Introduction |
|
xxix | |
Assessment Test |
|
xli | |
|
Chapter 1 Introduction to Networks |
|
|
1 | (26) |
|
First Things First: What's a Network? |
|
|
2 | (10) |
|
|
3 | (2) |
|
Common Network Components |
|
|
5 | (3) |
|
|
8 | (2) |
|
Network Architecture: Peer-to-Peer or Client-Server? |
|
|
10 | (2) |
|
Physical Network Topologies |
|
|
12 | (7) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
Point-to-Multipoint Topology |
|
|
17 | (1) |
|
|
18 | (1) |
|
Topology Selection, Backbones, and Segments |
|
|
19 | (2) |
|
Selecting the Right Topology |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (4) |
|
Chapter 2 The Open Systems Interconnection Specifications |
|
|
27 | (28) |
|
|
28 | (2) |
|
|
29 | (1) |
|
Advantages of Reference Models |
|
|
29 | (1) |
|
|
30 | (16) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
33 | (7) |
|
|
40 | (3) |
|
|
43 | (2) |
|
|
45 | (1) |
|
Introduction to Encapsulation |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
50 | (5) |
|
Chapter 3 Networking Topologies, Connectors, and Wiring Standards |
|
|
55 | (36) |
|
|
57 | (16) |
|
|
58 | (2) |
|
|
60 | (4) |
|
|
64 | (5) |
|
|
69 | (2) |
|
|
71 | (2) |
|
|
73 | (2) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
74 | (1) |
|
Noise Immunity (Security, EMI) |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
75 | (7) |
|
|
76 | (2) |
|
|
78 | (1) |
|
|
78 | (2) |
|
|
80 | (1) |
|
|
81 | (1) |
|
Installing Wiring Distributions |
|
|
82 | (3) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
87 | (4) |
|
Chapter 4 The Current Ethernet Specifications |
|
|
91 | (36) |
|
|
93 | (2) |
|
|
95 | (6) |
|
|
95 | (1) |
|
|
96 | (1) |
|
|
96 | (2) |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
99 | (1) |
|
Half- and Full-Duplex Ethernet |
|
|
99 | (2) |
|
Ethernet at the Data Link Layer |
|
|
101 | (7) |
|
Binary to Decimal and Hexadecimal Conversion |
|
|
102 | (3) |
|
|
105 | (1) |
|
|
106 | (2) |
|
Ethernet at the Physical Layer |
|
|
108 | (6) |
|
Ethernet over Other Standards (IEEE 1905.1-2013) |
|
|
114 | (3) |
|
|
114 | (2) |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
117 | (6) |
|
|
123 | (4) |
|
Chapter 5 Networking Devices |
|
|
127 | (44) |
|
Common Network Connectivity Devices |
|
|
129 | (15) |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
133 | (4) |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
138 | (1) |
|
Dynamic Host Configuration Protocol Server |
|
|
139 | (5) |
|
Other Specialized Devices |
|
|
144 | (10) |
|
|
144 | (1) |
|
|
145 | (1) |
|
Domain Name Service Server |
|
|
145 | (5) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
Planning and Implementing a Basic SOHO Network Using Network Segmentation |
|
|
154 | (10) |
|
|
154 | (7) |
|
Switches and Bridges at the Data Link Layer |
|
|
161 | (1) |
|
Hubs at the Physical Layer |
|
|
162 | (1) |
|
Environmental Considerations |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
166 | (5) |
|
Chapter 6 Introduction to the Internet Protocol |
|
|
171 | (34) |
|
|
173 | (21) |
|
A Brief History of TCP/IP |
|
|
173 | (1) |
|
|
174 | (2) |
|
The Process/Application Layer Protocols |
|
|
176 | (8) |
|
The Host-to-Host Layer Protocols |
|
|
184 | (5) |
|
The Internet Layer Protocols |
|
|
189 | (5) |
|
|
194 | (4) |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
198 | (2) |
|
|
200 | (5) |
|
|
205 | (28) |
|
|
206 | (1) |
|
The Hierarchical IP Addressing Scheme |
|
|
207 | (7) |
|
|
208 | (4) |
|
Private IP Addresses (RFC 1918) |
|
|
212 | (2) |
|
|
214 | (2) |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
Multicast Address (Class D) |
|
|
215 | (1) |
|
Internet Protocol Version 6 (IPv6) |
|
|
216 | (9) |
|
|
216 | (1) |
|
The Benefits of and Uses for IPv6 |
|
|
217 | (1) |
|
IPv6 Addressing and Expressions |
|
|
218 | (1) |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
220 | (1) |
|
Stateless Autoconfiguration (EUI-64) |
|
|
221 | (2) |
|
|
223 | (1) |
|
|
223 | (2) |
|
|
225 | (1) |
|
|
226 | (1) |
|
|
227 | (2) |
|
|
227 | (1) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
229 | (4) |
|
Chapter 8 IP Subnetting, Troubleshooting IP, and Introduction to NAT |
|
|
233 | (44) |
|
|
234 | (22) |
|
|
235 | (1) |
|
|
236 | (1) |
|
Classless Inter-Domain Routing (CIDR) |
|
|
237 | (2) |
|
Subnetting Class C Addresses |
|
|
239 | (10) |
|
Subnetting Class B Addresses |
|
|
249 | (7) |
|
Troubleshooting IP Addressing |
|
|
256 | (8) |
|
Determining IP Address Problems |
|
|
259 | (5) |
|
Introduction to Network Address Translation (NAT) |
|
|
264 | (4) |
|
Types of Network Address Translation |
|
|
265 | (1) |
|
|
266 | (1) |
|
|
267 | (1) |
|
|
268 | (1) |
|
|
269 | (1) |
|
|
269 | (2) |
|
|
271 | (6) |
|
Chapter 9 Introduction to IP Routing |
|
|
277 | (20) |
|
|
278 | (3) |
|
|
281 | (6) |
|
Testing Your IP Routing Understanding |
|
|
287 | (1) |
|
Static and Dynamic Routing |
|
|
288 | (3) |
|
|
291 | (1) |
|
|
292 | (1) |
|
|
292 | (1) |
|
|
293 | (4) |
|
Chapter 10 Routing Protocols |
|
|
297 | (36) |
|
|
299 | (4) |
|
|
300 | (2) |
|
Classes of Routing Protocols |
|
|
302 | (1) |
|
Distance Vector Routing Protocols |
|
|
303 | (10) |
|
Routing Information Protocol (RIP) |
|
|
305 | (1) |
|
|
305 | (1) |
|
VLSM and Discontiguous Networks |
|
|
306 | (3) |
|
|
309 | (2) |
|
Border Gateway Protocol (BGP) |
|
|
311 | (2) |
|
Link State Routing Protocols |
|
|
313 | (4) |
|
Open Shortest Path First (OSPF) |
|
|
314 | (2) |
|
Intermediate System-to-Intermediate System (IS-IS) |
|
|
316 | (1) |
|
|
317 | (7) |
|
Hot Standby Router Protocol (HSRP) |
|
|
319 | (5) |
|
Virtual Router Redundancy Protocol |
|
|
324 | (1) |
|
|
324 | (2) |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
326 | (1) |
|
|
326 | (1) |
|
|
327 | (1) |
|
|
328 | (5) |
|
Chapter 11 Switching and Virtual LANs |
|
|
333 | (44) |
|
Networking Before Layer 2 Switching |
|
|
335 | (3) |
|
|
338 | (8) |
|
Limitations of Layer 2 Switching |
|
|
339 | (1) |
|
Bridging vs LAN Switching |
|
|
340 | (1) |
|
Three Switch Functions at Layer 2 |
|
|
340 | (6) |
|
|
346 | (3) |
|
Spanning Tree Port States |
|
|
347 | (1) |
|
|
347 | (1) |
|
Rapid Spanning Tree Protocol 802.1w |
|
|
348 | (1) |
|
|
349 | (10) |
|
|
350 | (3) |
|
|
353 | (1) |
|
|
354 | (1) |
|
|
354 | (1) |
|
|
355 | (1) |
|
|
355 | (2) |
|
VLAN Identification Methods |
|
|
357 | (2) |
|
|
359 | (7) |
|
|
360 | (1) |
|
Do We Really Need to Put an IP Address on a Switch? |
|
|
361 | (2) |
|
|
363 | (1) |
|
|
364 | (2) |
|
Two Additional Advanced Features of Switches |
|
|
366 | (4) |
|
Power over Ethernet (802.3af, 802.3at) |
|
|
366 | (2) |
|
Port Mirroring/Spanning (SPAN/RSPAN) |
|
|
368 | (2) |
|
|
370 | (1) |
|
|
370 | (1) |
|
|
371 | (1) |
|
|
372 | (5) |
|
Chapter 12 Wireless Networking |
|
|
377 | (52) |
|
Introduction to Wireless Technology |
|
|
380 | (3) |
|
|
383 | (6) |
|
|
384 | (1) |
|
|
385 | (1) |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
388 | (1) |
|
|
389 | (1) |
|
Comparing 802.11 Standards |
|
|
389 | (2) |
|
|
390 | (1) |
|
Wireless Network Components |
|
|
391 | (4) |
|
|
391 | (1) |
|
Wireless Network Interface Card |
|
|
392 | (1) |
|
|
393 | (2) |
|
Installing a Wireless Network |
|
|
395 | (13) |
|
Ad Hoc Mode: Independent Basic Service Set |
|
|
395 | (1) |
|
Infrastructure Mode: Basic Service Set |
|
|
396 | (2) |
|
|
398 | (1) |
|
|
399 | (1) |
|
|
400 | (1) |
|
Other Network Infrastructure Implementations |
|
|
401 | (1) |
|
Installing and Configuring WLAN Hardware |
|
|
402 | (6) |
|
|
408 | (4) |
|
|
412 | (10) |
|
|
412 | (4) |
|
|
416 | (1) |
|
Service Set Identifiers, Wired Equivalent Privacy, and Media Access Control Address Authentication |
|
|
416 | (1) |
|
Remote Authentication Dial-In User Service (802.1x) |
|
|
417 | (1) |
|
Temporal Key Integrity Protocol |
|
|
418 | (1) |
|
Wi-Fi Protected Access or WPA2 Pre-Shared Key |
|
|
419 | (3) |
|
|
422 | (1) |
|
|
423 | (1) |
|
|
423 | (2) |
|
|
425 | (4) |
|
Chapter 13 Authentication and Access Control |
|
|
429 | (40) |
|
|
431 | (16) |
|
|
432 | (2) |
|
|
434 | (6) |
|
|
440 | (5) |
|
|
445 | (2) |
|
Managing User Account and Password Security |
|
|
447 | (8) |
|
|
448 | (2) |
|
|
450 | (4) |
|
|
454 | (1) |
|
Multifactor Authentication |
|
|
455 | (1) |
|
User-Authentication Methods |
|
|
455 | (9) |
|
Public Key Infrastructure (PKI) |
|
|
455 | (1) |
|
|
456 | (2) |
|
Authentication, Authorization, and Accounting (AAA) |
|
|
458 | (1) |
|
|
459 | (1) |
|
|
460 | (1) |
|
|
460 | (1) |
|
Network Access Control (NAC) |
|
|
460 | (1) |
|
Challenge Handshake Authentication Protocol (CHAP) |
|
|
460 | (1) |
|
|
461 | (1) |
|
Extensible Authentication Protocol (EAP) |
|
|
462 | (1) |
|
|
462 | (1) |
|
|
462 | (2) |
|
|
464 | (1) |
|
|
464 | (1) |
|
|
465 | (1) |
|
|
466 | (3) |
|
Chapter 14 Network Threats and Mitigation |
|
|
469 | (56) |
|
Recognizing Security Threats |
|
|
473 | (15) |
|
|
474 | (1) |
|
|
475 | (8) |
|
|
483 | (1) |
|
|
484 | (3) |
|
|
487 | (1) |
|
Insider Threat/Malicious Employee |
|
|
487 | (1) |
|
|
488 | (11) |
|
Unnecessary Running Services |
|
|
488 | (1) |
|
|
488 | (1) |
|
|
488 | (1) |
|
|
488 | (1) |
|
|
488 | (1) |
|
|
489 | (1) |
|
|
489 | (1) |
|
|
490 | (1) |
|
|
490 | (3) |
|
Attackers and Their Tools |
|
|
493 | (4) |
|
|
497 | (1) |
|
Social Engineering (Phishing) |
|
|
498 | (1) |
|
Understanding Mitigation Techniques |
|
|
499 | (4) |
|
|
500 | (1) |
|
|
500 | (1) |
|
|
500 | (1) |
|
|
501 | (2) |
|
|
503 | (11) |
|
|
504 | (5) |
|
|
509 | (1) |
|
|
510 | (2) |
|
|
512 | (1) |
|
|
512 | (1) |
|
|
513 | (1) |
|
|
514 | (4) |
|
|
514 | (1) |
|
|
514 | (1) |
|
|
515 | (1) |
|
Updating Antivirus Components |
|
|
515 | (3) |
|
Fixing an Infected Computer |
|
|
518 | (1) |
|
|
518 | (1) |
|
|
518 | (1) |
|
|
519 | (1) |
|
|
520 | (5) |
|
Chapter 15 Physical Security and Risk |
|
|
525 | (48) |
|
Using Hardware and Software Security Devices |
|
|
527 | (2) |
|
|
529 | (1) |
|
|
530 | (1) |
|
|
530 | (1) |
|
|
530 | (10) |
|
|
531 | (2) |
|
|
533 | (1) |
|
|
534 | (1) |
|
|
534 | (3) |
|
|
537 | (1) |
|
|
538 | (2) |
|
Firewalls at the Application Layer vs the Network Layer |
|
|
540 | (2) |
|
Stateful vs Stateless Network Layer Firewalls |
|
|
541 | (1) |
|
Application Layer Firewalls |
|
|
542 | (1) |
|
Scanning Services and Other Firewall Features |
|
|
542 | (5) |
|
|
544 | (1) |
|
|
544 | (1) |
|
|
544 | (1) |
|
|
545 | (1) |
|
|
545 | (2) |
|
Intrusion Detection and Prevention Systems |
|
|
547 | (5) |
|
|
549 | (2) |
|
|
551 | (1) |
|
|
551 | (1) |
|
|
552 | (1) |
|
Understanding Problems Affecting Device Security |
|
|
553 | (13) |
|
|
554 | (4) |
|
Logical Security Configurations |
|
|
558 | (2) |
|
|
560 | (6) |
|
|
566 | (1) |
|
|
566 | (1) |
|
|
567 | (2) |
|
|
569 | (4) |
|
Chapter 16 Wide Area Networks |
|
|
573 | (42) |
|
|
577 | (5) |
|
|
577 | (2) |
|
The Public Switched Telephone Network |
|
|
579 | (1) |
|
|
580 | (1) |
|
|
581 | (1) |
|
|
582 | (2) |
|
|
583 | (1) |
|
|
584 | (1) |
|
|
584 | (4) |
|
|
585 | (1) |
|
Wavelength Division Multiplexing |
|
|
585 | (1) |
|
|
586 | (1) |
|
|
586 | (2) |
|
|
588 | (5) |
|
|
589 | (2) |
|
|
591 | (2) |
|
Wireless WAN Technologies |
|
|
593 | (2) |
|
|
593 | (2) |
|
|
595 | (8) |
|
Integrated Services Digital Network |
|
|
595 | (1) |
|
|
596 | (3) |
|
|
599 | (3) |
|
Asynchronous Transfer Mode |
|
|
602 | (1) |
|
|
603 | (1) |
|
|
603 | (6) |
|
Loss of Internet Connectivity |
|
|
603 | (1) |
|
Interface Errors/Monitoring |
|
|
604 | (3) |
|
|
607 | (1) |
|
|
608 | (1) |
|
|
608 | (1) |
|
|
609 | (1) |
|
|
609 | (1) |
|
|
609 | (1) |
|
|
610 | (1) |
|
|
611 | (4) |
|
Chapter 17 Troubleshooting Tools |
|
|
615 | (56) |
|
|
616 | (2) |
|
|
618 | (1) |
|
|
619 | (1) |
|
|
620 | (2) |
|
Using ipconfig and ifconfig |
|
|
622 | (5) |
|
Using the ipconfig Utility |
|
|
622 | (4) |
|
Using the ifconfig Utility |
|
|
626 | (1) |
|
|
627 | (3) |
|
Using the Address Resolution Protocol |
|
|
630 | (4) |
|
|
630 | (1) |
|
|
631 | (3) |
|
Using the nslookup Utility |
|
|
634 | (2) |
|
Resolving Names with the Hosts Table |
|
|
636 | (1) |
|
Using the Mtr Command (pathping) |
|
|
637 | (1) |
|
|
638 | (3) |
|
Using the route Command Options |
|
|
639 | (2) |
|
Some Examples of the route Command |
|
|
641 | (1) |
|
Using the nbtstat Utility |
|
|
641 | (6) |
|
|
642 | (2) |
|
|
644 | (1) |
|
|
644 | (1) |
|
|
645 | (1) |
|
|
645 | (1) |
|
|
646 | (1) |
|
|
646 | (1) |
|
|
647 | (1) |
|
Using the netstat Utility |
|
|
647 | (8) |
|
|
650 | (1) |
|
|
651 | (1) |
|
|
652 | (1) |
|
|
652 | (1) |
|
|
652 | (2) |
|
|
654 | (1) |
|
Using the File Transfer Protocol |
|
|
655 | (5) |
|
Starting FTP and Logging In to an FTP Server |
|
|
656 | (2) |
|
|
658 | (2) |
|
|
660 | (1) |
|
|
660 | (2) |
|
How to Enable Telnet in Windows |
|
|
661 | (1) |
|
Don't Use Telnet, Use Secure Shell |
|
|
662 | (1) |
|
|
662 | (1) |
|
|
663 | (1) |
|
|
663 | (2) |
|
|
665 | (6) |
|
Chapter 18 Software and Hardware Tools |
|
|
671 | (40) |
|
Understanding Network Scanners |
|
|
673 | (8) |
|
Packet Sniffers/Network Monitors |
|
|
673 | (2) |
|
Intrusion Detection and Prevention Software |
|
|
675 | (2) |
|
|
677 | (3) |
|
|
680 | (1) |
|
|
681 | (2) |
|
Network Monitoring and Logging |
|
|
683 | (8) |
|
|
683 | (1) |
|
|
684 | (1) |
|
|
685 | (2) |
|
|
687 | (3) |
|
|
690 | (1) |
|
Identifying Hardware Tools |
|
|
691 | (13) |
|
|
692 | (3) |
|
|
695 | (1) |
|
|
696 | (1) |
|
Time-Domain Reflectometer |
|
|
696 | (1) |
|
Optical Time-Domain Reflectometer |
|
|
697 | (1) |
|
|
698 | (1) |
|
|
698 | (2) |
|
|
700 | (1) |
|
|
701 | (1) |
|
|
702 | (1) |
|
Voltage Event Recorder (Power) |
|
|
702 | (1) |
|
|
703 | (1) |
|
|
704 | (1) |
|
|
704 | (1) |
|
|
705 | (1) |
|
|
706 | (5) |
|
Chapter 19 Network Troubleshooting |
|
|
711 | (44) |
|
Narrowing Down the Problem |
|
|
715 | (14) |
|
Did You Check the Super Simple Stuff? |
|
|
716 | (4) |
|
Is Hardware or Software Causing the Problem? |
|
|
720 | (1) |
|
Is It a Workstation or a Server Problem? |
|
|
721 | (1) |
|
Which Segments of the Network Are Affected? |
|
|
721 | (1) |
|
|
722 | (7) |
|
|
729 | (17) |
|
Step 1 Identify the Problem |
|
|
729 | (4) |
|
Step 2 Establish a Theory of Probable Cause |
|
|
733 | (4) |
|
Step 3 Test the Theory to Determine Cause |
|
|
737 | (3) |
|
Step 4 Establish a Plan of Action to Resolve the Problem and Identify Potential Effects |
|
|
740 | (1) |
|
Step 5 Implement the Solution or Escalate as Necessary |
|
|
741 | (3) |
|
Step 6 Verify Full System Functionality, and If Applicable, Implement Preventative Measures |
|
|
744 | (1) |
|
Step 7 Document Findings, Actions, and Outcomes |
|
|
745 | (1) |
|
|
746 | (3) |
|
Don't Overlook the Small Stuff |
|
|
746 | (1) |
|
|
746 | (1) |
|
Check the Software Configuration |
|
|
747 | (1) |
|
Don't Overlook Physical Conditions |
|
|
747 | (1) |
|
Don't Overlook Cable Problems |
|
|
748 | (1) |
|
|
748 | (1) |
|
|
749 | (1) |
|
|
749 | (1) |
|
|
750 | (1) |
|
|
751 | (4) |
|
Chapter 20 Management, Monitoring, and Optimization |
|
|
755 | (58) |
|
Managing Network Documentation |
|
|
761 | (10) |
|
|
761 | (1) |
|
|
762 | (9) |
|
|
771 | (12) |
|
|
771 | (1) |
|
On-Boarding and Off-Boarding of Mobile Devices |
|
|
771 | (1) |
|
|
772 | (1) |
|
Policies, Procedures, and Regulations |
|
|
772 | (3) |
|
|
775 | (5) |
|
Implementing Network Segmentation |
|
|
780 | (3) |
|
|
783 | (22) |
|
Reasons to Optimize Your Network's Performance |
|
|
783 | (3) |
|
How to Optimize Performance |
|
|
786 | (2) |
|
|
788 | (1) |
|
|
788 | (1) |
|
|
789 | (1) |
|
|
789 | (1) |
|
|
789 | (1) |
|
|
790 | (1) |
|
|
790 | (1) |
|
Common Address Redundancy Protocol |
|
|
791 | (1) |
|
|
791 | (6) |
|
Locating and Installing Equipment |
|
|
797 | (6) |
|
Change Management Procedures |
|
|
803 | (2) |
|
|
805 | (1) |
|
|
806 | (1) |
|
|
807 | (1) |
|
|
808 | (5) |
|
Appendix A Answers to the Written Labs |
|
|
813 | (14) |
|
|
814 | (1) |
|
|
814 | (1) |
|
|
815 | (1) |
|
|
815 | (3) |
|
|
818 | (1) |
|
|
818 | (1) |
|
|
819 | (1) |
|
|
819 | (1) |
|
|
820 | (1) |
|
|
820 | (1) |
|
|
820 | (1) |
|
|
821 | (1) |
|
|
821 | (1) |
|
|
822 | (1) |
|
|
822 | (1) |
|
|
823 | (1) |
|
|
823 | (1) |
|
|
824 | (1) |
|
|
824 | (1) |
|
|
825 | (1) |
|
|
825 | (1) |
|
|
825 | (1) |
|
|
826 | (1) |
|
Appendix B Answers to Review Questions |
|
|
827 | (30) |
|
|
828 | (1) |
|
|
829 | (1) |
|
|
830 | (2) |
|
|
832 | (1) |
|
|
833 | (1) |
|
|
834 | (1) |
|
|
835 | (2) |
|
|
837 | (2) |
|
|
839 | (1) |
|
|
840 | (2) |
|
|
842 | (1) |
|
|
843 | (2) |
|
|
845 | (1) |
|
|
846 | (2) |
|
|
848 | (1) |
|
|
849 | (2) |
|
|
851 | (1) |
|
|
852 | (1) |
|
|
853 | (2) |
|
|
855 | (2) |
|
Appendix C Subnetting Class A |
|
|
857 | (8) |
|
Subnetting Practice Examples: Class A Addresses |
|
|
858 | (3) |
|
Practice Example #1A 255.255.0.0 (/16) |
|
|
859 | (1) |
|
Practice Example #2A 255.255.240.0 (/20) |
|
|
859 | (1) |
|
Practice Example #3A 255.255.255.192 (/26) |
|
|
860 | (1) |
|
Subnetting in Your Head: Class A Addresses |
|
|
861 | (1) |
|
|
861 | (1) |
|
|
862 | (1) |
|
|
863 | (1) |
|
|
864 | (1) |
Index |
|
865 | |