Networking Essentials Companion Guide v3
Cisco Certified Support Technician (CCST) Networking 100-150
Häftad, Engelska, 2024
799 kr
Networking Essentials Companion Guide v3: Cisco Certified Support Technician (CCST) Networking 100-150 is the official supplemental textbook for the Networking Essentials course in the Cisco Networking Academy.
Networking is at the heart of the digital transformation. The network is essential to many business functions today, including business-critical data and operations, cybersecurity, and so much more. A wide variety of career paths rely on the network, so it's important to understand what the network can do, how it operates, and how to protect it.
This is a great course for developers, data scientists, cybersecurity specialists, and other professionals looking to broaden their networking domain knowledge. It's also an excellent launching point for students pursuing a wide range of career pathways—from cybersecurity to software development to business and more.
The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.
The book's features help you focus on important concepts to succeed in this course:
- Chapter objectives: Review core concepts by answering the focus questions listed at the beginning of each chapter.
- Key terms: Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.
- Glossary: Consult the comprehensive Glossary with more than 250 terms.
- Summary of Activities and Labs: Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.
- Check Your Understanding: Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.
Produktinformation
- Utgivningsdatum2024-03-11
- Mått200 x 230 x 45 mm
- Vikt1 746 g
- FormatHäftad
- SpråkEngelska
- SerieCisco Networking Academy Program
- Antal sidor976
- Upplaga2
- FörlagPearson Education
- ISBN9780138321338
Tillhör följande kategorier
- Introduction xliiChapter 1 Communications in a Connected World 1Objectives 1Key Terms 1Introduction (1.0) 2Network Types (1.1) 2Everything Is Online (1.1.2) 2Who Owns “The Internet”? (1.1.3) 2Local Networks (1.1.4) 3Small Home Networks 4Small Office and Home Office Networks 4Medium to Large Networks 4Worldwide Networks 6Mobile Devices (1.1.5) 6Smartphone 6Tablet 7Smartwatch 8Smart Glasses 8Connected Home Devices (1.1.6) 8Security System 8Appliances 9Smart TV 10Gaming Console 11Other Connected Devices (1.1.7) 11Smart Cars 11RFID Tags 12Sensors and Actuators 13Medical Devices 13Data Transmission (1.2) 14The Bit (1.2.2) 14Common Methods of Data Transmission (1.2.3) 15Bandwidth and Throughput (1.3) 17Bandwidth (1.3.1) 17Throughput (1.3.2) 18Communications in a Connected World Summary (1.4) 18What Did I Learn in This Chapter? (1.4.1) 19Reflection Questions (1.4.2) 20Practice 21Check Your Understanding Questions 21Chapter 2 Network Components, Types, and Connections 25Objectives 25Key Terms 25Introduction (2.0) 26Clients and Servers (2.1) 26Client and Server Roles (2.1.2) 26Peer-to-Peer Networks (2.1.3) 27Peer-to-Peer Applications (2.1.4) 28Multiple Roles in the Network (2.1.5) 29Network Components (2.2) 30Network Infrastructure (2.2.2) 30End Devices (2.2.3) 32ISP Connectivity Options (2.3) 33ISP Services (2.3.1) 33ISP Connections (2.3.2) 34Cable and DSL Connections (2.3.3) 35Additional Connectivity Options (2.3.4) 36Network Components, Types, and Connections Summary (2.4) 37What Did I Learn in This Chapter? (2.4.1) 37Reflection Questions (2.4.2) 38Practice 39Check Your Understanding Questions 39Chapter 3 Wireless and Mobile Networks 41Objectives 41Key Terms 41Introduction (3.0) 42Wireless Networks (3.1) 42Other Wireless Networks (3.1.3) 43Global Positioning System 43Wi-Fi 43Bluetooth 43NFC 43Mobile Device Connectivity (3.2) 44Mobile Devices and Wi-Fi (3.2.1) 44Wi-Fi Settings (3.2.2) 44Configure Mobile Wi-Fi Connectivity (3.2.3) 46Configure Cellular Data Settings (3.2.4) 47Android Cellular Data 47iOS Cellular Data 48Simple Connectivity with Bluetooth (3.2.6) 49Bluetooth Pairing (3.2.7) 50Explore Your Network Settings on Your Mobile Device (3.2.8) 51Wireless and Mobile Networks Summary (3.3) 52What Did I Learn in This Chapter? (3.3.1) 52Reflection Questions (3.3.2) 53Practice 54Check Your Understanding Questions 54Chapter 4 Build a Home Network 57Objectives 57Key Terms 57Introduction (4.0) 58Home Network Basics (4.1) 58Components of a Home Network (4.1.2) 58Typical Home Network Routers (4.1.3) 59Network Technologies in the Home (4.2) 60LAN Wireless Frequencies (4.2.1) 61Wired Network Technologies (4.2.2) 62Category 5e Cable 62Coaxial Cable 62Fiber-Optic Cable 63Wireless Standards (4.3) 63Wi-Fi Networks (4.3.1) 64Wireless Settings (4.3.2) 64Network Mode 65Set Up a Home Router (4.4) 66First Time Setup (4.4.1) 66Design Considerations (4.4.2) 67Build a Home Network Summary (4.5) 69What Did I Learn in This Chapter? (4.5.1) 69Reflection Questions (4.5.2) 71Practice 72Packet Tracer Activities 72Check Your Understanding Questions 72Chapter 5 Communication Principles 75Objectives 75Key Terms 75Introduction (5.0) 76Networking Protocols (5.1) 76Communication Protocols (5.1.1) 76Why Protocols Matter (5.1.2) 78Communication Standards (5.2) 80The Internet and Standards (5.2.2) 80Network Standards Organizations (5.2.3) 80Network Communication Models (5.3) 81The TCP/IP Model (5.3.3) 81The OSI Reference Model (5.3.4) 82OSI Model and TCP/IP Model Comparison (5.3.5) 83Communication Principles Summary (5.4) 85What Did I Learn in This Chapter? (5.4.1) 85Reflection Questions (5.4.2) 87Practice 88Check Your Understanding Questions 88Chapter 6 Network Media 91Objectives 91Key Terms 91Introduction (6.0) 92Network Media Types (6.1) 92Three Media Types (6.1.2) 92Common Network Cables (6.1.3) 93Twisted-Pair Cable 93Coaxial Cable 94Fiber-Optic Cable 95Network Media Summary (6.2) 95What Did I Learn in This Chapter? (6.2.1) 95Reflection Questions (6.2.2) 96Practice 97Check Your Understanding Questions 97Chapter 7 The Access Layer 101Objectives 101Key Terms 101Introduction (7.0) 102Encapsulation and the Ethernet Frame (7.1) 102Encapsulation (7.1.2) 102The Access Layer (7.2) 104Ethernet Frame (7.2.1) 104Access Layer Devices (7.2.2) 105Ethernet Hubs (7.2.3) 106Ethernet Switches (7.2.4) 107The MAC Address Table (7.2.5) 109The Access Layer Summary (7.3) 111What Did I Learn in This Chapter? (7.3.1) 111Reflection Questions (7.3.2) 113Practice 114Check Your Understanding Questions 114Chapter 8 The Internet Protocol 117Objectives 117Introduction (8.0) 118Purpose of an IPv4 Address (8.1) 118The IPv4 Address (8.1.1) 118Octets and Dotted-Decimal Notation (8.1.2) 119The IPv4 Address Structure (8.2) 119Networks and Hosts (8.2.2) 119Summary (8.3) 121What Did I Learn in This Chapter? (8.3.1) 121Reflection Questions (8.3.2) 121Practice 122Packet Tracer Activities 122Check Your Understanding Questions 122Chapter 9 IPv4 and Network Segmentation 125Objectives 125Key Terms 125Introduction (9.0) 126IPv4 Unicast, Broadcast, and Multicast (9.1) 126Unicast (9.1.2) 126Broadcast (9.1.4) 127Multicast (9.1.6) 129Types of IPv4 Addresses (9.2) 130Public and Private IPv4 Addresses (9.2.1) 130Routing to the Internet (9.2.2) 131Special-Use IPv4 Addresses (9.2.4) 132Loopback Addresses 132Link-Local addresses 133Legacy Classful Addressing (9.2.5) 133Assignment of IP Addresses (9.2.6) 134Network Segmentation (9.3) 135Broadcast Domains and Segmentation (9.3.2) 136Problems with Large Broadcast Domains (9.3.3) 137Reasons for Segmenting Networks (9.3.4) 138IPv4 and Network Segmentation Summary (9.4) 140What Did I Learn in This Chapter? (9.4.1) 140Reflection Questions (9.4.2) 143Practice 144Check Your Understanding Questions 144Chapter 10 IPv6 Addressing Formats and Rules 147Objectives 147Key Terms 147Introduction (10.0) 148IPv4 Issues (10.1) 148The Need for IPv6 (10.1.1) 148Internet of Things 149IPv4 and IPv6 Coexistence (10.1.2) 150Dual Stack 150Tunneling 150Translation 151IPv6 Addressing (10.2) 152Hexadecimal Number System (10.2.1) 152IPv6 Addressing Formats (10.2.2) 152Preferred Format 153Rule 1—Omit Leading Zeros (10.2.4) 153Rule 2—Double Colon (10.2.5) 155IPv6 Addressing Formats and Rules Summary (10.3) 156What Did I Learn in This Chapter? (10.3.1) 157Reflection Questions (10.3.2) 158Practice 159Check Your Understanding Questions 159Chapter 11 Dynamic Addressing with DHCP 163Objectives 163Key Term 163Introduction (11.0) 164Static and Dynamic Addressing (11.1) 164Static IPv4 Address Assignment (11.1.1) 164Dynamic IPv4 Address Assignment (11.1.2) 165DHCP Servers (11.1.3) 166DHCPv4 Configuration (11.2) 167DHCPv4 Operation (11.2.1) 168DHCP Service Configuration (11.2.3) 169Dynamic Addressing with DHCP Summary (11.3) 170What Did I Learn in This Chapter? (11.3.1) 170Reflection Questions (11.3.2) 171Practice 172Packet Tracer Activities 172Check Your Understanding Questions 172Chapter 12 Gateways to Other Networks 175Objectives 175Key Term 175Introduction (12.0) 176Network Boundaries (12.1) 176Routers as Gateways (12.1.2) 176Routers as Boundaries Between Networks (12.1.3) 177Network Address Translation (12.2) 178NAT Operation (12.2.1) 179Gateways to Other Networks Summary (12.3) 180What Did I Learn in This Chapter? (12.3.1) 180Reflection Questions (12.3.2) 181Practice 182Packet Tracer Activities 182Check Your Understanding Questions 182Chapter 13 The ARP Process 185Objectives 185Key Term 185Introduction (13.0) 186MAC and IP (13.1) 186Destination on Same Network (13.1.1) 186Destination on Remote Network (13.1.2) 187Broadcast Containment (13.2) 189Broadcast Domains (13.2.2) 190Access Layer Communication (13.2.3) 191ARP (13.2.5) 192The ARP Process Summary (13.3) 193What Did I Learn in This Chapter? (13.3.1) 193Reflection Questions (13.3.2) 194Practice 195Packet Tracer Activities 195Check Your Understanding Questions 195Chapter 14 Routing Between Networks 199Objectives 199Key Terms 199Introduction (14.0) 200The Need for Routing (14.1) 200Now We Need Routing (14.1.2) 200The Routing Table (14.2) 201Routing Table Entries (14.2.4) 202The Default Gateway (14.2.5) 203Create a LAN (14.3) 204Local Area Networks (14.3.1) 205Local and Remote Network Segments (14.3.2) 205All Hosts in One Local Segment 206Hosts on a Remote Segment 206Routing Between Networks Summary (14.4) 208What Did I Learn in This Chapter? (14.4.1) 208Reflection Questions (14.4.2) 210Practice 211Packet Tracer Activities 211Check Your Understanding Questions 211Chapter 15 TCP and UDP 215Objectives 215Key Terms 215Introduction (15.0) 216TCP and UDP (15.1) 216Protocol Operations (15.1.1) 216TCP and UDP (15.1.2) 217TCP Reliability (15.1.3) 218UDP Best Effort Delivery (15.1.4) 218Port Numbers (15.2) 219TCP and UDP Port Numbers (15.2.1) 219Socket Pairs (15.2.2) 222The netstat Command (15.2.3) 223TCP and UDP Summary (15.3) 224What Did I Learn in This Chapter? (15.3.1) 224Reflection Questions (15.3.2) 225Practice 226Check Your Understanding Questions 226Chapter 16 Application Layer Services 229Objectives 229Key Terms 229Introduction (16.0) 230The Client-Server Relationship (16.1) 230Client and Server Interaction (16.1.1) 230Client Requests a Web Page (16.1.2) 231URI, URN, and URL (16.1.3) 232Network Application Services (16.2) 233Common Network Application Services (16.2.1) 233Domain Name System (16.3) 234Domain Name Translation (16.3.1) 234DNS Servers (16.3.2) 235A Note About Syntax Checker Activities (16.3.3) 236Web Clients and Servers (16.4) 236HTTP and HTML (16.4.2) 237FTP Clients and Servers (16.5) 238File Transfer Protocol (16.5.1) 238Virtual Terminals (16.6) 239Telnet (16.6.2) 240Security Issues with Telnet (16.6.3) 241Email and Messaging (16.7) 242Email Clients and Servers (16.7.1) 242Email Protocols (16.7.2) 242Simple Mail Transfer Protocol (SMTP) 243Post Office Protocol (POP3) 243Internet Message Access Protocol (IMAP4) 243Text Messaging (16.7.3) 244Internet Phone Calls (16.7.4) 245Application Layer Services Summary (16.8) 245What Did I Learn in This Chapter? (16.8.1) 245Reflection Questions (16.8.2) 248Practice 249Packet Tracer Activities 249Check Your Understanding Questions 249Chapter 17 Network Testing Utilities 253Objectives 253Key Terms 253Introduction (17.0) 254Troubleshooting Commands (17.1) 254Overview of Troubleshooting Commands (17.1.1) 254The ipconfig Command (17.1.2) 254The ping Command (17.1.4) 258Ping Results (17.1.5) 259Network Testing Utilities Summary (17.2) 260What Did I Learn in This Chapter? (17.2.1) 260Reflection Questions (17.2.2) 261Practice 262Packet Tracer Activities 262Check Your Understanding Questions 262Chapter 18 Network Design 265Objectives 265Key Terms 265Introduction (18.0) 266Reliable Networks (18.1) 266Network Architecture (18.1.1) 266Fault Tolerance (18.1.3) 267Scalability (18.1.4) 267Quality of Service (18.1.5) 269Network Security (18.1.6) 270Hierarchical Network Design (18.2) 271Physical and Logical Addresses (18.2.1) 271Hierarchical Analogy (18.2.4) 272Access, Distribution, and Core (18.2.6) 273Access Layer 273Distribution Layer 274Core Layer 274Network Design Summary (18.3) 275What Did I Learn in This Chapter? (18.3.1) 275Reflection Questions (18.3.2) 276Practice 277Labs 277Check Your Understanding Questions 277Chapter 19 Cloud and Virtualization 281Objectives 281Key Terms 281Introduction (19.0) 282Cloud and Cloud Services (19.1) 282Types of Clouds (19.1.2) 282Cloud Services (19.1.3) 283Cloud Computing and Virtualization (19.1.4) 284Virtualization (19.2) 285Advantages of Virtualization (19.2.1) 285Hypervisors (19.2.2) 286Type 1 Hypervisor—“Bare Metal” Approach 286Type 2 Hypervisor—“Hosted” Approach 286Cloud and Virtualization Summary (19.3) 287What Did I Learn in This Chapter? (19.3.1) 287Reflection Questions (19.3.2) 289Practice 290Labs 290Check Your Understanding Questions 290Chapter 20 Number Systems 293Objectives 293Key Terms 293Introduction (20.0) 294Binary Number System (20.1) 294Binary and IPv4 Addresses (20.1.1) 294Decimal to Binary Conversion (20.1.5) 296Decimal to Binary Conversion Example (20.1.6) 300IPv4 Addresses (20.1.9) 307Hexadecimal Number System (20.2) 308Hexadecimal and IPv6 Addresses (20.2.1) 308Number Systems Summary (20.3) 311What Did I Learn in This Chapter? (20.3.1) 311Reflection Questions (20.3.2) 311Practice 312Check Your Understanding Questions 312Chapter 21 Ethernet Switching 315Objectives 315Key Terms 315Introduction (21.0) 316Ethernet (21.1) 316The Rise of Ethernet (21.1.1) 316Ethernet Evolution (21.1.2) 317Ethernet Frames (21.2) 318Ethernet Encapsulation (21.2.1) 318Data Link Sublayers (21.2.2) 319MAC Sublayer (21.2.3) 320Data Encapsulation 321Accessing the Media 321Ethernet Frame Fields (21.2.4) 322Ethernet MAC Address (21.3) 324MAC Address and Hexadecimal (21.3.1) 324Unicast MAC Address (21.3.2) 326Broadcast MAC Address (21.3.3) 327Multicast MAC Address (21.3.4) 328The MAC Address Table (21.4) 330Switch Fundamentals (21.4.1) 330Switch Learning and Forwarding (21.4.2) 331Examine the Source MAC Address 331Find the Destination MAC Address 332Filtering Frames (21.4.3) 333Ethernet Switching Summary (21.5) 336What Did I Learn in This Chapter? (21.5.1) 336Reflection Questions (21.5.2) 338Practice 339Labs 339Check Your Understanding Questions 339Chapter 22 Network Layer 343Objectives 343Key Terms 343Introduction (22.0) 344Network Layer Characteristics (22.1) 344The Network Layer (22.1.2) 344IP Encapsulation (22.1.3) 346Characteristics of IP (22.1.4) 347Connectionless (22.1.5) 347Best Effort (22.1.6) 348Media Independent (22.1.7) 349IPv4 Packet (22.2) 350IPv4 Packet Header (22.2.1) 350IPv4 Packet Header Fields (22.2.2) 350IPv6 Packet (22.3) 352Limitations of IPv4 (22.3.1) 352IPv6 Overview (22.3.2) 353IPv4 Packet Header Fields in the IPv6 Packet Header (22.3.3) 354IPv6 Packet Header (22.3.4) 356Network Layer Summary (22.4) 357What Did I Learn in This Chapter? (22.4.1) 357Reflection Questions (22.4.2) 358Practice 359Check Your Understanding Questions 359Chapter 23 IPv4 Address Structure 363Objectives 363Key Terms 363Introduction (23.0) 364IPv4 Address Structure (23.1) 364Network and Host Portions (23.1.1) 364The Subnet Mask (23.1.2) 365The Prefix Length (23.1.3) 366Determining the Network: Logical AND (23.1.4) 367IPv4 Address Structure Summary (23.2) 369What Did I Learn in This Chapter? (23.2.1) 369Reflection Questions (23.2.2) 370Practice 371Check Your Understanding Questions 371Chapter 24 Address Resolution 375Objectives 375Key Terms 375Introduction (24.0) 376ARP (24.1) 376ARP Overview (24.1.1) 376ARP Functions (24.1.2) 377Removing Entries from an ARP Table (24.1.6) 380ARP Tables on Devices (24.1.7) 381ARP Issues—ARP Broadcasts and ARP Spoofing (24.1.8) 382Address Resolution Summary (24.2) 384What Did I Learn in This Chapter? (24.2.1) 384Reflection Questions (24.2.2) 385Practice 386Labs 386Packet Tracer Activities 386Check Your Understanding Questions 386Chapter 25 IP Addressing Services 391Objectives 391Key Terms 391Introduction (25.0) 392DNS Services (25.1) 392Domain Name System (25.1.2) 392DNS Message Format (25.1.3) 395DNS Hierarchy (25.1.4) 395The nslookup Command (25.1.5) 397DHCP Services (25.2) 398Dynamic Host Configuration Protocol (25.2.1) 398DHCP Messages (25.2.3) 399IP Addressing Services Summary (25.3) 401What Did I Learn in This Chapter? (25.3.1) 401Reflection Questions (25.3.2) 402Practice 403Labs 403Check Your Understanding Questions 403Chapter 26 Transport Layer 407Objectives 407Key Terms 407Introduction (26.0) 408Transportation of Data (26.1) 408Role of the Transport Layer (26.1.1) 408Transport Layer Responsibilities (26.1.2) 409Transport Layer Protocols (26.1.3) 413Transmission Control Protocol (TCP) (26.1.4) 413User Datagram Protocol (UDP) (26.1.5) 414The Right Transport Layer Protocol for the Right Application (26.1.6) 415TCP Overview (26.2) 417TCP Features (26.2.1) 417TCP Header (26.2.2) 418TCP Header Fields (26.2.3) 418Applications That Use TCP (26.2.4) 419UDP Overview (26.3) 420UDP Features (26.3.1) 420UDP Header (26.3.2) 420UDP Header Fields (26.3.3) 421Applications That Use UDP (26.3.4) 421Port Numbers (26.4) 422Multiple Separate Communications (26.4.1) 422Socket Pairs (26.4.2) 423Port Number Groups (26.4.3) 424The netstat Command (26.4.4) 426TCP Communication Process (26.5) 427TCP Server Processes (26.5.1) 427TCP Connection Establishment (26.5.2) 430Session Termination (26.5.3) 431TCP Three-Way Handshake Analysis (26.5.4) 432Reliability and Flow Control (26.6) 433TCP Reliability—Guaranteed and Ordered Delivery (26.6.1) 433TCP Reliability—Data Loss and Retransmission (26.6.3) 435TCP Flow Control—Window Size and Acknowledgments (26.6.5) 437TCP Flow Control—Maximum Segment Size (MSS) (26.6.6) 439TCP Flow Control—Congestion Avoidance (26.6.7) 440UDP Communication (26.7) 441UDP Low Overhead Versus Reliability (26.7.1) 441UDP Datagram Reassembly (26.7.2) 441UDP Server Processes and Requests (26.7.3) 443UDP Client Processes (26.7.4) 443Transport Layer Summary (26.8) 447What Did I Learn in This Chapter? (26.8.2) 447Reflection Questions (26.8.3) 449Practice 450Packet Tracer Activities 450Check Your Understanding Questions 450Chapter 27 The Cisco IOS Command Line 455Objectives 455Key Terms 455Introduction (27.0) 456Navigate the IOS (27.1) 456The Cisco IOS Command-Line Interface (27.1.1) 456Primary Command Modes (27.1.2) 457A Note About Syntax Checker Activities (27.1.5) 458The Command Structure (27.2) 458Basic IOS Command Structure (27.2.1) 458IOS Command Syntax (27.2.2) 459Hotkeys and Shortcuts (27.2.4) 460View Device Information (27.3) 462show Commands (27.3.2) 463The Cisco IOS Command Line Summary (27.4) 469What Did I Learn in This Chapter? (27.4.1) 469Reflection Questions (27.4.2) 471Practice 472Packet Tracer Activities 472Check Your Understanding Questions 472Chapter 28 Build a Small Cisco Network 475Objectives 475Key Term 475Introduction (28.0) 476Basic Switch Configuration (28.1) 476Basic Switch Configuration Steps (28.1.1) 476Switch Virtual Interface Configuration (28.1.2) 478Configure Initial Router Settings (28.2) 479Basic Router Configuration Steps (28.2.1) 479Basic Router Configuration Example (28.2.2) 480Secure the Devices (28.3) 482Password Recommendations (28.3.1) 482Secure Remote Access (28.3.2) 483Enable SSH (28.3.3) 485Verify SSH (28.3.5) 487Connecting the Switch to the Router (28.4) 488Default Gateway for a Host (28.4.1) 488Default Gateway on a Switch (28.4.2) 490Build a Small Cisco Network Summary (28.5) 492What Did I Learn in This Chapter? (28.5.1) 492Reflection Questions (28.5.2) 495Practice 496Packet Tracer Activities 496Check Your Understanding Questions 496Chapter 29 ICMP 499Objectives 499Introduction (29.0) 500ICMP Messages (29.1) 500ICMPv4 and ICMPv6 Messages (29.1.1) 500Host Reachability (29.1.2) 500Destination or Service Unreachable (29.1.3) 501Time Exceeded (29.1.4) 502ICMPv6 Messages (29.1.5) 502Ping and Traceroute Tests (29.2) 505Ping—Test Connectivity (29.2.1) 505Ping the Local Loopback (29.2.2) 506Ping the Default Gateway (29.2.3) 507Ping a Remote Host (29.2.4) 508Traceroute—Test the Path (29.2.5) 509Round-Trip Time (RTT) 509IPv4 TTL and IPv6 Hop Limit 509ICMP Summary (29.3) 511What Did I Learn in This Chapter? (29.3.2) 511Reflection Questions (29.3.3) 513Practice 514Packet Tracer Activities 514Check Your Understanding Questions 514Chapter 30 Physical Layer 519Objectives 519Key Terms 519Introduction (30.0) 520Purpose of the Physical Layer (30.1) 520The Physical Connection (30.1.1) 520The Physical Layer Process (30.1.2) 522Physical Layer Characteristics (30.2) 523Physical Layer Standards (30.2.1) 523Physical Components (30.2.2) 525Encoding (30.2.3) 525Signaling (30.2.4) 525Bandwidth (30.2.6) 527Bandwidth Terminology (30.2.7) 528Latency 528Throughput 529Goodput 529Copper Cabling (30.3) 529Characteristics of Copper Cabling (30.3.1) 529Types of Copper Cabling (30.3.2) 531Unshielded Twisted-Pair (UTP) (30.3.3) 531Shielded Twisted-Pair (STP) (30.3.4) 533Coaxial Cable (30.3.5) 533UTP Cabling (30.4) 535Properties of UTP Cabling (30.4.1) 535UTP Cabling Standards and Connectors (30.4.2) 536Straight-Through and Crossover UTP Cables (30.4.3) 539Fiber-Optic Cabling (30.5) 541Properties of Fiber-Optic Cabling (30.5.1) 541Types of Fiber Media (30.5.2) 541Single-Mode Fiber 541Multimode Fiber 542Fiber-Optic Cabling Usage (30.5.3) 543Fiber-Optic Connectors (30.5.4) 543Fiber Patch Cords (30.5.5) 545Fiber Versus Copper (30.5.6) 547Summary (30.6) 548What Did I Learn in This Chapter? (30.6.1) 548Reflection Questions (30.6.2) 550Practice 551Check Your Understanding Questions 551Chapter 31 Data Link Layer 555Objectives 555Key Terms 555Introduction (31.0) 556Topologies (31.1) 556Physical and Logical Topologies (31.1.1) 556WAN Topologies (31.1.2) 558Point-to-Point 558Hub and Spoke 558Mesh 559Point-to-Point WAN Topology (31.1.4) 559LAN Topologies (31.1.5) 560Legacy LAN Topologies 560Media Access Control Methods (31.2) 561Half- and Full-Duplex Communication (31.2.1) 562Half-Duplex Communication 562Full-Duplex Communication 562Access Control Methods (31.2.2) 563Contention-Based Access 563Controlled Access 564Contention-Based Access—CSMA/CD (31.2.3) 564Contention-Based Access—CSMA/CA (31.2.4) 566Summary (31.3) 568What Did I Learn in This Chapter? (31.3.1) 568Reflection Questions (31.3.2) 568Practice 569Check Your Understanding Questions 569Chapter 32 Routing at the Network Layer 571Objectives 571Key Terms 571Introduction (32.0) 572How a Host Routes (32.1) 572Host Forwarding Decision (32.1.1) 572Default Gateway (32.1.2) 574A Host Routes to the Default Gateway (32.1.3) 574Host Routing Tables (32.1.4) 575Routing Tables (32.2) 576Router Packet Forwarding Decision (32.2.1) 576IP Router Routing Table (32.2.2) 577Static Routing (32.2.3) 579Dynamic Routing (32.2.4) 580Introduction to an IPv4 Routing Table (32.2.6) 582Summary (32.3) 582What Did I Learn in This Chapter? (32.3.1) 582Reflection Questions (32.3.2) 583Practice 584Check Your Understanding Questions 584Chapter 33 IPv6 Addressing 587Objectives 587Key Terms 587Introduction (33.0) 588IPv6 Address Types (33.1) 588Unicast, Multicast, Anycast (33.1.1) 588IPv6 Prefix Length (33.1.2) 588Types of IPv6 Unicast Addresses (33.1.3) 589A Note About the Unique Local Address (33.1.4) 590IPv6 GUA (33.1.5) 591IPv6 GUA Structure (33.1.6) 592Global Routing Prefix 592Subnet ID 592Interface ID 593IPv6 LLA (33.1.7) 593GUA and LLA Static Configuration (33.2) 595Static GUA Configuration on a Router (33.2.1) 595Static GUA Configuration on a Windows Host (33.2.2) 596Static Configuration of a Link-Local Unicast Address (33.2.3) 598Dynamic Addressing for IPv6 GUAs (33.3) 599RS and RA Messages (33.3.1) 599Method 1: SLAAC (33.3.2) 601Method 2: SLAAC and Stateless DHCPv6 (33.3.3) 602Method 3: Stateful DHCPv6 (33.3.4) 603EUI-64 Process vs. Randomly Generated (33.3.5) 604EUI-64 Process (33.3.6) 605Randomly Generated Interface IDs (33.3.7) 606Dynamic Addressing for IPv6 LLAs (33.4) 607Dynamic LLAs (33.4.1) 607Dynamic LLAs on Windows (33.4.2) 608Dynamic LLAs on Cisco Routers (33.4.3) 609Verify IPv6 Address Configuration (33.4.4) 609IPv6 Multicast Addresses (33.5) 612Assigned IPv6 Multicast Addresses (33.5.1) 612Well-Known IPv6 Multicast Addresses (33.5.2) 613Solicited-Node IPv6 Multicast Addresses (33.5.3) 614Summary (33.6) 615What Did I Learn in This Chapter? (33.6.1) 615Reflection Questions (33.6.2) 616Practice 617Packet Tracer Activities 617Check Your Understanding Questions 617Chapter 34 IPv6 Neighbor Discovery 621Objectives 621Key Terms 621Introduction (34.0) 622Neighbor Discovery Operation (34.1) 622IPv6 Neighbor Discovery Messages (34.1.2) 622IPv6 Neighbor Discovery—Address Resolution (34.1.3) 623Summary (34.2) 625What Did I Learn in This Chapter? (34.2.1) 625Practice 626Packet Tracer Activities 626Check Your Understanding Questions 626Chapter 35 Cisco Switches and Routers 629Objectives 629Key Terms 629Introduction (35.0) 630Cisco Switches (35.1) 630Connect More Devices (35.1.1) 630Cisco LAN Switches (35.1.2) 631Type of Ports 632Speed Required 632Expandability 633Manageability 633LAN Switch Components (35.1.5) 634Switch Speeds and Forwarding Methods (35.2) 635Frame Forwarding Methods on Cisco Switches (35.2.1) 635Cut-Through Switching (35.2.2) 636Memory Buffering on Switches (35.2.3) 638Duplex and Speed Settings (35.2.4) 638Auto-MDIX (35.2.5) 640Switch Boot Process (35.3) 641Power Up the Switch (35.3.1) 642In-Band and Out-of-Band Management (35.3.3) 644Out-of-Band Management 644In-Band Management 644IOS Startup Files (35.3.4) 645Cisco Routers (35.4) 646Router Components (35.4.2) 646Router Interface Ports (35.4.3) 647Router Boot Process (35.5) 648Power Up the Router (35.5.1) 648Management Ports (35.5.2) 651Summary (35.6) 653What Did I Learn in This Chapter? (35.6.1) 653Reflection Questions (35.6.2) 654Practice 655Check Your Understanding Questions 655Chapter 36 Troubleshoot Common Network Problems 659Objectives 659Introduction (36.0) 660The Troubleshooting Process (36.1) 660Network Troubleshooting Overview (36.1.2) 660Gather Information (36.1.3) 660Structured Troubleshooting Methods (36.1.4) 662Bottom-Up 662Top-Down 663Divide-and-Conquer 664Follow-the-Path 664Substitution 665Comparison 665Educated Guess 665Guidelines for Selecting a Troubleshooting Method (36.1.5) 665Physical Layer Problems (36.2) 667Common Layer 1 Problems (36.2.1) 667The Sense of Sight 667The Senses of Smell and Taste 668The Sense of Touch 668The Sense of Hearing 668Wireless Router LEDs (36.2.2) 668Cabling Problems (36.2.3) 670Troubleshoot Wireless Issues (36.3) 671Causes of Wireless Issues (36.3.1) 671Authentication and Association Errors (36.3.2) 672Common Internet Connectivity Issues (36.4) 674DHCP Server Configuration Errors (36.4.1) 674Check Internet Configuration (36.4.2) 674Check Firewall Settings (36.4.3) 677Divide and Conquer with ping (36.4.5) 678The tracert Command (36.4.6) 678The netstat Command (36.4.7) 680The nslookup Command (36.4.8) 682Customer Support (36.5) 683Sources of Help (36.5.1) 683When to Call for Help (36.5.2) 684Support Desk Interaction (36.5.3) 685Issue Resolution (36.5.4) 686Support Desk Tickets and Work Orders (36.5.5) 686Troubleshoot Common Network Problems Summary (36.6) 688What Did I Learn in This Chapter? (36.6.1) 688Practice 692Packet Tracer Activities 692Check Your Understanding Questions 692Chapter 37 Network Support 697Objectives 697Key Terms 697Introduction (37.0) 698Diagnostics and Troubleshooting Methodologies (37.1) 698Troubleshooting Process Review (37.1.1) 698Seven-Step Troubleshooting Process (37.1.2) 699Define the Problem 699Gather Information 700Analyze Information 700Eliminate Possible Causes 700Propose Hypothesis 700Test Hypothesis 700Solve the Problem 700Troubleshooting with Layered Models (37.1.3) 701Structured Troubleshooting Methods (37.1.4) 701Guidelines for Selecting a Troubleshooting Method (37.1.5) 702Document Findings, Actions, and Outcomes (37.1.6) 703Network Documentation (37.2) 704Documentation Overview (37.2.1) 704Network Topologies and Descriptions (37.2.2) 704PAN 704LAN 705VLAN 706WLAN 706WMN 707CAN 708MAN 708WAN 709VPN 710Enterprise Network Topologies (37.2.4) 710Network Cloud Services and Applications (37.2.5) 713SaaS (Software as a Service) 713PaaS (Platform as a Service) 713IaaS (Infrastructure as a Service) 714XaaS (Anything/Everything as a Service) 714Wireless Standards (37.2.6) 714Licensed and Unlicensed Bands 716Network Device Documentation (37.2.8) 717Router Device Documentation 717LAN Switch Device Documentation 717End-System Documentation 718Establish a Network Baseline (37.2.9) 718Cisco Discovery Protocol (CDP) Overview (37.2.10) 719Discover Devices Using CDP (37.2.11) 720Help Desks (37.3) 723The Security Policy (37.3.1) 723Help Desks (37.3.2) 725Ticketing Systems (37.3.3) 727Question End Users (37.3.4) 729Active Listening (37.3.6) 731Gather Information for Host-Related Tickets (37.3.8) 733Beep Codes 733BIOS Information 733Event Viewer 733Device Manager 734Task Manager 735Diagnostic Tools 736Gather Information for Cisco Device-Related Tickets (37.3.9) 736Analyze the Information (37.3.10) 737Troubleshoot Endpoint Connectivity (37.4) 738Windows Network Setup (37.4.1) 738Verify Connectivity in Windows (37.4.2) 740Linux Network Setup (37.4.3) 741Verify Connectivity in Linux (37.4.4) 742macOS Network Setup (37.4.5) 743Verify Connectivity in macOS (37.4.6) 744Set Up and Verify Networking in iOS (37.4.7) 746Set Up and Verify Networking in Android (37.4.8) 747Troubleshoot a Network (37.5) 750Network Devices as Sources of Network Information (37.5.1) 750Packet Capture and Protocol Analysis (37.5.2) 752Measuring Network Throughput (37.5.5) 754Troubleshoot Connectivity Remotely (37.6) 755Supporting Remote Users (37.6.1) 756Remote Access with Telnet, SSH, and RDP (37.6.2) 757Understanding VPNs (37.6.4) 760Site-to-Site VPN 760Remote-Access VPN 761Network Management Systems (37.6.5) 763Network Support Summary (37.7) 765What Did I Learn in This Chapter? (37.7.1) 765Reflection Questions (37.7.2) 769Practice 770Labs 770Packet Tracer Activities 770Check Your Understanding Questions 770Chapter 38 Cybersecurity Threats, Vulnerabilities, and Attacks 775Objectives 775Key Terms 775Introduction (38.0) 776Common Threats (38.1) 776Threat Domains (38.1.1) 776Types of Cyber Threats (38.1.2) 777Internal vs. External Threats (38.1.3) 777User Threats and Vulnerabilities (38.1.5) 778Threats to Devices (38.1.6) 780Threats to the Local Area Network (38.1.7) 780Threats to the Private Cloud (38.1.8) 781Threats to the Public Cloud (38.1.9) 781Threats to Applications (38.1.10) 781Threat Complexity (38.1.12) 782Backdoors and Rootkits (38.1.13) 782Backdoors 782Rootkits 783Threat Intelligence and Research Sources (38.1.14) 783The Dark Web 783Indicator of Compromise (IOC) 783Automated Indicator Sharing (AIS) 783Deception (38.2) 784Social Engineering (38.2.1) 784Pretexting 784Something for Something (Quid Pro Quo) 784Identity Fraud 784Social Engineering Tactics (38.2.2) 785Shoulder Surfing and Dumpster Diving (38.2.4) 786Impersonation and Hoaxes (38.2.5) 786Impersonation 786Hoaxes 786Piggybacking and Tailgating (38.2.6) 787Other Methods of Deception (38.2.7) 787Defending Against Deception (38.2.9) 788Cyber Attacks (38.3) 788Malware (38.3.1) 788Viruses 789Worms 789Trojan Horse 789Logic Bombs (38.3.2) 789Ransomware (38.3.3) 790Denial of Service Attacks (38.3.4) 790Overwhelming Quantity of Traffic 790Maliciously Formatted Packets 791Domain Name System (38.3.5) 791Domain Reputation 791DNS Spoofing 791Domain Hijacking 791Uniform Resource Locator (URL) Redirection 792Layer 2 Attacks (38.3.6) 792Spoofing 792MAC Flooding 792Man-in-the-Middle and Man-in-the-Mobile Attacks (38.3.8) 793Man-in-the-Middle (MitM) 793Man-in-the-Mobile (MitMo) 793Zero-Day Attacks (38.3.9) 793Keyboard Logging (38.3.10) 793Defending Against Attacks (38.3.12) 794Wireless and Mobile Device Attacks (38.4) 794Grayware and SMiShing (38.4.1) 794Rogue Access Points (38.4.2) 795Radio Frequency Jamming (38.4.3) 795Bluejacking and Bluesnarfing (38.4.4) 796Bluejacking 796Bluesnarfing 796Attacks Against Wi-Fi Protocols (38.4.5) 796Wi-Fi and Mobile Defense (38.4.6) 797Application Attacks (38.5) 797Cross-Site Scripting (38.5.1) 797Code Injection (38.5.2) 798XML Injection Attack 798SQL Injection Attack 798DLL Injection Attack 798LDAP Injection Attack 798Buffer Overflow (38.5.3) 799Remote Code Executions (38.5.4) 799Other Application Attacks (38.5.5) 799Defending Against Application Attacks (38.5.7) 801Spam (38.5.8) 801Phishing (38.5.9) 802Phishing 802Spear Phishing 802Vishing, Pharming, and Whaling (38.5.10) 802Vishing 802Pharming 803Whaling 803Defending Against Email and Browser Attacks (38.5.12) 803Physical Attacks 804Adversarial Artificial Intelligence Attacks 804Supply Chain Attacks 804Cloud-Based Attacks 804Cybersecurity Threats, Vulnerabilities, and AttacksSummary (38.6) 805What Did I Learn in This Chapter? (38.6.1) 805Reflection Questions (38.6.2) 810Practice 811Labs 811Check Your Understanding Questions 811Chapter 39 Network Security 813Objectives 813Key Terms 813Introduction (39.0) 814Security Foundations (39.1) 814The Cybersecurity Cube (39.1.1) 814Confidentiality, Integrity, and Availability (39.1.2) 816CIA Triad—The Principle of Confidentiality (39.1.3) 816Data Integrity (39.1.5) 817Ensuring Availability (39.1.7) 819Access Control (39.2) 820Physical Access Controls (39.2.1) 820Logical Access Controls (39.2.2) 821Administrative Access Controls (39.2.3) 821Authentication, Authorization, and Accounting (AAA) (39.2.4) 822Authentication 822Authorization 822Accounting 823What Is Identification? (39.2.5) 823Federated Identity Management (39.2.6) 823Authentication Methods (39.2.7) 824What You Know 824What You Have 824Who You Are 825Passwords (39.2.8) 825Password Managers 826Multi-Factor Authentication 827Multi-Factor Authentication (39.2.9) 827Authorization (39.2.10) 827When to Implement Authorization 827How to Implement Authorization 828Accounting (39.2.11) 828Defending Systems and Devices (39.3) 829Operating System Security (39.3.1) 829A Good Administrator 829A Systematic Approach 829A Baseline 830Types of Antimalware (39.3.3) 830Watch Out for Rogue Antivirus Products 830Fileless Attacks Are Difficult to Detect and Remove 830Scripts Can also Be Malware 830Always Remove Unapproved Software 830Patch Management (39.3.4) 831What Are Patches? 831What Do You Need to Do? 831A Proactive Approach 831Endpoint Security (39.3.5) 832Host-Based Firewalls 832Host Intrusion Detection Systems (HIDSs) 832Host Intrusion Prevention Systems (HIPSs) 832Endpoint Detection and Response (EDR) 832Data Loss Prevention (DLP) 833Next-Generation Firewall (NGFW) 833Host Encryption (39.3.6) 833Boot Integrity (39.3.7) 834What Is Boot Integrity? 834How Does Secure Boot Work? 834What Is Measured Boot? 834Apple System Security Features (39.3.8) 835Physical Protection of Devices (39.3.9) 836Computer Equipment 836Door Locks 836Radio Frequency Identification (RFID) Systems 836Antimalware Protection (39.4) 836Endpoint Threats (39.4.1) 837Endpoint Security (39.4.2) 837Host-Based Malware Protection (39.4.3) 839Antivirus/Antimalware Software 839Host-Based Firewall 840Host-Based Security Suites 840Network-Based Malware Protection (39.4.4) 841Firewalls and Host-Based Intrusion Prevention (39.5) 842Firewalls (39.5.1) 842Common Firewall Properties 843Firewall Benefits 843Firewall Limitations 843Types of Firewalls (39.5.2) 843Packet Filtering (Stateless) Firewall 843Stateful Firewall 844Application Gateway Firewall 844Next-Generation Firewall 846Packet Filtering Firewall Benefits and Limitations (39.5.4) 847Stateful Firewall Benefits and Limitations (39.5.5) 848Host-Based Firewalls (39.5.6) 849Windows Defender Firewall 850iptables 850nftables 850TCP Wrappers 850Antimalware Programs (39.5.7) 850Windows Defender Firewall (39.5.8) 851Secure Wireless Access (39.6) 854Wireless Security Overview (39.6.2) 854DoS Attacks (39.6.3) 854Rogue Access Points (39.6.4) 855Man-in-the-Middle Attack (39.6.5) 856SSID Cloaking and MAC Address Filtering (39.6.8) 858SSID Cloaking 859MAC Addresses Filtering 859802.11 Original Authentication Methods (39.6.9) 860Shared Key Authentication Methods (39.6.10) 860Authenticating a Home User (39.6.11) 861Encryption Methods (39.6.12) 862Authentication in the Enterprise (39.6.13) 863WPA3 (39.6.14) 864WPA3-Personal 864WPA3-Enterprise 864Open Networks 865IoT Onboarding 865Network Security Summary (39.7) 865What Did I Learn in This Chapter? (39.7.1) 865Reflection Questions (39.7.2) 870Practice 871Packet Tracer Activities 871Check Your Understanding Questions 871Appendix A Answers to the “Check Your Understanding” Questions 875Online ElementGlossary 9780138321338 TOC 1/8/2024