Muutke küpsiste eelistusi

Connecting Networks v6 Course Booklet [Pehme köide]

  • Formaat: Paperback / softback, 208 pages, kõrgus x laius x paksus: 275x220x10 mm, kaal: 451 g
  • Sari: Course Booklets
  • Ilmumisaeg: 11-Aug-2017
  • Kirjastus: Cisco Press
  • ISBN-10: 1587134314
  • ISBN-13: 9781587134319
Teised raamatud teemal:
  • Formaat: Paperback / softback, 208 pages, kõrgus x laius x paksus: 275x220x10 mm, kaal: 451 g
  • Sari: Course Booklets
  • Ilmumisaeg: 11-Aug-2017
  • Kirjastus: Cisco Press
  • ISBN-10: 1587134314
  • ISBN-13: 9781587134319
Teised raamatud teemal:
Connecting Networks Course Booklet

Your Cisco® Networking Academy® Course Booklet is designed as a study resource you can easily read, highlight, and review on the go, wherever the Internet is not available or practical:

  • The text is extracted directly, word-for-word, from the online course so you can highlight important points and take notes in the “Your Chapter Notes” section.
  • Headings with the exact page correlations provide a quick reference to the online course for your classroom discussions and exam preparation.
  • An icon system directs you to the online curriculum to take full advantage of the images embedded within the Networking Academy online course interface and reminds you to perform the labs, Class Activities, interactive activities, Packet Tracer activities, chapter quizzes, and exams.

The Course Booklet is a basic, economical paper-based resource to help you succeed with the Cisco Networking Academy online course.

Chapter 0 Course Introduction 1(4)
0.0 Connecting Networks
1(4)
0.0.1 Message to the Student
1(4)
0.0.1.1 Welcome
1(1)
0.0.1.2 A Global Community
1(1)
0.0.1.3 More Than Just Information
1(1)
0.0.1.4 How We Teach
2(1)
0.0.1.5 Practice Leads to Mastery
2(1)
0.0.1.6 Mind Wide Open
2(1)
0.0.1.7 Engineering Journals
2(1)
0.0.1.8 Explore the World of Networking
2(1)
0.0.1.9 Create Your Own Worlds
3(1)
0.0.1.10 How Packet Tracer Helps Master Concepts
3(1)
0.0.1.11 Course Overview
3(2)
Chapter 1 WAN Concepts 5(22)
1.0 Introduction
5(1)
1.0.1.1
Chapter 1: WAN Concepts
5(1)
1.0.1.2 Class Activity-Branching Out
5(1)
1.1 WAN Technologies Overview
5(8)
1.1.1 Purpose of WANs
5(5)
1.1.1.1 Why a WAN?
5(1)
1.1.1.2 Are WANs Necessary?
6(1)
1.1.1.3 WAN Topologies
6(1)
1.1.1.4 Evolving Networks
7(1)
1.1.1.5 Small Office
8(1)
1.1.1.6 Campus Network
8(1)
1.1.1.7 Branch Networks
9(1)
1.1.1.8 Distributed Network
9(1)
1.1.1.9 Activity-Identify WAN Topologies
9(1)
1.1.2 WAN Operations
10(3)
1.1.2.1 WANs in the OSI Model
10(1)
1.1.2.2 Common WAN Terminology
10(1)
1.1.2.3 WAN Devices
11(1)
1.1.2.4 Circuit Switching
12(1)
1.1.2.5 Packet Switching
12(1)
1.1.2.6 Activity-Identify WAN Terminology
13(1)
1.2 Selecting a WAN Technology
13(11)
1.2.1 WAN Services
13(1)
1.2.1.1 WAN Link Connection Options
13(1)
1.2.1.2 Service Provider Network Infrastructure
14(1)
1.2.1.3 Activity-Classify WAN Access Options
14(1)
1.2.2 Private WAN Infrastructures
14(5)
1.2.2.1 Leased Lines
14(1)
1.2.2.2 Dialup
15(1)
1.2.2.3 ISDN
16(1)
1.2.2.4 Frame Relay
17(1)
1.2.2.5 ATM
17(1)
1.2.2.6 Ethernet WAN
18(1)
1.2.2.7 MPLS
18(1)
1.2.2.8 VSAT
19(1)
1.2.2.9 Activity-Identify Private WAN Infrastructure Terminology
19(1)
1.2.3 Public WAN Infrastructure
19(3)
1.2.3.1 DSL
19(1)
1.2.3.2 Cable
19(1)
1.2.3.3 Wireless
20(1)
1.2.3.4 3G/4G Cellular
21(1)
1.2.3.5 VPN Technology
21(1)
1.2.3.6 Activity-Identify Public WAN Infrastructure Terminology
22(1)
1.2.4 Selecting WAN Services
22(6)
1.2.4.1 Choosing a WAN Link Connection
22(1)
