Skip to main content

FREE CCNP ENCOR 350-401 Videos - Module 1 and 2

Here you can download all videos of CCNP ENCOR 350-401 From this page for FREE.

We have uploaded only the first 2 modules for the moment because we need to see whether people are interested or not in this series of videos.

If we have over 200+ downloads we will be uploading the rest of the videos for free also.

coding image


FREE CCNP ENCOR (350-401)

Module 2 Videos


Module 2 : NETWORK DESIGN BASICS

Video N° 3 : Cisco Switch Types : http://upload-4ever.com/d/IdB2
Video N° 2 : Network Topology Architectures : http://upload-4ever.com/d/IdAq
Video N° 1: Hierarchical Network Design : http://upload-4ever.com/d/IdAh


Module 1 Videos

Module 1 : BASIC SWITCHING CONCEPTS

Video N° 4 : LAB Multi Layer Switching Configuration : http://upload-4ever.com/d/IdAV
Video N° 3 : Multi Layer Switching: http://upload-4ever.com/d/IdAA
Video N° 2: VLAN and Trunking : https://www.upload-4ever.com/lmd7jm33geuq
Video N° 1 : Basic Switching Concepts : https://www.upload-4ever.com/mysj0lacvev5


The ads that are showing will be removed once we have the demanded number of downloads.

Follow our FB Page : https://www.facebook.com/ITnetworkyy


A Switch is a networking device that connects devices together in a network by using packet switching to receive, process and forward data to the destination device.

A network switch is a multiple network switch that uses hardware addresses to process and forward data at LINK LAYER which is the Layer 2 of the OSI model.

A switch also can be in Layer 2 and Layer 3!

In the case of a layer 3 Switch or we call it a multilayer switch which can also make routing in the Layer 3 (Network Layer) of the OSI Model.


Layer 2 Switches make Switching based on the MAC Table, in fact they conserve a mac address table and forward the packets using the MAC ADDRESS Table.

This will provide us an efficient use of bandwidth.

Switches can provide equally power over ethernet or PoE, also a switch can participate in security which is a deeper topic.


What is a Broadcast domain?

A broadcast domain is a logical division of a network in which all nodes can reach each other by broadcast at DATA LINK Layer (Layer 2 of the OSI Model).

A broadcast dmain can be within the same local area network segment or it can be bridged to other local area network segments.


Any computer connected to the same switch is a member of the same broadcast domain.

Separating the network with VLANs creates new broadcast domain equally.
One VLAN equals 1 Broadcast domain.

Routers which are components of the Layer 3 (Network Layer) of the OSI Layer form Boundries.


What is a MAC address?

A MAC Address = Media Access Control Address is a 6 byte unique identifier assigned to network interfaces for communications at data link Layer (Layer 2 OSI layer).

Mac addresses are used as network address for most IEEE technologies including Ethernet and WiFi.

Logically MAC Addresses are used in the MEDIA ACCESS CONTROL protocol, sublayer of the OSI Model.



6 bytes = OUI (Organizationally Unique Identifier) + UAA (Universally Administered Address)


OUI (Organizationally Unique Identifier) is a 24 bit number that uniquely identifies a vendor, manufacturer or other organizations.

In the capture you can see the first part containing the OUI.

The second portion of a MAC Address is UAA or Universally Administreded Address.

The UAA is a uniquely assigned to a device by its manufacturer. (Just remember this, don't complicate things).




What is an Ethernet Frame :


An Ethernet packet (or Frame) has :

1- Preamble ( Provides SYNCHRONIZATION; means checks whether a packet is coming. )
2- SFD (Start of Frame Delimiter : Responsible for specifying the beginning of destination MAC ADDRESS on an ethernet packet.)
3- Receiver MAC ADDRESS (Or the destination MAC)
4- Sender MAC ADDRESS (Or the source MAC)
5- An Optional VLAN TAG
6- A Type field
7- A payload
and
8- The CRC Checksum


Basic Switching Process

If the destination MAC addess is found in the CAM table of the switch, the switch sends the frame out of the corresponding port : This process is called FORWARDING.


If the destination MAC address can not be found in the CAM Table, then the frame is sent to all other ports in the same VLAN and this process is called : FLOODING.


If the destination MAC address of the receiving frame is a BROADCAST ADDRESS which is :
FFFF:FFFF:FFFF; this time the frame is sent to all the ports in the same VLAN and this process is called also FLOODING.


VLANs

VLAN = Virtual Local Area Network
1 VLAn = 1 Broadcast Domain

We use VLANs for isolation, this way different VLANs can not communicate with each other without a L3 device (A L3 Device could be a router or a L3 Switch).

Benefits of Using VLANs

- Easy management
- Easy Error detection
- Better performance
-Cost reduction (less routers which are more expensive)
-Security

Remember this :

- There are two modes in switch ports : ACCESS or TRUNK
- ACCESS = 1 VLAN = Access is known also as UNTAGGED
- TRUNK = Multiple VLANs = is known also as TAGGED.


LAYER 3 SWITCHING

A Layer 3 Switch has SVI interfaces that could support routing.

Examples of Multilayer switches

- Cisco 4500
- Cisco 6500

These models of multilayer switches can make Layer 2 switching and Layer 3 Routing in the same time and in this case we'll no longer need routers.



In order to activate the routing capabilities on a Layer 3 switch we need to put this command in the previliged mode

#ip routing (if you do not put this command than your switch will never build a router table)


Than we will need to assign IP addresses to SVI interfaces.









Comments

Network Access Control is the significant way to access the features of network and the devices of it to keep it secure from all kinds of attacks. Securium Solutions is one of the best companies that gives Network Access Control services in India.
donaldfackler said…
After my successful experience with 350-401 ENCOR Questions, I always suggest to my friends and everyone to use the same study material. 350-401 dumps brought to me guaranteed results and I am satisfied with it. I will prefer it if I go for any further IT certification.

Download Free Demo: https://www.passitcertify.com/cisco/350-401-questions.html
Anonymous said…
No deposit free spins no deposit bonus casino slots - DRMCD
No 정읍 출장마사지 deposit free spins no deposit casino 여수 출장마사지 slots – 양주 출장마사지 No deposit free spins no 경산 출장마사지 deposit bonus casino slots – No deposit free spins no deposit 계룡 출장안마 bonus casinos – No deposit free spins no deposit bonus casinos – No

Popular posts from this blog

Automating VLAN Creation on Cisco Devices with Ansible

  Automating VLAN Creation on Cisco Devices with Ansible Ansible is a powerful automation tool that simplifies network management tasks, including creating VLANs on Cisco devices. For beginners, this guide will walk you through automating VLAN creation step-by-step, from setting up Ansible to deploying VLAN configurations. What is a VLAN? A VLAN (Virtual Local Area Network) is a logical group of devices within a network that can communicate as if they were on the same physical network, regardless of their physical location. VLANs improve network efficiency and security by segmenting traffic. Why Use Ansible for VLAN Automation? Consistency: Avoid manual configuration errors. Efficiency: Configure multiple devices in seconds. Scalability: Manage large-scale networks easily. Flexibility: Supports various Cisco devices and integrates with other tools. Prerequisites Cisco Device Configuration: Ensure your Cisco devices support SSH and are configured to allow Ans...

20 Linux Commands for Listing Users, Folders, and Processes on Ubuntu and Red Hat

 Linux provides a variety of commands to retrieve information about system users, directories, and processes. This article presents 20 essential Linux commands for listing and managing users, folders, and processes, applicable to both Ubuntu and Red Hat systems. 1. Listing Users cat /etc/passwd Displays a list of all users on the system along with their user IDs, home directories, and shells. getent passwd Fetches user information from the system's databases, useful in environments with LDAP or NIS. who Shows all users currently logged in to the system. w Displays detailed information about logged-in users, including their active processes. users A simple command that lists the currently logged-in users. id [username] Displays user ID (UID), group ID (GID), and group memberships for a specific user. finger [username] Provides information about a user, including their real name, login time, and more. (May require installation: sudo apt install finger...

30 Linux Commands You Should Know

Linux is a powerful operating system used by developers, system administrators, and tech enthusiasts worldwide. Whether you're new to Linux or brushing up on your skills, here are 30 essential commands every Linux user should know: Start Learning   Linux Fundamentals  For Free 1. ls Lists files and directories in the current directory. ls 2. cd Changes the current directory. cd /path/to/directory 3. pwd Prints the current working directory. pwd 4. touch Creates an empty file. touch filename 5. mkdir Creates a new directory. mkdir new_directory 6. rm Removes files or directories. rm filename Use rm -r for directories. 7. cp Copies files or directories. cp source destination 8. mv Moves or renames files and directories. mv oldname newname 9. cat Displays the contents of a file. cat filename 10. nano Opens a simple text editor. nano filename 11. vim A powerful text editor. vim filename 12. chmod Changes file permissions. chmod 755 filen...