Showing posts with label CCNA. Show all posts
Showing posts with label CCNA. Show all posts

Saturday, August 23, 2008

Cisco Press ICND2 Feb 2008

Contents at a Glance

Chapter 1 Review of Cisco IOS for Routers and Switches 3
Chapter 2 Medium-Sized Switched Network Construction 13
Chapter 3 Medium-Sized Routed Network Construction 97
Chapter 4 Single-Area OSPF Implementation 139
Chapter 5 Implementing EIGRP 171
Chapter 6 Managing Traffic with Access Control Lists 205
Chapter 7 Managing Address Spaces with NAT and IPv6 249
Chapter 8 Extending the Network into the WAN 297

Link to download:
Cisco Press ICND2 Feb 2008

Thursday, August 21, 2008

CCNA final test 640-802. Version 2.0 05/25/2008

CCNA final test 640-802. Version 2.0 05/25/2008
New version of CCNA-640-802.
Updated: 05/25/2008
Link download:
CCNA final test 640-802. Version 2.0 05/25/2008

Thursday, August 14, 2008

CCNP Video Mentor (Size: 792 MB)

Descriptions:
1.BSCI
2.BCMSN
3.ISCW
4.ONT

AND MANY MORE USEFULL FOR CCNP
Part1
Part2
Part3
Part4
Part5
Part6
Part7
Part8
Part9

Cisco Press - Complete CCNP Video Mentor
Part1
Part2
Part3
Part4
Part5
Part6
Part7
Part8

BSCI 642-901 Train Signal

CD01:
Part 1
Part 2
Part 3
Part 4

CD02:
Part 1
Part 2
Part 3
Part 4

BCMSN 642-812 Train Signal

Part 1
Part 2
Part 3
Part 4
Part 5
Part 6


CBT Nuggets Cisco CCNP 642-812 BCMSN - Video Tutorial

Part 1
Part 2
Part 3
Part 4
Part 5
Part 6

BCMSN other:
BCMSN

Cisco CCNP - Exam-Pack 642-825 ISCW


Part 1
Part 2
Part 3

Cisco CCNP - Exam-Pack 642-845 ONT - Part1
Cisco CCNP - Exam-Pack 642-845 ONT - Part2
Cisco CCNP - Exam-Pack 642-845 ONT - Part3
Cisco CCNP - Exam-Pack 642-845 ONT - Part4

IP Subnet Calculations

IP Subnet Calculations


1. IP Addressing

At this point you should know that IP, the Internet Protocol, is a network layer (OSI layer 3) protocol, used to route packets between hosts on different networks. To suit this purpose, IP must define an addressing scheme, so that a packet's intended destination can be indicated.

An IP address is composed of 32 bits. These 32 bits are divided into 4 octets of 8 bits each. You may have seen an IP address represented like this: 172.68.15.24. We must remember, however, that the computer understands this number only in binary, so we must often deal with them in binary. Many people are intimidated by this initially, but soon find that it is not difficult. If you do not allow yourself to be flustered, you can master this topic.

IP addresses are assigned to organizations in blocks. Each block belongs to one of three classes: class A, class B, or class C. You can tell what class an IP address is by the value in its first octet.

Class A


1-126

Class B


128-191

Class C


192 -->

An IP address consists of two fields. The first field identifies the network, and the second field identifies the node on the network. Which bits of the address are in the network field and which bits are in the host field is determined by the subnet mask.

When a class A IP license is granted, you are assigned something like this: 99.0.0.0. Only the value of the bits in the first octet is assigned. This means you are free to assign any values you wish in the second, third and fourth octets.

The default subnet mask for a class A network is 255.0.0.0. High bits, ones, indicate the bits that are part of the network field of the IP address. The default subnet mask does not create subnets. Therefore, a class A network with the default subnet mask is one network. The three octets that are unassigned and unmasked are part of the host field of the address. There is a total of 24 bits in those three octets. Each bit can be in one of two states. Therefore, 2^24 is the number of host addresses that can be assigned on that network, almost. Two addresses are reserved on every network, x.x.x.0 and x.x.x.255. So the total number of hosts possible on this network is 2^24. 2^24-2=16,777,214 hosts for a class A IP network.

