Introduction |
|
xxvii | |
|
Chapter 1 Communications in a Connected World |
|
|
1 | (30) |
|
|
1 | (1) |
|
|
1 | (1) |
|
|
2 | (1) |
|
|
3 | (1) |
|
Everything Is Online (1.1.1) |
|
|
3 | (1) |
|
Who Owns "The Internet"? (1.1.2) |
|
|
3 | (1) |
|
|
3 | (4) |
|
|
4 | (1) |
|
Small Office and Home Office Networks |
|
|
4 | (2) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
7 | (3) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
Connected Home Devices (1.1.6) |
|
|
10 | (2) |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
Other Connected Devices (1.1.7) |
|
|
12 | (3) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
15 | (2) |
|
Types of Personal Data (1.2.2) |
|
|
15 | (1) |
|
Common Methods of Data Transmission (1.2.4) |
|
|
16 | (1) |
|
Bandwidth and Throughput (1.3) |
|
|
17 | (2) |
|
|
17 | (1) |
|
|
18 | (1) |
|
Clients and Servers (1.4) |
|
|
19 | (4) |
|
Client and Server Roles (1.4.1) |
|
|
19 | (1) |
|
Peer-to-Peer Networks (1.4.2) |
|
|
20 | (1) |
|
Peer-to-Peer Applications (1.4.3) |
|
|
21 | (1) |
|
Multiple Roles in the Network (1.4.4) |
|
|
22 | (1) |
|
|
23 | (3) |
|
Network Infrastructure (1.5.2) |
|
|
23 | (2) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
27 | (4) |
|
Chapter 2 Online Communications |
|
|
31 | (18) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
32 | (2) |
|
Mobile Telephones (2.1.2) |
|
|
32 | (1) |
|
Cell Phone Network (2.1.3) |
|
|
32 | (1) |
|
Other Wireless Networks (2.1.5) |
|
|
33 | (1) |
|
Global Positioning System (GPS) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
Local Network Connections (2.2) |
|
|
34 | (1) |
|
|
34 | (5) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
37 | (2) |
|
End Device Addressing (2.2.4) |
|
|
39 | (1) |
|
Manual and Automatic Address Assignment (2.2.6) |
|
|
40 | (1) |
|
|
40 | (1) |
|
|
41 | (1) |
|
Network Documentation (2.3) |
|
|
41 | (4) |
|
Device Names and Address Planning (2.3.1) |
|
|
41 | (1) |
|
Network Topologies and Representations (2.3.2) |
|
|
42 | (1) |
|
Logical Network Information (2.3.4) |
|
|
43 | (2) |
|
|
45 | (1) |
|
|
46 | (1) |
|
Check Your Understanding Questions |
|
|
46 | (3) |
|
Chapter 3 Explore Networks with Packet Tracer |
|
|
49 | (18) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
50 | (1) |
|
Packet Tracer Network Simulator (3.1) |
|
|
50 | (1) |
|
Packet Tracer Installation (3.2) |
|
|
50 | (1) |
|
The Packet Tracer User Interface (3.3) |
|
|
51 | (2) |
|
Locate and Deploy Devices (3.3.2) |
|
|
52 | (1) |
|
Packet Tracer Network Configuration (3.4) |
|
|
53 | (6) |
|
GUI and CLI Configuration in Packet Tracer (3.4.2) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
57 | (2) |
|
|
59 | (2) |
|
|
61 | (1) |
|
|
61 | (1) |
|
Check Your Understanding Questions |
|
|
61 | (6) |
|
Chapter 4 Build a Simple Network |
|
|
67 | (22) |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
68 | (1) |
|
Network Media Types (4.1) |
|
|
68 | (1) |
|
Three Media Types (4.1.2) |
|
|
68 | (1) |
|
Common Network Cables (4.1.3) |
