CCNA Study Notes
CCNA Study Notes
CCNA Study Notes
Switches are multiport bridges with more intelligence. They break up collision domains
but create one large broadcast domain by default.
Routers break up broadcast domains and collision domains and use logical addressing to
filter the network.
- All devices in the same collision domain and the same broadcast domain
Bridges break up collision domains but create one large broadcast domain. They use
hardware addresses to filter the network
Windowing:
- Windows are used to control the amount of outstanding, unacknowledged data
segments
- The size of the window controls how much information is transferred from one end
to the other.
- If a receiving host fails to receive all the segments that it should acknowledge, the
host can improve the communication session by decreasing the window size.
Flow Control:
Is the process of managing the rate of data transmission between two nodes to
prevent a fast sender from outrunning a slow receiver. It provides a mechanism
for the receiver to control the transmission speed, so that the receiving node is
not overwhelmed with data from transmitting.
Buffering
Windowing
Congestion Avoidance
Ethernet Networking:
- Ethernet is a contention media access method that allows all hosts on a network to
share the same bandwidth of a link
- It’s readily scalable: meaning that it’s comparatively easy to integrate
- Also relatively simple to implement, troubleshooting is reasonably straightforward
Rolled cable
It is not used to connect any Ethernet connections together, you can use a
rolled Ethernet cable to connect a host to a router console serial
communication (com) port
Full-duplex: uses two pairs of wires and uses a point-to-point connection between
the transmitter of the transmitting device and the receiver of the receiving device
Data Encapsulation:
Is when a host transmits data across a network to another device, the data goes
through encapsulation
IP Address Ranges
Class A – 1-127 (Reserved Private range 10.X.X.X) (127 is reserved for loopback
Class B – 128-191 (Private Range 172.16.X.X – 172.31.X.X)
Class C – 192-223 (Private Range 192.168.X.X)
Class D – 224-239 (Reserved for Multicast)
A broadcast domain a set of all devices on a network segment hear all broadcasts sent on
that segment
-Does not do anything to slow down traffic, including using Access Lists, routing
between VLANs, implementing packet filtering
-Don’t support workgroup access
-Avoid expanding the core (When network grows, performance becomes an issue,
give preference to upgrade over expansion
Distribution Layer – Routing – Sometimes referred to as the “Workgroup Layer” and is the
communication point between the Access Layer and Core Layer.
Function:
Routing
Filtering
WAN access
Limited functions that are exclusively belong to one of the other layers.
Access Layer - Switching – Controls user and workgroup access to internetwork resources.
It is sometimes referred to as the desktop layer. It handles any traffic for remote services.
Functions to be included:
Continued (from distribution layer) use of access control and policies
Creating of separate collision domains (Segmentation)
Workgroup connectivity into the distribution layer
DDR and Ethernet switching are frequently seen in the Access Layer
Static routing instead of dynamic routing protocols is also seen here as well
TCP/IP – CHAPTER 2
DoD Model
Process/Application Telnet~ FTP~ LDP~ SNMP~ TFTP~ SMTP~ NFS~ XWindow
Host-to-Host TCP~ UDP
Internet ICMP~ ARP~ RARP
IP
Network Ethernet~ Fast Ethernet~ Token Ring~ FDDI
TCP Header
Header length (4) Reserved (6) Code bits (6) Window (16)
Options (0 or 32 if any)
Data (varies)
UDP
TCP UDP
Sequenced Unsequenced
Reliable Unreliable
Connection-oriented Connectionless
Virtual circuit Low overhead
Acknowledgments No acknowledgment
Windowing flow control No windowing or flow control
Port Numbers
FTP - 21 (TCP)
Telnet - 23 (TCP)
Doom - 666 (TCP)
DNS - 53 (UDP)
TFTP - 69 (UDP)
POP3 - 110 (TCP)
News - 119 (UDP)
SMTP - 25 (TCP)
HTTP - 80 (TCP)
HTTPS- 443 (TCP)
SNMP - 161 (UDP)
TFTP - 69 (UDP)
Internet Layer
Internet Control Message Protocol (ICMP) works at the Network layer and is used by IP for
many different services.
Characteristics of ICMP
They can provide hosts with information about network problems
They encapsulated within IP datagrams
Boot-up process:
Post~ Flash memory~ Loads and look for a valid configuration;
Startup-config
Stored in NVRAM
If a valid configuration is not found in NVRAM:
Setup mode
Command-Line Interface (CLI)
More flexible than setup mode
To use CLI, just say “No” to entering the initial configuration dialog
Privileged mode:
- Router#
- Used to view & change router configuration
Global changes:
- config terminal or config t or conf t
- Changes made to running-config (DRAM)
- To change the startup-config (NVRAM)
Config memory or config mem or conf mem
Any configuration changes need to be place into RAM; typing “config mem or config net
(from a TFTP host) will append the current running-config.
