CCIE® Practical Studies, Volume I by Karl Solie Publisher: Cisco Press

Total Page:16

File Type:pdf, Size:1020Kb

CCIE® Practical Studies, Volume I by Karl Solie Publisher: Cisco Press " Table of Contents " Index CCIE® Practical Studies, Volume I By Karl Solie Publisher: Cisco Press Pub Date: December 01, 2001 ISBN: 1−58720−002−3 Pages: 1366 Slots: 2 Cisco Certified Internetwork Expert (CCIE) certification is the most difficult and most rewarding of the Cisco(r) certifications. Although the professional and financial benefits of a CCIE are excellent, attaining this level of certification takes years of experience, study, and effort. Serving a dual role of networking reference guide for configuring Cisco routers and preparation tool for the CCIE Lab Exams, CCIE Practical Studies, Volume I, is an ideal resource to help you achieve and earn the coveted CCIE designation. CCIE Practical Studies, Volume I, provides you with the knowledge to assemble and configure all the necessary hardware and software components required to model complex, Cisco−driven internetworks based on the OSI reference model−from Layer 1 on up. Each chapter focuses on one or more specific technologies or protocols and follows up with a battery of CCIE exam−like labs for you to configure that challenges your understanding of the chapter topics and measures your aptitude as a CCIE candidate. The final chapter of the book provides five CCIE "Simulation Labs." These labs not only test your knowledge but your speed as well−a crucial aspect of the new one−day format of the CCIE exam. Among the many resources you will need to study for the CCIE exam, you will find CCIE Practical Studies, Volume I, to be an indispensable preparation tool. " Table of Contents " Index CCIE® Practical Studies, Volume I By Karl Solie Publisher: Cisco Press Pub Date: December 01, 2001 ISBN: 1−58720−002−3 Pages: 1366 Slots: 2 Copyright About the Authors Contributing Authors Acknowledgments Foreword Introduction Goals Who Should Read This Book? How This Book Is Organized Icons Used in This Book Command Syntax Conventions Part I: Modeling the Internetwork Chapter 1. The Key Components for Modeling an Internetwork Identifying the Key Components Needed for Modeling Internetworks The Access Server Modeling Local−Area Networks (LANs) Simulating Wide−Area Network Connections Routers, Cisco IOS Software, and Memory Requirements for Labs Test Hosts and Data Simulation Building the Framework for Internetwork Modeling—Configuring Key Components Practical Study for Chapter 1: Setting Up Lab 1: Password Recovery—Part I Lab 1: Password Recovery—Part II Lab 2: Password Recovery on a Catalyst 5500—Part I Lab 2: Password Recovery on a Catalyst 5500—Part II Lab 3: Upgrading the IOS and Restoring a Configuration from TFTP Server—Part I Lab 3: Upgrading the IOS and Restoring a Configuration from a TFTP Server—Part II Lab 4: Configuring an Access Server—Part I Lab 4: Configuring an Access Server—Part II Lab 5: Configuring a Frame Relay Switch—Part I Lab 5: Configuring a Frame Relay Switch—Part II Lab 6: Configuring Remote Access to the Lab—Part I Lab 6: Configuring Remote Access to the Lab—Part II Part II: Modeling LANs Chapter 2. LAN Protocols: Configuring Catalyst Ethernet and Token Ring Switches Ethernet LANs Ethernet: A Brief History of an Evolutionary Protocol Ethernet Technical Overview 802.1d Spanning−Tree Protocol (STP) Ethernet Switching IEEE 802.5/Token Ring LANs Token Ring: 30 Years Old and Still in