Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20

Introduction to Networks Companion Guide (CCNAv7)

Specificaties
E-book, blz. | Engels
Pearson Education | 2021
ISBN13: 9780136633624
Rubricering
Pearson Education e druk, 2021 9780136633624
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Introduction to Networks Companion Guide is the official supplemental textbook for the Introduction to Networks course in the Cisco Networking Academy CCNA curriculum.

The course introduces the architecture, protocols, functions, components, and models of the internet and computer networks. The principles of IP addressing and fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. By the end of the course, you will be able to build simple LANs, perform basic configurations for routers and switches, understand the fundamentals of network security, and implement IP addressing schemes.

The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.

The book's features help you focus on important concepts to succeed in this course:
* Chapter objectives:  Review core concepts by answering the focus questions listed at the beginning of each chapter.
* Key terms:  Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.
* Glossary:  Consult the comprehensive Glossary with more than 300 terms.
* Summary of Activities and Labs:  Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.
* Check Your Understanding:  Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.

* How To:  Look for this icon to study the steps you need to learn to perform certain tasks.
* Interactive Activities:  Reinforce your understanding of topics with dozens of exercises from the online course identified throughout the book with this icon.
* Videos:  Watch the videos embedded within the online course.
* Packet Tracer Activities:  Explore and visualize networking concepts using Packet Tracer. There are multiple exercises interspersed throughout the chapters and provided in the accompanying Labs & Study Guide book.
* Hands-on Labs:  Work through all the labs and other activities that are included in the course and published in the separate Labs & Study Guide.

Specificaties

ISBN13:9780136633624
Taal:Engels
Bindwijze:e-book

Inhoudsopgave

Introduction xxx <br> Chapter 1 Networking Today 1 <br>Objectives 1 <br>Key Terms 1 <br>Introduction (1.0) 3 <br>Networks Affect Our Lives (1.1) 3 <br>&nbsp;&nbsp;&nbsp; Networks Connect Us (1.1.1) 3 <br>&nbsp;&nbsp;&nbsp; No Boundaries (1.1.3) 3 <br>Network Components (1.2) 4 <br>&nbsp;&nbsp;&nbsp; Host Roles (1.2.1) 4 <br>&nbsp;&nbsp;&nbsp; Peer-to-Peer (1.2.2) 5 <br>&nbsp;&nbsp;&nbsp; End Devices (1.2.3) 6 <br>&nbsp;&nbsp;&nbsp; Intermediary Devices (1.2.4) 6 <br>&nbsp;&nbsp;&nbsp; Network Media (1.2.5) 7 <br>Network Representations and Topologies (1.3) 8 <br>&nbsp;&nbsp;&nbsp; Network Representations (1.3.1) 8 <br>&nbsp;&nbsp;&nbsp; Topology Diagrams (1.3.2) 10 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Physical Topology Diagrams 10 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Logical Topology Diagrams 10 <br>Common Types of Networks (1.4) 11 <br>&nbsp;&nbsp;&nbsp; Networks of Many Sizes (1.4.1) 11 <br>&nbsp;&nbsp;&nbsp; LANs and WANs (1.4.2) 12 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; LANs 13 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; WANs 14 <br>&nbsp;&nbsp;&nbsp; The Internet (1.4.3) 15 <br>&nbsp;&nbsp;&nbsp; Intranets and Extranets (1.4.4) 16 <br>Internet Connections (1.5) 17 <br>&nbsp;&nbsp;&nbsp; Internet Access Technologies (1.5.1) 17 <br>&nbsp;&nbsp;&nbsp; Home and Small Office Internet Connections (1.5.2) 18 <br>&nbsp;&nbsp;&nbsp; Businesses Internet Connections (1.5.3) 19 <br>&nbsp;&nbsp;&nbsp; The Converging Network (1.5.4) 20 <br>Reliable Networks (1.6) 23 <br>&nbsp;&nbsp;&nbsp; Network Architecture (1.6.1) 23 <br>&nbsp;&nbsp;&nbsp; Fault Tolerance (1.6.2) 24 <br>&nbsp;&nbsp;&nbsp; Scalability (1.6.3) 24 <br>&nbsp;&nbsp;&nbsp; Quality of Service (1.6.4) 25 <br>&nbsp;&nbsp;&nbsp; Network Security (1.6.5) 26 <br>Network Trends (1.7) 27 <br>&nbsp;&nbsp;&nbsp; Recent Trends (1.7.1) 28 <br>&nbsp;&nbsp;&nbsp; Bring Your Own Device (BYOD) (1.7.2) 28 <br>&nbsp;&nbsp;&nbsp; Online Collaboration (1.7.3) 28 <br>&nbsp;&nbsp;&nbsp; Video Communications (1.7.4) 29 <br>&nbsp;&nbsp;&nbsp; Cloud Computing (1.7.6) 29 <br>&nbsp;&nbsp;&nbsp; Technology Trends in the Home (1.7.7) 31 <br>&nbsp;&nbsp;&nbsp; Powerline Networking (1.7.8) 31 <br>&nbsp;&nbsp;&nbsp; Wireless Broadband (1.7.9) 32 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Wireless Internet Service Providers 32 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Wireless Broadband Service 32 <br>Network Security (1.8) 33 <br>&nbsp;&nbsp;&nbsp; Security Threats (1.8.1) 33 <br>&nbsp;&nbsp;&nbsp; Security Solutions (1.8.2) 34 <br>The IT Professional (1.9) 35 <br>&nbsp;&nbsp;&nbsp; CCNA (1.9.1) 35 <br>&nbsp;&nbsp;&nbsp; Networking Jobs (1.9.2) 36 <br>Summary (1.10) 37 <br>&nbsp;&nbsp;&nbsp; Networks Affect Our Lives 37 <br>&nbsp;&nbsp;&nbsp; Network Components 37 <br>&nbsp;&nbsp;&nbsp; Network Representations and Topologies 37 <br>&nbsp;&nbsp;&nbsp; Common Types of Networks 37 <br>&nbsp;&nbsp;&nbsp; Internet Connections 38 <br>&nbsp;&nbsp;&nbsp; Reliable Networks 38 <br>&nbsp;&nbsp;&nbsp; Network Trends 38 <br>&nbsp;&nbsp;&nbsp; Network Security 39 <br>&nbsp;&nbsp;&nbsp; The IT Professional 40 <br>Practice 40 <br>Check Your Understanding Questions 40 <br> Chapter 2 Basic Switch and End Device Configuration 45 <br>Objectives 45 <br>Key Terms 45 <br>Introduction (2.0) 46 <br>Cisco IOS Access (2.1) 46 <br>&nbsp;&nbsp;&nbsp; Operating Systems (2.1.1) 46 <br>&nbsp;&nbsp;&nbsp; GUI (2.1.2) 47 <br>&nbsp;&nbsp;&nbsp; Purpose of an OS (2.1.3) 48 <br>&nbsp;&nbsp;&nbsp; Access Methods (2.1.4) 49 <br>&nbsp;&nbsp;&nbsp; Terminal Emulation Programs (2.1.5) 50 <br>IOS Navigation (2.2) 52 <br>&nbsp;&nbsp;&nbsp; Primary Command Modes (2.2.1) 52 <br>&nbsp;&nbsp;&nbsp; Configuration Mode and Subconfiguration Modes (2.2.2) 53 <br>&nbsp;&nbsp;&nbsp; Navigate Between IOS Modes (2.2.4) 54 <br>&nbsp;&nbsp;&nbsp; A Note About Syntax Checker Activities (2.2.6) 55 <br>The Command Structure (2.3) 56 <br>&nbsp;&nbsp;&nbsp; Basic IOS Command Structure (2.3.1) 56 <br>&nbsp;&nbsp;&nbsp; IOS Command Syntax Check (2.3.2) 57 <br>&nbsp;&nbsp;&nbsp; IOS Help Features (2.3.3) 58 <br>&nbsp;&nbsp;&nbsp; Hot Keys and Shortcuts (2.3.5) 58 <br>Basic Device Configuration (2.4) 61 <br>&nbsp;&nbsp;&nbsp; Device Names (2.4.1) 61 <br>&nbsp;&nbsp;&nbsp; Password Guidelines (2.4.2) 62 <br>&nbsp;&nbsp;&nbsp; Configure Passwords (2.4.3) 63 <br>&nbsp;&nbsp;&nbsp; Encrypt Passwords (2.4.4) 64 <br>&nbsp;&nbsp;&nbsp; Banner Messages (2.4.5) 65 <br>Save Configurations (2.5) 66 <br>&nbsp;&nbsp;&nbsp; Configuration Files (2.5.1) 67 <br>&nbsp;&nbsp;&nbsp; Alter the Running Configuration (2.5.2) 68 <br>&nbsp;&nbsp;&nbsp; Capture Configuration to a Text File (2.5.4) 68 <br>Ports and Addresses (2.6) 71 <br>&nbsp;&nbsp;&nbsp; IP Addresses (2.6.1) 71 <br>&nbsp;&nbsp;&nbsp; Interfaces and Ports (2.6.2) 73 <br>Configure IP Addressing (2.7) 74 <br>&nbsp;&nbsp;&nbsp; Manual IP Address Configuration for End Devices (2.7.1) 75 <br>&nbsp;&nbsp;&nbsp; Automatic IP Address Configuration for End Devices (2.7.2) 76 <br>&nbsp;&nbsp;&nbsp; Switch Virtual Interface Configuration (2.7.4) 77 <br>Verify Connectivity (2.8) 78 <br>Summary (2.9) 79 <br>&nbsp;&nbsp;&nbsp; Cisco IOS Access 79 <br>&nbsp;&nbsp;&nbsp; IOS Navigation 79 <br>&nbsp;&nbsp;&nbsp; The Command Structure 79 <br>&nbsp;&nbsp;&nbsp; Basic Device Configuration 79 <br>&nbsp;&nbsp;&nbsp; Save Configurations 80 <br>&nbsp;&nbsp;&nbsp; Ports and Addresses 80 <br>&nbsp;&nbsp;&nbsp; Configure IP Addressing 80 <br>&nbsp;&nbsp;&nbsp; Verify Connectivity 80 <br>Practice 81 <br>Check Your Understanding Questions 81 <br> Chapter 3 Protocols and Models 85 <br>Objectives 85 <br>Key Terms 85 <br>Introduction (3.0) 86 <br>The Rules (3.1) 86 <br>&nbsp;&nbsp;&nbsp; Communications Fundamentals (3.1.2) 86 <br>&nbsp;&nbsp;&nbsp; Communication Protocols (3.1.3) 87 <br>&nbsp;&nbsp;&nbsp; Rule Establishment (3.1.4) 88 <br>&nbsp;&nbsp;&nbsp; Network Protocol Requirements (3.1.5) 88 <br>&nbsp;&nbsp;&nbsp; Message Encoding (3.1.6) 89 <br>&nbsp;&nbsp;&nbsp; Message Formatting and Encapsulation (3.1.7) 90 <br>&nbsp;&nbsp;&nbsp; Message Size (3.1.8) 91 <br>&nbsp;&nbsp;&nbsp; Message Timing (3.1.9) 92 <br>&nbsp;&nbsp;&nbsp; Message Delivery Options (3.1.10) 92 <br>&nbsp;&nbsp;&nbsp; A Note About the Node Icon (3.1.11) 94 <br>Protocols 94 <br>&nbsp;&nbsp;&nbsp; Network Protocol Overview (3.2.1) 94 <br>&nbsp;&nbsp;&nbsp; Network Protocol Functions (3.2.2) 95 <br>&nbsp;&nbsp;&nbsp; Protocol Interaction (3.2.3) 96 <br>Protocol Suites (3.3) 97 <br>&nbsp;&nbsp;&nbsp; Network Protocol Suites (3.3.1) 97 <br>&nbsp;&nbsp;&nbsp; Evolution of Protocol Suites (3.3.2) 98 <br>&nbsp;&nbsp;&nbsp; TCP/IP Protocol Example (3.3.3) 99 <br>&nbsp;&nbsp;&nbsp; TCP/IP Protocol Suite (3.3.4) 99 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Application Layer 101 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Transport Layer 102 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Internet Layer 102 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Network Access Layer 103 <br>&nbsp;&nbsp;&nbsp; TCP/IP Communication Process (3.3.5) 103 <br>Standards Organizations (3.4) 108 <br>&nbsp;&nbsp;&nbsp; Open Standards (3.4.1) 108 <br>&nbsp;&nbsp;&nbsp; Internet Standards (3.4.2) 108 <br>&nbsp;&nbsp;&nbsp; Electronic and Communications Standards (3.4.3) 111 <br>Reference Models (3.5) 111 <br>&nbsp;&nbsp;&nbsp; The Benefits of Using a Layered Model (3.5.1) 112 <br>&nbsp;&nbsp;&nbsp; The OSI Reference Model (3.5.2) 112 <br>&nbsp;&nbsp;&nbsp; The TCP/IP Protocol Model (3.5.3) 114 <br>&nbsp;&nbsp;&nbsp; OSI and TCP/IP Model Comparison (3.5.4) 115 <br>Data Encapsulation (3.6) 116 <br>&nbsp;&nbsp;&nbsp; Segmenting Messages (3.6.1) 116 <br>&nbsp;&nbsp;&nbsp; Sequencing (3.6.2) 118 <br>&nbsp;&nbsp;&nbsp; Protocol Data Units (3.6.3) 118 <br>&nbsp;&nbsp;&nbsp; Encapsulation Example (3.6.4) 120 <br>&nbsp;&nbsp;&nbsp; De-encapsulation Example (3.6.5) 120 <br>Data Access (3.7) 121 <br>&nbsp;&nbsp;&nbsp; Addresses (3.7.1) 121 <br>&nbsp;&nbsp;&nbsp; Layer 3 Logical Address (3.7.2) 122 <br>&nbsp;&nbsp;&nbsp; Devices on the Same Network (3.7.3) 123 <br>&nbsp;&nbsp;&nbsp; Role of the Data Link Layer Addresses: Same <br>&nbsp;&nbsp;&nbsp; IP Network (3.7.4) 124 <br>&nbsp;&nbsp;&nbsp; Devices on a Remote Network (3.7.5) 125 <br>&nbsp;&nbsp;&nbsp; Role of the Network Layer Addresses (3.7.6) 125 <br>&nbsp;&nbsp;&nbsp; Role of the Data Link Layer Addresses: Different <br>&nbsp;&nbsp;&nbsp; IP Networks (3.7.7) 126 <br>&nbsp;&nbsp;&nbsp; Data Link Addresses (3.7.8) 127 <br>Summary (3.8) 130 <br>&nbsp;&nbsp;&nbsp; The Rules 130 <br>&nbsp;&nbsp;&nbsp; Protocols 130 <br>&nbsp;&nbsp;&nbsp; Protocol Suites 130 <br>&nbsp;&nbsp;&nbsp; Standards Organizations 131 <br>&nbsp;&nbsp;&nbsp; Reference Models 131 <br>&nbsp;&nbsp;&nbsp; Data Encapsulation 132 <br>&nbsp;&nbsp;&nbsp; Data Access 132 <br>Practice 133 <br>Check Your Understanding Questions 133 <br> Chapter 4 Physical Layer 137 <br>Objectives 137 <br>Key Terms 137 <br>Introduction (4.0) 138 <br>Purpose of the Physical Layer (4.1) 138 <br>&nbsp;&nbsp;&nbsp; The Physical Connection (4.1.1) 138 <br>&nbsp;&nbsp;&nbsp; The Physical Layer (4.1.2) 139 <br>Physical Layer Characteristics (4.2) 141 <br>&nbsp;&nbsp;&nbsp; Physical Layer Standards (4.2.1) 141 <br>&nbsp;&nbsp;&nbsp; Physical Components (4.2.2) 142 <br>&nbsp;&nbsp;&nbsp; Encoding (4.2.3) 142 <br>&nbsp;&nbsp;&nbsp; Signaling (4.2.4) 143 <br>&nbsp;&nbsp;&nbsp; Bandwidth (4.2.5) 145 <br>&nbsp;&nbsp;&nbsp; Bandwidth Terminology (4.2.6) 145 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Latency 146 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Throughput 146 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Goodput 146 <br>Copper Cabling (4.3) 146 <br>&nbsp;&nbsp;&nbsp; Characteristics of Copper Cabling (4.3.1) 147 <br>&nbsp;&nbsp;&nbsp; Types of Copper Cabling (4.3.2) 148 <br>&nbsp;&nbsp;&nbsp; Unshielded Twisted-Pair (UTP) (4.3.3) 148 <br>&nbsp;&nbsp;&nbsp; Shielded Twisted-Pair (STP) (4.3.4) 150 <br>&nbsp;&nbsp;&nbsp; Coaxial Cable (4.3.5) 151 <br>UTP Cabling (4.4) 152 <br>&nbsp;&nbsp;&nbsp; Properties of UTP Cabling (4.4.1) 152 <br>&nbsp;&nbsp;&nbsp; UTP Cabling Standards and Connectors (4.4.2) 153 <br>&nbsp;&nbsp;&nbsp; Straight-Through and Crossover UTP Cables (4.4.3) 157 <br>Fiber-Optic Cabling (4.5) 158 <br>&nbsp;&nbsp;&nbsp; Properties of Fiber-Optic Cabling (4.5.1) 158 <br>&nbsp;&nbsp;&nbsp; Types of Fiber Media (4.5.2) 159 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Single-Mode Fiber 159 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Multimode Fiber 160 <br>&nbsp;&nbsp;&nbsp; Fiber-Optic Cabling Usage (4.5.3) 160 <br>&nbsp;&nbsp;&nbsp; Fiber-Optic Connectors (4.5.4) 161 <br>&nbsp;&nbsp;&nbsp; Fiber Patch Cords (4.5.5) 162 <br>&nbsp;&nbsp;&nbsp; Fiber Versus Copper (4.5.6) 163 <br>Wireless Media (4.6) 164 <br>&nbsp;&nbsp;&nbsp; Properties of Wireless Media (4.6.1) 164 <br>&nbsp;&nbsp;&nbsp; Types of Wireless Media (4.6.2) 165 <br>&nbsp;&nbsp;&nbsp; Wireless LAN (4.6.3) 166 <br>Summary (4.7) 168 <br>&nbsp;&nbsp;&nbsp; Purpose of the Physical Layer 168 <br>&nbsp;&nbsp;&nbsp; Physical Layer Characteristics 168 <br>&nbsp;&nbsp;&nbsp; Copper Cabling 168 <br>&nbsp;&nbsp;&nbsp; UTP Cabling 169 <br>&nbsp;&nbsp;&nbsp; Fiber-Optic Cabling 169 <br>&nbsp;&nbsp;&nbsp; Wireless Media 169 <br>Practice 170 <br>Check Your Understanding Questions 170 <br> Chapter 5 Number Systems 175 <br>Objectives 175 <br>Key Terms 175 <br>Introduction (5.0) 176 <br>Binary Number System (5.1) 176 <br>&nbsp;&nbsp;&nbsp; Binary and IPv4 Addresses (5.1.1) 176 <br>&nbsp;&nbsp;&nbsp; Binary Positional Notation (5.1.3) 178 <br>&nbsp;&nbsp;&nbsp; Convert Binary to Decimal (5.1.5) 180 <br>&nbsp;&nbsp;&nbsp; Decimal to Binary Conversion (5.1.7) 182 <br>&nbsp;&nbsp;&nbsp; Decimal to Binary Conversion Example (5.1.8) 186 <br>&nbsp;&nbsp;&nbsp; IPv4 Addresses (5.1.11) 193 <br>Hexadecimal Number System (5.2) 194 <br>&nbsp;&nbsp;&nbsp; Hexadecimal and IPv6 Addresses (5.2.1) 194 <br>&nbsp;&nbsp;&nbsp; Decimal to Hexadecimal Conversions (5.2.3) 196 <br>&nbsp;&nbsp;&nbsp; Hexadecimal to Decimal Conversion (5.2.4) 196 <br>Summary (5.3) 198 <br>&nbsp;&nbsp;&nbsp; Binary Number System 198 <br>&nbsp;&nbsp;&nbsp; Hexadecimal Number System 198 <br>Practice 198 <br>Check Your Understanding Questions 198 <br> Chapter 6 Data Link Layer 203 <br>Objectives 203 <br>Key Terms 203 <br>Introduction (6.0) 204 <br>Purpose of the Data Link Layer (6.1) 204 <br>&nbsp;&nbsp;&nbsp; The Data Link Layer (6.1.1) 204 <br>&nbsp;&nbsp;&nbsp; IEEE 802 LAN/MAN Data Link Sublayers (6.1.2) 206 <br>&nbsp;&nbsp;&nbsp; Providing Access to Media (6.1.3) 207 <br>&nbsp;&nbsp;&nbsp; Data Link Layer Standards (6.1.4) 209 <br>Topologies (6.2) 209 <br>&nbsp;&nbsp;&nbsp; Physical and Logical Topologies (6.2.1) 209 <br>&nbsp;&nbsp;&nbsp; WAN Topologies (6.2.2) 211 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Point-to-Point 211 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Hub and Spoke 211 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Mesh 212 <br>&nbsp;&nbsp;&nbsp; Point-to-Point WAN Topology (6.2.3) 213 <br>&nbsp;&nbsp;&nbsp; LAN Topologies (6.2.4) 213 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Legacy LAN Topologies 214 <br>&nbsp;&nbsp;&nbsp; Half-Duplex and Full-Duplex Communication (6.2.5) 215 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Half-Duplex Communication 215 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Full-Duplex Communication 215 <br>&nbsp;&nbsp;&nbsp; Access Control Methods (6.2.6) 216 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Contention-Based Access 216 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Controlled Access 217 <br>&nbsp;&nbsp;&nbsp; Contention-Based Access—CSMA/CD (6.2.7) 217 <br>&nbsp;&nbsp;&nbsp; Contention-Based Access—CSMA/CA (6.2.8) 219 <br>Data Link Frame (6.3) 221 <br>&nbsp;&nbsp;&nbsp; The Frame (6.3.1) 221 <br>&nbsp;&nbsp;&nbsp; Frame Fields (6.3.2) 222 <br>&nbsp;&nbsp;&nbsp; Layer 2 Addresses (6.3.3) 223 <br>&nbsp;&nbsp;&nbsp; LAN and WAN Frames (6.3.4) 225 <br>Summary (6.4) 228 <br>&nbsp;&nbsp;&nbsp; Purpose of the Data Link Layer 228 <br>&nbsp;&nbsp;&nbsp; Topologies 228 <br>&nbsp;&nbsp;&nbsp; Data Link Frame 229 <br>Practice 229 <br>Check Your Understanding Questions 229 <br> Chapter 7 Ethernet Switching 233 <br>Objectives 233 <br>Key Terms 233 <br>Introduction (7.0) 234 <br>Ethernet Frames (7.1) 234 <br>&nbsp;&nbsp;&nbsp; Ethernet Encapsulation (7.1.1) 234 <br>&nbsp;&nbsp;&nbsp; Data Link Sublayers (7.1.2) 235 <br>&nbsp;&nbsp;&nbsp; MAC Sublayer (7.1.3) 236 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Data Encapsulation 236 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Accessing the Media 237 <br>&nbsp;&nbsp;&nbsp; Ethernet Frame Fields (7.1.4) 237 <br>Ethernet MAC Address (7.2) 239 <br>&nbsp;&nbsp;&nbsp; MAC Address and Hexadecimal (7.2.1) 240 <br>&nbsp;&nbsp;&nbsp; Ethernet MAC Address (7.2.2) 241 <br>&nbsp;&nbsp;&nbsp; Frame Processing (7.2.3) 243 <br>&nbsp;&nbsp;&nbsp; Unicast MAC Address (7.2.4) 244 <br>&nbsp;&nbsp;&nbsp; Broadcast MAC Address (7.2.5) 246 <br>&nbsp;&nbsp;&nbsp; Multicast MAC Address (7.2.6) 247 <br>The MAC Address Table (7.3) 248 <br>&nbsp;&nbsp;&nbsp; Switch Fundamentals (7.3.1) 248 <br>&nbsp;&nbsp;&nbsp; Switch Learning and Forwarding (7.3.2) 250 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Examine the Source MAC Address 250 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Find the Destination MAC Address 250 <br>&nbsp;&nbsp;&nbsp; Filtering Frames (7.3.3) 252 <br>Switch Speeds and Forwarding Methods (7.4) 254 <br>&nbsp;&nbsp;&nbsp; Frame Forwarding Methods on Cisco Switches (7.4.1) 254 <br>&nbsp;&nbsp;&nbsp; Cut-Through Switching (7.4.2) 255 <br>&nbsp;&nbsp;&nbsp; Memory Buffering on Switches (7.4.3) 257 <br>&nbsp;&nbsp;&nbsp; Duplex and Speed Settings (7.4.4) 257 <br>&nbsp;&nbsp;&nbsp; Auto-MDIX (7.4.5) 259 <br>Summary (7.5) 261 <br>&nbsp;&nbsp;&nbsp; Ethernet Frame 261 <br>&nbsp;&nbsp;&nbsp; Ethernet MAC Address 261 <br>&nbsp;&nbsp;&nbsp; The MAC Address Table 261 <br>&nbsp;&nbsp;&nbsp; Switch Speeds and Forwarding Methods 262 <br>Practice 262 <br>Check Your Understanding Questions 262 <br> Chapter 8 Network Layer 267 <br>Objectives 267 <br>Key Terms 267 <br>Introduction (8.0) 268 <br>Network Layer Characteristics (8.1) 268 <br>&nbsp;&nbsp;&nbsp; The Network Layer (8.1.1) 268 <br>&nbsp;&nbsp;&nbsp; IP Encapsulation (8.1.2) 270 <br>&nbsp;&nbsp;&nbsp; Characteristics of IP (8.1.3) 271 <br>&nbsp;&nbsp;&nbsp; Connectionless (8.1.4) 271 <br>&nbsp;&nbsp;&nbsp; Best Effort (8.1.5) 272 <br>&nbsp;&nbsp;&nbsp; Media Independent (8.1.6) 273 <br>IPv4 Packet (8.2) 274 <br>&nbsp;&nbsp;&nbsp; IPv4 Packet Header (8.2.1) 274 <br>&nbsp;&nbsp;&nbsp; IPv4 Packet Header Fields (8.2.2) 274 <br>IPv6 Packet (8.3) 276 <br>&nbsp;&nbsp;&nbsp; Limitations of IPv4 (8.3.1) 277 <br>&nbsp;&nbsp;&nbsp; IPv6 Overview (8.3.2) 277 <br>&nbsp;&nbsp;&nbsp; IPv4 Packet Header Fields in the IPv6 Packet Header (8.3.3) 278 <br>&nbsp;&nbsp;&nbsp; IPv6 Packet Header (8.3.4) 280 <br>How a Host Routes (8.4) 281 <br>&nbsp;&nbsp;&nbsp; Host Forwarding Decision (8.4.1) 281 <br>&nbsp;&nbsp;&nbsp; Default Gateway (8.4.2) 282 <br>&nbsp;&nbsp;&nbsp; A Host Routes to the Default Gateway (8.4.3) 283 <br>&nbsp;&nbsp;&nbsp; Host Routing Tables (8.4.4) 283 <br>Introduction to Routing (8.5) 285 <br>&nbsp;&nbsp;&nbsp; Router Packet Forwarding Decision (8.5.1) 285 <br>&nbsp;&nbsp;&nbsp; IP Router Routing Table (8.5.2) 286 <br>&nbsp;&nbsp;&nbsp; Static Routing (8.5.3) 287 <br>&nbsp;&nbsp;&nbsp; Dynamic Routing (8.5.4) 288 <br>&nbsp;&nbsp;&nbsp; Introduction to an IPv4 Routing Table (8.5.6) 290 <br>Summary (8.6) 292 <br>&nbsp;&nbsp;&nbsp; Network Layer Characteristics 292 <br>&nbsp;&nbsp;&nbsp; IPv4 Packet 292 <br>&nbsp;&nbsp;&nbsp; IPv6 Packet 292 <br>&nbsp;&nbsp;&nbsp; How a Host Routes 293 <br>&nbsp;&nbsp;&nbsp; Introduction to Routing 293 <br>Practice 294 <br>Check Your Understanding Questions 294 <br> Chapter 9 Address Resolution 297 <br>Objectives 297 <br>Key Terms 297 <br>Introduction (9.0) 298 <br>MAC and IP (9.1) 298 <br>&nbsp;&nbsp;&nbsp; Destination on Same Network (9.1.1) 298 <br>&nbsp;&nbsp;&nbsp; Destination on Remote Network (9.1.2) 299 <br>ARP (9.2) 301 <br>&nbsp;&nbsp;&nbsp; ARP Overview (9.2.1) 301 <br>&nbsp;&nbsp;&nbsp; ARP Functions (9.2.2) 302 <br>&nbsp;&nbsp;&nbsp; Removing Entries from an ARP Table (9.2.6) 306 <br>&nbsp;&nbsp;&nbsp; ARP Tables on Networking Devices (9.2.7) 306 <br>&nbsp;&nbsp;&nbsp; ARP Issues—ARP Broadcasts and ARP Spoofing (9.2.8) 307 <br>IPv6 Neighbor Discovery (9.3) 309 <br>&nbsp;&nbsp;&nbsp; IPv6 Neighbor Discovery Messages (9.3.2) 309 <br>&nbsp;&nbsp;&nbsp; IPv6 Neighbor Discovery—Address Resolution (9.3.3) 311 <br>Summary (9.4) 313 <br>&nbsp;&nbsp;&nbsp; MAC and IP 313 <br>&nbsp;&nbsp;&nbsp; ARP 313 <br>&nbsp;&nbsp;&nbsp; Neighbor Discovery 314 <br>Practice 314 <br>Check Your Understanding Questions 314 <br> Chapter 10 Basic Router Configuration 319 <br>Objectives 319 <br>Introduction (10.0) 320 <br>Configure Initial Router Settings (10.1) 320 <br>&nbsp;&nbsp;&nbsp; Basic Router Configuration Steps (10.1.1) 320 <br>&nbsp;&nbsp;&nbsp; Basic Router Configuration Example (10.1.2) 321 <br>Configure Interfaces (10.2) 323 <br>&nbsp;&nbsp;&nbsp; Configure Router Interfaces (10.2.1) 323 <br>&nbsp;&nbsp;&nbsp; Configure Router Interfaces Example (10.2.2) 324 <br>&nbsp;&nbsp;&nbsp; Verify Interface Configuration (10.2.3) 325 <br>&nbsp;&nbsp;&nbsp; Configuration Verification Commands (10.2.4) 326 <br>Configure the Default Gateway (10.3) 330 <br>&nbsp;&nbsp;&nbsp; Default Gateway on a Host (10.3.1) 331 <br>&nbsp;&nbsp;&nbsp; Default Gateway on a Switch (10.3.2) 332 <br>Summary (10.4) 335 <br>&nbsp;&nbsp;&nbsp; Configure Initial Router Settings 335 <br>&nbsp;&nbsp;&nbsp; Configure Interfaces 335 <br>&nbsp;&nbsp;&nbsp; Configure the Default Gateway 335 <br>Practice 336 <br>Check Your Understanding Questions 337 <br> Chapter 11 IPv4 Addressing 341 <br>Objectives 341 <br>Key Terms 341 <br>Introduction (11.0) 342 <br>IPv4 Address Structure (11.1) 342 <br>&nbsp;&nbsp;&nbsp; Network and Host Portions (11.1.1) 342 <br>&nbsp;&nbsp;&nbsp; The Subnet Mask (11.1.2) 343 <br>&nbsp;&nbsp;&nbsp; The Prefix Length (11.1.3) 344 <br>&nbsp;&nbsp;&nbsp; Determining the Network: Logical AND (11.1.4) 345 <br>&nbsp;&nbsp;&nbsp; Network, Host, and Broadcast Addresses (11.1.6) 347 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Network Address 347 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Host Addresses 348 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Broadcast Address 349 <br>IPv4 Unicast, Broadcast, and Multicast (11.2) 349 <br>&nbsp;&nbsp;&nbsp; Unicast (11.2.1) 349 <br>&nbsp;&nbsp;&nbsp; Broadcast (11.2.2) 350 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; IP Directed Broadcasts 351 <br>&nbsp;&nbsp;&nbsp; Multicast (11.2.3) 352 <br>Types of IPv4 Addresses (11.3) 353 <br>&nbsp;&nbsp;&nbsp; Public and Private IPv4 Addresses (11.3.1) 353 <br>&nbsp;&nbsp;&nbsp; Routing to the Internet (11.3.2) 354 <br>&nbsp;&nbsp;&nbsp; Special Use IPv4 Addresses (11.3.4) 356 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Loopback Addresses 356 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Link-Local Addresses 357 <br>&nbsp;&nbsp;&nbsp; Legacy Classful Addressing (11.3.5) 357 <br>&nbsp;&nbsp;&nbsp; Assignment of IP Addresses (11.3.6) 358 <br>Network Segmentation (11.4) 359 <br>&nbsp;&nbsp;&nbsp; Broadcast Domains and Segmentation (11.4.1) 359 <br>&nbsp;&nbsp;&nbsp; Problems with Large Broadcast Domains (11.4.2) 360 <br>&nbsp;&nbsp;&nbsp; Reasons for Segmenting Networks (11.4.3) 362 <br>Subnet an IPv4 Network (11.5) 364 <br>&nbsp;&nbsp;&nbsp; Subnet on an Octet Boundary (11.5.1) 364 <br>&nbsp;&nbsp;&nbsp; Subnet Within an Octet Boundary (11.5.2) 366 <br>Subnet a Slash 16 and a Slash 8 Prefix (11.6) 367 <br>&nbsp;&nbsp;&nbsp; Create Subnets with a Slash 16 Prefix (11.6.1) 367 <br>&nbsp;&nbsp;&nbsp; Create 100 Subnets with a Slash 16 Prefix (11.6.2) 369 <br>&nbsp;&nbsp;&nbsp; Create 1000 Subnets with a Slash 8 Prefix (11.6.3) 372 <br>Subnet to Meet Requirements (11.7) 374 <br>&nbsp;&nbsp;&nbsp; Subnet Private Versus Public IPv4 Address Space (11.7.1) 374 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; What About the DMZ? 377 <br>&nbsp;&nbsp;&nbsp; Minimize Unused Host IPv4 Addresses and Maximize Subnets (11.7.2) 377 <br>&nbsp;&nbsp;&nbsp; Example: Efficient IPv4 Subnetting (11.7.3) 378 <br>VLSM (11.8) 381 <br>&nbsp;&nbsp;&nbsp; IPv4 Address Conservation (11.8.3) 381 <br>&nbsp;&nbsp;&nbsp; VLSM (11.8.4) 383 <br>&nbsp;&nbsp;&nbsp; VLSM Topology Address Assignment (11.8.5) 386 <br>Structured Design (11.9) 387 <br>&nbsp;&nbsp;&nbsp; IPv4 Network Address Planning (11.9.1) 388 <br>&nbsp;&nbsp;&nbsp; Device Address Assignment (11.9.2) 389 <br>Summary (11.10) 390 <br>&nbsp;&nbsp;&nbsp; IPv4 Addressing Structure 390 <br>&nbsp;&nbsp;&nbsp; IPv4 Unicast, Broadcast, and Multicast 390 <br>&nbsp;&nbsp;&nbsp; Types of IPv4 Addresses 390 <br>&nbsp;&nbsp;&nbsp; Network Segmentation 391 <br>&nbsp;&nbsp;&nbsp; Subnet an IPv4 Network 391 <br>&nbsp;&nbsp;&nbsp; Subnet a /16 and a /8 Prefix 391 <br>&nbsp;&nbsp;&nbsp; Subnet to Meet Requirements 391 <br>&nbsp;&nbsp;&nbsp; Variable-Length Subnet Masking 392 <br>&nbsp;&nbsp;&nbsp; Structured Design 392 <br>Practice 393 <br>Check Your Understanding Questions 393 <br> Chapter 12 IPv6 Addressing 397 <br>Objectives 397 <br>Key Terms 397 <br>Introduction (12.0) 398 <br>IPv4 Issues (12.1) 398 <br>&nbsp;&nbsp;&nbsp; Need for IPv6 (12.1.1) 398 <br>&nbsp;&nbsp;&nbsp; Internet of Things 399 <br>&nbsp;&nbsp;&nbsp; IPv4 and IPv6 Coexistence (12.1.2) 399 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Dual Stack 399 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Tunneling 400 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Translation 401 <br>IPv6 Address Representation (12.2) 401 <br>&nbsp;&nbsp;&nbsp; IPv6 Addressing Formats (12.2.1) 401 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Preferred Format 402 <br>&nbsp;&nbsp;&nbsp; Rule 1—Omit Leading Zeros (12.2.2) 403 <br>&nbsp;&nbsp;&nbsp; Rule 2—Double Colon (12.2.3) 404 <br>IPv6 Address Types (12.3) 406 <br>&nbsp;&nbsp;&nbsp; Unicast, Multicast, Anycast (12.3.1) 406 <br>&nbsp;&nbsp;&nbsp; IPv6 Prefix Length (12.3.2) 406 <br>&nbsp;&nbsp;&nbsp; Types of IPv6 Unicast Addresses (12.3.3) 407 <br>&nbsp;&nbsp;&nbsp; A Note About the Unique Local Address (12.3.4) 408 <br>&nbsp;&nbsp;&nbsp; IPv6 GUA (12.3.5) 408 <br>&nbsp;&nbsp;&nbsp; IPv6 GUA Structure (12.3.6) 409 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Global Routing Prefix 410 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Subnet ID 410 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Interface ID 410 <br>&nbsp;&nbsp;&nbsp; IPv6 LLA (12.3.7) 411 <br>GUA and LLA Static Configuration (12.4) 413 <br>&nbsp;&nbsp;&nbsp; Static GUA Configuration on a Router (12.4.1) 413 <br>&nbsp;&nbsp;&nbsp; Static GUA Configuration on a Windows Host (12.4.2) 414 <br>&nbsp;&nbsp;&nbsp; Static Configuration of a Link-Local Unicast Address (12.4.3) 415 <br>Dynamic Addressing for IPv6 GUAs (12.5) 417 <br>&nbsp;&nbsp;&nbsp; RS and RA Messages (12.5.1) 417 <br>&nbsp;&nbsp;&nbsp; Method 1: SLAAC (12.5.2) 418 <br>&nbsp;&nbsp;&nbsp; Method 2: SLAAC and Stateless DHCPv6 (12.5.3) 419 <br>&nbsp;&nbsp;&nbsp; Method 3: Stateful DHCPv6 (12.5.4) 420 <br>&nbsp;&nbsp;&nbsp; EUI-64 Process vs. Randomly Generated (12.5.5) 421 <br>&nbsp;&nbsp;&nbsp; EUI-64 Process (12.5.6) 422 <br>&nbsp;&nbsp;&nbsp; Randomly Generated Interface IDs (12.5.7) 424 <br>Dynamic Addressing for IPv6 LLAs (12.6) 425 <br>&nbsp;&nbsp;&nbsp; Dynamic LLAs (12.6.1) 425 <br>&nbsp;&nbsp;&nbsp; Dynamic LLAs on Windows (12.6.2) 425 <br>&nbsp;&nbsp;&nbsp; Dynamic LLAs on Cisco Routers (12.6.3) 426 <br>&nbsp;&nbsp;&nbsp; Verify IPv6 Address Configuration (12.6.4) 427 <br>IPv6 Multicast Addresses (12.7) 430 <br>&nbsp;&nbsp;&nbsp; Assigned IPv6 Multicast Addresses (12.7.1) 430 <br>&nbsp;&nbsp;&nbsp; Well-Known IPv6 Multicast Addresses (12.7.2) 430 <br>&nbsp;&nbsp;&nbsp; Solicited-Node IPv6 Multicast Addresses (12.7.3) 432 <br>Subnet an IPv6 Network (12.8) 432 <br>&nbsp;&nbsp;&nbsp; Subnet Using the Subnet ID (12.8.1) 432 <br>&nbsp;&nbsp;&nbsp; IPv6 Subnetting Example (12.8.2) 433 <br>&nbsp;&nbsp;&nbsp; IPv6 Subnet Allocation (12.8.3) 434 <br>&nbsp;&nbsp;&nbsp; Router Configured with IPv6 Subnets (12.8.4) 435 <br>Summary (12.9) 436 <br>&nbsp;&nbsp;&nbsp; IPv4 Issues 436 <br>&nbsp;&nbsp;&nbsp; IPv6 Address Representation 436 <br>&nbsp;&nbsp;&nbsp; IPv6 Address Types 436 <br>&nbsp;&nbsp;&nbsp; GUA and LLA Static Configuration 437 <br>&nbsp;&nbsp;&nbsp; Dynamic Addressing for IPv6 GUAs 437 <br>&nbsp;&nbsp;&nbsp; Dynamic Addressing for IPv6 LLAs 437 <br>&nbsp;&nbsp;&nbsp; IPv6 Multicast Addresses 438 <br>&nbsp;&nbsp;&nbsp; Subnet an IPv6 Network 438 <br>Practice 439 <br>Check Your Understanding Questions 439 <br> Chapter 13 ICMP 443 <br>Objectives 443 <br>Introduction (13.0) 444 <br>ICMP Messages (13.1) 444 <br>&nbsp;&nbsp;&nbsp; ICMPv4 and ICMPv6 Messages (13.1.1) 444 <br>&nbsp;&nbsp;&nbsp; Host Reachability (13.1.2) 444 <br>&nbsp;&nbsp;&nbsp; Destination or Service Unreachable (13.1.3) 445 <br>&nbsp;&nbsp;&nbsp; Time Exceeded (13.1.4) 446 <br>&nbsp;&nbsp;&nbsp; ICMPv6 Messages (13.1.5) 446 <br>Ping and Traceroute Tests (13.2) 449 <br>&nbsp;&nbsp;&nbsp; Ping—Test Connectivity (13.2.1) 449 <br>&nbsp;&nbsp;&nbsp; Ping the Loopback (13.2.2) 450 <br>&nbsp;&nbsp;&nbsp; Ping the Default Gateway (13.2.3) 450 <br>&nbsp;&nbsp;&nbsp; Ping a Remote Host (13.2.4) 451 <br>&nbsp;&nbsp;&nbsp; Traceroute—Test the Path (13.2.5) 452 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Round-Trip Time (RTT) 453 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; IPv4 TTL and IPv6 Hop Limit 453 <br>Summary (13.3) 454 <br>&nbsp;&nbsp;&nbsp; ICMP Messages 454 <br>&nbsp;&nbsp;&nbsp; Ping and Traceroute Testing 454 <br>Practice 455 <br>Check Your Understanding Questions 456 <br> Chapter 14 Transport Layer 461 <br>Objectives 461 <br>Key Terms 461 <br>Introduction (14.0) 462 <br>Transportation of Data (14.1) 462 <br>&nbsp;&nbsp;&nbsp; Role of the Transport Layer (14.1.1) 462 <br>&nbsp;&nbsp;&nbsp; Transport Layer Responsibilities (14.1.2) 463 <br>&nbsp;&nbsp;&nbsp; Transport Layer Protocols (14.1.3) 467 <br>&nbsp;&nbsp;&nbsp; Transmission Control Protocol (TCP) (14.1.4) 467 <br>&nbsp;&nbsp;&nbsp; User Datagram Protocol (UDP) (14.1.5) 468 <br>&nbsp;&nbsp;&nbsp; The Right Transport Layer Protocol for the Right Application (14.1.6) 469 <br>TCP Overview (14.2) 470 <br>&nbsp;&nbsp;&nbsp; TCP Features (14.2.1) 470 <br>&nbsp;&nbsp;&nbsp; TCP Header (14.2.2) 471 <br>&nbsp;&nbsp;&nbsp; TCP Header Fields (14.2.3) 471 <br>&nbsp;&nbsp;&nbsp; Applications That Use TCP (14.2.4) 472 <br>UDP Overview (14.3) 473 <br>&nbsp;&nbsp;&nbsp; UDP Features (14.3.1) 473 <br>&nbsp;&nbsp;&nbsp; UDP Header (14.3.2) 474 <br>&nbsp;&nbsp;&nbsp; UDP Header Fields (14.3.3) 474 <br>&nbsp;&nbsp;&nbsp; Applications that use UDP (14.3.4) 475 <br>Port Numbers (14.4) 476 <br>&nbsp;&nbsp;&nbsp; Multiple Separate Communications (14.4.1) 476 <br>&nbsp;&nbsp;&nbsp; Socket Pairs (14.4.2) 477 <br>&nbsp;&nbsp;&nbsp; Port Number Groups (14.4.3) 478 <br>&nbsp;&nbsp;&nbsp; The netstat Command (14.4.4) 479 <br>TCP Communication Process (14.5) 480 <br>&nbsp;&nbsp;&nbsp; TCP Server Processes (14.5.1) 480 <br>&nbsp;&nbsp;&nbsp; TCP Connection Establishment (14.5.2) 483 <br>&nbsp;&nbsp;&nbsp; Session Termination (14.5.3) 484 <br>&nbsp;&nbsp;&nbsp; TCP Three-Way Handshake Analysis (14.5.4) 485 <br>Reliability and Flow Control (14.6) 486 <br>&nbsp;&nbsp;&nbsp; TCP Reliability—Guaranteed and Ordered Delivery (14.6.1) 486 <br>&nbsp;&nbsp;&nbsp; TCP Reliability—Data Loss and Retransmission (14.6.3) 488 <br>&nbsp;&nbsp;&nbsp; TCP Flow Control—Window Size and Acknowledgments (14.6.5) 490 <br>&nbsp;&nbsp;&nbsp; TCP Flow Control—Maximum Segment Size (MSS) (14.6.6) 491 <br>&nbsp;&nbsp;&nbsp; TCP Flow Control—Congestion Avoidance (14.6.7) 493 <br>UDP Communication (14.7) 494 <br>&nbsp;&nbsp;&nbsp; UDP Low Overhead Versus Reliability (14.7.1) 494 <br>&nbsp;&nbsp;&nbsp; UDP Datagram Reassembly (14.7.2) 494 <br>&nbsp;&nbsp;&nbsp; UDP Server Processes and Requests (14.7.3) 495 <br>&nbsp;&nbsp;&nbsp; UDP Client Processes (14.7.4) 495 <br>Summary (14.8) 499 <br>&nbsp;&nbsp;&nbsp; Transportation of Data 499 <br>&nbsp;&nbsp;&nbsp; TCP Overview 499 <br>&nbsp;&nbsp;&nbsp; UDP Overview 499 <br>&nbsp;&nbsp;&nbsp; Port Numbers 499 <br>&nbsp;&nbsp;&nbsp; TCP Communications Process 500 <br>&nbsp;&nbsp;&nbsp; Reliability and Flow Control 500 <br>&nbsp;&nbsp;&nbsp; UDP Communication 501 <br>Practice 501 <br>Check Your Understanding Questions 502 <br> Chapter 15 Application Layer 507 <br>Objectives 507 <br>Key Terms 507 <br>Introduction (15.0) 508 <br>Application, Presentation, and Session (15.1) 508 <br>&nbsp;&nbsp;&nbsp; Application Layer (15.1.1) 508 <br>&nbsp;&nbsp;&nbsp; Presentation and Session Layer (15.1.2) 508 <br>&nbsp;&nbsp;&nbsp; TCP/IP Application Layer Protocols (15.1.3) 510 <br>Peer-to-Peer (15.2) 511 <br>&nbsp;&nbsp;&nbsp; Client-Server Model (15.2.1) 511 <br>&nbsp;&nbsp;&nbsp; Peer-to-Peer Networks (15.2.2) 512 <br>&nbsp;&nbsp;&nbsp; Peer-to-Peer Applications (15.2.3) 513 <br>&nbsp;&nbsp;&nbsp; Common P2P Applications (15.2.4) 514 <br>Web and Email Protocols (15.3) 515 <br>&nbsp;&nbsp;&nbsp; Hypertext Transfer Protocol and Hypertext Markup Language (15.3.1) 515 <br>&nbsp;&nbsp;&nbsp; HTTP and HTTPS (15.3.2) 516 <br>&nbsp;&nbsp;&nbsp; Email Protocols (15.3.3) 518 <br>&nbsp;&nbsp;&nbsp; SMTP, POP, and IMAP (15.3.4) 519 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SMTP 519 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; POP 520 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; IMAP 521 <br>IP Addressing Services (15.4) 521 <br>&nbsp;&nbsp;&nbsp; Domain Name Service (15.4.1) 522 <br>&nbsp;&nbsp;&nbsp; DNS Message Format (15.4.2) 524 <br>&nbsp;&nbsp;&nbsp; DNS Hierarchy (15.4.3) 525 <br>&nbsp;&nbsp;&nbsp; The nslookup Command (15.4.4) 526 <br>&nbsp;&nbsp;&nbsp; Dynamic Host Configuration Protocol (15.4.6) 527 <br>&nbsp;&nbsp;&nbsp; DHCP Operation (15.4.7) 528 <br>File Sharing Services (15.5) 530 <br>&nbsp;&nbsp;&nbsp; File Transfer Protocol (15.5.1) 530 <br>&nbsp;&nbsp;&nbsp; Server Message Block (15.5.2) 531 <br>Summary 534 <br>&nbsp;&nbsp;&nbsp; Application, Presentation, and Session 534 <br>&nbsp;&nbsp;&nbsp; Peer-to-Peer 534 <br>&nbsp;&nbsp;&nbsp; Web and Email Protocols 534 <br>&nbsp;&nbsp;&nbsp; IP Addressing Services 535 <br>&nbsp;&nbsp;&nbsp; File Sharing Services 535 <br>Practice 536 <br>Check Your Understanding Questions 536 <br> Chapter 16 Network Security Fundamentals 541 <br>Objectives 541 <br>Key Terms 541 <br>Introduction (16.0) 542 <br>Security Threats and Vulnerabilities (16.1) 542 <br>&nbsp;&nbsp;&nbsp; Types of Threats (16.1.1) 542 <br>&nbsp;&nbsp;&nbsp; Types of Vulnerabilities (16.1.2) 543 <br>&nbsp;&nbsp;&nbsp; Physical Security (16.1.3) 545 <br>Network Attacks (16.2) 546 <br>&nbsp;&nbsp;&nbsp; Types of Malware (16.2.1) 546 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Viruses 546 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Worms 547 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Trojan Horses 547 <br>&nbsp;&nbsp;&nbsp; Reconnaissance Attacks (16.2.2) 547 <br>&nbsp;&nbsp;&nbsp; Access Attacks (16.2.3) 548 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Password Attacks 548 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Trust Exploitation 548 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Port Redirection 549 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Man-in-the-Middle 549 <br>&nbsp;&nbsp;&nbsp; Denial of Service Attacks (16.2.4) 551 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; DoS Attack 551 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; DDoS Attack 551 <br>Network Attack Mitigations (16.3) 552 <br>&nbsp;&nbsp;&nbsp; The Defense-in-Depth Approach (16.3.1) 553 <br>&nbsp;&nbsp;&nbsp; Keep Backups (16.3.2) 553 <br>&nbsp;&nbsp;&nbsp; Upgrade, Update, and Patch (16.3.3) 554 <br>&nbsp;&nbsp;&nbsp; Authentication, Authorization, and Accounting (16.3.4) 555 <br>&nbsp;&nbsp;&nbsp; Firewalls (16.3.5) 555 <br>&nbsp;&nbsp;&nbsp; Types of Firewalls (16.3.6) 557 <br>&nbsp;&nbsp;&nbsp; Endpoint Security (16.3.7) 558 <br>Device Security (16.4) 558 <br>&nbsp;&nbsp;&nbsp; Cisco AutoSecure (16.4.1) 558 <br>&nbsp;&nbsp;&nbsp; Passwords (16.4.2) 559 <br>&nbsp;&nbsp;&nbsp; Additional Password Security (16.4.3) 560 <br>&nbsp;&nbsp;&nbsp; Enable SSH (16.4.4) 561 <br>&nbsp;&nbsp;&nbsp; Disable Unused Services (16.4.5) 563 <br>Summary 565 <br>&nbsp;&nbsp;&nbsp; Security Threats and Vulnerabilities 565 <br>&nbsp;&nbsp;&nbsp; Network Attacks 565 <br>&nbsp;&nbsp;&nbsp; Network Attack Mitigation 565 <br>&nbsp;&nbsp;&nbsp; Device Security 566 <br>Practice 567 <br>Check Your Understanding Questions 567 <br> Chapter 17 Build a Small Network 571 <br>Objectives 571 <br>Key Terms 571 <br>Introduction (17.0) 572 <br>Devices in a Small Network (17.1) 572 <br>&nbsp;&nbsp;&nbsp; Small Network Topologies (17.1.1) 572 <br>&nbsp;&nbsp;&nbsp; Device Selection for a Small Network (17.1.2) 573 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Cost 573 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Speed and Types of Ports/Interfaces 573 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Expandability 573 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Operating System Features and Services 574 <br>&nbsp;&nbsp;&nbsp; IP Addressing for a Small Network (17.1.3) 574 <br>&nbsp;&nbsp;&nbsp; Redundancy in a Small Network (17.1.4) 576 <br>&nbsp;&nbsp;&nbsp; Traffic Management (17.1.5) 577 <br>Small Network Applications and Protocols (17.2) 578 <br>&nbsp;&nbsp;&nbsp; Common Applications (17.2.1) 578 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Network Applications 578 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Application Layer Services 579 <br>&nbsp;&nbsp;&nbsp; Common Protocols (17.2.2) 579 <br>&nbsp;&nbsp;&nbsp; Voice and Video Applications (17.2.3) 582 <br>Scale to Larger Networks (17.3) 583 <br>&nbsp;&nbsp;&nbsp; Small Network Growth (17.3.1) 583 <br>&nbsp;&nbsp;&nbsp; Protocol Analysis (17.3.2) 583 <br>&nbsp;&nbsp;&nbsp; Employee Network Utilization (17.3.3) 584 <br>Verify Connectivity (17.4) 586 <br>&nbsp;&nbsp;&nbsp; Verify Connectivity with Ping (17.4.1) 586 <br>&nbsp;&nbsp;&nbsp; Extended Ping (17.4.2) 588 <br>&nbsp;&nbsp;&nbsp; Verify Connectivity with Traceroute (17.4.3) 590 <br>&nbsp;&nbsp;&nbsp; Extended Traceroute (17.4.4) 592 <br>&nbsp;&nbsp;&nbsp; Network Baseline (17.4.5) 593 <br>Host and IOS Commands (17.5) 596 <br>&nbsp;&nbsp;&nbsp; IP Configuration on a Windows Host (17.5.1) 596 <br>&nbsp;&nbsp;&nbsp; IP Configuration on a Linux Host (17.5.2) 599 <br>&nbsp;&nbsp;&nbsp; IP Configuration on a macOS Host (17.5.3) 600 <br>&nbsp;&nbsp;&nbsp; The arp Command (17.5.4) 601 <br>&nbsp;&nbsp;&nbsp; Common show Commands Revisited (17.5.5) 602 <br>&nbsp;&nbsp;&nbsp; The show cdp neighbors Command (17.5.6) 609 <br>&nbsp;&nbsp;&nbsp; The show ip interface brief Command (17.5.7) 610 <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Verify Switch Interfaces 611 <br>Troubleshooting Methodologies (17.6) 611 <br>&nbsp;&nbsp;&nbsp; Basic Troubleshooting Approaches (17.6.1) 612 <br>&nbsp;&nbsp;&nbsp; Resolve or Escalate? (17.6.2) 613 <br>&nbsp;&nbsp;&nbsp; The debug Command (17.6.3) 613 <br>&nbsp;&nbsp;&nbsp; The terminal monitor Command (17.6.4) 615 <br>Troubleshooting Scenarios (17.7) 616 <br>&nbsp;&nbsp;&nbsp; Duplex Operation and Mismatch Issues (17.7.1) 617 <br>&nbsp;&nbsp;&nbsp; IP Addressing Issues on IOS Devices (17.7.2) 618 <br>&nbsp;&nbsp;&nbsp; IP Addressing Issues on End Devices (17.7.3) 619 <br>&nbsp;&nbsp;&nbsp; Default Gateway Issues (17.7.4) 619 <br>&nbsp;&nbsp;&nbsp; Troubleshooting DNS Issues (17.7.5) 621 <br>Summary (17.8) 624 <br>&nbsp;&nbsp;&nbsp; Devices in a Small Network 624 <br>&nbsp;&nbsp;&nbsp; Small Network Applications and Protocols 624 <br>&nbsp;&nbsp;&nbsp; Scale to Larger Networks 624 <br>&nbsp;&nbsp;&nbsp; Verify Connectivity 625 <br>&nbsp;&nbsp;&nbsp; Host and IOS Commands 625 <br>&nbsp;&nbsp;&nbsp; Troubleshooting Methodologies 626 <br>&nbsp;&nbsp;&nbsp; Troubleshooting Scenarios 626 <br>Practice 627 <br>Check Your Understanding Questions 628 <br> Appendix A Answers to “Check Your Understanding” Questions 631 <br> Key Terms Glossary 645 <br> <br> <br>9780136633662&nbsp;&nbsp; TOC&nbsp;&nbsp; 6/3/2020

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Introduction to Networks Companion Guide (CCNAv7)