0% found this document useful (0 votes)
3 views

56770

The document promotes instant access to various Cisco certification ebooks available for download at ebookgate.com. It includes titles such as '31 Days Before Your CCENT Certification' by Scott Bennett and 'CCNA Exploration Course Booklet' among others, providing resources for networking professionals. The content also outlines the structure and purpose of the book, along with acknowledgments and author information.

Uploaded by

tutdumekki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

56770

The document promotes instant access to various Cisco certification ebooks available for download at ebookgate.com. It includes titles such as '31 Days Before Your CCENT Certification' by Scott Bennett and 'CCNA Exploration Course Booklet' among others, providing resources for networking professionals. The content also outlines the structure and purpose of the book, along with acknowledgments and author information.

Uploaded by

tutdumekki
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 72

Instant Ebook Access, One Click Away – Begin at ebookgate.

com

31 Days Before Your CCENT Certification Cisco


Networking Academy Program 1st Edition Scott
Bennett

https://ebookgate.com/product/31-days-before-your-ccent-
certification-cisco-networking-academy-program-1st-edition-
scott-bennett/

OR CLICK BUTTON

DOWLOAD EBOOK

Get Instant Ebook Downloads – Browse at https://ebookgate.com


Click here to visit ebookgate.com and download ebook now
Instant digital products (PDF, ePub, MOBI) available
Download now and explore formats that suit you...

CCNP Building Scalable Internetworks BSCI 642 901 Lab


Portfolio Cisco Networking Academy 1st Edition David
Kotfila
https://ebookgate.com/product/ccnp-building-scalable-internetworks-
bsci-642-901-lab-portfolio-cisco-networking-academy-1st-edition-david-
kotfila/
ebookgate.com

CCNA Exploration Course Booklet LAN Switching and Wireless


Version 4 0 1st Edition Cisco Networking Academy

https://ebookgate.com/product/ccna-exploration-course-booklet-lan-
switching-and-wireless-version-4-0-1st-edition-cisco-networking-
academy/
ebookgate.com

31 Days Before Your CCNA Exam A day by day review guide


for the CCNA 640 802 exam 2nd Edition Allan Johnson

https://ebookgate.com/product/31-days-before-your-ccna-exam-a-day-by-
day-review-guide-for-the-ccna-640-802-exam-2nd-edition-allan-johnson/

ebookgate.com

CCENT Certification All In One For Dummies 1st Edition


Glen E. Clarke

https://ebookgate.com/product/ccent-certification-all-in-one-for-
dummies-1st-edition-glen-e-clarke/

ebookgate.com
Make Technology on Your Time Volume 31 1st Edition Mark
Frauenfelder

https://ebookgate.com/product/make-technology-on-your-time-
volume-31-1st-edition-mark-frauenfelder/

ebookgate.com

CCNA Cisco Certified Network Associate Study Guide Exam


640 802 Certification Press 3rd Edition Richard Deal

https://ebookgate.com/product/ccna-cisco-certified-network-associate-
study-guide-exam-640-802-certification-press-3rd-edition-richard-deal/

ebookgate.com

Networking with Microsoft Windows Vista Your Guide to Easy


and Secure Windows Vista Networking 1st Edition Paul
Mcfedries
https://ebookgate.com/product/networking-with-microsoft-windows-vista-
your-guide-to-easy-and-secure-windows-vista-networking-1st-edition-
paul-mcfedries/
ebookgate.com

Data Storage Networking Real World Skills for the CompTIA


Storage Certification and Beyond 1st Edition Nigel Poulton

https://ebookgate.com/product/data-storage-networking-real-world-
skills-for-the-comptia-storage-certification-and-beyond-1st-edition-
nigel-poulton/
ebookgate.com

Your Career Game How Game Theory Can Help You Achieve Your
Professional Goals 1st Edition Nathan Bennett

https://ebookgate.com/product/your-career-game-how-game-theory-can-
help-you-achieve-your-professional-goals-1st-edition-nathan-bennett/

ebookgate.com
31 Days Before Your
CCENT Certification

Scott Bennett

Cisco Press • 800 East 96th Street • Indianapolis, Indiana 46240 USA
ii 31 Days Before Your CCENT Certification

31 Days Before Your CCENT Certification


Scott Bennett
Copyright © 2008 Cisco Systems, Inc.
Published by:
Cisco Press
800 East 96th Street
Indianapolis, IN 46240 USA
All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means,
electronic or mechanical, including photocopying or recording, or by any information storage and
retrieval system, without written permission from the publisher, except for the inclusion of brief
quotations in a review.
First Printing December 2007
Library of Congress Cataloging-in-Publication Number:
Bennett, Scott, CCNA.
31 days before your CCENT certification / Scott Bennett.
p. cm.
ISBN 978-1-58713-217-9 (pbk.)
1. Electronic data processing personnel—Certification. 2. Computer networks—Examinations—Study
guides. I. Title. II. Title: Thirty-one days before your CCENT certification.
TK5105.5.B443 2007
004.6076—dc22
2007048436
ISBN-13: 978-1-58713-217-9
ISBN-10: 1-58713-217-6

Warning and Disclaimer


This book is designed to provide information about the Cisco Networking Academy Program CCNA
Discovery curriculum. Every effort has been made to make this book as complete and accurate as possi-
ble, but no warranty or fitness is implied.
The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc. shall
have neither liability nor responsibility to any person or entity with respect to any loss or damages aris-
ing from the information contained in this book or from the use of the discs or programs that may
accompany it.
The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems,
Inc.
iii

Feedback Information
At Cisco Press, our goal is to create in-depth technical books of the highest quality and value.
Each book is crafted with care and precision, undergoing rigorous development that involves the
unique expertise of members of the professional technical community.
Reader feedback is a natural continuation of this process. If you have any comments about how we
could improve the quality of this book, or otherwise alter it to better suit your needs, you can con-
tact us through e-mail at feedback@ciscopress.com. Please be sure to include the book title and
ISBN in your message.

We greatly appreciate your assistance.


Publisher Paul Boger
Associate Publisher David Dusthimer
Cisco Representative Anthony Wolfenden
Cisco Press Program Manager Jeff Brady

Executive Editor Mary Beth Ray


Managing Editor Patrick Kanouse

Senior Development Editor Christopher Cleveland


Senior Project Editor Tonya Simpson
Copy Editor Gayle Johnson

Technical Editors Glenn Tapley, Glenn Wright


Team Coordinator Vanessa Evans
Book and Cover Designer Louisa Adair
Composition Trudy Coler
Indexer Ken Johnson

Trademark Acknowledgments
All terms mentioned in this book that are known to be trademarks or service marks have been
appropriately capitalized. Cisco Press or Cisco Systems, Inc. cannot attest to the accuracy of this
information. Use of a term in this book should not be regarded as affecting the validity of any
trademark or service mark.
iv 31 Days Before Your CCENT Certification

About the Author


Scott Bennett earned his CCNA, CCAI, and CompTIA A+ while working and teaching in the
technology industry. After graduating from Gonzaga University, he went on to work with Qwest
eBits, providing network support and training to businesses throughout Idaho. He has four years of
experience as a Cisco Networking Academy instructor for the Capital Center High School
Technology Institute and Portland Community College. He also wrote 31 Days Before Your CCNA
Exam.

About the Technical Reviewers


Glenn Tapley works as a technical education consultant for Cisco. Glenn has been with Cisco for
more than eight years and works on certification courses and exams and is a regular speaker at the
annual Networkers and Cisco Live conferences. Prior to Cisco, Glenn was a Certified Cisco
Systems instructor for several years with Chesapeake Computer Consultants, Inc., of Annapolis,
Maryland. Glenn lives in Florida with his wife and two daughters.
Glenn Wright, CCNA, CCAI, is the codirector of the Cisco Academy Training Center (CATC) in
Fort Worth, Texas. He has a bachelor’s degree in business education from the University of North
Texas and 22 years of experience in computer education. He has been involved in many aspects of
the Cisco Networking Academy since 1999. He serves the Academy as an instructor and supports
the Regional Academies in Texas, Louisiana, Oklahoma, Arkansas, North Carolina, South
Carolina, Virginia, and Tennessee. He also has worked with the Academy Quality Assurance Team,
reviewing and editing Academy curriculum and assessment.
v

Dedication
To Grandpa Matt; my loving and supportive parents, Jim and Shari; my energetic and caring sib-
lings, Jimmy, Johnny, Monnie, and Christi; and Pam and George for creating my beloved beautiful
wife, Angie.
vi 31 Days Before Your CCENT Certification

Acknowledgments
First, I want to thank Mary Beth Ray for her help in this process from start to finish. Her ability to
enthusiastically adapt to the ever-changing Cisco certification and Cisco Academy environment
amazes me. Thank you for this remarkable experience and opportunity. Thank you to the entire
Cisco Press team who worked behind the scenes to help create this book.

