Introduction |
|
xxx | |
|
Chapter 1 Networking Today |
|
|
1 | (1) |
|
|
1 | (1) |
|
|
1 | (2) |
|
|
3 | (1) |
|
Networks Affect Our Lives (1.1) |
|
|
3 | (1) |
|
Networks Connect Us (1.1.1) |
|
|
3 | (1) |
|
|
3 | (1) |
|
|
4 | (4) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
Intermediary Devices (1.2.4) |
|
|
6 | (1) |
|
|
7 | (1) |
|
Network Representations and Topologies (1.3) |
|
|
8 | (3) |
|
Network Representations (1.3.1) |
|
|
8 | (2) |
|
Topology Diagrams (1.3.2) |
|
|
10 | (1) |
|
Physical Topology Diagrams |
|
|
10 | (1) |
|
Logical Topology Diagrams |
|
|
10 | (1) |
|
Common Types of Networks (1.4) |
|
|
11 | (6) |
|
Networks of Many Sizes (1.4.1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
Intranets and Extranets (1.4.4) |
|
|
16 | (1) |
|
Internet Connections (1.5) |
|
|
17 | (6) |
|
Internet Access Technologies (1.5.1) |
|
|
17 | (1) |
|
Home and Small Office Internet Connections (1.5.2) |
|
|
18 | (1) |
|
Businesses Internet Connections (1.5.3) |
|
|
19 | (1) |
|
The Converging Network (1.5.4) |
|
|
20 | (3) |
|
|
23 | (4) |
|
Network Architecture (1.6.1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
24 | (1) |
|
Quality of Service (1.6.4) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
27 | (6) |
|
|
28 | (1) |
|
Bring Your Own Device (BYOD) (1.7.2) |
|
|
28 | (1) |
|
Online Collaboration (1.7.3) |
|
|
28 | (1) |
|
Video Communications (1.7.4) |
|
|
29 | (1) |
|
|
29 | (2) |
|
Technology Trends in the Home (1.7.7) |
|
|
31 | (1) |
|
Powerline Networking (1.7.8) |
|
|
31 | (1) |
|
Wireless Broadband (1.7.9) |
|
|
32 | (1) |
|
Wireless Internet Service Providers |
|
|
32 | (1) |
|
Wireless Broadband Service |
|
|
32 | (1) |
|
|
33 | (2) |
|
|
33 | (1) |
|
Security Solutions (1.8.2) |
|
|
34 | (1) |
|
The IT Professional (1.9) |
|
|
35 | (2) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
37 | (3) |
|
Networks Affect Our Lives |
|
|
37 | (1) |
|
|
37 | (1) |
|
Network Representations and Topologies |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
40 | (1) |
|
Check Your Understanding Questions |
|
|
40 | (5) |
|
Chapter 2 Basic Switch and End Device Configuration |
|
|
45 | (1) |
|
|
45 | (1) |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
46 | (6) |
|
Operating Systems (2.1.1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
Terminal Emulation Programs (2.1.5) |
|
|
50 | (2) |
|
|
52 | (4) |
|
Primary Command Modes (2.2.1) |
|
|
52 | (1) |
|
Configuration Mode and Subconfiguration Modes (2.2.2) |
|
|
53 | (1) |
|
Navigate Between IOS Modes (2.2.4) |
|
|
54 | (1) |
|
A Note About Syntax Checker Activities (2.2.6) |
|
|
55 | (1) |
|
The Command Structure (2.3) |
|
|
56 | (5) |
|
Basic IOS Command Structure (2.3.1) |
|
|
56 | (1) |
|
IOS Command Syntax Check (2.3.2) |
|
|
57 | (1) |
|
IOS Help Features (2.3.3) |
|
|
58 | (1) |
|
Hot Keys and Shortcuts (2.3.5) |
|
|
58 | (3) |
|
Basic Device Configuration (2.4) |
|
|
61 | (5) |
|
|
61 | (1) |
|
Password Guidelines (2.4.2) |
|
|
62 | (1) |
|
Configure Passwords (2.4.3) |
|
|
63 | (1) |
|
Encrypt Passwords (2.4.4) |
|
|
64 | (1) |
|
|
65 | (1) |
|
Save Configurations (2.5) |
|
|
66 | (5) |
|
Configuration Files (2.5.1) |
|
|
67 | (1) |
|
Alter the Running Configuration (2.5.2) |
|
|
68 | (1) |
|
Capture Configuration to a Text File (2.5.4) |
|
|
68 | (3) |
|
Ports and Addresses (2.6) |
|
|
71 | (59) |
|
|
71 | (2) |
|
Interfaces and Ports (2.6.2) |
|
|
73 | (57) |
|
|
130 | (3) |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
Check Your Understanding Questions |
|
|
133 | (4) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
138 | (1) |
|
Purpose of the Physical Layer (4.1) |
|
|
138 | (3) |
|
The Physical Connection (4.1.1) |
|
|
138 | (1) |
|
The Physical Layer (4.1.2) |
|
|
139 | (2) |
|
Physical Layer Characteristics (4.2) |
|
|
141 | (5) |
|
Physical Layer Standards (4.2.1) |
|
|
141 | (1) |
|
Physical Components (4.2.2) |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
143 | (2) |
|
|
145 | (1) |
|
Bandwidth Terminology (4.2.6) |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
Characteristics of Copper Cabling (4.3.1) |
|
|
147 | (1) |
|
Types of Copper Cabling (4.3.2) |
|
|
148 | (1) |
|
Unshielded Twisted-Pair (UTP) (4.3.3) |
|
|
148 | (2) |
|
Shielded Twisted-Pair (STP) (4.3.4) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
152 | (6) |
|
Properties of UTP Cabling (4.4.1) |
|
|
152 | (1) |
|
UTP Cabling Standards and Connectors (4.4.2) |
|
|
153 | (4) |
|
Straight-Through and Crossover UTP Cables (4.4.3) |
|
|
157 | (1) |
|
Fiber-Optic Cabling (4.5) |
|
|
158 | (6) |
|
Properties of Fiber-Optic Cabling (4.5.1) |
|
|
158 | (1) |
|
Types of Fiber Media (4.5.2) |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
160 | (1) |
|
Fiber-Optic Cabling Usage (4.5.3) |
|
|
160 | (1) |
|
Fiber-Optic Connectors (4.5.4) |
|
|
161 | (1) |
|
Fiber Patch Cords (4.5.5) |
|
|
162 | (1) |
|
Fiber Versus Copper (4.5.6) |
|
|
163 | (1) |
|
|
164 | (4) |
|
Properties of Wireless Media (4.6.1) |
|
|
164 | (1) |
|
Types of Wireless Media (4.6.2) |
|
|
165 | (1) |
|
|
166 | (2) |
|
|
168 | (2) |
|
Purpose of the Physical Layer |
|
|
168 | (1) |
|
Physical Layer Characteristics |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
170 | (1) |
|
Check Your Understanding Questions |
|
|
170 | (5) |
|
|
175 | (28) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
Binary Number System (5.1) |
|
|
176 | (18) |
|
Binary and IPv4 Addresses (5.1.1) |
|
|
176 | (2) |
|
Binary Positional Notation (5.1.3) |
|
|
178 | (2) |
|
Convert Binary to Decimal (5.1.5) |
|
|
180 | (2) |
|
Decimal to Binary Conversion (5.1.7) |
|
|
182 | (4) |
|
Decimal to Binary Conversion Example (5.1.8) |
|
|
186 | (7) |
|
|
193 | (1) |
|
Hexadecimal Number System (5.2) |
|
|
194 | (4) |
|
Hexadecimal and IPv6 Addresses (5.2.1) |
|
|
194 | (2) |
|
Decimal to Hexadecimal Conversions (5.2.3) |
|
|
196 | (1) |
|
Hexadecimal to Decimal Conversion (5.2.4) |
|
|
196 | (2) |
|
|
198 | (1) |
|
|
198 | (1) |
|
Hexadecimal Number System |
|
|
198 | (1) |
|
|
198 | (1) |
|
Check Your Understanding Questions |
|
|
198 | (5) |
|
Chapter 6 Data Link Layer |
|
|
203 | (30) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
204 | (1) |
|
Purpose of the Data Link Layer (6.1) |
|
|
204 | (5) |
|
The Data Link Layer (6.1.1) |
|
|
204 | (2) |
|
IEEE 802 LAN/MAN Data Link Sublayers (6.1.2) |
|
|
206 | (1) |
|
Providing Access to Media (6.1.3) |
|
|
207 | (2) |
|
Data Link Layer Standards (6.1.4) |
|
|
209 | (1) |
|
|
209 | (12) |
|
Physical and Logical Topologies (6.2.1) |
|
|
209 | (2) |
|
|
211 | (1) |
|
|
211 | (1) |
|
|
211 | (1) |
|
|
212 | (1) |
|
Point-to-Point WAN Topology (6.2.3) |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
214 | (1) |
|
Half-Duplex and Full-Duplex Communication (6.2.5) |
|
|
215 | (1) |
|
Half-Duplex Communication |
|
|
215 | (1) |
|
Full-Duplex Communication |
|
|
215 | (1) |
|
Access Control Methods (6.2.6) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
Contention-Based Access---CSMA/CD (6.2.7) |
|
|
217 | (2) |
|
Contention-Based Access---CSMA/CA (6.2.8) |
|
|
219 | (2) |
|
|
221 | (7) |
|
|
221 | (1) |
|
|
222 | (1) |
|
Layer 2 Addresses (6.3.3) |
|
|
223 | (2) |
|
LAN and WAN Frames (6.3.4) |
|
|
225 | (3) |
|
|
228 | (1) |
|
Purpose of the Data Link Layer |
|
|
228 | (1) |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
229 | (1) |
|
Check Your Understanding Questions |
|
|
229 | (4) |
|
Chapter 7 Ethernet Switching |
|
|
233 | (34) |
|
|
233 | (1) |
|
|
233 | (1) |
|
|
234 | (1) |
|
|
234 | (5) |
|
Ethernet Encapsulation (7.1.1) |
|
|
234 | (1) |
|
Data Link Sublayers (7.1.2) |
|
|
235 | (1) |
|
|
236 | (1) |
|
|
236 | (1) |
|
|
237 | (1) |
|
Ethernet Frame Fields (7.1.4) |
|
|
237 | (2) |
|
Ethernet MAC Address (7.2) |
|
|
239 | (9) |
|
MAC Address and Hexadecimal (7.2.1) |
|
|
240 | (1) |
|
Ethernet MAC Address (7.2.2) |
|
|
241 | (2) |
|
|
243 | (1) |
|
Unicast MAC Address (7.2.4) |
|
|
244 | (2) |
|
Broadcast MAC Address (7.2.5) |
|
|
246 | (1) |
|
Multicast MAC Address (7.2.6) |
|
|
247 | (1) |
|
The MAC Address Table (7.3) |
|
|
248 | (6) |
|
Switch Fundamentals (7.3.1) |
|
|
248 | (2) |
|
Switch Learning and Forwarding (7.3.2) |
|
|
250 | (1) |
|
Examine the Source MAC Address |
|
|
250 | (1) |
|
Find the Destination MAC Address |
|
|
250 | (2) |
|
|
252 | (2) |
|
Switch Speeds and Forwarding Methods (7.4) |
|
|
254 | (7) |
|
Frame Forwarding Methods on Cisco Switches (7.4.1) |
|
|
254 | (1) |
|
Cut-Through Switching (7.4.2) |
|
|
255 | (2) |
|
Memory Buffering on Switches (7.4.3) |
|
|
257 | (1) |
|
Duplex and Speed Settings (7.4.4) |
|
|
257 | (2) |
|
|
259 | (2) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
261 | (1) |
|
|
261 | (1) |
|
Switch Speeds and Forwarding Methods |
|
|
262 | (1) |
|
|
262 | (1) |
|
Check Your Understanding Questions |
|
|
262 | (5) |
|
|
267 | (30) |
|
|
267 | (1) |
|
|
267 | (1) |
|
|
268 | (1) |
|
Network Layer Characteristics (8.1) |
|
|
268 | (6) |
|
The Network Layer (8.1.1) |
|
|
268 | (2) |
|
|
270 | (1) |
|
Characteristics of IP (8.1.3) |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
Media Independent (8.1.6) |
|
|
273 | (1) |
|
|
274 | (2) |
|
IPv4 Packet Header (8.2.1) |
|
|
274 | (1) |
|
IPv4 Packet Header Fields (8.2.2) |
|
|
274 | (2) |
|
|
276 | (5) |
|
Limitations of IPv4 (8.3.1) |
|
|
277 | (1) |
|
|
277 | (1) |
|
IPv4 Packet Header Fields in the IPv6 Packet Header (8.3.3) |
|
|
278 | (2) |
|
IPv6 Packet Header (8.3.4) |
|
|
280 | (1) |
|
|
281 | (4) |
|
Host Forwarding Decision (8.4.1) |
|
|
281 | (1) |
|
|
282 | (1) |
|
A Host Routes to the Default Gateway (8.4.3) |
|
|
283 | (1) |
|
Host Routing Tables (8.4.4) |
|
|
283 | (2) |
|
Introduction to Routing (8.5) |
|
|
285 | (7) |
|
Router Packet Forwarding Decision (8.5.1) |
|
|
285 | (1) |
|
IP Router Routing Table (8.5.2) |
|
|
286 | (1) |
|
|
287 | (1) |
|
|
288 | (2) |
|
Introduction to an IPv4 Routing Table (8.5.6) |
|
|
290 | (2) |
|
|
292 | (2) |
|
Network Layer Characteristics |
|
|
292 | (1) |
|
|
292 | (1) |
|
|
292 | (1) |
|
|
293 | (1) |
|
|
293 | (1) |
|
|
294 | (1) |
|
Check Your Understanding Questions |
|
|
294 | (3) |
|
Chapter 9 Address Resolution |
|
|
297 | (22) |
|
|
297 | (1) |
|
|
297 | (1) |
|
|
298 | (1) |
|
|
298 | (3) |
|
Destination on Same Network (9.1.1) |
|
|
298 | (1) |
|
Destination on Remote Network (9.1.2) |
|
|
299 | (2) |
|
|
301 | (8) |
|
|
301 | (1) |
|
|
302 | (4) |
|
Removing Entries from an ARP Table (9.2.6) |
|
|
306 | (1) |
|
ARP Tables on Networking Devices (9.2.7) |
|
|
306 | (1) |
|
ARP Issues---ARP Broadcasts and ARP Spoofing (9.2.8) |
|
|
307 | (2) |
|
IPv6 Neighbor Discovery (9.3) |
|
|
309 | (4) |
|
IPv6 Neighbor Discovery Messages (9.3.2) |
|
|
309 | (2) |
|
IPv6 Neighbor Discovery---Address Resolution (9.3.3) |
|
|
311 | (2) |
|
|
313 | (1) |
|
|
313 | (1) |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
Check Your Understanding Questions |
|
|
314 | (5) |
|
Chapter 10 Basic Router Configuration |
|
|
319 | (22) |
|
|
319 | (1) |
|
|
320 | (1) |
|
Configure Initial Router Settings (10.1) |
|
|
320 | (3) |
|
Basic Router Configuration Steps (10.1.1) |
|
|
320 | (1) |
|
Basic Router Configuration Example (10.1.2) |
|
|
321 | (2) |
|
Configure Interfaces (10.2) |
|
|
323 | (7) |
|
Configure Router Interfaces (10.2.1) |
|
|
323 | (1) |
|
Configure Router Interfaces Example (10.2.2) |
|
|
324 | (1) |
|
Verify Interface Configuration (10.2.3) |
|
|
325 | (1) |
|
Configuration Verification Commands (10.2.4) |
|
|
326 | (4) |
|
Configure the Default Gateway (10.3) |
|
|
330 | (5) |
|
Default Gateway on a Host (10.3.1) |
|
|
331 | (1) |
|
Default Gateway on a Switch (10.3.2) |
|
|
332 | (3) |
|
|
335 | (1) |
|
Configure Initial Router Settings |
|
|
335 | (1) |
|
|
335 | (1) |
|
Configure the Default Gateway |
|
|
335 | (1) |
|
|
336 | (1) |
|
Check Your Understanding Questions |
|
|
337 | (4) |
|
Chapter 11 IPv4 Addressing |
|
|
341 | (56) |
|
|
341 | (1) |
|
|
341 | (1) |
|
|
342 | (1) |
|
IPv4 Address Structure (11.1) |
|
|
342 | (7) |
|
Network and Host Portions (11.1.1) |
|
|
342 | (1) |
|
|
343 | (1) |
|
The Prefix Length (11.1.3) |
|
|
344 | (1) |
|
Determining the Network: Logical AND (11.1.4) |
|
|
345 | (2) |
|
Network, Host, and Broadcast Addresses (11.1.6) |
|
|
347 | (1) |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
349 | (1) |
|
IPv4 Unicast, Broadcast, and Multicast (11.2) |
|
|
349 | (4) |
|
|
349 | (1) |
|
|
350 | (1) |
|
|
351 | (1) |
|
|
352 | (1) |
|
Types of IPv4 Addresses (11.3) |
|
|
353 | (6) |
|
Public and Private IPv4 Addresses (11.3.1) |
|
|
353 | (1) |
|
Routing to the Internet (11.3.2) |
|
|
354 | (2) |
|
Special Use IPv4 Addresses (11.3.4) |
|
|
356 | (1) |
|
|
356 | (1) |
|
|
357 | (1) |
|
Legacy Classful Addressing (11.3.5) |
|
|
357 | (1) |
|
Assignment of IP Addresses (11.3.6) |
|
|
358 | (1) |
|
Network Segmentation (11.4) |
|
|
359 | (5) |
|
Broadcast Domains and Segmentation (11.4.1) |
|
|
359 | (1) |
|
Problems with Large Broadcast Domains (11.4.2) |
|
|
360 | (2) |
|
Reasons for Segmenting Networks (11.4.3) |
|
|
362 | (2) |
|
Subnet an IPv4 Network (11.5) |
|
|
364 | (3) |
|
Subnet on an Octet Boundary (11.5.1) |
|
|
364 | (2) |
|
Subnet Within an Octet Boundary (11.5.2) |
|
|
366 | (1) |
|
Subnet a Slash 16 and a Slash 8 Prefix (11.6) |
|
|
367 | (7) |
|
Create Subnets with a Slash 16 Prefix (11.6.1) |
|
|
367 | (2) |
|
Create 100 Subnets with a Slash 16 Prefix (11.6.2) |
|
|
369 | (3) |
|
Create 1000 Subnets with a Slash 8 Prefix (11.6.3) |
|
|
372 | (2) |
|
Subnet to Meet Requirements (11.7) |
|
|
374 | (7) |
|
Subnet Private Versus Public IPv4 Address Space (11.7.1) |
|
|
374 | (3) |
|
|
377 | (1) |
|
Minimize Unused Host IPv4 Addresses and Maximize Subnets (11.7.2) |
|
|
377 | (1) |
|
Example: Efficient IPv4 Subnetting (11.7.3) |
|
|
378 | (3) |
|
|
381 | (6) |
|
IPv4 Address Conservation (11.8.3) |
|
|
381 | (2) |
|
|
383 | (3) |
|
VLSM Topology Address Assignment (11.8.5) |
|
|
386 | (1) |
|
|
387 | (3) |
|
IPv4 Network Address Planning (11.9.1) |
|
|
388 | (1) |
|
Device Address Assignment (11.9.2) |
|
|
389 | (1) |
|
|
390 | (3) |
|
IPv4 Addressing Structure |
|
|
390 | (1) |
|
IPv4 Unicast, Broadcast, and Multicast |
|
|
390 | (1) |
|
|
390 | (1) |
|
|
391 | (1) |
|
|
391 | (1) |
|
Subnet a/16 and a/8 Prefix |
|
|
391 | (1) |
|
Subnet to Meet Requirements |
|
|
391 | (1) |
|
Variable-Length Subnet Masking |
|
|
392 | (1) |
|
|
392 | (1) |
|
|
393 | (1) |
|
Check Your Understanding Questions |
|
|
393 | (4) |
|
Chapter 12 IPv6 Addressing |
|
|
397 | (46) |
|
|
397 | (1) |
|
|
397 | (1) |
|
|
398 | (1) |
|
|
398 | (3) |
|
|
398 | (1) |
|
|
399 | (1) |
|
IPv4 and IPv6 Coexistence (12.1.2) |
|
|
399 | (1) |
|
|
399 | (1) |
|
|
400 | (1) |
|
|
401 | (1) |
|
IPv6 Address Representation (12.2) |
|
|
401 | (5) |
|
IPv6 Addressing Formats (12.2.1) |
|
|
401 | (1) |
|
|
402 | (1) |
|
Rule 1---Omit Leading Zeros (12.2.2) |
|
|
403 | (1) |
|
Rule 2---Double Colon (12.2.3) |
|
|
404 | (2) |
|
IPv6 Address Types (12.3) |
|
|
406 | (7) |
|
Unicast, Multicast, Anycast (12.3.1) |
|
|
406 | (1) |
|
IPv6 Prefix Length (12.3.2) |
|
|
406 | (1) |
|
Types of IPv6 Unicast Addresses (12.3.3) |
|
|
407 | (1) |
|
A Note About the Unique Local Address (12.3.4) |
|
|
408 | (1) |
|
|
408 | (1) |
|
IPv6 GUA Structure (12.3.6) |
|
|
409 | (1) |
|
|
410 | (1) |
|
|
410 | (1) |
|
|
410 | (1) |
|
|
411 | (2) |
|
GUA and LLA Static Configuration (12.4) |
|
|
413 | (4) |
|
Static GUA Configuration on a Router (12.4.1) |
|
|
413 | (1) |
|
Static GUA Configuration on a Windows Host (12.4.2) |
|
|
414 | (1) |
|
Static Configuration of a Link-Local Unicast Address (12.4.3) |
|
|
415 | (2) |
|
Dynamic Addressing for IPv6 GUAs (12.5) |
|
|
417 | (8) |
|
RS and RA Messages (12.5.1) |
|
|
417 | (1) |
|
|
418 | (1) |
|
Method 2 SLAAC and Stateless DHCPv6 (12.5.3) |
|
|
419 | (1) |
|
Method 3 Stateful DHCPv6 (12.5.4) |
|
|
420 | (1) |
|
EUI-64 Process vs. Randomly Generated (12.5.5) |
|
|
421 | (1) |
|
|
422 | (2) |
|
Randomly Generated Interface IDs (12.5.7) |
|
|
424 | (1) |
|
Dynamic Addressing for IPv6 LLAs (12.6) |
|
|
425 | (5) |
|
|
425 | (1) |
|
Dynamic LLAs on Windows (12.6.2) |
|
|
425 | (1) |
|
Dynamic LLAs on Cisco Routers (12.6.3) |
|
|
426 | (1) |
|
Verify IPv6 Address Configuration (12.6.4) |
