Acknowledgments |
|
xxii | |
Chapter 1 CompTIA Network+in a Nutshell |
|
1 | (10) |
|
Who Needs CompTIA Network+? I Just Want to Learn about Networks! |
|
|
2 | (1) |
|
What Is CompTIA Network+ Certification? |
|
|
2 | (2) |
|
|
2 | (1) |
|
The Current CompTIA Network+ Certification Exam Release |
|
|
3 | (1) |
|
How Do I Become CompTIA Network+ Certified? |
|
|
3 | (1) |
|
|
4 | (2) |
|
|
5 | (1) |
|
How Much Does the Test Cost? |
|
|
5 | (1) |
|
How to Pass the CompTIA Network+ Exam |
|
|
6 | (5) |
|
|
6 | (1) |
|
Set Aside the Right Amount of Study Time |
|
|
6 | (1) |
|
|
7 | (4) |
Chapter 2 Network Models |
|
11 | (44) |
|
|
12 | (5) |
|
|
12 | (3) |
|
|
13 | (1) |
|
|
14 | (1) |
|
The OSI Seven-Layer Model in Action |
|
|
15 | (2) |
|
|
16 | (1) |
|
|
17 | (34) |
|
Let's Get Physical-Network Hardware and Layers 1-2 |
|
|
17 | (13) |
|
|
20 | (8) |
|
|
28 | (2) |
|
Beyond the Single Wire-Network Software and Layers 3-7 |
|
|
30 | (13) |
|
IP-Playing on Layer 3, the Network Layer |
|
|
31 | (2) |
|
|
33 | (2) |
|
Assembly and Disassembly-Layer 4, the Transport Layer |
|
|
35 | (2) |
|
Talking on a Network-Layer 5, the Session Layer |
|
|
37 | (3) |
|
Standardized Formats, or Why Layer 6, Presentation, Has No Friends |
|
|
40 | (2) |
|
Network Applications-Layer 7, the Application Layer |
|
|
42 | (1) |
|
|
43 | (12) |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
45 | (3) |
|
|
48 | (1) |
|
Frames, Packets, and Segments, Oh My! |
|
|
49 | (1) |
|
The Tech's Troubleshooting Tool |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
51 | (2) |
|
|
53 | (2) |
Chapter 3 Cabling and Topology |
|
55 | (26) |
|
|
55 | (23) |
|
|
55 | (8) |
|
|
56 | (2) |
|
|
58 | (1) |
|
|
59 | (1) |
|
Mesh and Point-to-Multipoint |
|
|
60 | (2) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
63 | (13) |
|
|
63 | (4) |
|
|
67 | (4) |
|
|
71 | (2) |
|
|
73 | (2) |
|
|
75 | (1) |
|
Networking Industry Standards-IEEE |
|
|
76 | (2) |
|
|
78 | (1) |
|
|
78 | (1) |
|
|
79 | (2) |
Chapter 4 Ethernet Basics |
|
81 | (26) |
|
|
82 | (2) |
|
|
82 | (2) |
|
|
83 | (1) |
|
|
84 | (20) |
|
Organizing the Data: Ethernet Frames |
|
|
84 | (5) |
|
|
87 | (2) |
|
|
89 | (7) |
|
|
89 | (5) |
|
|
94 | (2) |
|
Extending and Enhancing Ethernet Networks |
|
|
96 | (11) |
|
Connecting Ethernet Segments |
|
|
96 | (3) |
|
|
99 | (4) |
|
Troubleshooting Hubs and Switches |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (2) |
Chapter 5 Modern Ethernet |
|
107 | (18) |
|
|
107 | (15) |
|
|
107 | (5) |
|
|
108 | (2) |
|
|
110 | (2) |
|
|
112 | (4) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
114 | (1) |
|
Implementing Multiple Types of Gigabit Ethernet |
|
|
115 | (1) |
|
|
116 | (11) |
|
|
117 | (1) |
|
The Other 10 Gigabit Ethernet Fiber Standards |
|
|
118 | (1) |
|
|
119 | (1) |
|
10 GbE Physical Connections |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
120 | (2) |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
123 | (2) |
Chapter 6 Installing a Physical Network |
|
125 | (52) |
|
|
127 | (2) |
|
Understanding Structured Cabling |
|
|
127 | (2) |
|
Cable Basics-A Star Is Born |
|
|
127 | (2) |
|
|
129 | (44) |
|
Structured Cable Network Components |
|
|
129 | (11) |
|
Structured Cable-Beyond the Star |
|
|
140 | (4) |
|
Installing Structured Cabling |
|
|
144 | (18) |
|
|
145 | (1) |
|
|
145 | (1) |
|
Determining the Location of the Telecommunications Room |
|
|
146 | (1) |
|
|
147 | (3) |
|
|
150 | (5) |
|
|
155 | (7) |
|
|
162 | (6) |
|
|
163 | (3) |
|
|
166 | (2) |
|
Diagnostics and Repair of Physical Cabling |
|
|
168 | (10) |
|
Diagnosing Physical Problems |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
170 | (1) |
|
Problems in the Telecommunications Room |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
173 | (2) |
|
|
175 | (2) |
Chapter 7 TCP/IP Basics |
|
177 | (50) |
|
|
178 | (1) |
|
Standardizing Networking Technology |
|
|
178 | (1) |
|
|
179 | (44) |
|
The TCP/IP Protocol Suite |
|
|
179 | (6) |
|
|
180 | (2) |
|
Transport Layer Protocols |
|
|
182 | (1) |
|
Application Layer Protocols |
|
|
183 | (2) |
|
|
185 | (17) |
|
|
186 | (5) |
|
|
191 | (9) |
|
|
200 | (2) |
|
|
202 | (10) |
|
|
202 | (9) |
|
CIDR: Subnetting in the Real World |
|
|
211 | (1) |
|
|
212 | (16) |
|
|
212 | (4) |
|
|
216 | (6) |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
223 | (2) |
|
|
225 | (2) |
Chapter 8 The Wonderful World of Routing |
|
227 | (48) |
|
|
228 | (2) |
|
|
228 | (2) |
|
|
230 | (42) |
|
|
230 | (15) |
|
|
237 | (1) |
|
Network Address Translation |
|
|
238 | (7) |
|
|
245 | (15) |
|
|
246 | (1) |
|
|
247 | (7) |
|
|
254 | (5) |
|
|
259 | (1) |
|
Dynamic Routing Makes the Internet |
|
|
259 | (1) |
|
|
260 | (16) |
|
|
260 | (7) |
|
Basic Router Configuration |
|
|
267 | (3) |
|
|
270 | (2) |
|
|
272 | (1) |
|
|
272 | (2) |
|
|
274 | (1) |
Chapter 9 TCP/IP Applications |
|
275 | (42) |
|
|
276 | (1) |
|
Transport Layer and Network Layer Protocols |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
277 | (37) |
|
|
277 | (1) |
|
|
278 | (1) |
|
|
279 | (1) |
|
|
280 | (1) |
|
The Power of Port Numbers |
|
|
280 | (11) |
|
|
282 | (4) |
|
|
286 | (5) |
|
Rules for Determining Good vs. Bad Communications |
|
|
291 | (1) |
|
Common TCP/IP Applications |
|
|
291 | (27) |
|
|
291 | (8) |
|
|
299 | (5) |
|
|
304 | (5) |
|
|
309 | (4) |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
315 | (2) |
Chapter 10 Network Naming |
|
317 | (42) |
|
|
318 | (2) |
|
|
318 | (2) |
|
|
320 | (35) |
|
|
320 | (29) |
|
|
321 | (15) |
|
|
336 | (10) |
|
|
346 | (3) |
|
|
349 | (3) |
|
|
351 | (1) |
|
|
352 | (1) |
|
Diagnosing TCP/IP Networks |
|
|
352 | (3) |
|
|
355 | (1) |
|
|
355 | (2) |
|
|
357 | (2) |
Chapter 11 Securing TCP/IP |
|
359 | (42) |
|
|
360 | (38) |
|
|
360 | (16) |
|
|
360 | (8) |
|
|
368 | (7) |
|
|
375 | (1) |
|
|
375 | (1) |
|
TCP/IP Security Standards |
|
|
376 | (18) |
|
|
376 | (12) |
|
|
388 | (3) |
|
Combining Authentication and Encryption |
|
|
391 | (3) |
|
Secure TCP/IP Applications |
|
|
394 | (6) |
|
|
394 | (1) |
|
|
395 | (1) |
|
|
396 | (1) |
|
|
396 | (1) |
|
|
397 | (1) |
|
|
398 | (1) |
|
|
398 | (1) |
|
|
398 | (2) |
|
|
400 | (1) |
Chapter 12 Advanced Networking Devices |
|
401 | (32) |
|
Client/Server and Peer-to-Peer Topologies |
|
|
402 | (1) |
|
|
402 | (3) |
|
|
402 | (2) |
|
|
404 | (1) |
|
|
405 | (25) |
|
Client/Server and Peer-to-Peer Today |
|
|
405 | (1) |
|
|
406 | (6) |
|
|
408 | (3) |
|
|
411 | (1) |
|
|
411 | (1) |
|
|
412 | (7) |
|
|
413 | (1) |
|
Configuring a VLAN-capable Switch |
|
|
414 | (3) |
|
|
417 | (1) |
|
|
417 | (2) |
|
|
419 | (15) |
|
|
420 | (3) |
|
|
423 | (1) |
|
|
424 | (6) |
|
|
430 | (1) |
|
|
430 | (1) |
|
|
431 | (2) |
Chapter 13 IPv6 |
|
433 | (26) |
|
|
434 | (22) |
|
|
434 | (11) |
|
|
434 | (1) |
|
|
435 | (2) |
|
|
437 | (1) |
|
|
437 | (2) |
|
|
439 | (2) |
|
|
441 | (4) |
|
|
445 | (5) |
|
|
445 | (1) |
|
|
446 | (1) |
|
|
447 | (2) |
|
|
449 | (1) |
|
|
450 | (9) |
|
|
450 | (1) |
|
|
451 | (5) |
|
|
456 | (1) |
|
|
456 | (1) |
|
|
456 | (2) |
|
|
458 | (1) |
Chapter 14 Remote Connectivity |
|
459 | (50) |
|
|
459 | (8) |
|
|
460 | (7) |
|
The Dawn of Long Distance |
|
|
461 | (6) |
|
|
467 | (38) |
|
|
467 | (1) |
|
Copper Carriers: T1 and T3 |
|
|
468 | (4) |
|
Fiber Carriers: SONET/SDH and OC |
|
|
472 | (1) |
|
|
473 | (5) |
|
|
478 | (1) |
|
Alternative to Telephony WAN |
|
|
479 | (1) |
|
|
479 | (16) |
|
|
480 | (6) |
|
|
486 | (4) |
|
|
490 | (2) |
|
|
492 | (1) |
|
|
492 | (2) |
|
|
494 | (1) |
|
|
494 | (1) |
|
|
495 | (1) |
|
|
495 | (15) |
|
|
496 | (1) |
|
|
496 | (3) |
|
|
499 | (2) |
|
|
501 | (4) |
|
|
505 | (1) |
|
|
505 | (2) |
|
|
507 | (2) |
Chapter 15 Wireless Networking |
|
509 | (38) |
|
|
509 | (1) |
|
|
510 | (33) |
|
|
510 | (16) |
|
|
511 | (8) |
|
|
519 | (1) |
|
|
519 | (1) |
|
|
520 | (1) |
|
|
520 | (1) |
|
Wireless Networking Security |
|
|
521 | (5) |
|
|
526 | (1) |
|
|
526 | (13) |
|
|
526 | (2) |
|
|
528 | (1) |
|
Setting Up an Ad Hoc Network |
|
|
528 | (1) |
|
Setting Up an Infrastructure Network |
|
|
529 | (9) |
|
|
538 | (1) |
|
|
539 | (1) |
|
|
539 | (9) |
|
|
540 | (1) |
|
|
540 | (1) |
|
Connectivity Troubleshooting |
|
|
540 | (2) |
|
Configuration Troubleshooting |
|
|
542 | (1) |
|
|
543 | (1) |
|
|
543 | (2) |
|
|
545 | (2) |
Chapter 16 Protecting Your Network |
|
547 | (28) |
|
|
548 | (24) |
|
|
548 | (9) |
|
System Crash/Hardware Failure |
|
|
548 | (1) |
|
Administrative Access Control |
|
|
549 | (1) |
|
|
550 | (2) |
|
|
552 | (1) |
|
|
553 | (1) |
|
|
553 | (1) |
|
|
554 | (1) |
|
Attacks on Wireless Connections |
|
|
555 | (2) |
|
|
557 | (5) |
|
|
557 | (1) |
|
|
557 | (2) |
|
Controlling User Accounts |
|
|
559 | (3) |
|
|
562 | (13) |
|
|
562 | (1) |
|
|
563 | (2) |
|
|
565 | (2) |
|
|
567 | (1) |
|
|
567 | (3) |
|
|
570 | (1) |
|
|
571 | (1) |
|
|
572 | (1) |
|
|
572 | (2) |
|
|
574 | (1) |
Chapter 17 Virtualization |
|
575 | (26) |
|
|
575 | (11) |
|
|
575 | (11) |
|
|
577 | (2) |
|
Emulation vs. Virtualization |
|
|
579 | (1) |
|
|
580 | (6) |
|
|
586 | (11) |
|
|
586 | (2) |
|
|
586 | (1) |
|
|
586 | (1) |
|
|
586 | (1) |
|
|
587 | (1) |
|
|
587 | (1) |
|
Virtualization in Modern Networks |
|
|
588 | (13) |
|
|
590 | (2) |
|
|
592 | (1) |
|
|
593 | (2) |
|
|
595 | (1) |
|
|
596 | (1) |
|
|
597 | (1) |
|
|
597 | (2) |
|
|
599 | (2) |
Chapter 18 Network Management |
|
601 | (34) |
|
|
601 | (31) |
|
Network Configuration Management |
|
|
601 | (9) |
|
Configuration Management Documentation |
|
|
602 | (7) |
|
Change Management Documentation |
|
|
609 | (1) |
|
Monitoring Performance and Connectivity |
|
|
610 | (10) |
|
|
610 | (8) |
|
|
618 | (2) |
|
Network Performance Optimization |
|
|
620 | (16) |
|
|
621 | (1) |
|
Controlling Data Throughput |
|
|
621 | (4) |
|
Keeping Resources Available |
|
|
625 | (7) |
|
|
632 | (1) |
|
|
632 | (1) |
|
|
633 | (2) |
Chapter 19 Building a SOHO Network |
|
635 | (22) |
|
|
635 | (1) |
|
|
636 | (18) |
|
|
636 | (1) |
|
|
637 | (15) |
|
|
638 | (1) |
|
|
638 | (2) |
|
|
640 | (1) |
|
|
641 | (4) |
|
|
645 | (4) |
|
|
649 | (2) |
|
|
651 | (1) |
|
|
652 | (2) |
|
|
654 | (1) |
|
|
654 | (2) |
|
|
656 | (1) |
Chapter 20 Network Troubleshooting |
|
657 | (26) |
|
|
658 | (22) |
|
|
658 | (11) |
|
|
658 | (5) |
|
|
663 | (6) |
|
The Troubleshooting Process |
|
|
669 | (6) |
|
|
671 | (2) |
|
Establish a Theory of Probable Cause |
|
|
673 | (1) |
|
Test the Theory to Determine Cause |
|
|
673 | (1) |
|
Establish a Plan of Action and Identify Potential Effects |
|
|
673 | (1) |
|
Implement and Test the Solution or Escalate as Necessary |
|
|
674 | (1) |
|
Verify Full System Functionality and Implement Preventative Measures |
|
|
674 | (1) |
|
Document Findings, Actions, and Outcomes |
|
|
675 | (1) |
|
Troubleshooting Scenarios |
|
|
675 | (5) |
|
|
676 | (1) |
|
"I Can't Get to This Web Site!" |
|
|
676 | (1) |
|
"Our Web Server Is Sluggish!" |
|
|
676 | (1) |
|
"I Can't See Anything on the Network!" |
|
|
677 | (1) |
|
|
677 | (2) |
|
|
679 | (1) |
|
|
680 | (19) |
|
|
680 | (2) |
|
|
682 | (1) |
Appendix A Objectives Map: CompTIA Network+ |
|
683 | (16) |
Appendix B About the CD-ROM |
|
699 | (4) |
|
Playing the Mike Meyers Introduction Video |
|
|
699 | (1) |
|
|
700 | (1) |
|
Installing and Running Total Tester |
|
|
700 | (1) |
|
|
700 | (1) |
|
|
700 | (1) |
|
Free PDF Copy of the Book |
|
|
701 | (1) |
|
Boson's NetSim Network Simulator |
|
|
701 | (1) |
|
|
702 | (1) |
|
|
702 | (1) |
Glossary |
|
703 | (60) |
Index |
|
763 | |