Muutke küpsiste eelistusi

Network Basics Companion Guide [Kõva köide]

  • Formaat: Hardback, 720 pages, kõrgus x laius x paksus: 100x100x100 mm, kaal: 100 g
  • Sari: Companion Guide
  • Ilmumisaeg: 18-Dec-2013
  • Kirjastus: Cisco Press
  • ISBN-10: 1587133172
  • ISBN-13: 9781587133176
  • Kõva köide
  • Hind: 76,81 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Hardback, 720 pages, kõrgus x laius x paksus: 100x100x100 mm, kaal: 100 g
  • Sari: Companion Guide
  • Ilmumisaeg: 18-Dec-2013
  • Kirjastus: Cisco Press
  • ISBN-10: 1587133172
  • ISBN-13: 9781587133176
Network Basics Companion Guide is the official supplemental textbook for the Network Basics course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.

 

Using a top-down OSI model approach, the course introduces the architecture, structure, functions, components, and models of the Internet and computer networks. The principles of IP addressing and fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. By the end of the course, you will be able to build simple LANs, perform basic configurations for  routers and switches, and implement IP addressing schemes.

 

The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.

 

The books features help you focus on important concepts to succeed in this course:

 

Chapter ObjectivesReview core concepts by answering the focus questions listed at the beginning of each chapter.

Key TermsRefer to the lists of networking vocabulary introduced and highlighted in context in each chapter.

GlossaryConsult the comprehensive Glossary with more than 250 terms.

Summary of Activities and LabsMaximize your study time with this complete list of all associated practice exercises at the end of each chapter.

Check Your UnderstandingEvaluate your readiness with the end-ofchapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.

 

How ToLook for this icon to study the steps you need to learn to performcertain tasks.

Interactive ActivitiesReinforce your understanding of topics with more than 50 different exercises from the online course identified throughout the book with this icon.

VideosWatch the videos embedded within the online course.

Packet Tracer ActivitiesExplore and visualize networking concepts using Packet Tracer exercises interspersed throughout the chapters.

Hands-on LabsWork through all 68 course labs and Class Activities that are included in the course and published in the separate Lab Manual.

