Category Archives: Routing

Cisco Dynamic Trunking Protocol (DTP) Explained

Understanding Dynamic Trunking Protocol (DTP) The Dynamic Trunking Protocol (DTP) is a Cisco proprietary protocol that is automatically enabled on Catalyst 2960 and Catalyst 3560 Series switches. DTP is used to negotiate forming a trunk link between two or more Cisco devices before actually forming the trunk connection. The main benefit of DTP is to increase traffic on a… Read More »

RIP Routing Loop Explained

Split Horizon, Route Poisoning and Holddown Explained Split Horizon RIP as a distance vector protocols is also susceptible to routing loops (network problem which enable a data packet to continually being routed through the same routers over and over. The data packets continue to be routed within the network in an endless circle.) . Split horizon is one… Read More »

What is Link Layer Discovery Protocol (LLDP)?

Understanding LLDP and LLDP-MED The smooth running operation of the various networking devices in a LAN or switched network means that all protocols and applications are enabled and that all devices and are configured correctly. However, the larger the network gets, the more difficult it will be for the network administrator to control, manage and sort out configuration problems. This… Read More »

What is Stateless DHCPv6? Explained with Examples

Stateless DHCPv6 Server and Client Autoconfiguration. During the SLAAC process, the client receives information to create an IPv6 global unicast address. This includes the default gateway information from the source IPv6 address in the RA message, which is the link-local address of the router. A stateless DHCPv6 server can be used to provide information that might not be… Read More »

What is Stateful DHCPv6: DHCPv6 Autoconfiguration- Server and Client.

How to Configure DHCPV6 Stateful Auto-configuration (Server and Client ) DHCPv6 Server command Terms: IPv6 dhcp pool: This command creates a pool and enters the router in DHCPv6 configuration mode. Address : This command is used to indicate the pool of addresses to be allocated by the server. The lifetime option indicates the valid and preferred lease times in seconds.… Read More »

Ways To Migrate To IPv6 Explained

Before now, most networks; if not all, runs on IPv4 infrastructure, especially if your network is using old routers and switches. To upgrade your network to be IPv6 compliant, one or two strategies listed below can be used to implement this process on your network. 1. Dual Stacking: This method of migration enables a network to run both IPv4… Read More »

What is Wide Area Network? – WAN Explained with Examples

When an  individual Company or Organization has locations that are separated by large geographical distances, it will be a matter of necessity to connect these individual locations so as to share, exchange and manager data or communication. To achieve this, the organisation needs a Telecommunication Service Provider (TSP) to interconnect the LANs at the different locations. Telecommunications Service Providers manage… Read More »

What is IPv6? Explained with Examples

What is IPv6? IPv6 is the next generation of IP addressing or Internet Protocol. The previous version of IP addressing (IPv4) is depleted or near depletion. IPv6 was created by the Internet Engineering Task Force (IETF), a standards body, as a replacement to IPv4 in 1998. However, IPv6 is equipped with so much improved features and limitless opportunities… Read More »

What is BGP? Explained with Examples

Understanding Border Gateway Protocol (BGP) BGP is a complex, advanced distance Exterior Gateway Protocol (EGP), BGP exchange routing information between Autonomous Systems (ASs). Unlike Interior routing protocols such as RIP, EIGRP, and OSPF that run inside a company’s network, BGP uses a Best Path Selection Algorithm (BPSA) to choose and install the best routes into the router’s routing table.… Read More »

Add and Configure Wireless Router on a LAN

On this page, we will look at how to configure a Linksys wireless router, allowing for remote access from PCs as well as wireless connectivity with WEP security. We will use the topology diagram below as sample. The router R1 and switch SW2 had been configured with the appropriate configurations with the LAN and VLAN Before you begin,… Read More »