Cover image for CompTIA Network+ (N10-004) cert guide
Title:
CompTIA Network+ (N10-004) cert guide
Personal Author:
Edition:
1st ed.
Publication Information:
Indianapolis, Ind. : Pearson Education, Inc., 2011
Physical Description:
xxiii, 657 p. : ill. ; 24 cm. + 1 CD-ROM ; 12 cm.
ISBN:
9780789745590
General Note:
Accompanied by CD-ROM :024754

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010262659 TK5105.5 H376 2011 Open Access Book Book
Searching...

On Order

Summary

Summary

This is a self-study tool for CompTIA's latest Network+ exam. Perfect for the 4000 candidates who take this challenging exam every month, this book's comprehensive coverage offers all the information and insight you need to succeed.


Author Notes

Mike Harwood (MCSE, A+, Network+, Server+, Linux+) has more than 14 years experience in information technology and related fields. He has held a number of roles in the IT field including network administrator, instructor, technical writer, website designer, consultant, and online marketing strategist. Mike has been a regular on-air technology contributor for CBC radio and has coauthored numerous computer books, including the Network+ Exam Cram published by Pearson.


Table of Contents

Introductionp. 3
How This Book Helps Youp. 4
Exam Objectives and Chapter Organizationp. 4
Instructional Featuresp. 18
Network Hardware and Software Requirementsp. 19
Advice on Taking the Examp. 20
Chapter 1 Introduction to Computer Networkingp. 23
What Is a Network?p. 24
LANs and WANsp. 25
Peer-to-Peer Versus Client/Server Networksp. 28
The Peer-to-Peer Networking Modelp. 28
Advantages of Peer-to-Peer Networksp. 29
Disadvantages of Peer-to-Peer Networksp. 30
The Client/Server Networking Modelp. 30
Serversp. 31
Client Computersp. 32
Advantages of Client/Server Networkingp. 32
Disadvantages of Client/Server Networkingp. 32
Distributed and Centralized Computingp. 33
Virtual Private Networks (VPN)p. 34
Components of the VPN Connectionp. 35
VPN Pros and Consp. 35
Virtual Local Area Network (VLAN)p. 36
VLAN Membershipp. 37
Protocol-Based VLANsp. 37
Port-Based VLANsp. 38
MAC Address-Based VLANsp. 38
VLAN Segmentationp. 39
LAN Topologiesp. 40
Physical and Logical Topologiesp. 41
Bus Topologyp. 41
Star Topologyp. 42
Ring Topologyp. 44
Wired Mesh Topologyp. 45
Wireless Network Topologiesp. 47
Infrastructure Wireless Topologyp. 47
Ad Hoc Wireless Networkingp. 48
Point-to-Point, Point-to Multipoint, and Mesh-Wireless Topologyp. 48
Point-to-Point Networksp. 48
Point-to-Multipointp. 50
Mesh Networksp. 50
Hybrid Topologiesp. 51
Summaryp. 52
Chapter 2 Media and Connectorsp. 61
Networking Mediap. 62
Media Interferencep. 62
Data Transmission Ratesp. 63
Media Lengthp. 63
Secure Transmission and Physical Mediap. 64
Installation and Repairp. 65
Simplex, Half-Duplex, and Full-Duplexp. 65
Cable Mediap. 66
Twisted-Pair Cablep. 67
Coaxial Cablep. 69
Fiber-Optic Cablep. 70
Media Connectorsp. 72
RJ Connectorsp. 72
F-Type Connectors and RG-59/RG-6 Cablesp. 73
RS-232 Standardp. 74
Fiber Connectorsp. 74
IEEE 1394 (FireWire)p. 75
Universal Serial Bus Connectors (USB)p. 76
Cable Summaryp. 76
Wiring Standards and Specialized Cablep. 77
568A and 568B Wiring Standardsp. 77
Straight Versus Crossover Cablep. 78
Rollover and Loopback Cablesp. 80
Components of Wiring Distributionp. 80
Network Cross Connectsp. 81
Horizontal Cablingp. 81
Vertical Cablep. 82
Patch Panelsp. 83
Type 66 and Type 110 Punchdown Blocksp. 84
MDF and IDFp. 85
Demarcation Pointp. 86
Verify Wiring Installation and Terminationp. 87
Summaryp. 89
Chapter 3 Networking Components and Devicesp. 99
Common Network Devicesp. 100
Hubsp. 100
Network Switchesp. 102
Switching Methodsp. 105
Advanced Switch Featuresp. 105
Power over Ethernet (PoE)p. 106
Trunkingp. 106
Port Authenticationp. 107
Working with Hubs and Switchesp. 107
Hub and Switch Portsp. 107
Hub and Switch Indicator Lightsp. 109
Rack-Mount, Stackable, and Freestanding Devicesp. 109
Managed Hubs and Switchesp. 109
Repeatersp. 110
Bridgesp. 110
Bridge Implementation Considerationsp. 111
Types of Bridgesp. 114
Routersp. 114
Gatewaysp. 117
Modemsp. 118
Modem Connection Speedsp. 119
Network Interface Cards (NIC)p. 120
Types of Network Interfacesp. 121
Installing Network Cardsp. 123
Media Convertersp. 124
Firewallsp. 125
DHCP Serverp. 126
Specialized Network Devicesp. 127
Multilayer and Content Switchesp. 127
Intrusion Detection and Prevention Systemsp. 128
Load Balancerp. 129
Multifunction Network Devicesp. 129
DNS Serverp. 129
Bandwidth Shaperp. 130
Proxy Serverp. 131
CSUs/DSUsp. 133
Network Devices Summaryp. 134
Summaryp. 136
Chapter 4 Understanding the TCP/IP Protocol Suitep. 145
A Brief Introduction to Protocolsp. 146
Protocols from the Sending Devicep. 147
Protocols on the Receiving Devicep. 147
Transmission Control Protocol/Internet Protocol (TCP/IP) Protocol Suitep. 148
Internet Protocol (IP)p. 149
Transmission Control Protocol (TCP)p. 149
User Datagram Protocol (UDP)p. 150
File Transfer Protocol (FTP)p. 151
Secure Shell (SSH)p. 152
Secure File Transfer Protocol (SFTP)p. 152
Trivial File Transfer Protocol (TFTP)p. 153
Simple Mail Transfer Protocol (SMTP)p. 153
Hypertext Transfer Protocol (HTTP)p. 154
Hypertext Transfer Protocol Secure (HTTPS)p. 154
Post Office Protocol Version 3/Internet Message Access Protocol Version 4 (POP3/IMAP4)p. 155
Telnetp. 155
Internet Control Message Protocol (ICMP)p. 156
Address Resolution Protocol (ARP) and Reverse Address Resolution Protocol
(RARP)p. 156
Network Time Protocol (NTP)p. 157
Network News Transfer Protocol (NNTP)p. 157
Secure Copy Protocol (SCP)p. 158
Lightweight Directory Access Protocol (LDAP)p. 158
Internet Group Management Protocol (IGMP)p. 158
Domain Name System (DNS)p. 159
The DNS Namespacep. 160
Types of DNS Entriesp. 162
DNS in a Practical Implementationp. 163
Simple Network Management Protocol (SNMP)p. 163
Components of SNMPp. 164
SNMP Management Systemsp. 164
SNMP Agentsp. 165
Management Information Bases (MIB)p. 165
SNMP Communitiesp. 166
Dynamic Host Configuration Protocol (DHCP)p. 167
Transport Layer Securityp. 170
Session Initiation Protocolp. 170
Real-time Transport Protocol (RTP)p. 171
TCP/IP Protocol Suite Summaryp. 171
Identifying Common TCP/IP Port Numbersp. 173
Summaryp. 175
Chapter 5 TCP/IP Addressing and Routingp. 185
Identifying MAC Addressesp. 186
Understanding IPv4 Addressing Fundamentalsp. 187
General IP Addressing Principlesp. 188
IPv4 Addressingp. 188
IPv4 Address Typesp. 190
Distributing IPv4 Addresses to the Networkp. 191
Static Addressingp. 191
Dynamic Addressingp. 191
Bootstrap Protocol (BOOTP)p. 191
APIPA and IPv4p. 192
Broadcast Addresses and "This Network"p. 193
Classless Interdomain Routing (CIDR)p. 193
Default Gatewaysp. 194
Understanding Subnettingp. 195
Public and Private IP Address Schemesp. 198
Private Address Rangesp. 199
Practical Uses of Public and Private IP Addressingp. 200
IPv6 Addressingp. 201
Identifying IPv6 Addressesp. 201
IPv6 Address Typesp. 202
Differentiating Between Routable and Routing Protocolsp. 204
Routable Protocolsp. 204
Routing Protocolsp. 205
Distance-Vector Routing Protocolsp. 206
Link-State Routing Protocolsp. 208
NAT, PAT, and SNATp. 209
Summaryp. 211
Chapter 6 Ethernet Networking Standardsp. 221
Characteristics Specified in the IEEE 802 Standardsp. 223
Speedp. 223
Access Methodsp. 223
Carrier Sense Multiple Access/Collision Detectionp. 224
CSMA/CAp. 225
Token Passingp. 226
Bondingp. 226
Topologyp. 226
Mediap. 227
Differentiating Between Baseband and Broadband Signalingp. 227
Basebandp. 227
Broadbandp. 227
Ethernet Standardsp. 228
10Base2p. 228
10BaseTp. 229
10BaseFLp. 230
Fast Ethernetp. 230
100BaseTXp. 231
100BaseT4p. 231
100BaseFXp. 231
Fast Ethernet Comparisonp. 231
Gigabit Ethernetp. 232
1000BaseXp. 232
1000BaseTp. 233
10Gigabit Ethernetp. 234
10GBaseSR/SWp. 234
10GBaseLR/LWp. 235
10GBaseER/EWp. 235
10GBaseTp. 236
Summaryp. 236
Chapter 7 Wireless Networkingp. 245
Understanding Wireless Devicesp. 246
Wireless Access Pointp. 246
Wireless Antennasp. 248
Antenna Ratingsp. 249
Types of Wireless Antennasp. 249
802.11 Wireless Standardsp. 251
The Magic Behind 802.11np. 254
Wireless Radio Channelsp. 254
Spread Spectrum Technologyp. 257
Frequency-Hopping Spread Spectrum (FHSS) Technologyp. 257
Direct-Sequence Spread Spectrum (DSSS) Technologyp. 258
Orthogonal Frequency Division Multiplexingp. 258
FHSS, DSSS, OFDM, and 802.11 Standardsp. 258
Beacon Management Framep. 259
Configuring and Troubleshooting the Wireless Connectionp. 260
Configuring Communications Between Wireless Devicesp. 262
Troubleshooting Wireless Signalsp. 264
Site Surveysp. 265
Troubleshooting AP Coveragep. 266
Wireless Troubleshooting Checklistp. 267
Securing Wireless Networksp. 268
Defining Access Control, Authentication, Authorization, and Encryptionp. 268
Wireless Authentication and Encryption Methodsp. 269
Wired Equivalent Privacy (WEP)p. 270
Wi-Fi Protected Access (WPA)p. 270
Temporal Key Integrity Protocol (TKIP)p. 271
802.1 Xp. 272
Securing the Access Pointp. 273
Summaryp. 273
Chapter 8 Wide Area Networkingp. 283
Public and Private Networksp. 284
Public Networksp. 284
Public Switched Telephone Network (PSTN)p. 284
The Internetp. 285
Advantages and Disadvantages of Public Networksp. 286
Private Networksp. 286
Switching Methodsp. 287
Packet Switchingp. 288
Virtual-Circuit Packet Switchingp. 289
Datagram Packet Switchingp. 289
Circuit Switchingp. 290
Message Switchingp. 290
Comparing Switching Methodsp. 291
WAN Technologiesp. 292
X.25p. 293
Frame Relayp. 293
T-Carrier Linesp. 295
T1/E1/J1 Linesp. 295
T3 Linesp. 297
SONET/OCx Levelsp. 297
Asynchronous Transfer Mode (ATM)p. 298
Integrated Services Digital Network (ISDN)p. 299
Basic Rate Interface (BRI)p. 301
Primary Rate Interface (PRI)p. 301
Comparing BRI and PRI ISDNp. 301
WAN Technology Summaryp. 301
Internet Access Technologiesp. 302
POTS Internet Accessp. 303
POTS Troubleshooting Proceduresp. 303
Troubleshooting Poor Connection Speedsp. 305
Modem-Specific Troubleshootingp. 306
XDSLp. 307
Cable Internet Accessp. 310
Satellite Internet Accessp. 313
Wireless Wide Area Networkingp. 315
Summaryp. 316
Chapter 9 OSI Modelp. 325
OSI Reference Model 101p. 326
Layer 1: the Physical Layerp. 328
Layer 2: the Data Link Layerp. 329
Layer 3: the Network Layerp. 329
Switching Methodsp. 330
Network Layer Addressingp. 331
Layer 4: the Transport Layerp. 331
Connection-Oriented Protocolsp. 332
Connectionless Protocolsp. 332
Flow Controlp. 333
Layer 5: the Session Layerp. 333
Layer 6: the Presentation Layerp. 333
Layer 7: the Application Layerp. 334
OSI Model Summaryp. 334
The Layers at Which Devices Operatep. 335
Hubsp. 336
Switchesp. 336
Bridgesp. 336
Routersp. 336
NICsp. 336
Wireless Access Points (APs)p. 337
Summary of the Layers at Which Devices Operatep. 337
TCP/IP Protocol Suite Summaryp. 337
Summaryp. 340
Chapter 10 Network Performance and Optimizationp. 349
Understanding Uptimep. 350
Understanding the Risksp. 352
RAIDp. 353
RAID 0p. 354
Advantages of RAID 0p. 354
Disadvantages of RAID 0p. 355
Recovering from a Failed RAID 0 Arrayp. 355
RAID 1p. 355
Advantages of RAID 1p. 357
Disadvantages of RAID 1p. 357
Recovering from a Failed RAID 1 Arrayp. 358
RAID 5p. 358
Advantages of RAID 5p. 358
Disadvantages of RAID 5p. 359
Recovering from a RAID 5 Array Failurep. 359
RAID 10p. 360
Choosing a RAID Levelp. 361
Hardware and Software RAIDp. 362
Other Fault-Tolerance Measuresp. 363
Link Redundancyp. 363
Using Uninterruptible Power Suppliesp. 364
Why Use a UPS?p. 365
Power Threatsp. 365
Using Redundant Power Suppliesp. 366
Server and Services Fault Tolerancep. 366
Using Standby Serversp. 366
Server Clusteringp. 367
Preparing for Memory Failuresp. 368
Managing Processor Failuresp. 368
Disaster Recoveryp. 368
Backup Methodsp. 368
Full Backupsp. 369
Incremental Backupsp. 370
Differential Backupsp. 370
A Comparison of Backup Methodsp. 371
Backup Rotation Schedulesp. 371
Offsite Storagep. 372
Backup Best Practicesp. 373
Hot and Cold Sparesp. 374
Hot Spare and Hot Swappingp. 374
Cold Spare and Cold Swappingp. 375
Recovery Sitesp. 375
Cold Sitep. 375
Hot Sitep. 376
Warm Sitep. 376
Network Optimization Strategiesp. 377
QoSp. 377
Latency-Sensitive High-Bandwidth Applicationsp. 378
Voice over Internet Protocol (VoIP)p. 378
Video Applicationsp. 379
Traffic Shapingp. 379
Load Balancingp. 381
Caching Enginesp. 381
Summaryp. 382
Chapter 11 Troubleshooting Procedures and Best Practicesp. 393
The Art of Troubleshootingp. 394
Troubleshooting Servers and Workstationsp. 394
General Troubleshooting Considerationsp. 395
Troubleshooting Methods and Proceduresp. 396
Step 1: Information GatheringâÇôIdentify Symptoms and Problemsp. 397
Information from the Computerp. 397
Information from the Userp. 398
Observation Techniquesp. 399
Effective Questioning Techniquesp. 399
Step 2: Identify the Affected Areas of the Networkp. 399
Step 3: Determine if Anything Has Changedp. 400
Changes to the Networkp. 400
Changes to the Serverp. 401
Changes to the Workstationp. 402
Step 4: Establish the Most Probable Causep. 402
Step 5: Determine if Escalation Is Necessaryp. 403
Step 6: Create an Action Plan and Solution Identifying Potential Effectsp. 403
Step 7: Implement and Test the Solutionp. 404
Step 8: Identify the Results and Effects of the Solutionp. 405
Step 9: Document the Solution and the Entire Processp. 406
Troubleshooting the Networkp. 407
Troubleshooting Wiringp. 407
Where the Cable Is Usedp. 408
Wiring Issuesp. 409
Crosstalkp. 409
Near-End Crosstalk (NEXT)p. 409
Far-End Crosstalk (FEXT)p. 409
Electromagnetic interference (EMI)p. 409
Attenuationp. 410
Open Impedance Mismatch (Echo)p. 410
Shortsp. 410
Managing Collisionsp. 410
Troubleshooting Infrastructure Hardwarep. 411
Configuring and Troubleshooting Client Connectivityp. 413
Verifying Client TCP/IP Configurationsp. 413
Setting Port Speeds and Duplexp. 415
Troubleshooting Incorrect VLANsp. 416
Identifying Issues That Might Need Escalationp. 417
Troubleshooting Wireless Issuesp. 418
Troubleshooting Wireless Signalsp. 418
Troubleshooting Wireless Configurationsp. 420
Summaryp. 421
Chapter 12 Command-Line Networking Toolsp. 431
Common Networking Utilitiesp. 432
The ping Utilityp. 432
Switches for pingp. 434
Troubleshooting Steps with pingp. 435
Ping Error Messagesp. 436
The Destination Host Unreachable Messagep. 437
The Unknown Host Messagep. 438
The traceroute Utilityp. 439
Reviewing tracert Command Printoutsp. 441
The traceroute Commandp. 444
The mtr Utilityp. 445
The arp Utilityp. 445
The ARP Cachep. 445
Switches for arpp. 446
The arp Command Printoutp. 447
The arp ping Utilityp. 447
The netstat Utilityp. 448
The netstat Command Printoutsp. 450
Netstat -ep. 450
Netstat -ap. 451
Netstat -rp. 452
Netstat -sp. 453
The nbtstat Utilityp. 454
The ipconfig and ifconfig Utilitiesp. 456
The ipconfig Utilityp. 457
The ipconfig Command Printoutsp. 458
The ifconfig Command Printoutp. 460
The nslookup and dig Utilitiesp. 461
The nslookup Utilityp. 461
The nslookup Command Printoutp. 463
The dig Utilityp. 464
The dig Command Printoutp. 465
The host Commandp. 466
The route Utilityp. 466
Summaryp. 468
Chapter 13 Network Management Tools and Documentation Proceduresp. 479
Documentation Managementp. 480
Wiring Schematicsp. 481
Physical and Logical Network Diagramsp. 484
Physical Network Documentationp. 484
Logical Network Documentationp. 485
Baselinesp. 487
Policies, Procedures, Configurations, and Regulationsp. 488
Policy Documentationp. 488
Network Procedure Documentationp. 489
Configuration Documentationp. 490
Regulationsp. 491
Monitoring the Network to Identify Performancep. 492
Throughput Testingp. 493
Port Scannersp. 495
Network Testingp. 498
Performance Testingp. 498
Load Testingp. 498
Stress Testingp. 499
Loggingp. 499
Security Logsp. 500
Application Logsp. 501
System Logsp. 502
History Logsp. 502
Log Managementp. 503
Networking Toolsp. 503
Wire Crimpersp. 504
Strippers and Snipsp. 504
Punchdown Toolsp. 505
Cable Certifiersp. 505
Voltage Event Recordersp. 506
Temperature Monitorsp. 506
Toner Probesp. 508
Protocol Analyzerp. 509
Media/Cable Testersp. 509
Media Testersp. 510
TDRp. 510
OTDRp. 510
Multimeterp. 511
Network Qualification Testerp. 512
Butt Setp. 512
Wireless Detectorp. 512
Summaryp. 513
Chapter 14 Network Access Securityp. 525
Understanding Network Security Threatsp. 526
Security Responsibilities of a Network Administratorp. 527
Physical and Logical Securityp. 528
Physical Securityp. 528
Network Hardware and Server Room Accessp. 529
Lock and Keyp. 529
Swipe Card and PIN Accessp. 529
Biometricsp. 530
Hardware Room Best Practicesp. 531
Logical Securityp. 532
Firewallsp. 532
The Purpose and Function of a Firewallp. 534
Stateful and Stateless Firewallsp. 536
Firewall Methodsp. 536
Network Layer Firewallsp. 536
Circuit-Level Firewallsp. 537
Application-Layer Firewallsp. 537
Demilitarized Zonesp. 538
Intrusion Detection and Intrusion Prevention Systemsp. 539
Network Access Securityp. 539
Access Control Listsp. 540
Access Control and MAC Filteringp. 540
TCP/IP Filteringp. 540
Port Blocking/Filteringp. 541
Remote Access Protocols and Servicesp. 542
Routing and Remote Access Service (RRAS)p. 542
SLIPp. 543
PPPp. 543
PPPoEp. 544
Tunneling and Encryptionp. 545
SSL VPNsp. 546
VPN Concentratorsp. 546
Point-to-Point Tunneling Protocol (PPTP)p. 547
Layer Two Tunneling Protocol (L2TP)p. 548
Advantages of L2TP and PPTPp. 548
Inside IPsecp. 548
Authentication Headersp. 549
Encapsulating Security Payloadsp. 549
IPsec Transmission Modesp. 550
Remote Control Protocolsp. 550
Summaryp. 551
Chapter 15 Security Technologies and Malicious Softwarep. 561
Authentication, Authorization, and Accounting (AAA)p. 562
Authenticationp. 562
Password Policiesp. 562
Password Strengthp. 563
Multifactor Authenticationp. 565
Authentication Tokensp. 565
Biometricsp. 565
Multifactor Authentication/Two-Factor Authenticationp. 566
Authorizationp. 566
Accountabilityp. 567
RADIUS and TACACS+p. 568
RADIUSp. 568
TACACS+p. 570
Understanding Cryptography Keysp. 570
Kerberos Authenticationp. 572
Public Key Infrastructurep. 573
Components of a PKIp. 574
Certificatesp. 575
Certificate Storesp. 576
Trustsp. 576
Certificate Authorities (CAs)p. 577
Public CAsp. 577
Private CAsp. 577
Network Access Controlp. 578
Mandatory Access Control (MAC)p. 578
Discretionary Access Control (DAC)p. 579
Rule-Based Access Control (RBAC)p. 579
Role-Based Access Control (RBAC)p. 579
Remote Authentication Protocolsp. 580
Using Secure Protocolsp. 581
Malicious Softwarep. 582
Malware Distributionp. 583
Malware Payloadsp. 584
More About Virusesp. 585
More About Trojan Horses and Wormsp. 586
Comparing Malware Typesp. 586
Types of Attacksp. 587
Denial of Service and Distributed Denial of Service Attacksp. 587
Other Common Attacksp. 589
An Ounce of Preventionp. 590
Maintaining Operating System Softwarep. 592
Reasons to Use a Service Packp. 593
When to Use a Service Packp. 593
How to Apply a Service Packp. 594
Server Patchesp. 595
Summaryp. 596
Appendix A Answers to the Review Questionsp. 605
Indexp. 639
Elements on the CD-ROM
Appendix B Memory Tables
Appendix C Memory Tables Answer Key
Glossary
TOC, 9780789745590, 7/8/10