Sie sind auf Seite 1von 2

Class D and E are reserved for special scenarios.

accessing main office resources over


D is for multicast addressing and E is for on-demand connections
experimental purposes. 1 2^0
on sight!
Cabling Learn to recognize the class of an IP address 2 2^1
Reserved Addresses • Fiber: Fiber cables use glass threads to transmit 133 = 128 + 0 + 0 + 0 + 0 + 4 + 0 + 1. 4 2^2
• Network Addresses: Addresses with binary 0s in data digitally. They have higher bandwidth, are 255.255.255.0 192 to 112 C
8 2^3
the host portion are reserved for network identifier thinner and lighter and can carry data father 255.255.0.0 128 to 191 B power is off.
IPs. 172.16.0.0 is a network address in a Class B without interference. The Cisco ONS 15454 is
16 2^4
255.0.0.0 1 to 126 A means the power is on. 0 means the
address. • Directed Broadcast Address: optimized for optical networks. • Wireless: Default Subnet Mask First Octet Class bit set represents a power of two. 1
32 2^5
Addresses with binary 1s in the host portion are Obviously cableless, wireless technologies allow in binary. Each 1 or 0 in the eight
64 2^6
broadcast addresses for all members of that Cisco admins to provide networking to mobile 128 2^7
1-800-418-6789

Address Classes
133 can be expressed as 10000101
specific network. • Local Broadcast Address: An users within the area of operation. • Copper
address with all bits set to binary 1s broadcasts to Media: This includes coaxial, UTP and STP, all of referred to as dotted-decimal.
all hosts on the local network. which are in common use in most office networks is 0x60. not ten)
16 separated by a decimal, and the notation is
and can suffer from signal attenuation and 0 left over. 96 in hex 10 (One Zero, into four octets of 8 bits each • Each octet is
Private IP Addresses - The following shows the electrical crosstalk. divided by 16 is 6 with F 15 • IPv4 addresses are 32 bits long • They are divided
IP addresses reserved for non-routable private IP Convert 96 to Hex. 96 E 14 some basics:
addresses by class. Wide Area Networking is 0x1A. D 13 binary is imperative to passing this test. Here are
• Class A: 10.0.0.0 through 10.255.255.255 • Circuit-switched: Connections are initiated when 10 left over. 26 in hex C 12 Knowing how to convert between decimal and
• Class B: 172.16.0.0 through 172.31.255.255 needed and terminated when not needed. divided by 16 is 1 with B 11 Binary Math
• Class C: 192.168.0.0 through 192.168.255.255 Telephone lines are circuit switched connections. Convert 26 to Hex. 26
A 10
• Packet-switched: A carrier shares resources 9 9 individual interfaces.
Subnetting among many customers, all using the network. with decimal.
1-800-418-6789

any change to the Cisco device, including changes to


This is the process of breaking larger networks up Packets are transmitted from across the larger so it’s not confused 8 8
3. Global Configuration Mode - Where you make
into smaller subnetworks by borrowing bits from network between client networks invisibly, so that or h before the number, 7 7
only mode where changes can be saved.
the host portion of a network address to create the the WAN stays succinct. Frame Relay is a packet a hex number with 0x 6 6
troubleshooting and testing utilities and is the
subnets. Borrowing in this way changes the default switched WAN. • Point-to-point: An expensive customary to represent 5 5
2. Privileged Mode - Provides access to
subnet. Every bit borrowed increases the number of technology where companies lease lines of longer divisible. It’s 4 4 to see the router type and IOS version number.
subnets by a power of 2. transmission through the carrier network for until the number is no 3 3 and only allows for show interface commands and
exclusive use. • Multiplexing: The process of most bit. Keep dividing 2 2 1. User Mode - Least privileged mode of operation,
An example of a class C address, subnetted through sharing bandwidth on multiple data channels to The result is the right- 1 1 Modes of Operation
6 borrowed bits. Notice how, for every subnet bit make a single data channel for transmission. There want to convert by 16.
0 0
taken, it creates 2^n-2 subnets: are three types: divide the number you
Hex Decimal
4 Time-Division Multiplexing (TDM) In order to convert, pings a network client has stored in its cache.
4 Frequency-Division Multiplexing (FDM)
user to verify Layer 2 and Layer 3 address ma
Subnets Hosts Class C Mask Subnet Bits 4 Statistical Multiplexing Hexadecimal uses a 16 digit numerical system. servers to diagnose DNS issues. • Arp - allows
2 62 255.255.255.192 2 • ISDN: Integrated Services Digital Network is a set know how to convert from decimal to hexadecimal. - allows user to send multiple queries to DNS
4 30 255.255.255.224 3 of communication protocols that permit telephone In order to account for IPv6 Addresses, you’ll need to through from source to destination. • Nslookup
6 14 255.255.255.240 4 networks to carry data. • DSL: Digital Subscriber Hexadecimal Conversions through every server and gateway it must pass
14 6 255.255.255.248 5 Line is a more modern version of ISDN that
• Tracert - allows user to trace the route of a packet
provides much faster broadband speed.
device by sending a brief packet of information.
62 2 255.255.255.252 6 • Ping - allows user to verify connectivity to a distant
1 PASS 1-1 =0
0 FAIL 1-2 and renew IP information with /release and /renew
Important Frame Relay Terminology
1-800-418-6789

Basic subnetting will result in many wasted IP 1 PASS 5-4 =1 and DNS server information. User can also refresh
addresses or wasted subnets. As a result, you Service provider’s entire Frame address, IP address, subnet mask, default gateway
Cloud
0 FAIL 5-8
will use Variable Length Subnet Masks to create Relay network 0 FAIL 5 - 16
• Ipconfig - allows user to verify client’s MAC
subnets of subnets. These masks have a special Local Upstream and downstream 0 FAIL 5 - 32
Client-side Network Troubleshooting Tools
notation called slash notation, where the number Access Rate data rate
after the slash is the number of bits in the subnet
0 FAIL 5 - 64 of operation
Virtual Logical connection between
mask: 172.16.32.0/26 has the subnet
1 PASS 133 - 128 = 5 backs out to previous mode exit or logout
Circuit (VC) physically distant devices
mask 255.255.255.192.
Ends an IOS session or
Data Terminal End of the user’s network; serves For example:
or a specific command
Equipment as data source and destination ?
Computer Networks - Cisco creates several Gives help on all commands
Short for demarcation; where over to the next power.
classifications of networks, based on use Demarc Sets the routers internal clock clock
client ends and provider begins that bit is 0. If it does, then the remainder carries
and location: configuration modes
DLCI Data Link Connection Identifier
subtraction doesn’t produce a positive number, then
1-800-418-6789

configure
• Main Office: Computers connected via LAN. decimal number from each bit’s power of two. If the Opens various
• Branch Offices: Other LANS connected to the table continued To convert from decimal to binary, subtract the mode of operation
main office via WANs • Home Offices: Individuals
disable
Moves to a less privileged
PrepLogic PrepLogic

Powers of 2
table continued NNTP, DNS, FTP, HTTP, NTP, DHCP, Telnet Application
Committed burst - the most data Open Shortest Path First (OSPF) ASCII, MIME, SSL, TLS Presentation
Bc
of operation
a provider agrees to carry • Supports VLSM • Addresses a wide range of
enable NetBIOS, SAP, SDP, RTP, NWLink Session
Moves to a more privileged mode
Excess burst - the most data a large-network issues, including: TCP, UDP, SCTP Transport
Be
telnet <remote IP> Opens a telnet session
4 Speed of convergence 4 Network reachability
provider can carry information based on context NBF, IP, IPSec, ICMP, IGMP Network
4 Bandwidth usage 4 Method for path selection
Forward Explicit Congestion
show Frame Relay, HDLC, PPP
FECN
Displays a variety of useful Data Link
Notification through the network 802.3, 802.11a/b/g/n, MAC/LLC, ATM,
Backward Explicit Congestion The Routing Algorithms traceroute T1, 10BASE-T, V.34, V.35, I.430, I.431 Physical
BECN
Traces the path that packets take
Notification • Distance Vector: Calculate route information Verifies device connectivity ping Protocols OSI Layer
Discard Eligible - Lower- based on neighbor broadcasts and require very
De little overhead compared to link state. RIP and
priority traffic
IOS Commands OSI Model and Protocols
IGRP are distance vector protocols. • Link State:

1-800-418-6789
CIR Committed Information Rate
These use a system of databases stored internally
CCNA Pocket Guide
LMI Local Management Interface
to create a network map of best paths to various
destinations inside a network. OSPF is a link state 1-800-418-6789
The Router - A network-level device that transfers protocol. • Hybrid: Hybrids combine the best of
packets across subnets and networks-at-large based both Distance Vector and Link State, in addition to
www.preplogic.com
on routing tables. other metrics to create the best possible map of a
network. EIGRP is a hybrid protocol.
Boot Sequence
• POST Inter-LAN Communications

Pocket Guide
• Bootstrap loads IOS • Unicast: Packets addressed to a single system.
• Broadcast: Packets addressed to every system
PrepLogic ®
• IOS loads config from NVRAM
• Config is loaded and executed • Multicast: Packets addressed to systems that have
subscribed to the transmission.
Routing is performed with two methods of
path determination:
• Dynamic, where the router uses configured Switches - Data Link layer devices that separate
protocols • Static, where the admin has built devices connected to each interface into separate
routing tables manually. collision domains, reducing the amount of Ethernet
collisions created on large networks. Some switches
Routing tables will have three pieces of information: have intelligence processing, and so can be consid- us today at 1-800-418-6789.
A destination network, a next-hop association and ered multi-level devices. useful, fun and helpful. For more ways to learn, call Next-level protocol sending the datagram (8 bits)
the routing metric associated with the appropriate • Store and Forward: Copies the whole frame into a over 10 years, so we know what’s going to be datagram is considered valid (8 bits) • Protocol:
routing protocol. buffer, checks it for error, then sends it on its way. been helping the IT crowd pass their exams for • Time-To-Live (TTL): Identifies how long a
• Cut-Through: Less error-checking and sends the unique offerings that makes learning easier. We’ve transmission units (MTUs) in the Internet (13 bits)
RIP and RIPv2 frame on its way as soon as it receives it. Your PrepLogic Pocket Guide is just one of our datagrams to allow differing maximum
• Uses a simple hop-count metric, with a maximum • Fragment Free: Frame is held until the first 64 • Fragment offset: Provides fragmentation of
count of 15 • RIP cannot understand VLSM, while bytes and copied, which is where it checks • Data: Upper-layer protocol data (varies) • Flags: Specifies if fragmenting should occur (3 bits)
RIPv2 is classless and can. • RIPv2 can use for errors. such as loose source and strict source routing • Identification: Unique IP datagram value (16 bits)
multicast updates, instead of requiring Network testing, debugging, security, and others, • Total length: Total length (header + data) (16 bits)
broadcast updates. Spanning Tree Protocol - A Layer 2 protocol that destination IP address (32 bits) • IP options: handled; the first 3 bits are priority bits (8 bits)
provides fault tolerance for large networks, with address (32 bits) • Destination IP address: 32-bit and type of service: How the datagram should be
regard to link failures. STP prevents infinite loops by

1-800-418-6789
Interior Gateway Routing Protocol (IGRP) learning a networks topology and separating bridge
(16 bits) • Source IP address: 32-bit source IP Header length in 32-bit words (4 bits) • Priority
• Uses bandwidth and delay as its metric. • Can also • Header checksum: Integrity check on the header • Version: Version number (4 bits) • Header length:
ports into different states of readiness:
be configured to use MTU, load and reliability.
• Blocking • Listening • Learning
The IP Header
• Able to handle much larger networks.
• Forwarding • Disabled
shutdown command under an interface) Down
Down
Enhanced Interior Gateway Routing Virtual LANs (VLANs) - Broadcast domains that
Interface has been shutdown by an administrator (by using the Administratively
Protocol (EIGRP) can be configured on switches and also operate as network
Down Down
• Has all the same features of IGRP • Also uses TCP/IP subnets. Routers are necessary for their Interface is not physically intact and is not communicating on the
neighbor discovery and recovery • Takes operation. There are many benefits to (more common on serial connections)
Down Up
advantage of the Reliable Transport Protocol VLAN operation: Interface is physically intact but not communicating on the network
• Supports VLSM • Can track advertised routes • Reduced administration costs • Centralized Interface is connected and communicating Up Up
using DUAL administration control • Greater workgroup

1-800-418-6789
Protocol is…
Cause Interface is…
security • Controlled broadcast activity Line
• Increased performance • Physical

PrepLogic PrepLogic PrepLogic PrepLogic


topology independence
Show Interface Command Explanations

PrepLogic
PrepLogic PrepLogic PrepLogic PrepLogic
1-800-418-6789
Pocket Guide Instructions
Print your Pocket Guide on 8 ½” X 11” paper. It looks great in color, and works well in b/w, too.

1 2

1-800-418-6789
Start with Cover Page at top left Fold Pocket Guide in halves

3 4

1-800-418-6789
Use scissors to cut Pocket Guide in center Fold flaps to opposite ends

5 6 1-800-418-6789

Fold Pocket Guide in half vertically, Put it in your pocket!


then horizontally like a book

Das könnte Ihnen auch gefallen