Contents

Introduction

Chapter 1 Exploring the Network

Objectives

Key Terms

Introduction (1.0.1.1)

Communicating in a Network-Centric World (1.1)

Interconnecting Our Lives (1.1.1)

Networks in Our Daily Lives (1.1.1.1)

Technology Then and Now (1.1.1.2)

The Global Community (1.1.1.3)

Networks Support the Way We Learn (1.1.1.4)

Networks Support the Way We Communicate (1.1.1.5)

Networks Support the Way We Work (1.1.1.6)

Networks Support the Way We Play (1.1.1.7)

Supporting Communication (1.1.2)

What Is Communication? (1.1.2.1)

Quality of Communication (1.1.2.2)

The Network as a Platform (1.2)

Converged Networks (1.2.1)

Traditional Service Networks (1.2.1.1)

Planning for the Future (1.2.1.2)

Reliable Network (1.2.2)

The Supporting Network Architecture (1.2.2.1)

Fault Tolerance in Circuit-Switched Networks (1.2.2.2)

Packet-Switched Networks (1.2.2.3)

Scalable Networks (1.2.2.4)

Providing QoS (1.2.2.5)

Providing Network Security (1.2.2.6)

LANs, WANs, and the Internet (1.3)

Components of a Network (1.3.1)

Components of the Network (1.3.1.1)

End Devices (1.3.1.2)

Intermediary Devices (1.3.1.3)

Network Media (1.3.1.4)

Network Representations (1.3.1.5)

Topology Diagrams (1.3.1.6)

LANs and WANs (1.3.2)

Types of Networks (1.3.2.1)

Local-Area Networks (1.3.2.2)

Wide-Area Networks (1.3.2.3)

The Internet (1.3.3)

The Internet (1.3.3.1)

Intranet and Extranet (1.3.3.2)

Connecting to the Internet (1.3.4)

Internet Access Technologies (1.3.4.1)

Connecting Remote Users to the Internet (1.3.4.2)

Connecting Businesses to the Internet (1.3.4.3)

The Expanding Network (1.4)

Network Trends (1.4.1)

New Trends (1.4.1.1)

Bring Your Own Device (BYOD) (1.4.1.2)

BYOD Considerations (1.4.1.3)

Online Collaboration (1.4.1.4)

Collaboration Considerations (1.4.1.5)

Video Communication (1.4.1.6)

Cloud Computing (1.4.1.7)

Types of Clouds (1.4.1.8)

Data Centers (1.4.1.9)

Network Security (1.4.2)

Security Threats (1.4.2.1)

Security Solutions (1.4.2.2)

Network Architectures (1.4.3)

Cisco Network Architectures (1.4.3.1)

Cisco Borderless Network (1.4.3.2)

Collaboration Architecture (1.4.3.3)

Data Center Architecture (1.4.3.4)

CCNA (1.4.3.5)

Summary (1.5)

Practice

Class Activities

Labs

Packet Tracer Activity

Check Your Understanding

Chapter 2 Configuring a Network Operating System

Objectives

Key Terms

Introduction (2.0.1.1)

IOS Bootcamp (2.1)

Cisco IOS (2.1.1)

Purpose of OS (2.1.1.1)

Location of the Cisco IOS (2.1.1.2)

IOS Functions (2.1.1.3)

Accessing a Cisco IOS Device (2.1.2)

Console Access Method (2.1.2.1)

Telnet, SSH, and AUX Access Methods (2.1.2.2)

Terminal Emulation Programs (2.1.2.3)

Navigating the IOS (2.1.3)

Cisco IOS Modes of Operation (2.1.3.1)

Primary Modes (2.1.3.2)

Global Configuration Mode and Submodes (2.1.3.3)

Navigating Between IOS Modes (2.1.3.4, 2.1.3.5)

The Command Structure (2.1.4)

IOS Command Structure (2.1.4.1)

Cisco IOS Command Reference (2.1.4.2)

Context-Sensitive Help (2.1.4.3)

Command Syntax Check (2.1.4.4)

Hot Keys and Shortcuts (2.1.4.5)

IOS Examination Commands (2.1.4.6)

The show version Command (2.1.4.7)

Getting Basic (2.2)

Hostnames (2.2.1)

