CCDA 640-864

CCDA 640-864 Summary Notes – Chapter 6 – Day 13

Posted on Updated on


Exam Topic 1: Wide-area networks (WAN) Overview

WAN – communication networks that are used to connect network locations that are geographically separated.

Tarrif – a fee charged by a service provider for providing WAN services to customers.

Service – WAN communications provided by service providers or telecommunication carriers Read the rest of this entry »

Advertisements

CCDA 640-864 Summary Notes – Chapter 5 – Day 12

Posted on Updated on


Exam Topic 3: Wireless LAN Design

Controller Redundancy Design:

  • Deterministic
  • Dynamic

Deterministic Controller Redundancy

  • Ap is configured with
    • Primary Controller
    • Secondary controller
    • Tertiary controller
  • DisAdvantages
    • More planning required
    • More configuration
  • Advantages
    • Better predictability
    • Faster failover times
    • Network stability
    • Flexible and powerful redundancy design options
    • Fallback incase of failover
  • Recommended best practice
  • Examples:
    • N+1
    • N+N
    • N+N+1

Read the rest of this entry »

CCDA 640-864 Summary Notes – Chapter 5 – Day 11

Posted on Updated on


Exam Topic 2 – Part 2: Cisco Unified Wireless Network (UWN) Architecture

LWAPP Discovery of WLC

LWAPP Image procedure:

Untitled Read the rest of this entry »

CCDA 640-864 Summary Notes – Chapter 5 – Day 10

Posted on Updated on


Exam Topic 2 – Part 1: Cisco Unified Wireless Network (UWN) Architecture

Benefits:

  • Deliivers scalable, manageable and secure WLANs
  • Combines wired and wireless network
  • Reduced Total Cost of Ownership (TCO)
  • Enhanced visibility and control
  • Dynamic RF management
  • WLAN Security
  • Mobility
  • Enhanced productivity and collaboration

Read the rest of this entry »

CCDA 640-864 Summary Notes – Chapter 5 – Day 9

Posted on Updated on


Cisco Unified Wireless Network (UWN) architecture – combines wireless and wired network.

Exam Topic 1: Wireless LAN Technologies

WLAN Standards

IEEE 802.11 (Legacy) (1997)

  • Speeds of 1 (typical) and 2 (max)  Mbps
  • Used direct sequence spread spectrum (DSSS) and frequency-hopping spread spectrum (FHSS) in L1 
    • DSSS divides data into separate sections; each section travels over different frequencies at the same time
    • FHSS sends data in bursts and uses a frequency-hopping sequence  – first frequency 1 then 2 , eventually back to 1.
  • Wireless Fidelity (WiFi) is the interoperability certification for 802.11 and is governed by Wireless Ethernet Compatibility Alliance (WECA)
  • Uses ISM Frequency

Read the rest of this entry »

CCDA 640-864 Summary Notes – Chapter 4 – Day 8

Posted on Updated on


Exam Topic 4: Virtualization Overview

Virtualization technologies abstract logical elements from hardware (applications or operating systems) or networks (LANs and SANs) and run them in a virtual state

  • Allow a physical device to share its resources by acting as multiple versions of itself
  • Allow multiple physical devices to logically appear as one

Read the rest of this entry »

CCDA 640-864 Summary Notes – Chapter 4 – Day 7

Posted on Updated on


Data Center Design

Exam Topic 1: Enterprise DC Architectures

Data Center 1.0

  • Centralized
  • Used mainframes to process and store data
  • Users used terminals to access and work on mainframes
  • benefits: availability, resiliency, and service level agreements (SLA)

Read the rest of this entry »

CCDA 640-864 Summary Notes – Chapter 3 – Day 6

Posted on Updated on


Server Connectivity Options

  • Single NIC (FE GE Full duplex + No redundancy)
  • Dual NIC Etherchannel – redundancy
  • Dual NIC to separate access – redundancy
  • Content switching – redundancy + load balancing per user request

Read the rest of this entry »

CCDA 640-864 Summary Notes – Day 5

Posted on Updated on


LAN Hardware

Repeaters

  • Layer 1 device
  • Connects separate segments
  • Do not control broadcasts or collision domains
  • Forward frames out all other interfaces
  • Protocol transparent
  • understands bits
  • Amplify the signals
  • 5-4-3 Rule:

    The maximum path between two stations on the network should not be more than five segments, with four repeaters between those segments, and no more than three populated segments.

  • The round-trip propagation delay in one collision domain must not exceed 512-bit times.

Read the rest of this entry »

CCDA 640-864 Summary Notes – Day 4

Posted on Updated on


IEEE 802.3-2002 (Ethernet Standards) Design Rules

Round trip propagation delay should be less than 512-bit times in one collision domain. Max for 10 Mbps – 51.2 microseconds. Max for 100 Mbps – 5.12 microseconds

  • 10 Base 5

No longer used

Max segment = 500 m

Max collision domain = 2500m of 5 segments

Has a maximum diameter of 2500 m when repeaters ae used

  • 10 Base 2

Not used

Max segment = 185 m

Max collision domain = 2500m of 5 segments

  • 10 Base T

Max segment = 100 m

Max collision domain = 2500m of 5 segments

Has a maximum diameter of 500 m when repeaters are used

Read the rest of this entry »

CCDA 640-864 Summary Notes – Day 3

Posted on Updated on


Hierarchical Network Models

Advantages

  • Cost savings
  • Ease of understanding becausee of simple design and lower management costs as monitoring systems are distributed.
  • Network growth as changes are contained to a small subset  of the network and only impact that small area
  • Easy to isolate a problem in the network if the hierarchial model is used
  • Facilitates route summarization

Read the rest of this entry »

CCDA 640-864 Summary Notes – Day 1 and 2

Posted on Updated on


Cisco Network Architectures for the Enterprise

a) Borderless networks architecture

  • Enables connectivity to anyone and anything, anywhere, and at any time.
  • Connectivity needs to be secure, reliable, and seamless.

The major blocks include:

  • Policy and Control are applied to all users and devices in the architecture
  • Borderless Network Services provide resiliency and control
  • Borderless User services
  • Borderless Connection management provides secure access, anytime, anywhere

Read the rest of this entry »