Skip to content

2011

802.11n

On this Monday let's wrap up the 802.11 wireless standards, Friday I talked about the 802.11g (See the post 802.11g) and before that I talked about the 802.11b (See the post 802.11b ) I also talked about 802.11a, (See the post 802.11a) I even talked about the 802.11 –Legacy (See the post 802.11 –Legacy) and in the beginning of last week I talked about the basic wireless concepts. (See the post Basic Wireless Concepts) So let's end the discussion and talk about the 802.11n standard!

802.11b

Continuing where we left off the discussion, todays post will be talking about 802.11b wireless standard that was developed by IEEE. Yesterday's post we talked about the 802.11a standard. (See the post 802.11a)

Basic Wireless Concepts

Mobility is now a common thing in a business environment, you no longer are fixed to specific cubicle in the work place anymore. What is also amazing is it will continue to change and become easier for employees to get work done, with their phone, tablet, and laptop computer. But what makes this possible? What is the underlying component? The internet is becoming more available in more locations, coffee shops, airports, and your cell phone service provider, with 3G and 4G speeds. Along with the United States of America which is also moving forward with the National Broadband Plan. So today let's explore the wireless concepts! Wireless can be a scary as you can't control it. The signal is transmitted in radio waves and if set up insecurely the WLAN (Wireless Local Area Network) can easily be your weakest link compared to Ethernet LANs. There are four organizations that deal with the wireless standards and products:

Creating VLANs

Today this tutorial is going to be talking about creating VLANs (Virtual Local Area Networks) with a Cisco Catalyst switch. By creating a VLAN you are separating the network, why would you do this? There are some several reasons, like separating your production network from a guest network, and separating a test environment from a production network. This all adds security to your network. You can separate core critical network components from the rest of the production network for added security, easier troubleshooting along with separating or segmenting your network. This is breaking up the broadcast domains into smaller chucks, which will improve your network performance. Let's get started!

Configuring Port Security

Today this tutorial is going to be talking about how to configure port security on a Cisco Catalyst switch. Port security is one of the first things you can do to keep your network secure from unauthorized access. Port security can restrict devices so only devices you allow are granted access to network resources. If and when an unauthorized device is connected to a port you can decide what you want the switch to do. Let's get started! There are three different settings you can configure with port security:

Collision Domains vs Broadcast Domains

These different types of domains mean different things and when designing a LAN both of these domains can harm the performance of your network. If you are not aware of the difference between these two, this tutorial should help you out. If you have a small network at your home there is usually the router/modem that is connected via phone line or cable to the ISP that router/modem is then connected to a switch or they even have a switch built into the device. You connect a few cables turn on some devices and you now have an internet connection ready to go. In larger networks you have more choices that need to looked at. For example when to use a hub, a switch, or a router and how much money do you want to spend? Usually the more money spent you get more ports, performance increases and more features are added. These are all types of components that need to be thought of when designing a LAN. This tutorial is going to be focusing on two major things collision domains and broadcast domains.

Configuring SSH

Today this tutorial is going be talking about how to configure SSH on a Cisco router or switch. SSH or Secure Shell encrypts the data that is sent from the terminal application to the device. Making if far more safer when it is compared to telnet which sends the data in plain text. To add support for SSH to a Cisco router or switch, the device needs some added information then just passwords. The device will need a username and password, this can be configured on a AAA server (Authentication Authorization and Accounting) or on the device locally this tutorial will focus on locally configured usernames and passwords. To set up SSH you need to configure that following information for the purpose of this tutorial the username will be ciscoskills and the password will be cisco.