Post on 03-Jun-2018
8/12/2019 CCNA in Short
1/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
CCNACisco Certified Network Associate
Study Guide for the
640-607 Exam
2003
Certificationsuccess.com
8/12/2019 CCNA in Short
2/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
Please read carefully
. This study guide has been created to cover the MAIN objectives of CCNA exam(640-607).
. The topics of this study guide have been compiled to help readers to clarify &illustrate the majority objectives of CCNA (640-607) exam based on Cisco 's officialweb site (not in the same order):
http://www.cisco.com/warp/public/10/wwtraining/certprog/testing/current_exams/640-607.html
. You MUST have at least a modest background in networking basics knowledge.
. The CCNA ( 640-607 ) study guide is designed to be a succinct, an exam reviewguide that has to be used in conjunction with the links revealed on it.
. Don't just rely on what is written without pointing your web browser at thementioned links that are stated on this study guide. In other words, when you see
(Point your browser at the following link :); that means pointing your browser is aMUST.
. Further Informationlinks have been compiled to provide you excessive, deep, &comprehensive details on particular topics (sometimes beyond the scope of CCNA
exam objectives).However, you are not obliged to point your browser at such a link; unless you areinterested.
8/12/2019 CCNA in Short
3/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
Table of Content
Please read carefully1
Definitions4OSI model...4Cisco IOS...4
Windowing..4Acknowledgement...4Flow Control...5
Connection-Oriented transport.....5Connectionless transport..5Half duplex communication..5Full duplex communication...5LLC...5
MAC address.....................................................................................................5-6
Unicast address...6Multicast address....6Broadcast address..6Broadband..6
Baseband6Collision..6
Collision domain...6Broadcast domain7
Frame..7
Packet..7Data Encapsulation7
CSMA/CD8LAN..8WAN.8
Hub...9Repeater....................................................................................................................9Bridge........................................................................................................................9Brouter...9Handshake....9
Three-way handshake....9DCE.9
DTE..9CSU10
DSU10T1..10IEEE 802 series...10
PAP.....10CHAP..10Port.10
OSI reference model & layered communication..11Why using layered network model? ...........................................................................11OSI layers functions11-12
8/12/2019 CCNA in Short
4/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
TCP/IP.13DoD model..13
FTP..14
HTTP14
SMTP14DNS..14
DHCP..14-15SNMP...15Telnet.15TCP.15-16
UDP..16
IP..16ICMP16
ARP...16How information is packaged?.................................................................................17Cisco model layers.17-18
IP addressing & Subnetting......19-22Ethernet networking........23
What is Ethernet?........................................................................................................23
Ethernet connection media (802.3 standards).23-24Ethernet types....25
Ethernet cables types..25Half-and-Full duplex Ethernet.26
Icons used for networking devices27
Icons used for networks & network connections...27
Bridging/Switching28What is a switch?.....................................................................................................28Switches vs. Bridges...28
Switch function..28-29
Switch vs. hub29STP...30Switching modes..30-31
Cisco Catalyst switch series31VLAN..32-33
Link types..33ISL34
VTP...34
Router..35-40WAN protocols...41-44
Cisco router & switch configurations.46-48Useful Links.49
8/12/2019 CCNA in Short
5/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
:Def initions
Note: you MUST understand all the definitions that are stated below.
-------------------------------------
OSI model: Open System Interconnection- a system for organizing the exchange ofdata across networks that is based on a seven layers model:7. Application layer.6. Presentation layer.
5. Session layer.4. Transport layer.
3. Network layer.2. Data Link layer.
1. Physical layer.
Cisco IOS: Cisco Internetwork Operating System which runs Cisco routers & someCisco switches but doesn't allow devices configurations.
Windowing: Windowing is when a receiving host tells the sending host how manydata segments it can receive between Acknowledgements. This amount of data iscalled a window . Windowing can adjust its size of data depending on Networkresources. That means it's a maximum amount of data (in bytes) that the sending host
allows to send without expecting an acknowledgement from a receiving host (seeFig.1).
Acknowledgement: (Cisco states that) notification sent from one network device toanother to acknowledge that some event occurred (for example, the receipt of amessage ). Sometimes abbreviatedACK.
8/12/2019 CCNA in Short
6/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
Flow Control: when a host receives a flood of data too quickly for it to process, itstores it in a memory section called a buffer. This buffering action solves the problemonly if the data bursts are small & don't last long. However, if the data burst continues
it will eventually exhaust the memory of the receiving host & that will result in the
arriving data being discarded or lost. Flow control prevents a sending host fromoverflowing the buffers in the receiving host.
Connection-Oriented transport: it uses acknowledgements & responses toestablish connections between sending & receiving hosts. When a receiving host
successfully receives a packet sent by the sending host, the receiving host sends anacknowledgement back to the original sender to indicate to the sender that the packet
was successfully received at the receiving host. TCP & SPX are examples ofconnection-oriented protocols.
Connectionless transport: Communication type that doesn't maintain active linksbetween senders & receivers. Messages are transmitted without acknowledgement
about the receiver being online.For example, when you send an e-mail, your sending host assumes that the messagehas been delivered to the receiving host without getting an acknowledgement from the
receiving host. IP, IPX, & UDP are examples of connectionless protocols.
Half Duplex Communication: It allows only a single node to transmit at a time.There's always a dedicated sender & receiver, & when the sender is done the receivercan switch roles in order to transmit. Both entities can't transmit at the same time.
Data travels in only one direction at a time, & it uses the same transmissionfrequency.
Full Duplex Communication: it is more like a telephone conversation.Communication happens in both directions at the same time. With type of networking,a host can send data in one direction while acknowledgement of previously sent data
may be return to the same host at the same time. For example, when you are using atelephone, it's possible for you to speak to a caller while he's talking to you.
LLC: Logical Link Control- it's responsible for identifying the Network layerprotocols & encapsulating them. The logic used on the Data Link layer includes
where data is meant to go, which computer sent data, & checking the overall validityof the bytes sent. After a data frame was sent, the data link sends a frame & then waits
for a positiveACK. If one is not received, or if the frame was damaged, it sendsanother one.
LLC provides a jumping point for going directly to upper levels in the OSI model. Butthe common method of packet communication is still to move up through the layersone at a time.
MAC Address: Media Access Control- every network interface card has an address,which's usually assigned at the factory. This address is protocol-independent & isoften called the hardware address. The MAC address exists at the MAC sub-layer ofthe OSI model.
8/12/2019 CCNA in Short
7/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
The MAC address is used on the Data Link layer where it identifies network devices& computers. The MAC address itself is a 12 digit hexadecimal number burnedintothe network card. 00-A0-24-34-8D-9C is an example of MAC address.
Unicast Address: One of the MAC addresses types that is unique to a single host.When one host wants to send a message to a specific host, a unicast address is used.
For example, 00-A0-24-34-8D-9C is a unicast address.
Multicast Address: One of the MAC addresses types that is meant for multiplehosts, but not all hosts, on a LAN. Multicast addresses are used in lieu of sendingmultiple unicast messages that would take unnecessary LAN resources & broadcast
messages that would take unnecessary host resources.
Broadcast Address: One of the MAC addresses types that is used when a host wantsto send a message to every host on a LAN. The broadcast MAC address is representedby 48 binary ones or 12 hex Fs (0xFFFFFFFFFFFF). A message sent to the broadcast
address is processed by every host that receives it.
Broadband: it is type of signaling that shares the cable with other signals on thesame cable. (Cisco states that) broadband describes facilities or services that operateat the DS3 rate and above. For example, a Broadband DCS makes cross-connections
at the DS3, STS-1, and STS-Nc levels. Similarly, Broadband ISDN provides about150 Mb/s per channel of usable bandwidth.
1. Transmission system that multiplexes multiple independent signals onto one cable.
2. Telecommunications terminology: Any channel having a bandwidth greater than a
voice-grade channel (4 kHz).
3. LAN terminology: A coaxial cable on which analog signaling is used. An RFsystem with a constant data rate at or above 1.5 Mbps. Also called wideband.
Baseband: It's type of signaling in a digital form that uses the entire cable. In otherwords, no other signals can be on (share) the same cable during a baseband
transmission. This's opposite of broadband, where multiple signals can be on (share) asingle cable at the same time.
