Chapter 0 Course Introduction |
|
1 | (4) |
|
0.0 Welcome to Introduction to Networks |
|
|
1 | (4) |
|
0.0.1 Message to the Student |
|
|
1 | (5) |
|
|
1 | (1) |
|
0.0.1.2 A Global Community |
|
|
1 | (1) |
|
0.0.1.3 More Than Just Information |
|
|
1 | (1) |
|
|
2 | (1) |
|
0.0.1.5 Practice Leads to Mastery |
|
|
2 | (1) |
|
|
2 | (1) |
|
0.0.1.7 Engineering Journals |
|
|
2 | (1) |
|
0.0.1.8 Explore the World of Networking |
|
|
2 | (1) |
|
0.0.1.9 Create Your Own Worlds |
|
|
3 | (1) |
|
0.0.1.10 How Packet Tracer Helps Master Concepts |
|
|
3 | (1) |
|
|
3 | (2) |
Chapter 1 Explore the Network |
|
5 | (22) |
|
|
5 | (1) |
|
1.0.1.1 Exploring the Network |
|
|
5 | (1) |
|
1.0.1.2 Class Activity - Draw Your Concept of the Internet |
|
|
5 | (1) |
|
|
6 | (4) |
|
|
6 | (3) |
|
1.1.1.1 Networks in Our Daily Lives |
|
|
6 | (1) |
|
1.1.1.2 Technology Then and Now |
|
|
6 | (1) |
|
|
6 | (1) |
|
1.1.1.4 Networks Support the Way We Learn |
|
|
7 | (1) |
|
1.1.1.5 Networks Support the Way We Communicate |
|
|
7 | (1) |
|
1.1.1.6 Networks Support the Way We Work |
|
|
8 | (1) |
|
1.1.1.7 Networks Support the Way We Play |
|
|
8 | (1) |
|
1.1.1.8 Lab - Researching Network Collaboration Tools |
|
|
8 | (1) |
|
1.1.2 Providing Resources in a Network |
|
|
9 | (1) |
|
1.1.2.1 Networks of Many Sizes |
|
|
9 | (1) |
|
1.1.2.2 Clients and Servers |
|
|
9 | (1) |
|
|
9 | (1) |
|
1.2 LANs, WANs, and the Internet |
|
|
10 | (6) |
|
|
10 | (2) |
|
1.2.1.1 Overview of Network Components |
|
|
10 | (1) |
|
|
10 | (1) |
|
1.2.1.3 Intermediary Network Devices |
|
|
10 | (1) |
|
|
11 | (1) |
|
1.2.1.5 Network Representations |
|
|
11 | (1) |
|
1.2.1.6 Topology Diagrams |
|
|
11 | (1) |
|
1.2.1.7 Activity - Network Component Representations and Functions |
|
|
12 | (1) |
|
|
12 | (1) |
|
1.2.2.1 Types of Networks |
|
|
12 | (1) |
|
1.2.2.2 Local Area Networks |
|
|
12 | (1) |
|
1.2.2.3 Wide Area Networks |
|
|
13 | (1) |
|
1.2.3 The Internet, Intranets, and Extranets |
|
|
13 | (1) |
|
|
13 | (1) |
|
1.2.3.2 Intranets and Extranets |
|
|
13 | (1) |
|
1.2.4 Internet Connections |
|
|
14 | (2) |
|
1.2.4.1 Internet Access Technologies |
|
|
14 | (1) |
|
1.2.4.2 Home and Small Office Internet Connections |
|
|
14 | (1) |
|
1.2.4.3 Businesses Internet Connections |
|
|
15 | (1) |
|
1.2.4.4 Packet Tracer - Help and Navigation Tips |
|
|
15 | (1) |
|
1.2.4.5 Packet Tracer - Network Representation |
|
|
15 | (1) |
|
1.3 The Network as a Platform |
|
|
16 | (2) |
|
|
16 | (1) |
|
1.3.1.1 Traditional Separate Networks |
|
|
16 | (1) |
|
1.3.1.2 The Converging Network |
|
|
16 | (1) |
|
1.3.1.3 Lab — Researching Converged Network Services |
|
|
16 | (1) |
|
|
16 | (2) |
|
1.3.2.1 Network Architecture |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
1.3.2.4 Quality of Service |
|
|
17 | (1) |
|
|
18 | (1) |
|
1.3.2.6 Activity - Reliable Networks |
|
|
18 | (1) |
|
1.4 The Changing Network Environment |
|
|
18 | (6) |
|
|
18 | (2) |
|
|
18 | (1) |
|
1.4.1.2 Bring Your Own Device |
|
|
19 | (1) |
|
1.4.1.3 Online Collaboration |
|
|
19 | (1) |
|
1.4.1.4 Video Communication |
|
|
19 | (1) |
|
|
20 | (1) |
|
1.4.2 Networking Technologies for the Home |
|
|
20 | (1) |
|
1.4.2.1 Technology Trends in the Home |
|
|
20 | (1) |
|
1.4.2.2 Powerline Networking |
|
|
20 | (1) |
|
1.4.2.3 Wireless Broadband |
|
|
21 | (1) |
|
|
21 | (2) |
|
|
21 | (1) |
|
1.4.3.2 Security Solutions |
|
|
22 | (1) |
|
1.4.3.3 Activity - Network Security Terminology |
|
|
23 | (1) |
|
1.4.4 Network Architecture |
|
|
23 | (1) |
|
1.4.4.1 Cisco Network Architecture |
|
|
23 | (1) |
|
|
24 | (1) |
|
1.4.4.3 Lab - Researching IT and Networking Job Opportunities |
|
|
24 | (1) |
|
|
24 | (2) |
|
|
24 | (4) |
|
1.5.1.1 Class Activity — Draw Your Concept of the Internet Now |
|
|
24 | (1) |
|
1.5.1.2 Warriors of the Mt |
|
|
25 | (1) |
|
1.5.1.3 Exploring the Network |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
26 | (1) |
|
|
26 | (1) |
Chapter 2 Configure a Network Operating System |
|
27 | (18) |
|
|
27 | (1) |
|
2.0.1.1 Configure a Network Operating System |
|
|
27 | (1) |
|
2.0.1.2 Class Activity - It Is Just an Operating System |
|
|
27 | (1) |
|
|
28 | (6) |
|
|
28 | (1) |
|
2.1.1.1 Operating Systems |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
2.1.2.2 Terminal Emulation Programs |
|
|
29 | (1) |
|
2.1.2.3 Activity - Accessing Devices |
|
|
30 | (1) |
|
|
30 | (2) |
|
2.1.3.1 Cisco IOS Modes of Operation |
|
|
30 | (1) |
|
2.1.3.2 Primary Command Modes |
|
|
30 | (1) |
|
2.1.3.3 Configuration Command Modes |
|
|
30 | (1) |
|
2.1.3.4 Navigate Between IOS Modes |
|
|
31 | (1) |
|
2.1.4 The Command Structure |
|
|
32 | (2) |
|
2.1.4.1 Basic IOS Command Structure |
|
|
32 | (1) |
|
2.1.4.2 IOS Command Syntax |
|
|
32 | (1) |
|
2.1.4.3 IOS Help Features |
|
|
32 | (1) |
|
2.1.4.4 Hotkeys and Shortcuts |
|
|
33 | (1) |
|