    
Introduction xxiv
Chapter 1 Exploring the Network
1(54)
Objectives
1(1)
Key Terms
1(2)
Introduction (1.0.1.1)
3(1)
Communicating in a Network-Centric World (1.1)
4(9)
Interconnecting Our Lives (1.1.1)
4(1)
Networks in Our Daily Lives (1.1.1.1)
4(1)
Technology Then and Now (1.1.1.2)
5(1)
The Global Community (1.1.1.3)
6(1)
Networks Support the Way We Learn (1.1.1.4)
6(1)
Networks Support the Way We Communicate (1.1.1.5)
7(2)
Networks Support the Way We Work (1.1.1.6)
9(1)
Networks Support the Way We Play (1.1.1.7)
9(1)
Supporting Communication (1.1.2)
10(1)
What Is Communication? (1.1.2.1)
10(2)
Quality of Communication (1.1.2.2)
12(1)
The Network as a Platform (1.2)
13(10)
Converged Networks (1.2.1)
13(1)
Traditional Service Networks (1.2.1.1)
13(1)
Planning for the Future (1.2.1.2)
14(1)
Reliable Network (1.2.2)
15(1)
The Supporting Network Architecture (1.2.2.1)
15(1)
Fault Tolerance in Circuit-Switched Networks (1.2.2.2)
15(2)
Packet-Switched Networks (1.2.2.3)
17(1)
Scalable Networks (1.2.2.4)
18(2)
Providing QoS (1.2.2.5)
20(1)
Providing Network Security (1.2.2.6)
21(2)
LANs, WANs, and the Internet (1.3)
23(12)
Components of a Network (1.3.1)
23(1)
Components of the Network (1.3.1.1)
23(1)
End Devices (1.3.1.2)
24(1)
Intermediary Devices (1.3.1.3)
25(1)
Network Media (1.3.1.4)
25(1)
Network Representations (1.3.1.5)
26(2)
Topology Diagrams (1.3.1.6)
28(1)
LANs and WANs (1.3.2)
28(1)
Types of Networks (1.3.2.1)
28(1)
Local-Area Networks (1.3.2.2)
29(1)
Wide-Area Networks (1.3.2.3)
30(1)
The Internet (1.3.3)
30(1)
The Internet (1.3.3.1)
30(1)
Intranet and Extranet (1.3.3.2)
31(1)
Connecting to the Internet (1.3.4)
32(1)
Internet Access Technologies (1.3.4.1)
32(1)
Connecting Remote Users to the Internet (1.3.4.2)
33(1)
Connecting Businesses to the Internet (1.3.4.3)
34(1)
The Expanding Network (1.4)
35(14)
Network Trends (1.4.1)
36(1)
New Trends (1.4.1.1)
36(1)
Bring Your Own Device (BYOD) (1.4.1.2)
36(1)
BYOD Considerations (1.4.1.3)
37(1)
Online Collaboration (1.4.1.4)
38(1)
Collaboration Considerations (1.4.1.5)
38(1)
Video Communication (1.4.1.6)
39(1)
Cloud Computing (1.4.1.7)
40(1)
Types of Clouds (1.4.1.8)
41(1)
Data Centers (1.4.1.9)
41(1)
Network Security (1.4.2)
42(1)
Security Threats (1.4.2.1)
42(2)
Security Solutions (1.4.2.2)
44(1)
Network Architectures (1.4.3)
45(1)
Cisco Network Architectures (1.4.3.1)
45(1)
Cisco Borderless Network (1.4.3.2)
46(1)
Collaboration Architecture (1.4.3.3)
46(1)
Data Center Architecture (1.4.3.4)
47(1)
CCNA (1.4.3.5)
47(2)
Summary (1.5)
49(1)
Practice
50(1)
Class Activities
50(1)
Labs
50(1)
Packet Tracer Activity
50(1)
Check Your Understanding
50(5)
Chapter 2 Configuring a Network Operating System
55(46)
Objectives
55(1)
Key Terms
55(1)
Introduction (2.0.1.1)
56(1)
IOS Bootcamp (2.1)
56(20)
Cisco IOS (2.1.1)
56(1)
Purpose of OS (2.1.1.1)
56(1)
Location of the Cisco IOS (2.1.1.2)
57(1)
IOS Functions (2.1.1.3)
58(1)
Accessing a Cisco IOS Device (2.1.2)
59(1)
Console Access Method (2.1.2.1)
59(1)
Telnet, SSH, and AUX Access Methods (2.1.2.2)
60(1)
Terminal Emulation Programs (2.1.2.3)
61(1)
Navigating the IOS (2.1.3)
61(1)
Cisco IOS Modes of Operation (2.1.3.1)
62(1)
Primary Modes (2.1.3.2)
63(1)
Global Configuration Mode and Submodes (2.1.3.3)
64(1)
Navigating Between IOS Modes (2.1.3.4, 2.1.3.5)
65(1)
The Command Structure (2.1.4)
66(1)
IOS Command Structure (2.1.4.1)
67(1)
Cisco IOS Command Reference (2.1.4.2)
68(2)
Context-Sensitive Help (2.1.4.3)
70(1)
Command Syntax Check (2.1.4.4)
71(1)
Hot Keys and Shortcuts (2.1.4.5)
72(2)
IOS Examination Commands (2.1.4.6)
74(1)
The show version Command (2.1.4.7)
75(1)
Getting Basic (2.2)
76(12)
Hostnames (2.2.1)
76(1)
Why the Switch (2.2.1.1)
76(1)
Device Names (2.2.1.2)
76(2)
Hostnames (2.2.1.3)
78(1)
Configuring Hostnames (2.2.1.4)
78(1)
Limiting Access to Device Configurations (2.2.2)
79(1)
Securing Device Access (2.2.2.1)
79(1)
Securing Privileged EXEC Access (2.2.2.2)
80(1)
Securing User EXEC Access (2.2.2.3)
81(1)
Encrypting Password Display (2.2.2.4)
82(1)
Banner Messages (2.2.2.5)
83(1)
Saving Configurations (2.2.3)
84(1)
Configuration Files (2.2.3.1)
84(3)
Capturing Text (2.2.3.2)
87(1)
Address Schemes (2.3)
88(8)
Ports and Addresses (2.3.1)
88(1)
IP Addressing of Devices (2.3.1.1)
88(1)
Interfaces and Ports (2.3.1.2)
89(1)
Addressing Devices (2.3.2)
90(1)
Configuring a Switch Virtual Interface (2.3.2.1)
90(1)
Manual IP Address Configuration for End Devices (2.3.2.2)
91(1)
Automatic IP Address Configuration for End Devices (2.3.2.3)
91(1)
IP Address Conflicts (2.3.2.4)
92(1)
Verifying Connectivity (2.3.3)
93(1)
Test the Loopback Address on an End Device (2.3.3.1)
93(1)
Testing the Interface Assignment (2.3.3.2)
94(1)
Testing End-to-End Connectivity (2.3.3.3)
94(2)
Summary (2.4)
96(1)
Practice
97(1)
Class Activities
97(1)
Labs
97(1)
Packet Tracer Activities
97(1)
Check Your Understanding
97(4)
Chapter 3 Network Protocols and Communications
101(38)
Objectives
101(1)
Key Terms
101(2)
Introduction (3.0.1.1)
103(1)
Network Protocols and Standards (3.1)
103(15)
Protocols (3.1.1)
103(1)
Protocols: Rules that Govern Communications (3.1.1.1)
103(2)
Network Protocols (3.1.1.2)
105(1)
Interaction of Protocols (3.1.1.3)
105(1)
Protocol Suites (3.1.2)
106(1)
Protocol Suites and Industry Standards (3.1.2.1)
106(1)
Creation of the Internet and Development of TCP/IP (3.1.2.2)
107(1)
TCP/IP Protocol Suite and Communication Process (3.1.2.3)
108(1)
Standards Organizations (3.1.3)
109(1)
Open Standards (3.1.3.1)
109(1)
ISOC, IAB, and IETF (3.1.3.2)
110(1)
IEEE (3.1.3.3)
111(1)
ISO (3.1.3.4)
112(1)
Other Standards Organizations (3.1.3.5)
112(1)
Reference Models (3.1.4)
113(1)
The Benefits of Using a Layered Model (3.1.4.1)
113(2)
The OSI Reference Model (3.1.4.2)
115(1)
The TCP/IP Protocol Model (3.1.4.3)
116(1)
Comparing the OSI Model with the TCP/IP Model (3.1.4.4)
116(2)
Using Requests for Comments (3.2)
118(5)
Why RFCs (3.2.1)
118(1)
Request for Comments (RFC) (3.2.1.1)
118(1)
History of RFCs (3.2.1.2)
119(1)
Sample RFC (3.2.1.3)
119(1)
RFC Processes (3.2.2)
120(1)
RFC Process (3.2.2.1)
120(1)
RFC Types (3.2.2.2)
121(2)
Moving Data in the Network (3.3)
123(11)
Data Encapsulation (3.3.1)
123(1)
Elements of Communication (3.3.1.1)
123(1)
Communicating the Messages (3.3.1.2)
124(1)
Protocol Data Units (PDUs) (3.3.1.3)
125(1)
Encapsulation (3.3.1.4)
126(1)
De-encapsulation (3.3.1.5)
127(1)
Accessing Local Resources (3.3.2)
127(1)
Network Addresses and Data Link Addresses (3.3.2.1)
127(1)
Communicating with a Device on the Same Network (3.3.2.2)
128(1)
MAC and IP Addresses (3.3.2.3)
129(1)
Accessing Remote Resources (3.3.3)
130(1)
Default Gateway (3.3.3.1)
130(1)
Communicating with a Device on a Remote Network (3.3.3.2)
131(3)
Summary (3.4)
134(1)
Practice
135(1)
Class Activities
135(1)
Labs
135(1)
Packet Tracer Activities
135(1)
Check Your Understanding
135(4)
Chapter 4 Application Layer
139(30)
Objectives
139(1)
Key Terms
139(1)
Introduction (4.0.1.1)
140(1)
Application Layer Protocols (4.1)
140(9)
Application, Session, and Presentation (4.1.1)
140(1)
OSI and TCP/IP Models Revisited (4.1.1.1)
140(1)
Application Layer (4.1.1.2)
141(1)
Presentation and Session Layers (4.1.1.3)
141(2)
TCP/IP Application Layer Protocols (4.1.1.4)
143(1)
Services at the Application Layer (4.1.1.5; 4.1.1.6)
144(1)
Applications Interface with People and Other Applications (4.1.1.7)
145(1)
How Application Protocols Interact with End-User Applications (4.1.2)
145(1)
Peer-to-Peer Networks (4.1.2.1)
145(1)
Peer-to-Peer Applications (4.1.2.2)
146(1)
Common P2P Applications (4.1.2.3)
147(1)
Client-Server Model (4.1.2.5)
148(1)
Well-Known Application Layer Protocols and Services (4.2)
149(15)
Everyday Application Layer Protocols (4.2.1)
149(1)
Application Layer Protocols Revisited (4.2.1.1)
149(1)
Hypertext Transfer Protocol and Hypertext Markup Language (4.2.1.2)
150(1)
HTTP and HTTPS (4.2.1.3)
151(1)
SMTP and POP (4.2.1.4-4.2.1.7)
152(2)
Providing IP Addressing Services (4.2.2)
154(1)
Domain Name Service (4.2.2.1)
154(1)
DNS Message Format (4.2.2.2)
155(1)
DNS Hierarchy (4.2.2.3)
156(1)
nslookup (4.2.2.4)
157(1)
Dynamic Host Configuration Protocol (4.2.2.6)
158(1)
DHCP Operation (4.2.2.7)
159(2)
Providing File Sharing Services (4.2.3)
161(1)
File Transfer Protocol (4.2.3.1)
161(1)
Server Message Block (4.2.3.4)
162(2)
Summary (4.3)
164(1)
Practice
165(1)
Class Activities
165(1)
Labs
165(1)
Packet Tracer Activities
165(1)
Check Your Understanding
166(3)
Chapter 5 Transport Layer
169(42)
Objectives
169(1)
Key Terms
169(1)
Introduction (5.0.1.1)
170(1)
Transport Layer Protocols (5.1)
170(18)
Transportation of Data (5.1.1)
170(1)
Role of the Transport Layer (5.1.1.1, 5.1.1.2)
170(3)
Conversation Multiplexing (5.1.1.3)
173(1)
Transport Layer Reliability (5.1.1.4)
174(1)
TCP (5.1.1.5)
175(1)
UDP (5.1.1.6)
176(1)
The Right Transport Layer Protocol for the Right Application (5.1.1.7)
176(2)
Introducing TCP and UDP (5.1.2)
178(1)
Introducing TCP (5.1.2.1)
178(1)
Role of TCP (5.1.2.2)
179(1)
Introducing UDP (5.1.2.3)
180(1)
Role of UDP (5.1.2.4)
181(1)
Separating Multiple Communications (5.1.2.5)
181(2)
TCP and UDP Port Addressing (5.1.2.6-5.1.2.9)
183(4)
TCP and UDP Segmentation (5.1.2.10)
187(1)
TCP and UDP (5.2)
188(17)
TCP Communication (5.2.1)
188(1)
TCP Reliable Delivery (5.2.1.1)
188(1)
TCP Server Processes (5.2.1.2)
189(1)
TCP Connection Establishment (5.2.1.3)
189(2)
TCP Three-way Handshake Analysis: Step 1 (5.2.1.4)
191(1)
TCP Three-way Handshake Analysis: Step 2 (5.2.1.5)
192(1)
TCP Three-way Handshake Analysis: Step 3 (5.2.1.6)
193(1)
TCP Session Termination Analysis (5.2.1.7)
194(1)
Protocol Data Units (5.2.2)
195(1)
TCP Reliability---Ordered Delivery (5.2.2.1)
195(1)
TCP Reliability---Acknowledgement and Window Size (5.2.2.2)
196(1)
TCP Reliability---Data Loss and Retransmission (5.2.2.3)
197(1)
TCP Flow Control---Window Size and Acknowledgements (5.2.2.4)
198(1)
TCP Flow Control---Congestion Avoidance (5.2.2.5)
199(2)
UDP Communication (5.2.3)
201(1)
UDP Low Overhead Versus Reliability (5.2.3.1)
201(1)
UDP Datagram Reassembly (5.2.3.2)
201(1)
UDP Server Processes and Requests (5.2.3.3)
202(1)
UDP Client Processes (5.2.3.4)
202(1)
TCP or UDP---That Is the Question (5.2.4)
203(1)
Applications That Use TCP (5.2.4.1)
203(1)
Applications That Use UDP (5.2.4.2)
203(2)
Summary (5.3)
205(1)
Practice
206(1)
Class Activities
206(1)
Labs
206(1)
Packet Tracer Activity
206(1)
Check Your Understanding
206(5)
Chapter 6 Network Layer
211(54)
Objectives
211(1)
Key Terms
211(2)
Introduction (6.0.1.1)
213(1)
Network Layer Protocols (6.1)
213(13)
Network Layer in Communication (6.1.1)
213(1)
The Network Layer (6.1.1.1)
213(1)
Network Layer Protocols (6.1.1.2)
214(1)
Characteristics of the IP Protocol (6.1.2)
215(1)
Characteristics of IP (6.1.2.1)
215(1)
IP - Connectionless (6.1.2.2)
215(1)
IP - Best-Effort Delivery (6.1.2.3)
216(1)
IP - Media Independent (6.1.2.4)
217(1)
Encapsulating IP (6.1.2.5)
217(1)
IPv4 Packet (6.1.3)
218(1)
IPv4 Packet Header (6.1.3.1)
218(2)
IPv4 Header Fields (6.1.3.2)
220(1)
Sample IPv4 Headers (6.1.3.3)
221(1)
IPv6 Packet (6.1.4)
221(1)
Limitations of IPv4 (6.1.4.1)
221(1)
Introducing IPv6 (6.1.4.2)
222(1)
Encapsulating IPv6 (6.1.4.3)
223(1)
IPv6 Packet Header (6.1.4.4)
224(1)
Sample IPv6 Headers (6.1.4.5)
225(1)
Routing (6.2)
226(14)
Host Routing Tables (6.2.1)
226(1)
Host Packet Forwarding Decision (6.2.1.1)
226(1)
IPv4 Host Routing Table (6.2.1.2)
227(1)
IPv4 Host Routing Entries (6.2.1.3)
228(1)
Sample IPv4 Host Routing Table (6.2.1.4)
229(2)
Sample IPv6 Host Routing Table (6.2.1.5)
231(1)
Router Routing Tables (6.2.2)
232(1)
Router Packet Forwarding Decision (6.2.2.1)
232(1)
IPv4 Router Routing Table (6.2.2.2)
233(1)
Directly Connected Routing Table Entries (6.2.2.3)
234(1)
Remote Network Routing Table Entries (6.2.2.4)
235(1)
Next-Hop Address (6.2.2.5)
236(1)
Sample Router IPv4 Routing Table (6.2.2.6)
236(4)
Routers (6.3)
240(11)
Anatomy of a Router (6.3.1)
240(1)
A Router Is a Computer (6.3.1.1)
240(1)
Router CPU and OS (6.3.1.2)
241(1)
Router Memory (6.3.1.3)
241(2)
Inside a Router (6.3.1.4)
243(1)
Router Backplane (6.3.1.5)
244(1)
Connecting to a Router (6.3.1.6)
245(1)
LAN and WAN Interfaces (6.3.1.7)
245(2)
Router Bootup (6.3.2)
247(1)
Cisco IOS (6.3.2.1)
247(1)
Bootset Files (6.3.2.2)
247(1)
Router Bootup Process (6.3.2.3)
248(1)
Show Version Output (6.3.2.4)
249(2)
Configuring a Cisco Router (6.4)
251(7)
Configure Initial Settings (6.4.1)
251(1)
Router Configuration Steps (6.4.1.1)
251(1)
Configure Interfaces (6.4.2)
252(1)
Configure LAN Interfaces (6.4.2.1)
252(1)
Verify Interface Configuration (6.4.2.2)
253(1)
Configuring the Default Gateway (6.4.3)
254(1)
Default Gateway on a Host (6.4.3.1)
254(1)
Default Gateway on a Switch (6.4.3.2)
255(3)
Summary (6.5)
258(1)
Practice
259(1)
Class Activities
259(1)
Labs
259(1)
Packet Tracer Activities
259(1)
Check Your Understanding
260(5)
Chapter 7 IP Addressing
265(90)
Objectives
265(1)
Key Terms
265(2)
Introduction (7.0.1.1)
267(1)
IPv4 Network Addresses (7.1)
267(40)
IPv4 Address Structure (7.1.1)
267(1)
Binary Notation (7.1.1.1)
267(2)
Binary Number System (7.1.1.2)
269(2)
Converting a Binary Address to Decimal (7.1.1.3)
271(1)
Converting from Decimal to Binary (7.1.1.5, 7.1.1.6)
272(6)
IPv4 Subnet Mask (7.1.2)
278(1)
Network Portion and Host Portion of an IPv4 Address (7.1.2.1)
278(1)
Examining the Prefix Length (7.1.2.2)
279(2)
IPv4 Network, Host, and Broadcast Addresses (7.1.2.3)
281(3)
First Host and Last Host Addresses (7.1.2.4)
284(2)
Bitwise AND Operation (7.1.2.5)
286(2)
Importance of ANDing (7.1.2.6)
288(2)
IPv4 Unicast, Broadcast, and Multicast (7.1.3)
290(1)
Assigning a Static IPv4 Address to a Host (7.1.3.1)
290(2)
Assigning a Dynamic IPv4 Address to a Host (7.1.3.2)
292(1)
Unicast Transmission (7.1.3.3)
293(1)
Broadcast Transmission (7.1.3.4)
294(2)
Multicast Transmission (7.1.3.5)
296(2)
Types of IPv4 Addresses (7.1.4)
298(1)
Public and Private IPv4 Addresses (7.1.4.1)
298(1)
Special-Use IPv4 Addresses (7.1.4.3)
299(2)
Legacy Classful Addressing (7.1.4.4)
301(3)
Assignment of IP Addresses (7.1.4.5, 7.1.4.6)
304(3)
IPv6 Network Addresses (7.2)
307(33)
IPv4 Issues (7.2.1)
307(1)
The Need for IPv6 (7.2.1.1)
307(2)
IPv4 and IPv6 Coexistence (7.2.1.2)
309(1)
IPv6 Addressing (7.2.2)
310(1)
Hexadecimal Number System (7.2.2.1)
310(2)
IPv6 Address Representation (7.2.2.2)
312(1)
Rule 1 Omitting Leading 0s (7.2.2.3)
313(2)
Rule 2 Omitting All 0 Segments (7.2.2.4)
315(2)
Types of IPv6 Addresses (7.2.3)
317(1)
IPv6 Address Types (7.2.3.1)
317(1)
IPv6 Prefix Length (7.2.3.2)
318(1)
IPv6 Unicast Addresses (7.2.3.3)
319(2)
IPv6 Link-Local Unicast Addresses (7.2.3.4)
321(1)
IPv6 Unicast Addresses (7.2.4)
322(1)
Structure of an IPv6 Global Unicast Address (7.2.4.1)
322(2)
Static Configuration of a Global Unicast Address (7.2.4.2)
324(2)
Dynamic Configuration of a Global Unicast Address Using SLAAC (7.2.4.3)
326(3)
Dynamic Configuration of a Global Unicast Address Using DHCPv6 (7.2.4.4)
329(1)
EUI-64 Process or Randomly Generated (7.2.4.5)
330(2)
Dynamic Link-Local Addresses (7.2.4.6)
332(1)
Static Link-Local Addresses (7.2.4.7)
333(1)
Verifying IPv6 Address Configuration (7.2.4.8)
334(3)
IPv6 Multicast Addresses (7.2.5)
337(1)
Solicited-Node IPv6 Multicast Addresses (7.2.5.2)
338(2)
Connectivity Verification (7.3)
340(9)
ICMP (7.3.1)
340(1)
ICMPv4 and ICMPv6 Messages (7.3.1.1)
