Exhibit n.2: The layers of a hierarchical network

Size: px
Start display at page:

Download "Exhibit n.2: The layers of a hierarchical network"

Transcription

1 3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would be impossible. However, most network technicians working for small or medium-sized businesses work inside local area networks. A well-designed LAN can be a significant advantage for any organization. To this end, local area networks are usually divided into multiple segments or levels. This can be achieved with the services of a switch. A switch is a type of network device, in many ways similar to the router, but also quite different in other ways. In this chapter, we will learn how to use switches to design safer and more effective local area networks. The first part of this chapter will focus on the concept of hierarchical networks: dividing a network into different parts, each part with a unique function. Such a composition presents multiple benefits which we shall outline. The next part of the chapter will focus on switches and what services they present to each layer of a hierarchical network and its similarities and differences with a router. The last part of this chapter will is reserved for Virtual Local Area Networks, a system which improves the performance and security of a network.

2 3.2 Hierarchical Network When planning to build a small network where the number of devices is limited, you cannot encounter many problems. However, most medium-sized or bigger networks aren t constructed so easily. Oftentimes such Exhibit n.1: Switch icon networks will have fixed performance, bandwidth or security requirements. You also need to account for the possibility of future growth. That s why most networking engineers build their networks according to a pre-defined model. Among these models, the hierarchical model is one of the most widely used. This model divides your network into three layers: - Access Layer: The first layer serves as the interface for the human-network communication. This is where end devices like PCs, printers or IP phones are stored. - Distribution Layer: The distribution layer processes data before it is sent to its final destination. It controls traffic flow using various protocols or security policies and is responsible for routing between Virtual LANs. Most devices on the distribution layer are switches. The distribution layer always makes sure there are several paths open to the core layer. - Core Layer: This layer collects all data from the distribution layer and passes it to the correct device, be it inside the network or in a remote network. The devices on this layer are critical, so they need to be reliable and offer redundancy, in case one of them went down. The devices on this layer are either high quality switches or routers (for Internet access) with high-speed forwarding rates. Exhibit n.2: The layers of a hierarchical network A hierarchical network offers many benefits. First off, such a network is highly scalable. End devices can be connected easily at the access layer. Should the switches at the access layer become overburdened, you can easily add new switches at the distribution layer, to ease off network load. Another important advantage is redundancy. A switch at the access layer can be connected to two switches at the

3 distribution layer, should one of them go down. The same goes for switches on the distribution and core layer. Redundancy is only limited at the access layer, since end devices like PCs cannot be connected to two switches at the same time. Security is another important benefit. Since all data from the access layer passes through the distribution layer, the switches on this level can be easily configured with advanced security settings. For example, you can limit the traffic of HTTP packets from some users and allow it to others. Many security protocols can be used in conjunction with switches. 3.3 Switches in Hierarchical Networks So far, we talked about switches without actually defining what a switch is. A switch is a device similar to a router: it has similar internal components and uses ports to forward data. Switches are used to connect end devices, like routers, but instead of routing packages between different networks, switches operate only inside the local network. This is because they are known as Layer 2 routing devices. They forward data frames by analyzing their source and destination MAC addresses. That s why they are incapable of forwarding packets between networks, they simply do not understand the concept of IP addresses. They do offer other services to a network, though. Choosing the correct switches for each layer of a hierarchical network is fundamental. Thus, switches are primarily defined by three parameters: Exhibit n.3: Fixed configuration switch - Port density: This is the number of ports available on a switch. There are three types of switches according to their port density. Fixed configuration switches usually support 24 or 48 ports, which means you can connect up to 24 or 48 devices. No more ports can be added to a fixed configuration switch, so the number of users it can support is final. This is not true for modular switches. The body of a modular switch offers space for modular line cards. These line cards contain the actual ports. It is similar to buying a graphics card or a RAM card to upgrade your computer. The last type of switch is the stackable switch. These switches can be stacked on top of each other and connected using a special high-bandwidth cable. Together, these switches then operate like a single switch would.

