Download - 002 - CCNA DAY 1-a
-
7/30/2019 002 - CCNA DAY 1-a
1/176
CCNA BOOT CAMP
CCNA 1PART 1
-
7/30/2019 002 - CCNA DAY 1-a
2/176
Data Networks
2
Businesses needed a solution that would successfullyaddress the following three problems:
Duplication of equipment and resources Implementation of effective communication Network management
Businesses realized that networking technology could
increase productivity while saving money.
-
7/30/2019 002 - CCNA DAY 1-a
3/176
What are the components of a network ?
3
Main OfficeBranch Office
HomeOffice
MobileUsers
Internet
-
7/30/2019 002 - CCNA DAY 1-a
4/176
Devices in Data Networks
4
End-user devicesDevices that provide services directly to the user.(computers, printers, scanners, etc.)
Network devicesDevices that connect the end-user devicestogether.(routers, switches, hubs, etc.)
-
7/30/2019 002 - CCNA DAY 1-a
5/176
Network Interface Card
5
A NIC card is a printed circuit board that providesnetwork communication capabilities to and from apersonal computer.
Also known as LAN adapter.
-
7/30/2019 002 - CCNA DAY 1-a
6/176
Network Topology
6
Network TopologyDefines the structure of the network.
Network Topology Types
Physical TopologyActual layout of the wire or media.
Logical TopologyDefines how the media is accessed by the hostsfor sending data.
-
7/30/2019 002 - CCNA DAY 1-a
7/176
Physical and Logical Topology
7
Media Type Physical Topology Logical Topology
Ethernet Bus, Star, Point to Point Bus
FDDI Ring Ring
Token Ring Star Ring
-
7/30/2019 002 - CCNA DAY 1-a
8/176
Bus Topology
8
Uses a single backbone cable that is terminated at bothends.
All the hosts connect directly to this backbone.
-
7/30/2019 002 - CCNA DAY 1-a
9/176
Ring Topology
9
Connects one host to the next and the last host to the first.
This creates a physical ring of cable.
-
7/30/2019 002 - CCNA DAY 1-a
10/176
Star Topology
10
Connects all cables to a central point of concentration.
-
7/30/2019 002 - CCNA DAY 1-a
11/176
Extended Star Topology
11
Links individual stars together by connecting the hubsand/or switches.
-
7/30/2019 002 - CCNA DAY 1-a
12/176
Mesh Topology
12
Implemented to provide as much protection as possiblefrom interruption of service.
Each host has its own connections to all other hosts.
Although the Internet has multiple paths to any onelocation, it does not adopt the full mesh topology.
-
7/30/2019 002 - CCNA DAY 1-a
13/176
LANs, MANs and WANs
13
One early solution was the creation of LAN standardswhich provided an open set of guidelines for creatingnetwork hardware and software, making equipment
from different companies compatible.
What was needed was a way for information to moveefficiently and quickly, not only within a company, butalso from one business to another.
The solution was the creation of metropolitan-areanetworks (MANs) and wide-area networks (WANs).
-
7/30/2019 002 - CCNA DAY 1-a
14/176
LANs
Operate within a limited
geographic area
Allow multi-access to highbandwidth media
Control the network privatelyunder local administration
Provide full-time connectivity
to local services
Connect physically adjacentdevices
14
-
7/30/2019 002 - CCNA DAY 1-a
15/176
WANs
Operate within a large
geographic area
Allow access over serialinterfaces operating at lowerspeeds
Provide full-time and part-time connectivity
Connect devices separatedover wide, even global areas
15
-
7/30/2019 002 - CCNA DAY 1-a
16/176
VPNs
16
A VPN is a private network that is constructed within a public
network infrastructure such as the global Internet. Using VPN, atelecommuter can access the network of the companyheadquarters through the Internet by building a secure tunnelbetween the telecommuters PC and a VPN router in theheadquarters.
-
7/30/2019 002 - CCNA DAY 1-a
17/176
Bandwidth
17
-
7/30/2019 002 - CCNA DAY 1-a
18/176
Measuring Bandwidth
18
-
7/30/2019 002 - CCNA DAY 1-a
19/17619
-
7/30/2019 002 - CCNA DAY 1-a
20/176
Why do we need the OSI Model?
20
To address the problem of networks increasing in sizeand in number, the International Organization forStandardization (ISO) researched many network schemesand recognized that there was a need to create anetwork model .
This would help network builders implement networksthat could communicate and work together
ISO therefore, released the OSI reference model in 1984.
-
7/30/2019 002 - CCNA DAY 1-a
21/176
Dont Get Confused.
21
ISO - International Organization for Standardization
OSI- Open System Interconnection
*IOS - Internetwork Operating System
To avoid confusion, some people say International
Standard Organization.
*As of June 2010, the trademark of the term iOS nowbelongs to Apple.
-
7/30/2019 002 - CCNA DAY 1-a
22/176
The OSI Reference Model
22
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link1 Physical
The OSI Model will be usedthroughout your entirenetworking career!
Memorize it!
-
7/30/2019 002 - CCNA DAY 1-a
23/176
OSI Model
23
Data FlowLayers
Transport
Data-Link
Network
Physical
Application(Upper)Layers
Session
Presentation
Application
-
7/30/2019 002 - CCNA DAY 1-a
24/176
Layer 7 - The Application Layer
24
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link1 Physical
Deals with networkingapplications.
Examples:EmailWeb browsers
PDU: User Data
Question: What is a PDU?
-
7/30/2019 002 - CCNA DAY 1-a
25/176
Layer 6 - The Presentation Layer
25
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link1 Physical
Responsible for presenting thedata in the required format whichmay include:
Code FormattingEncryptionCompression
PDU: Formatted Data
-
7/30/2019 002 - CCNA DAY 1-a
26/176
Layer 5 - The Session Layer
26
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link1 Physical
This layer establishes, manages,and terminates sessions between twocommunicating hosts.
Creates Virtual Circuit
Coordinates communicationbetween systems
Organize their communication byoffering three different modes:
SimplexHalf DuplexFull Duplex
PDU: Formatted Data
-
7/30/2019 002 - CCNA DAY 1-a
27/176
Half Duplex
It uses only one wire pair with a digital signal running in both
directions on the wire.
uses the CSMA/CD protocol to help prevent collisions and topermit retransmitting if a collision does occur.
If a hub is attached to a switch, it must operate in half-duplexmode.
Half-duplex Ethernet (typically 10BaseT) is only about 30 to 40
percent efficient because a large 10BaseT network will usuallyonly give you 3 to 4Mbpsat most.
27
-
7/30/2019 002 - CCNA DAY 1-a
28/176
Full Duplex
28
Full duplex, in twisted-pair cabling, uses two pairs of wire forsimultaneous transmission and reception.
-
7/30/2019 002 - CCNA DAY 1-a
29/176
Layer 4 - The Transport Layer
29
7 Application
6 Presentation
5 Session
4 Transport
3 Network
2 Data Link1 Physical
This layer breaks up the data fromthe sending host and thenreassembles it in the receiver.
It also is used to insure reliable datatransport across the network.
Can be reliable or unreliable
Sequencing, Acknowledgment,Retransmission, Flow Control
PDU: Segments
-
7/30/2019 002 - CCNA DAY 1-a
30/176
Layer 4 : Transport Layer
30
Distinguishes betweenupper-layer applications
Establishes end-to-endconnectivity betweenapplications
Defines flow control
Provides reliable orunreliable services fordata transfer
N
etwork
IPXIP
Tra
nsport
SPXTCP UDP
-
7/30/2019 002 - CCNA DAY 1-a
31/176
TCP vs UDP
31
-
7/30/2019 002 - CCNA DAY 1-a
32/176
TCP Segment Format
32
Source Port (16) Destination Port (16)
Sequence Number (32)
HeaderLength (4)
Acknowledgment Number (32)
Reserved (6)Code Bits (6) Window (16)
Checksum (16) Urgent (16)
Options (0 or 32 if Any)
Data (Varies)
20
Bytes
Bit 0 Bit 15 Bit 16 Bit 31
-
7/30/2019 002 - CCNA DAY 1-a
33/176
UDP Segment Format
No sequence or acknowledgment fields
33
Source Port (16) Destination Port (16)
Length (16)
Data (if Any)
1Bit 0 Bit 15 Bit 16 Bit 31
Checksum (16)
8Bytes
-
7/30/2019 002 - CCNA DAY 1-a
34/176
Port Numbers
34
TCP
PortNumbers
FT
P
TransportLayer
TE
LNET
DN
S
SN
MP
TF
TP
SM
TP
UDP
Application
Layer
21 23 25 53 69 161
RI
P
520
-
7/30/2019 002 - CCNA DAY 1-a
35/176
TCP Port Numbers
35
Source
Port
Destination
Port
Host A
1028 23
SP DP
Host ZTelnet Z
Destination port = 23.
Send packet to my
Telnet
application.
-
7/30/2019 002 - CCNA DAY 1-a
36/176
TCP Port Numbers
36
-
7/30/2019 002 - CCNA DAY 1-a
37/176
TCP Three-Way Handshake/Open Connection
37
Send SYN(seq = 100 ctl = SYN)
SYN Received
Send SYN, ACK(seq = 300 ack = 101 ctl = syn,ack)
Send ACK(seq = 101 ack = 301
ctl = ack)
Host A Host B
SYN Received
1
2
3
-
7/30/2019 002 - CCNA DAY 1-a
38/176
Reliable Service
38
Synchronize
Acknowledge, Synchronize
Acknowledge
Data Transfer
(Send Segments)
Sender Receiver
Connection Established
O i Cl i C i
-
7/30/2019 002 - CCNA DAY 1-a
39/176
Opening & Closing Connection
39
Wi d i
-
7/30/2019 002 - CCNA DAY 1-a
40/176
Windowing
Windowingin networking means the quantity of data segments
that a machine can transmit/send on the network withoutreceiving an acknowledgement.
Example:
There are two window sizesone set to 1 and one set to 3.
When youve configured a window size of 1, the sendingmachine waits for an acknowledgment for each data segment.
If youve configured a window size of 3, its allowed to transmitthree data segments before an acknowledgment is received.
40
TCP Si l A k l d t
-
7/30/2019 002 - CCNA DAY 1-a
41/176
TCP Simple Acknowledgment
Window Size = 1
41
Sender Receiver
Send 1Receive 1
Receive ACK 2Send ACK 2
Send 2Receive 2
Receive ACK 3Send ACK 3
Send 3 Receive 3
Receive ACK 4 Send ACK 4
Wi d i
-
7/30/2019 002 - CCNA DAY 1-a
42/176
Windowing
42
TCP S d A k l d t N b
-
7/30/2019 002 - CCNA DAY 1-a
43/176
TCP Sequence and Acknowledgment Numbers
43
Source
Port
Destination
Port
Sequence Acknowledgment
1028 23
Source Dest.
11
Seq.
101
Ack.
1028 23
Source Dest.
10
Seq.
100
Ack.
102823Source Dest.
11Seq.100
Ack.
102823
Source Dest.
12
Seq.
101
Ack.
I just got number11, now I need
number 12.
I just
sent number11.
T t L R li bl D li
-
7/30/2019 002 - CCNA DAY 1-a
44/176
Transport Layer Reliable Delivery
44
Fl C t l
-
7/30/2019 002 - CCNA DAY 1-a
45/176
Flow Control
Flow control is used to ensure that networking devices
dont send too much information to the destination,overflowing its receiving buffer space, and causing it todrop the sent information
45
Fl C t l
-
7/30/2019 002 - CCNA DAY 1-a
46/176
Flow Control
46
SEQ 1024SEQ 2048
SEQ 3072
AB
30723
U D t P t l (UDP)
-
7/30/2019 002 - CCNA DAY 1-a
47/176
User Datagram Protocol (UDP)
47
User Datagram Protocol (UDP) is the connectionless transportprotocol in the TCP/IP protocol stack.
UDP is a simple protocol that exchanges datagrams, withoutacknowledgments or guaranteed delivery. Error processing and
retransmission must be handled by higher layer protocols.
Popular UDP protocols:
TFTP (Trivial File Transfer Protocol)
SNMP (Simple Network Management Protocol) DHCP (Dynamic Host Control Protocol) DNS (Domain Name System)
La er 3 The Net ork La er
-
7/30/2019 002 - CCNA DAY 1-a
48/176
Layer 3 - The Network Layer
48
7 Application6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
Sometimes referred to as theCiscoLayer.
End to End Delivery
Provide logical addressing forbest path determination
Internetwork Communication
Packet Filtering and Packet
forwarding
PDU: Packets
Layer 3 : Network Layer
-
7/30/2019 002 - CCNA DAY 1-a
49/176
Layer 3 : Network Layer
49
Defines logical sourceand destination
addresses associatedwith a specific protocol
Defines paths throughnetwork
Network
IP, IPX
Data-Link
Physical
EIA/TIA-232
V.35
802.2
802.3
Layer 3 : (cont )
-
7/30/2019 002 - CCNA DAY 1-a
50/176
Layer 3 : (cont.)
50
DataSourceAddress
DestinationAddress
IP Header
172.15.1.1
Node orHost
Network
LogicalAddress
Network Layer End-Station Packet
Route determination occurs at this layer, so a packet must include a source
and destination address.
Network-layer addresses have two components:a network component for internetwork routing.a node number for a device-specific address.
The example in the figure is an example of an IP packet and IP address.
Layer 3 (cont )
-
7/30/2019 002 - CCNA DAY 1-a
51/176
Layer 3 (cont.)
