Introduction |
|
xvii | |
|
Chapter 1 Internetworking |
|
|
1 | (30) |
|
|
2 | (8) |
|
|
10 | (2) |
|
|
11 | (1) |
|
Advantages of Reference Models |
|
|
12 | (1) |
|
|
12 | (17) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
16 | (5) |
|
|
21 | (2) |
|
|
23 | (3) |
|
|
26 | (3) |
|
|
29 | (2) |
|
Chapter 2 Ethernet Networking and Data Encapsulation |
|
|
31 | (32) |
|
Ethernet Networks in Review |
|
|
32 | (16) |
|
|
32 | (2) |
|
|
34 | (1) |
|
|
35 | (1) |
|
Half- and Full-Duplex Ethernet |
|
|
36 | (2) |
|
Ethernet at the Data Link Layer |
|
|
38 | (7) |
|
Ethernet at the Physical Layer |
|
|
45 | (3) |
|
|
48 | (7) |
|
|
49 | (1) |
|
|
49 | (2) |
|
|
51 | (2) |
|
|
53 | (2) |
|
|
55 | (4) |
|
The Cisco Three-Layer Hierarchical Model |
|
|
59 | (2) |
|
|
60 | (1) |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
61 | (2) |
|
Chapter 3 Introduction to TCP/IP |
|
|
63 | (42) |
|
|
64 | (1) |
|
A Brief History of TCP/IP |
|
|
64 | (1) |
|
|
65 | (28) |
|
The Process/Application Layer Protocols |
|
|
66 | (10) |
|
The Host-to-Host or Transport Layer Protocols |
|
|
76 | (9) |
|
The Internet Layer Protocols |
|
|
85 | (8) |
|
|
93 | (8) |
|
|
94 | (1) |
|
The Hierarchical IP Addressing Scheme |
|
|
94 | (5) |
|
Private IP Addresses (RFC 1918) |
|
|
99 | (2) |
|
|
101 | (3) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
Chapter 4 Easy Subnetting |
|
|
105 | (28) |
|
|
106 | (25) |
|
|
107 | (1) |
|
|
108 | (1) |
|
Classless Inter-Domain Routing (CIDR) |
|
|
109 | (2) |
|
|
111 | (1) |
|
Subnetting Class C Addresses |
|
|
112 | (11) |
|
Subnetting Class B Addresses |
|
|
123 | (8) |
|
|
131 | (2) |
|
Chapter 5 Troubleshooting IP Addressing |
|
|
133 | (10) |
|
Cisco's Way of Troubleshooting IP |
|
|
134 | (7) |
|
Determining IP Address Problems |
|
|
137 | (4) |
|
|
141 | (2) |
|
Chapter 6 Cisco's Internetworking Operating System (IOS) |
|
|
143 | (50) |
|
|
144 | (3) |
|
|
144 | (1) |
|
Connecting to a Cisco IOS Device |
|
|
145 | (2) |
|
|
147 | (1) |
|
Command-Line Interface (CLI) |
|
|
147 | (9) |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
149 | (2) |
|
Editing and Help Features |
|
|
151 | (5) |
|
Administrative Configurations |
|
|
156 | (13) |
|
|
157 | (1) |
|
|
157 | (2) |
|
|
159 | (6) |
|
Encrypting Your Passwords |
|
|
165 | (1) |
|
|
166 | (3) |
|
Router and Switch Interfaces |
|
|
169 | (8) |
|
|
172 | (5) |
|
Viewing, Saving, and Erasing Configurations |
|
|
177 | (15) |
|
Deleting the Configuration and Reloading the Device |
|
|
179 | (1) |
|
Verifying Your Configuration |
|
|
179 | (13) |
|
|
192 | (1) |
|
Chapter 7 Managing a Cisco Internetwork |
|
|
193 | (24) |
|
The Internal Components of a Cisco Router and Switch |
|
|
194 | (2) |
|
The Router and Switch Boot Sequence |
|
|
195 | (1) |
|
Backing Up and Restoring the Cisco Configuration |
|
|
196 | (4) |
|
Backing Up the Cisco Configuration |
|
|
197 | (2) |
|
Restoring the Cisco Configuration |
|
|
199 | (1) |
|
Erasing the Configuration |
|
|
199 | (1) |
|
|
200 | (3) |
|
|
202 | (1) |
|
Verifying DHCP on Cisco IOS |
|
|
202 | (1) |
|
|
203 | (3) |
|
Telnetting into Multiple Devices Simultaneously |
|
|
205 | (1) |
|
Checking Telnet Connections |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
206 | (4) |
|
|
207 | (1) |
|
Using DNS to Resolve Names |
|
|
208 | (2) |
|
Checking Network Connectivity and Troubleshooting |
|
|
210 | (5) |
|
|
210 | (1) |
|
Using the traceroute Command |
|
|
211 | (1) |
|
|
212 | (3) |
|
Using the show processes Command |
|
|
215 | (1) |
|
|
215 | (2) |
|
Chapter 8 Managing Cisco Devices |
|
|
217 | (26) |
|
Managing the Configuration Register |
|
|
218 | (6) |
|
Understanding the Configuration Register Bits |
|
|
218 | (2) |
|
Checking the Current Configuration Register Value |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
222 | (2) |
|
Backing Up and Restoring the Cisco IOS |
|
|
224 | (17) |
|
|
226 | (1) |
|
|
227 | (1) |
|
Restoring or Upgrading the Cisco Router IOS |
|
|
227 | (3) |
|
Using the Cisco IOS File System (Cisco IFS) |
|
|
230 | (5) |
|
|
235 | (2) |
|
Right-To-Use Licenses (Evaluation Licenses) |
|
|
237 | (3) |
|
Backing Up and Uninstalling the License |
|
|
240 | (1) |
|
|
241 | (2) |
|
|
243 | (44) |
|
|
245 | (2) |
|
|
247 | (11) |
|
The Cisco Router Internal Process |
|
|
253 | (1) |
|
Testing Your IP Routing Understanding |
|
|
254 | (4) |
|
|
258 | (9) |
|
|
259 | (2) |
|
|
261 | (4) |
|
|
265 | (2) |
|
Configuring IP Routing in Our Network |
|
|
267 | (9) |
|
|
268 | (5) |
|
|
273 | (3) |
|
|
276 | (2) |
|
|
276 | (2) |
|
Routing Information Protocol (RIP) |
|
|
278 | (6) |
|
|
279 | (3) |
|
Holding Down RIP Propagations |
|
|
282 | (2) |
|
|
284 | (3) |
|
Chapter 10 Wide Area Networks |
|
|
287 | (30) |
|
Introduction to Wide Area Networks |
|
|
288 | (9) |
|
|
289 | (2) |
|
|
291 | (1) |
|
|
292 | (1) |
|
|
293 | (1) |
|
|
294 | (3) |
|
Cabling the Serial Wide Area Network |
|
|
297 | (2) |
|
Serial Transmission 297 Data Terminal Equipment and Data Communication Equipment |
|
|
298 | (1) |
|
High-Level Data-Link Control (HDLC) Protocol |
|
|
299 | (2) |
|
Point-to-Point Protocol (PPP) |
|
|
301 | (15) |
|
Link Control Protocol (LCP) Configuration Options |
|
|
303 | (1) |
|
PPP Session Establishment |
|
|
303 | (1) |
|
PPP Authentication Methods |
|
|
304 | (1) |
|
Configuring PPP on Cisco Routers |
|
|
304 | (1) |
|
Configuring PPP Authentication |
|
|
305 | (1) |
|
Verifying and Troubleshooting Serial Links |
|
|
305 | (6) |
|
|
311 | (3) |
|
|
314 | (1) |
|
Configuring a PPPoE client |
|
|
315 | (1) |
|
|
316 | (1) |
Glossary |
|
317 | (48) |
Index |
|
365 | |