Service Token Ring Technical Overview Token Ring Switching Token Ring Bridge Relay Function (TrBRF) and the Token Ring Concentrator Function (TrCRF) Configuring Token Ring Switching on the Catalyst 3920 More Practice: Ethernet/Token Ring Labs Lab 7: Ethernet Switching, VLAN Trunking, and Spanning Tree Root Placement—Part I Lab 7: Ethernet Switching, VLAN Trunking, and Spanning Tree Root Placement—Part II Lab 8: Configuring Token Ring Switching Using the Catalyst 3920—Part I Lab 8: Configuring Token Ring Switching Using the Catalyst 3920—Part II Part III: Connecting LANs with Wide−Area Networks (WANs) Chapter 3. WAN Protocols and Technologies: High−Level Data Link Control (HDLC) The Compatibility and Simplicity of HDLC Lab 9: Configuring HDLC—Part I Lab 9: Configuring HDLC—Part II Chapter 4. WAN Protocols and Technologies: Point−to−Point Protocol (PPP) The Many Uses of PPP Lab 10: Configuring PPP, PAP, and Compression over Asynchronous Dialup—Part I Lab 10: Configuring PPP, PAP, and Compression over Asynchronous Dialup—Part II Lab 11: Configuring PPP, CHAP, and LQM over Synchronous Links—Part I Lab 11: Configuring PPP, CHAP, and LQM over Synchronous Links—Part II Lab 12: Configuring PPP Analog Backup for Synchronous Links—Part I Lab 12: Configuring PPP Analog Backup for Synchronous Links—Part II Chapter 5. WAN Protocols and Technologies: Frame Relay Frame Relay Terminology Frame Relay Technical Overview Configuring Frame Relay The "Big show" and "Big D" for Frame Relay Additional Commands for Configuring Frame Relay Configuring Frame Relay Traffic Shaping Lab 13: Configuring Frame Relay Networks and Controlling Frame Relay ARP—Part I Lab 13: Configuring Frame Relay Networks and Controlling Frame Relay ARP—Part II Lab 14: Configuring Frame Relay Networks, Traffic Shaping, OSPF, & DLSw/LLC2—Part I Lab 14: Configuring Frame Relay Networks, Traffic Shaping, OSPF, & DLSw/LLC2—Part II Chapter 6. WAN Protocols and Technologies: Voice over X Introduction to Analog Telephony Digital Voice Technology Cisco Voice Products Lab 15: Configuring Voice over Frame, Voice over IP, and Voice over ATM Lab 15a: Configuring Voice over Frame Relay—Part I Lab 15a: Configuring Voice over Frame Relay—Part II Lab 15b: Configuring Voice over IP—Part I Lab 15b: Configuring Voice over IP—Part II Lab 15c: Configuring Voice over ATM—Part I Lab 15c: Configuring Voice over ATM—Part II Lab 15d: Optional Private Line Automatic Ring Down (PLAR) Connection Chapter 7. WAN Protocols and Technologies: Integrated Services Digital Network (ISDN) ISDN Development, Components, and Mechanics ISDN Configuration Basics Configuring Dial−on−Demand Routing (DDR) The "Big show" and "Big D" for Troubleshooting ISDN Useful Tips and Tricks ISDN Labs Lab 16: Configuring PPP Authentication, Callback, and Multilink over ISDN Lab 17: Configuring OSPF Demand Circuits over ISDN Summary Chapter 8. WAN Protocols and Technologies: Asynchronous Transfer Mode (ATM) Special Components Needed for ATM Lab Studies Configuring RFC 2684 Configuring RFC 2225 (Classical IP) Lab 18: Configuring PVCs on Cisco 7XXX Routers, RFC 2684—Part I Lab 18: Configuring PVCs on Cisco 7XXX Routers, RFC 2684—Part II Lab 19: Configuring Classical IP Using SVCs on Cisco 7XXX Routers, RFC 2225—Part I Lab 19: Configuring Classical IP Using SVCs on Cisco 7XXX Routers, RFC 2225—Part II Summary Part IV: Routing Protocols Chapter 9. Distance Vector Protocols: Routing Information Protocol Versions 1 and 2 (RIP−1 and RIP−2) Technical