4 Exhibit n.4: Modular switch Exhibit n.5: Stackable switch - Forwarding rates: This parameter measures the processing capabilities of a switch. It simply means how much data a switch can process per second. It is important for a switch to have sufficient processing power to support the network. For example, if 24 ports are connected to a medium with a bandwidth of 1 Gb/s, the switch practically generates 24 Gb/s of traffic when fully connected. If the switch only has a processing power of 16 Gb/s, it will not be able to run at full speed across all ports simultaneously, which could be a problem for the network. - Link aggregation: Usually, switches are connected to the rest of the network with one port. Using our previous example, it can only send data to the rest of the network with a speed of 1 Gb/s. This might not be sufficient for some networks. Link aggregation allows a switch to connect up to 8 ports to the rest of the network, thus generation 8 Gb/s of traffic, if the switch has free ports that is. Exhibit n.6: Link aggregation Of course, there are other features to look out for when choosing a proper switch for your network. Power over Ethernet (PoE) is one of them. This service allows switches to send power to connected devices via existing network cabling. This is especially useful for IP phones, because you can install them wherever you want. Another useful feature is Layer 3 routing. Earlier, we said that switches are Layer 2 devices. However, some switches have added functionality and can recognize Layer 3 protocols. This can be useful for switches on the distribution layer.

5 Different layers of a hierarchical network have different requirements, so naturally the features of the employed switches should reflect this. For switches at the access layer, port density and relatively fast forwarding rates are important. These switches should also support VLAN routing and PoE if necessary. Switches at the higher layers are different. They don t have to connect a multitude of end devices, so naturally port density isn t as important. Remember that almost all data in the network passes through the distribution and core layers. Link aggregation and very fast forwarding rates are paramount to support the fast bandwidth necessary for these layers. Layer 3 routing is also a key component to properly process data at the distribution and core layer. 3.4 Basic Switch Functionalities So how does a switch work exactly? A switch forwards data frames based on their MAC addresses. Similar to the router s routing table, a switch has its own collection of routing information called the MAC address table. The switch fills up its address table by learning the source MAC addresses of the frames it receives. Note Exhibit n.7. In this scenario, the MAC address table of the switch in the middle is empty. When User A sends a data frame to user B, it travels through the switch. The switch looks up the source MAC address of the frame and notes that the frame came from port Eth1/0/1. This way, the switch learned that the device with that MAC address can be found through port Eth1/0/1. This switch writes this information in its address table. Then the switch looks at the destination MAC address of the frame. Since its address table doesn t have any information about User B, the switch floods the frame through all ports, except the one it came from. User C will discard the frame, Exhibit n.7: A switch connected to three devices because it was not meant for him. User B will accept the frame, because its MAC address is identical to the destination MAC address of the frame. When User B responds to User A with another frame, the switch learns the location of User B, the same way as it did with User A. This information is written down in its address table. Another great benefit of switches is that they negate collisions. When two devices on a network try to send data at the same time, a collision occurs. This is because the two signals get mixed up inside the medium. A medium can only carry one signal. A place in the network where collisions can occur is called a collision domain. When not using switches, the devices compete against each other for the right to transfer signals. This is done by various Layer 2 protocols, like CSMA/CD or CSMA/CA. These protocols make sure that only one device is transferring data at any given time.

6 Switches however are different. When a switch transfers data between two devices, it literally creates a point-to-point connection between them. In a point-to-point network, collisions are nearly impossible to occur, because at any given time one device is sending and the other receiving. That s why a switch is superior to other similar devices like a hub or a bridge. These are also layer 2 devices, but if 20 users were connected to a hub, it would create one giant collision domain. These 20 users would always have to compete with each other for the right to transmit data. If you connect 20 users to a switch however, you would create 20 separate collision domains. Since every user would have its own collision domain. Thus, protocols like CSMA/CD would not be necessary and they wouldn t consume any additional bandwidth. Exhibit n.8: A switch creating four separate collision domains The only thing a switch cannot stop from spreading from one collision domain to others is a broadcast. You already know that a broadcast is a frame destined for all users on the network. Since switches have no understanding of Layer 3 protocols, they are only going to do their job: switch the frame to the correct recipient, i.e. all users on the network. The only device which can stop a broadcast is a router. That s why we say that routers create broadcast domains. Exhibit n.9: Collision and Broadcast domains (the device in the middle is a hub)

7 3.5 Switch Forwarding Methods Now that we know how a switch knows where to send a data frame, we can explore the forwarding process in greater detail. Every switch can operate in several forwarding modes, each with different effects: - Store-and-Forward Switching: In this mode, the switch stores the frame in its memory until all the bits of the frame have been received. When the switch analyzes the MAC addresses of the frame, it also conducts a Cyclic Redundancy Check (CRC). CRC is a mathematical formula which calculates the bits (the 1s) of the frame to see whether it contains any errors. If it does, the frame is discarded, to save bandwidth. If not, it is forwarded to the correct port. This method is used in networks which employ packet prioritization, i.e. when some packets have a higher priority over others (example: voice over IP vs. regular HTTP traffic). - Cut-Through Switching: Cut-Through switching is the exact opposite of Store-and- Forward switching. Once the switch receives enough bytes of the frame to properly analyze its destination MAC address, it forwards the frame out the correct port, even if it was not yet completely received. The rest of the frame just follows after. This method prioritizes speed over quality, so no CRC is performed. This means that even corrupt frames will be forwarded immediately. Exhibit n.10: Forwarding methods The switch can also forward data symmetrically or asymmetrically. In symmetric switching, equal bandwidth is reserved for every port. In asymmetric switching, one port may be granted greater bandwidth than others. This is done by storing entire frames in the switch s memory and forwarding them one-by-one.

