- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
The Introduction to Networks Course Booklet offers a way for students enrolled in a Cisco Networking Academy introduction to Networks course to easily read, highlight, and review on the go, wherever the Internet is not available. The text is extracted directly from the online course, with headings that have exact page correlations to the online course. An icon system directs the reader to the online course to take full advantage of the images, labs, Packet Tracer activities, and dynamic activities. The books are intended to be used with the course.
Contents
Chapter 0 Course Introduction 10.0 Welcome to Introduction to Networks 10.0.1 Message to the Student 10.0.1.1 Welcome 10.0.1.2 A Global Community 10.0.1.3 More Than Just Information 10.0.1.4 How We Teach 20.0.1.5 Practice Leads to Mastery 20.0.1.6 Mind Wide Open 20.0.1.7 Engineering Journals 20.0.1.8 Explore the World of Networking 20.0.1.9 Create Your Own Worlds 20.0.1.10 How Packet Tracer Helps Master Concepts 30.0.1.11 Course Overview 30.1 Navigating the Course 30.1.1 Control Your Experience 30.1.1.1 Course GUI Tutorial 3Your Chapter Notes 4Chapter 1 Exploring the Network 51.0 Exploring the Network 51.0.1.1 Introduction 51.0.1.2 Class Activity - Draw Your Concept of the Internet 51.1 Globally Connected 61.1.1 Networking Today 61.1.1.1 Networks in Our Daily Lives 61.1.1.2 Technology Then and Now 61.1.1.3 The Global Community 71.1.1.4 Networks Support the Way We Learn 71.1.1.5 Networks Support the Way We Communicate 81.1.1.6 Networks Support the Way We Work 91.1.1.7 Networks Support the Way We Play 91.1.1.8 Lab - Researching Network Collaboration Tools 101.1.2 Providing Resources in a Network 101.1.2.1 Networks of Many Sizes 101.1.2.2 Clients and Servers 111.1.2.3 Clients and Servers (Cont.) 111.1.2.4 Peer-to-Peer 111.2 LANs, WANs, and the Internet 121.2.1 Components of a Network 121.2.1.1 Components of the Network 121.2.1.2 End Devices 121.2.1.3 Intermediary Network Devices 131.2.1.4 Network Media 131.2.1.5 Network Representations 141.2.1.6 Topology Diagrams 141.2.1.7 Activity - Network Component Representations and Functions 151.2.2 LANs and WANs 151.2.2.1 Types of Networks 151.2.2.2 Local Area Networks 151.2.2.3 Wide Area Networks 151.2.3 The Internet 161.2.3.1 The Internet 161.2.3.2 Intranet and Extranet 161.2.3.3 Lab - Researching Converged Network Services 171.2.4 Connecting to the Internet 171.2.4.1 Internet Access Technologies 171.2.4.2 Connecting Remote Users to the Internet 171.2.4.3 Connecting Businesses to the Internet 181.2.4.4 Packet Tracer - Network Representation 191.3 The Network as a Platform 191.3.1 Converged Networks 191.3.1.1 The Converging Network 191.3.1.2 Planning for the Future 201.3.1.3 Lab - Mapping the Internet 201.3.2 Reliable Network 211.3.2.1 The Supporting Network Architecture 211.3.2.2 Fault Tolerance in Circuit Switched Networks 211.3.2.3 Fault Tolerance in Packet-Switched Networks 221.3.2.4 Scalable Networks 231.3.2.5 Providing QoS 231.3.2.6 Providing Network Security 241.3.2.7 Activity - Reliable Networks 251.4 The Changing Network Environment 251.4.1 Network Trends 251.4.1.1 New Trends 251.4.1.2 BYOD 261.4.1.3 Online Collaboration 271.4.1.4 Video Communication 271.4.1.5 Cloud Computing 281.4.1.6 Data Centers 291.4.2 Networking Technologies for the Home 301.4.2.1 Technology Trends in the Home 301.4.2.2 Powerline Networking 301.4.2.3 Wireless Broadband 301.4.3 Network Security 311.4.3.1 Security threats 311.4.3.2 Security Solutions 321.4.3.3 Activity - Network Security Terminology 331.4.4 Network Architectures 331.4.4.1 Cisco Network Architectures 331.4.4.2 CCNA 331.4.4.3 Lab - Researching IT and Networking Job Opportunities 331.5 Summary 341.5.1.1 Class Activity - Draw Your Concept of the Internet Now 341.5.1.2 Summary 34Chapter 1 Quiz 36Chapter 1 Exam 36Your Chapter Notes 36Chapter 2 Configuring a Network Operating System 372.0 Configuring a Network Operating System 372.0.1 Introduction 372.0.1.1 Introduction to Cisco IOS 372.0.1.2 Class Activity - It Is Just an Operating System 382.1 IOS Bootcamp 382.1.1 Cisco IOS 