When a class B license is granted, the first two octets are assigned. For example, 172.198.x.x. The default subnet mask for a class B is 255.255.0.0. One network, two octets free, 16 bits for the host address field. 2^16-2=65,534 possible host addresses on a class B IP network.

When a class C license is granted, the first three octets are assigned, for example: 193.52.16.0. The default subnet mask for a class C is 255.255.255.0. Once octet makes up the host address field. 2^8-2=254 host addresses possible on a class C network.
2. Reason for Subnetting

We said that the default subnet mask for a class A IP network is 255.0.0.0. Once octet only of a class A network address identifies the network, with this subnet mask. This leaves three octets of 8 bits each, or 24 bits, to identify the host on that one network. 2^24=16,777,216 addresses. Two addresses are reserved, x.x.x.0 and x.x.x.255. 16,777,214 nodes can be assigned an IP address on this network.

It is highly unlikely that any organization would want one network of 16,777,214 nodes. They might want that many devices connected in a wide area network (WAN), thus capable of communicating when necessary, but they will want to subdivide this huge network into mostly self-contained subnetworks of nodes that communicate with each other often. This is called subnetting.

To understand why, consider what would happen in either a broadcast or a token passing network that consisted of over 16,000,000 nodes. Nothing would happen. It simply would not work. Though the problem is not as drastic, class B and class C IP networks are often subnetted, also.

The subnet mask is used to subdivide an IP network into subnets. This is a division that takes place in OSI layer 3, so it is a logical division that is created by the addressing scheme. This logical division is usually combined with a physical division. Many subnets are physically isolated from the rest of the network by a device such as a router or a switch. This aspect of subnetting is discussed in Unit 3--Data Link Layer.
3. How Subnetting Works

The bits of an address that are masked by the subnet mask are the bits that make up the network field of the address. To subnet, the default subnet mask for a network is extended to cover bits of the address that would otherwise be part of the host field. Once these bits are masked, they become part of the network field, and are used to identify subnets of the larger network.

Here is where we begin dealing with both addresses and subnet masks in binary. Get yourself a cold beverage, stretch, take a deep breath and don't worry. Once you get your brain around the concepts, it is not difficult. You just have to keep trying until the light goes on.
3.1 Translating Binary to Decimal

Both IP addresses and subnet masks are composed of 32 bits divided into 4 octets of 8 bits each. Here is how a single octet translates from binary to decimal. Consider an octet of all ones: 11111111.
128 64 32 16 8 4 2 1 --- -- -- -- - - - - 1 1 1 1 1 1 1 1 128 + 64 + 32 + 16 + 8 + 4 + 2 + 1 = 255

Here's another: 10111001
128 64 32 16 8 4 2 1 --- -- -- -- - - - - 1 0 1 1 1 0 0 1 128 + 0 + 32 +16 + 8 + 0 + 0 + 1 = 185

and 00000000
128 64 32 16 8 4 2 1 --- -- -- -- - - - - 0 0 0 0 0 0 0 0 0 + 0 + 0 + 0 + 0 + 0 + 0 + 0 = 0
3.2 Converting Decimal to Binary

Converting decimal to binary is similar. Consider 175:
128 64 32 16 8 4 2 1 --- -- -- -- - - - - 1 0 1 0 1 1 1 1 128 + 0 + 32 + 0 + 8 + 4 + 2 + 1 = 175

175=10101111
3.3 Simple Subnetting

The simplest way to subnet is to take the octet in the subnet mask that covers the first unassigned octet in the IP address block, and make all its bits high. Remember, a high bit, a 1, in the subnet mask indicates that that corresponding bit in the IP address is part of the network field. So, if you have a class B network 172.160.0.0, with the subnet mask 255.255.0.0, you have one network with 65, 534 possible addresses. If you take that subnet mask and make all the bits in the third octet high
128 64 32 16 8 4 2 1 --- -- -- -- - - - - 1 1 1 1 1 1 1 1 128 + 64 + 32 + 16 + 8 + 4 + 2 + 1 = 255

you get the subnet mask 255.255.255.0.
172.60. 0. 0 255.255.255.0

Now the third octet of all the addresses on this network is part of the network field instead of the host field. That is one octet, or eight bits, that can be manipulated to create subnets. 2^8-2=254 possible subnets now on this class B network.

