SlideShare une entreprise Scribd logo
1  sur  1012
Télécharger pour lire hors ligne
Advance Praise
“Todd’s methods of discussing topics are tactfully approached so they are not confusing to
the reader, and his explanations are clear and easy to understand.”
—Amazon Reader Review
“I passed my CCNA on the first try after reading this book thoroughly. …If you read the
book and do all the review questions and written labs at the end of each chapter, you will
be well prepared for the exam.”
—Amazon Reader Review
“This is a great book! Todd Lammle has the ability to make complex topics simple. Cisco
books are essential once you’ve mastered networking basics, but there is nothing like Sybex
for learning the concepts from A to Z.”
—Amazon Reader Review
“Todd has been an authority in this field for as long as I can remember. His style of writing
keeps the book from becoming a sleep aid and provides nuts and bolts information that is both
excellent real-world reference and directly relevant to exam objectives. If you are considering
taking the CCNA exam, you would be ill advised to not give this book a thorough read.”
—Amazon Reader Review
“This is the first book review I have ever written on Amazon. I’ve been in the computer/net-
work support field for many years, but had almost no contact with Cisco equipment. I basi-
cally knew the ‘enable’ and ‘config’ Cisco commands. I had originally planned on shelling
out the $3000 to take a CCNA boot camp, but decided that that was way too much money.
So I bought this book instead … took a week off from work (which I would have done any-
way for the class), and went at it ... My homegrown boot camp paid off because I passed the
exam on the first try, saving almost $2900!”
—Amazon Reader Review
“This is the best technical book I have ever read!!”
—Amazon Reader Review
“This book is excellent resource for preparation for CCNA certification. It has needed infor-
mation regarding the Cisco’s objective. Sample test and Bonus Test give extra knowledge for
exam’s question. Users have more knowledge and practice of test exams. I will recommend
this book for anyone who does not have any knowledge of CCNA material.”
—Amazon Reader Review
10089.book Page i Monday, July 23, 2007 3:17 PM
“I’ve recently passed the CCNA exam with 985 out of 1000 points and Todd Lammle’s
book was my only study material (along with a Cisco 2500 router).
“It covers all relevant topics in such an easy-to-understand way and gives you a great net-
working/Cisco knowledge to build upon. Even now, while I’m pursuing other certifications,
it serves as an irreplaceable reference. Every chapter concludes with review questions,
hands-on exercises or labs to give you the opportunity of applying your new skills in real-
world scenarios and the CD provides additional sample tests and flashcards to consolidate
your knowledge.
“By reading the book twice and doing all the exercises you will be able to answer just about
any question you may encounter on the exam. Highly recommended!”
—Amazon Reader Review
“I had made three previous attempts using Cisco Press but could not get over the hump.
Needless to say I was getting pretty discouraged. However, I had heard good things about
the Sybex book by Todd Lammle and decided to give it a try. It was the best thing I could
have done. The book read great and it explained the required concepts and topics very well.
The review questions and Hand-on Labs at the end of each chapter were also very helpful.
“I took the test last weekend and passed!!
“Thank you!!”
—Amazon Reader Review
“Good exam prep. I read this book and with only slight network experience was able to pass
the CCNA.”
—Amazon Reader Review
“There isn’t much more I can say about this book than has already been said. I used Todd’s
guide to help me pass the CCNA in 2000 and am using him again to recertify. Just an excel-
lent book. Period.”
—Amazon Reader Review
“This book covered everything I needed to pass the exam, with hands-on experience, and the
bonus material. What a great written book this is. The best I have ever read.
“I recommend this book highly!!”
—Amazon Reader Review
10089.book Page ii Monday, July 23, 2007 3:17 PM
Wiley Publishing, Inc.
CCNA®
:
Cisco®
Certified
Network Associate
Study Guide
Sixth Edition
Todd Lammle
10089.book Page iii Monday, July 23, 2007 3:17 PM
Acquisitions Editor: Jeff Kellum
Development Editor: Toni Zuccarini Ackley
Technical Editor: Patrick J. Conlan
Production Editor: Sarah Groff-Palermo
Copy Editor: Judy Flynn
Production Manager: Tim Tate
Vice President and Executive Group Publisher: Richard Swadley
Vice President and Executive Publisher: Joseph B. Wikert
Vice President and Publisher: Neil Edde
Media Project Supervisor: Laura Atkinson
Media Development Specialist: Josh Frank
Media Quality Assurance: Angie Denny
Book Designers: Judy Fung and Bill Gibson
Compositor: Craig Woods, Happenstance Type-O-Rama
Proofreader: Nancy Riddiough
Indexer: Ted Laux
Anniversary Logo Design: Richard Pacifico
Cover Designer: Ryan Sneed
Copyright © 2007 by Wiley Publishing, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN: 978-0-470-11008-9
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any
means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections
107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or
authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood
Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should
be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256,
(317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with
respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including
without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales
or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This
work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other pro-
fessional services. If professional assistance is required, the services of a competent professional person should be
sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organi-
zation or Website is referred to in this work as a citation and/or a potential source of further information does not
mean that the author or the publisher endorses the information the organization or Website may provide or recom-
mendations it may make. Further, readers should be aware that Internet Websites listed in this work may have
changed or disappeared between when this work was written and when it is read.
Forgeneralinformationonourotherproductsandservicesortoobtaintechnicalsupport,pleasecontactourCustomer
Care Department within the U.S. at (800) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be
available in electronic books.
Library of Congress Cataloging-in-Publication Data is available from the publisher.
TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John
Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without
written permission. Cisco and CCNA are registered trademarks of Cisco Systems, Inc. All other trademarks are
the property of their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor
mentioned in this book.
10 9 8 7 6 5 4 3 2 1
10089.book Page iv Monday, July 23, 2007 3:17 PM
To Our Valued Readers:
Thank you for looking to Sybex for your CCNA exam prep needs. We at Sybex are proud
of our reputation for providing certification candidates with the practical knowledge and
skills needed to succeed in the highly competitive IT marketplace. This latest edition of the
best-selling CCNA: Cisco Certified Network Associate Study Guide reflects our commit-
ment to provide CCNA candidates with the most up-to-date, accurate, and accessible
instructional material on the market.
As with previous editions, Todd and the editors have worked hard to ensure that the study
guide you hold in your hands is comprehensive, in-depth, and pedagogically sound. We’re
confident that this book will exceed the demanding standards of the certification market-
place and help you, the CCNA certification candidate, succeed in your endeavors.
As always, your feedback is important to us. If you believe you’ve identified an error in the
book, please visit the Customer Support section of the Wiley website. And if you have general
comments or suggestions, feel free to drop me a line directly at nedde@wiley.com. At Sybex,
we’re continually striving to meet the needs of individuals preparing for certification exams.
Good luck in pursuit of your CCNA certification!
Neil Edde
Publisher—Certification
Sybex, an Imprint of Wiley
10089.book Page v Monday, July 23, 2007 3:17 PM
10089.book Page vi Monday, July 23, 2007 3:17 PM
Acknowledgments
Monica Lammle’s writing style and voice, editing ability, encouragement, and dedication to
ensuring that my books are concise yet highly readable has been invaluable to the success of
this and many other projects. She brings clarity and life to what can truly be some very arcane
and difficult material!
Mr. Patrick Conlan has got to be the personification of perseverance—he’s a rock! Patrick
literally hashed and rehashed each topic in this guide with me at all hours of the day and
night—scrutinizing the material until we both agreed it was verifiably solid. He was so instru-
mental in the development of this book that I hired him at GlobalNet Training to work as a
course developer and trainer! You’re going to be hearing a lot more from Mr. Conlan in the
technical instruction and writing arena in the future for sure.
Daniel Aguilera, who has worked with me at GlobalNet Training for seven years, also
worked diligently, helping me put together the bonus exams you’ll find on the CD (so be sure
to give him a call if you happen to find a problem <G>). Dan possesses both the intelligence
and optimism required to be a great source of encouragement and a deep reservoir of problem-
solving ability whenever I found myself discouraged or burned out.
Toni Zuccarini Ackley was the main editor of this—the newest book in the Sybex Cisco
series. Thank you Toni for having the patience of Job, and for working so hard on this book
with me. I’m so happy (and relieved) that you took on the job and, most of all, that you didn’t
run screaming from the room the next day!
Jeff Kellum is instrumental to my success in the Cisco world and is my acquisitions editor.
Jeff, thanks for your guidance and continued patience. Although we work well together and put
out fantastic material, I am sure he groans when he sees my name on caller ID!
In addition, Sarah Groff-Palermo was an excellent production editor and she worked really
hard to get the book done as quickly as possible, without missing the small mistakes that are
so easy to over look. Judy Flynn was the copy editor and she showed me that you can actually
write a book and still have patience, be helpful but yet work extremely hard to get this book
out on the shelves as fast as possible, and for that I thank you tremendously. Both Sarah and
Judy worked very hard editing the book for what will hopefully turn out to be a great guide
to lead you on your journey toward becoming a CCNA.
Finally a big thanks to Craig Woods and Happenstance-Type-O-Rama, and the CD team:
Laura Atkinson, Josh Frank, and Angie Denny.
10089.book Page vii Monday, July 23, 2007 3:17 PM
10089.book Page viii Monday, July 23, 2007 3:17 PM
Contents at a Glance
Introduction xxiii
Assessment Test xxxiii
Chapter 1 Internetworking 1
Chapter 2 Introduction to TCP/IP 67
Chapter 3 Subnetting, Variable Length Subnet Masks (VLSMs), and
Troubleshooting TCP/IP 111
Chapter 4 Cisco’s Internetworking Operating System (IOS) and
Security Device Manager (SDM) 171
Chapter 5 Managing a Cisco Internetwork 251
Chapter 6 IP Routing 327
Chapter 7 Enhanced IGRP (EIGRP) and Open Shortest Path
First (OSPF) 417
Chapter 8 Layer 2 Switching and Spanning Tree Protocol (STP) 493
Chapter 9 Virtual LANs (VLANs) 551
Chapter 10 Security 609
Chapter 11 Network Address Translation (NAT) 669
Chapter 12 Cisco’s Wireless Technologies 703
Chapter 13 Internet Protocol Version 6 (IPv6) 739
Chapter 14 Wide Area Networks 773
Glossary 851
Index 911
10089.book Page ix Monday, July 23, 2007 3:17 PM
10089.book Page x Monday, July 23, 2007 3:17 PM
Table of Contents
Introduction xxiii
Assessment Test xxxiii
Chapter 1 Internetworking 1
Internetworking Basics 4
Internetworking Models 11
The Layered Approach 12
Advantages of Reference Models 12
The OSI Reference Model 13
The Application Layer 15
The Presentation Layer 16
The Session Layer 16
The Transport Layer 16
The Network Layer 22
The Data Link Layer 24
The Physical Layer 30
Ethernet Networking 31
Half- and Full-Duplex Ethernet 33
Ethernet at the Data Link Layer 34
Ethernet at the Physical Layer 37
Ethernet Cabling 39
Straight-Through Cable 39
Crossover Cable 40
Rolled Cable 40
Data Encapsulation 43
The Cisco Three-Layer Hierarchical Model 46
The Core Layer 47
The Distribution Layer 48
The Access Layer 49
Summary 49
Exam Essentials 49
Written Lab 1 50
Written Lab 1.1: OSI Questions 51
Written Lab 1.2: Defining the OSI Layers and Devices 52
Written Lab 1.3: Identifying Collision and
Broadcast Domains 53
Written Lab 1.4: Binary/Decimal/Hexadecimal
Conversion 53
Review Questions 56
Answers to Review Questions 60
10089.book Page xi Monday, July 23, 2007 3:17 PM
xii Table of Contents
Answers to Written Lab 1 62
Answer to Written Lab 1.2 63
Answers to Written Lab 1.3 63
Answers to Written Lab 1.4 64
Chapter 2 Introduction to TCP/IP 67
TCP/IP and the DoD Model 68
The Process/Application Layer Protocols 70
The Host-to-Host Layer Protocols 74
The Internet Layer Protocols 83
IP Addressing 92
IP Terminology 93
The Hierarchical IP Addressing Scheme 93
Private IP Addresses 98
Broadcast Addresses 100
Summary 101
Exam Essentials 102
Written Lab 2 102
Review Questions 104
Answers to Review Questions 108
Answers to Written Lab 2 110
Chapter 3 Subnetting, Variable Length Subnet Masks
(VLSMs), and Troubleshooting TCP/IP 111
Subnetting Basics 112
IP Subnet-Zero 113
How to Create Subnets 114
Subnet Masks 115
Classless Inter-Domain Routing (CIDR) 116
Subnetting Class C Addresses 118
Subnetting Class B Addresses 127
Subnetting Class A Addresses 134
Variable Length Subnet Masks (VLSMs) 137
VLSM Design 138
Implementing VLSM Networks 139
Summarization 147
Troubleshooting IP Addressing 150
Determining IP Address Problems 153
Summary 157
Exam Essentials 158
Written Labs 3 158
Written Lab 3.1: Written Subnet Practice #1 159
Written Lab 3.2: Written Subnet Practice 159
Written Lab 3.3: Written Subnet Practice 160
10089.book Page xii Monday, July 23, 2007 3:17 PM
Table of Contents xiii
Review Questions 161
Answers to Review Questions 166
Answers to Written Lab 3.1 168
Answers to Written Lab 3.2 169
Answers to Written Lab 3.3 169
Chapter 4 Cisco’s Internetworking Operating System (IOS)
and Security Device Manager (SDM) 171
The IOS User Interface 173
Cisco Router IOS 173
Connecting to a Cisco Router 173
Bringing Up a Router 175
Command-Line Interface (CLI) 179
Entering the CLI from a Non-ISR Router 180
Overview of Router Modes 181
CLI Prompts 182
Editing and Help Features 185
Gathering Basic Routing Information 189
Router and Switch Administrative Configurations 191
Hostnames 191
Banners 192
Setting Passwords 194
Encrypting Your Passwords 199
Descriptions 201
Router Interfaces 204
Bringing Up an Interface 206
Viewing, Saving, and Erasing Configurations 212
Deleting the Configuration and Reloading the Router 214
Verifying Your Configuration 214
Cisco’s Security Device Manager (SDM) 223
Summary 232
Exam Essentials 233
Written Lab 4 234
Hands-on Labs 235
Hands-on Lab 4.1: Logging into a Router 235
Hands-on Lab 4.2: Using the Help and Editing Features 236
Hands-on Lab 4.3: Saving a Router Configuration 237
Hands-on Lab 4.4: Setting Your Passwords 237
Hands-on Lab 4.5: Setting the Hostname, Descriptions,
IP Address, and Clock Rate 239
Hands-on Lab 4.6: Installing SDM on Your Computer 241
Review Questions 242
Answers to Review Questions 247
Answers to Written Lab 4 249
10089.book Page xiii Monday, July 23, 2007 3:17 PM
xiv Table of Contents
Chapter 5 Managing a Cisco Internetwork 251
The Internal Components of a Cisco Router 252
The Router Boot Sequence 253
Managing Configuration Register 254
Understanding the Configuration Register Bits 254
Checking the Current Configuration Register Value 256
Changing the Configuration Register 256
Recovering Passwords 258
Boot System Commands 261
Backing Up and Restoring the Cisco IOS 262
Verifying Flash Memory 263
Backing Up the Cisco IOS 264
Restoring or Upgrading the Cisco Router IOS 265
Using the Cisco IOS File System (Cisco IFS) 266
Using the SDM to Manage the Flash Memory 270
Backing Up and Restoring the Cisco Configuration 274
Backing Up the Cisco Router Configuration 275
Restoring the Cisco Router Configuration 276
Erasing the Configuration 277
Using the Cisco IOS File System to Manage Your
Router’s Configuration (Cisco IFS) 278
Using the SDM to Back Up/Restore and Edit
the Router’s Configuration 280
Using Cisco Discovery Protocol (CDP) 283
Getting CDP Timers and Holdtime Information 283
Gathering Neighbor Information 284
Gathering Interface Traffic Information 289
Gathering Port and Interface Information 290
Documenting a Network Topology Using CDP 292
Using Telnet 295
Telnetting into Multiple Devices Simultaneously 297
Checking Telnet Connections 297
Checking Telnet Users 297
Closing Telnet Sessions 298
Using SDM to Telnet into Your Router 299
Resolving Hostnames 300
Building a Host Table 300
Using DNS to Resolve Names 302
Checking Network Connectivity and Troubleshooting 305
Using the ping Command 305
Using the traceroute Command 307
Debugging 308
Using the show processes Command 310
Summary 311
10089.book Page xiv Monday, July 23, 2007 3:17 PM
Table of Contents xv
Exam Essentials 311
Written Lab 5 313
Hands-on Labs 313
Hands-on Lab 5.1: Backing Up Your Router IOS 314
Hands-on Lab 5.2: Upgrading or Restoring
Your Router IOS 314
Hands-on Lab 5.3: Backing Up the Router Configuration 314
Hands-on Lab 5.4: Using the Cisco Discovery
Protocol (CDP) 315
Hands-on Lab 5.5: Using Telnet 316
Hands-on Lab 5.6: Resolving Hostnames 316
Review Questions 318
Answers to Review Questions 323
Answers to Written Lab 5 325
Chapter 6 IP Routing 327
Routing Basics 329
The IP Routing Process 331
Testing Your IP Routing Understanding 336
Configuring IP Routing 341
Configuring IP Routing in Our Network 362
Static Routing 363
Default Routing 374
Dynamic Routing 377
Routing Protocol Basics 377
Distance-Vector Routing Protocols 379
Routing Loops 380
Routing Information Protocol (RIP) 383
RIP Timers 383
Configuring RIP Routing 383
Verifying the RIP Routing Tables 387
Configuring RIP Routing Example 2 389
Holding Down RIP Propagations 390
RIP Version 2 (RIPv2) 390
Interior Gateway Routing Protocol (IGRP) 392
Verifying Your Configurations 393
The show ip protocols Command 394
The debug ip rip Command 395
Enabling RIPv2 on Our Internetwork 398
Summary 401
Exam Essentials 401
Written Lab 6 402
Hands-on Labs 403
Hands-on Lab 6.1: Creating Static Routes 404
Hands-on Lab 6.2: Configuring RIP Routing 405
10089.book Page xv Monday, July 23, 2007 3:17 PM
xvi Table of Contents
Review Questions 407
Answers to Review Questions 413
Answers to Written Lab 6 415
Chapter 7 Enhanced IGRP (EIGRP) and Open Shortest
Path First (OSPF) 417
EIGRP Features and Operation 418
Protocol-Dependent Modules 419
Neighbor Discovery 419
Reliable Transport Protocol (RTP) 421
Diffusing Update Algorithm (DUAL) 421
Using EIGRP to Support Large Networks 422
Multiple ASes 422
VLSM Support and Summarization 423
Route Discovery and Maintenance 424
Configuring EIGRP 426
Corp 429
R1 429
R2 430
R3 430
Redistributing to the 871W Router from R3 432
Configuring Discontiguous Networks 434
Load Balancing with EIGRP 435
Verifying EIGRP 438
Open Shortest Path First (OSPF) Basics 444
OSPF Terminology 446
SPF Tree Calculation 448
Configuring OSPF 449
Enabling OSPF 449
Configuring OSPF Areas 450
Configuring Our Network with OSPF 453
Verifying OSPF Configuration 457
The show ip ospf Command 458
The show ip ospf database Command 459
The show ip ospf interface Command 460
The show ip ospf neighbor Command 461
The show ip protocols Command 461
Debugging OSPF 462
OSPF DR and BDR Elections 465
Neighbors 465
Adjacencies 465
DR and BDR Elections 466
OSPF and Loopback Interfaces 466
Configuring Loopback Interfaces 467
OSPF Interface Priorities 469
10089.book Page xvi Monday, July 23, 2007 3:17 PM
Table of Contents xvii
Troubleshooting OSPF 471
Configuring EIGRP and OSPF Summary Routes 474
Summary 476
Exam Essentials 477
Written Lab 7 477
Hands-on Labs 478
Hands-on Lab 7.1: Configuring and Verifying EIGRP 479
Hands-on Lab 7.2: Enabling the OSPF Process 480
Hands-on Lab 7.3: Configuring OSPF Neighbors 481
Hands-on Lab 7.4: Verifying OSPF Operation 482
Hands-on Lab 7.5: OSPF DR and BDR Elections 482
Review Questions 484
Answers to Review Questions 489
Answers to Written Lab 7 491
Chapter 8 Layer 2 Switching and Spanning Tree
Protocol (STP) 493
Before Layer 2 Switching 494
Switching Services 497
Limitations of Layer 2 Switching 498
Bridging vs. LAN Switching 499
Three Switch Functions at Layer 2 499
Spanning Tree Protocol (STP) 505
Spanning Tree Terms 506
Spanning Tree Operations 507
Configuring Catalyst Switches 514
Catalyst Switch Configuration 515
Verifying Cisco Catalyst Switches 528
Cisco Network Assistant 534
Summary 541
Exam Essentials 542
Written Lab 8 542
Review Questions 543
Answers to Review Questions 548
Answers to Written Lab 8.1 550
Chapter 9 Virtual LANs (VLANs) 551
VLAN Basics 552
Broadcast Control 554
Security 555
Flexibility and Scalability 555
VLAN Memberships 558
Static VLANs 558
Dynamic VLANs 559
10089.book Page xvii Monday, July 23, 2007 3:17 PM
xviii Table of Contents
Identifying VLANs 559
Frame Tagging 561
VLAN Identification Methods 562
VLAN Trunking Protocol (VTP) 563
VTP Modes of Operation 564
VTP Pruning 565
Routing between VLANs 567
Configuring VLANs 568
Assigning Switch Ports to VLANs 570
Configuring Trunk Ports 571
Configuring Inter-VLAN Routing 575
Configuring VTP 580
Troubleshooting VTP 583
Telephony: Configuring Voice VLANs 586
Configuring the Voice VLAN 587
Configuring IP Phone Voice Traffic 587
Using the CNA to Configure VLANs and
Inter-VLAN Routing 588
Summary 597
Exam Essentials 598
Written Lab 9 599
Review Questions 600
Answers to Review Questions 605
Answers to Written Lab 9.1 607
Chapter 10 Security 609
Perimeter, Firewall, and Internal Routers 610
Recognizing Security Threats 611
Mitigating Security Threats 614
Cisco’s IOS Firewall 614
Introduction to Access Lists 615
Mitigating Security Issues with ACLs 618
Standard Access Lists 619
Wildcard Masking 620
Standard Access List Example 622
Controlling VTY (Telnet) Access 625
Extended Access Lists 626
Extended Access List Example 1 630
Extended Access List Example 2 631
Advanced Access Lists 632
Named ACLs 632
Switch Port ACLs 634
Lock and Key (Dynamic ACLs) 636
Reflexive ACLs 637
Time-Based ACLs 637
10089.book Page xviii Monday, July 23, 2007 3:17 PM
Table of Contents xix
Remarks 638
Context-Based Access Control (Cisco IOS Firewall) 639
Authentication Proxy 640
Monitoring Access Lists 640
Configuring Access Lists Using SDM 643
Creating ACLs with SDM 643
Creating Firewalls with SDM 647
Summary 654
Exam Essentials 655
Written Lab 10.1 655
Hands-on Labs 656
Hands-on Lab 10.1: Standard IP Access Lists 657
Hands-on Lab 10.2: Extended IP Access Lists 657
Review Questions 661
Answers to Review Questions 666
Answers to Written Lab 10.1 668
Chapter 11 Network Address Translation (NAT) 669
When Do We Use NAT? 670
Types of Network Address Translation 671
NAT Names 672
How NAT Works 673
Static NAT Configuration 674
Dynamic NAT Configuration 675
PAT (Overloading) Configuration 675
Simple Verification of NAT 676
Testing and Troubleshooting NAT 677
Configuring NAT on Our Internetwork 679
Configuring NAT Using SDM 684
Summary 688
Exam Essentials 688
Written Lab 11 688
Hands-on Labs 689
Lab 11.1: Preparing for NAT 691
Lab 11.2: Configuring Dynamic NAT 692
Lab 11.3: Configuring PAT 694
Review Questions 696
Answers to Review Questions 699
Answers to Written Lab 11 701
Chapter 12 Cisco’s Wireless Technologies 703
Introduction to Wireless Technology 704
The 802.11 Standards 706
Comparing 802.11 711
10089.book Page xix Monday, July 23, 2007 3:17 PM
xx Table of Contents
Cisco’s Unified Wireless Solution 712
Split-MAC Architecture 715
MESH and LWAPP 716
AWPP 718
Wireless Security 718
Configuring Our Wireless Internetwork 721
Summary 729
Exam Essentials 729
Written Lab 12 730
Review Questions 731
Answers to Review Questions 735
Answers to Written Lab 12 737
Chapter 13 Internet Protocol Version 6 (IPv6) 739
Why Do We Need IPv6? 740
The Benefits and Uses of IPv6 741
IPv6 Addressing and Expressions 742
Shortened Expression 743
Address Types 744
Special Addresses 745
How IPv6 Works in an Internetwork 746
Autoconfiguration 746
Configuring Cisco Routers with IPv6 747
DHCPv6 748
ICMPv6 749
IPv6 Routing Protocols 750
RIPng 751
EIGRPv6 751
OSPFv3 752
Migrating to IPv6 753
Dual Stacking 754
6to4 Tunneling 754
NAT-PT 755
Configuring IPv6 on Our Internetwork 756
Configuring RIPng 759
Configuring OSPFv3 763
Summary 766
Exam Essentials 767
Written Lab 13 767
Review Questions 768
Answers to Review Questions 771
Answers to Written Lab 13.1 772
10089.book Page xx Monday, July 23, 2007 3:17 PM
Table of Contents xxi
Chapter 14 Wide Area Networks 773
Introduction to Wide Area Networks 774
Defining WAN Terms 775
WAN Connection Types 775
WAN Support 777
Cable and DSL 779
Cable 780
Digital Subscriber Line (DSL) 782
Cabling the Serial Wide Area Network 785
Serial Transmission 785
Data Terminal Equipment and Data Communication
Equipment 786
High-Level Data-Link Control (HDLC) Protocol 787
Point-to-Point Protocol (PPP) 788
Link Control Protocol (LCP) Configuration Options 789
PPP Session Establishment 790
PPP Authentication Methods 790
Configuring PPP on Cisco Routers 791
Configuring PPP Authentication 791
Verifying PPP Encapsulation 792
PPPoE Configuration 796
Frame Relay 798
Introduction to Frame Relay Technology 798
Frame Relay Implementation and Monitoring 805
Using SDM for WAN Connections 813
Configuring PPP with Authentication Using SDM 813
Configuring PPPoE with SDM 818
Configuring Frame Relay with SDM 822
Virtual Private Networks 825
Introduction to Cisco IOS IPSec 826
IPSec Transforms 826
Configuring VPNs/IPSec Using the SDM 828
Summary 836
Exam Essentials 836
Written Lab 14 837
Hands-on Labs 837
Hands-on Lab 14.1: Configuring PPP Encapsulation
and Authentication 838
Hands-on Lab 14.2: Configuring and
Monitoring HDLC 839
Hands-on Lab 14.3: Configuring Frame Relay
and Subinterfaces 840
10089.book Page xxi Monday, July 23, 2007 3:17 PM
xxii Table of Contents
Review Questions 842
Answers to Review Questions 847
Answers to Written Lab 14.1 849
Glossary 851
Index 911
10089.book Page xxii Monday, July 23, 2007 3:17 PM
Introduction
Welcome to the exciting world of Cisco certification! You have picked up this book because
you want something better—namely, a better job with more satisfaction. Rest assured that you
have made a good decision. Cisco certification can help you get your first networking job or
more money and a promotion if you are already in the field.
Cisco certification can also improve your understanding of the internetworking of more
than just Cisco products: You will develop a complete understanding of networking and how
different network topologies work together to form a network. This is beneficial to every net-
working job and is the reason Cisco certification is in such high demand, even at companies
with few Cisco devices.
Cisco is the king of routing, switching, and security, the Microsoft of the internetworking
world. The Cisco certifications reach beyond the popular certifications, such as the MCSE, to
provide you with an indispensable factor in understanding today’s network—insight into the
Cisco world of internetworking. By deciding that you want to become Cisco certified, you are
saying that you want to be the best—the best at routing and the best at switching. This book
will lead you in that direction.
For up-to-the minute updates covering additions or modifications to the
CCNA certification exams, as well as additional study tools and review ques-
tions, be sure to visit the Todd Lammle forum and website at www.lammle.com
and/or www.sybex.com.
Cisco’s Network Support Certifications
Initially, to secure the coveted Cisco CCIE certification, you took only one test and then you
were faced with the (extremely difficult) hands-on lab, an all-or-nothing approach that made
it tough to succeed.
In response, Cisco created a series of new certifications to help you get the coveted CCIE
as well as aid prospective employers in measuring skill levels. With these new certifications,
which make for a better approach to preparing for that almighty lab, Cisco opened doors that
few were allowed through before.
This book covers everything CCNA related. For up-to-date information on
Todd Lammle Cisco Authorized CCNA CCNP, CCSP, CCVP, and CCIE boot-
camps, please see www.lammle.com and/or www.globalnettraining.com.
10089.book Page xxiii Monday, July 23, 2007 3:17 PM
xxiv Introduction
Cisco Certified Network Associate (CCNA)
The CCNA certification was the first in the new line of Cisco certifications and was the pre-
cursor to all current Cisco certifications. Now you can become a Cisco Certified Network
Associate for the meager cost of this book and either one test at $150 or two tests at $125
each—although the CCNA exams are extremely hard and cover a lot of material, so you have
to really know your stuff! Taking a Cisco class or spending months with hands-on experience
is not out of the norm.
And once you have your CCNA, you don’t have to stop there—you can choose to continue
with your studies and achieve a higher certification, called the Cisco Certified Network Pro-
fessional (CCNP). Someone with a CCNP has all the skills and knowledge he or she needs to
attempt the Routing and Switching CCIE lab. But just becoming a CCNA can land you that
job you’ve dreamed about.
Why Become a CCNA?
Cisco, not unlike Microsoft and Novell (Linux), has created the certification process to give
administrators a set of skills and to equip prospective employers with a way to measure skills
or match certain criteria. Becoming a CCNA can be the initial step of a successful journey
toward a new, highly rewarding, and sustainable career.
The CCNA program was created to provide a solid introduction not only to the Cisco Inter-
network Operating System (IOS) and Cisco hardware, but also to internetworking in general,
making it helpful to you in areas that are not exclusively Cisco’s. At this point in the certifi-
cation process, it’s not unrealistic that network managers—even those without Cisco equip-
ment—require Cisco certifications for their job applicants.
If you make it through the CCNA and are still interested in Cisco and internetworking,
you’re headed down a path to certain success.
What Skills Do You Need to Become a CCNA?
To meet the CCNA certification skill level, you must be able to understand or do the
following:
 A CCNA certified professional can install, configure, and operate LAN, WAN, and wire-
less access services securely, as well as troubleshoot and configure small to medium net-
works (500 nodes or fewer) for performance.
 This knowledge includes, but is not limited to, use of these protocols: IP, IPv6, EIGRP,
RIP, RIPv2, OSPF, serial connections, Frame Relay, cable, DSL, PPPoE, LAN switching,
VLANs, Ethernet, security, and access lists.
Be sure and check my web site and/or Cisco’s web site for the latest Cisco
CCNA objectives and other Cisco exams, objectives, and certifications that
can change on a moment’s notice
10089.book Page xxiv Monday, July 23, 2007 3:17 PM
Introduction xxv
How Do You Become a CCNA?
The way to become a CCNA is to pass one little test (CCNA Composite exam 640-802). Then—
poof!—you’re a CCNA. (Don’t you wish it were that easy?) True, it can be just one test, but you
still have to possess enough knowledge to understand what the test writers are saying.
However, Cisco has a two-step process that you can take in order to become a CCNA that
may or may not be easier than taking one longer exam (this book is based on the one-step
method 640-802); however, this book has all the information you need to pass all three exams.
The two-step method involves passing the following:
 Exam 640-822: Interconnecting Cisco Networking Devices 1(ICND1)
 Exam 640-816: Introduction to Cisco Networking Devices 2 (ICND2)
I can’t stress this enough: It’s critical that you have some hands-on experience with Cisco
routers. If you can get ahold of some 1841 or 2800 series routers, you’re set. But if you can’t,
I’ve worked hard to provide hundreds of configuration examples throughout this book to help
network administrators (or people who want to become network administrators) learn what
they need to know to pass the CCNA exam.
Since the new 640-802 exam is so hard, Cisco wants to reward you for taking the two-test
approach. Or so it seems. If you take the ICND1 exam, you actually receive a certification
called the CCENT (Cisco Certified Entry Networking Technician). This is one step toward
your CCNA. To achieve your CCNA, you must still pass your ICND2 exam.
Again, this book was written for the CCNA 640-802 Composite exam—one exam and you
get your certification.
For Cisco Authorized hands-on training with CCSI Todd Lammle, please see
www.globalnettraining.com. Each student will get hands-on experience by
configuring at least three routers and two switches—no sharing of equipment!
What Does This Book Cover?
This book covers everything you need to know in order to pass the CCNA 640-802 exam.
However, taking the time to study and practice with routers or a router simulator is the
real key to success.
You will learn the following information in this book:
 Chapter 1 introduces you to internetworking. You will learn the basics of the Open Sys-
tems Interconnection (OSI) model the way Cisco wants you to learn it. Ethernet network-
ing and standards are discussed in detail in this chapter as well. There are written labs and
plenty of review questions to help you. Do not skip the written labs in this chapter!
 Chapter 2 provides you with the background necessary for success on the exam as well as
in the real world by discussing TCP/IP. This in-depth chapter covers the very beginnings
of the Internet Protocol stack and then goes all the way to IP addressing and understand-
ing the difference between a network address and a broadcast address before finally
ending with network troubleshooting.
10089.book Page xxv Monday, July 23, 2007 3:17 PM
xxvi Introduction
 Chapter 3 introduces you to subnetting. You will be able to subnet a network in your head
after reading this chapter. In addition, you’ll learn about Variable Length Subnet Masks
(VLSMs) and how to design a network using VLSMs. This chapter will finish with sum-
marization techniques and configurations. Plenty of help is found in this chapter if you do
not skip the Written Lab and Review Questions.
 Chapter 4 introduces you to the Cisco Internetwork Operating System (IOS) and command-
line interface (CLI). In this chapter you will learn how to turn on a router and configure the
basics of the IOS, including setting passwords, banners, and more. IP configuration using
the Secure Device Manager (SDM) will be discussed and Hands-on Labs will help you gain
a firm grasp of the concepts taught in the chapter. Before you go through the Hands-on
Labs, be sure to complete the Written Lab and Review Questions.
 Chapter 5 provides you with the management skills needed to run a Cisco IOS network. Back-
ing up and restoring the IOS, as well as router configuration, is covered, as are the trouble-
shooting tools necessary to keep a network up and running. Before performing the Hands-on
Labs in this chapter, complete the Written Lab and Review Questions.
 Chapter 6 teaches you about IP routing. This is a fun chapter, because you will begin to
build your network, add IP addresses, and route data between routers. You will also learn
about static, default, and dynamic routing using RIP and RIPv2 (with a small touch of
IGRP). Written and Hands-on Labs will help you understand IP routing to the fullest.
 Chapter 7 dives into more complex dynamic routing with Enhanced IGRP and OSPF
routing. The Written Lab, Hands-on Labs, and Review Questions will help you master
these routing protocols.
 Chapter 8 gives you a background on layer 2 switching and how switches perform address
learning and make forwarding and filtering decisions. Network loops and how to avoid
them with the Spanning Tree Protocol (STP) will be discussed, as well as the 802.1w STP
version. Go through the Written Lab and Review Questions to help you really understand
the basic layer 2 switching on an internetwork.
 Chapter 9 covers virtual LANs and how you can use them in your internetwork. This
chapter also covers the nitty-gritty of VLANs and the different concepts and protocols
used with VLANs, as well as troubleshooting. The Written Lab and Review Questions
will reinforce the VLAN material.
 Chapter 10 covers security and access lists, which are created on routers to filter the network.
IP standard, extended, and named access lists are covered in detail. Written and Hands-on
Labs, along with Review Questions, will help you study for the security and access-list portion
of the CCNA Composite exam.
 Chapter 11 covers Network Address Translation (NAT). This chapter has been on the
Sybex website for a few years as an update to my last CCNA book, but I updated it and
added it to this edition. New information, commands, troubleshooting, and labs will help
you nail the NAT CCNA objectives.
 Chapter 12 covers wireless technologies. This is an introductory chapter regarding wire-
less technologies as Cisco sees them. However, I also added some advanced wireless topics
that cover Cisco’s newest gear. At this time, advanced wireless is not covered within the
Cisco CCNA objectives, but that can change on any given day. Make sure you understand
10089.book Page xxvi Monday, July 23, 2007 3:17 PM
Introduction xxvii
your basic wireless technologies like access points and clients, as well as the difference
between 802.11a, b, and g.
 Chapter 13 covers IPv6. This is a fun chapter and has some great information. IPv6 is not the
big, bad scary monster that most people think it is. IPv6 is an objective on this new exam, so
study this chapter carefully. Keep an eye out at www.lammle.com for late-breaking updates.
 Chapter 14 concentrates on Cisco wide area network (WAN) protocols. This chapter covers
HDLC, PPP, and Frame Relay in depth, as well as other protocols we use on a daily basis
like Cable, DSL and PPPoE. You must be proficient in all these protocols to be successful
on the CCNA exam. Do not skip the Written Lab, Review Questions, or Hands-on Labs
found in this chapter.
How to Use This Book
If you want a solid foundation for the serious effort of preparing for the Cisco Certified Network
Associate (CCNA Composite) 640-802 exam, then look no further. I have spent hundreds of
hours putting together this book with the sole intention of helping you to pass the CCNA exam
and learn how to configure Cisco routers and switches (among hundreds of other things!).
This book is loaded with valuable information, and you will get the most out of your studying
time if you understand how I put the book together.
To best benefit from this book, I recommend the following study method:
1. Take the assessment test immediately following this introduction. (The answers are at the
end of the test.) It’s okay if you don’t know any of the answers; that is why you bought
this book! Carefully read over the explanations for any question you get wrong and note
the chapters in which the material is covered. This information should help you plan your
study strategy. Honestly, my recommendation is to just start reading from Chapter 1 and
don’t stop until you’re all the way through Chapter 14.
2. Study each chapter carefully, making sure that you fully understand the information and
the test objectives listed at the beginning of each one. Pay extra-close attention to any
chapter that includes material covered in questions you missed in the assessment test.
3. Complete each Written Lab at the end of each chapter. Do not skip these written exercises
because they directly relate to the CCNA Composite objectives and what you must glean
from the chapters in which they appear. Do not just skim these labs! Make sure you
understand completely the reason for each answer.
4. Complete all Hands-on Labs in the chapter (not all chapters have hands-on labs, referring
to the text of the chapter so that you understand the reason for each step you take. If you
do not have Cisco equipment available, go to www.routersim.com for a router simulator
that will cover all the hands-on labs needed for all your Cisco certification needs.
5. Answer all of the Review Questions related to each chapter. (The answers appear at the end
of the chapters.) Note the questions that confuse you and study those sections of the book
again. Do not just skim these questions! Make sure you understand completely the reason
for each answer. Remember that these will not be the exact questions you find on the exam;
they are written to help you understand the chapter material.
10089.book Page xxvii Monday, July 23, 2007 3:17 PM
xxviii Introduction
6. Try your hand at the bonus exams that are included on the companion CD. The questions
in these exams appear only on the CD. Check out www.lammle.com for more Cisco exam
prep questions. The questions found at www.lammle.com will be updated at least monthly,
if not weekly or even daily! Before you take your test, be sure and visit my web site for ques-
tions, videos, audios and other useful information.
7. Also on the companion CD is the first module from my complete CCNA video series,
which covers internetworking and basic networking. This is critical for the CCNA exam.
In addition, as an added bonus, I have included an audio section from my CCNA audio
program. Do not skip the video and audio section!
Just a note to let you know that I mention the test number 640-801 in the video
and audio sections. This is nothing to be concerned about as the information
presented is valid for both the 640-801 and 640-802 exam.
8. Test yourself using all the flashcards on the CD. These are brand new and updated flash-
card programs to help you prepare for the CCNA exam. These are a great study tool!
To learn every bit of the material covered in this book, you’ll have to apply yourself regu-
larly, and with discipline. Try to set aside the same time period every day to study, and select
a comfortable and quiet place to do so. If you work hard, you will be surprised at how quickly
you learn this material.
If you follow the steps listed above and really study and practice the Review Questions,
bonus exams, the Todd Lammle video/audio sections, and the electronic flashcards, as well as
all the Written and Hands-on Labs, it would be hard to fail the CCNA Composite exam. How-
ever, studying for the CCNA exam is like trying to get in shape—if you do not go to the gym
every day, you won’t get in shape.
What’s on the CD?
We worked hard to provide some really great tools to help you with your certification process.
All of the following tools should be loaded on your workstation when you’re studying for the
test. As a fantastic bonus, I was able to add a section from both my CCNA video and audio
series to the CD included with this book!
The Sybex Test Preparation Software
The test preparation software prepares you to pass the CCNA exam. In this test engine, you
will find all the review and assessment questions from the book, plus two additional bonus
exams that appear exclusively on the CD.
Electronic Flashcards for PC, Pocket PC, and Palm Devices
To prepare for the exam, you can read this book, study the Review Questions at the end of
each chapter, and work through the practice exams included in the book and on the compan-
ion CD. But wait, there’s more! You can also test yourself with the flashcards included on the
10089.book Page xxviii Monday, July 23, 2007 3:17 PM
Introduction xxix
CD. If you can get through these difficult questions and understand the answers, you’ll know
you’re ready for the CCNA exam.
The flashcards include over 250 questions specifically written to hit you hard and make
sure you are ready for the exam. Between the review questions, bonus exams, and flashcards
on the CD, you’ll be more than prepared for the exam.
CCNA: Cisco Certified Network Associate Study Guide in PDF
Sybex offers the CCNA Exam 640-802 Study Guide in PDF on the CD so you can read the
book on your PC or laptop. (Acrobat Reader 7 is also included on the CD.)
Todd Lammle Videos
I have created a full CCNA series of videos that can be purchased in either DVD or down-
loadable format. However, as a bonus included with this book, the first module of this series
is included on the CD in its entirety. The video is over one hour of informative CCNA infor-
mation. This is a $149 value! Do not skip this video as it covers the internetworking objectives,
which are very important to the CCNA exam.
Todd Lammle Audios
In addition to the videos included for free on the CD, I have also included a full section from
my CCNA audio series. The CCNA audio series is a $199 value! This is a great tool to add to
your arsenal of study material to help you pass the CCNA exam.
To find more Todd Lammle videos and audios, as well as other Cisco study
material, please see www.lammle.com. And well you’re there, sign up for my
forum. There is a lot of useful information that can found in the forum, plus
you can ask me questions directly related to your studies.
Where Do You Take the Exams?
You may take the CCNA Composite exam at any Pearson VUE authorized testing centers
(www.vue.com) or call 877-404-EXAM (3926).
To register for a Cisco Certified Network Associate exam:
1. Determine the number of the exam you want to take. (The CCNA Composite exam
number is 640-802.)
2. Register with the nearest Pearson VUE testing center. At this point, you will be asked to
pay in advance for the exam. At the time of this writing, the exam is $150 and must be
taken within one year of payment. You can schedule exams up to six weeks in advance or
as late as the same day you want to take it—but if you fail a Cisco exam, you must wait
five days before you will be allowed to retake the exam. If something comes up and you
need to cancel or reschedule your exam appointment, contact Prometric or Pearson VUE
at least 24 hours in advance.
10089.book Page xxix Monday, July 23, 2007 3:17 PM
xxx Introduction
3. When you schedule the exam, you’ll get instructions regarding all appointment and cancel-
lation procedures, the ID requirements, and information about the testing-center location.
Tips for Taking Your CCNA Composite Exam
The CCNA Composite exam test contains about 55 to 60 questions and must be completed
in 75 to 90 minutes or less. This information can change per exam. You must get a score of
about 85% to pass this exam, but again, each exam can be different.
Many questions on the exam have answer choices that at first glance look identical—especially
the syntax questions! Remember to read through the choices carefully because close doesn’t cut it.
If you get commands in the wrong order or forget one measly character, you’ll get the question
wrong. So, to practice, do the hands-on exercises at the end of this book’s chapters over and over
again until they feel natural to you.
Also, never forget that the right answer is the Cisco answer. In many cases, more than one
appropriate answer is presented, but the correct answer is the one that Cisco recommends. On
the exam, you’re always instructed to pick one, two, or three, never “choose all that apply.”
The CCNA Composite 640-802 exam may include the following test formats:
 Multiple-choice single answer
 Multiple-choice multiple answer
 Drag-and-drop
 Fill-in-the-blank
 Router simulations
In addition to multiple choice and fill-in response questions, Cisco Career Certifications
exams may include performance simulation exam items.
Check out the software at www.routersim.com that lets you design and configure an
unlimited number of Cisco routers and switches running multiple routing protocols!
The software on the CD and at RouterSim.com provides step-by-step instruction on how
to configure both Cisco routers and switches. However, router simulations in Cisco proctored
exams will not show the steps to follow in completing a router interface configuration. They do
allow partial command responses. For example, show config or sho config or sh conf would
be acceptable. Router#show ip protocol or router#show ip prot would be acceptable.
Here are some general tips for exam success:
 Arrive early at the exam center so you can relax and review your study materials.
 Read the questions carefully. Don’t jump to conclusions. Make sure you’re clear about
exactly what each question asks.
 When answering multiple-choice questions that you’re not sure about, use the process of
elimination to get rid of the obviously incorrect answers first. Doing this greatly improves
your odds if you need to make an educated guess.
 You can no longer move forward and backward through the Cisco exams, so double-
check your answer before clicking Next since you can’t change your mind.
10089.book Page xxx Monday, July 23, 2007 3:17 PM
Introduction xxxi
After you complete an exam, you’ll get immediate, online notification of your pass or fail
status, a printed Examination Score Report that indicates your pass or fail status, and your
exam results by section. (The test administrator will give you the printed score report.) Test
scores are automatically forwarded to Cisco within five working days after you take the test,
so you don’t need to send your score to them. If you pass the exam, you’ll receive confirmation
from Cisco, typically within two to four weeks, sometimes longer.
How to Contact the Author
You can reach Todd Lammle through his forum at www.lammle.com.
10089.book Page xxxi Monday, July 23, 2007 3:17 PM
10089.book Page xxxii Monday, July 23, 2007 3:17 PM
Assessment Test
1. What protocol does PPP use to identify the Network layer protocol?
A. NCP
B. ISDN
C. HDLC
D. LCP
2. You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server con-
nected to the switch running 10Mbps half-duplex as well. How much bandwidth does each
host have to the server?
A. 100kbps
B. 1Mbps
C. 2Mbps
D. 10Mbps
3. In a network with dozens of switches, how many root bridges would you have?
A. 1
B. 2
C. 5
D. 12
4. What does the command routerA(config)#line cons 0 allow you to perform next?
A. Set the Telnet password.
B. Shut down the router.
C. Set your console password.
D. Disable console connections.
5. How long is an IPv6 address?
A. 32 bits
B. 128 bytes
C. 64 bits
D. 128 bits
6. What PPP protocol provides dynamic addressing, authentication, and multilink?
A. NCP
B. HDLC
C. LCP
D. X.25
10089.book Page xxxiii Monday, July 23, 2007 3:17 PM
xxxiv Assessment Test
7. What command will display the line, protocol, DLCI, and LMI information of an interface?
A. sh pvc
B. show interface
C. show frame-relay pvc
D. sho runn
8. Which of the following is the valid host range for the subnet on which the IP address
192.168.168.188 255.255.255.192 resides?
A. 192.168.168.129–190
B. 192.168.168.129–191
C. 192.168.168.128–190
D. 192.168.168.128–192
9. What does the passive command provide to dynamic routing protocols?
A. Stops an interface from sending or receiving periodic dynamic updates
B. Stops an interface from sending periodic dynamic updates but not from receiving updates
C. Stops the router from receiving any dynamic updates
D. Stops the router from sending any dynamic updates
10. Which protocol does Ping use?
A. TCP
B. ARP
C. ICMP
D. BootP
11. How many collision domains are created when you segment a network with a 12-port switch?
A. 1
B. 2
C. 5
D. 12
12. Which of the following commands will allow you to set your Telnet password on a Cisco router?
A. line telnet 0 4
B. line aux 0 4
C. line vty 0 4
D. line con 0
13. Which router command allows you to view the entire contents of all access lists?
A. show all access-lists
B. show access-lists
C. show ip interface
D. show interface
10089.book Page xxxiv Monday, July 23, 2007 3:17 PM
Assessment Test xxxv
14. What does a VLAN do?
A. Acts as the fastest port to all servers
B. Provides multiple collision domains on one switch port
C. Breaks up broadcast domains in a layer 2 switch internetwork
D. Provides multiple broadcast domains within a single collision domain
15. If you wanted to delete the configuration stored in NVRAM, what would you type?
A. erase startup
B. erase nvram
C. delete nvram
D. erase running
16. Which protocol is used to send a destination network unknown message back to originat-
ing hosts?
A. TCP
B. ARP
C. ICMP
D. BootP
17. Which class of IP address has the most host addresses available by default?
A. A
B. B
C. C
D. A and B
18. How often are BPDUs sent from a layer 2 device?
A. Never
B. Every 2 seconds
C. Every 10 minutes
D. Every 30 seconds
19. Which one of the following is true regarding VLANs?
A. Two VLANs are configured by default on all Cisco switches.
B. VLANs only work if you have a complete Cisco switched internetwork. No off-brand
switches are allowed.
C. You should not have more than 10 switches in the same VTP domain.
D. VTP is used to send VLAN information to switches in a configured VTP domain.
20. Which WLAN IEEE specification allows up to 54Mbps at 2.4GHz?
A. A
B. B
C. G
D. N
10089.book Page xxxv Monday, July 23, 2007 3:17 PM
xxxvi Assessment Test
21. How many broadcast domains are created when you segment a network with a 12-port switch?
A. 1
B. 2
C. 5
D. 12
22. What flavor of Network Address Translation can be used to have one IP address allow many
users to connect to the global Internet?
A. NAT
B. Static
C. Dynamic
D. PAT
23. What protocols are used to configure trunking on a switch? (Choose two.)
A. VLAN Trunking Protocol
B. VLAN
C. 802.1Q
D. ISL
24. What is a stub network?
A. A network with more than one exit point
B. A network with more than one exit and entry point
C. A network with only one entry and no exit point
D. A network that has only one entry and exit point
25. Where is a hub specified in the OSI model?
A. Session layer
B. Physical layer
C. Data Link layer
D. Application layer
26. What are the two main types of access control lists (ACLs)?
A. Standard
B. IEEE
C. Extended
D. Specialized
27. To back up an IOS, what command will you use?
A. backup IOS disk
B. copy ios tftp
C. copy tftp flash
D. copy flash tftp
10089.book Page xxxvi Monday, July 23, 2007 3:17 PM
Assessment Test xxxvii
28. What command is used to create a backup configuration?
A. copy running backup
B. copy running-config startup-config
C. config mem
D. wr mem
29. What is the main reason the OSI model was created?
A. To create a layered model larger than the DoD model
B. So application developers can change only one layer’s protocols at a time
C. So different networks could communicate
D. So Cisco could use the model
30. Which protocol does DHCP use at the Transport layer?
A. IP
B. TCP
C. UDP
D. ARP
31. If your router is facilitating a CSU/DSU, which of the following commands do you need to use
to provide the router with a 64000bps serial link?
A. RouterA(config)#bandwidth 64
B. RouterA(config-if)#bandwidth 64000
C. RouterA(config)#clockrate 64000
D. RouterA(config-if)#clock rate 64
E. RouterA(config-if)#clock rate 64000
32. Which command is used to determine if an IP access list is enabled on a particular interface?
A. show access-lists
B. show interface
C. show ip interface
D. show interface access-lists
33. Which command is used to upgrade an IOS on a Cisco router?
A. copy tftp run
B. copy tftp start
C. config net
D. copy tftp flash
10089.book Page xxxvii Monday, July 23, 2007 3:17 PM
xxxviii Answers to Assessment Test
Answers to Assessment Test
1. A. Network Control Protocol is used to help identify the Network layer protocol used in the
packet. See Chapter 14 for more information.
2. D. Each device has 10Mpbs to the server. See Chapter 8 for more information.
3. A. You should have only one root bridge per network. See Chapter 8 for more information.
4. C. The command line console 0 places you at a prompt where you can then set your con-
sole user-mode password. See Chapter 4 for more information.
5. D. An IPv6 address is 128 bits long, compared to an IPv4 address, which is only 32 bits long.
See Chapter 13 for more information.
6. C. Link Control Protocol in the PPP stack provides dynamic addressing, authentication, and
multilink. See Chapter 14 for more information.
7. B. The show interface command shows the line, protocol, DLCI, and LMI information of
an interface. See Chapter 14 for more information.
8. A. 256 – 192 = 64. 64 + 64 = 128. 128 + 64 = 192. The subnet is 128, the broadcast address
is 191, and the valid host range is the numbers in between, or 129–190. See Chapter 3 for more
information.
9. B. The passive command, short for passive-interface, stops regular updates from being
sent out an interface. However, the interface can still receive updates. See Chapter 6 for more
information.
10. C. ICMP is the protocol at the Network layer that is used to send echo requests and replies.
See Chapter 2 for more information.
11. D. Layer 2 switching creates individual collision domains. See Chapter 1 for more information.
12. C. The command line vty 0 4 places you in a prompt that will allow you to set or change
your Telnet password. See Chapter 4 for more information.
13. B. To see the contents of all access lists, use the show access-lists command. See Chapter 10
for more information.
14. C. VLANs break up broadcast domains at layer 2. See Chapter 9 for more information.
15. A. The command erase startup-config deletes the configuration stored in NVRAM.
See Chapter 4 for more information.
16. C. ICMP is the protocol at the Network layer that is used to send messages back to an
originating router. See Chapter 2 for more information.
17. A. Class A addressing provides 24 bits for host addressing. See Chapter 3 for more information.
18. B. Every 2 seconds, BPDUs are sent out from all active bridge ports by default. See Chapter 7
for more information.
10089.book Page xxxviii Monday, July 23, 2007 3:17 PM
Answers to Assessment Test xxxix
19. D. Switches do not propagate VLAN information by default; you must configure the VTP
domain. VLAN Trunking Protocol (VTP) is used to propagate VLAN information across a
trunk link. See Chapter 9 for more information.
20. C. IEEE 802.11B is 2.4GHz, but with a maximum of only 11Mbps. IEEE 802.11G is in the
2.4GHz range, with a top speed of 54Mbps. See Chapter 12 for more information.
21. A. By default, switches break up collision domains but are one large broadcast domain. See
Chapter 1 for more information.
22. D. Port Address Translation (PAT) allows a one-to-many approach to network address trans-
lation. See Chapter 11 for more information.
23. C, D. VTP is not right because it has nothing to do with trunking except that it sends VLAN
information across a trunk link. 802.1Q and ISL are used to configure trunking on a port. See
Chapter 9 for more information.
24. D. Stub networks have only one connection to an internetwork. Only default routes can be
set on a stub network or network loops may occur. See Chapter 7 for more information.
25. B. Hubs regenerate electrical signals, which are specified at the Physical layer. See Chapter 1
for more information.
26. A, C. Standardandextendedaccesscontrollists(ACLs)areusedtoconfiguresecurityonarouter.
See Chapter 10 for more information.
27. D. The command copy flash tftp will prompt you to back up an existing IOS in flash to
a TFTP host. See Chapter 5 for more information.
28. B. The command to back up the configuration on a router is copy running-config
startup-config. See Chapter 5 for more information.
29. C. The primary reason the OSI model was created was so that different networks could inter-
operate. See Chapter 1 for more information.
30. C. User Datagram Protocol is a connection network service at the Transport layer, and
DHCP uses this connectionless service. See Chapter 2 for more information.
31. E. The clock rate command is two words, and the speed of the line is in bps. See Chapter 4
for more information.
32. C. The show ip interface command will show you if any outbound or inbound interfaces
have an access list set. See Chapter 10 for more information.
33. D. The copy tftp flash command places a new file in flash memory, which is the default
location for the Cisco IOS in Cisco routers. See Chapter 9 for more information.
10089.book Page xxxix Monday, July 23, 2007 3:17 PM
10089.book Page xl Monday, July 23, 2007 3:17 PM
Chapter
1
Internetworking
THE CCNA EXAM TOPICS COVERED IN THIS
CHAPTER INCLUDE THE FOLLOWING:
 Describe how a network works
 Describe the purpose and functions of various network
devices
 Select the components required to meet a network
specification
 Use the OSI and TCP/IP models and their associated
protocols to explain how data flows in a network
 Describe common networked applications including
web applications
 Describe the purpose and basic operation of the
protocols in the OSI and TCP models
 Describe the impact of applications (Voice Over IP and
Video Over IP) on a network
 Interpret network diagrams
 Describe the components required for network and
Internet communications
 Identify and correct common network problems at layers
1, 2, 3 and 7 using a layered model approach
 Differentiate between LAN/WAN operation and features
 Configure, verify and troubleshoot a switch with VLANs and
interswitch communications
 Select the appropriate media, cables, ports, and
connectors to connect switches to other network devices
and hosts
 Explain the technology and media access control method
for Ethernet networks
 Explain network segmentation and basic traffic
management concepts
10089.book Page 1 Monday, July 23, 2007 3:17 PM
Implement an IP addressing scheme and IP Services to meet
network requirements in a medium-size Enterprise branch
office network
 Explain the operation and benefits of using DHCP and DNS
 Configure, verify, and troubleshoot basic router operation
and routing on Cisco devices
 Select the appropriate media, cables, ports, and
connectors to connect routers to other network devices
and hosts
10089.book Page 2 Monday, July 23, 2007 3:17 PM
Welcome to the exciting world of internetworking. This first
chapter will really help you understand the basics of internet-
working by focusing on how to connect networks together using
Cisco routers and switches. First, you need to know exactly what an internetwork is, right?
You create an internetwork when you connect two or more LANs or WANs via a router and
configure a logical network addressing scheme with a protocol such as IP.
I’ll be covering these four topics in this chapter:
 Internetworking basics
 Network segmentation
 How bridges, switches, and routers are used to physically segment a network
 How routers are employed to create an internetwork
I’m also going to dissect the Open Systems Interconnection (OSI) model and describe
each part to you in detail because you really need a good grasp of it for the solid founda-
tion you’ll build your networking knowledge upon. The OSI model has seven hierarchical
layers that were developed to enable different networks to communicate reliably between
disparate systems. Since this book is centering upon all things CCNA, it’s crucial for
you to understand the OSI model as Cisco sees it, so that’s how I’ll be presenting the seven
layers to you.
Since there are a bunch of different types of devices specified at the different layers of the
OSI model, it’s also very important to understand the many types of cables and connectors
used for connecting all those devices to a network. We’ll go over cabling Cisco devices, dis-
cussing how to connect to a router or switch (along with Ethernet LAN technologies) and even
how to connect a router or switch with a console connection.
We’ll finish the chapter by discussing the three-layer hierarchical model that was developed
by Cisco to help you design, implement, and troubleshoot internetworks.
After you finish reading this chapter, you’ll encounter 20 review questions and four written
labs. These are given to you to really lock the information from this chapter into your memory.
So don’t skip them!
To find up to the minute updates for this chapter, please see www.lammle.com
and/or www.sybex.com.
10089.book Page 3 Monday, July 23, 2007 3:17 PM
4 Chapter 1  Internetworking
Internetworking Basics
Before we explore internetworking models and the specifications of the OSI reference model,
