Skip to main content

Cisco Certified Network Associate

To day we tell ,CCNA( Course of  Certified Network Associate).by Cisco, and 18-Networking-Solutions Provide information form CCNA Site,Some experts, and Some networking institute



1)      Introduction

2)      OSI (Open System Interconnection) Reference Model

3)      Network Devices
           
·         Types of Communication
·         Cards
·         LAN & WAN Concept

4)      IP Addressing & Concepts

·         IPv4 
·         IPv6  
·         Subneting
·         Superneting
·         Variable Length Subnet Scheme (VLSM)
·         And Operation

5)      C.D.P

6)      IOS Boot up Sequence

·         IOS
·         Upgrading
·         Dual (Booting)

7)      IP Routing

·         Static Route
·         RIP (Routing Information Protocol)
·         IGRP (Internet Gateway Routing Protocol)
·         EIGRP (Enhance Internet Gateway Routing Protocol)
·         OSPF (Open Shortest Path First)

8)      Switching

·         VLAN (Virtual Local Area Network)
·         STP (Spanning Tree Protocol)

9)      ACL (Access Control List)

10)    WAN (Wide Area Network) Router as a Switch

11)    Frame Relay

12)    NAT & PAT   Private & Public

13)    WLAN (Wireless Local Area Network)

14)    VOIP (Voice Over Internet Protocol)

15)    Cabling



 Introduction-
(Cisco Certified Network Associate)

Cisco is company of network,and many company are list like .  there are many companies i.e. Cisco, Motorola, Simons, Microsoft, but configurations are same. Cisco has 87% shares on infrastructure of IP. It is said that if you send any small information on Internet, this is impossible that this information do not pass through the Cisco Devices.


Certified
            
 




  1. Connectivity
  2. Communication



  Associate
 this is level in this line.Associate is the first level
 Network
Our whole lab is aroud the one word i.e. "network".
 " Connectivity of two or more than two devices.so that you can communication with each other,you can exchange the sources or share the information is called networking" it has two parts:

1.Connectivity 
2. Communication


Medium may any (copper, wire and wave) for the connectivity and communication. Connectivity is due to the Hardware and communication is due to the Software.



Example

There is a telephone line connected to your home telephone set from PTCL exchange. Is this a network? No, because there is only connectivity but not communication. If an other person talks with you, it is communication. Here the both parts fulfil the definition. Now, you can say the “Network”.                                                                                                                           







Avoid Wrong Concept

If you use the modem in between the telephone exchange and your computer, then modem converts the analog signals into digital to analog signals, this concept is wrong.            



Modem

The basic purpose of modem is modulation and demodulation. 


Modulation & Demodulation

Example
           
If you take a page and throw away with full capacity then this page (Information) will not travel more. But if you use a stone covered by paper (Information) then this paper will covered long distance with high speed. When this paper reached to other side, unwanted information (Stone) is removed to get information (Paper).
Insertion of carrier (Stone) into information for covering long distance is called “Modulation”. And distraction of carrier unwanted information is called “Demodulation







Comments

Popular posts from this blog

Information Security Interview Questions & Answers

The number of Information Security related jobs are growing extensively…. There is a huge requirement for skilled InfoSec professionals across the globe.. the jobs positions are available for freshers, experienced guys and top management (typically CISO .HCL,BPLetc)… This post is my attempt to collect typical InfoSec interview question and answers to help those looking out opportunities in this field… I’ll keep on updating the questions regularly.. You can also share/contribute any questions you might have faced during your InfoSec interviews…. Category I: General Security Concepts / Network Security / OS Security 1) Is there any difference between Information Security and IT Security? If yes, please explain the difference. Ans- Yes. Information Security and IT Security are both different terms often used interchangeably. IT Security focuses on purely technical controls (like implementing antivirus, firewall, hardening systems etc) while Information Security is more wider ter...

8 pair usage for data in Cat 6 Wire in Networking

Today I Post the Cat6 wire pair use in Networking ,we all know 8 pair in cat 6 and but no idea how any pair use in Networking .only 4 pair Use in networking , Like this Photo, If 4 pair not work in cat6 wire we use another 4 Pair same wire Save time and Money 

MCSE INTERVIEW QUESTIONS AND ANSWER

MCSE INTERVIEW QUESTIONS AND ANSWER ,VERY USEFULL OUR NEXT JOB INTERVIEW MCSE Questions and Answers: :  1 :: What is the use of IGMP protocol?  Internet Group Management Protocol: - It allows internet hosts to participate in multicasting. The IGMP messages are used to learn which hosts is part of which multicast groups. The mechanism also allow a host to inform its local router, that it wants to receive messages.  2 :: What are Ping and Tracert?  Ping and tracert are the commands used to send information to some remote computers to receive some information. Information is sent and received by packets. Ping I particularly used to check if the system is in network or not. It also gives packet lost information. In windows ping command is written as ping ip_address Tracert is called as trace route. It is used to track or trace the path the packet takes from the computer where the command is given until the destination. In windows ping command is written as trac...