Muutke küpsiste eelistusi

Introduction to Networks Companion Guide v5.1 [Kõva köide]

  • Formaat: Hardback, 704 pages, kõrgus x laius x paksus: 234x211x32 mm, kaal: 1408 g
  • Sari: Companion Guide
  • Ilmumisaeg: 28-Jul-2016
  • Kirjastus: Cisco Press
  • ISBN-10: 1587133571
  • ISBN-13: 9781587133572
  • Kõva köide
  • Hind: 76,81 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Hardback, 704 pages, kõrgus x laius x paksus: 234x211x32 mm, kaal: 1408 g
  • Sari: Companion Guide
  • Ilmumisaeg: 28-Jul-2016
  • Kirjastus: Cisco Press
  • ISBN-10: 1587133571
  • ISBN-13: 9781587133572

Introduction to Networks Companion Guide is the official supplemental textbook for the Introduction to Networks course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.

 

The course introduces the architecture, structure, functions, components, and models of the Internet and computer networks. The principles of IP addressing and fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. By the end of the course, you will be able to build simple LANs, perform basic configurations for routers and switches, and implement IP addressing schemes.

 

The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.

 

The book’s features help you focus on important concepts to succeed in this course:

  • Chapter Objectives–Review core concepts by answering the focus questions listed at the beginning of each chapter.
  • Key Terms–Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.
  • Glossary–Consult the comprehensive Glossary with more than 195 terms.
  • Summary of Activities and Labs–Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.
  • Check Your Understanding–Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.
Introduction xxiv
Chapter 1 Explore the Network 1(52)
Objectives
1(1)
Key Terms
1(2)
Introduction (1.0.1.1)
3(1)
Globally Connected (1.1)
4(7)
Networking Today (1.1.1)
4(3)
Networks in Our Daily Lives (1.1.1.1)
4(1)
Technology Then and Now (1.1.1.2)
4(1)
No Boundaries (1.1.1.3)
5(1)
Networks Support the Way We Learn (1.1.1.4)
5(1)
Networks Support the Way We Communicate (1.1.1.5)
5(1)
Networks Support the Way We Work (1.1.1.6)
6(1)
Networks Support the Way We Play (1.1.1.7)
7(1)
Providing Resources in a Network (1.1.2)
7(4)
Networks of Many Sizes (1.1.2.1)
8(1)
Clients and Servers (1.1.2.2)
9(1)
Peer-to-Peer (1.1.2.3)
10(1)
LANs, WANs, and the Internet (1.2)
11(17)
Network Components (1.2.1)
11(9)
Overview of Network Components (1.2.1.1)
12(1)
End Devices (1.2.1.2)
13(1)
Intermediary Network Devices (1.2.1.3)
14(1)
Network Media (1.2.1.4)
15(2)
Network Representations (1.2.1.5)
17(2)
Topology Diagrams (1.2.1.6)
19(1)
LANs and WANs (1.2.2)
20(3)
Types of Networks (1.2.2.1)
20(2)
Local Area Networks (1.2.2.2)
22(1)
Wide Area Networks (1.2.2.3)
22(1)
The Internet, Intranets, and Extranets (1.2.3)
23(2)
The Internet (1.2.3.1)
23(1)
Intranets and Extranets (1.2.3.2)
24(1)
Internet Connections (1.2.4)
25(3)
Internet Access Technologies (1.2.4.1)
26(1)
Home and Small Office Internet Connections (1.2.4.2)
26(1)
Businesses Internet Connections (1.2.4.3)
27(1)
The Network as a Platform (1.3)
28(7)
Converged Networks (1.3.1)
28(2)
Traditional Separate Networks (1.3.1.1)
29(1)
The Converging Network (1.3.1.2)
29(1)
