Muutke küpsiste eelistusi

Introduction to Networks Companion Guide (CCNAv7) [Multiple-component retail product]

  • Formaat: Multiple-component retail product, 736 pages, kõrgus x laius x paksus: 234x206x28 mm, kaal: 1320 g, Contains 1 Digital product license key and 1 Hardback
  • Sari: Companion Guide
  • Ilmumisaeg: 15-Oct-2020
  • Kirjastus: Pearson
  • ISBN-10: 0136633668
  • ISBN-13: 9780136633662
  • Formaat: Multiple-component retail product, 736 pages, kõrgus x laius x paksus: 234x206x28 mm, kaal: 1320 g, Contains 1 Digital product license key and 1 Hardback
  • Sari: Companion Guide
  • Ilmumisaeg: 15-Oct-2020
  • Kirjastus: Pearson
  • ISBN-10: 0136633668
  • ISBN-13: 9780136633662
Introduction to Networks Companion Guide is the official supplemental textbook for the Introduction to Networks course in the Cisco Networking Academy CCNA curriculum.



The course introduces the architecture, protocols, functions, components, and models of the internet and computer networks. The principles of IP addressing and fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. By the end of the course, you will be able to build simple LANs, perform basic configurations for routers and switches, understand the fundamentals of network security, and implement IP addressing schemes.

The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.

The books features help you focus on important concepts to succeed in this course:

* Chapter objectives: Review core concepts by answering the focus questions listed at the beginning of each chapter. * Key terms: Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter. * Glossary: Consult the comprehensive Glossary with more than 300 terms. * Summary of Activities and Labs: Maximize your study time with this complete list of all associated practice exercises at the end of each chapter. Check Your Understanding: Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.



* How To: Look for this icon to study the steps you need to learn to perform certain tasks. * Interactive Activities: Reinforce your understanding of topics with dozens of exercises from the online course identified throughout the book with this icon. * Videos: Watch the videos embedded within the online course. * Packet Tracer Activities: Explore and visualize networking concepts using Packet Tracer. There are multiple exercises interspersed throughout the chapters and provided in the accompanying Labs & Study Guide book. * Hands-on Labs: Work through all the labs and other activities that are included in the course and published in the separate Labs & Study Guide.

This book is offered exclusively for students enrolled in Cisco Networking Academy courses. It is not designed for independent study or professional certification preparation. Visit netacad.com to learn more about program options and requirements.Related titles: CCNA 200-301 Portable Command Guide Book: 9780135937822 eBook: 9780135937709 31 Days Before Your CCNA Exam Book: 9780135964088 eBook: 9780135964231 CCNA 200-301 Official Cert Guide, Volume 1 Book: 9780135792735 Premium Edition: 9780135792728 CCNA 200-301 Official Cert Guide, Volume 2 Book: 9781587147135 Premium Edition: 9780135262719
Introduction xxx
Chapter 1 Networking Today
1(1)
Objectives
1(1)
Key Terms
1(2)
Introduction (1.0)
3(1)
Networks Affect Our Lives (1.1)
3(1)
Networks Connect Us (1.1.1)
3(1)
No Boundaries (1.1.3)
3(1)