Collision : (Cisco states that) inEthernet( I'll explain it later), the result of two nodestransmitting simultaneously. The frames from each device impact & are damaged
when they meet on the physical media.
Collision Domain : In Ethernet term is when a particular device on a segment sendsa packet & enforces each device on the same segment to pay attention to its sendingpacket. Repeaters & hubs propagate collisions; but LAN switches, bridges, & routersdo not.
8/12/2019 CCNA in Short
8/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
Broadcast Domain: (Cisco states that) set of all devices that receive broadcastframes originating from any device within the set. Broadcast domains typically arebounded by routers because routers do not forward broadcast frames.
Frame : it's a logical grouping of information sent as a Data Link layer unit over atransmission medium. Often refers to the header and the trailer, used forsynchronization and error control that surround the user data contained in the unit.
Packet: It's a Logical grouping of information that includes a header containingcontrol information & usually user data. Packets most often are used to refer to
network layer units of data. Packet consists of a certain number of data bytes.
Data Encapsulation: Encapsulation is the process of adding headers to data at eachlayer of a stack. Data that is to be sent over a network starts at the Application layerand moves down a protocol stack until it leaves a host at the Physical layer. At each
layer of a host's stack, a header is placed in front of the data. Your data combined with
a header or headers is a datagram. A datagram at layer 3 is called a packet; a packetstarts with a layer-3 header. A datagram at layer 2 is a frame; a frame starts with alayer-2 header (frame header). (See Fig.2)
A datagram header provides a path up a stack toward an application. A header mustcontain a data field that indicates the type of data encapsulated at the layer
immediately above the layer that adde d the header. For example, when your computerreceives web page from a web server, the header that immediately precedes the web-
page data must contain a field that indicates to your computer that the data beingreceived is meant for your web browser. Another example occurs when a host isencapsulating a packet with a frame header at layer 2, the frame header must contain a
value that indicates what protocol is being spoken; this value could indicate what typeof layer-3 header immediately follows the layer-2 header in the frame.
8/12/2019 CCNA in Short
9/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
CSMA/CD: Carrier Sense Multiple Access/Collision Detection is defined in IEEEstandard 802.3. This standard specifies how multiple computers can send messages
when they sense a live wire. If the messages hit each other, collision detection occurs,& each node realizes that the message have been turned into gibberish. A random
amount of time is then allowed to pass before each node attempts a retransmission.This standard is commonly known as Ethernet.In other words, it's a media-access mechanism wherein devices ready to transmit data
first check the channel for a carrier. If no carrier is sensed for a specific period oftime, a device can transmit.
LAN: Local Area Network- a LAN is a network limited to a specific area, usually thesize of an office. LAN can't go outside the bound Aries of a single building. If thenetwork spans more than a single location, it becomes a WAN. LAN can be dividedinto small logical areas called workgroup (see Fig. 3).
WAN: Wide Area Network- it's a computer network that can span severalbuildings,cities, nations, or countries. The Internet is actually a specific type of WAN.Some of WAN features are:- Greater distance than LAN.
- Speeds are slower than LAN.- Several choices of how the data can be transported.- Possible to connect on demand or have a permanent connection.
8/12/2019 CCNA in Short
10/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
Hub: It's a device that operates on the Physical layer to distribute an inbound networksignal to many outbound connections. Hub broadcasts what it receives on one port toall other ports (provides one broadcast domain). It can be active or passive.
Repeater: It's a device that regenerates the electrical signal coming from one port &sends it out to another port. The repeater enables the cable length to be extended.
For example, with a repeater in a 100BaseT (its length=100 meters) network, you canconnect a second 100BaseT cable & extend the total allowable distance to 200 meters.
Bridge : It's a device that operates at the Data Link layer & is used to extend themaximum reach of a network. A bridge makes two physical segments appear as one
network to the upper layers of the OSI model. Bridge permits communication thatwould otherwise be stopped by aRouter( I'll explain it later). In other words, if twosites for instance on the same network use a protocol that's stopped by a router, then
the use of a bridge is warranted instead.Bridges can connect dissimilar network types (Token Ring & Ethernet for instance) as
long as the bridge operates on the LLC sub-layer of the Data Link layer. If the bridgeoperates at the MAC sub-layer (lower layer), in this case the bridge can only connectsimilar network types (Token Ring with Token Ring, & Ethernet with Ethernet for
instance). Bridge provides one broadcast domain. Bridge looks up the framedestination in its address table & sends the frame towards the destination.
Brouter: It's a device that has the characteristics of both a bridge & a router. Itoperates on both the Data Link layer & Network layer. Brouter are mainly used to
connect different network topologies & bridge between them when the protocol beingused is NOT routable (for example, NetBEUI).
Handshake : (Cisco states that) It's a Sequence of messages exchanged between twoor more network devices to ensure transmission synchronization.
Three-way handshake : A TCP/IP connection is established when a client requeststhe connection by sending a SYN packet to the server. Once the server receives therequest, it will respond with a SYN-ACKacknowledging the clients SYN packet.Finally, the connection is established when the client sends anACKback to the servercompleting the three-way handshake.
DCE: (Cisco states that) Data Circuit-terminating Equipment (ITU-T expansion).Devices & connections of a communications network that comprise the network endof the user-to-network interface. The DCE provides a physical connection to the
network, forwards traffic, & provides a clocking signal used to synchronize datatransmission between DCE & DTE devices. Modems & interface cards are exam plesof DCE.
DTE: (Cisco states that) Data Terminal Equipment. Device at the user end of a user-network interface that serves as a data source, destination, or both. DTE connects to adata network through a DCE device (for example, a modem) and typically usesclocking signals generated by the DCE. DTE includes such devices as computers,protocol translators, & multiplexers.
8/12/2019 CCNA in Short
11/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
CSU: (Cisco states that ) Channel Service Unit- digital interface device that connectsend-user equipment to the local digital telephone loop. Often referred to together with
DSU, as CSU/DSU.
DSU: (Cisco states that) Data Service Unit- device used in digital transmission thatadapts the physical interface on a DTE device to a transmission facility, such as T1 orE1. The DSU also is responsible for such functions as signal timing. Often referred to
together with CSU, as CSU/DSU.
T1 : (Cisco states that) Digital WAN carrier facility. T1 transmits DS1 (DigitalService 1) formatted data at 1.544 Mbps through the telephone-switching network,using AMI (Alternate Mark Inversion) or B8ZS coding.
IEEE 802 series: Institute of Electrical Engineers 802 subcommittees- it definesdifferent network communication protocols. The 802 subcommittees that define
networks & their traffic are the most well known. There are twelve 802 standards. Forexample, 802.2 is the logical control; 802.3 uses CSMA/CD; 802.5 is Token Ring.Using these protocols, & depending on their MAC addresses, packets are directed totheir destinations.
PAP:Password Authentication Protocoluses plaintext (unencrypted) passwords & isthe least sophisticated authentication protocol. PAP is typically used if your
connection & the server cannot negotiate a more secure form of validation.
CHAP: The Challenge Handshake Authentication Protocolnegotiates a secure formof encrypted authentication by using Message Digest 5 (MD5). A hashing scheme is amethod for transforming data (for example, a password) in such a way that the result
is unique & can't be changed back to its original form. CHAP uses challenge-responsewith one-way MD 5 hashing on the response. In this way, you can prove to the server
that you know the password without actually sending the password over the network.
Port : (Cisco states that) in IP terminology, an upper-layer process that receivesinformation from lower layers. Ports are numbered, and each numbered port isassociated with a specific process. For example, SMTP is associated with port 25. A
port number is also called a well-known address .
(Point your browser at the following link :)http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212811,00.html
8/12/2019 CCNA in Short
12/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
OSI Reference Model & Layered Communication
1. Why using Layer ed Networ k Model ?
- Reduces complexity.
- Standardized interfaces.
- Facilitates modular engineering.
- Allows various types of network (hardware & software) to communicate with each
other.
- Accelerates evolution.
- Allows multiple vendors development.
- Prevents changes in one layer from affecting the other layer.
- Simplifies teaching & learning.
2. Descr ibe the funct ions of each the seven l ayer s ofOSI model ?
Layer 7
The Applications layer is where all network applications run. These are theapplications that you use to send information, data, across the network, for example,web browsers and servers & e-mail clients & servers.
Layer 6
The Presentation layer controls the formatting of data for your applications use. For
example, if the data is sound from a radio broadcast to which you are listening acrossthe Internet, the Presentation layer formats the data for the application that youre
using to receive the broadcast.
Layer 5
The Session layer handles the establishment & termination of communicationsessions. For example, when you login to your companys mainframe, a session must
be established for you to be able to talk to the mainframe, & when you logout, yoursession is terminated.
8/12/2019 CCNA in Short
13/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
Layer 4
The Transport layer provides source-to-destination connection establishment for datatransfer. Over the connection, the Transport layer can provide multiplexing for upper
layer applications, hiding details from the higher layers, & establishing sessions.
Layer 3
The Network layer is the most important layer in r outing. The network layer contains
the address that routing software examines to determine where to route a messageacross a network. Router & Brouter are layer 3 devices.
Layer 2
The Data Link layer is dependent on the medium to which a host is attached. The
Data Link layer links the data from the network protocol to the physical medium on
which it is to be transmitted. Data Link layer can provide flow control & errornotification. The IEEE Ethernet Data Link layer has two sub-layers: (MAC) 802.3 &(LLC) 802.2. Switch ( I'll explain it later) & Bridge are layer 2 devices.
Layer 1
The Physical layer defines the characteristics that belong to the type of physical
network connection on a host, for example, the cable type, the connector type, thesignal frequenc y, the signal level, & the maximum cable length. The Physical layerdetermines exactly how bits (binary ones and zeroes) are transmitted and received on
a network. Active Hub & Repeater are layer 1 devices.
Layer
number
Layer Protocols or Connection
media used at this layer
7 Application HTTP, FTP, Telnet, SMTP,DHCP, DNS,etc
6 Presentation NetBIOS, XNS, & NCP
5 Session LDAP, NetBEUI,.etc
4 Transport TCP, UDP, NetBEUI, &SPX
3 Network IP, IPX, SLIP ,..etc2 Data Link ISDN, Ethernet, CSMA/CD,
Frame Relay, Token Ring,
FDDI, PPP, PPTP,..etc1 Physical ISDN, 10Base(T, F, 5, 2),
100Base(T, X), UTP, STP,Frame Relay.....etc (thoseare connection media )
3. Def ine & expl ain TCP/ IP Inter net pr otocol s?
8/12/2019 CCNA in Short
14/51
8/12/2019 CCNA in Short
15/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
5.Fig
FTP: File Transfer Protocol- it is both a protocol & program. It transfers files betweentwo computers using the TCP/IP protocol. FTP is a simple protocol that transfers
complete files from an FTP server to an FTP client. It can't perform browsingfunctions. Users must know the URL of the FTP server to which they wish to attach.
FTP is associated with port 21.ftp.mysite.com:21For example,
HTTP: Hypertext Transfer Protocol- an important protocol used when a browser isconnected to a web server. It governs the transfer of files, both text & multimedia,across the web. It's based on the idea that files can contain links to other files which in
turn link to other files. Servers make requests, wait for the response, & then processthe received file using HTTP. HTTP is associated with port 80.
SMTP: Simple Mail Transfer Protocol- it sends e-mails. Server to server transmissionuses SMTP. When you send a message from your client to server, SMTP is also used.
Dissimilar operating systems work with SMTP e-mail protocol, which originates fromTCP/IP suite. SMTP is associated with port 25.
DNS : Domain Name System- it resolves Internet domain names to IP address & viceversa.
For example, www.certificationsuccess.comis resolved to 216.168.60.68 via a DNSserver. DNS resolvesFully Qualified Domain Name(FQDN); the mentioned URL
here is FQDN. Users & computers access servers & their shared folders via domainnames. DNS is associated with port 53.
TFTP uses port 69.http://www.webopedia.com/TERM/T/TFTP.htmlTFTP :
DHCP: (Microsoft states that) Dynamic Host Configuration Protocol (DHCP) is aTCP/IP standard for simplifying ma nagement of host IP configuration. The DHCPstandard provides for the use of DHCP servers as a way to manage dynamic allocation
of IP addresses & other related configuration details to DHCP-enabled clients on yournetwork.
8/12/2019 CCNA in Short
16/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
Every computer on a TCP/IP network must have a unique computer name & IPaddress. The IP address (together with its related subnet mask) identifies both the hostcomputer and the subnet to which it is attached. When you move a computer to a
different subnet, the IP address must be changed. DHCP allows you to dynamically
assign an IP address to a client from a DHCP server IP address database on your localnetwork (see Fig.6):
Fig.6
For TCP/IP-based networks, DHCP reduces the complexity & amount ofadministrator work involved in reconfiguring computers.
SNMP: Simple Network Management Protocol- it's a network management standardwidely used in TCP/IP & IPX networks. SNMP provides a method of managing
network hosts such as workstation or server computers, routers, bridges, & hubs froma centrally -located computer running network management software. SNMP isassociated with port 161. SNMP can be used to:
- Configure remote devic es.- Monitor network performance.
- Detect network faults or inappropriate access.
Telnet: (Cisco states that) it's a standard terminal emulation protocol in the TCP/IPprotocol stack. Telnet is used for remote terminal connection, enabling users to log into remote systems and use resources as if they were connected to a local system.Telnet is associated with port 23.
:)SPoint your browser at the following link(:TCP
TCP Overview
http://www.netfor 2.com/tcp.htm
TCP Header Formathttp://www.freesoft.org/CIE/Course/Section4/8.htm
Further Information
http://www.cis.ohio-state.edu/cgi-bin/rfc/rfc1379.html
http://www.ee.siue.edu/~rwalden/networking/tcp.html
8/12/2019 CCNA in Short
17/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
http://ironbark.bendigo.latrobe.edu.au/subjects/bitcne/1997/lectures/Lect03.html
UDP: User Datagram Protocol- it's a connectionless transport protocol in the TCP/IPprotocol stack. UDP is a simple protocol that exchanges datagrams, withoutacknowledgments, windowing, or guaranteed delivery, requiring that error processing& retransmission be handled by other protocols; therefore it lacks the reliable
delivery.For example, if you were to send data across an Internetwork, it doesn't matter in what
order the pieces of your message arrive as long as it all arrives.( Point your browser at the following link :)
http://www.erg.abdn.ac.uk/users/gorry/course /inet-pages/udp.html
the protocol that hides the underlying physical network byit's-Internet Protocol:IPcreating a virtual network view. It is an unreliable, best -effort, & connectionlesspacket delivery protocol. Note that best-effort means that the packets sent by IP may
be lost, arrive out of order, or even be duplicated.(Point your browser at the following link :)
http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/ ip.htm
ICMP : Internet Control Message Protocol- it is used to send control &troubleshooting packets over an IP-based network.For example, ICMP is used onPingcommand, if you ping any station with an IPaddress (ICMP echo request), the ICMP that is a part of the host's TCP /IP stack willrespond to the request (ICMP echo reply).
ARP: Address Resolution Protocol- it is used only on a LAN. Every transmission onthe LAN contains the local network, or MAC address of the source & destinationhosts. Routing can't be performed using the MAC address.
When a source does not know the MAC address of a non-local router, the sourceissues an ARP request. A router that is connected to the same network as the sourcepicks up the ARP request. This router issues an ARP reply to the device that
originated the ARP request. The reply contains the MAC address of the non-localrouter. Without the ARP request ever going beyond the local network, the source is
able to obtain the addressing information it needs in order to send data to deviceslocated on distant networks. In other words, ARP resolves IP address to Ethernet
address (MAC address).
8/12/2019 CCNA in Short
18/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
4. Expl ain how the inf or mation is packaged at the OSImodel ?
The information is packaged in this order:
. Data (at Application/Presentation /Session layers)
. Segment (at Transport layer)
. Packet (at Network layer)
. Frame (at Data Link layer)
. Bits (at Physical layer)
The OSI model defines layers, interfaces between layers, Protocol Data Units (PDUs)for each layer, & protocols for each layer. Each layer of communication, on the
source computer, communicates with a layer-specific PDU, & with its peer layer onthe destination computer.
