<p> Introduction xxiii</p> <p>CHAPTER 1 Introduction to Computer Networks 2</p> <p> 1-1 Introduction 4</p> <p> 1-2 Network Topologies 6</p> <p> 1-3 The OSI Model 12</p> <p> 1-4 The Ethernet LAN 16</p> <p> 1-5 Home Networking 24</p> <p> 1-6 Assembling an Office LAN 38</p> <p> 1-7 Testing and Troubleshooting a LAN 45</p> <p>CHAPTER 2 Physical Layer Cabling: Twisted-Pair 62</p> <p> 2-1 Introduction 65</p> <p> 2-2 Structured Cabling 66</p> <p> 2-3 Twisted-Pair Cable 74</p> <p> 2-4 Terminating Twisted-Pair Cables 78</p> <p> 2-5 Cable Testing and Certification 92</p> <p> 2-6 10 Gigabit Ethernet over Copper 97</p> <p> 2-7 Troubleshooting Cabling Systems 102</p> <p>CHAPTER 3 Physical Layer Cabling: Fiber Optics 124</p> <p> 3-1 Introduction 126</p> <p> 3-2 The Nature of Light 129</p> <p> 3-3 Fiber Attenuation and Dispersion 136</p> <p> 3-4 Optical Components 141</p> <p> 3-5 Optical Networking 147</p> <p> 3-6 Safety 160</p> <p> 3-7 Troubleshooting Fiber Optics: The OTDR 162</p> <p>CHAPTER 4 Wireless Networking 172</p> <p> 4-1 Introduction 174</p> <p> 4-2 The IEEE 802.11 Wireless LAN Standard 175</p> <p> 4-3 802.11 Wireless Networking 185</p> <p> 4-4 Bluetooth, WiMAX, RFID, and Mobile Communications 197</p> <p> 4-5 Configuring a Point-to-Multipoint Wireless LAN: A Case Study 206</p> <p> 4-6 Troubleshooting Wireless Networks 213</p> <p>CHAPTER 5 Interconnecting the LANs 228</p> <p> 5-1 Introduction 230</p> <p> 5-2 The Network Bridge 232</p> <p> 5-3 The Network Switch 237</p> <p> 5-4 The Router 249</p> <p> 5-5 The Console Port Connection 254</p> <p> 5-6 Interconnecting LANs with the Router 262</p> <p> 5-7 Interconnecting LANs and WANs 267</p> <p>CHAPTER 6 TCP/IP 290</p> <p> 6-1 Introduction 292</p> <p> 6-2 The TCP/IP Layers 294</p> <p> 6-3 Number Conversion 306</p> <p> 6-4 IPv4 Addressing 312</p> <p> 6-5 Subnet Masks: Subnetting and Supernetting 317</p> <p> 6-6 Supernetting, CIDR Blocks, and VLSM 328</p> <p> 6-7 IPv6 Addressing 333</p> <p>CHAPTER 7 Introduction to Router Configuration 354</p> <p> 7-1 Introduction 356</p> <p> 7-2 Router Fundamentals 358</p> <p> 7-3 The Router’s User EXEC Mode (Router>) 366</p> <p> 7-4 The Router’s Privileged EXEC Mode (Router#) 373</p> <p> 7-5 Configuring the Network Interface: Auto-negotiation 383</p> <p> 7-6 Troubleshooting the Router Interface 387</p> <p>CHAPTER 8 Introduction to Switch Configuration 404</p> <p> 8-1 Introduction 406</p> <p> 8-2 Introduction to VLANs 407</p> <p> 8-3 Introduction to Switch Configuration 410</p> <p> 8-4 Spanning Tree Protocol 422</p> <p> 8-5 Power over Ethernet 425</p> <p> 8-6 Troubleshooting the Switch Interface 429</p> <p>CHAPTER 9 Routing Protocols 444</p> <p> 9-1 Introduction 446</p> <p> 9-2 Static Routing 447</p> <p> 9-3 Dynamic Routing Protocols 460</p> <p> 9-4 Distance Vector Protocols 463</p> <p> 9-5 Configuring RIP and RIPv2 466</p> <p> 9-6 Link State Protocols 476</p> <p> 9-7 Configuring the Open Shortest Path First (OSPF) Routing Protocol 481</p> <p> 9-8 Advanced Distance Vector Protocol: Configuring Enhanced Interior</p> <p> 9-9 Internet Routing with Border Gateway Protocol (BGP) 496</p> <p> 9-10 IPv6 Routing 499</p> <p>CHAPTER 10 Managing the Network Infrastructure 524</p> <p> 10-1 Introduction 527</p> <p> 10-2 Domain Name and IP Address Assignment 528</p> <p> 10-3 IP Address Management with DHCP 531</p> <p> 10-4 Scaling a Network with NAT and PAT 537</p> <p> 10-5 Domain Name System (DNS) 539</p> <p> 10-6 Network Management Protocols 546</p> <p> 10-7 Analyzing Network Traffic 552</p> <p> 10-8 Network Analyzer: Wireshark 560</p> <p> 10-9 Analyzing Computer Networks: FTP Data Packets 566</p> <p> 10-10 Troubleshooting IP Networks 568</p> <p>CHAPTER 11 Network Security 590</p> <p> 11-1 Introduction 592</p> <p> 11-2 Intrusion: How Attackers Gain Control of a Network 594</p> <p> 11-3 Denial-of-Service 606</p> <p> 11-4 Security Software and Hardware 610</p> <p> 11-5 Managing Network Access 623</p> <p> 11-6 Router Security 626</p> <p> 11-7 Switch Security 631</p> <p> 11-8 Wireless Security 637</p> <p> 11-9 Remote Access and VPN Technologies 642</p> <p> 11-10 Physical Security 659</p> <p>CHAPTER 12 Cloud Computing and Virtualization 676</p> <p> 12-1 Introduction 678</p> <p> 12-2 Virtualization 679</p> <p> 12-3 Cloud Computing 692</p> <p> 12-4 Enterprise Storage 698</p> <p>CHAPTER 13 Codes and Standards 706</p> <p> 13-1 Introduction 708</p> <p> 13-2 Safety Standards and Codes 708</p> <p> 13-3 Industry Regulatory Compliance 718</p> <p> 13-4 Business Policies, Procedures, and Other Best Practices 723</p> <p> 13-5 Business Continuity and Disaster Recovery 729</p> <p>Glossary 742</p> <p>Online Only Elements:</p> <p> Net-Challenge Software</p> <p> Wireshark Captures</p> <p> Network+ quizzes</p> <p>9780137455928, TOC, 9/28/2021</p>