CCNA 1 Chapter Outline per online curriculum
Transcription
CCNA 1 Chapter Outline per online curriculum
CCNA 1 Chapter Outline per online curriculum Chapter 1: Introduction to Networking Connecting to the Internet Requirements for Internet connection PC basics Network interface card NIC and modem installation Overview of high-speed and dial-up connectivity TCP/IP description and configuration Testing connectivity with ping Web browser and plug-ins Troubleshooting Internet connection problems Network Math Binary presentation of data Bits and bytes Base 10 number system Base 2 number system Converting decimal numbers to 8-bit binary numbers Converting 8-bit binary numbers to decimal numbers Four-octet dotted decimal representation of 32-bit binary numbers Hexadecimal Boolean or binary logic IP addresses and network masks Chapter 2: Networking Fundamentals Networking Terminology Data networks Network history Networking devices Network topology Network protocols Local-area networks (LANs) Wide-area networks (WANs) Metropolitan-area networks (MANs) Storage-area networks (SANs) Virtual private network (VPN) Benefits of VPNs Intranets and extranets Bandwidth Importance of bandwidth Analogies Measurement Limitations Throughput Data transfer calculation Digital versus analog Networking Models Using layers to analyze problems in a flow of materials Using layers to describe data communication OSI model OSI layers Peer-to-peer communications TCP/IP model Detailed encapsulation process Chapter 3: Networking Media Copper Media Atoms and electrons Voltage Resistance and impedance Current Circuits Cable specifications Coaxial cable STP cable UTP cable Optical Media The electromagnetic spectrum Ray model of light Reflection Refraction Total internal reflection Multimode fiber Single-mode fiber Other optical components Signals and noise in optical fibers Installation, care, and testing of optical fiber Wireless Media Wireless LAN organizations and standards Wireless devices and topologies How wireless LANs communicate Authentication and association The radiowave and microwave spectrums Signals and noise on a WLAN Wireless security Chapter 4: Cable Testing Background for Studying Frequency-Based Cable Testing Waves Sine waves and square waves Exponents and logarithms Decibels Viewing signals in time and frequency Analog and digital signals in time and frequency Noise in time and frequency Bandwidth Signals and Noise Signaling over copper and fiber optic cabling Attenuation and insertion loss on copper media Sources of noise on copper media Types of crosstalk Cable testing standards Other test parameters Time-based parameters Testing optical fiber A new standard Chapter 5: Cabling LANs and WANs Cabling the LAN LAN physical layer Ethernet in the campus Ethernet media and connector requirements Connection media UTP implementation Repeaters Hubs Wireless Bridges Switches Host connectivity Peer-to-peer Client/server Cabling the WAN WAN physical layer WAN serial connections Routers and serial connections Routers and ISDN BRI connections Routers and DSL connections Routers and cable connections Setting up console connections Chapter 6: Ethernet Fundamentals Ethernet Fundamentals Introduction to Ethernet IEEE Ethernet naming rules Ethernet and the OSI model Naming Layer 2 framing Ethernet frame structure Ethernet frame fields Ethernet Operation Media Access Control (MAC) MAC rules and collision detection/backoff Ethernet timing Interframe spacing and backoff Error handling Types of collisions Ethernet errors FCS and beyond Ethernet auto-negotiation Link establishment and full and half duplex Chapter 7: Ethernet Technologies 10-Mbps and 100-Mbps Ethernet 10-Mbps Ethernet 10BASE5 10BASE2 10BASE-T 10BASE-T wiring and architecture 100-Mbps Ethernet 100BASE-TX 100BASE-FX Fast Ethernet architecture Gigabit and 10-Gigabit Ethernet 1000-Mbps Ethernet 1000BASE-T 1000BASE-SX and LX Gigabit Ethernet architecture 10-Gigabit Ethernet 10-Gigabit Ethernet architectures Future of Ethernet Chapter 8: Ethernet Switching Ethernet Switching Layer 2 bridging Layer 2 switching Switch operation Latency Switch modes Spanning-Tree Protocol Collision Domains and Broadcast Domains Shared media environments Collision domains Segmentation Layer 2 broadcasts Broadcast domains Introduction to data flow What is a network segment? Chapter 9: TCP/IP Protocol Suite and IP Addressing Introduction to TCP/IP History and future of TCP/IP Application layer Transport layer Internet layer Network access layer Comparing the OSI model and the TCP/IP model Internet architecture Internet Addresses IP addressing Decimal and binary conversion IPv4 addressing Class A, B, C, D, and E IP addresses Reserved IP addresses Public and private IP addresses Introduction to subnetting IPv4 versus IPv6 Obtaining an IP Address Obtaining an Internet address Static assignment of an IP address RARP IP address assignment BOOTP IP address assignment DHCP IP address management Problems in address resolution Address Resolution Protocol (ARP) Chapter 10: Routing Fundamentals and Subnets Routed Protocol Routable and routed protocols IP as a routed protocol Packet propagation and switching within a router Internet Protocol (IP) Anatomy of an IP packet IP Routing Protocols Routing overview Routing versus switching Routed versus routing Path determination Routing tables Routing algorithms and metrics IGP and EGP Link state and distance vector Routing protocols The Mechanics of Subnetting Classes of network IP addresses Introduction to and reason for subnetting Establishing the subnet mask address Applying the subnet mask Subnetting Class A and B networks Calculating the resident subnetwork through ANDing Chapter 11: TCP/IP Transport and Application Layer TCP/IP Transport Layer Introduction to transport layer Flow control Session establishment, maintenance, and termination overview Three-way handshake Windowing Acknowledgment Transmission Control Prot ocol (TCP) User Datagram Protocol (UDP) TCP and UDP port numbers The Application Layer Introduction to the TCP/IP application layer DNS FTP HTTP SMTP SNMP Telnet CCNA 2 Chapter Outline per online curriculum Chapter 1: WANs and Routers WANs Introduction to WANs Introduction to routers in a WAN Router LANs and WANs Router role in a WAN Academy approach to hands-on labs Routers Router internal components Router physical characteristics Router external connections Management port connections Connecting console interfaces Connection LAN interfaces Connecting WAN interfaces Chapter 2: Introduction to Routers Operating Cisco IOS Software The purpose of Cisco IOS software Router user interface Router user interface modes Cisco IOS software features Operation of Cisco IOS software Starting a Router Initial startup of Cisco routers Router LED indicators Examining the initial router bootup Establishing a HyperTerminal session Logging into the router Keyboard help in the router CLI Enhanced editing commands Router command history Troubleshooting command line errors The show version command Chapter 3: Configuring a Router Configuring a Router CLI command modes Configuring a router name Configuring router passwords Examining the show commands Configuring a serial interface Executing adds, moves, and changes Configuring an Ethernet interface Finishing the Configuration Importance of configuration standards Interface descriptions Configuring interface description Login banners Configuring message-of-the-day (MOTD) Host name resolution Configuring host tables Configuration backup and documentation Copying, editing, and pasting configurations Chapter 4: Learning about Other Devices Discovering and Connecting to Neighbors Introduction to CDP Information obtained with CDP Implementation, monitoring, and maintenance of CDP Creating a network map of the environment Disabling CDP Troubleshooting CDP Getting Information about Remote Devices Telnet Establishing and verifying a Telnet connection Disconnecting and suspending Telnet sessions Advanced Telnet operation Alternative connectivity tests Troubleshooting IP addressing issues Chapter 5: Managing Cisco IOS Software Router Boot Sequence and Verification Stages of the router power-on boot sequence How a Cisco device locates and loads IOS Using the boot system command Configuration register Troubleshooting IOS boot failure Managing the Cisco File System IOS file system overview IOS naming conventions Managing configuration files using TFTP Managing configuration files using copy and paste Managing IOS images using TFTP Managing IOS images using Xmodem Environment variables File system verification Chapter 6: Routing and Routing Protocols Introduction to Static Routing Introducing routing Static route operation Configuring static routes Configuring default route forwarding Verifying static route configuration Troubleshooting static route configuration Dynamic Routing Overview Introduction to routing protocols Autonomous systems Purpose of a routing protocol and autonomous systems Identifying the classes of routing protocols Distance vector routing protocol features Link-state routing protocol features Routing Protocols Overview Path determination Routing configuration Routing protocols Autonomous systems and IGP versus EGP Distance vector Link-state Chapter 7: Distance Vector Routing Protocols Distance Vector Routing Distance vector routing updates Distance vector routing loop issues Defining a maximum count Eliminating routing loops through split horizon Route poisoning Avoiding routing loops with triggered updates Preventing routing loops with holddown timers RIP RIP routing process Configuring RIP Using the ip classless Command Common RIP configuration issues Verifying RIP configuration Troubleshooting RIP update issues Preventing routing updates through an interface Load balancing with RIP Load balancing across multiple paths Integrating static routes with RIP IGRP IGRP features IGRP metrics IGRP routes IGRP stability features Configuring IGRP Migrating RIP to IGRP Verifying IGRP configuration Troubleshooting IGRP Chapter 8: TCP/IP Suite Error and Control Messages Overview of TCP/IP Error Messages Internet Control Message Protocol (ICMP) Error reporting and error correction ICMP message delivery Unreachable networks Using ping to test destination reachability Detecting excessively long routes Echo messages Destination unreachable message Miscellaneous error reporting Overview of TCP/IP Control Messages Introduction to control messages ICMP redirect/change requests Clock synchronization and transit time estimation Information requests and reply message formats Address mask requirements Router discovery message Router solicitation message Congestion and flow control messages Chapter 9: Basic Router Troubleshooting Examining the Routing Table The show ip route command Determining the gateway of last resort Determining the route source and destination Determining L2 and L3 addresses Determining the route administrative distance Determining the route metric Determining the route next hop Determining the last routing update Observing multiple paths to destination Network Testing Introduction to network testing Using a structured approach to troubleshooting Testing by OSI Layers Layer 1 troubleshooting using indicators Layer 3 troubleshooting using ping Layer 7 troubleshooting using Telnet Troubleshooting Router Issues Overview Troubleshooting Layer 1 using show interface Troubleshooting Layer 2 using show interface Troubleshooting using show cdp Troubleshooting using traceroute Troubleshooting routing issues using show ip route and show ip protocol Troubleshooting using show controllers serial Introduction to debug Chapter 10: Intermediate TCP/IP TCP Operation TCP operation Synchronization or 3-way handshake Denial of service attacks Windowing and window size Sequencing numbers Positive ACK UDP operation Overview of Transport Layer Ports Multiple conversations between hosts Ports for services Ports for clients Port numbering and well-known port numbers Example of multiple sessions between hosts Comparison of MAC addresses, IP addresses, and port numbers Chapter 11: Access Control Lists (ACLs) Access Control List Fundamentals What are ACLs? How ACLs work Creating ACLs The function of a wildcard mask Verifying ACLs Access Control Lists Standard ACLs Extended ACLs Named ACLs Placing ACLs Firewalls Restricting virtual terminal access