Articles in the networking category

  1. Token Ring to Ethernet Conversion

    Posted on in Networking

    In the 1970s, Bob Metcalfe and David Boggs invented Ethernet while working at Xerox PARC. At that time, Ethernet's top speed was 3 Megabits per second (Mbps). This version was installed in a few sites including Boeing, the White House, and various academic institutions. In the early 1980s, the original …

  2. OSI Model Layer Summaries

    Posted on in Networking

    The first layer of the OSI Reference Model is the physical layer. This layer describes the physical characters of the network. This layer defines the tangible aspects of the network medium, such as types of cables and pin arrangements, but it also defines how much voltage is used in copper …

  3. The Session Layer: OSI Layer 5

    Posted on in Networking

    The fifth layer of the OSI Reference Model is the session layer. Since applications running on different hosts may need to establish a connection in order to operate, the session layer is responsible for setting up the connection. It is important to note that the session layer is responsible for …

  4. Evolution of the OSI Reference Model

    Posted on in Networking

    The Open Systems Interconnection (OSI) Reference Model first came into being in 1978. The OSI group was intent on getting a model into the field quickly, so they elected to adopt a seven-layer model created by Charles Bachman of Honeywell. By this time, the lower four levels of the model …

  5. Basic Network Hardware Planning

    Posted on in Networking

    No matter how small, all network installations go through an initial planning phase before implementation. The new network administrator must take many factors into consideration when planning a network. Most importantly, the administrator must understand the required capacity, compatibility, and flexibility of the new network. Gathering this information requires a …

  6. Increase Simultaneous VPN Logins on Cisco ASA

    Posted on in Networking

    In most VPN setups, each VPN user is given unique login credentials. Very rarely, you might run into a situation where a group of individuals is going to be sharing a set of credentials. For example, you might assign VPN credentials to another company for temporary access to part of …

  7. Cisco Break Sequence for Outgoing Telnet and SSH Sessions

    Posted on in Networking

    There are a few network devices out there that allow you to connect, but don't give you an option to disconnect. For example, you might be stuck at a password prompt, but have no authentication details. Most telnet clients allow you to break these connections with the ^] (control-]) command. <acronym …

  8. Max Spanning Tree (STP) Diameter

    Posted on in networking

    You may already know that the IEEE 802.1D specification recommends a maximum network diameter of 7 hops. What you may not know is that the number 7 is derived from a series of calculations based on various timers being tuned to their default values. If you are designing a …

  9. LU Allocate Connection Failed

    Posted on in Networking

    I saw this error message on a Cisco ASA 5540 today:

    %ASA-3-210005: LU allocate connection failed
    

    According to Cisco, this error means the standby unit was not able to create a new connection for stateful failover. The recommendation is to verify that the system has enough RAM.

    OK...

    # show memory …
  10. Nets, Nets, Nets

    Posted on in Networking

    Intranets

    Intranets are privately owned networks that operate like the public Internet in many respects. In most intranets, corporate users access company information via tools designed to run in web browsers. Intranets allow employees to share and access confidential corporate information. The benefit of these systems is that they operate …

My Bookshelf

Reading Now

Other Stuff