CCNA Objective Notes:
Identify at least three reasons why layered model is used:
General functions clarified- rather than how to specs
Makes the complexity more manageable sub-layers
Uses standard interfaces to increase interoperability
Developers can change one feature in a layer without changing all the code
Allows for specialization which helps industry growth
Eases troubleshooting
Identify the functions of each layer of the ISO/OSI reference model and Identify and describe the functions of each of the seven layers in the OSI model:
Application- layer 7- checking availability of com partner and if resources are available
Presentation-layer 6-encryption- format- handles data compression, decompression, encryption and decryption- some standards are ANSI, PICT,MPEG, JPEG, MIDI, TIFF
Session – layer 5-coordinates comm (synchronizes) w) other nodes. Three modes. Simplex-like telegraph, Half-duplex-takes tunes tran and rec like speaker phone and full-duplex-transmits both ways same time. Has three phases: connection establishment-contact is secured and devices agree upon com parameters and protocols, data transmission and connection release.
Examples of session layer protocols are: NFS, SQL, RPC, Xwindows, ASP, DNA SCP
Transport- layer 4-segment and reassemble data. Provide end-to-end transport services and establish a logical connection. Provide mechanisms for muxing, session establishment ,and tear down of virtual circuit. Data integrity is ensured at this layer by maintaining flow control and letting users request reliable transport between systems- FLOW CONTROL- prevents buffer overflow from too much data too fast.
Delivered segments get and ACK, Non received segments are re-quested. Segments are re-sequenced. Data flow is managed
Network- layer 3- routing-path finding-finding the best path helps reduce traffic thus improving network performance. it examines the packet header to determine destination address (DA) after it picks the path- it re-encapsulates adding next hp info. It reads datagrams from local PC and forwards packet to next DA. When the router at the destination receives the packet it puts it in a FRAME with the MAC address and sends.
Datalink- layer 2- ensures deliver to proper device. Translates to bits. Formats in FRAMES with customized header with hardware destination and source address. Encapsulates:
1)Preamble or Start indicator is special bit pattern which alerts devices of beginning data frame.
2)The DA, 3) then SA
4) Ethernet_II then have 2bit type field which reports which upper layer is to receive the data
or 4) 802.3 frames also have a 2 bot field- but it is a Length field which reports how many bits are in the message before the FCS (frame check sequence) then sometimes 5)optionally there could be an 802.2 LLC header which specifies which upper layer gets the info (cause 802.3 doesn’t have this info)
6)The DATA is the actual message
7) FCS which houses CRC (Cyclic Redundancy Check) checksum
LLC-makes sure the mach and physical layers are doing their jobs. It is a buffer between the upper and lower layers. It uses SSAP’s (Source Service Access Points) and DSAP’s (Destination Service Access Points) to help lower layers communicate with the Network layer. Gives MAC layer instructions on what to do with the data- act as pointers to upper layers. 802.3 can not handle SSAPs or DSAPs- this is what the 802.2 field does.
LLC is responsible for timing, flow control and some protocol stacks.
MAC- Is responsible for framing builds frames from 1’s and 0’s It checks CRC It determines if the hardware address matches or not. If it does it sends it to LLC.
Also responsible for MEDIA ACCESS interacts between NIC and NIC driver)
Three Kinds of Media Access:
Contention: ethernet- they talk whenever they like- sometimes causing collisions
Token Passing: used for Token ring, FDDI and ArcNet networks. Wait for token to transmit.
Polling: mainframe envirnment- hosts are polled to see if they need to transmit- cant transmit unless given permission by primary host
WAN Datalink Protocols (encapsulation methods) layers describe how frames are carried over single datalink- including protocols
Synchronous Encapsulation includes:
HDLC- High –level Data Link Control-supports PPP and multipoint. Vendor specific. Default protocol for Cisco
SDLC - Synchronous Data Link Control- IBM, mainframes defines and uses polling
LAPB- Link Access Procedure, Balanced- x.25, defines frames and checks sequence- retransmits, exchanges and ACKS
X.25 – first packet switching network. Defines ppp between DTE and DCS. Supports SVC and PVC. Cisco routers (DTE’s) connect to DSU/CSU (DCEs)
PPP- used in IP, IPX and Appletalk networks. Is a data link protocol. ISDN is one too as is SLIP
Frame Relay- does NOT use LAPB anymore – upgrade from x.25. no error correction. Uses SVCs, PVCs and DLCI’s (Data Link Connection Identifiers) needs high quality digital connection.
