Documente Academic
Documente Profesional
Documente Cultură
CCNA1 Exploration
Study Guides
SEMESTER 1 CHAPTER 2
Communicating over the Network
V 4.0
2.0.1 What are the five aspects of Devices that make up the network
the information network we Media that connect the devices
will focus on in this course? Messages that are carried across the network
Rules and processes that govern network
communications
Tools and commands for constructing and
maintaining networks
2.1.1 What are the three Sender, Receiver, Chanell
elements of
communication?
What is the definition of the data or information networks capable of
term network for this carrying many different types of
course? communications, including traditional computer
data, interactive voice, video, and
entertainment products.
2.1.2 What would happen to the no other device would be able to send or
network if a message was receive messages on the same network while
sent as one massive this data transfer was in progress
continuous stream of bits?
Define segmentation of division of the data stream into smaller pieces
messages
What are the 2 advantages many different conversations can be
of segmentation? interleaved on the network
segmentation can increase the reliability of
network communications
What is multiplexing? process used to interleave the pieces of
separate conversations together on the
network
2.1.3 What is hardware on a the visible components of the network platform
network?
2.1.4 What are end devices on a Computers (work stations, laptops, file servers,
network? web servers)
Network printers
VoIP phones
Security cameras
Mobile handheld devices (such as wireless
barcode scanners, PDAs)
What is the definition of a either the source or destination of a message
host? transmitted over the network
What is the definition of a hosts that have software installed that enables
server? them to provide information and services
What is the definition of a hosts that have software installed that enables
client? them to request and display the information
obtained from the server
2.1.5 List examples of Network Access Devices (Hubs, switches, and
intermediary devices. wireless access points)
Internetworking Devices (routers)
Communication Servers and Modems
Security Devices (firewalls)
List examples of process Regenerate and retransmit data signals
that intermediary devices Maintain information about what pathways
perform. exist through the network and internetwork
Notify other devices of errors and
communication failures
Direct data along alternate pathways when
there is a link failure
Classify and direct messages according to
QoS priorities
Permit or deny the flow of data, based on
security settings
2.1.6 What are the 3 primary Metallic wires within cables
types of media used in Glass or plastic fibers (fiber optic cable)
modern networks? Wireless transmission
What criteria should be The distance the media can successfully carry
used to select network a signal.
media? The environment in which the media is to be
installed.
The amount of data and the speed at which it
must be transmitted.
The cost of the media and installation
2.2.1 What are the ways in which The size of the area covered
network infrastructure can The number of users connected
vary? The number and types of services available
What is the definition of a individual network usually spans a single
LAN? geographical area, providing services and
applications to people within a common
organizational structure
2.2.2 What is the definition of a networks that connect LANs in geographically
WAN? separated locations
2.2.3 What is an internetwork? A global mesh of interconnected networks
(internetworks) meets these human
communication needs.
What is an intranetwork? a private connection of LANs and WANs that
belongs to an organization, and is designed to
be accessible only by the organization's
members, employees, or others with
authorization
2.2.4.1 Define a NIC provides the physical connection to the
network at the PC or other host device.
Define a physical port A connector or outlet on a networking device
where the media is connected to a host or
other networking device.
Define an interface Specialized ports on an internetworking device
that connect to individual networks.
2.3.1 What are the 3 layers of Content Layer, Rules Layer, Physical Layer
protocols described?
2.3.2 What process do The format or structure of the message
networking layer protocol The process by which networking devices
suites describe? share information about pathways with other
networks
How and when error and system messages
are passed between devices
The setup and termination of data transfer
sessions
What is proprietary? one company or vendor controls the definition
of the protocol and how it functions
2.3.3 What does the use of products from different manufacturers can
standards and protocols work together for efficient communications
provide?
2.3.4 What is an application defines the content and formatting of the
protocol? requests and responses exchanged between
the client and server
What is a Transport manages the individual conversations between
Protocol? web servers and web clients
What is the Internetwork responsible for taking the formatted segments
Protocol from TCP, encapsulating them into packets,
assigning the appropriate addresses, and
selecting the best path to the destination host.
What is the Network Access Network access protocols describe two
Protocol? primary functions, data link management and
the physical transmission of data on the media.
2.3.5 What do networking the functions that occur during network
protocols describe? communications
2.4.1 What are the benefits of Assists in protocol design, because protocols
using a layered model to that operate at a specific layer have defined
describe networking? information that they act upon and a defined
interface to the layers above and below.
Fosters competition because products from
different vendors can work together.
Prevents technology or capability changes in
one layer from affecting other layers above
and below.
Provides a common language to describe
networking functions and capabilities.
2.4.2 What are the two basic protocol models and reference models
types of networking
models?
What are the two primary TCP/IP and OSI
models used when
describing networking?
2.4.3 What is done at the Represents the data to the user plus encoding
Application Layer? and dialog control
What is done at the Supports communication between diverse
Transport Layer? devices across diverse neworks
What is done at the Internet Determines the best path through the network
Layer?
What is done at the Network Controls the hardware devices and media that
Access Layer? make up the network
2.4.4 What are the seven steps in 1. Creation of data at the application layer of
a complete communication the originating source end device
process?
2. Segmentation and encapsulation of data as
it passes down the protocol stack in the source
end device
3.1.1.1 What does the application the interface between the applications we use
layer provide? to communicate and the underlying network
over which our messages are transmitted
What are application layer to exchange data between programs running
protocols used for? on the source and destination hosts
3.1.1.2 What are the three primary Coding and conversion of Application layer
functions of the data to ensure that data from the source
Presentation Layer? device can be interpreted by the appropriate
application on the destination device.
Compression of the data in a manner that can
be decompressed by the destination device.
Encryption of the data for transmission and the
decryption of data upon receipt by the
destination.
What is the main function of create and maintain dialogs between source
the session layer? and destination applications
3.1.1.3 What do the Application the format and control information necessary
Layer protocols of the for many of the common Internet
TCP/IP protocol specify? communication functions
3.1.2 What are the two forms of applications and services
software programs or
process that provide
network access in the
Application Layer
3.1.3 What do protocols provide? the rules and formats that govern how data is
treated
What is the difference Applications interact with the user and services
between an application and prepare data for the network
a service?
What do application layer Protocols provide the rules and formats that
protocols do? govern how data is treated.
3.1.4 What 6 things do protocols 1. processes on either end of the
define? communication
2. types of messages
3. syntax of messages
4. meaning of any informational fields
5. how messages are sent and the
expected response
6. interaction with the nextlower layer
3.2.1 What is the difference the device requesting the information is called
between a client and a a client and the device responding to the
server? request is called a server
3.2.2 In general networking sense any device that responds to requests from
what is a server? client applications is functioning as a server
Describe the 2 processes a "listening" for a request from a client, because
daemon uses (listening and they are programmed to respond whenever the
hears)? server receives a request for the service
provided by the daemon
"hears" a request from a client, it exchanges
appropriate messages with the client, as
required by its protocol, and proceeds to send
the requested data to the client in the proper
format
3.2.3.2 Complete the packet tracer
lab examine a number of
packets to see what each
packet contains.
3.2.4 What is a peer-to-peer two or more computers are connected via a
network? network and can share resources (such as
printers and files) without having a dedicated
server
Are peer-to-peer networks No
easy to secure?
3.2.4.2 What are peer-to-peer allows a device to act as both a client and a
applications? server within the same communication
3.3.1 What do port numbers applications and Application layer services that
identify? are the source and destination of data
What does the DNS defines an automated service that matches
protocol do? resource names with the required numeric
network address.
3.3.1.2 What does the nslookup allows the user to manually query the name
utility allow you to do? servers to resolve a given host name
What does the command Displays all of the cached DNS entries on a
ipconfig /displaydns show? Windows XP or 2000 computer system
3.3.1.3 What happens if a DNS It passes the request on to another DNS
server does not have a server
name in its stored records?
If the same request is made In its cache
again where does the DNS
server look?
3.3.1.4 When is a server declared When the resource is directly held on that
to be an authoritative server
server?
3.3.2.1 Define the three parts of a http:- protocol
url as listed on the page? www.cisco.com- name of server
web-server.htm- name of file or page
What type of request is sent GET
to the server when
retrieving a web page?
3.3.2.2 What does the POST Sends information to the web server
command do?
What does the PUT Sends resources or content to the web server
command do?
What protocol is used for HTTPS:
secure transmission across
the web?
3.3.3 What 2 Application Layer POP (Post Office Protocol) and SMTP (Simple
protocols are used in Mail Transfer Protocol)
sending and receiving
email?
What is another name for MUA Mail User Agent
an email application?
3.3.3.2 What are the two processes MTA Mail Transfer Agent
that email servers perform? MDA Mail Delivery Agent
3.3.3.3 What happens to emails in Converted to a proprietary protocol for mail
many companies once the delivery
email reaches the internal
server?
3.3.3.4 List and describe some of HELO - identifies the SMTP client process to
the commands used by the the SMTP server process
SMTP protocol. EHLO - Is a newer version of HELO, which
includes services extensions
MAIL FROM - Identifies the sender
RCPT TO - Identifies the recipient
DATA - Identifies the body of the message
3.3.4 What is File Transfer developed to allow for file transfers between a
Protocol (FTP)? client and a server
What are the 2 ports used 21- Used for control
and their purpose in FTP? 20- Used for actual file transfer
3.3.5 What does Dynamic Host allows a host to obtain an IP address
Confirmation Protocol dynamically when it connects to the network
(DHCP) do for a network?
3.3.5.2 What are the 4 types of DHCP Discover
messages sent and DHCP Offer
received in DHCP? DHCP Request
DHCP Acknowledge
3.3.6 What is SMB (Server the structure of shared network resources,
Message Block)? such as directories, files, printers, and serial
ports
3.3.6.2 What are the 3 message Start, authenticate, and terminate sessions
types of SMB messages? Control file and printer access
Allow an application to send or receive
messages to or from another device
3.3.8 What does the Telenet provides a standard method of emulating text-
application provide? based terminal devices over the data network.
3.3.8.2 What protocol is SSH Secure Shell protocol
recommended alternative to
Telnet when security is a
concern?
3.5.1.2 This is a self scored quiz
that will help prepare for the
test
3.6.1 Quiz that also prepares you
for the test.
SEMESTER 1 Chapter 4
OSI Transport Layer
V 4.0
5.1.1.1 What services does the services to exchange the individual pieces of
network layer provide? data over the network between identified end
devices.
What are the 4 basic Addressing
processes used at the Encapsulation
network layer? Routing
Decapsulation
What is the PDU of the Packet
network layer?
What information is Source and Destination IP address
contained in the layer 3
PDU?
What is the role of a router? to select paths for and direct packets toward
their destination. This process is known as
routing
What is it called when a Hop
packet passed through an
intermediary device?
What happens to the It stays the same
transport layer PDU as the
packet moves through the
network?
What does the network the packet structure and processing used to
layer protocol specify? carry the data from one host to another host
5.1.1.2 List the 5 Network layer Internet Protocol version 4 (IPv4)
protocols. Internet Protocol version 6 (IPv6)
Novell Internetwork Packet Exchange (IPX)
AppleTalk
Connectionless Network Service
(CLNS/DECNet)
Which protocol will be the IP
focus of this class?
5.1.2.1 What are the basic Connectionless - No connection is established
characteristics of IPv4? before sending data packets.
Best Effort (unreliable) - No overhead is used
to guarantee packet delivery.
Media Independent - Operates independently
of the medium carrying the data.
5.1.3 Describe what a requires no initial exchange of control
connectionless service in information to establish an end-to-end
networking means? connection before packets are forwarded, nor
does it require additional fields in the PDU
header to maintain this connection
What is the main issue that Connectionless packet delivery may, however,
may occur in a result in packets arriving at the destination out
connectionless exchange? of sequence. If out-of-order or missing packets
create problems for the application using the
data, then upper layer services will have to
resolve these issues.
5.1.4 What does unreliable mean Unreliable means simply that IP does not have
in networking? the capability to manage, and recover from,
undelivered or corrupt packets.
Which layer is responsible Transport Layer
for adding reliability to
packet delivery?
5.1.5 Describe media IPv4 and IPv6 operate independently of the
independent. media that carry the data at lower layers of the
protocol stack.
What layer is responsible Physical Layer
for preparing a packet for
the media?
What is the one Maximum Transmission Unit MTU
characteristic of the network
layer that is dependent on
the media?
5.1.6 What portion of the IP Header
packet does a router use to
make forwarding decisions?
What remains untouched as In all cases, the data portion of the packet -
packets travel through the that is, the encapsulated Transport layer PDU -
network? remains unchanged during the Network layer
processes.
5.1.7.1 What are the 6 key fields in IP Source Address
an IP packet? IP Destination Address
Time-to-Live (TTL)
Type-of-Service (ToS)
Protocol
Fragment Offset
What happens to a packet if It is discarded
the TTL field reaches 0?
5.1.7.2 What is the checksum field To determine if the header has reached the
used for? destination intact.
5.2.1 What are three methods of Geographic location
determining how to divide Purpose
your network? Ownership
5.2.1.2 Why would you group users To improve manageability and network
geographically? performance.
Why would you group users To improve performance based on network
by task? requirements of each task.
Why would you group To maintain control and limit access.
networks by ownership?
5.2.2 What are the 3 main issues Performance degradation
as networks grow larger? Security issues
Address Management
What is a network A broadcast is a message sent from one host
broadcast? to all other hosts on the network.
What is broadcast domain? The network area in which all hosts receive
broadcasts
Is it good or bad to increase Good
the number of broadcast
domains in your network?
5.2.3 What is the major access to and from resources outside each
advantage of dividing network can be prohibited, allowed, or
networks by ownership? monitored
5.2.4 What efficiency does hosts who need to communicate are grouped
dividing large networks into together reduces the unnecessary overhead of
separate networks provide all hosts needing to know all addresses.
to the hosts?
What is the device called Gateway
that hosts send information
to that must travel outside
their network?
5.2.5 What is hierarchical A hierarchical address uniquely identifies each
addressing? host. It also has levels that assist in forwarding
packets across internetworks, which enables a
network to be divided based on those levels.
What is the example Zip codes and house addresses
presented that describes
hierarchical addressing in
our daily lives?
5.2.5 How many bits are in an 32
IPv4 address?
How is the ip address IPv4 addresses are divided in four groups of
divided? eight bits (octets)
What portion of the IP Network
address does a router use?
5.3.1 What is the actual address The router interface IP address at the edge of
used for a default gateway? the network.
What is the route that the Next-hop address
router forwards a packet to
called?
5.3.2 What decisions do routers Is the network directly connected or not. Yes
make as a packet enters an forward to that network. No forward to the
interface? next-hop router.
5.3.3 How is the default gateway On a Windows computer, the Internet Protocol
configured on a host (TCP/IP) Properties tools are used to enter the
running windows? default gateway IPv4 address
What portion of the IP Network and Subnetwork
address must be the same
for the host and gateway?
5.3.3.2 What command is issued at ipconfig
the command prompt of
windows to see the default
gateway setting?
5.3.3.3 What is it called when a Routing
router makes forwarding
decisions?
What is the map called that Routing Table
a router uses to make
forwarding decisions (Hint:
look at the figure)?
5.3.4 What does a routing table The routing table stores information about
contain? connected and remote networks.
What are the 3 main Destination network
features of routes in a Next-hop
routing table? Metric
What happens if the packet The packet is dropped
does not have an address
contained in the routing
table?
What is a default route used The default route is used when the destination
for? network is not represented by any other route
in the routing table.
5.3.4.2 What is the command to Netstat
view the routing table for a
host?
What is the destination 0.0.0.0 0.0.0.0
network IP address and
subnet mask for the default
network interface?
What three commands are route ADD
listed that allow you to route DELETE
change the routing table? route CHANGE
5.3.5 What does the address in represents a range of host addresses and
the routing table represent? sometimes a range of network and host
addresses
If more than one route The route that is most specific for that IP
exists in the routing table for address
an address, which one will
be selected?
5.3.5.2 When is the default route When the IP address does not match any
used? other entry in the routing table
5.3.6 What is the next-hop? the address of the device that will process the
packet next
Why does a directly There are no intermediary devices and the
connected device not have packet is directly forwarded
a next-hop?
5.3.7.1 What are the three Forward it to the next-hop router
decisions a router can make Forward it to the destination host
about a packet? Drop it
Which layer does a router 3
process packets at?
What layer is the packet Data Link Layer 2
encapsulated at before it
leaves the router?
5.3.7.2 What is another name for a Gateway of last resort
default gateway?
Why would a packet take a Rotuers may learn a new path between
different route than another packets
packet that is part of the
same data stream?
Why are default routes so because the gateway router is not likely to
important to routers? have a route to every possible network on the
Internet.
5.3.7.3 What happens if a router The packet is dropped
has not route for the packet
and does not have a default
route?
Why doesn’t IP have error It would reduce efficiency and add overhead
notification?
5.4.1 What does a router need to Next-hop
forward a packet?
What happens if routing that packets may not be forwarded to the most
table are not up to date? appropriate next-hop, causing delays or packet
loss
What are two ways a router route information can be manually configured
can learn about routes? on the router or learned dynamically from other
routers in the same internetwork
5.4.2 What is a static route? A manually configured route
What must be done if the Static routes must be reconfigured
internetwork changes?
5.4.3 What is the definition of a set of rules by which routers dynamically share
dynamic routing protocol? their routing information
What happens when a It updates its’ routing table
router receives information
about changes in routes?
What are 3 common routing Routing Information Protocol (RIP)
protocols? Enhanced Interior Gateway Protocol (EIGRP)
Open Shortest Path First (OSPF)
What are the 2 costs listed Overhead that consumes network bandwidth
with using a dynamic Processing capacity necessary
protocol?
What advantages are listed No network overhead produced
for static routing? No processing capacity used
Administrative distance is configured to ensure
efficient and effective routing
SEMESTER 1 Chapter 6
Addressing the Network IPv4
V 4.0
7.1.1 What are the 2 basic Allows the upper layers to access the media
services the Data Link layer using techniques such as framing
provides? Controls how data is placed onto the media
and is received from the media using
techniques such as media access control and
error detection
List and define the 4 Frame - The Data Link layer PDU
specific terms associated Node - The Layer 2 notation for network
with the Data Link layer? devices connected to a common medium
Media/medium (physical)* - The physical
means for the transfer of information between
two nodes
Network (physical)** - Two or more nodes
connected to a common medium
7.1.1.2 What happens the frame as It changes based on the medium used
moves from source to
destination?
7.1.2 Define Media Access The technique used for getting the frame on
Control. and off media
7.1.3 What can the control Which nodes are in communication with each
information tell you? other
When communication between individual
nodes begins and when it ends
Which errors occurred while the nodes
communicated
Which nodes will communicate next
List and define the three Data - The packet from the Network layer
elements of a Data Link Header - Contains control information, such
Layer Frame. addressing, and is located at the beginning of
the PDU
Trailer - Contains control information added to
the end of the PDU
7.1.3.2 List and define the 5 typical Start and stop indicator fields - The beginning
field types. and end limits of the frame
Naming or addressing fields
Type field - The type of PDU contained in the
frame
Quality - control fields
A data field -The frame payload (Network layer
packet)
7.1.4 What is the most common NIC
physical device that is used
for the Data Link Layer?
7.1.4.2 Describe the two sublayers The upper sublayer defines the software
of the Data Link Layer. processes that provide services to the Network
layer protocols.
The lower sublayer defines the media access
processes performed by the hardware.
What are the two functions Frames the network layer packet
of the Logical Link Control? Identifies the network layer protocol
What are the two functions Addresses the frame
of the Media Access Marks the beginning and ending of each frame
Control?
7.1.5 What are the 4 International Organization for Standardization
organizations that define the (ISO)
Data Link standards? Institute of Electrical and Electronics Engineers
(IEEE)
American National Standards Institute (ANSI)
International Telecommunication Union (ITU)
7.2.1 What analogy is made with traffic rules that regulate the entrance of motor
the media access control? vehicles onto a roadway
What does the method that Media sharing - If and how the nodes share
media access control uses the media
depend on? Topology - How the connection between the
nodes appears to the Data Link layer
7.2.2 What are the two basic Controlled - Each node has its own time to use
media access control the medium
methods for shared media? Contention-based - All nodes compete for the
use of the medium
What are two examples of Token Ring
controlled media access? FDDI
What are two examples of Ethernet
contention-based media Wireless
access?
Why can controlled media Device has to wait its turn to access the media
access be inefficient?
What is CSMA? Carrier Sense Multiple access
What is a data collision? When two devices transmit at the same time
What is CSMA/CD? Carrier Sense Multiple access with Collision
Detection
What is CSMA/CA? Carrier Sense Multiple Access with Collision
Avoidance
7.2.3 Define Half-Duplex. devices can both transmit and receive on the
media but cannot do so simultaneously
Define Full-Duplex. Both devices can transmit and receive on the
media at the same time.
7.2.4 Define physical topology. arrangement of the nodes and the physical
connections between them
Define logical topology. the way a network transfers frames from one
node to the next
What logical and physical Point-to-Point
topologies are typically used Multi-Access
in networks? Ring
7.2.5 Define point-to-point connects two nodes directly together
topology.
7.2.5.2 Define virtual circuit. a logical connection created within a network
between two network devices
Which type of topology is logical point-to-point topology
used to determine the
media access control?
7.2.6 Define logical multi-access enables a number of nodes to communicate by
topology. using the same shared media
What are the three types of CSMA/CD, CSMA/CA, or token passing
media access control can
be used in a multi-access
topology?
7.2.7 How does a data flow in a From node to node until it reaches the
ring network? destination.
7.3.1 What are the three basic Header
parts of a data link layer Data
frame? Trailer
7.3.2 What are the typical fields in Start Frame field - Indicates the beginning of
the frame header? the frame
Source and Destination address fields -
Indicates the source and destination nodes on
the media
Priority/Quality of Service field - Indicates a
particular type of communication service for
processing
Type field - Indicates the upper layer service
contained in the frame
Logical connection control field - Used to
establish a logical connection between nodes
Physical link control field - Used to establish
the media link
Flow control field - Used to start and stop
traffic over the media
Congestion control field - Indicates congestion
in the media
7.3.3 Which part the network LAN
(WAN/LAN) is the data link
address used in delivering?
What is the difference Data Link address only defines the machine it
between Data Link Address is not logically assigned
and Logical Address?
Does a point-to-point link No it only has one place to go
need a data link address?
7.3.4 Define error detection. accomplished by placing a logical or
mathematical summary of the bits that
comprise the frame in the trailer
Define Frame Check used to determine if errors occurred in the
Sequence. transmission and reception of the frame
How could the CRC be The error bits could cancel each other out
correct and the frame
contain errors?
Do all protocols support No
using the FCS to determine
errors?
7.3.5 What Layer 2 protocols will Ethernet
we study in this course? Point-to-Point Protocol (PPP)
High-Level Data Link Control (HDLC)
Frame Relay
Asynchronous Transfer Mode (ATM)
Which usually performs at a LAN
higher bandwidth, LAN or
WAN?
7.3.5.2 What do Ethernet standards Layer 2 Protocols and Layer 1 technologies
define?
What is the data link MAC address
address?
How is the data link address 48 bit
expressed? Hexadecimal
7.3.5.3 What type of architecture Layered architecture
does PPP use?
What are options available Authentication, compression, and multilink (the
to use with PPP? use of multiple physical connections).
7.3.5.4 What is the standard used 802.11
for wireless LANs?
What services are authentication, association (connectivity to a
supported by 802.11? wireless device), and privacy (encryption)
7.4.1.2 Examine each of the
processes and take notes.
Develop questions on any
step you do not understand.
SEMESTER 1 Chapter 8
Physical Layer
V 4.0
8.1.1 What does the physical provides the means to transport across the
layer provide? network media the bits that make up a Data
Link layer frame
What are the four elements The physical media and associated connectors
of delivering frames across A representation of bits on the media
the media? Encoding of data and control information
Transmitter and receiver circuitry on the
network devices
8.1.2 What are the three basic Copper cable
forms of media? Fiber
Wireless
What are the three the Physical layer encodes the bits into the
concerns when the physical signals for a particular medium, it must also
layer encodes bits? distinguish where one frame ends and the next
frame begins
8.1.3 What does the physical hardware, developed by engineers, in the form
layer consist of? of electronic circuitry, media, and connectors
What are the organizations The International Organization for
that are responsible for Standardization (ISO)
physical layer standards? The Institute of Electrical and Electronics
Engineers (IEEE)
The American National Standards Institute
(ANSI)
The International Telecommunication Union
(ITU)
The Electronics Industry
Alliance/Telecommunications Industry
Association (EIA/TIA)
National telecommunications authorities such
as the Federal Communication Commission
(FCC) in the USA.
8.1.3.2 The technologies defined by Physical and electrical properties of the media
these organizations include Mechanical properties (materials, dimensions,
what four areas of the pinouts) of the connectors
Physical layer standards? Bit representation by the signals (encoding)
Definition of control information signals
8.1.4 What are the three The physical components
fundamental functions of the Data encoding
Physical layer? Signaling
What are the two values 1 and 0
that the physical layer
encodes?
8.2.1 How are the bits of the One bit at a time
frame transmitted by the
physical layer?
What is a bit time? specific amount of time each signal has to
occupy the media
How are the signaling and Many signaling methods use predictable
receiving ends clocks transitions in the signal to provide
synchronized in the LAN? synchronization between the clocks of the
transmitting and the receiving devices
What characteristics can be Amplitude
changed to represent bits Frequency
on the medium? Phase
What will happen if there is The transmission will fail
no agreement between
nodes on the signaling
method?
8.2.1.2 What are the three Discrete impulses
characteristics of NRZ Only two states
signaling? Voltage jumps between levels
What type of transmission is for slow speed data links
NRZ suited for?
8.2.1.3 What are represented by in voltage transitions
Manchester encoding?
How does the transition one voltage transition must occur in the middle
help maintain clock of each bit time
synchronization?
Which medium uses 10BaseT Ethernet
Manchester encoding?
8.2.2 What method is used to Specific pattern of grouped bits
signal start and end of a
frame in higher speed
technologies?
8.2.2.2 What is a code group? consecutive sequence of code bits that are
interpreted and mapped as data bit patterns
What are the advantages of the error detection capabilities and timing
transmitting symbols? synchronization between transmitting and
receiving devices are enhanced
What are the four Reducing bit level error
advantages of using code Limiting the effective energy transmitted into
groups? the media
Helping to distinguish data bits from control
bits
Better media error detection
What are the three types of Data symbols - Symbols that represent the
code groups? data of the frame as it is passed down to the
Physical layer.
Control symbols - Special codes injected by
the Physical layer used to control transmission.
These include end-of-frame and idle media
symbols.
Invalid symbols - Symbols that have patterns
not allowed on the media. The receipt of an
invalid symbol indicates a frame error.
8.2.2.3 How does 4B/5B represent as five-bit values known as symbols
a nibble?
8.2.3 What are the three Bandwidth
measures for Data Throughput
Transfer? Goodput
8.2.3.2 What is the difference Throughput is the measure of bits over a given
between throughput and time and goodput is the measure of usable
goodput? data transferred over a given period of time
Which measure of data Goodput
transfer is most important to
the end user?
8.3.1 What are the standards for Type of copper cabling used
copper media defined for? Bandwidth of the communication
Type of connectors used
Pinout and color codes of connections to the
media
Maximum distance of the media
8.3.2 What type of connector is RJ-45
commonly used in copper
cabling?
8.3.2.2 What is done to the pairs of Shielding and twisting of the wires
wires to minimize signal
degradation due to
electronic noise?
What are the other methods Selecting the cable type or category most
listed to limit the suited to protect the data signals in a given
susceptibility of copper networking environment
cables to noise? Designing a cable infrastructure to avoid
known and potential sources of interference in
the building structure
Using cabling techniques that include the
proper handling and termination of the cables
8.3.3 What is crosstalk? the interference caused by the magnetic field
around the adjacent pairs of wires in the cable
What is used to limit Twisting pairs of wires
crosstalk?
What changes in the twist The number of twists per meter changes
from one pair of wires to the
next pair of wires to improve
the limitation of crosstalk?
What are some of the Cable types
elements defined by the Cable lengths
TIA/EIA 568A standard? Connectors
Cable termination
Methods of testing cable
Why is it wasteful to install If the decision is later made to adopt a faster
less expensive but lower LAN technology, total replacement of the
rated cabling? installed cable infrastructure may be required.
8.3.3.2 What is UTP cable RJ-45 connectors
terminated with?
What are the three types of Ethernet Straight-through
Ethernet cables? Ethernet Crossover
Rollover
What is a straight-through Host to network device such as a hub or switch
used for?
What is a crossover used Connecting two hosts
for? Connecting to network intermediary devices
What is a rollover used for? Connecting a computers serial port to the
console port of a router (with an adapter)
What happens if you use Communication will not occur
the wrong type of cable
when connecting devices?
8.3.4 What are the other two type 1. Coaxial
of copper cabling? 2. Shielded Twisted-Pair (STP)
What has replaced the use UTP
of coaxial cable in today’s
Ethernet installations?
8.3.6 What type types of Glass or plastic
materials can be used for
fiber optic cabling?
What is the encoding Light pulses
method for fiber optic?
What are the issues with More expensive (usually) than copper media
implementing fiber optic over the same distance (but for a higher
cabling? capacity)
Different skills and equipment required to
terminate and splice the cable infrastructure
More careful handling than copper media
What areas usually Backbone and between buildings
implement fiber optic
cabling?
What are the major optical fiber does not conduct electricity and
advantages of using fiber has low signal loss
optic between buildings?
8.3.6.2 How many cables are 2, they can only operate in one direction
needed for each fiber optic
connection? Why?
8.3.6.3 What are the two types of Single mode and multimode
fiber optic cables?
8.3.7 How do wireless media radio and microwave frequencies that
carry electromagnetic represent the binary digits of data
signals? communications
What is the major concern Security
for wireless signals?
8.3.7.2 What are the 4 standards IEEE 802.11
for wireless networks? IEEE 802.15
IEEE 802.16
Global System for Mobile Communications
(GSM)
8.3.7.3 What are the two network Wireless Access Point (AP) - Concentrates the
devices necessary to wireless signals from users and connects,
implement a wireless usually through a copper cable, to the existing
network? copper-based network infrastructure such as
Ethernet.
Wireless NIC adapters - Provides wireless
communication capability to each network
host.
What are the WLAN IEEE 802.11a, IEEE 802.11b, IEEE 802.11g,
Ethernet standards? IEEE 802.11n
8.3.8 What are some of the CAT5 crimped connections to terminate Cat5 media
termination that may with RJ-45 plugs to make patch cables, and
performed onsite? the use of punched down connections on 110
patch panels and RJ-45 jacks
8.3.8.2 What are the differences in Insulation cut back to far and wires untwisted
the termination of the two too much
cables pictured?
What could happen if wires damaging voltage levels may be applied
are not terminated between interconnected devices
correctly?
8.3.8.3 What are the three main Misalignment - the fiber-optic media are not
splicing errors when using precisely aligned to one another when joined.
fiber optic cabling? End gap - the media do not completely touch
at the splice or connection.
End finish - the media ends are not well
polished or dirt is present at the termination.
SEMESTER 1 Chapter 9
Ethernet
V 4.0
11.1.1 What is the system software in Cisco The Cisco Internetwork Operating System (IOS)
devices?
The Cisco IOS provides devices with what Basic routing and switching functions
network services? Reliable and secure access to networked resources
Network scalability
How is the IOS generally accessed? By using a command line interface (CLI).
Where is the IOS stored? In a semi-permanent memory area called flash.
What type of memory is flash? Flash memory provides non-volatile storage. This
means that the contents of the memory are not lost
when the device loses power.
What are several ways to access the CLI Console
environment? Telnet or SSH
AUX port
Describe the console port. The console port is a management port that provides
out-of-band access to a router. The console port is
accessible even if no networking services have been
configured on the device.
When would the console port be used? • The initial configuration of the network device
• Disaster recovery procedures and
troubleshooting where remote access is not
possible
• Password recovery procedures
By default, the console conveys what? The device startup, debugging, and error messages.
Why type of security precautions be taken The console should be configured with passwords to
to protect the router? prevent unauthorized device access. In the event
that a password is lost, there is a special set of
procedures for bypassing the password and
accessing the device. The device should be located
in a locked room or equipment rack to prevent
physical access.
What are 2 methods for remotely Telnet –A terminal emulation program
accessing the router? Describe them. SSH-establishes a secure channel between a local &
a remote computer. Uses public-key cryptography
for authentication.
What are required for Telnet to work Telnet sessions require active networking services
properly? on the device. The network device must have at
least one active interface configured with a Layer 3
address, such as an IPv4 address. Cisco IOS
devices include a Telnet server process that
launches when the device is started. The IOS also
contains a Telnet client. For security reasons, the
IOS requires that the Telnet session use a password,
as a minimum authentication method.
11.1.2 Network devices depend on what two Operating system-facilitates the basic operation of
types of software for their operation the device's hardware components
Configuration-contain the Cisco IOS software
commands used to customize the functionality of a
Cisco device
CCNA Explorer 1 Chapter 11 rev. March 2008
A Cisco network device contains what two The running configuration file - used during the
configuration files? current operation of the device
The startup configuration file - used as the backup
configuration and is loaded when the device is
started
Where is the startup config file stored? In non-volatile RAM (NVRAM)
Where is the running config located? In RAM
11.1.3 What is a modal operating system? A system where there are different modes of
operation, each having its own domain of operation.
In the CLI what are, in order from top to • User executive mode-ping, show commands,
bottom, the major modes? List some of enable
the available commands for each. • Privileged executive mode-all User EXEC
commands, debug commands, reload,
configure
• Global configuration mode-hostname, enable
secret, ip route, interface
• Other specific configuration modes-these
include interface configuration mode, router
configuration mode
What is a command prompt? The mode is identified by the command-line prompt
that is unique to that mode. The prompt is composed
of the words and symbols on the line to the left of the
entry area.
By default, with what does every prompt The device name
begin?
In what mode does “Router>” indicate? User executive mode
In what mode does “Router#” indicate? Privileged executive mode
In what mode does “Router(config)#” Global configuration mode
indicate?
In what mode does “Router(config-if)#” Interface configuration mode
indicate?
What are the two primary modes of User EXEC-used to monitor & view limited
operation? information
Privileged EXEC-the administration mode; allows
you to enter global config mode.
What commands are used to change the The enable and disable commands
CLI between the user EXEC mode and
the privileged EXEC mode?
What is the syntax for entering the enable Router>enable
command?
Once the command from the previous It changes to: Router#
question is entered, how does the router
prompt change?
11.1.4 Each IOS command has specific format The command followed by any appropriate
or syntax and is executed at the keywords and arguments
appropriate prompt. The general syntax
for a command is what? Give an example. show startup-config
How do you submit a command? Press the <Enter> key
What are the IOS command conventions? • Boldface text - indicates commands &
keywords that are entered literally as shown
• Italics - indicates arguments where the user
supplies the values
• [ ] - Sq. brackets enclose an option element
• | - A vertical line indicates a choice within an
CCNA Explorer 1 Chapter 11 rev. March 2008
opt’l or required set of keywords or
arguments
• [ x | y] - Sq. brackets enclosing keyword or
arguments separated by a vertical line
indicate an optional choice
• {x | y} Braces enclosing keywords or
augments separated by a vertical line indicate
a required choice.
11.1.5 The IOS has several forms of help Context-sensitive help- provides a list of commands
available. What are they? and the arguments associated with those commands
within the context of the current mode. To access
context-sensitive help, enter a question mark, ?, at
any prompt.
Command Syntax Check- if the interpreter cannot
understand the command being entered; it will
provide feedback describing what is wrong with the
command.
Hot Keys and Shortcuts- make configuring,
monitoring, and troubleshooting easier.
What are the 3 different types of error • Ambiguous command-not enough characters
messages given by the command syntax entered for the command interpreter to
check? recognize the command
• Incomplete command-indicates that required
keywords or arguments were left off the end
of the command
• Incorrect command-returns a ^ to indicate
where the command interpreter cannot
decipher the command
What are some of the most commonly Tab - Completes the remainder of the command or
used hot keys & shortcuts? keyword
Ctrl-R - Redisplays a line
Ctrl-Z - Exits configuration mode and returns to the
EXEC
Down Arrow - Allows user to scroll forward through
former commands
Up Arrow - Allows user to scroll backward through
former commands
Ctrl-Shift-6 - Allows the user to interrupt an IOS
process such as ping or traceroute
Ctrl-C - Aborts the current command and exits the
configuration mode
11.1.6 In order to verify and troubleshoot The show command
network operation, we must examine the
operation of the devices. What is the
basic examination command?
What are some of the more commonly • show arp - Displays the ARP table of the
used show commands; include their device.
output • show mac-address-table - (switch only)
Displays the MAC table of a switch.
• show startup-config - Displays the saved
configuration located in NVRAM.
• show running-config - Displays the contents
of the currently running configuration file or
the configuration for a specific interface, or
Router#configure terminal
Router(config)#
Router(config)#hostname AtlantaHQ
AtlantaHQ(config)#
No.
What can you use to add additional Use the enable password command or the enable
security to your device? secret command. Either of these commands can be
used to establish authentication before accessing
CCNA Explorer 1 Chapter 11 rev. March 2008
privileged EXEC (enable) mode.
Why should you use one over the other? Always use the enable secret command, not the
older enable password command, if possible. The
enable secret command provides greater security
because the password is encrypted. The enable
password command can be used only if enable
secret has not yet been set.
The enable password command would be used if the
device uses an older copy of the Cisco IOS software
that does not recognize the enable secret command.
What are the commands to set these Router(config)#enable password password
passwords? Router(config)#enable secret password
What can happen if neither of these The IOS prevents privileged EXEC access from a
passwords is set? Telnet session.
What are vty lines? By default how many They allow access to a router via Telnet. By default,
are there? many Cisco devices support five VTY lines that are
numbered 0 to 4.
What are the commands to set the vty line Router(config)#line vty 0 4
passwords? Router(config-line)#password password
Router(config-line)#login
How can a non-encrypted password be The service password-encryption command prevents
encrypted? passwords from showing up as plain text when
viewing the configuration files.
How can you provide a method for Add a banner to the device output.
declaring that only authorized personnel
should attempt to gain entry into the
device?
The IOS provides multiple types of Switch(config)#banner motd # message #
banners. One common banner is the
message of the day (MOTD). It is often
used for legal notification because it is
displayed to all connected terminals.
What are the commands to configure this
type of banner?
11.2.3 What is the purpose of the reload It reloads the startup configuration.
command?
Where can back-ups of configuration files On a Trivial File Transfer Protocol (TFTP) server, a
be stored? CD, a USB memory stick, or a floppy disk stored in a
safe place. A configuration file should also be
included in the network documentation.
What are the steps to saving a 1.Enter the copy running-config tftp command.
configuration file to a TFTP server?
2. Enter the IP address of the host where the
configuration file will be stored.
11.4.1 What is one of the most effective tools for Establish a network baseline.
monitoring and troubleshooting network
performance?
What is network baseline? A process that involves monitoring network
performance & behavior over a certain period of time
allowing for a point of reference when wanting to
monitor performance in the future.
What is one method for starting a To copy and paste the results from an executed
baseline? ping, trace, or other relevant command into a text
file. These text files can be time stamped with the
date and saved into an archive for later retrieval.
What are the steps to capture output When using HyperTerminal for access, the steps
using HyperTerminal? are:
1. On the Transfer menu, click Capture Text.
2. Choose Browse to locate or type the name of the
saving the file.
3. Click Start to begin capturing text
4. Execute the ping command in the user EXEC
mode or at the privileged EXEC prompt. The router
will place the text displayed on the terminal in the
location chosen.
5. View the output to verify that it was not corrupted.
6. On the Transfer menu, click Capture Text, and
then click Stop Capture.
These steps are the same for other output captures
including traceroute.
11.4.3 How do you execute an ARP request from To execute an ARP command, at the command
a host? prompt of a host, enter:
C:\host1>arp -a
What type of info can be found in the ARP The IPv4 address, physical address, and the type of
cache? addressing (static/dynamic), for each device. The
ARP cache is only populated with information from
devices that have been recently accessed.
How can this cache be cleared? It can be cleared by using the arp -d command.
How can you ensure that the ARP cache Ping a device so that it will have an entry in the ARP
is populated? table.
What is a ping sweep? It is a scanning method for collecting MAC addresses
that can be executed at the command line or by
using network administration tools.
How can you determine a mapping of how Using a command line from a switch, enter the show
hosts are connected to a switch? command with the mac-address-table argument:
Sw1-2950#show mac-address-table
What might be an indicator that a switch Several MAC addresses representing multiple nodes
port is on a shared segment or is assigned to a single port.
connected to another switch?