Data packets on a network originate at a source & are then sent to a destination. Each
layer depends on the service function of the OSI layer below it. To provide thisservice, the lower layer uses encapsulation to put the PDU from the upper layer into
its data field; then it adds whatever headers & trailers the layer needs to perform itsfunction. Next, as the data moves down through the layers of the OSI model, headers
& trailers are added. After Layers 7, 6, and 5 have added their information, Layer 4
adds more information. This grouping of data, the Layer 4 PDU, is called a Segment.
The Network layer has the task of moving the data through the Internetwork. Itaccomplishes this task by encapsulating the data within a header. This header contains
information required to complete the transfer, such as source & destination logicaladdresses. The Network layer provides a service to the Transport layer by
encapsulating the data within a header & creating a Packet (the Layer 3 PDU.)
The Data Link layer provides a service to the Network layer. It encapsulates the
Network layer information in a Frame (the Layer 2 PDU); the frame header contains
information (such as, physical addresses) required to complete the data link functions.The Physical layer also provides a service to the Data L ink layer. The Physical layer
encodes the data link frame into a pattern of ones & zeros (B its) for transmission on
the connection medium (usually a wire) at Layer 1. (See also Data Encapsulationexplained earlier.)
5. Expl ain each of the thr ee l ayer s of Cisco model ?
Core layerRouters connect to other core routers providing multiple paths over the backbonebetween destinations. These routers carry the bulk of WAN traffic between thedistribution routers. Core routers are usually configured with several high speed
interfaces.
8/12/2019 CCNA in Short
19/51
8/12/2019 CCNA in Short
20/51
8/12/2019 CCNA in Short
21/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
2. Suppose you were provided the following IP address : 136.28.92.55?
- This's a c lass B (136 falls within its Decimal Range 128-191).
- Network address: 136.28(based on the Default Subnet Mask 255.255.0.0, thus itsformat isNetwork .Network.Host.Host).
- Host address: 92.55
---------------------------------------------------------------------------
3. Suppose you were provided the following IP address : 192.168.24.18?
- This's a c lass C (192 falls within its Decimal Range 192-223).
- Network address: 192 .168.92 (based on the Default Subnet Mask 255.255.255.0,thus its format is Network .Network.Network.Host).
- Host address: 18
inary& Bexadecimal,Hecimal,DbetweeningConvert
Note: You have to understand & memorize the powers of 2 for use with IP subnetting
(I replaced "to the power" w ith ** mark).
2**0 = 12**1 = 22**2 = 42**3 = 8
2**4 = 162**5 = 322**6 = 64
2**7 = 128
- Convert the decimal number 24032 to a hexadecimal number:
24032 / 16 = 16 into 24032 is 1502, with a remainder of 01503 / 16 = 16 into 1502 is 93, with a remainder of 14 or E
93 / 16 = 16 into 93 is 5, with a remainder of 13 or D
13 / 16 = 16 into 13 is 0, with a remainder of 3
By collecting all the remainders backward, we have the hexadecimal number 3DE0.
8/12/2019 CCNA in Short
22/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
-Convert the binary number 11000000 to a decimal number:
11000000 (Work from right hand side to left)
1 1 0 0 0 0 0 0
128 64 32 16 8 4 2 1
In this example, there are 0 values of 1, 0 values of 2 , 0 values of 4 , 0 values of 8, 0
values of 16 , 0 values of 32, 1 value of 64, & 1 value of 128. There are no 1s, no
2s, no 4s, no 8s, no 16s, no 32s, one 64, & one 128. Added together, the values equal192, therefore, the binary number 11000000 equals the decimal num ber 192.
- Convert the binary IP address 10101010.11111111.00000000.11001101 to a
decimal number:
1 0 1 0 1 0 1 0
128 + 32 + 8 + 2 = 170128 6432 16 8 4 2 1
To convert this IP address, start with the bit that is on the far left side in the first octet.
It is 1. You should know that the value of a bit in that position is 128; therefore thedecimal number starts with a value of 128. The next value is 0, so skip it; the thirdvalue is 1. Any bit in that position has a value of 32; therefore you must add 32 to
128, which then equals a new value of 160. The fourth bit is 0; the fifth bit is 1, whichmeans that now you must add 8 to the current value of 160, giving you a total of 168.
The sixth bit is also 0, the seventh bit is 1, which means add 2 to the current value of168. The last bit is 0, so you can skip it. The value for the first octet, after all thenumbers have been added, is 170.
The second bit from the left side equals 255 (give it a try!).
- Convert the first octet of 192.57.30.224 to a binary format :
128 64 32 16 8 4 2 1 = 192
1 1 0 0 0 0 0 0 = 11000000
The first step is to select the octet on the far left and determine whether the value isgreater than 128. In this instance (192), it is. Then place a 1 in that bit and subtract128 from 192. The remainder is 64. The value of the next bit is 64, which is equal to
the value of the remainder, so that bit would be 1 as well. Subtract 64 from 64. Theremainder is 0; therefore the remaining bits would all be 0. The binary number for thefirst octet would be 11000000.
57= 111001, 30= 11110 & 224= 11100000.
8/12/2019 CCNA in Short
23/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
Private IP addresses
These types of addresses were designated to solve the explosive growth of theInternet. Each device connected to the Internet needs its own "public " IP address. But,
what if there are several devices in your LAN that DON'T need to be connected
directly to the Internet?, thus, instead of assigning a public IP address for each ofthese devices; InterNIC & IANA designated some IP address range asprivateaddresses (they can't directly access the Internet or receive data from the Internet).
10.0.0.0 - 10.255.255.255 with a subnet mask 255.0.0.0
172.16.0.0 - 172.31.255.255 with a subnet mask 255.240.0.0
192.168.0.0 - 192.168.255.255 with a subnet mask 255.255.0.0
Subnetting
Network administrators sometimes need to divide networks, particularly largenetworks, into smaller networks, called subnetworks, in order to provide extraflexibility. Most of the time subnetworks are simply referred to as subnets.
Similar to the host number portion of class A, class B, & class C addresses, subnetaddresses are assigned locally, usually by the network administrator. Moreover, like
other IP addresses, each subnet address is unique. It is possible to break a class B IPaddress into many subnets for instance.
(Point your browser at one ormore the following link S :)
http://www.learntosubnet.com
http://subnetting.tcp-ip.nu
http://www.ralphb.net/IPSubnet
http://compnetworking.about.com/library/weekly/aa043000a.htm
(Free Subnetting exams )
http://www.2000trainers.com/exams/subnetting
8/12/2019 CCNA in Short
24/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
Ethernet Networking
1. What is Ether net?
(Cisco states that) it's a baseband LAN specification invented by Xerox Corporation& developed jointly by Xerox, Intel, & DEC. Ethernet networks use CSMA/CD & run
over a variety of cable types at 10 Mbps. Ethernet is similar to the IEEE 802.3 seriesof standards.
2. List & descr ibe the Ether net connect ion media types(802.3standar ds) at Physical l ayer?
Before starting to list, you have to know some specifications for cabling system:
- The Ethernet naming convention is #BaseN(where #refers to the speed in Mbps,Base refers to Baseband, & Nrefers to the type of cable).For example, 100BaseT100: 100 Mbps
Base: BasebandT: stands for Twisted pair, which means it can go to 100 meters.
- RJ: Registered Jack- (Cisco states that) standard connectors originally used toconnect telephone lines. RJ connectors are now used for telephone connections & for
10BaseT & other types of network connections. RJ-11 (telephone connector ), RJ-12,& RJ-45 (Ethernet connectors) are popular types of RJ connectors (see Fig.7).
7.Fig
- UTP: Unshielded Twisted Pair sheathing type - it is used for Category 3 & Category5 w ires. The most common use for Unshielded Twisted Pair cable is Ethernet (seeFig.8).
- Category 3 : It's a data grade physical medium. Category 3 consists of four twistedpairs, with three twists per foot. It rates up to 10Mbps.
- Category 5 : It's the current standard of wire that's run from wire closets to desktops .
It consists of four twisted pairs & is rated for up to 100Mbps.
- Fiber Optic cables: The highest performing structured cabling systems use fiberoptics. These systems offer many advantages over copper-based systems. Since fiber
8/12/2019 CCNA in Short
25/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
optics use light pulses instead of electrical signals for transmitting information, thereis no concern for EMI (Electromagnetic Interference) or RFI (Radio FrequencyInterference).
Transmission distances are greater because light pulses lose energy much more slowly
than electrical signals. Fiber also offers a much greater bandwidth than copper cables(see Fig.8).
- Coaxial cable : It's a thick cabling that's commonly housed in a black sheath (seeFig.8). There are thinnetversion (10Base2) & thicknetversion (10Base5).
8.Fig
Ethernet media types
Maximum Length
(meters )
CategoryTypeIEEE 802.3
standards
1003UTP10BaseT
185UTP10Base2
500UTP10Base51003, 4, or 5UTP (Fast
Ethernet)100BaseT4
1005, 6, or 7UTP100BaseTX
100UTP100BaseVGAnylan
412Fiber cabling100BaseFX
25Copper shieldedtwisted pair
1000BaseCX
10000Fiber cabling
(Laser)
1000BaseLX
260MMF1000BaseSX
1005UTP1000BaseT
Note: 100BaseVGAnylan is very rarely used now.
8/12/2019 CCNA in Short
26/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
3. What ar e the types of Ether net f r ames at Data Linkl ayer ?
. Ethernet_| |
. IEEE 802.2
. IEEE 802.3
. SNAP(Point your browser at the following link :)
http://www.yale.edu/pclt/COMM/ETHER.HTM
4. State Ether net cabl es types?
Crossover cable : Four wires are used in this type to connect devices (see Fig.9). You
use this type of Ethernet cabling if you want to connect:- Hub to another hub.- Hub to a switch.
- Switch to another switch (uplinks).- Router interface to another router interface.
- Host to host w ithout using a hub or a switch.
Straight-Through cable : Four wires are used in this type to connect devices (seeFig.9). You use this type of Ethernet cabling if you want to connect:- Host to hub or switch.
- Server to hub or switch.
- Router to hub or switch.
9.Fig
Rolled cable : Eight wires are used in this type to connect serial devices. You use thistype of Ethernet cabling if you want to connect:
- Host to a router console serial communication (com) port.
8/12/2019 CCNA in Short
27/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
5. What is the dif f er ence between Hal f - dupl ex & Ful l -Dupl ex Et her net?
Half-duplex Ethernet:- It uses one wire pair with digital signal running in both directions.- It uses CSMA/CD.- You use this type if you want to connect a hub to a switch (10BaseT).
Full-duplex Ethernet:- It uses two wires pairs.
- It uses point-to-point connection between sendin g host & receiving host.- There are no collisions.- You use this type if you want to connect:
. Host to a switch.
. Switch to a switch.
. Host to host (by using crossover cable).
Further Information
http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/ethernet.htm
http://www.techfest.com/networking/lan/ethernet.htm
http://www.networkuptime.com/faqs/ethernet
8/12/2019 CCNA in Short
28/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
):10.see Fig(Icons used for networking devices.
10.Fig
see(used for networks & network connectionssIcon.):11.Fig
11.Fig
8/12/2019 CCNA in Short
29/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
witchingS/Bridging
1. What is a switch?
A switch is a layer 2 device that directs (looks up) frames according to their MACaddresses.
2. State the simil ar ities & contr asts between switches& br idges?
- Switches & bridges make forwarding decision based on layer 2 addresses.
- Switches & bridges don't break up broadcast domains by default.- Switches & bridges forward layer 2 broadcasts.
- Switches are hardware based (use the MAC address ), while bridges are softwarebased.- Switches have higher number of ports than most bridges.
- Switches can have many STPs (Spanning Tree Protocols), while bridges have oneonly.
3. How does l ayer 2 switch function?When you turn on the layer 2 switch at the first time, its MAC address table is empty.Now consider four hosts connected to a layer 2 switch as shown in Fig. 12:
- Address learning.
- Forward/Filter decisions.- Loop avoidance.
8/12/2019 CCNA in Short
30/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
12.Fig
1) Host A sends a frame to host C.2) Switch's MAC address table was empty before host A sends that frame. But now ithas the MAC address of host A .
3) Switch has no idea about the MAC address of host C (it doesn't have thedestination's MAC address in its MAC address table) in order to forward that frame.
4) Switch broadcasts that frame to all hosts within its segment asking the destination'sMAC address.5) Host C receives that frame & replies with its MAC address. Switch's MAC address
table places the destination's MAC address.6) Frames now will be received by both host A & C only as point-to-point connection.Other hosts will not be able to see the frames (collision domain). As well as, theirMAC addresses are not placed in the switch's MAC address table yet because theydidn't send a frame to the switch.
4. Why is l ayer 2 switch better than the hub inEther net LAN networ ks?
Switch provides one broadcast domain with multiple collision domains which meansa network segment with several Ethernet devices sharing the same bandwidth (seeFig.13). Each port of a switch has its own separate collision domain , which means
more network segments & bandwidth increasing for each host. Unlike hub whichprovides one broadcast domain only without collision domains .
13.Fig
8/12/2019 CCNA in Short
31/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
5. Define & expl ain STP operation?
Spanning Tree Protocolwhich is used to stop an infinite network loops & shut down
any redundant links from occurring on bridges & layer 2 switches which can cause abroadcast storm (an undesirable network event in which many broadcasts are sent
simultaneously across all network segments. A broadcast storm uses substantialnetwork bandwidth & typically causes network time-outs).
(Cisco states that) bridge protocol that uses the spanning-tree algorithm, enabling alearning bridge to dynamically work around loops in a network topology by creating aspanning tree. Bridges exchange BPDU (Bridge Protocol Data Unit) messages with
other bridges to detect loops, & then remove the loops by shutting down selectedbridge interfaces.
:Function
- Selecting the Root Bridge: The bridge ID is selected based on the default priority ofthe device (= 32,768). Otherwise, the lowest device's MAC address will be taken into
consideration in case the two devices having the same priority.
- Selecting the Designated Port: If there's more than one link connected to the rootport, a port cost will be taken into consideration to determine which port will be theroot port. However, each direct connection to the root bridge will be a root port.
- Selecting the Blocked port: it must be done by shutting down the redundant link toavoid infinite network loops based on bridge ID as well. (For example, if there are
two switches D & E, one of them must be shut down, & referring to the Blocking Portmode, switch E would be blocked).
:STP modes
- Blocking: A blocked port doesn't send frames, but can listen to the BPDUs.- Listening: Port listens to the BPDUs in order to make sure that there are no infinite
network loops occur.- Learning: Port learns all the paths in the switched network.- Forwarding: Port sends & receives data.
- Disabled: Port doesn't participate in the frame forwarding or STP.
6. Distinguish between cut-thr ough, f r agmentf r ee, &stor e-and-f or war dLAN switc hing?
LAN switching types determine how the frame is handled when it's received on theswitch port. Switching modes are:
8/12/2019 CCNA in Short
32/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
Cut-through: (Cisco states that) a packet switching approach that streams datathrough a switch so the leading edge of a packet exits the switch at the output port
before the packet finishes entering the input port. A device using cut-through packet
switching reads, processes, & forwards packets as soon as the destination address islooked up & the outgoing port is determined.
FragmentFree : Also called modified cut-through. A switch checks the first 64 bytesof a frame before forwarding it for fragmentation. This mode is a default mode forCatalyst 1900 switch.
Store -and-forward : (Cisco states that) packet-switching technique in which framesare completely processed before being forwarded out the appropriate port. This
processing includes calculating the CRC (Cyclic Redundancy Check) & checking thedestination address. In addition, frames must be stored temporarily until networkresources (such as an unused link) are available to forward the message.
7. Name some of Cisco Catal yst switc h pr oducts ser ies?
- Cisco 1548 Micro switch 10/100.- Catalyst 1900/2820 series.- Catalyst 2900 series XL.
- Catalyst 3000 series.- Catalyst 2900 series.- Catalyst 5000 series.
- Catalyst 6500 series.- Catalyst 8500 series.
8/12/2019 CCNA in Short
33/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
8. Descr ibe the oper ation & benef its of VLANs?
Virtual LAN. (Cisco states that) it's a group of devices on one or more LANs that are
configured (using management software) so that they can communicate as if theywere attached to the same wire, when in fact they are located on a number of differentLAN segments. Because VLANs are based on logical instead of physical connections,they are extremely flexible.
(Cisco states that) A VLAN is defined as a broadcast domain within a switched
network. Broadcast domains describe the extent that a network propagates a broadcastframe generated by a station. Some switches may be configured to support a single or
multiple VLANs.Whenever a switch supports multiple VLANs, broadcasts within one VLAN neverappear in another VLAN. Switch ports configured as a member of one VLAN belong
to a different broadcast domain, as compared to switch ports configured as members
of a different VLAN. Creating VLANs enables administrators to build broadcastdomains with fewer users in each broadcast domain.This increases the bandwidth available to users because fewer users will contend forthe bandwidth. Routers also maintain broadcast domain isolation by blockingbroadcast frames. Therefore , traffic can pass from one VLAN to another only througha router. Normally, each subnet belongs to a different VLAN. Therefore, a network
with many subnets will probably have many VLANs. Switches & VLANs enable anetwork administrator to assign users to broadcast domains based upon the user's jobneed. This provides a high level of deployment flexibility for a network administrator .
Advantages of VLANs include the following:
. Segmentation of broadcast domains to create more bandwidth.
. Additional secur ity by isolating users with bridge technologies.
. Deployment flexibility based upon job function rather than physical placement.
. Increasing the number of broadcast domains while decreasing their size.
Now, after you knew that VLAN breaks up a broadcast domain which's provided by alayer 2 switch into several small broadcast domains & that would increase security &bandwidth.
For example, suppose you have created two VLANs for two departments as shown inFig.14.
Network address /subnet
mask
DepartmentVLAN number
192.168.10.0/24Engineering1
192.168.40.0/24I.T2.
Note: Instead of writing subnet mask as 255.255.255.0, Cisco developed a for mat ofwriting any subnet mask by counting the 1s of it (after converting the subnet mask toa binary number), so in this case the subnet mask would be 24 (since the subnet mask
8/12/2019 CCNA in Short
34/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
contains 24 ones). Another example, convert the subnet mask 255.255.224.0 to aCisco format, after converting this subnet mask to a binary number, the result will be:11111111.11111111.11111111.11100000, so when you count the number of 1s in
here you will get 19 which's the default subnet mask in Cisco format.
14.Fig
Now, if you want to add a new user to an I.T department (VLAN 2), & this new useris physically located in the Sales depa rtment for instance, you can assign the neededport of this user in VLAN 2 (logically) without needing to shift him (physically) tothe I.T department. But, correct IP address information must be taken into account inorder to logically assign a device to a VLAN's port. For our example, the IP address
information of the new user must be in the same range as network address of VLAN 2(192.168.40.0/24), as well as, each host in VLAN 2 must be configured into the192.168.40.0/24 network. However, this applies to every VLAN in the network.
In our case, the new user can be assigned 192.168.40.5/24 for instance.
9. State the two dif f er ent types of l inks in a switchednetwor k?
- Access link.- Trunk link: It's a 100 or 1000Mbps (10Mbps is not an option) point-to-point link
between:
. Switch & a server.
. Switch & another switch.
. Switch & a router.
(Point your browser at the following link :)ftp://ftp.netlab.ohio-state.edu/pub/jain/courses/cis788-
97/virtual_lans/index.htm#Connections
8/12/2019 CCNA in Short
35/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
10. How can hosts communicate between dif f er entVLANs?
As in our previous example (Fig.14), VLAN 1 can communicate with VLAN 2 byusing a layer 3 device (Router ). You can use a router with multiple interfaces for each
VLAN (in our example, two interfaces are needed) with 10BaseT or Fast Ethernetconnections.
But, what if we have dozens of VLANs, & they are more than router interfacesavailable for instance?!. We can use a router that supports ISL (Inter Switch Link)routing on one Fast Ethernet or Gigabit Ethernet links only. ISL routing is supported
in the 2600 series router or higher (1600, 1700, & 2500 series don't support it ).Otherwise, you may buy a RSM (Route Switch Module) for a 5000 series switch.
Note: ISL is proprietary to Cisco switches.
11. Expl ain VTP (V L A N T r u n k P r o t o c o l )?
(Point your browser at the following link :)http://www.cisco.com/warp/public/473/21.html
Further Information
http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/lanswtch.htm
ftp://ftp.netlab.ohio-state.edu/pub/jain/courses/cis788-97/virtual_lans/ index.htm
http://net21.ucdavis.edu/newvlan.htm
8/12/2019 CCNA in Short
36/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
Router
1. What is a router ?
In networking, there are two addressing schemes: one uses the MAC address, a datalink (Layer 2) address; & the other uses an address located at the network layer (Layer3) of the OSI model. An example of a Layer 3 address is an IP address. A router is a
type of internetworking device that passes data packets between networks, based onLayer 3 addresses. A router has the ability to make intelligent decisions regarding thebest path for delivery of data on the network.(Cisco states that) it's a Network layer device that uses one or more metrics (low cost)to determine the optimal path along which network traffic should be forwarded.
Routers forward packets from one network to another based on network layerinformation. Occasionally called a gateway (although this definition of gateway is
becoming increasingly outdated).
2. What is a router interf ace?
A routers attachment to a network is called an interface (network connection); it may
also be referred to as a port. In IP routing, each interface must have a separate, uniquenetwork (or subnetwork) address. (See Fig.15)- S0 (Serial interface, 0 is an interface number).- E0 (Ethernet interface, 0 is an interface number).- F0/0 (Fast Ethernet interface).
8/12/2019 CCNA in Short
37/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
15.Fig
3. Def ine Consol e por t & Auxil iar y por t on a Ciscor outer ?
- Console port : It's an RJ-45 connection port on the back of a Cisco router (usually)
& switch that allows CLI (Command Line Interface).
- Auxiliary port: It can be the Console port as well on the back of Cisco router that
allows dialing the router by configuring modem commands & make consoleconfiguration settings if the router is down.
(Point your browser at the following link :)
http://www.cisco.com/warp/public/779/smbiz/service/knowledge /pinouts/ios_conaux.htm
------------------------------------------------------------------------------
4. What ar e the r outer modes?
- User mode : It is used to view statistics. However, after you press Enter in the CLI,the Router>prompt will appear, which means you are in the User mode.
- Privileged mode : It is used to view & change a Cisco router configuration.However, when Router#prompt appears, that means you are in the Privileged mode.
- Global configuration mode : It is used to change the whole router running-configuration. However, when you type config t ( configure terminal) in the privilegedmode (Router#config t ), the Router(config)# prompt appears, which means you are in
the Global configuration mode.
5.Dif f er entiate between r outedand routingpr otocol s?
You know that protocols are like languages. IP is a network layer protocol, however,
IPs can also provide fragmentation, & reassembly. Because IP is routed over anInternetwork, it is called a routed protocol. Examples of other types of routed
protocols:
.IPX
.Appletalk
Routers use routing protocols to exchange routing tables & share routing information.In other words, routing protocols are protocols that determine how routed protocols
get routed. Examples of routing protocols:
(Routing Information Protocol)RIP.
8/12/2019 CCNA in Short
38/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
(Interior Gateway Routing Protocol)IGRP.
(Enhanced Interior Gateway Routing Protocol)EIGRP.
(Open Shortest Path First)OSPF.
Routing protocols enable routers to draw a map, internally, of the entire Internet forthe purposes of routing. Such maps become part of each router's routing table.
6. Descr ibe the Administr ative Distance f or r outingpr otocol s?
(Cisco states that) rating of the trustworthiness of a routing information source.Administrative distance often is expressed as a numerical value between 0 and 255.
The higher the value, the lower the trustworthiness rating. Administrative DistanceabbreviatedAD.Default AD
Default ADRoute Source
0Connected interface
1Static route
90EIGRP100IGRP
110OSPF
120RIP
255Unknown
7. Descr ibe the cl asses of r outing pr otocol s?
- Distance Vector: (Point your browser at the following link :)
http://www.firewall.cx/distance_vector.php
- Link State : For example, OSPF. It creates three separate tables:
. A table that keeps track of directly attached neighbors to the router.
. A table that determines the entire Internetwork topology.
. A table that is used as a routing table.
- Hybrid: It uses both Distance Vector & Link State protocols (for example, EIGRP).
8/12/2019 CCNA in Short
39/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
8. Descr ibe RIP (r outing inf or mation pr otocol )f eatur es?
- Distance Vector routing protocol.- Only metric is number of hops.
- Maximum number of hops is 15.- Updates every 30 seconds.- Doesn't always select fastest path for packets.
- Generates lots of network traffic with updates.
Note: (C isco states that) a hop is a Passage of a data packet between two networknodes (for example, between two routers). Hop countis a Routing metric used tomeasure the distance between a source & a destination. RIP uses hop count as its solemetric. Routing metric is a method by which a routing algorithm determines that oneroute is better than another. This information is stored in routing tables. Metrics
include bandwidth, communication cost, delay, hop count, load, MTU (MaximumTransmission Unit), path cost, & reliability. Sometimes referred to simply as a metric .
9. Descr ibe IGRP (In t e r io r G a t ew a y R o u t i n g P r o t o c o l )f eatur es?
IGRP was developed specifically to address problems, associated with routing inlarger networks that were beyond the scope of protocols such as RIP (maximum hopcount is 15). Like RIP, IGRP is a distance vector protocol; however, whendetermining the best path, it also takes into consideration such things as bandwidth,load, delay, MTU, & reliability. The maximum hop count of IGRP is 255.
10. Def ine Conver gence?
It's the time it takes a router to recognize a network topology change, calculate thechange within its own table & then distribute the table to adjacent routers. The
adjacent routers then perform the same functions. The total time it takes for the
routers to begin using the new calculated route is called the convergence time. Thetime for convergence is critical for time-sensitive traffic. If a router takes too long to
detect, recalculate & then distribute the new route, the time-sensitive traffic mayexperience poor performance or the end nodes of the connection may then drop.
11. How can we avoid r outing l oops?
(Point your browser at the following link :)
8/12/2019 CCNA in Short
40/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
http://www.firewall.cx/distance_vector.php
12. Descr ibe the basic Cisco r outer components?
BootstrapThe main purpose of Bootstrap is to boot the router & then load IOS.
POST(Power-On Self Test) is used to check the basic router functions of the routerhardware & determines the presented interfaces.
Memory
All computers have memory of some type. Cisco routers have four main types ofmemory:
(Read-Only Memory)ROMFlash Memory
(Random-Access Memory)RAM(Non-Volatile RAM)NVRAM
Of each of these types, RAM is the only one that loses its contents when the router is
booted or power-cycled. The following sections briefly describe the primary purposeof each memory type on Cisco routers:
ROM
ROM is where a routers bootstrap software is normally stored. The bootstrapsoftware is the first software that runs; it has the responsibility of getting the routergoing.
FlashFlash memorys primary purpose is to store the IOS software that the router is to run.If a router has flash memory, then flash memory is the default location of the IOSsoftware used to boot the router. With enough flash memory, multiple IOS images can
be stored to provide multiple boot options.
RAMRAM is used for too many things to list, but two of the things are IOS system tables& buffers. The IOS uses RAM for all of its normal, operational storage requirements.
NVRAMThe primary purpose of NVRAM is to store the configuration that the IOS reads when
a router boots. This configuration is called the startup conf iguration.
Configuration register
8/12/2019 CCNA in Short
41/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
It is used to control how the router boots up. It can be noticed by typing show versioncommand in CLI (0x2102). However, this tells the router to load IOS from flashmemory.
13. Descr ibe r outer star t-up sequence?
1) POST.2) Bootstrap.
3) IOS software looks for a valid configuration file stored in NVRAM.4) If startup-config file in NVRAM, the router loads. However, if not, the router starts
the setup mode configuration.
Further Information
http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/rip.htm
http://www.cisco.com/warp/public/103/5.html
http://www.firewall.cx/link_state.php
http://www.idir.net/~adrian/ip_tutor/trouble/RtLoop.html
http://www.networkcomputing.com/715/715wsrip.html
8/12/2019 CCNA in Short
42/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
WAN Protocols
1. Def ine WAN terms?
- CPE- Demarc- Local loop
- CO(Point your browser at the following link :)
http://personal.hartfordschools.org/~stephen/library/network_primer/appendix_c.html
2. Expl ain key Fr ame Rel ay terms and f eatures?
Frame relay is based on a packet-switched data network. The differential of frame
relay to previous packet-switched networks like X.25 is that frame relay switches aframe versus a packet. Frame relay has considerable low overhead & its speed
through the network is in part to not insuring delivery of data. Frame relay as a WANnetwork solution grew due to the low cost for acceptable performance as compared to
leased-line WAN solutions. An optimal frame relay network design is based on thefollowing:
. Balancing the cost savings of using a public network with the business performancerequirements.
. A scalable WAN design founded in a manageable environment.
. Utilizes a hierarchical design.
Components for creating a scalable frame relay network designs are:
.The adherence to the three-layer router model of Core, Distribution & Access
layers.
. Overall hierarchical design.
. Implementing various mesh topology design.
. Addressing protocol broadcast issues.
. Addressing performance concerns.
8/12/2019 CCNA in Short
43/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
Frame relay design is based on permanent virtual connections (PVCs). A PVC isidentified using a Data Connection Link Identifier (DLCI) number. Multiple PVCs are
possible over a single physical communication link. Using this ability, a single link
can communicate with multiple locations.Due to the nature of frame relay services through PVCs, hierarchical designs are more
logical than physical in definition. Each PVC may be guaranteed bandwidthparameters called committed information rate (CIR). The CIR is an agreement withthe frame relay provider for a minimum throughput for the PVC.
3. Dif f er entiate between the f ol l owing WAN ser vices:LAPB, Fr ame Rel ay, ISDN/ LAPD, HDLC, PPP, and DDR?
(Point your browser at the following link :)
http://www.geocities.com/ciscosite/ccna/wanprotocols.html# 8
- LAPB : (Cisco states that)Link Access Procedure, Balanced. Data Link layer
protocol in the X.25 protocol stack. LAPB is a connection-oriented protocol derivedfrom HDLC.
- Frame Relay : (Cisco states that) Industry-standard, switched Data Link layerprotocol that handles multiple virtual circuits using HDLC encapsulation between
connected devices. Frame Relay is more efficient than X.25, the protocol for which itgenerally is considered a replacement.
- ISDN/LAPD: (Cisco states that)Integrated Services Digital Network.
Communication protocol offered by telephone companies that permits telephonenetworks to carry data, voice, & other source traffic. LAPD is aLink Access
Procedure on the D channel. ISDN data link layer protocol for the D channel. LAPD
was derived from the LAPB protocol & is designed primarily to satisfy the signalingrequirements of ISDN basic access.
- HDLC: (Cisco states that)High-Level Data Link Control. Connection-orientedsynchronous data link layer protocol developed by ISO. Derived from SDLC, HDLC
specifies a data encapsulation method on synchronous serial links using framecharacters & checksums.
- PPP: (Cisco states that)Point-to-Point Protocol. Successor to SLIP that providesrouter-to-router & host-to-network connections over synchronous & asynchronous
circuits. Whereas SLIP was designed to work with IP, PPP was designed to work withseveral network layer protocols, such as IP, IPX, & ARA. PPP also has built-insecurity mechanisms, such as CHAP & PAP. PPP relies on two protocols: LCP (Link
Control Protocol) & NCP (Network Control Program).
8/12/2019 CCNA in Short
44/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
- DDR:Dial-on-Demand Routing uses switched circuit connections through publictelephone networks. Using these switched circuits allows Cisco routers to providereliable backup and bandwidth optimization between locations. The features
supported by Cisco DDR include:
. POTS via an external modem
. SW56 via an external CSU
. ISDN (BRI and PRI) via integrated ISDN interfaces or external terminal adapters
. Dial backup
. Supplementary bandwidth
. Bandwidth-on-demand
. Snapshot routing. Multiprotocol routing & transparent bridging over switched circuits
. ISDN fast switching
. Asynchronous ISDN access
(Cisco states that)Dial-on-Demand Routing. Technique whereby a router canautomatically initiate & close a circuit-switched session as transmitting stationsdemand. The router spoofs keepalives so that end stations treat the session as active .DDR permits routing over ISDN or telephone lines using an external ISDN terminaladaptor or modem.
4. Identif y PPP operations to encapsul ate WAN data onCisco r outer s?
PPP was designed to be used over point-to-point links. In fact, it's the prevalent IPencapsulation scheme for dedicated Internet access as well as dial-up access. One ofthe significant strengths of PPP is its ability to negotiate a number of things upon
initial connection, including passwords, IP addresses, compression schemes, &encryption schemes. In addition, PPP provides support for simulta neous multipleprotocols over a single connection, an important consideration in those environments
where dial-up users can employ either IP or another network Layer protocol. Finally,in environments such as ISDN, PPP supports inverse multiplexing & dynamic
bandwidth allocation via the Multilink-PPP .
The operation of PPP is basically as follows:
1) After the link is physically established, each host sends LCP (Link Control
Protocol) packets to configure & test the data link. It's here where the maximumframe length, authentication protocol PAP (Password Authentication Protocol), or
8/12/2019 CCNA in Short
45/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
CHAP (Challenge-Handshake Authentication Protocol), & other configurationparameters are negotiated. Authentication, if it used, will occur after the link has beenestablished.
2) After the link is established, one or more Network Layer Protocol connections areconfigured using the appropriate NCP . Once each of the Network Layer Protocols has
been configured, datagrams from those protocols can be sent over the link. Controlprotocols may be used for IP, IPX, DDP (AppleTalk), DECnet, & more.
3) The link will remain configured for communications until LCP &/or NCP packetsclose the link down.
5. Identif y ISDN pr otocol s, f unction gr oups, r ef er encepoints, & channel s?
(Point your browser at the following link :)http://www.cicprep.com/WebHelp/ccna/ccna_obj_ 14.htm
6. Descr ibe br ief l y some of wan technol ogies & theiruses?
Typical UsesWAN Technology
Analog modems are typically used fortemporary dial-up connections or forbackup of another type of link. The
bandwidth is typically 9.6bps - 56 Kbps
Analog modem
Leased lines have been the traditionaltechnology for implementing WANs.
These are links "leased" fromcommunications services companies forexclusive use by the corporation
Leased line
ISDN is a dial-up solution for temporaryaccess to the WAN but adds theadvantage of supporting voice/video/fax
on the same physical connection. As aWAN technology, ISDN is typically usedfor dial-backup support at 56, 64 or 128
Kbps bandwidth
Integrated Services Digital Network(ISDN)
X.25 can provide a reliable WAN circuithowever does not provide the high
bandwidth requirements as a backbonetechnology
X.25
WAN ATM (Asynchronous Transfer
Mode) is used as the high bandwidthbackbone for supporting multiservicerequirements. The ATM architecture
WAN ATM
8/12/2019 CCNA in Short
46/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
supports multiple QoS (Quality ofService) classes for differing applicationrequirements delay & loss
er InformationFurth
http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/isdn.htm
http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/introwan.htm#xtocid13
http://www.protocols.com/protoc.shtml#Protocols
http://www.rhyshaden.com/routing.htm
http://jhunix.hcf.jhu.edu/~tnaugler/770.512/Common_files/WANs/ScanTechnologies/scan04.html
http://www.microsoft.com/technet/treeview /default.asp?url=/TechNet/prodtechnol/winxppro/reskit/prcg_cnd_gvfb.asp
8/12/2019 CCNA in Short
47/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
CCiissccooRRoouutteerr&&sswwiittcchhccoonnffiigguurraattiioonnss
. Basic Cisco IOS CLI (Command Li ne I nterface):
(Point your browser at the following linkS :)
http://www.cisco.com/warp/cpropub/45/tutorial.htm
http://www.tele.sunyit.edu/DND/Cisco_Router_Basics/icnecontent/ioscmdrefindex.ht
m
.Configure IP addresses:
(Point your browser at the following link :)http://www.cicprep.com/WebHelp/ccna/ccna_obj_ 31.htm
.Verify IP addresses: (Point your browser at the following link :)
http://www.cicprep.com/WebHelp/ccna/ccna_obj_ 32.htm
.Monitor Novell IPX operation on the router:
(Point your browser at the following link :)
http://www.cicprep.com/WebHelp/ccna/ccna_obj_ 28.htm
.Enable the Novell IPX protocol & configure interfaces:
(Point your browser at the following link :)http://www.cicprep.com/WebHelp/ccna/ccna_obj_ 34.htm
8/12/2019 CCNA in Short
48/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
.Add the RIP routing protocol to your configuration:
(Point your browser at the following link :)http://www.cicprep.com/WebHelp/ccna/ccna_obj_ 39.htm
.Add the IGRP routing protocol to your configuration:
(Point your browser at the following link :)
http://www.cicprep.com/WebHelp/ccna/ccna_obj_ 40.htm
.List commands to configure Frame Relay LMIs, maps, & subinterfaces:
(Point your browser at the following link :)
http://www.cicprep.com/WebHelp/ccna/ccna_obj_ 10.htm
.List commands to monitor Frame Relay operation in the router:
(Point your browser at the following link :)http://www.cicprep.com/WebHelp/ccna/ccna_obj_ 11.htm
.Identify PPP operations to encapsulate WAN data on Cisco routers:
(Point your browser at the following link :)http://www.cicprep.com/WebHelp/ccna/ccna_obj_ 12.htm
.Configure standard & extended access lists to filter IP traffic :
(Point your browser at the following link :)http://www.cicprep.com/WebHelp/ccna/ccna_obj_ 44.htm
.Configure IPX access lists & SAP filters to control basic Novell traffic: (Point your browser at the following link :)
http://www.cicprep.com/WebHelp/ccna/ccna_obj_ 38.htm
.Monitor & verify selected access list operations on the router:
8/12/2019 CCNA in Short
49/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
(Point your browser at the following link :)http://www.cicprep.com/WebHelp/ccna/ccna_obj_ 45.htm
.Copy & manipulate configuration files:
(Point your browser at the following link :)
http://www.cicprep.com/WebHelp/ccna/ccna_obj_ 24.htm
.List the commands to load Cisco IOS software from: flash memory, a TFTPserver, or ROM:
(Point your browser at the following link :)
http://www.cicprep.com/WebHelp/ccna/ccna_obj_ 25.htm
.Prepare to backup, upgrade, & load a backup Cisco IOS software image:
(Point your browser at the following link :)http://www.cicprep.com/WebHelp/ccna/ccna_obj_26.htm
.Manage configuration files from the Privileged exec mode :
(Point your browser at the following link :)http://www.cicprep.com/WebHelp/ccna/ccna_obj_ 20.htm
. Configuring VLAN & VTP on Cisco Catalyst switch:
(Point your browser at the following linkS :)
http://netcert.tripod.com/ccna /switches/confvlan.html
http://www.mislab.com/lab_sample_vlan.htm
http://www.cs.rpi.edu/~kotfid/compnet1/labs/lab3-switch-vlan-rip-lab-2-even.html
Note: If purchasing a Cisco equipment (at least a router) is not an option, try topurchase (or arrange) Router Simulator(such as, Sybex, Boson etc) for CCNA
8/12/2019 CCNA in Short
50/51
CCNA(640-607)
2003 Certificationsuccess.com
Your Free Certification Portal
exam. Otherwise, make sure that you "understand & memorize" the Cisco CLIfundamentals from the provided links above precisely.
UUsseeffuullLLiinnkkss
(Comprehensive VLAN configurations details)
http://www.cisco.com/univercd/cc/td/doc/product/lan/28201900/1928v8x/eecli8x/clip
art2.htm#25568-----------------------------------------------------
http://www.cisco.com/univercd/cc/td/doc/cisintwk/ita/index.htm
http://www.firewall.cx
http://www.geocities.com/ciscosite /ccna
http://www.cicprep.com/WebHelp/toclist.htm
http://www.delmar.edu/Courses/ITSC1391
http://www.celticrover.com/tig/ccna/ccnareviews.asp
http://www.aiinet.com/documents/aiscout2/m/111/sc2111bk.htm
http://www.ethermanage.com/ethernet/ethernet.html
http://searchnetworking.techtarget.com
Best of Luck.
8/12/2019 CCNA in Short
51/51