Muutke küpsiste eelistusi

Introduction to Networks v6 Companion Guide [Multiple-component retail product]

  • Formaat: Multiple-component retail product, 704 pages, kõrgus x laius x paksus: 236x206x33 mm, kaal: 1361 g, Contains 1 Digital product license key and 1 Hardback
  • Sari: Companion Guide
  • Ilmumisaeg: 14-Dec-2016
  • Kirjastus: Cisco Press
  • ISBN-10: 1587133601
  • ISBN-13: 9781587133602
Teised raamatud teemal:
  • Formaat: Multiple-component retail product, 704 pages, kõrgus x laius x paksus: 236x206x33 mm, kaal: 1361 g, Contains 1 Digital product license key and 1 Hardback
  • Sari: Companion Guide
  • Ilmumisaeg: 14-Dec-2016
  • Kirjastus: Cisco Press
  • ISBN-10: 1587133601
  • ISBN-13: 9781587133602
Teised raamatud teemal:
Introduction to Networks Companion Guide v6 is the official supplemental textbook for the Introduction to Networks course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.

The course introduces the architecture, structure, functions, components, and models of the Internet and computer networks. The principles of IP addressing and fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. By the end of the course, you will be able to build simple LANs, perform basic configurations for routers and switches, and implement IP addressing schemes.

The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.

The books features help you focus on important concepts to succeed in this course:





Chapter ObjectivesReview core concepts by answering the focus questions listed at the beginning of each chapter Key TermsRefer to the lists of networking vocabulary introduced and highlighted in context in each chapter. GlossaryConsult the comprehensive Glossary with more than 250 terms. Summary of Activities and LabsMaximize your study time with this complete list of all associated practice exercises at the end of each chapter. Check Your UnderstandingEvaluate your readiness with the end-ofchapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.

How ToLook for this icon to study the steps you need to learn to perform certain tasks.

Interactive ActivitiesReinforce your understanding of topics with dozens of exercises from the online course identified throughout the book with this icon.

VideosWatch the videos embedded within the online course.

Packet Tracer ActivitiesExplore and visualize networking concepts using Packet Tracer. There are 40 exercises interspersed throughout the chapters and provided in the accompanying Labs & Study Guide book.
Introduction xxiv
Chapter 1 Explore the Network 1(52)
Objectives
1(1)
Key Terms
1(2)
Introduction
3(1)
Globally Connected
4(7)
Networking Today
4(3)
Networks in Our Daily Lives
4(1)
Technology Then and Now
4(1)
No Boundaries
5(1)
Networks Support the Way We Learn
5(1)
Networks Support the Way We Communicate
5(1)
Networks Support the Way We Work
6(1)
Networks Support the Way We Play
7(1)
Providing Resources in a Network
7(4)
Networks of Many Sizes
8(1)
Clients and Servers
9(1)
Peer-to-Peer
10(1)
LANs, WANs, and the Internet
11(17)
Network Components
11(9)
Overview of Network Components
12(1)
End Devices
13(1)
Intermediary Network Devices
14(1)
Network Media
15(2)
Network Representations
17(2)
Topology Diagrams
19(1)
LANs and WANs
20(3)
Types of Networks
20(2)
Local Area Networks
22(1)
Wide Area Networks
22(1)
The Internet, Intranets, and Extranets
23(2)
The Internet
23(1)
Intranets and Extranets
24(1)
Internet Connections
25(3)
Internet Access Technologies
26(1)
Home and Small Office Internet Connections
26(1)
Businesses Internet Connections
27(1)
The Network as a Platform
28(7)
Converged Networks
28(2)
Traditional Separate Networks
29(1)
The Converging Network
29(1)
Reliable Network
30(5)
Network Architecture
30(1)
Fault Tolerance
31(1)
Scalability
32(1)
Quality of Service
32(1)
Security
33(2)
The Changing Network Environment
35(12)
Network Trends
35(4)
New Trends
35(1)
Bring Your Own Device
35(1)
Online Collaboration
36(1)
Video Communication
37(1)
Cloud Computing
37(2)
Networking Technologies for the Home
39(3)
Technology Trends in the Home
39(1)
Powerline Networking
40(1)
Wireless Broadband
41(1)
Network Security
42(2)
Security Threats
42(1)
Security Solutions
43(1)
Network Architecture
44(3)
Cisco Network Architecture
44(1)
CCNA
45(2)
Summary
47(1)
Warriors of the Net
47(1)
Conclusion
47(1)
Practice
48(1)
Class Activities
48(1)
Labs
49(1)
Packet Tracer Activities
49(1)
Check Your Understanding Questions
49(4)
Chapter 2 Configure a Network Operating System 53(38)
Objectives
53(1)
Key Terms
53(1)
Introduction
54(1)
IOS Bootcamp
54(14)
Cisco IOS
55(3)
Operating Systems
55(2)
Purpose of OS
57(1)
Cisco IOS Access
58(3)
Access Methods
58(1)
Terminal Emulation Programs
59(2)
Navigate the IOS
61(3)
Cisco IOS Modes of Operation
61(1)
Primary Command Modes
61(1)
Configuration Command Modes
62(43)
Navigate Between
105
Modes
62(2)
The Command Structure
64(4)
Basic IOS Command Structure
64(1)
IOS Command Syntax
64(1)
IOS Help Features
65(1)
Hotkeys and Shortcuts
66(2)
Basic Device Configuration
68(10)
Hostnames
68(2)
Device Names
68(1)
Configure Hostnames
69(1)
Limit Access to Device Configurations
70(2)
Secure Device Access
70(1)
Configure Passwords
71(1)
Encrypt Passwords
72(1)
Banner Messages
72(1)
Save Configurations
72(6)
Save the Running Configuration File
73(1)
Alter the Running Configuration
74(1)
Capture Configuration to a Text File
74(4)
Address Schemes
78(7)
Ports and Addresses
78(3)
IP Addresses
78(1)
Interfaces and Ports
79(2)
Configure IP Addressing
81(4)
Manual IP Address Configuration for End Devices
81(2)
Automatic IP Address Configuration for End Devices
83(2)
Switch Virtual Interface Configuration
85(1)
Verifying Connectivity
85(2)
Interface Addressing Verification
85(1)
End-to-End Connectivity Test
86(1)
Summary
87(1)
Practice
88(1)
Class Activities
88(1)
Labs
88(1)
Packet Tracer Activities
88(1)
Check Your Understanding Questions
89(2)
Chapter 3 Network Protocols and Communications 91(50)
Objectives
91(1)
Key Terms
91(1)
Introduction
92(1)
Rules of Communication
92(8)
The Rules
93(7)
Communication Fundamentals
93(1)
Rule Establishment
94(1)
Message Encoding
94(2)
Message Formatting and Encapsulation
96(1)
Message Size
97(1)
Message Timing
98(1)
Message Delivery Options
98(2)
Network Protocols and Standards
100(23)
Protocols
100(5)
Rules that Govern Communications
100(1)
Network Protocols
101(2)
Protocol Interaction
103(2)
Protocol Suites
105(9)
Protocol Suites and Industry Standards
105(1)
Development of TCP/IP
106(1)
TCP/IP Protocol Suite
106(3)
TCP/IP Communication Process
109(5)
Standard Organizations
114(4)
Open Standards
114(1)
Internet Standards
115(1)
Electronics and Communications Standard Organizations
116(2)
Reference Models
118(5)
The Benefits of Using a Layered Model
118(2)
The OSI Reference Model
120(1)
The TCP/IP Protocol Model
120(1)
OSI Model and TCP/IP Model Comparison
121(2)
Data Transfer in the Network
123(12)
Data Encapsulation
123(4)
Message Segmentation
123(2)
Protocol Data Units
125(1)
Encapsulation Example
126(1)
De-encapsulation
126(1)
Data Access
127(9)
Network Addresses
127(1)
Data Link Addresses
128(2)
Devices on the Same Network
130(3)
Devices on a Remote Network
133(2)
Summary
135(1)
Practice
136(1)
Class Activities
136(1)
Labs
136(1)
Packet Tracer Activities
136(1)
Check Your Understanding Questions
137(4)
Chapter 4 Network Access 141(68)
Objectives
141(1)
Key Terms
141(2)
Introduction
143(1)
Physical Layer Protocols
143(12)
Physical Layer Connection
143(3)
Types of Connections
144(1)
Network Interface Cards
145(1)
Purpose of the Physical Layer
146(4)
The Physical Layer
147(1)
Physical Layer Media
148(1)
Physical Layer Standards
148(2)
Physical Layer Characteristics
150(5)
Functions
150(2)
Bandwidth
152(1)
Throughput
153(1)
Types of Physical Media
154(1)
Network Media
155(24)
Copper Cabling
155(8)
Characteristics of Copper Cabling
155(2)
Copper Media
157(1)
Unshielded Twisted-Pair Cable
158(1)
Shielded Twisted-Pair Cable
159(1)
Coaxial Cable
160(1)
Copper Media Safety
161(2)
UTP Cabling
163(5)
Properties of UTP Cabling
163(1)
UTP Cabling Standards
164(1)
UTP Connectors
165(1)
Types of UTP Cable
166(1)
Testing UTP Cables
167(1)
Fiber-Optic Cabling
168(8)
Properties of Fiber-Optic Cabling
168(2)
Fiber Media Cable Design
170(1)
Types of Fiber Media
171(1)
Fiber-Optic Connectors
172(2)
Testing Fiber Cables
174(1)
Fiber versus Copper
175(1)
Wireless Media
176(3)
Properties of Wireless Media
176(1)
Types of Wireless Media
177(1)
Wireless LAN
177(2)
Data Link Layer Protocols
179(6)
Purpose of the Data Link Layer
179(6)
The Data Link Layer
179(2)
Data Link Sublayers
181(1)
Media Access Control
182(1)
Providing Access to Media
182(2)
Data Link Layer Standards
184(1)
Media Access Control
185(18)
Topologies
185(2)
Controlling Access to the Media
185(1)
Physical and Logical Topologies
186(1)
WAN Topologies
187(3)
Common Physical WAN Topologies
187(1)
Physical Point-to-Point Topology
188(1)
Logical Point-to-Point Topology
189(1)
LAN Topologies
190(6)
Physical LAN Topologies
190(1)
Half and Full Duplex
191(2)
Media Access Control Methods
193(1)
Contention-Based Access - CSMA/CD
194(2)
Contention-Based Access - CSMA/CA
196(1)
Data Link Frame
196(8)
The Frame
197(1)
Frame Fields
198(1)
Layer 2 Address
199(2)
LAN and WAN Frames
201(2)
Summary
203(1)
Practice
204(1)
Class Activities
204(1)
Labs
204(1)
Packet Tracer Activities
205(1)
Check Your Understanding Questions
205(4)
Chapter 5 Ethernet 209(64)
Objectives
209(1)
Key Terms
209(1)
Introduction
210(1)
Ethernet Protocol
211(15)
Ethernet Frame
211(5)
Ethernet Encapsulation
211(2)
MAC Sublayer
213(1)
Ethernet Evolution
214(1)
Ethernet Frame Fields
215(1)
Ethernet MAC Addresses
216(10)
MAC Address and Hexadecimal
216(3)
MAC Address: Ethernet Identity
219(1)
Frame Processing
220(1)
MAC Address Representations
221(1)
Unicast MAC Address
222(1)
Broadcast MAC Address
223(1)
Multicast MAC Address
224(2)
LAN Switches
226(21)
The MAC Address Table
226(14)
Switch Fundamentals
226(1)
Learning MAC Addresses
227(2)
Filtering Frames
229(2)
MAC Address Tables on Connected Switches
231(5)
Sending a Frame to the Default Gateway
236(4)
Switch Forwarding Methods
240(4)
Frame Forwarding Methods on Cisco Switches
241(1)
Cut-Through Switching
242(1)
Memory Buffering on Switches
243(1)
Switch Port Settings
244(3)
Duplex and Speed Settings
244(2)
Auto-MDIX
246(1)
Address Resolution Protocol
247(19)
MAC and IP
247(3)
Destination on Same Network
247(1)
Destination Remote Network
248(2)
ARP
250(14)
Introduction to ARP
250(1)
ARP Functions
251(1)
ARP Request
252(4)
ARP Reply
256(3)
ARP Role in Remote Communication
259(4)
Removing Entries from an ARP Table
263(1)
ARP Tables
263(1)
ARP Issues
264(3)
ARP Broadcasts
264(1)
ARP Spoofing
265(1)
Summary
266(1)
Practice
267(1)
Class Activities
267(1)
Labs
267(1)
Packet Tracer Activities
267(1)
Check Your Understanding Questions
268(5)
Chapter 6 Network Layer 273(52)
Objectives
273(1)
Key Terms
273(1)
Introduction
274(1)
Network Layer Protocols
275(12)
