CCNA Experiment 19 static and default routesEnvironment: Windows XP , Packet Tracert 5.3Purpose: To understand the use of static routes and default routesDescriptionstatic routing refers to routing information that is manually configured by the network administrator. When the topology of the network or the state of the link changes, it is necessary to manually modify the relevant static routing information in the router. Static routing information is
Tags: cisco CCNA eigrpEIGRPin order to enhance the internal Gateway routing protocol, it can also be called the enhanced Internal Gateway routing protocol. EIGRPcombining the link state and the distance vector type routing protocolCiscoproprietary protocol using a dispersion correction algorithm (DUAL) for fast convergence, you can reduce the bandwidth footprint by not sending periodic routing update information, whileEIGRPThere are three tables: the
Tags: cisco CCNA VLANVLANthe Chinese name is"Virtual local Area network". is a set of logical devices and users, these devices and users are not subject to physical location constraints, can be based on functions, departments and applications and other factors to organize them, communication with each other as if they are in the same network segment, hence the name of the virtual local area network. VLANwork inOSIthe Reference Model2Layer and Section3
Tags: Cisco CCNA device Basic Configuration1. Define a host name for the routerrouter>enable \ \ Enter Privileged modeRouter#configure terminal \ \ Enter global configuration modeRouter (config) #hostname R1 \ \ Change the router nameR1 (config) #The default router name is "Router", which can be used to differentiate the device from the network for easy management.2. Turn off Domain name resolutionR1 (config) #no IP domain-lookupBy default, when an ad
Tags: cisco CCNA RIPRIP (Routing information Protocol) routing protocol is a kind of routing protocol which has been widely used in small and medium networks. RIP uses UDP packets to exchange routing information with a UDP port number of 520. Normally the RIPV1 message is broadcast, while the RIPV2 message is a group broadcast message, and the multicast address is 224.0.0.9. RIP sends an update message out every 30 seconds. If the device does not rece
Thoroughly understand the four isolation levels and transaction isolation levels of transactionsIntroduction
In DBMS, transactions ensure that all or all of the operation sequences can be executed (Atomicity), from one State to another (consistency ). Because the transaction is persistent. Therefore, once a transaction is committed, the data can be persisted. Because the transaction is isolated, when multip
CCNA Authentication-basic network knowledge-1-3 ensures confidentiality by allowing intended and authorized recipients (individuals, processes, or devices) to read data to maintain data privacy. Use a powerful user authentication system, a password that is difficult to guess, and frequent password changes to restrict access to stored data on communication and Internet devices. Encryption of content ensures confidentiality and reduces unauthorized disc
CCNA Study Notes 2 --- EthernetEthernet ◆ type: 1, EthernetII; 2, 100 standard Ethernet (10 Mbps) Fast Ethernet (1000 Mbps 10 Gbps 40 Gbps, using CSMA/CD access control, all are in line with 802.3 ◆ L2 network Classification 1, point-to-point: WAN network serial port 2, multi-point} ---- Ethernet broadcast} ---- Frame Relay does not support broadcast ◆ collision over Ethernet, when the two nodes transmit data at the same time, the frames sent from the
CCNA Study Notes 4 --- vro Startup Process and register value◆ Role of the vro register value (after understanding, used to adjust the optimization of the vro switch work) power-on self-check (post) load and run boot guide microcode to search for IOS image) file loading IOS image file search configuration file loading configuration file normal operation hex 2102 two Bytes 8 bits, sixth adjustable process: ◎ after the boot self-check is successful, rea
During the preparation of the CCNA, the route has been in a state of confusion. Therefore, keep a record of your daily study notes so that you can view them later.There are two configurations for static routes, one is a static route with the next-hop address, and the other is a static route with a send-out interface.For static routes, the usage is as follows:One, the network contains only a few routersSecond, the network only through a single ISP acce
ports.
Assign an IP address to VLAN Ten and enable it. Refer to the addressing Table.
Configure the default gateway according to the addressing Table.
Configure VLANs on S2.
On S2, create VLAN 10. Assign Student as the VLAN name.
Create VLAN 20. Assign Faculty-admin as the VLAN name.
Configure F0/1 as a trunk port.
Assign ports F0/11 and F0/18 to VLAN and configure both F0/11 and F0/18 as access ports.
Assign an IP address to VLAN Ten and enable it. Refer t
650) this.width=650; "src=" Http://s5.51cto.com/wyfs02/M00/8B/7E/wKioL1hPzwWwPFqgAAGUAvCBHxo588.png "title=" QQ picture 20161213183532.png "alt=" Wkiol1hpzwwwpfqgaaguavcbhxo588.png "/>Test center of the subject: Changes in the address of the source Ip/mac in the process of data communicationTest instructions: In the box shown, Route1 's IP address and MAC address of the corresponding information, as well as data frame information; The problem is that you can infer what route1 is going to do with
The initial command for routing configuration-CCNA takes notes when I used to study NA, now I have time to share with you ==================================== ========================================================== =====================www.2cto.com show hosts show current host name configuration show sessions show current outgoing TELNET session clear line XXX clear line
=" wkiol1pon6mbx42paaga_e9n2zg502.jpg "/>
First, obtain the gateway information (non-private address). After telnet, obtain the user's MAC address (sho ARP | include user IP address) based on the ARP table ),
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/40/1E/wKiom1POOgmjnOhpAABNrTBnX3M812.jpg "Title =" q2.jpg "alt =" wkiom1poogmjnohpaabnrtbnx3m812.jpg "/>
Obtain the port number (sho Mac-table-address Add User Mac) 650) connected to the vswitch based on the user's MAC address.
CCNA advanced network technical materials
Network Basics
Encapsulation: attaches necessary protocol information to the data before network transmission. Unencapsulate: unseal data from a specific protocol header. Peer layer communication: each layer of the source sender's OSI model must communicate with the peer layer of the target. OSI reference model: 1 physical layer: defines electrical, mechanical, and procedural functions and standards for physic
Tags: ccnaThe more complex the interconnection network environment is, the more likely the network is to fail in terms of connectivity, and the cause of the failure is hard to confirm. Before a network failure occurs, the network administrator should constantly monitor network changes and make timely adjustments to prevent problems. When a network fault occurs, appropriate methods and tools should be used to determine the root cause of the fault, and correct troubleshooting plans should be made.
LAN.WANThe last network segment is a WAN connection and requires 2 host addresses. Support WAN links with just 2 primary seats. 2^2-2 = 2.This leaves 8 bits to define the local subnet address. The next available address block is 172.16.2.192/30.Address: 172.16.2.192Binary representation:10101100.00010000.0000010.11000000Mask: 255.255.255.252Represents 30 bits in binary:11111111.11111111.1111111.11111100The IPV4 host address range provided is:172.16.2.193 to 172.16.2.194, broadcast address is 17
Detailed description of four transaction isolation levels of MySQL and four levels of mysql
Test environment of this experiment: Windows 10 + cmd + MySQL5.6.36 + InnoDB
I. Basic Elements of transactions (ACID)
1. Atomicity: All operations after the transaction starts, either completed or not done, cannot be stuck in the intermediate stage. If an error occurs during the transaction execution, it is rolled ba
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.