1.2.4.2 Choosing a WAN Link Connection (Cont.)
23(1)
1.2.4.3 Lab-Researching WAN Technologies
24(1)
1.3 Summary
24(2)
1.3.1.1 Class Activity-WAN Device Modules
24(1)
1.3.1.2
Chapter 1: WAN Concepts
24(2)
Chapter 1 Quiz
26(1)
Chapter 1 Exam
26(1)
Your
Chapter Notes
26(1)
Chapter 2 Point-to-Point Connections 27(20)
2.0 Introduction
27(1)
2.0.1.1
Chapter 2: Point-to-Point Connections
27(1)
2.0.1.2 Class Activity-PPP Persuasion
27(1)
2.1 Serial Point-to-Point Overview
28(4)
2.1.1 Serial Communications
28(2)
2.1.1.1 Serial and Parallel Ports
28(1)
2.1.1.2 Point-to-Point Communication Links
29(1)
2.1.1.3 Serial Bandwidth
29(1)
2.1.2 HDLC Encapsulation
30(2)
2.1.2.1 WAN Encapsulation Protocols
30(1)
2.1.2.2 HDLC Encapsulation
30(1)
2.1.2.3 Configuring HDLC Encapsulation
31(1)
2.1.2.4 Troubleshooting a Serial Interface
31(1)
2.1.2.5 Packet Tracer-Troubleshooting Serial Interfaces
32(1)
2.2 PPP Operation
32(5)
2.2.1 Benefits of PPP
32(1)
2.2.1.1 Introducing PPP
32(1)
2.2.1.2 Advantages of PPP
33(1)
2.2.2 LCP and NCP
33(1)
2.2.2.1 PPP Layered Architecture
33(1)
2.2.2.2 PPP-Link Control Protocol (LCP)
33(1)
2.2.2.3 PPP-Network Control Protocol (NCP)
34(1)
2.2.2.4 PPP Frame Structure
34(1)
2.2.2.5 Activity-Identify PPP Features and Operations
34(1)
2.2.3 PPP Sessions
34(3)
2.2.3.1 Establishing a PPP Session
34(1)
2.2.3.2 LCP Operation
35(1)
2.2.3.3 PPP Configuration Options
36(1)
2.2.3.4 NCP Explained
36(1)
2.2.3.5 Activity-Identify the Steps in the LCP Link Negotiation Process
37(1)
2.3 PPP Implementation
37(5)
2.3.1 Configure PPP
37(3)
2.3.1.1 PPP Configuration Options
37(1)
2.3.1.2 PPP Basic Configuration Command
38(1)
2.3.1.3 PPP Compression Commands
38(1)
2.3.1.4 PPP Link Quality Monitoring Command
38(1)
2.3.1.5 PPP Multilink Commands
38(1)
2.3.1.6 Verifying PPP Configuration
39(1)
2.3.2 Configure PPP Authentication
40(2)
2.3.2.1 PPP Authentication Protocols
40(1)
2.3.2.2 Password Authentication Protocol (PAP)
40(1)
2.3.2.3 Challenge Handshake Authentication Protocol (CHAP)
41(1)
2.3.2.4 PPP Authentication Command
41(1)
2.3.2.5 Configuring PPP with Authentication
41(1)
2.3.2.6 Packet Tracer-Configuring PAP and CHAP Authentication
42(1)
2.3.2.7 Lab-Configuring Basic PPP with Authentication
42(1)
2.4 Troubleshoot WAN Connectivity
42(2)
2.4.1 Troubleshoot PPP
42(6)
2.4.1.1 Troubleshooting PPP Serial Encapsulation
42(1)
2.4.1.2 Debug PPP
43(1)
2.4.1.3 Troubleshooting a PPP Configuration with Authentication
43(1)
2.4.1.4 Packet Tracer-Troubleshooting PPP with Authentication
44(1)
2.4.1.5 Lab-Troubleshooting Basic PPP with Authentication
44(1)
2.5 Summary
44(2)
2.5.1.1 Class Activity-PPP Validation
44(1)
2.5.1.2 Packet Tracer-Skills Integration Challenge
45(1)
2.5.1.3
Chapter 2: Point-to-Point Connections
45(1)
Chapter 2 Quiz
46(1)
Chapter 2 Exam
46(1)
Your
Chapter Notes
46(1)
Chapter 3 Branch Connections 47(22)
3.0 Introduction
47(1)
3.0.1.1
Chapter 3: Branch Connections
47(1)
3.0.1.2 Class Activity-Broadband Varieties
47(1)
3.1 Remote Access Connections
48(4)
3.1.1 Broadband Connections
48(3)
