Your SlideShare is downloading. ×
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
(Ebook   pdf) sybex - ccna 2.0 study guide (640-507)
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

(Ebook pdf) sybex - ccna 2.0 study guide (640-507)

10,319

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
10,319
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
242
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. CCNA Cisco Certified Network Associate Study GuideCopyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 2. CCNA™ Cisco Certified ®Network Associate Study Guide Second Edition Todd Lammle San Francisco • Paris • Düsseldorf • Soest • LondonCopyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 3. Associate Publisher: Neil EddeContracts and Licensing Manager: Kristine O’CallaghanAcquisitions & Developmental Editor: Linda LeeEditors: Susan Berge, Sally Engelfried, Rebecca Rider, and Marilyn SmithProduction Editor: Lisa DuranTechnical Editors: Patrick Ramseier and Eric GunnettBook Designer: Bill GibsonGraphic Illustrator: Tony JonickElectronic Publishing Specialist: Maureen Forys, Happenstance Type-O-RamaProofreaders: Molly Glover, Jennifer Campbell, Laurie O’Connell, and Camera ObscuraIndexer: Matthew SpenceCD Coordinator: Kara SchwartzCD Technician: Keith McNeilCover Designer: Archer DesignCover Photographer: Tony StoneSYBEX and the SYBEX logo are trademarks of SYBEX Inc. in the USA and other countries.The CD interface was created using Macromedia Director, COPYRIGHT 1994, 1997-1999 Macromedia Inc. For moreinformation on Macromedia and Macromedia Director, visit http://www.macromedia.com.This study guide and/or material is not sponsored by, endorsed by or affiliated with Cisco Systems, Inc. Catalyst®, Cisco®,Cisco Systems®, Cisco® IOS, Cisco Systems Networkng Academy™, CCDA™, CCNA™, CCDP™, CCNP™, CCIE™,CCSI™, the Cisco Systems logo and the CCIE logo are trademarks or registered trademarks of Cisco Systems, Inc. in theUnited States and certain other countries. All other trademarks are trademarks of their respective owners.TRADEMARKS: SYBEX has attempted throughout this book to distinguish proprietary trademarks from descriptive termsby following the capitalization style used by the manufacturer.The author and publisher have made their best efforts to prepare this book, and the content is based upon final release soft-ware whenever possible. Portions of the manuscript may be based upon pre-release versions supplied by software manu-facturer(s). The author and the publisher make no representation or warranties of any kind with regard to the completenessor accuracy of the contents herein and accept no liability of any kind including but not limited to performance, merchant-ability, fitness for any particular purpose, or any losses or damages of any kind caused or alleged to be caused directly orindirectly from this book.First edition copyright © 1999 SYBEX Inc.Copyright © 2000 SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501. World rights reserved. No part of thispublication may be stored in a retrieval system, transmitted, or reproduced in any way, including but not limited to photo-copy, photograph, magnetic, or other record, without the prior agreement and written permission of the publisher.Library of Congress Card Number: 00-102850ISBN: 0-7821-2647-2Manufactured in the United States of America10 9 8 7 6 5 4 3 2 1 Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 4. Software License Agreement: Terms and ConditionsThe media and/or any online materials accompanying this book available from SYBEX in any other form or media than thatthat are available now or in the future contain programs and/or enclosed herein or posted to www.sybex.com. If you discover atext files (the "Software") to be used in connection with the defect in the media during this warranty period, you may obtainbook. SYBEX hereby grants to you a license to use the Software, a replacement of identical format at no charge by sending thesubject to the terms that follow. Your purchase, acceptance, or defective media, postage prepaid, with proof of purchase to:use of the Software will constitute your acceptance of suchterms. SYBEX Inc.The Software compilation is the property of SYBEX unless Customer Service Departmentotherwise indicated and is protected by copyright to SYBEX or 1151 Marina Village Parkwayother copyright owner(s) as indicated in the media files (the Alameda, CA 94501"Owner(s)"). You are hereby granted a single-user license to use (510) 523-8233the Software for your personal, noncommercial use only. You Fax: (510) 523-2373may not reproduce, sell, distribute, publish, circulate, or com- e-mail: info@sybex.commercially exploit the Software, or any portion thereof, without WEB: HTTP://WWW.SYBEX.COMthe written consent of SYBEX and the specific copyrightowner(s) of any component software included on this media. After the 90-day period, you can obtain replacement media ofIn the event that the Software or components include specific identical format by sending us the defective disk, proof of pur-license requirements or end-user agreements, statements of chase, and a check or money order for $10, payable to SYBEX.condition, disclaimers, limitations or warranties ("End-UserLicense"), those End-User Licenses supersede the terms and con- Disclaimerditions herein as to that particular Software component. Your SYBEX makes no warranty or representation, either expressedpurchase, acceptance, or use of the Software will constitute your or implied, with respect to the Software or its contents, quality,acceptance of such End-User Licenses. performance, merchantability, or fitness for a particular pur-By purchase, use or acceptance of the Software you further agree pose. In no event will SYBEX, its distributors, or dealers be liableto comply with all export laws and regulations of the United to you or any other party for direct, indirect, special, incidental,States as such laws and regulations may exist from time to time. consequential, or other damages arising out of the use of or inability to use the Software or its contents even if advised of theReusable Code in This Book possibility of such damage. In the event that the SoftwareThe authors created reusable code in this publication expressly includes an online update feature, SYBEX further disclaims anyfor reuse for readers. Sybex grants readers permission to reuse obligation to provide this feature for any specific duration otherfor any purpose the code found in this publication or its accom- than the initial posting.panying CD-ROM so long as all three authors are attributed in The exclusion of implied warranties is not permitted by someany application containing the reusable code, and the code itself states. Therefore, the above exclusion may not apply to you.is never sold or commercially exploited as a stand-alone product. This warranty provides you with specific legal rights; there may be other rights that you may have that vary from state to state.Software Support The pricing of the book with the Software by SYBEX reflects theComponents of the supplemental Software and any offers associ- allocation of risk and limitations on liability contained in thisated with them may be supported by the specific Owner(s) of that agreement of Terms and Conditions.material but they are not supported by SYBEX. Information regard-ing any available support may be obtained from the Owner(s) using Shareware Distributionthe information provided in the appropriate read.me files or listed This Software may contain various programs that are distributedelsewhere on the media. as shareware. Copyright laws apply to both shareware and ordi-Should the manufacturer(s) or other Owner(s) cease to offer sup- nary commercial software, and the copyright Owner(s) retainsport or decline to honor any offer, SYBEX bears no responsibil- all rights. If you try a shareware program and continue using it,ity. This notice concerning support for the Software is provided you are expected to register it. Individual programs differ onfor your information only. SYBEX is not the agent or principal details of trial periods, registration, and payment. Please observeof the Owner(s), and SYBEX is in no way responsible for pro- the requirements stated in appropriate files.viding any support for the Software, nor is it liable or responsiblefor any support provided, or not provided, by the Owner(s). Copy Protection The Software in whole or in part may or may not be copy-pro-Warranty tected or encrypted. However, in all cases, reselling or redistrib-SYBEX warrants the enclosed media to be free of physical defects uting these files without authorization is expressly forbiddenfor a period of ninety (90) days after purchase. The Software is not except as specifically provided for by the Owner(s) therein. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 5. This book is dedicated to all the Cisco Academy instructors, the unsung heroesof the training industry. They work very hard, are extremely dedicated, andmake little money teaching. Their reward is the students progressing, learning,and becoming all they can be. I salute you. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 6. Acknowledgments Creating the Acknowledgments is the most difficult part of the book- writing process. Without the help and support of many different individuals, this book, or any other book for that matter, would never be written. So, how can someone actually take a few paragraphs and thank and acknowl- edge everyone involved? I will give it a try anyway. The person I want to thank and acknowledge first is Linda Lee. She is an incredible developmental editor and really helped me develop this book’s outline. I am very happy that she was involved in the process. She worked hard on this book, and the reader now gets to reap the rewards of her labor. Neil Edde is always a shoo-in for appearing in the acknowledgments of all my books. Without Neil, I would not have written the first CCNA book, or even my first Sybex book. He was my first developmental editor, and Linda needs to thank him for working out most of my kinks before he pushed me over to her. Susan Berge and Lisa Duran did a great job of keeping up with the sched- ule and worked very hard with me to get this book shipped on time. For that, I thank them. Kudos to Patrick Ramseier and Eric Gunnett, who did a fab- ulous job of reviewing each chapter for technical accuracy. Thanks also to Sally Engelfried, Marilyn Smith, and Rebecca Rider for assisting with the editing of the chapters, and to Molly Glover, Jennifer Campbell, Laurie O’Connell, and Camera Obscura for proofreading the book. In addition, Maureen Forys deserves a thank you for putting the finishing touches on the book. And I don’t want to forget Tony Jonick. He is the artist who had to put up with my changing the figures in this book over and over again. He is very patient and does a fantastic job. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 7. Introduction Welcome to the exciting world of Cisco certification! You have picked up this book because you want something better; namely, a better job with more satisfaction. Rest assured that you have made a good decision. Cisco certification can help you get your first networking job, or more money and a promotion if you are already in the field. Cisco certification can also improve your understanding of the internet- working of more than just Cisco products: You will develop a complete understanding of networking and how different network topologies work together to form a network. This is beneficial to every networking job and is the reason Cisco certification is in such high demand, even at companies with few Cisco devices. Cisco is the king of routing and switching, the Microsoft of the internet- working world. The new Cisco certifications reach beyond the popular certifications, such as the MCSE and CNE, to provide you with an indispens- able factor in understanding today’s network—insight into the Cisco world of internetworking. By deciding that you want to become Cisco certified, you are saying that you want to be the best—the best at routing and the best at switching. This book can lead you in that direction. Cisco—A Brief History A lot of readers may already be familiar with Cisco and what they do. How- ever, those of you who are new to the field, just coming in fresh from your MCSE, and those of you who maybe have 10 or more years in the field but wish to brush up on the new technology may appreciate a little background on Cisco. In the early 1980s, Len and Sandy Bosack, a married couple who worked in different computer departments at Stanford University, were having trouble getting their individual systems to communicate (like many married people). So in their living room they created a gateway server that made it easier for their disparate computers in two different departments to commu- nicate using the IP protocol. In 1984, they founded cisco Systems (notice the small c) with a small commercial gateway server product that changed net- working forever. Some people think the name was intended to be San Fran- cisco Systems but the paper got ripped on the way to the incorporation Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 8. xxiv Introduction lawyers—who knows? In 1992, the company name was changed to Cisco Systems, Inc. The first product the company marketed was called the Advanced Gate- way Server (AGS). Then came the Mid-Range Gateway Server (MGS), the Compact Gateway Server (CGS), the Integrated Gateway Server (IGS), and the AGS+. Cisco calls these “the old alphabet soup products.” In 1993, Cisco came out with the amazing 4000 router and then created the even more amazing 7000, 2000, and 3000 series routers. These are still around and evolving (almost daily, it seems). Cisco has since become an unrivaled worldwide leader in networking for the Internet. Its networking solutions can easily connect users who work from diverse devices on disparate networks. Cisco products make it simple for people to access and transfer information without regard to differences in time, place, or platform. In the big picture, Cisco provides end-to-end networking solutions that customers can use to build an efficient, unified information infrastructure of their own or to connect to someone else’s. This is an important piece in the Internet/networking–industry puzzle because a common architecture that delivers consistent network services to all users is now a functional imperative. Because Cisco Systems offers such a broad range of networking and Internet services and capabilities, users needing regular access to their local network or the Internet can do so unhindered, making Cisco’s wares indispensable. Cisco answers this need with a wide range of hardware products that form information networks using the Cisco Internetwork Operating System (IOS) software. This software provides network services, paving the way for networked technical support and professional services to maintain and opti- mize all network operations. Along with the Cisco IOS, one of the services Cisco created to help sup- port the vast amount of hardware it has engineered is the Cisco Certified Internetwork Expert (CCIE) program, which was designed specifically to equip people to effectively manage the vast quantity of installed Cisco net- works. The business plan is simple: If you want to sell more Cisco equipment and have more Cisco networks installed, ensure that the networks you install run properly. However, having a fabulous product line isn’t all it takes to guarantee the huge success that Cisco enjoys—lots of companies with great products are now defunct. If you have complicated products designed to solve compli- cated problems, you need knowledgeable people who are fully capable of Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 9. Introduction xxv installing, managing, and troubleshooting them. That part isn’t easy, so Cisco began the CCIE program to equip people to support these complicated networks. This program, known colloquially as the Doctorate of Network- ing, has also been very successful, primarily due to its extreme difficulty. Cisco continuously monitors the program, changing it as it sees fit, to make sure that it remains pertinent and accurately reflects the demands of today’s internetworking business environments. Building upon the highly successful CCIE program, Cisco Career Certifi- cations permit you to become certified at various levels of technical profi- ciency, spanning the disciplines of network design and support. So, whether you’re beginning a career, changing careers, securing your present position, or seeking to refine and promote your position, this is the book for you!Cisco’s Network Support Certifications Cisco has created new certifications that will help you get the coveted CCIE, as well as aid prospective employers in measuring skill levels. Before these new certifications, you took only one test and were then faced with the lab, which made it difficult to succeed. With these new certifications, which add a better approach to preparing for that almighty lab, Cisco has opened doors that few were allowed through before. So, what are these new certifications and how do they help you get your CCIE? Cisco Certified Network Associate (CCNA) 2 The CCNA certification is the first in the new line of Cisco certifications, and it is a precursor to all current Cisco certifications. With the new certification programs, Cisco has created a type of stepping-stone approach to CCIE cer- tification. Now, you can become a Cisco Certified Network Associate for the meager cost of this book, plus $100 for the test. And you don’t have to stop there—you can choose to continue with your studies and achieve a higher certification, called the Cisco Certified Network Professional (CCNP). Someone with a CCNP has all the skills and knowledge he or she needs to attempt the CCIE lab. However, because no textbook can take the place of practical experience, we’ll discuss what else you need to be ready for the CCIE lab shortly. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 10. xxvi Introduction Why Become a CCNA? Cisco, not unlike Microsoft or Novell, has created the certification process to give administrators a set of skills and to equip prospective employers with a way to measure skills or match certain criteria. Becoming a CCNA can be the initial step of a successful journey toward a new, highly rewarding, and sustainable career. The CCNA program was created to provide a solid introduction not only to the Cisco Internetwork Operating System (IOS) and Cisco hardware, but also to internetworking in general, making it helpful to you in areas that are not exclusively Cisco’s. At this point in the certification process, it’s not unrealistic to imagine that future network managers—even those without Cisco equipment—could easily require Cisco certifications for their job applicants. If you make it through the CCNA and are still interested in Cisco and internetworking, you’re headed down a path to certain success. What Skills Do You Need to Become a CCNA? To meet the CCNA certification skill level, you must be able to understand or do the following: Install, configure, and operate simple-routed LAN, routed WAN, and switched LAN and LANE networks. Understand and be able to configure IP, IGRP, IPX, serial, AppleTalk, Frame Relay, IP RIP, VLANs, IPX RIP, Ethernet, and access lists. Install and/or configure a network. Optimize WAN through Internet-access solutions that reduce band- width and WAN costs, using features such as filtering with access lists, bandwidth on demand (BOD), and dial-on-demand routing (DDR). Provide remote access by integrating dial-up connectivity with tradi- tional, remote LAN-to-LAN access, as well as supporting the higher levels of performance required for new applications such as Internet commerce, multimedia, etc. How Do You Become a CCNA? The first step to becoming a CCNA is to pass one little test and—poof!— you’re a CCNA. (Don’t you wish it were that easy?) True, it’s just one test, Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 11. Introduction xxvii but you still have to possess enough knowledge to understand (and read between the lines—trust me) what the test writers are saying. I can’t stress this enough—it’s critical that you have some hands-on expe- rience with Cisco routers. If you can get ahold of some 2500 routers, you’re set. But if you can’t, we’ve worked hard to provide hundreds of configura- tion examples throughout this book to help network administrators (or peo- ple who want to become network administrators) learn what they need to know to pass the CCNA exam. One way to get the hands-on router experience you’ll need in the real world is to attend one of the seminars offered by Globalnet Training Solu- tions, Inc., which is owned and run by me. The seminars are six days long and will teach you everything you need to become a CCNA and even a CCNP. Each student gets hands-on experience by configuring at least two routers and a switch. See www.lammle.com for more information. In addition, Cyberstate University provides hands-on Cisco router courses over the Internet using the Sybex Cisco Certification series books. Go to www.cyberstateu.com for more information. And Keystone Learn- ing Systems (www.klscorp.com) offers the popular Cisco video certification series featuring me. If you are new to networking, you should take a look at CCNA JumpStart by Patrick Ciccarelli and Christina Faulkner (Sybex, 1999). This book will give you the background necessary before jumping into more advanced net- working with Cisco routers. Check out this book’s CD for a demo of the Sybex CCNA Virtual Lab e- trainer, which can give you hands-on experience working with both routers and switches. You can also check out www.routersim.com for another router simulator. In addition to this book, there are other useful ways to supplement your stud- ies for the CCNA exam. CiscoTests (http://www.networkstudyguides.com) offers an online study guide with sample questions and information about the most current release of the CCNA, CCNP, and CCIE exams. For the best practice Cisco exam questions on the market, try www.boson.com.Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 12. xxviii Introduction Cisco Certified Network Professional (CCNP) Cisco Certified Network Professional (CCNP), Cisco’s new certification, has opened up many opportunities for those individuals wishing to become Cisco-certified but lacking the training, the expertise, or the bucks to pass the notorious and often failed two-day Cisco torture lab. The new Cisco certifi- cations will truly provide exciting new opportunities for the CNE and MCSE who are unsure of how to advance to a higher level. So, you’re thinking, “Great, what do I do after passing the CCNA exam?” Well, if you want to become a CCIE in Routing and Switching (the most pop- ular certification), understand that there’s more than one path to that much- coveted CCIE certification. The first way is to continue studying and become a Cisco Certified Network Professional (CCNP), which means four more tests, in addition to the CCNA certification. The CCNP program will prepare you to understand and comprehensively tackle the internetworking issues of today and beyond—and it is not limited to the Cisco world. You will undergo an immense metamorphosis, vastly increasing your knowledge and skills through the process of obtaining these certifications. While you don’t need to be a CCNP or even a CCNA to take the CCIE lab, it’s extremely helpful if you already have these certifications. What Skills Do You Need to Become a CCNP? Cisco demands a certain level of proficiency for its CCNP certification. In addition to mastering the skills required for the CCNA, you should have the following skills for the CCNP: Installing, configuring, operating, and troubleshooting complex routed LAN, routed WAN, and switched LAN networks, along with dial-access services Understanding complex networks, such as IP, IGRP, IPX, async rout- ing, AppleTalk, extended access lists, IP RIP, route redistribution, IPX RIP, route summarization, OSPF, VLSM, BGP, serial, IGRP, Frame Relay, ISDN, ISL, X.25, DDR, PSTN, PPP, VLANs, Ethernet, ATM LANE–emulation, access lists, 802.10, FDDI, and transparent and translational bridging Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 13. Introduction xxix To meet the CCNP requirements, you must be able to perform the following: Install and/or configure a network to increase bandwidth, quicken network response times, and improve reliability and quality of service. Maximize performance through campus LANs, routed WANs, and remote access. Improve network security. Create a global intranet. Provide access security to campus switches and routers. Provide increased switching and routing bandwidth—end-to-end resiliency services. Provide custom queuing and routed priority services. How Do You Become a CCNP? After becoming a CCNA, the four exams you must take to get your CCNP are as follows: Exam 640-503: Routing This exam continues to build on the funda- mentals learned in the CCNA course. It focuses on large multiprotocol internetworks and how to manage them with access lists, queuing, tun- neling, route distribution, route maps, BGP, EIGRP, OSPF, and route summarization. Exam 640-504: Switching This exam tests your knowledge of the 1900 and 5000 series of Catalyst switches. The CCNP: Switching Study Guide (Sybex, summer 2000) covers all the objectives you need to understand to pass the Switching exam. Exam 640-506: Support This tests you on the Cisco troubleshooting skills needed for Ethernet and Token Ring LANs, IP, IPX, and AppleTalk networks, as well as ISDN, PPP, and Frame Relay networks. Exam 640-505: Remote Access This exam tests your knowledge of installing, configuring, monitoring, and troubleshooting Cisco ISDN and dial-up access products. You must understand PPP, ISDN, Frame Relay, and authentication. The CCNP: Remote Access Study Guide (Sybex, summer 2000) covers all the exam objectives.Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 14. xxx Introduction If you hate tests, you can take fewer of them by signing up for the CCNA exam and the Support exam and then taking just one more long exam called the Foundation R/S exam (640-509). Doing this also gives you your CCNP—but beware; it’s a really long test that fuses all the material listed previously into one exam. Good luck! However, by taking this exam, you get three tests for the price of two, which saves you $100 (if you pass). Some people think it’s easier to take the Foundation R/S exam because you can leverage the areas that you would score higher in against the areas in which you wouldn’t. Remember that test objectives and tests can change at any time without notice. Always check the Cisco Web site for the most up-to-date information (www.cisco.com). Cisco Certified Internetwork Expert (CCIE) You’ve become a CCNP, and now you fix your sights on getting your Cisco Certified Internetwork Expert CCIE in Routing and Switching—what do you do next? Cisco recommends that before you take the lab, you take test 640-025: Cisco Internetwork Design (CID) and the Cisco-authorized course called Installing and Maintaining Cisco Routers (IMCR). By the way, no Prometric test for IMCR exists at the time of this writing, and Cisco recom- mends a minimum of two years of on-the-job experience before taking the CCIE lab. After jumping those hurdles, you then have to pass the CCIE-R/S Exam Qualification (exam 350-001) before taking the actual lab. How Do You Become a CCIE? To become a CCIE, Cisco recommends you do the following: 1. Attend all the recommended courses at an authorized Cisco training center and pony up around $15,000–$20,000, depending on your cor- porate discount. 2. Pass the Drake/Prometric exam ($200 per exam—so hopefully, you’ll pass it the first time). 3. Pass the two-day, hands-on lab at Cisco. This costs $1,000 per lab, which many people fail two or more times. (Some never make it Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 15. Introduction xxxi through!) Also, because you can take the exam only in San Jose, Cal- ifornia; Research Triangle Park, North Carolina; Sydney, Australia; Halifax, Nova Scotia; Tokyo, Japan; or Brussels, Belgium, you might just need to add travel costs to that $1,000. Cisco has added new sites lately for the CCIE lab; it is best to check the Cisco Web site for the most current information. What Skills Do You Need to Become a CCIE? The CCIE Routing and Switching exam includes the advanced technical skills that are required to maintain optimum network performance and reliability, as well as advanced skills in supporting diverse networks that use disparate technologies. CCIEs just don’t have problems getting jobs; these experts are basically inundated with offers to work for six-figure salaries. But that’s because it isn’t easy to attain the level of capability that is mandatory for Cisco’s CCIE. For example, a CCIE has the following skills down pat: Installing, configuring, operating, and troubleshooting complex routed LAN, routed WAN, switched LAN, and ATM LANE networks, and dial-access services Diagnosing and resolving network faults Using packet/frame analysis and Cisco debugging tools Documenting and reporting the problem-solving processes used Having general LAN/WAN knowledge, including data encapsulation and layering; windowing and flow control, and their relation to delay; error detection and recovery; link-state, distance vector, and switching algorithms; management, monitoring, and fault isolation Having knowledge of a variety of corporate technologies—including major services provided by Desktop, WAN, and Internet groups—as well as the functions; addressing structures; and routing, switching, and bridging implications of each of their protocols Having knowledge of Cisco-specific technologies, including router/ switch platforms, architectures, and applications; communication servers; protocol translation and applications; configuration com- mands and system/network impact; and LAN/WAN interfaces, capa- bilities, and applications Designing, configuring, installing, and verifying voice-over-IP and voice-over-ATM networksCopyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 16. xxxii Introduction Cisco’s Network Design Certifications In addition to the network support certifications, Cisco has created another certification track for network designers. The two certifications within this track are the Cisco Certified Design Associate and Cisco Certified Design Professional certifications. If you’re reaching for the CCIE stars, we highly recommend the CCNP and CCDP certifications before attempting the lab (or attempting to advance your career). This certification will give you the knowledge to design routed LAN, routed WAN, and switched LAN and ATM LANE networks. Cisco Certified Design Associate (CCDA) To become a CCDA, you must pass the DCN (Designing Cisco Networks) exam (640-441). To pass this test, you must understand how to do the following: Design simple routed LAN, routed WAN, and switched LAN and ATM LANE networks. Use Network-layer addressing. Filter with access lists. Use and propagate VLAN. Size networks. The Sybex CCDA: Cisco Certified Design Associate Study Guide (1999) is the most cost-effective way to study for and pass your CCDA exam. Cisco Certified Design Professional (CCDP) If you’re already a CCNP and want to get your CCDP, you can simply take the CID 640-025 test. If you’re not yet a CCNP, however, you must take the CCDA, CCNA, Routing, Switching, Remote Access, and CID exams. CCDP certification skills include the following: Designing complex routed LAN, routed WAN, and switched LAN and ATM LANE networks Building upon the base level of the CCDA technical knowledge Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 17. Introduction xxxiii CCDPs must also demonstrate proficiency in the following: Network-layer addressing in a hierarchical environment Traffic management with access lists Hierarchical network design VLAN use and propagation Performance considerations: required hardware and software; switch- ing engines; memory, cost, and minimizationWhat Does This Book Cover? This book covers everything you need to know in order to become CCNA certified. However, taking the time to study and practice with routers or a router simulator is the real key to success. The information you will learn in this book, and need to know for the CCNA exam, is listed in the following bullet points: Chapter 1 introduces you to internetworking. You will learn the basics of the Open Systems Interconnection the way Cisco wants you to learn it. Also, the Cisco three-layer hierarchical model will be dis- cussed, along with how to choose Cisco equipment based on this model. Ethernet networking and standards are discussed in detail in this chapter as well. Chapter 2 gives you a background on layer-2 switching and how switches perform address learning and make forwarding and filtering decisions. Network loops and how to avoid them with the Spanning- Tree Protocol (STP) will be discussed, as well as the different LAN switch types used by Cisco switches. Chapter 3 provides you with the background necessary for success on the exam as well as in the real world by discussing TCP/IP. This in-depth chapter covers the very beginnings of the Internet Protocol stack and then goes all the way to IP addressing and subnetting. If you read this chapter carefully, you will be able to subnet a network in your head! Chapter 4 introduces you to the Cisco Internetwork Operating System (IOS). In this chapter you will learn how to turn on a router and Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 18. xxxiv Introduction configure the basics of the IOS, including setting passwords, banners, and more. IP configuration will be discussed and a hands-on lab will help you gain a firm grasp of the concepts taught in the chapter. Chapter 5 teaches you about IP routing. This is a fun chapter, because you will begin to build your network, add IP addresses, and route data between routers. You will also learn about static, default, and dynamic routing in this chapter. Written and hands-on labs will help you understand IP routing to the fullest. Chapter 6 covers Virtual LANs and how you can use them in your internetwork. This chapter also covers the nitty-gritty of VLANs and the different concepts and protocols used with VLANs. Written labs and review questions will reinforce the VLAN material. Chapter 7 provides you with the management skills needed to run a Cisco ISO network. Backing up and restoring the IOS, as well as router configuration, is covered, as are troubleshooting tools neces- sary to keep a network up and running. Chapter 8 introduces you to the wonderful world of Novell IPX. Since IPX is still around, Cisco thinks it is important to understand IPX routing. Actually, after IP routing, IPX is a breeze. Both written and hands-on labs, along with review questions, will give you the under- standing of IPX you need to pass the CCNA exam. Chapter 9 covers access lists, which are created on routers to filter the network. Both IP and IPX access lists are covered in detail. Written and hands-on labs, along with review questions, will help you study for the access-list portion of the CCNA exam. Chapter 10 concentrates on Cisco Wide Area Network protocols. This chapter covers HDLC, PPP, Frame Relay, and ISDN in depth. You must be proficient in all these protocols to be successful on the CCNA exam. Appendix A is a practice exam. If you think you are ready for the CCNA exam, see if you can get by my practice exam. A second prac- tice exam is located on the CD as well. Appendix B discusses configuring a Catalyst 1900 switch. The CCNA exam is mostly theory on layer-2 switching; however, reading the appendix, working through the written and hands-on labs, and Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 19. Introduction xxxv answering the review questions should prepare you well for the CCNA exam. Appendix C lists all the Cisco IOS commands used in this book. It is a great reference if you need to look up what a certain command does and is used for. The Glossary is a handy resource for Cisco terms. This is a great tool for understanding some of the more obscure terms used in this book.Where Do You Take the Exams? You may take the exams at any of the more than 800 Sylvan Prometric Authorized Testing Centers around the world. For the location of a testing center near you, call (800) 755-3926. Outside the United States and Canada, contact your local Sylvan Prometric Registration Center. To register for a Cisco Certified Network Professional exam: 1. Determine the number of the exam you want to take. (The CCNA exam number is 640-507.) 2. Register with the nearest Sylvan Prometric Registration Center. At this point, you will be asked to pay in advance for the exam. At the time of this writing, the exams are $100 each and must be taken within one year of payment. You can schedule exams up to six weeks in advance or as soon as one working day prior to the day you wish to take it. If something comes up and you need to cancel or reschedule your exam appointment, contact Sylvan Prometric at least 24 hours in advance. Same-day registration isn’t available for the Cisco tests. 3. When you schedule the exam, you’ll get instructions regarding all appointment and cancellation procedures, the ID requirements, and information about the testing-center location.Tips for Taking Your CCNA Exam The CCNA test contains about 70 questions to be completed in 90 minutes. You must schedule a test at least 24 hours in advance (unlike the Novell or Microsoft exams), and you aren’t allowed to take more than one Cisco exam per day. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 20. xxxvi Introduction Many questions on the exam have answer choices that at first glance look identical—especially the syntax questions! Remember to read through the choices carefully because close doesn’t cut it. If you get commands in the wrong order or forget one measly character, you’ll get the question wrong. So, to practice, do the hands-on exercises at the end of the chapters over and over again until they feel natural to you. Unlike Microsoft or Novell tests, the exam has answer choices that are syntactically similar—though some syntax is dead wrong, it is usually just subtly wrong. Some other choices may be syntactically correct, but they’re shown in the wrong order. Cisco does split hairs, and they’re not at all averse to giving you classic trick questions. Here’s an example: access-list 101 deny ip any eq 23 denies Telnet access to all systems. This question looks correct because most people refer to the port number (23) and think, “Yes, that’s the port used for Telnet.” The catch is that you can’t filter IP on port numbers (only TCP and UDP). Also, never forget that the right answer is the Cisco answer. In many cases, more than one appropriate answer is presented, but the correct answer is the one that Cisco recommends. Here are some general tips for exam success: Arrive early at the exam center, so you can relax and review your study materials. Read the questions carefully. Don’t jump to conclusions. Make sure you’re clear about exactly what each question asks. When answering multiple-choice questions that you’re not sure about, use the process of elimination to get rid of the obviously incorrect answers first. Doing this greatly improves your odds if you need to make an educated guess. You can no longer move forward and backward through the Cisco exams, so double-check your answer before pressing Next since you can’t change your mind. After you complete an exam, you’ll get immediate, online notification of your pass or fail status, a printed Examination Score Report that indicates your pass or fail status, and your exam results by section. (The test admin- istrator will give you the printed score report.) Test scores are automatically forwarded to Cisco within five working days after you take the test, so you Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 21. Introduction xxxvii don’t need to send your score to them. If you pass the exam, you’ll receive confirmation from Cisco, typically within two to four weeks.How to Use This Book This book can provide a solid foundation for the serious effort of preparing for the Cisco Certified Network Associate (CCNA) exam. To best benefit from this book, use the following study method: 1. Take the assessment test immediately following this introduction. (The answers are at the end of the test.) Carefully read over the expla- nations for any question you get wrong and note which chapters the material comes from. This information should help you plan your study strategy. 2. Study each chapter carefully, making sure that you fully understand the information and the test topics listed at the beginning of each chapter. Pay extra-close attention to any chapter where you missed questions in the assessment test. 3. Complete all hands-on exercises in the chapter, referring to the chap- ter so that you understand the reason for each step you take. If you do not have Cisco equipment available, be sure to study the examples carefully. Also, check www.routersim.com for a router simulator. 4. Answer the review questions related to that chapter. (The answers appear at the end of the chapter.) Note the questions that confuse you and study those sections of the book again. 5. Take the practice exam in Appendix A. The answers appear at the end of the exam. 6. Try your hand at the bonus practice exam that is included on the CD that comes with this book. The questions in this exam appear only on the CD. This will give you a complete overview of what you can expect to see on the real thing. 7. Remember to use the products on the CD included with this book. The electronic flashcards, the Boson Software utilities, and the EdgeTest exam preparation software have all been specifically chosen to help you study for and pass your exam. You can also study on the road with the CCNA Study Guide electronic book in PDF format. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 22. xxxviii Introduction The electronic flashcards can be used on your Windows computer or on your Palm device. 8. Make sure you read the “Key Terms” and “Commands in This Chap- ter” lists at the end of the chapters. Appendix C is a copy of all com- mands used in the book, including explanations for each command. To learn all the material covered in this book, you’ll have to apply your- self regularly and with discipline. Try to set aside the same time period every day to study, and select a comfortable and quiet place to do so. If you work hard, you will be surprised at how quickly you learn this material. All the best! What’s on the CD? We worked hard to provide some really great tools to help you with your cer- tification process. All of the following tools should be loaded on your work- station when studying for the test. The EdgeTest Test Preparation Software The test preparation software, provided by EdgeTek Learning Systems, pre- pares you to pass the CCNA exam. In this test engine you will find all the questions from the book, plus an additional bonus practice exam that appears exclusively on the CD. You can take the assessment test, test your- self by chapter, take the practice exam that appears in the book or on the CD, or take a randomly generated exam comprising all the questions. To find more test-simulation software for all Cisco and NT exams, look for the exam link on www.lammle.com and www.boson.com. Electronic Flashcards for PC and Palm Devices To prepare for the exam, you can read this book, study the review questions at the end of each chapter, and work through the practice exams included in the book and on the CD. But wait, there’s more! Test yourself with the flashcards included on the CD. If you can get through these difficult Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 23. Introduction xxxix questions and understand the answers, you’ll know you’re ready for the CCNA exam. The flashcards include over 200 questions specifically written to hit you hard and make sure you are ready for the exam. Between the review ques- tions, practice exams, and flashcards, you’ll be more than prepared for the exam. CCNA Study Guide in PDF Sybex offers the CCNA Study Guide in PDF format on the CD so you can read the book on your PC or laptop. This will be helpful to readers who travel and don’t want to carry a book, as well as to readers who prefer to read from their computer. (Acrobat Reader 4 is also included on the CD.) Dictionary of Networking in PDF As a bonus, you get a second complete book—the Sybex Dictionary of Net- working, by Peter Dyson—on the CD included with this book. Like the elec- tronic version of the CCNA Study Guide, the fully searchable Dictionary of Networking is in PDF for ease of use. You will also find Adobe Acrobat 4 with Search on the CD to access the PDF book. This dictionary will help you understand terms found in this book or networking terms found in any book for that matter. Boson Software Utilities Boson.com is an impressive company: They provide many free services to help you, the student. Boson.com has the best Cisco exam preparation ques- tions on the market at a very nice price. On this book’s CD, they have pro- vided the following: Practice exam IP Subnetter eeSuperPing System-Logging Wildcard Mask CheckerCopyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 24. xl Introduction CCNA Virtual Lab AVI Demo Files The CCNA Virtual Lab e-trainer provides a router and switch simulator to help you gain hands-on experience without having to buy expensive Cisco gear. The AVI demo files on the CD will help you gain an understanding of the product features and the labs that the routers and switches can perform. Read more about the CCNA Virtual Lab e-trainer at http://www.sybex .com/cgi-bin/rd_bookpg.pl?2728back.html. You can upgrade this product at www.routersim.com. How to Contact the Author You can reach Todd Lammle through Globalnet System Solutions, Inc. (www.lammle.com)—his training and systems integration company in Colo- rado—or e-mail him at todd@lammle.com. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 25. Assessment Questions xliAssessment Questions 1. Where would a router boot from if a configuration register was set to 0x0101? A. Flash B. ROM C. Boot ROM D. NVRAM 2. Which of the following is a valid SAP filter 1010 placed on Ethernet 0? A. ip access-group 1010 in B. ip access-group 1010 out C. ipx access-group 1010 in D. ipx input-sap-filter 1010 E. ipx input-sap-filter 1010 in 3. What is a TE2 device used for in an ISDN connection? A. Connecting an NT2 device to a U reference point B. Connecting an S/T interface to a U reference point C. Connecting a non-ISDN terminal to ISDN through a TA D. Connecting to ISDN through a four-wire, twisted-pair digital link 4. What is the correct command to set the router identification to the name Atlanta, which an administrator would see when connecting with Telnet or through the console? A. Description Atlanta Router B. Banner Motd $ C. Hostname Atlanta D. Host name Atlanta E. Set prompt Atlanta Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 26. xlii Assessment Questions 5. PDUs at the Data Link layer are named what? A. Frames B. Packets C. Datagrams D. Transports E. Segments F. Bits 6. Which of the following is the valid host range for the IP address 192.168.168.188 255.255.255.192? A. 192.168.168.129–190 B. 192.168.168.129–191 C. 192.168.168.128–190 D. 192.168.168.128–192 7. What are the access list numbers used for IP standard access lists? A. 1–10 B. 1–99 C. 100–199 D. 1000–1999 8. If you type show interface serial 0 and receive the following response, what could the problem be? RouterA#sh int s0 Serial0 is up, line protocol is down A. The keepalives could be set wrong between the point-to-point links. B. No cable is attached to the interface. C. The administrator needs to issue a no shutdown request to the interface. D. The interface is defective. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 27. Assessment Questions xliii 9. Which of the following commands will show you the IPX address of an interface? (Choose all that apply.) A. show ipx address int e0 B. show protocol C. show ipx protocol D. show ipx interface 10. How do you create a default route? A. By using all 1s in place of the network and mask B. By defining a static route and using all 0s in place of the network and mask C. By using 255 in place of the network and mask D. Login <name, password> 11. What is a trunked link? A. A link that is only part of one VLAN and is referred to as the native VLAN of the port B. A link that can carry multiple VLANs C. A switch port connected to the Internet D. Data and voice capability on the same interface 12. Which protocol is used to look up an IP address from a known Ether- net address? A. IP B. ARP C. RARP D. TCPCopyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 28. xliv Assessment Questions 13. What is the broadcast address of the subnet address 192.168.99.20 255.255.255.252? A. 192.168.99.127 B. 192.168.99.63 C. 192.168.99.23 D. 192.168.99.31 14. What is the valid host range that the host ID 192.168.10.33 255.255.255.224 is a part of? A. 192.168.10.32–63 B. 192.168.10.33–63 C. 192.168.10.33–62 D. 192.168.10.33–61 15. What does a switch do with a multicast frame received on an interface? A. Forwards the switch to the first available link B. Drops the frame C. Floods the network with the frame looking for the device D. Sends back a message to the originating station asking for a name resolution 16. Which command would you use to see the IPX RIP packets being sent and received on an interface? A. show ip rip B. sh ipx int C. debug ipx routing activity D. debug ipx interface Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 29. Assessment Questions xlv 17. What is the subnet address of the IP address 192.168.100.30 255.255.255.248? A. 192.168.100.32 B. 192.168.100.24 C. 192.168.100.0 D. 192.168.100.16 18. What is an access link? A. A link that is only part of one VLAN and is referred to as the native VLAN of the port B. A link that can carry multiple VLANs C. A switch port connected to the Internet D. Data and voice capability on the same interface 19. Which of the following is true? (Choose all that apply.) A. PPP can be used with Token Ring. B. PPP can be used with synchronous serial links. C. PPP can be used with asynchronous serial links. D. PPP is proprietary to each vendor’s equipment. 20. What command can you use to back up the Cisco router configuration to a TFTP host? A. copy run tftp B. copy flash tftp C. copy nvram startup D. copy tftp flashCopyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 30. xlvi Assessment Questions 21. Which of the following are provided by the show cdp entry * com- mand? (Choose all that apply.) A. IP address of the neighbor router B. Protocol information C. Platform D. Capability E. Time F. Port ID G. Holdtime H. The same information as show version I. Neighbor device ID J. Local interface K. Speed of the link 22. Which of the following would you not implement at the distribution layer? A. Access lists B. Packet filtering C. Queuing D. Breakup of collisions domains E. Address translation F. Firewalls G. Creating of broadcast domains Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 31. Assessment Questions xlvii 23. Which LAN switch methods have a fixed latency time? (Choose all that apply.) A. Cut-through B. Store and forward C. FragmentCheck D. FragmentFree 24. If you were designing a network and needed to break up collision domains, at which Cisco layer would you provide this function? A. Physical B. Access C. Core D. Network E. Distribution F. Data Link 25. If you wanted to find out all the commands that start with “cl” from a certain prompt, what would you type at that particular prompt? A. Show commands cl B. Cl ? C. Cl? D. Cl ? more 26. What does a VLAN do? A. Breaks up collision domains B. Breaks up routing domains C. Breaks up broadcast domains D. Provides fragmentation segmentationCopyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 32. xlviii Assessment Questions 27. Which of the following will you find in a routing table? (Choose all that apply.) A. Network address B. Routing metric C. Exit interface for packets D. Entering interface 28. Which command can you use to see which devices have telnetted into your router? A. show vty line B. show vers C. show users D. show connections 29. What does an administrative distance of 0 mean? A. 0 is the default administrative distance for dynamic routing. B. 0 is the default administrative distance for directly connected routes. C. There is no routing allowed on this router. D. There are 0 hops to the next destination. 30. Which of the following is a valid IP extended access list? A. access-list 110 permit ip any host 1.1.1.1 eq ftp B. access-list 10 permit tcp ip any any eq 21 C. access-list 99 permit udp any host 2.2.2.2 eq ip D. access-list 199 permit tcp any 0.0.0.0 255.255.255.255 eq 21 Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 33. Assessment Questions xlix 31. What is true regarding the blocking state of an STP switch port? (Choose all that apply.) A. Blocking ports do not forward any frames. B. Blocking ports listen for BPDUs. C. Blocking ports forward all frames. D. Blocking ports do not listen for BPDUs. 32. What is the default LAN switch type for the 1900 switch? A. FastForward B. Cut-through C. LAN switch type 1 D. FragmentFree E. Store and forward 33. Which of the following is true about the enable passwords? (Choose all that apply.) A. The enable password is encrypted by default. B. The enable secret is encrypted by default. C. The enable-encrypted password should be set first. D. The enable password supersedes the enable secret. E. The enable secret password supersedes the enable password. F. The enable-encrypted password supersedes all other passwords. 34. What is the default administrative distance of RIP? A. 1 B. 100 C. 120 D. 150Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 34. l Assessment Questions 35. If you are typing commands and receive the following message, what is wrong and how do you fix it? (Choose all that apply.) Router#clock set 10:30:10 % Incomplete command. A. The IOS doesn’t support a clock on this router. B. The command string is not done. C. Press the up arrow key and type a question mark. D. Press the down arrow key and the Tab key. E. Erase what you typed and reboot the router. 36. In the following command, what does the 175 mean? Ip route 150.150.0.0 255.255.0.0 150.150.150.150 175 A. It defines the next hop. B. It defines the administrative distance. C. It means that the update is broadcast. D. Nothing, it is an invalid command. 37. What does a router do with a received packet that is destined for an unknown network? A. Forwards the packet B. Drops the packet C. Holds the packet till the next route update D. Sends a broadcast for the unknown network 38. Which part is the network and which part is the node of the address 7c8.0001.00c8.1234? A. network: 7c8.0001, node: 00c8.1234 B. network: 7c8, node: 0001.00c8.1234 C. network: 0001.00c8.1234, node: 7c8 D. network: 7c8.0001.00c8, node: 1234 Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 35. Assessment Questions li 39. What are the two types of PDUs used at the Network layer? A. Data B. Route C. Static D. Dynamic E. Core F. Segments 40. What type of Cisco encapsulation is used for frame tagging across trunked links? A. Virtual Trunk Protocol (VTP) B. 802.1q C. ISL D. VLANs 41. What does IPX RIP use to find the best path to a remote network? (Choose all that apply.) A. Bandwidth of a link B. Hop count C. Reliability of a link D. Amount of delay, counted in 1/18 of a second 42. What are the access list numbers for extended access lists? A. 1–10 B. 1–99 C. 100–199 D. 1000–1999Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 36. lii Assessment Questions 43. What does the following command mean? Access-list 110 permit ip any 0.0.0.0 255.255.255.255 A. It is a standard IP access list that permits network 0.0.0.0 only. B. It is an extended IP access list that permits network 0.0.0.0 only. C. It is an extended list that permits any host or network. D. It is invalid. 44. What is a static VLAN? A. A VLAN that cannot be renamed or removed B. A VLAN created by the administrator C. Ports on the switch assigned to a VLAN by an administrator D. Ports on the switch assigned to a VLAN by a VTP server 45. Which of the following is true regarding the isdn switch-type command? A. It can be configured only in global configuration mode. B. It can be configured only from interface configuration. C. It can be configured from either global or interface configura- tion mode. D. It can be used only when you have a TA. 46. If your Frame Relay network is congested, what mechanism is used to tell the source device to slow down? A. HDLC B. DLCI C. FECN D. BECN Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 37. Assessment Questions liii 47. Which of the following is a method used by Frame Relay for address- ing PVCs to IP addresses? A. ARP B. LMI C. SLARP D. DLCI 48. What are the two ways to add multiple encapsulations on an Ethernet IPX LAN? A. Multiple frame types B. Secondaries C. Subinterfaces D. Virtual secondaries 49. What is the typical time a switch port will go from blocking to for- warding state? A. 5 seconds B. 50 seconds C. 10 seconds D. 100 seconds 50. How do you telnet from a 1900 switch CLI? A. telnet Atlanta. B. telnet 172.16.10.1. C. ping 172.16.10.1. D. You cannot do this on a 1900 CLI.Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 38. liv Assessment Questions 51. What command will delete the automatically entered MAC addresses in the MAC filter table? A. (config)#delete nvram B. #delete nvram C. (config)#clear mac-address-table dynamic D. #clear mac-address-table dynamic 52. If you want to completely clear all configurations on a 1900 switch, what commands must you type in? (Choose all that apply.) A. Clear config B. Delete nvram C. Delete vtp D. Delete start E. Erase startup-config F. Just reboot the switch. 53. If you wanted to view the trunk status on port 27 of a 1900 switch, which command would you use? A. Show port 27 B. Show trunk C. Show trunk B D. Show trunk f0/27 E. Show trunk e0/27 54. What would you type at a 1900 console prompt to see the transmit and receive statistics of VTP? A. Show vtp stat B. Show stat C. Sh vtp domain D. Sh int e0/9 Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 39. Answers to the Assessment Questions lvAnswers to the Assessment Questions 1. B. The configuration register is used to tell the router how to load the IOS and configuration. The value 0x0101 tells the router to boot from ROM. See Chapter 7 for more information about configuration registers. 2. D. To place a SAP filter on an interface, use the command ipx input- sap-filter 1010 or ipx output-sap-filter 1010. See Chapter 9 for more information on IPX SAP filters. 3. D. This is a hard question. The TE2 is a device that does not under- stand ISDN standards and uses a four-wire connection. The TE2 must connect into a terminal adapter (TA) and then into an NT1 device to be converted to a two-wire network. See Chapter 10 for more infor- mation on ISDN. 4. C. The command hostname (one word) is used to set the name of the router. For more information on how to set the hostname of a router, see Chapter 4. 5. A. Protocol Data Units are used to describe the function of the headers used at each layer of the OSI model. At the Data Link layer, framing is used to encapsulate the data packet with control information for transmission on a local network. For more information on PDUs, see Chapter 1. 6. A. Start by using 256, the subnet mask, which is 256–192=64. The first subnet is 64. The next subnet would be 128. This host is in the 128 subnet, the broadcast address is 191, and the valid host range is 129 through 190. See Chapter 3 for more information on IP addressing. 7. B. Standard IP access lists use the numbers 1–99. See Chapter 9 for more information about access lists. 8. A. If you see the line is up, but the protocol is down, you are having a clocking (keepalive) or framing issue. Check the keepalives on both ends to make sure they match; the clock rate is set, if needed; and the encapsulation type is the same on both ends. For more information on interface statistics, see Chapter 4. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 40. lvi Answers to the Assessment Questions 9. B, D. The commands show protocol and show ipx interface will show you the IPX addresses of an interface. See Chapter 8 for more information on IPX networking. 10. B. Default routes are created by using all 0s in place of the network and mask IDs. See Chapter 5 for more information on IP routing. 11. B. Trunked links carry multiple VLANs across the same link. For more information on VLANs, please see Chapter 6. 12. C. The protocol at the Network layer that finds an IP address from a known Ethernet address is Reverse ARP (RARP). See Chapter 3 for more information on IP protocols. 13. C. Start by using 256, the subnet mask, which is 256–25=4. The first subnet is 4. The next subnet would be 8, then 12, 16, 20, and 24. The broadcast address is 23, and the valid host range is 21 and 22. See Chapter 3 for more IP addressing information. 14. C. Start by using 256, the subnet mask, which is 256–224=32. The first subnet is 10.32. The next subnet would be 10.64. This host is in the 10.32 subnet, the broadcast address is 10.63, and the valid host range is 10.33 through 10.62. See Chapter 3 for more IP addressing information. 15. C. The switch will flood the network with the frame looking for the device. For more information on LAN switching, see Chapter 2. 16. B. The command show ipx interface will show you the IPX RIP and SAP information being sent and received on an individual inter- face. See Chapter 8 for more information on IPX. 17. B. Start by using 256, the subnet mask, which is 256–248=8. The first subnet is 8. The next subnet would be 16, then 24, and then 32. This host is in the 24 subnet, the broadcast address is 31, and the valid host range is 25 through 31. See Chapter 3 for more information on IP addressing. 18. A. Access links connect hosts to a switch and are part of only one VLAN. For more information on VLANs, please see Chapter 6. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 41. Answers to the Assessment Questions lvii 19. B, C. PPP is used to connect point-to-point links together and uses the ISO’s non-proprietary version of HDLC. It can be used on either syn- chronous or asynchronous links. See Chapter 10 for more information on PPP. 20. A. The command copy running-config tftp (copy run tftp for short) will copy the router’s configuration to a TFTP host for backup purposes. See Chapter 7 for more information about TFTP hosts and Cisco routers. 21. A, B, C, D, F, G, H, I, J. The show cdp entry * command is used to gather detailed information about neighbor devices. See Chapter 7 for more information about CDP. 22. D. Cisco recommends that you break up collision domains with layer- 2 switches at the access layer, not the distribution layer. For more information on the distribution layer, see Chapter 1. 23. A, D. Cut-through and FragmentFree always read only a fixed amount of a frame. For more information on LAN switch types, see Chapter 2. 24. B. Cisco recommends that you use layer-2 switches, which break up collision domains, at the access layer. For more information on the access layer and collision domains, see Chapter 1. 25. C. You can use a letter, or combination of letters, followed by a ques- tion mark without a space to get all the commands starting with those letters from that prompt. For more editing and help information, see Chapter 4. 26. C. VLANs break up broadcast domains in switched networks. For more information on VLANs, please see Chapter 6. 27. A, B, C. Routing tables in a router keep track of where networks in a network are located, not hosts. They also keep track of the distance or cost to that remote network and which interface to exit to get to that remote network. For more information on routing tables, see Chapter 1.Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 42. lviii Answers to the Assessment Questions 28. C. The show users command will show you the virtual connections into your router. See Chapter 7 for more information about using Telnet. 29. B. Directly connected networks have the highest administrative dis- tance, or trustworthiness rating, of zero. See Chapter 5 for more infor- mation on IP routing. 30. D. Extended access lists use the numbers 100–199. This eliminates Answers B and C. To filter on an upper-layer protocol, you must use UDP or TCP in the protocol field. This eliminates Answer A. For more information on access lists, see Chapter 9. 31. A, B. When a port is in blocking state, no frames are forwarded. This is used to stop network loops. However, the blocked port will listen for BPDUs received on the port. For more information on STP, see Chapter 2. 32. D. The 1900 defaults to FragmentFree but can be changed to store and forward. For more information on LAN switch types, see Chapter 2. 33. B, E. There is no enable-encrypted password. The enable secret is encrypted by default and supersedes the enable password. To learn how to set the passwords on a router, see Chapter 4. 34. C. RIP has an administrative distance of 120 by default. See Chapter 5 for more information on IP routing. 35. B, C. If you receive an incomplete command, then you know that the command string is not done. Just press the up arrow key to receive the last command entered, and continue with the command by using your question mark. For more information on help and editing, see Chapter 4. 36. B. By default, static routes have an administrative distance of 1. The 175 represents an optional command that changes the default admin- istrative distance. See Chapter 5 for more information on IP routing. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 43. Answers to the Assessment Questions lix 37. B. If a packet is received that is looking for a destination network that is not in the routing table, the router will drop the packet. See Chapter 5 for more information on IP routing. 38. B. The IPX address is 10 bytes (80 bits). The first four bytes are the network number, and the last six bytes are the node address. See Chapter 8 for more information on IPX. 39. A, B. The Network layer uses two different types of packets (called PDUs). The data packets route user data with routed protocols, and the route packets keep and maintain routing tables on routers within the internetwork with routing protocols. Examples of routed proto- cols are IP and IPX; examples of routing protocols are RIP, IGRP, and OSPF. For more information on PDUs, see Chapter 1. 40. C. Cisco has a proprietary frame tagging method called Inter-Switch Link (ISL), which keeps track of frames across a trunked link. For more information on VLANs, please see Chapter 6. 41. B, D. IPX RIP uses ticks (1/18 of a second) and then hop counts to determine the best way to an internetwork. See Chapter 8 for more information on IPX RIP. 42. C. Extended IP access lists use the numbers 100–199. See Chapter 9 for more information about access lists. 43. C. The command access-list 110 permit ip any any (0.0.0.0 255.255.255.255 is the same as the any command) is a wildcard allowing any host or network. For more information on access lists, see Chapter 9. 44. C. Static VLANs are VLANs assigned to switch ports by an adminis- trator. For more information on VLANs, please see Chapter 6. 45. C. You can configure the switch type globally and set the switch type for all BRI interfaces, or you can set it at interface level if each BRI is connected to a different type of switch. See Chapter 10 for more infor- mation on ISDN.Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 44. lx Answers to the Assessment Questions 46. D. Backward-Explicit Congestion Notification (BECN) is used to send information back to an originating router telling it to slow down its transfer rate because the switch is congested. See Chapter 10 for more information on Frame Relay. 47. D. Data Link Connection Identifiers (DLCIs) are used to identify a PVC through a Frame Relay switch. See Chapter 10 for more infor- mation on Frame Relay. 48. B, C. You can add multiple encapsulations on an interface either by using the secondary command or by creating a subinterface. See Chapter 8 for more information on IPX and multiple encapsulations. 49. B. 50 seconds is the default time for changing from blocking to for- warding state. This is to allow enough time for all switches to update their STP database. For more information on STP, see Chapter 2. 50. D. You can telnet to a 1900, but not from a 1900 switch CLI. See Appendix B for an explanation of the 1900 switch commands. 51. D. To delete the dynamic entries in a MAC address table, use the com- mand clear mac-address-table dynamic from privileged mode. See Appendix B for an explanation of the 1900 switch commands. 52. B, C. By typing delete nvram, you delete the startup-config. How- ever, this does not delete the VTP configuration on the switch. You must also type delete vtp. See Appendix B for more information on the 1900 switch commands. 53. C. The ports 26 and 27 are considered A and B when viewing trunk information. See Appendix B for more on the 1900 switch commands. 54. A. The command show vtp statistics will give you the receive and transmit statistics of VTP on a switch. See Appendix B for an expla- nation of the 1900 switch commands. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 45. Chapter Internetworking 1 THE CCNA EXAM TOPICS COVERED IN THIS CHAPTER INCLUDE THE FOLLOWING: Describe the benefits of a layered model Describe the main benefit of the OSI reference model Understand each of the seven layers of the OSI reference model and what they provide application developers Describe flow control and how it is used within an internetwork Understand how the Transport layer flow control mechanism works Describe how the OSI’s Network layer provides routing in an internetwork environment List the five conversion steps of data encapsulation Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 46. W elcome to the exciting world of internetworking. This first chapter will help you understand the basics of internetworking and how to connect networks using Cisco routers and switches. The Open Systems Interconnection (OSI) model will be discussed in detail in this chapter. The OSI model has seven hierarchical layers that were devel- oped to help different companies communicate between their disparate sys- tems. It is important to understand the OSI model as Cisco sees it, and that is how I will present the seven layers of the OSI model to you. Cisco has created a three-layer hierarchical network model that can help you build, implement, and maintain networks. By understanding this model, you can effectively build, maintain, and troubleshoot any size network. This chapter will give you both an introduction to the Cisco three-layer model and the details of each layer. Different types of devices are specified at different layers of the OSI model. It is important to understand the different types of cables and con- nectors used to connect these devices to a network. Cabling Cisco devices will be discussed with Ethernet LANs, WAN technologies, and even connect- ing a router or switch with a console connection. Cisco makes a large range of router, hub, and switch products. By under- standing the different products available from Cisco, you can understand which devices can meet the business requirements for your network. The product line for Cisco hubs, routers, and switches is discussed at the end of this chapter.Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 47. Internetworking Models 3Internetworking Models When networks first came into being, computers could typically com- municate only with computers from the same manufacturer. For example, companies ran either a complete DECnet solution or an IBM solution—not both together. In the late 1970s, the OSI (Open Systems Interconnection) model was created by the International Organization for Standardization (ISO) to break this barrier. The OSI model was meant to help vendors create interoperable network devices. Like world peace, it’ll probably never happen completely, but it’s still a great goal. The OSI model is the primary architectural model for networks. It describes how data and network information are communicated from appli- cations on one computer, through the network media, to an application on another computer. The OSI reference model breaks this approach into layers. Cisco has also created a three-layer model that is used to help design, implement, and maintain any size network. By understanding the three-layer model, you will gain an understanding of how Cisco views internetworking. Also, by having a fundamental understanding of the devices used at each layer of the model, you can effectively design and purchase the correct Cisco equipment to meet your business needs. This chapter will cover both the OSI model and the Cisco three-layer hierarchical model. The Layered Approach A reference model is a conceptual blueprint of how communications should take place. It addresses all the processes required for effective communica- tion and divides these processes into logical groupings called layers. When a communication system is designed in this manner, it’s known as layered architecture. Think of it like this: You and some friends want to start a company. One of the first things you’d do is sit down and think through what must be done, who will do them, what order they will be done in, and how they relate to each other. Ultimately, you might group these tasks into departments. Let’s say you decide to have an order-taking department, an inventory depart- ment, and a shipping department. Each of your departments has its own unique tasks, keeping its staff members busy and requiring them to focus on only their own duties. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 48. 4 Chapter 1 Internetworking In this scenario, departments are a metaphor for the layers in a commu- nication system. For things to run smoothly, the staff of each department will have to both trust and rely heavily on the others to do their jobs and com- petently handle their unique responsibilities. In your planning sessions, you would probably take notes, recording the entire process to facilitate later dis- cussions about standards of operation that will serve as your business blue- print, or reference model. Once your business is launched, your department heads, armed with the part of the blueprint relating to their department, will need to develop prac- tical methods to implement their assigned tasks. These practical methods, or protocols, will need to be compiled into a standard operating procedures manual and followed closely. Each of the various procedures in your manual will have been included for different reasons and have varying degrees of importance and implementation. If you form a partnership or acquire another company, it will be imperative for its business protocols—its busi- ness blueprint—to match, or be compatible with, yours. Similarly, software developers can use a reference model to understand computer communication processes and to see what types of functions need to be accomplished on any one layer. If they are developing a protocol for a certain layer, all they need to concern themselves with is the specific layer’s functions, not those of any other layer. Another layer and protocol will han- dle the other functions. The technical term for this idea is binding. The com- munication processes that are related to each other are bound, or grouped together, at a particular layer. Advantages of Reference Models The OSI model, like the Cisco three-layer model you will learn about later, is hierarchical, and the same benefits and advantages can apply to any lay- ered model. The primary purpose of all models, and especially the OSI model, is to allow different vendors to interoperate. The benefits of the OSI and Cisco models include, but are not limited to, the following: Dividing the complex network operation into more manageable layers Changing one layer without having to change all layers. This allows application developers to specialize in design and development. Defining the standard interface for the “plug-and-play” multivendor integration Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 49. The OSI Reference Model 5The OSI Reference Model The OSI reference model was created in the late 1970s to help facilitate data transfer between network nodes. One of the greatest functions of the OSI specifications is to assist in data transfer between disparate hosts. This means you can transfer data between a Unix host and a PC, for example. The OSI is not physical; rather, it is a set of guidelines that application developers can use to create and implement applications that run on a net- work. It also provides a framework for creating and implementing network- ing standards, devices, and internetworking schemes. The OSI has seven different layers, which are divided into two groups. The top three layers define how the applications within the end stations will com- municate with each other and with users. The bottom four layers define how data is transmitted end-to-end. Figure 1.1 shows the three upper layers and their functions, and Figure 1.2 shows the four lower layers and their functions. FIGURE 1.1 The upper layers Application • Provides a user interface • Presents data Presentation • Handles processing such as encryption • Keeps different applications’ Session • data separate Transport Network Data Link Physical In Figure 1.1, you can see that the user interfaces with the computer at the application layer, and also that the upper layers are responsible for applica- tions communicating between hosts. Remember that none of the upper layers know anything about networking or network addresses. That is the responsibility of the four bottom layers, which are shown in Figure 1.2. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 50. 6 Chapter 1 Internetworking FIGURE 1.2 The lower layers • Provides reliable or unreliable delivery Transport • Performs error correction before retransmit • Provides logical addressing, Network • which routers use for path determination • Combines packets into bytes and bytes into frames Data Link • Provides access to media using MAC address • Performs error detection not correction • Moves bits between devices Physical • Specifies voltage, wire speed, • and pin-out cables The four bottom layers define how data is transferred through a physical wire or through switches and routers, and how to rebuild a data stream from a transmitting host to a destination host’s application. The OSI Layers The International Organization for Standardization (ISO) is the Emily Post of the network protocol world. Just like Ms. Post, who wrote the book set- ting the standards—or protocols—for human social interaction, the ISO developed the OSI reference model as the precedent and guide for an open network protocol set. Defining the etiquette of communication models, it remains today the most popular means of comparison for protocol suites. The OSI reference model has seven layers: The Application layer The Presentation layer The Session layer The Transport layer The Network layer The Data Link layer The Physical layer Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 51. The OSI Reference Model 7 Figure 1.3 shows the functions defined at each layer of the OSI model. The following pages discuss this in detail.FIGURE 1.3 Layer functions The Application Layer The Application layer of the OSI model is where users communicate to the computer. The Application layer is responsible for identifying and establish- ing the availability of the intended communication partner and determining if sufficient resources for the intended communication exist. Although computer applications sometimes require only desktop resources, applications may unite communicating components from more than one network application; for example, file transfers, e-mail, remote access, network management activities, client/server processes, and infor- mation location. Many network applications provide services for communi- cation over enterprise networks, but for present and future internetworking, the need is fast developing to reach beyond their limits. Today, transactions and information exchanges between organizations are broadening to require internetworking applications like the following: World Wide Web (WWW) Connects countless servers (the number seems to grow with each passing day) presenting diverse formats. Most are multimedia and include some or all of the following: graphics, text, video, and even sound. Netscape Navigator, Internet Explorer, and other browsers like Mosaic simplify both accessing and viewing Web sites. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 52. 8 Chapter 1 Internetworking E-mail gateways Are versatile and can use Simple Mail Transfer Proto- col (SMTP) or the X.400 standard to deliver messages between different e-mail applications. Electronic Data Interchange (EDI) Is a composite of specialized stan- dards and processes that facilitates the flow of tasks such as accounting, shipping/receiving, and order and inventory tracking between businesses. Special interest bulletin boards Include the many Internet chat rooms where people can connect and communicate with each other either by posting messages or by typing a live conversation. They can also share public domain software. Internet navigation utilities Include applications like Gopher and WAIS, as well as search engines like Yahoo!, Excite, and Alta Vista, which help users locate the resources and information they need on the Internet. Financial transaction services Target the financial community. They gather and sell information pertaining to investments, market trading, commodities, currency exchange rates, and credit data to their subscribers. The Presentation Layer The Presentation layer gets its name from its purpose: It presents data to the Application layer. It’s essentially a translator and provides coding and con- version functions. A successful data transfer technique is to adapt the data into a standard format before transmission. Computers are configured to receive this generically formatted data and then convert the data back into its native format for actual reading (for example, EBCDIC to ASCII). By pro- viding translation services, the Presentation layer ensures that data trans- ferred from the Application layer of one system can be read by the Application layer of another host. The OSI has protocol standards that define how standard data should be formatted. Tasks like data compression, decompression, encryption, and decryption are associated with this layer. Some Presentation layer standards are involved in multimedia operations. The following serve to direct graphic and visual image presentation: PICT This is picture format used by Macintosh or PowerPC programs for transferring QuickDraw graphics. TIFF The Tagged Image File Format is a standard graphics format for high-resolution, bitmapped images. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 53. The OSI Reference Model 9 JPEG The Joint Photographic Experts Group brings these photo stan- dards to us. Other standards guide movies and sound: MIDI The Musical Instrument Digital Interface is used for digitized music. MPEG The Moving Picture Experts Group’s standard for the compres- sion and coding of motion video for CDs is increasingly popular. It pro- vides digital storage and bit rates up to 1.5Mbps. QuickTime This is for use with Macintosh or PowerPC programs; it manages audio and video applications. The Session Layer The Session layer is responsible for setting up, managing, and then tearing down sessions between Presentation layer entities. The Session layer also provides dialog control between devices, or nodes. It coordinates communi- cation between systems and serves to organize their communication by offer- ing three different modes: simplex, half-duplex, and full-duplex. The Session layer basically keeps different applications’ data separate from other appli- cations’ data. The following are some examples of Session-layer protocols and inter- faces (according to Cisco): Network File System (NFS) Was developed by Sun Microsystems and used with TCP/IP and Unix workstations to allow transparent access to remote resources. Structured Query Language (SQL) Was developed by IBM to provide users with a simpler way to define their information requirements on both local and remote systems. Remote Procedure Call (RPC) Is a broad client/server redirection tool used for disparate service environments. Its procedures are created on cli- ents and performed on servers. X Window Is widely used by intelligent terminals for communicating with remote Unix computers, allowing them to operate as though they were locally attached monitors.Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 54. 10 Chapter 1 Internetworking AppleTalk Session Protocol (ASP) Is another client/server mechanism, which both establishes and maintains sessions between AppleTalk client and server machines. Digital Network Architecture Session Control Protocol (DNA SCP) Is a DECnet Session-layer protocol. The Transport Layer Services located in the Transport layer both segment and reassemble data from upper-layer applications and unite it onto the same data stream. They provide end-to-end data transport services and can establish a logical con- nection between the sending host and destination host on an internetwork. Some of you might already be familiar with TCP and UDP (which you will learn about in Chapter 3) and know that TCP is a reliable service and UDP is not. Application developers have their choice of the two protocols when working with TCP/IP protocols. The Transport layer is responsible for providing mechanisms for multi- plexing upper-layer application, session establishment, and teardown of vir- tual circuits. It also hides details of any network-dependent information from the higher layers by providing transparent data transfer. Flow Control Data integrity is ensured at the Transport layer by maintaining flow control and allowing users the option of requesting reliable data transport between systems. Flow control prevents a sending host on one side of the connection from overflowing the buffers in the receiving host—an event that can result in lost data. Reliable data transport employs a connection-oriented commu- nications session between systems, and the protocols involved ensure the fol- lowing will be achieved: The segments delivered are acknowledged back to the sender upon their reception. Any segments not acknowledged are retransmitted. Segments are sequenced back into their proper order upon arrival at their destination. A manageable data flow is maintained in order to avoid congestion, overloading, and data loss. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 55. The OSI Reference Model 11 Connection-Oriented Communication In reliable transport operation, one device first establishes a connection- oriented session with its peer system. Figure 1.4 portrays a typical reliable session taking place between sending and receiving systems. In it, both hosts’ application programs begin by notifying their individual operating systems that a connection is about to be initiated. The two operating systems com- municate by sending messages over the network confirming that the transfer is approved and that both sides are ready for it to take place. Once the required synchronization is complete, a connection is fully established and the data transfer begins. Cisco sometimes refers to this as a three-way handshake.FIGURE 1.4 Establishing a connection-oriented session Sender Receiver Synchronize Negotiate connection Synchronize Acknowledge Connection established Data transfer (Send segments) While the information is being transferred between hosts, the two machines periodically check in with each other, communicating through their protocol software to ensure that all is going well and that the data is being received properly. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 56. 12 Chapter 1 Internetworking The following summarizes the steps in the connection-oriented session pictured in Figure 1.4: The first “connection agreement” segment is a request for synchronization. The second and third segments acknowledge the request and establish connection parameters between hosts. The final segment is also an acknowledgment. It notifies the destina- tion host that the connection agreement is accepted and that the actual connection has been established. Data transfer can now begin. During a transfer, congestion can occur because a high-speed computer is generating data traffic faster than the network can transfer it or because many computers are simultaneously sending datagrams through a single gateway or destination. In the latter case, a gateway or destination can become congested even though no single source caused the problem. In either case, the problem is basically akin to a freeway bottleneck—too much traffic for too small a capacity. Usually, no one car is the problem; there are simply too many cars on that freeway. When a machine receives a flood of datagrams too quickly for it to pro- cess, it stores them in a memory section called a buffer. This buffering action solves the problem only if the datagrams are part of a small burst. However, if the datagram deluge continues, a device’s memory will eventually be exhausted, its flood capacity will be exceeded, and it will discard any addi- tional datagrams that arrive. But, no worries—because of the transport function, network flood con- trol systems work quite well. Instead of dumping resources and allowing data to be lost, the transport can issue a “not ready” indicator to the sender, or source, of the flood (as shown in Figure 1.5). This mechanism works kind of like a stoplight, signaling the sending device to stop transmitting segment traffic to its overwhelmed peer. After the peer receiver processes the seg- ments already in its memory reservoir, it sends out a “ready” transport indi- cator. When the machine waiting to transmit the rest of its datagrams receives this “go” indictor, it then resumes its transmission. In fundamental, reliable, connection-oriented data transfer, datagrams are delivered to the receiving host in exactly the same sequence they’re trans- mitted; the transmission fails if this order is breached. If any data segments are lost, duplicated, or damaged along the way, a failure will transmit. The Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 57. The OSI Reference Model 13 answer to the problem is to have the receiving host acknowledge receiving each and every data segment.FIGURE 1.5 Transmitting segments with flow control Sender Receiver Transmit Buffer full Not ready— STOP! Segments processed GO! Transmit Windowing Data throughput would be low if the transmitting machine had to wait for an acknowledgment after sending each segment. Because there’s time avail- able after the sender transmits the data segment and before it finishes pro- cessing acknowledgments from the receiving machine, the sender uses the break to transmit more data. The quantity of data segments the transmitting machine is allowed to send without receiving an acknowledgment for them is called a window. Windowing controls how much information is transferred from one end to the other. While some protocols quantify information by observing the number of packets, TCP/IP measures it by counting the number of bytes. In Figure 1.6, there is a window size of 1 and a window size of 3. When a win- dow size of 1 is configured, the sending machine waits for an acknowledg- ment for each data segment it transmits before transmitting another. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 58. 14 Chapter 1 Internetworking Configured to a window size of 3, it’s allowed to transmit three data seg- ments before an acknowledgment is received. In our simplified example, both the sending and receiving machines are workstations. Reality is rarely that simple, and most often acknowledgments and packets will commingle as they travel over the network and pass through routers. Routing compli- cates things, but not to worry, you’ll learn about applied routing later in the book. FIGURE 1.6 Windowing Acknowledgments Reliable data delivery ensures the integrity of a stream of data sent from one machine to the other through a fully functional data link. It guarantees the data won’t be duplicated or lost. The method that achieves this is known as positive acknowledgment with retransmission. This technique requires a receiving machine to communicate with the transmitting source by sending an acknowledgment message back to the sender when it receives data. The sender documents each segment it sends and waits for this acknowledgment Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 59. The OSI Reference Model 15 before sending the next segment. When it sends a segment, the transmitting machine starts a timer and retransmits if it expires before an acknowledg- ment is returned from the receiving end. In Figure 1.7, the sending machine transmits segments 1, 2, and 3. The receiv- ing node acknowledges it has received them by requesting segment 4. When it receives the acknowledgment, the sender then transmits segments 4, 5, and 6. If segment 5 doesn’t make it to the destination, the receiving node acknowledges that event with a request for the segment to be resent. The sending machine will then resend the lost segment and wait for an acknowledgment, which it must receive in order to move on to the transmission of segment 7.FIGURE 1.7 Transport layer reliable delivery Sender Receiver 1 2 3 4 5 6 1 2 3 4 5 6 Send 1 Send 2 Send 3 Ack 4 Send 4 Send 5 Connection lost! Send 6 Ack 5 Send 5 Ack 7 The Network Layer The Network layer is responsible for routing through an internetwork and for network addressing. This means that the Network layer is responsible for transporting traffic between devices that are not locally attached. Routers, or Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 60. 16 Chapter 1 Internetworking other layer-3 devices, are specified at the Network layer and provide the routing services in an internetwork. When a packet is received on a router interface, the destination IP address is checked. If the packet is not destined for the router, then the router will look up the destination network address in the routing table. Once an exit interface is chosen, the packet will be sent to the interface to be framed and sent out on the local network. If the entry for the destination network is not found in the routing table, the router drops the packet. Two types of packets are used at the network layer: data and route updates. Data packets Are used to transport user data through the internetwork, and protocols used to support data traffic are called routed protocols. Examples of routed protocols are IP and IPX. You’ll learn about IP addressing in Chapter 3 and IPX addressing in Chapter 8. Route update packets Are used to update neighbor routers about net- works connected to routers in the internetwork. Protocols that send route update packets are called routing protocols, and examples are RIP, EIGRP, and OSPF, to name a few. Routing update packets are used to help build and maintain routing tables on each router. Figure 1.8 shows an example of a routing table. FIGURE 1.8 Routing table used in a router 1.0 3.0 1.1 3.1 1.3 2.1 2.2 3.3 1.2 3.2 E0 S0 S0 E0 Routing Table Routing Table NET INT Metric NET INT Metric 1 E0 0 1 S0 1 2 S0 0 2 S0 0 3 S0 1 3 E0 0 Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 61. The OSI Reference Model 17 The routing table used in a router includes the following information: Network addresses Protocol-specific network addresses. A router must maintain a routing table for individual routing protocols because each routing protocol keeps track of a network with a different addressing scheme. Think of it as a street sign in each of the different languages spo- ken by the residents on a street. Interface The exit interface a packet will take when destined for a spe- cific network. Metric The distance to the remote network. Different routing protocols use different methods of computing this distance. Routing protocols are covered in Chapter 5, but you need to understand that some routing pro- tocols use hop count (the number of routers a packet passes through when routing to a remote network), while others use bandwidth, delay of the line, or even tick count (1/18 of a second). Routers break up broadcast domains. This means, by default, that broad- casts are not forwarded through a router. This is good. Routers also break up collision domains, but this can also accomplished through layer-2 switches. Each interface in a router is a separate network and must be assigned unique network identification numbers. Each host on the network connected to that router must use that same network number. Some points about routers that you must remember: Routers, by default, will not forward any broadcast or multicast packets. Routers use the logical address in a network layer header to determine the next hop router to forward the packet to. Routers can use access lists, created by an administrator, to control security on packets trying to either enter or exit an interface. Routers can provide layer-2 bridging functions if needed and can simultaneously route through the same interface. Layer-3 devices (routers in this case) provide connections between Vir- tual LANs (VLANs).Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 62. 18 Chapter 1 Internetworking Switching and VLANs and are covered in Chapters 2 and 6, respectively. Routers can provide Quality of Service (QoS) for specific types of net- work traffic. The Data Link Layer The Data Link layer ensures that messages are delivered to the proper device and translates messages from the Network layer into bits for the Physical layer to transmit. It formats the message into data frames and adds a cus- tomized header containing the hardware destination and source address. This added information forms a sort of capsule that surrounds the original message in much the same way that engines, navigational devices, and other tools were attached to the lunar modules of the Apollo project. These various pieces of equipment were useful only during certain stages of space flight and were stripped off the module and discarded when their designated stage was complete. Data traveling through networks is similar. Figure 1.9 shows the Data Link layer with the Ethernet and IEEE specifications. Notice in the fig- ure that the IEEE 802.2 standard is used in conjunction with the other IEEE standards, adding functionality to the existing IEEE standards. FIGURE 1.9 Data Link layer You need to understand that routers, which work at the Network layer, do not care about where a host is located but only where networks are located. They also keep track of the best way to get to a remote network. The Data Link layer is responsible for uniquely identifying each device on a local network. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 63. The OSI Reference Model 19 For a host to send packets to individual hosts and between routers, the Data Link layer uses hardware addressing. Each time a packet is sent between routers, it is framed with control information at the Data Link layer, but that information is stripped off at the receiving router and only the original packet is left completely intact. This framing of the packet continues for each hop until the packet is finally delivered to the receiving host. It is important to understand that the packet was never altered along the route, only encapsulated with the type of control information to be passed on to the different media types. The IEEE Ethernet Data Link layer has two sublayers: Media Access Control (MAC) 802.3 This defines how packets are placed on the media. Contention media access is first come, first served access where everyone shares the same bandwidth. Physical addressing is defined here, as well as logical topologies. Logical topology is the signal path through a physical topology. Line discipline, error notification (not correction), ordered delivery of frames, and optional flow control can also be used at this sublayer. Logical Link Control (LLC) 802.2 This sublayer is responsible for iden- tifying Network layer protocols and then encapsulating them. An LLC header tells the Data Link layer what to do with a packet once a frame is received. For example, a host will receive a frame and then look in the LLC header to understand that the packet is destined for the IP protocol at the Network layer. The LLC can also provide flow control and sequencing of control bits. Switches and Bridges at the Data Link Layer Switches and bridges both work at the Data link layer and filter the net- work using hardware (MAC) addresses. Layer-2 switching is considered hardware-based bridging because it uses a specialized hardware called Application-Specific Integrated Circuits (ASICs). ASICs can run up to giga- bit speeds with very low latency. Bridges and switches read each frame as it passes through the network. The layer-2 device then puts the source hardware address in a filter table and keeps track of which port it was received on. This tells the switch where that device is located. After a filter table is built on the layer-2 device, the device will only for- ward frames to the segment where the destination hardware address is located. If the destination device is on the same segment as the frame, theCopyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 64. 20 Chapter 1 Internetworking layer-2 device will block the frame from going to any other segments. If the destination is on another segment, the frame is only transmitted to that seg- ment. This is called transparent bridging. When a layer-2 device (switch) interface receives a frame and the destina- tion hardware address is unknown to the device’s filter table, it will forward the frame to all connected segments. If the unknown device replies to this forwarding of the frame, the switch updates the filter table on that device’s location. However, the destination address of the transmitting frame may be a broadcast address, in which case the switch will forward all broadcasts to every connected segment by default. All devices that the broadcast is forwarded to are considered to be in the same broadcast domain. Layer-2 devices propagate layer-2 broadcast storms. The only way to stop a broadcast storm from propagating through an internetwork is with a layer-3 device (router). The biggest benefit of using switches instead of hubs in your internetwork is that each switch port is its own collision domain, whereas a hub creates one large collision domain. However, switches and bridges do not break up broadcast domains, instead forwarding all broadcasts. Another benefit of LAN switching over hub implementations is that each device on every segment plugged into a switch can transmit simultaneously because each segment is its own collision domain. Hubs allow only one device per network to communicate at a time. Switches cannot translate between different media types. In other words, each device connected to the switch must use an Ethernet frame type. If you wanted to connect to a Token Ring switch or LAN, you would need a router to provide the translation services. The Physical Layer The Physical layer has two responsibilities: it sends bits and receives bits. Bits come only in values of 1 or 0—a Morse code with numerical values. The Physical layer communicates directly with the various types of actual com- munication media. Different kinds of media represent these bit values in dif- ferent ways. Some use audio tones, while others employ state transitions— changes in voltage from high to low and low to high. Specific protocols are needed for each type of media to describe the proper bit patterns to be used, how data is encoded into media signals, and the various qualities of the phys- ical media’s attachment interface. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 65. Ethernet Networking 21 The Physical layer specifications specify the electrical, mechanical, proce- dural, and functional requirements for activating, maintaining, and deacti- vating a physical link between end systems. At the Physical layer, the interface between the Data Terminal Equipment, or DTE, and the Data Circuit-Terminating Equipment, or DCE, is identified. The DCE is usually located at the service provider, while the DTE is the attached device. The services available to the DTE are most often accessed via a modem or Channel Service Unit/Data Service Unit (CSU/DSU). The Physical layer’s connectors and different physical topologies are defined by the OSI as standards, allowing disparate systems to communicate. The CCNA course and exam are only interested in the Ethernet standards. Hubs at the Physical Layer Hubs are really multiple port repeaters. A repeater receives a digital signal and reamplifies it or regenerates the digital signal, then forwards the digital signal out all active ports without looking at any data. An Active hub does the same thing. Any digital signal received from a segment on a hub port is regenerated or reamplified and transmitted out all ports on the hub. This means all devices plugged into a hub are in the same collision domain as well as in the same broadcast domain. A broadcast domain is defined as all devices on a network segment that hear all broadcasts sent on that segment. Hubs, like repeaters, do not look at any traffic as they enter and are trans- mitted out to the other parts of the physical media. Hubs create a physical star network where the hub is a central device and cables extend in all direc- tions, creating the physical star effect. However, Ethernet networks use a logical bus topology. This means that the signal has to run from end to end of the network. Every device connected to the hub, or hubs, must listen if a device transmits.Ethernet Networking E thernet is a contention media access method that allows all hosts on a network to share the same bandwidth of a link. Ethernet is popular because it is easy to implement, troubleshoot, and add new technologies, like Fast- Ethernet and Gigabit Ethernet, to existing network infrastructures. Ethernet uses the Data Link and Physical layer specifications, and this section of the chapter will give you both the Data Link and Physical layer information you Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 66. 22 Chapter 1 Internetworking need to effectively implement, troubleshoot, and maintain an Ethernet network. Ethernet networking uses what is called Carrier Sense Multiple Access with Collision Detect (CSMA/CD), which helps devices share the bandwidth evenly without having two devices transmit at the same time on the network medium. CSMA/CD was created to overcome the problem of collisions that occur when packets are transmitted simultaneously from different nodes. Good collision management is important, because when a node transmits in a CSMA/CD network, all the other nodes on the network receive and exam- ine that transmission. Only bridges and routers effectively prevent a trans- mission from propagating through the entire network. The CSMA/CD protocol works like this: When a host wants to transmit over the network, it first checks for the presence of a digital signal on the wire. If all is clear (no other host is transmitting), the host will then proceed with its transmission. And it doesn’t stop there. The transmitting host con- stantly monitors the wire to make sure no other hosts begin transmitting. If the host detects another signal on the wire, it sends out an extended jam sig- nal that causes all nodes on the segment to stop sending data. The nodes respond to that jam signal by waiting a while before attempting to transmit again. Backoff algorithms determine when the colliding stations retransmit. If after 15 tries collisions keep occurring, the nodes attempting to transmit will then time-out. Half- and Full-Duplex Ethernet Half-duplex Ethernet is defined in the original 802.3 Ethernet and uses only one wire pair with a digital signal running in both directions on the wire. It also uses the CSMA/CD protocol to help prevent collisions and retransmit if a collision does occur. If a hub is attached to a switch, it must operate in half-duplex mode because the end stations must be able to detect colli- sions. Half-duplex Ethernet, typically 10BaseT, is only about 50 to 60 per- cent efficient, as Cisco sees it. However, you typically will only get 3- to 4Mbps, at most, in a large 10BaseT network. Full-duplex Ethernet uses two pairs of wires, instead of one wire pair like half duplex. Full duplex uses a point-to-point connection between the trans- mitter of the transmitting device and the receiver of the receiving device. There are no collisions because it’s as if we now have a freeway with multiple lanes instead of the single-lane road associated with half duplex. Full-duplex Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 67. Ethernet Networking 23 Ethernet is supposed to offer 100 percent efficiency in both directions. This means that you can get 20Mbps with a 10Mbps Ethernet running full duplex, or 200Mbps for FastEthernet. This is called an aggregate rate, but it essentially means “you’re supposed to get” 100 percent efficiency, though no one is certain. When a full-duplex Ethernet port is powered on, it connects to the remote end and then negotiates with the other end of the FastEthernet link. This is called an auto-detect mechanism. This mechanism first decides on the exchange capability, which means it checks to see if it can run at 10 or 100Mbps. It then checks to see if it can run full duplex. If it cannot, then it will run half duplex.Ethernet at the Data Link Layer Ethernet at the Data Link layer is responsible for Ethernet addressing, which is typically called hardware addressing or MAC addressing. Ethernet is also responsible for framing packets received from the Network layer and pre- paring them for transmission on the local network through the Ethernet con- tention media access method. There are four different types of Ethernet frames available: Ethernet_II IEEE 802.3 IEEE 802.2 SNAP I will discuss all four of the available Ethernet frames in the upcoming sections. Ethernet Addressing Ethernet addressing uses the Media Access Control (MAC) address burned into each and every Ethernet Network Interface Card (NIC). The MAC address, sometimes referred to as a hardware address, is a 48-bit address written in a canonical format to ensure that addresses are at least written in the same format, even if different LAN technologies are used. Figure 1.10 shows the 48-bit MAC addresses and how the bits are divided. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 68. 24 Chapter 1 Internetworking FIGURE 1.10 Ethernet addressing using MAC addresses 24 bits 24 bits 47 46 Organizationally I/G I/G Unique Identifier (OUI) Vendor assigned (Assigned by IEEE) The Organizationally Unique Identifier (OUI) is assigned by the IEEE to an organization (24 bits or 3 bytes). The organization, in turn, assigns a glo- bally administered address (24 bits or 3 bytes) that is unique (supposedly) to each and every adapter they manufacturer. Notice bit 46. Bit 46 must be 0 if it is a globally assigned bit from the manufacturer and 1 if it is locally administered from the network administrator. Ethernet Frames The Data Link layer is responsible for combining bits into bytes and bytes into frames. Frames are used at the Data Link layer to encapsulate packets handed down from the Network layer for transmission on a type of media access. There are three types of media access methods: contention (Ethernet), token passing (Token Ring and FDDI), and polling (IBM Mainframes and 100VGAnylan). This CCNA exam covers primarily Ethernet (contention) media access. The function of Ethernet stations is to pass data frames between each other using a group of bits known as a MAC frame format. This provides error detection from a cyclic redundancy check (CRC). However, remember that this is error detection, not error correction. The 802.3 frames and Ether- net frame are shown in Figure 1.11. The following bullet points detail the different fields in the 802.3 and Ethernet frame types. Preamble An alternating 1,0 pattern provides a 5MHz clock at the start of each packet, which allows the receiving devices to lock the incoming bit stream. The preamble uses either an SFD or synch field to indicate to the receiving station that the data portion of the message will follow. Start Frame Delimiter (SFD)/Synch SFD is 1,0,1,0,1,0, etc., and the synch field is all 1s. The preamble and SFD/synch field are 64 bits long. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 69. Ethernet Networking 25FIGURE 1.11 802.3 and Ethernet frame formats Ethernet_II Preamble DA SA Type FCS Data 8 bytes 6 bytes 6 bytes 2 bytes 4 bytes 802.3_Ethernet Preamble DA SA Length Data FCS 8 bytes 6 bytes 6 bytes 2 bytes Destination Address (DA) This transmits a 48-bit value using the Least Significant Bit (LSB) first. DA is used by receiving stations to determine if an incoming packet is addressed to a particular node. The destination address can be an individual address, or a broadcast or multicast MAC address. Remember that a broadcast is all 1s or Fs in hex and is sent to all devices, whereas a multicast is sent to only a similar subset of nodes on a network. Hex is short for hexadecimal, which is a numbering system that uses the first six letters of the alphabet (A through F) to extend beyond the available 10 dig- its in the decimal system. Hexadecimal has a total of 16 digits. Source Address (SA) SA is a 48-bit MAC address supplied by the trans- mitting device. It uses the Least Significant Bit (LSB) first. Broadcast and multicast address formats are illegal within the SA field. Length or Type field 802.3 uses a length field, whereas the Ethernet frame uses a type field to identify the Network layer protocol. 802.3 can- not identify the upper-layer protocol and must be used with a proprietary LAN, for example, IPX. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 70. 26 Chapter 1 Internetworking Data This is a packet sent down to the Data Link layer from the Net- work layer. The size can vary from 46–1500 bytes. Frame Check Sequence (FCS) FCS is a field at the end of the frame that is used to store the cyclic redundancy check (CRC). Let’s take a look at some frames caught on our trusty Etherpeek network analyzer. The frame below has only three fields: a destination, source, and type field. This is an Ethernet_II frame. Notice the type field is IP, or 08-00 in hexadecimal. Destination: 00:60:f5:00:1f:27 Source: 00:60:f5:00:1f:2c Protocol Type:08-00 IP The next frame has the same fields, so it must also be an Ethernet_II frame. We included this one so you could see that the frame can carry more than just IP: It can also carry IPX, or 81-37h. Notice that this frame was a broadcast. You can tell because the destination hardware address is all 1s in binary, or all Fs in hexadecimal. Destination: ff:ff:ff:ff:ff:ff Ethernet Broadcast Source: 02:07:01:22:de:a4 Protocol Type:81-37 NetWare Notice the length field in the next frame. This must be an 802.3 frame. Which protocol is this going to be handed to at the Network layer? It doesn’t specify in the frame, so it must be IPX. Why? Because when Novell created the 802.3 frame type (before the IEEE did and called it 802.3 Raw), Novell was pretty much the only LAN server out there. So, Novell was assuming that if you’re running a LAN, it must be IPX. Flags: 0x80 802.3 Status: 0x00 Packet Length:64 Timestamp: 12:45:45.192000 06/26/1998 Destination: ff:ff:ff:ff:ff:ff Ethernet Broadcast Source: 08:00:11:07:57:28 Length: 34 Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 71. Ethernet Networking 27 802.2 and SNAP Remember that the 802.3 Ethernet frame cannot by itself identify the upper- layer (Network) protocol; it needs help. The IEEE defined the 802.2 LLC specifications to provide this function and more. Figure 1.12 shows the IEEE 802.3 with LLC (802.2) and the Subnetwork Architecture Protocol (SNAP) frame types.FIGURE 1.12 802.2 and SNAP 802.2 (SNAP) 1 1 1 or 2 3 2 Variable Dest SAP Source SAP Ctrl 03 OUI ID Type Data AA AA 802.2 (SAP) 1 1 1 or 2 Variable Dest Source Ctrl Data SAP SAP Figure 1.12 shows how the LLC header information is added to the data portion of the frame. Now, let’s take a look at an 802.2 frame and SNAP captured from our analyzer. 802.2 Frame The following is an 802.2 frame captured with a protocol analyzer. Notice that the first frame has a length field, so it’s probably an 802.3, right? But look again; it also has a DSAP and an SSAP, so it has to be an 802.2 frame. (Remember that an 802.2 frame is an 802.3 frame with the LLC information Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 72. 28 Chapter 1 Internetworking in the data field of the header, so we know what the upper-layer protocol is.) Here is the frame: Flags: 0x80 802.3 Status: 0x02 Truncated Packet Length:64 Slice Length: 51 Timestamp: 12:42:00.592000 03/26/1998 Destination: ff:ff:ff:ff:ff:ff Ethernet Broadcast Source: 00:80:c7:a8:f0:3d LLC Length: 37 Dest. SAP: 0xe0 NetWare Source SAP: 0xe0 NetWare Individual LLC Sublayer Management Function Command: 0x03 Unnumbered Information SNAP Frame The SNAP frame has its own protocol field to identify the upper-layer pro- tocol. This is really a way to allow an Ethernet_II frame to be used in an 802.3 frame. Even though the following network trace shows a protocol field, it is really an Ethernet_II type (ether-type) field. Flags: 0x80 802.3 Status: 0x00 Packet Length:78 Timestamp: 09:32:48.264000 01/04/2000 802.3 Header Destination: 09:00:07:FF:FF:FF AT Ph 2 Broadcast Source: 00:00:86:10:C1:6F LLC Length: 60 802.2 Logical Link Control (LLC) Header Dest. SAP: 0xAA SNAP Source SAP: 0xAA SNAP Command: 0x03 Unnumbered Information Protocol: 0x080007809B AppleTalk Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 73. Ethernet Networking 29 You can identify a SNAP frame because the DSAP and SSAP fields are always AA, and the command field is always 3. The reason this frame type was created is because not all protocols worked well with the 802.3 Ethernet frame, which didn’t have an ether-type field. To allow the proprietary pro- tocols created by application developers to be used in the LLC frame, the IEEE defined the SNAP format. It is not used that often and is mostly seen only with AppleTalk and proprietary frames. Cisco uses a SNAP frame with their proprietary protocol Cisco Discovery Protocol (CDP), which is covered in Chapter 7.Ethernet at the Physical Layer In a shared-hub Ethernet environment, if one station sends a frame, then all devices must synchronize to the digital signal being transmitted and extract the frame from the wire. All devices that use the same physical media and lis- ten to each frame are considered to be in the same collision domain. This means that only one device can transmit at any given time, and any other device on the network segment must synchronize with the signal and extract the frame. If two stations try to transmit at the same time, a collision will occur. In 1984, the IEEE Ethernet committee released the Carrier Sense Mul- tiple Access with Collision Detect (CSMA/CD) protocol. This basically tells all stations to constantly listen for any other device trying to transmit at the same time they are and to stop and wait for a predetermined time if they do sense a collision. Ethernet uses a bus topology, which means that whenever a device trans- mits, the signal must run from one end of the segment to the other. Ethernet also defined baseband technology, which means that when a station does transmit, it will use the entire bandwidth on the wire and will not share it. Here are the original IEEE 802.3 standards: 10Base2 10Mbps, baseband technology, up to 185 meters in length. Known as thinnet and can support up to 30 workstations on a single seg- ment. 10Base5 10Mbps, baseband technology, up to 500 meters in length. Known as thicknet. 10BaseT 10Mbps using category-3 twisted-pair wiring. Unlike the 10Base2 and 10Base5 networks, each device must connect into a hub or switch, and you can only have one host per segment or wire. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 74. 30 Chapter 1 Internetworking Each of the 802.3 standards defines an Attachment Unit Interface (AUI), which allows a one-bit-at-a-time transfer to the Physical layer from the Data Link media access method. This allows the MAC to remain constant but means the Physical layer can support any existing and new technologies. The original AUI interface was a 15-pin connector, which allowed a transceiver (transmitter/receiver) that provided a 15-pin–to–twisted-pair conversion. Typically, the AUI has a built-in transceiver, and the connections are now usually just RJ-45 connections. However, the AUI interface cannot support 100Mbps Ethernet because of the high frequencies involved. 100BaseT needed a new interface, and the 802.3u specifications created one called the Media Independent Interface (MII), which provides 100Mbps throughput. The MII uses a nibble, which is defined as four bits. Gigabit Ethernet uses a Gigabit Media Independent Interface (GMII), which is eight bits at a time.Data Encapsulation W hen a host transmits data across a network to another device, the data is encapsulated with protocol information at each layer of the OSI model. Each layer communicates only with its peer layer on the receiving device. To communicate and exchange information, each layer uses what are called Protocol Data Units (PDUs). These hold the control information attached to the data at each layer of the model, which is typically attached to the header of the data field but can also be in the trailer, or end of the data field. Each PDU is attached to the data by encapsulating it at each layer of the OSI model. Each PDU has a specific name depending on the information each header has. This PDU information is only read by the peer layer on the receiving device and then is stripped off and the data is handed to the next upper layer. Figure 1.13 shows the PDUs and how they attach control information to each layer. This figure shows how the upper-layer user data is converted for trans- mission on the network. The data stream is then handed down to the Trans- port layer, which sets up a virtual circuit to the receiving device by sending a synch packet. The data stream is then broken up into smaller pieces, and a Transport layer header (PDU) is created and called a segment. The header control information is attached to the header of the data field. Each segment Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 75. Data Encapsulation 31 is sequenced so the data stream can be put back together on the receiving side exactly as transmitted.FIGURE 1.13 Data encapsulation Application PDU Presentation Upper layer data Session TCP header Upper layer data Transport Segment IP header Data Network Packet LLC header Data FCS Data Link Frame MAC header Data FCS 0101110101001000010 Physical Bits Each segment is then handed to the Network layer for network addressing and routing through an internetwork. Logical addressing, for example, IP, is used to get each segment to the correct network. The Network-layer proto- col adds a control header to the segment handed down from the Transport layer, and it is now called a packet or datagram. Remember that the Trans- port and Network layers work together to rebuild a data stream on a receiv- ing host. However, they have no responsibility for placing their PDUs on a local network segment, which is the only way to get the information to a router or host. The Data Link layer is responsible for taking packets from the Network layer and placing them on the network medium (cable or wireless). The Data Link layer encapsulates each packet in a frame, and the frame’s header car- ries the hardware address of the source and destination hosts. If the device is on a remote network, then the frame is sent to a router to be routed through an internetwork. Once it gets to the destination network, a new frame is used to get the packet to the destination host. To put this frame on the network, it must first be put into a digital signal. Since a frame is really a logical group of 1s and 0s, the Physical layer is responsible for encapsulating these digits into a digital signal, which is read Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 76. 32 Chapter 1 Internetworking by devices on the same local network. The receiving devices will synchronize on the digital signal and extract the 1s and 0s from the digital signal. At this point the devices build the frames, run a cyclic redundancy check (CRC), and then check their answer against the answer in the frame’s FCS field. If it matches, the packet is pulled from the frame, and the frame is discarded. This process is called de-encapsulation. The packet is handed to the Network layer, where the address is checked. If the address matches, the segment is pulled from the packet, and the packet is discarded. The segment is processed at the Transport layer, which rebuilds the data stream and acknowledges to the transmitting station that it received each piece. It then happily hands the data stream to the upper-layer application. At a transmitting device, the data encapsulation method works as follows: 1. User information is converted to data for transmission on the network. 2. Data is converted to segments and a reliable connection is set up between the transmitting and receiving hosts. 3. Segments are converted to packets or datagrams, and a logical address is placed in the header so each packet can be routed through an inter- network. 4. Packets or datagrams are converted to frames for transmission on the local network. Hardware (Ethernet) addresses are used to uniquely identify hosts on a local network segment. 5. Frames are converted to bits, and a digital encoding and clocking scheme is used.The Cisco Three-Layer Hierarchical Model M ost of us were exposed to hierarchy early in life. Anyone with older siblings learned what it was like to be at the bottom of the hierarchy! Regard- less of where you first discovered hierarchy, today most of us experience it in many aspects of our lives. Hierarchy helps us understand where things belong, how things fit together, and what functions go where. It brings order and understandability to otherwise complex models. If you want a pay raise, Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 77. The Cisco Three-Layer Hierarchical Model 33 for instance, hierarchy dictates that you ask your boss, not your subordinate. That is the person whose role it is to grant (or deny) your request. Hierarchy has many of the same benefits in network design that it does in other areas of life. When used properly, it makes networks more predictable. It helps us define at which levels of hierarchy we should perform certain functions. Likewise, you can use tools such as access lists at certain levels in hierarchical networks and avoid them at others. Let’s face it, large networks can be extremely complicated, with multiple protocols, detailed configurations, and diverse technologies. Hierarchy helps us summarize a complex collection of details into an understandable model. Then, as specific configurations are needed, the model dictates the appropri- ate manner to apply them. The Cisco hierarchical model can help you design, implement, and main- tain a scalable, reliable, cost-effective hierarchical internetwork. Cisco defines three layers of hierarchy, as shown in Figure 1.14, each with specific functions.FIGURE 1.14 The Cisco hierarchical model Core layer Distribution layer Access layer The following are the three layers: The Core layer The Distribution layer The Access layer Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 78. 34 Chapter 1 Internetworking Each layer has specific responsibilities. Remember, however, that the three layers are logical and are not necessarily physical devices. Consider the OSI model, another logical hierarchy. The seven layers describe functions but not necessarily protocols, right? Sometimes a protocol maps to more than one layer of the OSI model, and sometimes multiple protocols commu- nicate within a single layer. In the same way, when we build physical imple- mentations of hierarchical networks, we may have many devices in a single layer, or we might have a single device performing functions at two layers. The definition of the layers is logical, not physical. Before you learn about these layers and their functions, consider a com- mon hierarchical design as shown in Figure 1.15. The phrase “keep local traffic local” has almost become a cliché in the networking world; however, the underlying concept has merit. Hierarchical design lends itself perfectly to fulfilling this concept. Now, let’s take a closer look at each of the layers. FIGURE 1.15 Hierarchical network design Core layer FDDI Ring Distribution layer Access layer Workgroups Users’ machines Users’ machines Users’ machines Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 79. The Cisco Three-Layer Hierarchical Model 35The Core Layer The core layer is literally the core of the network. At the top of the hierarchy, the core layer is responsible for transporting large amounts of traffic both reli- ably and quickly. The only purpose of the network’s core layer is to switch traffic as fast as possible. The traffic transported across the core is common to a majority of users. However, remember that user data is processed at the dis- tribution layer, which forwards the requests to the core if needed. If there is a failure in the core, every single user can be affected. Therefore, fault tolerance at this layer is an issue. The core is likely to see large volumes of traffic, so speed and latency are driving concerns here. Given the function of the core, we can now consider some design specifics. Let’s start with some things we don’t want to do. Don’t do anything to slow down traffic. This includes using access lists, routing between virtual local area networks (VLANs), and packet filtering. Don’t support workgroup access here. Avoid expanding the core when the internetwork grows (i.e., adding routers). If performance becomes an issue in the core, give preference to upgrades over expansion. Now, there are a few things that we want to do as we design the core. They include the following: Design the core for high reliability. Consider data-link technologies that facilitate both speed and redundancy, such as FDDI, Fast Ether- net (with redundant links), or even ATM. Design with speed in mind. The core should have very little latency. Select routing protocols with lower convergence times. Fast and redundant data-link connectivity is no help if your routing tables are shot!The Distribution Layer The distribution layer is sometimes referred to as the workgroup layer and is the communication point between the access layer and the core. The pri- mary function of the distribution layer is to provide routing, filtering, and WAN access and to determine how packets can access the core, if needed. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 80. 36 Chapter 1 Internetworking The distribution layer must determine the fastest way that network service requests are handled; for example, how a file request is forwarded to a server. After the distribution layer determines the best path, it forwards the request to the core layer. The core layer then quickly transports the request to the correct service. The distribution layer is the place to implement policies for the network. Here you can exercise considerable flexibility in defining network operation. There are several items that generally should be done at the distribution layer. They include the following: Implementation of tools such as access lists, of packet filtering, and of queuing Implementation of security and network policies, including address translation and firewalls Redistribution between routing protocols, including static routing Routing between VLANs and other workgroup support functions Definitions of broadcast and multicast domains Things to avoid at the distribution layer are limited to those functions that exclusively belong to one of the other layers. The Access Layer The access layer controls user and workgroup access to internetwork resources. The access layer is sometimes referred to as the desktop layer. The network resources most users need will be available locally. The distribution layer handles any traffic for remote services. The following are some of the functions to be included at the access layer: Continued (from distribution layer) access control and policies Creation of separate collision domains (segmentation) Workgroup connectivity into the distribution layer Technologies such as DDR and Ethernet switching are frequently seen in the access layer. Static routing (instead of dynamic routing protocols) is seen here as well. As already noted, three separate levels does not imply three separate routers. It could be fewer, or it could be more. Remember, this is a layered approach. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 81. Assembling and Cabling Cisco Devices 37Assembling and Cabling Cisco Devices In this section, I’ll address the corporate environment and the different types of cabling required to connect an internetwork. To understand the types of cabling used to assemble and cable Cisco devices, you need to understand the LAN Physical layer implementation of Ethernet. Ethernet is a media access method that is specified at the Data Link layer and uses specific Physical layer cabling and signaling techniques. It is impor- tant to be able to differentiate between the types of connectors that can be used to connect an Ethernet network together. I’ll discuss the different unshielded twisted-pair cabling used today in an Ethernet LAN. Cabling the Ethernet Local Area Network Ethernet was first implemented by a group called DIX (Digital, Intel, and Xerox). They created and implemented the first Ethernet LAN specification, which the IEEE used to create the IEEE 802.3 committee. This was a 10Mbps network that ran on coax, twisted-pair, and fiber physical media. The IEEE extended the 802.3 committee to two new committees known as 802.3u (FastEthernet) and 802.3q (Gigabit Ethernet). These are both specified on twisted-pair and fiber physical media. Figure 1.16 shows the IEEE 802.3 and original Ethernet Physical layer specifications.FIGURE 1.16 Ethernet Physical layer specifications Data Link 802.3 (MAC layer) Ethernet 100BaseTX 100BaseFX 100BaseT4 10Base2 10Base5 10BaseT 10BaseF Physical When designing your LAN, it is important to understand the different types of Ethernet media available. It would certainly be great to run Gigabit Ethernet to each desktop and 10Gbps between switches, and although this might happen one day, it is unrealistic to think you can justify the cost of that network today. By mixing and matching the different types of Ethernet Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 82. 38 Chapter 1 Internetworking media methods today, you can create a cost-effective network that works great. The following bullet points provide a general understanding of where you can use the different Ethernet media in your hierarchical network: Use 10Mbps switches at the access layer to provide good performance at a low price. 100Mbps links can be used for high-bandwidth– consuming clients or servers. No servers should be at 10Mbps if possible. Use FastEthernet between access layer and distribution layer switches. 10Mbps links would create a bottleneck. Use FastEthernet (or Gigabit if applicable) between distribution layer switches and the core. Also, you should be implementing the fastest media you can afford between the core switches. Dual links between distribution and core switches are recommended for redundancy and load balancing. Ethernet Media and Connector Requirements It’s important to understand the difference between the media access speeds Ethernet provides. However, it’s also important to understand the connector requirements for each implementation before making any decision. The EIA/TIA (Electronic Industries Association and the newer Telecom- munications Industry Association) is the standards body that creates the Physical layer specifications for Ethernet. The EIA/TIA specifies that Ether- net use a registered jack (RJ) connector with a 4 5 wiring sequence on unshielded twisted-pair (UTP) cabling (RJ-45). The following bullet points outline the different Ethernet media requirements: 10Base2 50-ohm coax, called thinnet. Up to 185 meters and 30 hosts per segment. Uses a physical and logical bus with AUI connectors. 10Base5 50-ohm coax called thicknet. Up to 500 meters and 208 users per segment. Uses a physical and logical bus with AUI connectors. Up to 2500 meters with repeaters and 1024 users for all segments. 10BaseT EIA/TIA category 3, 4, or 5, using two-pair unshielded twisted-pair (UTP) wiring. One user per segment; up to 100 meters long. Uses an RJ-45 connector with a physical star topology and a logical bus. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 83. Assembling and Cabling Cisco Devices 39 100BaseTX EIA/TIA category 5, 6, or 7 UTP two-pair wiring. One user per segment; up to 100 meters long. Uses an RJ-45 MII connector with a physical star topology and a logical bus. 100BaseFX Uses fiber cabling 62.5/125-micron multimode fiber. Point- to-point topology; up to 400 meters long. Uses an ST or SC connector, which are duplex media-interface connectors. 1000BaseCX Copper shielded twisted-pair that can only run up to 25 meters. 1000BaseT Category 5, four-pair UTP wiring up to 100 meters long. 1000BaseSX MMF using 62.5 and 50-micron core; uses a 780-nanometer laser and can go up to 260 meters. 1000BaseLX Single-mode fiber that uses a 9-micron core, 1300-nanometer laser and can go from 3 km up to 10 km. 100VG-AnyLAN is a twisted-pair technology that was the first 100Mbps LAN. However, since it was incompatible with Ethernet signaling techniques (it used a polling media access method), it was not typically used and is essen- tially dead.UTP Connections (RJ-45) The RJ-45 connector is clear so you can see the eight colored wires that con- nect to the connector’s pins. These wires are twisted into four pairs. Four wires (two pairs) carry the voltage and are considered tip. The other four wires are grounded and are called ring. The RJ-45 connector is crimped onto the end of the wire, and the pin locations of the connector are numbered from the left, 8 to 1. Figure 1.17 shows a UTP cable with an RJ-45 connector attached. The UTP cable has twisted wires inside that eliminate cross talk. Unshielded cable can be used since digital signal protection comes from the twists in the wire. The more twists per inch, the farther the digital signal can supposedly travel without interference. For example, categories 5 and 6 have many more twists per inch than category 3 UTP does. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 84. 40 Chapter 1 Internetworking FIGURE 1.17 UTP wire with an RJ-45 connector attached Wire Pair (T Is Tip; Pin R Is Ring) 1 Pair 2 T2 2 Pair 2 R2 3 Pair 3 T3 4 Pair 1 R1 8 5 Pair 1 T1 1 6 Pair 3 R3 7 Pair 4 T4 RJ-45 connector 8 Pair 4 R4 Different types of wiring are used when building internetworks. You will need to use either a straight-through or crossover cable. Straight-Through In a UTP implementation of a straight-through cable, the wires on both cable ends are in the same order. Figure 1.18 shows the pinouts of the straight- through cable. FIGURE 1.18 UTP straight-through pinouts Hub/Switch Server/Router Pin Label Pin Label 1 RD+ 1 TD+ 2 RD– 2 TD– 3 TD+ 3 RD+ 4 NC 4 NC 5 NC 5 NC 6 TD– 6 RD– 7 NC 7 NC 8 NC 8 NC Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 85. Assembling and Cabling Cisco Devices 41 You can determine that the wiring is a straight-through cable by holding both ends of the UTP cable side by side and seeing that the order of the wires on both ends is identical. You can use a straight-through cable for the following tasks: Connecting a router to a hub or switch Connecting a server to a hub or switch Connecting workstations to a hub or switch Crossover In the implementation of a crossover, the wires on each end of the cable are crossed. Transmit to Receive and Receive to Transmit on each side, for both tip and ring. Figure 1.19 shows the UTP crossover implementation.FIGURE 1.19 UTP crossover implementation Hub/Switch Hub/Switch Pin Label Pin Label 1 RD+ 1 RD+ 2 RD– 2 RD– 3 TD+ 3 TD+ 4 NC 4 NC 5 NC 5 NC 6 TD– 6 TD– 7 NC 7 NC 8 NC 8 NC Notice that pin 1 on one side connects to pin 3 on the other side, and pin 2 connects to pin 6 on the opposite end. You can use a crossover cable for the following tasks: Connecting uplinks between switches Connecting hubs to switches Connecting a hub to another hub Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 86. 42 Chapter 1 Internetworking Connecting a router interface to another router interface Connecting two PCs together without a hub or switch When trying to determine the type of cable needed for a port, look at the port and see if it is marked with an “X.” Use a straight-through cable when only one port is designated with an “X.” Use a crossover when both ports are des- ignated with an “X” or when neither port has an “X.” Cabling the Wide Area Network To connect your wide area network (WAN), you need to understand the WAN Physical layer implementation provided by Cisco as well as the differ- ent WAN serial connectors. In this section, I will give you that information, along with the cabling requirements for ISDN BRI connections. Cisco serial connections support almost any type of WAN service. The typical WAN connections are dedicated leased lines using High-Level Data Link Control (HDLC), Point-to-Point Protocol (PPP), Integrated Services Digital Network (ISDN), and Frame Relay. Typical speeds are anywhere from 2400bps to 1.544Mbps (T1). All of these WAN types are discussed in detail in Chapter 10. HDLC, PPP, and Frame Relay can use the same Physical layer specifica- tions, but ISDN has different pinouts and specifications at the Physical layer. Serial Transmission WAN serial connectors use serial transmission, which is one bit at a time, over a single channel. Parallel transmission can pass at least 8 bits at a time. All WANs use serial transmission. Cisco routers use a proprietary 60-pin serial connector, which you must buy from Cisco or a provider of Cisco equipment. The type of connector you have on the other end of the cable depends on your service provider or end-device requirements. The different ends available are EIA/TIA-232, EIA/TIA-449, V.35 (used to connect to a CSU/DSU), X.21 (used in X.25), and EIA-530. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 87. Assembling and Cabling Cisco Devices 43 Serial links are described in frequency or cycles-per-second (hertz). The amount of data that can be carried within these frequencies is called band- width. Bandwidth is the amount of data in bits-per-second that the serial channel can carry. Data Terminal Equipment and Data Communication Equipment Router interfaces are, by default, Data Terminal Equipment (DTE) and con- nect into Data Communication Equipment (DCE), for example, a Channel Service Unit/Data Service Unit (CSU/DSU). The CSU/DSU then plugs into a demarcation location (demarc) and is the service provider’s last responsibil- ity. Typically, the demarc is a jack that has an RJ-45 female connector located close to your equipment. If you report a problem to your service pro- vider, they’ll always tell you it tests fine up to the demarc and that the prob- lem must be the CPE, or Customer Premise Equipment, which is your responsibility. The idea behind a WAN is to be able to connect two DTE networks together through a DCE network. The DCE network includes the CSU/DSU, through the provider’s wiring and switches, all the way to the CSU/DSU at the other end. The network’s DCE device provides clocking to the DTE- connected interface (the router’s serial interface). Fixed and Modular Interfaces Some routers Cisco sells have fixed interfaces, while others are modular. The fixed routers, such as the 2500 series, have set interfaces that can’t be changed. The 2501 router has two serial connections and one 10BaseT AUI interface. If you need to add a third serial interface, then you need to buy a new router—ouch! However, the 1600, 1700, 2600, 3600, and higher rout- ers have modular interfaces that allow you to buy what you need now and add almost any type of interface you may need later. The 1600 and 1700 are limited and have both fixed and modular ports, but the 2600 and up provide many serials, FastEthernet, and even voice-module availability. Integrated Services Digital Network (ISDN) Connections Integrated Services Digital Network (ISDN) Basic Rate Interface (BRI) is two B (Bearer) channels of 64k each and one D (Data) channel of 16k for sig- naling and clocking.Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 88. 44 Chapter 1 Internetworking ISDN BRI routers come with either a U interface or what is known as an S/T interface. The difference between the two is that the U interface is already a two-wire ISDN convention that can plug right into the ISDN local loop. The S/T interface is a four-wire interface and needs a Network Termi- nation type 1 (NT 1) to convert from a four-wire to the two-wire ISDN specification. ISDN is covered in depth in Chapter 10. The U interface has a built-in NT 1 device. If your service provider uses an NT 1 device, then you need to buy a router that has an S/T interface. Most Cisco router BRI interfaces are marked with a U or an S/T. When in doubt, ask Cisco or the salesperson you bought it from. Primary Rate Interface (PRI) provides T1 speeds (1.544Mbps) in the U.S. and E1 speeds (2.048) in Europe. PRI is not discussed further in this course. The ISDN BRI interface uses an RJ-45, category 5, straight-through cable. It is important to avoid plugging a console cable or other LAN cable into a BRI interface on a router, because it will probably ruin the interface. Cisco says it will ruin it, but I have students do it every week and haven’t lost one yet (I probably shouldn’t have said that…now I will probably lose one next week). Console Connections All Cisco devices are shipped with console cables and connectors, which allow you to connect to a device and configure, verify, and monitor it. The cable used to connect between a PC is a rollover cable with RJ-45 connectors. The pinouts for a rollover cable are as follows: 1–8 2–7 3–6 4–5 5–4 Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 89. Selecting Cisco Products 45 6–3 7–2 8–1 You can see that you just take a straight-through RJ-45 cable, cut the end off, flip it over, and reattach a new connector. Typically, you will use the DB9 connector to attach to your PC and use a com port to communicate via HyperTerminal. Most Cisco devices now sup- port RJ-45 console connections. However, the Catalyst 5000 series switch still uses a DB25 connector. Set up the terminal emulation program to run 9600bps, 8 data bits, no parity, 1 stop bit, and no flow control. On some routers, you need to verify that the terminal emulation program is emulating a VT100 dumb-terminal mode, not an auto-sense mode, or it won’t work. Most routers also have an aux port, which is an auxiliary port used to connect a modem. You can then dial this modem and connect the router to the aux port. This will give you console access to a remote router that might be down and that you cannot telnet into. The console port and aux port are considered out-of-band management since you are configuring the router “out of the network.” Telnet is considered in-band.Selecting Cisco Products Y ou can use the Cisco three-layer model to determine what type of product to buy for your internetwork. By understanding the services required at each layer and what functions the internetworking devices per- form, you can then match Cisco products to your business requirements. To select the correct Cisco products for your network, start by gathering infor- mation about where devices need to operate in the internetworking hierar- chy, and then consider issues like ease of installation, port-capacity requirements, and other features. If you have remote offices or other WAN needs, you need to first find out what type of service is available. It won’t do you any good to design a large Frame Relay network only to discover that Frame Relay is only supported in half the locations you need. After you research and find out about the Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 90. 46 Chapter 1 Internetworking different options available through your service provider, you can choose the Cisco product that fits your business requirements. You have a few options, typically: dial-up asynchronous connections, leased lines up to 1.544Mbps, Frame Relay, and ISDN, which are the most popular WAN technologies. However, xDSL is the new front-runner to take over as the fastest, most reliable, cheapest WAN technology. You need to consider your usage before buying and implementing a technology. For example, if your users at a remote branch are connected to the corporate office more than three to four hours a day, then you need either Frame Relay or a leased line. If they connect infrequently, then you might get away with ISDN or dial-up connectivity. The next sections discuss the different types of Cisco hubs, routers, and switches you can use to build a hierarchical network. Cisco Hubs It is hard for me to imagine that you would call Cisco and ask to buy a hub, but I suppose it does happen or they wouldn’t be selling them. Cisco actually has an extensive listing of hubs that address an amazing variety of selection issues. Before you buy any hub, you need to know—not think you know, but actually know—which users can use a shared 10Mbps or shared 100Mbps network. The lower-end model of hubs Cisco offers supports only 10Mbps, while the middle-of-the-road one offers both 10- and 100Mbps auto-sensing ports. The higher-end hubs offer network-management port and console connections. If you are going to spend enough to buy a high-end hub, you should consider just buying a switch. Figure 1.20 shows the different hub products Cisco offers. Any of these hubs can be stacked together to give you more port density. These are the selection issues you need to know: Business requirements for 10- or 100Mbps Port density Management Ease of operation Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 91. Selecting Cisco Products 47FIGURE 1.20 Cisco hub products Cisco FastHub400 Cisco FastHub300 Cisco FastHub200 Cisco FastHub100 Cisco 1528 Micro Hub 10/100 Cisco 1500 Micro Hub Cisco Routers When you think of Cisco, what do you think of first? Hubs? I don’t think so. You think of routers, of course. Cisco makes the best routers in the world. Everyone knows this, and it is also one of the reasons you are even reading this book. It seems as though Cisco comes out with a new router almost every month. It is hard to keep up with their new offerings. A key criterion when selecting router products is knowing what feature sets you need to meet your business requirements. For example, do you need IP, Frame Relay, and VPN support? How about IPX, AppleTalk, and DECnet? Cisco has it all. The other features you need to think about when considering different product-selection criteria are port density and interface speeds. As you get into the higher-end models, you see more ports and faster speeds. For exam- ple, the new 12000 series model is Cisco’s first gigabit switch and has enor- mous capability and functionality. Copyright ©2000 SYBEX , Inc., Alameda, CA www.sybex.com
  • 92. 48 Chapter 1 Internetworking You can tell how much a product is going to cost by looking at the model number. A stripped-down 12000 series switch with no cards or power sup- plies starts at about $12,000. The price can end up at well over $100,000 for a loaded system. Seems like a loaded 12000 series system would be great for my little home network. You also need to think about WAN support when buying a router. You can get anything you want in a Cisco router, but you just have to be familiar with the service provided for your area. Figure 1.21 shows some of the router products Cisco sells. FIGURE 1.21 Cisco router products Cisco 12000 GSR series Cisco 7000 series Cisco 4000 series AS 5000 series Cisco 3600 series Central site solutions Cisco 2600 series Cisco