I also need to thank Matt Schoenfeldt for his continued and contagious eccentric passion about all
things technical. Thanks to Gary Schlienkofer for his work as a regional director and as an instruc-
tor for our local Cisco Networking Academy. I also want to thank my friend Peter Buss for provid-
ing the perspective and empathy of a seasoned network administrator. Finally, I want to thank
Coach Dan Gehn for teaching me the real meaning of the words endurance and dedication.
vii

Contents at a Glance
Part I: Days 31–27 Describe the operation of data networks 1

Day 31 3

Day 30 7

Day 29 13

Day 28 21

Day 27 33

Part II: Days 26–21: Implement a small switched network 37

Day 26 39

Day 25 45

Day 24 49

Day 23 53

Day 22 57

Day 21 61

Part III: Days 20–13: Implement an IP addressing scheme and


IP services to meet network requirements for a small
branch office 65

Day 20 67

Day 19 73

Day 18 77

Day 17 81

Day 16 85

Day 15 89

Day 14 93

Day 13 95

Part IV: Days 12–8: Implement a small routed network 97

Day 12 99

Day 11 105

Day 10 107
viii 31 Days Before Your CCENT Certification

Day 9 111

Day 8 115

Part V: Days 7–6: Explain and select the appropriate administrative tasks
required for a WLAN 119

Day 7 121

Day 6 127

Part VI: Days 5–4: Identify security threats to a network and describe gen-
eral methods to mitigate those threats 131

Day 5 133

Day 4 137

Part VII: Days 3–1: Implement and verify WAN links and review
all days 141

Day 3 143

Day 2 147

Day 1 151

Part VIII: Exam and post exam days 185

Exam Day 187

Post-Exam Information 189


ix

Contents

Part I: Days 31–27: Describe the operation of data networks 1


Day 31: Describe the Purpose and Functions of Various Network Devices 3
CCNA Discovery 1, Chapter 1 3
CCNA Discovery 1, Chapter 3 4
Select the Components Required to Meet a Given Network Specification 4
CCNA Discovery 1, Chapter 3 5
Summary 5
Your Notes 5

Day 30: Use the OSI and TCP/IP Models and Their Associated Protocols to Explain
How Data Flows in a Network 7
CCNA Discovery 1, Chapter 6 7
CCNA Discovery 2, Chapter 2 10
Describe Common Networking Applications, Including Web Applications 11
CCNA Discovery 1, Chapter 1 11
Summary 11
Your Notes 12

Day 29: Describe the Purpose and Basic Operation of the Protocols in the OSI and
TCP Models 13
CCNA Discovery 1, Chapter 3 13
CCNA Discovery 1, Chapter 6 14
CCNA Discovery 2, Chapter 7 15
Describe the Impact of Applications (Voice over IP and Video over IP) on a
Network 18
CCNA Discovery 2, Chapter 3 18
CCNA Discovery 2, Chapter 7 18
Summary 19
Your Notes 19
x 31 Days Before Your CCENT Certification

Day 28: Interpret Network Diagrams 21


CCNA Discovery 1, Chapter 3 21
CCNA Discovery 2, Chapter 1 23
CCNA Discovery 2, Chapter 3 24
Determine the Path Between Two Hosts Across a Network 24
CCNA Discovery 1, Chapter 3 24
CCNA Discovery 1, Chapter 4 25
CCNA Discovery 2, Chapter 1 26
Describe the Components Required for Network and Internet
Communications 27
CCNA Discovery 1, Chapter 3 27
CCNA Discovery 1, Chapter 4 29
CCNA Discovery 2, Chapter 1 29
CCNA Discovery 2, Chapter 3 29
Summary 30
Your Notes 31

Day 27: Identify and Correct Common Network Problems at Layers 1, 2, 3, and 7
Using a Layered Model Approach 33
CCNA Discovery 1, Chapter 9 33
CCNA Discovery 2, Chapter 2 34
Differentiate Between LAN/WAN Operation and Features 35
CCNA Discovery 1, Chapter 3 35
CCNA Discovery 1, Chapter 4 35
CCNA Discovery 2, Chapter 5 35
Summary 36
Your Notes 36

Part II: Days 26–21: Implement a small switched network 37


Day 26: Select the Appropriate Media, Cables, Ports, and Connectors to Connect
Switches to Other Network Devices and Hosts 39
CCNA Discovery 1, Chapter 3 39
CCNA Discovery 1, Chapter 4 39
CCNA Discovery 2, Chapter 3 41
Summary 42
Your Notes 43
xi

Day 25: Explain the Technology and Media Access Control Method for Ethernet
Technologies 45
CCNA Discovery 1, Chapter 3 45
Explain Network Segmentation and Basic Traffic Management Concepts 46
CCNA Discovery 1, Chapter 3 47
Summary 47
Your Notes 47

Day 24: Explain the Operation of Cisco Switches and Basic Switching
Concepts 49
CCNA Discovery 1, Chapter 3 49
CCNA Discovery 2, Chapter 3 50
CCNA Discovery 2, Chapter 5 50
Summary 50
Your Notes 51

Day 23: Perform, Save, and Verify Initial Switch Configuration Tasks, Including
Remote-Access Management 53
CCNA Discovery 2, Chapter 5 53
Verify Network Status and Switch Operation Using Basic Utilities
(ping, traceroute, Telnet, SSH, ARP, ipconfig, show, and debug
Commands) 55
CCNA Discovery 1, Chapter 9 55
CCNA Discovery 2, Chapter 5 55
Summary 56
Your Notes 56

Day 22: Implement and Verify Basic Security for a Switch (Port Security,
Deactivate Ports) 57
CCNA Discovery 2, Chapter 5 57
Summary 58
Your Notes 59

Day 21: Identify, Prescribe, and Resolve Common Switched Network Issues,
Autonegotiation, and Switch Hardware Failures 61
CCNA Discovery 1, Chapter 9 61
CCNA Discovery 2, Chapter 2 61
CCNA Discovery 2, Chapter 5 61
Summary 62
Your Notes 63
xii 31 Days Before Your CCENT Certification

Part III: Days 20–13: Implement an IP addressing scheme and


IP services to meet network requirements for a small branch
office 65
Day 20: Describe the Need for and Role of Addressing in a Network 67
CCNA Discovery 1, Chapter 2 67
CCNA Discovery 1, Chapter 5 67
Create and Apply an Addressing Scheme to a Network 68
CCNA Discovery 1, Chapter 5 69
CCNA Discovery 2, Chapter 4 70
Summary 72
Your Notes 72

Day 19: Assign and Verify Valid IP Addresses to Hosts, Servers, and Networking
Devices in a LAN 73
CCNA Discovery 1, Chapter 2 73
CCNA Discovery 1, Chapter 5 73
CCNA Discovery 2, Chapter 5 74
Summary 74
Your Notes 75

Day 18: Explain the Basic Uses and Operation of NAT in a Small Network
Connecting to One ISP 77
CCNA Discovery 1, Chapter 5 77
CCNA Discovery 2, Chapter 4 77
CCNA Discovery 2, Chapter 5 79
Summary 80
Your Notes 80

Day 17: Describe and Verify DNS Operation 81


CCNA Discovery 1, Chapter 9 81
CCNA Discovery 2, Chapter 7 81
Summary 83
Your Notes 83

Day 16: Describe the Operation and Benefits of Using Private and Public IP
Addressing 85
CCNA Discovery 1, Chapter 5 85
Enable NAT for a Small Network with a Single ISP and Connection Using SDM,
and Verify Operation Using CLI and Ping 86
xiii

CCNA Discovery 2, Chapter 5 86


Summary 87
Your Notes 87

Day 15: Configure, Verify, and Troubleshoot DHCP and DNS Operation on a Router
(Including CLI/SDM) 89
CCNA Discovery 1, Chapter 5 89
CCNA Discovery 2, Chapter 5 90
Summary 91
Your Notes 91

Day 14: Implement Static and Dynamic Addressing Services for Hosts in a LAN
Environment 93
CCNA Discovery 1, Chapter 2 93
CCNA Discovery 1, Chapter 5 93
Summary 94
Your Notes 94

Day 13: Identify and Correct IP Addressing Issues 95


CCNA Discovery 1, Chapter 9 95
CCNA Discovery 2, Chapter 2 95
Summary 96
Your Notes 96

Part IV: Days 12–8: Implement a small routed network 97


Day 12: Describe Basic Routing Concepts (Packet Forwarding, Router Lookup
Process) 99
CCNA Discovery 2, Chapter 6 99
Describe the Operation of Cisco Routers (Router Bootup Process, POST, Router
Components) 101
CCNA Discovery 2, Chapter 5 101
Select the Appropriate Media, Cables, Ports, and Connectors to Connect Routers
to Other Network Devices and Hosts 102
CCNA Discovery 2, Chapter 5 102
Summary 103
Your Notes 103
xiv 31 Days Before Your CCENT Certification

Day 11: Configure, Verify, and Troubleshoot RIPv2 105


CCNA Discovery 2, Chapter 6 105
Summary 106
Your Notes 106

Day 10: Access and Use the Router CLI to Set Basic Parameters 107
CCNA Discovery 2, Chapter 5 107
Connect, Configure, and Verify the Operation Status of a Device Interface 108
CCNA Discovery 2, Chapter 5 108
Verify Device Configuration and Network Connectivity Using ping, traceroute,
Telnet, SSH, or Other Utilities 109
CCNA Discovery 2, Chapter 5 110
Summary 110
Your Notes 110

Day 9: Perform and Verify Routing Configuration Tasks for a Static or Default
Route Given Specific Routing Requirements 111
CCNA Discovery 2, Chapter 5 111
CCNA Discovery 2, Chapter 6 111
Manage IOS Configuration Files (Save, Edit, Upgrade, Restore) 112
CCNA Discovery 2, Chapter 5 112
Manage Cisco IOS 113
CCNA Discovery 2, Chapter 5 113
Implement Password and Physical Security 113
CCNA Discovery 2, Chapter 3 113
CCNA Discovery 2, Chapter 5 113
Summary 114
Your Notes 114

Day 8: Verify Network Status and Router Operation Using Basic Utilities (ping,
traceroute, Telnet, SSH, ARP, ipconfig, show, and debug Commands) 115
CCNA Discovery 1, Chapter 9 115
CCNA Discovery 2, Chapter 5 115
CCNA Discovery 2, Chapter 6 116
Summary 116
Your Notes 117
xv

Part V: Days 7–6: Explain and select the appropriate


administrative tasks required for a WLAN 119
Day 7: Describe Standards Associated with Wireless Media (Including the IEEE
Wi-Fi Alliance and ITU/FCC) 121
CCNA Discovery 1, Chapter 7 121
Identify and Describe the Purposes of the Components of a Small Wireless
Network (Including SSID, BSS, ESS) 122
CCNA Discovery 1, Chapter 7 122
Identify the Basic Parameters to Configure on a Wireless Network to Ensure That
Devices Connect to the Correct Access Point 124
CCNA Discovery 1, Chapter 7 124
Summary 125
Your Notes 126

