You are previewing CCDA Official Exam Certification Guide, Third Edition.
O'Reilly logo
CCDA Official Exam Certification Guide, Third Edition

Book Description

CCDA Official Exam Certification Guide

Third Edition

  • Master all 640-863 exam topics with the official study guide

  • Assess your knowledge with chapter-opening quizzes

  • Review key concepts with foundation summaries

  • Practice with hundreds of exam questions on the CD-ROM

  • Anthony Bruno, CCIE® No. 2738

    Steve Jordan, CCIE No. 11293

    CCDA Official Exam Certification Guide, Third Edition, is a best-of-breed Cisco® exam study guide that focuses specifically on the topics for the DESGN exam. Senior networking consultants Anthony Bruno and Steve Jordan expertly cover the latest exam content, helping you identify areas of weakness and improve your knowledge of Cisco network design. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.

    CCDA Official Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. “Do I Know This Already?” quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists and concise Foundation Summary information make referencing easy and give you a quick refresher whenever you need it. Challenging chapter-ending review questions help you assess your knowledge and reinforce key concepts.

    The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback on a topic-by-topic basis, presenting question-by-question remediation to the text.

    Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time.

    CCDA Official Exam Certification Guide, Third Edition, is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining.

    A. Anthony Bruno, CCIE® No. 2738, is a senior principal consultant with British Telecom with more than 17 years experience in the internetworking field. He has consulted for many enterprise and service-provider customers in the design, implementation, and optimization of large-scale data and IP telephony networks.

    Steve Jordan, CCIE No. 11293, is a senior consultant with British Telecom with more than 11 years of experience in internetworking. He has extensive experience with large-scale data-center environments and has designed and implemented various network solutions in the manufacturing, telecommunication, and transportation industries.

    This official study guide helps you master all the topics on the DESGN exam, including

  • Network design methodology

  • Network structure models

  • Enterprise LAN design

  • Wireless LAN design

  • Enterprise edge module design

  • WAN design

  • IPv4 and IPv6

  • Routing protocol selection

  • RIP, EIGRP, OSPF, and IS-IS

  • BGP, route manipulation, and IP multicast

  • Security management, technologies, and design

  • Voice architectures and IP telephony design

  • Network management protocols

  • Companion CD-ROM

    The CD-ROM contains an electronic copy of the book and more than 200 practice questions for the DESGN exam, all available in study mode, test mode, and flash card format.

    This volume is part of the Exam Certification Guide Series from Cisco Press®. Books in this series provide officially developed exam preparation materials that offer assessment, review, and practice to help Cisco Career Certification candidates identify weaknesses, concentrate their study efforts, and enhance their confidence as exam day nears.

    Category: Cisco Press—Cisco Certification

    Covers: CCDA® DESGN exam 640-863

    Table of Contents

    1. Copyright
      1. Dedications
    2. About the Authors
    3. About the Technical Reviewers
    4. Acknowledgments
    5. Command Syntax Conventions
    6. Foreword
    7. Introduction
      1. Strategies for Exam Preparation
      2. How This Book Is Organized
      3. Features of This Book
      4. CCDA Exam Topics
    8. I. General Network Design
      1. 1. Network Design Methodology
        1. “Do I Know This Already?” Quiz
        2. Foundation Topics
        3. Intelligent Information Network and Service-Oriented Network Architecture
          1. IIN Framework
          2. SONA
            1. Network Infrastructure Layer
            2. Interactive Service Layer
              1. Infrastructure Services
              2. Application Networking Services
            3. Application Layer
            4. Benefits of SONA
        4. Prepare, Plan, Design, Implement, Operate, and Optimize Phases
          1. Prepare Phase
          2. Plan Phase
          3. Design Phase
          4. Implement Phase
          5. Operate Phase
          6. Optimize Phase
          7. Design Methodology Under PPDIOO
        5. Identifying Customer Requirements
        6. Characterizing the Existing Network
          1. Steps in Gathering Information
          2. Network Audit Tools
          3. Network Analysis Tools
          4. Network Checklist
        7. Designing the Network Topology and Solutions
          1. Top-Down Approach
          2. Pilot and Prototype Tests
          3. Design Document
        8. References and Recommended Reading
        9. Foundation Summary
        10. Q&A
      2. 2. Network Structure Models
        1. “Do I Know This Already?” Quiz
        2. Foundation Topics
        3. Hierarchical Network Models
          1. Benefits of the Hierarchical Model
          2. Hierarchical Network Design
            1. Core Layer
            2. Distribution Layer
            3. Access Layer
          3. Hierarchical Model Examples
        4. Cisco Enterprise Architecture Model
          1. Enterprise Campus Module
          2. Enterprise Edge Module
            1. E-Commerce
            2. Internet Edge
            3. VPN/Remote Access
            4. Enterprise WAN
          3. Service Provider (SP) Edge Module
          4. Remote Modules
            1. Enterprise Branch Module
            2. Enterprise Data Center Module
            3. Enterprise Teleworker Module
        5. Network Availability
          1. Workstation-to-Router Redundancy
            1. ARP
            2. Explicit Configuration
            3. RDP
            4. RIP
            5. HSRP
            6. GLBP
          2. Server Redundancy
          3. Route Redundancy
            1. Load Balancing
            2. Increasing Availability
          4. Media Redundancy
        6. References and Recommended Reading
        7. Foundation Summary
        8. Q&A
    9. II. LAN and WAN Design
      1. 3. Enterprise LAN Design
        1. “Do I Know This Already?” Quiz
        2. Foundation Topics
        3. LAN Media
          1. Ethernet Design Rules
            1. 10-Mbps Fiber Ethernet Design Rules
            2. 100-Mbps Fast Ethernet Design Rules
              1. 100BASE-TX Fast Ethernet
              2. 100BASE-T4 Fast Ethernet
              3. 100BASE-FX Fast Ethernet
              4. 100BASE-T Repeaters
          2. Gigabit Ethernet Design Rules
            1. 1000BASE-LX Long-Wavelength Gigabit Ethernet
            2. 1000BASE-SX Short-Wavelength Gigabit Ethernet
            3. 1000BASE-CX Gigabit Ethernet over Coaxial Cable
            4. 1000BASE-T Gigabit Ethernet over UTP
          3. 10 Gigabit Ethernet (10GE) Design Rules
            1. 10GE Media Types
          4. Fast EtherChannel
          5. Token Ring Design Rules
        4. LAN Hardware
          1. Repeaters
          2. Hubs
          3. Bridges
          4. Switches
          5. Routers
          6. Layer 3 Switches
        5. LAN Design Types and Models
          1. Best Practices for Hierarchical Layers
            1. Access Layer Best Practices
            2. Distribution Layer Best Practices
            3. Core Layer Best Practices
          2. Large-Building LANs
          3. Enterprise Campus LANs
            1. Edge Distribution
          4. Medium Site LANs
          5. Small and Remote Site LANs
          6. Server-Farm Module
            1. Server Connectivity Options
          7. Enterprise Data Center Infrastructure
          8. Campus LAN Quality of Service Considerations
          9. Multicast Traffic Considerations
            1. CGMP
            2. IGMP Snooping
        6. References and Recommended Readings
        7. Foundation Summary
        8. Q&A
      2. 4. Wireless LAN Design
        1. “Do I Know This Already?” Quiz
        2. Foundation Topics
        3. Wireless LAN Technologies
          1. Wireless LAN Standards
            1. ISM and UNII Frequencies
            2. Summary of Wireless LAN Standards
          2. Service Set Identifier (SSID)
          3. WLAN Layer 2 Access Method
          4. WLAN Security
            1. Unauthorized Access
            2. WLAN Security Design Approach
            3. IEEE 802.1X-2001 Port-Based Authentication
            4. Dynamic WEP Keys and LEAP
            5. Controlling WLAN Access to Servers
        4. Cisco Unified Wireless Network
          1. Cisco UWN Architecture
          2. LWAPP
            1. LWAPP Access Point Modes
            2. LWAPP Discovery
          3. WLAN Authentication
            1. Authentication Options
          4. WLAN Controller Components
            1. WLC Interface Types
            2. AP Controller Equipment Scaling
          5. Roaming and Mobility Groups
            1. Intracontroller Roaming
            2. Layer 2 Intercontroller Roaming
            3. Layer 3 Intercontroller Roaming
            4. Mobility Groups
        5. Wireless LAN Design
          1. Controller Redundancy Design
            1. N+1 WLC Redundancy
            2. N+N WLC Redundancy
            3. N+N+1 WLC Redundancy
          2. Radio Management and Radio Groups
            1. Radio Frequency (RF) Groups
          3. RF Site Survey
          4. Using EoIP Tunnels for Guest Services
          5. Wireless Mesh for Outdoor Wireless
            1. Mesh Design Recommendations
          6. Campus Design Considerations
          7. Branch Design Considerations
            1. Local MAC
            2. REAP
            3. Hybrid REAP
            4. Branch Office Controller Options
        6. References and Recommended Readings
        7. Foundation Summary
        8. Q&A
      3. 5. WAN Technologies
        1. “Do I Know This Already?” Quiz
        2. Foundation Topics
        3. WAN Technology Overview
          1. WAN Defined
          2. WAN Connection Modules
          3. WAN Comparison
            1. Dialup
            2. ISDN
              1. ISDN BRI Service
              2. ISDN PRI Service
            3. Frame Relay
              1. Local Management Interface
              2. Discard Eligibility
            4. Time-Division Multiplexing
            5. SONET/SDH
            6. Multiprotocol Label Switching
          4. Other WAN Technologies
            1. Digital Subscriber Line
            2. Cable
            3. Wireless
            4. Dark Fiber
            5. Dense Wave Division Multiplexing
          5. Ordering WAN Technology and Contracts
        4. WAN Design Methodology
          1. Response Time
          2. Throughput
          3. Reliability
          4. Bandwidth Considerations
          5. Window Size
          6. Data Compression
        5. Optimizing Bandwidth Using QoS
          1. Queuing, Traffic Shaping, and Policing
            1. Priority Queuing
            2. Custom Queuing
            3. Weighted Fair Queuing
            4. Class-Based Weighted Fair Queuing
            5. Low-Latency Queuing
            6. Traffic Shaping and Policing
        6. References and Recommended Readings
        7. Foundation Summary
        8. Q&A
      4. 6. WAN Design
        1. “Do I Know This Already?” Quiz
        2. Foundation Topics
        3. Traditional WAN Technologies
          1. WAN Topologies
            1. Hub-and-Spoke Topology
            2. Full-Mesh Topology
            3. Partial-Mesh Topology
        4. Remote-Access Network Design
        5. VPN Network Design
          1. Overlay VPNs
          2. Virtual Private Dialup Networks
          3. Peer-to-Peer VPNs
          4. VPN Benefits
        6. WAN Backup Design
          1. Load-Balancing Guidelines
          2. WAN Backup over the Internet
        7. Layer 3 Tunneling
        8. Enterprise WAN Architecture
          1. Cisco Enterprise MAN/WAN
          2. Enterprise WAN/MAN Architecture Comparison
        9. Enterprise Edge Components
          1. Hardware Selection
          2. Software Selection
            1. Cisco IOS Packaging
            2. Comparing Hardware and Software
        10. Enterprise Branch Architecture
          1. Branch Design
            1. Enterprise Branch Profiles
            2. Single-Tier Design
            3. Dual-Tier Design
            4. Multi-Tier Design
        11. Enterprise Teleworker (Branch of One) Design
        12. References and Recommended Readings
        13. Foundation Summary
        14. Q&A
    10. III. The Internet Protocol and Routing Protocols
      1. 7. Internet Protocol Version 4
        1. “Do I Know This Already?” Quiz
        2. Foundation Topics
        3. IPv4 Header
          1. ToS
          2. IPv4 Fragmentation
        4. IPv4 Addressing
          1. IPv4 Address Classes
            1. Class A Addresses
            2. Class B Addresses
            3. Class C Addresses
            4. Class D Addresses
            5. Class E Addresses
          2. IPv4 Private Addresses
          3. NAT
        5. IPv4 Address Subnets
          1. Mask Nomenclature
          2. IP Address Subnet Design Example
          3. Determining the Network Portion of an IP Address
          4. VLSMs
            1. VLSM Address-Assignment Example
            2. Loopback Addresses
            3. IP Telephony Networks
            4. CIDR and Summarization
        6. Address Assignment and Name Resolution
          1. Static and Dynamic IP Address Assignment
          2. BOOTP
          3. DHCP
          4. DNS
          5. ARP
        7. References and Recommended Readings
        8. Foundation Summary
        9. Q&A
      2. 8. Internet Protocol Version 6
        1. “Do I Know This Already?” Quiz
        2. Foundation Topics
        3. Introduction to IPv6
        4. IPv6 Header
        5. IPv6 Address Representation
          1. IPv4-Compatible IPv6 Addresses
          2. IPv6 Prefix Representation
        6. IPv6 Address Types and Address Allocations
          1. IPv6 Unicast Address
          2. IPv6 Anycast Address
          3. IPv6 Multicast Address
          4. IPv6 Address Allocations
            1. Unspecified Address
            2. Loopback Address
            3. IPv4-Compatible IPv6 Address
            4. Global Unicast Addresses
            5. Link-Local Addresses
            6. Site-Local Addresses
            7. Multicast Addresses
        7. IPv6 Mechanisms
          1. ICMPv6
          2. IPv6 Network Discovery (ND) Protocol
          3. IPv6 Name Resolution
          4. Path MTU Discovery
          5. IPv6 Address-Assignment Strategies
            1. Autoconfiguration of Link-Local Address
            2. DHCPv6
          6. IPv6 Security
          7. IPv6 Routing Protocols
            1. RIPng for IPv6
            2. EIGRP for IPv6
            3. OSPFv3 for IPv6
            4. IS-IS for IPv6
            5. BGP4 Multiprotocol Extensions for IPv6
        8. IPv4 to IPv6 Transition Strategies and Deployments
          1. IPv6 over Dedicated WAN Links
          2. IPv6 over IPv4 Tunnels
          3. Dual-Stack Backbones
            1. Dual-Stack Hosts
          4. Protocol Translation Mechanisms
        9. IPv6 Comparison with IPv4
        10. References and Recommended Readings
        11. Foundation Summary
        12. Q&A
      3. 9. Routing Protocol Selection Criteria
        1. “Do I Know This Already?” Quiz
        2. Foundation Topics
        3. Routing Protocol Characteristics
          1. Static Versus Dynamic Route Assignment
          2. Interior Versus Exterior Routing Protocols
          3. Distance-Vector Routing Protocols
            1. EIGRP
          4. Link-State Routing Protocols
          5. Distance-Vector Routing Protocols Versus Link-State Protocols
          6. Hierarchical Versus Flat Routing Protocols
          7. Classless Versus Classful Routing Protocols
          8. IPv4 Versus IPv6 Routing Protocols
          9. Administrative Distance
        4. Routing Protocol Metrics and Loop Prevention
          1. Hop Count
          2. Bandwidth
          3. Cost
          4. Load
          5. Delay
          6. Reliability
          7. Maximum Transmission Unit (MTU)
          8. Routing Loop-Prevention Schemes
            1. Split Horizon
            2. Split Horizon with Poison Reverse
            3. Counting to Infinity
          9. Triggered Updates
          10. Summarization
        5. ODR
        6. References and Recommended Readings
        7. Foundation Summary
        8. Q&A
      4. 10. RIP and EIGRP Characteristics and Design
        1. “Do I Know This Already?” Quiz
        2. Foundation Topics
        3. RIPv1
          1. RIPv1 Forwarding Information Base
          2. RIPv1 Message Format
          3. RIPv1 Timers
            1. Update Timer
            2. Invalid Timer
            3. Flush Timer
            4. Holddown Timer
          4. RIPv1 Design
          5. RIPv1 Summary
        4. RIPv2
          1. Authentication
            1. MD5 Authentication
          2. RIPv2 Forwarding Information Base
          3. RIPv2 Message Format
          4. RIPv2 Timers
          5. RIPv2 Design
          6. RIPv2 Summary
        5. RIPng
          1. RIPng Timers
          2. Authentication
          3. RIPng Message Format
          4. RIPng Design
          5. RIPng Summary
        6. IGRP
          1. IGRP Timers
          2. IGRP Metrics
          3. IGRP Design
          4. IGRP Summary
        7. EIGRP for IPv4 Networks
          1. EIGRP Components
            1. Protocol-Dependent Modules
            2. Neighbor Discovery and Recovery
            3. RTP
            4. DUAL
          2. EIGRP Timers
          3. EIGRP Metrics
          4. EIGRP Packet Types
          5. EIGRP Design
          6. EIGRP Summary
        8. EIGRP for IPv6 Networks
          1. EIGRP for IPv6 Design
          2. EIGRP for IPv6 Summary
        9. References and Recommended Readings
        10. Foundation Summary
          1. RIPv1 Summary
          2. RIPv2 Summary
          3. RIPng Summary
          4. EIGRP for IPv4 Summary
          5. EIGRP for IPv6 Summary
        11. Q&A
      5. 11. OSPF and IS-IS
        1. “Do I Know This Already?” Quiz
        2. Foundation Topics
        3. OSPFv2
          1. OSPFv2 Concepts and Design
            1. OSPFv2 Metric
            2. OSPFv2 Adjacencies and Hello Timers
            3. OSPFv2 Areas
            4. OSPF Router Types
            5. OSPF DRs
            6. LSA Types
              1. AS External Path Types
            7. OSPF Stub Area Types
              1. Stub Areas
              2. Totally Stubby Areas
              3. NSSAs
            8. Virtual Links
            9. OSPFv2 Router Authentication
          2. OSPFv2 Summary
        4. OSPFv3
          1. OSPFv3 Changes from OSPFv2
          2. OSPFv3 Areas and Router Types
          3. OSPFv3 Link State Advertisements
          4. OSPFv3 Summary
        5. IS-IS
          1. IS-IS Metrics
          2. IS-IS Operation and Design
            1. NET
            2. IS-IS DRs
            3. IS-IS Areas
            4. IS-IS Authentication
          3. IS-IS for IPv6
          4. IS-IS Summary
        6. References and Recommended Readings
        7. Foundation Summary
        8. OSPFv2 Summary
        9. OSPFv3 Summary
        10. IS-IS Summary
        11. Q&A
      6. 12. Border Gateway Protocol, Route Manipulation, and IP Multicast
        1. “Do I Know This Already?” Quiz
        2. Foundation Topics
        3. BGP
          1. BGP Neighbors
            1. eBGP
            2. iBGP
              1. Other Uses of iBGP
          2. Route Reflectors
          3. Confederations
          4. BGP Administrative Distance
          5. BGP Attributes, Weight, and the BGP Decision Process
            1. BGP Path Attributes
            2. Next-Hop Attribute
            3. Local Preference Attribute
            4. Origin Attribute
            5. AS Path Attribute
            6. MED Attribute
            7. Community Attribute
            8. Atomic Aggregate and Aggregator Attributes
            9. Weight
            10. BGP Decision Process
          6. BGP Summary
        4. Route Manipulation
          1. PBR
          2. Route Summarization
          3. Route Redistribution
            1. Default Metric
            2. OSPF Redistribution
        5. IP Multicast Review
          1. Multicast Addresses
          2. Layer 3 to Layer 2 Mapping
          3. IGMP
            1. IGMPv1
            2. IGMPv2
            3. IGMPv3
            4. CGMP
            5. IGMP Snooping
          4. Sparse Versus Dense Multicast Routing Protocols
          5. Multicast Source and Shared Trees
          6. PIM
            1. PIM-SM
              1. Joining PIM-SM
              2. Pruning PIM-SM
            2. PIM DR
            3. Auto-RP
            4. PIMv2 Bootstrap Router
          7. DVMRP
          8. IPv6 Multicast Addresses
        6. References and Recommended Readings
        7. Foundation Summary
        8. BGP Summary
        9. Route Redistribution
        10. IP Multicast
        11. Q&A
    11. IV. Security, Convergence, and Network Management
      1. 13. Security Management
        1. “Do I Know This Already?” Quiz
        2. Foundation Topics
        3. Network Security Overview
          1. Security Legislation
        4. Security Threats
          1. Reconnaissance and Port Scanning
          2. Vulnerability Scanners
          3. Unauthorized Access
        5. Security Risks
          1. Targets
          2. Loss of Availability
          3. Integrity Violations and Confidentiality Breaches
        6. Security Policy and Process
          1. Security Policy Defined
          2. Basic Approach of a Security Policy
          3. Purpose of Security Policies
          4. Security Policy Components
          5. Risk Assessment
          6. Continuous Security
          7. Integrating Security Mechanisms into Network Design
        7. Trust and Identity Management
          1. Trust
            1. Domains of Trust
          2. Identity
            1. Passwords
            2. Tokens
            3. Certificates
          3. Access Control
        8. Secure Connectivity
          1. Encryption Fundamentals
          2. Encryption Keys
          3. VPN Protocols
          4. Transmission Confidentiality
          5. Data Integrity
        9. Threat Defense
          1. Physical Security
          2. Infrastructure Protection
        10. References and Recommended Readings
        11. Foundation Summary
        12. Q&A
      2. 14. Security Technologies and Design
        1. “Do I Know This Already?” Quiz
        2. Foundation Topics
        3. Cisco Self-Defending Network
          1. Network Security Platforms
          2. Self-Defending Network Phases
        4. Trust and Identity Technologies
          1. Firewall ACLs
          2. NAC Framework and Appliance
          3. Cisco Identity-Based Network Services
          4. Identity and Access Control Deployments
        5. Detecting and Mitigating Threats
          1. Threat Detection and Mitigation Technologies
          2. Threat Detection and Mitigation Solutions
        6. Security Management Applications
          1. Security Platform Solutions
        7. Integrating Security into Network Devices
          1. IOS Security
          2. ISR Security Hardware Options
          3. Cisco Security Appliances
          4. Intrusion Prevention
          5. Catalyst 6500 Services Modules
          6. Endpoint Security
        8. Securing the Enterprise
          1. Implementing Security in the Campus
          2. Implementing Security in the Data Center
          3. Implementing Security in the Enterprise Edge and WAN
        9. References and Recommended Readings
        10. Foundation Summary
        11. Q&A
      3. 15. Traditional Voice Architectures and IP Telephony Design
        1. “Do I Know This Already?” Quiz
        2. Foundation Topics
        3. Traditional Voice Architectures
          1. PBX and PSTN Switches
          2. Local Loop and Trunks
          3. Ports
          4. Major Analog and Digital Signaling Types
            1. Loop-Start Signaling
            2. Ground-Start Signaling
            3. E&M Signaling
            4. CAS and CCS Signaling
              1. T1/E1 CAS
              2. ISDN PRI/BRI
              3. Q.SIG
              4. SS7
              5. Addressing Digit Signaling
          5. PSTN Numbering Plan
          6. Other PSTN Services
            1. Centrex Services
            2. Voice Mail
            3. Database Services
            4. IVR
            5. ACD
          7. Voice Terminology
            1. Grade of Service
            2. Erlangs
            3. Centum Call Second (CCS)
            4. Busy Hour
            5. Busy Hour Traffic (BHT)
            6. Blocking Probability
            7. Call Detail Records
        4. Integrated Multiservice Networks
          1. VoFR
          2. VoATM
          3. VoIP
          4. IPT Components
            1. Design Goals of IP Telephony
          5. IPT Deployment Models
            1. Single-Site Deployment
            2. Multisite Centralized WAN Call-Processing Model
            3. Multisite Distributed WAN Call-Processing Model
            4. Unified CallManager Express Deployments
          6. Codecs
            1. Analog-to-Digital Signal Conversion
            2. Codec Standards
          7. VoIP Control and Transport Protocols
            1. DHCP, DNS, and TFTP
            2. SSCP
            3. RTP and RTCP
            4. MGCP
            5. H.323
              1. Gatekeeper Use for Scalability
            6. SIP
        5. IPT Design
          1. Bandwidth
            1. VAD
          2. Delay Components
          3. QoS Mechanisms for VoIP Networks
            1. CRTP
            2. LFI
            3. PQ-WFQ
            4. LLQ
            5. Auto QoS
          4. IPT Design Recommendations
        6. References and Recommended Readings
        7. Foundation Summary
        8. Q&A
      4. 16. Network Management Protocols
        1. “Do I Know This Already?” Quiz
        2. Foundation Topics
        3. SNMP
          1. SNMP Components
          2. MIB
          3. SNMP Message Types
            1. SNMPv1
            2. SNMPv2
            3. SNMPv3
        4. Other Network Management Technologies
          1. RMON
            1. RMON2
          2. NetFlow
            1. NetFlow Compared to RMON
          3. CDP
          4. Syslog
        5. References and Recommended Reading
        6. Foundation Summary
        7. Q&A
    12. V. Comprehensive Scenarios
      1. 17. Comprehensive Scenarios
        1. Scenario One: Pearland Hospital
          1. Scenario One Questions
          2. Scenario One Answers
        2. Scenario Two: Big Oil and Gas
          1. Scenario Two Questions
          2. Scenario Two Answers
        3. Scenario Three: Beauty Things Store
          1. Scenario Three Questions
          2. Scenario Three Answers
        4. Scenario Four: Falcon Communications
          1. Scenario Four Questions
          2. Scenario Four Answers
    13. VI. Appendixes
      1. A. Answers to Chapter “Do I Know This Already?” Quizzes and Q&A Sections
        1. Chapter 1
          1. “Do I Know This Already?”
          2. Q&A
        2. Chapter 2
          1. “Do I Know This Already?”
          2. Q&A
        3. Chapter 3
          1. “Do I Know This Already?”
          2. Q&A
        4. Chapter 4
          1. “Do I Know This Already?”
          2. Q&A
        5. Chapter 5
          1. “Do I Know This Already?”
          2. Q&A
        6. Chapter 6
          1. “Do I Know This Already?”
          2. Q&A
        7. Chapter 7
          1. “Do I Know This Already?”
          2. Q&A
        8. Chapter 8
          1. “Do I Know This Already?”
          2. Q&A
        9. Chapter 9
          1. “Do I Know This Already?”
          2. Q&A
        10. Chapter 10
          1. “Do I Know This Already?”
          2. Q&A
        11. Chapter 11
          1. “Do I Know This Already?”
          2. Q&A
        12. Chapter 12
          1. “Do I Know This Already?”
          2. Q&A
        13. Chapter 13
          1. “Do I Know This Already?”
          2. Q&A
        14. Chapter 14
          1. “Do I Know This Already?”
          2. Q&A
        15. Chapter 15
          1. “Do I Know This Already?”
          2. Q&A
        16. Chapter 16
          1. “Do I Know This Already?”
          2. Q&A
      2. B. The OSI Reference Model, TCP/IP Architecture, and Numeric Conversion
        1. OSI Model Overview
          1. Physical Layer (OSI Layer 1)
          2. Data Link Layer (OSI Layer 2)
          3. Network Layer (OSI Layer 3)
          4. Transport Layer (OSI Layer 4)
          5. Session Layer (OSI Layer 5)
          6. Presentation Layer (OSI Layer 6)
          7. Application Layer (OSI Layer 7)
        2. TCP/IP Architecture
          1. Network Interface Layer
          2. Internet Layer
          3. Host-to-Host Transport Layer
          4. Application Layer
          5. Example of Layered Communication
        3. Numeric Conversion
          1. Hexadecimal Numbers
          2. Hexadecimal Representation
          3. Converting Decimal to Hexadecimal
          4. Converting Hexadecimal to Decimal
          5. Alternative Method for Converting from Hexadecimal to Decimal
          6. Binary Numbers
          7. Converting Binary to Hexadecimal
          8. Converting Hexadecimal to Binary
          9. Converting Binary to Decimal
          10. Converting Decimal to Binary Numbers
          11. Alternative Method for Converting from Decimal to Binary
        4. References and Recommended Readings