Networking Essentials Companion Guide v3: Cisco Certified Support Technician (CCST) Networking 100-150

Author:   Cisco Networking Academy
Publisher:   Pearson Education (US)
Edition:   2nd edition
ISBN:  

9780138321338


Pages:   976
Publication Date:   11 March 2024
Format:   Paperback
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Our Price $237.60 Quantity:  
Add to Cart

Share |

Networking Essentials Companion Guide v3: Cisco Certified Support Technician (CCST) Networking 100-150


Add your own review!

Overview

Networking Essentials Companion Guide v3: Cisco Certified Support Technician (CCST) Networking 100-150 is the official supplemental textbook for the Networking Essentials course in the Cisco Networking Academy. Networking is at the heart of the digital transformation. The network is essential to many business functions today, including business-critical data and operations, cybersecurity, and so much more. A wide variety of career paths rely on the network, so it's important to understand what the network can do, how it operates, and how to protect it. This is a great course for developers, data scientists, cybersecurity specialists, and other professionals looking to broaden their networking domain knowledge. It's also an excellent launching point for students pursuing a wide range of career pathways—from cybersecurity to software development to business and more. The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time. The book's features help you focus on important concepts to succeed in this course: Chapter objectives: Review core concepts by answering the focus questions listed at the beginning of each chapter. Key terms: Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter. Glossary: Consult the comprehensive Glossary with more than 250 terms. Summary of Activities and Labs: Maximize your study time with this complete list of all associated practice exercises at the end of each chapter. Check Your Understanding: Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.

Full Product Details

Author:   Cisco Networking Academy
Publisher:   Pearson Education (US)
Imprint:   Cisco Press
Edition:   2nd edition
Dimensions:   Width: 20.00cm , Height: 4.50cm , Length: 23.00cm
Weight:   1.746kg
ISBN:  

9780138321338


ISBN 10:   0138321337
Pages:   976
Publication Date:   11 March 2024
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Table of Contents

Introduction xlii Chapter 1 Communications in a Connected World 1 Objectives 1 Key Terms 1 Introduction (1.0) 2 Network Types (1.1) 2 Everything Is Online (1.1.2) 2 Who Owns “The Internet”? (1.1.3) 2 Local Networks (1.1.4) 3 Small Home Networks 4 Small Office and Home Office Networks 4 Medium to Large Networks 4 Worldwide Networks 6 Mobile Devices (1.1.5) 6 Smartphone 6 Tablet 7 Smartwatch 8 Smart Glasses 8 Connected Home Devices (1.1.6) 8 Security System 8 Appliances 9 Smart TV 10 Gaming Console 11 Other Connected Devices (1.1.7) 11 Smart Cars 11 RFID Tags 12 Sensors and Actuators 13 Medical Devices 13 Data Transmission (1.2) 14 The Bit (1.2.2) 14 Common Methods of Data Transmission (1.2.3) 15 Bandwidth and Throughput (1.3) 17 Bandwidth (1.3.1) 17 Throughput (1.3.2) 18 Communications in a Connected World Summary (1.4) 18 What Did I Learn in This Chapter? (1.4.1) 19 Reflection Questions (1.4.2) 20 Practice 21 Check Your Understanding Questions 21 Chapter 2 Network Components, Types, and Connections 25 Objectives 25 Key Terms 25 Introduction (2.0) 26 Clients and Servers (2.1) 26 Client and Server Roles (2.1.2) 26 Peer-to-Peer Networks (2.1.3) 27 Peer-to-Peer Applications (2.1.4) 28 Multiple Roles in the Network (2.1.5) 29 Network Components (2.2) 30 Network Infrastructure (2.2.2) 30 End Devices (2.2.3) 32 ISP Connectivity Options (2.3) 33 ISP Services (2.3.1) 33 ISP Connections (2.3.2) 34 Cable and DSL Connections (2.3.3) 35 Additional Connectivity Options (2.3.4) 36 Network Components, Types, and Connections Summary (2.4) 37 What Did I Learn in This Chapter? (2.4.1) 37 Reflection Questions (2.4.2) 38 Practice 39 Check Your Understanding Questions 39 Chapter 3 Wireless and Mobile Networks 41 Objectives 41 Key Terms 41 Introduction (3.0) 42 Wireless Networks (3.1) 42 Other Wireless Networks (3.1.3) 43 Global Positioning System 43 Wi-Fi 43 Bluetooth 43 NFC 43 Mobile Device Connectivity (3.2) 44 Mobile Devices and Wi-Fi (3.2.1) 44 Wi-Fi Settings (3.2.2) 44 Configure Mobile Wi-Fi Connectivity (3.2.3) 46 Configure Cellular Data Settings (3.2.4) 47 Android Cellular Data 47 iOS Cellular Data 48 Simple Connectivity with Bluetooth (3.2.6) 49 Bluetooth Pairing (3.2.7) 50 Explore Your Network Settings on Your Mobile Device (3.2.8) 51 Wireless and Mobile Networks Summary (3.3) 52 What Did I Learn in This Chapter? (3.3.1) 52 Reflection Questions (3.3.2) 53 Practice 54 Check Your Understanding Questions 54 Chapter 4 Build a Home Network 57 Objectives 57 Key Terms 57 Introduction (4.0) 58 Home Network Basics (4.1) 58 Components of a Home Network (4.1.2) 58 Typical Home Network Routers (4.1.3) 59 Network Technologies in the Home (4.2) 60 LAN Wireless Frequencies (4.2.1) 61 Wired Network Technologies (4.2.2) 62 Category 5e Cable 62 Coaxial Cable 62 Fiber-Optic Cable 63 Wireless Standards (4.3) 63 Wi-Fi Networks (4.3.1) 64 Wireless Settings (4.3.2) 64 Network Mode 65 Set Up a Home Router (4.4) 66 First Time Setup (4.4.1) 66 Design Considerations (4.4.2) 67 Build a Home Network Summary (4.5) 69 What Did I Learn in This Chapter? (4.5.1) 69 Reflection Questions (4.5.2) 71 Practice 72 Packet Tracer Activities 72 Check Your Understanding Questions 72 Chapter 5 Communication Principles 75 Objectives 75 Key Terms 75 Introduction (5.0) 76 Networking Protocols (5.1) 76 Communication Protocols (5.1.1) 76 Why Protocols Matter (5.1.2) 78 Communication Standards (5.2) 80 The Internet and Standards (5.2.2) 80 Network Standards Organizations (5.2.3) 80 Network Communication Models (5.3) 81 The TCP/IP Model (5.3.3) 81 The OSI Reference Model (5.3.4) 82 OSI Model and TCP/IP Model Comparison (5.3.5) 83 Communication Principles Summary (5.4) 85 What Did I Learn in This Chapter? (5.4.1) 85 Reflection Questions (5.4.2) 87 Practice 88 Check Your Understanding Questions 88 Chapter 6 Network Media 91 Objectives 91 Key Terms 91 Introduction (6.0) 92 Network Media Types (6.1) 92 Three Media Types (6.1.2) 92 Common Network Cables (6.1.3) 93 Twisted-Pair Cable 93 Coaxial Cable 94 Fiber-Optic Cable 95 Network Media Summary (6.2) 95 What Did I Learn in This Chapter? (6.2.1) 95 Reflection Questions (6.2.2) 96 Practice 97 Check Your Understanding Questions 97 Chapter 7 The Access Layer 101 Objectives 101 Key Terms 101 Introduction (7.0) 102 Encapsulation and the Ethernet Frame (7.1) 102 Encapsulation (7.1.2) 102 The Access Layer (7.2) 104 Ethernet Frame (7.2.1) 104 Access Layer Devices (7.2.2) 105 Ethernet Hubs (7.2.3) 106 Ethernet Switches (7.2.4) 107 The MAC Address Table (7.2.5) 109 The Access Layer Summary (7.3) 111 What Did I Learn in This Chapter? (7.3.1) 111 Reflection Questions (7.3.2) 113 Practice 114 Check Your Understanding Questions 114 Chapter 8 The Internet Protocol 117 Objectives 117 Introduction (8.0) 118 Purpose of an IPv4 Address (8.1) 118 The IPv4 Address (8.1.1) 118 Octets and Dotted-Decimal Notation (8.1.2) 119 The IPv4 Address Structure (8.2) 119 Networks and Hosts (8.2.2) 119 Summary (8.3) 121 What Did I Learn in This Chapter? (8.3.1) 121 Reflection Questions (8.3.2) 121 Practice 122 Packet Tracer Activities 122 Check Your Understanding Questions 122 Chapter 9 IPv4 and Network Segmentation 125 Objectives 125 Key Terms 125 Introduction (9.0) 126 IPv4 Unicast, Broadcast, and Multicast (9.1) 126 Unicast (9.1.2) 126 Broadcast (9.1.4) 127 Multicast (9.1.6) 129 Types of IPv4 Addresses (9.2) 130 Public and Private IPv4 Addresses (9.2.1) 130 Routing to the Internet (9.2.2) 131 Special-Use IPv4 Addresses (9.2.4) 132 Loopback Addresses 132 Link-Local addresses 133 Legacy Classful Addressing (9.2.5) 133 Assignment of IP Addresses (9.2.6) 134 Network Segmentation (9.3) 135 Broadcast Domains and Segmentation (9.3.2) 136 Problems with Large Broadcast Domains (9.3.3) 137 Reasons for Segmenting Networks (9.3.4) 138 IPv4 and Network Segmentation Summary (9.4) 140 What Did I Learn in This Chapter? (9.4.1) 140 Reflection Questions (9.4.2) 143 Practice 144 Check Your Understanding Questions 144 Chapter 10 IPv6 Addressing Formats and Rules 147 Objectives 147 Key Terms 147 Introduction (10.0) 148 IPv4 Issues (10.1) 148 The Need for IPv6 (10.1.1) 148 Internet of Things 149 IPv4 and IPv6 Coexistence (10.1.2) 150 Dual Stack 150 Tunneling 150 Translation 151 IPv6 Addressing (10.2) 152 Hexadecimal Number System (10.2.1) 152 IPv6 Addressing Formats (10.2.2) 152 Preferred Format 153 Rule 1—Omit Leading Zeros (10.2.4) 153 Rule 2—Double Colon (10.2.5) 155 IPv6 Addressing Formats and Rules Summary (10.3) 156 What Did I Learn in This Chapter? (10.3.1) 157 Reflection Questions (10.3.2) 158 Practice 159 Check Your Understanding Questions 159 Chapter 11 Dynamic Addressing with DHCP 163 Objectives 163 Key Term 163 Introduction (11.0) 164 Static and Dynamic Addressing (11.1) 164 Static IPv4 Address Assignment (11.1.1) 164 Dynamic IPv4 Address Assignment (11.1.2) 165 DHCP Servers (11.1.3) 166 DHCPv4 Configuration (11.2) 167 DHCPv4 Operation (11.2.1) 168 DHCP Service Configuration (11.2.3) 169 Dynamic Addressing with DHCP Summary (11.3) 170 What Did I Learn in This Chapter? (11.3.1) 170 Reflection Questions (11.3.2) 171 Practice 172 Packet Tracer Activities 172 Check Your Understanding Questions 172 Chapter 12 Gateways to Other Networks 175 Objectives 175 Key Term 175 Introduction (12.0) 176 Network Boundaries (12.1) 176 Routers as Gateways (12.1.2) 176 Routers as Boundaries Between Networks (12.1.3) 177 Network Address Translation (12.2) 178 NAT Operation (12.2.1) 179 Gateways to Other Networks Summary (12.3) 180 What Did I Learn in This Chapter? (12.3.1) 180 Reflection Questions (12.3.2) 181 Practice 182 Packet Tracer Activities 182 Check Your Understanding Questions 182 Chapter 13 The ARP Process 185 Objectives 185 Key Term 185 Introduction (13.0) 186 MAC and IP (13.1) 186 Destination on Same Network (13.1.1) 186 Destination on Remote Network (13.1.2) 187 Broadcast Containment (13.2) 189 Broadcast Domains (13.2.2) 190 Access Layer Communication (13.2.3) 191 ARP (13.2.5) 192 The ARP Process Summary (13.3) 193 What Did I Learn in This Chapter? (13.3.1) 193 Reflection Questions (13.3.2) 194 Practice 195 Packet Tracer Activities 195 Check Your Understanding Questions 195 Chapter 14 Routing Between Networks 199 Objectives 199 Key Terms 199 Introduction (14.0) 200 The Need for Routing (14.1) 200 Now We Need Routing (14.1.2) 200 The Routing Table (14.2) 201 Routing Table Entries (14.2.4) 202 The Default Gateway (14.2.5) 203 Create a LAN (14.3) 204 Local Area Networks (14.3.1) 205 Local and Remote Network Segments (14.3.2) 205 All Hosts in One Local Segment 206 Hosts on a Remote Segment 206 Routing Between Networks Summary (14.4) 208 What Did I Learn in This Chapter? (14.4.1) 208 Reflection Questions (14.4.2) 210 Practice 211 Packet Tracer Activities 211 Check Your Understanding Questions 211 Chapter 15 TCP and UDP 215 Objectives 215 Key Terms 215 Introduction (15.0) 216 TCP and UDP (15.1) 216 Protocol Operations (15.1.1) 216 TCP and UDP (15.1.2) 217 TCP Reliability (15.1.3) 218 UDP Best Effort Delivery (15.1.4) 218 Port Numbers (15.2) 219 TCP and UDP Port Numbers (15.2.1) 219 Socket Pairs (15.2.2) 222 The netstat Command (15.2.3) 223 TCP and UDP Summary (15.3) 224 What Did I Learn in This Chapter? (15.3.1) 224 Reflection Questions (15.3.2) 225 Practice 226 Check Your Understanding Questions 226 Chapter 16 Application Layer Services 229 Objectives 229 Key Terms 229 Introduction (16.0) 230 The Client-Server Relationship (16.1) 230 Client and Server Interaction (16.1.1) 230 Client Requests a Web Page (16.1.2) 231 URI, URN, and URL (16.1.3) 232 Network Application Services (16.2) 233 Common Network Application Services (16.2.1) 233 Domain Name System (16.3) 234 Domain Name Translation (16.3.1) 234 DNS Servers (16.3.2) 235 A Note About Syntax Checker Activities (16.3.3) 236 Web Clients and Servers (16.4) 236 HTTP and HTML (16.4.2) 237 FTP Clients and Servers (16.5) 238 File Transfer Protocol (16.5.1) 238 Virtual Terminals (16.6) 239 Telnet (16.6.2) 240 Security Issues with Telnet (16.6.3) 241 Email and Messaging (16.7) 242 Email Clients and Servers (16.7.1) 242 Email Protocols (16.7.2) 242 Simple Mail Transfer Protocol (SMTP) 243 Post Office Protocol (POP3) 243 Internet Message Access Protocol (IMAP4) 243 Text Messaging (16.7.3) 244 Internet Phone Calls (16.7.4) 245 Application Layer Services Summary (16.8) 245 What Did I Learn in This Chapter? (16.8.1) 245 Reflection Questions (16.8.2) 248 Practice 249 Packet Tracer Activities 249 Check Your Understanding Questions 249 Chapter 17 Network Testing Utilities 253 Objectives 253 Key Terms 253 Introduction (17.0) 254 Troubleshooting Commands (17.1) 254 Overview of Troubleshooting Commands (17.1.1) 254 The ipconfig Command (17.1.2) 254 The ping Command (17.1.4) 258 Ping Results (17.1.5) 259 Network Testing Utilities Summary (17.2) 260 What Did I Learn in This Chapter? (17.2.1) 260 Reflection Questions (17.2.2) 261 Practice 262 Packet Tracer Activities 262 Check Your Understanding Questions 262 Chapter 18 Network Design 265 Objectives 265 Key Terms 265 Introduction (18.0) 266 Reliable Networks (18.1) 266 Network Architecture (18.1.1) 266 Fault Tolerance (18.1.3) 267 Scalability (18.1.4) 267 Quality of Service (18.1.5) 269 Network Security (18.1.6) 270 Hierarchical Network Design (18.2) 271 Physical and Logical Addresses (18.2.1) 271 Hierarchical Analogy (18.2.4) 272 Access, Distribution, and Core (18.2.6) 273 Access Layer 273 Distribution Layer 274 Core Layer 274 Network Design Summary (18.3) 275 What Did I Learn in This Chapter? (18.3.1) 275 Reflection Questions (18.3.2) 276 Practice 277 Labs 277 Check Your Understanding Questions 277 Chapter 19 Cloud and Virtualization 281 Objectives 281 Key Terms 281 Introduction (19.0) 282 Cloud and Cloud Services (19.1) 282 Types of Clouds (19.1.2) 282 Cloud Services (19.1.3) 283 Cloud Computing and Virtualization (19.1.4) 284 Virtualization (19.2) 285 Advantages of Virtualization (19.2.1) 285 Hypervisors (19.2.2) 286 Type 1 Hypervisor—“Bare Metal” Approach 286 Type 2 Hypervisor—“Hosted” Approach 286 Cloud and Virtualization Summary (19.3) 287 What Did I Learn in This Chapter? (19.3.1) 287 Reflection Questions (19.3.2) 289 Practice 290 Labs 290 Check Your Understanding Questions 290 Chapter 20 Number Systems 293 Objectives 293 Key Terms 293 Introduction (20.0) 294 Binary Number System (20.1) 294 Binary and IPv4 Addresses (20.1.1) 294 Decimal to Binary Conversion (20.1.5) 296 Decimal to Binary Conversion Example (20.1.6) 300 IPv4 Addresses (20.1.9) 307 Hexadecimal Number System (20.2) 308 Hexadecimal and IPv6 Addresses (20.2.1) 308 Number Systems Summary (20.3) 311 What Did I Learn in This Chapter? (20.3.1) 311 Reflection Questions (20.3.2) 311 Practice 312 Check Your Understanding Questions 312 Chapter 21 Ethernet Switching 315 Objectives 315 Key Terms 315 Introduction (21.0) 316 Ethernet (21.1) 316 The Rise of Ethernet (21.1.1) 316 Ethernet Evolution (21.1.2) 317 Ethernet Frames (21.2) 318 Ethernet Encapsulation (21.2.1) 318 Data Link Sublayers (21.2.2) 319 MAC Sublayer (21.2.3) 320 Data Encapsulation 321 Accessing the Media 321 Ethernet Frame Fields (21.2.4) 322 Ethernet MAC Address (21.3) 324 MAC Address and Hexadecimal (21.3.1) 324 Unicast MAC Address (21.3.2) 326 Broadcast MAC Address (21.3.3) 327 Multicast MAC Address (21.3.4) 328 The MAC Address Table (21.4) 330 Switch Fundamentals (21.4.1) 330 Switch Learning and Forwarding (21.4.2) 331 Examine the Source MAC Address 331 Find the Destination MAC Address 332 Filtering Frames (21.4.3) 333 Ethernet Switching Summary (21.5) 336 What Did I Learn in This Chapter? (21.5.1) 336 Reflection Questions (21.5.2) 338 Practice 339 Labs 339 Check Your Understanding Questions 339 Chapter 22 Network Layer 343 Objectives 343 Key Terms 343 Introduction (22.0) 344 Network Layer Characteristics (22.1) 344 The Network Layer (22.1.2) 344 IP Encapsulation (22.1.3) 346 Characteristics of IP (22.1.4) 347 Connectionless (22.1.5) 347 Best Effort (22.1.6) 348 Media Independent (22.1.7) 349 IPv4 Packet (22.2) 350 IPv4 Packet Header (22.2.1) 350 IPv4 Packet Header Fields (22.2.2) 350 IPv6 Packet (22.3) 352 Limitations of IPv4 (22.3.1) 352 IPv6 Overview (22.3.2) 353 IPv4 Packet Header Fields in the IPv6 Packet Header (22.3.3) 354 IPv6 Packet Header (22.3.4) 356 Network Layer Summary (22.4) 357 What Did I Learn in This Chapter? (22.4.1) 357 Reflection Questions (22.4.2) 358 Practice 359 Check Your Understanding Questions 359 Chapter 23 IPv4 Address Structure 363 Objectives 363 Key Terms 363 Introduction (23.0) 364 IPv4 Address Structure (23.1) 364 Network and Host Portions (23.1.1) 364 The Subnet Mask (23.1.2) 365 The Prefix Length (23.1.3) 366 Determining the Network: Logical AND (23.1.4) 367 IPv4 Address Structure Summary (23.2) 369 What Did I Learn in This Chapter? (23.2.1) 369 Reflection Questions (23.2.2) 370 Practice 371 Check Your Understanding Questions 371 Chapter 24 Address Resolution 375 Objectives 375 Key Terms 375 Introduction (24.0) 376 ARP (24.1) 376 ARP Overview (24.1.1) 376 ARP Functions (24.1.2) 377 Removing Entries from an ARP Table (24.1.6) 380 ARP Tables on Devices (24.1.7) 381 ARP Issues—ARP Broadcasts and ARP Spoofing (24.1.8) 382 Address Resolution Summary (24.2) 384 What Did I Learn in This Chapter? (24.2.1) 384 Reflection Questions (24.2.2) 385 Practice 386 Labs 386 Packet Tracer Activities 386 Check Your Understanding Questions 386 Chapter 25 IP Addressing Services 391 Objectives 391 Key Terms 391 Introduction (25.0) 392 DNS Services (25.1) 392 Domain Name System (25.1.2) 392 DNS Message Format (25.1.3) 395 DNS Hierarchy (25.1.4) 395 The nslookup Command (25.1.5) 397 DHCP Services (25.2) 398 Dynamic Host Configuration Protocol (25.2.1) 398 DHCP Messages (25.2.3) 399 IP Addressing Services Summary (25.3) 401 What Did I Learn in This Chapter? (25.3.1) 401 Reflection Questions (25.3.2) 402 Practice 403 Labs 403 Check Your Understanding Questions 403 Chapter 26 Transport Layer 407 Objectives 407 Key Terms 407 Introduction (26.0) 408 Transportation of Data (26.1) 408 Role of the Transport Layer (26.1.1) 408 Transport Layer Responsibilities (26.1.2) 409 Transport Layer Protocols (26.1.3) 413 Transmission Control Protocol (TCP) (26.1.4) 413 User Datagram Protocol (UDP) (26.1.5) 414 The Right Transport Layer Protocol for the Right Application (26.1.6) 415 TCP Overview (26.2) 417 TCP Features (26.2.1) 417 TCP Header (26.2.2) 418 TCP Header Fields (26.2.3) 418 Applications That Use TCP (26.2.4) 419 UDP Overview (26.3) 420 UDP Features (26.3.1) 420 UDP Header (26.3.2) 420 UDP Header Fields (26.3.3) 421 Applications That Use UDP (26.3.4) 421 Port Numbers (26.4) 422 Multiple Separate Communications (26.4.1) 422 Socket Pairs (26.4.2) 423 Port Number Groups (26.4.3) 424 The netstat Command (26.4.4) 426 TCP Communication Process (26.5) 427 TCP Server Processes (26.5.1) 427 TCP Connection Establishment (26.5.2) 430 Session Termination (26.5.3) 431 TCP Three-Way Handshake Analysis (26.5.4) 432 Reliability and Flow Control (26.6) 433 TCP Reliability—Guaranteed and Ordered Delivery (26.6.1) 433 TCP Reliability—Data Loss and Retransmission (26.6.3) 435 TCP Flow Control—Window Size and Acknowledgments (26.6.5) 437 TCP Flow Control—Maximum Segment Size (MSS) (26.6.6) 439 TCP Flow Control—Congestion Avoidance (26.6.7) 440 UDP Communication (26.7) 441 UDP Low Overhead Versus Reliability (26.7.1) 441 UDP Datagram Reassembly (26.7.2) 441 UDP Server Processes and Requests (26.7.3) 443 UDP Client Processes (26.7.4) 443 Transport Layer Summary (26.8) 447 What Did I Learn in This Chapter? (26.8.2) 447 Reflection Questions (26.8.3) 449 Practice 450 Packet Tracer Activities 450 Check Your Understanding Questions 450 Chapter 27 The Cisco IOS Command Line 455 Objectives 455 Key Terms 455 Introduction (27.0) 456 Navigate the IOS (27.1) 456 The Cisco IOS Command-Line Interface (27.1.1) 456 Primary Command Modes (27.1.2) 457 A Note About Syntax Checker Activities (27.1.5) 458 The Command Structure (27.2) 458 Basic IOS Command Structure (27.2.1) 458 IOS Command Syntax (27.2.2) 459 Hotkeys and Shortcuts (27.2.4) 460 View Device Information (27.3) 462 show Commands (27.3.2) 463 The Cisco IOS Command Line Summary (27.4) 469 What Did I Learn in This Chapter? (27.4.1) 469 Reflection Questions (27.4.2) 471 Practice 472 Packet Tracer Activities 472 Check Your Understanding Questions 472 Chapter 28 Build a Small Cisco Network 475 Objectives 475 Key Term 475 Introduction (28.0) 476 Basic Switch Configuration (28.1) 476 Basic Switch Configuration Steps (28.1.1) 476 Switch Virtual Interface Configuration (28.1.2) 478 Configure Initial Router Settings (28.2) 479 Basic Router Configuration Steps (28.2.1) 479 Basic Router Configuration Example (28.2.2) 480 Secure the Devices (28.3) 482 Password Recommendations (28.3.1) 482 Secure Remote Access (28.3.2) 483 Enable SSH (28.3.3) 485 Verify SSH (28.3.5) 487 Connecting the Switch to the Router (28.4) 488 Default Gateway for a Host (28.4.1) 488 Default Gateway on a Switch (28.4.2) 490 Build a Small Cisco Network Summary (28.5) 492 What Did I Learn in This Chapter? (28.5.1) 492 Reflection Questions (28.5.2) 495 Practice 496 Packet Tracer Activities 496 Check Your Understanding Questions 496 Chapter 29 ICMP 499 Objectives 499 Introduction (29.0) 500 ICMP Messages (29.1) 500 ICMPv4 and ICMPv6 Messages (29.1.1) 500 Host Reachability (29.1.2) 500 Destination or Service Unreachable (29.1.3) 501 Time Exceeded (29.1.4) 502 ICMPv6 Messages (29.1.5) 502 Ping and Traceroute Tests (29.2) 505 Ping—Test Connectivity (29.2.1) 505 Ping the Local Loopback (29.2.2) 506 Ping the Default Gateway (29.2.3) 507 Ping a Remote Host (29.2.4) 508 Traceroute—Test the Path (29.2.5) 509 Round-Trip Time (RTT) 509 IPv4 TTL and IPv6 Hop Limit 509 ICMP Summary (29.3) 511 What Did I Learn in This Chapter? (29.3.2) 511 Reflection Questions (29.3.3) 513 Practice 514 Packet Tracer Activities 514 Check Your Understanding Questions 514 Chapter 30 Physical Layer 519 Objectives 519 Key Terms 519 Introduction (30.0) 520 Purpose of the Physical Layer (30.1) 520 The Physical Connection (30.1.1) 520 The Physical Layer Process (30.1.2) 522 Physical Layer Characteristics (30.2) 523 Physical Layer Standards (30.2.1) 523 Physical Components (30.2.2) 525 Encoding (30.2.3) 525 Signaling (30.2.4) 525 Bandwidth (30.2.6) 527 Bandwidth Terminology (30.2.7) 528 Latency 528 Throughput 529 Goodput 529 Copper Cabling (30.3) 529 Characteristics of Copper Cabling (30.3.1) 529 Types of Copper Cabling (30.3.2) 531 Unshielded Twisted-Pair (UTP) (30.3.3) 531 Shielded Twisted-Pair (STP) (30.3.4) 533 Coaxial Cable (30.3.5) 533 UTP Cabling (30.4) 535 Properties of UTP Cabling (30.4.1) 535 UTP Cabling Standards and Connectors (30.4.2) 536 Straight-Through and Crossover UTP Cables (30.4.3) 539 Fiber-Optic Cabling (30.5) 541 Properties of Fiber-Optic Cabling (30.5.1) 541 Types of Fiber Media (30.5.2) 541 Single-Mode Fiber 541 Multimode Fiber 542 Fiber-Optic Cabling Usage (30.5.3) 543 Fiber-Optic Connectors (30.5.4) 543 Fiber Patch Cords (30.5.5) 545 Fiber Versus Copper (30.5.6) 547 Summary (30.6) 548 What Did I Learn in This Chapter? (30.6.1) 548 Reflection Questions (30.6.2) 550 Practice 551 Check Your Understanding Questions 551 Chapter 31 Data Link Layer 555 Objectives 555 Key Terms 555 Introduction (31.0) 556 Topologies (31.1) 556 Physical and Logical Topologies (31.1.1) 556 WAN Topologies (31.1.2) 558 Point-to-Point 558 Hub and Spoke 558 Mesh 559 Point-to-Point WAN Topology (31.1.4) 559 LAN Topologies (31.1.5) 560 Legacy LAN Topologies 560 Media Access Control Methods (31.2) 561 Half- and Full-Duplex Communication (31.2.1) 562 Half-Duplex Communication 562 Full-Duplex Communication 562 Access Control Methods (31.2.2) 563 Contention-Based Access 563 Controlled Access 564 Contention-Based Access—CSMA/CD (31.2.3) 564 Contention-Based Access—CSMA/CA (31.2.4) 566 Summary (31.3) 568 What Did I Learn in This Chapter? (31.3.1) 568 Reflection Questions (31.3.2) 568 Practice 569 Check Your Understanding Questions 569 Chapter 32 Routing at the Network Layer 571 Objectives 571 Key Terms 571 Introduction (32.0) 572 How a Host Routes (32.1) 572 Host Forwarding Decision (32.1.1) 572 Default Gateway (32.1.2) 574 A Host Routes to the Default Gateway (32.1.3) 574 Host Routing Tables (32.1.4) 575 Routing Tables (32.2) 576 Router Packet Forwarding Decision (32.2.1) 576 IP Router Routing Table (32.2.2) 577 Static Routing (32.2.3) 579 Dynamic Routing (32.2.4) 580 Introduction to an IPv4 Routing Table (32.2.6) 582 Summary (32.3) 582 What Did I Learn in This Chapter? (32.3.1) 582 Reflection Questions (32.3.2) 583 Practice 584 Check Your Understanding Questions 584 Chapter 33 IPv6 Addressing 587 Objectives 587 Key Terms 587 Introduction (33.0) 588 IPv6 Address Types (33.1) 588 Unicast, Multicast, Anycast (33.1.1) 588 IPv6 Prefix Length (33.1.2) 588 Types of IPv6 Unicast Addresses (33.1.3) 589 A Note About the Unique Local Address (33.1.4) 590 IPv6 GUA (33.1.5) 591 IPv6 GUA Structure (33.1.6) 592 Global Routing Prefix 592 Subnet ID 592 Interface ID 593 IPv6 LLA (33.1.7) 593 GUA and LLA Static Configuration (33.2) 595 Static GUA Configuration on a Router (33.2.1) 595 Static GUA Configuration on a Windows Host (33.2.2) 596 Static Configuration of a Link-Local Unicast Address (33.2.3) 598 Dynamic Addressing for IPv6 GUAs (33.3) 599 RS and RA Messages (33.3.1) 599 Method 1: SLAAC (33.3.2) 601 Method 2: SLAAC and Stateless DHCPv6 (33.3.3) 602 Method 3: Stateful DHCPv6 (33.3.4) 603 EUI-64 Process vs. Randomly Generated (33.3.5) 604 EUI-64 Process (33.3.6) 605 Randomly Generated Interface IDs (33.3.7) 606 Dynamic Addressing for IPv6 LLAs (33.4) 607 Dynamic LLAs (33.4.1) 607 Dynamic LLAs on Windows (33.4.2) 608 Dynamic LLAs on Cisco Routers (33.4.3) 609 Verify IPv6 Address Configuration (33.4.4) 609 IPv6 Multicast Addresses (33.5) 612 Assigned IPv6 Multicast Addresses (33.5.1) 612 Well-Known IPv6 Multicast Addresses (33.5.2) 613 Solicited-Node IPv6 Multicast Addresses (33.5.3) 614 Summary (33.6) 615 What Did I Learn in This Chapter? (33.6.1) 615 Reflection Questions (33.6.2) 616 Practice 617 Packet Tracer Activities 617 Check Your Understanding Questions 617 Chapter 34 IPv6 Neighbor Discovery 621 Objectives 621 Key Terms 621 Introduction (34.0) 622 Neighbor Discovery Operation (34.1) 622 IPv6 Neighbor Discovery Messages (34.1.2) 622 IPv6 Neighbor Discovery—Address Resolution (34.1.3) 623 Summary (34.2) 625 What Did I Learn in This Chapter? (34.2.1) 625 Practice 626 Packet Tracer Activities 626 Check Your Understanding Questions 626 Chapter 35 Cisco Switches and Routers 629 Objectives 629 Key Terms 629 Introduction (35.0) 630 Cisco Switches (35.1) 630 Connect More Devices (35.1.1) 630 Cisco LAN Switches (35.1.2) 631 Type of Ports 632 Speed Required 632 Expandability 633 Manageability 633 LAN Switch Components (35.1.5) 634 Switch Speeds and Forwarding Methods (35.2) 635 Frame Forwarding Methods on Cisco Switches (35.2.1) 635 Cut-Through Switching (35.2.2) 636 Memory Buffering on Switches (35.2.3) 638 Duplex and Speed Settings (35.2.4) 638 Auto-MDIX (35.2.5) 640 Switch Boot Process (35.3) 641 Power Up the Switch (35.3.1) 642 In-Band and Out-of-Band Management (35.3.3) 644 Out-of-Band Management 644 In-Band Management 644 IOS Startup Files (35.3.4) 645 Cisco Routers (35.4) 646 Router Components (35.4.2) 646 Router Interface Ports (35.4.3) 647 Router Boot Process (35.5) 648 Power Up the Router (35.5.1) 648 Management Ports (35.5.2) 651 Summary (35.6) 653 What Did I Learn in This Chapter? (35.6.1) 653 Reflection Questions (35.6.2) 654 Practice 655 Check Your Understanding Questions 655 Chapter 36 Troubleshoot Common Network Problems 659 Objectives 659 Introduction (36.0) 660 The Troubleshooting Process (36.1) 660 Network Troubleshooting Overview (36.1.2) 660 Gather Information (36.1.3) 660 Structured Troubleshooting Methods (36.1.4) 662 Bottom-Up 662 Top-Down 663 Divide-and-Conquer 664 Follow-the-Path 664 Substitution 665 Comparison 665 Educated Guess 665 Guidelines for Selecting a Troubleshooting Method (36.1.5) 665 Physical Layer Problems (36.2) 667 Common Layer 1 Problems (36.2.1) 667 The Sense of Sight 667 The Senses of Smell and Taste 668 The Sense of Touch 668 The Sense of Hearing 668 Wireless Router LEDs (36.2.2) 668 Cabling Problems (36.2.3) 670 Troubleshoot Wireless Issues (36.3) 671 Causes of Wireless Issues (36.3.1) 671 Authentication and Association Errors (36.3.2) 672 Common Internet Connectivity Issues (36.4) 674 DHCP Server Configuration Errors (36.4.1) 674 Check Internet Configuration (36.4.2) 674 Check Firewall Settings (36.4.3) 677 Divide and Conquer with ping (36.4.5) 678 The tracert Command (36.4.6) 678 The netstat Command (36.4.7) 680 The nslookup Command (36.4.8) 682 Customer Support (36.5) 683 Sources of Help (36.5.1) 683 When to Call for Help (36.5.2) 684 Support Desk Interaction (36.5.3) 685 Issue Resolution (36.5.4) 686 Support Desk Tickets and Work Orders (36.5.5) 686 Troubleshoot Common Network Problems Summary (36.6) 688 What Did I Learn in This Chapter? (36.6.1) 688 Practice 692 Packet Tracer Activities 692 Check Your Understanding Questions 692 Chapter 37 Network Support 697 Objectives 697 Key Terms 697 Introduction (37.0) 698 Diagnostics and Troubleshooting Methodologies (37.1) 698 Troubleshooting Process Review (37.1.1) 698 Seven-Step Troubleshooting Process (37.1.2) 699 Define the Problem 699 Gather Information 700 Analyze Information 700 Eliminate Possible Causes 700 Propose Hypothesis 700 Test Hypothesis 700 Solve the Problem 700 Troubleshooting with Layered Models (37.1.3) 701 Structured Troubleshooting Methods (37.1.4) 701 Guidelines for Selecting a Troubleshooting Method (37.1.5) 702 Document Findings, Actions, and Outcomes (37.1.6) 703 Network Documentation (37.2) 704 Documentation Overview (37.2.1) 704 Network Topologies and Descriptions (37.2.2) 704 PAN 704 LAN 705 VLAN 706 WLAN 706 WMN 707 CAN 708 MAN 708 WAN 709 VPN 710 Enterprise Network Topologies (37.2.4) 710 Network Cloud Services and Applications (37.2.5) 713 SaaS (Software as a Service) 713 PaaS (Platform as a Service) 713 IaaS (Infrastructure as a Service) 714 XaaS (Anything/Everything as a Service) 714 Wireless Standards (37.2.6) 714 Licensed and Unlicensed Bands 716 Network Device Documentation (37.2.8) 717 Router Device Documentation 717 LAN Switch Device Documentation 717 End-System Documentation 718 Establish a Network Baseline (37.2.9) 718 Cisco Discovery Protocol (CDP) Overview (37.2.10) 719 Discover Devices Using CDP (37.2.11) 720 Help Desks (37.3) 723 The Security Policy (37.3.1) 723 Help Desks (37.3.2) 725 Ticketing Systems (37.3.3) 727 Question End Users (37.3.4) 729 Active Listening (37.3.6) 731 Gather Information for Host-Related Tickets (37.3.8) 733 Beep Codes 733 BIOS Information 733 Event Viewer 733 Device Manager 734 Task Manager 735 Diagnostic Tools 736 Gather Information for Cisco Device-Related Tickets (37.3.9) 736 Analyze the Information (37.3.10) 737 Troubleshoot Endpoint Connectivity (37.4) 738 Windows Network Setup (37.4.1) 738 Verify Connectivity in Windows (37.4.2) 740 Linux Network Setup (37.4.3) 741 Verify Connectivity in Linux (37.4.4) 742 macOS Network Setup (37.4.5) 743 Verify Connectivity in macOS (37.4.6) 744 Set Up and Verify Networking in iOS (37.4.7) 746 Set Up and Verify Networking in Android (37.4.8) 747 Troubleshoot a Network (37.5) 750 Network Devices as Sources of Network Information (37.5.1) 750 Packet Capture and Protocol Analysis (37.5.2) 752 Measuring Network Throughput (37.5.5) 754 Troubleshoot Connectivity Remotely (37.6) 755 Supporting Remote Users (37.6.1) 756 Remote Access with Telnet, SSH, and RDP (37.6.2) 757 Understanding VPNs (37.6.4) 760 Site-to-Site VPN 760 Remote-Access VPN 761 Network Management Systems (37.6.5) 763 Network Support Summary (37.7) 765 What Did I Learn in This Chapter? (37.7.1) 765 Reflection Questions (37.7.2) 769 Practice 770 Labs 770 Packet Tracer Activities 770 Check Your Understanding Questions 770 Chapter 38 Cybersecurity Threats, Vulnerabilities, and Attacks 775 Objectives 775 Key Terms 775 Introduction (38.0) 776 Common Threats (38.1) 776 Threat Domains (38.1.1) 776 Types of Cyber Threats (38.1.2) 777 Internal vs. External Threats (38.1.3) 777 User Threats and Vulnerabilities (38.1.5) 778 Threats to Devices (38.1.6) 780 Threats to the Local Area Network (38.1.7) 780 Threats to the Private Cloud (38.1.8) 781 Threats to the Public Cloud (38.1.9) 781 Threats to Applications (38.1.10) 781 Threat Complexity (38.1.12) 782 Backdoors and Rootkits (38.1.13) 782 Backdoors 782 Rootkits 783 Threat Intelligence and Research Sources (38.1.14) 783 The Dark Web 783 Indicator of Compromise (IOC) 783 Automated Indicator Sharing (AIS) 783 Deception (38.2) 784 Social Engineering (38.2.1) 784 Pretexting 784 Something for Something (Quid Pro Quo) 784 Identity Fraud 784 Social Engineering Tactics (38.2.2) 785 Shoulder Surfing and Dumpster Diving (38.2.4) 786 Impersonation and Hoaxes (38.2.5) 786 Impersonation 786 Hoaxes 786 Piggybacking and Tailgating (38.2.6) 787 Other Methods of Deception (38.2.7) 787 Defending Against Deception (38.2.9) 788 Cyber Attacks (38.3) 788 Malware (38.3.1) 788 Viruses 789 Worms 789 Trojan Horse 789 Logic Bombs (38.3.2) 789 Ransomware (38.3.3) 790 Denial of Service Attacks (38.3.4) 790 Overwhelming Quantity of Traffic 790 Maliciously Formatted Packets 791 Domain Name System (38.3.5) 791 Domain Reputation 791 DNS Spoofing 791 Domain Hijacking 791 Uniform Resource Locator (URL) Redirection 792 Layer 2 Attacks (38.3.6) 792 Spoofing 792 MAC Flooding 792 Man-in-the-Middle and Man-in-the-Mobile Attacks (38.3.8) 793 Man-in-the-Middle (MitM) 793 Man-in-the-Mobile (MitMo) 793 Zero-Day Attacks (38.3.9) 793 Keyboard Logging (38.3.10) 793 Defending Against Attacks (38.3.12) 794 Wireless and Mobile Device Attacks (38.4) 794 Grayware and SMiShing (38.4.1) 794 Rogue Access Points (38.4.2) 795 Radio Frequency Jamming (38.4.3) 795 Bluejacking and Bluesnarfing (38.4.4) 796 Bluejacking 796 Bluesnarfing 796 Attacks Against Wi-Fi Protocols (38.4.5) 796 Wi-Fi and Mobile Defense (38.4.6) 797 Application Attacks (38.5) 797 Cross-Site Scripting (38.5.1) 797 Code Injection (38.5.2) 798 XML Injection Attack 798 SQL Injection Attack 798 DLL Injection Attack 798 LDAP Injection Attack 798 Buffer Overflow (38.5.3) 799 Remote Code Executions (38.5.4) 799 Other Application Attacks (38.5.5) 799 Defending Against Application Attacks (38.5.7) 801 Spam (38.5.8) 801 Phishing (38.5.9) 802 Phishing 802 Spear Phishing 802 Vishing, Pharming, and Whaling (38.5.10) 802 Vishing 802 Pharming 803 Whaling 803 Defending Against Email and Browser Attacks (38.5.12) 803 Physical Attacks 804 Adversarial Artificial Intelligence Attacks 804 Supply Chain Attacks 804 Cloud-Based Attacks 804 Cybersecurity Threats, Vulnerabilities, and Attacks Summary (38.6) 805 What Did I Learn in This Chapter? (38.6.1) 805 Reflection Questions (38.6.2) 810 Practice 811 Labs 811 Check Your Understanding Questions 811 Chapter 39 Network Security 813 Objectives 813 Key Terms 813 Introduction (39.0) 814 Security Foundations (39.1) 814 The Cybersecurity Cube (39.1.1) 814 Confidentiality, Integrity, and Availability (39.1.2) 816 CIA Triad—The Principle of Confidentiality (39.1.3) 816 Data Integrity (39.1.5) 817 Ensuring Availability (39.1.7) 819 Access Control (39.2) 820 Physical Access Controls (39.2.1) 820 Logical Access Controls (39.2.2) 821 Administrative Access Controls (39.2.3) 821 Authentication, Authorization, and Accounting (AAA) (39.2.4) 822 Authentication 822 Authorization 822 Accounting 823 What Is Identification? (39.2.5) 823 Federated Identity Management (39.2.6) 823 Authentication Methods (39.2.7) 824 What You Know 824 What You Have 824 Who You Are 825 Passwords (39.2.8) 825 Password Managers 826 Multi-Factor Authentication 827 Multi-Factor Authentication (39.2.9) 827 Authorization (39.2.10) 827 When to Implement Authorization 827 How to Implement Authorization 828 Accounting (39.2.11) 828 Defending Systems and Devices (39.3) 829 Operating System Security (39.3.1) 829 A Good Administrator 829 A Systematic Approach 829 A Baseline 830 Types of Antimalware (39.3.3) 830 Watch Out for Rogue Antivirus Products 830 Fileless Attacks Are Difficult to Detect and Remove 830 Scripts Can also Be Malware 830 Always Remove Unapproved Software 830 Patch Management (39.3.4) 831 What Are Patches? 831 What Do You Need to Do? 831 A Proactive Approach 831 Endpoint Security (39.3.5) 832 Host-Based Firewalls 832 Host Intrusion Detection Systems (HIDSs) 832 Host Intrusion Prevention Systems (HIPSs) 832 Endpoint Detection and Response (EDR) 832 Data Loss Prevention (DLP) 833 Next-Generation Firewall (NGFW) 833 Host Encryption (39.3.6) 833 Boot Integrity (39.3.7) 834 What Is Boot Integrity? 834 How Does Secure Boot Work? 834 What Is Measured Boot? 834 Apple System Security Features (39.3.8) 835 Physical Protection of Devices (39.3.9) 836 Computer Equipment 836 Door Locks 836 Radio Frequency Identification (RFID) Systems 836 Antimalware Protection (39.4) 836 Endpoint Threats (39.4.1) 837 Endpoint Security (39.4.2) 837 Host-Based Malware Protection (39.4.3) 839 Antivirus/Antimalware Software 839 Host-Based Firewall 840 Host-Based Security Suites 840 Network-Based Malware Protection (39.4.4) 841 Firewalls and Host-Based Intrusion Prevention (39.5) 842 Firewalls (39.5.1) 842 Common Firewall Properties 843 Firewall Benefits 843 Firewall Limitations 843 Types of Firewalls (39.5.2) 843 Packet Filtering (Stateless) Firewall 843 Stateful Firewall 844 Application Gateway Firewall 844 Next-Generation Firewall 846 Packet Filtering Firewall Benefits and Limitations (39.5.4) 847 Stateful Firewall Benefits and Limitations (39.5.5) 848 Host-Based Firewalls (39.5.6) 849 Windows Defender Firewall 850 iptables 850 nftables 850 TCP Wrappers 850 Antimalware Programs (39.5.7) 850 Windows Defender Firewall (39.5.8) 851 Secure Wireless Access (39.6) 854 Wireless Security Overview (39.6.2) 854 DoS Attacks (39.6.3) 854 Rogue Access Points (39.6.4) 855 Man-in-the-Middle Attack (39.6.5) 856 SSID Cloaking and MAC Address Filtering (39.6.8) 858 SSID Cloaking 859 MAC Addresses Filtering 859 802.11 Original Authentication Methods (39.6.9) 860 Shared Key Authentication Methods (39.6.10) 860 Authenticating a Home User (39.6.11) 861 Encryption Methods (39.6.12) 862 Authentication in the Enterprise (39.6.13) 863 WPA3 (39.6.14) 864 WPA3-Personal 864 WPA3-Enterprise 864 Open Networks 865 IoT Onboarding 865 Network Security Summary (39.7) 865 What Did I Learn in This Chapter? (39.7.1) 865 Reflection Questions (39.7.2) 870 Practice 871 Packet Tracer Activities 871 Check Your Understanding Questions 871 Appendix A Answers to the “Check Your Understanding” Questions 875 Online Element Glossary 9780138321338 TOC 1/8/2024

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List