|
|
427 | (3) |
|
IPv6 Multicast Addresses (12.7) |
|
|
430 | (2) |
|
Assigned IPv6 Multicast Addresses (12.7.1) |
|
|
430 | (1) |
|
Weil-Known IPv6 Multicast Addresses (12.7.2) |
|
|
430 | (2) |
|
Solicited-Node IPv6 Multicast Addresses (12.7.3) |
|
|
432 | (1) |
|
Subnet an IPv6 Network (12.8) |
|
|
432 | (4) |
|
Subnet Using the Subnet ID (12.8.1) |
|
|
432 | (1) |
|
IPv6 Subnetting Example (12.8.2) |
|
|
433 | (1) |
|
IPv6 Subnet Allocation (12.8.3) |
|
|
434 | (1) |
|
Router Configured with IPv6 Subnets (12.8.4) |
|
|
435 | (1) |
|
|
436 | (3) |
|
|
436 | (1) |
|
IPv6 Address Representation |
|
|
436 | (1) |
|
|
436 | (1) |
|
GUA and LLA Static Configuration |
|
|
437 | (1) |
|
Dynamic Addressing for IPv6 GUAs |
|
|
437 | (1) |
|
Dynamic Addressing for IPv6 LLAs |
|
|
437 | (1) |
|
|
438 | (1) |
|
|
438 | (1) |
|
|
439 | (1) |
|
Check Your Understanding Questions |
|
|
439 | (4) |
|
|
443 | (18) |
|
|
443 | (1) |
|
|
444 | (1) |
|
|
444 | (5) |
|
ICMPv4 and ICMPv6 Messages (13.1.1) |
|
|
444 | (1) |
|
Host Reachability (13.1.2) |
|
|
444 | (1) |
|
Destination or Service Unreachable (13.1.3) |
|
|
445 | (1) |
|
|
446 | (1) |
|
|
446 | (3) |
|
Ping and Traceroute Tests (13.2) |
|
|
449 | (5) |
|
Ping---Test Connectivity (13.2.1) |
|
|
449 | (1) |
|
Ping the Loopback (13.2.2) |
|
|
450 | (1) |
|
Ping the Default Gateway (13.2.3) |
|
|
450 | (1) |
|
Ping a Remote Host (13.2.4) |
|
|
451 | (1) |
|
Traceroute---Test the Path (13.2.5) |
|
|
452 | (1) |
|
|
453 | (1) |
|
IPv4 TTL and IPv6 Hop Limit |
|
|
453 | (1) |
|
|
454 | (1) |
|
|
454 | (1) |
|
Ping and Traceroute Testing |
|
|
454 | (1) |
|
|
455 | (1) |
|
Check Your Understanding Questions |
|
|
456 | (5) |
|
Chapter 14 Transport Layer |
|
|
461 | (46) |
|
|
461 | (1) |
|
|
461 | (1) |
|
|
462 | (1) |
|
Transportation of Data (14.1) |
|
|
462 | (8) |
|
Role of the Transport Layer (14.1.1) |
|
|
462 | (1) |
|
Transport Layer Responsibilities (14.1.2) |
|
|
463 | (4) |
|
Transport Layer Protocols (14.1.3) |
|
|
467 | (1) |
|
Transmission Control Protocol (TCP) (14.1.4) |
|
|
467 | (1) |
|
User Datagram Protocol (UDP) (14.1.5) |
|
|
468 | (1) |
|
The Right Transport Layer Protocol for the Right Application (14.1.6) |
|
|
469 | (1) |
|
|
470 | (3) |
|
|
470 | (1) |
|
|
471 | (1) |
|
TCP Header Fields (14.2.3) |
|
|
471 | (1) |
|
Applications That Use TCP (14.2.4) |
|
|
472 | (1) |
|
|
473 | (3) |
|
|
473 | (1) |
|
|
474 | (1) |
|
UDP Header Fields (14.3.3) |
|
|
474 | (1) |
|
Applications that use UDP (14.3.4) |
|
|
475 | (1) |
|
|
476 | (4) |
|
Multiple Separate Communications (14.4.1) |
|
|
476 | (1) |
|
|
477 | (1) |
|
Port Number Groups (14.4.3) |
|
|
478 | (1) |
|
The netstat Command (14.4.4) |
|
|
479 | (1) |
|
TCP Communication Process (14.5) |
|
|
480 | (6) |
|
TCP Server Processes (14.5.1) |
|
|
480 | (3) |
|
TCP Connection Establishment (14.5.2) |
|
|
483 | (1) |
|
Session Termination (14.5.3) |
|
|
484 | (1) |
|
TCP Three-Way Handshake Analysis (14.5.4) |
|
|
485 | (1) |
|
Reliability and Flow Control (14.6) |
|
|
486 | (8) |
|
TCP Reliability---Guaranteed and Ordered Delivery (14.6.1) |
|
|
486 | (2) |
|
TCP Reliability---Data Loss and Retransmission (14.6.3) |
|
|
488 | (2) |
|
TCP Flow Control---Window Size and Acknowledgments (14.6.5) |
