Sie sind auf Seite 1von 97

Search the site

Menu 

CCNA 1 v6.0 Study Material – Chapter 1: Explore the Network


 Sep 6, 2017 |  Last updated on: Sep 6, 2017 |  CCNA 1 Instructor Materials |  3 Comments

Chapter 1: Explore the Network


1.1 Globally Connected
Explain how networks affect the way we interact, learn, work, and play.
Explain how host devices can be used as clients, servers, or both.

1.2 LANs, WANs, and the Internet


Explain the use of network devices.
Compare the devices and topologies of a LAN to the devices and topologies of a WAN.
Describe the basic structure of the Internet.
Explain how LANs and WANs interconnect to the Internet.

1.3 The Network as a Platform


Explain the concept of a converged network.
Describe the four basic requirements of a reliable network.

1.4 The Changing Network Environment


Explain how trends such as BYOD, online collaboration, video, and cloud computing are changing the way we
interact.
Explain how networking technologies are changing the home environment.
Identify basic security threats and solutions for both small and large networks.
Describe the importance of understanding the underlying switching and routing infrastructure of a network.

1.1 Globally Connected

Networking Today

Network has no boundary and supports the way we:


Learn
Communicate
Work
Play

Providing Resources in a Network

Networks of Many Sizes


Small Home / Office Networks
Medium to Large Networks
World Wide Network
Clients and Servers
Clients request and display information
Servers provide information to other devices on the network
Peer-to-Peer
Computers can be both server and client at the same time.
What are the advantages?
What are the disadvantages?
1.2 LANs, WANs, and the Internet

Network Components

End Devices
Either the source or destination of a message
Name some end devices
Intermediary Network Devices
Connect multiple individual networks to form an internetwork
Connect the individual end devices to the network
Ensure data flows across the network
Provide connectivity
Network Media
Provide the pathway for data transmission
Interconnect devices
Name the three types of media
Network Representations
What do the symbols represent?
Topology Diagrams
Physical
Logical
LANs and WANs

Local Area Networks


Spans across small geographical area
Interconnects end devices
Administrated by a single organization
Provide high speed bandwidth to internal devices
WAN Area Networks
Interconnects LAN
Administrated by multiple service providers
Provide slower speed links between LANS
Can you name more network types?
The Internet, Intranets, and Extranets
The Internet
Worldwide collection of interconnected networks
Not owned by any individual or group
Intranets and Extranets

Internet Connections
Internet Access Technologies
Internet Service Provider (ISP)
Broadband cable
Broadband Digital Subscriber Line (DSL)
Wireless WANs
Mobile Services
Business DSL
Leased Lines
Metro Ethernet
Types of Internet Connections
Home and Small Office
Business

1.3 The Network as a Platform

Converged Networks

Traditional Separate Networks


Each network with its own rules and
The Converging Network
Capable of delivering data, voice, and video over the same network infrastructure

Reliable Network

Four Basic Characteristics of Network Architecture


Fault Tolerance
Scalability
Quality of Service (QoS)
Security
1.4 The Changing Network Environment

Network Trends

Top trends include:


Bring Your Own Device (BYOB)
Online Collaboration
Video Communications
Cloud Computing

Networking Technologies for the Home

Technology Trends in the Home


Smart home
Powerline Networking
Uses existing electrical wiring to connect devices
Wireless Broadband
Wireless Internet Service Provider (WISP)
Wireless Broadband Service using cellular technology
Network Security

Security Threats
Viruses, worms, and Trojan horses
Spyware and adware
Zero-day attacks, also called zero-hour attacks
Hacker attacks
Denial of service attacks
Data interception and theft
Identity theft
Security Solutions
Antivirus and antispyware
Firewall filtering
Dedicated firewall systems
Access control lists (ACL)
Intrusion prevention systems (IPS)
Virtual Private Networks (VPNs)

Network Architecture
Cisco Network Architecture
Support technologies and applications
Ensure connectivity across any combination of networks
CCNA
A first step to a networking career

1.5 Chapter Summary

Summary
Explain how multiple networks are used in everyday life.
Describe the topologies and devices used in a small to medium-sized business network.
Explain the basic characteristics of a network that supports communication in a small to medium-sized
business.
Explain trends in networking that will affect the use of networks in small to medium-sized businesses.

Section 1.1 New Terms and Commands

client
collaborative learning spaces
global communities
human network
network collaboration services
network of networks
peer-to-peer network
server

Section 1.2 New Terms and Commands

broadband cable
broadband DSL
business DSL
cable
cellular
dedicated leased line
dial-up telephone
DSL
end devices
extranet
hardware
intermediary devices
internetworking devices
Internet Service Provider (ISP)

Intranet
leased lines
Local Area Network (LAN)
logical topology diagrams
medium
Metropolitan Area Network (MAN)
metro Ethernet
network access devices
network interface card (NIC)
network media
physical port, interface

physical topology diagrams


satellite
security devices
service provider (SP)
software
Storage Area Network (SAN)
TelePresence endpoint
teleworkers
topology diagram
VoIP phones
Wide Area Network (WAN)
Wireless LAN (WLAN)

Section 1.3 New Terms and Commands

availability
circuit switched networks
content security
converged network
data confidentiality
data integrity
delay
Denial of Service (DoS)
encrypting data

fault tolerance
hierarchical layered structure
intelligent information network
network architecture
network bandwidth
network congestion
network infrastructure security

packet loss
packet switched networks
packets
Quality of Service (QoS)
queue
redundancy
routing function
scalability
user authentication

Section 1.4 New Terms and Commands

access control lists (ACL)


adware
Bring Your Own Deice (BYOD)
cloud computing
data centers
data interception and theft
hacker attacks
identity theft
intrusion prevention systems (IPS)

multiple layers of security


multitasking
online collaboration
person-to-person video calling
powerline networking
server clusters
server farms
smart home technology
spyware
Trojan horses

video conferencing
virtual private networks (VPNs)
virtualization
viruses
wireless broadband service
wireless internet service provider (WISP)
wireless local area networks (WLAN)
worms
zero-day attacks

Download Slide PowerPoint (pptx):


Search the site

Menu 

CCNA 1 v6.0 Study Material – Chapter 2: Configure a Network Operating


System
 Sep 6, 2017 |  Last updated on: Sep 6, 2017 |  CCNA 1 Instructor Materials |  No Comments

Chapter 2 – Sections & Objectives


2.1 IOS Bootcamp
Explain the purpose of Cisco IOS.
Explain how to access a Cisco IOS device for configuration purposes.
Explain how to navigate Cisco IOS to configure network devices.
Describe the command structure of Cisco IOS software.

2.2 Basic Device Configuration


Configure hostnames on a Cisco IOS device using the CLI.
Use Cisco IOS commands to limit access to device configurations.
Use IOS commands to save the running configuration.

2.3 Address Schemes


Explain how devices communicate across network media.
Configure a host device with an IP address.
Verify connectivity between two end devices.

2.1 IOS Bootcamp

Cisco IOS
Operating Systems
PC OS allows users to interact with the computer
User-computer interaction in PC OSs are often done via mouse, keyboard and monitor
Cisco IOS is also an Operating System
Cisco IOS allows users to interact with Cisco devices.

Cisco IOS enables a technician to:


Use a keyboard to run CLI-based network programs.
Use a keyboard to enter text and text-based commands.
View output on a monitor.
All Cisco networking devices come with a default IOS.
It is possible to upgrade the IOS version or feature set.

Cisco IOS Access


Access Methods
Console
Auxiliar
Virtual Terminal (Telnet / SSH)
Terminal Emulation Programs
PuTTY
Tera Term
SecureCRT
Navigate the IOS
Cisco IOS Modes of Operation
Initial configuration must be done via console connection.
Configuration is then done via various CLI command modes.

Primary Command Modes


User EXEC Mode
Privileged EXEC Mode
Configuration Command Modes
The Configure Terminal command enters the Global Configuration Mode.
Sub-configuration modes are accessible from the Privileged EXEC Mode.
Examples are: swtich(config-line)# and switch(config-if)#
Navigate Between IOS Modes
Navigation between modes is also done via commands.
The enable command enters the Privileged EXEC Mode.
The exit commands exits to the parent command mode.

The Command Structure


Basic IOS Command Structure
The general syntax for a command is the command followed by any appropriate keywords and arguments.
Keyword – a specific parameter defined in the operating system
Argument – not predefined; a value or variable defined by the user
IOS Command Syntax
Provides the pattern or format that must be used when entering a command.
The Cisco IOS Command Reference is the ultimate source of information for a particular IOS command.
IOS Help Feature
The IOS has two forms of help available: Context-Sensitive Help and Command Syntax Check.
Hotkeys and Shortcuts
Commands and keywords can be shortened to the minimum number of characters that identify a unique
selection.
Line editing keyboard shortcuts such as Ctrl-A are also supported.

2.2 Basic Device Configuration

Hostnames
Device Names
Hostnames allow devices to be identified by network administrators over a network or the Internet.
Very important and should also be displayed in the topology.
Configure Hostnames
IOS hostnames should:
Start with a letter
Contain no spaces
End with letter or digit
Use only letters, digits or dashes
Be less than 64 characters in length

Limit Access to Device Configurations


Secure Device Access
Secure privileged EXEC and user EXEC access with a password.
Secure virtual terminal lines with a password.
Configure Passwords
Use strong passwords.
Avoid re-using passwords
Encrypt Passwords
Cisco IOS displays passwords in plain text by default.
Passwords should be encrypted.
Banner Messages
Important part of the legal process in the event that someone is prosecuted for breaking into a device.
Wording that implies that a login is “welcome” or “invited” is not appropriate.
Often used for legal notification because it is displayed to all connected terminals.
Save Configurations
Save the Running Configuration File
File stored in NVRAM that contains all of the commands that will be used upon startup or reboot
NVRAM does not lose its contents when the device is powered off.
Alter the Running Configuration
File stored in RAM that reflects the current configuration, modifying affects the operation of a Cisco device
immediately.
RAM loses all of its content when the device is powered off or restarted.
Capture Configuration to a Text File
Configuration files can also be saved and archived to a text document.
The configuration can then be edited with any text editor and placed back in the device.

2.3 Address Schemes

Ports and Addresses


IP Addresses
Each end device on a network must be configured with an IP address.
Enable devices to establish end-to-end communication on the Internet.
The structure of an IPv4 address is called dotted decimal notation and is represented by four decimal numbers
between 0 and 255.
IPv6 is the most recent version of IP and the replacement for the more common IPv4.
Interface and Ports
Network communications depend on interfaces and the cables that connect them.
Different types of network media have different features and benefits.
Ethernet is the most common local area network (LAN) technology.
SVI provides a means to remotely manage a switch over a network.

Configure IP Addressing
Manual IP Address Configuration for End Devices
To manually configure an IPv4 address on a Windows host, open the Control Panel > Network Sharing Center
> Change adapter settings and choose the adapter.
Next right-click and select Properties to display the Local Area Connection Properties shown in Figure 1.
Automatic IP Address Configuration for End Devices
DHCP enables automatic IPv4 address configuration for every end device that has DHCP enabled. No extra
configuration is needed.
Switch Virtual Interface Configuration
To configure an SVI on a switch, use the interface vlan 1 global configuration command. Vlan 1 is not an actual
physical interface but a virtual one.

Verifying Connectivity
Interface Addressing Verification
Cisco IOS supports commands to allow IP configuration verification.
End-To-End Connectivity Test
The ping command can be used to test connectivity to another device on the network or a website on the
Internet.

2.4 Chapter Summary

Summary
Explain the features and functions of Cisco IOS Software.
Configure initial settings on a network device using the Cisco IOS software.
Given an IP addressing scheme, configure IP address parameters on end devices to provide end-to-end
connectivity in a small to medium-sized business network.

Section 2.1 New Terms and Commands


kernel
shell
Command-line interface (CLI)
Graphical user interface (GUI)
Cisco IOS
Firmware
Console
Out-of-band
SSH
Telnet
Auxiliary port (AUX)
PuTTY
Tera Term

SecureCRT
OS X Terminal
Cisco IOS modes
User EXEC mode
Privileged EXEC mode
Global Configuration Mode
Line configuration mode
Interface configuration mode
enable command
disable command
exit command
end command
Key combination – Ctrl+Z
Context-Sensitive Help

Command Syntax Check


CLI Hot Keys and Shortcuts
Hostnames

Section 2.2 New Terms and Commands

hostname name
Strong passwords
enable secret class
line console 0
password cisco
login
line vty 0 15
service password-encryption
banner motd # the message of the day #
Startup configuration
Random Access Memory (NVRAM)
Running configuration

Random Access Memory (RAM)


show running-config
copy running-config startup-config
reload

Section 2.3 New Terms and Commands


IPv4 address
Subnet mask
Default gateway
Physical ports
Virtual interface
Copper
Fiber Optics
Wireless
Ethernet
Local Area Network (LAN)
Layer 2 switch
Layer 3 addresses
Switch virtual interface (SVI)

Dynamic Host Configuration (DHCP)


Domain Name System (DNS)
ipconfig command prompt
interface vlan 1
Search the site

Menu 

CCNA 1 v6.0 Study Material – Chapter 3: Network Protocols and


Communications
 Sep 6, 2017 |  Last updated on: Sep 6, 2017 |  CCNA 1 Instructor Materials |  No Comments

Chapter 3 – Sections & Objectives


3.1 Rules of Communication
Describe the types of rules that are necessary to successfully communicate.
3.2 Network Protocols and Standards
Explain why protocols are necessary in communication.
Explain the purpose of adhering to a protocol suite.
Explain the role of standards organizations in establishing protocols for network interoperability.
Explain how the TCP/IP model and the OSI model are used to facilitate standardization in the communication
process.
3.3 Data Transfer in the Network
Explain how data encapsulation allows data to be transported across the network.
Explain how local hosts access local resources on a network.

3.1 Rules of Communication

The Rules
Rule Establishment
Identified sender and receiver
Common language and grammar
Speed and timing of delivery
Confirmation or acknowledgment requirements
Message Encoding
Process of converting information into another acceptable form
Message Formatting and Encapsulation
Message Size
Message Timing
Access method
Flow control
Response timeout
Message Delivery Options
Unicast
Multicast
Broadcast

3.2 Network Protocols and Standards

Protocols
Rules that Govern Communications
Network Protocols
The role of protocols
How the message is formatted or structured
The process by which networking devices share information about pathways with other networks
How and when error and system messages are passed between devices
The setup and termination of data transfer sessions
Protocol Interaction
Example: web server and client

Protocol Suites
Protocol Suites and Industry Standards
TCP/IP is an open standard
Can you name other protocol suites?
TCP/IP Protocol Suites
Can you name some of the protocols from the TCP/IP protocol suite.
TCP/IP Communication Process
Can you describe the process?

Standard Organizations
Open Standards
Name some advantages of open standards
Internet Standards
Name a few standard organizations
Electronics and Communications Standards Organizations
Name a few organizations

Reference Models
The Benefits of Using a Layered Model
Name some benefits
The OSI Reference Model
Provides list of functions
Describes interactions between layers
OSI Model and TCP/IP Model Comparison
Similar: transport and network layers
Contrast: relationship between layers
3.3 Data Transfer in the Network

Data Encapsulation
Message Segmentation
Segmentation – Break communication into pieces
Multiplexing – interleaving the pieces
Protocol Data Units
What are PDUs called at each layer?
Encapsulation and de-encapsulation process

Data Access
Network Addresses
Source IP address
Destination IP address
Deliver the IP packet from the original source to the final destination, either on the same network or to a remote
network.
Data Link Addresses
Source data link address
Destination data link address
Deliver the data link frame from one network interface card (NIC) to another NIC on the same network
Devices on the Same Network
Devices on a Remote Network
3.4 Chapter Summary

Summary
Explain how rules are used to facilitate communication.
Explain the role of protocols and standards organizations in facilitating interoperability in network
communications.
Explain how devices on a LAN access resources in a small to medium-sized business network.

Section 3.1 New Terms and Commands


access method
acknowledgement
broadcast
decoder
encapsulation
encoder
flow control
message
message delivery options
message encoding
message formatting
message formatting and encapsulation

message size
message timing
multicast
protocols
receiver
response timeout
segmenting
transmission medium
transmitter
unacknowledged
unicast

Section 3.2 New Terms and Commands


Advanced Research Projects Agency Network (ARPANET)
AppleTalk
application protocol
Electronic Industries Alliance (EIA)
Hypertext Markup Language (HTML)
IEEE 802.3
IEEE 802.11
Institute of Electrical and Electronics Engineers (IEEE)
International Corporation for Assigned Names and Numbers (ICANN)

International Telecommunications Union-Telecommunication Standardization Sector (ITU-T)


Internet Architecture Board (IAB)
Internet Assigned Numbers Authority (IANA)
Internet Engineering Task Force (IETF)
internet protocol
Internet Society (ISOC)
Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX)
Media Access Control (MAC)

network access protocols


network protocol suite
protocol model
protocol stack
proprietary protocol
reference model
Request for Comments (RFC)
standards organization
standards-based protocol
Telecommunications Industry Association (TIA)
Transmission Control Protocol/IP (TCP/IP)
transport protocol

Section 3.3 New Terms and Commands

Address Resolution Protocol (ARP)


bits
data
data encapsulation
data link address
de-encapsulation
default gateway
destination data link address

destination IP address
frame
Multiplexing
network address
packet
protocol data unit (PDU)
source IP address
source data link address
Segment
segmentation

Download Slide PowerPoint (pptx):


Search the site

Menu 

CCNA 1 v6.0 Study Material – Chapter 4: Network Access


 Sep 6, 2017 |  Last updated on: Mar 1, 2018 |  CCNA 1 Instructor Materials |  2 Comments

Share 59 Like 59

Chapter 4 – Sections & Objectives


4.1 Physical Layer Protocols
Identify device connectivity options.
Describe the purpose and functions of the physical layer in the network.
Describe basic principles of the physical layer standards.
4.2 Network Media
Identify the basic characteristics of copper cabling.
Build a UTP cable used in Ethernet networks (scope – does not include cabling area discussion).
Describe fiber-optic cabling and its main advantages over other media.
Connect devices using wired and wireless media.
4.3 Data Link Layer Protocols
Describe the purpose and function of the data link layer in preparing communication for transmission on specific
media.
4.4 Media Access Control
Compare the functions of logical topologies and physical topologies.
Describe the basic characteristics of media access control methods on WAN topologies.
Describe the basic characteristics of media access control methods on LAN topologies.
Describe the characteristics and functions of the data link frame.

4.1 Network Access


Physical Layer Protocols Physical Layer Connection
Types of Connections

Network Interface Cards

Physical Layer Protocols Purpose of the Physical Layer


The Physical Layer
Accepts a complete frame from the data link layer
Encodes it as a series of signals that are transmitted onto the local media
Physical Layer Media
Describe the media types
Physical Layer Standards
Physical Layer Protocols Physical Layer Characteristics
Functions
Physical components
Encoding
Signaling
Data Transfer
Bandwidth – capacity to a medium to carry data
Throughput – measure of the transfer of bits across the media
Types of Physical Media

4.2 Network Media

Copper Cabling

Characteristics of Copper Cabling


Inexpensive, easy to install, low resistance to electric current
Distance and signal interference
Copper Media
Unshielded Twisted-Pair Cable
Shielded Twisted-Pair Cable
Coaxial Cable
Copper Media Safety
Fire and electrical hazards
UTP Cabling
Properties of UTP Cabling
Cancellation of EMI and RFI signals with twisted pairs

UTP Cabling Standards


TIA/EIA-568
IEEE: Cat5, Cat5e, Cat6, Cat6e

UTP Connectors
Types of UTP Cable
Rollover
Crossover
Straight-through

Testing UTP Cables


Cable Pinouts

Fiber-Optic Cabling
Properties of Fiber-Optic Cabling
Transmits data over longer distances
Flexible, but thin strands of glass
Transmits with less attenuation
Immune to EMI and RFI
Fiber Media Cable Design
Types of Fiber Media
Single mode and multimode
Fiber-Optic Connectors
Testing Fiber Cables
Fiber versus Copper

Wireless Media

Properties of Wireless Media


– Data communications using radio or microwave frequencies
Types of Wireless Media
– Wi-Fi, Bluetooth, WiMax
Wireless LAN
– Wireless Access Point
– Wireless NIC adapters
4.3 Data Link Layer Protocols

Purpose of the Data Link Layer


The Data Link Layer
– What is this layer responsible for?
Data Link Sublayers
– LLC communicates with the network layer
– MAC defines the media access processes
Providing Access to Media
Data Link Layer Standards
– IEEE
– ITU
– ISO
– ANSI
4.4 Media Access Control

Topologies
Controlling Access to the Media

Physical and Logical Topologies


WAN Topologies
Common Physical WAN Topologies
– Point-to-point

– Hub and spoke

– Mesh

Physical Point-to-Point Topology


Logical Point-to-Point Topology

LAN Topologies
Physical LAN Topologies
Half and Full Duplex
Media Access Control Methods
Contention-Based Access
– CSMA/CD vs. CSMA/CA

Data Link Frame

The Frame
– Header
– Data
– Trailer
Frame Fields
Layer 2 Address

LAN and WAN Frames


– 802.11 Wireless Frame
– PPP Frame
– HDLC
– Frame Relay
– Ethernet Frame
4.5 Chapter Summary

Summary
Explain how physical layer protocols and services support communications across data networks.
Build a simple network using the appropriate media.
Explain how the Data Link layer supports communications across data networks.
Compare media access control techniques and logical topologies used in networks.

Section 4.1 New Terms and Commands


Access Point (AP)
American National Standards Institute (ANSI) Bandwidth
CENELEC (European Committee for Electrotechnical Standardization)
CSA (Canadian Standards Association)
Copper cable
European Telecommunications Standards Institute (ETSI) Encoding
Federal Communication Commission (FCC) in the USA
Fiber-optic cable

Gigabits per second (Gb/s)


Goodput
Institute of Electrical and Electronics Engineers (IEEE)
Integrated Service Router (ISR)
International Organization for Standardization (ISO)
International Telecommunication Union (ITU)
Internet Engineering Task Force (IETF)
JSA/JIS (Japanese Standards Association)
Kilobits per second (kb/s)

Latency
Manchester encoding
Megabits per second (Mb/s)
Modulation
Network Interface Cards (NICs)
OSI Physical Layer
Signaling
Telecommunications Industry Association/Electronic Industries Association (TIA/EIA)
Throughput
Wireless
Wireless Local Network (WLAN)
Section 4.2 New Terms and Commands

Cancelation
Category 5 cable (Cat 5)
Enhanced Category 5 cable (Cat5e)
Category 6 cable (Cat6)
Category 6a cable (Cat6a)
Category 7 cable (Cat7)
Cladding
Coaxial
Coaxial cabling
Core
Coverage area
Crosstalk
Dispersion
Duplex Multimode LC Connector

Electromagnetic interference (EMI)


End gap
End finish
Enterprise networks
Fiber-to-the-home (FTTH)
Institute of Electrical and Electronics Engineers (IEEE)
Interference
Jacket
Lasers
Light Emitting Diodes (LEDs)
Long-haul networks
Misalignment
Multi-mode fiber (MMF)
Optical fiber cable

Radio frequency interference (RFI)


RJ45 connector
Rollover
Shared medium
Shielded twisted pair cabling (STP)
Signal attenuation
Single-mode fiber (SMF)
ST, SC, and LC fiber-optic connectors
Submarine networks
TIA 568A
TIA 568B
TIA/EIA 568 standard
Unshielded twisted pair (UTP)
Wireless Access Point (AP)
Wireless NIC adapters

Section 4.3 New Terms and Commands


American National Standards Institute (ANSI)
Data link layer (layer 2)
Ethernet interface
Frames
Institute of Electrical and Electronics Engineers (IEEE)
International Organization for Standardization (ISO)
International Telecommunication Union (ITU)
Logical Link Control (LLC)
Media Access Control (MAC)
Serial interface

Section 4.4 New Terms and Commands

802.11 frame
802.11 Wireless
Bus
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
Carrier Sense Multiple Access/Collision Detection (CSMA/CD)
Collision
Contention-based access
Control
Controlled access
Cyclic Redundancy Check (CRC) value
Data
Error Detection

Ethernet
Extended Star
Frame Check Sequence (FCS) Frame Relay
Frame Relay
Frame start and stop indicator flags
Full-Duplex Communications
Half-Duplex Communications
HDLC
Header
Hub and Spoke
Logical Point-to-Point Topology
Logical Topology

Media Access Control


Media Sharing
Mesh
Physical Point-to-Point Topology
Physical Topology
Point-to-Point
Point-to-Point Protocol (PPP)
Quality of Service (QOS)
Ring
Star
Topology
Trailer
Type
Virtual circuit

Download Slide PowerPoint (pptx):

ITN6_Instructor_Materials_Chapter4.pptx
Search the site

Menu 

CCNA 1 v6.0 Study Material – Chapter 5: Ethernet


 Sep 6, 2017 |  Last updated on: Sep 6, 2017 |  CCNA 1 Instructor Materials |  No Comments

Chapter 5 – Sections & Objectives


5.1 Ethernet Protocol
Explain how the Ethernet sublayers are related to the frame fields.
Describe the Ethernet MAC address.
5.2 LAN Switches
Explain how a switch operates.
Explain how a switch builds its MAC address table and forwards frames.
Describe switch forwarding methods.
Describe the types of port settings available for Layer 2 switches.
5.3 Address Resolution Protocol
Compare the roles of the MAC address and the IP address.
Describe the purpose of ARP.
Explain how ARP requests impact network and host performance.

5.1 Ethernet Protocol

Ethernet Frame
Ethernet Encapsulation
Ethernet operates in the data link layer and the physical layer.
Ethernet supports data bandwidths from 10Mbps through 100Gbps.
Ethernet standards define both the Layer 2 protocols and the Layer 1 technologies.
MAC Sublayer
MAC constitutes the lower sublayer of the data link layer.
Responsible for Data encapsulation and Media access control.
Ethernet Evolution
Ethernet has been evolving since its creation in 1973.
The Ethernet frame structure adds headers and trailers around the Layer 3 PDU to encapsulate the message
being sent.
Ethernet Frame Fields
The minimum Ethernet frame size is 64 bytes and the maximum is 1518 bytes.
Frame smaller than the minimum or greater than the maximum are dropped.
Dropped frames are likely to be the result of collisions or other unwanted signals and are therefore considered
invalid.

Ethernet MAC Addresses


MAC Addresses and Hexadecimal

– MAC address is 48-bit long and expressed as 12 hexadecimal digits.


MAC Addresses: Ethernet Identity
– IEEE requires a vendor to follow two simple rules:
1. Must use that vendor’s assigned OUI as the first three bytes.
2. All MAC addresses with the same OUI must be assigned a unique value in the last three bytes.
Frame Processing
The NIC compares the destination MAC address in the frame with the device’s physical MAC address stored in
RAM.
If there is a match, the framed is passed up the OSI layers.
If there is no match, the device discards the frame.
MAC Address Representations
MAC addresses can be represented with colons, dashes or dots and are case-insensitive.
00-60-2F-3A-07-BC, 00:60:2F:3A:07:BC, 0060.2F3A.07BC and 00-60-2f-3a-07-bc are all valid representations
of the same MAC address.
Unicast MAC Address
Unique address used when a frame is sent from a single transmitting device to a single destination device.
The source MAC address must always be a unicast.
Broadcast MAC Address
Used to address all nodes in the segment.
The destination MAC address is the address of FF-FF-FF-FF-FF-FF in hexadecimal (48 ones in binary).
Multicast MAC Address
Used to address a group of nodes in the segment.
The multicast MAC address is a special value that begins with 01-00-5E in hexadecimal.
The remaining portion of the multicast MAC address is created by converting the lower 23 bits of the IP
multicast group address into 6 hexadecimal characters.
5.2 LAN Switches

The MAC Address Table


Switch Fundamentals
An Ethernet Switch is a Layer 2 device.
It uses MAC addresses to make forwarding decisions.
The MAC address table is sometimes referred to as a content addressable memory (CAM) table.
Learning MAC Addresses
Switches dynamically build the CAM by monitoring source MACs.
Every frame that enters a switch is checked for new addresses.
The frame is forwarded based on the CAM.
Filtering Frames
Since the switch knows where to find a specific MAC address, it can filter the frames to that port only.
Filtering is not done is the destination MAC is not present in the CAM.

Switch Forwarding Methods


Frame Forwarding Methods on Cisco Switches
Store-And-Forward
Cut-Through
Cut-Through Switching
Fast-forward switching
Lowest level of latency immediately forwards a packet after reading the destination address.
Typical cut-through method of switching.
Fragment-free switching
Switch stores the first 64 bytes of the frame before forwarding.
Most network errors and collisions occur during the first 64 bytes.
Memory Buffering on Switches
Port-based memory
Share memory
Switch Port Settings
Duplex and Speed Settings
Full-duplex – Both ends of the connection can send and receive simultaneously.
Half-duplex – Only one end of the connection can send at a time.
A common cause of performance issues on Ethernet links is when one port on the link operates at half-duplex
and the other on full-duplex.
Auto-MDX
Detects the type of connection required and configures the interface accordingly.
Helps reducing configuration errors.

5.3 Address Resolution Protocol

MAC and IP
The combination of MAC and IP facilitate the End-to-End communication.
Layer 2 addresses are used to move the frame within the local network
Layer 3 addresses are used to move the packets through remote networks.
Destination on Same Network
– Physical address (MAC address) is used for Ethernet NIC to Ethernet NIC communications on the same
network.
Destination on Remote Network
– Logical address (IP address) is used to send the packet from the original source to the final destination.

ARP
Introduction to ARP
ARP allows the source to request the MAC address of the destination.
The request is based upon the layer 3 address of the destination (known by the source).
ARP Functions
Resolving IPv4 addresses to MAC addresses
Maintaining a table of mappings
ARP uses ARP Request and ARP Reply to perform its functions.
Removing Entries from an ARP Table
Entries are removed from the device’s ARP table when its cache timer expires.
Cache timers are OS dependent.
ARP entries can be manually removed via commands.
ARP Tables
On IOS: show ip arp
On Windows PCs: arp -a

ARP Issues
ARP Broadcasts
– ARP requests can flood the local segment.
ARP Spoofing
– Attackers can respond to requests and pretend to be providers of services. Example: default gateway
5.4 Chapter Summary

Chapter Summary Summary


Explain the operation of Ethernet.
Explain how a switch operates.
Explain how the address resolution protocol enables communication on a network.

Section 5.1 New Terms and Commands


IEEE 802.2
IEEE 802.3
LLC Sublayer
MAC Sublayer
Data Encapsulation
Frame Delimiting
Cyclic Redundancy Check
Carrier Sense Multiple Access (CSMA)
Ethernet II
Frame Check Sequence (FCS)
Preamble
EtherType

Runt
Collision Fragment
Jumbo
Baby Giant Frame
Hexadecimal
Organizationally Unique Identifier (OUI)
Section 5.2 New Terms and Commands
burned-in address (BIA)
ipconfig /all command
ifconfig command
Unicast MAC Address
Broadcast MAC Address
Multicast MAC Address
Content Addressable Memory (CAM)
Store-and-forward
Cut-through
Fast-forward switching
Fragment-free switching
Port-based Memory Buffering
Shared Memory Buffering

Half-duplex
Full-duplex
Auto-MDIX
Address Resolution Protocol (ARP)

Section 5.3 New Terms and Commands


ARP Table
ARP Cache
ARP Request
ARP Reply
show ip arp, arp –a
ARP spoofing

Download Slide PowerPoint (pptx):

Related Articles
Search the site

Menu 

CCNA 1 v6.0 Study Material – Chapter 6: Network Layer


 Sep 6, 2017 |  Last updated on: Sep 6, 2017 |  CCNA 1 Instructor Materials |  No Comments

Chapter 6 – Sections & Objectives


6.1 Network Layer Protocols
Describe the purpose of the network layer in data communication.
Explain why the IPv4 protocol requires other layers to provide reliability.
Explain the role of the major header fields in the IPv4 and IPv6 packet.
6.2 Routing
Explain how a host device uses routing tables to direct packets to itself, a local destination, or a default
gateway.
Compare a host routing table to a routing table in a router.
6.3 Routers
Describe the common components and interfaces of a router.
Describe the boot-up process of a Cisco IOS router.
6.4 Configure a Cisco Router
Configure initial settings on a Cisco IOS router.
Configure two active interfaces on a Cisco IOS router.
Configure devices to use the default gateway.

6.1 Network Layer Protocols

Network Layer in Communications


The Network Layer
End to End Transport processes
Addressing end devices
Encapsulation
Routing
De-encapsulating
Network Layer Protocols
IPv4
IPv6

Characteristics of the IP Protocol


Encapsulating IP
Segments are encapsulated into IP packets for transmission.
The network layer adds a header so packets can be routed to the destination.
IP – Connectionless
Sender doesn’t know if the receiver is listening or the message arrived on time.
Receiver doesn’t know data is coming.
IP – Best Effort Delivery
No guarantees of delivery are made.
IP – Media Independent
IP can travel over different types of media.

IPv4 Packet
IPv4 Packet Header
Version = 0100
DS = Packet Priority
TTL = Limits life of Packet
Protocol = Upper layer protocol such as TCP
Source IP Address = source of packet
Destination IP Address = destination of packet

IPv6 Packet
Limitations of IPv4
IP address depletion
Internet routing table expansion
Lack of end-to-end connectivity
Introducing IPv6
Increased address space
Improved packet handling
Eliminates the need for NAT
EncapsulatingIPv6
Simplified header format
No checksum process requirement
More efficient Options Header mechanism
Flow Label field makes it more efficient.
IPv6 Packet Header
– xx

IPv6 Packet (Cont.)


IPv6 Packet Header
– xx
Version = 0110
Traffic Class = Priority
Flow Label = same flow will receive same handling
Payload Length = same as total length
Next Header = Layer 4 Protocol
Hop Limit = Replaces TTL field

6.2 Routing

How a Host Routes


Host Forwarding Decision
Three types of destination: itself, local host, remote host.
Default Gateway
Routes traffic to other networks
Has a local IP address in the same address range as other hosts on the network
Can take data in and forward data out
Using the Default Gateway
Hosts will use the default gateway when sending packets to remote networks.
Host Routing Tables
Use the netstat –r command to display the
host routing table on a Windows machine.
How a Host Routes Router Routing Tables
Router Packet Forwarding Decision
Routers and hosts forward packets in a similar fashion.
The main difference is that routers have more interfaces while hosts often have only one.
Devices on directly connected networks can be reached directly.
Devices on remote networks are reached through gateway.
IPv4 Router Routing Table
The router routing table stores network routes the router knows about.
Use the show ip route command to display the routing table on a Cisco router.
The router routing table also has information on: how the route was learned, its trustworthiness and rating.
It also contains which interface to use to reach that specifc destination.
Directly Connected Routing Table Entries
C – Identifies a directly-connected network, automatically created when an interface is configured with an IP
address and activated.
L – Identifies that this is a local interface. This is the IPv4 address of the interface on the router.
Remote Network Routing Table Entries
Remote Network Routing Table Entries
Remote destinations can’t be reached directly.
Remote routes contain the address of the intermediate network device to be used to reach the destination.
Next-Hop Address
Next-Hop address is the address of the intermediate device used to reach a specifc remote destination.

6.3 Routers

Anatomy of a Router
A Router is a Computer
Routers have CPU, memory and I/O devices
Cisco routers use IOS as their operating system.
Router Memory
Just as a computer, routers have memory.
Routers contain RAM, ROM, NVRAM and Flash memory.
Inside a Router
Routers have the same general structure.
Connect to a Router
Routers have may ports to support connections.
LAN and WAN Interfaces
Routers have LAN and WAN ports.
Different models ship with different ports.
Ethernet is very common on different router models.

Anatomy of a Router
Bootset Files
IOS image file, stored in the Flash, contains the IOS.
The Flash also stores other system files.
The NVRAM stores configuration parameters.
Router Bootup Process
Perform the POST and load the bootstrap program.
Locate and load the Cisco IOS software.
Locate and load the startup configuration file or enter setup mode
Show Version Output
The show version command is very useful.
It provides information on the amounts of memory installed, what IOS images was loaded during boot and
more.

6.4 Configuring a Cisco Router

Configure Initial Settings

Basic Switch Configuration Steps


Configure device name
Secure EXEC mode
Secure VTY lines
Secure privilege EXEC mode
Secure all passwords
Provide legal notification
Configure the management SVI
Save the configuration

Basic Router Configuration Steps


Configure device name
Secure EXEC mode
Secure VTY lines
Secure privilege EXEC mode
Secure all passwords
Provide legal notification
Configure the management SVI
Save the configuration
Configure Interfaces
Configure Router Interfaces
Enter the interface sub-configuration mode.
Add a description to the Interface (optional)
Configure an IPv4 or IPv6 address.
Activate the interface with a no shutdown command
Verify Interface Configuration
show ip route – Displays the contents of the IPv4 routing table stored in RAM.
show interfaces – Displays statistics for all interfaces on the device.
show ip interface – Displays the IPv4 statistics for all interfaces on a router.

Configure the Default Gateway


Default Gateway for a Host
Default Gateway for a Switch
A default gateway is required for remote network communication.
If a switch is to be managed via its VTY lines, it needs a default gateway.
Use the ip default-gateway command to configure the default gateway for a switch.

6.5 Chapter Summary

Summary
Explain how network layer protocols and services support communications across data networks.
Explain how routers enable end-to-end connectivity in a small to medium-sized business network.
Explain how devices route traffic in a small to medium-sized business network.
Configure a router with basic configurations.

Section 6.1 New Terms and Commands


encapsulation
routing
de-encapsulation
data
packet
frame
Internet Protocol Version 4 (IPv4)
Internet Protocol Version 6 (IPv6)
Network Layer PDU = IP Packet
Transport Layer PDu
Segment Header
IP Header

Auxiliary port (AUX)


connectionless
best effort delivery
media independent
Connectionless
unreliable
maximum transmission unit (MTU)
Version
Differentiated Services (DS)
Time-to-Live (TTL)
Internet Control Message Protocol (ICMP)
data payload
Identification, Flags, Fragment Offset fields
keyword
Network Address Translation (NAT)
Traffic Class
Flow Label
Payload Length
Next Header
Hop Limit
local host
remote host
default gateway

Section 6.2 New Terms and Commands

netstat –r
route print
interface list
IPv4 Route Table
IPv6 Route Table
directly-connected routes
remote routes
default route
show ip route
route source
destination network
outgoing interface
administrative distance
metric

next-hop
route timestamp
branch routers
WAN routers
service provider routers

Section 6.3 New Terms and Commands


Power-on-self-test POST
RAM
ROM
NVRAM
Flash
Synchronous dynamic RAM (SDRAM)
WIC
high-speed WIC (HWIC)
ROMMON
Advanced Integration Module (AIM)
Enhanced high-speed WAN interface card (eHWIC)

Serial module
Ethernet interfaces
Auxiliary (AUX) RJ-45 port
In-band router interfaces
Console
Out-of-band
Secure Shell (SSH)
Telnet
startup-config
running-config
bootstrap program
Trivial File Transport Protocol (TFTP)

setup mode
show version

Section 6.4 New Terms and Commands


interface type-and-number
ip address ipv4-address subnet-mask
description description-text
no shutdown
show ip interface brief
ping ip address
show ip route
show interfaces
show ip interface brief
ip default-gateway ip-address

Download Slide PowerPoint (pptx):

Related Articles
Search the site

Menu 

CCNA 1 v6.0 Study Material – Chapter 7: IP Addressing


 Sep 6, 2017 |  Last updated on: Sep 6, 2017 |  CCNA 1 Instructor Materials |  No Comments

Chapter 7 – Sections & Objectives


7.1 IPv4 Network Addresses
Convert between binary and decimal numbering systems.
Describe the structure of an IPv4 address including the network portion, the host portion, and the subnet mask.
Compare the characteristics and uses of the unicast, broadcast, and multicast IPv4 addresses.
Explain public, private, and reserved IPv4 addresses.
7.2 IPv6 Network Addresses
Explain the need for IPv6 addressing.
Describe the representation of an IPv6 address.
Describe types of IPv6 network addresses.
Configure global unicast addresses.
Describe multicast addresses.
7.3 Connectivity Verification
Explain how ICMP is used to test network connectivity.
Use ping and traceroute utilities to test network connectivity.

7.1 IPv4 Network Addresses

Binary and Decimal Conversion


IPv4 Addresses
consists of a string of 32 bits, divided into four sections called octets.
Each octet contains 8 bits (or 1 byte) separated with a dot.
Conversion between Binary to Decimal
Use the chart to help with conversion

IPv4 Address Structure


Network and Host Portions
The Subnet Mask
Logical AND
What is the network address for graphics?
Prefix Length
What is the prefix length for the graphics?
Network, Host, and Broadcast Addresses
Network Address?
Range of Valid Hosts?
Broadcast Address?

IPv4 Unicast, Broadcast, and Multicast


IPv4 Addressing Assignment to a Host
Static – Type in manually
Dynamic – Dynamic Host Configuration Protocol (DHCP)
IPv4 Communication
Unicast – send packets from one host to an individual host
Broadcast – send packets from one host to all the hosts in the network
Multicast – send a packet from one host to a selected group of hosts in the same or different network
Which types of communication are the graphics on the right?
Types of IPv4 Addresses
Public and Private IPv4 Addresses
Private addresses are not routed over the Internet
Private Addresses:
10.0.0.0/8 or 10.0.0.0 to10.255.255.255
172.16.0.0 /12 or 172.16.0.0 to 172.31.255.255
192.168.0.0 /16 or 192.168.0.0 to 192.168.255.255

Special User IPv4 Addresses


Loopback addresses
– 127.0.0.0 /8 or 127.0.0.1 to 127.255.255.254
Link-Local addresses or Automatic Private IP Addressing (APIPA) addresses
– 169.254.0.0 /16 or 169.254.0.1 to 169.254.255.254
TEST-NET addresses
– 192.0.2.0/24 or 192.0.2.0 to 192.0.2.255
Classless Addressing
CIDR
Allocated IPv4 addresses based on prefix length
Assignment of IP Addresses

7.2 IPv6 Network Addresses

IPv4 Issues
The Need for IPv6
Depletion of IPv4 address space
Internet of Everything
IPv4 and IPv6 Coexistence
Dual Stack – IPv4 and IPv6 on the same network
Tunneling – IPv6 packets inside IPv4 packets
Translation – IPv6 packet is translated to an IPv4 packet, and vice versa.
IPv6 Addressing
IPv6 Address Representation
x:x:x:x:x:x:x:x, where x represents 4 hexadecimal values
Apply the rules to simply these IPv6 Addresses
Rule 1: Omit Leading 0s
Rule 2: Omit All 0 Segments
2001:0DB8:0000:1133:0000:0000:0000:0200
2001:0DB8:CAFE:0000:1111:0000:0000:0200
2001:0DB8:000A:0000:0000:0000:0000:1000
2001:0DB8:ACAD:1234:0000:0000:0000:0000
2001:0DB8:0000:1111:0020:0000:ACAD:0000
FF02:0000:0000:0000:0000:0000:0000:0001
FE80:0000:0000:0000:0000:0000:0000:0003
0000:0000:0000:0000:0000:0000:0000:0000

Types of IPv6 Addresses


IPv6 Address Types
Unicast
Multicast
Anycast
IPv6 Prefix Length
Indicates the network portion
Format: IPv6 address /prefix length
Prefix length range from 0 to 128
Typical length is /64

Common Types of IPv6 Addresses


Unicast Addresses
– Unique, Internet routable addresses
– Configured statically or assigned dynamically
Link-Local Unicast Addresses
– Communicate with other IPv6 enabled devices on the same link
– Device creates its own link local address without DHCP server
Unique Local Addresses
– Unique local unicast
– Used for local addresses within a site or between a limited number of sites

IPv6 Unicast Addresses


Structure of an IPv6 Global Unicast Address
Global Routing Prefix
Subnet ID
Interface ID
Static Configuration of a Global Unicast Address
ipv6 address ipv6-address/prefix-length
Dynamic Configuration
SLAAC
DHCPv6
Link-Local Addresses
Dynamic or Static
Verifying IPv6 Address Configuration
show ipv6 interface brief

IPv6 Multicast Addresses


Assigned IPv6 Multicast Addresses
IPv6 multicast addresses have the prefix FF00::/8
– FF02::1 All-nodes multicast group
– FF02::2 All-routers multicast group

Solicited-Node IPv6 Multicast Addresses


7.3 Connectivity Verification

ICMP
ICMPv4 and ICMPv6
Host Confirmation
Destination or Service Unreachable
Time Exceeded
Router Redirection
ICMPv6 Router Solicitation and Router Advertisement Messages
Messaging between an IPv6 router and an IPv6 device:
Router Solicitation (RS) message
Router Advertisement (RA) message
Messaging between IPv6 devices:
Neighbor Solicitation (NS) message
Neighbor Advertisement (NA) message
Duplicate Address Detection (DAD)

Testing and Verification


Ping
Testing the Local Stack
– 127.0.0.1 (IPv4) or ::1 (IPv6)
Testing Connectivity to the Local LAN
Testing Connectivity to Remote
Traceroute
Testing the Path
– Round Trip Time (RTT)
– IPv4 TTL and IPv6 Hop Limit

7.4 Chapter Summary

Summary
Explain the use of IPv4 addresses to provide connectivity in a small to medium-sized business network.
Configure IPv6 addresses to provide connectivity in small to medium-sized business networks.
Use common testing utilities to verify network connectivity.

Section 7.1 New Terms and Commands

ANDing
Binary Numbering System
Broadcast
Broadcast Address
Broadcast Domain
Class A
Class B
Class C
Class D
Class E
Classless Inter-domain Routing (CIDR)
DHCP Server
DHCP Client Dynamic Assignment
Directed Broadcast

Dotted Decimal Format


Dynamic Host Configuration Protocol (DHCP)
Host Address
Internet Assigned Numbers Authority (IANA)
Internet Service Providers (ISPs)
IPv4 Loopback Address
Limited Broadcast
Link-local Addresses
Multicast Transmission
Multicast
Multicast Addresses
Network Address

Octet
Positional Notation
Prefix Length
Private Address
Public Address
radix
Regional Internet Registries (RIRs)
RFC 1918
Slash Notation
Static IP Addressing
Subnet Mask
TEST-NET Addresses
Unicast

Section 7.2 New Terms and Commands


Address Resolution
Assigned multicast
Destination or Service Unreachable
Dual-stack
Duplicate Address Detection
EUI-64 Process
FF02::1 All-nodes multicast group
FF02::2 All-routers multicast group
Global Unicast Address
Hextet
Host confirmation

ICMPv6
IPv4 Time-to-Live (TTL)
IPv6
IPv6 Anycast
IPv6 Hop Limit
IPv6 link-local address
IPv6 Loopback Address
IPv6 Multicast
IPv6 Prefix Length
IPv6 Unicast
Leading Zeros
Link-local Address
Network Address Translation (NAT64)

Round Trip Time (RTT)


Route redirection
Router Advertisement
Router Solicitation
show ipv6 interface brief
show ipv6 route
Solicited node multicast
Stateless Address Autoconfiguration (SLAAC)
Time exceeded
Tunneling
Unique Local Address
Unspecified Address

Download Slide PowerPoint (pptx):

Related Articles

Leave a Reply
Search the site

Menu 

CCNA 1 v6.0 Study Material – Chapter 8: Subnetting IP Networks


 Sep 6, 2017 |  Last updated on: Sep 6, 2017 |  CCNA 1 Instructor Materials |  No Comments

Chapter 8 – Sections & Objectives

8.0 Introduction

8.1 Subnetting an IPv4 Network


Explain how subnetting segments a network to enable better communication.
Explain how to calculate IPv4 subnets for a /24 prefix.
Explain how to calculate IPv4 subnets for a /16 and /8 prefix.
Given a set of requirements for subnetting, implement an IPv4 addressing scheme.
Explain how to create a flexible addressing scheme using variable length subnet masking (VLSM).

8.2 Addressing Schemes


Implement a VLSM addressing scheme.
8.3 Design Considerations for IPv6
Explain how to implement IPv6 address assignments in a business network.

8.4 Summary

8.1 Network Layer Protocols

Network Segmentation
Broadcast Domains
Each router interface connects a broadcast domain.
Broadcasts are only propagated within its broadcast domain.
Problems with Large Broadcast Domains
Slow network operations due to the significant amount of broadcast traffic.
Slow device operations because a device must accept and process each broadcast packet.
Reasons for Subnetting
Solution: reduce the size of the network to create smaller broadcast domains.
Because each broadcast domain connects to a different router interface, each domain needs its own network
address space.
The process of breaking an address range into smaller address spaces is called subnetting.
Network administrators can group devices into subnets that are determined by location, organizational unit or
device type.

Subnetting an IPv4 Network


Octet Boundaries
– Subnets can be created based on octet boundaries. (/8, /16 or /24)
Subnetting on the Octet Boundary
– Also known as IPv4 Classes.
– Uses the octet boundaries to separate network from hosts.
Classless Subnetting
– Uses address bits to separate network from hosts.
– Allows for much more flexibility.
Classless Subnetting Example

Creating 2 Subnets
A subnet mask of /25 applied to 192.168.10.0, creates two equal subnets, each one with 126 hosts.
Subnetting Formulas
Use 2n, to calculate the number of subnets.
Use 2h-2 to calculate the number of hosts.
n is the number allocated to the network portion of the address.
h is the number allocated to the host portion of the address.
Creating 4 Subnets
A subnet mask of /26 applied to 192.168.10.0, creates four equal subnets, each one with 62 hosts.
n = 2 and therefore 22 = 4.
h = 6 and therefore 26-2 = 62.
Subnetting a /16 and /8 Prefix
Creating Subnets with a /16 Prefix
A subnet mask of /16 applied to 172.16.32.0, creates a network with 65534 hosts.
A subnet mask of /18 applied to 172.16.32.0, creates 4 networks with 16382 hosts in each network.
A subnet mask of /22 applied to 172.16.32.0, creates 64 networks with 1022 hosts in each network.
Creating 100 Subnets with a /16 Prefix
A subnet mask of /23 applied to 172.16.32.0, creates 128 networks with 510 hosts in each network
Calculating the Hosts
Use 2h-2 to calculate the number of hosts.
h is the number allocated to the host portion of the address.
Creating 1000 Subnets with a /8 Prefix
A subnet mask of /18 applied to 20.0.0.0, creates 1024 networks with 16382 hosts in each network

Subnetting to Meet Requirements


Subnetting Based on Host Requirements
Two considerations when planning subnets:
The number of host addresses required for each network.
The number of individual subnets needed.
Subnetting Based on Network Requirements
Administrators may be asked to subnet an IP range to accommodate a specific number of networks.
Think of a company with 7 departments where each department must have its own subnetwork.
The number of hosts per subnet, while secondary, is also important.
Network Requirement Example
Assume the range 200.42.98.0/24 was given to the administrator.
7 subnets must be created.
Each department will have no more than 29 hosts.
A subnet mask of /27 applied to 200.42.98.0/24, creates 8 networks with 30 hosts in each network.

Benefits of Variable Length Subnet Masking


Traditional Subnetting Wastes Addresses
Subnetting based on classes is not very flexible.
Results in wasted addresses.
Variable Length Subnet Masks
By varying the mask, an administrator has more control.
Less waste.
Basic VLSM
A subnet mask of /30 applied to 200.42.98.0, creates a network with 2 hosts in each network.
The network 200.42.98.0/30 would be a perfect match for a serial link.
VLSM in Practice
Consider two routers connected by a Serial link:
RouterA would be 200.42.98.1/30 and RouterB would be 200.42.98.2/30.
200.42.98.0/30 is the network address and 200.42.98.3/30 is the broadcast address.

8.2 Addressing Schemes

Structured Design
Network Address Planning
Planning requires decisions on each subnet in terms of size, the number of hosts per subnet and how host
addresses will be assigned.
Planning to Address the Network
The Primary Planning Considerations are:
Prevent Duplication of Addresses
Monitor Security and Performance
Provide and Control Access
Assigning Addresses to Devices
Different devices needs may also impact the addressing scheme.
Common devices are:
– End user devices, servers, printers, network devices and gateways

8.3 Design Considerations for IPv6

Structured Design
The IPv6 Global Unicast Address
The IPv6 global unicast address normally consists of a /48 global routing prefix, a 16 bit subnet ID, and a 64 bit
interface ID.
Subnetting Using Subnet ID
The subnet ID provides plenty subnets and host support in one subnet.
The subnet ID alone allows for creating up to 65,536 /64 subnets.
IPv6 Subnet Allocation
Address waste is not a concern in IPv6.
Administrators can concentrate on designing a logical scheme to address the network

8.4 Chapter Summary


Summary
Implement an IPv4 addressing scheme to enable end-to-end connectivity in a small to medium-sized business
network.
Given a set of requirements, implement a VLSM addressing scheme to provide connectivity to end users in a
small to medium-sized network.
Explain design considerations for implementing IPv6 in a business network.

Section 6.1 New Terms and Commands


Subnetting
Classful Boundary
Classless Subnetting
Magic number
Variable Length Subnet Mask (VLSM)
Global Routing Prefix

Download Slide PowerPoint (pptx):

Related Articles
Search the site

Menu 

CCNA 1 v6.0 Study Material – Chapter 9: Transport Layer


 Sep 6, 2017 |  Last updated on: Sep 6, 2017 |  CCNA 1 Instructor Materials |  No Comments

Chapter 9 – Sections & Objectives


9.0 Introduction
9.1 Subnetting an IPv4 Network
Describe the purpose of the transport layer in managing the transportation of data in end-to-end
communication.
Describe characteristics of the TCP and UDP protocols, including port numbers and their uses.
9.2 Addressing Schemes
Explain how TCP session establishment and termination processes facilitate reliable communication.
Explain how TCP protocol data units are transmitted and acknowledged to guarantee delivery.
Describe the UDP client processes to establish communication with a server.
Compare UDP and TCP.
9.3 Summary

9.1 Transport Layer Protocols

Transportation of Data
Role of the Transport Layer
Responsible for establishing a temporary communication session between two applications and delivering data
between them.
Provides Connection-oriented data stream support, Reliability, Flow control, Multiplexing
Transport Layer Responsibilities
Track individual conversations.
Segment Data and Reassemble Segments.
Identify the Applications.
Conversation Multiplexing
Segments data into small chunks.
Label data chunks according to the conversation.
Transport Layer Reliability
Two protocols provided: TCP and UDP.
TCP supports reliability while UDP doesn’t.
TCP
Supports packet delivery confirmation.
There are three basic operations that enable reliability with TCP:
Numbering and tracking data segments transmitted to a specific host from a specific application
Acknowledging received data
Retransmitting any unacknowledged data after a certain period of time
UDP
UDP provides the basic functions for delivering data segments between the appropriate applications, with very
little overhead and data checking.
Perfect for applications that don’t require reliability.
The Right Transport Layer Protocol for the Right Application
TCP is better for databases, web browsers, email clients, etc.
UDP is better for live audio or video streaming, VoIP, etc.

TCP and UDP Overview


TCP Features
Establishing a session
Reliable delivery
Same-Order delivery
Flow control
TCP Header
TCP is a stateful protocol.
TCP adds 20 bytes of overhead in the segment header.

UDP Features
Simple and fast.
UDP Header
UDP is a stateless protocol.
Reliability must be handled by the application.
The pieces of communication in UDP are called Datagrams.
UDP adds only 8 bytes of overhead.
Multiple Separate Conversations
The transport layer separate sand manages multiple communications with different transport requirements.
Different applications are sending and receiving data over the network simultaneously.
Unique header values allow TCP and UDP to manage these multiple and simultaneous conversations by
identifying these applications.
These unique identifiers are the port numbers.
Port Numbers
Usually seen in pairs: source port and destination port.
The source port is dynamically chosen by the sender.
The destination port is used to identify an application on the server (destination).

Socket Pairs
The combination of the source IP address and source port number, or the destination IP address and
destination port number, is known as a socket.
The socket is used to identify the server and service being requested by the client.
Two sockets combine to form a socket pair: (192.168.1.5:1099, 192.168.1.7:80).
Sockets enable multiple processes running on a client and multiple connections to a server process to be
distinguished from each other.
Port Number Groups
The IANA has created three port number groups:
Well-known ports (0 to 1023)
Registered Ports (1024 to 49151)
Private and/or Dynamic Ports (49152 to 65535)
The netstat Command
Netstat allows a user to see active connections in a host.
Netstat also displays the process using the connection.
9.2 TCP and UDP

TCP Communication Process


TCP Server Processes
Each application process running on the server uses a port number.
An individual server cannot have two services assigned to the same port number within the same transport
layer service.
An active server application assigned to a specific port is considered to be open.
Any incoming client request addressed to an open port is accepted and processed by the server application
bound to that port.
There can be many ports open simultaneously on a server, one for each active server application.
TCP Connection Establishment
A TCP connection is established in three steps:
The initiating client requests a client-to-server communication session with the server.
The server acknowledges the client-to-server communication session and requests a server-to-client
communication session.
The initiating client acknowledges the server-to-client communication session.
TCP Session Termination
The FIN TCP flag is used to terminate a TCP connection.
When the client has no more data to send in the stream, it sends a segment with the FIN flag set.
The server sends an ACK to acknowledge the receipt of the FIN to terminate the session from client to server.
The server sends a FIN to the client to terminate the server-to-client session.
The client responds with an ACK to acknowledge the FIN from the server.
When all segments have been acknowledged, the session is closed.
TCP Three-way Handshake Analysis
The three-way handshake:
Establishes that the destination device is present on the network.
Verifies that the destination device has an active service and is accepting requests on the destination port
number that the initiating client intends to use
Informs the destination device that the source client intends to establish a communication session on that port
number.

Reliability and Flow Control


TCP Reliability – Ordered Delivery
TCP segments use sequence numbers to uniquely identify and acknowledge each segment, keep track of
segment order, and indicate how to reassemble and reorder received segments.
An initial sequence number (ISN) is randomly chosen during the TCP session setup. The ISN is then
incremented by the number of transmitted bytes.
The receiving TCP process buffers the segment data until all data is received and reassembled.
Segments received out of order are held for later processing.
The data is delivered to the application layer only when it has been completely received and reassembled.

TCP Flow Control – Window Size and Acknowledgments


TCP provides mechanisms for flow control.
Flow control ensures the TCP endpoints can receive and process data reliably.
TCP handles flow control by adjusting the rate of data flow between source and destination for a given session.
TCP flow control function relies on a 16-bit TCP header field called the Window size. The window size is the
number of bytes that the destination device of a TCP session can accept and process at one time.
TCP source and destination agree on the initial window size when the TCP session is established
TCP endpoints can adjust the window size during a session if necessary.

TCP Flow Control – Congestion Avoidance


Network congestion usually results in discarded packets.
Undelivered TCP segments trigger re-transmission. TCP segment retransmission can make the congestion
even worse.
The source can estimate a certain level of network congestion by looking at the rate at which TCP segments
are sent but not acknowledged.
The source can reduce the number of bytes it sends before receiving an acknowledgement upon congestion
detection.
The source reduces the number of unacknowledged bytes it sends and not the window size, which is
determined by the destination.
The destination is usually unaware of the network congestion and sees no need to suggest a new window size.

UDP Communication
UDP Low Overhead Vs. Reliability
UDP has much lower overhead than TCP.
UDP is not connection-oriented and does not offer the sophisticated retransmission, sequencing, and flow
control mechanisms.
Applications running UDP can still use reliability, but it must be implemented in the application layer.
However, UDP is not inferior.
UDP Datagram Reassembly
UDP simply reassembles the data in the order in which it was received.
The application must identify the proper sequence, if necessary.
UDP Server Processes and Requests
UDP-based server applications are also assigned well-known or registered port numbers.
Requests received on a specific port are forwarded to the proper application based on port numbers.
UDP Client Processes
UDP client-server communication is also initiated by a client application.
The UDP client process dynamically selects a port number and uses this as the source port.
The destination port is usually the well-known or registered port number assigned to the server process.
The same source-destination pair of ports is used in the header of all datagrams used in the transaction.
Data returning to the client from the server uses a flipped source and destination port numbers in the datagram
header.

TCP or UDP
Applications that Use TCP
TCP handles all transport layer related tasks.
This frees the application from having to manage any of these tasks.
Applications can simply send the data stream to the transport layer and use the services of TCP.
Applications that Use UDP
Live video and multimedia applications – Can tolerate some data loss, but require little or no delay. Examples
include VoIP and live streaming video.
Simple request and reply applications – Applications with simple transactions where a host sends a request and
may or may not receive a reply. Examples include DNS and DHCP.
Applications that handle reliability themselves – Unidirectional communications where flow control, error
detection, acknowledgements, and error recovery is not required or can be handled by the application. Examples
include SNMP and TFTP.

9.3 Summary

Summary
Implement an IPv4 addressing scheme to enable end-to-end connectivity in a small to medium-sized business
network.
Given a set of requirements, implement a VLSM addressing scheme to provide connectivity to end users in a
small to medium-sized network.
Explain design considerations for implementing IPv6 in a business network.

Chapter 9 New Terms and Commands


Segmentation
Multiplexing
Transmission Control Protocol (TCP)
Flow Control
User Datagram Protocol (UDP)
Port Addressing
Socket
Three-way Handshake
Initial Sequence Number (ISN)
Sequence Numbers
Window Size
Flow Control – Congestion Avoidance

Download Slide PowerPoint (pptx):

Related Articles
Search the site

Menu 

CCNA 1 v6.0 Study Material – Chapter 10: Application Layer


 Sep 6, 2017 |  Last updated on: Sep 6, 2017 |  CCNA 1 Instructor Materials |  No Comments

Chapter 10 – Sections & Objectives


10.0 Introduction
10.1 Application Layer Protocols
Explain how the functions of the application layer, session layer, and presentation layer work together to
provide network services to end user applications.
Explain how common application layer protocols interact with end user applications.
10.2 Well-Known Application layer Protocols and Services
Explain how web and email protocols operate.
Explain how the IP addressing protocols operate.
Explain how file transfer protocols operate.
10.3 Summary

10.1 Application Layer Protocols

Application, Presentation, Session


Application Layer
Closest to the end user.
Application layer protocols help exchange data between programs running on the source and destination
hosts.
The TCP/IP application layer performs the functions of the upper three layers of the OSI model.
Common application layer protocols include: HTTP, FTP, TFTP, DNS.
Presentation and Session Layer
Format data, compress and encrypt data
Common standards for video include QuickTime and Motion Picture Experts Group (MPEG).
Common graphic image formats are: GIF, JPEG and PNG
The session layer creates and maintains dialogs between source and destination applications.
The session layer handles the exchange of information to initiate dialogs, keep them active, and to restart
sessions that are disrupted or idle.
TCP/IP Application Layer Protocols
TCP/IP application protocols specify the format and control information necessary for common Internet
functions.
Application layer protocols must be implemented in both the source and destination devices.
Application layer protocols implemented on the source and destination host must be compatible to allow
communication.

How Application Protocols Interact with End-User Applications


Client-Server Model
Clients request information while servers provide it.
Client and server processes are considered to be in the application layer.
The contents of the data exchange will depend of the application in use.
Email is an example of a Client-Server interaction.
Peer-to-Peer Networks
Data is accessed without the use of a dedicated server.
Two or more computers can be connected to a P2P network to share resources.
Every connected end device (a peer) can function as both a server and a client.
The roles of client and server are set on a per-request basis.

Peer-to-Peer Applications
Some P2P applications use a hybrid system, where resource sharing is decentralized.
Indexes that point to resource locations are stored in a centralized directory.
In a hybrid system, each peer accesses an index server to get the location of a resource stored on another
peer.
Common P2P Applications
Common P2P networks include: eDonkey, G2, BitTorrent.
Many P2P applications allow users to share pieces of many files with each other at the same time.
A small torrent file contains information about the location of other users and tracker computers.
Trackers are computers keeping track of the files hosted by users.
This technology is called BitTorrent. There are many BitTorrent clients, including BitTorrent, uTorrent,
Frostwire, and qBittorrent.
10.2 Well-Known Application Layer Protocols and Services

Web and Email Protocols


Hypertext transfer Protocol and Hypertext Markup Language
A URL is a reference to a web server.
URLs and URIs are the names most people associate with web addresses.
URLs contain the protocol, the server name and the requested filename.
Using DNS, the server name portion of the URL is then translated to the associated IP address before the
server can be contacted.
HTTP and HTTPS
The browser sends a GET request to the server’s IP address and asks for the index.html file.
The server sends the requested file to the client.
The index.html was specified in the URL and contains the HTML code for this web page.
The browser processes the HTML code and formats the page for the browser window based on the code in the
file.
HTTP Is not secure. Messages can be intercepted.
HTTPS uses authentication and encryption to secure data.
Email Protocols
Email is a store-and-forward method of sending, storing, and retrieving electronic messages.
Email messages are stored on mail servers.
Email clients communicate with mail servers to send and receive email.
Mail servers communicate with other mail servers to transport messages from one domain to another.
Email relies on three separate protocols for operation: SMTP,POP and IMAP.
SMTP Operation
SMTP message formats require a message header and body.
The header must have a properly formatted recipient email address and a sender address.
An SMTP client sends an email by connecting to a SMTP server on port 25.
The server receives the message and stores it in a local mailbox or relays the message to another mail server.
Users use email clients to retrieve messages stored on the server.
POP Operation
Messages are downloaded from the server to the client.
Email clients direct their POP requests to mail servers on port TCP 110.
POP allows for email messages to be downloaded to the client’s device (computer or phone) and removed
from the server.
A downloaded message resides on the device that triggered the download.
IMAP Protocols
IMAP is another protocol used to retrieve email messages.
Allows for messages to be displayed to the user rather than downloaded.
The original messages reside on the server until manually deleted by the user.
Users view copies of the messages in their email client software.
Support folder hierarchy to organize and store mail.
When a user decides to delete a message, the server synchronizes that action and deletes the message from
the server.

IP Addressing Services
Domain Name Service
IP addresses are not easy to memorize.
Domain names make server addresses more user-friendly.
Computers still need the actual numeric address before they can communicate.
The DNS protocol allows for the dynamic translation of a domain name into the associated IP address.
DNS Message Format
Common DNS records are A, NS, AAAA and MX.
DNS servers search its own records first, relaying the client’s request to other servers if it can’t resolve the
request.
The response is then forwarded to the client.
The client often stores previous name resolutions. Use the ipconfig /displaydns to list cached DNS entries on
Windows.

DNS Hierarchy
The DNS protocol uses a hierarchical system.
The naming structure is broken down into small, manageable zones.
Each DNS server is only responsible for managing name-to-IP mappings for a small portion of the DNS
structure.
Requests for zones not stored in a specific DNS server are forwarded to other servers for translation.
Top-level domains represent either the type of domain or the country of origin. Examples of top-level domains
are .com, .org, .au and .co
The nslookup Command
Use nslookup to place DNS queries.
Useful for DNS troubleshooting.

Dynamic Host Configuration Protocol


Computers need network IP information to communicate over a network.
IP information include host and gateway addresses, mask, and DNS server.
DHCP allows for automated and scalable distribution of IP information.
DHCP-distributed addresses are leased for a set period of time.
Addresses are returned to the pool for reuse when no longer in use.
DHCP supports IPv4 and DHCPv6 supports IPv6.
DHCP Operation
The client broadcasts a DHCPDISCOVER.
A DHCP server replies with DHCPOFFER.
The client sends a DHCPREQUEST message to the server it wants to use (in case of multiple offers).
A client may also request an address previously been allocated by the server.
The server returns a DHCPACK to confirm the lease has been finalized.

File Sharing Services


File Transfer Protocol
FTP was developed to allow the transfer of files over the network.
An FTP client is an application that runs on a client computer used to push and pull data from an FTP server.
FTP requires two connections between the client and the server: one connection for commands and replies
and another connection for the actual file transfer.
The client initiates and establishes the first connection to the server for control traffic on TCP port 21.
The client then establishes the second connection to the server for the actual data transfer on TCP port 20.
The client can download (pull) data from the server or upload (push) data to the server.

Server Message Block


SMB is a client/server file sharing protocol.
All SMB messages share a common format.
SMB file-sharing and print services have become the mainstay of Windows networking.
Microsoft products now support TCP/IP protocols to directly support SMB resource sharing.
After the connection is established, the user of the client can access the resources on the server as if the
resource is local to the client host.
The Mac, LINUX, and UNIX operating systems have their own implementation of SMB.
10.3 Summary

Summary
Explain the operation of the application layer in providing support to end-user applications.
Explain how well-known TCP/IP application layer protocols and services operate.

Chapter 10 New Terms and Commands


Hypertext Transfer Protocol (HTTP)
File Transfer Protocol (FTP)
Trivial File Transfer Protocol (TFTP)
Internet Message Access Protocol (IMAP)
Domain Name System (DNS)
Simple Mail Transport Protocol (SMTP)
Post Office Protocol (POP)
Dynamic Host Configuration Protocol (DHCP)

QuickTime and Motion Picture Experts Group (MPEG)


Graphics Interchange Format (GIF)
Joint Photographic Experts Group (JPEG)
Portable Network Graphics (PNG)
BOOTP
HTTPS
Client-server model
Peer-to-peer network (P2P)
P2P networks
P2P applications

Gnutella protocol
BitTorrent
Uniform Resource Locator (URL)
Uniform Resource Identifier (URIs)
Get
Post
Put
HTTP Secure (HTTPS)
Secure Socket Layer (SSL)
Simple Mail Transfer Protocol (SMTP)
Post Office Protocol (POP)
Chapter 10 New Terms and Commands
IMAP
Port 25 (SMTP)
TCP Port 110 (POP)
Domain name
DNS Protocol
Record types: A, NS, AAAA, MX
ipconfig /displaydns
Top-level domains are: .com, .org, .au, .co
10.2.2.4
Nslookup
10.2.2.5

Dynamic Host Configuration Protocol (DHCP) for IPv4


DHCPv6
10.2.2.6
DHCP Discover
DHCP Offer
DHCP Request
DHCP Acknowledgement
DHCP Negative Acknowledgement
DHCPv6: SOLICIT, ADVERTISE, INFORMATION REQUEST, and REPLY

10.2.3.1
FTP daemon (FTPd)
10.2.3.2
Server Message Block (SMB)

Download Slide PowerPoint (pptx):

Related Articles
Search the site

Menu 

CCNA 1 v6.0 Study Material – Chapter 11: Build a Small Network


 Sep 6, 2017 |  Last updated on: Sep 6, 2017 |  CCNA 1 Instructor Materials |  No Comments

Chapter 11 – Sections & Objectives


11.1 Network Design
Identify the devices used in a small network.
Identify the protocols used in a small network.
Explain how a small network serves as the basis of larger networks.
11.2 Network Security
Explain why security measures are necessary on network devices.
Identify security vulnerabilities.
Identify general mitigation techniques.
Configure network devices with device hardening features to mitigate security threats.
Apply the commands to back up and restore an IOS configuration file.
11.3 Basic Network Performance
Use the output of the ping command to establish relative network performance.
Use the output of the tracert command to establish relative network performance.
Use show commands to verify the configuration and status of network devices.
Use host and IOS commands to acquire information about network devices.
11.4 Network Troubleshooting
Apply troubleshooting methodologies to resolve problems
Troubleshoot interface and cable issues
Troubleshoot client connectivity issues involving DNS

11.1 Network Design

Network Design Devices in a Small Network


Small Network Topologies
Comprises one router, a couple of switches, and the user PCs.
Access to Internet through a single WAN link, cable or DSL.
Management usually by a third party company.

Device Selection for a Small Network


Security, QoS, VoIP, L3 switching, NAT, and DHCP

IP Addressing for a Small Network


Address space is a crucial component of a network design.
All devices connected to the network require an address.
The address scheme must be planned, documented, and maintained.
Address space documentation can be very useful for:
Troubleshooting and control
Address documentation is also very important when controlling resource access.

Redundancy in a Small Network


A network should reliable by design.
Network failures are usually very costly.
Redundancy increases reliability by eliminating single points of failure.
Network redundancy can be achieved by duplicating network equipment and links.
A good example is a network’s link to the Internet or to a server farm.
Traffic Management
Traffic type and patterns are should also be considered when designing a network.
A good network design categorizes traffic according to priority.

Small Network Applications and Protocols


Common Applications
Network Applications
Used to communicate over the network.
Email clients and web browsers are examples of this type of application.
Application Layer Services
Programs that interface with the network and prepare the data for transfer.
Each service uses protocols, which define the standards and data formats to be used.
Common Protocols
Processes on either end of a communication session
How messages are sent and the expected response
Types and syntax of messages
Meaning of informational fields
Interaction with the next lower layer
Voice and Video Applications
Infrastructure
VoIP
IP Telephony
Real-time Applications
Scale to Larger Networks
Small Network Growth
To scale a network, several elements are required:
Network documentation
Device inventory
Budget
Traffic analysis

Protocol Analysis
Understand the protocols in use in the network.
Protocol analyzers are tools designed to help in that task.
Capture traffic in high-utilization times and in different locations of the network.
Analysis results allow for more efficient way to manage traffic.

Employee Network Utilization


Be aware of how network use is changing.
A network administrator can create in-person IT snapshots” of employee application utilization.
11.2 Network Security

Security Threats and Vulnerabilities


Types of Threats
Digital intrusion can be costly.
Intruders can gain access through software vulnerabilities, hardware attacks, or stolen credentials.
Common types of digital threats include those listed in this graphic.
Physical Security
Hardware
Environmental
Electrical
Maintenance
Types of Vulnerabilities
Three primary vulnerabilities: technological, configuration, and security policy
Endpoints can be under attack ,such as servers and desktop computers.
Any of these three vulnerabilities can be exploited and used in attacks.

Network Attacks
Types of Malware
Viruses
Worms
Trojan Horses
Reconnaissance Attacks
Discovery and mapping of systems and services
Acquire enough information on the target system or network to facilitate the search for vulnerabilities.
Common tools rely mostly on free and public Internet services, such as DNS and Whois.
Port-scanners and packet sniffers are also commonly used in reconnaissance.
Access Attacks
Password Attacks
Trust Exploitation
Port Redirection
Man-in-the-Middle

Denial of Service Attacks


Although simple, DoS attacks are still dangerous.
Prevent authorized people from using a service by consuming system resources.
Prevent DoS attacks by applying the latest security updates.
Common DoS Attacks:
Ping of Death
SYN Flood
DDoS
Smurf Attack

Network Attack Mitigation


Backup, Upgrade, Update, and Patch
Keeping up-to-date with the latest developments
Enterprises need to keep current with the latest versions of antivirus software.
Patches for all known vulnerabilities must be applied.
A central patch server for managing a large number of servers and systems.
Patches should be installed without user intervention.
Authentication, Authorization, and Accounting
AAA services provide access control on a network device.
Authentication – access a resource
Authorization – what they can do
Accounting – actions performed while accessing the resource
The AAA framework can be very helpful when mitigating network attacks.
Firewalls
A firewall controls the traffic and helps prevent unauthorized access
Techniques for determining what is permitted or denied access to a network include:
Packet filtering
Application filtering
URL filtering
Stateful packet inspection (SPI)
Endpoint Security
Common endpoints are laptops, desktops, servers, smartphones, and tablets.
Securing endpoint devices is challenging.
Employees need to be trained on proper use of the network.
Policies often include the use of antivirus software and host intrusion prevention.
More comprehensive endpoint security solutions rely on network access control.

Device Security
Device Security Overview
Default settings are dangerous because they are well-known.
Cisco routers have the Cisco AutoSecure feature.
In addition, the following apply for most systems:
Change default usernames and passwords immediately
Restrict access to system resources to authorized individuals only.
Turn off unnecessary services.
Update any software and install any security patches prior to production operation.
Passwords
Use strong passwords. A strong password has/is:
At least 8 characters, preferably 10 or more
A mix of uppercase and lowercase letters, numbers, symbols, and spaces.
No repetition, no common dictionary words, no letter or number sequences, no usernames, relative, or pet
names, and no other easily identifiable pieces of information
Misspelled words
Changed often
Cisco routers support the use of a phrase made of many words, which is called a passphrase.
Basic Security Practices
Strong passwords are only as useful as they are secret.
The service password-encryption command encrypts the passwords in the configuration.
The security passwords min-length command ensures all configured passwords have a minimum specified
length.
Blocking several consecutive login attempts helps minimize password brute-force attacks.
login block-for 120 attempts 3 within 60 will block login attempts for 120 seconds if there are three failed login
attempts within 60 seconds.
exec timeout automatically disconnect idle users on a line
Enable SSH
Telnet is not secure.
It is highly recommended to use SSH for remote shell protocol.
To configure a Cisco device to support SSH takes four steps:
Step 1. Ensure that the router has a unique hostname and a IP domain name.
Step 2. Generate the SSH keys.
Step 3. Create a local username.
Step 4. Enable vty inbound SSH sessions.
The router can now be remotely accessed only by using SSH.

11.3 Basic Network Performance


The ping Command
Interpreting Ping Results
Using the ping command is an effective way to test connectivity.
Use the Internet Control Message Protocol (ICMP) to verify Layer 3 connectivity.
Help to identify the source of the problem.
What do these common ping indicators tell you?
–! .U
Extended Ping
– Allows for more options
Network Baseline
Built over a period of time.
Saved results from commands, such as ping or trace, along with error messages an response times
Time stamped for later comparison.
Increased response time could indicate latency issue.

The traceroute and tracert Command


Interpreting Trace Message
Returns a list of hops as a packet is routed through a network.
Use tracert for Windows-based systems.
Use traceroute for Cisco IOS and UNIX-based systems.
Extended Traceroute
Allows adjustment of parameters
Command terminates when:
Destination responds with an ICMP echo reply
User interrupts the trace with the escape sequence
Show Commands
The Cisco IOS CLI show commands are powerful troubleshoot tools.
The show commands display configuration files, checking the status of device interfaces and processes, and
verifying the device operational status.
The status of nearly every process or function of the router can be displayed using a show command.
Some of the more popular show commands are:
show running-config
show interfaces
show arp
show ip route
show protocols
show version

Host and IOS Commands


The ipconfig Command
Display IP and default gateway information on a Windows-based computer.
What do these commands display?
ipconfig /all
ipconfig /displaydns
The arp Command
The arp –a command lists all devices currently in the ARP cache of the host.
The cache can be cleared by using the arp -d command.
The show cdp neighbors Command
CDP is a Cisco-proprietary protocol that runs at the data link layer.
Two or more Cisco network devices can learn about each other even if Layer 3 connectivity does not exist.
CDP can be a security risk.
To disable CDP globally, use the global configuration command no cdp run.
To disable CDP on an interface, use the interface command no cdp enable.
What information does the cdp neighbors details command provide?
The show ip interface brief Command
Displays a summary of the key information for all the network interfaces on a router.
Verify the status of the switch interfaces.

Debugging
The debug Command
Allows the administrator to display
messages generated by the following
processes in real-time for analysis:
IOS processes
Protocols
Mechanisms
Events
undebug all turns off all debug commands
What are the available debug commands?
What can you do to limit the amount of displayed messages?
The terminal monitor Command
Displays the log messages while connected remotely, such as SSH
Stop displaying the log message: terminal no monitor

11.4 Network Troubleshooting

Troubleshooting Methodologies
Basic Troubleshooting Approaches
Identify the Problem
Establish a Theory of Probable Causes
Test the Theory to Determine Cause
Establish a Plan of Action to Resolve the Problem and Implement the Solution
Verify Full System Functionality and Implement Preventative Measures
Document Findings, Actions, and Outcomes
Resolve or Escalate?
Verify and Monitor Solution
What IOS commands can you use to verify and monitor the solution?

Troubleshoot Cables and Interfaces


Duplex Operation
Direction of data transmission between two devices
Two connected Ethernet network interfaces should operate in the same duplex mode for best performance
Duplex Mismatch
Log messages can indicate duplex mismatches.
What IOS commands can you use to determine duplex mismatch?

Troubleshooting Scenarios
IP Addressing Issues on IOS Devices
Manual assignment mistakes
DHCP-related issues
Which show commands?
IP Addressing Issues on End Devices
169.254.0.0/16 on Windows-based system
ipconfig to verify IP addresses assigned to a Windows-based system
Default Gateway Issues
Unable to communicate outside the network
ipconfig to verify default gateway assigned to a Windows-based system
Troubleshooting DNS Issues
ipconfig /all to determine DNS server used
nslookup to manually place DNS queries and analyze DNS response

11.5 Chapter Summary

Summary
Explain how a small network can scale into a larger network.
Configure switches and routers with device hardening features to enhance security.
Use common show commands and utilities to establish a relative performance baseline for the network.
Apply troubleshooting methodologies and command host and IOS commands to resolve problems.
Explain how a small network of directly connected segments is created, configured, and verifies.

Section 11.2 New Terms and Commands

Application Filtering
Authentication, Authorization, and Accounting (AAA)
auto secure (command)
exec timeout (command)
crypto key generate rsa general-keys modulus modulus-size (command)
endpoint security
ip domain-name domain-name (command)
login block-for 120 attempts 3 within 60 (command)

Packet Filtering
passphrase
Personal firewalls
security passwords min-length (command)
Stateful Packet Inspection (SPI)
service password-encryption (command)
transport input ssh
URL Filtering

Section 11.3 New Terms and Commands


!.U
Address Resolution Protocol (ARP)
exec timeout (command)
crypto key generate rsa general-keys modulus modulus-size (command)
ip domain-name domain-name (command)
ipconfig (host command)
login block-for 120 attempts 3 within 60 (command)
loopback address 127.0.0.1
ping (command)

security passwords min-length (command)


service password-encryption (command)
show cdp neighbors (IOS command)
show ip interface brief (IOS command)
tracert (host command)
traceroute (IOS command)
transport input ssh

Download Slide PowerPoint (pptx):

Related Articles

Das könnte Ihnen auch gefallen