382.1.1.1 Operating Systems 382.1.1.2 Purpose of OS 392.1.1.3 Location of the Cisco IOS 392.1.1.4 IOS Functions 402.1.1.5 Video Demonstration - CCO Accounts and IOS Image Exploration 402.1.2 Accessing a Cisco IOS Device 412.1.2.1 Console Access Method 412.1.2.2 Telnet, SSH, and AUX Access Methods 412.1.2.3 Terminal Emulation Programs 422.1.2.4 Activity - Accessing Devices 422.1.3 Navigating the IOS 422.1.3.1 Cisco IOS Modes of Operation 422.1.3.2 Primary Modes 432.1.3.3 Global Configuration Mode and Submodes 442.1.3.4 Navigating between IOS Modes 452.1.3.5 Navigating between IOS Modes (Cont.) 452.1.3.6 Video Demonstration - Navigating the IOS 462.1.4 The Command Structure 462.1.4.1 IOS Command Structure 462.1.4.2 Cisco IOS Command Reference 472.1.4.3 Context-Sensitive Help 482.1.4.4 Command Syntax Check 492.1.4.5 Hot Keys and Shortcuts 492.1.4.6 IOS Examination Commands 512.1.4.7 The show version Command 522.1.4.8 Packet Tracer - Navigating the IOS 522.1.4.9 Lab - Establishing a Console Session with Tera Term 522.2 Getting Basic 532.2.1 Hostnames 532.2.1.1 Why the Switch 532.2.1.2 Device Names 532.2.1.3 Hostnames 542.2.1.4 Configuring Hostnames 542.2.2 Limiting Access to Device Configurations 552.2.2.1 Securing Device Access 552.2.2.2 Securing Privileged EXEC Access 562.2.2.3 Securing User EXEC Access 562.2.2.4 Encrypting Password Display 572.2.2.5 Banner Messages 572.2.3 Saving Configurations 582.2.3.1 Configuration Files 582.2.3.2 Capturing Text 602.2.3.3 Packet Tracer - Configuring Initial Switch Settings 612.3 Address Schemes 612.3.1 Ports and Addresses 612.3.1.1 IP Addressing of Devices 612.3.1.2 Interfaces and Ports 622.3.2 Addressing Devices 622.3.2.1 Configuring a Switch Virtual Interface 622.3.2.2 Manual IP Address Configuration for End Devices 632.3.2.3 Automatic IP Address Configuration for End Devices 632.3.2.4 IP Address Conflicts 642.3.2.5 Packet Tracer - Implementing Basic Connectivity 642.3.3 Verifying Connectivity 652.3.3.1 Test the Loopback Address on an End Device 652.3.3.2 Testing the Interface Assignment 652.3.3.3 Testing End-to-End Connectivity 652.3.3.4 Lab - Building a Simple Network 662.3.3.5 Lab - Configuring a Switch Management Address 662.4 Summary 662.4.1.1 Class Activity - Tutor Me 662.4.1.2 Packet Tracer - Skills Integration Challenge 672.4.1.3 Summary 67Chapter 3 Network Protocols and Communications 693.0 Network Protocols and Communications 693.0.1.1 Introduction 693.0.1.2 Class Activity - Designing a Communications System 693.1 Rules of Communication 703.1.1 The Rules 703.1.1.1 What is Communication? 703.1.1.2 Establishing the Rules 703.1.1.3 Message Encoding 713.1.1.4 Message Formatting and Encapsulation 723.1.1.5 Message Size 723.1.1.6 Message Timing 733.1.1.7 Message Delivery Options 733.2 Network Protocols and Standards 743.2.1 Protocols 743.2.1.1 Protocols: Rules that Govern Communications 743.2.1.2 Network Protocols 743.2.1.3 Interaction of Protocols 753.2.2 Protocol Suites 763.2.2.1 Protocol Suites and Industry Standards 763.2.2.2 Creation of the Internet and Development of TCP/IP 763.2.2.3 TCP/IP Protocol Suite and Communication Process 773.2.2.4 Activity - Mapping the Protocols of the TCP/IP Suite 783.2.3 Standards Organizations 783.2.3.1 Open Standards 783.2.3.2 ISOC, IAB, and IETF 783.2.3.3 IEEE 793.2.3.4 ISO 793.2.3.5 Other Standards Organizations 803.2.3.6 Lab - Researching Networking Standards 813.2.3.7 Activity - Standards Body Scavenger Hunt 813.2.4 Reference Models 813.2.4.1 The Benefits of Using a Layered Model 813.2.4.2 The OSI Reference Model 823.2.4.3 The TCP/IP Protocol Model 823.2.4.4 Comparing the OSI Model with the TCP/IP Model 823.2.4.5 Activity - Identify Layers and Functions 833.2.4.6 Packet Tracer - Investigating the TCP/IP and OSI Models in Action 833.2.4.7 Lab - Researching RFCs 833.3 Moving Data in the Network 843.3.1 Data Encapsulation 843.3.1.1 Communicating the Messages 843.3.1.2 Protocol Data Units (PDUs) 843.3.1.3 Encapsulation 853.3.1.4 De-encapsulation 853.3.1.5 Activity - Identify the PDU Layer 863.3.2 Accessing Local Resources 863.3.2.1 Network Addresses and Data Link addresses 863.3.2.2 