Network Components (1.2)
4(4)
Host Roles (1.2.1)
4(1)
Peer-to-Peer (1.2.2)
5(1)
End Devices (1.2.3)
6(1)
Intermediary Devices (1.2.4)
6(1)
Network Media (1.2.5)
7(1)
Network Representations and Topologies (1.3)
8(3)
Network Representations (1.3.1)
8(2)
Topology Diagrams (1.3.2)
10(1)
Physical Topology Diagrams
10(1)
Logical Topology Diagrams
10(1)
Common Types of Networks (1.4)
11(6)
Networks of Many Sizes (1.4.1)
11(1)
LANs and WANs (1.4.2)
12(1)
LANs
13(1)
WANs
14(1)
The Internet (1.4.3)
15(1)
Intranets and Extranets (1.4.4)
16(1)
Internet Connections (1.5)
17(6)
Internet Access Technologies (1.5.1)
17(1)
Home and Small Office Internet Connections (1.5.2)
18(1)
Businesses Internet Connections (1.5.3)
19(1)
The Converging Network (1.5.4)
20(3)
Reliable Networks (1.6)
23(4)
Network Architecture (1.6.1)
23(1)
Fault Tolerance (1.6.2)
24(1)
Scalability (1.6.3)
24(1)
Quality of Service (1.6.4)
25(1)
Network Security (1.6.5)
26(1)
Network Trends (1.7)
27(6)
Recent Trends (1.7.1)
28(1)
Bring Your Own Device (BYOD) (1.7.2)
28(1)
Online Collaboration (1.7.3)
28(1)
Video Communications (1.7.4)
29(1)
Cloud Computing (1.7.6)
29(2)
Technology Trends in the Home (1.7.7)
31(1)
Powerline Networking (1.7.8)
31(1)
Wireless Broadband (1.7.9)
32(1)
Wireless Internet Service Providers
32(1)
Wireless Broadband Service
32(1)
Network Security (1.8)
33(2)
Security Threats (1.8.1)
33(1)
Security Solutions (1.8.2)
34(1)
The IT Professional (1.9)
35(2)
CCNA (1.9.1)
35(1)
Networking Jobs (1.9.2)
36(1)
Summary (1.10)
37(3)
Networks Affect Our Lives
37(1)
Network Components
37(1)
Network Representations and Topologies
37(1)
Common Types of Networks
37(1)
Internet Connections
38(1)
Reliable Networks
38(1)
Network Trends
38(1)
Network Security
39(1)
The IT Professional
40(1)
Practice
40(1)
Check Your Understanding Questions
40(5)
Chapter 2 Basic Switch and End Device Configuration
45(1)
Objectives
45(1)
Key Terms
45(1)
Introduction (2.0)
46(1)
Cisco IOS Access (2.1)
46(6)
Operating Systems (2.1.1)
46(1)
GUI (2.1.2)
47(1)
Purpose of an OS (2.1.3)
48(1)
Access Methods (2.1.4)
49(1)
Terminal Emulation Programs (2.1.5)
50(2)
IOS Navigation (2.2)
52(4)
Primary Command Modes (2.2.1)
52(1)
Configuration Mode and Subconfiguration Modes (2.2.2)
53(1)
Navigate Between IOS Modes (2.2.4)
54(1)
A Note About Syntax Checker Activities (2.2.6)
55(1)
The Command Structure (2.3)
56(5)
Basic IOS Command Structure (2.3.1)
56(1)
IOS Command Syntax Check (2.3.2)
57(1)
IOS Help Features (2.3.3)
58(1)
Hot Keys and Shortcuts (2.3.5)
58(3)
Basic Device Configuration (2.4)
61(5)
Device Names (2.4.1)
61(1)
Password Guidelines (2.4.2)
62(1)
Configure Passwords (2.4.3)
63(1)
Encrypt Passwords (2.4.4)
64(1)
Banner Messages (2.4.5)
65(1)
Save Configurations (2.5)
66(5)
Configuration Files (2.5.1)
67(1)
Alter the Running Configuration (2.5.2)
68(1)
Capture Configuration to a Text File (2.5.4)
68(3)
Ports and Addresses (2.6)
71(59)
IP Addresses (2.6.1)
71(2)
Interfaces and Ports (2.6.2)
73(57)
Summary (3.8)
130(3)
The Rules
130(1)
Protocols
130(1)
Protocol Suites
130(1)
Standards Organizations
131(1)
Reference Models
131(1)
Data Encapsulation
132(1)
Data Access
132(1)
Practice
133(1)
Check Your Understanding Questions
133(4)
Chapter 4 Physical Layer
137(1)
Objectives
137(1)
Key Terms
137(1)
Introduction (4.0)
138(1)
Purpose of the Physical Layer (4.1)
138(3)
The Physical Connection (4.1.1)
138(1)
The Physical Layer (4.1.2)
139(2)
Physical Layer Characteristics (4.2)
141(5)
Physical Layer Standards (4.2.1)
141(1)
Physical Components (4.2.2)
142(1)
Encoding (4.2.3)
142(1)
Signaling (4.2.4)
143(2)
Bandwidth (4.2.5)
145(1)
Bandwidth Terminology (4.2.6)
145(1)
Latency
146(1)
Throughput
146(1)
Goodput
146(1)
Copper Cabling (4.3)
146(1)
Characteristics of Copper Cabling (4.3.1)
147(1)
Types of Copper Cabling (4.3.2)
148(1)
Unshielded Twisted-Pair (UTP) (4.3.3)
148(2)
Shielded Twisted-Pair (STP) (4.3.4)
150(1)
Coaxial Cable (4.3.5)
151(1)
UTP Cabling (4.4)
152(6)
Properties of UTP Cabling (4.4.1)
152(1)
UTP Cabling Standards and Connectors (4.4.2)
153(4)
Straight-Through and Crossover UTP Cables (4.4.3)
157(1)
Fiber-Optic Cabling (4.5)
158(6)
Properties of Fiber-Optic Cabling (4.5.1)
158(1)
Types of Fiber Media (4.5.2)
159(1)
Single-Mode Fiber
159(1)
Multimode Fiber
160(1)
Fiber-Optic Cabling Usage (4.5.3)
160(1)
Fiber-Optic Connectors (4.5.4)
161(1)
Fiber Patch Cords (4.5.5)
162(1)
Fiber Versus Copper (4.5.6)
163(1)
Wireless Media (4.6)
164(4)
Properties of Wireless Media (4.6.1)
164(1)
Types of Wireless Media (4.6.2)
165(1)
Wireless LAN (4.6.3)
166(2)
Summary (4.7)
168(2)
Purpose of the Physical Layer
168(1)
Physical Layer Characteristics
168(1)
Copper Cabling
168(1)
UTP Cabling
169(1)
Fiber-Optic Cabling
169(1)
Wireless Media
169(1)
Practice
170(1)
Check Your Understanding Questions
170(5)
Chapter 5 Number Systems
175(28)
Objectives
175(1)
Key Terms
175(1)
Introduction (5.0)
176(1)
Binary Number System (5.1)
176(18)
Binary and IPv4 Addresses (5.1.1)
176(2)
Binary Positional Notation (5.1.3)
178(2)
Convert Binary to Decimal (5.1.5)
180(2)
Decimal to Binary Conversion (5.1.7)
182(4)
Decimal to Binary Conversion Example (5.1.8)
186(7)
IPv4 Addresses (5.1.11)
193(1)
Hexadecimal Number System (5.2)
194(4)
Hexadecimal and IPv6 Addresses (5.2.1)
194(2)
Decimal to Hexadecimal Conversions (5.2.3)
196(1)
Hexadecimal to Decimal Conversion (5.2.4)
196(2)
Summary (5.3)
198(1)
Binary Number System
198(1)
Hexadecimal Number System
198(1)
Practice
198(1)
Check Your Understanding Questions
198(5)
Chapter 6 Data Link Layer
203(30)
Objectives
203(1)
Key Terms
203(1)
Introduction (6.0)
204(1)
Purpose of the Data Link Layer (6.1)
204(5)
The Data Link Layer (6.1.1)
204(2)
IEEE 802 LAN/MAN Data Link Sublayers (6.1.2)
206(1)
Providing Access to Media (6.1.3)
207(2)
Data Link Layer Standards (6.1.4)
209(1)
Topologies (6.2)
209(12)
Physical and Logical Topologies (6.2.1)
209(2)
WAN Topologies (6.2.2)
211(1)
Point-to-Poinr
211(1)
Hub and Spoke
211(1)
Mesh
212(1)
Point-to-Point WAN Topology (6.2.3)
213(1)
LAN Topologies (6.2.4)
213(1)
Legacy LAN Topologies
214(1)
Half-Duplex and Full-Duplex Communication (6.2.5)
215(1)
Half-Duplex Communication
215(1)
Full-Duplex Communication
215(1)
Access Control Methods (6.2.6)
216(1)
Contention-Based Access
216(1)
Controlled Access
217(1)
Contention-Based Access---CSMA/CD (6.2.7)
217(2)
Contention-Based Access---CSMA/CA (6.2.8)
219(2)
Data Link Frame (6.3)
221(7)
The Frame (6.3.1)
221(1)
Frame Fields (6.3.2)
222(1)
Layer 2 Addresses (6.3.3)
223(2)
LAN and WAN Frames (6.3.4)
225(3)
Summary (6.4)
228(1)
Purpose of the Data Link Layer
228(1)
Topologies
228(1)
Data Link Frame
229(1)
Practice
229(1)
Check Your Understanding Questions
229(4)
Chapter 7 Ethernet Switching
233(34)
Objectives
233(1)
Key Terms
233(1)
Introduction (7.0)
234(1)
Ethernet Frames (7.1)
234(5)
Ethernet Encapsulation (7.1.1)
234(1)
Data Link Sublayers (7.1.2)
235(1)
MAC Sublayer (7.1.3)
236(1)
Data Encapsulation
236(1)
Accessing the Media
237(1)
Ethernet Frame Fields (7.1.4)
237(2)
Ethernet MAC Address (7.2)
239(9)
MAC Address and Hexadecimal (7.2.1)
240(1)
Ethernet MAC Address (7.2.2)
241(2)
Frame Processing (7.2.3)
243(1)
Unicast MAC Address (7.2.4)
244(2)
Broadcast MAC Address (7.2.5)
246(1)
Multicast MAC Address (7.2.6)
247(1)
The MAC Address Table (7.3)
248(6)
Switch Fundamentals (7.3.1)
248(2)
Switch Learning and Forwarding (7.3.2)
250(1)
Examine the Source MAC Address
250(1)
Find the Destination MAC Address
250(2)
Filtering Frames (7.3.3)
252(2)
Switch Speeds and Forwarding Methods (7.4)
254(7)
Frame Forwarding Methods on Cisco Switches (7.4.1)
254(1)
Cut-Through Switching (7.4.2)
255(2)
Memory Buffering on Switches (7.4.3)
257(1)
Duplex and Speed Settings (7.4.4)
257(2)
Auto-MDIX (7.4.5)
259(2)
Summary (7.5)
261(1)
Ethernet Frame
261(1)
Ethernet MAC Address
261(1)
The MAC Address Table
261(1)
Switch Speeds and Forwarding Methods
262(1)
Practice
262(1)
Check Your Understanding Questions
262(5)
Chapter 8 Network Layer
267(30)
Objectives
267(1)
Key Terms
267(1)
Introduction (8.0)
268(1)
Network Layer Characteristics (8.1)
268(6)
The Network Layer (8.1.1)
268(2)
IP Encapsulation (8.1.2)
270(1)
Characteristics of IP (8.1.3)
271(1)
Connectionless (8.1.4)
271(1)
Best Effort (8.1.5)
272(1)
Media Independent (8.1.6)
273(1)
IPv4 Packet (8.2)
274(2)
IPv4 Packet Header (8.2.1)
274(1)
IPv4 Packet Header Fields (8.2.2)
274(2)
IPv6 Packet (8.3)
276(5)
Limitations of IPv4 (8.3.1)
277(1)
IPv6 Overview (8.3.2)
277(1)
IPv4 Packet Header Fields in the IPv6 Packet Header (8.3.3)
278(2)
IPv6 Packet Header (8.3.4)
280(1)
How a Host Routes (8.4)
281(4)
Host Forwarding Decision (8.4.1)
281(1)
Default Gateway (8.4.2)
282(1)
A Host Routes to the Default Gateway (8.4.3)
283(1)
Host Routing Tables (8.4.4)
283(2)
Introduction to Routing (8.5)
285(7)
Router Packet Forwarding Decision (8.5.1)
285(1)
IP Router Routing Table (8.5.2)
286(1)
Static Routing (8.5.3)
287(1)
Dynamic Routing (8.5.4)
288(2)
Introduction to an IPv4 Routing Table (8.5.6)
290(2)
Summary (8.6)
292(2)
Network Layer Characteristics
292(1)
IPv4 Packet
292(1)
IPv6 Packet
292(1)
How a Host Routes
293(1)
Introduction to Routing
293(1)
Practice
294(1)
Check Your Understanding Questions
294(3)
Chapter 9 Address Resolution
297(22)
Objectives
297(1)
Key Terms
297(1)
Introduction (9.0)
298(1)
MAC and IP (9.1)
298(3)
Destination on Same Network (9.1.1)
298(1)
Destination on Remote Network (9.1.2)
299(2)
ARP (9.2)
301(8)
ARP Overview (9.2.1)
301(1)
ARP Functions (9.2.2)
302(4)
Removing Entries from an ARP Table (9.2.6)
306(1)
ARP Tables on Networking Devices (9.2.7)
306(1)
ARP Issues---ARP Broadcasts and ARP Spoofing (9.2.8)
307(2)
IPv6 Neighbor Discovery (9.3)
309(4)
IPv6 Neighbor Discovery Messages (9.3.2)
309(2)
IPv6 Neighbor Discovery---Address Resolution (9.3.3)
311(2)
Summary (9.4)
313(1)
MAC and IP
313(1)
ARP
313(1)
Neighbor Discovery
314(1)
Practice
314(1)
Check Your Understanding Questions
314(5)
Chapter 10 Basic Router Configuration
319(22)
Objectives
319(1)
Introduction (10.0)
320(1)
Configure Initial Router Settings (10.1)
320(3)
Basic Router Configuration Steps (10.1.1)
320(1)
Basic Router Configuration Example (10.1.2)
321(2)
Configure Interfaces (10.2)
323(7)
