0% found this document useful (0 votes)
14 views8 pages

CCNA Short Notes

The document provides a comprehensive overview of network fundamentals, including components like routers, switches, and access points, as well as network topologies and cabling. It covers IP connectivity concepts such as routing, OSPF, and IP services like DHCP and NAT, along with security fundamentals including VPNs and layer 2 security features. Additionally, it discusses network automation, controller-based networking, and configuration management tools, emphasizing the importance of efficiency and scalability in modern network management.

Uploaded by

s0825689
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views8 pages

CCNA Short Notes

The document provides a comprehensive overview of network fundamentals, including components like routers, switches, and access points, as well as network topologies and cabling. It covers IP connectivity concepts such as routing, OSPF, and IP services like DHCP and NAT, along with security fundamentals including VPNs and layer 2 security features. Additionally, it discusses network automation, controller-based networking, and configuration management tools, emphasizing the importance of efficiency and scalability in modern network management.

Uploaded by

s0825689
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Module 1: Network Fundamentals

1. Network Components

• Devices

• Router: Connects different networks together. Works at Layer 3 (Network layer) of


the OSI model.

• Switch: Connects devices within a local network. Works at Layer 2 (Data Link layer).

• PC & Servers: End devices in a network.

• Access Point: Provides wireless connectivity.

• Network Topology Architectures

• Star: Central node (usually a switch or hub) to which all nodes are connected.

• Mesh: Devices are interconnected. Every device is connected to every other device.

• Hybrid: Combination of two or more topologies.

• OSI & TCP/IP models

• OSI: 7 layers - Physical, Data Link, Network, Transport, Session, Presentation, and
Application.

• TCP/IP: 4 layers - Network Access, Internet, Transport, and Application.

2. Network Topologies

• Physical vs. Logical Topology

• Physical: Actual layout of the network devices and cables.

• Logical: How devices appear connected from data flow perspective.

• Common Types

• Bus: Single central cable (the bus) to which all network devices are connected.

• Ring: Each device is connected to two other devices, forming a ring.

• Star: Most common; devices are connected to a central device.

• Mesh: Devices are interconnected; common in WANs.

3. Cabling & Interfaces

• Ethernet Cables

• UTP (Unshielded Twisted Pair): Commonly used; susceptible to electromagnetic


interference.

• STP (Shielded Twisted Pair): Has shielding to reduce interference.

• Crossover: Connects like devices without a switch or hub.

• Straight-through: Connects unlike devices (e.g., PC to switch).


• Cable Types

• Cat5: Supports up to 100 Mbps.

• Cat5e: Supports up to 1 Gbps.

• Cat6: Supports up to 10 Gbps for shorter distances.

• Connector Types

• RJ-45: Commonly used for Ethernet connections.

• RJ-11: Commonly used for phone lines.

4. IPv4 & IPv6 Addresses

• Binary Conversion: IPs are binary numbers, but usually represented in decimal for IPv4 or
hexadecimal for IPv6 for readability.

• Subnetting Principles: Breaking a larger network into smaller sub-networks.

• Enhances performance and security.

• Address Types

• Unicast: One-to-one communication.

• Broadcast: One-to-all communication.

• Multicast: One-to-many communication.

Module 2: Network Access


1. VLANs & Interswitch Connectivity

• VLAN (Virtual Local Area Network)

• Definition: A logically segmented network within a physical network. Devices in the


same VLAN can communicate as if they're on the same physical network, even if
they're not.

• Benefits:

• Security: Limits broadcast domains and confines network issues.

• Cost savings: Reduces the need for physical networks.

• Performance: Lessens broadcast traffic within subnets.

• Configuration: Configured via switch management, using commands such as


switchport access vlan X where X is the VLAN number.

• Trunking

• Purpose: Allows multiple VLANs to travel over a single link, maintaining VLAN
information.
• 802.1Q: Standard protocol for trunking. Inserts a tag into the frame header to
identify the VLAN.

• Native VLAN: The VLAN associated with all untagged traffic on a trunk. If a device
doesn't tag a frame, it belongs to the native VLAN. Important for security
considerations.

2. Spanning Tree Protocol (STP)

• Purpose: Prevents network loops in Ethernet networks.

• Operation:

• Root Bridge Election: The switch with the lowest bridge ID (Priority + MAC Address)
becomes the root.

• Path Selection: Switches determine the shortest path to the root bridge.

• Blocking: All non-shortest paths are placed in a blocking state to prevent loops.

• STP Types:

• PVST+ (Per VLAN Spanning Tree Plus): Cisco's version; runs an STP instance for each
VLAN.

• RSTP (Rapid Spanning Tree Protocol): Faster convergence than classic STP.

3. EtherChannel

• Definition: Combines multiple physical links between switches into a single logical link.

• Benefits:

• Redundancy: If one link fails, traffic is automatically moved to the remaining links.

• Increased Bandwidth: Allows combined bandwidth of the bundled links.

• Protocols:

• PAgP (Port Aggregation Protocol): Cisco proprietary.

• LACP (Link Aggregation Control Protocol): IEEE standard and can be used with non-
Cisco devices.

• Configuration: Commands such as channel-group 1 mode desirable (for PAgP) or channel-


group 1 mode active (for LACP) on interfaces intended for bundling.

Module 3: IP Connectivity
1. Introduction to Routers & Routing

• Router Functions:

• Determines the best path for data to travel.

• Directs packets between different networks.

• Operates at OSI Layer 3 (Network Layer).


• Routing Table:

• Lists all known networks and how to reach them.

• Contains both directly connected and remote networks.

• Entries can be static (manually entered) or dynamic (learned through routing


protocols).

• Static vs. Dynamic Routing:

• Static: Manually defined routes, typically used for specific routing needs or smaller
networks.

• Dynamic: Uses protocols like OSPF, EIGRP, and BGP to automatically discover and
adapt to network changes.

2. OSPF (Open Shortest Path First)

• Type: Link-state routing protocol.

• Characteristics:

• Uses Dijkstra’s SPF algorithm to find the shortest path.

• Hierarchical design using areas, with Area 0 (zero) as the backbone.

• Sends "Hello" packets to discover neighbors and establish adjacencies.

• LSA (Link-State Advertisement):

• Various types, like Type 1 (Router LSA) describing interfaces and links.

• OSPF Versions:

• OSPFv2: IPv4.

• OSPFv3: IPv6.

3. IP Services

• DHCP (Dynamic Host Configuration Protocol):

• Assigns IP addresses dynamically to devices.

• Components include IP pool, lease time, and DHCP relay for crossing networks.

• Uses a 4-step process: Discover, Offer, Request, Acknowledge.

• NTP (Network Time Protocol):

• Keeps accurate time synchronization among devices.

• Uses a hierarchy of servers with stratum levels indicating the distance from the
reference clock source.
Module 4: IP Services

1. Network Address Translation (NAT)

• Purpose: Allows private IP addresses to be translated to public IP addresses for Internet


routing.

• Types:

• Static NAT: A 1-to-1 mapping from a private IP address to a public IP address.

• Dynamic NAT: Uses a pool of public IP addresses and assigns them on a first-come,
first-served basis.

• PAT (Port Address Translation) / NAT Overload: Translates multiple private IP


addresses to a single public IP address using unique source port numbers.

• Benefits:

• Conserves global IP addresses.

• Increases flexibility when switching to a different ISP.

• Provides a type of security by hiding internal network structure.

2. Quality of Service (QoS)

• Definition: Mechanisms to prioritize traffic and ensure data flow for certain applications or
types of traffic.

• Components & Techniques:

• Classification: Identifying and marking traffic.

• Policing and Shaping: Managing traffic profiles.

• Congestion Management: Using queues to manage traffic during congestion.

• Congestion Avoidance: Dropping packets to avoid potential future congestion (e.g.,


using algorithms like Random Early Detection - RED).

3. SNMP (Simple Network Management Protocol) & Syslog

• SNMP:

• Purpose: To monitor and manage network devices, and to keep track of device
behaviors.

• Components: SNMP manager, agent, and MIB (Management Information Base).

• Operations: GET (retrieve value), SET (configure value), and TRAP (unsolicited alerts).

• Security Levels: v1 (no security), v2c (community string as a form of security), and v3
(authentication and encryption for security).
• Syslog:

• Purpose: A standardized message logging system. Network devices use Syslog to


send event notification messages.

• Levels: Ranges from 0 (Emergency) to 7 (Debugging).

• Components: Syslog server (where logs are sent) and clients (devices sending logs).

Module 5: Security Fundamentals


1. Security Policies & Procedures

• Importance:

• Establishes rules and guidelines for accessing and using IT resources.

• Offers a framework for securing data and infrastructure.

• Best Practices:

• Regularly Review and Update: Security threats evolve; so should policies.

• Train Employees: Everyone is a potential security risk; education reduces that risk.

• Enforce Policies: Having a policy is pointless if it's not enforced.

• Least Privilege Principle: Give only necessary access rights or permissions to perform
a function.

2. VPNs (Virtual Private Networks)

• Definition: Allows secure private network traffic over public networks like the internet.

• Types:

• Site-to-Site: Connects entire networks to each other (e.g., connecting two branch
offices).

• Remote Access: Connects individual users to a network.

• Protocols/Technologies:

• IPSec: Secures IP communications, can operate in transport mode or tunnel mode.

• SSL/TLS: Used primarily for web-based VPNs.

• L2TP (Layer 2 Tunneling Protocol) & PPTP (Point-to-Point Tunneling Protocol): Older
tunneling protocols, sometimes used in combination with IPSec.

3. Layer 2 Security Features

• Port Security:

• Restricts input on a switch port based on MAC addresses to secure network access.

• Limits the number of valid MAC addresses allowed on a port.


• DHCP Snooping:

• Prevents malicious or misconfigured devices from acting as DHCP servers.

• Differentiates between trusted and untrusted sources.

• Dynamic ARP Inspection (DAI):

• Ensures ARP (Address Resolution Protocol) requests and replies are valid. It prevents
ARP spoofing attacks.

• VLAN Security:

• Use dedicated VLANs for special functions (e.g., a VLAN just for management).

• Avoid using VLAN 1.

• Use VLAN Access Control Lists to filter traffic within a VLAN.

Module 6: Automation & Programmability


1. Network Automation Benefits

• Efficiency: Reduces repetitive tasks, speeding up deployments.

• Scalability: Facilitates operations in large-scale environments.

• Accuracy: Minimizes human errors, ensuring consistent configurations.

• Rapid Response: Quicker changes and adjustments to network configurations or policies.

2. Controller-based Networking

• Software-Defined Networking (SDN):

• Centralized Control Plane: Provides a centralized view of the entire network,


decoupling it from the forwarding/data plane.

• Programmability: Facilitates automated network configurations and operations.

• Flexibility: Allows for quick adjustments to network conditions and requirements.

• Controllers: Central devices that have a complete view of the network and instruct network
devices on how to handle network traffic.

3. JSON (JavaScript Object Notation)

• Data Serialization Language: Used for configuration and data exchange between a server
and a client, or between network devices.

• Structure:

• Objects: Collections of key/value pairs, enclosed in curly braces {}.

• Arrays: Ordered lists of values, enclosed in square brackets [].


• Benefits: Lightweight, easy-to-read, and is language agnostic.

4. REST-based APIs (Application Programming Interfaces)

• Definition: Allows different software applications to communicate with each other using
standard HTTP methods (GET, POST, PUT, DELETE).

• RESTful Principles:

• Stateless Operations: Each request from a client contains all the information needed
by the server.

• Client-Server Architecture: Ensures separation between user interface and data


storage.

• Cacheability: Responses can be cached to improve speed and reduce server load.

• Use in Networking: Allows for automated and programmable configurations, monitoring,


and operations on network devices.

5. Configuration Management Tools

• Ansible:

• Agentless: Doesn't require an agent on the managed node.

• Playbooks: Written in YAML, defines configurations and operations.

• Puppet & Chef:

• Agent-Based: Requires agent software on the managed nodes.

• Modules/Cookbooks: Pre-written configurations that can be used to ensure device


states.

• Version Control (e.g., Git):

• Allows tracking changes, reverting configurations, and collaborative work on network


configurations.

You might also like