Muutke küpsiste eelistusi

E-raamat: Networking Essentials Companion Guide

Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 65,51 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Networking Essentials Companion Guide is the official supplemental textbook for the Networking Essentials course in the Cisco Networking Academy.


Networking is at the heart of the digital transformation. The network is essential to many business functions today, including business-critical data and operations, cybersecurity, and so much more. A wide variety of career paths rely on the network, so it’s important to understand what the network can do, how it operates, and how to protect it.


This is a great course for developers, data scientists, cybersecurity specialists, and other professionals looking to broaden their networking domain knowledge. It’s also an excellent launching point for students pursuing a wide range of career pathways—from cybersecurity to software development to business and more.


The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.


The book’s features help you focus on important concepts to succeed in this course:


* Chapter objectives: Review core concepts by answering the focus questions listed at the beginning of each chapter.
* Key terms: Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.
* Glossary: Consult the comprehensive Glossary with more than 250 terms.
* Summary of Activities and Labs: Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.
* Check Your Understanding: Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.


Introduction xxvii
Chapter 1 Communications in a Connected World
1(30)
Objectives
1(1)
Key Terms
1(1)
Introduction (1.0)
2(1)
Network Types (1.1)
3(1)
Everything Is Online (1.1.1)
3(1)
Who Owns "The Internet"? (1.1.2)
3(1)
Local Networks (1.1.3)
3(4)
Small Home Networks
4(1)
Small Office and Home Office Networks
4(2)
Medium to Large Networks
6(1)
Worldwide Networks
6(1)
Mobile Devices (1.1.5)
7(3)
Smartphone
7(1)
Tablet
8(1)
Smartwatch
8(1)
Smart Glasses
9(1)
Connected Home Devices (1.1.6)
10(2)
Security System
10(1)
Appliances
10(1)
Smart TV
11(1)
Gaming Console
12(1)
Other Connected Devices (1.1.7)
12(3)
Smart Cars
12(1)
RF1D Tags
13(1)
Sensors and Actuators
14(1)
Medical Devices
14(1)
Data Transmission (1.2)
15(2)
Types of Personal Data (1.2.2)
15(1)
Common Methods of Data Transmission (1.2.4)
16(1)
Bandwidth and Throughput (1.3)
17(2)
Bandwidth (1.3.1)
17(1)
Throughput (1.3.3)
18(1)
Clients and Servers (1.4)
19(4)
Client and Server Roles (1.4.1)
19(1)
Peer-to-Peer Networks (1.4.2)
20(1)
Peer-to-Peer Applications (1.4.3)
21(1)
Multiple Roles in the Network (1.4.4)
22(1)
Network Components (1.5)
23(3)
Network Infrastructure (1.5.2)
23(2)
End Devices (1.5.3)
25(1)
Summary (1.6)
26(1)
Practice
27(1)
Check Your Understanding
27(4)
Chapter 2 Online Communications
31(18)
Objectives
31(1)
Key Terms
31(1)
Introduction (2.0)
32(1)
Wireless Networks (2.1)
32(2)
Mobile Telephones (2.1.2)
32(1)
Cell Phone Network (2.1.3)
32(1)
Other Wireless Networks (2.1.5)
33(1)
Global Positioning System (GPS)
33(1)
Wi-Fi
34(1)
Bluetooth
34(1)
Near-Field Communication
34(1)
Local Network Connections (2.2)
34(1)
LAN Components (2.2.2)
34(5)
Hosts
35(1)
Peripherals
35(1)
Network Devices
36(1)
Network Media
37(2)
End Device Addressing (2.2.4)
39(1)
Manual and Automatic Address Assignment (2.2.6)
40(1)
Manual IP Configuration
40(1)
Dynamic IP Configuration
41(1)
Network Documentation (2.3)
41(4)
Device Names and Address Planning (2.3.1)
41(1)
Network Topologies and Representations (2.3.2)
42(1)
Logical Network Information (2.3.4)
43(2)
Summary (2.4)
45(1)
Practice
46(1)
Check Your Understanding Questions
46(3)
Chapter 3 Explore Networks with Packet Tracer
49(18)
Objectives
49(1)
Key Terms
49(1)
Introduction (3.0)
50(1)
Packet Tracer Network Simulator (3.1)
50(1)
Packet Tracer Installation (3.2)
50(1)
The Packet Tracer User Interface (3.3)
51(2)
Locate and Deploy Devices (3.3.2)
52(1)
Packet Tracer Network Configuration (3.4)
53(6)
GUI and CLI Configuration in Packet Tracer (3.4.2)
54(1)
Physical Tab
54(1)
Config Tab
55(1)
CLI Tab
56(1)
Desktop Tab
56(1)
Services Tab
57(2)
Summary (3.5)
59(2)
Practice
61(1)
Packet Tracer Activities
61(1)
Check Your Understanding Questions
61(6)
Chapter 4 Build a Simple Network
67(22)
Objectives
67(1)
Key Terms
67(1)
Introduction (4.0.1)
68(1)
Network Media Types (4.1)
68(1)
Three Media Types (4.1.2)
68(1)
Common Network Cables (4.1.3)
69(2)
Twisted-Pair Cable
69(1)
Coaxial Cable
70(1)
Fiber-Optic Cable
70(1)
Ethernet Cabling (4.2)
71(4)
Twisted-Pair Cables (4.2.1)
71(1)
Types of Twisted-Pair Cables (4.2.2)
72(1)
UTP Cable
73(1)
STP Cable
74(1)
Coaxial and Fiber-Optic Cabling (4.3)
75(3)
Cable TV and Satellite Cables (4.3.1)
75(1)
Fiber-Optic Cables (4.3.2)
76(2)
Twisted-Pair Operation (4.4)
78(1)
Twisted-Pair Wiring Schemes (4.4.1)
78(1)
Twisted-Pair Transmit and Receive Pairs (4.4.2)
79(1)
Verify Connectivity (4.5)
79(4)
Using the ping Command (4.5.2)
80(1)
The traceroute Command (4.5.3)
81(2)
Summary (4.6)
83(2)
Practice
85(1)
Labs
85(1)
Check Your Understanding Questions
85(4)
Chapter 5 Communication Principles
89(22)
Objectives
89(1)
Key Terms
89(1)
Introduction (5.0.1)
90(1)
The Rules (5.1)
90(5)
The Three Elements (5.1.1)
90(1)
Communication Protocols (5.1.2)
91(2)
Why Protocols Matter (5.1.3)
93(2)
Communication Standards (5.2)
95(1)
The Internet and Standards (5.2.2)
95(1)
Network Standards Organizations (5.2.3)
95(1)
Network Communication Models (5.3)
96(7)
The Protocol Stack (5.3.3)
97(1)
The TCP/IP Model (5.3.4)
98(1)
The OSI Reference Model (5.3.5)
99(1)
Upper and Lower Layers of the OSI Model (5.3.6)
100(1)
OSI Model and TCP/IP Model Comparison (5.3.7)
101(2)
Ethernet (5.4)
103(4)
The Rise of Ethernet (5.4.1)
103(1)
Ethernet Evolution (5.4.2)
104(1)
The Ethernet MAC Address (5.4.4)
105(2)
Summary (5.5)
107(1)
Practice
108(1)
Labs
108(1)
Check Your Understanding Questions
108(3)
Chapter 6 Network Design and the Access Layer
111(26)
Objectives
111(1)
Key Terms
111(1)
Introduction (6.0.1)
112(1)
Encapsulation and the Ethernet Frame (6.1)
112(3)
Encapsulation (6.1.2)
112(2)
Ethernet Frame (6.1.3)
114(1)
Hierarchical Network Design (6.2)
115(5)
Physical and Logical Addresses (6.2.2)
115(2)
Hierarchical Analogy (6.2.5)
117(1)
Benefits of a Hierarchical Design (6.2.7)
117(2)
Access, Distribution, and Core (6.2.8)
119(1)
Access Layer
119(1)
Distribution Layer
119(1)
Core Layer
120(1)
The Access Layer (6.3)
120(6)
Access Layer Devices (6.3.1)
121(1)
Ethernet Hubs (6.3.2)
121(2)
Ethernet Switches (6.3.4)
123(1)
The MAC Address Table (6.3.6)
124(2)
Broadcast Containment (6.4)
126(5)
Ethernet Broadcasts in the Local Network (6.4.2)
126(1)
Broadcast Domains (6.4.3)
127(1)
Access Layer Communication (6.4.4)
128(1)
ARP (6.4.6)
129(2)
Summary (6.5)
131(2)
Practice
133(1)
Labs
133(1)
Check Your Understanding Questions
133(4)
Chapter 7 Routing Between Networks
137(20)
Objectives
137(1)
Key Terms
137(1)
Introduction (7.0.1)
138(1)
The Need for Routing (7.1)
138(3)
Criteria for Dividing the Local Network (7.1.2)
138(1)
Broadcast Containment
138(1)
Security Requirements
139(1)
Physical Locations
140(1)
Logical Grouping
140(1)
When Routing Is Needed (7.1.3)
141(1)
The Routing Table (7.2)
142(5)
Path Selection (7.2.2)
142(1)
Packet Forwarding (7.2.5)
143(2)
Routing Table Entries (7.2.7)
145(1)
The Default Gateway (7.2.8)
146(1)
Create a LAN (7.3)
147(5)
Local-Area Networks (7.3.1)
147(1)
Local and Remote Network Segments (7.3.2)
148(1)
All Hosts in One Local Segment
148(1)
Hosts on a Remote Segment
149(3)
Summary (7.4)
152(1)
Practice
153(1)
Labs
153(1)
Packet Tracer Activities
153(1)
Check Your Understanding Questions
153(4)
Chapter 8 The Internet Protocol
157(24)
Objectives
157(1)
Key Terms
157(1)
Introduction (8.0.1)
158(1)
Purpose of the IPv4 Address (8.1)
158(1)
The IPv4 Address (8.1.1)
158(1)
Binary Conversion of an IPv4 Address (8.2)
159(3)
IPv4 Addressing (8.2.1)
159(1)
Binary to Decimal (8.2.3)
160(2)
The IPv4 Address Structure (8.3)
162(4)
Networks and Hosts (8.3.2)
162(1)
Logical AND (8.3.5)
163(1)
Calculate Whether the Destination Is Local or Remote (8.3.6)
164(1)
Calculate the Number of Hosts (8.3.7)
165(1)
Classful IPv4 Addressing (8.4)
166(2)
Classful and Classless Addressing (8.4.1)
166(2)
Public and Private IPv4 Addresses (8.5)
168(3)
Private IPv4 Addressing (8.5.1)
168(1)
Assignment of IPv4 Addresses (8.5.2)
169(2)
Unicast, Broadcast, and Multicast Addresses (8.6)
171(4)
Unicast Transmission (8.6.2)
171(1)
Broadcast Transmission (8.6.4)
172(1)
Multicast Transmission (8.6.6)
173(2)
Summary (8.7)
175(2)
Practice
177(1)
Labs
177(1)
Packet Tracer Activities
177(1)
Check Your Understanding Questions
177(4)
Chapter 9 Dynamic Addressing with DHCP
181(12)
Objectives
181(1)
Key Terms
181(1)
Introduction (9.0.1)
182(1)
Static and Dynamic Addressing (9.1)
182(3)
Static IPv4 Address Assignment (9.1.1)
182(1)
Dynamic IPv4 Address Assignment (9.1.2)
183(1)
DHCP Servers (9.1.3)
184(1)
DHCPv4 Configuration (9.2)
185(3)
DHCPv4 Operation (9.2.2)
185(1)
DHCP Service Configuration (9.2.4)
186(2)
Summary (9.3)
188(1)
Practice
189(1)
Packet Tracer Activities
189(1)
Check Your Understanding Questions
189(4)
Chapter 10 IPv4 and IPv6 Address Management
193(18)
Objectives
193(1)
Key Terms
193(1)
Introduction (10.0.1)
194(1)
Network Boundaries (10.1)
194(2)
Routers as Gateways (10.1.2)
194(1)
Routers as Boundaries Between Networks (10.1.3)
195(1)
Network Address Translation (10.2)
196(2)
NAT Operation (10.2.2)
196(2)
IPv4 Issues (10.3)
198(2)
Need for IPv6 (10.3.1)
198(2)
Internet of Things
200(1)
IPv6 Address Size (10.3.2)
200(1)
IPv4 and IPv6 Coexistence (10.3.4)
201(2)
Dual Stack
201(1)
Tunneling
202(1)
Translation
203(1)
IPv6 Features (10.4)
203(3)
IPv6 Autoconfiguration and Link-Local Addresses (10.4.3)
203(1)
IPv6 Address Representation (10.4.5)
204(1)
Compressing IPv6 Addresses
204(1)
Rule 1 Omit Leading Zeros
205(1)
Rule 2 Omit One "All Zero" Segment
205(1)
Summary (10.5)
206(1)
Practice
207(1)
Labs
207(1)
Packet Tracer Activities
207(1)
Check Your Understanding Questions
208(3)
Chapter 11 Transport Layer Services
211(18)
Objectives
211(1)
Key Terms
211(1)
Introduction (11.0.1)
212(1)
The Client/Server Relationship (11.1)
212(3)
Client and Server Interaction (11.1.1)
212(1)
Client Requests a Web Page (11.1.3)
213(1)
URI, URN, and URL (11.1.4)
214(1)
TCP and UDP (11.2)
215(3)
Protocol Operations (11.2.1)
215(1)
TCP and UDP (11.2.3)
216(1)
TCP Reliability (11.2.4)
216(1)
UDP Best Effort Delivery (11.2.5)
217(1)
Port Numbers (11.3)
218(3)
TCP and UDP Port Numbers (11.3.2)
218(2)
Destination and Source Port Numbers (11.3.3)
220(1)
Source Port
220(1)
Destination Port
221(1)
Socket Pairs (11.3.4)
221(2)
The netstat Command (11.3.5)
223(1)
Summary (11.4)
224(1)
Practice
225(1)
Packet Tracer Activities
225(1)
Check Your Understanding Questions
225(4)
Chapter 12 Application Layer Services
229(20)
Objectives
229(1)
Key Terms
229(1)
Introduction (12.0.1)
230(1)
Network Application Services (12.1)
230(1)
Common Network Application Services (12.1.1)
230(1)
Domain Name System (12.2)
231(2)
Domain Name Translation (12.2.1)
231(1)
DNS Servers (12.2.3)
232(1)
Web Clients and Servers (12.3)
233(1)
HTTP and HTML (12.3.2)
233(1)
FTP Clients and Servers (12.4)
234(3)
File Transfer Protocol (12.4.1)
235(1)
FTP Client Software (12.4.3)
236(1)
Virtual Terminals (12.5)
237(2)
Telnet (12.5.2)
237(1)
Security Issues with Telnet (12.5.3)
238(1)
Email and Messaging (12.6)
239(5)
Email Clients and Servers (12.6.1)
239(1)
Email Protocols (12.6.2)
240(1)
Simple Mail Transfer Protocol (SMTP)
240(1)
Post Office Protocol (POP3)
241(1)
Internet Message Access Protocol (IMAP4)
241(1)
Text Messaging (12.6.3)
242(1)
Internet Phone Calls (12.6.4)
243(1)
Summary (12.7)
244(2)
Practice
246(1)
Labs
246(1)
Packet Tracer Activities
246(1)
Check Your Understanding Questions
246(3)
Chapter 13 Build a Home Network
249(22)
Objectives
249(1)
Key Terms
249(1)
Introduction (13.0.1)
250(1)
Home Network Basics (13.1)
250(3)
Connecting Home Devices (13.1.1)
250(1)
Components of a Home Network (13.1.2)
251(1)
Typical Home Network Routers (13.1.3)
252(1)
Network Technologies in the Home (13.2)
253(4)
The Electromagnetic Spectrum (13.2.1)
253(1)
LAN Wireless Frequencies (13.2.2)
254(1)
Wired Network Technologies (13.2.3)
255(1)
Category 5e Cable
256(1)
Coaxial Cable
256(1)
Ethernet over Powerline
256(1)
Wireless Standards (13.3)
257(2)
Wi-Fi Networks (13.3.1)
257(1)
Wireless Settings (13.3.2)
257(2)
Wireless Traffic Controls (13.4)
259(2)
Wireless Channels (13.4.1)
259(1)
Wireless as a Shared Media (13.4.2)
260(1)
Set Up a Home Router (13.5)
261(4)
First Time Setup (13.5.1)
261(1)
Design Considerations (13.5.2)
261(2)
MAC Address Filtering (13.5.3)
263(2)
Summary (13.6)
265(2)
Practice
267(1)
Labs
267(1)
Check Your Understanding Questions
267(4)
Chapter 14 Connect to the Internet
271(28)
Objectives
271(1)
Key Terms
271(1)
Introduction (14.0.1)
272(1)
ISP Connectivity Options (14.1)
272(4)
ISP Services (14.1.1)
272(1)
ISP Connections (14.1.2)
273(1)
Cable and DSL Connections (14.1.3)
274(1)
Additional Connectivity Options (14.1.4)
275(1)
Network Virtualization (14.2)
276(8)
Cloud Computing (14.2.2)
276(1)
Types of Clouds (14.2.3)
276(1)
Cloud Services (14.2.4)
277(1)
Cloud Computing and Virtualization (14.2.5)
277(2)
Advantages of Virtualization (14.2.6)
279(1)
Hypervisors (14.2.7)
279(1)
Type 1 Hypervisors
279(1)
Type 2 Hypervisor
280(1)
Network Virtualization (14.2.9)
281(1)
Control Plane and Data Plane (14.2.10)
282(1)
Network Virtualization and SDN (14.2.11)
283(1)
SDN Architecture (14.2.12)
283(1)
Mobile Device Connectivity (14.3)
284(9)
Mobile Devices and Wi-Fi (14.3.1)
284(1)
Wi-Fi Settings (14.3.2)
285(1)
Configure Mobile Wi-Fi Connectivity (14.3.3)
286(2)
Configure Cellular Data Settings (14.3.4)
288(1)
Android Cellular Data
288(1)
iOS Cellular Data
289(1)
Simple Connectivity with Bluetooth (14.3.6)
290(1)
Bluetooth Pairing (14.3.7)
290(3)
Summary (14.4)
293(2)
Practice
295(1)
Labs
295(1)
Check Your Understanding Questions
295(4)
Chapter 15 Security Considerations
299(26)
Objectives
299(1)
Key Terms
299(1)
Introduction (15.0.1)
300(1)
Security Threats (15.1)
300(2)
Types of Threats (15.1.1)
300(1)
Internal and External Threats (15.1.2)
301(1)
Internal Threats
301(1)
External Threats
302(1)
Social Engineering Attacks (15.2)
302(2)
Overview of Social Engineering (15.2.1)
302(1)
Types of Social Engineering Attacks (15.2.2)
303(1)
Pretexting
303(1)
Phishing
303(1)
Vishing/Phone Phishing
304(1)
Malware (15.3)
304(4)
Malicious Software (15.3.1)
305(1)
Types of Malware (15.3.2)
305(1)
Viruses
305(1)
Worms
305(1)
Trojan Horses
305(1)
Spyware (15.3.3)
306(1)
Spyware
306(1)
Tracking Cookies
306(1)
Adware and Popups (15.3.4)
306(1)
Botnets and Zombies (15.3.5)
307(1)
Denial-of-Service Attacks (15.4)
308(2)
Denial of Service (15.4.1)
308(1)
Distributed Denial of Service (15.4.2)
309(1)
Brute Force (15.4.3)
310(1)
Security Tools (15.5)
310(4)
Security Practices and Procedures (15.5.1)
310(2)
Security Tools and Applications (15.5.2)
312(1)
Patches and Updates (15.5.3)
313(1)
Antimalware Software (15.6)
314(4)
Signs of Infections (15.6.1)
314(1)
Antivirus Software (15.6.2)
315(1)
Antispam Software (15.6.3)
316(1)
Antispyware Software (15.6.4)
316(1)
Antispyware and Adware
317(1)
Popup Blockers
317(1)
Additional Safeguards (15.6.5)
317(1)
Summary (15.7)
318(3)
Practice
321(1)
Labs
321(1)
Check Your Understanding Questions
321(4)
Chapter 16 Configure Network and Device Security
325(24)
Objectives
325(1)
Key Terms
325(1)
Introduction (16.0.1)
326(1)
Wireless Security Measures (16.1)
326(10)
Wireless Vulnerabilities (16.1.1)
326(1)
A Comprehensive Security Plan (16.1.2)
327(6)
SSID Broadcasts (16.1.4)
333(1)
Changing Default Settings (16.1.5)
334(1)
MAC Address Filtering (16.1.6)
335(1)
Implement Wireless Security (16.2)
336(2)
Open Authentication (16.2.1)
336(1)
Authentication and Association (16.2.2)
336(1)
Authentication Protocols (16.2.3)
337(1)
Configure a Firewall (16.3)
338(6)
Firewall Overview (16.3.1)
338(1)
Firewall Operation (16.3.2)
338(1)
The DMZ (16.3.3)
339(1)
Port Forwarding (16.3.4)
340(1)
Port Triggering (16.3.5)
341(3)
Summary (16.4)
344(1)
Practice
345(1)
Labs
345(1)
Packet Tracer Activities
346(1)
Check Your Understanding Questions
346(3)
Chapter 17 Cisco Switches and Routers
349(24)
Objectives
349(1)
Key Terms
349(1)
Introduction (17.0.1)
350(1)
Cisco Switches (17.1)
350(5)
Connect More Devices (17.1.1)
350(1)
Cisco LAN Switches (17.1.2)
351(1)
Type of Port
352(1)
Speed Required
352(1)
Expandability
353(1)
Manageability
353(1)
LAN Switch Components (17.1.5)
354(1)
Switch Boot Process (17.2)
355(4)
Power Up the Switch (17.2.1)
355(3)
In-Band and Out-of-Band Management (17.2.3)
358(1)
In-Band Management
358(1)
Out-of-Band Management
358(1)
IOS Startup Files (17.2.4)
358(1)
Cisco Routers (17.3)
359(2)
Router Components (17.3.2)
360(1)
Router Interface Ports (17.3.3)
360(1)
Router Boot Process (17.4)
361(6)
Power Up the Router (17.4.1)
361(4)
Management Ports (17.4.2)
365(2)
Summary (17.5)
367(1)
Practice
368(1)
Packet Tracer Activities
368(1)
Check Your Understanding Questions
368(5)
Chapter 18 The Cisco IOS Command Line
373(18)
Objectives
373(1)
Key Terms
373(1)
Introduction (18.0.1)
374(1)
Navigate the IOS (18.1)
374(2)
The Cisco IOS Command-Line Interface (18.1.1)
374(1)
Primary Command Modes (18.1.2)
375(1)
A Note About Syntax Checker Activities (18.1.5)
376(1)
The Command Structure (18.2)
376(4)
Basic IOS Command Structure (18.2.1)
376(1)
IOS Command Syntax (18.2.2)
377(1)
Hotkeys and Shortcuts (18.2.4)
378(2)
View Device Information (18.3)
380(7)
Show Commands (18.3.2)
381(6)
Summary (18.4)
387(1)
Practice
388(1)
Packet Tracer Activities
388(1)
Check Your Understanding Questions
388(3)
Chapter 19 Build a Small Cisco Network
391(24)
Objectives
391(1)
Key Terms
391(1)
Introduction (19.0.1)
392(1)
Basic Switch Configuration (19.1)
392(3)
Basic Switch Configuration Steps (19.1.1)
392(2)
Switch Virtual Interface Configuration (19.1.2)
394(1)
Configure Initial Router Settings (19.2)
395(3)
Basic Router Configuration Steps (19.2.1)
395(1)
Basic Router Configuration Example (19.2.2)
396(2)
Secure the Devices (19.3)
398(6)
Password Recommendations (19.3.1)
398(1)
Secure Remote Access (19.3.2)
399(1)
Configure SSH (19.3.3)
400(2)
Verify SSH (19.3.5)
402(2)
Connecting the Switch to the Router (19.4)
404(5)
Default Gateway for a Host (19.4.1)
404(2)
Default Gateway on a Switch (19.4.2)
406(3)
Summary (19.5)
409(2)
Practice
411(1)
Packet Tracer Activities
411(1)
Check Your Understanding Questions
412(3)
Chapter 20 Troubleshoot Common Network Problems
415(44)
Objectives
415(1)
Key Terms
415(1)
Introduction (20.0.1)
416(1)
The Troubleshooting Process (20.1)
416(7)
Network Troubleshooting Overview (20.1.1)
416(1)
Gather Information (20.1.2)
416(2)
Structured Troubleshooting Methods (20.1.3)
418(1)
Bottom-Up
418(1)
Top-Down
419(1)
Divide-and-Conquer
420(1)
Follow-the-Path
420(1)
Substitution
421(1)
Comparison
421(1)
Educated Guess
421(1)
Guidelines for Selecting a Troubleshooting Method (20.1.4)
422(1)
Physical Layer Problems (20.2)
423(3)
Common Layer
1(422)
Problems (20.2.1)
423(1)
The Sense of Sight
423(1)
The Senses of Smell and Taste
424(1)
The Sense of Touch
424(1)
The Sense of Hearing
424(1)
Wireless Router LEDs (20.2.2)
424(2)
Cabling Problems (20.2.3)
426(1)
Troubleshooting Commands (20.3)
426(12)
Overview of Troubleshooting Commands (20.3.1)
426(1)
The ipconfig Command (20.3.2)
427(3)
The ping Command (20.3.4)
430(1)
Ping Results (20.3.5)
431(1)
Divide and Conquer with ping (20.3.7)
432(1)
The tracert Command (20.3.8)
433(1)
The netstat Command (20.3.9)
434(2)
The nslookup Command (20.3.10)
436(2)
Troubleshoot Wireless Issues (20.4)
438(3)
Causes of Wireless Issues (20.4.1)
438(1)
Authentication and Association Errors (20.4.2)
439(2)
Common Internet Connectivity Issues (20.5)
441(3)
DHCP Server Configuration Errors (20.5.1)
441(1)
Check Internet Configuration (20.5.2)
442(2)
Check Firewall Settings (20.5.3)
444(1)
Customer Support (20.6)
444(6)
Sources of Help (20.6.1)
445(1)
When to Call for Help (20.6.2)
445(1)
Support Desk Interaction (20.6.3)
446(1)
Issue Resolution (20.6.4)
447(1)
Support Desk Tickets and Work Orders (20.6.5)
448(2)
Summary (20.7)
450(3)
Practice
453(1)
Labs
453(1)
Packet Tracer Activities
453(1)
Check Your Understanding Questions
454(5)
Appendix A Answers to the "Check Your Understanding" Questions 459(12)
Glossary 471(20)
Index 491
Cisco Networking Academy is an innovative Cisco education initiative that delivers information and communication technology skills to improve career and economic opportunities around the world. The Academy provides online courses, interactive tools, and lab activities to prepare individuals for information technology and networking careers in virtually every industry.