Just loading up some more notes that I have laying around. I feel the right thing is to share them. Hope they help someone
With voice data the key factor is getting the voice traffic to its destination as quickly as possible in order to avoid jitter and unintelligible voice streams. (“jitter” occurs when there’s a delay in transmitting voice or video traffic, perhaps due to improper queueing.)
Switchports that have IP phones plugged into them can be configured 2 ways:
Trunk port: Gives the advantage of creating a voice VLAN that will carry nothing . . . → Read More: SWITCH Study Notes – IP Telephony & Voice VLANs
Multilayer Switching And Fault Tolerance
What Is Multilayer Switching?
Multilayer switches are devices that switch and route packets in the switch hardware itself. These switches can perform packet switching up to ten times as fast as a pure L3 router Cisco Catalyst switches perform hardware switching using a router processor or L3 engine Routing information is downloaded to the hardware itself Hardware-based switching happens using one of the following methods: Cisco Express Forwarding (CEF) Newer method Multilayer Switching (MLS) ß Legacy Application-Specific Integrated Circuits (ASICs) will perform the L2 rewriting operation of hardware switched packets. L2 rewriting process changes the . . . → Read More: SWITCH Study Notes – Multilayer Switching And Fault Tolerance
Chapter 6 notes.. Chris Bryant’s (@ccie12933) BCMSN study guide!
The enable password can be set using “enable password” or “enable secret” commands SW2(config)#enable password yourpassword SW2(config)#enable secret yoursecretpassword The “enable secret” command encrypts the password in the configuration without the “service password-encryption” command. The “enable secret” command supersedes the “enable password” command and this password will be used instead. All passwords appear in the configuration in clear text by default except the enable secret. The command service password-encryption will encrypt the remaining passwords. When configuring VTY lines be sure to enable “login” and set a password or else they . . . → Read More: SWITCH Study Notes – Securing The Switches & Tunneling
OK – So here we go! The advanced Spanning Tree Protocol. Initially it was kind of simple to keep everything in line – Portfast, Uplinkfast, Backbonefast and it was clear and then came the chaos! BPDU Guard, Root Guard, Loop Guard, BPDU Filtering – and so on. But I held on in there and I think I’ve got the best out of the reading I could for now.
The hardest part of this chapter was the whole RSTP, PVST, PVST+ & RPVST+ business – I mean what the heck. I’ll surely have to go over these again and put together . . . → Read More: SWITCH Study Notes – Advanced Spanning Tree Protocol & Etherchannel
Below are notes from the Spanning Tree basics chapter. Maybe it's just me but STP seems just as troublesome as it is useful. The advanced chapter didnt seem to let up at all, I still felt like there was a lot to digest. Luckily enough though I was able to move on without any "huh?" moments. But I never feel comfortable with just that – My feeling (with Cisco/networking/IT stuff) is that I've never really learned something until I've planned, implemented and debugged it several times – I think we all feel this way.
As I said I'm catching up . . . → Read More: SWITCH Study Notes – Spanning Tree Protocol Basics STP
So I'm sorry to be spamming notes here right now – but I'm just trying to create a footprint and maybe help someone else out down the line. The other thing is this phase of studies is like reading the manual before you get to play with something – hmmm, wait I never read the manual! Well we certainly cant do that with these exams though!
In other words, I hope to have some nice topics up once I begin review, labbing and quizzing. Hopefully I'll run into some things that I just wont understand and you guys could . . . → Read More: SWITCH Study Notes – VLAN Trunking Protocol (VTP)
Some more notes! From chapter two of Chris Bryant's (@ccie12933) BCMSN study guide and some of my own blending
Why We Create VLANs
The most common reason for creating VLANs: Prevent the excess traffic caused by a switch's default behavior when it receives a broadcast. If you have a network segment with hosts whose very existence should not be known by the rest of the network, just put these hosts into their own VLAN. A switch that receives a broadcast will forward it out every other port on the switch except the one that it was originally received on. A . . . → Read More: SWITCH Study Notes – Virtual LANs (VLANs)
Here are my notes from chapter one of Chris Bryant's (@ccie12933) BCMSN study guide and some of my own blending. I'm kind of breezing through much of the material not spending too much time, but just getting familiar with the general concepts again. It's been a long time since working with switching – about 3 years exactly! I more involved at layer 3.
So if the notes seem a bit "light", take these as primer notes. I don't want to spend too much time here when I've got real SWITCH reading soon. I know, you're asking "why the hell waste . . . → Read More: SWITCH Study Notes – Basic Switch Operation & Configuration