<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>CCNA Central</title><description>CCNA Study Guide and Networking Information.</description><managingEditor>noreply@blogger.com (Phillip)</managingEditor><pubDate>Fri, 1 Nov 2024 05:18:58 -0500</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://ccnacentral.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle>CCNA Study Guide and Networking Information.</itunes:subtitle><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>Internet Speed Testing Websites</title><link>http://ccnacentral.blogspot.com/2011/07/internet-speed-testing-websites.html</link><category>internet speed test</category><category>resource</category><category>tools</category><author>noreply@blogger.com (Phillip)</author><pubDate>Sat, 9 Jul 2011 15:21:00 -0500</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-1549826743655537829</guid><description>A list of internet speed testing websites:&lt;br /&gt;
&lt;ul&gt;  &lt;li&gt;&lt;a href="http://www.speedtest.net/" target="_blank"&gt;Speedtest.net - The Global Broadband Speed Test&lt;br /&gt;
    &lt;/a&gt;&lt;br/&gt;&lt;br /&gt;
    Test your Internet connection bandwidth to locations around the world with this interactive broadband speed test&lt;/li&gt;
  &lt;li&gt;&lt;a href="http://www.speakeasy.net/speedtest/" target="_blank"&gt;Speakeasy - Speed Test&lt;/a&gt;&lt;br/&gt;&lt;br /&gt;
    Test your Internet Connection with Speakeasy's reliable and accurate broadband speed test. What's your speed?&lt;/li&gt;
  &lt;li&gt;&lt;a href="http://www.att.com/speedtest/" target="_blank"&gt;AT&amp;T High Speed Internet Speed Test&lt;br /&gt;
    &lt;/a&gt;&lt;br/&gt;&lt;br /&gt;
    Check the Speed, Quality and Performance of Your Internet Connection with the AT&amp;T Internet Speed Test.&lt;/li&gt;
      &lt;li&gt;&lt;a href="http://www.t1shopper.com/tools/speedtest/" target="_blank"&gt;Speed Test Internet Speed Test DSL Speed Test Broadband Speed Test Bandwidth Speed Test&lt;/a&gt;&lt;br/&gt;&lt;br /&gt;
    A directory of bandwidth speed test web sites lsited by state and country.&lt;/li&gt;
      &lt;li&gt;&lt;a href="http://www.bandwidthplace.com/" target="_blank"&gt;Speed Test | Bandwidth | Broadband Internet Services&lt;br /&gt;
    &lt;/a&gt;&lt;br/&gt;&lt;br /&gt;
    Check your Internet connection with Bandwidth Place, the #1 interactive broadband Speed Test. Get real-time prices, and compare services.&lt;/li&gt;
           &lt;li&gt;&lt;a href="http://www.whatismyip.com/tools/internet-speed-test.asp" target="_blank"&gt;Internet Speed Test - Test Internet Speed&lt;br /&gt;
    &lt;/a&gt;&lt;br/&gt;&lt;br /&gt;
    Test the download and upload speed of your internet&lt;/li&gt;
&lt;/ul&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Subnetting Cheat Sheet</title><link>http://ccnacentral.blogspot.com/2011/06/subnetting-cheat-sheet.html</link><category>ip</category><category>reference</category><category>subnets</category><category>tcp/ip</category><author>noreply@blogger.com (Phillip)</author><pubDate>Tue, 21 Jun 2011 02:38:00 -0500</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-8175743167193519959</guid><description>&lt;h2&gt;
 Subnetting Cheat Sheet For Quick Reference &lt;/h2&gt;
Subnetting is a method of segmenting hosts within a network and providing additional structure hosts within a network and providing additional structure. Without subnets, an organization operates as a flat network. These flat topologies result in short routing tables, but as the network grows, the use of bandwidth becomes inefficient.&lt;br /&gt;
&lt;table border="1" id="hor-zebra" style="width: 533px;" summary="Employee Pay Sheet"&gt;&lt;thead&gt;
&lt;tr&gt;  &lt;th scope="col" width="65"&gt;Classes&lt;/th&gt;  &lt;th scope="col" width="73"&gt;1st Octet Range&lt;/th&gt;  &lt;th scope="col" width="82"&gt;Network Bits&lt;/th&gt;  &lt;th scope="col" width="83"&gt;Possible Networks&lt;/th&gt;  &lt;th scope="col" width="49"&gt;Host Bits&lt;/th&gt;  &lt;th scope="col" width="100"&gt;No. of Hosts per Network&lt;/th&gt;  &lt;/tr&gt;
&lt;/thead&gt;  &lt;tbody&gt;
&lt;tr class="odd"&gt;  &lt;td&gt;A&lt;/td&gt;  &lt;td&gt;1-126&lt;/td&gt;  &lt;td&gt;8&lt;/td&gt;  &lt;td&gt;126&lt;/td&gt;  &lt;td&gt;24&lt;/td&gt;  &lt;td&gt;16,777,216&lt;/td&gt;  &lt;/tr&gt;
&lt;tr&gt;  &lt;td&gt;B&lt;/td&gt;  &lt;td&gt;128-191&lt;/td&gt;  &lt;td&gt;16&lt;/td&gt;  &lt;td&gt;16,384&lt;/td&gt;  &lt;td&gt;16&lt;/td&gt;  &lt;td&gt;65,536&lt;/td&gt;  &lt;/tr&gt;
&lt;tr class="odd"&gt;  &lt;td&gt;C&lt;/td&gt;  &lt;td&gt;192-223&lt;/td&gt;  &lt;td&gt;24&lt;/td&gt;  &lt;td&gt;2,097,152&lt;/td&gt;  &lt;td&gt;8&lt;/td&gt;  &lt;td&gt;256&lt;/td&gt;  &lt;/tr&gt;
&lt;/tbody&gt;   &lt;/table&gt;
&lt;br /&gt;
&lt;b&gt;Note: &lt;/b&gt;The total number of available hosts on a network can be derived by using the formula 2^&lt;i&gt;n&lt;/i&gt;-2, where &lt;i&gt;n&lt;/i&gt; is the number of host bits. The -2 accounts for an octet with all 0s, which is reserved for network identification, and all 1s, which is reserved for sending a broadcast message to all hosts.&lt;br /&gt;
&lt;br /&gt;
&lt;style type="text/css"&gt;
#hor-zebra{font-family:"Lucida Sans Unicode", "Lucida Grande", Sans-Serif;font-size:12px;width:553px;text-align:left;border-collapse:collapse;margin:20px;}#hor-zebra th{font-size:14px;font-weight:normal;color:#039;padding:10px 8px;}#hor-zebra td{color:#669;padding:8px;}#hor-zebra .odd{background:#e8edff;}#ver-zebra{font-family:"Lucida Sans Unicode", "Lucida Grande", Sans-Serif;font-size:12px;width:480px;text-align:left;border-collapse:collapse;margin:0 20px 20px 0px;}
&lt;/style&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Cisco Network Magic Pro 5.5</title><link>http://ccnacentral.blogspot.com/2011/06/cisco-network-magic-pro-55.html</link><category>downloads</category><category>network magic pro 5.5</category><author>noreply@blogger.com (Phillip)</author><pubDate>Wed, 15 Jun 2011 13:16:00 -0500</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-7642398693874062936</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxSyjvAzcz7Lh4UM6ATWhmHoF0NmX1W7bn71wzpGSM85AZhLIduuzHICeWh5NA95uxrjfqg_9J9Ec9FJrCbgkXWcewB12_4_tLtFdK5gJbhVhonR7VAbPnj-ny6H9TItMQNPRYRn1NvwXw/s1600/hero2-1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxSyjvAzcz7Lh4UM6ATWhmHoF0NmX1W7bn71wzpGSM85AZhLIduuzHICeWh5NA95uxrjfqg_9J9Ec9FJrCbgkXWcewB12_4_tLtFdK5gJbhVhonR7VAbPnj-ny6H9TItMQNPRYRn1NvwXw/s1600/hero2-1.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2&gt;
Features&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Easy to use - No IT Expertise Needed&lt;/strong&gt;&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Perform tasks from centralized location&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;An enhanced interface plus new in-product wizards streamline networking tasks, taking the guesswork and effort out of getting connected, monitoring activity and repairing your network.&lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;li&gt;&lt;strong&gt;Connect to the network&lt;/strong&gt;&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Add a Device&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Easily connects all of the devices you use in your daily life; computers, printers, cameras and game consoles to your wireless or broadband network.&lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;Go Wireless&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;"Go Wireless" helps you connect your computers and devices to a secure network.&lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;NAS Support&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Connect Network Attached Storage (NAS) devices to your network, allowing you to easily back up your data.&lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;li&gt;&lt;strong&gt;Share Folders and Printers&lt;/strong&gt;&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Share Printers and Files&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Eliminate the need to email yourself to get access to files or print documents from different computers.&lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;li&gt;&lt;strong&gt;Protect&lt;/strong&gt;&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;New Security Enhancements&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Add protection to your network with wireless protection (encryption support for WPA), enabling you to lock out intruders. Plus, easily change your router password in Network Magic instead of having to log-in to your router admin utility.&lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;li&gt;&lt;strong&gt;Monitor and Control&lt;/strong&gt;&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;New Parental Monitoring&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Gives parents the ability to monitor their kids' online activity. Restrict Internet access plus take real-time desktop screenshots to track websites visited and programs used, providing peace of mind and a safer online experience.&lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;Network Reports&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Viewed detailed activity reports for each computer on your networkl informing you of web sites visited, software application used, and devices added or removed.&lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;li&gt;&lt;strong&gt;Manage and Troubleshoot&lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Internet Speed Test&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Test your Internet speed so you can be aware of service or performance issues.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Health and Security Alerts&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Proactively monitors and informs you of your network's activity and health, giving you advice on how to resolve issues and improve your online experience.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Internet Connection Repair&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Quickly troubleshoot, pinpoint, and repair Internet connection problems.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cross-platform Support&lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Create a seamless network across Windows 7, Vista, XP and Mac so you can easily share printers and files across alll of your computers.&lt;/li&gt;
&lt;li&gt;Network Magic for MAC Add-on&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Integrate Macs and PCs into one network. &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;table border="0" cellpadding="8"&gt;  &lt;tbody&gt;
&lt;tr&gt;
    &lt;td width="6%"&gt;&lt;img alt="Download" height="45" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiazDFFcfhwH9rVrZZ7skEg2MvdDtxygVWFvBvaDnxxoi7Xbyb5uCZeBLz2hxBRBLKjmPT6clmykNBJ2xq8L-P1cd5ECpvVKt6Aek8L8CP20Lh_3_9dXrWtsXxv6WjrmNuTOFUvkGPH9wqP/s288/red-white-pearl-download-arrow.jpg" width="45" /&gt;&lt;/td&gt;
    &lt;td width="94%"&gt;&lt;strong&gt;&lt;a href="http://www.purenetworks.com/download/thankyou.php?pn=" target="_blank"&gt;DOWNLOAD&lt;/a&gt;&lt;/strong&gt;&lt;/td&gt;
  &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxSyjvAzcz7Lh4UM6ATWhmHoF0NmX1W7bn71wzpGSM85AZhLIduuzHICeWh5NA95uxrjfqg_9J9Ec9FJrCbgkXWcewB12_4_tLtFdK5gJbhVhonR7VAbPnj-ny6H9TItMQNPRYRn1NvwXw/s72-c/hero2-1.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>The Internet Infrastructure and How It Connects</title><link>http://ccnacentral.blogspot.com/2011/06/internet-infrastructure-and-how-it.html</link><category>access providers</category><category>dns</category><category>how computers communicate</category><category>local isp</category><category>reviews</category><author>noreply@blogger.com (Phillip)</author><pubDate>Tue, 14 Jun 2011 01:32:00 -0500</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-5835862965173424688</guid><description>&lt;h2&gt;How The Internet Connects&lt;/h2&gt;&lt;br /&gt;
The internet is connected when a user logs into their pc and browse a website by typing in the url. The URL is known as a Domain Name Server; which maps domain names to their IP address. In order for you to even connect to the internet, you must have a Local ISP or Access Providers. Your Local ISP is connected to a regional access router which pools other local ISPs. The regional access router are connected to back haul providers. Back haul providers is capable of handling the massive amounts of Internet traffic that continues to grow.&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;Definitions You Should Know&lt;/h2&gt;&lt;br /&gt;
&lt;table border="0" cellpadding="8"&gt;&lt;tbody&gt;
&lt;tr&gt;     &lt;td width="36%"&gt;&lt;img alt="ATT Logo" height="160" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhigX93PiLN97bR2gBUniQt10X617mT8t7bt23cIYvEMR96pz2pJ9rcCFDTPzI3bSguk743RD3UMwOAo4M4HEIa5ZRzetu9rF5wtnLJEgkoOGiVhqnIEAOU0oGBNaxk7SOgw5oVl5HBhobL/s288/ATT-LOGO.jpeg" width="350" /&gt;&lt;/td&gt;     &lt;td width="64%"&gt;&lt;h2&gt;Access Providers&lt;/h2&gt;The web is really made of many networks connected in a hierarchy. Local Internet service Providers (ISPs) typically give residential and small business access to the Internet. Regional providers typically connect serveral local ISPs to each other and to back haul providers that connect with other regional poroviders.&lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;     &lt;td&gt;&lt;img alt="DynDNS Logo" height="96" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGOA74ubdbfQngtjvskaiQEGunP0UCheqOWHK45lzWg7zgv5G4ztLkWfGUda3QgumdC9LiDvzPBO5U0Bv2-r4RJZtboUoJ10kxfssIoi6Rppd4s_jfWjAKa-OZ2aC1O8CgL-HTf_tqHaq7/s288/Dyndns_logo.png" width="350" /&gt;&lt;/td&gt;     &lt;td&gt;&lt;h2&gt;Domain Name Server (DNS)&lt;/h2&gt;This server maps domain names to their IP addresses. One of the main reasons that the Internet has taken off in use and popularity is because www.ccnacentral.info is much easier to remember than. 34.123.13.3.&lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;     &lt;td&gt;&lt;img alt="Web Servers" height="134" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDpv5S23GwrYH0BNKd0x-OgIJs_FFmGhejp2v4Kr31HnJoxuPbMTv1TL6JcBhvEk-ElNKk5Bn3SNCh3nuBjfDhD8c_XY1RCan05kLlD-Xvaz4_p49CrKStVmxu497qOb84_F2J56YH-LHg/s288/index2_cg.gif" width="350" /&gt;&lt;/td&gt;     &lt;td&gt;&lt;h2&gt;Web Servers&lt;/h2&gt;All web pages are stored on computers called web servers. Thousands of these servers can be dedicated servers for companies, hosting servers that house many personal pages, or even single computers housing individual pages.&lt;/td&gt;   &lt;/tr&gt;
&lt;tr&gt;     &lt;td&gt;&lt;img alt="Back Haul Providers" height="132" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyeAKV6OqXLRkKrQivYaFmij_Imd1L1FqOPs2dIqATlVlSiadpbkLPvHzYYpqkWn2487sgpXMOO80iCb21XhrLC3oH1rI7TVJ_UeiT8kkSHtbET6KxctdMEdiHeeCYHsVzX0RbkYS2Kg-u/s288/Backhaul.gif" width="350" /&gt;&lt;/td&gt;     &lt;td&gt;&lt;h2&gt;Back Haul Providers&lt;/h2&gt;A few back haul providers comprise the high-speed backbone of the Internet. Only a handful of these providers are capable of handling the massive amounts of Internet traffic that continues to grow. Many parts of the back haul providers overlap with each other, which improves both the speed and reliability of the network.&lt;/td&gt;   &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;
&lt;h2&gt;Helpful Sites&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://www.att.com/"&gt;Local Internet Service Provider: AT&amp;amp;T&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.dyndns.com/"&gt;Domain Name Service Provider:&amp;nbsp;DynDNS.com&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;br/&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhigX93PiLN97bR2gBUniQt10X617mT8t7bt23cIYvEMR96pz2pJ9rcCFDTPzI3bSguk743RD3UMwOAo4M4HEIa5ZRzetu9rF5wtnLJEgkoOGiVhqnIEAOU0oGBNaxk7SOgw5oVl5HBhobL/s72-c/ATT-LOGO.jpeg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to install DD-WRT onto your Linksys Cisco Home Router</title><link>http://ccnacentral.blogspot.com/2011/06/how-to-install-dd-wrt-onto-your-linksys.html</link><category>doit</category><category>downloads</category><category>linksys</category><category>routers</category><author>noreply@blogger.com (Phillip)</author><pubDate>Sun, 12 Jun 2011 22:54:00 -0500</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-2078437519386162352</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkcr5byWbLajJTEy5-eXvTi70I0kx7-Kf6ON6ZVSMkO6yoKYFqPIZVP1GBMhlCfWUp2yGVHE_VE9mIBnmClV_eH99YAOoy1sRPdNYylb_w8-UPsnXtvCW87oyK4tYN4l4rwQaTeygpNJ1H/s1600/ddwrt-ccnacentral.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkcr5byWbLajJTEy5-eXvTi70I0kx7-Kf6ON6ZVSMkO6yoKYFqPIZVP1GBMhlCfWUp2yGVHE_VE9mIBnmClV_eH99YAOoy1sRPdNYylb_w8-UPsnXtvCW87oyK4tYN4l4rwQaTeygpNJ1H/s1600/ddwrt-ccnacentral.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h2&gt;


Installation&lt;/h2&gt;
&lt;br /&gt;
Installing DD-WRT on your Linksys Cisco Router is almost as simple as installing a program onto your computer. The bad part is; if done incorrectly, you can brick your router. Installing programs on a router is known as a firmware, is done through flashing. This article will help you install DD-WRT onto your Linksys Cisco Home Router.&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;


Identifying your Linksys Cisco Router&lt;/h2&gt;
&lt;br /&gt;
Visit this &lt;a href="http://www.dd-wrt.com/wiki/index.php/Hardware-specific#Cisco_Linksys"&gt;website&lt;/a&gt; to accurately identify which model your Linksys Cisco router is. Start with the brand name Cisco Linksys and go down the list.&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;


Flashing Instructions&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;First and foremost, you will need to download the DD-WRT file that you've identified is your model and save it to a location that you will be able to locate later to flash your router.&lt;/li&gt;
&lt;li&gt;Log into the Linksys stock firmware and choose to reset to defaults.&lt;/li&gt;
&lt;li&gt;Do a hard reset on your router (hold the reset button down for 30 seconds.)&amp;nbsp;&lt;/li&gt;
&lt;li&gt;After your router has been set to default settings and you've done a hard reset, log into your Linksys firmware by typing 192.168.1.1 into your browser.&lt;/li&gt;
&lt;li&gt;Click on the "Administration" tab&lt;/li&gt;
&lt;li&gt;Click on the "Firmware Upgrade" sub-tab.&lt;/li&gt;
&lt;li&gt;Click the "Browse" button and select the DD-WRT .bin file you downloaded and placed in a location you remembered earlier.&lt;/li&gt;
&lt;li&gt;Click the "Upgrade" button.&lt;/li&gt;
&lt;li&gt;The router will take a few minutes to upload the file and flash the firmware. You should see the power light flash multiple times, dont panic. This is normal.&lt;/li&gt;
&lt;li&gt;Once the firmware has been uploaded, a new page will open confirming that the upload was successful. Now wait about 3-5 minutes before clicking "Continue".&lt;/li&gt;
&lt;li&gt;Lastly, do another hard reset on your router.&lt;/li&gt;
&lt;li&gt;To check that you've successfully and correctly installed DD-WRT, type in 192.168.1.1 in your web browser to be able to see the DD-WRT web interface.&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;h2&gt;


Reverting Back to Stock&lt;/h2&gt;
&lt;br /&gt;
Should you want to revert back to your router's stock firmware, you should be able to download the stock firmwaire from the &lt;a href="http://homesupport.cisco.com/en-us/wireless/linksys?icid=Cisco-Home-Products-HN-MM-Suport-Linksys"&gt;Linksys's site&lt;/a&gt; and flash using the webgui.&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;


Helpful Sites&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://www.dd-wrt.com/wiki/index.php/Installation"&gt;DD-WRT Installation site&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.youtube.com/watch?v=YJ4c_FxVQBc"&gt;How to install custom frmware DD-WRT on Linksys Router (YouTube)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkcr5byWbLajJTEy5-eXvTi70I0kx7-Kf6ON6ZVSMkO6yoKYFqPIZVP1GBMhlCfWUp2yGVHE_VE9mIBnmClV_eH99YAOoy1sRPdNYylb_w8-UPsnXtvCW87oyK4tYN4l4rwQaTeygpNJ1H/s72-c/ddwrt-ccnacentral.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>At-a-Glance: OSI Model</title><link>http://ccnacentral.blogspot.com/2011/06/at-glance-osi-model.html</link><category>how computers communicate</category><category>osi reference model</category><category>reviews</category><author>noreply@blogger.com (Phillip)</author><pubDate>Thu, 2 Jun 2011 23:45:00 -0500</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-9215787204988946522</guid><description>&lt;h4&gt;Why should I Care About the OSI Model?&lt;/h4&gt;The OSI model serves as a guideline for creating and implementing network standards, devices, and internetworking schemes. Advantages of using the OSI model include the following:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Breaks up interrelated aspects of network operation into less-complex elements.&lt;/li&gt;
&lt;li&gt;Enables companies and individual engineers to specialize design and development efforts on modular functions.&lt;/li&gt;
&lt;li&gt;Provides standard interfaces for plug-and-play compatibility and multivendor integration.&lt;/li&gt;
&lt;li&gt;Abstracts different layers of the network from each other to provide easier adoption of new technologies within a layer. &lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjctAP9Ac1TxXRVYgnn5w4LIXW6TNgE4dv1O8UC3kBgneyvtDPpdH3yfW5tTPfJqhOpPWcN6FwAtaoisUWuppeSM80Xqf-T6vSmq-vg2Vq9a-92H6ezLH0XV-fZlopdvznErS_5C1Lkv9Iv/s1600/osi-model-7-layers.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjctAP9Ac1TxXRVYgnn5w4LIXW6TNgE4dv1O8UC3kBgneyvtDPpdH3yfW5tTPfJqhOpPWcN6FwAtaoisUWuppeSM80Xqf-T6vSmq-vg2Vq9a-92H6ezLH0XV-fZlopdvznErS_5C1Lkv9Iv/s1600/osi-model-7-layers.png" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Develop mnemonics to help you memorize the layers and their order. Here's an example: &lt;br /&gt;
&lt;blockquote&gt;&lt;b&gt;Please Do Not Throw Sausage Pizza Away&lt;/b&gt;&lt;/blockquote&gt;&lt;h4&gt;What Problems Need to Be Solved?&lt;/h4&gt;OSI layers can communicate only with the layer directly above or below it on the stack, and with its peer layer on another device. A process must be used so that information can be passed down the stack, across the network, and back up the stack on the peer device.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjctAP9Ac1TxXRVYgnn5w4LIXW6TNgE4dv1O8UC3kBgneyvtDPpdH3yfW5tTPfJqhOpPWcN6FwAtaoisUWuppeSM80Xqf-T6vSmq-vg2Vq9a-92H6ezLH0XV-fZlopdvznErS_5C1Lkv9Iv/s72-c/osi-model-7-layers.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Quick IP Cheat Sheet used for Reference</title><link>http://ccnacentral.blogspot.com/2010/10/quick-ip-cheat-sheet-used-for-reference.html</link><category>class c</category><category>ip</category><category>reference</category><category>subnets</category><author>noreply@blogger.com (Phillip)</author><pubDate>Mon, 25 Oct 2010 01:55:00 -0500</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-6177232926619238261</guid><description>&lt;center&gt;&lt;h1&gt;IP Cheat Sheet&lt;/h1&gt;&lt;table width="456" border="1" id="chart-wrapper"&gt;&lt;tr&gt;&lt;th width="55"&gt; &lt;/th&gt;&lt;th width="73"&gt;Hosts&lt;/th&gt;&lt;th width="181"&gt;Netmask&lt;/th&gt;&lt;th width="127"&gt;Amount of a Class C&lt;/th&gt;&lt;/tr&gt;

&lt;tr align="center"&gt;&lt;th&gt;/30&lt;/th&gt;&lt;td&gt;4&lt;/td&gt;&lt;td&gt;255.255.255.252&lt;/td&gt;&lt;td&gt;1/64&lt;/td&gt;&lt;/tr&gt;
&lt;tr align="center"&gt;&lt;th&gt;/29&lt;/th&gt;&lt;td&gt;8&lt;/td&gt;&lt;td&gt;255.255.255.248&lt;/td&gt;&lt;td&gt;1/32&lt;/td&gt;&lt;/tr&gt;
&lt;tr align="center"&gt;&lt;th&gt;/28&lt;/th&gt;&lt;td&gt;16&lt;/td&gt;&lt;td&gt;255.255.255.240&lt;/td&gt;&lt;td&gt;1/16&lt;/td&gt;&lt;/tr&gt;
&lt;tr align="center"&gt;&lt;th&gt;/27&lt;/th&gt;&lt;td&gt;32&lt;/td&gt;&lt;td&gt;255.255.255.224&lt;/td&gt;&lt;td&gt;1/8&lt;/td&gt;&lt;/tr&gt;

&lt;tr align="center"&gt;&lt;th&gt;/26&lt;/th&gt;&lt;td&gt;64&lt;/td&gt;&lt;td&gt;255.255.255.192&lt;/td&gt;&lt;td&gt;1/4&lt;/td&gt;&lt;/tr&gt;
&lt;tr align="center"&gt;&lt;th&gt;/25&lt;/th&gt;&lt;td&gt;128&lt;/td&gt;&lt;td&gt;255.255.255.128&lt;/td&gt;&lt;td&gt;1/2&lt;/td&gt;&lt;/tr&gt;
&lt;tr align="center"&gt;&lt;th&gt;/24&lt;/th&gt;&lt;td&gt;256&lt;/td&gt;&lt;td&gt;255.255.255.0&lt;/td&gt;&lt;td&gt;1&lt;/td&gt;&lt;/tr&gt;
&lt;tr align="center"&gt;&lt;th&gt;/23&lt;/th&gt;&lt;td&gt;512&lt;/td&gt;&lt;td&gt;255.255.254.0&lt;/td&gt;&lt;td&gt;2&lt;/td&gt;&lt;/tr&gt;

&lt;tr align="center"&gt;&lt;th&gt;/22&lt;/th&gt;&lt;td&gt;1024&lt;/td&gt;&lt;td&gt;255.255.252.0&lt;/td&gt;&lt;td&gt;4&lt;/td&gt;&lt;/tr&gt;
&lt;tr align="center"&gt;&lt;th&gt;/21&lt;/th&gt;&lt;td&gt;2048&lt;/td&gt;&lt;td&gt;255.255.248.0&lt;/td&gt;&lt;td&gt;8&lt;/td&gt;&lt;/tr&gt;
&lt;tr align="center"&gt;&lt;th&gt;/20&lt;/th&gt;&lt;td&gt;4096&lt;/td&gt;&lt;td&gt;255.255.240.0&lt;/td&gt;&lt;td&gt;16&lt;/td&gt;&lt;/tr&gt;
&lt;tr align="center"&gt;&lt;th&gt;/19&lt;/th&gt;&lt;td&gt;8192&lt;/td&gt;&lt;td&gt;255.255.224.0&lt;/td&gt;&lt;td&gt;32&lt;/td&gt;&lt;/tr&gt;

&lt;tr align="center"&gt;&lt;th&gt;/18&lt;/th&gt;&lt;td&gt;16384&lt;/td&gt;&lt;td&gt;255.255.192.0&lt;/td&gt;&lt;td&gt;64&lt;/td&gt;&lt;/tr&gt;
&lt;tr align="center"&gt;&lt;th&gt;/17&lt;/th&gt;&lt;td&gt;32768&lt;/td&gt;&lt;td&gt;255.255.128.0&lt;/td&gt;&lt;td&gt;128&lt;/td&gt;&lt;/tr&gt;
&lt;tr align="center"&gt;&lt;th&gt;/16&lt;/th&gt;&lt;td&gt;65536&lt;/td&gt;&lt;td&gt;255.255.0.0&lt;/td&gt;&lt;td&gt;256&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;&lt;/center&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;style type="text/css"&gt;
/* A Phantom Graphics Inc. Productionz
----------------------------------------------- */

table {
  border-collapse:collapse;
  background:#EFF4FB url(http://www.roscripts.com/images/teaser.gif) repeat-x;
  border-left:1px solid #686868;
  border-right:1px solid #686868;
  font:0.8em/145% 'Trebuchet MS',helvetica,arial,verdana;
  color: #333;
}

td, th {
  padding:5px;
}

caption {
  padding: 0 0 .5em 0;
  text-align: left;
  font-size: 1.4em;
  font-weight: bold;
  text-transform: uppercase;
  color: #333;
  background: transparent;
}

/* =links
----------------------------------------------- */

table a {
  color:#950000;
  text-decoration:none;
}

table a:link {}

table a:visited {
  font-weight:normal;
  color:#666;
  text-decoration: line-through;
}

table a:hover {
  border-bottom: 1px dashed #bbb;
}

/* =head =foot
----------------------------------------------- */

thead th, tfoot th, tfoot td {
  background:#333 url(http://www.roscripts.com/images/llsh.gif) repeat-x;
  color:#fff
}

tfoot td {
  text-align:right
}

/* =body
----------------------------------------------- */

tbody th, tbody td {
  border-bottom: dotted 1px #333;
}

tbody th {
  white-space: nowrap;
}

tbody th a {
  color:#333;
}

.odd {}

tbody tr:hover {
  background:#fafafa
}

#chart-wrapper {
  width: auto;
}
&lt;/style&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How Computer Networking Can Benefit a Company</title><link>http://ccnacentral.blogspot.com/2010/06/how-computer-networking-can-benefit.html</link><category>innovation</category><category>network</category><category>tips</category><author>noreply@blogger.com (Phillip)</author><pubDate>Sun, 13 Jun 2010 01:03:00 -0500</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-8891641170936960826</guid><description>&lt;p&gt;Technology is advancing at a rapid pace in today’s world. Businesses are constantly in high demands of technicians that understand the ebb and flow of information through technical devices and that is able to keep up with the growth and new innovations of demanding vendors. Computer networking is one of the many and perhaps most efficient way that information enters and leaves in the complex world of business.   &lt;br /&gt;Like any profession, computer networking is an art and science combined. A graphic designer can strike up a beautiful piece of artwork, but like any artist, whether it be a musician or the next Picasso, passionate artists can capture your emotions or attention. Most of the time, find themselves lost in the zone of their passion. This can be applied to computer networking as well, understanding how a business actually functions and fluctuates from day to day, month to month, and year to year is the first step in determining how to set up a network that is suitable for it. Through planning and drafting sketches, you can produce the best possible routing table and in the process, while keeping in mind how your vendor will use information, you can locate and weed out any possible conflicts or problems you may encounter in setting up this beautiful piece of network master piece. Combined with science and the results are unlimited, that’s why there are many more networking schemes to yet be discovered.    &lt;br /&gt;Like chemistry and biology, scientists are still researching on new medicines and cures for existing illnesses and diseases. For example, AIDS and HIV are one of the many researches taking place as one speaks. There are many computer scientists today, researching and developing new innovations in the lab and then test running them on current existing businesses to gain feedback and insights on the next big networking scheme. When implemented correctly, businesses can function properly with information being delivered on time, efficiently, and consistently; most definitely contributing to the success of a business and at the same time, giving them the upper hand in competition. We all know    &lt;br /&gt;that when things run smoothly, we can channel our focus on something else; in this case, the ROI of a business. So not only does efficient networking contribute to a business success, it allows it to direct its focus elsewhere, for example; push on sales and focus on net profit for a better return on investment and performance inclination. These are just a few major benefits businesses can gain through use of computer networking; it’s no wonder they spend millions of dollars for technology every year. Take Microsoft Sharepoint for example, last year alone, they spent over millions of dollars on innovations but made over hundreds of millions of dollars back on their returns of investments and profits. Sharepoint, a web-development platform has really proved indispensible to any business owner or business in need of a quick, professional, and functional website. About 5 years ago and the years preceding, you had to fully understand computer language, such as HTML, CSS, JavaScripts, and PHP to create a website Now, you just do it with the dragging and click of a button. Most likely, not as easy as 1, 2, 3, but it’s almost as easy as coloring a book. Although this may prove negatively on current professional designers, it has proved indispensible to businesses around the world, and that’s what new innovations ought to do; make life easier. It has also made the job a lot easier and reduced the cost of spending for website designers to most companies. One can reckon the force of how powerful technology can be, but at the same time how dangerous it could be to society.    &lt;br /&gt;In health and pharmaceuticals research, some corrupted scientist could invent a dose of drug that could be harmful or detrimental to society, or in the worst case scenario, wipe out the human population. Computer scientist must always be aware that an innovation of theirs could possibly be the vice versa outcome they had expected. This is where the movies and films such as iRobot and Frankenstein came about. Like all professions, good morals and values is essential to every step in research and development, let alone, life itself.    &lt;br /&gt;The ebb and flow of information isn’t just the presence and absence of information. It’s art and science combined, whether complex or compound, its value is crucial and vital on businesses all around the globe. For some it could mean a lot of money, but for the ones that truly have a passion in it, nothing is impossible. It’s the boundary between science and art, like the law of time, gravity, and the universe according to Albert Einstein. Time can only tell, but when solved, cracked, or broken; possibilities and new innovations are endless. For the time being though, they are just floating around, patiently waiting to yet to be discovered by a passionate artist/scientist.&lt;/p&gt;  </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Exam Essential: Internetworking</title><link>http://ccnacentral.blogspot.com/2010/04/exam-essential-internetworking.html</link><category>essentials</category><category>exam</category><author>noreply@blogger.com (Phillip)</author><pubDate>Fri, 30 Apr 2010 21:32:00 -0500</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-4609042030758197554</guid><description>&lt;p&gt;&lt;strong&gt;Know the possible causes of LAN traffic congestion&lt;/strong&gt;    &lt;br /&gt;Too many hosts in a broadcast domain/storms, multicasting, and low bandwidth are all possible suspects of LAN traffic congestion.&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Be able to distinguish the difference between a collision domain and a broadcast domain&lt;/strong&gt;    &lt;br /&gt;Collision domain is an Ethernet term used to describe a network collection of devices in which one particular device sends a packet on a network segment, forcing every other device on that same segment to pay attention to it. On a broadcast domain, a set of all devices on a network segment hear all broadcasts sent on that segment.&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Be able to distinguish the difference between a hub, a bridge, a switch, and a router     &lt;br /&gt;&lt;/strong&gt;Hubs create one collision domain and one broadcast domain. Bridges break up collision domains but create one super duper large broadcast domain through use of hardware addresses to filter the network. Switches are really just multiple port bridges with more intelligence. They break up collision domains but create one large broadcast domain by default and also uses hardware addresses to filter the network. Routers break up broadcast domains (as well as collision domains) and use logical addressing to filter the network.&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Know the OSI layers&lt;/strong&gt;    &lt;br /&gt;It’s mandatory that you know the OSI layers and the function each layer provides. There are seven layers in the OSI reference model. The upper layers consist of The Application, Presentation, and Session Layers, and are responsible for communicating from a user interface to an application. The bottom layers consist of The Transport, Network, Data Link, and Physical Layers. The transport layer provides for segmentation, sequencing, and virtual circuits. The network layer provides for framing and placing of data on the network medium. Last but not least, the physical layer is responsible for taking 1s and 0s and encoding them into a digital signal for transmission on the network segment.&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Remember the types of Ethernet cabling and when to use them     &lt;br /&gt;&lt;/strong&gt;There are three types of cables that can be created from an Ethernet cable:&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;Straight-through&lt;/li&gt;    &lt;ul&gt;     &lt;li&gt;to connect a PC’s or a router’s Ethernet interface to a hub or switch.&lt;/li&gt;   &lt;/ul&gt;    &lt;li&gt;Crossover&lt;/li&gt;    &lt;ul&gt;     &lt;li&gt;to connect hub to hub, hub to switch, switch to switch, or PC to PC.&lt;/li&gt;   &lt;/ul&gt;    &lt;li&gt;Rolled&lt;/li&gt;    &lt;ul&gt;     &lt;li&gt;for a console connection from a PC to a router or switch&lt;/li&gt;   &lt;/ul&gt; &lt;/ul&gt;  &lt;p&gt;&lt;strong&gt;Understand how to connect a console cable from a PC to a router and commence HyperTerminal&lt;/strong&gt;    &lt;br /&gt;You should know how to do this for the exam: Take a rolled cable and connect it from the COM port of the host to the console port of a router. Start HyperTerminal and set the BPS to 9600 and flow control to none.&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Memorize the three layers in the Cisco three-layer model&lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;Core&lt;/li&gt;    &lt;li&gt;Distribution&lt;/li&gt;    &lt;li&gt;Access&lt;/li&gt; &lt;/ul&gt;  </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Where do you take the CCNA Exams?</title><link>http://ccnacentral.blogspot.com/2010/04/where-do-you-take-ccna-exams.html</link><category>exam</category><category>tips</category><author>noreply@blogger.com (Phillip)</author><pubDate>Sun, 11 Apr 2010 01:15:00 -0500</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-7291318130502398039</guid><description>&lt;p&gt;You can take the CCNA Composite exam at any &lt;a href="http://www.vue.com" target="_blank"&gt;Pearson VUE&lt;/a&gt; authorized testing centers or call 877-404-EXAM (3926).&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Follow these steps to register for a CCNA exam:&lt;/strong&gt;&lt;/p&gt;  &lt;ol&gt;   &lt;li&gt;Determine the number of exam you would like to take. (Composite exam number is 640-802.)&lt;/li&gt;    &lt;li&gt;Register with the nearest Pearson VUE testing center. At this time, you will be asked to pay in advance for the exam. The current fee for the exam is $150.00 and must be taken within one year of the time of payment. You may also schedule exams up to six weeks in advance or as late as the day you are planning to take it on. However, if you fail a Cisco exam, you must wait five days before you are allowed to re-schedule for another shot at it. Because life can be unexpected, if something is to pop up on your test day, and you need to cancel or reschedule your exam, contact Prometric or &lt;a href="http://www.vue.com" target="_blank"&gt;Pearson VUE&lt;/a&gt; AT LEAST 24 hours in advance.&lt;/li&gt;    &lt;li&gt;Upon scheduling the exam, you will receive instructions regarding all appointment and cancelation procedures, the ID requirements, and information regarding the testing-center location.&lt;/li&gt; &lt;/ol&gt;  &lt;p&gt;&lt;strong&gt;Here are some general tips for exam day:&lt;/strong&gt;&lt;/p&gt;  &lt;ol&gt;   &lt;li&gt;Of course, arrive early at the exam location, so you’re able to relax and get a review in before the test. You should not be trying to study the information on this day.&lt;/li&gt;    &lt;li&gt;Read each of the questions carefully. Be certain of what exactly each question is asking before diving in to conclusion.&lt;/li&gt;    &lt;li&gt;If you’re stuck on a question, your best bet is to use the process of elimination to get rid of the obviously incorrect answers first. This can greatly improve your odds of choosing the wrong answer.&lt;/li&gt;    &lt;li&gt;Because you can no longer move forward or backward through the exams, you will need to double-check your answers before proceeding to the next. Make sure you don’t forget this.&lt;/li&gt;    &lt;li&gt;And last but not least, stay focused, attentive, and conscious throughout the whole exam.&lt;/li&gt; &lt;/ol&gt;  </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>The physical layer, hubs, and ethernet</title><link>http://ccnacentral.blogspot.com/2010/02/physical-layer-hubs-and-ethernet.html</link><category>cables</category><category>ethernet</category><category>hubs</category><category>layers</category><category>physical layer</category><category>reviews</category><author>noreply@blogger.com (Phillip)</author><pubDate>Sun, 28 Feb 2010 03:53:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-1839407219231687860</guid><description>&lt;p&gt;&lt;strong&gt;The main functions of the physical layer is to send bits and receive bits, as well as state transitions.&lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;Bits come in only values of 1 or 0 (morse code with numerical values). &lt;/li&gt;    &lt;li&gt;State transitions – changes in voltage from high to low and vice-versa. &lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;strong&gt;Hubs at the physical layer&lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;What is a hub?&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;A hub is really a multiple port repeater. &lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;Hubs in a network&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;All devices in the same collision domain. &lt;/li&gt;    &lt;li&gt;All devices in the same broadcast domain. &lt;/li&gt;    &lt;li&gt;Devices shares some bandwidth. &lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;What is a Physical Star Network?&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;A physical star network is where the hub is a central device and cables are extended in all directions from it. &lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;strong&gt;Note: Hubs and repeaters can be used to enlarge the area covered by a single LAN segment, however, this is &lt;font color="#808080"&gt;NOT RECOMMENDED&lt;/font&gt;.&lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Ethernet at the physical layer&lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;Created by a group called DIX (Digital, Intel, Xerox) &lt;/li&gt;    &lt;li&gt;There are three types of ethernet      &lt;ul&gt;       &lt;li&gt;802.3u – Fast Ethernet &lt;/li&gt;        &lt;li&gt;802.3ab – Gigabit Ethernet on Category 5 &lt;/li&gt;        &lt;li&gt;802.3ae – 10Gbps over fiber and coax &lt;/li&gt;     &lt;/ul&gt;   &lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;Electronics Industries Association and The Newer Telecommunications Industry Alliance (EIA/TIA)&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;The standard body that creates the physical layer/specifications for ethernet. &lt;/li&gt;    &lt;li&gt;EIA/TIA specifies that ethernet use a registered jack (RJ) connector with a 4 5 wiring sequence on unshielded twisted pair (UTP) cabling (RJ45). &lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;strong&gt;Cables&lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;Cables are measured in decibals (dB) &lt;/li&gt;    &lt;li&gt;Cabling in corporate and home markets is measured in categories.      &lt;ul&gt;       &lt;li&gt;A higher quality cable will have a higher rated category and lower attenuation.          &lt;ul&gt;           &lt;li&gt;ex. category 5 &amp;gt; category 3 &lt;/li&gt;         &lt;/ul&gt;       &lt;/li&gt;     &lt;/ul&gt;   &lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;strong&gt;Key term: &lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;Crosstalk – the unwanted signal interference from adjacent pairs in the cable. &lt;/li&gt; &lt;/ul&gt;  </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>A closer look at the Data-Link layer</title><link>http://ccnacentral.blogspot.com/2010/02/closer-look-at-data-link-layer.html</link><category>binary values</category><category>byte values</category><category>data-link</category><category>hexadecimal values</category><category>layers</category><category>nibble values</category><category>reviews</category><author>noreply@blogger.com (Phillip)</author><pubDate>Sun, 14 Feb 2010 01:35:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-2174264654262026748</guid><description>&lt;p&gt;The Data-Link layer provides physical transmission of the data and handles error notifications, network topology, and flow control.&lt;/p&gt;  &lt;h3&gt;Lets take a closer look at it’s function&lt;/h3&gt;  &lt;ol&gt;   &lt;li&gt;Ensures messages are delivered to the proper device on LAN using hardware addresses and will translate messages from the Network layer to transmit. &lt;/li&gt;    &lt;li&gt;Transmit messages into pieces called a data frame and adds a customized header containing the hardware destination and source address. &lt;/li&gt;    &lt;li&gt;Data-Link uses binary values and hexadecimal values. &lt;/li&gt; &lt;/ol&gt;  &lt;p&gt;&lt;strong&gt;Binary Values&lt;/strong&gt;&lt;/p&gt;  &lt;table border="1" cellspacing="2" cellpadding="2" width="376"&gt;&lt;tbody&gt;     &lt;tr&gt;       &lt;td valign="top" width="175"&gt;&lt;strong&gt;Nibble Values&lt;/strong&gt;&lt;/td&gt;        &lt;td valign="top" width="193"&gt;&lt;strong&gt;Byte Values&lt;/strong&gt;&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="175"&gt;8&amp;#160; 4&amp;#160; 2&amp;#160; 1&lt;/td&gt;        &lt;td valign="top" width="193"&gt;128&amp;#160; 64&amp;#160; 32&amp;#160; 16&amp;#160; 8&amp;#160; 4&amp;#160; 2&amp;#160; 1&lt;/td&gt;     &lt;/tr&gt;   &lt;/tbody&gt;&lt;/table&gt;  &lt;p&gt;&lt;strong&gt;Binary to Decimal Chart&lt;/strong&gt;&lt;/p&gt;  &lt;table border="1" cellspacing="2" cellpadding="2" width="373"&gt;&lt;tbody&gt;     &lt;tr&gt;       &lt;td valign="top" width="175"&gt;&lt;strong&gt;Binary Value&lt;/strong&gt;&lt;/td&gt;        &lt;td valign="top" width="190"&gt;&lt;strong&gt;Decimal Value&lt;/strong&gt;&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="175"&gt;10000000&lt;/td&gt;        &lt;td valign="top" width="190"&gt;128&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="175"&gt;11000000&lt;/td&gt;        &lt;td valign="top" width="190"&gt;192&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="175"&gt;11100000&lt;/td&gt;        &lt;td valign="top" width="190"&gt;224&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="175"&gt;11110000&lt;/td&gt;        &lt;td valign="top" width="190"&gt;240&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="175"&gt;11111000&lt;/td&gt;        &lt;td valign="top" width="190"&gt;248&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="175"&gt;11111100&lt;/td&gt;        &lt;td valign="top" width="190"&gt;252&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="175"&gt;11111110&lt;/td&gt;        &lt;td valign="top" width="190"&gt;254&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="175"&gt;11111111&lt;/td&gt;        &lt;td valign="top" width="190"&gt;255&lt;/td&gt;     &lt;/tr&gt;   &lt;/tbody&gt;&lt;/table&gt;  &lt;p&gt;&lt;strong&gt;Hexadecimals&lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;Hex is short for hexadecimal, which is a numbering system that uses the first six letters of the alphabet (A through F) to extend beyond the available ten digits in the decimal system. Hexadecimal has a total of sixteen digits.&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Hex to Binary to Decimal Chart&lt;/strong&gt;&lt;/p&gt;  &lt;table border="1" cellspacing="2" cellpadding="2" width="370"&gt;&lt;tbody&gt;     &lt;tr&gt;       &lt;td valign="top" width="116"&gt;&lt;strong&gt;Hexadecimal&lt;/strong&gt;&lt;/td&gt;        &lt;td valign="top" width="116"&gt;&lt;strong&gt;Binary&lt;/strong&gt;&lt;/td&gt;        &lt;td valign="top" width="128"&gt;&lt;strong&gt;Decimal&lt;/strong&gt;&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="116"&gt;0&lt;/td&gt;        &lt;td valign="top" width="116"&gt;0000&lt;/td&gt;        &lt;td valign="top" width="128"&gt;0&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="116"&gt;1&lt;/td&gt;        &lt;td valign="top" width="116"&gt;0001&lt;/td&gt;        &lt;td valign="top" width="128"&gt;1&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="116"&gt;2&lt;/td&gt;        &lt;td valign="top" width="116"&gt;0010&lt;/td&gt;        &lt;td valign="top" width="128"&gt;2&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="116"&gt;3&lt;/td&gt;        &lt;td valign="top" width="116"&gt;0011&lt;/td&gt;        &lt;td valign="top" width="128"&gt;3&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="116"&gt;4&lt;/td&gt;        &lt;td valign="top" width="116"&gt;0100&lt;/td&gt;        &lt;td valign="top" width="128"&gt;4&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="116"&gt;5&lt;/td&gt;        &lt;td valign="top" width="116"&gt;0101&lt;/td&gt;        &lt;td valign="top" width="128"&gt;5&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="116"&gt;6&lt;/td&gt;        &lt;td valign="top" width="116"&gt;0110&lt;/td&gt;        &lt;td valign="top" width="128"&gt;6&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="116"&gt;7&lt;/td&gt;        &lt;td valign="top" width="116"&gt;0111&lt;/td&gt;        &lt;td valign="top" width="128"&gt;7&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="116"&gt;8&lt;/td&gt;        &lt;td valign="top" width="116"&gt;1000&lt;/td&gt;        &lt;td valign="top" width="128"&gt;8&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="116"&gt;9&lt;/td&gt;        &lt;td valign="top" width="116"&gt;1001&lt;/td&gt;        &lt;td valign="top" width="128"&gt;9&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="116"&gt;A&lt;/td&gt;        &lt;td valign="top" width="116"&gt;1010&lt;/td&gt;        &lt;td valign="top" width="128"&gt;10&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="116"&gt;B&lt;/td&gt;        &lt;td valign="top" width="116"&gt;1011&lt;/td&gt;        &lt;td valign="top" width="128"&gt;11&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="116"&gt;C&lt;/td&gt;        &lt;td valign="top" width="116"&gt;1100&lt;/td&gt;        &lt;td valign="top" width="128"&gt;12&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="116"&gt;D&lt;/td&gt;        &lt;td valign="top" width="116"&gt;1101&lt;/td&gt;        &lt;td valign="top" width="128"&gt;13&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="116"&gt;E&lt;/td&gt;        &lt;td valign="top" width="116"&gt;1110&lt;/td&gt;        &lt;td valign="top" width="128"&gt;14&lt;/td&gt;     &lt;/tr&gt;      &lt;tr&gt;       &lt;td valign="top" width="116"&gt;F&lt;/td&gt;        &lt;td valign="top" width="116"&gt;1111&lt;/td&gt;        &lt;td valign="top" width="128"&gt;15&lt;/td&gt;     &lt;/tr&gt;   &lt;/tbody&gt;&lt;/table&gt;  </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Six major points of Routers</title><link>http://ccnacentral.blogspot.com/2010/02/six-major-points-of-routers.html</link><category>reviews</category><category>routers</category><author>noreply@blogger.com (Phillip)</author><pubDate>Sun, 14 Feb 2010 01:07:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-5559408871869071756</guid><description>&lt;p&gt;There are six major points to remember or keep in mind when working with routers or layer 3 devices. You should probably commit these to memory.&lt;/p&gt;  &lt;h3&gt;Here are the six major points&lt;/h3&gt;  &lt;ol&gt;   &lt;li&gt;Routers, by default, will not forward any broadcast or multi-task packets. &lt;/li&gt;    &lt;li&gt;Routers use the logical address in the network layer header to determine the next hop router to forward the packet to. &lt;/li&gt;    &lt;li&gt;Routers can use access list, created by an administrator to control security on the types of packets that are allowed to enter or exit an interface. &lt;/li&gt;    &lt;li&gt;Routers can provide layer 2 bridging functions if needed, and can simultaneously route through the same interface. &lt;/li&gt;    &lt;li&gt;Routers provide connections between virtual LANS (VLANS). &lt;/li&gt;    &lt;li&gt;Routers provide Quality of Service (QoS) for specific types of network traffic. &lt;/li&gt; &lt;/ol&gt;  </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>A closer look at the Network Layer</title><link>http://ccnacentral.blogspot.com/2010/02/closer-look-at-network-layer.html</link><category>network</category><category>reviews</category><category>upper layers</category><author>noreply@blogger.com (Phillip)</author><pubDate>Sun, 14 Feb 2010 00:55:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-2482059880546892284</guid><description>&lt;p&gt;The network layer manages devices addressing, tracks location of devices on the network, and determines the best way to move data, which means the Network layer must transport traffic between devices that aren’t locally attached.&lt;/p&gt;  &lt;h3&gt;Lets take a closer look at it’s function&lt;/h3&gt;  &lt;ol&gt;   &lt;li&gt;Checks a packet when it is first received on a router interface. &lt;/li&gt;    &lt;li&gt;If the packet isn’t destined for that particular router, it will look up the destination network address in the routing table. &lt;/li&gt;    &lt;li&gt;Once the router chooses an exit interface, the packet will be sent to that interface to be framed and sent out on the local network. &lt;/li&gt;    &lt;li&gt;If the router is unable to locate an interface; the packets will be dropped. &lt;/li&gt; &lt;/ol&gt;  &lt;h3&gt;Key Terms&lt;/h3&gt;  &lt;p&gt;&lt;strong&gt;Router&lt;/strong&gt; – a router is a network layer device (layer 3 device) and provides the routing services within an internetwork.&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Data packets&lt;/strong&gt; – are used at the network layer to transport data through the internetwork. &lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Routed Protocols&lt;/strong&gt; – are used to support data traffic.&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Route Update Packets&lt;/strong&gt; – are used to update neighboring routers about the networks connected to all routers within the internetwork.&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Routing Protocols&lt;/strong&gt; – are used to send out route updates packets.&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Network Address&lt;/strong&gt;&lt;/p&gt;  &lt;ol&gt;   &lt;li&gt;A protocol specific network address. &lt;/li&gt;    &lt;li&gt;A router must maintain a routing table for individual routing protocols because each routing protocols keep track of a network with a different addressing scheme (ex. IP, IPv6, and IPX). &lt;/li&gt; &lt;/ol&gt;  &lt;p&gt;&lt;strong&gt;Interface&lt;/strong&gt; – is the exit interface a packet will take when destined for a specific network.&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Metric&lt;/strong&gt; – is the distance to the remote network.&lt;/p&gt;  </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Visual of Windowing</title><link>http://ccnacentral.blogspot.com/2010/02/visual-view-of-windowing.html</link><category>reviews</category><category>windowing</category><author>noreply@blogger.com (Phillip)</author><pubDate>Mon, 1 Feb 2010 20:55:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-184224297247851067</guid><description>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;h4&gt;Windowing Diagram&lt;/h4&gt;  &lt;p&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6oI3oSneF6X52ch2vW2wrgZY7X_QMs7YGMTP7Y53qMigOu2fiBJCHkkPVZBplk12NdRsofI7G9kMqe9HPAObhTfAORsDSXiXYaxcKFYENEG2H7RXN0P4BVxDljmqis9TL95f8jqo2Mxwr/s1600-h/windowing%5B6%5D.jpg"&gt;&lt;img style="border-right-width: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px" title="windowing" border="0" alt="windowing" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMKFRfaMwr7-ti-tn2wRVy_ADAs6kdNpMueDMePprsSRB5VtbTCCupKBFF9nM-3SKRqC1YryhHdDYV0yTcp6gPzglCK-JYRhrQWvqJTskrrhsFm6tpTTBPAwWzvDDpMrt2p90tFPytBEAj/?imgmax=800" width="356" height="238" /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Window size of 1&lt;/strong&gt; = sending machine waits for an acknowledgement for each data segment it transmit before transmitting another segment.&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Window size of 3&lt;/strong&gt; = allowed to transmit three data segments before an acknowledgement is actually received.&lt;/p&gt;  </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMKFRfaMwr7-ti-tn2wRVy_ADAs6kdNpMueDMePprsSRB5VtbTCCupKBFF9nM-3SKRqC1YryhHdDYV0yTcp6gPzglCK-JYRhrQWvqJTskrrhsFm6tpTTBPAwWzvDDpMrt2p90tFPytBEAj/s72-c?imgmax=800" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Types of flow control and a closer look at Windowing</title><link>http://ccnacentral.blogspot.com/2010/01/types-of-flow-control-and-closer-look.html</link><category>flow control</category><category>reviews</category><category>transport layer</category><category>windowing</category><author>noreply@blogger.com (Phillip)</author><pubDate>Thu, 28 Jan 2010 22:15:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-7599392244160731734</guid><description>&lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;h3&gt;The three types of flow control consists of:&lt;/h3&gt;  &lt;ol&gt;   &lt;li&gt;buffering &lt;/li&gt;    &lt;li&gt;windowing &lt;/li&gt;    &lt;li&gt;congestion avoidance &lt;/li&gt; &lt;/ol&gt;  &lt;h3&gt;A closer look at what windowing is and it's function at the transport layer&lt;/h3&gt;  &lt;p&gt;&lt;u&gt;Windowing&lt;/u&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;Windowing is the quantity of data segments (measured in bytes) that the transmitting machine is allowed to send without receiving an acknowledgement for them. &lt;/li&gt;    &lt;li&gt;In other words, it's the break of time in between data segments of before and after. &lt;/li&gt;    &lt;li&gt;Windowing is used to control the amount of outstanding, unacknowledged data segments. &lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;font size="4"&gt;&lt;strong&gt;Note:&lt;/strong&gt;&lt;/font&gt; if hosts fails to receive all segments that it should have acknowledged, the host can improve the communication session by decreasing window size.&lt;/p&gt;  </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Connection-oriented Communication</title><link>http://ccnacentral.blogspot.com/2010/01/connection-oriented-communication.html</link><category>connection-oritented communication</category><category>flow control</category><category>reviews</category><category>transport layer</category><author>noreply@blogger.com (Phillip)</author><pubDate>Thu, 28 Jan 2010 21:58:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-7572720318126313086</guid><description>&lt;p&gt;&lt;font size="5"&gt;&lt;/font&gt;&lt;/p&gt;  &lt;p&gt;&lt;font size="4"&gt;Note:&lt;/font&gt; Recall that connection-oriented communications takes place in conjunction with flow control. These communication sessions, in combination of the protocols involved, provide for reliable data transports at the transport layer.&lt;/p&gt;  &lt;h3&gt;Diagram:&lt;/h3&gt;  &lt;p&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHnMsLctC5yePeZm77-rUSu-rWG0MPUv-aApWwjYWXwongFikxBKE-ubaJyJOkiJ8k66mwE0VYwfm2RiFES4QdAL0Ur7yqVLKyJi2FfuVHww5dsVmAP8wDyfOoTrzzWuEzksnqeC9u-no_/s1600-h/connectionoriented%5B19%5D.jpg" target="_blank"&gt;&lt;img style="border-right-width: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px" title="connectionoriented" border="0" alt="connectionoriented" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNp1jFkUQ4JEuVpZ38vJU7d-3eNsYZ392As98fUThDeatZwCKuaoZi18MWIpOdfigx1KXFvARwOaeTijo-jgHULcmJkP6UP_EN3LrkDkuT_xqS2xXVz-oOJr8qESk3oU5sOP-OyjcrHM6s/?imgmax=800" width="417" height="417" /&gt;&lt;/a&gt; &lt;/p&gt;  &lt;h3&gt;This is what we call the &amp;quot;Three Way Handshake&amp;quot;&lt;/h3&gt;  &lt;ol&gt;   &lt;li&gt;The 1st &amp;quot;connection agreement&amp;quot; segment is a request for synchronization. &lt;/li&gt;    &lt;li&gt;At the 2nd and 3rd connection agreement, segments acknowledge the requests and establishes connection parameters (the rules) between hosts. These segments request that the receiver sequencing is synchronized here as well, resulting in a&lt;strong&gt; bidirectional&lt;/strong&gt; connection. &lt;/li&gt;    &lt;li&gt;The final segment is also an acknowledgement. It notifies the destination host that the connection has been established – Data transfer can now begin. &lt;/li&gt; &lt;/ol&gt;  &lt;h3&gt;How to identify a connection-oriented communication when you see one&lt;/h3&gt;  &lt;ol&gt;   &lt;li&gt;It has a virtual circuit set up. (i.e.. 3 way handshake) &lt;/li&gt;    &lt;li&gt;Use sequencing &lt;/li&gt;    &lt;li&gt;Use acknowledgements &lt;/li&gt;    &lt;li&gt;Use flow control &lt;/li&gt; &lt;/ol&gt;  &lt;p&gt;&lt;strong&gt;Question:&lt;/strong&gt; What happens when a device receives a flooding of datagram's (packets) too quickly for it to process?&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Answer:&lt;/strong&gt; They store them in a memory section called a &lt;strong&gt;buffer.&lt;/strong&gt;&lt;/p&gt;  </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNp1jFkUQ4JEuVpZ38vJU7d-3eNsYZ392As98fUThDeatZwCKuaoZi18MWIpOdfigx1KXFvARwOaeTijo-jgHULcmJkP6UP_EN3LrkDkuT_xqS2xXVz-oOJr8qESk3oU5sOP-OyjcrHM6s/s72-c?imgmax=800" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Understanding how flow control operates at the Transport layer</title><link>http://ccnacentral.blogspot.com/2010/01/understanding-how-flow-control-operates.html</link><category>flow control</category><category>layers</category><category>network</category><category>reviews</category><category>transport layer</category><author>noreply@blogger.com (Phillip)</author><pubDate>Thu, 28 Jan 2010 21:30:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-888914355889083423</guid><description>&lt;br /&gt;  &lt;h3&gt;A quick overview of the Transport layer and its function:&lt;/h3&gt;  &lt;ul&gt;   &lt;li&gt;&lt;strong&gt;Reliable networking&lt;/strong&gt; is used at the &lt;strong&gt;transport&lt;/strong&gt; layer       &lt;ul&gt;       &lt;li&gt;Reliable networking = using &lt;strong&gt;acknowledgements, sequencing, and flow control&lt;/strong&gt; in the network. &lt;/li&gt;     &lt;/ul&gt;   &lt;/li&gt;    &lt;li&gt;&lt;strong&gt;Segments and reassembles&lt;/strong&gt; data into a data stream from the upper application layer and &lt;strong&gt;unites the information&lt;/strong&gt; into the same data stream for further processing. &lt;/li&gt; &lt;/ul&gt;  &lt;h3&gt;Flow Control&lt;/h3&gt;  &lt;ul&gt;   &lt;li&gt;Flow control &lt;strong&gt;prevents&lt;/strong&gt; a sending host on one side of the connection from &lt;strong&gt;overflowing&lt;/strong&gt; the buffers in the &lt;strong&gt;receiving host.&lt;/strong&gt;       &lt;ul&gt;       &lt;li&gt;an event that can result in data loss &lt;/li&gt;     &lt;/ul&gt;   &lt;/li&gt;    &lt;li&gt;Reliable data &lt;strong&gt;transports&lt;/strong&gt; and &lt;strong&gt;employs a connection oriented communications&lt;/strong&gt; sessions between systems and the protocols involved, to ensure that the following will be achieved:       &lt;ul&gt;       &lt;li&gt;Segments delivered are acknowledged back to the sender upon their reception. &lt;/li&gt;        &lt;li&gt;Any segments not acknowledged are re-transmitted. &lt;/li&gt;        &lt;li&gt;Segments are sequenced back into their proper order upon arrival at their destination. &lt;/li&gt;        &lt;li&gt;A manageable data flow is maintained in order to:          &lt;ul&gt;           &lt;li&gt;&lt;strong&gt;avoid traffic congestion &lt;/strong&gt;&lt;/li&gt;            &lt;li&gt;&lt;strong&gt;overloading &lt;/strong&gt;&lt;/li&gt;            &lt;li&gt;&lt;strong&gt;data loss&lt;/strong&gt; &lt;/li&gt;         &lt;/ul&gt;       &lt;/li&gt;     &lt;/ul&gt;   &lt;/li&gt;    &lt;li&gt;The purpose of flow control is to provide means for the &lt;strong&gt;receiver&lt;/strong&gt; to be able to&lt;strong&gt; govern the out of data &lt;/strong&gt;sent by the sender. &lt;/li&gt; &lt;/ul&gt;  </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Important additional functions of the OSI reference model&amp;#39;s upper layers</title><link>http://ccnacentral.blogspot.com/2010/01/important-additional-functions-of-osi.html</link><category>layers</category><category>osi reference model</category><category>reviews</category><category>upper layers</category><author>noreply@blogger.com (Phillip)</author><pubDate>Thu, 28 Jan 2010 20:28:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-4874567754471274791</guid><description>&lt;h2&gt;&amp;#160;&lt;/h2&gt;  &lt;h3&gt;Application layer&lt;/h3&gt;  &lt;ul&gt;   &lt;li&gt;The application layer &lt;strong&gt;acts as an interface&lt;/strong&gt; between the actual applications programs.       &lt;ul&gt;       &lt;li&gt;Example - Microsoft Word – actually does not reside at the application layer, but instead just interfaces at the application layer protocol, using data presented to it by the presentation layer. &lt;/li&gt;     &lt;/ul&gt;   &lt;/li&gt; &lt;/ul&gt;  &lt;h3&gt;Presentation layer&lt;/h3&gt;  &lt;ul&gt;   &lt;li&gt;The presentation layer &lt;strong&gt;presents data&lt;/strong&gt; to the application layer up top. &lt;/li&gt;    &lt;li&gt;Responsible for &lt;strong&gt;data translation&lt;/strong&gt; and &lt;strong&gt;code formatting.&lt;/strong&gt; &lt;/li&gt;    &lt;li&gt;Acts as a &lt;strong&gt;translator &lt;/strong&gt;that presents and provides &lt;strong&gt;coding and conversion functions&lt;/strong&gt;.       &lt;ul&gt;       &lt;li&gt;Example – EBCDIC to ASCII &lt;/li&gt;     &lt;/ul&gt;   &lt;/li&gt;    &lt;li&gt;Some presentation layer may also involves &lt;strong&gt;multimedia operations&lt;/strong&gt; too. &lt;/li&gt; &lt;/ul&gt;  &lt;h3&gt;Session Layer&lt;/h3&gt;  &lt;ul&gt;   &lt;li&gt;The session layer is responsible for &lt;strong&gt;setting up, managing, and then tearing down&lt;/strong&gt; sessions between layer entities. &lt;/li&gt;    &lt;li&gt;&lt;strong&gt;Coordinates communication&lt;/strong&gt; between systems and serves to &lt;strong&gt;organize&lt;/strong&gt; their communication by offering &lt;strong&gt;THREE&lt;/strong&gt; different modes:       &lt;ul&gt;       &lt;li&gt;Simplex &lt;/li&gt;        &lt;li&gt;Half Duplex &lt;/li&gt;        &lt;li&gt;Full Duplex &lt;/li&gt;     &lt;/ul&gt;   &lt;/li&gt;    &lt;li&gt;Keeps different application data separate from other applications data. &lt;/li&gt; &lt;/ul&gt;  </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>A quick overview of the OSI layers and their functions</title><link>http://ccnacentral.blogspot.com/2010/01/quick-overview-of-osi-layers-and-their.html</link><category>layers</category><category>osi reference model</category><category>reviews</category><author>noreply@blogger.com (Phillip)</author><pubDate>Tue, 26 Jan 2010 03:07:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-3195744443899771675</guid><description>&lt;p&gt;&lt;strong&gt;Applications&lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;file &lt;/li&gt;    &lt;li&gt;print &lt;/li&gt;    &lt;li&gt;message &lt;/li&gt;    &lt;li&gt;database &lt;/li&gt;    &lt;li&gt;application services &lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;strong&gt;Presentations&lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;data encryption &lt;/li&gt;    &lt;li&gt;compression &lt;/li&gt;    &lt;li&gt;translation &lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;strong&gt;Session&lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;dialog control &lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;strong&gt;Transport&lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;end-to-end connection &lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;strong&gt;Network&lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;routing &lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;strong&gt;Data Link&lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;framing &lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;strong&gt;Physical&lt;/strong&gt;&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;physical topology &lt;/li&gt; &lt;/ul&gt;  </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Facts and notes on the OSI reference model bottom layers</title><link>http://ccnacentral.blogspot.com/2010/01/facts-and-notes-on-osi-reference-model_26.html</link><category>layers</category><category>osi reference model</category><category>reviews</category><author>noreply@blogger.com (Phillip)</author><pubDate>Tue, 26 Jan 2010 03:03:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-344350355537518410</guid><description>&lt;h3&gt;The bottom layers of the OSI reference model include&lt;/h3&gt;  &lt;ol&gt;   &lt;li&gt;Transport &lt;/li&gt;    &lt;li&gt;Network &lt;/li&gt;    &lt;li&gt;Data Link &lt;/li&gt;    &lt;li&gt;Physical &lt;/li&gt; &lt;/ol&gt;  &lt;h3&gt;Functions at each of the bottom layers&lt;/h3&gt;  &lt;p&gt;&lt;strong&gt;Transport&lt;/strong&gt;     &lt;br /&gt;- provides reliable or unreliable delivery     &lt;br /&gt;- performs error correction before re-transmit&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Network&lt;/strong&gt;     &lt;br /&gt;- provides logical addressing, which routers use for path information&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Data Link&lt;/strong&gt;     &lt;br /&gt;- combines packets into bytes and bytes into frames     &lt;br /&gt;- provides access to media, using MAC address     &lt;br /&gt;- performs error detection, NOT correction&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Physical&lt;/strong&gt;     &lt;br /&gt;- moves bits between devices     &lt;br /&gt;- specifies voltage, wire speed, and pin-out of cables&lt;/p&gt;  &lt;h3&gt;The following operates at all seven layers of the OSI reference model&lt;/h3&gt;  &lt;ol&gt;   &lt;li&gt;Network Management Stations (NMS) &lt;/li&gt;    &lt;li&gt;Web and application servers &lt;/li&gt;    &lt;li&gt;Gateways (not default gateways) &lt;/li&gt;    &lt;li&gt;Network Hosts &lt;/li&gt; &lt;/ol&gt;  </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Facts and notes on the OSI reference model</title><link>http://ccnacentral.blogspot.com/2010/01/facts-and-notes-on-osi-reference-model.html</link><category>layers</category><category>osi reference model</category><category>reviews</category><author>noreply@blogger.com (Phillip)</author><pubDate>Tue, 26 Jan 2010 02:55:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-351546929931918809</guid><description>&lt;ol&gt;   &lt;li&gt;The OSI reference model has seven layers and is divided into two groups. &lt;/li&gt;    &lt;li&gt;The top three layers define how the applications within the end stations will communicate with each other and with users. &lt;/li&gt;    &lt;li&gt;The bottom four layers define how data is transmitted end to end. &lt;/li&gt; &lt;/ol&gt;  &lt;h3&gt;The upper layers of the OSI reference model include&lt;/h3&gt;  &lt;ol&gt;   &lt;li&gt;Application layer &lt;/li&gt;    &lt;li&gt;Presentation layer &lt;/li&gt;    &lt;li&gt;Session layer &lt;/li&gt; &lt;/ol&gt;  &lt;p&gt;&lt;strong&gt;*Note:&lt;/strong&gt; Users interfaces with computer at the application layer.&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;*Note:&lt;/strong&gt; The upper layers are responsible for applications communications between hosts.&lt;/p&gt;  &lt;h3&gt;Diagram&lt;/h3&gt;  &lt;p&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuza95zFn3uU6R_TUhxgL3BSAvoYafWn5IyUbUgbV5rOx0isH6JablHNvn_h4OuQGSZO60p8W0VPL70XJrLeelUBktKoxpb0EdUddgU3BWVPca-VbIVhsFk1B8B2mtzGjYEqEBtzZuULNI/s1600-h/layersfunction%5B19%5D.jpg" target="_blank"&gt;&lt;img style="border-right-width: 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px" title="layersfunction" border="0" alt="layersfunction" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheBrQL1XEt3z6Uh4kN3v3kKUwa4lmOdt8Fk3kH4N__U08eyE6FcIIa4kpNzinkB51PcOJfUo7IUTSbaOMWp6JOnlud8a3S4o-Xi36XmdbnS-Nv78xGWtVlkgdrCPr82XPeF5Zxe39874Lm/?imgmax=800" width="260" height="250" /&gt;&lt;/a&gt;&lt;/p&gt;  </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheBrQL1XEt3z6Uh4kN3v3kKUwa4lmOdt8Fk3kH4N__U08eyE6FcIIa4kpNzinkB51PcOJfUo7IUTSbaOMWp6JOnlud8a3S4o-Xi36XmdbnS-Nv78xGWtVlkgdrCPr82XPeF5Zxe39874Lm/s72-c?imgmax=800" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Advantages of using an OSI reference model</title><link>http://ccnacentral.blogspot.com/2010/01/advantages-of-using-osi-reference-model.html</link><category>osi reference model</category><category>reviews</category><author>noreply@blogger.com (Phillip)</author><pubDate>Sat, 23 Jan 2010 22:40:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-9139730946007274380</guid><description>&lt;span style="font-size: large"&gt;Advantages of using an OSI model include:&lt;/span&gt;  &lt;br /&gt;  &lt;ol&gt;   &lt;li&gt;Prevents changes in one layer from affecting other layers.&lt;/li&gt;    &lt;li&gt;Divides the network communication process into smaller and simpler components, thus aiding components development, design, and troubleshooting.&lt;/li&gt;    &lt;li&gt;Allows multiple-vendor development through standardization of network components.&lt;/li&gt;    &lt;li&gt;Encourages industry standardization by defining what functions occur at each layer of the model.&lt;/li&gt;    &lt;li&gt;Allows various types of hardware and software to communicate&lt;/li&gt; &lt;/ol&gt;  &lt;br /&gt;*&lt;b&gt;Reference model&lt;/b&gt;: conceptual blueprint of how communications should take place.  &lt;br /&gt;  &lt;br /&gt;*&lt;b&gt;Binding&lt;/b&gt;: communication processes that are related to each other are bounded, or grouped together, at a particular layer.    </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Tips on network, routers, and switches</title><link>http://ccnacentral.blogspot.com/2010/01/tips-on-network-routers-and-switches.html</link><category>network</category><category>reviews</category><category>routers</category><category>switches</category><author>noreply@blogger.com (Phillip)</author><pubDate>Fri, 22 Jan 2010 15:13:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-5946825204585815228</guid><description>1. Plan your network design carefully.  &lt;br /&gt;  &lt;br /&gt;2. Use network bridge in network to reduce collisions within broadcast domains and to increase the number of collision domains in your network.   &lt;br /&gt;  &lt;br /&gt;3. Using hubs can contribute to traffic congestion.  &lt;br /&gt;  &lt;br /&gt;4. Routers break up collision domains as well as broadcast domains.  &lt;br /&gt;  &lt;br /&gt;5. Although bridges/switches are used to segment networks, they WILL NOT isolate broadcast or multicast domains.  &lt;br /&gt;  &lt;br /&gt;6. Even though you have a switched network, you still need a router to provide your inter-VLAN communication or internetworking.    </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>The OSI reference model and it&amp;#39;s seven layers</title><link>http://ccnacentral.blogspot.com/2010/01/osi-reference-model-and-its-seven.html</link><category>essentials</category><category>layers</category><category>reviews</category><author>noreply@blogger.com (Phillip)</author><pubDate>Tue, 12 Jan 2010 21:24:00 -0600</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-617801085656877602.post-2612113902454979196</guid><description>&lt;div style="text-align: left; clear: both" class="separator"&gt;&lt;a style="margin-left: 1em; margin-right: 1em" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQjFsI_wN33KXR6X9C2esgsjQdmOhtcxiWBUtDeLpE7MAGhgJL3lBUgUpqxmzjjFq0CqgJKkFRVD9NjKF7sLLITeZ75demoqQjUp9_fE_GGzLez85K3FUkoMAauQDd2KxYRpIOttiTLLMK/s1600-h/osi_model.jpg" imageanchor="1"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQjFsI_wN33KXR6X9C2esgsjQdmOhtcxiWBUtDeLpE7MAGhgJL3lBUgUpqxmzjjFq0CqgJKkFRVD9NjKF7sLLITeZ75demoqQjUp9_fE_GGzLez85K3FUkoMAauQDd2KxYRpIOttiTLLMK/s320/osi_model.jpg" /&gt;&lt;/a&gt;    &lt;br /&gt;&lt;/div&gt;  &lt;br /&gt;  &lt;br /&gt;The OSI reference model has seven layers:  &lt;br /&gt;  &lt;br /&gt;Application layer (layer 7)  &lt;br /&gt;Presentation layer (layer 6)  &lt;br /&gt;Session layer (layer 5)  &lt;br /&gt;Transport layer (layer 4)  &lt;br /&gt;Network layer (layer 3)  &lt;br /&gt;Data Link layer (layer 2)  &lt;br /&gt;Physical layer (layer 1)  </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQjFsI_wN33KXR6X9C2esgsjQdmOhtcxiWBUtDeLpE7MAGhgJL3lBUgUpqxmzjjFq0CqgJKkFRVD9NjKF7sLLITeZ75demoqQjUp9_fE_GGzLez85K3FUkoMAauQDd2KxYRpIOttiTLLMK/s72-c/osi_model.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>