Communicating with a Device on the Same Network 863.3.2.3 MAC and IP Addresses 873.3.3 Accessing Remote Resources 883.3.3.1 Default Gateway 883.3.3.2 Communicating with a Device on a Remote Network 883.3.3.3 Packet Tracer - Explore a Network 893.3.3.4 Lab - Using Wireshark to View Network Traffic 893.4 Summary 893.4.1.1 Class Activity - Guaranteed to Work! 893.4.1.2 Summary 90Chapter 3 Quiz 91Chapter 3 Exam 91Your Chapter Notes 91Chapter 4 Network Access 934.0 Network Access 934.0.1.1 Introduction 934.0.1.2 Class Activity - Managing the Medium 934.1 Physical Layer Protocols 944.1.1 Getting It Connected 944.1.1.1 Connecting to the Network 944.1.1.2 Network Interface Cards 954.1.2 Purpose of the Physical Layer 954.1.2.1 The Physical Layer 954.1.2.2 Physical Layer Media 964.1.2.3 Physical Layer Standards 964.1.2.4 Lab - Identifying Network Devices and Cabling 964.1.3 Fundamental Principles of Layer 1 974.1.3.1 Physical Layer Fundamental Principles 974.1.3.2 Bandwidth 984.1.3.3 Throughput 984.1.3.4 Types of Physical Media 994.1.3.5 Activity - Physical Layer Terminology 1004.2 Network Media 1004.2.1 Copper Cabling 1004.2.1.1 Characteristics of Copper Media 1004.2.1.2 Copper Media 1014.2.1.3 Unshielded Twisted-Pair Cable 1014.2.1.4 Shielded Twisted-Pair (STP) Cable 1014.2.1.5 Coaxial Cable 1024.2.1.6 Copper Media Safety 1024.2.1.7 Activity - Copper Media Characteristics 1034.2.2 UTP Cabling 1034.2.2.1 Properties of UTP Cabling 1034.2.2.2 UTP Cabling Standards 1034.2.2.3 UTP Connectors 1044.2.2.4 Types of UTP Cable 1044.2.2.5 Testing UTP Cables 1054.2.2.6 Activity - Cable Pinouts 1054.2.2.7 Lab - Building an Ethernet Crossover Cable 1054.2.3.1 Properties of Fiber Optic Cabling 1054.2.3.2 Fiber Media Cable Design 1064.2.3.3 Types of Fiber Media 1064.2.3.4 Network Fiber Connectors 1074.2.3.5 Testing Fiber Cables 1084.2.3.6 Fiber versus Copper 1084.2.3.7 Activity - Fiber Optics Terminology 1094.2.4 Wireless Media 1094.2.4.1 Properties of Wireless Media 1094.2.4.2 Types of Wireless Media 1104.2.4.3 Wireless LAN 1104.2.4.4 802.11 Wi-Fi Standards 1114.2.4.5 Packet Tracer - Connecting a Wired and Wireless LAN 1114.2.4.6 Lab - Viewing Wired and Wireless NIC Information 1114.3 Data Link Layer Protocols 1124.3.1 Purpose of the Data Link Layer 1124.3.1.1 The Data Link Layer 1124.3.1.2 Data Link Sublayers 1124.3.1.3 Media Access Control 1134.3.1.4 Providing Access to Media 1134.3.2 Layer 2 Frame Structure 1144.3.2.1 Formatting Data for Transmission 1144.3.2.2 Creating a Frame 1144.3.2.3 Activity - Generic Frame Fields 1154.3.3 Layer 2 Standards 1154.3.3.1 Data Link Layer Standards 1154.3.3.2 Activity - Data Link Layer Standards Organizations 1164.4 Media Access Control 1164.4.1 Topologies 1164.4.1.1 Controlling Access to the Media 1164.4.1.2 Physical and Logical Topologies 1164.4.2 WAN Topologies 1174.4.2.1 Common Physical WAN Topologies 1174.4.2.2 Physical Point-to-Point Topology 1174.4.2.3 Logical Point-to-Point Topology 1174.4.2.4 Half and Full Duplex 1184.4.3 LAN Topologies 1184.4.3.1 Physical LAN Topologies 1184.4.3.2 Logical Topology for Shared Media 1194.4.3.3 Contention-Based Access 1194.4.3.4 Multi-Access Topology 1204.4.3.5 Controlled Access 1204.4.3.6 Ring Topology 1214.4.3.7 Activity - Logical and Physical Topologies 1214.4.4 Data Link Frame 1214.4.4.1 The Frame 1214.4.4.2 The Header 1224.4.4.3 Layer 2 Address 1234.4.4.4 The Trailer 1234.4.4.5 LAN and WAN Frames 1244.4.4.6 Ethernet Frame 1254.4.4.7 PPP Frame 1254.4.4.8 802.11 Wireless Frame 1254.4.4.9 Activity - Frame Fields 1274.5 Summary 1274.5.1.1 Class Activity - Linked In! 1274.5.1.2 Summary 128Chapter 4 Quiz 129Chapter 4 Exam 129Your Chapter Notes 129Chapter 5 Ethernet 1315.0 Ethernet 1315.0.1.1 Introduction 1315.0.1.2 Class Activity - Join My Social Circle! 1315.1 Ethernet Protocol 1325.1.1 Ethernet Operation 1325.1.1.1 LLC and MAC Sublayers 1325.1.1.2 MAC Sublayer 1335.1.1.3 Media Access Control 1345.1.1.4 MAC Address: Ethernet Identity 1345.1.1.5 Frame Processing 1355.1.1.6 Activity - MAC and LLC Sublayers 1365.1.2 Ethernet Frame Attributes 1365.1.2.1 Ethernet Encapsulation 1365.1.2.2 Ethernet Frame Size 1365.1.2.3 Introduction to the Ethernet Frame 1375.1.2.4 Activity - Ethernet Frame Fields 1385.1.3 Ethernet MAC 1385.1.3.1 MAC Addresses and Hexadecimal 1385.1.3.2 MAC Address Representations 1385.1.3.3 Unicast MAC Address 1395.1.3.4 Broadcast MAC Address 1395.1.3.5 Multicast MAC Address 1395.1.3.6 Lab - Viewing Network Device MAC Addresses 1405.1.4 MAC and IP 1405.1.4.1 MAC and IP 1405.1.4.2 End-to-End Connectivity, MAC, and IP 1405.1.4.3 Lab - Using Wireshark to Examine Ethernet Frames 1415.1.4.4 Packet Tracer - Identify MAC and IP Addresses 1415.2 Address Resolution Protocol 1415.2.1 ARP 1415.2.1.1 Introduction to ARP 1415.2.1.2 ARP Functions 1425.2.1.3 ARP Operation 1425.2.1.4 ARP Role in Remote Communication 1435.2.1.5 Removing Entries from an ARP Table 1435.2.1.6 ARP Tables on Networking Devices 1445.2.1.7 Packet Tracer - Examine the ARP Table 1445.2.1.8 Lab - Observing ARP with the Windows CLI, IOS CLI, and Wireshark 1445.2.2 ARP Issues 1445.2.2.1 How ARP Can Create Problems 1445.2.2.2 Mitigating ARP Problems 1455.3 LAN Switches 1455.3.1 Switching 1455.3.1.1 Switch Port Fundamentals 1455.3.1.2 Switch MAC Address Table 1455.3.1.3 Duplex Settings 1465.3.1.4 Auto-MDIX 1475.3.1.5 Frame Forwarding Methods on Cisco Switches 1485.3.1.6 Cut-Through Switching 1485.3.1.7 Activity - Frame Forwarding Methods 1495.3.1.8 Memory Buffering on Switches 1495.3.1.9 Activity - Switch It! 1505.3.1.10 Lab - Viewing the Switch MAC Address Table 1505.3.2 Fixed or Modular 1505.3.2.1 Fixed versus Modular Configuration 1505.3.2.2 Module Options for Cisco Switch Slots 1515.3.3 Layer 3 Switching 1525.3.3.1 Layer 2 versus Layer 3 Switching 1525.3.3.2 Cisco Express Forwarding 1525.3.3.3 Types of Layer 3 Interfaces 1535.3.3.4 Configuring a Routed Port on a Layer 3 Switch 1535.3.3.5 Packet Tracer - Configure Layer 3 Switches 1545.4 Summary 1545.4.1.1 Class Activity - MAC and Choose... 1545.4.1.2 Summary 154Chapter 5 Quiz 156Chapter 5 Exam 156Your Chapter Notes 156Chapter 6 Network Layer 1576.0 Network Layer 1576.0.1.1 Introduction 1576.0.1.2 Class Activity - The Road Less Traveled... 1576.1 Network Layer Protocols 1586.1.1 Network Layer in Communication 1586.1.1.1 The Network Layer 1586.1.1.2 Network Layer Protocols 1596.1.2 Characteristics of the IP protocol 1596.1.2.1 Characteristics of IP 1596.1.2.2 IP - Connectionless 1596.1.2.3 IP - Best Effort Delivery 1606.1.2.4 IP - Media Independent 1606.1.2.5 Encapsulating IP 1616.1.2.6 Activity - IP Characteristics 1616.1.3 IPv4 Packet 1616.1.3.1 IPv4 Packet Header 1616.1.3.2 IPv4 Header Fields 1626.1.3.3 Sample IPv4 Headers 1636.1.3.4 Activity - IPv4 Header Fields 1636.1.4 IPv6 Packet 1636.1.4.1 Limitations of IPv4 1636.1.4.2 Introducing IPv6 1646.1.4.3 Encapsulating IPv6 1646.1.4.4 IPv6 Packet Header 1656.1.4.5 Sample IPv6 Header 1666.1.4.6 Activity - IPv6 Header Fields 1666.2 Routing 1666.2.1 How a Host Routes 1666.2.1.1 Host Forwarding Decision 1666.2.1.2 Default Gateway 1676.2.1.3 IPv4 Host Routing Table 1686.2.1.4 IPv4 Host Routing Entries 1686.2.1.5 Sample IPv4 Host Routing Table 1696.2.1.6 Sample IPv6 Host Routing Table 1706.2.1.7 Activity - Identify Elements of a Host Routing Table Entry 1706.2.2 Router Routing Tables 1706.2.2.1 Router Packet Forwarding Decision 1706.2.2.2 IPv4 Router Routing Table 1716.2.2.3 Directly Connected Routing Table Entries 1716.2.2.4 Remote Network Routing Table Entries 1726.2.2.5 Next-Hop Address 1736.2.2.6 Sample Router IPv4 Routing Table 1736.2.2.7 Activity - Identify Elements of a Router Routing Table Entry 1756.2.2.8 Lab - View Host Routing Tables 1756.3 Routers 1756.3.1 Anatomy of a Router 1756.3.1.1 A Router is a Computer 1756.3.1.2 Router CPU and OS 1766.3.1.3 Router Memory 1766.3.1.4 Inside a Router 1776.3.1.5 Router Backplane 1776.3.1.6 Connecting to a Router 1786.3.1.7 LAN and WAN Interfaces 1786.3.1.8 Activity - Identify Router Components 1796.3.1.9 Lab - Exploring Router Physical Characteristics 1796.3.1.10 Packet Tracer - Exploring Internetworking Devices 1796.3.2 Router Boot-up 1796.3.2.1 Cisco IOS 1796.3.2.2 Bootset Files 1806.3.2.3 Router Bootup Process 1806.3.2.4 Show Version Output 1816.3.2.5 Video Demonstration - The Router Boot Process 1826.3.2.6 Activity - The Router Boot Process 1826.4 Configuring a Cisco Router 1826.4.1 Configure Initial Settings 1826.4.1.1 Router Configuration Steps 1826.4.1.2 Packet Tracer - Configure Initial Router Settings 1836.4.2 Configure Interfaces 1836.4.2.1 Configure LAN Interfaces 1836.4.2.2 Verify Interface Configuration 1846.4.3 Configuring the Default Gateway 1846.4.3.1 Default Gateway on a Host 1846.4.3.2 Default Gateway on a Switch 1856.4.3.3 Packet Tracer - Connect a Router to a LAN 1856.4.3.4 Packet Tracer - Troubleshooting Default Gateway Issues 1866.4.3.5 Lab - Initializing and Reloading a Router and Switch 1866.5 Summary 1866.5.1.1 Class Activity - Can You Read This Map? 1866.5.1.2 Packet Tracer - Skills Integration Challenge 1876.5.1.3 Summary 187Chapter 6 Quiz 188Chapter 6 Exam 188Your Chapter Notes 188Chapter 7 Transport Layer 1897.0 Transportation Layer 1897.0.1.1 Introduction 1897.0.1.2 Class Activity - We Need to Talk - Game 1907.1 Transport Layer Protocols 1907.1.1 Transportation of Data 1907.1.1.1 Role of the Transport Layer 1907.1.1.2 Role of the Transport Layer (Cont.) 1917.1.1.3 Conversation Multiplexing 1917.1.1.4 Transport Layer Reliability 1927.1.1.5 TCP 1927.1.1.6 UDP 1937.1.1.7 The Right Transport Layer Protocol for the Right Application 1937.1.1.8 Activity - TCP, UDP or Both 1947.1.2 Introducing TCP and UDP 1947.1.2.1 Introducing TCP 1947.1.2.2 Role of TCP 1957.1.2.3 Introducing UDP 1967.1.2.4 Role of UDP 1967.1.2.5 Separating Multiple Communications 1967.1.2.6 TCP and UDP Port Addressing 1977.1.2.7 TCP and UDP Port Addressing (Cont.) 1987.1.2.8 TCP and UDP Port Addressing (Cont.) 1987.1.2.9 TCP and UDP Port Addressing (Cont.) 1997.1.2.10 TCP and UDP Segmentation 1997.1.2.11 Activity - Compare TCP and UDP Characteristics 2007.2 TCP and UDP 2007.2.1 TCP Communication 2007.2.1.1 TCP Reliable Delivery 2007.2.1.2 TCP Server Processes 2007.2.1.3 TCP Connection Establishment and Termination 2017.2.1.4 TCP Three-way Handshake Analysis - Step 1 2027.2.1.5 TCP Three-way Handshake Analysis - Step 2 2027.2.1.6 TCP Three-way Handshake Analysis - Step 3 2037.2.1.7 TCP Session Termination Analysis 2037.2.1.8 Lab - Using Wireshark to Observe the TCP 3-Way Handshake 2047.2.1.9 Activity - TCP Connection and Termination Process 2047.2.2 Reliability and Flow Control 2047.2.2.1 TCP Reliability - Ordered Delivery 2047.2.2.2 TCP Reliability - Acknowledgement and Window Size 2057.2.2.3 TCP Reliability - Data Loss and Retransmission 2057.2.2.4 TCP Flow Control - Window Size and Acknowledgements 2067.2.2.5 TCP Flow Control - Congestion Avoidance 2077.2.3 UDP Communication 2077.2.3.1 UDP Low Overhead versus Reliability 2077.2.3.2 UDP Datagram Reassembly 2087.2.3.3 UDP Server Processes and Requests 2087.2.3.4 UDP Client Processes 2087.2.3.5 Lab - Using Wireshark to Examine a UDP DNS Capture 2097.2.4 TCP or UDP, that is the Question 2097.2.4.1 Applications that use TCP 2097.2.4.2 Applications that use UDP 2097.2.4.3 Lab - Using Wireshark to Examine FTP and TFTP Captures 2107.3 Summary 2107.3.1.1 Class Activity - We Need to Talk, Again - Game 2107.3.1.2 Packet Tracer Simulation - TCP and UDP Communications 2117.3.1.3 Summary 211Chapter 7 Quiz 213Chapter 7 Exam 213Your Chapter Notes 213Chapter 8 IP Addressing 2158.0 IP Addressing 2158.0.1.1 Introduction 2158.0.1.2 Class Activity -The Internet of Everything (IoE) 2158.1 IPv4 Network Addresses 2168.1.1 IPv4 Address Structure 2168.1.1.1 Binary Notation 2168.1.1.2 Binary Number System 2178.1.1.3 Converting a Binary Address to Decimal 2188.1.1.4 Activity - Binary to Decimal Conversions 2188.1.1.5 Converting from Decimal to Binary 2188.1.1.6 Converting from Decimal to Binary (Cont.) 2198.1.1.7 Activity - Decimal to Binary Conversion Activity 2198.1.1.8 Activity - Binary Game 2198.1.2 IPv4 Subnet Mask 2198.1.2.1 Network Portion and Host Portion of an IPv4 Address 2198.1.2.2 Examining the Prefix Length 2208.1.2.3 IPv4 Network, Host and Broadcast Addresses 2208.1.2.4 First Host and Last Host Addresses 2218.1.2.5 Bitwise AND Operation 2218.1.2.6 Importance of ANDing 2228.1.2.7 Lab - Using the Windows Calculator with Network Addresses 2238.1.2.8 Lab - Converting IPv4 Addresses to Binary 2238.1.2.9 Activity - ANDing to Determine the Network Address 2238.1.3 IPv4 Unicast, Broadcast, and Multicast 2238.1.3.1 Assigning a Static IPv4 Address to a Host 2238.1.3.2 Assigning a Dynamic IPv4 Address to a Host 2248.1.3.3 Unicast Transmission 2248.1.3.4 Broadcast Transmission 2258.1.3.5 Multicast Transmission 2268.1.3.6 Activity - Unicast, Broadcast, or Multicast 2278.1.3.7 Activity - Calculate the Network, Broadcast and Host Addresses 2278.1.3.8 Packet Tracer - Investigate Unicast, Broadcast, and Multicast Traffic 2278.1.4 Types of IPv4 Addresses 2278.1.4.1 Public and Private IPv4 Addresses 2278.1.4.2 Activity - Pass or Block IPv4 Addresses 2288.1.4.3 Special Use IPv4 Addresses 2288.1.4.4 Legacy Classful Addressing 2298.1.4.5 Assignment of IP Addresses 2308.1.4.6 Assignment of IP Addresses (Cont.) 2318.1.4.7 Activity - Public or Private IPv4 Addresses 2328.1.4.8 Lab - Identifying IPv4 Addresses 2328.2 IPv6 Network Addresses 2328.2.1 IPv4 issues 2328.2.1.1 The Need for IPv6 2328.2.1.2 IPv4 and IPv6 Coexistence 2338.2.1.3 Activity - IPv4 Issues and Solutions 2338.2.2 IPv6 Addressing 2338.2.2.1 Hexadecimal Number System 2338.2.2.2 IPv6 Address Representation 2348.2.2.3 Rule 1 - Omitting Leading 0s 2358.2.2.4 Rule 2 - Omitting All 0 Segments 2358.2.2.5 Activity - Practicing IPv6 Address Representations 2368.2.3 Types of IPv6 Addresses 2368.2.3.1 IPv6 Address Types 2368.2.3.2 IPv6 Prefix Length 2368.2.3.3 IPv6 Unicast Addresses 2368.2.3.4 IPv6 Link-Local Unicast Addresses 2388.2.3.5 Activity - Identify Types of IPv6 Addresses 2388.2.4 IPv6 Unicast Addresses 2388.2.4.1 Structure of an IPv6 Global Unicast Address 2388.2.4.2 Static Configuration of a Global Unicast Address 2398.2.4.3 Dynamic Configuration of a Global Unicast Address using SLAAC 2408.2.4.4 Dynamic Configuration of a Global Unicast Address using DHCPv6 2418.2.4.5 EUI-64 Process or Randomly Generated 2428.2.4.6 Dynamic Link-local Addresses 2438.2.4.7 Static Link-Local Addresses 2448.2.4.8 Verifying IPv6 Address Configuration 2448.2.5 IPv6 Multicast Addresses 2458.2.5.1 Assigned IPv6 Multicast Addresses 2458.2.5.2 Solicited-Node IPv6 Multicast Addresses 2468.2.5.3 Packet Tracer - Configuring IPv6 Addressing 2478.2.5.4 Lab - Identifying IPv6 Addresses 2478.2.5.5 Lab - Configuring IPv6 Addresses on Network Devices 2478.3 Connectivity Verification 2478.3.1 ICMP 2478.3.1.1 ICMPv4 and ICMPv6 Messages 2478.3.1.2 ICMPv6 Router Solicitation and Router Advertisement Messages 2498.3.1.3 ICMPv6 Neighbor Solicitation and Neighbor Advertisement Messages 2498.3.2 Testing and Verification 2508.3.2.1 Ping - Testing the Local Stack 2508.3.2.2 Ping - Testing Connectivity to the Local LAN 2508.3.2.3 Ping - Testing Connectivity to Remote 2518.3.2.4 Traceroute - Testing the Path 2518.3.2.5 Packet Tracer - Verifying IPv4 and IPv6 Addressing 2528.3.2.6 Packet Tracer - Pinging and Tracing to Test the Path 2528.3.2.7 Lab - Testing Network Connectivity with Ping and Traceroute 2528.3.2.8 Packet Tracer - Troubleshooting IPv4 and IPv6 Addressing 2528.4 Summary 2538.4.1.1 Class Activity - The Internet of Everything...Naturally! 2538.4.1.2 Packet Tracer - Skills Integration Challenge 2538.4.1.3 Summary 253Chapter 8 Quiz 255Chapter 8 Exam 255Your Chapter Notes 255Chapter 9 Subnetting IP Networks 2579.0 Subnetting IP Networks 2579.0.1.1 Introduction 2579.0.1.2 Class Activity - Call Me! 2579.1 Subnetting an IPv4 Network 2589.1.1 Network Segmentation 2589.1.1.1 Reasons for Subnetting 2589.1.1.2 Communication Between Subnets 2589.1.2 IP Subnetting is FUNdamental 2599.1.2.1 The Plan 2599.1.2.2 The Plan - Address Assignment 2599.1.3 Subnetting an IPv4 Network 2609.1.3.1 Basic Subnetting 2609.1.3.2 Subnets in Use 2619.1.3.3 Subnetting Formulas 2619.1.3.4 Creating 4 Subnets 2629.1.3.5 Creating 8 Subnets 2639.1.3.6 Activity - Determining the Network Address - Basic 2649.1.3.7 Activity - Calculate the Number of Hosts - Basic 2649.1.3.8 Activity - Determining the Valid Addresses for Hosts - Basics 2649.1.3.9 Activity - Calculate