Introduction |
|
xxiv | |
Chapter 1 Explore the Network |
|
1 | (52) |
|
|
1 | (1) |
|
|
1 | (2) |
|
|
3 | (1) |
|
|
4 | (7) |
|
|
4 | (3) |
|
Networks in Our Daily Lives (1.1.1.1) |
|
|
4 | (1) |
|
Technology Then and Now (1.1.1.2) |
|
|
4 | (1) |
|
|
5 | (1) |
|
Networks Support the Way We Learn (1.1.1.4) |
|
|
5 | (1) |
|
Networks Support the Way We Communicate (1.1.1.5) |
|
|
5 | (1) |
|
Networks Support the Way We Work (1.1.1.6) |
|
|
6 | (1) |
|
Networks Support the Way We Play (1.1.1.7) |
|
|
7 | (1) |
|
Providing Resources in a Network (1.1.2) |
|
|
7 | (4) |
|
Networks of Many Sizes (1.1.2.1) |
|
|
8 | (1) |
|
Clients and Servers (1.1.2.2) |
|
|
9 | (1) |
|
|
10 | (1) |
|
LANs, WANs, and the Internet (1.2) |
|
|
11 | (17) |
|
Network Components (1.2.1) |
|
|
11 | (9) |
|
Overview of Network Components (1.2.1.1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
Intermediary Network Devices (1.2.1.3) |
|
|
14 | (1) |
|
|
15 | (2) |
|
Network Representations (1.2.1.5) |
|
|
17 | (2) |
|
Topology Diagrams (1.2.1.6) |
|
|
19 | (1) |
|
|
20 | (3) |
|
Types of Networks (1.2.2.1) |
|
|
20 | (2) |
|
Local Area Networks (1.2.2.2) |
|
|
22 | (1) |
|
Wide Area Networks (1.2.2.3) |
|
|
22 | (1) |
|
The Internet, Intranets, and Extranets (1.2.3) |
|
|
23 | (2) |
|
|
23 | (1) |
|
Intranets and Extranets (1.2.3.2) |
|
|
24 | (1) |
|
Internet Connections (1.2.4) |
|
|
25 | (3) |
|
Internet Access Technologies (1.2.4.1) |
|
|
26 | (1) |
|
Home and Small Office Internet Connections (1.2.4.2) |
|
|
26 | (1) |
|
Businesses Internet Connections (1.2.4.3) |
|
|
27 | (1) |
|
The Network as a Platform (1.3) |
|
|
28 | (7) |
|
Converged Networks (1.3.1) |
|
|
28 | (2) |
|
Traditional Separate Networks (1.3.1.1) |
|
|
29 | (1) |
|
The Converging Network (1.3.1.2) |
|
|
29 | (1) |
|
|
30 | (5) |
|
Network Architecture (1.3.2.1) |
|
|
30 | (1) |
|
Fault Tolerance (1.3.2.2) |
|
|
31 | (1) |
|
|
32 | (1) |
|
Quality of Service (1.3.2.4) |
|
|
32 | (1) |
|
|
33 | (2) |
|
The Changing Network Environment (1.4) |
|
|
35 | (12) |
|
|
35 | (4) |
|
|
35 | (1) |
|
Bring Your Own Device (1.4.1.2) |
|
|
35 | (1) |
|
Online Collaboration (1.4.1.3) |
|
|
36 | (1) |
|
Video Communication (1.4.1.4) |
|
|
37 | (1) |
|
Cloud Computing (1.4.1.5) |
|
|
37 | (2) |
|
Networking Technologies for the Home (1.4.2) |
|
|
39 | (3) |
|
Technology Trends in the Home (1.4.2.1) |
|
|
39 | (1) |
|
Powerline Networking (1.4.2.2) |
|
|
40 | (1) |
|
Wireless Broadband (1.4.2.3) |
|
|
41 | (1) |
|
|
42 | (2) |
|
Security Threats (1.4.3.1) |
|
|
42 | (1) |
|
Security Solutions (1.4.3.2) |
|
|
43 | (1) |
|
Network Architecture (1.4.4) |
|
|
44 | (4) |
|
Cisco Network Architecture (1.4.4.1) |
|
|
44 | (1) |
|
|
45 | (2) |
|
|
47 | (1) |
|
Warriors of the Net (1.5.1.2) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
Check Your Understanding Questions |
|
|
49 | (4) |
Chapter 2 Configure a Network Operating System |
|
53 | (38) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
54 | (14) |
|
|
55 | (3) |
|
Operating Systems (2.1.1.1) |
|
|
55 | (2) |
|
|
57 | (1) |
|
|
58 | (3) |
|
|
58 | (1) |
|
Terminal Emulation Programs (2.1.2.2) |
|
|
59 | (2) |
|
|
61 | (3) |
|
Cisco IOS Modes of Operation (2.1.3.1) |
|
|
61 | (1) |
|
Primary Command Modes (2.1.3.2) |
|
|
61 | (1) |
|
Configuration Command Modes (2.1.3.3) |
|
|
62 | (1) |
|
Navigate Between IOS Modes (2.1.3.4) |
|
|
62 | (2) |
|
The Command Structure (2.1.4) |
|
|
64 | (4) |
|
Basic IOS Command Structure (2.1.4.1) |
|
|
64 | (1) |
|
IOS Command Syntax (2.1.4.2) |
|
|
64 | (1) |
|