you’ve got to understand the big picture and learn the answer to the key question, Why is it
so important to learn Cisco internetworking?
Networks and networking have grown exponentially over the last 15 years—understandably
so. They’ve had to evolve at light speed just to keep up with huge increases in basic mission-
critical user needs such as sharing data and printers as well as more advanced demands such as
videoconferencing. Unless everyone who needs to share network resources is located in the same
office area (an increasingly uncommon situation), the challenge is to connect the sometimes
many relevant networks together so all users can share the networks’ wealth.
Starting with a look at Figure 1.1, you get a picture of a basic LAN network that’s con-
nected together using a hub. This network is actually one collision domain and one broadcast
domain—but no worries if you have no idea what this means because I’m going to talk about
both collision and broadcast domains so much throughout this whole chapter, you’ll probably
even dream about them!
F I G U R E 1 . 1 The basic network
Okay, about Figure 1.1… How would you say the PC named Bob communicates with the
PC named Sally? Well, they’re both on the same LAN connected with a multiport repeater (a
hub). So does Bob just send out a data message, “Hey Sally, you there?” or does Bob use Sally’s
IP address and put things more like, “Hey 192.168.0.3, are you there?” Hopefully, you picked
the IP address option, but even if you did, the news is still bad—both answers are wrong!
Why? Because Bob is actually going to use Sally’s MAC address (known as a hardware
address), which is burned right into the network card of Sally’s PC, to get ahold of her.
Great, but how does Bob get Sally’s MAC address since Bob knows only Sally’s name and
doesn’t even have her IP address yet? Bob is going to start with name resolution (hostname to
The basic network allows devices to share information.
The term computer language refers to binary code (0s or 1s).
The two hosts above communicate using hardware or MAC addresses.
(Hub)
Bob Sally
10089.book Page 4 Monday, July 23, 2007 3:17 PM
Internetworking Basics 5
IP address resolution), something that’s usually accomplished using Domain Name Service
(DNS). And of note, if these two are on the same LAN, Bob can just broadcast to Sally asking
her for the information (no DNS needed)—welcome to Microsoft Windows (Vista included)!
Here’s an output from a network analyzer depicting a simple name resolution process from
Bob to Sally:
Time Source Destination Protocol Info
53.892794 192.168.0.2 192.168.0.255 NBNS Name query NB SALLY00
As I already mentioned, since the two hosts are on a local LAN, Windows (Bob) will just
broadcast to resolve the name Sally (the destination 192.168.0.255 is a broadcast address).
Let’s take a look at the rest of the information:
EthernetII,Src:192.168.0.2(00:14:22:be:18:3b),Dst:Broadcast (ff:ff:ff:ff:ff:ff)
What this output shows is that Bob knows his own MAC address and source IP address but
not Sally’s IP address or MAC address, so Bob sends a broadcast address of all fs for the MAC
address (a Data Link layer broadcast) and an IP LAN broadcast of 192.168.0.255. Again,
don’t freak—you’re going to learn all about broadcasts in Chapter 3, “Subnetting, Variable
Length Subnet Masks (VLSMs), and Troubleshooting TCP/IP.”
Before the name is resolved, the first thing Bob has to do is broadcast on the LAN to get
Sally’s MAC address so he can communicate to her PC and resolve her name to an IP address:
Time Source Destination Protocol Info
5.153054 192.168.0.2 Broadcast ARP Who has 192.168.0.3? Tell 192.168.0.2
Next, check out Sally’s response:
Time Source Destination Protocol Info
5.153403 192.168.0.3 192.168.0.2 ARP 192.168.0.3 is at 00:0b:db:99:d3:5e
5.53.89317 192.168.0.3 192.168.0.2 NBNS Name query response NB 192.168.0.3
Okay sweet— Bob now has both Sally’s IP address and her MAC address! These are both
listed as the source address at this point because this information was sent from Sally back to
Bob. So, finally, Bob has all the goods he needs to communicate with Sally. And just so you
know, I’m going to tell you all about ARP and show you exactly how Sally’s IP address was
resolved to a MAC address a little later in Chapter 6, “IP Routing.”
By the way, I want you to understand that Sally still had to go through the same resolution
processes to communicate back to Bob—sounds crazy, huh? Consider this a welcome to IPv4
and basic networking with Windows (and we haven’t even added a router yet!).
To complicate things further, it’s also likely that at some point you’ll have to break up one large
network into a bunch of smaller ones because user response will have dwindled to a slow crawl as
the network grew and grew. And with all that growth, your LAN’s traffic congestion has reached
epic proportions. The answer to this is breaking up a really big network into a number of smaller
10089.book Page 5 Monday, July 23, 2007 3:17 PM
6 Chapter 1  Internetworking
ones—something callednetwork segmentation. You do this by using devices likerouters, switches,
and bridges. Figure 1.2 displays a network that’s been segmented with a switch so each network
segment connected to the switch is now a separate collision domain. But make note of the fact that
this network is still one broadcast domain.
F I G U R E 1 . 2 A switch can replace the hub, breaking up collision domains.
Keep in mind that the hub used in Figure 1.2 just extended the one collision domain from the
switch port. Here’s a list of some of the things that commonly cause LAN traffic congestion:
 Too many hosts in a broadcast domain
 Broadcast storms
 Multicasting
 Low bandwidth
 Adding hubs for connectivity to the network
 A bunch of ARP or IPX traffic (IPX is a Novell protocol that is like IP, but really, really
chatty. Typically not used in today’s networks.)
Take another look at Figure 1.2—did you notice that I replaced the main hub from Figure 1.1
with a switch? Whether you did or didn’t, the reason I did that is because hubs don’t segment a net-
work;theyjustconnectnetworksegmentstogether.Sobasically,it’saninexpensivewaytoconnect
a couple of PCs together, which is great for home use and troubleshooting, but that’s about it!
Now routers are used to connect networks together and route packets of data from one
network to another. Cisco became the de facto standard of routers because of its high-quality
router products, great selection, and fantastic service. Routers, by default, break up a broad-
cast domain—the set of all devices on a network segment that hear all the broadcasts sent on
that segment. Figure 1.3 shows a router in our little network that creates an internetwork and
breaks up broadcast domains.
(Hub)
Switch
10089.book Page 6 Monday, July 23, 2007 3:17 PM
8 Chapter 1  Internetworking
frames, routers (layer 3 switches) use logical addressing and provide what is called packet
switching. Routers can also provide packet filtering by using access lists, and when routers
connect two or more networks together and use logical addressing (IP or IPv6), this is called
an internetwork. Last, routers use a routing table (map of the internetwork) to make path
selections and to forward packets to remote networks.
Conversely, switches aren’t used to create internetworks (they do not break up broadcast
domains by default); they’re employed to add functionality to a network LAN. The main pur-
pose of a switch is to make a LAN work better—to optimize its performance—providing more
bandwidth for the LAN’s users. And switches don’t forward packets to other networks as
routers do. Instead, they only “switch” frames from one port to another within the switched
network. Okay, you may be thinking, “Wait a minute, what are frames and packets?” I’ll tell
you all about them later in this chapter, I promise!
By default, switches break up collision domains. This is an Ethernet term used to describe
a network scenario wherein one particular device sends a packet on a network segment, forc-
ing every other device on that same segment to pay attention to it. At the same time, a different
device tries to transmit, leading to a collision, after which both devices must retransmit, one
at a time. Not very efficient! This situation is typically found in a hub environment where each
host segment connects to a hub that represents only one collision domain and only one broad-
cast domain. By contrast, each and every port on a switch represents its own collision domain.
Switches create separate collision domains but a single broadcast domain.
Routers provide a separate broadcast domain for each interface.
The term bridging was introduced before routers and hubs were implemented, so it’s pretty
common to hear people referring to bridges as switches. That’s because bridges and switches
basically do the same thing—break up collision domains on a LAN (in reality, you cannot buy
a physical bridge these days, only LAN switches, but they use bridging technologies, so Cisco
still calls them multiport bridges).
So what this means is that a switch is basically just a multiple-port bridge with more brain-
power, right? Well, pretty much, but there are differences. Switches do provide this function,
but they do so with greatly enhanced management ability and features. Plus, most of the time,
bridges only had 2 or 4 ports. Yes, you could get your hands on a bridge with up to 16 ports,
but that’s nothing compared to the hundreds available on some switches!
You would use a bridge in a network to reduce collisions within broadcast
domains and to increase the number of collision domains in your network.
Doing this provides more bandwidth for users. And keep in mind that using
hubs in your network can contribute to congestion on your Ethernet network.
As always, plan your network design carefully!
Figure 1.4 shows how a network would look with all these internetwork devices in place.
Remember that the router will not only break up broadcast domains for every LAN interface,
it will break up collision domains as well.
10089.book Page 8 Monday, July 23, 2007 3:17 PM
Internetworking Basics 9
F I G U R E 1 . 4 Internetworking devices
When you looked at Figure 1.4, did you notice that the router is found at center stage and
that it connects each physical network together? We have to use this layout because of the
older technologies involved–—bridges and hubs.
On the top internetwork in Figure 1.4, you’ll notice that a bridge was used to connect the
hubs to a router. The bridge breaks up collision domains, but all the hosts connected to both
hubs are still crammed into the same broadcast domain. Also, the bridge only created two
collision domains, so each device connected to a hub is in the same collision domain as every
other device connected to that same hub. This is actually pretty lame, but it’s still better than
having one collision domain for all hosts.
Notice something else: The three hubs at the bottom that are connected also connect to the
router, creating one collision domain and one broadcast domain. This makes the bridged net-
work look much better indeed!
Although bridges/switches are used to segment networks, they will not iso-
late broadcast or multicast packets.
Router
Bridge
Switch
10089.book Page 9 Monday, July 23, 2007 3:17 PM
Internetworking Basics 7
F I G U R E 1 . 3 Routers create an internetwork.
The network in Figure 1.3 is a pretty cool network. Each host is connected to its own collision
domain, and the router has created two broadcast domains. And don’t forget that the router pro-
vides connections to WAN services as well! The router uses something called a serial interface
for WAN connections, specifically, a V.35 physical interface on a Cisco router.
Breaking up a broadcast domain is important because when a host or server sends a network
broadcast, every device on the network must read and process that broadcast—unless you’ve got
a router. When the router’s interface receives this broadcast, it can respond by basically saying,
“Thanks, but no thanks,” and discard the broadcast without forwarding it on to other net-
works. Even though routers are known for breaking up broadcast domains by default, it’s
important to remember that they break up collision domains as well.
There are two advantages of using routers in your network:
 They don’t forward broadcasts by default.
 They can filter the network based on layer 3 (Network layer) information (e.g., IP address).
Four router functions in your network can be listed as follows:
 Packet switching
 Packet filtering
 Internetwork communication
 Path selection
Remember that routers are really switches; they’re actually what we call layer 3 switches
(we’ll talk about layers later in this chapter). Unlike layer 2 switches, which forward or filter
A router creates an internetwork and
provides connections to WAN services.
Switch
Switch
Serial 0
10089.book Page 7 Monday, July 23, 2007 3:17 PM
10 Chapter 1  Internetworking
The best network connected to the router is the LAN switch network on the left. Why?
Because each port on that switch breaks up collision domains. But it’s not all good—all devices
are still in the same broadcast domain. Do you remember why this can be a really bad thing?
Because all devices must listen to all broadcasts transmitted, that’s why. And if your broadcast
domains are too large, the users have less bandwidth and are required to process more broad-
casts, and network response time will slow to a level that could cause office riots.
Once we have only switches in our network, things change a lot! Figure 1.5 shows the net-
work that is typically found today.
F I G U R E 1 . 5 Switched networks creating an internetwork
Okay, here I’ve placed the LAN switches at the center of the network world so the routers
are connecting only logical networks together. If I implemented this kind of setup, I’ve created
virtual LANs (VLANs), something I’m going to tell you about in Chapter 9, “Virtual LANs
(VLANs).” So don’t stress. But it is really important to understand that even though you have
a switched network, you still need a router to provide your inter-VLAN communication, or
internetworking. Don’t forget that!
Obviously, the best network is one that’s correctly configured to meet the business require-
ments of the company it serves. LAN switches with routers, correctly placed in the network,
are the best network design. This book will help you understand the basics of routers and
switches so you can make tight, informed decisions on a case-by-case basis.
Let’s go back to Figure 1.4 again. Looking at the figure, how many collision domains and
broadcast domains are in this internetwork? Hopefully, you answered nine collision domains
and three broadcast domains! The broadcast domains are definitely the easiest to see because
only routers break up broadcast domains by default. And since there are three connections,
that gives you three broadcast domains. But do you see the nine collision domains? Just in case
that’s a no, I’ll explain. The all-hub network is one collision domain; the bridge network
equals three collision domains. Add in the switch network of five collision domains—one for
each switch port—and you’ve got a total of nine.
Router
10089.book Page 10 Monday, July 23, 2007 3:17 PM
Internetworking Models 11
Now, in Figure 1.5, each port on the switch is a separate collision domain and each VLAN
is a separate broadcast domain. But you still need a router for routing between VLANs. How
many collision domains do you see here? I’m counting 10—remember that connections
between the switches are considered a collision domain!
So now that you’ve gotten an introduction to internetworking and the various devices that
live in an internetwork, it’s time to head into internetworking models.
Internetworking Models
When networks first came into being, computers could typically communicate only with comput-
ers from the same manufacturer. For example, companies ran either a complete DECnet solution
or an IBM solution—not both together. In the late 1970s, theOpen Systems Interconnection (OSI)
reference model was created by the International Organization for Standardization (ISO) to break
this barrier.
The OSI model was meant to help vendors create interoperable network devices and soft-
ware in the form of protocols so that different vendor networks could work with each other.
Like world peace, it’ll probably never happen completely, but it’s still a great goal.
The OSI model is the primary architectural model for networks. It describes how
data and network information are communicated from an application on one computer
through the network media to an application on another computer. The OSI reference
model breaks this approach into layers.
Should I Just Replace All My Hubs with Switches?
You’re a network administrator at a large company in San Jose. The boss comes to you and
says that he got your requisition to buy a switch and is not sure about approving the expense;
do you really need it?
Well, if you can, sure—why not? Switches really add a lot of functionality to a network that
hubs just don’t have. But most of us don’t have an unlimited budget. Hubs still can create a
nice network—that is, of course, if you design and implement the network correctly.
Let’s say that you have 40 users plugged into four hubs, 10 users each. At this point, the hubs
are all connected together so that you have one large collision domain and one large broad-
cast domain. If you can afford to buy just one switch and plug each hub into a switch port, as
well as plug the servers into the switch, then you now have four collision domains and one
broadcast domain. Not great, but for the price of one switch, your network is a much better
thing. So, go ahead! Put that requisition in to buy all new switches. What do you have to lose?
10089.book Page 11 Monday, July 23, 2007 3:17 PM
12 Chapter 1  Internetworking
In the following section, I am going to explain the layered approach and how we can use
this approach to help us troubleshoot our internetworks.
The Layered Approach
A reference model is a conceptual blueprint of how communications should take place. It
addresses all the processes required for effective communication and divides these processes
into logical groupings called layers. When a communication system is designed in this manner,
it’s known as layered architecture.
Think of it like this: You and some friends want to start a company. One of the first things
you’ll do is sit down and think through what tasks must be done, who will do them, the order
in which they will be done, and how they relate to each other. Ultimately, you might group these
tasks into departments. Let’s say you decide to have an order-taking department, an inventory
department, and a shipping department. Each of your departments has its own unique tasks,
keeping its staff members busy and requiring them to focus on only their own duties.
In this scenario, I’m using departments as a metaphor for the layers in a communication
system. For things to run smoothly, the staff of each department will have to trust and rely
heavily upon the others to do their jobs and competently handle their unique responsibilities.
In your planning sessions, you would probably take notes, recording the entire process to facil-
itate later discussions about standards of operation that will serve as your business blueprint,
or reference model.
Once your business is launched, your department heads, each armed with the part of the
blueprint relating to their own department, will need to develop practical methods to imple-
ment their assigned tasks. These practical methods, or protocols, will need to be compiled into
a standard operating procedures manual and followed closely. Each of the various procedures
in your manual will have been included for different reasons and have varying degrees of
importance and implementation. If you form a partnership or acquire another company, it will
be imperative that its business protocols—its business blueprint—match yours (or at least be
compatible with it).
Similarly, software developers can use a reference model to understand computer com-
munication processes and see what types of functions need to be accomplished on any one
layer. If they are developing a protocol for a certain layer, all they need to concern them-
selves with is that specific layer’s functions, not those of any other layer. Another layer and
protocol will handle the other functions. The technical term for this idea is binding. The
communication processes that are related to each other are bound, or grouped together, at
a particular layer.
Advantages of Reference Models
The OSI model is hierarchical, and the same benefits and advantages can apply to any layered
model. The primary purpose of all such models, especially the OSI model, is to allow different
vendors’ networks to interoperate.
10089.book Page 12 Monday, July 23, 2007 3:17 PM
The OSI Reference Model 13
Advantages of using the OSI layered model include, but are not limited to, the following:
 It divides the network communication process into smaller and simpler components, thus
aiding component development, design, and troubleshooting.
 It allows multiple-vendor development through standardization of network components.
 It encourages industry standardization by defining what functions occur at each layer of
the model.
 It allows various types of network hardware and software to communicate.
 It prevents changes in one layer from affecting other layers, so it does not hamper
development.
The OSI Reference Model
One of the greatest functions of the OSI specifications is to assist in data transfer between dis-
parate hosts—meaning, for example, that they enable us to transfer data between a Unix host
and a PC or a Mac.
The OSI isn’t a physical model, though. Rather, it’s a set of guidelines that application
developers can use to create and implement applications that run on a network. It also pro-
vides a framework for creating and implementing networking standards, devices, and inter-
networking schemes.
The OSI has seven different layers, divided into two groups. The top three layers define how
the applications within the end stations will communicate with each other and with users. The
bottom four layers define how data is transmitted end to end. Figure 1.6 shows the three upper
layers and their functions, and Figure 1.7 shows the four lower layers and their functions.
F I G U R E 1 . 6 The upper layers
• Provides a user interface
• Presents data
• Handles processing such as encryption
• Keeps different applications’
• data separate
Application
Presentation
Session
Transport
Network
Data Link
Physical
10089.book Page 13 Monday, July 23, 2007 3:17 PM
14 Chapter 1  Internetworking
When you study Figure 1.6, understand that the user interfaces with the computer at the
Application layer and also that the upper layers are responsible for applications communicat-
ing between hosts. Remember that none of the upper layers knows anything about networking
or network addresses. That’s the responsibility of the four bottom layers.
In Figure 1.7, you can see that it’s the four bottom layers that define how data is transferred
through a physical wire or through switches and routers. These bottom layers also determine
how to rebuild a data stream from a transmitting host to a destination host’s application.
F I G U R E 1 . 7 The lower layers
The following network devices operate at all seven layers of the OSI model:
 Network management stations (NMSs)
 Web and application servers
 Gateways (not default gateways)
 Network hosts
Basically, the ISO is pretty much the Emily Post of the network protocol world. Just as Ms.
Post wrote the book setting the standards—or protocols—for human social interaction, the
ISO developed the OSI reference model as the precedent and guide for an open network pro-
tocol set. Defining the etiquette of communication models, it remains today the most popular
means of comparison for protocol suites.
The OSI reference model has seven layers:
 Application layer (layer 7)
 Presentation layer (layer 6)
 Session layer (layer 5)
 Transport layer (layer 4)
 Network layer (layer 3)
 Data Link layer (layer 2)
 Physical layer (layer 1)
• Combines packets into bytes and bytes into frames
• Provides access to media using MAC address
• Performs error detection not correction
• Provides logical addressing,
• which routers use for path determination
• Provides reliable or unreliable delivery
• Performs error correction before retransmit
• Moves bits between devices
• Specifies voltage, wire speed,
• and pin-out of cables
Transport
Network
Data Link
Physical
10089.book Page 14 Monday, July 23, 2007 3:17 PM
The OSI Reference Model 15
Figure 1.8 shows a summary of the functions defined at each layer of the OSI model. With
this in hand, you’re now ready to explore each layer’s function in detail.
F I G U R E 1 . 8 Layer functions
The Application Layer
The Application layer of the OSI model marks the spot where users actually communicate to
the computer. This layer only comes into play when it’s apparent that access to the network
is going to be needed soon. Take the case of Internet Explorer (IE). You could uninstall every
trace of networking components from a system, such as TCP/IP, NIC card, and so on, and you
could still use IE to view a local HTML document—no problem. But things would definitely
get messy if you tried to do something like view an HTML document that must be retrieved
using HTTP or nab a file with FTP or TFTP. That’s because IE will respond to requests such
as those by attempting to access the Application layer. And what’s happening is that the Appli-
cation layer is acting as an interface between the actual application program—which isn’t at
all a part of the layered structure—and the next layer down by providing ways for the appli-
cation to send information down through the protocol stack. In other words, IE doesn’t truly
reside within the Application layer—it interfaces with Application layer protocols when it
needs to deal with remote resources.
The Application layer is also responsible for identifying and establishing the availability of
the intended communication partner and determining whether sufficient resources for the
intended communication exist.
These tasks are important because computer applications sometimes require more than
only desktop resources. Often, they’ll unite communicating components from more than one
network application. Prime examples are file transfers and email, as well as enabling remote
access, network management activities, client/server processes, and information location.
Many network applications provide services for communication over enterprise networks, but
for present and future internetworking, the need is fast developing to reach beyond the limits
of current physical networking.
10089.book Page 15 Monday, July 23, 2007 3:17 PM
16 Chapter 1  Internetworking
It’s important to remember that the Application layer is acting as an interface
between the actual application programs. This means that Microsoft Word,
for example, does not reside at the Application layer but instead interfaces
with the Application layer protocols. Chapter 2 will present some programs
that actually reside at the Application layer—for example, FTP and TFTP.
The Presentation Layer
The Presentation layer gets its name from its purpose: It presents data to the Application layer
and is responsible for data translation and code formatting.
This layer is essentially a translator and provides coding and conversion functions. A suc-
cessful data-transfer technique is to adapt the data into a standard format before transmission.
Computers are configured to receive this generically formatted data and then convert the data
back into its native format for actual reading (for example, EBCDIC to ASCII). By providing
translation services, the Presentation layer ensures that data transferred from the Application
layer of one system can be read by the Application layer of another one.
The OSI has protocol standards that define how standard data should be formatted. Tasks
like data compression, decompression, encryption, and decryption are associated with this
layer. Some Presentation layer standards are involved in multimedia operations too.
The Session Layer
The Session layer is responsible for setting up, managing, and then tearing down sessions
between Presentation layer entities. This layer also provides dialog control between
devices, or nodes. It coordinates communication between systems and serves to organize
their communication by offering three different modes: simplex, half duplex, and full
duplex. To sum up, the Session layer basically keeps different applications’ data separate
from other applications’ data.
The Transport Layer
The Transport layer segments and reassembles data into a data stream. Services located in the
Transport layer segment and reassemble data from upper-layer applications and unite it into
the same data stream. They provide end-to-end data transport services and can establish a
logical connection between the sending host and destination host on an internetwork.
Some of you are probably familiar with TCP and UDP already. (But if you’re not, no wor-
ries—I’ll tell you all about them in Chapter 2.) If so, you know that both work at the Transport
layer and that TCP is a reliable service and UDP is not. This means that application developers
have more options because they have a choice between the two protocols when working with
TCP/IP protocols.
10089.book Page 16 Monday, July 23, 2007 3:17 PM
The OSI Reference Model 17
The Transport layer is responsible for providing mechanisms for multiplexing upper-layer
applications, establishing sessions, and tearing down virtual circuits. It also hides details of any
network-dependent information from the higher layers by providing transparent data transfer.
The term reliable networking can be used at the Transport layer. It means that
acknowledgments, sequencing, and flow control will be used.
The Transport layer can be connectionless or connection-oriented. However, Cisco is
mostly concerned with you understanding the connection-oriented portion of the Transport
layer. The following sections will provide the skinny on the connection-oriented (reliable) pro-
tocol of the Transport layer.
Flow Control
Data integrity is ensured at the Transport layer by maintaining flow control and by allowing
users to request reliable data transport between systems. Flow control prevents a sending host
on one side of the connection from overflowing the buffers in the receiving host—an event that
can result in lost data. Reliable data transport employs a connection-oriented communications
session between systems, and the protocols involved ensure that the following will be achieved:
 The segments delivered are acknowledged back to the sender upon their reception.
 Any segments not acknowledged are retransmitted.
 Segments are sequenced back into their proper order upon arrival at their destination.
 A manageable data flow is maintained in order to avoid congestion, overloading, and
data loss.
The purpose of flow control is to provide a means for the receiver to govern
the amount of data sent by the sender.
Connection-Oriented Communication
In reliable transport operation, a device that wants to transmit sets up a connection-oriented
communication with a remote device by creating a session. The transmitting device first estab-
lishes a connection-oriented session with its peer system, which is called a call setup or a three-
way handshake. Data is then transferred; when the transfer is finished, a call termination takes
place to tear down the virtual circuit.
Figure 1.9 depicts a typical reliable session taking place between sending and receiving sys-
tems. Looking at it, you can see that both hosts’ application programs begin by notifying their
individual operating systems that a connection is about to be initiated. The two operating sys-
tems communicate by sending messages over the network confirming that the transfer is
approved and that both sides are ready for it to take place. After all of this required synchro-
nization takes place, a connection is fully established and the data transfer begins (this virtual
circuit setup is called overhead!).
10089.book Page 17 Monday, July 23, 2007 3:17 PM
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf
CCNA by Todd Lammle ( PDFDrive ).pdf

