memory table

Upload: raj

Post on 30-May-2018

224 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/14/2019 Memory Table

    1/14

  • 8/14/2019 Memory Table

    2/14

    APPENDIX H

    Memory Tables

    Chapter 2

    Chapter 3

    Table H-1 Summary: Same-Layer and Adjacent-Layer Interactions

    Concept Description

    Same-layer interaction on different computers

    Adjacent-layer interaction on the same computer

    Table H-2 OSI Functional Summary

    Layer Functional Description

    Application (7)

    Presentation (6)

    Session (5)

    Transport (4)

    Network (3)

    Data link (2)

    Physical (1)

    Table H-3 Todays Most Common Types of Ethernet

    Common Name Speed

    Alternative

    Name

    Name of

    IEEE Standard

    Cable Type,

    Maximum Length

    Ethernet

    Fast Ethernet

    Gigabit Ethernet

    Gigabit Ethernet

  • 8/14/2019 Memory Table

    3/14

  • 8/14/2019 Memory Table

    4/14

    Chapter 6

    Chapter 6

    Table H-7 All Possible Valid Network Numbers*

    Class

    First Octet

    Range

    Valid Network

    Numbers*Total Number for This

    Class of Network

    Number of Hosts

    Per Network

    A

    B

    C

    Table H-8 TCP/IP Transport Layer Features

    Function Description

    Multiplexing using ports

    Error recovery (reliability)

    Flow control using windowing

    Connection establishment and termination

    Ordered data transfer and data segmentation

    Table H-9 Popular Applications and Their Well-Known Port Numbers

    Port Number Protocol Application

    FTP data

    FTP control

    SSH

    Telnet

    SMTP

    DNS

    DHCP

    TFTP

    HTTP (WWW)

    POP3

    SNMP

    SSL

    RTP-based Voice (VoIP) and Video

  • 8/14/2019 Memory Table

    5/14

    6 Appendix H: Memory Tables

    Chapter 7

    Chapter 8

    Table H-10 Switch Internal Processing

    Switching Method Description

    Store-and-forward

    Cut-through

    Fragment-free

    Table H-11 Benefits of Segmenting Ethernet Devices Using Hubs, Switches, and Routers

    Feature Hub Switch Router

    Greater cabling distances are allowed

    Creates multiple collision domains

    Increases bandwidth

    Creates multiple broadcast domains

    Table H-12 Key Sequences for Command Edit and Recall

    Keyboard Command What Happens

    Up arrow or Ctrl-p

    Down arrow or Ctrl-n

    Left arrow or Ctrl-b

    Right arrow or Ctrl-f

    Backspace

    Ctrl-a

    Ctrl-e

    Ctrl-r

    Ctrl-d

    Esc-b

    Esc-f

  • 8/14/2019 Memory Table

    6/14

    Chapter 9

    Chapter 9Chapter 9 summarized the SSH configuration steps on a Cisco IOS-based switch. As much

    as possible, record what you remember about the various configuration steps.

    Step 1

    Step 2

    Step 3

    Step 4

    Step 5

    Step 6

    Table H-13 Common Switch Configuration Modes

    Prompt Name of Mode

    Context-setting Command(s) to Reach

    This Mode

    hostname(config)#

    hostname(config-line)#

    hostname(config-if)#

    Table H-14 Names and Purposes of the Two Main IOS Configuration Files

    Configuration Filename Purpose Where It Is Stored

    Startup-config

    Running-config

    Table H-15 Banners and Their Use

    Banner Typical Use

    Message of the Day (MOTD)

    Login

    Exec

  • 8/14/2019 Memory Table

    7/14

    8 Appendix H: Memory Tables

    Chapter 9 also summarized the four configuration steps to configure IP connectivity to a

    Cisco IOS-based switch. As much as possible, record what you remember about the various

    configuration steps.

    Step 1

    Step 2

    Step 3

    Step 4

    *Shut down is the default setting.

    Chapter 10

    Table H-16 Actions When Port Security Violation Occurs

    Option on the switchport port-security violation

    Command Protect Restrict Shut Down*

    Discards offending traffic

    Sends log and SNMP messages

    Disables the interface, discarding all traffic

    Table H-17 show cdp Commands That List Information About Neighbors

    Command Description

    show cdp neighbors [type number]

    show cdp neighbors detail

    show cdp entryname

    Table H-18 Commands Used to Verify CDP Operations

    Command Description

    show cdp

    show cdp interface [type number]

    show cdp traffic

  • 8/14/2019 Memory Table

    8/14

    Chapter 11

    Chapter 11

    Table H-19 LAN Switch Interface Status Codes

    Line Status Protocol Status Interface Status Typical Root Cause

    Administratively

    Down

    Down

    Down Down

    Up Down

    Down down (err-disabled)

    Up Up

    Table H-20 Common LAN Layer 1 Problem Indicators

    Type of Problem

    Counter Values Indicating

    This Problem Common Root Causes

    Excessive noise

    Collisions

    Late collisions

    Table H-21 Organizations That Set or Influence WLAN Standards

    Organization Standardization Role

    ITU-R

    IEEE

    Wi-Fi Alliance

    Federal Communications Commission (FCC)

    Table H-22 WLAN Standards

    Feature 802.11a 802.11b 802.11g

    Year ratified

    Maximum speed using DSSS

    Maximum speed using OFDM

    Frequency band

    Channels (nonoverlapped)*

    Speeds required by standard (Mbps) 6, 12, 24 1, 2, 5.5, 11 6, 12, 24

  • 8/14/2019 Memory Table

    9/14

    10 Appendix H: Memory Tables

    Table H-23 Different WLAN Modes and Names

    Mode Service Set Name Description

    Ad hoc

    Infrastructure (one AP)

    Infrastructure (more than one AP)

    Table H-24 FCCUnlicensed Frequency Bands of Interest

    Frequency Range Name Sample Devices

    900 KHz Older cordless telephones

    2.4 GHz

    5 GHz

    Table H-25 Encoding Classes and IEEE Standard WLANs

    Name of Encoding Class What It Is Used By

    Frequency Hopping Spread Spectrum (FHSS)

    Direct Sequence Spread Spectrum (DSSS)

    Orthogonal Frequency Division Multiplexing (OFDM)

    Table H-26 WLAN Speed and Frequency Reference

    IEEE StandardMaximumSpeed (Mbps) Other Speeds* (Mbps) Frequency

    NonoverlappingChannels

    802.11b 1, 2, 5.5

    802.11a 6, 9, 12, 18, 24, 36, 48

    802.11g Same as 802.11a

    Table H-27 WLAN Vulnerabilities and Solutions

    Vulnerability Solution

    War drivers

    Hackers stealing information in a WLAN

    Hackers gaining access to the rest of the network

    Employee AP installation

    Rogue AP

  • 8/14/2019 Memory Table

    10/14

    Chapter 12

    Chapter 12

    Table H-28 WLAN Security Standards

    Name Year Who Defined It

    Wired Equivalent Privacy (WEP) 1997

    The interim Cisco solution while awaiting 802.11i 2001

    Wi-Fi Protected Access (WPA) 2003

    802.11i (WPA2) 2005+

    Table H-29 Comparisons of WLAN Security Features

    Standard

    Key

    Distribution

    Device

    Authentication

    User

    Authentication Encryption

    WEP Static Yes (weak) None Yes (weak)

    Cisco

    WPA

    802.11i (WPA2)

    Table H-30 List of All Possible Valid Network Numbers

    Class A Class B Class C

    First Octet Range

    Valid Network Numbers

    Number of Networks in This Class

    Number of Hosts Per Network

    Size of Network Part of Address (Bytes)

    Size of Host Part of Address (Bytes)

    Table H-31 Class A, B, and C Networks: Network and Host Parts and Default Masks

    Class ofAddress

    Size of Network Partof Address in Bits

    Size of Host Partof Address in Bits

    Default Mask for EachClass of Network

    A

    B

    C

  • 8/14/2019 Memory Table

    11/14

    12 Appendix H: Memory Tables

    Chapter 12 summarizes three steps that can be used for finding the size and location of the

    network, subnet, and host parts of an IPv4 address, assuming classful addressing logic is

    used. As much as possible, write down the details of each step.

    a.

    b.

    c.

    Chapter 13

    Table H-32 IPv4 Versus IPv6

    Feature IPv4 IPv6

    Size of address (bits or bytes per octet)

    Example address

    Same address, abbreviated

    Number of possible addresses, ignoring reserved values

    Table H-33 Nine Possible Decimal Numbers in a Subnet Mask

    Subnet Masks

    Decimal Octet Binary Equivalent Number of Binary 1s Number of Binary 0s

    0

    128

    192

    224

    240

    248

    252

    254

    255

    Table H-34 Interface Status Codes and Their Meanings

    Name First or Second Status Code General Meaning

    Line status

    Protocol status

  • 8/14/2019 Memory Table

    12/14

    Chapter 14

    Chapter 14Table H-35 Routing Protocol Classes/Algorithms and Protocols that Use Them

    Class/Algorithm IGPs

    Distance vector

    Link-state

    Balanced hybrid (also called advanced distance vector)

    Table H-36 Comparing Classless and Classful Routing Protocols

    Feature Classless Classful

    Yes No

    Yes No

    Yes No

    Table H-37 Interior IP Routing Protocols Compared

    Feature RIP-1 RIP-2 EIGRP OSPF IS-IS

    Classless No Yes

    Supports VLSM No Yes

    Sends mask in update No Yes

    Distance vector Yes No

    Link-state No Yes

    Supports autosummarization No Yes Yes No No

    Supports manual summarization No Yes Yes Yes Yes

    Proprietary No No

    Routing updates sent to a multicast IP address No N/A

    Supports authentication No yes

    Convergence Slow Fast

  • 8/14/2019 Memory Table

    13/14

  • 8/14/2019 Memory Table

    14/14

    Chapter 17

    Chapter 16

    Chapter 17Chapter 17 summarizes the steps required to configure HDLC. As much as is possible,

    remember and write down the steps. The following list shows the number of steps and

    substeps as outlined in the chapter.

    Step 1

    Step 2 The following tasks are required only when the specifically listed

    conditions are true:

    a.

    b.

    c.

    Step 3 The following steps are always optional and have no impact on whether

    the link works and passes IP traffic:

    a.

    b.

    Lists the hosts name cache

    Removes all DNS-found name cache entries

    Flushes (empties) the hosts ARP cache

    Displays a hosts routing table

    Table H-41 Comparing Circuits and Packet Switching

    Feature Circuits Packet Switching

    Service implemented as OSI layer . . .

    Point-to-point (two devices) or more

    Table H-40 Microsoft Windows XP Network Command Reference (Continued)

    Command Function