Saturday, September 30, 2006

Cisco CCNA Exam Tutorial: The Best Time To Schedule Your Exam

In preparing for CCNA exam success, one of the basic steps is to schedule your exam! And when should you do that?

Schedule your exam NOW.

I can hear you now -- " Why should I schedule my exam now? I haven’t started studying yet!"

From experience, I can tell you that this technique works. People complain about timetables and deadlines, but the truth is that people do their best work with a deadline. “Stress” is not the dirty word that we’ve made it out to be. A diamond is only a lump of coal that was put under pressure.

I wish I had a nickel for every time I’ve heard this:

"I’ll schedule my exam when I’m ready."

You know when "ready" is? For many people, NEVER. I know someone who’s been preparing for his CCNA for years – literally! He’s going to schedule that exam when he’s ready. He’s been getting ready for years!

By scheduling your exam now, you give yourself a mental deadline. You’ll be surprised at how focused your mind becomes when you know the date of your exam before you start. I have used this technique for my CCNA, CCNP, and CCIE exams. It will work for you!

You can schedule your exam with Prometric or VUE right now! Just search for either of those companies in your favorite search engine, and register online today.

Both sites have test center locators, so no matter where you are in the world, you can find the testing center nearest you.

We all have times of the day that we’re mentally sharper than others. I personally am a "morning person", so I always schedule my exams for first thing in the morning. If you’re stronger in the afternoon, schedule an afternoon exam. Regardless of the time of day you’re going to take the exam – schedule it now, right now!

In preparing for CCNA exam success, one of the basic steps is to schedule your exam! And when should you do that?

Schedule your exam NOW.

I can hear you now -- " Why should I schedule my exam now? I haven’t started studying yet!"

From experience, I can tell you that this technique works. People complain about timetables and deadlines, but the truth is that people do their best work with a deadline. “Stress” is not the dirty word that we’ve made it out to be. A diamond is only a lump of coal that was put under pressure.

I wish I had a nickel for every time I’ve heard this:

"I’ll schedule my exam when I’m ready."

You know when "ready" is? For many people, NEVER. I know someone who’s been preparing for his CCNA for years – literally! He’s going to schedule that exam when he’s ready. He’s been getting ready for years!

By scheduling your exam now, you give yourself a mental deadline. You’ll be surprised at how focused your mind becomes when you know the date of your exam before you start. I have used this technique for my CCNA, CCNP, and CCIE exams. It will work for you!

Sunday, September 24, 2006

Cisco Certification: The Importance Of Building Your Own Practice Lab

CCNAs and CCNA candidates hear it all the time: “Get some hands-on experience”. From my personal experience climbing the Cisco certification ladder, I can tell you firsthand that there is no learning like hands-on learning. No simulator in the world is going to give you the experience you will get cabling and configuring your own routers.



Whenever I mention this to one of my students, they always say it costs too much. The truth is, it is cheaper now to build your own CCNA and CCNP lab than it has ever been. The secret? Used routers.



The word “used” turns off a lot of people not many of us buy used computers or used servers. Cisco routers, though, are robust I personally own a Cisco 4000 router that I use as a Frame Relay switch in my lab that I’ve had for about four years, and I’ve never had a problem with it.



The good news for current CCNA and CCNP candidates interested in building their own labs is that used Cisco equipment has never been more plentiful or cheaper. eBay is a good way to get an idea of what’s out there and what the prices are, but you don’t have to assemble your lab one piece at a time. Many eBay vendors who sell used Cisco equipment sell ready-made CCNA and CCNP labs for one price, including cables. I personally recommend www.ciscokits.com and www.horizondatacom.com for your lab needs, and there are many other vendors as well.



And should you desire to sell your lab after you complete your certification, you can either negotiate a price with the vendor who sold it to you, or you can sell it yourself on ebay. It’s my experience that 95% of candidates who earn their CCNA go on to pursue their CCNP within one year, though, so don’t sell it too quickly.



In the end, you spend only a few hundred dollars, and you gain invaluable experience and knowledge that will help you both in your certification quest and your job performance. Having been there, I can tell you that you will learn much more from actually configuring and cabling your own equipment than you ever will from any simulation of the real thing.

CCNAs and CCNA candidates hear it all the time: “Get some hands-on experience”. From my personal experience climbing the Cisco certification ladder, I can tell you firsthand that there is no learning like hands-on learning. No simulator in the world is going to give you the experience you will get cabling and configuring your own routers.



Whenever I mention this to one of my students, they always say it costs too much. The truth is, it is cheaper now to build your own CCNA and CCNP lab than it has ever been. The secret? Used routers.



The word “used” turns off a lot of people not many of us buy used computers or used servers. Cisco routers, though, are robust I personally own a Cisco 4000 router that I use as a Frame Relay switch in my lab that I’ve had for about four years, and I’ve never had a problem with it.

Wednesday, September 13, 2006

What is a Virtual Private Network?

A Virtual Private Network, or VPN, is a way of using the Internet to provide remote users with secure access to their network. Data is scrambled as it’s sent through the Internet ensuring privacy. In other words a business which may be located in New York can use the company’s network to send encrypted information to different branches of the business located in other parts of the country.

Information doesn’t have to be sent office to office either. An individual choosing to work at home can have all of the same amenities (programs, email, etc) as working in the office, thanks to a VPN. Because all data is scrambled prior to being sent, and decrypted once it reaches its destination, there’s no fear of interception since only authorized users can view the information.

With a VPN, data is carried over the Internet through a process called tunneling. Tunneling is when a package is placed within another package before it’s encrypted and sent to its destination. The path in which the packet travels is called a tunnel.

A firewall can be set up to prevent a barrier between a private network and the Internet. The firewall can be set up to only accept certain information and also reject packets containing unwanted information. For purposes of security, the firewall should be set up prior to installing a VPN.

The Benefits of a VPN are:

- Increased Productivity
- Improved Security
- Lower operational costs
- Simplified Network Topology
- Opportunities for Global Networking

While there are plenty of pros to setting up and using a Virtual Private Network, there’s also a con or two. For instance, someone with in-depth knowledge of network security and dealing with VPNs will have to be on staff or specialized training will be required to ensure things run smoothly. Also, different vendors might provide different technologies so not all networks may be compatible. For sure there are kinks to be worked out. Once they are however, it would be worth it to look into Virtual Private Networking for your business - especially if the benefits outweigh the risks.

A Virtual Private Network, or VPN, is a way of using the Internet to provide remote users with secure access to their network. Data is scrambled as it’s sent through the Internet ensuring privacy. In other words a business which may be located in New York can use the company’s network to send encrypted information to different branches of the business located in other parts of the country.

Information doesn’t have to be sent office to office either. An individual choosing to work at home can have all of the same amenities (programs, email, etc) as working in the office, thanks to a VPN. Because all data is scrambled prior to being sent, and decrypted once it reaches its destination, there’s no fear of interception since only authorized users can view the information.

With a VPN, data is carried over the Internet through a process called tunneling. Tunneling is when a package is placed within another package before it’s encrypted and sent to its destination. The path in which the packet travels is called a tunnel.

A firewall can be set up to prevent a barrier between a private network and the Internet. The firewall can be set up to only accept certain information and also reject packets containing unwanted information. For purposes of security, the firewall should be set up prior to installing a VPN.

The Benefits of a VPN are:

- Increased Productivity
- Improved Security
- Lower operational costs
- Simplified Network Topology
- Opportunities for Global Networking

While there are plenty of pros to setting up and using a Virtual Private Network, there’s also a con or two. For instance, someone with in-depth knowledge of network security and dealing with VPNs will have to be on staff or specialized training will be required to ensure things run smoothly. Also, different vendors might provide different technologies so not all networks may be compatible. For sure there are kinks to be worked out. Once they are however, it would be worth it to look into Virtual Private Networking for your business - especially if the benefits outweigh the risks.

Tuesday, September 12, 2006

Cisco CCNP / BSCI Certification Exam: Five OSPF Details You Must Know

Preparing for your BSCI exam on your way to the Cisco CCNP certification, you can quickly get overwhelmed by the details! Here are five commonly overlooked points you should keep in mind when it comes to your OSPF studies.

The virtual link command includes the area number of the transit area, and if authentication is being used on Area 0, the virtual link command must include the authentication statement. Since the virtual link is a logical extension of Area 0, it stands to reason that it has to be configured with the authentication type and password configured on Area 0.

OSPF requires no seed metric when routes are being redistributed into an OSPF domain. The default cost for such routes is 20, but you do need to use the "subnets" option if you want to redistribute subnets into OSPF.

There are two kinds of external OSPF routes. The default, E2, reflects the cost of the path from the ASBR to the external destination. The other option, E1, has a cost reflecting the entire path from the local router to the external destination.

When configuring stub areas, each router in the area must agree that the area is stub. For a total stub area, only the ABR needs to be configured with the "no-summary" option, but all routers in the area still must agree that the area is stub.

Routers in a stub area will have a default route to use to reach external destinations; routers in total stub areas will have a default route to use in order to reach both external and inter-area networks.

The BSCI exam and CCNP certification require a great deal of dedication and hard work. Keep studying and paying attention to the details, and you will get there!

Preparing for your BSCI exam on your way to the Cisco CCNP certification, you can quickly get overwhelmed by the details! Here are five commonly overlooked points you should keep in mind when it comes to your OSPF studies.

The virtual link command includes the area number of the transit area, and if authentication is being used on Area 0, the virtual link command must include the authentication statement. Since the virtual link is a logical extension of Area 0, it stands to reason that it has to be configured with the authentication type and password configured on Area 0.

OSPF requires no seed metric when routes are being redistributed into an OSPF domain. The default cost for such routes is 20, but you do need to use the "subnets" option if you want to redistribute subnets into OSPF.

There are two kinds of external OSPF routes. The default, E2, reflects the cost of the path from the ASBR to the external destination. The other option, E1, has a cost reflecting the entire path from the local router to the external destination.

When configuring stub areas, each router in the area must agree that the area is stub. For a total stub area, only the ABR needs to be configured with the "no-summary" option, but all routers in the area still must agree that the area is stub.

Thursday, September 07, 2006

Creating a Fool Proof Data Archive System with a Magnetic Tape Library

Most businesses have laws and regulations for how long specific data must be stored, but still many companies don’t have a tape drive, tape libraries, secondary storage or any plan for archiving data. Even if your industry doesn’t have specific requirements, keeping a well documented business information library is a safe bet. Recently, the residential building company Urban Renaissance Agency realized that it had lost archived building plan data for 555 (31%) of its condos due to “insufficient storage measures.”

The mistake not only made the news, but will cost the company millions to recover. Data storage tends to be one of those problems that many individuals and businesses don’t act on until a loss happens. Most people agree that backing up data is important, but feel the process will be too difficult and the issue stays below the radar until a crisis occurs. On the contrary, it’s surprisingly simple to back up, store, and recover data using a tape backup drive and magnetic tape libraries to build a foolproof information archive system.

A tape drive is a very reliable method of recording and archiving data. Using a magnetic tape cartridge, the tape drive scans all of your computer’s files and copies them onto the tape. Businesses might choose to backup files daily, weekly, or monthly. The process can be set up to be manually run or to automatically update at a certain time of the day.

The most important functionality of a tape library is that you have a record of ‘snapshots’ as data appeared at regular intervals throughout history. This means if a customer has a dispute over a contract or a policy from last year, you can pull a tape from your tape library and find the piece of data exactly as it looked one year ago.

Another benefit to storing your data on tape is that cartridges can be stored off site and/or in fire and flood proof containers. More often than not, secondary storage is usually found in the same building as the original data, and often in the same location as the server. With a tape backup drive, once the tape is made the tape cartridge can then be stored anywhere. Because the tapes are there for reference and not part of daily use, they can easily be locked away and stored in disaster and theft resistant safes.

Tape drives come with a variety of options including file cataloging features; a comparison feature that will check the data on the drive against a current document, and are available in a variety of speeds. The tapes you’ll use to build your tape libraries will vary as well. It’s recommended to discuss your options with a data storage specialist who can help you build a system around your budget and your unique business needs.

Most businesses have laws and regulations for how long specific data must be stored, but still many companies don’t have a tape drive, tape libraries, secondary storage or any plan for archiving data. Even if your industry doesn’t have specific requirements, keeping a well documented business information library is a safe bet. Recently, the residential building company Urban Renaissance Agency realized that it had lost archived building plan data for 555 (31%) of its condos due to “insufficient storage measures.”

The mistake not only made the news, but will cost the company millions to recover. Data storage tends to be one of those problems that many individuals and businesses don’t act on until a loss happens. Most people agree that backing up data is important, but feel the process will be too difficult and the issue stays below the radar until a crisis occurs. On the contrary, it’s surprisingly simple to back up, store, and recover data using a tape backup drive and magnetic tape libraries to build a foolproof information archive system.

A tape drive is a very reliable method of recording and archiving data. Using a magnetic tape cartridge, the tape drive scans all of your computer’s files and copies them onto the tape. Businesses might choose to backup files daily, weekly, or monthly. The process can be set up to be manually run or to automatically update at a certain time of the day.

The most important functionality of a tape library is that you have a record of ‘snapshots’ as data appeared at regular intervals throughout history. This means if a customer has a dispute over a contract or a policy from last year, you can pull a tape from your tape library and find the piece of data exactly as it looked one year ago.

Another benefit to storing your data on tape is that cartridges can be stored off site and/or in fire and flood proof containers. More often than not, secondary storage is usually found in the same building as the original data, and often in the same location as the server. With a tape backup drive, once the tape is made the tape cartridge can then be stored anywhere. Because the tapes are there for reference and not part of daily use, they can easily be locked away and stored in disaster and theft resistant safes.

Saturday, September 02, 2006

Computer Networking Fundamentals

A computer network is a collection of two or more computers with communication between them through a medium. The communication medium can be through radio waves, wires, infrared, optical fibers etc.

Computer network is an integral part of our daily lives, with the most important reason being that of communication. The use of computer networking is to share resources like fax machines, printers, modems, files etc., and its other uses are database server, computer server, email, chat, internet etc. The computer to which the resources are attached is called the server and the other computers that access the resource are called clients. In peer-to-peer computer networks there are no servers.

The sharing of fax machines, printers, and modems amongst many computers and users reduce the operational cost. A database on a computer network is a very important application as it stores and runs many important data and jobs. Emails and chats can be used for instantaneous communication and sending of files on a computer network.

The computer networks are classified, depending upon the size, as Local Area Networks (LAN), Wide Area Networks (WAN), Metropolitan Area Networks (MAN) and Personal Area Networks (PAN). The topology (topology is the way the computer networks and network resources are connected) of the networking can be classified as Bus Network, Ring Network and Star Network.

The networking hardware basically consists of wiring, network cards and a hub. Computer network cards are required so that one computer can understand what the other computer is “talking”. Network cards have a unique MAC address to identify computers on a computer network. Hubs connect all the computers in the network. Hubs can also be used to connect to other hubs to increase the size of the computer network. Two computers can be connected using Ethernet cards or phone lines or power lines for communication, with hardware kits available at roughly a cost of $100.

As the number of computers in an office or a home increases, so do the number of cables, so wireless networking is a viable solution. In wireless networking radio transreceivers or infrared signals are used to communicate between computers and devices. Examples of wireless networking include Wi-fi and Bluetooth technology, though there may be security issues involved in wireless networking. However there definitely is a stronger preference towards wireless networking nowadays among consumers.

Computer networks have added a new dimension to the 21st century. Today the cyber world is much faster and wider than the real world. This has all been made possible due to computer networks. Computer networks have revolutionized business, communication, travel, research, defense, society and almost all human endeavors. The evolution of computer networks has helped the technological revolution take a big leap forward.

A computer network is a collection of two or more computers with communication between them through a medium. The communication medium can be through radio waves, wires, infrared, optical fibers etc.

Computer network is an integral part of our daily lives, with the most important reason being that of communication. The use of computer networking is to share resources like fax machines, printers, modems, files etc., and its other uses are database server, computer server, email, chat, internet etc. The computer to which the resources are attached is called the server and the other computers that access the resource are called clients. In peer-to-peer computer networks there are no servers.

The sharing of fax machines, printers, and modems amongst many computers and users reduce the operational cost. A database on a computer network is a very important application as it stores and runs many important data and jobs. Emails and chats can be used for instantaneous communication and sending of files on a computer network.

The computer networks are classified, depending upon the size, as Local Area Networks (LAN), Wide Area Networks (WAN), Metropolitan Area Networks (MAN) and Personal Area Networks (PAN). The topology (topology is the way the computer networks and network resources are connected) of the networking can be classified as Bus Network, Ring Network and Star Network.

The networking hardware basically consists of wiring, network cards and a hub. Computer network cards are required so that one computer can understand what the other computer is “talking”. Network cards have a unique MAC address to identify computers on a computer network. Hubs connect all the computers in the network. Hubs can also be used to connect to other hubs to increase the size of the computer network. Two computers can be connected using Ethernet cards or phone lines or power lines for communication, with hardware kits available at roughly a cost of $100.

As the number of computers in an office or a home increases, so do the number of cables, so wireless networking is a viable solution. In wireless networking radio transreceivers or infrared signals are used to communicate between computers and devices. Examples of wireless networking include Wi-fi and Bluetooth technology, though there may be security issues involved in wireless networking. However there definitely is a stronger preference towards wireless networking nowadays among consumers.

Computer networks have added a new dimension to the 21st century. Today the cyber world is much faster and wider than the real world. This has all been made possible due to computer networks. Computer networks have revolutionized business, communication, travel, research, defense, society and almost all human endeavors. The evolution of computer networks has helped the technological revolution take a big leap forward.