Beruflich Dokumente
Kultur Dokumente
Address Classes
133 can be expressed as 10000101
specific network. • Local Broadcast Address: An users within the area of operation. • Copper
address with all bits set to binary 1s broadcasts to Media: This includes coaxial, UTP and STP, all of referred to as dotted-decimal.
all hosts on the local network. which are in common use in most office networks is 0x60. not ten)
16 separated by a decimal, and the notation is
and can suffer from signal attenuation and 0 left over. 96 in hex 10 (One Zero, into four octets of 8 bits each • Each octet is
Private IP Addresses - The following shows the electrical crosstalk. divided by 16 is 6 with F 15 • IPv4 addresses are 32 bits long • They are divided
IP addresses reserved for non-routable private IP Convert 96 to Hex. 96 E 14 some basics:
addresses by class. Wide Area Networking is 0x1A. D 13 binary is imperative to passing this test. Here are
• Class A: 10.0.0.0 through 10.255.255.255 • Circuit-switched: Connections are initiated when 10 left over. 26 in hex C 12 Knowing how to convert between decimal and
• Class B: 172.16.0.0 through 172.31.255.255 needed and terminated when not needed. divided by 16 is 1 with B 11 Binary Math
• Class C: 192.168.0.0 through 192.168.255.255 Telephone lines are circuit switched connections. Convert 26 to Hex. 26
A 10
• Packet-switched: A carrier shares resources 9 9 individual interfaces.
Subnetting among many customers, all using the network. with decimal.
1-800-418-6789
Basic subnetting will result in many wasted IP 1 PASS 5-4 =1 and DNS server information. User can also refresh
addresses or wasted subnets. As a result, you Service provider’s entire Frame address, IP address, subnet mask, default gateway
Cloud
0 FAIL 5-8
will use Variable Length Subnet Masks to create Relay network 0 FAIL 5 - 16
• Ipconfig - allows user to verify client’s MAC
subnets of subnets. These masks have a special Local Upstream and downstream 0 FAIL 5 - 32
Client-side Network Troubleshooting Tools
notation called slash notation, where the number Access Rate data rate
after the slash is the number of bits in the subnet
0 FAIL 5 - 64 of operation
Virtual Logical connection between
mask: 172.16.32.0/26 has the subnet
1 PASS 133 - 128 = 5 backs out to previous mode exit or logout
Circuit (VC) physically distant devices
mask 255.255.255.192.
Ends an IOS session or
Data Terminal End of the user’s network; serves For example:
or a specific command
Equipment as data source and destination ?
Computer Networks - Cisco creates several Gives help on all commands
Short for demarcation; where over to the next power.
classifications of networks, based on use Demarc Sets the routers internal clock clock
client ends and provider begins that bit is 0. If it does, then the remainder carries
and location: configuration modes
DLCI Data Link Connection Identifier
subtraction doesn’t produce a positive number, then
1-800-418-6789
configure
• Main Office: Computers connected via LAN. decimal number from each bit’s power of two. If the Opens various
• Branch Offices: Other LANS connected to the table continued To convert from decimal to binary, subtract the mode of operation
main office via WANs • Home Offices: Individuals
disable
Moves to a less privileged
PrepLogic PrepLogic
Powers of 2
table continued NNTP, DNS, FTP, HTTP, NTP, DHCP, Telnet Application
Committed burst - the most data Open Shortest Path First (OSPF) ASCII, MIME, SSL, TLS Presentation
Bc
of operation
a provider agrees to carry • Supports VLSM • Addresses a wide range of
enable NetBIOS, SAP, SDP, RTP, NWLink Session
Moves to a more privileged mode
Excess burst - the most data a large-network issues, including: TCP, UDP, SCTP Transport
Be
telnet <remote IP> Opens a telnet session
4 Speed of convergence 4 Network reachability
provider can carry information based on context NBF, IP, IPSec, ICMP, IGMP Network
4 Bandwidth usage 4 Method for path selection
Forward Explicit Congestion
show Frame Relay, HDLC, PPP
FECN
Displays a variety of useful Data Link
Notification through the network 802.3, 802.11a/b/g/n, MAC/LLC, ATM,
Backward Explicit Congestion The Routing Algorithms traceroute T1, 10BASE-T, V.34, V.35, I.430, I.431 Physical
BECN
Traces the path that packets take
Notification • Distance Vector: Calculate route information Verifies device connectivity ping Protocols OSI Layer
Discard Eligible - Lower- based on neighbor broadcasts and require very
De little overhead compared to link state. RIP and
priority traffic
IOS Commands OSI Model and Protocols
IGRP are distance vector protocols. • Link State:
1-800-418-6789
CIR Committed Information Rate
These use a system of databases stored internally
CCNA Pocket Guide
LMI Local Management Interface
to create a network map of best paths to various
destinations inside a network. OSPF is a link state 1-800-418-6789
The Router - A network-level device that transfers protocol. • Hybrid: Hybrids combine the best of
packets across subnets and networks-at-large based both Distance Vector and Link State, in addition to
www.preplogic.com
on routing tables. other metrics to create the best possible map of a
network. EIGRP is a hybrid protocol.
Boot Sequence
• POST Inter-LAN Communications
Pocket Guide
• Bootstrap loads IOS • Unicast: Packets addressed to a single system.
• Broadcast: Packets addressed to every system
PrepLogic ®
• IOS loads config from NVRAM
• Config is loaded and executed • Multicast: Packets addressed to systems that have
subscribed to the transmission.
Routing is performed with two methods of
path determination:
• Dynamic, where the router uses configured Switches - Data Link layer devices that separate
protocols • Static, where the admin has built devices connected to each interface into separate
routing tables manually. collision domains, reducing the amount of Ethernet
collisions created on large networks. Some switches
Routing tables will have three pieces of information: have intelligence processing, and so can be consid- us today at 1-800-418-6789.
A destination network, a next-hop association and ered multi-level devices. useful, fun and helpful. For more ways to learn, call Next-level protocol sending the datagram (8 bits)
the routing metric associated with the appropriate • Store and Forward: Copies the whole frame into a over 10 years, so we know what’s going to be datagram is considered valid (8 bits) • Protocol:
routing protocol. buffer, checks it for error, then sends it on its way. been helping the IT crowd pass their exams for • Time-To-Live (TTL): Identifies how long a
• Cut-Through: Less error-checking and sends the unique offerings that makes learning easier. We’ve transmission units (MTUs) in the Internet (13 bits)
RIP and RIPv2 frame on its way as soon as it receives it. Your PrepLogic Pocket Guide is just one of our datagrams to allow differing maximum
• Uses a simple hop-count metric, with a maximum • Fragment Free: Frame is held until the first 64 • Fragment offset: Provides fragmentation of
count of 15 • RIP cannot understand VLSM, while bytes and copied, which is where it checks • Data: Upper-layer protocol data (varies) • Flags: Specifies if fragmenting should occur (3 bits)
RIPv2 is classless and can. • RIPv2 can use for errors. such as loose source and strict source routing • Identification: Unique IP datagram value (16 bits)
multicast updates, instead of requiring Network testing, debugging, security, and others, • Total length: Total length (header + data) (16 bits)
broadcast updates. Spanning Tree Protocol - A Layer 2 protocol that destination IP address (32 bits) • IP options: handled; the first 3 bits are priority bits (8 bits)
provides fault tolerance for large networks, with address (32 bits) • Destination IP address: 32-bit and type of service: How the datagram should be
regard to link failures. STP prevents infinite loops by
1-800-418-6789
Interior Gateway Routing Protocol (IGRP) learning a networks topology and separating bridge
(16 bits) • Source IP address: 32-bit source IP Header length in 32-bit words (4 bits) • Priority
• Uses bandwidth and delay as its metric. • Can also • Header checksum: Integrity check on the header • Version: Version number (4 bits) • Header length:
ports into different states of readiness:
be configured to use MTU, load and reliability.
• Blocking • Listening • Learning
The IP Header
• Able to handle much larger networks.
• Forwarding • Disabled
shutdown command under an interface) Down
Down
Enhanced Interior Gateway Routing Virtual LANs (VLANs) - Broadcast domains that
Interface has been shutdown by an administrator (by using the Administratively
Protocol (EIGRP) can be configured on switches and also operate as network
Down Down
• Has all the same features of IGRP • Also uses TCP/IP subnets. Routers are necessary for their Interface is not physically intact and is not communicating on the
neighbor discovery and recovery • Takes operation. There are many benefits to (more common on serial connections)
Down Up
advantage of the Reliable Transport Protocol VLAN operation: Interface is physically intact but not communicating on the network
• Supports VLSM • Can track advertised routes • Reduced administration costs • Centralized Interface is connected and communicating Up Up
using DUAL administration control • Greater workgroup
1-800-418-6789
Protocol is…
Cause Interface is…
security • Controlled broadcast activity Line
• Increased performance • Physical
PrepLogic
PrepLogic PrepLogic PrepLogic PrepLogic
1-800-418-6789
Pocket Guide Instructions
Print your Pocket Guide on 8 ½” X 11” paper. It looks great in color, and works well in b/w, too.
1 2
1-800-418-6789
Start with Cover Page at top left Fold Pocket Guide in halves
3 4
1-800-418-6789
Use scissors to cut Pocket Guide in center Fold flaps to opposite ends
5 6 1-800-418-6789