Thursday, December 17, 2009

Sweet Deal on Windows 7 - Tip from John Hlotke!

For a limited time, students with a valid .edu email can get Windows 7 for $29.99. This offer expires January 3, 2010 at 12:00 p.m. This is the full install with no previous version needed.

The details on the program can be found here:

http://www.win741.com/

This is the official Microsoft link to the above page:

http://www.microsoft.com/student/en/us/software/windows-7.aspx

Here is a link the the Windows 7 upgrade advisor so you can check hardware compatibility:

http://www.microsoft.com/windows/windows-7/get/upgrade-advisor.aspx

Wednesday, December 16, 2009

CCNA Certified Network Engineer - Chicago, IL

Modis is currently seeking a qualified CCNA Certified Network Engineer for exciting contract opportunities with our nationwide Telecommunications clients in the greater Chicagoland area.


PROJECT DESCRIPTION

The CCNA Network Engineer will be working to provide LAN and WAN design, implementation and support services to enterprise business customers in the Chicago area.

Candidates must have excellent Cisco Networking experience, including a thorough understanding of Layer 1-Layer 3 technologies. Minimum technical requirements include demonstrated real-world experience in the installation and support of Cisco Enterprise Routers and Cisco Catalyst Switches at a customer site. In addition to Cisco Routers and Switches, candidates should have a good foundation in data circuits and transports.

Strong Frame Relay, ATM, IPFR and MPLS experience is required in addition to strong Cisco Router configurations using advanced WAN protocols BGP, OSPF and EIGRP.

Candidates should also have experience working with Network Management & Monitoring Tools, such as HP OpenView, VitalNet, NetView, etc as well as ticketing tools (Remedy, Peregrine, HEAT, Magix).

The ideal candidate will be highly customer focused with demonstrated experience in the above areas.


REQUIRED SKILLS & CERTIFICATIONS

- An active CCNA certification or higher is required.
- Minimum 5 years hands-on experience with Cisco Routers & Switches, including configurations with BGP, OSPF an EIGRP protocols
- Intermediate experience with ATM, Frame Relay, VoIP and MPLS is required
- Strong Layer 1-Layer 3 support
- Experience with WAP/WiFi and Wireless protocols is preferred
- Experience with VPN concentrators/Firewalls and security is preferred

ADDITIONAL INFORMATION/HOW TO APPLY


For immediate consideration, please respond to (see below) with your updated MS Word resume and contact information.

Pay Rate: $30-$38/hour W2
Duration: 12 Months 36 Months
Locations: Arlington Heights, IL; Lisle, IL; Hickory Hills, IL


*Please note that qualified candidates MUST be eligible to work in the US for any employer without the need for visa sponsorship. We offer W2 rates only so please no Independent Contractors, Corporation or Recruiter inquiries*




Desired Skills:


Non-Tech Skills:


About Modis, Inc. - Chicago:
Modis is one of the world's largest and most respected providers of Information Technology Resource Management (ITRM) services and solutions. Today, Modis delivers world-class ITRM solutions to over 1,000 clients in 60 markets throughout the United States, Canada, the United Kingdom, and Western Europe.


Pay Rate: 30/ph - 38/ph
Start Date: ASAP
Emp. Type: Contract
Duration: 1-3 years
# of Openings: 1
Location: Chicago, IL -
Overtime Pay: None
Job Number: 36087716 : JSCCNAIL
Date Posted: 12/16/2009

Modis, Inc. - Chicago
Other jobs with this company.

Attention: Recruiter
One Oakbrook Terrace
Suite 708
Oak Brook Terrace, IL 60181
Call: 630-268-1445
Email: Send an email to Heather.Thompson.7D258.84D58@mail.jobserve.com

Thursday, December 10, 2009

More Than You May Have Wanted To Know on . . .


The Real Scoop on the OSPF Reference Bandwidth by Jeff Suggs:

I think I figured out something about the OSPF cost calculation when the reference bandwidth is changed. I have not completely tested this out yet, but this is what I am thinking.

It actually is not completely related to changing the reference bandwidth, but that is where we see the problem show up from the examples we are using.

The cost formula is given by the following:

cost=reference bandwidth/bandwidth = 10^8/bw in Kbps

There is however a limitation on the size of cost, and that is 16 bits, which calculates to

When we were trying this out tonight in lab, it appeared maybe our limit was somewhere between 256k and 300k, but the calculation shows 152588 bps, so I am not entirely sure.

With the bandwidths we were configuring (128kbps and 256kbps) we did not see an issue with the default bandwidth. However, when we changed to 1010 = 10000, this is now going to be an issue. I suspect if we dropped our bandwidths to 1280 bps and 2560 bps we would see the same issue with the default ref bw.

When calculating the different costs as we travel through the routing table, if any one cost is over this value of 65535, then it will use 65535 as the value for that portion of the cost.

Using slide 92 (see above), 93, and 100 from Rick's Chapter 11 presentation, I have figured out the calculation

Slide 93 with the default bandwidth of 108

R1# show ip route

Gateway of last resort is 0.0.0.0 to network 0.0.0.0

192.168.10.0/30 is subnetted, 3 subnets
C 192.168.10.0 is directly connected, Serial0/0/0
C 192.168.10.4 is directly connected, Serial0/0/1
O 192.168.10.8 [110/1171] via 192.168.10.6, 00:00:58, Serial0/0/1
172.16.0.0/16 is variably subnetted, 2 subnets, 2 masks
O 172.16.1.32/29 [110/391] via 192.168.10.6, 00:00:58, Serial0/0/1
C 172.16.1.16/28 is directly connected, FastEthernet0/0
172.30.0.0/30 is subnetted, 1 subnets
C 172.30.1.0 is directly connected, Loopback1
10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
O 10.10.10.0/24 [110/1172] via 192.168.10.6, 00:00:58, Serial0/0/1
C 10.1.1.1/32 is directly connected, Loopback0
S* 0.0.0.0/0 is directly connected, Loopback1

For the 192.168.10.8 with a cost of 1171 the calculation would be:

cost = 10^8/256000 + 10^8/128000 = 390 + 781 = 1171

For the 172.16.1.32 with a cost of 391 the calculation would be:

cost = 10^8/256000 + 10^8/1000000 = 390 + 1 = 391

For the 10.10.10.0 with a cost of 1172 the calculation would be:

cost = 10^8/256000 + 10^8/128000 + 10^8/100000000 = 390 + 781 + 1 = 1172

Now we change our default reference bandwidth to “10000” or 1010.

The new routing table for R1 is given from slide 100
R1# show ip route
Gateway of last resort is 0.0.0.0 to network 0.0.0.0

192.168.10.0/30 is subnetted, 3 subnets
C 192.168.10.0 is directly connected, Serial0/0/0
C 192.168.10.4 is directly connected, Serial0/0/1
O 192.168.10.8 [110/104597] via 192.168.10.6, 00:01:33, S0/0/1
172.16.0.0/16 is variably subnetted, 2 subnets, 2 masks
O 172.16.1.32/29 [110/39162] via 192.168.10.6, 00:01:33, S0/0/1
C 172.16.1.16/28 is directly connected, FastEthernet0/0
172.30.0.0/30 is subnetted, 1 subnets
C 172.30.1.0 is directly connected, Loopback1
10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
O 10.10.10.0/24 [110/65635] via 192.168.10.2, 00:01:33, S0/0/0
C 10.1.1.1/32 is directly connected, Loopback0
S* 0.0.0.0/0 is directly connected, Loopback1


So the new calculations are as follows:
For the 192.168.10.8 with a cost of 104597 the calculation would be

cost = 10^10/256000 + 10^10/128000 = 39062 + 78125 = 117187

but this is not what the route shows. Since the cost of 78125 is larger than 65535 (2^16 - 1 = 65535) we need to reduce that portion of the route to 65535 as follows:

New cost = 10^10/256000 + 10^10/128000 = 39062 + 65535 = 104597

which NOW MATCHES our routing table.

For the 172.16.1.32 with a cost of 39162 the calculation would be:

cost = 10^10/256000 + 10^10/1000000 = 39062 + 100 = 39162

There is no problems with this one, as we are under the 16 bit requirement for cost.


For the 10.10.10.0 with a cost of 65635 the calculation would be:

cost = 10^10/64000 + 10^10/100000000 = 156250 + 100

which we change to 65535 + 100 = 65635


Notice on this route, that it now goes out the s0/0/0 interface on R1 when it should have really gone out the s0/0/1 interface, but due to the rounding down of the 64k link, it appears to be a much lower cost.

OK, that is what I think it is…..I am afraid to now admit this, but John might be right…I might be a nerd.

Thursday, December 3, 2009

Joanne with CCNA2 RouterGods!


Photo by John Rodriguez

auto-cost reference-bandwidth command

This week, in our discussion of OSPF, we learned that Cisco uses a reference bandwidth of 10^8 divided by the interface bandwidth to determine the cost of a link. Using this formula, the cost of a FastEthernet link would be 1.

We also learned that using this calculation will not work for GigabitEthernet because OSPF will assign the interface the same cost of 1. (The value will be less than one after the calculation, but OSPF will round the result to 1).

We can change the reference bandwidth using the auto-cost reference-bandwidth command. Below, I have changed the reference bandwidth value from 100 Mbps (the default) to 1000. The cost of the GigabitEthernet link after the change has a cost of 1 - 10^9/1000000000 (1GigaEthernet).

When I changed the reference bandwith again, this time to a default of 10000, the link shows up with a cost of 10, the cost of a 10GigabitEthernet link.

Before changing reference bandwith - the cost is less than 1 but gets rounded to 1 - same as 100Mbps FastEthernet link:

R2#show ip ospf interface GigabitEthernet 0/0
GigabitEthernet0/0 is up, line protocol is up
Internet Address 192.168.1.1/24, Area 0
Process ID 1, Router ID 192.168.1.1, Network Type BROADCAST, Cost: 1 Transmit Delay is 1 sec, State DR, Priority 1
Designated Router (ID) 192.168.1.1, Interface address 192.168.1.1
No backup designated router on this network
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
oob-resync timeout 40
Hello due in 00:00:03
Supports Link-local Signaling (LLS)
Cisco NSF helper support enabled
IETF NSF helper support enabled
Index 1/1, flood queue length 0
Next 0x0(0)/0x0(0)
Last flood scan length is 0, maximum is 0
Last flood scan time is 0 msec, maximum is 0 msec
Neighbor Count is 0, Adjacent neighbor count is 0
Suppress hello for 0 neighbor(s)
R2#

Change reference bandwidth to 1000 Mbps - 1 GigabitEthernet link:

R2(config)#router ospf 1
R2(config-router)#auto-cost reference-bandwidth 1000
% OSPF: Reference bandwidth is changed.
Please ensure reference bandwidth is consistent across all routers.
R2(config-router)#

After changing reference bandwith:

R2#show ip ospf interface GigabitEthernet 0/0
GigabitEthernet0/0 is up, line protocol is down
Internet Address 192.168.1.1/24, Area 0
Process ID 1, Router ID 192.168.1.1, Network Type BROADCAST, Cost: 1
Transmit Delay is 1 sec, State DOWN, Priority 1
No designated router on this network
No backup designated router on this network
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
oob-resync timeout 40
R2#

Change reference bandwidth to make the default 10000 Mbps or 10GigabitEthernet:


R2(config)#router ospf 1
R2(config-router)#auto-cost reference-bandwidth 10000
% OSPF: Reference bandwidth is changed.
Please ensure reference bandwidth is consistent across all routers.
R2(config-router)#


R2#show ip ospf interface GigabitEthernet 0/0
*Dec 4 02:48:13.967: %SYS-5-CONFIG_I: Configured from console by console
GigabitEthernet0/0 is up, line protocol is up
Internet Address 192.168.1.1/24, Area 0
Process ID 1, Router ID 192.168.1.1, Network Type BROADCAST, Cost: 10 Transmit Delay is 1 sec, State DR, Priority 1
Designated Router (ID) 192.168.1.1, Interface address 192.168.1.1
No backup designated router on this network
Timer intervals configured, Hello 10, Dead 40, Wait 40, Retransmit 5
oob-resync timeout 40
Hello due in 00:00:03
Supports Link-local Signaling (LLS)
Cisco NSF helper support enabled
IETF NSF helper support enabled
Index 1/1, flood queue length 0
Next 0x0(0)/0x0(0)
Last flood scan length is 0, maximum is 0
Last flood scan time is 0 msec, maximum is 0 msec
Neighbor Count is 0, Adjacent neighbor count is 0
Suppress hello for 0 neighbor(s)
R2#

Network Engineer - Chicago, IL

Role Description:
Our client has a complex network that interconnects offices in Amsterdam, Chicago, Sydney and Hong Kong with datacenters and exchanges in the major financial centers around the world. The senior network specialist is responsible for the design, implementation, maintenance and optimization of the networks within North America. These networks have to meet high standards on latency, availability and security. You will work with other network specialists in Europe and Asia on design standards and large projects that span the complete network. This role provides daily challenges, and no day is the same as the next. The possibility to make a large impact as part of a dedicated, dynamic team, both locally and globally, is unlike any other. Their flat culture encourages not only knowledge and best practice sharing, but also the opportunity to have your voice heard.

Key accountabilities:
-Design, test and implement new network infrastructures
-Improve the performance and availability of existing networks
-Maintain and develop monitoring systems
-Problem and incident management
-Prepare and execute network changes
-Create and maintain documentation
-Create reports regarding performance and availability
-Supporting role in UNIX and windows projects

Technical requirements:
-Bachelors Degree in Computer Engineering or related field
-Advanced knowledge of networking: TCP/IP, multicast, routing, address translation, security solutions
-Advanced knowledge of Cisco equipment and configuration (CCNP level)
-5 years hands on experience with solving problems and incidents
-3 years hands on experience with designing and implementing complex networks
-Knowledge of monitoring solutions
-Good communication skills, both internal (IT, traders) and external (providers)
-Flexible working attitude (changes outside office hours, meeting deadlines, changing priorities)
-Heavy documentation skill set

Preferred Skills:
-Working experience in a financial environment
-Knowledge of CiscoWorks and Visio
-Knowledge of Netscreen firewalls
-Knowledge of ITIL processes
-Jack of all trades mentality - Good working skill set of general IT comes in handy when problems spill out into other areas
-Out of the box thinking - textbook solutions are not always the best answer

Success Factors:
-Must be a self starter, and able to work productively under minimal supervision.
-Strong problem solving skill set, being able to break down an issue to find the root cause
-Ability to want to (re)design solutions to work more efficiently/simply
-Sense of urgency a must
-Time management skills - ability to drop everything to solve an urgent issue and pick up where you left off when time allows
-Knowledge of Financial Markets (particularly derivatives) is an advantage, and a passion for the industry is essential
-Excellent trouble-shooting and diagnostic skills; ability to solve problems creatively and proactively
-Strong communication and relationship building skills are vital
-Team player

Send your resume to apersico@orion-recruiting.com

Saturday, November 21, 2009

CCNP Trading Network Engineer - Chicago, IL

CCNP Trading Network Engineer - Chicago, IL
A growing trading firm in Chicago is actively seeking a CCNP with prior experience in the financial industry. Experience must include working with Multicast, EIGRP, OSPF, and high performance, low latency networking.

Permanent role in Chicago's loop. No sponsorship available.
e-mail me: rhale@orion-recruiting.com

Thursday, November 19, 2009

Per-Destination vs. Per-Packet Load Balancing

You can set load-balancing to work per-destination or per-packet. Per-destination load balancing means the router distributes the packets based on the destination address. Given two paths to the same network, all packets for destination1 on that network go over the first path, all packets for destination2 on that network go over the second path, and so on. This preserves packet order, with potential unequal usage of the links. If one host receives the majority of the traffic all packets use one link, which leaves bandwidth on other links unused. A larger number of destination addresses leads to more equally used links. To achieve more equally used links use IOS software to build a route-cache entry for every destination address, instead of every destination network, as is the case when only a single path exists. Therefore traffic for different hosts on the same destination network can use different paths. The downside of this approach is that for core backbone routers carrying traffic for thousands of destination hosts, memory and processing requirements for maintaining the cache become very demanding.

Per-packet load-balancing means that the router sends one packet for destination1 over the first path, the second packet for (the same) destination1 over the second path, and so on. Per-packet load balancing guarantees equal load across all links. However, there is potential that the packets may arrive out of order at the destination because differential delay may exist within the network. In Cisco IOS software, except the release 11.1CC, per packet load balancing does disable the forwarding acceleration by a route cache, because the route cache information includes the outgoing interface. For per-packet load balancing, the forwarding process determines the outgoing interface for each packet by looking up the route table and picking the least used interface. This ensures equal utilization of the links, but is a processor intensive task and impacts the overall forwarding performance. This form of per-packet load balancing is not well suited for higher speed interfaces.

Per-destination or per-packet load-balancing depends on the type of switching scheme used for IP packets. By default, on most Cisco routers, fast switching is enabled under interfaces. This is a demand caching scheme that does per-destination load-balancing. To set per-packet load-balancing, enable process switching (or disable fast switching), use these commands:

Router# config t
Router(config)# interface Ethernet 0
Router(config-if)# no ip route-cache
Router(config-if)# ^Z

Now the router CPU looks at every single packet and load balances on the number of routes in the routing table for the destination. This can crash a low-end router because the CPU must do all the processing. To re-enable fast switching, use these commands:

Router# config t
Router(config)# interface Ethernet 0
Router(config-if)# ip route-cache
Router(config-if)# ^Z

http://www.cisco.com/en/US/tech/tk365/technologies_tech_note09186a0080094820.shtml

Wednesday, November 18, 2009

Network Engineer CCNP CCNA - Chicago

Address: Chicago, IL 60689 (map)
Date Listed: 11/03/09
Job Type: Full-time

Company Request Technology, LLC
Position Title Network Engineer CCNP CCNA CJ NetworkTrade
Job Code 2876469
Job Location Chicago, IL -
Description


Prestigious Proprietary Trading Firm, located in the Chicago Loop, is currently seeking an experienced Network Engineer. Candidate will be part of the global technology and infrastructure team and contribute to cutting edge technology. Some of the responsibilities will include design, install, and support of Routing, Switching, and security/VPN technologies in the WAN/LAN environments. Abilities to work effectively as a part of a team and excellent communication skills are crucial in this role. Experience and/or interest working in the Financial Trading industry are a plus.


QUALIFICATIONS


*Minimum of 3 years in a technical networking environment

*Experience with designing, configuring and troubleshooting complex network backbones

*Experience in IGP and BGP routing protocols (EIGRP, OSPF, RIP, and BGP) in a Cisco environment

*Experience in VLAN technology, VTP and STP protocols

*Experience in Access Control Lists, Cisco Firewalls, VPN technologies and other security technologies

*Solid understanding of Cisco 2600, 2800, 3600 Routers and 3550, 3560 Switches Experience with 7200, 6500, and 7600 is a plus

*Familiarity with private lines, T1, T3, and OC technologies

*Experience in Metro-Ethernet technologies

*Experience in network monitoring, management tools

*Knowledge and experience in multicast technology is a plus

*Knowledge of VOIP and QoS is a plus

*Market Data Integration knowledge is a plus

*Work with Vendors to resolve network related issues

*Documentation and design of current and new installations

*Working knowledge of public and private peering.

*Functional knowledge of cable standards, multi/single mode fiber

*Plan and implement future installations of network equipment and capacity planning

*High-level analysis and troubleshooting of network infrastructure



Desired Skills:


Non-Tech Skills:


About Request Technology, LLC:

Since 1984, Request Technology has been successfully placing thousands of people in rewarding IT positions throughout the United States. How? Experience is the key. REQUEST's executive recruiters are established Associate's, each with years of in-depth recruiting experience, many of whom have practical industry experience. They stay abreast of trends -- which offer you extensive knowledge of what's going on in the field. At REQUEST, our recruiters also partner with our clients - which include Fortune 500 companies as well as ambitious entrepreneurial businesses whose growth and success offer exciting opportunities. Our clients invest significant resources while providing their employees with the latest technologies resulting in development and career advancement.



Pay Rate: 85k-110k; 10-15% Bonus
Start Date: ASAP
Emp. Type: Full Time
# of Openings: 1
Location: Chicago, IL -
Overtime Pay: None
Job Number: 35781286 : JS2323622/CJ-NETWORKTRADE
Date Posted: 11/1/2009

Request Technology, LLC

Other jobs with this company.

Attention: Recruiter

200 East 5th Avenue

Suite 116

Naperville, IL 60563
Call: 630-717-5865
Email: Send an email to Craig.Johnson.E5F96.7A91A@mail.jobserve.com



Ad ID: 438837

WAN Engineer - Chicago, IL

Job Title: WAN Engineer
Company Name: Make Corporation
Location: Chicago, IL
Profession: Network Design/Engineering

Job Description:
Responsibilities:

- Assist in maintaining, configuring, installing and testing network hardware and software. Includes but not limited to routers, switches, hubs and firewalls.

- Provision, configure and deploy VPN connectivity to systems. Assist customers with their configuration, troubleshoot customer issues to resolution.

- Provide support to front line GSS staff in being primary customer contact for customer issues.

- Take ownership of customer issues and drive them to completion ensuring high levels of customer satisfaction when the issue is resolved

- Maintain accurate network documentation for moves, adds, changes, and deletes. Properly document problem situations and resolutions. Document policies and procedures for resolving customer issues. Maintain accurate documentation of WAN.

- Develop and maintain harmonious relationship with AT&T GCSC as well as other carrier NOCs in order to accelerate issue resolution.

- Develop and maintain positive working relationships with other internal departments (e.g. GAMs, Operations, GSA, etc.) Provide assistance to other members of the staff when needed.

- Utilize and maintain network management systems to proactively identify fault detection, to identify issue correlation.

Experience Required:
2-4 years proficiency in the following:
Ethernet LAN/WAN
TCP/IP
Cisco Routers (2600 to 7200)
Cisco Switches (3500 to 6500)
VPN
FIX Protocols
Firewalls
Financial industry experience is a big plus

Excellent phone technical troubleshooting skills are a must

Team size = 6 engineers + 6 more on the NOC
Primarily an 8-5 shift with some Saturday morning events. Also for overseas support, some earlier hours events may occur.

Interview Process: Phone screen 1st for 15-20 minute technical screen followed by in-person interview with team

http://taxguruhelp.jobamatic.com/a/jobs/find-jobs

Tuesday, November 17, 2009

Taking the Mystery Out of Loopbacks

A loopback interface is a software-only interface used to emulate an interface. It can be assigned an IP address. Loopback interfaces also have specific purposes with some routing protocols such as OSPF.

A loopback interface can be pinged, and the subnet can be advertised in routing updates. Therefore, loopback interfaces are ideal for simulating multiple networks attached to the same router. For lab purposes, our router does not need multiple LAN interfaces to demonstrate multiple subnets and VLSM. Instead, we use loopback interfaces.

Sales Consultant and Network Technician Positions

The two links listed below for a Sales Consultant and a Network Technician just came in to me from Chris Gerrib, VP Technology Republic Bank and member of the College of DuPage Computer and Technologies Advisroy Board. Check then out!

HTS Heritag Technology Solutions:

Here is the link for our sales consultant position

http://www.hbspc.com/about/careers/tech-sales-consult.html



Here is the link for our network technician position

http://www.hbspc.com/about/careers/net-tech.html

Wednesday, November 11, 2009

Senior Software Engineer - Network/Application Security

Senior Software Eng- Network/Application Security
Full Time Senior Position - responsible for creating complex networking and network security products. Also required to lead and mentor junior engineers.

Responsible for designing and implementing Intrusion Prevention Systems (IPS) software, application security and application service components, resolving internal and external customer issues etc

Hands-on experience with Intrusion Prevention Systems (IPS)
- Some experience with firewall, VPN, ALG, NAT
- Broad knowledge on application layer protocols: HTTP, SMTP, TELNET, IMAP, etc.
- Extensive experience in Linux/freeBSD/netBSD operating sys
- Strong understanding of TCP/IP
- Extensive experience in C

Please email your resumes to sam.sharma@talenttrust.com.

Monday, November 9, 2009

Cisco PIX and Firewall Experience

Looking for someone with Cisco Pix and Fire wall experience.
They will be working on the Firewall Cleanup Project – which is an effort to clean up their infrastructure as over the years they have gotten out of alignment with standards. They now have defined rule sets, and they need people to get in and eliminate overlap and duplicates. Will be a very heads down role for the next two months, as there is a lot of work to do.

Required skills: 3-5 years Firewall experience, Cisco PIX – ASA (ASA is the newer version of PIX). They need to have experience with ACLs (Access Control List), Rule sets, Object groups, and Policy reviews. Also, experience with Firewall Service Modules (which are virtual firewalls). If your interested please contat me directly at marqscot@teksystems.

Cisco CCNA Training Instructor

Cisco Discovery 1 & 2 Training Instructor
APSI is looking to hire a Cisco Discovery 1 & 2 Training Instructor in Charlotte North Carolina. Individual must have Cisco "classroom" experience to be considered for this great opportunity.

Individual would be working with APSI's academic institutional partners and non-profit organizations to deliver the Cisco Discovery 1 & 2 courses. The selected professional will be working with APSI's CTO closely and local celebrity/NFL partners. Some travel may be required. For more information, please contact Jay Burns, CTO at 704-944-3528 or jburns@apsicorp.com Visit our website for more information on APSI and our Vocational Training Programs www.apsicorp.com

Tuesday, November 3, 2009

Cisco PIX and ASA Firewall

Looking for someone with Cisco Pix and Fire wall experience.
They will be working on the Firewall Cleanup Project – which is an effort to clean up their infrastructure as over the years they have gotten out of alignment with standards. They now have defined rule sets, and they need people to get in and eliminate overlap and duplicates. Will be a very heads down role for the next two months, as there is a lot of work to do.

Required skills: 3-5 years Firewall experience, Cisco PIX – ASA (ASA is the newer version of PIX). They need to have experience with ACLs (Access Control List), Rule sets, Object groups, and Policy reviews. Also, experience with Firewall Service Modules (which are virtual firewalls). If your interested please contat me directly at marqscot@teksystems.

RIP Timers

The invalid timer is used to limit the amount of time a route can stay in a routing table without being updated. RIP calls this the expiration timer, or timeout. Cisco’s IOS calls it the invalid timer. The invalid timer is set to 180 seconds whenever a new route is established and is reset to the initial value whenever an update is heard for that route. If an update for a route is not hard within that 180seconds (six update periods), the hop count for the route is changed to 16, marking the route as unreachable.

Another timer, the flush (garbage collection) timer, is set to 240 seconds – 60 seconds longer than the expiration time. The route will be advertised with the unreachable metric until the flush timer expires, at which time the route is removed from the routing table. When a route has been marked as unreachable, but has not yet been flushed, it will show the route in the routing table as,possibly down.

The third timer is the holddown timer. Although RFC1058 does not call for the use of holddown’s, Cisco’s implementation of RIP does use them. An update with a hop count higher than the metric recorded in the routing table will cause the route to go into hold-down for 180 seconds (again, six update periods).

This information comes from Jeff Doyle's Routing TCP/IP Volume I book which I highly recommend to you. Happy Reading!

Thursday, October 15, 2009

Cisco Pre-Sales Engineer - Chicago

Hey guys. I'm looking for an experienced Cisco Pre-Sales Engineer in the Chicagoland area. Needs to be Technical AND have the Sales mentality. Has to have experience selling in Chicago to enterprise accounts- needs to have strong relationships in this territory. Needs experience selling Cisco core outing/Switching LAN/WAN. Target OTE is about $170k. This is an urgent search so any help would be much appreciated.

Richie Kang
richie@vortexstaffing.com
847-885-3259

Wednesday, October 7, 2009

News Release: College Adds Security Certification

College of DuPage has added the Cisco Certified Networking Associate (CCNA) Security certificate to its diverse offerings from the Computer and Internetworking Technologies program.

The CCNA Security certificate updates the knowledge required to install, troubleshoot and monitor Cisco security network devices. It also increases skills for such career options as network security specialist and security administrator.

According to a recent study by Forrester Consulting on behalf of Cisco, “dedicated security roles are expected in 80 percent of the companies studied within the next five years,” explained Joanne Wagner, College of DuPage instructor.

“The increased dependence on and importance of our networks, the increased number and sophistication of attacks, lack of trained personnel and security awareness, mobile commerce and wireless technologies, and legislation and compliance issues are all driving the demand for dedicated security roles within IT,” Wagner said. “The new CCNA Security curriculum provides the basic training that will give people the tools to succeed in an IT security position.”

In 2008, Cisco Systems developed a new CCNA Security curriculum. This fall, College of DuPage began offering the curriculum as one of five courses required for the 15-credit-hour certificate program. Students who complete the CCNA Security course can sit for the 640-553 Implementing Cisco IOS Network Security exam, a stepping stone for key security jobs.

Wagner said the College’s students already are praising the addition as an important component to their job search in today’s marketplace.

