Explanations and Answers For The Cisco Objectives
Explanations and Answers For The Cisco Objectives
1. Identify and describe the functions of each of the seven layers of the OSI model.
2. Describe connection oriented network service and connectionless network service, and identify the key
differences between them
3. Describe the data link addresses and network addresses, and identify the key differences between them.
4. Define and describe the function of the mac address.
5. Define flow control and describe the three basic methods used in networking.
6. Differeniate between the following WAN services: X.25/LAPB, Frame Relay, ISDN/LAPD, SDLC,
HDLC, PPP, DDR
7. Log into the router in both user and privileged modes
8. Use the context sensitve help facility.
9. Use the command history and editing features
10. Examine router elements (RAM, ROM, CDP, show).
11. Manage configuration files from the privledged exec mode.
12. Control router passwords, identification, and banner
13. Identify the main Cisco ios commands for router startup
14. Check an initial configuration using the setup command
15. Copy and manipulate configuration files
16. List the commands to load Cisco ios software from flash, tftp, or ROM
17. Prepare to backup, upgrade, and load a backup Cisco IOS image
18. List the key internetworking functions of the OSI network layer and how they are performed in the
router.
19. Describe the two parts of network addressing, then identify the parts in specific protocol address
examples.
20. List problems that each routing type encounters when dealing with topology changes and describe
techniques to reduce the number of these problems.
21. Explain the services of separate and integrated multiprotocol routing
22. Describe the different classes of IP addresses [and subnetting].
23. Configure ip addresses
24. Verify ip addresses
25. Prepare the initial configuration of your router and enable IP
26. Add the rip routing protocol to your router
27. Add the igrp routing protocol to your router
28. List the required IPX address and encapsulation type
29. Enable the Novell ipx protocol and configure interfaces
30. Monitor Novell ipx operation on the router
31. Recognize key frame relay and x.25 terms and features
32. List the commands to configure frame relay LMI’s, maps, and subinterfaces
33. List the commands to monitor Frame Relay operation in the router
36. Monitor and verify selected access list operations on the router
38. Identify ISDN protocols, function groups, reference points, and channels
39. Describe Cisco’s implementation of ISDN BRI
46. Identify at least 3 reasons why the industry uses a layered model
47. Identify the functions of each layer of the ISO/OSI reference model
1. Identify and describe the functions of each of the seven layers of the OSI model.
Application, Presentation, Session, Transport, Network, DataLink, Physical
Application layer identifies and establishes the availability of the intended communication partner.
Synchronizes sending and receiving applications; establishes agreements on error-recovery and controls
data integrity; determines if sufficient resources for the intended communication exist.
The Presentation layer negotiates data transfer syntax for the application layer, it is responsible for
encryption. Standards like PIC, JPG, TIFF, and NFS, are considered presentation layer standards.
Session: Layer 5, coordinates communication between systems, maintaining sessions for as long as needed
and performing security, logging, and administrative functions.
Transport provides mechanisms for multiplexing upper layer applications, and establishment, maintenance
and cleanup of virtual circuits, information flow control, transport fault detection and recovery. When data
is sent the transport layer includes extra bits that include the message type, originating application, and
protocols used.
The transport layer hides details of any network-dependent information from the higher layers by providing
transparent data transfer. The transport layer is concerned with machine to machine transfer rather than
process to process. The transport layer will split data into smaller packets dispatch those packets and at the
receiver reassemble the data in the correct sequence.
Network: Layer 3, defines protocols for routing data by opening and maintaining a path on the network
between systems to ensure that data arrives at the correct destination node. The network layer is where the
IP of TCP/IP resides.
DataLink: Layer 2, defines the rules for sending and receiving information from one node to another
between systems. The datalink layer is divided into two portions, the MAC and the LLC. The LLC is a
marshalling layer between the upper network layer and the physical topology. The MAC provides each
computer with a unique 6 byte hexadecimal address (also called the BIA – Burned in address) which is
assigned to each card often these numbers are represented in the form 00:00:00:00:00:00.
Physical: This is the actual wire, 10base2, 10baseT, etc. The maximum distance of 10baseT or 100baseT
running on Category 5 wire is 100 meters or 300 feet.
2. Describe connection oriented network service and connectionless network service, and identify the
key differences between them
Connection oriented requires a unique session or pipe to be established (eg: TCP). Connectionless can be
sent any time to any destination without any setup or acknowledgement (eg: UDP). To make it really
simple to understand: with a connectionless protocol its up to the applications to figure out of if the data
gets to the destination, instead of the protocols, the advantage is that the protocol is much more efficient
(since it doesn’t have to acknowledge receiving the data).
3. Describe the data link addresses and network addresses, and identify the key differences between
them.
Datalink addresses (eg: MAC) are physical whereas the network addresses logical (eg: IP address).
Network addresses are determined by the network administrator, datalink are typically determined by the
manufacturer.
5. Define flow control and describe the three basic methods used in networking. (there are actually
four)
Buffering -
Source Quench -
Sliding Window - Method of flow control in which a receiver gives transmitter permission to transmit data
until a window is full. When the window is full, the transmitter must stop transmitting until the receiver
advertises a larger window. TCP, other transport protocols, and several data link layer protocols use this
method of flow control.
Pacing - Technique for ensuring that a transmitting entity, such as a modem, does not overwhelm a
receiving entity with data. When the buffers on the receiving device are full, a message is sent to the
sending device to suspend the transmission until the data in the buffers has been processed.
