show episodes
 
Loading …
show series
 
The linked video demonstrates RIPng, our first dynamic routing protocol for IPv6. This is a simple but inefficient routing protocol. The metric is based on number of router hops, with no provision for differentiating between links with drastically different bandwidth (a frame-relay hop has the same cost as a 10-gig-ethernet in RIPng). Each router m…
  continue reading
 
In 2003, I made a VOIP call from home while downloading a large email attachment. The DSL line saturated and my audio quality became horrible while VOIP packets (and email packets) were being dropped. Doubling the bandwidth to my home would not have solved this problem. The email download would simply have been faster, but the VOIP call would still…
  continue reading
 
The linked video introduces IPv6 theory. IPv6 is the 128-bit address replacement for IPv4. The Internet is expected to run out of it's 4-billion IPv4 addresses in 2012. IPv6 will replace IPv4 at the network-layer of the OSI stack. By replacing one layer in the stack, most applications and most layer-2 network devices will continue to function. IPv6…
  continue reading
 
Did you know when you associate to an access point your wireless NIC reports to the OS a 4201 code? Or, when your wireless NIC loses connectivity it reports a 4202 code? In this nugget, we will review the System Event Log for a wireless NIC. More specifically the 4201 and 4202 event code. I will also reproduce these event code in our lab.... Just a…
  continue reading
 
The linked video provides guidance for optimal IOS version selection. The large number of IOS versions makes choosing the best version for your router or switch difficult. You must pick the most reliable version which includes the features you need. Different IOS "packages" have different features. For example, the "LAN base" package includes basic…
  continue reading
 
In this video demonstration, we show an example of writing IOS Access Control Lists (ACL's) on a home router. We use the revision control system (RCS) to maintain the master ACL file and push the ACL's to the router via TFTP. This is similar to many production networks, where maintaing comments and old revisions of ACL's is a requirement. We also s…
  continue reading
 
IOS routers can act as DHCP clients and DHCP servers. They can also function as Network Address Translation (NAT) devices. In this video we show a demonstration using a 2621 as a DHCP client, server, and NAT translation device for my home network. It's important to understand that most IOS routers have relatively slow CPU's. An IOS router is fine a…
  continue reading
 
In this episode we show a video demonstration of the hot standby router protocol. This is a Cisco proprietary redundancy protocol. The purpose is to allow two routers to share one virtual IP address on an access subnet/vlan. Hosts on the subnet can use the virtual IP for their default route. This way if one router goes down the redundant router wil…
  continue reading
 
This video demonstrates layer-2 convergence in less than 2 seconds thanks to rapid spanning-tree. Rapid per-vlan spanning-tree is configured with "spanning-tree mode rapid-pvst". The rapid spanning tree protocol, 802.1w, is the answer to the slow convergence time of the historic 802.1d spanning-tree protocol. Rapid spanning tree replaces timers wit…
  continue reading
 
When you have two different links between the same two switches, normally spanning tree will forward on one and block on the other. This means half of your bandwidth is sitting idle. An etherchannel is a way to bind two links into one logical link with twice the bandwidth. In addition to increased bandwidth, etherchannels fail over in a fraction of…
  continue reading
 
VTP is the VLAN trunking protocol. It's used to disseminate uniform vlan information between switches over 802.1q or ISL trunks. It can also "prune" vlans, dynamically removing unneeded VLANs from trunks. This decreases unneeded frame flooding. VTP can eliminate outages thanks to the uniform VLAN configuration. But it can also cause outages if inco…
  continue reading
 
We cover intermediate spanning tree concepts. The importance of specifying your root bridge and backup root bridge with spanning-tree priority. Using portfast to allow host ports to start forwarding without waiting for 30 seconds. Using bpduguard to disable portfast-enabled ports where someone erroneously plugs in a switch. Using errdisable timeout…
  continue reading
 
VLANs are a feature of ethernet switches which makes them act like multiple "virtual switches". Each VLAN is a separate broadcast domain and could be configured with a separate subnet. That way could could have separate subnets for separate purposes (IT, accounting, network management) on one physical switch. This saves money and cabling while decr…
  continue reading
 
So far we've talked about how IPv4 encodes data into a packet, and how routers learn which direction to forward those IPv4 packets based on the destination IP address and the route table. But in the end, routers and hosts need to encode the IPv4 packet onto a physical medium. Examples of physical mediums include fiber, twisted pair, coax, radio wav…
  continue reading
 
In BGP, MED stands for Multi Exit Discriminator. It is a well-known optional attribute which allows one autonomous system to inject it's IGP route metrics into its BGP advertisements to another BGP autonomous system. This allows the second autonomous system to make intelligent routing decisions regarding which of multiple paths to take to send traf…
  continue reading
 
If you run two different routing protocols in two different parts of your network, you need to redistribute routes between the two routing protocols. This session is an introduction to route redistribution by example. In production you must be cautious about route redistribution because the route metric is not converted in a meaningful manner. This…
  continue reading
 
"Ships in the night" routing refers to two routing protocols which do not interact with each other. We can migrate from one routing protocol to a more believable one by simply turning on the new protocol then turning off the old protocol. Bug be careful to turn the new protocol on in the entire routing domain before turning off the old protocol.…
  continue reading
 
RIP version 1 route advertisements do not include a field for the netmask. This means receiving routers have to gess the netmask based on whatever information they have available. That includes the "natural" netmask of that classful network. That also includes the receiving routers own configuration. This means that variable length subnets and disc…
  continue reading
 
Loading …

Quick Reference Guide