Reliable Network (1.3.2)
30(5)
Network Architecture (1.3.2.1)
30(1)
Fault Tolerance (1.3.2.2)
31(1)
Scalability (1.3.2.3)
32(1)
Quality of Service (1.3.2.4)
32(1)
Security (1.3.2.5)
33(2)
The Changing Network Environment (1.4)
35(12)
Network Trends (1.4.1)
35(4)
New Trends (1.4.1.1)
35(1)
Bring Your Own Device (1.4.1.2)
35(1)
Online Collaboration (1.4.1.3)
36(1)
Video Communication (1.4.1.4)
37(1)
Cloud Computing (1.4.1.5)
37(2)
Networking Technologies for the Home (1.4.2)
39(3)
Technology Trends in the Home (1.4.2.1)
39(1)
Powerline Networking (1.4.2.2)
40(1)
Wireless Broadband (1.4.2.3)
41(1)
Network Security (1.4.3)
42(2)
Security Threats (1.4.3.1)
42(1)
Security Solutions (1.4.3.2)
43(1)
Network Architecture (1.4.4)
44(4)
Cisco Network Architecture (1.4.4.1)
44(1)
CCNA (1.4.4.2)
45(2)
Summary (1.5)
47(1)
Warriors of the Net (1.5.1.2)
47(1)
Conclusion (1.5.1.3)
47(1)
Practice
48(1)
Class Activities
48(1)
Labs
49(1)
Packet Tracer Activities
49(1)
Check Your Understanding Questions
49(4)
Chapter 2 Configure a Network Operating System 53(38)
Objectives
53(1)
Key Terms
53(1)
Introduction (2.0.1.1)
54(1)
IOS Bootcamp (2.1)
54(14)
Cisco IOS (2.1.1)
55(3)
Operating Systems (2.1.1.1)
55(2)
Purpose of OS (2.1.1.2)
57(1)
Cisco IOS Access (2.1.2)
58(3)
Access Methods (2.1.2.1)
58(1)
Terminal Emulation Programs (2.1.2.2)
59(2)
Navigate the IOS (2.1.3)
61(3)
Cisco IOS Modes of Operation (2.1.3.1)
61(1)
Primary Command Modes (2.1.3.2)
61(1)
Configuration Command Modes (2.1.3.3)
62(1)
Navigate Between IOS Modes (2.1.3.4)
62(2)
The Command Structure (2.1.4)
64(4)
Basic IOS Command Structure (2.1.4.1)
64(1)
IOS Command Syntax (2.1.4.2)
64(1)
IOS Help Features (2.1.4.3)
65(1)
Hotkeys and Shortcuts (2.1.4.4)
66(2)
Basic Device Configuration (2.2)
68(10)
Hostnames (2.2.1)
68(2)
Device Names (2.2.1.1)
68(1)
Configure Hostnames (2.2.1.2)
69(1)
Limit Access to Device Configurations (2.2.2)
70(2)
Secure Device Access (2.2.2.1)
70(1)
Configure Passwords (2.2.2.2)
71(1)
Encrypt Passwords (2.2.2.3)
72(1)
Banner Messages (2.2.2.4)
72(1)
Save Configurations (2.2.3)
72(6)
Save the Running Configuration File (2.2.3.1)
73(1)
Alter the Running Configuration (2.2.3.2)
74(1)
Capture Configuration to a Text File (2.2.3.3)
74(4)
Address Schemes (2.3)
78(7)
Ports and Addresses (2.3.1)
78(3)
IP Addresses (2.3.1.1)
78(1)
Interfaces and Ports (2.3.1.2)
79(2)
Configure IP Addressing (2.3.2)
81(7)
Manual IP Address Configuration for End Devices (2.3.2.1)
81(2)
Automatic IP Address Configuration for End Devices (2.3.2.2)
83(2)
Switch Virtual Interface Configuration (2.3.2.3)
85(1)
Verifying Connectivity (2.3.3)
85(2)
Interface Addressing Verification (2.3.3.1)
85(1)
End-to-End Connectivity Test (2.3.3.2)
86(1)
Summary (2.4)
87(1)
Practice
88(1)
Class Activities
88(1)
Labs
88(1)
Packet Tracer Activities
88(1)
Check Your Understanding Questions
89(2)
Chapter 3 Network Protocols and Communications 91(50)
Objectives
91(1)
Key Terms
91(1)
Introduction (3.0)
92(1)
Rules of Communication (3.1)
92(8)
The Rules (3.1.1)
93(7)
Communication Fundamentals (3.1.1.1)
93(1)
Rule Establishment (3.1.1.2)
94(1)
Message Encoding (3.1.1.3)
94(2)
Message Formatting and Encapsulation (3.1.1.4)
96(1)
Message Size (3.1.1.5)
97(1)
Message Timing (3.1.1.6)
98(1)