One octet is left for the host field. 2^8-2=254 possible host addressed on each subnet.
3.4 Advanced Subnetting

That is the simplest way to subnet, but it may not be the most desirable. You might not want 254 subnets on your class B network. Instead, you might use a subnet mask like 255.255.224.0. How many subnets would this give you? The first step is to see how many bits are allocated to the network by this mask.
128 64 32 16 8 4 2 1 --- -- -- -- - - - - 1 1 1 0 0 0 0 0 128 + 64 + 32 + 0 + 0 + 0 + 0 + 0 = 224

3 bits are allocated. 2^3-2=6 subnets.

How many hosts on each subnet? Well, 5 bits from this octet are left for the host field, and 8 bits in the fourth octet, for a total of 13 bits in the host field. 2^13-2=8190 possible hosts on each subnet.

The subnet mask is always extended by masking off the next bit in the address, from left to right. Thus, the last octet in the subnet mask will always be one of these: 128, 192, 224, 240, 248, 252, 254 or 255.

Given the IP address of a host and the subnet address for the network, you need to be able to calculate which subnet that host is on. To do this we compare the binary representation of the pertinent octet of the subnet mask with the binary representation of the corresponding octet in the IP address. Example:
IP address=172.60.50.2 subnet mask=255.255.224.0 50= 00110010 224=11100000

We perform a logical on these two numbers. We will be left with only the bits where there is a one in both octets.
00110010 11100000 -------- 00100000=32

This host is on subnet 172.60.32.0.

We also need to be able to find the range of assignable IP addresses on this subnet. To do this, we take the binary that tells us the subnet address, in this case 00100000, and compare it with the subnet mask.
00100000 11100000

The bits converted by the mask we will leave as they are. The rest of the bits we make high. So
00100000 11100000 -------- 0011111=63

The range of assignable IP addresses on the subnet 172.60.32.0 is 172.60.32.1-172.60.63.254.

On every network and subnet, two addresses are reserved. At the low end of the range of addresses for the network or subnet, in this case 172.60.64.0, is the address for the network or subnet itself. The address at the high end of the range of addresses, in this case 172.60.95.255, is the broadcast address. Any message sent to the broadcast address will be received by every host on the network.

Wednesday, August 13, 2008

640-802 CCENT-CCNA Exam Certification Guides


Exam Topics


The following topics are general guidelines for the content likely to be included on the Cisco Certified Network Associate exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.
Describe how a network works

* Describe the purpose and functions of various network devices
* Select the components required to meet a network specification
* Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network
* Describe common networked applications including web applications
* Describe the purpose and basic operation of the protocols in the OSI and TCP models
* Describe the impact of applications (Voice Over IP and Video Over IP) on a network
* Interpret network diagrams
* Determine the path between two hosts across a network
* Describe the components required for network and Internet communications
* Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach
* Differentiate between LAN/WAN operation and features


Configure, verify and troubleshoot a switch with VLANs and interswitch communications

* Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts
* Explain the technology and media access control method for Ethernet networks
* Explain network segmentation and basic traffic management concepts
* Explain basic switching concepts and the operation of Cisco switches
* Perform and verify initial switch configuration tasks including remote access management
* Verify network status and switch operation using basic utilities (including: ping, traceroute, telnet, SSH, arp, ipconfig), SHOW & DEBUG commands
* Identify, prescribe, and resolve common switched network media issues, configuration issues, auto negotiation, and switch hardware failures
* Describe enhanced switching technologies (including: VTP, RSTP, VLAN, PVSTP, 802.1q)
* Describe how VLANs create logically separate networks and the need for routing between them
* Configure, verify, and troubleshoot VLANs
* Configure, verify, and troubleshoot trunking on Cisco switches
* Configure, verify, and troubleshoot interVLAN routing
* Configure, verify, and troubleshoot VTP
* Configure, verify, and troubleshoot RSTP operation
* Interpret the output of various show and debug commands to verify the operational status of a Cisco switched network.
* Implement basic switch security (including: port security, trunk access, management vlan other than vlan1, etc.)


Implement an IP addressing scheme and IP Services to meet network requirements in a medium-size Enterprise branch office network.

* Describe the operation and benefits of using private and public IP addressing
* Explain the operation and benefits of using DHCP and DNS
* Configure, verify and troubleshoot DHCP and DNS operation on a router.(including: CLI/SDM)
* Implement static and dynamic addressing services for hosts in a LAN environment
* Calculate and apply an addressing scheme including VLSM IP addressing design to a network
* Determine the appropriate classless addressing scheme using VLSM and summarization to satisfy addressing requirements in a LAN/WAN environment
* Describe the technological requirements for running IPv6 in conjunction with IPv4 (including: protocols, dual stack, tunneling, etc).
* Describe IPv6 addresses
* Identify and correct common problems associated with IP addressing and host configurations


Configure, verify, and troubleshoot basic router operation and routing on Cisco devices

* Describe basic routing concepts (including: packet forwarding, router lookup process)
* Describe the operation of Cisco routers (including: router bootup process, POST, router components)
* Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts
* Configure, verify, and troubleshoot RIPv2
* Access and utilize the router to set basic parameters.(including: CLI/SDM)
* Connect, configure, and verify operation status of a device interface
* Verify device configuration and network connectivity using ping, traceroute, telnet, SSH or other utilities
* Perform and verify routing configuration tasks for a static or default route given specific routing requirements
* Manage IOS configuration files. (including: save, edit, upgrade, restore)
* Manage Cisco IOS.
* Compare and contrast methods of routing and routing protocols
* Configure, verify, and troubleshoot OSPF
* Configure, verify, and troubleshoot EIGRP
* Verify network connectivity (including: using ping, traceroute, and telnet or SSH)
* Troubleshoot routing issues
* Verify router hardware and software operation using SHOW & DEBUG commands.
* Implement basic router security


Explain and select the appropriate administrative tasks required for a WLAN

* Describe standards associated with wireless media (including: IEEE WI-FI Alliance, ITU/FCC)
* Identify and describe the purpose of the components in a small wireless network. (Including: SSID, BSS, ESS)
* Identify the basic parameters to configure on a wireless network to ensure that devices connect to the correct access point
* Compare and contrast wireless security features and capabilities of WPA security (including: open, WEP, WPA-1/2)
* Identify common issues with implementing wireless networks. (Including: Interface, missconfiguration)


Identify security threats to a network and describe general methods to mitigate those threats

* Describe today's increasing network security threats and explain the need to implement a comprehensive security policy to mitigate the threats
* Explain general methods to mitigate common security threats to network devices, hosts, and applications
* Describe the functions of common security appliances and applications
* Describe security recommended practices including initial steps to secure network devices


Implement, verify, and troubleshoot NAT and ACLs in a medium-size Enterprise branch office network.

* Describe the purpose and types of ACLs
* Configure and apply ACLs based on network filtering requirements.(including: CLI/SDM)
* Configure and apply an ACLs to limit telnet and SSH access to the router using (including: SDM/CLI)
* Verify and monitor ACLs in a network environment
* Troubleshoot ACL issues
* Explain the basic operation of NAT
* Configure NAT for given network requirements using (including: CLI/SDM)
* Troubleshoot NAT issues


Implement and verify WAN links

* Describe different methods for connecting to a WAN
* Configure and verify a basic WAN serial connection
* Configure and verify Frame Relay on Cisco routers
* Troubleshoot WAN implementation issues
* Describe VPN technology (including: importance, benefits, role, impact, components)
* Configure and verify a PPP connection between Cisco routers



Download link

Monday, August 11, 2008

Testking 640-80 Version 9

CCNA testking 640-80 version 9 -- include Question and Answer
Download link:

Download link

Some network tool for learning CCNA

IP Adressing and subnetting



IP Plan
IP Plan

Case study


Skill CCNA 640 - 801 Semester 1
http://www.box.net/shared/ivvanajgg0


CCNA summary
http://files.myopera.com/Dlavega/NoBlog/CCNAv4%20Summary.rar

Sunday, August 10, 2008

Useful tools: tool to calculate subnet

This tool is used to calculate subnet
Link to download:
http://www.youthgeneration.net/forum/index.php?topic=11.0

Dynamips -- Simulate Cissco Router

Introduction

Dynamips is a Cisco router emulator written by Christophe Fillot. It emulates 1700, 2600, 3600, 3700, and 7200 hardware platforms, and runs standard IOS images. In Chris’ own words:



This kind of emulator would be useful to:

· Be used as a training platform, with software used in real world. It would allow people to become more familiar with Cisco devices, Cisco being the world leader in networking technologies ;

· Test and experiment features of Cisco IOS ;

· Check quickly configurations to be deployed later on real routers.



Of course, this emulator cannot replace a real router, it is simply a complementary tool to real labs for administrators of Cisco networks or people wanting to pass their CCNA/CCNP/CCIE exams.



Although Dynamips provides a simple virtual switch, it does not emulate Catalyst switches (although it does emulate the NM-16ESW).



Dynagen is a text-based front end for Dynamips, which uses the “Hypervisor” mode for communication with Dynamips. Dynagen simplifies building and working with virtual networks:

* Uses a simple, easy to understand configuration file for specifying virtual router hardware configurations
* Simple syntax for interconnecting routers, bridges, frame-relay and ATM, and Ethernet switches. No need to deal with NetIOs
* Can work in a client / server mode, with Dynagen running on your workstation communicating with Dynamips running on a back-end server. Dynagen can also control multiple Dynamips servers simultaneously for distributing large virtual networks across several machines. Or you can run Dynamips and Dyngen on the same system
* Provides a management CLI for listing devices, starting, stopping, reloading, suspending, resuming, and connecting to the consoles of virtual routers.



Dynagen is written in Python, and is therefore compatible with any platform for which there is a Python interpreter (which is to say, many). The design is modular, with a separate OOP API for interfacing with Dynamips. Other Python applications could be written that use this API for programmatically provisioning virtual networks, or to provide other front-ends. For example, a team is working on GNS-3; a GUI front-end using this library.

Download link

Home site

Slide for CCNA -- Semester 4

1.CCNA4_M6_Network_Management.pdf
2.CCNA4_M5_Frame_Relay.pdf
3.CCNA4_M4_ISDN_and_DDR.pdf
4.CCNA4_M3_PPP.pdf
5.CCNA4_M2_WAN_Technologies.pdf
6.CCNA4_M1_Scaling_IP_Address.pdf

Download link

Slide for CCNA -- Semester 3

1.CCNA3_Open_Lab.pdf
2.CCNA3_M9_VLAN_Trunking_Protocol.pdf
3.CCNA3_M8_Virtual_LANs.pdf
4.CCNA3_M7_Spanning-Tree_Protocol.pdf
5.CCNA3_M6_Switch_configuration.pdf
6.CCNA3_M5_Switches.pdf
7.CCNA3_M4_Switching_Concepts.pdf
8.CCNA3_M3_EIGRP.pdf
9.CCNA3_M2_Single_Area_OSPF.pdf
10.CCNA3_M1_Introduction_Classless_Routing.pdf

Download link

Slide for CCNA -- Semester 2

1.CCNA2_Open_Lab.pdf
2.CCNA2_M9_Basic_Router_Troubleshooting.pdf
3.CCNA2_M8_TCIPIP_Error_Control_Messages.pdf
4.CCNA2_M7_Distance_vector_Routing_Protocol.pdf
5.CCNA2_M6_Routing_and_Routing_Protocols.pdf
6.CCNA2_M5_Managing_Cisco_IOS_Software.pdf
7.CCNA2_M4_Learning_about_other_devices.pdf
8.CCNA2_M3_Configuring_a_Router.pdf
9.CCNA2_M2_Introduction_to_Router.pdf
10.CCNA2_M11_Access_Control_Lists.pdf
11.CCNA2_M10_Intermediate_TCPIP.pdf
12.CCNA2_M1_WANs_and_Routers.pdf

Download link

Slide For CCNA -- Semester 1

1. CCNA1_M9_TCP_IP_and_IP_Addressing.pdf
2. CCNA1_M8_Ethernet_Switching.pdf
3. CCNA1_M7_Ethernet_Technologies.pdf
4. CCNA1_M6_Ethernet_Fundamentals.pdf
5. CCNA1_M5_Cabling_LANs_WANs.pdf
6. CCNA1_M4_Cable_Testing.pdf
7. CCNA1_M3_Networking_Media.pdf
8. CCNA1_M2_Networking_Fundamentals.pdf
9. CCNA1_M11_TCPIP_Transport_Application.pdf
10. CCNA1_M10_Routing_Fundamentals_Subnets.pdf
11. CCNA1_M1_Introduction_to_Networking.pdf
12. CCNA1_CaseStudy_Structured_Cabling.pdf
13. CCNA Introduction.pdf

Download link
Your Ad Here