Overview of RIP Configuring RIP−1 and RIP−2 Tuning, Redistribution, and Control of RIP Updates RIP Default Routing Lab 20: Integrating RIP Networks: Redistribution, Route Filtering, and Control—Part I Lab 20: Integrating RIP Networks: Redistribution, Route Filtering, and Control—Part II Chapter 10. Distance Vector Protocols: Interior Gateway Routing Protocol (IGRP) Technical Overview of IGRP Configuring IGRP Tuning, Redistribution, and Controlling IGRP Updates Lab 21: Default Routing, Filtering, and Unequal−Cost Load Sharing in IGRP Networks—Part I Lab 21: Default Routing, Filtering, and Unequal−Cost Load Sharing in IGRP Networks—Part II Chapter 11. Hybrid: Enhanced Interior Gateway Routing Protocol (EIGRP) Technical Overview of EIGRP Split Horizon Configuring EIGRP The "Big show" and "Big D" for EIGRP Tuning EIGRP Updates EIGRP Redistribution and Route Control EIGRP Summarization Default Routing with EIGRP EIGRP Stub Routing EIGRP Equal− and Unequal−Cost Load Balancing Lab 22: EIGRP Route Redistribution, Summarization, and Stub Routing—Part I Lab 22: EIGRP Route Redistribution, Summarization, and Stub Routing—Part II Lab 23: Default Routing, Route manipulation, and Filtering in EIGRP Networks—Part I Lab 23: Default Routing, Route Manipulation, and Filtering in EIGRP Networks—Part II Chapter 12. Link−State Protocols: Open Shortest Path First (OSPF) Technical Overview of OSPF Configuring OSPF The "Big show" and "Big D" for OSPF Configuring OSPF Stub Areas Tuning OSPF OSPF Flooding Reduction OSPF Redistribution and Route Control OSPF Summarization OSPF Default Routing OSPF Authentication OSPF Demand Circuits and Backup OSPF Virtual Links Lab 24: OSPF Multiple Area Routing, Authentication, Path Manipulation, Default Routing—Part I Lab 24: OSPF Multiple Area Routing, Authentication, Path Manipulation, Default Routing—Part II Lab 25: OSPF Multiple Area Routing, Route Redistribution and Summarization—Part I Lab 25: OSPF Multiple Area Routing, Route Redistribution and Summarization—Part II Part V: Transporting Non−Routable Protocols Chapter 13. Configuring Bridging and Data Link Switching Plus Transparent Bridging Integrated Routing and Bridging Source Route Bridging (SRB) Data Link Switching Plus (DLSw+) Filtering Traffic in Bridged Environments Lab 26: Transparent Bridging, Remote Source−Route Bridging, LSAP Filtering—Part I Lab 26: Transparent Bridging, Remote Source−Route Bridging, LSAP Filtering—Part II Lab 27: DLSw+ TCP, LLC2, Promiscuous, Dynamic, and Backup Peer Configuration—Part I Lab 27: DLSw+ TCP, LLC2, Promiscuous, Dynamic, and Backup Peer Configuration—Part II Lab 28: DLSw+ Reachability, Border Peers, Demand Peers, and Resilient Peers—Part I Lab 28: DLSw+ Reachability, Border Peers, Demand Peers, and Resilient Peers—Part II Part VI: Controlling Networks and Network Access Chapter 14. Understanding IP Access Lists Understanding How Access Lists Operate Access Lists, Wildcard Masks, and Binary Math Standard IP Access Lists Extended IP Access Lists Displaying Access Lists Dynamic Access Lists Named Access Lists Lab 29: Configuring Access Lists, Named Access Lists, and EIGRP Route Filters—Part I Lab 29: Configuring Access Lists, Named Access Lists, and EIGRP Route Filters—Part II Lab 30: Configuring Dynamic Access Lists and Traffic Filters by Using Named Access Lists—Part I Lab 30: Configuring Dynamic Access Lists and Traffic Filters by Using Named Access Lists—Part II Part VII: Enhanced Network Protocols Chapter 15.
Recommended publications
  • Mod 3 – Networking Media
    Mod 3 – Networking Media CCNA 1 version 3.0 Rick Graziani Cabrillo College Objectives • Discuss the electrical properties of matter. • Define voltage, resistance, impedance, current, and circuits. • Describe the specifications and performances of different types of cable. • Describe coaxial cable and its advantages and disadvantages over other types of cable. • Describe shielded twisted-pair (STP) cable and its uses. • Describe unshielded twisted-pair cable (UTP) and its uses. • Discuss the characteristics of straight-through, crossover, and rollover cables and where each is used. • Explain the basics of fiber-optic cable. • Describe how fibers can guide light for long distances. • Describe multimode and single-mode fiber. • Describe how fiber is installed. • Describe the type of connectors and equipment used with fiber-optic cable. • Explain how fiber is tested to ensure that it will function properly. • Discuss safety issues dealing with fiber-optics. Rick Graziani [email protected] 2 Basic of Electricity • Discuss the electrical properties of matter. • Define voltage, resistance, impedance, current, and circuits. Rick Graziani [email protected] 3 Atoms and electrons • Electrons – Particles with a negative charge that orbit the nucleus • Nucleus – The center part of the atom, composed of protons and neutrons • Protons – Particles with a positive charge • Neutrons – Particles with no charge (neutral) • Electrons stay in orbit, even though the protons attract the electrons. • The electrons have just enough velocity to keep orbiting and not be pulled into the nucleus, just like the moon around the Earth. Rick Graziani [email protected] 4 Atoms and electrons • Loosened electrons that stay in one place, without moving, and with a negative charge, are called static electricity.
    [Show full text]
  • Lab - Building an Ethernet Crossover Cable
    Lab - Building an Ethernet Crossover Cable Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway PC-A NIC 192.168.10.1 255.255.255.0 N/A PC-B NIC 192.168.10.2 255.255.255.0 N/A Objectives Part 1: Analyze Ethernet Cabling Standards and Pinouts Analyze diagrams and tables for the TIA/EIA 568-A standard Ethernet cable. Analyze diagrams and tables for the TIA/EIA 568-B standard Ethernet cable. Part 2: Build an Ethernet Crossover Cable Build and terminate a TIA/EIA 568-A cable end. Build and terminate a TIA/EIA 568-B cable end. Part 3: Test an Ethernet Crossover Cable Test an Ethernet crossover cable with a cable tester. Connect two PCs together using an Ethernet crossover cable. Background / Scenario In this lab, you will build and terminate an Ethernet crossover cable and test it by connecting two PCs together and pinging between them. You will first analyze the Telecommunications Industry Association/Electronic Industries Association (TIA/EIA) 568-A and 568-B standards and how they apply to Ethernet cables. You will then construct an Ethernet crossover cable and test it. Finally, you will use the cable you just constructed to connect two PCs together and test it by pinging between them. Note: With autosensing capabilities available on many devices, such as the Cisco 1941 Integrated Services Router (ISR) switch, you may see straight-through cables connecting like devices. Required Resources One length of cable, either Category 5 or 5e. Cable length should be 0.6 to 0.9m (2 to 3 ft.) 2 RJ-45 connectors RJ-45 crimping tool Wire cutter Wire stripper © 2013 Cisco and/or its affiliates.