Contenu connexe

Tendances

Tendances (20)

Router configuration
Router configurationRouter configuration
Router configuration
 
network Switch
 network Switch network Switch
network Switch
 
Lab- Full IPsec Implementation.pdf
Lab- Full IPsec Implementation.pdfLab- Full IPsec Implementation.pdf
Lab- Full IPsec Implementation.pdf
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracer
 
6 understanding DHCP
6 understanding DHCP6 understanding DHCP
6 understanding DHCP
 
Vlan
VlanVlan
Vlan
 
Router configuration
Router configurationRouter configuration
Router configuration
 
INTERNET VE YEREL AĞ SIZMA TESTLERİ
INTERNET VE YEREL AĞ SIZMA TESTLERİ INTERNET VE YEREL AĞ SIZMA TESTLERİ
INTERNET VE YEREL AĞ SIZMA TESTLERİ
 
Ospf area types
Ospf area typesOspf area types
Ospf area types
 
CCNP Route EIGRP Overview
CCNP Route  EIGRP OverviewCCNP Route  EIGRP Overview
CCNP Route EIGRP Overview
 
CCNA 200-301 VOLUME 2.pdf
CCNA 200-301 VOLUME 2.pdfCCNA 200-301 VOLUME 2.pdf
CCNA 200-301 VOLUME 2.pdf
 
Spannig tree
Spannig treeSpannig tree
Spannig tree
 
ccna project on topic company infrastructure
ccna project on topic company infrastructureccna project on topic company infrastructure
ccna project on topic company infrastructure
 
CCNA Security - Chapter 5
CCNA Security - Chapter 5CCNA Security - Chapter 5
CCNA Security - Chapter 5
 
CCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPTCCNA SUMMER TRAINNING PPT
CCNA SUMMER TRAINNING PPT
 
MANUAL DE PRACTICAS DE WINDOWS SERVER 2008(Alberto Hdz)
MANUAL DE PRACTICAS DE WINDOWS SERVER 2008(Alberto Hdz) MANUAL DE PRACTICAS DE WINDOWS SERVER 2008(Alberto Hdz)
MANUAL DE PRACTICAS DE WINDOWS SERVER 2008(Alberto Hdz)
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
 
Network cable
Network cableNetwork cable
Network cable
 
Network switch
Network switchNetwork switch
Network switch
 
Ccna ppt1
Ccna ppt1Ccna ppt1
Ccna ppt1
 

Similaire à CCNA by Todd Lammle ( PDFDrive ).pdf

Aws certified solutions architect practice tests associate saa c01 exam by br...
Aws certified solutions architect practice tests associate saa c01 exam by br...Aws certified solutions architect practice tests associate saa c01 exam by br...
Aws certified solutions architect practice tests associate saa c01 exam by br...Binh Ng
 
Your ccna exam success strategy for routing and switching
Your ccna exam success strategy for routing and switchingYour ccna exam success strategy for routing and switching
Your ccna exam success strategy for routing and switchingVivek Tiwari
 
CCNA-Security Official Exame Cetification Guide
CCNA-Security Official Exame Cetification GuideCCNA-Security Official Exame Cetification Guide
CCNA-Security Official Exame Cetification GuideHussein Waly
 
OCA Oracle Certified Associate Java SE 8 Programmer I Study Guide.pdf
OCA Oracle Certified Associate Java SE 8 Programmer I Study Guide.pdfOCA Oracle Certified Associate Java SE 8 Programmer I Study Guide.pdf
OCA Oracle Certified Associate Java SE 8 Programmer I Study Guide.pdfpepillo14361
 
CCNA Exploration Companion Guide (v4.0).pdf
CCNA Exploration Companion Guide (v4.0).pdfCCNA Exploration Companion Guide (v4.0).pdf
CCNA Exploration Companion Guide (v4.0).pdfsdafdafs
 
AWS Certified SysOps Administrator Official Study Guide.pdf
AWS Certified SysOps Administrator Official Study Guide.pdfAWS Certified SysOps Administrator Official Study Guide.pdf
AWS Certified SysOps Administrator Official Study Guide.pdfClaudia Acosta
 
Pc Open Del1
Pc Open Del1Pc Open Del1
Pc Open Del1grifflyd
 
For.Dummies.Microsoft.SQL.Server.2005.Programming.For.Dummies.Apr.2007.pdf
For.Dummies.Microsoft.SQL.Server.2005.Programming.For.Dummies.Apr.2007.pdfFor.Dummies.Microsoft.SQL.Server.2005.Programming.For.Dummies.Apr.2007.pdf
For.Dummies.Microsoft.SQL.Server.2005.Programming.For.Dummies.Apr.2007.pdfAlexadiaz52
 
Odom W. - Cisco CCNA Routing and Switching ICND2 200-101 Official Cert Guide ...
Odom W. - Cisco CCNA Routing and Switching ICND2 200-101 Official Cert Guide ...Odom W. - Cisco CCNA Routing and Switching ICND2 200-101 Official Cert Guide ...
Odom W. - Cisco CCNA Routing and Switching ICND2 200-101 Official Cert Guide ...Danar52
 
