Preface |
|
xxiv | |
Acknowledgments |
|
xxvii | |
Introduction |
|
xxviii | |
1 Basic Network Concepts |
|
1 | (60) |
|
Identifying Characteristics of a Network |
|
|
2 | (5) |
|
Servers, Workstations, and Hosts |
|
|
2 | (1) |
|
|
2 | (1) |
|
|
3 | (3) |
|
Internet, Intranet, and Extranet |
|
|
6 | (1) |
|
Identifying Network Topologies |
|
|
7 | (10) |
|
|
8 | (1) |
|
|
9 | (2) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
13 | (2) |
|
Point-to-Point and Point-to-Multipoint |
|
|
15 | (1) |
|
|
16 | (1) |
|
Network Media and Connectors |
|
|
17 | (18) |
|
|
18 | (1) |
|
|
19 | (8) |
|
Exercise 1-1: Crimping a Category 5 Cable |
|
|
25 | (2) |
|
|
27 | (2) |
|
|
29 | (3) |
|
Networking over Power Lines |
|
|
32 | (1) |
|
|
33 | (2) |
|
|
35 | (3) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
Multiplexing and De-multiplexing |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
38 | (7) |
|
|
38 | (1) |
|
|
39 | (3) |
|
|
42 | (1) |
|
|
42 | (3) |
|
Exercise 1-2: Identifying the Different Network Architectures |
|
|
43 | (2) |
|
Network Operating Systems |
|
|
45 | (5) |
|
|
45 | (3) |
|
Exercise 1-3: Installing DNS on a Windows Server |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
50 | (2) |
|
|
52 | (9) |
|
|
56 | (5) |
2 Network Protocols and Standards |
|
61 | (34) |
|
|
61 | (6) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
65 | (1) |
|
Routable vs. Nonroutable Protocols |
|
|
66 | (1) |
|
|
67 | (16) |
|
Layer 7: The Application Layer |
|
|
69 | (1) |
|
Layer 6: The Presentation Layer |
|
|
69 | (1) |
|
Layer 5: The Session Layer |
|
|
70 | (1) |
|
Layer 4: The Transport Layer |
|
|
70 | (2) |
|
Layer 3: The Network Layer |
|
|
72 | (1) |
|
Layer 2: The Data Link Layer |
|
|
72 | (1) |
|
Layer 1: The Physical Layer |
|
|
73 | (1) |
|
|
73 | (2) |
|
Exercise 2-1: Mixing and Matching OSI Model Definitions |
|
|
74 | (1) |
|
Protocols and the OSI Layers |
|
|
75 | (8) |
|
Exercise 2-2: Viewing Protocol Information with Network Monitor |
|
|
78 | (4) |
|
Exercise 2-3: Analyzing Network Traffic |
|
|
82 | (1) |
|
|
83 | (4) |
|
|
83 | (3) |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
88 | (7) |
|
|
91 | (4) |
3 Networking Components |
|
95 | (54) |
|
|
96 | (9) |
|
|
96 | (5) |
|
Exercise 3-1: Configuring a Network Card |
|
|
100 | (1) |
|
|
101 | (2) |
|
Exercise 3-2: Determining Your Local Machine's MAC Address |
|
|
102 | (1) |
|
Troubleshooting Network Cards |
|
|
103 | (2) |
|
Hubs, MAUs, and Repeaters |
|
|
105 | (5) |
|
|
105 | (4) |
|
Multistation Access Units |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
110 | (7) |
|
|
111 | (1) |
|
|
112 | (5) |
|
|
117 | (3) |
|
|
117 | (2) |
|
|
119 | (1) |
|
Collision Domains and Broadcast Domains |
|
|
119 | (1) |
|
Gateways and Security Devices |
|
|
120 | (3) |
|
|
120 | (1) |
|
|
121 | (1) |
|
Intrusion Detection Systems |
|
|
121 | (2) |
|
Exercise 3-3: Identifying Network Components |
|
|
122 | (1) |
|
|
123 | (14) |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
127 | (2) |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
