Muutke küpsiste eelistusi

Introduction to Networks Companion Guide [Kõva köide]

  • Formaat: Hardback, 720 pages, kõrgus x laius x paksus: 241x207x35 mm, kaal: 1258 g
  • Ilmumisaeg: 31-Dec-2013
  • Kirjastus: Cisco Press
  • ISBN-10: 1587133164
  • ISBN-13: 9781587133169
Teised raamatud teemal:
  • Kõva köide
  • Hind: 66,69 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Hardback, 720 pages, kõrgus x laius x paksus: 241x207x35 mm, kaal: 1258 g
  • Ilmumisaeg: 31-Dec-2013
  • Kirjastus: Cisco Press
  • ISBN-10: 1587133164
  • ISBN-13: 9781587133169
Teised raamatud teemal:

Introduction to Networks Companion Guide is the official supplemental textbook for the Introduction to Networks course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.

The course introduces the architecture, structure, functions, components, and models of the Internet and computer networks. The principles of IP addressing and fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. By the end of the course, you will be able to build simple LANs, perform basic configurations for routers and switches, and implement IP addressing schemes.

The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.

The book’s features help you focus on important concepts to succeed in this course:

  • Chapter Objectives–Review core concepts by answering the focus questions listed at the beginning of each chapter.
  • Key Terms–Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.
  • Glossary–Consult the comprehensive Glossary with more than 195 terms.
  • Summary of Activities and Labs–Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.
  • Check Your Understanding–Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.

Related Title:

Introduction to Networks Lab Manual

ISBN-10: 1-58713-312-1

ISBN-13: 978-1-58713-312-1

  • How To–Look for this icon to study the steps you need to learn to perform certain tasks.
  • Interactive Activities–Reinforce your understanding of topics with more than 50 different exercises from the online course identified throughout the book with this icon.
  • Videos–Watch the videos embedded within the online course.
  • Packet Tracer Activities–Explore and visualize networking concepts using Packet Tracer exercises interspersed throughout the chapters.
  • Hands-on Labs–Work through all 66 course labs and Class Activities that are included in the course and published in the separate Lab Manual.

This book is part of the Cisco Networking Academy Series from Cisco Press®. Books in this series support and complement the Cisco Networking Academy curriculum.

Introduction xxvi
Chapter 1 Exploring the Network
1(58)
Objectives
1(1)
Key Terms
1(2)
Introduction (1.0.1.1)
3(1)
Globally Connected (1.1)
4(10)
Networking Today (1.1.1)
4(1)
Networks in Our Daily Lives (1.1.1.1)
4(1)
Technology Then and Now (1.1.1.2)
5(1)
The Global Community (1.1.1.3)
6(1)
Networks Support the Way We Learn (1.1.1.4)
7(1)
Networks Support the Way We Communicate (1.1.1.5)
8(2)
Networks Support the Way We Work (1.1.1.6)
10(1)
Networks Support the Way We Play (1.1.1.7)
10(1)
Providing Resources in a Network (1.1.2)
11(1)
Networks of Many Sizes (1.1.2.1)
12(1)
Clients and Servers (1.1.2.2, 1.1.2.3)
13(1)
Peer-to-Peer (1.1.2.4)
13(1)
LANs, WANs, and the Internet (1.2)
14(14)
Components of a Network (1.2.1, 1.2.1.1)
15(1)
End Devices (1.2.1.2)
16(1)
Intermediary Network Devices (1.2.1.3)
16(1)
Network Media (1.2.1.4)
17(1)
Network Representations (1.2.1.5)
18(1)
Topology Diagrams (1.2.1.6)
19(2)
LANs and WANs (1.2.2)
21(1)
Types of Networks (1.2.2.1)
21(1)
Local-Area Networks (1.2.2.2)
22(1)
Wide-Area Networks (1.2.2.3)
22(1)
The Internet (1.2.3, 1.2.3.1)