CCNA Security 210-260 Official Cert Guide (Omar Santos, John Stuppi) (Z-Libra...
CCNA Security 210-260 Official Cert Guide (Omar Santos, John Stuppi) (Z-Libra...CCNA Security 210-260 Official Cert Guide (Omar Santos, John Stuppi) (Z-Libra...
CCNA Security 210-260 Official Cert Guide (Omar Santos, John Stuppi) (Z-Libra...krcdnsqxswifzizvzs
 
ASP.NET MVC Interview Questions and Answers by Shailendra Chauhan
ASP.NET MVC Interview Questions and Answers by Shailendra ChauhanASP.NET MVC Interview Questions and Answers by Shailendra Chauhan
ASP.NET MVC Interview Questions and Answers by Shailendra ChauhanShailendra Chauhan
 
Putting your book & ebook sales on Autopilot
Putting your book & ebook sales on AutopilotPutting your book & ebook sales on Autopilot
Putting your book & ebook sales on AutopilotBrian Schwartz
 
50400699 cisco-certified-network-administrator
50400699 cisco-certified-network-administrator50400699 cisco-certified-network-administrator
50400699 cisco-certified-network-administratorNaresh Gotad
 
CEH V9 FOR SECUURITY OF COMPUTER SYSTEMdoc.pdf
CEH V9 FOR SECUURITY OF COMPUTER SYSTEMdoc.pdfCEH V9 FOR SECUURITY OF COMPUTER SYSTEMdoc.pdf
CEH V9 FOR SECUURITY OF COMPUTER SYSTEMdoc.pdfgadisagemechu1
 

Similaire à CCNA by Todd Lammle ( PDFDrive ).pdf (20)

Font Matter
Font MatterFont Matter
Font Matter
 
ccna
ccnaccna
ccna
 
Aws certified solutions architect practice tests associate saa c01 exam by br...
Aws certified solutions architect practice tests associate saa c01 exam by br...Aws certified solutions architect practice tests associate saa c01 exam by br...
Aws certified solutions architect practice tests associate saa c01 exam by br...
 
ccna collab.pdf
ccna collab.pdfccna collab.pdf
ccna collab.pdf
 
Your ccna exam success strategy for routing and switching
Your ccna exam success strategy for routing and switchingYour ccna exam success strategy for routing and switching
Your ccna exam success strategy for routing and switching
 
Best assignment help
Best assignment helpBest assignment help
Best assignment help
 
Best assignment help
Best assignment helpBest assignment help
Best assignment help
 
CCNA-Security Official Exame Cetification Guide
CCNA-Security Official Exame Cetification GuideCCNA-Security Official Exame Cetification Guide
CCNA-Security Official Exame Cetification Guide
 
OCA Oracle Certified Associate Java SE 8 Programmer I Study Guide.pdf
OCA Oracle Certified Associate Java SE 8 Programmer I Study Guide.pdfOCA Oracle Certified Associate Java SE 8 Programmer I Study Guide.pdf
OCA Oracle Certified Associate Java SE 8 Programmer I Study Guide.pdf
 
CCNA Exploration Companion Guide (v4.0).pdf
CCNA Exploration Companion Guide (v4.0).pdfCCNA Exploration Companion Guide (v4.0).pdf
CCNA Exploration Companion Guide (v4.0).pdf
 
windows vista bible.pdf
windows vista bible.pdfwindows vista bible.pdf
windows vista bible.pdf
 
AWS Certified SysOps Administrator Official Study Guide.pdf
AWS Certified SysOps Administrator Official Study Guide.pdfAWS Certified SysOps Administrator Official Study Guide.pdf
AWS Certified SysOps Administrator Official Study Guide.pdf
 
Pc Open Del1
Pc Open Del1Pc Open Del1
Pc Open Del1
 
For.Dummies.Microsoft.SQL.Server.2005.Programming.For.Dummies.Apr.2007.pdf
For.Dummies.Microsoft.SQL.Server.2005.Programming.For.Dummies.Apr.2007.pdfFor.Dummies.Microsoft.SQL.Server.2005.Programming.For.Dummies.Apr.2007.pdf
For.Dummies.Microsoft.SQL.Server.2005.Programming.For.Dummies.Apr.2007.pdf
 
Odom W. - Cisco CCNA Routing and Switching ICND2 200-101 Official Cert Guide ...
Odom W. - Cisco CCNA Routing and Switching ICND2 200-101 Official Cert Guide ...Odom W. - Cisco CCNA Routing and Switching ICND2 200-101 Official Cert Guide ...
Odom W. - Cisco CCNA Routing and Switching ICND2 200-101 Official Cert Guide ...
 
CCNA Security 210-260 Official Cert Guide (Omar Santos, John Stuppi) (Z-Libra...
CCNA Security 210-260 Official Cert Guide (Omar Santos, John Stuppi) (Z-Libra...CCNA Security 210-260 Official Cert Guide (Omar Santos, John Stuppi) (Z-Libra...
CCNA Security 210-260 Official Cert Guide (Omar Santos, John Stuppi) (Z-Libra...
 
ASP.NET MVC Interview Questions and Answers by Shailendra Chauhan
ASP.NET MVC Interview Questions and Answers by Shailendra ChauhanASP.NET MVC Interview Questions and Answers by Shailendra Chauhan
ASP.NET MVC Interview Questions and Answers by Shailendra Chauhan
 
Putting your book & ebook sales on Autopilot
Putting your book & ebook sales on AutopilotPutting your book & ebook sales on Autopilot
Putting your book & ebook sales on Autopilot
 
50400699 cisco-certified-network-administrator
50400699 cisco-certified-network-administrator50400699 cisco-certified-network-administrator
50400699 cisco-certified-network-administrator
 
CEH V9 FOR SECUURITY OF COMPUTER SYSTEMdoc.pdf
CEH V9 FOR SECUURITY OF COMPUTER SYSTEMdoc.pdfCEH V9 FOR SECUURITY OF COMPUTER SYSTEMdoc.pdf
CEH V9 FOR SECUURITY OF COMPUTER SYSTEMdoc.pdf
 

Plus de RaviRajput416403 (17)

NP-lab-manual (1).pdf
NP-lab-manual (1).pdfNP-lab-manual (1).pdf
NP-lab-manual (1).pdf
 
NP-lab-manual.pdf
NP-lab-manual.pdfNP-lab-manual.pdf
NP-lab-manual.pdf
 
NP-lab-manual.docx
NP-lab-manual.docxNP-lab-manual.docx
NP-lab-manual.docx
 
unit 4,Indexes in database.docx
unit 4,Indexes in database.docxunit 4,Indexes in database.docx
unit 4,Indexes in database.docx
 
babita.docx
babita.docxbabita.docx
babita.docx
 
Animal survey by ASHISH.docx
Animal survey by ASHISH.docxAnimal survey by ASHISH.docx
Animal survey by ASHISH.docx
 
unit-5 sql notes.docx
unit-5 sql notes.docxunit-5 sql notes.docx
unit-5 sql notes.docx
 
SONIYA GAUTAM.docx
SONIYA GAUTAM.docxSONIYA GAUTAM.docx
SONIYA GAUTAM.docx
 
pankaj gupta.docx
pankaj gupta.docxpankaj gupta.docx
pankaj gupta.docx
 
S.docx
S.docxS.docx
S.docx
 
KASHISH CHOPRA MAIL MERGE.docx
KASHISH CHOPRA MAIL MERGE.docxKASHISH CHOPRA MAIL MERGE.docx
KASHISH CHOPRA MAIL MERGE.docx
 
SONIYA GAUTAM.docx
SONIYA GAUTAM.docxSONIYA GAUTAM.docx
SONIYA GAUTAM.docx
 
SONIYA GAUTAM.docx
SONIYA GAUTAM.docxSONIYA GAUTAM.docx
SONIYA GAUTAM.docx
 
babita.docx
babita.docxbabita.docx
babita.docx
 
KASHISH CHOPRA MAIL MERGE.docx
KASHISH CHOPRA MAIL MERGE.docxKASHISH CHOPRA MAIL MERGE.docx
KASHISH CHOPRA MAIL MERGE.docx
 
soniya.docx
soniya.docxsoniya.docx
soniya.docx
 
Kunal.docx
Kunal.docxKunal.docx
Kunal.docx
 

Dernier

Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 

Dernier (20)

Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 

CCNA by Todd Lammle ( PDFDrive ).pdf

  • 1. Advance Praise “Todd’s methods of discussing topics are tactfully approached so they are not confusing to the reader, and his explanations are clear and easy to understand.” —Amazon Reader Review “I passed my CCNA on the first try after reading this book thoroughly. …If you read the book and do all the review questions and written labs at the end of each chapter, you will be well prepared for the exam.” —Amazon Reader Review “This is a great book! Todd Lammle has the ability to make complex topics simple. Cisco books are essential once you’ve mastered networking basics, but there is nothing like Sybex for learning the concepts from A to Z.” —Amazon Reader Review “Todd has been an authority in this field for as long as I can remember. His style of writing keeps the book from becoming a sleep aid and provides nuts and bolts information that is both excellent real-world reference and directly relevant to exam objectives. If you are considering taking the CCNA exam, you would be ill advised to not give this book a thorough read.” —Amazon Reader Review “This is the first book review I have ever written on Amazon. I’ve been in the computer/net- work support field for many years, but had almost no contact with Cisco equipment. I basi- cally knew the ‘enable’ and ‘config’ Cisco commands. I had originally planned on shelling out the $3000 to take a CCNA boot camp, but decided that that was way too much money. So I bought this book instead … took a week off from work (which I would have done any- way for the class), and went at it ... My homegrown boot camp paid off because I passed the exam on the first try, saving almost $2900!” —Amazon Reader Review “This is the best technical book I have ever read!!” —Amazon Reader Review “This book is excellent resource for preparation for CCNA certification. It has needed infor- mation regarding the Cisco’s objective. Sample test and Bonus Test give extra knowledge for exam’s question. Users have more knowledge and practice of test exams. I will recommend this book for anyone who does not have any knowledge of CCNA material.” —Amazon Reader Review 10089.book Page i Monday, July 23, 2007 3:17 PM
  • 2. “I’ve recently passed the CCNA exam with 985 out of 1000 points and Todd Lammle’s book was my only study material (along with a Cisco 2500 router). “It covers all relevant topics in such an easy-to-understand way and gives you a great net- working/Cisco knowledge to build upon. Even now, while I’m pursuing other certifications, it serves as an irreplaceable reference. Every chapter concludes with review questions, hands-on exercises or labs to give you the opportunity of applying your new skills in real- world scenarios and the CD provides additional sample tests and flashcards to consolidate your knowledge. “By reading the book twice and doing all the exercises you will be able to answer just about any question you may encounter on the exam. Highly recommended!” —Amazon Reader Review “I had made three previous attempts using Cisco Press but could not get over the hump. Needless to say I was getting pretty discouraged. However, I had heard good things about the Sybex book by Todd Lammle and decided to give it a try. It was the best thing I could have done. The book read great and it explained the required concepts and topics very well. The review questions and Hand-on Labs at the end of each chapter were also very helpful. “I took the test last weekend and passed!! “Thank you!!” —Amazon Reader Review “Good exam prep. I read this book and with only slight network experience was able to pass the CCNA.” —Amazon Reader Review “There isn’t much more I can say about this book than has already been said. I used Todd’s guide to help me pass the CCNA in 2000 and am using him again to recertify. Just an excel- lent book. Period.” —Amazon Reader Review “This book covered everything I needed to pass the exam, with hands-on experience, and the bonus material. What a great written book this is. The best I have ever read. “I recommend this book highly!!” —Amazon Reader Review 10089.book Page ii Monday, July 23, 2007 3:17 PM
  • 3. Wiley Publishing, Inc. CCNA® : Cisco® Certified Network Associate Study Guide Sixth Edition Todd Lammle 10089.book Page iii Monday, July 23, 2007 3:17 PM
  • 4. Acquisitions Editor: Jeff Kellum Development Editor: Toni Zuccarini Ackley Technical Editor: Patrick J. Conlan Production Editor: Sarah Groff-Palermo Copy Editor: Judy Flynn Production Manager: Tim Tate Vice President and Executive Group Publisher: Richard Swadley Vice President and Executive Publisher: Joseph B. Wikert Vice President and Publisher: Neil Edde Media Project Supervisor: Laura Atkinson Media Development Specialist: Josh Frank Media Quality Assurance: Angie Denny Book Designers: Judy Fung and Bill Gibson Compositor: Craig Woods, Happenstance Type-O-Rama Proofreader: Nancy Riddiough Indexer: Ted Laux Anniversary Logo Design: Richard Pacifico Cover Designer: Ryan Sneed Copyright © 2007 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-11008-9 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other pro- fessional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organi- zation or Website is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Website may provide or recom- mendations it may make. Further, readers should be aware that Internet Websites listed in this work may have changed or disappeared between when this work was written and when it is read. Forgeneralinformationonourotherproductsandservicesortoobtaintechnicalsupport,pleasecontactourCustomer Care Department within the U.S. at (800) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Library of Congress Cataloging-in-Publication Data is available from the publisher. TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. Cisco and CCNA are registered trademarks of Cisco Systems, Inc. All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book. 10 9 8 7 6 5 4 3 2 1 10089.book Page iv Monday, July 23, 2007 3:17 PM
  • 5. To Our Valued Readers: Thank you for looking to Sybex for your CCNA exam prep needs. We at Sybex are proud of our reputation for providing certification candidates with the practical knowledge and skills needed to succeed in the highly competitive IT marketplace. This latest edition of the best-selling CCNA: Cisco Certified Network Associate Study Guide reflects our commit- ment to provide CCNA candidates with the most up-to-date, accurate, and accessible instructional material on the market. As with previous editions, Todd and the editors have worked hard to ensure that the study guide you hold in your hands is comprehensive, in-depth, and pedagogically sound. We’re confident that this book will exceed the demanding standards of the certification market- place and help you, the CCNA certification candidate, succeed in your endeavors. As always, your feedback is important to us. If you believe you’ve identified an error in the book, please visit the Customer Support section of the Wiley website. And if you have general comments or suggestions, feel free to drop me a line directly at nedde@wiley.com. At Sybex, we’re continually striving to meet the needs of individuals preparing for certification exams. Good luck in pursuit of your CCNA certification! Neil Edde Publisher—Certification Sybex, an Imprint of Wiley 10089.book Page v Monday, July 23, 2007 3:17 PM
  • 6. 10089.book Page vi Monday, July 23, 2007 3:17 PM
  • 7. Acknowledgments Monica Lammle’s writing style and voice, editing ability, encouragement, and dedication to ensuring that my books are concise yet highly readable has been invaluable to the success of this and many other projects. She brings clarity and life to what can truly be some very arcane and difficult material! Mr. Patrick Conlan has got to be the personification of perseverance—he’s a rock! Patrick literally hashed and rehashed each topic in this guide with me at all hours of the day and night—scrutinizing the material until we both agreed it was verifiably solid. He was so instru- mental in the development of this book that I hired him at GlobalNet Training to work as a course developer and trainer! You’re going to be hearing a lot more from Mr. Conlan in the technical instruction and writing arena in the future for sure. Daniel Aguilera, who has worked with me at GlobalNet Training for seven years, also worked diligently, helping me put together the bonus exams you’ll find on the CD (so be sure to give him a call if you happen to find a problem <G>). Dan possesses both the intelligence and optimism required to be a great source of encouragement and a deep reservoir of problem- solving ability whenever I found myself discouraged or burned out. Toni Zuccarini Ackley was the main editor of this—the newest book in the Sybex Cisco series. Thank you Toni for having the patience of Job, and for working so hard on this book with me. I’m so happy (and relieved) that you took on the job and, most of all, that you didn’t run screaming from the room the next day! Jeff Kellum is instrumental to my success in the Cisco world and is my acquisitions editor. Jeff, thanks for your guidance and continued patience. Although we work well together and put out fantastic material, I am sure he groans when he sees my name on caller ID! In addition, Sarah Groff-Palermo was an excellent production editor and she worked really hard to get the book done as quickly as possible, without missing the small mistakes that are so easy to over look. Judy Flynn was the copy editor and she showed me that you can actually write a book and still have patience, be helpful but yet work extremely hard to get this book out on the shelves as fast as possible, and for that I thank you tremendously. Both Sarah and Judy worked very hard editing the book for what will hopefully turn out to be a great guide to lead you on your journey toward becoming a CCNA. Finally a big thanks to Craig Woods and Happenstance-Type-O-Rama, and the CD team: Laura Atkinson, Josh Frank, and Angie Denny. 10089.book Page vii Monday, July 23, 2007 3:17 PM
  • 8. 10089.book Page viii Monday, July 23, 2007 3:17 PM
  • 9. Contents at a Glance Introduction xxiii Assessment Test xxxiii Chapter 1 Internetworking 1 Chapter 2 Introduction to TCP/IP 67 Chapter 3 Subnetting, Variable Length Subnet Masks (VLSMs), and Troubleshooting TCP/IP 111 Chapter 4 Cisco’s Internetworking Operating System (IOS) and Security Device Manager (SDM) 171 Chapter 5 Managing a Cisco Internetwork 251 Chapter 6 IP Routing 327 Chapter 7 Enhanced IGRP (EIGRP) and Open Shortest Path First (OSPF) 417 Chapter 8 Layer 2 Switching and Spanning Tree Protocol (STP) 493 Chapter 9 Virtual LANs (VLANs) 551 Chapter 10 Security 609 Chapter 11 Network Address Translation (NAT) 669 Chapter 12 Cisco’s Wireless Technologies 703 Chapter 13 Internet Protocol Version 6 (IPv6) 739 Chapter 14 Wide Area Networks 773 Glossary 851 Index 911 10089.book Page ix Monday, July 23, 2007 3:17 PM
  • 10. 10089.book Page x Monday, July 23, 2007 3:17 PM
  • 11. Table of Contents Introduction xxiii Assessment Test xxxiii Chapter 1 Internetworking 1 Internetworking Basics 4 Internetworking Models 11 The Layered Approach 12 Advantages of Reference Models 12 The OSI Reference Model 13 The Application Layer 15 The Presentation Layer 16 The Session Layer 16 The Transport Layer 16 The Network Layer 22 The Data Link Layer 24 The Physical Layer 30 Ethernet Networking 31 Half- and Full-Duplex Ethernet 33 Ethernet at the Data Link Layer 34 Ethernet at the Physical Layer 37 Ethernet Cabling 39 Straight-Through Cable 39 Crossover Cable 40 Rolled Cable 40 Data Encapsulation 43 The Cisco Three-Layer Hierarchical Model 46 The Core Layer 47 The Distribution Layer 48 The Access Layer 49 Summary 49 Exam Essentials 49 Written Lab 1 50 Written Lab 1.1: OSI Questions 51 Written Lab 1.2: Defining the OSI Layers and Devices 52 Written Lab 1.3: Identifying Collision and Broadcast Domains 53 Written Lab 1.4: Binary/Decimal/Hexadecimal Conversion 53 Review Questions 56 Answers to Review Questions 60 10089.book Page xi Monday, July 23, 2007 3:17 PM
  • 12. xii Table of Contents Answers to Written Lab 1 62 Answer to Written Lab 1.2 63 Answers to Written Lab 1.3 63 Answers to Written Lab 1.4 64 Chapter 2 Introduction to TCP/IP 67 TCP/IP and the DoD Model 68 The Process/Application Layer Protocols 70 The Host-to-Host Layer Protocols 74 The Internet Layer Protocols 83 IP Addressing 92 IP Terminology 93 The Hierarchical IP Addressing Scheme 93 Private IP Addresses 98 Broadcast Addresses 100 Summary 101 Exam Essentials 102 Written Lab 2 102 Review Questions 104 Answers to Review Questions 108 Answers to Written Lab 2 110 Chapter 3 Subnetting, Variable Length Subnet Masks (VLSMs), and Troubleshooting TCP/IP 111 Subnetting Basics 112 IP Subnet-Zero 113 How to Create Subnets 114 Subnet Masks 115 Classless Inter-Domain Routing (CIDR) 116 Subnetting Class C Addresses 118 Subnetting Class B Addresses 127 Subnetting Class A Addresses 134 Variable Length Subnet Masks (VLSMs) 137 VLSM Design 138 Implementing VLSM Networks 139 Summarization 147 Troubleshooting IP Addressing 150 Determining IP Address Problems 153 Summary 157 Exam Essentials 158 Written Labs 3 158 Written Lab 3.1: Written Subnet Practice #1 159 Written Lab 3.2: Written Subnet Practice 159 Written Lab 3.3: Written Subnet Practice 160 10089.book Page xii Monday, July 23, 2007 3:17 PM
  • 13. Table of Contents xiii Review Questions 161 Answers to Review Questions 166 Answers to Written Lab 3.1 168 Answers to Written Lab 3.2 169 Answers to Written Lab 3.3 169 Chapter 4 Cisco’s Internetworking Operating System (IOS) and Security Device Manager (SDM) 171 The IOS User Interface 173 Cisco Router IOS 173 Connecting to a Cisco Router 173 Bringing Up a Router 175 Command-Line Interface (CLI) 179 Entering the CLI from a Non-ISR Router 180 Overview of Router Modes 181 CLI Prompts 182 Editing and Help Features 185 Gathering Basic Routing Information 189 Router and Switch Administrative Configurations 191 Hostnames 191 Banners 192 Setting Passwords 194 Encrypting Your Passwords 199 Descriptions 201 Router Interfaces 204 Bringing Up an Interface 206 Viewing, Saving, and Erasing Configurations 212 Deleting the Configuration and Reloading the Router 214 Verifying Your Configuration 214 Cisco’s Security Device Manager (SDM) 223 Summary 232 Exam Essentials 233 Written Lab 4 234 Hands-on Labs 235 Hands-on Lab 4.1: Logging into a Router 235 Hands-on Lab 4.2: Using the Help and Editing Features 236 Hands-on Lab 4.3: Saving a Router Configuration 237 Hands-on Lab 4.4: Setting Your Passwords 237 Hands-on Lab 4.5: Setting the Hostname, Descriptions, IP Address, and Clock Rate 239 Hands-on Lab 4.6: Installing SDM on Your Computer 241 Review Questions 242 Answers to Review Questions 247 Answers to Written Lab 4 249 10089.book Page xiii Monday, July 23, 2007 3:17 PM
  • 14. xiv Table of Contents Chapter 5 Managing a Cisco Internetwork 251 The Internal Components of a Cisco Router 252 The Router Boot Sequence 253 Managing Configuration Register 254 Understanding the Configuration Register Bits 254 Checking the Current Configuration Register Value 256 Changing the Configuration Register 256 Recovering Passwords 258 Boot System Commands 261 Backing Up and Restoring the Cisco IOS 262 Verifying Flash Memory 263 Backing Up the Cisco IOS 264 Restoring or Upgrading the Cisco Router IOS 265 Using the Cisco IOS File System (Cisco IFS) 266 Using the SDM to Manage the Flash Memory 270 Backing Up and Restoring the Cisco Configuration 274 Backing Up the Cisco Router Configuration 275 Restoring the Cisco Router Configuration 276 Erasing the Configuration 277 Using the Cisco IOS File System to Manage Your Router’s Configuration (Cisco IFS) 278 Using the SDM to Back Up/Restore and Edit the Router’s Configuration 280 Using Cisco Discovery Protocol (CDP) 283 Getting CDP Timers and Holdtime Information 283 Gathering Neighbor Information 284 Gathering Interface Traffic Information 289 Gathering Port and Interface Information 290 Documenting a Network Topology Using CDP 292 Using Telnet 295 Telnetting into Multiple Devices Simultaneously 297 Checking Telnet Connections 297 Checking Telnet Users 297 Closing Telnet Sessions 298 Using SDM to Telnet into Your Router 299 Resolving Hostnames 300 Building a Host Table 300 Using DNS to Resolve Names 302 Checking Network Connectivity and Troubleshooting 305 Using the ping Command 305 Using the traceroute Command 307 Debugging 308 Using the show processes Command 310 Summary 311 10089.book Page xiv Monday, July 23, 2007 3:17 PM
  • 15. Table of Contents xv Exam Essentials 311 Written Lab 5 313 Hands-on Labs 313 Hands-on Lab 5.1: Backing Up Your Router IOS 314 Hands-on Lab 5.2: Upgrading or Restoring Your Router IOS 314 Hands-on Lab 5.3: Backing Up the Router Configuration 314 Hands-on Lab 5.4: Using the Cisco Discovery Protocol (CDP) 315 Hands-on Lab 5.5: Using Telnet 316 Hands-on Lab 5.6: Resolving Hostnames 316 Review Questions 318 Answers to Review Questions 323 Answers to Written Lab 5 325 Chapter 6 IP Routing 327 Routing Basics 329 The IP Routing Process 331 Testing Your IP Routing Understanding 336 Configuring IP Routing 341 Configuring IP Routing in Our Network 362 Static Routing 363 Default Routing 374 Dynamic Routing 377 Routing Protocol Basics 377 Distance-Vector Routing Protocols 379 Routing Loops 380 Routing Information Protocol (RIP) 383 RIP Timers 383 Configuring RIP Routing 383 Verifying the RIP Routing Tables 387 Configuring RIP Routing Example 2 389 Holding Down RIP Propagations 390 RIP Version 2 (RIPv2) 390 Interior Gateway Routing Protocol (IGRP) 392 Verifying Your Configurations 393 The show ip protocols Command 394 The debug ip rip Command 395 Enabling RIPv2 on Our Internetwork 398 Summary 401 Exam Essentials 401 Written Lab 6 402 Hands-on Labs 403 Hands-on Lab 6.1: Creating Static Routes 404 Hands-on Lab 6.2: Configuring RIP Routing 405 10089.book Page xv Monday, July 23, 2007 3:17 PM
  • 16. xvi Table of Contents Review Questions 407 Answers to Review Questions 413 Answers to Written Lab 6 415 Chapter 7 Enhanced IGRP (EIGRP) and Open Shortest Path First (OSPF) 417 EIGRP Features and Operation 418 Protocol-Dependent Modules 419 Neighbor Discovery 419 Reliable Transport Protocol (RTP) 421 Diffusing Update Algorithm (DUAL) 421 Using EIGRP to Support Large Networks 422 Multiple ASes 422 VLSM Support and Summarization 423 Route Discovery and Maintenance 424 Configuring EIGRP 426 Corp 429 R1 429 R2 430 R3 430 Redistributing to the 871W Router from R3 432 Configuring Discontiguous Networks 434 Load Balancing with EIGRP 435 Verifying EIGRP 438 Open Shortest Path First (OSPF) Basics 444 OSPF Terminology 446 SPF Tree Calculation 448 Configuring OSPF 449 Enabling OSPF 449 Configuring OSPF Areas 450 Configuring Our Network with OSPF 453 Verifying OSPF Configuration 457 The show ip ospf Command 458 The show ip ospf database Command 459 The show ip ospf interface Command 460 The show ip ospf neighbor Command 461 The show ip protocols Command 461 Debugging OSPF 462 OSPF DR and BDR Elections 465 Neighbors 465 Adjacencies 465 DR and BDR Elections 466 OSPF and Loopback Interfaces 466 Configuring Loopback Interfaces 467 OSPF Interface Priorities 469 10089.book Page xvi Monday, July 23, 2007 3:17 PM
  • 17. Table of Contents xvii Troubleshooting OSPF 471 Configuring EIGRP and OSPF Summary Routes 474 Summary 476 Exam Essentials 477 Written Lab 7 477 Hands-on Labs 478 Hands-on Lab 7.1: Configuring and Verifying EIGRP 479 Hands-on Lab 7.2: Enabling the OSPF Process 480 Hands-on Lab 7.3: Configuring OSPF Neighbors 481 Hands-on Lab 7.4: Verifying OSPF Operation 482 Hands-on Lab 7.5: OSPF DR and BDR Elections 482 Review Questions 484 Answers to Review Questions 489 Answers to Written Lab 7 491 Chapter 8 Layer 2 Switching and Spanning Tree Protocol (STP) 493 Before Layer 2 Switching 494 Switching Services 497 Limitations of Layer 2 Switching 498 Bridging vs. LAN Switching 499 Three Switch Functions at Layer 2 499 Spanning Tree Protocol (STP) 505 Spanning Tree Terms 506 Spanning Tree Operations 507 Configuring Catalyst Switches 514 Catalyst Switch Configuration 515 Verifying Cisco Catalyst Switches 528 Cisco Network Assistant 534 Summary 541 Exam Essentials 542 Written Lab 8 542 Review Questions 543 Answers to Review Questions 548 Answers to Written Lab 8.1 550 Chapter 9 Virtual LANs (VLANs) 551 VLAN Basics 552 Broadcast Control 554 Security 555 Flexibility and Scalability 555 VLAN Memberships 558 Static VLANs 558 Dynamic VLANs 559 10089.book Page xvii Monday, July 23, 2007 3:17 PM
  • 18. xviii Table of Contents Identifying VLANs 559 Frame Tagging 561 VLAN Identification Methods 562 VLAN Trunking Protocol (VTP) 563 VTP Modes of Operation 564 VTP Pruning 565 Routing between VLANs 567 Configuring VLANs 568 Assigning Switch Ports to VLANs 570 Configuring Trunk Ports 571 Configuring Inter-VLAN Routing 575 Configuring VTP 580 Troubleshooting VTP 583 Telephony: Configuring Voice VLANs 586 Configuring the Voice VLAN 587 Configuring IP Phone Voice Traffic 587 Using the CNA to Configure VLANs and Inter-VLAN Routing 588 Summary 597 Exam Essentials 598 Written Lab 9 599 Review Questions 600 Answers to Review Questions 605 Answers to Written Lab 9.1 607 Chapter 10 Security 609 Perimeter, Firewall, and Internal Routers 610 Recognizing Security Threats 611 Mitigating Security Threats 614 Cisco’s IOS Firewall 614 Introduction to Access Lists 615 Mitigating Security Issues with ACLs 618 Standard Access Lists 619 Wildcard Masking 620 Standard Access List Example 622 Controlling VTY (Telnet) Access 625 Extended Access Lists 626 Extended Access List Example 1 630 Extended Access List Example 2 631 Advanced Access Lists 632 Named ACLs 632 Switch Port ACLs 634 Lock and Key (Dynamic ACLs) 636 Reflexive ACLs 637 Time-Based ACLs 637 10089.book Page xviii Monday, July 23, 2007 3:17 PM
  • 19. Table of Contents xix Remarks 638 Context-Based Access Control (Cisco IOS Firewall) 639 Authentication Proxy 640 Monitoring Access Lists 640 Configuring Access Lists Using SDM 643 Creating ACLs with SDM 643 Creating Firewalls with SDM 647 Summary 654 Exam Essentials 655 Written Lab 10.1 655 Hands-on Labs 656 Hands-on Lab 10.1: Standard IP Access Lists 657 Hands-on Lab 10.2: Extended IP Access Lists 657 Review Questions 661 Answers to Review Questions 666 Answers to Written Lab 10.1 668 Chapter 11 Network Address Translation (NAT) 669 When Do We Use NAT? 670 Types of Network Address Translation 671 NAT Names 672 How NAT Works 673 Static NAT Configuration 674 Dynamic NAT Configuration 675 PAT (Overloading) Configuration 675 Simple Verification of NAT 676 Testing and Troubleshooting NAT 677 Configuring NAT on Our Internetwork 679 Configuring NAT Using SDM 684 Summary 688 Exam Essentials 688 Written Lab 11 688 Hands-on Labs 689 Lab 11.1: Preparing for NAT 691 Lab 11.2: Configuring Dynamic NAT 692 Lab 11.3: Configuring PAT 694 Review Questions 696 Answers to Review Questions 699 Answers to Written Lab 11 701 Chapter 12 Cisco’s Wireless Technologies 703 Introduction to Wireless Technology 704 The 802.11 Standards 706 Comparing 802.11 711 10089.book Page xix Monday, July 23, 2007 3:17 PM
  • 20. xx Table of Contents Cisco’s Unified Wireless Solution 712 Split-MAC Architecture 715 MESH and LWAPP 716 AWPP 718 Wireless Security 718 Configuring Our Wireless Internetwork 721 Summary 729 Exam Essentials 729 Written Lab 12 730 Review Questions 731 Answers to Review Questions 735 Answers to Written Lab 12 737 Chapter 13 Internet Protocol Version 6 (IPv6) 739 Why Do We Need IPv6? 740 The Benefits and Uses of IPv6 741 IPv6 Addressing and Expressions 742 Shortened Expression 743 Address Types 744 Special Addresses 745 How IPv6 Works in an Internetwork 746 Autoconfiguration 746 Configuring Cisco Routers with IPv6 747 DHCPv6 748 ICMPv6 749 IPv6 Routing Protocols 750 RIPng 751 EIGRPv6 751 OSPFv3 752 Migrating to IPv6 753 Dual Stacking 754 6to4 Tunneling 754 NAT-PT 755 Configuring IPv6 on Our Internetwork 756 Configuring RIPng 759 Configuring OSPFv3 763 Summary 766 Exam Essentials 767 Written Lab 13 767 Review Questions 768 Answers to Review Questions 771 Answers to Written Lab 13.1 772 10089.book Page xx Monday, July 23, 2007 3:17 PM
  • 21. Table of Contents xxi Chapter 14 Wide Area Networks 773 Introduction to Wide Area Networks 774 Defining WAN Terms 775 WAN Connection Types 775 WAN Support 777 Cable and DSL 779 Cable 780 Digital Subscriber Line (DSL) 782 Cabling the Serial Wide Area Network 785 Serial Transmission 785 Data Terminal Equipment and Data Communication Equipment 786 High-Level Data-Link Control (HDLC) Protocol 787 Point-to-Point Protocol (PPP) 788 Link Control Protocol (LCP) Configuration Options 789 PPP Session Establishment 790 PPP Authentication Methods 790 Configuring PPP on Cisco Routers 791 Configuring PPP Authentication 791 Verifying PPP Encapsulation 792 PPPoE Configuration 796 Frame Relay 798 Introduction to Frame Relay Technology 798 Frame Relay Implementation and Monitoring 805 Using SDM for WAN Connections 813 Configuring PPP with Authentication Using SDM 813 Configuring PPPoE with SDM 818 Configuring Frame Relay with SDM 822 Virtual Private Networks 825 Introduction to Cisco IOS IPSec 826 IPSec Transforms 826 Configuring VPNs/IPSec Using the SDM 828 Summary 836 Exam Essentials 836 Written Lab 14 837 Hands-on Labs 837 Hands-on Lab 14.1: Configuring PPP Encapsulation and Authentication 838 Hands-on Lab 14.2: Configuring and Monitoring HDLC 839 Hands-on Lab 14.3: Configuring Frame Relay and Subinterfaces 840 10089.book Page xxi Monday, July 23, 2007 3:17 PM
  • 22. xxii Table of Contents Review Questions 842 Answers to Review Questions 847 Answers to Written Lab 14.1 849 Glossary 851 Index 911 10089.book Page xxii Monday, July 23, 2007 3:17 PM
  • 23. Introduction Welcome to the exciting world of Cisco certification! You have picked up this book because you want something better—namely, a better job with more satisfaction. Rest assured that you have made a good decision. Cisco certification can help you get your first networking job or more money and a promotion if you are already in the field. Cisco certification can also improve your understanding of the internetworking of more than just Cisco products: You will develop a complete understanding of networking and how different network topologies work together to form a network. This is beneficial to every net- working job and is the reason Cisco certification is in such high demand, even at companies with few Cisco devices. Cisco is the king of routing, switching, and security, the Microsoft of the internetworking world. The Cisco certifications reach beyond the popular certifications, such as the MCSE, to provide you with an indispensable factor in understanding today’s network—insight into the Cisco world of internetworking. By deciding that you want to become Cisco certified, you are saying that you want to be the best—the best at routing and the best at switching. This book will lead you in that direction. For up-to-the minute updates covering additions or modifications to the CCNA certification exams, as well as additional study tools and review ques- tions, be sure to visit the Todd Lammle forum and website at www.lammle.com and/or www.sybex.com. Cisco’s Network Support Certifications Initially, to secure the coveted Cisco CCIE certification, you took only one test and then you were faced with the (extremely difficult) hands-on lab, an all-or-nothing approach that made it tough to succeed. In response, Cisco created a series of new certifications to help you get the coveted CCIE as well as aid prospective employers in measuring skill levels. With these new certifications, which make for a better approach to preparing for that almighty lab, Cisco opened doors that few were allowed through before. This book covers everything CCNA related. For up-to-date information on Todd Lammle Cisco Authorized CCNA CCNP, CCSP, CCVP, and CCIE boot- camps, please see www.lammle.com and/or www.globalnettraining.com. 10089.book Page xxiii Monday, July 23, 2007 3:17 PM
  • 24. xxiv Introduction Cisco Certified Network Associate (CCNA) The CCNA certification was the first in the new line of Cisco certifications and was the pre- cursor to all current Cisco certifications. Now you can become a Cisco Certified Network Associate for the meager cost of this book and either one test at $150 or two tests at $125 each—although the CCNA exams are extremely hard and cover a lot of material, so you have to really know your stuff! Taking a Cisco class or spending months with hands-on experience is not out of the norm. And once you have your CCNA, you don’t have to stop there—you can choose to continue with your studies and achieve a higher certification, called the Cisco Certified Network Pro- fessional (CCNP). Someone with a CCNP has all the skills and knowledge he or she needs to attempt the Routing and Switching CCIE lab. But just becoming a CCNA can land you that job you’ve dreamed about. Why Become a CCNA? Cisco, not unlike Microsoft and Novell (Linux), has created the certification process to give administrators a set of skills and to equip prospective employers with a way to measure skills or match certain criteria. Becoming a CCNA can be the initial step of a successful journey toward a new, highly rewarding, and sustainable career. The CCNA program was created to provide a solid introduction not only to the Cisco Inter- network Operating System (IOS) and Cisco hardware, but also to internetworking in general, making it helpful to you in areas that are not exclusively Cisco’s. At this point in the certifi- cation process, it’s not unrealistic that network managers—even those without Cisco equip- ment—require Cisco certifications for their job applicants. If you make it through the CCNA and are still interested in Cisco and internetworking, you’re headed down a path to certain success. What Skills Do You Need to Become a CCNA? To meet the CCNA certification skill level, you must be able to understand or do the following: A CCNA certified professional can install, configure, and operate LAN, WAN, and wire- less access services securely, as well as troubleshoot and configure small to medium net- works (500 nodes or fewer) for performance. This knowledge includes, but is not limited to, use of these protocols: IP, IPv6, EIGRP, RIP, RIPv2, OSPF, serial connections, Frame Relay, cable, DSL, PPPoE, LAN switching, VLANs, Ethernet, security, and access lists. Be sure and check my web site and/or Cisco’s web site for the latest Cisco CCNA objectives and other Cisco exams, objectives, and certifications that can change on a moment’s notice 10089.book Page xxiv Monday, July 23, 2007 3:17 PM
