Preface |
|
xx | |
Instructor and Student Web Site |
|
xxi | |
Chapter 1 CompTIA Network+ in a Nutshell |
|
1 | (7) |
|
Who Needs CompTIA Network+? |
|
|
|
I Just Want to Learn about Networks! |
|
|
1 | (1) |
|
What Is CompTIA Network+ Certification? |
|
|
1 | (2) |
|
|
2 | (1) |
|
The Current CompTIA Network+ Certification Exam Release |
|
|
2 | (1) |
|
How Do I Become CompTIA Network+ Certified? |
|
|
2 | (1) |
|
|
3 | (2) |
|
|
4 | (1) |
|
How Much Does the Test Cost? |
|
|
4 | (1) |
|
How to Pass the CompTIA Network+ Exam |
|
|
5 | (3) |
|
|
5 | (1) |
|
Set Aside the Right Amount of Study Time |
|
|
5 | (1) |
|
|
5 | (3) |
Chapter 2 Network Models |
|
8 | (34) |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
The OSI Seven-Layer Model in Action |
|
|
11 | (2) |
|
|
12 | (1) |
|
|
13 | (1) |
|
Let's Get Physical-Network Hardware and Layers 1-2 |
|
|
13 | (9) |
|
Beyond the Single Wire-Network Software and Layers 3-7 |
|
|
22 | (9) |
|
|
30 | (1) |
|
|
31 | (5) |
|
|
31 | (1) |
|
|
32 | (2) |
|
|
34 | (1) |
|
Frames, Packets, and Segments/Datagrams, Oh My! |
|
|
35 | (1) |
|
The Tech's Troubleshooting Tools |
|
|
36 | (1) |
|
|
37 | (5) |
Chapter 3 Cabling and Topology |
|
42 | (20) |
|
|
43 | (1) |
|
|
43 | (4) |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
Mesh and Point-to-Multipoint |
|
|
45 | (2) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
47 | (8) |
|
Copper Cabling and Connectors |
|
|
48 | (4) |
|
Fiber-Optic Cabling and Connectors |
|
|
52 | (2) |
|
|
54 | (1) |
|
|
54 | (1) |
|
Networking Industry Standards-IEEE |
|
|
55 | (2) |
|
|
57 | (5) |
Chapter 4 Ethernet Basics |
|
62 | (22) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
64 | (4) |
|
|
64 | (2) |
|
|
66 | (2) |
|
|
68 | (5) |
|
|
68 | (1) |
|
|
69 | (3) |
|
|
72 | (1) |
|
Extending and Enhancing Ethernet Networks |
|
|
73 | (7) |
|
|
73 | (1) |
|
Connecting Ethernet Segments |
|
|
73 | (3) |
|
|
76 | (3) |
|
Troubleshooting Hubs and Switches |
|
|
79 | (1) |
|
|
80 | (4) |
Chapter 5 Modern Ethernet |
|
84 | (18) |
|
|
85 | (1) |
|
|
85 | (3) |
|
|
85 | (2) |
|
|
87 | (1) |
|
|
88 | (3) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
89 | (2) |
|
Mechanical Connection Variations |
|
|
91 | (1) |
|
Implementing Multiple Types of Gigabit Ethernet |
|
|
91 | (1) |
|
|
91 | (4) |
|
|
92 | (3) |
|
|
95 | (1) |
|
|
95 | (1) |
|
|
96 | (6) |
Chapter 6 Installing a Physical Network |
|
102 | (42) |
|
|
103 | (1) |
|
Understanding Structured Cabling |
|
|
103 | (2) |
|
Cable Basics-A Star Is Born |
|
|
104 | (1) |
|
|
105 | (10) |
|
Structured Cable Network Components |
|
|
105 | (8) |
|
Structured Cable-Beyond the Star |
|
|
113 | (2) |
|
Installing Structured Cabling |
|
|
115 | (14) |
|
|
116 | (1) |
|
|
116 | (1) |
|
Determining the Location of the Telecommunications Room |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
119 | (4) |
|
|
123 | (6) |
|
|
129 | (4) |
|
|
130 | (1) |
|
|
131 | (2) |
|
Diagnostics and Repair of Physical Cabling |
|
|
133 | (6) |
|
Diagnosing Physical Problems |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
|
|
135 | (2) |
|
|
137 | (2) |
|
|
139 | (5) |
Chapter 7 TCP/IP Basics |
|
144 | (38) |
|
|
145 | (1) |
|
Standardizing Networking Technology |
|
|
145 | (1) |
|
|
146 | (1) |
|
The TCP/IP Protocol Suite |
|
|
146 | (4) |
|
|
147 | (1) |
|
Transport Layer Protocols |
|
|
148 | (1) |
|
Application Layer Protocols |
|
|
149 | (1) |
|
|
150 | (12) |
|
|
151 | (4) |
|
|
155 | (6) |
|
|
161 | (1) |
|
|
162 | (7) |
|
|
162 | (6) |
|
CIDR: Subnetting in the Real World |
|
|
168 | (1) |
|
|
169 | (8) |
|
|
169 | (3) |
|
|
172 | (4) |
|
|
176 | (1) |
|
|
177 | (5) |
Chapter 8 Routing |
|
182 | (40) |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
184 | (11) |
|
|
184 | (6) |
|
|
190 | (1) |
|
Network Address Translation |
|
|
191 | (4) |
|
|
195 | (11) |
|
|
196 | (1) |
|
Distance Vector and Path Vector |
|
|
197 | (5) |
|
|
202 | (3) |
|
|
205 | (1) |
|
Dynamic Routing Makes the Internet |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
206 | (10) |
|
|
206 | (5) |
|
Basic Router Configuration |
|
|
211 | (2) |
|
|
213 | (3) |
|
|
216 | (6) |
Chapter 9 TCP/IP Applications |
|
222 | (34) |
|
|
223 | (1) |
|
Transport Layer and Network Layer Protocols |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
223 | (3) |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
225 | (1) |
|
|
225 | (1) |
|
The Power of Port Numbers |
|
|
226 | (8) |
|
|
228 | (2) |
|
|
230 | (3) |
|
Rules for Determining Good vs. Bad Communications |
|
|
233 | (1) |
|
Common TCP/IP Applications |
|
|
234 | (17) |
|
|
234 | (5) |
|
|
239 | (4) |
|
|
243 | (4) |
|
|
247 | (3) |
|
|
250 | (1) |
|
|
251 | (5) |
Chapter 10 Network Naming |
|
256 | (32) |
|
|
257 | (1) |
|
|
257 | (3) |
|
|
257 | (1) |
|
|
258 | (2) |
|
|
260 | (20) |
|
|
260 | (11) |
|
|
271 | (7) |
|
|
278 | (2) |
|
Diagnosing TCP/IP Networks |
|
|
280 | (3) |
|
|
283 | (5) |
Chapter 11 Securing TCP/IP |
|
288 | (38) |
|
|
289 | (1) |
|
|
289 | (13) |
|
|
289 | (7) |
|
|
296 | (2) |
|
|
298 | (3) |
|
|
301 | (1) |
|
|
301 | (1) |
|
TCP/IP Security Standards |
|
|
302 | (13) |
|
User Authentication Standards |
|
|
302 | (9) |
|
|
311 | (2) |
|
Combining Authentication and Encryption |
|
|
313 | (2) |
|
Secure TCP/IP Applications |
|
|
315 | (5) |
|
|
316 | (1) |
|
|
317 | (1) |
|
|
317 | (1) |
|
|
317 | (1) |
|
|
318 | (1) |
|
|
319 | (1) |
|
|
320 | (6) |
Chapter 12 Advanced Networking Devices |
|
326 | (32) |
|
Client/Server and Peer-to-Peer Topologies |
|
|
327 | (1) |
|
|
327 | (2) |
|
|
327 | (1) |
|
|
328 | (1) |
|
|
329 | (2) |
|
Client/Server and Peer-to-Peer Today |
|
|
329 | (2) |
|
|