2.1.4.5 Video Demonstration - Hotkeys and Shortcuts |
|
|
33 | (1) |
|
2.1.4.6 Packet Tracer - Navigating the IOS |
|
|
33 | (1) |
|
2.1.4.7 Lab - Establishing a Console Session with Tera Term |
|
|
33 | (1) |
|
2.2 Basic Device Configuration |
|
|
34 | (4) |
|
|
34 | (1) |
|
|
34 | (1) |
|
2.2.1.2 Configure Hostnames |
|
|
34 | (1) |
|
2.2.2 Limit Access to Device Configurations |
|
|
35 | (1) |
|
2.2.2.1 Secure Device Access |
|
|
35 | (1) |
|
2.2.2.2 Configure Passwords |
|
|
35 | (1) |
|
2.2.2.3 Encrypt Passwords |
|
|
35 | (1) |
|
|
36 | (1) |
|
2.2.2.5 Syntax Checker - Limiting Access to a Switch |
|
|
36 | (1) |
|
2.2.3 Save Configurations |
|
|
36 | (2) |
|
2.2.3.1 Save the Running Configuration File |
|
|
36 | (1) |
|
2.2.3.2 Alter the Running Configuration |
|
|
37 | (1) |
|
2.2.3.3 Capture Configuration to a Text File |
|
|
37 | (1) |
|
2.2.3.4 Packet Tracer - Configuring Initial Switch Settings |
|
|
38 | (1) |
|
|
38 | (4) |
|
2.3.1 Ports and Addresses |
|
|
38 | (1) |
|
|
38 | (1) |
|
2.3.1.2 Interfaces and Ports |
|
|
39 | (1) |
|
2.3.2 Configure IP Addressing |
|
|
39 | (2) |
|
2.3.2.1 Manual IP Address Configuration for End Devices |
|
|
39 | (1) |
|
2.3.2.2 Automatic IP Address Configuration for End Devices |
|
|
40 | (1) |
|
2.3.2.3 Switch Virtual Interface Configuration |
|
|
40 | (1) |
|
2.3.2.4 Syntax Checker - Configuring a Switch Virtual Interface |
|
|
40 | (1) |
|
2.3.2.5 Packet Tracer - Implementing Basic Connectivity |
|
|
41 | (1) |
|
2.3.3 Verifying Connectivity |
|
|
41 | (1) |
|
2.3.3.1 Interface Addressing Verification |
|
|
41 | (1) |
|
2.3.3.2 End-to-End Connectivity Test |
|
|
41 | (1) |
|
2.3.3.3 Lab - Building a Simple Network |
|
|
41 | (1) |
|
2.3.3.4 Lab - Configuring a Switch Management Address |
|
|
41 | (1) |
|
|
42 | (2) |
|
|
42 | (4) |
|
2.4.1.1 Class Activity - Tutor Me |
|
|
42 | (1) |
|
2.4.1.2 Packet Tracer - Skills Integration Challenge |
|
|
42 | (1) |
|
2.4.1.3 Configure a Network Operating System |
|
|
42 | (2) |
|
|
44 | (1) |
|
|
44 | (1) |
|
|
44 | (1) |
Chapter 3 Network Protocols and Communications |
|
45 | (18) |
|
|
45 | (1) |
|
3.0.1.1 Network Protocols and Communications |
|
|
45 | (1) |
|
3.0.1.2 Class Activity - Designing a Communications System |
|
|
45 | (1) |
|
3.1 Rules of Communication |
|
|
46 | (3) |
|
|
46 | (3) |
|
3.1.1.1 Communication Fundamentals |
|
|
46 | (1) |
|
3.1.1.2 Rule Establishment |
|
|
46 | (1) |
|
|
47 | (1) |
|
3.1.1.4 Message Formatting and Encapsulation |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
48 | (1) |
|
3.1.1.7 Message Delivery Options |
|
|
49 | (1) |
|
3.2 Network Protocols and Standards |
|
|
49 | (7) |
|
|
49 | (2) |
|
3.2.1.1 Rules that Govern Communications |
|
|
49 | (1) |
|
3.2.1.2 Network Protocols |
|
|
50 | (1) |
|
3.2.1.3 Protocol Interaction |
|
|
50 | (1) |
|
|
51 | (1) |
|
3.2.2.1 Protocol Suites and Industry Standards |
|
|
51 | (1) |
|
3.2.2.2 Development of TCP/IP |
|
|
51 | (1) |
|
3.2.2.3 TCP/IP Protocol Suite |
|
|
51 | (1) |
|
3.2.2.4 TCP/IP Communication Process |
|
|
52 | (1) |
|
3.2.2.5 Activity - Mapping the Protocols of the TCP/IP Suite |
|
|
52 | (1) |
|
3.2.3 Standard Organizations |
|
|
52 | (2) |
|
|
52 | (1) |
|
3.2.3.2 Internet Standards |
|
|
53 | (1) |
|
3.2.3.3 Electronics and Communications Standard Organizations |
|
|
53 | (1) |
|
3.2.3.4 Lab - Researching Networking Standards |
|
|
54 | (1) |
|
|
54 | (2) |
|
3.2.4.1 The Benefits of Using a Layered Model |
|
|
54 | (1) |
|
3.2.4.2 The OSI Reference Model |
|
|
55 | (1) |
|
3.2.4.3 The TCP/IP Protocol Model |
|
|
55 | (1) |
|
3.2.4.4 OSI Model and TCP/IP Model Comparison |
|
|
55 | (1) |
|
3.2.4.5 Activity - Identify Layers and Functions |
|
|
56 | (1) |
|
3.2.4.6 Packet Tracer - Investigating the TCP/IP and OSI Models in Action |
|
|
56 | (1) |
|
3.3 Data Transfer in the Network |
|
|
56 | (4) |
|
|
56 | (1) |
|
3.3.1.1 Message Segmentation |
|
|
56 | (1) |
|
3.3.1.2 Protocol Data Units |
|
|
57 | (1) |
|
3.3.1.3 Encapsulation Example |
|
|
57 | (1) |
|
|
57 | (1) |
|
3.3.1.5 Activity - Identify the PDU Layer |
|
|
57 | (1) |
|
|
57 | (3) |
|
3.3.2.1 Network Addresses |
|
|
57 | (1) |
|
3.3.2.2 Data Link Addresses |
|
|
58 | (1) |
|
3.3.2.3 Devices on the Same Network |
|
|
58 | (1) |
|
3.3.2.4 Devices on a Remote Network |
|
|
59 | (1) |
|
|
60 | (2) |
|
|
60 | (3) |
|
3.4.1.1 Lab - Installing Wireshark |
|
|
60 | (1) |
|
3.4.1.2 Lab - Using Wireshark to View Network Traffic |
|
|
60 | (1) |
|
3.4.1.3 Class Activity - Guaranteed to Work! |
|
|
61 | (1) |
|
3.4.1.4 Network Protocols and Communications |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
62 | (1) |
Chapter 4 Network Access |
|
63 | (28) |
|
|
63 | (1) |
|
|
63 | (1) |
|
4.0.1.2 Class Activity — Managing the Medium |
|
|
63 | (1) |
|
4.1 Physical Layer Protocols |
|
|
63 | (6) |
|
4.1.1 Physical Layer Connection |
|
|
63 | (2) |
|
4.1.1.1 Types of Connections |
|
|
63 | (1) |
|
4.1.1.2 Network Interface Cards |
|
|
64 | (1) |
|
4.1.2 Purpose of the Physical Layer |
|
|
65 | (1) |
|
4.1.2.1 The Physical Layer |
|
|
65 | (1) |
|
4.1.2.2 Physical Layer Media |
|
|
65 | (1) |
|
4.1.2.3 Physical Layer Standards |
|
|
65 | (1) |
|
4.1.2.4 Lab - Identifying Network Devices and Cabling |
|
|
66 | (1) |
|
4.1.3 Physical Layer Characteristics |
|
|
66 | (3) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
68 | (1) |
|
4.1.3.4 Types of Physical Media |
|
|
68 | (1) |
|
4.1.3.5 Activity - Physical Layer Terminology |
|
|
68 | (1) |
|
|
69 | (9) |
|
|
69 | (2) |
|
4.2.1.1 Characteristics of Copper Cabling |
|
|
69 | (1) |
|
|
69 | (1) |
|
4.2.1.3 Unshielded Twisted-Pair Cable |
|
|
70 | (1) |
|
4.2.1.4 Shielded Twisted-Pair Cable |
|
|
70 | (1) |
|
|
70 | (1) |
|
4.2.1.6 Copper Media Safety |
|
|
71 | (1) |
|
4.2.1.7 Activity - Copper Media Characteristics |
|
|
71 | (1) |
|
|
71 | (3) |
|
4.2.2.1 Properties of UTP Cabling |
|
|
71 | (1) |
|
4.2.2.2 UTP Cabling Standards |
|
|
72 | (1) |
|
|
72 | (1) |
|
4.2.2.4 Types of UTP Cable |
|
|
73 | (1) |
|
4.2.2.5 Testing UTP Cables |
|
|
73 | (1) |
|
|
74 | (1) |
|
4.2.2.7 Lab - Building an Ethernet Crossover Cable |
|
|
74 | (1) |
|
4.2.3 Fiber-Optic Cabling |
|
|
74 | (2) |
|
4.2.3.1 Properties of Fiber-Optic Cabling |
|
|
74 | (1) |
|
4.2.3.2 Fiber Media Cable Design |
|
|
74 | (1) |
|
4.2.3.3 Types of Fiber Media |
|
|
75 | (1) |
|
4.2.3.4 Fiber-Optic Connectors |
|
|
75 | (1) |
|
4.2.3.5 Testing Fiber Cables |
|
|
76 | (1) |
|
4.2.3.6 Fiber versus Copper |
|
|
76 | (1) |
|
4.2.3.7 Activity - Fiber Optics Terminology |
|
|
76 | (1) |
|
|
76 | (2) |
|
4.2.4.1 Properties of Wireless Media |
|
|
76 | (1) |
|
4.2.4.2 Types of Wireless Media |
|
|
77 | (1) |
|
|
78 | (1) |
|
4.2.4.4 Packet Tracer - Connecting a Wired and Wireless LAN |
|
|
78 | (1) |
|
4.2.4.5 Lab - Viewing Wired and Wireless NIC Information |
|
|
78 | (1) |
|
4.3 Data Link Layer Protocols |
|
|
78 | (3) |
|
4.3.1 Purpose of the Data Link Layer |
|
|
78 | (3) |
|
4.3.1.1 The Data Link Layer |
|
|
78 | (1) |
|
4.3.1.2 Data Link Sublayers |
|
|
79 | (1) |
|
4.3.1.3 Media Access Control |
|
|
79 | (1) |
|
4.3.1.4 Providing Access to Media |
|
|
80 | (1) |
|
4.3.1.5 Data Link Layer Standards |
|
|
80 | (1) |
|
|
81 | (7) |
|
|
81 | (1) |
|
4.4.1.1 Controlling Access to the Media |
|
|
81 | (1) |
|
4.4.1.2 Physical and Logical Topologies |
|
|
81 | (1) |
|
|
82 | (1) |
|
4.4.2.1 Common Physical WAN Topologies |
|
|
82 | (1) |
|
4.4.2.2 Physical Point-to-Point Topology |
|
|
82 | (1) |
|
4.4.2.3 Logical Point-to-Point Topology |
|
|
82 | (1) |
|
|
83 | (2) |
|
4.4.3.1 Physical LAN Topologies |
|
|
83 | (1) |
|
4.4.3.2 Half and Full Duplex |
|
|
83 | (1) |
|
4.4.3.3 Media Access Control Methods |
|
|
84 | (1) |
|
4.4.3.4 Contention-Based Access - CSMA/CD |
|
|
84 | (1) |
|
4.4.3.5 Contention-Based Access - CSMA/CA |
|
|
85 | (1) |
|
|
85 | (3) |
|
|
85 | (1) |
|
|
85 | (1) |
|
4.4.4.3 Activity - Generic Frame Fields |
|
|
86 | (1) |
|
|
86 | (1) |
|
4.4.4.5 LAN and WAN Frames |
|
|
87 | (1) |
|
|
88 | (2) |
|
|
88 | (4) |
|
4.5.1.1 Class Activity - Linked In! |
|
|
88 | (1) |
|
|
88 | (2) |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
90 | (1) |
Chapter 5 Ethernet |
|
91 | (22) |
|
|
91 | (1) |
|
|
91 | (1) |
|
5.0.1.2 Class Activity - Join My Social Circle! |
|
|
91 | (1) |
|
|
92 | (6) |
|
|
92 | (2) |
|
5.1.1.1 Ethernet Encapsulation |
|
|
92 | (1) |
|
|
93 | (1) |
|
5.1.1.3 Ethernet Evolution |
|
|
93 | (1) |
|
5.1.1.4 Ethernet Frame Fields |
|
|
94 | (1) |
|
5.1.1.5 Activity - MAC and LLC Sublayers |
|
|
94 | (1) |
|
5.1.1.6 Activity - Ethernet Frame Fields |
|
|
94 | (1) |
|
5.1.1.7 Lab - Using Wireshark to Examine Ethernet Frames |
|
|
94 | (1) |
|
5.1.2 Ethernet MAC Addresses |
|
|
94 | (4) |
|
5.1.2.1 MAC Address and Hexadecimal |
|
|
94 | (1) |
|
5.1.2.2 MAC Address: Ethernet Identity |
|
|
95 | (1) |
|
|
95 | (1) |
|
5.1.2.4 MAC Address Representations |
|
|
96 | (1) |
|
5.1.2.5 Unicast MAC Address |
|
|
96 | (1) |
|
5.1.2.6 Broadcast MAC Address |
|
|
97 | (1) |
|
5.1.2.7 Multicast MAC Address |
|
|
97 | (1) |
|
5.1.2.8 Lab - Viewing Network Device MAC Addresses |
|
|
97 | (1) |
|
|
98 | (5) |
|
5.2.1 The MAC Address Table |
|
|
98 | (2) |
|
5.2.1.1 Switch Fundamentals |
|
|
98 | (1) |
|
5.2.1.2 Learning MAC Addresses |
|
|
98 | (1) |
|
|
99 | (1) |
|
5.2.1.4 Video Demonstration - MAC Address Tables on Connected Switches |
|
|
99 | (1) |
|
5.2.1.5 Video Demonstration - Sending a Frame to the Default Gateway |
|
|
99 | (1) |
|
5.2.1.6 Activity - Switch It! |
|
|
100 | (1) |
|
5.2.1.7 Lab - Viewing the Switch MAC Address Table |
|
|
100 | (1) |
|
5.2.2 Switch Forwarding Methods |
|
|
100 | (2) |
|
5.2.2.1 Frame Forwarding Methods on Cisco Switches |
|
|
100 | (1) |
|
5.2.2.2 Cut-Through Switching |
