Muutke küpsiste eelistusi

Scaling Networks Companion Guide [Kõva köide]

  • Formaat: Hardback, 640 pages, kõrgus x laius x paksus: 240x216x32 mm, kaal: 1340 g
  • Sari: Companion Guide
  • Ilmumisaeg: 10-Apr-2014
  • Kirjastus: Cisco Press
  • ISBN-10: 1587133288
  • ISBN-13: 9781587133282
  • Formaat: Hardback, 640 pages, kõrgus x laius x paksus: 240x216x32 mm, kaal: 1340 g
  • Sari: Companion Guide
  • Ilmumisaeg: 10-Apr-2014
  • Kirjastus: Cisco Press
  • ISBN-10: 1587133288
  • ISBN-13: 9781587133282
Scaling Networks Companion Guide is the official supplemental textbook for the Scaling Networks course in the Cisco®  CCNA® Academy®

 

This course describes the architecture, components, and operations of routers and switches in a large and complex network. You will learn how to configure routers and switches for advanced functionality. By the end of this course, you will be able to configure and troubleshoot routers and switches and resolve common issues with OSPF, EIGRP, STP, and VTP in both IPv4 and IPv6 networks. You will also develop the knowledge and skills needed to implement DHCP and DNS operations in a network.

 

The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.

 

The books features help you focus on important concepts to succeed in this course:

 





Chapter objectivesReview core concepts by answering the focus questions listed at the beginning of each chapter. Key termsRefer to the lists of networking vocabulary introduced and highlighted in context in each chapter. GlossaryConsult the comprehensive Glossary with over 180 terms.

Summary of Activities and LabsMaximize your study time with this complete list of all associated practice exercises at the end of each chapter. Check Your UnderstandingEvaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.

 

Related Title: Scaling Networks Lab Manual

 

ISBN-13: 978-1-58713-325-1

ISBN-10: 1-58713-325-3

 





Interactive ActivitiesReinforce your understanding of topics with all the different exercises from the online course identified throughout the book with this icon. VideosWatch the videos embedded within the online course. Packet Tracer ActivitiesExplore and visualize networking concepts using Packet Tracer exercises interspersed throughout the chapters. Hands-on LabsWork through allthe course labs and Class Activities that are included in the course and published in the separate Lab Manual.

 

 
Introduction xx
Chapter 1 Introduction to Scaling Networks 1(48)
Objectives
1(1)
Key Terms
1(2)
Introduction
3(1)
Implementing a Network Design
3(15)
Hierarchical Network Design
3(8)
The Need to Scale the Network
3(2)
Enterprise Business Devices
5(1)
Hierarchical Network Design
6(1)
Cisco Enterprise Architecture
7(2)
Failure Domains
9(2)
Expanding the Network
11(7)
Design for Scalability
11(1)
Planning for Redundancy
12(1)
Increasing Bandwidth
13(1)
Expanding the Access Layer
14(1)
Fine-tuning Routing Protocols
15(3)
Selecting Network Devices
18(26)
Switch Hardware
18(8)
Switch Platforms
18(3)
Port Density
21(1)
Forwarding Rates
22(1)
Power over Ethernet
23(2)
Multilayer Switching
25(1)
Router Hardware
26(4)
Router Requirements
26(2)
Cisco Routers
28(1)
Router Hardware
29(1)
Managing Devices
30(15)
Managing IOS Files and Licensing
30(1)
In-Band Versus Out-of-Band Management
30(1)
Basic Router CLI Commands
31(3)
Basic Router show Commands
34(5)
Basic Switch CLI Commands
39(1)
Basic Switch show Commands
40(4)
Summary
44(1)
Practice
45(1)
Class Activities
45(1)
Labs
45(1)
Packet Tracer Activities
45(1)
Check Your Understanding Questions
46(3)
Chapter 2 LAN Redundancy 49(72)
Objectives
49(1)
Key Terms
49(2)
Introduction
51(1)
Spanning Tree Concepts
52(25)
Purpose of Spanning Tree
52(7)
Redundancy at OSI Layers 1 and 2
52(2)
Issues with Layer 1 Redundancy: MAC Database Instability
54(2)
Issues with Layer 1 Redundancy: Broadcast Storms
56(1)
Issues with Layer 1 Redundancy: Duplicate Unicast Frames
57(2)
STP Operation
59(18)
Spanning Tree Algorithm: Introduction
59(2)
Spanning Tree Algorithm: Port Roles
61(2)
Spanning Tree Algorithm: Root Bridge
63(1)
Spanning Tree Algorithm: Path Cost
64(3)
802.1D BPDU Frame Format
67(1)
BPDU Propagation and Process
68(6)
Extended System ID
74(3)
Varieties of Spanning Tree Protocols
77(13)
Overview
77(3)
List of Spanning Tree Protocols
78(1)
Characteristics of the Spanning Tree Protocols
79(1)
PVST+
80(4)
Overview of PVST+
80(2)
Port States and PVST+ Operation
82(1)
Extended System ID and PVST+ Operation
83(1)
Rapid PVST+
84(6)
Overview of Rapid PVST+
84(2)
RSTP BPDU
86(1)
Edge Ports
87(1)
Link Types
88(2)
Spanning Tree Configuration
90(15)
PVST+ Configuration
90(8)
Catalyst 2960 Default Configuration
90(1)
Configuring and Verifying the Bridge ID
91(2)
PortFast and BPDU Guard
93(2)
PVST+ Load Balancing
95(3)
Rapid PVST+ Configuration
98(3)
Spanning Tree Mode
98(3)
STP Configuration Issues
101(4)
Analyzing the STP Topology
101(1)
Expected Topology Versus Actual Topology
102(1)
Overview of Spanning Tree Status
102(1)
Spanning Tree Failure Consequences
103(2)
Repairing a Spanning Tree Problem
105(1)
First Hop Redundancy Protocols
105(10)
Concept of First Hop Redundancy Protocols
106(3)
Default Gateway Limitations
106(1)
Router Redundancy
107(1)
Steps for Router Failover
108(1)
Varieties of First Hop Redundancy Protocols
109(1)
First Hop Redundancy Protocols
109(1)
FHRP Verification
110(6)
HSRP Verification
110(2)
GLBP Verification
112(2)
Syntax Checker - HSRP and GLBP
114(1)
Summary
115(1)
Practice
116(1)
Class Activities
116(1)
Labs
116(1)
Packet Tracer Activities
116(1)
Check Your Understanding Questions
117(4)
Chapter 3 LAN Aggregation 121(24)
Objectives
121(1)
Key Terms
121(1)
Introduction
122(1)
Link Aggregation Concepts
122(8)
Link Aggregation
123(2)
Introduction to Link Aggregation
123(1)
Advantages of EtherChannel
124(1)
EtherChannel Operation
125(5)
Implementation Restrictions
125(1)
Port Aggregation Protocol
126(2)
Link Aggregation Control Protocol
128(2)
Link Aggregation Configuration
130(9)
Configuring EtherChannel
130(3)
Configuration Guidelines
130(1)
Configuring Interfaces
131(2)
Verifying and Troubleshooting EtherChannel
133(7)
Verifying EtherChannel
133(2)
Troubleshooting EtherChannel
135(4)
Summary
139(1)
Practice
140(1)
Class Activities
140(1)
Labs
140(1)
Packet Tracer Activities
140(1)
Check Your Understanding Questions
141(4)
Chapter 4 Wireless LANs 145(92)
Objectives
145(1)
Key Terms
145(2)
Introduction
147(1)
Wireless Concepts
147(26)
Introduction to Wireless
147(9)
Supporting Mobility
148(1)
Benefits of Wireless
148(1)
Wireless Technologies
149(1)
Radio Frequencies
150(1)
802.11 Standards
151(2)
Wi-Fi Certification
153(1)
Comparing WLANs to a LAN
154(2)
Components of WLANs
156(14)
Wireless NICs
156(1)
Wireless Home Router
157(2)
Business Wireless Solutions
159(1)
Wireless Access Points
160(2)
Small Wireless Deployment Solutions
162(3)
Large Wireless Deployment Solutions
165(3)
Wireless Antennas
168(2)
802.11 WLAN Topologies
170(3)
802.11 Wireless Topology Modes
170(1)
Ad Hoc Mode
170(1)
Infrastructure Mode
171(2)
Wireless LAN Operations
173(25)
802.11 Frame Structure
173(8)
Wireless 802.11 Frame
173(2)
Frame Control Field
175(2)
Wireless Frame Type
177(1)
Management Frames
177(3)
Control Frames
180(1)
Wireless Operation
181(10)
Carrier Sense Multiple Access with Collision Avoidance
181(2)
Wireless Clients and Access Point Association
183(1)
Association Parameters
183(4)
Discovering APs
187(2)
Authentication
189(2)
Channel Management
191(7)
Frequency Channel Saturation
191(2)
Selecting Channels
193(3)
Planning a WLAN Deployment
196(2)
Wireless LAN Security
198(13)
WLAN Threats
198(7)
Securing Wireless
198(1)
DoS Attack
199(1)
Management Frame DoS Attacks
200(2)
Rogue Access Points
202(1)
Man-in-the-Middle Attack
203(2)
Securing WLANs
205(1)
Wireless Security Overview
205(6)
Shared Key Authentication Methods
206(2)
Encryption Methods
208(1)
Authenticating a Home User
208(2)
Authentication in the Enterprise
210(1)
Wireless LAN Configuration
211(21)
Configure a Wireless Router
211(14)
Configuring a Wireless Router
211(2)
Setting Up and Installing Initial Linksys EA6500
213(4)
Configuring the Linksys Smart Wi-Fi Home Page
217(1)
Smart Wi-Fi Settings
218(2)
Smart Wi-Fi Tools
220(4)
Backing Up a Configuration
224(1)
Configuring Wireless Clients
225(1)
Connecting Wireless Clients
225(1)
Troubleshoot WLAN Issues
226(7)
Troubleshooting Approaches
226(1)
Wireless Client Not Connecting
227(2)
Troubleshooting When the Network Is Slow
229(1)
Updating Firmware
230(2)
Summary
232(1)
Practice
233(1)
Class Activities
233(1)
Labs
233(1)
Packet Tracer Activities
234(1)
Check Your Understanding Questions
234(3)
Chapter 5 Adjust and Troubleshoot Single-Area OSPF 237(78)
Objectives
237(1)
Key Terms
237(1)
Introduction
238(1)
Advanced Single-Area OSPF Configurations
238(48)
Routing in the Distribution and Core Layers
238(13)
Routing Versus Switching
238(1)
Static Routing
239(1)
Dynamic Routing Protocols
240(1)
Open Shortest Path First
241(1)
Configuring Single-Area OSPF
242(2)
Verifying Single-Area OSPF
244(3)
Configuring Single-Area OSPFv3
247(2)
Verifying Single-Area OSPFv3
249(2)
OSPF in Multiaccess Networks
251(17)
OSPF Network Types
251(2)
Challenges in Multiaccess Networks
253(2)
OSPF Designated Router
255(1)
Verifying DR/BDR Roles
256(3)
Verifying DR/BDR Adjacencies
259(2)
Default DR/BDR Election Process
261(1)
DR/BDR Election Process
262(3)
The OSPF Priority
265(1)
Changing the OSPF Priority
265(3)
Default Route Propagation
268(5)
Propagating a Default Static Route in OSPFv2
268(1)
Verifying the Propagated Default Route
269(2)
Propagating a Default Static Route in OSPFv3
271(1)
Verifying the Propagated IPv6 Default Route
272(1)
Fine-Tuning OSPF Interfaces
273(6)
OSPF Hello and Dead Intervals
273(2)
Modifying OSPFv2 Intervals
275(2)
Modifying OSPFv3 Intervals
277(2)
Secure OSPF
279(7)
Routers Are Targets
279(1)
Secure Routing Updates
280(1)
MD5 Authentication
281(1)
Configuring OSPF MD5 Authentication
282(1)
OSPF MD5 Authentication Example
283(1)
Verifying OSPF MD5 Authentication
284(2)
Troubleshooting Single-Area OSPF Implementations
286(20)
Components of Troubleshooting Single-Area OSPF
286(7)
Overview
286(1)
OSPF States
287(1)
OSPF Troubleshooting Commands
288(4)
Components of Troubleshooting OSPF
292(1)
Troubleshoot Single-Area OSPFv2 Routing Issues
293(6)
Troubleshooting Neighbor Issues
293(4)
Troubleshooting OSPF Routing Table Issues
297(2)
Troubleshoot Single-Area OSPFv3 Routing Issues
299(9)
OSPFv3 Troubleshooting Commands
299(3)
Troubleshooting OSPFv3
302(4)
Summary
306(2)
Practice
308(1)
Class Activities
308(1)
Labs
308(1)
Packet Tracer Activities
308(1)
Check Your Understanding Questions
309(6)
Chapter 6 Multiarea OSPF 315(46)
Objectives
315(1)
Key Terms
315(1)
Introduction
316(1)
Multiarea OSPF Operation
316(13)
Why Multiarea OSPF?
316(5)
Single-Area OSPF
316(1)
Multiarea OSPF
317(2)
OSPF Two-Layer Area Hierarchy
319(1)
Types of OSPF Routers
320(1)
Multiarea OSPF LSA Operation
321(5)
OSPF LSA Types
321(1)
OSPF LSA Type 1
322(1)
OSPF LSA Type 2
323(1)
OSPF LSA Type 3
324(1)
OSPF LSA Type 4
325(1)
OSPF LSA Type 5
326(1)
OSPF Routing Table and Types of Routes
326(3)
OSPF Routing Table Entries
327(1)
OSPF Route Calculation
328(1)
Configuring Multiarea OSPF
329(25)
Configuring Multiarea OSPFv2 and OSPFv3
329(5)
Implementing Multiarea OSPF
329(1)
Configuring Multiarea OSPF
330(2)
Configuring Multiarea OSPFv3
332(2)
OSPF Route Summarization
334(8)
OSPF Route Summarization
334(2)
Interarea and External Route Summarization
336(2)
Interarea Route Summarization
338(1)
Calculating the Summary Route
339(1)
Configuring Interarea Route Summarization
340(2)
Verifying Multiarea OSPF
342(14)
Verifying Multiarea OSPF
342(1)
Verify General Multiarea OSPF Settings
343(2)
Verify the OSPF Routes
345(1)
Verify the Multiarea OSPF LSDB
346(3)
Verify Multiarea OSPFv3
349(5)
Summary
354(2)
Practice
356(1)
Class Activities
356(1)
Labs
356(1)
Packet Tracer Activities
356(1)
Check Your Understanding Questions
356(5)
Chapter 7 EIGRP 361(92)
Objectives
361(1)
Key Terms
361(2)
Introduction
363(1)
Characteristics of EIGRP
363(14)
Basic Features of EIGRP
363(5)
Features of EIGRP
364(1)
Protocol-Dependent Modules
365(2)
Reliable Transport Protocol
367(1)
Authentication
368(1)
Types of EIGRP Packets
368(5)
EIGRP Packet Types
368(2)
EIGRP Hello Packets
370(1)
EIGRP Update and Acknowledgment Packets
370(2)
EIGRP Query and Reply Packets
372(1)
EIGRP Messages
373(4)
Encapsulating EIGRP Messages
373(1)
EIGRP Packet Header and TLV
374(3)
Configuring EIGRP for IPv4
377(22)
Configuring EIGRP with IPv4
377(15)
EIGRP Network Topology
377(2)
Autonomous System Numbers
379(2)
The Router EIGRP Command
381(1)
EIGRP Router ID
382(2)
Configuring the EIGRP Router ID
384(1)
The network Command
385(2)
The network Command and Wildcard Mask
387(2)
Passive Interface
389(3)
Verifying EIGRP with IPv4
392(7)
Verifying EIGRP: Examining Neighbors
392(1)
Verifying EIGRP: show ip protocols Command
393(3)
Verifying EIGRP: Examine the IPv4 Routing Table
396(3)
Operation of EIGRP
399(30)
EIGRP Initial Route Discovery
399(3)
EIGRP Neighbor Adjacency
399(1)
EIGRP Topology Table
400(1)
EIGRP Convergence
401(1)
Metrics
402(11)
EIGRP Composite Metric
402(3)
Examining Interface Values
405(1)
Bandwidth Metric
406(2)
Delay Metric
408(1)
How to Calculate the EIGRP Metric
409(1)
Calculating the EIGRP Metric
410(3)
DUAL and the Topology Table
413(9)
DUAL Concepts
413(1)
Introduction to DUAL
413(1)
Successor and Feasible Distance
414(1)
Feasible Successors, Feasibility Condition, and Reported Distance
415(2)
Topology Table: show ip eigrp topology Command
417(1)
Topology Table: show ip eigrp topology Command (Cont.)
418(2)
Topology Table: No Feasible Successor
420(2)
DUAL and Convergence
422(7)
DUAL Finite State Machine (FSM)
423(1)
DUAL: Feasible Successor
424(2)
DUAL: No Feasible Successor
426(3)
Configuring EIGRP for IPv6
429(16)
EIGRP for IPv4 Versus IPv6
429(3)
EIGRP for IPv6
429(1)
Comparing EIGRP for IPv4 and IPv6
430(2)
IPv6 Link-Local Addresses
432(1)
Configuring EIGRP for IPv6
432(8)
EIGRP for IPv6 Network Topology
432(2)
Configuring IPv6 Link-Local Addresses
434(2)
Configuring the EIGRP for IPv6 Routing Process
436(1)
The ipv6 eigrp Interface Command
437(3)
Verifying EIGRP for IPv6
440(6)
Verifying EIGRP for IPv6: Examining Neighbors
440(1)
Verifying EIGRP for IPv6: show ipv6 protocols Command
441(1)
Verifying EIGRP for IPv6: Examine the IPv6 Routing Table
442(3)
Summary
445(1)
Practice
446(1)
Class Activities
446(1)
Labs
447(1)
Packet Tracer Activities
447(1)
Check Your Understanding Questions
447(6)
Chapter 8 EIGRP Advanced Configurations and Troubleshooting 453(64)
Objectives
453(1)
Key Terms
453(1)
Introduction
454(1)
Advanced EIGRP Configurations
454(39)
Automatic Summarization
455(13)
Network Topology
455(2)
EIGRP Automatic Summarization
457(2)
Configuring EIGRP Automatic Summarization
459(1)
Verifying Auto-Summary: show ip protocols
460(2)
Verifying Auto-Summary: Topology Table
462(2)
Verifying Auto-Summary: Routing Table
464(1)
Summary Route
465(1)
Summary Route (Cont.)
466(2)
Manual Summarization
468(6)
Manual Summary Routes
468(2)
Configuring EIGRP Manual Summary Routes
470(1)
Verifying Manual Summary Routes
471(1)
EIGRP for IPv6: Manual Summary Routes
472(2)
Default Route Propagation
474(4)
Propagating a Default Static Route
474(2)
Verifying the Propagated Default Route
476(1)
EIGRP for IPv6: Default Route
477(1)
Fine-Tuning EIGRP Interfaces
478(8)
EIGRP Bandwidth Utilization
479(1)
Hello and Hold Timers
480(2)
Load-Balancing IPv4
482(2)
Load-Balancing IPv6
484(2)
Secure EIGRP
486(7)
Routing Protocol Authentication Overview
486(2)
Configuring EIGRP with MD5 Authentication
488(1)
EIGRP Authentication Example
489(2)
Verify Authentication
491(2)
Troubleshoot EIGRP
493(16)
Components of Troubleshooting EIGRP
493(3)
Basic EIGRP Troubleshooting Commands
493(2)
Components
495(1)
Troubleshoot EIGRP Neighbor Issues
496(4)
Layer 3 Connectivity
496(1)
EIGRP Parameters
497(1)
EIGRP Interfaces
498(2)
Troubleshoot EIGRP Routing Table Issues
500(11)
Passive Interface
500(2)
Missing Network Statement
502(2)
Automatic Summarization
504(5)
Summary
509(2)
Practice
511(1)
Class Activities
511(1)
Labs
511(1)
Packet Tracer Activities
511(1)
Check Your Understanding Questions
512(5)
Chapter 9 IOS Images and Licensing 517(38)
Objectives
517(1)
Key Terms
517(1)
Introduction
518(1)
Managing IOS System Files
518(18)
Naming Conventions
519(12)
Cisco IOS Software Release Families and Trains
519(1)
Cisco IOS Release 12.4 Mainline and T Trains
519(2)
Cisco IOS Release 12.4 Mainline and T Numbering
521(1)
Cisco IOS Release 12.4 System Image Packaging
522(1)
Cisco IOS Release 15.0 M and T Trains
523(2)
Cisco IOS Release 15 Train Numbering
525(1)
IOS Release 15 System Image Packaging
526(2)
IOS Image Filenames
528(3)
Managing Cisco IOS Images
531(5)
TFTP Servers as a Backup Location
531(1)
Creating a Cisco IOS Image Backup
531(2)
Copying a Cisco IOS Image
533(1)
Boot System
534(2)
IOS Licensing
536(12)
Software Licensing
536(6)
Licensing Overview
536(2)
Licensing Process
538(1)
Step
1. Purchase the Software Package or Feature to Install
539(1)
Step
2. Obtain a License
539(2)
Step
3. Install the License
541(1)
License Verification and Management
542(9)
License Verification
542(2)
Activate an Evaluation Right-To-Use License
544(1)
Back Up the License
545(1)
Uninstall the License
546(2)
Summary
548(3)
Practice
551(1)
Class Activities
551(1)
Packet Tracer Activities
551(1)
Check Your Understanding Questions
551(4)
Appendix A Answers to the "Check Your Understanding" Questions 555(14)
Glossary 569(14)
Index 583
Allan Johnson entered the academic world in 1999 after ten years as a business owner/operator to dedicate his efforts to his passion for teaching. He holds both an MBA and an M.Ed. in Occupational Training and Development. He is an information technology instructor at Del Mar College in Corpus Christi, Texas. In 2003, Allan began to commit much of his time and energy to the CCNA Instructional Support Team, providing services to Networking Academy instructors worldwide and creating training materials. He now works full-time for Cisco Networking Academy as a learning systems developer.