|
Chapter 1-9 Outlines
Outline:
| Chapter 1:
Review |
| Chapter
Review |
|
| Chapter
Overview
|
|
| 1.1 |
LAN Switching
| 1.1.1 |
Congestion
and bandwidth |
| 1.1.2 |
Why segment
LANs? |
| 1.1.3 |
Segmentation
with LAN switches |
| 1.1.4 |
LAN switching
overview |
| 1.1.5 |
How a LAN
switch learns addresses |
| 1.1.6 |
Symmetric
switching |
| 1.1.7 |
Asymmetric
switching |
| 1.1.8 |
Two switching
methods |
|
|
| 1.2 |
Virtual LANs
| 1.2.1 |
Introduction
to VLANs |
| 1.2.2 |
Frame
filtering |
| 1.2.3 |
Frame tagging |
| 1.2.4 |
VLANs
establish broadcast domains |
| 1.2.5 |
Port-Centric
virtual LANs |
| 1.2.6 |
Static VLANS |
| 1.2.7 |
Dynamic VLANs |
|
|
| 1.3 |
LAN Design
| 1.3.1 |
LAN design
goals |
| 1.3.2 |
Design
methodology |
| 1.3.3 |
What problem
are you trying to solve? |
| 1.3.4 |
Developing a
LAN topology |
| 1.3.5 |
Developing
Layer 1 LAN topology |
| 1.3.6 |
Extended star
topology |
| 1.3.7 |
Developing
Layer 2 LAN topology |
| 1.3.8 |
Layer 2
switching |
| 1.3.9 |
Layer 3
router for segmentation |
| 1.3.10 |
Server
placement |
|
|
| 1.4 |
Routing Protocols
| 1.4.1 |
Dynamic
routing operations |
| 1.4.2 |
Representing
distance with metrics |
| 1.4.3 |
Classes of
routing protocols |
| 1.4.4 |
One issue:
Time to convergence |
| 1.4.5 |
Distance
vector concept |
| 1.4.6 |
Interior or
exterior routing protocols |
| 1.4.7 |
Interior IP
routing protocols |
| 1.4.8 |
IGRP Overview |
| 1.4.9 |
IGRP
Configuration |
| 1.4.10 |
IGRP
Configuration example |
|
|
| 1.5 |
Access List Overview
| 1.5.1 |
What are
access lists? |
| 1.5.2 |
How access
lists work |
| 1.5.3 |
A list of
tests: deny or permit |
| 1.5.4 |
How to
identify access lists |
| 1.5.5 |
Testing
packets with access list |
| 1.5.6 |
How to use
wildcard mask bits |
| 1.5.7 |
How to use
the wildcard any |
| 1.5.8 |
How to use
the wildcard host |
| 1.5.9 |
Where to
place IP access lists |
|
|
| 1.6 |
IPX Routing Overview
| 1.6.1 |
Cisco routers
in netware networks |
| 1.6.2 |
Novell
netware protocol suite |
| 1.6.3 |
Novell IPX
addressing |
| 1.6.4 |
Cisco
encapsulation names |
| 1.6.5 |
Novell uses
RIP for routing |
| 1.6.6 |
SAP service
advertisements |
| 1.6.7 |
GNS get
nearest server protocol |
| 1.6.8 |
Novell IPX
configuration tasks |
| 1.6.9 |
Verifying IPX
operation |
|
|
| Chapter Summary
Chapter Quiz
|
|
|
| Chapter
2: WANs |
|
| Chapter
Overview
|
|
| 2.1 |
WAN Technology
| 2.1.1 |
WAN services |
| 2.1.2 |
WAN CPE,
demarc, "last mile", CO switch, and toll network |
| 2.1.3 |
WAN virtual
circuits |
| 2.1.4 |
WAN line
types |
|
|
| 2.2 |
WAN Devices
| 2.2.1 |
Fundamental
WAN devices |
| 2.2.2 |
Routers and
WAN switches |
| 2.2.3 |
Describe
modems on a WAN |
| 2.2.4 |
CSU/DSUs on a
WAN |
| 2.2.5 |
ISDN Terminal
Adapters on a WAN |
|
|
| 2.3 |
How WANs relate
to the OSI Model
| 2.3.1 |
Organizations
that deal with WAN standards |
| 2.3.2 |
WAN physical
layer standards |
| 2.3.3 |
Name, and
briefly describe, six WAN data link encapsulations |
|
|
| 2.4 |
WAN
Encapsulation Formats
|
|
| 2.5 |
WAN Link Options
|
|
| Chapter Summary
|
|
|
Chapter Quiz
|
|
|
| Chapter
3: WAN Design |
|
| Chapter
Overview
|
|
| 3.1 |
WAN Communication
| 3.1.1 |
WAN design
requirements |
| 3.1.2 |
LAN/WAN
integration issues |
|
|
| 3.2 |
The
First Steps in WAN Design
| 3.2.1 |
WAN
design goals |
| 3.2.2 |
The gathering
requirements phase of WAN design |
| 3.2.3 |
Analyzing
requirements |
| 3.2.4 |
WAN
sensitivity testing |
|
|
| 3.3 |
How
to Identify and Select Networking Capabilities
| 3.3.1 |
The use of
the OSI model in WAN design |
| 3.3.2 |
A
hierarchical WAN design model |
| 3.3.3 |
Three
hierarchical WAN design layers |
| 3.3.4 |
Describe the
three-layer design model components |
| 3.3.5 |
Core-layer
functions |
| 3.3.6 |
Distribution-layer
functions |
| 3.3.7 |
Access-layer
functions |
| 3.3.8 |
One-layer
network designs |
| 3.3.9 |
Two-layer
network designs |
| 3.3.10 |
The benefits
of hierarchical WAN designs |
| 3.3.11 |
Server
placement in WANs |
| 3.3.12 |
Alternatives
to dedicated WAN links |
|
|
|
|
|
| Chapter Summary
|
|
|
Chapter Quiz
|
|
|
| Chapter
Review |
|
| Chapter
4: Point-to-Point Protocol |
|
| 4.1 |
PPP
| 4.1.1 |
The need for
PPP |
| 4.1.2 |
PPP
components |
| 4.1.3 |
PPP layer
functions |
| 4.1.4 |
The six
fields of a PPP frame |
|
|
| 4.2 |
PPP Session Establishment
| 4.2.1 |
The four
phases through which PPP establishes a point-to-point connection |
| 4.2.2 |
Phase 1: link
establishment and configuration negotiation |
| 4.2.3 |
Phase 2:
link-quality determination |
| 4.2.4 |
Phase 3:
network-layer protocol configuration negotiation |
| 4.2.5 |
Describe
phase 4: link termination |
|
|
| 4.3 |
PPP Authentication
| 4.3.1 |
PAP |
| 4.3.2 |
CHAP |
| 4.3.3 |
Writing the
IOS command steps to configure PPP authentication |
| 4.3.4 |
Writing the
IOS command to configure CHAP authentification |
|
|
| Chapter Summary |
|
|
Chapter Quiz
|
|
|
| Chapter
5: Integrated Services Digital Network (ISDN) |
|
| Chapter
Overview
|
|
| 5.1 |
ISDN
| 5.1.1 |
What is ISDN |
| 5.1.2 |
Basic ISDN
components |
| 5.1.3 |
ISDN
reference points |
| 5.1.4 |
ISDN switches
and SPIDs |
| 5.1.5 |
Differentiate
between E, I, and Q ISDN protocols |
|
|
| 5.2 |
How
ISDN Relates to the OSI Reference Model
| 5.2.1 |
The ITU-T
standards of the first three layers of ISDN
|
| 5.2.2 |
The ISDN
physical layer |
| 5.2.3 |
The ISDN data
link layer |
| 5.2.4 |
The ISDN
network layer |
| 5.2.5 |
ISDN
encapsulation |
|
|
| 5.3 |
ISDN Uses
| 5.3.1 |
Three
uses for ISDN |
| 5.3.2 |
ISDN
remote nodes |
| 5.3.3 |
ISDN
SOHO connectivity |
|
|
| 5.4 |
ISDN
Services: BRI and PRI
| 5.4.1 |
ISDN
BRI and ISDN PRI |
| 5.4.2 |
How BRI
connectivity is established |
|
|
| 5.5 |
ISDN
Configuration Tasks
| 5.5.1 |
ISDN
global and interface parameter configuration tasks |
| 5.5.2 |
Write
the IOS commands to configure ISDN BRI |
| 5.5.3 |
Writing
the IOS commands to define an ISDN switch type |
| 5.5.4 |
Write
the IOS commands pertaining to SPIDs |
| 5.5.5 |
Write
the IOS commands for a complete ISDN BRI configuration |
| 5.5.6 |
Describe
how to confirm BRI operations |
|
|
| 5.6 |
Dial-on-Demand
Routing
| 5.6.1 |
DDR
considerations |
| 5.6.2 |
Writing
IOS commands pertaining to verifying DDR operation |
| 5.6.3 |
Write
IOS commands pertaining to troubleshooting DDR operation |
|
|
| Chapter Summary |
|
|
Chapter Quiz
|
|
|
| Chapter 6:
Frame Relay |
| 6.1 |
Frame
Relay Technology
| 6.1.1 |
What
is frame relay? |
| 6.1.2 |
Local access
rate, DLCI, LMI, CIR, committed burst, excess burst, FECN, BECN, and
DE |
| 6.1.3 |
Frame relay
operation |
| 6.1.4 |
Frame relay
DLCIs |
| 6.1.5 |
The fields of
the frame relay frame format |
| 6.1.6 |
Frame relay
addressing |
|
|
| 6.2 |
LMI: Cisco's Implementation of Frame Relay
| 6.2.1 |
LMI operation |
| 6.2.2 |
The fields of
the LMI frame format |
|
|
| 6.3 |
LMI
Features
| 6.3.1 |
Global
addressing |
| 6.3.2 |
Multicasting
and inverse ARP |
| 6.3.3 |
Frame relay
mapping |
| 6.3.4 |
Frame relay
switching tables |
|
|
| 6.4 |
Frame Relay Subinterfaces
| 6.4.1 |
What are
frame relay subinterfaces? |
| 6.4.2 |
Split horizon
routing environments |
| 6.4.3 |
The
resolution of point-to-point and multipoint reachability issues |
|
|
| 6.5 |
The
Configuration of Basic Frame Relay
| 6.5.1 |
Writing the
IOS command sequence to completely configure frame relay |
| 6.5.2 |
The commands
for verifying frame relay operation |
| 6.5.3 |
The steps in
confirming that the frame relay line is up |
| 6.5.4 |
The steps in
confirming the frame relay maps |
| 6.5.5 |
The steps in
confirming connectivity to the central site router |
| 6.5.6 |
The steps you
must use to configure the serial interface for a frame relay
connection |
| 6.5.7 |
The steps in
verifying a frame relay configuration |
| 6.5.8 |
The steps in
configuring frame relay subinterfaces |
| 6.5.9 |
Optional
frame relay commands |
|
|
| Chapter Summary |
|
|
Chapter Quiz
|
|
|
|
| Chapter 7:
Network Management |
| Chapter
Review |
|
| Chapter
Overview |
|
| 7.1 |
The Administrative Side of
Network Management
| 7.1.1 |
What does a
network look like? |
| 7.1.2 |
Understanding
and establishing the boundaries of the network |
| 7.1.3 |
Costs of a
network |
| 7.1.4 |
Error report
documentation |
|
|
| 7.2 |
Monitoring the Network
| 7.2.1 |
Why is it
necessary to monitor a network? |
| 7.2.2 |
Connection
monitoring |
| 7.2.3 |
Traffic
monitoring |
| 7.2.4 |
Simple
network management protocol |
| 7.2.5 |
Remote
monitoring (RMON) |
|
|
| 7.3 |
Troubleshooting
Networks
|
|
| Chapter Summary |
|
|
Chapter Quiz
|
|
| Chapter
8: Network + Certification Exam Review |
|
| Chapter
Overview |
|
| 8.1 |
Basic Networking Knowledge
| 8.1.1 |
Star, bus,
mesh, and ring topologies |
| 8.1.2 |
Segments and
backbones |
| 8.1.3 |
The major
network operating systems (NOS): Microsoft Windows NT, Novell
NetWare, and Unix |
| 8.1.4 |
The clients
that best serve specific network operating systems and their
resources |
| 8.1.5 |
The directory
services of the major network operating systems |
| 8.1.6 |
IP, IPX, and
NetBEUI and associate them with their functions |
| 8.1.7 |
Mirroring,
duplexing, striping, volumes, tape backup |
| 8.1.8 |
The OSI model
and the protocols, services, functions that pertain to each layer |
| 8.1.9 |
Cat 3, Cat 5,
fiber optic, UTP, and STP |
| 8.1.10 |
10BASE2,
10BASE5, 10BASE-T, 100BASE-T, 100BASE-TX, 100BASEVG-AnyLAN |
| 8.1.11 |
Full and
Half-Duplexing, WAN and LAN; server, workstation, and host;
server-based networking and peer-to-peer networking; cable, NIC, and
router; broadband and baseband; Gateway (as both a default IP router
and as a method to connect dissimilar systems or protocols) |
|
|
| 8.2 |
Understand Physical Layer
| 8.2.1 |
Troubleshooting
the physical layer when you have network problems after installing
or replacing a NIC |
| 8.2.2 |
Hubs, MAUs,
switching hubs (switches), repeaters, transceivers |
|
|
| 8.3 |
The Data Link Layer
| 8.3.1 |
Bridges, what
they are and why they are used |
| 8.3.2 |
The 802
specifications |
| 8.3.3 |
The function
and characteristics of MAC addresses |
|
|
| 8.4 |
The Network Layer
| 8.4.1 |
Routing
occurs at the network layer |
| 8.4.2 |
The
difference between a router and a brouter |
| 8.4.3 |
The
difference between routable and non-routable protocols |
| 8.4.4 |
The concept
of default gateways and subnetworks |
| 8.4.5 |
The reason
for employing unique network Ids |
| 8.4.6 |
The
difference between static and dynamic routing |
|
|
| 8.5 |
The Transport Layer
| 8.5.1 |
The
distinction between connectionless and connection-orientated
transport |
| 8.5.2 |
Explain the
purpose of name resolution |
|
|
| 8.6 |
TCP/IP Fundamentals
| 8.6.1 |
IP default
gateways |
| 8.6.2 |
DHCP, DNS,
WINS, and host files |
| 8.6.3 |
TCP, UDP,
POP3, SMTP, SNMP, FTP, HTTP, and IP |
| 8.6.4 |
Why TCP/IP is
supported by every operating system and millions of hosts worldwide |
| 8.6.5 |
The purpose
and function of internet domain name server hierarchies (how email
arrives in another country) |
| 8.6.6 |
Class A, B,
and C addresses and their default subnet mask numbers |
| 8.6.7 |
The port
numbers used (for example HTTP, FTP, SMTP) for a given service |
| 8.6.8 |
Proxy and why
it is used |
| 8.6.9 |
IP address,
DNS, default gateway, IP proxy, WINS, DHCP, host name, and internet
domain name |
|
| 8.7 |
TCP/IP Suite: Utilities
| 8.7.1 |
How and when
to use ARP to test, validate, and troubleshoot IP connectivity |
| 8.7.2 |
How and when
to use Telnet to test, validate, and troubleshoot IP connectivity |
| 8.7.3 |
How and when
to use NBTSTAT to test, validate, and troubleshoot IP connectivity |
| 8.7.4 |
How and when
to use TRACERT to test, validate, and troubleshoot IP connectivity |
| 8.7.5 |
How and when
to use NETSTAT to test, validate, and troubleshoot IP connectivity |
| 8.7.6 |
How and when
to use IPCONFIG/WINIPCONFIG to test, validate, and troubleshoot IP
connectivity |
| 8.7.7 |
How and when
to use FTP to test, validate, and troubleshoot IP connectivity |
| 8.7.8 |
How and when
to use PING to test, validate, and troubleshoot IP connectivity |
|
| 8.8 |
Remote Connectivity
| 8.8.1 |
The
distinction between PPP and SLIP |
| 8.8.2 |
The purpose
and function of PPTP and the conditions under which it is useful |
| 8.8.3 |
The
attributes, advantages and disadvantages of ISDN and PSTN (POTS) |
| 8.8.4 |
The modem
configuration parameters which must be set (serial port IRQ, I/O
address, maximum port speed) for dial-up networking to function |
| 8.8.5 |
The
requirements for a remote connection |
|
| 8.9 |
Security
| 8.9.1 |
Selection of
a security model (user and share levels) as a good practice to
ensure network security |
| 8.9.2 |
The use of
standard password practices and procedures as a good practice to
ensure network security |
| 8.9.3 |
The need to
employ data encryption to protect network data as a good practice to
ensure network security |
| 8.9.4 |
The use of a
firewall as a good practice to ensure network connectivity |
|
| 8.10 |
Implementing Installation of
the Network
| 8.10.1 |
Administrative
and test accounts, passwords, IP addresses, IP configurations, and
relevant SOPs |
| 8.10.2 |
The impact of
environmental factors on computer networks |
| 8.10.3 |
Common
peripheral ports, external SCSI connections (esp. DB-25), print
servers, hubs, routers, brouters, bridges, patch panels, UPSs, NICs,
and token ring media filters |
| 8.10.4 |
The
consequences of trying to install an analog modem into a digital
jack |
| 8.10.5 |
The uses of
RJ-45 connectors may differ greatly depending on the cabling |
| 8.10.6 |
Patch cables
contribute to the overall length of the cabling segment |
|
| 8.11 |
Maintaining and Supporting
the Network
| 8.11.1 |
The kinds of
test documentation that are usually available regarding a vendors
patches, fixes, upgrades, etc. |
| 8.11.2 |
Demonstrate awareness of standard backup procedures back up media
storage practices |
| 8.11.3 |
The need for periodic application of software patches and other fixes to the
network |
| 8.11.4 |
The
need to install anti-virus software on the server and workstation |
| 8.11.5 |
The
need to frequently update virus signatures |
|
| 8.12 |
Troubleshooting the Network
| 8.12.1 |
Troubleshooting
approach |
| 8.12.2 |
Distinguish
whether a problem is attributable to the operator or the system |
| 8.12.3 |
A second
method for determining whether a problem is attributable to the
operator or the system |
| 8.12.4 |
The need to
check the following as physical and logical indicators of trouble:
link lights, power lights, error displays, error logs and displays,
and performance monitors |
| 8.12.5 |
Given a
network problem scenario, determine the problem. |
| 8.12.6 |
The purpose
and function of common network tools including: a crossover cable,
hardware loopback, tone generator, tone locator (fox and hound) |
|
| Chapter Summary |
|
|
| Chapter 9: CCNA
Exam Preparation |
| Chapter
Review |
| Chapter
Overview
|
| 9.1 |
OSI Model
| 9.1.1 |
Layer
functions |
| 9.1.2 |
The
application layer |
| 9.1.3 |
The
presentation layer |
| 9.1.4 |
The session
layer |
| 9.1.5 |
The transport
layer |
| 9.1.6 |
The network
layer |
| 9.1.7 |
The data-link
layer |
| 9.1.8 |
The physical
layer |
| 9.1.9 |
Data
encapsulation |
|
|
| 9.2 |
Creating
Subnets
|
|
| 9.3 |
Router Commands
| 9.3.1 |
Basic router
configuration |
| 9.3.2 |
Testing and
other basic commands |
| 9.3.3 |
Configuring
IPX routing |
| 9.3.4 |
Configuring standard and extended IP
access lists |
| 9.3.5 |
PPP encapsulation with PAP and CHAP |
| 9.3.6 |
ISDN |
| 9.3.7 |
Frame relay -
simple configuration |
| 9.3.8 |
Frame relay - multipoint subinterfaces
configuration |
| 9.3.9 |
Frame relay - point-to-point
subinterfaces configuration |
| 9.3.10 |
Monitoring frame relay |
| 9.3.11 |
Booting up the router |
|
|
| 9.4 |
LAN
Switching
| 9.4.1 |
Full-Duplex
and Half-Duplex Ethernet Operations |
| 9.4.2 |
Ethernet
Frame |
| 9.4.3 |
The MAC
Address |
| 9.4.4 |
Functions of
the MAC Address - The Hub |
| 9.4.5 |
Functions of
the MAC Address - The Switch |
|
|
| 9.5 |
Microsegmentation
of a Network
| 9.5.1 |
LAN
Segmentation using Switches |
| 9.5.2 |
Switches and
Buffering |
| 9.5.3 |
A " Flat
Network " |
| 9.5.4 |
LAN
Segmentation Using Routers |
|
|
| 9.6 |
Who
to ARP for?
| 9.6.1 |
ARP
Request/Reply |
| 9.6.2 |
Example
1: The ARP Request and Reply
|
|
|
| 9.7 |
Switching
Methods
| 9.7.1 |
Symmetric and
Asymmetric Switching |
| 9.7.2 |
Cut-through
and store-and-forward LAN switching |
|
|
| 9.8 |
The
Benefits of Virtual LANs (VLANs)
| 9.8.1 |
Layer 2
Broadcast Control |
| 9.8.2 |
Why Use
Port-Centric VLANs? |
| 9.8.3 |
Routing and
VLANs |
| 9.8.4 |
VLAN Tagging |
|
|
| 9.9 |
Spanning
Tree Protocol
|
|
| 9.10 |
Skills
Based Sample Scenario - Lab Test
| 9.10.1 |
Skills-Based
Exam Preparation |
|
|
| Chapter Summary
|
|
|
|
|