CCNA 1 Chapter Outline per online curriculum

Transcription

CCNA 1 Chapter Outline per online curriculum
CCNA 1 Chapter Outline per online curriculum
Chapter 1: Introduction to Networking
Connecting to the Internet
Requirements for Internet connection
PC basics
Network interface card
NIC and modem installation
Overview of high-speed and dial-up connectivity
TCP/IP description and configuration
Testing connectivity with ping
Web browser and plug-ins
Troubleshooting Internet connection problems
Network Math
Binary presentation of data
Bits and bytes
Base 10 number system
Base 2 number system
Converting decimal numbers to 8-bit binary numbers
Converting 8-bit binary numbers to decimal numbers
Four-octet dotted decimal representation of 32-bit binary numbers
Hexadecimal
Boolean or binary logic
IP addresses and network masks
Chapter 2: Networking Fundamentals
Networking Terminology
Data networks
Network history
Networking devices
Network topology
Network protocols
Local-area networks (LANs)
Wide-area networks (WANs)
Metropolitan-area networks (MANs)
Storage-area networks (SANs)
Virtual private network (VPN)
Benefits of VPNs
Intranets and extranets
Bandwidth
Importance of bandwidth
Analogies
Measurement
Limitations
Throughput
Data transfer calculation
Digital versus analog
Networking Models
Using layers to analyze problems in a flow of materials
Using layers to describe data communication
OSI model
OSI layers
Peer-to-peer communications
TCP/IP model
Detailed encapsulation process
Chapter 3: Networking Media
Copper Media
Atoms and electrons
Voltage
Resistance and impedance
Current
Circuits
Cable specifications
Coaxial cable
STP cable
UTP cable
Optical Media
The electromagnetic spectrum
Ray model of light
Reflection
Refraction
Total internal reflection
Multimode fiber
Single-mode fiber
Other optical components
Signals and noise in optical fibers
Installation, care, and testing of optical fiber
Wireless Media
Wireless LAN organizations and standards
Wireless devices and topologies
How wireless LANs communicate
Authentication and association
The radiowave and microwave spectrums
Signals and noise on a WLAN
Wireless security
Chapter 4: Cable Testing
Background for Studying Frequency-Based Cable Testing
Waves
Sine waves and square waves
Exponents and logarithms
Decibels
Viewing signals in time and frequency
Analog and digital signals in time and frequency
Noise in time and frequency
Bandwidth
Signals and Noise
Signaling over copper and fiber optic cabling
Attenuation and insertion loss on copper media
Sources of noise on copper media
Types of crosstalk
Cable testing standards
Other test parameters
Time-based parameters
Testing optical fiber
A new standard
Chapter 5: Cabling LANs and WANs
Cabling the LAN
LAN physical layer
Ethernet in the campus
Ethernet media and connector requirements
Connection media
UTP implementation
Repeaters
Hubs
Wireless
Bridges
Switches
Host connectivity
Peer-to-peer
Client/server
Cabling the WAN
WAN physical layer
WAN serial connections
Routers and serial connections
Routers and ISDN BRI connections
Routers and DSL connections
Routers and cable connections
Setting up console connections
Chapter 6: Ethernet Fundamentals
Ethernet Fundamentals
Introduction to Ethernet
IEEE Ethernet naming rules
Ethernet and the OSI model
Naming
Layer 2 framing
Ethernet frame structure
Ethernet frame fields
Ethernet Operation
Media Access Control (MAC)
MAC rules and collision detection/backoff
Ethernet timing
Interframe spacing and backoff
Error handling
Types of collisions
Ethernet errors
FCS and beyond
Ethernet auto-negotiation
Link establishment and full and half duplex
Chapter 7: Ethernet Technologies
10-Mbps and 100-Mbps Ethernet
10-Mbps Ethernet
10BASE5
10BASE2
10BASE-T
10BASE-T wiring and architecture
100-Mbps Ethernet
100BASE-TX
100BASE-FX
Fast Ethernet architecture
Gigabit and 10-Gigabit Ethernet
1000-Mbps Ethernet
1000BASE-T
1000BASE-SX and LX
Gigabit Ethernet architecture
10-Gigabit Ethernet
10-Gigabit Ethernet architectures
Future of Ethernet
Chapter 8: Ethernet Switching
Ethernet Switching
Layer 2 bridging
Layer 2 switching
Switch operation
Latency
Switch modes
Spanning-Tree Protocol
Collision Domains and Broadcast Domains
Shared media environments
Collision domains
Segmentation
Layer 2 broadcasts
Broadcast domains
Introduction to data flow
What is a network segment?
Chapter 9: TCP/IP Protocol Suite and IP Addressing
Introduction to TCP/IP
History and future of TCP/IP
Application layer
Transport layer
Internet layer
Network access layer
Comparing the OSI model and the TCP/IP model
Internet architecture
Internet Addresses
IP addressing
Decimal and binary conversion
IPv4 addressing
Class A, B, C, D, and E IP addresses
Reserved IP addresses
Public and private IP addresses
Introduction to subnetting
IPv4 versus IPv6
Obtaining an IP Address
Obtaining an Internet address
Static assignment of an IP address
RARP IP address assignment
BOOTP IP address assignment
DHCP IP address management
Problems in address resolution
Address Resolution Protocol (ARP)
Chapter 10: Routing Fundamentals and Subnets
Routed Protocol
Routable and routed protocols
IP as a routed protocol
Packet propagation and switching within a router
Internet Protocol (IP)
Anatomy of an IP packet
IP Routing Protocols
Routing overview
Routing versus switching
Routed versus routing
Path determination
Routing tables
Routing algorithms and metrics
IGP and EGP
Link state and distance vector
Routing protocols
The Mechanics of Subnetting
Classes of network IP addresses
Introduction to and reason for subnetting
Establishing the subnet mask address
Applying the subnet mask
Subnetting Class A and B networks
Calculating the resident subnetwork through ANDing
Chapter 11: TCP/IP Transport and Application Layer
TCP/IP Transport Layer
Introduction to transport layer
Flow control
Session establishment, maintenance, and termination overview
Three-way handshake
Windowing
Acknowledgment
Transmission Control Prot ocol (TCP)
User Datagram Protocol (UDP)
TCP and UDP port numbers
The Application Layer
Introduction to the TCP/IP application layer
DNS
FTP
HTTP
SMTP
SNMP
Telnet
CCNA 2 Chapter Outline per online curriculum
Chapter 1: WANs and Routers
WANs
Introduction to WANs
Introduction to routers in a WAN
Router LANs and WANs
Router role in a WAN
Academy approach to hands-on labs
Routers
Router internal components
Router physical characteristics
Router external connections
Management port connections
Connecting console interfaces
Connection LAN interfaces
Connecting WAN interfaces
Chapter 2: Introduction to Routers
Operating Cisco IOS Software
The purpose of Cisco IOS software
Router user interface
Router user interface modes
Cisco IOS software features
Operation of Cisco IOS software
Starting a Router
Initial startup of Cisco routers
Router LED indicators
Examining the initial router bootup
Establishing a HyperTerminal session
Logging into the router
Keyboard help in the router CLI
Enhanced editing commands
Router command history
Troubleshooting command line errors
The show version command
Chapter 3: Configuring a Router
Configuring a Router
CLI command modes
Configuring a router name
Configuring router passwords
Examining the show commands
Configuring a serial interface
Executing adds, moves, and changes
Configuring an Ethernet interface
Finishing the Configuration
Importance of configuration standards
Interface descriptions
Configuring interface description
Login banners
Configuring message-of-the-day (MOTD)
Host name resolution
Configuring host tables
Configuration backup and documentation
Copying, editing, and pasting configurations
Chapter 4: Learning about Other Devices
Discovering and Connecting to Neighbors
Introduction to CDP
Information obtained with CDP
Implementation, monitoring, and maintenance of CDP
Creating a network map of the environment
Disabling CDP
Troubleshooting CDP
Getting Information about Remote Devices
Telnet
Establishing and verifying a Telnet connection
Disconnecting and suspending Telnet sessions
Advanced Telnet operation
Alternative connectivity tests
Troubleshooting IP addressing issues
Chapter 5: Managing Cisco IOS Software
Router Boot Sequence and Verification
Stages of the router power-on boot sequence
How a Cisco device locates and loads IOS
Using the boot system command
Configuration register
Troubleshooting IOS boot failure
Managing the Cisco File System
IOS file system overview
IOS naming conventions
Managing configuration files using TFTP
Managing configuration files using copy and paste
Managing IOS images using TFTP
Managing IOS images using Xmodem
Environment variables
File system verification
Chapter 6: Routing and Routing Protocols
Introduction to Static Routing
Introducing routing
Static route operation
Configuring static routes
Configuring default route forwarding
Verifying static route configuration
Troubleshooting static route configuration
Dynamic Routing Overview
Introduction to routing protocols
Autonomous systems
Purpose of a routing protocol and autonomous systems
Identifying the classes of routing protocols
Distance vector routing protocol features
Link-state routing protocol features
Routing Protocols Overview
Path determination
Routing configuration
Routing protocols
Autonomous systems and IGP versus EGP
Distance vector
Link-state
Chapter 7: Distance Vector Routing Protocols
Distance Vector Routing
Distance vector routing updates
Distance vector routing loop issues
Defining a maximum count
Eliminating routing loops through split horizon
Route poisoning
Avoiding routing loops with triggered updates
Preventing routing loops with holddown timers
RIP
RIP routing process
Configuring RIP
Using the ip classless Command
Common RIP configuration issues
Verifying RIP configuration
Troubleshooting RIP update issues
Preventing routing updates through an interface
Load balancing with RIP
Load balancing across multiple paths
Integrating static routes with RIP
IGRP
IGRP features
IGRP metrics
IGRP routes
IGRP stability features
Configuring IGRP
Migrating RIP to IGRP
Verifying IGRP configuration
Troubleshooting IGRP
Chapter 8: TCP/IP Suite Error and Control Messages
Overview of TCP/IP Error Messages
Internet Control Message Protocol (ICMP)
Error reporting and error correction
ICMP message delivery
Unreachable networks
Using ping to test destination reachability
Detecting excessively long routes
Echo messages
Destination unreachable message
Miscellaneous error reporting
Overview of TCP/IP Control Messages
Introduction to control messages
ICMP redirect/change requests
Clock synchronization and transit time estimation
Information requests and reply message formats
Address mask requirements
Router discovery message
Router solicitation message
Congestion and flow control messages
Chapter 9: Basic Router Troubleshooting
Examining the Routing Table
The show ip route command
Determining the gateway of last resort
Determining the route source and destination
Determining L2 and L3 addresses
Determining the route administrative distance
Determining the route metric
Determining the route next hop
Determining the last routing update
Observing multiple paths to destination
Network Testing
Introduction to network testing
Using a structured approach to troubleshooting
Testing by OSI Layers
Layer 1 troubleshooting using indicators
Layer 3 troubleshooting using ping
Layer 7 troubleshooting using Telnet
Troubleshooting Router Issues Overview
Troubleshooting Layer 1 using show interface
Troubleshooting Layer 2 using show interface
Troubleshooting using show cdp
Troubleshooting using traceroute
Troubleshooting routing issues using show ip route and show ip protocol
Troubleshooting using show controllers serial
Introduction to debug
Chapter 10: Intermediate TCP/IP
TCP Operation
TCP operation
Synchronization or 3-way handshake
Denial of service attacks
Windowing and window size
Sequencing numbers
Positive ACK
UDP operation
Overview of Transport Layer Ports
Multiple conversations between hosts
Ports for services
Ports for clients
Port numbering and well-known port numbers
Example of multiple sessions between hosts
Comparison of MAC addresses, IP addresses, and port numbers
Chapter 11: Access Control Lists (ACLs)
Access Control List Fundamentals
What are ACLs?
How ACLs work
Creating ACLs
The function of a wildcard mask
Verifying ACLs
Access Control Lists
Standard ACLs
Extended ACLs
Named ACLs
Placing ACLs
Firewalls
Restricting virtual terminal access