22(1)
Intranet and Extranet (1.2.3.2)
23(2)
Internet Access Technologies (1.2.4.1)
25(1)
Connecting Remote Users to the Internet (1.2.4.2)
25(2)
Connecting Businesses to the Internet (1.2.4.3)
27(1)
The Network as a Platform (1.3)
28(13)
The Converging Network (1.3.1.1)
29(1)
Planning for the Future (1.3.1.2)
30(1)
The Supporting Network Architecture (1.3.2.1)
31(1)
Fault Tolerance in Circuit-Switched Networks (1.3.2.2)
32(1)
Fault Tolerance
32(1)
Circuit-Switched Connection-Oriented Networks
33(1)
Fault Tolerance in Packet-Switched Networks (1.3.2.3)
34(1)
Packet-Switched Networks
34(1)
Scalable Networks (1.3.2.4)
35(1)
Scalability
35(2)
Providing QoS (1.3.2.5)
37(1)
Quality of Service
37(2)
Providing Network Security (1.3.2.6)
39(1)
Security
39(2)
The Changing Network Environment (1.4)
41(11)
Network Trends (1.4.1)
41(1)
New Trends (1.4.1.1)
41(2)
Bring Your Own Device (BYOD) (1.4.1.2)
43(1)
Online Collaboration (1.4.1.3)
43(1)
Video Communication (1.4.1.4)
44(2)
Cloud Computing (1.4.1.5)
46(1)
Data Centers (1.4.1.6)
47(1)
Technology Trends in the Home (1.4.2.1)
48(1)
Powerline Networking (1.4.2.2)
49(1)
Wireless Broadband (1.4.2.3)
50(1)
Wireless Internet Service Provider (WISP)
50(1)
Wireless Broadband Service
50(1)
Security Threats (1.4.3.1)
50(1)
Security Solutions (1.4.3.2)
51(1)
Cisco Network Architectures (1.4.4.1)
52(1)
CCNA (1.4.4.2)
53(1)
Summary (1.5)
54(1)
Practice
55(1)
Class Activities
55(1)
Labs
55(1)
Packet Tracer Activities
55(1)
Check Your Understanding
56(3)
Chapter 2 Configuring a Network Operating System
59(56)
Objectives
59(1)
Key Terms
59(1)
Introduction (2.0.1)
60(1)
Introduction to Cisco IOS (2.0.1.1)
60(1)
IOS Boot Camp (2.1)
61(25)
Cisco IOS (2.1.1)
61(1)
Operating Systems (2.1.1.1)
61(2)
Purpose of OS (2.1.1.2)
63(1)
Location of the Cisco IOS (2.1.1.3)
63(1)
IOS Functions (2.1.1.4)
64(1)
Accessing a Cisco IOS Device (2.1.2)
65(1)
Console Access Method (2.1.2.1)
65(1)
Telnet, SSH, and AUX Access Methods (2.1.2.2)
66(1)
Terminal Emulation Programs (2.1.2.3)
67(1)
Navigating the IOS (2.1.3)
67(1)
Cisco IOS Modes of Operation (2.1.3.1)
68(1)
Primary Modes (2.1.3.2)
69(1)
Global Configuration Mode and Submodes (2.1.3.3)
69(2)
Navigating Between IOS Modes (2.1.3.4, 2.1.3.5)
71(1)
The Command Structure (2.1.4)
72(1)
IOS Command Structure (2.1.4.1)
73(2)
Cisco IOS Command Reference (2.1.4.2)
75(1)
Context-Sensitive Help (2.1.4.3)
76(2)
Command Syntax Check (2.1.4.4)
78(1)
Hot Keys and Shortcuts (2.1.4.5)
79(4)
IOS Examination Commands (2.1.4.6)
83(1)
The show version Command (2.1.4.7)
83(3)
Getting Basic (2.2)
86(14)
Host Names (2.2.1)
86(1)
Why the Switch (2.2.1.1)
86(1)
Device Names (2.2.1.2)
87(1)
Host Names (2.2.1.3)
87(1)
Configuring Host Names (2.2.1.4)
88(1)
Limiting Access to Device Configurations (2.2.2)
89(1)
Securing Device Access (2.2.2.1)
89(1)
Securing Privileged EXEC Access (2.2.2.2)
90(1)
Securing User EXEC Access (2.2.2.3)
91(1)
Encrypting Password Display (2.2.2.4)
92(2)
Banner Messages (2.2.2.5)
94(2)
Saving Configurations (2.2.3)
96(1)
Configuration Files (2.2.3.1)
96(2)
Capturing Text (2.2.3.2)
98(2)
Address Schemes (2.3)
100(9)
Ports and Addresses (2.3.1)
100(1)
IP Addressing of Devices (2.3.1.1)
100(1)
Interfaces and Ports (2.3.1.2)
101(1)
Addressing Devices (2.3.2)
102(1)
Configuring a Switch Virtual Interface (2.3.2.1)
102(1)
Manual IP Address Configuration for End Devices (2.3.2.2)
103(1)
Automatic IP Address Configuration for End Devices (2.3.2.3)
104(1)
IP Address Conflicts (2.3.2.4)
105(1)
Verifying Connectivity (2.3.3)
106(1)
Test the Loopback Address on an End Device (2.3.3.1)
106(1)
Testing the Interface Assignment (2.3.3.2)
107(1)
Testing End-to-End Connectivity (2.3.3.3)
108(1)
Summary (2.4)
109(1)
Practice
110(1)
Class Activities
110(1)
Labs
111(1)
Packet Tracer Activities
111(1)
Check Your Understanding
111(4)
Chapter 3 Network Protocols and Communications
115(46)
Objectives
115(1)
Key Terms
115(1)
Introduction (3.0.1.1)
116(1)
Rules of Communication (3.1)
116(7)
The Rules (3.1.1)
117(1)
What Is Communication? (3.1.1.1)
117(1)
Establishing the Rules (3.1.1.2)
118(1)
Message Encoding (3.1.1.3)
119(1)
Message Formatting and Encapsulation (3.1.1.4)
120(1)
Message Size (3.1.1.5)
121(1)
Message Timing (3.1.1.6)
121(1)
Message Delivery Options (3.1.1.7)
122(1)
Network Protocols and Standards (3.2)
123(20)
Protocols (3.2.1)
123(1)
Protocols: Rules That Govern Communications (3.2.1.1)
123(1)
Network Protocols (3.2.1.2)
124(1)
Interaction of Protocols (3.2.1.3)
125(2)
Protocol Suites (3.2.2)
127(1)
Protocol Suites and Industry Standards (3.2.2.1)
127(1)
Creation of the Internet and Development of TCP/IP (3.2.2.2)
128(1)
TCP/IP Protocol Suite and Communication Process (3.2.2.3)
129(4)
Standards Organizations (3.2.3)
133(1)
Open Standards (3.2.3.1)
133(1)
ISOC, IAB, and IETF (3.2.3.2)
134(1)
IEEE (3.2.3.3)
135(1)
ISO (3.2.3.4)
136(1)
Other Standards Organizations (3.2.3.5)
136(1)
Reference Models (3.2.4)
137(1)
The Benefits of Using a Layered Model (3.2.4.1)
138(1)
The OSI Reference Model (3.2.4.2)
139(1)
The TCP/IP Protocol Model (3.2.4.3)
140(1)
Comparing the OSI Model with the TCP/IP Model (3.2.4.4)
141(2)
Moving Data in the Network (3.3)
143(11)
Data Encapsulation (3.3.1)
143(1)
Communicating the Messages (3.3.1.1)
143(1)
Protocol Data Units (PDU) (3.3.1.2)
144(1)
Encapsulation (3.3.1.3)
145(1)
Deencapsulation (3.3.1.4)
146(1)
Accessing Local Resources (3.3.2)
146(1)
Network Addresses and Data-Link Addresses (3.3.2.1)
146(2)
Communicating with a Device on the Same Network (3.3.2.2)
148(1)
MAC and IP Addresses (3.3.2.3)
149(1)
Accessing Remote Resources (3.3.3)
150(1)
Default Gateway (3.3.3.1)
150(1)
Communicating with a Device on a Remote Network (3.3.3.2)
151(3)
Summary (3.4)
154(1)
Practice
155(1)
Class Activities
155(1)
Labs
155(1)
Packet Tracer Activities
155(1)
Check Your Understanding
156(5)
Chapter 4 Network Access
161(70)
Objectives
161(1)
Key Terms
161(2)
Introduction (4.0.1.1)
163(1)
Physical Layer Protocols (4.1)
164(9)
Getting It Connected (4.1.1)
164(1)
Connecting to the Network (4.1.1.1)
164(1)
Network Interface Cards (4.1.1.2)
165(1)
Purpose of the Physical Layer (4.1.2)
166(1)
The Physical Layer (4.1.2.1)
166(1)
Physical Layer Media (4.1.2.2)
167(1)
Physical Layer Standards (4.1.2.3)
168(1)
Fundamental Principles of Layer 1 (4.1.3)
169(1)
Physical Layer Fundamental Principles (4.1.3.1)
169(2)
Bandwidth (4.1.3.2)
171(1)
Throughput (4.1.3.3)
172(1)
Types of Physical Media (4.1.3.4)
173(1)
Network Media (4.2)
173(25)
Copper Cabling (4.2.1)
173(1)
Characteristics of Copper Media (4.2.1.1)
173(2)
Copper Media (4.2.1.2)
175(1)
Unshielded Twisted-Pair Cable (4.2.1.3)
176(1)
Shielded Twisted-Pair (STP) Cable (4.2.1.4)
176(1)
Coaxial Cable (4.2.1.5)
177(1)
Copper Media Safety (4.2.1.6)
178(1)
UTP Cabling (4.2.2)
179(1)
Properties of UTP Cabling (4.2.2.1)
179(1)
UTP Cabling Standards (4.2.2.2)
180(2)
UTP Connectors (4.2.2.3)
182(1)
Types of UTP Cable (4.2.2.4)
183(2)
Testing UTP Cables (4.2.2.5)
185(1)
Fiber-Optic Cabling (4.2.3)
185(1)
Properties of Fiber-Optic Cabling (4.2.3.1)
185(1)
Fiber Media Cable Design (4.2.3.2)
186(1)
Types of Fiber Media (4.2.3.3)
187(2)
Network Fiber Connectors (4.2.3.4)
189(2)
Testing Fiber Cables (4.2.3.5)
191(1)
Fiber Versus Copper (4.2.3.6)
192(1)
Wireless Media (4.2.4)
193(1)
Properties of Wireless Media (4.2.4.1)
193(1)
Types of Wireless Media (4.2.4.2)
194(2)
Wireless LAN (4.2.4.3)
196(1)
802.11 Wi-Fi Standards (4.2.4.4)
196(2)
Data Link Layer Protocols (4.3)
198(7)
Purpose of the Data Link Layer (4.3.1)
198(1)
The Data Link Layer (4.3.1.1)
198(1)
Data Link Sublayers (4.3.1.2)
199(1)
Media Access Control (4.3.1.3)
200(1)
Providing Access to Media (4.3.1.4)
201(1)
Layer 2 Frame Structure (4.3.2)
202(1)
Formatting Data for Transmission (4.3.2.1)
202(1)
Creating a Frame (4.3.2.2)
203(1)
Layer 2 Standards (4.3.3)
204(1)
Data Link Layer Standards (4.3.3.1)
204(1)
Media Access Control (4.4)
205(20)
Topologies (4.4.1)
206(1)
Controlling Access to the Media (4.4.1.1)
206(1)
Physical and Logical Topologies (4.4.1.2)
207(1)
WAN Topologies (4.4.2)
208(1)
Common Physical WAN Topologies (4.4.2.1)
208(1)
Physical Point-to-Point Topology) (4.4.2.2)
209(1)
Logical Point-to-Point Topology (4.4.2.3)
209(1)
Half and Full Duplex (4.4.2.4)
210(1)
LAN Topologies (4.4.3)
210(1)
Physical LAN Topologies (4.4.3.1)
210(1)
Logical Topology for Shared Media (4.4.3.2)
211(1)
Contention-Based Access (4.4.3.3)
212(1)
Multiaccess Topology (4.4.3.4)
213(1)
Controlled Access (4.4.3.5)
213(1)
Ring Topology (4.4.3.6)
214(1)
Data-Link Frame (4.4.4)
215(1)
The Frame (4.4.4.1)
215(1)
The Header (4.4.4.2)
215(1)
Layer 2 Address (4.4.4.3)
216(1)
The Trailer (4.4.4.4)
217(1)
LAN and WAN Frames (4.4.4.5)
218(2)
Ethernet Frame (4.4.4.6)
220(1)
PPP Frame (4.4.4.7)
221(1)
802.11 Wireless Frame (4.4.4.8)
222(3)
Summary (4.5)
225(2)
Practice
227(1)
Class Activities
227(1)
Labs
227(1)
Packet Tracer Activities
227(1)
Check Your Understanding
227(4)
Chapter 5 Ethernet
231(52)
Objectives
231(1)
Key Terms
231(2)
Introduction (5.0.1.1)
233(1)
Ethernet Protocol (5.1)
234(18)
Ethernet Operation (5.1.1)
234(1)
LLC and MAC Sublayers (5.1.1.1)
235(1)
MAC Sublayer (5.1.1.2)
235(1)
Media Access Control (5.1.1.3)
236(2)
MAC Address: Ethernet Identity (5.1.1.4)
238(1)
Frame Processing (5.1.1.5)
239(1)
Ethernet Frame Attributes (5.1.2)
240(1)
Ethernet Encapsulation (5.1.2.1)
241(1)
Ethernet Frame Size (5.1.2.2)
242(1)
Introduction to the Ethernet Frame (5.1.2.3)
243(1)
Ethernet MAC (5.1.3)
244(1)
MAC Addresses and Hexadecimal (5.1.3.1)
244(2)
MAC Address Representations (5.1.3.2)
246(1)
Unicast MAC Address (5.1.3.3)
247(1)
Broadcast MAC Address (5.1.3.4)
248(1)
Multicast MAC Address (5.1.3.5)
248(1)
MAC and IP (5.1.4, 5.1.4.1)
249(1)
End-to-End Connectivity, MAC, and IP (5.1.4.2)
250(2)
Address Resolution Protocol (5.2, 5.2.1, 5.2.1.1)
252(8)
ARP Functions (5.2.1.2)
252(1)
ARP Operation (5.2.1.3)
253(3)
ARP Role in Remote Communication (5.2.1.4)
256(2)
Removing Entries from an ARP Table (5.2.1.5)
258(1)
ARP Tables on Networking Devices (5.2.1.6)
258(1)
ARP Issues (5.2.2)
259(1)
How ARP Can Create Problems (5.2.2.1)
259(1)
Mitigating ARP Problems (5.2.2.2)
260(1)
LAN Switches (5.3)
260(17)
Switching (5.3.1)
260(1)
Switch Port Fundamentals (5.3.1.1)
261(1)
Switch MAC Address Table (5.3.1.2)
261(2)
Duplex Settings (5.3.1.3)
263(2)
Auto-MDIX (5.3.1.4)
265(1)
Frame-Forwarding Methods on Cisco Switches (5.3.1.5)
265(1)
Cut-Through Switching (5.3.1.6)
266(1)
Memory Buffering on Switches (5.3.1.8)
267(1)
Fixed or Modular (5.3.2)
268(1)
Fixed Versus Modular Configuration (5.3.2.1)
268(2)
Module Options for Cisco Switch Slots (5.3.2.2)
270(2)
Layer 3 Switching (5.3.3)
272(1)
Layer 2 Versus Layer 3 Switching (5.3.3.1)
272(1)
Cisco Express Forwarding (5.3.3.2)
273(1)
Types of Layer 3 Interfaces (5.3.3.3)
274(1)
Configuring a Routed Port on a Layer 3 Switch (5.3.3.4)
275(2)
Summary (5.4)
277(1)
Practice
278(1)
Class Activities
278(1)
Labs
279(1)
Packet Tracer Activities
279(1)
Check Your Understanding
279(4)
Chapter 6 Network Layer
283(58)
Objectives
283(1)
Key Terms
283(1)
Introduction (6.0.1.1)
284(1)
Network Layer Protocols (6.1)
285(14)
Network Layer in Communication (6.1.1)
285(1)
The Network Layer (6.1.1.1)
285(1)
Network Layer Protocols (6.1.1.2)
286(1)
Characteristics of the IP Protocol (6.1.2)
287(1)
Characteristics of IP (6.1.2.1)
287(1)
IP---Connectionless (6.1.2.2)
288(1)
IP---Best-Effort Delivery (6.1.2.3)
288(1)
IP---Media Independent (6.1.2.4)
289(1)
Encapsulating IP (6.1.2.5)
290(1)
IPv4 Packet (6.1.3)
291(1)
IPv4 Packet Header (6.1.3.1)
291(2)
IPv4 Header Fields (6.1.3.2)
293(1)
Sample IPv4 Headers (6.1.3.3)
293(2)
IPv6 Packet (6.1.4)
295(1)
Limitations of IPv4 (6.1.4.1)
295(1)
Introducing IPv6 (6.1.4.2)
296(1)
Encapsulating IPv6 (6.1.4.3)
297(1)
IPv6 Packet Header (6.1.4.4)
298(1)
Sample IPv6 Header (6.1.4.5)
298(1)
Routing (6.2)
299(16)
How a Host Routes (6.2.1)
299(1)
Host Forwarding Decision (6.2.1.1)
300(1)
Default Gateway (6.2.1.2)
300(1)
IPv4 Host Routing Table (6.2.1.3)
301(2)
IPv4 Host Routing Entries (6.2.1.4)
303(2)
Sample IPv4 Host Routing Table (6.2.1.5)
305(1)
Sample IPv6 Host Routing Table (6.2.1.6)
306(1)
Router Routing Tables (6.2.2)
307(1)
Router Packet-Forwarding Decision (6.2.2.1)
307(1)
IPv4 Router Routing Table (6.2.2.2)
308(2)
Directly Connected Routing Table Entries (6.2.2.3)
310(1)
Remote Network Routing Table Entries (6.2.2.4)
311(1)
Next-Hop Address (6.2.2.5)
312(1)
Sample Router IPv4 Routing Table (6.2.2.6)
312(3)
Routers (6.3)
315(11)
Anatomy of a Router (6.3.1)
315(1)
A Router Is a Computer (6.3.1.1)
315(1)
Router CPU and OS (6.3.1.2)
315(1)
Router Memory (6.3.1.3)
316(2)
Inside a Router (6.3.1.4)
318(1)
Router Backplane (6.3.1.5)
319(1)
Connecting to a Router (6.3.1.6)
320(1)
LAN and WAN Interfaces (6.3.1.7)
321(1)
Router Bootup (6.3.2)
322(1)
Cisco IOS (6.3.2.1)
322(1)
Bootset Files (6.3.2.2)
323(1)
Router Bootup Process (6.3.2.3)
323(2)
Show Version Output (6.3.2.4)
325(1)
Configuring a Cisco Router (6.4)
326(9)
Configure Initial Settings (6.4.1)
326(1)
Router Configuration Steps (6.4.1.1)
326(2)
Configure Interfaces (6.4.2)
328(1)
Configure LAN Interfaces (6.4.2.1)
328(2)
Verify Interface Configuration (6.4.2.2)
330(2)
Configuring the Default Gateway (6.4.3)
332(1)
Default Gateway on a Host (6.4.3.1)
332(1)
Default Gateway on a Switch (6.4.3.2)
333(2)
Summary (6.5)
335(1)
Practice
336(1)
Class Activities
337(1)
Labs
337(1)
Packet Tracer Activities
337(1)
Check Your Understanding
337(4)
Chapter 7 Transport Layer
341(50)
Objectives
341(1)
Key Terms
341(1)
Introduction (7.0.1.1)
342(1)
Learning Objectives
342(1)
Transport Layer Protocols (7.1)
343(20)
Transportation of Data (7.1.1)
343(1)
Role of the Transport Layer (7.1.1.1, 7.1.1.2)
343(4)
Conversation Multiplexing (7.1.1.3)
347(1)
Transport Layer Reliability (7.1.1.4)
347(1)
TCP (7.1.1.5)
348(1)
UDP (7.1.1.6)
349(1)
The Right Transport Layer Protocol for the Right Application (7.1.1.7)
350(2)
Introducing TCP and UDP (7.1.2)
352(1)
Introducing TCR (7.1.2.1)
352(1)
Role of TCP (7.1.2.2)
353(2)
Introducing UDP (7.1.2.3)
355(1)
Role of UDP (7.1.2.4)
355(1)
Separating Multiple Communications (7.1.2.5)
356(1)
TCP and UDP Port Addressing (7.1.2.6 -- 7.1.2.9)
357(5)
TCP and UDP Segmentation (7.1.2.10)
362(1)
TCP and UDP (7.2)
363(21)
TCP Communication (7.2.1)
364(1)
TCP Reliable Delivery (7.2.1.1)
364(1)
TCP Server Processes (7.2.1.2)
364(1)
TCP Connection Establishment and Termination (7.2.1.3)
365(2)
TCP Three-Way Handshake Analysis---Step 1 (7.2.1.4)
367(1)
TCP Three-Way Handshake Analysis---Step 2 (7.2.1.5)
368(1)
TCP Three-Way Handshake Analysis---Step 3 (7.2.1.6)
369(1)
TCP Session Termination Analysis (7.2.1.7)
370(3)
Reliability and Flow Control (7.2.2)
373(1)
TCP Reliability---Ordered Delivery (7.2.2.1)
373(1)
TCP Reliability---Acknowledgement and Window Size (7.2.2.2)
374(2)
TCP Reliability---Data Loss and Retransmission (7.2.2.3)
376(1)
TCP Flow Control---Window Size and Acknowledgements (7.2.2.4)
376(2)
TCP Flow Control---Congestion Avoidance (7.2.2.5)
378(1)
UDP Communication (7.2.3)
379(1)
UDP Low Overhead Versus Reliability (7.2.3.1)
379(1)
UDP Datagram Reassembly (7.2.3.2)
380(1)
UDP Server Processes and Requests (7.2.3.3)
381(1)
UDP Client Processes (7.2.3.4)
381(1)
TCP or UDP, That Is the Question (7.2.4)
382(1)
Applications That Use TCP (7.2.4.1)
382(1)
Applications That Use UDP (7.2.4.2)
382(2)
Summary (7.3)
384(2)
Practice
386(1)
Class Activities
386(1)
Labs
386(1)
Packet Tracer Activities
386(1)
Check Your Understanding
386(5)
Chapter 8 IP Addressing
391(74)
Objectives
391(1)
Key Terms
391(2)
Introduction (8.0.1.1)
393(1)
IPv4 Network Addresses (8.1)
393(31)
IPv4 Address Structure (8.1.1)
394(1)
Binary Notation (8.1.1.1)
394(1)
Binary Number System (8.1.1.2)
395(2)
Converting a Binary Address to Decimal (8.1.1.3)
397(2)
Converting from Decimal to Binary (8.1.1.5, 8.1.1.6)
399(1)
IPv4 Subnet Mask (8.1.2)
400(1)
Network Portion and Host Portion of an IPv4 Address (8.1.2.1)
400(2)
Examining the Prefix Length (8.1.2.2)
402(1)
IPv4 Network, Host, and Broadcast Addresses (8.1.2.3)
403(2)
First Host and Last Host Addresses (8.1.2.4)
405(1)
Bitwise AND Operation (8.1.2.5)
406(1)
Importance of ANDing (8.1.2.6)
407(1)
IPv4 Unicast, Broadcast, and Multicast (8.1.3)
408(1)
Assigning a Static IPv4 Address to a Host (8.1.3.1)
408(1)
Assigning a Dynamic IPv4 Address to a Host (8.1.3.2)
409(1)
Unicast Transmission (8.1.3.3)
410(2)
Broadcast Transmission (8.1.3.4)
412(1)
Multicast Transmission (8.1.3.5)
413(3)
Types of IPv4 Addresses (8.1.4)
416(1)
Public and Private IPv4 Addresses (8.1.4.1)
416(1)
Special-Use IPv4 Addresses (8.1.4.3)
417(2)
Legacy Classful Addressing (8.1.4.4)
419(3)
Assignment of IP Addresses (8.1.4.5, 8.1.4.6)
422(2)
IPv6 Network Addresses (8.2)
424(27)
IPv4 Issues (8.2.1)
424(1)
The Need for IPv6 (8.2.1.1)
425(1)
IPv4 and IPv6 Coexistence (8.2.1.2)
426(1)
IPv6 Addressing (8.2.2)
427(1)
Hexadecimal Number System (8.2.2.1)
427(2)
IPv6 Address Representation (8.2.2.2)
429(1)
Rule 1: Omit Leading 0s (8.2.2.3)
430(1)
Rule 2: Omit All 0 Segments (8.2.2.4)
430(1)
Types of IPv6 Addresses (8.2.3)
431(1)
IPv6 Address Types (8.2.3.1)
431(1)
IPv6 Prefix Length (8.2.3.2)
432(1)
IPv6 Unicast Addresses (8.2.3.3)
432(2)
IPv6 Link-Local Unicast Addresses (8.2.3.4)
434(1)
IPv6 Unicast Addresses (8.2.4)
435(1)
Structure of an IPv6 Global Unicast Address (8.2.4.1)
435(2)
Static Configuration of a Global Unicast Address (8.2.4.2)
437(2)
Dynamic Configuration of a Global Unicast Address Using SLAAC (8.2.4.3)
439(2)
Dynamic Configuration of a Global Unicast Address Using DHCPv6 (8.2.4.4)
441(1)
EUI-64 Process or Randomly Generated (8.2.4.5)
442(2)
Dynamic Link-Local Addresses (8.2.4.6)
444(1)
Static Link-Local Addresses (8.2.4.7)
445(2)
Verifying IPv6 Address Configuration (8.2.4.8)
447(2)
IPv6 Multicast Addresses (8.2.5)
449(1)
Assigned IPv6 Multicast Addresses (8.2.5.1)
449(1)
Solicited-Node IPv6 Multicast Addresses (8.2.5.2)
450(1)
Connectivity Verification (8.3)
451(9)
ICMP (8.3.1)
451(1)
ICMPv4 and ICMPv6 Messages (8.3.1.1)
451(2)
ICMPv6 Router Solicitation and Router Advertisement Messages (8.3.1.2)
453(1)
ICMPv6 Neighbor Solicitation and Neighbor Advertisement Messages (8.3.1.3)
454(1)
Testing and Verification (8.3.2)
455(1)
Ping: Testing the Local Stack (8.3.2.1)
455(1)
Ping: Testing Connectivity to the Local LAN (8.3.2.2)
456(1)
