Beruflich Dokumente
Kultur Dokumente
• Describe data link and network addresses and identify key differences between them -
Provides reliable transit of data across a physical link. Concern with physical addressing, network
topology, ine discipline, error notification, ordered delivery of frames and flow control.
• Define and describe the function of the MAC address - Also known as a hardware address, a
MAC-layer address, or a physical address. Required by every port or device that connects to a LAN.
Other devices in the network use these addresses to locate specific ports in the network and to create a
update routing tables and data structures. MAC addresses are 6 bytes long and are controlled by the
IEEE.
• List the key internetworking functions for the OSI Network layer.
o Path determination - Choose the best path for data to reach the destination host.
o Addressing - For any internetwork to function properly it must use a consistent network layer
addressing scheme.
o Routed versus routing protocols - Routed protocols can be any protocol suite that has
sufficient information to allow movement through an internetwork. Routing Protocols is used
to pass information about routing updates between routers.
o Heterogeneous Routing - Maintain different routing table based on the protocols that are
running on the internetwork.
• Identify at least three reasons why the industry uses a layered model.
o Clarify the general functions, rather than specifics on how to do it.
o Makes the complexity of networking into more manageable sublayers.
o Uses standard interfaces to enable ease of interoperability.
o Developers can change the features of one layer without changing all the code.
o Allows specialization which helps industry to progress.
o Ease troubleshooting.
• Describe the two parts of network addressing; then identify the parts in specific protocol
address examples.
o Physical Addressing - Unique address that is burned into each NIC card by the manufacturer.
o Logical Addressing - Uses flat addressing scheme and sometime referred to as virtual
addressing. e.g.
LAN protocols.
Ethernet
FastEthernet
Token Ring
WAN protocols.
PPP
X.25
Frame Relay
• Define and explain the five conversion steps of data encapsulation.
o Create the data - A user use an application to create some sort of message that needs to be
sent over the network. e.g. email messages, ftp or web.
o Get ready to transport the data - The session layer sends the data to the Transport layer,
where the header is created before the data portion.
o Add the logical address - The network layer prepares the information for its journey across the
internetwork.
o Add the MAC address - The source and destination physical address are added to the data.
The data link also adds a trailer. This combination is known as frame.
o Send the bits - Once the physical layer receives the frame, the last task is to put the signals
on the wire.
• Describe connection-oriented network service and connectionless network service, and
identify their key differences.
o Connection-oriented - A packet transmission delivery method design to guarantee that data is
delivered without error.
o Connectionless - A packet transmission delivery method design for high speed with no
guarantee of data delivery.
• Identify the parts in specific protocol address examples.
• Describe the advantages of LAN segmentation. - Minimizes packet collisions by decreasing the
number of workstations on the same physical segment. By keeping the traffic local to the network
segment, users have more available bandwidth and enjoy better response time.
• Describe LAN segmentation using bridges. - Breaks up networks into smaller segments to extend
the overall length of LAN and better manage data traffics. Bridge work at MAC sublayer of Data Link
layer. They create both physical and logical separate network segments to reduce traffic load.
• Describe LAN segmentation using routers. - Unlike bridge or a switch router filters frames based
on logical address. Works at network layer and are use to route packets to destination networks. Like
bridge, use tables to make routing decisions, however routers keep information only on how to get to
remote networks in their tables, not to the hosts.
• Describe LAN segmentation using switches. - Uses MAC address in order to ensure that the
packet is forwarded to the right outgoing port. Learn MAC address and store them in an internal lookup
table.
• Describe the benefits of network segmentation with bridges. - Segmenting a logical network into
multiple physical pieces, it ensure network reliability, availability and manageability.
• Describe the benefits of network segmentation with routers.
o Manageability - Multiple routing protocols give the network manager who's creating an
internetwork a lot of flexibility.
o Increase functionality - Cisco routers provide features addressing the issues of low, error and
congestion control, plus fragmentation, reassembly and control over packet lifetime.
o Multiple active paths - Using protocol, DSAPs, SSAP and path metrics, routers can informed
routing decisions, as well as interpret the next layer protocols. Routers can have ore than one
active link between devices.
• Describe the benefits of network segmentation with switches. - Considerably higher port density
at a lower cost than standard bridges. User enjoy instant access to the full available bandwidth.
Network Protocols
Decimal range
Maximum
Leading bit of first byte of Maximum
Class Format
Pattern network network
nodes per
network
address
A Net.Node.Node.Node.Node 0 1-127 127 16,777,214
B Net.Net.Node.Node 10 128-191 16,384 65,534
C Net.Net.Net.Node 110 192-223 2,097,152 254
Routing
• Define flow control and describe the three basic methods used in networking. - Technique for
ensuring that a transmitting entity, such as a modem, does not overwhelm a receiving entity with data.
o Windowing - Each source host has a maximum data limit set that will let it send only that
amount before an acknowledgement from the destination is received.
o Buffering - Stores small bursts of data in a buffer area until the destination host can process
them.
o Multiplexing - Enable data from several layers to be transmitted onto a single physical link.
• Add the RIP routing protocol to your configuration.
1. From Global Configuration mode, enable RIP using the command router rip. This command
transfers you to the routing protocol configuration mode. Your prompt changes to
Router(config-router)#
2. Specify the network addresses that should be advertised by RIP. Use the command network
<network IP address>. The router can any networks that are directly connected to it.
• Add the IGRP routing protocol to your configuration. - If your router is using RIP, you must first
disable RIP. Use the no router rip command. Use router igrp <AS Number> command to enable
IGRP.
WAN Protocols
• Recognize key Frame Relay terms and features. - Upgrade from X.25 to be used where LAPB is no
longer utilized. Does not use error correction. Uses SVCs, PVCs, and DLCIs for addressing.
• List commands to configure Frame Relay LMIs, maps, and subinterfaces.
o Command string to configure Frame Relay encapsulation - encapsulation frame-relay [ietf]
o Command string to configure LMI type - frame-relay lmi-type { ansi | cisco | q933a }
o Command string to configure subinterfaces on the first physical serial interface - interface
serial 0.number
• List commands to monitor Frame Relay operation in the router.
o show interfaces [type number]
o show frame-relay pvc
o show frame-relay map
• State a relevant use and context for ISDN networking. - Use existing copper wire. Able to deliver
123Kbps of digital data over the same pair of copper wires.
• Identify ISDN protocols, function groups, reference points, and channels.
o Protocols
E-series protocols deal with ISDN and telephone network.
I-series protocols are the concepts, terminology, and definitions.
Q-series protocols defines the way ISDN switching and signaling is performed.
o Reference point - Identifies a section of the ISDN network between devices used for
troubleshooting and conceptual purposes.
o Channels
Basic-Rate Interface (BRI) - 128Kbps over 2 channels.
Primary Rate Interface (PRI) - 1.472Mbps over 23 channels in North America and
1.920Mbps over 30 channels in Europe.
• Identify PPP operations to encapsulate WAN data on Cisco routers.
o Supports level 3 protocols.
o Binding multiple protocols over the same link
o Compression and multilinking to increase throughput
o Two methods of authentication PAP and CHAP
o Dynamic address assignment
o Synchronous as well as asynchronous communications
Network Management
• Configure standard access lists to figure IP traffic. - access-list 10 { permit | deny } (source
addess)
• Configure extended access lists to filter IP traffic. - access-list 110 { permit | deny } protocol
(source address) (destination address) port
• Monitor and verify selected access list operations on the router.
o show access-1
o show ip access-list
o show ip intercase e0
o show running-config
LAN Design
• Describe full- and half-duplex Ethernet operation.
o Full Duplex - Capability for simultaneous data transmission between a sending station and a
receiving station.
o Half Duplex - Capability for data transmission in only one direction at at time between a
sending station and a receiving station.
• Describe network congestion problem in Ethernet networks.
o Collisions - When a collision occurs, it will cause all hosts to stop sending traffic.
o Broadcasts - When there are too many hosts in a single segment, the amount of broadcast-
based traffic will be more than the physical media can handle.
o Latency - Occurs when a host is prepared to send traffic, but is required to wait for access to
the wire or until an incoming frame is received.
• Describe the features and benefits of Fast Ethernet.
o Higher performance of 100Mbps
o Use of existing cabling and network equipment
o Dual-speed adapters and switches can be used for easy migration from 10Mbps to 100Mbps
o Fast Ethernet is based on the proven CSMA/CD technology that is well defined
o Migration is easy
• Describe the guidelines and distance limitations of Fast Ethernet.
o 100BaseFX - Ethernet over fiber at 100Mbps using 802.3 specs. 100 meters (328 feet). Half-
Duplex: 412 meters (1351 feet) and Full-Duplex: 2000 meters (6561 feet)
o 100BaseT4 - Using 802.3 specs, 100Mbps over category 3,4, or 5 cabling with standard RJ-45
connector. 100 Mb/s (full-duplex not supported). 100 meters (328 feet).
o 100BaseTX - Fast Ethernet over category 5 cabling. 100 Mb/s (200 Mb/s in optional full-duplex
mode). It's compatible with, and adheres to, 802.3 specs. 100 meters (328 feet).
o 100BaseX - This refers to either the 100BaseTX or 100BaseFX media. This standard was
approved to ensure compatibility between the Ethernet CSMA/CD and ANSI X3T9.5 standard.
o 100VG AnyLan - IEEE movement into fast Ethernet and Token Ring that appears to be going
nowhere fast, mostly because it's not compatible with the 802.3 standards and Cisco doesn't
support it.
• List the commands to load Cisco IOS software from: Flash memory, a TFTP server, or ROM.
• Prepare to backup, upgrade, and load a backup Cisco IOS software image.
o Creating a Software Image Backup
Router# setup
Basic management setup configures only enough connectivity for management of the system,
extended setup will ask you to configure each interface on the system
The enable secret is a password used to protect access to privileged EXEC and configuration
modes. This password, after entered, becomes encrypted in the configuration.
The virtual terminal password is used to protect access to the router over a network interface.
Enter virtual terminal password: cisco Configure SNMP Network Management? [no]: n
Enter interface name used to connect to the management network from the above interface
summary: Ethernet0
hostname Chicago
enable secret 5 $1$/Hw9/
enable password enable
line vty 0 4
password cisco
no snmp-server
!
no ip routing
!
interface BRI0
shutdown
no ip address
!
interface Ethernet0
no shutdown
ip address 192.168.1.1 255.255.255.0
!
end
[0] Go to the IOS command prompt without saving this config.
[1] Return back to the setup without saving this config.
[2] Save this configuration to nvram and exit.
Chicago#