Home > Computing and Information Technology > Computer networking and communications > Introduction to Networks Companion Guide (CCNAv7)
Introduction to Networks Companion Guide (CCNAv7)

Introduction to Networks Companion Guide (CCNAv7)

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

Introduction to Networks Companion Guide is the official supplemental textbook for the Introduction to Networks course in the Cisco Networking Academy CCNA curriculum. The course introduces the architecture, protocols, functions, components, and models of the internet and computer networks. The principles of IP addressing and fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. By the end of the course, you will be able to build simple LANs, perform basic configurations for routers and switches, understand the fundamentals of network security, and implement IP addressing schemes. The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time. The book's features help you focus on important concepts to succeed in this course: * Chapter objectives:  Review core concepts by answering the focus questions listed at the beginning of each chapter. * Key terms:  Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter. * Glossary:  Consult the comprehensive Glossary with more than 300 terms. * Summary of Activities and Labs:  Maximize your study time with this complete list of all associated practice exercises at the end of each chapter. * Check Your Understanding:  Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer. * How To:  Look for this icon to study the steps you need to learn to perform certain tasks. * Interactive Activities:  Reinforce your understanding of topics with dozens of exercises from the online course identified throughout the book with this icon. * Videos:  Watch the videos embedded within the online course. * Packet Tracer Activities:  Explore and visualize networking concepts using Packet Tracer. There are multiple exercises interspersed throughout the chapters and provided in the accompanying Labs & Study Guide book. * Hands-on Labs:  Work through all the labs and other activities that are included in the course and published in the separate Labs & Study Guide. This book is offered exclusively for students enrolled in Cisco Networking Academy courses. It is not designed for independent study or professional certification preparation. Visit netacad.com to learn more about program options and requirements. Related titles:  CCNA 200-301 Portable Command Guide Book: 9780135937822 eBook: 9780135937709 31 Days Before Your CCNA Exam Book: 9780135964088 eBook: 9780135964231 CCNA 200-301 Official Cert Guide, Volume 1 Book: 9780135792735 Premium Edition: 9780135792728 CCNA 200-301 Official Cert Guide, Volume 2 Book: 9781587147135 Premium Edition: 9780135262719

Table of Contents:
Introduction xxx Chapter 1 Networking Today 1 Objectives 1 Key Terms 1 Introduction (1.0) 3 Networks Affect Our Lives (1.1) 3     Networks Connect Us (1.1.1) 3     No Boundaries (1.1.3) 3 Network Components (1.2) 4     Host Roles (1.2.1) 4     Peer-to-Peer (1.2.2) 5     End Devices (1.2.3) 6     Intermediary Devices (1.2.4) 6     Network Media (1.2.5) 7 Network Representations and Topologies (1.3) 8     Network Representations (1.3.1) 8     Topology Diagrams (1.3.2) 10         Physical Topology Diagrams 10         Logical Topology Diagrams 10 Common Types of Networks (1.4) 11     Networks of Many Sizes (1.4.1) 11     LANs and WANs (1.4.2) 12         LANs 13         WANs 14     The Internet (1.4.3) 15     Intranets and Extranets (1.4.4) 16 Internet Connections (1.5) 17     Internet Access Technologies (1.5.1) 17     Home and Small Office Internet Connections (1.5.2) 18     Businesses Internet Connections (1.5.3) 19     The Converging Network (1.5.4) 20 Reliable Networks (1.6) 23     Network Architecture (1.6.1) 23     Fault Tolerance (1.6.2) 24     Scalability (1.6.3) 24     Quality of Service (1.6.4) 25     Network Security (1.6.5) 26 Network Trends (1.7) 27     Recent Trends (1.7.1) 28     Bring Your Own Device (BYOD) (1.7.2) 28     Online Collaboration (1.7.3) 28     Video Communications (1.7.4) 29     Cloud Computing (1.7.6) 29     Technology Trends in the Home (1.7.7) 31     Powerline Networking (1.7.8) 31     Wireless Broadband (1.7.9) 32         Wireless Internet Service Providers 32         Wireless Broadband Service 32 Network Security (1.8) 33     Security Threats (1.8.1) 33     Security Solutions (1.8.2) 34 The IT Professional (1.9) 35     CCNA (1.9.1) 35     Networking Jobs (1.9.2) 36 Summary (1.10) 37     Networks Affect Our Lives 37     Network Components 37     Network Representations and Topologies 37     Common Types of Networks 37     Internet Connections 38     Reliable Networks 38     Network Trends 38     Network Security 39     The IT Professional 40 Practice 40 Check Your Understanding Questions 40 Chapter 2 Basic Switch and End Device Configuration 45 Objectives 45 Key Terms 45 Introduction (2.0) 46 Cisco IOS Access (2.1) 46     Operating Systems (2.1.1) 46     GUI (2.1.2) 47     Purpose of an OS (2.1.3) 48     Access Methods (2.1.4) 49     Terminal Emulation Programs (2.1.5) 50 IOS Navigation (2.2) 52     Primary Command Modes (2.2.1) 52     Configuration Mode and Subconfiguration Modes (2.2.2) 53     Navigate Between IOS Modes (2.2.4) 54     A Note About Syntax Checker Activities (2.2.6) 55 The Command Structure (2.3) 56     Basic IOS Command Structure (2.3.1) 56     IOS Command Syntax Check (2.3.2) 57     IOS Help Features (2.3.3) 58     Hot Keys and Shortcuts (2.3.5) 58 Basic Device Configuration (2.4) 61     Device Names (2.4.1) 61     Password Guidelines (2.4.2) 62     Configure Passwords (2.4.3) 63     Encrypt Passwords (2.4.4) 64     Banner Messages (2.4.5) 65 Save Configurations (2.5) 66     Configuration Files (2.5.1) 67     Alter the Running Configuration (2.5.2) 68     Capture Configuration to a Text File (2.5.4) 68 Ports and Addresses (2.6) 71     IP Addresses (2.6.1) 71     Interfaces and Ports (2.6.2) 73 Configure IP Addressing (2.7) 74     Manual IP Address Configuration for End Devices (2.7.1) 75     Automatic IP Address Configuration for End Devices (2.7.2) 76     Switch Virtual Interface Configuration (2.7.4) 77 Verify Connectivity (2.8) 78 Summary (2.9) 79     Cisco IOS Access 79     IOS Navigation 79     The Command Structure 79     Basic Device Configuration 79     Save Configurations 80     Ports and Addresses 80     Configure IP Addressing 80     Verify Connectivity 80 Practice 81 Check Your Understanding Questions 81 Chapter 3 Protocols and Models 85 Objectives 85 Key Terms 85 Introduction (3.0) 86 The Rules (3.1) 86     Communications Fundamentals (3.1.2) 86     Communication Protocols (3.1.3) 87     Rule Establishment (3.1.4) 88     Network Protocol Requirements (3.1.5) 88     Message Encoding (3.1.6) 89     Message Formatting and Encapsulation (3.1.7) 90     Message Size (3.1.8) 91     Message Timing (3.1.9) 92     Message Delivery Options (3.1.10) 92     A Note About the Node Icon (3.1.11) 94 Protocols 94     Network Protocol Overview (3.2.1) 94     Network Protocol Functions (3.2.2) 95     Protocol Interaction (3.2.3) 96 Protocol Suites (3.3) 97     Network Protocol Suites (3.3.1) 97     Evolution of Protocol Suites (3.3.2) 98     TCP/IP Protocol Example (3.3.3) 99     TCP/IP Protocol Suite (3.3.4) 99         Application Layer 101         Transport Layer 102         Internet Layer 102         Network Access Layer 103     TCP/IP Communication Process (3.3.5) 103 Standards Organizations (3.4) 108     Open Standards (3.4.1) 108     Internet Standards (3.4.2) 108     Electronic and Communications Standards (3.4.3) 111 Reference Models (3.5) 111     The Benefits of Using a Layered Model (3.5.1) 112     The OSI Reference Model (3.5.2) 112     The TCP/IP Protocol Model (3.5.3) 114     OSI and TCP/IP Model Comparison (3.5.4) 115 Data Encapsulation (3.6) 116     Segmenting Messages (3.6.1) 116     Sequencing (3.6.2) 118     Protocol Data Units (3.6.3) 118     Encapsulation Example (3.6.4) 120     De-encapsulation Example (3.6.5) 120 Data Access (3.7) 121     Addresses (3.7.1) 121     Layer 3 Logical Address (3.7.2) 122     Devices on the Same Network (3.7.3) 123     Role of the Data Link Layer Addresses: Same     IP Network (3.7.4) 124     Devices on a Remote Network (3.7.5) 125     Role of the Network Layer Addresses (3.7.6) 125     Role of the Data Link Layer Addresses: Different     IP Networks (3.7.7) 126     Data Link Addresses (3.7.8) 127 Summary (3.8) 130     The Rules 130     Protocols 130     Protocol Suites 130     Standards Organizations 131     Reference Models 131     Data Encapsulation 132     Data Access 132 Practice 133 Check Your Understanding Questions 133 Chapter 4 Physical Layer 137 Objectives 137 Key Terms 137 Introduction (4.0) 138 Purpose of the Physical Layer (4.1) 138     The Physical Connection (4.1.1) 138     The Physical Layer (4.1.2) 139 Physical Layer Characteristics (4.2) 141     Physical Layer Standards (4.2.1) 141     Physical Components (4.2.2) 142     Encoding (4.2.3) 142     Signaling (4.2.4) 143     Bandwidth (4.2.5) 145     Bandwidth Terminology (4.2.6) 145         Latency 146         Throughput 146         Goodput 146 Copper Cabling (4.3) 146     Characteristics of Copper Cabling (4.3.1) 147     Types of Copper Cabling (4.3.2) 148     Unshielded Twisted-Pair (UTP) (4.3.3) 148     Shielded Twisted-Pair (STP) (4.3.4) 150     Coaxial Cable (4.3.5) 151 UTP Cabling (4.4) 152     Properties of UTP Cabling (4.4.1) 152     UTP Cabling Standards and Connectors (4.4.2) 153     Straight-Through and Crossover UTP Cables (4.4.3) 157 Fiber-Optic Cabling (4.5) 158     Properties of Fiber-Optic Cabling (4.5.1) 158     Types of Fiber Media (4.5.2) 159         Single-Mode Fiber 159         Multimode Fiber 160     Fiber-Optic Cabling Usage (4.5.3) 160     Fiber-Optic Connectors (4.5.4) 161     Fiber Patch Cords (4.5.5) 162     Fiber Versus Copper (4.5.6) 163 Wireless Media (4.6) 164     Properties of Wireless Media (4.6.1) 164     Types of Wireless Media (4.6.2) 165     Wireless LAN (4.6.3) 166 Summary (4.7) 168     Purpose of the Physical Layer 168     Physical Layer Characteristics 168     Copper Cabling 168     UTP Cabling 169     Fiber-Optic Cabling 169     Wireless Media 169 Practice 170 Check Your Understanding Questions 170 Chapter 5 Number Systems 175 Objectives 175 Key Terms 175 Introduction (5.0) 176 Binary Number System (5.1) 176     Binary and IPv4 Addresses (5.1.1) 176     Binary Positional Notation (5.1.3) 178     Convert Binary to Decimal (5.1.5) 180     Decimal to Binary Conversion (5.1.7) 182     Decimal to Binary Conversion Example (5.1.8) 186     IPv4 Addresses (5.1.11) 193 Hexadecimal Number System (5.2) 194     Hexadecimal and IPv6 Addresses (5.2.1) 194     Decimal to Hexadecimal Conversions (5.2.3) 196     Hexadecimal to Decimal Conversion (5.2.4) 196 Summary (5.3) 198     Binary Number System 198     Hexadecimal Number System 198 Practice 198 Check Your Understanding Questions 198 Chapter 6 Data Link Layer 203 Objectives 203 Key Terms 203 Introduction (6.0) 204 Purpose of the Data Link Layer (6.1) 204     The Data Link Layer (6.1.1) 204     IEEE 802 LAN/MAN Data Link Sublayers (6.1.2) 206     Providing Access to Media (6.1.3) 207     Data Link Layer Standards (6.1.4) 209 Topologies (6.2) 209     Physical and Logical Topologies (6.2.1) 209     WAN Topologies (6.2.2) 211         Point-to-Point 211         Hub and Spoke 211         Mesh 212     Point-to-Point WAN Topology (6.2.3) 213     LAN Topologies (6.2.4) 213         Legacy LAN Topologies 214     Half-Duplex and Full-Duplex Communication (6.2.5) 215         Half-Duplex Communication 215         Full-Duplex Communication 215     Access Control Methods (6.2.6) 216         Contention-Based Access 216         Controlled Access 217     Contention-Based Access—CSMA/CD (6.2.7) 217     Contention-Based Access—CSMA/CA (6.2.8) 219 Data Link Frame (6.3) 221     The Frame (6.3.1) 221     Frame Fields (6.3.2) 222     Layer 2 Addresses (6.3.3) 223     LAN and WAN Frames (6.3.4) 225 Summary (6.4) 228     Purpose of the Data Link Layer 228     Topologies 228     Data Link Frame 229 Practice 229 Check Your Understanding Questions 229 Chapter 7 Ethernet Switching 233 Objectives 233 Key Terms 233 Introduction (7.0) 234 Ethernet Frames (7.1) 234     Ethernet Encapsulation (7.1.1) 234     Data Link Sublayers (7.1.2) 235     MAC Sublayer (7.1.3) 236         Data Encapsulation 236         Accessing the Media 237     Ethernet Frame Fields (7.1.4) 237 Ethernet MAC Address (7.2) 239     MAC Address and Hexadecimal (7.2.1) 240     Ethernet MAC Address (7.2.2) 241     Frame Processing (7.2.3) 243     Unicast MAC Address (7.2.4) 244     Broadcast MAC Address (7.2.5) 246     Multicast MAC Address (7.2.6) 247 The MAC Address Table (7.3) 248     Switch Fundamentals (7.3.1) 248     Switch Learning and Forwarding (7.3.2) 250         Examine the Source MAC Address 250         Find the Destination MAC Address 250     Filtering Frames (7.3.3) 252 Switch Speeds and Forwarding Methods (7.4) 254     Frame Forwarding Methods on Cisco Switches (7.4.1) 254     Cut-Through Switching (7.4.2) 255     Memory Buffering on Switches (7.4.3) 257     Duplex and Speed Settings (7.4.4) 257     Auto-MDIX (7.4.5) 259 Summary (7.5) 261     Ethernet Frame 261     Ethernet MAC Address 261     The MAC Address Table 261     Switch Speeds and Forwarding Methods 262 Practice 262 Check Your Understanding Questions 262 Chapter 8 Network Layer 267 Objectives 267 Key Terms 267 Introduction (8.0) 268 Network Layer Characteristics (8.1) 268     The Network Layer (8.1.1) 268     IP Encapsulation (8.1.2) 270     Characteristics of IP (8.1.3) 271     Connectionless (8.1.4) 271     Best Effort (8.1.5) 272     Media Independent (8.1.6) 273 IPv4 Packet (8.2) 274     IPv4 Packet Header (8.2.1) 274     IPv4 Packet Header Fields (8.2.2) 274 IPv6 Packet (8.3) 276     Limitations of IPv4 (8.3.1) 277     IPv6 Overview (8.3.2) 277     IPv4 Packet Header Fields in the IPv6 Packet Header (8.3.3) 278     IPv6 Packet Header (8.3.4) 280 How a Host Routes (8.4) 281     Host Forwarding Decision (8.4.1) 281     Default Gateway (8.4.2) 282     A Host Routes to the Default Gateway (8.4.3) 283     Host Routing Tables (8.4.4) 283 Introduction to Routing (8.5) 285     Router Packet Forwarding Decision (8.5.1) 285     IP Router Routing Table (8.5.2) 286     Static Routing (8.5.3) 287     Dynamic Routing (8.5.4) 288     Introduction to an IPv4 Routing Table (8.5.6) 290 Summary (8.6) 292     Network Layer Characteristics 292     IPv4 Packet 292     IPv6 Packet 292     How a Host Routes 293     Introduction to Routing 293 Practice 294 Check Your Understanding Questions 294 Chapter 9 Address Resolution 297 Objectives 297 Key Terms 297 Introduction (9.0) 298 MAC and IP (9.1) 298     Destination on Same Network (9.1.1) 298     Destination on Remote Network (9.1.2) 299 ARP (9.2) 301     ARP Overview (9.2.1) 301     ARP Functions (9.2.2) 302     Removing Entries from an ARP Table (9.2.6) 306     ARP Tables on Networking Devices (9.2.7) 306     ARP Issues—ARP Broadcasts and ARP Spoofing (9.2.8) 307 IPv6 Neighbor Discovery (9.3) 309     IPv6 Neighbor Discovery Messages (9.3.2) 309     IPv6 Neighbor Discovery—Address Resolution (9.3.3) 311 Summary (9.4) 313     MAC and IP 313     ARP 313     Neighbor Discovery 314 Practice 314 Check Your Understanding Questions 314 Chapter 10 Basic Router Configuration 319 Objectives 319 Introduction (10.0) 320 Configure Initial Router Settings (10.1) 320     Basic Router Configuration Steps (10.1.1) 320     Basic Router Configuration Example (10.1.2) 321 Configure Interfaces (10.2) 323     Configure Router Interfaces (10.2.1) 323     Configure Router Interfaces Example (10.2.2) 324     Verify Interface Configuration (10.2.3) 325     Configuration Verification Commands (10.2.4) 326 Configure the Default Gateway (10.3) 330     Default Gateway on a Host (10.3.1) 331     Default Gateway on a Switch (10.3.2) 332 Summary (10.4) 335     Configure Initial Router Settings 335     Configure Interfaces 335     Configure the Default Gateway 335 Practice 336 Check Your Understanding Questions 337 Chapter 11 IPv4 Addressing 341 Objectives 341 Key Terms 341 Introduction (11.0) 342 IPv4 Address Structure (11.1) 342     Network and Host Portions (11.1.1) 342     The Subnet Mask (11.1.2) 343     The Prefix Length (11.1.3) 344     Determining the Network: Logical AND (11.1.4) 345     Network, Host, and Broadcast Addresses (11.1.6) 347         Network Address 347         Host Addresses 348         Broadcast Address 349 IPv4 Unicast, Broadcast, and Multicast (11.2) 349     Unicast (11.2.1) 349     Broadcast (11.2.2) 350         IP Directed Broadcasts 351     Multicast (11.2.3) 352 Types of IPv4 Addresses (11.3) 353     Public and Private IPv4 Addresses (11.3.1) 353     Routing to the Internet (11.3.2) 354     Special Use IPv4 Addresses (11.3.4) 356         Loopback Addresses 356         Link-Local Addresses 357     Legacy Classful Addressing (11.3.5) 357     Assignment of IP Addresses (11.3.6) 358 Network Segmentation (11.4) 359     Broadcast Domains and Segmentation (11.4.1) 359     Problems with Large Broadcast Domains (11.4.2) 360     Reasons for Segmenting Networks (11.4.3) 362 Subnet an IPv4 Network (11.5) 364     Subnet on an Octet Boundary (11.5.1) 364     Subnet Within an Octet Boundary (11.5.2) 366 Subnet a Slash 16 and a Slash 8 Prefix (11.6) 367     Create Subnets with a Slash 16 Prefix (11.6.1) 367     Create 100 Subnets with a Slash 16 Prefix (11.6.2) 369     Create 1000 Subnets with a Slash 8 Prefix (11.6.3) 372 Subnet to Meet Requirements (11.7) 374     Subnet Private Versus Public IPv4 Address Space (11.7.1) 374         What About the DMZ? 377     Minimize Unused Host IPv4 Addresses and Maximize Subnets (11.7.2) 377     Example: Efficient IPv4 Subnetting (11.7.3) 378 VLSM (11.8) 381     IPv4 Address Conservation (11.8.3) 381     VLSM (11.8.4) 383     VLSM Topology Address Assignment (11.8.5) 386 Structured Design (11.9) 387     IPv4 Network Address Planning (11.9.1) 388     Device Address Assignment (11.9.2) 389 Summary (11.10) 390     IPv4 Addressing Structure 390     IPv4 Unicast, Broadcast, and Multicast 390     Types of IPv4 Addresses 390     Network Segmentation 391     Subnet an IPv4 Network 391     Subnet a /16 and a /8 Prefix 391     Subnet to Meet Requirements 391     Variable-Length Subnet Masking 392     Structured Design 392 Practice 393 Check Your Understanding Questions 393 Chapter 12 IPv6 Addressing 397 Objectives 397 Key Terms 397 Introduction (12.0) 398 IPv4 Issues (12.1) 398     Need for IPv6 (12.1.1) 398     Internet of Things 399     IPv4 and IPv6 Coexistence (12.1.2) 399         Dual Stack 399         Tunneling 400         Translation 401 IPv6 Address Representation (12.2) 401     IPv6 Addressing Formats (12.2.1) 401         Preferred Format 402     Rule 1—Omit Leading Zeros (12.2.2) 403     Rule 2—Double Colon (12.2.3) 404 IPv6 Address Types (12.3) 406     Unicast, Multicast, Anycast (12.3.1) 406     IPv6 Prefix Length (12.3.2) 406     Types of IPv6 Unicast Addresses (12.3.3) 407     A Note About the Unique Local Address (12.3.4) 408     IPv6 GUA (12.3.5) 408     IPv6 GUA Structure (12.3.6) 409         Global Routing Prefix 410         Subnet ID 410         Interface ID 410     IPv6 LLA (12.3.7) 411 GUA and LLA Static Configuration (12.4) 413     Static GUA Configuration on a Router (12.4.1) 413     Static GUA Configuration on a Windows Host (12.4.2) 414     Static Configuration of a Link-Local Unicast Address (12.4.3) 415 Dynamic Addressing for IPv6 GUAs (12.5) 417     RS and RA Messages (12.5.1) 417     Method 1: SLAAC (12.5.2) 418     Method 2: SLAAC and Stateless DHCPv6 (12.5.3) 419     Method 3: Stateful DHCPv6 (12.5.4) 420     EUI-64 Process vs. Randomly Generated (12.5.5) 421     EUI-64 Process (12.5.6) 422     Randomly Generated Interface IDs (12.5.7) 424 Dynamic Addressing for IPv6 LLAs (12.6) 425     Dynamic LLAs (12.6.1) 425     Dynamic LLAs on Windows (12.6.2) 425     Dynamic LLAs on Cisco Routers (12.6.3) 426     Verify IPv6 Address Configuration (12.6.4) 427 IPv6 Multicast Addresses (12.7) 430     Assigned IPv6 Multicast Addresses (12.7.1) 430     Well-Known IPv6 Multicast Addresses (12.7.2) 430     Solicited-Node IPv6 Multicast Addresses (12.7.3) 432 Subnet an IPv6 Network (12.8) 432     Subnet Using the Subnet ID (12.8.1) 432     IPv6 Subnetting Example (12.8.2) 433     IPv6 Subnet Allocation (12.8.3) 434     Router Configured with IPv6 Subnets (12.8.4) 435 Summary (12.9) 436     IPv4 Issues 436     IPv6 Address Representation 436     IPv6 Address Types 436     GUA and LLA Static Configuration 437     Dynamic Addressing for IPv6 GUAs 437     Dynamic Addressing for IPv6 LLAs 437     IPv6 Multicast Addresses 438     Subnet an IPv6 Network 438 Practice 439 Check Your Understanding Questions 439 Chapter 13 ICMP 443 Objectives 443 Introduction (13.0) 444 ICMP Messages (13.1) 444     ICMPv4 and ICMPv6 Messages (13.1.1) 444     Host Reachability (13.1.2) 444     Destination or Service Unreachable (13.1.3) 445     Time Exceeded (13.1.4) 446     ICMPv6 Messages (13.1.5) 446 Ping and Traceroute Tests (13.2) 449     Ping—Test Connectivity (13.2.1) 449     Ping the Loopback (13.2.2) 450     Ping the Default Gateway (13.2.3) 450     Ping a Remote Host (13.2.4) 451     Traceroute—Test the Path (13.2.5) 452         Round-Trip Time (RTT) 453         IPv4 TTL and IPv6 Hop Limit 453 Summary (13.3) 454     ICMP Messages 454     Ping and Traceroute Testing 454 Practice 455 Check Your Understanding Questions 456 Chapter 14 Transport Layer 461 Objectives 461 Key Terms 461 Introduction (14.0) 462 Transportation of Data (14.1) 462     Role of the Transport Layer (14.1.1) 462     Transport Layer Responsibilities (14.1.2) 463     Transport Layer Protocols (14.1.3) 467     Transmission Control Protocol (TCP) (14.1.4) 467     User Datagram Protocol (UDP) (14.1.5) 468     The Right Transport Layer Protocol for the Right Application (14.1.6) 469 TCP Overview (14.2) 470     TCP Features (14.2.1) 470     TCP Header (14.2.2) 471     TCP Header Fields (14.2.3) 471     Applications That Use TCP (14.2.4) 472 UDP Overview (14.3) 473     UDP Features (14.3.1) 473     UDP Header (14.3.2) 474     UDP Header Fields (14.3.3) 474     Applications that use UDP (14.3.4) 475 Port Numbers (14.4) 476     Multiple Separate Communications (14.4.1) 476     Socket Pairs (14.4.2) 477     Port Number Groups (14.4.3) 478     The netstat Command (14.4.4) 479 TCP Communication Process (14.5) 480     TCP Server Processes (14.5.1) 480     TCP Connection Establishment (14.5.2) 483     Session Termination (14.5.3) 484     TCP Three-Way Handshake Analysis (14.5.4) 485 Reliability and Flow Control (14.6) 486     TCP Reliability—Guaranteed and Ordered Delivery (14.6.1) 486     TCP Reliability—Data Loss and Retransmission (14.6.3) 488     TCP Flow Control—Window Size and Acknowledgments (14.6.5) 490     TCP Flow Control—Maximum Segment Size (MSS) (14.6.6) 491     TCP Flow Control—Congestion Avoidance (14.6.7) 493 UDP Communication (14.7) 494     UDP Low Overhead Versus Reliability (14.7.1) 494     UDP Datagram Reassembly (14.7.2) 494     UDP Server Processes and Requests (14.7.3) 495     UDP Client Processes (14.7.4) 495 Summary (14.8) 499     Transportation of Data 499     TCP Overview 499     UDP Overview 499     Port Numbers 499     TCP Communications Process 500     Reliability and Flow Control 500     UDP Communication 501 Practice 501 Check Your Understanding Questions 502 Chapter 15 Application Layer 507 Objectives 507 Key Terms 507 Introduction (15.0) 508 Application, Presentation, and Session (15.1) 508     Application Layer (15.1.1) 508     Presentation and Session Layer (15.1.2) 508     TCP/IP Application Layer Protocols (15.1.3) 510 Peer-to-Peer (15.2) 511     Client-Server Model (15.2.1) 511     Peer-to-Peer Networks (15.2.2) 512     Peer-to-Peer Applications (15.2.3) 513     Common P2P Applications (15.2.4) 514 Web and Email Protocols (15.3) 515     Hypertext Transfer Protocol and Hypertext Markup Language (15.3.1) 515     HTTP and HTTPS (15.3.2) 516     Email Protocols (15.3.3) 518     SMTP, POP, and IMAP (15.3.4) 519         SMTP 519         POP 520         IMAP 521 IP Addressing Services (15.4) 521     Domain Name Service (15.4.1) 522     DNS Message Format (15.4.2) 524     DNS Hierarchy (15.4.3) 525     The nslookup Command (15.4.4) 526     Dynamic Host Configuration Protocol (15.4.6) 527     DHCP Operation (15.4.7) 528 File Sharing Services (15.5) 530     File Transfer Protocol (15.5.1) 530     Server Message Block (15.5.2) 531 Summary 534     Application, Presentation, and Session 534     Peer-to-Peer 534     Web and Email Protocols 534     IP Addressing Services 535     File Sharing Services 535 Practice 536 Check Your Understanding Questions 536 Chapter 16 Network Security Fundamentals 541 Objectives 541 Key Terms 541 Introduction (16.0) 542 Security Threats and Vulnerabilities (16.1) 542     Types of Threats (16.1.1) 542     Types of Vulnerabilities (16.1.2) 543     Physical Security (16.1.3) 545 Network Attacks (16.2) 546     Types of Malware (16.2.1) 546         Viruses 546         Worms 547         Trojan Horses 547     Reconnaissance Attacks (16.2.2) 547     Access Attacks (16.2.3) 548         Password Attacks 548         Trust Exploitation 548         Port Redirection 549         Man-in-the-Middle 549     Denial of Service Attacks (16.2.4) 551         DoS Attack 551         DDoS Attack 551 Network Attack Mitigations (16.3) 552     The Defense-in-Depth Approach (16.3.1) 553     Keep Backups (16.3.2) 553     Upgrade, Update, and Patch (16.3.3) 554     Authentication, Authorization, and Accounting (16.3.4) 555     Firewalls (16.3.5) 555     Types of Firewalls (16.3.6) 557     Endpoint Security (16.3.7) 558 Device Security (16.4) 558     Cisco AutoSecure (16.4.1) 558     Passwords (16.4.2) 559     Additional Password Security (16.4.3) 560     Enable SSH (16.4.4) 561     Disable Unused Services (16.4.5) 563 Summary 565     Security Threats and Vulnerabilities 565     Network Attacks 565     Network Attack Mitigation 565     Device Security 566 Practice 567 Check Your Understanding Questions 567 Chapter 17 Build a Small Network 571 Objectives 571 Key Terms 571 Introduction (17.0) 572 Devices in a Small Network (17.1) 572     Small Network Topologies (17.1.1) 572     Device Selection for a Small Network (17.1.2) 573         Cost 573         Speed and Types of Ports/Interfaces 573         Expandability 573         Operating System Features and Services 574     IP Addressing for a Small Network (17.1.3) 574     Redundancy in a Small Network (17.1.4) 576     Traffic Management (17.1.5) 577 Small Network Applications and Protocols (17.2) 578     Common Applications (17.2.1) 578         Network Applications 578         Application Layer Services 579     Common Protocols (17.2.2) 579     Voice and Video Applications (17.2.3) 582 Scale to Larger Networks (17.3) 583     Small Network Growth (17.3.1) 583     Protocol Analysis (17.3.2) 583     Employee Network Utilization (17.3.3) 584 Verify Connectivity (17.4) 586     Verify Connectivity with Ping (17.4.1) 586     Extended Ping (17.4.2) 588     Verify Connectivity with Traceroute (17.4.3) 590     Extended Traceroute (17.4.4) 592     Network Baseline (17.4.5) 593 Host and IOS Commands (17.5) 596     IP Configuration on a Windows Host (17.5.1) 596     IP Configuration on a Linux Host (17.5.2) 599     IP Configuration on a macOS Host (17.5.3) 600     The arp Command (17.5.4) 601     Common show Commands Revisited (17.5.5) 602     The show cdp neighbors Command (17.5.6) 609     The show ip interface brief Command (17.5.7) 610         Verify Switch Interfaces 611 Troubleshooting Methodologies (17.6) 611     Basic Troubleshooting Approaches (17.6.1) 612     Resolve or Escalate? (17.6.2) 613     The debug Command (17.6.3) 613     The terminal monitor Command (17.6.4) 615 Troubleshooting Scenarios (17.7) 616     Duplex Operation and Mismatch Issues (17.7.1) 617     IP Addressing Issues on IOS Devices (17.7.2) 618     IP Addressing Issues on End Devices (17.7.3) 619     Default Gateway Issues (17.7.4) 619     Troubleshooting DNS Issues (17.7.5) 621 Summary (17.8) 624     Devices in a Small Network 624     Small Network Applications and Protocols 624     Scale to Larger Networks 624     Verify Connectivity 625     Host and IOS Commands 625     Troubleshooting Methodologies 626     Troubleshooting Scenarios 626 Practice 627 Check Your Understanding Questions 628 Appendix A Answers to “Check Your Understanding” Questions 631 Key Terms Glossary 645 9780136633662   TOC   6/3/2020


Best Sellers


Product Details
  • ISBN-13: 9780136633556
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Pearson
  • Language: English
  • ISBN-10: 0136633552
  • Publisher Date: 10 Mar 2021
  • Binding: Digital download
  • No of Pages: 736


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Introduction to Networks Companion Guide (CCNAv7)
Pearson Education (US) -
Introduction to Networks Companion Guide (CCNAv7)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Introduction to Networks Companion Guide (CCNAv7)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA