Sunteți pe pagina 1din 59

Cisco Networking Academy Program

CCNA1 Exploration

Study Guides
SEMESTER 1 CHAPTER 2
Communicating over the Network
V 4.0

2.0.1 What are the five aspects of Devices that make up the network
the information network we Media that connect the devices
will focus on in this course? Messages that are carried across the network
Rules and processes that govern network
communications
Tools and commands for constructing and
maintaining networks
2.1.1 What are the three Sender, Receiver, Chanell
elements of
communication?
What is the definition of the data or information networks capable of
term network for this carrying many different types of
course? communications, including traditional computer
data, interactive voice, video, and
entertainment products.
2.1.2 What would happen to the no other device would be able to send or
network if a message was receive messages on the same network while
sent as one massive this data transfer was in progress
continuous stream of bits?
Define segmentation of division of the data stream into smaller pieces
messages
What are the 2 advantages many different conversations can be
of segmentation? interleaved on the network
segmentation can increase the reliability of
network communications
What is multiplexing? process used to interleave the pieces of
separate conversations together on the
network
2.1.3 What is hardware on a the visible components of the network platform
network?
2.1.4 What are end devices on a Computers (work stations, laptops, file servers,
network? web servers)
Network printers
VoIP phones
Security cameras
Mobile handheld devices (such as wireless
barcode scanners, PDAs)
What is the definition of a either the source or destination of a message
host? transmitted over the network
What is the definition of a hosts that have software installed that enables
server? them to provide information and services
What is the definition of a hosts that have software installed that enables
client? them to request and display the information
obtained from the server
2.1.5 List examples of Network Access Devices (Hubs, switches, and
intermediary devices. wireless access points)
Internetworking Devices (routers)
Communication Servers and Modems
Security Devices (firewalls)
List examples of process Regenerate and retransmit data signals
that intermediary devices Maintain information about what pathways
perform. exist through the network and internetwork
Notify other devices of errors and
communication failures
Direct data along alternate pathways when
there is a link failure
Classify and direct messages according to
QoS priorities
Permit or deny the flow of data, based on
security settings
2.1.6 What are the 3 primary Metallic wires within cables
types of media used in Glass or plastic fibers (fiber optic cable)
modern networks? Wireless transmission
What criteria should be The distance the media can successfully carry
used to select network a signal.
media? The environment in which the media is to be
installed.
The amount of data and the speed at which it
must be transmitted.
The cost of the media and installation
2.2.1 What are the ways in which The size of the area covered
network infrastructure can The number of users connected
vary? The number and types of services available
What is the definition of a individual network usually spans a single
LAN? geographical area, providing services and
applications to people within a common
organizational structure
2.2.2 What is the definition of a networks that connect LANs in geographically
WAN? separated locations
2.2.3 What is an internetwork? A global mesh of interconnected networks
(internetworks) meets these human
communication needs.
What is an intranetwork? a private connection of LANs and WANs that
belongs to an organization, and is designed to
be accessible only by the organization's
members, employees, or others with
authorization
2.2.4.1 Define a NIC provides the physical connection to the
network at the PC or other host device.
Define a physical port A connector or outlet on a networking device
where the media is connected to a host or
other networking device.
Define an interface Specialized ports on an internetworking device
that connect to individual networks.
2.3.1 What are the 3 layers of Content Layer, Rules Layer, Physical Layer
protocols described?
2.3.2 What process do The format or structure of the message
networking layer protocol The process by which networking devices
suites describe? share information about pathways with other
networks
How and when error and system messages
are passed between devices
The setup and termination of data transfer
sessions
What is proprietary? one company or vendor controls the definition
of the protocol and how it functions
2.3.3 What does the use of products from different manufacturers can
standards and protocols work together for efficient communications
provide?
2.3.4 What is an application defines the content and formatting of the
protocol? requests and responses exchanged between
the client and server
What is a Transport manages the individual conversations between
Protocol? web servers and web clients
What is the Internetwork responsible for taking the formatted segments
Protocol from TCP, encapsulating them into packets,
assigning the appropriate addresses, and
selecting the best path to the destination host.
What is the Network Access Network access protocols describe two
Protocol? primary functions, data link management and
the physical transmission of data on the media.
2.3.5 What do networking the functions that occur during network
protocols describe? communications
2.4.1 What are the benefits of Assists in protocol design, because protocols
using a layered model to that operate at a specific layer have defined
describe networking? information that they act upon and a defined
interface to the layers above and below.
Fosters competition because products from
different vendors can work together.
Prevents technology or capability changes in
one layer from affecting other layers above
and below.
Provides a common language to describe
networking functions and capabilities.
2.4.2 What are the two basic protocol models and reference models
types of networking
models?
What are the two primary TCP/IP and OSI
models used when
describing networking?
2.4.3 What is done at the Represents the data to the user plus encoding
Application Layer? and dialog control
What is done at the Supports communication between diverse
Transport Layer? devices across diverse neworks
What is done at the Internet Determines the best path through the network
Layer?
What is done at the Network Controls the hardware devices and media that
Access Layer? make up the network
2.4.4 What are the seven steps in 1. Creation of data at the application layer of
a complete communication the originating source end device
process?
2. Segmentation and encapsulation of data as
it passes down the protocol stack in the source
end device

3. Generation of the data onto the media at the


network access layer of the stack

4. Transportation of the data through the


internetwork, which consists of media and any
intermediary devices

5. Reception of the data at the network access


layer of the destination end device

6. Decapsulation and reassembly of the data


as it passes up the stack in the destination
device

7. Passing this data to the destination


application at the Application layer of the
destination end device
2.4.5 What is the PDU for the Data
application layer?
What is the Transport Layer Segment
PDU?
What is the PDU for the Packet
Internet Layer?
What is the PDU for the Frame
Network Access Layer?
What PDU is used when Bits
physically transporting the
information over the
medium?
2.4.6.1 How is the protocol stack Top to bottom
processed when sending
information?
2.4.6.2 What is the process use at Decapsulation
the receiving end called?
2.4.7 What are the seven layers Application, Presentation, Session, Transport,
of the OSI Model? Network, Data Link, Physical
2.4.8 Which Layers of the OSI Application, Presentation, Session-Application
Model parallel with the Transport-Transport
TCP/IP Model? Internet-Network
Data Link, Physical-Network Access
2.5.1 What does the physical Timing and synchronization of bits
layer do?
What addresses does the Destination and source physical address
data link layer use?
What address does the Destination and source logical address
network layer use?
What does the transport Destination and source process number (ports)
layer use?
What do the upper layers Encoded application data
use?
2.5.2 What is the PDU for Layer 2 Frame
called
What is the layer 2 address MAC address
called?
What happens after the the Layer 2 address information is removed as
frame has reached its’ the data is decapsulated and moved up the
destination? protocol stack to Layer 3
2.5.3 What are layer 3 devices to move data from one local network to
primarily designed for? another local network within an internetwork
What address is used at IP address
Layer 3?
What is the PDU of the Packet
Layer 3 information?
Which device decapsulates Router
the frame at the edge of a
network?
What does a router do? use the network identifier portion of this
address to determine which path to use to
reach the destination host
What happens when the the frame and packet headers are removed
frame reaches the end and the data moved up to Layer 4
device?
2.5.4 What does the information identifies the specific process or service
in the frame provide at running on the destination host device that will
Layer 4? act on the data being delivered
How is each application or Port number
service represented at
Layer 4?
SEMESTER 1 Chapter 3
Application Layer Functionality and Protocols
V 4.0

3.1.1.1 What does the application the interface between the applications we use
layer provide? to communicate and the underlying network
over which our messages are transmitted
What are application layer to exchange data between programs running
protocols used for? on the source and destination hosts
3.1.1.2 What are the three primary Coding and conversion of Application layer
functions of the data to ensure that data from the source
Presentation Layer? device can be interpreted by the appropriate
application on the destination device.
Compression of the data in a manner that can
be decompressed by the destination device.
Encryption of the data for transmission and the
decryption of data upon receipt by the
destination.
What is the main function of create and maintain dialogs between source
the session layer? and destination applications
3.1.1.3 What do the Application the format and control information necessary
Layer protocols of the for many of the common Internet
TCP/IP protocol specify? communication functions
3.1.2 What are the two forms of applications and services
software programs or
process that provide
network access in the
Application Layer
3.1.3 What do protocols provide? the rules and formats that govern how data is
treated
What is the difference Applications interact with the user and services
between an application and prepare data for the network
a service?
What do application layer Protocols provide the rules and formats that
protocols do? govern how data is treated.
3.1.4 What 6 things do protocols 1. processes on either end of the
define? communication
2. types of messages
3. syntax of messages
4. meaning of any informational fields
5. how messages are sent and the
expected response
6. interaction with the nextlower layer
3.2.1 What is the difference the device requesting the information is called
between a client and a a client and the device responding to the
server? request is called a server
3.2.2 In general networking sense any device that responds to requests from
what is a server? client applications is functioning as a server
Describe the 2 processes a "listening" for a request from a client, because
daemon uses (listening and they are programmed to respond whenever the
hears)? server receives a request for the service
provided by the daemon
"hears" a request from a client, it exchanges
appropriate messages with the client, as
required by its protocol, and proceeds to send
the requested data to the client in the proper
format
3.2.3.2 Complete the packet tracer
lab examine a number of
packets to see what each
packet contains.
3.2.4 What is a peer-to-peer two or more computers are connected via a
network? network and can share resources (such as
printers and files) without having a dedicated
server
Are peer-to-peer networks No
easy to secure?
3.2.4.2 What are peer-to-peer allows a device to act as both a client and a
applications? server within the same communication
3.3.1 What do port numbers applications and Application layer services that
identify? are the source and destination of data
What does the DNS defines an automated service that matches
protocol do? resource names with the required numeric
network address.
3.3.1.2 What does the nslookup allows the user to manually query the name
utility allow you to do? servers to resolve a given host name
What does the command Displays all of the cached DNS entries on a
ipconfig /displaydns show? Windows XP or 2000 computer system
3.3.1.3 What happens if a DNS It passes the request on to another DNS
server does not have a server
name in its stored records?
If the same request is made In its cache
again where does the DNS
server look?
3.3.1.4 When is a server declared When the resource is directly held on that
to be an authoritative server
server?
3.3.2.1 Define the three parts of a http:- protocol
url as listed on the page? www.cisco.com- name of server
web-server.htm- name of file or page
What type of request is sent GET
to the server when
retrieving a web page?
3.3.2.2 What does the POST Sends information to the web server
command do?
What does the PUT Sends resources or content to the web server
command do?
What protocol is used for HTTPS:
secure transmission across
the web?
3.3.3 What 2 Application Layer POP (Post Office Protocol) and SMTP (Simple
protocols are used in Mail Transfer Protocol)
sending and receiving
email?
What is another name for MUA Mail User Agent
an email application?
3.3.3.2 What are the two processes MTA Mail Transfer Agent
that email servers perform? MDA Mail Delivery Agent
3.3.3.3 What happens to emails in Converted to a proprietary protocol for mail
many companies once the delivery
email reaches the internal
server?
3.3.3.4 List and describe some of HELO - identifies the SMTP client process to
the commands used by the the SMTP server process
SMTP protocol. EHLO - Is a newer version of HELO, which
includes services extensions
MAIL FROM - Identifies the sender
RCPT TO - Identifies the recipient
DATA - Identifies the body of the message
3.3.4 What is File Transfer developed to allow for file transfers between a
Protocol (FTP)? client and a server
What are the 2 ports used 21- Used for control
and their purpose in FTP? 20- Used for actual file transfer
3.3.5 What does Dynamic Host allows a host to obtain an IP address
Confirmation Protocol dynamically when it connects to the network
(DHCP) do for a network?
3.3.5.2 What are the 4 types of DHCP Discover
messages sent and DHCP Offer
received in DHCP? DHCP Request
DHCP Acknowledge
3.3.6 What is SMB (Server the structure of shared network resources,
Message Block)? such as directories, files, printers, and serial
ports
3.3.6.2 What are the 3 message Start, authenticate, and terminate sessions
types of SMB messages? Control file and printer access
Allow an application to send or receive
messages to or from another device
3.3.8 What does the Telenet provides a standard method of emulating text-
application provide? based terminal devices over the data network.
3.3.8.2 What protocol is SSH Secure Shell protocol
recommended alternative to
Telnet when security is a
concern?
3.5.1.2 This is a self scored quiz
that will help prepare for the
test
3.6.1 Quiz that also prepares you
for the test.
SEMESTER 1 Chapter 4
OSI Transport Layer
V 4.0