Physical- layer 1- 2 responsibilities- sends bits receives bits.
State Transitions = changes in voltage. This is where the DCE is the (Data Circuit -Terminating Equipment ) is located at the provider on physical layer and DTE (data terminal equipment) is accessed is an attached device. And accessed thru a modem or CSU/DSU
Standards for this layer are: EIA/TIA-232, EIA/TIA-449, V.24, V.35, X.21, G.703, EIA-530, HSSI (High-Speed Serial Interface)
Define flow control and describe three methods:
Flow control- sends message when receiving entities buffers are full
Acknowledgement- confirms receipt ACK
Windowing- the number of data segments can be sent before an ack is received
List the key internetworking functions of the OSI Network layer and how they are preformed in a router:
Define and explain 5 conversion steps of data encapsulation:
Each layer encapsulates the layer above
Bridge: regenerate signal like repeater but can read and filter Mac address. Can cause broadcast storms.
Hubs: are concentrators. They are multiple port repeaters
Switch: can run in full duplex (hubs cant) the switch is a hub with a brain – it keeps a routing table of mac addresses.
Routers: are badder bridges. Read and filter IP and Mac addresses (network ids).
Gateways: are software interpreters.
CSU/DSU channel servie units/data service units: customer premise equipment (CPE) terminate the digital signal at the CP. They connect to the CO – central office – which is the switch at the telco.
Communication Servers: dial in servers like as5200
Multiplexors: allows more than one signal to be sent simultaneously over one line or circuit (channelizer?) called mux
OSI= Open Systems Interconnection ISO= International Standards Org
Connection orientated transmissions: 1)connection agreement segment is a request for synchronization 2) 2nd and 3rd segment ach the request and establish a connection parameter between hosts 3) final segment is ack also. It notifies the other host the connection agreement is accepted and a connection has been created. Data begins to flow now.
802.3 – created by DIX- uses CSMA/CD datalink and physical layers
Frames-
Ethernet II has 2 bit type id – total of 8 bit header
802.2 has 2 bit type- bus – total of 8 bit header
802.3 has 2 bit length – bus – tota of 8 bit header
802.5 has 4 bit – star – 8 bit header. Uses Letters
ATM has 53 bit fixed length – ITU-I
FDDI – has 12 4bit symbols to designate the MAC address
Chapter 2 Objectives
Describe advantages of LAN segmentation-
fewer users on a segment equla less traffic=better performanceDescribe LAN segmentation using Bridge- bridges keep host addreses in their table if a message is received destined for an unknown host it broadcasts on all
Describe the benefits of network segmentation with bridges
Describe LAN segmentation with Routers- routers work at the network layer and keep routing tables of best paths to destination based on network address- higher overhead – filtering available
Describe benefits of network segmentation using routers- can filter
Describe LAN segmentation using Switches- faster full duplex available- smaller number of users per segment and faster forwarding increase perfomrance- keep a table of mac addresses
Describe the benefits of network segmentation with Switches
Name and describe two switching methods-
Cut through- reads the header and begins to send
Store - and – Forward- waits for entire frame and then sends
Describe full and half duplex Ethernet operation- full duplex allows for simultaneous transmission between receiver and transmitter doubling the amount of data that can be transferred- half duplex is like a speaker phone only one host can talk at a time
Describe network congestion and problems in Ethernet networks- broadcasts and high traffic create latency – or slowing of network
Describe the features and benefits of Fast Ethernet
100BaseT Fast Ethernet- defines the Physical and Data Link Layers. Uses CSMA?CD- 10 times faster that 10BaseT. Use same time slots at 10mbps – meaning a station must transmit all data before another station can transmit. The distance is reduced. Regular Ethernet has 5-4-3 rule 5segments, 4 repeaters and 3 populated segments. With fats Ethernet you can use only two repeaters. The max frame size is 1518bytes (which is also the time slot) round trip can not exceed 512 which is why distance is reduced.
Can use traditional repeater at 140 bit times
Class 2 repeater has 92 bit times.
100BaseTX CAT 5 with RJ45 can go 100Meters
100BaseFX 50/125 or 62.5/125 with connector SC/ST/MIC can fo 412 meters
Medium UTP can go 200 meters with a repeater
Advantages-can migrate gradually. While migrating can use existing cabling and equipment. Can use 10Mbps and100Mbps together, uses tried and true CSMD/CD, migration is easy.
Describe the guidelines and distance limitations of Fastethernet
100BaseFX – fiber over 100Mbps-802.3 spec. uses two strand 50/125 or 62/125 micron multimode fiber.
100BaseT4-802.3 spec. 100Mbps over cat 3,4,5 w) standard rj45connecotr
100BaseTX- cat 5 uses two pair STP (shielded twisted pair) or type 1STP
100BaseX- refers to 100BaseTX or 100BaseFX approved compatible with Ethernet csma/cd and ANSI x3t9.5
100VGAnylan- for fast Ethernet or token ring- Cisco does not support.
Distinguish between cut through and store and forward LAN switching
Cut through – sends as soon as header is read.
Store and forward- waits for entire packet- holds in buffer then sends- higher latency
Describe the operation of Spanning tree Protocol and it benefits. Spanning tree protocols reduces looping by finding duplicate paths and blocking the least desirable
Describe the benefits of VLAN- allows for greater flexibility in creation of work groups- adds security and micro segments workgroups.
LLC Layer checks the MAC Layer-
LLC uses Source Service Access points (SSAPs) – it points to the higher layer requesting the info
Destination Service Access Points – helps lower layers communicate with the network layer
802.3 can not handle DSAP and SSAP
802.2 frame handles DSAP AND SSAP
LLC is responsible for timing flow control and some
protocol stacks
MAC – uses FRAMES- builds them from 1 and 0’s
CISCO CAREER CERTIFICATIONS & TRAINING
CCNA 1.0 (640-407) - Cisco Certified Network Associate
Exam Objectives
The exam will contain a combination of the following objectives:
Cisco Career Certifications & Training Customer Service
http://www.cisco.com/training 1.800.829.NETS (6387)
408.525.NETS email: ciscotraining@cisco.com doc. ID#401
OSI Reference
1) Identify and describe the functions of each of the seven layers of the OSI reference model.
Application-
Presentation-
Session-
Transport-
Network-
DataLink
Physical-
2) Describe connection-oriented network service and connectionless network service, and
identify the key differences between them.
Connection oriented services receive ack- connectionless let upper layer protocols worry about
what information has been received.
3) Describe data link addresses and network addresses, and identify the key differences between them.
Data Link addresses are physical addresses or hardware addresses and network addresses are logical addresses.
4) Identify at least 3 reasons why the industry uses alayered model.
1.a change to one layer does not effect all the others
2.defines the needs of what should happen- not the how
3.helps with troubleshooting.
5)Define and explain the 5 conversion steps of data encapsulation.
1. user information converted to data
2. data is converted to segments
3. segments are converted to packets or datagrams
4. packets or datagrams are converted to frames (data link)
5. frames are converted to bits.
6) Define flow control and describe the three basic methods used in networking.
Flow control is keeping the receiving device from being overwhelmed by data-the reciver sends a message saying its buffer is full
Tcp – transport layer handles-Acknowledgement- confirms receipt ACK
Windowing- the number of data segments can be sent before an ack is received
For routers – they use ICMP (Internet Control Message Protocol) quench messages asking for info to be throttled back this works on the network layer
7) List the key internetworking functions of the OSI Network layer and how they are performed in a router.
WAN Protocols
8) Differentiate between the following WAN services: Frame Relay, ISDN/LAPD, HDLC, & Synchronous Encapsulation includes:
HDLC- High –level Data Link Control-supports PPP and multipoint. Vendor specific. Default protocol for Cisco
SDLC - Synchronous Data Link Control- IBM, mainframes defines and uses polling
LAPB- Link Access Procedure, Balanced- x.25, defines frames and checks sequence- retransmits, exchanges and ACKS
X.25 – first packet switching network. Defines ppp between DTE and DCS. Supports SVC and PVC. Cisco routers (DTE’s) connect to DSU/CSU (DCEs)
PPP- used in IP, IPX and Appletalk networks. Is a data link protocol. ISDN is one too as is SLIP
Frame Relay- does NOT use LAPB anymore – upgrade from x.25. no error correction. Uses SVCs, PVCs and DLCI’s (Data Link Connection Identifiers) needs high quality digital connection.
PPP-successor of SLIP- provides router to router and host to network connection via synchronous and asynchronous communications. Works with IO, IPX ARA. It has built in security like CHAP and PAP. It relies on LCP and NCP
LCP-Link Control Protocol- establishes, configures and tests data link connections- compression of data.
NCP-Network Control Program-in SNA routes and controls flow of data between controller and other resources. In PPP a series of protocols for establishing and configuring Network layer protocols – like AppleTalk
Frame Relay-industry standard- switched Data Link layer protocol that handles multiple virtual circuits using HDLC encapsulation
ISDN-integrated services digital network- BRI, PRI, BISDN, N-ISDN
LAPD
HDLC-High Level Data Link Control. Bit oriented synchronous Data Link Protocol. Developped by ISO- uses frame characters and checksums
PPP- analogue or synchronous.
9) Recognize key Frame Relay terms and features.
Most popular-bandwitdht on demand. Operates at the physical and data link layers.
CIR- Committed Information Rate- buying a pre-designated amt of bandwidth
It interfaces between DTEs (Data Terminal Equipment) connect user end devices thru DCEs
(Like modems ) includes computers, protocol translators, and muliplexors
DCE=Data communications equipment- or data terminating equipment (depending on the standard)- provides a physical connection to the network. Forwards traffic and provides clocking signal used to synch dte and dce
Frame relay is connection oriented at data link layer by using virtual circuits.- it is a logical circuit between two DTE across a PSN (public switched network)
DLCI-is a data link identifier assigned by telco. Can be mulitpoint – ip addresses are mapped to dlci’s the dlci’s have global and local meanings – so two sites can refer to the same circuit with a different id
TO Configure:
Config t
Int s0
Encapsulation frame-relay
This configuration would selct the default cisco config – if you want to use IETF you would need to type it at the end. Can only use cisco is connecting two cisco devices.
To add the DLCI
Config t
Frame-relay interface-dlci #assignedbytelco
LMI-designed by gang of 4= Local Management Interface - tells info about dlci values- global or local significance- and status of circuit. Is an enhancement of CCIT- there are 3 kinds Cisco is default- check with provider to see which one is best- ANSI, ITU_T or CISCO
Subinterfaces-you can have multiple virtual circuits on single interface- you can assign different network layer characterisitics to different subinterfaces. Like routing ipx on one and ip on another.
There are two kinds
Point-to_Point and Multi-Point- use multipoint when the router is the center of a star.
To configure
Config term
Int s0.16 point-to-point
Ask bill- do I have to get separate dlci for each subinterface? Or will circuit recognize whatever I assign to serial port?
Mapping- for IP or IPX to recognize the devices and communicate across wan the addresses must be mapped to the DLCI’s- there are two ways to do this:
1 use frame relay map command
2. use inverse-arp function
to configure using map command:
config t
int s0.16
encap frame-relay ietf
no inverse-arp
ip address 172.16.30.1 255.255.255.0
frame-relay map ip 172.16.30.17 30 cisco broadcast (cisco encapsulation)
frame-relay map ip 172.16.30.18 50 broadcast (says forward brdcsts to virtual circuit)
frame-relay map ip 172.16.30.19 40
(the 30, 50 and 40 are dlci numbers) mapping is the only way to mix encapsulation types between cisco and ietf
to use inverse-arp:
config t
int s0.16
encap frame-relay ietf
ip address 1172.16.30.1 255.255.255.0
this is easier but not reliable.
Monitoring-
Sho frame pvc
Shows staus if interfaces and pvc at one time
Sho in s0
Will show lmi traffic.
10) List commands to configure Frame Relay LMIs, maps, and subinterfaces.
See above
11) List commands to monitor Frame Relay operation in the router.
See above
12) Identify PPP operations to encapsulate WAN data on Cisco routers.
To configure
Config t
Int s0
Encapsulation ppp
CTRL Z
Must be configured on both ends of serial connection.
13) State a relevant use and context for ISDN networking.
14) Identify ISDN protocols, function groups, reference points, and channels.
15) Describe Cisco's implementation of ISDN BRI.
Two b channels and a d – the d channel sends control messages
IOS
16) Log into a router in both user and privileged modes.
17) Use the context-sensitive help facility.
?
18) Use the command history and editing features.
< ^ > v CTL +
19) Examine router elements (RAM, ROM, CDP, show).
20) Manage configuration files from the privileged exec mode.
21) Control router passwords, identification, and banner.
Mdod #
22) Identify the main Cisco IOS commands for router startup.
23) Enter an initial configuration using the setup command.
24) Copy and manipulate configuration files
.
25) List the commands to load Cisco IOS software from:
flash memory, a TFTP server, or ROM.
26) Prepare to backup, upgrade, and load a backup Cisco IOS software image.
27) Prepare the initial configuration of your router and enable IP.
Network Protocols
28) Monitor Novell IPX operation on the router.
29) Describe the two parts of network addressing, then identify the parts in specific protocol address examples.
First octet in hex is network id- the last part of the
net number is a unique node number sometimes based on
hardware address
30) Create the different classes of IP addresses [and subnetting].
0-126
127 – loopback
128-190
191-223
31) Configure IP addresses.
32) Verify IP addresses.
33) List the required IPX address and encapsulation type.
34) Enable the Novell IPX protocol and configure interfaces.
35) Identify the functions of the TCP/IP transport-layer protocols.
36) Identify the functions of the TCP/IP network-layer protocols.
37) Identify the functions performed by ICMP.
38) Configure IPX access lists and SAP filters to control basic Novell traffic.
Routing
39) Add the RIP routing protocol to your configuration.
40) Add the IGRP routing protocol to your configuration.
41) Explain the services of separate and integrated multiprotocol routing.
42) List problems that each routing type encounters when dealing with topology changes and describe techniques to reduce the number of these problems.
43) Describe the benefits of network segmentation with routers.
Network Security
44) Configure standard and extended access lists to filter IP traffic.
45) Monitor and verify selected access list operations on the router.
LAN Switching
46) Describe the advantages of LAN segmentation.
Solves congestion problems- better allocation of bandwidth.
47) Describe LAN segmentation using bridges.
Breaks up collision domains by decreasing the number of workstations on same physical segment.
Builds dynamic forward table of mac addresses
48) Describe LAN segmentation using routers.
Work at Network layer- makes more manageable, increased functionality, multiple active paths, more complex
49) Describe LAN segmentation using switches. Provide dedicated ppp packet switched connections – allows for simulations switching increases amount of bandwidth to each client
50) Name and describe two switching methods.
Cut through – sends as soon as header is read.
Store and forward- waits for entire packet- holds in buffer then sends- higher latency
51) Describe full- and half-duplex Ethernet operation.
Full duplex is when there is or can be a simultaneous exchange of data- a half duplex is like a speaker phone- one at a time.
52) Describe network congestion problem in Ethernet networks.
53) Describe the benefits of network segmentation with bridges.
Bridges work at the MAC layer creating physical and
logical network segments. – assures reliability,
scalability, and manageability
54) Describe the benefits of network segmentation with switches.
55) Describe the features and benefits of Fast Ethernet.
Up to 10 times as fast as regular ethernet
56) Describe the guidelines and distance limitations of Fast Ethernet.
57) Distinguish between cut-through and store-and-forward LAN switching.
58) Describe the operation of the Spanning Tree Protocol and its benefits.
Bridging protocol.
Dynamically works around loops. Bridges exchange BPDU (bridge protocol data unit)-
protocol sends hello packets at configurable intervals) information to find multiple paths to same
destination and shut down bridge interfaces. Stops looping
59) Describe the benefits of virtual LANs.
Group of devices on one or more LAN using management software so they can interact and communicate as if they were on the same wire segment. They are based on Logical connections instead of Physical. This is a switch technology.
The benefits of VLAN:
Simplify moves, adds and changes-
Reduce admin costs-
Better control of broadcasts-
Tighetn network security-
Micro-segment with scalability-
Distribute traffic load-
Reloacate server into secured locations-
60) Define and describe the function of a MAC address.
Data link layer address required for every device on a LAN. Used to locate ports on the network- create and update routing tables and data structures. They are 6 bits long and controlled by IEEE. Known as hardware address. Mac Address and physical address
Bit sync is handled at physical layer
The Data Link Layer organizes the 1 and 0 into logical groups
Transport layer hides the network dependent calls from upper layers. It is also responsible for multiplexing, session establishment and tear down of virtual circuits
Application layer identifies ad establishes availability of intended comm partners. Sync’s sending and receiving applications.- checks for sufficient resources