IOS Help Features (2.1.4.3) |
|
|
65 | (1) |
|
Hotkeys and Shortcuts (2.1.4.4) |
|
|
66 | (2) |
|
Basic Device Configuration (2.2) |
|
|
68 | (10) |
|
|
68 | (2) |
|
|
68 | (1) |
|
Configure Hostnames (2.2.1.2) |
|
|
69 | (1) |
|
Limit Access to Device Configurations (2.2.2) |
|
|
70 | (2) |
|
Secure Device Access (2.2.2.1) |
|
|
70 | (1) |
|
Configure Passwords (2.2.2.2) |
|
|
71 | (1) |
|
Encrypt Passwords (2.2.2.3) |
|
|
72 | (1) |
|
Banner Messages (2.2.2.4) |
|
|
72 | (1) |
|
Save Configurations (2.2.3) |
|
|
72 | (6) |
|
Save the Running Configuration File (2.2.3.1) |
|
|
73 | (1) |
|
Alter the Running Configuration (2.2.3.2) |
|
|
74 | (1) |
|
Capture Configuration to a Text File (2.2.3.3) |
|
|
74 | (4) |
|
|
78 | (7) |
|
Ports and Addresses (2.3.1) |
|
|
78 | (3) |
|
|
78 | (1) |
|
Interfaces and Ports (2.3.1.2) |
|
|
79 | (2) |
|
Configure IP Addressing (2.3.2) |
|
|
81 | (7) |
|
Manual IP Address Configuration for End Devices (2.3.2.1) |
|
|
81 | (2) |
|
Automatic IP Address Configuration for End Devices (2.3.2.2) |
|
|
83 | (2) |
|
Switch Virtual Interface Configuration (2.3.2.3) |
|
|
85 | (1) |
|
Verifying Connectivity (2.3.3) |
|
|
85 | (2) |
|
Interface Addressing Verification (2.3.3.1) |
|
|
85 | (1) |
|
End-to-End Connectivity Test (2.3.3.2) |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
Check Your Understanding Questions |
|
|
89 | (2) |
Chapter 3 Network Protocols and Communications |
|
91 | (50) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
92 | (1) |
|
Rules of Communication (3.1) |
|
|
92 | (8) |
|
|
93 | (7) |
|
Communication Fundamentals (3.1.1.1) |
|
|
93 | (1) |
|
Rule Establishment (3.1.1.2) |
|
|
94 | (1) |
|
Message Encoding (3.1.1.3) |
|
|
94 | (2) |
|
Message Formatting and Encapsulation (3.1.1.4) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
Message Delivery Options (3.1.1.7) |
|
|
98 | (2) |
|
Network Protocols and Standards (3.2) |
|
|
100 | (23) |
|
|
100 | (5) |
|
Rules that Govern Communications (3.2.1.1) |
|
|
100 | (1) |
|
Network Protocols (3.2.1.2) |
|
|
101 | (2) |
|
Protocol Interaction (3.2.1.3) |
|
|
103 | (2) |
|
|
105 | (9) |
|
Protocol Suites and Industry Standards (3.2.2.1) |
|
|
105 | (1) |
|
Development of TCP/IP (3.2.2.2) |
|
|
106 | (1) |
|
TCP/IP Protocol Suite (3.2.2.3) |
|
|
106 | (3) |
|
TCP/IP Communication Process (3.2.2.4) |
|
|
109 | (5) |
|
Standard Organizations (3.2.3) |
|
|
114 | (4) |
|
|
114 | (1) |
|
Internet Standards (3.2.3.2) |
|
|
115 | (1) |
|
Electronics and Communications Standard Organizations (3.2.3.3) |
|
|
116 | (2) |
|
|
118 | (5) |
|
The Benefits of Using a Layered Model (3.2.4.1) |
|
|
118 | (2) |
|
The OSI Reference Model (3.2.4.2) |
|
|
120 | (1) |
|
The TCP/IP Protocol Model (3.2.4.3) |
|
|
120 | (1) |
|
OSI Model and TCP/IP Model Comparison (3.2.4.4) |
|
|
121 | (2) |
|
Data Transfer in the Network (3.3) |
|
|
123 | (12) |
|
Data Encapsulation (3.3.1) |
|
|
123 | (4) |
|
Message Segmentation (3.3.1.1) |
|
|
123 | (2) |
|
Protocol Data Units (3.3.1.2) |
|
|
125 | (1) |
|
Encapsulation Example (3.3.1.3) |
|
|
126 | (1) |
|
De-encapsulation (3.3.1.4) |
|
|
126 | (1) |
|
|
127 | (9) |
|
Network Addresses (3.3.2.1) |
|
|
127 | (1) |
|
Data Link Addresses (3.3.2.2) |
|
|
128 | (2) |
|
Devices on the Same Network (3.3.2.3) |
|
|
130 | (3) |
|
Devices on a Remote Network (3.3.2.4) |
|
|
133 | (2) |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
Check Your Understanding Questions |
|
|
137 | (4) |
Chapter 4 Network Access |
|
141 | (68) |
|
|
141 | (1) |
|
|
141 | (2) |
|
|
143 | (1) |
|
