CCNA Certification All-in-One For Dummies - Silviu Angelescu - E-Book

CCNA Certification All-in-One For Dummies E-Book

Silviu Angelescu

4,4
32,99 €

oder
-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

A complete preparation guide for the entry-level networking CCNA certification If you're planning to advance your career by taking the all-important Cisco Certified Network Associate (CCNA), this is the study guide you need! Seven minibooks cover all the concepts and topics on which you'll be tested, covering the latest version of the exam. Each part of the exam is covered thoroughly in its own section, so you can readily find the information you want to study. Plenty of review questions help you prepare, and the companion CD-ROM includes the highly rated Dummies Test Engine so you can test your progress with questions based on exam content. * The Cisco Certified Network Associate (CCNA) is the entry-level certification for network professionals * Seven minibooks in this guide cover Secure Device Manager, Virtual Private Networks, IPv6, 2960 Switches, Cisco Network Assistant, Advanced EIGRP and OSPF, and Introduction to Wireless Networks * Covers the latest version of the exam, including the new voice, security and wireless components added in 2008 * Packed with review questions to help you prepare * Includes more security and troubleshooting information * CD-ROM includes the popular Dummies Test Engine, an exclusive, fully customizable test-prep software package that features twice as many sample questions as the previous version CCNA Certification All-In-One For Dummies is the preparation guide you need to earn your CCNA certification. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 1183

Veröffentlichungsjahr: 2010

Bewertungen
4,4 (18 Bewertungen)
12
2
4
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



CCNA® Certification All-in-One For Dummies®

Table of Contents

Introduction

About This Book

Foolish Assumptions

How This Book Is Organized

Icons Used in This Book

Where to Go from Here

Book I: Networking Basics

Book I: Chapter 1: Introducing Computer Networks

Purpose of Computer Networks

Network applications

Operation Flow of Computer Networks

Topologies of Computer Networks

Book I: Chapter 2: The OSI Reference Model

Introduction to the OSI Reference Model

Seven Layers

Layer 7: Application

Layer 6: Presentation

Layer 5: Session

Layer 4: Transport

Layer 3: Network

Layer 2: Data link

Layer 1: Physical

Benefits of the OSI Reference Model

Book I: Chapter 3: Introducing the TCP/IP Protocol Suite

Introduction to the TCP/IP Protocol Suite

Layer 7: Application

Some TCP/IP protocols at Layer 7

Some TCP/IP software applications at Layer 7

Layer 6: Presentation

Some TCP/IP protocols at Layer 6

Some TCP/IP software applications at Layer 6

Layer 5: Session

Layer 4: Transport

Connectionless transport

Connection-oriented transport

The most common TCP/IP protocols at Layer 4

TCP flow control

UDP simplicity

TCP/IP ports

Layer 3: Network

Some TCP/IP protocols at Layer 3

Hierarchy of IP addresses

Layer 2: Data Link

Some TCP/IP protocols at Layer 2

Address resolution

Layer 1: Physical

Book I: Chapter 4: Data Encapsulation

Introducing Data Encapsulation

Book I: Chapter 5: Binary, Hexadecimal, and Decimal Numbering Systems

Decimal Numbers

Binary Numbers

Hexadecimal Numbers

Numbering systems notation

Bits, nibbles, and bytes

Converting binary to hexadecimal

Converting hexadecimal to binary

Book I: Chapter 6: Local-Area Networks (LANs)

Introduction to Local-Area Networks

Ethernet Networking

CSMA/CD protocol

Duplex communication

Ethernet Standards

10-Mbps Ethernet (IEEE 802.3)

Fast Ethernet (100-Mbps)

Gigabit Ethernet (1000-Mbps)

10 Gigabit Ethernet (10000-Mbps)

Ethernet in the OSI Model

Data link layer

Physical layer

Book I: Chapter 7: Introducing Wide-Area Networks (WANs)

Introducing Wide-Area Networks

Dedicated Leased Line Connections

Advantages of leased lines

Disadvantage of leased lines

Dedicated leased line protocols

Circuit-Switched Connections

Advantage of circuit-switched connections

Disadvantages of circuit-switched connections

Circuit-switched connection protocols

Packet-Switched Connections

Advantages of packet-switched connections

Disadvantage of packet-switched connections

Packet-switched connection protocols

Cell-Switched Connections

Advantages of cell-switched connections

Disadvantages of cell-switched connections

Cell-switched connection protocols

Book I: Chapter 8: Introducing Wireless Networks

Wireless LAN (WLAN)

Wireless WAN

Benefits and Costs of Wireless Networks

Security Risks

Service set identifier (SSID)

Wired Equivalent Privacy (WEP)

Wi-Fi Protected Access (WPA)

MAC address filtering

Book I: Chapter 9: Network Design

Cisco Hierarchical Network Model

Core Layer

Highly available core

Distribution Layer

Access Layer

Benefits

Specialization

Scalability

Limitation of problem domain

Book I: Chapter 10: Introducing Cisco Hardware and Software

Introducing Cisco Products

Cisco software

Cisco hardware

Introducing Cisco Device Configurations

Startup configuration

Running configuration

Meet the Cisco IOS User Interface

Cisco IOS command-line interface (CLI)

Cisco IOS graphical user interface (GUI)

Book II: TCP/IP

Book II: Chapter 1: Introducing TCP/IP

TCP/IP communication

We pioneered this

Components of TCP/IP

Introducing the major TCP/IP layers and protocols

Demystifying data encapsulation

Book II: Chapter 2: TCP/IP Layers and Protocols

Information Exchange through the OSI Layer

OSI Layers and Protocols

The physical layer: Layer 1

The data link layer: Layer 2

The network layer: Layer 3

The transport layer: Layer 4

The session layer: Layer 5

The presentation layer: Layer 6

The application layer: Layer 7

TCP/IP Layers and Protocols

The network access layer: Layer 1

The Internet layer: Layer 2

The host-to-host transport layer: Layer 3

The application layer: Layer 4

Book II: Chapter 3: IP Addressing

The Purpose of IP Addresses — It’s All about the Delivery

The Hierarchy of IP Addresses — Who’s in Charge?

Network and host addressing

Classes of IP addresses

Other reserved addresses

Understanding network ID, host ID, and subnet masks

Private IP Addresses — We Reserve the Right . . .

Broadcasting — Shouting to the World!

Data-link Layer 2 broadcasts

Address Resolution Protocol — ARP’s on the Case, Sherlock!

The purpose of ARP

Proxy ARP

And what about RARP?

Book II: Chapter 4: Subnetting

Subnetting Basics

Purpose of subnetting

Subnet masks

Creating subnets

Subnet mask, network ID, host ID, and broadcast IP

Classless interdomain routing (CIDR)

IP Address Class and Subnet Mask

Class C IP address subnets

IP subnet zero

Host addressing assignments

Class B IP address subnets

Class A IP address subnets

Variable-Length Subnet Masks (VLSMs)

Purpose of VLSM

VLSM design guidelines

Optimizing IP addressing with VLSM

Summarization

Summarization investigated

Summarization and VLSM

Book II: Chapter 5: Internet Protocol Version 6 (IPv6)

Internet Protocol Version 6 (IPv6)

The Benefits of IPv6

Introducing IPv6 Addressing

IPv6 address notation

Configuring IPv6

Address autoconfiguration — DHCP who?

A dynamic approach

ICMPv6

Routing with IPv6

Static routing — Gimme some static!

