gogogo
Syndetics cover image
Image from Syndetics

Connecting networks companion guide.

By: Contributor(s): Material type: TextTextPublication details: Indianapolis, Indiana : Cisco Press, 2014.Description: xxiii, 542 p. ; 24cmISBN:
  • 1587133326
  • 9781587133329
Subject(s): DDC classification:
  • 004.6 CIS
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Standard Loan Moylish Library Main Collection 004.6 CIS (Browse shelf(Opens below)) 1 Available 39002100481598

Enhanced descriptions from Syndetics:

Connecting Networks Companion Guide is the official supplemental textbook for the Connecting Networks course in the Cisco®nbsp;Networking Academy®nbsp;CCNA®nbsp;Routing and Switching curriculum.

nbsp;

This course discusses the WAN technologies and network services required by converged applications in a complex network. The course allows you to understand the selection criteria of network devices and WAN technologies to meet network requirements. You will learn how to configure and troubleshoot network devices and resolve common issues with data link protocols. You will also develop the knowledge and skills needed to implement IPSec and virtual private network (VPN) operations in a complex network.

nbsp;

The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time.

nbsp;

The book's features help you focus on important concepts to succeed in this course:

nbsp;

Chapter objectives -Review core concepts by answering the focus questions listed at the beginning of each chapter. Key terms -Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter.nbsp; Glossary -Consult the comprehensive Glossary with 195 terms.nbsp; Summary of Activities and Labs -Maximize your study time with this complete list of all associated practice exercises at the end of each chapter.nbsp; Check Your Understanding -Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer. How To -Look for this icon to study the steps you need to learn to perform certain tasks. Interactive Activities -Reinforce your understanding of topics with all the different exercises from the online course identified throughout the book with this icon. Videos -Watch the videos embedded within the online course. Packet Tracer Activities -Explore and visualize networking concepts using Packet Tracer exercises interspersed throughout the chapters. Hands-on Labs -Work through all the course labs and Class Activities that are included in the course and published in the separate Lab Manual. nbsp;

nbsp;

Table of contents provided by Syndetics

  • Introduction (p. xix)
  • Chapter 1 Hierarchical Network Designs (p. 1)
  • Objectives (p. 1)
  • Key Terms (p. 1)
  • Introduction (1.0.1.1) (p. 2)
  • Hierarchical Network Design Overview (1.1) (p. 2)
  • Enterprise Network Campus Design (1.1.1) (p. 2)
  • Network Requirements (1.1.1.1) (p. 3)
  • Structured Engineering Principles (1.1.1.2) (p. 4)
  • Hierarchical Network Design (1.1.2) (p. 4)
  • Network Hierarchy (1.1.2.1) (p. 4)
  • The Access Layer (1.1.2.2) (p. 6)
  • The Distribution Layer (1.1.2.3) (p. 7)
  • The Core Layer (1.1.2.4) (p. 9)
  • Two-Tier Collapsed Core Design (1.1.2.5) (p. 10)
  • Cisco Enterprise Architecture (1.2) (p. 10)
  • Modular Design (1.2.1.1) (p. 11)
  • Modules in the Enterprise Architecture (1.2.1.2) (p. 12)
  • Cisco Enterprise Architecture Model (1.2.2) (p. 14)
  • Cisco Enterprise Architecture Model (1.2.2.1) (p. 14)
  • Cisco Enterprise Campus (1.2.2.2) (p. 15)
  • Cisco Enterprise Edge (1.2.2.3) (p. 17)
  • Service Provider Edge (1.2.2.4) (p. 18)
  • Remote Functional Area (1.2.2.5) (p. 21)
  • Enterprise Branch (p. 21)
  • Enterprise Teleworker (p. 22)
  • Enterprise Data Center (p. 22)
  • Evolving Network Architectures (1.3) (p. 22)
  • IT Challenges (1.3.1.1) (p. 22)
  • Emerging Enterprise Architectures (1.3.1.2) (p. 23)
  • Emerging Network Architectures (1.3.2) (p. 24)
  • Cisco Borderless Networks (1.3.2.1) (p. 24)
  • Collaboration Architecture (1.3.2.2) (p. 25)
  • Data Center and Virtualization (1.3.2.3) (p. 26)
  • Expanding the Network (1.3.2.4) (p. 27)
  • Summary (1.4) (p. 29)
  • Practice (p. 30)
  • Class Activities (p. 30)
  • Packet Tracer Activities (p. 30)
  • Check Your Understanding Questions (p. 31)
  • Chapter 2 Connecting the WAN (p. 35)
  • Objectives (p. 35)
  • Key Terms (p. 35)
  • Introduction (2.0.1.1) (p. 37)
  • WAN Technologies Overview (2.1) (p. 37)
  • Why a WAN? (2.1.1.1) (p. 37)
  • Are WANs Necessary? (2.1.1.2) (p. 38)
  • Evolving Networks (2.1.1.3) (p. 39)
  • Small Office (2.1.1.4) (p. 39)
  • Campus Network (2.1.1.5) (p. 40)
  • Branch Networks (2.1.1.6) (p. 42)
  • Distributed Network (2.1.1.7) (p. 43)
  • WAN Operations (2.1.2) (p. 44)
  • WANs in the OSI Model (2.1.2.1) (p. 44)
  • Common WAN Terminology (2.1.2.2) (p. 45)
  • WAN Devices (2.1.2.3) (p. 47)
  • Circuit-Switched Networks (2.1.2.4) (p. 48)
  • Packet-Switched Networks (2.1.2.5) (p. 50)
  • Selecting a WAN Technology (2.2) (p. 51)
  • WAN Link Connection Options (2.2.1.1) (p. 51)
  • Service Provider Network Infrastructure (2.2.1.2) (p. 52)
  • Private WAN Infrastructures (2.2.2) (p. 54)
  • Leased Lines (2.2.2.1) (p. 54)
  • Dialup (2.2.2.2) (p. 55)
  • ISDN (2.2.2.3) (p. 56)
  • Frame Relay (2.2.2.4) (p. 58)
  • ATM (2.2.2.5) (p. 59)
  • Ethernet WAN (2.2.2.6) (p. 60)
  • MPLS (2.2.2.7) (p. 62)
  • VSAT (2.2.2.8) (p. 63)
  • Public WAN Infrastructure (2.2.3) (p. 64)
  • DSL (2.2.3.1) (p. 64)
  • Cable (2.2.3.2) (p. 65)
  • Wireless (2.2.3.3) (p. 66)
  • 3G/4G Cellular (2.2.3.4) (p. 67)
  • VPN Technology (2.2.3.5) (p. 68)
  • Selecting WAN Services (2.2.4) (p. 70)
  • Choosing a WAN Link Connection (2.2.4.1, 2.2.4.2) (p. 70)
  • What Is the Purpose of the WAN? (p. 70)
  • What Is the Geographic Scope? (p. 70)
  • What Are the Traffic Requirements? (p. 71)
  • Summary (2.3) (p. 73)
  • Practice (p. 74)
  • Class Activities (p. 74)
  • Labs (p. 74)
  • Check Your Understanding Questions (p. 74)
  • Chapter 3 Point-to-Point Connections (p. 79)
  • Objectives (p. 79)
  • Key Terms (p. 79)
  • Introduction (3.0.1.1) (p. 80)
  • Serial Point-to-Point Overview (3.1) (p. 80)
  • Serial Communications (3.1.1) (p. 81)
  • Serial and Parallel Ports (3.1.1.1) (p. 81)
  • Serial Communication (3.1.1.2) (p. 82)
  • Point-to-Point Communication Links (3.1.1.3) (p. 84)
  • Time-Division Multiplexing (3.1.1.4) (p. 85)
  • Statistical Time-Division Multiplexing (3.1.1.5) (p. 86)
  • TDM Examples ù Sonet and SDM (3.1.1.6) (p. 87)
  • Demarcation Point (3.1.1.7) (p. 88)
  • DTE-DCE (3.1.1.8) (p. 90)
  • Serial Cables (3.1.1.9) (p. 91)
  • Serial Bandwidth (3.1.1.10) (p. 94)
  • HDLC Encapsulation (3.1.2) (p. 96)
  • WAN Encapsulation Protocols (3.1.2.1) (p. 96)
  • HDLC Encapsulation (3.1.2.2) (p. 97)
  • HDLC Frame Types (3.1.2.3) (p. 98)
  • Configuring HDLC Encapsulation (3.1.2.4) (p. 100)
  • Troubleshooting a Serial Interface (3.1.2.5) (p. 100)
  • PPP Operation (3.2) (p. 104)
  • Benefits of PPP (3.2.1) (p. 104)
  • Introducing PPP (3.2.1.1) (p. 104)
  • Advantages of PPP (3.2.1.2) (p. 106)
  • LCP and NCP (3.2.2) (p. 106)
  • PPP Layered Architecture (3.2.2.1) (p. 106)
  • PPP ù Link Control Protocol (LCP) (3.2.2.2) (p. 107)
  • PPP ù Network Control Protocol (NCP) (3.2.2.3) (p. 108)
  • PPP Frame Structure (3.2.2.4) (p. 108)
  • PPP Sessions (3.2.3) (p. 109)
  • Establishing a PPP Session (3.2.3.1) (p. 110)
  • LCP Operation (3.2.3.2) (p. 111)
  • LCP Packet (3.2.3.3) (p. 113)
  • PPP Configuration Options (3.2.3.4) (p. 115)
  • NCP Explained (3.2.3.5) (p. 117)
  • Configure PPP (3.3) (p. 118)
  • Configure PPP (3.3.1) (p. 118)
  • PPP Configuration Options (3.3.1.1) (p. 119)
  • PPP Basic Configuration Command (3.3.1.2) (p. 120)
  • PPP Compression Commands (3.3.1.3) (p. 121)
  • PPP Link Quality Monitoring Command (3.3.1.4) (p. 122)
  • PPP Multilink Commands (3.3.1.5) (p. 123)
  • Verifying PPP Configuration (3.3.1.6) (p. 125)
  • PPP Authentication (3.3.2) (p. 126)
  • PPP Authentication Protocols (3.3.2.1) (p. 127)
  • Password Authentication Protocol (PAP) (3.3.2.2) (p. 127)
  • Challenge Handshake Authentication Protocol (CHAP) (3.3.2.3) (p. 129)
  • PPP Encapsulation and Authentication Process (3.3.2.4) (p. 131)
  • Configuring PPP Authentication (3.3.2.5) (p. 134)
  • Configuring PPP with Authentication (3.3.2.6) (p. 136)
  • Troubleshoot WAN Connectivity (3.4) (p. 138)
  • Troubleshoot PPP (3.4.1) (p. 138)
  • Troubleshooting PPP Serial Encapsulation (3.4.1.1) (p. 138)
  • Debug PPP (3.4.1.2) (p. 140)
  • Troubleshooting a PPP Configuration with Authentication (3.4.1.3) (p. 142)
  • Summary (3.5) (p. 145)
  • Practice (p. 146)
  • Class Activities (p. 146)
  • Labs (p. 146)
  • Packet Tracer Activities (p. 146)
  • Check Your Understanding Questions (p. 147)
  • Chapter 4 Frame Relay (p. 153)
  • Objectives (p. 153)
  • Key Terms (p. 153)
  • Introduction (4.0.1.1) (p. 154)
  • Introduction to Frame Relay (4.1) (p. 154)
  • Benefits of Frame Relay (4.1.1) (p. 155)
  • Introducing Frame Relay (4.1.1.1) (p. 155)
  • Benefits of Frame Relay WAN Technology (4.1.1.2) (p. 156)
  • Dedicated Line Requirements (4.1.1.3) (p. 157)
  • Cost-Effectiveness and Flexibility of Frame Relay (4.1.1.4) (p. 159)
  • Frame Relay Operation (4.1.2) (p. 160)
  • Virtual Circuits (4.1.2.1) (p. 160)
  • Multiple Virtual Circuits (4.1.2.2) (p. 163)
  • Frame Relay Encapsulation (4.1.2.3) (p. 165)
  • Frame Relay Topologies (4.1.2.4, 4.1.2.5) (p. 167)
  • Frame Relay Address Mapping (4.1.2.6) (p. 171)
  • Local Management Interface (LMI) (4.1.2.7) (p. 174)
  • LMI Extensions (4.1.2.8) (p. 175)
  • Using LMI and Inverse ARP to Map Addresses (4.1.2.9) (p. 178)
  • Advanced Frame Relay Concepts (4.1.3) (p. 180)
  • Access Rate and Committed Information Rate (4.1.3.1) (p. 180)
  • Frame Relay Example (4.1.3.2) (p. 181)
  • Bursting (4.1.3.3) (p. 183)
  • Frame Relay Flow Control (4.1.3.4) (p. 184)
  • Configure Frame Relay (4.2) (p. 187)
  • Configure Basic Frame Relay (4.2.1) (p. 187)
  • Basic Frame Relay Configuration Commands (4.2.1.1) (p. 187)
  • Configuring a Static Frame Relay Map (4.2.1.2) (p. 190)
  • Verify a Static Frame Relay Map (4.2.1.3) (p. 192)
  • Configure Subinterfaces (4.2.2) (p. 193)
  • Reachability Issues (4.2.2.1) (p. 193)
  • Solving Reachability Issues (4.2.2.2) (p. 196)
  • Configuring Point-to-Point Subinterfaces (4.2.2.3) (p. 199)
  • Example: Configuring Point-to-Point Subinterfaces (4.2.2.4) (p. 200)
  • Troubleshoot Connectivity (4.3) (p. 203)
  • Troubleshoot Frame Relay (4.3.1) (p. 203)
  • Verifying Frame Relay Operation: Frame Relay Interface (4.3.1.1) (p. 203)
  • Verifying Frame Relay Operation: LMI Operations (4.3.1.2) (p. 204)
  • Verifying Frame Relay Operation: PVC Status (4.3.1.3) (p. 205)
  • Verifying Frame Relay Operation: Inverse ARP (4.3.1.4) (p. 205)
  • Troubleshooting Frame Relay Operation (4.3.1.5) (p. 207)
  • Summary (4.4) (p. 209)
  • Practice (p. 210)
  • Class Activities (p. 210)
  • Labs (p. 210)
  • Packet Tracer Activities (p. 210)
  • Check Your Understanding Questions (p. 211)
  • Chapter 5 Network Address Translation for IPv4 (p. 217)
  • Objectives (p. 217)
  • Key Terms (p. 217)
  • Introduction (5.0.1.1) (p. 218)
  • NAT Operation (5.1) (p. 219)
  • NAT Characteristics (5.1.1) (p. 219)
  • IPv4 Private Address Space (5.1.1.1) (p. 219)
  • What Is NAT? (5.1.1.2) (p. 220)
  • NAT Terminology (5.1.1.3) (p. 221)
  • How NAT Works (5.1.1.5) (p. 224)
  • Types of NAT (5.1.2) (p. 225)
  • Static NAT (5.1.2.1) (p. 225)
  • Dynamic NAT (5.1.2.2) (p. 226)
  • Port Address Translation (PAT) (5.1.2.3) (p. 227)
  • Next Available Port (5.1.2.4) (p. 228)
  • Comparing NAT and PAT (5.1.2.5) (p. 230)
  • Benefits of NAT (5.1.3) (p. 231)
  • Benefits of NAT (5.1.3.1) (p. 231)
  • Disadvantages of NAT (5.1.3.2) (p. 232)
  • Configuring NAT (5.2) (p. 233)
  • Configuring Static NAT (5.2.1) (p. 233)
  • Configuring Static NAT (5.2.1.1) (p. 233)
  • Analyzing Static NAT (5.2.1.2) (p. 235)
  • Verifying Static NAT (5.2.1.3) (p. 237)
  • Configuring Dynamic NAT (5.2.2) (p. 238)
  • Dynamic NAT Operation (5.2.2.1) (p. 238)
  • Configuring Dynamic NAT (5.2.2.2) (p. 239)
  • Analyzing Dynamic NAT (5.2.2.3) (p. 242)
  • Verifying Dynamic NAT (5.2.2.4) (p. 244)
  • Configuring Port Address Translation (PAT) (5.2.3) (p. 247)
  • Configuring PAT: Address Pool (5.2.3.1) (p. 247)
  • Configuring PAT: Single Address (5.2.3.2) (p. 249)
  • Analyzing PAT (5.2.3.3) (p. 251)
  • Verifying PAT (5.2.3.4) (p. 253)
  • Port Forwarding (5.2.4) (p. 255)
  • Port Forwarding (5.2.4.1) (p. 255)
  • SOHO Example (5.2.4.2) (p. 257)
  • Configuring Port Forwarding with IOS (5.2.4.3) (p. 258)
  • Configuring NAT and IPv6 (5.2.5) (p. 260)
  • NAT for IPv6? (5.2.5.1) (p. 260)
  • IPv6 Unique Local Addresses (5.2.5.2) (p. 262)
  • NAT for IPv6 (5.2.5.3) (p. 263)
  • Troubleshooting NAT (5.3) (p. 264)
  • Troubleshooting NAT: show Commands (5.3.1.1) (p. 264)
  • Troubleshooting NAT: debug Command (5.3.1.2) (p. 266)
  • Case Study (5.3.1.3) (p. 268)
  • Summary (5.4) (p. 271)
  • Practice (p. 272)
  • Class Activities (p. 272)
  • Labs (p. 272)
  • Packet Tracer Activities (p. 272)
  • Check Your Understanding Questions (p. 273)
  • Chapter 6 Broadband Solutions (p. 279)
  • Objectives (p. 279)
  • Key Terms (p. 279)
  • Introduction (6.0.1.1) (p. 280)
  • Teleworking (6.1) (p. 280)
  • Benefits of Teleworking (6.1.1) (p. 280)
  • Introducing Teleworking (6.1.1.1) (p. 281)
  • Employer Benefits of Teleworking (6.1.1.2) (p. 281)
  • Community and Government Benefits (6.1.1.3) (p. 282)
  • Individual Benefits of Teleworking (6.1.1.4) (p. 283)
  • Detriments to Telework (6.1.1.5) (p. 283)
  • Business Requirements for Teleworker Services (6.1.2) (p. 284)
  • Teleworker Solution (6.1.2.1) (p. 284)
  • Teleworker Connectivity Requirements (6.1.2.2) (p. 286)
  • Comparing Broadband Solutions (6.2) (p. 287)
  • Cable (6.2.1) (p. 287)
  • What is a Cable System? (6.2.1.1) (p. 287)
  • Cable and the Electromagnetic Spectrum (6.2.1.2) (p. 289)
  • DOCSIS (6.2.1.3) (p. 290)
  • Cable Components (6.2.1.4) (p. 291)
  • DSL (6.2.2) (p. 293)
  • What is DSL? (6.2.2.1) (p. 293)
  • DSL Connections (6.2.2.2) (p. 294)
  • Separating Voice and Data in ADSL (6.2.2.3) (p. 295)
  • Broadband Wireless (6.2.3) (p. 298)
  • Types of Broadband Wireless Technologies (6.2.3.1, 6.2.3.2) (p. 298)
  • Selecting Broadband Solutions (6.2.4) (p. 303)
  • Comparing Broadband Solutions (6.2.4.1) (p. 303)
  • Configuring xDSL Connectivity (6.3) (p. 304)
  • PPPoE Overview (6.3.1) (p. 304)
  • PPPoE Motivation (6.3.1.1) (p. 304)
  • PPPoE Concepts (6.3.1.2) (p. 306)
  • Configuring PPPoE (6.3.2) (p. 306)
  • PPPoE Configuration (6.3.2.1) (p. 307)
  • Summary (6.4) (p. 309)
  • Practice (p. 310)
  • Class Activities (p. 310)
  • Labs (p. 310)
  • Check Your Understanding Questions (p. 310)
  • Chapter 7 Securing Site-to-Site Connectivity (p. 313)
  • Objectives (p. 313)
  • Key Terms (p. 313)
  • Introduction (7.0.1.1) (p. 314)
  • VPNs (7.1) (p. 314)
  • Fundamentals of VPNs (7.1.1) (p. 314)
  • Introducing VPNs (7.1.1.1) (p. 315)
  • Benefits of VPNs (7.1.1.2) (p. 316)
  • Types of VPNs (7.1.2) (p. 317)
  • Remote-Access VPNs (7.1.2.2) (p. 318)
  • Site-to-Site GRE Tunnels (7.2) (p. 319)
  • Fundamentals of Generic Routing Encapsulation (7.2.1) (p. 319)
  • Introduction to GRE (7.2.1.1) (p. 319)
  • Characteristics of GRE (7.2.1.2) (p. 320)
  • Configuring GRE Tunnels (7.2.2) (p. 321)
  • GRE Tunnel Configuration (7.2.2.1) (p. 322)
  • GRE Tunnel Verification (7.2.2.2) (p. 324)
  • Introducing IPsec (7.3) (p. 326)
  • Internet Protocol Security (7.3.1) (p. 326)
  • IPsec (7.3.1.1) (p. 326)
  • IPsec Security Services (7.3.1.2) (p. 327)
  • IPsec Framework (7.3.2) (p. 328)
  • Confidentiality with Encryption (7.3.2.1) (p. 328)
  • Encryption Algorithms (7.3.2.2) (p. 330)
  • Diffie-Hellman Key Exchange (7.3.2.3) (p. 332)
  • Integrity with Hash Algorithms (7.3.2.4) (p. 332)
  • IPsec Authentication (7.3.2.5) (p. 334)
  • IPsec Protocol Framework (7.3.2.6) (p. 335)
  • Remote Access (7.4) (p. 337)
  • Remote-Access VPN Solutions (7.4.1) (p. 337)
  • Types of Remote-Access VPNs (7.4.1.1) (p. 337)
  • Cisco SSL VPN (7.4.1.2) (p. 338)
  • Cisco SSL VPN Solutions (7.4.1.3) (p. 340)
  • IPsec Remote-Access VPNs (7.4.2) (p. 341)
  • IPsec Remote Access (7.4.2.1) (p. 341)
  • Cisco Easy VPN Server and Remote (7.4.2.2) (p. 342)
  • Cisco Easy VPN Client (7.4.2.3) (p. 343)
  • Comparing IPsec and SSL (7.4.2.4) (p. 345)
  • Summary (7.5) (p. 347)
  • Practice (p. 348)
  • Class Activities (p. 348)
  • Labs (p. 348)
  • Packet Tracer Activities (p. 348)
  • Check Your Understanding Questions (p. 348)
  • Chapter 8 Monitoring the Network (p. 351)
  • Objectives (p. 351)
  • Key Terms (p. 351)
  • Introduction (8.0.1.1) (p. 352)
  • Syslog (8.1) (p. 352)
  • Syslog Operation (8.1.1) (p. 352)
  • Introduction to Syslog (8.1.1.1) (p. 352)
  • Syslog Operation (8.1.1.2) (p. 354)
  • Syslog Message Format (8.1.1.3) (p. 355)
  • Service Timestamp (8.1.1.4) (p. 357)
  • Configuring Syslog (8.1.2) (p. 358)
  • Syslog Server (8.1.2.1) (p. 358)
  • Default Logging (8.1.2.2) (p. 359)
  • Router and Switch Commands for Syslog Clients (8.1.2.3) (p. 360)
  • Verifying Syslog (8.1.2.4) (p. 362)
  • SNMP (8.2) (p. 364)
  • SNMP Operation (8.2.1) (p. 364)
  • Introduction to SNMP (8.2.1.1) (p. 364)
  • SNMP Operation (8.2.1.2) (p. 365)
  • SNMP Agent Traps (8.2.1.3) (p. 366)
  • SNMP Versions (8.2.1.4) (p. 368)
  • Community Strings (8.2.1.5) (p. 370)
  • Management Information Base Object ID (8.2.1.6) (p. 371)
  • Configuring SNMP (8.2.2) (p. 374)
  • Steps for Configuring SNMP (8.2.2.1) (p. 374)
  • Verifying SNMP Configuration (8.2.2.2) (p. 375)
  • Security Best Practices (8.2.2.3) (p. 378)
  • NetFlow (8.3) (p. 380)
  • NetFlow Operation (8.3.1) (p. 380)
  • Introducing NetFlow (8.3.1.1) (p. 380)
  • Understanding NetFlow (8.3.1.2) (p. 381)
  • Network Flows (8.3.1.3) (p. 383)
  • Configuring NetFlow (8.3.2) (p. 384)
  • Verifying NetFlow (8.3.2.2) (p. 386)
  • Examining Traffic Patterns (8.3.3) (p. 390)
  • Identifying NetFlow Collector Functions (8.3.3.1) (p. 390)
  • NetFlow Analysis with a NetFlow Collector (8.3.3.2) (p. 392)
  • Summary (8.4) (p. 397)
  • Practice (p. 397)
  • Class Activities (p. 398)
  • Labs (p. 398)
  • Packet Tracer Activities (p. 398)
  • Check Your Understanding Questions (p. 398)
  • Chapter 9 Troubleshooting the Network (p. 401)
  • Objectives (p. 401)
  • Key Terms (p. 401)
  • Introduction (9.0.1.1) (p. 402)
  • Troubleshooting with a Systematic Approach (9.1) (p. 402)
  • Network Documentation (9.1.1) (p. 402)
  • Documenting the Network (9.1.1.1) (p. 403)
  • Network Topology Diagrams (9.1.1.2) (p. 406)
  • Network Baseline Performance Level (9.1.1.3) (p. 408)
  • Establishing a Network Baseline (9.1.1.4) (p. 409)
  • Measuring Data (9.1.1.5) (p. 412)
  • Troubleshooting Process (9.1.2) (p. 415)
  • General Troubleshooting Procedures (9.1.2.1) (p. 415)
  • Gathering Symptoms (9.1.2.2) (p. 417)
  • Questioning End Users (9.1.2.3) (p. 418)
  • Isolating the Issue Using Layered Models (9.1.3) (p. 419)
  • Using Layered Models for Troubleshooting (9.1.3.1) (p. 419)
  • Troubleshooting Methods (9.1.3.2, 9.1.3.3) (p. 422)
  • Guidelines for Selecting a Troubleshooting Method (9.1.3.4) (p. 425)
  • Network Troubleshooting (9.2) (p. 426)
  • Troubleshooting Tools (9.2.1) (p. 426)
  • Software Troubleshooting Tools (9.2.1.1, 9.2.1.2) (p. 426)
  • Hardware Troubleshooting Tools (9.2.1.3) (p. 431)
  • Using a Syslog Server for Troubleshooting (9.2.1.4) (p. 435)
  • Symptoms and Causes of Network Troubleshooting (9.2.2) (p. 437)
  • Physical Layer Troubleshooting (9.2.2.1) (p. 437)
  • Data Link Layer Troubleshooting (9.2.2.2) (p. 439)
  • Network Layer Troubleshooting (9.2.2.3) (p. 441)
  • Transport Layer Troubleshooting ù ACLs (9.2.2.4) (p. 443)
  • Transport Layer Troubleshooting ù NAT for IPv4 (9.2.2.5) (p. 445)
  • Application Layer Troubleshooting (9.2.2.6) (p. 446)
  • Troubleshooting IP Connectivity (9.2.3) (p. 448)
  • Components of Troubleshooting End-to-End Connectivity (9.2.3.1) (p. 448)
  • End-to-End Connectivity Problem Initiates Troubleshooting (9.2.3.2) (p. 450)
  • Step 1 Verify the Physical Layer (9.2.3.3) (p. 452)
  • Step 2 Check for Duplex Mismatches (9.2.3.4) (p. 454)
  • Step 3 Verify Layer 2 and Layer 3 Addressing on the Local Network (9.2.3.5) (p. 456)
  • Step 4 Verify Default Gateway (9.2.3.6) (p. 461)
  • Step 5 Verify Correct Path (9.2.3.7) (p. 464)
  • Step 6 Verify the Transport Layer (9.2.3.8) (p. 468)
  • Step 7 Verify ACLs (9.2.3.9) (p. 469)
  • Step 8 Verify DNS (9.2.3.10) (p. 471)
  • Summary (9.3) (p. 474)
  • Practice (p. 475)
  • Class Activities (p. 475)
  • Packet Tracer Activities (p. 475)
  • Check Your Understanding Questions (p. 476)
  • Appendix A Answers to the ôCheck Your Understandingö Questions (p. 479)
  • Glossary (p. 499)

Author notes provided by Syndetics

Rick Graziani teaches computer science and computer networking courses at Cabrillo College in Aptos, California. Prior to teaching, Rick worked in the informationtechnology field for Santa Cruz Operation, Tandem Computers, and Lockheed Missiles and Space Corporation. He holds an M.A. in Computer Science and Systems Theory from California State University Monterey Bay. Rick is also a member of the Curriculum Development team for the Cisco Networking Academy since 1999.

Rick has authored multiple books for Cisco Press and multiple online courses for the Cisco Networking Academy. Rick is the author of the Cisco Press book IPv6 Fundamentals and has presented on IPv6 at several Cisco Academy conferences. He is the coauthor of the Cisco Press book Routing Protocols Companion Guide .

When Rick is not working, he is most likely surfing at one of his favorite Santa Cruz surf breaks.

Bob Vachon is a professor in the Computer Systems Technology program at Cambrian College in Sudbury, Ontario, Canada, where he teaches networking infrastructure courses. He has over 30 years of work and teaching experience in the computer networking and information technology field.

Since 2001, Bob has collaborated as team lead, lead author, and subject matter expert on various CCNA, CCNA-S, and CCNP projects for Cisco and the Cisco Networking Academy. He also authored the CCNA Accessing the WAN Companion Guide and the CCNA Security (640-554) Portable Command Guide . He is the coauthor of the Cisco Press book Routing Protocols Companion Guide .

In his downtime, Bob enjoys playing the guitar, shooting darts or pool, and either working in his gardens or white-water canoe tripping.

Powered by Koha