Chapter 1 Exploring the Network
Communicating in a Network-Centric World (1.1)
Interconnecting Our Lives (1.1.1)
Networks in Our Daily Lives (1.1.1.1)
Technology Then and Now (1.1.1.2)
The Global Community (1.1.1.3)
Networks Support the Way We Learn (1.1.1.4)
Networks Support the Way We Communicate (1.1.1.5)
Networks Support the Way We Work (1.1.1.6)
Networks Support the Way We Play (1.1.1.7)
Supporting Communication (1.1.2)
What Is Communication? (1.1.2.1)
Quality of Communication (1.1.2.2)
The Network as a Platform (1.2)
Traditional Service Networks (1.2.1.1)
Planning for the Future (1.2.1.2)
The Supporting Network Architecture (1.2.2.1)
Fault Tolerance in Circuit-Switched Networks (1.2.2.2)
Packet-Switched Networks (1.2.2.3)
Providing Network Security (1.2.2.6)
LANs, WANs, and the Internet (1.3)
Components of a Network (1.3.1)
Components of the Network (1.3.1.1)
Intermediary Devices (1.3.1.3)
Network Representations (1.3.1.5)
Intranet and Extranet (1.3.3.2)
Connecting to the Internet (1.3.4)
Internet Access Technologies (1.3.4.1)
Connecting Remote Users to the Internet (1.3.4.2)
Connecting Businesses to the Internet (1.3.4.3)
Bring Your Own Device (BYOD) (1.4.1.2)
Online Collaboration (1.4.1.4)
Collaboration Considerations (1.4.1.5)
Cisco Network Architectures (1.4.3.1)
Cisco Borderless Network (1.4.3.2)
Collaboration Architecture (1.4.3.3)
Data Center Architecture (1.4.3.4)
Chapter 2 Configuring a Network Operating System
Location of the Cisco IOS (2.1.1.2)
Accessing a Cisco IOS Device (2.1.2)
Console Access Method (2.1.2.1)
Telnet, SSH, and AUX Access Methods (2.1.2.2)
Terminal Emulation Programs (2.1.2.3)
Cisco IOS Modes of Operation (2.1.3.1)
Global Configuration Mode and Submodes (2.1.3.3)
Navigating Between IOS Modes (2.1.3.4, 2.1.3.5)
IOS Command Structure (2.1.4.1)
Cisco IOS Command Reference (2.1.4.2)
Context-Sensitive Help (2.1.4.3)
Command Syntax Check (2.1.4.4)
Hot Keys and Shortcuts (2.1.4.5)
IOS Examination Commands (2.1.4.6)
The show version Command (2.1.4.7)
Configuring Hostnames (2.2.1.4)
Limiting Access to Device Configurations (2.2.2)
Securing Device Access (2.2.2.1)
Securing Privileged EXEC Access (2.2.2.2)
Securing User EXEC Access (2.2.2.3)
Encrypting Password Display (2.2.2.4)
IP Addressing of Devices (2.3.1.1)
Interfaces and Ports (2.3.1.2)
Configuring a Switch Virtual Interface (2.3.2.1)
Manual IP Address Configuration for End Devices (2.3.2.2)
Automatic IP Address Configuration for End Devices (2.3.2.3)
IP Address Conflicts (2.3.2.4)
Verifying Connectivity (2.3.3)
Test the Loopback Address on an End Device (2.3.3.1)
Testing the Interface Assignment (2.3.3.2)
Testing End-to-End Connectivity (2.3.3.3)
Chapter 3 Network Protocols and Communications
Network Protocols and Standards (3.1)
Protocols: Rules that Govern Communications (3.1.1.1)
Interaction of Protocols (3.1.1.3)
Protocol Suites and Industry Standards (3.1.2.1)
Creation of the Internet and Development of TCP/IP (3.1.2.2)
TCP/IP Protocol Suite and Communication Process (3.1.2.3)
Standards Organizations (3.1.3)
Other Standards Organizations (3.1.3.5)
The Benefits of Using a Layered Model (3.1.4.1)
The OSI Reference Model (3.1.4.2)
The TCP/IP Protocol Model (3.1.4.3)
Comparing the OSI Model with the TCP/IP Model (3.1.4.4)
Using Requests for Comments (3.2)
Request for Comments (RFC) (3.2.1.1)
Moving Data in the Network (3.3)
Elements of Communication (3.3.1.1)
Communicating the Messages (3.3.1.2)
Protocol Data Units (PDUs) (3.3.1.3)
Accessing Local Resources (3.3.2)
Network Addresses and Data Link Addresses (3.3.2.1)
Communicating with a Device on the Same Network (3.3.2.2)
MAC and IP Addresses (3.3.2.3)
Accessing Remote Resources (3.3.3)
Communicating with a Device on a Remote Network (3.3.3.2)
Application Layer Protocols (4.1)
Application, Session, and Presentation (4.1.1)
OSI and TCP/IP Models Revisited (4.1.1.1)
Presentation and Session Layers (4.1.1.3)
TCP/IP Application Layer Protocols (4.1.1.4)
Services at the Application Layer (4.1.1.5; 4.1.1.6)
Applications Interface with People and Other Applications (4.1.1.7)
How Application Protocols Interact with End-User Applications (4.1.2)
Peer-to-Peer Networks (4.1.2.1)
Peer-to-Peer Applications (4.1.2.2)
Common P2P Applications (4.1.2.3)
Well-Known Application Layer Protocols and Services (4.2)
Everyday Application Layer Protocols (4.2.1)
Application Layer Protocols Revisited (4.2.1.1)
Hypertext Transfer Protocol and Hypertext Markup Language (4.2.1.2)
SMTP and POP (4.2.1.4–4.2.1.7)
Providing IP Addressing Services (4.2.2)
Dynamic Host Configuration Protocol (4.2.2.6)
Providing File Sharing Services (4.2.3)
File Transfer Protocol (4.2.3.1)
Server Message Block (4.2.3.4)
Transport Layer Protocols (5.1)
Transportation of Data (5.1.1)
Role of the Transport Layer (5.1.1.1, 5.1.1.2)
Conversation Multiplexing (5.1.1.3)
Transport Layer Reliability (5.1.1.4)
The Right Transport Layer Protocol for the Right Application (5.1.1.7)
Introducing TCP and UDP (5.1.2)
Separating Multiple Communications (5.1.2.5)
TCP and UDP Port Addressing (5.1.2.6–5.1.2.9)
TCP and UDP Segmentation (5.1.2.10)
TCP Reliable Delivery (5.2.1.1)
TCP Server Processes (5.2.1.2)
TCP Connection Establishment (5.2.1.3)
TCP Three-way Handshake Analysis: Step 1 (5.2.1.4)
TCP Three-way Handshake Analysis: Step 2 (5.2.1.5)
TCP Three-way Handshake Analysis: Step 3 (5.2.1.6)
TCP Session Termination Analysis (5.2.1.7)
TCP Reliability—Ordered Delivery (5.2.2.1)
TCP Reliability—Acknowledgement and Window Size (5.2.2.2)
TCP Reliability—Data Loss and Retransmission (5.2.2.3)
TCP Flow Control—Window Size and Acknowledgements (5.2.2.4)
TCP Flow Control—Congestion Avoidance (5.2.2.5)
UDP Low Overhead Versus Reliability (5.2.3.1)
UDP Datagram Reassembly (5.2.3.2)
UDP Server Processes and Requests (5.2.3.3)
UDP Client Processes (5.2.3.4)
