Introduction xxx <br> Chapter 1 Networking Today 1 <br>Objectives 1 <br>Key Terms 1 <br>Introduction (1.0) 3 <br>Networks Affect Our Lives (1.1) 3 <br> Networks Connect Us (1.1.1) 3 <br> No Boundaries (1.1.3) 3 <br>Network Components (1.2) 4 <br> Host Roles (1.2.1) 4 <br> Peer-to-Peer (1.2.2) 5 <br> End Devices (1.2.3) 6 <br> Intermediary Devices (1.2.4) 6 <br> Network Media (1.2.5) 7 <br>Network Representations and Topologies (1.3) 8 <br> Network Representations (1.3.1) 8 <br> Topology Diagrams (1.3.2) 10 <br> Physical Topology Diagrams 10 <br> Logical Topology Diagrams 10 <br>Common Types of Networks (1.4) 11 <br> Networks of Many Sizes (1.4.1) 11 <br> LANs and WANs (1.4.2) 12 <br> LANs 13 <br> WANs 14 <br> The Internet (1.4.3) 15 <br> Intranets and Extranets (1.4.4) 16 <br>Internet Connections (1.5) 17 <br> Internet Access Technologies (1.5.1) 17 <br> Home and Small Office Internet Connections (1.5.2) 18 <br> Businesses Internet Connections (1.5.3) 19 <br> The Converging Network (1.5.4) 20 <br>Reliable Networks (1.6) 23 <br> Network Architecture (1.6.1) 23 <br> Fault Tolerance (1.6.2) 24 <br> Scalability (1.6.3) 24 <br> Quality of Service (1.6.4) 25 <br> Network Security (1.6.5) 26 <br>Network Trends (1.7) 27 <br> Recent Trends (1.7.1) 28 <br> Bring Your Own Device (BYOD) (1.7.2) 28 <br> Online Collaboration (1.7.3) 28 <br> Video Communications (1.7.4) 29 <br> Cloud Computing (1.7.6) 29 <br> Technology Trends in the Home (1.7.7) 31 <br> Powerline Networking (1.7.8) 31 <br> Wireless Broadband (1.7.9) 32 <br> Wireless Internet Service Providers 32 <br> Wireless Broadband Service 32 <br>Network Security (1.8) 33 <br> Security Threats (1.8.1) 33 <br> Security Solutions (1.8.2) 34 <br>The IT Professional (1.9) 35 <br> CCNA (1.9.1) 35 <br> Networking Jobs (1.9.2) 36 <br>Summary (1.10) 37 <br> Networks Affect Our Lives 37 <br> Network Components 37 <br> Network Representations and Topologies 37 <br> Common Types of Networks 37 <br> Internet Connections 38 <br> Reliable Networks 38 <br> Network Trends 38 <br> Network Security 39 <br> The IT Professional 40 <br>Practice 40 <br>Check Your Understanding Questions 40 <br> Chapter 2 Basic Switch and End Device Configuration 45 <br>Objectives 45 <br>Key Terms 45 <br>Introduction (2.0) 46 <br>Cisco IOS Access (2.1) 46 <br> Operating Systems (2.1.1) 46 <br> GUI (2.1.2) 47 <br> Purpose of an OS (2.1.3) 48 <br> Access Methods (2.1.4) 49 <br> Terminal Emulation Programs (2.1.5) 50 <br>IOS Navigation (2.2) 52 <br> Primary Command Modes (2.2.1) 52 <br> Configuration Mode and Subconfiguration Modes (2.2.2) 53 <br> Navigate Between IOS Modes (2.2.4) 54 <br> A Note About Syntax Checker Activities (2.2.6) 55 <br>The Command Structure (2.3) 56 <br> Basic IOS Command Structure (2.3.1) 56 <br> IOS Command Syntax Check (2.3.2) 57 <br> IOS Help Features (2.3.3) 58 <br> Hot Keys and Shortcuts (2.3.5) 58 <br>Basic Device Configuration (2.4) 61 <br> Device Names (2.4.1) 61 <br> Password Guidelines (2.4.2) 62 <br> Configure Passwords (2.4.3) 63 <br> Encrypt Passwords (2.4.4) 64 <br> Banner Messages (2.4.5) 65 <br>Save Configurations (2.5) 66 <br> Configuration Files (2.5.1) 67 <br> Alter the Running Configuration (2.5.2) 68 <br> Capture Configuration to a Text File (2.5.4) 68 <br>Ports and Addresses (2.6) 71 <br> IP Addresses (2.6.1) 71 <br> Interfaces and Ports (2.6.2) 73 <br>Configure IP Addressing (2.7) 74 <br> Manual IP Address Configuration for End Devices (2.7.1) 75 <br> Automatic IP Address Configuration for End Devices (2.7.2) 76 <br> Switch Virtual Interface Configuration (2.7.4) 77 <br>Verify Connectivity (2.8) 78 <br>Summary (2.9) 79 <br> Cisco IOS Access 79 <br> IOS Navigation 79 <br> The Command Structure 79 <br> Basic Device Configuration 79 <br> Save Configurations 80 <br> Ports and Addresses 80 <br> Configure IP Addressing 80 <br> Verify Connectivity 80 <br>Practice 81 <br>Check Your Understanding Questions 81 <br> Chapter 3 Protocols and Models 85 <br>Objectives 85 <br>Key Terms 85 <br>Introduction (3.0) 86 <br>The Rules (3.1) 86 <br> Communications Fundamentals (3.1.2) 86 <br> Communication Protocols (3.1.3) 87 <br> Rule Establishment (3.1.4) 88 <br> Network Protocol Requirements (3.1.5) 88 <br> Message Encoding (3.1.6) 89 <br> Message Formatting and Encapsulation (3.1.7) 90 <br> Message Size (3.1.8) 91 <br> Message Timing (3.1.9) 92 <br> Message Delivery Options (3.1.10) 92 <br> A Note About the Node Icon (3.1.11) 94 <br>Protocols 94 <br> Network Protocol Overview (3.2.1) 94 <br> Network Protocol Functions (3.2.2) 95 <br> Protocol Interaction (3.2.3) 96 <br>Protocol Suites (3.3) 97 <br> Network Protocol Suites (3.3.1) 97 <br> Evolution of Protocol Suites (3.3.2) 98 <br> TCP/IP Protocol Example (3.3.3) 99 <br> TCP/IP Protocol Suite (3.3.4) 99 <br> Application Layer 101 <br> Transport Layer 102 <br> Internet Layer 102 <br> Network Access Layer 103 <br> TCP/IP Communication Process (3.3.5) 103 <br>Standards Organizations (3.4) 108 <br> Open Standards (3.4.1) 108 <br> Internet Standards (3.4.2) 108 <br> Electronic and Communications Standards (3.4.3) 111 <br>Reference Models (3.5) 111 <br> The Benefits of Using a Layered Model (3.5.1) 112 <br> The OSI Reference Model (3.5.2) 112 <br> The TCP/IP Protocol Model (3.5.3) 114 <br> OSI and TCP/IP Model Comparison (3.5.4) 115 <br>Data Encapsulation (3.6) 116 <br> Segmenting Messages (3.6.1) 116 <br> Sequencing (3.6.2) 118 <br> Protocol Data Units (3.6.3) 118 <br> Encapsulation Example (3.6.4) 120 <br> De-encapsulation Example (3.6.5) 120 <br>Data Access (3.7) 121 <br> Addresses (3.7.1) 121 <br> Layer 3 Logical Address (3.7.2) 122 <br> Devices on the Same Network (3.7.3) 123 <br> Role of the Data Link Layer Addresses: Same <br> IP Network (3.7.4) 124 <br> Devices on a Remote Network (3.7.5) 125 <br> Role of the Network Layer Addresses (3.7.6) 125 <br> Role of the Data Link Layer Addresses: Different <br> IP Networks (3.7.7) 126 <br> Data Link Addresses (3.7.8) 127 <br>Summary (3.8) 130 <br> The Rules 130 <br> Protocols 130 <br> Protocol Suites 130 <br> Standards Organizations 131 <br> Reference Models 131 <br> Data Encapsulation 132 <br> Data Access 132 <br>Practice 133 <br>Check Your Understanding Questions 133 <br> Chapter 4 Physical Layer 137 <br>Objectives 137 <br>Key Terms 137 <br>Introduction (4.0) 138 <br>Purpose of the Physical Layer (4.1) 138 <br> The Physical Connection (4.1.1) 138 <br> The Physical Layer (4.1.2) 139 <br>Physical Layer Characteristics (4.2) 141 <br> Physical Layer Standards (4.2.1) 141 <br> Physical Components (4.2.2) 142 <br> Encoding (4.2.3) 142 <br> Signaling (4.2.4) 143 <br> Bandwidth (4.2.5) 145 <br> Bandwidth Terminology (4.2.6) 145 <br> Latency 146 <br> Throughput 146 <br> Goodput 146 <br>Copper Cabling (4.3) 146 <br> Characteristics of Copper