Network Layer in Communications
275(2)
The Network Layer
275(1)
Network Layer Protocols
276(1)
Characteristics of the IP Protocol
277(4)
Encapsulating IP
277(1)
Characteristics of IP
277(1)
IP - Connectionless
278(1)
IP - Best Effort Delivery
279(1)
IP - Media Independent
280(1)
IPv4 Packet
281(2)
IPv4 Packet Header
281(2)
IPv6 Packet
283(4)
Limitations of IPv4
283(1)
Introducing IPv6
283(1)
Encapsulating IPv6
284(2)
IPv6 Packet Header
286(1)
Routing
287(9)
How a Host Routes
287(4)
Host Forwarding Decision
288(1)
Default Gateway
289(1)
Using the Default Gateway
289(1)
Host Routing Tables
290(1)
Router Routing Tables
291(5)
Router Packet Forwarding Decision
291(1)
IPv4 Router Routing Table
292(1)
Directly Connected Routing Table Entries
293(1)
Remote Network Routing Table Entries
294(1)
Next-Hop Address
295(1)
Routers
296(12)
Anatomy of a Router
296(7)
A Router is a Computer
296(1)
Router CPU and OS
297(1)
Router Memory
297(2)
Inside a Router
299(1)
Connect to a Router
300(1)
LAN and WAN Interfaces
301(2)
Router Boot-up
303(5)
Bootset Files
303(1)
Router Bootup Process
304(2)
Show Version Output
306(2)
Configure a Cisco Router
308(11)
Configure Initial Settings
308(4)
Basic Switch Configuration Steps
308(2)
Basic Router Configuration Steps
310(2)
Configure Interfaces
312(2)
Configure Router Interfaces
312(1)
Verify Interface Configuration
313(1)
Configure the Default Gateway
314(6)
Default Gateway for a Host
315(1)
Default Gateway for a Switch
316(3)
Summary
319(1)
Practice
320(1)
Class Activities
321(1)
Labs
321(1)
Packet Tracer Activities
321(1)
Check Your Understanding Questions
321(4)
Chapter 7 IP Addressing 325(78)
Objectives
325(1)
Key Terms
325(2)
Introduction
327(1)
IPv4 Network Addresses
327(30)
Binary and Decimal Conversion
327(11)
IPv4 Addresses
328(2)
Positional Notation
330(1)
Binary to Decimal Conversion
331(3)
Decimal to Binary Conversion
334(2)
Decimal to Binary Conversion Examples
336(2)
IPv4 Address Structure
338(7)
Network and Host Portions
338(1)
The Subnet Mask
338(2)
Logical AND
340(1)
The Prefix Length
341(1)
Network, Host, and Broadcast Addresses
342(3)
IPv4 Unicast, Broadcast, and Multicast
345(5)
Static IPv4 Address Assignment to a Host
345(1)
Dynamic IPv4 Address Assignment to a Host
345(1)
IPv4 Communication
346(1)
Unicast Transmission
347(1)
Broadcast Transmission
348(1)
Multicast Transmission
349(1)
Types of IPv4 Addresses
350(7)
Public and Private IPv
v4
Addresses
350(2)
Special User IPv4 Addresses
352(1)
Legacy Glassful Addressing
353(2)
Classless Addressing
355(1)
Assignment of IP Addresses
356(1)
IPv6 Network Addresses
357(31)
IPv4 Issues
357(3)
The Need for IPv6
357(1)
IPv4 and IPv6 Coexistence
358(2)
IPv6 Addressing
360(4)
IPv6 Address Representation
360(2)
Rule 1 - Omit Leading 0s
362(1)
Rule 2 - Omit All 0 Segments
362(2)
Types of IPv6 Addresses
364(1)
IPv6 Address Types
364(1)
IPv6 Prefix Length
365(1)
IPv6 Unicast Addresses
365(20)
IPv6 Link-Local Unicast Addresses
367(2)
IPv6 Unicast Addresses
369(1)
Structure of an IPv6 Global Unicast Address
369(2)
Static Configuration of a Global Unicast Address
371(3)
Dynamic Configuration - SLAAC
374(2)
Dynamic Configuration - DHCPv6
376(1)
EUI-64 Process and Randomly Generated
377(3)
Dynamic Link-Local Addresses
380(1)
Static Link-Local Addresses
381(1)
Verifying IPv6 Address Configuration
382(3)
IPv6 Multicast Addresses
385(3)
Assigned IPv6 Multicast Addresses
385(2)
Solicited-Node IPv6 Multicast Addresses
387(1)
Connectivity Verification
388(10)
ICMP
388(4)
ICMPv4 and ICMPv6
388(1)
ICMPv6 Router Solicitation and Router Advertisement Messages
389(3)
Testing and Verification
392(7)
Ping - Testing the Local Stack
392(2)
Ping - Testing Connectivity to the Local LAN
394(1)
Ping - Testing Connectivity to Remote
395(1)
Traceroute - Testing the Path
395(3)
Summary
398(1)
Practice
399(1)
Class Activities
399(1)
Labs
400(1)
Packet Tracer Activities
400(1)
Check Your Understanding Questions
400(3)
Chapter 8 Subnetting IP Networks 403(52)
Objectives
403(1)
Key Terms
403(1)
Introduction
404(1)
Subnetting an IPv4 Network
405(35)
Network Segmentation
405(3)
Broadcast Domains
405(1)
Problems with Large Broadcast Domains
406(1)
Reasons for Subnetting
407(1)
Subnetting an IPv4 Network
408(13)
Octet Boundaries
408(1)
Subnetting on the Octet Boundary
409(1)
Classless Subnetting
410(2)
Classless Subnetting Example
412(2)
Creating 2 Subnets
414(2)
Subnetting Formulas
416(2)
Creating 4 Subnets
418(3)
Subnetting a /16 and /8 Prefix
421(6)
Creating Subnets with a /16 prefix
421(2)
Creating 100 Subnets with a /16 Network
423(1)
Calculating the Hosts
424(1)
Creating 1000 Subnets with a /8 Network
425(2)
Subnetting to Meet Requirements
427(5)
Subnetting Based on Host Requirements
428(1)
Subnetting Based on Network Requirements
428(1)
Network Requirement Example
429(3)
Benefits of Variable Length Subnet Masking
432(8)
Traditional Subnetting Wastes Addresses
432(2)
Variable Length Subnet Masks
434(1)
Basic VLSM
435(2)
VLSM in Practice
437(2)
VLSM Chart
439(1)
Addressing Schemes
440(3)
Structured Design
440(3)
IPv4 Network Address Planning
440(1)
Planning to Address the Network
441(1)
Assigning Addresses to Devices
442(1)
Design Considerations for IPv6
443(6)
Subnetting an IPv6 Network
443(7)
The IPv6 Global Unicast Address
444(1)
Subnetting Using the Subnet ID
445(1)
IPv6 Subnet Allocation
446(3)
Summary
449(1)
Practice
450(1)
Class Activities
450(1)
Labs
451(1)
Packet Tracer Activities
451(1)
Check Your Understanding Questions
451(4)
Chapter 9 Transport Layer 455(46)
Objectives
455(1)
Key Terms
455(1)
Introduction
456(1)
Transport Layer Protocols
457(17)
Transportation of Data
457(7)
Role of the Transport Layer
457(1)
Transport Layer Responsibilities
458(2)
Conversation Multiplexing
460(1)
Transport Layer Reliability
461(1)
TCP
462(1)
UDP
463(1)
The Right Transport Layer Protocol for the Right Application
463(1)
TCP and UDP Overview
464(10)
TCP Features
465(1)
TCP Header
466(2)
UDP Features
468(1)
UDP Header
468(1)
Multiple Separate Conversations
469(1)
Port Numbers
470(1)
Socket Pairs
471(1)
Port Number Groups
472(1)
The netstat Command
473(1)
TCP and UDP
474(20)
TCP Communication Process
474(8)
TCP Server Processes
474(3)
TCP Connection Establishment
477(1)
TCP Session Termination
478(3)
TCP Three-way Handshake Analysis
481(1)
Reliability and Flow Control
482(6)
TCP Reliability - Ordered Delivery
482(3)
TCP Flow Control - Window Size and Acknowledgements
485(2)
TCP Flow Control - Congestion Avoidance
487(1)
UDP Communication
488(3)
UDP Low Overhead versus Reliability
488(1)
UDP Datagram Reassembly
489(1)
UDP Server Processes and Requests
490(1)
UDP Client Processes
490(1)
TCP or UDP
491(4)
Applications that Use TCP
491(1)
Applications that Use UDP
492(2)
Summary
494(1)
Practice
495(1)
Class Activities
496(1)
Labs
496(1)
Packet Tracer Activities
496(1)
Check Your Understanding Questions
496(5)
Chapter 10 Application Layer 501(32)
Objectives
501(1)
Key Terms
501(1)
Introduction
502(1)
Application Layer Protocols
502(8)
Application, Presentation, and Session
502(4)
Application Layer
502(1)
Presentation and Session Layer
503(1)
TCP/IP Application Layer Protocols
504(2)
How Application Protocols Interact with End-User Applications
506(4)
Client-Server Model
506(1)
Peer-to-Peer Networks
507(1)
Peer-to-Peer Applications
507(1)
Common P2P Applications
508(2)
Well-Known Application Layer Protocols and Services
510(19)
Web and Email Protocols
510(6)
Hypertext Transfer Protocol and Hypertext Markup Language
510(2)
HTTP and HTTPS
512(1)
Email Protocols
513(1)
SMTP Operation
514(1)
POP Operation
514(1)
IMAP Operation
515(1)
IP Addressing Services
516(9)
Domain Name Service
516(3)
DNS Message Format
519(1)
DNS Hierarchy
520(1)
The nslookup Command
521(1)
Dynamic Host Configuration Protocol
522(2)
DHCP Operation
524(1)
File Sharing Services
525(5)
File Transfer Protocol
525(2)
Server Message Block
527(2)
Summary
529(1)
Practice
530(1)
Class Activities
530(1)
Labs
530(1)
Packet Tracer Activities
531(1)
Check Your Understanding Questions
531(2)
Chapter 11 Build a Small Network 533(80)
Objectives
533(1)
Key Terms
533(1)
Introduction
534(1)
Network Design
534(13)
Devices in a Small Network
534(5)
Small Network Topologies
534(1)
Device Selection for a Small Network
535(1)
IP Addressing for a Small Network
536(1)
Redundancy in a Small Network
537(2)
Traffic Management
539(1)
Small Network Applications and Protocols
539(5)
Common Applications
539(2)
Common Protocols
541(1)
Voice and Video Applications
542(2)
Scale to Larger Networks
544(3)
Small Network Growth
544(1)
Protocol Analysis
544(1)
Employee Network Utilization
545(2)
Network Security
547(25)
Security Threats and Vulnerabilities
547(3)
Types of Threats
547(1)
Physical Security
548(1)
Types of Vulnerabilities
548(2)
Network Attacks
550(6)
Types of Malware
550(1)
Reconnaissance Attacks
551(1)
Access Attacks
552(2)
Denial of Service Attacks
554(2)
Network Attack Mitigation
556(3)
Backup, Upgrade, Update, and Patch
556(1)
Authentication, Authorization, and Accounting
557(1)
Firewalls
558(1)
Endpoint Security
559(1)
Device Security
559(5)
Device Security Overview
559(1)
Passwords
560(1)
Basic Security Practices
561(2)
Enable SSH
563(1)
Backup and Restore Configuration Files
564(8)
Router File Systems
564(3)
Switch File Systems
567(1)
Backing Up and Restoring Using Text Files
568(1)
Backing up and Restoring TFTP
569(1)
Using USB Ports on a Cisco Router
570(1)
Backing Up and Restoring Using a USB
570(2)
Network Testing and Verification
572(22)
The ping Command
572(5)
Interpreting Ping Results
573(1)
Extended Ping
574(1)
Network Baseline
575(2)
The traceroute and tracert Command
577(4)
Interpreting Trace Messages
578(1)
Extended traceroute
579(2)
Show Commands
581(4)
Common show Commands Revisited
581(4)
Host and IOS Commands
585(7)
The ipconfig Command
585(2)
The arp Command
587(1)
The show cdp neighbors Command
588(3)
The show ip interface brief Command
591(1)
Debugging
592(2)
The debug Command
592(2)
The terminal monitor Command
594(1)
Network Troubleshooting
594(12)
Troubleshooting Methodologies
594(4)
Basic Troubleshooting Approaches
595(1)
Resolve or Escalate?
596(1)
Verify and Monitor Solution
596(2)
Troubleshoot Cables and Interfaces
598(2)
Duplex Operation
598(1)
Duplex Mismatch
599(1)
Troubleshooting Scenarios
600(8)
IP Addressing Issues on IOS Devices
600(1)
IP Addressing Issues on End Devices
601(1)
Default Gateway Issues
602(2)
Troubleshooting DNS Issues
604(2)
Summary
606(2)
Practice
608(1)
Class Activities
608(1)
Labs
608(1)
Packet Tracer Activities
608(1)
Check Your Understanding Questions
609(4)
Appendix A 613(14)
Glossary 627(18)
Index 645
Cisco Networking Academy is an innovative Cisco education initiative that delivers information and communication technology skills to improve career and economic opportunities around the world. The Academy provides online courses, interactive tools, and lab activities to prepare individuals for information technology and networking careers in virtually every industry.