56770
56770
com
https://ebookgate.com/product/31-days-before-your-ccent-
certification-cisco-networking-academy-program-1st-edition-
scott-bennett/
OR CLICK BUTTON
DOWLOAD EBOOK
https://ebookgate.com/product/ccna-exploration-course-booklet-lan-
switching-and-wireless-version-4-0-1st-edition-cisco-networking-
academy/
ebookgate.com
https://ebookgate.com/product/31-days-before-your-ccna-exam-a-day-by-
day-review-guide-for-the-ccna-640-802-exam-2nd-edition-allan-johnson/
ebookgate.com
https://ebookgate.com/product/ccent-certification-all-in-one-for-
dummies-1st-edition-glen-e-clarke/
ebookgate.com
Make Technology on Your Time Volume 31 1st Edition Mark
Frauenfelder
https://ebookgate.com/product/make-technology-on-your-time-
volume-31-1st-edition-mark-frauenfelder/
ebookgate.com
https://ebookgate.com/product/ccna-cisco-certified-network-associate-
study-guide-exam-640-802-certification-press-3rd-edition-richard-deal/
ebookgate.com
https://ebookgate.com/product/data-storage-networking-real-world-
skills-for-the-comptia-storage-certification-and-beyond-1st-edition-
nigel-poulton/
ebookgate.com
Your Career Game How Game Theory Can Help You Achieve Your
Professional Goals 1st Edition Nathan Bennett
https://ebookgate.com/product/your-career-game-how-game-theory-can-
help-you-achieve-your-professional-goals-1st-edition-nathan-bennett/
ebookgate.com
31 Days Before Your
CCENT Certification
Scott Bennett
Cisco Press • 800 East 96th Street • Indianapolis, Indiana 46240 USA
ii 31 Days Before Your CCENT Certification
Feedback Information
At Cisco Press, our goal is to create in-depth technical books of the highest quality and value.
Each book is crafted with care and precision, undergoing rigorous development that involves the
unique expertise of members of the professional technical community.
Reader feedback is a natural continuation of this process. If you have any comments about how we
could improve the quality of this book, or otherwise alter it to better suit your needs, you can con-
tact us through e-mail at feedback@ciscopress.com. Please be sure to include the book title and
ISBN in your message.
Trademark Acknowledgments
All terms mentioned in this book that are known to be trademarks or service marks have been
appropriately capitalized. Cisco Press or Cisco Systems, Inc. cannot attest to the accuracy of this
information. Use of a term in this book should not be regarded as affecting the validity of any
trademark or service mark.
iv 31 Days Before Your CCENT Certification
Dedication
To Grandpa Matt; my loving and supportive parents, Jim and Shari; my energetic and caring sib-
lings, Jimmy, Johnny, Monnie, and Christi; and Pam and George for creating my beloved beautiful
wife, Angie.
vi 31 Days Before Your CCENT Certification
Acknowledgments
First, I want to thank Mary Beth Ray for her help in this process from start to finish. Her ability to
enthusiastically adapt to the ever-changing Cisco certification and Cisco Academy environment
amazes me. Thank you for this remarkable experience and opportunity. Thank you to the entire
Cisco Press team who worked behind the scenes to help create this book.
I also need to thank Matt Schoenfeldt for his continued and contagious eccentric passion about all
things technical. Thanks to Gary Schlienkofer for his work as a regional director and as an instruc-
tor for our local Cisco Networking Academy. I also want to thank my friend Peter Buss for provid-
ing the perspective and empathy of a seasoned network administrator. Finally, I want to thank
Coach Dan Gehn for teaching me the real meaning of the words endurance and dedication.
