Cisco Networking Essentials, 2e

Paperback Engels 2015 9781119092155
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Start a career in networking

Cisco Networking Essentials, 2nd Edition provides the latest for those beginning a career in networking. This book provides the fundamentals of networking and leads you through the concepts, processes, and skills you need to master fundamental networking concepts. Thinking of taking the CCENT Cisco Certified Entry Networking Technician ICND1 Exam 100–101? This book has you covered! With coverage of important topics and objectives, each chapter outlines main points and provides clear, engaging discussion that will give you a sound understanding of core topics and concepts. End–of–chapter review questions and suggested labs help reinforce what you′ve learned, and show you where you may need to backtrack and brush up before exam day.

Cisco is the worldwide leader in networking products and services, which are used by a majority of the world′s companies. This book gives you the skills and understanding you need to administer these networks, for a skillset that will serve you anywhere around the globe.

Understand fundamental networking concepts
Learn your way around Cisco products and services
Gain the skills you need to administer Cisco routers and switches
Prepare thoroughly for the CCENT exam

If you′re interested in becoming in–demand, network administration is the way to go; if you want to develop the skillset every company wants to hire, Cisco Networking Essentials, 2nd Edition gets you started working with the most widespread name in the business.

Specificaties

ISBN13:9781119092155
Taal:Engels
Bindwijze:paperback
Aantal pagina's:480

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

Introduction xxiii
<p>Chapter 1 Networks 1</p>
<p>Describing Network Components 1</p>
<p>Defining the Benefits of Networks 2</p>
<p>Identifying the Requirements for a Network 5</p>
<p>Classifying Networks by Function 8</p>
<p>Understanding LANs 9</p>
<p>Understanding WANs10</p>
<p>Defining Network Architectures 10</p>
<p>Understanding Peer–to–Peer Networks 11</p>
<p>Understanding Client–Server Networks 14</p>
<p>The Essentials and Beyond&nbsp;&nbsp; 17</p>
<p>Chapter 2 The OSI Model 19</p>
<p>Using Reference Models 19</p>
<p>Understanding the Benefits of Reference&nbsp;&nbsp; 21</p>
<p>Exploring Reference Model Examples&nbsp; 21</p>
<p>Introducing the Layers of the OSI Model 22</p>
<p>Understanding the Application Layer&nbsp; 23</p>
<p>Understanding the Presentation Layer 24</p>
<p>Understanding the Session Layer 26</p>
<p>Understanding the Transport Layer&nbsp;&nbsp; 26</p>
<p>Understanding the Network Layer 30</p>
<p>Understanding the Data–Link Layer&nbsp;&nbsp; 31</p>
<p>Understanding the Physical Layer 33</p>
<p>Describing the OSI Encapsulation Process 33</p>
<p>Identifying the Process on the Source Device 34</p>
<p>Identifying the Process on the Destination Device 35</p>
<p>The Essentials and Beyond&nbsp;&nbsp; 36</p>
<p>Chapter 3 TCP/IP 39</p>
<p>Understanding the TCP/IP Model 40</p>
<p>Exploring the Four Layers 41</p>
<p>Comparing the OSI and TCP/IP Models44</p>
<p>Describing the TCP/IP Encapsulation Process 46</p>
<p>Understanding Data and PDUs 46</p>
<p>Describing the Contents of Data&nbsp; 47</p>
<p>Describing the Contents of Segments 47</p>
<p>Describing the Contents of Packets&nbsp;&nbsp; 47</p>
<p>Describing the Contents of Frames&nbsp;&nbsp; 47</p>
<p>Understanding the Conversion to Bits 48</p>
<p>Describing the Functions at the Transport Layer 50</p>
<p>Understanding TCP 50</p>
<p>Understanding UDP 51</p>
<p>Describing the Functions at the Internet Layer 52</p>
<p>Defining Logical Addressing&nbsp; 53</p>
<p>Performing Routing 54</p>
<p>Accomplishing Packet Forwarding 54</p>
<p>Describing the Functions of ARP 55</p>
<p>Illustrating the ARP Broadcast 55</p>
<p>Describing the Logic of MAC–to–IP–Address Conversion 57</p>
<p>The Essentials and Beyond&nbsp;&nbsp; 59</p>
<p>Chapter 4 Protocols 63</p>
<p>Understanding the Function of Protocols 64</p>
<p>Defining Routed Protocols&nbsp;&nbsp; 64</p>
<p>Defining Routing Protocols&nbsp;&nbsp; 64</p>
<p>Exploring Application Layer Protocols&nbsp;&nbsp; 65</p>
<p>Describing FTP 65</p>
<p>Describing TFTP&nbsp;&nbsp; 67</p>
<p>Describing SMTP&nbsp;&nbsp; 67</p>
<p>Describing DNS 69</p>
<p>Describing SNMP&nbsp;&nbsp; 70</p>
<p>Exploring Transport Layer Protocols 72</p>
<p>Reviewing TCP 72</p>
<p>Reviewing UDP 76</p>
<p>Exploring Internet Layer Protocols&nbsp; 77</p>
<p>Describing IP&nbsp; 77</p>
<p>Describing ARP 79</p>
<p>Describing ICMP&nbsp;&nbsp; 80</p>
<p>Describing IGMP&nbsp;&nbsp; 82</p>
<p>Exploring Network Access Layer Protocols 83</p>
<p>Defining Network Access Layer Protocols on the LAN 84</p>
<p>Defining Network Access Layer Protocols on the WAN 85</p>
<p>The Essentials and Beyond&nbsp;&nbsp; 86</p>
<p>Chapter 5 Physical and Logical Topologies 91</p>
<p>Designing the Physical Topology 91</p>
<p>Implementing a Bus Topology 92</p>
<p>Implementing a Ring Topology 93</p>
<p>Implementing a Star Topology 94</p>
<p>Implementing a Mesh Topology&nbsp; 96</p>
<p>Implementing a Hybrid Topology 97</p>
<p>Implementing a Point–to–Point Topology&nbsp;&nbsp; 98</p>
<p>Implementing a Point–to–Multipoint Topology&nbsp; 100</p>
<p>Designing the Logical Topology 101</p>
<p>Understanding the Token Ring Topology&nbsp; 101</p>
<p>Understanding the FDDI Ring Topology&nbsp; 102</p>
<p>Understanding the Star Topology 103</p>
<p>The Essentials and Beyond&nbsp; 105</p>
<p>Chapter 6 Numbering Systems 109</p>
<p>Exploring Binary Numbering&nbsp; 109</p>
<p>Understanding the Base–2 Numbering System&nbsp; 110</p>
<p>Understanding the Relationship between Binary and Computers&nbsp;&nbsp; 112</p>
<p>Exploring Hexadecimal Numbering 114</p>
<p>Understanding the Base–16 Numbering System 114</p>
<p>Identifying MAC Addresses&nbsp; 116</p>
<p>Applying Conversions 118</p>
<p>Decimal–to–Binary Conversion&nbsp; 118</p>
<p>Hex–to–Decimal Conversion 121</p>
<p>Binary–to–Hex Conversion&nbsp; 123</p>
<p>The Essentials and Beyond&nbsp; 124</p>
<p>Chapter 7 Classful IP Addressing 129</p>
<p>Describing the Function of IP Addresses 129</p>
<p>Identification 130</p>
<p>Segmentation 131</p>
<p>Identifying IP Address Types&nbsp;&nbsp; 132</p>
<p>Defining IP Address Classes 133</p>
<p>Identifying Network and Host Addresses&nbsp; 135</p>
<p>Describing Private IP Addresses and NAT 138</p>
<p>Utilizing Diagnostic Tools 139</p>
<p>Executing the ipconfig Command&nbsp;&nbsp; 141</p>
<p>Executing the ping Command&nbsp; 141</p>
<p>Executing the arp Command142</p>
<p>Executing the traceroute Command 143</p>
<p>Understanding DHCP 143</p>
<p>Operations&nbsp;&nbsp; 143</p>
<p>Cisco DHCP&nbsp; 145</p>
<p>Introducing IPv6146</p>
<p>IPv6 Address Format&nbsp;&nbsp; 146</p>
<p>IPv6 Address Types147</p>
<p>Special IPv6 Addresses 148</p>
<p>The Essentials and Beyond&nbsp; 148</p>
<p>Chapter 8 Classless IP Addressing 153</p>
<p>Understanding the Limitations of Classful Networking&nbsp; 153</p>
<p>Exhaustion of the Class B Network Address Space&nbsp;&nbsp; 154</p>
<p>Unmanageable Routing Tables&nbsp; 154</p>
<p>Exhaustion of the 32–Bit IPv4 Address Space&nbsp;&nbsp; 155</p>
<p>Understanding the Benefi ts of Subnetting&nbsp;&nbsp; 155</p>
<p>Identifying Sources of Network Congestion156</p>
<p>Deploying Subnetting as a Segmentation Tool&nbsp; 157</p>
<p>Describing the Components of CIDR&nbsp;&nbsp; 158</p>
<p>Introducing Classless Subnetting158</p>
<p>Designing and Implementing CIDR&nbsp; 160</p>
<p>Understanding VLSM&nbsp; 167</p>
<p>Summarization&nbsp;&nbsp; 171</p>
<p>The Essentials and Beyond&nbsp; 172</p>
<p>Chapter 9 Media 175</p>
<p>Selecting the Proper Media Type 175</p>
<p>Bandwidth&nbsp;&nbsp; 176</p>
<p>Security 176</p>
<p>Convenience&nbsp; 180</p>
<p>Cost 180</p>
<p>Understanding Cabling&nbsp;&nbsp; 181</p>
<p>Describing Cable Behavior and Characteristics&nbsp; 181</p>
<p>Describing Physical Implementations183</p>
<p>Choosing the Correct Wiring Standard&nbsp;&nbsp; 187</p>
<p>Describing Wireless Standards 191</p>
<p>Identifying Standards Bodies191</p>
<p>Understanding 80211 Amendments&nbsp; 192</p>
<p>Understanding Wireless LAN Components and Terminology&nbsp;&nbsp; 193</p>
<p>Describing CSMA/CA Operation 196</p>
<p>The Essentials and Beyond&nbsp; 198</p>
<p>Chapter 10 Network Devices 201</p>
<p>Describing Device Functions&nbsp;&nbsp; 201</p>
<p>Understanding Repeaters&nbsp;&nbsp; 202</p>
<p>Understanding Hubs&nbsp;&nbsp; 202</p>
<p>Understanding Bridges 203</p>
<p>Understanding Switches 205</p>
<p>Understanding Routers 209</p>
<p>Understanding Wireless Access Points and Wireless Routers&nbsp;&nbsp; 214</p>
<p>Understanding Device Placement Principles&nbsp; 216</p>
<p>Defining Broadcast Domains 216</p>
<p>Defining Collision Domains 217</p>
<p>Understanding the Cisco Three–Layer Model 220</p>
<p>The Essentials and Beyond&nbsp; 221</p>
<p>Chapter 11 LAN Operations 225</p>
<p>Understanding the Routing Process 225</p>
<p>Describing Routing Tables&nbsp; 226</p>
<p>Understanding Population Methods&nbsp; 229</p>
<p>Understanding Administrative Distance&nbsp;&nbsp; 231</p>
<p>Using Routing Protocols234</p>
<p>Describing the Switching Process&nbsp; 243</p>
<p>Reviewing MAC and IP Addresses 243</p>
<p>Reviewing Contention Methods 244</p>
<p>Describing MAC Address Tables 246</p>
<p>Understanding Frame Forwarding&nbsp;&nbsp; 246</p>
<p>Describing End–to–End Communications 247</p>
<p>Understanding the Local LAN Process 248</p>
<p>Understanding the Remote Communication Process 249</p>
<p>The Essentials and Beyond&nbsp; 250</p>
<p>Chapter 12 Managing the Cisco IOS 253</p>
<p>Describing Components&nbsp;&nbsp; 253</p>
<p>Defining the Contents of RAM&nbsp; 254</p>
<p>Defining the Contents of NVRAM&nbsp;&nbsp; 255</p>
<p>Defining the Contents of Flash&nbsp; 255</p>
<p>Defining the Contents of ROM&nbsp; 256</p>
<p>Describing IOS Navigation 258</p>
<p>Connecting to the Device&nbsp;&nbsp; 258</p>
<p>Accessing User, Privileged, and Global Configuration Modes&nbsp;&nbsp; 262</p>
<p>Understanding and Managing the Boot Process 266</p>
<p>Understanding the Boot Process 267</p>
<p>Managing the IOS 270</p>
<p>Understanding Configuration Files&nbsp; 271</p>
<p>Managing the Configuration Register 272</p>
<p>The Essentials and Beyond&nbsp; 276</p>
<p>Chapter 13 Configuring Routers 281</p>
<p>Cabling the Router&nbsp;&nbsp; 281</p>
<p>Cabling Router to Router&nbsp;&nbsp; 284</p>
<p>Cabling Router to Switch&nbsp;&nbsp; 287</p>
<p>Cabling PC to Router&nbsp;&nbsp; 288</p>
<p>Cabling Router to CSU/DSU 290</p>
<p>Creating a Console Session292</p>
<p>Connecting with the Console Cable&nbsp; 292</p>
<p>Connecting Through the USB Port&nbsp; 293</p>
<p>Connecting Through Telnet 294</p>
<p>Handling Initial Setup&nbsp; 295</p>
<p>Configuring Passwords&nbsp;&nbsp; 295</p>
<p>Interpreting Prompts&nbsp;&nbsp; 295</p>
<p>Configuring Privileged (Enable) Passwords296</p>
<p>Configuring Enable Secret Passwords297</p>
<p>Configuring Line Passwords 297</p>
<p>Configuring Interfaces299</p>
<p>Accessing Interface Mode&nbsp;&nbsp; 299</p>
<p>Assigning an IP Address300</p>
<p>Enabling the Interface&nbsp; 301</p>
<p>Verifying the Interface&nbsp; 301</p>
<p>Configuring a Router as a DHCP Server&nbsp;&nbsp; 303</p>
<p>Configuring WAN Interfaces 306</p>
<p>Saving Configuration Changes 308</p>
<p>The Essentials and Beyond&nbsp; 309</p>
<p>Chapter 14 Configuring Switches 315</p>
<p>Cabling the Switch&nbsp;&nbsp; 315</p>
<p>Cabling Switch to Switch&nbsp;&nbsp; 316</p>
<p>Cabling Router to Switch&nbsp;&nbsp; 317</p>
<p>Cabling Hosts to Switch318</p>
<p>Creating a Session with the Switch 318</p>
<p>Creating a Session with the Console Cable 318</p>
<p>Creating a Session Through Telnet&nbsp;&nbsp; 320</p>
<p>Configuring Passwords&nbsp;&nbsp; 321</p>
<p>Configuring Privileged (Enable) Passwords 321</p>
<p>Configuring Enable Secret Passwords 322</p>
<p>Configuring Line Passwords 322</p>
<p>Using the service password–encryption Command&nbsp;&nbsp; 322</p>
<p>Configuring Interfaces323</p>
<p>Accessing Switchports and Using Switchport Mode&nbsp; 323</p>
<p>Enabling the Port 324</p>
<p>Verifying the Port 324</p>
<p>Understanding Advanced Switch Functions&nbsp; 325</p>
<p>Understanding VLANs&nbsp; 325</p>
<p>Configuring VLANs 325</p>
<p>Assigning Ports to VLANs&nbsp;&nbsp; 326</p>
<p>Understanding Trunk Ports&nbsp; 327</p>
<p>Configuring Trunk Links&nbsp;&nbsp; 328</p>
<p>Describing STP&nbsp;&nbsp; 328</p>
<p>Understanding Port Security 332</p>
<p>Limiting MAC Addresses 332</p>
<p>Implementing Sticky Mac&nbsp;&nbsp; 333</p>
<p>The Essentials and Beyond&nbsp; 333</p>
<p>Chapter 15 Configuring Static Routing 337</p>
<p>Populating the Routing Table&nbsp; 338</p>
<p>Using the ip route Command 338</p>
<p>Verifying the Route Table&nbsp;&nbsp; 340</p>
<p>Configuring Inter–VLAN Routing&nbsp; 341</p>
<p>Creating a Trunk Link with Encapsulation 342</p>
<p>Creating and Configuring Subinterfaces&nbsp; 343</p>
<p>Troubleshooting VLANs 345</p>
<p>Troubleshooting Trunk Links 346</p>
<p>Troubleshooting Inter–VLAN Routing 347</p>
<p>The Essentials and Beyond&nbsp; 348</p>
<p>Chapter 16 Configuring Dynamic Routing 353</p>
<p>Understanding Routing Protocols&nbsp; 353</p>
<p>Exploring RIP355</p>
<p>Exploring EIGRP&nbsp; 357</p>
<p>Exploring OSPF&nbsp;&nbsp; 358</p>
<p>Configuring Routing Protocols 358</p>
<p>Enabling a Routing Protocol and Accessing Router Mode 359</p>
<p>Defining the Interfaces on Which the Protocol Is Operational&nbsp; 360</p>
<p>Verifying the Routing Table 361</p>
<p>The Essentials and Beyond&nbsp; 367</p>
<p>Chapter 17 Device Security 371</p>
<p>Understanding Access Lists 371</p>
<p>Understanding Standard Access Lists 373</p>
<p>Understanding Extended Access Lists 373</p>
<p>Configuring Numbered Access Lists 374</p>
<p>Configuring Named Access Lists 376</p>
<p>Editing Access Lists Using Sequence Numbers 377</p>
<p>Understanding Network Address Translation (NAT) 378</p>
<p>Implementing Static NAT, Dynamic NAT, and PAT 380</p>
<p>Configuring a Switch or Router as an NTP Client or Server&nbsp; 383</p>
<p>Implementing and Requiring SSH 384</p>
<p>Limiting Remote Access with ACLs 387</p>
<p>The Essentials and Beyond&nbsp; 388</p>
<p>Appendix A Answers to Review Questions 393</p>
<p>Appendix B CCNA Essentials: Ancillary Exercises 407</p>
<p>Index 437</p>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Cisco Networking Essentials, 2e