Sie sind auf Seite 1von 10

Bridging/Switching

• Name and describe two switching methods.


o Store-and-forward Switching - Provides error-free method of sending data. Copy the entire
contents of the frame into the switch buffer and perform CRC. Typically used in high speed
LAN to low speed LAN.
o Cut-Through Switching - Doesn't check for frame errors. Read the first six-byte of destination
address and won't copied the frame into buffer before sending out.
o Fragmentfree Switching - Used modified version of Cut-Through. Wait for the collision
windows, which is 64 bytes long to pass before forwarding.
• Distinguish between cut-through and store-and-forward LAN switching - cut-through doesn't
check for errors therefore it is faster than store-and-forward and the bad part of cut-through method is
that if your network has a high error rate, the switches won't know that and will continue to flood the
network with bad frame. As that result bad frames can degrade overall performance by wasting
bandwidth.
• Describe the operation of the Spanning Tree Protocol and its benefits - To prevent routing loop
in a network. e.g. If a router or hub has more than one path to the same destination, a routing problem
could occur. Main function of STP is to provide redundant network path without suffering the effects of
loops.
• Describe the benefits of virtual LANs.
o Simply moves, adds and changes
o Reduce administrative cost
o Better control of broadcasts
o Tighten network security
o Microsegment with scalability
o Relocate server in secure location

OSI Reference Model & Layered Communications

• Describe data link and network addresses and identify key differences between them -
Provides reliable transit of data across a physical link. Concern with physical addressing, network
topology, ine discipline, error notification, ordered delivery of frames and flow control.
• Define and describe the function of the MAC address - Also known as a hardware address, a
MAC-layer address, or a physical address. Required by every port or device that connects to a LAN.
Other devices in the network use these addresses to locate specific ports in the network and to create a
update routing tables and data structures. MAC addresses are 6 bytes long and are controlled by the
IEEE.
• List the key internetworking functions for the OSI Network layer.
o Path determination - Choose the best path for data to reach the destination host.
o Addressing - For any internetwork to function properly it must use a consistent network layer
addressing scheme.
o Routed versus routing protocols - Routed protocols can be any protocol suite that has
sufficient information to allow movement through an internetwork. Routing Protocols is used
to pass information about routing updates between routers.
o Heterogeneous Routing - Maintain different routing table based on the protocols that are
running on the internetwork.
• Identify at least three reasons why the industry uses a layered model.
o Clarify the general functions, rather than specifics on how to do it.
o Makes the complexity of networking into more manageable sublayers.
o Uses standard interfaces to enable ease of interoperability.
o Developers can change the features of one layer without changing all the code.
o Allows specialization which helps industry to progress.
o Ease troubleshooting.
• Describe the two parts of network addressing; then identify the parts in specific protocol
address examples.
o Physical Addressing - Unique address that is burned into each NIC card by the manufacturer.
o Logical Addressing - Uses flat addressing scheme and sometime referred to as virtual
addressing. e.g.
 LAN protocols.
 Ethernet
 FastEthernet
 Token Ring
 WAN protocols.
 PPP
 X.25
 Frame Relay
• Define and explain the five conversion steps of data encapsulation.
o Create the data - A user use an application to create some sort of message that needs to be
sent over the network. e.g. email messages, ftp or web.
o Get ready to transport the data - The session layer sends the data to the Transport layer,
where the header is created before the data portion.
o Add the logical address - The network layer prepares the information for its journey across the
internetwork.
o Add the MAC address - The source and destination physical address are added to the data.
The data link also adds a trailer. This combination is known as frame.
o Send the bits - Once the physical layer receives the frame, the last task is to put the signals
on the wire.
• Describe connection-oriented network service and connectionless network service, and
identify their key differences.
o Connection-oriented - A packet transmission delivery method design to guarantee that data is
delivered without error.
o Connectionless - A packet transmission delivery method design for high speed with no
guarantee of data delivery.
• Identify the parts in specific protocol address examples.
• Describe the advantages of LAN segmentation. - Minimizes packet collisions by decreasing the
number of workstations on the same physical segment. By keeping the traffic local to the network
segment, users have more available bandwidth and enjoy better response time.
• Describe LAN segmentation using bridges. - Breaks up networks into smaller segments to extend
the overall length of LAN and better manage data traffics. Bridge work at MAC sublayer of Data Link
layer. They create both physical and logical separate network segments to reduce traffic load.
• Describe LAN segmentation using routers. - Unlike bridge or a switch router filters frames based
on logical address. Works at network layer and are use to route packets to destination networks. Like
bridge, use tables to make routing decisions, however routers keep information only on how to get to
remote networks in their tables, not to the hosts.
• Describe LAN segmentation using switches. - Uses MAC address in order to ensure that the
packet is forwarded to the right outgoing port. Learn MAC address and store them in an internal lookup
table.
• Describe the benefits of network segmentation with bridges. - Segmenting a logical network into
multiple physical pieces, it ensure network reliability, availability and manageability.
• Describe the benefits of network segmentation with routers.
o Manageability - Multiple routing protocols give the network manager who's creating an
internetwork a lot of flexibility.
o Increase functionality - Cisco routers provide features addressing the issues of low, error and
congestion control, plus fragmentation, reassembly and control over packet lifetime.
o Multiple active paths - Using protocol, DSAPs, SSAP and path metrics, routers can informed
routing decisions, as well as interpret the next layer protocols. Routers can have ore than one
active link between devices.
• Describe the benefits of network segmentation with switches. - Considerably higher port density
at a lower cost than standard bridges. User enjoy instant access to the full available bandwidth.

Network Protocols

• Describe the different classes of IP addresses (and subnetting).

Decimal range
Maximum
Leading bit of first byte of Maximum
Class Format
Pattern network network
nodes per
network
address
A Net.Node.Node.Node.Node 0 1-127 127 16,777,214
B Net.Net.Node.Node 10 128-191 16,384 65,534
C Net.Net.Net.Node 110 192-223 2,097,152 254

• Describe the different classes of IP addresses (and subnetting).


o Refer to http://www.certifyexpress.com/cisc/ccna2/subnetting-cramnotes.php
for detail on subnetting.
 Reduce network traffic
 Optimized network performance
 Simplified management
 Facilitated spanning of large geographical distance
• Identify the functions of the TCP/IP network-layer protocol. - Responsible for physical connection
and for setting the rules as to how the bits will be put on the wire. Layer are broken into 2 categories
LAN and WAN.
• Identify the functions performed by ICMP. - Provides feedback about problems that may be
occurring on the network.
• Configure IP addresses. - Refer to http://www.certifyexpress.com/cisc/ccna2/subnetting-
cramnotes.php for detail info.
• Verify IP addresses. -
• List the required IPX address and encapsulation type.
o Ethernet_802.3 - Default up to Netware 3.11
o Ethernet_802.2 - Default since Netware 3.12
o Ethernet_II - Support both TCP/IP and IPX
o Ethernet_SNAP - AppleTalk, IPX and TCP/IP

Routing

• Define flow control and describe the three basic methods used in networking. - Technique for
ensuring that a transmitting entity, such as a modem, does not overwhelm a receiving entity with data.
o Windowing - Each source host has a maximum data limit set that will let it send only that
amount before an acknowledgement from the destination is received.
o Buffering - Stores small bursts of data in a buffer area until the destination host can process
them.
o Multiplexing - Enable data from several layers to be transmitted onto a single physical link.
• Add the RIP routing protocol to your configuration.

1. From Global Configuration mode, enable RIP using the command router rip. This command
transfers you to the routing protocol configuration mode. Your prompt changes to
Router(config-router)#
2. Specify the network addresses that should be advertised by RIP. Use the command network
<network IP address>. The router can any networks that are directly connected to it.
• Add the IGRP routing protocol to your configuration. - If your router is using RIP, you must first
disable RIP. Use the no router rip command. Use router igrp <AS Number> command to enable
IGRP.

WAN Protocols

• Recognize key Frame Relay terms and features. - Upgrade from X.25 to be used where LAPB is no
longer utilized. Does not use error correction. Uses SVCs, PVCs, and DLCIs for addressing.
• List commands to configure Frame Relay LMIs, maps, and subinterfaces.
o Command string to configure Frame Relay encapsulation - encapsulation frame-relay [ietf]
o Command string to configure LMI type - frame-relay lmi-type { ansi | cisco | q933a }
o Command string to configure subinterfaces on the first physical serial interface - interface
serial 0.number
• List commands to monitor Frame Relay operation in the router.
o show interfaces [type number]
o show frame-relay pvc
o show frame-relay map
• State a relevant use and context for ISDN networking. - Use existing copper wire. Able to deliver
123Kbps of digital data over the same pair of copper wires.
• Identify ISDN protocols, function groups, reference points, and channels.
o Protocols
 E-series protocols deal with ISDN and telephone network.
 I-series protocols are the concepts, terminology, and definitions.
 Q-series protocols defines the way ISDN switching and signaling is performed.
o Reference point - Identifies a section of the ISDN network between devices used for
troubleshooting and conceptual purposes.
o Channels
 Basic-Rate Interface (BRI) - 128Kbps over 2 channels.
 Primary Rate Interface (PRI) - 1.472Mbps over 23 channels in North America and
1.920Mbps over 30 channels in Europe.
• Identify PPP operations to encapsulate WAN data on Cisco routers.
o Supports level 3 protocols.
o Binding multiple protocols over the same link
o Compression and multilinking to increase throughput
o Two methods of authentication PAP and CHAP
o Dynamic address assignment
o Synchronous as well as asynchronous communications

Network Management

1-99 IP standard access list


100-199 IP extended access list
1000-
IPX SAP access list
1099
1100-
Extended 48-bit MAC address access list
1199
1200-
IPX summary address access list
1299
200-299 Protocol type-code access list
300-399 DECnet access list
600-699 Appletalk access list
700-799 48-bit MAC address access list
800-899 IPX standard access list
900-999 IPX extended access list

• Configure standard access lists to figure IP traffic. - access-list 10 { permit | deny } (source
addess)
• Configure extended access lists to filter IP traffic. - access-list 110 { permit | deny } protocol
(source address) (destination address) port
• Monitor and verify selected access list operations on the router.
o show access-1
o show ip access-list
o show ip intercase e0
o show running-config

LAN Design
• Describe full- and half-duplex Ethernet operation.
o Full Duplex - Capability for simultaneous data transmission between a sending station and a
receiving station.
o Half Duplex - Capability for data transmission in only one direction at at time between a
sending station and a receiving station.
• Describe network congestion problem in Ethernet networks.
o Collisions - When a collision occurs, it will cause all hosts to stop sending traffic.
o Broadcasts - When there are too many hosts in a single segment, the amount of broadcast-
based traffic will be more than the physical media can handle.
o Latency - Occurs when a host is prepared to send traffic, but is required to wait for access to
the wire or until an incoming frame is received.
• Describe the features and benefits of Fast Ethernet.
o Higher performance of 100Mbps
o Use of existing cabling and network equipment
o Dual-speed adapters and switches can be used for easy migration from 10Mbps to 100Mbps
o Fast Ethernet is based on the proven CSMA/CD technology that is well defined
o Migration is easy
• Describe the guidelines and distance limitations of Fast Ethernet.
o 100BaseFX - Ethernet over fiber at 100Mbps using 802.3 specs. 100 meters (328 feet). Half-
Duplex: 412 meters (1351 feet) and Full-Duplex: 2000 meters (6561 feet)
o 100BaseT4 - Using 802.3 specs, 100Mbps over category 3,4, or 5 cabling with standard RJ-45
connector. 100 Mb/s (full-duplex not supported). 100 meters (328 feet).
o 100BaseTX - Fast Ethernet over category 5 cabling. 100 Mb/s (200 Mb/s in optional full-duplex
mode). It's compatible with, and adheres to, 802.3 specs. 100 meters (328 feet).
o 100BaseX - This refers to either the 100BaseTX or 100BaseFX media. This standard was
approved to ensure compatibility between the Ethernet CSMA/CD and ANSI X3T9.5 standard.
o 100VG AnyLan - IEEE movement into fast Ethernet and Token Ring that appears to be going
nowhere fast, mostly because it's not compatible with the 802.3 standards and Cisco doesn't
support it.

Cisco Basics, IOS & Network Basics

• Examine router elements.


o ROM - Used by router to store the bootstrap startup program, operating system and Power-On
Self Test (POST). Can be replace and upgraded.
o Flash - An erasable, re-programmable ROM that holds the operating system images and
microcode. Flash is retained even when the router is turn off.
o RAM - Provides caching and packet buffering, plus information like routing tables. Used to hold
operating system when the router is powered on. It is cleared when the router is reset or
powered off.
o NVRAM - nonvolatile RAM that stores the router's startup configuration file. Retain information
even when the router is rebooted or shut down.
o Interfaces - Located either on the motherboard or as a separate modules that ease
replacement or upgrade.
o sh ver - shows the current IOS.
• Manage configuration files from the privilege EXEC mode.
o Configuration command summary

Configure terminal Configure manually from the console terminal


Configure memory Load configuration information from NVRAM
Load configuration information from a network
Copy tftp running config
TFTP server.
Store the current configuration in RAM into
Copy run startup config
NVRAM.
Show running config Display the current configuration in RAM
Store the current configuration in RAM on a
Copy running config tftp
network TFTP server
Display the saved configuration, which is the
Show startup config
contents of NVRAM
Erase startup config Erase the contents of NVRAM.

• Managing contents of NVRAM (Start Configuration)

Loads configuration information from


configure memory
NVRAM.
erase startup config or
Erases the contents of NVRAM
clear startup-config”
copy running config Stores the current configuration in RAM
startup config into NVRAM
Display the saved configuration, which
show startup config
is the contents of NVRAM
• NVRAM to RAM - A current copy of the startup configuration in NVRAM can be copied to RAM using the
copy startup-config run command.
• RAM to NVRAM -A current copy of the running configuration stored in RAM can be copied to
NVRAM using the copy running-config start command.
• TFTP server - A current copy of the configuration currently in RAM can be stored on a TFTP Server using
the copy running-config tftp command. You can configure the router by retrieving the configuration
file stored on one of your network server by entering the copy tftp running config command.

• Control router passwords, identification, and banner.


o Password
 Router(config)#enable password mypassword
o Identification
 Router(config)#hostname myRouter
o Banner
 Router(config)#banner motd #
• Identify the main Cisco IOS software commands for router startup.

Show start up config or


Display the backup configuration files
show config
Show running config Display the active configuration files
Clear startup config Delete the backup configuration file in NVRAM
Erase startup config Delete the backup configuration file in NVRAM
The reload command will reboot the router
Reload
through the entire configuration process
The last command is used to enter setup mode
Setup
from the privileged EXEC prompt

• Log in to a router in both user and privilege modes.

Router> User Mode Prompt


Router>enable
Password:*******
Router# Privileged mode prompt

• Check an initial configuration using the setup command.


o Router#show startup-config
• Use the context-sensitive help facility.
o Router>Clock?
o Router>?
• Use the command history and editing features.

Move to the beginning of the command


<Crtl><A>
line
<Crtl><E> Move to the end of the command line
<Crtl><F> Move forward one character
<Crtl><B> Move back one character
<Crtl><Z> Backs you out of configuration mode
Up arrow or last (previous) command
<Crtl><P>
line
Down arrow or more recent command
<Crtl><N>
recall
<Tab> Entry completion
<Esc><B> Move back one word
<Esc><F> Move forward one word
Show history Show command buffer
Terminal history
Set command buffer size
size
Terminal no
Disable advanced editing features
editing
Terminal editing Re-enable advanced editing

• List the commands to load Cisco IOS software from: Flash memory, a TFTP server, or ROM.

Router# configure terminal


Router(config)# boot system flash {ios-filename}
Router(config)# boot system tftp {ios-filename} {tftp-address}
Router(config)# boot system rom
[Ctrl Z]
Router(config)# copy running config startup config

• Prepare to backup, upgrade, and load a backup Cisco IOS software image.
o Creating a Software Image Backup

Router(boot)# copy flash tftp

IP address of remote host (255.255.255.255]? 192.16.3.2111

Filename to write on tftp host? C2500

o Upgrading the Image from the Net

Router(boot)# copy tftp flash


• IP address of remote host (255.255.255.255]? 192.16.3.211
• Filename to write on tftp host? C2500

• Cisco 2500 Series Router IOS Upgrade Steps
• Router# enable
• Router# config t
• Router (config)# config-register 0x2101
• Router (config)# CTRL Z
• Router# wr mem
• Router# reload
• Router(boot)> enable {should return with: (boot)router#}
• Router (boot)# copy tftp flash
• {Enter the necessary IP number of the tftp server}
• {Enter the name of the upgrade file}
• y
• y
• y
• Router (boot)# config t
• Router (boot) (config)# config-register 0x2102
• Router (boot)# CTRL Z
• Router (boot)# wr mem
• Router (boot)# reload
• Router #sho ver
• List problems that each routing type encounters when dealing with topology changes, and
describe techniques to reduce the number of these problems.
• Prepare the initial configuration of your router and enable IP.

Router# setup

--- System Configuration Dialog ---


Continue with configuration dialog? [yes/no]: y
At any point you may enter a question mark '?' for help. Use ctrl-c to abort configuration dialog at
any prompt. Default settings are in square brackets '[]'.

Basic management setup configures only enough connectivity for management of the system,
extended setup will ask you to configure each interface on the system

Would you like to enter basic management setup? [yes/no]: y


Configuring global parameters:

Enter host name [Router]: Chicago

The enable secret is a password used to protect access to privileged EXEC and configuration
modes. This password, after entered, becomes encrypted in the configuration.

Enter enable secret [<Use current secret>]: secret


The enable password is used when you do not specify an enable secret password, with some
older software versions, and some boot images.

Enter enable password [password]: enable

The virtual terminal password is used to protect access to the router over a network interface.
Enter virtual terminal password: cisco Configure SNMP Network Management? [no]: n

Current interface summary


Interface IP-Address OK? Method Status Protocol
BRI0 unassigned YES unset administratively down down
BRI0:1 unassigned YES unset administratively down down
BRI0:2 unassigned YES unset administratively down down
Ethernet0 unassigned YES unset administratively down down

Enter interface name used to connect to the management network from the above interface
summary: Ethernet0

Configuring interface Ethernet0:


Configure IP on this interface? [no]: y
IP address for this interface: 192.168.1.1
Subnet mask for this interface [255.255.255.0] : 255.255.255.0
Class C network is 192.168.1.0, 24 subnet bits; mask is /24

The following configuration command script was created:

hostname Chicago
enable secret 5 $1$/Hw9/
enable password enable
line vty 0 4
password cisco
no snmp-server
!
no ip routing
!
interface BRI0
shutdown
no ip address
!
interface Ethernet0
no shutdown
ip address 192.168.1.1 255.255.255.0
!
end
[0] Go to the IOS command prompt without saving this config.
[1] Return back to the setup without saving this config.
[2] Save this configuration to nvram and exit.

Enter your selection [2]: 2


Building configuration...

00:04:14: %LINK-3-UPDOWN: Interface BRI0:1, changed state to down


00:04:14: %LINK-3-UPDOWN: Interface BRI0:2, changed state to down
00:04:17: %LINK-3-UPDOWN: Interface Ethernet0, changed state to up
Use the enabled mode 'configure' command to modify this configuration.

Chicago#

Das könnte Ihnen auch gefallen