340(2)
ICMPv6 Router Solicitation and Router Advertisement Messages (7.3.1.2)
342(1)
ICMPv6 Neighbor Solicitation and Neighbor Advertisement Messages (7.3.1.3)
343(1)
Testing and Verification (7.3.2)
344(1)
Ping: Testing the Local Stack (7.3.2.1)
344(1)
Ping: Testing Connectivity to the Local LAN (7.3.2.2)
345(1)
Ping: Testing Connectivity to Remote Device (7.3.2.3)
346(1)
Traceroute: Testing the Path (7.3.2.4)
347(2)
Summary (7.4)
349(1)
Practice
350(1)
Class Activities
350(1)
Labs
350(1)
Packet Tracer Activities
350(1)
Check Your Understanding
351(4)
Chapter 8 Subnetting IP Networks
355(54)
Objectives
355(1)
Key Terms
355(1)
Introduction (8.0.1.1)
356(1)
Subnetting an IPv4 Network (8.1)
357(36)
Network Segmentation (8.1.1)
357(1)
Reasons for Subnetting (8.1.1.1)
357(1)
Communication Between Subnets (8.1.1.2)
358(1)
Subnetting an IPv4 Network (8.1.2)
359(1)
Basic Subnetting (8.1.2.1)
359(2)
Subnets in Use (8.1.2.2)
361(3)
Subnetting Formulas (8.1.2.3)
364(1)
Creating 4 Subnets (8.1.2.4)
365(3)
Creating 8 Subnets (8.1.2.5)
368(4)
Creating 100 Subnets with a / 16 Prefix (8.1.2.10)
372(2)
Calculating the Hosts (8.1.2.11)
374(1)
Creating 1000 Subnets with a /8 Prefix (8.1.2.12)
375(3)
Determining the Subnet Mask (8.1.3)
378(1)
Subnetting Based on Host Requirements (8.1.3.1)
378(1)
Subnetting Network-Based Requirements (8.1.3.2)
379(1)
Subnetting to Meet Network Requirements (8.1.3.3, 8.1.3.4)
380(4)
Benefits of Variable Length Subnet Masking (8.1.4)
384(1)
Traditional Subnetting Wastes Addresses (8.1.4.1)
384(2)
VLSM (8.1.4.2)
386(1)
Basic VLSM (8.1.4.3)
387(2)
VLSM in Practice (8.1.4.4)
389(2)
VLSM Chart (8.1.4.5)
391(2)
Addressing Schemes (8.2)
393(4)
Structured Design (8.2.1)
393(1)
Planning to Address the Network (8.2.1.1)
393(1)
Assigning Addresses to Devices (8.2.1.2)
394(3)
Design Considerations for IPv6 (8.3)
397(5)
Subnetting an IPv6 Network (8.3.1)
397(1)
Subnetting Using the Subnet ID (8.3.1.1)
397(2)
IPv6 Subnet Allocation (8.3.1.2)
399(1)
Subnetting into the Interface ID (8.3.1.3)
400(2)
Summary (8.4)
402(2)
Practice
404(1)
Class Activities
404(1)
Labs
404(1)
Packet Tracer Activities
404(1)
Check Your Understanding
405(4)
Chapter 9 Network Access
409(76)
Objectives
409(1)
Key Terms
409(2)
Introduction (9.0.1.1)
411(1)
Data Link Layer (9.1)
412(7)
The Data Link Layer (9.1.1.1)
412(1)
Data Link Sublayers (9.1.1.2)
413(1)
Media Access Control (9.1.1.3)
414(1)
Providing Access to Media (9.1.1.4)
415(1)
Layer 2 Frame Structure (9.1.2)
416(1)
Formatting Data for Transmission (9.1.2.1)
416(1)
Creating a Frame (9.1.2.2)
417(1)
Layer 2 Standards (9.1.3)
418(1)
Data Link Layer Standards (9.1.3.1)
418(1)
Media Access Control (9.2)
419(22)
Topologies (9.2.1)
419(1)
Controlling Access to the Media (9.2.1.1)
419(1)
Physical and Logical Topologies (9.2.1.2)
420(1)
WAN Topologies (9.2.2)
421(1)
Common Physical WAN Topologies (9.2.2.1)
421(1)
Physical Point-to-Point Topology (9.2.2.2)
422(1)
Logical Point-to-Point Topology (9.2.2.3)
423(1)
Half and Full Duplex (9.2.2.4)
424(1)
LAN Topologies (9.2.3)
425(1)
Physical LAN Topologies (9.2.3.1)
425(1)
Logical Topology for Shared Media (9.2.3.2)
426(1)
Contention-Based Access (9.2.3.3)
427(2)
Multi-Access Topology (9.2.3.4)
429(1)
Controlled Access (9.2.3.5)
429(2)
Ring Topology (9.2.3.6)
431(1)
Data Link Frame (9.2.4)
431(1)
The Frame (9.2.4.1)
431(2)
The Header (9.2.4.2)
433(1)
Layer 2 Address (9.2.4.3)
433(2)
The Trailer (9.2.4.4)
435(1)
LAN and WAN Frames (9.2.4.5)
435(1)
Ethernet Frame (9.2.4.6)
436(1)
Point-to-Point (PPP) Frame (9.2.4.7)
437(1)
802.11 Wireless Frame (9.2.4.8)
438(3)
Physical Layer (9.3)
441(10)
Purpose of the Physical Layer (9.3.1)
441(1)
The Physical Layer (9.3.1.1)
441(1)
Physical Layer Media (9.3.1.2)
442(1)
Physical Layer Standards (9.3.1.3)
443(1)
Characteristics of the Physical Layer (9.3.2)
444(1)
Physical Layer Functions (9.3.2.1)
445(1)
Physical Components (9.3.2.2)
445(1)
Frame Encoding Techniques (9.3.2.3)
446(1)
Signaling Method (9.3.2.4)
447(2)
Bandwidth (9.3.2.5)
449(1)
Throughput (9.3.2.6)
450(1)
Network Media (9.4)
451(27)
Copper Cabling (9.4.1)
452(1)
Characteristics of Copper Media (9.4.1.1)
452(1)
Copper Media (9.4.1.2)
453(1)
UTP Cable (9.4.1.3)
454(1)
STP Cable (9.4.1.4)
454(1)
Coaxial Cable (9.4.1.5)
455(2)
Copper Media Safety (9.4.1.6)
457(1)
UTP Cabling (9.4.2)
458(1)
Properties of UTP Cabling (9.4.2.1)
458(1)
UTP Cabling Standards (9.4.2.2)
459(1)
UTP Connectors (9.4.2.3)
460(1)
Types of UTP Cable (9.4.2.4)
461(1)
LAN Cabling Areas (9.4.2.5)
462(2)
Testing UTP Cables (9.4.2.6)
464(1)
Fiber Optic Cabling (9.4.3)
465(1)
Properties of Fiber Optic Cabling (9.4.3.1)
465(1)
Fiber Media Cable Design (9.4.3.2)
466(1)
Types of Fiber Media (9.4.3.3)
466(2)
Network Fiber Connectors (9.4.3.4)
468(2)
Testing Fiber Cables (9.4.3.5)
470(1)
Fiber Versus Copper (9.4.3.6)
471(1)
Wireless Media (9.4.4)
472(1)
Properties of Wireless Media (9.4.4.1)
472(1)
Types of Wireless Media (9.4.4.2)
473(2)
Wireless LAN (9.4.4.3)
475(1)
802.11 Wi-Fi Standards (9.4.4.4)
476(2)
Summary (9.5)
478(2)
Practice
480(1)
Class Activities
480(1)
Labs
480(1)
Packet Tracer Activity
480(1)
Check Your Understanding
481(4)
Chapter 10 Ethernet
485(60)
Objectives
485(1)
Key Terms
485(1)
Introduction (10.0.1.1)
486(1)
Ethernet Protocol (10.1)
487(17)
Ethernet Operation (10.1.1)
487(1)
LLC and MAC Sublayers (10.1.1.1)
487(2)
MAC Sublayer (10.1.1.2)
489(1)
Media Access Control (10.1.1.3)
490(2)
MAC Address: Ethernet Identity (10.1.1.4)
492(1)
Frame Processing (10.1.1.5)
493(1)
Ethernet Frame Attributes (10.1.2)
494(1)
Ethernet Encapsulation (10.1.2.1)
494(1)
Ethernet Frame Size (10.1.2.2)
495(1)
Introduction to the Ethernet Frame (10.1.2.3)
496(1)
Ethernet MAC (10.1.3)
497(1)
MAC Addresses and Hexadecimal (10.1.3.1)
497(3)
MAC Address Representations (10.1.3.2)
500(1)
Unicast MAC Address (10.1.3.3)
500(1)
Broadcast MAC Address (10.1.3.4)
501(1)
Multicast MAC Address (10.1.3.5)
501(1)
Mac and IP (10.1.4)
502(1)
MAC and IP (10.1.4.1)
502(1)
End-to-End Connectivity, MAC, and IP (10.1.4.2)
503(1)
Address Resolution Protocol (10.2)
504(12)
Introduction to ARP (10.2.1.1)
504(1)
ARP Functions (10.2.1.2)
504(1)
ARP Operation (10.2.1.3)
505(3)
ARP Role in Remote Communication (10.2.1.4)
508(4)
Removing Entries from an ARP Table (10.2.1.5)
512(1)
ARP Tables on Networking Devices (10.2.1.6)
512(2)
ARP Issues (10.2.2)
514(1)
How ARP Can Create Problems (10.2.2.1)
514(1)
Mitigating ARP Problems (10.2.2.2)
515(1)
LAN Switches (10.3)
516(24)
Switching (10.3.1)
516(1)
Switch Port Fundamentals (10.3.1.1)
516(1)
Switch MAC Address Table (10.3.1.2)
517(4)
Duplex Settings (10.3.1.3)
521(1)
Auto-MDIX (10.3.1.4)
522(1)
Frame Forwarding Methods on Cisco Switches (10.3.1.5)
523(1)
Cut-Through Switching (10.3.1.6)
524(1)
Memory Buffering on Switches (10.3.1.8)
525(1)
Fixed or Modular (10.3.2)
526(1)
Fixed Versus Modular Configuration (10.3.2.1)
526(2)
Fixed Configuration Cisco Switches (10.3.2.2)
528(3)
Modular Configuration Cisco Switches (10.3.2.3)
531(2)
Module Options for Cisco Switch Slots (10.3.2.4)
533(2)
Layer 3 Switching (10.3.3)
535(1)
Layer 2 Versus Layer 3 Switching (10.3.3.1)
535(1)
Cisco Express Forwarding (10.3.3.2)
536(1)
Types of Layer 3 Interfaces (10.3.3.3)
537(1)
Configuring a Routed Port on a Layer 3 Switch (10.3.3.4)
538(2)
Summary (10.4)
540(1)
Practice
541(1)
Class Activities
542(1)
Labs
542(1)
Packet Tracer Activities
542(1)
Check Your Understanding
542(3)
Chapter 11 It's a Network
545(68)
Objectives
545(1)
Key Terms
545(2)
Introduction (11.0.1.1)
547(1)
Create and Grow (11.1)
547(13)
Devices in a Small Network (11.1.1)
547(1)
Small Network Topologies (11.1.1.1)
547(1)
Device Selection for a Small Network (11.1.1.2)
548(2)
IP Addressing for a Small Network (11.1.1.3)
550(1)
Redundancy in a Small Network (11.1.1.4)
551(1)
Design Considerations for a Small Network (11.1.1.5)
552(1)
Protocols in a Small Network (11.1.2)
553(1)
Common Applications in a Small Network (11.1.2.1)
554(1)
Common Protocols in a Small Network (11.1.2.2)
555(1)
Real-Time Applications for a Small Network (11.1.2.3)
556(1)
Growing to Larger Networks (11.1.3)
557(1)
Scaling a Small Network (11.1.3.1)
557(1)
Protocol Analysis of a Small Network (11.1.3.2)
558(1)
Evolving Protocol Requirements (11.1.3.3)
559(1)
Keeping the Network Safe (11.2)
560(18)
Network Device Security Measures (11.2.1)
560(1)
Categories of Threats to Network Security (11.2.1.1)
560(1)
Physical Security (11.2.1.2)
561(1)
Types of Security Vulnerabilities (11.2.1.3)
562(2)
Vulnerabilities and Network Attacks (11.2.2)
564(1)
Viruses, Worms, and Trojan Horses (11.2.2.1)
564(1)
Network Attacks (11.2.2.2)
565(2)
Mitigating Network Attacks (11.2.3)
567(1)
Backup, Upgrade, Update, and Patch (11.2.3.1)
567(1)
Authentication, Authorization, and Accounting (11.2.3.2)
568(2)
Firewalls (11.2.3.3)
570(1)
Endpoint Security (11.2.3.4)
571(1)
Securing Devices (11.2.4)
572(1)
Introduction to Securing Devices (11.2.4.1)
572(1)
Passwords (11.2.4.2)
573(1)
Basic Security Practices (11.2.4.3)
574(2)
Enable SSH (11.2.4.4)
576(2)
Basic Network Performance (11.3)
578(18)
Ping (11.3.1)
578(1)
Interpreting Ping Results (11.3.1.1)
578(2)
Extended Ping (11.3.1.2)
580(1)
Network Baseline (11.3.1.3)
581(2)
Tracert (11.3.2)
583(1)
Interpreting Tracert Messages (11.3.2.1)
583(2)
show Commands (11.3.3)
585(1)
Common show Commands Revisited (11.3.3.1)
585(3)
Viewing Router Settings with the show version Command (11.3.3.2)
588(1)
Viewing Switch Settings with the show version Command (11.3.3.3)
589(1)
Host and IOS Commands (11.3.4)
590(1)
ipconfig Command Options (11.3.4.1)
590(1)
arp Command Options (11.3.4.2)
591(1)
show cdp neighbors Command Options (11.3.4.3)
592(2)
Using the show ip interface brief Command (11.3.4.4)
594(2)
Managing IOS Configuration Files (11.4)
596(11)
Router and Switch File Systems (11.4.1)
596(1)
Router File Systems (11.4.1.1)
596(2)
Switch File Systems (11.4.1.2)
598(1)
Back Up and Restore Configuration Files (11.4.2)
599(1)
Backing Up and Restoring Using Text Files (11.4.2.1)
600(1)
Backing Up and Restoring Using TFTP (11.4.2.2)
601(1)
Using USB Ports on a Cisco Router (11.4.2.3)
602(1)
Backing Up and Restoring Using a USB (11.4.2.4)
603(4)
Summary (11.5)
607(1)
Practice
608(1)
Class Activities
609(1)
Labs
609(1)
Packet Tracer Activities
609(1)
Check Your Understanding
609(4)
Appendix A Answers to the "Check Your Understanding" Questions 613(12)
Glossary 625(28)
Index 653
Antoon (Tony) W. Rufi is Campus Director of Academic Affairs, ECPI University, Newport News, Virginia. Tony is a networking professional who retired from the U.S. Air Force in June 2000 after 29 years. He worked on communication systems. Since retirement, Tony has worked for ECPI University teaching a variety of networking courses. The courses he has led include CCNA, CCNP, and Fundamentals of Network Security in the Cisco Academy at ECPI University, as well as numerous courses in the universitys Cloud Computing program. Tony is a PhD candidate, Applied Management and Decision Science, with an Information Systems Management specialty at Walden University.

 

Rick McDonald is an Associate Professor in the Information Systems department at the University of Alaska Southeast, in Ketchikan, Alaska, where he teaches computer and networking courses. He specializes in developing and delivering networking courses via e-learning. Rick worked in the airline industry for several years before returning to full-time teaching. He taught CCNA and CCNP courses in North Carolina before moving to Alaska in 2003.