Introducing IPv6 routing protocols

Migrating to IPv6

Migration methods

Book III: Switching with Cisco Switches

Book III: Chapter 1: Introducing Layer 2 Switches

Layer 2 — Data Link Layer Review

Purpose of a Layer 2 Switch

Hubs

Bridges

Switches

Basic Switch Functions

Address learning

Flooding, forwarding, and filtering frames

Avoiding loops

Managing Port Security

Filter based on MAC address

Filter based on number of devices connected

Filter based on sticky MAC address

Action triggered by filter

Transmitting Unicast, Multicast, and Broadcast

Book III: Chapter 2: Managing a Switch Using Cisco IOS

Best Practice for Using Cisco Switches

Connecting to a Cisco Switch

Connecting locally

Connecting remotely

Cisco Switch Startup Process

Configuring a Cisco Switch

Initial switch configuration

Managing Cisco switch configuration

Managing Cisco Switch Authentication

Console password

Telnet password

Auxiliary password

Privileged password

Encrypting passwords

Enabling Secure Shell (SSH)

Recovering switch passwords

Book III: Chapter 3: Controlling Network Traffic with Cisco Switches

Sending to MAC Addresses in Remote Networks

Sending frames within the LAN

Sending frames to a remote network

Deciding the Fate of Frames

Switching modes

Switching in Half-Duplex and Full-Duplex Modes

Reviewing half-duplex Ethernet

Reviewing full-duplex Ethernet

Duplex mode best practice

Configuring port duplex mode on a Cisco switch

Configuring port speed on a Cisco switch

Selecting a switch port

Avoiding Loops with Spanning Tree Protocol (STP)

Book III: Chapter 4: Spanning Tree Protocol (STP)

Introducing the Spanning Tree Protocol (STP)

STP Operation Flow

Electing a root bridge

Assigning STP port types

Achieving STP convergence

Introducing Cisco Options for STP

PortFast

BPDUGuard

BPDUFilter

UplinkFast

BackboneFast

Introducing Rapid Spanning Tree Protocol (RSTP)

Shorter delay before STP recalculation (max age timer)

Alternate port and backup port

Enabling RSTP on a Cisco switch

EtherChannel

EtherChannel and STP are friends

EtherChannel versions

Enabling EtherChannel on SW2 and SW5

Monitoring STP

Monitoring switch STP configuration

Monitoring port STP configuration

Book III: Chapter 5: Virtual Local Area Networks (VLANs)

Introducing Virtual Local Area Networks (VLANs)

VLANs keep things tidy

VLANs subdivide the broadcast domain

Benefits of VLANs

Managing VLANs

Create VLANs

Special-purpose VLANs

Static and dynamic VLAN membership

Identifying VLANs

Tagging data-link frames with a VLAN ID

VLAN Trunking

EtherChannel and VLANs are friends

VLAN or EtherChannel trunking? Both?

Configuring EtherChannel and VLAN trunking

Introducing switch port types

Managing VLAN trunk ports

VLAN Trunking Protocol (VTP)

VTP creates and manages VLANs

VTP does not manage VLAN port membership

VTP benefits

VTP domain

VTP server

VTP switch operating mode

VTP updates

VTP pruning

VLAN ID range

VTP requirements

Enabling VTP

Monitoring and troubleshooting VTP

Routing Traffic from One VLAN to Another

One router per VLAN

One large router with one port per VLAN

One subinterface per VLAN (router-on-a-stick)

Network (Layer 3) switch

Book III: Chapter 6: Voice over IP (VoIP)

Introducing Voice over IP (VoIP)

VoIP Requires Quality of Service (QoS)

Class of service (CoS) (IEEE 802.1p)

Cisco IP Phone

Cisco Discovery Protocol (CDP)

Negotiating VLAN

Negotiating CoS

Negotiating Cisco IP phone PC port

Configuring VoIP on Cisco Switches

Enabling QoS on the upstream switch

Configuring switch access port to trust CoS

Enabling VoIP VLAN on the switch access port

Book III: Chapter 7: Troubleshooting a Switch Using Cisco IOS

Troubleshooting Cisco Switches

Gathering information about the switch

Troubleshooting switch connectivity

Gather information about your network

Troubleshooting the startup configuration

Troubleshooting the running configuration

Book IV: Routing with Cisco Routers

Book IV: Chapter 1: Introducing Layer 3 Routers

Layer 3 — Network Layer Review

Purpose of a Layer 3 Router

Basic Router Functions

Managing routing protocols

Building routing tables

Routing packets

Book IV: Chapter 2: Managing a Router Using Cisco IOS

Best Practices for Using Cisco Routers

Connecting to a Cisco Router

Connecting locally

Connecting remotely

Cisco Router Startup Process

Configuring a Cisco Router

Initial router configuration

Managing Cisco router configuration

Managing Cisco Router Authentication

Console password

Telnet password

Auxiliary password

Privileged password

Encrypting passwords

Enabling Secure Shell (SSH)

Recovering router passwords

Book IV: Chapter 3: Network Routing

Introducing Network Routes

Static routes

Default routes

Dynamic routes

Routing Protocols

Routed Protocols

Routing Decision Criteria

Administrative distance

Routing protocol metrics

Routing Methods

Distance vector routing

Link-state routing

Hybrid routing

Configuring Routing Protocols

Book IV: Chapter 4: Routing Information Protocol (RIP)

Introducing Routing Information Protocol (RIP)

An interior gateway protocol

Routing tables, updates, and hop count

Routing error mitigation methods

Split horizon

Convergence and timers

RIPv1

RIPv2

RIPng

Configuring RIP

Verifying RIP

Book IV: Chapter 5: Enhanced Interior Gateway Routing Protocol (EIGRP)

IGRP — The Foundation of EIGRP

EIGRP Benefits

Characteristics of EIGRP

EIGRP Operation

Basic components

Routing tables

Neighboring successors

EIGRP packet types

Convergence

Route updates

DUAL — Diffusing Update Algorithm

Classful and classless routing

Configuring EIGRP

Start up EIGRP

Enable EIGRP on router interfaces

Verifying and Monitoring EIGRP Operation

Inspect the routing table

Inspect EIGRP protocol configuration

Inspect EIGRP topology table configuration

Inspect EIGRP neighbor information

Troubleshooting EIGRP

Book IV: Chapter 6: Open Shortest Path First (OSPF) Protocol

Introducing Open Shortest Path First (OSPF)

Routing tables

Characteristics of OSPF

Convergence

Route updates

Cost metric

OSPF Routing Hierarchy

OSPF route summarization

OSPF designated router (DR)

OSPF backup designated router (BDR)

Configuring OSPF

Start up OSPF

Enable OSPF on router interfaces

Configure OSPF options

Verifying and Monitoring OSPF Operation

Inspect the routing table

Inspect the OSPF protocol configuration

Inspect the OSPF interface configuration

Inspect the OSPF neighbor information

Inspect the OSPF routing database

Troubleshooting OSPF

Book V: Wireless Networks

Book V: Chapter 1: Introducing Wireless Networks

Purpose of Wireless Networks

Going over the Air, Locally or Globally

Wireless personal-area network (WPAN)

Wireless local-area network (WLAN)

Wireless metropolitan-area network (WMAN)

Wireless wide-area network (WWAN)

Sharing the Airwaves

Using unlicensed radio bands

Modulating the Airwaves

Introducing signals

Modulating signals

Using RF channels

Introducing RF modulation techniques

Introducing Wireless Local Area Network (WLAN) Standards (IEEE 802.11)

2.4-GHz band

5-GHz band

2.4-GHz and 5-GHz bands

Book V: Chapter 2: Wireless Local Area Network (WLAN) Security

Recognizing Security Risks

Introducing Security Risk Mitigation Methods

Authentication and data encryption

MAC address filtering

Hiding the service set identifier (SSID)

Intrusion detection and intrusion prevention

Changing default passwords

Management access

Book V: Chapter 3: Wireless Local Area Network (WLAN) Operation Modes

Ad Hoc Mode

Infrastructure Mode

Autonomous mode

Lightweight mode

Service set

Basic service set (BSS)

Extended service set (ESS)

Network planning and layout

Book V: Chapter 4: Managing Cisco Wireless Local Area Networks

Introducing the Cisco Unified Wireless Network Architecture (CUWN)

Cisco Wireless LAN Controller

Cisco WLAN Access Point (AP) Devices

Cisco Wireless Control System (WCS)

Lightweight Access Point Protocol (LWAPP)

Adaptive Wireless Path Protocol (AWPP)

Book V: Chapter 5: Configuring Cisco Wireless Local Area Networks

Configuration Flow

Set up and verify the wired LAN to which the WLAN will connect

Set up the Cisco Wireless LAN Controller(s)

Configure WLAN security

Set up Cisco access point(s)

Configuring backup controllers

Web authentication process

Example using the Cisco graphical user interface (GUI)

Book VI: Network Security

Book VI: Chapter 1: Network Security Basics

Network Zoning

Recognizing Security Risks

Information collectors

Introducing Security Risk Mitigation Methods

IP access control lists (ACLs)

NAT — The great masquerader

Virtual Private Networks (VPNs)

Cisco IOS Firewall

Cisco IOS Firewall — A sample configuration

Book VI: Chapter 2: Introducing IP Access Lists (IP ACLs)

The Purpose of Access Lists

Types of ACLs

Managing ACLs — Best Practices

Creating ACLs

Wildcard IP masks

Creating and applying the ACL

Creating standard ACLs

Creating extended ACLs

Creating Telnet/SSH ACLs

Creating named ACLs

Creating time-oriented ACLs

Creating switch port ACLs

Managing, Verifying, and Troubleshooting ACLs

Logging ACL IP matches

Configuring firewalls and ACLs with Cisco SDM GUI

Book VI: Chapter 3: Introducing Network Address Translation (NAT)

Purpose of NAT

Types of Network Address Translation

Local and global addresses

Operational Flow of NAT

Static NAT

Dynamic NAT operation

How overloading (PAT) operates

Configuring NAT

Configuring static NAT

Configuring dynamic NAT

Configuring Port Address Translation (PAT)

Managing NAT

Monitoring and troubleshooting NAT

Using the CLI commands

Configuring NAT with the Cisco SDM GUI

Book VI: Chapter 4: Introducing Virtual Private Networks (VPNs)

Purpose of VPNs

Type of VPNs

Choosing a VPN Implementation Method

Using IPsec

Using Secure Socket Layer (SSL)

Using tunneling

Split tunneling

Creating and Managing IPsec VPNs

Introducing IPsec protocols

Choosing transport mode versus tunnel mode

Configuring Cisco Virtual Private Networks

Creating a VPN with the Cisco Security Device Manager (SDM)

Enabling quality of service (QoS) in the VPN using Cisco SDM

Book VII: Wide Area Networks (WAN)

Book VII: Chapter 1: Wide-Area Networking Basics

Introducing WANs

Purpose of WANs

Data terminal equipment (DTE) and data communications equipment (DCE)

Cisco serial interfaces

DCE serial interfaces

Connection Types

Encapsulation Types

HDLC (High-Level Data Link Control)

PPP (Point-to-Point Protocol)

SLIP (Serial Line Internet Protocol)

Frame Relay

ATM (Asynchronous Transfer Mode)

X.25

Introducing Cable Connections

RJ-45 cabling

DB-25 cabling and adapters

Introducing Digital Subscriber Line (DSL) Connections

Book VII: Chapter 2: HDLC (High-Level Data Link Control) Protocol

Introducing the High-Level Data Link Control Protocol

HDLC links

Data framing

SLARP

Configuring HDLC

Monitoring HDLC

Book VII: Chapter 3: PPP (Point-to-Point Protocol)

What Is PPP?

Operational Flow of PPP

Link Control Protocol (LCP)

Purpose of LCP

LCP options

Network Control Protocol (NCP)

PAP and CHAP Authentication

Password Authentication Protocol (PAP)

Challenge Handshake Authentication Protocol (CHAP)

Configuring PPP

Set up router host names used for authentication

Configure passwords to authenticate between routers

Configure PPP encapsulation on the router interface

Configure PAP and CHAP authentication on both routers

Configuring PPP callback for ISDN Dial on Demand Routing (DDR)

Configuring PPP with the Cisco Security Device Manager (SDM)

Monitoring and Troubleshooting PPP

PPP link quality monitoring

PPP debug commands

Book VII: Chapter 4: Frame Relay

Introducing Frame Relay

Purpose of Frame Relay WAN connections

Establishing virtual circuits

Identifying virtual circuits using data-link connection identifiers (DLCIs)

Reserving bandwidth using access rate and CIR guarantee

Frame Relay link status control using LMI

Frame Relay frame structure

Frame Relay flow and congestion control using DE, FECN, and BECN

Frame Relay address resolution using Inverse ARP

Managing Frame Relay

Frame Relay topologies

Operational flow of Frame Relay

Split horizon issues in a Frame Relay WAN

Configuring single interfaces for Frame Relay over a point-to-point link

Configuring subinterfaces for Frame Relay over multipoint links

Configuring Frame Relay with the Cisco Router and Security Device Manager (SDM)

Monitoring and Troubleshooting Frame Relay

Book VII: Appendix A: About the CD

Prep Test

Book VII: Appendix B: Cisco CCNA Exam Preparation

Arriving at the exam location

Taking the exam

CCNA® Certification All-in-One For Dummies®

by Silviu Angelescu

CCNA® Certification All-in-One For Dummies®

Published byWiley Publishing, Inc.111 River StreetHoboken, NJ 07030-5774www.wiley.com

Copyright © 2010 by Wiley Publishing, Inc., Indianapolis, Indiana

Published simultaneously in Canada

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. The CompTIA Authorized Quality Curriculum logo is a proprietary trademark of CompTIA. All rights reserved. All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book.

Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Website is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Website may provide or recommendations it may make. Further, readers should be aware that Internet Websites listed in this work may have changed or disappeared between when this work was written and when it is read.

For general information on our other products and services, please contact our Customer Care Department within the U.S. at 877-762-2974, outside the U.S. at 317-572-3993, or fax 317-572-4002.

For technical support, please visit www.wiley.com/techsupport.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.

Library of Congress Control Number: 2010922557

ISBN: 978-0-470-48962-8

Manufactured in the United States of America

10 9 8 7 6 5 4 3 2 1

About the Authors

Silviu Angelescu is a network and software engineer, consultant and technical trainer, specialized in data networks, storage networks and virtualization. He has worked as network and software engineer, consultant and corporate trainer for more than ten years at various high-tech companies and academic institutions, such as, Network Appliance (NetApp), Computer Associates (CA), CGI, Dawson College, and the University of Montreal. Silviu also ran a consulting business for training organizations, designing, developing, and deploying scheduling software and network services. He graduated in Computer Science at the University of Montreal and is currently an engineer and trainer in the Research Triangle Park, in North Carolina, USA.

Andrew Swerczek is a network engineer, computer lab instructor, and technical writer with over twenty years experience in the Information Technology field. He has worked for various governmental agencies and contractors including the US Department of Defense and Wang Laboratories. Andrew has achieved many IT industry certifications such as CCNA, CNE, CNA, CIW, DCSNP, NACA, FCA, IBA, i-Net+, Network+, Server+, and A+. He is a graduate from the London School of Journalism, owns a small business, and currently resides in the Harz Mountains region, in Germany.

Author’s Acknowledgments

I would like to thank Katie Feltman, Pat O’Brien, John Edwards, and Bruce Tomlin: thanks for your hard work, support and patience. A lot of work goes into publishing and producing a book: I want to thank everyone at Wiley who worked behind the scenes to keep this project on track and make it happen.

I also want to thank Andrew Swerczek for his hard work and contribution to this book: Chapters one to five in Book II, Chapters one to four in Book VI, Chapters one to four in Book VII. Thanks also to Ed Tetz for his contribution: Chapters two to five in Book V.

Publisher’s Acknowledgments

We’re proud of this book; please send us your comments through our online registration form located at www.dummies.com/register/.

Some of the people who helped bring this book to market include the following:

Acquisitions, Editorial, and Media Development

Project Editor: Pat O’Brien

Senior Acquisitions Editor: Katie Feltman

Copy Editor: John Edwards

Technical Editor: Bruce Tomlin

Editorial Manager: Kevin Kirschner

Media Development Project Manager: Laura Moss-Hollister

Media Development Assistant Project Manager: Jenny Swisher

Media Development Associate Producer: Shawn Patrick

Editorial Assistant: Amanda Graham

Sr. Editorial Assistant: Cherie Case

Cartoons: Rich Tennant (www.the5thwave.com)

Composition Services

Project Coordinator: Katie Crocker

Layout and Graphics: Christin Swinford, Christine Williams

Proofreaders: Jessica Kramer, Toni Settle

Indexer: BIM Indexing & Proofreading Services

Special HelpAnne Sullivan

Publishing and Editorial for Technology Dummies

Richard Swadley, Vice President and Executive Group Publisher

Andy Cummings, Vice President and Publisher

Mary Bednarek, Executive Acquisitions Director

Mary C. Corder, Editorial Director

Publishing for Consumer Dummies

Diane Graves Steele, Vice President and Publisher

Joyce Pepple, Acquisitions Director

Composition Services

Debbie Stailey, Director of Composition Services

The logo of the CompTIA Authorized Quality Curriculum (CAQC) program and the status of this or other training materials as “Authorized” under the CompTIA Authorized Quality Curriculum program signifies that, in CompTIA’s opinion, such training material covers the content of CompTIA’s related certification exam.

The contents of this training material were created for the CompTIA A+ Certification exam covering CompTIA certification objectives that were current as of 2009.

CompTIA has not reviewed or approved the accuracy of the contents of this training material and specifically disclaims any warranties of merchantability or fitness for a particular purpose. CompTIA makes no guarantee concerning the success of persons using any such “Authorized” or other training material in order to prepare for any CompTIA certification exam.

How to become CompTIA certified:

This training material can help you prepare for and pass a related CompTIA certification exam or exams. In order to achieve CompTIA certification, you must register for and pass a CompTIA certification exam or exams.

In order to become CompTIA certified, you must:

1.Select a certification exam provider. For more information please visit http://www.comptia.org/certification/general_information/exam_locations.aspx.

2. Register for and schedule a time to take the CompTIA certification exam(s) at a convenient location.

3. Read and sign the Candidate Agreement, which will be presented at the time of the exam(s). The text of the Candidate Agreement can be found at http://www.comptia.org/certification/general_information/candidate_agreement.aspx.

4. Take and pass the CompTIA certification exam(s).

For more information about CompTIA’s certifications, such as its industry acceptance, benefits or program news, please visit www.comptia.org/certification.

CompTIA is a not-for-profit information technology (IT) trade association. CompTIA’s certifications are designed by subject matter experts from across the IT industry. Each CompTIA certification is vendor-neutral, covers multiple technologies and requires demonstration of skills and knowledge widely sought after by the IT industry.

To contact CompTIA with any questions or comments, please call 1-630-678-8300 or email [email protected].

Introduction

The CCNA certification will serve as a basic foundation for a number of other certifications that you may pursue. The exam tests your knowledge of CCNA hardware and software used in today’s computer world, and the certification is one of the most popular certifications for IT professionals to prove their hardware and software knowledge.

About This Book

This book is designed to be a hands-on, practical guide to help you pass the CCNA exam. This book is written in a way that helps you understand complex technical content and prepares you to apply that knowledge to real-world scenarios.

I understand the value of a book that covers the points needed to pass the CCNA exams, but I also understand the value of ensuring that the information helps you perform IT-related tasks when you are on the job. That is what this book offers you — key points to pass the exams combined with practical information to help you in the real world, which means that this book can be used in more than one way:

♦ An exam preparation tool: Because my goal is to help you pass the CCNA exams, this book is packed with exam-specific information. You should understand everything that is in this book before taking the exams.

♦ A reference: Rely on my extensive experience in the IT industry not only to study for (and pass) the exams but also to help you perform common computer-related tasks on the job. I hope you find this book a useful tool that you can refer to time and time again in your career.

Foolish Assumptions

I make a few assumptions about you as a reader and have written this book with these assumptions in mind:

♦ You are interested in obtaining the CCNA. After all, the focus of this book is helping you pass the exams.

♦ You will study hard and do as much hands-on work as possible. There is a lot of content on the exam, and you will most likely need to read over the information a few times to ensure that you understand the content. You should also experiment as much as possible after you read a particular topic

How This Book Is Organized

Like all All-In-One For Dummies books, chapters are organized into minibooks. The chapters in each minibook are related by a specific exam theme or topic:

♦ Book I: Networking Basics

♦ Book II: TCP/IP

♦ Book III: Switching with Cisco Switches

♦ Book IV: Routing With Cisco Routers

♦ Book V: Wireless Networks

♦ Book VI: Network Security

♦ Book VII: Wide Area Networks (WAN)

Appendix A gives you an overview of what you can find on the CD-ROM that accompanies the book. Appendix B shows you the ins and outs of exam preparation.

Icons Used in This Book

I use a number of icons in this book to draw your attention to pieces of useful information.

Information that would be helpful to you in the real world is indicated with a Tip icon. Expect to find shortcuts and timesavers here.

This icon is used to flag information that may be useful to remember on the job.

Information that could cause problems to you or to the computer is indicated with a Warning icon. If you see a Warning icon, make sure you read it. The computer you save may be your own.

Detailed information that is not needed for the exams or that is a step above the knowledge you absolutely need to know for the exams is indicated with a Technical Stuff icon.

Where to Go from Here

Appendix B is a guide to the ins and outs of the CCNA exams. It tells you the chapters that cover each required subject. Or you can just turn the page and begin at the beginning.

Let’s get started!

Book I

Networking Basics

Contents at a Glance

Chapter 1: Introducing Computer Networks

Purpose of Computer Networks

Operation Flow of Computer Networks

Topologies of Computer Networks

Chapter 2: The OSI Reference Model

Introduction to the OSI Reference Model

Seven Layers

Benefits of the OSI Reference Model

Chapter 3: Introducing the TCP/IP Protocol Suite

Introduction to the TCP/IP Protocol Suite

Layer 7: Application

Layer 6: Presentation

Layer 5: Session

Layer 4: Transport

Layer 3: Network

Layer 2: Data Link

Layer 1: Physical

Chapter 4: Data Encapsulation

Introducing Data Encapsulation

Chapter 5: Binary, Hexadecimal, and Decimal Numbering Systems

Decimal Numbers

Binary Numbers

Hexadecimal Numbers

Chapter 6: Local-Area Networks (LANs)

Introduction to Local-Area Networks

Ethernet Networking

Ethernet Standards

Ethernet in the OSI Model

Chapter 7: Introducing Wide-Area Networks (WANs)

Introducing Wide-Area Networks

Dedicated Leased Line Connections

Circuit-Switched Connections

Packet-Switched Connections

Cell-Switched Connections

Chapter 8: Introducing Wireless Networks

Benefits and Costs of Wireless Networks

Security Risks

Chapter 9: Network Design

Cisco Hierarchical Network Model

Core Layer

Distribution Layer

Access Layer

Benefits

Chapter 10: Introducing Cisco Hardware and Software

Introducing Cisco Products

Introducing Cisco Device Configurations

Meet the Cisco IOS User Interface

Chapter 1: Introducing Computer Networks

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!