- [Voiceover] Early switches and bridges…used RISK and CISK processing in a method…known as Store and Forward.…SAF will receive a frame in its entirety.…It will then calculate the frame check sequence…for the datagram and ensure it hasn't been corrupted.…If everything checks out, the device…will then forward the frame.…As you can image, on older, slower devices…this wait and send system would cause…additional latency for your traffic.…When switches transitioned to ASICs,…they began using the cut-through method of forwarding.…
In cut-through, a switch will wait…for the portion of the frame header…that lists the destination MAC address,…then forward it on its way.…Since it doesn't store the entire frame,…it incurs much less latency, but also…doesn't check the FCS, so corrupted traffic can be sent on.…When the receiving host is given a bad frame,…its NIC will simply discard it.…At least, this is how cut-through switches used to operate.…Now that they are more intelligent…with even more sophisticated ASICs,…it can read more of the headers if necessary.…
Author
Released
2/29/2016He discusses different WAN technologies and features such as speeds, spans, and price points—including inexpensive options such as VPN. He then covers switches (the devices that connect computers in your building) and routers (devices that control the transmission of network data). Along the way, Greg shows how to build private connections, implement free networking over the Internet, build switch networks, and overlay-routed networks. He'll also introduce different routing protocols, such as OPSF link-state routing and distance-vector routing with RIPv2, EIGRP, and BGP.
Note that this course maps to domains 1 and 2 of the Microsoft Technology Associate (MTA) Networking Fundamentals certification exam (98-366).
- Understanding the technology: from dial-up to VPNs
- Working with hubs, bridges, and switches
- Ensuring hardware redundancy
- Using switching types and MAC tables
- Preventing bridge loops with STP
- Routing with routing tables
- Using NAT
- Securing your switches and routers
- Setting up firewalls
- Working with different routing protocols: RIPv2, OSPF, EIGRP, and more
Skill Level Beginner
Duration
Views
Related Courses
-
Introduction
-
Welcome47s
-
-
1. WAN Technologies
-
Dial-up4m 34s
-
DSL and ADSL3m 25s
-
Cable and broadband3m 31s
-
Leased lines4m 50s
-
MPLS and VPLS2m 58s
-
Tunnels and VPN5m 25s
-
-
2. Switches
-
Hubs, bridges, and switches2m 49s
-
Backplane speed1m 33s
-
Hardware redundancy3m 44s
-
VLANs2m 27s
-
Spanning-Tree Protocol (STP)7m 53s
-
Security options4m 37s
-
-
3. Routers
-
Routing tables6m 24s
-
Software routing in Windows3m 22s
-
Basic router security5m 24s
-
Firewalls and security zones2m 41s
-
Firewall advanced features2m 54s
-
4. Routing Protocols
-
Distance vector4m 9s
-
Link state4m 1s
-
RIPv23m 11s
-
OSPF5m 37s
-
OSPF areas2m 56s
-
EIGRP4m 14s
-
BGP4m 23s
-
Conclusion
-
Next steps37s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Switching types and MAC tables