6. Differentiate between the following WAN services: X.25/LAPB, Frame Relay, ISDN/LAPD, SDLC,
HDLC, PPP, DDR
The X.25 protocol, adopted as a standard by the Consultative Committee for International Telegraph and
Telephone (CCITT), is a commonly-used network protocol. The X.25 protocol allows computers on
different public networks (such as CompuServe, Tymnet, or a TCP/IP network) to communicate through an
intermediary computer at the network layer level. X.25's protocols correspond closely to the data-link and
physical-layer protocols defined in the Open Systems Interconnection (OSI) communication model.
LAPB is a bit-oriented synchronous protocol that provides complete data transparency in a full-duplex
point-to-point operation. It supports a peer-to-peer link in that neither end of the link plays the role of the
permanent master station. HDLC NRM (also known as SDLC), on the other hand, has a permanent primary
station with one or more secondary stations.
HDLC LAPB is a very efficient protocol. A minimum of overhead is required to ensure flow control, error
detection and recovery. If data is flowing in both directions (full duplex), the data frames themselves carry
all the information required to ensure data integrity.
The concept of a frame window is used to send multiple frames before receiving confirmation that the first
frame has been correctly been received. This means that data can continue to flow in situations where there
may be long "turn-around" time lags without stopping to wait for an acknowledgement. This kind of
situation occurs, for instance in satellite communication.
Frame relay is a technology for transmitting data packets in high-speed bursts across a digital network
encapsulated in a transmission unit called a frame. Frame relay requires a dedicated connection during the
transmission period. It's not ideally suited for voice or video transmission, which requires a steady flow of
transmissions. However, under certain circumstances, it is used for voice and video transmission. Frame
relay is used on wide area networks and also in private network environments with leased lines over T-1
lines.
Frame relay is a fast-packet technology, which means that error-checking does not occur at any
transmission stage. The end points are responsible for error checking. (However, the incidence of error in
digital networks is extraordinarily small relative to analog networks.)
Fast packet switching uses asynchronous transfer mode (ATM) with either frame relay or cell relay. Frame
relay relays packets at the data-link layer of the Open Systems Interconnection (OSI) model rather than at
the network layer. A frame can incorporate packets from different protocols such as Ethernet and X.25. It is
variable in size and can be as large as a thousand bytes or more.
The frame relay standard, an extension of the ISDN standards, is CCITT I.122. A frame relay connection is
known as a virtual connection. A permanent virtual connection is totally dedicated to one origin and
destination pair and can transmit up to 1.544 Mbps, depending on the capabilities of the pair. A switched
virtual connection is also possible using the public network and can provide higher bandwidths.
Integrated Services Digital Network (ISDN) is a set of CCITT/ITU standards for digital transmission over
ordinary telephone copper wire as well as over other media. Home and business users who install ISDN
adapters (in place of their modems) can see highly-graphic Web pages arriving very quickly (up to 128
Kbps). ISDN requires adapters at both ends of the transmission so your access provider also needs an ISDN
adapter. ISDN is generally available from your phone company in most urban areas in the United States
and Europe.
There are two levels of service: the Basic Rate Interface (BRI), intended for the home and small enterprise,
and the Primary Rate Interface (PRI), for larger users. Both rates include a number of B (bearer) channels
and a D (delta) channel. The B channels carry data, voice, and other services. The D channel carries control
and signaling information.
The Basic Rate Interface consists of two 64 Kbps B channels and one 16 Kbps D channel. Thus, a Basic
Rate user can have up to 128 Kbps service. The Primary Rate consists of 23 B channels and one 64 Kpbs D
channel in the United States or 30 B channels and 1 D channel in Europe.
Integrated Services Digital Network in concept is the integration of both analog or voice data together with
digital data over the same network. Although the ISDN you can install is integrating these on a medium
designed for analog transmission, broadband ISDN (BISDN) will extend the integration of both services
throughout the rest of the end-to-end path using fiber optic and radio media. Broadband ISDN will
encompass frame relay service for high-speed data that can be sent in large bursts, the Fiber Distributed-
Data Interface (FDDI), and the Synchronous Opical Network (SONET). BISDN will support transmission
from 2 Mbps up to much higher, but as yet unspecified, rates.
ISDN Standards: E deals with telephone network standards (between ISDN devices), I deals with concepts
and terminology, Q deals with switching. (you need to know this stuff)
ISDN reference points:
TE1: Terminal Equipment type 1. This is the ISDN telephone, computer, ISDN FAX machine. Or whatever
it is that you've hooked up to the ISDN phone line.
<the wire between a TE1 and a NT2 is called reference point S>
TE2: Terminal Equipment type 2. This is the old analog telephone, old-style fax machine, modem. Or
whatever you used to hook up to the analog phone line. It can also be other communications equipment that
is handled by a TA (see below).
<the wire between a TE2 and a TA is reference point R>
TA: Terminal Adaptor. This lets old, TE2 stuff talk to the ISDN network. It also adapts other kinds of
equipment, like ethernet interfaces , to ISDN. It is typically called a POTS (Plain old Telephone system)
port.
<the wire between a TE2 an a NT2 is reference point S>
NT2: Network Termination type 2. In most homes, this won't exist. If you were a big company with your
own private telephone system, then this would be the guts of that telephone system.
<the wire between a NT2 and an NT1 is reference point T>
NT1: Network Termination type 1. This is the end of the line for the local phone company, and the
beginning of your house's phone network.
<the wire between a NT1 and the LT is reference point U>
LT: Line Termination. This is the physical connection to the phone company.
<the wire between a LT and the ET is reference point V>
ET: Exchange Termination. This is the local phone company's logical connection from your telephones to
"the phone network".
LAPD is the Link Access Protocol for the ISDN D channel, as defined by CCITT Recommendation Q.921.
It is a layer 2, or data link layer, protocol which is used for communication between ISDN Terminal
Equipment (TE, i.e. the router) and Network Equipment (NT, i.e. the ISDN exchange). LAPD is
responsible for providing addressing, flow control, and error detection for higher layer users of the ISDN D
channel. LAPD is similar to LAPB (layer 2 of X.25), with the addition multiple logical connections,
allowing a single D channel to support multiple layer 3 entities. LAPD is not used on ISDN B channels.
In normal operation the LAPD module will not require any configuring since the default configuration will
allow it to function fully. The default for BRI interfaces is to operate with automatic TEI assignment. PRI
interfaces have TEI values assigned by CCITT Recommendation Q.921.
SDLC is the synchronous, bit-oriented link control protocol in the IBM Systems Network Architecture
(SNA). SDLC's connection-oriented protocol operates with the Data Link Switching (DLSw) protocol and
the Advanced Peer-to-Peer Networking (APPN) architecture.
SDLC supports point-to-point and multipoint topologies. In point-to-point topologies, only one SDLC
device connects to the SDLC port. In multipoint topologies, several SDLC devices connect to the SDLC
port via a modem-sharing type device.
HDLC (High-level Data Link Control) is a group of protocols or rules for transmitting data between
network points (sometimes called nodes). In HDLC, data is organized into a unit (called a frame) and sent
across a network to a destination that verifies its successful arrival. The HDLC protocol also manages the
flow or pacing at which data is sent. HDLC is one of the most commonly-used protocols in what is Layer 2
of the industry communication reference model called Open Systems Interconnection (OSI). (Layer 1 is the
detailed physical level that involves actually generating and receiving the electronic signals. Layer 3 is the
higher level that has knowledge about the network, including access to router tables that indicate where to
forward or send data. On sending, programming in layer 3 creates a frame that usually contains source and
destination network addresses. HDLC (layer 2) encapsulates the layer 3 frame, adding data link control
information to a new, larger frame.
Now an ISO standard, HDLC is based on IBM's Synchronous Data Link Control (SDLC) protocol, which
is widely used by IBM's large customer base in mainframe computer environments. In HDLC, the protocol
that is essentially SDLC is known as Normal Response Mode (NRM). In Normal Response Mode, a
primary station (usually at the mainframe computer) sends data to secondary stations that may be local or
may be at remote locations on dedicated leased lines in what is called a multidrop or multipoint network.
(This is not the network we usually think of; it's a nonpublic closed network. In this arrangement, although
communication is usually half-duplex.)
Variations of HDLC are also used for the public networks that use the X.25 communications protocol and
for frame relay. In the X.25 version of HDLC, the data frame contains a packet. (An X.25 network is one in
which packets of data are moved to their destination along routes determined by network conditions as
perceived by routers and reassembled in the right order at the ultimate destination.) The X.25 version of
HDLC uses peer-to-peer communication with both ends able to initiate communication on duplex links.
This mode of HDLC is known as Link Access Procedure Balanced (LAPB).
The following table sumarizes the HDLC variations and who uses them.
HDLC SUBSET USES
NRM (Normal Response Mode) Multipoint networks that typically use SDLC
LAP (Link Access Procedure) Early X.25 implementations
LAPB (Link Access Procedure, Balanced) Current X.25 implementations
LAPD (Link Access Procedure for the ISDN
ISDN D channel and frame relay
D channel)
Error-correcting modems (specified as part of
LAPM (Link Access Procedure for Modems)
V.42)
PPP (Point-to-Point Protocol) is a protocol for communication between two computers using a serial
interface, typically a personal computer connected by phone line to a server. For example, your Internet
server provider may provide you with a PPP connection so that the provider's server can respond to your
requests, pass them on to the Internet, and forward your requested Internet responses back to you. PPP uses
the Internet protocol (IP) (and is designed to handle others). It is sometimes considered a member of the
TCP/IP suite of protocols. Relative to the Open Systems Interconnection (OSI) reference model, PPP
provides layer 2 (data-link layer) service.
PPP is a full-duplex protocol that can be used on various physical media, including twisted pair or fiber
optic lines or satellite transmission. It uses a variation of High Speed Data Link Control (HDLC) for packet
encapsulation.
PPP is usually preferred over the earlier de facto standard Serial Line Internet Protocol (SLIP) because it
can handle synchronous as well as asynchronous communication. PPP can share a line with other users and
it has error detection that SLIP lacks. Where a choice is possible, PPP should be preferred.
13) Identify the main Cisco ios commands for router startup. This objective is taken from
Problem 2 of the exercise on page 7-12 of the ICRC Student Guide. The answer is found on
page 7-15 as follows:
show startup-config - to examine the backup configuration file
show running-config - to examine the active configuration file.
reload - to restart the router
16. List the commands to load Cisco ios software from flash, tftp, or ROM
The commands to LOAD Cisco ios software from flash,tftp or Rom
boot system flash [filename]
boot system tftp [filename] [ip address]
boot system rom
17. Prepare to backup, upgrade, and load a backup Cisco IOS image
See question 15 or 16,. If you have any concerns about this be sure to perform the hands on exercises.
18) List the key internetworking functions of the OSI network layer and how they are
performed in the router. This objective is taken from Problem 1 of the exercise on page 4-
20 of the ICRC Student Guide. The answer is found on page 4-54 as follows:
Establishes network addresses.
Selects the best path through an internetwork.
Uses routing protocol between routers.
Uses a routed protocol to carry user packets.
Uses two-part address
Sets up and maintains routing tables.
Discovers networks.
Adapts to internetwork topology changes.
Contains broadcasts.
19. Describe the two parts of network addressing, then identify the parts in specific protocol address
examples.
They are either looking for Network & Host portions of an address , or Address & Netmask, I’m not sure.
IPX uses a 32bit network number + a 48bit host number (which is the same as the MAC address)
IPX network numbers may be expressed by 8 hexadecimal numbers eg: 0000004A is valid, you can omit
leading zeros so 4a is valid. The node number is represented by a dotted triplet of four-digit hexadecimal
numbers.
Appletalk uses a 16bit network numbers + a 8 bit node address, node addresses are automatically acquired
when the station boots.
20. List problems that each routing type encounters when dealing with topology changes and
describe techniques to reduce the number of these problems.
I believe they are trying to compare the differences between Link State & Distance Vector.
Split Horizons, Count to Infinity, Poison Reverse, hold down timers, if you don’t know what any of these
are then you should probably hit the books.
21) Explain the services of separate and integrated multiprotocol routing. This objective is
taken from Problem 3 of the exercise on page 4-51 of the ICRC Student Guide. The answer
is found on page 4-55 as follows:
In a separate multiprotocol routing environment, the several configured protocols operate like
ships in the night. (each protocol is not aware of other protocols running on the same router)
With an integrated multiprotocol routing environment, the several configured protocols share
the results of the integrated routing algorithm.
In order to provide the flexibility required to support different size networks, the designers of IP decided
that the IP address space should be divided into three different address classes - Class A, Class B, and Class
C. This is often referred to as "classful" addressing because the address space is split into three predefined
classes, groupings, or categories. Each class fixes the boundary between the network-prefix and the host-
number at a different point within the 32-bit address. The formats of the fundamental address classes are
illustrated below
One of the fundamental features of classful IP addressing is that each address contains a self-encoding key
that identifies the dividing point between the network-prefix and the host-number. For example, if the first
two bits of an IP address are 1-0, the dividing point falls between the 15th and 16th bits. This simplified the
routing system during the early years of the Internet because the original routing protocols did not supply a
"deciphering key" or "mask" with each route to identify the length of the network-prefix.
Class A Networks (/8 Prefixes: Each Class A network address has an 8-bit network-prefix with the highest
order bit set to 0 and a seven-bit network number, followed by a 24-bit host-number. Today, it is no longer
considered 'modern' to refer to a Class A network. Class A networks are now referred to as "/8s"
(pronounced "slash eight" or just "eights") since they have an 8-bit network-prefix.
A maximum of 126 (2^7 -2) /8 networks can be defined. The calculation requires that the 2 is subtracted
because the /8 network 0.0.0.0 is reserved for use as the default route and the /8 network 127.0.0.0 (also
written 127/8 or 127.0.0.0/8) has been reserved for the "loopback" function. Each /8 supports a maximum
of 16,777,214 (2^24 -2) hosts per network. The host calculation requires that 2 is subtracted because the
all-0s ("this network") and all-1s ("broadcast") host-numbers may not be assigned to individual hosts.
Since the /8 address block contains 2^31 (2,147,483,648 ) individual addresses and the IPv4 address space
contains a maximum of 2^32 (4,294,967,296) addresses, the /8 address space is 50% of the total IPv4
unicast address space.
Class B Networks (/16 Prefixes): Each Class B network address has a 16-bit network-prefix with the two
highest order bits set to 1-0 and a 14-bit network number, followed by a 16-bit host-number. Class B
networks are now referred to as"/16s" since they have a 16-bit network-prefix.
A maximum of 16,384 (2^14 ) /16 networks can be defined with up to 65,534 (2^16 -2) hosts per network.
Since the entire /16 address block contains 2^30 (1,073,741,824) addresses, it represents 25% of the total
IPv4 unicast address space.
Class C Networks (/24 Prefixes): Each Class C network address has a 24-bit network-prefix with the three
highest order bits set to 1-1-0 and a 21-bit network number, followed by an 8-bit host-number. Class C
networks are now referred to as "/24s" since they have a 24-bit network-prefix.
A maximum of 2,097,152 (2^21 ) /24 networks can be defined with up to 254 (2^8 -2) hosts per network.
Since the entire /24 address block contains 2^29 (536,870,912) addresses, it represents 12.5% (or 1/8th) of
the total IPv4 unicast address space.
Other Classes: In addition to the three most popular classes, there are two additional classes. Class D
addresses have their leading four-bits set to 1-1-1-0 and are used to support IP Multicasting. Class E
addresses have their leading four-bits set to 1-1-1-1 and are reserved for experimental use.
Dotted-Decimal Notation: To make Internet addresses easier for human users to read and write, IP
addresses are often expressed as four decimal numbers, each separated by a dot. This format is called
"dotted-decimal notation."
Dotted-decimal notation divides the 32-bit Internet address into four 8-bit (byte) fields and specifies the
value of each field independently as a decimal number with the fields separated by dots. Figure 5 shows
how a typical /16 (Class B) Internet address can be expressed in dotted decimal notation.
Subnetting, documented in 950, originally referred to the subdivision of a class-based network into
subnetworks, but now refers more generally to the subdivision of a CIDR block into smaller CIDR blocks.
Subnetting allows single routing entries to refer either to the larger block or to its individual constituents.
This permits a single, general routing entry to be used through most of the Internet, more specific routes
only being required for routers in the subnetted block.
A subnet mask is a 32-bit number that determines how an IP address is split into network and host portions,
on a bitwise basis. For example, 255.255.0.0 is a standard class B subnet mask, since the first two bytes are
all ones (network), and the last two bytes are all zeros (host). In a subnetted network, the network portion is
extended. For example, a subnet mask of 255.255.255.0 would subnet a class B address space using its
third byte. Using this scheme, the first two bytes of an IP address would identify the class B network, the
next byte would identify the subnet within that network, and the final byte would select an individual host.
Since subnet masks are used on a bit-by-bit basis, masks like 255.255.240.0 (4 bits of subnet; 12 bits of
host) are perfectly normal.
The first step is to determine the number of bits required to define the six subnets. Since a network address
can only be subnetted along binary boundaries, subnets must be created in blocks of powers of two [ 2 (2^1
), 4 (2^2 ), 8 (2^3 ), 16 (2^4 ), etc. ]. Thus, it is impossible to define an IP address block such that it
contains exactly six subnets. For this example, the network administrator must define a block of 8 (2^3 )
and have two unused subnets that can be reserved for future growth.
Since 8 = 2^3 , three bits are required to enumerate the eight subnets in the block. In this example, the
organization is subnetting a /24 so it will need three more bits, or a /27, as the extended-network-prefix. A
27-bit extended-network-prefix can be expressed in dotted-decimal notation as 255.255.255.224. This is
illustrated in Figure 11.
A 27-bit extended-network-prefix leaves 5 bits to define host addresses on each subnet. This means that
each subnetwork with a 27-bit prefix represents a contiguous block of 2^5 (32) individual IP addresses.
However, since the all-0s and all-1s host addresses cannot be allocated, there are 30 (2^5 -2) assignable
host addresses on each subnet.
An easy way to check if the subnets are correct is to ensure that they are all multiples of the address. In the
case of 255.255.255.224 case, all subnets are multiples of 32: 0, 32, 64, 96, …
When subnetting was first defined in RFC 950, it prohibited the use of the all-0s and the all-1s subnet. The
reason for this restriction was to eliminate situations that could potentially confuse a classful router. Note
that today a router can be both classless and classful at the same time - it could be running RIP-1 (a classful
protocol) and BGP-4 (a classless protocol) at the same time.
With respect to the all-0s subnet, a router requires that each routing table update include the route/<prefix-
length> pair to differentiate between a route to the all-0s subnet and a route to the entire network. For
example, when using RIP-1 which does not supply a mask or prefix-length with each route, the routing
advertisements for subnet 193.1.1.0/27 and for network 193.1.1.0/24 are identical - 193.1.1.0. Without
somehow knowing the prefix-length or mask, a router cannot tell the difference between a route to the all-
0s subnet and the route to the entire network!
Regarding the all-1s subnet, a router requires that each routing table entry include the prefix-length so that
it can determine if a broadcast (directed or all-subnets) should be sent only to the all-1s subnet or to the
entire network. For example, when the routing table does not contain a mask or prefix-length for each
route, confusion can occur because the same broadcast address (193.1.1.255) is used for both for the entire
network 193.1.1.0/24 and the all-1s subnet 193.1.1.224/27
24) Verify ip addresses. This objective can be derived from page 11-31 of the ICRC Student Guide
entitled “Verifying Address Configuration”.
telnet - verifies the application-layer software between source and destination stations. This
is the most complete test mechanism available.
ping - Uses the ICMP protocol to verify the hardware connection at the logical address of the
network layer.
trace - Uses Time-To-Live (TTL) values to generate messages from each router used along
the path. This is very powerful in its ability to locate failures in the path from the source to the
destination.
Syntax Description:
Network; Network number. This is an eight-digit hexadecimal number that uniquely identifies a network
cable segment. It can be a number in the range 1 to FFFFFFFD. You do not need to specify leading zeros in
the network number. For example, for the network number 000000AA you can enter just AA.
Unnumbered; Specifies an unnumbered interface. For IPXWAN interfaces, the network number need not be
preassigned; instead, the nodes may negotiate the network number dynamically.
encapsulation
encapsulation-type; (Optional) Type of encapsulation (framing). It can be one of the following values:
· arpa (for Ethernet interfaces only)--Use Novell's Ethernet_II encapsulation. This encapsulation is
recommended for networks that handle both TCP/IP and IPX traffic.
Secondary; (Optional) Indicates an additional (secondary) network configured after the first (primary)
network.
Standard Encapsulation types: For Ethernet: Novell-ether, For Token Ring: sap
Task Command
Diagnose basic IPX network connectivity (user-level command). ping ipx {host | address}
Diagnose basic IPX network connectivity (privileged command). ping [ipx] [host | address]
Display the status of the IPX interfaces configured in the router and the parameters show ipx interface [interface
configured on each interface. unit]
List the entries in the IPX routing table. show ipx route [network]
show ipx servers [sorted [name
List the servers discovered through SAP advertisements.
| net | type]]
Display information about the number and type of IPX packets transmitted and
show ipx traffic
received.
31. Recognize key frame relay and x.25 terms and features
This is probably overkill on the X.25 terms, however its better to overkill rather than underkill. The x.25
standard address the physical, datalink, and network portions of the OSI model. At the physical layer it
provides synchronous bit-serial full-duplex point to point circuit for data transmission between the DTE
and DCE. At the datalink layer x.25 deals with detection and correction of errors. At the network layer it
defines three basic types of packet service: Switched Virtual circuit, permanent virtual circuit, a
connectionless datagram service. PVCs eliminate the need for call setup as the DTE is always in data-
transfer mode. X.25 uses LAP at the data-link layer which defines the movement of data between the DTE
and DCE. When the datalink receives the data it encapsulates it into frames by adding headers and trailers.
Fianlly the datalink layer passes the frames to the physical layer where they are transmitted. X.25 has some
limitations in order to operate packets must be assembled and disassembled in a consistent manner. For a
terminal to communicate across an X.25 network a device called a PAD is used to assemble and
disassemble packets. A PAD sits between the terminal and the network. X.25 packet switching is
inappropriate for broadband digital voice and video transmissions, and bursty data traffic.
Within x.25 the x.121 protocol covers the international numbering plan for PDNs (Public Data Networks),
the network portion of the address is 3 or 4 digits these are known as the DNIC (Data network
identification code), the DNIC includes a DCC (Data Country Number). The node portion of the address is
called the NTN (Network Terminal Number). the X.25 administrator obtains the NTN's from an authority
within the x.25 data network service provider.
Frame Relay is a service designed to exploit the high quality and high bandwidth of fiber optic links. Frame
relay can be implemented without fast packets. It is typically a narrow band of service between 56kb and
2.078mbps. Frame relay uses a CRC, bad packets are simply discarded and the receiving station requests
retransmission of any missing frames. Since Frame relay uses simple frames it handles bursty traffic much
better than services like x.25, although fast x.25 (2.078mbps) does exist in France. Under frame relay when
the network is congested it sends signals to the stations to "back off".
Frame relay common LMI features include support for multicast, global addressing (which allows frame
relay to resemble a lan), simple flow control, and virtual circuit status messaging.
Map statements are not mandatory for subinterface configuration??
Frame relay inverse arp does not replace the need for “frame-relay map” commands
32. List the commands to configure frame relay LMI’s, maps, and subinterfaces
Cisco Frame Relay software supports the industry-accepted standards for addressing the Local
Management Interface (LMI), including the Cisco specification. You can enable the following LMI
features:
Set the LMI type, either ANSI, Q933a, or Cisco.
Set the LMI keepalive interval.
Set LMI polling intervals, timer intervals, and error thresholds,; parameters exist for both DTE and
DCE device types.
A keepalive interval must be set to enable LMI. By default, this interval is ten
seconds and, per the LMI protocol, must be less than the corresponding interval on
the switch. To do so, perform the following task in interface configuration mode:
Task Command
Set the keepalive interval frame-relay keepalive number
Turn off keepalives on networks without an LMI. no frame-relay keepalive
This command has the same effect as the keepalive interface configuration command.
The keepalive interval cannot be enabled when the LMI is disabled; they go together. For an example of
how to specify an LMI keepalive interval, see the section Example of Two Communication Servers in
Static Mode later in this chapter.
Establish Mapping
The Frame Relay map tells the network server how to get from a specific protocol and address pair to the
correct local data link connection identifier (DLCI). To establish mapping according to your network needs,
perform one of the following tasks in interface configuration mode:
Task Command
Define the mapping between a supported protocol address and the frame-relay map protocol protocol-address
DLCI used to connect to the address. DLCI [broadcast] [ietf] [Cisco]
The supported protocols with the corresponding keywords to enable them are as follows:
IP-- ip
Novell IPX--ipx
Subinterfaces:
To assign network numbers to interfaces that support multiple networks, you normally use subinterfaces. A
subinterface is a mechanism that allows a single physical interface to support multiple logical interfaces or
networks. That is, several logical interfaces or networks can be associated with a single hardware interface.
Each subinterface must use a distinct encapsulation, and the encapsulation must match the encapsulation
tyhpe used by the clients and servers using the same network number. To run NLSP on multiple networks
on the same physical LAN interface, you must configure subinterfaces.
Any interface configuration parameters that you specify on an individual subinterface are applied to that
subinterface only.
To configure multiple IPX networks on a physical interface using subinterfaces, perform the following
tasks starting in global configuration mode:
interface type interface-number.subinterface-
Step 1 Specify a subinterface.
number
Step 2 Enable IPX routing, specifying the first encapsulation ipx network network encapsulation
type. encapsulation-type
To configure more than one subinterface, repeat these two steps.
33. List the commands to monitor Frame Relay operation in the router
34) Identify PPP operations to encapsulate WAN data on Cisco routers. This objective is
taken from Problem 3 of the exercise on page 16-26 of the ICRC Student Guide. The answer
is found on page 16-28 as follows:
Uses Password Authentication Protocol (PAP).
Offers compression to increase effective throughput.
Offers Magic Number option to improve reliability.
Offers multilink option to load balance transmissions across a communications bundle.
Offers authentication to verify approval to make or receive a call.
36. Monitor and verify selected access list operations on the router
To display all the access lists on the router do one of the following commands:
Show access-list (shows all access lists on the router)
Show access-list 101 (show access list 101)
38. Identify ISDN protocols, function groups, reference points, and channels
D Channel protocol deals with physical, datalink, network
B Channel is a data channel (56k or 64k)
E Series deals with telephone network standards
E.163 describes the international numbering plan
E.164 describes international ISDN addressing
I series deals with concepts, terminology and interfaces
I.100 general concepts
I.200 service aspects
Q series deals with switching
Q.931 specifies functions that occur at the OSI network layer
The reference points were mentioned earlier in the document. Be sure you know both of these, they appear
on every test.
39) Describe Cisco’s implementation of ISDN BRI. This objective can be derived from page
17-11 of the ICRC Student Guide entitled “Cisco ISDN Features”.
Multiprotocol support.
Available on several router series.
SNMP support with ISDN MIB Group.
Multiple bearer channels.
Bandwidth on demand.
Optional incoming call screening.
PPP with compression options.
Services only when needed by using DDR.
All you need to know for the CCNA test is Store and forward, and cut through, you can also see question
61 for more details.
46. Identify at least 3 reasons why the industry uses a layered model
I can think of lots of reasons, but the most important is probably that it makes lower layers not dependent
on upper layers. It also gives media independence, and allows networks to work without concern for what
type of media or topology they are running on.
47. Identify the functions of each layer of the ISO/OSI reference model
See Question #1
48) Define and explain the 5 conversion steps of data encapsulation. This objective is taken
from Problem 3 of the exercise on page 1-17 of the ICRC Student Guide. The answer is
found on page 1-24 as follows:
A) User information is converted to data.
B) Data is converted to segments.
C) Segments are converted to packets or datagrams.
D) Packets or datagrams are converted to frames.
E) Frames are converted to bits.
Also be aware that Access Lists for various protocols must fall within certain ranges of Numbers
IP 1 to 99, Extended IP 100 to 199
Ethernet type code 200 to 299, Ethernet Address 700 to 799
AppleTalk 600 to 699
IPX 800 to 899, Extended IPX 900 to 999, IPX Sap 1000 to 1099
You can also apply the filters on the incoming and outgoing portions of an interface, this is particularly
handy if you want to filter routing updates.
53. Configure IPX access lists and SAP filters to control basic Novell traffic
access-list n [deny|permit] network[.node] [service-type[server-name]]
Access lists can control which routers send or receive SAP updates and which routers do not send or
receive SAP updates. SAP access lists can be defined to filter SAP updates based on the source network
address of a SAP entry, the type of SAP entry (file server, print server, and so forth), and the name of the
SAP server. A SAP access list is made up of entries in the following format:
where n is between 1000-1099. A network number of -1 indicates any network, and a service type of 0
indicates any service. For example, the following access list accepts print server SAP entries from server
PRINTER_1, all file servers, and any other SAP entries from network 123 except those from a server called
UNTRUSTED; all other SAP entries are to be ignored:
When checking the entries in a SAP update, each statement in the access list is processed in order, and if
there is no match for a SAP entry, it is not accepted. Thus, to block server UNTRUSTED, the deny
statement must be placed before the permit for all other devices on network 123.
Two techniques can be used with filtering. Either the SAP entries that are required can be permitted, and
the rest denied, or the unwanted SAP entries can be denied and the rest permitted. In general, the first
method is preferred because it avoids new and unexpected services being propagated throughout the
network.
The most common form of SAP filtering is to limit which services are available across a WAN. For
example, it does not in general make sense for clients in one location to be able to access print servers in
another location because printing is a local operation. In this case study, only file servers are permitted to
be visible across the WAN.
S A P F ilte r in g
E x a m p le
N o v e ll S e r v e r N e t w o r k C l ie n t
L o c a l P r in t e r D e s k to p S y s te m D e s k to p S y s te m
s h a r e d v ia N e t w a r e Q u e u e
N e t w o r k P r in t e r
R o u te r A N e t w o r k C lie n t R o u te r C L o c a l P r in t e r
ser ial
a c c e s s - lis t 1 0 0 0 d e n y - 1 4 7
a c c e s s - lis t 1 0 0 0 p e r m it - 1
ia l N o v e ll S e r v e r ser n o a c c e s s lis ts
R o u te r B
P re v e n ts th e
N e tw o r k P r in te r a c c e s s - lis t 1 0 0 0 d e n y - 1 4 7
a c c e s s - lis t 1 0 0 0 p e r m it - 1
b ro a d c a s ts fro m
g o in g o v e r s e r ia l lin e
Central Site
Router A connects to the central site. The following access lists configured on Router A permit everything
except print servers from being announced out the serial interface:
To permit only IPX file servers and to deny all other IPX servers, use the following configuration:
Remote Sites
This section provides information on the configuration of the routers at the remote sites:
Router B connected to an IPX server and client
Router C connected to two IPX clients
For Router B, the following access lists permit everything except print servers from being announced out
the serial interface.
To permit only IPX file servers and to deny all other IPX servers, use the following configuration:
access-list 1000 permit -1 4
!
interface serial 1
ipx network 10
ipx out-sap-filter 1000
IPX Clients
Router C does not require an access list configuration because the remote site does not have any servers.
Only Novell servers generate SAP updates.
54) Monitor and verify selected access list operations on the router. This objective can be
derived from page 15-28, 15-47 and 15-61 of the ICRC Student Guide.
Monitor IP Access lists
show ip interface
show access-lists
Monitor IPX Access Lists
show ipx interface
show access-lists
Monitor Appletalk Access Lists
show appletalk access-lists
Packet-switching technique in which frames are completely processed before being forwarded out the
appropriate port. This processing includes calculating the CRC and checking the destination address. In
addition, frames must be temporarily stored until network resources (such as an unused link) are available
to forward the message.
62. Describe the operation of the spanning tree protocol and its benefits
A spanning tree is defined as a Loop-free subset of a network topology
A Learning Bridge is a Bridge that performs MAC address learning to reduce traffic on the network.
Learning bridges manage a database of MAC addresses and the interfaces associated with each address.
Bridges use the spanning-tree algorithm, enabling a learning bridge to dynamically work around loops in a
network topology by creating a spanning tree. Bridges exchange BPDU messages with other bridges to
detect loops, and then remove the loops by shutting down selected bridge interfaces. Refers to both the
IEEE 802.1 Spanning-Tree Protocol standard and the earlier Digital Equipment Corporation Spanning-Tree
Protocol upon which it is based. The IEEE version supports bridge domains and allows the bridge to
construct a loop-free topology across an extended LAN. The IEEE version is generally preferred over the
Digital version. Sometimes abbreviated as STP.
The MAC address, located in the Data Link Layer, provides a unique identifier for each device on a local network. It is crucial for the physical addressing process, enabling devices to locate and communicate with each other at the data link level . This hardware address ensures data packets are transferred correctly over the shared media networks, beyond the higher abstraction of IP addressing .
The OSI Network Layer's primary functions include routing data by establishing a path on the network between systems to ensure correct delivery to the destination node . In routers, this is implemented by defining protocols that manage path selection and data packet forwarding, leveraging IP addresses to determine routing paths in packet-switched networks . These functions are performed through dynamic routing protocols that automatically adjust to topology changes, maintaining efficient data flow .
Fast Ethernet offers several advantages over standard Ethernet, primarily through its higher data transfer rate of 100 Mbps compared to 10 Mbps in standard Ethernet . This increased speed supports greater network traffic and more demanding applications, enhancing overall performance. Fast Ethernet also allows for the use of existing cabling infrastructure, assuming it meets Category 5 standards, making upgrades cost-effective . This compatibility with CSMA/CD traffic patterns ensures seamless integration into existing networks.
Network congestion in Ethernet networks occurs when many devices attempt to transmit simultaneously, which leads to collisions and packet retransmissions . The Carrier Sense Multiple Access with Collision Detection (CSMA/CD) protocol, used in Ethernet, detects collisions and manages retransmissions; however, this can cause high latency and reduced network performance under heavy traffic loads .
Connection-oriented services, like TCP, establish a connection before data transfer, providing error recovery and flow control . In contrast, connectionless services, like UDP, send data without setting up a dedicated path, forgoing error correction and flow control to achieve lower latency . These differences affect reliability, speed, and use cases in network communications.
Cut-through switching offers lower latency since it begins forwarding a frame as soon as the destination address is read, reducing delay compared to store-and-forward, which waits for the entire packet to be received and checked before forwarding . However, this method lacks error checking, increasing the risk of propagating faults in errored frames. Store-and-forward improves error detection at the cost of increased latency due to the thorough validation process . Choosing between the two involves balancing the need for speed against reliability and error management.
Flow control mechanisms in networking manage the pace of data transmission between sender and receiver to prevent congestion and ensure efficient use of resources . The three basic methods are: Stop-and-Wait, where the sender waits for an acknowledgement for each message; Sliding Window, which allows multiple frames to be in transit before needing an acknowledgment; and Congestion Control, which adjusts the transmission rate based on network conditions .
LAN segmentation with switches provides bridging functionality at wire speed, reducing congestion by creating dedicated paths between switch ports. This allows network interface cards (NICs) to use full-duplex modes . Routers segment networks by dividing them into broadcast domains, preventing broadcasts from crossing WAN links. Routers efficiently manage traffic and direct it based on higher-layer protocols, unlike switches which operate at layer 2 .
The Spanning Tree Protocol (STP) enhances network reliability by preventing loops in bridged or switched networks. It organizes the network into a loop-free topology by selectively blocking some links and allowing only one active path between network nodes . Key benefits include increased network stability and prevention of broadcast storms, which can lead to network congestion and failure . STP thus ensures efficient packet delivery across complex network structures while maintaining redundancy for failover scenarios.
Subinterfaces enhance functionality by allowing a single physical interface to support multiple logical networks. Each subinterface can have a distinct encapsulation type, which is crucial for supporting different network protocols and configurations within the same physical interface . This setup is advantageous for running multiple networks on the same hardware without additional physical connections, improving flexibility and resource management in complex networking environments .