CCNA Certification Networking All-in-One For Dummies By Silviu Angelescu

ccna self study pdf

Free Download CCNA Certification Networking All-in-One For Dummies Pdf

Introduction: CCNA Self Study Pdf

Purpose of Computer Networks

CCNA Certification Networking All-in-One For Dummies(CCNA Self Study Pdf), You link computers in a network for the same reason that people network. People networks are necessary to accomplish tasks that cannot be accomplished by a single individual. The same applies to computers. Computer networks were developed to aggregate the computing power of several individual computers into initially local networks, then campus networks, then metropolitan networks, then countrywide networks, and finally, global networks.
A computer network is a group of computer host devices that communicate with each other. To enable this communication, the computer host devices are connected using wired or wireless connections. The communication is controlled by network software running on the computer host devices and on network devices.
Purpose of Computer Networks
Computer host devices can be any other devices used to access the network, including servers, workstations, personal computers, smartphones, and laptops.
Network devices can be any devices that stand between computer host devices, including switches, routers, hubs, repeaters, and firewalls Network devices control and optimize communication between host devices.

Network applications

What’s the purpose? Here are just a few network application examples:
1) World Wide Web: Technically, this is a network application that allows the exchange of text pages coded in Hypertext Markup Language (HTML) using the Hypertext Transfer Protocol (HTTP). Initially, these HTML pages only supported hyperlinks to jump from one page to another. Now, HTTP and HTML have been augmented with dynamic extensions to allow a much more advanced, rich, multimedia Web experience than just jumping from one page to another.
2) Electronic mail: I am sure that you have extensively used this one. This is a network application that allows the exchange of messages between two hosts. In fact, studies show that e-mail is by far the most commonly used network application.
3) File transfer and file sharing: This network application allows the transfer of files from one computer host device to another. Several variations of this application exist, such as File Transfer Protocol (FTP), Secure FTP (SFTP), Network File System (NFS), and Server Message Block (SMB), but all versions serve the same purpose: to transfer files from one network host to another.
4) Remote control: This network application allows you to control a computer host remotely from another host in the network. As with file transfer, several remote control applications exist, such as Windows Remote Desktop, Virtual Network Computing (VNC), and remote shell (rsh).
5) Voice over IP (VoIP) and Video over IP: This network application allows the transfer of voice and video signals over the Internet Protocol. Many Web sites stream video over the Internet today. These sites use some VoIP network application to wrap their video content in IP packets and send them over the network to the computer host that requested the streamed video content. Another example of VoIP is Cisco IP phones, which are being adopted today by many organizations to save costs by concentrating their phone and data traffic over the same IP infrastructure.
6) Shared network storage: This network application connects advanced specialized storage devices to a storage network, making them accessible to any computer host connected to that storage network. Storage networks can be either

CCNA Certification Networking All-in-One For Dummies Chapters and Sections

Table Of Contents For CCNA Self Study Pdf

Introduction

About This Book (CCNA Self Study Pdf)
Foolish Assumptions
How This Book Is Organized
Icons Used in This Book
Where to Go from Here

Book I: Networking Basics
Chapter 1: Introducing Computer Networks

Purpose of Computer Networks
Network applications
Operation Flow of Computer Networks
Topologies of Computer Networks

Chapter 2: The OSI Reference Model

Introduction to the OSI Reference Model(CCNA Self Study Pdf)
Seven Layers
Layer 7: Application
Layer 6: Presentation
Layer 5: Session
Layer 4: Transport
Layer 3: Network
Layer 2: Datalink
Layer 1: Physical
Benefits of the OSI Reference Model

Chapter 3: Introducing the TCP/IP Protocol Suite

Introduction to the TCP/IP Protocol Suite
Layer 7: Application
Some TCP/IP protocols at Layer 7
Some TCP/IP software applications at Layer 7
Layer 6: Presentation
Some TCP/IP protocols at Layer 6
Some TCP/IP software applications at Layer 6
Layer 5: Session
Layer 4: Transport
Connectionless transport
Connection-oriented transport
The most common TCP/IP protocols at Layer 4
TCP flow control
UDP simplicity
TCP/IP ports
Layer 3: Network
Some TCP/IP protocols at Layer 3
Hierarchy of IP addresses
Layer 2: Data Link
Some TCP/IP protocols at Layer 2
Address resolution
Layer 1: Physical

Chapter 4: Data Encapsulation

Introducing Data Encapsulation

Chapter 5: Binary, Hexadecimal, and Decimal Numbering Systems

Decimal Numbers
Binary Numbers
Hexadecimal Numbers
Numbering systems notation
Bits, nibbles, and bytes
Converting binary to hexadecimal
Converting hexadecimal to binary

Chapter 6: Local-Area Networks (LANs)

Introduction to Local-Area Networks
Ethernet Networking
CSMA/CD protocol
Duplex communication
Ethernet Standards
10-Mbps Ethernet (IEEE 802.3)
Fast Ethernet (100-Mbps)
Gigabit Ethernet (1000-Mbps)
10 Gigabit Ethernet (10000-Mbps)
Ethernet in the OSI Model
Data link layer
Physical layer

Chapter 7: Introducing Wide-Area Networks (WANs)

Introducing Wide-Area Networks
Dedicated Leased Line Connections
Advantages of leased lines
Disadvantage of leased lines
Dedicated leased line protocols
Circuit-Switched Connections
Advantage of circuit-switched connections
Disadvantages of circuit-switched connections
Circuit-switched connection protocols
Packet-Switched Connections
Advantages of packet-switched connections
Disadvantage of packet-switched connections
Packet-switched connection protocols
Cell-Switched Connections
Advantages of cell-switched connections
Disadvantages of cell-switched connections
Cell-switched connection protocols

Chapter 8: Introducing Wireless Networks

Wireless LAN (WLAN)
Wireless WAN
Benefits and Costs of Wireless Networks
Security Risk
Service set identifier (SSID)
Wired Equivalent Privacy (WEP)
Wi-Fi Protected Access (WPA)
MAC address filtering

Chapter 9: Network Design

Cisco Hierarchical Network Model
Core Layer
Highly available core
Distribution Layer
Access Layer
Benefits
Specialization
Scalability
Limitation of problem domain

Chapter 10: Introducing Cisco Hardware and Software

Introducing Cisco Products
Cisco software
Cisco hardware
Introducing Cisco Device Configurations
Startup configuration
Running configuration
Meet the Cisco IOS User Interface
Cisco IOS command-line interface (CLI)
Cisco IOS graphical user interface (GUI)

Book II: TCP/IP
Chapter 1: Introducing TCP/IP

TCP/IP communication
We pioneered this
Components of TCP/IP
Introducing the major TCP/IP layers and protocols
Demystifying data encapsulation

Chapter 2: TCP/IP Layers and Protocols

Information Exchange through the OSI Layer
OSI Layers and Protocols
The physical layer: Layer 1
The data link layer: Layer 2
The network layer: Layer 3
The transport layer: Layer 4
The session layer: Layer 5
The presentation layer: Layer 6
The application layer: Layer 7
TCP/IP Layers and Protocols
The network access layer: Layer
The Internet layer: Layer 2
The host-to-host transport layer: Layer 3
The application layer: Layer 4

Chapter 3: IP Addressing

The Purpose of IP Addresses — It’s All about the Delivery
The Hierarchy of IP Addresses — Who’s in Charge?
Network and host addressing
Classes of IP addresses
Other reserved addresses
Understanding network ID, host ID, and subnet masks
Private IP Addresses — We Reserve the Right
Broadcasting — Shouting to the World!
Data-link Layer 2 broadcasts
Address Resolution Protocol — ARP’s on the Case, Sherlock!
The purpose of ARP
Proxy ARP
And what about RARP?

Chapter 4: Subnetting

Subnetting Basics
Purpose of subnetting
Subnet Masks
Creating subnets
Subnet mask, network ID, host ID, and broadcast IP
Classless interdomain routing (CIDR)
IP Address Class and Subnet Mask
Class C IP address subnets
IP subnet zero
Host addressing assignments
Class B IP address subnets
Class A IP address subnets
Variable-Length Subnet Masks (VLSMs)
Purpose of VLSM
VLSM design guidelines
Optimizing IP addressing with VLSM
Summarization
Summarization investigated
Summarization and VLSM

Chapter 5: Internet Protocol Version 6 (IPv6)

Internet Protocol Version 6 (IPv6)
The Benefits of IPv6
Introducing IPv6 Addressing
IPv6 address notation
Configuring IPv6
Address autoconfiguration — DHCP who?
A dynamic approach
ICMPv6
Routing with IPv6
Static routing — Gimme some static!
Introducing IPv6 routing protocols
Migrating to IPv6
Migration methods

Book III: Switching with Cisco Switches
Chapter 1: Introducing Layer 2 Switches

Layer 2 — Data Link Layer Review
Purpose of a Layer 2 Switch
Hubs
Bridges
Switches
Basic Switch Functions
Address learning
Flooding, forwarding, and filtering frames
Avoiding loops
Managing Port Security
Filter based on MAC address
Filter based on number of devices connected
Filter based on sticky MAC address
Action triggered by filter
Transmitting Unicast, Multicast, and Broadcast

Chapter 2: Managing a Switch Using Cisco IOS

Best Practice for Using Cisco Switches
Connecting to a Cisco Switch
Connecting locally
Connecting remotely
Cisco Switch Startup Process
Configuring a Cisco Switch
Initial switch configuration
Managing Cisco switch configuration
Managing Cisco Switch Authentication
Console password
Telnet password
Auxiliary password
Privileged password
Encrypting passwords
Enabling Secure Shell (SSH)
Recovering switch passwords

Chapter 3: Controlling Network Traffic with Cisco Switches

Sending to MAC Addresses in Remote Networks
Sending frames within the LAN
Sending frames to a remote network
Deciding the Fate of Frames
Switching Modes
Switching in Half-Duplex and Full-Duplex Modes
Reviewing half-duplex Ethernet
Reviewing full-duplex Ethernet
Duplex mode best practice
Configuring port duplex mode on a Cisco switch
Configuring port speed on a Cisco switch
Selecting a switch port
Avoiding Loops with Spanning Tree Protocol (STP)

Chapter 4: Spanning Tree Protocol (STP)

Introducing the Spanning Tree Protocol (STP)
STP Operation Flow
Electing a root bridge
Assigning STP port types
Achieving STP convergence
Introducing Cisco Options for STP
PortFast
BPDUGuard
BPDUFilter
UplinkFast
BackboneFast
Introducing Rapid Spanning Tree Protocol (RSTP)
Shorter delay before STP recalculation (max age timer)
Alternate port and backup port
Enabling RSTP on a Cisco switch
EtherChannel
EtherChannel and STP are friends
EtherChannel versions
Enabling EtherChannel on SW2 and SW5
Monitoring STP
Monitoring switch STP configuration
Monitoring port STP configuration

Chapter 5: Virtual Local Area Networks (VLANs)

Introducing Virtual Local Area Networks (VLANs)
VLANs keep things tidy
VLANs subdivide the broadcast domain
Benefits of VLANs
Managing VLAN
Create VLANs
Special-purpose VLANs
Static and dynamic VLAN membership
Identifying VLANs
Tagging data-link frames with a VLAN ID
VLAN Trunking
EtherChannel and VLANs are friends
VLAN or EtherChannel trunking? Both?
Configuring EtherChannel and VLAN trunking
Introducing switch port types
Managing VLAN trunk ports
VLAN Trunking Protocol (VTP)
VTP creates and manages VLANs
VTP does not manage VLAN port membership
VTP benefits
VTP domain
VTP server
VTP switch operating mode
VTP updates
VTP pruning
VLAN ID range
VTP requirements
Enabling VTP
Monitoring and troubleshooting VTP
Routing Traffic from One VLAN to Another
One router per VLAN
One large router with one port per VLAN
One subinterface per VLAN (router-on-a-stick)
Network (Layer 3) switch

Chapter 6: Voice over IP (VoIP)

Introducing Voice over IP (VoIP)
VoIP Requires Quality of Service (QoS)
Class of service (CoS) (IEEE 802.1p)
Cisco IP Phone
Cisco Discovery Protocol (CDP)
Negotiating VLAN
Negotiating CoS
Negotiating Cisco IP phone PC port
Configuring VoIP on Cisco Switches
Enabling QoS on the upstream switch
Configuring switch access port to trust CoS
Enabling VoIP VLAN on the switch access port

Chapter 7: Troubleshooting a Switch Using Cisco IOS

Troubleshooting Cisco Switches
Gathering information about the switch
Troubleshooting switch connectivity
Gather information about your network
Troubleshooting the startup configuration
Troubleshooting the running configuration

Book IV: Routing with Cisco Routers
Chapter 1: Introducing Layer 3 Routers

Layer 3 — Network Layer Review
Purpose of a Layer 3 Router
Basic Router Functions
Managing routing protocols
Building routing tables
Routing packets

Chapter 2: Managing a Router Using Cisco IOS

Best Practices for Using Cisco Routers
Connecting to a Cisco Router
Connecting locally
Connecting remotely
Cisco Router Startup Process
Configuring a Cisco Router
Initial router configuration
Managing Cisco router configuration
Managing Cisco Router Authentication
Console password
Telnet password
Auxiliary password
Privileged password
Encrypting passwords
Enabling Secure Shell (SSH)
Recovering router passwords

Chapter 3: Network Routing

Introducing Network Routes
Static routes
Default routes
Dynamic routes
Routing Protocols
Routed Protocols
Routing Decision Criteria
Administrative distance
Routing protocol metrics
Routing Methods
Distance vector routing
Link-state routing
Hybrid routing
Configuring Routing Protocols

Chapter 4: Routing Information Protocol (RIP)

Introducing Routing Information Protocol (RIP)
An interior gateway protocol
Routing tables, updates, and hop count
Routing error mitigation methods
Split horizon
Convergence and timers
RIPv1
RIPv2
RIPng
Configuring RIP
Verifying RIP

Chapter 5: Enhanced Interior Gateway Routing Protocol (EIGRP)

IGRP — The Foundation of EIGRP
EIGRP Benefits
Characteristics of EIGRP
EIGRP Operation
Basic components
Routing tables
Neighboring successors
EIGRP packet types
Convergence
Route updates
DUAL — Diffusing Update Algorithm
Classful and classless routing
Configuring EIGRP
Startup EIGRP
Enable EIGRP on router interfaces
Verifying and Monitoring EIGRP Operation
Inspect the routing table
Inspect EIGRP protocol configuration
Inspect EIGRP topology table configuration
Inspect EIGRP neighbor information
Troubleshooting EIGRP

Chapter 6: Open Shortest Path First (OSPF) Protocol

Introducing Open Shortest Path First (OSPF)
Routing tables
Characteristics of OSPF
Convergence
Route updates
Cost metric
OSPF Routing Hierarchy
OSPF route summarization
OSPF designated router (DR)
OSPF backup designated router (BDR)
Configuring OSPF
Startup OSPF
Enable OSPF on router interfaces
Configure OSPF options
Verifying and Monitoring OSPF Operation
Inspect the routing table
Inspect the OSPF protocol configuration
Inspect the OSPF interface configuration
Inspect the OSPF neighbor information
Inspect the OSPF routing database
Troubleshooting OSPF

Book V: Wireless Networks
Chapter 1: Introducing Wireless Networks

Purpose of Wireless Networks
Going over the Air, Locally or Globally
Wireless personal area network (WPAN)
Wireless local-area network (WLAN)
Wireless metropolitan-area network (WMAN)
Wireless wide-area network (WWA)
Sharing the Airwaves
Using unlicensed radio bands
Modulating the Airwaves
Introducing signals
Modulating signals
Using RF channels
Introducing RF modulation techniques
Introducing Wireless Local-Area Network (WLAN)
Standards (IEEE 802.11)
2.4-GHz band
5-GHz band
2.4-GHz and 5-GHz bands

Chapter 2: Wireless Local Area Network (WLAN) Security

Recognizing Security Risks
Introducing Security Risk Mitigation Methods
Authentication and data encryption
MAC address filtering
Hiding the service set identifier (SSID)
Intrusion detection and intrusion prevention
Changing default passwords
Management access

Chapter 3: Wireless Local Area Network (WLAN) Operation Modes

Ad Hoc Mode
Infrastructure Mode
Autonomous mode
Lightweight mode
Service set
Basic service set (BSS)
Extended service set (ESS)
Network planning and layout

Chapter 4: Managing Cisco Wireless Local Area Networks

Introducing the Cisco Unifi ed Wireless
Network Architecture (CUWN)
Cisco Wireless LAN Controller
Cisco WLAN Access Point (AP) Devices
Cisco Wireless Control System (WCS)
Lightweight Access Point Protocol (LWAPP)
Adaptive Wireless Path Protocol (AWPP)

Chapter 5: Configuring Cisco Wireless Local Area Networks

Confi guration Flow
Set up and verify the wired LAN to
which the WLAN will connect
Set up the Cisco Wireless LAN Controller(s)
Configure WLAN security
Set up Cisco access point(s)
Configuring backup controllers
Web authentication process
Example using the Cisco graphical user interface (GUI)

Book VI: Network Security
Chapter 1: Network Security Basics

Network Zoning
Recognizing Security Risks
Information collectors
Introducing Security Risk Mitigation Methods
IP access control lists (ACLs)
NAT — The great masquerader
Virtual Private Networks (VPNs)
Cisco IOS Firewall
Cisco IOS Firewall — A sample confi guration

Chapter 2: Introducing IP Access Lists (IP ACLs)

The Purpose of Access Lists
Types of ACLs
Managing ACLs — Best Practices
Creating ACLs
Wildcard IP masks
Creating and applying the ACL
Creating standard ACLs
Creating extended ACLs
Creating Telnet/SSH ACLs
Creating named ACLs
Creating time-oriented ACLs
Creating switch port ACLs
Managing, Verifying, and Troubleshooting ACLs
Logging ACL IP matches
Configuring firewalls and ACLs with Cisco SDM GUI

Chapter 3: Introducing Network Address Translation (NAT)

Purpose of NAT
Types of Network Address Translation
Local and global addresses
Operational Flow of NAT
Static NAT
Dynamic NAT operation
How overloading (PAT) operates
Configuring NAT
Configuring static NAT
Configuring dynamic NAT
Configuring Port Address Translation (PAT)
Managing NAT
Monitoring and troubleshooting NAT
Using the CLI commands
Configuring NAT with the Cisco SDM GUI

Chapter 4: Introducing Virtual Private Networks (VPNs)

Purpose of VPNs
Type of VPNs
Choosing a VPN Implementation Method
Using IPsec
Using Secure Socket Layer (SSL)
Using tunneling
Split Tunneling
Creating and Managing IPsec VPNs
Introducing IPsec protocols
Choosing transport mode versus tunnel mode
Configuring Cisco Virtual Private Networks
Creating a VPN with the Cisco Security
Device Manager (SDM)
Enabling quality of service (QoS) in the VPN using Cisco SDM

Book VII: Wide Area Networks (WAN)
Chapter 1: Wide-Area Networking Basics

Introducing WANs
Purpose of WANsData terminal equipment (DTE) and data
communications equipment (DCE)
Cisco serial interfaces
DCE serial interfaces
Connection Types
Encapsulation Types
HDLC (High-Level Data Link Control)
PPP (Point-to-Point Protocol)
SLIP (Serial Line Internet Protocol)
Frame Relay
ATM (Asynchronous Transfer Mode)
X.25
Introducing Cable Connections
RJ-45 cabling
DB-25 cabling and adapters
Introducing Digital Subscriber Line (DSL) Connections

Chapter 2: HDLC (High-Level Data Link Control) Protocol

Introducing the High-Level Data Link Control Protocol
HDLC links
Data framing
SLARP
Configuring HDLC
Monitoring HDLC

Chapter 3: PPP (Point-to-Point Protocol)

What Is PPP? in (CCNA Self Study Pdf)
Operational Flow of PPP
Link Control Protocol (LCP)
Purpose of LCP
LCP options
Network Control Protocol (NCP)
PAP and CHAP Authentication
Password Authentication Protocol (PAP)
Challenge Handshake Authentication Protocol (CHAP)
Configuring PPP
Set up router hostnames used for authentication
Configure passwords to authenticate between routers
Configure PPP encapsulation on the router interface
Configure PAP and CHAP authentication on both routers
Configuring PPP callback for ISDN Dial on
Demand Routing (DDR)
Configuring PPP with the Cisco Security
Device Manager (SDM)
Monitoring and Troubleshooting PPP
PPP link quality monitoring
PPP debug commands

Chapter 4: Frame Relay

Introducing Frame Relay (CCNA Self Study Pdf)
Purpose of Frame Relay WAN connections
Establishing virtual circuits
Identifying virtual circuits using data-link
connection identifiers (DLCIs)
Reserving bandwidth using access rate and CIR guarantee
Frame Relay link status control using LMI
Frame Relay frame structure
Frame Relay flow and congestion control using DE, FECN, and BECN
Frame Relay address resolution using Inverse ARP
Managing Frame Relay
Frame Relay topologies
Operational flow of Frame Relay
Split horizon issues in a Frame Relay WAN
Configuring single interfaces for Frame Relay over a point-to-point link
Configuring subinterfaces for Frame Relay over multipoint links
Configuring Frame Relay with the Cisco Router and Security Device Manager (SDM)
Monitoring and Troubleshooting Frame Relay
Appendix A: About the CD
System Requirements
Using the CD(CCNA Self Study Pdf)
What You Will Find on the CD
Prep Test
Troubleshooting
Appendix B: Cisco CCNA Exam Preparation
CCNA: Foundation of Cisco Certification Pyramid
CCNA Skills(CCNA Self Study Pdf)
CCNA Adaptive Testing
Using This Book to Prepare for the Exams
Making Arrangements to Take the Exams
The Day the Earth Stood Still: Exam Day
Arriving at the exam location
Taking the exam
2009 Examination Objectives
Index

Download Now

Note: If you have any question about Download Free CCNA Self Study Pdf Then you can comment it.

Related Posts:


Be the first to comment

Leave a Reply

Your email address will not be published.


*