Connecting networks companion guide

Material type: TextTextPublication details: New Delhi : Dorling Kindersley, ©2015Description: xxiii, 542 p. : illustrationsISBN: 9781587133329 ; 1587133326; 9789332539181 ; 9332539189Subject(s): Computer networks | COMPUTERS / Computer Literacy | COMPUTERS / Computer Science | COMPUTERS / Data Processing | COMPUTERS / Reference | COMPUTERS / Hardware / General | COMPUTERS / Information Technology | COMPUTERS / Machine Theory | Computer networks -- Examinations -- Study guides | Computer networks -- Management | Wide area networks (Computer networks) | Local area networks (Computer networks) | Computer networks -- ExaminationsDDC classification: 004.6
Contents:
Introduction xix Chapter 1: Hierarchical Network Designs 1 Objectives 1 Key Terms 1 Introduction (1.0.1.1) 2 Hierarchical Network Design Overview (1.1) 2 Enterprise Network Campus Design (1.1.1) 2 Network Requirements (1.1.1.1) 3 Structured Engineering Principles (1.1.1.2) 4 Hierarchical Network Design (1.1.2) 4 Network Hierarchy (1.1.2.1) 4 The Access Layer (1.1.2.2) 6 The Distribution Layer (1.1.2.3) 7 The Core Layer (1.1.2.4) 9 Two-Tier Collapsed Core Design (1.1.2.5) 10 Cisco Enterprise Architecture (1.2) 10 Modular Design (1.2.1.1) 11 Modules in the Enterprise Architecture (1.2.1.2) 12 Cisco Enterprise Architecture Model (1.2.2) 14 Cisco Enterprise Architecture Model (1.2.2.1) 14 Cisco Enterprise Campus (1.2.2.2) 15 Cisco Enterprise Edge (1.2.2.3) 17 Service Provider Edge (1.2.2.4) 18 Remote Functional Area (1.2.2.5) 21 Enterprise Branch 21 Enterprise Teleworker 22 Enterprise Data Center 22 Evolving Network Architectures (1.3) 22 IT Challenges (1.3.1.1) 22 Emerging Enterprise Architectures (1.3.1.2) 23 Emerging Network Architectures (1.3.2) 24 Cisco Borderless Networks (1.3.2.1) 24 Collaboration Architecture (1.3.2.2) 25 Data Center and Virtualization (1.3.2.3) 26 Expanding the Network (1.3.2.4) 27 Summary (1.4) 29 Practice 30 Class Activities 30 Packet Tracer Activities 30 Check Your Understanding Questions 31 Chapter 2: Connecting the WAN 35 Objectives 35 Key Terms 35 Introduction (2.0.1.1) 37 WAN Technologies Overview (2.1) 37 Why a WAN? (2.1.1.1) 37 Are WANs Necessary? (2.1.1.2) 38 Evolving Networks (2.1.1.3) 39 Small Office (2.1.1.4) 39 Campus Network (2.1.1.5) 40 Branch Networks (2.1.1.6) 42 Distributed Network (2.1.1.7) 43 WAN Operations (2.1.2) 44 WANs in the OSI Model (2.1.2.1) 44 Common WAN Terminology (2.1.2.2) 45 WAN Devices (2.1.2.3) 47 Circuit-Switched Networks (2.1.2.4) 48 Packet-Switched Networks (2.1.2.5) 50 Selecting a WAN Technology (2.2) 51 WAN Link Connection Options (2.2.1.1) 51 Service Provider Network Infrastructure (2.2.1.2) 52 Private WAN Infrastructures (2.2.2) 54 Leased Lines (2.2.2.1) 54 Dialup (2.2.2.2) 55 ISDN (2.2.2.3) 56 Frame Relay (2.2.2.4) 58 ATM (2.2.2.5) 59 Ethernet WAN (2.2.2.6) 60 MPLS (2.2.2.7) 62 VSAT (2.2.2.8) 63 Public WAN Infrastructure (2.2.3) 64 DSL (2.2.3.1) 64 Cable (2.2.3.2) 65 Wireless (2.2.3.3) 66 3G/4G Cellular (2.2.3.4) 67 VPN Technology (2.2.3.5) 68 Selecting WAN Services (2.2.4) 70 Choosing a WAN Link Connection (2.2.4.1, 2.2.4.2) 70 What Is the Purpose of the WAN? 70 What Is the Geographic Scope? 70 What Are the Traffic Requirements? 71 Summary (2.3) 73 Practice 74 Class Activities 74 Labs 74 Check Your Understanding Questions 74 Chapter 3: Point-to-Point Connections 79 Objectives 79 Key Terms 79 Introduction (3.0.1.1) 80 Serial Point-to-Point Overview (3.1) 80 Serial Communications (3.1.1) 81 Serial and Parallel Ports (3.1.1.1) 81 Serial Communication (3.1.1.2) 82 Point-to-Point Communication Links (3.1.1.3) 84 Time-Division Multiplexing (3.1.1.4) 85 Statistical Time-Division Multiplexing (3.1.1.5) 86 TDM Examples - Sonet and SDM (3.1.1.6) 87 Demarcation Point (3.1.1.7) 88 DTE-DCE (3.1.1.8) 90 Serial Cables (3.1.1.9) 91 Serial Bandwidth (3.1.1.10) 94 HDLC Encapsulation (3.1.2) 96 WAN Encapsulation Protocols (3.1.2.1) 96 HDLC Encapsulation (3.1.2.2) 97 HDLC Frame Types (3.1.2.3) 98 Configuring HDLC Encapsulation (3.1.2.4) 100 Troubleshooting a Serial Interface (3.1.2.5) 100 PPP Operation (3.2) 104 Benefits of PPP (3.2.1) 104 Introducing PPP (3.2.1.1) 104 Advantages of PPP (3.2.1.2) 106 LCP and NCP (3.2.2) 106 PPP Layered Architecture (3.2.2.1) 106 PPP - Link Control Protocol (LCP) (3.2.2.2) 107 PPP - Network Control Protocol (NCP) (3.2.2.3) 108 PPP Frame Structure (3.2.2.4) 108 PPP Sessions (3.2.3) 109 Establishing a PPP Session (3.2.3.1) 110 LCP Operation (3.2.3.2) 111 LCP Packet (3.2.3.3) 113 PPP Configuration Options (3.2.3.4) 115 NCP Explained (3.2.3.5) 117 Configure PPP (3.3) 118 Configure PPP (3.3.1) 118 PPP Configuration Options (3.3.1.1) 119 PPP Basic Configuration Command (3.3.1.2) 120 PPP Compression Commands (3.3.1.3) 121 PPP Link Quality Monitoring Command (3.3.1.4) 122 PPP Multilink Commands (3.3.1.5) 123 Verifying PPP Configuration (3.3.1.6) 125 PPP Authentication (3.3.2) 126 PPP Authentication Protocols (3.3.2.1) 127 Password Authentication Protocol (PAP) (3.3.2.2) 127 Challenge Handshake Authentication Protocol (CHAP) (3.3.2.3) 129 PPP Encapsulation and Authentication Process (3.3.2.4) 131 Configuring PPP Authentication (3.3.2.5) 134 Configuring PPP with Authentication (3.3.2.6) 136 Troubleshoot WAN Connectivity (3.4) 138 Troubleshoot PPP (3.4.1) 138 Troubleshooting PPP Serial Encapsulation (3.4.1.1) 138 Debug PPP (3.4.1.2) 140 Troubleshooting a PPP Configuration with Authentication (3.4.1.3) 142 Summary (3.5) 145 Practice 146 Class Activities 146 Labs 146 Packet Tracer Activities 146 Check Your Understanding Questions 147 Chapter 4: Frame Relay 153 Objectives 153 Key Terms 153 Introduction (4.0.1.1) 154 Introduction to Frame Relay (4.1) 154 Benefits of Frame Relay (4.1.1) 155 Introducing Frame Relay (4.1.1.1) 155 Benefits of Frame Relay WAN Technology (4.1.1.2) 156 Dedicated Line Requirements (4.1.1.3) 157 Cost-Effectiveness and Flexibility of Frame Relay (4.1.1.4) 159 Frame Relay Operation (4.1.2) 160 Virtual Circuits (4.1.2.1) 160 Multiple Virtual Circuits (4.1.2.2) 163 Frame Relay Encapsulation (4.1.2.3) 165 Frame Relay Topologies (4.1.2.4, 4.1.2.5) 167 Frame Relay Address Mapping (4.1.2.6) 171 Local Management Interface (LMI) (4.1.2.7) 174 LMI Extensions (4.1.2.8) 175 Using LMI and Inverse ARP to Map Addresses (4.1.2.9) 178 Advanced Frame Relay Concepts (4.1.3) 180 Access Rate and Committed Information Rate (4.1.3.1) 180 Frame Relay Example (4.1.3.2) 181 Bursting (4.1.3.3) 183 Frame Relay Flow Control (4.1.3.4) 184 Configure Frame Relay (4.2) 187 Configure Basic Frame Relay (4.2.1) 187 Basic Frame Relay Configuration Commands (4.2.1.1) 187 Configuring a Static Frame Relay Map (4.2.1.2) 190 Verify a Static Frame Relay Map (4.2.1.3) 192 Configure Subinterfaces (4.2.2) 193 Reachability Issues (4.2.2.1) 193 Solving Reachability Issues (4.2.2.2) 196 Configuring Point-to-Point Subinterfaces (4.2.2.3) 199 Example: Configuring Point-to-Point Subinterfaces (4.2.2.4) 200 Troubleshoot Connectivity (4.3) 203 Troubleshoot Frame Relay (4.3.1) 203 Verifying Frame Relay Operation: Frame Relay Interface (4.3.1.1) 203 Verifying Frame Relay Operation: LMI Operations (4.3.1.2) 204 Verifying Frame Relay Operation: PVC Status (4.3.1.3) 205 Verifying Frame Relay Operation: Inverse ARP (4.3.1.4) 205 Troubleshooting Frame Relay Operation (4.3.1.5) 207 Summary (4.4) 209 Practice 210 Class Activities 210 Labs 210 Packet Tracer Activities 210 Check Your Understanding Questions 211 Chapter 5: Network Address Translation for IPv4 217 Objectives 217 Key Terms 217 Introduction (5.0.1.1) 218 NAT Operation (5.1) 219 NAT Characteristics (5.1.1) 219 IPv4 Private Address Space (5.1.1.1) 219 What Is NAT? (5.1.1.2) 220 NAT Terminology (5.1.1.3) 221 How NAT Works (5.1.1.5) 224 Types of NAT (5.1.2) 225 Static NAT (5.1.2.1) 225 Dynamic NAT (5.1.2.2) 226 Port Address Translation (PAT) (5.1.2.3) 227 Next Available Port (5.1.2.4) 228 Comparing NAT and PAT (5.1.2.5) 230 Benefits of NAT (5.1.3) 231 Benefits of NAT (5.1.3.1) 231 Disadvantages of NAT (5.1.3.2) 232 Configuring NAT (5.2) 233 Configuring