vii
Contents at a Glance
Part I: Days 31–27 Describe the operation of data networks 1
Day 31 3
Day 30 7
Day 29 13
Day 28 21
Day 27 33
Day 26 39
Day 25 45
Day 24 49
Day 23 53
Day 22 57
Day 21 61
Day 20 67
Day 19 73
Day 18 77
Day 17 81
Day 16 85
Day 15 89
Day 14 93
Day 13 95
Day 12 99
Day 11 105
Day 10 107
viii 31 Days Before Your CCENT Certification
Day 9 111
Day 8 115
Part V: Days 7–6: Explain and select the appropriate administrative tasks
required for a WLAN 119
Day 7 121
Day 6 127
Part VI: Days 5–4: Identify security threats to a network and describe gen-
eral methods to mitigate those threats 131
Day 5 133
Day 4 137
Part VII: Days 3–1: Implement and verify WAN links and review
all days 141
Day 3 143
Day 2 147
Day 1 151
Contents
Day 30: Use the OSI and TCP/IP Models and Their Associated Protocols to Explain
How Data Flows in a Network 7
CCNA Discovery 1, Chapter 6 7
CCNA Discovery 2, Chapter 2 10
Describe Common Networking Applications, Including Web Applications 11
CCNA Discovery 1, Chapter 1 11
Summary 11
Your Notes 12
Day 29: Describe the Purpose and Basic Operation of the Protocols in the OSI and
TCP Models 13
CCNA Discovery 1, Chapter 3 13
CCNA Discovery 1, Chapter 6 14
CCNA Discovery 2, Chapter 7 15
Describe the Impact of Applications (Voice over IP and Video over IP) on a
Network 18
CCNA Discovery 2, Chapter 3 18
CCNA Discovery 2, Chapter 7 18
Summary 19
Your Notes 19
x 31 Days Before Your CCENT Certification
Day 27: Identify and Correct Common Network Problems at Layers 1, 2, 3, and 7
Using a Layered Model Approach 33
CCNA Discovery 1, Chapter 9 33
CCNA Discovery 2, Chapter 2 34
Differentiate Between LAN/WAN Operation and Features 35
CCNA Discovery 1, Chapter 3 35
CCNA Discovery 1, Chapter 4 35
CCNA Discovery 2, Chapter 5 35
Summary 36
Your Notes 36
Day 25: Explain the Technology and Media Access Control Method for Ethernet
Technologies 45
CCNA Discovery 1, Chapter 3 45
Explain Network Segmentation and Basic Traffic Management Concepts 46
CCNA Discovery 1, Chapter 3 47
Summary 47
Your Notes 47
Day 24: Explain the Operation of Cisco Switches and Basic Switching
Concepts 49
CCNA Discovery 1, Chapter 3 49
CCNA Discovery 2, Chapter 3 50
CCNA Discovery 2, Chapter 5 50
Summary 50
Your Notes 51
Day 23: Perform, Save, and Verify Initial Switch Configuration Tasks, Including
Remote-Access Management 53
CCNA Discovery 2, Chapter 5 53
Verify Network Status and Switch Operation Using Basic Utilities
(ping, traceroute, Telnet, SSH, ARP, ipconfig, show, and debug
Commands) 55
CCNA Discovery 1, Chapter 9 55
CCNA Discovery 2, Chapter 5 55
Summary 56
Your Notes 56
Day 22: Implement and Verify Basic Security for a Switch (Port Security,
Deactivate Ports) 57
CCNA Discovery 2, Chapter 5 57
Summary 58
Your Notes 59
Day 21: Identify, Prescribe, and Resolve Common Switched Network Issues,
Autonegotiation, and Switch Hardware Failures 61
CCNA Discovery 1, Chapter 9 61
CCNA Discovery 2, Chapter 2 61
CCNA Discovery 2, Chapter 5 61
Summary 62
Your Notes 63
xii 31 Days Before Your CCENT Certification
Day 19: Assign and Verify Valid IP Addresses to Hosts, Servers, and Networking
Devices in a LAN 73
CCNA Discovery 1, Chapter 2 73
CCNA Discovery 1, Chapter 5 73
CCNA Discovery 2, Chapter 5 74
Summary 74
Your Notes 75
Day 18: Explain the Basic Uses and Operation of NAT in a Small Network
Connecting to One ISP 77
CCNA Discovery 1, Chapter 5 77
CCNA Discovery 2, Chapter 4 77
CCNA Discovery 2, Chapter 5 79
Summary 80
Your Notes 80
Day 16: Describe the Operation and Benefits of Using Private and Public IP
Addressing 85
CCNA Discovery 1, Chapter 5 85
Enable NAT for a Small Network with a Single ISP and Connection Using SDM,
and Verify Operation Using CLI and Ping 86
xiii
Day 15: Configure, Verify, and Troubleshoot DHCP and DNS Operation on a Router
(Including CLI/SDM) 89
CCNA Discovery 1, Chapter 5 89
CCNA Discovery 2, Chapter 5 90
Summary 91
Your Notes 91
Day 14: Implement Static and Dynamic Addressing Services for Hosts in a LAN
Environment 93
