Introduction |
|
xxvi | |
|
Chapter 1 Exploring the Network |
|
|
1 | (58) |
|
|
1 | (1) |
|
|
1 | (2) |
|
|
3 | (1) |
|
|
4 | (10) |
|
|
4 | (1) |
|
Networks in Our Daily Lives (1.1.1.1) |
|
|
4 | (1) |
|
Technology Then and Now (1.1.1.2) |
|
|
5 | (1) |
|
The Global Community (1.1.1.3) |
|
|
6 | (1) |
|
Networks Support the Way We Learn (1.1.1.4) |
|
|
7 | (1) |
|
Networks Support the Way We Communicate (1.1.1.5) |
|
|
8 | (2) |
|
Networks Support the Way We Work (1.1.1.6) |
|
|
10 | (1) |
|
Networks Support the Way We Play (1.1.1.7) |
|
|
10 | (1) |
|
Providing Resources in a Network (1.1.2) |
|
|
11 | (1) |
|
Networks of Many Sizes (1.1.2.1) |
|
|
12 | (1) |
|
Clients and Servers (1.1.2.2, 1.1.2.3) |
|
|
13 | (1) |
|
|
13 | (1) |
|
LANs, WANs, and the Internet (1.2) |
|
|
14 | (14) |
|
Components of a Network (1.2.1, 1.2.1.1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
Intermediary Network Devices (1.2.1.3) |
|
|
16 | (1) |
|
|
17 | (1) |
|
Network Representations (1.2.1.5) |
|
|
18 | (1) |
|
Topology Diagrams (1.2.1.6) |
|
|
19 | (2) |
|
|
21 | (1) |
|
Types of Networks (1.2.2.1) |
|
|
21 | (1) |
|
Local-Area Networks (1.2.2.2) |
|
|
22 | (1) |
|
Wide-Area Networks (1.2.2.3) |
|
|
22 | (1) |
|
The Internet (1.2.3, 1.2.3.1) |
|
|
22 | (1) |
|
Intranet and Extranet (1.2.3.2) |
|
|
23 | (2) |
|
Internet Access Technologies (1.2.4.1) |
|
|
25 | (1) |
|
Connecting Remote Users to the Internet (1.2.4.2) |
|
|
25 | (2) |
|
Connecting Businesses to the Internet (1.2.4.3) |
|
|
27 | (1) |
|
The Network as a Platform (1.3) |
|
|
28 | (13) |
|
The Converging Network (1.3.1.1) |
|
|
29 | (1) |
|
Planning for the Future (1.3.1.2) |
|
|
30 | (1) |
|
The Supporting Network Architecture (1.3.2.1) |
|
|
31 | (1) |
|
Fault Tolerance in Circuit-Switched Networks (1.3.2.2) |
|
|
32 | (1) |
|
|
32 | (1) |
|
Circuit-Switched Connection-Oriented Networks |
|
|
33 | (1) |
|
Fault Tolerance in Packet-Switched Networks (1.3.2.3) |
|
|
34 | (1) |
|
|
34 | (1) |
|
Scalable Networks (1.3.2.4) |
|
|
35 | (1) |
|
|
35 | (2) |
|
|
37 | (1) |
|
|
37 | (2) |
|
Providing Network Security (1.3.2.6) |
|
|
39 | (1) |
|
|
39 | (2) |
|
The Changing Network Environment (1.4) |
|
|
41 | (11) |
|
|
41 | (1) |
|
|
41 | (2) |
|
Bring Your Own Device (BYOD) (1.4.1.2) |
|
|
43 | (1) |
|
Online Collaboration (1.4.1.3) |
|
|
43 | (1) |
|
Video Communication (1.4.1.4) |
|
|
44 | (2) |
|
Cloud Computing (1.4.1.5) |
|
|
46 | (1) |
|
|
47 | (1) |
|
Technology Trends in the Home (1.4.2.1) |
|
|
48 | (1) |
|
Powerline Networking (1.4.2.2) |
|
|
49 | (1) |
|
Wireless Broadband (1.4.2.3) |
|
|
50 | (1) |
|
Wireless Internet Service Provider (WISP) |
|
|
50 | (1) |
|
Wireless Broadband Service |
|
|
50 | (1) |
|
Security Threats (1.4.3.1) |
|
|
50 | (1) |
|
Security Solutions (1.4.3.2) |
|
|
51 | (1) |
|
Cisco Network Architectures (1.4.4.1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (3) |
|
Chapter 2 Configuring a Network Operating System |
|
|
59 | (56) |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
Introduction to Cisco IOS (2.0.1.1) |
|
|
60 | (1) |
|
|
61 | (25) |
|
|
61 | (1) |
|
Operating Systems (2.1.1.1) |
|
|
61 | (2) |
|
|
63 | (1) |
|
Location of the Cisco IOS (2.1.1.3) |
|
|
63 | (1) |
|
|
64 | (1) |
|
Accessing a Cisco IOS Device (2.1.2) |
|
|
65 | (1) |
|
Console Access Method (2.1.2.1) |
|
|
65 | (1) |
|
Telnet, SSH, and AUX Access Methods (2.1.2.2) |
|
|
66 | (1) |
|
Terminal Emulation Programs (2.1.2.3) |
|
|
67 | (1) |
|
Navigating the IOS (2.1.3) |
|
|
67 | (1) |
|
Cisco IOS Modes of Operation (2.1.3.1) |
|
|
68 | (1) |
|
|
69 | (1) |
|
Global Configuration Mode and Submodes (2.1.3.3) |
|
|
69 | (2) |
|
Navigating Between IOS Modes (2.1.3.4, 2.1.3.5) |
|
|
71 | (1) |
|
The Command Structure (2.1.4) |
|
|
72 | (1) |
|
IOS Command Structure (2.1.4.1) |
|
|
73 | (2) |
|
Cisco IOS Command Reference (2.1.4.2) |
|
|
75 | (1) |
|
Context-Sensitive Help (2.1.4.3) |
|
|
76 | (2) |
|
Command Syntax Check (2.1.4.4) |
|
|
78 | (1) |
|
Hot Keys and Shortcuts (2.1.4.5) |
|
|
79 | (4) |
|
IOS Examination Commands (2.1.4.6) |
|
|
83 | (1) |
|
The show version Command (2.1.4.7) |
|
|
83 | (3) |
|
|
86 | (14) |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
87 | (1) |
|
Configuring Host Names (2.2.1.4) |
|
|
88 | (1) |
|
Limiting Access to Device Configurations (2.2.2) |
|
|
89 | (1) |
|
Securing Device Access (2.2.2.1) |
|
|
89 | (1) |
|
Securing Privileged EXEC Access (2.2.2.2) |
|
|
90 | (1) |
|
Securing User EXEC Access (2.2.2.3) |
|
|
91 | (1) |
|
Encrypting Password Display (2.2.2.4) |
|
|
92 | (2) |
|
Banner Messages (2.2.2.5) |
|
|
94 | (2) |
|
Saving Configurations (2.2.3) |
|
|
96 | (1) |
|
Configuration Files (2.2.3.1) |
|
|
96 | (2) |
|
|
98 | (2) |
|
|
100 | (9) |
|
Ports and Addresses (2.3.1) |
|
|
100 | (1) |
|
IP Addressing of Devices (2.3.1.1) |
|
|
100 | (1) |
|
Interfaces and Ports (2.3.1.2) |
|
|
101 | (1) |
|
Addressing Devices (2.3.2) |
|
|
102 | (1) |
|
Configuring a Switch Virtual Interface (2.3.2.1) |
|
|
102 | (1) |
|
Manual IP Address Configuration for End Devices (2.3.2.2) |
|
|
103 | (1) |
|
Automatic IP Address Configuration for End Devices (2.3.2.3) |
|
|
104 | (1) |
|
IP Address Conflicts (2.3.2.4) |
|
|
105 | (1) |
|
Verifying Connectivity (2.3.3) |
|
|
106 | (1) |
|
Test the Loopback Address on an End Device (2.3.3.1) |
|
|
106 | (1) |
|
Testing the Interface Assignment (2.3.3.2) |
|
|
107 | (1) |
|
Testing End-to-End Connectivity (2.3.3.3) |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
111 | (4) |
|
Chapter 3 Network Protocols and Communications |
|
|
115 | (46) |
|
|
115 | (1) |
|
|
115 | (1) |
|
|
116 | (1) |
|
Rules of Communication (3.1) |
|
|
116 | (7) |
|
|
117 | (1) |
|
What Is Communication? (3.1.1.1) |
|
|
117 | (1) |
|
Establishing the Rules (3.1.1.2) |
|
|
118 | (1) |
|
Message Encoding (3.1.1.3) |
|
|
119 | (1) |
|
Message Formatting and Encapsulation (3.1.1.4) |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
121 | (1) |
|
Message Delivery Options (3.1.1.7) |
|
|
122 | (1) |
|
Network Protocols and Standards (3.2) |
|
|
123 | (20) |
|
|
123 | (1) |
|
Protocols: Rules That Govern Communications (3.2.1.1) |
|
|
123 | (1) |
|
Network Protocols (3.2.1.2) |
|
|
124 | (1) |
|
Interaction of Protocols (3.2.1.3) |
|
|
125 | (2) |
|
|
127 | (1) |
|
Protocol Suites and Industry Standards (3.2.2.1) |
|
|
127 | (1) |
|
Creation of the Internet and Development of TCP/IP (3.2.2.2) |
|
|
128 | (1) |
|
TCP/IP Protocol Suite and Communication Process (3.2.2.3) |
|
|
129 | (4) |
|
Standards Organizations (3.2.3) |
|
|
133 | (1) |
|
|
133 | (1) |
|
ISOC, IAB, and IETF (3.2.3.2) |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
136 | (1) |
|
Other Standards Organizations (3.2.3.5) |
|
|
136 | (1) |
|
|
137 | (1) |
|
The Benefits of Using a Layered Model (3.2.4.1) |
|
|
138 | (1) |
|
The OSI Reference Model (3.2.4.2) |
|
|
139 | (1) |
|
The TCP/IP Protocol Model (3.2.4.3) |
|
|
140 | (1) |
|
Comparing the OSI Model with the TCP/IP Model (3.2.4.4) |
|
|
141 | (2) |
|
Moving Data in the Network (3.3) |
|
|
143 | (11) |
|
Data Encapsulation (3.3.1) |
|
|
143 | (1) |
|
Communicating the Messages (3.3.1.1) |
|
|
143 | (1) |
|
Protocol Data Units (PDU) (3.3.1.2) |
|
|
144 | (1) |
|
|
145 | (1) |
|
Deencapsulation (3.3.1.4) |
|
|
146 | (1) |
|
Accessing Local Resources (3.3.2) |
|
|
146 | (1) |
|
Network Addresses and Data-Link Addresses (3.3.2.1) |
|
|
146 | (2) |
|
Communicating with a Device on the Same Network (3.3.2.2) |
|
|
148 | (1) |
|
MAC and IP Addresses (3.3.2.3) |
|
|
149 | (1) |
|
Accessing Remote Resources (3.3.3) |
|
|
150 | (1) |
|
Default Gateway (3.3.3.1) |
|
|
150 | (1) |
|
Communicating with a Device on a Remote Network (3.3.3.2) |
|
|
151 | (3) |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
156 | (5) |
|
|
161 | (70) |
|
|
161 | (1) |
|
|
161 | (2) |
|
|
163 | (1) |
|
Physical Layer Protocols (4.1) |
|
|
164 | (9) |
|
Getting It Connected (4.1.1) |
|
|
164 | (1) |
|
Connecting to the Network (4.1.1.1) |
|
|
164 | (1) |
|
Network Interface Cards (4.1.1.2) |
|
|
165 | (1) |
|
Purpose of the Physical Layer (4.1.2) |
|
|
166 | (1) |
|
The Physical Layer (4.1.2.1) |
|
|
166 | (1) |
|
Physical Layer Media (4.1.2.2) |
|
|
167 | (1) |
|
Physical Layer Standards (4.1.2.3) |
|
|
168 | (1) |
|
Fundamental Principles of Layer 1 (4.1.3) |
|
|
169 | (1) |
|
Physical Layer Fundamental Principles (4.1.3.1) |
|
|
169 | (2) |
|
|
171 | (1) |
|
|
172 | (1) |
|
Types of Physical Media (4.1.3.4) |
|
|
173 | (1) |
|
|
173 | (25) |
|
|
173 | (1) |
|
Characteristics of Copper Media (4.2.1.1) |
|
|
173 | (2) |
|
|
175 | (1) |
|
Unshielded Twisted-Pair Cable (4.2.1.3) |
|
|
176 | (1) |
|
Shielded Twisted-Pair (STP) Cable (4.2.1.4) |
|
|
176 | (1) |
|
|
177 | (1) |
|
Copper Media Safety (4.2.1.6) |
|
|
178 | (1) |
|
|
179 | (1) |
|
Properties of UTP Cabling (4.2.2.1) |
|
|
179 | (1) |
|
UTP Cabling Standards (4.2.2.2) |
|
|
180 | (2) |
|
|
182 | (1) |
|
Types of UTP Cable (4.2.2.4) |
|
|
183 | (2) |
|
Testing UTP Cables (4.2.2.5) |
|
|
185 | (1) |
|
Fiber-Optic Cabling (4.2.3) |
|
|
185 | (1) |
|
Properties of Fiber-Optic Cabling (4.2.3.1) |
|
|
185 | (1) |
|
Fiber Media Cable Design (4.2.3.2) |
|
|
186 | (1) |
|
Types of Fiber Media (4.2.3.3) |
|
|
187 | (2) |
|
Network Fiber Connectors (4.2.3.4) |
|
|
189 | (2) |
|
Testing Fiber Cables (4.2.3.5) |
|
|
191 | (1) |
|
Fiber Versus Copper (4.2.3.6) |
|
|
192 | (1) |
|
|
193 | (1) |
|
Properties of Wireless Media (4.2.4.1) |
|
|
193 | (1) |
|
Types of Wireless Media (4.2.4.2) |
|
|
194 | (2) |
|
|
196 | (1) |
|
802.11 Wi-Fi Standards (4.2.4.4) |
|
|
196 | (2) |
|
Data Link Layer Protocols (4.3) |
|
|
198 | (7) |
|
Purpose of the Data Link Layer (4.3.1) |
|
|
198 | (1) |
|
The Data Link Layer (4.3.1.1) |
|
|
198 | (1) |
|
Data Link Sublayers (4.3.1.2) |
|
|
199 | (1) |
|
Media Access Control (4.3.1.3) |
|
|
200 | (1) |
|
Providing Access to Media (4.3.1.4) |
|
|
201 | (1) |
|
Layer 2 Frame Structure (4.3.2) |
|
|
202 | (1) |
|
Formatting Data for Transmission (4.3.2.1) |
|
|
202 | (1) |
|
Creating a Frame (4.3.2.2) |
|
|
203 | (1) |
|
Layer 2 Standards (4.3.3) |
|
|
204 | (1) |
|
Data Link Layer Standards (4.3.3.1) |
|
|
204 | (1) |
|
Media Access Control (4.4) |
|
|
205 | (20) |
|
|
206 | (1) |
|
Controlling Access to the Media (4.4.1.1) |
|
|
206 | (1) |
|
Physical and Logical Topologies (4.4.1.2) |
|
|
207 | (1) |
|
|
208 | (1) |
|
Common Physical WAN Topologies (4.4.2.1) |
|
|
208 | (1) |
|
Physical Point-to-Point Topology) (4.4.2.2) |
|
|
209 | (1) |
|
Logical Point-to-Point Topology (4.4.2.3) |
|
|
209 | (1) |
|
Half and Full Duplex (4.4.2.4) |
|
|
210 | (1) |
|
|
210 | (1) |
|
Physical LAN Topologies (4.4.3.1) |
|
|
210 | (1) |
|
Logical Topology for Shared Media (4.4.3.2) |
|
|
211 | (1) |
|
Contention-Based Access (4.4.3.3) |
|
|
212 | (1) |
|
Multiaccess Topology (4.4.3.4) |
|
|
213 | (1) |
|
Controlled Access (4.4.3.5) |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
Layer 2 Address (4.4.4.3) |
|
|
216 | (1) |
|
|
217 | (1) |
|
LAN and WAN Frames (4.4.4.5) |
|
|
218 | (2) |
|
|
220 | (1) |
|
|
221 | (1) |
|
802.11 Wireless Frame (4.4.4.8) |
|
|
222 | (3) |
|
|
225 | (2) |
|
|
227 | (1) |
|
|
227 | (1) |
|
|
227 | (1) |
|
|
227 | (1) |
|
|
227 | (4) |
|
|
231 | (52) |
|
|
231 | (1) |
|
|
231 | (2) |
|
|
233 | (1) |
|
|
234 | (18) |
|
Ethernet Operation (5.1.1) |
|
|
234 | (1) |
|
LLC and MAC Sublayers (5.1.1.1) |
|
|
235 | (1) |
|
|
235 | (1) |
|
Media Access Control (5.1.1.3) |
|
|
236 | (2) |
|
MAC Address: Ethernet Identity (5.1.1.4) |
|
|
238 | (1) |
|
Frame Processing (5.1.1.5) |
|
|
239 | (1) |
|
Ethernet Frame Attributes (5.1.2) |
|
|
240 | (1) |
|
Ethernet Encapsulation (5.1.2.1) |
|
|
241 | (1) |
|
Ethernet Frame Size (5.1.2.2) |
|
|
242 | (1) |
|
Introduction to the Ethernet Frame (5.1.2.3) |
|
|
243 | (1) |
|
|
244 | (1) |
|
MAC Addresses and Hexadecimal (5.1.3.1) |
|
|
244 | (2) |
|
MAC Address Representations (5.1.3.2) |
|
|
246 | (1) |
|
Unicast MAC Address (5.1.3.3) |
|
|
247 | (1) |
|
Broadcast MAC Address (5.1.3.4) |
|
|
248 | (1) |
|
Multicast MAC Address (5.1.3.5) |
|
|
248 | (1) |
|
MAC and IP (5.1.4, 5.1.4.1) |
|
|
249 | (1) |
|
End-to-End Connectivity, MAC, and IP (5.1.4.2) |
|
|
250 | (2) |
|
Address Resolution Protocol (5.2, 5.2.1, 5.2.1.1) |
|
|
252 | (8) |
|
|
252 | (1) |
|
|
253 | (3) |
|
ARP Role in Remote Communication (5.2.1.4) |
|
|
256 | (2) |
|
Removing Entries from an ARP Table (5.2.1.5) |
|
|
258 | (1) |
|
ARP Tables on Networking Devices (5.2.1.6) |
|
|
258 | (1) |
|
|
259 | (1) |
|
How ARP Can Create Problems (5.2.2.1) |
|
|
259 | (1) |
|
Mitigating ARP Problems (5.2.2.2) |
|
|
260 | (1) |
|
|
260 | (17) |
|
|
260 | (1) |
|
Switch Port Fundamentals (5.3.1.1) |
|
|
261 | (1) |
|
Switch MAC Address Table (5.3.1.2) |
|
|
261 | (2) |
|
Duplex Settings (5.3.1.3) |
|
|
263 | (2) |
|
|
265 | (1) |
|
Frame-Forwarding Methods on Cisco Switches (5.3.1.5) |
|
|
265 | (1) |
|
Cut-Through Switching (5.3.1.6) |
|
|
266 | (1) |
|
Memory Buffering on Switches (5.3.1.8) |
|
|
267 | (1) |
|
|
268 | (1) |
|
Fixed Versus Modular Configuration (5.3.2.1) |
|
|
268 | (2) |
|
Module Options for Cisco Switch Slots (5.3.2.2) |
|
|
270 | (2) |
|
Layer 3 Switching (5.3.3) |
|
|
272 | (1) |
|
Layer 2 Versus Layer 3 Switching (5.3.3.1) |
|
|
272 | (1) |
|
Cisco Express Forwarding (5.3.3.2) |
|
|
273 | (1) |
|
Types of Layer 3 Interfaces (5.3.3.3) |
|
|
274 | (1) |
|
Configuring a Routed Port on a Layer 3 Switch (5.3.3.4) |
|
|
275 | (2) |
|
|
277 | (1) |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
279 | (1) |
|
|
279 | (1) |
|
|
279 | (4) |
|
|
283 | (58) |
|
|
283 | (1) |
|
|
283 | (1) |
|
|
284 | (1) |
|
Network Layer Protocols (6.1) |
|
|
285 | (14) |
|
Network Layer in Communication (6.1.1) |
|
|
285 | (1) |
|
The Network Layer (6.1.1.1) |
|
|
285 | (1) |
|
Network Layer Protocols (6.1.1.2) |
|
|
286 | (1) |
|
Characteristics of the IP Protocol (6.1.2) |
|
|
287 | (1) |
|
Characteristics of IP (6.1.2.1) |
|
|
287 | (1) |
|
IP---Connectionless (6.1.2.2) |
|
|
288 | (1) |
|
IP---Best-Effort Delivery (6.1.2.3) |
|
|
288 | (1) |
|
IP---Media Independent (6.1.2.4) |
|
|
289 | (1) |
|
Encapsulating IP (6.1.2.5) |
|
|
290 | (1) |
|
|
291 | (1) |
|
IPv4 Packet Header (6.1.3.1) |
|
|
291 | (2) |
|
IPv4 Header Fields (6.1.3.2) |
|
|
293 | (1) |
|
Sample IPv4 Headers (6.1.3.3) |
|
|
293 | (2) |
|
|
295 | (1) |
|
Limitations of IPv4 (6.1.4.1) |
|
|
295 | (1) |
|
Introducing IPv6 (6.1.4.2) |
|
|
296 | (1) |
|
Encapsulating IPv6 (6.1.4.3) |
|
|
297 | (1) |
|
IPv6 Packet Header (6.1.4.4) |
|
|
298 | (1) |
|
Sample IPv6 Header (6.1.4.5) |
|
|
298 | (1) |
|
|
299 | (16) |
|
How a Host Routes (6.2.1) |
|
|
299 | (1) |
|
Host Forwarding Decision (6.2.1.1) |
|
|
300 | (1) |
|
Default Gateway (6.2.1.2) |
|
|
300 | (1) |
|
IPv4 Host Routing Table (6.2.1.3) |
|
|
301 | (2) |
|
IPv4 Host Routing Entries (6.2.1.4) |
|
|
303 | (2) |
|
Sample IPv4 Host Routing Table (6.2.1.5) |
|
|
305 | (1) |
|
Sample IPv6 Host Routing Table (6.2.1.6) |
|
|
306 | (1) |
|
Router Routing Tables (6.2.2) |
|
|
307 | (1) |
|
Router Packet-Forwarding Decision (6.2.2.1) |
|
|
307 | (1) |
|
IPv4 Router Routing Table (6.2.2.2) |
|
|
308 | (2) |
|
Directly Connected Routing Table Entries (6.2.2.3) |
|
|
310 | (1) |
|
Remote Network Routing Table Entries (6.2.2.4) |
|
|
311 | (1) |
|
Next-Hop Address (6.2.2.5) |
|
|
312 | (1) |
|
Sample Router IPv4 Routing Table (6.2.2.6) |
|
|
312 | (3) |
|
|
315 | (11) |
|
Anatomy of a Router (6.3.1) |
|
|
315 | (1) |
|
A Router Is a Computer (6.3.1.1) |
|
|
315 | (1) |
|
Router CPU and OS (6.3.1.2) |
|
|
315 | (1) |
|
|
316 | (2) |
|
Inside a Router (6.3.1.4) |
|
|
318 | (1) |
|
Router Backplane (6.3.1.5) |
|
|
319 | (1) |
|
Connecting to a Router (6.3.1.6) |
|
|
320 | (1) |
|
LAN and WAN Interfaces (6.3.1.7) |
|
|
321 | (1) |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
323 | (1) |
|
Router Bootup Process (6.3.2.3) |
|
|
323 | (2) |
|
Show Version Output (6.3.2.4) |
|
|
325 | (1) |
|
Configuring a Cisco Router (6.4) |
|
|
326 | (9) |
|
Configure Initial Settings (6.4.1) |
|
|
326 | (1) |
|
Router Configuration Steps (6.4.1.1) |
|
|
326 | (2) |
|
Configure Interfaces (6.4.2) |
|
|
328 | (1) |
|
Configure LAN Interfaces (6.4.2.1) |
|
|
328 | (2) |
|
Verify Interface Configuration (6.4.2.2) |
|
|
330 | (2) |
|
Configuring the Default Gateway (6.4.3) |
|
|
332 | (1) |
|
Default Gateway on a Host (6.4.3.1) |
|
|
332 | (1) |
|
Default Gateway on a Switch (6.4.3.2) |
|
|
333 | (2) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
337 | (1) |
|
|
337 | (1) |
|
|
337 | (1) |
|
|
337 | (4) |
|
Chapter 7 Transport Layer |
|
|
341 | (50) |
|
|
341 | (1) |
|
|
341 | (1) |
|
|
342 | (1) |
|
|
342 | (1) |
|
Transport Layer Protocols (7.1) |
|
|
343 | (20) |
|
Transportation of Data (7.1.1) |
|
|
343 | (1) |
|
Role of the Transport Layer (7.1.1.1, 7.1.1.2) |
|
|
343 | (4) |
|
Conversation Multiplexing (7.1.1.3) |
|
|
347 | (1) |
|
Transport Layer Reliability (7.1.1.4) |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
349 | (1) |
|
The Right Transport Layer Protocol for the Right Application (7.1.1.7) |
|
|
350 | (2) |
|
Introducing TCP and UDP (7.1.2) |
|
|
352 | (1) |
|
Introducing TCR (7.1.2.1) |
|
|
352 | (1) |
|
|
353 | (2) |
|
Introducing UDP (7.1.2.3) |
|
|
355 | (1) |
|
|
355 | (1) |
|
Separating Multiple Communications (7.1.2.5) |
|
|
356 | (1) |
|
TCP and UDP Port Addressing (7.1.2.6 -- 7.1.2.9) |
|
|
357 | (5) |
|
TCP and UDP Segmentation (7.1.2.10) |
|
|
362 | (1) |
|
|
363 | (21) |
|
TCP Communication (7.2.1) |
|
|
364 | (1) |
|
TCP Reliable Delivery (7.2.1.1) |
|
|
364 | (1) |
|
TCP Server Processes (7.2.1.2) |
|
|
364 | (1) |
|
TCP Connection Establishment and Termination (7.2.1.3) |
|
|
365 | (2) |
|
TCP Three-Way Handshake Analysis---Step 1 (7.2.1.4) |
|
|
367 | (1) |
|
TCP Three-Way Handshake Analysis---Step 2 (7.2.1.5) |
|
|
368 | (1) |
|
TCP Three-Way Handshake Analysis---Step 3 (7.2.1.6) |
|
|
369 | (1) |
|
TCP Session Termination Analysis (7.2.1.7) |
|
|
370 | (3) |
|
Reliability and Flow Control (7.2.2) |
|
|
373 | (1) |
|
TCP Reliability---Ordered Delivery (7.2.2.1) |
|
|
373 | (1) |
|
TCP Reliability---Acknowledgement and Window Size (7.2.2.2) |
|
|
374 | (2) |
|
TCP Reliability---Data Loss and Retransmission (7.2.2.3) |
|
|
376 | (1) |
|
TCP Flow Control---Window Size and Acknowledgements (7.2.2.4) |
|
|
376 | (2) |
|
TCP Flow Control---Congestion Avoidance (7.2.2.5) |
|
|
378 | (1) |
|
UDP Communication (7.2.3) |
|
|
379 | (1) |
|
UDP Low Overhead Versus Reliability (7.2.3.1) |
|
|
379 | (1) |
|
UDP Datagram Reassembly (7.2.3.2) |
|
|
380 | (1) |
|
UDP Server Processes and Requests (7.2.3.3) |
|
|
381 | (1) |
|
UDP Client Processes (7.2.3.4) |
|
|
381 | (1) |
|
TCP or UDP, That Is the Question (7.2.4) |
|
|
382 | (1) |
|
Applications That Use TCP (7.2.4.1) |
|
|
382 | (1) |
|
Applications That Use UDP (7.2.4.2) |
|
|
382 | (2) |
|
|
384 | (2) |
|
|
386 | (1) |
|
|
386 | (1) |
|
|
386 | (1) |
|
|
386 | (1) |
|
|
386 | (5) |
|
|
391 | (74) |
|
|
391 | (1) |
|
|
391 | (2) |
|
|
393 | (1) |
|
IPv4 Network Addresses (8.1) |
|
|
393 | (31) |
|
IPv4 Address Structure (8.1.1) |
|
|
394 | (1) |
|
Binary Notation (8.1.1.1) |
|
|
394 | (1) |
|
Binary Number System (8.1.1.2) |
|
|
395 | (2) |
|
Converting a Binary Address to Decimal (8.1.1.3) |
|
|
397 | (2) |
|
Converting from Decimal to Binary (8.1.1.5, 8.1.1.6) |
|
|
399 | (1) |
|
|
400 | (1) |
|
Network Portion and Host Portion of an IPv4 Address (8.1.2.1) |
|
|
400 | (2) |
|
Examining the Prefix Length (8.1.2.2) |
|
|
402 | (1) |
|
IPv4 Network, Host, and Broadcast Addresses (8.1.2.3) |
|
|
403 | (2) |
|
First Host and Last Host Addresses (8.1.2.4) |
|
|
405 | (1) |
|
Bitwise AND Operation (8.1.2.5) |
|
|
406 | (1) |
|
Importance of ANDing (8.1.2.6) |
|
|
407 | (1) |
|
IPv4 Unicast, Broadcast, and Multicast (8.1.3) |
|
|
408 | (1) |
|
Assigning a Static IPv4 Address to a Host (8.1.3.1) |
|
|
408 | (1) |
|
Assigning a Dynamic IPv4 Address to a Host (8.1.3.2) |
|
|
409 | (1) |
|
Unicast Transmission (8.1.3.3) |
|
|
410 | (2) |
|
Broadcast Transmission (8.1.3.4) |
|
|
412 | (1) |
|
Multicast Transmission (8.1.3.5) |
|
|
413 | (3) |
|
Types of IPv4 Addresses (8.1.4) |
|
|
416 | (1) |
|
Public and Private IPv4 Addresses (8.1.4.1) |
|
|
416 | (1) |
|
Special-Use IPv4 Addresses (8.1.4.3) |
|
|
417 | (2) |
|
Legacy Classful Addressing (8.1.4.4) |
|
|
419 | (3) |
|
Assignment of IP Addresses (8.1.4.5, 8.1.4.6) |
|
|
422 | (2) |
|
IPv6 Network Addresses (8.2) |
|
|
424 | (27) |
|
|
424 | (1) |
|
The Need for IPv6 (8.2.1.1) |
|
|
425 | (1) |
|
IPv4 and IPv6 Coexistence (8.2.1.2) |
|
|
426 | (1) |
|
|
427 | (1) |
|
Hexadecimal Number System (8.2.2.1) |
|
|
427 | (2) |
|
IPv6 Address Representation (8.2.2.2) |
|
|
429 | (1) |
|
Rule 1: Omit Leading 0s (8.2.2.3) |
|
|
430 | (1) |
|
Rule 2: Omit All 0 Segments (8.2.2.4) |
|
|
430 | (1) |
|
Types of IPv6 Addresses (8.2.3) |
|
|
431 | (1) |
|
IPv6 Address Types (8.2.3.1) |
|
|
431 | (1) |
|
IPv6 Prefix Length (8.2.3.2) |
|
|
432 | (1) |
|
IPv6 Unicast Addresses (8.2.3.3) |
|
|
432 | (2) |
|
IPv6 Link-Local Unicast Addresses (8.2.3.4) |
|
|
434 | (1) |
|
IPv6 Unicast Addresses (8.2.4) |
|
|
435 | (1) |
|
Structure of an IPv6 Global Unicast Address (8.2.4.1) |
|
|
435 | (2) |
|
Static Configuration of a Global Unicast Address (8.2.4.2) |
|
|
437 | (2) |
|
Dynamic Configuration of a Global Unicast Address Using SLAAC (8.2.4.3) |
|
|
439 | (2) |
|
Dynamic Configuration of a Global Unicast Address Using DHCPv6 (8.2.4.4) |
|
|
441 | (1) |
|
EUI-64 Process or Randomly Generated (8.2.4.5) |
|
|
442 | (2) |
|
Dynamic Link-Local Addresses (8.2.4.6) |
|
|
444 | (1) |
|
Static Link-Local Addresses (8.2.4.7) |
|
|
445 | (2) |
|
Verifying IPv6 Address Configuration (8.2.4.8) |
|
|
447 | (2) |
|
IPv6 Multicast Addresses (8.2.5) |
|
|
449 | (1) |
|
Assigned IPv6 Multicast Addresses (8.2.5.1) |
|
|
449 | (1) |
|
Solicited-Node IPv6 Multicast Addresses (8.2.5.2) |
|
|
450 | (1) |
|
Connectivity Verification (8.3) |
|
|
451 | (9) |
|
|
451 | (1) |
|
ICMPv4 and ICMPv6 Messages (8.3.1.1) |
|
|
451 | (2) |
|
ICMPv6 Router Solicitation and Router Advertisement Messages (8.3.1.2) |
|
|
453 | (1) |
|
ICMPv6 Neighbor Solicitation and Neighbor Advertisement Messages (8.3.1.3) |
|
|
454 | (1) |
|
Testing and Verification (8.3.2) |
|
|
455 | (1) |
|
Ping: Testing the Local Stack (8.3.2.1) |
|
|
455 | (1) |
|
Ping: Testing Connectivity to the Local LAN (8.3.2.2) |
|
|
456 | (1) |
|
Ping: Testing Connectivity to Remote (8.3.2.3) |
|
|
456 | (1) |
|
Traceroute: Testing the Path (8.3.2.4) |
|
|
456 | (4) |
|
|
460 | (1) |
|
|
461 | (1) |
|
|
462 | (1) |
|
|
462 | (1) |
|
|
462 | (1) |
|
|
462 | (3) |
|
Chapter 9 Subnetting IP Networks |
|
|
465 | (50) |
|
|
465 | (1) |
|
|
465 | (1) |
|
|
466 | (1) |
|
Subnetting an IPv4 Network (9.1) |
|
|
467 | (31) |
|
Network Segmentation (9.1.1) |
|
|
467 | (1) |
|
Reasons for Subnetting (9.1.1.1) |
|
|
467 | (1) |
|
Communication Between Subnets (9.1.1.2) |
|
|
468 | (1) |
|
IP Subnetting Is FUNdamental (9.1.2) |
|
|
468 | (1) |
|
|
468 | (2) |
|
The Plan: Address Assignment (9.1.2.2) |
|
|
470 | (1) |
|
Subnetting an IPv4 Network (9.1.3) |
|
|
470 | (1) |
|
Basic Subnetting (9.1.3.1) |
|
|
470 | (2) |
|
|
472 | (2) |
|
Subnetting Formulas (9.1.3.3) |
|
|
474 | (1) |
|
Creating Four Subnets (9.1.3.4) |
|
|
475 | (3) |
|
Creating Eight Subnets (9.1.3.5) |
|
|
478 | (3) |
|
Creating 100 Subnets with a /16 prefix (9.1.3.10) |
|
|
481 | (2) |
|
Calculating the Hosts (9.1.3.11) |
|
|
483 | (1) |
|
Calculating the Hosts (9.1.3.12) |
|
|
484 | (3) |
|
Determining the Subnet Mask (9.1.4) |
|
|
487 | (1) |
|
Subnetting Based on Host Requirements (9.1.4.1) |
|
|
487 | (1) |
|
Subnetting Network-Based Requirements (9.1.4.2) |
|
|
488 | (1) |
|
Subnetting to Meet Network Requirements (9.1.4.3, 9.1.4.4) |
|
|
488 | (4) |
|
Benefits of Variable-Length Subnet Masking (9.1.5) |
|
|
492 | (1) |
|
Traditional Subnetting Wastes Addresses (9.1.5.1) |
|
|
492 | (1) |
|
Variable-Length Subnet Masks (VLSM) (9.1.5.2) |
|
|
493 | (1) |
|
|
494 | (1) |
|
VLSM in Practice (9.1.5.4) |
|
|
495 | (1) |
|
|
496 | (2) |
|
|
498 | (3) |
|
Structured Design (9.2.1) |
|
|
498 | (1) |
|
Planning to Address the Network (9.2.1.1) |
|
|
498 | (1) |
|
Assigning Addresses to Devices (9.2.1.2) |
|
|
499 | (2) |
|
Design Considerations for IPv6 (9.3) |
|
|
501 | (6) |
|
Subnetting an IPv6 Network (9.3.1) |
|
|
501 | (1) |
|
Subnetting Using the Subnet ID (9.3.1.1) |
|
|
502 | (1) |
|
IPv6 Subnet Allocation (9.3.1.2) |
|
|
503 | (2) |
|
Subnetting into the Interface ID (9.3.1.3) |
|
|
505 | (2) |
|
|
507 | (1) |
|
|
508 | (1) |
|
|
508 | (1) |
|
|
509 | (1) |
|
|
509 | (1) |
|
|
509 | (6) |
|
Chapter 10 Application Layer |
|
|
515 | (36) |
|
|
515 | (1) |
|
|
515 | (1) |
|
|
516 | (1) |
|
Application Layer Protocols (10.1) |
|
|
517 | (8) |
|
Application, Session, and Presentation (10.1.1) |
|
|
517 | (1) |
|
OSI and TCP/IP Models Revisited (10.1.1.1) |
|
|
517 | (1) |
|
Application Layer (10.1.1.2) |
|
|
518 | (1) |
|
Presentation and Session Layers (10.1.1.3) |
|
|
518 | (1) |
|
TCP/IP Application Layer Protocols (10.1.1.4) |
|
|
519 | (1) |
|
How Application Protocols Interact with End-User Applications (10.1.2) |
|
|
520 | (1) |
|
Peer-to-Peer Networks (10.1.2.1) |
|
|
520 | (1) |
|
Peer-to-Peer Applications (10.1.2.2) |
|
|
521 | (1) |
|
Common P2P Applications (10.1.2.3) |
|
|
522 | (1) |
|
Client-Server Model (10.1.2.5) |
|
|
523 | (2) |
|
Well-Known Application Layer Protocols and Services (10.2) |
|
|
525 | (15) |
|
Common Application Layer Protocols (10.2.1) |
|
|
525 | (1) |
|
Application Layer Protocols Revisited (10.2.1.1) |
|
|
525 | (1) |
|
Hypertext Transfer Protocol and Hypertext Markup Language (10.2.1.2) |
|
|
525 | (1) |
|
HTTP and HTTPS (10.2.1.3) |
|
|
526 | (1) |
|
SMTP, POP, and IMAP (10.2.1.4-10.2.1.7) |
|
|
527 | (3) |
|
Providing IP Addressing Services (10.2.2) |
|
|
530 | (1) |
|
Domain Name System (10.2.2.1) |
|
|
530 | (1) |
|
DNS Message Format (10.2.2.2) |
|
|
530 | (2) |
|
|
532 | (1) |
|
|
533 | (1) |
|
Dynamic Host Configuration Protocol (10.2.2.6) |
|
|
534 | (1) |
|
DHCPv4 Operation (10.2.2.7) |
|
|
535 | (3) |
|
Providing File-Sharing Services (10.2.3) |
|
|
538 | (1) |
|
File Transfer Protocol (10.2.3.1) |
|
|
538 | (1) |
|
Server Message Block (10.2.3.4) |
|
|
539 | (1) |
|
The Message Heard Around the World (10.3) |
|
|
540 | (6) |
|
|
540 | (1) |
|
The Internet of Things (10.3.1.1) |
|
|
540 | (1) |
|
Message Travels Through a Network (10.3.1.2) |
|
|
540 | (2) |
|
Getting the Data to the End Device (10.3.1.3) |
|
|
542 | (1) |
|
Getting the Data Through the Internetwork (10.3.1.4) |
|
|
542 | (1) |
|
Getting the Data to the Right Application (10.3.1.5) |
|
|
543 | (2) |
|
Warriors of the Net (10.3.1.6) |
|
|
545 | (1) |
|
|
546 | (2) |
|
|
548 | (1) |
|
|
548 | (1) |
|
|
548 | (1) |
|
|
548 | (1) |
|
|
549 | (2) |
|
Chapter 11 It's a Network |
|
|
551 | (76) |
|
|
551 | (1) |
|
|
551 | (1) |
|
|
552 | (1) |
|
|
553 | (11) |
|
Devices in a Small Network (11.1.1) |
|
|
553 | (1) |
|
Small-Network Topologies (11.1.1.1) |
|
|
553 | (1) |
|
Device Selection for a Small Network (11.1.1.2) |
|
|
554 | (1) |
|
IP Addressing for a Small Network (11.1.1.3) |
|
|
555 | (1) |
|
Redundancy in a Small Network (11.1.1.4) |
|
|
556 | (1) |
|
Design Considerations for a Small Network (11.1.1.5) |
|
|
557 | (2) |
|
Protocols in a Small Network (11.1.2) |
|
|
559 | (1) |
|
Common Applications in a Small Network (11.1.2.1) |
|
|
559 | (1) |
|
Common Protocols in a Small Network (11.1.2.2) |
|
|
560 | (1) |
|
Real-Time Applications for a Small Network (11.1.2.3) |
|
|
561 | (1) |
|
Growing to Larger Networks (11.1.3) |
|
|
562 | (1) |
|
Scaling a Small Network (11.1.3.1) |
|
|
562 | (1) |
|
Protocol Analysis of a Small Network (11.1.3.2) |
|
|
563 | (1) |
|
Evolving Protocol Requirements (11.1.3.3) |
|
|
564 | (1) |
|
Keeping the Network Safe (11.2) |
|
|
564 | (19) |
|
Network Device Security Measures (11.2.1) |
|
|
565 | (1) |
|
Categories of Threats to Network Security (11.2.1.1) |
|
|
565 | (1) |
|
Physical Security (11.2.1.2) |
|
|
566 | (1) |
|
Types of Security Vulnerabilities (11.2.1.3) |
|
|
566 | (3) |
|
Vulnerabilities and Network Attacks (11.2.2) |
|
|
569 | (1) |
|
Viruses, Worms, and Trojan Horses (11.2.2.1) |
|
|
569 | (1) |
|
Reconnaissance Attacks (11.2.2.2) |
|
|
570 | (1) |
|
Access Attacks (11.2.2.3) |
|
|
570 | (2) |
|
|
572 | (2) |
|
Mitigating Network Attacks (11.2.3) |
|
|
574 | (1) |
|
Backup, Upgrade, Update, and Patch (11.2.3.1) |
|
|
574 | (1) |
|
Authentication, Authorization, and Accounting (11.2.3.2) |
|
|
575 | (2) |
|
|
577 | (1) |
|
Endpoint Security (11.2.3.4) |
|
|
578 | (1) |
|
Securing Devices (11.2.4) |
|
|
578 | (1) |
|
Introduction to Securing Devices (11.2.4.1) |
|
|
578 | (1) |
|
|
579 | (1) |
|
Basic Security Practices (11.2.4.3) |
|
|
580 | (1) |
|
|
581 | (2) |
|
Basic Network Performance (11.3) |
|
|
583 | (20) |
|
|
583 | (1) |
|
Interpreting Ping Results (11.3.1.1) |
|
|
583 | (2) |
|
|
585 | (1) |
|
Network Baseline (11.3.1.3) |
|
|
586 | (1) |
|
|
587 | (1) |
|
Interpreting Tracert Messages (11.3.2.1) |
|
|
587 | (1) |
|
|
588 | (1) |
|
Common Show Commands Revisited (11.3.3.1) |
|
|
588 | (5) |
|
Viewing Router Settings with the show version Command (11.3.3.2) |
|
|
593 | (2) |
|
Viewing Switch Settings with the show version Command (11.3.3.3) |
|
|
595 | (1) |
|
Host and IOS Commands (11.3.4) |
|
|
595 | (1) |
|
ipconfig Command Options (11.3.4.1) |
|
|
595 | (2) |
|
arp Command Options (11.3.4.2) |
|
|
597 | (1) |
|
show cdp neighbors Command Options (11.3.4.3) |
|
|
597 | (3) |
|
Using the show ip interface brief Command (11.3.4.4) |
|
|
600 | (3) |
|
Managing iOS Configuration Files (11.4) |
|
|
603 | (8) |
|
Router and Switch File Systems (11.4.1) |
|
|
603 | (1) |
|
Router File Systems (11.4.1.1) |
|
|
603 | (3) |
|
Switch File Systems (11.4.1.2) |
|
|
606 | (1) |
|
Back Up and Restore Configuration Files (11.4.2) |
|
|
607 | (1) |
|
Backing Up and Restoring Using Text Files (11.4.2.1) |
|
|
607 | (1) |
|
Backing Up and Restoring Using TFTP (11.4.2.2) |
|
|
608 | (1) |
|
Using USB Ports on a Cisco Router (11.4.2.3) |
|
|
609 | (1) |
|
Backing Up and Restoring Using a USB Flash Drive (11.4.2.4) |
|
|
610 | (1) |
|
Integrated Routing Services (11.5) |
|
|
611 | (9) |
|
Integrated Router (11.5.1) |
|
|
611 | (1) |
|
Multifunction Device (11.5.1.1) |
|
|
611 | (2) |
|
Types of Integrated Routers (11.5.1.2) |
|
|
613 | (1) |
|
Wireless Capability (11.5.1.3) |
|
|
614 | (1) |
|
Basic Security of Wireless (11.5.1.4) |
|
|
615 | (1) |
|
Configuring the Integrated Router (11.5.2) |
|
|
616 | (1) |
|
Configuring the Integrated Router (11.5.2.1) |
|
|
616 | (1) |
|
Enabling Wireless (11.5.2.2) |
|
|
617 | (1) |
|
Configure a Wireless Client (11.5.2.3) |
|
|
618 | (2) |
|
|
620 | (2) |
|
|
622 | (1) |
|
|
622 | (1) |
|
|
622 | (1) |
|
|
623 | (1) |
|
Check Your Understanding Questions |
|
|
623 | (4) |
Appendix A Answers to the "Check Your Understanding" Questions |
|
627 | (14) |
Glossary |
|
641 | (13) |
Index |
|
654 | |