|
|
101 | (1) |
|
5.2.2.3 Memory Buffering on Switches |
|
|
101 | (1) |
|
5.2.2.4 Activity - Frame Forwarding Methods |
|
|
102 | (1) |
|
5.2.3 Switch Port Settings |
|
|
102 | (1) |
|
5.2.3.1 Duplex and Speed Settings |
|
|
102 | (1) |
|
|
103 | (1) |
|
5.3 Address Resolution Protocol |
|
|
103 | (6) |
|
|
103 | (2) |
|
5.3.1.1 Destination on Same Network |
|
|
103 | (1) |
|
5.3.1.2 Destination Remote Network |
|
|
104 | (1) |
|
5.3.1.3 Packet Tracer - Identify MAC and IP Addresses |
|
|
105 | (1) |
|
|
105 | (3) |
|
5.3.2.1 Introduction to ARP |
|
|
105 | (1) |
|
|
105 | (1) |
|
5.3.2.3 Video Demonstration - ARP Request |
|
|
106 | (1) |
|
5.3.2.4 Video Demonstration - ARP Reply |
|
|
106 | (1) |
|
5.3.2.5 Video Demonstration - ARP Role in Remote Communication |
|
|
107 | (1) |
|
5.3.2.6 Removing Entries from an ARP Table |
|
|
108 | (1) |
|
|
108 | (1) |
|
5.3.2.8 Packet Tracer - Examine the ARP Table |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
109 | (2) |
|
|
109 | (5) |
|
5.4.1.1 Class Activity - MAC and Choose |
|
|
109 | (1) |
|
5.4.1.2 Chapter 5: Ethernet |
|
|
109 | (2) |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
111 | (2) |
Chapter 6 Network Layer |
|
113 | (22) |
|
|
113 | (1) |
|
|
113 | (1) |
|
6.0.1.2 Class Activity - The Road Less Traveled |
|
|
113 | (1) |
|
6.1 Network Layer Protocols |
|
|
114 | (5) |
|
6.1.1 Network Layer in Communications |
|
|
114 | (1) |
|
6.1.1.1 The Network Layer |
|
|
114 | (1) |
|
6.1.1.2 Network Layer Protocols |
|
|
114 | (1) |
|
6.1.2 Characteristics of the IP Protocol |
|
|
115 | (1) |
|
|
115 | (1) |
|
6.1.2.2 Characteristics of IP |
|
|
115 | (1) |
|
6.1.2.3 IP - Connectionless |
|
|
115 | (1) |
|
6.1.2.4 IP - Best Effort Delivery |
|
|
115 | (1) |
|
6.1.2.5 IP - Media Independent |
|
|
116 | (1) |
|
6.1.2.6 Activity - IP Characteristics |
|
|
116 | (1) |
|
|
116 | (1) |
|
6.1.3.1 IPv4 Packet Header |
|
|
116 | (1) |
|
6.1.3.2 Video Demonstration - Sample IPv4 Headers in Wireshark |
|
|
117 | (1) |
|
6.1.3.3 Activity - IPv4 Header Fields |
|
|
117 | (1) |
|
|
117 | (2) |
|
6.1.4.1 Limitations of IPv4 |
|
|
117 | (1) |
|
|
118 | (1) |
|
6.1.4.3 Encapsulating IPv6 |
|
|
118 | (1) |
|
6.1.4.4 IPv6 Packet Header |
|
|
118 | (1) |
|
6.1.4.5 Video Demonstration - Sample IPv6 Headers and Wireshark |
|
|
119 | (1) |
|
6.1.4.6 Activity - IPv6 Header Fields |
|
|
119 | (1) |
|
|
119 | (4) |
|
|
119 | (2) |
|
6.2.1.1 Host Forwarding Decision |
|
|
119 | (1) |
|
|
120 | (1) |
|
6.2.1.3 Using the Default Gateway |
|
|
120 | (1) |
|
6.2.1.4 Host Routing Tables |
|
|
121 | (1) |
|
6.2.2 Router Routing Tables |
|
|
121 | (2) |
|
6.2.2.1 Router Packet Forwarding Decision |
|
|
121 | (1) |
|
6.2.2.2 IPv4 Router Routing Table |
|
|
121 | (1) |
|
6.2.2.3 Video Demonstration - Introducing the IPv4 Routing Table |
|
|
122 | (1) |
|
6.2.2.4 Directly Connected Routing Table Entries |
|
|
122 | (1) |
|
6.2.2.5 Remote Network Routing Table Entries |
|
|
122 | (1) |
|
|
122 | (1) |
|
6.2.2.7 Video Demonstration - Explaining the IPv4 Routing Table |
|
|
123 | (1) |
|
6.2.2.8 Activity - Identify Elements of a Router Routing Table Entry |
|
|
123 | (1) |
|
|
123 | (5) |
|
6.3.1 Anatomy of a Router |
|
|
123 | (3) |
|
6.3.1.1 A Router is a Computer |
|
|
123 | (1) |
|
6.3.1.2 Router CPU and OS |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
125 | (1) |
|
6.3.1.5 Connect to a Router |
|
|
125 | (1) |
|
6.3.1.6 LAN and WAN Interfaces |
|
|
125 | (1) |
|
6.3.1.7 Activity - Identify Router Components |
|
|
126 | (1) |
|
6.3.1.8 Packet Tracer - Exploring Internetworking Devices |
|
|
126 | (1) |
|
|
126 | (2) |
|
|
126 | (1) |
|
6.3.2.2 Router Bootup Process |
|
|
126 | (1) |
|
6.3.2.3 Video Demonstration - Router Bootup Process |
|
|
127 | (1) |
|
6.3.2.4 Show Version Output |
|
|
127 | (1) |
|
6.3.2.5 Video Demonstration - The show version Command |
|
|
127 | (1) |
|
6.3.2.6 Activity - The Router Boot Process |
|
|
127 | (1) |
|
6.3.2.7 Lab - Exploring Router Physical Characteristics |
|
|
127 | (1) |
|
6.4 Configure a Cisco Router |
|
|
128 | (3) |
|
6.4.1 Configure Initial Settings |
|
|
128 | (1) |
|
6.4.1.1 Basic Switch Configuration Steps |
|
|
128 | (1) |
|
6.4.1.2 Basic Router Configuration Steps |
|
|
128 | (1) |
|
6.4.1.3 Packet Tracer - Configure Initial Router Settings |
|
|
128 | (1) |
|
6.4.2 Configure Interfaces |
|
|
128 | (1) |
|
6.4.2.1 Configure Router Interfaces |
|
|
128 | (1) |
|
6.4.2.2 Verify Interface Configuration |
|
|
129 | (1) |
|
6.4.3 Configure the Default Gateway |
|
|
129 | (2) |
|
6.4.3.1 Default Gateway for a Host |
|
|
129 | (1) |
|
6.4.3.2 Default Gateway for a Switch |
|
|
130 | (1) |
|
6.4.3.3 Packet Tracer - Connect a Router to a LAN |
|
|
130 | (1) |
|
6.4.3.4 Packet Tracer - Troubleshooting Default Gateway Issues |
|
|
131 | (1) |
|
|
131 | (2) |
|
|
131 | (4) |
|
6.5.1.1 Class Activity - Can You Read This Map? |
|
|
131 | (1) |
|
6.5.1.2 Lab - Building a Switch and Router Network |
|
|
132 | (1) |
|
6.5.1.3 Packet Tracer - Skills Integration Challenge |
|
|
132 | (1) |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
133 | (2) |
Chapter 7 IP Addressing |
|
135 | (34) |
|
|
135 | (1) |
|
|
135 | (1) |
|
7.0.1.2 Class Activity - The Internet of Everything (IoE) |
|
|
135 | (1) |
|
7.1 IPv4 Network Addresses |
|
|
135 | (12) |
|
7.1.1 Binary and Decimal Conversion |
|
|
135 | (3) |
|
|
135 | (1) |
|
7.1.1.2 Video Demonstration - Converting Between Binary and Decimal Numbering Systems |
|
|
136 | (1) |
|
7.1.1.3 Positional Notation |
|
|
136 | (1) |
|
7.1.1.4 Binary to Decimal Conversion |
|
|
136 | (1) |
|
7.1.1.5 Activity - Binary to Decimal Conversion |
|
|
137 | (1) |
|
7.1.1.6 Decimal to Binary Conversion |
|
|
137 | (1) |
|
7.1.1.7 Decimal to Binary Conversion Examples |
|
|
137 | (1) |
|
7.1.1.8 Activity - Decimal to Binary Conversion Utility |
|
|
138 | (1) |
|
7.1.1.9 Activity - Binary Game |
|
|
138 | (1) |
|
7.1.2 IPv4 Address Structure |
|
|
138 | (3) |
|
7.1.2.1 Network and Host Portions |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
139 | (1) |
|
7.1.2.4 Activity - ANDing to Determine the Network Address |
|
|
139 | (1) |
|
7.1.2.5 The Prefix Length |
|
|
139 | (1) |
|
7.1.2.6 Network, Host, and Broadcast Addresses |
|
|
140 | (1) |
|
7.1.2.7 Video Demonstration - Network, Host, and Broadcast Addresses |
|
|
140 | (1) |
|
7.1.2.8 Lab - Using the Windows Calculator with Network Addresses |
|
|
140 | (1) |
|
7.1.2.9 Lab - Converting IPv4 Addresses to Binary |
|
|
140 | (1) |
|
7.1.3 IPv4 Unicast, Broadcast, and Multicast |
|
|
141 | (2) |
|
7.1.3.1 Static IPv4 Address Assignment to a Host |
|
|
141 | (1) |
|
7.1.3.2 Dynamic IPv4 Address Assignment to a Host |
|
|
141 | (1) |
|
7.1.3.3 IPv4 Communication |
|
|
141 | (1) |
|
7.1.3.4 Unicast Transmission |
|
|
142 | (1) |
|
7.1.3.5 Broadcast Transmission |
|
|
142 | (1) |
|
7.1.3.6 Multicast Transmission |
|
|
142 | (1) |
|
7.1.3.7 Activity - Unicast, Broadcast, or Multicast |
|
|
143 | (1) |
|
7.1.3.8 Packet Tracer - Investigate Unicast, Broadcast, and Multicast Traffic |
|
|
143 | (1) |
|
7.1.4 Types of IPv4 Addressses |
|
|
143 | (4) |
|
7.1.4.1 Public and Private IPv4 Addresses |
|
|
143 | (1) |
|
7.1.4.2 Activity - Pass or Block IPv4 Addresses |
|
|
144 | (1) |
|
7.1.4.3 Special User IPv4 Addresses |
|
|
144 | (1) |
|
7.1.4.4 Legacy Glassful Addressing |
|
|
145 | (1) |
|
7.1.4.5 Video Demonstration - Glassful IPv4 Addressing |
|
|
145 | (1) |
|
7.1.4.6 Classless Addressing |
|
|
145 | (1) |
|
7.1.4.7 Assignment of IP Addresses |
|
|
146 | (1) |
|
7.1.4.8 Activity - Public or Private IPv4 Addresses |
|
|
146 | (1) |
|
7.1.4.9 Lab - Identifying IPv4 Addresses |
|
|
146 | (1) |
|
7.2 IPv6 Network Addresses |
|
|
147 | (13) |
|
|
147 | (1) |
|
7.2.1.1 The Need for IPv6 |
|
|
147 | (1) |
|
7.2.1.2 IPv4 and IPv6 Coexistence |
|
|
147 | (1) |
|
7.2.1.3 Activity - IPv4 Issues and Solutions |
|
|
148 | (1) |
|
|
148 | (1) |
|
7.2.2.1 IPv6 Address Representation |
|
|
148 | (1) |
|
7.2.2.2 Rule 1 - Omit Leading 0s |
|
|
148 | (1) |
|
7.2.2.3 Rule 2 - Omit All 0 Segments |
|
|
149 | (1) |
|
7.2.2.4 Activity - Practicing IPv6 Address Representations |
|
|
149 | (1) |
|
7.2.3 Types of IPv6 Addresses |
|
|
149 | (2) |
|
7.2.3.1 IPv6 Address Types |
|
|
149 | (1) |
|
7.2.3.2 IPv6 Prefix Length |
|
|
150 | (1) |
|
7.2.3.3 IPv6 Unicast Addresses |
|
|
150 | (1) |
|
7.2.3.4 IPv6 Link-Local Unicast Addresses |
|
|
151 | (1) |
|
7.2.3.5 Activity - Identify Types of IPv6 Addresses |
|
|
151 | (1) |
|
7.2.4 IPv6 Unicast Addresses |
|
|
151 | (7) |
|
7.2.4.1 Structure of an IPv6 Global Unicast Address |
|
|
151 | (1) |
|
7.2.4.2 Static Configuration of a Global Unicast Address |
|
|
152 | (1) |
|
7.2.4.3 Dynamic Configuration - SLAAC |
|
|
153 | (1) |
|
7.2.4.4 Dynamic Configuration - DHCPv6 |
|
|
154 | (1) |
|
7.2.4.5 EUI-64 Process and Randomly Generated |
|
|
155 | (1) |
|
7.2.4.6 Dynamic Link-Local Addresses |
|
|
156 | (1) |
|
7.2.4.7 Static Link-Local Addresses |
|
|
157 | (1) |
|
7.2.4.8 Verifying IPv6 Address Configuration |
|
|
157 | (1) |
|
7.2.4.9 Packet Tracer - Configuring IPv6 Addressing |
|
|
158 | (1) |
|
7.2.5 IPv6 Multicast Addresses |
|
|
158 | (2) |
|
7.2.5.1 Assigned IPv6 Multicast Addresses |
|
|
158 | (1) |
|
7.2.5.2 Solicited-Node IPv6 Multicast Addresses |
|
|
159 | (1) |
|
7.2.5.3 Lab - Identifying IPv6 Addresses |
|
|
159 | (1) |
|
7.2.5.4 Lab - Configuring IPv6 Addresses on Network Devices |
|
|
159 | (1) |
|
7.3 Connectivity Verification |
|
|
160 | (5) |
|
|
160 | (2) |
|
7.3.1.1 ICMPv4 and ICMPv6 |
|
|
160 | (1) |
|
7.3.1.2 ICMPv6 Router Solicitation and Router Advertisement Messages |
|
|
161 | (1) |
|
7.3.2 Testing and Verification |
|
|
162 | (3) |
|
7.3.2.1 Ping - Testing the Local Stack |
|
|
162 | (1) |
|
7.3.2.2 Ping - Testing Connectivity to the Local LAN |
|
|
162 | (1) |
|
7.3.2.3 Ping - Testing Connectivity to Remote |
|
|
163 | (1) |
|
7.3.2.4 Traceroute - Testing the Path |
|
|
163 | (1) |
|
7.3.2.5 Packet Tracer - Verifying IPv4 and IPv6 Addressing |
|
|
164 | (1) |
|
7.3.2.6 Packet Tracer - Pinging and Tracing to Test the Path |
|
|
164 | (1) |
|
7.3.2.7 Lab - Testing Network Connectivity with Ping and Traceroute |
|
|
164 | (1) |
|
7.3.2.8 Lab - Mapping the Internet |
|
|
164 | (1) |
|
7.3.2.9 Packet Tracer - Troubleshooting IPv4 and IPv6 Addressing |
|
|
164 | (1) |
|
|
165 | (2) |
|
|
165 | (5) |
|
7.4.1.1 Class Activity - The Internet of Everything...Naturally! |
|
|
165 | (1) |
|
7.4.1.2 Packet Tracer - Skills Integration Challenge |
|
|
165 | (1) |
|
|
165 | (2) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
167 | (2) |
Chapter 8 Subnetting IP Networks |
|
169 | (20) |
|
|
169 | (1) |
|
8.0.1.1 Subnetting IP Networks |
|
|
169 | (1) |
|
8.0.1.2 Class Activity - Call Me! |
|
|
169 | (1) |
|
8.1 Subnetting an IPv4 Network |
|
|
170 | (11) |
|
8.1.1 Network Segmentation |
|
|
170 | (1) |
|
8.1.1.1 Broadcast Domains |
|
|
170 | (1) |
|
8.1.1.2 Problems with Large Broadcast Domains |
|
|
170 | (1) |
|
8.1.1.3 Reasons for Subnetting |
|
|
171 | (1) |
|
8.1.2 Subnetting an IPv4 Network |
|
|
171 | (4) |
|
|
171 | (1) |
|
8.1.2.2 Subnetting on the Octet Boundary |
|
|
171 | (1) |
|
8.1.2.3 Classless Subnetting |
|
|
172 | (1) |
|
8.1.2.4 Video Demonstration - The Subnet Mask |
|
|
172 | (1) |
|
8.1.2.5 Video Demonstration - Subnetting with the Magic Number |
|
|
172 | (1) |
|
8.1.2.6 Classless Subnetting Example |
|
|
172 | (1) |
|
8.1.2.7 Creating 2 Subnets |
|
|
173 | (1) |
|
8.1.2.8 Video Demonstration - Creating Two Equal-Sized Subnets |
|
|
174 | (1) |
|
8.1.2.9 Subnetting Formulas |
|
|
174 | (1) |
|
8.1.2.10 Creating 4 Subnets |
|
|
174 | (1) |
|
8.1.2.11 Video Demonstration - Creating Four Equal-Sized Subnets |
|
|
174 | (1) |
|
8.1.2.12 Video Demonstration - Creating Eight Equal-Sized Subnets |
|
|
175 | (1) |
|
8.1.3 Subnetting a /16 and /8 Prefix |
|
|
175 | (1) |
|
8.1.3.1 Creating Subnets with a /16 prefix |
|
|
175 | (1) |
|
8.1.3.2 Creating 100 Subnets with a /16 Network |
|
|
175 | (1) |
|
8.1.3.3 Calculating the Hosts |
|
|
175 | (1) |
|
8.1.3.4 Video Demonstration - Creating One Hundred Equal-Sized Subnets |
|
|
176 | (1) |
|
8.1.3.5 Creating 1000 Subnets with a /8 Network |
|
|
176 | (1) |
|
8.1.3.6 Video Demonstration - Subnetting Across Multiple Octets |
|
|
176 | (1) |
|
8.1.4 Subnetting to Meet Requirements |
|
|
176 | (2) |
|
8.1.4.1 Subnetting Based on Host Requirements |
|
|
176 | (1) |
|
8.1.4.2 Subnetting Based on Network Requirements |
|
|
177 | (1) |
|
8.1.4.3 Network Requirement Example |
|
|
177 | (1) |
|
8.1.4.4 Activity - Calculate the Subnet Mask |
|
|
178 | (1) |
|
8.1.4.5 Activity - Determining the Number of Bits to Borrow |
|
|
178 | (1) |
|
8.1.4.6 Lab - Calculating IPv4 Subnets |
|
|
178 | (1) |
|
8.1.4.7 Packet Tracer - Subnetting Scenario 1 |
|
|
178 | (1) |
|
8.1.4.8 Lab - Designing and Implementing a Subnetted IPv4 Addressing Scheme |
|
|
178 | (1) |
|
8.1.5 Benefits of Variable Length Subnet Masking |
|
|
178 | (3) |
|
8.1.5.1 Traditional Subnetting Wastes Addresses |
|
|
178 | (1) |
|
8.1.5.2 Variable Length Subnet Masks |
|
|
179 | (1) |
|
|
179 | (1) |
|
8.1.5.4 Video Demonstration - Basic VLSM |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
8.1.5.7 Video Demonstration - VLSM Example |
|
|
181 | (1) |
|
8.1.5.8 Activity - Practicing VLSM |
|
|
181 | (1) |
|
|
181 | (2) |
|
|
181 | (2) |
|
8.2.1.1 Network Address Planning |
|
|
181 | (1) |
|
8.2.1.2 Planning to Address the Network |
|
|
182 | (1) |
|
8.2.1.3 Assigning Addresses to Devices |
|
|
182 | (1) |
|
8.2.1.4 Packet Tracer - Designing and Implementing a VLSM Addressing Scheme |
|
|
183 | (1) |
|
8.2.1.5 Lab - Designing and Implementing a VLSM Addressing Scheme |
|
|
183 | (1) |
|
8.3 Design Considerations for IPv6 |
|
|
183 | (1) |
|
8.3.1 Subnetting an IPv6 Network |
|
|
183 | (1) |
|
8.3.1.1 The IPv6 Global Unicast Address |
|
|
183 | (1) |
|
8.3.1.2 Subnetting Using the Subnet ID |
|
|
183 | (1) |
|
8.3.1.3 IPv6 Subnet Allocation |
|
|
184 | (1) |
|
8.3.1.4 Packet Tracer - Implementing a Subnetted IPv6 Addressing Scheme |
|
|
184 | (1) |
|
|
184 | (3) |
|
|
184 | (6) |
|
8.4.1.1 Class Activity - Can you call me now? |
|
|
184 | (1) |
|
8.4.1.2 Packet Tracer - Skills Integration Challenge |
|
|
185 | (1) |
|
8.4.1.3 Subnetting IP Networks |
|
|
185 | (2) |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
187 | (2) |
Chapter 9 Transport Layer |
|
189 | (18) |
|
|
189 | (1) |
|
|
189 | (1) |
|
9.0.1.2 Class Activity - We Need to Talk - Game |
|
|
189 | (1) |
|
9.1 Transport Layer Protocols |
|
|
190 | (6) |
|
9.1.1 Transportation of Data |
|
|
190 | (2) |
|
9.1.1.1 Role of the Transport Layer |
|
|
190 | (1) |
|
9.1.1.2 Transport Layer Responsibilities |
|
|
190 | (1) |
|
9.1.1.3 Conversation Multiplexing |
|
|
190 | (1) |
|
9.1.1.4 Transport Layer Reliability |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
9.1.1.7 The Right Transport Layer Protocol for the Right Application |
|
|
192 | (1) |
|
9.1.2 TCP and UDP Overview |
|
|
192 | (4) |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
194 | (1) |
|
|
194 | (1) |
|
9.1.2.5 Multiple Separate Conversations |
|
|
194 | (1) |
|
|
194 | (1) |
|
|
195 | (1) |
|
9.1.2.8 Port Number Groups |
|
|
195 | (1) |
|
9.1.2.9 The netstat Command |
|
|
196 | (1) |
|
9.1.2.10 Activity - Compare TCP and UDP Characteristics |
|
|
196 | (1) |
|
|
196 | (7) |
|
9.2.1 TCP Communication Process |
|
|
196 | (2) |
|
9.2.1.1 TCP Server Processes |
|
|
196 | (1) |
|
9.2.1.2 TCP Connection Establishment |
|
|
196 | (1) |
|
9.2.1.3 TCP Session Termination |
|
|
197 | (1) |
|
9.2.1.4 TCP Three-way Handshake Analysis |
|
|
197 | (1) |
|
9.2.1.5 Video Demonstration - TCP 3-Way Handshake |
|
|
198 | (1) |
|
9.2.1.6 Lab - Using Wireshark to Observe the TCP 3-Way Handshake |
|
|
198 | (1) |
|
9.2.1.7 Activity - TCP Connection and Termination Process |
|
|
198 | (1) |
|
9.2.2 Reliability and Flow Control |
|
|
198 | (2) |
|
9.2.2.1 TCP Reliability - Ordered Delivery |
|
|
198 | (1) |
|
9.2.2.2 Video Demonstration - Sequence Numbers and Acknowledgments |
|
|
199 | (1) |
|
9.2.2.3 Video Demonstration - Data Loss and Retransmission |
|
|
199 | (1) |
|
9.2.2.4 TCP Flow Control - Window Size and Acknowledgments |
|
|
199 | (1) |
|
9.2.2.5 TCP Flow Control - Congestion Avoidance |
|
|
200 | (1) |
|
|
200 | (2) |
|
9.2.3.1 UDP Low Overhead versus Reliability |
|
|
200 | (1) |
|
9.2.3.2 UDP Datagram Reassembly |
|
|
201 | (1) |
|
9.2.3.3 UDP Server Processes and Requests |
|
|
201 | (1) |
|
9.2.3.4 UDP Client Processes |
|
|
201 | (1) |
|
9.2.3.5 Lab - Using Wireshark to Examine a UDP DNS Capture |
|
|
202 | (1) |
|
|
202 | (1) |
|
9.2.4.1 Applications that use TCP |
|
|
202 | (1) |
|
9.2.4.2 Applications that use UDP |
|
|
202 | (1) |
|
9.2.4.3 Lab - Using Wireshark to Examine FTP and TFTP Captures |
|
|
202 | (1) |
|
9.2.4.4 Activity - TCP, UDP, or Both |
|
|
202 | (1) |
|
|
203 | (2) |
|
|
203 | (4) |
|
9.3.1.1 Class Activity - We Need to Talk, Again - Game |
|
|
203 | (1) |
|
9.3.1.2 Packet Tracer - TCP and UDP Communications |
|
|
203 | (1) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
205 | (2) |
Chapter 10 Application Layer |
|
207 | (14) |
|
|
207 | (1) |
|
10.0.1.1 Chapter 10: Application Layer |
|
|
207 | (1) |
|
10.0.1.2 Class Activity — Application Investigation |
|
|
207 | (1) |
|
10.1 Application Layer Protocols |
|
|
207 | (3) |
|
10.1.1 Application, Presentation, and Session |
|
|
207 | (1) |
|
10.1.1.1 Application Layer |
|
|
207 | (1) |
|
10.1.1.2 Presentation and Session Layer |
|
|
208 | (1) |
|
10.1.1.3 TCP/IP Application Layer Protocols |
|
|
208 | (1) |
|
10.1.1.4 Activity — Application and Presentation (Protocols and Standards) |
|
|
208 | (1) |
|
10.1.2 How Application Protocols Interact with End-User Applications |
|
|
208 | (2) |
|
10.1.2.1 Client-Server Model |
|
|
208 | (1) |
|
10.1.2.2 Peer-to-Peer Networks |
|
|
209 | (1) |
|
10.1.2.3 Peer-to-Peer Applications |
|
|
209 | (1) |
|
10.1.2.4 Common P2P Applications |
|
|
209 | (1) |
|
10.1.2.5 Lab — Researching Peer-to-Peer File Sharing |
|
|
210 | (1) |
|
10.2 Well-Known Application Layer Protocols and Services |
|
|
210 | (7) |
|
10.2.1 Web and Email Protocols |
|
|
210 | (2) |
|
10.2.1.1 Hypertext Transfer Protocol and Hypertext Markup Language |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
211 | (1) |
|
|
211 | (1) |
|
|
212 | (1) |
|
|
212 | (1) |
|
10.2.1.7 Packet Tracer — Web and Email |
|
|
212 | (1) |
|
10.2.2 IP Addressing Services |
|
|
212 | (3) |
|
10.2.2.1 Domain Name Service |
|
|
212 | (1) |
|
10.2.2.2 DNS Message Format |
|
|
213 | (1) |
|
|
213 | (1) |
|
10.2.2.4 The nslookup Command |
|
|
214 | (1) |
|
10.2.2.5 Dynamic Host Configuration Protocol |
|
|
214 | (1) |
|
|
215 | (1) |
|
10.2.2.7 Packet Tracer — DHCP and DNS Servers |
|
|
215 | (1) |
|
10.2.2.8 Lab — Observing DNS Servers |
|
|
215 | (1) |
|
10.2.3 File Sharing Services |
|
|
215 | (2) |
|
10.2.3.1 File Transfer Protocol |
|
|
215 | (1) |
|
10.2.3.2 Server Message Block |
|
|
216 | (1) |
|
10.2.3.3 Packet Tracer - FTP |
|
|
216 | (1) |
|
10.2.3.4 Lab — Exploring FTP |
|
|
217 | (1) |
|
|
217 | (2) |
|
|
217 | (4) |
|
10.3.1.1 Modeling Activity — Make it happen! |
|
|
217 | (1) |
|
10.3.1.2 Packet Tracer - Explore a Network |
|
|
217 | (1) |
|
10.3.1.3 Packet Tracer - Multiuser - Tutorial |
|
|
217 | (1) |
|
10.3.1.4 Packet Tracer Multiuser - Implement Services |
|
|
217 | (1) |
|
10.3.1.5 Application Layer |
|
|