Day 6: Compare and Contrast Wireless Security Features and Capabilities of WPA
Security (Including Open, WEP, WPA1/2) 127
CCNA Discovery 1, Chapter 7 127
CCNA Discovery 2, Chapter 8 128
Identify Common Issues with Implementing Wireless Networks 129
CCNA Discovery 1, Chapter 7 129
CCNA Discovery 1, Chapter 9 129
Summary 130
Your Notes 130

Part VI: Days 5–4: Identify security threats to a network and


describe general methods to mitigate those threats 131
Day 5: Explain Today’s Increasing Network Security Threats and the Need to
Implement a Comprehensive Security Policy to Mitigate the Threats 133
CCNA Discovery 1, Chapter 8 133
CCNA Discovery 2, Chapter 8 134
Explain General Methods to Mitigate Common Security Threats to Network
Devices, Hosts, and Applications 135
CCNA Discovery 1, Chapter 8 135
Summary 136
Your Notes 136
xvi 31 Days Before Your CCENT Certification

Day 4: Describe the Functions of Common Security Appliances and


Applications 137
CCNA Discovery 1, Chapter 8 137
CCNA Discovery 2, Chapter 8 138
Describe Security Recommended Practices, Including Initial Steps to Secure
Network Devices 139
CCNA Discovery 1, Chapter 8 139
CCNA Discovery 2, Chapter 8 139
Summary 139
Your Notes 140

Part VII: Days 3–1: Implement and verify WAN links and review
all days 141
Day 3: Describe Different Methods of Connecting to a WAN 143
CCNA Discovery 2, Chapter 5 143
Configure and Verify a Basic WAN Serial Connection 144
CCNA Discovery 2, Chapter 5 144
Summary 145
Your Notes 145

Day 2 147
CCNA Discovery 1 Packet Tracer Activity Checklist 147
CCNA Discovery 2 Packet Tracer Activity Checklist 147
Summary 148
Your Notes 149

Day 1: Review Detail Charts, Lists, and Concepts from Previous Days 151
Day 31: Network Components and Operation 151
Day 30: Layered Model Applications 152
Day 29: Layered Model Protocols and Their Purposes 152
Day 28: Network Diagrams and Components 154
Day 27: Troubleshooting and LAN Versus WAN 155
Day 26: Network Physical Media 156
Day 25: Media Access Control and Segmentation 157
Day 24: Switch Operation 157
Day 23: Switch Configuration 158
xvii

Day 22: Switch Security 158


Day 21: Switch Troubleshooting 159
Day 20: IP Addressing 159
Day 19: Assign Addresses 160
Day 18: NAT 161
Day 17: DNS Operation 161
Day 16: Private Networks and NAT 162
Day 15: DHCP Operation 162
Day 14: Static and Dynamic Addressing 163
Day 13: IP Address Troubleshooting 163
Day 12: Routing and Routers 164
Day 11: RIP Configuration 166
Day 10: CLI Parameters 166
Day 9: Configuration, IOS, and Security 168
Day 8: Network Status Verification 169
Day 7: Wireless Standards 170
Day 6: Wireless Security 171
Day 5: Security Threats 172
Day 4: Security Applications 173
Day 3: WAN Connections 174
Summary 175
Your Notes or Personal Day 1 Outline 175

Part VIII: Exam and post exam days 185


Exam Day 187
What You Need for the Exam 187
What You Should Receive After Completion 187
Summary 188

Post-Exam Information 189


Receiving Your Certificate 189
Determining Career Options 189
xviii 31 Days Before Your CCENT Certification

Examining Certification Options 190


If You Fail the Exam 190
Summary 190
Your Notes 191
xix

Icons Used in This Book

Workstation File Server Printer Laptop Multilayer Switch

Hub Workgroup Route/Switch Cisco RouterPipe


Switch Processor IP Phone

Network Cloud Line: Ethernet Line: Serial Line: Circuit-Switched

Command Syntax Conventions


The conventions used to present command syntax in this book are the same conventions used in
the IOS Command Reference. The Command Reference describes these conventions as follows:
■ Boldface indicates commands and keywords that are entered literally as shown. In actual con-
figuration examples and output (not general command syntax), boldface indicates commands
that are manually input by the user (such as a show command).
■ Italic indicates arguments for which you supply actual values.
■ Vertical bars (|) separate alternative, mutually exclusive elements.
■ Square brackets ([ ]) indicate an optional element.
■ Braces ({ }) indicate a required choice.
■ Braces within brackets ([{ }]) indicate a required choice within an optional element.
■ A command that does not fit on one line continues on the next line with a two-space indent.
xx 31 Days Before Your CCENT Certification

Introduction
31 Days Before Your CCENT Certification represents the end of your adventure through the Cisco
Networking Academy CCNA Discovery courses. It’s time to pass the ICND1 640-822 exam and
make your knowledge official. You owe it to yourself to complete your current Cisco Networking
Academy studies with a CCENT certification. This book essentially provides a bridge between the
Cisco Networking Academy curriculum and the CCENT (ICND1) exam. Each day breaks down
each exam topic into a manageable bite using short summaries from the online curriculum. Use
this book and its organized course of study to take the guesswork out of your comprehensive
Networking Academy review for the CCENT.

Goals and Methods


The main goal of this book is to provide you with a clear map from the Cisco Networking
Academy online curriculum to the CCENT (ICND1) exam. You will read short summaries of sec-
tions from the Networking Academy online curriculum as they relate to each of the exam topics
for the CCENT. This book also outlines the format of the CCENT exam and the registration
requirements you must fulfill to take the CCENT (ICND1) exam.
Each day in this book uses the following elements to review the Cisco Networking Academy
online curriculum:
■ Short summaries of key concepts and definitions from the curriculum, with a reference to the
Networking Academy online module section number.
■ Tables and figures to help you recognize topics that you covered during your Networking
Academy studies.
■ No-frills Cisco IOS Software command-line examples to jog your memory about the configu-
rations and lab exercises that relate to each CCENT objective.
■ References for further study and practice testing with the CCNA Flash Cards and Exam
Practice Pack.
■ Brief attempts at networking humor.
This book can also provide instructors and students with a concise way to review the CCNA
Discovery curriculum and add a little personality and a new angle to the Networking Academy
curriculum. You can use this book to fit CCENT studies into an otherwise busy schedule with a
daily timeline and clear references to other CCENT study materials.

Who Should Read This Book?


The primary audience for this book is anyone teaching or enrolled in the Cisco Networking
Academy CCNA Discovery courses or recent graduates of the Cisco Networking Academy CCNA
Discovery curriculum who have not yet taken or passed the CCENT (ICND1) exam.
The secondary audience for this book is anyone who wants to review for the CCENT, which
assumes some prior networking knowledge.
xxi

How This Book Is Organized


This book begins with instructions leading you through the process to register for the CCENT
exam. Then it breaks up the exam topics by day. The book counts down starting with Day 31 and
continues through exam day to provide post-test information. Each day includes subheadings that
identify the exam topics that are covered. Each curriculum summary provides the module and
section from the corresponding CCNA Discovery course.
You will also find a calendar and checklist that you can tear out and use during your exam prepa-
ration. Use the calendar to enter each actual date beside the countdown day, and the day, time,
and location of your CCENT exam. The calendar provides a visual for how much time you can
dedicate to each CCENT (ICND1) exam objective. You can also put a red X over each day you
complete, like those movie montages where the lead character is preparing for something impor-
tant. Use the checklist to map out your studies leading up to the CCENT (ICND1) exam. The
checklist highlights important tasks and deadlines leading up to your exam.

Study Tips
It might help to buy a whiteboard. Get a dry-erase marker and fill the room with that awful scent
while you diagram and teach yourself each concept. Teach out loud. Teach whoever will listen.
Most important, you need to inject yourself into this information. Your desire to get a CCENT and
understand these concepts will shine through on test day. If you cannot explain and diagram an
objective, you do not know it. The real test happens when your boss asks you to explain a net-
working concept or to defend your suggestion in a meeting. The following activities can also help
you prepare:
■ Podcast audio discussions about CCENT topics.
■ Capture video lessons of yourself, and watch them or place them online for others.
■ For every hour that you study, donate a set amount to a children’s hospital. Ask friends to
sponsor you.
■ Blog what you are learning.
■ Get a copy of CCNA Flash Cards and Exam Practice Pack, and tackle the suggested readings
and practice exams for each day.
xxii 31 Days Before Your CCENT Certification

Getting to Know the CCENT (ICND1 640-822)


Exam
The CCENT ICND1 640-822 exam tests your ability to describe, implement, configure, secure,
and troubleshoot small networks. Just knowing the information will help you on the exam, but also
knowing the testing process, format, and testing environment will build your confidence and
reduce the chance of any unpleasant surprises on exam day.

Exam Topics
The topics of the CCENT (ICND1 640-822) exam focus on the following seven key categories:
■ Describe network operation: The topics in this category relate to the theory and concepts
behind networks, including layered models, protocols, and topologies.
■ Implement a switched network: This category asks you to connect, configure, and secure a
switched network.
■ Implement an IP addressing scheme: This category asks you to describe subnetting, NAT,
DHCP, DNS, and IP addressing-related tasks on a network.
■ Implement a routed network: This category asks you to connect, configure, and secure a
router on a network.
■ Explain and select administrative tasks for a WLAN: This category is where you prove
that you understand the different WLAN standards and necessary parameters to configure on
a WLAN.
■ Identify and mitigate security threats: This category asks you to describe common network
vulnerabilities and how to protect your users and data.
■ Implement and verify WAN links: This category asks you to describe WAN connections and
configure a basic WAN serial connection.
Each category includes general exam topics. In this book, similar CCENT (ICND1) exam topics
are grouped into a single day and are explained using the information you have learned in the
CCNA Discovery courses.
Although Cisco outlines general exam topics, it is possible that not all topics will appear on the
CCENT (ICND1) exam and that topics that are not specifically listed may appear on the exam.
The exam topics provided by Cisco and included in this book are a general framework for exam
preparation. Be sure to check Cisco.com and look at the latest exam topics. You can navigate to
CCENT information through the Training and Events link.
xxiii

Exam Format
For the CCENT (ICND1) exam, you are allowed 90 minutes to answer 50 to 60 questions.
Table I-1 outlines each type of question that you might encounter on the exam.