8 3.6 Virtual Local Area Networks As you can imagine, performance is of key importance in today s network services. Some professions have truly extraordinary performance requirements, but even in normal user networks some activities can be difficult to perform when the bandwidth of your network is subpar. Different user groups have different performance requirements. This is the primary reason why Virtual Local Area Networks (VLANs) are created. A VLAN allows you to connect multiple devices logically. This creates the impression that they are located on a network of their very own, even though they share the medium with other VLANs on the same network. This can be an enormous advantage. You can configure each VLAN independently and divide multiple groups of users. For example, you can create one VLAN for students and one for the employees of a university. These two virtual networks are completely independent from each other. Virtual networks also create smaller broadcast domains. We covered these in a previous section. A broadcast will not leave the VLAN it originated in. Security is also improved by using VLANs. Users in the student network would have no access to confidential data on the employee network. Last but not least, using VLANs is very cost effective, as there is no need to buy any expensive network upgrades or new devices. Exhibit n.11: Network configured with three VLANs Each VLAN must have its own IP address, just like a standard network. Devices inside a VLAN can send data to each other without any problems. However, devices in different virtual networks can only communicate with the help of a router, as only routers can handle Layer 3 routing. Every VLAN has its own ID. This ID is usually a number ranging from 1 to These are called the normal-range IDs. IDs 1 and 1002 to 1005 are reserved. There are also extended-range IDs, from 1006 to These usually have fewer configuration options than normal-range and are reserved for large-scale companies and organizations.

9 3.6.1 Types of virtual local area networks There are five different types of VLANs: - Data VLAN: Also called a user VLAN. User generated data travels only through this type of virtual network. If you wanted to send some files to another user, a video file or an audio file, you would use a data VLAN. - Default VLAN: At the startup of a switch, all of its ports are part of the default VLAN, to make them all a part of one broadcast domain. The default VLAN usually has an ID of 1. Different types of Layer 2 control information travels through this type of virtual network. It has all the properties of a standard VLAN, except you cannot rename or delete it. Usually, though not necessarily, the default VLAN is moved to a different ID other than 1. - Native VLAN: Traffic which is not generated on any VLAN is placed on a native VLAN. This allows virtual networks to maintain backward compatibility with networks that are not separated into VLANs. A native VLAN is always placed on the trunk ports of a switch. Trunks are links which forward frames that originate from any VLAN (tagged traffic), as well as no VLAN (untagged traffic). Untagged traffic is always placed on the native VLAN. We will learn more about trunks later on. - Management VLAN: A management VLAN allows a user to connect to a switch to change its configuration without using a standard console cable, for example via HTTP, Telnet or other wireless connection service. The Management VLAN usually has the same ID as the native VLAN, which is no problem, since management VLAN traffic does not interfere with standard traffic. - Voice VLAN: You might wonder why a separate category of VLAN is reserved specifically for VoIP (voice over IP). This is because this technology usually has certain bandwidth requirements which, when not met, cause the audio to become almost impossible to understand. Traffic on a voice VLAN has a fixed bandwidth allocation and a higher priority over other types of VLAN traffic. Exhibit n.12: A network using three data VLANs (VLAN 10, 20, 30), as well as a native VLAN (VLAN 99) to carry data between all VLANs

10 You can configure the type of your VLANs and their respective IP addresses inside a switch. Now is the time to ask oneself: How does a switch know which VLAN can be found at the other end of each port? The answer is that usually specific ports of a switch are reserved for a specific VLAN. For example, in exhibit n.12, ports 11 to 17 on switches S2 and S3 are reserved for VLAN 10. This means that PC1, which is configured as part of VLAN 10, needs to be connected to S2 through those ports. The same is true for PC4 and S3. Network administrators usually configure manually which ports are part of which VLAN. When a port is configured in this manner, we say that it is in the static VLAN mode. There is also a dynamic VLAN mode which uses a special server called a VLAN Membership Policy Server (VMPS). Ports are thus assigned to VLANs dynamically, though this is not widely used VLAN Trunks It s pretty hard to imagine today s VLANs without trunks. A trunk is a point-to-point connection that carries signals from multiple VLANs. What advantage does this bring? Look back to exhibit n.12. If you wanted to forward data from S2 through S1 to S3 without the use of trunks, you would need 3 physical cable connections on S2 and S3 to connect to S1. This means you have to reserve two more ports on these switches. It is even worse on S1, since that switch is connected to both S2 and S3. You would require 4 more ports on S1 to support the additional cabling instead of the standard 2 ports you would require by using trunks. Exhibit n.13: Same network as in exhibit n.12, but also showing which ports belong to which VLAN and which ports are configured as 802.1Q trunk ports

11 Remember that switches are layer 2 devices. They do not understand layer 3 addressing. A layer 2 data frame is distinguished by its MAC address, it does not carry any VLAN information. If a trunk carries data from all VLANs and from non- VLANs, how can a switch remember the destination VLAN of a data frame? It knows because this information is added to the layer 2 frame by an 802.1Q header. This header contains a tag that specifies which VLAN the frame belongs to, thus we recognize two types of traffic: tagged and untagged. Note exhibit n.13. What happens exactly when PC1 attempts to send a frame to PC4? S2 receives the frame and tags it with the ID of the VLAN PC1 belongs to: VLAN 10. It places the frame on the trunk. When S1 receives the frame, it broadcasts them through all ports configured to forward data from VLAN 10, in this case, only the trunk port. When S3 receives the frame, it does the same. Ports 11 to 17 are reserved for VLAN 10, so the tag is removed and forwarded through these ports. PC4 is connected through one of these ports, so it will accept the frame. If a data frame is untagged, meaning it does not originate in a VLAN, it is placed on the native VLAN which handles all untagged traffic. Should a tagged frame arrive on the native VLAN, it will be dropped. Should a PC be configured with an IP address which falls into the native VLAN, its frames will always be untagged Trunk modes and protocols A port which has been configured as a trunk port can be configured to use either the 802.1Q trunking mode or the ISL trunking mode. We already explained how the 802.1Q mode works: by using tagged and untagged traffic. When a frame is tagged, then the tag is removed upon leaving the trunk. The ISL trunking mode is seldom used however and most networking companies no longer support it. All frames arriving on an ISL trunk port are expected to already have the ISL header and they are sent with it. Thus, all traffic is tagged and untagged frames are always automatically dropped. There are also various trunk protocols which facilitate communication between the trunk ports on various switches. An example of such a port is DTP (dynamic trunking protocol), a protocol developed by Cisco. You don t need to worry about trunking protocols. We only mentioned them because the switches we are going to use in the practice session of this chapter are all automatically configured with DTP. To get at least some idea of how this protocol works, know that a trunk port is always associated with a certain mode or state: - Dynamic auto: ready to become a trunk port - Desirable: ready to become a trunk port, informs the other port to become a trunk port - On (default): is a trunk port - Off: Turns off DTP Thus, for example, if one port is configured as desirable and the other as dynamic auto or on, then both of them will start trunking.

12 3.7 Inter-VLAN Routing In the previous parts of this chapter, we analyzed how a VLAN works and how it can help segment a network into independent units, all of them with their own IP range and broadcast domain. Because of this, we can say that a VLAN is almost identical to a standard network. Unfortunately, this also means that when sending data from one VLAN to another, the layer 2 services which a switch provides are not going to be sufficient. When attempting to route data from one VLAN to the next you are going to need, just like a normal network would, the functionalities which only a router can support. As you know, a VLAN is usually associated with a certain port, or multiple ports, of switch. In traditional inter-vlan routing, this is also true for the physical interfaces of a router. One VLAN equals one interface. In exhibit n.14, PC1 on VLAN 10 sends a frame to PC3 on VLAN 30. The frame crosses through S2 to S1. It leaves S1 through port F0/6, the port reserved for VLAN 10. It reaches router R1 through interface F0/0, Exhibit n.14: Traditional inter-vlan routing which is also reserved for VLAN 10. The router analyzes the frame and recognizes that it is meant for VLAN 30. Thus, it leaves R1 through F0/1 which has been configured to forward frames to and from VLAN 30. It crosses F0/5 on S1 and reaches S2 through the trunk port. S2 sends it to PC3 through port F0/6. This is known as Traditional inter-vlan routing. Traditional inter-vlan routing is fine for situations where you only have a few VLANs. However, a router does not have as many interfaces as a switch has ports. A switch can easily have more than 48 ports, but a router seldom has as many Ethernet interfaces. This means that reserving one interface for one VLAN is not going to work for long. The best and simplest solution would be to make one router interface a trunk link which can route frames for all VLANs. This is called a Router-ona-stick. Exhibit n.15: Router-on-a-stick

13 In the case of traditional inter-vlan routing, the router acts exactly as a gateway would. Every interface is configured as a gateway for the VLAN it belongs to, with an appropriate IP address. We can observe this in exhibit n.14. Router interface F0/0 is configured with an IP address of , since this interface serves to route data for VLAN 10. When employing a router-on-a-stick solution however, you only have one physical interface connected to the network which routers data for all VLANs. An interface can only have one IP address though. How can we configure one interface with an IP address of many VLANs? The solution is to divide the interface into multiple subinterfaces. Exhibit n.16: Router-on-a-stick configured with three sub-interfaces A sub-interface is a logical interface which functions the same way as its physical counterpart. A router physical interface can be divided into as many sub-interfaces as you need, each sub-interface routing data for one VLAN. In exhibit n.16, the router interface has been divided into three separate sub-interfaces: - F0/0.10: With an IP address of which corresponds with VLAN 10. All data coming to and from VLAN 10 is forwarded through this sub-interface - F0/0.20: With an IP address of which corresponds with VLAN 20. All data coming to and from VLAN 20 is forwarded through this sub-interface - F0/0.30: With an IP address of which corresponds with VLAN 30. All data coming to and from VLAN 30 is forwarded through this sub-interface You might be wondering: how many sub-interfaces can be created by dividing one physical interface? The sub-interface ID, which differentiates one sub-interface from the other, is a 32-bit identifier which means it can support around 4296 billion possible values. You probably won t encounter a network with that many VLANs.

Chapter 1 Reading Organizer

Chapter 1 Reading Organizer Chapter 1 Reading Organizer After completion of this chapter, you should be able to: Describe convergence of data, voice and video in the context of switched networks Describe a switched network in a small

More information

Switching in an Enterprise Network

Switching in an Enterprise Network Switching in an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 3 Version 4.0 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Compare the types of

More information

What is VLAN Routing?

What is VLAN Routing? Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one

More information

- Hubs vs. Switches vs. Routers -

- Hubs vs. Switches vs. Routers - 1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing

More information

LAN Switching and VLANs

LAN Switching and VLANs 26 CHAPTER Chapter Goals Understand the relationship of LAN switching to legacy internetworking devices such as bridges and routers. Understand the advantages of VLANs. Know the difference between access

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób) QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than

More information

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port 1. VLAN Overview 2. VLAN Trunk 3. Why use VLANs? 4. LAN to LAN communication 5. Management port 6. Applications 6.1. Application 1 6.2. Application 2 6.3. Application 3 6.4. Application 4 6.5. Application

More information

hp ProLiant network adapter teaming

hp ProLiant network adapter teaming hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6) Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and

More information

LANs and VLANs A Simplified Tutorial

LANs and VLANs A Simplified Tutorial Application Note LANs and VLANs A Simplified Tutorial Version 3.0 May 2002 COMPAS ID 90947 Avaya Labs 1 Companion document IP Addressing: A Simplified Tutorial COMPAS ID 92962 2 Introduction As the name

More information

VLANs. Application Note

VLANs. Application Note VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static

More information

Implementation of Virtual Local Area Network using network simulator

Implementation of Virtual Local Area Network using network simulator 1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,

More information

VLAN for DekTec Network Adapters

VLAN for DekTec Network Adapters Application Note DT-AN-IP-2 VLAN for DekTec Network Adapters 1. Introduction VLAN (Virtual LAN) is a technology to segment a single physical network into multiple independent virtual networks. The VLANs

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged

More information

How To Design A Network For A Small Business

How To Design A Network For A Small Business CHAPTER 1 LAN Design Objectives Upon completion of this chapter, you will be able to answer the following questions: How does a hierarchical network support the voice, video, and data needs of a small-

More information

- Virtual LANs (VLANs) and VTP -

- Virtual LANs (VLANs) and VTP - 1 - Virtual LANs (VLANs) and VTP - Collision vs. Broadcast Domains A collision domain is simply defined as any physical segment where a collision can occur. Hubs can only operate at half-duplex, and thus

More information

Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics. Qin Yin Fall Semester 2013

Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics. Qin Yin Fall Semester 2013 Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics Qin Yin Fall Semester 2013 1 Walmart s Data Center 2 Amadeus Data Center 3 Google s Data Center 4 Data Center

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

VLAN and QinQ Technology White Paper

VLAN and QinQ Technology White Paper VLAN and QinQ Technology White Paper Issue 1.01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Layer 3 Network + Dedicated Internet Connectivity

Layer 3 Network + Dedicated Internet Connectivity Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for

More information

Fundamentals of Switching

Fundamentals of Switching 1 CCNA 640-801 Exam Notes - Fundamentals of Switching CCNA 640-801 Exam Notes Fundamentals of Switching 1. LAN Segmentation 1.1 In a collision domain, a frame sent by a device can cause collision with

More information

Interconnecting Cisco Network Devices 1 Course, Class Outline

Interconnecting Cisco Network Devices 1 Course, Class Outline www.etidaho.com (208) 327-0768 Interconnecting Cisco Network Devices 1 Course, Class Outline 5 Days Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructorled training course

More information

Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX

Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX NOTE: This is an advisory document to be used as an aid to resellers and IT staff looking to use the Edgewater 4550 in conjunction with

More information

The IP Transmission Process. V1.4: Geoff Bennett

The IP Transmission Process. V1.4: Geoff Bennett The IP Transmission Process V1.4: Geoff Bennett Contents Communication Between Hosts Through a MAC Bridge Through a LAN Switch Through a Router The tutorial is divided into four sections. Section 1 looks

More information

How To Configure Voice Vlan On An Ip Phone

How To Configure Voice Vlan On An Ip Phone 1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

Installation of the On Site Server (OSS)

Installation of the On Site Server (OSS) Installation of the On Site Server (OSS) rev 1.1 Step #1 - Initial Connection to the OSS Having plugged in power and an ethernet cable in the eth0 interface (see diagram below) you can connect to the unit

More information

Configure A VoIP Network

Configure A VoIP Network Configure A VoIP Network Prof. Mr. Altaf. I. Darvadiya Electronics & Communication C.U.Shah College of Engg. & Tech. Wadhwan(363030), India e-mail: alto.ec@gmail.com Ms. Zarna M. Gohil Electronics & Communication

More information

ADVANCED NETWORK CONFIGURATION GUIDE

ADVANCED NETWORK CONFIGURATION GUIDE White Paper ADVANCED NETWORK CONFIGURATION GUIDE CONTENTS Introduction 1 Terminology 1 VLAN configuration 2 NIC Bonding configuration 3 Jumbo frame configuration 4 Other I/O high availability options 4

More information

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance CHAPTER 4 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive

More information

Cisco 12 CCNA Certification

Cisco 12 CCNA Certification Cisco 12 CCNA Certification Application for Board Authorization of Courses District: Chilliwack School District 33 Developed by: John Murtha Date: May7, 2004 School: Sardis Secondary Principal: Bob Patterson

More information

How To Understand and Configure Your Network for IntraVUE

How To Understand and Configure Your Network for IntraVUE How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of

More information

This topic lists the key mechanisms use to implement QoS in an IP network.

This topic lists the key mechanisms use to implement QoS in an IP network. IP QoS Mechanisms QoS Mechanisms This topic lists the key mechanisms use to implement QoS in an IP network. QoS Mechanisms Classification: Each class-oriented QoS mechanism has to support some type of

More information

Configuring IPS High Bandwidth Using EtherChannel Load Balancing

Configuring IPS High Bandwidth Using EtherChannel Load Balancing Configuring IPS High Bandwidth Using EtherChannel Load Balancing This guide helps you to understand and deploy the high bandwidth features available with IPS v5.1 when used in conjunction with the EtherChannel

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Application Notes for Configuring a Small to Medium Size Business VoIP and Data Network Solution Consisting of HP ProCurve Networking Switches and an Avaya Telephony

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

Walmart s Data Center. Amadeus Data Center. Google s Data Center. Data Center Evolution 1.0. Data Center Evolution 2.0

Walmart s Data Center. Amadeus Data Center. Google s Data Center. Data Center Evolution 1.0. Data Center Evolution 2.0 Walmart s Data Center Network Virtualization and Data Center Networks 263-3825-00 Data Center Virtualization - Basics Qin Yin Fall emester 2013 1 2 Amadeus Data Center Google s Data Center 3 4 Data Center

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

Device Interface IP Address Subnet Mask Default Gateway

Device Interface IP Address Subnet Mask Default Gateway Felix Rohrer Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway S1 VLAN 99 192.168.99.11 255.255.255.0 192.168.99.1 S2 VLAN 99 192.168.99.12 255.255.255.0 192.168.99.1

More information

Networking 4 Voice and Video over IP (VVoIP)

Networking 4 Voice and Video over IP (VVoIP) Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move

More information

CHAPTER 10 LAN REDUNDANCY. Scaling Networks

CHAPTER 10 LAN REDUNDANCY. Scaling Networks CHAPTER 10 LAN REDUNDANCY Scaling Networks CHAPTER 10 10.0 Introduction 10.1 Spanning Tree Concepts 10.2 Varieties of Spanning Tree Protocols 10.3 Spanning Tree Configuration 10.4 First-Hop Redundancy

More information

COMPUTER NETWORK TECHNOLOGY (300)

COMPUTER NETWORK TECHNOLOGY (300) Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant

More information

Leased Line + Remote Dial-in connectivity

Leased Line + Remote Dial-in connectivity Leased Line + Remote Dial-in connectivity Client: One of the TELCO offices in a Southern state. The customer wanted to establish WAN Connectivity between central location and 10 remote locations. The customer

More information

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1) COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v2.0 is a five-day, instructor-led training course that teaches learners

More information

Cisco - Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW)

Cisco - Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW) Page 1 of 20 Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW) Document ID: 50036 Contents Introduction Prerequisites Requirements Components Used Network Diagram The Role of Switched

More information

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your

More information

640-460. IIUC Implementing Cisco IOS Unified Communications (IIUC) Version: Demo. Page <<1/9>>

640-460. IIUC Implementing Cisco IOS Unified Communications (IIUC) Version: Demo. Page <<1/9>> 640-460 IIUC Implementing Cisco IOS Unified Communications (IIUC) Version: Demo Page 1. You are CCNA VOICE associate in XXXX.com. You need configure a voice port that will allow the gateway to

More information

Chapter 4 Connecting to the Internet through an ISP

Chapter 4 Connecting to the Internet through an ISP Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No

More information

ProSafe Plus Switch Utility

ProSafe Plus Switch Utility ProSafe Plus Switch Utility User Guide 350 East Plumeria Drive San Jose, CA 95134 USA September 2010 202-10524-03 v1.0 ProSafe Plus Switch Utility User Guide 2010 NETGEAR, Inc. All rights reserved. No

More information

Knowledgebase Solution

Knowledgebase Solution Knowledgebase Solution Goal Enable coexistence of a 3 rd -party VPN / Firewall with an EdgeMarc appliance. Describe characteristics and tradeoffs of different topologies. Provide configuration information

More information

Easy Smart Configuration Utility

Easy Smart Configuration Utility Easy Smart Configuration Utility REV1.1.0 1910010977 CONTENTS Chapter 1 About this Guide...1 1.1 Intended Readers... 1 1.2 Conventions... 1 1.3 Overview of This Guide... 1 Chapter 2 Getting Started...4

More information

network infrastructure: getting started with VoIP

network infrastructure: getting started with VoIP hp procurve networking business may 2003 network infrastructure: getting started with VoIP technical brief table of contents introduction 2 network optimization for VoIP 2 bandwidth provisioning 3 end-to-end

More information

Data Communication and Computer Network

Data Communication and Computer Network 1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X

More information

FSM73xx GSM73xx GMS72xxR Shared access to the Internet across Multiple routing VLANs using a Prosafe Firewall

FSM73xx GSM73xx GMS72xxR Shared access to the Internet across Multiple routing VLANs using a Prosafe Firewall FSM73xx GSM73xx GMS72xxR Shared access to the Internet across Multiple routing VLANs using a Prosafe Firewall This document describes how to: - Create multiple routing VLANs - Obtain Internet access on

More information

11/22/2013 1. komwut@siit

11/22/2013 1. komwut@siit 11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)

More information

Howstuffworks "How LAN Switches Work" Click here to go back to the normal view!

Howstuffworks How LAN Switches Work Click here to go back to the normal view! Page 1 of 17 Search ComputerStuff AutoStuff ElectronicsStuff ScienceStuff HomeStuff EntertainmentStuff MoneyStuff TravelStuff Main > Computer > Hardware Click here to go back to the normal view! How LAN

More information

Networking Devices. Lesson 6

Networking Devices. Lesson 6 Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information

Application Note Gigabit Ethernet Port Modes

Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Table of Contents Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 7

More information

Virtual LANs. http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/ Raj Jain

Virtual LANs. http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/ Raj Jain Virtual LANs Professor of Computer and Information Sciences Please download and print the handouts from: http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/

More information

AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch. Software Release Notes

AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch. Software Release Notes AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch Supported Platforms Software Release Notes Please read this document before you begin to use the AT-S60 management software. The AT-S60

More information

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles. Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test

More information

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch Vocia MS-1 Network Considerations for VoIP Vocia software rev. 1.4 or higher required Vocia MS-1 and Network Port Configuration The Vocia Message Server 1 (MS-1) has a number of roles in a Vocia Paging

More information

Communication Systems Internetworking (Bridges & Co)

Communication Systems Internetworking (Bridges & Co) Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de

More information

LAN Planning Guide LAST UPDATED: 1 May 2013. LAN Planning Guide

LAN Planning Guide LAST UPDATED: 1 May 2013. LAN Planning Guide LAN Planning Guide XO Hosted PBX Document version: 1.05 Issue date: 1 May 2013 Table of Contents Table of Contents... i About this Document... 1 Introduction: Components of XO Hosted PBX... 1 LAN Fundamentals...

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking

COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking COURSE AGENDA CCNA & CCNP - Online Course Agenda Lessons - CCNA Lesson 1: Internetworking Internetworking models OSI Model Discuss the OSI Reference Model and its layers Purpose and function of different

More information

Cisco Networking Professional-6Months Project Based Training

Cisco Networking Professional-6Months Project Based Training Cisco Networking Professional-6Months Project Based Training Core Topics Cisco Certified Networking Associate (CCNA) 1. ICND1 2. ICND2 Cisco Certified Networking Professional (CCNP) 1. CCNP-ROUTE 2. CCNP-SWITCH

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

Interconnecting Cisco Networking Devices Part 2

Interconnecting Cisco Networking Devices Part 2 Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course

More information

How To Learn Cisco Cisco Ios And Cisco Vlan

How To Learn Cisco Cisco Ios And Cisco Vlan Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led

More information

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 is a five-day, instructor-led training course that teaches learners

More information

Region 10 Videoconference Network (R10VN)

Region 10 Videoconference Network (R10VN) Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits

More information

Improving Quality of Service

Improving Quality of Service Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive

More information

"Charting the Course...

Charting the Course... Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content

More information

Auditing the LAN with Network Discovery

Auditing the LAN with Network Discovery Application Note Auditing the LAN with Network Discovery Introduction This application note is one in a series of papers about troubleshooting local area networks (LAN) from JDSU Communications Test and

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

WAN and VPN Solutions:

WAN and VPN Solutions: WAN and VPN Solutions: Choosing the Best Type for Your Organization xo.com WAN and VPN Solutions: Choosing the Best Type for Your Organization WAN and VPN Solutions: Choosing the Best Type for Your Organization

More information

ETHERNET ENCRYPTION MODES TECHNICAL-PAPER

ETHERNET ENCRYPTION MODES TECHNICAL-PAPER 1 ETHERNET ENCRYPTION MODES TECHNICAL-PAPER The CN series encryption platform is designed to secure information transmitted over a number of network protocols. The CN series encryptors secure Ethernet

More information

enetworks TM IP Quality of Service B.1 Overview of IP Prioritization

enetworks TM IP Quality of Service B.1 Overview of IP Prioritization encor! enetworks TM Version A, March 2008 2010 Encore Networks, Inc. All rights reserved. IP Quality of Service The IP Quality of Service (QoS) feature allows you to assign packets a level of priority

More information

MS Series: VolP Deployment Guide

MS Series: VolP Deployment Guide Solution Guide MS Series: VolP Deployment Guide JULY 2013 How to deploy a distributed VoIP infrastructure with Meraki MS switches. Table of Contents Introduction 3 Getting Started 4 Setting up VoIP using

More information

IP Addressing A Simplified Tutorial

IP Addressing A Simplified Tutorial Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to

More information

Quality of Service (QoS) on Netgear switches

Quality of Service (QoS) on Netgear switches Quality of Service (QoS) on Netgear switches Section 1 Principles and Practice of QoS on IP networks Introduction to QoS Why? In a typical modern IT environment, a wide variety of devices are connected

More information

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------

More information

> Technical Configuration Guide for Microsoft Network Load Balancing. Ethernet Switch and Ethernet Routing Switch Engineering

> Technical Configuration Guide for Microsoft Network Load Balancing. Ethernet Switch and Ethernet Routing Switch Engineering Ethernet Switch and Ethernet Routing Switch Engineering > Technical Configuration Guide for Microsoft Network Load Balancing Enterprise Solutions Engineering Document Date: March 9, 2006 Document Version:

More information

TotalCloud Phone System

TotalCloud Phone System TotalCloud Phone System Cisco SF 302-08P PoE VLAN Configuration Guide Note: The below information and configuration is for deployment of the Cbeyond managed switch solution using the Cisco 302 8 port Power

More information

Skills Assessment Student Training Exam

Skills Assessment Student Training Exam Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure

More information