« Home « Kết quả tìm kiếm

CCNA Exam Certification Guide


Tóm tắt Xem thử

- The purpose of the exam could be best summarized as follows:.
- In this chapter, an interpretation of the objectives is offered.
- As this happens, a higher percentage of the test questions will not be in the list of objectives found in this book.
- Summary of the CCNA Exam Philosophy.
- One of the suggested training paths should be used.
- Some of the key features to help you prepare are outlined in the next few sections..
- Summary of the CCNA Exam Preparation Philosophy.
- The only user interface covered by even a broad interpretation of the CCNA objectives is the IOS.
- Also, the only user interface covered by even a broad interpretation of the CCNA objectives is the IOS.
- Also, the only user interface covered by even a broad interpretation of the CCNA objectives is the IOS;.
- interpretation of the CCNA objectives is the IOS;.
- List and Interpretation of the 60 Stated CCNA Objectives.
- The CCNA exam will consist of a combination of the objectives listed in Table 1-6.
- responsible for creation of some of the bits that are sent.
- For TCP/IP, from which Cisco based the “5 conversion steps of data encapsulation,” the application creates some bits, called the “data” (Step 1).
- Knowing ISDN protocols to the depth of the ITM course should be enough.
- 35 Identify the functions of the TCP/IP transport-layer protocols..
- 36 Identify the functions of the TCP/IP network-layer protocols..
- Perform the exercises at the end of the chapter..
- This section of the book reviews common hardware details..
- Ctrl-A Moves the cursor directly to the first character of the command..
- Ctrl-E Moves the cursor directly to the end of the command..
- This Here’s the Rootin-est Tootin-est Router in these here Parts!.
- Prompt overrides the use of the hostname as the prompt.
- banner motd ^C This Here’s the Rootin-est Tootin-est Router in these here Parts! ^C.
- What is the IP address or hostname of the TFTP server?.
- What is the name of the file?.
- (Some older routers had a hardware configuration register, with jumpers on the processor card, to set bits to a value of 0 or 1.) The second method used to determine where the router tries to obtain an IOS to execute is through the use of the boot.
- Name two commands used to view the configuration to be used at the next reload of the router.
- Several components of the OSI model are popularly.
- Name the seven layers of the OSI model..
- For example, RJ45 defines the shape of the connector and number of wires/pins in the cable.
- (Some data-link protocols perform error recovery, and some do not.) The data-link address(es) are examined so Host B can decide whether to process the data further.
- Figure 3-3 provides a visual representation of the same-layer interaction concepts..
- However, CCNA exam objective 5 uses a slightly different view of the process.
- (This different view is based on the ICRC course.) The “five steps of data encapsulation” from the previous objective are in the following list:.
- the numbers shown represent each of the five steps..
- Two of the most pervasively deployed protocols are TCP/IP and NetWare.
- A sender of data will want an acknowledgment of the data.
- When sending, a device “claims” the free token, which really means changing bits in the 802.5 header to signify “token busy.” The data is then placed onto the ring after the Token Ring header.
- Table 3-5 summarizes most of the details about MAC addresses..
- (See Chapter 8, “WAN Protocols: Understanding Point-To-Point, Frame Relay, and ISDN,” for more background on Frame Relay.) The address field in Frame Relay defines a data- link connection identifier (DLCI), which identifies each VC.
- Similarly, HDLC and Frame Relay need to identify the contents of the data field.
- this frame includes the packet in the data portion of the frame.
- When the packet arrives at a router sharing a data link with the true destination, the router and the destination of the packet are in the same L3 grouping.
- The “Rou-Ting Table”—The place to store your widget making instruction sheets Similarly, with networking, the routed protocol is the one being routed, such as IP, IPX, OSI, DECnet, and so forth.
- assume that all parts of the network are up and working properly..
- assume that all parts of the network are up and working properly.
- 58 Describe the operation of the Spanning-Tree Protocol and its benefits..
- Describe the benefits of the Spanning-Tree Protocol as used by transparent bridges and switches..
- The details of the LAN frames are shown in Figure 4-2.
- The first half of the address is a code that identifies the vendor.
- Broadcast addresses —The most popular type of IEEE MAC address, the broadcast address has a value of FFFF.FFFF.FFFF (Hex).
- The following list summarizes many of the key features of MAC addresses:.
- The second most significant bit in the first byte of the MAC address is called the local/.
- Transparent bridging is the first of the three segmentation methods covered in this section.
- The PC is preconfigured with the IP address of the DNS.
- The DNS returns the IP address of the web server to the PC..
- The DNS returns the IP address of the web server to the PC in the DNS reply..
- This behavior of switches resulted in the creation of the terms collision domain and broadcast domain.
- To sum up, the benefits of the Spanning-Tree Protocol are as follows:.
- This is typically a MAC address on one of the bridge’s interfaces.
- The bridge ID of the sender of this CBDPU.
- At the end of the election, the best candidate will win.
- Hello time—The time that the root waits before resending the periodic CBPDUs, which are then forwarded by successive bridges..
- MaxAge—The time any bridge should wait before deciding that the topology has changed..
- Table 4-10 summarizes the intermediate states of the spanning tree..
- The forwarding interfaces are considered to be a part of the “spanning” tree..
- One of the bridges is elected as root.
- ICMP and ARP are actually parts of the network layer (Layer 3) of TCP/IP.
- CCNA Objectives Covered in This Section 35 Identify the functions of the TCP/IP transport-layer protocols..
- TCP manages the delivery of the data to the other socket.
- Of the three parts of a socket, the IP addresses are implied based on the source and destination IP address in the IP header.
- Note that ARP is in the lower part of the Internet layer in the diagram.
- Used to allow hosts to dynamically learn the IP addresses of the routers attached to the same subnet..
- If true, the web server would reply with an unreachable with the code field value implying “Protocol unavailable.” The final code field value is highly likely.
- (Assume use of mask in each subnet in Figure 5-10.) The PC sends a packet to Router B (step 1 in Figure 5-10).
- The address is assigned to the interface of the computer, not the computer itself..
- By definition, all addresses in the same network have the same numeric value network portion of the addresses.
- The rest of the address is called the host portion of the address.
- Individual addresses in the same network all have a different value in the host parts of the addresses..
- “rest” of the address, or the host part.
- Then, half of the remaining address space (25 percent of the total) was used to create medium sized (Class B) networks.
- The number of networks of a particular class is equal to 2 to the power of the number of bits in the network part of the address.
- Therefore only seven bits are actually considered to comprise the network part of the address.
- therefore only 14 bits of the 16 in the first two bytes are considered part of the network number.
- Members of one subnet have the same numeric value in the subnet parts of the addresses..
- Two of the more popular views of subnetting follow..
- Pretending the Network Part of the Address is Longer Than When Not Subnetting.
- This implies 16 network bits at the beginning of the address.
- Class A, B, and C rules define the number of network bits in the network part of the address..
- Each host address in the network has the same value in the network part of the address..
- Each host address in the network has a unique value in the host part of the address.
- remaining part of the address is the subnet part of the address.
- The mask defines the number of host bits in the host part of an address, located at the end of the address..
- Class A, B, and C rules define the number of network bits in the network part of the address, located at the beginning of the address..
- it defines the size of the host field.
- The class rules define the size of the network part of the address.
- This creates a subnet part of the address..
- Subnet mask values can have something besides 255 or 0 in the decimal version of the mask.

Xem thử không khả dụng, vui lòng xem tại trang nguồn
hoặc xem Tóm tắt