Ping: Testing Connectivity to Remote (8.3.2.3)
456(1)
Traceroute: Testing the Path (8.3.2.4)
456(4)
Summary (8.4)
460(1)
Practice
461(1)
Class Activities
462(1)
Labs
462(1)
Packet Tracer Activities
462(1)
Check Your Understanding
462(3)
Chapter 9 Subnetting IP Networks
465(50)
Objectives
465(1)
Key Terms
465(1)
Introduction (9.0.1.1)
466(1)
Subnetting an IPv4 Network (9.1)
467(31)
Network Segmentation (9.1.1)
467(1)
Reasons for Subnetting (9.1.1.1)
467(1)
Communication Between Subnets (9.1.1.2)
468(1)
IP Subnetting Is FUNdamental (9.1.2)
468(1)
The Plan (9.1.2.1)
468(2)
The Plan: Address Assignment (9.1.2.2)
470(1)
Subnetting an IPv4 Network (9.1.3)
470(1)
Basic Subnetting (9.1.3.1)
470(2)
Subnets in Use (9.1.3.2)
472(2)
Subnetting Formulas (9.1.3.3)
474(1)
Creating Four Subnets (9.1.3.4)
475(3)
Creating Eight Subnets (9.1.3.5)
478(3)
Creating 100 Subnets with a /16 prefix (9.1.3.10)
481(2)
Calculating the Hosts (9.1.3.11)
483(1)
Calculating the Hosts (9.1.3.12)
484(3)
Determining the Subnet Mask (9.1.4)
487(1)
Subnetting Based on Host Requirements (9.1.4.1)
487(1)
Subnetting Network-Based Requirements (9.1.4.2)
488(1)
Subnetting to Meet Network Requirements (9.1.4.3, 9.1.4.4)
488(4)
Benefits of Variable-Length Subnet Masking (9.1.5)
492(1)
Traditional Subnetting Wastes Addresses (9.1.5.1)
492(1)
Variable-Length Subnet Masks (VLSM) (9.1.5.2)
493(1)
Basic VLSM (9.1.5.3)
494(1)
VLSM in Practice (9.1.5.4)
495(1)
VLSM Chart (9.1.5.5)
496(2)
Addressing Schemes (9.2)
498(3)
Structured Design (9.2.1)
498(1)
Planning to Address the Network (9.2.1.1)
498(1)
Assigning Addresses to Devices (9.2.1.2)
499(2)
Design Considerations for IPv6 (9.3)
501(6)
Subnetting an IPv6 Network (9.3.1)
501(1)
Subnetting Using the Subnet ID (9.3.1.1)
502(1)
IPv6 Subnet Allocation (9.3.1.2)
503(2)
Subnetting into the Interface ID (9.3.1.3)
505(2)
Summary (9.4)
507(1)
Practice
508(1)
Class Activities
508(1)
Labs
509(1)
Packet Tracer Activities
509(1)
Check Your Understanding
509(6)
Chapter 10 Application Layer
515(36)
Objectives
515(1)
Key Terms
515(1)
Introduction (10.0.1.1)
516(1)
Application Layer Protocols (10.1)
517(8)
Application, Session, and Presentation (10.1.1)
517(1)
OSI and TCP/IP Models Revisited (10.1.1.1)
517(1)
Application Layer (10.1.1.2)
518(1)
Presentation and Session Layers (10.1.1.3)
518(1)
TCP/IP Application Layer Protocols (10.1.1.4)
519(1)
How Application Protocols Interact with End-User Applications (10.1.2)
520(1)
Peer-to-Peer Networks (10.1.2.1)
520(1)
Peer-to-Peer Applications (10.1.2.2)
521(1)
Common P2P Applications (10.1.2.3)
522(1)
Client-Server Model (10.1.2.5)
523(2)
Well-Known Application Layer Protocols and Services (10.2)
525(15)
Common Application Layer Protocols (10.2.1)
525(1)
Application Layer Protocols Revisited (10.2.1.1)
525(1)
Hypertext Transfer Protocol and Hypertext Markup Language (10.2.1.2)
525(1)
HTTP and HTTPS (10.2.1.3)
526(1)
SMTP, POP, and IMAP (10.2.1.4-10.2.1.7)
527(3)
Providing IP Addressing Services (10.2.2)
530(1)
Domain Name System (10.2.2.1)
530(1)
DNS Message Format (10.2.2.2)
530(2)
DNS Hierarchy (10.2.2.3)
532(1)
Nslookup (10.2.2.4)
533(1)
Dynamic Host Configuration Protocol (10.2.2.6)
534(1)
DHCPv4 Operation (10.2.2.7)
535(3)
Providing File-Sharing Services (10.2.3)
538(1)
File Transfer Protocol (10.2.3.1)
538(1)
Server Message Block (10.2.3.4)
539(1)
The Message Heard Around the World (10.3)
540(6)
Move It! (10.3.1)
540(1)
The Internet of Things (10.3.1.1)
540(1)
Message Travels Through a Network (10.3.1.2)
540(2)
Getting the Data to the End Device (10.3.1.3)
542(1)
Getting the Data Through the Internetwork (10.3.1.4)
542(1)
Getting the Data to the Right Application (10.3.1.5)
543(2)
Warriors of the Net (10.3.1.6)
545(1)
Summary (10.4)
546(2)
Practice
548(1)
Class Activities
548(1)
Labs
548(1)
Packet Tracer Activities
548(1)
Check Your Understanding
549(2)
Chapter 11 It's a Network
551(76)
Objectives
551(1)
Key Terms
551(1)
Introduction (11.0.1.1)
552(1)
Create and Grow (11.1)
553(11)
Devices in a Small Network (11.1.1)
553(1)
Small-Network Topologies (11.1.1.1)
553(1)
Device Selection for a Small Network (11.1.1.2)
554(1)
IP Addressing for a Small Network (11.1.1.3)
555(1)
Redundancy in a Small Network (11.1.1.4)
556(1)
Design Considerations for a Small Network (11.1.1.5)
557(2)
Protocols in a Small Network (11.1.2)
559(1)
Common Applications in a Small Network (11.1.2.1)
559(1)
Common Protocols in a Small Network (11.1.2.2)
560(1)
Real-Time Applications for a Small Network (11.1.2.3)
561(1)
Growing to Larger Networks (11.1.3)
562(1)
Scaling a Small Network (11.1.3.1)
562(1)
Protocol Analysis of a Small Network (11.1.3.2)
563(1)
Evolving Protocol Requirements (11.1.3.3)
564(1)
Keeping the Network Safe (11.2)
564(19)
Network Device Security Measures (11.2.1)
565(1)
Categories of Threats to Network Security (11.2.1.1)
565(1)
Physical Security (11.2.1.2)
566(1)
Types of Security Vulnerabilities (11.2.1.3)
566(3)
Vulnerabilities and Network Attacks (11.2.2)
569(1)
Viruses, Worms, and Trojan Horses (11.2.2.1)
569(1)
Reconnaissance Attacks (11.2.2.2)
570(1)
Access Attacks (11.2.2.3)
570(2)
DoS Attacks (11.2.2.4)
572(2)
Mitigating Network Attacks (11.2.3)
574(1)
Backup, Upgrade, Update, and Patch (11.2.3.1)
574(1)
Authentication, Authorization, and Accounting (11.2.3.2)
575(2)
Firewalls (11.2.3.3)
577(1)
Endpoint Security (11.2.3.4)
578(1)
Securing Devices (11.2.4)
578(1)
Introduction to Securing Devices (11.2.4.1)
578(1)
Passwords (11.2.4.2)
579(1)
Basic Security Practices (11.2.4.3)
580(1)
Enable SSH (11.2.4.4)
581(2)
Basic Network Performance (11.3)
583(20)
Ping (11.3.1)
583(1)
Interpreting Ping Results (11.3.1.1)
583(2)
Extended Ping (11.3.1.2)
585(1)
Network Baseline (11.3.1.3)
586(1)
Tracert (11.3.2)
587(1)
Interpreting Tracert Messages (11.3.2.1)
587(1)
Show Commands (11.3.3)
588(1)
Common Show Commands Revisited (11.3.3.1)
588(5)
Viewing Router Settings with the show version Command (11.3.3.2)
593(2)
Viewing Switch Settings with the show version Command (11.3.3.3)
595(1)
Host and IOS Commands (11.3.4)
595(1)
ipconfig Command Options (11.3.4.1)
595(2)
arp Command Options (11.3.4.2)
597(1)
show cdp neighbors Command Options (11.3.4.3)
597(3)
Using the show ip interface brief Command (11.3.4.4)
600(3)
Managing iOS Configuration Files (11.4)
603(8)
Router and Switch File Systems (11.4.1)
603(1)
Router File Systems (11.4.1.1)
603(3)
Switch File Systems (11.4.1.2)
606(1)
Back Up and Restore Configuration Files (11.4.2)
607(1)
Backing Up and Restoring Using Text Files (11.4.2.1)
607(1)
Backing Up and Restoring Using TFTP (11.4.2.2)
608(1)
Using USB Ports on a Cisco Router (11.4.2.3)
609(1)
Backing Up and Restoring Using a USB Flash Drive (11.4.2.4)
610(1)
Integrated Routing Services (11.5)
611(9)
Integrated Router (11.5.1)
611(1)
Multifunction Device (11.5.1.1)
611(2)
Types of Integrated Routers (11.5.1.2)
613(1)
Wireless Capability (11.5.1.3)
614(1)
Basic Security of Wireless (11.5.1.4)
615(1)
Configuring the Integrated Router (11.5.2)
616(1)
Configuring the Integrated Router (11.5.2.1)
616(1)
Enabling Wireless (11.5.2.2)
617(1)
Configure a Wireless Client (11.5.2.3)
618(2)
Summary (11.6)
620(2)
Practice
622(1)
Class Activities
622(1)
Labs
622(1)
Packet Tracer Activities
623(1)
Check Your Understanding Questions
623(4)
Appendix A Answers to the "Check Your Understanding" Questions 627(14)
Glossary 641(13)
Index 654