|
|
490 | (1) |
|
TCP Flow Control---Maximum Segment Size (MSS) (14.6.6) |
|
|
491 | (2) |
|
TCP Flow Control---Congestion Avoidance (14.6.7) |
|
|
493 | (1) |
|
|
494 | (5) |
|
UDP Low Overhead Versus Reliability (14.7.1) |
|
|
494 | (1) |
|
UDP Datagram Reassembly (14.7.2) |
|
|
494 | (1) |
|
UDP Server Processes and Requests (14.7.3) |
|
|
495 | (1) |
|
UDP Client Processes (14.7.4) |
|
|
495 | (4) |
|
|
499 | (2) |
|
|
499 | (1) |
|
|
499 | (1) |
|
|
499 | (1) |
|
|
499 | (1) |
|
TCP Communications Process |
|
|
500 | (1) |
|
Reliability and Flow Control |
|
|
500 | (1) |
|
|
501 | (1) |
|
|
501 | (1) |
|
Check Your Understanding Questions |
|
|
502 | (5) |
|
Chapter 15 Application Layer |
|
|
507 | (34) |
|
|
507 | (1) |
|
|
507 | (1) |
|
|
508 | (1) |
|
Application, Presentation, and Session (15.1) |
|
|
508 | (3) |
|
Application Layer (15.1.1) |
|
|
508 | (1) |
|
Presentation and Session Layer (15.1.2) |
|
|
508 | (2) |
|
TCP/IP Application Layer Protocols (15.1.3) |
|
|
510 | (1) |
|
|
511 | (4) |
|
Client-Server Model (15.2.1) |
|
|
511 | (1) |
|
Peer-to-Peer Networks (15.2.2) |
|
|
512 | (1) |
|
Peer-to-Peer Applications (15.2.3) |
|
|
513 | (1) |
|
Common P2P Applications (15.2.4) |
|
|
514 | (1) |
|
Web and Email Protocols (15.3) |
|
|
515 | (6) |
|
Hypertext Transfer Protocol and Hypertext Markup Language (15.3.1) |
|
|
515 | (1) |
|
|
516 | (2) |
|
|
518 | (1) |
|
SMTP, POP, and IMAP (15.3.4) |
|
|
519 | (1) |
|
|
519 | (1) |
|
|
520 | (1) |
|
|
521 | (1) |
|
IP Addressing Services (15.4) |
|
|
521 | (9) |
|
Domain Name Service (15.4.1) |
|
|
522 | (2) |
|
DNS Message Format (15.4.2) |
|
|
524 | (1) |
|
|
525 | (1) |
|
The nslookup Command (15.4.4) |
|
|
526 | (1) |
|
Dynamic Host Configuration Protocol (15.4.6) |
|
|
527 | (1) |
|
|
528 | (2) |
|
File Sharing Services (15.5) |
|
|
530 | (4) |
|
File Transfer Protocol (15.5.1) |
|
|
530 | (1) |
|
Server Message Block (15.5.2) |
|
|
531 | (3) |
|
|
534 | (2) |
|
Application, Presentation, and Session |
|
|
534 | (1) |
|
|
534 | (1) |
|
|
534 | (1) |
|
|
535 | (1) |
|
|
535 | (1) |
|
|
536 | (1) |
|
Check Your Understanding Questions |
|
|
536 | (5) |
|
Chapter 16 Network Security Fundamentals |
|
|
541 | (30) |
|
|
541 | (1) |
|
|
541 | (1) |
|
|
542 | (1) |
|
Security Threats and Vulnerabilities (16.1) |
|
|
542 | (4) |
|
Types of Threats (16.1.1) |
|
|
542 | (1) |
|
Types of Vulnerabilities (16.1.2) |
|
|
543 | (2) |
|
Physical Security (16.1.3) |
|
|
545 | (1) |
|
|
546 | (6) |
|
Types of Malware (16.2.1) |
|
|
546 | (1) |
|
|
546 | (1) |
|
|
547 | (1) |
|
|
547 | (1) |
|
Reconnaissance Attacks (16.2.2) |
|
|
547 | (1) |
|
|
548 | (1) |
|
|
548 | (1) |
|
|
548 | (1) |
|
|
549 | (1) |
|
|
549 | (2) |
|
Denial of Service Attacks (16.2.4) |
|
|
551 | (1) |
|
|
551 | (1) |
|
|
551 | (1) |
|
Network Attack Mitigations (16.3) |
|
|
552 | (6) |
|
The Defense-in-Depth Approach (16.3.1) |
|
|
553 | (1) |
|
|
553 | (1) |
|
Upgrade, Update, and Patch (16.3.3) |
|
|
554 | (1) |
|
Authentication, Authorization, and Accounting (16.3.4) |
|
|
555 | (1) |
|
|
555 | (2) |
|
Types of Firewalls (16.3.6) |
|
|
557 | (1) |
|
Endpoint Security (16.3.7) |
|
|
558 | (1) |
|
|
558 | (7) |
|
Cisco AutoSecure (16.4.1) |
|
|
558 | (1) |
|
|
559 | (1) |
|
Additional Password Security (16.4.3) |
|
|
560 | (1) |
|
|
561 | (2) |
|
Disable Unused Services (16.4.5) |
|
|
563 | (2) |
|
|
565 | (2) |
|
Security Threats and Vulnerabilities |
|
|
565 | (1) |
|
|
565 | (1) |
|
Network Attack Mitigation |
|
|
565 | (1) |
|
|
566 | (1) |
|
|
567 | (1) |
|
Check Your Understanding Questions |
|
|
567 | (4) |
|
Chapter 17 Build a Small Network |
|
|
571 | (60) |
|
|
571 | (1) |
|
|
571 | (1) |
|
|
572 | (1) |
|
Devices in a Small Network (17.1) |
|
|
572 | (6) |
|
Small Network Topologies (17.1.1) |
|
|
572 | (1) |
|
Device Selection for a Small Network (17.1.2) |
|
|
573 | (1) |
|
|
573 | (1) |
|
Speed and Types of Ports/Interfaces |
|
|
573 | (1) |
|
|
573 | (1) |
|
Operating System Features and Services |
|
|
574 | (1) |
|
IP Addressing for a Small Network (17.1.3) |
|
|
574 | (2) |
|
Redundancy in a Small Network (17.1.4) |
|
|
576 | (1) |
|
Traffic Management (17.1.5) |
|
|
577 | (1) |
|
Small Network Applications and Protocols (17.2) |
|
|
578 | (5) |
|
Common Applications (17.2.1) |
|
|
578 | (1) |
|
|
578 | (1) |
|
Application Layer Services |
|
|
579 | (1) |
|
Common Protocols (17.2.2) |
|
|
579 | (3) |
|
Voice and Video Applications (17.2.3) |
|
|
582 | (1) |
|
Scale to Larger Networks (17.3) |
|
|
583 | (3) |
|
Small Network Growth (17.3.1) |
|
|
583 | (1) |
|
Protocol Analysis (17.3.2) |
|
|
583 | (1) |
|
Employee Network Utilization (17.3.3) |
|
|
584 | (2) |
|
Verify Connectivity (17.4) |
|
|
586 | (10) |
|
Verify Connectivity with Ping (17.4.1) |
|
|
586 | (2) |
|
|
588 | (2) |
|
Verify Connectivity with Traceroute (17.4.3) |
|
|
590 | (2) |
|
Extended Traceroute (17.4.4) |
|
|
592 | (1) |
|
Network Baseline (17.4.5) |
|
|
593 | (3) |
|
Host and IOS Commands (17.5) |
|
|
596 | (15) |
|
IP Configuration on a Windows Host (17.5.1) |
|
|
596 | (3) |
|
IP Configuration on a Linux Host (17.5.2) |
|
|
599 | (1) |
|
IP Configuration on a macOS Host (17.5.3) |
|
|
600 | (1) |
|
|
601 | (1) |
|
Common show Commands Revisited (17.5.5) |
|
|
602 | (7) |
|
The show CDP neighbors Command (17.5.6) |
|
|
609 | (1) |
|
The show IP interface brief Command (17.5.7) |
|
|
610 | (1) |
|
|
611 | (1) |
|
Troubleshooting Methodologies (17.6) |
|
|
611 | (5) |
|
Basic Troubleshooting Approaches (17.6.1) |
|
|
612 | (1) |
|
Resolve or Escalate? (17.6.2) |
|
|
613 | (1) |
|
The debug Command (17.6.3) |
|
|
613 | (2) |
|
The terminal monitor Command (17.6.4) |
|
|
615 | (1) |
|
Troubleshooting Scenarios (17.7) |
|
|
616 | (8) |
|
Duplex Operation and Mismatch Issues (17.7.1) |
|
|
617 | (1) |
|
IP Addressing Issues on IOS Devices (17.7.2) |
|
|
618 | (1) |
|
IP Addressing Issues on End Devices (17.7.3) |
|
|
619 | (1) |
|
Default Gateway Issues (17.7.4) |
|
|
619 | (2) |
|
Troubleshooting DNS Issues (17.7.5) |
|
|
621 | (3) |
|
|
624 | (3) |
|
Devices in a Small Network |
|
|
624 | (1) |
|
Small Network Applications and Protocols |
|
|
624 | (1) |
|
|
624 | (1) |
|
|
625 | (1) |
|
|
625 | (1) |
|
Troubleshooting Methodologies |
|
|
626 | (1) |
|
Troubleshooting Scenarios |
|
|
626 | (1) |
|
|
627 | (1) |
|
Check Your Understanding Questions |
|
|
628 | (3) |
Appendix A Answers to "Check Your Understanding" Questions |
|
631 | (14) |
Key Terms Glossary |
|
645 | (24) |
Index |
|
669 | |