Cabling (4.3.1) 147 <br> Types of Copper Cabling (4.3.2) 148 <br> Unshielded Twisted-Pair (UTP) (4.3.3) 148 <br> Shielded Twisted-Pair (STP) (4.3.4) 150 <br> Coaxial Cable (4.3.5) 151 <br>UTP Cabling (4.4) 152 <br> Properties of UTP Cabling (4.4.1) 152 <br> UTP Cabling Standards and Connectors (4.4.2) 153 <br> Straight-Through and Crossover UTP Cables (4.4.3) 157 <br>Fiber-Optic Cabling (4.5) 158 <br> Properties of Fiber-Optic Cabling (4.5.1) 158 <br> Types of Fiber Media (4.5.2) 159 <br> Single-Mode Fiber 159 <br> Multimode Fiber 160 <br> Fiber-Optic Cabling Usage (4.5.3) 160 <br> Fiber-Optic Connectors (4.5.4) 161 <br> Fiber Patch Cords (4.5.5) 162 <br> Fiber Versus Copper (4.5.6) 163 <br>Wireless Media (4.6) 164 <br> Properties of Wireless Media (4.6.1) 164 <br> Types of Wireless Media (4.6.2) 165 <br> Wireless LAN (4.6.3) 166 <br>Summary (4.7) 168 <br> Purpose of the Physical Layer 168 <br> Physical Layer Characteristics 168 <br> Copper Cabling 168 <br> UTP Cabling 169 <br> Fiber-Optic Cabling 169 <br> Wireless Media 169 <br>Practice 170 <br>Check Your Understanding Questions 170 <br> Chapter 5 Number Systems 175 <br>Objectives 175 <br>Key Terms 175 <br>Introduction (5.0) 176 <br>Binary Number System (5.1) 176 <br> Binary and IPv4 Addresses (5.1.1) 176 <br> Binary Positional Notation (5.1.3) 178 <br> Convert Binary to Decimal (5.1.5) 180 <br> Decimal to Binary Conversion (5.1.7) 182 <br> Decimal to Binary Conversion Example (5.1.8) 186 <br> IPv4 Addresses (5.1.11) 193 <br>Hexadecimal Number System (5.2) 194 <br> Hexadecimal and IPv6 Addresses (5.2.1) 194 <br> Decimal to Hexadecimal Conversions (5.2.3) 196 <br> Hexadecimal to Decimal Conversion (5.2.4) 196 <br>Summary (5.3) 198 <br> Binary Number System 198 <br> Hexadecimal Number System 198 <br>Practice 198 <br>Check Your Understanding Questions 198 <br> Chapter 6 Data Link Layer 203 <br>Objectives 203 <br>Key Terms 203 <br>Introduction (6.0) 204 <br>Purpose of the Data Link Layer (6.1) 204 <br> The Data Link Layer (6.1.1) 204 <br> IEEE 802 LAN/MAN Data Link Sublayers (6.1.2) 206 <br> Providing Access to Media (6.1.3) 207 <br> Data Link Layer Standards (6.1.4) 209 <br>Topologies (6.2) 209 <br> Physical and Logical Topologies (6.2.1) 209 <br> WAN Topologies (6.2.2) 211 <br> Point-to-Point 211 <br> Hub and Spoke 211 <br> Mesh 212 <br> Point-to-Point WAN Topology (6.2.3) 213 <br> LAN Topologies (6.2.4) 213 <br> Legacy LAN Topologies 214 <br> Half-Duplex and Full-Duplex Communication (6.2.5) 215 <br> Half-Duplex Communication 215 <br> Full-Duplex Communication 215 <br> Access Control Methods (6.2.6) 216 <br> Contention-Based Access 216 <br> Controlled Access 217 <br> Contention-Based Access—CSMA/CD (6.2.7) 217 <br> Contention-Based Access—CSMA/CA (6.2.8) 219 <br>Data Link Frame (6.3) 221 <br> The Frame (6.3.1) 221 <br> Frame Fields (6.3.2) 222 <br> Layer 2 Addresses (6.3.3) 223 <br> LAN and WAN Frames (6.3.4) 225 <br>Summary (6.4) 228 <br> Purpose of the Data Link Layer 228 <br> Topologies 228 <br> Data Link Frame 229 <br>Practice 229 <br>Check Your Understanding Questions 229 <br> Chapter 7 Ethernet Switching 233 <br>Objectives 233 <br>Key Terms 233 <br>Introduction (7.0) 234 <br>Ethernet Frames (7.1) 234 <br> Ethernet Encapsulation (7.1.1) 234 <br> Data Link Sublayers (7.1.2) 235 <br> MAC Sublayer (7.1.3) 236 <br> Data Encapsulation 236 <br> Accessing the Media 237 <br> Ethernet Frame Fields (7.1.4) 237 <br>Ethernet MAC Address (7.2) 239 <br> MAC Address and Hexadecimal (7.2.1) 240 <br> Ethernet MAC Address (7.2.2) 241 <br> Frame Processing (7.2.3) 243 <br> Unicast MAC Address (7.2.4) 244 <br> Broadcast MAC Address (7.2.5) 246 <br> Multicast MAC Address (7.2.6) 247 <br>The MAC Address Table (7.3) 248 <br> Switch Fundamentals (7.3.1) 248 <br> Switch Learning and Forwarding (7.3.2) 250 <br> Examine the Source MAC Address 250 <br> Find the Destination MAC Address 250 <br> Filtering Frames (7.3.3) 252 <br>Switch Speeds and Forwarding Methods (7.4) 254 <br> Frame Forwarding Methods on Cisco Switches (7.4.1) 254 <br> Cut-Through Switching (7.4.2) 255 <br> Memory Buffering on Switches (7.4.3) 257 <br> Duplex and Speed Settings (7.4.4) 257 <br> Auto-MDIX (7.4.5) 259 <br>Summary (7.5) 261 <br> Ethernet Frame 261 <br> Ethernet MAC Address 261 <br> The MAC Address Table 261 <br> Switch Speeds and Forwarding Methods 262 <br>Practice 262 <br>Check Your Understanding Questions 262 <br> Chapter 8 Network Layer 267 <br>Objectives 267 <br>Key Terms 267 <br>Introduction (8.0) 268 <br>Network Layer Characteristics (8.1) 268 <br> The Network Layer (8.1.1) 268 <br> IP Encapsulation (8.1.2) 270 <br> Characteristics of IP (8.1.3) 271 <br> Connectionless (8.1.4) 271 <br> Best Effort (8.1.5) 272 <br> Media Independent (8.1.6) 273 <br>IPv4 Packet (8.2) 274 <br> IPv4 Packet Header (8.2.1) 274 <br> IPv4 Packet Header Fields (8.2.2) 274 <br>IPv6 Packet (8.3) 276 <br> Limitations of IPv4 (8.3.1) 277 <br> IPv6 Overview (8.3.2) 277 <br> IPv4 Packet Header Fields in the IPv6 Packet Header (8.3.3) 278 <br> IPv6 Packet Header (8.3.4) 280 <br>How a Host Routes (8.4) 281 <br> Host Forwarding Decision (8.4.1) 281 <br> Default Gateway (8.4.2) 282 <br> A Host Routes to the Default Gateway (8.4.3) 283 <br> Host Routing Tables (8.4.4) 283 <br>Introduction to Routing (8.5) 285 <br> Router Packet Forwarding Decision (8.5.1) 285 <br> IP Router Routing Table (8.5.2) 286 <br> Static Routing (8.5.3) 287 <br> Dynamic Routing (8.5.4) 288 <br> Introduction to an IPv4 Routing Table (8.5.6) 290 <br>Summary (8.6) 292 <br> Network Layer Characteristics 292 <br> IPv4 Packet 292 <br> IPv6 Packet 292 <br> How a Host Routes 293 <br> Introduction to Routing 293 <br>Practice 294 <br>Check Your Understanding Questions 294 <br> Chapter 9 Address Resolution 297 <br>Objectives 297 <br>Key Terms 297 <br>Introduction (9.0) 298 <br>MAC and IP (9.1) 298 <br> Destination on Same Network (9.1.1) 298 <br> Destination on Remote Network (9.1.2) 299 <br>ARP (9.2) 301 <br> ARP Overview (9.2.1) 301 <br> ARP Functions (9.2.2) 302 <br> Removing Entries from an ARP Table (9.2.6) 306 <br> ARP Tables on Networking Devices (9.2.7) 306 <br> ARP Issues—ARP Broadcasts and ARP Spoofing (9.2.8) 307 <br>IPv6 Neighbor Discovery (9.3) 309 <br> IPv6 Neighbor Discovery Messages (9.3.2) 309 <br> IPv6 Neighbor Discovery—Address Resolution (9.3.3) 311 <br>Summary (9.4) 313 <br> MAC and IP 313 <br> ARP 313 <br> Neighbor Discovery 314 <br>Practice 314 <br>Check Your Understanding Questions 314 <br> Chapter 10 Basic Router Configuration 319 <br>Objectives 319 <br>Introduction (10.0) 320 <br>Configure Initial Router Settings (10.1) 320 <br> Basic Router Configuration Steps (10.1.1) 320 <br> Basic Router Configuration Example (10.1.2) 321 <br>Configure Interfaces (10.2) 323 <br> Configure Router Interfaces (10.2.1) 323 <br> Configure Router Interfaces Example (10.2.2) 324 <br> Verify Interface Configuration (10.2.3) 325 <br> Configuration Verification Commands (10.2.4) 326 <br>Configure the Default Gateway (10.3) 330 <br> Default Gateway on a Host (10.3.1) 331 <br> Default Gateway on a Switch (10.3.2) 332 <br>Summary (10.4) 335 <br> Configure Initial Router Settings 335 <br> Configure Interfaces 335 <br> Configure the Default Gateway 335 <br>Practice 336 <br>Check Your Understanding Questions 337 <br> Chapter 11 IPv4 Addressing 341 <br>Objectives 341 <br>Key Terms 341 <br>Introduction (11.0) 342 <br>IPv4 Address Structure (11.1) 342 <br> Network and Host Portions (11.1.1) 342 <br> The Subnet Mask (11.1.2) 343 <br> The Prefix Length (11.1.3) 344 <br> Determining the Network: Logical AND (11.1.4) 345 <br> Network, Host, and Broadcast Addresses (11.1.6) 347 <br> Network Address 347 <br> Host Addresses 348 <br> Broadcast Address 349 <br>IPv4 Unicast, Broadcast, and Multicast (11.2) 349 <br> Unicast (11.2.1) 349 <br> Broadcast (11.2.2) 350 <br> IP Directed Broadcasts 351 <br> Multicast (11.2.3) 352 <br>Types of IPv4 Addresses (11.3) 353 <br> Public and Private IPv4 Addresses (11.3.1) 353 <br> Routing to the Internet (11.3.2) 354 <br> Special Use IPv4 Addresses (11.3.4) 356 <br> Loopback Addresses 356 <br> Link-Local Addresses 357 <br> Legacy Classful Addressing (11.3.5) 357 <br> Assignment of IP Addresses (11.3.6) 358 <br>Network Segmentation (11.4) 359 <br> Broadcast Domains and Segmentation (11.4.1) 359 <br> Problems with Large Broadcast Domains (11.4.2) 360 <br> Reasons for Segmenting Networks (11.4.3) 362 <br>Subnet an IPv4 Network (11.5) 364 <br> Subnet on an Octet Boundary (11.5.1) 364 <br> Subnet Within an Octet Boundary (11.5.2) 366 <br>Subnet a Slash 16 and a Slash 8 Prefix (11.6) 367 <br> Create Subnets with a Slash 16 Prefix (11.6.1) 367 <br> Create 100 Subnets with a Slash 16 Prefix (11.6.2) 369 <br> Create 1000 Subnets with a Slash 8 Prefix (11.6.3) 372 <br>Subnet to Meet Requirements (11.7) 374 <br> Subnet Private Versus Public IPv4 Address Space (11.7.1) 374 <br> What About the DMZ? 377 <br> Minimize Unused Host IPv4 Addresses and Maximize Subnets (11.7.2) 377 <br> Example: Efficient IPv4 Subnetting (11.7.3) 378 <br>VLSM (11.8) 381 <br> IPv4 Address Conservation (11.8.3) 381 <br> VLSM (11.8.4) 383 <br> VLSM Topology Address Assignment (11.8.5) 386 <br>Structured Design (11.9) 387 <br> IPv4 Network Address Planning (11.9.1) 388 <br> Device Address Assignment (11.9.2) 389 <br>Summary (11.10) 390 <br> IPv4 Addressing Structure 390 <br> IPv4 Unicast, Broadcast, and Multicast 390 <br> Types of IPv4 Addresses 390 <br> Network Segmentation 391 <br> Subnet an IPv4 Network 391 <br> Subnet a /16 and a /8 Prefix 391 <br> Subnet to Meet Requirements 391 <br> Variable-Length Subnet Masking 392 <br> Structured Design 392 <br>Practice 393 <br>Check Your Understanding Questions 393 <br> Chapter 12 IPv6 Addressing 397 <br>Objectives 397 <br>Key Terms 397 <br>Introduction (12.0) 398 <br>IPv4 Issues (12.1) 398 <br> Need for IPv6 (12.1.1) 398 <br> Internet of Things 399 <br> IPv4 and IPv6 Coexistence (12.1.2) 399 <br> Dual Stack 399 <br> Tunneling 400 <br> Translation 401 <br>IPv6 Address Representation (12.2) 401 <br> IPv6 Addressing Formats (12.2.1) 401 <br> Preferred Format 402 <br> Rule 1—Omit Leading Zeros (12.2.2) 403 <br> Rule 2—Double Colon (12.2.3) 404 <br>IPv6 Address Types (12.3) 406 <br> Unicast, Multicast, Anycast (12.3.1) 406 <br> IPv6 Prefix Length (12.3.2) 406 <br> Types of IPv6 Unicast Addresses (12.3.3) 407 <br> A Note About the Unique Local Address (12.3.4) 408 <br> IPv6 GUA (12.3.5) 408 <br> IPv6 GUA Structure (12.3.6) 409 <br> Global Routing Prefix 410 <br> Subnet ID 410 <br> Interface ID 410 <br> IPv6 LLA (12.3.7) 411 <br>GUA and LLA Static Configuration (12.4) 413 <br> Static GUA Configuration on a Router (12.4.1) 413 <br> Static GUA Configuration on a Windows Host (12.4.2) 414 <br> Static Configuration of a Link-Local Unicast Address (12.4.3) 415 <br>Dynamic Addressing for IPv6 GUAs (12.5) 417 <br> RS and RA Messages (12.5.1) 417 <br> Method 1: SLAAC (12.5.2) 418 <br> Method 2: SLAAC and Stateless DHCPv6 (12.5.3) 419 <br> Method 3: Stateful DHCPv6 (12.5.4) 420 <br> EUI-64 Process vs. Randomly Generated (12.5.5) 421 <br> EUI-64 Process (12.5.6) 422 <br> Randomly Generated Interface IDs (12.5.7) 424 <br>Dynamic Addressing for IPv6 LLAs (12.6) 425 <br> Dynamic LLAs (12.6.1) 425 <br> Dynamic LLAs on Windows (12.6.2) 425 <br> Dynamic LLAs on Cisco Routers (12.6.3) 426 <br> Verify IPv6 Address Configuration (12.6.4) 427 <br>IPv6 Multicast Addresses (12.7) 430 <br> Assigned IPv6 Multicast Addresses (12.7.1) 430 <br> Well-Known IPv6 Multicast Addresses (12.7.2) 430 <br> Solicited-Node IPv6 Multicast Addresses (12.7.3) 432 <br>Subnet an IPv6 Network (12.8) 432 <br> Subnet Using the Subnet ID (12.8.1) 432 <br> IPv6 Subnetting Example (12.8.2) 433 <br> IPv6 Subnet Allocation (12.8.3) 434 <br> Router Configured with IPv6 Subnets (12.8.4) 435 <br>Summary (12.9) 436 <br> IPv4 Issues 436 <br> IPv6 Address Representation 436 <br> IPv6 Address Types 436 <br> GUA and LLA Static Configuration 437 <br> Dynamic Addressing for IPv6 GUAs 437 <br> Dynamic Addressing for IPv6 LLAs 437 <br> IPv6 Multicast Addresses 438 <br> Subnet an IPv6 Network 438 <br>Practice 439 <br>Check Your Understanding Questions 439 <br> Chapter 13 ICMP 443 <br>Objectives 443 <br>Introduction (13.0) 444 <br>ICMP Messages (13.1) 444 <br> ICMPv4 and ICMPv6 Messages (13.1.1) 444 <br> Host Reachability (13.1.2) 444 <br> Destination or Service Unreachable (13.1.3) 445 <br> Time Exceeded (13.1.4) 446 <br> ICMPv6 Messages (13.1.5) 446 <br>Ping and Traceroute Tests (13.2) 449 <br> Ping—Test Connectivity (13.2.1) 449 <br> Ping the Loopback (13.2.2) 450 <br> Ping the Default Gateway (13.2.3) 450 <br> Ping a Remote Host (13.2.4) 451 <br> Traceroute—Test the Path (13.2.5) 452 <br> Round-Trip Time (RTT) 453 <br> IPv4 TTL and IPv6 Hop Limit 453 <br>Summary (13.3) 454 <br> ICMP Messages 454 <br> Ping and Traceroute Testing 454 <br>Practice 455 <br>Check Your Understanding Questions 456 <br> Chapter 14 Transport Layer 461 <br>Objectives 461 <br>Key Terms 461 <br>Introduction (14.0) 462 <br>Transportation of Data (14.1) 462 <br> Role of the Transport Layer (14.1.1) 462 <br> Transport Layer Responsibilities (14.1.2) 463 <br> Transport Layer Protocols (14.1.3) 467 <br> Transmission Control Protocol (TCP) (14.1.4) 467 <br> User Datagram Protocol (UDP) (14.1.5) 468 <br> The Right Transport Layer Protocol for the Right Application (14.1.6) 469 <br>TCP Overview (14.2) 470 <br> TCP Features (14.2.1) 470 <br> TCP Header (14.2.2) 471 <br> TCP Header Fields (14.2.3) 471 <br> Applications That Use TCP (14.2.4) 472 <br>UDP Overview (14.3) 473 <br> UDP Features (14.3.1) 473 <br> UDP Header (14.3.2) 474 <br> UDP Header Fields (14.3.3) 474 <br> Applications that use UDP (14.3.4) 475 <br>Port Numbers (14.4) 476 <br> Multiple Separate Communications (14.4.1) 476 <br> Socket Pairs (14.4.2) 477 <br> Port Number Groups (14.4.3) 478 <br> The netstat Command (14.4.4) 479 <br>TCP Communication Process (14.5) 480 <br> TCP Server Processes (14.5.1) 480 <br> TCP Connection Establishment (14.5.2) 483 <br> Session Termination (14.5.3) 484 <br> TCP Three-Way Handshake Analysis (14.5.4) 485 <br>Reliability and Flow Control (14.6) 486 <br> TCP Reliability—Guaranteed and Ordered Delivery (14.6.1) 486 <br> TCP Reliability—Data Loss and Retransmission (14.6.3) 488 <br> TCP Flow Control—Window Size and Acknowledgments (14.6.5) 490 <br> TCP Flow Control—Maximum Segment Size (MSS) (14.6.6) 491 <br> TCP Flow Control—Congestion Avoidance (14.6.7) 493 <br>UDP Communication (14.7) 494 <br> UDP Low Overhead Versus Reliability (14.7.1) 494 <br> UDP Datagram Reassembly (14.7.2) 494 <br> UDP Server Processes and Requests (14.7.3) 495 <br> UDP Client Processes (14.7.4) 495 <br>Summary (14.8) 499 <br> Transportation of Data 499 <br> TCP Overview 499 <br> UDP Overview 499 <br> Port Numbers 499 <br> TCP Communications Process 500 <br> Reliability and Flow Control 500 <br> UDP Communication 501 <br>Practice 501 <br>Check Your Understanding Questions 502 <br> Chapter 15 Application Layer 507 <br>Objectives 507 <br>Key Terms 507 <br>Introduction (15.0) 508 <br>Application, Presentation, and Session (15.1) 508 <br> Application Layer (15.1.1) 508 <br> Presentation and Session Layer (15.1.2) 508 <br> TCP/IP Application Layer Protocols (15.1.3) 510 <br>Peer-to-Peer (15.2) 511 <br> Client-Server Model (15.2.1) 511 <br> Peer-to-Peer Networks (15.2.2) 512 <br> Peer-to-Peer Applications (15.2.3) 513 <br> Common P2P Applications (15.2.4) 514 <br>Web and Email Protocols (15.3) 515 <br> Hypertext Transfer Protocol and Hypertext Markup Language (15.3.1) 515 <br> HTTP and HTTPS (15.3.2) 516 <br> Email Protocols (15.3.3) 518 <br> SMTP, POP, and IMAP (15.3.4) 519 <br> SMTP 519 <br> POP 520 <br> IMAP 521 <br>IP Addressing Services (15.4) 521 <br> Domain Name Service (15.4.1) 522 <br> DNS Message Format (15.4.2) 524 <br> DNS Hierarchy (15.4.3) 525 <br> The nslookup Command (15.4.4) 526 <br> Dynamic Host Configuration Protocol (15.4.6) 527 <br> DHCP Operation (15.4.7) 528 <br>File Sharing Services (15.5) 530 <br> File Transfer Protocol (15.5.1) 530 <br> Server Message Block (15.5.2) 531 <br>Summary 534 <br> Application, Presentation, and Session 534 <br> Peer-to-Peer 534 <br> Web and Email Protocols 534 <br> IP Addressing Services 535 <br> File Sharing Services 535 <br>Practice 536 <br>Check Your Understanding Questions 536 <br> Chapter 16 Network Security Fundamentals 541 <br>Objectives 541 <br>Key Terms 541 <br>Introduction (16.0) 542 <br>Security Threats and Vulnerabilities (16.1) 542 <br> Types of Threats (16.1.1) 542 <br> Types of Vulnerabilities (16.1.2) 543 <br> Physical Security (16.1.3) 545 <br>Network Attacks (16.2) 546 <br> Types of Malware (16.2.1) 546 <br> Viruses 546 <br> Worms 547 <br> Trojan Horses 547 <br> Reconnaissance Attacks (16.2.2) 547 <br> Access Attacks (16.2.3) 548 <br> Password Attacks 548 <br> Trust Exploitation 548 <br> Port Redirection 549 <br> Man-in-the-Middle 549 <br> Denial of Service Attacks (16.2.4) 551 <br> DoS Attack 551 <br> DDoS Attack 551 <br>Network Attack Mitigations (16.3) 552 <br> The Defense-in-Depth Approach (16.3.1) 553 <br> Keep Backups (16.3.2) 553 <br> Upgrade, Update, and Patch (16.3.3) 554 <br> Authentication, Authorization, and Accounting (16.3.4) 555 <br> Firewalls (16.3.5) 555 <br> Types of Firewalls (16.3.6) 557 <br> Endpoint Security (16.3.7) 558 <br>Device Security (16.4) 558 <br> Cisco AutoSecure (16.4.1) 558 <br> Passwords (16.4.2) 559 <br> Additional Password Security (16.4.3) 560 <br> Enable SSH (16.4.4) 561 <br> Disable Unused Services (16.4.5) 563 <br>Summary 565 <br> Security Threats and Vulnerabilities 565 <br> Network Attacks 565 <br> Network Attack Mitigation 565 <br> Device Security 566 <br>Practice 567 <br>Check Your Understanding Questions 567 <br> Chapter 17 Build a Small Network 571 <br>Objectives 571 <br>Key Terms 571 <br>Introduction (17.0) 572 <br>Devices in a Small Network (17.1) 572 <br> Small Network Topologies (17.1.1) 572 <br> Device Selection for a Small Network (17.1.2) 573 <br> Cost 573 <br> Speed and Types of Ports/Interfaces 573 <br> Expandability 573 <br> Operating System Features and Services 574 <br> IP Addressing for a Small Network (17.1.3) 574 <br> Redundancy in a Small Network (17.1.4) 576 <br> Traffic Management (17.1.5) 577 <br>Small Network Applications and Protocols (17.2) 578 <br> Common Applications (17.2.1) 578 <br> Network Applications 578 <br> Application Layer Services 579 <br> Common Protocols (17.2.2) 579 <br> Voice and Video Applications (17.2.3) 582 <br>Scale to Larger Networks (17.3) 583 <br> Small Network Growth (17.3.1) 583 <br> Protocol Analysis (17.3.2) 583 <br> Employee Network Utilization (17.3.3) 584 <br>Verify Connectivity (17.4) 586 <br> Verify Connectivity with Ping (17.4.1) 586 <br> Extended Ping (17.4.2) 588 <br> Verify Connectivity with Traceroute (17.4.3) 590 <br> Extended Traceroute (17.4.4) 592 <br> Network Baseline (17.4.5) 593 <br>Host and IOS Commands (17.5) 596 <br> IP Configuration on a Windows Host (17.5.1) 596 <br> IP Configuration on a Linux Host (17.5.2) 599 <br> IP Configuration on a macOS Host (17.5.3) 600 <br> The arp Command (17.5.4) 601 <br> Common show Commands Revisited (17.5.5) 602 <br> The show cdp neighbors Command (17.5.6) 609 <br> The show ip interface brief Command (17.5.7) 610 <br> Verify Switch Interfaces 611 <br>Troubleshooting Methodologies (17.6) 611 <br> Basic Troubleshooting Approaches (17.6.1) 612 <br> Resolve or Escalate? (17.6.2) 613 <br> The debug Command (17.6.3) 613 <br> The terminal monitor Command (17.6.4) 615 <br>Troubleshooting Scenarios (17.7) 616 <br> Duplex Operation and Mismatch Issues (17.7.1) 617 <br> IP Addressing Issues on IOS Devices (17.7.2) 618 <br> IP Addressing Issues on End Devices (17.7.3) 619 <br> Default Gateway Issues (17.7.4) 619 <br> Troubleshooting DNS Issues (17.7.5) 621 <br>Summary (17.8) 624 <br> Devices in a Small Network 624 <br> Small Network Applications and Protocols 624 <br> Scale to Larger Networks 624 <br> Verify Connectivity 625 <br> Host and IOS Commands 625 <br> Troubleshooting Methodologies 626 <br> Troubleshooting Scenarios 626 <br>Practice 627 <br>Check Your Understanding Questions 628 <br> Appendix A Answers to “Check Your Understanding” Questions 631 <br> Key Terms Glossary 645 <br> <br> <br>9780136633662 TOC 6/3/2020