Physical Layer Protocols (4.1) |
|
|
143 | (12) |
|
Physical Layer Connection (4.1.1) |
|
|
143 | (3) |
|
Types of Connections (4.1.1.1) |
|
|
144 | (1) |
|
Network Interface Cards (4.1.1.2) |
|
|
145 | (1) |
|
Purpose of the Physical Layer (4.1.2) |
|
|
146 | (4) |
|
The Physical Layer (4.1.2.1) |
|
|
147 | (1) |
|
Physical Layer Media (4.1.2.2) |
|
|
148 | (1) |
|
Physical Layer Standards (4.1.2.3) |
|
|
148 | (2) |
|
Physical Layer Characteristics (4.1.3) |
|
|
150 | (5) |
|
|
150 | (2) |
|
|
152 | (1) |
|
|
153 | (1) |
|
Types of Physical Media (4.1.3.4) |
|
|
154 | (1) |
|
|
155 | (24) |
|
|
155 | (8) |
|
Characteristics of Copper Cabling (4.2.1.1) |
|
|
155 | (2) |
|
|
157 | (1) |
|
Unshielded Twisted-Pair Cable (4.2.1.3) |
|
|
158 | (1) |
|
Shielded Twisted-Pair Cable (4.2.1.4) |
|
|
159 | (1) |
|
|
160 | (1) |
|
Copper Media Safety (4.2.1.6) |
|
|
161 | (2) |
|
|
163 | (5) |
|
Properties of UTP Cabling (4.2.2.1) |
|
|
163 | (1) |
|
UTP Cabling Standards (4.2.2.2) |
|
|
164 | (1) |
|
|
165 | (1) |
|
Types of UTP Cable (4.2.2.4) |
|
|
166 | (1) |
|
Testing UTP Cables (4.2.2.5) |
|
|
167 | (1) |
|
Fiber-Optic Cabling (4.2.3) |
|
|
168 | (8) |
|
Properties of Fiber-Optic Cabling (4.2.3.1) |
|
|
168 | (2) |
|
Fiber Media Cable Design (4.2.3.2) |
|
|
170 | (1) |
|
Types of Fiber Media (4.2.3.3) |
|
|
171 | (1) |
|
Fiber-Optic Connectors (4.2.3.4) |
|
|
172 | (2) |
|
Testing Fiber Cables (4.2.3.5) |
|
|
174 | (1) |
|
Fiber versus Copper (4.2.3.6) |
|
|
175 | (1) |
|
|
176 | (3) |
|
Properties of Wireless Media (4.2.4.1) |
|
|
176 | (1) |
|
Types of Wireless Media (4.2.4.2) |
|
|
177 | (1) |
|
|
177 | (2) |
|
Data Link Layer Protocols (4.3) |
|
|
179 | (6) |
|
Purpose of the Data Link Layer (4.3.1) |
|
|
179 | (1) |
|
The Data Link Layer (4.3.1.1) |
|
|
179 | (6) |
|
Data Link Sublayers (4.3.1.2) |
|
|
181 | (1) |
|
Media Access Control (4.3.1.3) |
|
|
182 | (1) |
|
Providing Access to Media (4.3.1.4) |
|
|
182 | (2) |
|
Data Link Layer Standards (4.3.1.5) |
|
|
184 | (1) |
|
Media Access Control (4.4) |
|
|
185 | (18) |
|
|
185 | (2) |
|
Controlling Access to the Media (4.4.1.1) |
|
|
185 | (1) |
|
Physical and Logical Topologies (4.4.1.2) |
|
|
186 | (1) |
|
|
187 | (3) |
|
Common Physical WAN Topologies (4.4.2.1) |
|
|
187 | (1) |
|
Physical Point-to-Point Topology (4.4.2.2) |
|
|
188 | (1) |
|
Logical Point-to-Point Topology (4.4.2.3) |
|
|
189 | (1) |
|
|
190 | (6) |
|
Physical LAN Topologies (4.4.3.1) |
|
|
190 | (1) |
|
Half and Full Duplex (4.4.3.2) |
|
|
191 | (2) |
|
Media Access Control Methods (4.4.3.3) |
|
|
193 | (1) |
|
Contention-Based Access - CSMA/CD (4.4.3.4) |
|
|
194 | (2) |
|
Contention-Based Access - CSMA/CA (4.4.3.5) |
|
|
196 | (1) |
|
|
196 | (8) |
|
|
197 | (1) |
|
|
198 | (1) |
|
Layer 2 Address (4.4.4.4) |
|
|
199 | (2) |
|
LAN and WAN Frames (4.4.4.5) |
|
|
201 | (2) |
|
|
203 | (1) |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
205 | (1) |
|
Check Your Understanding Questions |
|
|
205 | (4) |
Chapter 5 Ethernet |
|
209 | (64) |
|
|
209 | (1) |
|
|
209 | (1) |
|
|
210 | (1) |
|
|
211 | (15) |
|
|
211 | (5) |
|
Ethernet Encapsulation (5.1.1.1) |
|
|
211 | (2) |
|
|
213 | (1) |
|
Ethernet Evolution (5.1.1.3) |
|
|
214 | (1) |
|
Ethernet Frame Fields (5.1.1.4) |
|
|
215 | (1) |
|
Ethernet MAC Addresses (5.1.2) |
|
|
216 | (10) |
|
MAC Address and Hexadecimal (5.1.2.1) |
|
|
216 | (3) |
|
MAC Address: Ethernet Identity (5.1.2.2) |
|
|
219 | (1) |
|
Frame Processing (5.1.2.3) |
|
|
220 | (1) |
|
MAC Address Representations (5.1.2.4) |
|
|
221 | (1) |
|
Unicast MAC Address (5.1.2.5) |
|
|
222 | (1) |
|
Broadcast MAC Address (5.1.2.6) |
|
|
223 | (1) |
|
Multicast MAC Address (5.1.2.7) |
|
|
224 | (2) |
|
|
226 | (21) |
|
The MAC Address Table (5.2.1) |
|
|
226 | (14) |
|
Switch Fundamentals (5.2.1.1) |
|
|
226 | (1) |
|
Learning MAC Addresses (5.2.1.2) |
|
|
227 | (2) |
|
Filtering Frames (5.2.1.3) |
|
|
229 | (2) |
|
MAC Address Tables on Connected Switches (5.2.1.4) |
|
|
231 | (5) |
|
Sending a Frame to the Default Gateway (5.2.1.5) |
|
|
236 | (4) |
|
Switch Forwarding Methods (5.2.2) |
|
|
240 | (4) |
|
Frame Forwarding Methods on Cisco Switches (5.2.2.1) |
|
|
241 | (1) |
|
Cut-Through Switching (5.2.2.2) |
|
|
242 | (1) |
|
Memory Buffering on Switches (5.2.2.3) |
|
|
243 | (1) |
|
Switch Port Settings (5.2.3) |
|
|
244 | (3) |
|
Duplex and Speed Settings (5.2.3.1) |
|
|
244 | (2) |
|
|
246 | (1) |
|
Address Resolution Protocol (5.3) |
|
|
247 | (19) |
|
|
247 | (3) |
|
Destination on Same Network (5.3.1.1) |
|
|
247 | (1) |
|
Destination Remote Network (5.3.1.2) |
|
|
248 | (2) |
|
|
250 | (14) |
|
Introduction to ARP (5.3.2.1) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
252 | (4) |
|
|
256 | (3) |
|
ARP Role in Remote Communication (5.3.2.5) |
|
|
259 | (4) |
|
Removing Entries from an ARP Table (5.3.2.6) |
|
|
263 | (1) |
|
|
263 | (1) |
|
|
264 | (3) |
|
|
264 | (1) |
|
|
265 | (1) |
|
|
266 | (1) |
|
|
267 | (1) |
|
|
267 | (1) |
|
|
267 | (1) |
|
|
267 | (1) |
|
Check Your Understanding Questions |
|
|
268 | (5) |
Chapter 6 Network Layer |
|
273 | (52) |
|
|
273 | (1) |
|
|
273 | (1) |
|
|
274 | (1) |
|
Network Layer Protocols (6.1) |
|
|
275 | (12) |
|
Network Layer in Communications (6.1.1) |
|
|
275 | (2) |
|
The Network Layer (6.1.1.1) |
|
|
275 | (1) |
|
Network Layer Protocols (6.1.1.2) |
|
|
276 | (1) |
|
Characteristics of the IP Protocol (6.1.2) |
|
|
277 | (4) |
|
Encapsulating IP (6.1.2.1) |
|
|
277 | (1) |
|
Characteristics of IP (6.1.2.2) |
|
|
277 | (1) |
|
IP — Connectionless (6.1.2.3) |
|
|
278 | (1) |
|
IP — Best Effort Delivery (6.1.2.4) |
|
|
279 | (1) |
|
IP — Media Independent (6.1.2.5) |
|
|
280 | (1) |
|
|
281 | (2) |
|
IPv4 Packet Header (6.1.3.1) |
|
|
281 | (2) |
|
|
283 | (4) |
|
Limitations of IPv4 (6.1.4.1) |
|
|
283 | (1) |
|
Introducing IPv6 (6.1.4.2) |
|
|
283 | (1) |
|
Encapsulating IPv6 (6.1.4.3) |
|
|
284 | (2) |
|
IPv6 Packet Header (6.1.4.4) |
|
|
286 | (1) |
|
|
287 | (9) |
|
How a Host Routes (6.2.1) |
|
|
287 | (4) |
|
Host Forwarding Decision (6.2.1.1) |
|
|
288 | (1) |
|
Default Gateway (6.2.1.2) |
|
|
289 | (1) |
|
Using the Default Gateway (6.2.1.3) |
|
|
289 | (1) |
|
Host Routing Tables (6.2.1.4) |
|
|
290 | (1) |
|
Router Routing Tables (6.2.2) |
|
|
291 | (5) |
|
Router Packet Forwarding Decision (6.2.2.1) |
|
|
291 | (1) |
|
IPv4 Router Routing Table (6.2.2.2) |
|
|
292 | (1) |
|
Directly Connected Routing Table Entries (6.2.2.4) |
|
|
293 | (1) |
|
Remote Network Routing Table Entries (6.2.2.5) |
|
|
294 | (1) |
|
Next-Hop Address (6.2.2.6) |
|
|
295 | (1) |
|
|
296 | (12) |
|
Anatomy of a Router (6.3.1) |
|
|
296 | (7) |
|
A Router is a Computer (6.3.1.1) |
|
|
296 | (1) |
|
Router CPU and OS (6.3.1.2) |
|
|
297 | (1) |
|
|
297 | (2) |
|
Inside a Router (6.3.1.4) |
|
|
299 | (1) |
|
Connect to a Router (6.3.1.5) |
|
|
300 | (1) |
|
LAN and WAN Interfaces (6.3.1.6) |
|
|
301 | (2) |
|
|
303 | (5) |
|
|
303 | (1) |
|
Router Bootup Process (6.3.2.2) |
|
|
304 | (2) |
|
Show Version Output (6.3.2.4) |
|
|
306 | (2) |
|
Configure a Cisco Router (6.4) |
|
|
308 | (11) |
|
Configure Initial Settings (6.4.1) |
|
|
308 | (4) |
|
Basic Switch Configuration Steps (6.4.1.1) |
|
|
308 | (2) |
|
Basic Router Configuration Steps (6.4.1.2) |
|
|
310 | (2) |
|
Configure Interfaces (6.4.2) |
|
|
312 | (2) |
|
Configure Router Interfaces (6.4.2.1) |
|
|
312 | (1) |
|
Verify Interface Configuration (6.4.2.2) |
|
|
313 | (1) |
|
Configure the Default Gateway (6.4.3) |
|
|
314 | (6) |
|
Default Gateway for a Host (6.4.3.1) |
|
|
315 | (1) |
|
Default Gateway for a Switch (6.4.3.2) |
|
|
316 | (3) |
|
|
319 | (1) |
|
|
320 | (1) |
|
|
321 | (1) |
|
|
321 | (1) |
|
|
321 | (1) |
|
Check Your Understanding Questions |
|
|
321 | (4) |
Chapter 7 IP Addressing |
|
325 | (78) |
|
|
325 | (1) |
|
|
325 | (2) |
|
|
327 | (1) |
|
IPv4 Network Addresses (7.1) |
|
|
327 | (30) |
|
Binary and Decimal Conversion (71.1) |
|
|
327 | (11) |
|
|
328 | (2) |
|
Positional Notation (71.1.3) |
|
|
330 | (1) |
|
Binary to Decimal Conversion (71.1.4) |
|
|
331 | (3) |
|
Decimal to Binary Conversion (71.1.6) |
|
|
334 | (2) |
|
Decimal to Binary Conversion Examples (71.1.7) |
|
|
336 | (2) |
|
IPv4 Address Structure (7.1.2) |
|
|
338 | (7) |
|
Network and Host Portions (71.2.1) |
|
|
338 | (1) |
|
|
338 | (2) |
|
|
340 | (1) |
|
The Prefix Length (71.2.5) |
|
|
341 | (1) |
|
Network, Host, and Broadcast Addresses (71.2.6) |
|
|
342 | (3) |
|
IPv4 Unicast, Broadcast, and Multicast (7.1.3) |
|
|
345 | (5) |
|
Static IPv4 Address Assignment to a Host (71.3.1) |
|
|
345 | (1) |
|
Dynamic IPv4 Address Assignment to a Host (71.3.2) |
|
|
345 | (1) |
|
IPv4 Communication (71.3.3) |
|
|
346 | (1) |
|
Unicast Transmission (71.3.4) |
|
|
347 | (1) |
|
Broadcast Transmission (71.3.5) |
|
|
348 | (1) |
|
Multicast Transmission (71.3.6) |
|
|
349 | (1) |
|
Types of IPv4 Addresses (71.4) |
|
|
350 | (7) |
|
Public and Private IPv4 Addresses (71.4.1) |
|
|
350 | (2) |
|
Special User IPv4 Addresses (71.4.3) |
|
|
352 | (1) |
|
Legacy Classful Addressing (71.4.4) |
|
|
353 | (2) |
|
Classless Addressing (71.4.6) |
|
|
355 | (1) |
|
Assignment of IP Addresses (71.4.7) |
|
|
356 | (1) |
|
IPv6 Network Addresses (7.2) |
|
|
357 | (31) |
|
|
357 | (3) |
|
The Need for IPv6 (72.1.1) |
|
|
357 | (1) |
|
IPv4 and IPv6 Coexistence (72.1.2) |
|
|
358 | (2) |
|
|
360 | (4) |
|
IPv6 Address Representation (72.2.1) |
|
|
360 | (2) |
|
Rule 1 — Omit Leading Os (72.2.2) |
|
|
362 | (1) |
|
Rule 2 — Omit All 0 Segments (72.2.3) |
|
|
362 | (2) |
|
Types of IPv6 Addresses (7.2.3) |
|
|
364 | (5) |
|
IPv6 Address Types (72.3.1) |
|
|
364 | (1) |
|
IPv6 Prefix Length (72.3.2) |
|
|
365 | (1) |
|
IPv6 Unicast Addresses (72.3.3) |
|
|
365 | (2) |
|
IPv6 Link-Local Unicast Addresses (72.3.4) |
|
|
367 | (2) |
|
IPv6 Unicast Addresses (7.2.4) |
|
|
369 | (16) |
|
Structure of an IPv6 Global Unicast Address (72.4.1) |
|
|
369 | (2) |
|
Static Configuration of a Global Unicast Address (72.4.2) |
|
|
371 | (3) |
|
Dynamic Configuration — SLAAC (72.4.3) |
|
|
374 | (2) |
|
Dynamic Configuration — DHCPv6 (72.4.4) |
|
|
376 | (1) |
|
EUI-64 Process and Randomly Generated (72.4.5) |
|
|
377 | (3) |
|
Dynamic Link-Local Addresses (72.4.6) |
|
|
380 | (1) |
|
Static Link-Local Addresses (72.4.7) |
|
|
381 | (1) |
|
Verifying IPv6 Address Configuration (72.4.8) |
|
|
382 | (3) |
|
IPv6 Multicast Addresses (7.2.5) |
|
|
385 | (3) |
|
Assigned IPv6 Multicast Addresses (72.5.1) |
|
|
385 | (2) |
|
Solicited-Node IPv6 Multicast Addresses (72.5.2) |
|
|
387 | (1) |
|
Connectivity Verification (7.3) |
|
|
388 | (10) |
|
|
388 | (4) |
|
ICMPv4 and ICMPv6 (73.1.1) |
|
|
388 | (1) |
|
ICMPv6 Router Solicitation and Router Advertisement Messages (73.1.2) |
|
|
389 | (3) |
|
Testing and Verification (7.3.2) |
|
|
392 | (7) |
|
Ping — Testing the Local Stack (73.2.1) |
|
|
392 | (2) |
|
Ping — Testing Connectivity to the Local LAN (73.2.2) |
|
|
394 | (1) |
|
Ping — Testing Connectivity to Remote (73.2.3) |
|
|
395 | (1) |
|
Traceroute — Testing the Path (73.2.4) |
|
|
395 | (3) |
|
|
398 | (1) |
|
|
399 | (1) |
|
|
399 | (1) |
|
|
400 | (1) |
|
|
400 | (1) |
|
Check Your Understanding Questions |
|
|
400 | (3) |
Chapter 8 Subnetting IP Networks |
|
403 | (52) |
|
|
403 | (1) |
|
|
403 | (1) |
|
|
404 | (1) |
|
Subnetting an IPv4 Network (8.1) |
|
|
405 | (35) |
|
Network Segmentation (8.1.1) |
|
|
405 | (3) |
|
Broadcast Domains (8.1.1.1) |
|
|
405 | (1) |
|
Problems with Large Broadcast Domains (8.1.1.2) |
|
|
406 | (1) |
|
Reasons for Subnetting (8.1.1.3) |
|
|
407 | (1) |
|
Subnetting an IPv4 Network (8.1.2) |
|
|
408 | (13) |
|
Octet Boundaries (8.1.2.1) |
|
|
408 | (1) |
|
Subnetting on the Octet Boundary (8.1.2.2) |
|
|
409 | (1) |
|
Classless Subnetting (8.1.2.3) |
|
|
410 | (2) |
|
Classless Subnetting Example (8.1.2.6) |
|
|
412 | (2) |
|
Creating 2 Subnets (8.1.2.7) |
|
|
414 | (2) |
|
Subnetting Formulas (8.1.2.9) |
|
|
416 | (2) |
|
Creating 4 Subnets (8.1.2.10) |
|
|
418 | (3) |
|
Subnetting a /16 and /8 Prefix (8.1.3) |
|
|
421 | (6) |
|
Creating Subnets with a /16 prefix (8.1.3.1) |
|
|
421 | (2) |
|
Creating 100 Subnets with a /16 Network (8.1.3.2) |
|
|
423 | (1) |
|
Calculating the Hosts (8.1.3.3) |
|
|
424 | (1) |
|
Creating 1000 Subnets with a /8 Network (8.1.3.5) |
|
|
425 | (2) |
|
Subnetting to Meet Requirements (8.1.4) |
|
|
427 | (5) |
|
Subnetting Based on Host Requirements (8.1.4.1) |
|
|
428 | (1) |
|
Subnetting Based on Network Requirements (8.1.4.2) |
|
|
428 | (1) |
|
Network Requirement Example (8.1.4.3) |
|
|
429 | (3) |
|
Benefits of Variable Length Subnet Masking (8.1.5) |
|
|
432 | (8) |
|
Traditional Subnetting Wastes Addresses (8.1.5.1) |
|
|
432 | (2) |
|
Variable Length Subnet Masks (8.1.5.2) |
|
|
434 | (1) |
|
|
435 | (2) |
|
VLSM in Practice (8.1.5.5) |
|
|
437 | (2) |
|
|
439 | (1) |
|
|
440 | (3) |
|
Structured Design (8.2.1) |
|
|
440 | (3) |
|
IPv4 Network Address Planning (8.2.1.1) |
|
|
440 | (1) |
|
Planning to Address the Network (8.2.1.2) |
|
|
441 | (1) |
|
Assigning Addresses to Devices (8.2.1.3) |
|
|
442 | (1) |
|
Design Considerations for IPv6 (8.3) |
|
|
443 | (6) |
|
Subnetting an IPv6 Network (8.3.1) |
|
|
443 | (7) |
|
The IPv6 Global Unicast Address (8.3.1.1) |
|
|
444 | (1) |
|
Subnetting Using the Subnet ID (8.3.1.2) |
|
|
445 | (1) |
|
IPv6 Subnet Allocation (8.3.1.3) |
|
|
446 | (3) |
|
|
449 | (1) |
|
|
450 | (1) |
|
|
450 | (1) |
|
|
451 | (1) |
|
|
451 | (1) |
|
Check Your Understanding Questions |
|
|
451 | (4) |
Chapter 9 Transport Layer |
|
455 | (46) |
|
|
455 | (1) |
|
|
455 | (1) |
|
|
456 | (1) |
|
Transport Layer Protocols (9.1) |
|
|
457 | (17) |
|
Transportation of Data (9.1.1) |
|
|
457 | (7) |
|
Role of the Transport Layer (9.1.1.1) |
|
|
457 | (1) |
|
Transport Layer Responsibilities (9.1.1.2) |
|
|
458 | (2) |
|
Conversation Multiplexing (9.1.1.3) |
|
|
460 | (1) |
|
Transport Layer Reliability (9.1.1.4) |
|
|
461 | (1) |
|
|
462 | (1) |
|
|
463 | (1) |
|
The Right Transport Layer Protocol for the Right Application (9.1.1.7) |
|
|
463 | (1) |
|
TCP and UDP Overview (9.1.2) |
|
|
464 | (10) |
|
|
465 | (1) |
|
|
466 | (2) |
|
|
468 | (1) |
|
|
468 | (1) |
|
Multiple Separate Conversations (9.1.2.5) |
|
|
469 | (1) |
|
|
470 | (1) |
|
|
471 | (1) |
|
Port Number Groups (9.1.2.8) |
|
|
472 | (1) |
|
The netstat Command (9.1.2.9) |
|
|
473 | (1) |
|
|
474 | (20) |
|
TCP Communication Process (9.2.1) |
|
|
474 | (8) |
|
TCP Server Processes (9.2.1.1) |
|
|
474 | (3) |
|
TCP Connection Establishment (9.2.1.2) |
|
|
477 | (1) |
|
TCP Session Termination (9.2.1.3) |
|
|
478 | (3) |
|
TCP Three-way Handshake Analysis (9.2.1.4) |
|
|
481 | (1) |
|
Reliability and Flow Control (9.2.2) |
|
|
482 | (6) |
|
TCP Reliability — Ordered Delivery (9.2.2.1) |
|
|
482 | (3) |
|
TCP Flow Control — Window Size and Acknowledgements (9.2.2.4) |
|
|
485 | (2) |
|
TCP Flow Control — Congestion Avoidance (9.2.2.5) |
|
|
487 | (1) |
|
UDP Communication (9.2.3) |
|
|
488 | (3) |
|
UDP Low Overhead versus Reliability (9.2.3.1) |
|
|
488 | (1) |
|
UDP Datagram Reassembly (9.2.3.2) |
|
|
489 | (1) |
|
UDP Server Processes and Requests (9.2.3.3) |
|
|
490 | (1) |
|
UDP Client Processes (9.2.3.4) |
|
|
490 | (1) |
|
|
491 | (4) |
|
Applications that Use TCP (9.2.4.1) |
|
|
491 | (1) |
|
Applications that Use UDP (9.2.4.2) |
|
|
492 | (2) |
|
|
494 | (1) |
|
|
495 | (1) |
|
|
496 | (1) |
|
|
496 | (1) |
|
|
496 | (1) |
|
Check Your Understanding Questions |
|
|
496 | (5) |
Chapter 10 Application Layer |
|
501 | (32) |
|
|
501 | (1) |
|
|
501 | (1) |
|
|
502 | (1) |
|
Application Layer Protocols (10.1) |
|
|
502 | (8) |
|
Application, Presentation, and Session (10.1.1) |
|
|
502 | (4) |
|
Application Layer (10.1.1.1) |
|
|
502 | (1) |
|
Presentation and Session Layer (10.1.1.2) |
|
|
503 | (1) |
|
TCP/IP Application Layer Protocols (10.1.1.3) |
|
|
504 | (2) |
|
How Application Protocols Interact with End-User Applications (10.1.2) |
|
|
506 | (4) |
|
Client-Server Model (10.1.2.1) |
|
|
506 | (1) |
|
Peer-to-Peer Networks (10.1.2.2) |
|
|
507 | (1) |
|
Peer-to-Peer Applications (10.1.2.3) |
|
|
507 | (1) |
|
Common P2P Applications (10.1.2.4) |
|
|
508 | (2) |
|
Well-Known Application Layer Protocols and Services (10.2) |
|
|
510 | (19) |
|
Web and Email Protocols (10.2.1) |
|
|
510 | (6) |
|
Hypertext Transfer Protocol and Hypertext Markup Language (10.2.1.1) |
|
|
510 | (2) |
|
HTTP and HTTPS (10.2.1.2) |
|
|
512 | (1) |
|
Email Protocols (10.2.1.3) |
|
|
513 | (1) |
|
SMTP Operation (10.2.1.4) |
|
|
514 | (1) |
|
|
514 | (1) |
|
IMAP Operation (10.2.1.6) |
|
|
515 | (1) |
|
IP Addressing Services (10.2.2) |
|
|
516 | (9) |
|
Domain Name Service (10.2.2.1) |
|
|
516 | (3) |
|
DNS Message Format (10.2.2.2) |
|
|
519 | (1) |
|
|
520 | (1) |
|
The nslookup Command (10.2.2.4) |
|
|
521 | (1) |
|
Dynamic Host Configuration Protocol (10.2.2.5) |
|
|
522 | (2) |
|
DHCP Operation (10.2.2.6) |
|
|
524 | (1) |
|
File Sharing Services (10.2.3) |
|
|
525 | (5) |
|
File Transfer Protocol (10.2.3.1) |
|
|
525 | (2) |
|
Server Message Block (10.2.3.2) |
|
|
527 | (2) |
|
|
529 | (1) |
|
|
530 | (1) |
|
|
530 | (1) |
|
|
530 | (1) |
|
|
531 | (1) |
|
Check Your Understanding Questions |
|
|
531 | (2) |
Chapter 11 Build a Small Network |
|
533 | (80) |
|
|
533 | (1) |
|
|
533 | (1) |
|
|
534 | (1) |
|
|
534 | (13) |
|
Devices in a Small Network (11.1.1) |
|
|
534 | (5) |
|
Small Network Topologies (11.1.1.1) |
|
|
534 | (1) |
|
Device Selection for a Small Network (11.1.1.2) |
|
|
535 | (1) |
|
IP Addressing for a Small Network (11.1.1.3) |
|
|
536 | (1) |
|
Redundancy in a Small Network (11.1.1.4) |
|
|
537 | (2) |
|
Traffic Management (11.1.1.5) |
|
|
539 | (1) |
|
Small Network Applications and Protocols (11.1.2) |
|
|
539 | (5) |
|
Common Applications (11.1.2.1) |
|
|
539 | (2) |
|
Common Protocols (11.1.2.2) |
|
|
541 | (1) |
|
Voice and Video Applications (11.1.2.3) |
|
|
542 | (2) |
|
Scale to Larger Networks (11.1.3) |
|
|
544 | (3) |
|
Small Network Growth (11.1.3.1) |
|
|
544 | (1) |
|
Protocol Analysis (11.1.3.2) |
|
|
544 | (1) |
|
Employee Network Utilization (11.1.3.3) |
|
|
545 | (2) |
|
|
547 | (25) |
|
Security Threats and Vulnerabilities (11.2.1) |
|
|
547 | (3) |
|
Types of Threats (11.2.1.1) |
|
|
547 | (1) |
|
Physical Security (11.2.1.2) |
|
|
548 | (1) |
|
Types of Vulnerabilities (11.2.1.3) |
|
|
548 | (2) |
|
|
550 | (6) |
|
Types of Malware (11.2.2.1) |
|
|
550 | (1) |
|
Reconnaissance Attacks (11.2.2.2) |
|
|
551 | (1) |
|
Access Attacks (11.2.2.3) |
|
|
552 | (2) |
|
Denial of Service Attacks (11.2.2.4) |
|
|
554 | (2) |
|
Network Attack Mitigation (11.2.3) |
|
|
556 | (3) |
|
Backup, Upgrade, Update, and Patch (11.2.3.1) |
|
|
556 | (1) |
|
Authentication, Authorization, and Accounting (11.2.3.2) |
|
|
557 | (1) |
|
|
558 | (1) |
|
Endpoint Security (11.2.3.4) |
|
|
559 | (1) |
|
|
559 | (5) |
|
Device Security Overview (11.2.4.1) |
|
|
559 | (1) |
|
|
560 | (1) |
|
Basic Security Practices (11.2.4.3) |
|
|
561 | (2) |
|
|
563 | (1) |
|
Backup and Restore Configuration Files (11.2.5) |
|
|
564 | (8) |
|
Router File Systems (11.2.5.1) |
|
|
564 | (3) |
|
Switch File Systems (11.2.5.2) |
|
|
567 | (1) |
|
Backing Up and Restoring Using Text Files (11.2.5.3) |
|
|
568 | (1) |
|
Backing up and Restoring TFTP (11.2.5.4) |
|
|
569 | (1) |
|
Using USB Ports on a Cisco Router (11.2.5.5) |
|
|
570 | (1) |
|
Backing Up and Restoring Using a USB (11.2.5.6) |
|
|
570 | (2) |
|
Network Testing and Verification (11.3) |
|
|
572 | (22) |
|
The ping Command (11.3.1) |
|
|
572 | (5) |
|
Interpreting Ping Results (11.3.1.1) |
|
|
573 | (1) |
|
|
574 | (1) |
|
Network Baseline (11.3.1.3) |
|
|
575 | (2) |
|
The traceroute and tracert Command (11.3.2) |
|
|
577 | (4) |
|
Interpreting Trace Messages (11.3.2.1) |
|
|
578 | (1) |
|
Extended traceroute (11.3.2.2) |
|
|
579 | (2) |
|
|
581 | (4) |
|
Common show Commands Revisited (11.3.3.1) |
|
|
581 | (4) |
|
Host and IOS Commands (11.3.4) |
|
|
585 | (7) |
|
The ipconfig Command (11.3.4.1) |
|
|
585 | (2) |
|
The arp Command (11.3.4.2) |
|
|
587 | (1) |
|
The show cdp neighbors Command (11.3.4.3) |
|
|
588 | (3) |
|
The show ip interface brief Command (11.3.4.4) |
|
|
591 | (1) |
|
|
592 | (2) |
|
The debug Command (11.3.5.1) |
|
|
592 | (2) |
|
The terminal monitor Command (11.3.5.2) |
|
|
594 | (1) |
|
Network Troubleshooting (11.4) |
|
|
594 | (12) |
|
Troubleshooting Methodologies (11.4.1) |
|
|
594 | (4) |
|
Basic Troubleshooting Approaches (11.4.1.1) |
|
|
595 | (1) |
|
Resolve or Escalate? (11.4.1.2) |
|
|
596 | (1) |
|
Verify and Monitor Solution (11.4.1.3) |
|
|
596 | (2) |
|
Troubleshoot Cables and Interfaces (11.4.2) |
|
|
598 | (2) |
|
Duplex Operation (11.4.2.1) |
|
|
598 | (1) |
|
Duplex Mismatch (11.4.2.2) |
|
|
599 | (1) |
|
Troubleshooting Scenarios (11.4.3) |
|
|
600 | (8) |
|
IP Addressing Issues on IOS Devices (11.4.3.1) |
|
|
600 | (1) |
|
IP Addressing Issues on End Devices (11.4.3.2) |
|
|
601 | (1) |
|
Default Gateway Issues (11.4.3.3) |
|
|
602 | (2) |
|
Troubleshooting DNS Issues (11.4.3.4) |
|
|
604 | (2) |
|
|
606 | (2) |
|
|
608 | (1) |
|
|
608 | (1) |
|
|
608 | (1) |
|
|
608 | (1) |
|
Check Your Understanding Questions |
|
|
609 | (4) |
Appendix A |
|
613 | (14) |
Glossary |
|
627 | (18) |
Index |
|
645 | |