CCNA Notes 1
CCNA Notes 1
CCNA Notes 1
Switches:
A switch is networking hardware that connects devices on a computer network by using packet
switching to receive and forward data to the destination device. A network switch is a multiport
network bridge that uses MAC addresses to forward data at the Data-Link layer of the OSI model.
There are two main types of switches, which are L2 and L3 switches:
• L2 switches primarily forward Ethernet frames between connected devices within the same
network segment (LAN). They use MAC addresses to make forwarding decisions and
typically operate within a single broadcast domain.
• L3 switches combine the functions of a traditional L2 switch with routing capabilities found
in routers. They can route packets between different IP subnets within the same network,
providing faster routing performance compared to routers for intra-network
communication.
Controllers:
Cisco DNA Centre is a centralized network management platform designed for managing
enterprise networks. Wireless LAN Controller (WLC) are devices that manage multiple access
points (APs) in a wireless LAN (WLAN) environment. They centralize the configuration and
management of APs, enforce wireless policies, and optimize wireless performance.
Endpoints:
Endpoints refer to devices connected to a network that originate or terminate data
transmissions. Endpoints such as computers, smartphones, printers, and IoT devices generate
and consume data within the network. They communicate with other devices over the
network, accessing resources and services provided by servers and other network components.
Servers:
Servers are powerful computers or software applications that provide services or resources to
clients on a network. Servers host and provide access to files, applications, databases, and
other resources that clients can access. They centralize and manage network resources, user
authentication, and data storage. Servers can perform specialized functions such as web
hosting, email services, database management, and virtualization.
3-Tier Architecture:
A 3-tier architecture expands on the 2-tier model by adding a dedicated layer for handling
communication between the access and core layers. Similar to the 2-tier architecture, Access
Layer connects end devices to the network. Here the Distribution Layer serves as an
intermediary between the access and core layers, managing traffic routing and implementing
policies. Finally, the Core Layer is responsible for high-speed packet switching within the
network. It connects distribution layers of different parts of the network or between different
sites.
Spine-Leaf Architecture:
Spine-leaf is a modern data center network architecture that provides high bandwidth, low
latency, and scalability by using leaf switches that connect to every spine switch in a full-mesh
topology. Spine Switches act as the core layer and connect to all leaf switches. Leaf Switches
connect servers and other devices to the network. Each leaf switch connects to every spine
switch, ensuring multiple paths and redundancy.
Multimode fiber:
▪ Core Size: Larger core (typically 50 or 62.5 microns).
▪ Bandwidth: Lower bandwidth and shorter transmission distances compared to s-m fiber.
▪ Light Source: Typically uses LEDs or VCSELs (Vertical Cavity Surface Emitting Lasers).
▪ Applications: Suitable for shorter distances within buildings or campuses, generally used
for LANs, video surveillance, and backbone cabling.
Copper:
▪ Medium: Uses copper wires.
▪ Bandwidth: Generally lower bandwidth compared to fiber optics.
▪ Distance: Limited distance (up to 100 meters for Ethernet).
▪ Applications: Commonly used for Ethernet networks, telephone lines, and traditional
LAN connections within buildings.
Example: Traditional Ethernet networks using hubs Example: Most modern Ethernet networks are
or early Ethernet switches in a shared configuration. point-to-point connections between switches,
routers, and end devices, providing efficient data
transmission without contention.
Errors:
Errors on network interfaces can indicate problems such as corrupted data packets, frame
errors, or physical layer issues. Check interface error counters (available in network
management tools or by using CLI commands on network devices). Look for CRC errors,
input/output errors, and other error types. Analyse syslog messages or logs from network
devices to identify recurring error patterns that could point to specific issues.
Mismatch Duplex:
Duplex mismatch occurs when two connected devices (e.g., switch and workstation) have
different duplex settings (e.g., one is set to full duplex, the other to half duplex).
Symptoms include performance degradation, packet loss, and intermittent connectivity issues.
To identify duplex mismatches, check the duplex settings configured on each device (usually
visible in network interface settings). Use network diagnostic tools to verify communication and
duplex negotiation between devices.
Mismatch Speed:
Speed mismatches occur when connected devices operate at different transmission speeds
(e.g., one at 100 Mbps and the other at 1 Gbps). This can lead to connectivity issues or network
instability. Check the speed settings configured on each device's network interface. Ensure they
are set to the same speed (e.g., 100 Mbps, 1 Gbps). Use network monitoring tools to confirm
the negotiated speed between connected devices.
Implements flow control and congestion control Does not have built-in mechanisms for flow control
mechanisms to manage the rate of data transmission or congestion control, relying instead on the
and prevent network congestion. application to handle these aspects if needed.
HTTP (web browsing), FTP (file transfer), SMTP DNS (Domain Name System), DHCP (Dynamic Host
(email), SSH (secure shell), Telnet. Configuration Protocol), VoIP (Voice over IP), online
gaming, streaming media (audio, video).
Describe the need for private IPv4 addressing:-
Private IPv4 addressing is necessary primarily due to the limited number of public IPv4 addresses available and
the need to conserve them. Here are the key reasons for using private IPv4 addresses:
2. Cost Efficiency:
o Acquiring and maintaining public IPv4 addresses can be costly. By using private IPv4
addresses internally, organizations can save money and reduce operational expenses.
5. Regulatory Compliance:
o Some regulatory requirements and security policies mandate the use of private IP
addressing to maintain data privacy and security standards within an organization.
Example of Private IPv4 Address Ranges:
The Internet Assigned Numbers Authority (IANA) has reserved the following IPv4 address ranges
specifically for private use (as defined in RFC 1918):
• 10.0.0.0 - 10.255.255.255 (10.0.0.0/8)
• 172.16.0.0 - 172.31.255.255 (172.16.0.0/12)
• 192.168.0.0 - 192.168.255.255 (192.168.0.0/16)
These address ranges are not routed on the public internet and can be freely used within private networks.
In summary, private IPv4 addressing is essential for optimizing the use of public IPv4 addresses,
ensuring network security, reducing costs, and facilitating flexible network design and expansion. It enables
organizations to maintain efficient and secure internal communication without relying solely on public IP
resources.
Compare IPv6 address types:-
Anycast addresses:
o Scope: Represents a group of devices, where a packet sent to an anycast address is
delivered to the nearest device in the group.
o Usage: Often used for load balancing or to provide services from multiple locations in a
network.
Multicast addresses:
o Scope: Represents a group of devices, where packets sent to a multicast address are
delivered to all devices in the group.
o Usage: Efficiently distributes data to multiple recipients simultaneously, commonly used in
multimedia streaming and network protocols.
Each type of IPv6 address serves specific purposes based on the scope and requirements of
communication within and between networks.
Describe Wireless Principles:-
RF (Radio Frequency)
RF refers to the range of electromagnetic frequencies above the audio range and below infrared
light. In the context of wireless communication, RF refers specifically to the frequencies used by
wireless signals to transmit data between devices. Wi-Fi operates in the RF spectrum, typically in
the 2.4 GHz and 5 GHz bands, which are regulated for communication purposes.
Encryption
Encryption in wireless communication refers to the process of encoding data transmitted over a
wireless network to prevent unauthorized access. Wi-Fi networks commonly use encryption
protocols such as WPA2 (Wi-Fi Protected Access 2) or WPA3, which encrypt data and require
authorized devices to have a pre-shared key (password) to access the network. Encryption helps
protect sensitive information from being intercepted or accessed by malicious entities.
Virtualization refers to the creation of a virtual (rather than actual) version of something, such as a server,
operating system, storage device, or network resources. In the case of virtual machines, it involves
creating a virtual environment that behaves like a separate physical computer, complete with its own
virtual CPU (vCPU), memory (RAM), storage, and network interfaces. Components of Virtual
Machines
1. Hypervisor: Also known as a Virtual Machine Monitor (VMM), the hypervisor is software that
enables the creation and management of virtual machines on a physical host machine. It allocates
physical resources such as CPU, memory, and storage to each VM and manages their access to
these resources.
2. Guest Operating Systems: Each virtual machine runs its own guest operating system. These can
be different from the host operating system running on the physical machine. The guest OS
interacts with the virtual hardware provided by the hypervisor as if it were running on a physical
machine.
3. Virtual Hardware: The hypervisor presents virtual hardware components to each VM. These
include virtual CPUs (vCPUs), virtual RAM, virtual disk drives, and virtual network interfaces.
These components are created and managed by the hypervisor and abstracted from the physical
hardware.
Benefits of Virtualization
• Resource Utilization: Virtualization allows for better utilization of physical hardware
resources by running multiple virtual machines simultaneously on a single physical
server. This consolidation can lead to cost savings and improved efficiency.
• Isolation: Each virtual machine operates independently of others, providing a level of
isolation. This isolation enhances security and stability because issues within one VM
are less likely to affect others or the host system.
• Flexibility and Scalability: VMs are flexible and scalable. They can be easily created,
moved, or deleted without affecting other VMs or the physical hardware. This flexibility
supports dynamic allocation of resources based on workload demands.
• Testing and Development: Virtual machines are widely used for software testing and
development. They provide a sandbox environment where developers can test
applications on different operating systems and configurations without needing multiple
physical machines.
Types of Hypervisors:
There are two main types of hypervisors:
Use Cases
Virtualization is used in various scenarios, including:
• Server Consolidation: Running multiple server workloads on a single physical server.
• Desktop Virtualization: Delivering virtual desktops to end-users from centralized
servers.
• Disaster Recovery: Providing failover and recovery capabilities by replicating VMs.
• Cloud Computing: Enabling the infrastructure-as-a-service (IaaS) model where VMs can
be provisioned and managed remotely.
Describe Switching Concepts:-
Frame Switching
Frame switching is the process by which a switch forwards data frames from one port to
another based on the destination MAC address.
• Operation: Upon receiving a frame, the switch examines the destination MAC address in
the frame's header.
• Decision: Using its MAC address table, the switch determines the appropriate outgoing
port (or ports, in the case of VLANs or multicast) through which to forward the frame.
• Efficiency: Frame switching enables the switch to selectively forward frames only to the
intended recipient, reducing unnecessary network traffic compared to hubs, which
broadcast frames to all connected devices.
Frame Flooding
Frame flooding occurs when a switch receives a frame with a destination MAC address that is
not listed in its MAC address table.
• Scenario: If the destination MAC address is unknown to the switch (perhaps because it
hasn't learned it yet or the entry has expired due to aging), the switch will forward the
frame out of all ports except the one from which it was received.
• Purpose: This ensures that the frame reaches its destination if the destination device is
on the network, albeit at the cost of potentially increased network traffic.