Cisco Certified Network Aanalyses Index

bonkburpsNetworking and Communications

Oct 23, 2013 (4 years and 17 days ago)

74 views

Cisco Certified Network Aanalyses Index





Data Networks






Networking Devices

Network Interface Card




Networking Device Icons

Repeater







Hub

Bridge







Workgroup Switch



Router







Router

Network Topologies





Physical Topologies

Bus Topolo
gy






Ring Topology

Star Topology






Extended Star Topology

Hierarchical Topology





Mesh Topology

LANs, MANs, & WANs





Examples of Data Networks

LANs







Wireless LAN Organizations and Standards

Cellular Topology for Wireless



WANs

SANs








WHAT IS VPN

Virtual Private Network




Bandwidth

Measuring Bandwidth





OSI Model

Why do we need the OSI Model?



Diffrence between ISO, OSI, IOS .

The OSI Reference Model




The Application Layer

The Presentation Layer





The Session Layer

The Transport

Layer





The Network Layer

The Data Link Layer





The Physical Layer

OSI Model Analogy





Host Layers

Media Layers






The OSI Layers Communications

Encapsulation Process





Data Flow through a Network

LAN Physical Layer





Unshielded Twisted Pair
(UTP) Cable

UTP Implementation Connection Media

Ethernet Standards Straight
-
Thru or Crossover Cable

Sources of Noise on Copper Media Shield
ed Twisted Pair (STP) Cable

Coaxial Cable Fiber Optic Cable

Fiber Optic Connectors Fiber Optic Patch Panels

Cable Specifications



Ethernet Media Connector Requirements

LAN Physical Layer Implementation


Ethernet in the Campus

WAN Physical Layer





WAN Serial Connection Options

Serial Implementation of DTE & DCE



Back
-
to
-
Back Serial Connection

Repeater







The 4 Repeat
er Rule

Hub








Network Interface Card

MAC Address






Bridge

Bridging Graphic






Switch

Switching Modes






Full Duplex

Switches


MAC Tables





Switches


Parallel Communication

Microsegmentation






Peer
-
to
-
Peer Network

Client/Server Network





The TCP/IP Model

The Application Layer





The Transport Layer

The Internet Layer






The Network Access Layer

Comparing TCP/IP & OSI Models




Introduction to the Transport Layer

More on The Transport Layer




Flow Control

3
-
Way Handshake






Basic Wi
ndowing

Sliding Window


Sliding Window with Different Window Sizes

TCP Sequence & Acknowledgement



TCP Segment Format

UDP








UDP Segment Format

Well Known Port Numbers





URL

SNMP


Managed Ne
twork





TCP/IP Math

Converting Decimal to Binary




IP Addressing

Network and Host Addressing




Network Layer Communication Path

Internet Addresses






IP Address Classes

Identifying Address Classes




Address Class Prefixes

Network and Host Division





Class A to E Addresses

IP Address Ranges






IPv4

Finding the Network Address with ANDing


Network Address

Broadcast Address






Network/Broadcast Addresses at the Binary Level

Public IP Addresses






Private IP Addresses

Mixing Public and Private
IP Addresses



Introduction to Subnetting

The 32
-
Bit Binary IP Address




RARP, BOOTP, DHCP

Routers and Cisco IOS





Introduction to routers

RAM, NVRAM, FLASH, ROM, INTERAFACES


Internal Components of a 2600 Router

External Components of a 2600 Router



E
xternal Connections

Fixed Interfaces






Modular Serial Port Interfaces

Routers & DSL Connections





Computer/Terminal Console Connection

Modem Connection to Console/Aux Port



HyperTerminal Session Properties

Establishing a HyperTerminal Session



Cisco

IOS, Purpose of Cisco IOS

Router Command Line Interface




Setup Mode

Operation of Cisco IOS Software




IOS File System Overview

Initial Startup of Cisco Routers




After the Post…

Step in Router Initialization





Router LED Indicators

Enhanced Cisco IO
S Commands




The show version Command

Checking File System Info with show version cmd


Router Configuration

Router User Interface Modes





Overview of Router Modes

Router Modes







User Mode Commands

Privileged Mode Commands





Specific Configuration
Modes

CLI Command Modes





Configuring a Router’s Name

Setting the Clock with Help





Message Of The Day (MOTD)

Configuring a Console Password




Configuring a Modem Password

Configuring Interfaces





Configuring a Telnet Password

Examining the show C
ommands




The copy run tftp Command

Ethernet Fundamentals





Ethernet Overview

Ethernet and the OSI Model





Ethernet Technologies Mapped to the OSI Model

Layer 2 Framing








Ethernet and IEEE Frame Formats are Very Similar

3 Common Layer 2 Te
chnologies




Collision Domains

CSMA/CD Graphic






Backoff

Advanced IP Addressing







Hierarchical Addressing Using Variable
-
Length
Subnet Masks

Prefix Length and Network Mask




Implementing VLSM


Range Of Addresses for VLSM





Breakdown Address
Space for Largest Subnet

Breakdown Address Space for Ethernets at Remote Sites


Break Down Remaining Address Space for Serial Subnets

Calculating VLSM: Binary

Route Summarization and Classless Interdomain Routing

What Is Route Summarization?

Summarizing W
ithin an Octet




Summarizing Addresses in a VLSM
-
Designed Network

Classless Interdomain Routing





What Is CIDR?

CIDR Example







Routing

Anatomy of an IP Packet





Introducing Routing

Configuring Static Routes by Specifying Outgoing Interfaces


Conf
iguring Static Routes by Specifying Next
-
Hop Addresses

Administrative Distance

Configuring Default Routes





Verifying Static Route Configuration

Trouble Shooting Static Route Configuration



Path Determination Graphic

Routing Protocol






Routed Protoc
ols

IGP and EGP







Categories of Routing Protocols

Distance Vector Routing Concepts




Distance Vector Routing (DVR)

Routing Tables Graphic





Distance Vector Topology Changes

Router Metric Components





RIP Characteristics

RIP
-
1 permits only a Single

Subnet Mask



Router Configuration

Configuring RIP Example





Verifying RIP Configuration

The debug ip rip Command





Problem: Routing Loops

Problem: Counting to Infinity





Solution: Define a Maximum

Solution: Define a Maximum





Solution: Split Hori
zon

Route Poisoning






Triggered Updates

Triggered Updates Graphic





Solution: Holddown Timers

IGRP, IGRP Stability Features




Configuring IGRP





Routing Metrics Graphics





Link State Concepts

Link State Topology Changes






Link State Routing (L
SR)

Comparing Routing Methods





OSPF (Open Shortest Path First) Protocol

OSPF is a Link
-
S
tate Routing Protocols



Link
-
S
tate Data Structures

OSPF vs. RIP







OSPF Terminology

OSPF Term: Link






OSPF Term: Link State

OSPF Term: Area






Link Stat
e Routing Graphic

OSPF Packet Types






OSPF Packet Header Format

Neighborship







Establishing Bidirectional Communication

Establishing Bidirectional Communication



Discovering the Network Routes

Adding the Link
-
State Entries




Maintaining Routing

Information

Configuring Basic OSPF: Single Area




Configuring OSPF on Internal Routers of a Single
Area

Verifying OSPF Operation





Verifying OSPF Operation (Cont.)

The show ip route ospf Command




The show ip ospf interface Command

The show ip ospf
neighbor Command




OSPF Network Types

Point
-
to
-
Point Links






Multi
-
access Broadcast Network

Electing the DR and BDR





Setting Priority for DR Election

Creation of Adjacencies





EIGRP, Comparing EIGRP with IGRP

EIGRP & IGRP Metric Calculation




Com
paring EIGRP with IGRP

Topology Table






EIGRP Data Structure

Default Hello Intervals and Hold Times for EIGRP


EIGRP Algorithm

FS Route Selection Rules





Configuring EIGRP

Configuring EIGRP Summarization




Configuring EIGRP no
-
summary

Configuring EIG
RP Summary Addersses Manually


Verifying the EIGRP Configuration

Administrative Distances





Classful and Classless Routing Protocols

Access Control Lists






What are ACLs?

Reasons to Create ACLs





ACLs Filter Traffic Graphic

How ACLs Filter Traffic






One List per Port, per Destination, per Protocol...

How ACLs work






Creating ACLs

The access
-
list command





The ip access
-
group command

Wildcard Mask Example





The any and host Keywords

Verifying ACLs






Standard ACLs

Extended ACLs






Extend
ed ACL Example

ip access
-
group






Named ACLs

Placing ACLs









Standard ACLs:Permitting/Denying Hosts,
Networks and Subnets

Permitting a Single Host





Denying a Single Host

Permitting a Single Network





Denying a Single Network

Permitting a Cl
ass C Subnet





Denying a Class C Subnet

Permitting a Class B Subnetb





Denying a Class B Subnet

Permitting a Class A Subnet





Denying a Class A Subnet

Standard ACLs:Permitting/Denying Ranges of Addresses that cross subnets

Permit 200.100.50.24
-
100

Plan




Permit 200.100.50.16
-
127 Plan A

Permit 200.100.50.16
-
127 Plan B




Permit 200.100.50.1,5,13,29,42,77

Extended ACLs: Permitting/Denying Source Addresses, Destination Addresses, and Protocols

Permit Source Network





Deny Source Network

Deny one
Source Network to another Destination Network


Deny FTP, Deny Telnet

NAT Addressing Terms





Types Of NAT, Static NAT, Dynamic NAT

NAT&PAT Network Address Translation & Port Address Transation

NAT Addressing Terms





Types Of NAT, Static NAT,andConfigura
tion

Dynamic NAT, and Configuration




Switching, Ethernet Access with Hubs

Ethernet Access with Bridges





Today's LAN,

Full Duplex Transmitting





Why Segment LANs?

Collision Domains






Segmentation with Bridges

Segmentation with Routers





Segment
ation with Switches

Basic Operations of a Switch





Switching Methods

Frame Transmission Modes





Benefits of Switching

How Switches and Bridges Learn Addresses



CAM Content Addressable Memory

Shared vs. Dedicates Bandwidth




Microsegmentation of a Net
work

Microsegmentation






3 Methods of Communication

Switches & Broadcast Domains




Broadcast Domain

Switches







Access Layer Switches

Distribution Layer Switches





The Core Layer Switches




Switch Configuration






Switch LED Indicators

Connecti
ng a Switch to a Computer




Examining Help in the Switch CLI

Spanning Tree Protocol





Redundant Switched Topologies

Broadcast Storms






Multiple Frame Transmissions

MAC Database Instability





Using Bridging Loops for Redundancy

Logical Loop Free Top
ology Created with STP


Spanning Tree Protocol

Selecting the Root Bridge





BDPUs, Spanning Tree Operation

Rapid STP Designations





VLANs

Setting up VLAN Implementation




VLAN Communication

VLAN Membership Modes





Static VLANs

Configuring VLANs in Gl
obal Mode




Configuring VLANs in VLAN Database Mode

Deleting VLANs in Global Mode




Assigning Access Ports to a VLAN

Verifying the VLAN Configuration




Verifying the VLAN Port Configuration

Implementing VLAN Trunks





VLAN Trunking, Importance of Nativ
e VLANs

ISL Encapsulation






ISL and Layers, Configuring ISL Trunking

Verifying ISL Trunking





Configuring 802.1Q Trunking

Verifying 802.1Q Trunking





Implementing VLAN Trunk Protocol

VTP Protocol Features





VTP Modes, Operation, Pruning, Configura
tion

WANs and its Connection Types




WAN Encapsulation

OSI Layer
-
2 Point
-
to
-
Point WANs




HDLC, Point
-
to
-
Point Protocol (PPP)

PPP LCP Features






PAP Authentication

CHAP Authentication






PPP Multilink, Error Detection, Looped Link
Detection

Frame Rel
ay and its Components




LMI and Encapsulation Types

LAPF








DLCI Addressing Details

Global DLCI Addressing





Layer 3 Addressing

One Subnet Containing All Frame Relay DTEs


One Subnet Per VC

Hybrid Terminology






Mapping Methods

Inverse ARP Process






Frame Relay Configuration

Integrated Services Digital Network (ISDN)



ISDN Protocols

BRI & PRI B and D Channels





LAPD & PPP on D and B Channels

PRI Encoding and Framing





DDR (Dial On Demand Routing)

Legacy DDR Operation






Configuring SPIDs

ISDN PRI Configuration





PRI Configuration Commands

ISDN Switch Types






Configuring a T1 or E1 Controller

DDR With Dialer Profiles





Dialer Profiles Configuration