331 | (3) |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
334 | (1) |
|
|
334 | (1) |
|
|
335 | (7) |
|
|
336 | (1) |
|
Configuring a VLAN-capable Switch |
|
|
337 | (2) |
|
|
339 | (1) |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
341 | (1) |
|
|
342 | (1) |
|
|
342 | (11) |
|
|
342 | (2) |
|
|
344 | (1) |
|
|
345 | (1) |
|
|
346 | (7) |
|
|
353 | (5) |
Chapter 13 IPv6 |
|
358 | (22) |
|
|
359 | (1) |
|
|
359 | (8) |
|
|
359 | (1) |
|
|
360 | (1) |
|
|
361 | (1) |
|
|
361 | (2) |
|
|
363 | (1) |
|
|
364 | (3) |
|
|
367 | (4) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
370 | (1) |
|
|
371 | (1) |
|
|
371 | (5) |
|
|
371 | (1) |
|
|
372 | (3) |
|
|
375 | (1) |
|
|
375 | (1) |
|
|
376 | (4) |
Chapter 14 Remote Connectivity |
|
380 | (48) |
|
|
381 | (1) |
|
|
381 | (5) |
|
The Dawn of Long Distance |
|
|
382 | (4) |
|
|
386 | (10) |
|
|
386 | (1) |
|
Copper Carriers: T1 and T3 |
|
|
387 | (3) |
|
Fiber Carriers: SONET/SDH and OC |
|
|
390 | (2) |
|
|
392 | (3) |
|
|
395 | (1) |
|
Alternative to Telephony WAN |
|
|
396 | (1) |
|
|
396 | (14) |
|
|
397 | (5) |
|
|
402 | (3) |
|
|
405 | (1) |
|
|
405 | (1) |
|
|
406 | (3) |
|
|
409 | (1) |
|
|
409 | (1) |
|
|
409 | (1) |
|
|
410 | (7) |
|
|
410 | (1) |
|
|
411 | (1) |
|
|
412 | (2) |
|
|
414 | (3) |
|
WAN Troubleshooting Scenarios |
|
|
417 | (3) |
|
Loss of Internet Connectivity |
|
|
417 | (1) |
|
|
418 | (1) |
|
|
418 | (1) |
|
|
419 | (1) |
|
|
420 | (8) |
Chapter 15 Wireless Networking |
|
428 | (44) |
|
|
429 | (1) |
|
|
429 | (1) |
|
|
429 | (17) |
|
|
429 | (7) |
|
|
436 | (1) |
|
|
436 | (1) |
|
|
437 | (1) |
|
|
437 | (1) |
|
|
438 | (1) |
|
|
438 | (1) |
|
|
439 | (4) |
|
|
443 | (3) |
|
|
446 | (1) |
|
|
446 | (13) |
|
|
446 | (2) |
|
|
448 | (1) |
|
Setting Up an Ad Hoc Network |
|
|
449 | (1) |
|
Setting Up an Infrastructure Network |
|
|
450 | (9) |
|
|
459 | (1) |
|
Verifying the Installation |
|
|
459 | (1) |
|
|
459 | (7) |
|
|
460 | (2) |
|
|
462 | (1) |
|
|
463 | (3) |
|
|
466 | (6) |
Chapter 16 Virtualization and Cloud Computing |
|
472 | (26) |
|
|
473 | (1) |
|
|
473 | (6) |
|
|
474 | (1) |
|
Emulation vs. Virtualization |
|
|
475 | (1) |
|
|
475 | (4) |
|
|
479 | (1) |
|
|
479 | (2) |
|
|
479 | (1) |
|
|
480 | (1) |
|
|
480 | (1) |
|
|
480 | (1) |
|
|
480 | (1) |
|
Virtualization in Modern Networks |
|
|
481 | (5) |
|
|
482 | (1) |
|
|
482 | (4) |
|
|
486 | (7) |
|
|
487 | (3) |
|
|
490 | (3) |
|
|
493 | (5) |
Chapter 17 Building a Real-World Network |
|
498 | (22) |
|
|
499 | (1) |
|
Designing a Basic Network |
|
|
499 | (8) |
|
|
500 | (1) |
|
|
501 | (1) |
|
|
501 | (2) |
|
|
503 | (1) |
|
|
504 | (2) |
|
|
506 | (1) |
|
|
507 | (5) |
|
|
507 | (1) |
|
Unified Communication Features |
|
|
508 | (2) |
|
|
510 | (2) |
|
|
512 | (4) |
|
|
512 | (2) |
|
|
514 | (1) |
|
|
514 | (2) |
|
|
516 | (4) |
Chapter 18 Managing Risk |
|
520 | (24) |
|
|
521 | (1) |
|
|
521 | (9) |
|
|
521 | (1) |
|
|
522 | (2) |
|
|
524 | (1) |
|
|
525 | (1) |
|
|
526 | (1) |
|
Standard Business Documents |
|
|
527 | (1) |
|
|
528 | (2) |
|
|
530 | (5) |
|
|
531 | (1) |
|
|
531 | (1) |
|
|
532 | (1) |
|
|
532 | (3) |
|
|
535 | (4) |
|
|
535 | (1) |
|
Physical/Installation Safety |
|
|
535 | (1) |
|
Rack Installation and Maintenance |
|
|
536 | (1) |
|
|
537 | (2) |
|
|
539 | (5) |
Chapter 19 Protecting Your Network |
|
544 | (36) |
|
|
545 | (1) |
|
|
545 | (10) |
|
|
545 | (1) |
|
|
546 | (1) |
|
|
547 | (1) |
|
|
547 | (1) |
|
|
548 | (1) |
|
|
549 | (1) |
|
|
550 | (1) |
|
|
550 | (1) |
|
|
550 | (2) |
|
|
552 | (2) |
|
|
554 | (1) |
|
|
555 | (3) |
|
Unnecessary Running Services |
|
|
556 | (1) |
|
|
556 | (1) |
|
|
557 | (1) |
|
|
557 | (1) |
|
|
558 | (1) |
|
|
558 | (12) |
|
|
558 | (3) |
|
|
561 | (6) |
|
|
567 | (3) |
|
|
570 | (5) |
|
|
570 | (1) |
|
Implementing and Configuring Firewalls |
|
|
571 | (3) |
|
Troubleshooting Firewalls |
|
|
574 | (1) |
|
|
575 | (5) |
Chapter 20 Network Monitoring |
|
580 | (18) |
|
|
581 | (1) |
|
|
581 | (2) |
|
|
583 | (7) |
|
|
584 | (1) |
|
|
584 | (3) |
|
|
587 | (2) |
|
|
589 | (1) |
|
|
590 | (4) |
|
Scenario: Monitoring and Managing |
|
|
590 | (3) |
|
|
593 | (1) |
|
|
594 | (4) |
Chapter 21 Network Troubleshooting |
|
598 | (40) |
|
|
599 | (1) |
|
|
599 | (11) |
|
|
599 | (3) |
|
|
602 | (8) |
|
The Troubleshooting Process |
|
|
610 | (6) |
|
|
611 | (1) |
|
Establish a Theory of Probable Cause |
|
|
612 | (1) |
|
Test the Theory to Determine Cause |
|
|
613 | (1) |
|
Establish a Plan of Action and Identify Potential Effects |
|
|
614 | (1) |
|
Implement the Solution or Escalate as Necessary |
|
|
614 | (1) |
|
Verify Full System Functionality and Implement Preventative Measures |
|
|
615 | (1) |
|
Document Findings, Actions, and Outcomes |
|
|
616 | (1) |
|
Resolving Common Network Issues |
|
|
616 | (10) |
|
"We Can't Access Our Web Server in Istanbul" |
|
|
616 | (1) |
|
|
617 | (2) |
|
|
619 | (2) |
|
|
621 | (3) |
|
|
624 | (1) |
|
|
625 | (1) |
|
|
626 | (1) |
|
|
626 | (6) |
|
|
627 | (1) |
|
|
628 | (1) |
|
|
629 | (1) |
|
|
630 | (2) |
|
|
632 | (6) |
Appendix A Objective Map: CompTIA Network+ |
|
638 | (22) |
Appendix B Create Your Study Plan |
|
660 | (2) |
|
Review Your Overall Score |
|
|
660 | (1) |
|
Review Your Score by CompTIA Network+ Exam Domain |
|
|
661 | (1) |
Appendix C About the CD-ROM |
|
662 | (4) |
|
Playing the Mike Meyers Introduction Video |
|
|
662 | (1) |
|
|
662 | (1) |
|
Total Tester Exam Software |
|
|
662 | (1) |
|
|
663 | (1) |
|
|
663 | (1) |
|
|
663 | (1) |
|
|
664 | (1) |
|
|
664 | (1) |
|
|
664 | (2) |
|
Total Seminars Technical Support |
|
|
664 | (1) |
|
McGraw-Hill Education Content Support |
|
|
665 | (1) |
Glossary |
|
666 | (48) |
Index |
|
714 | |