- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
The Network Basics Course Booklet offers a way for students enrolled in a Cisco Networking Academy Network Basics course to easily read, highlight, and review on the go, wherever the Internet is not available. The text is extracted directly from the online course, with headings that have exact page correlations to the online course. An icon system directs the reader to the online course to take full advantage of the images, labs, Packet Tracer activities, and dynamic activities. The books are intended to be used with the course.
Contents
Chapter 0 Course Introduction 10.0 Welcome to Network Basics 10.0.1 Message to the Student 10.0.1.1 Welcome 10.0.1.2 A Global Community 10.0.1.3 More Than Just Information 10.0.1.4 How We Teach 20.0.1.5 Practice Leads to Mastery 20.0.1.6 Mind Wide Open 20.0.1.7 Engineering Journals 20.0.1.8 Explore the World of Networking 20.0.1.9 Create Your Own Worlds 20.0.1.10 How Packet Tracer Helps Master Concepts 30.0.1.11 Course Overview 30.1 Navigating the Course 30.1.1 Control Your Experience 30.1.1.1 Course GUI Tutorial 3Your Chapter Notes 4Chapter 1 Exploring the Network 51.0 Exploring the Network 51.0.1.1 Introduction 51.0.1.2 Class Activity - Draw Your Concept of the Internet 51.1 Communicating in a Network-Centric World 61.1.1 Interconnecting our Lives 61.1.1.1 Networks in Our Daily Lives 61.1.1.2 Technology Then and Now 61.1.1.3 The Global Community 71.1.1.4 Networks Support the Way We Learn 71.1.1.5 Networks Support the Way We Communicate 81.1.1.6 Networks Support the Way We Work 91.1.1.7 Networks Support the Way We Play 101.1.1.8 Lab - Researching Network Collaboration Tools 101.1.2 Supporting Communication 101.1.2.1 What is Communication? 101.1.2.2 Quality of Communication 111.1.2.3 Internal QoS Factors 121.2 The Network as a Platform 121.2.1 Converged Networks 121.2.1.1 Traditional Service Networks 121.2.1.2 Planning for the Future 131.2.1.3 Lab - Researching Converged Network Services 131.2.2 Reliable Network 131.2.2.1 The Supporting Network Architecture 131.2.2.2 Fault Tolerance in Circuit Switched Networks 141.2.2.3 Packet-Switched Networks 141.2.2.4 Scalable Networks 151.2.2.5 Providing QoS 161.2.2.6 Providing Network Security 171.2.2.7 Activity - Reliable Networks 181.3 LANs, WANs, and the Internet 181.3.1 Components of a Network 181.3.1.1 Components of the Network 181.3.1.2 End Devices 191.3.1.3 Intermediary Devices 191.3.1.4 Network Media 201.3.1.5 Network Representations 201.3.1.6 Topology Diagrams 211.3.1.7 Activity - Network Component Representations and Functions 211.3.2 LANs and WANs 211.3.2.1 Types of Networks 211.3.2.2 Local Area Networks 221.3.2.3 Wide Area Networks 221.3.3 The Internet 221.3.3.1 The Internet 221.3.3.2 Intranet and Extranet 231.3.3.3 Lab - Mapping the Internet 231.3.4 Connecting to the Internet 241.3.4.1 Internet Access Technologies 241.3.4.2 Connecting Remote Users to the Internet 241.3.4.3 Connecting Businesses to the Internet 251.3.4.4 Packet Tracer - Network Representation 261.4 The Expanding Network 261.4.1 Network Trends 261.4.1.1 New Trends 261.4.1.2 BYOD 271.4.1.3 BYOD Considerations 271.4.1.4 Online Collaboration 281.4.1.5 Collaboration Considerations 281.4.1.6 Video Communication 291.4.1.7 Cloud Computing 301.4.1.8 Types of Clouds 301.4.1.9 Data Centers 311.4.2 Network Security 311.4.2.1 Security Threats 311.4.2.2 Security Solutions 321.4.2.3 Activity - Network Security Terminology 331.4.3 Network Architectures 331.4.3.1 Cisco Network Architectures 331.4.3.2 Cisco Borderless Network 341.4.3.3 Collaboration Architecture 341.4.3.4 Data Center Architecture 351.4.3.5 CCNA 351.4.3.6 Lab - Researching IT and Networking Job Opportunities 361.5 Summary 361.5.1.1 Class Activity - Draw Your Concept of the Internet Now 361.5.1.2 Summary 36Chapter 1 Quiz 38Chapter 1 Exam 38Your Chapter Notes 38Chapter 2 Configuring a Network Operating System 392.0 Configuring a Network Operating System 392.0.1.1 Introduction 392.0.1.2 Class Activity - It Is Just an Operating System 392.1 IOS Bootcamp 402.1.1 Cisco IOS 402.1.1.1 Purpose of OS 402.1.1.2 Location of the Cisco IOS 402.1.1.3 IOS Functions 412.1.1.4 Video Demonstration - CCO Accounts and IOS ImageExploration 412.1.2 Accessing a Cisco IOS Device 412.1.2.1 Console Access Method 412.1.2.2 Telnet, SSH, and AUX Access Methods 422.1.2.3 Terminal Emulation Programs 432.1.2.4 Activity - Accessing Devices 432.1.3 Navigating the IOS 432.1.3.1 Cisco IOS Modes of Operation 432.1.3.2 Primary Modes 442.1.3.3 Global Configuration Mode and Submodes 442.1.3.4 Navigating between IOS Modes 452.1.3.5 Navigating between IOS Modes, Cont. 462.1.3.6 Video Demonstration - Navigating the IOS 472.1.4 The Command Structure 472.1.4.1 IOS Command Structure 472.1.4.2 Cisco IOS Command Reference 482.1.4.3 Context-Sensitive Help 492.1.4.4 Command Syntax Check 502.1.4.5 Hot Keys and Shortcuts 502.1.4.6 IOS Examination Commands 522.1.4.7 The show version Command 522.1.4.8 Packet Tracer - Navigating the IOS 532.1.4.9 Lab - Establishing a Console Session with Tera Term 532.2 Getting Basic 532.2.1 Hostnames 532.2.1.1 Why the Switch 532.2.1.2 Device Names 542.2.1.3 Hostnames 552.2.1.4 Configuring Hostnames 552.2.2 Limiting Access to Device Configurations 562.2.2.1 Securing Device Access 562.2.2.2 Securing Privileged EXEC Access 562.2.2.3 Securing User EXEC Access 572.2.2.4 Encrypting Password Display 582.2.2.5 Banner Messages 582.2.3 Saving Configurations 592.2.3.1 Configuration Files 592.2.3.2 Capturing Text 612.2.3.3 Packet Tracer - Configuring Initial Switch Settings 622.3 Address Schemes 622.3.1 Ports and Addresses 622.3.1.1 IP Addressing of Devices 622.3.1.2 Interfaces and Ports 622.3.2 Addressing Devices 632.3.2.1 Configuring a Switch Virtual Interface 632.3.2.2 Manual IP Address Configuration for End Devices 642.3.2.3 Automatic IP Address Configuration for End Devices 642.3.2.4 IP Address Conflicts 652.3.2.5 Packet Tracer - Implementing Basic Connectivity 652.3.3 Verifying Connectivity 652.3.3.1 Test the Loopback Address on an End Device 652.3.3.2 Testing the Interface Assignment 662.3.3.3 Testing End-to-End Connectivity 662.3.3.4 Lab - Building a Simple Network 672.3.3.5 Lab - Configuring a Switch Management Address 672.4 Summary 672.4.1.1 Class Activity - Tutor Me 672.4.1.2 Packet Tracer - Skills Integration Challenge 682.4.1.3 Summary 68Chapter 2 Quiz 69Chapter 2 Exam 69Your Chapter Notes 69Chapter 3 Network Protocols and Communications 713.0 Network Protocols and Communications 713.0.1.1 Introduction 713.0.1.2 Class Activity - Designing a Communications System 713.1 Network Protocols and Standards 723.1.1 Protocols 723.1.1.1 Protocols: Rules that Govern Communications 723.1.1.2 Network Protocols 723.1.1.3 Interaction of Protocols 733.1.2 Protocol Suites 733.1.2.1 Protocol Suites and Industry Standards 733.1.2.2 Creation of the Internet and Development of TCP/IP 743.1.2.3 TCP/IP Protocol Suite and Communication Process 753.1.2.4 Activity - Mapping the Protocols of the TCP/IP Suite 763.1.3 Standards Organizations 763.1.3.1 Open Standards 763.1.3.2 ISOC, IAB, and IETF 763.1.3.3 IEEE 773.1.3.4 ISO 773.1.3.5 Other Standards Organizations 783.1.3.6 Lab - Researching Networking Standards 783.1.3.7 Activity - Standards Body Scavenger Hunt 793.1.4 Reference Models 793.1.4.1 The Benefits of Using a Layered Model 793.1.4.2 The OSI Reference Model 803.1.4.3 The TCP/IP Protocol Model 803.1.4.4 Comparing the OSI Model with the TCP/IP Model 803.1.4.5 Activity - Identify Layers and Functions 813.1.4.6 Packet Tracer - Investigating the TCP/IP and OSI Models in Action 813.2 Using Requests for Comments 813.2.1 Why RFCs 813.2.1.1 Request for Comments (RFC) 813.2.1.2 History of RFCs 823.2.1.3 Sample RFC 823.2.2 RFC Processes 833.2.2.1 RFC Process 833.2.2.2 RFC Types 843.2.2.3 Lab - Researching RFCs 853.3 Moving Data in the Network 853.3.1 Data Encapsulation 853.3.1.1 Elements of Communication 853.3.1.2 Communicating the Messages 853.3.1.3 Protocol Data Units (PDUs) 863.3.1.4 Encapsulation 873.3.1.5 De-encapsulation 873.3.1.6 Activity - Identify the PDU Layer 873.3.2 Accessing Local Resources 873.3.2.1 Network Addresses and Data Link addresses 873.3.2.2 Communicating with a Device on the Same Network 883.3.2.3 MAC and IP Addresses 893.3.3 Accessing Remote Resources 893.3.3.1 Default Gateway 893.3.3.2 Communicating with a Device on a Remote Network 903.3.3.3 Packet Tracer - Explore a Network 913.3.3.4 Lab - Using Wireshark to View Network Traffic 913.4 Summary 913.4.1.1 Class Activity - Guaranteed to Work! 913.4.1.2 Summary 91Chapter 3 Quiz 93Chapter 3 Exam 93Your Chapter Notes 93Chapter 4 Application Layer 954.0 Application Layer 954.0.1.1 Introduction 954.0.1.2 Class Activity - Application Investigation 954.1 Application Layer Protocols 964.1.1 Application, Session and Presentation 964.1.1.1 OSI and TCP/IP Models Revisited 964.1.1.2 Application Layer 964.1.1.3 Presentation and Session Layers 974.1.1.4 TCP/IP Application Layer Protocols 974.1.1.5 Services at the Application Layer 984.1.1.6 Services at the Application Layer (Continued) 984.1.1.7 Applications Interface with People and Other Applications 994.1.1.8 Activity - Application Protocols and Standards 994.1.2 How Application Protocols Interact with End-User Applications 994.1.2.1 Peer-to-Peer Networks 994.1.2.2 Peer-to-Peer Applications 1004.1.2.3 Common P2P Applications 1004.1.2.4 Lab - Researching Peer-to-Peer File Sharing 1014.1.2.5 Client-Server Model 1014.2 Well-Known Application Layer Protocols and Services 1014.2.1 Everyday Application Layer Protocols 1014.2.1.1 Application Layer Protocols Revisited 1014.2.1.2 Hypertext Transfer Protocol and Hypertext Markup Language 1024.2.1.3 HTTP and HTTPS 1024.2.1.4 SMTP and POP 1034.2.1.5 SMTP and POP (cont.) 1034.2.1.6 SMTP and POP (cont.) 1044.2.1.7 SMTP and POP (cont.) 1044.2.1.8 Packet Tracer - Web and Email 1044.2.2 Providing IP Addressing Services 1054.2.2.1 Domain Name Service 1054.2.2.2 DNS Message Format 1054.2.2.3 DNS Hierarchy 1064.2.2.4 nslookup 1074.2.2.5 Syntax Checker - DNS CLI Commands in Windows and UNIX 1074.2.2.6 Dynamic Host Configuration Protocol 1074.2.2.7 DHCP Operation 1084.2.2.8 Packet Tracer - DNS and DHCP 1094.2.2.9 Lab - Observing DNS Resolution 1094.2.3 Providing File Sharing Services 1094.2.3.1 File Transfer Protocol 1094.2.3.2 Packet Tracer - FTP 1104.2.3.3 Lab - Exploring FTP 1104.2.3.4 Server Message Block 1104.3 Summary 1114.3.1.1 Class Activity - Make it happen! 1114.3.1.2 Packet Tracer Multiuser - Tutorial 1114.3.1.3 Packet Tracer Multiuser - Implement Services 1124.3.1.4 Summary 112Chapter 4 Quiz 113Chapter 4 Exam 113Your Chapter Notes 113Chapter 5 Transport Layer 1155.0 Transport Layer 1155.0.1.1 Introduction 1155.0.1.2 Class Activity - We Need to Talk - Game 1155.1 Transport Layer Protocols 1165.1.1 Transportation of Data 1165.1.1.1 Role of the Transport Layer 1165.1.1.2 Role of the Transport Layer (Cont.) 1165.1.1.3 Conversation Multiplexing 1175.1.1.4 Transport Layer Reliability 1175.1.1.5 TCP 1185.1.1.6 UDP 1185.1.1.7 The Right Transport Layer Protocol for the Right Application 1195.1.1.8 Activity - TCP, UDP or Both 1205.1.2 Introducing TCP and UDP 1205.1.2.1 Introducing TCP 1205.1.2.2 Role of TCP 1215.1.2.3 Introducing UDP 1215.1.2.4 Role of UDP 1225.1.2.5 Separating Multiple Communications 1225.1.2.6 TCP and UDP Port Addressing 1235.1.2.7 TCP and UDP Port Addressing (Cont.) 1235.1.2.8 TCP and UDP Port Addressing (Cont.) 1245.1.2.9 TCP and UDP Port Addressing (Cont.) 1255.1.2.10 TCP and UDP Segmentation 1255.1.2.11 Activity - Compare TCP and UDP Characteristics 1265.2 TCP and UDP 1265.2.1 TCP Communication 1265.2.1.1 TCP Reliable Delivery 1265.2.1.2 TCP Server Processes 1265.2.1.3 TCP Connection Establishment 1275.2.1.4 TCP Three-way Handshake Analysis - Step 1 1285.2.1.5 TCP Three-way Handshake Analysis - Step 2 1285.2.1.6 TCP Three-way Handshake Analysis - Step 3 1295.2.1.7 TCP Session Termination Analysis 1295.2.1.8 Lab - Using Wireshark to Observe the TCP 3-Way Handshake 1305.2.1.9 Activity - TCP Connection and Termination Process 1305.2.2 Protocol Data Units 1305.2.2.1 TCP Reliability - Ordered Delivery 1305.2.2.2 TCP Reliability - Acknowledgement and Window Size 1305.2.2.3 TCP Reliability - Data Loss and Retransmission 1315.2.2.4 TCP Flow Control - Window Size and Acknowledgements 1325.2.2.5 TCP Flow Control - Congestion Avoidance 1325.2.3 UDP Communication 1335.2.3.1 UDP Low Overhead versus Reliability 1335.2.3.2 UDP Datagram Reassembly 1345.2.3.3 UDP Server Processes and Requests 1345.2.3.4 UDP Client Processes 1345.2.3.5 Lab - Using Wireshark to Examine a UDP DNS Capture 1345.2.4 TCP or UDP, that is the Question 1355.2.4.1 Applications that use TCP 1355.2.4.2 Applications that use UDP 1355.2.4.3 Lab - Using Wireshark to Examine FTP and TFTP Captures 1365.3 Summary 1365.3.1.1 Class Activity - We Need to Talk, Again - Game 1365.3.1.2 Packet Tracer Simulation - TCP and UDP Communications 1375.3.1.3 Summary 137Chapter 5 Quiz 138Chapter 5 Exam 138Your Chapter Notes 138Chapter 6 Network Layer 1396.0 Network Layer 1396.0.1.1 Introduction 1396.0.1.2 Class Activity - The road less traveled...or is it? 1396.1 Network Layer Protocols 1406.1.1 Network Layer in Communication 1406.1.1.1 The Network Layer 1406.1.1.2 Network Layer Protocols 1416.1.2 Characteristics of the IP Protocol 1416.1.2.1 Characteristics of IP 1416.1.2.2 IP - Connectionless 1416.1.2.3 IP - Best Effort Delivery 1426.1.2.4 IP - Media Independent 1426.1.2.5 Encapsulating IP 1436.1.2.6 Activity - IP Characteristics 1436.1.3 IPv4 Packet 1436.1.3.1 IPv4 Packet Header 1436.1.3.2 IPv4 Header Fields 1446.1.3.3 Sample IPv4 Headers 1456.1.3.4 Activity - IPv4 Header Fields 1456.1.4 IPv6 Packet 1456.1.4.1 Limitations of IPv4 1456.1.4.2 Introducing IPv6 1466.1.4.3 Encapsulating IPv6 1466.1.4.4 IPv6 Packet Header 1476.1.4.5 Sample IPv6 Header 1486.1.4.6 Activity - IPv6 Header Fields 1486.2 Routing 1486.2.1 Host Routing Tables 1486.2.1.1 Host Packet Forwarding Decision 1486.2.1.2 IPv4 Host Routing Table 1496.2.1.3 IPv4 Host Routing Entries 1506.2.1.4 Sample IPv4 Host Routing Table 1516.2.1.5 Sample IPv6 Host Routing Table 1516.2.1.6 Activity - Identify Elements of a Host Routing Table Entry 1526.2.2 Router Routing Tables 1526.2.2.1 Router Packet Forwarding Decision 1526.2.2.2 IPv4 Router Routing Table 1526.2.2.3 Directly Connected Routing Table Entries 1536.2.2.4 Remote Network Routing Table Entries 1546.2.2.5 Next-Hop Address 1546.2.2.6 Sample Router IPv4 Routing Table 1556.2.2.7 Activity - Identify Elements of a Router Routing Table Entry 1566.2.2.8 Lab - View Host Routing Tables 1566.3 Routers 1566.3.1 Anatomy of a Router 1566.3.1.1 A Router is a Computer 1566.3.1.2 Router CPU and OS 1576.3.1.3 Router Memory 1576.3.1.4 Inside a Router 1586.3.1.5 Router Backplane 1596.3.1.6 Connecting to a Router 1596.3.1.7 LAN and WAN Interfaces 1606.3.1.8 Activity - Identify Router Components 1606.3.1.9 Lab - Exploring Router Physical Characteristics 1606.3.1.10 Packet Tracer - Exploring Internetworking Devices 1616.3.2 Router Boot-up 1616.3.2.1 Cisco IOS 1616.3.2.2 Bootset Files 1616.3.2.3 Router Bootup Process 1626.3.2.4 Show Version Output 1636.3.2.5 Video Demonstration - The Router Boot Process 1636.3.2.6 Activity - The Router Boot Process 1636.4 Configuring a Cisco Router 1636.4.1 Configure Initial Settings 1636.4.1.1 Router Configuration Steps 1636.4.1.2 Packet Tracer - Configure Initial Router Settings 1646.4.2 Configure Interfaces 1646.4.2.1 Configure LAN Interfaces 1646.4.2.2 Verify Interface Configuration 1656.4.3 Configuring the Default Gateway 1666.4.3.1 Default Gateway on a Host 1666.4.3.2 Default Gateway on a Switch 1666.4.3.3 Packet Tracer - Connect a Router to a LAN 1676.4.3.4 Packet Tracer - Troubleshooting Default Gateway Issues 1676.4.3.5 Lab - Initializing and Reloading a Router and Switch 1676.5 Summary 1686.5.1.1 Class Activity - Can you read this map? 1686.5.1.2 Packet Tracer - Skills Integration Challenge 1686.5.1.3 Summary 168Chapter 6 Quiz 170Chapter 6 Exam 170Your Chapter Notes 170Chapter 7 IP Addressing 1717.0 IP Addressing 1717.0.1.1 Introduction 1717.0.1.2 Class Activity -The Internet of Everything (IoE) 1717.1 IPv4 Network Addresses 1727.1.1 IPv4 Address Structure 1727.1.1.1 Binary Notation 1727.1.1.2 Binary Number System 1737.1.1.3 Converting a Binary Address to Decimal 1747.1.1.4 Activity - Binary to Decimal Conversions 1747.1.1.5 Converting from Decimal to Binary 1747.1.1.6 Converting from Decimal to Binary (Cont.) 1757.1.1.7 Activity - Decimal to Binary Conversion Activity 1757.1.1.8 Activity - Binary Game 1757.1.2 IPv4 Subnet Mask 1757.1.2.1 Network Portion and Host Portion of an IPv4 Address 1757.1.2.2 Examining the Prefix Length 1767.1.2.3 IPv4 Network, Host and Broadcast Addresses 1767.1.2.4 First Host and Last Host Addresses 1777.1.2.5 Bitwise AND Operation 1777.1.2.6 Importance of ANDing 1787.1.2.7 Lab - Using the Windows Calculator with Network Addresses 1797.1.2.8 Lab - Converting IPv4 Addresses to Binary 1797.1.2.9 Activity - ANDing to Determine the Network Address 1797.1.3 IPv4 Unicast, Broadcast, and Multicast 1797.1.3.1 Assigning a Static IPv4 Address to a Host 1797.1.3.2 Assigning a Dynamic IPv4 Address to a Host 1807.1.3.3 Unicast Transmission 1807.1.3.4 Broadcast Transmission 1817.1.3.5 Multicast Transmission 1827.1.3.6 Activity - Unicast, Broadcast, or Multicast 1837.1.3.7 Activity - Calculate the Network, Broadcast and Host Addresses 1837.1.3.8 Packet Tracer - Investigate Unicast, Broadcast, and Multicast Traffic 1837.1.4 Types of IPv4 Addresses 1837.1.4.1 Public and Private IPv4 Addresses 1837.1.4.2 Activity - Pass or Block IPv4 Addresses 1847.1.4.3 Special Use IPv4 Addresses 1847.1.4.4 Legacy Classful Addressing 1857.1.4.5 Assignment of IP Addresses 1867.1.4.6 Assignment of IP Addresses (Cont.) 1877.1.4.7 Activity - Public or Private IPv4 Addresses 1887.1.4.8 Lab - Identifying IPv4 Addresses 1887.2 IPv6 Network Addresses 1887.2.1 IPv4 issues 1887.2.1.1 The Need for IPv6 1887.2.1.2 IPv4 and IPv6 Coexistence 1897.2.1.3 Activity - IPv4 Issues and Solutions 1907.2.2 IPv6 Addressing 1907.2.2.1 Hexadecimal Number System 1907.2.2.2 IPv6 Address Representation 1907.2.2.3 Rule 1 - Omitting Leading 0s 1917.2.2.4 Rule 2 - Omitting All 0 Segments 1917.2.2.5 Activity - Practicing IPv6 Address Representations 1927.2.3 Types of IPv6 Addresses 1927.2.3.1 IPv6 Address Types 1927.2.3.2 IPv6 Prefix Length 1927.2.3.3 IPv6 Unicast Addresses 1927.2.3.4 IPv6 Link-Local Unicast Addresses 1947.2.3.5 Activity - Identify Types of IPv6 Addresses 1947.2.4 IPv6 Unicast Addresses 1947.2.4.1 Structure of an IPv6 Global Unicast Address 1947.2.4.2 Static Configuration of a Global Unicast Address 1957.2.4.3 Dynamic Configuration of a Global Unicast Address using SLAAC 1967.2.4.4 Dynamic Configuration of a Global Unicast Address using DHCPv6 1977.2.4.5 EUI-64 Process or Randomly Generated 1987.2.4.6 Dynamic Link-local Addresses 1997.2.4.7 Static Link-Local Addresses 2007.2.4.8 Verifying IPv6 Address Configuration 2007.2.5 IPv6 Multicast Addresses 2017.2.5.1 Assigned IPv6 Multicast Addresses 2017.2.5.2 Solicited-Node IPv6 Multicast Addresses 2027.2.5.3 Packet Tracer - Configuring IPv6 Addressing 2037.2.5.4 Lab - Identifying IPv6 Addresses 2037.2.5.5 Lab - Configuring IPv6 Addresses on Network Devices 2037.3 Connectivity Verification 2037.3.1 ICMP 2037.3.1.1 ICMPv4 and ICMPv6 Messages 2037.3.1.2 ICMPv6 Router Solicitation and Router Advertisement Messages 2057.3.1.3 ICMPv6 Neighbor Solicitation and Neighbor Advertisement Messages 2057.3.2 Testing and Verification 2067.3.2.1 Ping - Testing the Local Stack 2067.3.2.2 Ping - Testing Connectivity to the Local LAN 2067.3.2.3 Ping - Testing Connectivity to Remote Device 2077.3.2.4 Traceroute - Testing the Path 2077.3.2.5 Packet Tracer - Verifying IPv4 and IPv6 Addressing 2087.3.2.6 Packet Tracer - Pinging and Tracing to Test the Path 2087.3.2.7 Lab - Testing Network Connectivity with Ping and Traceroute 2087.3.2.8 Packet Tracer - Troubleshooting IPv4 and IPv6 Addressing 2087.4 Summary 2097.4.1.1 Class Activity - The Internet of Everything...Naturally! 2097.4.1.2 Packet Tracer - Skills Integration Challenge 2097.4.1.3 Summary 209Chapter 7 Quiz 211Chapter 7 Exam 211Your Chapter Notes 211Chapter 8 Subnetting IP Networks 2138.0 Subnetting IP Networks 2138.0.1.1 Introduction 2138.0.1.2 Class Activity - Call Me! 2138.1 Subnetting an IPv4 Network 2148.1.1 Network Segmentation 2148.1.1.1 Reasons for Subnetting 2148.1.1.2 Communication between Subnets 2148.1.2 Subnetting an IPv4 Network 2158.1.2.1 Basic Subnetting 2158.1.2.2 Subnets in Use 2168.1.2.3 Subnetting Formulas 2168.1.2.4 Creating 4 Subnets 2178.1.2.5 Creating 8 Subnets 2188.1.2.6 Activity - Determining the Network Address - Basic 2198.1.2.7 Activity - Calculate the Number of Hosts - Basic 2198.1.2.8 Activity - Determining the Valid Addresses for Hosts - Basics 2198.1.2.9 Activity - Calculate the Subnet Mask 2198.1.2.10 Creating 100 Subnets with a /16 prefix 2198.1.2.11 Calculating the Hosts 2208.1.2.12 Creating 1,000 Subnets with a /8 prefix 2208.1.2.13 Activity - Determining the Network Address - Advanced 2218.1.2.14 Activity - Calculating the Number of Hosts - Advanced 2218.1.2.15 Activity - Determining the Valid Addresses for Hosts - Advanced 2218.1.3 Determining the Subnet Mask 2218.1.3.1 Subnetting Based on Host Requirements 2218.1.3.2 Subnetting Network-Based Requirements 2228.1.3.3 Subnetting to Meet Network Requirements 2228.1.3.4 Subnetting To Meet Network Requirements, Cont. 2238.1.3.5 Activity - Determining the Number of Bits to Borrow 2238.1.3.6 Packet Tracer - Subnetting Scenario 1 2238.1.3.7 Packet Tracer - Subnetting Scenario 2 2238.1.3.8 Lab - Calculating IPv4 Subnets 2248.1.3.9 Lab - Subnetting Network Topologies 2248.1.3.10 Lab - Researching Subnet Calculators 2248.1.4 Benefits of Variable Length Subnet Masking 2248.1.4.1 Traditional Subnetting Wastes Addresses 2248.1.4.2 Variable Length Subnet Masks (VLSM) 2258.1.4.3 Basic VLSM 2258.1.4.4 VLSM in Practice 2268.1.4.5 VLSM Chart 2268.1.4.6 Activity - Practicing VLSM 2278.2 Addressing Schemes 2278.2.1 Structured Design 2278.2.1.1 Planning to Address the Network 2278.2.1.2 Assigning Addresses to Devices 2288.2.1.3 Lab - Designing and Implementing a Subnetted IPv4 Addressing Scheme 2298.2.1.4 Lab - Designing and Implementing a VLSM Addressing Scheme 2308.2.1.5 Packet Tracer - Designing and Implementing a VLSM Addressing Scheme 2308.3 Design Considerations for IPv6 2308.3.1 Subnetting an IPv6 Network 2308.3.1.1 Subnetting Using the Subnet ID 2308.3.1.2 IPv6 Subnet Allocation 2308.3.1.3 Subnetting into the Interface ID 2318.3.1.4 Packet Tracer - Implementing a Subnetted IPv6 Addressing Scheme 2318.4 Summary 2318.4.1.1 Class Activity - Can you call me now? 2318.4.1.2 Packet Tracer - Skills Integration Challenge 2328.4.1.3 Summary 232Chapter 8 Quiz 234Chapter 8 Exam 234Your Chapter Notes 234Chapter 9 Network Access 2359.0 Network Access 2359.0.1.1 Introduction 2359.0.1.2 Class Activity - Managing the Medium 2359.1 Data Link Layer 2369.1.1 Data Link Layer 2369.1.1.1 The Data Link Layer 2369.1.1.2 Data Link Subayers 2379.1.1.3 Media Access Control 2379.1.1.4 Providing Access to Media 2389.1.2 Layer 2 Frame Structure 2389.1.2.1 Formatting Data for Transmission 2389.1.2.2 Creating a Frame 2399.1.2.3 Activity - Generic Frame Fields 2409.1.3 Layer 2 Standards 2409.1.3.1 Data Link Layer Standards 2409.1.3.2 Activity - Data Link Layer Standards Organizations 2409.2 Media Access Control 2409.2.1 Topologies 2409.2.1.1 Controlling Access to the Media 2409.2.1.2 Physical and Logical Topologies 2419.2.2 WAN Topologies 2419.2.2.1 Common Physical WAN Topologies 2419.2.2.2 Physical Point-to-Point Topology 2429.2.2.3 Logical Point-to-Point Topology 2429.2.2.4 Half and Full Duplex 2429.2.3 LAN Topologies 2439.2.3.1 Physical LAN Topologies 2439.2.3.2 Logical Topology for Shared Media 2439.2.3.3 Contention-Based Access 2449.2.3.4 Multi-Access Topology 2449.2.3.5 Controlled Access 2459.2.3.6 Ring Topology 2459.2.3.7 Activity - Logical and Physical Topologies 2469.2.4 Data Link Frame 2469.2.4.1 The Frame 2469.2.4.2 The Header 2469.2.4.3 Layer 2 Address 2479.2.4.4 The Trailer 2489.2.4.5 LAN and WAN Frames 2489.2.4.6 Ethernet Frame 2499.2.4.7 PPP Frame 2499.2.4.8 802.11 Wireless Frame 2509.2.4.9 Activity - Frame Fields 2519.3 Physical Layer 2519.3.1 Purpose of the Physical Layer 2519.3.1.1 The Physical Layer 2519.3.1.2 Physical Layer Media 2529.3.1.3 Physical Layer Standards 2529.3.1.4 Lab - Identifying Network Devices and Cabling 2539.3.2 Characteristics of the Physical Layer 2539.3.2.1 Physical Layer Functions 2539.3.2.2 Physical Components 2539.3.2.3 Frame Encoding Techniques 2549.3.2.4 Signalling Method 2559.3.2.5 Bandwidth 2559.3.2.6 Throughput 2569.3.2.7 Activity - Physical Layer Terminology 2579.4 Network Media 2579.4.1 Copper Cabling 2579.4.1.1 Characteristics of Copper Media 2579.4.1.2 Copper Media 2589.4.1.3 Unshielded-Twisted Pair Cable 2589.4.1.4 Shielded Twisted-Pair (STP) Cable 2589.4.1.5 Coaxial Cable 2599.4.1.6 Copper Media Safety 2599.4.1.7 Activity - Copper Media Characteristics 2609.4.2 UTP Cabling 2609.4.2.1 Properties of UTP Cabling 2609.4.2.2 UTP Cabling Standards 2609.4.2.3 UTP Connectors 2619.4.2.4 Types of UTP Cable 2619.4.2.5 LAN Cabling Areas 2629.4.2.6 Testing UTP Cables 2639.4.2.7 Activity - Cable Pinouts 2639.4.2.8 Lab - Building an Ethernet Crossover Cable 2639.4.3 Fiber Optic Cabling 2639.4.3.1 Properties of Fiber Optic Cabling 2639.4.3.2 Fiber Media Cable Design 2649.4.3.3 Types of Fiber Media 2649.4.3.4 Network Fiber Connectors 2659.4.3.5 Testing Fiber Cables 2669.4.3.6 Fiber versus Copper 2669.4.3.7 Activity - Fiber Optics Terminology 2679.4.4 Wireless Media 2679.4.4.1 Properties of Wireless Media 2679.4.4.2 Types of Wireless Media 2679.4.4.3 Wireless LAN 2689.4.4.4 802.11 Wi-Fi Standards 2689.4.4.5 Packet Tracer - Connecting a Wired and Wireless LAN 2699.4.4.6 Lab - Viewing Wired and Wireless NIC Information 2699.5 Summary 2699.5.1.1 Class Activity - Linked In! 2699.5.1.2 Summary 270Chapter 9 Quiz 272Chapter 9 Exam 272Your Chapter Notes 272Chapter 10 Ethernet 27310.0 Ethernet 27310.0.1.1 Introduction 27310.0.1.2 Class Activity - Join My Social Circle! 27310.1 Ethernet Protocol 27410.1.1 Ethernet Operation 27410.1.1.1 LLC and MAC Sublayers 27410.1.1.2 MAC Sublayer 27510.1.1.3 Media Access Control 27610.1.1.4 MAC Address: Ethernet Identity 27610.1.1.5 Frame Processing 27710.1.1.6 Activity - MAC and LLC Sublayers 27810.1.2 Ethernet Frame Attributes 27810.1.2.1 Ethernet Encapsulation 27810.1.2.2 Ethernet Frame Size 27810.1.2.3 Introduction to the Ethernet Frame 27910.1.2.4 Activity - Ethernet Frame Fields 28010.1.3 Ethernet MAC 28010.1.3.1 MAC Addresses and Hexadecimal 28010.1.3.2 MAC Address Representations 28010.1.3.3 Unicast MAC Address 28110.1.3.4 Broadcast MAC Address 28110.1.3.5 Multicast MAC Address 28110.1.3.6 Lab - Viewing Network Device MAC Addresses 28210.1.4 MAC and IP 28210.1.4.1 MAC and IP 28210.1.4.2 End-to-End Connectivity, MAC, and IP 28210.1.4.3 Lab - Using Wireshark to Examine Ethernet Frames 28310.1.4.4 Packet Tracer - Identify MAC and IP Addresses 28310.2 Address Resolution Protocol 28310.2.1 ARP 28310.2.1.1 Introduction to ARP 28310.2.1.2 ARP Functions 28410.2.1.3 ARP Operation 28410.2.1.4 ARP Role in Remote Communication 28510.2.1.5 Removing Entries from an ARP Table 28510.2.1.6 ARP Tables on Networking Devices 28610.2.1.7 Packet Tracer - Examine the ARP Table 28610.2.1.8 Lab - Observing ARP with the Windows CLI, IOS CLI, and Wireshark 28610.2.2 ARP Issues 28610.2.2.1 How ARP Can Create Problems 28610.2.2.2 Mitigating ARP Problems 28710.3 LAN Switches 28710.3.1 Switching 28710.3.1.1 Switch Port Fundamentals 28710.3.1.2 Switch MAC Address Table 28710.3.1.3 Duplex Settings 28810.3.1.4 Auto-MDIX 28910.3.1.5 Frame Forwarding Methods on Cisco Switches 29010.3.1.6 Cut-Through Switching 29010.3.1.7 Activity - Frame Forwarding Methods 29110.3.1.8 Memory Buffering on Switches 29110.3.1.9 Activity - Switch It! 29210.3.1.10 Lab - Viewing the Switch MAC Address Table 29210.3.2 Fixed or Modular 29210.3.2.1 Fixed versus Modular Configuration 29210.3.2.2 Fixed Configuration Cisco Switches 29310.3.2.3 Modular Configuration Cisco Switches 29510.3.2.4 Module Options for Cisco Switch Slots 29610.3.3 Layer 3 Switching 29710.3.3.1 Layer 2 versus Layer 3 Switching 29710.3.3.2 Cisco Express Forwarding 29710.3.3.3 Types of Layer 3 Interfaces 29810.3.3.4 Configuring a Routed Port on a Layer 3 Switch 29910.3.3.5 Packet Tracer - Configure Layer 3 Switches 29910.4 Summary 29910.4.1.1 Class Activity - MAC and Choose... 29910.4.1.2 Summary 300Chapter 10 Quiz 301Chapter 10 Exam 301Your Chapter Notes 301Chapter 11 It's a Network 30311.0 It's a Network 30311.0.1.1 Introduction 30311.0.1.2 Class Activity - Did You Notice...? 30311.1 Create and Grow 30311.1.1 Devices in a Small Network 30311.1.1.1 Small Network Topologies 30311.1.1.2 Device Selection for a Small Network 30411.1.1.3 IP Addressing for a Small Network 30511.1.1.4 Redundancy in a Small Network 30611.1.1.5 Design Considerations for a Small Network 30611.1.1.6 Activity - Identifying Devices in a Small Network 30711.1.2 Protocols in a Small Network 30711.1.2.1 Common Applications in a Small Network 30711.1.2.2 Common Protocols in a Small Network 30711.1.2.3 Real-Time Applications for a Small Network 30811.1.3 Growing to Larger Networks 30911.1.3.1 Scaling a Small Network 30911.1.3.2 Protocol Analysis of a Small Network 30911.1.3.3 Evolving Protocol Requirements 31011.2 Keeping the Network Safe 31111.2.1 Network Device Security Measures 31111.2.1.1 Categories of Threats to Network Security 31111.2.1.2 Physical Security 31111.2.1.3 Types of Security Vulnerabilities 31211.2.1.4 Activity - Security Threats and Vulnerabilities 31211.2.2 Vulnerabilities and Network Attacks 31211.2.2.1 Viruses, Worms, and Trojan Horses 31211.2.2.2 Reconnaissance Attacks 31311.2.2.3 Access Attacks 31311.2.2.4 DoS Attacks 31411.2.2.5 Activity - Types of Attack 31411.2.2.6 Lab - Researching Network Security Threats 31411.2.3 Mitigating Network Attacks 31411.2.3.1 Backup, Upgrade, Update, and Patch 31411.2.3.2 Authentication, Authorization, and Accounting 31511.2.3.3 Firewalls 31611.2.3.4 Endpoint Security 31711.2.4 Securing Devices 31711.2.4.1 Introduction to Securing Devices 31711.2.4.2 Passwords 31711.2.4.3 Basic Security Practices 31811.2.4.4 Enable SSH 31911.2.4.5 Lab - Accessing Network Devices with SSH 32011.2.4.6 Lab - Securing Network Devices 32011.3 Basic Network Performance 32011.3.1 Ping 32011.3.1.1 Interpreting Ping Results 32011.3.1.2 Extended Ping 32111.3.1.3 Network Baseline 32211.3.2 Tracert 32311.3.2.1 Interpreting Tracert Messages 32311.3.2.2 Packet Tracer - Test Connectivity with Traceroute 32311.3.2.3 Lab - Testing Network Latency with Ping and Traceroute 32411.3.3 Show Commands 32411.3.3.1 Common show Commands Revisited 32411.3.3.2 Viewing Router Settings with the show version Command 32411.3.3.3 Viewing Switch Settings with the show version Command 32511.3.3.4 Packet Tracer - Using show Commands 32511.3.4 Host and IOS Commands 32611.3.4.1 ipconfig Command Options 32611.3.4.2 arp Command Options 32611.3.4.3 show cdp neighbors Command Options 32611.3.4.4 Using the show ip interface brief Command 32711.3.4.5 Activity - Show Commands 32811.3.4.6 Lab - Using the CLI to Gather Network Device Information.pdf 32811.4 Managing IOS Configuration Files 32811.4.1 Router and Switch File Systems 32811.4.1.1 Router File Systems 32811.4.1.2 Switch File Systems 32911.4.2 Back up and Restore Configuration files 33011.4.2.1 Backing up and Restoring using Text Files 33011.4.2.2 Backing up and Restoring using TFTP 33011.4.2.3 Using USB Ports on a Cisco Router 33111.4.2.4 Backing up and Restoring using a USB 33211.4.2.5 Packet Tracer - Backing up Configuration Files 33211.4.2.6 Lab - Managing Router Configuration Files with Tera Term 33211.4.2.7 Lab - Managing Device Configuration Files Using TFTP, Flash, and USB 33211.4.2.8 Lab - Researching Password Recovery Procedures 33311.5 Summary 33311.5.1.1 Capstone Project - Design and Build a Small Business Network 33311.5.1.2 Packet Tracer - Skills Integration Challenge 33311.5.1.3 Summary 333Chapter 11 Quiz 335Chapter 11 Exam 335Your Chapter Notes 335