Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Chapter 0
- Course Introduction
- 0.0 Welcome to Introduction to Networks
- 0.0.1 Message to the Student
- 0.0.1.1 Welcome
- 0.0.1.2 A Global Community
- 0.0.1.3 More Than Just Information
- 0.0.1.4 How We Teach
- 0.0.1.5 Practice Leads to Mastery
- 0.0.1.6 Mind Wide Open
- 0.0.1.7 Engineering Journals
- 0.0.1.8 Explore the World of Networking
- 0.0.1.9 Create Your Own Worlds
- 0.0.1.10 How Packet Tracer Helps Master Concepts
- 0.0.1.11 Course Overview
- Chapter 1
- Explore the Network
- 1.0 Introduction
- 1.0.1 Welcome
- 1.0.1.1 Chapter 1: Exploring the Network
- 1.0.1.2 Class Activity - Draw Your Concept of the Internet
- 1.1 Globally Connected
- 1.1.1 Networking Today
- 1.1.1.1 Networks in Our Daily Lives
- 1.1.1.2 Technology Then and Now
- 1.1.1.3 No Boundaries
- 1.1.1.4 Networks Support the Way We Learn
- 1.1.1.5 Networks Support the Way We Communicate
- 1.1.1.6 Networks Support the Way We Work
- 1.1.1.7 Networks Support the Way We Play
- 1.1.1.8 Lab - Researching Network Collaboration Tools
- 1.1.2 Providing Resources in a Network
- 1.1.2.1 Networks of Many Sizes
- 1.1.2.2 Clients and Servers
- 1.1.2.3 Peer-to-Peer
- 1.2 LANs, WANs, and the Internet
- 1.2.1 Network Components
- 1.2.1.1 Overview of Network Components
- 1.2.1.2 End Devices
- 1.2.1.3 Intermediary Network Devices
- 1.2.1.4 Network Media
- 1.2.1.5 Network Representations
- 1.2.1.6 Topology Diagrams
- 1.2.1.7 Activity - Network Component Representations and Functions
- 1.2.2 LANs and WANs
- 1.2.2.1 Types of Networks
- 1.2.2.2 Local Area Networks
- 1.2.2.3 Wide Area Networks
- 1.2.3 The Internet, Intranets, and Extranets
- 1.2.3.1 The Internet
- 1.2.3.2 Intranets and Extranets
- 1.2.4 Internet Connections
- 1.2.4.1 Internet Access Technologies
- 1.2.4.2 Home and Small Office Internet Connections
- 1.2.4.3 Businesses Internet Connections
- 1.2.4.4 Packet Tracer - Help and Navigation Tips
- 1.2.4.5 Packet Tracer - Network Representation
- 1.3 The Network as a Platform
- 1.3.1 Converged Networks
- 1.3.1.1 Traditional Separate Networks
- 1.3.1.2 The Converging Network
- 1.3.1.3 Lab – Researching Converged Network Services
- 1.3.2 Reliable Network
- 1.3.2.1 Network Architecture
- 1.3.2.2 Fault Tolerance
- 1.3.2.3 Scalability
- 1.3.2.4 Quality of Service
- 1.3.2.5 Security
- 1.3.2.6 Activity - Reliable Networks
- 1.4 The Changing Network Environment
- 1.4.1 Network Trends
- 1.4.1.1 New Trends
- 1.4.1.2 Bring Your Own Device
- 1.4.1.3 Online Collaboration
- 1.4.1.4 Video Communication
- 1.4.1.5 Cloud Computing
- 1.4.2 Networking Technologies for the Home
- 1.4.2.1 Technology Trends in the Home
- 1.4.2.2 Powerline Networking
- 1.4.2.3 Wireless Broadband
- 1.4.3 Network Security
- 1.4.3.1 Security Threats
- 1.4.3.2 Security Solutions
- 1.4.3.3 Activity - Network Security Terminology
- 1.4.4 Network Architecture
- 1.4.4.1 Cisco Network Architecture
- 1.4.4.2 CCENT and CCNA Certification
- 1.4.4.3 Lab - Researching IT and Networking Job Opportunities
- 1.5 Summary
- 1.5.1 Conclusion
- 1.5.1.1 Class Activity – Draw Your Concept of the Internet Now
- 1.5.1.2 Warriors of the Net
- 1.5.1.3 Chapter 1: Exploring the Network
- Chapter 2
- Configure a Network Operating System
- 2.0 Introduction
- 2.0.1 Welcome
- 2.0.1.1 Chapter 2: Configure a Network Operating System
- 2.0.1.2 Class Activity - It Is Just an Operating System
- 2.1 IOS Bootcamp
- 2.1.1 Cisco IOS
- 2.1.1.1 Operating Systems
- 2.1.1.2 Purpose of OS
- 2.1.2 Cisco IOS Access
- 2.1.2.1 Access Methods
- 2.1.2.2 Terminal Emulation Programs
- 2.1.2.3 Activity - Accessing Devices
- 2.1.3 Navigate the IOS
- 2.1.3.1 Cisco IOS Modes of Operation
- 2.1.3.2 Primary Command Modes
- 2.1.3.3 Configuration Command Modes
- 2.1.3.4 Navigate Between IOS Modes
- 2.1.4 The Command Structure
- 2.1.4.1 Basic IOS Command Structure
- 2.1.4.2 IOS Command Syntax
- 2.1.4.3 IOS Help Features
- 2.1.4.4 Hotkeys and Shortcuts
- 2.1.4.5 Video Demonstration – Hotkeys and Shortcuts
- 2.1.4.6 Packet Tracer - Navigating the IOS
- 2.1.4.7 Lab - Establishing a Console Session with Tera Term
- 2.2 Basic Device Configuration
- 2.2.1 Hostnames
- 2.2.1.1 Device Names
- 2.2.1.2 Configure Hostnames
- 2.2.2 Limit Access to Device Configurations
- 2.2.2.1 Secure Device Access
- 2.2.2.2 Configure Passwords
- 2.2.2.3 Encrypt Passwords
- 2.2.2.4 Banner Messages
- 2.2.2.5 Syntax Checker - Limiting Access to a Switch
- 2.2.3 Save Configurations
- 2.2.3.1 Save the Running Configuration File
- 2.2.3.2 Alter the Running Configuration
- 2.2.3.3 Capture Configuration to a Text File
- 2.2.3.4 Packet Tracer - Configuring Initial Switch Settings
- 2.3 Address Schemes
- 2.3.1 Ports and Addresses
- 2.3.1.1 IP Addresses
- 2.3.1.2 Interfaces and Ports
- 2.3.2 Configure IP Addressing
- 2.3.2.1 Manual IP Address Configuration for End Devices
- 2.3.2.2 Automatic IP Address Configuration for End Devices
- 2.3.2.3 Switch Virtual Interface Configuration
- 2.3.2.4 Syntax Checker - Configuring a Switch Virtual Interface
- 2.3.2.5 Packet Tracer - Implementing Basic Connectivity
- 2.3.3 Verifying Connectivity
- 2.3.3.1 Interface Addressing Verification
- 2.3.3.2 End-to-End Connectivity Test
- 2.3.3.3 Lab - Building a Simple Network
- 2.3.3.4 Lab - Configuring a Switch Management Address
- 2.4 Summary
- 2.4.1 Conclusion
- 2.4.1.1 Class Activity - Tutor Me
- 2.4.1.2 Packet Tracer - Skills Integration Challenge
- 2.4.1.3 Chapter 2: Configure a Network Operating System
- Chapter 3
- Network Protocols and Communications
- 3.0 Introduction
- 3.0.1 Welcome
- 3.0.1.1 Chapter 3: Network Protocols and Communications
- 3.0.1.2 Class Activity - Designing a Communications System
- 3.1 Rules of Communication
- 3.1.1 The Rules
- 3.1.1.1 Communication Fundamentals
- 3.1.1.2 Rule Establishment
- 3.1.1.3 Message Encoding
- 3.1.1.4 Message Formatting and Encapsulation
- 3.1.1.5 Message Size
- 3.1.1.6 Message Timing
- 3.1.1.7 Message Delivery Options
- 3.2 Network Protocols and Standards
- 3.2.1 Protocols
- 3.2.1.1 Rules that Govern Communications
- 3.2.1.2 Network Protocols
- 3.2.1.3 Protocol Interaction
- 3.2.2 Protocol Suites
- 3.2.2.1 Protocol Suites and Industry Standards
- 3.2.2.2 Development of TCP/IP
- 3.2.2.3 TCP/IP Protocol Suite
- 3.2.2.4 TCP/IP Communication Process
- 3.2.2.5 Activity - Mapping the Protocols of the TCP/IP Suite
- 3.2.3 Standard Organizations
- 3.2.3.1 Open Standards
- 3.2.3.2 Internet Standards
- 3.2.3.3 Electronics and Communications Standard Organizations
- 3.2.3.4 Lab - Researching Networking Standards
- 3.2.4 Reference Models
- 3.2.4.1 The Benefits of Using a Layered Model
- 3.2.4.2 The OSI Reference Model
- 3.2.4.3 The TCP/IP Protocol Model
- 3.2.4.4 OSI Model and TCP/IP Model Comparison
- 3.2.4.5 Activity - Identify Layers and Functions
- 3.2.4.6 Packet Tracer - Investigating the TCP/IP and OSI Models in Action
- 3.3 Data Transfer in the Network
- 3.3.1 Data Encapsulation
- 3.3.1.1 Message Segmentation
- 3.3.1.2 Protocol Data Units
- 3.3.1.3 Encapsulation Example
- 3.3.1.4 De-encapsulation
- 3.3.1.5 Activity - Identify the PDU Layer
- 3.3.2 Data Access
- 3.3.2.1 Network Addresses
- 3.3.2.2 Data Link Addresses
- 3.3.2.3 Devices on the Same Network
- 3.3.2.4 Devices on a Remote Network
- 3.4 Summary
- 3.4.1 Conclusion
- 3.4.1.1 Lab - Installing Wireshark
- 3.4.1.2 Lab - Using Wireshark to View Network Traffic
- 3.4.1.3 Class Activity - Guaranteed to Work!
- 3.4.1.4 Chapter 3: Network Protocols and Communications
- Chapter 4
- Network Access
- 4.0 Introduction
- 4.0.1 Welcome
- 4.0.1.1 Chapter 4: Network Access
- 4.0.1.2 Class Activity – Managing the Medium
- 4.1 Physical Layer Protocols
- 4.1.1 Physical Layer Connection
- 4.1.1.1 Types of Connections
- 4.1.1.2 Network Interface Cards
- 4.1.2 Purpose of the Physical Layer
- 4.1.2.1 The Physical Layer
- 4.1.2.2 Physical Layer Media
- 4.1.2.3 Physical Layer Standards
- 4.1.2.4 Lab - Identifying Network Devices and Cabling
- 4.1.3 Physical Layer Characteristics
- 4.1.3.1 Functions
- 4.1.3.2 Bandwidth
- 4.1.3.3 Throughput
- 4.1.3.4 Types of Physical Media
- 4.1.3.5 Activity - Physical Layer Terminology
- 4.2 Network Media
- 4.2.1 Copper Cabling
- 4.2.1.1 Characteristics of Copper Cabling
- 4.2.1.2 Copper Media
- 4.2.1.3 Unshielded Twisted-Pair Cable
- 4.2.1.4 Shielded Twisted-Pair Cable
- 4.2.1.5 Coaxial Cable
- 4.2.1.6 Copper Media Safety
- 4.2.1.7 Activity - Copper Media Characteristics
- 4.2.2 UTP Cabling
- 4.2.2.1 Properties of UTP Cabling
- 4.2.2.2 UTP Cabling Standards
- 4.2.2.3 UTP Connectors
- 4.2.2.4 Types of UTP Cable
- 4.2.2.5 Testing UTP Cables
- 4.2.2.6 Cable Pinouts
- 4.2.2.7 Lab - Building an Ethernet Crossover Cable
- 4.2.3 Fiber-Optic Cabling
- 4.2.3.1 Properties of Fiber-Optic Cabling
- 4.2.3.2 Fiber Media Cable Design
- 4.2.3.3 Types of Fiber Media
- 4.2.3.4 Fiber-Optic Connectors
- 4.2.3.5 Testing Fiber Cables
- 4.2.3.6 Fiber versus Copper
- 4.2.3.7 Activity - Fiber Optics Terminology
- 4.2.4 Wireless Media
- 4.2.4.1 Properties of Wireless Media
- 4.2.4.2 Types of Wireless Media
- 4.2.4.3 Wireless LAN
- 4.2.4.4 Packet Tracer – Connecting a Wired and Wireless LAN
- 4.2.4.5 Lab - Viewing Wired and Wireless NIC Information
- 4.3 Data Link Layer Protocols
- 4.3.1 Purpose of the Data Link Layer
- 4.3.1.1 The Data Link Layer
- 4.3.1.2 Data Link Sublayers
- 4.3.1.3 Media Access Control
- 4.3.1.4 Providing Access to Media
- 4.3.1.5 Data Link Layer Standards
- 4.4 Media Access Control
- 4.4.1 Topologies
- 4.4.1.1 Controlling Access to the Media
- 4.4.1.2 Physical and Logical Topologies
- 4.4.2 WAN Topologies
- 4.4.2.1 Common Physical WAN Topologies
- 4.4.2.2 Physical Point-to-Point Topology
- 4.4.2.3 Logical Point-to-Point Topology
- 4.4.3 LAN Topologies
- 4.4.3.1 Physical LAN Topologies
- 4.4.3.2 Half and Full Duplex
- 4.4.3.3 Media Access Control Methods
- 4.4.3.4 Contention-Based Access – CSMA/CD
- 4.4.3.5 Contention-Based Access – CSMA/CA
- 4.4.4 Data Link Frame
- 4.4.4.1 The Frame
- 4.4.4.2 Frame Fields
- 4.4.4.3 Activity – Generic Frame Fields
- 4.4.4.4 Layer 2 Address
- 4.4.4.5 LAN and WAN Frames
- 4.5 Summary
- 4.5.1 Conclusion
- 4.5.1.1 Class Activity – Linked In!
- 4.5.1.2 Chapter 4: Network Access
- Chapter 5
- Ethernet
- 5.0 Introduction
- 5.0.1 Welcome
- 5.0.1.1 Chapter 5: Ethernet
- 5.0.1.2 Class Activity - Join My Social Circle!
- 5.1 Ethernet Protocol
- 5.1.1 Ethernet Frame
- 5.1.1.1 Ethernet Encapsulation
- 5.1.1.2 MAC Sublayer
- 5.1.1.3 Ethernet Evolution
- 5.1.1.4 Ethernet Frame Fields
- 5.1.1.5 Activity - MAC and LLC Sublayers
- 5.1.1.6 Activity - Ethernet Frame Fields
- 5.1.1.7 Lab - Using Wireshark to Examine Ethernet Frames
- 5.1.2 Ethernet MAC Addresses
- 5.1.2.1 MAC Address and Hexadecimal
- 5.1.2.2 MAC Address: Ethernet Identity
- 5.1.2.3 Frame Processing
- 5.1.2.4 MAC Address Representations
- 5.1.2.5 Unicast MAC Address
- 5.1.2.6 Broadcast MAC Address
- 5.1.2.7 Multicast MAC Address
- 5.1.2.8 Lab - Viewing Network Device MAC Addresses
- 5.2 LAN Switches
- 5.2.1 The MAC Address Table
- 5.2.1.1 Switch Fundamentals
- 5.2.1.2 Learning MAC Addresses
- 5.2.1.3 Filtering Frames
- 5.2.1.4 Video Demonstration - MAC Address Tables on Connected Switches
- 5.2.1.5 Video Demonstration - Sending a Frame to the Default Gateway
- 5.2.1.6 Activity - Switch It!
- 5.2.1.7 Lab - Viewing the Switch MAC Address Table
- 5.2.2 Switch Forwarding Methods
- 5.2.2.1 Frame Forwarding Methods on Cisco Switches
- 5.2.2.2 Cut-Through Switching
- 5.2.2.3 Memory Buffering on Switches
- 5.2.2.4 Activity - Frame Forwarding Methods
- 5.2.3 Switch Port Settings
- 5.2.3.1 Duplex and Speed Settings
- 5.2.3.2 Auto-MDIX
- 5.3 Address Resolution Protocol
- 5.3.1 MAC and IP
- 5.3.1.1 Destination on Same Network
- 5.3.1.2 Destination Remote Network
- 5.3.1.3 Packet Tracer – Identify MAC and IP Addresses
- 5.3.2 ARP
- 5.3.2.1 Introduction to ARP
- 5.3.2.2 ARP Functions
- 5.3.2.3 Video Demonstration – ARP Request
- 5.3.2.4 Video Demonstration – ARP Reply
- 5.3.2.5 Video Demonstration – ARP Role in Remote Communication
- 5.3.2.6 Removing Entries from an ARP Table
- 5.3.2.7 ARP Tables
- 5.3.2.8 Packet Tracer - Examine the ARP Table
- 5.3.3 ARP Issues
- 5.3.3.1 ARP Broadcasts
- 5.3.3.2 ARP Spoofing
- 5.4 Summary
- 5.4.1 Conclusion
- 5.4.1.1 Class Activity - MAC and Choose…
- 5.4.1.2 Chapter 5: Ethernet
- Chapter 6
- Network Layer
- 6.0 Introduction
- 6.0.1 Welcome
- 6.0.1.1 Chapter 6: Network Layer
- 6.0.1.2 Class Activity - The Road Less Traveled…
- 6.1 Network Layer Protocols
- 6.1.1 Network Layer in Communications
- 6.1.1.1 The Network Layer
- 6.1.1.2 Network Layer Protocols
- 6.1.2 Characteristics of the IP Protocol
- 6.1.2.1 Encapsulating IP
- 6.1.2.2 Characteristics of IP
- 6.1.2.3 IP - Connectionless
- 6.1.2.4 IP - Best Effort Delivery
- 6.1.2.5 IP - Media Independent
- 6.1.2.6 Activity - IP Characteristics
- 6.1.3 IPv4 Packet
- 6.1.3.1 IPv4 Packet Header
- 6.1.3.2 Video Demonstration - Sample IPv4 Headers in Wireshark
- 6.1.3.3 Activity - IPv4 Header Fields
- 6.1.4 IPv6 Packet
- 6.1.4.1 Limitations of IPv4
- 6.1.4.2 Introducing IPv6
- 6.1.4.3 Encapsulating IPv6
- 6.1.4.4 IPv6 Packet Header
- 6.1.4.5 Video Demonstration - Sample IPv6 Headers and Wireshark
- 6.1.4.6 Activity - IPv6 Header Fields
- 6.2 Routing
- 6.2.1 How a Host Routes
- 6.2.1.1 Host Forwarding Decision
- 6.2.1.2 Default Gateway
- 6.2.1.3 Using the Default Gateway
- 6.2.1.4 Host Routing Tables
- 6.2.2 Router Routing Tables
- 6.2.2.1 Router Packet Forwarding Decision
- 6.2.2.2 IPv4 Router Routing Table
- 6.2.2.3 Video Demonstration - Introducing the IPv4 Routing Table
- 6.2.2.4 Directly Connected Routing Table Entries
- 6.2.2.5 Remote Network Routing Table Entries
- 6.2.2.6 Next-Hop Address
- 6.2.2.7 Video Demonstration – Explaining the IPv4 Routing Table
- 6.2.2.8 Activity - Identify Elements of a Router Routing Table Entry
- 6.3 Routers
- 6.3.1 Anatomy of a Router
- 6.3.1.1 A Router is a Computer
- 6.3.1.2 Router CPU and OS
- 6.3.1.3 Router Memory
- 6.3.1.4 Inside a Router
- 6.3.1.5 Connect to a Router
- 6.3.1.6 LAN and WAN Interfaces
- 6.3.1.7 Activity - Identify Router Components
- 6.3.1.8 Packet Tracer - Exploring Internetworking Devices
- 6.3.2 Router Boot-up
- 6.3.2.1 Bootset Files
- 6.3.2.2 Router Bootup Process
- 6.3.2.3 Video Demonstration – Router Bootup Process
- 6.3.2.4 Show Version Output
- 6.3.2.5 Video Demonstration - The show version Command
- 6.3.2.6 Activity - The Router Boot Process
- 6.3.2.7 Lab - Exploring Router Physical Characteristics
- 6.4 Configure a Cisco Router
- 6.4.1 Configure Initial Settings
- 6.4.1.1 Basic Switch Configuration Steps
- 6.4.1.2 Basic Router Configuration Steps
- 6.4.1.3 Packet Tracer - Configure Initial Router Settings
- 6.4.2 Configure Interfaces
- 6.4.2.1 Configure Router Interfaces
- 6.4.2.2 Verify Interface Configuration
- 6.4.3 Configure the Default Gateway
- 6.4.3.1 Default Gateway for a Host
- 6.4.3.2 Default Gateway for a Switch
- 6.4.3.3 Packet Tracer - Connect a Router to a LAN
- 6.4.3.4 Packet Tracer - Troubleshooting Default Gateway Issues
- 6.5 Summary
- 6.5.1 Conclusion
- 6.5.1.1 Class Activity - Can You Read This Map?
- 6.5.1.2 Lab - Building a Switch and Router Network
- 6.5.1.3 Packet Tracer - Skills Integration Challenge
- 6.5.1.4 Chapter 6: Network Layer
- Chapter 7
- IP Addressing
- 7.0 Introduction
- 7.0.1 Welcome
- 7.0.1.1 Chapter 7: IP Addressing
- 7.0.1.2 Class Activity – The Internet of Everything (IoE)
- 7.1 IPv4 Network Addresses
- 7.1.1 Binary and Decimal Conversion
- 7.1.1.1 IPv4 Addresses
- 7.1.1.2 Video Demonstration – Converting Between Binary and Decimal Numbering Systems
- 7.1.1.3 Positional Notation
- 7.1.1.4 Binary to Decimal Conversion
- 7.1.1.5 Activity – Binary to Decimal Conversion
- 7.1.1.6 Decimal to Binary Conversion
- 7.1.1.7 Decimal to Binary Conversion Examples
- 7.1.1.8 Activity – Decimal to Binary Conversion Utility
- 7.1.1.9 Activity – Binary Game
- 7.1.2 IPv4 Address Structure
- 7.1.2.1 Network and Host Portions
- 7.1.2.2 The Subnet Mask
- 7.1.2.3 Logical AND
- 7.1.2.4 Activity – ANDing to Determine the Network Address
- 7.1.2.5 The Prefix Length
- 7.1.2.6 Network, Host, and Broadcast Addresses
- 7.1.2.7 Video Demonstration - Network, Host, and Broadcast Addresses
- 7.1.2.8 Lab – Using the Windows Calculator with Network Addresses
- 7.1.2.9 Lab – Converting IPv4 Addresses to Binary
- 7.1.3 IPv4 Unicast, Broadcast, and Multicast
- 7.1.3.1 Static IPv4 Address Assignment to a Host
- 7.1.3.2 Dynamic IPv4 Address Assignment to a Host
- 7.1.3.3 IPv4 Communication
- 7.1.3.4 Unicast Transmission
- 7.1.3.5 Broadcast Transmission
- 7.1.3.6 Multicast Transmission
- 7.1.3.7 Activity – Unicast, Broadcast, or Multicast
- 7.1.3.8 Packet Tracer – Investigate Unicast, Broadcast, and Multicast Traffic
- 7.1.4 Types of IPv4 Addressses
- 7.1.4.1 Public and Private IPv4 Addresses
- 7.1.4.2 Activity – Pass or Block IPv4 Addresses
- 7.1.4.3 Special User IPv4 Addresses
- 7.1.4.4 Legacy Classful Addressing
- 7.1.4.5 Video Demonstration - Classful IPv4 Addressing
- 7.1.4.6 Classless Addressing
- 7.1.4.7 Assignment of IP Addresses
- 7.1.4.8 Activity – Public or Private IPv4 Addresses
- 7.1.4.9 Lab – Identifying IPv4 Addresses
- 7.2 IPv6 Network Addresses
- 7.2.1 IPv4 Issues
- 7.2.1.1 The Need for IPv6
- 7.2.1.2 IPv4 and IPv6 Coexistence
- 7.2.1.3 Activity – IPv4 Issues and Solutions
- 7.2.2 IPv6 Addressing
- 7.2.2.1 IPv6 Address Representation
- 7.2.2.2 Rule 1 – Omit Leading 0s
- 7.2.2.3 Rule 2 – Omit All 0 Segments
- 7.2.2.4 Activity – Practicing IPv6 Address Representations
- 7.2.3 Types of IPv6 Addresses
- 7.2.3.1 IPv6 Address Types
- 7.2.3.2 IPv6 Prefix Length
- 7.2.3.3 IPv6 Unicast Addresses
- 7.2.3.4 IPv6 Link-Local Unicast Addresses
- 7.2.3.5 Activity – Identify Types of IPv6 Addresses
- 7.2.4 IPv6 Unicast Addresses
- 7.2.4.1 Structure of an IPv6 Global Unicast Address
- 7.2.4.2 Static Configuration of a Global Unicast Address
- 7.2.4.3 Dynamic Configuration - SLAAC
- 7.2.4.4 Dynamic Configuration – DHCPv6
- 7.2.4.5 EUI-64 Process and Randomly Generated
- 7.2.4.6 Dynamic Link-Local Addresses
- 7.2.4.7 Static Link-Local Addresses
- 7.2.4.8 Verifying IPv6 Address Configuration
- 7.2.4.9 Packet Tracer – Configuring IPv6 Addressing
- 7.2.5 IPv6 Multicast Addresses
- 7.2.5.1 Assigned IPv6 Multicast Addresses
- 7.2.5.2 Solicited-Node IPv6 Multicast Addresses
- 7.2.5.3 Lab – Identifying IPv6 Addresses
- 7.2.5.4 Lab – Configuring IPv6 Addresses on Network Devices
- 7.3 Connectivity Verification
- 7.3.1 ICMP
- 7.3.1.1 ICMPv4 and ICMPv6
- 7.3.1.2 ICMPv6 Router Solicitation and Router Advertisement Messages
- 7.3.2 Testing and Verification
- 7.3.2.1 Ping - Testing the Local Stack
- 7.3.2.2 Ping – Testing Connectivity to the Local LAN
- 7.3.2.3 Ping – Testing Connectivity to Remote
- 7.3.2.4 Traceroute – Testing the Path
- 7.3.2.5 Packet Tracer – Verifying IPv4 and IPv6 Addressing
- 7.3.2.6 Packet Tracer – Pinging and Tracing to Test the Path
- 7.3.2.7 Lab – Testing Network Connectivity with Ping and Traceroute
- 7.3.2.8 Lab – Mapping the Internet
- 7.3.2.9 Packet Tracer – Troubleshooting IPv4 and IPv6 Addressing
- 7.4 Summary
- 7.4.1 Conclusion
- 7.4.1.1 Class Activity – The Internet of Everything…Naturally!
- 7.4.1.2 Packet Tracer – Skills Integration Challenge
- 7.4.1.3 Chapter 7: IP Addressing
- Chapter 8
- Subnetting IP Networks
- 8.0 Introduction
- 8.0.1 Welcome
- 8.0.1.1 Chapter 8: Subnetting IP Networks
- 8.0.1.2 Class Activity – Call Me!
- 8.1 Subnetting an IPv4 Network
- 8.1.1 Network Segmentation
- 8.1.1.1 Broadcast Domains
- 8.1.1.2 Problems with Large Broadcast Domains
- 8.1.1.3 Reasons for Subnetting
- 8.1.2 Subnetting an IPv4 Network
- 8.1.2.1 Octet Boundaries
- 8.1.2.2 Subnetting on the Octet Boundary
- 8.1.2.3 Classless Subnetting
- 8.1.2.4 Video Demonstration – The Subnet Mask
- 8.1.2.5 Video Demonstration – Subnetting with the Magic Number
- 8.1.2.6 Classless Subnetting Example
- 8.1.2.7 Creating 2 Subnets
- 8.1.2.8 Video Demonstration – Creating Two Equal-Sized Subnets
- 8.1.2.9 Subnetting Formulas
- 8.1.2.10 Creating 4 Subnets
- 8.1.2.11 Video Demonstration – Creating Four Equal-Sized Subnets
- 8.1.2.12 Video Demonstration – Creating Eight Equal-Sized Subnets
- 8.1.3 Subnetting a /16 and /8 Prefix
- 8.1.3.1 Creating Subnets with a /16 prefix
- 8.1.3.2 Creating 100 Subnets with a /16 Network
- 8.1.3.3 Calculating the Hosts
- 8.1.3.4 Video Demonstration – Creating One Hundred Equal-Sized Subnets
- 8.1.3.5 Creating 1000 Subnets with a /8 Network
- 8.1.3.6 Video Demonstration – Subnetting Across Multiple Octets
- 8.1.4 Subnetting to Meet Requirements
- 8.1.4.1 Subnetting Based on Host Requirements
- 8.1.4.2 Subnetting Based on Network Requirements
- 8.1.4.3 Network Requirement Example
- 8.1.4.4 Activity – Calculate the Subnet Mask
- 8.1.4.5 Activity – Determining the Number of Bits to Borrow
- 8.1.4.6 Lab - Calculating IPv4 Subnets
- 8.1.4.7 Packet Tracer - Subnetting Scenario
- 8.1.4.8 Lab – Designing and Implementing a Subnetted IPv4 Addressing Scheme
- 8.1.5 Benefits of Variable Length Subnet Masking
- 8.1.5.1 Traditional Subnetting Wastes Addresses
- 8.1.5.2 Variable Length Subnet Masks
- 8.1.5.3 Basic VLSM
- 8.1.5.4 Video Demonstration – Basic VLSM
- 8.1.5.5 VLSM in Practice
- 8.1.5.6 VLSM Chart
- 8.1.5.7 Video Demonstration – VLSM Example
- 8.1.5.8 Activity – Practicing VLSM
- 8.2 Addressing Schemes
- 8.2.1 Structured Design
- 8.2.1.1 Network Address Planning
- 8.2.1.2 Planning to Address the Network
- 8.2.1.3 Assigning Addresses to Devices
- 8.2.1.4 Packet Tracer – Designing and Implementing a VLSM Addressing Scheme
- 8.2.1.5 Lab – Designing and Implementing a VLSM Addressing Scheme
- 8.3 Design Considerations for IPv6
- 8.3.1 Subnetting an IPv6 Network
- 8.3.1.1 The IPv6 Global Unicast Address
- 8.3.1.2 Subnetting Using the Subnet ID
- 8.3.1.3 IPv6 Subnet Allocation
- 8.3.1.4 Packet Tracer – Implementing a Subnetted IPv6 Addressing Scheme
- 8.4 Summary
- 8.4.1 Conclusion
- 8.4.1.1 Class Activity – Can you call me now?
- 8.4.1.2 Packet Tracer – Skills Integration Challenge
- 8.4.1.3 Chapter 8: Subnetting IP Networks
- Chapter 9
- Transport Layer
- 9.0 Introduction
- 9.0.1 Welcome
- 9.0.1.1 Transport Layer
- 9.0.1.2 Class Activity - We Need to Talk - Game
- 9.1 Transport Layer Protocols
- 9.1.1 Transportation of Data
- 9.1.1.1 Role of the Transport Layer
- 9.1.1.2 Transport Layer Responsibilities
- 9.1.1.3 Conversation Multiplexing
- 9.1.1.4 Transport Layer Reliability
- 9.1.1.5 TCP
- 9.1.1.6 UDP
- 9.1.1.7 The Right Transport Layer Protocol for the Right Application
- 9.1.2 TCP and UDP Overview
- 9.1.2.1 TCP Features
- 9.1.2.2 TCP Header
- 9.1.2.3 UDP Features
- 9.1.2.4 UDP Header
- 9.1.2.5 Multiple Separate Conversations
- 9.1.2.6 Port Numbers
- 9.1.2.7 Socket Pairs
- 9.1.2.8 Port Number Groups
- 9.1.2.9 The netstat Command
- 9.1.2.10 Activity - Compare TCP and UDP Characteristics
- 9.2 TCP and UDP
- 9.2.1 TCP Communication Process
- 9.2.1.1 TCP Server Processes
- 9.2.1.2 TCP Connection Establishment
- 9.2.1.3 TCP Session Termination
- 9.2.1.4 TCP Three-way Handshake Analysis
- 9.2.1.5 Video Demonstration – TCP 3-Way Handshake
- 9.2.1.6 Lab - Using Wireshark to Observe the TCP 3-Way Handshake
- 9.2.1.7 Activity - TCP Connection and Termination Process
- 9.2.2 Reliability and Flow Control
- 9.2.2.1 TCP Reliability - Ordered Delivery
- 9.2.2.2 Video Demonstration - Sequence Numbers and Acknowledgments
- 9.2.2.3 Video Demonstration - Data Loss and Retransmission
- 9.2.2.4 TCP Flow Control - Window Size and Acknowledgments
- 9.2.2.5 TCP Flow Control - Congestion Avoidance
- 9.2.3 UDP Communication
- 9.2.3.1 UDP Low Overhead versus Reliability
- 9.2.3.2 UDP Datagram Reassembly
- 9.2.3.3 UDP Server Processes and Requests
- 9.2.3.4 UDP Client Processes
- 9.2.3.5 Lab - Using Wireshark to Examine a UDP DNS Capture
- 9.2.4 TCP or UDP
- 9.2.4.1 Applications that use TCP
- 9.2.4.2 Applications that use UDP
- 9.2.4.3 Lab - Using Wireshark to Examine FTP and TFTP Captures
- 9.2.4.4 Activity - TCP, UDP, or Both
- 9.3 Summary
- 9.3.1 Conclusion
- 9.3.1.1 Class Activity - We Need to Talk, Again - Game
- 9.3.1.2 Packet Tracer - TCP and UDP Communications
- 9.3.1.3 Chapter 9: Transport Layer
- Chapter 10
- Application Layer
- 10.0 Introduction
- 10.0.1 Welcome
- 10.0.1.1 Chapter 10: Application Layer
- 10.0.1.2 Class Activity – Application Investigation
- 10.1 Application Layer Protocols
- 10.1.1 Application, Presentation, and Session
- 10.1.1.1 Application Layer
- 10.1.1.2 Presentation and Session Layer
- 10.1.1.3 TCP/IP Application Layer Protocols
- 10.1.1.4 Activity – Application and Presentation (Protocols and Standards)
- 10.1.2 How Application Protocols Interact with End-User Applications
- 10.1.2.1 Client-Server Model
- 10.1.2.2 Peer-to-Peer Networks
- 10.1.2.3 Peer-to-Peer Applications
- 10.1.2.4 Common P2P Applications
- 10.1.2.5 Lab – Researching Peer-to-Peer File Sharing
- 10.2 Well-Known Application Layer Protocols and Services
- 10.2.1 Web and Email Protocols
- 10.2.1.1 Hypertext Transfer Protocol and Hypertext Markup Language
- 10.2.1.2 HTTP and HTTPS
- 10.2.1.3 Email Protocols
- 10.2.1.4 SMTP Operation
- 10.2.1.5 POP Operation
- 10.2.1.6 IMAP Operation
- 10.2.1.7 Packet Tracer – Web and Email
- 10.2.2 IP Addressing Services
- 10.2.2.1 Domain Name Service
- 10.2.2.2 DNS Message Format
- 10.2.2.3 DNS Hierarchy
- 10.2.2.4 The nslookup Command
- 10.2.2.5 Dynamic Host Configuration Protocol
- 10.2.2.6 DHCP Operation
- 10.2.2.7 Packet Tracer – DHCP and DNS Servers
- 10.2.2.8 Lab – Observing DNS Servers
- 10.2.3 File Sharing Services
- 10.2.3.1 File Transfer Protocol
- 10.2.3.2 Server Message Block
- 10.2.3.3 Packet Tracer - FTP
- 10.2.3.4 Lab – Exploring FTP
- 10.3 Summary
- 10.3.1 Conclusion
- 10.3.1.1 Modeling Activity – Make it happen!
- 10.3.1.2 Packet Tracer - Explore a Network
- 10.3.1.3 Packet Tracer - Multiuser - Tutorial
- 10.3.1.4 Packet Tracer Multiuser - Implement Services
- 10.3.1.5 Chapter 10: Application Layer
- Chapter 11
- Build a Small Network
- 11.0 Introduction
- 11.0.1 Welcome
- 11.0.1.1 Chapter 11: Build a Small Network
- 11.0.1.2 Class Activity - Did You Notice…?
- 11.1 Network Design
- 11.1.1 Devices in a Small Network
- 11.1.1.1 Small Network Topologies
- 11.1.1.2 Device Selection for a Small Network
- 11.1.1.3 IP Addressing for a Small Network
- 11.1.1.4 Redundancy in a Small Network
- 11.1.1.5 Traffic Management
- 11.1.2 Small Network Applications and Protocols
- 11.1.2.1 Common Applications
- 11.1.2.2 Common Protocols
- 11.1.2.3 Voice and Video Applications
- 11.1.3 Scale to Larger Networks
- 11.1.3.1 Small Network Growth
- 11.1.3.2 Protocol Analysis
- 11.1.3.3 Employee Network Utilization
- 11.2 Network Security
- 11.2.1 Security Threats and Vulnerabilities
- 11.2.1.1 Types of Threats
- 11.2.1.2 Physical Security
- 11.2.1.3 Types of Vulnerabilities
- 11.2.1.4 Activity - Security Threats and Vulnerabilities
- 11.2.2 Network Attacks
- 11.2.2.1 Types of Malware
- 11.2.2.2 Reconnaissance Attacks
- 11.2.2.3 Access Attacks
- 11.2.2.4 Denial of Service Attacks
- 11.2.2.5 Activity - Types of Attack
- 11.2.2.6 Lab - Researching Network Security Threats
- 11.2.3 Network Attack Mitigation
- 11.2.3.1 Backup, Upgrade, Update, and Patch
- 11.2.3.2 Authentication, Authorization, and Accounting
- 11.2.3.3 Firewalls
- 11.2.3.4 Endpoint Security
- 11.2.4 Device Security
- 11.2.4.1 Device Security Overview
- 11.2.4.2 Passwords
- 11.2.4.3 Basic Security Practices
- 11.2.4.4 Enable SSH
- 11.2.4.5 Packet Tracer - Configuring Secure Passwords and SSH
- 11.2.4.6 Lab - Accessing Network Devices with SSH
- 11.2.4.7 Lab - Examining Telnet and SSH in Wireshark
- 11.2.4.8 Lab - Securing Network Devices
- 11.3 Basic Network Performance
- 11.3.1 The ping Command
- 11.3.1.1 Interpreting Ping Results
- 11.3.1.2 Extended Ping
- 11.3.1.3 Network Baseline
- 11.3.2 The traceroute and tracert Command
- 11.3.2.1 Interpreting Trace Messages
- 11.3.2.2 Extended Traceroute
- 11.3.2.3 Packet Tracer – Test Connectivity with Traceroute
- 11.3.2.4 Lab -Testing Network Latency with Ping and Traceroute
- 11.3.3 Show Commands
- 11.3.3.1 Common show Commands Revisited
- 11.3.3.2 Video Demonstration - The show version Command
- 11.3.3.3 Packet Tracer - Using show Commands
- 11.3.4 Host and IOS Commands
- 11.3.4.1 The ipconfig Command
- 11.3.4.2 The arp Command
- 11.3.4.3 The show cdp neighbors Command
- 11.3.4.4 The show ip interface brief Command
- 11.3.4.5 Activity - Show Commands
- 11.3.4.6 Lab - Using the CLI to Gather Network Device Information
- 11.3.5 Debugging
- 11.3.5.1 The debug Command
- 11.3.5.2 The terminal monitor Command
- 11.4 Network Troubleshooting
- 11.4.1 Troubleshooting Methodologies
- 11.4.1.1 Basic Troubleshooting Approaches
- 11.4.1.2 Resolve or Escalate?
- 11.4.1.3 Verify and Monitor Solution
- 11.4.1.4 Activity – Order the Troubleshooting Steps
- 11.4.2 Troubleshoot Cables and Interfaces
- 11.4.2.1 Duplex Operation
- 11.4.2.2 Duplex Mismatch
- 11.4.3 Troubleshooting Scenarios
- 11.4.3.1 IP Addressing Issues on IOS Devices
- 11.4.3.2 IP Addressing Issues on End Devices
- 11.4.3.3 Default Gateway Issues
- 11.4.3.4 Troubleshooting DNS Issues
- 11.4.3.5 Lab - Troubleshooting Connectivity Issues
- 11.4.3.6 Packet Tracer - Troubleshooting Connectivity Issues
- 11.5 Summary
- 11.5.1 Conclusion
- 11.5.1.1 Class Activity - Design and Build a Small Business Network
- 11.5.1.2 Packet Tracer - Skill Integration Challenge
- 11.5.1.3 Packet Tracer - Troubleshooting Challenge
- 11.5.1.4 Before You Go
- 11.5.1.5 Chapter 11: Build a Small Network
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement