IT Certification and Training Blog

The Seven Layers of Networking – Part III

Posted by Kelson Lawrence on Apr 2, 2014 9:27:00 AM

By Kailin Acheson

The previous two parts of this blog, Part I and Part II, covered the seven layers of the Open Systems Interconnection (OSI) model. This installment will cover the four layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) model and contrast the TCP/IP model with the OSI model.

Read More

Tags: The Internet Layer, The Network Access Layer, The Seven Layers of Networking – Part III, The Transport Layer, Kailin Acheson, The Application Layer, Inter-Layer and Intra-Layer Communication

The Seven Layers of Networking – Part II

Posted by Kelson Lawrence on Mar 25, 2014 2:29:00 PM

By Kailin Acheson

In Part I of The Seven Layers of Networking blog, John began a discussion about the layers of the Open Systems Interconnection (OSI) model. The first four layers, which you can read about in that blog, are the Physical layer, the Data Link layer, the Network layer, and the Transport layer. In network discussions, you'll most often encounter the first four layers. The final three layers, the Session layer, the Presentation layer, and the Application layer, are not as commonly discussed but are still essential to a network. This blog will cover those three layers and the encapsulation process that occurs when one host communicates with another. Then you'll have to stay tuned for Part III, which will cover a related-yet-different layered model, the Transmission Control Protocol/Internet Protocol (TCP/IP) model.

Read More

Tags: application layer, encapsulation within layers, presentation layer, Seven Layers of Networking Part 2, session layer, Kailin Acheson

13 in '13 | Recapping the Year at Boson

Posted by Kelson Lawrence on Jan 2, 2014 9:10:00 AM

By Kailin Acheson

2013 has flown by, and 2014 (our 15th anniversary!) is close on its heels. As we start the new year, I thought I'd share my top 13 highlights from the Boson World in 2013.

Read More

Tags: certification, Boson 2013 recap, NetSim 9, practice exams, courseware, Kailin Acheson

Network Security Part 2: Threats

Posted by Kelson Lawrence on Apr 23, 2013 8:10:00 AM

By Kailin Acheson

If you are a network administrator, you might be familiar with various types of attacks that malicious users might launch against the network in an attempt to destroy it. These attacks, described in Network Security Part 1: Attacks, include passive, active, close-in, insider, and distribution attacks. As a network administrator, you should also be familiar with possible threats to the network. These include physical threats, reconnaissance attacks, and access attacks.

Read More

Tags: physical threats, reconnaissance attacks, access attacks, hardware threats, environmental threats, administrative threats, Network Security, electrical threats, Kailin Acheson

Network Security Part 1: Attacks

Posted by Kelson Lawrence on Apr 17, 2013 8:44:00 AM

By Kailin Acheson

If you are the administrator of a network, you likely have been thinking about, and possibly worrying about, potential network attacks. It's much more rewarding (and less stressful) to protect a network than to fix it (unless, as Tim Charlton wrote in one of his recent blogs, you like the pressure. It might be helpful to try to answer the following questions as you consider attacks on the network:

Read More

Tags: active attacks, close-in attacks, distribution attacks, Network Security, passive attacks, insider attacks, Kailin Acheson

Back to the Basics: Networks and Topologies

Posted by Kelson Lawrence on Apr 3, 2013 2:30:00 PM

By Kailin Acheson and Delana Hallstedt

As you begin the process of setting up a network, you will likely first need to figure out how to best connect the devices on the network so that communications are optimal. You might have to do a little research, planning, and organizing to make sure everything is positioned to maximize performance on that network. One good place to start is with the devices you will need to deploy. You can ask a few key questions to help point you in the right direction, such as the following:

Read More

Tags: Delana Hallstedt, Networks and Topologies, PANs, Personal area networks, Metropolitan area networks, Kailin Acheson, LANs, MANs, WANs, Local area networks, Wide area networks

Back to the Basics: Device Access Modes Part 2

Posted by Kelson Lawrence on Mar 13, 2013 1:05:00 PM

By Kailin Acheson

In Part 1 of the Device Access Modes blog, we looked at some fundamentals: switches, routers, and access modes. To recap those modes quickly, user EXEC mode is represented by the Switch> prompt (or similar) and does not allow configuration changes. Privileged EXEC mode is represented by the Switch# prompt (or similar) and does allow configuration changes.

Read More

Tags: Device Access Modes, Interface Configuration Mode, Line Configuration Mode, Router Configuration Mode, Kailin Acheson, Global Configuration Mode

Back to the Basics: Device Access Modes Part 1

Posted by Kelson Lawrence on Mar 4, 2013 3:03:00 PM

By Kailin Acheson

It's been said that legendary coach Vince Lombardi once stood in front of his team of professional football players and stated, "Gentlemen, this is a football." That is starting at the beginning, with the fundamentals. Today we are going to discuss some fundamentals of networking: switches, routers, user EXEC mode, and privileged EXEC mode.

Read More

Tags: Networking Basics, switches, user EXEC mode, Device Access Modes, routers, privileged EXEC mode, Kailin Acheson