Chapter 1, Internetworking Models, in this chapter, the reader will be introduced to the basics of networking an introduction the layered approach. Such as, the OSI model and its advantages also, we will be discussing the different layers that exist and make the distinction between the upper layers and lower layers that make up the OSI model.
Chapter 2, Ethernet Networking and Data Encapsulations, in this chapter, the reader will be introduced to the networking type called Ethernet, they will be learning how packets flow in a network and when they can flow based on the access method used in Ethernet Network called CSMA/CD. Readers will learn the differences between collision domains and broadcast domains and of course the cabling of this type of network.
Chapter 3, Introducing the TCP/IP, in this chapter, the reader will be introduced to a brief history of the TCP/IP model and the DoD model, and you will gain an understanding of what protocols work on each layer and how to map the TCP/IP model to the OSI model and see the comparisons. Also, we will go over the basics of IPv4, it terminology and the hierarchical approach it uses, also to round off the chapter we will learn the different types of addresses that exits within an IPv4 world.
Chapter 4, Subnetting in IPv4, this chapter, will show readers how to subnet a Class C, Class B and Class A addresses. Learning how to subnet is an essential part in networking. This is the process of how one can logically segment a network. The readers would learn how to increase the number of broadcast domains while decreasing the amount of broadcast or noise in the Network.
Chapter 5, Variable Length Subnet Mask and Route Summarization, readers will learn how not to waste IP address in their networks. Meaning, they would only use the IPs needed to service their network. This will be presented in a form of a diagram or formula that will simplify the process of calculating VLSM. In networks, the goal of an Engineer is to minimize the routing tables on a router. The reason for this, is so that the router is not overwhelmed with the exuberant number of network addresses. Therefore, readers will be learning how to minimize the routing table using Route Summarization. Which simply means, taking multiple, smaller networks and combining them into one big network, by adjusting the prefix length.
Chapter 6, The IOS User Interface, in this chapter, the reader will be learning the Cisco Internetworking Operating system. They will learn how to connect to a Cisco Router or Switch, navigate the Command Line Interface or CLI and learn the different router modes and switch modes. We will also go into configuring basic administrative commands on both the router and the switch and of course how to view your configurations, save or delete them.
Chapter 7, Managing the Cisco Internetwork, in this chapter, the reader will be learning the components that make up a Cisco router or switch. Readers will also must understand the bootup sequence of the router to be able to troubleshoot a problem, in case one occurs doing this process. We will also dive into configuring DHCP, SYSLOG, NTP, CDP and LLDP the new version of CDP. You will be configuring Telnet, SSH, host tables, and verify that all this works using the CLI. Round off the chapter with basic troubleshooting techniques, to test for connectivity to the destination.
Chapter 8, Managing Cisco Devices, in this chapter, the reader will be learning how to manipulate the Cisco Register, to do so you will become familiar with how the register works during the boot process. You will learn to manipulate the register to be able to troubleshoot routers or switches. You will also be learning how to back up your Flash, Startup-config files and how to restore them using an FTP or TFTP server. We will finish up the chapter with Right to use Licenses and backing up and installing the license.
Chapter 9, The IP Routing Process, in this chapter, the reader will be learning the process of how a packet traverses the network from source to destination. Reader will be gain the understanding of default and static routing, not only how to configure it but when and on what router should these routes should exist. We finish the chapter with a discussion on Dynamic routing with emphasis on the RIP routing protocol. We will make examples using RIPv1, RIPv2 and RIPng.
Chapter 10, The IPv6 Protocol, in this chapter, the reader will be learning be learning the benefits of using IPv6 in your network, we will be breaking down the different components of an IPv6 address, to gain a better understanding of the IPv6 address. We will look at different ways of writing an IPv6 address and the rules or guidelines they must properly write an IPv6 address. We will also look at the main three IPv6 routing protocols, such as, RIPng, EIGRPv6 and OSPFv3. This and much more will give us an understanding how IPv6 works on an internetwork.
Chapter 11, Introduction to IPv6 Routing, in this chapter, reader will know the benefits of using dynamic routing. Also, reader will learn how to configure EIGRP for IPv6, including the topology.
Chapter 12, Switching Services and Configurations, in this chapter, the readers will be learning how a switch learns mac addresses and what does it do with those Mac addresses once its learned them. We will also be learning how to secure our layer 2 ports using the command switchport security and basic switch administration commands such as passwords, hostnames, gateway addresses and so on.
Chapter 13, VLANs and Inter-VLAN Routing, in this chapter, the reader will be learning what is a VLAN and the importance of creating VLAN's in your network not only for security purposes but decreasing the amount of broadcast in your network, while optimizing the bandwidth of each logical segment. They will understand that using VLAN's in a network creates a better administration method as well making your network more scalable. Readers will also acquire the knowledge of how to make different VLAN's talk to each other through the use of trunk ports and the 802.1q protocol.
Chapter 14, Introduction to EIGRP Routing Protocol, in this chapter, our focus will be on how EIGRP works, its features, and configuring EIGRP for single autonomous systems and multiple autonomous systems.
Chapter 15, Advanced OSPF Configurations, in this chapter, reader will be learning the basics of OSPF, its features and configuration, and much more. We will be creating multiple labs, since OSPF has different aspects that we need to learn for the certification and the real world. Not only will we be looking at single area OSPF, but also multi-area OSPF.
Chapter 16, Border Gateway Protocol, in this chapter, you will looking at BGP, specifically the External Border Gateway Protocol (eBGP). Also, you will learn about the differences between iBGP and eBGP and we will see how to configure and verify BGP.
Chapter 17, Access-Control List, in this chapter, the readers will be learning about securing their networks using Firewalls and Internal Routers using Access-List. We will learn about the different types of ACL's such as Standard, Extended and Named. We will be configuring all three of them, but to so you must also understand not only the rules that govern firewalls but how to convert a subnet mask into a wildcard mask. We will learn how to control TELNET and SSH traffic using ACL's but apply them to a line not an interface.
Chapter 18, Network Address Translation, in this chapter, the reader will be learning about the NAT protocol, why are we using it and how to configure NAT in our network. Once NAT is configured we must make sure that it is working properly, so by issuing the show IP NAT translation command we can verify that indeed it's working. We will be discussing the different types of NAT that exist, such as; Static, Dynamic and NAT Overload also known as PAT.
Chapter 19, Wide Area Networks, in this chapter, the reader will be learning about Wide Area Networks and will gain an understanding of the terms used in WAN, the different connection types and cabling that is required. This will help the reader make a more informed decision when ordering a WAN connection. Readers will be learning about the HDLC protocol and its drawbacks when compared to PPP, which reader will be configuring and learning the process and the components that make up PPP. We will also briefly touch upon VPN's and their importance when using remote users. We will discuss GRE tunnels, and gain the understanding of their use and how to configure GRE on our network.
Chapter 20, Advance Networking Topics, in this chapter we will create a large topology to include what you would need in your LAN and WAN. Also, we will cover layer 2 and layer 3 configurations. In this chapter we will configure everything that we have covered so far in this book.
Chapter 21, Mock Test Questions, will consist of mock questions for you to test your
knowledge. It tries to cover all the topics from the scope of the exam and challenges your
understanding of the topics.