Advertisement
Guest User

Untitled

a guest
May 21st, 2019
133
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 28.13 KB | None | 0 0
  1.  
  2. Chapter 0
  3. Course Introduction
  4. 0.0 Welcome to Introduction to Networks
  5. 0.0.1 Message to the Student
  6. 0.0.1.1 Welcome
  7. 0.0.1.2 A Global Community
  8. 0.0.1.3 More Than Just Information
  9. 0.0.1.4 How We Teach
  10. 0.0.1.5 Practice Leads to Mastery
  11. 0.0.1.6 Mind Wide Open
  12. 0.0.1.7 Engineering Journals
  13. 0.0.1.8 Explore the World of Networking
  14. 0.0.1.9 Create Your Own Worlds
  15. 0.0.1.10 How Packet Tracer Helps Master Concepts
  16. 0.0.1.11 Course Overview
  17. Chapter 1
  18. Explore the Network
  19. 1.0 Introduction
  20. 1.0.1 Welcome
  21. 1.0.1.1 Chapter 1: Exploring the Network
  22. 1.0.1.2 Class Activity - Draw Your Concept of the Internet
  23. 1.1 Globally Connected
  24. 1.1.1 Networking Today
  25. 1.1.1.1 Networks in Our Daily Lives
  26. 1.1.1.2 Technology Then and Now
  27. 1.1.1.3 No Boundaries
  28. 1.1.1.4 Networks Support the Way We Learn
  29. 1.1.1.5 Networks Support the Way We Communicate
  30. 1.1.1.6 Networks Support the Way We Work
  31. 1.1.1.7 Networks Support the Way We Play
  32. 1.1.1.8 Lab - Researching Network Collaboration Tools
  33. 1.1.2 Providing Resources in a Network
  34. 1.1.2.1 Networks of Many Sizes
  35. 1.1.2.2 Clients and Servers
  36. 1.1.2.3 Peer-to-Peer
  37. 1.2 LANs, WANs, and the Internet
  38. 1.2.1 Network Components
  39. 1.2.1.1 Overview of Network Components
  40. 1.2.1.2 End Devices
  41. 1.2.1.3 Intermediary Network Devices
  42. 1.2.1.4 Network Media
  43. 1.2.1.5 Network Representations
  44. 1.2.1.6 Topology Diagrams
  45. 1.2.1.7 Activity - Network Component Representations and Functions
  46. 1.2.2 LANs and WANs
  47. 1.2.2.1 Types of Networks
  48. 1.2.2.2 Local Area Networks
  49. 1.2.2.3 Wide Area Networks
  50. 1.2.3 The Internet, Intranets, and Extranets
  51. 1.2.3.1 The Internet
  52. 1.2.3.2 Intranets and Extranets
  53. 1.2.4 Internet Connections
  54. 1.2.4.1 Internet Access Technologies
  55. 1.2.4.2 Home and Small Office Internet Connections
  56. 1.2.4.3 Businesses Internet Connections
  57. 1.2.4.4 Packet Tracer - Help and Navigation Tips
  58. 1.2.4.5 Packet Tracer - Network Representation
  59. 1.3 The Network as a Platform
  60. 1.3.1 Converged Networks
  61. 1.3.1.1 Traditional Separate Networks
  62. 1.3.1.2 The Converging Network
  63. 1.3.1.3 Lab – Researching Converged Network Services
  64. 1.3.2 Reliable Network
  65. 1.3.2.1 Network Architecture
  66. 1.3.2.2 Fault Tolerance
  67. 1.3.2.3 Scalability
  68. 1.3.2.4 Quality of Service
  69. 1.3.2.5 Security
  70. 1.3.2.6 Activity - Reliable Networks
  71. 1.4 The Changing Network Environment
  72. 1.4.1 Network Trends
  73. 1.4.1.1 New Trends
  74. 1.4.1.2 Bring Your Own Device
  75. 1.4.1.3 Online Collaboration
  76. 1.4.1.4 Video Communication
  77. 1.4.1.5 Cloud Computing
  78. 1.4.2 Networking Technologies for the Home
  79. 1.4.2.1 Technology Trends in the Home
  80. 1.4.2.2 Powerline Networking
  81. 1.4.2.3 Wireless Broadband
  82. 1.4.3 Network Security
  83. 1.4.3.1 Security Threats
  84. 1.4.3.2 Security Solutions
  85. 1.4.3.3 Activity - Network Security Terminology
  86. 1.4.4 Network Architecture
  87. 1.4.4.1 Cisco Network Architecture
  88. 1.4.4.2 CCENT and CCNA Certification
  89. 1.4.4.3 Lab - Researching IT and Networking Job Opportunities
  90. 1.5 Summary
  91. 1.5.1 Conclusion
  92. 1.5.1.1 Class Activity – Draw Your Concept of the Internet Now
  93. 1.5.1.2 Warriors of the Net
  94. 1.5.1.3 Chapter 1: Exploring the Network
  95. Chapter 2
  96. Configure a Network Operating System
  97. 2.0 Introduction
  98. 2.0.1 Welcome
  99. 2.0.1.1 Chapter 2: Configure a Network Operating System
  100. 2.0.1.2 Class Activity - It Is Just an Operating System
  101. 2.1 IOS Bootcamp
  102. 2.1.1 Cisco IOS
  103. 2.1.1.1 Operating Systems
  104. 2.1.1.2 Purpose of OS
  105. 2.1.2 Cisco IOS Access
  106. 2.1.2.1 Access Methods
  107. 2.1.2.2 Terminal Emulation Programs
  108. 2.1.2.3 Activity - Accessing Devices
  109. 2.1.3 Navigate the IOS
  110. 2.1.3.1 Cisco IOS Modes of Operation
  111. 2.1.3.2 Primary Command Modes
  112. 2.1.3.3 Configuration Command Modes
  113. 2.1.3.4 Navigate Between IOS Modes
  114. 2.1.4 The Command Structure
  115. 2.1.4.1 Basic IOS Command Structure
  116. 2.1.4.2 IOS Command Syntax
  117. 2.1.4.3 IOS Help Features
  118. 2.1.4.4 Hotkeys and Shortcuts
  119. 2.1.4.5 Video Demonstration – Hotkeys and Shortcuts
  120. 2.1.4.6 Packet Tracer - Navigating the IOS
  121. 2.1.4.7 Lab - Establishing a Console Session with Tera Term
  122. 2.2 Basic Device Configuration
  123. 2.2.1 Hostnames
  124. 2.2.1.1 Device Names
  125. 2.2.1.2 Configure Hostnames
  126. 2.2.2 Limit Access to Device Configurations
  127. 2.2.2.1 Secure Device Access
  128. 2.2.2.2 Configure Passwords
  129. 2.2.2.3 Encrypt Passwords
  130. 2.2.2.4 Banner Messages
  131. 2.2.2.5 Syntax Checker - Limiting Access to a Switch
  132. 2.2.3 Save Configurations
  133. 2.2.3.1 Save the Running Configuration File
  134. 2.2.3.2 Alter the Running Configuration
  135. 2.2.3.3 Capture Configuration to a Text File
  136. 2.2.3.4 Packet Tracer - Configuring Initial Switch Settings
  137. 2.3 Address Schemes
  138. 2.3.1 Ports and Addresses
  139. 2.3.1.1 IP Addresses
  140. 2.3.1.2 Interfaces and Ports
  141. 2.3.2 Configure IP Addressing
  142. 2.3.2.1 Manual IP Address Configuration for End Devices
  143. 2.3.2.2 Automatic IP Address Configuration for End Devices
  144. 2.3.2.3 Switch Virtual Interface Configuration
  145. 2.3.2.4 Syntax Checker - Configuring a Switch Virtual Interface
  146. 2.3.2.5 Packet Tracer - Implementing Basic Connectivity
  147. 2.3.3 Verifying Connectivity
  148. 2.3.3.1 Interface Addressing Verification
  149. 2.3.3.2 End-to-End Connectivity Test
  150. 2.3.3.3 Lab - Building a Simple Network
  151. 2.3.3.4 Lab - Configuring a Switch Management Address
  152. 2.4 Summary
  153. 2.4.1 Conclusion
  154. 2.4.1.1 Class Activity - Tutor Me
  155. 2.4.1.2 Packet Tracer - Skills Integration Challenge
  156. 2.4.1.3 Chapter 2: Configure a Network Operating System
  157. Chapter 3
  158. Network Protocols and Communications
  159. 3.0 Introduction
  160. 3.0.1 Welcome
  161. 3.0.1.1 Chapter 3: Network Protocols and Communications
  162. 3.0.1.2 Class Activity - Designing a Communications System
  163. 3.1 Rules of Communication
  164. 3.1.1 The Rules
  165. 3.1.1.1 Communication Fundamentals
  166. 3.1.1.2 Rule Establishment
  167. 3.1.1.3 Message Encoding
  168. 3.1.1.4 Message Formatting and Encapsulation
  169. 3.1.1.5 Message Size
  170. 3.1.1.6 Message Timing
  171. 3.1.1.7 Message Delivery Options
  172. 3.2 Network Protocols and Standards
  173. 3.2.1 Protocols
  174. 3.2.1.1 Rules that Govern Communications
  175. 3.2.1.2 Network Protocols
  176. 3.2.1.3 Protocol Interaction
  177. 3.2.2 Protocol Suites
  178. 3.2.2.1 Protocol Suites and Industry Standards
  179. 3.2.2.2 Development of TCP/IP
  180. 3.2.2.3 TCP/IP Protocol Suite
  181. 3.2.2.4 TCP/IP Communication Process
  182. 3.2.2.5 Activity - Mapping the Protocols of the TCP/IP Suite
  183. 3.2.3 Standard Organizations
  184. 3.2.3.1 Open Standards
  185. 3.2.3.2 Internet Standards
  186. 3.2.3.3 Electronics and Communications Standard Organizations
  187. 3.2.3.4 Lab - Researching Networking Standards
  188. 3.2.4 Reference Models
  189. 3.2.4.1 The Benefits of Using a Layered Model
  190. 3.2.4.2 The OSI Reference Model
  191. 3.2.4.3 The TCP/IP Protocol Model
  192. 3.2.4.4 OSI Model and TCP/IP Model Comparison
  193. 3.2.4.5 Activity - Identify Layers and Functions
  194. 3.2.4.6 Packet Tracer - Investigating the TCP/IP and OSI Models in Action
  195. 3.3 Data Transfer in the Network
  196. 3.3.1 Data Encapsulation
  197. 3.3.1.1 Message Segmentation
  198. 3.3.1.2 Protocol Data Units
  199. 3.3.1.3 Encapsulation Example
  200. 3.3.1.4 De-encapsulation
  201. 3.3.1.5 Activity - Identify the PDU Layer
  202. 3.3.2 Data Access
  203. 3.3.2.1 Network Addresses
  204. 3.3.2.2 Data Link Addresses
  205. 3.3.2.3 Devices on the Same Network
  206. 3.3.2.4 Devices on a Remote Network
  207. 3.4 Summary
  208. 3.4.1 Conclusion
  209. 3.4.1.1 Lab - Installing Wireshark
  210. 3.4.1.2 Lab - Using Wireshark to View Network Traffic
  211. 3.4.1.3 Class Activity - Guaranteed to Work!
  212. 3.4.1.4 Chapter 3: Network Protocols and Communications
  213. Chapter 4
  214. Network Access
  215. 4.0 Introduction
  216. 4.0.1 Welcome
  217. 4.0.1.1 Chapter 4: Network Access
  218. 4.0.1.2 Class Activity – Managing the Medium
  219. 4.1 Physical Layer Protocols
  220. 4.1.1 Physical Layer Connection
  221. 4.1.1.1 Types of Connections
  222. 4.1.1.2 Network Interface Cards
  223. 4.1.2 Purpose of the Physical Layer
  224. 4.1.2.1 The Physical Layer
  225. 4.1.2.2 Physical Layer Media
  226. 4.1.2.3 Physical Layer Standards
  227. 4.1.2.4 Lab - Identifying Network Devices and Cabling
  228. 4.1.3 Physical Layer Characteristics
  229. 4.1.3.1 Functions
  230. 4.1.3.2 Bandwidth
  231. 4.1.3.3 Throughput
  232. 4.1.3.4 Types of Physical Media
  233. 4.1.3.5 Activity - Physical Layer Terminology
  234. 4.2 Network Media
  235. 4.2.1 Copper Cabling
  236. 4.2.1.1 Characteristics of Copper Cabling
  237. 4.2.1.2 Copper Media
  238. 4.2.1.3 Unshielded Twisted-Pair Cable
  239. 4.2.1.4 Shielded Twisted-Pair Cable
  240. 4.2.1.5 Coaxial Cable
  241. 4.2.1.6 Copper Media Safety
  242. 4.2.1.7 Activity - Copper Media Characteristics
  243. 4.2.2 UTP Cabling
  244. 4.2.2.1 Properties of UTP Cabling
  245. 4.2.2.2 UTP Cabling Standards
  246. 4.2.2.3 UTP Connectors
  247. 4.2.2.4 Types of UTP Cable
  248. 4.2.2.5 Testing UTP Cables
  249. 4.2.2.6 Cable Pinouts
  250. 4.2.2.7 Lab - Building an Ethernet Crossover Cable
  251. 4.2.3 Fiber-Optic Cabling
  252. 4.2.3.1 Properties of Fiber-Optic Cabling
  253. 4.2.3.2 Fiber Media Cable Design
  254. 4.2.3.3 Types of Fiber Media
  255. 4.2.3.4 Fiber-Optic Connectors
  256. 4.2.3.5 Testing Fiber Cables
  257. 4.2.3.6 Fiber versus Copper
  258. 4.2.3.7 Activity - Fiber Optics Terminology
  259. 4.2.4 Wireless Media
  260. 4.2.4.1 Properties of Wireless Media
  261. 4.2.4.2 Types of Wireless Media
  262. 4.2.4.3 Wireless LAN
  263. 4.2.4.4 Packet Tracer – Connecting a Wired and Wireless LAN
  264. 4.2.4.5 Lab - Viewing Wired and Wireless NIC Information
  265. 4.3 Data Link Layer Protocols
  266. 4.3.1 Purpose of the Data Link Layer
  267. 4.3.1.1 The Data Link Layer
  268. 4.3.1.2 Data Link Sublayers
  269. 4.3.1.3 Media Access Control
  270. 4.3.1.4 Providing Access to Media
  271. 4.3.1.5 Data Link Layer Standards
  272. 4.4 Media Access Control
  273. 4.4.1 Topologies
  274. 4.4.1.1 Controlling Access to the Media
  275. 4.4.1.2 Physical and Logical Topologies
  276. 4.4.2 WAN Topologies
  277. 4.4.2.1 Common Physical WAN Topologies
  278. 4.4.2.2 Physical Point-to-Point Topology
  279. 4.4.2.3 Logical Point-to-Point Topology
  280. 4.4.3 LAN Topologies
  281. 4.4.3.1 Physical LAN Topologies
  282. 4.4.3.2 Half and Full Duplex
  283. 4.4.3.3 Media Access Control Methods
  284. 4.4.3.4 Contention-Based Access – CSMA/CD
  285. 4.4.3.5 Contention-Based Access – CSMA/CA
  286. 4.4.4 Data Link Frame
  287. 4.4.4.1 The Frame
  288. 4.4.4.2 Frame Fields
  289. 4.4.4.3 Activity – Generic Frame Fields
  290. 4.4.4.4 Layer 2 Address
  291. 4.4.4.5 LAN and WAN Frames
  292. 4.5 Summary
  293. 4.5.1 Conclusion
  294. 4.5.1.1 Class Activity – Linked In!
  295. 4.5.1.2 Chapter 4: Network Access
  296. Chapter 5
  297. Ethernet
  298. 5.0 Introduction
  299. 5.0.1 Welcome
  300. 5.0.1.1 Chapter 5: Ethernet
  301. 5.0.1.2 Class Activity - Join My Social Circle!
  302. 5.1 Ethernet Protocol
  303. 5.1.1 Ethernet Frame
  304. 5.1.1.1 Ethernet Encapsulation
  305. 5.1.1.2 MAC Sublayer
  306. 5.1.1.3 Ethernet Evolution
  307. 5.1.1.4 Ethernet Frame Fields
  308. 5.1.1.5 Activity - MAC and LLC Sublayers
  309. 5.1.1.6 Activity - Ethernet Frame Fields
  310. 5.1.1.7 Lab - Using Wireshark to Examine Ethernet Frames
  311. 5.1.2 Ethernet MAC Addresses
  312. 5.1.2.1 MAC Address and Hexadecimal
  313. 5.1.2.2 MAC Address: Ethernet Identity
  314. 5.1.2.3 Frame Processing
  315. 5.1.2.4 MAC Address Representations
  316. 5.1.2.5 Unicast MAC Address
  317. 5.1.2.6 Broadcast MAC Address
  318. 5.1.2.7 Multicast MAC Address
  319. 5.1.2.8 Lab - Viewing Network Device MAC Addresses
  320. 5.2 LAN Switches
  321. 5.2.1 The MAC Address Table
  322. 5.2.1.1 Switch Fundamentals
  323. 5.2.1.2 Learning MAC Addresses
  324. 5.2.1.3 Filtering Frames
  325. 5.2.1.4 Video Demonstration - MAC Address Tables on Connected Switches
  326. 5.2.1.5 Video Demonstration - Sending a Frame to the Default Gateway
  327. 5.2.1.6 Activity - Switch It!
  328. 5.2.1.7 Lab - Viewing the Switch MAC Address Table
  329. 5.2.2 Switch Forwarding Methods
  330. 5.2.2.1 Frame Forwarding Methods on Cisco Switches
  331. 5.2.2.2 Cut-Through Switching
  332. 5.2.2.3 Memory Buffering on Switches
  333. 5.2.2.4 Activity - Frame Forwarding Methods
  334. 5.2.3 Switch Port Settings
  335. 5.2.3.1 Duplex and Speed Settings
  336. 5.2.3.2 Auto-MDIX
  337. 5.3 Address Resolution Protocol
  338. 5.3.1 MAC and IP
  339. 5.3.1.1 Destination on Same Network
  340. 5.3.1.2 Destination Remote Network
  341. 5.3.1.3 Packet Tracer – Identify MAC and IP Addresses
  342. 5.3.2 ARP
  343. 5.3.2.1 Introduction to ARP
  344. 5.3.2.2 ARP Functions
  345. 5.3.2.3 Video Demonstration – ARP Request
  346. 5.3.2.4 Video Demonstration – ARP Reply
  347. 5.3.2.5 Video Demonstration – ARP Role in Remote Communication
  348. 5.3.2.6 Removing Entries from an ARP Table
  349. 5.3.2.7 ARP Tables
  350. 5.3.2.8 Packet Tracer - Examine the ARP Table
  351. 5.3.3 ARP Issues
  352. 5.3.3.1 ARP Broadcasts
  353. 5.3.3.2 ARP Spoofing
  354. 5.4 Summary
  355. 5.4.1 Conclusion
  356. 5.4.1.1 Class Activity - MAC and Choose…
  357. 5.4.1.2 Chapter 5: Ethernet
  358. Chapter 6
  359. Network Layer
  360. 6.0 Introduction
  361. 6.0.1 Welcome
  362. 6.0.1.1 Chapter 6: Network Layer
  363. 6.0.1.2 Class Activity - The Road Less Traveled…
  364. 6.1 Network Layer Protocols
  365. 6.1.1 Network Layer in Communications
  366. 6.1.1.1 The Network Layer
  367. 6.1.1.2 Network Layer Protocols
  368. 6.1.2 Characteristics of the IP Protocol
  369. 6.1.2.1 Encapsulating IP
  370. 6.1.2.2 Characteristics of IP
  371. 6.1.2.3 IP - Connectionless
  372. 6.1.2.4 IP - Best Effort Delivery
  373. 6.1.2.5 IP - Media Independent
  374. 6.1.2.6 Activity - IP Characteristics
  375. 6.1.3 IPv4 Packet
  376. 6.1.3.1 IPv4 Packet Header
  377. 6.1.3.2 Video Demonstration - Sample IPv4 Headers in Wireshark
  378. 6.1.3.3 Activity - IPv4 Header Fields
  379. 6.1.4 IPv6 Packet
  380. 6.1.4.1 Limitations of IPv4
  381. 6.1.4.2 Introducing IPv6
  382. 6.1.4.3 Encapsulating IPv6
  383. 6.1.4.4 IPv6 Packet Header
  384. 6.1.4.5 Video Demonstration - Sample IPv6 Headers and Wireshark
  385. 6.1.4.6 Activity - IPv6 Header Fields
  386. 6.2 Routing
  387. 6.2.1 How a Host Routes
  388. 6.2.1.1 Host Forwarding Decision
  389. 6.2.1.2 Default Gateway
  390. 6.2.1.3 Using the Default Gateway
  391. 6.2.1.4 Host Routing Tables
  392. 6.2.2 Router Routing Tables
  393. 6.2.2.1 Router Packet Forwarding Decision
  394. 6.2.2.2 IPv4 Router Routing Table
  395. 6.2.2.3 Video Demonstration - Introducing the IPv4 Routing Table
  396. 6.2.2.4 Directly Connected Routing Table Entries
  397. 6.2.2.5 Remote Network Routing Table Entries
  398. 6.2.2.6 Next-Hop Address
  399. 6.2.2.7 Video Demonstration – Explaining the IPv4 Routing Table
  400. 6.2.2.8 Activity - Identify Elements of a Router Routing Table Entry
  401. 6.3 Routers
  402. 6.3.1 Anatomy of a Router
  403. 6.3.1.1 A Router is a Computer
  404. 6.3.1.2 Router CPU and OS
  405. 6.3.1.3 Router Memory
  406. 6.3.1.4 Inside a Router
  407. 6.3.1.5 Connect to a Router
  408. 6.3.1.6 LAN and WAN Interfaces
  409. 6.3.1.7 Activity - Identify Router Components
  410. 6.3.1.8 Packet Tracer - Exploring Internetworking Devices
  411. 6.3.2 Router Boot-up
  412. 6.3.2.1 Bootset Files
  413. 6.3.2.2 Router Bootup Process
  414. 6.3.2.3 Video Demonstration – Router Bootup Process
  415. 6.3.2.4 Show Version Output
  416. 6.3.2.5 Video Demonstration - The show version Command
  417. 6.3.2.6 Activity - The Router Boot Process
  418. 6.3.2.7 Lab - Exploring Router Physical Characteristics
  419. 6.4 Configure a Cisco Router
  420. 6.4.1 Configure Initial Settings
  421. 6.4.1.1 Basic Switch Configuration Steps
  422. 6.4.1.2 Basic Router Configuration Steps
  423. 6.4.1.3 Packet Tracer - Configure Initial Router Settings
  424. 6.4.2 Configure Interfaces
  425. 6.4.2.1 Configure Router Interfaces
  426. 6.4.2.2 Verify Interface Configuration
  427. 6.4.3 Configure the Default Gateway
  428. 6.4.3.1 Default Gateway for a Host
  429. 6.4.3.2 Default Gateway for a Switch
  430. 6.4.3.3 Packet Tracer - Connect a Router to a LAN
  431. 6.4.3.4 Packet Tracer - Troubleshooting Default Gateway Issues
  432. 6.5 Summary
  433. 6.5.1 Conclusion
  434. 6.5.1.1 Class Activity - Can You Read This Map?
  435. 6.5.1.2 Lab - Building a Switch and Router Network
  436. 6.5.1.3 Packet Tracer - Skills Integration Challenge
  437. 6.5.1.4 Chapter 6: Network Layer
  438. Chapter 7
  439. IP Addressing
  440. 7.0 Introduction
  441. 7.0.1 Welcome
  442. 7.0.1.1 Chapter 7: IP Addressing
  443. 7.0.1.2 Class Activity – The Internet of Everything (IoE)
  444. 7.1 IPv4 Network Addresses
  445. 7.1.1 Binary and Decimal Conversion
  446. 7.1.1.1 IPv4 Addresses
  447. 7.1.1.2 Video Demonstration – Converting Between Binary and Decimal Numbering Systems
  448. 7.1.1.3 Positional Notation
  449. 7.1.1.4 Binary to Decimal Conversion
  450. 7.1.1.5 Activity – Binary to Decimal Conversion
  451. 7.1.1.6 Decimal to Binary Conversion
  452. 7.1.1.7 Decimal to Binary Conversion Examples
  453. 7.1.1.8 Activity – Decimal to Binary Conversion Utility
  454. 7.1.1.9 Activity – Binary Game
  455. 7.1.2 IPv4 Address Structure
  456. 7.1.2.1 Network and Host Portions
  457. 7.1.2.2 The Subnet Mask
  458. 7.1.2.3 Logical AND
  459. 7.1.2.4 Activity – ANDing to Determine the Network Address
  460. 7.1.2.5 The Prefix Length
  461. 7.1.2.6 Network, Host, and Broadcast Addresses
  462. 7.1.2.7 Video Demonstration - Network, Host, and Broadcast Addresses
  463. 7.1.2.8 Lab – Using the Windows Calculator with Network Addresses
  464. 7.1.2.9 Lab – Converting IPv4 Addresses to Binary
  465. 7.1.3 IPv4 Unicast, Broadcast, and Multicast
  466. 7.1.3.1 Static IPv4 Address Assignment to a Host
  467. 7.1.3.2 Dynamic IPv4 Address Assignment to a Host
  468. 7.1.3.3 IPv4 Communication
  469. 7.1.3.4 Unicast Transmission
  470. 7.1.3.5 Broadcast Transmission
  471. 7.1.3.6 Multicast Transmission
  472. 7.1.3.7 Activity – Unicast, Broadcast, or Multicast
  473. 7.1.3.8 Packet Tracer – Investigate Unicast, Broadcast, and Multicast Traffic
  474. 7.1.4 Types of IPv4 Addressses
  475. 7.1.4.1 Public and Private IPv4 Addresses
  476. 7.1.4.2 Activity – Pass or Block IPv4 Addresses
  477. 7.1.4.3 Special User IPv4 Addresses
  478. 7.1.4.4 Legacy Classful Addressing
  479. 7.1.4.5 Video Demonstration - Classful IPv4 Addressing
  480. 7.1.4.6 Classless Addressing
  481. 7.1.4.7 Assignment of IP Addresses
  482. 7.1.4.8 Activity – Public or Private IPv4 Addresses
  483. 7.1.4.9 Lab – Identifying IPv4 Addresses
  484. 7.2 IPv6 Network Addresses
  485. 7.2.1 IPv4 Issues
  486. 7.2.1.1 The Need for IPv6
  487. 7.2.1.2 IPv4 and IPv6 Coexistence
  488. 7.2.1.3 Activity – IPv4 Issues and Solutions
  489. 7.2.2 IPv6 Addressing
  490. 7.2.2.1 IPv6 Address Representation
  491. 7.2.2.2 Rule 1 – Omit Leading 0s
  492. 7.2.2.3 Rule 2 – Omit All 0 Segments
  493. 7.2.2.4 Activity – Practicing IPv6 Address Representations
  494. 7.2.3 Types of IPv6 Addresses
  495. 7.2.3.1 IPv6 Address Types
  496. 7.2.3.2 IPv6 Prefix Length
  497. 7.2.3.3 IPv6 Unicast Addresses
  498. 7.2.3.4 IPv6 Link-Local Unicast Addresses
  499. 7.2.3.5 Activity – Identify Types of IPv6 Addresses
  500. 7.2.4 IPv6 Unicast Addresses
  501. 7.2.4.1 Structure of an IPv6 Global Unicast Address
  502. 7.2.4.2 Static Configuration of a Global Unicast Address
  503. 7.2.4.3 Dynamic Configuration - SLAAC
  504. 7.2.4.4 Dynamic Configuration – DHCPv6
  505. 7.2.4.5 EUI-64 Process and Randomly Generated
  506. 7.2.4.6 Dynamic Link-Local Addresses
  507. 7.2.4.7 Static Link-Local Addresses
  508. 7.2.4.8 Verifying IPv6 Address Configuration
  509. 7.2.4.9 Packet Tracer – Configuring IPv6 Addressing
  510. 7.2.5 IPv6 Multicast Addresses
  511. 7.2.5.1 Assigned IPv6 Multicast Addresses
  512. 7.2.5.2 Solicited-Node IPv6 Multicast Addresses
  513. 7.2.5.3 Lab – Identifying IPv6 Addresses
  514. 7.2.5.4 Lab – Configuring IPv6 Addresses on Network Devices
  515. 7.3 Connectivity Verification
  516. 7.3.1 ICMP
  517. 7.3.1.1 ICMPv4 and ICMPv6
  518. 7.3.1.2 ICMPv6 Router Solicitation and Router Advertisement Messages
  519. 7.3.2 Testing and Verification
  520. 7.3.2.1 Ping - Testing the Local Stack
  521. 7.3.2.2 Ping – Testing Connectivity to the Local LAN
  522. 7.3.2.3 Ping – Testing Connectivity to Remote
  523. 7.3.2.4 Traceroute – Testing the Path
  524. 7.3.2.5 Packet Tracer – Verifying IPv4 and IPv6 Addressing
  525. 7.3.2.6 Packet Tracer – Pinging and Tracing to Test the Path
  526. 7.3.2.7 Lab – Testing Network Connectivity with Ping and Traceroute
  527. 7.3.2.8 Lab – Mapping the Internet
  528. 7.3.2.9 Packet Tracer – Troubleshooting IPv4 and IPv6 Addressing
  529. 7.4 Summary
  530. 7.4.1 Conclusion
  531. 7.4.1.1 Class Activity – The Internet of Everything…Naturally!
  532. 7.4.1.2 Packet Tracer – Skills Integration Challenge
  533. 7.4.1.3 Chapter 7: IP Addressing
  534. Chapter 8
  535. Subnetting IP Networks
  536. 8.0 Introduction
  537. 8.0.1 Welcome
  538. 8.0.1.1 Chapter 8: Subnetting IP Networks
  539. 8.0.1.2 Class Activity – Call Me!
  540. 8.1 Subnetting an IPv4 Network
  541. 8.1.1 Network Segmentation
  542. 8.1.1.1 Broadcast Domains
  543. 8.1.1.2 Problems with Large Broadcast Domains
  544. 8.1.1.3 Reasons for Subnetting
  545. 8.1.2 Subnetting an IPv4 Network
  546. 8.1.2.1 Octet Boundaries
  547. 8.1.2.2 Subnetting on the Octet Boundary
  548. 8.1.2.3 Classless Subnetting
  549. 8.1.2.4 Video Demonstration – The Subnet Mask
  550. 8.1.2.5 Video Demonstration – Subnetting with the Magic Number
  551. 8.1.2.6 Classless Subnetting Example
  552. 8.1.2.7 Creating 2 Subnets
  553. 8.1.2.8 Video Demonstration – Creating Two Equal-Sized Subnets
  554. 8.1.2.9 Subnetting Formulas
  555. 8.1.2.10 Creating 4 Subnets
  556. 8.1.2.11 Video Demonstration – Creating Four Equal-Sized Subnets
  557. 8.1.2.12 Video Demonstration – Creating Eight Equal-Sized Subnets
  558. 8.1.3 Subnetting a /16 and /8 Prefix
  559. 8.1.3.1 Creating Subnets with a /16 prefix
  560. 8.1.3.2 Creating 100 Subnets with a /16 Network
  561. 8.1.3.3 Calculating the Hosts
  562. 8.1.3.4 Video Demonstration – Creating One Hundred Equal-Sized Subnets
  563. 8.1.3.5 Creating 1000 Subnets with a /8 Network
  564. 8.1.3.6 Video Demonstration – Subnetting Across Multiple Octets
  565. 8.1.4 Subnetting to Meet Requirements
  566. 8.1.4.1 Subnetting Based on Host Requirements
  567. 8.1.4.2 Subnetting Based on Network Requirements
  568. 8.1.4.3 Network Requirement Example
  569. 8.1.4.4 Activity – Calculate the Subnet Mask
  570. 8.1.4.5 Activity – Determining the Number of Bits to Borrow
  571. 8.1.4.6 Lab - Calculating IPv4 Subnets
  572. 8.1.4.7 Packet Tracer - Subnetting Scenario
  573. 8.1.4.8 Lab – Designing and Implementing a Subnetted IPv4 Addressing Scheme
  574. 8.1.5 Benefits of Variable Length Subnet Masking
  575. 8.1.5.1 Traditional Subnetting Wastes Addresses
  576. 8.1.5.2 Variable Length Subnet Masks
  577. 8.1.5.3 Basic VLSM
  578. 8.1.5.4 Video Demonstration – Basic VLSM
  579. 8.1.5.5 VLSM in Practice
  580. 8.1.5.6 VLSM Chart
  581. 8.1.5.7 Video Demonstration – VLSM Example
  582. 8.1.5.8 Activity – Practicing VLSM
  583. 8.2 Addressing Schemes
  584. 8.2.1 Structured Design
  585. 8.2.1.1 Network Address Planning
  586. 8.2.1.2 Planning to Address the Network
  587. 8.2.1.3 Assigning Addresses to Devices
  588. 8.2.1.4 Packet Tracer – Designing and Implementing a VLSM Addressing Scheme
  589. 8.2.1.5 Lab – Designing and Implementing a VLSM Addressing Scheme
  590. 8.3 Design Considerations for IPv6
  591. 8.3.1 Subnetting an IPv6 Network
  592. 8.3.1.1 The IPv6 Global Unicast Address
  593. 8.3.1.2 Subnetting Using the Subnet ID
  594. 8.3.1.3 IPv6 Subnet Allocation
  595. 8.3.1.4 Packet Tracer – Implementing a Subnetted IPv6 Addressing Scheme
  596. 8.4 Summary
  597. 8.4.1 Conclusion
  598. 8.4.1.1 Class Activity – Can you call me now?
  599. 8.4.1.2 Packet Tracer – Skills Integration Challenge
  600. 8.4.1.3 Chapter 8: Subnetting IP Networks
  601. Chapter 9
  602. Transport Layer
  603. 9.0 Introduction
  604. 9.0.1 Welcome
  605. 9.0.1.1 Transport Layer
  606. 9.0.1.2 Class Activity - We Need to Talk - Game
  607. 9.1 Transport Layer Protocols
  608. 9.1.1 Transportation of Data
  609. 9.1.1.1 Role of the Transport Layer
  610. 9.1.1.2 Transport Layer Responsibilities
  611. 9.1.1.3 Conversation Multiplexing
  612. 9.1.1.4 Transport Layer Reliability
  613. 9.1.1.5 TCP
  614. 9.1.1.6 UDP
  615. 9.1.1.7 The Right Transport Layer Protocol for the Right Application
  616. 9.1.2 TCP and UDP Overview
  617. 9.1.2.1 TCP Features
  618. 9.1.2.2 TCP Header
  619. 9.1.2.3 UDP Features
  620. 9.1.2.4 UDP Header
  621. 9.1.2.5 Multiple Separate Conversations
  622. 9.1.2.6 Port Numbers
  623. 9.1.2.7 Socket Pairs
  624. 9.1.2.8 Port Number Groups
  625. 9.1.2.9 The netstat Command
  626. 9.1.2.10 Activity - Compare TCP and UDP Characteristics
  627. 9.2 TCP and UDP
  628. 9.2.1 TCP Communication Process
  629. 9.2.1.1 TCP Server Processes
  630. 9.2.1.2 TCP Connection Establishment
  631. 9.2.1.3 TCP Session Termination
  632. 9.2.1.4 TCP Three-way Handshake Analysis
  633. 9.2.1.5 Video Demonstration – TCP 3-Way Handshake
  634. 9.2.1.6 Lab - Using Wireshark to Observe the TCP 3-Way Handshake
  635. 9.2.1.7 Activity - TCP Connection and Termination Process
  636. 9.2.2 Reliability and Flow Control
  637. 9.2.2.1 TCP Reliability - Ordered Delivery
  638. 9.2.2.2 Video Demonstration - Sequence Numbers and Acknowledgments
  639. 9.2.2.3 Video Demonstration - Data Loss and Retransmission
  640. 9.2.2.4 TCP Flow Control - Window Size and Acknowledgments
  641. 9.2.2.5 TCP Flow Control - Congestion Avoidance
  642. 9.2.3 UDP Communication
  643. 9.2.3.1 UDP Low Overhead versus Reliability
  644. 9.2.3.2 UDP Datagram Reassembly
  645. 9.2.3.3 UDP Server Processes and Requests
  646. 9.2.3.4 UDP Client Processes
  647. 9.2.3.5 Lab - Using Wireshark to Examine a UDP DNS Capture
  648. 9.2.4 TCP or UDP
  649. 9.2.4.1 Applications that use TCP
  650. 9.2.4.2 Applications that use UDP
  651. 9.2.4.3 Lab - Using Wireshark to Examine FTP and TFTP Captures
  652. 9.2.4.4 Activity - TCP, UDP, or Both
  653. 9.3 Summary
  654. 9.3.1 Conclusion
  655. 9.3.1.1 Class Activity - We Need to Talk, Again - Game
  656. 9.3.1.2 Packet Tracer - TCP and UDP Communications
  657. 9.3.1.3 Chapter 9: Transport Layer
  658. Chapter 10
  659. Application Layer
  660. 10.0 Introduction
  661. 10.0.1 Welcome
  662. 10.0.1.1 Chapter 10: Application Layer
  663. 10.0.1.2 Class Activity – Application Investigation
  664. 10.1 Application Layer Protocols
  665. 10.1.1 Application, Presentation, and Session
  666. 10.1.1.1 Application Layer
  667. 10.1.1.2 Presentation and Session Layer
  668. 10.1.1.3 TCP/IP Application Layer Protocols
  669. 10.1.1.4 Activity – Application and Presentation (Protocols and Standards)
  670. 10.1.2 How Application Protocols Interact with End-User Applications
  671. 10.1.2.1 Client-Server Model
  672. 10.1.2.2 Peer-to-Peer Networks
  673. 10.1.2.3 Peer-to-Peer Applications
  674. 10.1.2.4 Common P2P Applications
  675. 10.1.2.5 Lab – Researching Peer-to-Peer File Sharing
  676. 10.2 Well-Known Application Layer Protocols and Services
  677. 10.2.1 Web and Email Protocols
  678. 10.2.1.1 Hypertext Transfer Protocol and Hypertext Markup Language
  679. 10.2.1.2 HTTP and HTTPS
  680. 10.2.1.3 Email Protocols
  681. 10.2.1.4 SMTP Operation
  682. 10.2.1.5 POP Operation
  683. 10.2.1.6 IMAP Operation
  684. 10.2.1.7 Packet Tracer – Web and Email
  685. 10.2.2 IP Addressing Services
  686. 10.2.2.1 Domain Name Service
  687. 10.2.2.2 DNS Message Format
  688. 10.2.2.3 DNS Hierarchy
  689. 10.2.2.4 The nslookup Command
  690. 10.2.2.5 Dynamic Host Configuration Protocol
  691. 10.2.2.6 DHCP Operation
  692. 10.2.2.7 Packet Tracer – DHCP and DNS Servers
  693. 10.2.2.8 Lab – Observing DNS Servers
  694. 10.2.3 File Sharing Services
  695. 10.2.3.1 File Transfer Protocol
  696. 10.2.3.2 Server Message Block
  697. 10.2.3.3 Packet Tracer - FTP
  698. 10.2.3.4 Lab – Exploring FTP
  699. 10.3 Summary
  700. 10.3.1 Conclusion
  701. 10.3.1.1 Modeling Activity – Make it happen!
  702. 10.3.1.2 Packet Tracer - Explore a Network
  703. 10.3.1.3 Packet Tracer - Multiuser - Tutorial
  704. 10.3.1.4 Packet Tracer Multiuser - Implement Services
  705. 10.3.1.5 Chapter 10: Application Layer
  706. Chapter 11
  707. Build a Small Network
  708. 11.0 Introduction
  709. 11.0.1 Welcome
  710. 11.0.1.1 Chapter 11: Build a Small Network
  711. 11.0.1.2 Class Activity - Did You Notice…?
  712. 11.1 Network Design
  713. 11.1.1 Devices in a Small Network
  714. 11.1.1.1 Small Network Topologies
  715. 11.1.1.2 Device Selection for a Small Network
  716. 11.1.1.3 IP Addressing for a Small Network
  717. 11.1.1.4 Redundancy in a Small Network
  718. 11.1.1.5 Traffic Management
  719. 11.1.2 Small Network Applications and Protocols
  720. 11.1.2.1 Common Applications
  721. 11.1.2.2 Common Protocols
  722. 11.1.2.3 Voice and Video Applications
  723. 11.1.3 Scale to Larger Networks
  724. 11.1.3.1 Small Network Growth
  725. 11.1.3.2 Protocol Analysis
  726. 11.1.3.3 Employee Network Utilization
  727. 11.2 Network Security
  728. 11.2.1 Security Threats and Vulnerabilities
  729. 11.2.1.1 Types of Threats
  730. 11.2.1.2 Physical Security
  731. 11.2.1.3 Types of Vulnerabilities
  732. 11.2.1.4 Activity - Security Threats and Vulnerabilities
  733. 11.2.2 Network Attacks
  734. 11.2.2.1 Types of Malware
  735. 11.2.2.2 Reconnaissance Attacks
  736. 11.2.2.3 Access Attacks
  737. 11.2.2.4 Denial of Service Attacks
  738. 11.2.2.5 Activity - Types of Attack
  739. 11.2.2.6 Lab - Researching Network Security Threats
  740. 11.2.3 Network Attack Mitigation
  741. 11.2.3.1 Backup, Upgrade, Update, and Patch
  742. 11.2.3.2 Authentication, Authorization, and Accounting
  743. 11.2.3.3 Firewalls
  744. 11.2.3.4 Endpoint Security
  745. 11.2.4 Device Security
  746. 11.2.4.1 Device Security Overview
  747. 11.2.4.2 Passwords
  748. 11.2.4.3 Basic Security Practices
  749. 11.2.4.4 Enable SSH
  750. 11.2.4.5 Packet Tracer - Configuring Secure Passwords and SSH
  751. 11.2.4.6 Lab - Accessing Network Devices with SSH
  752. 11.2.4.7 Lab - Examining Telnet and SSH in Wireshark
  753. 11.2.4.8 Lab - Securing Network Devices
  754. 11.3 Basic Network Performance
  755. 11.3.1 The ping Command
  756. 11.3.1.1 Interpreting Ping Results
  757. 11.3.1.2 Extended Ping
  758. 11.3.1.3 Network Baseline
  759. 11.3.2 The traceroute and tracert Command
  760. 11.3.2.1 Interpreting Trace Messages
  761. 11.3.2.2 Extended Traceroute
  762. 11.3.2.3 Packet Tracer – Test Connectivity with Traceroute
  763. 11.3.2.4 Lab -Testing Network Latency with Ping and Traceroute
  764. 11.3.3 Show Commands
  765. 11.3.3.1 Common show Commands Revisited
  766. 11.3.3.2 Video Demonstration - The show version Command
  767. 11.3.3.3 Packet Tracer - Using show Commands
  768. 11.3.4 Host and IOS Commands
  769. 11.3.4.1 The ipconfig Command
  770. 11.3.4.2 The arp Command
  771. 11.3.4.3 The show cdp neighbors Command
  772. 11.3.4.4 The show ip interface brief Command
  773. 11.3.4.5 Activity - Show Commands
  774. 11.3.4.6 Lab - Using the CLI to Gather Network Device Information
  775. 11.3.5 Debugging
  776. 11.3.5.1 The debug Command
  777. 11.3.5.2 The terminal monitor Command
  778. 11.4 Network Troubleshooting
  779. 11.4.1 Troubleshooting Methodologies
  780. 11.4.1.1 Basic Troubleshooting Approaches
  781. 11.4.1.2 Resolve or Escalate?
  782. 11.4.1.3 Verify and Monitor Solution
  783. 11.4.1.4 Activity – Order the Troubleshooting Steps
  784. 11.4.2 Troubleshoot Cables and Interfaces
  785. 11.4.2.1 Duplex Operation
  786. 11.4.2.2 Duplex Mismatch
  787. 11.4.3 Troubleshooting Scenarios
  788. 11.4.3.1 IP Addressing Issues on IOS Devices
  789. 11.4.3.2 IP Addressing Issues on End Devices
  790. 11.4.3.3 Default Gateway Issues
  791. 11.4.3.4 Troubleshooting DNS Issues
  792. 11.4.3.5 Lab - Troubleshooting Connectivity Issues
  793. 11.4.3.6 Packet Tracer - Troubleshooting Connectivity Issues
  794. 11.5 Summary
  795. 11.5.1 Conclusion
  796. 11.5.1.1 Class Activity - Design and Build a Small Business Network
  797. 11.5.1.2 Packet Tracer - Skill Integration Challenge
  798. 11.5.1.3 Packet Tracer - Troubleshooting Challenge
  799. 11.5.1.4 Before You Go
  800. 11.5.1.5 Chapter 11: Build a Small Network
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement