Home>Store

Introduction to Networks Companion Guide (CCNAv7)

eBook (Watermarked)

  • Your Price: $61.20
  • List Price: $72.00
  • 包括EPUB和PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from yourAccountpage after purchase:

    ePubEPUBThe open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe ReaderPDFThe popular standard, used most often with the freeAdobe® Reader®software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Also available inother formats.

Register your productto gain access to bonus material or receive a coupon.

Description

  • Copyright 2020
  • Pages: 736
  • Edition: 1st
  • eBook (Watermarked)
  • ISBN-10: 0-13-663354-4
  • ISBN-13: 978-0-13-663354-9

Introduction to Networks Companion Guideis the official supplemental textbook for the Introduction to Networks course in the Cisco Networking Academy CCNA curriculum.


The course introduces the architecture, protocols, functions, components, and models of the internet and computer networks. The principles of IP addressing and fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. By the end of the course, you will be able to build simple LANs, perform basic configurations for routers and switches, understand the fundamentals of network security, and implement IP addressing schemes.

The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.

The books features help you focus on important concepts to succeed in this course:*Chapter objectives:Review core concepts by answering the focus questions listed at the beginning of each chapter.
*Key terms: Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.
*Glossary: Consult the comprehensive Glossary with more than 300 terms.
*Summary of Activities and Labs: Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.
*Check Your Understanding: Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.


*How To: Look for this icon to study the steps you need to learn to perform certain tasks.
*Interactive Activities: Reinforce your understanding of topics with dozens of exercises from the online course identified throughout the book with this icon.
*Videos: Watch the videos embedded within the online course.
*Packet Tracer Activities: Explore and visualize networking concepts using Packet Tracer. There are multiple exercises interspersed throughout the chapters and provided in the accompanying Labs & Study Guide book.
*Hands-on Labs:Work through all the labs and other activities that are included in the course and published in the separate Labs & Study Guide.

Sample Content

Sample Pages

Download the sample pages(includes Chapter 7)

Table of Contents

Introduction xxx
Chapter 1Networking Today 1
Objectives 1
Key Terms 1
Introduction (1.0) 3
Networks Affect Our Lives (1.1) 3
Networks Connect Us (1.1.1) 3
No Boundaries (1.1.3) 3
Network Components (1.2) 4
Host Roles (1.2.1) 4
Peer-to-Peer (1.2.2) 5
End Devices (1.2.3) 6
Intermediary Devices (1.2.4) 6
Network Media (1.2.5) 7
Network Representations and Topologies (1.3) 8
Network Representations (1.3.1) 8
Topology Diagrams (1.3.2) 10
Physical Topology Diagrams 10
Logical Topology Diagrams 10
Common Types of Networks (1.4) 11
Networks of Many Sizes (1.4.1) 11
LANs and WANs (1.4.2) 12
LANs 13
WANs 14
The Internet (1.4.3) 15
Intranets and Extranets (1.4.4) 16
Internet Connections (1.5) 17
互联网接入技术(1.5.1)17
Home and Small Office Internet Connections (1.5.2) 18
Businesses Internet Connections (1.5.3) 19
The Converging Network (1.5.4) 20
Reliable Networks (1.6) 23
Network Architecture (1.6.1) 23
Fault Tolerance (1.6.2) 24
Scalability (1.6.3) 24
Quality of Service (1.6.4) 25
Network Security (1.6.5) 26
Network Trends (1.7) 27
Recent Trends (1.7.1) 28
Bring Your Own Device (BYOD) (1.7.2) 28
Online Collaboration (1.7.3) 28
Video Communications (1.7.4) 29
Cloud Computing (1.7.6) 29
Technology Trends in the Home (1.7.7) 31
Powerline Networking (1.7.8) 31
Wireless Broadband (1.7.9) 32
Wireless Internet Service Providers 32
Wireless Broadband Service 32
Network Security (1.8) 33
Security Threats (1.8.1) 33
Security Solutions (1.8.2) 34
The IT Professional (1.9) 35
CCNA (1.9.1) 35
Networking Jobs (1.9.2) 36
总结(1.10)37
Networks Affect Our Lives 37
Network Components 37
Network Representations and Topologies 37
常见的网络37
Internet Connections 38
Reliable Networks 38
Network Trends 38
Network Security 39
The IT Professional 40
Practice 40
Check Your Understanding Questions 40
Chapter 2Basic Switch and End Device Configuration 45
Objectives 45
Key Terms 45
Introduction (2.0) 46
Cisco IOS Access (2.1) 46
Operating Systems (2.1.1) 46
GUI (2.1.2) 47
Purpose of an OS (2.1.3) 48
Access Methods (2.1.4) 49
Terminal Emulation Programs (2.1.5) 50
IOS Navigation (2.2) 52
Primary Command Modes (2.2.1) 52
Configuration Mode and Subconfiguration Modes (2.2.2) 53
Navigate Between IOS Modes (2.2.4) 54
A Note About Syntax Checker Activities (2.2.6) 55
The Command Structure (2.3) 56
Basic IOS Command Structure (2.3.1) 56
IOS Command Syntax Check (2.3.2) 57
IOS Help Features (2.3.3) 58
Hot Keys and Shortcuts (2.3.5) 58
Basic Device Configuration (2.4) 61
Device Names (2.4.1) 61
Password Guidelines (2.4.2) 62
Configure Passwords (2.4.3) 63
Encrypt Passwords (2.4.4) 64
Banner Messages (2.4.5) 65
Save Configurations (2.5) 66
Configuration Files (2.5.1) 67
Alter the Running Configuration (2.5.2) 68
Capture Configuration to a Text File (2.5.4) 68
Ports and Addresses (2.6) 71
IP Addresses (2.6.1) 71
Interfaces and Ports (2.6.2) 73
Configure IP Addressing (2.7) 74
Manual IP Address Configuration for End Devices (2.7.1) 75
Automatic IP Address Configuration for End Devices (2.7.2) 76
Switch Virtual Interface Configuration (2.7.4) 77
Verify Connectivity (2.8) 78
Summary (2.9) 79
Cisco IOS Access 79
IOS Navigation 79
The Command Structure 79
Basic Device Configuration 79
Save Configurations 80
Ports and Addresses 80
Configure IP Addressing 80
Verify Connectivity 80
Practice 81
Check Your Understanding Questions 81
Chapter 3Protocols and Models 85
Objectives 85
Key Terms 85
Introduction (3.0) 86
The Rules (3.1) 86
Communications Fundamentals (3.1.2) 86
Communication Protocols (3.1.3) 87
Rule Establishment (3.1.4) 88
Network Protocol Requirements (3.1.5) 88
Message Encoding (3.1.6) 89
Message Formatting and Encapsulation (3.1.7) 90
Message Size (3.1.8) 91
Message Timing (3.1.9) 92
Message Delivery Options (3.1.10) 92
A Note About the Node Icon (3.1.11) 94
Protocols 94
Network Protocol Overview (3.2.1) 94
Network Protocol Functions (3.2.2) 95
Protocol Interaction (3.2.3) 96
Protocol Suites (3.3) 97
Network Protocol Suites (3.3.1) 97
Evolution of Protocol Suites (3.3.2) 98
TCP/IP Protocol Example (3.3.3) 99
TCP/IP Protocol Suite (3.3.4) 99
Application Layer 101
Transport Layer 102
Internet Layer 102
Network Access Layer 103
TCP/IP Communication Process (3.3.5) 103
Standards Organizations (3.4) 108
Open Standards (3.4.1) 108
Internet Standards (3.4.2) 108
Electronic and Communications Standards (3.4.3) 111
参考模型(3.5)111
The Benefits of Using a Layered Model (3.5.1) 112
The OSI Reference Model (3.5.2) 112
The TCP/IP Protocol Model (3.5.3) 114
OSI一nd TCP/IP Model Comparison (3.5.4) 115
Data Encapsulation (3.6) 116
Segmenting Messages (3.6.1) 116
Sequencing (3.6.2) 118
Protocol Data Units (3.6.3) 118
Encapsulation Example (3.6.4) 120
De-encapsulation Example (3.6.5) 120
Data Access (3.7) 121
Addresses (3.7.1) 121
Layer 3 Logical Address (3.7.2) 122
Devices on the Same Network (3.7.3) 123
Role of the Data Link Layer Addresses: Same
IP Network (3.7.4) 124
Devices on a Remote Network (3.7.5) 125
Role of the Network Layer Addresses (3.7.6) 125
Role of the Data Link Layer Addresses: Different
IP Networks (3.7.7) 126
Data Link Addresses (3.7.8) 127
Summary (3.8) 130
The Rules 130
Protocols 130
Protocol Suites 130
Standards Organizations 131
Reference Models 131
Data Encapsulation 132
Data Access 132
Practice 133
Check Your Understanding Questions 133
Chapter 4Physical Layer 137
Objectives 137
Key Terms 137
Introduction (4.0) 138
Purpose of the Physical Layer (4.1) 138
The Physical Connection (4.1.1) 138
The Physical Layer (4.1.2) 139
Physical Layer Characteristics (4.2) 141
Physical Layer Standards (4.2.1) 141
Physical Components (4.2.2) 142
Encoding (4.2.3) 142
Signaling (4.2.4) 143
Bandwidth (4.2.5) 145
Bandwidth Terminology (4.2.6) 145
Latency 146
Throughput 146
Goodput 146
Copper Cabling (4.3) 146
Characteristics of Copper Cabling (4.3.1) 147
Types of Copper Cabling (4.3.2) 148
Unshielded Twisted-Pair (UTP) (4.3.3) 148
Shielded Twisted-Pair (STP) (4.3.4) 150
Coaxial Cable (4.3.5) 151
UTP Cabling (4.4) 152
Properties of UTP Cabling (4.4.1) 152
UTP Cabling Standards and Connectors (4.4.2) 153
Straight-Through and Crossover UTP Cables (4.4.3) 157
Fiber-Optic Cabling (4.5) 158
Properties of Fiber-Optic Cabling (4.5.1) 158
Types of Fiber Media (4.5.2) 159
Single-Mode Fiber 159
Multimode Fiber 160
Fiber-Optic Cabling Usage (4.5.3) 160
Fiber-Optic Connectors (4.5.4) 161
Fiber Patch Cords (4.5.5) 162
Fiber Versus Copper (4.5.6) 163
Wireless Media (4.6) 164
Properties of Wireless Media (4.6.1) 164
Types of Wireless Media (4.6.2) 165
Wireless LAN (4.6.3) 166
Summary (4.7) 168
Purpose of the Physical Layer 168
Physical Layer Characteristics 168
Copper Cabling 168
UTP Cabling 169
Fiber-Optic Cabling 169
Wireless Media 169
Practice 170
Check Your Understanding Questions 170
Chapter 5Number Systems 175
Objectives 175
Key Terms 175
Introduction (5.0) 176
Binary Number System (5.1) 176
Binary and IPv4 Addresses (5.1.1) 176
Binary Positional Notation (5.1.3) 178
Convert Binary to Decimal (5.1.5) 180
Decimal to Binary Conversion (5.1.7) 182
Decimal to Binary Conversion Example (5.1.8) 186
IPv4 Addresses (5.1.11) 193
Hexadecimal Number System (5.2) 194
Hexadecimal and IPv6 Addresses (5.2.1) 194
Decimal to Hexadecimal Conversions (5.2.3) 196
Hexadecimal to Decimal Conversion (5.2.4) 196
Summary (5.3) 198
Binary Number System 198
Hexadecimal Number System 198
Practice 198
Check Your Understanding Questions 198
Chapter 6Data Link Layer 203
Objectives 203
Key Terms 203
Introduction (6.0) 204
Purpose of the Data Link Layer (6.1) 204
The Data Link Layer (6.1.1) 204
IEEE 802 LAN/MAN Data Link Sublayers (6.1.2) 206
Providing Access to Media (6.1.3) 207
Data Link Layer Standards (6.1.4) 209
Topologies (6.2) 209
Physical and Logical Topologies (6.2.1) 209
WAN Topologies (6.2.2) 211
点对点211
Hub and Spoke 211
Mesh 212
Point-to-Point WAN Topology (6.2.3) 213
LAN Topologies (6.2.4) 213
Legacy LAN Topologies 214
Half-Duplex and Full-Duplex Communication (6.2.5) 215
Half-Duplex Communication 215
Full-Duplex Communication 215
Access Control Methods (6.2.6) 216
Contention-Based Access 216
Controlled Access 217
Contention-Based AccessCSMA/CD (6.2.7) 217
Contention-Based AccessCSMA/CA (6.2.8) 219
Data Link Frame (6.3) 221
The Frame (6.3.1) 221
Frame Fields (6.3.2) 222
Layer 2 Addresses (6.3.3) 223
LAN and WAN Frames (6.3.4) 225
Summary (6.4) 228
Purpose of the Data Link Layer 228
Topologies 228
Data Link Frame 229
Practice 229
Check Your Understanding Questions 229
Chapter 7Ethernet Switching 233
Objectives 233
Key Terms 233
Introduction (7.0) 234
Ethernet Frames (7.1) 234
Ethernet Encapsulation (7.1.1) 234
Data Link Sublayers (7.1.2) 235
MAC Sublayer (7.1.3) 236
Data Encapsulation 236
Accessing the Media 237
Ethernet Frame Fields (7.1.4) 237
Ethernet MAC Address (7.2) 239
MAC Address and Hexadecimal (7.2.1) 240
Ethernet MAC Address (7.2.2) 241
Frame Processing (7.2.3) 243
单播马C Address (7.2.4) 244
Broadcast MAC Address (7.2.5) 246
Multicast MAC Address (7.2.6) 247
The MAC Address Table (7.3) 248
Switch Fundamentals (7.3.1) 248
Switch Learning and Forwarding (7.3.2) 250
Examine the Source MAC Address 250
Find the Destination MAC Address 250
Filtering Frames (7.3.3) 252
Switch Speeds and Forwarding Methods (7.4) 254
Frame Forwarding Methods on Cisco Switches (7.4.1) 254
Cut-Through Switching (7.4.2) 255
Memory Buffering on Switches (7.4.3) 257
Duplex and Speed Settings (7.4.4) 257
Auto-MDIX (7.4.5) 259
Summary (7.5) 261
Ethernet Frame 261
Ethernet MAC Address 261
MAC地址表261
Switch Speeds and Forwarding Methods 262
Practice 262
Check Your Understanding Questions 262
Chapter 8Network Layer 267
Objectives 267
Key Terms 267
Introduction (8.0) 268
Network Layer Characteristics (8.1) 268
The Network Layer (8.1.1) 268
IP Encapsulation (8.1.2) 270
Characteristics of IP (8.1.3) 271
Connectionless (8.1.4) 271
Best Effort (8.1.5) 272
Media Independent (8.1.6) 273
IPv4 Packet (8.2) 274
IPv4 Packet Header (8.2.1) 274
IPv4 Packet Header Fields (8.2.2) 274
IPv6 Packet (8.3) 276
Limitations of IPv4 (8.3.1) 277
IPv6 Overview (8.3.2) 277
IPv4 Packet Header Fields in the IPv6 Packet Header (8.3.3) 278
IPv6 Packet Header (8.3.4) 280
How a Host Routes (8.4) 281
Host Forwarding Decision (8.4.1) 281
Default Gateway (8.4.2) 282
A Host Routes to the Default Gateway (8.4.3) 283
Host Routing Tables (8.4.4) 283
Introduction to Routing (8.5) 285
Router Packet Forwarding Decision (8.5.1) 285
IP Router Routing Table (8.5.2) 286
Static Routing (8.5.3) 287
Dynamic Routing (8.5.4) 288
Introduction to an IPv4 Routing Table (8.5.6) 290
Summary (8.6) 292
Network Layer Characteristics 292
IPv4 Packet 292
IPv6 Packet 292
How a Host Routes 293
Introduction to Routing 293
Practice 294
Check Your Understanding Questions 294
Chapter 9Address Resolution 297
Objectives 297
关键术语297
Introduction (9.0) 298
MAC and IP (9.1) 298
Destination on Same Network (9.1.1) 298
Destination on Remote Network (9.1.2) 299
ARP (9.2) 301
ARP Overview (9.2.1) 301
ARP Functions (9.2.2) 302
Removing Entries from an ARP Table (9.2.6) 306
ARP Tables on Networking Devices (9.2.7) 306
ARP IssuesARP Broadcasts and ARP Spoofing (9.2.8) 307
IPv6 Neighbor Discovery (9.3) 309
IPv6 Neighbor Discovery Messages (9.3.2) 309
IPv6 Neighbor DiscoveryAddress Resolution (9.3.3) 311
Summary (9.4) 313
MAC and IP 313
ARP 313
Neighbor Discovery 314
Practice 314
Check Your Understanding Questions 314
Chapter 10Basic Router Configuration 319
Objectives 319
Introduction (10.0) 320
Configure Initial Router Settings (10.1) 320
Basic Router Configuration Steps (10.1.1) 320
Basic Router Configuration Example (10.1.2) 321
Configure Interfaces (10.2) 323
Configure Router Interfaces (10.2.1) 323
Configure Router Interfaces Example (10.2.2) 324
Verify Interface Configuration (10.2.3) 325
Configuration Verification Commands (10.2.4) 326
Configure the Default Gateway (10.3) 330
Default Gateway on a Host (10.3.1) 331
Default Gateway on a Switch (10.3.2) 332
Summary (10.4) 335
Configure Initial Router Settings 335
Configure Interfaces 335
Configure the Default Gateway 335
Practice 336
Check Your Understanding Questions 337
Chapter 11IPv4 Addressing 341
Objectives 341
Key Terms 341
Introduction (11.0) 342
IPv4 Address Structure (11.1) 342
Network and Host Portions (11.1.1) 342
The Subnet Mask (11.1.2) 343
The Prefix Length (11.1.3) 344
Determining the Network: Logical AND (11.1.4) 345
Network, Host, and Broadcast Addresses (11.1.6) 347
Network Address 347
Host Addresses 348
Broadcast Address 349
IPv4 Unicast, Broadcast, and Multicast (11.2) 349
Unicast (11.2.1) 349
Broadcast (11.2.2) 350
IP Directed Broadcasts 351
Multicast (11.2.3) 352
Types of IPv4 Addresses (11.3) 353
Public and Private IPv4 Addresses (11.3.1) 353
Routing to the Internet (11.3.2) 354
Special Use IPv4 Addresses (11.3.4) 356
Loopback Addresses 356
Link-Local Addresses 357
Legacy Classful Addressing (11.3.5) 357
分配的IP地址(11.3.6)358
Network Segmentation (11.4) 359
Broadcast Domains and Segmentation (11.4.1) 359
Problems with Large Broadcast Domains (11.4.2) 360
Reasons for Segmenting Networks (11.4.3) 362
Subnet an IPv4 Network (11.5) 364
Subnet on an Octet Boundary (11.5.1) 364
Subnet Within an Octet Boundary (11.5.2) 366
Subnet a Slash 16 and a Slash 8 Prefix (11.6) 367
Create Subnets with a Slash 16 Prefix (11.6.1) 367
Create 100 Subnets with a Slash 16 Prefix (11.6.2) 369
Create 1000 Subnets with a Slash 8 Prefix (11.6.3) 372
Subnet to Meet Requirements (11.7) 374
Subnet Private Versus Public IPv4 Address Space (11.7.1) 374
What About the DMZ? 377
Minimize Unused Host IPv4 Addresses and Maximize Subnets (11.7.2) 377
Example: Efficient IPv4 Subnetting (11.7.3) 378
VLSM (11.8) 381
IPv4 Address Conservation (11.8.3) 381
VLSM (11.8.4) 383
VLSM Topology Address Assignment (11.8.5) 386
Structured Design (11.9) 387
IPv4 Network Address Planning (11.9.1) 388
Device Address Assignment (11.9.2) 389
Summary (11.10) 390
IPv4 Addressing Structure 390
IPv4 Unicast, Broadcast, and Multicast 390
Types of IPv4 Addresses 390
Network Segmentation 391
Subnet an IPv4 Network 391
Subnet a /16 and a /8 Prefix 391
Subnet to Meet Requirements 391
Variable-Length Subnet Masking 392
Structured Design 392
Practice 393
Check Your Understanding Questions 393
Chapter 12IPv6 Addressing 397
Objectives 397
Key Terms 397
Introduction (12.0) 398
IPv4 Issues (12.1) 398
Need for IPv6 (12.1.1) 398
Internet of Things 399
IPv4 and IPv6 Coexistence (12.1.2) 399
Dual Stack 399
Tunneling 400
Translation 401
IPv6 Address Representation (12.2) 401
IPv6 Addressing Formats (12.2.1) 401
Preferred Format 402
Rule 1Omit Leading Zeros (12.2.2) 403
Rule 2Double Colon (12.2.3) 404
IPv6 Address Types (12.3) 406
Unicast, Multicast, Anycast (12.3.1) 406
IPv6 Prefix Length (12.3.2) 406
Types of IPv6 Unicast Addresses (12.3.3) 407
A Note About the Unique Local Address (12.3.4) 408
IPv6 GUA (12.3.5) 408
IPv6 GUA Structure (12.3.6) 409
Global Routing Prefix 410
Subnet ID 410
Interface ID 410
IPv6 LLA (12.3.7) 411
GUA and LLA Static Configuration (12.4) 413
Static GUA Configuration on a Router (12.4.1) 413
Static GUA Configuration on a Windows Host (12.4.2) 414
Static Configuration of a Link-Local Unicast Address (12.4.3) 415
Dynamic Addressing for IPv6 GUAs (12.5) 417
RS and RA Messages (12.5.1) 417
Method 1: SLAAC (12.5.2) 418
Method 2: SLAAC and Stateless DHCPv6 (12.5.3) 419
Method 3: Stateful DHCPv6 (12.5.4) 420
EUI-64 Process vs. Randomly Generated (12.5.5) 421
EUI-64 Process (12.5.6) 422
Randomly Generated Interface IDs (12.5.7) 424
Dynamic Addressing for IPv6 LLAs (12.6) 425
Dynamic LLAs (12.6.1) 425
Dynamic LLAs on Windows (12.6.2) 425
Dynamic LLAs on Cisco Routers (12.6.3) 426
Verify IPv6 Address Configuration (12.6.4) 427
IPv6 Multicast Addresses (12.7) 430
Assigned IPv6 Multicast Addresses (12.7.1) 430
Well-Known IPv6 Multicast Addresses (12.7.2) 430
Solicited-Node IPv6多播地址(12.7.3)432
Subnet an IPv6 Network (12.8) 432
Subnet Using the Subnet ID (12.8.1) 432
IPv6 Subnetting Example (12.8.2) 433
IPv6 Subnet Allocation (12.8.3) 434
Router Configured with IPv6 Subnets (12.8.4) 435
Summary (12.9) 436
IPv4 Issues 436
IPv6 Address Representation 436
IPv6 Address Types 436
GUA and LLA Static Configuration 437
Dynamic Addressing for IPv6 GUAs 437
Dynamic Addressing for IPv6 LLAs 437
IPv6 Multicast Addresses 438
Subnet an IPv6 Network 438
Practice 439
Check Your Understanding Questions 439
Chapter 13ICMP 443
Objectives 443
Introduction (13.0) 444
ICMP Messages (13.1) 444
ICMPv4 and ICMPv6 Messages (13.1.1) 444
Host Reachability (13.1.2) 444
Destination or Service Unreachable (13.1.3) 445
Time Exceeded (13.1.4) 446
ICMPv6 Messages (13.1.5) 446
Ping and Traceroute Tests (13.2) 449
PingTest Connectivity (13.2.1) 449
Ping the Loopback (13.2.2) 450
Ping the Default Gateway (13.2.3) 450
Ping远程主机(13.2.4)451
TracerouteTest the Path (13.2.5) 452
Round-Trip Time (RTT) 453
IPv4 TTL and IPv6 Hop Limit 453
Summary (13.3) 454
ICMP Messages 454
Ping and Traceroute Testing 454
Practice 455
Check Your Understanding Questions 456
Chapter 14Transport Layer 461
Objectives 461
Key Terms 461
Introduction (14.0) 462
Transportation of Data (14.1) 462
Role of the Transport Layer (14.1.1) 462
Transport Layer Responsibilities (14.1.2) 463
Transport Layer Protocols (14.1.3) 467
Transmission Control Protocol (TCP) (14.1.4) 467
User Datagram Protocol (UDP) (14.1.5) 468
The Right Transport Layer Protocol for the Right Application (14.1.6) 469
TCP Overview (14.2) 470
TCP Features (14.2.1) 470
TCP Header (14.2.2) 471
TCP Header Fields (14.2.3) 471
Applications That Use TCP (14.2.4) 472
UDP Overview (14.3) 473
UDP Features (14.3.1) 473
UDP Header (14.3.2) 474
UDP Header Fields (14.3.3) 474
Applications that use UDP (14.3.4) 475
Port Numbers (14.4) 476
Multiple Separate Communications (14.4.1) 476
Socket Pairs (14.4.2) 477
Port Number Groups (14.4.3) 478
The netstat Command (14.4.4) 479
TCP通信过程(14.5)480
TCP Server Processes (14.5.1) 480
TCP Connection Establishment (14.5.2) 483
Session Termination (14.5.3) 484
TCP Three-Way Handshake Analysis (14.5.4) 485
Reliability and Flow Control (14.6) 486
TCP ReliabilityGuaranteed and Ordered Delivery (14.6.1) 486
TCP ReliabilityData Loss and Retransmission (14.6.3) 488
TCP Flow ControlWindow Size and Acknowledgments (14.6.5) 490
TCP Flow ControlMaximum Segment Size (MSS) (14.6.6) 491
TCP Flow ControlCongestion Avoidance (14.6.7) 493
UDP Communication (14.7) 494
UDP Low Overhead Versus Reliability (14.7.1) 494
UDP Datagram Reassembly (14.7.2) 494
UDP Server Processes and Requests (14.7.3) 495
UDP Client Processes (14.7.4) 495
Summary (14.8) 499
Transportation of Data 499
TCP Overview 499
UDP Overview 499
Port Numbers 499
TCP Communications Process 500
Reliability and Flow Control 500
UDP Communication 501
Practice 501
Check Your Understanding Questions 502
Chapter 15Application Layer 507
Objectives 507
Key Terms 507
Introduction (15.0) 508
Application, Presentation, and Session (15.1) 508
Application Layer (15.1.1) 508
Presentation and Session Layer (15.1.2) 508
TCP/IP Application Layer Protocols (15.1.3) 510
Peer-to-Peer (15.2) 511
Client-Server Model (15.2.1) 511
Peer-to-Peer Networks (15.2.2) 512
Peer-to-Peer Applications (15.2.3) 513
Common P2P Applications (15.2.4) 514
Web and Email Protocols (15.3) 515
Hypertext Transfer Protocol and Hypertext Markup Language (15.3.1) 515
HTTP and HTTPS (15.3.2) 516
Email Protocols (15.3.3) 518
SMTP, POP, and IMAP (15.3.4) 519
SMTP 519
POP 520
IMAP 521
IP Addressing Services (15.4) 521
Domain Name Service (15.4.1) 522
DNS Message Format (15.4.2) 524
DNS Hierarchy (15.4.3) 525
The nslookup Command (15.4.4) 526
Dynamic Host Configuration Protocol (15.4.6) 527
DHCP Operation (15.4.7) 528
File Sharing Services (15.5) 530
File Transfer Protocol (15.5.1) 530
Server Message Block (15.5.2) 531
Summary 534
Application, Presentation, and Session 534
Peer-to-Peer 534
Web and Email Protocols 534
IP Addressing Services 535
File Sharing Services 535
Practice 536
Check Your Understanding Questions 536
Chapter 16Network Security Fundamentals 541
Objectives 541
Key Terms 541
Introduction (16.0) 542
Security Threats and Vulnerabilities (16.1) 542
Types of Threats (16.1.1) 542
Types of Vulnerabilities (16.1.2) 543
Physical Security (16.1.3) 545
Network Attacks (16.2) 546
Types of Malware (16.2.1) 546
Viruses 546
Worms 547
Trojan Horses 547
Reconnaissance Attacks (16.2.2) 547
Access Attacks (16.2.3) 548
Password Attacks 548
Trust Exploitation 548
Port Redirection 549
Man-in-the-Middle 549
Denial of Service Attacks (16.2.4) 551
DoS Attack 551
DDoS Attack 551
Network Attack Mitigations (16.3) 552
The Defense-in-Depth Approach (16.3.1) 553
Keep Backups (16.3.2) 553
Upgrade, Update, and Patch (16.3.3) 554
Authentication, Authorization, and Accounting (16.3.4) 555
Firewalls (16.3.5) 555
Types of Firewalls (16.3.6) 557
Endpoint Security (16.3.7) 558
Device Security (16.4) 558
Cisco AutoSecure (16.4.1) 558
Passwords (16.4.2) 559
Additional Password Security (16.4.3) 560
Enable SSH (16.4.4) 561
Disable Unused Services (16.4.5) 563
Summary 565
Security Threats and Vulnerabilities 565
Network Attacks 565
Network Attack Mitigation 565
Device Security 566
Practice 567
Check Your Understanding Questions 567
Chapter 17Build a Small Network 571
Objectives 571
Key Terms 571
Introduction (17.0) 572
在一个小及设备rk (17.1) 572
Small Network Topologies (17.1.1) 572
Device Selection for a Small Network (17.1.2) 573
Cost 573
Speed and Types of Ports/Interfaces 573
Expandability 573
Operating System Features and Services 574
IP Addressing for a Small Network (17.1.3) 574
Redundancy in a Small Network (17.1.4) 576
Traffic Management (17.1.5) 577
Small Network Applications and Protocols (17.2) 578
Common Applications (17.2.1) 578
Network Applications 578
Application Layer Services 579
Common Protocols (17.2.2) 579
Voice and Video Applications (17.2.3) 582
Scale to Larger Networks (17.3) 583
Small Network Growth (17.3.1) 583
Protocol Analysis (17.3.2) 583
Employee Network Utilization (17.3.3) 584
Verify Connectivity (17.4) 586
Verify Connectivity with Ping (17.4.1) 586
Extended Ping (17.4.2) 588
Verify Connectivity with Traceroute (17.4.3) 590
Extended Traceroute (17.4.4) 592
网络英航seline (17.4.5) 593
Host and IOS Commands (17.5) 596
IP Configuration on a Windows Host (17.5.1) 596
IP Configuration on a Linux Host (17.5.2) 599
IP Configuration on a macOS Host (17.5.3) 600
The arp Command (17.5.4) 601
Common show Commands Revisited (17.5.5) 602
The show cdp neighbors Command (17.5.6) 609
The show ip interface brief Command (17.5.7) 610
Verify Switch Interfaces 611
Troubleshooting Methodologies (17.6) 611
Basic Troubleshooting Approaches (17.6.1) 612
Resolve or Escalate? (17.6.2) 613
The debug Command (17.6.3) 613
The terminal monitor Command (17.6.4) 615
Troubleshooting Scenarios (17.7) 616
Duplex Operation and Mismatch Issues (17.7.1) 617
IP Addressing Issues on IOS Devices (17.7.2) 618
IP Addressing Issues on End Devices (17.7.3) 619
Default Gateway Issues (17.7.4) 619
Troubleshooting DNS Issues (17.7.5) 621
Summary (17.8) 624
在一个小及设备rk 624
Small Network Applications and Protocols 624
Scale to Larger Networks 624
Verify Connectivity 625
Host and IOS Commands 625
Troubleshooting Methodologies 626
Troubleshooting Scenarios 626
Practice 627
Check Your Understanding Questions 628
Appendix AAnswers to Check Your Understanding Questions 631
Key Terms Glossary645


9780136633662 TOC 6/3/2020


Updates

Errata

We've made every effort to ensure the accuracy of this book and its companion content. Any errors that have been confirmed since this book was published can be downloaded below.

Download the errata(48 KB .doc)

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simplyemailinformation@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

他因tomer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through ourContact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on theAccount page. If a user no longer desires our service and desires to delete his or her account, please contact us atcustomer-service@informit.comand we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive:www.e-skidka.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information toNevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read ourSupplemental privacy statement for California residentsin conjunction with this Privacy Notice. TheSupplemental privacy statement for California residentsexplains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Pleasecontact usabout this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


我们可以修改这个隐私通过updat通知ed posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020