TCP or UDP—That Is the Question (5.2.4)
Applications That Use TCP (5.2.4.1)
Applications That Use UDP (5.2.4.2)
Network Layer in Communication (6.1.1)
Network Layer Protocols (6.1.1.2)
Characteristics of the IP Protocol (6.1.2)
Characteristics of IP (6.1.2.1)
IP – Best-Effort Delivery (6.1.2.3)
IP – Media Independent (6.1.2.4)
Host Packet Forwarding Decision (6.2.1.1)
IPv4 Host Routing Table (6.2.1.2)
IPv4 Host Routing Entries (6.2.1.3)
Sample IPv4 Host Routing Table (6.2.1.4)
Sample IPv6 Host Routing Table (6.2.1.5)
Router Packet Forwarding Decision (6.2.2.1)
IPv4 Router Routing Table (6.2.2.2)
Directly Connected Routing Table Entries (6.2.2.3)
Remote Network Routing Table Entries (6.2.2.4)
Sample Router IPv4 Routing Table (6.2.2.6)
A Router Is a Computer (6.3.1.1)
Connecting to a Router (6.3.1.6)
LAN and WAN Interfaces (6.3.1.7)
Router Bootup Process (6.3.2.3)
Configuring a Cisco Router (6.4)
Configure Initial Settings (6.4.1)
Router Configuration Steps (6.4.1.1)
Configure LAN Interfaces (6.4.2.1)
Verify Interface Configuration (6.4.2.2)
Configuring the Default Gateway (6.4.3)
Default Gateway on a Host (6.4.3.1)
Default Gateway on a Switch (6.4.3.2)
IPv4 Address Structure (7.1.1)
Binary Number System (7.1.1.2)
Converting a Binary Address to Decimal (7.1.1.3)
Converting from Decimal to Binary (7.1.1.5, 7.1.1.6)
Network Portion and Host Portion of an IPv4 Address (7.1.2.1)
Examining the Prefix Length (7.1.2.2)
IPv4 Network, Host, and Broadcast Addresses (7.1.2.3)
First Host and Last Host Addresses (7.1.2.4)
Bitwise AND Operation (7.1.2.5)
Importance of ANDing (7.1.2.6)
IPv4 Unicast, Broadcast, and Multicast (7.1.3)
Assigning a Static IPv4 Address to a Host (7.1.3.1)
Assigning a Dynamic IPv4 Address to a Host (7.1.3.2)
Unicast Transmission (7.1.3.3)
Broadcast Transmission (7.1.3.4)
Multicast Transmission (7.1.3.5)
Types of IPv4 Addresses (7.1.4)
Public and Private IPv4 Addresses (7.1.4.1)
Special-Use IPv4 Addresses (7.1.4.3)
Legacy Classful Addressing (7.1.4.4)
Assignment of IP Addresses (7.1.4.5, 7.1.4.6)
IPv4 and IPv6 Coexistence (7.2.1.2)
Hexadecimal Number System (7.2.2.1)
IPv6 Address Representation (7.2.2.2)
Rule 1: Omitting Leading 0s (7.2.2.3)
Rule 2: Omitting All 0 Segments (7.2.2.4)
Types of IPv6 Addresses (7.2.3)
IPv6 Unicast Addresses (7.2.3.3)
IPv6 Link-Local Unicast Addresses (7.2.3.4)
IPv6 Unicast Addresses (7.2.4)
Structure of an IPv6 Global Unicast Address (7.2.4.1)
Static Configuration of a Global Unicast Address (7.2.4.2)
Dynamic Configuration of a Global Unicast Address Using SLAAC (7.2.4.3)
Dynamic Configuration of a Global Unicast Address Using DHCPv6 (7.2.4.4)
EUI-64 Process or Randomly Generated (7.2.4.5)
Dynamic Link-Local Addresses (7.2.4.6)
Static Link-Local Addresses (7.2.4.7)
Verifying IPv6 Address Configuration (7.2.4.8)
IPv6 Multicast Addresses (7.2.5)
Solicited-Node IPv6 Multicast Addresses (7.2.5.2)
Connectivity Verification (7.3)
ICMPv4 and ICMPv6 Messages (7.3.1.1)
ICMPv6 Router Solicitation and Router Advertisement Messages (7.3.1.2)
ICMPv6 Neighbor Solicitation and Neighbor Advertisement Messages (7.3.1.3)
Testing and Verification (7.3.2)
Ping: Testing the Local Stack (7.3.2.1)
Ping: Testing Connectivity to the Local LAN (7.3.2.2)
Ping: Testing Connectivity to Remote Device (7.3.2.3)
Traceroute: Testing the Path (7.3.2.4)
Chapter 8 Subnetting IP Networks
Subnetting an IPv4 Network (8.1)
Reasons for Subnetting (8.1.1.1)
Communication Between Subnets (8.1.1.2)
Subnetting an IPv4 Network (8.1.2)
Creating 100 Subnets with a /16 Prefix (8.1.2.10)
Calculating the Hosts (8.1.2.11)
Creating 1000 Subnets with a /8 Prefix (8.1.2.12)
Determining the Subnet Mask (8.1.3)
Subnetting Based on Host Requirements (8.1.3.1)
Subnetting Network-Based Requirements (8.1.3.2)
Subnetting to Meet Network Requirements (8.1.3.3, 8.1.3.4)
Benefits of Variable Length Subnet Masking (8.1.4)
Traditional Subnetting Wastes Addresses (8.1.4.1)
Planning to Address the Network (8.2.1.1)
Assigning Addresses to Devices (8.2.1.2)
Design Considerations for IPv6 (8.3)
Subnetting an IPv6 Network (8.3.1)
Subnetting Using the Subnet ID (8.3.1.1)
IPv6 Subnet Allocation (8.3.1.2)
Subnetting into the Interface ID (8.3.1.3)
Media Access Control (9.1.1.3)
Providing Access to Media (9.1.1.4)
Layer 2 Frame Structure (9.1.2)
Formatting Data for Transmission (9.1.2.1)
Data Link Layer Standards (9.1.3.1)
Controlling Access to the Media (9.2.1.1)
Physical and Logical Topologies (9.2.1.2)
Common Physical WAN Topologies (9.2.2.1)
Physical Point-to-Point Topology (9.2.2.2)
Logical Point-to-Point Topology (9.2.2.3)
Half and Full Duplex (9.2.2.4)
Physical LAN Topologies (9.2.3.1)
Logical Topology for Shared Media (9.2.3.2)
Contention-Based Access (9.2.3.3)
Multi-Access Topology (9.2.3.4)
Point-to-Point (PPP) Frame (9.2.4.7)
802.11 Wireless Frame (9.2.4.8)
Purpose of the Physical Layer (9.3.1)
Physical Layer Media (9.3.1.2)
Physical Layer Standards (9.3.1.3)
Characteristics of the Physical Layer (9.3.2)
Physical Layer Functions (9.3.2.1)
Frame Encoding Techniques (9.3.2.3)
Characteristics of Copper Media (9.4.1.1)
Properties of UTP Cabling (9.4.2.1)
UTP Cabling Standards (9.4.2.2)
Properties of Fiber Optic Cabling (9.4.3.1)
Fiber Media Cable Design (9.4.3.2)
Types of Fiber Media (9.4.3.3)
Network Fiber Connectors (9.4.3.4)
Testing Fiber Cables (9.4.3.5)
Properties of Wireless Media (9.4.4.1)
Types of Wireless Media (9.4.4.2)
802.11 Wi-Fi Standards (9.4.4.4)
LLC and MAC Sublayers (10.1.1.1)
Media Access Control (10.1.1.3)
MAC Address: Ethernet Identity (10.1.1.4)
Ethernet Frame Attributes (10.1.2)
Ethernet Encapsulation (10.1.2.1)
Ethernet Frame Size (10.1.2.2)
Introduction to the Ethernet Frame (10.1.2.3)
MAC Addresses and Hexadecimal (10.1.3.1)
MAC Address Representations (10.1.3.2)
Unicast MAC Address (10.1.3.3)
Broadcast MAC Address (10.1.3.4)
Multicast MAC Address (10.1.3.5)