|
|
69 | (2) |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
71 | (4) |
|
Twisted-Pair Cables (4.2.1) |
|
|
71 | (1) |
|
Types of Twisted-Pair Cables (4.2.2) |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
Coaxial and Fiber-Optic Cabling (4.3) |
|
|
75 | (3) |
|
Cable TV and Satellite Cables (4.3.1) |
|
|
75 | (1) |
|
Fiber-Optic Cables (4.3.2) |
|
|
76 | (2) |
|
Twisted-Pair Operation (4.4) |
|
|
78 | (1) |
|
Twisted-Pair Wiring Schemes (4.4.1) |
|
|
78 | (1) |
|
Twisted-Pair Transmit and Receive Pairs (4.4.2) |
|
|
79 | (1) |
|
Verify Connectivity (4.5) |
|
|
79 | (4) |
|
Using the ping Command (4.5.2) |
|
|
80 | (1) |
|
The traceroute Command (4.5.3) |
|
|
81 | (2) |
|
|
83 | (2) |
|
|
85 | (1) |
|
|
85 | (1) |
|
Check Your Understanding Questions |
|
|
85 | (4) |
|
Chapter 5 Communication Principles |
|
|
89 | (22) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
90 | (5) |
|
The Three Elements (5.1.1) |
|
|
90 | (1) |
|
Communication Protocols (5.1.2) |
|
|
91 | (2) |
|
Why Protocols Matter (5.1.3) |
|
|
93 | (2) |
|
Communication Standards (5.2) |
|
|
95 | (1) |
|
The Internet and Standards (5.2.2) |
|
|
95 | (1) |
|
Network Standards Organizations (5.2.3) |
|
|
95 | (1) |
|
Network Communication Models (5.3) |
|
|
96 | (7) |
|
The Protocol Stack (5.3.3) |
|
|
97 | (1) |
|
|
98 | (1) |
|
The OSI Reference Model (5.3.5) |
|
|
99 | (1) |
|
Upper and Lower Layers of the OSI Model (5.3.6) |
|
|
100 | (1) |
|
OSI Model and TCP/IP Model Comparison (5.3.7) |
|
|
101 | (2) |
|
|
103 | (4) |
|
The Rise of Ethernet (5.4.1) |
|
|
103 | (1) |
|
Ethernet Evolution (5.4.2) |
|
|
104 | (1) |
|
The Ethernet MAC Address (5.4.4) |
|
|
105 | (2) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
Check Your Understanding Questions |
|
|
108 | (3) |
|
Chapter 6 Network Design and the Access Layer |
|
|
111 | (26) |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
112 | (1) |
|
Encapsulation and the Ethernet Frame (6.1) |
|
|
112 | (3) |
|
|
112 | (2) |
|
|
114 | (1) |
|
Hierarchical Network Design (6.2) |
|
|
115 | (5) |
|
Physical and Logical Addresses (6.2.2) |
|
|
115 | (2) |
|
Hierarchical Analogy (6.2.5) |
|
|
117 | (1) |
|
Benefits of a Hierarchical Design (6.2.7) |
|
|
117 | (2) |
|
Access, Distribution, and Core (6.2.8) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
120 | (6) |
|
Access Layer Devices (6.3.1) |
|
|
121 | (1) |
|
|
121 | (2) |
|
Ethernet Switches (6.3.4) |
|
|
123 | (1) |
|
The MAC Address Table (6.3.6) |
|
|
124 | (2) |
|
Broadcast Containment (6.4) |
|
|
126 | (5) |
|
Ethernet Broadcasts in the Local Network (6.4.2) |
|
|
126 | (1) |
|
Broadcast Domains (6.4.3) |
|
|
127 | (1) |
|
Access Layer Communication (6.4.4) |
|
|
128 | (1) |
|
|
129 | (2) |
|
|
131 | (2) |
|
|
133 | (1) |
|
|
133 | (1) |
|
Check Your Understanding Questions |
|
|
133 | (4) |
|
Chapter 7 Routing Between Networks |
|
|
137 | (20) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
138 | (1) |
|
The Need for Routing (7.1) |
|
|
138 | (3) |
|
Criteria for Dividing the Local Network (7.1.2) |
|
|
138 | (1) |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
When Routing Is Needed (7.1.3) |
|
|
141 | (1) |
|
|
142 | (5) |
|
|
142 | (1) |
|
Packet Forwarding (7.2.5) |
|
|
143 | (2) |
|
Routing Table Entries (7.2.7) |
|
|
145 | (1) |
|
The Default Gateway (7.2.8) |
|
|
146 | (1) |
|
|
147 | (5) |
|
Local-Area Networks (7.3.1) |
|
|
147 | (1) |
|
Local and Remote Network Segments (7.3.2) |
|
|
148 | (1) |
|
All Hosts in One Local Segment |
|
|
148 | (1) |
|
Hosts on a Remote Segment |
|
|
149 | (3) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
Check Your Understanding Questions |
|
|
153 | (4) |
|
Chapter 8 The Internet Protocol |
|
|
157 | (24) |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
Purpose of the IPv4 Address (8.1) |
|
|
158 | (1) |
|
|
158 | (1) |
|
Binary Conversion of an IPv4 Address (8.2) |
|
|
159 | (3) |
|
|
159 | (1) |
|
Binary to Decimal (8.2.3) |
|
|
160 | (2) |
|
The IPv4 Address Structure (8.3) |
|
|
162 | (4) |
|
Networks and Hosts (8.3.2) |
|
|
162 | (1) |
|
|
163 | (1) |
|
Calculate Whether the Destination Is Local or Remote (8.3.6) |
|
|
164 | (1) |
|
Calculate the Number of Hosts (8.3.7) |
|
|
165 | (1) |
|
Classful IPv4 Addressing (8.4) |
|
|
166 | (2) |
|
Classful and Classless Addressing (8.4.1) |
|
|
166 | (2) |
|
Public and Private IPv4 Addresses (8.5) |
|
|
168 | (3) |
|
Private IPv4 Addressing (8.5.1) |
|
|
168 | (1) |
|
Assignment of IPv4 Addresses (8.5.2) |
|
|
169 | (2) |
|
Unicast, Broadcast, and Multicast Addresses (8.6) |
|
|
171 | (4) |
|
Unicast Transmission (8.6.2) |
|
|
171 | (1) |
|
Broadcast Transmission (8.6.4) |
|
|
172 | (1) |
|
Multicast Transmission (8.6.6) |
|
|
173 | (2) |
|
|
175 | (2) |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
177 | (1) |
|
Check Your Understanding Questions |
|
|
177 | (4) |
|
Chapter 9 Dynamic Addressing with DHCP |
|
|
181 | (12) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
182 | (1) |
|
Static and Dynamic Addressing (9.1) |
|
|
182 | (3) |
|
Static IPv4 Address Assignment (9.1.1) |
|
|
182 | (1) |
|
Dynamic IPv4 Address Assignment (9.1.2) |
|
|
183 | (1) |
|
|
184 | (1) |
|
DHCPv4 Configuration (9.2) |
|
|
185 | (3) |
|
|
185 | (1) |
|
DHCP Service Configuration (9.2.4) |
|
|
186 | (2) |
|
|
188 | (1) |
|
|
189 | (1) |
|
|
189 | (1) |
|
Check Your Understanding Questions |
|
|
189 | (4) |
|
Chapter 10 IPv4 and IPv6 Address Management |
|
|
193 | (18) |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
194 | (1) |
|
Network Boundaries (10.1) |
|
|
194 | (2) |
|
Routers as Gateways (10.1.2) |
|
|
194 | (1) |
|
Routers as Boundaries Between Networks (10.1.3) |
|
|
195 | (1) |
|
Network Address Translation (10.2) |
|
|
196 | (2) |
|
|
196 | (2) |
|
|
198 | (2) |
|
|
198 | (2) |
|
|
200 | (1) |
|
IPv6 Address Size (10.3.2) |
|
|
200 | (1) |
|
IPv4 and IPv6 Coexistence (10.3.4) |
|
|
201 | (2) |
|
|
201 | (1) |
|
|
202 | (1) |
|
|
203 | (1) |
|
|
203 | (3) |
|
IPv6 Autoconfiguration and Link-Local Addresses (10.4.3) |
|
|
203 | (1) |
|
IPv6 Address Representation (10.4.5) |
|
|
204 | (1) |
|
Compressing IPv6 Addresses |
|
|
204 | (1) |
|
Rule 1 Omit Leading Zeros |
|
|
205 | (1) |
|
Rule 2 Omit One "All Zero" Segment |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
Check Your Understanding Questions |
|
|
208 | (3) |
|
Chapter 11 Transport Layer Services |
|
|
211 | (18) |
|
|
211 | (1) |
|
|
211 | (1) |
|
|
212 | (1) |
|
The Client/Server Relationship (11.1) |
|
|
212 | (3) |
|
Client and Server Interaction (11.1.1) |
|
|
212 | (1) |
|
Client Requests a Web Page (11.1.3) |
|
|
213 | (1) |
|
URI, URN, and URL (11.1.4) |
|
|
214 | (1) |
|
|
215 | (3) |
|
Protocol Operations (11.2.1) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
UDP Best Effort Delivery (11.2.5) |
|
|
217 | (1) |
|
|
218 | (3) |
|
TCP and UDP Port Numbers (11.3.2) |
|
|
218 | (2) |
|
Destination and Source Port Numbers (11.3.3) |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
221 | (2) |
|
The netstat Command (11.3.5) |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
225 | (1) |
|
|
225 | (1) |
|
Check Your Understanding Questions |
|
|
225 | (4) |
|
Chapter 12 Application Layer Services |
|
|
229 | (20) |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
230 | (1) |
|
Network Application Services (12.1) |
|
|
230 | (1) |
|
Common Network Application Services (12.1.1) |
|
|
230 | (1) |
|
Domain Name System (12.2) |
|
|
231 | (2) |
|
Domain Name Translation (12.2.1) |
|
|
231 | (1) |
|
|
232 | (1) |
|
Web Clients and Servers (12.3) |
|
|
233 | (1) |
|
|
233 | (1) |
|
FTP Clients and Servers (12.4) |
|
|
234 | (3) |
|
File Transfer Protocol (12.4.1) |
|
|
235 | (1) |
|
FTP Client Software (12.4.3) |
|
|
236 | (1) |
|
|
237 | (2) |
|
|
237 | (1) |
|
Security Issues with Telnet (12.5.3) |
|
|
238 | (1) |
|
Email and Messaging (12.6) |
|
|
239 | (5) |
|
Email Clients and Servers (12.6.1) |
|
|
239 | (1) |
|
|
240 | (1) |
|
Simple Mail Transfer Protocol (SMTP) |
|
|
240 | (1) |
|
Post Office Protocol (POP3) |
|
|
241 | (1) |
|
Internet Message Access Protocol (IMAP4) |
|
|
241 | (1) |
|
|
242 | (1) |
|
Internet Phone Calls (12.6.4) |
|
|
243 | (1) |
|
|
244 | (2) |
|
|
246 | (1) |
|
|
246 | (1) |
|
|
246 | (1) |
|
Check Your Understanding Questions |
|
|
246 | (3) |
|
Chapter 13 Build a Home Network |
|
|
249 | (22) |
|
|
249 | (1) |
|
|
249 | (1) |
|
|
250 | (1) |
|
Home Network Basics (13.1) |
|
|
250 | (3) |
|
Connecting Home Devices (13.1.1) |
|
|
250 | (1) |
|
Components of a Home Network (13.1.2) |
|
|
251 | (1) |
|
Typical Home Network Routers (13.1.3) |
|
|
252 | (1) |
|
Network Technologies in the Home (13.2) |
|
|
253 | (4) |
|
The Electromagnetic Spectrum (13.2.1) |
|
|
253 | (1) |
|
LAN Wireless Frequencies (13.2.2) |
|
|
254 | (1) |
|
Wired Network Technologies (13.2.3) |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
256 | (1) |
|
|
256 | (1) |
|
Wireless Standards (13.3) |
|
|
257 | (2) |
|
|
257 | (1) |
|
Wireless Settings (13.3.2) |
|
|
257 | (2) |
|
Wireless Traffic Controls (13.4) |
|
|
259 | (2) |
|
Wireless Channels (13.4.1) |
|
|
259 | (1) |
|
Wireless as a Shared Media (13.4.2) |
|
|
260 | (1) |
|
Set Up a Home Router (13.5) |
|
|
261 | (4) |
|
First Time Setup (13.5.1) |
|
|
261 | (1) |
|
Design Considerations (13.5.2) |
|
|
261 | (2) |
|
MAC Address Filtering (13.5.3) |
|
|
263 | (2) |
|
|
265 | (2) |
|
|
267 | (1) |
|
|
267 | (1) |
|
Check Your Understanding Questions |
|
|
267 | (4) |
|
Chapter 14 Connect to the Internet |
|
|
271 | (28) |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
ISP Connectivity Options (14.1) |
|
|
272 | (4) |
|
|
272 | (1) |
|
|
273 | (1) |
|
Cable and DSL Connections (14.1.3) |
|
|
274 | (1) |
|
Additional Connectivity Options (14.1.4) |
|
|
275 | (1) |
|
Network Virtualization (14.2) |
|
|
276 | (8) |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
277 | (1) |
|
Cloud Computing and Virtualization (14.2.5) |
|
|
277 | (2) |
|
Advantages of Virtualization (14.2.6) |
|
|
279 | (1) |
|
|
279 | (1) |
|
|
279 | (1) |
|
|
280 | (1) |
|
Network Virtualization (14.2.9) |
|
|
281 | (1) |
|
Control Plane and Data Plane (14.2.10) |
|
|
282 | (1) |
|
Network Virtualization and SDN (14.2.11) |
|
|
283 | (1) |
|
SDN Architecture (14.2.12) |
|
|
283 | (1) |
|
Mobile Device Connectivity (14.3) |
|
|
284 | (9) |
|
Mobile Devices and Wi-Fi (14.3.1) |
|
|
284 | (1) |
|
|
285 | (1) |
|
Configure Mobile Wi-Fi Connectivity (14.3.3) |
|
|
286 | (2) |
|
Configure Cellular Data Settings (14.3.4) |
|
|
288 | (1) |
|
|
288 | (1) |
|
|
289 | (1) |
|
Simple Connectivity with Bluetooth (14.3.6) |
|
|
290 | (1) |
|
Bluetooth Pairing (14.3.7) |
|
|
290 | (3) |
|
|
293 | (2) |
|
|
295 | (1) |
|
|
295 | (1) |
|
Check Your Understanding Questions |
|
|
295 | (4) |
|
Chapter 15 Security Considerations |
|
|
299 | (26) |
|
|
299 | (1) |
|
|
299 | (1) |
|
|
300 | (1) |
|
|
300 | (2) |
|
Types of Threats (15.1.1) |
|
|
300 | (1) |
|
Internal and External Threats (15.1.2) |
|
|
301 | (1) |
|
|
301 | (1) |
|
|
302 | (1) |
|
Social Engineering Attacks (15.2) |
|
|
302 | (2) |
|
Overview of Social Engineering (15.2.1) |
|
|
302 | (1) |
|
Types of Social Engineering Attacks (15.2.2) |
|
|
303 | (1) |
|
|
303 | (1) |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
304 | (4) |
|
Malicious Software (15.3.1) |
|
|
305 | (1) |
|
Types of Malware (15.3.2) |
|
|
305 | (1) |
|
|
305 | (1) |
|
|
305 | (1) |
|
|
305 | (1) |
|
|
306 | (1) |
|
|
306 | (1) |
|
|
306 | (1) |
|
Adware and Popups (15.3.4) |
|
|
306 | (1) |
|
Botnets and Zombies (15.3.5) |
|
|
307 | (1) |
|
Denial-of-Service Attacks (15.4) |
|
|
308 | (2) |
|
Denial of Service (15.4.1) |
|
|
308 | (1) |
|
Distributed Denial of Service (15.4.2) |
|
|
309 | (1) |
|
|
310 | (1) |
|
|
310 | (4) |
|
Security Practices and Procedures (15.5.1) |
|
|
310 | (2) |
|
Security Tools and Applications (15.5.2) |
|
|
312 | (1) |
|
Patches and Updates (15.5.3) |
|
|
313 | (1) |
|
Antimalware Software (15.6) |
|
|
314 | (4) |
|
Signs of Infections (15.6.1) |
|
|
314 | (1) |
|
Antivirus Software (15.6.2) |
|
|
315 | (1) |
|
Antispam Software (15.6.3) |
|
|
316 | (1) |
|
Antispyware Software (15.6.4) |
|
|
316 | (1) |
|
|
317 | (1) |
|
|
317 | (1) |
|
Additional Safeguards (15.6.5) |
|
|
317 | (1) |
|
|
318 | (3) |
|
|
321 | (1) |
|
|
321 | (1) |
|
Check Your Understanding Questions |
|
|
321 | (4) |
|
Chapter 16 Configure Network and Device Security |
|
|
325 | (24) |
|
|
325 | (1) |
|
|
325 | (1) |
|
|
326 | (1) |
|
Wireless Security Measures (16.1) |
|
|
326 | (10) |
|
Wireless Vulnerabilities (16.1.1) |
|
|
326 | (1) |
|
A Comprehensive Security Plan (16.1.2) |
|
|
327 | (6) |
|
|
333 | (1) |
|
Changing Default Settings (16.1.5) |
|
|
334 | (1) |
|
MAC Address Filtering (16.1.6) |
|
|
335 | (1) |
|
Implement Wireless Security (16.2) |
|
|
336 | (2) |
|
Open Authentication (16.2.1) |
|
|
336 | (1) |
|
Authentication and Association (16.2.2) |
|
|
336 | (1) |
|
Authentication Protocols (16.2.3) |
|
|
337 | (1) |
|
Configure a Firewall (16.3) |
|
|
338 | (6) |
|
Firewall Overview (16.3.1) |
|
|
338 | (1) |
|
Firewall Operation (16.3.2) |
|
|
338 | (1) |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
341 | (3) |
|
|
344 | (1) |
|
|
345 | (1) |
|
|
345 | (1) |
|
|
346 | (1) |
|
Check Your Understanding Questions |
|
|
346 | (3) |
|
Chapter 17 Cisco Switches and Routers |
|
|
349 | (24) |
|
|
349 | (1) |
|
|
349 | (1) |
|
|
350 | (1) |
|
|
350 | (5) |
|
Connect More Devices (17.1.1) |
|
|
350 | (1) |
|
Cisco LAN Switches (17.1.2) |
|
|
351 | (1) |
|
|
352 | (1) |
|
|
352 | (1) |
|
|
353 | (1) |
|
|
353 | (1) |
|
LAN Switch Components (17.1.5) |
|
|
354 | (1) |
|
Switch Boot Process (17.2) |
|
|
355 | (4) |
|
Power Up the Switch (17.2.1) |
|
|
355 | (3) |
|
In-Band and Out-of-Band Management (17.2.3) |
|
|
358 | (1) |
|
|
358 | (1) |
|
|
358 | (1) |
|
IOS Startup Files (17.2.4) |
|
|
358 | (1) |
|
|
359 | (2) |
|
Router Components (17.3.2) |
|
|
360 | (1) |
|
Router Interface Ports (17.3.3) |
|
|
360 | (1) |
|
Router Boot Process (17.4) |
|
|
361 | (6) |
|
Power Up the Router (17.4.1) |
|
|
361 | (4) |
|
Management Ports (17.4.2) |
|
|
365 | (2) |
|
|
367 | (1) |
|
|
368 | (1) |
|
|
368 | (1) |
|
Check Your Understanding Questions |
|
|
368 | (5) |
|
Chapter 18 The Cisco IOS Command Line |
|
|
373 | (18) |
|
|
373 | (1) |
|
|
373 | (1) |
|
|
374 | (1) |
|
|
374 | (2) |
|
The Cisco IOS Command-Line Interface (18.1.1) |
|
|
374 | (1) |
|
Primary Command Modes (18.1.2) |
|
|
375 | (1) |
|
A Note About Syntax Checker Activities (18.1.5) |
|
|
376 | (1) |
|
The Command Structure (18.2) |
|
|
376 | (4) |
|
Basic IOS Command Structure (18.2.1) |
|
|
376 | (1) |
|
IOS Command Syntax (18.2.2) |
|
|
377 | (1) |
|
Hotkeys and Shortcuts (18.2.4) |
|
|
378 | (2) |
|
View Device Information (18.3) |
|
|
380 | (7) |
|
|
381 | (6) |
|
|
387 | (1) |
|
|
388 | (1) |
|
|
388 | (1) |
|
Check Your Understanding Questions |
|
|
388 | (3) |
|
Chapter 19 Build a Small Cisco Network |
|
|
391 | (24) |
|
|
391 | (1) |
|
|
391 | (1) |
|
|
392 | (1) |
|
Basic Switch Configuration (19.1) |
|
|
392 | (3) |
|
Basic Switch Configuration Steps (19.1.1) |
|
|
392 | (2) |
|
Switch Virtual Interface Configuration (19.1.2) |
|
|
394 | (1) |
|
Configure Initial Router Settings (19.2) |
|
|
395 | (3) |
|
Basic Router Configuration Steps (19.2.1) |
|
|
395 | (1) |
|
Basic Router Configuration Example (19.2.2) |
|
|
396 | (2) |
|
Secure the Devices (19.3) |
|
|
398 | (6) |
|
Password Recommendations (19.3.1) |
|
|
398 | (1) |
|
Secure Remote Access (19.3.2) |
|
|
399 | (1) |
|
|
400 | (2) |
|
|
402 | (2) |
|
Connecting the Switch to the Router (19.4) |
|
|
404 | (5) |
|
Default Gateway for a Host (19.4.1) |
|
|
404 | (2) |
|
Default Gateway on a Switch (19.4.2) |
|
|
406 | (3) |
|
|
409 | (2) |
|
|
411 | (1) |
|
|
411 | (1) |
|
Check Your Understanding Questions |
|
|
412 | (3) |
|
Chapter 20 Troubleshoot Common Network Problems |
|
|
415 | (44) |
|
|
415 | (1) |
|
|
415 | (1) |
|
|
416 | (1) |
|
The Troubleshooting Process (20.1) |
|
|
416 | (7) |
|
Network Troubleshooting Overview (20.1.1) |
|
|
416 | (1) |
|
Gather Information (20.1.2) |
|
|
416 | (2) |
|
Structured Troubleshooting Methods (20.1.3) |
|
|
418 | (1) |
|
|
418 | (1) |
|
|
419 | (1) |
|
|
420 | (1) |
|
|
420 | (1) |
|
|
421 | (1) |
|
|
421 | (1) |
|
|
421 | (1) |
|
Guidelines for Selecting a Troubleshooting Method (20.1.4) |
|
|
422 | (1) |
|
Physical Layer Problems (20.2) |
|
|
423 | (3) |
|
|
1 | (422) |
|
|
423 | (1) |
|
|
423 | (1) |
|
The Senses of Smell and Taste |
|
|
424 | (1) |
|
|
424 | (1) |
|
|
424 | (1) |
|
Wireless Router LEDs (20.2.2) |
|
|
424 | (2) |
|
Cabling Problems (20.2.3) |
|
|
426 | (1) |
|
Troubleshooting Commands (20.3) |
|
|
426 | (12) |
|
Overview of Troubleshooting Commands (20.3.1) |
|
|
426 | (1) |
|
The ipconfig Command (20.3.2) |
|
|
427 | (3) |
|
The ping Command (20.3.4) |
|
|
430 | (1) |
|
|
431 | (1) |
|
Divide and Conquer with ping (20.3.7) |
|
|
432 | (1) |
|
The tracert Command (20.3.8) |
|
|
433 | (1) |
|
The netstat Command (20.3.9) |
|
|
434 | (2) |
|
The nslookup Command (20.3.10) |
|
|
436 | (2) |
|
Troubleshoot Wireless Issues (20.4) |
|
|
438 | (3) |
|
Causes of Wireless Issues (20.4.1) |
|
|
438 | (1) |
|
Authentication and Association Errors (20.4.2) |
|
|
439 | (2) |
|
Common Internet Connectivity Issues (20.5) |
|
|
441 | (3) |
|
DHCP Server Configuration Errors (20.5.1) |
|
|
441 | (1) |
|
Check Internet Configuration (20.5.2) |
|
|
442 | (2) |
|
Check Firewall Settings (20.5.3) |
|
|
444 | (1) |
|
|
444 | (6) |
|
|
445 | (1) |
|
When to Call for Help (20.6.2) |
|
|
445 | (1) |
|
Support Desk Interaction (20.6.3) |
|
|
446 | (1) |
|
Issue Resolution (20.6.4) |
|
|
447 | (1) |
|
Support Desk Tickets and Work Orders (20.6.5) |
|
|
448 | (2) |
|
|
450 | (3) |
|
|
453 | (1) |
|
|
453 | (1) |
|
|
453 | (1) |
|
Check Your Understanding Questions |
|
|
454 | (5) |
Appendix A Answers to the "Check Your Understanding" Questions |
|
459 | (12) |
Glossary |
|
471 | (20) |
Index |
|
491 | |