131 | (1) |
|
Wiring Distribution and Rack Systems |
|
|
131 | (4) |
|
Device Placement and Labeling |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
137 | (2) |
|
|
139 | (10) |
|
|
143 | (6) |
4 TCP/IP Addressing |
|
149 | (36) |
|
|
150 | (2) |
|
|
150 | (2) |
|
Exercise 4-1: Identifying Remote Systems |
|
|
151 | (1) |
|
|
152 | (12) |
|
|
153 | (2) |
|
Exercise 4-2: Converting Decimal to Binary |
|
|
154 | (1) |
|
Exercise 4-3: Converting Binary to Decimal |
|
|
154 | (1) |
|
|
155 | (2) |
|
Exercise 4-4: Identifying Address Classes |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
158 | (1) |
|
Exercise 4-5: Understanding Valid Addresses |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
160 | (4) |
|
Exercise 4-6: Viewing TCP/IP Port Values |
|
|
162 | (2) |
|
TCP/IP Configuration Concepts |
|
|
164 | (15) |
|
|
164 | (1) |
|
Dynamic Host Configuration Protocol (DHCP) |
|
|
165 | (3) |
|
Exercise 4-7: Configuring TCP/IP to Use DHCP |
|
|
166 | (2) |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
168 | (4) |
|
Windows Internet Naming Service |
|
|
172 | (2) |
|
Exercise 4-8: Configuring a Client for DNS |
|
|
173 | (1) |
|
Configuring a Linux Machine for TCP/IP |
|
|
174 | (4) |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
180 | (5) |
|
|
183 | (2) |
5 TCP/IP Protocols |
|
185 | (40) |
|
|
186 | (16) |
|
|
186 | (16) |
|
Exercise 5-1: Identifying TCP/IP Protocols |
|
|
197 | (5) |
|
|
202 | (6) |
|
IPv6 Addressing and Hexadecimal Addressing |
|
|
202 | (4) |
|
|
206 | (1) |
|
|
206 | (2) |
|
Exercise 5-2: Exploring IPv6 |
|
|
207 | (1) |
|
|
208 | (9) |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
209 | (1) |
|
|
209 | (1) |
|
|
209 | (3) |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (2) |
|
|
219 | (6) |
|
|
222 | (3) |
6 TCP/IP Utilities and Troubleshooting |
|
225 | (76) |
|
Communication Requires ARP |
|
|
226 | (8) |
|
|
227 | (1) |
|
|
228 | (6) |
|
Exercise 6-1: Using ARP to See Your Local ARP Cache |
|
|
230 | (4) |
|
|
234 | (1) |
|
|
234 | (28) |
|
|
234 | (5) |
|
Exercise 6-2: Using IPCONFIG |
|
|
237 | (2) |
|
|
239 | (5) |
|
|
240 | (4) |
|
|
244 | (4) |
|
|
248 | (6) |
|
Exercise 6-4: Using Netstat to Determine Open Connections to a System |
|
|
253 | (1) |
|
|
254 | (2) |
|
Exercise 6-5: Using Telnet to Remotely Administer a Cisco Router |
|
|
256 | (1) |
|
|
256 | (6) |
|
Exercise 6-6: Configuring and Using FTP |
|
|
258 | (4) |
|
|
262 | (13) |
|
|
262 | (7) |
|
Exercise 6-7; Using NBTSTAT to View NetBIOS Name Tables |
|
|
267 | (2) |
|
|
269 | (6) |
|
Exercise 6-8: Using NSLOOKUP |
|
|
272 | (3) |
|
|
275 | (4) |
|
|
275 | (1) |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
277 | (1) |
|
|
278 | (1) |
|
|
279 | (1) |
|
Troubleshooting with TCP/IP Utilities |
|
|
279 | (9) |
|
|
280 | (2) |
|
|
282 | (4) |
|
|
286 | (2) |
|
|
288 | (2) |
|
|
290 | (11) |
|
|
296 | (5) |
7 Configuring Routers and Switches |
|
301 | (24) |
|
Basic Router Configuration |
|
|
302 | (6) |
|
|
302 | (1) |
|
|
303 | (1) |
|
|
303 | (5) |
|
Exercise 7-1: Performing Basic Configuration of Cisco Routers |
|
|
306 | (2) |
|
Basic Switch Configuration |
|
|
308 | (10) |
|
|
309 | (3) |
|
|
312 | (2) |
|
|
314 | (1) |
|
Exercise 7-2: Configuring VLANs on Cisco Switches |
|
|
315 | (1) |
|
Configuring Port Security |
|
|
315 | (1) |
|
|
316 | (2) |
|
Troubleshooting Connectivity |
|
|
318 | (2) |
|
Layer-1 and Layer-2 Troubleshooting |
|
|
318 | (1) |
|
|
319 | (1) |
|
|
319 | (1) |
|
|
320 | (1) |
|
|
321 | (4) |
|
|
323 | (2) |
8 Subnetting and Routing |
|
325 | (42) |
|
|
326 | (11) |
|
Exercise 8-1: Subnetting IP Addresses |
|
|
331 | (6) |
|
Classful vs. Classless Addressing |
|
|
337 | (3) |
|
|
337 | (3) |
|
Exercise 8-2: Subnetting Networks |
|
|
338 | (2) |
|
|
340 | (1) |
|
Understanding Routing and Static Routes |
|
|
340 | (13) |
|
|
341 | (1) |
|
|
342 | (7) |
|
Exercise 8-3: Configuring Cisco Routers |
|
|
346 | (3) |
|
|
349 | (4) |
|
Dynamic Routing Protocols |
|
|
353 | (8) |
|
|
353 | (1) |
|
|
354 | (3) |
|
|
357 | (1) |
|
|
358 | (2) |
|
|
360 | (1) |
|
|
361 | (1) |
|
|
362 | (5) |
|
|
364 | (3) |
9 Configuring Network Services |
|
367 | (34) |
|
|
368 | (7) |
|
|
369 | (1) |
|
|
369 | (4) |
|
|
373 | (2) |
|
Exercise 9-1: Installing and Configuring DNS |
|
|
375 | (1) |
|
|
375 | (8) |
|
|
376 | (1) |
|
|
377 | (4) |
|
|
381 | (1) |
|
Exercise 9-2: Installing and Configuring DHCP |
|
|
382 | (1) |
|
|
382 | (1) |
|
|
383 | (6) |
|
|
383 | (3) |
|
|
386 | (3) |
|
Exercise 9-3: Configuring NAT on Windows Server |
|
|
388 | (1) |
|
Port Forwarding, Proxy Servers, and Unified Communications |
|
|
389 | (5) |
|
|
389 | (2) |
|
Exercise 9-4: Configuring Port Forwarding |
|
|
390 | (1) |
|
|
391 | (1) |
|
|
391 | (2) |
|
|
393 | (1) |
|
|
394 | (1) |
|
|
395 | (6) |
|
|
398 | (3) |
10 Wireless Networking |
|
401 | (42) |
|
|
402 | (7) |
|
|
402 | (1) |
|
|
403 | (1) |
|
|
404 | (2) |
|
|
406 | (2) |
|
Authentication and Encryption |
|
|
408 | (1) |
|
|
409 | (9) |
|
|
410 | (4) |
|
|
414 | (4) |
|
Implementing a Wireless Network |
|
|
418 | (16) |
|
Configuring the Wireless Router/Access Point |
|
|
418 | (4) |
|
|
422 | (6) |
|
|
428 | (2) |
|
Exercise 10-1: Configuring a Wireless Network |
|
|
429 | (1) |
|
Implementing MAC Filtering |
|
|
430 | (1) |
|
Changing the SSID and Implementing WEP |
|
|
430 | (1) |
|
Configuring a Windows 8 Client |
|
|
431 | (1) |
|
Configuring Roaming Wireless |
|
|
431 | (1) |
|
Understanding Mobile Devices |
|
|
431 | (1) |
|
|
432 | (2) |
|
|
434 | (2) |
|
|
434 | (1) |
|
|
435 | (1) |
|
|
436 | (1) |
|
|
436 | (1) |
|
|
436 | (2) |
|
|
438 | (5) |
|
|
440 | (3) |
11 Remote Access and VPN Connectivity |
|
443 | (44) |
|
Remote Connectivity Concepts |
|
|
444 | (8) |
|
Public Switched Telephone Network |
|
|
445 | (2) |
|
Integrated Services Digital Network |
|
|
447 | (5) |
|
Remote Access Service (RAS) |
|
|
452 | (9) |
|
Serial Line Internet Protocol |
|
|
453 | (1) |
|
|
453 | (8) |
|
Exercise 11-1: Enabling Modem Logging in Windows |
|
|
460 | (1) |
|
|
461 | (7) |
|
Modem Configuration Parameters |
|
|
462 | (2) |
|
|
464 | (1) |
|
|
464 | (2) |
|
Requirements for a Remote Connection |
|
|
466 | (2) |
|
Exercise 11-2: Creating a PPP Dial-Up Connection |
|
|
467 | (1) |
|
Virtual Private Networks (VPNs) |
|
|
468 | (11) |
|
|
468 | (1) |
|
|
469 | (8) |
|
Exercise 11-3: Setting Up a VPN Server |
|
|
472 | (3) |
|
Exercise 11-4: Setting Up a VPN Client |
|
|
475 | (2) |
|
|
477 | (2) |
|
|
479 | (1) |
|
|
480 | (7) |
|
|
483 | (4) |
12 Wide Area Network Technologies |
|
487 | (28) |
|
Packet-Switching vs. Circuit-Switching Networks |
|
|
488 | (4) |
|
|
488 | (1) |
|
|
489 | (1) |
|
|
490 | (2) |
|
Fiber-Optic WAN Technologies |
|
|
492 | (5) |
|
Synchronous Optical Network/Synchronous Digital Hierarchy |
|
|
492 | (1) |
|
|
493 | (1) |
|
Fiber Distributed Data Interface |
|
|
494 | (2) |
|
Asynchronous Transfer Mode |
|
|
496 | (1) |
|
Internet Access Technologies |
|
|
497 | (9) |
|
Leased Lines with Tx-/Ex-Carriers |
|
|
498 | (1) |
|
|
499 | (2) |
|
|
501 | (1) |
|
High Speed via Satellite and Cellular Networks |
|
|
502 | (2) |
|
Other Methods of Internet Access |
|
|
504 | (1) |
|
|
505 | (1) |
|
|
506 | (1) |
|
|
507 | (8) |
|
|
511 | (4) |
13 Implementing a Network |
|
515 | (56) |
|
|
516 | (9) |
|
|
516 | (3) |
|
|
519 | (4) |
|
Exercise 13-1: Confirming Networking Components in Windows |
|
|
522 | (1) |
|
Installing a Network Server |
|
|
523 | (2) |
|
|
525 | (10) |
|
|
526 | (1) |
|
|
526 | (6) |
|
Exercise 13-2: Creating Users in Active Directory |
|
|
530 | (2) |
|
|
532 | (3) |
|
Exercise 13-3: Configuring a Password Policy |
|
|
534 | (1) |
|
|
535 | (5) |
|
|
535 | (2) |
|
|
537 | (3) |
|
Exercise 13-4: Creating Groups in Active Directory |
|
|
538 | (2) |
|
Securing Files and Folders |
|
|
540 | (7) |
|
Securing Files in Windows |
|
|
540 | (3) |
|
Exercise 13-5: Configuring Permissions in Windows Server 2012 |
|
|
541 | (2) |
|
Connecting to a Shared Folder |
|
|
543 | (1) |
|
|
544 | (3) |
|
|
547 | (4) |
|
Installing a Print Server |
|
|
547 | (1) |
|
Changing Printer Permissions |
|
|
548 | (2) |
|
Exercise 13-6: Installing a Printer on Windows Server 2012 |
|
|
549 | (1) |
|
Configuring a Print Client |
|
|
550 | (1) |
|
Working with Network Hardware |
|
|
551 | (11) |
|
Environmental Factors that Affect Computer Networks |
|
|
552 | (2) |
|
Common Peripheral Ports and Network Components |
|
|
554 | (5) |
|
Compatibility and Cabling Issues |
|
|
559 | (1) |
|
Implementing a SOHO Network |
|
|
559 | (1) |
|
Implement a Network Based on Requirements |
|
|
560 | (1) |
|
|
561 | (1) |
|
|
562 | (2) |
|
|
564 | (7) |
|
|
568 | (3) |
14 Maintaining and Supporting a Network |
|
571 | (50) |
|
Network Upgrades and Downgrades |
|
|
572 | (4) |
|
|
572 | (2) |
|
|
574 | (1) |
|
|
574 | (2) |
|
Installing Patches and Updates |
|
|
576 | (6) |
|
Exercise 14-1: Configuring Windows Update |
|
|
578 | (1) |
|
Windows Server Update Services (WSUS) |
|
|
579 | (3) |
|
Antivirus and Antispyware Software |
|
|
582 | (4) |
|
|
582 | (3) |
|
|
585 | (1) |
|
|
586 | (8) |
|
|
586 | (2) |
|
|
588 | (1) |
|
Full, Incremental, and Differential Backups |
|
|
588 | (3) |
|
|
591 | (3) |
|
Exercise 14-2: Backing Up and Restoring Data on a Windows Server |
|
|
592 | (2) |
|
Providing Fault Tolerance |
|
|
594 | (8) |
|
|
594 | (3) |
|
|
597 | (2) |
|
|
599 | (3) |
|
Exercise 14-3: Understanding and Configuring Fault Tolerance |
|
|
601 | (1) |
|
Network Documentation and Configuration Management |
|
|
602 | (8) |
|
|
602 | (1) |
|
Physical Network Diagrams |
|
|
603 | (1) |
|
|
604 | (1) |
|
|
604 | (1) |
|
|
604 | (1) |
|
|
604 | (1) |
|
|
604 | (1) |
|
Internal Policies, Procedures, and Standards |
|
|
605 | (1) |
|
|
606 | (2) |
|
|
608 | (1) |
|
|
609 | (1) |
|
|
610 | (2) |
|
|
612 | (9) |
|
|
617 | (4) |
15 Network Security Principles |
|
621 | (72) |
|
Understanding Attack Types |
|
|
622 | (7) |
|
|
622 | (1) |
|
|
623 | (1) |
|
|
623 | (3) |
|
|
626 | (1) |
|
|
627 | (1) |
|
|
628 | (1) |
|
Understanding System Security |
|
|
629 | (25) |
|
|
629 | (6) |
|
|
635 | (1) |
|
Windows Security Subsystem |
|
|
636 | (6) |
|
|
642 | (1) |
|
|
642 | (4) |
|
Exercise 15-1: Setting Permissions on Registry Keys |
|
|
645 | (1) |
|
|
646 | (3) |
|
Exercise 15-2: Modifying User Rights on a Windows System |
|
|
648 | (1) |
|
|
649 | (5) |
|
Exercise 15-3: Implementing Auditing in Windows |
|
|
653 | (1) |
|
Implementing Network Security |
|
|
654 | (3) |
|
|
654 | (3) |
|
|
657 | (9) |
|
|
658 | (2) |
|
|
660 | (1) |
|
|
661 | (1) |
|
Methods of Securing Traffic |
|
|
662 | (4) |
|
Fault Tolerance and Disaster Recovery |
|
|
666 | (3) |
|
|
666 | (1) |
|
Disaster Recovery and Business Continuity |
|
|
667 | (2) |
|
Guidelines to Protect the Network |
|
|
669 | (13) |
|
|
670 | (1) |
|
|
670 | (1) |
|
Intrusion Detection Systems |
|
|
671 | (2) |
|
|
673 | (1) |
|
Hardening Devices and Systems |
|
|
674 | (1) |
|
|
675 | (1) |
|
|
676 | (2) |
|
Vulnerability Testing and Penetration Testing |
|
|
678 | (2) |
|
End-User Awareness and Training |
|
|
680 | (1) |
|
|
681 | (1) |
|
|
682 | (3) |
|
|
685 | (8) |
|
|
689 | (4) |
16 Network Security Practices |
|
693 | (32) |
|
Implement Network Hardening Techniques |
|
|
694 | (5) |
|
Security Policy and Access Control Models |
|
|
694 | (1) |
|
|
695 | (1) |
|
|
696 | (1) |
|
Disable Unneeded Network Services |
|
|
697 | (1) |
|
Network Segmentation and Access Lists |
|
|
697 | (1) |
|
|
698 | (1) |
|
Physical Security Controls |
|
|
699 | (4) |
|
|
699 | (2) |
|
Network Closet/Server Room |
|
|
701 | (1) |
|
|
702 | (1) |
|
|
703 | (10) |
|
|
704 | (2) |
|
|
706 | (2) |
|
|
708 | (2) |
|
Configuring Access Control Lists |
|
|
710 | (3) |
|
Exercise 16-1: Enabling the Windows Firewall |
|
|
712 | (1) |
|
|
713 | (4) |
|
|
713 | (1) |
|
|
714 | (1) |
|
|
715 | (1) |
|
|
716 | (1) |
|
|
717 | (1) |
|
|
717 | (1) |
|
|
717 | (2) |
|
|
719 | (6) |
|
|
721 | (4) |
17 Monitoring the Network |
|
725 | (20) |
|
|
726 | (3) |
|
|
726 | (2) |
|
|
728 | (1) |
|
|
729 | (8) |
|
|
729 | (1) |
|
|
730 | (1) |
|
Exercise 17-1: Using a Port Scanner |
|
|
731 | (1) |
|
|
731 | (4) |
|
Exercise 17-2: Using System Monitor |
|
|
734 | (1) |
|
|
735 | (1) |
|
Exercise 17-3: Checking Event Logs |
|
|
735 | (1) |
|
|
736 | (1) |
|
Environmental and Power Monitoring |
|
|
737 | (1) |
|
Monitoring Techniques to Track Problems |
|
|
737 | (2) |
|
Monitoring Best Practices |
|
|
737 | (1) |
|
|
738 | (1) |
|
|
738 | (1) |
|
|
739 | (1) |
|
|
739 | (1) |
|
|
740 | (5) |
|
|
742 | (3) |
18 Troubleshooting the Network |
|
745 | (46) |
|
Managing Network Problems |
|
|
746 | (3) |
|
Does the Problem Exist Across the Network? |
|
|
746 | (1) |
|
Workstation, Workgroup, LAN, or WAN Problem? |
|
|
747 | (1) |
|
Is the Problem Consistent and Replicable? |
|
|
748 | (1) |
|
Standard Troubleshooting Methods |
|
|
748 | (1) |
|
Network Troubleshooting Methodology |
|
|
749 | (5) |
|
Step 1: Identify the Problem |
|
|
750 | (1) |
|
Step 2: Establish a Theory of Probable Cause |
|
|
751 | (1) |
|
Step 3: Test the Theory to Determine Cause |
|
|
751 | (1) |
|
Step 4: Establish a Plan of Action to Resolve the Problem and Identify Potential Effects |
|
|
751 | (1) |
|
Step 5: Implement the Solution or Escalate as Necessary |
|
|
752 | (1) |
|
Step 6: Verify Full System Functionality and, If Applicable, Implement Preventative Measures |
|
|
752 | (1) |
|
Step 7: Document Findings, Actions, and Outcomes |
|
|
753 | (1) |
|
|
753 | (1) |
|
Sample Troubleshooting Situations |
|
|
753 | (1) |
|
System or Operator Problems |
|
|
754 | (1) |
|
Checking Physical and Logical Indicators |
|
|
755 | (11) |
|
|
755 | (1) |
|
|
755 | (1) |
|
|
756 | (1) |
|
|
756 | (1) |
|
|
756 | (1) |
|
Performance Issues and Optimization |
|
|
757 | (2) |
|
Physical and Logical Issues |
|
|
759 | (7) |
|
Other Symptoms and Causes of Network Problems |
|
|
766 | (9) |
|
Recognizing Abnormal Physical Conditions |
|
|
768 | (1) |
|
Isolating and Correcting Problems in the Physical Media |
|
|
769 | (1) |
|
Checking the Status of Servers |
|
|
769 | (2) |
|
Checking for Configuration Problems |
|
|
771 | (2) |
|
|
773 | (1) |
|
Checking the Validity of the Account Name and Password |
|
|
773 | (1) |
|
Rechecking Operator Logon Procedures |
|
|
774 | (1) |
|
Selecting and Running Appropriate Diagnostics |
|
|
774 | (1) |
|
Network Troubleshooting Tools |
|
|
775 | (7) |
|
Cable Crimper, Wire Stripper, and Punch-Down Tool |
|
|
775 | (1) |
|
Cable Tester, Certifier, and Butt Set |
|
|
776 | (1) |
|
|
777 | (1) |
|
Loopback Plug, Line Testers, and Light Meter |
|
|
777 | (1) |
|
Tone Generator/Toner Probe |
|
|
778 | (1) |
|
|
778 | (1) |
|
|
778 | (1) |
|
|
779 | (1) |
|
Software Troubleshooting Tools |
|
|
780 | (1) |
|
|
781 | (1) |
|
|
782 | (2) |
|
|
784 | (7) |
|
|
787 | (4) |
A About the DVD |
|
791 | (4) |
|
|
792 | (1) |
|
Total Tester Premium Practice Exam Software |
|
|
792 | (1) |
|
Installing and Running Total Tester |
|
|
792 | (1) |
|
|
792 | (1) |
|
Video Training from the Author |
|
|
793 | (1) |
|
Performance-Based Questions PDF and Video Demonstrations |
|
|
793 | (1) |
|
Lab Book, Lab Book Answers, and Lab Files |
|
|
793 | (1) |
|
|
793 | (1) |
|
|
793 | (1) |
|
|
794 | (1) |
|
|
794 | (1) |
|
Total Seminars Technical Support |
|
|
794 | (1) |
|
McGraw-Hill Education Content Support |
|
|
794 | (1) |
Index |
|
795 | |