Configuration:
CLI Prompts
Interfaces
Sub-interfaces
Line Commands
Routing Protocol Configurations
Router Components
Bootstrap – Brings router up during initialization
Post – Checks basic functionality: Hardware and Interfaces
ROM Monitor – Manufacturing testing and troubleshooting
Mini IOS – Loads Cisco IOS into flash memory
RAM – Holds packets buffers, routing tables, and software, also stores running
configuration
Boot Sequence
1. Router performs a POST
2. Bootstrap looks for and loads the Cisco IOS
3. IOS software looks for valid configuration file
4. Startup–config file (from NVRAM) is loaded, if startup-config file is not found, the
router will start the setup mode
Cisco Discovery Protocol (CDP) – is a proprietary protocol designed to collect info about
directly attached and remote devices. It displays the H/W and protocol info. It is useful for
troubleshooting and management.
Static Routes
Route must be unidirectional
Routing Protocols:
Interior Gateway Protocol (IGP): RIP, IGRP, OSPF, EIGRP
Split Horizon: Does not believe information that comes back to us that came from the
direction in which it was heard originally
Route Poisoning: If I know for fact that a route is down, I will not wait for infinity
Triggered Updates: Triggers update and does not wait for the period updates
Hold-down Timer: If we hear about another path, I will not believe it until the “Hold down
timer” is expired, which is 180 seconds. After which I will update routing table or wait for
the “Flush Time – (240 sec) before taking the entry off the routing table.
Classful vs Classless
- Does not send subnet mask Sends subnet mask
Administrative Distances
RIP = 120
IS-IS = 115
OSPF = 110
IGRP = 100
EIGRP = 90
Static Route = 1
Directly connected =0
Enhanced Integrated Gateway Routing Protocol - Chapter 7
Features of EIGRP
- Support for IP and IPv6 including some other routed protocols via protocol-
dependent modules
- Considered classless
- Not a link state or distance-vector protocol. It carries characteristics of both
- It’s easy to setup
- It has rapid convergence time (Convergence – means all routing tables are the same)
- Reduce bandwidth usage
- Support for VLSM/CIDR
- Support for summaries and discontinuous networks
- Efficient neighbor discovery
- Communication via Reliable Transport Protocol
- Best path selection via Diffusing Update Algorithm (DUAL) to select loop-free routes
and enable fast convergence
- Uses up to six unequal paths to remote networks (4 by default)
- It carries all routed protocols
Protocol-Dependent Modules (PDM): Provides routing support for multiple Network layer
protocols: IP, IPX, AppleTalk, and IPv6
- Maintain a separate series of tables containing the routing information that applies
to specific protocol (e.g. IP/EIGRP and IPv6/EIGRP tables)
The neighbor and topology tables are stored in RAM and maintained through the use of Hello
and update packets. Routing table is also stored in RAM, but that information is gathered only
from the topology table.
Hello packets tells you who your neighbors are, they are sent every 5 seconds
EIGRP routers that belong to different autonomous systems (ASes) don’t automatically
share routing information and they don’t become neighbors. Can be benefited when in
larger networks to reduce the amount of route information propagated through specific AS;
redistribution between the different ASes will have to be done manually.
- Feasible Distance: Is the metric reported by the neighbor (advertised distance) plus
the metric to the neighbor reporting the route. It is consider the best path and it’s on
the routing table.
- Reported/Advertised Distance: It’s the metric of a remote network as reported by
a neighbor. Also in the routing table metric of the neighbor.
- Variance: is a multiplier- it multiplies the feasible distance if the product is equal
to…
EIGRP is a classless routing protocol, you can add the subnet mask but you don’t need to do
that.
EIGRP also support s the use of discontiguous subnets which gives us a lot of flexibility
when designing the network’s IP address plan
Also supports manual creation of summaries at any and all EIGRP routers which can
substantially reduce the size of the route table.
Discontiguous network is one that has two or more sub-networks of a classful network
connected together by different classful networks.
OSPF
- Open Standard
- Shortest Path First (SPF) algorithm
- It’s a link-state routing protocol (vs. Distance Vector)
Hierarchical Routing
- Consists of areas and autonomous systems
- Minimizes routing update traffic
- Supports (Variable Length Subnet Mask) VLSM
- Unlimited hop count
OSPF Neighbors
Uses Hello Packets to create adjacencies and maintain connectivity with neighbors
A simpler way to convert network address to a wild card mask is to subtract the subnet
mask from all 255s e.g.
255.255.255.255
- 255.255.252.0
_________________________________