Network Fundamentals

Networking Devices Used in CCNA: 

Names of devices use in CCNA Description
Routers

A router is a network device that forwards data packets between computer networks. A router receives a packet from an input port, checks its header, performs  basic functions such as checksum checking, looks up the appropriate output port’s routing table, drops the packet, and so on. Forward the packet to the output port.

switches

A switch is a network device used to divide a network into different subnets called subnets or LAN segments. Filters and forwards packets between LAN segments based on MAC address. A switch establishes a temporary connection between a source and destination for communication and terminates the connection when the conversation ends. It also provides full bandwidth for network traffic going to and from devices at the same time, reducing collisions.

Firewalls

A firewall is a hardware or software-based network security device that monitors all incoming and outgoing traffic and accepts, denies, or drops specific traffic based on a defined set of security rules.

IPS

Intrusion prevention systems are also known as intrusion detection and prevention systems. This is a network security application that monitors network or system activity for malicious activity. The main function of an intrusion prevention system is to identify malicious activity, collect and report information about that activity,  and attempt to block or stop it.

Access points

This is a network device that allows your device to connect to a wired network.  Access points are used to build WLANs (Wireless Local Area Networks). It is commonly used in large offices and buildings with growing businesses.

Controllers

the network controller is a centralized programmable automation point that enables you to manage, configure, monitor, and troubleshoot your virtual network infrastructure, in addition to manually configuring network devices. An extensible server role that provides Run the service. It acts as an interface between your store and your network infrastructure.

Endpoints

Endpoint Security Control is a software technology that facilitates the recognition and operation of personal laptops to gain access to the corporate community. This allows community admins to restrict positive websites to specific customers, thus adhering to their organization’s rules and requirements regarding the additive in question. Endpoint security control structures include digital private VPN clients, operating systems, and up-to-date antivirus software.

Servers

Servers are computers dedicated to a specific purpose, and unlike desktop computers, these computers are built to be durable, long-lived, and long-running compared to desktop PCs.

Network Topology Architectures:

Characteristics of network topology Description
LAN

LAN stands for Local Area Network. This is a computer network that covers a relatively small area. B. Inside a building or campus up to several kilometers in size.

MAN

MAN stands for Metropolitan Area Network. It is a computer network that connects many LANs into a larger network so that computer resources can be shared. This type of network covers a larger area than a LAN but is smaller than a WAN  designed to span an entire city.

WAN

WAN stands for Wide Area Network. It is a computer network consisting of two or more LANs or MANs covering a large geographical area.

Spine-leaf

A spine-leaf architecture is a data center network topology that consists of two switching layers: spine and leaf.

Small office/home office (SOHO)

SOHO stands for Small Office/Home Office Network. Today, many aspiring entrepreneurs and small business owners prefer to work from home or maintain a small office.

Cloud storage

Cloud storage simply stores data over the internet on cloud-based servers. Once your data is stored in the cloud, you can access it anywhere over the internet from multiple devices.

Physical Interface and Cabling Types:

Interfaces and cabling Description
Single-mode fiber cable

SMF (Single-Mode Fibers) are fiber cables designed to carry only single-mode light, which is the transverse mode. They are used for long-distance transmission of signals.

multi-mode fiber cable

Multimode fiber optic cable is a type of fiber optic cable that transmits data through a larger diameter core, allowing the average single-mode transceiver to carry multiple modes of light.

copper wire

Copper cables use electrical signals to transmit data between networks. There are three types of copper cable: coaxial cable, unshielded twisted pair, and shielded twisted pair. Coax degrades over long distances

Ethernet

Ethernet is the most widely used LAN technology defined by the IEEE 802.3 standard. The reason for its wide applicability is that Ethernet is easy to understand, easy to implement and maintain, and enables inexpensive network implementation. Additionally, Ethernet offers flexibility in terms of allowed topologies.

PoE

Power Over Ethernet (POE) is a technique used for building wired Ethernet local area networks (LANs) which use Ethernet data cables instead of normal electrical power cords and wiring to carry the electrical current required to operate each device.

CCNA Cheatsheet

A CCNA certification proves you have the competencies needed to navigate an ever-changing IT landscape. CCNA exams cover network fundamentals, IP services, security fundamentals, automation, and programmability. Designed for agility and versatility, CCNA proves you have the skills needed to manage and optimize today’s most advanced networks. CCNA training courses and exams are the foundation for advancing your career in any direction. A Cisco certification is living proof of the standards and rigor your organization recognizes and trusts to meet and exceed market demands. Here is a cheat sheet for CCNA Examination.

Similar Reads

Network Fundamentals:

Networking Devices Used in CCNA:...

IP Addressing:

Classes of IP Addresses:...

Port Security:

Switches learn MAC addresses as frames are forwarded through switch ports. Port security allows you to limit the number of MAC addresses that can be learned on a port, configure static MAC addresses, and set penalties if that port is used by unauthorized users. Users can restrict, shutdown, or protect port security commands....

Configure VLANs:

Virtual LAN (VLAN) is a concept that allows devices to be logically partitioned at layer 2 (data link layer). Layer 3 devices typically share a broadcast domain, but the concept of VLANs can be used to divide the broadcast domain with switches....

STP (Spanning Tree Protocol):

Spanning Tree Protocol (STP) prevents frame loops by putting interfaces on a switch into a forwarding or blocking states....

Configure a Serial:

The speed of the Layer 1 connection is determined by the CSU/DSU. DTE (Data Terminal Equipment)  and DCE (Data Communications Equipment) cables are used in labs without an external CSU/DSU....