  • 25. Introduction xxv How Do You Become a CCNA? The way to become a CCNA is to pass one little test (CCNA Composite exam 640-802). Then— poof!—you’re a CCNA. (Don’t you wish it were that easy?) True, it can be just one test, but you still have to possess enough knowledge to understand what the test writers are saying. However, Cisco has a two-step process that you can take in order to become a CCNA that may or may not be easier than taking one longer exam (this book is based on the one-step method 640-802); however, this book has all the information you need to pass all three exams. The two-step method involves passing the following: Exam 640-822: Interconnecting Cisco Networking Devices 1(ICND1) Exam 640-816: Introduction to Cisco Networking Devices 2 (ICND2) I can’t stress this enough: It’s critical that you have some hands-on experience with Cisco routers. If you can get ahold of some 1841 or 2800 series routers, you’re set. But if you can’t, I’ve worked hard to provide hundreds of configuration examples throughout this book to help network administrators (or people who want to become network administrators) learn what they need to know to pass the CCNA exam. Since the new 640-802 exam is so hard, Cisco wants to reward you for taking the two-test approach. Or so it seems. If you take the ICND1 exam, you actually receive a certification called the CCENT (Cisco Certified Entry Networking Technician). This is one step toward your CCNA. To achieve your CCNA, you must still pass your ICND2 exam. Again, this book was written for the CCNA 640-802 Composite exam—one exam and you get your certification. For Cisco Authorized hands-on training with CCSI Todd Lammle, please see www.globalnettraining.com. Each student will get hands-on experience by configuring at least three routers and two switches—no sharing of equipment! What Does This Book Cover? This book covers everything you need to know in order to pass the CCNA 640-802 exam. However, taking the time to study and practice with routers or a router simulator is the real key to success. You will learn the following information in this book: Chapter 1 introduces you to internetworking. You will learn the basics of the Open Sys- tems Interconnection (OSI) model the way Cisco wants you to learn it. Ethernet network- ing and standards are discussed in detail in this chapter as well. There are written labs and plenty of review questions to help you. Do not skip the written labs in this chapter! Chapter 2 provides you with the background necessary for success on the exam as well as in the real world by discussing TCP/IP. This in-depth chapter covers the very beginnings of the Internet Protocol stack and then goes all the way to IP addressing and understand- ing the difference between a network address and a broadcast address before finally ending with network troubleshooting. 10089.book Page xxv Monday, July 23, 2007 3:17 PM
  • 26. xxvi Introduction Chapter 3 introduces you to subnetting. You will be able to subnet a network in your head after reading this chapter. In addition, you’ll learn about Variable Length Subnet Masks (VLSMs) and how to design a network using VLSMs. This chapter will finish with sum- marization techniques and configurations. Plenty of help is found in this chapter if you do not skip the Written Lab and Review Questions. Chapter 4 introduces you to the Cisco Internetwork Operating System (IOS) and command- line interface (CLI). In this chapter you will learn how to turn on a router and configure the basics of the IOS, including setting passwords, banners, and more. IP configuration using the Secure Device Manager (SDM) will be discussed and Hands-on Labs will help you gain a firm grasp of the concepts taught in the chapter. Before you go through the Hands-on Labs, be sure to complete the Written Lab and Review Questions. Chapter 5 provides you with the management skills needed to run a Cisco IOS network. Back- ing up and restoring the IOS, as well as router configuration, is covered, as are the trouble- shooting tools necessary to keep a network up and running. Before performing the Hands-on Labs in this chapter, complete the Written Lab and Review Questions. Chapter 6 teaches you about IP routing. This is a fun chapter, because you will begin to build your network, add IP addresses, and route data between routers. You will also learn about static, default, and dynamic routing using RIP and RIPv2 (with a small touch of IGRP). Written and Hands-on Labs will help you understand IP routing to the fullest. Chapter 7 dives into more complex dynamic routing with Enhanced IGRP and OSPF routing. The Written Lab, Hands-on Labs, and Review Questions will help you master these routing protocols. Chapter 8 gives you a background on layer 2 switching and how switches perform address learning and make forwarding and filtering decisions. Network loops and how to avoid them with the Spanning Tree Protocol (STP) will be discussed, as well as the 802.1w STP version. Go through the Written Lab and Review Questions to help you really understand the basic layer 2 switching on an internetwork. Chapter 9 covers virtual LANs and how you can use them in your internetwork. This chapter also covers the nitty-gritty of VLANs and the different concepts and protocols used with VLANs, as well as troubleshooting. The Written Lab and Review Questions will reinforce the VLAN material. Chapter 10 covers security and access lists, which are created on routers to filter the network. IP standard, extended, and named access lists are covered in detail. Written and Hands-on Labs, along with Review Questions, will help you study for the security and access-list portion of the CCNA Composite exam. Chapter 11 covers Network Address Translation (NAT). This chapter has been on the Sybex website for a few years as an update to my last CCNA book, but I updated it and added it to this edition. New information, commands, troubleshooting, and labs will help you nail the NAT CCNA objectives. Chapter 12 covers wireless technologies. This is an introductory chapter regarding wire- less technologies as Cisco sees them. However, I also added some advanced wireless topics that cover Cisco’s newest gear. At this time, advanced wireless is not covered within the Cisco CCNA objectives, but that can change on any given day. Make sure you understand 10089.book Page xxvi Monday, July 23, 2007 3:17 PM
  • 27. Introduction xxvii your basic wireless technologies like access points and clients, as well as the difference between 802.11a, b, and g. Chapter 13 covers IPv6. This is a fun chapter and has some great information. IPv6 is not the big, bad scary monster that most people think it is. IPv6 is an objective on this new exam, so study this chapter carefully. Keep an eye out at www.lammle.com for late-breaking updates. Chapter 14 concentrates on Cisco wide area network (WAN) protocols. This chapter covers HDLC, PPP, and Frame Relay in depth, as well as other protocols we use on a daily basis like Cable, DSL and PPPoE. You must be proficient in all these protocols to be successful on the CCNA exam. Do not skip the Written Lab, Review Questions, or Hands-on Labs found in this chapter. How to Use This Book If you want a solid foundation for the serious effort of preparing for the Cisco Certified Network Associate (CCNA Composite) 640-802 exam, then look no further. I have spent hundreds of hours putting together this book with the sole intention of helping you to pass the CCNA exam and learn how to configure Cisco routers and switches (among hundreds of other things!). This book is loaded with valuable information, and you will get the most out of your studying time if you understand how I put the book together. To best benefit from this book, I recommend the following study method: 1. Take the assessment test immediately following this introduction. (The answers are at the end of the test.) It’s okay if you don’t know any of the answers; that is why you bought this book! Carefully read over the explanations for any question you get wrong and note the chapters in which the material is covered. This information should help you plan your study strategy. Honestly, my recommendation is to just start reading from Chapter 1 and don’t stop until you’re all the way through Chapter 14. 2. Study each chapter carefully, making sure that you fully understand the information and the test objectives listed at the beginning of each one. Pay extra-close attention to any chapter that includes material covered in questions you missed in the assessment test. 3. Complete each Written Lab at the end of each chapter. Do not skip these written exercises because they directly relate to the CCNA Composite objectives and what you must glean from the chapters in which they appear. Do not just skim these labs! Make sure you understand completely the reason for each answer. 4. Complete all Hands-on Labs in the chapter (not all chapters have hands-on labs, referring to the text of the chapter so that you understand the reason for each step you take. If you do not have Cisco equipment available, go to www.routersim.com for a router simulator that will cover all the hands-on labs needed for all your Cisco certification needs. 5. Answer all of the Review Questions related to each chapter. (The answers appear at the end of the chapters.) Note the questions that confuse you and study those sections of the book again. Do not just skim these questions! Make sure you understand completely the reason for each answer. Remember that these will not be the exact questions you find on the exam; they are written to help you understand the chapter material. 10089.book Page xxvii Monday, July 23, 2007 3:17 PM
  • 28. xxviii Introduction 6. Try your hand at the bonus exams that are included on the companion CD. The questions in these exams appear only on the CD. Check out www.lammle.com for more Cisco exam prep questions. The questions found at www.lammle.com will be updated at least monthly, if not weekly or even daily! Before you take your test, be sure and visit my web site for ques- tions, videos, audios and other useful information. 7. Also on the companion CD is the first module from my complete CCNA video series, which covers internetworking and basic networking. This is critical for the CCNA exam. In addition, as an added bonus, I have included an audio section from my CCNA audio program. Do not skip the video and audio section! Just a note to let you know that I mention the test number 640-801 in the video and audio sections. This is nothing to be concerned about as the information presented is valid for both the 640-801 and 640-802 exam. 8. Test yourself using all the flashcards on the CD. These are brand new and updated flash- card programs to help you prepare for the CCNA exam. These are a great study tool! To learn every bit of the material covered in this book, you’ll have to apply yourself regu- larly, and with discipline. Try to set aside the same time period every day to study, and select a comfortable and quiet place to do so. If you work hard, you will be surprised at how quickly you learn this material. If you follow the steps listed above and really study and practice the Review Questions, bonus exams, the Todd Lammle video/audio sections, and the electronic flashcards, as well as all the Written and Hands-on Labs, it would be hard to fail the CCNA Composite exam. How- ever, studying for the CCNA exam is like trying to get in shape—if you do not go to the gym every day, you won’t get in shape. What’s on the CD? We worked hard to provide some really great tools to help you with your certification process. All of the following tools should be loaded on your workstation when you’re studying for the test. As a fantastic bonus, I was able to add a section from both my CCNA video and audio series to the CD included with this book! The Sybex Test Preparation Software The test preparation software prepares you to pass the CCNA exam. In this test engine, you will find all the review and assessment questions from the book, plus two additional bonus exams that appear exclusively on the CD. Electronic Flashcards for PC, Pocket PC, and Palm Devices To prepare for the exam, you can read this book, study the Review Questions at the end of each chapter, and work through the practice exams included in the book and on the compan- ion CD. But wait, there’s more! You can also test yourself with the flashcards included on the 10089.book Page xxviii Monday, July 23, 2007 3:17 PM
  • 29. Introduction xxix CD. If you can get through these difficult questions and understand the answers, you’ll know you’re ready for the CCNA exam. The flashcards include over 250 questions specifically written to hit you hard and make sure you are ready for the exam. Between the review questions, bonus exams, and flashcards on the CD, you’ll be more than prepared for the exam. CCNA: Cisco Certified Network Associate Study Guide in PDF Sybex offers the CCNA Exam 640-802 Study Guide in PDF on the CD so you can read the book on your PC or laptop. (Acrobat Reader 7 is also included on the CD.) Todd Lammle Videos I have created a full CCNA series of videos that can be purchased in either DVD or down- loadable format. However, as a bonus included with this book, the first module of this series is included on the CD in its entirety. The video is over one hour of informative CCNA infor- mation. This is a $149 value! Do not skip this video as it covers the internetworking objectives, which are very important to the CCNA exam. Todd Lammle Audios In addition to the videos included for free on the CD, I have also included a full section from my CCNA audio series. The CCNA audio series is a $199 value! This is a great tool to add to your arsenal of study material to help you pass the CCNA exam. To find more Todd Lammle videos and audios, as well as other Cisco study material, please see www.lammle.com. And well you’re there, sign up for my forum. There is a lot of useful information that can found in the forum, plus you can ask me questions directly related to your studies. Where Do You Take the Exams? You may take the CCNA Composite exam at any Pearson VUE authorized testing centers (www.vue.com) or call 877-404-EXAM (3926). To register for a Cisco Certified Network Associate exam: 1. Determine the number of the exam you want to take. (The CCNA Composite exam number is 640-802.) 2. Register with the nearest Pearson VUE testing center. At this point, you will be asked to pay in advance for the exam. At the time of this writing, the exam is $150 and must be taken within one year of payment. You can schedule exams up to six weeks in advance or as late as the same day you want to take it—but if you fail a Cisco exam, you must wait five days before you will be allowed to retake the exam. If something comes up and you need to cancel or reschedule your exam appointment, contact Prometric or Pearson VUE at least 24 hours in advance. 10089.book Page xxix Monday, July 23, 2007 3:17 PM
  • 30. xxx Introduction 3. When you schedule the exam, you’ll get instructions regarding all appointment and cancel- lation procedures, the ID requirements, and information about the testing-center location. Tips for Taking Your CCNA Composite Exam The CCNA Composite exam test contains about 55 to 60 questions and must be completed in 75 to 90 minutes or less. This information can change per exam. You must get a score of about 85% to pass this exam, but again, each exam can be different. Many questions on the exam have answer choices that at first glance look identical—especially the syntax questions! Remember to read through the choices carefully because close doesn’t cut it. If you get commands in the wrong order or forget one measly character, you’ll get the question wrong. So, to practice, do the hands-on exercises at the end of this book’s chapters over and over again until they feel natural to you. Also, never forget that the right answer is the Cisco answer. In many cases, more than one appropriate answer is presented, but the correct answer is the one that Cisco recommends. On the exam, you’re always instructed to pick one, two, or three, never “choose all that apply.” The CCNA Composite 640-802 exam may include the following test formats: Multiple-choice single answer Multiple-choice multiple answer Drag-and-drop Fill-in-the-blank Router simulations In addition to multiple choice and fill-in response questions, Cisco Career Certifications exams may include performance simulation exam items. Check out the software at www.routersim.com that lets you design and configure an unlimited number of Cisco routers and switches running multiple routing protocols! The software on the CD and at RouterSim.com provides step-by-step instruction on how to configure both Cisco routers and switches. However, router simulations in Cisco proctored exams will not show the steps to follow in completing a router interface configuration. They do allow partial command responses. For example, show config or sho config or sh conf would be acceptable. Router#show ip protocol or router#show ip prot would be acceptable. Here are some general tips for exam success: Arrive early at the exam center so you can relax and review your study materials. Read the questions carefully. Don’t jump to conclusions. Make sure you’re clear about exactly what each question asks. When answering multiple-choice questions that you’re not sure about, use the process of elimination to get rid of the obviously incorrect answers first. Doing this greatly improves your odds if you need to make an educated guess. You can no longer move forward and backward through the Cisco exams, so double- check your answer before clicking Next since you can’t change your mind. 10089.book Page xxx Monday, July 23, 2007 3:17 PM
  • 31. Introduction xxxi After you complete an exam, you’ll get immediate, online notification of your pass or fail status, a printed Examination Score Report that indicates your pass or fail status, and your exam results by section. (The test administrator will give you the printed score report.) Test scores are automatically forwarded to Cisco within five working days after you take the test, so you don’t need to send your score to them. If you pass the exam, you’ll receive confirmation from Cisco, typically within two to four weeks, sometimes longer. How to Contact the Author You can reach Todd Lammle through his forum at www.lammle.com. 10089.book Page xxxi Monday, July 23, 2007 3:17 PM
  • 32. 10089.book Page xxxii Monday, July 23, 2007 3:17 PM
  • 33. Assessment Test 1. What protocol does PPP use to identify the Network layer protocol? A. NCP B. ISDN C. HDLC D. LCP 2. You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server con- nected to the switch running 10Mbps half-duplex as well. How much bandwidth does each host have to the server? A. 100kbps B. 1Mbps C. 2Mbps D. 10Mbps 3. In a network with dozens of switches, how many root bridges would you have? A. 1 B. 2 C. 5 D. 12 4. What does the command routerA(config)#line cons 0 allow you to perform next? A. Set the Telnet password. B. Shut down the router. C. Set your console password. D. Disable console connections. 5. How long is an IPv6 address? A. 32 bits B. 128 bytes C. 64 bits D. 128 bits 6. What PPP protocol provides dynamic addressing, authentication, and multilink? A. NCP B. HDLC C. LCP D. X.25 10089.book Page xxxiii Monday, July 23, 2007 3:17 PM
  • 34. xxxiv Assessment Test 7. What command will display the line, protocol, DLCI, and LMI information of an interface? A. sh pvc B. show interface C. show frame-relay pvc D. sho runn 8. Which of the following is the valid host range for the subnet on which the IP address 192.168.168.188 255.255.255.192 resides? A. 192.168.168.129–190 B. 192.168.168.129–191 C. 192.168.168.128–190 D. 192.168.168.128–192 9. What does the passive command provide to dynamic routing protocols? A. Stops an interface from sending or receiving periodic dynamic updates B. Stops an interface from sending periodic dynamic updates but not from receiving updates C. Stops the router from receiving any dynamic updates D. Stops the router from sending any dynamic updates 10. Which protocol does Ping use? A. TCP B. ARP C. ICMP D. BootP 11. How many collision domains are created when you segment a network with a 12-port switch? A. 1 B. 2 C. 5 D. 12 12. Which of the following commands will allow you to set your Telnet password on a Cisco router? A. line telnet 0 4 B. line aux 0 4 C. line vty 0 4 D. line con 0 13. Which router command allows you to view the entire contents of all access lists? A. show all access-lists B. show access-lists C. show ip interface D. show interface 10089.book Page xxxiv Monday, July 23, 2007 3:17 PM
  • 35. Assessment Test xxxv 14. What does a VLAN do? A. Acts as the fastest port to all servers B. Provides multiple collision domains on one switch port C. Breaks up broadcast domains in a layer 2 switch internetwork D. Provides multiple broadcast domains within a single collision domain 15. If you wanted to delete the configuration stored in NVRAM, what would you type? A. erase startup B. erase nvram C. delete nvram D. erase running 16. Which protocol is used to send a destination network unknown message back to originat- ing hosts? A. TCP B. ARP C. ICMP D. BootP 17. Which class of IP address has the most host addresses available by default? A. A B. B C. C D. A and B 18. How often are BPDUs sent from a layer 2 device? A. Never B. Every 2 seconds C. Every 10 minutes D. Every 30 seconds 19. Which one of the following is true regarding VLANs? A. Two VLANs are configured by default on all Cisco switches. B. VLANs only work if you have a complete Cisco switched internetwork. No off-brand switches are allowed. C. You should not have more than 10 switches in the same VTP domain. D. VTP is used to send VLAN information to switches in a configured VTP domain. 20. Which WLAN IEEE specification allows up to 54Mbps at 2.4GHz? A. A B. B C. G D. N 10089.book Page xxxv Monday, July 23, 2007 3:17 PM
  • 36. xxxvi Assessment Test 21. How many broadcast domains are created when you segment a network with a 12-port switch? A. 1 B. 2 C. 5 D. 12 22. What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet? A. NAT B. Static C. Dynamic D. PAT 23. What protocols are used to configure trunking on a switch? (Choose two.) A. VLAN Trunking Protocol B. VLAN C. 802.1Q D. ISL 24. What is a stub network? A. A network with more than one exit point B. A network with more than one exit and entry point C. A network with only one entry and no exit point D. A network that has only one entry and exit point 25. Where is a hub specified in the OSI model? A. Session layer B. Physical layer C. Data Link layer D. Application layer 26. What are the two main types of access control lists (ACLs)? A. Standard B. IEEE C. Extended D. Specialized 27. To back up an IOS, what command will you use? A. backup IOS disk B. copy ios tftp C. copy tftp flash D. copy flash tftp 10089.book Page xxxvi Monday, July 23, 2007 3:17 PM
  • 37. Assessment Test xxxvii 28. What command is used to create a backup configuration? A. copy running backup B. copy running-config startup-config C. config mem D. wr mem 29. What is the main reason the OSI model was created? A. To create a layered model larger than the DoD model B. So application developers can change only one layer’s protocols at a time C. So different networks could communicate D. So Cisco could use the model 30. Which protocol does DHCP use at the Transport layer? A. IP B. TCP C. UDP D. ARP 31. If your router is facilitating a CSU/DSU, which of the following commands do you need to use to provide the router with a 64000bps serial link? A. RouterA(config)#bandwidth 64 B. RouterA(config-if)#bandwidth 64000 C. RouterA(config)#clockrate 64000 D. RouterA(config-if)#clock rate 64 E. RouterA(config-if)#clock rate 64000 32. Which command is used to determine if an IP access list is enabled on a particular interface? A. show access-lists B. show interface C. show ip interface D. show interface access-lists 33. Which command is used to upgrade an IOS on a Cisco router? A. copy tftp run B. copy tftp start C. config net D. copy tftp flash 10089.book Page xxxvii Monday, July 23, 2007 3:17 PM
  • 38. xxxviii Answers to Assessment Test Answers to Assessment Test 1. A. Network Control Protocol is used to help identify the Network layer protocol used in the packet. See Chapter 14 for more information. 2. D. Each device has 10Mpbs to the server. See Chapter 8 for more information. 3. A. You should have only one root bridge per network. See Chapter 8 for more information. 4. C. The command line console 0 places you at a prompt where you can then set your con- sole user-mode password. See Chapter 4 for more information. 5. D. An IPv6 address is 128 bits long, compared to an IPv4 address, which is only 32 bits long. See Chapter 13 for more information. 6. C. Link Control Protocol in the PPP stack provides dynamic addressing, authentication, and multilink. See Chapter 14 for more information. 7. B. The show interface command shows the line, protocol, DLCI, and LMI information of an interface. See Chapter 14 for more information. 8. A. 256 – 192 = 64. 64 + 64 = 128. 128 + 64 = 192. The subnet is 128, the broadcast address is 191, and the valid host range is the numbers in between, or 129–190. See Chapter 3 for more information. 9. B. The passive command, short for passive-interface, stops regular updates from being sent out an interface. However, the interface can still receive updates. See Chapter 6 for more information. 10. C. ICMP is the protocol at the Network layer that is used to send echo requests and replies. See Chapter 2 for more information. 11. D. Layer 2 switching creates individual collision domains. See Chapter 1 for more information. 12. C. The command line vty 0 4 places you in a prompt that will allow you to set or change your Telnet password. See Chapter 4 for more information. 13. B. To see the contents of all access lists, use the show access-lists command. See Chapter 10 for more information. 14. C. VLANs break up broadcast domains at layer 2. See Chapter 9 for more information. 15. A. The command erase startup-config deletes the configuration stored in NVRAM. See Chapter 4 for more information. 16. C. ICMP is the protocol at the Network layer that is used to send messages back to an originating router. See Chapter 2 for more information. 17. A. Class A addressing provides 24 bits for host addressing. See Chapter 3 for more information. 18. B. Every 2 seconds, BPDUs are sent out from all active bridge ports by default. See Chapter 7 for more information. 10089.book Page xxxviii Monday, July 23, 2007 3:17 PM
  • 39. Answers to Assessment Test xxxix 19. D. Switches do not propagate VLAN information by default; you must configure the VTP domain. VLAN Trunking Protocol (VTP) is used to propagate VLAN information across a trunk link. See Chapter 9 for more information. 20. C. IEEE 802.11B is 2.4GHz, but with a maximum of only 11Mbps. IEEE 802.11G is in the 2.4GHz range, with a top speed of 54Mbps. See Chapter 12 for more information. 21. A. By default, switches break up collision domains but are one large broadcast domain. See Chapter 1 for more information. 22. D. Port Address Translation (PAT) allows a one-to-many approach to network address trans- lation. See Chapter 11 for more information. 23. C, D. VTP is not right because it has nothing to do with trunking except that it sends VLAN information across a trunk link. 802.1Q and ISL are used to configure trunking on a port. See Chapter 9 for more information. 24. D. Stub networks have only one connection to an internetwork. Only default routes can be set on a stub network or network loops may occur. See Chapter 7 for more information. 25. B. Hubs regenerate electrical signals, which are specified at the Physical layer. See Chapter 1 for more information. 26. A, C. Standardandextendedaccesscontrollists(ACLs)areusedtoconfiguresecurityonarouter. See Chapter 10 for more information. 27. D. The command copy flash tftp will prompt you to back up an existing IOS in flash to a TFTP host. See Chapter 5 for more information. 28. B. The command to back up the configuration on a router is copy running-config startup-config. See Chapter 5 for more information. 29. C. The primary reason the OSI model was created was so that different networks could inter- operate. See Chapter 1 for more information. 30. C. User Datagram Protocol is a connection network service at the Transport layer, and DHCP uses this connectionless service. See Chapter 2 for more information. 31. E. The clock rate command is two words, and the speed of the line is in bps. See Chapter 4 for more information. 32. C. The show ip interface command will show you if any outbound or inbound interfaces have an access list set. See Chapter 10 for more information. 33. D. The copy tftp flash command places a new file in flash memory, which is the default location for the Cisco IOS in Cisco routers. See Chapter 9 for more information. 10089.book Page xxxix Monday, July 23, 2007 3:17 PM
  • 40. 10089.book Page xl Monday, July 23, 2007 3:17 PM
  • 41. Chapter 1 Internetworking THE CCNA EXAM TOPICS COVERED IN THIS CHAPTER INCLUDE THE FOLLOWING: Describe how a network works Describe the purpose and functions of various network devices Select the components required to meet a network specification Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network Describe common networked applications including web applications Describe the purpose and basic operation of the protocols in the OSI and TCP models Describe the impact of applications (Voice Over IP and Video Over IP) on a network Interpret network diagrams Describe the components required for network and Internet communications Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach Differentiate between LAN/WAN operation and features Configure, verify and troubleshoot a switch with VLANs and interswitch communications Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts Explain the technology and media access control method for Ethernet networks Explain network segmentation and basic traffic management concepts 10089.book Page 1 Monday, July 23, 2007 3:17 PM
  • 42. Implement an IP addressing scheme and IP Services to meet network requirements in a medium-size Enterprise branch office network Explain the operation and benefits of using DHCP and DNS Configure, verify, and troubleshoot basic router operation and routing on Cisco devices Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts 10089.book Page 2 Monday, July 23, 2007 3:17 PM
  • 43. Welcome to the exciting world of internetworking. This first chapter will really help you understand the basics of internet- working by focusing on how to connect networks together using Cisco routers and switches. First, you need to know exactly what an internetwork is, right? You create an internetwork when you connect two or more LANs or WANs via a router and configure a logical network addressing scheme with a protocol such as IP. I’ll be covering these four topics in this chapter: Internetworking basics Network segmentation How bridges, switches, and routers are used to physically segment a network How routers are employed to create an internetwork I’m also going to dissect the Open Systems Interconnection (OSI) model and describe each part to you in detail because you really need a good grasp of it for the solid founda- tion you’ll build your networking knowledge upon. The OSI model has seven hierarchical layers that were developed to enable different networks to communicate reliably between disparate systems. Since this book is centering upon all things CCNA, it’s crucial for you to understand the OSI model as Cisco sees it, so that’s how I’ll be presenting the seven layers to you. Since there are a bunch of different types of devices specified at the different layers of the OSI model, it’s also very important to understand the many types of cables and connectors used for connecting all those devices to a network. We’ll go over cabling Cisco devices, dis- cussing how to connect to a router or switch (along with Ethernet LAN technologies) and even how to connect a router or switch with a console connection. We’ll finish the chapter by discussing the three-layer hierarchical model that was developed by Cisco to help you design, implement, and troubleshoot internetworks. After you finish reading this chapter, you’ll encounter 20 review questions and four written labs. These are given to you to really lock the information from this chapter into your memory. So don’t skip them! To find up to the minute updates for this chapter, please see www.lammle.com and/or www.sybex.com. 10089.book Page 3 Monday, July 23, 2007 3:17 PM