End-to-End Connectivity, MAC, and IP (10.1.4.2)
Address Resolution Protocol (10.2)
Introduction to ARP (10.2.1.1)
ARP Role in Remote Communication (10.2.1.4)
Removing Entries from an ARP Table (10.2.1.5)
ARP Tables on Networking Devices (10.2.1.6)
How ARP Can Create Problems (10.2.2.1)
Mitigating ARP Problems (10.2.2.2)
Switch Port Fundamentals (10.3.1.1)
Switch MAC Address Table (10.3.1.2)
Frame Forwarding Methods on Cisco Switches (10.3.1.5)
Cut-Through Switching (10.3.1.6)
Memory Buffering on Switches (10.3.1.8)
Fixed Versus Modular Configuration (10.3.2.1)
Fixed Configuration Cisco Switches (10.3.2.2)
Modular Configuration Cisco Switches (10.3.2.3)
Module Options for Cisco Switch Slots (10.3.2.4)
Layer 2 Versus Layer 3 Switching (10.3.3.1)
Cisco Express Forwarding (10.3.3.2)
Types of Layer 3 Interfaces (10.3.3.3)
Configuring a Routed Port on a Layer 3 Switch (10.3.3.4)
Devices in a Small Network (11.1.1)
Small Network Topologies (11.1.1.1)
Device Selection for a Small Network (11.1.1.2)
IP Addressing for a Small Network (11.1.1.3)
Redundancy in a Small Network (11.1.1.4)
Design Considerations for a Small Network (11.1.1.5)
Protocols in a Small Network (11.1.2)
Common Applications in a Small Network (11.1.2.1)
Common Protocols in a Small Network (11.1.2.2)
Real-Time Applications for a Small Network (11.1.2.3)
Growing to Larger Networks (11.1.3)
Scaling a Small Network (11.1.3.1)
Protocol Analysis of a Small Network (11.1.3.2)
Evolving Protocol Requirements (11.1.3.3)
Keeping the Network Safe (11.2)
Network Device Security Measures (11.2.1)
Categories of Threats to Network Security (11.2.1.1)
Types of Security Vulnerabilities (11.2.1.3)
Vulnerabilities and Network Attacks (11.2.2)
Viruses, Worms, and Trojan Horses (11.2.2.1)
Mitigating Network Attacks (11.2.3)
Backup, Upgrade, Update, and Patch (11.2.3.1)
Authentication, Authorization, and Accounting (11.2.3.2)
Introduction to Securing Devices (11.2.4.1)
Basic Security Practices (11.2.4.3)
Basic Network Performance (11.3)
Interpreting Ping Results (11.3.1.1)
Interpreting Tracert Messages (11.3.2.1)
Common show Commands Revisited (11.3.3.1)
Viewing Router Settings with the show version Command (11.3.3.2)
Viewing Switch Settings with the show version Command (11.3.3.3)
Host and IOS Commands (11.3.4)
ipconfig Command Options (11.3.4.1)
arp Command Options (11.3.4.2)
show cdp neighbors Command Options (11.3.4.3)
Using the show ip interface brief Command (11.3.4.4)
Managing IOS Configuration Files (11.4)
Router and Switch File Systems (11.4.1)
Router File Systems (11.4.1.1)
Switch File Systems (11.4.1.2)
Back Up and Restore Configuration Files (11.4.2)
Backing Up and Restoring Using Text Files (11.4.2.1)
Backing Up and Restoring Using TFTP (11.4.2.2)
Using USB Ports on a Cisco Router (11.4.2.3)
Backing Up and Restoring Using a USB (11.4.2.4)
Appendix A Answers to the “Check Your Understanding” Questions
18.116.15.161