Table I-1 Cisco Exam Question Types


Question Type Description

Multiple-choice single-answer You choose one and only one answer.


Multiple-choice multiple-answer You choose more than one answer. The question tells
you how many answers you must select.
Drag-and-drop You drag and release objects to visually arrange the
answer on the page. These questions are similar to the drag-and-
drop Interactive Media Activities in the Academy online
curriculum.
Fill-in-the-blank You click a text box and then enter the answer. Sometimes there
is more than one text box.
Testlet You see an upper pane and lower pane in the main win
dow for this type of task. The upper pane contains a
scenario, and the lower pane contains multiple-choice questions
with single and multiple answers. On the right side you can
scroll through the scenario and select questions.
Simlet A top pane contains questions, and a bottom pane
contains a router simulation that you can use to answer
the questions.
Simulations This task is similar to the e-Labs that cover configurations.
Remember that not all commands are supported in these
simulations and that you can view the network topology in
some simulations. You see the actual problem at the top and the
directions on the left.

Cisco.com has an exam tutorial that simulates each of these types of questions. As you work
through the exam tutorial, identify the question types that will take you longer to complete so that
you can manage your time on exam day. The following steps allow you to access this tutorial:

Step 1 Visit http://www.vue.com/cisco.


Step 2 Scroll down and visit the link labeled Review the Cisco Certification
Exam Tutorial.

Step 3 Click the Certification Exam Tutorial link.


xxiv 31 Days Before Your CCENT Certification

ICND1 640-822 Discount Voucher


As a Cisco Networking Academy student, you have a unique opportunity to integrate your final
days of study with preparation for the CCENT exam. Before you complete the CCNA Discovery 2
course (Working at a Small-to-Medium Business or ISP), you should plan to pass the final exam
with a 75% or higher on the first attempt. If you do so, you can request a discount voucher for
the ICND1 exam on your Cisco Networking Academy home page. It is important to schedule the
CCNA Discovery 2 final so that you have time to properly prepare and achieve a 75% or higher on
your first attempt. Work with your instructor to choose an optimal time and environment to take
the final.

Registering for the CCENT (ICND1 640-822) Exam


After you have taken the final and redeemed your voucher, you need to gather the information out-
lined in Table I-2 to register for the ICND 640-822 exam.

Table I-2 Personal Information for ICND 640-822 Exam Registration

Item Notes

Legal name
Social security or passport number
Cisco certification ID or test ID
Cisco Academy username Required for your voucher

Cisco Academy ID number Required for your voucher


Company name

Valid e-mail address


Voucher number Required for your voucher

Method of payment Typically a credit card

You can register for an exam up to six weeks in advance or as late as the day before the exam. If
you had an account with the Pearson VUE before you began with the Networking Academy, it is
important to ensure that your profile is updated with your Academy information for the Academy
voucher before you register. You can contact Pearson VUE as shown in Table I-3 to register for an
exam. The process and available test times vary based on the local testing center you choose.

Table I-3 Test Delivery Partners


Testing Partner Phone Number Website

Pearson VUE In the U.S. and Canada, http://www.vue.com/cisco


call 1-800-829-6387. Choose
option 1 and then option 4.
Check the website for information
for other countries.

There is no better motivation for study than an actual test date. Sign up as soon as you have your
voucher.
Part I
Days 31–27: Describe the
operation of data networks
Day 31 covers network components and operation

Day 30 covers layered model applications

Day 29 covers layered model protocols

Day 28 covers network diagrams and topology

Day 27 covers troubleshooting and LAN versus WAN


This page intentionally left blank
Day 31
Describe the Purpose and Functions
of Various Network Devices
This first exam topic expects you to know the names and general functions of network devices.
This is similar to something you might tell your friend at lunch if he or she asked for a 5-minute
explanation of the computer lab at the library. As soon as you know the names of the devices,
Days 30 and 29 look at their language (protocols). Chapters 1 and 3 of CCNA Discovery 1
describe network devices and their functions.

CCNA Discovery 1, Chapter 1


1.1.1 and 1.2.1: Computers exist in numerous environments: businesses, homes, schools, cars,
cell phones. Most computers consist of hardware, an operating system, and application software.
You would purchase a desktop or laptop for your home. However, for your graphic design
business, you might choose a beefy workstation. A network administrator may set up an e-mail
server and carry a handheld for alerts and remote network access. A large business might purchase
a mainframe to handle special enterprise tasks.
1.2.2 and 1.2.3: The following hosts are often attached to a network:
■ Servers provide application services to client computers. Servers typically have multiple hard
drives and increased processing power and memory. Servers provide services such as file stor-
age, web page hosting, e-mail storage, and print services. Although it is always connected to a
network, a server may not have a keyboard, monitor, or mouse connected.
■ A desktop uses a mouse, keyboard, and monitor to give the user direct access to local
applications such as word processing and network applications such as e-mail.
■ A workstation is a customized desktop designed for a specific application that demands
improved hardware such as dual monitors, a specialized 3-D card, a faster disk drive and
processor, or increased memory.
■ Laptops and handheld computers provide more accessible mobile devices with relatively
less powerful hardware than desktops or workstations. Portable devices are also more difficult
to upgrade.
1.4.1–1.4.3: A preassembled computer system can cost less, but it might not have the performance
level of a custom-built computer system. The main components of a computer are the mother-
board, central processing unit (CPU), and random-access memory (RAM). A computer system
that has no built-in or compatible network connection may require a network interface card
(NIC) to communicate on the network. As with any adapter card, the NIC typically attaches to the
motherboard.
4 31 Days Before Your CCENT Certification

CCNA Discovery 1, Chapter 3


3.1.1 and 3.1.2: Earlier networks provided only a single dedicated and specific service, such as
voice communication. The structure of each dedicated network allowed voice communication
or video transfer, but not both. Today, newer converged networks can offer voice, video, and
data from a single device over the same network. Devices connected to a network allow users
to communicate electronically, share resources, and engage in online trade. The Internet is an
example of a converged network capable of simultaneous voice, video, and data transmission.
3.3.5: One way to classify the purpose and placement of networking devices is through a
hierarchical model. We will revisit network design models on Days 29 and 28. The following
points outline a three-layer hierarchical model:
■ Access layer devices connect hosts on a local-area network (LAN).
■ Distribution layer devices provide connectivity between LANs.
■ Core layer devices provide high-speed connectivity between distribution layer devices.
3.4.2, 3.4.3, and 3.5.2: In addition to hosts, networks include hubs, switches, and routers. Table
31-1 describes the purpose of each of these networking devices.

Table 31-1 Networking Devices and Their Purpose


Device Layer Purpose

Hub Typically installed in a Ethernet networking device with multiple ports that
LAN at the access layer simply regenerates a signal it receives on one port to all
other ports. All devices are on the same channel and share
that channel’s bandwidth. If two devices send a message at
the same time, a collision occurs.
Switch Used at the access layer Multiport networking device that looks at the destination
physical address of a received frame on one port to forward
the frame to the port where the host is connected. Hosts
communicate through temporary circuits, avoiding
collisions. A bridge is essentially a two-port switch an
administrator could use to divide a large, hub-based
collision domain. Recent network installations implement
switches rather than hubs and a bridge.

Router Connected at the Routers look at the destination IP address of a received


distribution layer packet and forward the packet to its destination network.
Routers also determine the best path for a packet to its
destination network.

Select the Components Required to Meet a


Given Network Specification
As soon as you understand the devices and their functions on a network, selecting the proper com-
ponents becomes easier. Chapter 3 of CCNA Discovery 1 provides an overview of the components
necessary to build a network.
Day 31 5

CCNA Discovery 1, Chapter 3


3.1.3 and 3.1.4: To create a network, you first set up hosts and connect peripherals to them. An
example is a desktop with a scanner attached. Next you use some form of media to connect the
hosts to a hub or switch. Other users can now share the peripheral devices over the network. To
attach your local network to other networks, you connect a router. In addition, hosts can act as
servers if you install specific software that enables the host to provide information. Just as a web
server requires your computer to have a web browser, many network server applications require a
client to run specific software.

Summary
The information covered today provides a brief overview of the key components of a network.
When you sit in front of a desktop to send an e-mail, your transmission passes through physical
media, then to a hub or switch, then to a router, and lastly to a server, where it sits until requested
by the recipient. Days 30 and 29 describe the software and protocols used by these networking
devices to transmit, forward, and route this information. If you have a copy of the CCNA Flash
Cards and Exam Practice Pack (CCENT Exam 640-822 and CCNA Exams 640-816 and 640-802),
Third Edition, you can further review the topics from today on pages 5–36.

Your Notes
This page intentionally left blank
Day 30
Use the OSI and TCP/IP Models
and Their Associated Protocols
to Explain How Data Flows in a
Network
A layered model provides the foundation for your understanding of networks. The stronger you
build this foundation, the more information you will be able to easily learn and retain. When you
learn, teach, troubleshoot, and tackle network configuration, the Open Systems Interconnection
(OSI) model and the Transmission Control Protocol/Internet Protocol (TCP/IP) model should
guide your plan of attack. Not surprisingly, the CCENT exam tests your ability to describe net-
works using a layered model. This section includes topics covered in Chapter 6 of CCNA
Discovery 1 and Chapter 2 of CCNA Discovery 2.

