WAN data link encapsulation types include which of the following? (Choose two)

A. T1
B. Frame Relay
C. DSL
D. PPP
E. ISDN
F. IPX

Answer: B, D

Explanation:
Frame relay and PPP is used with WAN encapsulation.
Frame Relay most closely compares to the OSI data link layer (Layer 2). If you remember
that the word "frame" describes the data link layer protocol data unit (PDU), it will be
easy to remember that Frame Relay relates to OSI Layer 2. Like other data-link protocols,
Frame Relay can be used to deliver packets (Layer 3 PDUs) between routers.

Inverse ARP is being used in the Working frame relay network. What is the purpose of Inverse ARP?

A. To ma a known IP address to a MAC address
B. To map a known DLCI to a MAC address
C. To ma a known MAC address to an IP address
D. To ma a known DLCI address to a IP address
E. To ma a known IP address to a SPID address
F. To ma a known SPID address to a MAC address

Answer: D

Explanation:
Just as ARP resolves IP addresses to MAC addresses, Inverse ARP maps a known DLCI
to an IP address.
Note: Do not mix up inverse ARP and reverse ARP. There is a Reverse ARP (RARP) for
host machines that don't know their IP address. RARP enables them to request their IP
address from the gateway's ARP cache.

Which WAN protocol is used for out-of-band signaling?

A. NCP
B. HDLC
C. LAPB
D. LAPD

Answer: D

Explanation:
The D channel remains up all the time so that new signaling messages can be sent and
received. Because the signals are sent outside the channel used for data, this is calles
out-of-band signaling. LAPD protocol manages D channel.
Reference: Cisco CCNA ICND 640-811 p.330

Leading the way in IT testing and certification tools, www.testking.com - 643 - Which ISDN device converts the four-wire BRI signals from an S/T ?

Which ISDN device converts the four-wire BRI signals from an S/T interface into
the two-wire signals of a U interface?
A. TE1
B. NT-2
C. TA
D. TE2
E. NT-1

Answer: E

Explanation:
When using a router BRI card with an S/T reference point, the router must be cabled to an
external NT1, which in turn is plugged into the line from the telco (the U interface)
Reference: Cisco CCNA ICND p.331

Which statements are true regarding ISDN channels? (Select three)

A. Each B channel can transmit up to 64 kbps
B. The ISDN B channel carries voice or data
C. The ISDN D channel transmits control information.
D. The D channel transmission rate varies depending on the service used.
E. HDLC or PPP can be used to encapsulate D channel information.

Answer: A, B, C

What are two results of entering the Switch(config)# vtp mode client command on a Catalyst switch7 (Choose two.)

A. The switch will ignore VTP summary advertisements
B. The switch will forward VTP summary advertisements
C. The switch will process VTP summary advertisements
D. The switch will originate VTP summary advertisements
E. The switch will create, modify and delete VLANs for the entire VTP domain

Answer: B, C

The Forward-Versus-Filter Decision

Switches reduce network overhead by forwarding traffic from one segment to another only when necessary. To decide whether to forward a frame, the switch uses a dynamically built table called a bridge table or MAC address table. The switch examines the address table to decide whether it should forward a frame. For example, consider the simple network Fred first sends a frame to Barney and then one to Wilma. The switch decides to filter (in other words, to not forward) the frame that Fred sends to Barney. Fred sends a frame with a destination MAC address of 0200.2222.2222, which is Barney’s MAC address. The switch overhears the frame, because it is attached to Hub1.
The switch then decides what common sense tells you from looking at the figure—it should not forward the frame, because Barney, attached to Hub1 as well, already has received the frame. (Hubs simply repeat the signal out all ports, for all frames, so the switch receives everything sent by either Barney or Fred.) But how does the switch know to not forward the frame? The switch decides to filter the frame because it received the frame on port E0, and it knows that Barney’s MAC is also located out E0. Conversely, the switch decides to forward the frame that Fred sends to Wilma in the bottom part of the figure. The frame enters the switch’s E0 interface, and the switch knows that the destination address, 0200.3333.3333, is located somewhere out its E1 interface. So the switch forwards the frame.

Which of the following devices can an administrator use to segment their LAN? (Choose all that apply)

A. Hubs
B. Repeaters
C. Switches
D. Bridges
E. Routers
F. Media Converters
G. All of the above
Answer: C, D, E
Explanation:
Routers, switches, and bridges don't transmit broadcasts. They segment a large
cumbersome network, into multiple efficient networks.
Incorrect Answers:
A. Hubs is incorrect because a hub doesn't segment a network, it only allows more hosts
on one. Hubs operate at layer one, and is used primarily to physically add more stations to
the LAN.
B. This also incorrect because the job of a repeater is to repeat a signal so it can exceed
distance limitations. It also operates at layer one and provides no means for logical LAN
segmentation.
F. This is incorrect because media converters work by converting data from a different
media type to work with the media of a LAN. It also operates at layer one and provides no
means for logical LAN segmentation.

Study the Exhibit carefully. Switch1 sends a VTP advertisement and Switch2 receives it. Which statement accurately describes how Switch2 will respond?

A. Switch2 will add 2 VLANs to its VLAN database and change the configuration
revision number to 232
B. Switch2 will remove 2 VLANs from its VLAN database and change the configuration
revision number to 232
C. Switch2 will enable VTP pruning, add two VLANs, and increment the configuration
revision number to 233
D. Switch2 will ignore the VTP advertisement



Answer: A

Refer to the exhibit. Host 1 and host 2 can communicate with each other. Host 3

Question :Refer to the exhibit. Host 1 and host 2 can communicate with each other. Host 3 and
host 4 can communicate with each other. However, the hosts cannot communicate
between VLANs. Which device is needed to allow communication between the
VLANs?
Exhibit:
A. An additional switch
B. A transceiver
C. A router
D. A repeater
E. A hub

Answer :C
Explanation:
Network devices in different VLANs cannot communicate with one another without a
router to route traffic between the VLANs. In most network environments, VLANs are
associated with individual networks or subnetworks.
Reference:
http://www.cisco.com/univercd/cc/td/doc/product/lan/cat5000/rel_5_2/layer3/routing.htm#wp13354

A company is experiencing network delays.The network administrator discovers

Question :A company is experiencing network delays. The network administrator discovers
that a worker in a location far from the MDF has connected an old 10BASE-T
switch with redundant links to the existing network. How could this action be
responsible for the impaired network performance?
A. Connecting a host to the old switch has created a broadcast storm.
B. The 10BASE-T switch forced the entire network to be reduced to 10 Mbps operation.
C. The old switch does not support VLANs, which has disabled the VLAN configuration
of the entire the network.
D. The old switch does not support full-duplex operation, effectively forcing half-duplex
operation throughout the network.
E. Spanning Tree Protocol has elected the old switch as the root bridge, creating
inefficient data paths through the switched network.

Answer :E
Explanation:
Without the Spanning Tree Protocol (STP), frames would loop for an indefinite period of time in networks
with physically redundant links. To prevent looping frames, STP blocks some ports from forwarding frames
so that only one active path exists between any pair of LAN segments (collision domains). The result of
STP is good: Frames do not loop infinitely, which makes the LAN usable. However, the network uses some
redundant links in case of a failure, but not for balancing traffic.
To avoid loops, all bridging devices, including switches, use STP. STP causes each interface on a bridging
device to settle into a blocking state or a forwarding state. Blocking means that the interface cannot forward
or receive data frames. Forwarding means that the interface can send and receive data frames. By having a
correct subset of the interfaces blocked, a single currently active logical path will exist between each pair of
LANs. STP behaves identically for a transparent bridge and a switch. So, the terms bridge, switch, and
bridging device all are used interchangeably when discussing STP.
Leading the way in IT testing and certification tools, www.testking.com
- 509 -
Root bridge The root
bridge is the bridge with
the best bridge ID. With
STP, the key is for all the
switches in the network
to elect a root bridge that
becomes the focal point
in the network. All other
decisions in the
network-like which port
is to be blocked

A company is experiencing network delays.The network administrator discovers

Question :A company is experiencing network delays. The network administrator discovers
that a worker in a location far from the MDF has connected an old 10BASE-T
switch with redundant links to the existing network. How could this action be
responsible for the impaired network performance?
A. Connecting a host to the old switch has created a broadcast storm.
B. The 10BASE-T switch forced the entire network to be reduced to 10 Mbps operation.
C. The old switch does not support VLANs, which has disabled the VLAN configuration
of the entire the network.
D. The old switch does not support full-duplex operation, effectively forcing half-duplex
operation throughout the network.
E. Spanning Tree Protocol has elected the old switch as the root bridge, creating
inefficient data paths through the switched network.

Answer :E
Explanation:
Without the Spanning Tree Protocol (STP), frames would loop for an indefinite period of time in networks
with physically redundant links. To prevent looping frames, STP blocks some ports from forwarding frames
so that only one active path exists between any pair of LAN segments (collision domains). The result of
STP is good: Frames do not loop infinitely, which makes the LAN usable. However, the network uses some
redundant links in case of a failure, but not for balancing traffic.
To avoid loops, all bridging devices, including switches, use STP. STP causes each interface on a bridging
device to settle into a blocking state or a forwarding state. Blocking means that the interface cannot forward
or receive data frames. Forwarding means that the interface can send and receive data frames. By having a
correct subset of the interfaces blocked, a single currently active logical path will exist between each pair of
LANs. STP behaves identically for a transparent bridge and a switch. So, the terms bridge, switch, and
bridging device all are used interchangeably when discussing STP.
Leading the way in IT testing and certification tools, www.testking.com
- 509 -
Root bridge The root
bridge is the bridge with
the best bridge ID. With
STP, the key is for all the
switches in the network
to elect a root bridge that
becomes the focal point
in the network. All other
decisions in the
network-like which port
is to be blocked

A network administrator needs to verify that switch interface 0/5 has been assigned

Question :A network administrator needs to verify that switch interface 0/5 has been assigned
to the Sales VLA.N. Which command will accomplish this task?
A. Show vlan
B. Show mac-address-table
C. Show vtp status
D. show spanning-tree root
E. show ip interface brief

Answer :A
Explanation:
The "show vlan" command displays the configured vlan name and ID as well as the ports
that belong to each VLAN, etc. By default all ports belongs to VLAN 1
Note: You can also use: show vlan brief, show vlan ID where ID is the VLAN ID.

While troubleshooting a routing problem in your network, you utilize RIP

Question :While troubleshooting a routing problem in your network, you utilize RIP
debugging as shown below:
Based on the information provided, which of the following are true? (Select two
answer choices)
A. This router was configured with the commands:
RtrA(config)#router rip
RtrA(config-router)# network 172.16.0.0
RtrA(config-router)# network 10.0.0.0
B. This router was configured with the commands:
RtrA(config)# router rip
RtrA(config-router)# network 192.168.1.0
RtrA(config-router)# network 10.0.0.0
RtrA(config-router)# network 192.168.168.0
C. This router was configured with the commands:
RtrA(config)# router rip
RtrA(config-router)# version 2
RtrA(config-router)# network 172.16.0.0
RtrA(config-router)# network 10.0.0.0
Leading the way in IT testing and certification tools, www.testking.com
- 533 -
D. Split horizon was disabled on this router.
E. Network 192.168.168.0 will be displayed in the routing table.
F. Network 10.0.0.0 will be displayed in the routing table.

Answer :A, F
Explanation:
Based on the information provided, this RIP network is routing the 192.168.1.0,
172.16.0.0, and 10.0.0.0 networks. However, the 10.0.0.0 and 172.16.0.0 networks show
that they are being advertised to the other router with a metric of 1, meaning that it is
directly connected. Therefore, choice A is correct. Also, the 192.168.1.0 network was
received on the serial 0/0 interface with a valid metric of 1 so this route will indeed be
installed into the routing table.
Incorrect Answers:
B. The 192.168.0.0 networks are being received from other routers, so this particular one
will not have this locally configured.
C. The output shows that RIP version 1 is being used, not RIP version 2.
D. There is no information to support this.
E. This network shows a metric of 16, which is the maximum number of hops for RIP so
it is deemed inaccessible.

You are a network technician at TestKing, Inc. You are currently troubleshooting a routing issue on the Coompny router

Question :You are a network technician at IGCT, Inc. You are currently troubleshooting a routing issue on the IGCT1. You issue the show ip route command. The output from the command is displayed in the following exhibit:
testking1#show ip route Codes: C - connected, S - static, I - IGRP, R- RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inner area
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - Candidate
default
U - per-user static route
Gateway of last resort is not set
R 192.168.8.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0
C 192.168.9.0/24 is directly connected, Serial1
R 192.168.10.0/24 [120/7] via 192.168.9.1, 00:00:02, Serial1
R 192.168.11.0/24 [120/7] via 192.168.9.1, 00:00:03, Serial1
C 192.168.1.0/24 is directly connected, Ethernet0
C 192.168.2.0/24 is directly connected, Serial0
R 192.168.3.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0
R 192.168.4.0/24 [120/15] via 192.168.2.2, 00:00:10, Serial0
Leading the way in IT testing and certification tools, www.testking.com
- 541 -
R 192.168.5.0/24 [120/15] via 192.168.2.2, 00:00:10, Serial0
R 192.168.6.0/24 [120/15] via 192.168.2.2, 00:00:10, Serial0
R 192.168.7.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0
Which one of the following routes WILL NOT be entered into its neighboring
routers routing table?
A. R 192.168.11.0/24 [120/7] via 192.168.9.1, 00:00:03, Serial1
B. C 192.168.1.0/24 is directly connected, Ethernet0
C. R 192.168.8.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0
D. R 192.168.5.0/24 [120/15] via 192.168.2.2, 00:00:10, Serial0
E. None of the above

Answer :D
Explanation:
RIP has the maximum hop count of 15. This route already has a hop count of 15 and
adding one would make it unreachable (see below). This route will be discarded.
R 202.30.5.0/24 [120/15] via 202.30.2.2, 00:00:10, Serial0

The network consists of two routers connected via a point to point serial

Question :The consists of two routers connected via a point to point serial
connection as shown below:
Leading the way in IT testing and certification tools, www.testking.com
- 542 -
Users on TestKing1 are unable to connect to the other. Based on the
configurations shown above, what could be the cause of this?
A. The Maximum Transmission Unit size is too large.
B. No loopback is set.
C. The subnet mask is incorrect
D. The encapsulation does not match at each end.
E. There is an incorrect IP address.
F. There is an incompatible bandwidth statement between routers.


Answer :E
Explanation:
The IP addresses are both on different subnets but are connected on Serial link. For the
connection to work, the two interfaces must belong to the same IP subnet.
Incorrect Answers:
A. The MTU is set at 1500 on each end, which is acceptable.
B. Loopbacks are not required for this serial connection to function.
C. The masks match, but the IP addresses do not.
D. Based on the diagram above, both serial interfaces are set to HDLC encapsulation,
which is the default encapsulation for serial interfaces.
F. Although this is true, the bandwidth statements do not need to be set the same in order
for this connection to work. The bandwidth statement is used by certain routing protocols,
such as OSPF and EIGRP, but they have no impact on the actual function of the serial
line.

The routing table of the Corp router

Question :The routing table of the Corp router is displayed below:
The Corp router receives an IP packet with a source IP address of 192.168.214.20
and a destination address of 192.168.22.3. Based on the information above, what will
the router do with this packet?
A. It will encapsulate the packet as Frame Relay and forward it out interface Serial
0/0.117.
B. It will discard the packet and send an ICMP Destination Unreachable message out
interface FastEthernet 0/0.
C. It will forward the packet out interface Serial 0/1 and send an ICMP Echo Reply
message out interface serial 0/0.102.
Leading the way in IT testing and certification tools, www.testking.com
- 544 -
D. It will change the IP packet to an ARP frame and forward it out FastEthernet 0/0.
E. It will forward the packet out the default route.
F. None of the above


Answer :B
Explanation:
The destination IP address of 192.168.22.3 is not in the routing table of the Corp router.
Since there is no default route set, as shown by the "gateway of last resort is not set"
statement, the packet will be dropped by the router and an ICMP Destination Unreachable
message will be sent back to the source, which is Fast Ethernet 0/0 in this case.

Typical LAN Features for OSI Layer 2

OSI Layer 2, the data link layer, defines the standards and protocols used to control the transmission of data across a physical network. If you think of Layer 1 as “sending bits,” you can think of Layer 2 as meaning “knowing when to send the bits, noticing when errors occurred when sending bits, and identifying the computer that needs to get the bits.” Similar to the section about the physical layer, this short section describes the basic data link layer functions. Later, you will read about the specific standards and protocols for Ethernet. Data link protocols perform many functions, with a variety of implementation details. Because each data link protocol “controls” a particular type of physical layer network, the details of how a data link protocol works must include some consideration of the physical network. However, regardless of the type of physical network, most data link protocols perform the following functions: Arbitration—Determines when it is appropriate to use the physical medium Addressing—Ensures that the correct recipient(s) receives and processes the data that is sent Error detection—Determines whether the data made the trip across the physical medium successfully Identification of the encapsulated data—Determines the type of header that follows the data link header:-

Data Link Function 1: Arbitration Imagine trying to get through an intersection in your car when all the traffic signals are out— you all want to use the intersection, but you had better use it one at a time. You finally get through the intersection based on a lot of variables—on how tentative you are, how big the other cars are, how new or old your car is, and how much you value your own life! Regardless, you cannot allow cars from every direction to enter the intersection at the same time without having some potentially serious collisions. With some types of physical networks, data frames can collide if devices can send any time they want. When frames collide in a LAN, the data in each frame is corrupted and the LAN is unusable for a brief moment—not too different from a car crash in the middle of an intersection. The specifications for these data-link protocols define how to arbitrate the use of the physical medium to avoid collisions, or at least to recover from the collisions when they occur. Ethernet uses the carrier sense multiple access with collision detection (CSMA/CD) algorithm for arbitration. The CSMA/CD algorithm is covered in the upcoming section on Ethernet.

Data Link Function 2: Addressing When I sit and have lunch with my friend Gary, and just Gary, he knows I am talking to him. I don’t need to start every sentence by saying “Hey, Gary….” Now imagine that a few other people join us for lunch—I might need to say something like “Hey, Gary…” before saying something so that Gary knows I’m talking to him. Data-link protocols define addresses for the same reasons. Many physical networks allow more than two devices attached to the same physical network. So, data-link protocols define addresses to make sure that the correct device listens and receives the data that is sent. By putting the correct address in the data-link header, the sender of the frame can be relatively sure that the correct receiver will get the data. It’s just like sitting at the lunch table and having to say “Hey Gary…” before talking to Gary so that he knows you are talking to him and not someone else. Each data-link protocol defines its own unique addressing structure. For instance, Ethernet uses Media Access Control (MAC) addresses, which are 6 bytes long and are represented as a 12-digit hexadecimal number. Frame Relay typically uses a 10-bit-long address called a data-link connection identifier (DLCI)—notice that the name even includes the phrase data link. This post covers the details of Ethernet addressing. You will learn about Frame Relay addressing in the CCNA ICND Exam Certification Guide.

Data Link Function 3: Error Detection Error detection discovers whether bit errors occurred during the transmission of the frame. To do this, most data-link protocols include a frame check sequence (FCS) or cyclical redundancy check (CRC) field in the data-link trailer. This field contains a value that is the result of a mathematical formula applied to the data in the frame. An error is detected when the receiver plugs the contents of the received frame into a mathematical formula. Both the sender and the receiver of the frame use the same calculation, with the sender putting the results of the formula in the FCS field before sending the frame. If the FCS sent by the sender matches what the receiver calculates, the frame did not have any errors during transmission. Error detection does not imply recovery; most data links, including IEEE 802.5 Token Ring and 802.3 Ethernet, do not provide error recovery. The FCS allows the receiving device to notice that errors occurred and then discard the data frame. Error recovery, which includes the resending of the data, is the responsibility of another protocol.

Data Link Function 4: Identifying the Encapsulated Data Finally, the fourth part of a data link identifies the contents of the Data field in the frame.
When PC1 receives data, should it give the data to the TCP/IP software or the NetWare client software? Of course, that depends on what is inside the Data field. If the data came from the Novell server, PC1 hands off the data to the NetWare client code. If the data comes from the web server, PC1 hands it off to the TCP/IP code. But how does PC1 make this decision? Well, IEEE Ethernet 802.2 Logical Link Control (LLC) uses a field in its header to identify the type of data in the Data field. PC1 examines that field in the received frame to decide whether the packet is an IP packet or an IPX packet.

What is OSI Reference Model?

To pass the INTRO exam, you must be conversant in a protocol specification with which you are very unlikely to ever have any hands-on experience—the OSI reference model. The difficulty these days when discussing the OSI protocol specifications is that you have no point of reference—you simply cannot typically walk down the hall and use a computer whose main, or even optional, networking protocols conform to OSI. OSI is the Open System Interconnection reference model for communications. Some participants in OSI’s creation and development wanted OSI to become the networking protocol used by all applications on all computers in the world. The U.S. government went so far as to require OSI support on every computer that it purchased, as of a certain date in the early 1990s, which certainly gave vendors some incentive to write OSI code. In fact, in my old IBM days, they even had charts showing how the TCP/IP-installed base would start declining by 1994, how OSI installations would increase, and how OSI would be the protocol from which the 21st-century Internet was built. What is OSI today? Well, OSI never succeeded in the marketplace. Some of the original protocols that comprised OSI are still used. The U.S. government reversed its decision to require OSI support on computers that it bought, which was probably the final blow to the possibility of pervasive OSI implementations. So, why do you even need to think about OSI for the CCNA exam? Well, the OSI model now is mainly used as a point of reference for discussing other protocol specifications. And because being a CCNA requires you to understand some of the concepts and terms behind networking architecture and models, and because other protocols are almost always compared to OSI, you need to know some things about OSI.

OSI Layers The OSI reference model consists of seven layers. Each layer defines a set of typical networking functions. When OSI was in active development in the 1980s and 1990s, the OSI committees created new protocols and specifications to implement the functions specified by each layer. In other cases, the OSI committees did not create new protocols or standards, but instead referenced other protocols that were already defined. For instance, the IEEE defines Ethernet standards, so the OSI committees did not waste time specifying a new type of Ethernet; it simply referred to the IEEE Ethernet standards.

Because OSI does have a very well-defined set of functions associated with each of its seven layers, you can examine any networking protocol or specification and make some determination of whether it most closely matches OSI Layer 1, 2, or 3, and so on. For instance, TCP/IP’s internetworking layer, as implemented by IP, equates most directly to the OSI network layer. So, most people say that IP is a network layer, or Layer 3, protocol, using OSI terminology and numbers for the layer. Of course, if you numbered the TCP/IP model, starting at the bottom, IP would be in Layer 2—but, by convention, everyone uses the OSI standard when describing other protocols. So, using this convention, IP is a network layer protocol.

Cisco requires that CCNAs demonstrate an understanding of the functions defined by OSI for each layer, as well as some example protocols that correspond to each OSI layer. The names of the OSI reference model layers, a few of the typical protocols at each layer, and the functions of each layer are simply good things to memorize for the INTRO exam. And frankly, if you want to pursue your Cisco certifications beyond CCNA, these names and functional areas will come up continually.

what is Data Encapsulation?

The term encapsulation describes the process of putting headers and trailers around some data. A computer that needs to send data encapsulates the data in headers of the correct format so that the receiving computer will know how to interpret the received data. You can think about the complete process of data encapsulation with TCP/IP as a five-step process. In fact, previous CCNA exams referred to a specific five-step process for encapsulation. This included the typical encapsulation by the application, transport, network, and network interface (referred to as data link) layers as Steps 1 through 4 in the five-step process. The fifth step was the physical layer’s transmission of the bit stream. In case any questions remain in the CCNA question database referring to a five-step encapsulation process, the following list provides the details and explanation. Regardless, the ideas behind the process apply to any networking model and how it encapsulates data:

Step 1 Create the application data and headers—This simply means that the
application has data to send.

Step 2 Package the data for transport—In other words, the transport layer
(TCP or UDP) creates the transport header and places the data behind it.
Step 3 Add the destination and source network layer addresses to the data—
The network layer creates the network header, which includes the
network layer addresses, and places the data behind it.

Step 4 Add the destination and source data link layer addresses to the data—
The data link layer creates the data link header, places the data behind
it, and places the data link trailer at the end.

Step 5 Transmit the bits—The physical layer encodes a signal onto the medium
to transmit the frame.

The TCP/IP Internetwork Layer

Imagine that you just wrote a letter to your favorite person on the other side of the country and that you also wrote a letter to someone on the other side of town. It’s time to send the letters. Is there much difference in how you treat each letter? Not really. You put different addresses on the envelope for each letter because the letters need to go to two different places.
You put stamps on both letters and put them in the same mailbox. The postal service takes care of all the details of figuring out how to get each letter to the right place—whether it is across town or across the country.
Inside the postal service, both letters are processed. One letter gets sent to another post office, then another, and so on, until the letter gets delivered across the country. The local letter might go to the post office in your town and then simply be delivered to your friend across town, without going to another post office.
So what does this all matter to networking? Well, the internetwork layer of the TCP/IP networking model, the Internet Protocol (IP), works much like the postal service. IP defines addresses so that each host computer can have a different IP address, just like the postal service defines addressing that allows unique addresses for each house, apartment, and business. Similarly, IP defines the process of routing so that devices called routers (ingenious name, huh?) can choose where to send packets of data so that they are delivered to the correct destination. Just like the postal service created the necessary post offices, sorting machines, trucks, and personnel to deliver the mail, the internetwork layer defines much of the details needed to implement the necessary networking infrastructure.
First, some basic information about the figure will help. The LAN cabling details are not important for this example, so both LANs simply are represented by the lines shown near Bob and Larry, respectively. When Bob sends the data, he is sending an IP packet, which includes the IP header, the transport layer header (TCP, in this example), the application header (HTTP, in this case), and any application data (none, in this case). The IP header includes both a source and a destination IP address field, with Larry’s IP address as the destination address and Bob’s as the source.

The TCP/IP Application Layer

Arguably, the most popular TCP/IP application today is the web browser. Many major software vendors either have already changed or are changing their software to support access from a web browser. And thankfully, using a web browser is easy—you start a web browser on your computer and select a web site by typing in the name of the web site, and the web page appears.
What really happens to allow that web page to appear on your web browser? These next few sections take a high-level look at what happens behind the scene.
Imagine that Bob opens his browser. His browser has been configured to automatically ask for web server Larry’s default web page, or home page.
So what really happened? Bob’s initial request actually asks Larry to send his home page back to Bob. Larry’s web server software has been configured to know that Larry’s default web page is contained in a file called home.htm. Bob receives the file from Larry and displays the contents of the file in the web browser window.
Taking a closer look, this example uses two TCP/IP application layer protocols. First, the request for the file and the actual transfer of the file are performed according to the Hypertext Transfer Protocol (HTTP). Many of you have probably noticed that most web sites’ URLs (Universal Resource Locators, the text that identifies a web server and a particular web page) begin with the letters “http,” to imply that HTTP will be used to transfer the web pages.
The other protocol used is the Hypertext Markup Language (HTML). HTML defines how Bob’s web browser should interpret the text inside the file he just received. For instance, the file might contain directions about making certain text be a certain size, color, and so on. In most cases, it also includes directions about other files that Bob’s web browser should get— things such as graphics images and animation. HTTP would then be used to get those additional files from Larry, the web server.

Cisco Certified Network Associate (CCNA)

The CCNA certification was the first in the new line of Cisco certifications, and was the precursor to all current Cisco certifications. Now, you can become a Cisco Certified Network Associate for the meager cost of this book, plus $125 for the test. And you don’t have to stop there—you can choose to continue with your studies and achieve a higher certification, called the Cisco Certified Network Professional (CCNP). Someone with a CCNP has all the skills and knowledge he or she needs to attempt the CCIE lab. However, because no textbook can take the place of practical experience, we’ll discuss what else you need to be ready for the CCIE lab shortly.

Why Become a CCNA?

Cisco, not unlike Microsoft or Novell, has created the certification process to give administrators a set of skills and to equip prospective employers with a way to measure skills or match certain criteria. Becoming a CCNA can be the initial step of a successful journey toward a new, highly rewarding, and sustainable career. The CCNA program was created to provide a solid introduction not only to the Cisco Internetwork Operating System (IOS) and Cisco hardware, but also to internetworking in general, making it helpful to you in areas that are not exclusively Cisco’s. At this point in the certification process, it’s not unrealistic to imagine that future network managers—even those without Cisco equipment—could easily require Cisco certifications for their job applicants. If you make it through the CCNA and are still interested in Cisco and internetworking, you’re headed down a path to certain success.

What Skills Do You Need to Become a CCNA?
To meet the CCNA certification skill level, you must be able to understand or do the following:
  • Install, configure, and operate simple-routed LAN, routed WAN, and switched Virtual LAN (VLAN) networks.
  • Understand and be able to configure IP, IGRP, EIGRP, OSPF, serial interfaces, Frame Relay, IP RIP, VLANs, Ethernet, and access lists.
  • Install and/or configure a network.
  • Optimize WAN through Internet-access solutions that reduce bandwidth and WAN costs, using features such as filtering with access lists, bandwidth on demand (BOD), and dial-on-demand routing (DDR).
How Do You Become a CCNA?
The way to become a CCNA is to pass one little test (CCNA exam 640-801). Then—poof!— you’re a CCNA. (Don’t you wish it were that easy?) True, it’s just one test, but you still have to possess enough knowledge to understand what the test writers are saying

A Brief History of CISCO.

In the early 1980s, Len and Sandy Bosack, a married couple who worked in different computer departments at Stanford University, were having trouble getting their individual systems to communicate (like many married people). So in their living room they created a gateway server that made it easier for their disparate computers in two different departments to communicate using the IP protocol. In 1984, they founded cisco Systems (notice the small c ) with a small commercial gateway server product that changed networking forever. Some people think the name was intended to be San Francisco Systems but the paper got ripped on the way to the incorporation lawyers—who knows? In 1992, the company name was changed to Cisco Systems, Inc. The first product the company marketed was called the Advanced Gateway Server (AGS).
Then came the Mid-Range Gateway Server (MGS), the Compact Gateway Server (CGS), the Integrated Gateway Server (IGS), and the AGS+. Cisco calls these “the old alphabet soup products.” In 1993, Cisco came out with the amazing 4000 router and then created the even more amazing 7000, 2000, and 3000 series routers. These are still around and evolving (almost daily, it seems). Cisco has since become an unrivaled worldwide leader in networking for the Internet. Its networking solutions can easily connect users who work from diverse devices on disparate networks.
Cisco products make it simple for people to access and transfer information without regard to differences in time, place, or platform. In the big picture, Cisco provides end-to-end networking solutions that customers can use to build an efficient, unified information infrastructure of their own or to connect to someone else’s. This is an important piece in the Internet/networking–industry puzzle because a common architecture that delivers consistent network services to all users is now a functional imperative. Because Cisco Systems offers such a broad range of networking and Internet services and capabilities, users who need to regularly access their local network or the Internet can do so unhindered, making Cisco’s wares indispensable.
Cisco answers this need with a wide range of hardware products that form information networks using the Cisco Internetwork Operating System (IOS) software. This software provides network services, paving the way for networked technical support and professional services to maintain and optimize all network operations. Along with the Cisco IOS, one of the services Cisco created to help support the vast amount of hardware it has engineered is the Cisco Certified Internetwork Expert (CCIE) program, which was designed specifically to equip people to effectively manage the vast quantity of installed Cisco networks. The business plan is simple: If you want to sell more Cisco equipment and have more Cisco networks installed, ensure that the networks you install run properly. Clearly, having a fabulous product line isn’t all it takes to guarantee the huge success that Cisco enjoys—lots of companies with great products are now defunct.
If you have complicated products designed to solve complicated problems, you need knowledgeable people who are fully capable of installing, managing, and troubleshooting them. That part isn’t easy, so Cisco began the CCIE program to equip people to support these complicated networks. This program, known colloquially as the Doctorate of Networking, has also been very successful, primarily due to its extreme difficulty. Cisco continuously monitors the program, changing it as it sees fit, to make sure that it remains pertinent and accurately reflects the demands of today’s internetworking business environments.
A groan grasps the peanut near the offending anthology.