217 | (2) |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
219 | (2) |
Chapter 11 Build a Small Network |
|
221 | (28) |
|
|
221 | (1) |
|
11.0.1.1 Build a Small Network |
|
|
221 | (1) |
|
11.0.1.2 Class Activity - Did You Notice...? |
|
|
221 | (1) |
|
|
221 | (6) |
|
11.1.1 Devices in a Small Network |
|
|
221 | (3) |
|
11.1.1.1 Small Network Topologies |
|
|
221 | (1) |
|
11.1.1.2 Device Selection for a Small Network |
|
|
222 | (1) |
|
11.1.1.3 IP Addressing for a Small Network |
|
|
223 | (1) |
|
11.1.1.4 Redundancy in a Small Network |
|
|
223 | (1) |
|
11.1.1.5 Traffic Management |
|
|
224 | (1) |
|
11.1.2 Small Network Applications and Protocols |
|
|
224 | (2) |
|
11.1.2.1 Common Applications |
|
|
224 | (1) |
|
11.1.2.2 Common Protocols |
|
|
224 | (1) |
|
11.1.2.3 Voice and Video Applications |
|
|
225 | (1) |
|
11.1.3 Scale to Larger Networks |
|
|
226 | (1) |
|
11.1.3.1 Small Network Growth |
|
|
226 | (1) |
|
11.1.3.2 Protocol Analysis |
|
|
226 | (1) |
|
11.1.3.3 Employee Network Utilization |
|
|
226 | (1) |
|
|
227 | (7) |
|
11.2.1 Security Threats and Vulnerabilities |
|
|
227 | (1) |
|
11.2.1.1 Types of Threats |
|
|
227 | (1) |
|
11.2.1.2 Physical Security |
|
|
227 | (1) |
|
11.2.1.3 Types of Vulnerabilities |
|
|
228 | (1) |
|
11.2.1.4 Activity - Security Threats and Vulnerabilities |
|
|
228 | (1) |
|
|
228 | (2) |
|
11.2.2.1 Types of Malware |
|
|
228 | (1) |
|
11.2.2.2 Reconnaissance Attacks |
|
|
229 | (1) |
|
|
229 | (1) |
|
11.2.2.4 Denial of Service Attacks |
|
|
230 | (1) |
|
11.2.2.5 Activity - Types of Attack |
|
|
230 | (1) |
|
11.2.2.6 Lab - Researching Network Security Threats |
|
|
230 | (1) |
|
11.2.3 Network Attack Mitigation |
|
|
230 | (1) |
|
11.2.3.1 Backup, Upgrade, Update, and Patch |
|
|
230 | (1) |
|
11.2.3.2 Authentication, Authorization, and Accounting |
|
|
230 | (1) |
|
|
231 | (1) |
|
11.2.3.4 Endpoint Security |
|
|
231 | (1) |
|
|
231 | (3) |
|
11.2.4.1 Device Security Overview |
|
|
231 | (1) |
|
|
232 | (1) |
|
11.2.4.3 Basic Security Practices |
|
|
232 | (1) |
|
|
233 | (1) |
|
11.2.4.5 Packet Tracer - Configuring Secure Passwords and SSH |
|
|
233 | (1) |
|
11.2.4.6 Lab - Accessing Network Devices with SSH |
|
|
233 | (1) |
|
11.2.4.7 Lab - Examining Telnet and SSH in Wireshark |
|
|
234 | (1) |
|
11.2.4.8 Lab - Securing Network Devices |
|
|
234 | (1) |
|
11.3 Basic Network Performance |
|
|
234 | (7) |
|
|
234 | (1) |
|
11.3.1.1 Interpreting Ping Results |
|
|
234 | (1) |
|
|
235 | (1) |
|
11.3.1.3 Network Baseline |
|
|
235 | (1) |
|
11.3.2 The traceroute and tracert Command |
|
|
235 | (2) |
|
11.3.2.1 Interpreting Trace Messages |
|
|
235 | (1) |
|
11.3.2.2 Extended Traceroute |
|
|
236 | (1) |
|
11.3.2.3 Packet Tracer - Test Connectivity with Traceroute |
|
|
236 | (1) |
|
11.3.2.4 Lab -Testing Network Latency with Ping and Traceroute |
|
|
236 | (1) |
|
|
237 | (1) |
|
11.3.3.1 Common show Commands Revisited |
|
|
237 | (1) |
|
11.3.3.2 Video Demonstration - The show version Command |
|
|
237 | (1) |
|
11.3.3.3 Packet Tracer - Using show Commands |
|
|
237 | (1) |
|
11.3.4 Host and IOS Commands |
|
|
237 | (2) |
|
11.3.4.1 The ipconfig Command |
|
|
237 | (1) |
|
|
238 | (1) |
|
11.3.4.3 The show cdp neighbors Command |
|
|
238 | (1) |
|
11.3.4.4 The show ip interface brief Command |
|
|
239 | (1) |
|
11.3.4.5 Activity - Show Commands |
|
|
239 | (1) |
|
11.3.4.6 Lab - Using the CLI to Gather Network Device Information |
|
|
239 | (1) |
|
|
239 | (2) |
|
11.3.5.1 The debug Command |
|
|
239 | (1) |
|
11.3.5.2 The terminal monitor Command |
|
|
240 | (1) |
|
11.4 Network Troubleshooting |
|
|
241 | (4) |
|
11.4.1 Troubleshooting Methodologies |
|
|
241 | (1) |
|
11.4.1.1 Basic Troubleshooting Approaches |
|
|
241 | (1) |
|
11.4.1.2 Resolve or Escalate? |
|
|
241 | (1) |
|
11.4.1.3 Verify and Monitor Solution |
|
|
241 | (1) |
|
11.4.1.4 Activity - Order the Troubleshooting Steps |
|
|
242 | (1) |
|
11.4.2 Troubleshoot Cables and Interfaces |
|
|
242 | (1) |
|
11.4.2.1 Duplex Operation |
|
|
242 | (1) |
|
|
242 | (1) |
|
11.4.3 Troubleshooting Scenarios |
|
|
243 | (2) |
|
11.4.3.1 IP Addressing Issues on IOS Devices |
|
|
243 | (1) |
|
11.4.3.2 IP Addressing Issues on End Devices |
|
|
243 | (1) |
|
11.4.3.3 Default Gateway Issues |
|
|
244 | (1) |
|
11.4.3.4 Troubleshooting DNS Issues |
|
|
244 | (1) |
|
11.4.3.5 Lab - Troubleshooting Connectivity Issues |
|
|
245 | (1) |
|
11.4.3.6 Packet Tracer - Troubleshooting Connectivity Issues |
|
|
245 | (1) |
|
|
245 | (3) |
|
|
245 | (3) |
|
11.5.1.1 Class Activity - Design and Build a Small Business Network |
|
|
245 | (1) |
|
11.5.1.2 Packet Tracer - Skill Integration Challenge |
|
|
246 | (1) |
|
11.5.1.3 Packet Tracer - Troubleshooting Challenge |
|
|
246 | (1) |
|
11.5.1.4 Build a Small Network |
|
|
246 | (2) |
|
|
248 | (1) |
|
|
248 | (1) |
|
|
248 | (1) |
Index |
|
249 | |