Upload
raj
View
224
Download
0
Embed Size (px)
Citation preview
8/14/2019 Memory Table
1/14
8/14/2019 Memory Table
2/14
APPENDIX H
Memory Tables
Chapter 2
Chapter 3
Table H-1 Summary: Same-Layer and Adjacent-Layer Interactions
Concept Description
Same-layer interaction on different computers
Adjacent-layer interaction on the same computer
Table H-2 OSI Functional Summary
Layer Functional Description
Application (7)
Presentation (6)
Session (5)
Transport (4)
Network (3)
Data link (2)
Physical (1)
Table H-3 Todays Most Common Types of Ethernet
Common Name Speed
Alternative
Name
Name of
IEEE Standard
Cable Type,
Maximum Length
Ethernet
Fast Ethernet
Gigabit Ethernet
Gigabit Ethernet
8/14/2019 Memory Table
3/14
8/14/2019 Memory Table
4/14
Chapter 6
Chapter 6
Table H-7 All Possible Valid Network Numbers*
Class
First Octet
Range
Valid Network
Numbers*Total Number for This
Class of Network
Number of Hosts
Per Network
A
B
C
Table H-8 TCP/IP Transport Layer Features
Function Description
Multiplexing using ports
Error recovery (reliability)
Flow control using windowing
Connection establishment and termination
Ordered data transfer and data segmentation
Table H-9 Popular Applications and Their Well-Known Port Numbers
Port Number Protocol Application
FTP data
FTP control
SSH
Telnet
SMTP
DNS
DHCP
TFTP
HTTP (WWW)
POP3
SNMP
SSL
RTP-based Voice (VoIP) and Video
8/14/2019 Memory Table
5/14
6 Appendix H: Memory Tables
Chapter 7
Chapter 8
Table H-10 Switch Internal Processing
Switching Method Description
Store-and-forward
Cut-through
Fragment-free
Table H-11 Benefits of Segmenting Ethernet Devices Using Hubs, Switches, and Routers
Feature Hub Switch Router
Greater cabling distances are allowed
Creates multiple collision domains
Increases bandwidth
Creates multiple broadcast domains
Table H-12 Key Sequences for Command Edit and Recall
Keyboard Command What Happens
Up arrow or Ctrl-p
Down arrow or Ctrl-n
Left arrow or Ctrl-b
Right arrow or Ctrl-f
Backspace
Ctrl-a
Ctrl-e
Ctrl-r
Ctrl-d
Esc-b
Esc-f
8/14/2019 Memory Table
6/14
Chapter 9
Chapter 9Chapter 9 summarized the SSH configuration steps on a Cisco IOS-based switch. As much
as possible, record what you remember about the various configuration steps.
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Table H-13 Common Switch Configuration Modes
Prompt Name of Mode
Context-setting Command(s) to Reach
This Mode
hostname(config)#
hostname(config-line)#
hostname(config-if)#
Table H-14 Names and Purposes of the Two Main IOS Configuration Files
Configuration Filename Purpose Where It Is Stored
Startup-config
Running-config
Table H-15 Banners and Their Use
Banner Typical Use
Message of the Day (MOTD)
Login
Exec
8/14/2019 Memory Table
7/14
8 Appendix H: Memory Tables
Chapter 9 also summarized the four configuration steps to configure IP connectivity to a
Cisco IOS-based switch. As much as possible, record what you remember about the various
configuration steps.
Step 1
Step 2
Step 3
Step 4
*Shut down is the default setting.
Chapter 10
Table H-16 Actions When Port Security Violation Occurs
Option on the switchport port-security violation
Command Protect Restrict Shut Down*
Discards offending traffic
Sends log and SNMP messages
Disables the interface, discarding all traffic
Table H-17 show cdp Commands That List Information About Neighbors
Command Description
show cdp neighbors [type number]
show cdp neighbors detail
show cdp entryname
Table H-18 Commands Used to Verify CDP Operations
Command Description
show cdp
show cdp interface [type number]
show cdp traffic
8/14/2019 Memory Table
8/14
Chapter 11
Chapter 11
Table H-19 LAN Switch Interface Status Codes
Line Status Protocol Status Interface Status Typical Root Cause
Administratively
Down
Down
Down Down
Up Down
Down down (err-disabled)
Up Up
Table H-20 Common LAN Layer 1 Problem Indicators
Type of Problem
Counter Values Indicating
This Problem Common Root Causes
Excessive noise
Collisions
Late collisions
Table H-21 Organizations That Set or Influence WLAN Standards
Organization Standardization Role
ITU-R
IEEE
Wi-Fi Alliance
Federal Communications Commission (FCC)
Table H-22 WLAN Standards
Feature 802.11a 802.11b 802.11g
Year ratified
Maximum speed using DSSS
Maximum speed using OFDM
Frequency band
Channels (nonoverlapped)*
Speeds required by standard (Mbps) 6, 12, 24 1, 2, 5.5, 11 6, 12, 24
8/14/2019 Memory Table
9/14
10 Appendix H: Memory Tables
Table H-23 Different WLAN Modes and Names
Mode Service Set Name Description
Ad hoc
Infrastructure (one AP)
Infrastructure (more than one AP)
Table H-24 FCCUnlicensed Frequency Bands of Interest
Frequency Range Name Sample Devices
900 KHz Older cordless telephones
2.4 GHz
5 GHz
Table H-25 Encoding Classes and IEEE Standard WLANs
Name of Encoding Class What It Is Used By
Frequency Hopping Spread Spectrum (FHSS)
Direct Sequence Spread Spectrum (DSSS)
Orthogonal Frequency Division Multiplexing (OFDM)
Table H-26 WLAN Speed and Frequency Reference
IEEE StandardMaximumSpeed (Mbps) Other Speeds* (Mbps) Frequency
NonoverlappingChannels
802.11b 1, 2, 5.5
802.11a 6, 9, 12, 18, 24, 36, 48
802.11g Same as 802.11a
Table H-27 WLAN Vulnerabilities and Solutions
Vulnerability Solution
War drivers
Hackers stealing information in a WLAN
Hackers gaining access to the rest of the network
Employee AP installation
Rogue AP
8/14/2019 Memory Table
10/14
Chapter 12
Chapter 12
Table H-28 WLAN Security Standards
Name Year Who Defined It
Wired Equivalent Privacy (WEP) 1997
The interim Cisco solution while awaiting 802.11i 2001
Wi-Fi Protected Access (WPA) 2003
802.11i (WPA2) 2005+
Table H-29 Comparisons of WLAN Security Features
Standard
Key
Distribution
Device
Authentication
User
Authentication Encryption
WEP Static Yes (weak) None Yes (weak)
Cisco
WPA
802.11i (WPA2)
Table H-30 List of All Possible Valid Network Numbers
Class A Class B Class C
First Octet Range
Valid Network Numbers
Number of Networks in This Class
Number of Hosts Per Network
Size of Network Part of Address (Bytes)
Size of Host Part of Address (Bytes)
Table H-31 Class A, B, and C Networks: Network and Host Parts and Default Masks
Class ofAddress
Size of Network Partof Address in Bits
Size of Host Partof Address in Bits
Default Mask for EachClass of Network
A
B
C
8/14/2019 Memory Table
11/14
12 Appendix H: Memory Tables
Chapter 12 summarizes three steps that can be used for finding the size and location of the
network, subnet, and host parts of an IPv4 address, assuming classful addressing logic is
used. As much as possible, write down the details of each step.
a.
b.
c.
Chapter 13
Table H-32 IPv4 Versus IPv6
Feature IPv4 IPv6
Size of address (bits or bytes per octet)
Example address
Same address, abbreviated
Number of possible addresses, ignoring reserved values
Table H-33 Nine Possible Decimal Numbers in a Subnet Mask
Subnet Masks
Decimal Octet Binary Equivalent Number of Binary 1s Number of Binary 0s
0
128
192
224
240
248
252
254
255
Table H-34 Interface Status Codes and Their Meanings
Name First or Second Status Code General Meaning
Line status
Protocol status
8/14/2019 Memory Table
12/14
Chapter 14
Chapter 14Table H-35 Routing Protocol Classes/Algorithms and Protocols that Use Them
Class/Algorithm IGPs
Distance vector
Link-state
Balanced hybrid (also called advanced distance vector)
Table H-36 Comparing Classless and Classful Routing Protocols
Feature Classless Classful
Yes No
Yes No
Yes No
Table H-37 Interior IP Routing Protocols Compared
Feature RIP-1 RIP-2 EIGRP OSPF IS-IS
Classless No Yes
Supports VLSM No Yes
Sends mask in update No Yes
Distance vector Yes No
Link-state No Yes
Supports autosummarization No Yes Yes No No
Supports manual summarization No Yes Yes Yes Yes
Proprietary No No
Routing updates sent to a multicast IP address No N/A
Supports authentication No yes
Convergence Slow Fast
8/14/2019 Memory Table
13/14
8/14/2019 Memory Table
14/14
Chapter 17
Chapter 16
Chapter 17Chapter 17 summarizes the steps required to configure HDLC. As much as is possible,
remember and write down the steps. The following list shows the number of steps and
substeps as outlined in the chapter.
Step 1
Step 2 The following tasks are required only when the specifically listed
conditions are true:
a.
b.
c.
Step 3 The following steps are always optional and have no impact on whether
the link works and passes IP traffic:
a.
b.
Lists the hosts name cache
Removes all DNS-found name cache entries
Flushes (empties) the hosts ARP cache
Displays a hosts routing table
Table H-41 Comparing Circuits and Packet Switching
Feature Circuits Packet Switching
Service implemented as OSI layer . . .
Point-to-point (two devices) or more
Table H-40 Microsoft Windows XP Network Command Reference (Continued)
Command Function