3.1.1.1 What is a Cable System?
48(1)
3.1.1.2 Cable Components
48(1)
3.1.1.3 What is DSL?
49(1)
3.1.1.4 DSL Connections
49(1)
3.1.1.5 Wireless Connection
50(1)
3.1.1.6 Activity-Identify Broadband Connection Terminology
51(1)
3.1.2 Select a Broadband Connection
51(1)
3.1.2.1 Comparing Broadband Solutions
51(1)
3.1.2.2 Lab-Researching Broadband Internet Access Technologies
51(1)
3.2 PPPoE
52(3)
3.2.1 PPPoE Overview
52(1)
3.2.1.1 PPPoE Motivation
52(1)
3.2.1.2 PPPoE Concepts
52(1)
3.2.2 Implement PPPoE
52(3)
3.2.2.1 PPPoE Configuration
52(1)
3.2.2.2 PPPoE Verification
53(1)
3.2.2.3 PPPoE Troubleshooting
53(1)
3.2.2.4 PPPoE Negotiation
54(1)
3.2.2.5 PPPoE Authentication
54(1)
3.2.2.6 PPPoE MTU Size
54(1)
3.2.2.7 Lab-Configuring a Router as a PPPoE Client for DSL Connectivity
55(1)
3.2.2.8 Lab-Troubleshoot PPPoE
55(1)
3.3 VPNs
55(3)
3.3.1 Fundamentals of VPNs
55(1)
3.3.1.1 Introducing VPNs
55(1)
3.3.1.2 Benefits of VPNs
56(1)
3.3.1.3 Activity-Identify the Benefits of VPNs
56(1)
3.3.2 Types of VPNs
56(2)
3.3.2.1 Site-to-Site VPNs
56(1)
3.3.2.2 Remote Access VPNs
57(1)
3.3.2.3 DMVPN
57(1)
3.3.2.4 Activity-Compare Types of VPNs
58(1)
3.4 GRE
58(3)
3.4.1 GRE Overview
58(1)
3.4.1.1 GRE Introduction
58(1)
3.4.1.2 GRE Characteristics
58(1)
3.4.1.3 Activity-Identify GRE Characteristics
59(1)
3.4.2 Implement GRE
59(2)
3.4.2.1 Configure GRE
59(1)
3.4.2.2 Verify GRE
59(1)
3.4.2.3 Troubleshoot GRE
60(1)
3.4.2.4 Packet Tracer-Configuring GRE
60(1)
3.4.2.5 Packet Tracer-Troubleshooting GRE
61(1)
3.4.2.6 Lab-Configuring a Point-to-Point GRE VPN Tunnel
61(1)
3.5 eBGP
61(4)
3.5.1 BGP Overview
61(1)
3.5.1.1 IGP and EGP Routing Protocols
61(1)
3.5.1.2 eBGP and iBGP
62(1)
3.5.2 BGP Design Considerations
62(1)
3.5.2.1 When to use BGP
62(1)
3.5.2.2 When not to use BGP
62(1)
3.5.2.3 BGP Options
63(1)
3.5.2.4 Activity-Identify BPG Terminology and Designs
63(1)
3.5.3 eBGP Branch Configuration
63(6)
3.5.3.1 Steps to Configure eBGP
63(1)
3.5.3.2 BGP Sample Configuration
64(1)
3.5.3.3 Verify eBGP
64(1)
3.5.3.4 Packet Tracer-Configure and Verify eBGP
65(1)
3.5.3.5 Lab-Configure and Verify eBGP
65(1)
3.6 Summary
65(2)
3.6.1.1 Class Activity-VPN Planning Design
65(1)
3.6.1.2 Packet Tracer-Skills Integration Challenge
65(1)
3.6.1.3 Lab-Configure a Branch Connection
66(1)
3.6.1.4
Chapter 3: Summary
66(1)
Chapter 3 Quiz
67(1)
Chapter 3 Exam
67(1)
Your
Chapter Notes
67(2)
Chapter 4 Access Control Lists 69(24)
4.0 Introduction
69(1)
4.0.1.1
Chapter 4: Access Control Lists
69(1)
4.1 Standard ACL Operation and Configuration Review
69(7)
4.1.1 ACL Operation Overview
69(2)
4.1.1.1 ACLs and the Wildcard Mask
69(1)
4.1.1.2 Applying ACLs to an Interface
70(1)
4.1.1.3 A TCP Conversation
70(1)
4.1.1.4 ACL Packet Filtering
71(1)
4.1.1.5 Activity-Determine the Correct Wildcard Mask
71(1)
4.1.1.6 Activity-ACL Operation
71(1)
4.1.2 Types of IPv4 ACLs
71(3)
4.1.2.1 Standard and Extended IPv4 ACLs
71(1)
4.1.2.2 Numbered and Named ACLs
72(1)
4.1.2.3 Where to Place ACLs
72(1)
4.1.2.4 Standard ACL Placement Example
73(1)
4.1.2.5 Extended ACL Placement Example
73(1)
4.1.2.6 Activity-Placing Standard and Extended ACLs
74(1)
4.1.3 Standard IPv4 ACL Implementation
74(2)
4.1.3.1 Configure a Standard IPv4 ACL
74(1)
4.1.3.2 Apply a Standard IPv4 ACL
74(1)
4.1.3.3 Named Standard IPv4 ACLs
74(1)
4.1.3.4 Verify ACLs
75(1)
4.1.3.5 Packet Tracer-Configure Standard IPv4 ACLs
75(1)
4.1.3.6 Video Demonstration-Standard ACL Configuration Part 1
75(1)
4.1.3.7 Video Demonstration-Standard ACL Configuration Part 2
75(1)
4.2 Extended IPv4 ACLs
76(4)
4.2.1 Structure of an Extended IPv4 ACLs
76(1)
4.2.1.1 Extended ACLs
76(1)
4.2.1.2 Filtering Ports and Services
76(1)
4.2.2 Configure Extended IPv4 ACLs
76(4)
4.2.2.1 Configuring Extended ACLs
76(1)
4.2.2.2 Applying Extended ACLs to Interfaces
77(1)
4.2.2.3 Filtering Traffic with Extended ACLs
77(1)
4.2.2.4 Creating Named Extended ACLs
78(1)
4.2.2.5 Verifying Extended ACLs
78(1)
4.2.2.6 Editing Extended ACLs
79(1)
4.2.2.7 Activity-Creating an Extended ACL Statement
79(1)
4.2.2.8 Activity-Evaluating Extended ACES
79(1)
4.2.2.9 Activity-ACL Testlet
79(1)
4.2.2.10 Packet Tracer-Configuring Extended ACLs-Scenario 1
79(1)
4.2.2.11 Packet Tracer-Configuring Extended ACLs-Scenario 2
80(1)
4.2.2.12 Packet Tracer-Configuring Extended ACLs-Scenario 3
80(1)
4.2.2.13 Lab-Configuring and Verifying Extended ACLs
80(1)
4.3 IPv6 ACLs
80(4)
4.3.1 IPv6 ACL Creation
80(1)
4.3.1.1 Types of IPv6 ACLs
80(1)
4.3.1.2 Comparing IPv4 and IPv6 ACLs
80(1)
4.3.2 Configuring IPv6 ACLs
81(3)
4.3.2.1 Configuring IPv6 Topology
81(1)
4.3.2.2 Configuring IPv6 ACLs
81(1)
4.3.2.3 Applying an IPv6 ACL to an Interface
82(1)
4.3.2.4 IPv6 ACL Examples
82(1)
4.3.2.5 Verifying IPv6 ACLs
83(1)
4.3.2.6 Packet Tracer-Configuring IPv6 ACLs
83(1)
4.3.2.7 Lab-Configuring and Verifying IPv6 ACLs
83(1)
4.4 Troubleshoot ACLs
84(5)
4.4.1 Processing Packets with ACLs
84(1)
4.4.1.1 Inbound and Outbound ACL Logic
84(1)
4.4.1.2 ACL Logic Operations
84(1)
4.4.1.3 Standard ACL Decision Process
85(1)
4.4.1.4 Extended ACL Decision Process
85(1)
4.4.1.5 Activity-Place in Order the Steps of the ACL Decision Making Process
85(1)
4.4.2 Common ACLs Errors
85(9)
4.4.2.1 Troubleshooting IPv4 ACLs-Example 1
85(1)
4.4.2.2 Troubleshooting IPv4 ACLs-Example 2
86(1)
4.4.2.3 Troubleshooting IPv4 ACLs-Example 3
86(1)
4.4.2.4 Troubleshooting IPv4 ACLs-Example 4
86(1)
4.4.2.5 Troubleshooting IPv4 ACLs-Example 5
87(1)
4.4.2.6 Troubleshooting IPv6 ACLs-Example 1
87(1)
4.4.2.7 Troubleshooting IPv6 ACLs-Example 2
87(1)
4.4.2.8 Troubleshooting IPv6 ACLs-Example 3
88(1)
4.4.2.9 Packet Tracer-Troubleshooting IPv4 ACLs
88(1)
4.4.2.10 Packet Tracer-Troubleshooting IPv6 ACLs
89(1)
4.4.2.11 Lab-Troubleshooting ACL Configuration and Placement
89(1)
4.5 Summary
89(2)
4.5.1.1 Packet Tracer-Skills Integration Challenge
89(1)
4.5.1.2
Chapter 4: Access Control Lists
89(2)
Chapter 4 Quiz
91(1)
Chapter 4 Exam
91(1)
Your
Chapter Notes
91(2)
Chapter 5 Network Security and Monitoring 93(22)
5.0 Introduction
93(1)
5.0.1.1
Chapter 5: Network Security and Monitoring
93(1)
5.0.1.2 Class Activity-Network Maintenance Development
93(1)
5.1 LAN Security
94(8)
5.1.1 LAN Security Attacks
94(4)
5.1.1.1 Common LAN Attacks
94(1)
5.1.1.2 CDP Reconnaissance Attack
94(1)
5.1.1.3 Telnet Attacks
95(1)
5.1.1.4 MAC Address Table Flooding Attack
96(1)
5.1.1.5 VLAN Attacks
97(1)
5.1.1.6 DHCP Attacks
97(1)
5.1.1.7 Activity-Identify Common Security Attacks
98(1)
5.1.2 LAN Security Best Practices
98(4)
5.1.2.1 Secure the LAN
98(1)
5.1.2.2 Mitigate MAC Address Flooding Table Attacks
98(1)
5.1.2.3 Mitigate VLAN Attacks
99(1)
5.1.2.4 Mitigate DHCP Attacks
99(1)
5.1.2.5 Secure Administrative Access using AAA
100(1)
5.1.2.6 Secure Device Access using 802.1X
101(1)
5.1.2.7 Activity: Identify the Security Best Practice
102(1)
5.2 SNMP
102(8)
5.2.1 SNMP Operation
102(5)
5.2.1.1 Introduction to SNMP
102(1)
5.2.1.2 SNMP Operation
102(1)
5.2.1.3 SNMP Agent Traps
103(1)
5.2.1.4 SNMP Versions
103(1)
5.2.1.5 Community Strings
104(1)
5.2.1.6 Management Information Base Object ID
105(1)
5.2.1.7 SNMPv3
106(1)
5.2.1.8 Activity-Identify Characteristics of SNMP Versions
106(1)
5.2.1.9 Lab-Researching Network Monitoring Software
106(1)
5.2.2 Configuring SNMP
107(3)
5.2.2.1 Steps for Configuring SNMP
107(1)
5.2.2.2 Verifying SNMP Configuration
107(1)
5.2.2.3 SNMP Best Practices
108(1)
5.2.2.4 Steps for Configuring SNMPv3
109(1)
5.2.2.5 Verifying SNMPv3 Configuration
109(1)
5.2.2.6 Lab-Configuring SNMP
110(1)
5.3 Cisco Switch Port Analyzer
110(3)
5.3.1 SPAN Overview
110(2)
5.3.1.1 Port Mirroring
110(1)
5.3.1.2 Analyzing Suspicious Traffic
111(1)
5.3.1.3 Local SPAN
111(1)
5.3.1.4 Remote SPAN
111(1)
5.3.1.5 Activity-Identify SPAN Terminology
112(1)
5.3.2 SPAN Configuration
112(1)
5.3.2.1 Configuring Local SPAN
112(1)
5.3.2.2 Verifying Local SPAN
112(1)
5.3.2.3 Lab-Implement a Local SPAN
112(1)
5.3.3 SPAN as a Troubleshooting Tool
113(2)
5.3.3.1 Troubleshooting with SPAN Overview
113(1)
5.3.3.2 Lab-Troubleshoot LAN Traffic Using SPAN
113(1)
5.4 Summary
113(1)
5.4.1.1
Chapter 5: Network Security and Monitoring
113(1)
Chapter 5 Quiz
114(1)
Chapter 5 Exam
114(1)
Your
Chapter Notes
114(1)
Chapter 6 Quality of Service 115(16)
6.0 Introduction
115(1)
6.0.1.1
Chapter 6: Quality of Service
115(1)
6.1 QoS Overview
115(5)
6.1.1 Network Transmission Quality
115(2)
6.1.1.1 Video Tutorial-The Purpose of QoS
115(1)
6.1.1.2 Prioritizing Traffic
115(1)
6.1.1.3 Bandwidth, Congestion, Delay, and Jitter
116(1)
6.1.1.4 Packet Loss
116(1)
6.1.1.5 Activity-Identify Network Transmission Quality Terminology
117(1)
6.1.2 Traffic Characteristics
117(1)
6.1.2.1 Video Tutorial-Traffic Characteristics
117(1)
6.1.2.2 Network Traffic Trends
117(1)
6.1.2.3 Voice
117(1)
6.1.2.4 Video
117(1)
6.1.2.5 Data
118(1)
6.1.2.6 Activity-Compare Traffic Characteristics
118(1)
6.1.3 Queueing Algorithms
118(2)
6.1.3.1 Video Tutorial-QoS Algorithms
118(1)
6.1.3.2 Queuing Overview
118(1)
6.1.3.3 First In First Out (FIFO)
119(1)
6.1.3.4 Weighted Fair Queuing (WFQ)
119(1)
6.1.3.5 Class-Based Weighted Fair Queuing (CBWFQ)
119(1)
6.1.3.6 Low Latency Queuing (LLQ)
120(1)
6.1.3.7 Activity-Compare Queuing Algorithms
120(1)
6.2 QoS Mechanisms
120(7)
6.2.1 QoS Models
120(3)
6.2.1.1 Video Tutorial-QoS Models
120(1)
6.2.1.2 Selecting an Appropriate QoS Policy Model
121(1)
6.2.1.3 Best-Effort
121(1)
6.2.1.4 Integrated Services
121(1)
6.2.1.5 Differentiated Services
122(1)
6.2.1.6 Activity-Compare QoS Models
123(1)
6.2.2 QoS Implementation Techniques
123(8)
6.2.2.1 Video Tutorial-QoS Implementation Techniques
123(1)
6.2.2.2 Avoiding Packet Loss
123(1)
6.2.2.3 QoS Tools
123(1)
6.2.2.4 Classification and Marking
124(1)
6.2.2.5 Marking at Layer 2
124(1)
6.2.2.6 Marking at Layer 3
125(1)
6.2.2.7 Trust Boundaries
125(1)
6.2.2.8 Congestion Avoidance
126(1)
6.2.2.9 Shaping and Policing
126(1)
6.2.2.10 Activity-Identify QoS Mechanism Terminology
127(1)
6.3 Summary
127(2)
6.3.1.1
Chapter 6: Quality of Service
127(2)
Chapter 6 Quiz
129(1)
Chapter 6 Exam
129(1)
Your
Chapter Notes
129(2)
Chapter 7 Network Evolution 131(18)
7.0 Introduction
131(1)
7.0.1.1
Chapter 7: Network Evolution
131(1)
7.1 Internet of Things
131(4)
7.1.1 IoT Elements
131(1)
7.1.1.1 What is the IoT?
131(1)
7.1.1.2 The Converged Network and Things
131(1)
7.1.1.3 Challenges to Connecting Things
132(1)
7.1.1.4 The Six Pillars of the Cisco IoT System
132(1)
7.1.2 IoT Pillars
132(3)
7.1.2.1 The Network Connectivity Pillar
132(1)
Z.1.2.2 The Fog Computing Pillar
133(1)
7.1.2.3 The Security Pillar
133(1)
7.1.2.4 Data Analytics Pillar
134(1)
7.1.2.5 Management and Automation Pillar
134(1)
7.1.2.6 Application Enablement Platform Pillar
134(1)
7.1.2.7 Activity-Identify the IoT Pillars
135(1)
7.2 Cloud and Virtualization
135(6)
7.2.1 Cloud Computing
135(2)
7.2.1.1 Video Tutorial-Cloud and Virtualization
135(1)
7.2.1.2 Cloud Overview
135(1)
7.2.1.3 Cloud Services
135(1)
7.2.1.4 Cloud Models
136(1)
7.2.1.5 Cloud Computing versus Data Center
136(1)
7.2.1.6 Activity-Identify Cloud Computing Terminology
137(1)
7.2.2 Virtualization
137(3)
7.2.2.1 Cloud Computing and Virtualization
137(1)
7.2.2.2 Dedicated Servers
137(1)
7.2.2.3 Server Virtualization
137(1)
7.2.2.4 Advantages of Virtualization
138(1)
7.2.2.5 Abstraction Layers
139(1)
7.2.2.6 Type 2 Hypervisors
139(1)
7.2.2.7 Activity-Identify Virtualization Terminology
140(1)
7.2.3 Virtual Network Infrastructure
140(1)
7.2.3.1 Type 1 Hypervisors
140(1)
7.2.3.2 Installing a VM on a Hypervisor
140(1)
7.2.3.3 Network Virtualization
140(1)
7.2.3.4 Activity-Identify Hypervisor Terminology
141(1)
7.3 Network Programming
141(7)
7.3.1 Software-Defined Networking
141(2)
7.3.1.1 Video Tutorial-Network Programming, SDN, and Controllers
141(1)
7.3.1.2 Control Plane and Data Plane
141(1)
7.3.1.3 Virtualizing the Network
142(1)
7.3.1.4 SDN Architecture
142(1)
7.3.1.5 Activity-Identify Control Plane and Data Plane Characteristics
143(1)
7.3.2 Controllers
143(6)
7.3.2.1 SDN Controller and Operations
143(1)
7.3.2.2 Cisco Application Centric Infrastructure
143(1)
7.3.2.3 Core Components of ACI
144(1)
7.3.2.4 Spine-Leaf Topology
144(1)
7.3.2.5 SDN Types
145(1)
7.3.2.6 APIC-EM Features
145(1)
7.3.2.7 APIC-EM ACL Analysis
146(1)
7.3.2.8 Activity-Identify SDN Types
146(2)
7.4 Summary
148(1)
7.4.1.1
Chapter 7: Network Evolution
146(2)
Chapter 7 Quiz
148(1)
Chapter 7 Exam
148(1)
Your
Chapter Notes
148(1)
Chapter 8 Network Troubleshooting 149(36)
8.0 introduction
149(1)
8.0.1.1 Introduction
149(1)
8.0.1.2 Class Activity-Network Breakdown
149(1)
8.1 Troubleshooting Methodology
149(11)
8.1.1 Network Documentation
149(5)
8.1.1.1 Documenting the Network
149(2)
8.1.1.2 Network Topology Diagrams
151(1)
8.1.1.3 Establishing a Network Baseline
152(1)
8.1.1.4 Steps to Establish a Network Baseline
152(1)
8.1.1.5 Measuring Data
153(1)
8.1.1.6 Activity-Identify Benefits for Establishing a Network Baseline
154(1)
8.1.1.7 Activity-Identify Commands Used for Measuring Data
154(1)
8.1.1.8 Packet Tracer-Troubleshooting Challenge-Documenting the Network
154(1)
8.1.2 Troubleshooting Process
154(3)
8.1.2.1 General Troubleshooting Procedures
154(1)
8.1.2.2 Gathering Symptoms
155(1)
8.1.2.3 Questioning End Users
156(1)
8.1.2.4 Activity-Identify Commands for Gathering Symptoms
157(1)
8.1.3 Isolating the Issue Using Layered Models
157(3)
8.1.3.1 Using Layered Models for Troubleshooting
157(1)
8.1.3.2 Troubleshooting Methods
158(1)
8.1.3.3 Other Troubleshooting Methods
159(1)
8.1.3.4 Guidelines for Selecting a Troubleshooting Method
159(1)
8.1.3.5 Activity-Troubleshooting Methods
160(1)
8.2 Troubleshooting Scenarios
160(21)
8.2.1 Using IP SLA
160(2)
8.2.1.1 IP SLA Concepts
160(1)
8.2.1.2 IP SLA Configuration
161(1)
8.2.1.3 Sample IP SLA Configuration
161(1)
8.2.1.4 Verifying an IP SLA Configuration
162(1)
8.2.1.5 Lab-Configure IP SLA ICMP Echo
162(1)
8.2.2 Troubleshooting Tools
162(3)
8.2.2.1 Software Troubleshooting Tools
162(1)
8.2.2.2 Protocol Analyzers
163(1)
8.2.2.3 Hardware Troubleshooting Tools
163(1)
8.2.2.4 Using a Syslog Server for Troubleshooting
164(1)
8.2.2.5 Activity-Identify Common Troubleshooting Tools
165(1)
8.2.3 Symptoms and Causes of Network Troubleshooting
165(6)
8.2.3.1 Physical Layer Troubleshooting
165(1)
8.2.3.2 Data Link Layer Troubleshooting
166(2)
8.2.3.3 Network Layer Troubleshooting
168(1)
8.2.3.4 Transport Layer Troubleshooting-ACLs
169(1)
8.2.3.5 Transport Layer Troubleshooting-NAT for IPv4
170(1)
8.2.3.6 Application Layer Troubleshooting
171(1)
8.2.3.7 Activity-Identify the OSI Layer Associated with a Network Issue
171(1)
8.2.4 Troubleshooting IP Connectivity
171(10)
8.2.4.1 Components of Troubleshooting End-to-End Connectivity
171(1)
8.2.4.2 End-to-End Connectivity Problem Initiates Troubleshooting
172(1)
8.2.4.3 Step 1-Verify the Physical Layer
173(1)
8.2.4.4 Step 2-Check for Duplex Mismatches
174(1)
8.2.4.5 Step 3-Verify Layer 2 and Layer 3 Addressing on the Local Network
175(1)
8.2.4.6 Step 4-Verify Default Gateway
176(2)
8.2.4.7 Step 5-Verify Correct Path
178(1)
8.2.4.8 Step 6-Verify the Transport Layer
179(1)
8.2.4.9 Step 7-Verify ACLs
179(1)
8.2.4.10 Step 8-Verify DNS
180(1)
8.2.4.11 Activity-Identify Commands to Troubleshoot a Network Issue
180(1)
8.2.4.12 Packet Tracer-Troubleshooting Enterprise Networks 1
180(1)
8.2.4.13 Packet Tracer-Troubleshooting Enterprise Networks 2
181(1)
8.2.4.14 Packet Tracer-Troubleshooting Enterprise Networks 3
181(1)
8.2.4.15 Packet Tracer-Troubleshooting Challenge-Using Documentation to Solve Issues
181(1)
8.3 Summary
181(2)
8.3.1.1 Class Activity-Documentation Development
181(1)
8.3.1.2 Packet Tracer-CCNA Skills Integration Challenge
181(1)
8.3.1.3 Summary
182(1)
Chapter 8 Quiz
183(1)
Chapter 8 Exam
183(1)
Your
Chapter Notes
183(2)
Index 185
Cisco Networking Academy is an innovative Cisco education initiative that delivers information and communication technology skills to improve career and economic opportunities around the world. The Academy provides online courses, interactive tools, and lab activities to prepare individuals for information technology and networking careers in virtually every industry.