Solution Manual for Introduction to Networks Labs and Study Guide (CCNAv7)

Preview Extract
Introduction to Networks Labs and Study Guide (CCNAv7) Instructorโ€™s Answer Key Allan Johnson Cisco Press 221 River St. Hoboken, NJ 07030 USA Johnson_FM_i-xxxvi.indd 1 15/05/20 7:39 PM ii Introduction to Networks Labs and Study Guide (CCNAv7) Introduction to Networks Labs and Study Guide (CCNAv7) Instructorโ€™s Answer Key Copyrightยฉ 2020 Cisco Systems, Inc. Cisco Press logo is a trademark of Cisco Systems, Inc. Published by: Cisco Press 221 River St. Hoboken, NJ 07030 USA All rights reserved. This publication is protected by copyright, and permission must be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. For information regarding permissions, request forms, and the appropriate contacts within the Pearson Education Global Rights & Permissions Department, please visit www.pearson.com/permissions. No patent liability is assumed with respect to the use of the information contained herein. Although every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein. ScoutAutomatedPrintCode Student ISBNs: ISBN-13: 978-0-13-663445-4 ISBN-10: 0-13-663445-1 Editor-in-Chief Mark Taub Director, Product Management Brett Bartow Business Operations Manager, Cisco Press Ronald Fligge Senior Editor James Manly Managing Editor Sandra Schroeder Development Editor Christopher Cleveland Project Editor Mandie Frank Copy Editor Kitty Wilson Technical Editor Dave Holzinger Editorial Assistant Cindy Teeters Designer Chuti Prasertsith Composition codeMantra Proofreader Charlotte Kughen Instructor ISBNs: ISBN-13: 978-0-13-663442-3 ISBN-10: 0-13-663442-7 Library of Congress Control Number: 2020906043 Johnson_FM_i-xxxvi.indd 2 21/05/20 11:18 am iii Warning and Disclaimer This book is designed to provide information about the Cisco Networking Academy Introduction to Networks (CCNAv7) course. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an โ€œas isโ€ basis. The authors, Cisco Press, and Cisco Systems, Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it. The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc. Trademark Acknowledgments All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Cisco Press or Cisco Systems, Inc., cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. Microsoft and/or its respective suppliers make no representations about the suitability of the information contained in the documents and related graphics published as part of the services for any purpose all such documents and related graphics are provided โ€œas isโ€ without warranty of any kind. Microsoft and/or its respective suppliers hereby disclaim all warranties and conditions with regard to this information, including all warranties and conditions of merchantability, whether express, implied or statutory, fitness for a particular purpose, title and non-infringement. In no event shall Microsoft and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use or performance of information available from the services. The documents and related graphics contained herein could include technical inaccuracies or typographical errors. Changes are periodically added to the information herein. Microsoft and/or its respective suppliers may make improvements and/or changes in the product(s) and/or the program(s) described herein at any time. Partial screen shots may be viewed in full within the software version specified. Microsoftยฎ Windowsยฎ, and Microsoft Officeยฎ are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. This book is not sponsored or endorsed by or affiliated with the Microsoft Corporation. Special Sales For information about buying this title in bulk quantities, or for special sales opportunities (which may include electronic versions; custom cover designs; and content particular to your business, training goals, marketing focus, or branding interests), please contact our corporate sales department at [email protected] or (800) 382-3419. For government sales inquiries, please contact [email protected]. For questions about sales outside the U.S., please contact [email protected]. Johnson_FM_i-xxxvi.indd 3 15/05/20 7:39 PM iv Introduction to Networks Labs and Study Guide (CCNAv7) Feedback Information At Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each book is crafted with care and precision, undergoing rigorous development that involves the unique expertise of members from the professional technical community. Readersโ€™ feedback is a natural continuation of this process. If you have any comments regarding how we could improve the quality of this book, or otherwise alter it to better suit your needs, you can contact us through email at [email protected]. Please make sure to include the book title and ISBN in your message. We greatly appreciate your assistance. Americas Headquarters Cisco Systems, Inc. San Jose, CA Asia Pacific Headquarters Cisco Systems (USA) Pte. Ltd. Singapore Europe Headquarters Cisco Systems International BV Amsterdam, The Netherlands Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Johnson_FM_i-xxxvi.indd 4 15/05/20 8:48 PM v About the Contributing Author Allan Johnson entered the academic world in 1999, after 10 years as a business owner/operator, to dedicate his efforts to his passion for teaching. He holds both an M.B.A. and an M.Ed. in training and development. He taught CCNA courses at the high school level for 7 years and has taught both CCNA and CCNP courses at Del Mar College in Corpus Christi, Texas. In 2003, Allan began to commit much of his time and energy to the CCNA Instructional Support Team, providing services to Networking Academy instructors worldwide and creating training materials. He now works full time for Cisco Networking Academy as Curriculum Lead. Johnson_FM_i-xxxvi.indd 5 15/05/20 7:39 PM vi Introduction to Networks Labs and Study Guide (CCNAv7) About the Technical Reviewer Dave Holzinger has been a curriculum developer, project manager, author, and technical editor for the Cisco Networking Academy Program in Phoenix, Arizona since 2001. Dave works on the team that develops their online curricula including CCNA, CCNP, and IT Essentials. He has been working with computer hardware and software since 1981. Dave has certifications from Cisco, BICSI, and CompTIA. Johnson_FM_i-xxxvi.indd 6 15/05/20 7:39 PM vii Credits Figure 2-2 Screenshot of Windows 10 Ethernet Properties ยฉ Microsoft 2020 Figure 2-3 Screenshot of Windows 10 TCP/IPv4 Propertiesโ€”Manual IP Address Configuration ยฉ Microsoft 2020 Figure 2-4 Screenshot of Windows 10 TCP/IPv4 Propertiesโ€”Automatic IP Address Configuration ยฉ Microsoft 2020 Unnumbered Figure 3-2 Screenshot of Capturing from Ethernet ยฉ Wireshark Unnumbered Figure 7-2 Screenshot of highlights the frame details for an ARP request ยฉ Wireshark Unnumbered Figure 7-3 Screenshot of highlights the frame details for an ARP reply ยฉ Wireshark Figure 12-3 Screenshot of Windows TCP/IPv6 Properties ยฉ Microsoft 2020 Unnumbered Figure 13-2 Screenshot of External to PC-A with a Hop limit of 63 ยฉ Wireshark Figure 17-3 Screenshot of Windows 10 Network Connection Details ยฉ Microsoft 2020 Figure 17-4 Screenshot of Linux Ubuntu Connection Information ยฉ 2020 Microsoft 2020 Figure 17-5 Screenshot of Configuration Information on a macOS Host ยฉ 2020 Apple Inc Johnson_FM_i-xxxvi.indd 7 15/05/20 7:39 PM viii Introduction to Networks Labs and Study Guide (CCNAv7) Contents at a Glance Introduction xxxii Johnson_FM_i-xxxvi.indd 8 Chapter 1 Networking Today 1 Chapter 2 Basic Switch and End Device Configuration Chapter 3 Protocols and Models 77 Chapter 4 Physical Layer 113 Chapter 5 Number Systems 137 Chapter 6 Data Link Layer 145 Chapter 7 Ethernet Switching Chapter 8 Network Layer 193 Chapter 9 Address Resolution Chapter 10 Basic Router Configuration 229 Chapter 11 IPv4 Addressing 269 Chapter 12 IPv6 Addressing 331 Chapter 13 ICMP 373 Chapter 14 Transport Layer 411 Chapter 15 Application Layer 439 Chapter 16 Network Security Fundamentals Chapter 17 Build a Small Network 505 21 153 205 459 15/05/20 7:39 PM Contents ix Contents Introductionโ€‚โ€‚ xxxii Chapter 1 Networking Today 1 Networks Affect Our Lives Network Components 2 2 End Devices, Intermediary Devices, and Media 2 Check Your Understanding: Network Components Network Representations and Topologies 4 Classify and Identify Network Components Topology Diagrams 3 4 5 Check Your Understanding: Network Representations and Topologies 5 Common Types of Networks 6 Compare LANs and WANs 6 Check Your Understanding: Common Types of Networks Internet Connections 7 Vocabulary Exercise: Matching Reliable Networks 7 7 9 Classify the Requirements for a Reliable Network 9 Check Your Understanding: Reliable Networks 10 Network Trends 10 Identify the Cloud Type 11 Check Your Understanding: Network Trends 11 Network Security 12 Check Your Understanding: Network Security 12 The IT Professional 13 1.5.7 Packet Tracerโ€”Network Representation (Instructor Version) 14 Objectives 14 Instructions 14 Challenge Question 17 1.9.3 Labโ€”Research IT and Networking Job Opportunities (Instructor Version) 18 Objectives 18 Background / Scenario 18 Required Resources 18 Instructions 18 Reflection Questions 19 Chapter 2 Basic Switch and End Device Configuration 21 Cisco IOS Access 22 Check Your Understanding: Cisco IOS Access 22 Johnson_FM_i-xxxvi.indd 9 15/05/20 7:39 PM x Introduction to Networks Labs and Study Guide (CCNAv7) IOS Navigation 23 Syntax Checker: Navigate Between IOS Modes 23 Check Your Understanding: IOS Navigation 24 The Command Structure 25 Navigate the IOS Matching Exercise 25 Hotkeys and Shortcuts 26 Basic Device Configuration 27 Apply a Basic Configuration 27 Check Your Understanding: Basic Device Configuration 28 Save Configurations 29 Ports and Addresses 29 Check Your Understanding: Ports and Addresses Configure IP Addressing Verify Connectivity 30 30 32 Packet Tracer Exercise 2-1: Basic Switch Configuration Requirements 33 33 Command Reference 34 2.3.7 Packet Tracerโ€”Navigate the IOS (Instructor Version) 35 Objectives 35 Background / Scenario 35 Instructions 35 Part 1: Establish Basic Connections, Access the CLI, and Explore Help 35 Part 2: Explore EXEC Modes 37 Part 3: Set the Clock 38 2.3.8 Labโ€”Navigate the IOS by Using Tera Term for Console Connectivity (Instructor Version) 41 Topology 41 Objectives 41 Background / Scenario 41 Required Resources 42 Instructions 42 Part 1: Access a Cisco Switch through the Serial Console Port 42 Part 2: Display and Configure Basic Device Settings 44 Part 3: (Optional) Access a Cisco Router Using a Mini-USB Console Cable 45 Reflection Question 47 Router Interface Summary Table 48 2.5.5 Packet Tracerโ€”Configure Initial Switch Settings (Instructor Version) 49 Objectives 49 Background / Scenario 49 Instructions 49 Part 1: Verify the Default Switch Configuration 49 Johnson_FM_i-xxxvi.indd 10 15/05/20 7:39 PM Contents xi Part 2: Create a Basic Switch Configuration 50 Part 3: Configure a MOTD Banner 53 Part 4: Save and Verify Configuration Files to NVRAM 53 Part 5: Configure S2 54 2.7.6 Packet Tracerโ€”Implement Basic Connectivity (Instructor Version) 55 Addressing Table 55 Objectives 55 Background 55 Instructions 55 Part 1: Perform a Basic Configuration on S1 and S2 55 Part 2: Configure the PCs 56 Part 3: Configure the Switch Management Interface 57 2.9.1 Packet Tracerโ€”Basic Switch and End Device Configuration (Instructor Version) 59 Addressing Table 59 Objectives 59 Scenario 59 Instructions 59 Requirements 59 2.9.2 Labโ€”Basic Switch and End Device Configuration (Instructor Version) 62 Topology 62 Addressing Table 62 Objectives 62 Background / Scenario 62 Required Resources 63 Instructions 63 Reflection Question 70 Device Configsโ€ƒโ€ƒ 71 Switch S1 (complete) 71 Switch S2 (complete) 73 Chapter 3 Protocols and Models 77 The Rules 78 Vocabulary Exercise: Matching 78 Check Your Understanding: The Rules 78 Protocols 79 Check Your Understanding: Protocols 80 Protocol Suites 81 Protocol Definitions: Matching 81 Map the Protocols of the TCP/IP Suite 82 Check Your Understanding: Protocol Suites 83 Standards Organizations 84 Standards Organizations: Matching 84 Check Your Understanding: Standards Organizations Johnson_FM_i-xxxvi.indd 11 85 15/05/20 7:39 PM xii Introduction to Networks Labs and Study Guide (CCNAv7) Reference Models 86 OSI Reference Model Layers: Matching 86 TCP/IP Model Layers: Matching 87 Data Encapsulation 87 Label the PDUs 87 Check Your Understanding: Data Encapsulation 89 Data Access 89 The Role of Addressing in Network Communications Check Your Understanding: Data Access 90 90 3.0.3 Class Activityโ€”Design a Communications System (Instructor Version) 92 Objectives 92 Background / Scenario 92 Reflection Question 92 3.4.4 Labโ€”Research Networking Standards (Instructor Version) 94 Objectives 94 Background / Scenario 94 Required Resources 94 Instructions 94 3.5.5 Packet Tracerโ€”Investigate the TCP/IP and OSI Models in Action (Instructor Version) 98 Objectives 98 Background 98 Instructions 98 Part 1: Examine HTTP Web Traffic 98 Part 2: Display Elements of the TCP/IP Protocol Suite 101 Challenge Questions 103 3.7.9 Labโ€”Install Wireshark (Instructor Version) 104 Objectives 104 Background / Scenario 104 Required Resources 104 Instructions 104 3.7.10 Labโ€”Use Wireshark to View Network Traffic (Instructor Version) 106 Topology 106 Objectives 106 Background / Scenario 106 Required Resources 107 Instructions 107 Part 1: Capture and Analyze Local ICMP Data in Wireshark 107 Part 2: Capture and Analyze Remote ICMP Data in Wireshark 110 Reflection Question 111 Appendix A: Allowing ICMP Traffic Through a Firewall Johnson_FM_i-xxxvi.indd 12 112 15/05/20 7:39 PM Contents xiii Part 1: Create a new inbound rule allowing ICMP traffic through the firewall 112 Part 2: Disabling or deleting the new ICMP rule 112 Chapter 4 Physical Layer 113 Purpose of the Physical Layer 114 Check Your Understanding: Purpose of the Physical Layer 114 Physical Layer Characteristics 115 Completion Exercise 115 Check Your Understanding: Physical Layer Characteristics 116 Copper Cabling 116 Completion Exercise 117 Compare UTP, STP, and Coaxial Characteristics 118 UTP Cabling 118 Limiting the Negative Effect of Crosstalk 118 UTP Cable Wiring Standards 118 UTP Cable Pinouts Fiber-Optic Cabling 119 119 Completion Exercise 119 Check Your Understanding: Fiber-Optic Cabling 120 Wireless Media 121 Completion Exercise 121 Check Your Understanding: Wireless Media 122 4.6.5 Packet Tracerโ€”Connect a Wired and Wireless LAN (Instructor Version) 123 Addressing Table 123 Objectives 123 Background 124 Instructions 124 Part 1: Connect to the Cloud 124 Part 2: Connect Router0 124 Part 3: Connect Remaining Devices 125 Part 4: Verify Connections 125 Part 5: Examine the Physical Topology 125 4.6.6 Labโ€”View Wired and Wireless NIC Information (Instructor Version) 127 Objectives 127 Background / Scenario 127 Required Resources 127 Instructions 127 Part 1: Identify and Work with PC NICs 127 Part 2: Identify and Use the System Tray Network Icons 130 Reflection Question 131 Johnson_FM_i-xxxvi.indd 13 15/05/20 7:39 PM xiv Introduction to Networks Labs and Study Guide (CCNAv7) 4.7.1 Packet Tracerโ€”Connect the Physical Layer (Instructor Version) 132 Objectives 132 Background 132 Part 1: Identify Physical Characteristics of Internetworking Devices 132 Part 2: Select Correct Modules for Connectivity 133 Part 3: Connect Devices 135 Part 4: Check Connectivity Chapter 5 135 Number Systems 137 Binary Number System 138 Positional Notation 138 Convert Binary to Decimal 139 Convert Decimal to Binary 140 Activity: Binary Game 140 Hexadecimal Number System 140 Decimal to Hexadecimal Conversion 142 Hexadecimal to Decimal Conversion 142 Check Your Understanding: Hexadecimal Number System Chapter 6 142 Data Link Layer 145 Purpose of the Data Link Layer 146 Check Your Understanding: Purpose of the Data Link Layer 147 Topologies 148 Completion Exercise 148 Check Your Understanding: Topologies 149 Data Link Frame 150 Label the Generic Frame Fields 150 Check Your Understanding: Data Link Frame 150 Chapter 7 Ethernet Switching Ethernet Frames 153 154 Identify the Ethernet Frame Attributes 154 Check Your Understanding: Ethernet Switching 155 Ethernet MAC Address 156 Completion Exercise 156 The MAC Address Table 157 LAN Switches 157 Build the MAC Address Table 157 Forward the Frame 158 Switch Speeds and Forwarding Methods 161 Compare Switch Forwarding Methods 162 Port Settings Completion Exercise 162 Check Your Understanding: Switch Speeds and Forwarding Methods Johnson_FM_i-xxxvi.indd 14 163 15/05/20 7:39 PM Contents xv 7.1.6 Labโ€”Use Wireshark to Examine Ethernet Frames (Instructor Version) 164 Topology 164 Objectives 164 Background / Scenario 164 Required Resources 165 Instructions 165 Part 1: Examine the Header Fields in an Ethernet II Frame 165 Part 2: Use Wireshark to Capture and Analyze Ethernet Frames 168 Reflection Question 171 7.2.7 Labโ€”View Network Device MAC Addresses (Instructor Version) 172 Topology 172 Addressing Table 172 Objectives 172 Background / Scenario 172 Required Resources 173 Instructions 173 Part 1: Configure Devices and Verify Connectivity 173 Part 2: Display, Describe, and Analyze Ethernet MAC Addresses 174 Reflection Questions 178 Device Config Switch S1 178 178 7.3.7 Labโ€”View the Switch MAC Address Table (Instructor Version) 181 Topology 181 Addressing Table 181 Objectives 181 Background / Scenario 181 Required Resources 182 Instructions 182 Part 1: Build and Configure the Network 182 Part 2: Examine the Switch MAC Address Table 183 Reflection Question 188 Device Configs 188 Switch S1 188 Switch S2 190 Chapter 8 Network Layer 193 Network Layer Characteristics 194 Network Layer Operations 194 Characteristics of IP 194 Check Your Understanding: IP Characteristics 195 IPv4 Packet 195 Fields of the IPv4 Packet 196 Check Your Understanding: IPv4 Packet Johnson_FM_i-xxxvi.indd 15 196 15/05/20 7:39 PM xvi Introduction to Networks Labs and Study Guide (CCNAv7) IPv6 Packet 197 Fields of the IPv6 Packet 197 Check Your Understanding: IPv6 Packet 198 How a Host Routes 198 Completion Exercise 198 Check Your Understanding: How a Host Routes 200 Introduction to Routing 200 Routing Table Entry: Matching 202 Check Your Understanding: Introduction to Routing 203 Chapter 9 Address Resolution 205 MAC and IP 206 Identify the MAC and IP Addresses 206 Check Your Understanding: MAC and IP 207 ARP 207 Completion Exercise 207 Check Your Understanding: ARP 209 IPv6 Neighbor Discovery Five ICMPv6 Messages 210 210 Check Your Understanding: Neighbor Discovery 210 9.1.3 Packet Tracerโ€”Identify MAC and IP Addresses (Instructor Version) 211 Objectives 211 Background 211 Instructions 211 Part 1: Gather PDU Information for Local Network Communication 211 Part 2: Gather PDU Information for Remote Network Communication 212 Reflection Questions 213 Suggested Scoring Rubric 215 9.2.9 Packet Tracerโ€”Examine the ARP Table (Instructor Version) 216 Addressing Table 216 Objectives 216 Background 216 Instructions 216 Part 1: Examine an ARP Request 216 Part 2: Examine a Switch MAC Address Table 218 Part 3: Examine the ARP Process in Remote Communications 219 9.3.4 Packet Tracerโ€”IPv6 Neighbor Discovery (Instructor Version) 221 Addressing Table 221 Objectives 221 Background 221 Instructions 221 Johnson_FM_i-xxxvi.indd 16 15/05/20 7:39 PM Contents xvii Part 1: IPv6 Neighbor Discovery Local Network 221 Part 2: IPv6 Neighbor Discovery Remote Network 224 Reflection Questions 227 Chapter 10 Basic Router Configuration 229 Configure Initial Router Settings 230 Basic Router Configuration Exercise 230 Configure Initial Settings Exercise Configure Interfaces 231 232 Configure Router Interfaces Exercise 232 Packet Tracer Exercise 10-1: Basic Router Configuration 234 Configure the Default Gateway 234 Command Reference 235 10.1.4 Packet Tracerโ€”Configure Initial Router ยญSettings (Instructor Version) 236 Objectives 236 Background 236 Instructions 236 Part 1: Verify the Default Router Configuration 236 Part 2: Configure and Verify the Initial Router Configuration 237 Part 3: Save the Running Configuration File 239 10.3.4 Packet Tracerโ€”Connect a Router to a LAN (Instructor Version) 241 Addressing Table 241 Objectives 241 Background 241 Part 1: Display Router Information 242 Part 2: Configure Router Interfaces 244 Part 3: Verify the Configuration 245 10.3.5 Packet Tracerโ€”Troubleshoot Default ยญGateway Issues (Instructor Version) 247 Addressing Table 247 Objectives 247 Background 247 Instructions 248 Part 1: Verify Network Documentation and Isolate Problems 248 Part 2: Implement, Verify, and Document Solutions 249 10.4.3 Packet Tracerโ€”Basic Device Configuration (Instructor Version) 250 Topology 250 Addressing Table 250 Objectives 250 Scenario 250 Requirements Johnson_FM_i-xxxvi.indd 17 251 15/05/20 7:39 PM xviii Introduction to Networks Labs and Study Guide (CCNAv7) 10.4.4 Labโ€”Build a Switch and Router Network (Instructor Version) 252 Topology 252 Addressing Table 252 Objectives 252 Background / Scenario 252 Required Resources 253 Instructions 254 Part 1: Set Up Topology and Initialize Devices 254 Part 2: Configure Devices and Verify Connectivity 254 Part 3: Display Device Information 257 Reflection Questions 261 Router Interface Summary Table 261 Device Configs 262 Chapter 11 Router R1 262 Switch S1 264 IPv4 Addressing 269 IPv4 Address Structure 270 Network and Host Portions 270 IPv4 Subnet Mask 270 The Prefix Length 271 Determining the Network: Logical AND 271 ANDing to Determine the Network Address 272 Activity: ANDing to Determine the Network Address 272 Check Your Understanding: IPv4 Address Structure 273 IPv4 Unicast, Broadcast, and Multicast 274 Types of IPv4 Addresses 274 Public and Private Addresses 274 Special Use IPv4 Addresses 274 Legacy Classful Addressing 275 Assignment of IP Addresses 275 Check Your Understanding: Types of IPv4 Addresses 276 Network Segmentation 276 Broadcast Domains and Segmentation 276 Problems with Large Broadcast Domains Reasons for Segmenting Networks 276 277 Check Your Understanding: Network Segmentation 277 Subnet an IPv4 Network 277 Subnetting in Four Steps 278 Subnetting Example 278 Johnson_FM_i-xxxvi.indd 18 Subnetting Scenario 1 280 Subnetting Scenario 2 280 Subnetting Scenario 3 280 15/05/20 7:39 PM Contents xix VLSM Addressing Schemes 281 VLSM Review 281 VLSM Addressing Design Exercises 283 11.5.5 Packet Tracerโ€”Subnet an IPv4 Network (Instructor Version) 288 Addressing Table 288 Objectives 288 Background / Scenario 288 Instructions 289 Part 1: Subnet the Assigned Network 289 Part 2: Configure the Devices 292 Part 3: Test and Troubleshoot the Network 293 Device Configs 293 CustomerRouter 293 LAN-A 294 LAN-B 294 PC-A 294 PC-B 294 11.6.6 Labโ€”Calculate IPv4 Subnets (Instructor Version) 295 Objectives 295 Background / Scenario 295 Required Resources 295 Instructions 295 Problem 1 295 Problem 2 296 Problem 3 296 Problem 4 297 Problem 5 297 Problem 6 298 Reflection Question 298 11.7.5 Packet Tracerโ€”Subnetting Scenario (Instructor Version) 299 Addressing Table 299 Objectives 299 Scenario 299 Instructions 299 Part 1: Design an IP Addressing Scheme 299 Part 2: Assign IP Addresses to Network Devices and Verify Connectivity 301 Device Configs 302 R1 302 S3 302 PC4 Johnson_FM_i-xxxvi.indd 19 302 15/05/20 7:39 PM xx Introduction to Networks Labs and Study Guide (CCNAv7) 11.9.3 Packet Tracerโ€”VLSM Design and Implementation Practice (Instructor Version) 303 Topology 303 Addressing Table 303 Objectives 303 Background 303 Instructions 304 Part 1: Examine the Network Requirements 304 Part 2: Design the VLSM Addressing Scheme 305 Part 3: Assign IP Addresses to Devices and Verify Connectivity Instructor Notes: 305 306 Scenario 1 – Network Address: 10.11.48.0/24 306 Building 1 ASW3 307 307 Scenario 2 – Network Address: 172.31.103.0/24 307 Branch 1 308 Room-312 308 Scenario 3 – Network Address: 192.168.72.0/24 308 Remote-Site1 309 Sw-3 309 11.10.1 Packet Tracerโ€”Design and Implement a VLSM Addressing Scheme (Instructor Version) 310 Addressing Table 310 Objectives 310 Background / Scenario 310 Instructions 311 Requirements 311 Instructor Notes: 312 Scenario 1 – Network Address: 10.1.1.0/24 312 East 313 West 313 ES-1 313 ES-2 313 WS-1 314 WS-2 314 Scenario 2 – Network Address: 172.19.67.0/24 HQ 314 315 Remote 315 HQ-1 315 HQ-2 316 Remote-1 316 Remote-2 316 Scenario 3 – Network Address: 192.168.203.0/24 Johnson_FM_i-xxxvi.indd 20 316 15/05/20 7:39 PM Contents xxi Police 317 Schools 317 PD-1 318 PD-2 318 PS-101 318 PS-115 318 11.10.2 Labโ€”Design and Implement a VLSM Addressing Scheme (Instructor Version) 319 Topology 319 Objectives 319 Background / Scenario 319 Required Resources 320 Instructions 320 Part 1: Examine Network Requirements 320 Part 2: Design the VLSM Address Scheme 323 Part 3: Cable and Configure the IPv4 Network 324 Reflection Question 326 Router Interface Summary Table 326 Device Configs 326 Router BR1 (Final Configuration) 326 Router BR2 (Final Configuration) Chapter 12 IPv6 Addressing 328 331 IPv4 Issues 332 IPv4 and IPv6 Coexistence 332 Check Your Understanding: IPv4 Issues 332 IPv6 Address Representation 333 IPv6 Address Types 333 IPv6 Prefix Length 333 Types of IPv6 Addresses 334 IPv6 GUA 334 GUA and LLA Static Configuration 335 Static Configuration of Global Unicast Addressing 335 Static GUA Configuration on a Windows Host 336 Static Configuration of a Link-Local Unicast Address Dynamic Addressing for IPv6 GUAs RS and RA Messages 336 337 337 Method 1: SLAAC 338 Method 2: SLAAC and Stateless DHCPv6 338 Method 3: Stateful DHCPv6 339 EUI-64 Process 340 Randomly Generated Interface IDs 341 Check Your Understanding: Dynamic Addressing for IPv6 GUAs Johnson_FM_i-xxxvi.indd 21 341 15/05/20 7:39 PM xxii Introduction to Networks Labs and Study Guide (CCNAv7) Dynamic Addressing for IPv6 LLAs 342 IPv6 Multicast Addresses 342 Subnet an IPv6 Network 342 IPv6 Subnetting Example 343 IPv6 Subnetting Scenario 1 343 IPv6 Subnetting Scenario 2 344 IPv6 Subnetting Scenario 3 344 Check Your Understanding: Subnet an IPv6 Network 344 12.6.6 Packet Tracerโ€”Configure IPv6 Addressing (Instructor Version) 346 Addressing Table 346 Objectives 346 Background 346 Part 1: Configure IPv6 Addressing on the Router 347 Part 2: Configure IPv6 Addressing on the Servers 348 Part 3: Configure IPv6 Addressing on the Clients 348 Part 4: Test and Verify Network Connectivity 348 12.7.4 Labโ€”Identify IPv6 Addresses (Instructor Version) 350 Topology 350 Objectives 350 Background / Scenario 350 Required Resources 350 Instructions 350 Part 1: Practice with Different Types of IPv6 Addresses 350 Part 2: Examine a Host IPv6 Network Interface and Address 352 Reflection Questions 353 12.9.1 Packet Tracerโ€”Implement a Subnetted IPv6 Addressing Scheme (Instructor Version) 354 Addressing Table 354 Objectives 354 Background / Scenario 354 Instructions 354 Device Configuration 355 Router R1 355 Router R2 356 12.9.2 Labโ€”Configure IPv6 Addresses on Network Devices (Instructor Version) 357 Topology 357 Addressing Table 357 Objectives 357 Background / Scenario 357 Required Resources 358 Instructions 358 Part 1: Cable the Network and Configure Basic Router and Switch Settings 358 Johnson_FM_i-xxxvi.indd 22 15/05/20 7:39 PM Contents Part 2: Configure IPv6 Addresses Manually xxiii 359 Part 3: Verify End-to-End Connectivity 362 Reflection Questions 362 Router Interface Summary Table 362 Device Configs 363 Router R1 (After part 1 of this lab) 363 Switch S1 (After part 1 of this lab) 365 Chapter 13 Router R1 (Final) 367 Switch S1 (Final) 369 ICMP 373 ICMP Messages 374 Host Reachability 374 Destination or Service Unreachable 374 Time Exceeded 375 ICMPv6 Messages 375 Check Your Understanding: ICMP Messages 377 Ping and Traceroute Tests 378 Pingโ€”Test Connectivity 378 Tracerouteโ€”Test the Path 378 Command Reference 379 13.2.6 Packet Tracerโ€”Verify IPv4 and IPv6 Addressing (Instructor Version) 379 Addressing Table 379 Objectives 380 Background 380 Part 1: Complete the Addressing Table Documentation Part 2: Test Connectivity Using Ping 380 381 Part 3: Discover the Path by Tracing the Route 381 13.2.7 Packet Tracerโ€”Use Ping and Traceroute to Test Network Connectivity (Instructor Version) 383 Addressing Table 383 Objectives 383 Scenario 383 Instructions 384 Part 1: Test and Restore IPv4 Connectivity 384 Part 2: Test and Restore IPv6 Connectivity 386 13.3.1 Packet Tracerโ€”Use ICMP to Test and Correct Network Connectivity (Instructor Version) 388 Addressing Table 388 Objectives 388 Background 389 Instructions 389 Johnson_FM_i-xxxvi.indd 23 15/05/20 7:39 PM xxiv Introduction to Networks Labs and Study Guide (CCNAv7) 13.3.2 Labโ€”Use Ping and Traceroute to Test Network Connectivity (Instructor Version) 390 Topology 390 Addressing Table 390 Objectives 391 Background / Scenario 391 Required Resources 392 Instructions 392 Part 1: Build and Configure the Network 392 Part 2: Use Ping Command for Basic cork Testing 394 Part 3: Use Tracert and Traceroute Commands for Basic Network Testing 399 Part 4: Troubleshoot the Topology 401 Reflection Questions 403 Router Interface Summary Table 404 Device Configs 404 Chapter 14 Router R1 404 Router ISP 406 Switch S1 408 Transport Layer 411 Transportation of Data 412 Transportation Layer Responsibilities 412 Transmission Control Protocol (TCP) 412 User Datagram Protocol (UDP) 412 The Right Transport Layer Protocol for the Right Application 412 Check Your Understanding: Transportation of Data 413 TCP Overview 414 TCP Features 414 TCP Header 415 TCP Header Fields 415 Applications That Use TCP 416 Check Your Understanding: TCP Overview 417 UDP Overview 417 UDP Features 417 UDP Header 417 Applications That Use UDP 418 Check Your Understanding: UDP Overview 419 Compare TCP and UDP 419 Port Numbers 420 Socket Pairs 420 Port Number Groups 420 Check Your Understanding: Port Numbers Johnson_FM_i-xxxvi.indd 24 421 15/05/20 7:39 PM Contents xxv TCP Communication Process 422 TCP Server Processes 422 TCP Connection Establishment 422 Session Termination 423 Control Bits Field 424 Check Your Understanding: TCP Communication Process 425 Reliability and Flow Control 425 TCP Reliabilityโ€”Guaranteed and Ordered Delivery TCP Reliabilityโ€”Data Loss and Retransmission 425 426 TCP Flow Controlโ€”Window Size and Acknowledgments 426 TCP Flow Controlโ€”Maximum Segment Size (MSS) TCP Flow Controlโ€”Congestion Avoidance 426 427 Check Your Understanding: Reliability and Flow Control 427 UDP Communication 428 UDP Datagram Reassembly 428 UDP Client Processes 428 Check Your Understanding: UDP Communication Command Reference 428 430 14.8.1 Packet Tracerโ€”TCP and UDP Communications (Instructor Version) 430 Objectives 430 Background 430 Instructions 431 Part 1: Generate Network Traffic in Simulation Mode and View Multiplexing 431 Part 2: Examine Functionality of the TCP and UDP Protocols 432 Chapter 15 Application Layer 439 Application, Presentation, and Session 440 Application Layer 440 Presentation and Session Layer 440 TCP/IP Application Layer Protocols 440 Check Your Understanding: Application, Session, Presentation 441 Peer-to-Peer 442 Check Your Understanding: Peer-to-Peer 443 Web and Email Protocols 443 Hypertext Transfer Protocol and Hypertext Markup Language 443 HTTP and HTTPS 444 Email Protocols 444 Check Your Understanding: Web and Email Protocols 444 IP Addressing Services 445 Domain Name Service 445 Johnson_FM_i-xxxvi.indd 25 15/05/20 7:39 PM xxvi Introduction to Networks Labs and Study Guide (CCNAv7) DNS Message Format DNS Hierarchy 445 446 The nslookup Command 446 Dynamic Host Configuration Protocol 447 DHCP Operation 448 Check Your Understanding: IP Addressing Services 449 File Sharing Services 449 File Transfer Protocol 449 Server Message Block 450 Check Your Understanding: File Sharing Services 451 Command Reference 452 15.4.8 Labโ€”Observe DNS Resolution (Instructor Version) 452 Objectives 452 Background / Scenario 452 Required Resources 452 Part 1: Observe the DNS Conversion of a URL to an IP Address 453 Part 2: Observe DNS Lookup Using the nslookup Command on a Website 455 Part 3: Observe DNS Lookup Using the nslookup Command on Mail Servers 457 Reflection Question 457 Chapter 16 Network Security Fundamentals 459 Security Threats and Vulnerabilities 460 Types of Threats 460 Types of Vulnerabilities Physical Security 460 461 Network Attacks 461 Types of Malware 461 Reconnaissance Attacks Access Attacks 462 462 Denial of Service Attacks 462 Check Your Understanding: Network Attacks 462 Network Attack Mitigation 464 Matching Exercise: Network Attack Mitigation 464 Check Your Understanding: Network Attack Mitigation Device Security 465 465 Passwords 466 Additional Password Security 466 Enable SSH 466 Packet Tracer Exercise 16-1: SSH Configuration and Verification 467 Command Reference Johnson_FM_i-xxxvi.indd 26 468 15/05/20 7:39 PM Contents 16.2.6 Labโ€”Research Network Security Threats (Instructor Version) xxvii 468 Objectives 468 Background / Scenario 469 Required Resources 469 Instructions 469 Part 1: Exploring the SANS Website 469 Part 2: Identify Recent Network Security Threats 470 Part 3: Detail a Specific Network Security Attack 471 Reflection Questions 472 16.4.6 Packet Tracerโ€”Configure Secure Passwords and SSH (Instructor Version) 473 Addressing Table 473 Scenario 473 Instructions 473 16.4.7 Labโ€”Configure Network Devices with SSH (Instructor Version) 476 Topology 476 Addressing Table 476 Objectives 476 Background / Scenario 476 Required Resources 477 Instructions 477 Part 1: Configure Basic Device Settings 477 Part 2: Configure the Router for SSH Access 478 Part 3: Configure the Switch for SSH Access 479 Part 4: SSH from the CLI on the Switch 481 Reflection Question 482 Router Interface Summary Table 482 Device Configs – Final 483 Router R1 483 Switch S1 484 16.5.1 Packet Tracerโ€”Secure Network Devices (Instructor Version) 488 Addressing Table 488 Requirements 488 Instructions 488 Answer Scripts RTR-A 489 SW-1 490 489 16.5.1 Labโ€”Secure Network Devices (Instructor Version) 491 Topology 491 Addressing Table 491 Objectives 491 Background / Scenario 491 Required Resources 492 Johnson_FM_i-xxxvi.indd 27 15/05/20 7:39 PM xxviii Introduction to Networks Labs and Study Guide (CCNAv7) Instructions 492 Part 1: Configure Basic Device Settings 492 Part 2: Configure Basic Security Measures on the Router 493 Part 3: Configure Security Measures 493 Part 4: Configure Basic Security Measures on the Switch 495 Reflection Questions 497 Router Interface Summary Table 498 Device Configs – Final 498 Chapter 17 Router R1 498 Switch S1 501 Build a Small Network 505 Devices in a Small Network 506 Small Network Topologies 506 Device Selection for a Small Network 506 IP Addressing for a Small Network 507 Matching Exercise: Devices in a Small Network 507 Check Your Understanding: Devices in a Small Network 508 Small Network Applications and Protocols 508 Common Applications 509 Common Protocols 509 Check Your Understanding: Small Network Applications and Protocols 510 Scale to Larger Networks 510 Check Your Understanding: Scale to Larger Networks Verify Connectivity 511 511 Verify Connectivity with Ping 512 Verify Connectivity with Traceroute 513 Extended Traceroute 513 Network Baseline 513 Host and IOS Commands 514 IP Configuration on a Windows Host 514 IP Configuration on a Linux Host 515 IP Configuration on a macOS Host 515 The arp Command show Commands 516 516 Matching Exercise: show Commands Troubleshooting Methodologies 517 518 Basic Troubleshooting Approaches 518 Check Your Understanding: Troubleshooting Methodologies 518 Troubleshooting Scenarios 519 Packet Tracer Exercise 17-1: Troubleshooting Scenario Command Reference Johnson_FM_i-xxxvi.indd 28 519 520 15/05/20 7:39 PM Contents xxix 17.4.6 Labโ€”Test Network Latency with Ping and Traceroute (Instructor Version) 521 Topology 521 Objectives 521 Background / Scenario 521 Required Resources 521 Instructions 522 Part 1: Use Ping to Document Network Latency 522 Part 2: Use Traceroute to Document Network Latency 524 Part 3: Extended Traceroute 526 Reflection Questions 527 17.5.9 Packet Tracerโ€”Interpret show Command Output (Instructor Version) 528 Objectives 528 Background 528 Instructions 528 Reflection Questions 528 17.7.6 Labโ€”Troubleshoot Connectivity Issues (Instructor Version) 530 Topology 530 Addressing Table 530 Objectives 530 Background / Scenario 530 Required Resources 531 Troubleshooting Configuration Part 1: Identify the Problem 531 533 Part 2: Implement Network Changes 533 Part 3: Verify Full Functionality 533 Part 4: Document Findings and Configuration Changes 534 Reflection Question 534 Router Interface Summary Table 534 Device Configs – Final 535 Router R1 535 Switch S1 536 Router ISP 539 17.7.7 Packet Tracerโ€”Troubleshoot Connectivity Issues (Instructor Version) 541 Addressing Table 541 Objectives 541 Background / Scenario 541 Instructions 542 17.8.1 Labโ€”Design and Build a Small Network (Instructor Version) 547 Objectives 547 Background /Scenario Johnson_FM_i-xxxvi.indd 29 547 15/05/20 7:39 PM xxx Introduction to Networks Labs and Study Guide (CCNAv7) Required Resources 547 Reflection 547 17.8.2 Packet Tracerโ€”Skills Integration Challenge (Instructor Version) 553 Addressing Table 553 Background / Scenario 554 Instructions 554 Running Scripts 555 R1 Configuration 555 S1 Configuration 556 S2 Configuration 557 S3 Configuration 558 17.8.3 Packet Tracerโ€”Troubleshooting Challenge (Instructor Version) 559 Addressing Table 559 Objectives 560 Background / Scenario 560 Instructions 560 Correct Device Configs 560 R1 Configuration 560 S1 Configuration 560 S2 Configuration 560 S3 Configuration 561 IT PC Configuration 561 Marketing PC Configuration 561 R&D PC Configuration 561 Johnson_FM_i-xxxvi.indd 30 15/05/20 7:39 PM xxxi Command Syntax Conventions The conventions used to present command syntax in this book are the same conventions used in the IOS Command Reference. The Command Reference describes these conventions as follows: โ– โ–  Johnson_FM_i-xxxvi.indd 31 Boldface indicates commands and keywords that are entered literally as shown. In actual configuration examples and output (not general command syntax), boldface indicates commands that are manually input by the user (such as a show command). โ– โ–  Italic indicates arguments for which you supply actual values. โ– โ–  Vertical bars (|) separate alternative, mutually exclusive elements. โ– โ–  Square brackets ([ ]) indicate an optional element. โ– โ–  Braces ({ }) indicate a required choice. โ– โ–  Braces within brackets ([{ }]) indicate a required choice within an optional element. 15/05/20 7:39 PM xxxii Introduction to Networks Labs and Study Guide (CCNAv7) Introduction This book supports instructors and students in Cisco Networking Academy, an IT skills and career building program for learning institutions and individuals worldwide. Cisco Networking Academy provides a variety of curricula choices including the very popular CCNA curriculum. It includes three courses oriented around the topics of Cisco Certified Network Associate (CCNA) certifications. Introduction to Networks Labs and Study Guide is a supplement to your classroom and laboratory experience with the Cisco Networking Academy. To be successful on the exam and achieve your CCNA certification, you should do everything in your power to arm yourself with a variety of tools and training materials to support your learning efforts. This book provides just such a collection of tools. Used to its fullest extent, it will help you gain the knowledge as well as practice the skills associated with the content area of the Introduction to Networks v7 course. Specifically, this book will help you work on these main areas: โ– โ–  โ– โ–  โ– โ–  โ– โ–  โ– โ–  โ– โ–  โ– โ–  โ– โ–  Understand advances in modern network technologies. Implement initial settings, including passwords, IP addressing, and default gateway parameters on network switches and end devices. Understand how network protocols enable devices to access local and remote network resources. Understand how physical layer protocols, services, and network media support communications across data networks. Convert between decimal, binary, and hexadecimal systems. Understand how media access control in the data link layer supports communication across networks. Understand how Ethernet operates in a switched network. Understand how routers use network layer protocols and services to enable end-to-end connectivity. โ– โ–  Understand how ARP and ND enable communication on a network. โ– โ–  Implement initial settings on a router and end devices. โ– โ–  Calculate an IPv4 subnetting scheme to efficiently segment a network. โ– โ–  Implement an IPv6 addressing scheme. โ– โ–  Use various tools to test network connectivity. โ– โ–  โ– โ–  โ– โ–  โ– โ–  Compare the operations of transport layer protocols in supporting end-to-end communication. Understand the operation of application layer protocols in providing support to end-user applications. Configure switches and routers with device-hardening features to enhance security. Implement a network design for a small network to include a router, a switch, and end devices. Labs and Study Guides similar to this one are also available for the other two courses: Switching, Routing, and Wireless Essentials Labs and Study Guide and Enterprise Networking, Security, and Automation Labs and Study Guide. Johnson_FM_i-xxxvi.indd 32 15/05/20 7:39 PM Introduction xxxiii Who Should Read This Book This bookโ€™s main audience is anyone taking the Introduction to Networks course of the Cisco Networking Academy curriculum. Many Academies use this Labs and Study Guide as a required tool in the course, whereas other Academies recommend the Labs and Study Guide as an additional resource to prepare for class exams and the CCNA certification. The secondary audiences for this book is people taking CCNA-related classes from professional training organizations. This book can also be used for college- and university-level networking courses, as well as anyone wanting to gain a detailed understanding of routing. However, the reader should know that the content of this book tightly aligns with the Cisco Networking Academy course. It may not be possible to complete some of the โ€œStudy Guideโ€ sections and labs without having access to the online course. Fortunately, you can purchase the Introduction to Networks v7.0 Companion Guide (ISBN: 9780136633662). Goals and Methods The most important goal of this book is to help you pass the 200-301 Cisco Certified Network Associate exam, which is associated with the Cisco Certified Network Associate (CCNA) certification. Passing the CCNA exam shows that you have the knowledge and skills required to manage a small enterprise network. You can view the detailed exam topics online at http:// learningnetwork.cisco.com. They are divided into six broad categories: โ– โ–  Network Fundamentals โ– โ–  Network Access โ– โ–  IP Connectivity โ– โ–  IP Services โ– โ–  Security Fundamentals โ– โ–  Automation and Programmability The Introduction to Networks v7 course covers introductory material related to the first five bullets. The next two courses, Switching, Routing, and Wireless Essentials v7 and Enterprise Networking, Security, and Automation v7, cover the material in more detail. Each chapter of this book is divided into a โ€œStudy Guideโ€ section followed by a โ€œLabs and Activitiesโ€ section. The โ€œStudy Guideโ€ section offers exercises that help you learn the concepts, configurations, and troubleshooting skills crucial to your success as a CCNA exam candidate. Each chapter is slightly different and includes some or all of the following types of exercises: โ– โ–  Vocabulary matching exercises โ– โ–  Concept question exercises โ– โ–  Skill-building activities and scenarios โ– โ–  Configuration scenarios โ– โ–  Packet Tracer exercises โ– โ–  Troubleshooting scenarios The โ€œLabs and Activitiesโ€ sections include all the online course labs and Packet Tracer activity instructions. In some chapters, this section begins with a Command Reference that you will complete to show that you understand all the commands introduced in the chapter. Johnson_FM_i-xxxvi.indd 33 15/05/20 7:39 PM xxxiv Introduction to Networks Labs and Study Guide (CCNAv7) Packet Tracer and Companion Website This book includes the instructions for all the Packet Tracer activities in the online course. You need to be enrolled in the Introduction to Networks v7 course to access these Packet Tracer files. Four Packet Tracer activities have been created exclusively for this book. You can access these unique Packet Tracer files at this bookโ€™s companion website. To get your copy of Packet Tracer software and the four unique files for this book, please go to the companion website for instructions. To access this companion website, follow these steps: Step 1. Go to www.ciscopress.com/register and log in or create a new account. Step 2. Enter the ISBN 9780136634454. Step 3. Answer the challenge question as proof of purchase. Step 4. Click on the Access Bonus Content link in the Registered Products section of your account page to be taken to the page where your downloadable content is available. How This Book Is Organized This book corresponds closely to the Cisco Networking Academy Introduction to Networks v7 course and is divided into 17 chapters: โ– โ–  โ– โ–  โ– โ–  โ– โ–  โ– โ–  โ– โ–  โ– โ–  Johnson_FM_i-xxxvi.indd 34 Chapter 1, โ€œNetworking Todayโ€: This chapter introduces the concept of a network and provides an overview of the different types of networks encountered. It examines how networks impact the way we work, learn, and play. This chapter also examines recent trends in networks, such as video, cloud computing, and BYOD and how to help ensure robust, reliable, secure networks to support these trends. Chapter 2, โ€œBasic Switch and End Device Configurationโ€: This chapter introduces the operating system used with most Cisco devices: Cisco IOS. The basic purpose and functions of IOS are described, as are methods to access IOS. The chapter also describes how to maneuver through the IOS command-line interface as well as basic IOS device configuration. Chapter 3, โ€œProtocols and Modelsโ€: This chapter examines the importance of rules or protocols for network communication. It explores the OSI reference model and the TCP/IP communication suite and examines how these models provide the necessary protocols to allow communication to occur on a modern converged network. Chapter 4, โ€œPhysical Layerโ€: This chapter introduces the lowest layer of the OSI model: the physical layer. This chapter explains the transmission of bits over the physical medium. Chapter 5, โ€œNumber Systemsโ€: This chapter explains how to convert between decimal, binary, and hexadecimal number systems. Understanding these number systems is essential to understanding IPv4, IPv6, and Ethernet MAC addressing. Chapter 6, โ€œData Link Layerโ€: This chapter discusses how the data link layer prepares network layer packets for transmission, controls access to the physical media, and transports data across various media. This chapter includes a description of the encapsulation protocols and processes that occur as data travels across the LAN and the WAN. Chapter 7, โ€œEthernet Switchingโ€: This chapter examines the functionality of the Ethernet LAN protocols. It explores how Ethernet functions, including how devices use Ethernet MAC addresses to communicate in a multiaccess network. The chapter discusses how Ethernet switches build MAC address tables and forward Ethernet frames. 15/05/20 7:40 PM Introduction xxxv โ– โ–  โ– โ–  โ– โ–  โ– โ–  โ– โ–  โ– โ–  โ– โ–  โ– โ–  โ– โ–  โ– โ–  Johnson_FM_i-xxxvi.indd 35 Chapter 8, โ€œNetwork Layerโ€: This chapter introduces the function of the network layerโ€”routingโ€”and the basic device that performs this functionโ€”the router. It presents important routing concepts related to addressing, path determination, and data packets for both IPv4 and IPv6. The chapter also introduces how routers perform packet forwarding, static and dynamic routing, and the IP routing table. Chapter 9, โ€œAddress Resolutionโ€: This chapter discusses how host computers and other end devices determine the Ethernet MAC address for a known IPv4 or IPv6 address. This chapter examines the ARP protocol for IPv4 address resolution and the Neighbor Discovery Protocol for IPv6. Chapter 10, โ€œBasic Router Configurationโ€: This chapter explains how to configure a Cisco router, including IPv4 and IPv6 addressing on an interface. Chapter 11, โ€œIPv4 Addressingโ€: This chapter focuses on IPv4 network addressing, including the types of addresses and address assignment. It describes how to use subnet masks to determine the number of subnetworks and hosts in a network. It examines how to improve network performance by optimally dividing the IPv4 address space based on network requirements. It explores the calculation of valid host addresses and the determination of both subnet and broadcast addresses. Chapter 12, โ€œIPv6 Addressingโ€: This chapter focuses on IPv6 network addressing, including IPv6 address representation, types of addresses, and the structure of different types of IPv6 address. The chapter introduces the different methods that an end device can receive an IPv6 address automatically. Chapter 13, โ€œICMPโ€: This chapter introduces Internet Control Message Protocol (ICMP) tools, such as ping and trace. Chapter 14, โ€œTransport Layerโ€: This chapter introduces Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) and examines how each of these protocols transports information across the network. It explores how TCP uses segmentation, the three-way handshake, and expectational acknowledgments to ensure reliable delivery of data. It also examines the best-effort delivery mechanism provided by UDP and describes when its use would be preferred over the use of TCP. Chapter 15, โ€œApplication Layerโ€: This chapter introduces some protocols of the TCP/IP application layer, which also relates to the top three layers of the OSI model. The chapter focuses on the role of the application layer and how the applications, services, and protocols in the application layer make robust communication across data networks possible. This will be demonstrated by examining some key protocols and services, including HTTP, HTTPS, DNS, DHCP, SMTP/POP, and FTP. Chapter 16, โ€œNetwork Security Fundamentalsโ€: This chapter introduces network security threats and vulnerabilities. Various network attacks and mitigation techniques are discussed, along with how to secure network devices. Chapter 17, โ€œBuild a Small Networkโ€: This chapter reexamines the various components in a small network and describes how they work together to allow network growth. It examines network configuration and troubleshooting issues, along with different troubleshooting methodologies. 15/05/20 7:40 PM Johnson_FM_i-xxxvi.indd 36 15/05/20 7:40 PM CHAPTER 1 Networking Today The โ€œStudy Guideโ€ portion of this chapter uses a variety of exercises to test your knowledge of the advances in modern network technologies. The โ€œLabs and Activitiesโ€ portion of this chapter includes all the online curriculum research lab and Packet Tracer activity instructions. As you work through this chapter, use Chapter 1 in Introduction to Networks v7 Companion Guide or use the corresponding Module 1 in the Introduction to Networks online curriculum for assistance. 9780136634454.indb 1 12/05/20 2:00 pm 2 Introduction to Networks Labs and Study Guide (CCNAv7) Study Guide Networks Affect Our Lives In todayโ€™s world, through the use of networks, we are connected like never before. People with ideas can communicate instantly with others to make those ideas reality. Advancements in networking technologies are perhaps the most significant changes in the world today. They are helping to create a world in which national borders, geographic distances, and physical limitations become less relevant, presenting ever-diminishing obstacles. The cloud lets us store documents and pictures and access them anywhere, anytime. So, whether we are on a train, in a park, or standing on top of a mountain, we can seamlessly access our data and applications on a variety of devices. Network Components If you want to be a part of a global online community, your computer, tablet, or smartphone must first be connected to a network. That network must be connected to the internet. All computers that are connected to a network and participate directly in network communication are classified as hosts. Hosts can be called end devices. Some hosts are also called clients. End Devices, Intermediary Devices, and Media Servers are computers with software that allow them to provide information, like email or web pages, to other end devices on the network. Each service requires separate server software. Client and server software usually run on separate computers, but it is also possible for one computer to be used for both roles at the same time. In Table 1-1, list the advantages and disadvantages of peer-to-peer networking. Table 1-1 Advantages and Disadvantages of Peer-to-Peer Networking Advantages Disadvantages Easy to set up No centralized administration Less complex Not as secure Lower cost because network devices and dedicated servers may not be required Not scalable Can be used for simple tasks such as transferring files and sharing printers All devices may act as both clients and servers which can slow their performance The network devices that people are most familiar with are end devices. An end device is either the source or destination of a message transmitted over the network. When an end device initiates communication, it uses the address of the destination end device to specify where to deliver the message. 9780136634454.indb 2 12/05/20 2:00 pm Chapter 1: Networking Today 3 Intermediary devices connect the individual end devices to the network. They can connect multiple individual networks to form an internetwork. Intermediary devices use the destination end device address and information about the network interconnections to determine the path that messages should take through the network. List three examples of intermediary network devices: Some examples of correct answers include: Switches Wireless APs Routers Multilayer switches Firewalls List at least three of the main functions of intermediary devices: Regenerate and retransmit data signals Maintain information about what pathways exist through the network and internetwork Notify other devices of errors and communication failures Direct data along alternate pathways when there is a link failure Classify and direct messages according to quality of service (QoS) priorities Permit or deny the flow of data, based on security settings Communication transmits across a network on media. The media provides the channel over which the message travels from source to destination. List the three types of media used to interconnect devices: Metallic wires within cables Glass or plastic fibers (fiber-optic cable) Wireless transmission Check Your Understanding: Network Components Check your understanding of network components by choosing the BEST answer to each of the following questions. 1. Which of the following is the name for all computers connected to a network that participate directly in network communication? a. servers b. intermediary devices c. hosts d. media 9780136634454.indb 3 12/05/20 2:00 pm 4 Introduction to Networks Labs and Study Guide (CCNAv7) 2. When data is encoded as pulses of light, which media is being used to transmit the data? a. wireless b. fiber-optic cable c. copper cable 3. Which two devices are intermediary devices? (Choose two.) a. hosts b. routers c. servers d. switches Answers: 1 C; 2 B; 3 B, D Network Representations and Topologies Diagrams of networks often use symbols to represent the different devices and connections that make up a network. Classify and Identify Network Components In Figure 1-1, label the three major classifications of network components. Then, underneath each icon, label the network component. Figure 1-1 9780136634454.indb 4 Common Network Component Icons 12/05/20 2:00 pm Chapter 1: Networking Today Figure 1-1a 5 Common Network Component Icons End Devices Desktop Computer Laptop Printer IP Phone Wireless Tablet TelePresence Endpoint Wireless Router LAN Switch Router Intermediary Devices Multilayer Switch Firewall Appliance Wireless Media Network Media LAN Media WAN Media Topology Diagrams There are two types of topology diagrams: โ–  โ–  A physical topology diagram identifies the physical location of intermediary devices, configured ports, and cable installation. A logical topology diagram identifies devices, ports, and IP addressing schemes. Check Your Understanding: Network Representations and Topologies Check your understanding of network representations and topologies by choosing the BEST answer to each of the following questions. 1. Which connection physically connects an end device to the network? a. port b. NIC c. interface 2. Which connections are specialized ports on a networking device that connect to individual networks? a. ports b. NICs c. interfaces 9780136634454.indb 5 12/05/20 2:00 pm 6 Introduction to Networks Labs and Study Guide (CCNAv7) 3. Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used? a. physical topology b. logical topology 4. Which type of network topology lets you see the actual locations of intermediary devices and cable installation? a. physical topology b. logical topology Answers: 1 B; 2 C; 3 B; 4 A Common Types of Networks Networks come in all sizes. They range from simple networks consisting of two computers to networks connecting millions of devices: โ– โ–  โ– โ–  โ– โ–  โ– โ–  Small home networks connect a few computers to each other and to the internet. A small office and home office (SOHO) network allows computers in a home office or a remote office to connect to a corporate network or access centralized shared resources. Medium to large networks, such as those used by corporations and schools, can have many locations with hundreds or thousands of interconnected hosts. The internet is a network of networks that connects hundreds of millions of computers worldwide. Compare LANs and WANs In Table 1-2, indicate whether each feature is a LAN feature or a WAN feature by marking the appropriate column. Table 1-2 LANs LAN and WAN Features WANs X Interconnect end devices in a limited area such as a home, a school, an office building, or a campus X X X 9780136634454.indb 6 LAN or WAN Feature Typically provide slower-speed links between networks Provide high-speed bandwidth to internal end devices and intermediary devices X Interconnect networks over wide geographic areas, such as between cities, states, provinces, countries, or continents X Usually administered by multiple service providers Usually administered by a single organization or individual 12/05/20 2:00 pm Chapter 1: Networking Today 7 Check Your Understanding: Common Types of Networks Check your understanding of common types of networks by choosing the BEST answer to each of the following questions. 1. Which network infrastructure provides access to users and end devices in a small geographic area and is typically a network in a department in an enterprise, a home, or a small business? a. extranet b. intranet c. LAN d. WAN 2. Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organizationโ€™s data? a. extranet b. intranet c. LAN d. WAN 3. Which network infrastructure provides access to other networks over a large geographic area and is often owned and managed by a telecommunications service provider? a. extranet b. intranet c. LAN d. WAN Answers: 1 C; 2 A; 3 D Internet Connections Home users, remote workers, and small offices typically require ISP connections to access the internet. Connection options vary greatly between ISPs and geographic locations. Popular choices include broadband cable, broadband digital subscriber line (DSL), wireless WANs, and mobile services. Vocabulary Exercise: Matching Match each definition with the appropriate term. This exercise is a one-to-one matching: Each definition has exactly one matching term. Definitions 9780136634454.indb 7 a. Similar to a LAN but wirelessly interconnects users and endpoints in a small geographic area. b. Requires a clear line of sight, installation costs can be high, and connections tend to be slower and less reliable than its terrestrial competition. 12/05/20 2:00 pm 8 Introduction to Networks Labs and Study Guide (CCNAv7) c. Also called a LAN adapter, it provides the physical connection to a network at the PC or other host device. d. Available from a provider to the customer premises over a dedicated copper or fiber connection providing bandwidth speeds of 10 Mbps to 10 Gbps. e. The availability of this type of internet access is a real benefit in areas that would otherwise have no internet connectivity at all or for those constantly on the go. f. Provide the interface between users and the underlying communication network. g. A network infrastructure that provides access to users and end devices in a small geographic area. h. Devices that interconnect end devices. i. Reserved circuits that connect geographically separated offices for private voice and/or data networking. In North America, circuits include T1 (1.54 Mbps) and T3 (44.7 Mbps); in other parts of the world, they are available in E1 (2 Mbps) and E3 (34 Mbps). j. A private connection of LANs and WANs that belongs to an organizationโ€”basically an internetwork that is usually only accessible from within the organization. k. An inexpensive, very low-bandwidth option to connect to an ISP that should be considered only as a backup to higher-speed connection options. l. Carries a data signal on the same coaxial media that delivers the television signal. It provides a high-bandwidth, always-on connection to the internet. m. Provides secure and safe access to individuals who work for different organizations but require access to the companyโ€™s data. n. A network infrastructure that is larger than a LAN but smaller than a WAN and is usually operated by a single organization. o. Provides the channel over which a message travels from source to destination. p. A network infrastructure that provides access to other networks over a wide geographic area. q. Provides a high-bandwidth, always-on connection that runs over a telephone line, with the line split into three channels. r. A network infrastructure designed to support file servers and provide data storage, retrieval, and replication. Terms 9780136634454.indb 8 q DSL j intranet o medium r storage-area network (SAN) n metropolitan-area network (MAN) e cellular c network interface card k dial-up telephone d Metro Ethernet l cable a wireless LAN (WLAN) g local-area network (LAN) i dedicated leased line f end devices b satellite h intermediary devices p wide-area network (WAN) m extranet 12/05/20 2:00 pm Chapter 1: Networking Today 9 Reliable Networks Networks support a wide range of applications and services and must operate over many different types of cables and devices that make up the physical infrastructure. As networks evolve, we are discovering that the underlying architectures need to address four basic characteristics to meet user expectations: โ– โ–  Fault tolerance โ– โ–  Scalability โ– โ–  Quality of service (QoS) โ– โ–  Security Classify the Requirements for a Reliable Network In Table 1-3, select the appropriate column to classify each of the requirements for a reliable network. Table 1-3 Reliable Network Requirements Requirement Characteristic Fault Tolerance Scalability Quality of Service Preventing unauthorized access to the management software that resides on network devices. X Common network standards allow hardware and software vendors to focus on product improvements and services. The fewest number of devices are impacted by a network outage. X X Networks can grow or expand with minimal impact on performance. X Protecting the information contained in packets as they are transmitted over the network. X Priority queues are implemented when demand for network bandwidth exceeds supply. Data can travel through more than one route for delivery from a remote source. The primary mechanism for managing congestion and ensuring reliable delivery of content. Includes the goals of confidentiality, integrity, and availability. 9780136634454.indb 9 Security X X X X 12/05/20 2:00 pm

Document Preview (45 of 597 Pages)

User generated content is uploaded by users for the purposes of learning and should be used following SchloarOn's honor code & terms of service.
You are viewing preview pages of the document. Purchase to get full access instantly.

Shop by Category See All


Shopping Cart (0)

Your bag is empty

Don't miss out on great deals! Start shopping or Sign in to view products added.

Shop What's New Sign in