“We cannot eliminate risks completely, but we can reduce vulnerabilities through device hardening, good design, and awareness of TCP/IP weaknesses,” Wagner said. “This certificate will give our students an edge over the competition.”

For more information, call (630) 942-2692, e-mail: wagnerjo@cod.edu, or visit: www.cod.edu/cit.

Network Sales Specialist - Skokie, IL

Please read on and let me know ASAP if it is so and if you are interested yourself or kindly forward this requirement to others who can be possibly interested.(See referral policy below)


Titile: Network Sales Specialist
Fulltime
Location: Skokie, IL

Work Status: EAD / Green Card / US Citizen

Salary: 100K
Commission up to 70K on top of that.
Relocation: No
Interview Travel: No
Experience: 5+ years
Travel: Frequent


Our Skokie, IL client is current seeking a Network Sales Specialist to join their company.

The ideal candidate will possess a background in selling Cisco Networking products.As the Network Specialist you will work closely with the Account Managers to identify and pursue Network opportunities within existing and new large enterprise accounts.
You will be responsible for establishing and maintaining working relationship with our Network vendor partners, particularly with their corresponding account and territory sales peers. Once a Network opportunity is identified and qualified, you will engage the Account Manager and Network Solutions Architect.


Qualifications
• Bachelor’s Degree in Engineering, Computer Science, or technology-related field, preferred
• 5+ years in an Account Management role with demonstrated career progression
• Manage vendor relationships for a minimum of 3 years
• Sold networking solutions, as either a vendor or integrator, into large enterprise accounts.
• Have direct experience and understanding of Cisco’s network portfolio.
• Ability to travel up to 50% nationwide. (Valid driver’s license required)


Candidate Must Have:
• Experience selling Cisco networking products: LAN/WAN core routing and switching being currently employed with a network Manufacturing company
• Looking for a current Cisco employee or other network manufacturing employee who is selling to large enterprise accounts
• Candidate must be meeting and exceeding an individual sales quota
• Candidates must have current Networking Sales Experience to be considered.
• Candidates with Telecommunications experience will not be considered.

Referral Policy:
Please remember the FSD Solutions Referral Policy. If you refer your friends and we place them in any type of position, we will pay you a referral fee. When you refer someone, your names are linked in our data base. If we place them next week or years from now, we will pay you a referral fee. There is no expiration date. We find our best people this way, so please assist your friends and make some money at the same time.

How to Apply:
If you are interested and fulfill the specified requirements, please send me your updated resume as soon as possible.Also, please pass it on to anyone you know who could be the close match of this opening.

Best regards,

Arbab Mohsin
FSD Solutions
Tel # 877-875-5414 (Toll-free)
214-550-3360 ( Direct)
Email: mohsin@fsdsolutions.com
LinkedIn Profile: http://www.linkedin.com/in/mohsinfsd
Web site: http://www.fsdsolutions.com

Cisco PIX, ASA, and/or FWSM Firewall Administration Experience - Columbus, OH (contract)

They will be working through the rule sets for firewalls and following a defined process to reduce overlap, eliminate duplicates, and apply standards to the rules.
With full competency, designs, develops, tests, debugs and implements complex hardware/software components, tools, and utilities required for the operation, maintenance, and control of systems. Coordinates with users to determine requirements. Reviews systems under development and related documentation. Makes complex modifications to existing hardware/software to fit specialized needs and configurations, and maintains program libraries and technical documentation. May coordinate activities of the project team and assist in monitoring project schedules and costs. If your interested in this position contact me directly at Marqscot@teksystems.com

Saturday, October 3, 2009

Sr. Network Enginer - Chicago

I am currently recruiting a Sr. Network Engineer for a position in a western suburb outside of Chicago. They are seeking a Sr. Level Network Engineer that has hands on experience with the following:

· Cisco routers 3800 and larger
· Cisco switches 6500
· Extreme switches
· F5 Load balancing
· Firewalls
· Some VoIP experience
· Enterprise LAN/WAN

If you are qualified for this role, please contact me to discuss the remainder of the details. Please note local candidates are preferred.

Regards,
Melissa Velazquez
TEKsystems
630-795-3325

Friday, October 2, 2009

CIsco Enterprise Solution Sales Position

Selling Cisco telecom solutions to businesses, Candidate must be a hunter. Position works remotely -- cell and laptop provided. Cisco Certified, Book of Business and/or 2M in Annual Gross Sales -- a plus. MUST be familiar with NY territory. NY client contacts is a plus++

Send resumes to: thewriteway123@aol.com

Thursday, October 1, 2009

Security Engineer - Schaumburg, IL

Company Teksystems
Position TitleSecurity Engineer
Job Code1968121
Job Location Schaumburg, Illinois
DescriptionSecurity Engineer Job Description:
A major client of Teksystems is looking to hire an additional Security Engineer on to their current staff. The individual will be focusing on our clients border network. Specifically, the consultant will be responsible for the staging, deployment and administration of their Cisco ASA environment. This would encompass Cisco ASA Firewalls, and Cisco IPS devices. Any candidate to be considered should have a strong routing background, as well.

Required Skills for Security Engineer Job:
*CISCO ASA
* CISCO IPS

About TEKsystems:
Join TEKsystems® and get your career on the fast track. As the leading technology staffing and services firm, we are passionate about deploying high-caliber IT and communications expertise. To satisfy our constant need for expertise, we actively seek talented Technical Professionals with all levels of information technology and communications skills. TEKsystems knows that every professional has different needs, so we'll work together to determine a suitable benefits package. We offer options to our Technical Professionals that could include: a health plan, 401k, provisions for vacation and holiday pay, and technical and professional training. With a foundation as the nation's largest IT staffing firm, we've become a billion-dollar services company by blending superior client service with an unrivaled ability to source and manage talent to precise specifications, resulting in successful technology executions. Allegis Group and its subsidiaries are equal opportunity employers. M/F/D/V

Contact Information
Marc R. Knutsen Apply Now! Begin by filling out the "Apply Online for this Job" section at the top of the page Need Directions? Get office driving directions with Google Maps mknutsen@teksystems.com TEKsystems - Rolling Meadows, IL 1933 N. Meacham Road

Suite 100

Schaumburg, IL 60173 TEL: (847) 221-1455 FAX: (847) 221-1490


Read more: http://chicago.kijiji.com/c-Jobs-Other-Security-Engineer-W0QQAdIdZ151792831?src=simplyhired&mpch=ads#ixzz0SjUs8HKx

Cisco Network Support Specialist - Chicago, IL

Company Teksystems
Position TitleCisco Network Support Specialist
Job Code1972827
Job Location Chicago, Illinois
DescriptionCisco Network Support Specialist Job Description:
Teksystems is seeking a Cisco Network Support Specialist for a 2nd shift opportunity with a large client of ours in the banking/financial services industry.

This person will be part of the Network Support Team and responsible for tier 2/3 tickets and fire call support. They will be supporting internal partners both onshore and offshore. There is also a small off project component associated with this position. This will consist of a remediation of volatilities project for Cisco devices. Strong experience with Cisco LAN/WAN support is required. Certifications are nice to have but not required. This group looks for people who can hit the ground running and can work well within a team or independently. Candidates also need to be professional in nature and have strong communication skills.

Required Skills for Cisco Network Support Specialist Job:
*CISCO NETWORKING
* CCNA OR CCNP
* TEIR 2/3 TROUBLESHOOTING

About TEKsystems:
Join TEKsystems® and get your career on the fast track. As the leading technology staffing and services firm, we are passionate about deploying high-caliber IT and communications expertise. To satisfy our constant need for expertise, we actively seek talented Technical Professionals with all levels of information technology and communications skills. TEKsystems knows that every professional has different needs, so we'll work together to determine a suitable benefits package. We offer options to our Technical Professionals that could include: a health plan, 401k, provisions for vacation and holiday pay, and technical and professional training. With a foundation as the nation's largest IT staffing firm, we've become a billion-dollar services company by blending superior client service with an unrivaled ability to source and manage talent to precise specifications, resulting in successful technology executions. Allegis Group and its subsidiaries are equal opportunity employers. M/F/D/V

Contact Information
Ross W Bracey Apply Now! Begin by filling out the "Apply Online for this Job" section at the top of the page Need Directions? Get office driving directions with Google Maps rbracey@teksystems.com TEKsystems - Chicago, IL Downtown II 111 North Canal St.

Suite 105

Chicago, IL 60606 TEL: (312) 879-7716


Read more: http://chicago.kijiji.com/c-Jobs-Accounting-mgmt-Cisco-Network-Support-Specialist-W0QQAdIdZ155040667?src=simplyhired&mpch=ads#ixzz0SjThh9Kz

Sunday, September 27, 2009

I've Moved!!


My office has moved from the BIC building (IC1016a) to Open Campus Center (OCC113b). My office hours are the same, Monday through Thursday from 3:00 p.m. to 5:30 p.m.

The OOC building is west of the new Technical Education Center, on the west side of Lambert Road. Since this is about a quarter of a mile from our labs and classrooms in the BIC building, you may very well see me flying by you in my roller blades these next few months. The plan is to have us back in the BIC building within the next year or so - after the renovation is complete.

Thursday, September 24, 2009

Systems Engineer - Chicago Area

Immediate Need in Chicago area - CCNA, UNIX, LINUX and Windows OS. No Sponsorship or Relocation. Perm or contract

Opportunity to break into healthcare -- Customer support of connectivity and solutions for products and networked systems. Need minimum of 5 years experience.

Beth Mulligan, Recruiting Manager at SNI Technology
bmulligan@snitechnology.com

Wednesday, September 23, 2009

Class B and Class C Flash File Systems

The CCNA Security Class (the first) is going great - the students are terrific. They are learning so much that I decided maybe I should be documenting some of their discoveries. Every class session has been truly terrific, including tonight!

I had beta tested all of the CCNA Security labs prior to the start of the new CCNA Security class and was, therefore, surprised when some of my students were able to issue the "mkdir" command on the router to store their IPS signature file while other students didn't have the "mkdir" command as an option on their routers - even though they were using the same version of ios.

To our surprise, we discovered that the 2811's were using different classes of filesystems. Some of the 2811s were formatted with a Class B Flash file system, known as the low end file system (LEFS)while others were formatted into a Class C Flash file system, which is similar to DOS. Thus, the routers formatted with Class B had no "mkdir" command (as well as some other commands that caused us grief in an earlier lab).

Come to find out, all we needed to do was reformat the internal flash drive using the "format flash:" command and the problem was solved. Presto, we went from a Class B to a Class C and was then able to issue the "mkdir" command! Be sure to make a backup copy of the ios to TFTP server before formating the flash drive.

To determine the type of file system on their routers, the students issued a "show flash: all". The Class C routers displayed geometry and format information that is not displayed on the routers configured with Class B File Systems.

As you may have guessed, not everything these students are learning in the CCNA Security is being 'spoon fed' to them via the curriculum.

Remember me?

Hello Jo,



Remember me? I was in your CCNA classes nine years ago? Well I wanted to write to you and let you know that I have been employed at CDW Advanced Technologies since January of this past year as a voice engineer in their cisco department. I travel all over the country and install and help maintain and program voice services utilizing Cisco technology. I have my CCNA and CCNA (voice) current, I just passed my QoS exam and I am half way to my CCVP, all paid for by my company.



You and justin and your husband succeeded with me, I just wanted to let you know that a former student made it in the Cisco world.



Hope life is well, take care!

Mid Level Cisco Support Engineer

BridgePoint is currently seeking for its direct client a mid level Cisco Network Support Engineer to assist with Over-the-Phone LAN / WAN Network troubleshooting and Network related projects. The position is within the trading services industry and will provide exposure to real-time high volume, and high availability hardware and software systems. All candidates must have proven success in a technical phone support role as this will be primarily focused on phone support.

Daily Responsibilities:
- Assist in maintaining, configuring, installing and testing network hardware and software. Includes but not limited to routers, switches, hubs and firewalls.

- Provision, configure and deploy VPN connectivity to the client's systems. Assist customers with troubleshooting their configuration issues.

- Provide support to front line staff in being the primary phone support customer contact for issues.

- Take ownership of customer issues and drive them to completion ensuring high levels of customer satisfaction when the issue is resolved

- Maintain accurate network documentation for moves, adds, changes and deletes. Properly document problem situations and resolutions. Document policies and procedures for resolving customer issues.

- Develop and maintain harmonious relationship with carrier NOCs in order to accelerate issue resolution.

- Develop and maintain positive working relationships with other internal departments and provide assistance to other members of the staff when needed.

- Utilize and maintain network management systems to proactively identify fault detection, to identify issue correlation.

Specific Skills:

- Expert Level Phone Customer Support
- Ethernet Knowledge
- Network Hardware Knowledge
- TCP/IP Knowledge
- Firewall Knowledge (Desired)
- CISCO Certifications CCNA, CCNP (Desired)


Jeff Weber | Strategic Staffing | BridgePoint Technologies, LLC
1111 W. 22nd Street | Suite 245 | Oak Brook, IL 60523

Office: (630) 368-2981 Mobile: (630) 470-5161 Fax: (630) 368-2983

Mail: jweber@mybridgepoint.com Web: www.mybridgepoint.com

Follow on Twitter: http://twitter.com/BridgePointTech

Thursday, September 10, 2009

Network Specialist - Sales Focused

Network Specialist - Sales Focused
Job Description :

The ideal candidate will possess a background in selling Cisco Networking products. The Network Specialist will work closely with Client managers to identify and pursue Network opportunities within existing and new large enterprise accounts. The NS is responsible for establishing and maintaining working relationship with our Network vendor partners, particularly with their corresponding account and territory sales peers. Once a Network opportunity is identified and qualified, the NS engages the Account Manager and Network Solutions Architect. The NS shares a quota with the SA's with which they are mapped.

Primary Responsibilities and Duties
• Proactively identify and pursue networking opportunities within large enterprise accounts
• In collaboration with Client Account Managers, take ownership of the network component of their sales strategy.
• Present the Client value proposition and position the company as a trusted advisor within their networking strategy.
• Capture specific network opportunity, both product and service, and engage Solutions Architect.
• Establish and maintain vendor relationships.
• Attend vendor training on products and roadmaps.
• Work with vendor personnel to establish opportunity registrations for optimized program/deal discounting.
• Coordinate the development and delivery of network deliverables to the customer; network design, BOM, quotes, etc.
• Problem escalation: serve as the escalation point for customer issues regarding product delivery or configuration. Take the initiative to quickly resolve issues to maintain customer satisfaction.

Qualifications
• Bachelor’s Degree in Engineering, Computer Science, or technology-related field, preferred
• Minimum of 4 years of Sales or Pre-Sales experience
• Manage vendor relationships for a minimum of 3 years
• Sold networking solutions, as either a vendor or integrator, into large enterprise accounts.
• Have direct experience and understanding of Cisco’s network portfolio.
• Ability to travel up to 50% nationwide. (Valid driver’s license required)


PLEASE EMAIL RESUME AND INTEREST to jesse@core-wi.com or call us live at 262-242-2673

Wednesday, August 26, 2009

Cisco Sales Specialist position in Glenview, IL

Cisco Sales Specialist NEEDED in Glenview, IL!
We are looking for an IT Sales specialist to make an immediate impact and perform business development and sales of Cisco Network products and networking solutions, manage vendor relationships, and other related duties

REQUIRED EXPERIENCE
Candidates must have 5-10 years IT sales and enterprise sales, Cisco product and solutions sales experience

APPLY HERE
http://www.pronetworkmedia.com/jobs/index.php?post_id=1346

Tuesday, August 25, 2009

Senior Network Security Engineer

Senior Network Security Engineer
Location US - Virginia - FDIC (VA31)
Clearance Required Yes - Required to Start
Clearance Type Secret
Daily Responsibilities SRA is searching for talented IT security professionals to join our growing Information Assurance team. Team members support our clients' information security programs by engaging in a mix of the following activities. The day-to-day responsibilities for this project are as follows:

· Providing senior level support for the installation, upgrades, configuration changes, and monitoring of network security systems – which includes firewalls, secure email & spam filtering appliances, web proxies, router ACLs, and network based intrusion detection systems.

· Act as Subject Matter Expert for the troubleshooting of network security issues in our production and non-production environments.

· Working closely with the Computer Security Incident Response Team within the agency and other Incident Response Teams across the federal space to identify & mitigate network intrusion attacks.

· Working with other Federal agencies and third-party vendors to provide secure email solutions - using industry standards such as TLS, PGP, and S/MIME.

Future responsibilities could include:

•performing technical vulnerability assessments;
•engaging in intrusion detection and prevention;
•providing incident reporting and response capability;
•offering investigative and computer forensics support;
•conducting penetration tests;
•providing patch and exploit dissemination;
•providing technical computer security training to both internal and external audiences;
•conducting security product and suite research;
•evaluating, testing, and configuring various security products;
•carrying out technical certification reviews (including Web sites);
•installing, configuring, and implementing security hardware and software solutions (firewalls, etc.);
•offering security help desk support; and
•providing computer security lab services.
Required: Years of experience (min) 6-9
Required: Degree Bachelors
Required: Skills Successful candidates will possess a mix of the following knowledge, skills, attributes, and experience:

•excellent client relationship management skills;
•well-developed oral and written communication skills;
•an ability to deal with individuals at all levels;
•a Bachelor's or Master's degree in a related discipline;
•familiarity with FISMA, NIST, OMB A-130, and other information security-related Federal guidelines; and
•an active Government security clearance, or the ability to obtain one.

Tuesday, August 11, 2009

Help Desk Position

Joanne,

Just a heads up, my old boss is going to need some Help desk help this month towards the end, just a week or two of consulting work. Rates would have to be disscussed. It's at a pair of Charter Schools in Chicago and would be carting some computers around and running some basic setups on them. If you want more information you can e-mail my boss John Fletcher at jfletcher@catalystschools.org. I'm letting you know because I was just thinking you might be able to post it on your blog or you might know someone who could use a couple weeks of work possibly.

Paul Webb

Monday, August 3, 2009

ISO and CCSP Security Domains

There has been some confusion with students as to the number and category of defined ISO and CISSP security domains. This is quite understandable as the CISSP security domains have significant parallels with the domains defined by the International Organization for Standardization (ISO) International Elecgtrotechnical Commission (IEC).

There are 12 security domains specified by the ISO. The 12 domains are intended to serve as a common basis for developing organizational security standards and effective security management practices, and to help build confidence in inter-organizational activities.

The 12 domaines of network security: Risk Assessment; Security Policy; Organization of Information Security; Assess Management; Human Resources Security; Physical and Environmental Security; Communications and Operations Management, Access Control; Information Systems Acquistion, Development and Maintenance; Information Security Incident Management; Business Continuity Management; and Compliance.

The CISSP, one of the most popular certifications in the network security profession, was the first credential in the field of information security accredited by the American National Standards Institute (ANSI). For CISSP credential, in addition to five years of experience, professional experience must be in two or more of 10 defined (ISC)2 CISSP domains.

The 10 CISSP domains include: Access Control; Application Security; Business Continuity and Disaster Recovery Planning; Cryptography; Information Security and Risk Management; Legal, Regulations, Compliance and Investigations; Operations Security; Physical (Environmental) Security; Security Architecture and Design; and Telecommunications and Network Security.

While the CISSP domains are specific to (ISC)2 CISSP certification, the ISO domains serve as a useful reference for networking and/or security professional, independent of any specific certification.

Wednesday, July 22, 2009

How to calculate which subnet a host is on . . .

From, "Classful IP Subnet Calculations", by Josh Gentry, which can be found under "Links Worth Visiting".

Given the IP address of a host and the subnet address for the network, you need to be able to calculate which subnet that host is on. To do this we compare the binary representation of the pertinent octet of the subnet mask witht he binary representation of the corresponding octet in the IP address. Example:

IP address=172.60.50.2
subnet mask=255.255.224.0

50= 00110010
224=11100000

We perform a logical on these two numbers. We will be left with only the bits where there is a one in both octets.

00110010
11100000
--------
00100000=32

This host is on subnet 172.60.32.0.

Monday, June 22, 2009

SMTP

There has been much confusion as to just what SMTP applications are responsible for sending and delivering mail. I am going to try to clarify things a bit. While mail servers (mail transfer agents) use SMTP to send and receive mail messages, client mail applications normally use only SMTP for relaying messages to a mail server. For receiving messages, client applications normally use Post Office Protocol (POP) or Internet Message Access Protocol (IMAP) to access their mail box accounts on a mail server. Since SMTP is a delivery protocol only, it cannot pull messages from a remote server on demand. Because of this, POP and IMAP are used to retrieve messages and manage mail boxes.

The SMTP client typically initiates a Transmission Control Protocol (TCP) connection to the SMTP server on the well-known port designated for SMTP, port number 25. The originating host, initiating the SMTP session, can be either an end-user's email client, the mail user agent (MUA), or a relay server's mail transfer agent (MTA).

When users compose e-mail messages, they typically use a MUA (email client). The MUA allows messages to be sent and places received messages into the client's mailbox. In order to receive email, as stated earlier, the e-mail client can use POP.

The e-mail server operates two separate processes: MTA and Mail Delivery Agent (MDA). The MTA process is used to forward e-mail, as stated above. The MTA receives messages from the MUA or from another MTA on another e-mail server. Based on the message header (the email envelope and email header is seen by every MTA), it determines how a message has to be forwarded to reach its destination. If the mail is addressed to a user whose mailbox is on the local server, the mail is passed to the MDA. If the mail is for a user not on the local server, the MTA routes the e-mail to the MTA on the appropriate server.

The MDA accepts a piece of e-mail from a MTA and performs the actual delivery. The MDA receives all the inbound mail from the MTA and places it into the approprite users' mailboxes.

Keep in mind, most e-mail communications use the MUA, MTA, and MDA applications. However, there are other alternatives for e-mail delivery that are outside the scope of our CCNA studies. Also keep in mind, the interoperability standard, RFC2821, which defines the Mail Transfer Architecture indicates "the implied boundaries between MUAs and MTAs often do not accurately match common, and conforming, practices with Internet mail."

Monday, May 25, 2009

Why Can't I Skip My Twenty Minutes of Reading Tonight?

Why Can't I Skip My Twenty Minutes of Reading Tonight? (shared on mailring by Emmy Ellis: source unknown) came via my granddaughter's 2nd grade teacher. I was so happy to receive it and want to share it with you too!

Why Can't I Skip My Twenty Minutes of Reading Tonight?
Let's figure it out -- mathematically!

Student A reads 20 minutes five nights of every week;
Student B reads only 4 minutes a night .. or not at all!

Step 1: Multiply minutes a night x 5 times each week.
Student A reads 20 minutes x 5 times a week = 100 mins./week
Student B reads 4 minutes x 5 times a week = 20 minutes

Step 2: Multiply minutes a week x 4 weeks each month.
Student A reads 400 minutes a month
Student B reads 80 minutes a month

Step 3: Multiply minutes a month x 9 months/school year
Student A reads 3600 minutes in a school year
Student B reads 720 minutes in a school year

Student A practices reading the equivalent of ten whole school days a year. Student B gets the equivalent of only two school days of reading practice.

By the end of 6th grade if Student A and Student B maintain these same reading habits, Student A will have read the equivalent of 60 whole school days.
Student B will have read the equivalent of only 12 school days.

One would expect the gap of information retained will have widened considerably and so, undoubtedly, will school performance. How do you think Student B will feel about him/herself as a student?

Some questions to ponder:

Which student would you expect to read better?
Which student would you expect to know more?
Which student would you expect to write better?
Which student would you expect to have a better vocabulary?
Which student would you expect to be more successful in school... and in life?

Wednesday, May 6, 2009

Great COD Library Site Resources Available to You!

Visit the College and Career Information Center on the upper level of the Library to use the DuPage area’s largest collection of books and audiovisual materials on job search, career, and college information.

As COD students, I have listed other COD Library Site Resources (http://www.cod.edu/library) that are available to you:

1) ReferenceUSA. U.S. company information searchable by name, address, ZIP code, SIC code, yellow page directory listing. Allows 100 prints or downloads per search. Access to 14 Million U.S. Businesses. COD paid 21,000. This is an amazing job seeking tool and will lead you to company information that may include contact information. It will also allow you to find businesses by occupation titles. A great way to find netowrk occupations, addresses for sending resumes, ect.

2) Hoover’s Online. Hoover’s, Inc. delivers comprehensive company, industry, and market intelligence. This database covers 12 million companies, and provides in-depth coverage of 25,000 of the world’s top business enterprises. Good for interview homework. You might use it to retrieve information/finances of businesses you are interested in seeking employment to give you that eompetitive edge when interviewing (or deciding if you want that interview).

3) O*Net Dictionary of Occupational Titles Online. Allows users to find detailed information on over 950 occupations, search for occupations that use skills, look at related occupations, view occupation snapshots, and connect to other on-line career information resources.

4) Horizons. COD Library Home Page>Article database>Reference>Careers>Horizons. Career Information System (CIS) offers regional, state and national information about occupations, schools, financial aid, and job searches. Please note that you must be an Illinois resident to use segments of Horizons.

5) Discover. COD Library Home Page>Article database>Reference>Careers>Discover. Information about careers and colleges including interest inventories. Occupations and education requirements.

6) Jobs, careers & colleges link off of the COD Library Home Page. Overview sites – Richard Bolles’ JobHuntersBible.com and The Riley Guide; National and Chicago Area job listing sites; company information, and salary surveys.

7) Learning Express. COD Library Home Page>Article database>Reference>Careers>Learning Express. LearningExpress Library provides a completely interactive online learning platform of practice tests and tutorial course series designed to help patrons, students, and adult learners succeed in the academic or licensing tests they must pass. Features include immediate scoring, complete answer explanations, and an individualized analysis of results. Includes tests such as GRE, TOEFL, ASE and GED.

8) The Illinois Department of Employment Security. Workforce, career information, and labor market information. Reliable source for information about the state’s labor market. http://www.ilworkinfo.com. Includes: I*Compass on-line training tool that will help you better understand and use the workforce, labor market and career information online course designed to help you use the IL Depart. Of Employment Workforce Information Center (WIC) and the Career Resource Network Career Resources (ICRN), and Labor Market Information (LMI Source). Good resourses.

9) World Cat. COD Library Home Page>Article database>Find a Database by Title>World Cat. Locates books and other materials in libraries worldwide. Should be able to find any book. 53,000 libraries.

10) Linkin. COD Library Home>Linkin Icon. A local partnership comprised of Skokie Public Library, Arlington Heights Memorial Library, the Gail Borden Public Library, Elgin Community College and the College of DuPage. If the material you are looking for is not available in the C.O.D. Library, LINKin provides easy access to the collections of the partner libraries. Item requested through LINKin will usually arrive within three or four days. Inter-library loan.

11) Extended Academic ASAP. COD Library Home Page>Article database>Reference>Careers> Extended Academic ASAP. Combining indexing, abstracts and full text, this database offers balanced coverage available through 3,000 indexed and 1,900 full-text titles in a wide variety of disciplines including: social science journals, humanities journals, science and technology journals, national news periodicals, general interest magazines, newswires, The New York Times and many others. More than 1,400 journals are peer reviewed, and more than 20 years of backfile coverage are included. Magazines and Journals. Use “and” between keywords to find any reference. May want to limit to articles with text; to refereed publications.

12) SocIndex. COD Library Home Page>Article database>Sociology. The database features more than 1,700,000 records with subject headings from a 15,600 term sociological thesaurus designed by subject experts and expert lexicographers. This product also contains informative abstracts for more than 740 "core" coverage journals dating as far back as 1895. In addition, this file provides data mined from more than 540 "priority" coverage journals as well as from over 2,800 "selective" coverage journals. Further, extensive indexing for books/monographs, conference papers, and other content sources is included. Use advanced Search.

13) Newspaper Databases: Chicago Tribune (COD paid 8000), Wall Street Journal, Washington Post, New York Times (COD paid 8000).

Tuesday, May 5, 2009

New Security Library Books at COD Library

Following are some of the new security books I have had added to the COD library recently. Check them out - I mean that literally!

1) Computer security handbook; by Seymour Bosworth, M.E. Kabay, Eric Whyne
2) Identity theft handbook : detection, prevention, and security /
Martin T. Biegelman
3) Implementing 802.1X security solutions for wired and wireless
networks / Jim Geier
4) Implementing email and security tokens : current standards,
tools, and practices / Sean Turner, Russ Housely
5) Risks, controls, and security : concepts and applications /
Vasant Raval, Ashok Fichadia
6) Payment card industry data security standard handbook / Timothy
M. Virtue
7) Windows Vista security : securing Vista against malicious attacks
/ Roger A. Grimes, Jesper M. Johansson
8) The web application hacker's handbook : discovering and
exploiting security flaws / Dafydd Stuttard, Marcus Pinto
9) Schneier on security / Bruce Schneier
10) Secure computer and network systems : modeling, analysis and
design / Nong Ye
11) Principles of information systems security : text and cases /
Gurpreet Dhillon
12) Implementing NAP and NAC security technologies : the complete
guide to network access control / Daniel V. Hoffman
13) Computer security and cryptography / Alan G. Konheim
14) Phishing and countermeasures : understanding the increasing
problem of electronic identity theft / edited by Markus
Jakobsson, Steven Myers
15) Handbook of information security / Hossein Bidgoli, editor-in-
chief
16) The CISSP and CAP prep guide / Ronald L. Krutz, Russell Dean
Vines
17) CISSP : certified information systems security professional study
guide / James Michael Stewart, Ed Tittel, Mike Chapple
18) CISSP for dummies / by Lawrence Miller, Peter Gregory
19) CCSP : Secure Intrusion Detection and SAFE Implementation : study
guide / Justin Menga, Carl Timm
20) CCNA security official exam certification guide / Michael
Watkins, Kevin Wallace
21) IT security interviews exposed : secrets to landing your next
information security job / Chris Butler
22) The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick, William L. Simon, Steve Wozniak (Foreword by)

Tuesday, April 28, 2009

Job Opportunity - Network Specialist

Date Posted:
4/22/2009
Location:
Forest View Educational Center
Date Available:
07/01/2009 or sooner

GENERAL RESPONSIBILITIES:

The Network Specialist assists the Network Operations Manager in implementing the overall data connectivity requirements for the district. The Network Specialist maintains and upgrades the District 214 local and wide area networking facility at Forest View Educational Center and the six high schools. The Network Specialist works closely with other district technology staff in maintaining the network services throughout the district. The position requires the ability to be on 24 hour call and the availability to work evenings and weekends as needed.

QUALIFICATIONS:

The Network Specialist is a specialized position requiring a combination of these qualifications:

CCNA (Cisco Certified Network Associate) and MCSE (Microsoft Certified Systems Engineer) or ACSA (Apple Certified System Administrator) or equivalent demonstrated experiences. Must have knowledge of data communication protocols (TCP/IP, IPX, AppleTalk, SNMP, IGRP, EIGRP, RIP, OSPF).

http://www.generalasp.com/D214/onlineapp/jobpostings/view.asp?category=SUPERVISORY+%2D+NETWORK+SPECIALIST

Cisco Router/PIX Emulator

I have been hearing so much about Dynamips lately that I think I must take some time to do some experimenting with it. I just received an email from a COD friend and Alumni, Gonzalo Escarra, a Sr. Technical Support Analyst for Aqueity, and he writes:

“As I'm studying for my CCNP now, I found this new Cisco emulator based on Dynamips and PEMU called GNS3 (http://www.gns3.net/). It's a GUI for building a lab using Routers and PIX's, and it works flawlessly on Windows. The only thing you'll need are the IOS images to run, as the software uses original Cisco images to emulate (meaning you get the exact same functionality in a lab environment).
Figured you might be interested to pass this along to your students in case they need some extra practice outside of lab time. It is VERY useful at least for me.”


Maybe we should form a Dynamips workgroup and figure this out together. Let me know via email if you would be interested. Gonzalo has volunteered to give us some support just in case we run into problems.

Thank you Gonzalo!

Monday, April 27, 2009

RIPv2 Next Hop Address



Remember on the RIPv2 PowerPoint slide (as shown) we were seeing on the debug ip rip a 0.0.0.0 address and couldn't explain why. Steven Zinkie jumped right in on this and reported back with the answer. He found the following explaination in our book..

1) Like RIPv1, RIPv2 is encapsulated in a User Datagram Protocol (UDP) segment using port 520 and can carry 25 routes per update.

2) The first significant extension in the RIPv2 message format is the subnet mask field (32 bit mask) to be included in the RIP route entry.

3) The second significant extension of RIPv2 is the addition of the next-hop address. The next-hop address is used to identify a better next-hop address – if one exists. If the field is set to 0.0.0.0, the address of the sending router is the best next-hop address.

Thanks Steven - mystery solved!

Monday, April 20, 2009

RIP Default Routes: default-information originate vs. redistribute static


I told my students that the default-information originate command was similiar to the redistribute static command. A student asked me how exactly do they differ. To answer that question I have set up a scenario using three routers, as depicted above, to give studens a visual of how they both work and differ.

I set up Router3 as the ISP and configured two static routes pointing to 10.1.1.0/30 and 192.168.1.0/24. I set up Router2 as the edge router of my network. In Router2 I had two static routers pointing to virtual networks (network 1.0.0.0 and network 2.0.0.0) and a default static route (0.0.0.0).

First I configured Router2 to propagate the default route to Router1 using the default-information originate command. As a result, the default static route was propagated correctly to Router1 as shown below (see Router2’s configuration file, routing table and Rotuer1’s routing table). Notice that the default static was the only static route that RIP advertised to Router1. Note, I have removed some unrelated lines of commands from the configuration files, to simplify.

R2#show run
service password-encryption
hostname R2
enable secret 5 $1$uEh1$AsHH04FVVwwziW4XdTJHn0
interface Loopback1
ip address 1.1.1.1 255.255.255.255
interface Loopback2
ip address 2.2.2.2 255.255.255.255
interface Serial0/0
ip address 10.1.1.2 255.255.255.252
interface Serial0/1
ip address 172.16.2.2 255.255.255.252
router rip
network 10.0.0.0
default-information originate
ip classless
ip route 0.0.0.0 0.0.0.0 Serial0/1
ip route 129.5.0.0 255.255.0.0 Loopback1
ip route 129.6.0.0 255.255.0.0 Loopback2

line con 0
password 7 00071A150754
login
line vty 0 4
password 7 05080F1C2243
login
end
R2#

R2#show ip route
Gateway of last resort is 0.0.0.0 to network 0.0.0.0

1.0.0.0/32 is subnetted, 1 subnets
C 1.1.1.1 is directly connected, Loopback1
2.0.0.0/32 is subnetted, 1 subnets
C 2.2.2.2 is directly connected, Loopback2
172.16.0.0/30 is subnetted, 1 subnets
C 172.16.2.0 is directly connected, Serial0/1
S 129.5.0.0/16 is directly connected, Loopback1
S 129.6.0.0/16 is directly connected, Loopback2
10.0.0.0/30 is subnetted, 1 subnets
C 10.1.1.0 is directly connected, Serial0/0
R 192.168.1.0/24 [120/1] via 10.1.1.1, 00:00:09, Serial0/0
S* 0.0.0.0/0 is directly connected, Serial0/1

R2 is the edge router which contains two static routes and a default static route. The default static route has been propagated to the inside (R1) using the default-information originate command.

R1#show ip route
Gateway of last resort is 10.1.1.2 to network 0.0.0.0

10.0.0.0/30 is subnetted, 1 subnets
C 10.1.1.0 is directly connected, Serial0/2/0
C 192.168.1.0/24 is directly connected, FastEthernet0/0
R* 0.0.0.0/0 [120/1] via 10.1.1.2, 00:00:13, Serial0/2/0R1#

Next, I configured Router2 to propagate the default route to Router1 using the redistribute static command. As a result, not only the default static route was propagated Router1, but ALL three of the static routes were advertized to Router1! See Router1’s routing table after modifying R2’s configuration file to use the redistribute static command in place of the default-information originate command:

R1#show ip route
Gateway of last resort is 10.1.1.2 to network 0.0.0.0

R 129.5.0.0/16 [120/1] via 10.1.1.2, 00:00:04, Serial0/2/0
R 129.6.0.0/16 [120/1] via 10.1.1.2, 00:00:04, Serial0/2/0
10.0.0.0/30 is subnetted, 1 subnets
C 10.1.1.0 is directly connected, Serial0/2/0
C 192.168.1.0/24 is directly connected, FastEthernet0/0
R* 0.0.0.0/0 [120/1] via 10.1.1.2, 00:00:04, Serial0/2/0

R1#

As you can see, since R2 had more that one static route, they were all advertised through RIP using the redistribute static command. Therefore, in order to use the redistribute static command, we need to do some additional configuration to Router2. In Router2, we would have to use a distribute-list command or a route map (both to be studied in your CCNP1 class) to permit only the default static route to be propagated by RIP. Following is an example of the extra configuration needed in Router2 as well as the resulting Router1 routing table.

R2#show run
service password-encryption
hostname R2
enable secret 5 $1$uEh1$AsHH04FVVwwziW4XdTJHn0
interface Loopback1
ip address 1.1.1.1 255.255.255.255
interface Loopback2
ip address 2.2.2.2 255.255.255.255
interface Serial0/0
ip address 10.1.1.2 255.255.255.252
interface Serial0/1
ip address 172.16.2.2 255.255.255.252
router rip
redistribute static
network 10.0.0.0
distribute-list 10 out staticip classless
ip route 0.0.0.0 0.0.0.0 Serial0/1
ip route 129.5.0.0 255.255.0.0 Loopback1
ip route 129.6.0.0 255.255.0.0 Loopback2
access-list 10 permit 0.0.0.0
line con 0
password 7 00071A150754
login
line vty 0 4
password 7 05080F1C2243
login
end

R1#show ip route
Gateway of last resort is 10.1.1.2 to network 0.0.0.0
10.0.0.0/30 is subnetted, 1 subnets
C 10.1.1.0 is directly connected, Serial0/2/0
C 192.168.1.0/24 is directly connected, FastEthernet0/0
R* 0.0.0.0/0 [120/1] via 10.1.1.2, 00:00:02, Serial0/2/0R1#

Sunday, April 19, 2009

RIPv1 Classful Behavior with Multiple Subnet Masks


There was some confusion this week on how RIPv1 would handle a subnet with multiple masks. As a result of the discussion, I decided to test it out. I configured three routers, RouterA, RouterB, and RouterC, as shown.

RouterA, RouterB, and RouterC could all communicate using a mask of 255.255.255.252 (/30). RouterA’s routing table included both the serial links with the 255.255.255.252 mask (networks 172.16.9.0, 172.16.9.4, and 172.16.9.8) and the Fast Ethernet link (172.16.1.0)configured with a mask of 255.255.255.0 (/24). RouterB and RouterC's routing table did not include the FastEthernet route to 172.16.1.0/24.

I am including the routing tables and debug ip rip output for your review. Notice that RouterA did not include network 172.16.1.0 (which had been configured on the FastEthernet0/0 interface with a mask of 255.255.255.0) in the update send out its egress interface to RouterB and RouterC:

02:38:21: RIP: sending v1 update to 255.255.255.255 via FastEthernet0/0 (172.16.1.1)
02:38:21: RIP: build update entries - suppressing null update


RouterA#show ip route
172.16.0.0/16 is variably subnetted, 4 subnets, 2 masks
R 172.16.9.4/30 [120/1] via 172.16.9.2, 00:00:12, Serial0/0
[120/1] via 172.16.9.10, 00:00:16, Serial0/1
C 172.16.9.0/30 is directly connected, Serial0/0
C 172.16.1.0/24 is directly connected, FastEthernet0/0
C 172.16.9.8/30 is directly connected, Serial0/1

RouterB#show ip route
172.16.0.0/30 is subnetted, 3 subnets
C 172.16.9.4 is directly connected, Serial0/2/1
C 172.16.9.0 is directly connected, Serial0/2/0
R 172.16.9.8 [120/1] via 172.16.9.6, 00:00:22, Serial0/2/1
[120/1] via 172.16.9.1, 00:00:00, Serial0/2/0

RouterC#show ip route
172.16.0.0/30 is subnetted, 3 subnets
C 172.16.9.4 is directly connected, Serial0/2/1
R 172.16.9.0 [120/1] via 172.16.9.9, 00:00:09, Serial0/2/0
[120/1] via 172.16.9.5, 00:00:16, Serial0/2/1
C 172.16.9.8 is directly connected, Serial0/2/0

RouterA#debug ip rip
03:31:04: RIP: received v1 update from 172.16.9.2 on Serial0/0
03:31:04: 172.16.9.4 in 1 hops
03:31:05: RIP: sending v1 update to 255.255.255.255 via FastEthernet0/0 (172.16.
1.1)
03:31:05: RIP: build update entries - suppressing null update
03:31:05: RIP: sending v1 update to 255.255.255.255 via Serial0/0 (172.16.9.1)
03:31:05: RIP: build update entries
03:31:05: subnet 172.16.9.8 metric 1
03:31:05: RIP: sending v1 update to 255.255.255.255 via Serial0/1 (172.16.9.9)
03:31:05: RIP: build update entries
03:31:05: subnet 172.16.9.0 metric 1
03:31:16: RIP: received v1 update from 172.16.9.10 on Serial0/1
03:31:16: 172.16.9.4 in 1 hops

RouterB#debug ip rip
RIP protocol debugging is on
*Apr 20 04:15:35.767: RIP: sending v1 update to 255.255.255.255 via Serial0/2/0
(172.16.9.2)
*Apr 20 04:15:35.767: RIP: build update entries
*Apr 20 04:15:35.767: subnet 172.16.9.4 metric 1
*Apr 20 04:15:38.755: RIP: received v1 update from 172.16.9.6 on Serial0/2/1
*Apr 20 04:15:38.755: 172.16.9.8 in 1 hops
*Apr 20 04:15:39.899: RIP: sending v1 update to 255.255.255.255 via Serial0/2/1
(172.16.9.5)
*Apr 20 04:15:39.899: RIP: build update entries
*Apr 20 04:15:39.899: subnet 172.16.9.0 metric 1
*Apr 20 04:15:40.067: RIP: received v1 update from 172.16.9.1 on Serial0/2/0
*Apr 20 04:15:40.067: 172.16.9.8 in 1 hops

RouterC#debug ip rip
*Apr 20 04:22:26.219: RIP: sending v1 update to 255.255.255.255 via Serial0/2/1
(172.16.9.6)
*Apr 20 04:22:26.219: RIP: build update entries
*Apr 20 04:22:26.219: subnet 172.16.9.8 metric 1
*Apr 20 04:22:28.267: RIP: received v1 update from 172.16.9.9 on Serial0/2/0
*Apr 20 04:22:28.267: 172.16.9.0 in 1 hops
*Apr 20 04:22:31.123: RIP: sending v1 update to 255.255.255.255 via Serial0/2/0
(172.16.9.10)
*Apr 20 04:22:31.123: RIP: build update entries
*Apr 20 04:22:31.123: subnet 172.16.9.4 metric 1
*Apr 20 04:22:32.891: RIP: received v1 update from 172.16.9.5 on Serial0/2/1
*Apr 20 04:22:32.895: 172.16.9.0 in 1 hops

Sunday, April 12, 2009

RIPv1 Holddown

Several of you wanted a more in depth understanding of one of the primary activities of convergence - holddown. As you will remember from our class discussion, convergence involves four primary activities: update, invalid, holddown, and flush. These are the timers that a Cisco router uses to control the way RIP reacts to changes in its routing table.

The following discussion of Cisco’s implementation of RIP holddown comes from Robert Wright’s book, IP Routing Primer, ISBN 1-57870-108-2. I have found his discussion on holddowns to be most helpful. According to Wright, a router puts a route into holddown under one of three conditions.
1) The router that was advertising the route stops advertising it for 180 seconds (invalid period).
2) The router that advertised the original route sends a new advertisement for the same route with a metric greater than the metric stored in the routing table. This usually indicates that there is a routing loop, which causes the route to be immediately deleted and put into holddown instead of being forced to wait for the invalid timer to fire.
3) The router that was advertising the route sends a new advertisement for the route with an unreachable metric, otherwise known as poisoning the route.

Cisco’s RIP holddown, 180 seconds by default, refers to routes that have been marked as invalid but are not yet capable of being replaced with a new route of a higher metric. Holddowns prevent routes from changing too rapidly by allowing time for either the downed route to come back up or the network to stabilize before accepting a route to the same destination with a worse metric. The idea of the holddown period is that if the path you are using to reach a particular network goes down, you wait for some time before switching to another path. During the time a router has that route in holddown, it continues to forward any packets it receives (updates and user traffic) that are destined for that particular network with a cost of infinity.

According to Wright, one of the reasons for having routing protocols behave this way is based on the assumption that temporary packet loss due to using routes to networks that might not be viable is better than immediately accepting a less desirable route to the destination network. In a discussion on route flapping due to congestion on a link between two routers, RouterA and RouterB, he gives us a pretty good understanding of the reasoning behind holddown. When RouterB stops advertising 168.71.8.0 (a LAN directly connected to RouterB) to RouterA (RouterA and RouterB are connected via a serial link) for 180 seconds (the invalid timer expires), RouterA puts route 168.71.8.0 in holddown.

By allowing these packets to be dropped instead of sending them via the less desirable path, through RouterC, RouterA and RouterB are giving the hosts off of RouterA and RouterB a chance to react to the dropped packets by sending fewer packets at a time – perhaps even sending smaller packets. This, as he tells us, would require that either the applications in use or their underlying protocols keep track of packet loss and to respnd accordingly.

If RouterA immediately accepted the less desirable route, through RouterC, as soon as the invalid timer expired for the downed route 168.71.8.0 on RouterA and forwarded all traffic to 168.71.8.0 over it, and congestion on the more desirable, original path would cease to be a problem.

The routing updates that had been getting dropped due to congestion would start arriving again, and RouterA would immediately go back to using its link to RouterB to reach 168.71.8.0. At this point, the problem would start all over again (route flapping which is when a route continuously switches between two different next hop routers).

If the traffic pattern that caused this problem is more than just an anomaly, it will be necessary to either increase the speed of the link between RouterA and RouterB or permanently configure the hosts to send fewer packets at a time (and possibly smaller packets as well) to prevent it from happening again.

Thursday, April 9, 2009

RIPv1 Broadcasts

This week in one of my CCNA Routing classes, while discussing the operation of Distance Vector routing protocols, there was some good discussion (and debate) going on as to how RIP broadcast would be handled by each host on the local LAN network. Some students were of the impression that the frame would not be processed at all if the host device wasn’t running RIP. Others thought it would be processed and discarded at layer 2; some thought it would be discarded at layer 3; others were not sure what layer would actually discard the update if RIP protocol wasn’t running on the device.

I want to share with you an explanation of what happens to that RIP update when it reaches the host device. It comes from, Chapter 12, Broadcasting and Multicasting, http://www.uic.rsu.ru/doc/inet/tcp_stevens/broadcas.htm.

In the document, the author explains to us that the interface card sees every frame that passes by on the cable and makes a decision whether to receive the frame and pass it to the device driver of that host machine. There are exceptions (promiscuous mode), but normally the interface card passes to the device driver only frames addressed specifically to the host device, multicast frames destined for a particular group on that host device, or broadcast frames meant for everyone on the cable.

Once that decision is made (filtering decision) and the interface card of that device decides to keep the frame, it is passed to the device driver where the frame checksum calculation is performed to check the frame for errors. If no frame errors are detected, the frame undergoes additional filtering by the device driver. One of the first things to be checked is the protocol field in the frame header. Because this frame is carrying an IP payload (RIP uses IP), the frame is passed to layer 3. IP performs more filtering, based off of the source and destination IP addresses, and, because it is a UDP datagram, passes it to the Transport Layer, UDP protocol for additional processing.

You guessed it, more filtering at layer 4! Now the port numbers are checked. If no process is currently using the destination port number (port 520 for RIP), the datagram will be discarded and an ICMP port unreachable message will be generated. If the UDP datagram has a checksum error, UDP will discard it with no message returned to the sender.

As the author will tell you, the problem with broadcasting RIP v1 updates is that there is considerable overhead for each of these hosts. All hosts must process the broadcast all the way up to layer 4 of the stack, regardless if they are running RIP v1 or not.