51
11111111 11111111 00000000 00000000
10101100 00010000 01111010 11001100
BinaryMask
BinaryAddress
172.16.122.204 255.255.0.0
172 16 122 204
255
Address Mask
255 0 0
Network Host
IPv4 Packet Format
-
7/30/2019 002 - CCNA DAY 1-a
52/176
IPv4 Packet Format
52
Version(4)
Destination IP Address (32)
Options (0 or 32 if Any)
Data (Varies if Any)
1Bit 0 Bit 15 Bit 16 Bit 31
HeaderLength (4)
Priority &Typeof Service (8)
Total Length (16)
Identification (16)Flags
(3) Fragment Offset (13)
Time-to-Live (8) Protocol (8) Header Checksum (16)
Source IP Address (32)
20Bytes
Protocol Field
-
7/30/2019 002 - CCNA DAY 1-a
53/176
Protocol Field
Determines destination upper-layer protocol
53
TransportLayer
InternetLayer
TCP UDP
ProtocolNumbers
IP
176
Internet Control Message Protocol
-
7/30/2019 002 - CCNA DAY 1-a
54/176
Internet Control Message Protocol
54
Application
Transport
Internet
Data-Link
Physical
Destination
Unreachable
Echo (Ping)
Other
ICMP 1
Device On Layer 3 Router
-
7/30/2019 002 - CCNA DAY 1-a
55/176
Device On Layer 3 --- Router
55
Broadcast control
Multicast control
Optimal path determination
Traffic management
Logical addressing
Connects to WAN services
Type of Transmission
-
7/30/2019 002 - CCNA DAY 1-a
56/176
Type of Transmission
Unicast
Multicast
Broadcast
56
Type of Transmission
-
7/30/2019 002 - CCNA DAY 1-a
57/176
Type of Transmission
57
Layer 2 The Data Link Layer
-
7/30/2019 002 - CCNA DAY 1-a
58/176
Layer 2 - The Data Link Layer
Preamble DMAC SMAC Data length DATA FCS
58
7 Application6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
Performs Physical Addressing
This layer provides reliable transit ofdata across a physical link.
Combines bits into bytes andbytes into frames
MAC address
Error detection, not correction
LLC and MAC
PDU - Frames
The Ethernet FRAME
-
7/30/2019 002 - CCNA DAY 1-a
59/176
The Ethernet FRAME
59
DataSMAC FCSLengthDMAC
Variable266 4
0000.0C xx.xxxx
VendorAssigned
OUI
MAC Layer802.3
*Preamble
Ethernet II uses
Type here
8
* synchronizes the sender and the receiver** in terms of bytes
Layer 1 - The Physical Layer
-
7/30/2019 002 - CCNA DAY 1-a
60/176
Layer 1 - The Physical Layer
60
7 Application6 Presentation
5 Session
4 Transport
3 Network
2 Data Link
1 Physical
This is the physical mediathrough which the data,represented as electronic signals,is sent from the source host tothe destination host.
Move bits between devicesEncoding
PDU - Bits
Physical Layer
-
7/30/2019 002 - CCNA DAY 1-a
61/176
Physical Layer
61
Defines
Media type
Connector type
Signaling type
802.3
Physical
802.3 is responsible for LANs based on the carrier sense multiple accesscollision detect (CSMA/CD) access methodology. Ethernet is an exampleof a CSMA/CD network.
Physical Layer: Ethernet/802 3
-
7/30/2019 002 - CCNA DAY 1-a
62/176
Physical Layer: Ethernet/802.3
62
Hub
Hosts
Host
10Base2Thin Ethernet10Base5Thick Ethernet
10BaseTTwisted Pair
Data Encapsulation
-
7/30/2019 002 - CCNA DAY 1-a
63/176
Data Encapsulation
63
Transport
Data-Link
Physical
Network
Upper-Layer Data
Upper-Layer DataTCP Header
DataIP Header
DataLLC Header
0101110101001000010
DataMAC Header
Presentation
Application
Session
Segment
Packet
Bits
Frame
PDU
FCS
FCS
Data Encapsulation
-
7/30/2019 002 - CCNA DAY 1-a
64/176
Data Encapsulation
64
Cisco Icons and Symbols
-
7/30/2019 002 - CCNA DAY 1-a
65/176
Cisco Icons and Symbols
78
Devices associated in Each Layer
-
7/30/2019 002 - CCNA DAY 1-a
66/176
Devices associated in Each Layer
Layer Device Broadcast Domain Collision Domain
3 Router ? ?
2 Switch ? ?
1 Hub ? ?
79
Broadcast Domain
-
7/30/2019 002 - CCNA DAY 1-a
67/176
Broadcast Domain
Encompasses a group of devices receiving broadcast
frames initiating from any device within the group.
Routers do not forward broadcast frames, broadcastsare not forwarded from one broadcast domain to
another.
80
Collision Domain
-
7/30/2019 002 - CCNA DAY 1-a
68/176
Collision Domain
The network area in Ethernet over which collision of
frames are expected to transpire.
extended by hubs and repeaters.
divided by switches, routers, or bridges
Q: Which is better, a network with 10 collision domains ora network with 1 collision domain?
Q2: a network with 3 broadcast domains or a networkwith 10 broadcast domains?
81
Collision
-
7/30/2019 002 - CCNA DAY 1-a
69/176
Collision
The effect of two nodes sending transmissions
simultaneously in Ethernet.
When the electrical signals meet on the physicalmedia, the frames from each node collide and are
damaged.
Q: What is the role of communication?
82
Device Used At Layer 1
-
7/30/2019 002 - CCNA DAY 1-a
70/176
Device Used At Layer 1
83
A B C D
Physical
All devices are in the same collision domain.
All devices are in the same broadcast domain.
Devices share the same bandwidth.
Hubs & Collision Domains
-
7/30/2019 002 - CCNA DAY 1-a
71/176
Hubs & Collision Domains
84
More end stations means morecollisions.
CSMA/CD is used.
Devices On Layer 2 (Switches & Bridges)
-
7/30/2019 002 - CCNA DAY 1-a
72/176
Devices On Layer 2 (Switches & Bridges)
85
Each segment has its own collision domain.
All segments are in the same broadcast domain.
Data-Link
OR1 2 3 1 24
Switches
-
7/30/2019 002 - CCNA DAY 1-a
73/176
Switches
86
Each segment is itsown collision domain.
Broadcasts areforwarded to allsegments.
Memory
Switch
Router
-
7/30/2019 002 - CCNA DAY 1-a
74/176
ou e
87
Routers are used to connect networks together
Route packets of data from one network to another
Cisco became the de facto standard of routers because of theirhigh-quality router products
Routers, by default, break up a broadcast domain
Internetworking Devices
-
7/30/2019 002 - CCNA DAY 1-a
75/176
g
88
How They Operate
-
7/30/2019 002 - CCNA DAY 1-a
76/176
y p
89
Hub Bridge Switch Router
Collision Domains:
1 4 4 4Broadcast Domains:
1 1 1 4
Data Flow Through a Network
-
7/30/2019 002 - CCNA DAY 1-a
77/176
g
90
Network Structure & Hierarchy
-
7/30/2019 002 - CCNA DAY 1-a
78/176
y
91
Distribution
Layer
Core Layer
AccessLayer
Network Structure & Hierarchy
-
7/30/2019 002 - CCNA DAY 1-a
79/176
y
92
Network Structure & Hierarchy
-
7/30/2019 002 - CCNA DAY 1-a
80/176
y
93
-
7/30/2019 002 - CCNA DAY 1-a
81/176
94
Why Another Model?
-
7/30/2019 002 - CCNA DAY 1-a
82/176
y
95
Although the OSI reference model is universally recognized, thehistorical and technical open standard of the Internet is TransmissionControl Protocol / Internet Protocol (TCP/IP).
The TCP/IP reference model and the TCP/IP protocol stack make datacommunication possible between any two computers, anywhere inthe world, at nearly the speed of light.
The U.S. Department of Defense (DoD) created the TCP/IP referencemodel because it wanted a network that could survive anyconditions, even a nuclear war.
TCP/IP Protocol Stack
-
7/30/2019 002 - CCNA DAY 1-a
83/176
96
7
6
5
4
3
2
5
4
3
2
Application
Presentation
Session
Transport
Network
Data-Link
Physical1
Application
Transport
Internet
Data-Link
Physical1
Application Layer Overview
-
7/30/2019 002 - CCNA DAY 1-a
84/176
97
*Used by the Router
Application
Transport
Internet
Data-Link
Physical
File Transfer- TFTP*- FTP*- NFS
E-Mail
- SMTPRemote Login
- Telnet*- rlogin*
Network Management- SNMP*
Name Management- DNS*
Transport Layer Overview
-
7/30/2019 002 - CCNA DAY 1-a
85/176
98
Transmission ControlProtocol (TCP)
User DatagramProtocol (UDP)
Application
Transport
Internet
Data-Link
Physical
Connection-Oriented
Connectionless
Internet Layer Overview
-
7/30/2019 002 - CCNA DAY 1-a
86/176
99
In the OSI reference model, the network layercorresponds to the TCP/IP Internet layer.
Internet Protocol (IP)
Internet Control Message
Protocol (ICMP)
Address ResolutionProtocol (ARP)
Reverse Address
Resolution Protocol (RARP)
Application
Transport
Internet
Data-Link
Physical
Address Resolution Protocol
-
7/30/2019 002 - CCNA DAY 1-a
87/176
100
172.16.3.1
IP: 172.16.3.2
Ethernet: 0800.0020.1111
172.16.3.2
IP: 172.16.3.2 = ???
I heard that broadcast.
The message is for me.
Here is my Ethernet
address.
I need theEthernet
address of
176.16.3.2.
Reverse ARP
-
7/30/2019 002 - CCNA DAY 1-a
88/176
101
Ethernet: 0800.0020.1111IP: 172.16.3.25
Ethernet: 0800.0020.1111 IP = ???
What is
my IP
address?
I heard that
broadcast.
Your IP
address is
172.16.3.25.
IEEE 802 Standards
-
7/30/2019 002 - CCNA DAY 1-a
89/176
IEEE 802.1: Standards related to network management.
IEEE 802.2: General standard for the data link layer in the OSIReference Model. The IEEE divides this layer into two sublayers --the logical link control (LLC) layer and the media access control(MAC) layer.
IEEE 802.3: Defines the MAC layer for bus networks that useCSMA/CD. This is the basis of the Ethernet standard.
IEEE 802.4: Defines the MAC layer for bus networks that use a
token-passing mechanism (token bus networks).
IEEE 802.5: Defines the MAC layer for token-ring networks.
IEEE 802.6: Standard for Metropolitan Area Networks (MANs) 102
-
7/30/2019 002 - CCNA DAY 1-a
90/176
103
Origin of Ethernet
-
7/30/2019 002 - CCNA DAY 1-a
91/176
104
Found by Xerox Palo Alto Research Center (PARC) in 1975
Original designed as a 2.94 Mbps system to connect 100computers on a 1 km cable
Later, Xerox, Intel and DEC drew up a standard support 10MbpsEthernet II
Basis for the IEEEs 802.3 specification
Most widely used LAN technology in the world
10 Mbps IEEE Standards - 10BaseT
-
7/30/2019 002 - CCNA DAY 1-a
92/176
105
10BaseT 10 Mbps, baseband, overTwisted-pair cable
Running Ethernet over twisted-pairwiring as specified by IEEE 802.3
Configure in a star pattern
Twisting the wires reduces EMI
Fiber Optic has no EMI
Unshielded twisted-pair
RJ-45 Plug and Socket
Twisted Pair Cables
-
7/30/2019 002 - CCNA DAY 1-a
93/176
106
Unshielded Twisted Pair Cable (UTP)
most popularmaximum length 100 mprone to noise
Category 1
Category 2
Category 3
Category 4Category 5
Category 6
Voice transmission of traditional telephone
For data up to 4 Mbps, 4 pairs full-duplex
For data up to 10 Mbps, 4 pairs full-duplex
For data up to 16 Mbps, 4 pairs full-duplexFor data up to 100 Mbps, 4 pairs full-duplex
For data up to 1000 Mbps, 4 pairs full-duplex
Twisted Pair Cables
-
7/30/2019 002 - CCNA DAY 1-a
94/176
107
Shielded Twisted Pair Cable (UTP)
Used for backbone cabling, adds severallayers of protective layer used to counterthe effects of EMI
Maximum length = 25 m
STANDARDS in TWISTED PAIR
-
7/30/2019 002 - CCNA DAY 1-a
95/176
Pin EIA-TIA 568A EIA-TIA 568B
1 WG WO
2 G O
3 WO WG
4 Bl Bl
5 WBl WBl
6 O G
7 WBr WBr
8 Br Br
108
Baseband VS Broadband
-
7/30/2019 002 - CCNA DAY 1-a
96/176
109
Baseband Transmission Entire channel is used to transmit a single digital signalComplete bandwidth of the cable is used by a single signal The transmission distance is shorter The electrical interference is lower
Broadband Transmission Use analog signaling and a range of frequenciesContinuous signals flow in the form of waves Support multiple analog transmission (channels)
Modem Broadband
TransmissionNetwork
Card
Baseband
Transmission
Straight-through cable
-
7/30/2019 002 - CCNA DAY 1-a
97/176
110
Straight-through cable pinout
-
7/30/2019 002 - CCNA DAY 1-a
98/176
111
Crossover cable
-
7/30/2019 002 - CCNA DAY 1-a
99/176
112
Crossover cable
-
7/30/2019 002 - CCNA DAY 1-a
100/176
113
Pin 1 ---------------------------------- Pin 3
Pin 2 ---------------------------------- Pin 6
Pin 3 ---------------------------------- Pin 1
Pin 4 ---------------------------------- Pin 4Pin 5 ---------------------------------- Pin 5
Pin 6 ---------------------------------- Pin 2
Pin 7 ---------------------------------- Pin 7
Pin 8 ---------------------------------- Pin 8
Rollover cable
-
7/30/2019 002 - CCNA DAY 1-a
101/176
114
Rollover cable pinout
-
7/30/2019 002 - CCNA DAY 1-a
102/176
115
Straight-through or Crossover
-
7/30/2019 002 - CCNA DAY 1-a
103/176
116
Use straight-through cables for the following cabling:
Switch to Router Switch to PC or server Hub to PC or server
Use crossover cables for the following cabling:
Switch to switch Switch to hub
Hub to hub Router to router PC to PC Router to PC
-
7/30/2019 002 - CCNA DAY 1-a
104/176
Which type of attack is characterized by a flood of packets
that are requesting a TCP connection to a server?
a. denial of service
b. brute force
c. reconnaissanced. Trojan horse
117
-
7/30/2019 002 - CCNA DAY 1-a
105/176
Which type of attack is characterized by a flood of packets
that are requesting a TCP connection to a server?
a. denial of service
b. brute force
c. reconnaissanced. Trojan horse
118
-
7/30/2019 002 - CCNA DAY 1-a
106/176
Which of the following are associated the application layer of
the OSI model? (Choose Two)
a. ping
b. telnet
c. ftpd. tcp
e. ip
119
-
7/30/2019 002 - CCNA DAY 1-a
107/176
Which of the following are associated the application layer of
the OSI model? (Choose Two)
a. ping
b. telnet
c. ftpd. tcp
e. ip
120
-
7/30/2019 002 - CCNA DAY 1-a
108/176
Which troubleshooting a network connectivity problem, atechnician observes steady link lights on both the workstation NICand the switch port to which the workstation is connected.However, when the ping command is issued from the workstation,the output message Request timed out is displayed. At whichlayer of the OSI model does the problem most likely exist?
a. The session layer
b. The protocol layer
c. The data link layer
d. The access layer
e. The network layerf. The application layer
121
-
7/30/2019 002 - CCNA DAY 1-a
109/176
Which troubleshooting a network connectivity problem, atechnician observes steady link lights on both the workstation NICand the switch port to which the workstation is connected.However, when the ping command is issued from the workstation,the output message Request timed out is displayed. At whichlayer of the OSI model does the problem most likely exist?
a. The session layer
b. The protocol layer
c. The data link layer
d. The access layer
e. The network layerf. The application layer
122
-
7/30/2019 002 - CCNA DAY 1-a
110/176
Which topologies are using the correct type of twisted pair
cables? Choose Two.
123
-
7/30/2019 002 - CCNA DAY 1-a
111/176
Which topologies are using the correct type of twisted pair
cables? Choose Two.
124
-
7/30/2019 002 - CCNA DAY 1-a
112/176
An administrator issues the command ping 127.0.0.1 from the
command line prompt on a PC. If a reply is received, whatdoes this confirm?
a. The PC has connectivity with a local host.
b. The PC has connectivity with a layer 3 device
c. The PC has a gateway correctly configured
d. The PC has connectivity up to layer 5 of the OSI
model
e. The PC has the TCP/IP protocol stack correctly
installed
125
-
7/30/2019 002 - CCNA DAY 1-a
113/176
An administrator issues the command ping 127.0.0.1 from the
command line prompt on a PC. If a reply is received, whatdoes this confirm?
a. The PC has connectivity with a local host.
b. The PC has connectivity with a layer 3 device
c. The PC has a gateway correctly configured
d. The PC has connectivity up to layer 5 of the OSI
model
e. The PC has the TCP/IP protocol stack correctly
installed
126
-
7/30/2019 002 - CCNA DAY 1-a
114/176
What are some of the advantages of using a router to
segment a network?
a. Filtering can occur based on Layer 3 information
b. Broadcasts are eliminated
c. Routers generally cost less than switchesd. Broadcasts re not forwarded across the router
e. Adding a router to the network decreases latency
f. Addresses licensed to enterprises or ISPs by an
internet registry organization
127
-
7/30/2019 002 - CCNA DAY 1-a
115/176
What are some of the advantages of using a router to
segment a network?
a. Filtering can occur based on Layer 3 information*
b. Broadcasts are eliminated
c. Routers generally cost less than switchesd. Broadcasts re not forwarded across the router*
e. Adding a router to the network decreases latency
f. Addresses licensed to enterprises or ISPs by an
internet registry organization
128
-
7/30/2019 002 - CCNA DAY 1-a
116/176
Which of the following statements are true regarding bridges
and switches? (Choose 3)
a. Switches are primarily software based while bridges
are hardware based
b. Both bridges and switches forward layer 2
broadcasts
c. Bridges are frequently faster than switches
d. Switches have a higher number of ports than most
bridges
e. Bridges define broadcast domains while switchesdefine collision domains
f. Both bridges and switches make forwarding based
on layer 2 addresses
129
-
7/30/2019 002 - CCNA DAY 1-a
117/176
Which of the following statements are true regarding bridges
and switches? (Choose 3)
a. Switches are primarily software based while bridges
are hardware based
b. Both bridges and switches forward layer 2
broadcasts
c. Bridges are frequently faster than switches
d. Switches have a higher number of ports than most
bridges
e. Bridges define broadcast domains while switchesdefine collision domains
f. Both bridges and switches make forwarding based
on layer 2 addresses
130
-
7/30/2019 002 - CCNA DAY 1-a
118/176
Why will a switch never learn a broadcast address?
a. Broadcasts only use network layer addressing
b. A broadcast frame is never forwarded by a switch
c. A broadcast address will never be the source of a
framed. Broadcast addresses use an incorrect format for
the switching table
e. Broadcast frames are never sent to switches
131
-
7/30/2019 002 - CCNA DAY 1-a
119/176
Why will a switch never learn a broadcast address?
a. Broadcasts only use network layer addressing
b. A broadcast frame is never forwarded by a switch
c. A broadcast address will never be the source of a
framed. Broadcast addresses use an incorrect format for
the switching table
e. Broadcast frames are never sent to switches
132
-
7/30/2019 002 - CCNA DAY 1-a
120/176
Which of the following statements describe the network
shown in the graphic? (choose two)
a. There are two broadcast domains in the network
b. There are four broadcast domains in the network
c. There are six broadcast domains in the networkd. There are four collision domains in the network
e. There are five collision domains in the network
f. There are seven collision domains in the network
133
-
7/30/2019 002 - CCNA DAY 1-a
121/176
Which of the following statements describe the network
shown in the graphic? (choose two)
a. There are two broadcast domains in the network
b. There are four broadcast domains in the network
c. There are six broadcast domains in the networkd. There are four collision domains in the network
e. There are five collision domains in the network
f. There are seven collision domains in the network
134
-
7/30/2019 002 - CCNA DAY 1-a
122/176
At which OSI layer is a logical path created between two host
systems?