CCNA Discovery 1, Chapter 6


6.1.1: As defined on Day 31, a host running a server application provides information and services
to other hosts running client applications. The communication between a server and client requires
a set of standards and protocols.
6.3.1: When hosts communicate over a network, they implement many protocols. This protocol
stack is made up of layers, each of which relies on its neighboring layers. The lower-layer proto-
cols focus on moving the data across the network, and the higher-layer protocols focus on the for-
mat of the data in the transmission. When you use a layered model to learn network protocols, you
can single out the operation of a single layer and how it interacts with other layers. The following
list explains the benefits of a layered model:
■ Helps with the design of protocols, because each layer has a standard function and a standard
interface for communication with adjacent layers.
■ Allows products from different vendors to work together, allowing for collaboration in design
and competition between manufacturers of compatible components.
■ Allows the technology of one layer to improve without affecting other layers.
■ Provides common terminology to teach, learn, and discuss networks and network protocols.
The first layered model for internetworking was the Internet or TCP/IP model. This four-layer
model consists of the application layer, transport layer, Internet layer, and network access layer.
Table 30-1 describes each layer of the TCP/IP model.
8 31 Days Before Your CCENT Certification

Table 30-1 TCP/IP Model and Corresponding Protocol Data Units (PDU)

Layer Function PDU

4 (Application) Deals with network applications. Data


3 (Transport) Deals with host-to-host communication. Segments
2 (Internet) Deals with the routing or path of the Packets
communication.
1 (Network Access) Deals with two functions: the framing Frames, bits
of the data and signaling over
the physical media.

6.3.2: The following steps take you through the flow of data through a network using the TCP/IP
model protocol stack as a reference:

1. You start at the top of the protocol stack with the application layer. For example, you use a
network application such as a web browser to make a Hypertext Transfer Protocol (HTTP)
request for a web page.
2. At the transport layer, the request is broken down and encapsulated into a Transmission
Control Protocol (TCP) segment and is given a header identifying the source port, destination
port, and sequence number. Some applications at the transport layer use the faster, less
reliable User Datagram Protocol (UDP).
3. At the Internet layer, the TCP segments are encapsulated into Internet Protocol (IP) packets
and are given an IP header with a source and destination IP address.
4. The network access layer uses the Ethernet protocol to encapsulate the packets into frames.
Each frame has a header including a source and destination media access control (MAC)
address, as well as a cyclical redundancy check (CRC) field at the end of the frame to verify
proper transmission. In this layer, the frames are also encoded into bits and are sent electroni-
cally over the medium by the network interface card (NIC).
5. After the bits cross the physical medium and arrive at the destination, they are de-
encapsulated up the protocol stack until the data reaches the application. In this case, the
HTTP request would reach the server application, and it would respond with web data and
start the process again.
6.3.3: Another reference model for network communication, the OSI model, was created in 1984
by the International Organization for Standardization (ISO). Unlike the TCP/IP model, which
focuses on the TCP and IP protocols used on the Internet, the OSI model divides all network
communication (not just TCP/IP) into seven layers. The OSI seven-layer model provides the same
benefits of standardization and independent compatibility as mentioned previously for the TCP/IP
layered model. Table 30-2 describes the OSI model and the associated protocols and PDUs for
each layer.
Day 30 9

Table 30-2 OSI Seven-Layer Model

Layer Name Protocols and Examples PDU

7 (Application) E-mail, FTP, HTTP Data


6 (Presentation) ASCII, .txt, .mp3 Data
5 (Session) SQL Data
4 (Transport) TCP, UDP (port 22, port 80) Segments

3 (Network) IP (192.168.1.1) Packets


2 (Data link) MAC (00-00-0C-1A-22-3B) Frames
1 (Physical) Bits (1010010001010001) Bits

Table 30-3 shows the headers for an Ethernet frame and the encapsulated headers for an IP packet
and TCP segment included in the frame. The table also identifies the OSI layer and protocol relat-
ed to the headers.

Table 30-3 Encapsulated Headers, Layers, and Protocols

Destination Source Destination Source Destination Source

Layer 2 Layer 2 Layer 3 Layer 3 Layer 4 Layer 4


00000C111111 00000C03124A 192.168.1.3 192.168.1.8 22 3345
Ethernet MAC Ethernet MAC IP header IP header TCP header TCP head-
er
frame header frame header

Table 30-4 compares the layers of the OSI model and the TCP/IP model.

Table 30-4 TCP/IP Model Compared to the OSI Model


TCP/IP Model OSI Model

Application (Layer 4) Application (Layer 7)


Presentation (Layer 6)
Session (Layer 5)
Transport (Layer 3) Transport (Layer 4)

Internet (Layer 2) Network (Layer 3)


Network access (Layer 1) Data link (Layer 2)
Physical (Layer 1)
10 31 Days Before Your CCENT Certification

CCNA Discovery 2, Chapter 2


2.2.1 and 2.2.2: The OSI model is often described in terms of the upper and lower layers. The
upper layers include Layers 5, 6, and 7, and the lower layers include Layers 1, 2, 3, and 4. The
upper layers deal with the data’s format, organization, and communication. The lower layers
primarily implement protocols to transport and route data across a network. Table 30-5 outlines the
function of each layer and associated network devices.

Table 30-5 OSI Model Functions and Associated Devices


Layer Function Devices

7 Software applications that provide services such as Host and network software
Domain Name System (DNS), File Transfer Protocol
(FTP), Dynamic Host Configuration Protocol (DHCP),
Simple Network Management Protocol (SNMP),
Telnet, and HTTP.
6 Encrypt and encode (or represent) data in a standard Host and network software
format such as Secure Socket Layer (SSL), American
Standard Code for Information Interchange (ASCII), and
Multipurpose Internet Mail Extensions (MIME). Shells and
redirectors also operate at this layer.
5 Set up and tear down sessions between hosts. Remote Host and network software
Procedure Calls (RPC), NetBIOS, Structured Query
Language (SQL) connections, and Application Program
Interfaces (API) operate at this layer.
4 Data encoded by the upper layers is broken into segments Firewalls video and voice
that receive either Transmission Control Protocol (TCP) or appliances
User Datagram Protocol (UDP) headers. These protocols
deal with the flow of the data and sequence of the segments.

3 The Layer 4 segments are encapsulated into IP packets. Routers


This layer deals with the path selection (routing) of the
data over the network. IP version 6 (IPv6) and Network
Address Translation (NAT) also operate at this level.
2 Layer 3 packets are encapsulated into frames with headers Switches and NICs
using physical Media Access Control (MAC) addresses to
identify source and destination. Ethernet, wireless local-area
network (WLAN), Asynchronous Transfer Mode (ATM),
and Point-to-Point Protocol (PPP) operate at this layer.

1 The Layer 2 frames are encoded into bits, represented as Repeaters hubs, cables, and
electrical signals, light waves, or radio waves, and are wireless
transmitted over cables (copper or fiber-optic) or the air
(radio waves).
Day 30 11

Describe Common Networking


Applications, Including Web Applications
Networking applications often define a network’s purpose and function. A thorough understanding
of common networking applications will aid in your efforts to provide the most useful network for
a client. This section identifies the common networking applications described in Chapter 1 of
CCNA Discovery 1.

CCNA Discovery 1, Chapter 1


1.1.2: Types of application software include industry-specific software such as a medical imaging
tool, or general-use software such as office and multimedia software. More importantly, applica-
tions can be local or networked. A word processor is a local application, and an e-mail client is a
network application. A word processor runs directly from the local computer hard drive, whereas
an e-mail application requires the local computer to communicate over a network with a remote
computer. Table 30-6 provides examples of local applications and network applications.

Table 30-6 Local Applications and Network Applications


Local Applications Network Applications

Graphic art software E-mail client software


3D design software Instant-messaging (IM) software
Word-processing software Web browser
Spreadsheet software Web-based tools (such as maps)
Video-editing software Videoconferencing software

Summary
The seven-layer OSI model and four-layer TCP/IP model provide a map for the processes of for-
matting, encapsulating, addressing, encoding, and transmitting data over a network. First, a net-
work application creates data for transmission. Next, the data moves through the OSI layers as seg-
ments, packets, frames, and finally bits to be transferred over the network. The receiving device
rebuilds the data in reverse, and the receiving network application presents the data to the user.
Many protocols are implemented during this communication. Day 29 focuses on the protocols
used in the OSI and TCP/IP layered models and the impact of some network applications on a net-
work. You can further review the topics from today on pages 5–36 of CCNA Flash Cards and
Exam Practice Pack (CCENT Exam 640-822 and CCNA Exams 640-816 and 640-802), Third
Edition.
12 31 Days Before Your CCENT Certification

Your Notes
Day 29
Describe the Purpose and Basic
Operation of the Protocols in the
OSI and TCP Models
From the physical standards for speed to the application requirements to request a web page, pro-
tocols standardize network communication. Each layer of the OSI and TCP/IP models contains
protocols that define communication inside that layer and with neighboring layers. When, how,
how much, and how often information can be sent is covered in Chapters 3 and 6 of CCNA
Discovery 1 and Chapter 7 of CCNA Discovery 2.

CCNA Discovery 1, Chapter 3


3.2.8 and 3.3.1: Protocols for communicating over a network provide standards for timing, mes-
sage format, message size, encapsulation, encoding, and message patterns. The most common pro-
tocol to manage these standards for a wired local-area network (LAN) is Ethernet.
3.3.2: The Institute of Electrical and Electronic Engineers (IEEE). The IEEE 802.3 Committee
develops the standards for Ethernet technologies. The name of an Ethernet standard often identifies
its speed, transmission type, and cabling. For example, 100BASE-T is 100 megabits per
second (Mbps) baseband transmission over twisted-pair cabling. Table 29-1 lists some common
standards for Ethernet.