  • 44. 4 Chapter 1 Internetworking Internetworking Basics Before we explore internetworking models and the specifications of the OSI reference model, you’ve got to understand the big picture and learn the answer to the key question, Why is it so important to learn Cisco internetworking? Networks and networking have grown exponentially over the last 15 years—understandably so. They’ve had to evolve at light speed just to keep up with huge increases in basic mission- critical user needs such as sharing data and printers as well as more advanced demands such as videoconferencing. Unless everyone who needs to share network resources is located in the same office area (an increasingly uncommon situation), the challenge is to connect the sometimes many relevant networks together so all users can share the networks’ wealth. Starting with a look at Figure 1.1, you get a picture of a basic LAN network that’s con- nected together using a hub. This network is actually one collision domain and one broadcast domain—but no worries if you have no idea what this means because I’m going to talk about both collision and broadcast domains so much throughout this whole chapter, you’ll probably even dream about them! F I G U R E 1 . 1 The basic network Okay, about Figure 1.1… How would you say the PC named Bob communicates with the PC named Sally? Well, they’re both on the same LAN connected with a multiport repeater (a hub). So does Bob just send out a data message, “Hey Sally, you there?” or does Bob use Sally’s IP address and put things more like, “Hey 192.168.0.3, are you there?” Hopefully, you picked the IP address option, but even if you did, the news is still bad—both answers are wrong! Why? Because Bob is actually going to use Sally’s MAC address (known as a hardware address), which is burned right into the network card of Sally’s PC, to get ahold of her. Great, but how does Bob get Sally’s MAC address since Bob knows only Sally’s name and doesn’t even have her IP address yet? Bob is going to start with name resolution (hostname to The basic network allows devices to share information. The term computer language refers to binary code (0s or 1s). The two hosts above communicate using hardware or MAC addresses. (Hub) Bob Sally 10089.book Page 4 Monday, July 23, 2007 3:17 PM
  • 45. Internetworking Basics 5 IP address resolution), something that’s usually accomplished using Domain Name Service (DNS). And of note, if these two are on the same LAN, Bob can just broadcast to Sally asking her for the information (no DNS needed)—welcome to Microsoft Windows (Vista included)! Here’s an output from a network analyzer depicting a simple name resolution process from Bob to Sally: Time Source Destination Protocol Info 53.892794 192.168.0.2 192.168.0.255 NBNS Name query NB SALLY00 As I already mentioned, since the two hosts are on a local LAN, Windows (Bob) will just broadcast to resolve the name Sally (the destination 192.168.0.255 is a broadcast address). Let’s take a look at the rest of the information: EthernetII,Src:192.168.0.2(00:14:22:be:18:3b),Dst:Broadcast (ff:ff:ff:ff:ff:ff) What this output shows is that Bob knows his own MAC address and source IP address but not Sally’s IP address or MAC address, so Bob sends a broadcast address of all fs for the MAC address (a Data Link layer broadcast) and an IP LAN broadcast of 192.168.0.255. Again, don’t freak—you’re going to learn all about broadcasts in Chapter 3, “Subnetting, Variable Length Subnet Masks (VLSMs), and Troubleshooting TCP/IP.” Before the name is resolved, the first thing Bob has to do is broadcast on the LAN to get Sally’s MAC address so he can communicate to her PC and resolve her name to an IP address: Time Source Destination Protocol Info 5.153054 192.168.0.2 Broadcast ARP Who has 192.168.0.3? Tell 192.168.0.2 Next, check out Sally’s response: Time Source Destination Protocol Info 5.153403 192.168.0.3 192.168.0.2 ARP 192.168.0.3 is at 00:0b:db:99:d3:5e 5.53.89317 192.168.0.3 192.168.0.2 NBNS Name query response NB 192.168.0.3 Okay sweet— Bob now has both Sally’s IP address and her MAC address! These are both listed as the source address at this point because this information was sent from Sally back to Bob. So, finally, Bob has all the goods he needs to communicate with Sally. And just so you know, I’m going to tell you all about ARP and show you exactly how Sally’s IP address was resolved to a MAC address a little later in Chapter 6, “IP Routing.” By the way, I want you to understand that Sally still had to go through the same resolution processes to communicate back to Bob—sounds crazy, huh? Consider this a welcome to IPv4 and basic networking with Windows (and we haven’t even added a router yet!). To complicate things further, it’s also likely that at some point you’ll have to break up one large network into a bunch of smaller ones because user response will have dwindled to a slow crawl as the network grew and grew. And with all that growth, your LAN’s traffic congestion has reached epic proportions. The answer to this is breaking up a really big network into a number of smaller 10089.book Page 5 Monday, July 23, 2007 3:17 PM
  • 46. 6 Chapter 1 Internetworking ones—something callednetwork segmentation. You do this by using devices likerouters, switches, and bridges. Figure 1.2 displays a network that’s been segmented with a switch so each network segment connected to the switch is now a separate collision domain. But make note of the fact that this network is still one broadcast domain. F I G U R E 1 . 2 A switch can replace the hub, breaking up collision domains. Keep in mind that the hub used in Figure 1.2 just extended the one collision domain from the switch port. Here’s a list of some of the things that commonly cause LAN traffic congestion: Too many hosts in a broadcast domain Broadcast storms Multicasting Low bandwidth Adding hubs for connectivity to the network A bunch of ARP or IPX traffic (IPX is a Novell protocol that is like IP, but really, really chatty. Typically not used in today’s networks.) Take another look at Figure 1.2—did you notice that I replaced the main hub from Figure 1.1 with a switch? Whether you did or didn’t, the reason I did that is because hubs don’t segment a net- work;theyjustconnectnetworksegmentstogether.Sobasically,it’saninexpensivewaytoconnect a couple of PCs together, which is great for home use and troubleshooting, but that’s about it! Now routers are used to connect networks together and route packets of data from one network to another. Cisco became the de facto standard of routers because of its high-quality router products, great selection, and fantastic service. Routers, by default, break up a broad- cast domain—the set of all devices on a network segment that hear all the broadcasts sent on that segment. Figure 1.3 shows a router in our little network that creates an internetwork and breaks up broadcast domains. (Hub) Switch 10089.book Page 6 Monday, July 23, 2007 3:17 PM
  • 47. 8 Chapter 1 Internetworking frames, routers (layer 3 switches) use logical addressing and provide what is called packet switching. Routers can also provide packet filtering by using access lists, and when routers connect two or more networks together and use logical addressing (IP or IPv6), this is called an internetwork. Last, routers use a routing table (map of the internetwork) to make path selections and to forward packets to remote networks. Conversely, switches aren’t used to create internetworks (they do not break up broadcast domains by default); they’re employed to add functionality to a network LAN. The main pur- pose of a switch is to make a LAN work better—to optimize its performance—providing more bandwidth for the LAN’s users. And switches don’t forward packets to other networks as routers do. Instead, they only “switch” frames from one port to another within the switched network. Okay, you may be thinking, “Wait a minute, what are frames and packets?” I’ll tell you all about them later in this chapter, I promise! By default, switches break up collision domains. This is an Ethernet term used to describe a network scenario wherein one particular device sends a packet on a network segment, forc- ing every other device on that same segment to pay attention to it. At the same time, a different device tries to transmit, leading to a collision, after which both devices must retransmit, one at a time. Not very efficient! This situation is typically found in a hub environment where each host segment connects to a hub that represents only one collision domain and only one broad- cast domain. By contrast, each and every port on a switch represents its own collision domain. Switches create separate collision domains but a single broadcast domain. Routers provide a separate broadcast domain for each interface. The term bridging was introduced before routers and hubs were implemented, so it’s pretty common to hear people referring to bridges as switches. That’s because bridges and switches basically do the same thing—break up collision domains on a LAN (in reality, you cannot buy a physical bridge these days, only LAN switches, but they use bridging technologies, so Cisco still calls them multiport bridges). So what this means is that a switch is basically just a multiple-port bridge with more brain- power, right? Well, pretty much, but there are differences. Switches do provide this function, but they do so with greatly enhanced management ability and features. Plus, most of the time, bridges only had 2 or 4 ports. Yes, you could get your hands on a bridge with up to 16 ports, but that’s nothing compared to the hundreds available on some switches! You would use a bridge in a network to reduce collisions within broadcast domains and to increase the number of collision domains in your network. Doing this provides more bandwidth for users. And keep in mind that using hubs in your network can contribute to congestion on your Ethernet network. As always, plan your network design carefully! Figure 1.4 shows how a network would look with all these internetwork devices in place. Remember that the router will not only break up broadcast domains for every LAN interface, it will break up collision domains as well. 10089.book Page 8 Monday, July 23, 2007 3:17 PM
  • 48. Internetworking Basics 9 F I G U R E 1 . 4 Internetworking devices When you looked at Figure 1.4, did you notice that the router is found at center stage and that it connects each physical network together? We have to use this layout because of the older technologies involved–—bridges and hubs. On the top internetwork in Figure 1.4, you’ll notice that a bridge was used to connect the hubs to a router. The bridge breaks up collision domains, but all the hosts connected to both hubs are still crammed into the same broadcast domain. Also, the bridge only created two collision domains, so each device connected to a hub is in the same collision domain as every other device connected to that same hub. This is actually pretty lame, but it’s still better than having one collision domain for all hosts. Notice something else: The three hubs at the bottom that are connected also connect to the router, creating one collision domain and one broadcast domain. This makes the bridged net- work look much better indeed! Although bridges/switches are used to segment networks, they will not iso- late broadcast or multicast packets. Router Bridge Switch 10089.book Page 9 Monday, July 23, 2007 3:17 PM
  • 49. Internetworking Basics 7 F I G U R E 1 . 3 Routers create an internetwork. The network in Figure 1.3 is a pretty cool network. Each host is connected to its own collision domain, and the router has created two broadcast domains. And don’t forget that the router pro- vides connections to WAN services as well! The router uses something called a serial interface for WAN connections, specifically, a V.35 physical interface on a Cisco router. Breaking up a broadcast domain is important because when a host or server sends a network broadcast, every device on the network must read and process that broadcast—unless you’ve got a router. When the router’s interface receives this broadcast, it can respond by basically saying, “Thanks, but no thanks,” and discard the broadcast without forwarding it on to other net- works. Even though routers are known for breaking up broadcast domains by default, it’s important to remember that they break up collision domains as well. There are two advantages of using routers in your network: They don’t forward broadcasts by default. They can filter the network based on layer 3 (Network layer) information (e.g., IP address). Four router functions in your network can be listed as follows: Packet switching Packet filtering Internetwork communication Path selection Remember that routers are really switches; they’re actually what we call layer 3 switches (we’ll talk about layers later in this chapter). Unlike layer 2 switches, which forward or filter A router creates an internetwork and provides connections to WAN services. Switch Switch Serial 0 10089.book Page 7 Monday, July 23, 2007 3:17 PM
  • 50. 10 Chapter 1 Internetworking The best network connected to the router is the LAN switch network on the left. Why? Because each port on that switch breaks up collision domains. But it’s not all good—all devices are still in the same broadcast domain. Do you remember why this can be a really bad thing? Because all devices must listen to all broadcasts transmitted, that’s why. And if your broadcast domains are too large, the users have less bandwidth and are required to process more broad- casts, and network response time will slow to a level that could cause office riots. Once we have only switches in our network, things change a lot! Figure 1.5 shows the net- work that is typically found today. F I G U R E 1 . 5 Switched networks creating an internetwork Okay, here I’ve placed the LAN switches at the center of the network world so the routers are connecting only logical networks together. If I implemented this kind of setup, I’ve created virtual LANs (VLANs), something I’m going to tell you about in Chapter 9, “Virtual LANs (VLANs).” So don’t stress. But it is really important to understand that even though you have a switched network, you still need a router to provide your inter-VLAN communication, or internetworking. Don’t forget that! Obviously, the best network is one that’s correctly configured to meet the business require- ments of the company it serves. LAN switches with routers, correctly placed in the network, are the best network design. This book will help you understand the basics of routers and switches so you can make tight, informed decisions on a case-by-case basis. Let’s go back to Figure 1.4 again. Looking at the figure, how many collision domains and broadcast domains are in this internetwork? Hopefully, you answered nine collision domains and three broadcast domains! The broadcast domains are definitely the easiest to see because only routers break up broadcast domains by default. And since there are three connections, that gives you three broadcast domains. But do you see the nine collision domains? Just in case that’s a no, I’ll explain. The all-hub network is one collision domain; the bridge network equals three collision domains. Add in the switch network of five collision domains—one for each switch port—and you’ve got a total of nine. Router 10089.book Page 10 Monday, July 23, 2007 3:17 PM
  • 51. Internetworking Models 11 Now, in Figure 1.5, each port on the switch is a separate collision domain and each VLAN is a separate broadcast domain. But you still need a router for routing between VLANs. How many collision domains do you see here? I’m counting 10—remember that connections between the switches are considered a collision domain! So now that you’ve gotten an introduction to internetworking and the various devices that live in an internetwork, it’s time to head into internetworking models. Internetworking Models When networks first came into being, computers could typically communicate only with comput- ers from the same manufacturer. For example, companies ran either a complete DECnet solution or an IBM solution—not both together. In the late 1970s, theOpen Systems Interconnection (OSI) reference model was created by the International Organization for Standardization (ISO) to break this barrier. The OSI model was meant to help vendors create interoperable network devices and soft- ware in the form of protocols so that different vendor networks could work with each other. Like world peace, it’ll probably never happen completely, but it’s still a great goal. The OSI model is the primary architectural model for networks. It describes how data and network information are communicated from an application on one computer through the network media to an application on another computer. The OSI reference model breaks this approach into layers. Should I Just Replace All My Hubs with Switches? You’re a network administrator at a large company in San Jose. The boss comes to you and says that he got your requisition to buy a switch and is not sure about approving the expense; do you really need it? Well, if you can, sure—why not? Switches really add a lot of functionality to a network that hubs just don’t have. But most of us don’t have an unlimited budget. Hubs still can create a nice network—that is, of course, if you design and implement the network correctly. Let’s say that you have 40 users plugged into four hubs, 10 users each. At this point, the hubs are all connected together so that you have one large collision domain and one large broad- cast domain. If you can afford to buy just one switch and plug each hub into a switch port, as well as plug the servers into the switch, then you now have four collision domains and one broadcast domain. Not great, but for the price of one switch, your network is a much better thing. So, go ahead! Put that requisition in to buy all new switches. What do you have to lose? 10089.book Page 11 Monday, July 23, 2007 3:17 PM
  • 52. 12 Chapter 1 Internetworking In the following section, I am going to explain the layered approach and how we can use this approach to help us troubleshoot our internetworks. The Layered Approach A reference model is a conceptual blueprint of how communications should take place. It addresses all the processes required for effective communication and divides these processes into logical groupings called layers. When a communication system is designed in this manner, it’s known as layered architecture. Think of it like this: You and some friends want to start a company. One of the first things you’ll do is sit down and think through what tasks must be done, who will do them, the order in which they will be done, and how they relate to each other. Ultimately, you might group these tasks into departments. Let’s say you decide to have an order-taking department, an inventory department, and a shipping department. Each of your departments has its own unique tasks, keeping its staff members busy and requiring them to focus on only their own duties. In this scenario, I’m using departments as a metaphor for the layers in a communication system. For things to run smoothly, the staff of each department will have to trust and rely heavily upon the others to do their jobs and competently handle their unique responsibilities. In your planning sessions, you would probably take notes, recording the entire process to facil- itate later discussions about standards of operation that will serve as your business blueprint, or reference model. Once your business is launched, your department heads, each armed with the part of the blueprint relating to their own department, will need to develop practical methods to imple- ment their assigned tasks. These practical methods, or protocols, will need to be compiled into a standard operating procedures manual and followed closely. Each of the various procedures in your manual will have been included for different reasons and have varying degrees of importance and implementation. If you form a partnership or acquire another company, it will be imperative that its business protocols—its business blueprint—match yours (or at least be compatible with it). Similarly, software developers can use a reference model to understand computer com- munication processes and see what types of functions need to be accomplished on any one layer. If they are developing a protocol for a certain layer, all they need to concern them- selves with is that specific layer’s functions, not those of any other layer. Another layer and protocol will handle the other functions. The technical term for this idea is binding. The communication processes that are related to each other are bound, or grouped together, at a particular layer. Advantages of Reference Models The OSI model is hierarchical, and the same benefits and advantages can apply to any layered model. The primary purpose of all such models, especially the OSI model, is to allow different vendors’ networks to interoperate. 10089.book Page 12 Monday, July 23, 2007 3:17 PM
  • 53. The OSI Reference Model 13 Advantages of using the OSI layered model include, but are not limited to, the following: It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting. It allows multiple-vendor development through standardization of network components. It encourages industry standardization by defining what functions occur at each layer of the model. It allows various types of network hardware and software to communicate. It prevents changes in one layer from affecting other layers, so it does not hamper development. The OSI Reference Model One of the greatest functions of the OSI specifications is to assist in data transfer between dis- parate hosts—meaning, for example, that they enable us to transfer data between a Unix host and a PC or a Mac. The OSI isn’t a physical model, though. Rather, it’s a set of guidelines that application developers can use to create and implement applications that run on a network. It also pro- vides a framework for creating and implementing networking standards, devices, and inter- networking schemes. The OSI has seven different layers, divided into two groups. The top three layers define how the applications within the end stations will communicate with each other and with users. The bottom four layers define how data is transmitted end to end. Figure 1.6 shows the three upper layers and their functions, and Figure 1.7 shows the four lower layers and their functions. F I G U R E 1 . 6 The upper layers • Provides a user interface • Presents data • Handles processing such as encryption • Keeps different applications’ • data separate Application Presentation Session Transport Network Data Link Physical 10089.book Page 13 Monday, July 23, 2007 3:17 PM
  • 54. 14 Chapter 1 Internetworking When you study Figure 1.6, understand that the user interfaces with the computer at the Application layer and also that the upper layers are responsible for applications communicat- ing between hosts. Remember that none of the upper layers knows anything about networking or network addresses. That’s the responsibility of the four bottom layers. In Figure 1.7, you can see that it’s the four bottom layers that define how data is transferred through a physical wire or through switches and routers. These bottom layers also determine how to rebuild a data stream from a transmitting host to a destination host’s application. F I G U R E 1 . 7 The lower layers The following network devices operate at all seven layers of the OSI model: Network management stations (NMSs) Web and application servers Gateways (not default gateways) Network hosts Basically, the ISO is pretty much the Emily Post of the network protocol world. Just as Ms. Post wrote the book setting the standards—or protocols—for human social interaction, the ISO developed the OSI reference model as the precedent and guide for an open network pro- tocol set. Defining the etiquette of communication models, it remains today the most popular means of comparison for protocol suites. The OSI reference model has seven layers: Application layer (layer 7) Presentation layer (layer 6) Session layer (layer 5) Transport layer (layer 4) Network layer (layer 3) Data Link layer (layer 2) Physical layer (layer 1) • Combines packets into bytes and bytes into frames • Provides access to media using MAC address • Performs error detection not correction • Provides logical addressing, • which routers use for path determination • Provides reliable or unreliable delivery • Performs error correction before retransmit • Moves bits between devices • Specifies voltage, wire speed, • and pin-out of cables Transport Network Data Link Physical 10089.book Page 14 Monday, July 23, 2007 3:17 PM
  • 55. The OSI Reference Model 15 Figure 1.8 shows a summary of the functions defined at each layer of the OSI model. With this in hand, you’re now ready to explore each layer’s function in detail. F I G U R E 1 . 8 Layer functions The Application Layer The Application layer of the OSI model marks the spot where users actually communicate to the computer. This layer only comes into play when it’s apparent that access to the network is going to be needed soon. Take the case of Internet Explorer (IE). You could uninstall every trace of networking components from a system, such as TCP/IP, NIC card, and so on, and you could still use IE to view a local HTML document—no problem. But things would definitely get messy if you tried to do something like view an HTML document that must be retrieved using HTTP or nab a file with FTP or TFTP. That’s because IE will respond to requests such as those by attempting to access the Application layer. And what’s happening is that the Appli- cation layer is acting as an interface between the actual application program—which isn’t at all a part of the layered structure—and the next layer down by providing ways for the appli- cation to send information down through the protocol stack. In other words, IE doesn’t truly reside within the Application layer—it interfaces with Application layer protocols when it needs to deal with remote resources. The Application layer is also responsible for identifying and establishing the availability of the intended communication partner and determining whether sufficient resources for the intended communication exist. These tasks are important because computer applications sometimes require more than only desktop resources. Often, they’ll unite communicating components from more than one network application. Prime examples are file transfers and email, as well as enabling remote access, network management activities, client/server processes, and information location. Many network applications provide services for communication over enterprise networks, but for present and future internetworking, the need is fast developing to reach beyond the limits of current physical networking. 10089.book Page 15 Monday, July 23, 2007 3:17 PM
  • 56. 16 Chapter 1 Internetworking It’s important to remember that the Application layer is acting as an interface between the actual application programs. This means that Microsoft Word, for example, does not reside at the Application layer but instead interfaces with the Application layer protocols. Chapter 2 will present some programs that actually reside at the Application layer—for example, FTP and TFTP. The Presentation Layer The Presentation layer gets its name from its purpose: It presents data to the Application layer and is responsible for data translation and code formatting. This layer is essentially a translator and provides coding and conversion functions. A suc- cessful data-transfer technique is to adapt the data into a standard format before transmission. Computers are configured to receive this generically formatted data and then convert the data back into its native format for actual reading (for example, EBCDIC to ASCII). By providing translation services, the Presentation layer ensures that data transferred from the Application layer of one system can be read by the Application layer of another one. The OSI has protocol standards that define how standard data should be formatted. Tasks like data compression, decompression, encryption, and decryption are associated with this layer. Some Presentation layer standards are involved in multimedia operations too. The Session Layer The Session layer is responsible for setting up, managing, and then tearing down sessions between Presentation layer entities. This layer also provides dialog control between devices, or nodes. It coordinates communication between systems and serves to organize their communication by offering three different modes: simplex, half duplex, and full duplex. To sum up, the Session layer basically keeps different applications’ data separate from other applications’ data. The Transport Layer The Transport layer segments and reassembles data into a data stream. Services located in the Transport layer segment and reassemble data from upper-layer applications and unite it into the same data stream. They provide end-to-end data transport services and can establish a logical connection between the sending host and destination host on an internetwork. Some of you are probably familiar with TCP and UDP already. (But if you’re not, no wor- ries—I’ll tell you all about them in Chapter 2.) If so, you know that both work at the Transport layer and that TCP is a reliable service and UDP is not. This means that application developers have more options because they have a choice between the two protocols when working with TCP/IP protocols. 10089.book Page 16 Monday, July 23, 2007 3:17 PM
  • 57. The OSI Reference Model 17 The Transport layer is responsible for providing mechanisms for multiplexing upper-layer applications, establishing sessions, and tearing down virtual circuits. It also hides details of any network-dependent information from the higher layers by providing transparent data transfer. The term reliable networking can be used at the Transport layer. It means that acknowledgments, sequencing, and flow control will be used. The Transport layer can be connectionless or connection-oriented. However, Cisco is mostly concerned with you understanding the connection-oriented portion of the Transport layer. The following sections will provide the skinny on the connection-oriented (reliable) pro- tocol of the Transport layer. Flow Control Data integrity is ensured at the Transport layer by maintaining flow control and by allowing users to request reliable data transport between systems. Flow control prevents a sending host on one side of the connection from overflowing the buffers in the receiving host—an event that can result in lost data. Reliable data transport employs a connection-oriented communications session between systems, and the protocols involved ensure that the following will be achieved: The segments delivered are acknowledged back to the sender upon their reception. Any segments not acknowledged are retransmitted. Segments are sequenced back into their proper order upon arrival at their destination. A manageable data flow is maintained in order to avoid congestion, overloading, and data loss. The purpose of flow control is to provide a means for the receiver to govern the amount of data sent by the sender. Connection-Oriented Communication In reliable transport operation, a device that wants to transmit sets up a connection-oriented communication with a remote device by creating a session. The transmitting device first estab- lishes a connection-oriented session with its peer system, which is called a call setup or a three- way handshake. Data is then transferred; when the transfer is finished, a call termination takes place to tear down the virtual circuit. Figure 1.9 depicts a typical reliable session taking place between sending and receiving sys- tems. Looking at it, you can see that both hosts’ application programs begin by notifying their individual operating systems that a connection is about to be initiated. The two operating sys- tems communicate by sending messages over the network confirming that the transfer is approved and that both sides are ready for it to take place. After all of this required synchro- nization takes place, a connection is fully established and the data transfer begins (this virtual circuit setup is called overhead!). 10089.book Page 17 Monday, July 23, 2007 3:17 PM