Why the Switch (2.2.1.1)

Device Names (2.2.1.2)

Hostnames (2.2.1.3)

Configuring Hostnames (2.2.1.4)

Limiting Access to Device Configurations (2.2.2)

Securing Device Access (2.2.2.1)

Securing Privileged EXEC Access (2.2.2.2)

Securing User EXEC Access (2.2.2.3)

Encrypting Password Display (2.2.2.4)

Banner Messages (2.2.2.5)

Saving Configurations (2.2.3)

Configuration Files (2.2.3.1)

Capturing Text (2.2.3.2)

Address Schemes (2.3)

Ports and Addresses (2.3.1)

IP Addressing of Devices (2.3.1.1)

Interfaces and Ports (2.3.1.2)

Addressing Devices (2.3.2)

Configuring a Switch Virtual Interface (2.3.2.1)

Manual IP Address Configuration for End Devices (2.3.2.2)

Automatic IP Address Configuration for End Devices (2.3.2.3)

IP Address Conflicts (2.3.2.4)

Verifying Connectivity (2.3.3)

Test the Loopback Address on an End Device (2.3.3.1)

Testing the Interface Assignment (2.3.3.2)

Testing End-to-End Connectivity (2.3.3.3)

Summary (2.4)

Practice

Class Activities

Labs

Packet Tracer Activities

Check Your Understanding

Chapter 3 Network Protocols and Communications

Objectives

Key Terms

Introduction (3.0.1.1)

Network Protocols and Standards (3.1)

Protocols (3.1.1)

Protocols: Rules that Govern Communications (3.1.1.1)

Network Protocols (3.1.1.2)

Interaction of Protocols (3.1.1.3)

Protocol Suites (3.1.2)

Protocol Suites and Industry Standards (3.1.2.1)

Creation of the Internet and Development of TCP/IP (3.1.2.2)

TCP/IP Protocol Suite and Communication Process (3.1.2.3)

Standards Organizations (3.1.3)

Open Standards (3.1.3.1)

ISOC, IAB, and IETF (3.1.3.2)

IEEE (3.1.3.3)

ISO (3.1.3.4)

Other Standards Organizations (3.1.3.5)

Reference Models (3.1.4)

The Benefits of Using a Layered Model (3.1.4.1)

The OSI Reference Model (3.1.4.2)

The TCP/IP Protocol Model (3.1.4.3)

Comparing the OSI Model with the TCP/IP Model (3.1.4.4)

Using Requests for Comments (3.2)

Why RFCs (3.2.1)

Request for Comments (RFC) (3.2.1.1)

History of RFCs (3.2.1.2)

Sample RFC (3.2.1.3)

RFC Processes (3.2.2)

RFC Process (3.2.2.1)

RFC Types (3.2.2.2)

Moving Data in the Network (3.3)

Data Encapsulation (3.3.1)

Elements of Communication (3.3.1.1)

Communicating the Messages (3.3.1.2)

Protocol Data Units (PDUs) (3.3.1.3)

Encapsulation (3.3.1.4)

De-encapsulation (3.3.1.5)

Accessing Local Resources (3.3.2)

Network Addresses and Data Link Addresses (3.3.2.1)

Communicating with a Device on the Same Network (3.3.2.2)

MAC and IP Addresses (3.3.2.3)

Accessing Remote Resources (3.3.3)

Default Gateway (3.3.3.1)

Communicating with a Device on a Remote Network (3.3.3.2)

Summary (3.4)

Practice

Class Activities

Labs

Packet Tracer Activities

Check Your Understanding

Chapter 4 Application Layer

Objectives

Key Terms

Introduction (4.0.1.1)

Application Layer Protocols (4.1)

Application, Session, and Presentation (4.1.1)

OSI and TCP/IP Models Revisited (4.1.1.1)

Application Layer (4.1.1.2)

Presentation and Session Layers (4.1.1.3)

TCP/IP Application Layer Protocols (4.1.1.4)

Services at the Application Layer (4.1.1.5; 4.1.1.6)

Applications Interface with People and Other Applications (4.1.1.7)

How Application Protocols Interact with End-User Applications (4.1.2)

Peer-to-Peer Networks (4.1.2.1)

Peer-to-Peer Applications (4.1.2.2)

Common P2P Applications (4.1.2.3)

Client-Server Model (4.1.2.5)

Well-Known Application Layer Protocols and Services (4.2)

Everyday Application Layer Protocols (4.2.1)

Application Layer Protocols Revisited (4.2.1.1)

Hypertext Transfer Protocol and Hypertext Markup Language (4.2.1.2)

HTTP and HTTPS (4.2.1.3)

SMTP and POP (4.2.1.4–4.2.1.7)

Providing IP Addressing Services (4.2.2)

Domain Name Service (4.2.2.1)

DNS Message Format (4.2.2.2)

DNS Hierarchy (4.2.2.3)

nslookup (4.2.2.4)

Dynamic Host Configuration Protocol (4.2.2.6)

DHCP Operation (4.2.2.7)

Providing File Sharing Services (4.2.3)

File Transfer Protocol (4.2.3.1)

Server Message Block (4.2.3.4)

Summary (4.3)

Practice

Class Activities

Labs

Packet Tracer Activities

Check Your Understanding

Chapter 5 Transport Layer

Objectives

Key Terms

Introduction (5.0.1.1)

Transport Layer Protocols (5.1)

Transportation of Data (5.1.1)

Role of the Transport Layer (5.1.1.1, 5.1.1.2)

Conversation Multiplexing (5.1.1.3)

Transport Layer Reliability (5.1.1.4)

TCP (5.1.1.5)

UDP (5.1.1.6)

The Right Transport Layer Protocol for the Right Application (5.1.1.7)

Introducing TCP and UDP (5.1.2)

Introducing TCP (5.1.2.1)

Role of TCP (5.1.2.2)

Introducing UDP (5.1.2.3)

Role of UDP (5.1.2.4)

Separating Multiple Communications (5.1.2.5)

TCP and UDP Port Addressing (5.1.2.6–5.1.2.9)

TCP and UDP Segmentation (5.1.2.10)

TCP and UDP (5.2)

TCP Communication (5.2.1)

TCP Reliable Delivery (5.2.1.1)

TCP Server Processes (5.2.1.2)

TCP Connection Establishment (5.2.1.3)

TCP Three-way Handshake Analysis: Step 1 (5.2.1.4)

TCP Three-way Handshake Analysis: Step 2 (5.2.1.5)

TCP Three-way Handshake Analysis: Step 3 (5.2.1.6)

TCP Session Termination Analysis (5.2.1.7)

Protocol Data Units (5.2.2)

TCP Reliability—Ordered Delivery (5.2.2.1)

TCP Reliability—Acknowledgement and Window Size (5.2.2.2)

TCP Reliability—Data Loss and Retransmission (5.2.2.3)

TCP Flow Control—Window Size and Acknowledgements (5.2.2.4)

TCP Flow Control—Congestion Avoidance (5.2.2.5)

UDP Communication (5.2.3)

UDP Low Overhead Versus Reliability (5.2.3.1)

UDP Datagram Reassembly (5.2.3.2)

UDP Server Processes and Requests (5.2.3.3)

UDP Client Processes (5.2.3.4)

TCP or UDP—That Is the Question (5.2.4)

Applications That Use TCP (5.2.4.1)

Applications That Use UDP (5.2.4.2)

Summary (5.3)

Practice

Class Activities

Labs

Packet Tracer Activity

Check Your Understanding

Chapter 6 Network Layer

Objectives

Key Terms

Introduction (6.0.1.1)

Network Layer Protocols (6.1)

Network Layer in Communication (6.1.1)

The Network Layer (6.1.1.1)

Network Layer Protocols (6.1.1.2)

Characteristics of the IP Protocol (6.1.2)

Characteristics of IP (6.1.2.1)

IP – Connectionless (6.1.2.2)

IP – Best-Effort Delivery (6.1.2.3)

IP – Media Independent (6.1.2.4)

Encapsulating IP (6.1.2.5)

IPv4 Packet (6.1.3)

IPv4 Packet Header (6.1.3.1)

IPv4 Header Fields (6.1.3.2)

Sample IPv4 Headers (6.1.3.3)

IPv6 Packet (6.1.4)

Limitations of IPv4 (6.1.4.1)

Introducing IPv6 (6.1.4.2)

Encapsulating IPv6 (6.1.4.3)

IPv6 Packet Header (6.1.4.4)

Sample IPv6 Headers (6.1.4.5)

Routing (6.2)

Host Routing Tables (6.2.1)

Host Packet Forwarding Decision (6.2.1.1)

IPv4 Host Routing Table (6.2.1.2)

IPv4 Host Routing Entries (6.2.1.3)

Sample IPv4 Host Routing Table (6.2.1.4)

Sample IPv6 Host Routing Table (6.2.1.5)

Router Routing Tables (6.2.2)

Router Packet Forwarding Decision (6.2.2.1)

IPv4 Router Routing Table (6.2.2.2)

Directly Connected Routing Table Entries (6.2.2.3)

Remote Network Routing Table Entries (6.2.2.4)

Next-Hop Address (6.2.2.5)

Sample Router IPv4 Routing Table (6.2.2.6)

Routers (6.3)

Anatomy of a Router (6.3.1)

A Router Is a Computer (6.3.1.1)

Router CPU and OS (6.3.1.2)

Router Memory (6.3.1.3)

Inside a Router (6.3.1.4)

Router Backplane (6.3.1.5)

Connecting to a Router (6.3.1.6)

LAN and WAN Interfaces (6.3.1.7)

Router Bootup (6.3.2)

Cisco IOS (6.3.2.1)

Bootset Files (6.3.2.2)

Router Bootup Process (6.3.2.3)

Show Version Output (6.3.2.4)

Configuring a Cisco Router (6.4)

Configure Initial Settings (6.4.1)

Router Configuration Steps (6.4.1.1)

Configure Interfaces (6.4.2)

Configure LAN Interfaces (6.4.2.1)

Verify Interface Configuration (6.4.2.2)

Configuring the Default Gateway (6.4.3)

Default Gateway on a Host (6.4.3.1)

Default Gateway on a Switch (6.4.3.2)

Summary (6.5)

Practice

Class Activities

Labs

Packet Tracer Activities

Check Your Understanding

Chapter 7 IP Addressing

Objectives

Key Terms

Introduction (7.0.1.1)

IPv4 Network Addresses (7.1)

IPv4 Address Structure (7.1.1)

Binary Notation (7.1.1.1)

Binary Number System (7.1.1.2)

Converting a Binary Address to Decimal (7.1.1.3)

Converting from Decimal to Binary (7.1.1.5, 7.1.1.6)

IPv4 Subnet Mask (7.1.2)

Network Portion and Host Portion of an IPv4 Address (7.1.2.1)

Examining the Prefix Length (7.1.2.2)

IPv4 Network, Host, and Broadcast Addresses (7.1.2.3)

First Host and Last Host Addresses (7.1.2.4)

Bitwise AND Operation (7.1.2.5)

Importance of ANDing (7.1.2.6)

IPv4 Unicast, Broadcast, and Multicast (7.1.3)

Assigning a Static IPv4 Address to a Host (7.1.3.1)

Assigning a Dynamic IPv4 Address to a Host (7.1.3.2)

Unicast Transmission (7.1.3.3)

Broadcast Transmission (7.1.3.4)

Multicast Transmission (7.1.3.5)

Types of IPv4 Addresses (7.1.4)

Public and Private IPv4 Addresses (7.1.4.1)

Special-Use IPv4 Addresses (7.1.4.3)

Legacy Classful Addressing (7.1.4.4)

Assignment of IP Addresses (7.1.4.5, 7.1.4.6)

IPv6 Network Addresses (7.2)

IPv4 Issues (7.2.1)

The Need for IPv6 (7.2.1.1)

IPv4 and IPv6 Coexistence (7.2.1.2)

IPv6 Addressing (7.2.2)

Hexadecimal Number System (7.2.2.1)

IPv6 Address Representation (7.2.2.2)

Rule 1: Omitting Leading 0s (7.2.2.3)

Rule 2: Omitting All 0 Segments (7.2.2.4)

Types of IPv6 Addresses (7.2.3)

IPv6 Address Types (7.2.3.1)

IPv6 Prefix Length (7.2.3.2)

IPv6 Unicast Addresses (7.2.3.3)

IPv6 Link-Local Unicast Addresses (7.2.3.4)

IPv6 Unicast Addresses (7.2.4)

Structure of an IPv6 Global Unicast Address (7.2.4.1)

Static Configuration of a Global Unicast Address (7.2.4.2)

Dynamic Configuration of a Global Unicast Address Using SLAAC (7.2.4.3)

Dynamic Configuration of a Global Unicast Address Using DHCPv6 (7.2.4.4)

EUI-64 Process or Randomly Generated (7.2.4.5)

Dynamic Link-Local Addresses (7.2.4.6)

Static Link-Local Addresses (7.2.4.7)

Verifying IPv6 Address Configuration (7.2.4.8)

IPv6 Multicast Addresses (7.2.5)

Solicited-Node IPv6 Multicast Addresses (7.2.5.2)

Connectivity Verification (7.3)

ICMP (7.3.1)

ICMPv4 and ICMPv6 Messages (7.3.1.1)

ICMPv6 Router Solicitation and Router Advertisement Messages (7.3.1.2)

ICMPv6 Neighbor Solicitation and Neighbor Advertisement Messages (7.3.1.3)

Testing and Verification (7.3.2)

Ping: Testing the Local Stack (7.3.2.1)

Ping: Testing Connectivity to the Local LAN (7.3.2.2)

Ping: Testing Connectivity to Remote Device (7.3.2.3)

Traceroute: Testing the Path (7.3.2.4)

Summary (7.4)

Practice

Class Activities

Labs

Packet Tracer Activities

Check Your Understanding

Chapter 8 Subnetting IP Networks

Objectives

Key Terms

Introduction (8.0.1.1)

Subnetting an IPv4 Network (8.1)

Network Segmentation (8.1.1)

Reasons for Subnetting (8.1.1.1)

Communication Between Subnets (8.1.1.2)

Subnetting an IPv4 Network (8.1.2)

Basic Subnetting (8.1.2.1)

Subnets in Use (8.1.2.2)

Subnetting Formulas (8.1.2.3)

Creating 4 Subnets (8.1.2.4)

Creating 8 Subnets (8.1.2.5)

Creating 100 Subnets with a /16 Prefix (8.1.2.10)

Calculating the Hosts (8.1.2.11)

Creating 1000 Subnets with a /8 Prefix (8.1.2.12)

Determining the Subnet Mask (8.1.3)

Subnetting Based on Host Requirements (8.1.3.1)

Subnetting Network-Based Requirements (8.1.3.2)

Subnetting to Meet Network Requirements (8.1.3.3, 8.1.3.4)

Benefits of Variable Length Subnet Masking (8.1.4)

Traditional Subnetting Wastes Addresses (8.1.4.1)

VLSM (8.1.4.2)

Basic VLSM (8.1.4.3)

VLSM in Practice (8.1.4.4)

VLSM Chart (8.1.4.5)

Addressing Schemes (8.2)

Structured Design (8.2.1)

Planning to Address the Network (8.2.1.1)

Assigning Addresses to Devices (8.2.1.2)

Design Considerations for IPv6 (8.3)

Subnetting an IPv6 Network (8.3.1)

Subnetting Using the Subnet ID (8.3.1.1)

IPv6 Subnet Allocation (8.3.1.2)

Subnetting into the Interface ID (8.3.1.3)

Summary (8.4)

Practice

Class Activities

Labs

Packet Tracer Activities

Check Your Understanding

Chapter 9 Network Access

Objectives

Key Terms

Introduction (9.0.1.1)

Data Link Layer (9.1)

The Data Link Layer (9.1.1.1)

Data Link Sublayers (9.1.1.2)

Media Access Control (9.1.1.3)

Providing Access to Media (9.1.1.4)

Layer 2 Frame Structure (9.1.2)

Formatting Data for Transmission (9.1.2.1)

Creating a Frame (9.1.2.2)

Layer 2 Standards (9.1.3)

Data Link Layer Standards (9.1.3.1)

Media Access Control (9.2)

Topologies (9.2.1)

Controlling Access to the Media (9.2.1.1)

Physical and Logical Topologies (9.2.1.2)

WAN Topologies (9.2.2)

Common Physical WAN Topologies (9.2.2.1)

Physical Point-to-Point Topology (9.2.2.2)

Logical Point-to-Point Topology (9.2.2.3)

Half and Full Duplex (9.2.2.4)

LAN Topologies (9.2.3)

Physical LAN Topologies (9.2.3.1)

Logical Topology for Shared Media (9.2.3.2)

Contention-Based Access (9.2.3.3)

Multi-Access Topology (9.2.3.4)

Controlled Access (9.2.3.5)

Ring Topology (9.2.3.6)

Data Link Frame (9.2.4)

The Frame (9.2.4.1)

The Header (9.2.4.2)

Layer 2 Address (9.2.4.3)

The Trailer (9.2.4.4)

LAN and WAN Frames (9.2.4.5)

Ethernet Frame (9.2.4.6)

Point-to-Point (PPP) Frame (9.2.4.7)

802.11 Wireless Frame (9.2.4.8)

Physical Layer (9.3)

Purpose of the Physical Layer (9.3.1)

The Physical Layer (9.3.1.1)

Physical Layer Media (9.3.1.2)

Physical Layer Standards (9.3.1.3)

Characteristics of the Physical Layer (9.3.2)

Physical Layer Functions (9.3.2.1)

Physical Components (9.3.2.2)

Frame Encoding Techniques (9.3.2.3)

Signaling Method (9.3.2.4)

Bandwidth (9.3.2.5)

Throughput (9.3.2.6)

Network Media (9.4)

Copper Cabling (9.4.1)

Characteristics of Copper Media (9.4.1.1)

Copper Media (9.4.1.2)

UTP Cable (9.4.1.3)

STP Cable (9.4.1.4)

Coaxial Cable (9.4.1.5)

Copper Media Safety (9.4.1.6)

UTP Cabling (9.4.2)

Properties of UTP Cabling (9.4.2.1)

UTP Cabling Standards (9.4.2.2)

UTP Connectors (9.4.2.3)

Types of UTP Cable (9.4.2.4)

LAN Cabling Areas (9.4.2.5)

Testing UTP Cables (9.4.2.6)

Fiber Optic Cabling (9.4.3)

Properties of Fiber Optic Cabling (9.4.3.1)

Fiber Media Cable Design (9.4.3.2)

Types of Fiber Media (9.4.3.3)

Network Fiber Connectors (9.4.3.4)

Testing Fiber Cables (9.4.3.5)

Fiber Versus Copper (9.4.3.6)

Wireless Media (9.4.4)

Properties of Wireless Media (9.4.4.1)

Types of Wireless Media (9.4.4.2)

Wireless LAN (9.4.4.3)

802.11 Wi-Fi Standards (9.4.4.4)

Summary (9.5)

Practice

Class Activities

Labs

Packet Tracer Activity

Check Your Understanding

Chapter 10 Ethernet

Objectives

Key Terms

Introduction (10.0.1.1)

Ethernet Protocol (10.1)

Ethernet Operation (10.1.1)

LLC and MAC Sublayers (10.1.1.1)

MAC Sublayer (10.1.1.2)

Media Access Control (10.1.1.3)

MAC Address: Ethernet Identity (10.1.1.4)

Frame Processing (10.1.1.5)

Ethernet Frame Attributes (10.1.2)

Ethernet Encapsulation (10.1.2.1)

Ethernet Frame Size (10.1.2.2)

Introduction to the Ethernet Frame (10.1.2.3)

Ethernet MAC (10.1.3)

MAC Addresses and Hexadecimal (10.1.3.1)

MAC Address Representations (10.1.3.2)

Unicast MAC Address (10.1.3.3)

Broadcast MAC Address (10.1.3.4)

Multicast MAC Address (10.1.3.5)

Mac and IP (10.1.4)

MAC and IP (10.1.4.1)

End-to-End Connectivity, MAC, and IP (10.1.4.2)

Address Resolution Protocol (10.2)

Introduction to ARP (10.2.1.1)

ARP Functions (10.2.1.2)

ARP Operation (10.2.1.3)

ARP Role in Remote Communication (10.2.1.4)

Removing Entries from an ARP Table (10.2.1.5)

ARP Tables on Networking Devices (10.2.1.6)

ARP Issues (10.2.2)

How ARP Can Create Problems (10.2.2.1)

Mitigating ARP Problems (10.2.2.2)

LAN Switches (10.3)

Switching (10.3.1)

Switch Port Fundamentals (10.3.1.1)

Switch MAC Address Table (10.3.1.2)

Duplex Settings (10.3.1.3)

Auto-MDIX (10.3.1.4)

Frame Forwarding Methods on Cisco Switches (10.3.1.5)

Cut-Through Switching (10.3.1.6)

Memory Buffering on Switches (10.3.1.8)

Fixed or Modular (10.3.2)

Fixed Versus Modular Configuration (10.3.2.1)

Fixed Configuration Cisco Switches (10.3.2.2)

Modular Configuration Cisco Switches (10.3.2.3)

Module Options for Cisco Switch Slots (10.3.2.4)

Layer 3 Switching (10.3.3)

Layer 2 Versus Layer 3 Switching (10.3.3.1)

Cisco Express Forwarding (10.3.3.2)

Types of Layer 3 Interfaces (10.3.3.3)

Configuring a Routed Port on a Layer 3 Switch (10.3.3.4)

Summary (10.4)

Practice

Class Activities

Labs

Packet Tracer Activities

Check Your Understanding

Chapter 11 It’s a Network

Objectives

Key Terms

Introduction (11.0.1.1)

Create and Grow (11.1)

Devices in a Small Network (11.1.1)

Small Network Topologies (11.1.1.1)

Device Selection for a Small Network (11.1.1.2)

IP Addressing for a Small Network (11.1.1.3)

Redundancy in a Small Network (11.1.1.4)

Design Considerations for a Small Network (11.1.1.5)

Protocols in a Small Network (11.1.2)

Common Applications in a Small Network (11.1.2.1)

Common Protocols in a Small Network (11.1.2.2)

Real-Time Applications for a Small Network (11.1.2.3)

Growing to Larger Networks (11.1.3)

Scaling a Small Network (11.1.3.1)

Protocol Analysis of a Small Network (11.1.3.2)

Evolving Protocol Requirements (11.1.3.3)

Keeping the Network Safe (11.2)

Network Device Security Measures (11.2.1)

Categories of Threats to Network Security (11.2.1.1)

Physical Security (11.2.1.2)

Types of Security Vulnerabilities (11.2.1.3)

Vulnerabilities and Network Attacks (11.2.2)

Viruses, Worms, and Trojan Horses (11.2.2.1)

Network Attacks (11.2.2.2)

Mitigating Network Attacks (11.2.3)

Backup, Upgrade, Update, and Patch (11.2.3.1)

Authentication, Authorization, and Accounting (11.2.3.2)

Firewalls (11.2.3.3)

Endpoint Security (11.2.3.4)

Securing Devices (11.2.4)

Introduction to Securing Devices (11.2.4.1)

Passwords (11.2.4.2)

Basic Security Practices (11.2.4.3)

Enable SSH (11.2.4.4)

Basic Network Performance (11.3)

Ping (11.3.1)

Interpreting Ping Results (11.3.1.1)

Extended Ping (11.3.1.2)

Network Baseline (11.3.1.3)

Tracert (11.3.2)

Interpreting Tracert Messages (11.3.2.1)

show Commands (11.3.3)

Common show Commands Revisited (11.3.3.1)

Viewing Router Settings with the show version Command (11.3.3.2)

Viewing Switch Settings with the show version Command (11.3.3.3)

Host and IOS Commands (11.3.4)

ipconfig Command Options (11.3.4.1)

arp Command Options (11.3.4.2)

show cdp neighbors Command Options (11.3.4.3)

Using the show ip interface brief Command (11.3.4.4)

Managing IOS Configuration Files (11.4)

Router and Switch File Systems (11.4.1)

Router File Systems (11.4.1.1)

Switch File Systems (11.4.1.2)

Back Up and Restore Configuration Files (11.4.2)

Backing Up and Restoring Using Text Files (11.4.2.1)

Backing Up and Restoring Using TFTP (11.4.2.2)

Using USB Ports on a Cisco Router (11.4.2.3)

Backing Up and Restoring Using a USB (11.4.2.4)

Summary (11.5)

Practice

Class Activities

Labs

Packet Tracer Activities

Check Your Understanding

Appendix A Answers to the “Check Your Understanding” Questions

Glossary

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.128.170.27