Message Delivery Options (3.1.1.7)
98(2)
Network Protocols and Standards (3.2)
100(23)
Protocols (3.2.1)
100(5)
Rules that Govern Communications (3.2.1.1)
100(1)
Network Protocols (3.2.1.2)
101(2)
Protocol Interaction (3.2.1.3)
103(2)
Protocol Suites (3.2.2)
105(9)
Protocol Suites and Industry Standards (3.2.2.1)
105(1)
Development of TCP/IP (3.2.2.2)
106(1)
TCP/IP Protocol Suite (3.2.2.3)
106(3)
TCP/IP Communication Process (3.2.2.4)
109(5)
Standard Organizations (3.2.3)
114(4)
Open Standards (3.2.3.1)
114(1)
Internet Standards (3.2.3.2)
115(1)
Electronics and Communications Standard Organizations (3.2.3.3)
116(2)
Reference Models (3.2.4)
118(5)
The Benefits of Using a Layered Model (3.2.4.1)
118(2)
The OSI Reference Model (3.2.4.2)
120(1)
The TCP/IP Protocol Model (3.2.4.3)
120(1)
OSI Model and TCP/IP Model Comparison (3.2.4.4)
121(2)
Data Transfer in the Network (3.3)
123(12)
Data Encapsulation (3.3.1)
123(4)
Message Segmentation (3.3.1.1)
123(2)
Protocol Data Units (3.3.1.2)
125(1)
Encapsulation Example (3.3.1.3)
126(1)
De-encapsulation (3.3.1.4)
126(1)
Data Access (3.3.2)
127(9)
Network Addresses (3.3.2.1)
127(1)
Data Link Addresses (3.3.2.2)
128(2)
Devices on the Same Network (3.3.2.3)
130(3)
Devices on a Remote Network (3.3.2.4)
133(2)
Summary (3.4)
135(1)
Practice
136(1)
Class Activities
136(1)
Labs
136(1)
Packet Tracer Activities
136(1)
Check Your Understanding Questions
137(4)
Chapter 4 Network Access 141(68)
Objectives
141(1)
Key Terms
141(2)
Introduction (4.0)
143(1)
Physical Layer Protocols (4.1)
143(12)
Physical Layer Connection (4.1.1)
143(3)
Types of Connections (4.1.1.1)
144(1)
Network Interface Cards (4.1.1.2)
145(1)
Purpose of the Physical Layer (4.1.2)
146(4)
The Physical Layer (4.1.2.1)
147(1)
Physical Layer Media (4.1.2.2)
148(1)
Physical Layer Standards (4.1.2.3)
148(2)
Physical Layer Characteristics (4.1.3)
150(5)
Functions (4.1.3.1)
150(2)
Bandwidth (4.1.3.2)
152(1)
Throughput (4.1.3.3)
153(1)
Types of Physical Media (4.1.3.4)
154(1)
Network Media (4.2)
155(24)
Copper Cabling (4.2.1)
155(8)
Characteristics of Copper Cabling (4.2.1.1)
155(2)
Copper Media (4.2.1.2)
157(1)
Unshielded Twisted-Pair Cable (4.2.1.3)
158(1)
Shielded Twisted-Pair Cable (4.2.1.4)
159(1)
Coaxial Cable (4.2.1.5)
160(1)
Copper Media Safety (4.2.1.6)
161(2)
UTP Cabling (4.2.2)
163(5)
Properties of UTP Cabling (4.2.2.1)
163(1)
UTP Cabling Standards (4.2.2.2)
164(1)
UTP Connectors (4.2.2.3)
165(1)
Types of UTP Cable (4.2.2.4)
166(1)
Testing UTP Cables (4.2.2.5)
167(1)
Fiber-Optic Cabling (4.2.3)
168(8)
Properties of Fiber-Optic Cabling (4.2.3.1)
168(2)
Fiber Media Cable Design (4.2.3.2)
170(1)
Types of Fiber Media (4.2.3.3)
171(1)
Fiber-Optic Connectors (4.2.3.4)
172(2)
Testing Fiber Cables (4.2.3.5)
174(1)
Fiber versus Copper (4.2.3.6)
175(1)
Wireless Media (4.2.4)
176(3)
Properties of Wireless Media (4.2.4.1)
176(1)
Types of Wireless Media (4.2.4.2)
177(1)
Wireless LAN (4.2.4.3)
177(2)
Data Link Layer Protocols (4.3)
179(6)
Purpose of the Data Link Layer (4.3.1)
179(1)
The Data Link Layer (4.3.1.1)
179(6)
Data Link Sublayers (4.3.1.2)
181(1)
Media Access Control (4.3.1.3)
182(1)
Providing Access to Media (4.3.1.4)
182(2)
Data Link Layer Standards (4.3.1.5)
184(1)
Media Access Control (4.4)
185(18)
Topologies (4.4.1)
185(2)
Controlling Access to the Media (4.4.1.1)
185(1)
Physical and Logical Topologies (4.4.1.2)
186(1)
WAN Topologies (4.4.2)
187(3)
Common Physical WAN Topologies (4.4.2.1)
187(1)
Physical Point-to-Point Topology (4.4.2.2)
188(1)
Logical Point-to-Point Topology (4.4.2.3)
189(1)
LAN Topologies (4.4.3)
190(6)
Physical LAN Topologies (4.4.3.1)
190(1)
Half and Full Duplex (4.4.3.2)
191(2)
Media Access Control Methods (4.4.3.3)
193(1)
Contention-Based Access - CSMA/CD (4.4.3.4)
194(2)
Contention-Based Access - CSMA/CA (4.4.3.5)
196(1)
Data Link Frame (4.4.4)
196(8)
The Frame (4.4.4.1)
197(1)
Frame Fields (4.4.4.2)
198(1)
Layer 2 Address (4.4.4.4)
199(2)
LAN and WAN Frames (4.4.4.5)
201(2)
Summary (4.5)
203(1)
Practice
204(1)
Class Activities
204(1)
Labs
204(1)
Packet Tracer Activities
205(1)
Check Your Understanding Questions
205(4)
Chapter 5 Ethernet 209(64)
Objectives
209(1)
Key Terms
209(1)
Introduction (5.0)
210(1)
Ethernet Protocol (5.1)
211(15)
Ethernet Frame (5.1.1)
211(5)
Ethernet Encapsulation (5.1.1.1)
211(2)
MAC Sublayer (5.1.1.2)
213(1)
Ethernet Evolution (5.1.1.3)
214(1)
Ethernet Frame Fields (5.1.1.4)
215(1)
Ethernet MAC Addresses (5.1.2)
216(10)
MAC Address and Hexadecimal (5.1.2.1)
216(3)
MAC Address: Ethernet Identity (5.1.2.2)
219(1)
Frame Processing (5.1.2.3)
220(1)
MAC Address Representations (5.1.2.4)
221(1)
Unicast MAC Address (5.1.2.5)
222(1)
Broadcast MAC Address (5.1.2.6)
223(1)
Multicast MAC Address (5.1.2.7)
224(2)
LAN Switches (5.2)
226(21)
The MAC Address Table (5.2.1)
226(14)
Switch Fundamentals (5.2.1.1)
226(1)
Learning MAC Addresses (5.2.1.2)
227(2)
Filtering Frames (5.2.1.3)
229(2)
MAC Address Tables on Connected Switches (5.2.1.4)
231(5)
Sending a Frame to the Default Gateway (5.2.1.5)
236(4)
Switch Forwarding Methods (5.2.2)
240(4)
Frame Forwarding Methods on Cisco Switches (5.2.2.1)
241(1)
Cut-Through Switching (5.2.2.2)
242(1)
Memory Buffering on Switches (5.2.2.3)
243(1)
Switch Port Settings (5.2.3)
244(3)
Duplex and Speed Settings (5.2.3.1)
244(2)
Auto-MDIX (5.2.3.2)
246(1)
Address Resolution Protocol (5.3)
247(19)
MAC and IP (5.3.1)
247(3)
Destination on Same Network (5.3.1.1)
247(1)
Destination Remote Network (5.3.1.2)
248(2)
ARP (5.3.2)
250(14)
Introduction to ARP (5.3.2.1)
250(1)
ARP Functions (5.3.2.2)
251(1)
ARP Request (5.3.2.3)
252(4)
ARP Reply (5.3.2.4)
256(3)
ARP Role in Remote Communication (5.3.2.5)
259(4)
Removing Entries from an ARP Table (5.3.2.6)
263(1)
ARP Tables (5.3.2.7)
263(1)
ARP Issues (5.3.3)
264(3)
ARP Broadcasts (5.3.3.1)
264(1)
ARP Spoofing (5.3.3.2)
265(1)
Summary (5.4)
266(1)
Practice
267(1)
Class Activities
267(1)
Labs
267(1)
Packet Tracer Activities
267(1)
Check Your Understanding Questions
268(5)
Chapter 6 Network Layer 273(52)
Objectives
273(1)
Key Terms
273(1)
Introduction (6.0)
274(1)
Network Layer Protocols (6.1)
275(12)
Network Layer in Communications (6.1.1)
275(2)
The Network Layer (6.1.1.1)
275(1)
Network Layer Protocols (6.1.1.2)
276(1)
Characteristics of the IP Protocol (6.1.2)
277(4)
Encapsulating IP (6.1.2.1)
277(1)
Characteristics of IP (6.1.2.2)
277(1)
IP — Connectionless (6.1.2.3)
278(1)
IP — Best Effort Delivery (6.1.2.4)
279(1)
IP — Media Independent (6.1.2.5)
280(1)
IPv4 Packet (6.1.3)
281(2)
IPv4 Packet Header (6.1.3.1)
281(2)
IPv6 Packet (6.1.4)
283(4)
Limitations of IPv4 (6.1.4.1)
283(1)
Introducing IPv6 (6.1.4.2)
283(1)
Encapsulating IPv6 (6.1.4.3)
284(2)
IPv6 Packet Header (6.1.4.4)
286(1)
Routing (6.2)
287(9)
How a Host Routes (6.2.1)
287(4)
Host Forwarding Decision (6.2.1.1)
288(1)
Default Gateway (6.2.1.2)
289(1)
Using the Default Gateway (6.2.1.3)
289(1)
Host Routing Tables (6.2.1.4)
290(1)
Router Routing Tables (6.2.2)
291(5)
Router Packet Forwarding Decision (6.2.2.1)
291(1)
IPv4 Router Routing Table (6.2.2.2)
292(1)
Directly Connected Routing Table Entries (6.2.2.4)
293(1)
Remote Network Routing Table Entries (6.2.2.5)
294(1)
Next-Hop Address (6.2.2.6)
295(1)
Routers (6.3)
296(12)
Anatomy of a Router (6.3.1)
296(7)
A Router is a Computer (6.3.1.1)
296(1)
Router CPU and OS (6.3.1.2)
297(1)
Router Memory (6.3.1.3)
297(2)
Inside a Router (6.3.1.4)
299(1)
Connect to a Router (6.3.1.5)
300(1)
LAN and WAN Interfaces (6.3.1.6)
301(2)
Router Boot-up (6.3.2)
303(5)
Bootset Files (6.3.2.1)
303(1)
Router Bootup Process (6.3.2.2)
304(2)
Show Version Output (6.3.2.4)
306(2)
Configure a Cisco Router (6.4)
308(11)
Configure Initial Settings (6.4.1)
308(4)
Basic Switch Configuration Steps (6.4.1.1)
308(2)
Basic Router Configuration Steps (6.4.1.2)
310(2)
Configure Interfaces (6.4.2)
312(2)
Configure Router Interfaces (6.4.2.1)
312(1)
Verify Interface Configuration (6.4.2.2)
313(1)
Configure the Default Gateway (6.4.3)
314(6)
Default Gateway for a Host (6.4.3.1)
315(1)
Default Gateway for a Switch (6.4.3.2)
316(3)
Summary (6.5)
319(1)
Practice
320(1)
Class Activities
321(1)
Labs
321(1)
Packet Tracer Activities
321(1)
Check Your Understanding Questions
321(4)
Chapter 7 IP Addressing 325(78)
Objectives
325(1)
Key Terms
325(2)
Introduction (7.0)
327(1)
IPv4 Network Addresses (7.1)
327(30)
Binary and Decimal Conversion (71.1)
327(11)
IPv4 Addresses (71.1.1)
328(2)
Positional Notation (71.1.3)
330(1)
Binary to Decimal Conversion (71.1.4)
331(3)
Decimal to Binary Conversion (71.1.6)
334(2)
Decimal to Binary Conversion Examples (71.1.7)
336(2)
IPv4 Address Structure (7.1.2)
338(7)
Network and Host Portions (71.2.1)
338(1)
The Subnet Mask (71.2.2)
338(2)
Logical AND (71.2.3)
340(1)
The Prefix Length (71.2.5)
341(1)
Network, Host, and Broadcast Addresses (71.2.6)
342(3)
IPv4 Unicast, Broadcast, and Multicast (7.1.3)
345(5)
Static IPv4 Address Assignment to a Host (71.3.1)
345(1)
Dynamic IPv4 Address Assignment to a Host (71.3.2)
345(1)
IPv4 Communication (71.3.3)
346(1)
Unicast Transmission (71.3.4)
347(1)
Broadcast Transmission (71.3.5)
348(1)
Multicast Transmission (71.3.6)
349(1)
Types of IPv4 Addresses (71.4)
350(7)
Public and Private IPv4 Addresses (71.4.1)
350(2)
Special User IPv4 Addresses (71.4.3)
352(1)
Legacy Classful Addressing (71.4.4)
353(2)
Classless Addressing (71.4.6)
355(1)
Assignment of IP Addresses (71.4.7)
356(1)
IPv6 Network Addresses (7.2)
357(31)
IPv4 Issues (7.2.1)
357(3)
The Need for IPv6 (72.1.1)
357(1)
IPv4 and IPv6 Coexistence (72.1.2)
358(2)
IPv6 Addressing (7.2.2)
360(4)
IPv6 Address Representation (72.2.1)
360(2)
Rule 1 — Omit Leading Os (72.2.2)
362(1)
Rule 2 — Omit All 0 Segments (72.2.3)
362(2)
Types of IPv6 Addresses (7.2.3)
364(5)
IPv6 Address Types (72.3.1)
364(1)
IPv6 Prefix Length (72.3.2)
