1. Trang chủ
  2. » Giáo Dục - Đào Tạo

CCNA certification all in one for dummies, 2010 edition

987 212 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 987
Dung lượng 14,08 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

• Basic training — review LANs, WANs, Cisco hardware and software, TCP/IP, and network design • Switches and routers — learn to manage and troubleshoot Cisco switches and VLANs, STP,

Trang 1

• Switching with Cisco Switches

• Routing with Cisco Routers

Dummies Test Engine — an exclusive test-prep software package

packed with sample test questions Questions reflect the tone

and content of the actual exam.

See the CD Appendix for complete system requirements

Open the book and find:

routers are for

protocols

Cisco IOS

security threats

switches

Silviu Angelescu has been a network and software engineer, consultant,

and technical trainer for more than a decade at various high-tech companies

and academic institutions Currently an engineer and trainer at NetApp,

he has worked for Computer Associates, CGI, Dawson College, and the

Pass your CCNA exam

and boost your career —

here’s just what you need!

The demand for Cisco Certified Network Associates is up, so

rise to the challenge and get your certification! This guide

covers all the stuff you need to know, and even helps get

you in test-taking mode with plenty of practice questions

on the CD Plus, you can use this book as a reference after

you get your CCNA certification and that great job!

• Basic training — review LANs, WANs, Cisco hardware and software,

TCP/IP, and network design

• Switches and routers — learn to manage and troubleshoot Cisco

switches and VLANs, STP, port trunking, Ether-Channel, VoIP,

routers and routing protocols

• Going wireless — plunge into wireless communication concepts

and WLAN standards, operation modes, service sets, and Cisco

Unified Wireless Networks architecture

• Feel secure — study network security threats, best practices,

access control lists, managing firewalls, and more

• A wide net — learn about wide-area network connection types,

DSL networks, data encapsulation protocols, and authentication

Trang 2

Start with FREE Cheat Sheets

Cheat Sheets include

• Common Instructions

• And Other Good Stuff!

Get Smart at Dummies.com

Dummies.com makes your life easier with 1,000s

of answers on everything from removing wallpaper

to using the latest version of Windows

Check out our

• Illustrated Articles

• Step-by-Step Instructions

Plus, each month you can win valuable prizes by entering

our Dummies.com sweepstakes *

Want a weekly dose of Dummies? Sign up for Newsletters on

• Digital Photography

• Microsoft Windows & Office

• Personal Finance & Investing

• Health & Wellness

• Computing, iPods & Cell Phones

• Food, Home & Garden

Find out “HOW” at Dummies.com

To access the Cheat Sheet created specifically for this book, go to

www.dummies.com/cheatsheet/ccnacert

Trang 4

CCNA ® Certifi cation All-in-One For Dummies ®

Copyright © 2010 by Wiley Publishing, Inc., Indianapolis, Indiana

Published by Wiley Publishing, Inc., Indianapolis, Indiana

Published simultaneously in Canada

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or

by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as

permit-ted under Sections 107 or 108 of the 1976 Unipermit-ted States Copyright Act, without either the prior written

permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the

Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600

Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley

& Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://

www.wiley.com/go/permissions.

Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the

Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, Making Everything

Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc and/

or its affi liates in the United States and other countries, and may not be used without written

permis-sion The CompTIA Authorized Quality Curriculum logo is a proprietary trademark of CompTIA All rights

reserved All other trademarks are the property of their respective owners Wiley Publishing, Inc., is not

associated with any product or vendor mentioned in this book.

LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO

REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF

THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING

WITH-OUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE NO WARRANTY MAY BE

CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS THE ADVICE AND STRATEGIES

CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION THIS WORK IS SOLD WITH THE

UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR

OTHER PROFESSIONAL SERVICES IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF

A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT NEITHER THE PUBLISHER NOR THE

AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM THE FACT THAT AN

ORGANIZA-TION OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITAORGANIZA-TION AND/OR A POTENTIAL SOURCE

OF FURTHER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES

THE INFORMATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT

MAY MAKE FURTHER, READERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS

WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND

WHEN IT IS READ.

For general information on our other products and services, please contact our Customer Care

Department within the U.S at 877-762-2974, outside the U.S at 317-572-3993, or fax 317-572-4002.

For technical support, please visit www.wiley.com/techsupport.

Wiley also publishes its books in a variety of electronic formats Some content that appears in print may

not be available in electronic books.

Library of Congress Control Number: 2010922557

ISBN: 978-0-470-48962-8

Manufactured in the United States of America

10 9 8 7 6 5 4 3 2 1

Disclaimer: This eBook does not include ancillary media that was packaged with the

printed version of the book

Trang 5

About the Authors

Silviu Angelescu is a network and software engineer, consultant and

technical trainer, specialized in data networks, storage networks and virtualization He has worked as network and software engineer, consultant and corporate trainer for more than ten years at various high-tech companies and academic institutions, such as, Network Appliance (NetApp), Computer Associates (CA), CGI, Dawson College, and the University of Montreal Silviu also ran a consulting business for training organizations, designing, developing, and deploying scheduling software and network services He graduated in Computer Science at the University of Montreal and is currently an engineer and trainer in the Research Triangle Park, in North Carolina, USA

Andrew Swerczek is a network engineer, computer lab instructor, and

technical writer with over twenty years experience in the Information Technology fi eld He has worked for various governmental agencies and contractors including the US Department of Defense and Wang Laboratories

Andrew has achieved many IT industry certifi cations such as CCNA, CNE, CNA, CIW, DCSNP, NACA, FCA, IBA, i-Net+, Network+, Server+, and A+ He is a graduate from the London School of Journalism, owns a small business, and currently resides in the Harz Mountains region, in Germany

Trang 7

Author’s Acknowledgments

I would like to thank Katie Feltman, Pat O’Brien, John Edwards, and Bruce Tomlin: thanks for your hard work, support and patience A lot of work goes into publishing and producing a book: I want to thank everyone at Wiley who worked behind the scenes to keep this project on track and make it happen

I also want to thank Andrew Swerczek for his hard work and contribution to this book: Chapters one to fi ve in Book II, Chapters one to four in Book VI, Chapters one to four in Book VII Thanks also to Ed Tetz for his contribution:

Chapters two to fi ve in Book V

Trang 8

Publisher’s Acknowledgments

We’re proud of this book; please send us your comments at http://dummies.custhelp.com

For other comments, please contact our Customer Care Department within the U.S at 877-762-2974,

outside the U.S at 317-572-3993, or fax 317-572-4002.

Some of the people who helped bring this book to market include the following:

Acquisitions, Editorial, and Media

Development

Project Editor: Pat O’Brien

Senior Acquisitions Editor: Katie Feltman

Copy Editor: John Edwards

Technical Editor: Bruce Tomlin

Editorial Manager: Kevin Kirschner

Media Development Project Manager:

Laura Moss-Hollister

Media Development Assistant Project

Manager: Jenny Swisher Media Development Associate Producer:

Shawn Patrick

Editorial Assistant: Amanda Graham

Sr Editorial Assistant: Cherie Case

Cartoons: Rich Tennant

Special Help: Anne Sullivan

Publishing and Editorial for Technology Dummies

Richard Swadley, Vice President and Executive Group Publisher Andy Cummings, Vice President and Publisher

Mary Bednarek, Executive Acquisitions Director Mary C Corder, Editorial Director

Publishing for Consumer Dummies

Diane Graves Steele, Vice President and Publisher Composition Services

Debbie Stailey, Director of Composition Services

Trang 9

The logo of the CompTIA Authorized Quality Curriculum (CAQC) program and the status of this or other training materials as “Authorized” under the CompTIA Authorized Quality Curriculum program signifi es that, in CompTIA’s opinion, such training material covers the content of CompTIA’s related certifi cation exam.

The contents of this training material were created for the CompTIA A+

Certifi cation exam covering CompTIA certifi cation objectives that were current as of 2009

CompTIA has not reviewed or approved the accuracy of the contents of this training material and specifi cally disclaims any warranties of merchantability

or fi tness for a particular purpose CompTIA makes no guarantee concerning the success of persons using any such “Authorized” or other training material

in order to prepare for any CompTIA certifi cation exam

How to become CompTIA certifi ed:

This training material can help you prepare for and pass a related CompTIA certifi cation exam or exams In order to achieve CompTIA certifi cation, you must register for and pass a CompTIA certifi cation exam or exams

In order to become CompTIA certifi ed, you must:

1.Select a certifi cation exam provider For more information please visit

http://www.comptia.org/certification/general_information/

exam_locations.aspx

2 Register for and schedule a time to take the CompTIA certifi cation

exam(s) at a convenient location

3 Read and sign the Candidate Agreement, which will be presented at

the time of the exam(s) The text of the Candidate Agreement can be found at http://www.comptia.org/certification/general_

information/candidate_agreement.aspx

4 Take and pass the CompTIA certifi cation exam(s).

For more information about CompTIA’s certifi cations, such as its industry acceptance, benefi ts or program news, please visit www.comptia.org/

certification

CompTIA is a not-for-profi t information technology (IT) trade association

CompTIA’s certifi cations are designed by subject matter experts from across the IT industry Each CompTIA certifi cation is vendor-neutral, covers mul-tiple technologies and requires demonstration of skills and knowledge widely sought after by the IT industry

To contact CompTIA with any questions or comments, please call

1-630-678-8300 or email questions@comptia.org

Trang 11

Contents at a Glance

Introduction 1

Book I: Networking Basics 3

Chapter 1: Introducing Computer Networks 5

Chapter 2: The OSI Reference Model 15

Chapter 3: Introducing the TCP/IP Protocol Suite 25

Chapter 4: Data Encapsulation 41

Chapter 5: Binary, Hexadecimal, and Decimal Numbering Systems 49

Chapter 6: Local-Area Networks (LANs) 63

Chapter 7: Introducing Wide-Area Networks (WANs) 85

Chapter 8: Introducing Wireless Networks 93

Chapter 9: Network Design 99

Chapter 10: Introducing Cisco Hardware and Software 111

Book II: TCP/IP 165

Chapter 1: Introducing TCP/IP 167

Chapter 2: TCP/IP Layers and Protocols 187

Chapter 3: IP Addressing 213

Chapter 4: Subnetting 231

Chapter 5: Internet Protocol Version 6 (IPv6) 261

Book III: Switching with Cisco Switches 289

Chapter 1: Introducing Layer 2 Switches 291

Chapter 2: Managing a Switch Using Cisco IOS 313

Chapter 3: Controlling Network Traffi c with Cisco Switches 369

Chapter 4: Spanning Tree Protocol (STP) 385

Chapter 5: Virtual Local Area Networks (VLANs) 415

Chapter 6: Voice over IP (VoIP) 445

Chapter 7: Troubleshooting a Switch Using Cisco IOS 455

Book IV: Routing with Cisco Routers 503

Chapter 1: Introducing Layer 3 Routers 505

Chapter 2: Managing a Router Using Cisco IOS 517

Chapter 3: Network Routing 567

Trang 12

Chapter 4: Routing Information Protocol (RIP) 587

Chapter 5: Enhanced Interior Gateway Routing Protocol (EIGRP) 607

Chapter 6: Open Shortest Path First (OSPF) Protocol 625

Book V: Wireless Networks 645

Chapter 1: Introducing Wireless Networks 647

Chapter 2: Wireless Local Area Network (WLAN) Security 665

Chapter 3: Wireless Local Area Network (WLAN) Operation Modes 675

Chapter 4: Managing Cisco Wireless Local Area Networks 691

Chapter 5: Confi guring Cisco Wireless Local Area Networks 701

Book VI: Network Security 715

Chapter 1: Network Security Basics 717

Chapter 2: Introducing IP Access Lists (IP ACLs) 735

Chapter 3: Introducing Network Address Translation (NAT) 763

Chapter 4: Introducing Virtual Private Networks (VPNs) 785

Book VII: Wide Area Networks (WAN) 805

Chapter 1: Wide-Area Networking Basics 807

Chapter 2: HDLC (High-Level Data Link Control) Protocol 823

Chapter 3: PPP (Point-to-Point Protocol) 831

Chapter 4: Frame Relay 855

Appendix A: About the CD 881

Appendix B: Cisco CCNA Exam Preperation 885

Index 897

Trang 13

Table of Contents

Introduction 1

About This Book 1

Foolish Assumptions 1

How This Book Is Organized 2

Icons Used in This Book 2

Where to Go from Here 2

Book I: Networking Basics 3

Chapter 1: Introducing Computer Networks 5

Purpose of Computer Networks 5

Network applications 6

Operation Flow of Computer Networks 7

Topologies of Computer Networks 10

Chapter 2: The OSI Reference Model 15

Introduction to the OSI Reference Model 15

Seven Layers 15

Layer 7: Application 16

Layer 6: Presentation 17

Layer 5: Session 17

Layer 4: Transport 17

Layer 3: Network 18

Layer 2: Data link 18

Layer 1: Physical 19

Benefi ts of the OSI Reference Model 19

Chapter 3: Introducing the TCP/IP Protocol Suite 25

Introduction to the TCP/IP Protocol Suite 26

Layer 7: Application 26

Some TCP/IP protocols at Layer 7 26

Some TCP/IP software applications at Layer 7 27

Layer 6: Presentation 27

Some TCP/IP protocols at Layer 6 27

Some TCP/IP software applications at Layer 6 28

Layer 5: Session 28

Trang 14

CCNA Certification All-in-One For Dummies

xii

Layer 4: Transport 28

Connectionless transport 29

Connection-oriented transport 29

The most common TCP/IP protocols at Layer 4 29

TCP fl ow control 29

UDP simplicity 32

TCP/IP ports 32

Layer 3: Network 33

Some TCP/IP protocols at Layer 3 34

Hierarchy of IP addresses 34

Layer 2: Data Link 36

Some TCP/IP protocols at Layer 2 37

Address resolution 37

Layer 1: Physical 37

Chapter 4: Data Encapsulation .41

Introducing Data Encapsulation 41

Chapter 5: Binary, Hexadecimal, and Decimal Numbering Systems 49

Decimal Numbers 50

Binary Numbers 51

Hexadecimal Numbers 53

Numbering systems notation 56

Bits, nibbles, and bytes 56

Converting binary to hexadecimal 57

Converting hexadecimal to binary 58

Chapter 6: Local-Area Networks (LANs) 63

Introduction to Local-Area Networks 63

Ethernet Networking 63

CSMA/CD protocol 64

Duplex communication 65

Ethernet Standards 66

10-Mbps Ethernet (IEEE 802.3) 66

Fast Ethernet (100-Mbps) 68

Gigabit Ethernet (1000-Mbps) 70

10 Gigabit Ethernet (10000-Mbps) 73

Ethernet in the OSI Model 75

Data link layer 75

Physical layer 78

Chapter 7: Introducing Wide-Area Networks (WANs) 85

Introducing Wide-Area Networks 85

Dedicated Leased Line Connections 86

Advantages of leased lines 86

Disadvantage of leased lines 86

Dedicated leased line protocols 87

Trang 15

Table of Contents xiii

Circuit-Switched Connections 87

Advantage of circuit-switched connections 87

Disadvantages of circuit-switched connections 87

Circuit-switched connection protocols 88

Packet-Switched Connections 88

Advantages of packet-switched connections 88

Disadvantage of packet-switched connections 89

Packet-switched connection protocols 89

Cell-Switched Connections 89

Advantages of cell-switched connections 89

Disadvantages of cell-switched connections 90

Cell-switched connection protocols 90

Chapter 8: Introducing Wireless Networks .93

Wireless LAN (WLAN) 93

Wireless WAN 93

Benefi ts and Costs of Wireless Networks 94

Security Risks 94

Service set identifi er (SSID) 95

Wired Equivalent Privacy (WEP) 95

Wi-Fi Protected Access (WPA) 95

MAC address fi ltering 96

Chapter 9: Network Design 99

Cisco Hierarchical Network Model 99

Core Layer 99

Highly available core 100

Distribution Layer 103

Access Layer 105

Benefi ts 105

Specialization 105

Scalability 106

Limitation of problem domain 107

Chapter 10: Introducing Cisco Hardware and Software 111

Introducing Cisco Products 111

Cisco software 112

Cisco hardware 114

Introducing Cisco Device Confi gurations 115

Startup confi guration 115

Running confi guration 115

Meet the Cisco IOS User Interface 116

Cisco IOS command-line interface (CLI) 116

Cisco IOS graphical user interface (GUI) 130

Trang 16

CCNA Certification All-in-One For Dummies

xiv

Book II: TCP/IP 165

Chapter 1: Introducing TCP/IP 167

TCP/IP communication 168

We pioneered this 168

Components of TCP/IP 169

Introducing the major TCP/IP layers and protocols 174

Demystifying data encapsulation 180

Chapter 2: TCP/IP Layers and Protocols .187

Information Exchange through the OSI Layer 188

OSI Layers and Protocols 190

The physical layer: Layer 1 190

The data link layer: Layer 2 193

The network layer: Layer 3 197

The transport layer: Layer 4 202

The session layer: Layer 5 204

The presentation layer: Layer 6 205

The application layer: Layer 7 205

TCP/IP Layers and Protocols 207

The network access layer: Layer 1 208

The Internet layer: Layer 2 208

The host-to-host transport layer: Layer 3 208

The application layer: Layer 4 208

Chapter 3: IP Addressing .213

The Purpose of IP Addresses — It’s All about the Delivery 213

The Hierarchy of IP Addresses — Who’s in Charge? 214

Network and host addressing 214

Classes of IP addresses 215

Other reserved addresses 219

Understanding network ID, host ID, and subnet masks 220

Private IP Addresses — We Reserve the Right 222

Broadcasting — Shouting to the World! 223

Data-link Layer 2 broadcasts 223

Address Resolution Protocol — ARP’s on the Case, Sherlock! 225

The purpose of ARP 226

Proxy ARP 226

And what about RARP? 226

Chapter 4: Subnetting 231

Subnetting Basics 231

Purpose of subnetting 232

Subnet masks 234

Creating subnets 235

Subnet mask, network ID, host ID, and broadcast IP 236

Classless interdomain routing (CIDR) 236

Trang 17

Table of Contents xv

IP Address Class and Subnet Mask 239

Class C IP address subnets 240

IP subnet zero 240

Host addressing assignments 241

Class B IP address subnets 243

Class A IP address subnets 245

Variable-Length Subnet Masks (VLSMs) 250

Purpose of VLSM 250

VLSM design guidelines 252

Optimizing IP addressing with VLSM 253

Summarization 253

Summarization investigated 254

Summarization and VLSM 255

Chapter 5: Internet Protocol Version 6 (IPv6) 261

Internet Protocol Version 6 (IPv6) 261

The Benefi ts of IPv6 263

Introducing IPv6 Addressing 264

IPv6 address notation 266

Confi guring IPv6 270

Address autoconfi guration — DHCP who? 272

A dynamic approach 273

ICMPv6 275

Routing with IPv6 275

Static routing — Gimme some static! 275

Introducing IPv6 routing protocols 276

Migrating to IPv6 279

Migration methods 280

Book III: Switching with Cisco Switches 289

Chapter 1: Introducing Layer 2 Switches .291

Layer 2 — Data Link Layer Review 291

Purpose of a Layer 2 Switch 292

Hubs 293

Bridges 294

Switches 295

Basic Switch Functions 296

Address learning 296

Flooding, forwarding, and fi ltering frames 299

Avoiding loops 303

Managing Port Security 306

Filter based on MAC address 306

Filter based on number of devices connected 307

Filter based on sticky MAC address 307

Action triggered by fi lter 307

Transmitting Unicast, Multicast, and Broadcast 307

Trang 18

CCNA Certification All-in-One For Dummies

xvi

Chapter 2: Managing a Switch Using Cisco IOS 313

Best Practice for Using Cisco Switches 313

Connecting to a Cisco Switch 315

Connecting locally 315

Connecting remotely 318

Cisco Switch Startup Process 321

Confi guring a Cisco Switch 324

Initial switch confi guration 325

Managing Cisco switch confi guration 338

Managing Cisco Switch Authentication 352

Console password 353

Telnet password 354

Auxiliary password 355

Privileged password 356

Encrypting passwords 356

Enabling Secure Shell (SSH) 357

Recovering switch passwords 360

Chapter 3: Controlling Network Traffi c with Cisco Switches 369

Sending to MAC Addresses in Remote Networks 369

Sending frames within the LAN 369

Sending frames to a remote network 370

Deciding the Fate of Frames 375

Switching modes 375

Switching in Half-Duplex and Full-Duplex Modes 378

Reviewing half-duplex Ethernet 378

Reviewing full-duplex Ethernet 378

Duplex mode best practice 378

Confi guring port duplex mode on a Cisco switch 378

Confi guring port speed on a Cisco switch 379

Selecting a switch port 379

Avoiding Loops with Spanning Tree Protocol (STP) 379

Chapter 4: Spanning Tree Protocol (STP) 385

Introducing the Spanning Tree Protocol (STP) 386

STP Operation Flow 389

Electing a root bridge 389

Assigning STP port types 393

Achieving STP convergence 398

Introducing Cisco Options for STP 401

PortFast 401

BPDUGuard 402

BPDUFilter 403

UplinkFast 403

BackboneFast 405

Trang 19

Table of Contents xvii

Introducing Rapid Spanning Tree Protocol (RSTP) 405

Shorter delay before STP recalculation (max age timer) 405

Alternate port and backup port 406

Enabling RSTP on a Cisco switch 407

EtherChannel 407

EtherChannel and STP are friends 407

EtherChannel versions 408

Enabling EtherChannel on SW2 and SW5 409

Monitoring STP 410

Monitoring switch STP confi guration 410

Monitoring port STP confi guration 410

Chapter 5: Virtual Local Area Networks (VLANs) 415

Introducing Virtual Local Area Networks (VLANs) 416

VLANs keep things tidy 416

VLANs subdivide the broadcast domain 417

Benefi ts of VLANs 418

Managing VLANs 418

Create VLANs 419

Special-purpose VLANs 419

Static and dynamic VLAN membership 419

Identifying VLANs 421

Tagging data-link frames with a VLAN ID 421

VLAN Trunking 422

EtherChannel and VLANs are friends 423

VLAN or EtherChannel trunking? Both? 425

Confi guring EtherChannel and VLAN trunking 425

Introducing switch port types 426

Managing VLAN trunk ports 429

VLAN Trunking Protocol (VTP) 434

VTP creates and manages VLANs 434

VTP does not manage VLAN port membership 434

VTP benefi ts 434

VTP domain 434

VTP server 435

VTP switch operating mode 435

VTP updates 436

VTP pruning 436

VLAN ID range 436

VTP requirements 437

Enabling VTP 437

Monitoring and troubleshooting VTP 438

Routing Traffi c from One VLAN to Another 438

One router per VLAN 439

One large router with one port per VLAN 439

One subinterface per VLAN (router-on-a-stick) 440

Network (Layer 3) switch 440

Trang 20

CCNA Certification All-in-One For Dummies

xviii

Chapter 6: Voice over IP (VoIP) 445

Introducing Voice over IP (VoIP) 446

VoIP Requires Quality of Service (QoS) 446

Class of service (CoS) (IEEE 802.1p) 447

Cisco IP Phone 447

Cisco Discovery Protocol (CDP) 450

Negotiating VLAN 450

Negotiating CoS 450

Negotiating Cisco IP phone PC port 450

Confi guring VoIP on Cisco Switches 451

Enabling QoS on the upstream switch 451

Confi guring switch access port to trust CoS 451

Enabling VoIP VLAN on the switch access port 452

Chapter 7: Troubleshooting a Switch Using Cisco IOS .455

Troubleshooting Cisco Switches 455

Gathering information about the switch 456

Troubleshooting switch connectivity 473

Gather information about your network 485

Troubleshooting the startup confi guration 494

Troubleshooting the running confi guration 496

Book IV: Routing with Cisco Routers 503

Chapter 1: Introducing Layer 3 Routers 505

Layer 3 — Network Layer Review 505

Purpose of a Layer 3 Router 508

Basic Router Functions 511

Managing routing protocols 512

Building routing tables 513

Routing packets 513

Chapter 2: Managing a Router Using Cisco IOS 517

Best Practices for Using Cisco Routers 517

Connecting to a Cisco Router 519

Connecting locally 519

Connecting remotely 522

Cisco Router Startup Process 525

Confi guring a Cisco Router 528

Initial router confi guration 529

Managing Cisco router confi guration 540

Managing Cisco Router Authentication 554

Console password 555

Telnet password 556

Auxiliary password 557

Trang 21

Table of Contents xix

Privileged password 558

Encrypting passwords 559

Enabling Secure Shell (SSH) 560

Recovering router passwords 562

Chapter 3: Network Routing 567

Introducing Network Routes 567

Static routes 568

Default routes 570

Dynamic routes 571

Routing Protocols 571

Routed Protocols 572

Routing Decision Criteria 572

Administrative distance 573

Routing protocol metrics 574

Routing Methods 576

Distance vector routing 576

Link-state routing 580

Hybrid routing 582

Confi guring Routing Protocols 582

Chapter 4: Routing Information Protocol (RIP) 587

Introducing Routing Information Protocol (RIP) 588

An interior gateway protocol 588

Routing tables, updates, and hop count 590

Routing error mitigation methods 590

Split horizon 592

Convergence and timers 592

RIPv1 593

RIPv2 595

RIPng 597

Confi guring RIP 598

Verifying RIP 601

Chapter 5: Enhanced Interior Gateway Routing Protocol (EIGRP) 607

IGRP — The Foundation of EIGRP 608

EIGRP Benefi ts 608

Characteristics of EIGRP 609

EIGRP Operation 610

Basic components 610

Routing tables 610

Neighboring successors 612

EIGRP packet types 612

Convergence 612

Route updates 613

DUAL — Diffusing Update Algorithm 613

Classful and classless routing 614

Trang 22

CCNA Certification All-in-One For Dummies

xx

Confi guring EIGRP 615Start up EIGRP 615Enable EIGRP on router interfaces 616Verifying and Monitoring EIGRP Operation 617Inspect the routing table 617Inspect EIGRP protocol confi guration 618Inspect EIGRP topology table confi guration 618Inspect EIGRP neighbor information 619Troubleshooting EIGRP 620

Chapter 6: Open Shortest Path First (OSPF) Protocol 625

Introducing Open Shortest Path First (OSPF) 625Routing tables 626Characteristics of OSPF 626Convergence 627Route updates 627Cost metric 628OSPF Routing Hierarchy 628OSPF route summarization 630OSPF designated router (DR) 632OSPF backup designated router (BDR) 634Confi guring OSPF 634Start up OSPF 634Enable OSPF on router interfaces 635Confi gure OSPF options 638Verifying and Monitoring OSPF Operation 639Inspect the routing table 639Inspect the OSPF protocol confi guration 640Inspect the OSPF interface confi guration 640Inspect the OSPF neighbor information 640Inspect the OSPF routing database 640Troubleshooting OSPF 641

Book V: Wireless Networks 645

Chapter 1: Introducing Wireless Networks .647

Purpose of Wireless Networks 647Going over the Air, Locally or Globally 648Wireless personal-area network (WPAN) 648Wireless local-area network (WLAN) 648Wireless metropolitan-area network (WMAN) 648Wireless wide-area network (WWAN) 648Sharing the Airwaves 649Using unlicensed radio bands 649Modulating the Airwaves 651Introducing signals 651Modulating signals 652

Trang 23

Table of Contents xxi

Using RF channels 653Introducing RF modulation techniques 655 Introducing Wireless Local-Area Network (WLAN)

Standards (IEEE 802.11) 6572.4-GHz band 6575-GHz band 6602.4-GHz and 5-GHz bands 660

Chapter 2: Wireless Local Area Network (WLAN) Security 665

Recognizing Security Risks 665Introducing Security Risk Mitigation Methods 666Authentication and data encryption 667MAC address fi ltering 670Hiding the service set identifi er (SSID) 670Intrusion detection and intrusion prevention 671Changing default passwords 671Management access 672

Chapter 3: Wireless Local Area Network (WLAN) Operation Modes 675

Ad Hoc Mode 675Infrastructure Mode 679Autonomous mode 681Lightweight mode 681Service set 683Basic service set (BSS) 684Extended service set (ESS) 684Network planning and layout 685

Chapter 4: Managing Cisco Wireless Local Area Networks 691

Introducing the Cisco Unifi ed Wireless Network Architecture (CUWN) 691Cisco Wireless LAN Controller 692Cisco WLAN Access Point (AP) Devices 695Cisco Wireless Control System (WCS) 695Lightweight Access Point Protocol (LWAPP) 695Adaptive Wireless Path Protocol (AWPP) 697

Chapter 5: Confi guring Cisco Wireless Local Area Networks .701

Confi guration Flow 701Set up and verify the wired LAN to

which the WLAN will connect 701Set up the Cisco Wireless LAN Controller(s) 702Confi gure WLAN security 704Set up Cisco access point(s) 705Confi guring backup controllers 707Web authentication process 708Example using the Cisco graphical user interface (GUI) 709

Trang 24

CCNA Certification All-in-One For Dummies

xxii

Book VI: Network Security 715

Chapter 1: Network Security Basics 717

Network Zoning 718Recognizing Security Risks 722Information collectors 722Introducing Security Risk Mitigation Methods 725

IP access control lists (ACLs) 726NAT — The great masquerader 727Virtual Private Networks (VPNs) 728Cisco IOS Firewall 728Cisco IOS Firewall — A sample confi guration 730

Chapter 2: Introducing IP Access Lists (IP ACLs) .735

The Purpose of Access Lists 735Types of ACLs 738Managing ACLs — Best Practices 740Creating ACLs 742Wildcard IP masks 742Creating and applying the ACL 745Creating standard ACLs 745Creating extended ACLs 747Creating Telnet/SSH ACLs 749Creating named ACLs 751Creating time-oriented ACLs 753Creating switch port ACLs 754Managing, Verifying, and Troubleshooting ACLs 755Logging ACL IP matches 756Confi guring fi rewalls and ACLs with Cisco SDM GUI 757

Chapter 3: Introducing Network Address Translation (NAT) .763

Purpose of NAT 763Types of Network Address Translation 764Local and global addresses 766Operational Flow of NAT 767Static NAT 767Dynamic NAT operation 769How overloading (PAT) operates 769Confi guring NAT 770Confi guring static NAT 771Confi guring dynamic NAT 773Confi guring Port Address Translation (PAT) 776Managing NAT 777Monitoring and troubleshooting NAT 777Using the CLI commands 778Confi guring NAT with the Cisco SDM GUI 780

Trang 25

Table of Contents xxiii

Chapter 4: Introducing Virtual Private Networks (VPNs) 785

Purpose of VPNs 785Type of VPNs 787Choosing a VPN Implementation Method 787Using IPsec 788Using Secure Socket Layer (SSL) 790Using tunneling 792Split tunneling 793Creating and Managing IPsec VPNs 793Introducing IPsec protocols 794Choosing transport mode versus tunnel mode 794Confi guring Cisco Virtual Private Networks 796Creating a VPN with the Cisco Security

Device Manager (SDM) 799Enabling quality of service (QoS) in the VPN

using Cisco SDM 800

Book VII: Wide Area Networks (WAN) 805

Chapter 1: Wide-Area Networking Basics 807

Introducing WANs 807Purpose of WANs 808Data terminal equipment (DTE) and data

communications equipment (DCE) 808Cisco serial interfaces 809DCE serial interfaces 810Connection Types 811Encapsulation Types 812HDLC (High-Level Data Link Control) 812PPP (Point-to-Point Protocol) 812SLIP (Serial Line Internet Protocol) 813Frame Relay 813ATM (Asynchronous Transfer Mode) 813X.25 815Introducing Cable Connections 815RJ-45 cabling 815DB-25 cabling and adapters 817Introducing Digital Subscriber Line (DSL) Connections 818

Chapter 2: HDLC (High-Level Data Link Control) Protocol 823

Introducing the High-Level Data Link Control Protocol 823HDLC links 823Data framing 824SLARP 825Confi guring HDLC 826Monitoring HDLC 827

Trang 26

CCNA Certification All-in-One For Dummies

xxiv

Chapter 3: PPP (Point-to-Point Protocol) 831

What Is PPP? 831Operational Flow of PPP 834Link Control Protocol (LCP) 836Purpose of LCP 837LCP options 837Network Control Protocol (NCP) 838PAP and CHAP Authentication 839Password Authentication Protocol (PAP) 839Challenge Handshake Authentication Protocol (CHAP) 840Confi guring PPP 841Set up router host names used for authentication 842Confi gure passwords to authenticate between routers 842Confi gure PPP encapsulation on the router interface 843Confi gure PAP and CHAP authentication on both routers 844Confi guring PPP callback for ISDN Dial on

Demand Routing (DDR) 845Confi guring PPP with the Cisco Security

Device Manager (SDM) 846Monitoring and Troubleshooting PPP 847PPP link quality monitoring 848PPP debug commands 848

Chapter 4: Frame Relay 855

Introducing Frame Relay 855Purpose of Frame Relay WAN connections 855Establishing virtual circuits 856Identifying virtual circuits using data-link

connection identifi ers (DLCIs) 857Reserving bandwidth using access rate and CIR guarantee 858Frame Relay link status control using LMI 859Frame Relay frame structure 860Frame Relay fl ow and congestion control

using DE, FECN, and BECN 861Frame Relay address resolution using Inverse ARP 863Managing Frame Relay 863Frame Relay topologies 863Operational fl ow of Frame Relay 866Split horizon issues in a Frame Relay WAN 867Confi guring single interfaces for Frame

Relay over a point-to-point link 868Confi guring subinterfaces for Frame

Relay over multipoint links 870Confi guring Frame Relay with the

Cisco Router and Security Device Manager (SDM) 873Monitoring and Troubleshooting Frame Relay 873

Trang 27

Table of Contents xxv

Appendix A: About the CD 881

System Requirements 881Using the CD 881What You Will Find on the CD 882Prep Test 882Troubleshooting 883

Appendix B: Cisco CCNA Exam Preperation 885

CCNA: Foundation of Cisco Certifi cation Pyramid 885CCNA Skills 885CCNA Adaptive Testing 886Using This Book to Prepare for the Exams 887Making Arrangements to Take the Exams 888The Day the Earth Stood Still: Exam Day 888Arriving at the exam location 888Taking the exam 889

2009 Examination Objectives 891

Index 897

Trang 28

CCNA Certification All-in-One For Dummies

xxvi

Trang 29

The CCNA certification will serve as a basic foundation for a number

of other certifications that you may pursue The exam tests your knowledge of CCNA hardware and software used in today’s computer world, and the certification is one of the most popular certifications for IT professionals to prove their hardware and software knowledge

About This Book

This book is designed to be a hands-on, practical guide to help you pass the CCNA exam This book is written in a way that helps you understand complex technical content and prepares you to apply that knowledge to real-world scenarios

I understand the value of a book that covers the points needed to pass the CCNA exams, but I also understand the value of ensuring that the informa-tion helps you perform IT-related tasks when you are on the job That is what this book offers you — key points to pass the exams combined with practical information to help you in the real world, which means that this book can be used in more than one way:

An exam preparation tool: Because my goal is to help you pass the

CCNA exams, this book is packed with exam-specific information You should understand everything that is in this book before taking the exams

A reference: Rely on my extensive experience in the IT industry not

only to study for (and pass) the exams but also to help you perform common computer-related tasks on the job I hope you find this book a useful tool that you can refer to time and time again in your career

Foolish Assumptions

I make a few assumptions about you as a reader and have written this book with these assumptions in mind:

You are interested in obtaining the CCNA After all, the focus of this

book is helping you pass the exams

You will study hard and do as much hands-on work as possible There

is a lot of content on the exam, and you will most likely need to read over the information a few times to ensure that you understand the con-tent You should also experiment as much as possible after you read a particular topic

Trang 30

How This Book Is Organized

2

How This Book Is Organized

Like all All-In-One For Dummies books, chapters are organized into minibooks

The chapters in each minibook are related by a specific exam theme or topic:

Appendix A gives you an overview of what you can find on the CD-ROM that accompanies the book Appendix B shows you the ins and outs of exam preparation

Icons Used in This Book

I use a number of icons in this book to draw your attention to pieces of useful information

Information that would be helpful to you in the real world is indicated with a Tip icon Expect to find shortcuts and timesavers here

This icon is used to flag information that may be useful to remember on the job

Information that could cause problems to you or to the computer is cated with a Warning icon If you see a Warning icon, make sure you read it

indi-The computer you save may be your own

Detailed information that is not needed for the exams or that is a step above the knowledge you absolutely need to know for the exams is indicated with

a Technical Stuff icon

Where to Go from Here

Appendix B is a guide to the ins and outs of the CCNA exams It tells you the chapters that cover each required subject Or you can just turn the page and begin at the beginning

Let’s get started!

Trang 31

Book I Networking Basics

Trang 32

Chapter 2: The OSI Reference Model 15

Introduction to the OSI Reference Model 15Seven Layers 15Benefits of the OSI Reference Model 19

Chapter 3: Introducing the TCP/IP

Protocol Suite 25

Introduction to the TCP/IP Protocol Suite 26Layer 7: Application 26Layer 6: Presentation 27Layer 5: Session 28Layer 4: Transport 28Layer 3: Network 33Layer 2: Data Link 36Layer 1: Physical 37

Chapter 4: Data Encapsulation 41

Introducing Data Encapsulation 41

Chapter 5: Binary, Hexadecimal, and

Decimal Numbering Systems 49

Decimal Numbers 50Binary Numbers 51Hexadecimal Numbers 53

Chapter 6: Local-Area Networks

(LANs) 63

Introduction to Local-Area Networks 63Ethernet Networking 63Ethernet Standards 66Ethernet in the OSI Model 75

Chapter 7: Introducing Wide-Area Networks (WANs) 85

Introducing Wide-Area Networks 85Dedicated Leased Line Connections 86Circuit-Switched Connections 87Packet-Switched Connections 88Cell-Switched Connections 89

Chapter 8: Introducing Wireless Networks 93

Benefits and Costs of Wireless Networks 94Security Risks 94

Chapter 9: Network Design 99

Cisco Hierarchical Network Model 99Core Layer 99Distribution Layer 103Access Layer 105Benefits 105

Chapter 10: Introducing Cisco Hardware and Software 111

Introducing Cisco Products 111Introducing Cisco Device

Configurations 115Meet the Cisco IOS User Interface 116

Trang 33

Chapter 1: Introducing Computer Networks

Exam Objectives

Describing the purpose and functions of computer networks

Describing common network applications

Describing common networking devices

Describing the operation flow of computer networks and seeing how networking devices control the operation flow

Describing the impact of applications (Voice over IP and Video over IP)

on a network

Describing the components required for network and Internet communications

Describing the topologies of computer networks

CCNA certification not only attests your knowledge about Cisco

networking, but it also attests your knowledge about networking technologies in general This is one of the reasons why CCNA certification

is the gold-standard certification in the networking industry

Purpose of Computer Networks

You link computers in a network for the same reason that people network People networks are necessary to accomplish tasks that cannot

be accomplished by a single individual The same applies to computers

Computer networks were developed to aggregate the computing power of several individual computers into initially local networks, then campus networks, then metropolitan networks, then countrywide networks, and finally, global networks

A computer network is a group of computer host devices that communicate

with each other To enable this communication, the computer host devices are connected using wired or wireless connections The communication is controlled by network software running on the computer host devices and

on network devices.

Trang 34

Purpose of Computer Networks

6

Computer host devices can be any other devices used to access the network,

including servers, workstations, personal computers, smart phones, and laptops

Network devices can be any devices that stand between computer host

devices, including switches, routers, hubs, repeaters, and firewallsNetwork devices control and optimize communication between host devices

Network applicationsWhat’s the purpose? Here are just a few network application examples:

World Wide Web: Technically, this is a network application that

allows the exchange of text pages coded in Hypertext Markup Language (HTML) using the Hypertext Transfer Protocol (HTTP) Initially, these HTML pages only supported hyperlinks to jump from one page to another Now, HTTP and HTML have been augmented with dynamic extensions to allow a much more advanced, rich, multimedia Web experience than just jumping from one page to another

Electronic mail: I am sure that you have extensively used this one This

is a network application that allows the exchange of messages between two hosts In fact, studies show that e-mail is by far the most commonly used network application

File transfer and file sharing: This network application allows the

transfer of files from one computer host device to another Several variations of this application exist, such as File Transfer Protocol (FTP), Secure FTP (SFTP), Network File System (NFS), and Server Message Block (SMB), but all versions serve the same purpose: to transfer files from one network host to another

Remote control: This network application allows you to control a

computer host remotely from another host in the network As with file transfer, several remote control applications exist, such as Windows Remote Desktop, Virtual Network Computing (VNC), and remote shell (rsh)

Voice over IP (VoIP) and Video over IP: This network application

allows the transfer of voice and video signals over the Internet Protocol

Many Web sites stream video over the Internet today These sites use some VoIP network application to wrap their video content in IP packets and send them over the network to the computer host that requested the streamed video content Another example of VoIP is Cisco IP phones, which are being adopted today by many organizations

to save costs by concentrating their phone and data traffic over the same IP infrastructure

Trang 35

Book I Chapter 1

7

Operation Flow of Computer Networks

Shared network storage: This network application connects advanced

specialized storage devices to a storage network, making them accessible

to any computer host connected to that storage network Storage networks can be either

• Isolated, that is, connecting only to a few computer hosts locally

• Connected to other data networks ✦ High availability (HA) and parallel processing: This network application

enables computer hosts to act as a single logical host, sometimes also

called a computer cluster The hosts use clustering software that manages

the logical “supercomputer.” The clustering software needs to have those physical computers interconnected in a network

Computer clusters are used for the following:

High availability: Several levels of high availability exist, but generally

speaking, HA implies that whenever one of the physical computers

in the cluster fails, the remaining computer(s) takes over the load of the failed computer

Parallel processing: In parallel processing, all physical computers in

the cluster can process data at the same time, thereby improving processing speed and reliability

Both HA and parallel processing require a network connection between the physical computer hosts involved

Operation Flow of Computer Networks

A simple network can be three hosts connected to a hub A hub works very

much like a multiplexer, or a multiple socket power bar: Hosts connect to the hub, and they can “speak” and “hear” each other

To initiate a communication, a host needs information about another host

on the network:

network protocols and applications of the hosts

network interface card and John’s to transmit electrical signals between the NICs, over the network

A host’s logical (IP) address can be obtained through a name resolution, to

resolve the host name (John) to his IP address There are several options:

server to obtain the IP address for the name DNS servers keep tables of

Trang 36

8 Operation Flow of Computer Networks

host names and their corresponding IP addresses Whenever they are queried for the IP address of a host, they search the host name in their table, and if they find it, they return the IP address

Use a hosts file that lists the host and its corresponding IP address All

hosts can have a local hosts file that lists the hosts in the network with their corresponding IP address

This is a simple method to resolve host names to IP addresses, but hosts files need to be maintained manually Consequently, this method does not scale DNS servers are typically used instead

The logical IP address can be used to obtain the physical (MAC) address

to establish a connection between the NICs In a small network, a host can simply broadcast a request to obtain another host’s MAC address

The broadcast is sent to the data link layer broadcast address, which is FF:FF:FF:FF:FF:FF This is the standard broadcast address to query for MAC addresses

In larger networks, the amount of requests on the data link layer would harm performance Thus, it is best to limit the size of the network

So, two basic issues are at hand:

“Noise” generated by broadcast queries: One computer sends a broadcast

query to every other device in the network to obtain an IP address or a MAC address, and eventually the target computer responds Meanwhile,

all computers in the broadcast domain have “heard” the broadcast

request They were disturbed by a request that does not concern them

If lots of broadcast requests are being sent on the network by hosts

that just joined the network, for example, a broadcast storm can occur:

Everyone is disturbed by everyone’s broadcast request, and the network performance is considerably impacted

Message collision: After two computers know about each other and they

start to communicate, they send data frames on the link that is shared

by all other computers in that network segment If two computers try

to send frames at the same time, on the same wire, the frames collide

In that case, both computers back off: They stop sending frames, they wait a little while, and they try to resend You have no guarantee that the frames will not collide again when they are resent Typically, there are few chances that they collide again, because the two computers wait random time periods that are likely different However, collisions do happen, and they can slow a network considerably Remember the meeting room example: The more people in the room, the more chances that everyone tries to speak at the same time It’s the same with computers:

The more hosts you add to a network segment, the more chances of having frame collisions It’s best to keep network segments as small as possible

Trang 37

Book I Chapter 1

9

Operation Flow of Computer Networks

You can segment a network using a data link layer switch instead of a hub

Data-link switches are also called Layer 2 switches, because the data link layer is the second layer in the TCP/IP protocol stack In fact, every time I talk about a switch in this book, I refer to a Layer 2 switch Switches segment

networks into one collision domain per port A collision domain is a logical

space where messages can collide

You need to understand the following networking concepts for the CCNA test:

because several hosts are sharing the bandwidth of the network medium and they can potentially send frames on the wire at the same time

It is best to segment networks into several smaller collision domains to reduce the chances of having frame collisions

Bandwidth is the maximum amount of information (in bits/second) that

can be transmitted on a transmission medium

to a hub can send frames to all other devices connected to the hub A hub sends frames it receives on all ports, except on the port where the frame is received Thus, even if a frame is only addressed to one of the six hosts plugged in to the hub, in reality, all five hosts, other than the sending host, will receive the frame Four hosts will have to discard the frame because it is not addressed to them Some hubs also amplify the electrical signal before sending it on all ports other than the originating

port Those hubs are also repeaters.

A repeater is a hub that not only sends the frames on all ports other the

originating port, but it also amplifies the electrical signal Amplifying the electrical signal allows the hub to send over longer distances Most hubs

on the market today also amplify the electrical signal Thereby, most hubs are also repeaters However, do not assume this during the CCNA test

devices that send frames into the switch A switch builds a MAC address table that lists the MAC address of the host device that is sending on each port Whenever a frame enters the switch, the switch looks at the destination MAC address of the frame Then, the switch looks into its MAC address table and identifies the port that corresponds to the destination MAC address of the frame It then sends the frame only on that port

instead of hardware application-specific integrated circuit (ASIC) processors to process the MAC address filtering and forwarding

Consequently, a bridge is typically slower and less expensive than a switch Switches have become very affordable lately, however, and it is very rare to find bridges on the market anymore

Trang 38

10 Topologies of Computer Networks

Each port of a switch is a collision domain Switches learn about MAC addresses connected to their ports, and they build an internal table that lists which MAC address is connected to each port The switch identifies the port where the destination MAC address is connected and forwards the frame only on that port Other hosts don’t receive it This dramatically reduces collision chances and thereby improves network performance

Switches limit the collision domain, but they do not limit the broadcast domain The switch broadcasts requests on all ports Broadcast domains can be limited by either using virtual local-area networks (VLANs) on a switch or by using routers

Topologies of Computer Networks

Networks can be arranged in various topologies, or layouts The most common topologies are as follows:

Point-to-point: Two hosts connect directly to each other, as shown in

Figure 1-1 The sending end of one host is connected to the receiving end of the other host In its simplest form, the two hosts are connected with a crossover cable This is usually the case in serial connections

Figure 1-1:

to-point topology

Star: Hosts connect to a central device, as shown in Figure 1-2 All traffic

flows through the central device The star topology is also known as a hub-and-spoke topology Ethernet networks using hubs or switches and twisted-pair cabling are star topologies

Ring: Hosts are connected sequentially in a daisy-chain fashion, as

shown in Figure 1-3 Traffic flows around the ring The last host in the ring is connected to the first host, thereby closing the ring Token Ring

is the typical ring topology example Fiber Distributed Data Interface (FDDI) is also a ring topology

Bus: As shown in Figure 1-4, hosts are connected through a single cable,

usually coaxial cable Ethernet networks using coaxial cable are bus topologies

Trang 39

Book I Chapter 1

Trang 40

12 Topologies of Computer Networks

Mesh: Multiple hosts are connected point to point to each other in a

mesh topology, as shown in Figure 1-5 These are multiple point-to-point connections that typically link every host in the network with every other host in the network You find two types of mesh topologies:

Full-mesh topologies provide several connections between hosts in

the network, thereby improving reliability The cost is high, though

Partial-mesh topologies are a good compromise because they can

offer multiple connections for certain mission-critical hosts, yet they present cost savings over full-mesh configurations

Figure 1-5:

Mesh topology

Host A

Host B

Host C

Host D

Ngày đăng: 03/11/2019, 09:16

TỪ KHÓA LIÊN QUAN