CCNA Discovery 1, Chapter 2 93
CCNA Discovery 1, Chapter 5 93
Summary 94
Your Notes 94
Day 10: Access and Use the Router CLI to Set Basic Parameters 107
CCNA Discovery 2, Chapter 5 107
Connect, Configure, and Verify the Operation Status of a Device Interface 108
CCNA Discovery 2, Chapter 5 108
Verify Device Configuration and Network Connectivity Using ping, traceroute,
Telnet, SSH, or Other Utilities 109
CCNA Discovery 2, Chapter 5 110
Summary 110
Your Notes 110
Day 9: Perform and Verify Routing Configuration Tasks for a Static or Default
Route Given Specific Routing Requirements 111
CCNA Discovery 2, Chapter 5 111
CCNA Discovery 2, Chapter 6 111
Manage IOS Configuration Files (Save, Edit, Upgrade, Restore) 112
CCNA Discovery 2, Chapter 5 112
Manage Cisco IOS 113
CCNA Discovery 2, Chapter 5 113
Implement Password and Physical Security 113
CCNA Discovery 2, Chapter 3 113
CCNA Discovery 2, Chapter 5 113
Summary 114
Your Notes 114
Day 8: Verify Network Status and Router Operation Using Basic Utilities (ping,
traceroute, Telnet, SSH, ARP, ipconfig, show, and debug Commands) 115
CCNA Discovery 1, Chapter 9 115
CCNA Discovery 2, Chapter 5 115
CCNA Discovery 2, Chapter 6 116
Summary 116
Your Notes 117
xv
Day 6: Compare and Contrast Wireless Security Features and Capabilities of WPA
Security (Including Open, WEP, WPA1/2) 127
CCNA Discovery 1, Chapter 7 127
CCNA Discovery 2, Chapter 8 128
Identify Common Issues with Implementing Wireless Networks 129
CCNA Discovery 1, Chapter 7 129
CCNA Discovery 1, Chapter 9 129
Summary 130
Your Notes 130
Part VII: Days 3–1: Implement and verify WAN links and review
all days 141
Day 3: Describe Different Methods of Connecting to a WAN 143
CCNA Discovery 2, Chapter 5 143
Configure and Verify a Basic WAN Serial Connection 144
CCNA Discovery 2, Chapter 5 144
Summary 145
Your Notes 145
Day 2 147
CCNA Discovery 1 Packet Tracer Activity Checklist 147
CCNA Discovery 2 Packet Tracer Activity Checklist 147
Summary 148
Your Notes 149
Day 1: Review Detail Charts, Lists, and Concepts from Previous Days 151
Day 31: Network Components and Operation 151
Day 30: Layered Model Applications 152
Day 29: Layered Model Protocols and Their Purposes 152
Day 28: Network Diagrams and Components 154
Day 27: Troubleshooting and LAN Versus WAN 155
Day 26: Network Physical Media 156
Day 25: Media Access Control and Segmentation 157
Day 24: Switch Operation 157
Day 23: Switch Configuration 158
xvii
Introduction
31 Days Before Your CCENT Certification represents the end of your adventure through the Cisco
Networking Academy CCNA Discovery courses. It’s time to pass the ICND1 640-822 exam and
make your knowledge official. You owe it to yourself to complete your current Cisco Networking
Academy studies with a CCENT certification. This book essentially provides a bridge between the
Cisco Networking Academy curriculum and the CCENT (ICND1) exam. Each day breaks down
each exam topic into a manageable bite using short summaries from the online curriculum. Use
this book and its organized course of study to take the guesswork out of your comprehensive
Networking Academy review for the CCENT.
Study Tips
It might help to buy a whiteboard. Get a dry-erase marker and fill the room with that awful scent
while you diagram and teach yourself each concept. Teach out loud. Teach whoever will listen.
Most important, you need to inject yourself into this information. Your desire to get a CCENT and
understand these concepts will shine through on test day. If you cannot explain and diagram an
objective, you do not know it. The real test happens when your boss asks you to explain a net-
working concept or to defend your suggestion in a meeting. The following activities can also help
you prepare:
■ Podcast audio discussions about CCENT topics.
■ Capture video lessons of yourself, and watch them or place them online for others.
■ For every hour that you study, donate a set amount to a children’s hospital. Ask friends to
sponsor you.
■ Blog what you are learning.