365(1)
IPv6 Unicast Addresses (72.3.3)
365(2)
IPv6 Link-Local Unicast Addresses (72.3.4)
367(2)
IPv6 Unicast Addresses (7.2.4)
369(16)
Structure of an IPv6 Global Unicast Address (72.4.1)
369(2)
Static Configuration of a Global Unicast Address (72.4.2)
371(3)
Dynamic Configuration — SLAAC (72.4.3)
374(2)
Dynamic Configuration — DHCPv6 (72.4.4)
376(1)
EUI-64 Process and Randomly Generated (72.4.5)
377(3)
Dynamic Link-Local Addresses (72.4.6)
380(1)
Static Link-Local Addresses (72.4.7)
381(1)
Verifying IPv6 Address Configuration (72.4.8)
382(3)
IPv6 Multicast Addresses (7.2.5)
385(3)
Assigned IPv6 Multicast Addresses (72.5.1)
385(2)
Solicited-Node IPv6 Multicast Addresses (72.5.2)
387(1)
Connectivity Verification (7.3)
388(10)
ICMP (7.3.1)
388(4)
ICMPv4 and ICMPv6 (73.1.1)
388(1)
ICMPv6 Router Solicitation and Router Advertisement Messages (73.1.2)
389(3)
Testing and Verification (7.3.2)
392(7)
Ping — Testing the Local Stack (73.2.1)
392(2)
Ping — Testing Connectivity to the Local LAN (73.2.2)
394(1)
Ping — Testing Connectivity to Remote (73.2.3)
395(1)
Traceroute — Testing the Path (73.2.4)
395(3)
Summary (7.4)
398(1)
Practice
399(1)
Class Activities
399(1)
Labs
400(1)
Packet Tracer Activities
400(1)
Check Your Understanding Questions
400(3)
Chapter 8 Subnetting IP Networks 403(52)
Objectives
403(1)
Key Terms
403(1)
Introduction (8.0)
404(1)
Subnetting an IPv4 Network (8.1)
405(35)
Network Segmentation (8.1.1)
405(3)
Broadcast Domains (8.1.1.1)
405(1)
Problems with Large Broadcast Domains (8.1.1.2)
406(1)
Reasons for Subnetting (8.1.1.3)
407(1)
Subnetting an IPv4 Network (8.1.2)
408(13)
Octet Boundaries (8.1.2.1)
408(1)
Subnetting on the Octet Boundary (8.1.2.2)
409(1)
Classless Subnetting (8.1.2.3)
410(2)
Classless Subnetting Example (8.1.2.6)
412(2)
Creating 2 Subnets (8.1.2.7)
414(2)
Subnetting Formulas (8.1.2.9)
416(2)
Creating 4 Subnets (8.1.2.10)
418(3)
Subnetting a /16 and /8 Prefix (8.1.3)
421(6)
Creating Subnets with a /16 prefix (8.1.3.1)
421(2)
Creating 100 Subnets with a /16 Network (8.1.3.2)
423(1)
Calculating the Hosts (8.1.3.3)
424(1)
Creating 1000 Subnets with a /8 Network (8.1.3.5)
425(2)
Subnetting to Meet Requirements (8.1.4)
427(5)
Subnetting Based on Host Requirements (8.1.4.1)
428(1)
Subnetting Based on Network Requirements (8.1.4.2)
428(1)
Network Requirement Example (8.1.4.3)
429(3)
Benefits of Variable Length Subnet Masking (8.1.5)
432(8)
Traditional Subnetting Wastes Addresses (8.1.5.1)
432(2)
Variable Length Subnet Masks (8.1.5.2)
434(1)
Basic VLSM (8.1.5.3)
435(2)
VLSM in Practice (8.1.5.5)
437(2)
VLSM Chart (8.1.5.6)
439(1)
Addressing Schemes (8.2)
440(3)
Structured Design (8.2.1)
440(3)
IPv4 Network Address Planning (8.2.1.1)
440(1)
Planning to Address the Network (8.2.1.2)
441(1)
Assigning Addresses to Devices (8.2.1.3)
442(1)
Design Considerations for IPv6 (8.3)
443(6)
Subnetting an IPv6 Network (8.3.1)
443(7)
The IPv6 Global Unicast Address (8.3.1.1)
444(1)
Subnetting Using the Subnet ID (8.3.1.2)
445(1)
IPv6 Subnet Allocation (8.3.1.3)
446(3)
Summary (8.4)
449(1)
Practice
450(1)
Class Activities
450(1)
Labs
451(1)
Packet Tracer Activities
451(1)
Check Your Understanding Questions
451(4)
Chapter 9 Transport Layer 455(46)
Objectives
455(1)
Key Terms
455(1)
Introduction (9.0)
456(1)
Transport Layer Protocols (9.1)
457(17)
Transportation of Data (9.1.1)
457(7)
Role of the Transport Layer (9.1.1.1)
457(1)
Transport Layer Responsibilities (9.1.1.2)
458(2)
Conversation Multiplexing (9.1.1.3)
460(1)
Transport Layer Reliability (9.1.1.4)
461(1)
TCP (9.1.1.5)
462(1)
UDP (9.1.1.6)
463(1)
The Right Transport Layer Protocol for the Right Application (9.1.1.7)
463(1)
TCP and UDP Overview (9.1.2)
464(10)
TCP Features (9.1.2.1)
465(1)
TCP Header (9.1.2.2)
466(2)
UDP Features (9.1.2.3)
468(1)
UDP Header (9.1.2.4)
468(1)
Multiple Separate Conversations (9.1.2.5)
469(1)
Port Numbers (9.1.2.6)
470(1)
Socket Pairs (9.1.2.7)
471(1)
Port Number Groups (9.1.2.8)
472(1)
The netstat Command (9.1.2.9)
473(1)
TCP and UDP (9.2)
474(20)
TCP Communication Process (9.2.1)
474(8)
TCP Server Processes (9.2.1.1)
474(3)
TCP Connection Establishment (9.2.1.2)
477(1)
TCP Session Termination (9.2.1.3)
478(3)
TCP Three-way Handshake Analysis (9.2.1.4)
481(1)
Reliability and Flow Control (9.2.2)
482(6)
TCP Reliability — Ordered Delivery (9.2.2.1)
482(3)
TCP Flow Control — Window Size and Acknowledgements (9.2.2.4)
485(2)
TCP Flow Control — Congestion Avoidance (9.2.2.5)
487(1)
UDP Communication (9.2.3)
488(3)
UDP Low Overhead versus Reliability (9.2.3.1)
488(1)
UDP Datagram Reassembly (9.2.3.2)
489(1)
UDP Server Processes and Requests (9.2.3.3)
490(1)
UDP Client Processes (9.2.3.4)
490(1)
TCP or UDP (9.2.4)
491(4)
Applications that Use TCP (9.2.4.1)
491(1)
Applications that Use UDP (9.2.4.2)
492(2)
Summary (9.3)
494(1)
Practice
495(1)
Class Activities
496(1)
Labs
496(1)
Packet Tracer Activities
496(1)
Check Your Understanding Questions
496(5)
Chapter 10 Application Layer 501(32)
Objectives
501(1)
Key Terms
501(1)
Introduction (10.0)
502(1)
Application Layer Protocols (10.1)
502(8)
Application, Presentation, and Session (10.1.1)
502(4)
Application Layer (10.1.1.1)
502(1)
Presentation and Session Layer (10.1.1.2)
503(1)
TCP/IP Application Layer Protocols (10.1.1.3)
504(2)
How Application Protocols Interact with End-User Applications (10.1.2)
506(4)
Client-Server Model (10.1.2.1)
506(1)
Peer-to-Peer Networks (10.1.2.2)
507(1)
Peer-to-Peer Applications (10.1.2.3)
507(1)
Common P2P Applications (10.1.2.4)
508(2)
Well-Known Application Layer Protocols and Services (10.2)
510(19)
Web and Email Protocols (10.2.1)
510(6)
Hypertext Transfer Protocol and Hypertext Markup Language (10.2.1.1)
510(2)
HTTP and HTTPS (10.2.1.2)
512(1)
Email Protocols (10.2.1.3)
513(1)
SMTP Operation (10.2.1.4)
514(1)
POP Operation (10.2.1.5)
514(1)
IMAP Operation (10.2.1.6)
515(1)
IP Addressing Services (10.2.2)
516(9)
Domain Name Service (10.2.2.1)
516(3)
DNS Message Format (10.2.2.2)
519(1)
DNS Hierarchy (10.2.2.3)
520(1)
The nslookup Command (10.2.2.4)
521(1)
Dynamic Host Configuration Protocol (10.2.2.5)
522(2)
DHCP Operation (10.2.2.6)
524(1)
File Sharing Services (10.2.3)
525(5)
File Transfer Protocol (10.2.3.1)
525(2)
Server Message Block (10.2.3.2)
527(2)
Summary (10.3)
529(1)
Practice
530(1)
Class Activities
530(1)
Labs
530(1)
Packet Tracer Activities
531(1)
Check Your Understanding Questions
531(2)
Chapter 11 Build a Small Network 533(80)
Objectives
533(1)
Key Terms
533(1)
Introduction (11.0)
534(1)
Network Design (11.1)
534(13)
Devices in a Small Network (11.1.1)
534(5)
Small Network Topologies (11.1.1.1)
534(1)
Device Selection for a Small Network (11.1.1.2)
535(1)
IP Addressing for a Small Network (11.1.1.3)
536(1)
Redundancy in a Small Network (11.1.1.4)
537(2)
Traffic Management (11.1.1.5)
539(1)
Small Network Applications and Protocols (11.1.2)
539(5)
Common Applications (11.1.2.1)
539(2)
Common Protocols (11.1.2.2)
541(1)
Voice and Video Applications (11.1.2.3)
542(2)
Scale to Larger Networks (11.1.3)
544(3)
Small Network Growth (11.1.3.1)
544(1)
Protocol Analysis (11.1.3.2)
544(1)
Employee Network Utilization (11.1.3.3)
545(2)
Network Security (11.2)
547(25)
Security Threats and Vulnerabilities (11.2.1)
547(3)
Types of Threats (11.2.1.1)
547(1)
Physical Security (11.2.1.2)
548(1)
Types of Vulnerabilities (11.2.1.3)
548(2)
Network Attacks (11.2.2)
550(6)
Types of Malware (11.2.2.1)
550(1)
Reconnaissance Attacks (11.2.2.2)
551(1)
Access Attacks (11.2.2.3)
552(2)
Denial of Service Attacks (11.2.2.4)
554(2)
Network Attack Mitigation (11.2.3)
556(3)
Backup, Upgrade, Update, and Patch (11.2.3.1)
556(1)
Authentication, Authorization, and Accounting (11.2.3.2)
557(1)
Firewalls (11.2.3.3)
558(1)
Endpoint Security (11.2.3.4)
559(1)
Device Security (11.2.4)
559(5)
Device Security Overview (11.2.4.1)
559(1)
Passwords (11.2.4.2)
560(1)
Basic Security Practices (11.2.4.3)
561(2)
Enable SSH (11.2.4.4)
563(1)
Backup and Restore Configuration Files (11.2.5)
564(8)
Router File Systems (11.2.5.1)
564(3)
Switch File Systems (11.2.5.2)
567(1)
Backing Up and Restoring Using Text Files (11.2.5.3)
568(1)
Backing up and Restoring TFTP (11.2.5.4)
569(1)
Using USB Ports on a Cisco Router (11.2.5.5)
570(1)
Backing Up and Restoring Using a USB (11.2.5.6)
570(2)
Network Testing and Verification (11.3)
572(22)
The ping Command (11.3.1)
572(5)
Interpreting Ping Results (11.3.1.1)
573(1)
Extended Ping (11.3.1.2)
574(1)
Network Baseline (11.3.1.3)
575(2)
The traceroute and tracert Command (11.3.2)
577(4)
Interpreting Trace Messages (11.3.2.1)
578(1)
Extended traceroute (11.3.2.2)
579(2)
Show Commands (11.3.3)
581(4)
Common show Commands Revisited (11.3.3.1)
581(4)
Host and IOS Commands (11.3.4)
585(7)
The ipconfig Command (11.3.4.1)
585(2)
The arp Command (11.3.4.2)
587(1)
The show cdp neighbors Command (11.3.4.3)
588(3)
The show ip interface brief Command (11.3.4.4)
591(1)
Debugging (11.3.5)
592(2)
The debug Command (11.3.5.1)
592(2)
The terminal monitor Command (11.3.5.2)
594(1)
Network Troubleshooting (11.4)
594(12)
Troubleshooting Methodologies (11.4.1)
594(4)
Basic Troubleshooting Approaches (11.4.1.1)
595(1)
Resolve or Escalate? (11.4.1.2)
596(1)
Verify and Monitor Solution (11.4.1.3)
596(2)
Troubleshoot Cables and Interfaces (11.4.2)
598(2)
Duplex Operation (11.4.2.1)
598(1)
Duplex Mismatch (11.4.2.2)
599(1)
Troubleshooting Scenarios (11.4.3)
600(8)
IP Addressing Issues on IOS Devices (11.4.3.1)
600(1)
IP Addressing Issues on End Devices (11.4.3.2)
601(1)
Default Gateway Issues (11.4.3.3)
602(2)
Troubleshooting DNS Issues (11.4.3.4)
604(2)
Summary (11.5)
606(2)
Practice
608(1)
Class Activities
608(1)
Labs
608(1)
Packet Tracer Activities
608(1)
Check Your Understanding Questions
609(4)
Appendix A 613(14)
Glossary 627(18)
Index 645