users have the advantage of network access coupled with mobility. Access point can handle over 60 simultaneous connections each. * Another kind of environment where the access point are widely deployed is Hot spot Hot spots are used for public access to the internet. Wireless devices can access the Internet by directly connecting to the network present at these hot spots. Hot spots can be found in hotels, airports, coffee houses, malls, and so on. * Access points are also used at Home wireless networks Home wireless networks use wireless routers in conjunction with broadband modems to provide wireless access within a home environment. Access points are used for as wireless range extender extending and increasing the wireless coverage of an existing network and for increasing the number of users that can connect to it.. WAP modes The access point can operate in different modes.The wireless network access modes are as follows: * Local Mode * Client Mode * Sniffer * SE-Connect * Rogue Detector * Flexconnect * Bridge * Monitor Local mode This the default mode and also known as access point mode. In this modes, clients such as laptops, smartphones, tablets can communicate with Access Point. Client Mode In this mode access point can connect to another access point as a client. Client Mode can be used in a scenario such as: For example internet of your company is provided by a remote access point and to get internet form this remote access point to your area, you can use your access point in Client Mode. Sniffer Sniffer Mode is used for troubleshooting activities to monitor and analyze the wireless traffic with various tools like wireshark. It is a passive monitoring mode SE-Connect In this mode you can collect information about the RF Spectrum of your wireless connection by connecting Cisco Spectrum Expert. Do keep in mind a LAP operating in SE-Connect mode will not be broadcasting an SSID and does service any WLAN clients. This mode is strictly used for troubleshooting purposes. Rogue Detector Rogue Detector Mode is the Access Point mode that is used to detect rogue devices. This detection is done via their MAC addresses. Flex-connect If you do not want to use a WLC at every brach, Flex-connect mode is the mode that you should use. With this Flex-connect mode, your Access Points do not need to connect WLC always. Even if your connection is lost to WLC, then it continues to switch your traffic locally without WLC. Bridge In Bridge Mode, Access Points are used to connect two networks. There are two sub modes coming with Bridge mode. There are: * Point-to-Point * Point-to-Multipoint With Point-to-Point Bridge Mode, we can connect the LAN of a router to a remote access-point. With Point-to-Multipoint Bridge Mode, we can connect two LANs with one wireless link. Monitor Monitor mode allows a AP to monitor all traffic received on a wireless channel. The monitor mode works by sniffing the packets in the air without associating or linking with any access point. An AP in Monitor Mode does not service wireless clients A Monitor AP scans through every configured channel once every 12 seconds. Lets take an example of Back Panel of Cisco WAP351 Wireless-N Dual Radio Access Point on the left side you will find a power switch to power on or off the AP. Next to the power switch you will power adaptor port. Next to the power port we have a reset button in case if you want to factory reset it. Then we have 5 ethernet ports which also includes POE port. Some access point may also have a single lan port In my next session i will be discussing about another interesting topic that is on WIRELESS LAN CONTROLLER. #accesspoint #CCNA #wireless #AP
tZ8RNaVAbDw | 26 Jun 2020
Traditional Firewalls A firewall is a network security device that monitors incoming(from public to private) and outgoing (private to public)network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. Security Zones Firewalls use the concept of security zones when defining which hosts can initiate new connections. The firewall rules define which host can initiate connections from one zone to another zone. Also, by using zones, a firewall can place multiple interfaces into the same zone, in cases for which multiple interfaces should have the same security rules applied. You can have 3 types of zones in firewall The inside or trusted zone The outside or untrusted zone The DMZ zone Intrusion Prevention Systems (IPS) An intrusion prevention system (IPS) is a form of network security that works to detect and prevent identified threats. A traditional intrusion prevention system (IPS) can sit in the path that packets take through the network, and it can filter packets same like a firewall and but it makes its decisions with different logic. It uses a signature-based technology to detect network intrusions. Cisco Next-Generation Firewalls Cisco and some of their competitors started using the term next generation when discussing their security products to emphasize some of the newer features. In short, a next-generation firewall (NGFW) and a next-generation IPS (NGIPS) are the now current firewall and IPS products from Cisco. The following list mentions a few of the features of an NGFW. * Traditional firewall: An NGFW platform also includes traditional firewall features, like stateful fire- wall filtering, NAT/PAT, and VPN termination. Along with traditional firewall feature we have AVC * Application Visibility and Control (AVC): This feature looks deep into the application layer data to identify the application. For instance, it can identify the application based on the data, rather than port number, to defend against attacks that use random port numbers. * Advanced Malware Protection: NGFW platforms run multiple security services such as A network-based anti-malware function can run on the firewall itself, blocking file transfers that would install malware, and saving copies of files for later analysis. * URL Filtering: This feature examines the URLs in each web request, categorizes the URLs, and either filters or rate limits the traffic based on rules. The Cisco Talos security group monitors and creates reputation scores for each domain known in the Internet, with URL filtering being able to use those scores in its decision to categorize, filter, or rate limit. * NGIPS: The Cisco NGFW products can also run their NGIPS feature along with the firewall. * Note that for any of the services that benefit from being in the same path that packets traverse, like a firewall, it makes sense that over time those functions could migrate to run on the same product. So, when the design needs both a firewall and IPS at the same location in the network, these NGFW products can run the NGIPS feature as shown in the combined device in Figure 5-10. * Lets see what are the new model of NGFW provided by cisco * ASA 5500-X with FirePOWER Services For small to medium business, branch office * Firepower 2100 Series For Internet edge to data center environmentsFirepower 4100 Series For Internet edge, high-performance environments Firepower 9000 Series For service provider, data center Cisco Next-Generation IPS Similarly As with the NGFW, the NGIPS also adds new features to a traditional IPS. * Traditional IPS: An NGIPS performs traditional IPS features, like using exploit signatures to compare packet flows, creating a log of events, and possibly discarding and/or redirecting packets. * Application Visibility and Control (AVC): As with NGFWs, an NGIPS has the ability to look deep into the application layer data to identify the application. * Contextual Awareness: NGFW platforms gather data from hosts such OS details software version, applications running, open Ports and so on. This data is fed to NGIPS which helps in NGIPS to focus on actual vulneribilites . * Reputation-Based Filtering: A Cisco NGIPS can perform reputation-based filtering, taking the scores into account. (Which is updated by cisco TALOS security intelligence group) * Event Impact Level: Security personnel need to assess the logged events, so an NGIPS provides an assessment based on impact levels, with characterizations as to the impact if an event is indeed some kind of attack. #CCNA #NGFW #NGIPS #FREETRAINING
oLPA5xzrqsY | 15 Jun 2020
#ccna #switch #network Switches are key building blocks for any network. It has multiple ports and connects multiple devices, such as computers, laptops, wireless access points, printers, cameras and servers; on the same LAN within a building or campus. A switch enables connected devices to share information and talk to each other. It is called layer 2 device because it works on layer 2 of the OSI model and it uses mac address in order to share data from one end to other end. It learns the physical address of the devices that are connected to it and store the physical address called mac address in its mac table. Unlike hub switch is an intelligent device Switches are ASIC based .ASIC stands for application specific integrated circuit. This feature helps the switch to make the switching decisions very quickly. Every port on a switch is in a different collision domain, i.e a switch is a collision domain separator All ports on a switch are by default in the same broadcast domain. A broadcast domain contains all devices that can reach each other at the data link layer (OSI layer 2) by using broadcast. There are two types of switches Unmanaged switches An unmanaged network switch is designed so that you can simply plug them in and they work, no configuration required. Unmanaged switches are typically for basic connectivity. You'll often see them used in home networks or wherever a few more ports are needed, such as at your desk, in a lab, or in a conference room. One of the example of unmanaged switches include cisco 100 series switches. Managed switches Managed switches can be configure to custom-fit your network. Managed switches give you greater security and more features . With the greater control, and flexibility you can better protect your network and improve the quality of service for those who access the network. One of the example of managed switches in the data centers are cisco nexus 7k series switches. Before we go through the differences between L2 and L3 switches let’s understand what is layer 2 and layer 3 switch actually. A Layer 2 switch works with MAC addresses only and does not care about IP address. Layer 2 switches basically do switching only, which means they operate using devices’ MAC addresses to redirect the data packets from the source port to the destination port For inter-vlan communication on layer 2 switch a layer 3 router will be required for the device to communicate. A Layer 3 switch, or multilayer switch, can do all the job that a Layer 2 switch does. Additionally, it can do static routing and dynamic routing. That means, a Layer 3 switch has both MAC address table and IP routing table, and handles intra-VLAN communication and packets routing between different VLANs as well. How Switches Forward Frames and Dynamically Populates a Switch MAC Address Table Lets take an example of a small network with a pc and laptop connected to a switch When you first boot up the switch it has something know as CAM table/Mac address table. Cam table is essentially empty and it is going to include our mac addresses that it is going to learn from the end devices on our network. Lets say this pc has the mac address 0000.0000.0001 and the laptop has mac address of 0000.0000.0002 Lets say if you want to ping from PCA TO PCB ip address of PC-A is 1.1.1.1 and PC-B is 1.1.1.2 Next to communicate with PC-B the PC-A sends an ARP message ARP in a nutshell is a communication protocol used to resolve the layer-2 address (i e mac address) associated with layer 3 address (i.e ip address) The switch receives a frame from PC A on FA0/1 The switch examines the source MAC address and compares it to the MAC address table. If the address is not in the MAC address table, it associates the source MAC address of PC A with the ingress port (FA0/1) in the MAC address table. After the switch has recorded the source address information, the switch examines the destination MAC address.If the destination address is not in the MAC table the switch floods the frame to all ports, except the ingress port.The destination device (PC B) replies to the frame with a unicast frame addressed to PC A The switch enters the source MAC address of PC B and the port number of the ingress port into the address table. The destination address of the frame and its associated egress port is found in the MAC address table The switch can now forward frames between these source and destination devices without flooding because it has entries in the address table that identify the associated ports Cisco offers some exciting models of switches that can be used depending on the requirement and the network you have
kS42C3vqFco | 30 May 2020
We all use mobile phones and laptops or pc at home or at office to access network resources such as internet or a printer etc. To access the network and its resources every device on a TCP/IP-based network must have a unique unicast IP address. Along with IP address each device must be assigned a default gateway and IP Address of DNS servers Two basic IP address assignment methods: Static Dynamic ■Static: An IP address is statically assigned to a device by the administrator. The administrator configures the IP address, subnet mask, default gateway, and name servers IP manually. Static address assignment is an extra burden for the administrator—especially on large-scale networks— who must configure the address on every end system in the network. ■Dynamic IP addresses are assigned to the end systems by DHCP server. DHCP stands for dynamic host configuration protocol (DHCP) is a client/server protocol used for address assignment. With DHCP, this entire process is automated and managed centrally. This method relieves the administrator of manually assigning an address to every network device. On the client machine you have to select the option as obtain ip add and dns automatically. It automatically provides all the parameters to the end device DHCP Scope is a pool of IP addresses or usually a range of consecutive numbers within a single IP subnet maintained by DHCP server. DHCP server assigns IP’s to the client from this pool/scope. Any numbers that the administrator does not want to have handed out can be excluded from the pool DHCP adopts the concept of a “lease” in IP allocation. It sets a “lease duration” and allow the client to use the allocated IP address only during the set lease duration. If the client want to renew or wishes to use the allocated IP address for longer than the lease duration, it should request the DHCP server for renewal of the lease. If the device is disconnected or powered off , it releases the IP instead and returns to the pool for reallocation. #DHCP #DORA #CCNA #IP what happens when DHCP client requests an IP address from DHCP Server. There are some messages which are exchanged between the DHCP Server and Client. This process is divided in to four steps 1. DHCPDISCOVER : * When a DHCP client first boots up, it broadcasts a DHCPDiscover message. This message is intiated from DHCP Client to DHCP Server, to find the DHCP server on the local network 2. DHCPOFFER : If a DHCP server exists on the local segment, it will respond with a DHCPOffer. This offer message is From DHCP Server to DHCP Client , to offer the IP Parameters, which contains IP address, subnet mask etc. 3. DHCPREQUEST: * Once the client receives the offer, it will respond with a DHCPRequest, indicating that it will accept the offered protocol information. * This message is from DHCP Client to DHCP Server, giving a request to get the offered IP Parameters 4. DHCPACK: Finally, the server responds with DHCPAck, acknowledging the client acceptance of offered protocol information This message is from DHCP server to DHCP Client, giving confirmation to use the the offered IP parameters. This process is also known as DORA process. DHCP is a UDP service. Uses two UDP port numbers for its operations DHCP Server uses the UDP port 67 and DHCP client uses UDP port 68. Use of ports number prevents an application from getting a message from a completely different protocol. If the client and server are on different subnets, well a DHCP Helper or DHCP Relay Agent must be used in this case. Other than dynamically assigning IP addresses to client machines DHCP also has the ability to provide various other interesting parameters or DHCP options to client machines, like timezone information, boot arguments/paths, NTP servers, static routes, host name of the client, very useful for IoT and any device without user For more information on DHCP options/ parameters please go through RFC1533 #CCNA #DHCP #Free
tVOHTjf94M8 | 13 May 2020
Ping Is a simple and One of the most widely used utility tool to troubleshoot in the network/internet. You can use ping To test if a particular host is reachable. To test internet connectivity. To test if you network interface card is working correctly. To test DNS connectivity. #ping #ccna #network #ipnetwork
OdZ_oUTZ9Lw | 04 May 2020
Notes-: Cisco Command Line Interface (CLI) is the main interface where we will interact with Cisco IOS devices. From CLI we can do monitor device status or chang configuration. Cisco has divided its CLI into several different modes. Understanding Cisco IOS Command Line Modes is essential as Each of these modes serves a different purpose and has its own set of commands. CLI modes are as follows. 1.Setup Mode 2.Command Mode a.User mode b.Privileged Mode c.Configuration modes 3.Rommon Mode When we power-on the IOS operated device, It loads the functional IOS and then looks for the device configuration. If it does not find a valid configuration, it places the user in the mode known as setup mode. Setup mode This mode allows the user to configure the initial device configuration. This mode presents a text-based wizard that asks questions about initial settings in the sequence. Based on the answers provided by the user, the IOS automatically builds the initial configuration. Once the initial configuration is done or if the configuration is already present in the router a user will end up directly into the user mode 1.User mode The user mode is the default mode for the CLI. This is the first mode a user has access to after logging into the router. This is the prompt you are placed in when you access the device using the console cable or Telnet / SSH from other node. No matter how a user accesses the IOS, the IOS always places the user in this mode This mode is the least privileged mode in IOS. 2. Privileged mode As the name suggests, this mode includes privileged or powerful commands. This mode allows users to * To view, save and erase device configuration * To take the backup of the current device configuration * To restore the configuration from backup * To install a new IOS image file * To debug or troubleshoot the device * To restart or reload the device From privileged mode, you can access all the config command mode and sub modes. Configuration mode This is where the real configurations are done. As the name suggests, this mode includes the commands that are used to configure the device. A user can modify device configuration or running system configuration only from the configuration mode. Configuration mode has various submodes, starting with Global configuration mode, In this mode you can make global changes to the device your are configuring, such as configure a new hostname, creating a user account, set up passwords, configure authentication, etc. The commands in the global configuration mode usually apply to features that affect the system as a whole (hence the name global). From global configure mode you can access various submodes Interface Configuration Mode This modes will be accessed to configure an interface on your device The interface mode contains commands relevant to the interface being configured. Router Configuration Mode In this mode you can configure an IP routing protocol. so you can say it is Routing protocols configuration mode. Line Configuration Mode Line configuration mode commands allow you to configure the settings of vty ports This virtual port allows telnet or ssh access to the device. ROMMON Mode To understand this mode we need to go back to the bootup process. During the boot process, the IOS image file is loaded from flash into the RAM. If the IOS image file is missing or corrupt, if it fails to load IOS the device automatically enters the mode known as rommon mode. This mode allows the user to troubleshoot the IOS. In this mode, the user can select a different IOS image file to boot the device or load a new IOS image file from the TFTP server. You can manually enter in this mode for diagnostic purpose. This mode is also used for password recovery procedure. #router #cli #ios #cisco #CCNA
lTpMZlUNdCs | 28 Apr 2020
Brief overview of each major components CPU The CPU executes operating system instructions . Cisco routers use Cisco IOS as the operating system. It also does the computing,For Ex-: it executes algorithms such as Dijkstra's Shortest Path First Algorithm for OSPF routing protocol. a lot of things are done by the CPU. Router Memory Components 1.RAM (Random access memory) - RAM is volatile memory and loses its content when the router is powered down or restarted. RAM stores the instructions and data needed to be executed by the CPU. RAM is used to store following components: Operating System: The Cisco IOS (Internetwork Operating System) is copied into RAM during boot-up. Running Configuration File: This is the configuration file that stores the configuration commands that the router IOS is currently using. With few exceptions, all commands configured on the router are stored in the running configuration file, known as running-config. IP Routing Table: This file stores information about directly connected and remote networks. It is used to determine the best path to forward the packet. ARP Cache: This cache contains the IPv4 address to MAC address mappings, similar to the ARP cache on a PC. The ARP cache is used on routers that have LAN interfaces such as Ethernet interfaces. Packet Buffer: Packets are temporarily stored in a buffer when received on an interface or before they exit an interface. 2.NVRAM It stands for Non-volatile RAM, By "non-volatile", we mean that the contents of NVRAM are not lost when the router is powered down or reloaded. NVRAM is used to store the router's startup configuration/Backup config file NVRAM is used by the Cisco IOS as permanent storage for the startup configuration file (startup-config) so that way there we can return to the previous configuration we had before the reboot. We're going to look in NVRAM for that, we find that startup configuration file, and we load it. The router looks for the configuration information in the NVRAM unless the router is configured to load the configuration file from some other source. If NVRAM is empty when the router reloads, you will be prompted to enter setup mode. 3.ROM ROM stands for Read-Only Memory. ROM is a form of permanent storage. Non-Volatile ROM does not lose its contents when the router loses power or is restarted. ROM is used to start and maintain the router. Cisco routers use ROM to store: Bootstrap startup program-: power-on diagnostic test programs (the POST) -: Mini-IOS/Limited IOS-: Flash memory can be erased or overwritten, thus making the Cisco IOS upgradeable. If the bootstrap cannot find the IOS in Flash, a stripped-down version of the IOS that will be loaded from ROM instead. Provides a limited backup version of the OS, in case the router cannot load the full featured IOS. The contents of ROM cannot be altered or erased; the entire ROM chip must be replaced if an upgrade/repair is necessary. 4.Flash Memory Flash memory is non-volatile computer memory It is used as permanent storage for the IOS and other system related files. This is a type of EEPROM. It can be electrically stored and erased thus making the Cisco IOS upgradeable. Power Supply: A power supply is a component that supplies power to the router. The power supplies can be AC or DC. Configuration Register: The configuration register is what decides from where the router is going to boot the IOS image from. By default, the output is set to 0x2120, which tells the router to load the IOS from flash memory and to load the configuration from NVRAM. This value can be found at the last line of the show version command. External Components Management ports These include the console and auxiliary ports used to configure, manage and troubleshoot the router. Console ports - Console port is used to access the administration of the initial configuration and the command line interface (CLI). AUX port -: An RJ-45 port for remote administration access, similar to the console port. It is now considered an old port, as it was used to support dial up modems. LAN interfaces -: includes 2 integrated 10/100/1000 Ethernet ports Generally, they are used to provide LAN access by connecting with switches and users, or interconnect to another router. USB interfaces :Â Two USB host ports are included for additional storage space. Enhanced high-speed WAN interface card (EHWIC) slots - Two slots that support different types of interface modules, including Serial, digital subscriber line (DSL), switch port, and wireless. Storage Slots The Cisco 1941 ISR also has storage slots to support expanded capabilities.By default, only slot 0 is populated with a compact flash card from the factory, and it is the default boot location. #CCNA #router #components
Nnh_z8fWJuY | 15 Apr 2020
ROUTER AND ROUTING EXPLAINED WITH DIFFERENT TYPES OF ROUTER AND ADVANTAGES OF USING ROUTERS IN THE NETWORK. NOTES BELOW Router A router is a device that connects two or more networks together. It is a layer three device, because it operates at layer 3 of the OSI model of communication. It uses IP address to route the packets and is responsible for the path determination. In addition to connecting multiple networks together, the router also allows networked devices to communicate and multiple users to access the Internet. As its name implies, it “routes” traffic between the devices and the internet or between devices on other LAN. How the router works To understand how the router works we need to understand the process of routing. Routing refers to the process of taking a packet from one host and sending it to another host on a different network. It is usually done by the devices called routers. A router will have at least two ports, one physically connected to one network and the other physically connected to another network. A router can connect any number of networks together providing it has a dedicated NIC/Ports for each network. Every interface on the router is assigned a unique layer 3 address called as IP address The aim of IP address is to locate the sender and receiver within the network. IP addresses are saved on the router’s routing table, Routing table lists all possible paths in your network. When routers receive IP packets that need to be forwarded somewhere in the network, the router looks at the packet's destination IP address and then searches for the routing information in the routing table to forward it to the outgoing interface defined in the routing table. Types of routers Wired routers Wired router connects directly to a modem or WAN via network cable. Distributes the data packets to the connected computers using other ports through the cable. It comes with a port that connects to modem for communication with the Internet. Example-: CISCO 1941. Wireless router Wireless router connects directly to a modem through a cable for receiving Internet data packets. And distribute data packets to the connected computers using one or more antennae. Wireless routers create a wireless signal in your home or office. Any PC within range of Wireless routers can connect it and use your Internet. Example-: Cisco 880ISR and EA7500 Edge Router An edge router is a specialized router residing at the edge or boundary of a network. This router ensures the connectivity of its network with external networks, a WAN or the Internet. This type of router is placed at the edge of the ISP network. Edge routers inject classified traffic from the customer into the core, and forward from the core to the customer. Example-:Cisco ASR 9000 Series Routers Core router A core router is a router designed to operate in the Internet backbone, or core. Core routers provide transit packet forwarding service between other core and edge routers. Core routers forward stuff between the edges as bloody fast as possible. They tend to be optimized for a high bandwidth. Those routers are used as Service Provider Core Routers Cisco Carrier Routing System is the example for core routers vROUTER Software router that an enterprise or a cloud provider can deploy as a virtual machine in a provider-hosted cloud or in its own virtual environment. It delivers comprehensive WAN gateway and network services functions into virtual and cloud environments. Uses industry-leading Cisco IOS® XE Software. Two examples of vROUTER are CSR 1000v (Cloud Service Router) The Cisco CSR 1000v is supported across multiple hypervisors (VMware vSphere, Microsoft Hyper-V, Amazon AWS, and Microsoft Azure). ISRv The Cisco ISRv runs on server platforms running the Cisco NFVIS virtualization software only. Advantages of using Routers in the network Routers are used to segment large networks into inter-networks made up of smaller networks that are easier to manage. Routers can connect different network architectures, such as Ethernet and Token Ring. Routers can choose the best path across the network using dynamic routing techniques. Routers reduce network traffic by creating broadcast domain All ports on a router are in the different broadcast domains and routers don’t forward broadcasts from one broadcast domain to another. FOR CCNA EXAM TAKERS 1.0Network Fundamentals 1.1 Routers NEW CCNA EXAM TOPICS LINK https://www.cisco.com/c/dam/en_us/training-events/le31/le46/cln/marketing/exam-topics/200-301-CCNA.pdf Please like, share and subscribe :) And also share your comments #CCNA #router
9GciaJ7NazU | 30 Mar 2020
NETWORK EXPLAINED IN SIMPLE TERMS. FOR CCNA EXAM TAKERS 1.0Network Fundamentals NEW CCNA EXAM TOPICS LINK https://www.cisco.com/c/dam/en_us/training-events/le31/le46/cln/marketing/exam-topics/200-301-CCNA.pdf YOUR SUPPORT WILL BE REQUIRED FOR MY CHANNEL TO GROW. The best way to SUPPORT is to like, comment, subscribe, and share my videos. "SHARING IS CARING" #CCNA #Network
dcwJJ4Xbvzs | 23 Mar 2020
BREIF DISUSSION ON TCP/IP LAYERS AND EXAMPLE WITH TRAFFIC FLOW. YOUR SUPPORT WILL BE REQUIRED FOR MY CHANNEL TO GROW. The best way to SUPPORT is to like, comment, subscribe, and share my videos. "SHARING IS CARING" #TCP/IP #CCNA
qTNq4iCQC_w | 04 Mar 2020
A BREIF DISCUSSION ON TCP/IP MODEL HISTORY YOUR SUPPORT WILL BE REQUIRED FOR MY CHANNEL TO GROW. The best way to SUPPORT is to like, comment, subscribe, and share my videos. "SHARING IS CARING" #TCP/IP #tcp/ip #history #arpanet #cerf #kahn