■ Get a copy of CCNA Flash Cards and Exam Practice Pack, and tackle the suggested readings
and practice exams for each day.
xxii 31 Days Before Your CCENT Certification
Exam Topics
The topics of the CCENT (ICND1 640-822) exam focus on the following seven key categories:
■ Describe network operation: The topics in this category relate to the theory and concepts
behind networks, including layered models, protocols, and topologies.
■ Implement a switched network: This category asks you to connect, configure, and secure a
switched network.
■ Implement an IP addressing scheme: This category asks you to describe subnetting, NAT,
DHCP, DNS, and IP addressing-related tasks on a network.
■ Implement a routed network: This category asks you to connect, configure, and secure a
router on a network.
■ Explain and select administrative tasks for a WLAN: This category is where you prove
that you understand the different WLAN standards and necessary parameters to configure on
a WLAN.
■ Identify and mitigate security threats: This category asks you to describe common network
vulnerabilities and how to protect your users and data.
■ Implement and verify WAN links: This category asks you to describe WAN connections and
configure a basic WAN serial connection.
Each category includes general exam topics. In this book, similar CCENT (ICND1) exam topics
are grouped into a single day and are explained using the information you have learned in the
CCNA Discovery courses.
Although Cisco outlines general exam topics, it is possible that not all topics will appear on the
CCENT (ICND1) exam and that topics that are not specifically listed may appear on the exam.
The exam topics provided by Cisco and included in this book are a general framework for exam
preparation. Be sure to check Cisco.com and look at the latest exam topics. You can navigate to
CCENT information through the Training and Events link.
xxiii
Exam Format
For the CCENT (ICND1) exam, you are allowed 90 minutes to answer 50 to 60 questions.
Table I-1 outlines each type of question that you might encounter on the exam.
Cisco.com has an exam tutorial that simulates each of these types of questions. As you work
through the exam tutorial, identify the question types that will take you longer to complete so that
you can manage your time on exam day. The following steps allow you to access this tutorial:
Item Notes
Legal name
Social security or passport number
Cisco certification ID or test ID
Cisco Academy username Required for your voucher
You can register for an exam up to six weeks in advance or as late as the day before the exam. If
you had an account with the Pearson VUE before you began with the Networking Academy, it is
important to ensure that your profile is updated with your Academy information for the Academy
voucher before you register. You can contact Pearson VUE as shown in Table I-3 to register for an
exam. The process and available test times vary based on the local testing center you choose.
There is no better motivation for study than an actual test date. Sign up as soon as you have your
voucher.
Part I
Days 31–27: Describe the
operation of data networks
Day 31 covers network components and operation
Hub Typically installed in a Ethernet networking device with multiple ports that
LAN at the access layer simply regenerates a signal it receives on one port to all
other ports. All devices are on the same channel and share
that channel’s bandwidth. If two devices send a message at
the same time, a collision occurs.
Switch Used at the access layer Multiport networking device that looks at the destination
physical address of a received frame on one port to forward
the frame to the port where the host is connected. Hosts
communicate through temporary circuits, avoiding
collisions. A bridge is essentially a two-port switch an
administrator could use to divide a large, hub-based
collision domain. Recent network installations implement
switches rather than hubs and a bridge.
Summary
The information covered today provides a brief overview of the key components of a network.
When you sit in front of a desktop to send an e-mail, your transmission passes through physical
media, then to a hub or switch, then to a router, and lastly to a server, where it sits until requested
by the recipient. Days 30 and 29 describe the software and protocols used by these networking
devices to transmit, forward, and route this information. If you have a copy of the CCNA Flash
Cards and Exam Practice Pack (CCENT Exam 640-822 and CCNA Exams 640-816 and 640-802),
Third Edition, you can further review the topics from today on pages 5–36.
Your Notes
This page intentionally left blank
Day 30
Use the OSI and TCP/IP Models
and Their Associated Protocols
to Explain How Data Flows in a
Network
A layered model provides the foundation for your understanding of networks. The stronger you
build this foundation, the more information you will be able to easily learn and retain. When you
learn, teach, troubleshoot, and tackle network configuration, the Open Systems Interconnection
(OSI) model and the Transmission Control Protocol/Internet Protocol (TCP/IP) model should
guide your plan of attack. Not surprisingly, the CCENT exam tests your ability to describe net-
works using a layered model. This section includes topics covered in Chapter 6 of CCNA
Discovery 1 and Chapter 2 of CCNA Discovery 2.
Table 30-1 TCP/IP Model and Corresponding Protocol Data Units (PDU)
6.3.2: The following steps take you through the flow of data through a network using the TCP/IP
model protocol stack as a reference:
1. You start at the top of the protocol stack with the application layer. For example, you use a
network application such as a web browser to make a Hypertext Transfer Protocol (HTTP)
request for a web page.
2. At the transport layer, the request is broken down and encapsulated into a Transmission
Control Protocol (TCP) segment and is given a header identifying the source port, destination
port, and sequence number. Some applications at the transport layer use the faster, less
reliable User Datagram Protocol (UDP).
3. At the Internet layer, the TCP segments are encapsulated into Internet Protocol (IP) packets
and are given an IP header with a source and destination IP address.
4. The network access layer uses the Ethernet protocol to encapsulate the packets into frames.
Each frame has a header including a source and destination media access control (MAC)
address, as well as a cyclical redundancy check (CRC) field at the end of the frame to verify
proper transmission. In this layer, the frames are also encoded into bits and are sent electroni-
cally over the medium by the network interface card (NIC).
5. After the bits cross the physical medium and arrive at the destination, they are de-
encapsulated up the protocol stack until the data reaches the application. In this case, the
HTTP request would reach the server application, and it would respond with web data and
start the process again.
6.3.3: Another reference model for network communication, the OSI model, was created in 1984
by the International Organization for Standardization (ISO). Unlike the TCP/IP model, which
focuses on the TCP and IP protocols used on the Internet, the OSI model divides all network
communication (not just TCP/IP) into seven layers. The OSI seven-layer model provides the same
benefits of standardization and independent compatibility as mentioned previously for the TCP/IP
layered model. Table 30-2 describes the OSI model and the associated protocols and PDUs for
each layer.
Day 30 9
Table 30-3 shows the headers for an Ethernet frame and the encapsulated headers for an IP packet
and TCP segment included in the frame. The table also identifies the OSI layer and protocol relat-
ed to the headers.
Table 30-4 compares the layers of the OSI model and the TCP/IP model.
7 Software applications that provide services such as Host and network software
Domain Name System (DNS), File Transfer Protocol
(FTP), Dynamic Host Configuration Protocol (DHCP),
Simple Network Management Protocol (SNMP),
Telnet, and HTTP.
6 Encrypt and encode (or represent) data in a standard Host and network software
format such as Secure Socket Layer (SSL), American
Standard Code for Information Interchange (ASCII), and
Multipurpose Internet Mail Extensions (MIME). Shells and
redirectors also operate at this layer.
5 Set up and tear down sessions between hosts. Remote Host and network software
Procedure Calls (RPC), NetBIOS, Structured Query
Language (SQL) connections, and Application Program
Interfaces (API) operate at this layer.
4 Data encoded by the upper layers is broken into segments Firewalls video and voice
that receive either Transmission Control Protocol (TCP) or appliances
User Datagram Protocol (UDP) headers. These protocols
deal with the flow of the data and sequence of the segments.
1 The Layer 2 frames are encoded into bits, represented as Repeaters hubs, cables, and
electrical signals, light waves, or radio waves, and are wireless
transmitted over cables (copper or fiber-optic) or the air
(radio waves).
Day 30 11
Summary
The seven-layer OSI model and four-layer TCP/IP model provide a map for the processes of for-
matting, encapsulating, addressing, encoding, and transmitting data over a network. First, a net-
work application creates data for transmission. Next, the data moves through the OSI layers as seg-
ments, packets, frames, and finally bits to be transferred over the network. The receiving device
rebuilds the data in reverse, and the receiving network application presents the data to the user.
Many protocols are implemented during this communication. Day 29 focuses on the protocols
used in the OSI and TCP/IP layered models and the impact of some network applications on a net-
work. You can further review the topics from today on pages 5–36 of CCNA Flash Cards and
Exam Practice Pack (CCENT Exam 640-822 and CCNA Exams 640-816 and 640-802), Third
Edition.
12 31 Days Before Your CCENT Certification
Your Notes
Day 29
Describe the Purpose and Basic
Operation of the Protocols in the
OSI and TCP Models
From the physical standards for speed to the application requirements to request a web page, pro-
tocols standardize network communication. Each layer of the OSI and TCP/IP models contains
protocols that define communication inside that layer and with neighboring layers. When, how,
how much, and how often information can be sent is covered in Chapters 3 and 6 of CCNA
Discovery 1 and Chapter 7 of CCNA Discovery 2.
Standard Description
Dix standard Digital Intel and Xerox standard for 10 Mbps over coaxial cable
IEEE 802.3 10BASE-5 10-Mbps baseband over coaxial cable (thicknet) capable of a
500-meter distance
IEEE 802.3a 10BASE-2 10-Mbps baseband over coaxial cable (thinnet) capable of a
200-meter distance
IEEE 802.3i 10BASE-T 10-Mbps baseband over twisted-pair copper capable of a
100-meter distance
IEEE 802.3j 10BASE-F 10-Mbps baseband over fiber
IEEE 802.3u 100BASE-T 100-Mbps baseband over twisted pair
IEEE 802.3z 1000BASE-X 1 Gigabit per second (Gbps) baseband over fiber
IEEE 802.3an 10G BASE-T 10 Gbps over twisted pair
14 31 Days Before Your CCENT Certification
Application DNS, DHCP, BOOTP, SMTP, POP, IMAP, FTP, TFTP, HTTP, HTTPS
Transport UDP, TCP
Internet IPv4, IPv6, IP (NAT), ARP, ICMP, routing protocols such as RIP, OSPF,
EIGRP, and BGP
Network access PPP, Ethernet
Note that the application, presentation, and session layers of the OSI model define functions in the
application layer of the TCP/IP model. In addition, the data link and physical layers of the OSI
model are represented by the network access layer of the TCP/IP model. The OSI model contains
more defined layers because it is a theoretical guide, whereas the TCP/IP model is based on actual
Internet protocols and standards.
16 31 Days Before Your CCENT Certification
7.2.2: As defined previously, TCP uses acknowledgment and retransmission to increase reliability.
Because TCP maintains a persistent connection, it is also classified as a connection-oriented proto-
col. Conversely, UDP is a connectionless protocol that makes a “best-effort” attempt to send the
information without acknowledgment or retransmission. UDP suits applications such as Internet
radio that can function with short amounts of data loss. TCP works well as a protocol for applica-
tions that require all data to arrive in its original condition, such as e-mail and web applications.
The reduction in speed that occurs as a result of TCP is a decent trade-off when reliable data trans-
fer is important.
TCP and UDP segments are placed in packets at the network layer for transmission. This process,
as mentioned on Day 30, is called encapsulation. At the data link layer, the packets are encapsulat-
ed into frames and then represented as bits at the physical layer. The encapsulation process occurs
in reverse as soon as the bits reach their destination.
TCP requires a three-way handshake to establish a session for communication:
1. The sending host sends a SYN request for a connection. This request also synchronizes the
sequence numbers for segment sending between the two hosts.
2. The destination replies with a SYN-ACK message acknowledging the request and synchro-
nization.
3. The sending host responds with an ACK to complete the connection. The hosts can then com-
municate and send segments reliably.
If any segments are not acknowledged within a specified time, they are retransmitted. These
sequenced segments are assembled by the TCP process and delivered to the upper-layer applica-
tions for de-encapsulation into data.
7.2.3: Table 29-4 describes the differences between TCP and UDP.
7.4.1: Often, ISPs provide to customers application layer services such as HTTP, FTP, SMTP,
POP3, and IMAP4. In addition, an ISP can provide secure services such as HTTPS and SFTP. A
web server provides HTTP and HTTPS, a file server provides FTP, and a mail server provides
POP3 and IMAP4.
Day 29 17
7.4.2–7.4.4: When you set up a web server, you can choose to provide web access through HTTP
or more secure access through HTTPS. HTTP messages are sent in clear text (which is easily
intercepted), whereas HTTPS uses Secure Socket Layer (SSL) to encrypt the data stream. Keep in
mind that HTTPS increases the load on a server, so use it only when necessary. A browser access-
es your server with a request made when a user enters a Uniform Resource Locator (URL). The
URL typically specifies the location of the server and the location of the folder where the informa-
tion is stored on the server.
HTTP also supports proxy services. You can set up a network device to receive all the HTTP
requests on a network and act as a proxy to make the requests to the actual destination. A proxy
server provides increased speed through caching, allows you to filter, and provides better security
because your hosts do not directly identify themselves to the outside world.
FTP is a two-part process. One part uses a protocol interpreter (PI) to send and receive control
information, and the other part uses a data transfer process (DTP) to transfer the files. The PI oper-
ates on TCP port 21. Because FTP implements TCP, it is a connection-oriented protocol. However,
FTP can operate with active or passive data connections. An active data connection requires the
client to open a port, send the information to the server, and receive a connection from the server.
Firewalls often do not allow such incoming connections to internal clients. Therefore, a passive
connection is more common because the server opens a port (above 1023) and notifies the client,
and then waits for the client to make an outgoing connection.
E-mail servers provide a place for users to store, retrieve, and send e-mail. An e-mail client
retrieves e-mail from the server and sends e-mail to the server. When an e-mail server receives an
e-mail to send, it uses DNS (as a mail exchager [MX] record) to determine the location of the des-
tination e-mail server and then transmits the e-mail. The information in an e-mail address after the
@ symbol identifies the server. The e-mail reaches its final destination when the e-mail client of
the intended recipient requests it. E-mail clients and servers implement the following protocols:
■ E-mail clients use Simple Mail Transfer Protocol (SMTP) to send e-mail to their server,
and the server in turn uses SMTP to transfer the e-mail to its destination. SMTP requires the
proper message format (header and body) and a running SMTP process on both client and
server. SMTP operates on TCP port 25. A server makes repeated attempts to transfer an e-
mail and then returns the e-mail as undeliverable after a specified period of time.
■ Post Office Protocol version 3 (POP3) allows an e-mail client to retrieve e-mail on
TCP port 110. The messages are downloaded to the client and typically are removed from the
server.
■ Internet Message Access Protocol (IMAP4) allows an e-mail client to retrieve e-mail on
port 143. IMAP4 leaves a copy of the e-mail on the server and allows the client to organize
the e-mails on the server. The copies of the e-mails on the server allow for a centralized
location and backup for all e-mails.
18 31 Days Before Your CCENT Certification
traffic based on the port (and application) identified in each segment. A streaming voice or video
connection may require higher overhead and a higher priority than applications that can occur in
spurts, such as data loaded from a web page.
Summary
Protocols at the application layer define what services you can access on a network. The protocols
at the following layers define how, when, where, and how quickly the information can be sent and
received. A web page or file can be sent in sporadic spurts over a network, but voice and video
require a more steady, reliable, and, frankly, expensive connection. You can further review the
topics from today on pages 39–68 of CCNA Flash Cards and Exam Practice Pack (CCENT Exam
640-822 and CCNA Exams 640-816 and 640-802), Third Edition.
Your Notes
This page intentionally left blank
Discovering Diverse Content Through
Random Scribd Documents
Chapter Twenty-seven
Tilly Titter flew as she never flew before and in a short time she
landed on the ground beside the shoe house, her feathers all ruffled
up with excitement.
“I’ve got news,” she shouted, as the little women gathered about
her. “I’ve just come from the General and the army will be home in
about three days.”
“Is my husband well?” shouted Mrs. Lover.
“He’s as healthy as a dandelion and as pink as a rose bud,”
answered Tilly.
“How’s the Poet and the Lady of Fashion?” asked Grandpa.
“Well and ’appy,” cried Tilly. “As I was a sayin’, the army will be
’ome in about three days. The General said to tell you that they
would arrive on Friday afternoon if everthing goes well. He says for
you to have a good supper ready for the boys and to have plenty, for
they will be as hungry as young robins.”
“Is the Sailor getting along nicely?” asked Miss Guff.
“Fine as a fiddle! Fine as a fiddle!” answered the sparrow. “Wants
to walk, ’e’s feelin’ so well, but the Doctor makes ’im stay in the litter
and ride.”
“Well, we have got to get busy and do somethin’ for the boys,”
cried Grandpa. “We’ve got to give ’em a big feed and decorate the
place with flags and show ’em we’re glad to see ’em.”
“We’ll get up a grand supper for them,” cried Mrs. Lover, “and we’ll
have a dance afterwards.”
“I’ll bring over a big chunk of cheese,” cried the mouse that had
joined the crowd.
“I’ll get some fat worms for the supper,” cried Tilly, and instantly
she blushed a deep brown. “Oh, I forget you don’t eat worms. Well,
I’ll get some sunflower seeds.”
“I’ll donate a few nuts,” said Nick, the squirrel, who had been
hoping for a chance to speak.
“Oh, I forgot to say that the General said ’e would come in ahead
of the army so ’e could review them as they marched into the
village,” cried Tilly.
“He’s going to review the troops, did you say?” asked Grandpa,
who was hard of hearing.
“Yes!” shouted Tilly, right into the old gentleman’s ear. “The
General is goin’ to review the army.”
“Well, we got to get a reviewing stand ready for him,” cried
Grandpa.
“I’ll help,” shouted the mouse, “and I’ll get some mice to help,
too.”
“All right, get ’em!” cried Grandpa. “The sooner we get to work the
better it will be.”
In a short time the Teenie Weenies were as busy as bees in a
clover field. The little women set to work cooking and baking. They
made cakes and cookies by the thimble full. They made ginger
cookies, nut cookies, chocolate cake, fruit cake and half an English
walnut full of doughnuts, besides all sorts of other good things.
Grandpa put eight mice, a chipmunk and half a dozen bugs to
work getting the place ready for the returning soldiers. They cleaned
up the rubbish under the rose-bush, they moved all the desks out of
the schoolhouse, where the dinner and dance were to be held, and
they made a reviewing stand out of the top of a candy box.
Nick, the squirrel, worked hard opening nuts. He gnawed so many
his teeth became sore, but he never complained, for he was a very
patriotic squirrel and most fond of the Teenie Weenies.
The little folks decorated the village with Teenie Weenie flags and
bunting and when the time arrived for the army to march home the
village was crowded with all sorts of visitors. Bugs, mice, squirrels,
birds, chipmunks, and even a few chickens and ducks, crowded
under the rose-bush.
The General rode in ahead of the army and took his place on the
reviewing stand amid the wildest shouting and waving of flags, but
when the troops came marching into view there was such a
squealing of squirrels and mice and squawking of chickens, ducks
and birds, one could hardly hear oneself think. Grandpa shouted so
hard that he had one of his choking fits, and a mouse had to pound
him on the back until he could get his breath.
When the review was over there was much hugging and kissing
and some crying, for most of the little women shed a few tears of
happiness, but that’s a strange way women folks have of showing
they are happy. One old hen cried so hard she had to be led away. A
duck insisted on kissing the Dunce and a mouse hugged Paddy Pinn
so hard it nearly broke his arm.
After the little soldiers had visited for a time they were called into
the old derby hat for supper and such a supper as they had! There
was roasted bird’s egg, frog ham, escalloped hickory nut, walnut au
gratin, creamed hearts of sunflower seed, water cress and wild
cherry salad, and cakes and cookies and sliced grape and ice cream.
When the little soldiers had eaten until they could not hold
another morsel, the General arose from his seat at the head of the
big table and made a speech.
“Friends and men of the Teenie Weenie army,” he began, “I want
to thank you for your loyal and hearty service. You have gone
through hardships and you have risked your lives in battle without
complaint. You have done this to aid those in trouble and nothing
greater can be said of your deeds than that they were done willingly.
Men, I am proud to have been your leader.”
“Three cheers for the army!” shouted a mouse who had been
helping to wait on table, and the cheers were given with a will.
Next the Lady of Fashion made a little speech. She very prettily
thanked the General and the army for having rescued the Poet and
herself from the wild men and as she sat down there were tears in
her pretty eyes. The Poet spoke and Grandpa made a speech about
the great war in forty-two, but few heard what the old gentleman
said, for they were anxious to talk to one another about the great
events of the rescue of their friends.
“Friends!” shouted Paddy Pinn, when Grandpa had sat down, “I
think the Dunce ought to explain to the rest of us just why that old
duck was so anxious to kiss him.” Every one yelled so loudly for the
Dunce that he was forced to stand up, but he was so embarrassed
he couldn’t speak a word and the Teenie Weenies laughed so hard
they cried.
When the tables had been cleared away the orchestra started
playing and in a few minutes the little folks were swinging around to
the music of “The Lady of Fashion Waltz.” They danced until nearly
morning—in fact it was broad daylight when the tired little soldiers
crawled into their tiny beds, every one of them mighty thankful that
they were safely home again.
“The war is over, our duty is done;
Hang up the pistol, the sword and the gun.”
Rufus Rhyme,
Teenie Weenie Poet.
Transcriber’s Notes:
Missing or obscured punctuation was silently
corrected.
Typographical errors were silently corrected.
Inconsistent spelling and hyphenation were
made consistent only when a predominant
form was found in this book.
*** END OF THE PROJECT GUTENBERG EBOOK THE TEENIE
WEENIES IN THE WILDWOOD ***
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must,
at no additional cost, fee or expense to the user, provide a copy,
a means of exporting a copy, or a means of obtaining a copy
upon request, of the work in its original “Plain Vanilla ASCII” or
other form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
ebookgate.com