CCENT Certification ALL-IN-ONE FOR DUMmIES ‰ by Glen E. Clarke ruthenpress.info ruthenpress.info iii 10/15/10 PM10/15/10 PM. ruthenpress.info makes your life easier with 1,s Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo. CCENT: Cisco Certified Entry Networking. Technician Study Guide. Interconnecting Cisco Networking Devices Part 1 Exam Objectives. OBJECTIVE.

Author:JULIA TROYER
Language:English, Spanish, Arabic
Country:Poland
Genre:Biography
Pages:629
Published (Last):31.12.2015
ISBN:778-6-44229-838-5
Distribution:Free* [*Register to download]
Uploaded by: MARCELENE

73860 downloads 173961 Views 23.87MB PDF Size Report


Ccent For Dummies Pdf

Four information-packed books in one comprehensive package tohelp networking newcomers prepare for Ciscos CCENTcertification! If youre preparing for your. The CCENT certification is a new, fast-growing certification that tests your knowledge of basic Cisco device-management and networking concepts. It is a great. CCENT Certification All-in-One For Dummies is really four books-in-one: Networking Basics, Cisco Device Basics, Routing and Switching, and Advanced Topics.

Looks like you are currently in Ukraine but have requested a page in the United States site. Would you like to change to the United States site? Glen E. Four information-packed books in one comprehensive package to help networking newcomers prepare for Cisco's CCENT certification! This practical guide covers everything you need to know to get up to speed on routers, switches, and more. With over pages of content and dozens of review questions, this reference will help you ace your exam and serve as a valuable resource throughout your career. Early editions of this book were sold with a companion disk bound inside the book. To download the companion files that are referenced in the text, go to booksupport. Request permission to reuse content from this site. Undetected country. NO YES. Selected type: Added to Your Shopping Cart.

To download the companion files that are referenced in the text, go to booksupport. Request permission to reuse content from this site.

Undetected country. NO YES. Selected type: Added to Your Shopping Cart. Clarke ISBN: About the Author Glen E. Permissions Request permission to reuse content from this site.

Table of contents Introduction.

Book I: Networking Basics. Chapter 1: Chapter 2: Introduction to Network Technologies. Chapter 3: Network Devices and Services.

Chapter 4: Chapter 5: Subnetting and VLSM. Book II: Cisco Device Basics. Introduction to the Cisco IOS. Basic Router Confi guration. Managing Cisco Devices.

A network cable type used in old Ethernet environments, such as 10Base2 and 10Base5. Coaxial cable is seen in high-speed Internet connections with cable companies today. Fiber optic cable: A unique cable type that has a glass core which carries pulses of light as opposed to copper cable carrying electrical signals coax and twisted pair cabling.

You can be sure to get a few questions on the CCENT certification exam that test your knowledge of types of devices and different network services.

The following are some key points to remember about devices and services:. A hub is a layer-1 device that is used to connect systems together. When a hub receives data in the form of an electrical signal, it sends the data to all other ports in hopes the destination system is at one of those ports.

All ports on the hub create a single collision domain and a single broadcast domain. A repeater is a layer-1 device that is used to amplify the signal.

As the signal travels along the network, it gets weaker due to interference, so the purpose of the repeater is to regenerate that signal so it can travel more distance.

A bridge is a layer-2 device that creates multiple network segments.

Best Ccent Books for Free - PDF Drive

The bridge maintains a table in memory of what systems reside on what segments by their MAC addresses. When data reaches the bridge, the bridge filters the traffic by only sending the data to the network segment that the destination system resides on.

The purpose of the bridge is that it filters traffic by sending the data only to the segment where the destination system resides. Each segment on the bridge creates a separate collision domain, but it is all one broadcast domain. The switch, another layer-2 device, is an improvement on a bridge in the sense that each port on the switch acts as a network segment.

The switch filters traffic by sending the data only to the port on the switch where the destination MAC address resides. Each port on the switch creates a separate collision domain, but all ports are part of the same broadcast domain.

A router is a layer-3 device that handles routing of data from one network to another network. The router stores a listing of destination networks in the routing table which is found in memory on the router.

Network Address Translation is responsible for converting the internal address to a public address that is used to access the Internet. NAT offers the benefit of being able to download only one public IP address and have a number of clients on the network use that one IP address for Internet access. NAT also offers the security benefit that the internal addresses are not used on the Internet — helping to keep the internal addresses unknown to the outside world.

Static NAT: Static NAT is the mapping of one internal address to one public address. With static NAT, you will need multiple public addresses to allow internal clients to access the Internet.

NAT o verloading: Web services: SMTP servers are also known as email servers.

FTP is an Internet protocol used to transfer files over the Internet. The files are hosted on FTP servers, which are then downloaded to any clients on the Internet. At its most basic, wireless communication is the sending and receiving of data through airwaves. The following are some key points to remember for the exam:. Creates the wireless standards, such as Regulates the use of wireless devices licenses of frequencies.

Ensures compatibility of wireless components. The WiFi-Alliance is responsible for testing and certification of wireless devices. Ad hoc mode: No wireless access point is used. The wireless clients communicate in a peer-to-peer environment.

A wireless standard that uses the 5 GHz frequency range and runs at 54 Mbps.

Ccent Books

A wireless standard that uses the 2. The WiFi standard was created and This is the frequency used by cordless phones and microwaves, so you may experience interference from those devices. As a correction, you can change the channel of the wireless network or download phones that use a different frequency. A wireless standard, which is compatible with A new wireless standard that can use either the 2.

A wireless network consisting of one access point using an SSID. A wireless network comprising multiple access points using the same SSID.

Other books: OXFORD ATPL PDF

An old wireless encryption protocol that involves configuring a pre-shared key on the access point and the wireless client that is used to encrypt and decrypt data. WEP uses the RC4 encryption algorithm with the pre-shared key and is not considered secure due to the way the key is used. WEP supports bit and bit encryption.

CCENT Certification All-In-One For Dummies

WPA has two modes: The following are some key points regarding best practices to improve the security of your wireless network:. Disable wireless: Change the SSID: Make sure you change the SSID to something meaningless. Disable SSID broadcasting: After disabling SSID broadcasting. This makes it harder for someone to connect because they have to manually configure their client for the SSID name. Implement MAC filtering: MAC filtering allows you to limit who can connect to the wireless network by the MAC address of the network card.

Implement encryption: WPA2 is the most secure of the three. Cheat Sheet. Layer Description Examples 7. Application Responsible for initiating or services the request.

Presentation Formats the information so that it is understood by the receiving system. Compression and encryption depending on the implementation 5. Session Responsible for establishing, managing, and terminating the session. NetBIOS 4. Transport Breaks information into segments and is responsible for connection and connectionless communication.

CCENT Certification All-In-One For Dummies Cheat Sheet

Physical Deals with the electrical signal. Cables, connectors, hubs, and repeaters. There are different types of memory on a Cisco device: The flash memory is used to store the Cisco IOS.

The following is a quick review of the boot process of a Cisco router: The following summarizes the major configuration modes: The following are some key points that summarize configuring passwords on Cisco devices: Remember that the enable password is stored in clear text within the configuration file while the enable secret is encrypted.

Remember that after the password is set, you must specify the login command to require authentication on the port. Again, notice the use of the login command after setting the password; if you forget to use it then the router will not prompt for a password on that port.

The following commands configure the hostname table on a router and display the entries in the hostname table: NY-R1 config Access-list 1 permit Switch config-if shutdown Disables the port. The following table lists popular show commands: The following are some key points to remember about devices and services: Network devices Hub: Network services DHCP: Command s Result ip routing Enables routing on the router.

Should be on by default. RIP is a dynamic routing protocol that is used to share routing information with other routers running RIP.

In this example, RIP will share knowledge of the The following are some key points to remember for the exam: Know the following organizations that help define wireless: Regulates the use of wireless devices licenses of frequencies WiFi-Alliance: Know the two types of wireless networks: Infrastructure mode: Other wireless terms to know for the exam: Be sure to know the configuration requirements to set up an ESS: The SSID on each access point must be the same.

Each access point must use a different channel. Know the difference between the different wireless encryption types: The following are some key points regarding best practices to improve the security of your wireless network: Breaks information into segments and is responsible for connection and connectionless communication. Responsible for physical addressing, error correction, and preparing the information for the media. These commands are used to create an enable password and an enable secret.

These commands are used to create a console password on the console port. These commands are used to create an auxiliary port password on the router.

Similar files:


Copyright © 2019 ruthenpress.info.
DMCA |Contact Us