    [Show full text]
  • Conet Module 1 Ethernet Based I/O Systems Lecture
    CONET MODULE 1 ETHERNET BASED I/O SYSTEMS LECTURE NOTES Onur Akbatı Levent Ucun Galip Cansever 1 Contents 1. ETHERNET ....................................................................................................................................................................................4 1.1 FOUR BASICS OF ETHERNET ....................................................................................................................................................5 1.1.1. NETWORK CORE : CIRCUIT SWITCHING & PACKET SWITCHING CIRCUIT SWITCHING ................................................................13 1.1.2. OVERVIEW OF DELAY IN PACKET SWITCHED NETWORKS .........................................................................................................17 2. LAYERS ......................................................................................................................................................................................18 2.1. OSI REFERENCE MODEL ........................................................................................................................................................18 2.1.1. SEVEN LAYER ISO-OSI REFERENCE MODEL .........................................................................................................................20 2.1.1.1. APPLICATION LAYER .........................................................................................................................................................20 2.1.1.2. PRESENTATION LAYER ......................................................................................................................................................20
    [Show full text]
  • University of Technology Principles of Computer Engineering And
    University of Technology Biomedical Engineering Department First year 2nd lecture Of Principles of computer engineering and Programming methodology Asst. Lect. Amar A. Mahawish Data Communication & Computer Network Data communications refers to the transmission of data between two or more computers. A computer network is a telecommunications network that allows computers to exchange data. The physical connection between networked computing devices is established using either cable media or wireless media. The best-known computer network is the Internet. 1. Computer Network Types Generally, networks are distinguished based on their geographical span. A network can be as small as distance between your mobile phone and its Bluetooth headphone and as large as the internet itself, covering the whole geographical world. 1) Personal Area Network A Personal Area Network (PAN) is smallest network which is very personal to a user. PAN has connectivity range up to 10 meters. PAN may include wireless computer keyboard and mouse, Bluetooth enabled headphones and wireless printers. 2) Local Area Network Local Access Network (LAN) is a short-distance network. It connects computers that are close together, usually within a room or a building. Very rarely, a LAN network will span a couple of buildings. An example of a LAN network is the network in a school or an office building. A LAN network doesn’t need a router to operate. 3) Wide Area Network Wide Area Network (WAN) cover a huge geographical area. A WAN is a collection of LAN networks. LANs connect to other LANs with the help of a router to create WAN. 2. Computer Network Topologies A Network Topology is the arrangement with which computer systems or network devices are connected to each other.
    [Show full text]
  • 800 MIB Dave Speltz Les Ehrlich S/N Affected Approval: Reviewed By: All Ray Attwell Dave Case
    Number: DSS200201 Issue Date: 12/13/01 Page 1 of 6 SERVICE BULLETIN Model Number: Originator: Reviewed By: Star 800 MIB Dave Speltz Les Ehrlich S/N Affected Approval: Reviewed By: All Ray Attwell Dave Case *** INFORMATION ONLY *** HELPFUL DOCUMENTATION AND FREQUENTLY ASKED QUESTIONS FOR THE STAR 800 MIB A few months ago, the Star 800 MIB was introduced to replace the aging ADC board. To help the field in learning how to install and configure the Star 800, first read the attached “Star 800 Installation Instructions” which is also included with the Star 800 MIB. To learn more about connecting the Star 800 with other Varian device controlled through Ethernet communication, please read the “Installing Ethernet Chromatography Devices”. To answer your most common questions regarding the Star 800 MIB, please read through the FAQs below. Other resources for the Star 800 MIB can also be found at. http://thecreek.csb.varianinc.com/techsupport/index.html From the “search” box, type in “Star 800 MIB” and click on “go”. STAR 800 MIB Frequently Asked Questions What part numbers do I need for full serial control of the 3400 with 2 detectors? 03-907938-11 Star 800 MIB w/serial & 2 ADC channels 03-907938-04* Analog Cable, 3-pin Molex, 3 meter Contains: 1 Cable – 3 pin molex to Star MIB (signal) 1 Cable – P23 (molex) to bare wire (start signal) 1 Cable - P16(molex) to bard wire (ready signal) 03-907938-13 Serial Cable to 3000 series GC, 3 meter Contains: 1 Cable - RJ45 Star 800 serial to 3400/3600 serial 1 Jumper for Serial I/O PWA in 3400/3600 * Order one 03-907938-04 for every detector channel you need.
    [Show full text]
  • Lab - Building an Ethernet Crossover Cable
    Lab - Building an Ethernet Crossover Cable Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway PC-A NIC 192.168.10.1 255.255.255.00 N/A PC-B NIC 192.168.10.2 255.255.255.00 N/A Objectives Part 1: Analyze Ethernet Cabling Standards and Pinouts Analyze diagrams and tables for the TIA/EIA 568-A standard Ethernet cable. Analyze diagrams and tables for the TIA/EIA 568-B standard Ethernet cable. Part 2: Build an Ethernet Crossover Cable Build and terminate a TIA/EIA 568-A cable end. Build and terminate a TIA/EIA 568-B cable end. Part 3: Test an Ethernet Crossover Cable Test an Ethernet crossover cable with a cable tester. Connect two PCs together using an Ethernet crossover cable. Background / Scenario In this lab, you will build and terminate an Ethernet crossover cable and test it by connecting two PCs together and pinging between them. You will first analyze the Telecommunications Industry Association/Electronic Industries Association (TIA/EIA) 568-A and 568-B sttandards and how they apply to Ethernet cables. You will then construct an Ethernet crossover cable and test it. Finally, you will use the cable you just constructed to connect two PCs together and test it by pinging between them. Note: With autosensing capabilities available on many devices, such as the Cisco 1941 Integrated Services Router (ISR) switch, you may see straight-through cables connecting like devices. Required Resources One length of cable, either Category 5 or 5e. Cable length should be 0.6 to 0.9m (2 to 3 ft.) 2 RJ-45 connectors RJ-45 crimping tool Wire cutter Wire stripper © 2013 Cisco and/or its affiliates.
    [Show full text]
  • Define and Describe Networking Cabling Requirements
    Define And Describe Networking Cabling Requirements Is Whittaker narcotizing when Temp convince crassly? Is Maurits cancrizans when Brad embattle commutatively? Appointed Christophe interpenetrating, his altimeter swatting marches annually. From the Computer Technical Tutorials Directory Network Cabling Tutorials. Chapter 3 Cabling and Topology Flashcards Quizlet. By someone of links wires Ethernet cables fibre optics Wi-Fi that retrieve data rapidly. Modern ones plug directly into a mains socket and sock no other connections. Computers and other devices can connect from a network using cables or wirelessly. Called P2P describes an Internet network something which users access each day's hard disks and. Higher frequencies require more twists in his cable pairs and that braid is more expensive Also it. Every computer and network device is connected to obtain cable. Each device server or workstation will contract a unique address 3. Message into devices require an ap and requirements required for describing how is. Exploring the Modern Computer Network Types Cisco Press. Each end nodes connected nodes, designed and wans allows you define a building a variety had different rooms. Who controls the Internet backbone? Ethernet Cat 5 cables have eight wires four pairs but under 10BaseT and 100BaseT. Ethernet Tutorial Part I Networking Basics Lantronix. Because it is artificial intelligence advantage is a ring fails, allowing for describing networks are a star, software is being transmitted from businesses. Following an me-depth network topology definition this mother will. Less cabling is required Cost-efficient to implement Following instead the disadvantages of Bus topology Efficiency is honey when nodes are more. It's ideal for streaming high-definition video cloud computing.
    [Show full text]
  • Transparent Ready 31006929 10/2009
    31006929 10/2009 Transparent Ready User Guide 10/2009 31006929.02 www.schneider-electric.com The information provided in this documentation contains general descriptions and/or technical characteristics of the performance of the products contained herein. This documentation is not intended as a substitute for and is not to be used for determining suitability or reliability of these products for specific user applications. It is the duty of any such user or integrator to perform the appropriate and complete risk analysis, evaluation and testing of the products with respect to the relevant specific application or use thereof. Neither Schneider Electric nor any of its affiliates or subsidiaries shall be responsible or liable for misuse of the information contained herein. If you have any suggestions for improvements or amendments or have found errors in this publication, please notify us. No part of this document may be reproduced in any form or by any means, electronic or mechanical, including photocopying, without express written permission of Schneider Electric. All pertinent state, regional, and local safety regulations must be observed when installing and using this product. For reasons of safety and to help ensure compliance with documented system data, only the manufacturer should perform repairs to components. When devices are used for applications with technical safety requirements, the relevant instructions must be followed. Failure to use Schneider Electric software or approved software with our hardware products may result in injury, harm, or improper operating results. Failure to observe this information can result in injury or equipment damage. © 2009 Schneider Electric. All rights reserved. 2 31006929 10/2009 Table of Contents Safety Information .
    [Show full text]
  • Ethernet - Wikipedia, the Free Encyclopedia Página 1 De 12
    Ethernet - Wikipedia, the free encyclopedia Página 1 de 12 Ethernet From Wikipedia, the free encyclopedia The five-layer TCP/IP model Ethernet is a family of frame-based computer 5. Application layer networking technologies for local area networks (LANs). The name comes from the physical concept of DHCP · DNS · FTP · Gopher · HTTP · the ether. It defines a number of wiring and signaling IMAP4 · IRC · NNTP · XMPP · POP3 · standards for the physical layer, through means of SIP · SMTP · SNMP · SSH · TELNET · network access at the Media Access Control RPC · RTCP · RTSP · TLS · SDP · (MAC)/Data Link Layer, and a common addressing SOAP · GTP · STUN · NTP · (more) format. 4. Transport layer Ethernet is standardized as IEEE 802.3. The TCP · UDP · DCCP · SCTP · RTP · combination of the twisted pair versions of Ethernet for RSVP · IGMP · (more) connecting end systems to the network, along with the 3. Network/Internet layer fiber optic versions for site backbones, is the most IP (IPv4 · IPv6) · OSPF · IS-IS · BGP · widespread wired LAN technology. It has been in use IPsec · ARP · RARP · RIP · ICMP · from the 1990s to the present, largely replacing ICMPv6 · (more) competing LAN standards such as token ring, FDDI, 2. Data link layer and ARCNET. In recent years, Wi-Fi, the wireless LAN 802.11 · 802.16 · Wi-Fi · WiMAX · standardized by IEEE 802.11, is prevalent in home and ATM · DTM · Token ring · Ethernet · small office networks and augmenting Ethernet in FDDI · Frame Relay · GPRS · EVDO · larger installations. HSPA · HDLC · PPP · PPTP · L2TP · ISDN
    [Show full text]
  • Installation Guide Smartbits 600X/6000X October 2004
    Full-service, independent repair center -~ ARTISAN® with experienced engineers and technicians on staff. TECHNOLOGY GROUP ~I We buy your excess, underutilized, and idle equipment along with credit for buybacks and trade-ins. Custom engineering Your definitive source so your equipment works exactly as you specify. for quality pre-owned • Critical and expedited services • Leasing / Rentals/ Demos equipment. • In stock/ Ready-to-ship • !TAR-certified secure asset solutions Expert team I Trust guarantee I 100% satisfaction Artisan Technology Group (217) 352-9330 | [email protected] | artisantg.com All trademarks, brand names, and brands appearing herein are the property o f their respective owners. Find the Spirent / NetCom 620-0019-001 at our website: Click HERE Installation Guide SmartBits 600x/6000x October 2004 P/N 340-1309-001 REV B Artisan Technology Group - Quality Instrumentation ... Guaranteed | (888) 88-SOURCE | www.artisantg.com Spirent Communications, Inc. 26750 Agoura Road Calabasas, CA 91302 USA Support Contacts E-mail: [email protected] Web: http://support.spirentcom.com Toll Free: 1-800-SPIRENT (1-800-774-7368) Phone: + 1 818-676-2300 Fax: +1 818-880-9154 Copyright © 2004 Spirent Communications, Inc. All Rights Reserved. All of the company names and/or brand names and/or product names referred to in this document, in particular, the name “Spirent” and its logo device, are either registered trademarks or trademarks of Spirent plc and its subsidiaries, pending registration in accordance with relevant national laws. All other registered trademarks or trademarks are the property of their respective owners. The information contained in this document is subject to change without notice and does not represent a commitment on the part of Spirent Communications.
    [Show full text]
  • CS435-Lecture07 2020
    CS-435 Network Technology & Programming Laboratory spring semester 2020 University of Crete Computer Science Department Stefanos Papadakis CS-435 Lecture #7 preview • Ethernet physical media • Structured Cabling • Installations <CS-435> Network Technology and Programming Laboratory CSD.UoC Stefanos Papadakis spring 2020 Ethernet • Ethernet: the first drawing <CS-435> Network Technology and Programming Laboratory CSD.UoC Stefanos Papadakis spring 2020 Ethernet: major milestones IEEE year TIA data rate medium 802.3a 1985 10BASE2 10Mbps COAX 802.3i 1990 10BASE-T 10Mbps UTP 802.3u 1995 100BASE-TX 100Mbps UTP 802.3z 1998 1000BASE-X 1Gbps FIBER 802.3ab 1999 1000BASE-T 1Gbps UTP 802.3ae 2003 10GBASE-SR 10Gbps FIBER 802.3an 2006 10GBASE-T 10Gbps UTP <CS-435> Network Technology and Programming Laboratory CSD.UoC Stefanos Papadakis spring 2020 Ethernet: the early years <CS-435> Network Technology and Programming Laboratory CSD.UoC Stefanos Papadakis spring 2020 Twisted Pair Cables Types old name new name cable screening pair shielding UTP U/UTP - - FTP F/UTP foil - STP U/FTP - foil S-FTP SF/UTP foil + braiding - S-STP S/FTP braiding foil <CS-435> Network Technology and Programming Laboratory CSD.UoC Stefanos Papadakis spring 2020 Twisted Pair Cables U/UTP F/UTP SF/UTP S/FTP <CS-435> Network Technology and Programming Laboratory CSD.UoC Stefanos Papadakis spring 2020 Twisted Pair Cables F/UTP U/UTP S/FTP <CS-435> Network Technology and Programming Laboratory CSD.UoC Stefanos Papadakis spring 2020 Twisted Pair Cables Categories • CAT5: 100MHz (up
    [Show full text]
  • Notes-Cn-Unit-1
    1 UNIT – 1 INTRODUCTION OF NETWORKS Unit-01/Lecture-01 Introduction & Definition[RGPV/Dec 2010/ Jun 2014] A network is a set of devices (often referred to as nodes) connected by communication links. A node can be a computer, printer, or any other device capable of sending and/or receiving data generated by other nodes on the network. FIGURE 1.1: NETWORK Network Criteria A network must be able to meet a certain number of criteria. The most important of these are performance, reliability, and security. Performance Performance can be measured in many ways, including transit time and response time. Transit time is the amount of time required for a message to travel from one device to another. Response time is the elapsed time between an inquiry and a response. The performance of a network depends on a number of factors, including the number of users, the type of transmission medium, the capabilities of the connected hardware, and the efficiency of the software. Performance is often evaluated by two networking metrics: throughput and delay. We often need more throughput and less delay. If we try to send more data to the network, we may increase throughput but we increase the delay because of traffic congestion in the network. Reliability In addition to accuracy of delivery, network reliability is measured by the frequency of failure, the time it takes a link to recover from a failure, and the network's robustness in a catastrophe. Security Network security issues include protecting data from unauthorized access, protecting data from damage and development, and implementing policies and procedures for recovery from breaches and data losses.
    [Show full text]