Static NAT (5.2.1) 233 Configuring Static NAT (5.2.1.1) 233 Analyzing Static NAT (5.2.1.2) 235 Verifying Static NAT (5.2.1.3) 237 Configuring Dynamic NAT (5.2.2) 238 Dynamic NAT Operation (5.2.2.1) 238 Configuring Dynamic NAT (5.2.2.2) 239 Analyzing Dynamic NAT (5.2.2.3) 242 Verifying Dynamic NAT (5.2.2.4) 244 Configuring Port Address Translation (PAT) (5.2.3) 247 Configuring PAT: Address Pool (5.2.3.1) 247 Configuring PAT: Single Address (5.2.3.2) 249 Analyzing PAT (5.2.3.3) 251 Verifying PAT (5.2.3.4) 253 Port Forwarding (5.2.4) 255 Port Forwarding (5.2.4.1) 255 SOHO Example (5.2.4.2) 257 Configuring Port Forwarding with IOS (5.2.4.3) 258 Configuring NAT and IPv6 (5.2.5) 260 NAT for IPv6? (5.2.5.1) 260 IPv6 Unique Local Addresses (5.2.5.2) 262 NAT for IPv6 (5.2.5.3) 263 Troubleshooting NAT (5.3) 264 Troubleshooting NAT: show Commands (5.3.1.1) 264 Troubleshooting NAT: debug Command (5.3.1.2) 266 Case Study (5.3.1.3) 268 Summary (5.4) 271 Practice 272 Class Activities 272 Labs 272 Packet Tracer Activities 272 Check Your Understanding Questions 273 Chapter 6: Broadband Solutions 279 Objectives 279 Key Terms 279 Introduction (6.0.1.1) 280 Teleworking (6.1) 280 Benefits of Teleworking (6.1.1) 280 Introducing Teleworking (6.1.1.1) 281 Employer Benefits of Teleworking (6.1.1.2) 281 Community and Government Benefits (6.1.1.3) 282 Individual Benefits of Teleworking (6.1.1.4) 283 Detriments to Telework (6.1.1.5) 283 Business Requirements for Teleworker Services (6.1.2) 284 Teleworker Solution (6.1.2.1) 284 Teleworker Connectivity Requirements (6.1.2.2) 286 Comparing Broadband Solutions (6.2) 287 Cable (6.2.1) 287 What is a Cable System? (6.2.1.1) 287 Cable and the Electromagnetic Spectrum (6.2.1.2) 289 DOCSIS (6.2.1.3) 290 Cable Components (6.2.1.4) 291 DSL (6.2.2) 293 What is DSL? (6.2.2.1) 293 DSL Connections (6.2.2.2) 294 Separating Voice and Data in ADSL (6.2.2.3) 295 Broadband Wireless (6.2.3) 298 Types of Broadband Wireless Technologies (6.2.3.1, 6.2.3.2) 298 Selecting Broadband Solutions (6.2.4) 303 Comparing Broadband Solutions (6.2.4.1) 303 Configuring xDSL Connectivity (6.3) 304 PPPoE Overview (6.3.1) 304 PPPoE Motivation (6.3.1.1) 304 PPPoE Concepts (6.3.1.2) 306 Configuring PPPoE (6.3.2) 306 PPPoE Configuration (6.3.2.1) 307 Summary (6.4) 309 Practice 310 Class Activities 310 Labs 310 Check Your Understanding Questions 310 Chapter 7: Securing Site-to-Site Connectivity 313 Objectives 313 Key Terms 313 Introduction (7.0.1.1) 314 VPNs (7.1) 314 Fundamentals of VPNs (7.1.1) 314 Introducing VPNs (7.1.1.1) 315 Benefits of VPNs (7.1.1.2) 316 Types of VPNs (7.1.2) 317 Remote-Access VPNs (7.1.2.2) 318 Site-to-Site GRE Tunnels (7.2) 319 Fundamentals of Generic Routing Encapsulation (7.2.1) 319 Introduction to GRE (7.2.1.1) 319 Characteristics of GRE (7.2.1.2) 320 Configuring GRE Tunnels (7.2.2) 321 GRE Tunnel Configuration (7.2.2.1) 322 GRE Tunnel Verification (7.2.2.2) 324 Introducing IPsec (7.3) 326 Internet Protocol Security (7.3.1) 326 IPsec (7.3.1.1) 326 IPsec Security Services (7.3.1.2) 327 IPsec Framework (7.3.2) 328 Confidentiality with Encryption (7.3.2.1) 328 Encryption Algorithms (7.3.2.2) 330 Diffie-Hellman Key Exchange (7.3.2.3) 332 Integrity with Hash Algorithms (7.3.2.4) 332 IPsec Authentication (7.3.2.5) 334 IPsec Protocol Framework (7.3.2.6) 335 Remote Access (7.4) 337 Remote-Access VPN Solutions (7.4.1) 337 Types of Remote-Access VPNs (7.4.1.1) 337 Cisco SSL VPN (7.4.1.2) 338 Cisco SSL VPN Solutions (7.4.1.3) 340 IPsec Remote-Access VPNs (7.4.2) 341 IPsec Remote Access (7.4.2.1) 341 Cisco Easy VPN Server and Remote (7.4.2.2) 342 Cisco Easy VPN Client (7.4.2.3) 343 Comparing IPsec and SSL (7.4.2.4) 345 Summary (7.5) 347 Practice 348 Class Activities 348 Labs 348 Packet Tracer Activities 348 Check Your Understanding Questions 348 Chapter 8: Monitoring the Network 351 Objectives 351 Key Terms 351 Introduction (8.0.1.1) 352 Syslog (8.1) 352 Syslog Operation (8.1.1) 352 Introduction to Syslog (8.1.1.1) 352 Syslog Operation (8.1.1.2) 354 Syslog Message Format (8.1.1.3) 355 Service Timestamp (8.1.1.4) 357 Configuring Syslog (8.1.2) 358 Syslog Server (8.1.2.1) 358 Default Logging (8.1.2.2) 359 Router and Switch Commands for Syslog Clients (8.1.2.3) 360 Verifying Syslog (8.1.2.4) 362 SNMP (8.2) 364 SNMP Operation (8.2.1) 364 Introduction to SNMP (8.2.1.1) 364 SNMP Operation (8.2.1.2) 365 SNMP Agent Traps (8.2.1.3) 366 SNMP Versions (8.2.1.4) 368 Community Strings (8.2.1.5) 370 Management Information Base Object ID (8.2.1.6) 371 Configuring SNMP (8.2.2) 374 Steps for Configuring SNMP (8.2.2.1) 374 Verifying SNMP Configuration (8.2.2.2) 375 Security Best Practices (8.2.2.3) 378 NetFlow (8.3) 380 NetFlow Operation (8.3.1) 380 Introducing NetFlow (8.3.1.1) 380 Understanding NetFlow (8.3.1.2) 381 Network Flows (8.3.1.3) 383 Configuring NetFlow (8.3.2) 384 Verifying NetFlow (8.3.2.2) 386 Examining Traffic Patterns (8.3.3) 390 Identifying NetFlow Collector Functions (8.3.3.1) 390 NetFlow Analysis with a NetFlow Collector (8.3.3.2) 392 Summary (8.4) 397 Practice 397 Class Activities 398 Labs 398 Packet Tracer Activities 398 Check Your Understanding Questions 398 Chapter 9: Troubleshooting the Network 401 Objectives 401 Key Terms 401 Introduction (9.0.1.1) 402 Troubleshooting with a Systematic Approach (9.1) 402 Network Documentation (9.1.1) 402 Documenting the Network (9.1.1.1) 403 Network Topology Diagrams (9.1.1.2) 406 Network Baseline Performance Level (9.1.1.3) 408 Establishing a Network Baseline (9.1.1.4) 409 Measuring Data (9.1.1.5) 412 Troubleshooting Process (9.1.2) 415 General Troubleshooting Procedures (9.1.2.1) 415 Gathering Symptoms (9.1.2.2) 417 Questioning End Users (9.1.2.3) 418 Isolating the Issue Using Layered Models (9.1.3) 419 Using Layered Models for Troubleshooting (9.1.3.1) 419 Troubleshooting Methods (9.1.3.2, 9.1.3.3) 422 Guidelines for Selecting a Troubleshooting Method (9.1.3.4) 425 Network Troubleshooting (9.2) 426 Troubleshooting Tools (9.2.1) 426 Software Troubleshooting Tools (9.2.1.1, 9.2.1.2) 426 Hardware Troubleshooting Tools (9.2.1.3) 431 Using a Syslog Server for Troubleshooting (9.2.1.4) 435 Symptoms and Causes of Network Troubleshooting (9.2.2) 437 Physical Layer Troubleshooting (9.2.2.1) 437 Data Link Layer Troubleshooting (9.2.2.2) 439 Network Layer Troubleshooting (9.2.2.3) 441 Transport Layer Troubleshooting - ACLs (9.2.2.4) 443 Transport Layer Troubleshooting - NAT for IPv4 (9.2.2.5) 445 Application Layer Troubleshooting (9.2.2.6) 446 Troubleshooting IP Connectivity (9.2.3) 448 Components of Troubleshooting End-to-End Connectivity (9.2.3.1) 448 End-to-End Connectivity Problem Initiates Troubleshooting (9.2.3.2) 450 Step 1 - Verify the Physical Layer (9.2.3.3) 452 Step 2 - Check for Duplex Mismatches (9.2.3.4) 454 Step 3 - Verify Layer 2 and Layer 3 Addressing on the Local Network (9.2.3.5) 456 Step 4 - Verify Default Gateway (9.2.3.6) 461 Step 5 - Verify Correct Path (9.2.3.7) 464 Step 6 - Verify the Transport Layer (9.2.3.8) 468 Step 7 - Verify ACLs (9.2.3.9) 469 Step 8 - Verify DNS (9.2.3.10) 471 Summary (9.3) 474 Practice 475 Class Activities 475 Packet Tracer Activities 475 Check Your Understanding Questions 476 Appendix A: Answers to the "Check Your Understanding" Questions 479 Glossary 499 TOC, 9781587133329, 3/25/2014
Summary: Connecting Networks Companion Guide is the official supplemental textbook for the Connecting Networks course in the Cisco(R) Networking Academy(R) CCNA(R) Routing and Switching curriculum. This course discusses the WAN technologies and network services required by converged applications in a complex network. The course allows you to understand the selection criteria of network devices and WAN technologies to meet network requirements. You will learn how to configure and troubleshoot network devices and resolve common issues with data link protocols.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
Reference Books Reference Books Main Library
Reference
Reference 004.6 CON (Browse shelf(Opens below)) Available 015143
Total holds: 0

Includes index.

Introduction xix Chapter 1: Hierarchical Network Designs 1 Objectives 1 Key Terms 1 Introduction (1.0.1.1) 2 Hierarchical Network Design Overview (1.1) 2 Enterprise Network Campus Design (1.1.1) 2 Network Requirements (1.1.1.1) 3 Structured Engineering Principles (1.1.1.2) 4 Hierarchical Network Design (1.1.2) 4 Network Hierarchy (1.1.2.1) 4 The Access Layer (1.1.2.2) 6 The Distribution Layer (1.1.2.3) 7 The Core Layer (1.1.2.4) 9 Two-Tier Collapsed Core Design (1.1.2.5) 10 Cisco Enterprise Architecture (1.2) 10 Modular Design (1.2.1.1) 11 Modules in the Enterprise Architecture (1.2.1.2) 12 Cisco Enterprise Architecture Model (1.2.2) 14 Cisco Enterprise Architecture Model (1.2.2.1) 14 Cisco Enterprise Campus (1.2.2.2) 15 Cisco Enterprise Edge (1.2.2.3) 17 Service Provider Edge (1.2.2.4) 18 Remote Functional Area (1.2.2.5) 21 Enterprise Branch 21 Enterprise Teleworker 22 Enterprise Data Center 22 Evolving Network Architectures (1.3) 22 IT Challenges (1.3.1.1) 22 Emerging Enterprise Architectures (1.3.1.2) 23 Emerging Network Architectures (1.3.2) 24 Cisco Borderless Networks (1.3.2.1) 24 Collaboration Architecture (1.3.2.2) 25 Data Center and Virtualization (1.3.2.3) 26 Expanding the Network (1.3.2.4) 27 Summary (1.4) 29 Practice 30 Class Activities 30 Packet Tracer Activities 30 Check Your Understanding Questions 31 Chapter 2: Connecting the WAN 35 Objectives 35 Key Terms 35 Introduction (2.0.1.1) 37 WAN Technologies Overview (2.1) 37 Why a WAN? (2.1.1.1) 37 Are WANs Necessary? (2.1.1.2) 38 Evolving Networks (2.1.1.3) 39 Small Office (2.1.1.4) 39 Campus Network (2.1.1.5) 40 Branch Networks (2.1.1.6) 42 Distributed Network (2.1.1.7) 43 WAN Operations (2.1.2) 44 WANs in the OSI Model (2.1.2.1) 44 Common WAN Terminology (2.1.2.2) 45 WAN Devices (2.1.2.3) 47 Circuit-Switched Networks (2.1.2.4) 48 Packet-Switched Networks (2.1.2.5) 50 Selecting a WAN Technology (2.2) 51 WAN Link Connection Options (2.2.1.1) 51 Service Provider Network Infrastructure (2.2.1.2) 52 Private WAN Infrastructures (2.2.2) 54 Leased Lines (2.2.2.1) 54 Dialup (2.2.2.2) 55 ISDN (2.2.2.3) 56 Frame Relay (2.2.2.4) 58 ATM (2.2.2.5) 59 Ethernet WAN (2.2.2.6) 60 MPLS (2.2.2.7) 62 VSAT (2.2.2.8) 63 Public WAN Infrastructure (2.2.3) 64 DSL (2.2.3.1) 64 Cable (2.2.3.2) 65 Wireless (2.2.3.3) 66 3G/4G Cellular (2.2.3.4) 67 VPN Technology (2.2.3.5) 68 Selecting WAN Services (2.2.4) 70 Choosing a WAN Link Connection (2.2.4.1, 2.2.4.2) 70 What Is the Purpose of the WAN? 70 What Is the Geographic Scope? 70 What Are the Traffic Requirements? 71 Summary (2.3) 73 Practice 74 Class Activities 74 Labs 74 Check Your Understanding Questions 74 Chapter 3: Point-to-Point Connections 79 Objectives 79 Key Terms 79 Introduction (3.0.1.1) 80 Serial Point-to-Point Overview (3.1) 80 Serial Communications (3.1.1) 81 Serial and Parallel Ports (3.1.1.1) 81 Serial Communication (3.1.1.2) 82 Point-to-Point Communication Links (3.1.1.3) 84 Time-Division Multiplexing (3.1.1.4) 85 Statistical Time-Division Multiplexing (3.1.1.5) 86 TDM Examples - Sonet and SDM (3.1.1.6) 87 Demarcation Point (3.1.1.7) 88 DTE-DCE (3.1.1.8) 90 Serial Cables (3.1.1.9) 91 Serial Bandwidth (3.1.1.10) 94 HDLC Encapsulation (3.1.2) 96 WAN Encapsulation Protocols (3.1.2.1) 96 HDLC Encapsulation (3.1.2.2) 97 HDLC Frame Types (3.1.2.3) 98 Configuring HDLC Encapsulation (3.1.2.4) 100 Troubleshooting a Serial Interface (3.1.2.5) 100 PPP Operation (3.2) 104 Benefits of PPP (3.2.1) 104 Introducing PPP (3.2.1.1) 104 Advantages of PPP (3.2.1.2) 106 LCP and NCP (3.2.2) 106 PPP Layered Architecture (3.2.2.1) 106 PPP - Link Control Protocol (LCP) (3.2.2.2) 107 PPP - Network Control Protocol (NCP) (3.2.2.3) 108 PPP Frame Structure (3.2.2.4) 108 PPP Sessions (3.2.3) 109 Establishing a PPP Session (3.2.3.1) 110 LCP Operation (3.2.3.2) 111 LCP Packet (3.2.3.3) 113 PPP Configuration Options (3.2.3.4) 115 NCP Explained (3.2.3.5) 117 Configure PPP (3.3) 118 Configure PPP (3.3.1) 118 PPP Configuration Options (3.3.1.1) 119 PPP Basic Configuration Command (3.3.1.2) 120 PPP Compression Commands (3.3.1.3) 121 PPP Link Quality Monitoring Command (3.3.1.4) 122 PPP Multilink Commands (3.3.1.5) 123 Verifying PPP Configuration (3.3.1.6) 125 PPP Authentication (3.3.2) 126 PPP Authentication Protocols (3.3.2.1) 127 Password Authentication Protocol (PAP) (3.3.2.2) 127 Challenge Handshake Authentication Protocol (CHAP) (3.3.2.3) 129 PPP Encapsulation and Authentication Process (3.3.2.4) 131 Configuring PPP Authentication (3.3.2.5) 134 Configuring PPP with Authentication (3.3.2.6) 136 Troubleshoot WAN Connectivity (3.4) 138 Troubleshoot PPP (3.4.1) 138 Troubleshooting PPP Serial Encapsulation (3.4.1.1) 138 Debug PPP (3.4.1.2) 140 Troubleshooting a PPP Configuration with Authentication (3.4.1.3) 142 Summary (3.5) 145 Practice 146 Class Activities 146 Labs 146 Packet Tracer Activities 146 Check Your Understanding Questions 147 Chapter 4: Frame Relay 153 Objectives 153 Key Terms 153 Introduction (4.0.1.1) 154 Introduction to Frame Relay (4.1) 154 Benefits of Frame Relay (4.1.1) 155 Introducing Frame Relay (4.1.1.1) 155 Benefits of Frame Relay WAN Technology (4.1.1.2) 156 Dedicated Line Requirements (4.1.1.3) 157 Cost-Effectiveness and Flexibility of Frame Relay (4.1.1.4) 159 Frame Relay Operation (4.1.2) 160 Virtual Circuits (4.1.2.1) 160 Multiple Virtual Circuits (4.1.2.2) 163 Frame Relay Encapsulation (4.1.2.3) 165 Frame Relay Topologies (4.1.2.4, 4.1.2.5) 167 Frame Relay Address Mapping (4.1.2.6) 171 Local Management Interface (LMI) (4.1.2.7) 174 LMI Extensions (4.1.2.8) 175 Using LMI and Inverse ARP to Map Addresses (4.1.2.9) 178 Advanced Frame Relay Concepts (4.1.3) 180 Access Rate and Committed Information Rate (4.1.3.1) 180 Frame Relay Example (4.1.3.2) 181 Bursting (4.1.3.3) 183 Frame Relay Flow Control (4.1.3.4) 184 Configure Frame Relay (4.2) 187 Configure Basic Frame Relay (4.2.1) 187 Basic Frame Relay Configuration Commands (4.2.1.1) 187 Configuring a Static Frame Relay Map (4.2.1.2) 190 Verify a Static Frame Relay Map (4.2.1.3) 192 Configure Subinterfaces (4.2.2) 193 Reachability Issues (4.2.2.1) 193 Solving Reachability Issues (4.2.2.2) 196 Configuring Point-to-Point Subinterfaces (4.2.2.3) 199 Example: Configuring Point-to-Point Subinterfaces (4.2.2.4) 200 Troubleshoot Connectivity (4.3) 203 Troubleshoot Frame Relay (4.3.1) 203 Verifying Frame Relay Operation: Frame Relay Interface (4.3.1.1) 203 Verifying Frame Relay Operation: LMI Operations (4.3.1.2) 204 Verifying Frame Relay Operation: PVC Status (4.3.1.3) 205 Verifying Frame Relay Operation: Inverse ARP (4.3.1.4) 205 Troubleshooting Frame Relay Operation (4.3.1.5) 207 Summary (4.4) 209 Practice 210 Class Activities 210 Labs 210 Packet Tracer Activities 210 Check Your Understanding Questions 211 Chapter 5: Network Address Translation for IPv4 217 Objectives 217 Key Terms 217 Introduction (5.0.1.1) 218 NAT Operation (5.1) 219 NAT Characteristics (5.1.1) 219 IPv4 Private Address Space (5.1.1.1) 219 What Is NAT? (5.1.1.2) 220 NAT Terminology (5.1.1.3) 221 How NAT Works (5.1.1.5) 224 Types of NAT (5.1.2) 225 Static NAT (5.1.2.1) 225 Dynamic NAT (5.1.2.2) 226 Port Address Translation (PAT) (5.1.2.3) 227 Next Available Port (5.1.2.4) 228 Comparing NAT and PAT (5.1.2.5) 230 Benefits of NAT (5.1.3) 231 Benefits of NAT (5.1.3.1) 231 Disadvantages of NAT (5.1.3.2) 232 Configuring NAT (5.2) 233 Configuring Static NAT (5.2.1) 233 Configuring Static NAT (5.2.1.1) 233 Analyzing Static NAT (5.2.1.2) 235 Verifying Static NAT (5.2.1.3) 237 Configuring Dynamic NAT (5.2.2) 238 Dynamic NAT Operation (5.2.2.1) 238 Configuring Dynamic NAT (5.2.2.2) 239 Analyzing Dynamic NAT (5.2.2.3) 242 Verifying Dynamic NAT (5.2.2.4) 244 Configuring Port Address Translation (PAT) (5.2.3) 247 Configuring PAT: Address Pool (5.2.3.1) 247 Configuring PAT: Single Address (5.2.3.2) 249 Analyzing PAT (5.2.3.3) 251 Verifying PAT (5.2.3.4) 253 Port Forwarding (5.2.4) 255 Port Forwarding (5.2.4.1) 255 SOHO Example (5.2.4.2) 257 Configuring Port Forwarding with IOS (5.2.4.3) 258 Configuring NAT and IPv6 (5.2.5) 260 NAT for IPv6? (5.2.5.1) 260 IPv6 Unique Local Addresses (5.2.5.2) 262 NAT for IPv6 (5.2.5.3) 263 Troubleshooting NAT (5.3) 264 Troubleshooting NAT: show Commands (5.3.1.1) 264 Troubleshooting NAT: debug Command (5.3.1.2) 266 Case Study (5.3.1.3) 268 Summary (5.4) 271 Practice 272 Class Activities 272 Labs 272 Packet Tracer Activities 272 Check Your Understanding Questions 273 Chapter 6: Broadband Solutions 279 Objectives 279 Key Terms 279 Introduction (6.0.1.1) 280 Teleworking (6.1) 280 Benefits of Teleworking (6.1.1) 280 Introducing Teleworking (6.1.1.1) 281 Employer Benefits of Teleworking (6.1.1.2) 281 Community and Government Benefits (6.1.1.3) 282 Individual Benefits of Teleworking (6.1.1.4) 283 Detriments to Telework (6.1.1.5) 283 Business Requirements for Teleworker Services (6.1.2) 284 Teleworker Solution (6.1.2.1) 284 Teleworker Connectivity Requirements (6.1.2.2) 286 Comparing Broadband Solutions (6.2) 287 Cable (6.2.1) 287 What is a Cable System? (6.2.1.1) 287 Cable and the Electromagnetic Spectrum (6.2.1.2) 289 DOCSIS (6.2.1.3) 290 Cable Components (6.2.1.4) 291 DSL (6.2.2) 293 What is DSL? (6.2.2.1) 293 DSL Connections (6.2.2.2) 294 Separating Voice and Data in ADSL (6.2.2.3) 295 Broadband Wireless (6.2.3) 298 Types of Broadband Wireless Technologies (6.2.3.1, 6.2.3.2) 298 Selecting Broadband Solutions (6.2.4) 303 Comparing Broadband Solutions (6.2.4.1) 303 Configuring xDSL Connectivity (6.3) 304 PPPoE Overview (6.3.1) 304 PPPoE Motivation (6.3.1.1) 304 PPPoE Concepts (6.3.1.2) 306 Configuring PPPoE (6.3.2) 306 PPPoE Configuration (6.3.2.1) 307 Summary (6.4) 309 Practice 310 Class Activities 310 Labs 310 Check Your Understanding Questions 310 Chapter 7: Securing Site-to-Site Connectivity 313 Objectives 313 Key Terms 313 Introduction (7.0.1.1) 314 VPNs (7.1) 314 Fundamentals of VPNs (7.1.1) 314 Introducing VPNs (7.1.1.1) 315 Benefits of VPNs (7.1.1.2) 316 Types of VPNs (7.1.2) 317 Remote-Access VPNs (7.1.2.2) 318 Site-to-Site GRE Tunnels (7.2) 319 Fundamentals of Generic Routing Encapsulation (7.2.1) 319 Introduction to GRE (7.2.1.1) 319 Characteristics of GRE (7.2.1.2) 320 Configuring GRE Tunnels (7.2.2) 321 GRE Tunnel Configuration (7.2.2.1) 322 GRE Tunnel Verification (7.2.2.2) 324 Introducing IPsec (7.3) 326 Internet Protocol Security (7.3.1) 326 IPsec (7.3.1.1) 326 IPsec Security Services (7.3.1.2) 327 IPsec Framework (7.3.2) 328 Confidentiality with Encryption (7.3.2.1) 328 Encryption Algorithms (7.3.2.2) 330 Diffie-Hellman Key Exchange (7.3.2.3) 332 Integrity with Hash Algorithms (7.3.2.4) 332 IPsec Authentication (7.3.2.5) 334 IPsec Protocol Framework (7.3.2.6) 335 Remote Access (7.4) 337 Remote-Access VPN Solutions (7.4.1) 337 Types of Remote-Access VPNs (7.4.1.1) 337 Cisco SSL VPN (7.4.1.2) 338 Cisco SSL VPN Solutions (7.4.1.3) 340 IPsec Remote-Access VPNs (7.4.2) 341 IPsec Remote Access (7.4.2.1) 341 Cisco Easy VPN Server and Remote (7.4.2.2) 342 Cisco Easy VPN Client (7.4.2.3) 343 Comparing IPsec and SSL (7.4.2.4) 345 Summary (7.5) 347 Practice 348 Class Activities 348 Labs 348 Packet Tracer Activities 348 Check Your Understanding Questions 348 Chapter 8: Monitoring the Network 351 Objectives 351 Key Terms 351 Introduction (8.0.1.1) 352 Syslog (8.1) 352 Syslog Operation (8.1.1) 352 Introduction to Syslog (8.1.1.1) 352 Syslog Operation (8.1.1.2) 354 Syslog Message Format (8.1.1.3) 355 Service Timestamp (8.1.1.4) 357 Configuring Syslog (8.1.2) 358 Syslog Server (8.1.2.1) 358 Default Logging (8.1.2.2) 359 Router and Switch Commands for Syslog Clients (8.1.2.3) 360 Verifying Syslog (8.1.2.4) 362 SNMP (8.2) 364 SNMP Operation (8.2.1) 364 Introduction to SNMP (8.2.1.1) 364 SNMP Operation (8.2.1.2) 365 SNMP Agent Traps (8.2.1.3) 366 SNMP Versions (8.2.1.4) 368 Community Strings (8.2.1.5) 370 Management Information Base Object ID (8.2.1.6) 371 Configuring SNMP (8.2.2) 374 Steps for Configuring SNMP (8.2.2.1) 374 Verifying SNMP Configuration (8.2.2.2) 375 Security Best Practices (8.2.2.3) 378 NetFlow (8.3) 380 NetFlow Operation (8.3.1) 380 Introducing NetFlow (8.3.1.1) 380 Understanding NetFlow (8.3.1.2) 381 Network Flows (8.3.1.3) 383 Configuring NetFlow (8.3.2) 384 Verifying NetFlow (8.3.2.2) 386 Examining Traffic Patterns (8.3.3) 390 Identifying NetFlow Collector Functions (8.3.3.1) 390 NetFlow Analysis with a NetFlow Collector (8.3.3.2) 392 Summary (8.4) 397 Practice 397 Class Activities 398 Labs 398 Packet Tracer Activities 398 Check Your Understanding Questions 398 Chapter 9: Troubleshooting the Network 401 Objectives 401 Key Terms 401 Introduction (9.0.1.1) 402 Troubleshooting with a Systematic Approach (9.1) 402 Network Documentation (9.1.1) 402 Documenting the Network (9.1.1.1) 403 Network Topology Diagrams (9.1.1.2) 406 Network Baseline Performance Level (9.1.1.3) 408 Establishing a Network Baseline (9.1.1.4) 409 Measuring Data (9.1.1.5) 412 Troubleshooting Process (9.1.2) 415 General Troubleshooting Procedures (9.1.2.1) 415 Gathering Symptoms (9.1.2.2) 417 Questioning End Users (9.1.2.3) 418 Isolating the Issue Using Layered Models (9.1.3) 419 Using Layered Models for Troubleshooting (9.1.3.1) 419 Troubleshooting Methods (9.1.3.2, 9.1.3.3) 422 Guidelines for Selecting a Troubleshooting Method (9.1.3.4) 425 Network Troubleshooting (9.2) 426 Troubleshooting Tools (9.2.1) 426 Software Troubleshooting Tools (9.2.1.1, 9.2.1.2) 426 Hardware Troubleshooting Tools (9.2.1.3) 431 Using a Syslog Server for Troubleshooting (9.2.1.4) 435 Symptoms and Causes of Network Troubleshooting (9.2.2) 437 Physical Layer Troubleshooting (9.2.2.1) 437 Data Link Layer Troubleshooting (9.2.2.2) 439 Network Layer Troubleshooting (9.2.2.3) 441 Transport Layer Troubleshooting - ACLs (9.2.2.4) 443 Transport Layer Troubleshooting - NAT for IPv4 (9.2.2.5) 445 Application Layer Troubleshooting (9.2.2.6) 446 Troubleshooting IP Connectivity (9.2.3) 448 Components of Troubleshooting End-to-End Connectivity (9.2.3.1) 448 End-to-End Connectivity Problem Initiates Troubleshooting (9.2.3.2) 450 Step 1 - Verify the Physical Layer (9.2.3.3) 452 Step 2 - Check for Duplex Mismatches (9.2.3.4) 454 Step 3 - Verify Layer 2 and Layer 3 Addressing on the Local Network (9.2.3.5) 456 Step 4 - Verify Default Gateway (9.2.3.6) 461 Step 5 - Verify Correct Path (9.2.3.7) 464 Step 6 - Verify the Transport Layer (9.2.3.8) 468 Step 7 - Verify ACLs (9.2.3.9) 469 Step 8 - Verify DNS (9.2.3.10) 471 Summary (9.3) 474 Practice 475 Class Activities 475 Packet Tracer Activities 475 Check Your Understanding Questions 476 Appendix A: Answers to the "Check Your Understanding" Questions 479 Glossary 499 TOC, 9781587133329, 3/25/2014

Connecting Networks Companion Guide is the official supplemental textbook for the Connecting Networks course in the Cisco(R) Networking Academy(R) CCNA(R) Routing and Switching curriculum. This course discusses the WAN technologies and network services required by converged applications in a complex network. The course allows you to understand the selection criteria of network devices and WAN technologies to meet network requirements. You will learn how to configure and troubleshoot network devices and resolve common issues with data link protocols.

There are no comments on this title.

to post a comment.

© University of Vavuniya

---