Category Archives: Routing

Multi-Protocol Label Switching (MPLS) Explained with Examples

What is Multi-Protocol Label Switching (MPLS)? Multiprotocol Label Switching (MPLS) is a type of network data traffic technique which carries data from one network device to the next using short path labels instead of long and complex network router lookups in a routing table. Ok…simple said; MPLS is best summarized as a middleman protocol between Layer 2 and… Read More »

Cisco Dynamic Trunking Protocol (DTP) Explained

Understanding Dynamic Trunking Protocol (DTP) The Dynamic Trunking Protocol (DTP) is a Cisco proprietary protocol that is automatically enabled on Catalyst 2960 and Catalyst 3560 Series switches. DTP is used to negotiate forming a trunk link between two or more Cisco devices before actually forming the trunk connection. The main benefit of DTP is to increase traffic on a… Read More »

RIP Routing Loop Explained

Split Horizon, Route Poisoning and Holddown Explained Split Horizon RIP as a distance vector protocols is also susceptible to routing loops (network problem which enable a data packet to continually being routed through the same routers over and over. The data packets continue to be routed within the network in an endless circle.) . Split horizon is one… Read More »

DHCP Snooping Explained

WHAT IS DHCP SNOOPING? The Dynamic Host Configuration Protocol (DHCP) allocates IP addresses dynamically, it leases addresses to connected devices and the addresses can be reused when no longer needed. All connected Hosts and end devices that require IP addresses obtained through DHCP must communicate with a DHCP server across the LAN. DHCP snooping acts like a firewall… Read More »

What is Link Layer Discovery Protocol (LLDP)?

Understanding LLDP and LLDP-MED The smooth running operation of the various networking devices in a LAN or switched network means that all protocols and applications are enabled and that all devices and are configured correctly. However, the larger the network gets, the more difficult it will be for the network administrator to control, manage and sort out configuration problems. This… Read More »

What is Syslog? Syslog Explained.

System Message Logging – SYSLOG Modern network devices has advanced from simple transmitting of messages (email.documents, multimedia etc), network devices like Cisco routers and switches provides the features for network administrators to reading system messages from their internal buffer about  network situation at a particular time. The way do this is by using Syslog server. Cisco network devices (Routers… Read More »

What is Stateless DHCPv6? Explained with Examples

Stateless DHCPv6 Server and Client Autoconfiguration. During the SLAAC process, the client receives information to create an IPv6 global unicast address. This includes the default gateway information from the source IPv6 address in the RA message, which is the link-local address of the router. A stateless DHCPv6 server can be used to provide information that might not be… Read More »

What is Stateful DHCPv6: DHCPv6 Autoconfiguration- Server and Client.

How to Configure DHCPV6 Stateful Auto-configuration (Server and Client ) DHCPv6 Server command Terms: IPv6 dhcp pool: This command creates a pool and enters the router in DHCPv6 configuration mode. Address : This command is used to indicate the pool of addresses to be allocated by the server. The lifetime option indicates the valid and preferred lease times in seconds.… Read More »

How to Cable LANs and WANs

Cabling LANs and WANs. When planning the installation of LAN cabling, choosing the cables necessary to make a successful LAN or WAN connection requires consideration of the different media types. There are many different Physical layer implementations that support multiple media types: • UTP (Category 5, 5e, 6, and 7) • Fiber-optics • Wireless Each media type has… Read More »

PPP: What is CHAP? Explained with Examples

Challenge Handshake Authentication Protocol (CHAP) Challenge Handshake Authentication Protocol (CHAP) is more secure than PAP. It involves a three-way exchange of a shared secret. During link establishment, CHAP conducts periodic challenges to make sure that the remote host still has a valid password value. While PAP basically stops working once authentication is established, this leaves the network vulnerable to… Read More »