EVERYTHING ABOUT NETWORKING
READ AND WATCH VIDEOS BELOW
all are discussed below, but below videos, the compilation is a complete course on internet networking.
1-Networking, in general, is the exchange of information and ideas among people with a common profession or special interest, usually in an informal social setting. Networking often begins with a single point of common ground.
Networking is used by professionals to expand their circles of acquaintances, to find out about job opportunities in their fields, and to increase their awareness of news and trends in their fields or in the greater world. (The term computer networking refers to linking multiple devices so that they can readily share information and software resources.)
Networking often begins with a single point of common ground.
KEY TAKEAWAYS
- Networking is used by professionals to widen their circles of acquaintances, find out about job opportunities, and to increase their awareness of news and trends in their fields.
- Business owners may network to develop relationships with people and companies they may do business with in the future.
- Professional networking platforms provide an online location for people to engage with other professionals, join groups, post blogs, and share information.
Understanding Networking
Networking often begins with a single point of common ground. The most obvious is a professional affiliation, such as stock brokers, but some people find effective networking opportunities in a college alumni group, a church or synagogue social group, or a private club.
For professionals, the best networking opportunities may occur at trade shows, seminars, and conferences, which are designed to attract a large crowd of like-minded individuals.
Networking helps a professional keep up with current events in the field, and develops relationships that may boost future business or employment prospects. Needless to say, it also provides opportunities to help other people find jobs, make connections and catch up on the news.
Business Networking
Small business owners network to develop relationships with people and companies they may do business with in the future. These connections help them establish rapport and trust among people in their own communities.
Successful business networking involves regularly following up with contacts to exchange valuable information that may not be readily available outside the network.
Online Networking
Professional networking platforms such as LinkedIn provide an online location for people to engage with other professionals, join groups, post blogs, and share information. And, of course, they provide a place to post a resume that can be seen by prospective employers, to search for jobs, or to identify job candidates.
These days, a business-to-business customer pipeline can be developed almost entirely through the use of a social networking site. Online networking forum allows professionals to demonstrate their knowledge and connect with like-minded people.
LinkedIn is the largest professional network, but there are many others. Some cater to particular subsets of people, such as Black Business Women Online. Others have a different focus, such as MeetUp, which encourages its members to meet in person off-site. Lunchmeet is just what it sounds like: It's a mobile app that identifies folks in your field who are available locally for a meet-up.
Related Terms
UNIQUE VIEW;- ''Networking is about, working simultaneously for, in, on, a net as a network is like a fishing net which is crafted in a special pattern, having unlimited Pores & corners where something or some information can pass out and something or some information is blocked or trapped in, those corners and threads joining each other and separating one from another to create the difference, making Predictable and unpredictable possibilities''.
VIDEO LECTURES, A NEW WAY OF EDUCATION AND LEARNING;-
Networking on the Internet here are some great videos about internet networking.
The CCENT/CCNA study guide (affiliate): https://click.linksynergy.com/link?id...
Overview of this video:
4:31 Application layer
5:32 Transport layer
6:51 Network layer
8:08 Data Link layer
9:33 Physical layer
VIDEO LECTURES, A NEW WAY OF EDUCATION AND LEARNING;-
Networking on the Internet here are some great videos about internet networking.
WATCH VIDEOS TO LEARN
Introduction to Networking | Network Fundamentals Part 1
Interested in learning about networking? Let
Network Direction help you get started. This video is for people that are first
starting out in networking. All you need to bring is interest and enthusiasm.
My goal of the network Fundamental Series is to help anyone wanting to get into
the IT field learn more about Networking. We will introduce you to the
terminology used in the field and help you understand what it means. For
instance, have you heard of protocols? We’re going to see what these are, and
use the #Ethernet protocol as an example. In Part 1 we'll also look at what a network
actually is, and continue by seeing how devices are connected. Have you ever
connected a device over Wi-Fi or plugged in Network Cables to a computer? Delve
behind the scenes and find out how this works.
Now
Cabling Devices | Network Fundamentals Part 2
Now you know
what a network is, it's time to see how they're cabled, and how addresses are
used. This video is for people that are first starting out in networking. All
you need to bring is interest and enthusiasm. My goal of the network
Fundamental Series is to help anyone wanting to get into the IT field learn
more about Networking. Have a deeper look into the #Ethernet
protocol, as dive into cabling and WiFi. We investigate copper cables, and
fibre cables. Full duplex and half duplex. straigh-through and crossover
cables. Each section includes a quiz to get you thinking. The answers to the
quizzes in this video are found at: https://networkdirection.net/Connecti... If you're studying
for CCENT, CCNA, JNCIA, or Network+, this video can help you.
How the OSI Model Works | Network Fundamentals Part 3
The OSI Model Explained Surely you've heard
about the #OSI
model. That's why you're here right? Well, this is the right place for you! In
this video we discuss models, and why they're used. We look into the physical,
data link, network, transport, session, presentation, and application layers,
and how they relate to the real world. And finally, we look at an example. This
shows how a web request flows through each of the layers. For further study,
I recommend: CCENT/CCNA ICND1 100-105 Official Cert Guide (affiliate) https://click.linksynergy.com/link?id...
https://networkdirection.net/OSI+Model
The answers to the quizzes in this video are found at: https://networkdirection.net/Understa...
