INTERNET NETWORKING COMPLETE COURSE FOR FREE

EVERYTHING ABOUT NETWORKING

 READ AND WATCH VIDEOS BELOW


There are many meanings of networking, depending upon its use,
all are discussed below, but below videos, the compilation is a complete course on internet networking. 

1-Networking, in general, is the exchange of information and ideas among people with a common profession or special interest, usually in an informal social setting. Networking often begins with a single point of common ground.

Networking is used by professionals to expand their circles of acquaintances, to find out about job opportunities in their fields, and to increase their awareness of news and trends in their fields or in the greater world. (The term computer networking refers to linking multiple devices so that they can readily share information and software resources.)

Networking often begins with a single point of common ground.

KEY TAKEAWAYS

  • Networking is used by professionals to widen their circles of acquaintances, find out about job opportunities, and to increase their awareness of news and trends in their fields.
  • Business owners may network to develop relationships with people and companies they may do business with in the future.
  • Professional networking platforms provide an online location for people to engage with other professionals, join groups, post blogs, and share information.

Understanding Networking

Networking often begins with a single point of common ground. The most obvious is a professional affiliation, such as stock brokers, but some people find effective networking opportunities in a college alumni group, a church or synagogue social group, or a private club.
For professionals, the best networking opportunities may occur at trade shows, seminars, and conferences, which are designed to attract a large crowd of like-minded individuals.
Networking helps a professional keep up with current events in the field, and develops relationships that may boost future business or employment prospects. Needless to say, it also provides opportunities to help other people find jobs, make connections and catch up on the news.

Business Networking

Small business owners network to develop relationships with people and companies they may do business with in the future. These connections help them establish rapport and trust among people in their own communities.
Successful business networking involves regularly following up with contacts to exchange valuable information that may not be readily available outside the network.

Online Networking

Professional networking platforms such as LinkedIn provide an online location for people to engage with other professionals, join groups, post blogs, and share information. And, of course, they provide a place to post a resume that can be seen by prospective employers, to search for jobs, or to identify job candidates.
These days, a business-to-business customer pipeline can be developed almost entirely through the use of a social networking site. Online networking forum allows professionals to demonstrate their knowledge and connect with like-minded people.
LinkedIn is the largest professional network, but there are many others. Some cater to particular subsets of people, such as Black Business Women Online. Others have a different focus, such as MeetUp, which encourages its members to meet in person off-site. Lunchmeet is just what it sounds like: It's a mobile app that identifies folks in your field who are available locally for a meet-up.

UNIQUE VIEW;-   ''Networking is about, working simultaneously for, in, on, a net as a network is like a fishing net which is crafted in a special pattern, having unlimited Pores & corners where something or some information can pass out and something or some information is blocked or trapped in, those corners and threads joining each other and separating one from another to create the difference, making Predictable and unpredictable possibilities''.   

VIDEO LECTURES, A NEW WAY OF EDUCATION AND LEARNING;-

Networking on the Internet here are some great videos about internet networking.


WATCH VIDEOS TO LEARN


Introduction to Networking | Network Fundamentals Part 1


Interested in learning about networking? Let Network Direction help you get started. This video is for people that are first starting out in networking. All you need to bring is interest and enthusiasm. My goal of the network Fundamental Series is to help anyone wanting to get into the IT field learn more about Networking. We will introduce you to the terminology used in the field and help you understand what it means. For instance, have you heard of protocols? We’re going to see what these are, and use the #Ethernet protocol as an example. In Part 1 we'll also look at what a network actually is, and continue by seeing how devices are connected. Have you ever connected a device over Wi-Fi or plugged in Network Cables to a computer? Delve behind the scenes and find out how this works.


Now

Cabling Devices | Network Fundamentals Part 2

Now you know what a network is, it's time to see how they're cabled, and how addresses are used. This video is for people that are first starting out in networking. All you need to bring is interest and enthusiasm. My goal of the network Fundamental Series is to help anyone wanting to get into the IT field learn more about Networking. Have a deeper look into the #Ethernet protocol, as dive into cabling and WiFi. We investigate copper cables, and fibre cables. Full duplex and half duplex. straigh-through and crossover cables. Each section includes a quiz to get you thinking. The answers to the quizzes in this video are found at: https://networkdirection.net/Connecti... If you're studying for CCENT, CCNA, JNCIA, or Network+, this video can help you.


How the OSI Model Works | Network Fundamentals Part 3


The OSI Model Explained Surely you've heard about the #OSI model. That's why you're here right? Well, this is the right place for you! In this video we discuss models, and why they're used. We look into the physical, data link, network, transport, session, presentation, and application layers, and how they relate to the real world. And finally, we look at an example. This shows how a web request flows through each of the layers. For further study, 

I recommend: CCENT/CCNA ICND1 100-105 Official Cert Guide (affiliate) https://click.linksynergy.com/link?id... 
https://networkdirection.net/OSI+Model 
The answers to the quizzes in this video are found at: https://networkdirection.net/Understa... 
In part 4 we'll Look at how IP addresses work Attribution How to write address on the envelope correctly https://www.youtube.com/watch?v=HpBqa... 
The modern postage stamp https://www.youtube.com/watch?v=Fnm0U... Disclaimer This video contains affiliate links. I receive a small commission at no cost to you when you purchase using my link #NetworkDirection #CCNA #CCENT



How IP Addresses Work | Network Fundamentals Part 4

Welcome to the fourth part of the Network Foundation series. This video looks at IP addressing, and how it works. This is critical information for anyone new to networking or studying for CCNA or CCENT exams. We start at the beginning, with what IP’s look like, and why Understanding binary is your friend here! (https://youtu.be/o9BIuMklUWA). Did you know that IP addresses are two addresses in one? Yes, it’s true! An IP includes the host address, as well as the address of the network it resides in. Speaking of networks, we have changed how we address them over time. One of the early methods was to use classes. Perhaps you’ve heard of class A, B, and C networks? But this has its limitations. So, we also have classless networks, or CIDR (Classless Inter-Domain Routing). This introduces a new concept: The subnet mask. Now we can break up networks as we see fit! The next video will take this further, as we look at IP Addresses in Depth. 
The CCENT/CCNA study guide (affiliate): https://click.linksynergy.com/link?id...




IP Addressing in Depth | Network Fundamentals Part 5

You’ve found the fifth part of the Network Foundation series. Time to dive deeper into IP addresses! This is critical information for anyone new to networking, or studying for CCNA or CCENT exams We spoke about CIDR in the last video. We can extend this by using different subnet masks for different purposes. This is called Variable Length Subnet Masks (VLSM), and is something you will use every day. Every network has a few special addresses, like the network and broadcast address. It’s important to know which addresses these are, so you don’t use them incorrectly. As the internet has grown, we have used IP addresses faster than ever. There is a limited pool of IP’s to use, and it is starting to run out! One of the methods used to slow this down is private addressing (as defined in RFC1918). Do you know how this conserves IP addresses? Every device needs an address. But how does it get one? There are two main ways to address devices and one not so usual one… Finally, we’ll look at the IP header that is applied to each packet. See some of the more common fields, and how they’re used.

The CCENT/CCNA study guide (affiliate): https://click.linksynergy.com/link?id...
here is a link to RFC1918. https://tools.ietf.org/html/rfc1918


TCP/IP Model (Internet Protocol Suite) | Network Fundamentals Part 6

You’ve seen the OSI model, now see the TCP/IP model! It started as a competitor but has grown into a suite of commonly used protocols. It has gained popularity over OSI in a practical sense, as it was quick to standardize. The OSI model was slower and missed out. We’re going to look at the four (or is it five?) layers of the TCP/IP model, and see how they contrast to OSI. The answers to the quiz questions, a must for CCENT and CCNA candidates, can be found at:
The CCENT/CCNA study guide (affiliate): https://click.linksynergy.com/link?id...



Overview of this video: 4:31 Application layer 5:32 Transport layer 6:51 Network layer 8:08 Data Link layer 9:33 Physical layer

In the next video, we’re looking at the TCP and UDP protocols, what they’re for, and how they’re different.


How TCP and UDP Work | Network Fundamentals Part 7

TCP and UDP are the transport layer protocols that are used to get data from one application to another. They have several common features, like port numbers (the network address of the application), headers, and multiplexing (allowing more than one application to access the network at a time). But, they also have several differences. For example, TCP is connection-oriented, while UDP is connectionless. TCP is ‘reliable’ while UDP is ‘unreliable’. But if TCP has more features, why use UDP at all? The answer may surprise you! 
The answers to the quiz questions, a must for CCENT and CCNA candidates, can be found at: https://networkdirection.net/labsandq... 
The CCENT/CCNA study guide (affiliate): https://click.linksynergy.com/link?id... 


Overview of this video: 0:22 Ports 0:58 TCP and UDP headers 1:48 Selecting Port Numbers 2:58 Multiplexing 3:47 Sockets 5:04 Connections in Windows 6:06 Quiz 1 and 2 6:39 Comparing TCP and UDP 8:59 Why use UDP? 10:19 Quiz 3, 4, and 5

In the next video, we’re looking how TCP establishes connections, sometimes called the ‘three-way handshake’


Establishing Connections With TCP's Three-Way Handshake | Network Fundamentals Part 8

Establishing Connections With TCP's Three Way Handshake | Network Fundamentals Part 8 TCP is connection-oriented, while UDP is connectionless. TCP achieves this with a process called the three-way handshake. This is three messages between the client and server, which use the SYN and ACK flags in the TCP header. There is a corresponding process when closing the connections. This time the FIN flag in the header comes into play. And in other cases, the RST flag is used. This is in the case of an error, which can help with troubleshooting. 

The answers to the quiz questions, a must for CCENT and CCNA candidates can be found at: https://networkdirection.net/labsandq... 
The CCENT/CCNA study guide (affiliate): https://click.linksynergy.com/link?id... 

  

Overview of this video:

0:17 Connections and Connectionless 0:55 Three-Way Handshake 3:16 Quiz #1-2 3:31 Closing Connections 5:55 Quiz #3-4

In the next video, we’re looking how TCP manages errors, and how it uses a process called ‘windowing’

How TCP Handles Errors And Uses Windows | Network Fundamentals Part 9

TCP doesn’t detect errors; That’s layer-2’s job. But it does notice when data is missing, and it is able to retransmit segments as needed. It does this by using the ACK flag in the TCP header. The ACK flag acknowledges when segments arrive correctly. To improve efficiency, a range of segments can be acknowledged at once. The amount of data that can be acknowledged at a single time is called the window size. When a network link is stable, the window size can increase, allowing more data to be sent per acknowledgment. If the link is unstable, the window size shrinks, which lowers the number of retransmissions. Windowing is TCP’s flow control.

The answers to the quiz questions, a must for CCENT and CCNA candidates, can be found at: https://networkdirection.net/labsandq... The CCENT/CCNA study guide (affiliate): https://click.linksynergy.com/link?id...

Overview of this video: 0:19 Data Loss 0:50 Acknowledgements 2:52 Windowing 4:27 Quiz #1-2 4:44 Error Recovery 6:05 Dynamic Windows 8:51 Quiz #3-4
In the next video, we’re finally going to see the first steps in configuring a router or switch.

Cisco CLI for Beginners | Network Fundamentals Part 10

You’ve been following on for a while, and now it’s time to get your keys dirty by starting Cisco router or switch configuration! Routers and switches come in different sizes and shapes depending on how they’re used. You might have a devices suited to SOHO, enterprise, or service provider spaces. The thing that’s usually common to all these, is that you can configure them using the CLI (Command Line Interface) In this video we’ll start by looking at a router physically. You’ll see the console ports (both USB and serial), the data ports, the AUX port, module slots, and single/dual power supplies. Next, we’ll see how to use a terminal emulator called Putty to connect to the router using a USB Serial Adapter. From here you’ll see user exec mode, global exec mode (AKA privileged exec mode) and configuration mode. While we’re here, we’ll configure an interface with an IP address, and configure remote access to the router (using SSH). Finally, we’ll talk about lab options, including physical equipment, GNS3, packet tracer, VIRL and EVEng. 

Lab options: https://www.netacad.com/courses/packe... 
The CCENT/CCNA study guide (affiliate): https://click.linksynergy.com/link?id... 


Overview of this video: 0:52 Physical Overview 5:05 Connecting to the router 8:19 Getting used to the CLI 12:50 Configuring an Interface 17:15 Remote Access 25:11 Running Config and Filesystem 28:08 Lab Options

In the next video, we’re starting to get deeper, by starting switching!

How Switching Works | Network Fundamentals Part 11

Welcome to the start of switching! Communication is not new, not even electronic communication. In the old days, to make a telephone call, a switchboard operator needed to patch though your call. This means that they had to manually create a path for your phone call to take. Switching is a lot like this. Switching dynamically creates paths for network traffic to flow through. But it doesn’t do this all on its own. Ethernet, a protocol that operates at layer 2, is critical to how this works. Each device that uses ethernet has a MAC address. Frames are sent from one MAC address to another. Clever devices like bridges and hubs learn these addresses, and can make better decisions about how traffic is handled because of this knowledge. It wasn’t always this way though. In the early days we had bus and ring networks, and eventually hubs. These did not have any intelligence, and operated solely at layer 1. They were also only half-duplex, and had to handle collisions. In this video, we walk through the past, and see how it affects the switching networks that we have today. 

Finally we’ll go through a lab to see it all in action. 
The CCENT/CCNA study guide (affiliate): https://click.linksynergy.com/link?id... 

Overview of this video: 2:22 Ethernet 7:31 Adding Hubs 11:16 Improving with Bridges 16:58 Introducing Switches 21:02 Lab Time Vintage footage from: https://youtu.be/H-KUat5WEkU https://www.youtube.com/watch?v=qsty1... https://youtu.be/PsPLnp3y3ho

In the next video, we’re taking it further with VLANs


How VLANs Work | Network Fundamentals Part 12

VLANs are one of the most common technologies that you will see. Imagine that you have a LAN (a layer-2 broadcast domain), but you need to separate the devices connected to it. You could buy different switches for each group of devices, but a better option would be to use VLANs. VLANs are a Virtual LAN. You have a physical switch, and the ports are assigned to a VLAN. Devices in one VLAN cannot talk to devices in another VLAN. This is like using different switches, without having to go out and buy different switches! Each VLAN has an ID, which ranges from 1 to 4094. Each switch port is assigned to one of these ports. Any ports with the same VLAN ID are in the same VLAN, which means they are in the same network. As said before, devices in one VLAN cannot communicate with devices in another VLAN. To allow communication, we can use a router that is connected to both VLANs. The router receives traffic on one VLAN, and passes it to the other VLAN. We will see how all of this works, and how it’s configured! 

Patreon information: https://networkdirection.net/patreon/
CCENT/CCNA ICND1 100-105 Official Cert Guide (affiliate): https://click.linksynergy.com/link?id... 




Overview of this video: 0:40 Why we need VLANs 3:00 How VLANs Work 7:52 Routing between VLANs 10:32 Quiz Time 10:47 Lab

In the next video, we’re looking to extend our VLANs across several devices using trunking, or tagging.

VLAN Trunk Links | Network Fundamentals Part 13

We’ve seen that VLANs can divide up a switch into separate logical networks. But what happens when we run out of ports? We need to buy a new switch. But how do we connect the two switches in a VLAN-aware network? Do we need a separate link for each VLAN? That could work, but won’t scale well. What if we have 50 VLANs? Instead, we can use a trunk link. This uses a process called tagging, where the VLAN ID is added to each frame, in the form of a small tag in the ethernet header. Now a single link can be used between the switches, and traffic from different VLANs can pass over it, all while still keeping the traffic separate. There are a few special VLANs which work with this. One of these is VLAN 1, which is used for switch-to-switch control traffic (for example, CDP or LLDP). Another is the native VLAN, which enables non-VLAN aware devices to connect. Trunking also enables extra features, like Router On A Stick, or ROAS. This is where a router can connect to the network using a single trunk link, and forward traffic between VLANs. 

See how all of this works in this video! 
CCENT/CCNA ICND1 100-105 Official Cert Guide (affiliate): https://click.linksynergy.com/link?id... 


Overview of this video: 0:33 Extending VLANs Across Switches 1:38 How Trunking Works 6:12 Voice VLANs 7:49 Lab (Part 1) 14:14 Quiz #1 14:25 VLAN 1 15:36 Native VLAN 16:30 Lab (Part 2) 21:39 Quiz #2 23:51 ROAS and Lab (Part 3)

In the next video, we’re investigating using a router to provide security using access-lists


Understanding Access Control Lists | Network Fundamentals Part 14


ACLs, or Access Control Lists, are one of the fundamental ways to control or influence the traffic flowing through your network. They can be used in several different ways, but in this video, we’ll look at how to use ACLs as a packet filter. Packet filters use ACL’s to control traffic that is and is not allowed through the network. An ACL is, as the name suggests, a list containing Access Control Entries (or ACE). Each entry is a rule, with ‘match’ conditions. If traffic matches these conditions, then an action (permit or deny) is applied. Standard ACL’s are the original type, and can only match based on source address. Extended ACLs are newer can match on a variety of criteria. There are several ways that ACLs can be configured. Numbered ACLs, is where each entry in the ACL is identified by a number. Named ACLs are more advanced, and group the entries inside a container. This video contains a lab, where you can see how to configure all these options. 

Cisco Learning Network: https://learningnetwork.cisco.com/wel... 
Patreon information: https://networkdirection.net/patreon/ 
CCENT/CCNA ICND1 100-105 Official Cert Guide (affiliate): https://click.linksynergy.com/link?id...



Overview of this video: 0:28 What are ACL’s For? 1:00 Anatomy of an ACL 3:11 Wildcard Masks 5:45 Quiz Time 5:55 Types of ACLs 7:49 Applying ACLs 9:32 Quiz Time 9:42 Lab 20:48 Quiz Time 21:02 What about Firewalls?

In the next few videos, we’re going to have a look at ARP, DHCP, and DNS.


What ARP does | Network Fundamentals Part 15

What ARP does | Network Fundamentals Part 15 ARP, or Address Resolution Protocol, provides IP to MAC address mapping services. It works by using two messages, the request, and reply. When a host needs to know the MAC that belongs to an IP, it will broadcast the request message. The device that owns the IP will reply (unicast) with its MAC address. Any other host that gets the message will discard it. Once the reply has been received, the IP to MAC mapping will be stored in the ARP cache, to make the process faster next time. But if the entry is not used, it will eventually be removed from the cache. Also of use is GARP, which a host will use to preemptively notify the local network of its IP and MAC address. This increases efficiency.

CCENT/CCNA ICND1 100-105 Official Cert Guide (affiliate): https://click.linksynergy.com/link?id...

Overview of this video: 0:26 What does ARP Do? 1:32 How Does ARP Work? 2:20 ARP Cache 3:40 RARP and GARP

In the next few videos, we’re going to have a look at DHCP and DNS.


What DHCP is all About | Network Fundamentals Part 16

DHCP, or Dynamic Host Control Protocol, is used to dynamically assign IP addresses, and other information called options, to network devices. As devices startup (and at some other times) they broadcast a DISCOVER message, which is seen by the DHCP server. The DHCP server finds an available IP address and sends it back in an OFFER message. The client will see this, and maybe more OFFERs, and choose one. It will send a REQUEST message to the server, which will confirm the IP allocation with an ACKNOWLEDGE message. When IP’s are assigned to devices, they’re given a lease. This is the time they’re valid for. When 50% of a lease expires, the client will try to renew the lease. It will often get the same IP that it had, but there is no guarantee and may get something else. As DISCOVER messages are broadcasted, they only reach the local LAN segment. To extend DHCP services beyond the local segment, we can configure a DHCP relay on a router or switch. This can intercept the DISCOVER message and forward it to the server.

Quiz: link: https://networkdirection.net/labsandq... Lab Link: https://networkdirection.net/labsandq... Patreon information: https://networkdirection.net/patreon/
For more information on the DHCP frame format, I highly recommend https://www.netmanias.com/en/post/tec...


  
Overview of this video: 0:32 The DHCP Process 3:08 Leases 5:02 Options 6:09 Quiz 1 6:20 DHCP Relays 7:50 Lab 15:39 Quiz 2

In the next video, we’re going to have a look at DNS.



Getting Started with Domain Name System (DNS) | Network Fundamentals Part 17

The Domain Name System (DNS) is the elegant system used for, among other things, resolving a name to an IP address. Think about when you put a web address into a web browser. That needs to be converted to an IP address, so the client will send the DNS server a lookup message, and the DNS server will send a response. DNS servers contain zones, which is a container for all the information for a domain. If a DNS server has a zone for a domain, it is authoritative for that domain. If it is non-authoritative, it can make its own query, and send it to another DNS server. Inside the zone are records. These contain the information such as name to IP mappings. This particular type is called a host or ‘A’ record. Other types include a pointer (PTR), which is the reverse of the host record, the canonical name (CNAME), which is an alias, and the Mail Exchange (MX) record, which holds a list of mail servers. When a server can’t answer a request on its own, it needs to ask another DNS server for help. One option is to configure another server as a forwarder. The server performs a recursive query, where it finds a record on the client’s behalf. The alternative is to use root hints, where the server asks other servers for hints about where the authoritative DNS server is located. It does this using recursive queries

Quiz: link: https://networkdirection.net/labsandq... Patreon information: https://networkdirection.net/patreon/
For more information on the DNS process, I highly recommend: https://www.cloudflare.com/learning/d...



Overview of this video: 0:36 The Domain Name Space 2:10 Zones and Records 4:32 Record Types 6:10 A Simple Lookup Process 9:31 Using Forwarders 10:58 Using Root Hints 12:58 Quiz


Static route configuration | Network Fundamentals Part 18

Anyone who’s interested in networking should be interested in routing. It’s one of the core functions that we need to work with. ‘Routing’ is how a router (or multi-layer switch) will forward packets through the network. The router will build a routing table, where it puts routes. A route is a pointer to a network. It says ‘for this network, send traffic this way…’ Each router has a routing table, and each router needs to make its own decisions around how packets should be forwarded. These decisions will depend on the contents of the routing table. One of the ways we can ‘populate’ the routing table is to configure static routes. These are configured with the ‘ip route’ command. Another way is to use dynamic routing, which is covered in the next video. Just like PC’s, routers can have a default gateway, also known as a ‘gateway of last resort’. This is a ‘catch-all’ route that is used to forward traffic that doesn’t match any other more specific rule. Be sure to check out the labs (links below) if you want to try this out yourself.
Overview of this video: Quiz Link: https://networkdirection.net/labsandq... Lab Challenge 1: https://networkdirection.net/labsandq... Lab Challenge 2: https://networkdirection.net/labsandq..
(Affiliate Link) CCNA 200-301 Official Guide (Volume 1): https://click.linksynergy.com/link?id...

(Affiliate Link) CCNA 200-301 Official Guide (Volume 2): https://click.linksynergy.com/link?id...
Patreon information: https://networkdirection.net/patreon/


  

0:23 Definition of Routing 1:06 The Routing Table 3:35 Static Routes 6:17 Return Routes 9:35 Packet Flow 11:03 Default Route 13:00 Labs


Routing Protocols and Traffic Forwarding | Network Fundamentals Part 19

Ready to continue your routing journey? Surely you’ve noticed that it can be a pain to configure static routes all the time. It takes forever, they’re difficult to troubleshoot, they don’t adapt to network changes very well, and it’s easy to make a typo. The alternative is dynamic routing. Dynamic routing protocols, such as RIP, EIGRP, OSPF, and BGP help us as they’re more aware of what’s going on. For example, if there’s a fault, they are able to route traffic along a different path. We’ll be diving into RIP in the next video, but before we do that, you need to understand a few rules that routers follow. The first is called Longest Prefix Match (LPM). This states that if the destination IP address matches more than one route in the routing table, the route with the longest subnet mask will be chosen. The second is Administrative Distance (AD). Each source of routing information has an AD value assigned to it. So, if a route is learned from more than one source (for example, RIP and OSPF), the router will look at the administrative distance of both protocols, then it will decide that it prefers OSPF more, and put that route into the routing table. We can manipulate administrative distance in some cases. We can create static routes with different AD’s, in order for them to become floating static routes. If the primary route (wherever it’s learned from) is lost, the floating static route can take its place.

Quiz Link: https://networkdirection.net/labsandq... Lab Challenge: https://networkdirection.net/labsandq...
(Affiliate Link) CCNA 200-301 Official Guide (Volume 1): https://click.linksynergy.com/link?id...

(Affiliate Link) CCNA 200-301 Official Guide (Volume 2): https://click.linksynergy.com/link?id...
Patreon information: https://networkdirection.net/patreon/


Overview of this video: 0:32 Dynamic Routing Protocols 2:06 Longest Prefix Match (LPM) 4:43 Administrative Distance (AD) 6:30 Floating Static Routes 8:00 Labs


How RIP Works | Network Fundamentals Part 20

Time to see some dynamic routing in action! We’re going to start with RIP, or Routing Information Protocol. It’s a simple protocol that’s been around for a long time. RIP is a type of Distance Vector Routing Protocol. This has a different approach to a Link State Protocol like OSPF. While Link State protocols have each router build a full map of the network, Distance Vector protocols are more concerned with just the next hop. They have ‘sign posts’ pointing the way. To run RIP, the process must be started with ‘router rip’. This is also where most RIP configuration goes. This includes ‘version 2’, to limit the router to RIPv2 only, ‘no auto-summary’ to prevent automatic summarization to classful boundaries, and network statements to enable RIP on interfaces, and to advertise their connected routes. If we don’t want RIP running on all interfaces, we can use ‘passive-interface’ or ‘passive-interface default’ to stop the updates being sent and received, while still allowing connected routes to be advertised. Of course, we could also consider authentication between neighbours. We can configure this using MD5, which uses an encrypted password. Each dynamic routing protocol uses a metric. This is a way to measure how good a link is. The routing protocol will use this metric to decide which path is best. RIP uses hop count as its metric. It’s important to prevent routing loops. Distance Vector protocols do this by using the ‘split horizon’ rule. This prevents a router from sending an update for a network out an interface that the network update was received on. If there are bad networks, RIP can ‘poison’ the route by setting the metric to 16. 16 hops is invalid in RIP terms. This causes other routers to know that this route is bad and shouldn’t be used. If a router or a network fails, the network needs to ‘converge’. Convergence is the process that routers go through to find alternative paths during a failure, or to add new paths when new networks come online. We want convergence to be as quick as possible. And we shouldn’t forget the default route. Rather than configure a static route everywhere, we can get RIP to share the default route with the rest of the network. Be sure to try the labs, they will be worth your time!

Quiz Link: https://networkdirection.net/labsandq... Lab Challenge 1: https://networkdirection.net/labsandq... Lab Challenge 2: https://networkdirection.net/labsandq.. (Affiliate Link) CCNA 200-301 Official Guide (Volume 1): https://click.linksynergy.com/link?id... (Affiliate Link) CCNA 200-301 Official Guide (Volume 2): https://click.linksynergy.com/link?id... Patreon information: https://networkdirection.net/patreon/

  
Overview of this video: 0:21 RIP Basics 1:19 Distance Vector and Link State 2:56 RIP Configuration 10:18 Passive Interfaces and Authentication 14:26 Metrics 17:12 Split Horizon and Route Poisoning 19:40 Convergence 22:36 Default Route Distribution 23:40 Labs


How to Use NAT | Network Fundamentals (Part 21)

We have a lot of private IP address in our networks. But, we can only use public IP addresses on the internet. So how can our privately-addressed devices access the publicly-addressed internet? With a technology called Network Address Translation, or NAT. NAT has the ability to rewrite the source and/or destination IP address in the IP header. A complimentary technology called Port Address Translation (PAT) can change the source and destination ports in a TCP or UDP header. A NAT can by static or dynamic. A static NAT will match an original IP with the same translated IP every time. Dynamic NAT on the other hand, will use a different mapping each time. Sometimes we don’t have enough public IP’s to map to, so we will need to use a different aspect of NAT, called port overloading. This is sometimes called masquerading. Port overloading lets us assign a different port number to each translation, so we can conserve the number of public IP’s that we’re using. A key concept in NAT is understanding where the traffic starts from. Is it starting within the network, and heading out? Or is is starting somewhere on the internet, and heading into our network. This makes it easier to understand bidirectional and unidirectional NAT. Be sure to check out the labs (links below) if you want to try this out yourself.

Quiz Link: https://networkdirection.net/labsandq... Lab Challenge 1: https://networkdirection.net/labsandq... Extra reading: https://www.ciscozine.com/nat-virtual... (Affiliate Link) CCNA 200-301 Official Guide (Volume 1): https://click.linksynergy.com/link?id... (Affiliate Link) CCNA 200-301 Official Guide (Volume 2): https://click.linksynergy.com/link?id... Patreon information: https://networkdirection.net/patreon/


Overview of this video: 0:27 What is NAT? 1:41 How NAT Works 5:07 Configuring Static NAT 9:24 Configuring Dynamic NAT 13:15 Port Address Translation 16:20 Port Overload


Does Network Time Really Matter? | Network Fundamentals Part 22

Does it matter if our routers, switches, and other devices on the network have the correct time and date? Why, yes it does! Think of logging and troubleshooting, which makes use of timestamps. Think of security applications like Kerberos and certificates. And think of scheduling events. We can configure time manually on each router or switch. Unfortunately this is time consuming, and often inaccurate. So, we have an alternative, called Network Time Protocol, or NTP. NTP servers provide the correct time to NTP clients on request. NTP servers are organised into layers called stratum. Each stratum of NTP servers acts as a client to synchronize their time and date with a server in the stratum above. We can configure clients to use a local NTP server in our network (perhaps a Domain Controller), or we can configure them to use a server on the internet (perhaps from pool.ntp.org). We can even select a preferred NTP server, and have others configured as backups. Synchronizing can take a while on the first attempt (perhaps 10 minutes), so you will need to be patient!

Quiz Link: https://networkdirection.net/labsandq... (Affiliate Link) CCNA 200-301 Official Guide (Volume 1): https://click.linksynergy.com/link?id... (Affiliate Link) CCNA 200-301 Official Guide (Volume 2): https://click.linksynergy.com/link?id... Patreon information: https://networkdirection.net/patreon/

Overview of this video: 0:22 Why Does Time Matter? 1:32 Local Time Sources 3:07 How NTP Works 5:19 Configuring NTP


Sending Logs to a Syslog Server | Network Fundamentals Part 23

Your devices are constantly working, and constantly generating events. These events are marked with logs. Where do these logs go? Some of them will stay on the local device, but in a well maintained network, we can also send out logs to a syslog server. Putting all our logs in one place will help us to correlate problems across many devices. Syslog is a well known format for logging. Lots of devices can use them. There are two important aspects; Facilities and severity levels. A facility represents the process that generates the log. The severity level refers to how important a log is. There are eight levels, named emergency, alert, critical, error, warning, notification, information, and debug. Debug logs are benign while emergency logs are very important. To help remember the levels, think of the mnemonic Every Awesome Cisco Engineer Will Need Icecream Daily.

Quiz Link: https://networkdirection.net/labsandq... Lab Link: https://networkdirection.net/labsandq... Kiwi Syslog Server: https://www.kiwisyslog.com/free-tools... (Affiliate Link) CCNA 200-301 Official Guide (Volume 1): https://click.linksynergy.com/link?id... (Affiliate Link) CCNA 200-301 Official Guide (Volume 2): https://click.linksynergy.com/link?id... Patreon information: https://networkdirection.net/patreon/



Overview of this video: 0:14 Logging Overview 1:32 Syslog Levels and Facilities 4:09 A Simple Syslog Server 4:43 Syslog Configuration

How SNMP Works | Network Fundamentals Part 24

We can manage proactively, and we can manage reactively. SNMP is a protocol that can help us with both. A management server will use SNMP polling to collect information from devices on our network. This builds charts and dashboards to help us evaluate the health of our network. If a device has a problem, it may even send an SNMP trap to the management server. The server can then take an appropriate action, like alert us. SNMP information is stored in a hierarchical structure called a MIB (Management Information Base). This is a collection of objects called OIDs (Object Identifiers). These describe the information that can be collected from devices, and how to interpret it. When a poll is sent, the server will also specify a community string. This string is a simple form of authentication. Unfortunately, it is stored in plan-text, both in the message and in the configuration. There are three versions of SNMP. v1 came first, and v2 extended this by adding support for 64-bit counters. v3 added real authentication and encryption. v3 is recommended in most cases.

Quiz Link: https://networkdirection.net/labsandq... Lab Link: https://networkdirection.net/labsandq... SNMP Tester: https://www.paessler.com/tools/snmpte... (Affiliate Link) CCNA 200-301 Official Guide (Volume 1): https://click.linksynergy.com/link?id... (Affiliate Link) CCNA 200-301 Official Guide (Volume 2): https://click.linksynergy.com/link?id... Patreon information: https://networkdirection.net/patreon/

Overview of this video: 0:56 Polling and Traps 3:05 MIBs and OIDs 5:06 Community Strings 6:29 Versions 8:12 Configuration


Encryption Basics | Public Key Encryption | SSL

Learn how to keep your Network secure by understanding the basics of Public Key Encryption, SSL and Cipher Suites. This video is for you! There’s symmetric cryptography, and asymmetric cryptography (Also called public key encryption). And they work in different ways. Symmetric uses keys that are shared with all parties that need to encrypt and decrypt the information. Sharing the keys among everyone can be tricky to do securely. On the other hand, asymmetric encryption is completely different. This uses a pair of keys, public and private, which are always used together. Either can encrypt, but the other is used to decrypt. The problem is that this is a very slow process. Good thing we can combine the two to get the best of both worlds. We can use public key encryption to generate and share private keys (as well as perform authentication), and then we can use these keys with a symmetric cipher for the bulk of the secret information. These ciphers, along with a security protocol (like SSL, TLS, Kerberos, IPSec), a mode of operation, and a hashing algorithm, make up a cipher suite. But it’s probably easier to understand with an example, such as an HTTPS connection between a client and a web server. The client and server will send a ‘client hello’ and ‘server hello’ message, which includes random numbers, suitable cipher suites, and the server’s certificate. If they agree to proceed, the client can then generate the pre-master key, encrypt it with the servers' public key, and send it. Both sides can then use their three numbers to generate session keys, which are used with the symmetric cipher for the bulk of encryption. But any of these ciphers can be found to be insecure in the future. There are a few tricks to learn to keep your systems secure...


Overview of this video: 0:26 Symmetric vs Asymmetric (public key encryption) 3:36 Security Protocols and Cipher Suites 6:23 An SSL Connection 9:07 Staying Secure


Encryption Basics | Cryptography

In modern cryptography, ciphers are algorithms that explain the process to encrypt and decrypt our information. Learn more about Cryptography and Encryption Basics in this video. There are many ciphers out there, including AES, DES, 3DES, SSL, TLS, RC4, and more. When you’re thinking about encryption, you’re likely thinking of symmetric encryption. This is where a key is used to encrypt, and the same key is used for decryption. So, as you can imagine, the larger the key, the harder it is to break encryption. And some of they keys we use today are massive! These ciphers may be stream ciphers, or block ciphers. Block ciphers are more common these days. While stream ciphers create a large value called the One Time Pad, and encrypt the entire piece of information at once, block ciphers first break the information into fixed sized blocks. Once the data is broken into blocks, they are each encrypted one at a time. The way this is done is called the mode of operation, and some modes are more secure than others. These include ECB, CBC, GCM, and others. But let’s not forget that there are other types of encryption. For example, hashing algorithms work in one direction only (that is, they are non-reversible), and they don’t require a key. What’s the point of that? They can be used to create a unique value to represent a piece of information, which in itself has some very interesting uses.

(Affiliate Link) Network Security book: https://click.linksynergy.com/link?id... Patreon information: https://networkdirection.net/patreon/

Overview of this video: 0:27 What are Ciphers? 1:30 Key Size 4:41 Stream Ciphers 7:18 Block Ciphers 9:52 Hashing


What Is Cryptography | Encryption Basics

We’re not all security experts, but we still need to be aware of security itself, in order to protect ourselves in the digital age. So, welcome to the Basics of Encryption (Part 1), where we get a very gentle introduction into the world of cryptography. If you want to know what is cryptography, then this video is for you! Cryptography / Encryption has been around for years. Consider the Caesar Cipher and Enigma, both forms of substitution cipher. These were used during wartime to convert plain text to cipher text, without enemy forces understanding the original message. And although old, both of these forms of encryption help us to gain an understanding into modern encryption. These days encryption is more complicated, using prime numbers to create keys that are near impossible to guess, and too hard to compute. That is of course, if you use them correctly...



Overview of this video: 0:56 The Caesar Cipher 3:32 The Enigma Machine 6:58 Encryption Today 8:13 What Makes Encryption Possible?


No comments:

Post a Comment

Note: only a member of this blog may post a comment.