a. Session
b. Transport
c. Networkd. Data link
e. Physical
135
-
7/30/2019 002 - CCNA DAY 1-a
123/176
At which OSI layer is a logical path created between two host
systems?
a. Session
b. Transport
c. Networkd. Data link
e. Physical
136
-
7/30/2019 002 - CCNA DAY 1-a
124/176
What functions do routers perform in a network?
a. Packet switching
b. Access layer security
c. Path selection
d. VLAN membership assignmente. Bridging between LAN segments
f. Microsegmentation of broadcast domains
137
-
7/30/2019 002 - CCNA DAY 1-a
125/176
What functions do routers perform in a network?
a. Packet switching
b. Access layer security
c. Path selection
d. VLAN membership assignmente. Bridging between LAN segments
f. Microsegmentation of broadcast domains
138
-
7/30/2019 002 - CCNA DAY 1-a
126/176
At which layers of the OSI model do WANs operation?
(Choose two)
a. Application
b. Session
c. Transportd. Network
e. Data link
f. Physical
139
-
7/30/2019 002 - CCNA DAY 1-a
127/176
At which layers of the OSI model do WANs operation?
(Choose two)
a. Application
b. Session
c. Transportd. Network
e. Data link
f. Physical
140
-
7/30/2019 002 - CCNA DAY 1-a
128/176
Why does the data communication industry use the layered
OSI reference model?
a. It divides the network communication process into smaller andsimpler components, thus aiding component development, design,and troubleshooting
b. It enables equipment from different vendors to use the same
electronic components, thus saving research and developmentfunds
c. It supports the evolution of multiple competing standards, and thusprovides business opportunities for equipment manufacturers
d. It encourages industry standardization by defining what functionsoccur at each layer of the model
e. It provides a means by which changes in functionality in one layer
require changes in other layers 141
-
7/30/2019 002 - CCNA DAY 1-a
129/176
Why does the data communication industry use the layered
OSI reference model?
a. It divides the network communication process into smaller andsimpler components, thus aiding component development, design,and troubleshooting
b. It enables equipment from different vendors to use the same
electronic components, thus saving research and developmentfunds
c. It supports the evolution of multiple competing standards, and thusprovides business opportunities for equipment manufacturers
d. It encourages industry standardization by defining what functionsoccur at each layer of the model
e. It provides a means by which changes in functionality in one layer
require changes in other layers 142
-
7/30/2019 002 - CCNA DAY 1-a
130/176
Which of the following is true regarding the use of switches
and hubs for network connectivity?
a. Switches take less time to process frames than hubs
take.
b. Switches do not forward broadcasts
c. Hubs can filter frames
d. Using hubs can increase the amount of bandwidth
available to hosts
e. Switches increase the number of collision domains
in the network
143
-
7/30/2019 002 - CCNA DAY 1-a
131/176
Which of the following is true regarding the use of switches
and hubs for network connectivity?
a. Switches take less time to process frames than hubs
take.
b. Switches do not forward broadcasts
c. Hubs can filter frames
d. Using hubs can increase the amount of bandwidth
available to hosts
e. Switches increase the number of collision domains
in the network
144
-
7/30/2019 002 - CCNA DAY 1-a
132/176
The network administrator must complete the connection
between the RTA of the XYZ company and the service
provider. To accomplish this task, which two devices could
be installed at the customer site to provide a connection
through the local loop of the central office of the provider?
(choose two)
a. WAN switch
b. PVC
c. ATM switch
d. Multiplexere. CSU/DSU
f. Modem
145
-
7/30/2019 002 - CCNA DAY 1-a
133/176
The network administrator must complete the connection
between the RTA of the XYZ company and the service
provider. To accomplish this task, which two devices could
be installed at the customer site to provide a connection
through the local loop of the central office of the provider?
(choose two)
a. WAN switch
b. PVC
c. ATM switch
d. Multiplexere. CSU/DSU
f. Modem
146
-
7/30/2019 002 - CCNA DAY 1-a
134/176
Acknowledgements, sequencing, and flow control are
characteristics of which OSI later?
a. 2
b. 3
c. 4
d. 5
e. 6
f. 7
147
-
7/30/2019 002 - CCNA DAY 1-a
135/176
Acknowledgements, sequencing, and flow control are
characteristics of which OSI later?
a. 2
b. 3
c. 4
d. 5
e. 6
f. 7
148
-
7/30/2019 002 - CCNA DAY 1-a
136/176
Which of the following are types of flow control? (choose
three)
a. Buffering
b. Cut through
c. Windowing
d. Congestion avoidance
e. Load balancing
149
-
7/30/2019 002 - CCNA DAY 1-a
137/176
Which of the following are types of flow control? (choose
three)
a. Buffering
b. Cut through
c. Windowing
d. Congestion avoidance
e. Load balancing
150
-
7/30/2019 002 - CCNA DAY 1-a
138/176
Refer to the exhibit. Two buildings on the San Jose campus of
a small company must be connected to use Ethernet with a
bandwidth of at least 100 Mbps. The company is concerned
about possible problems from voltage potential differences
between the two buildings. Which media type should be
used for the connection?
a. UTP cable
b. STP cable
c. Coaxial cable
d. Fiber optic cable
151
-
7/30/2019 002 - CCNA DAY 1-a
139/176
Refer to the exhibit. Two buildings on the San Jose campus of
a small company must be connected to use Ethernet with a
bandwidth of at least 100 Mbps. The company is concerned
about possible problems from voltage potential differences
between the two buildings. Which media type should be
used for the connection?
a. UTP cable
b. STP cable
c. Coaxial cable
d. Fiber optic cable
152
-
7/30/2019 002 - CCNA DAY 1-a
140/176
What TCP/IP stack configuration features can DHCP provide,
in addition to assigning an IP address? (choose three)
a. Default gateway
b. DNS servers
c. FTP server
d. Helper address
e. Subnet mask
f. TFTP server
153
-
7/30/2019 002 - CCNA DAY 1-a
141/176
What TCP/IP stack configuration features can DHCP provide,
in addition to assigning an IP address? (choose three)
a. Default gateway
b. DNS servers
c. FTP server
d. Helper address
e. Subnet mask
f. TFTP server
154
-
7/30/2019 002 - CCNA DAY 1-a
142/176
Host 1 sends a request for a file to remote server 1. Which
destination does Host 1 place the packet containing the
request?
a. The MAC address of the NIC in server1
b. The IP address of server 1
c. The MAC address of the s0/0/0 interface of router R2
d. The IP address of s0/0/0 interface of router R1
e. The IP address of fa0/0 interface of router R1
155
-
7/30/2019 002 - CCNA DAY 1-a
143/176
156
-
7/30/2019 002 - CCNA DAY 1-a
144/176
Host 1 sends a request for a file to remote server 1. Which
destination does Host 1 place the packet containing the
request?
a. The MAC address of the NIC in server1
b. The IP address of server 1
c. The MAC address of the s0/0/0 interface of router R2
d. The IP address of s0/0/0 interface of router R1
e. The IP address of fa0/0 interface of router R1
157
-
7/30/2019 002 - CCNA DAY 1-a
145/176
Host 1 sends an ICMP echo request to remote server 1. Which
destination address does Host 1 place in the header of the
frame containing the ping packet?
a. The IP address of server 1
b. The MAC address of the NIC in server1
c. The IP address of fa0/0 interface of router R1
d. The MAC address of fa0/0 interface of router R1
e. The MAC address of the s0/0/0 interface of router R2
f. The IP address of s0/0/0 interface of router R1158
-
7/30/2019 002 - CCNA DAY 1-a
146/176
159
-
7/30/2019 002 - CCNA DAY 1-a
147/176
Host 1 sends an ICMP echo request to remote server 1. Which
destination address does Host 1 place in the header of the
frame containing the ping packet?
a. The IP address of server 1
b. The MAC address of the NIC in server1
c. The IP address of fa0/0 interface of router R1
d. The MAC address of fa0/0 interface of router R1
e. The MAC address of the s0/0/0 interface of router R2
f. The IP address of s0/0/0 interface of router R1160
R1 f d k t f H t 1 t t S 1 Whi h
-
7/30/2019 002 - CCNA DAY 1-a
148/176
R1 forwards a packet from Host 1 to remoter Server 1. Whichdescribes the use of a MAC as the frame carrying this packet
leaves the s0/0/0 interface of R1?
a. The frame does not have MAC addresses
b. The source MAC address in the frame is the MAC address ofthe NIC of Host 1
c. The source MAC address in the frame is the MAC address ofthe s0/0/0 interface of R1
d. The destination MAC address in the frame is the MACaddress of the NIC of Server 1
e. The destination MAC address in the frame is the MACaddress of the s0/0/0 interface of R2
161
-
7/30/2019 002 - CCNA DAY 1-a
149/176
162
R1 f d k t f H t 1 t t S 1 Whi h
-
7/30/2019 002 - CCNA DAY 1-a
150/176
R1 forwards a packet from Host 1 to remoter Server 1. Whichdescribes the use of a MAC as the frame carrying this packet
leaves the s0/0/0 interface of R1?
a. The frame does not have MAC addresses
b. The source MAC address in the frame is the MAC address ofthe NIC of Host 1
c. The source MAC address in the frame is the MAC address ofthe s0/0/0 interface of R1
d. The destination MAC address in the frame is the MACaddress of the NIC of Server 1
e. The destination MAC address in the frame is the MACaddress of the s0/0/0 interface of R2
163
H t 1 i fil f t 1 Whi h MAC
-
7/30/2019 002 - CCNA DAY 1-a
151/176
Host 1 receives a file from remote server 1. Which MAC
address appears as the source address in the header of the
frames received by Host 1?
a. The MAC address of the NIC in Host 1
b. The MAC address of the NIC in server 1
c. The MAC address of the Fa0/0 interface of router R1
d. The MAC address of the s0/0/0 interface of router R2
164
-
7/30/2019 002 - CCNA DAY 1-a
152/176
165
H t 1 i fil f t 1 Whi h MAC
-
7/30/2019 002 - CCNA DAY 1-a
153/176
Host 1 receives a file from remote server 1. Which MAC
address appears as the source address in the header of the
frames received by Host 1?
a. The MAC address of the NIC in Host 1
b. The MAC address of the NIC in server 1
c. The MAC address of the Fa0/0 interface of router R1
d. The MAC address of the s0/0/0 interface of router R2
166
Host 1 has just started up and requests a web page from web server
-
7/30/2019 002 - CCNA DAY 1-a
154/176
Host 1 has just started up and requests a web page from web server2. Which two statements describe steps in the process Host 1 uses
to send the request to web server 2? (choose two)
a. Host 1 addresses the frames to the MAC address of router R1
b. Host 1 looks in its ARP cache for the MAC address of routerR1
c. Host 1 addresses the frames to the MAC address of webserver 2
d. Host 1 sends the packets to router R1 to be forwarded toweb server 2
e. Host 1 sends a broadcast ARP request to obtain the MACaddress of webserver 2
167
-
7/30/2019 002 - CCNA DAY 1-a
155/176
168
Host 1 has just started up and requests a web page from web server
-
7/30/2019 002 - CCNA DAY 1-a
156/176
Host 1 has just started up and requests a web page from web server2. Which two statements describe steps in the process Host 1 uses
to send the request to web server 2? (choose two)a. Host 1 addresses the frames to the MAC address of router R1
b. Host 1 looks in its ARP cache for the MAC address of routerR1
c. Host 1 addresses the frames to the MAC address of webserver 2
d. Host 1 sends the packets to router R1 to be forwarded toweb server 2
e. Host 1 sends a broadcast ARP request to obtain the MACaddress of webserver 2
169
A window size of three has been negotiated for this transfer
-
7/30/2019 002 - CCNA DAY 1-a
157/176
A window size of three has been negotiated for this transfer.
Which message will be returned from the receiver to the
sender as part of this TCP/IP transfer?
a. Send ACK 1 to 3
b. Send ACK 3
c. Send ACK 4
d. Send ACK 4 -6
e. Send ACK 6
f. Send ACK 7
170
A window size of three has been negotiated for this transfer
-
7/30/2019 002 - CCNA DAY 1-a
158/176
A window size of three has been negotiated for this transfer.
Which message will be returned from the receiver to the
sender as part of this TCP/IP transfer?
a. Send ACK 1 to 3
b. Send ACK 3
c. Send ACK 4
d. Send ACK 4 -6
e. Send ACK 6
f. Send ACK 7
171
What two results would occur if the hub were to be replaced
-
7/30/2019 002 - CCNA DAY 1-a
159/176
What two results would occur if the hub were to be replaced
with a switch that is configured with one Ethernet VLAN?
(choose two)
a. The number of collision domains would remain the
same
b. The number of collision domains would decrease
c. The number of collision domains would increase
d. The number of broadcast domains would remain the
same
e. The number of broadcast domains would decreasef. The number of broadcast domains would increase
172
What two results would occur if the hub were to be replaced
-
7/30/2019 002 - CCNA DAY 1-a
160/176
What two results would occur if the hub were to be replaced
with a switch that is configured with one Ethernet VLAN?
(choose two)
a. The number of collision domains would remain the
same
b. The number of collision domains would decrease
c. The number of collision domains would increase
d. The number of broadcast domains would remain the
same
e. The number of broadcast domains would decreasef. The number of broadcast domains would increase
173
How does a DHCP server dynamically assign IP addresses to
-
7/30/2019 002 - CCNA DAY 1-a
161/176
How does a DHCP server dynamically assign IP addresses to
hosts?
a. Addresses are permanently assigned so that the host usesthe same address at all times
b. Addresses are assigned for a fixed period of time. At the
end of the period, a new request for an address must bemade, and another address is then assigned
c. Addresses are leased to hosts. A host will usually keep thesame address by periodically contacting the DHCP server to
renew the lease
d. Addresses are allocated after a negotiation between theserver and the host to determine the length of theagreement
174
How does a DHCP server dynamically assign IP addresses to
-
7/30/2019 002 - CCNA DAY 1-a
162/176
How does a DHCP server dynamically assign IP addresses to
hosts?
a. Addresses are permanently assigned so that the host usesthe same address at all times
b. Addresses are assigned for a fixed period of time. At the
end of the period, a new request for an address must bemade, and another address is then assigned
c. Addresses are leased to hosts. A host will usually keep thesame address by periodically contacting the DHCP server to
renew the lease
d. Addresses are allocated after a negotiation between theserver and the host to determine the length of theagreement
175
What is the purpose of using the traceroute command?
-
7/30/2019 002 - CCNA DAY 1-a
163/176
What is the purpose of using the traceroute command?
a. To map all the devices on a network
b. To display the current TCP/IP configuration values
c. To see how a device MAC address is mapped to its IP
address
d. To see the path a packet will take when travelling to a
specified destination
e. To display the MTU values for each router in a specified
network path from a source to a destination
176
What is the purpose of using the traceroute command?
-
7/30/2019 002 - CCNA DAY 1-a
164/176
What is the purpose of using the traceroute command?
a. To map all the devices on a network
b. To display the current TCP/IP configuration values
c. To see how a device MAC address is mapped to its IP
address
d. To see the path a packet will take when travelling to a
specified destination
e. To display the MTU values for each router in a specified
network path from a source to a destination
177
What is the purpose of an ARP request message?
-
7/30/2019 002 - CCNA DAY 1-a
165/176
What is the purpose of an ARP request message?
a. It binds the IP address of a host to the network that it is on.
b. It builds a correlation between an IP address and a MACaddress.
c. It provides connectivity and path selection between hostson a network
d. It encapsulates the layer 3 address and then passes the
packet to layer 2
e. It creates a session by passing a header with the destinationlayer 2 address to the transport layer
178
What is the purpose of an ARP request message?
-
7/30/2019 002 - CCNA DAY 1-a
166/176
What is the purpose of an ARP request message?
a. It binds the IP address of a host to the network that it is on.
b. It builds a correlation between an IP address and a MACaddress.
c. It provides connectivity and path selection between hostson a network
d. It encapsulates the layer 3 address and then passes the
packet to layer 2
e. It creates a session by passing a header with the destinationlayer 2 address to the transport layer
179
Drag and drop the network user application to the
-
7/30/2019 002 - CCNA DAY 1-a
167/176
Drag and drop the network user application to the
appropriate description of its primary use. (not all options are
used)
180
-
7/30/2019 002 - CCNA DAY 1-a
168/176
181
A receiving host computes the checksum on a frame and
-
7/30/2019 002 - CCNA DAY 1-a
169/176
A receiving host computes the checksum on a frame and
determines that the frame is damaged. The frame is then
discarded. At which OSI layer did this happen?
a. Session
b. Transport
c. Network
d. Data link
e. Physical
182
A receiving host computes the checksum on a frame and
-
7/30/2019 002 - CCNA DAY 1-a
170/176
A receiving host computes the checksum on a frame and
determines that the frame is damaged. The frame is then
discarded. At which OSI layer did this happen?
a. Session
b. Transport
c. Network
d. Data link
e. Physical
183
A network interface port has CSMA/CD enabled on a
-
7/30/2019 002 - CCNA DAY 1-a
171/176
A network interface port has CSMA/CD enabled on a
shared twisted pair network. From this statement, what is
known about the network interface port?
a. This is a 10Mbps switch port
b. This is a 100Mbps switch port
c. This is an Ethernet port operating at half duplex
d. This is an Ethernet port operating at full duplex
e. This is a port on a network interface card in a PC
184
A network interface port has CSMA/CD enabled on a
-
7/30/2019 002 - CCNA DAY 1-a
172/176
A network interface port has CSMA/CD enabled on a
shared twisted pair network. From this statement, what is
known about the network interface port?
a. This is a 10Mbps switch port
b. This is a 100Mbps switch port
c. This is an Ethernet port operating at half duplex
d. This is an Ethernet port operating at full duplex
e. This is a port on a network interface card in a PC
185
-
7/30/2019 002 - CCNA DAY 1-a
173/176
Refer to the exhibit. What is the meaning of the output MTU 1500bytes?
a. The maximum number of bytes that can traverse thisinterface per second is 1500
b. The minimum segment size that can traverse this
interface is 1500 bytes
c. The maximum segment size that can traverse thisinterface is 1500 bytes
d. The minimum packet size that can traverse this interfaceis 1500 bytes
e. The maximum packet size that can traverse this interfaceis 1500 bytes
f. The maximum frame size that can traverse this interface is1500 bytes 186
-
7/30/2019 002 - CCNA DAY 1-a
174/176
Refer to the exhibit. What is the meaning of the output MTU 1500bytes?
a. The maximum number of bytes that can traverse thisinterface per second is 1500
b. The minimum segment size that can traverse this
interface is 1500 bytes
c. The maximum segment size that can traverse thisinterface is 1500 bytes
d. The minimum packet size that can traverse this interfaceis 1500 bytes
e. The maximum packet size that can traverse this interfaceis 1500 bytes
f. The maximum frame size that can traverse this interface is1500 bytes 187
Which statement is true about full duplex Ethernet in
-
7/30/2019 002 - CCNA DAY 1-a
175/176
comparison to half duplex Ethernet?
a. Full duplex Ethernet consists of a shared cable segment.Half duplex Ethernet provides a point to point link.
b. Full duplex Ethernet uses a loopback circuit to detectcollisions. Half duplex Ethernet uses a jam signal.
c. Full duplex Ethernet can provide higher throughput thancan half duplex Ethernet of the same bandwidth.
d. Full duplex Ethernet uses two wires to send and receive.Half duplex Ethernet uses one wire to send and receive.
188
Which statement is true about full duplex Ethernet in
-
7/30/2019 002 - CCNA DAY 1-a
176/176
comparison to half duplex Ethernet?
a. Full duplex Ethernet consists of a shared cable segment.Half duplex Ethernet provides a point to point link.
b. Full duplex Ethernet uses a loopback circuit to detectcollisions. Half duplex Ethernet uses a jam signal.
c. Full duplex Ethernet can provide higher throughput thancan half duplex Ethernet of the same bandwidth.