In part 4 we'll Look at how IP addresses work Attribution How to write address on the envelope correctly https://www.youtube.com/watch?v=HpBqa...
The modern postage stamp https://www.youtube.com/watch?v=Fnm0U... Disclaimer This video contains affiliate links. I receive a small commission at no cost to you when you purchase using my link #NetworkDirection #CCNA #CCENT
I recommend: CCENT/CCNA ICND1 100-105 Official Cert Guide (affiliate) https://click.linksynergy.com/link?id...
https://networkdirection.net/OSI+Model
The answers to the quizzes in this video are found at: https://networkdirection.net/Understa...
In part 4 we'll Look at how IP addresses work Attribution How to write address on the envelope correctly https://www.youtube.com/watch?v=HpBqa...
The modern postage stamp https://www.youtube.com/watch?v=Fnm0U... Disclaimer This video contains affiliate links. I receive a small commission at no cost to you when you purchase using my link #NetworkDirection #CCNA #CCENT
How IP Addresses Work | Network Fundamentals Part 4
Welcome to the fourth part of the Network
Foundation series. This video looks at IP addressing, and how it works. This is
critical information for anyone new to networking or studying for CCNA or
CCENT exams. We start at the beginning, with what IP’s look like, and why Understanding binary is your friend here! (https://youtu.be/o9BIuMklUWA).
Did you know that IP addresses are two addresses in one? Yes, it’s true! An IP
includes the host address, as well as the address of the network it resides in.
Speaking of networks, we have changed how we address them over time. One of the
early methods was to use classes. Perhaps you’ve heard of class A, B, and C
networks? But this has its limitations. So, we also have classless networks, or
CIDR (Classless Inter-Domain Routing). This introduces a new concept: The
subnet mask. Now we can break up networks as we see fit! The next video will
take this further, as we look at IP Addresses in Depth.
The CCENT/CCNA study guide (affiliate): https://click.linksynergy.com/link?id...
The CCENT/CCNA study guide (affiliate): https://click.linksynergy.com/link?id...
IP Addressing in Depth | Network Fundamentals Part 5
You’ve found the fifth part of the Network
Foundation series. Time to dive deeper into IP addresses! This is critical
information for anyone new to networking, or studying for CCNA or CCENT exams
We spoke about CIDR in the last video. We can extend this by using different
subnet masks for different purposes. This is called Variable Length Subnet
Masks (VLSM), and is something you will use every day. Every network has a few
special addresses, like the network and broadcast address. It’s important to
know which addresses these are, so you don’t use them incorrectly. As the
internet has grown, we have used IP addresses faster than ever. There is a
limited pool of IP’s to use, and it is starting to run out! One of the methods
used to slow this down is private addressing (as defined in RFC1918). Do you
know how this conserves IP addresses? Every device needs an address. But how
does it get one? There are two main ways to address devices and one not so
usual one… Finally, we’ll look at the IP header that is applied to each packet.
See some of the more common fields, and how they’re used.
here is a link to RFC1918. https://tools.ietf.org/html/rfc1918
TCP/IP Model (Internet Protocol Suite) | Network Fundamentals Part 6
You’ve seen the OSI model, now see the TCP/IP
model! It started as a competitor but has grown into a suite of commonly used
protocols. It has gained popularity over OSI in a practical sense, as it was
quick to standardize. The OSI model was slower and missed out. We’re going to
look at the four (or is it five?) layers of the TCP/IP model, and see how they
contrast to OSI. The answers to the quiz questions, a must for CCENT and CCNA
candidates, can be found at:
In the next video, we’re looking at the TCP and UDP protocols, what they’re for, and how they’re different.
How TCP and UDP Work | Network Fundamentals Part 7
TCP and UDP are the transport layer protocols
that are used to get data from one application to another. They have several
common features, like port numbers (the network address of the application),
headers, and multiplexing (allowing more than one application to access the
network at a time). But, they also have several differences. For example, TCP
is connection-oriented, while UDP is connectionless. TCP is ‘reliable’ while
UDP is ‘unreliable’. But if TCP has more features, why use UDP at all? The
answer may surprise you!
The answers to the quiz questions, a must for CCENT and CCNA candidates, can be found at: https://networkdirection.net/labsandq...
The CCENT/CCNA study guide (affiliate): https://click.linksynergy.com/link?id...
The answers to the quiz questions, a must for CCENT and CCNA candidates, can be found at: https://networkdirection.net/labsandq...
The CCENT/CCNA study guide (affiliate): https://click.linksynergy.com/link?id...
Overview of this video:
0:22 Ports
0:58 TCP and UDP headers
1:48 Selecting Port Numbers
2:58 Multiplexing
3:47 Sockets
5:04 Connections in Windows
6:06 Quiz 1 and 2
6:39 Comparing TCP and UDP
8:59 Why use UDP?
10:19 Quiz 3, 4, and 5
In the next video, we’re looking how TCP establishes connections, sometimes called the ‘three-way handshake’
Establishing Connections With TCP's Three-Way Handshake | Network Fundamentals Part 8
Establishing Connections With TCP's Three Way
Handshake | Network Fundamentals Part 8 TCP is connection-oriented, while UDP
is connectionless. TCP achieves this with a process called the three-way
handshake. This is three messages between the client and server, which use the
SYN and ACK flags in the TCP header. There is a corresponding process when
closing the connections. This time the FIN flag in the header comes into play.
And in other cases, the RST flag is used. This is in the case of an error,
which can help with troubleshooting.
The answers to the quiz questions, a must for CCENT and CCNA candidates can be found at: https://networkdirection.net/labsandq...
The CCENT/CCNA study guide (affiliate): https://click.linksynergy.com/link?id...
The answers to the quiz questions, a must for CCENT and CCNA candidates can be found at: https://networkdirection.net/labsandq...
The CCENT/CCNA study guide (affiliate): https://click.linksynergy.com/link?id...
Overview of this video:
0:17 Connections and Connectionless
0:55 Three-Way Handshake
3:16 Quiz #1-2
3:31 Closing Connections
5:55 Quiz #3-4
In the next video, we’re looking how TCP manages errors, and how it uses a process called ‘windowing’
How TCP Handles Errors And Uses Windows | Network Fundamentals Part 9
TCP doesn’t detect errors; That’s layer-2’s
job. But it does notice when data is missing, and it is able to retransmit
segments as needed. It does this by using the ACK flag in the TCP header. The
ACK flag acknowledges when segments arrive correctly. To improve efficiency, a
range of segments can be acknowledged at once. The amount of data that can be
acknowledged at a single time is called the window size. When a network link is
stable, the window size can increase, allowing more data to be sent per
acknowledgment. If the link is unstable, the window size shrinks, which lowers
the number of retransmissions. Windowing is TCP’s flow control.
The answers to the quiz questions, a must for CCENT and CCNA candidates, can be found at: https://networkdirection.net/labsandq...
The CCENT/CCNA study guide (affiliate): https://click.linksynergy.com/link?id...
Overview of this video:
0:19 Data Loss
0:50 Acknowledgements
2:52 Windowing
4:27 Quiz #1-2
4:44 Error Recovery
6:05 Dynamic Windows
8:51 Quiz #3-4
In the next video, we’re finally going to see the first steps in configuring a router or switch.
Cisco CLI for Beginners | Network Fundamentals Part 10
You’ve been following on for a while, and now
it’s time to get your keys dirty by starting Cisco router or switch
configuration! Routers and switches come in different sizes and shapes
depending on how they’re used. You might have a devices suited to SOHO,
enterprise, or service provider spaces. The thing that’s usually common to all
these, is that you can configure them using the CLI (Command Line Interface) In
this video we’ll start by looking at a router physically. You’ll see the
console ports (both USB and serial), the data ports, the AUX port, module
slots, and single/dual power supplies. Next, we’ll see how to use a terminal
emulator called Putty to connect to the router using a USB Serial Adapter. From
here you’ll see user exec mode, global exec mode (AKA privileged exec mode) and
configuration mode. While we’re here, we’ll configure an interface with an IP
address, and configure remote access to the router (using SSH). Finally, we’ll
talk about lab options, including physical equipment, GNS3, packet tracer, VIRL
and EVEng.
Lab options: https://www.netacad.com/courses/packe...
Lab options: https://www.netacad.com/courses/packe...
Overview of this video:
0:52 Physical Overview
5:05 Connecting to the router
8:19 Getting used to the CLI
12:50 Configuring an Interface
17:15 Remote Access
25:11 Running Config and Filesystem
28:08 Lab Options
In the next video, we’re starting to get deeper, by starting switching!
How Switching Works | Network Fundamentals Part 11
Welcome to the start of switching!
Communication is not new, not even electronic communication. In the old days,
to make a telephone call, a switchboard operator needed to patch though your
call. This means that they had to manually create a path for your phone call to
take. Switching is a lot like this. Switching dynamically creates paths for
network traffic to flow through. But it doesn’t do this all on its own.
Ethernet, a protocol that operates at layer 2, is critical to how this works.
Each device that uses ethernet has a MAC address. Frames are sent from one MAC
address to another. Clever devices like bridges and hubs learn these addresses,
and can make better decisions about how traffic is handled because of this
knowledge. It wasn’t always this way though. In the early days we had bus and
ring networks, and eventually hubs. These did not have any intelligence, and
operated solely at layer 1. They were also only half-duplex, and had to handle
collisions. In this video, we walk through the past, and see how it affects the
switching networks that we have today.
Finally we’ll go through a lab to see it all in action.
Finally we’ll go through a lab to see it all in action.
The CCENT/CCNA
study guide (affiliate): https://click.linksynergy.com/link?id...
Overview of this video:
2:22 Ethernet
7:31 Adding Hubs
11:16 Improving with Bridges
16:58 Introducing Switches
21:02 Lab Time
Vintage footage from:
https://youtu.be/H-KUat5WEkU
https://www.youtube.com/watch?v=qsty1...
https://youtu.be/PsPLnp3y3ho
In the next video, we’re taking it further with VLANs
How VLANs Work | Network Fundamentals Part 12
VLANs are one of the most common technologies
that you will see. Imagine that you have a LAN (a layer-2 broadcast domain),
but you need to separate the devices connected to it. You could buy different
switches for each group of devices, but a better option would be to use VLANs.
VLANs are a Virtual LAN. You have a physical switch, and the ports are assigned
to a VLAN. Devices in one VLAN cannot talk to devices in another VLAN. This is
like using different switches, without having to go out and buy different
switches! Each VLAN has an ID, which ranges from 1 to 4094. Each switch port is
assigned to one of these ports. Any ports with the same VLAN ID are in the same
VLAN, which means they are in the same network. As said before, devices in one
VLAN cannot communicate with devices in another VLAN. To allow communication,
we can use a router that is connected to both VLANs. The router receives
traffic on one VLAN, and passes it to the other VLAN. We will see how all of
this works, and how it’s configured!
Quiz: link: https://networkdirection.net/labsandq...
Patreon
information: https://networkdirection.net/patreon/
In the next video, we’re looking to extend our VLANs across several devices using trunking, or tagging.
VLAN Trunk Links | Network Fundamentals Part 13
We’ve seen that VLANs can divide up a switch
into separate logical networks. But what happens when we run out of ports? We
need to buy a new switch. But how do we connect the two switches in a
VLAN-aware network? Do we need a separate link for each VLAN? That could work,
but won’t scale well. What if we have 50 VLANs? Instead, we can use a trunk
link. This uses a process called tagging, where the VLAN ID is added to each
frame, in the form of a small tag in the ethernet header. Now a single link can
be used between the switches, and traffic from different VLANs can pass over
it, all while still keeping the traffic separate. There are a few special VLANs
which work with this. One of these is VLAN 1, which is used for
switch-to-switch control traffic (for example, CDP or LLDP). Another is the
native VLAN, which enables non-VLAN aware devices to connect. Trunking also enables
extra features, like Router On A Stick, or ROAS. This is where a router can
connect to the network using a single trunk link, and forward traffic between
VLANs.
See how all of this works in this video!
Quiz: link: https://networkdirection.net/labsandq...
Patreon
information: https://networkdirection.net/patreon/
CCENT/CCNA ICND1
100-105 Official Cert Guide (affiliate): https://click.linksynergy.com/link?id...
Overview of this video:
0:33 Extending VLANs Across Switches
1:38 How Trunking Works
6:12 Voice VLANs
7:49 Lab (Part 1)
14:14 Quiz #1
14:25 VLAN 1
15:36 Native VLAN
16:30 Lab (Part 2)
21:39 Quiz #2
23:51 ROAS and Lab (Part 3)
In the next video, we’re investigating using a router to provide security using access-lists
Understanding Access Control Lists | Network Fundamentals Part 14
ACLs, or Access Control Lists, are one of the
fundamental ways to control or influence the traffic flowing through your
network. They can be used in several different ways, but in this video, we’ll
look at how to use ACLs as a packet filter. Packet filters use ACL’s to control
traffic that is and is not allowed through the network. An ACL is, as the name
suggests, a list containing Access Control Entries (or ACE). Each entry is a
rule, with ‘match’ conditions. If traffic matches these conditions, then an
action (permit or deny) is applied. Standard ACL’s are the original type, and
can only match based on source address. Extended ACLs are newer can match
on a variety of criteria. There are several ways that ACLs can be configured.
Numbered ACLs, is where each entry in the ACL is identified by a number. Named
ACLs are more advanced, and group the entries inside a container. This video
contains a lab, where you can see how to configure all these options.
Quiz: link: https://networkdirection.net/labsandq...
Firewall ACLs: https://youtu.be/gFqzZm1-KH8
Cisco Learning Network: https://learningnetwork.cisco.com/wel...
Patreon
information: https://networkdirection.net/patreon/
CCENT/CCNA ICND1
100-105 Official Cert Guide (affiliate): https://click.linksynergy.com/link?id...
Overview of this video: 0:28 What are ACL’s For? 1:00 Anatomy of an ACL 3:11 Wildcard Masks 5:45 Quiz Time 5:55 Types of ACLs 7:49 Applying ACLs 9:32 Quiz Time 9:42 Lab 20:48 Quiz Time 21:02 What about Firewalls?
In the next
few videos, we’re going to have a look at ARP, DHCP, and DNS.
What ARP does | Network Fundamentals Part 15
What ARP does | Network Fundamentals Part 15
ARP, or Address Resolution Protocol, provides IP to MAC address mapping
services. It works by using two messages, the request, and reply. When a host needs
to know the MAC that belongs to an IP, it will broadcast the request message.
The device that owns the IP will reply (unicast) with its MAC address. Any
other host that gets the message will discard it. Once the reply has been
received, the IP to MAC mapping will be stored in the ARP cache, to make the
process faster next time. But if the entry is not used, it will eventually be
removed from the cache. Also of use is GARP, which a host will use to
preemptively notify the local network of its IP and MAC address. This increases
efficiency.
Quiz: link: https://networkdirection.net/labsandq...
Patreon
information: https://networkdirection.net/patreon/
CCENT/CCNA ICND1
100-105 Official Cert Guide (affiliate): https://click.linksynergy.com/link?id...
Overview of this video:
0:26 What does ARP Do?
1:32 How Does ARP Work?
2:20 ARP Cache
3:40 RARP and GARP
In the next few videos, we’re going to have a look at DHCP and DNS.
What DHCP is all About | Network Fundamentals Part 16
DHCP, or Dynamic Host Control Protocol, is used
to dynamically assign IP addresses, and other information called options, to
network devices. As devices startup (and at some other times) they broadcast a
DISCOVER message, which is seen by the DHCP server. The DHCP server finds an
available IP address and sends it back in an OFFER message. The client will
see this, and maybe more OFFERs, and choose one. It will send a REQUEST message
to the server, which will confirm the IP allocation with an ACKNOWLEDGE
message. When IP’s are assigned to devices, they’re given a lease. This is the
time they’re valid for. When 50% of a lease expires, the client will try to
renew the lease. It will often get the same IP that it had, but there is no
guarantee and may get something else. As DISCOVER messages are broadcasted,
they only reach the local LAN segment. To extend DHCP services beyond the local
segment, we can configure a DHCP relay on a router or switch. This can intercept
the DISCOVER message and forward it to the server.
Quiz: link: https://networkdirection.net/labsandq...
Lab Link: https://networkdirection.net/labsandq...
Patreon information: https://networkdirection.net/patreon/
For more information on the DHCP frame format, I highly recommend https://www.netmanias.com/en/post/tec...
Overview of this video:
0:32 The DHCP Process
3:08 Leases
5:02 Options
6:09 Quiz 1
6:20 DHCP Relays
7:50 Lab
15:39 Quiz 2
In the next
video, we’re going to have a look at DNS.
Getting Started with Domain Name System (DNS) | Network Fundamentals Part 17
The Domain Name System (DNS) is the elegant
system used for, among other things, resolving a name to an IP address. Think
about when you put a web address into a web browser. That needs to be converted
to an IP address, so the client will send the DNS server a lookup message, and
the DNS server will send a response. DNS servers contain zones, which is a
container for all the information for a domain. If a DNS server has a zone for
a domain, it is authoritative for that domain. If it is non-authoritative, it
can make its own query, and send it to another DNS server. Inside the zone are
records. These contain the information such as name to IP mappings. This
particular type is called a host or ‘A’ record. Other types include a pointer
(PTR), which is the reverse of the host record, the canonical name (CNAME),
which is an alias, and the Mail Exchange (MX) record, which holds a list of
mail servers. When a server can’t answer a request on its own, it needs to ask
another DNS server for help. One option is to configure another server as a
forwarder. The server performs a recursive query, where it finds a record on
the client’s behalf. The alternative is to use root hints, where the server
asks other servers for hints about where the authoritative DNS server is
located. It does this using recursive queries
Quiz: link: https://networkdirection.net/labsandq...
Patreon information: https://networkdirection.net/patreon/
For more information on the DNS process, I highly recommend: https://www.cloudflare.com/learning/d...
Overview of this video:
0:36 The Domain Name Space
2:10 Zones and Records
4:32 Record Types
6:10 A Simple Lookup Process
9:31 Using Forwarders
10:58 Using Root Hints
12:58 Quiz
Static route configuration | Network Fundamentals Part 18
Anyone who’s interested in networking should be
interested in routing. It’s one of the core functions that we need to work
with. ‘Routing’ is how a router (or multi-layer switch) will forward packets
through the network. The router will build a routing table, where it puts
routes. A route is a pointer to a network. It says ‘for this network, send
traffic this way…’ Each router has a routing table, and each router needs to
make its own decisions around how packets should be forwarded. These decisions
will depend on the contents of the routing table. One of the ways we can
‘populate’ the routing table is to configure static routes. These are
configured with the ‘ip route’ command. Another way is to use dynamic routing,
which is covered in the next video. Just like PC’s, routers can have a default
gateway, also known as a ‘gateway of last resort’. This is a ‘catch-all’ route
that is used to forward traffic that doesn’t match any other more specific
rule. Be sure to check out the labs (links below) if you want to try this out
yourself.
Overview of this video:
Quiz Link: https://networkdirection.net/labsandq...
Lab Challenge 1: https://networkdirection.net/labsandq...
Lab Challenge 2: https://networkdirection.net/labsandq..
(Affiliate Link) CCNA 200-301 Official Guide (Volume 1): https://click.linksynergy.com/link?id...
(Affiliate Link) CCNA 200-301 Official Guide (Volume 2): https://click.linksynergy.com/link?id...
Patreon information: https://networkdirection.net/patreon/
0:23 Definition of Routing
1:06 The Routing Table
3:35 Static Routes
6:17 Return Routes
9:35 Packet Flow
11:03 Default Route
13:00 Labs
Routing Protocols and Traffic Forwarding | Network Fundamentals Part 19
Ready to continue your routing journey? Surely
you’ve noticed that it can be a pain to configure static routes all the time.
It takes forever, they’re difficult to troubleshoot, they don’t adapt to
network changes very well, and it’s easy to make a typo. The alternative is
dynamic routing. Dynamic routing protocols, such as RIP, EIGRP, OSPF, and BGP
help us as they’re more aware of what’s going on. For example, if there’s a
fault, they are able to route traffic along a different path. We’ll be diving
into RIP in the next video, but before we do that, you need to understand a few
rules that routers follow. The first is called Longest Prefix Match (LPM). This
states that if the destination IP address matches more than one route in the
routing table, the route with the longest subnet mask will be chosen. The
second is Administrative Distance (AD). Each source of routing information has
an AD value assigned to it. So, if a route is learned from more than one source
(for example, RIP and OSPF), the router will look at the administrative
distance of both protocols, then it will decide that it prefers OSPF more, and
put that route into the routing table. We can manipulate administrative
distance in some cases. We can create static routes with different AD’s, in
order for them to become floating static routes. If the primary route (wherever
it’s learned from) is lost, the floating static route can take its place.
Quiz Link: https://networkdirection.net/labsandq...
Lab Challenge: https://networkdirection.net/labsandq...
(Affiliate Link) CCNA 200-301 Official Guide (Volume 1): https://click.linksynergy.com/link?id...
(Affiliate Link) CCNA 200-301 Official Guide (Volume 2): https://click.linksynergy.com/link?id...
Patreon information: https://networkdirection.net/patreon/
Overview of this video:
0:32 Dynamic Routing Protocols
2:06 Longest Prefix Match (LPM)
4:43 Administrative Distance (AD)
6:30 Floating Static Routes
8:00 Labs
How RIP Works | Network Fundamentals Part 20
Time to see some dynamic routing in action!
We’re going to start with RIP, or Routing Information Protocol. It’s a simple
protocol that’s been around for a long time. RIP is a type of Distance Vector
Routing Protocol. This has a different approach to a Link State Protocol like
OSPF. While Link State protocols have each router build a full map of the
network, Distance Vector protocols are more concerned with just the next hop.
They have ‘sign posts’ pointing the way. To run RIP, the process must be
started with ‘router rip’. This is also where most RIP configuration goes. This
includes ‘version 2’, to limit the router to RIPv2 only, ‘no auto-summary’ to
prevent automatic summarization to classful boundaries, and network statements
to enable RIP on interfaces, and to advertise their connected routes. If we
don’t want RIP running on all interfaces, we can use ‘passive-interface’ or
‘passive-interface default’ to stop the updates being sent and received, while
still allowing connected routes to be advertised. Of course, we could also consider
authentication between neighbours. We can configure this using MD5, which uses
an encrypted password. Each dynamic routing protocol uses a metric. This is a
way to measure how good a link is. The routing protocol will use this metric to
decide which path is best. RIP uses hop count as its metric. It’s important to
prevent routing loops. Distance Vector protocols do this by using the ‘split
horizon’ rule. This prevents a router from sending an update for a network out
an interface that the network update was received on. If there are bad
networks, RIP can ‘poison’ the route by setting the metric to 16. 16 hops is
invalid in RIP terms. This causes other routers to know that this route is bad
and shouldn’t be used. If a router or a network fails, the network needs to
‘converge’. Convergence is the process that routers go through to find
alternative paths during a failure, or to add new paths when new networks come
online. We want convergence to be as quick as possible. And we shouldn’t forget
the default route. Rather than configure a static route everywhere, we can get
RIP to share the default route with the rest of the network. Be sure to try the
labs, they will be worth your time!
Quiz Link: https://networkdirection.net/labsandq...
Lab Challenge 1: https://networkdirection.net/labsandq...
Lab Challenge 2: https://networkdirection.net/labsandq..
(Affiliate Link) CCNA 200-301 Official Guide (Volume 1): https://click.linksynergy.com/link?id...
(Affiliate Link) CCNA 200-301 Official Guide (Volume 2): https://click.linksynergy.com/link?id...
Patreon information: https://networkdirection.net/patreon/
Overview of this video:
0:21 RIP Basics
1:19 Distance Vector and Link State
2:56 RIP Configuration
10:18 Passive Interfaces and Authentication
14:26 Metrics
17:12 Split Horizon and Route Poisoning
19:40 Convergence
22:36 Default Route Distribution
23:40 Labs
How to Use NAT | Network Fundamentals (Part 21)
We have a lot of private IP address in our
networks. But, we can only use public IP addresses on the internet. So how can
our privately-addressed devices access the publicly-addressed internet? With a
technology called Network Address Translation, or NAT. NAT has the ability to
rewrite the source and/or destination IP address in the IP header. A
complimentary technology called Port Address Translation (PAT) can change the
source and destination ports in a TCP or UDP header. A NAT can by static or
dynamic. A static NAT will match an original IP with the same translated IP
every time. Dynamic NAT on the other hand, will use a different mapping each
time. Sometimes we don’t have enough public IP’s to map to, so we will need to
use a different aspect of NAT, called port overloading. This is sometimes
called masquerading. Port overloading lets us assign a different port number to
each translation, so we can conserve the number of public IP’s that we’re
using. A key concept in NAT is understanding where the traffic starts from. Is
it starting within the network, and heading out? Or is is starting somewhere on
the internet, and heading into our network. This makes it easier to understand
bidirectional and unidirectional NAT. Be sure to check out the labs (links
below) if you want to try this out yourself.
Quiz Link: https://networkdirection.net/labsandq...
Lab Challenge 1: https://networkdirection.net/labsandq...
Extra reading: https://www.ciscozine.com/nat-virtual...
(Affiliate Link) CCNA 200-301 Official Guide (Volume 1): https://click.linksynergy.com/link?id...
(Affiliate Link) CCNA 200-301 Official Guide (Volume 2): https://click.linksynergy.com/link?id...
Patreon information: https://networkdirection.net/patreon/
Overview of this video:
0:27 What is NAT?
1:41 How NAT Works
5:07 Configuring Static NAT
9:24 Configuring Dynamic NAT
13:15 Port Address Translation
16:20 Port Overload
Does Network Time Really Matter? | Network Fundamentals Part 22
Does it matter if our routers, switches, and
other devices on the network have the correct time and date? Why, yes it does!
Think of logging and troubleshooting, which makes use of timestamps. Think of
security applications like Kerberos and certificates. And think of scheduling
events. We can configure time manually on each router or switch. Unfortunately
this is time consuming, and often inaccurate. So, we have an alternative,
called Network Time Protocol, or NTP. NTP servers provide the correct time to
NTP clients on request. NTP servers are organised into layers called stratum.
Each stratum of NTP servers acts as a client to synchronize their time and date
with a server in the stratum above. We can configure clients to use a local NTP
server in our network (perhaps a Domain Controller), or we can configure them
to use a server on the internet (perhaps from pool.ntp.org). We can even select
a preferred NTP server, and have others configured as backups. Synchronizing
can take a while on the first attempt (perhaps 10 minutes), so you will need to
be patient!
Quiz Link: https://networkdirection.net/labsandq...
(Affiliate Link) CCNA 200-301 Official Guide (Volume 1): https://click.linksynergy.com/link?id...
(Affiliate Link) CCNA 200-301 Official Guide (Volume 2): https://click.linksynergy.com/link?id...
Patreon information: https://networkdirection.net/patreon/
Overview of this video:
0:22 Why Does Time Matter?
1:32 Local Time Sources
3:07 How NTP Works
5:19 Configuring NTP
Sending Logs to a Syslog Server | Network Fundamentals Part 23
Your devices are constantly working, and
constantly generating events. These events are marked with logs. Where do these
logs go? Some of them will stay on the local device, but in a well maintained
network, we can also send out logs to a syslog server. Putting all our logs in
one place will help us to correlate problems across many devices. Syslog is a
well known format for logging. Lots of devices can use them. There are two
important aspects; Facilities and severity levels. A facility represents the
process that generates the log. The severity level refers to how important a
log is. There are eight levels, named emergency, alert, critical, error,
warning, notification, information, and debug. Debug logs are benign while
emergency logs are very important. To help remember the levels, think of the
mnemonic Every Awesome Cisco Engineer Will Need Icecream Daily.
Quiz Link: https://networkdirection.net/labsandq...
Lab Link: https://networkdirection.net/labsandq...
Kiwi Syslog Server: https://www.kiwisyslog.com/free-tools...
(Affiliate Link) CCNA 200-301 Official Guide (Volume 1): https://click.linksynergy.com/link?id...
(Affiliate Link) CCNA 200-301 Official Guide (Volume 2): https://click.linksynergy.com/link?id...
Patreon information: https://networkdirection.net/patreon/
Overview of this video:
0:14 Logging Overview
1:32 Syslog Levels and Facilities
4:09 A Simple Syslog Server
4:43 Syslog Configuration
How SNMP Works | Network Fundamentals Part 24
We can manage proactively, and we can manage
reactively. SNMP is a protocol that can help us with both. A management server
will use SNMP polling to collect information from devices on our network. This
builds charts and dashboards to help us evaluate the health of our network. If
a device has a problem, it may even send an SNMP trap to the management server.
The server can then take an appropriate action, like alert us. SNMP information
is stored in a hierarchical structure called a MIB (Management Information
Base). This is a collection of objects called OIDs (Object Identifiers). These
describe the information that can be collected from devices, and how to
interpret it. When a poll is sent, the server will also specify a community
string. This string is a simple form of authentication. Unfortunately, it is
stored in plan-text, both in the message and in the configuration. There are
three versions of SNMP. v1 came first, and v2 extended this by adding support
for 64-bit counters. v3 added real authentication and encryption. v3 is
recommended in most cases.
Quiz Link: https://networkdirection.net/labsandq...
Lab Link: https://networkdirection.net/labsandq...
SNMP Tester: https://www.paessler.com/tools/snmpte...
(Affiliate Link) CCNA 200-301 Official Guide (Volume 1): https://click.linksynergy.com/link?id...
(Affiliate Link) CCNA 200-301 Official Guide (Volume 2): https://click.linksynergy.com/link?id...
Patreon information: https://networkdirection.net/patreon/
Encryption Basics | Public Key Encryption | SSL
Learn how to keep your Network secure by
understanding the basics of Public Key Encryption, SSL and Cipher Suites. This
video is for you! There’s symmetric cryptography, and asymmetric cryptography
(Also called public key encryption). And they work in different ways. Symmetric
uses keys that are shared with all parties that need to encrypt and decrypt the
information. Sharing the keys among everyone can be tricky to do securely. On
the other hand, asymmetric encryption is completely different. This uses a pair
of keys, public and private, which are always used together. Either can
encrypt, but the other is used to decrypt. The problem is that this is a very
slow process. Good thing we can combine the two to get the best of both worlds.
We can use public key encryption to generate and share private keys (as well as
perform authentication), and then we can use these keys with a symmetric cipher
for the bulk of the secret information. These ciphers, along with a security
protocol (like SSL, TLS, Kerberos, IPSec), a mode of operation, and a hashing
algorithm, make up a cipher suite. But it’s probably easier to understand with
an example, such as an HTTPS connection between a client and a web server. The
client and server will send a ‘client hello’ and ‘server hello’ message, which
includes random numbers, suitable cipher suites, and the server’s certificate.
If they agree to proceed, the client can then generate the pre-master key,
encrypt it with the servers' public key, and send it. Both sides can then use
their three numbers to generate session keys, which are used with the symmetric
cipher for the bulk of encryption. But any of these ciphers can be found to be
insecure in the future. There are a few tricks to learn to keep your systems
secure...
Links, for more information:
https://www.ssl.com/article/ssl-tls-h...
https://security.stackexchange.com/qu...
https://cheatsheetseries.owasp.org/ch...
https://cheatsheetseries.owasp.org/ch...
https://www.ssllabs.com/ssltest/
(Affiliate Link) Network Security book:
https://click.linksynergy.com/link?id...
Patreon information: https://networkdirection.net/patreon/
Overview of this video:
0:26 Symmetric vs Asymmetric (public key encryption)
3:36 Security Protocols and Cipher Suites
6:23 An SSL Connection
9:07 Staying Secure
Encryption Basics | Cryptography
In modern cryptography, ciphers are algorithms
that explain the process to encrypt and decrypt our information. Learn more
about Cryptography and Encryption Basics in this video. There are many ciphers
out there, including AES, DES, 3DES, SSL, TLS, RC4, and more. When you’re
thinking about encryption, you’re likely thinking of symmetric encryption. This
is where a key is used to encrypt, and the same key is used for decryption. So,
as you can imagine, the larger the key, the harder it is to break encryption.
And some of they keys we use today are massive! These ciphers may be stream
ciphers, or block ciphers. Block ciphers are more common these days. While
stream ciphers create a large value called the One Time Pad, and encrypt the
entire piece of information at once, block ciphers first break the information
into fixed sized blocks. Once the data is broken into blocks, they are each encrypted
one at a time. The way this is done is called the mode of operation, and some
modes are more secure than others. These include ECB, CBC, GCM, and others. But
let’s not forget that there are other types of encryption. For example, hashing
algorithms work in one direction only (that is, they are non-reversible), and
they don’t require a key. What’s the point of that? They can be used to create
a unique value to represent a piece of information, which in itself has some
very interesting uses.
(Affiliate Link) Network Security book:
https://click.linksynergy.com/link?id...
Patreon information: https://networkdirection.net/patreon/
Overview of this video:
0:27 What are Ciphers?
1:30 Key Size
4:41 Stream Ciphers
7:18 Block Ciphers
9:52 Hashing
What Is Cryptography | Encryption Basics
We’re not all security experts, but we still
need to be aware of security itself, in order to protect ourselves in the
digital age. So, welcome to the Basics of Encryption (Part 1), where we get a
very gentle introduction into the world of cryptography. If you want to know
what is cryptography, then this video is for you! Cryptography / Encryption has
been around for years. Consider the Caesar Cipher and Enigma, both forms of
substitution cipher. These were used during wartime to convert plain text to
cipher text, without enemy forces understanding the original message. And
although old, both of these forms of encryption help us to gain an
understanding into modern encryption. These days encryption is more
complicated, using prime numbers to create keys that are near impossible to
guess, and too hard to compute. That is of course, if you use them correctly...
Links, for more information:
https://www.springboard.com/blog/cryp...
https://www.educba.com/cryptography-v...
http://practicalcryptography.com/ciph....
https://cryptii.com/pipes/caesar-cipher
https://brilliant.org/wiki/enigma-mac....
(Affiliate Link) Network Security book:
https://click.linksynergy.com/link?id...
Patreon information: https://networkdirection.net/patreon/
Overview of this video:
0:56 The Caesar Cipher
3:32 The Enigma Machine
6:58 Encryption Today
8:13 What Makes Encryption Possible?
No comments:
Post a Comment
Note: only a member of this blog may post a comment.