Table 29-1 Ethernet Standards

Standard Description

Dix standard Digital Intel and Xerox standard for 10 Mbps over coaxial cable
IEEE 802.3 10BASE-5 10-Mbps baseband over coaxial cable (thicknet) capable of a
500-meter distance
IEEE 802.3a 10BASE-2 10-Mbps baseband over coaxial cable (thinnet) capable of a
200-meter distance
IEEE 802.3i 10BASE-T 10-Mbps baseband over twisted-pair copper capable of a
100-meter distance
IEEE 802.3j 10BASE-F 10-Mbps baseband over fiber
IEEE 802.3u 100BASE-T 100-Mbps baseband over twisted pair

IEEE 802.3z 1000BASE-X 1 Gigabit per second (Gbps) baseband over fiber
IEEE 802.3an 10G BASE-T 10 Gbps over twisted pair
14 31 Days Before Your CCENT Certification

CCNA Discovery 1, Chapter 6


6.1.2: The protocols at each layer of the OSI model provide guidelines for the functions of that
layer. Each of the following protocols operates at a different OSI model layer:
■ An example of a protocol used at the application layer is Hypertext Transfer Protocol
(HTTP). HTTP governs how a client application requests information and how a server
responds.
■ At the transport layer, Transmission Control Protocol (TCP) defines how communicating
hosts can control the flow of information and acknowledge information received.
■ At the network layer, the Internet Protocol (IP) defines how packets should be addressed and
routed to their destination.
■ At the data link layer, Ethernet is the most common protocol. IP packets are encapsulated into
frames and given a physical address for transmission over the network.
■ Network interface cards (NIC) use various physical layer standards (depending on the media
type) to determine how bits are represented and sent over the medium.
6.1.3: As mentioned previously, network layer IP is concerned with routing the packets, and the
transport layer protocols define how to transmit the information. The two most common transport
layer protocols are TCP and User Datagram Protocol (UDP):
■ TCP breaks a message into a segment, adds a sequence number to each segment, and
acknowledges whether a segment has arrived at its destination. If the destination does not
acknowledge a segment, the source retransmits the missing portions. File Transfer Protocol
(FTP) and HTTP are two application layer protocols that use TCP.
■ UDP does not acknowledge or retransmit segments. In fact, application layer protocols that
use UDP do so to transfer information without the overhead of acknowledgment and retrans-
mission. Streaming audio, video, and voice over IP (VoIP) use UDP.
6.1.4: Transport layer protocols use ports to identify a service. If a client makes an HTTP request,
it typically identifies the destination port as 80. The client also specifies a unique source port (an
unregistered port in the 1025 to 65535 range) so that the server can identify the unique conversa-
tion. The client uses a destination port, source port, destination IP address, and source IP address
to create a socket that identifies the server and service.
6.2.1: The web address (or domain name) that you enter into a browser is translated into an IP
address using Domain Name System (DNS). Like an HTTP server responds to port 80 requests, a
DNS server responds to requests on port 53. However, if a DNS server does not know the IP for
the domain, it forwards the request to another DNS server. If other DNS servers do not have an
entry for the domain, the request times out.
6.2.2–6.2.5: Table 29-2 describes communication between web, FTP, e-mail, and instant messag-
ing (IM) clients and servers.
Day 29 15

Table 29-2 Client/Server Protocols

Type Protocols/Ports Description

Web servers HTTP/80 Clients make a request of a server on port 80 using


HTTPS/443 HTTP, and the server responds with a web page
created in Hypertext Markup Language (HTML).
Secure requests occur using HTTPS.
FTP servers FTP/21 An FTP client makes a request of a server on port
FTP/20 21. As soon as the session is open, the server
responds with data on port 20.

E-mail servers SMTP/25 A server sends and stores e-mails accessed by an


POP3/110 e-mail client. Clients and servers use Simple Mail
IMAP4/143 Transfer Protocol (SMTP) to send e-mails. Servers
use Post Office Protocol (POP) to receive and store
messages. Servers can also allow an Internet Message
Access Protocol (IMAP) client to receive and store
messages and keep the messages in the mailbox on the
server.
IM servers Various, depending Users can install compatible IM clients and comm-
on vendor unicate instantly with other users on the same IM
network.

CCNA Discovery 2, Chapter 7


7.2.1: Internet service providers (ISP) support many services and applications. These applications
use UDP and/or TCP at the transport layer and IP at the network layer. ISP support personnel must
be familiar with the TCP/IP protocols to best maintain reliable communication for users. Table 29-
3 provides examples and functions of protocols used in the four layers of the TCP/IP model.

Table 29-3 TCP/IP Protocols


TCP/IP Layer Protocols (Functions)

Application DNS, DHCP, BOOTP, SMTP, POP, IMAP, FTP, TFTP, HTTP, HTTPS
Transport UDP, TCP
Internet IPv4, IPv6, IP (NAT), ARP, ICMP, routing protocols such as RIP, OSPF,
EIGRP, and BGP
Network access PPP, Ethernet

Note that the application, presentation, and session layers of the OSI model define functions in the
application layer of the TCP/IP model. In addition, the data link and physical layers of the OSI
model are represented by the network access layer of the TCP/IP model. The OSI model contains
more defined layers because it is a theoretical guide, whereas the TCP/IP model is based on actual
Internet protocols and standards.
16 31 Days Before Your CCENT Certification

7.2.2: As defined previously, TCP uses acknowledgment and retransmission to increase reliability.
Because TCP maintains a persistent connection, it is also classified as a connection-oriented proto-
col. Conversely, UDP is a connectionless protocol that makes a “best-effort” attempt to send the
information without acknowledgment or retransmission. UDP suits applications such as Internet
radio that can function with short amounts of data loss. TCP works well as a protocol for applica-
tions that require all data to arrive in its original condition, such as e-mail and web applications.
The reduction in speed that occurs as a result of TCP is a decent trade-off when reliable data trans-
fer is important.

TCP and UDP segments are placed in packets at the network layer for transmission. This process,
as mentioned on Day 30, is called encapsulation. At the data link layer, the packets are encapsulat-
ed into frames and then represented as bits at the physical layer. The encapsulation process occurs
in reverse as soon as the bits reach their destination.
TCP requires a three-way handshake to establish a session for communication:
1. The sending host sends a SYN request for a connection. This request also synchronizes the
sequence numbers for segment sending between the two hosts.
2. The destination replies with a SYN-ACK message acknowledging the request and synchro-
nization.

3. The sending host responds with an ACK to complete the connection. The hosts can then com-
municate and send segments reliably.
If any segments are not acknowledged within a specified time, they are retransmitted. These
sequenced segments are assembled by the TCP process and delivered to the upper-layer applica-
tions for de-encapsulation into data.

7.2.3: Table 29-4 describes the differences between TCP and UDP.

Table 29-4 TCP Versus UDP


TCP UDP

Connection-oriented protocol Connectionless protocol


Reliable protocol with acknowledgment, retransmission, Unreliable; requires reliability to be
flow control, and sequencing implemented in other layers if needed
Greater network overhead Less network overhead
Used for e-mail, FTP, and web applications that require Used in DNS, SNMP, DHCP, RIP, TFTP,
reliable transmission VoIP, online games, video, and audio

7.4.1: Often, ISPs provide to customers application layer services such as HTTP, FTP, SMTP,
POP3, and IMAP4. In addition, an ISP can provide secure services such as HTTPS and SFTP. A
web server provides HTTP and HTTPS, a file server provides FTP, and a mail server provides
POP3 and IMAP4.
Day 29 17

7.4.2–7.4.4: When you set up a web server, you can choose to provide web access through HTTP
or more secure access through HTTPS. HTTP messages are sent in clear text (which is easily
intercepted), whereas HTTPS uses Secure Socket Layer (SSL) to encrypt the data stream. Keep in
mind that HTTPS increases the load on a server, so use it only when necessary. A browser access-
es your server with a request made when a user enters a Uniform Resource Locator (URL). The
URL typically specifies the location of the server and the location of the folder where the informa-
tion is stored on the server.
HTTP also supports proxy services. You can set up a network device to receive all the HTTP
requests on a network and act as a proxy to make the requests to the actual destination. A proxy
server provides increased speed through caching, allows you to filter, and provides better security
because your hosts do not directly identify themselves to the outside world.
FTP is a two-part process. One part uses a protocol interpreter (PI) to send and receive control
information, and the other part uses a data transfer process (DTP) to transfer the files. The PI oper-
ates on TCP port 21. Because FTP implements TCP, it is a connection-oriented protocol. However,
FTP can operate with active or passive data connections. An active data connection requires the
client to open a port, send the information to the server, and receive a connection from the server.
Firewalls often do not allow such incoming connections to internal clients. Therefore, a passive
connection is more common because the server opens a port (above 1023) and notifies the client,
and then waits for the client to make an outgoing connection.
E-mail servers provide a place for users to store, retrieve, and send e-mail. An e-mail client
retrieves e-mail from the server and sends e-mail to the server. When an e-mail server receives an
e-mail to send, it uses DNS (as a mail exchager [MX] record) to determine the location of the des-
tination e-mail server and then transmits the e-mail. The information in an e-mail address after the
@ symbol identifies the server. The e-mail reaches its final destination when the e-mail client of
the intended recipient requests it. E-mail clients and servers implement the following protocols:
■ E-mail clients use Simple Mail Transfer Protocol (SMTP) to send e-mail to their server,
and the server in turn uses SMTP to transfer the e-mail to its destination. SMTP requires the
proper message format (header and body) and a running SMTP process on both client and
server. SMTP operates on TCP port 25. A server makes repeated attempts to transfer an e-
mail and then returns the e-mail as undeliverable after a specified period of time.
■ Post Office Protocol version 3 (POP3) allows an e-mail client to retrieve e-mail on
TCP port 110. The messages are downloaded to the client and typically are removed from the
server.
■ Internet Message Access Protocol (IMAP4) allows an e-mail client to retrieve e-mail on
port 143. IMAP4 leaves a copy of the e-mail on the server and allows the client to organize
the e-mails on the server. The copies of the e-mails on the server allow for a centralized
location and backup for all e-mails.
18 31 Days Before Your CCENT Certification

Describe the Impact of Applications


(Voice over IP and Video over IP) on a
Network
Simply put, video and voice add traffic to your network—lots of traffic. You can improve the
performance of these services with powerful, more reliable hardware and some tweaks at the
transport layer. This section explains Layer 1 and Layer 4 considerations for voice and video on
your network using Chapters 3 and 7 of CCNA Discovery 2.

CCNA Discovery 2, Chapter 3


3.3.6: To remain reliable, your network design should take into account the need for backup power
and redundant connections. You should also plan your Layer 3 topology by keeping in mind the
type of applications you choose. IP phones and cameras require an IP address, so your IP address-
ing scheme should allow for these devices in addition to your host. Days 20 and 18 further discuss
Layer 3 IP addressing and design.

CCNA Discovery 2, Chapter 7


7.1.2: Reliability is measured by the mean time between failures (MTBF) and mean time to repair
(MTTR). You can prevent failures and increase your uptime by purchasing redundant hardware
that is capable of the services you agree to provide your users. Reliable redundant hardware
increases the availability of network services and guarantees the uptime necessary for critical
business services such as IP telephony. As an Internet service provider (ISP), you would need to
ensure that your equipment and services live up to the promise you make to your clients; this is
often called a service level agreement (SLA).
7.2.4: The transport layer protocols TCP and UDP include headers in each segment that can
identify the application that is using the session. The transport layer protocols enable simultaneous
sessions from different applications. The port numbers in each segment header can identify the
type of application; for example, a segment destined for port 80 is likely a request to a web server.
TCP and UDP can place these segments in a separate queue for each specific application, based on
the port identified, allowing multiple applications to maintain sessions at the same time.
Just as HTTP is typically assigned to port 80, many well-known applications have assignments to
well-known ports. The range for these well-known or registered ports is 0 to 1023; applications
use these ports as destination ports. However, a client dynamically selects a port as the source of
the communication from the port range 1024 to 65535. An example is a web browser that requests
a web page. The browser would use port 80 as the destination port (the typical web server port)
and would choose a dynamic port in the higher range to list as the source port for return communi-
cation. As mentioned previously, the combination of a port and Layer 3 IP address creates a
socket. A socket for a web server at the IP address 10.0.0.25 would be 10.0.0.25:80 (port 80 for
HTTP). Many newer network devices allow you to watch, measure, filter, and even prioritize
Day 29 19

traffic based on the port (and application) identified in each segment. A streaming voice or video
connection may require higher overhead and a higher priority than applications that can occur in
spurts, such as data loaded from a web page.

Summary
Protocols at the application layer define what services you can access on a network. The protocols
at the following layers define how, when, where, and how quickly the information can be sent and
received. A web page or file can be sent in sporadic spurts over a network, but voice and video
require a more steady, reliable, and, frankly, expensive connection. You can further review the
topics from today on pages 39–68 of CCNA Flash Cards and Exam Practice Pack (CCENT Exam
640-822 and CCNA Exams 640-816 and 640-802), Third Edition.

Your Notes
This page intentionally left blank
Discovering Diverse Content Through
Random Scribd Documents
Chapter Twenty-seven

THE GRAND REVIEW

Tilly Titter flew as she never flew before and in a short time she
landed on the ground beside the shoe house, her feathers all ruffled
up with excitement.
“I’ve got news,” she shouted, as the little women gathered about
her. “I’ve just come from the General and the army will be home in
about three days.”
“Is my husband well?” shouted Mrs. Lover.
“He’s as healthy as a dandelion and as pink as a rose bud,”
answered Tilly.
“How’s the Poet and the Lady of Fashion?” asked Grandpa.
“Well and ’appy,” cried Tilly. “As I was a sayin’, the army will be
’ome in about three days. The General said to tell you that they
would arrive on Friday afternoon if everthing goes well. He says for
you to have a good supper ready for the boys and to have plenty, for
they will be as hungry as young robins.”
“Is the Sailor getting along nicely?” asked Miss Guff.
“Fine as a fiddle! Fine as a fiddle!” answered the sparrow. “Wants
to walk, ’e’s feelin’ so well, but the Doctor makes ’im stay in the litter
and ride.”
“Well, we have got to get busy and do somethin’ for the boys,”
cried Grandpa. “We’ve got to give ’em a big feed and decorate the
place with flags and show ’em we’re glad to see ’em.”
“We’ll get up a grand supper for them,” cried Mrs. Lover, “and we’ll
have a dance afterwards.”
“I’ll bring over a big chunk of cheese,” cried the mouse that had
joined the crowd.
“I’ll get some fat worms for the supper,” cried Tilly, and instantly
she blushed a deep brown. “Oh, I forget you don’t eat worms. Well,
I’ll get some sunflower seeds.”
“I’ll donate a few nuts,” said Nick, the squirrel, who had been
hoping for a chance to speak.
“Oh, I forgot to say that the General said ’e would come in ahead
of the army so ’e could review them as they marched into the
village,” cried Tilly.
“He’s going to review the troops, did you say?” asked Grandpa,
who was hard of hearing.
“Yes!” shouted Tilly, right into the old gentleman’s ear. “The
General is goin’ to review the army.”
“Well, we got to get a reviewing stand ready for him,” cried
Grandpa.
“I’ll help,” shouted the mouse, “and I’ll get some mice to help,
too.”
“All right, get ’em!” cried Grandpa. “The sooner we get to work the
better it will be.”
In a short time the Teenie Weenies were as busy as bees in a
clover field. The little women set to work cooking and baking. They
made cakes and cookies by the thimble full. They made ginger
cookies, nut cookies, chocolate cake, fruit cake and half an English
walnut full of doughnuts, besides all sorts of other good things.
Grandpa put eight mice, a chipmunk and half a dozen bugs to
work getting the place ready for the returning soldiers. They cleaned
up the rubbish under the rose-bush, they moved all the desks out of
the schoolhouse, where the dinner and dance were to be held, and
they made a reviewing stand out of the top of a candy box.
Nick, the squirrel, worked hard opening nuts. He gnawed so many
his teeth became sore, but he never complained, for he was a very
patriotic squirrel and most fond of the Teenie Weenies.
The little folks decorated the village with Teenie Weenie flags and
bunting and when the time arrived for the army to march home the
village was crowded with all sorts of visitors. Bugs, mice, squirrels,
birds, chipmunks, and even a few chickens and ducks, crowded
under the rose-bush.
The General rode in ahead of the army and took his place on the
reviewing stand amid the wildest shouting and waving of flags, but
when the troops came marching into view there was such a
squealing of squirrels and mice and squawking of chickens, ducks
and birds, one could hardly hear oneself think. Grandpa shouted so
hard that he had one of his choking fits, and a mouse had to pound
him on the back until he could get his breath.
When the review was over there was much hugging and kissing
and some crying, for most of the little women shed a few tears of
happiness, but that’s a strange way women folks have of showing
they are happy. One old hen cried so hard she had to be led away. A
duck insisted on kissing the Dunce and a mouse hugged Paddy Pinn
so hard it nearly broke his arm.
After the little soldiers had visited for a time they were called into
the old derby hat for supper and such a supper as they had! There
was roasted bird’s egg, frog ham, escalloped hickory nut, walnut au
gratin, creamed hearts of sunflower seed, water cress and wild
cherry salad, and cakes and cookies and sliced grape and ice cream.
When the little soldiers had eaten until they could not hold
another morsel, the General arose from his seat at the head of the
big table and made a speech.
“Friends and men of the Teenie Weenie army,” he began, “I want
to thank you for your loyal and hearty service. You have gone
through hardships and you have risked your lives in battle without
complaint. You have done this to aid those in trouble and nothing
greater can be said of your deeds than that they were done willingly.
Men, I am proud to have been your leader.”
“Three cheers for the army!” shouted a mouse who had been
helping to wait on table, and the cheers were given with a will.
Next the Lady of Fashion made a little speech. She very prettily
thanked the General and the army for having rescued the Poet and
herself from the wild men and as she sat down there were tears in
her pretty eyes. The Poet spoke and Grandpa made a speech about
the great war in forty-two, but few heard what the old gentleman
said, for they were anxious to talk to one another about the great
events of the rescue of their friends.
“Friends!” shouted Paddy Pinn, when Grandpa had sat down, “I
think the Dunce ought to explain to the rest of us just why that old
duck was so anxious to kiss him.” Every one yelled so loudly for the
Dunce that he was forced to stand up, but he was so embarrassed
he couldn’t speak a word and the Teenie Weenies laughed so hard
they cried.
When the tables had been cleared away the orchestra started
playing and in a few minutes the little folks were swinging around to
the music of “The Lady of Fashion Waltz.” They danced until nearly
morning—in fact it was broad daylight when the tired little soldiers
crawled into their tiny beds, every one of them mighty thankful that
they were safely home again.
“The war is over, our duty is done;
Hang up the pistol, the sword and the gun.”

Rufus Rhyme,
Teenie Weenie Poet.
Transcriber’s Notes:
Missing or obscured punctuation was silently
corrected.
Typographical errors were silently corrected.
Inconsistent spelling and hyphenation were
made consistent only when a predominant
form was found in this book.
*** END OF THE PROJECT GUTENBERG EBOOK THE TEENIE
WEENIES IN THE WILDWOOD ***

Updated editions will replace the previous one—the old editions


will be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States
copyright in these works, so the Foundation (and you!) can copy
and distribute it in the United States without permission and
without paying copyright royalties. Special rules, set forth in the
General Terms of Use part of this license, apply to copying and
distributing Project Gutenberg™ electronic works to protect the
PROJECT GUTENBERG™ concept and trademark. Project
Gutenberg is a registered trademark, and may not be used if
you charge for an eBook, except by following the terms of the
trademark license, including paying royalties for use of the
Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such
as creation of derivative works, reports, performances and
research. Project Gutenberg eBooks may be modified and
printed and given away—you may do practically ANYTHING in
the United States with eBooks not protected by U.S. copyright
law. Redistribution is subject to the trademark license, especially
commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the


free distribution of electronic works, by using or distributing this
work (or any other work associated in any way with the phrase
“Project Gutenberg”), you agree to comply with all the terms of
the Full Project Gutenberg™ License available with this file or
online at www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand,
agree to and accept all the terms of this license and intellectual
property (trademark/copyright) agreement. If you do not agree
to abide by all the terms of this agreement, you must cease
using and return or destroy all copies of Project Gutenberg™
electronic works in your possession. If you paid a fee for
obtaining a copy of or access to a Project Gutenberg™
electronic work and you do not agree to be bound by the terms
of this agreement, you may obtain a refund from the person or
entity to whom you paid the fee as set forth in paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only


be used on or associated in any way with an electronic work by
people who agree to be bound by the terms of this agreement.
There are a few things that you can do with most Project
Gutenberg™ electronic works even without complying with the
full terms of this agreement. See paragraph 1.C below. There
are a lot of things you can do with Project Gutenberg™
electronic works if you follow the terms of this agreement and
help preserve free future access to Project Gutenberg™
electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright
law in the United States and you are located in the United
States, we do not claim a right to prevent you from copying,
distributing, performing, displaying or creating derivative works
based on the work as long as all references to Project
Gutenberg are removed. Of course, we hope that you will
support the Project Gutenberg™ mission of promoting free
access to electronic works by freely sharing Project Gutenberg™
works in compliance with the terms of this agreement for
keeping the Project Gutenberg™ name associated with the
work. You can easily comply with the terms of this agreement
by keeping this work in the same format with its attached full
Project Gutenberg™ License when you share it without charge
with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.

1.E. Unless you have removed all references to Project


Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project
Gutenberg™ work (any work on which the phrase “Project
Gutenberg” appears, or with which the phrase “Project
Gutenberg” is associated) is accessed, displayed, performed,
viewed, copied or distributed:

This eBook is for the use of anyone anywhere in the United


States and most other parts of the world at no cost and
with almost no restrictions whatsoever. You may copy it,
give it away or re-use it under the terms of the Project
Gutenberg License included with this eBook or online at
www.gutenberg.org. If you are not located in the United
States, you will have to check the laws of the country
where you are located before using this eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is


derived from texts not protected by U.S. copyright law (does not
contain a notice indicating that it is posted with permission of
the copyright holder), the work can be copied and distributed to
anyone in the United States without paying any fees or charges.
If you are redistributing or providing access to a work with the
phrase “Project Gutenberg” associated with or appearing on the
work, you must comply either with the requirements of
paragraphs 1.E.1 through 1.E.7 or obtain permission for the use
of the work and the Project Gutenberg™ trademark as set forth
in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is


posted with the permission of the copyright holder, your use and
distribution must comply with both paragraphs 1.E.1 through
1.E.7 and any additional terms imposed by the copyright holder.
Additional terms will be linked to the Project Gutenberg™
License for all works posted with the permission of the copyright
holder found at the beginning of this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files
containing a part of this work or any other work associated with
Project Gutenberg™.

1.E.5. Do not copy, display, perform, distribute or redistribute


this electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the
Project Gutenberg™ License.

1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must,
at no additional cost, fee or expense to the user, provide a copy,
a means of exporting a copy, or a means of obtaining a copy
upon request, of the work in its original “Plain Vanilla ASCII” or
other form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™
works unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or


providing access to or distributing Project Gutenberg™
electronic works provided that:

• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt
that s/he does not agree to the terms of the full Project
Gutenberg™ License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project


Gutenberg™ electronic work or group of works on different
terms than are set forth in this agreement, you must obtain
permission in writing from the Project Gutenberg Literary
Archive Foundation, the manager of the Project Gutenberg™
trademark. Contact the Foundation as set forth in Section 3
below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on,
transcribe and proofread works not protected by U.S. copyright
law in creating the Project Gutenberg™ collection. Despite these
efforts, Project Gutenberg™ electronic works, and the medium
on which they may be stored, may contain “Defects,” such as,
but not limited to, incomplete, inaccurate or corrupt data,
transcription errors, a copyright or other intellectual property
infringement, a defective or damaged disk or other medium, a
computer virus, or computer codes that damage or cannot be
read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except


for the “Right of Replacement or Refund” described in
paragraph 1.F.3, the Project Gutenberg Literary Archive
Foundation, the owner of the Project Gutenberg™ trademark,
and any other party distributing a Project Gutenberg™ electronic
work under this agreement, disclaim all liability to you for
damages, costs and expenses, including legal fees. YOU AGREE
THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE, STRICT
LIABILITY, BREACH OF WARRANTY OR BREACH OF CONTRACT
EXCEPT THOSE PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE
THAT THE FOUNDATION, THE TRADEMARK OWNER, AND ANY
DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE
TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL,
PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE
NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you


discover a defect in this electronic work within 90 days of
receiving it, you can receive a refund of the money (if any) you
paid for it by sending a written explanation to the person you
received the work from. If you received the work on a physical
medium, you must return the medium with your written
explanation. The person or entity that provided you with the
defective work may elect to provide a replacement copy in lieu
of a refund. If you received the work electronically, the person
or entity providing it to you may choose to give you a second
opportunity to receive the work electronically in lieu of a refund.
If the second copy is also defective, you may demand a refund
in writing without further opportunities to fix the problem.

1.F.4. Except for the limited right of replacement or refund set


forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’,
WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of
damages. If any disclaimer or limitation set forth in this
agreement violates the law of the state applicable to this
agreement, the agreement shall be interpreted to make the
maximum disclaimer or limitation permitted by the applicable
state law. The invalidity or unenforceability of any provision of
this agreement shall not void the remaining provisions.

1.F.6. INDEMNITY - You agree to indemnify and hold the


Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and
distribution of Project Gutenberg™ electronic works, harmless
from all liability, costs and expenses, including legal fees, that
arise directly or indirectly from any of the following which you
do or cause to occur: (a) distribution of this or any Project
Gutenberg™ work, (b) alteration, modification, or additions or
deletions to any Project Gutenberg™ work, and (c) any Defect
you cause.

Section 2. Information about the Mission


of Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new
computers. It exists because of the efforts of hundreds of
volunteers and donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project
Gutenberg™’s goals and ensuring that the Project Gutenberg™
collection will remain freely available for generations to come. In
2001, the Project Gutenberg Literary Archive Foundation was
created to provide a secure and permanent future for Project
Gutenberg™ and future generations. To learn more about the
Project Gutenberg Literary Archive Foundation and how your
efforts and donations can help, see Sections 3 and 4 and the
Foundation information page at www.gutenberg.org.

Section 3. Information about the Project


Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-
profit 501(c)(3) educational corporation organized under the
laws of the state of Mississippi and granted tax exempt status
by the Internal Revenue Service. The Foundation’s EIN or
federal tax identification number is 64-6221541. Contributions
to the Project Gutenberg Literary Archive Foundation are tax
deductible to the full extent permitted by U.S. federal laws and
your state’s laws.

The Foundation’s business office is located at 809 North 1500


West, Salt Lake City, UT 84116, (801) 596-1887. Email contact
links and up to date contact information can be found at the
Foundation’s website and official page at
www.gutenberg.org/contact
Section 4. Information about Donations to
the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission
of increasing the number of public domain and licensed works
that can be freely distributed in machine-readable form
accessible by the widest array of equipment including outdated
equipment. Many small donations ($1 to $5,000) are particularly
important to maintaining tax exempt status with the IRS.

The Foundation is committed to complying with the laws


regulating charities and charitable donations in all 50 states of
the United States. Compliance requirements are not uniform
and it takes a considerable effort, much paperwork and many
fees to meet and keep up with these requirements. We do not
solicit donations in locations where we have not received written
confirmation of compliance. To SEND DONATIONS or determine
the status of compliance for any particular state visit
www.gutenberg.org/donate.

While we cannot and do not solicit contributions from states


where we have not met the solicitation requirements, we know
of no prohibition against accepting unsolicited donations from
donors in such states who approach us with offers to donate.

International donations are gratefully accepted, but we cannot


make any statements concerning tax treatment of donations
received from outside the United States. U.S. laws alone swamp
our small staff.

Please check the Project Gutenberg web pages for current


donation methods and addresses. Donations are accepted in a
number of other ways including checks, online payments and
credit card donations. To donate, please visit:
www.gutenberg.org/donate.

Section 5. General Information About


Project Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could
be freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose
network of volunteer support.

Project Gutenberg™ eBooks are often created from several


printed editions, all of which are confirmed as not protected by
copyright in the U.S. unless a copyright notice is included. Thus,
we do not necessarily keep eBooks in compliance with any
particular paper edition.

Most people start at our website which has the main PG search
facility: www.gutenberg.org.

This website includes information about Project Gutenberg™,


including how to make donations to the Project Gutenberg
Literary Archive Foundation, how to help produce our new
eBooks, and how to subscribe to our email newsletter to hear
about new eBooks.
Welcome to Our Bookstore - The Ultimate Destination for Book Lovers
Are you passionate about books and eager to explore new worlds of
knowledge? At our website, we offer a vast collection of books that
cater to every interest and age group. From classic literature to
specialized publications, self-help books, and children’s stories, we
have it all! Each book is a gateway to new adventures, helping you
expand your knowledge and nourish your soul
Experience Convenient and Enjoyable Book Shopping Our website is more
than just an online bookstore—it’s a bridge connecting readers to the
timeless values of culture and wisdom. With a sleek and user-friendly
interface and a smart search system, you can find your favorite books
quickly and easily. Enjoy special promotions, fast home delivery, and
a seamless shopping experience that saves you time and enhances your
love for reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!

ebookgate.com

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy