Making sense of Broadband networks – Part 1

May 24th, 2013 Wael Osama Posted in Network Design, PPP 2 Comments »

Broadband is a hot topic in the telecommunications industry nowadays; it is becoming the bread and butter for so many service providers and mobile carriers with the big growth and penetration rates in these technologies in the recent years.  ( Check this report about the EOCD countries). Although it is that important, broadband topics probably […]

AddThis Social Bookmark Button

Static routes and next hops

January 27th, 2009 Wael Osama Posted in Routing, WAN technologies 9 Comments »

Today I have received a question by mail from one of our readers asking about the difference between pointing the static route to a next hop address or pointing it to the exit interface itself as shown in the example below: !– Pointing to next hop address ip route !– or Pointing […]

AddThis Social Bookmark Button

Frame-relay Discard Eligibility Bit (DE)

September 27th, 2008 Wael Osama Posted in Frame-Relay, QOS 2 Comments »

What is the DE bit ? The DE bit is used to indicate that the frame has a lower importance than other frames and should be dropped first if the network experienced congestion. How to set the DE bit? We can use a simple network to test our configuration. R1 is connected via frame-relay to […]

AddThis Social Bookmark Button

Frame-relay traffic shaping using MQC

September 27th, 2008 Wael Osama Posted in Frame-Relay, QOS No Comments »

To apply frame-relay traffic shaping using a normal map-class, the command frame-relay traffic-shaping must be applied to the main interface. This method has a pitfall; the problem is that when you apply the frame-relay traffic-shaping command to the main interface any DLCI that has no explicit map-class will be shaped to 56K by default. This […]

AddThis Social Bookmark Button

What is: IP unnumbered?

July 15th, 2008 Wael Osama Posted in WAN technologies, What Is ? 1 Comment »

IP unnumbered is method that you can use to enable IP processing on a Point to Point interface without assigning an it an IP address to conserve the IP address space. All you need to do, is to select an interface that you are going to borrow its IP address; preferrably the loopback interface because […]

AddThis Social Bookmark Button

How-to:Configure PPP authentication Part2 (CHAP)

July 15th, 2008 Wael Osama Posted in CISCO HOW-TO, PPP No Comments »

The second and the most secure authentication method in PPP is CHAP. CHAP stands for challenge Handshake Authentication Protocol. How CHAP works? If CHAP is negotiated successfully during the LCP phase, the authenticator sends a challenge message to the peer. The peer responds to the challenge with a value calculated through an MD5 function. The […]

AddThis Social Bookmark Button