Tuesday, March 6, 2012

Assignment #3 Virtual Event-Enhance Your Power Options with Cisco UPOE (TechWise TV)

Episode 101: Enhance Your Power Options with Cisco UPOE (Universal Power Over Ethernet) (TechWise TV)
Time: 34 Min
Website:

The virtual event started off with Pardeep Parmar and Sylivia Hooks talking about; How UPOE was thought of and How people benefit from it? They said that UPOE opens up a whole new range of devices to power up. Also, people that use UPOE has uncluttered workspace, less maintenance, and can save money. They even stated that CAT 5 cable or higher can be used with UPOE.
Second person to talk was Jimmy Ray Purser and he talked about, How it UPOE works? He sums up that on a CAT 5 cable UPOE just takes up the extra space you have on the cable and uses that to put more power down it. He says that it does not heat up too much more, so no problem should be caused by the extra heat or power.
Third people to talk was Nikhil Sharma, Jimmy Ray Purser, and Pradeep Parmar. They talked about the university, resistance, and efficiency of UPOE.
University- uses existing cable to power a wide range of end points.
Resistance- extend network power to a larger variety of devices.
Efficiency- saves up to 128 dollars in five years.
They also give a lot of demonstrations on what UPOE can supply power too.
The wrap up of the virtual event was very knowledgeable and I understood about 1/4 of the video. Their was a lot of terms I did not know. Hopefully one day I do understand and can use this.

Wednesday, February 1, 2012

Assignment #2 Virtual Event- TechWise TV: The IPv6 Implementation Action Plan

Episode 94: TechWise TV: The IPv6 Implementation Action Plan
Time: 1.06
Website: http://youtu.be/bvyDWq6D8xk

Got a lot out of watching this video. I did not no we was running out of ip addresses so fast. Well I did and then I did not. If that makes any since. By the way this video is talking, the makers of IPv6 has to hurry up and get it running right so we users can start using it. What I got out of watching this show is that us users wont be able to tell a whole lot of difference between the old version.
I am glad I watched this video. I also learned a lot about IPv6 addressing, multi casting, and other things. To me this show was kind of boring at times, but I do feel once they get IPv6 together and operating it will be better for everyone. Just by watching this video I think it will be sometime before that happens because their is still a lot for them to do. I just hope we don't run out of addressing before we can get IPv6 up and running.

Wednesday, January 18, 2012

Assignment #1 Virtual Event- Cisco Fabric Path for Scalable Data Centers

Meeting Number: 209 600 323
Date: Wednesday, August 18,2010
Time: 1:02 PM, Local Time (GMT-05:00)
60 MIN Long
Title: Cisco Fabric Path for Scalable Data Centers

From what I got out of this virtual event, was that Fabric Path was put in Layer 2 and will replace The Spanning Tree Protocol because Fabric Path was made to use less bandwidth. Fabric Path will also fix problems with Switching by making it easy to configure, making it more plug and play by using Layer 2, and provisioning flexibility. Also, Fabric Path will fix problems with Routing by making it highly scalable, faster to convergence, and multi-pathing (ECMP).
"Fabric Path will bring Layer 3 routing benefits to flexible Layer 2 bridged Ethernet Networks." as stated in the virtual event. The virtual event also states, "Fabric Path is simple."
This virtual event goes into details about Fabric Path and what all is involved with it. Shows us how it is used in everyday networking and gives examples of how the routing table will work with Fabric Path and how it is more scalable than The Spanning Tree Protocol. Also, discusses how different it is from other protocols in Layer 2 and how it is going to migrate Layer 2 to Layer 3 one day. Plus, tells us what upgrades to look for next that will come out of Fabric Path. Lastly, this virtual event gives more examples of the benefits of using Fabric Path over Spanning Tree and benefits Fabric Path gives to an IXP.
This was a good virtual event to watch with a lot of detail on Fabric Path. Some of which I did not understand but with time hope to understand it more.

Friday, November 11, 2011

Chapter Nine Troubleshooting Your Network

Their are five main software utilities for troubleshooting connectivity.
These five are the most common used command-line interface (CLI) utilities.
1.) ipconfig - it displays IP configuration information


2.) ping - it tests connections to other IP hosts


3.) tracert - it displays route taken to destination


4.) netstat - it displays network connections


5.) nslookup - it directly queries the name server for information on a destination domain.

Thursday, November 3, 2011

Chapter Eight Basic Security

There are two types of threats: External and Internal

External threats are from individuals working outside an organization. They do not have authorized access to the computer system or network. The attacker can get into your network from Internet, wireless links, or dial-up access servers.

Internal threats are when someone has either authorized access to the network and through a user account or has physical access to the network equipment. The attacker usually knows the person they are attacking. The attacker often knows what information to use to get on different sites.





Thursday, October 20, 2011

Chapter Seven Wireless Technologies

                             Types of Wireless Networks and Their Boundaries
                               Their are three major categories of wireless network.


WPAN--Is the smallest wireless network used to connect various peripheral devices. Mice, keyboards, and PDAs use WPAN. All these devices are dedicated to a single host and usually use IR or Bluetooth technology. IR is electromagnetic waves with a frequency range above that of microwaves, but below that of the visible spectrum. Bluetooth is wireless industy standard that uses an unlicensed radio frequency for short-range communication enabling portable devices to
                                                      communicate over short distances.

WLAN-- Is typically used to extend the boundaries of the local wired network. Use RF technology and conform to the various IEEE 802.11 standards. Allow many users to connect to a wired network through a device known as an access point. Access point acts as a connection between the wireless network and the Ethernet wired network.RF is radio frequency which means electromagnetic waves generated by AC and sent to an antenna within the electromagnetic spectrum.  Their are four types of IEEE 802.11 standards: 802.11a, 802.11b, 802.11g and 802.11 n.



WWAN-- Is coverage over extremely large areas. An example of WWAN is the cell phone network. WWAN is often regulated by government agencies that use technologies like, code division multiple access and global system for mobile communication. CDMA is a communication channel access method that uses spread-spectrum technology and a special coding scheme. GMS is an international standard for cell phones.

Despite these distinct categories, placing boundary limitations on a wireless network is difficult. Because unlike a wired network,  a wireless network does not have precisely defined boundaries. The range of wireless transmissions can vary due to many factors. The range of wireless networks can be affected by natural and man-made interference, fluctuation in environmental conditions, as well as the composition and placement of obstacles within the wireless coverage area.

Chapter Six Networking Services

                                           Roles Of Protocols In Client/Server Communication


Uses specific protocols and standards in the process of exchanging information to ensure that the message are received and understood. Four protocols are application, transport, internetwork, and network access layer.

Application Protocol--Is hypertext transfer protocol. HTTP governs the way that a web server and a web client interacts. HTTP defines the format of the requests and responses exchanged between the client and server.





Transport Protocol--Is transmission control protocol. TCP manages the individual conversations between web servers and web clients. TCP formats the HTTP messages into segments and provides flow control and acknowledgement of packets exchanged between hosts.





Internetwork Protocol--Is internet protocol. IP is responsible for taking the formatted segments form TCP, assigning the logical addressing, and encapsulating them into packets for routing to the destination host.





   HTTP, TCP, and IP are the KEY protocols required to download a web page for an internet server.

Network Access Protocols-- Is data link management and physical network transmissions. Data link management protocols take the packet from IP and encapsulate them into the appropriate frame format for the local network. These protocols assign the physical addresses to the frames and prepare them to be transmitted over the network.