Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Networking Essentials
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Networking Essentials

Networking Essentials

Companion Guide

Cisco Networking Academy Program

544 pages, parution le 21/05/2022

Résumé

Networking Essentials Companion Guide is the official supplemental textbook for the Networking Essentials course in the Cisco Networking Academy. Networking is at the heart of the digital transformation. The network is essential to many business functions today, including business-critical data and operations, cybersecurity, and so much more. A wide variety of career paths rely on the network, so it's important to understand what the network can do, how it operates, and how to protect it. This is a great course for developers, data scientists, cybersecurity specialists, and other professionals looking to broaden their networking domain knowledge. It's also an excellent launching point for students pursuing a wide range of career pathways-from cybersecurity to software development to business and more. The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time. The book's features help you focus on important concepts to succeed in this course: * Chapter objectives: Review core concepts by answering the focus questions listed at the beginning of each chapter. * Key terms: Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter. * Glossary: Consult the comprehensive Glossary with more than 250 terms. * Summary of Activities and Labs: Maximize your study time with this complete list of all associated practice exercises at the end of each chapter. * Check Your Understanding: Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.Introduction xxvii Chapter 1 Communications in a Connected World 1 Objectives 1 Key Terms 1 Introduction (1.0) 2 Network Types (1.1) 3 Everything Is Online (1.1.1) 3 Who Owns "The Internet"? (1.1.2) 3 Local Networks (1.1.3) 3 Mobile Devices (1.1.5) 7 Connected Home Devices (1.1.6) 10 Other Connected Devices (1.1.7) 12 Data Transmission (1.2) 15 Types of Personal Data (1.2.2) 15 Common Methods of Data Transmission (1.2.4) 16 Bandwidth and Throughput (1.3) 17 Bandwidth (1.3.1) 17 Throughput (1.3.3) 18 Clients and Servers (1.4) 19 Client and Server Roles (1.4.1) 19 Peer-to-Peer Networks (1.4.2) 20 Peer-to-Peer Applications (1.4.3) 21 Multiple Roles in the Network (1.4.4) 22 Network Components (1.5) 23 Network Infrastructure (1.5.2) 23 End Devices (1.5.3) 25 Summary (1.6) 26 Practice 27 Check Your Understanding 27 Chapter 2 Online Communications 31 Objectives 31 Key Terms 31 Introduction (2.0) 32 Wireless Networks (2.1) 32 Mobile Telephones (2.1.2) 32 Cell Phone Network (2.1.3) 32 Other Wireless Networks (2.1.5) 33 Local Network Connections (2.2) 34 LAN Components (2.2.2) 34 End Device Addressing (2.2.4) 39 Manual and Automatic Address Assignment (2.2.6) 40 Network Documentation (2.3) 41 Device Names and Address Planning (2.3.1) 41 Network Topologies and Representations (2.3.2) 42 Logical Network Information (2.3.4) 43 Summary (2.4) 45 Practice 46 Check Your Understanding Questions 46 Chapter 3 Explore Networks with Packet Tracer 49 Objectives 49 Key Terms 49 Introduction (3.0) 50 Packet Tracer Network Simulator (3.1) 50 Packet Tracer Installation (3.2) 50 The Packet Tracer User Interface (3.3) 51 Locate and Deploy Devices (3.3.2) 52 Packet Tracer Network Configuration (3.4) 53 GUI and CLI Configuration in Packet Tracer (3.4.2) 54 Summary (3.5) 59 Practice 61 Check Your Understanding Questions 61 Chapter 4 Build a Simple Network 67 Objectives 67 Key Terms 67 Introduction (4.0.1) 68 Network Media Types (4.1) 68 Three Media Types (4.1.2) 68 Common Network Cables (4.1.3) 69 Ethernet Cabling (4.2) 71 Twisted-Pair Cables (4.2.1) 71 Types of Twisted-Pair Cables (4.2.2) 72 Coaxial and Fiber-Optic Cabling (4.3) 75 Cable TV and Satellite Cables (4.3.1) 75 Fiber-Optic Cables (4.3.2) 76 Twisted-Pair Operation (4.4) 78 Twisted-Pair Wiring Schemes (4.4.1) 78 Twisted-Pair Transmit and Receive Pairs (4.4.2) 79 Verify Connectivity (4.5) 79 Using the ping Command (4.5.2) 80 The traceroute Command (4.5.3) 81 Summary (4.6) 83 Practice 85 Check Your Understanding Questions 85 Chapter 5 Communication Principles 89 Objectives 89 Key Terms 89 Introduction (5.0.1) 90 The Rules (5.1) 90 The Three Elements (5.1.1) 90 Communication Protocols (5.1.2) 91 Why Protocols Matter (5.1.3) 93 Communication Standards (5.2) 95 The Internet and Standards (5.2.2) 95 Network Standards Organizations (5.2.3) 95 Network Communication Models (5.3) 96 The Protocol Stack (5.3.3) 97 The TCP/IP Model (5.3.4) 98 The OSI Reference Model (5.3.5) 99 Upper and Lower Layers of the OSI Model (5.3.6) 100 OSI Model and TCP/IP Model Comparison (5.3.7) 101 Ethernet (5.4) 103 The Rise of Ethernet (5.4.1) 103 Ethernet Evolution (5.4.2) 104 The Ethernet MAC Address (5.4.4) 105 Summary (5.5) 107 Practice 108 Check Your Understanding Questions 108 Chapter 6 Network Design and the Access Layer 111 Objectives 111 Key Terms 111 Introduction (6.0.1) 112 Encapsulation and the Ethernet Frame (6.1) 112 Encapsulation (6.1.2) 112 Ethernet Frame (6.1.3) 114 Hierarchical Network Design (6.2) 115 Physical and Logical Addresses (6.2.2) 115 Hierarchical Analogy (6.2.5) 117 Benefits of a Hierarchical Design (6.2.7) 117 Access, Distribution, and Core (6.2.8) 119 The Access Layer (6.3) 120 Access Layer Devices (6.3.1) 121 Ethernet Hubs (6.3.2) 121 Ethernet Switches (6.3.4) 123 The MAC Address Table (6.3.6) 124 Broadcast Containment (6.4) 126 Ethernet Broadcasts in the Local Network (6.4.2) 126 Broadcast Domains (6.4.3) 127 Access Layer Communication (6.4.4) 128 ARP (6.4.6) 129 Summary (6.5) 131 Practice 133 Check Your Understanding Questions 133 Chapter 7 Routing Between Networks 137 Objectives 137 Key Terms 137 Introduction (7.0.1) 138 The Need for Routing (7.1) 138 Criteria for Dividing the Local Network (7.1.2) 138 When Routing Is Needed (7.1.3) 141 The Routing Table (7.2) 142 Path Selection (7.2.2) 142 Packet Forwarding (7.2.5) 143 Routing Table Entries (7.2.7) 145 The Default Gateway (7.2.8) 146 Create a LAN (7.3) 147 Local-Area Networks (7.3.1) 147 Local and Remote Network Segments (7.3.2) 148 Summary (7.4) 152 Practice 153 Check Your Understanding Questions 153 Chapter 8 The Internet Protocol 157 Objectives 157 Key Terms 157 Introduction (8.0.1) 158 Purpose of the IPv4 Address (8.1) 158 The IPv4 Address (8.1.1) 158 Binary Conversion of an IPv4 Address (8.2) 159 IPv4 Addressing (8.2.1) 159 Binary to Decimal (8.2.3) 160 The IPv4 Address Structure (8.3) 162 Networks and Hosts (8.3.2) 162 Logical AND (8.3.5) 163 Calculate Whether the Destination Is Local or Remote (8.3.6) 164 Calculate the Number of Hosts (8.3.7) 165 Classful IPv4 Addressing (8.4) 166 Classful and Classless Addressing (8.4.1) 166 Public and Private IPv4 Addresses (8.5) 168 Private IPv4 Addressing (8.5.1) 168 Assignment of IPv4 Addresses (8.5.2) 169 Unicast, Broadcast, and Multicast Addresses (8.6) 171 Unicast Transmission (8.6.2) 171 Broadcast Transmission (8.6.4) 172 Multicast Transmission (8.6.6) 173 Summary (8.7) 175 Practice 177 Check Your Understanding Questions 177 Chapter 9 Dynamic Addressing with DHCP 181 Objectives 181 Key Terms 181 Introduction (9.0.1) 182 Static and Dynamic Addressing (9.1) 182 Static IPv4 Address Assignment (9.1.1) 182 Dynamic IPv4 Address Assignment (9.1.2) 183 DHCP Servers (9.1.3) 184 DHCPv4 Configuration (9.2) 185 DHCPv4 Operation (9.2.2) 185 DHCP Service Configuration (9.2.4) 186 Summary (9.3) 188 Practice 189 Check Your Understanding Questions 189 Chapter 10 IPv4 and IPv6 Address Management 193 Objectives 193 Key Terms 193 Introduction (10.0.1) 194 Network Boundaries (10.1) 194 Routers as Gateways (10.1.2) 194 Routers as Boundaries Between Networks (10.1.3) 195 Network Address Translation (10.2) 196 NAT Operation (10.2.2) 196 IPv4 Issues (10.3) 198 Need for IPv6 (10.3.1) 198 IPv6 Address Size (10.3.2) 200 IPv4 and IPv6 Coexistence (10.3.4) 201 IPv6 Features (10.4) 203 IPv6 Autoconfiguration and Link-Local Addresses (10.4.3) 203 IPv6 Address Representation (10.4.5) 204 Summary (10.5) 206 Practice 207 Check Your Understanding Questions 208 Chapter 11 Transport Layer Services 211 Objectives 211 Key Terms 211 Introduction (11.0.1) 212 The Client/Server Relationship (11.1) 212 Client and Server Interaction (11.1.1) 212 Client Requests a Web Page (11.1.3) 213 URI, URN, and URL (11.1.4) 214 TCP and UDP (11.2) 215 Protocol Operations (11.2.1) 215 TCP and UDP (11.2.3) 216 TCP Reliability (11.2.4) 216 UDP Best Effort Delivery (11.2.5) 217 Port Numbers (11.3) 218 TCP and UDP Port Numbers (11.3.2) 218 Destination and Source Port Numbers (11.3.3) 220 Socket Pairs (11.3.4) 221 The netstat Command (11.3.5) 223 Summary (11.4) 224 Practice 225 Check Your Understanding Questions 225 Chapter 12 Application Layer Services 229 Objectives 229 Key Terms 229 Introduction (12.0.1) 230 Network Application Services (12.1) 230 Common Network Application Services (12.1.1) 230 Domain Name System (12.2) 231 Domain Name Translation (12.2.1) 231 DNS Servers (12.2.3) 232 Web Clients and Servers (12.3) 233 HTTP and HTML (12.3.2) 233 FTP Clients and Servers (12.4) 234 File Transfer Protocol (12.4.1) 235 FTP Client Software (12.4.3) 236 Virtual Terminals (12.5) 237 Telnet (12.5.2) 237 Security Issues with Telnet (12.5.3) 238 Email and Messaging (12.6) 239 Email Clients and Servers (12.6.1) 239 Email Protocols (12.6.2) 240 Text Messaging (12.6.3) 242 Internet Phone Calls (12.6.4) 243 Summary (12.7) 244 Practice 246 Check Your Understanding Questions 246 Chapter 13 Build a Home Network 249 Objectives 249 Key Terms 249 Introduction (13.0.1) 250 Home Network Basics (13.1) 250 Connecting Home Devices (13.1.1) 250 Components of a Home Network (13.1.2) 251 Typical Home Network Routers (13.1.3) 252 Network Technologies in the Home (13.2) 253 The Electromagnetic Spectrum (13.2.1) 253 LAN Wireless Frequencies (13.2.2) 254 Wired Network Technologies (13.2.3) 255 Wireless Standards (13.3) 257 Wi-Fi Networks (13.3.1) 257 Wireless Settings (13.3.2) 257 Wireless Traffic Controls (13.4) 259 Wireless Channels (13.4.1) 259 Wireless as a Shared Media (13.4.2) 260 Set Up a Home Router (13.5) 261 First Time Setup (13.5.1) 261 Design Considerations (13.5.2) 261 MAC Address Filtering (13.5.3) 263 Summary (13.6) 265 Practice 267 Check Your Understanding Questions 267 Chapter 14 Connect to the Internet 271 Objectives 271 Key Terms 271 Introduction (14.0.1) 272 ISP Connectivity Options (14.1) 272 ISP Services (14.1.1) 272 ISP Connections (14.1.2) 273 Cable and DSL Connections (14.1.3) 274 Additional Connectivity Options (14.1.4) 275 Network Virtualization (14.2) 276 Cloud Computing (14.2.2) 276 Types of Clouds (14.2.3) 276 Cloud Services (14.2.4) 277 Cloud Computing and Virtualization (14.2.5) 277 Advantages of Virtualization (14.2.6) 279 Hypervisors (14.2.7) 279 Network Virtualization (14.2.9) 281 Control Plane and Data Plane (14.2.10) 282 Network Virtualization and SDN (14.2.11) 283 SDN Architecture (14.2.12) 283 Mobile Device Connectivity (14.3) 284 Mobile Devices and Wi-Fi (14.3.1) 284 Wi-Fi Settings (14.3.2) 285 Configure Mobile Wi-Fi Connectivity (14.3.3) 286 Configure Cellular Data Settings (14.3.4) 288 Simple Connectivity with Bluetooth (14.3.6) 290 Bluetooth Pairing (14.3.7) 290 Summary (14.4) 293 Practice 295 Check Your Understanding Questions 295 Chapter 15 Security Considerations 299 Objectives 299 Key Terms 299 Introduction (15.0.1) 300 Security Threats (15.1) 300 Types of Threats (15.1.1) 300 Internal and External Threats (15.1.2) 301 Social Engineering Attacks (15.2) 302 Overview of Social Engineering (15.2.1) 302 Types of Social Engineering Attacks (15.2.2) 303 Malware (15.3) 304 Malicious Software (15.3.1) 305 Types of Malware (15.3.2) 305 Spyware (15.3.3) 306 Adware and Popups (15.3.4) 306 Botnets and Zombies (15.3.5) 307 Denial-of-Service Attacks (15.4) 308 Denial of Service (15.4.1) 308 Distributed Denial of Service (15.4.2) 309 Brute Force (15.4.3) 310 Security Tools (15.5) 310 Security Practices and Procedures (15.5.1) 310 Security Tools and Applications (15.5.2) 312 Patches and Updates (15.5.3) 313 Antimalware Software (15.6) 314 Signs of Infections (15.6.1) 314 Antivirus Software (15.6.2) 315 Antispam Software (15.6.3) 316 Antispyware Software (15.6.4) 316 Additional Safeguards (15.6.5) 317 Summary (15.7) 318 Practice 321 Check Your Understanding Questions 321 Chapter 16 Configure Network and Device Security 325 Objectives 325 Key Terms 325 Introduction (16.0.1) 326 Wireless Security Measures (16.1) 326 Wireless Vulnerabilities (16.1.1) 326 A Comprehensive Security Plan (16.1.2) 327 SSID Broadcasts (16.1.4) 333 Changing Default Settings (16.1.5) 334 MAC Address Filtering (16.1.6) 335 Implement Wireless Security (16.2) 336 Open Authentication (16.2.1) 336 Authentication and Association (16.2.2) 336 Authentication Protocols (16.2.3) 337 Configure a Firewall (16.3) 338 Firewall Overview (16.3.1) 338 Firewall Operation (16.3.2) 338 The DMZ (16.3.3) 339 Port Forwarding (16.3.4) 340 Port Triggering (16.3.5) 341 Summary (16.4) 344 Practice 345 Check Your Understanding Questions 346 Chapter 17 Cisco Switches and Routers 349 Objectives 349 Key Terms 349 Introduction (17.0.1) 350 Cisco Switches (17.1) 350 Connect More Devices (17.1.1) 350 Cisco LAN Switches (17.1.2) 351 LAN Switch Components (17.1.5) 354 Switch Boot Process (17.2) 355 Power Up the Switch (17.2.1) 355 In-Band and Out-of-Band Management (17.2.3) 358 IOS Startup Files (17.2.4) 358 Cisco Routers (17.3) 359 Router Components (17.3.2) 360 Router Interface Ports (17.3.3) 360 Router Boot Process (17.4) 361 Power Up the Router (17.4.1) 361 Management Ports (17.4.2) 365 Summary (17.5) 367 Practice 368 Check Your Understanding Questions 368 Chapter 18 The Cisco IOS Command Line 373 Objectives 373 Key Terms 373 Introduction (18.0.1) 374 Navigate the IOS (18.1) 374 The Cisco IOS Command-Line Interface (18.1.1) 374 Primary Command Modes (18.1.2) 375 A Note About Syntax Checker Activities (18.1.5) 376 The Command Structure (18.2) 376 Basic IOS Command Structure (18.2.1) 376 IOS Command Syntax (18.2.2) 377 Hotkeys and Shortcuts (18.2.4) 378 View Device Information (18.3) 380 Show Commands (18.3.2) 381 Summary (18.4) 387 Practice 388 Check Your Understanding Questions 388 Chapter 19 Build a Small Cisco Network 391 Objectives 391 Key Terms 391 Introduction (19.0.1) 392 Basic Switch Configuration (19.1) 392 Basic Switch Configuration Steps (19.1.1) 392 Switch Virtual Interface Configuration (19.1.2) 394 Configure Initial Router Settings (19.2) 395 Basic Router Configuration Steps (19.2.1) 395 Basic Router Configuration Example (19.2.2) 396 Secure the Devices (19.3) 398 Password Recommendations (19.3.1) 398 Secure Remote Access (19.3.2) 399 Configure SSH (19.3.3) 400 Verify SSH (19.3.5) 402 Connecting the Switch to the Router (19.4) 404 Default Gateway for a Host (19.4.1) 404 Default Gateway on a Switch (19.4.2) 406 Summary (19.5) 409 Practice 411 Check Your Understanding Questions 412 Chapter 20 Troubleshoot Common Network Problems 415 Objectives 415 Key Terms 415 Introduction (20.0.1) 416 The Troubleshooting Process (20.1) 416 Network Troubleshooting Overview (20.1.1) 416 Gather Information (20.1.2) 416 Structured Troubleshooting Methods (20.1.3) 418 Guidelines for Selecting a Troubleshooting Method (20.1.4) 422 Physical Layer Problems (20.2) 423 Common Layer 1 Problems (20.2.1) 423 Wireless Router LEDs (20.2.2) 424 Cabling Problems (20.2.3) 426 Troubleshooting Commands (20.3) 426 Overview of Troubleshooting Commands (20.3.1) 426 The ipconfig Command (20.3.2) 427 The ping Command (20.3.4) 430 Ping Results (20.3.5) 431 Divide and Conquer with ping (20.3.7) 432 The tracert Command (20.3.8) 433 The netstat Command (20.3.9) 434 The nslookup Command (20.3.10) 436 Troubleshoot Wireless Issues (20.4) 438 Causes of Wireless Issues (20.4.1) 438 Authentication and Association Errors (20.4.2) 439 Common Internet Connectivity Issues (20.5) 441 DHCP Server Configuration Errors (20.5.1) 441 Check Internet Configuration (20.5.2) 442 Check Firewall Settings (20.5.3) 444 Customer Support (20.6) 444 Sources of Help (20.6.1) 445 When to Call for Help (20.6.2) 445 Support Desk Interaction (20.6.3) 446 Issue Resolution (20.6.4) 447 Support Desk Tickets and Work Orders (20.6.5) 448 Summary (20.7) 450 Practice 453 Check Your Understanding Questions 454 Appendix A Answers to the "Check Your Understanding" Questions 459 Glossary 471 9780137660483 TOC 1/25/2022Cisco Networking Academy is an innovative Cisco education initiative that delivers information and communication technology skills to improve career and economic opportunities around the world. The Academy provides online courses, interactive tools, and lab activities to prepare individuals for information technology and networking careers in virtually every industry.

L'auteur - Cisco Networking Academy Program

The Cisco Networking Academy Program online curriculum was developed by the Cisco Systems Worldwide Education curriculum development team. The developers and authors of the Cisco Networking Academy Program books have extensive teaching backgrounds and are experts in the online learning environment.

Caractéristiques techniques

  PAPIER
Éditeur(s) Prentice Hall
Auteur(s) Cisco Networking Academy Program
Parution 21/05/2022
Nb. de pages 544
Couverture Broché
EAN13 9780137660483

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription