Home > Store

Introduction to Networks Companion Guide (CCNAv7)

eBook (Watermarked)

  • Your Price: $61.20
  • List Price: $72.00
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe Reader PDF The popular standard, used most often with the free Adobe® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Also available in other formats.

Register your product to gain access to bonus material or receive a coupon.

Description

  • Copyright 2020
  • Pages: 736
  • Edition: 1st
  • eBook (Watermarked)
  • ISBN-10: 0-13-663354-4
  • ISBN-13: 978-0-13-663354-9

Introduction to Networks Companion Guide is the official supplemental textbook for the Introduction to Networks course in the Cisco Networking Academy CCNA curriculum.


The course introduces the architecture, protocols, functions, components, and models of the internet and computer networks. The principles of IP addressing and fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. By the end of the course, you will be able to build simple LANs, perform basic configurations for routers and switches, understand the fundamentals of network security, and implement IP addressing schemes.

The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.

The book's features help you focus on important concepts to succeed in this course:* Chapter objectives:  Review core concepts by answering the focus questions listed at the beginning of each chapter.
* Key terms:  Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.
* Glossary:  Consult the comprehensive Glossary with more than 300 terms.
* Summary of Activities and Labs:  Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.
* Check Your Understanding:  Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.


* How To:  Look for this icon to study the steps you need to learn to perform certain tasks.
* Interactive Activities:  Reinforce your understanding of topics with dozens of exercises from the online course identified throughout the book with this icon.
* Videos:  Watch the videos embedded within the online course.
* Packet Tracer Activities:  Explore and visualize networking concepts using Packet Tracer. There are multiple exercises interspersed throughout the chapters and provided in the accompanying Labs & Study Guide book.
* Hands-on Labs:  Work through all the labs and other activities that are included in the course and published in the separate Labs & Study Guide.

Sample Content

Sample Pages

Download the sample pages (includes Chapter 7)

Table of Contents

Introduction xxx
Chapter 1 Networking Today 1
Objectives 1
Key Terms 1
Introduction (1.0) 3
Networks Affect Our Lives (1.1) 3
    Networks Connect Us (1.1.1) 3
    No Boundaries (1.1.3) 3
Network Components (1.2) 4
    Host Roles (1.2.1) 4
    Peer-to-Peer (1.2.2) 5
    End Devices (1.2.3) 6
    Intermediary Devices (1.2.4) 6
    Network Media (1.2.5) 7
Network Representations and Topologies (1.3) 8
    Network Representations (1.3.1) 8
    Topology Diagrams (1.3.2) 10
        Physical Topology Diagrams 10
        Logical Topology Diagrams 10
Common Types of Networks (1.4) 11
    Networks of Many Sizes (1.4.1) 11
    LANs and WANs (1.4.2) 12
        LANs 13
        WANs 14
    The Internet (1.4.3) 15
    Intranets and Extranets (1.4.4) 16
Internet Connections (1.5) 17
    Internet Access Technologies (1.5.1) 17
    Home and Small Office Internet Connections (1.5.2) 18
    Businesses Internet Connections (1.5.3) 19
    The Converging Network (1.5.4) 20
Reliable Networks (1.6) 23
    Network Architecture (1.6.1) 23
    Fault Tolerance (1.6.2) 24
    Scalability (1.6.3) 24
    Quality of Service (1.6.4) 25
    Network Security (1.6.5) 26
Network Trends (1.7) 27
    Recent Trends (1.7.1) 28
    Bring Your Own Device (BYOD) (1.7.2) 28
    Online Collaboration (1.7.3) 28
    Video Communications (1.7.4) 29
    Cloud Computing (1.7.6) 29
    Technology Trends in the Home (1.7.7) 31
    Powerline Networking (1.7.8) 31
    Wireless Broadband (1.7.9) 32
        Wireless Internet Service Providers 32
        Wireless Broadband Service 32
Network Security (1.8) 33
    Security Threats (1.8.1) 33
    Security Solutions (1.8.2) 34
The IT Professional (1.9) 35
    CCNA (1.9.1) 35
    Networking Jobs (1.9.2) 36
Summary (1.10) 37
    Networks Affect Our Lives 37
    Network Components 37
    Network Representations and Topologies 37
    Common Types of Networks 37
    Internet Connections 38
    Reliable Networks 38
    Network Trends 38
    Network Security 39
    The IT Professional 40
Practice 40
Check Your Understanding Questions 40
Chapter 2 Basic Switch and End Device Configuration 45
Objectives 45
Key Terms 45
Introduction (2.0) 46
Cisco IOS Access (2.1) 46
    Operating Systems (2.1.1) 46
    GUI (2.1.2) 47
    Purpose of an OS (2.1.3) 48
    Access Methods (2.1.4) 49
    Terminal Emulation Programs (2.1.5) 50
IOS Navigation (2.2) 52
    Primary Command Modes (2.2.1) 52
    Configuration Mode and Subconfiguration Modes (2.2.2) 53
    Navigate Between IOS Modes (2.2.4) 54
    A Note About Syntax Checker Activities (2.2.6) 55
The Command Structure (2.3) 56
    Basic IOS Command Structure (2.3.1) 56
    IOS Command Syntax Check (2.3.2) 57
    IOS Help Features (2.3.3) 58
    Hot Keys and Shortcuts (2.3.5) 58
Basic Device Configuration (2.4) 61
    Device Names (2.4.1) 61
    Password Guidelines (2.4.2) 62
    Configure Passwords (2.4.3) 63
    Encrypt Passwords (2.4.4) 64
    Banner Messages (2.4.5) 65
Save Configurations (2.5) 66
    Configuration Files (2.5.1) 67
    Alter the Running Configuration (2.5.2) 68
    Capture Configuration to a Text File (2.5.4) 68
Ports and Addresses (2.6) 71
    IP Addresses (2.6.1) 71
    Interfaces and Ports (2.6.2) 73
Configure IP Addressing (2.7) 74
    Manual IP Address Configuration for End Devices (2.7.1) 75
    Automatic IP Address Configuration for End Devices (2.7.2) 76
    Switch Virtual Interface Configuration (2.7.4) 77
Verify Connectivity (2.8) 78
Summary (2.9) 79
    Cisco IOS Access 79
    IOS Navigation 79
    The Command Structure 79
    Basic Device Configuration 79
    Save Configurations 80
    Ports and Addresses 80
    Configure IP Addressing 80
    Verify Connectivity 80
Practice 81
Check Your Understanding Questions 81
Chapter 3 Protocols and Models 85
Objectives 85
Key Terms 85
Introduction (3.0) 86
The Rules (3.1) 86
    Communications Fundamentals (3.1.2) 86
    Communication Protocols (3.1.3) 87
    Rule Establishment (3.1.4) 88
    Network Protocol Requirements (3.1.5) 88
    Message Encoding (3.1.6) 89
    Message Formatting and Encapsulation (3.1.7) 90
    Message Size (3.1.8) 91
    Message Timing (3.1.9) 92
    Message Delivery Options (3.1.10) 92
    A Note About the Node Icon (3.1.11) 94
Protocols 94
    Network Protocol Overview (3.2.1) 94
    Network Protocol Functions (3.2.2) 95
    Protocol Interaction (3.2.3) 96
Protocol Suites (3.3) 97
    Network Protocol Suites (3.3.1) 97
    Evolution of Protocol Suites (3.3.2) 98
    TCP/IP Protocol Example (3.3.3) 99
    TCP/IP Protocol Suite (3.3.4) 99
        Application Layer 101
        Transport Layer 102
        Internet Layer 102
        Network Access Layer 103
    TCP/IP Communication Process (3.3.5) 103
Standards Organizations (3.4) 108
    Open Standards (3.4.1) 108
    Internet Standards (3.4.2) 108
    Electronic and Communications Standards (3.4.3) 111
Reference Models (3.5) 111
    The Benefits of Using a Layered Model (3.5.1) 112
    The OSI Reference Model (3.5.2) 112
    The TCP/IP Protocol Model (3.5.3) 114
    OSI and TCP/IP Model Comparison (3.5.4) 115
Data Encapsulation (3.6) 116
    Segmenting Messages (3.6.1) 116
    Sequencing (3.6.2) 118
    Protocol Data Units (3.6.3) 118
    Encapsulation Example (3.6.4) 120
    De-encapsulation Example (3.6.5) 120
Data Access (3.7) 121
    Addresses (3.7.1) 121
    Layer 3 Logical Address (3.7.2) 122
    Devices on the Same Network (3.7.3) 123
    Role of the Data Link Layer Addresses: Same
    IP Network (3.7.4) 124
    Devices on a Remote Network (3.7.5) 125
    Role of the Network Layer Addresses (3.7.6) 125
    Role of the Data Link Layer Addresses: Different
    IP Networks (3.7.7) 126
    Data Link Addresses (3.7.8) 127
Summary (3.8) 130
    The Rules 130
    Protocols 130
    Protocol Suites 130
    Standards Organizations 131
    Reference Models 131
    Data Encapsulation 132
    Data Access 132
Practice 133
Check Your Understanding Questions 133
Chapter 4 Physical Layer 137
Objectives 137
Key Terms 137
Introduction (4.0) 138
Purpose of the Physical Layer (4.1) 138
    The Physical Connection (4.1.1) 138
    The Physical Layer (4.1.2) 139
Physical Layer Characteristics (4.2) 141
    Physical Layer Standards (4.2.1) 141
    Physical Components (4.2.2) 142
    Encoding (4.2.3) 142
    Signaling (4.2.4) 143
    Bandwidth (4.2.5) 145
    Bandwidth Terminology (4.2.6) 145
        Latency 146
        Throughput 146
        Goodput 146
Copper Cabling (4.3) 146
    Characteristics of Copper Cabling (4.3.1) 147
    Types of Copper Cabling (4.3.2) 148
    Unshielded Twisted-Pair (UTP) (4.3.3) 148
    Shielded Twisted-Pair (STP) (4.3.4) 150
    Coaxial Cable (4.3.5) 151
UTP Cabling (4.4) 152
    Properties of UTP Cabling (4.4.1) 152
    UTP Cabling Standards and Connectors (4.4.2) 153
    Straight-Through and Crossover UTP Cables (4.4.3) 157
Fiber-Optic Cabling (4.5) 158
    Properties of Fiber-Optic Cabling (4.5.1) 158
    Types of Fiber Media (4.5.2) 159
        Single-Mode Fiber 159
        Multimode Fiber 160
    Fiber-Optic Cabling Usage (4.5.3) 160
    Fiber-Optic Connectors (4.5.4) 161
    Fiber Patch Cords (4.5.5) 162
    Fiber Versus Copper (4.5.6) 163
Wireless Media (4.6) 164
    Properties of Wireless Media (4.6.1) 164
    Types of Wireless Media (4.6.2) 165
    Wireless LAN (4.6.3) 166
Summary (4.7) 168
    Purpose of the Physical Layer 168
    Physical Layer Characteristics 168
    Copper Cabling 168
    UTP Cabling 169
    Fiber-Optic Cabling 169
    Wireless Media 169
Practice 170
Check Your Understanding Questions 170
Chapter 5 Number Systems 175
Objectives 175
Key Terms 175
Introduction (5.0) 176
Binary Number System (5.1) 176
    Binary and IPv4 Addresses (5.1.1) 176
    Binary Positional Notation (5.1.3) 178
    Convert Binary to Decimal (5.1.5) 180
    Decimal to Binary Conversion (5.1.7) 182
    Decimal to Binary Conversion Example (5.1.8) 186
    IPv4 Addresses (5.1.11) 193
Hexadecimal Number System (5.2) 194
    Hexadecimal and IPv6 Addresses (5.2.1) 194
    Decimal to Hexadecimal Conversions (5.2.3) 196
    Hexadecimal to Decimal Conversion (5.2.4) 196
Summary (5.3) 198
    Binary Number System 198
    Hexadecimal Number System 198
Practice 198
Check Your Understanding Questions 198
Chapter 6 Data Link Layer 203
Objectives 203
Key Terms 203
Introduction (6.0) 204
Purpose of the Data Link Layer (6.1) 204
    The Data Link Layer (6.1.1) 204
    IEEE 802 LAN/MAN Data Link Sublayers (6.1.2) 206
    Providing Access to Media (6.1.3) 207
    Data Link Layer Standards (6.1.4) 209
Topologies (6.2) 209
    Physical and Logical Topologies (6.2.1) 209
    WAN Topologies (6.2.2) 211
        Point-to-Point 211
        Hub and Spoke 211
        Mesh 212
    Point-to-Point WAN Topology (6.2.3) 213
    LAN Topologies (6.2.4) 213
        Legacy LAN Topologies 214
    Half-Duplex and Full-Duplex Communication (6.2.5) 215
        Half-Duplex Communication 215
        Full-Duplex Communication 215
    Access Control Methods (6.2.6) 216
        Contention-Based Access 216
        Controlled Access 217
    Contention-Based AccessCSMA/CD (6.2.7) 217
    Contention-Based AccessCSMA/CA (6.2.8) 219
Data Link Frame (6.3) 221
    The Frame (6.3.1) 221
    Frame Fields (6.3.2) 222
    Layer 2 Addresses (6.3.3) 223
    LAN and WAN Frames (6.3.4) 225
Summary (6.4) 228
    Purpose of the Data Link Layer 228
    Topologies 228
    Data Link Frame 229
Practice 229
Check Your Understanding Questions 229
Chapter 7 Ethernet Switching 233
Objectives 233
Key Terms 233
Introduction (7.0) 234
Ethernet Frames (7.1) 234
    Ethernet Encapsulation (7.1.1) 234
    Data Link Sublayers (7.1.2) 235
    MAC Sublayer (7.1.3) 236
        Data Encapsulation 236
        Accessing the Media 237
    Ethernet Frame Fields (7.1.4) 237
Ethernet MAC Address (7.2) 239
    MAC Address and Hexadecimal (7.2.1) 240
    Ethernet MAC Address (7.2.2) 241
    Frame Processing (7.2.3) 243
    Unicast MAC Address (7.2.4) 244
    Broadcast MAC Address (7.2.5) 246
    Multicast MAC Address (7.2.6) 247
The MAC Address Table (7.3) 248
    Switch Fundamentals (7.3.1) 248
    Switch Learning and Forwarding (7.3.2) 250
        Examine the Source MAC Address 250
        Find the Destination MAC Address 250
    Filtering Frames (7.3.3) 252
Switch Speeds and Forwarding Methods (7.4) 254
    Frame Forwarding Methods on Cisco Switches (7.4.1) 254
    Cut-Through Switching (7.4.2) 255
    Memory Buffering on Switches (7.4.3) 257
    Duplex and Speed Settings (7.4.4) 257
    Auto-MDIX (7.4.5) 259
Summary (7.5) 261
    Ethernet Frame 261
    Ethernet MAC Address 261
    The MAC Address Table 261
    Switch Speeds and Forwarding Methods 262
Practice 262
Check Your Understanding Questions 262
Chapter 8 Network Layer 267
Objectives 267
Key Terms 267
Introduction (8.0) 268
Network Layer Characteristics (8.1) 268
    The Network Layer (8.1.1) 268
    IP Encapsulation (8.1.2) 270
    Characteristics of IP (8.1.3) 271
    Connectionless (8.1.4) 271
    Best Effort (8.1.5) 272
    Media Independent (8.1.6) 273
IPv4 Packet (8.2) 274
    IPv4 Packet Header (8.2.1) 274
    IPv4 Packet Header Fields (8.2.2) 274
IPv6 Packet (8.3) 276
    Limitations of IPv4 (8.3.1) 277
    IPv6 Overview (8.3.2) 277
    IPv4 Packet Header Fields in the IPv6 Packet Header (8.3.3) 278
    IPv6 Packet Header (8.3.4) 280
How a Host Routes (8.4) 281
    Host Forwarding Decision (8.4.1) 281
    Default Gateway (8.4.2) 282
    A Host Routes to the Default Gateway (8.4.3) 283
    Host Routing Tables (8.4.4) 283
Introduction to Routing (8.5) 285
    Router Packet Forwarding Decision (8.5.1) 285
    IP Router Routing Table (8.5.2) 286
    Static Routing (8.5.3) 287
    Dynamic Routing (8.5.4) 288
    Introduction to an IPv4 Routing Table (8.5.6) 290
Summary (8.6) 292
    Network Layer Characteristics 292
    IPv4 Packet 292
    IPv6 Packet 292
    How a Host Routes 293
    Introduction to Routing 293
Practice 294
Check Your Understanding Questions 294
Chapter 9 Address Resolution 297
Objectives 297
Key Terms 297
Introduction (9.0) 298
MAC and IP (9.1) 298
    Destination on Same Network (9.1.1) 298
    Destination on Remote Network (9.1.2) 299
ARP (9.2) 301
    ARP Overview (9.2.1) 301
    ARP Functions (9.2.2) 302
    Removing Entries from an ARP Table (9.2.6) 306
    ARP Tables on Networking Devices (9.2.7) 306
    ARP IssuesARP Broadcasts and ARP Spoofing (9.2.8) 307
IPv6 Neighbor Discovery (9.3) 309
    IPv6 Neighbor Discovery Messages (9.3.2) 309
    IPv6 Neighbor DiscoveryAddress Resolution (9.3.3) 311
Summary (9.4) 313
    MAC and IP 313
    ARP 313
    Neighbor Discovery 314
Practice 314
Check Your Understanding Questions 314
Chapter 10 Basic Router Configuration 319
Objectives 319
Introduction (10.0) 320
Configure Initial Router Settings (10.1) 320
    Basic Router Configuration Steps (10.1.1) 320
    Basic Router Configuration Example (10.1.2) 321
Configure Interfaces (10.2) 323
    Configure Router Interfaces (10.2.1) 323
    Configure Router Interfaces Example (10.2.2) 324
    Verify Interface Configuration (10.2.3) 325
    Configuration Verification Commands (10.2.4) 326
Configure the Default Gateway (10.3) 330
    Default Gateway on a Host (10.3.1) 331
    Default Gateway on a Switch (10.3.2) 332
Summary (10.4) 335
    Configure Initial Router Settings 335
    Configure Interfaces 335
    Configure the Default Gateway 335
Practice 336
Check Your Understanding Questions 337
Chapter 11 IPv4 Addressing 341
Objectives 341
Key Terms 341
Introduction (11.0) 342
IPv4 Address Structure (11.1) 342
    Network and Host Portions (11.1.1) 342
    The Subnet Mask (11.1.2) 343
    The Prefix Length (11.1.3) 344
    Determining the Network: Logical AND (11.1.4) 345
    Network, Host, and Broadcast Addresses (11.1.6) 347
        Network Address 347
        Host Addresses 348
        Broadcast Address 349
IPv4 Unicast, Broadcast, and Multicast (11.2) 349
    Unicast (11.2.1) 349
    Broadcast (11.2.2) 350
        IP Directed Broadcasts 351
    Multicast (11.2.3) 352
Types of IPv4 Addresses (11.3) 353
    Public and Private IPv4 Addresses (11.3.1) 353
    Routing to the Internet (11.3.2) 354
    Special Use IPv4 Addresses (11.3.4) 356
        Loopback Addresses 356
        Link-Local Addresses 357
    Legacy Classful Addressing (11.3.5) 357
    Assignment of IP Addresses (11.3.6) 358
Network Segmentation (11.4) 359
    Broadcast Domains and Segmentation (11.4.1) 359
    Problems with Large Broadcast Domains (11.4.2) 360
    Reasons for Segmenting Networks (11.4.3) 362
Subnet an IPv4 Network (11.5) 364
    Subnet on an Octet Boundary (11.5.1) 364
    Subnet Within an Octet Boundary (11.5.2) 366
Subnet a Slash 16 and a Slash 8 Prefix (11.6) 367
    Create Subnets with a Slash 16 Prefix (11.6.1) 367
    Create 100 Subnets with a Slash 16 Prefix (11.6.2) 369
    Create 1000 Subnets with a Slash 8 Prefix (11.6.3) 372
Subnet to Meet Requirements (11.7) 374
    Subnet Private Versus Public IPv4 Address Space (11.7.1) 374
        What About the DMZ? 377
    Minimize Unused Host IPv4 Addresses and Maximize Subnets (11.7.2) 377
    Example: Efficient IPv4 Subnetting (11.7.3) 378
VLSM (11.8) 381
    IPv4 Address Conservation (11.8.3) 381
    VLSM (11.8.4) 383
    VLSM Topology Address Assignment (11.8.5) 386
Structured Design (11.9) 387
    IPv4 Network Address Planning (11.9.1) 388
    Device Address Assignment (11.9.2) 389
Summary (11.10) 390
    IPv4 Addressing Structure 390
    IPv4 Unicast, Broadcast, and Multicast 390
    Types of IPv4 Addresses 390
    Network Segmentation 391
    Subnet an IPv4 Network 391
    Subnet a /16 and a /8 Prefix 391
    Subnet to Meet Requirements 391
    Variable-Length Subnet Masking 392
    Structured Design 392
Practice 393
Check Your Understanding Questions 393
Chapter 12 IPv6 Addressing 397
Objectives 397
Key Terms 397
Introduction (12.0) 398
IPv4 Issues (12.1) 398
    Need for IPv6 (12.1.1) 398
    Internet of Things 399
    IPv4 and IPv6 Coexistence (12.1.2) 399
        Dual Stack 399
        Tunneling 400
        Translation 401
IPv6 Address Representation (12.2) 401
    IPv6 Addressing Formats (12.2.1) 401
        Preferred Format 402
    Rule 1Omit Leading Zeros (12.2.2) 403
    Rule 2Double Colon (12.2.3) 404
IPv6 Address Types (12.3) 406
    Unicast, Multicast, Anycast (12.3.1) 406
    IPv6 Prefix Length (12.3.2) 406
    Types of IPv6 Unicast Addresses (12.3.3) 407
    A Note About the Unique Local Address (12.3.4) 408
    IPv6 GUA (12.3.5) 408
    IPv6 GUA Structure (12.3.6) 409
        Global Routing Prefix 410
        Subnet ID 410
        Interface ID 410
    IPv6 LLA (12.3.7) 411
GUA and LLA Static Configuration (12.4) 413
    Static GUA Configuration on a Router (12.4.1) 413
    Static GUA Configuration on a Windows Host (12.4.2) 414
    Static Configuration of a Link-Local Unicast Address (12.4.3) 415
Dynamic Addressing for IPv6 GUAs (12.5) 417
    RS and RA Messages (12.5.1) 417
    Method 1: SLAAC (12.5.2) 418
    Method 2: SLAAC and Stateless DHCPv6 (12.5.3) 419
    Method 3: Stateful DHCPv6 (12.5.4) 420
    EUI-64 Process vs. Randomly Generated (12.5.5) 421
    EUI-64 Process (12.5.6) 422
    Randomly Generated Interface IDs (12.5.7) 424
Dynamic Addressing for IPv6 LLAs (12.6) 425
    Dynamic LLAs (12.6.1) 425
    Dynamic LLAs on Windows (12.6.2) 425
    Dynamic LLAs on Cisco Routers (12.6.3) 426
    Verify IPv6 Address Configuration (12.6.4) 427
IPv6 Multicast Addresses (12.7) 430
    Assigned IPv6 Multicast Addresses (12.7.1) 430
    Well-Known IPv6 Multicast Addresses (12.7.2) 430
    Solicited-Node IPv6 Multicast Addresses (12.7.3) 432
Subnet an IPv6 Network (12.8) 432
    Subnet Using the Subnet ID (12.8.1) 432
    IPv6 Subnetting Example (12.8.2) 433
    IPv6 Subnet Allocation (12.8.3) 434
    Router Configured with IPv6 Subnets (12.8.4) 435
Summary (12.9) 436
    IPv4 Issues 436
    IPv6 Address Representation 436
    IPv6 Address Types 436
    GUA and LLA Static Configuration 437
    Dynamic Addressing for IPv6 GUAs 437
    Dynamic Addressing for IPv6 LLAs 437
    IPv6 Multicast Addresses 438
    Subnet an IPv6 Network 438
Practice 439
Check Your Understanding Questions 439
Chapter 13 ICMP 443
Objectives 443
Introduction (13.0) 444
ICMP Messages (13.1) 444
    ICMPv4 and ICMPv6 Messages (13.1.1) 444
    Host Reachability (13.1.2) 444
    Destination or Service Unreachable (13.1.3) 445
    Time Exceeded (13.1.4) 446
    ICMPv6 Messages (13.1.5) 446
Ping and Traceroute Tests (13.2) 449
    PingTest Connectivity (13.2.1) 449
    Ping the Loopback (13.2.2) 450
    Ping the Default Gateway (13.2.3) 450
    Ping a Remote Host (13.2.4) 451
    TracerouteTest the Path (13.2.5) 452
        Round-Trip Time (RTT) 453
        IPv4 TTL and IPv6 Hop Limit 453
Summary (13.3) 454
    ICMP Messages 454
    Ping and Traceroute Testing 454
Practice 455
Check Your Understanding Questions 456
Chapter 14 Transport Layer 461
Objectives 461
Key Terms 461
Introduction (14.0) 462
Transportation of Data (14.1) 462
    Role of the Transport Layer (14.1.1) 462
    Transport Layer Responsibilities (14.1.2) 463
    Transport Layer Protocols (14.1.3) 467
    Transmission Control Protocol (TCP) (14.1.4) 467
    User Datagram Protocol (UDP) (14.1.5) 468
    The Right Transport Layer Protocol for the Right Application (14.1.6) 469
TCP Overview (14.2) 470
    TCP Features (14.2.1) 470
    TCP Header (14.2.2) 471
    TCP Header Fields (14.2.3) 471
    Applications That Use TCP (14.2.4) 472
UDP Overview (14.3) 473
    UDP Features (14.3.1) 473
    UDP Header (14.3.2) 474
    UDP Header Fields (14.3.3) 474
    Applications that use UDP (14.3.4) 475
Port Numbers (14.4) 476
    Multiple Separate Communications (14.4.1) 476
    Socket Pairs (14.4.2) 477
    Port Number Groups (14.4.3) 478
    The netstat Command (14.4.4) 479
TCP Communication Process (14.5) 480
    TCP Server Processes (14.5.1) 480
    TCP Connection Establishment (14.5.2) 483
    Session Termination (14.5.3) 484
    TCP Three-Way Handshake Analysis (14.5.4) 485
Reliability and Flow Control (14.6) 486
    TCP ReliabilityGuaranteed and Ordered Delivery (14.6.1) 486
    TCP ReliabilityData Loss and Retransmission (14.6.3) 488
    TCP Flow ControlWindow Size and Acknowledgments (14.6.5) 490
    TCP Flow ControlMaximum Segment Size (MSS) (14.6.6) 491
    TCP Flow ControlCongestion Avoidance (14.6.7) 493
UDP Communication (14.7) 494
    UDP Low Overhead Versus Reliability (14.7.1) 494
    UDP Datagram Reassembly (14.7.2) 494
    UDP Server Processes and Requests (14.7.3) 495
    UDP Client Processes (14.7.4) 495
Summary (14.8) 499
    Transportation of Data 499
    TCP Overview 499
    UDP Overview 499
    Port Numbers 499
    TCP Communications Process 500
    Reliability and Flow Control 500
    UDP Communication 501
Practice 501
Check Your Understanding Questions 502
Chapter 15 Application Layer 507
Objectives 507
Key Terms 507
Introduction (15.0) 508
Application, Presentation, and Session (15.1) 508
    Application Layer (15.1.1) 508
    Presentation and Session Layer (15.1.2) 508
    TCP/IP Application Layer Protocols (15.1.3) 510
Peer-to-Peer (15.2) 511
    Client-Server Model (15.2.1) 511
    Peer-to-Peer Networks (15.2.2) 512
    Peer-to-Peer Applications (15.2.3) 513
    Common P2P Applications (15.2.4) 514
Web and Email Protocols (15.3) 515
    Hypertext Transfer Protocol and Hypertext Markup Language (15.3.1) 515
    HTTP and HTTPS (15.3.2) 516
    Email Protocols (15.3.3) 518
    SMTP, POP, and IMAP (15.3.4) 519
        SMTP 519
        POP 520
        IMAP 521
IP Addressing Services (15.4) 521
    Domain Name Service (15.4.1) 522
    DNS Message Format (15.4.2) 524
    DNS Hierarchy (15.4.3) 525
    The nslookup Command (15.4.4) 526
    Dynamic Host Configuration Protocol (15.4.6) 527
    DHCP Operation (15.4.7) 528
File Sharing Services (15.5) 530
    File Transfer Protocol (15.5.1) 530
    Server Message Block (15.5.2) 531
Summary 534
    Application, Presentation, and Session 534
    Peer-to-Peer 534
    Web and Email Protocols 534
    IP Addressing Services 535
    File Sharing Services 535
Practice 536
Check Your Understanding Questions 536
Chapter 16 Network Security Fundamentals 541
Objectives 541
Key Terms 541
Introduction (16.0) 542
Security Threats and Vulnerabilities (16.1) 542
    Types of Threats (16.1.1) 542
    Types of Vulnerabilities (16.1.2) 543
    Physical Security (16.1.3) 545
Network Attacks (16.2) 546
    Types of Malware (16.2.1) 546
        Viruses 546
        Worms 547
        Trojan Horses 547
    Reconnaissance Attacks (16.2.2) 547
    Access Attacks (16.2.3) 548
        Password Attacks 548
        Trust Exploitation 548
        Port Redirection 549
        Man-in-the-Middle 549
    Denial of Service Attacks (16.2.4) 551
        DoS Attack 551
        DDoS Attack 551
Network Attack Mitigations (16.3) 552
    The Defense-in-Depth Approach (16.3.1) 553
    Keep Backups (16.3.2) 553
    Upgrade, Update, and Patch (16.3.3) 554
    Authentication, Authorization, and Accounting (16.3.4) 555
    Firewalls (16.3.5) 555
    Types of Firewalls (16.3.6) 557
    Endpoint Security (16.3.7) 558
Device Security (16.4) 558
    Cisco AutoSecure (16.4.1) 558
    Passwords (16.4.2) 559
    Additional Password Security (16.4.3) 560
    Enable SSH (16.4.4) 561
    Disable Unused Services (16.4.5) 563
Summary 565
    Security Threats and Vulnerabilities 565
    Network Attacks 565
    Network Attack Mitigation 565
    Device Security 566
Practice 567
Check Your Understanding Questions 567
Chapter 17 Build a Small Network 571
Objectives 571
Key Terms 571
Introduction (17.0) 572
Devices in a Small Network (17.1) 572
    Small Network Topologies (17.1.1) 572
    Device Selection for a Small Network (17.1.2) 573
        Cost 573
        Speed and Types of Ports/Interfaces 573
        Expandability 573
        Operating System Features and Services 574
    IP Addressing for a Small Network (17.1.3) 574
    Redundancy in a Small Network (17.1.4) 576
    Traffic Management (17.1.5) 577
Small Network Applications and Protocols (17.2) 578
    Common Applications (17.2.1) 578
        Network Applications 578
        Application Layer Services 579
    Common Protocols (17.2.2) 579
    Voice and Video Applications (17.2.3) 582
Scale to Larger Networks (17.3) 583
    Small Network Growth (17.3.1) 583
    Protocol Analysis (17.3.2) 583
    Employee Network Utilization (17.3.3) 584
Verify Connectivity (17.4) 586
    Verify Connectivity with Ping (17.4.1) 586
    Extended Ping (17.4.2) 588
    Verify Connectivity with Traceroute (17.4.3) 590
    Extended Traceroute (17.4.4) 592
    Network Baseline (17.4.5) 593
Host and IOS Commands (17.5) 596
    IP Configuration on a Windows Host (17.5.1) 596
    IP Configuration on a Linux Host (17.5.2) 599
    IP Configuration on a macOS Host (17.5.3) 600
    The arp Command (17.5.4) 601
    Common show Commands Revisited (17.5.5) 602
    The show cdp neighbors Command (17.5.6) 609
    The show ip interface brief Command (17.5.7) 610
        Verify Switch Interfaces 611
Troubleshooting Methodologies (17.6) 611
    Basic Troubleshooting Approaches (17.6.1) 612
    Resolve or Escalate? (17.6.2) 613
    The debug Command (17.6.3) 613
    The terminal monitor Command (17.6.4) 615
Troubleshooting Scenarios (17.7) 616
    Duplex Operation and Mismatch Issues (17.7.1) 617
    IP Addressing Issues on IOS Devices (17.7.2) 618
    IP Addressing Issues on End Devices (17.7.3) 619
    Default Gateway Issues (17.7.4) 619
    Troubleshooting DNS Issues (17.7.5) 621
Summary (17.8) 624
    Devices in a Small Network 624
    Small Network Applications and Protocols 624
    Scale to Larger Networks 624
    Verify Connectivity 625
    Host and IOS Commands 625
    Troubleshooting Methodologies 626
    Troubleshooting Scenarios 626
Practice 627
Check Your Understanding Questions 628
Appendix A Answers to Check Your Understanding Questions 631
Key Terms Glossary 645


9780136633662   TOC   6/3/2020


Updates

Errata

We've made every effort to ensure the accuracy of this book and its companion content. Any errors that have been confirmed since this book was published can be downloaded below.

Download the errata (101 KB .doc)

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020