4.1.1 What are the 4 primary Tracking the individual communication


responsibilities of the between applications on the source and
Transport Layer? destination hosts
Segmenting data and managing each piece
Reassembling the segments into streams of
application data
Identifying the different applications
4.1.1.3 What does the Transport Identifies the segment of data and provides for
Layer header provide? identification of the Transport Layer Protocol to
use
4.1.2 Describe the process of divides application data into blocks of data that
segmentation and are an appropriate size
reassembly? reassembles the data before sending it to the
destination application or service
How does the Transport Each of these applications or services is
Layer accomplish assigned an address known as a port so that
conversation multiplexing? the Transport layer can determine with which
application or service the data is identified.
What are the four additional Connection-oriented conversations
duties the Transport Layer Reliable delivery
can provide? Ordered data reconstruction
Flow control
4.1.2.2 What are the four processes Establishing a Session
that the Transport Layer Reliable Delivery
uses to control Same Order Delivery
conversations? Flow Control
4.1.3 What does reliability mean ensuring that each piece of data that the
to a network? source sends arrives at the destination.
What are the three basic tracking transmitted data
operations of reliability at acknowledging received data
the transport layer? retransmitting any unacknowledged data
What trade-off is necessary value of reliability and the burden it places on
to ensure reliability? the network
How is a best-effort protocol there is no acknowledgement that the data is
different than a reliable received at the destination.
protocol?
What is another term used unreliable
to describe a best-effort
protocol?
List some examples of databases, web pages, and e-mail
applications that require
reliable transmission.
Give an example of an Streaming video
application that can use
unreliable transmission.
Know the information in the
diagram that lists the
differences between
unreliable and reliable
transmissions.
4.1.4 What are the two most Transmission Control Protocol (TCP) and
common protocols at the User Datagram Protocol (UDP)
Transport Layer?
What is the advantage of Speed
using UDP?
What are the pieces of UDP Datagram
information called?
What are some applications Applications that use UDP include:
that use UDP? Domain Name System (DNS)
Video Streaming
Voice over IP (VoIP)
What are the 3 additional same order delivery, reliable delivery, and flow
functions that TCP offers? control.
How much overhead is 20 bytes
required to offer the 3
functions of TCP?
What are the pieces of TCP segments
information called?
What are some applications Applications that use TCP are:
that use TCP? Web Browsers
E-mail
File Transfers
4.1.5.1 What are the unique Port numbers
identifiers that define the
conversations called?
In the originating message number for this communication associated with
what is the source port? the originating application on the local host
In the originating message the number for this communication associated
what is the destination port? with the destination application on the remote
host
How do server processes Statically
have port numbers
assigned?
How do clients have port dynamically
numbers assigned?
What is another term Socket number
sometimes used instead of
port number?
For this course, what does a the source and destination IP addresses and
socket pair describe? port numbers, is also unique and identifies the
conversation between the two hosts
4.1.5.2 What organization is IANA Internet Assigned Numbers Authority
responsible for assigning
port numbers?
What is the range of Well 0 to 1023
Known Ports?
What are well known ports? reserved for services and applications.
What is the range of 1024 to 49151
Registered Ports?
What are registered ports? These port numbers are assigned to user
processes or applications. These processes
are primarily individual applications that a user
has chosen to install rather than common
applications that would receive a Well Known
Port. When not used for a server resource,
these ports may also be used dynamically
selected by a client as its source port.
What is the range for 49152 to 65535
Dynamic or Private Ports?
What are dynamic or private Also known as Ephemeral Ports, these are
ports? usually assigned dynamically to client
applications when initiating a connection. It is
not very common for a client to connect to a
service using a Dynamic or Private Port
(although some peer-to-peer file sharing
programs do).
Is it possible for a port yes
number to be used by both
TCP and UDP?
4.1.5.3 What is the utility that can Netstat
be used to view open
connections?
4.1.6.1 What are the two reasons ensures that data is transmitted within the
data is divided into pieces limits of the media and that data from different
before it is sent? applications can be multiplexed on to the
media.
What is provided in a UDP Port Numbers
header?
What is provided in a TCP Port, sequence, acknowledgement, and flow
header? control numbers
In which protocol do UDP
segments arrive in an
unspecified order?
4.1.6.2 Packet Tracer Activity.
Please pay close attention
to Task 2 and examine the
information about the
packets- it will help on the
test
4.2.1 What makes TCP a reliable connection-oriented sessions
protocol?
What do acknowledgements Let the sender know you received the data
do?
What happens if the it retransmits that data to the destination
acknowledgment does not
arrive in the predetermined
time?
What is the additional the necessity to keep track of which segments
overhead created in the are awaiting acknowledgement and by the
hosts by using TCP? retransmission process.
Make certain you roll over
each piece of the diagram.
4.2.2 Which device initiates the Client
communication process?
What can never happen in two services assigned to the same port
two server conversations? number within the same Transport layer
services.
The diagram does a very
good job at showing the
process of port assignment
4.2.3 Describe the steps in Establishes that the destination device is
establishing a three way present on the network
handshake. Verifies that the destination device has an
active service and is accepting requests on the
destination port number that the initiating client
intends to use for the session
Informs the destination device that the source
client intends to establish a communication
session on that port number
What are the three steps in 1. The initiating client sends a segment
TCP connection containing an initial sequence value, which
establishment? serves as a request to the server to begin a
communications session.

2. The server responds with a segment


containing an acknowledgement value equal to
the received sequence value plus 1, plus its
own synchronizing sequence value. The value
is one greater than the sequence number
because there is no data contained to be
acknowledged. This acknowledgement value
enables the client to tie the response back to
the original segment that it sent to the server.

3. Initiating client responds with an


acknowledgement value equal to the sequence
value it received plus one. This completes the
process of establishing the connection.
What are the six control bit URG - Urgent pointer field significant
fields possible and what do ACK - Acknowledgement field significant
they mean? PSH - Push function
RST - Reset the connection
SYN - Synchronize sequence numbers
FIN- No more data from sender
4.2.4 What is the Initial Sequence The initial value for the sequence number is
Number (ISN)? randomly chosen and is used to begin tracking
the flow of data from the client to the server for
this session
What happens to the ISN as The ISN in the header of each segment is
packets are sent? increased by one for each byte of data sent
from the client to the server as the data
conversation continues.
4.2.4.2 What is sent back to the the server sends a segment back to the client
client in step 2? with the ACK flag set indicating that the
Acknowledgment number is significant
What is the value of the equal to the client initial sequence number plus
acknowledgement number 1
field?
Explain what is meant by 2 one from the client to the server, and the other
one-way sessions exist in from the server to the client
TCP?
4.2.4.3 What is the final step in the The client responds with both the sequence
three-way hand shake? and acknowledgement bit set and no data
What are 3 ways in which Denying the establishment of TCP sessions
security can be added? Only allowing sessions to be established for
specific services
Only allowing traffic as a part of already
established sessions.
4.2.5 What must be sent to close FIN finish control flag
a TCP session?
What are the 4 exchanges 1. When the client has no more data to send in
needed to close a TCP the stream, it sends a segment with the FIN
conversation? flag set.
2. The server sends an ACK to acknowledge
the receipt of the FIN to terminate the session
from client to server.
3. The server sends a FIN to the client, to
terminate the server to client session.
4. The client responds with an ACK to
acknowledge the FIN from the server.
4.2.5.2 Packet Tracer Lab to better
understand the process of
TCP
4.3.1 How does TCP reassemble Sequence numbers are assigned in the header
packets into the original of each packet to achieve this goal
data file?
How are sequence numbers the sequence number is incremented by the
incremented? number of bytes that have been transmitted
What does the receiving The receiving TCP process places the data
process do with the TCP from a segment into a receiving buffer.
segment?
Where do the reassemble To the Application Layer
segments go?
What happens when all the Any segments that arrive with noncontiguous
segments do not arrive? sequence numbers are held for later
processing.
4.3.2 What is the relationship The sequence number indicates the relative
between sequence and number of bytes that have been transmitted in
acknowledgement numbers this session including the bytes in the current
work? segment. TCP uses the acknowledgement
number in segments sent back to the source to
indicate the next byte in this session that the
receiver expects to receive
What is the process TCP Expectational acknowledgement
uses with sequence and
acknowledgement numbers
called?
What does TCP do to multiple segments of data can be sent before
overcome the overhead of and acknowledged with a single TCP message
waiting for in the opposite direction
acknowledgements?
What is the name for the Window size
amount of data that can be
sent before an
acknowledgement is
received called?
4.3.3 How does TCP handle When TCP at the source host has not received
missing segments? an acknowledgement after a predetermined
amount of time, it will go back to the last
acknowledgement number that it received and
retransmit data from that point forward.
What do hosts implement If both hosts support Selective
today to improve the TCP Acknowledgements, it is possible for the
process? destination to acknowledge bytes in
discontinuous segments and the host would
only need to retransmit the missing data.
4.3.4.1 How does flow control by adjusting the effective rate of data flow
assist the reliability of TCP between the two services in the session. When
transmissions? the source is informed that the specified
amount of data in the segments is received, it
can continue sending more data for this
session.
What does window size the amount of data that can be transmitted
specify? before an acknowledgement must be received
How does TCP use window TCP feedback mechanism adjusts the effective
size to improve rate of data transmission to the maximum flow
communication? that the network and destination device can
support without loss. TCP attempts to manage
the rate of transmission so that all data will be
received and retransmissions will be
minimized.
4.3.4.2 What happens to window TCP can reduce the window size to require
size when network that received segments be acknowledged
resources are constrained? more frequently
What happens after periods the receiver will begin to increase the window
of transmission with no data field
losses or constrained
resources?
What do you think occurs The window size would get smaller
with window size on the
school network when a
major update occurs district
wide? (smaller, larger)
4.4.1 According to the first 2 Lower overhead
paragraphs, what is the
major advantage of using
UDP?
What are the key Domain Name System (DNS)
Application layer protocols Simple Network Management Protocol
that use UDP includes? (SNMP)
Dynamic Host Configuration Protocol (DHCP)
Routing Information Protocol (RIP)
Trivial File Transfer Protocol (TFTP)
Online games
Why do the processes The low overhead of UDP makes it very
above use UDP? desirable for such applications
4.4.2 What is UDP also referred Transaction based
to as?
How are segments put back the application will have to identify the proper
in order if the application sequence of the data and determine how the
requires a specific order? data should be processed
4.4.3 How are TCP and UDP They both use port numbers
similar?
4.4.4 Note: This is essentially the
same as TCP so it is very
testable. Understand how
port numbers are assigned.
What happens to port the source and destination port numbers in the
numbers in a response from datagram header are reversed
the server?
4.4.2 Packet Tracer Activity- look
at each packet and gain an
understanding of what UDP
is sending and receiving.
SEMESTER 1 Chapter 5
OSI Network Layer
V 4.0

5.1.1.1 What services does the services to exchange the individual pieces of
network layer provide? data over the network between identified end
devices.
What are the 4 basic Addressing
processes used at the Encapsulation
network layer? Routing
Decapsulation
What is the PDU of the Packet
network layer?
What information is Source and Destination IP address
contained in the layer 3
PDU?
What is the role of a router? to select paths for and direct packets toward
their destination. This process is known as
routing
What is it called when a Hop
packet passed through an
intermediary device?
What happens to the It stays the same
transport layer PDU as the
packet moves through the
network?
What does the network the packet structure and processing used to
layer protocol specify? carry the data from one host to another host
5.1.1.2 List the 5 Network layer Internet Protocol version 4 (IPv4)
protocols. Internet Protocol version 6 (IPv6)
Novell Internetwork Packet Exchange (IPX)
AppleTalk
Connectionless Network Service
(CLNS/DECNet)
Which protocol will be the IP
focus of this class?
5.1.2.1 What are the basic Connectionless - No connection is established
characteristics of IPv4? before sending data packets.
Best Effort (unreliable) - No overhead is used
to guarantee packet delivery.
Media Independent - Operates independently
of the medium carrying the data.
5.1.3 Describe what a requires no initial exchange of control
connectionless service in information to establish an end-to-end
networking means? connection before packets are forwarded, nor
does it require additional fields in the PDU
header to maintain this connection
What is the main issue that Connectionless packet delivery may, however,
may occur in a result in packets arriving at the destination out
connectionless exchange? of sequence. If out-of-order or missing packets
create problems for the application using the
data, then upper layer services will have to
resolve these issues.
5.1.4 What does unreliable mean Unreliable means simply that IP does not have
in networking? the capability to manage, and recover from,
undelivered or corrupt packets.
Which layer is responsible Transport Layer
for adding reliability to
packet delivery?
5.1.5 Describe media IPv4 and IPv6 operate independently of the
independent. media that carry the data at lower layers of the
protocol stack.
What layer is responsible Physical Layer
for preparing a packet for
the media?
What is the one Maximum Transmission Unit MTU
characteristic of the network
layer that is dependent on
the media?
5.1.6 What portion of the IP Header
packet does a router use to
make forwarding decisions?
What remains untouched as In all cases, the data portion of the packet -
packets travel through the that is, the encapsulated Transport layer PDU -
network? remains unchanged during the Network layer
processes.
5.1.7.1 What are the 6 key fields in IP Source Address
an IP packet? IP Destination Address
Time-to-Live (TTL)
Type-of-Service (ToS)
Protocol
Fragment Offset
What happens to a packet if It is discarded
the TTL field reaches 0?
5.1.7.2 What is the checksum field To determine if the header has reached the
used for? destination intact.
5.2.1 What are three methods of Geographic location
determining how to divide Purpose
your network? Ownership
5.2.1.2 Why would you group users To improve manageability and network
geographically? performance.
Why would you group users To improve performance based on network
by task? requirements of each task.
Why would you group To maintain control and limit access.
networks by ownership?
5.2.2 What are the 3 main issues Performance degradation
as networks grow larger? Security issues
Address Management
What is a network A broadcast is a message sent from one host
broadcast? to all other hosts on the network.
What is broadcast domain? The network area in which all hosts receive
broadcasts
Is it good or bad to increase Good
the number of broadcast
domains in your network?
5.2.3 What is the major access to and from resources outside each
advantage of dividing network can be prohibited, allowed, or
networks by ownership? monitored
5.2.4 What efficiency does hosts who need to communicate are grouped
dividing large networks into together reduces the unnecessary overhead of
separate networks provide all hosts needing to know all addresses.
to the hosts?
What is the device called Gateway
that hosts send information
to that must travel outside
their network?
5.2.5 What is hierarchical A hierarchical address uniquely identifies each
addressing? host. It also has levels that assist in forwarding
packets across internetworks, which enables a
network to be divided based on those levels.
What is the example Zip codes and house addresses
presented that describes
hierarchical addressing in
our daily lives?
5.2.5 How many bits are in an 32
IPv4 address?
How is the ip address IPv4 addresses are divided in four groups of
divided? eight bits (octets)
What portion of the IP Network
address does a router use?
5.3.1 What is the actual address The router interface IP address at the edge of
used for a default gateway? the network.
What is the route that the Next-hop address
router forwards a packet to
called?
5.3.2 What decisions do routers Is the network directly connected or not. Yes
make as a packet enters an forward to that network. No forward to the
interface? next-hop router.
5.3.3 How is the default gateway On a Windows computer, the Internet Protocol
configured on a host (TCP/IP) Properties tools are used to enter the
running windows? default gateway IPv4 address
What portion of the IP Network and Subnetwork
address must be the same
for the host and gateway?
5.3.3.2 What command is issued at ipconfig
the command prompt of
windows to see the default
gateway setting?
5.3.3.3 What is it called when a Routing
router makes forwarding
decisions?
What is the map called that Routing Table
a router uses to make
forwarding decisions (Hint:
look at the figure)?
5.3.4 What does a routing table The routing table stores information about
contain? connected and remote networks.
What are the 3 main Destination network
features of routes in a Next-hop
routing table? Metric
What happens if the packet The packet is dropped
does not have an address
contained in the routing
table?
What is a default route used The default route is used when the destination
for? network is not represented by any other route
in the routing table.
5.3.4.2 What is the command to Netstat
view the routing table for a
host?
What is the destination 0.0.0.0 0.0.0.0
network IP address and
subnet mask for the default
network interface?
What three commands are route ADD
listed that allow you to route DELETE
change the routing table? route CHANGE
5.3.5 What does the address in represents a range of host addresses and
the routing table represent? sometimes a range of network and host
addresses
If more than one route The route that is most specific for that IP
exists in the routing table for address
an address, which one will
be selected?
5.3.5.2 When is the default route When the IP address does not match any
used? other entry in the routing table
5.3.6 What is the next-hop? the address of the device that will process the
packet next
Why does a directly There are no intermediary devices and the
connected device not have packet is directly forwarded
a next-hop?
5.3.7.1 What are the three Forward it to the next-hop router
decisions a router can make Forward it to the destination host
about a packet? Drop it
Which layer does a router 3
process packets at?
What layer is the packet Data Link Layer 2
encapsulated at before it
leaves the router?
5.3.7.2 What is another name for a Gateway of last resort
default gateway?
Why would a packet take a Rotuers may learn a new path between
different route than another packets
packet that is part of the
same data stream?
Why are default routes so because the gateway router is not likely to
important to routers? have a route to every possible network on the
Internet.
5.3.7.3 What happens if a router The packet is dropped
has not route for the packet
and does not have a default
route?
Why doesn’t IP have error It would reduce efficiency and add overhead
notification?
5.4.1 What does a router need to Next-hop
forward a packet?
What happens if routing that packets may not be forwarded to the most
table are not up to date? appropriate next-hop, causing delays or packet
loss
What are two ways a router route information can be manually configured
can learn about routes? on the router or learned dynamically from other
routers in the same internetwork
5.4.2 What is a static route? A manually configured route
What must be done if the Static routes must be reconfigured
internetwork changes?
5.4.3 What is the definition of a set of rules by which routers dynamically share
dynamic routing protocol? their routing information
What happens when a It updates its’ routing table
router receives information
about changes in routes?
What are 3 common routing Routing Information Protocol (RIP)
protocols? Enhanced Interior Gateway Protocol (EIGRP)
Open Shortest Path First (OSPF)
What are the 2 costs listed Overhead that consumes network bandwidth
with using a dynamic Processing capacity necessary
protocol?
What advantages are listed No network overhead produced
for static routing? No processing capacity used
Administrative distance is configured to ensure
efficient and effective routing
SEMESTER 1 Chapter 6
Addressing the Network IPv4
V 4.0

6.1.1 How many bits are the 32 bits


source and destination IPv4
addresses?
What is the name for the Dotted Decimal
decimal representation of
the binary IP address
called?
How many bits are there 8 bits
between each “dot”?
What are those bits called? Octet
Define the network portion a group of hosts that have identical bit patterns
of an IP address? in the network address portion of their
addresses
What is the host portion of Although all 32 bits define the IPv4 host
the IP address? address, we have a variable number of bits
that are called the host portion of the address
What does the number of the number of hosts that we can have within
bits assigned to host the network
determine?
6.1.2 What is the binary range in 0-255
decimal of a byte?
6.2.1 Define a network address. Within the IPv4 address range of a network,
the lowest address is reserved for the network
address.
Define a broadcast address. The broadcast address uses the highest
address in the network range.
Define a host address. The addresses assigned to the end devices in
the network.
What is the range where Located between the network and the
host addresses assigned? broadcast address.
6.2.1.2 What is assigned to Prefix
determine how many bits
are in network bits?
Do the number of hosts that No
can be assigned stay the
same when prefix changes?
6.2.2.1 How do you calculate the All host bits are 0
network value?
How do you calculate the 1 greater than the network address
first host value?
How do you calculate the All host bits are turned on
broadcast address?
How do you calculate the 1 less than the broadcast address
last host address?
6.2.2.2 This flash exercise is
excellent practice for
calculating the different
values; you can do this until
you have mastered the
process. Please try it with
prefix values of 24 and over
so you have an example to
go by.
6.2.3 Define unicast the process of sending a packet from one host
to an individual host
Define broadcast the process of sending a packet from one host
to all hosts in the network
Define multicast the process of sending a packet from one host
to a selected group of hosts
What is another name for a Host address
unicast address?
6.2.3.2 How does a host process a it processes the packet as it would a packet to
broadcast transmission? its unicast address
What is a broadcast the location of special services/devices for
transmission used for? which the address is not known or when a host
needs to provide information to all the hosts on
the network.
What are the three Mapping upper layer addresses to lower layer
examples of broadcast addresses
transmissions? Requesting an address
Exchanging routing information by routing
protocols
When does a host send a When a host needs information, the host
broadcast? sends a request, called a query, to the
broadcast address
How do hosts with the One or more of the hosts with the requested
information usually respond information will respond, typically using
to the broadcast? unicast.
What is a directed A directed broadcast is sent to all hosts on a
broadcast? specific network.
What is a limited broadcast communication that is limited to the hosts on
used for? the local network
What forms the boundary Router
for a broadcast domain?
6.2.3.3 What is multicast designed conserve the bandwidth of the IPv4 network
to do?
What are the 4 examples of Video and audio broadcasts
multicast transmissions? Routing information exchange by routing
protocols
Distribution of software
News feeds
How are multicast The multicast clients use services initiated by a
addresses assigned? client program to subscribe to the multicast
group.
What is the range for 224.0.0.0 to 239.255.255.255
multicast addresses?
What is the range for 240.0.0.0 to 255.255.255.254
experimental addresses?
6.2.5.1 List the three private 10.0.0.0 to 10.255.255.255 (10.0.0.0 /8)
address blocks? (This is 172.16.0.0 to 172.31.255.255 (172.16.0.0 /12)
incredibly important for 192.168.0.0 to 192.168.255.255 (192.168.0.0
network administrators to /16)
know)
What happens if a packet It would not be forwarded
with a private IP address
was sent to the Internet?
What is NAT Network to translate private addresses to public
Address Translation addresses, hosts on a privately addressed
services used for? network can have access to resources across
the Internet
How does NAT allow a host It allows the host to “borrow” a public IP
with a private address to address
access the Internet?
6.2.5.2 Excellent practice. This is
very important for the test.
6.2.6 What is the range for local- 169.254.0.0 to 169.254.255.255
link addresses?
When is a local link address automatically assigned to the local host by the
assigned to a device? operating system in environments where no IP
configuration is available
6.2.7 What is the first octet range 1-126
of Class A?
What is the first octet range 128-191
of Class B?
What is the first octet range 192-223
of Class C?
What is the first octet range 224-239
of Class D?
What is the first octet range 240-255
of Class E?
What is the limitation of wasted many addresses, which exhausted the
classful routing? availability of IPv4 addresses
What is the address system Classless addressing
used today called?
Why should the allocation of Preventing duplication of addresses
addresses inside the Providing and controlling access
networks be planned and Monitoring security and performance
documented for the purpose
of?
What are the different End devices for users
examples of types of hosts? Servers and peripherals
Hosts that are accessible from the Internet
Intermediary devices
6.3.1.2 What considerations should Will there be more devices connected to the
be used about where network than public addresses allocated by the
private IP addresses should network's ISP?
be used? Will the devices need to be accessed from
outside the local network?
If devices that may be assigned private
addresses require access to the Internet, is the
network capable of providing a Network
Address Translation (NAT) service?
6.3.2 Which devices should have printers, servers, and other networking devices
static IP addresses that need to be accessible to clients on the
assigned? network
6.3.2.2 What does DHCP provide automatic assignment of addressing
for an end device? information such as IP address, subnet mask,
default gateway, and other configuration
information
What is the block of Address pool
addresses a DHCP server
use called?
6.3.3 Which devices should have Servers and printers
a static IP address? Why? So hosts can have consistent access
What does almost all traffic Intermediary Devices
pass through when going
between networks?
Which IP addresses are Lowest or Highest addresses in the range
used for router interfaces?
6.3.4 What is the organization Internet Assigned Numbers Authority (IANA)
that assigns IP addresses in
the US?
6.3.5 What are the advantages of reliability and speed
having a Tier 1 ISP?
What is the focus of a Tier 2 focus on business customers
ISP?
What is the focus of a Tier 3 The focus of these ISPs is the retail and home
ISP? markets in a specific locale.
6.3.6 What was the main issue to Creating expanded addressing capabilities
be addressed by IPv6?
What were the other issues Improved packet handling
that were considered when Increased scalability and longevity
developing IPv6? QoS mechanisms
Integrated security
List the added features of 128-bit hierarchical addressing - to expand
IPv6. addressing capabilities
Header format simplification - to improve
packet handling
Improved support for extensions and options -
for increased scalability/longevity and
improved packet handling
Flow labeling capability - as QoS mechanisms
Authentication and privacy capabilities - to
integrate security
6.4.1 How is the subnet mask by placing a binary 1 in each bit position that
created? represents the network portion and placing a
binary 0 in each bit position that represents the
host portion
What is true if the octet of All of the octet is network/subnetwork bits.
the subnet mask is 255?
What is true if the octet of All of the octet is host bits.
the subnet mask is 0?
6.4.2 What is the result of the The network address
ANDing process?
What is the only case in 1 anded with a 1
which ANDing results in a
1?
6.5 We will cover this in class.
Good exercises and
examples to read through.
6.5.4- Excellent practice
6 exercises, practice these a
lot.
6.6.1 What is ping? utility for testing IP connectivity between hosts
What happens when the it responds with an ICMP Echo Reply
destination host receives an datagram.
echo request?
What is the address to ping 127.0.0.1
the local host?
What does a response from that IP is properly installed on the host
the local host tell you?
What doesn’t the response an indication that the addresses, masks, or
from the local host tell you? gateways are properly configured
6.6.2 What does it tell you if a indicates that the host and the router's
ping to the gateway is interface serving as that gateway are both
successful? operational on the local network
6.6.3 What does it tell you if a It means that we have verified our host's
ping to the remote host is communication on the local network, the
successful? operation of the router serving as our gateway,
and all other routers that might be in the path
between our network and the network of the
remote host.
6.6.4 What does the traceroute allows us to observe the path between these
utility do? hosts
Define Round Trip Time the time a packet takes to reach the remote
(RTT). host and for the response from the host to
return
Define Time to Live (TTL). When a packet enters a router, the TTL field is
decremented by 1. When the TTL reaches
zero, a router will not forward the packet and
the packet is dropped.
6.6.5 What does ICMP provide for ICMP provides control and error messages
the TCP/IP protocol stack? and is used by the ping and traceroute utilities.
List the 5 ICMP messages Host conformation
that may be sent? Unreachable Destination or Service
Time exceeded
Route redirection
Source quench
What are the 4 destination 0 = net unreachable
unreachable codes listed? 1 = host unreachable
2 = protocol unreachable
3 = port unreachable
SEMESTER 1 Chapter 7
Data Link Layer
V 4.0

7.1.1 What are the 2 basic Allows the upper layers to access the media
services the Data Link layer using techniques such as framing
provides? Controls how data is placed onto the media
and is received from the media using
techniques such as media access control and
error detection
List and define the 4 Frame - The Data Link layer PDU
specific terms associated Node - The Layer 2 notation for network
with the Data Link layer? devices connected to a common medium
Media/medium (physical)* - The physical
means for the transfer of information between
two nodes
Network (physical)** - Two or more nodes
connected to a common medium
7.1.1.2 What happens the frame as It changes based on the medium used
moves from source to
destination?
7.1.2 Define Media Access The technique used for getting the frame on
Control. and off media
7.1.3 What can the control Which nodes are in communication with each
information tell you? other
When communication between individual
nodes begins and when it ends
Which errors occurred while the nodes
communicated
Which nodes will communicate next
List and define the three Data - The packet from the Network layer
elements of a Data Link Header - Contains control information, such
Layer Frame. addressing, and is located at the beginning of
the PDU
Trailer - Contains control information added to
the end of the PDU
7.1.3.2 List and define the 5 typical Start and stop indicator fields - The beginning
field types. and end limits of the frame
Naming or addressing fields
Type field - The type of PDU contained in the
frame
Quality - control fields
A data field -The frame payload (Network layer
packet)
7.1.4 What is the most common NIC
physical device that is used
for the Data Link Layer?
7.1.4.2 Describe the two sublayers The upper sublayer defines the software
of the Data Link Layer. processes that provide services to the Network
layer protocols.
The lower sublayer defines the media access
processes performed by the hardware.
What are the two functions Frames the network layer packet
of the Logical Link Control? Identifies the network layer protocol
What are the two functions Addresses the frame
of the Media Access Marks the beginning and ending of each frame
Control?
7.1.5 What are the 4 International Organization for Standardization
organizations that define the (ISO)
Data Link standards? Institute of Electrical and Electronics Engineers
(IEEE)
American National Standards Institute (ANSI)
International Telecommunication Union (ITU)
7.2.1 What analogy is made with traffic rules that regulate the entrance of motor
the media access control? vehicles onto a roadway
What does the method that Media sharing - If and how the nodes share
media access control uses the media
depend on? Topology - How the connection between the
nodes appears to the Data Link layer
7.2.2 What are the two basic Controlled - Each node has its own time to use
media access control the medium
methods for shared media? Contention-based - All nodes compete for the
use of the medium
What are two examples of Token Ring
controlled media access? FDDI
What are two examples of Ethernet
contention-based media Wireless
access?
Why can controlled media Device has to wait its turn to access the media
access be inefficient?
What is CSMA? Carrier Sense Multiple access
What is a data collision? When two devices transmit at the same time
What is CSMA/CD? Carrier Sense Multiple access with Collision
Detection
What is CSMA/CA? Carrier Sense Multiple Access with Collision
Avoidance
7.2.3 Define Half-Duplex. devices can both transmit and receive on the
media but cannot do so simultaneously
Define Full-Duplex. Both devices can transmit and receive on the
media at the same time.
7.2.4 Define physical topology. arrangement of the nodes and the physical
connections between them
Define logical topology. the way a network transfers frames from one
node to the next
What logical and physical Point-to-Point
topologies are typically used Multi-Access
in networks? Ring
7.2.5 Define point-to-point connects two nodes directly together
topology.
7.2.5.2 Define virtual circuit. a logical connection created within a network
between two network devices
Which type of topology is logical point-to-point topology
used to determine the
media access control?
7.2.6 Define logical multi-access enables a number of nodes to communicate by
topology. using the same shared media
What are the three types of CSMA/CD, CSMA/CA, or token passing
media access control can
be used in a multi-access
topology?
7.2.7 How does a data flow in a From node to node until it reaches the
ring network? destination.
7.3.1 What are the three basic Header
parts of a data link layer Data
frame? Trailer
7.3.2 What are the typical fields in Start Frame field - Indicates the beginning of
the frame header? the frame
Source and Destination address fields -
Indicates the source and destination nodes on
the media
Priority/Quality of Service field - Indicates a
particular type of communication service for
processing
Type field - Indicates the upper layer service
contained in the frame
Logical connection control field - Used to
establish a logical connection between nodes
Physical link control field - Used to establish
the media link
Flow control field - Used to start and stop
traffic over the media
Congestion control field - Indicates congestion
in the media
7.3.3 Which part the network LAN
(WAN/LAN) is the data link
address used in delivering?
What is the difference Data Link address only defines the machine it
between Data Link Address is not logically assigned
and Logical Address?
Does a point-to-point link No it only has one place to go
need a data link address?
7.3.4 Define error detection. accomplished by placing a logical or
mathematical summary of the bits that
comprise the frame in the trailer
Define Frame Check used to determine if errors occurred in the
Sequence. transmission and reception of the frame
How could the CRC be The error bits could cancel each other out
correct and the frame
contain errors?
Do all protocols support No
using the FCS to determine
errors?
7.3.5 What Layer 2 protocols will Ethernet
we study in this course? Point-to-Point Protocol (PPP)
High-Level Data Link Control (HDLC)
Frame Relay
Asynchronous Transfer Mode (ATM)
Which usually performs at a LAN
higher bandwidth, LAN or
WAN?
7.3.5.2 What do Ethernet standards Layer 2 Protocols and Layer 1 technologies
define?
What is the data link MAC address
address?
How is the data link address 48 bit
expressed? Hexadecimal
7.3.5.3 What type of architecture Layered architecture
does PPP use?
What are options available Authentication, compression, and multilink (the
to use with PPP? use of multiple physical connections).
7.3.5.4 What is the standard used 802.11
for wireless LANs?
What services are authentication, association (connectivity to a
supported by 802.11? wireless device), and privacy (encryption)
7.4.1.2 Examine each of the
processes and take notes.
Develop questions on any
step you do not understand.
SEMESTER 1 Chapter 8
Physical Layer
V 4.0

8.1.1 What does the physical provides the means to transport across the
layer provide? network media the bits that make up a Data
Link layer frame
What are the four elements The physical media and associated connectors
of delivering frames across A representation of bits on the media
the media? Encoding of data and control information
Transmitter and receiver circuitry on the
network devices
8.1.2 What are the three basic Copper cable
forms of media? Fiber
Wireless
What are the three the Physical layer encodes the bits into the
concerns when the physical signals for a particular medium, it must also
layer encodes bits? distinguish where one frame ends and the next
frame begins
8.1.3 What does the physical hardware, developed by engineers, in the form
layer consist of? of electronic circuitry, media, and connectors
What are the organizations The International Organization for
that are responsible for Standardization (ISO)
physical layer standards? The Institute of Electrical and Electronics
Engineers (IEEE)
The American National Standards Institute
(ANSI)
The International Telecommunication Union
(ITU)
The Electronics Industry
Alliance/Telecommunications Industry
Association (EIA/TIA)
National telecommunications authorities such
as the Federal Communication Commission
(FCC) in the USA.
8.1.3.2 The technologies defined by Physical and electrical properties of the media
these organizations include Mechanical properties (materials, dimensions,
what four areas of the pinouts) of the connectors
Physical layer standards? Bit representation by the signals (encoding)
Definition of control information signals
8.1.4 What are the three The physical components
fundamental functions of the Data encoding
Physical layer? Signaling
What are the two values 1 and 0
that the physical layer
encodes?
8.2.1 How are the bits of the One bit at a time
frame transmitted by the
physical layer?
What is a bit time? specific amount of time each signal has to
occupy the media
How are the signaling and Many signaling methods use predictable
receiving ends clocks transitions in the signal to provide
synchronized in the LAN? synchronization between the clocks of the
transmitting and the receiving devices
What characteristics can be Amplitude
changed to represent bits Frequency
on the medium? Phase
What will happen if there is The transmission will fail
no agreement between
nodes on the signaling
method?
8.2.1.2 What are the three Discrete impulses
characteristics of NRZ Only two states
signaling? Voltage jumps between levels
What type of transmission is for slow speed data links
NRZ suited for?
8.2.1.3 What are represented by in voltage transitions
Manchester encoding?
How does the transition one voltage transition must occur in the middle
help maintain clock of each bit time
synchronization?
Which medium uses 10BaseT Ethernet
Manchester encoding?
8.2.2 What method is used to Specific pattern of grouped bits
signal start and end of a
frame in higher speed
technologies?
8.2.2.2 What is a code group? consecutive sequence of code bits that are
interpreted and mapped as data bit patterns
What are the advantages of the error detection capabilities and timing
transmitting symbols? synchronization between transmitting and
receiving devices are enhanced
What are the four Reducing bit level error
advantages of using code Limiting the effective energy transmitted into
groups? the media
Helping to distinguish data bits from control
bits
Better media error detection
What are the three types of Data symbols - Symbols that represent the
code groups? data of the frame as it is passed down to the
Physical layer.
Control symbols - Special codes injected by
the Physical layer used to control transmission.
These include end-of-frame and idle media
symbols.
Invalid symbols - Symbols that have patterns
not allowed on the media. The receipt of an
invalid symbol indicates a frame error.
8.2.2.3 How does 4B/5B represent as five-bit values known as symbols
a nibble?
8.2.3 What are the three Bandwidth
measures for Data Throughput
Transfer? Goodput
8.2.3.2 What is the difference Throughput is the measure of bits over a given
between throughput and time and goodput is the measure of usable
goodput? data transferred over a given period of time
Which measure of data Goodput
transfer is most important to
the end user?
8.3.1 What are the standards for Type of copper cabling used
copper media defined for? Bandwidth of the communication
Type of connectors used
Pinout and color codes of connections to the
media
Maximum distance of the media
8.3.2 What type of connector is RJ-45
commonly used in copper
cabling?
8.3.2.2 What is done to the pairs of Shielding and twisting of the wires
wires to minimize signal
degradation due to
electronic noise?
What are the other methods Selecting the cable type or category most
listed to limit the suited to protect the data signals in a given
susceptibility of copper networking environment
cables to noise? Designing a cable infrastructure to avoid
known and potential sources of interference in
the building structure
Using cabling techniques that include the
proper handling and termination of the cables
8.3.3 What is crosstalk? the interference caused by the magnetic field
around the adjacent pairs of wires in the cable
What is used to limit Twisting pairs of wires
crosstalk?
What changes in the twist The number of twists per meter changes
from one pair of wires to the
next pair of wires to improve
the limitation of crosstalk?
What are some of the Cable types
elements defined by the Cable lengths
TIA/EIA 568A standard? Connectors
Cable termination
Methods of testing cable
Why is it wasteful to install If the decision is later made to adopt a faster
less expensive but lower LAN technology, total replacement of the
rated cabling? installed cable infrastructure may be required.
8.3.3.2 What is UTP cable RJ-45 connectors
terminated with?
What are the three types of Ethernet Straight-through
Ethernet cables? Ethernet Crossover
Rollover
What is a straight-through Host to network device such as a hub or switch
used for?
What is a crossover used Connecting two hosts
for? Connecting to network intermediary devices
What is a rollover used for? Connecting a computers serial port to the
console port of a router (with an adapter)
What happens if you use Communication will not occur
the wrong type of cable
when connecting devices?
8.3.4 What are the other two type 1. Coaxial
of copper cabling? 2. Shielded Twisted-Pair (STP)
What has replaced the use UTP
of coaxial cable in today’s
Ethernet installations?
8.3.6 What type types of Glass or plastic
materials can be used for
fiber optic cabling?
What is the encoding Light pulses
method for fiber optic?
What are the issues with More expensive (usually) than copper media
implementing fiber optic over the same distance (but for a higher
cabling? capacity)
Different skills and equipment required to
terminate and splice the cable infrastructure
More careful handling than copper media
What areas usually Backbone and between buildings
implement fiber optic
cabling?
What are the major optical fiber does not conduct electricity and
advantages of using fiber has low signal loss
optic between buildings?
8.3.6.2 How many cables are 2, they can only operate in one direction
needed for each fiber optic
connection? Why?
8.3.6.3 What are the two types of Single mode and multimode
fiber optic cables?
8.3.7 How do wireless media radio and microwave frequencies that
carry electromagnetic represent the binary digits of data
signals? communications
What is the major concern Security
for wireless signals?
8.3.7.2 What are the 4 standards IEEE 802.11
for wireless networks? IEEE 802.15
IEEE 802.16
Global System for Mobile Communications
(GSM)
8.3.7.3 What are the two network Wireless Access Point (AP) - Concentrates the
devices necessary to wireless signals from users and connects,
implement a wireless usually through a copper cable, to the existing
network? copper-based network infrastructure such as
Ethernet.
Wireless NIC adapters - Provides wireless
communication capability to each network
host.
What are the WLAN IEEE 802.11a, IEEE 802.11b, IEEE 802.11g,
Ethernet standards? IEEE 802.11n
8.3.8 What are some of the CAT5 crimped connections to terminate Cat5 media
termination that may with RJ-45 plugs to make patch cables, and
performed onsite? the use of punched down connections on 110
patch panels and RJ-45 jacks
8.3.8.2 What are the differences in Insulation cut back to far and wires untwisted
the termination of the two too much
cables pictured?
What could happen if wires damaging voltage levels may be applied
are not terminated between interconnected devices
correctly?
8.3.8.3 What are the three main Misalignment - the fiber-optic media are not
splicing errors when using precisely aligned to one another when joined.
fiber optic cabling? End gap - the media do not completely touch
at the splice or connection.
End finish - the media ends are not well
polished or dirt is present at the termination.
SEMESTER 1 Chapter 9
Ethernet
V 4.0

9.1.1 Who originally published the published in 1980 by a consortium of Digital


Ethernet standard and when Equipment Corporation, Intel, and Xerox (DIX).
was that?
Who and when published 1985, the Institute of Electrical and Electronics
LAN standards? Engineers (IEEE)
What is the number for the 802.3
Ethernet LAN standard?
What layers of the OSI 1 and 2
model do Ethernet
standards operate at?
9.1.2 What does Ethernet Layer 1 signals, bit streams that travel on the media,
involve? physical components that put signals on
media, and various topologies
What are the Ethernet Layer Connects to the upper layers via the LLC
2 functions that overcome Uses addressing schemes to identify devices
the limitations of Ethernet Uses frames to organize bits into groups
Layer 1? Uses MAC to identify transmission sources
9.1.3 What are the two sublayers the Logical Link Control (LLC) sublayer and
of the Data Link Layer? the Media Access Control (MAC) sublayer.
What are the 4 functions of Makes connection with the upper layers
the LLC? Frames the network layer packet
Identifies the network layer protocol
Remains relatively independent of the physical
layer
What type of environment is Software
LLC implemented in?
9.1.4 Where is the MAC sublayer NIC
implemented?
What are the 2 primary Data Encapsulation
functions of the MAC Media Access Control
sublayer?
What are the 3 primary Frame delimiting
functions of data Addressing
encapsulation? Error detection
What are the two main Control of frame placement on and off the
functions of the media media
access control? Media recovery
What is the underlying Mulit-access bus
topology of Ethernet?
What is the media access CSMA/CD Carrier Sense Multiple Access with
control method for Collision Detection
Ethernet?
9.1.5 What are the four factors Simplicity and ease of maintenance
that have made Ethernet a Ability to incorporate new technologies
success? Reliability
Low cost of installation and upgrade
What part of the Ethernet Frame structure
standard remains consistent
across all of its physical
implementations?
9.2.1 What was the historic Alohanet
network that Ethernet was
based on called?
9.2.1.2 Describe the method of A frame received in one port is transmitted out
transmission on a hub? all other ports
9.2.2 What is legacy Ethernet? 10Base-T network with a hub at its center
What is the current standard 100Base-T network with switches
for Ethernet?
What is full duplex? a connection that can carry both transmitted
and received signals at the same time
What is the difference when Hub always send the signal out all ports and
forwarding a frame from a switch sends directly to device if it’s address is
switch vs. hub? known
9.2.3 What two new uses are Voice over IP (VoIP) and multimedia services
requiring the move to
Gigabit Ethernet?
9.2.3.2 Define a MAN? Ethernet connection across an entire city
9.3.1 What is the most significant the addition of a Start Frame Delimiter (SFD)
difference between the and a small change to the Type field to include
IEEE 802.3 (original) and the Length
the revised IEEE 802.3?
What were the minimum the minimum frame size as 64 bytes and the
and maximum sizes of maximum as 1518 bytes
Ethernet frames originally?
What is the new maximum 1522 bytes
size for a frame?
What happens if the size of It is dropped
a transmitted frame is less
than the minimum or greater
than the maximum?
9.3.1.2 What are the six portions of Preamble, start frame delimiter, destination
an Ethernet frame address, source address, length/type, 802.2
discussed? header and data, frame check sequence
9.3.1.3 What is the Frame Check (4 bytes) used to detect errors in a frame
Sequence (FCS)?
What is the algorithm used Cyclical redundancy check
in determining the value of
the FCS?
What happens if the FCS The frame is dropped
values do not match?
9.3.2 What was created to assist Media Access Control (MAC) address
in determining the source
and destination address?
How is an Ethernet MAC a 48-bit binary value expressed as 12
address represented? hexadecimal digits
9.3.2.2 Define the two parts of an All MAC addresses assigned to a NIC or other
Ethernet MAC address? Ethernet device must use that vendor's
assigned OUI as the first 3 bytes.
All MAC addresses with the same OUI must be
assigned a unique value (vendor code or serial
number) in the last 3 bytes.
What is another name for Burned-in address
the MAC address?
As an Ethernet frame the NIC passes the frame up the OSI layers,
passes through a network where the decapsulation process take place
what happens if that
devices MAC address
matches the destination
MAC address?
As an Ethernet frame The frame is discarded
passes through a network
what happens if that
devices MAC address does
not match the destination
MAC address?
9.3.3.2 Where can you find your Ipconfig/all or ipconfig
computer’s MAC address?
9.3.4 What is the problem with No meaning outside the local network
physical addressing?
What is the difference The Network layer address enables the packet
between physical (Network to be forwarded toward its destination.
Layer) and logical (Data The Data Link layer address enables the
Link Layer) addressing? packet to be carried by the local media across
each segment.
9.3.5 When a unicast when a frame is sent from a single transmitting
transmission used? device to single destination device
9.3.5.2 When is a broadcast all hosts on that local network (broadcast
transmission used? domain) will receive and process the packet
How is a broadcast IP All 1’s in the host portion of the IP address
address represented?
How is a broadcast MAC FF-FF-FF-FF-FF-FF
address represented?
9.3.5.3 When is a multicast When a frame is sent to a group of computers
transmission used?
How can a multicast packet as the destination of a packet
only be used?
What type of address does Unicast
the source have?
What is the multicast MAC Begins with 01-00-5E The value ends by
address? converting the lower 23 bits of the IP multicast
group address into the remaining 6
hexadecimal characters of the Ethernet
address. The remaining bit in the MAC
address is always a "0".
9.4.1 How does a shared media all devices have guaranteed access to the
environment operate? medium, but they have no prioritized claim on
it. If more than one device transmits
simultaneously, the physical signals collide
and the network must recover in order for
communication to continue.
When does a device on a When it detects that no other computer is
shared environment sending a frame, or carrier signal
transmit?
9.4.2 Define latency. The time delay between when a process is
started and that same process is detected
Define collision. When two stations transmit at the same time
How does collision When a device is in listening mode it can
detection occur? detect an increase in amplitude of the signal
above the normal level
What happens when all they send out a jamming signal
devices on a shared
medium detect a collision?
What is invoked after a The backoff algorithm
device receives a jamming
signal?
How does a backoff All devices stop transmitting for a random
algorithm work? amount of time
What mode does a device Listening
return to after the backoff
algorithm has expired?
9.4.2.2 What are the three reasons More devices are being connected to the
given that the growth of the network.
Internet has resulted in Devices access the network media more
more collisions? frequently.
Distances between devices are increasing.
Define a collision domain? The media within a network where collsions
can occur
What does the connection They increase the collision domain size
of hubs and repeaters do to
collision domains?
What happens when the reduces the network's efficiency and
number of collisions effectiveness until the collisions become a
increases significantly? nuisance to the user
9.4.3 Which devices extend the Hubs and repeaters
latency in the medium?
Why would an increased The other device may not hear the signal
latency cause more before it begins to transmit
collisions?
9.4.3.2 What is sent before an The preamble
entire Ethernet frame is
sent?
What does asynchronous each receiving device will use the 8 bytes of
communication mean? timing information to synchronize the receive
circuit to the incoming data and then discard
the 8 bytes
What does synchronous the timing information is not required
communication mean?
9.4.3.3 What is a bit time? a period of time is required for a bit to be
placed and sensed on the media
What is the slot time? The time it takes for an electronic pulse to
travel the length of the maximum theoretical
distance between two nodes.
9.4.4 What is interframe spacing? time measured from the last bit of the FCS
field of one frame to the first bit of the
Preamble of the next frame
What happens to interframe The time reduces
spacing as the network
speed increases?
9.4.4.3 What happens when the it gives up and generates an error to the
MAC layer is unable to send Network layer
a frame after 16 attempts?
9.5.1 What are the four data rates 10 Mbps - 10Base-T Ethernet
are currently defined for 100 Mbps - Fast Ethernet
operation over optical fiber 1000 Mbps - Gigabit Ethernet
and twisted-pair cables? 10 Gbps - 10 Gigabit Ethernet
9.5.2 What are the three principal 10BASE5 using Thicknet coaxial cable
10 Mbps implementations of 10BASE2 using Thinnet coaxial cable
Ethernet? 10BASE-T using Cat3/Cat5 unshielded
twisted-pair cable
9.5.2.2 What are the most popular 100BASE-TX using Cat5 or later UTP
implementations of 100 100BASE-FX using fiber-optic cable
Mbps Ethernet?
9.5.3 What is Gigabit Ethernet Noise
more susceptible to
because of its speed?
What type of transmission the transmission and reception of data in both
does 1000Base-T allow for? directions - on the same wire and at the same
time
What is the maximum 17
number of voltages used on
the media at the same
during transmission?
What are the two main cable and termination problems
causes of noise on the line?
9.5.4 What are the ways that Frame format is the same, allowing
10Gbps can be compared interoperability between all varieties of legacy,
to other varieties of fast, gigabit, and 10 gigabit Ethernet, with no
Ethernet? reframing or protocol conversions necessary.
Bit time is now 0.1 nS. All other time variables
scale accordingly.
Because only full-duplex fiber connections are
used, there is no media contention and
CSMA/CD is not necessary.
The IEEE 802.3 sublayers within OSI Layers 1
and 2 are mostly preserved, with a few
additions to accommodate 40 km fiber links
and interoperability with other fiber
technologies.
9.6.1 What is the problem high levels of collisions on the LAN
associate with the classic
Ethernet implementation
using hubs?
List the four problems Scalability, Latency, Network Failure, and
related to the Collisions
implementation of classic
Ethernet?
9.6.2 How do switches segment a Separate collision domains
LAN?
What does the separation of Full media bandwidth to each device
collision domains mean for
the bandwidth to the
device?
9.6.2.2 What are the three reasons Dedicated bandwidth to each port
that bandwidth increases Collision-free environment
dramatically when each Full-duplex operation
device is connected to a
switch port?
What are the three reasons Availability, Economics, and Requirements
that hubs are still being
used?
9.6.3 Describe selective establishing a momentary point-to-point
forwarding? connection between the transmitting and
receiving nodes
What is the process called Store-and-forward
when the switch holds the
frame until the receiving
node is available called?
Describe the store-and- The switch receives the entire frame and
forward operation mode of a checks the FCS before forwarding the frame
switch?
How does a switch use a The incoming frame destination MAC address
MAC table? is compared to the MAC table to decide which
port to forward the frame to
9.6.3.2 What are the five basic Learning
operations of a switch? Aging
Flooding
Selective Forwarding
Filtering
How does a switch learn a The source address of the incoming frame
MAC address?
What happens when an The address is removed from the MAC table
addresses countdown
reaches 0?
What happens when a The frame is flooded out all but the incoming
switch does not know the port
destination address?
What type of frames will not A frame with a destination of the same port, a
be forwarded? corrupt frame, and security reasons
9.7.1 What are the two basic Resolving IPv4 addresses to MAC addresses
functions of ARP? Maintaining a cache of mappings
What are the names of the ARP table or ARP Cache
tables that store the list of
MAC addresses with the
network address?
What are the two ways a From an incoming frame or using an ARP
computer can gather MAC request
addresses?
What are the 2 destination Broadcast MAC address and the destination
addresses in an ARP MAC address
Request?
9.7.2 If the destination is on the The device MAC address
local network segment,
what MAC address is used?
If the destination is on a The gateway MAC address
remote network, what MAC
address is used?
If the MAC address of the ARP Request
gateway is unknown, what
process is used?
9.7.2.2 What is the most common When the device can not determine if the host
reason for using a proxy is on the same network or not
ARP?
9.7.3 How long are addresses 2 minutes unless used again in those 2
held in the ARP table? minutes and then 10 minutes
9.7.4 How could ARP requests Too many broadcasts at once that each host
impact performance on a receives and processes therefore slowing
network? down the network
What is another problem Security- ARP spoofing which causes errors
that may be associated with on the network
ARP?
SEMESTER 1 Chapter 10
Planning and Cabling a Network
V 4.0

10.1.1 What are routers primarily used to interconnect networks


used for?
What does each port on a Each port on a router connects to a different
router connect to? network and routes packets between the
networks
What two things can a Broadcast and collision domains
router break up to improve
overall network
performance?
10.1.1.2 What does a hub do when it regenerates it, and sends the signal over all
receives a signal? ports
What is the main problem It shares bandwidth between devices which
with using a hub? can reduce performance of the LAN
What are some reasons that Hubs are less expensive than switches. A hub
hubs are still used today? is typically chosen as an intermediary device
within a very small LAN, in a LAN that requires
low throughput requirements, or when finances
are limited.
What does a switch do regenerates each bit of the frame on to the
when it receives a frame? appropriate destination port
What is the advantage of A switch segments a network into multiple
using a switch vs. a hub? collision domains
How can a switch increase a switch provides dedicated bandwidth on
performance on a LAN? each port
10.1.2 What are some factors that Cost
need to be considered when Speed and Types of Ports/Interfaces
selecting devices for a Expandability
LAN? Manageability
Additional Features and Services
10.1.2.2 What determines the cost of Features and capacity
a switch?
What are the factors of a # of ports and speed of ports
switch’s capacity?
What are other factors that network management capabilities, embedded
affect the cost of the security technologies, and optional advanced
switch? switching technologies
Why would the cost of A few long cable runs instead of many long
purchasing more than one cable runs
switch sometimes be the
better choice than one
switch?
Describe the process of Add a second or more switches between
using redundancy in a nodes so that there is not a single point of
switched network. failure
10.1.2.3 What are the three Just enough ports for today's needs?
questions you should ask A mixture of UTP speeds?
when selecting a switch? Both UTP and fiber ports?
10.1.2.4 What are the factors that Expandability
need to be addressed when Media
selecting a router? Operating System Features
What is the difference A modular router has expansion slots that can
between a fixed and be changed for future expansion. Fixed can
modular router? not be changed.
List the features and Security
services that can be Quality of Service (QoS)
provided based on the Voice over IP (VoIP)
operating system selected. Routing multiple Layer 3 protocols
Special services such as Network Address
Translation (NAT) and Dynamic Host
Configuration Protocol (DHCP)
10.2.1 What are the four physical Work area
areas to consider when Telecommunications room, also known as the
wiring a LAN? distribution facility
Backbone cabling, also known as vertical
cabling
Distribution cabling, also known as horizontal
cabling
What is the total distance 100 meters
that a UTP cable can be per
channel?
How long can a patch cable 5 meters
for interconnecting patch
panels be?
How long can the cable be 10 meters
from the wall termination to
the computer or phone?
What is horizontal cabling? horizontal media runs from a patch panel in the
telecommunications room to a wall jack in
each work area
What is backbone cabling? Backbones, or vertical cabling, are used for
aggregated traffic, such as traffic to and from
the Internet and access to corporate resources
at a remote location.
10.2.1.2 What are the three types of UTP (Category 5, 5e, 6, and 7)
media we study? Fiber-optics
Wireless
What factors need to be Cable length - Does the cable need to span
considered when selecting across a room or from building to building?
the media to use? Cost - Does the budget allow for using a more
expensive media type?
Bandwidth - Does the technology used with the
media provide adequate bandwidth?
Ease of installation - Does the implementation
team have the ability to install the cable or is a
vendor required?
Susceptible to EMI/RFI - Is the local
environment going to interfere with the signal?
10.2.1.3 Define attenuation. Attenuation is reduction of the strength of a
signal as it moves down a media.
What is the major factor that Cable length
affects attenuation in
network cables?
What two cost factors must match the performance needs of the users with
be matched when selecting the cost of the equipment and cabling to
the media? achieve the best cost/performance ratio
Does a server need more or More
less bandwidth than a single
user?
10.2.1.4 List in numeric order the 1. wireless
easiest to most difficult 2. UTP
media to install. 3. Fiber Optic
What are the two forms of EMI- Electromagnetic Interference
interference that can affect RFI- Radio Frequency Interference
the network signals?
10.2.2.1 What are the EIA/TIA cable 568A & 568B
specifications for the ends
of UTP cables?
10.2.2.2 Which pins are used for Pins 1 & 2
transmitting in a straight-
through cable?
Which pins are used for Pins 3 & 6
receiving in a straight-
through cable?
When do you use a straight- When connecting unlike devices
through cable?
When do you use a When connecting like devices
crossover cable?
Which connections use a Switch to a router Ethernet port
straight-through cable? Computer to switch
Computer to hub
10.2.2.3 Describe the ends of a The transmit of one end connects to the
crossover cable. receive of the other end and vice-versa
Which connections are Switch to switch
listed that require a Switch to hub
crossover cable? Hub to hub
Router to router Ethernet port connection
Computer to computer
Computer to a router Ethernet port
10.2.2.4 Can modern devices be set Yes
so that different types of
cables are not necessary?
10.2.3 What are the two types of DB-60 or a smart serial connector
connectors for the router
end of a serial connection?
What is the connector at the Winchester 15 pin connector
network end called?
10.2.3.2 Define a DCE. Data Communications Equipment (DCE) - A
device that supplies the clocking services to
another device. Typically, this device is at the
WAN access provider end of the link.
Define a DTE. Data Circuit-Terminal Equipment (DTE) - A
device that receives clocking services from
another device and adjusts accordingly.
Typically, this device is at the WAN customer
or user end of the link.
Which end of the cable is DCE
responsible for supplying
the clock rate?
10.3.1 Which end devices require User computers
an IP address? Administrator computers
Servers
Other end devices such as printers, IP phones,
and IP cameras
Which network devices Router LAN interfaces
require IP addresses? Router WAN (serial) interfaces
Which network devices Switches
need IP addresses for Wireless Access Points
management?
10.3.2 What are the three reasons Manage broadcast traffic
given to subnet a network? Different network requirements
Security
What two calculations are A unique subnet and subnet mask for each
necessary after the physical segment
requirements are A range of usable host addresses for each
determined? subnet
10.3.3 What are the different types General users
of hosts on a network? Special users
Network resources
Router LAN interfaces
Router WAN links
Management access
10.4 We will go over these in
class.
10.5.1 What are router Ethernet Connecting to LAN
connections used for?
What are router Serial Connections between WANs
connections used for?
What is the router’s console It is used for the initial configuration of the
interface used for? router
What is the security concern with physical access to the router's console
involving the console port of interface, an unauthorized person can interrupt
a router? or compromise network traffic
What is the auxiliary port of To remotely configure a router
a router used for?
What device is normally Modem
attached to the auxiliary
port?
10.5.2 What software is used when Terminal emulator
configuring a router?
What type of cable is RJ-45 to DB-9
connected between the
router console port and
computer?
What are the serial port Bits per second: 9600 bps
connection settings Data bits: 8
required? Parity: None
Stop bits: 1
Flow control: None
What do you do to access Hit enter
the router if all connections
are made properly?
CCNA Explorer 1
Chapter 11
Configuring & Testing Your Network

11.1.1 What is the system software in Cisco The Cisco Internetwork Operating System (IOS)
devices?
The Cisco IOS provides devices with what Basic routing and switching functions
network services? Reliable and secure access to networked resources
Network scalability
How is the IOS generally accessed? By using a command line interface (CLI).
Where is the IOS stored? In a semi-permanent memory area called flash.
What type of memory is flash? Flash memory provides non-volatile storage. This
means that the contents of the memory are not lost
when the device loses power.
What are several ways to access the CLI Console
environment? Telnet or SSH
AUX port

Describe the console port. The console port is a management port that provides
out-of-band access to a router. The console port is
accessible even if no networking services have been
configured on the device.
When would the console port be used? • The initial configuration of the network device
• Disaster recovery procedures and
troubleshooting where remote access is not
possible
• Password recovery procedures
By default, the console conveys what? The device startup, debugging, and error messages.
Why type of security precautions be taken The console should be configured with passwords to
to protect the router? prevent unauthorized device access. In the event
that a password is lost, there is a special set of
procedures for bypassing the password and
accessing the device. The device should be located
in a locked room or equipment rack to prevent
physical access.
What are 2 methods for remotely Telnet –A terminal emulation program
accessing the router? Describe them. SSH-establishes a secure channel between a local &
a remote computer. Uses public-key cryptography
for authentication.
What are required for Telnet to work Telnet sessions require active networking services
properly? on the device. The network device must have at
least one active interface configured with a Layer 3
address, such as an IPv4 address. Cisco IOS
devices include a Telnet server process that
launches when the device is started. The IOS also
contains a Telnet client. For security reasons, the
IOS requires that the Telnet session use a password,
as a minimum authentication method.
11.1.2 Network devices depend on what two Operating system-facilitates the basic operation of
types of software for their operation the device's hardware components
Configuration-contain the Cisco IOS software
commands used to customize the functionality of a
Cisco device
CCNA Explorer 1 Chapter 11 rev. March 2008
A Cisco network device contains what two The running configuration file - used during the
configuration files? current operation of the device
The startup configuration file - used as the backup
configuration and is loaded when the device is
started
Where is the startup config file stored? In non-volatile RAM (NVRAM)
Where is the running config located? In RAM
11.1.3 What is a modal operating system? A system where there are different modes of
operation, each having its own domain of operation.
In the CLI what are, in order from top to • User executive mode-ping, show commands,
bottom, the major modes? List some of enable
the available commands for each. • Privileged executive mode-all User EXEC
commands, debug commands, reload,
configure
• Global configuration mode-hostname, enable
secret, ip route, interface
• Other specific configuration modes-these
include interface configuration mode, router
configuration mode
What is a command prompt? The mode is identified by the command-line prompt
that is unique to that mode. The prompt is composed
of the words and symbols on the line to the left of the
entry area.
By default, with what does every prompt The device name
begin?
In what mode does “Router>” indicate? User executive mode
In what mode does “Router#” indicate? Privileged executive mode
In what mode does “Router(config)#” Global configuration mode
indicate?
In what mode does “Router(config-if)#” Interface configuration mode
indicate?
What are the two primary modes of User EXEC-used to monitor & view limited
operation? information
Privileged EXEC-the administration mode; allows
you to enter global config mode.
What commands are used to change the The enable and disable commands
CLI between the user EXEC mode and
the privileged EXEC mode?
What is the syntax for entering the enable Router>enable
command?
Once the command from the previous It changes to: Router#
question is entered, how does the router
prompt change?
11.1.4 Each IOS command has specific format The command followed by any appropriate
or syntax and is executed at the keywords and arguments
appropriate prompt. The general syntax
for a command is what? Give an example. show startup-config
How do you submit a command? Press the <Enter> key
What are the IOS command conventions? • Boldface text - indicates commands &
keywords that are entered literally as shown
• Italics - indicates arguments where the user
supplies the values
• [ ] - Sq. brackets enclose an option element
• | - A vertical line indicates a choice within an
CCNA Explorer 1 Chapter 11 rev. March 2008
opt’l or required set of keywords or
arguments
• [ x | y] - Sq. brackets enclosing keyword or
arguments separated by a vertical line
indicate an optional choice
• {x | y} Braces enclosing keywords or
augments separated by a vertical line indicate
a required choice.
11.1.5 The IOS has several forms of help Context-sensitive help- provides a list of commands
available. What are they? and the arguments associated with those commands
within the context of the current mode. To access
context-sensitive help, enter a question mark, ?, at
any prompt.
Command Syntax Check- if the interpreter cannot
understand the command being entered; it will
provide feedback describing what is wrong with the
command.
Hot Keys and Shortcuts- make configuring,
monitoring, and troubleshooting easier.
What are the 3 different types of error • Ambiguous command-not enough characters
messages given by the command syntax entered for the command interpreter to
check? recognize the command
• Incomplete command-indicates that required
keywords or arguments were left off the end
of the command
• Incorrect command-returns a ^ to indicate
where the command interpreter cannot
decipher the command
What are some of the most commonly Tab - Completes the remainder of the command or
used hot keys & shortcuts? keyword
Ctrl-R - Redisplays a line
Ctrl-Z - Exits configuration mode and returns to the
EXEC
Down Arrow - Allows user to scroll forward through
former commands
Up Arrow - Allows user to scroll backward through
former commands
Ctrl-Shift-6 - Allows the user to interrupt an IOS
process such as ping or traceroute
Ctrl-C - Aborts the current command and exits the
configuration mode
11.1.6 In order to verify and troubleshoot The show command
network operation, we must examine the
operation of the devices. What is the
basic examination command?
What are some of the more commonly • show arp - Displays the ARP table of the
used show commands; include their device.
output • show mac-address-table - (switch only)
Displays the MAC table of a switch.
• show startup-config - Displays the saved
configuration located in NVRAM.
• show running-config - Displays the contents
of the currently running configuration file or
the configuration for a specific interface, or

CCNA Explorer 1 Chapter 11 rev. March 2008


map class information.
• show ip interfaces - Displays IPv4 statistics
for all interfaces on a router. To view the
statistics for a specific interface, enter the
show ip interfaces command followed by the
specific interface slot/port number. Another
important format of this command is show ip
interface brief. This is useful to get a quick
summary of the interfaces and their
operational state.
11.1.7 What is the primary configuration mode, The primary configuration mode is called global
and what type of changes are made configuration or global config. From global config,
here? CLI configuration changes are made that affect the
operation of the device as a whole.
What CLI command is used to take the Router#configure terminal
device from privileged EXEC mode to the
global configuration mode and to allow
entry of configuration commands from a
terminal? Show the proper syntax.
What are a few of the different • Interface mode - to configure one of the
configuration modes that can be reached network interfaces (Fa0/0, S0/0/0,..)
from global config mode? • Line mode - to configure one of the lines
(physical or virtual) (console, AUX, VTY,..)
• Router mode - to configure the parameters
for one of the routing protocols
Do the changes made in these individual No, as configuration changes are made within an
config modes affect the entire device? interface or process, the changes only affect that
interface or process.
How do you exit a specific configuration Enter exit at a prompt
mode and return to global configuration
mode?
How do you leave configuration mode Enter end or use the key sequence Ctrl-Z.
completely and return to privileged EXEC
mode?
How do you keep your changes from Once a change has been made from the global
being lost due to a power failure or mode, it is good practice to save it to the startup
deliberate restart? What is the proper configuration file stored in NVRAM.
command syntax to do this? Router#copy running-config startup-config
11.2.1 What is the factory-assigned default Router, Switch
hostname for a router and a switch
respectively?
Why is it important to give each device a If an internetwork had several routers that were all
specific name? named with the default name "Router." This would
create considerable confusion during network
configuration and maintenance. When accessing a
remote device using Telnet or SSH, it is important to
have confirmation that an attachment has been
made to the proper device. If all devices were left
with their default names, we could not identify that
the proper device is connected.
What are some guidelines for naming Start with a letter
conventions? Not contain a space
End with a letter or digit
Have characters of only letters, digits, and dashes
Be 63 characters or fewer
CCNA Explorer 1 Chapter 11 rev. March 2008
What are the commands needed to From the privileged EXEC mode, access the global
assign the hostname of AtlantaHQ to a configuration mode by entering the configure
router? terminal command:

Router#configure terminal

After the command is executed, the prompt will


change to:

Router(config)#

In the global mode, enter the hostname:

Router(config)#hostname AtlantaHQ

After the command is executed, the prompt will


change to:

AtlantaHQ(config)#

Notice that the hostname appears in the prompt. To


exit global mode, use the exit command.
How do you negate the effects of a Preface the command with the no keyword.
command? Remove the hostname from
the previous question. AtlantaHQ(config)# no hostname
Router(config)#
11.2.2 For security, what should every device A locally configured passwords to limit access.
have?
What are the most common device • Console password - limits device access
passwords? using the console connection
• Enable password - limits access to the
privileged EXEC mode
• Enable secret password - encrypted, limits
access to the privileged EXEC mode
• VTY password - limits device access using
Telnet
What is a good practice regarding You should use different authentication passwords
passwords? for each of these levels of access.
What key points should be considered • Use passwords that are more than 8
when choosing passwords? characters in length.
• Use a combination of upper and lowercase
and/or numeric sequences in passwords.
• Avoid using the same password for all
devices.
• Avoid using common words such as
password or administrator, because these are
easily guessed.
What are the commands needed to Switch(config)#line console 0
assign a console password to a switch? Switch(config-line)#password password
Is this different in a router? Switch(config-line)#login

No.
What can you use to add additional Use the enable password command or the enable
security to your device? secret command. Either of these commands can be
used to establish authentication before accessing
CCNA Explorer 1 Chapter 11 rev. March 2008
privileged EXEC (enable) mode.
Why should you use one over the other? Always use the enable secret command, not the
older enable password command, if possible. The
enable secret command provides greater security
because the password is encrypted. The enable
password command can be used only if enable
secret has not yet been set.
The enable password command would be used if the
device uses an older copy of the Cisco IOS software
that does not recognize the enable secret command.
What are the commands to set these Router(config)#enable password password
passwords? Router(config)#enable secret password
What can happen if neither of these The IOS prevents privileged EXEC access from a
passwords is set? Telnet session.
What are vty lines? By default how many They allow access to a router via Telnet. By default,
are there? many Cisco devices support five VTY lines that are
numbered 0 to 4.
What are the commands to set the vty line Router(config)#line vty 0 4
passwords? Router(config-line)#password password
Router(config-line)#login
How can a non-encrypted password be The service password-encryption command prevents
encrypted? passwords from showing up as plain text when
viewing the configuration files.
How can you provide a method for Add a banner to the device output.
declaring that only authorized personnel
should attempt to gain entry into the
device?
The IOS provides multiple types of Switch(config)#banner motd # message #
banners. One common banner is the
message of the day (MOTD). It is often
used for legal notification because it is
displayed to all connected terminals.
What are the commands to configure this
type of banner?
11.2.3 What is the purpose of the reload It reloads the startup configuration.
command?
Where can back-ups of configuration files On a Trivial File Transfer Protocol (TFTP) server, a
be stored? CD, a USB memory stick, or a floppy disk stored in a
safe place. A configuration file should also be
included in the network documentation.
What are the steps to saving a 1.Enter the copy running-config tftp command.
configuration file to a TFTP server?
2. Enter the IP address of the host where the
configuration file will be stored.

3. Enter the name to assign to the configuration file.

4. Answer yes to confirm each choice.


If undesired changes are saved to the The startup configuration is removed by using the
startup configuration, it may be necessary erase startup-config command.
to clear all the configurations. This
requires erasing the startup configuration To erase the startup configuration file use erase
and restarting the device. How? NVRAM:startup-config or erase startup-config at the
privileged EXEC mode prompt:

CCNA Explorer 1 Chapter 11 rev. March 2008


Router#erase startup-config

Once the command is issued, the router will prompt


you for confirmation:

Erasing the nvram filesystem will remove all


configuration files! Continue? [confirm]

Confirm is the default response. To confirm and


erase the startup configuration file, press the Enter
key. Pressing any other key will abort the process.
How can config files be saved to a text With Text Capture such as HyperTerminal.
document? When using HyperTerminal, follow these steps:
1. On the Transfer menu, click Capture Text.
2. Choose the location.
3. Click Start to begin capturing text.
4. Once capture has been started, execute the show
running-config or show startup-config command at
the privileged EXEC prompt. Text displayed in the
terminal window will be placed into the chosen file.
5. View the output to verify that it was not corrupted.
How can you restore a config file to a The file will require editing to ensure that encrypted
device from a text capture? passwords are in plain text and that non-command
text such as "--More--" and IOS messages are
removed. The device must be set at the global
configuration.

When using HyperTerminal, the steps are:


1. Locate the file to be copied into the device and
open the text document.
2. Copy all of the text.
3. On the Edit menu, click paste to host.
11.2.4 What are the steps & commands needed To configure an Ethernet interface follow these
to configure a router’s Ethernet ports? steps:
1. Enter global configuration mode.
2. Enter interface configuration mode.
3. Specify the interface address and subnet mask.
4. Enable the interface.
Router(config)#interface FastEthernet 0/0
Router(config-if)#ip address ip_address netmask
Router(config-if)#no shutdown
Why is the no shutdown command By default, interfaces are disabled. Without this
needed? command, no traffic can come in or out of the
interface.
What are the steps & commands needed To configure a serial interface follow these steps:
to configure a router’s serial ports? 1. Enter global configuration mode.
2. Enter interface mode.
3. Specify the interface address and subnet mask.
4. Set the clock rate if a DCE cable is connected.
Skip this step if a DTE cable is connected.
5. Turn on the interface.
Router(config)#interface Serial 0/0/0
Router(config-if)#ip address ip_address netmask
Router(config-if)#clock rate 56000-if this is the DCE end
Router(config-if)#no shutdown
CCNA Explorer 1 Chapter 11 rev. March 2008
What is the reason for adding a A description indicates the purpose of the interface.
description to an interface? A description of what an interface does or where it is
connected should be part of the configuration of
each interface. This description can be useful for
troubleshooting.
What are the commands to add a Yes they are the same. Example:
description to an interface? Are the HQ-switch1#configure terminal
commands the same in a router as in a HQ-switch1(config)#interface fa0/0
switch HQ-switch1(config-if)#description Connects to main
switch in Building A
Do switch interfaces require IP A LAN switch is an intermediary device that
addresses? Why or why not? interconnects segments within a network. Therefore,
the physical interfaces on the switch do not have IP
addresses. A physical interface on a switch connects
devices within a network.
When would an IP address be assigned? In order to be able to manage a switch, we assign
addresses to the device to it. With an IP address
assigned to the switch, it acts like a host device. The
address for a switch is assigned to a virtual interface
represented as a Virtual LAN interface (VLAN).
What is the default state for switch Switch interfaces are also enabled by default.
interfaces? However, VLAN interfaces must be enabled with the
no shutdown command
What are the commands to configure a Switch(config)#interface vlan 1
VLAN interface? Switch(config-if)# ip address ipaddress subnet mask
Switch(config-if)#no shutdown
Switch(config-if)#exit
Switch(config)#ip default-gateway ipaddress
11.3.1 What is the purpose of the ping Using the ping command is an effective way to test
command? connectivity. The test is often referred to as testing
the protocol stack, because the ping command
moves from Layer 3 of the OSI model to Layer 2 and
then Layer 1.
What protocol does ping use? The ICMP protocol to check for connectivity.
What are the most common Ping • ! - Indicates receipt of an ICMP echo reply-
indicators? ping completed successfully and verifies
Layer 3 connectivity.
• . - indicates a timed out while waiting for a
reply- may indicate connectivity problem
occurred somewhere along the path. May
indicate a router along the path did not have
a route to the destination and did not send an
ICMP destination unreachable message.
May indicate that ping was blocked by device
security.
• U - An ICMP unreachable message was
received- indicates that a router along the
path did not have a route to the destination
address and responded with an ICMP
unreachable message.
What does pinging the loopback test? It is used to verify the internal IP configuration on the
What is the command? local host.
C:\>ping 127.0.0.1
What is the size of the test packets sent 32 bytes
by the ping command?
CCNA Explorer 1 Chapter 11 rev. March 2008
What is the TTL? Time to Live in milliseconds
11.3.2 What is the difference between the show The show ip interface brief command provides a
ip interfaces & the show ip interface more abbreviated output than the show ip interface
brief commands? command. This provides a summary of the key
information for all the interfaces.
In looking at the output from the show ip The up in the Status column shows that this interface
int bri command (abbreviated) what does is operational at Layer 1. The up in the Protocol
the output of up & up under the Status & column indicates that the Layer 2 protocol is
Protocols columns indicate? operational.
What are the possible outcomes for these Status Protocol
2 columns? Up Up
Up Down
Down Down
Why is the outcome for Status/Protocol Because if the physical layer is down, all other layers
never going to be Down/Up are going to be down.
How do you verify that the NIC address is By testing the interface assignment.
bound to the IPv4 address and that the Ping the IP address assigned to the NIC
NIC is ready to transmit signals across
the media? C:\ping ipaddress
If the test in the previous question fails, If this test fails, it is likely that there are issues with
what is a possible reason? the NIC hardware and software driver that may
require reinstallation of either or both.
11.3.3 How can you verify that both the local This test is conducted by pinging each host one by
host (the router in this case) and the one on the LAN.
remote host are configured correctly?
What are the “extended” ping commands This mode is entered by typing ping in privileged
& how do you enter this command? EXEC mode, at the CLI prompt without a destination
IP address. A series of prompts are then presented.
Router#ping
Protocol [ip]:
Target IP address:10.0.0.1
Repeat count [5]:
Datagram size [100]:
Timeout in seconds [2]:5
Extended commands [n]: n
11.3.4 How do you verify that a local host can Ping the ip address of the local gateway
connect with a gateway address> C:\ping ipaddress
What is the gateway? The gateway is the host's entry and exit to the wider
network. It is usually the address of the Ethernet
interface of the router to which the host is connected
either directly or indirectly through a switch.
What command shows you the next hop The show ip route command.
in a destination’s route? This shows you the routing table.
How do you test the connectivity of the Ping the ip address of the next hop router as
next hop? indicated from the output of the routing table.
How do you test connectivity to a remote Ping the ip address of the remote host.
host?
11.3.5 What is the purpose of a trace, and what A trace returns a list of hops as a packet is routed
commands are used? through a network. The form of the command
depends on where the command is issued. When
performing the trace from a Windows computer, use
tracert. When performing the trace from a router
CLI, use traceroute.
What is shown in the output of a trace that *** are shown to indicate Trace requests to the next
indicates a failure along the path? hop timed out, meaning that the next hop did not
CCNA Explorer 1 Chapter 11 rev. March 2008
respond.
What are the steps in a testing sequence Test 1: Local Loopback-testing the stack
assuming that one test is successful and Test 2: Local NIC-testing the interface assignment
the testing should continue? Test 3: Ping Local Gateway-testing local network
Test 4: Ping Remote Host-testing gateway & remote
connectivity
Test 5: Traceroute-testing each hop in the path

11.4.1 What is one of the most effective tools for Establish a network baseline.
monitoring and troubleshooting network
performance?
What is network baseline? A process that involves monitoring network
performance & behavior over a certain period of time
allowing for a point of reference when wanting to
monitor performance in the future.
What is one method for starting a To copy and paste the results from an executed
baseline? ping, trace, or other relevant command into a text
file. These text files can be time stamped with the
date and saved into an archive for later retrieval.
What are the steps to capture output When using HyperTerminal for access, the steps
using HyperTerminal? are:
1. On the Transfer menu, click Capture Text.
2. Choose Browse to locate or type the name of the
saving the file.
3. Click Start to begin capturing text
4. Execute the ping command in the user EXEC
mode or at the privileged EXEC prompt. The router
will place the text displayed on the terminal in the
location chosen.
5. View the output to verify that it was not corrupted.
6. On the Transfer menu, click Capture Text, and
then click Stop Capture.
These steps are the same for other output captures
including traceroute.
11.4.3 How do you execute an ARP request from To execute an ARP command, at the command
a host? prompt of a host, enter:
C:\host1>arp -a
What type of info can be found in the ARP The IPv4 address, physical address, and the type of
cache? addressing (static/dynamic), for each device. The
ARP cache is only populated with information from
devices that have been recently accessed.
How can this cache be cleared? It can be cleared by using the arp -d command.
How can you ensure that the ARP cache Ping a device so that it will have an entry in the ARP
is populated? table.
What is a ping sweep? It is a scanning method for collecting MAC addresses
that can be executed at the command line or by
using network administration tools.
How can you determine a mapping of how Using a command line from a switch, enter the show
hosts are connected to a switch? command with the mac-address-table argument:

Sw1-2950#show mac-address-table
What might be an indicator that a switch Several MAC addresses representing multiple nodes
port is on a shared segment or is assigned to a single port.
connected to another switch?

CCNA Explorer 1 Chapter 11 rev. March 2008

S-ar putea să vă placă și