the Subnet Mask 2649.1.3.10 Creating 100 Subnets with a /16 prefix 2649.1.3.11 Calculating the Hosts 2659.1.3.12 Calculating the Hosts 2659.1.3.13 Activity - Determining the Network Address - Advanced 2669.1.3.14 Activity - Calculating the Number of Hosts - Advanced 2669.1.3.15 Activity - Determining the Valid Addresses for Hosts - Advanced 2669.1.4 Determining the Subnet Mask 2669.1.4.1 Subnetting Based on Host Requirements 2669.1.4.2 Subnetting Network-Based Requirements 2679.1.4.3 Subnetting to Meet Network Requirements 2679.1.4.4 Subnetting To Meet Network Requirements, Cont. 2679.1.4.5 Activity - Determining the Number of Bits to Borrow 2689.1.4.6 Packet Tracer - Subnetting Scenario 1 2689.1.4.7 Packet Tracer - Subnetting Scenario 2 2689.1.4.8 Lab - Calculating IPv4 Subnets 2689.1.4.9 Lab - Subnetting Network Topologies 2689.1.4.10 Lab - Researching Subnet Calculators 2699.1.5 Benefits of Variable Length Subnet Masking 2699.1.5.1 Traditional Subnetting Wastes Addresses 2699.1.5.2 Variable Length Subnet Masks (VLSM) 2699.1.5.3 Basic VLSM 2709.1.5.4 VLSM in Practice 2709.1.5.5 VLSM Chart 2719.1.5.6 Activity - Practicing VLSM 2729.2 Addressing Schemes 2729.2.1 Structured Design 2729.2.1.1 Planning to Address the Network 2729.2.1.2 Assigning Addresses to Devices 2729.2.1.3 Lab - Designing and Implementing a Subnetted IPv4 Addressing Scheme 2749.2.1.4 Lab - Designing and Implementing a VLSM Addressing Scheme 2749.2.1.5 Packet Tracer - Designing and Implementing a VLSM Addressing Scheme 2749.3 Design Considerations for IPv6 2759.3.1 Subnetting an IPv6 Network 2759.3.1.1 Subnetting Using the Subnet ID 2759.3.1.2 IPv6 Subnet Allocation 2759.3.1.3 Subnetting into the Interface ID 2759.3.1.4 Packet Tracer - Implementing a Subnetted IPv6 Addressing Scheme 2769.4 Summary 2769.4.1.1 Class Activity - Can you call me now? 2769.4.1.2 Packet Tracer - Skills Integration Challenge 2779.4.1.3 Summary 277Chapter 9 Quiz 278Chapter 9 Exam 278Your Chapter Notes 278Chapter 10 Application Layer 27910.0 Application Layer 27910.0.1.1 Introduction 27910.0.1.2 Class Activity - Application Investigation 27910.1 Application Layer Protocols 28010.1.1 Application, Session and Presentation 28010.1.1.1 OSI and TCP/IP Models Revisited 28010.1.1.2 Application Layer 28010.1.1.3 Presentation and Session Layers 28110.1.1.4 TCP/IP Application Layer Protocols 28110.1.1.5 Activity - Application Protocols and Standards 28210.1.2 How Application Protocols Interact with End-User Applications 28210.1.2.1 Peer-to-Peer Networks 28210.1.2.2 Peer-to-Peer Applications 28310.1.2.3 Common P2P Applications 28310.1.2.4 Lab - Researching Peer-to-Peer File Sharing 28410.1.2.5 Client-Server Model 28410.2 Well-Known Application Layer Protocols and Services 28410.2.1 Common Application Layer Protocols 28410.2.1.1 Application Layer Protocols Revisited 28410.2.1.2 Hypertext Transfer Protocol and Hypertext Markup Language 28510.2.1.3 HTTP and HTTPS 28510.2.1.4 SMTP, POP, and IMAP 28610.2.1.5 SMTP, POP, and IMAP (cont.) 28710.2.1.6 SMTP, POP, and IMAP (cont.) 28710.2.1.7 SMTP, POP, and IMAP (cont.) 28710.2.1.8 Packet Tracer - Web and Email 28810.2.2 Providing IP Addressing Services 28810.2.2.1 Domain Name Service 28810.2.2.2 DNS Message Format 28810.2.2.3 DNS Hierarchy 28910.2.2.4 nslookup 29010.2.2.5 Syntax Checker - DNS CLI Commands in Windows and UNIX 29010.2.2.6 Dynamic Host Configuration Protocol 29010.2.2.7 DHCP Operation 29110.2.2.8 Packet Tracer - DNS and DHCP 29210.2.2.9 Lab - Observing DNS Resolution 29210.2.3 Providing File Sharing Services 29210.2.3.1 File Transfer Protocol 29210.2.3.2 Packet Tracer - FTP 29310.2.3.3 Lab - Exploring FTP 29310.2.3.4 Server Message Block 29310.3 The Message Heard Around the World 29410.3.1 Move It! 29410.3.1.1 The Internet of Things 29410.3.1.2 Message Travels Through a Network 29410.3.1.3 Getting the Data to the End Device 29510.3.1.4 Getting the Data through the Internetwork 29510.3.1.5 Getting the Data to the Right Application 29610.3.1.6 Warriors of the Net 29710.4 Summary 29710.4.1.1 Class Activity - Make it happen! 29710.4.1.2 Packet Tracer Multiuser - Tutorial 29810.4.1.3 Packet Tracer Multiuser - Implement Services 29810.4.1.4 Summary 298Chapter 10 Quiz 300Chapter 10 Exam 300Your Chapter Notes 300Chapter 11 It's a Network 30111.0 It's a Network 30111.0.1.1 Introduction 30111.0.1.2 Class Activity - Did You Notice...? 30111.1 Create and Grow 30111.1.1 Devices in a Small Network 30111.1.1.1 Small Network Topologies 30111.1.1.2 Device Selection for a Small Network 30211.1.1.3 IP Addressing for a Small Network 30311.1.1.4 Redundancy in a Small Network 30411.1.1.5 Design Considerations for a Small Network 30411.1.1.6 Identifying Devices in a Small Network 30511.1.2 Protocols in a Small Network 30511.1.2.1 Common Applications in a Small Network 30511.1.2.2 Common Protocols in a Small Network 30511.1.2.3 Real-Time Applications for a Small Network 30611.1.3 Growing to Larger Networks 30711.1.3.1 Scaling a Small Network 30711.1.3.2 Protocol Analysis of a Small Network 30711.1.3.3 Evolving Protocol Requirements 30811.2 Keeping the Network Safe 30911.2.1 Network Device Security Measures 30911.2.1.1 Categories of Threats to Network Security 30911.2.1.2 Physical Security 30911.2.1.3 Types of Security Vulnerabilities 31011.2.1.4 Activity - Security Threats and Vulnerabilities 31011.2.2 Vulnerabilities and Network Attacks 31011.2.2.1 Viruses, Worms, and Trojan Horses 31011.2.2.2 Reconnaissance Attacks 31111.2.2.3 Access Attacks 31111.2.2.4 DoS Attacks 31211.2.2.5 Activity - Types of Attack 31211.2.2.6 Lab - Researching Network Security Threats 31211.2.3 Mitigating Network Attacks 31211.2.3.1 Backup, Upgrade, Update, and Patch 31211.2.3.2 Authentication, Authorization, and Accounting 31311.2.3.3 Firewalls 31411.2.3.4 Endpoint Security 31511.2.4 Securing Devices 31511.2.4.1 Introduction to Securing Devices 31511.2.4.2 Passwords 31511.2.4.3 Basic Security Practices 31611.2.4.4 Enable SSH 31711.2.4.5 Lab - Accessing Network Devices with SSH 31811.2.4.6 Lab - Securing Network Devices 31811.3 Basic Network Performance 31811.3.1 Ping 31811.3.1.1 Interpreting Ping Results 31811.3.1.2 Extended Ping 31911.3.1.3 Network Baseline 32011.3.2 Tracert 32111.3.2.1 Interpreting Tracert Messages 32111.3.2.2 Packet Tracer - Test Connectivity with Traceroute 32111.3.2.3 Lab - Testing Network Latency with Ping and Traceroute 32111.3.3 Show Commands 32211.3.3.1 Common show Commands Revisited 32211.3.3.2 Viewing Router Settings with the show version Command 32211.3.3.3 Viewing Switch Settings with the show version Command 32311.3.3.4 Packet Tracer - Using show Commands 32311.3.4 Host and IOS Commands 32311.3.4.1 ipconfig Command Options 32311.3.4.2 arp Command Options 32411.3.4.3 show cdp neighbors Command Options 32411.3.4.4 Using the show ip interface brief Command 32511.3.4.5 Activity - Show Commands 32611.3.4.6 Lab - Using the CLI to Gather Network Device Information.pdf 32611.4 Managing IOS Configuration Files 32611.4.1 Router and Switch File Systems 32611.4.1.1 Router File Systems 32611.4.1.2 Switch File Systems 32711.4.2 Back up and Restore Configuration files 32711.4.2.1 Backing up and Restoring using Text Files 32711.4.2.2 Backing up and Restoring using TFTP 32811.4.2.3 Using USB Ports on a Cisco Router 32911.4.2.4 Backing up and Restoring using a USB 32911.4.2.5 Packet Tracer - Backing up Configuration Files 33011.4.2.6 Lab - Managing Router Configuration Files with Tera Term 33011.4.2.7 Lab - Managing Device Configuration Files Using TFTP, Flash, and USB 33011.4.2.8 Lab - Researching Password Recovery Procedures 33011.5 Integrated Routing Services 33111.5.1 Integrated Router 33111.5.1.1 Multi-Function Device 33111.5.1.2 Types of Integrated Routers 33111.5.1.3 Wireless Capability 33211.5.1.4 Basic Security of Wireless 33211.5.2 Configuring the Integrated Router 33311.5.2.1 Configuring the Integrated Router 33311.5.2.2 Enabling Wireless 33411.5.2.3 Configurea Wireless Client 33411.5.2.4 Packet Tracer - Configuring a Linksys Router 33511.6 Summary 33511.6.1.1 Capstone Project - Design and Build a Small Business Network 33511.6.1.2 Packet Tracer - Skills Integration Challenge 33611.6.1.3 Summary 336Chapter 11 Quiz 338Chapter 11 Exam 338Your Chapter Notes 338