Allan Reid is the curriculum lead for CCNA and a CCNA and CCNP® instructor at the Centennial College CATC in Toronto, Canada.
Jim Lorenz is an instructor and curriculum developer for the Cisco Networking Academy.
Cheryl Schmidt is a professor of Network Engineering Technology at Florida Community College at Jacksonville.
Introduction | p. xxix |
Concepts | |
Networking in the Enterprise | p. 3 |
Objectives | p. 3 |
Key Terms | p. 3 |
Describing the Enterprise Network | p. 4 |
Supporting the Business Enterprise | p. 5 |
Traffic Flow in the Enterprise Network | p. 5 |
Enterprise Campus | p. 8 |
Enterprise Edge | p. 8 |
Service Provider Edge | p. 10 |
Enterprise LANs and WANs | p. 10 |
Intranets and Extranets | p. 12 |
Identifying Enterprise Applications | p. 12 |
Traffic Flow Patterns | p. 12 |
Applications and Traffic on an Enterprise Network | p. 13 |
Network Traffic Prioritization | p. 14 |
Data Traffic | p. 14 |
Voice and Video Traffic | p. 14 |
Supporting Remote Workers | p. 15 |
Teleworking | p. 15 |
Virtual Private Networks | p. 16 |
Summary | p. 18 |
Activities and Labs | p. 18 |
Check Your Understanding | p. 19 |
Challenge Questions and Activities | p. 20 |
Exploring the Enterprise Network Infrastructure | p. 21 |
Objectives | p. 21 |
Key Terms | p. 21 |
Describing the Current Network | p. 22 |
Enterprise Network Documentation | p. 22 |
Business Continuity Plan | p. 24 |
Business Security Plan | p. 25 |
Network Maintenance Plan | p. 25 |
Service-Level Agreement | p. 25 |
Network Operations Center (NOC) | p. 26 |
Telecommunication Room Design and Considerations | p. 29 |
Supporting the Enterprise Edge | p. 31 |
Service Delivery at the Point of Presence | p. 31 |
Security Considerations at the Enterprise Edge | p. 32 |
Connecting the Enterprise Network to External Services | p. 33 |
Reviewing Routing and Switching | p. 34 |
Router Hardware | p. 35 |
Out-of-Band Management | p. 37 |
In-Band Management | p. 38 |
Basic Router CLI show Commands | p. 38 |
Basic Router Configuration Using CLI | p. 46 |
Switch Hardware | p. 48 |
Basic Switch CLI Commands | p. 50 |
Summary | p. 59 |
Activities and Labs | p. 59 |
Check Your Understanding | p. 60 |
Challenge Questions and Activities | p. 63 |
Switching in an Enterprise Network | p. 65 |
Objectives | p. 65 |
Key Terms | p. 65 |
Describing Enterprise-Level Switching | p. 67 |
Switching and Network Segmentation | p. 67 |
Multilayer Switching | p. 68 |
Layer 2 | p. 69 |
Layer 3 | p. 69 |
Types of Switching | p. 69 |
Store-and-Forward | p. 70 |
Cut-Through Switching | p. 70 |
Switch Security | p. 70 |
Preventing Switching Loops | p. 71 |
Redundancy in a Switched Network | p. 72 |
Multiple Frame Transmissions | p. 74 |
MAC Database Instability | p. 75 |
Spanning Tree Protocol (STP) | p. 75 |
Blocking | p. 77 |
Listening | p. 77 |
Learning | p. 77 |
Forwarding | p. 77 |
Disabled | p. 77 |
Root Bridges | p. 78 |
Spanning Tree in a Hierarchical Network | p. 79 |
PortFast | p. 80 |
UplinkFast | p. 80 |
BackboneFast | p. 81 |
STP Diagnostic show Commands | p. 81 |
Rapid Spanning Tree Protocol (RSTP) | p. 85 |
Configuring VLANs | p. 85 |
Virtual LAN | p. 85 |
Static VLANs | p. 86 |
Dynamic VLANs | p. 87 |
Configuring a Virtual LAN | p. 87 |
Identifying VLANs | p. 91 |
Trunking and Inter-VLAN Routing | p. 92 |
Trunk Ports | p. 92 |
Access Port | p. 93 |
Trunk Port | p. 93 |
Extending VLANs Across Switches | p. 94 |
Inter-VLAN Switching | p. 95 |
Maintaining VLANs on an Enterprise LAN | p. 97 |
VLAN Trunking Protocol (VTP) | p. 97 |
VTP Modes | p. 98 |
VTP Revision Numbers | p. 98 |
VTP Message Types | p. 99 |
Configuring VTP | p. 99 |
VLAN Support for IP Telephony and Wireless | p. 102 |
VLAN Best Practices | p. 103 |
Summary | p. 105 |
Activities and Labs | p. 105 |
Check Your Understanding | p. 106 |
Challenge Questions and Activities | p. 108 |
Addressing in an Enterprise Network | p. 109 |
Objectives | p. 109 |
Key Terms | p. 109 |
Using a Hierarchical IP Network Address Scheme | p. 110 |
Flat and Hierarchical Networks | p. 110 |
Hierarchical Network Addressing | p. 112 |
Using Subnetting to Structure the Network | p. 115 |
Using VLSM | p. 116 |
Subnet Mask | p. 117 |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.