Configure Router Interfaces (10.2.1)
323(1)
Configure Router Interfaces Example (10.2.2)
324(1)
Verify Interface Configuration (10.2.3)
325(1)
Configuration Verification Commands (10.2.4)
326(4)
Configure the Default Gateway (10.3)
330(5)
Default Gateway on a Host (10.3.1)
331(1)
Default Gateway on a Switch (10.3.2)
332(3)
Summary (10.4)
335(1)
Configure Initial Router Settings
335(1)
Configure Interfaces
335(1)
Configure the Default Gateway
335(1)
Practice
336(1)
Check Your Understanding Questions
337(4)
Chapter 11 IPv4 Addressing
341(56)
Objectives
341(1)
Key Terms
341(1)
Introduction (11.0)
342(1)
IPv4 Address Structure (11.1)
342(7)
Network and Host Portions (11.1.1)
342(1)
The Subnet Mask (11.1.2)
343(1)
The Prefix Length (11.1.3)
344(1)
Determining the Network: Logical AND (11.1.4)
345(2)
Network, Host, and Broadcast Addresses (11.1.6)
347(1)
Network Address
347(1)
Host Addresses
348(1)
Broadcast Address
349(1)
IPv4 Unicast, Broadcast, and Multicast (11.2)
349(4)
Unicast (11.2.1)
349(1)
Broadcast (11.2.2)
350(1)
IP Directed Broadcasts
351(1)
Multicast (11.2.3)
352(1)
Types of IPv4 Addresses (11.3)
353(6)
Public and Private IPv4 Addresses (11.3.1)
353(1)
Routing to the Internet (11.3.2)
354(2)
Special Use IPv4 Addresses (11.3.4)
356(1)
Loopback Addresses
356(1)
Link-Local Addresses
357(1)
Legacy Classful Addressing (11.3.5)
357(1)
Assignment of IP Addresses (11.3.6)
358(1)
Network Segmentation (11.4)
359(5)
Broadcast Domains and Segmentation (11.4.1)
359(1)
Problems with Large Broadcast Domains (11.4.2)
360(2)
Reasons for Segmenting Networks (11.4.3)
362(2)
Subnet an IPv4 Network (11.5)
364(3)
Subnet on an Octet Boundary (11.5.1)
364(2)
Subnet Within an Octet Boundary (11.5.2)
366(1)
Subnet a Slash 16 and a Slash 8 Prefix (11.6)
367(7)
Create Subnets with a Slash 16 Prefix (11.6.1)
367(2)
Create 100 Subnets with a Slash 16 Prefix (11.6.2)
369(3)
Create 1000 Subnets with a Slash 8 Prefix (11.6.3)
372(2)
Subnet to Meet Requirements (11.7)
374(7)
Subnet Private Versus Public IPv4 Address Space (11.7.1)
374(3)
What About the DMZ?
377(1)
Minimize Unused Host IPv4 Addresses and Maximize Subnets (11.7.2)
377(1)
Example: Efficient IPv4 Subnetting (11.7.3)
378(3)
VLSM (11.8)
381(6)
IPv4 Address Conservation (11.8.3)
381(2)
VLSM (11.8.4)
383(3)
VLSM Topology Address Assignment (11.8.5)
386(1)
Structured Design (11.9)
387(3)
IPv4 Network Address Planning (11.9.1)
388(1)
Device Address Assignment (11.9.2)
389(1)
Summary (11.10)
390(3)
IPv4 Addressing Structure
390(1)
IPv4 Unicast, Broadcast, and Multicast
390(1)
Types of IPv4 Addresses
390(1)
Network Segmentation
391(1)
Subnet an IPv4 Network
391(1)
Subnet a/16 and a/8 Prefix
391(1)
Subnet to Meet Requirements
391(1)
Variable-Length Subnet Masking
392(1)
Structured Design
392(1)
Practice
393(1)
Check Your Understanding Questions
393(4)
Chapter 12 IPv6 Addressing
397(46)
Objectives
397(1)
Key Terms
397(1)
Introduction (12.0)
398(1)
IPv4 Issues (12.1)
398(3)
Need for IPv6 (12.1.1)
398(1)
Internet of Things
399(1)
IPv4 and IPv6 Coexistence (12.1.2)
399(1)
Dual Stack
399(1)
Tunneling
400(1)
Translation
401(1)
IPv6 Address Representation (12.2)
401(5)
IPv6 Addressing Formats (12.2.1)
401(1)
Preferred Format
402(1)
Rule 1---Omit Leading Zeros (12.2.2)
403(1)
Rule 2---Double Colon (12.2.3)
404(2)
IPv6 Address Types (12.3)
406(7)
Unicast, Multicast, Anycast (12.3.1)
406(1)
IPv6 Prefix Length (12.3.2)
406(1)
Types of IPv6 Unicast Addresses (12.3.3)
407(1)
A Note About the Unique Local Address (12.3.4)
408(1)
IPv6 GUA (12.3.5)
408(1)
IPv6 GUA Structure (12.3.6)
409(1)
Global Routing Prefix
410(1)
Subnet ID
410(1)
Interface ID
410(1)
IPv6 LLA (12.3.7)
411(2)
GUA and LLA Static Configuration (12.4)
413(4)
Static GUA Configuration on a Router (12.4.1)
413(1)
Static GUA Configuration on a Windows Host (12.4.2)
414(1)
Static Configuration of a Link-Local Unicast Address (12.4.3)
415(2)
Dynamic Addressing for IPv6 GUAs (12.5)
417(8)
RS and RA Messages (12.5.1)
417(1)
Method 1 SLAAC (12.5.2)
418(1)
Method 2 SLAAC and Stateless DHCPv6 (12.5.3)
419(1)
Method 3 Stateful DHCPv6 (12.5.4)
420(1)
EUI-64 Process vs. Randomly Generated (12.5.5)
421(1)
EUI-64 Process (12.5.6)
422(2)
Randomly Generated Interface IDs (12.5.7)
424(1)
Dynamic Addressing for IPv6 LLAs (12.6)
425(5)
Dynamic LLAs (12.6.1)
425(1)
Dynamic LLAs on Windows (12.6.2)
425(1)
Dynamic LLAs on Cisco Routers (12.6.3)
426(1)
Verify IPv6 Address Configuration (12.6.4)
427(3)
IPv6 Multicast Addresses (12.7)
430(2)
Assigned IPv6 Multicast Addresses (12.7.1)
430(1)
Weil-Known IPv6 Multicast Addresses (12.7.2)
430(2)
Solicited-Node IPv6 Multicast Addresses (12.7.3)
432(1)
Subnet an IPv6 Network (12.8)
432(4)
Subnet Using the Subnet ID (12.8.1)
432(1)
IPv6 Subnetting Example (12.8.2)
433(1)
IPv6 Subnet Allocation (12.8.3)
434(1)
Router Configured with IPv6 Subnets (12.8.4)
435(1)
Summary (12.9)
436(3)
IPv4 Issues
436(1)
IPv6 Address Representation
436(1)
IPv6 Address Types
436(1)
GUA and LLA Static Configuration
437(1)
Dynamic Addressing for IPv6 GUAs
437(1)
Dynamic Addressing for IPv6 LLAs
437(1)
IPv6 Multicast Addresses
438(1)
Subnet an IPv6 Network
438(1)
Practice
439(1)
Check Your Understanding Questions
439(4)
Chapter 13 ICMP
443(18)
Objectives
443(1)
Introduction (13.0)
444(1)
ICMP Messages (13.1)
444(5)
ICMPv4 and ICMPv6 Messages (13.1.1)
444(1)
Host Reachability (13.1.2)
444(1)
Destination or Service Unreachable (13.1.3)
445(1)
Time Exceeded (13.1.4)
446(1)
ICMPv6 Messages (13.1.5)
446(3)
Ping and Traceroute Tests (13.2)
449(5)
Ping---Test Connectivity (13.2.1)
449(1)
Ping the Loopback (13.2.2)
450(1)
Ping the Default Gateway (13.2.3)
450(1)
Ping a Remote Host (13.2.4)
451(1)
Traceroute---Test the Path (13.2.5)
452(1)
Round-Trip Time (RTT)
453(1)
IPv4 TTL and IPv6 Hop Limit
453(1)
Summary (13.3)
454(1)
ICMP Messages
454(1)
Ping and Traceroute Testing
454(1)
Practice
455(1)
Check Your Understanding Questions
456(5)
Chapter 14 Transport Layer
461(46)
Objectives
461(1)
Key Terms
461(1)
Introduction (14.0)
462(1)
Transportation of Data (14.1)
462(8)
Role of the Transport Layer (14.1.1)
462(1)
Transport Layer Responsibilities (14.1.2)
463(4)
Transport Layer Protocols (14.1.3)
467(1)
Transmission Control Protocol (TCP) (14.1.4)
467(1)
User Datagram Protocol (UDP) (14.1.5)
468(1)
The Right Transport Layer Protocol for the Right Application (14.1.6)
469(1)
TCP Overview (14.2)
470(3)
TCP Features (14.2.1)
470(1)
TCP Header (14.2.2)
471(1)
TCP Header Fields (14.2.3)
471(1)
Applications That Use TCP (14.2.4)
472(1)
UDP Overview (14.3)
473(3)
UDP Features (14.3.1)
473(1)
UDP Header (14.3.2)
474(1)
UDP Header Fields (14.3.3)
474(1)
Applications that use UDP (14.3.4)
475(1)
Port Numbers (14.4)
476(4)
Multiple Separate Communications (14.4.1)
476(1)
Socket Pairs (14.4.2)
477(1)
Port Number Groups (14.4.3)
478(1)
The netstat Command (14.4.4)
479(1)
TCP Communication Process (14.5)
480(6)
TCP Server Processes (14.5.1)
480(3)
TCP Connection Establishment (14.5.2)
483(1)
Session Termination (14.5.3)
484(1)
TCP Three-Way Handshake Analysis (14.5.4)
485(1)
Reliability and Flow Control (14.6)
486(8)
TCP Reliability---Guaranteed and Ordered Delivery (14.6.1)
486(2)
TCP Reliability---Data Loss and Retransmission (14.6.3)
488(2)
TCP Flow Control---Window Size and Acknowledgments (14.6.5)
490(1)
TCP Flow Control---Maximum Segment Size (MSS) (14.6.6)
491(2)
TCP Flow Control---Congestion Avoidance (14.6.7)
493(1)
UDP Communication (14.7)
494(5)
UDP Low Overhead Versus Reliability (14.7.1)
494(1)
UDP Datagram Reassembly (14.7.2)
494(1)
UDP Server Processes and Requests (14.7.3)
495(1)
UDP Client Processes (14.7.4)
495(4)
Summary (14.8)
499(2)
Transportation of Data
499(1)
TCP Overview
499(1)
UDP Overview
499(1)
Port Numbers
499(1)
TCP Communications Process
500(1)
Reliability and Flow Control
500(1)
UDP Communication
501(1)
Practice
501(1)
Check Your Understanding Questions
502(5)
Chapter 15 Application Layer
507(34)
Objectives
507(1)
Key Terms
507(1)
Introduction (15.0)
508(1)
Application, Presentation, and Session (15.1)
508(3)
Application Layer (15.1.1)
508(1)
Presentation and Session Layer (15.1.2)
508(2)
TCP/IP Application Layer Protocols (15.1.3)
510(1)
Peer-to-Peer (15.2)
511(4)
Client-Server Model (15.2.1)
511(1)
Peer-to-Peer Networks (15.2.2)
512(1)
Peer-to-Peer Applications (15.2.3)
513(1)
Common P2P Applications (15.2.4)
514(1)
Web and Email Protocols (15.3)
515(6)
Hypertext Transfer Protocol and Hypertext Markup Language (15.3.1)
515(1)
HTTP and HTTPS (15.3.2)
516(2)
Email Protocols (15.3.3)
518(1)
SMTP, POP, and IMAP (15.3.4)
519(1)
SMTP
519(1)
POP
520(1)
IMAP
521(1)
IP Addressing Services (15.4)
521(9)
Domain Name Service (15.4.1)
522(2)
DNS Message Format (15.4.2)
524(1)
DNS Hierarchy (15.4.3)
525(1)
The nslookup Command (15.4.4)
526(1)
Dynamic Host Configuration Protocol (15.4.6)
527(1)
DHCP Operation (15.4.7)
528(2)
File Sharing Services (15.5)
530(4)
File Transfer Protocol (15.5.1)
530(1)
Server Message Block (15.5.2)
531(3)
Summary
534(2)
Application, Presentation, and Session
534(1)
Peer-to-Peer
534(1)
Web and Email Protocols
534(1)
IP Addressing Services
535(1)
File Sharing Services
535(1)
Practice
536(1)
Check Your Understanding Questions
536(5)
Chapter 16 Network Security Fundamentals
541(30)
Objectives
541(1)
Key Terms
541(1)
Introduction (16.0)
542(1)
Security Threats and Vulnerabilities (16.1)
542(4)
Types of Threats (16.1.1)
542(1)
Types of Vulnerabilities (16.1.2)
543(2)
Physical Security (16.1.3)
545(1)
Network Attacks (16.2)
546(6)
Types of Malware (16.2.1)
546(1)
Viruses
546(1)
Worms
547(1)
Trojan Horses
547(1)
Reconnaissance Attacks (16.2.2)
547(1)
Access Attacks (16.2.3)
548(1)
Password Arracks
548(1)
Trust Exploitation
548(1)
Port Redirection
549(1)
Man-in-the-Middle
549(2)
Denial of Service Attacks (16.2.4)
551(1)
DoS Attack
551(1)
DDoS Attack
551(1)
Network Attack Mitigations (16.3)
552(6)
The Defense-in-Depth Approach (16.3.1)
553(1)
Keep Backups (16.3.2)
553(1)
Upgrade, Update, and Patch (16.3.3)
554(1)
Authentication, Authorization, and Accounting (16.3.4)
555(1)
Firewalls (16.3.5)
555(2)
Types of Firewalls (16.3.6)
557(1)
Endpoint Security (16.3.7)
558(1)
Device Security (16.4)
558(7)
Cisco AutoSecure (16.4.1)
558(1)
Passwords (16.4.2)
559(1)
Additional Password Security (16.4.3)
560(1)
Enable SSH (16.4.4)
561(2)
Disable Unused Services (16.4.5)
563(2)
Summary
565(2)
Security Threats and Vulnerabilities
565(1)
Network Attacks
565(1)
Network Attack Mitigation
565(1)
Device Security
566(1)
Practice
567(1)
Check Your Understanding Questions
567(4)
Chapter 17 Build a Small Network
571(60)
Objectives
571(1)
Key Terms
571(1)
Introduction (17.0)
572(1)
Devices in a Small Network (17.1)
572(6)
Small Network Topologies (17.1.1)
572(1)
Device Selection for a Small Network (17.1.2)
573(1)
Cost
573(1)
Speed and Types of Ports/Interfaces
573(1)
Expandability
573(1)
Operating System Features and Services
574(1)
IP Addressing for a Small Network (17.1.3)
574(2)
Redundancy in a Small Network (17.1.4)
576(1)
Traffic Management (17.1.5)
577(1)
Small Network Applications and Protocols (17.2)
578(5)
Common Applications (17.2.1)
578(1)
Network Applications
578(1)
Application Layer Services
579(1)
Common Protocols (17.2.2)
579(3)
Voice and Video Applications (17.2.3)
582(1)
Scale to Larger Networks (17.3)
583(3)
Small Network Growth (17.3.1)
583(1)
Protocol Analysis (17.3.2)
583(1)
Employee Network Utilization (17.3.3)
584(2)
Verify Connectivity (17.4)
586(10)
Verify Connectivity with Ping (17.4.1)
586(2)
Extended Ping (17.4.2)
588(2)
Verify Connectivity with Traceroute (17.4.3)
590(2)
Extended Traceroute (17.4.4)
592(1)
Network Baseline (17.4.5)
593(3)
Host and IOS Commands (17.5)
596(15)
IP Configuration on a Windows Host (17.5.1)
596(3)
IP Configuration on a Linux Host (17.5.2)
599(1)
IP Configuration on a macOS Host (17.5.3)
600(1)
The ARP Command (17.5.4)
601(1)
Common show Commands Revisited (17.5.5)
602(7)
The show CDP neighbors Command (17.5.6)
609(1)
The show IP interface brief Command (17.5.7)
610(1)
Verify Switch Interfaces
611(1)
Troubleshooting Methodologies (17.6)
611(5)
Basic Troubleshooting Approaches (17.6.1)
612(1)
Resolve or Escalate? (17.6.2)
613(1)
The debug Command (17.6.3)
613(2)
The terminal monitor Command (17.6.4)
615(1)
Troubleshooting Scenarios (17.7)
616(8)
Duplex Operation and Mismatch Issues (17.7.1)
617(1)
IP Addressing Issues on IOS Devices (17.7.2)
618(1)
IP Addressing Issues on End Devices (17.7.3)
619(1)
Default Gateway Issues (17.7.4)
619(2)
Troubleshooting DNS Issues (17.7.5)
621(3)
Summary (17.8)
624(3)
Devices in a Small Network
624(1)
Small Network Applications and Protocols
624(1)
Scale to Larger Networks
624(1)
Verify Connectivity
625(1)
Host and IOS Commands
625(1)
Troubleshooting Methodologies
626(1)
Troubleshooting Scenarios
626(1)
Practice
627(1)
Check Your Understanding Questions
628(3)
Appendix A Answers to "Check Your Understanding" Questions 631(14)
Key Terms Glossary 645(24)
Index 669
Cisco Networking Academy teaches hundreds of thousands of students annually the skills needed to build, design, and maintain networks, improving their career prospects while filling the global demand for networking professionals. With 10,000 academies in 165 countries, it helps individuals prepare for industry-recognized certifications and entry-level information and communication technology careers in virtually every industrydeveloping foundational technical skills while acquiring vital 21st-century career skills in problem solving, collaboration, and critical thinking. Cisco Networking Academy uses a public-private partnership model to create the "world's largest classroom."