+ All Categories
Home > Documents > CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional...

CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional...

Date post: 20-Apr-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
30
Transcript
Page 1: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and
Page 2: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and
Page 3: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and

CISCO® NETWORKING ESSENTIALS

Second Edition

Page 4: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and
Page 5: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and

CISCO® NETWORKINGESSENTIALS

Second Edit ion

Troy McMil lan

Page 6: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and

Senior Acquisitions Editor: Kenyon BrownDevelopment Editor: Kelly TalbotTechnical Editor: Paul SuttonProduction Editor: Joel JonesCopy Editor: Kathy Grider-CarlyleEditorial Manager: Mary Beth WakefieldProduction Manager: Kathleen WisorAssociate Publisher: Jim MinatelProofreader: Kathryn DugganIndexer: Nancy GuentherProject Coordinator, Cover: Brent SavageCover Designer: WileyCover Image: ©TimotiSt/iStockphoto; Back Cover Images: Courtesy of Troy McMillanCopyright © 2015 by John Wiley & Sons, Inc., Indianapolis, IndianaPublished simultaneously in Canada

ISBN: 978-1-119-09215-5ISBN: 978-1-119-09212-4 (ebk.)ISBN: 978-1-119-09213-1 (ebk.)

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permis-sion of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warran-ties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read.

For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.

Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com.

Library of Congress Control Number: 2015943420

TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. Cisco is a registered trademark of Cisco Systems, Inc. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.

10 9 8 7 6 5 4 3 2 1

Page 7: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and

To my dear wife, Heike, and to her father, Joseph

Polteraitis, whom we loved and lost this year.

Page 8: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and
Page 9: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and

Acknowledgments

I want to thank the entire editing and production staff who have helped to make this book as good as it can possibly be. That includes Kelly Talbot, my development editor, who gave me great advice beyond simply grammar and style. I took full advantage of all his years of experience as an editor. He was the conductor of this orchestra and ensured everything was where it was supposed to be when it as supposed to be.

I also would like to thank the technical editor, Paul Sutton, who saved me from myself a number of times. It is so comforting to know that someone with deep technical knowledge is looking over your shoulder.

A special thanks goes to Ken Brown for encouraging me to update this book and helping to select new topics to add.

Page 10: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and
Page 11: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and

About the Author

Troy McMillan is a trainer and writer from Sugarloaf Key, Florida. He began his IT career with IBM in 1999, supporting point-of-sale systems. After achieving his MCSE, he became a network administrator in the Atlanta office of a global manufacturer of electric motors. In 2000 he took his first job as a trainer, teaching MCSE classes to career changers at a local IT school in Atlanta.

In 2001 Troy started delivering corporate training for New Horizons in Atlanta. His concentration was in Microsoft, CompTIA, and Cisco classes. In 2002, Troy started his own training company while continuing with New Horizons on a contract basis and also teaching at various colleges and technical schools in the Atlanta area.

In 2003 Troy began traveling the United States and Canada teaching Cisco, wireless (CWNA program), and Microsoft classes for training organizations such as Global Knowledge, New Horizons, and PPI.

In 2005 Troy accepted a position with Kaplan University of Professional and Continuing Education, creating practice tests and study guides for the Self-Test and Transcender brands. His work includes Microsoft, but he is the principal Cisco writer.

Troy’s first book, Change Your Career: Computer Network Security as Your New Profession (Kaplan Publishing) was released in 2007. It is a guide that provides resources and helpful hints for career changers considering a career in this field.

Troy began contributing to and providing technical edits for a number of Sybex books in 2009. This included contributing to Todd Lammle’s CCNA Wireless Study Guide: IUWNE Exam 640-721 and CompTIA Network+ Study Guide (Exam: N10-005), doing technical edits and contributing to Todd’s CCNA Cisco Certified Network Associate Review Guide, and acting as technical editor for Darril Gibson’s Windows 7 Desktop Support and Administration: Real World Skills for MCITP Certification and Beyond (Exams 70-685 and 70-686). He is currently providing technical editing on Toby Skandier’s Network Administrator Street Smarts: A Real World Guide to CompTIA Network+ Skills.

In 2010 Troy coauthored the VCP VMware Certified Professional on vSphere 4 Review Guide with Brian Perry, Chris Huss, and Jeantet Fields. In 2010 he also created and edited text books for Penn-Foster on Apple computers, basic troubleshooting, and mobile devices. Troy created classroom instruction materials for many of the Sybex titles already listed as well as for the MCTS: Windows Server 2008 R2 Complete Study Guide (Exams 70-640, 70-642 and 70-643) by William Panek.

Page 12: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and

Since 2010 Troy has worked on the following print projects:

▶ Coauthor of CISSP Cert Guide (Pearson Education)

▶ Prep test question writer for CCNA Wireless 640-722 Official Cert Guide (Cisco Press)

▶ Coauthor of CompTIA A+ Complete Review Guide: Exams 220-801 and 220-802 (Sybex)

▶ Author of CompTIA A+ Complete Review Guide: Exams 220-901 and 220-902 (Sybex)

▶ Assisted Todd Lammle with the update to CompTIA Network+ Study Guide: Exam N10-006 (Sybex)

▶ Coauthor of CompTIA Advanced Security Practitioner (CASP) CAS-002 Cert Guide (Pearson Education)

He also has written and appeared in the following training videos for Oncourse learning:

▶ Security +

▶ Network +

▶ Microsoft 70-410, 411,412 exam prep

▶ ICND 1

▶ ICND 2

▶ Cloud +

▶ CASP

▶ CISSP

Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and as a backup musician for acts including Vassar Clements and Delbert McClinton. He worked for a number of years as a session musician and songwriter in Nashville as well. In 1983 he returned to school, earning a BBA in Management from Georgia State University in 1986. He operated his own businesses after graduation, as well as working several years in retail management. He began a self-study in IT in the 1990s, leading to his first IT job at IBM.

Troy lives with his wife, Heike, and a house full of dogs, cats, and birds in Sugarloaf Key, Florida. He enjoys running, music, and sports of all kind, espe-cially NASCAR.

x A b o u t t h e A u t h o r

Page 13: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and

Contents at a Glance

Introduction xxiii

C H A P T E R 1 Networks 1

C H A P T E R 2 The OSI Model 19

C H A P T E R 3 TCP/IP 39

C H A P T E R 4 Protocols 63

C H A P T E R 5 Physical and Logical Topologies 91

C H A P T E R 6 Numbering Systems 109

C H A P T E R 7 Classful IP Addressing 129

C H A P T E R 8 Classless IP Addressing 153

C H A P T E R 9 Media 175

C H A P T E R 10 Network Devices 201

C H A P T E R 11 LAN Operations 225

C H A P T E R 12 Managing the Cisco IOS 253

C H A P T E R 13 Configuring Routers 281

C H A P T E R 14 Configuring Switches 315

C H A P T E R 15 Configuring Static Routing 337

C H A P T E R 16 Configuring Dynamic Routing 353

C H A P T E R 17 Device Security 371

Appendix A Answers to Review Questions 393

Appendix B CCNA Essentials: Ancillary Exercises 407

Index 437

Page 14: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and
Page 15: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and

Contents

Introduction xxiii

Chapter Net work s 1

Describing Network Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1Defining the Benefits of Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2Identifying the Requirements for a Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

Classifying Networks by Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8Understanding LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9Understanding WANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

Defining Network Architectures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10Understanding Peer-to-Peer Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11Understanding Client-Server Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14The Essentials and Beyond . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

Chapter The OSI Model 19

Using Reference Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19Understanding the Benefits of Reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21Exploring Reference Model Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Introducing the Layers of the OSI Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22Understanding the Application Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23Understanding the Presentation Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24Understanding the Session Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26Understanding the Transport Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26Understanding the Network Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30Understanding the Data-Link Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31Understanding the Physical Layer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

Describing the OSI Encapsulation Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33Identifying the Process on the Source Device . . . . . . . . . . . . . . . . . . . . . . . . . . . 34Identifying the Process on the Destination Device . . . . . . . . . . . . . . . . . . . . . . . 35The Essentials and Beyond . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

Chapter TCP/IP 39

Understanding the TCP/IP Model. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40Exploring the Four Layers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

Page 16: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and

x i v C o n t e n t s

Comparing the OSI and TCP/IP Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44Describing the TCP/IP Encapsulation Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

Understanding Data and PDUs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46Describing the Contents of Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47Describing the Contents of Segments. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47Describing the Contents of Packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47Describing the Contents of Frames. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47Understanding the Conversion to Bits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

Describing the Functions at the Transport Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . 50Understanding TCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50Understanding UDP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

Describing the Functions at the Internet Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52Defining Logical Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53Performing Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54Accomplishing Packet Forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

Describing the Functions of ARP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55Illustrating the ARP Broadcast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55Describing the Logic of MAC-to-IP-Address Conversion . . . . . . . . . . . . . . . . . . . 57The Essentials and Beyond . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

Chapter Protocols 63

Understanding the Function of Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64Defining Routed Protocols. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64Defining Routing Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

Exploring Application Layer Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65Describing FTP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65Describing TFTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67Describing SMTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67Describing DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69Describing SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70

Exploring Transport Layer Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72Reviewing TCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72Reviewing UDP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76

Exploring Internet Layer Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77Describing IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77Describing ARP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79

Page 17: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and

C o n t e n t s x v

Describing ICMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80Describing IGMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

Exploring Network Access Layer Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83Defining Network Access Layer Protocols on the LAN . . . . . . . . . . . . . . . . . . . . 84Defining Network Access Layer Protocols on the WAN . . . . . . . . . . . . . . . . . . . . 85The Essentials and Beyond . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

Chapter Physic al and Log ic al Topolog ies 91

Designing the Physical Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91Implementing a Bus Topology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92Implementing a Ring Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93Implementing a Star Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94Implementing a Mesh Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96Implementing a Hybrid Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97Implementing a Point-to-Point Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98Implementing a Point-to-Multipoint Topology. . . . . . . . . . . . . . . . . . . . . . . . . . 100

Designing the Logical Topology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101Understanding the Token Ring Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101Understanding the FDDI Ring Topology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102Understanding the Star Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103The Essentials and Beyond . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

Chapter Numbering Systems 109

Exploring Binary Numbering. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109Understanding the Base-2 Numbering System. . . . . . . . . . . . . . . . . . . . . . . . . . 110Understanding the Relationship between Binary and Computers. . . . . . . . . . . 112

Exploring Hexadecimal Numbering. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114Understanding the Base-16 Numbering System. . . . . . . . . . . . . . . . . . . . . . . . . 114Identifying MAC Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116

Applying Conversions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118Decimal-to-Binary Conversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118Hex-to-Decimal Conversion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121Binary-to-Hex Conversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123The Essentials and Beyond . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

Page 18: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and

x v i C o n t e n t s

Chapter Cla ssf ul IP Addressing 129

Describing the Function of IP Addresses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129Identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130Segmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131

Identifying IP Address Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132Defining IP Address Classes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133Identifying Network and Host Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135Describing Private IP Addresses and NAT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138

Utilizing Diagnostic Tools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139Executing the ipconfig Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141Executing the ping Command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141Executing the arp Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142Executing the traceroute Command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143

Understanding DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143Cisco DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145

Introducing IPv6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146IPv6 Address Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146IPv6 Address Types. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147Special IPv6 Addresses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148The Essentials and Beyond . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148

Chapter Cla ss less IP Address ing 153

Understanding the Limitations of Classful Networking . . . . . . . . . . . . . . . . . . . . . 153Exhaustion of the Class B Network Address Space. . . . . . . . . . . . . . . . . . . . . . . 154Unmanageable Routing Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154Exhaustion of the 32-Bit IPv4 Address Space. . . . . . . . . . . . . . . . . . . . . . . . . . . 155

Understanding the Benefits of Subnetting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155Identifying Sources of Network Congestion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156Deploying Subnetting as a Segmentation Tool. . . . . . . . . . . . . . . . . . . . . . . . . . 157

Describing the Components of CIDR. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158Introducing Classless Subnetting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158Designing and Implementing CIDR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160Understanding VLSM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167Summarization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171The Essentials and Beyond . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172

Page 19: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and

C o n t e n t s x v i i

Chapter Media 175

Selecting the Proper Media Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175Bandwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .176Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .176Convenience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180Cost . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180

Understanding Cabling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181Describing Cable Behavior and Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . 181Describing Physical Implementations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183Choosing the Correct Wiring Standard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187

Describing Wireless Standards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191Identifying Standards Bodies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191Understanding 802.11 Amendments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192Understanding Wireless LAN Components and Terminology . . . . . . . . . . . . . . 193Describing CSMA/CA Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196The Essentials and Beyond . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198

Chapter Net work Devices 201

Describing Device Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201Understanding Repeaters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202Understanding Hubs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202Understanding Bridges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203Understanding Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205Understanding Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209Understanding Wireless Access Points and Wireless Routers . . . . . . . . . . . . . . 214

Understanding Device Placement Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216Defining Broadcast Domains. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216Defining Collision Domains. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .217Understanding the Cisco Three-Layer Model . . . . . . . . . . . . . . . . . . . . . . . . . . . 220The Essentials and Beyond . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221

Chapter L AN Oper ations 225

Understanding the Routing Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225Describing Routing Tables. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226Understanding Population Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229

Page 20: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and

x v i i i C o n t e n t s

Understanding Administrative Distance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231Using Routing Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234

Describing the Switching Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243Reviewing MAC and IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243Reviewing Contention Methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244Describing MAC Address Tables. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246Understanding Frame Forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246

Describing End-to-End Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247Understanding the Local LAN Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248Understanding the Remote Communication Process . . . . . . . . . . . . . . . . . . . . 249The Essentials and Beyond . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250

Chapter Manag ing the Cisco IOS 253

Describing Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253Defining the Contents of RAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254Defining the Contents of NVRAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255Defining the Contents of Flash . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255Defining the Contents of ROM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256

Describing IOS Navigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258Connecting to the Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258Accessing User, Privileged, and Global Configuration Modes . . . . . . . . . . . . . . 262

Understanding and Managing the Boot Process . . . . . . . . . . . . . . . . . . . . . . . . . . . 266Understanding the Boot Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267Managing the IOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270Understanding Configuration Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271Managing the Configuration Register. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272The Essentials and Beyond . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276

Chapter Conf ig uring Routers 281

Cabling the Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281Cabling Router to Router. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284Cabling Router to Switch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287Cabling PC to Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288Cabling Router to CSU/DSU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290

Creating a Console Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292Connecting with the Console Cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292Connecting Through the USB Port. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293

Page 21: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and

C o n t e n t s x i x

Connecting Through Telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294Handling Initial Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295

Configuring Passwords. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295Interpreting Prompts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295Configuring Privileged (Enable) Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296Configuring Enable Secret Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297Configuring Line Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297

Configuring Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299Accessing Interface Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299Assigning an IP Address. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300Enabling the Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301Verifying the Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301Configuring a Router as a DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303Configuring WAN Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306

Saving Configuration Changes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308The Essentials and Beyond . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309

Chapter Conf ig uring Switches 315

Cabling the Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315Cabling Switch to Switch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316Cabling Router to Switch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .317Cabling Hosts to Switch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318

Creating a Session with the Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318Creating a Session with the Console Cable. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318Creating a Session Through Telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320

Configuring Passwords. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321Configuring Privileged (Enable) Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321Configuring Enable Secret Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322Configuring Line Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322Using the service password-encryption Command . . . . . . . . . . . . . . . . . . . . . . 322

Configuring Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323Accessing Switchports and Using Switchport Mode. . . . . . . . . . . . . . . . . . . . . . 323Enabling the Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324Verifying the Port. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324

Understanding Advanced Switch Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325Understanding VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325

Page 22: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and

x x C o n t e n t s

Configuring VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325Assigning Ports to VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326Understanding Trunk Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327Configuring Trunk Links. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328Describing STP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328Understanding Port Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332Limiting MAC Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332Implementing Sticky Mac . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333The Essentials and Beyond . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333

Chapter Conf ig uring St atic Routing 337

Populating the Routing Table. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338Using the ip route Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338Verifying the Route Table. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340

Configuring Inter-VLAN Routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341Creating a Trunk Link with Encapsulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342Creating and Configuring Subinterfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343Troubleshooting VLANs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345Troubleshooting Trunk Links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346Troubleshooting Inter-VLAN Routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347The Essentials and Beyond . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348

Chapter Conf ig uring D ynamic Routing 353

Understanding Routing Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353Exploring RIP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355Exploring EIGRP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357Exploring OSPF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358

Configuring Routing Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358Enabling a Routing Protocol and Accessing Router Mode. . . . . . . . . . . . . . . . . 359Defining the Interfaces on Which the Protocol Is Operational . . . . . . . . . . . . . 360Verifying the Routing Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361The Essentials and Beyond . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367

Chapter Device Securit y 371

Understanding Access Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371Understanding Standard Access Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373Understanding Extended Access Lists. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373

Page 23: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and

C o n t e n t s x x i

Configuring Numbered Access Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374Configuring Named Access Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376Editing Access Lists Using Sequence Numbers. . . . . . . . . . . . . . . . . . . . . . . . . . . . 377Understanding Network Address Translation (NAT) . . . . . . . . . . . . . . . . . . . . . . . . 378Implementing Static NAT, Dynamic NAT, and PAT. . . . . . . . . . . . . . . . . . . . . . . . . 380Configuring a Switch or Router as an NTP Client or Server . . . . . . . . . . . . . . . . . 383Implementing and Requiring SSH. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384Limiting Remote Access with ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387

The Essentials and Beyond . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388

Appendix A Answers to Review Questions 393

Appendix B CCNA Essentials: Ancillary Exercises 407

Index 437

Page 24: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and
Page 25: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and

Introduc tion

The first edition of this book was designed to fill a gap that has existed for some time in technical books and instructional materials covering network-ing in general and Cisco technology in particular. As a trainer, I struggled to find materials that struck a middle ground between basic networking texts and books that jump immediately into certification-level topics for which many readers and students were not prepared to digest. The reaction to the first edition confirmed my belief that a book of this type is needed and drove the creation of this second edition.

There will always be a market for books designed to present and review certification-level topics to those who are already familiar with the knowledge required to understand those topics. In today’s economic times, however, there is a whole new breed of students who are either taking classes or operating in a self-study capacity who do not have this prerequisite knowledge and may not even realize this as they attempt to tackle certification-level classes and books.

I have seen these students in my classes over the years. They are no less intel-ligent or motivated than the students who have more background and experi-ence. But at the pace at which these books and classes must move to cover all the material, they soon find themselves struggling. Some even give up entirely.

This book is designed to cover all of the basics required to really understand routing and switching, providing the required amount of time to digest the fundamentals and then moving on to actually setting up and configuring the routers and switches and seeing them operate. It does not attempt to cover every bell and whistle that these devices offer, nor does it cover every topic that is on a Cisco CCENT exam. What it does do is provide all of the basic network informa-tion from a Cisco perspective.

The student who reads this book and works through these exercises or the student who takes a class using this book as its text will come away ready in every way to tackle books and classes targeted for exam prep for the CCNA. That is the goal of this book and was our guiding principle throughout its creation.

Who Should Read This Book

This book is designed for anyone wishing to gain a basic understanding of how networks operate and how Cisco devices in particular fulfill their roles in the process. This includes:

Page 26: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and

x x i v I n t r o d u c t i o n

▶ Those who have been away from the IT industry for some time and are reentering the field

▶ Career changers with no previous experience

▶ Students who have struggled with certification-level prep materials

▶ Students who have had success with certification-level prep materials but came away from the experience with a shallow understanding of the core foundational knowledge

What’s Inside

Here is a glance at what’s in each chapter.

Chapter 1, “Networks,” describes network components, classifies LANs and WANs by function, and compares and contrasts peer-to-peer and client-server networks.

Chapter 2, “The OSI Model,” explains the purpose of reference models, introduces the layers of the OSI model, and describes how the layers relate to the encapsulation process.

Chapter 3, “TCP/IP,” explains the TCP/IP reference model, compares it to the OSI model, and describes the function of the four layers of the model.

Chapter 4, “Protocols,” describes the function of protocols in networking and surveys various protocols that operate at each layer of the TCP/IP model.

Chapter 5, “Physical and Logical Topologies,” defines the meaning of a topology in networking and describes the main physical and logical topologies.

Chapter 6, “Numbering Systems,” explains the main numbering systems of importance in networking, the binary and hexadecimal systems, and how they are converted to and from the decimal system.

Chapter 7, “Classful IP Addressing,” explains the basics of IP addressing, identifies the types of IP addresses, introduces network troubleshooting tools, and describes the use of DHCP to automate the IP configuration process.

Chapter 8, “Classless IP Addressing,” points out the shortcomings of class-ful IP addressing, explains the benefits of classless subnetting, and introduces the components of CIDR.

Chapter 9, “Media,” begins with a brief description of media types, then explains cable behaviors and characteristics, and ends with a survey of the types of cables and their proper use.

Page 27: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and

I n t r o d u c t i o n x x v

Chapter 10, “Network Devices,” describes the function of the various devices found in a network and explains design principles guiding their placement.

Chapter 11, “LAN Operations,” explains both the routing and the switching process and describes how they fit together in end-to-end communication.

Chapter 12, “Managing the Cisco IOS,” introduces the components of the Cisco operating system, describes the boot process of a router or switch, and describes how to navigate the command-line interface.

Chapter 13, “Configuring Routers,” explains how to get a router opera-tional, including cabling the router, logging into the IOS, securing the router, and configuring its interfaces.

Chapter 14, “Configuring Switches,” explains how to get a switch opera-tional, including cabling the switch, logging into the IOS, securing the switch, configuring its switch ports, and creating and managing VLANs.

Chapter 15, “Configuring Static Routing,” explains how routes are config-ured and verified at the CLI and how to configure inter-VLAN routing.

Chapter 16, “Configuring Dynamic Routing,” introduces how dynamic routing functions, explains the types of routing protocols, and describes how to configure an example of each.

Chapter 17, “Device Security,” describes the security features available in Cisco devices and the issues those features address. It also covers the implemen-tation of these features.

How to Contact the Author

I welcome feedback from you about this book or about books you’d like to see from me in the future. You can reach me by writing to [email protected].

Sybex strives to keep you supplied with the latest tools and information you need for your work. Please check their website at www.sybex.com, where we’ll post additional content and updates that supplement this book should the need arise. Enter Cisco Networking Essentials in the Search box (or type the book’s ISBN—978-1-119-09215-5), and click Go to get to the book’s update page.

Page 28: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and
Page 29: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and

CHAPTER 1

NetworksComputer networks are everywhere. It’s impossible to escape them in the modern world in which we live and work. We use them at work, at home, and even in between, in places like our cars, the park, and the coffee shop. We have come to take them for granted in the same way we treat electricity and hot water.

But a lot is going on behind the scenes when we use these networks. Cisco routers and switches play a critical role in successful network operation.

This opening chapter lays the foundation required to understand all the details that make networks function. Specifically, this chapter covers the following topics:

▶ Describing network components

▶ Classifying networks by function

▶ Defining network architectures

Describing Network Components

To understand how networks work, it helps to have an appreciation of why they exist in the first place. As incredible as it may seem now, for a number of years when computers first came into use, very few computers were net-worked. They operated as little islands of information with no connection to one another. Data had to be transferred between computers by copying it to a floppy disk, physically taking that floppy disk to the other computer, and copying the data to the destination machine. This process is now sometimes jokingly referred to as the sneakernet.

Modern networks can include many components. Some of the most basic components are computers, routers, and switches. Figure 1.1 shows some Cisco routers and switches. Routers are used in a network to transfer infor-mation between computers that are not on the same network. Routers are capable of doing this by maintaining a table of all networks and the routes (directions) used to locate those networks. Switches come in two varieties:

Page 30: CISCO · ICND 1 ICND 2 Cloud + CASP CISSP Prior to his career in IT, Troy was a professional musician. From 1968 to 1986, he recorded and performed with many of his own bands and

2

layer 2 and layer 3. Layer 2 switches simply connect computers or devices that are in the same network. Layer 3 switches can do that but are capable of acting as routers as well. Two models of routers are depicted in Figure 1.1, with a switch in the middle of the stack. Routers and switches are covered in depth in Chapter 10, “Network Devices.”

F I G U R E 1 . 1 Cisco routers and switches

In this section, the benefits of networking are covered as well as the compo-nents required to constitute a network.

Defining the Benefits of Networks

There are many benefits to networks, one of which was touched on in the introduction to this section: using a network makes sharing resources possible (without putting on your sneakers and leaving your seat). When connected by networks, users can share files, folders, printers, music, movies—you name it! If it can be put on a hard drive, it can be shared. Additional benefits are included in the following list:


Recommended