You are previewing CompTIA® Network+® 2009 In Depth.
O'Reilly logo
CompTIA® Network+® 2009 In Depth

Book Description

CompTIA ® Network+® 2009 In Depth gives you all the skills necessary to pass the CompTIA 2009 Network+ exam and provides everything you need to know to install, configure, and troubleshoot a computer network. This book begins by introducing the fundamental building blocks that form a modern network, such as protocols, topologies, hardware, and network operating systems. It then provides in-depth coverage of the most important concepts in contemporary networking, such as TCP/IP, Ethernet, wireless transmission, and security. Because some technical topics can be difficult to grasp, this book explains concepts logically and in a clear, approachable style. In addition, concepts are reinforced by real-world examples of networking issues from a professional's standpoint. Each chapter opens with an 'On the Job' story from a network engineer. These real-world examples help make this book a more practical learning tool. Additionally, the numerous tables and illustrations, along with the glossary, appendixes, and review questions, make the book a valuable reference for any networking professional. After reading this book and completing the end-of-chapter review questions, you will be prepared to select the best network design, hardware, and software for your environment. You will also have the skills to build a network from scratch and maintain, upgrade, and troubleshoot an existing network. Most importantly, you will be well prepared to pass CompTIA's Network+ 2009 certification exam!

Table of Contents

  1. Copyright
  2. Preface
    1. Intended Audience
    2. Chapter Descriptions
    3. Features
    4. Text and Graphic Conventions
      1. Acknowledgments
      2. Photo Credits
      3. State of the Information Technology (IT) Field
      4. Certifications
      5. Career Planning
      6. CompTIA Authorized Curriculum Program
      7. What’s New with CompTIA Network+ Certification?
      8. How to Become CompTIA Certified
  3. 1. An Introduction to Networking
    1. Why Use Networks?
    2. Types of Networks
      1. Peer-to-Peer Networks
      2. Client/Server Networks
      3. LANs, MANs, and WANs
    3. Elements Common to Client/Server Networks
    4. How Networks Are Used
      1. File and Print Services
      2. Access Services
      3. Communications Services
      4. Internet Services
      5. Management Services
    5. Becoming a Networking Professional
      1. Mastering the Technical Challenges
      2. Developing Your “Soft Skills”
      3. Pursuing Certification
      4. Finding a Job in Networking
      5. Joining Professional Associations
    6. Chapter Summary
    7. Key Terms
    8. Review Questions
  4. 2. Networking Standards and the OSI Model
    1. Networking Standards Organizations
      1. ANSI
      2. EIA and TIA
      3. IEEE
      4. ISO
      5. ITU
      6. ISOC
      7. IANA and ICANN
    2. The OSI Model
      1. Application Layer
      2. Presentation Layer
      3. Session Layer
      4. Transport Layer
      5. Network Layer
      6. Data Link Layer
      7. Physical Layer
    3. Applying the OSI Model
      1. Communication between Two Systems
      2. Frame Specifications
    4. IEEE Networking Specifications
    5. Chapter Summary
    6. Key Terms
    7. Review Questions
  5. 3. Transmission Basics and Networking Media
    1. Transmission Basics
      1. Analog and Digital Signaling
      2. Data Modulation
      3. Simplex, Half-Duplex, and Duplex
      4. Multiplexing
      5. Relationships between Nodes
      6. Throughput and Bandwidth
      7. Baseband and Broadband
      8. Transmission Flaws
        1. Noise
        2. Attenuation
        3. Latency
    2. Common Media Characteristics
      1. Throughput
      2. Cost
      3. Noise Immunity
      4. Size and Scalability
      5. Connectors and Media Converters
    3. Coaxial Cable
    4. Twisted Pair Cable
      1. STP (Shielded Twisted Pair)
      2. UTP (Unshielded Twisted Pair)
      3. Comparing STP and UTP
      4. Terminating Twisted Pair Cable
    5. Fiber-Optic Cable
      1. SMF (Single-Mode Fiber)
      2. MMF (Multimode Fiber)
    6. DTE (Data Terminal Equipment) and DCE (Data Circuit-Terminating Equipment) Connector Cables
    7. Structured Cabling
    8. Best Practices for Cable Installation and Management
    9. Chapter Summary
    10. Key Terms
    11. Review Questions
  6. 4. Introduction to TCP/IP Protocols
    1. Characteristics of TCP/IP (Transmission Control Protocol/Internet Protocol)
    2. The TCP/IP Core Protocols
      1. TCP (Transmission Control Protocol)
      2. UDP (User Datagram Protocol)
      3. IP (Internet Protocol)
      4. ICMP (Internet Control Message Protocol)
      5. IGMP (Internet Group Management Protocol)
      6. ARP (Address Resolution Protocol)
      7. RARP (Reverse Address Resolution Protocol)
    3. IPv4 Addressing
      1. Binary and Dotted Decimal Notation
      2. Subnet Mask
    4. Assigning IP Addresses
      1. BOOTP (Bootstrap Protocol)
      2. DHCP (Dynamic Host Configuration Protocol)
        1. DHCP Leasing Process
        2. Terminating a DHCP Lease
      3. APIPA (Automatic Private IP Addressing)
    5. IPv6 Addressing
    6. Sockets and Ports
    7. Host Names and DNS (Domain Name System)
      1. Domain Names
      2. Host Files
      3. DNS (Domain Name System)
      4. Configuring DNS
      5. DDNS (Dynamic DNS)
      6. Zeroconf (Zero Configuration)
    8. Application Layer Protocols
      1. Telnet
      2. FTP (File Transfer Protocol)
      3. TFTP (Trivial File Transfer Protocol)
      4. NTP (Network Time Protocol)
      5. NNTP (Network News Transfer Protocol)
      6. PING (Packet Internet Groper)
    9. Chapter Summary
    10. Key Terms
    11. Review Questions
  7. 5. Topologies and Ethernet Standards
    1. Simple Physical Topologies
      1. Bus
      2. Ring
      3. Star
    2. Logical Topologies
    3. Hybrid Physical Topologies
      1. Star-Wired Ring
      2. Star-Wired Bus
    4. Backbone Networks
      1. Serial Backbone
      2. Distributed Backbone
      3. Collapsed Backbone
      4. Parallel Backbone
    5. Switching
      1. Circuit Switching
      2. Message Switching
      3. Packet Switching
      4. MPLS (Multiprotocol Label Switching)
    6. Ethernet
      1. CSMA/CD (Carrier Sense Multiple Access with Collision Detection)
      2. Ethernet Standards for Copper Cable
        1. 10Base-T
        2. 100Base-T (Fast Ethernet)
        3. 1000Base-T
        4. 10GBase-T
      3. Ethernet Standards for Fiber-Optic Cable
        1. 100Base-FX
        2. 1000Base-LX
        3. 1000Base-SX
      4. 10-Gigabit Fiber-Optic Standards
        1. 10GBase-SR and 10GBase-SW
        2. 10GBase-LR and 10GBase-LW
        3. 10GBase-ER and 10GBase-EW
    7. Summary of Common Ethernet Standards
      1. Ethernet Frames
        1. Using and Configuring Frames
        2. Frame Fields
        3. Ethernet_II (DIX)
      2. PoE (Power over Ethernet)
    8. Chapter Summary
    9. Key Terms
    10. Review Questions
  8. 6. Network Hardware
    1. NICs (Network Interface Cards)
      1. Types of NICs
        1. Internal Bus Standards
        2. Peripheral Bus Standards
        3. On-Board NICs
        4. Wireless NICs
      2. Installing NICs
        1. Installing and Configuring NIC Hardware
        2. Installing and Configuring NIC Software
        3. Interpreting LED Indicators
        4. IRQ (Interrupt Request)
        5. Memory Range
        6. Base I/O Port
        7. Firmware Settings
      3. Choosing the Right NIC
    2. Repeaters and Hubs
    3. Bridges
    4. Switches
      1. Installing a Switch
      2. Switching Methods
        1. Cut-Through Mode
        2. Store-and-Forward Mode
      3. VLANs and Trunking
      4. STP (Spanning Tree Protocol)
      5. Content and Multilayer Switches
    5. Routers
      1. Router Characteristics and Functions
      2. Routing Protocols
        1. Distance-Vector: RIP, RIPv2, BGP
        2. Link-State: OSPF, IS-IS
        3. Hybrid: EIGRP
    6. Gateways and Other Multifunction Devices
    7. Chapter Summary
    8. Key Terms
    9. Review Questions
  9. 7. WANs and Remote Connectivity
    1. WAN Essentials
    2. WAN Topologies
      1. Bus
      2. Ring
      3. Star
      4. Mesh
      5. Tiered
    3. PSTN
    4. X.25 and Frame Relay
    5. ISDN
    6. T-Carriers
      1. Types of T-Carriers
      2. T-Carrier Connectivity
        1. Wiring
        2. Smart Jack
        3. CSU/DSU (Channel Service Unit/Data Service Unit)
        4. Terminal Equipment
    7. DSL
      1. Types of DSL
      2. DSL Connectivity
    8. Broadband Cable
    9. ATM (Asynchronous Transfer Mode)
    10. SONET (Synchronous Optical Network)
    11. WAN Technologies Compared
    12. Remote Connectivity
      1. Dial-Up Networking
      2. Remote Access Servers
      3. Remote Access Protocols
      4. Remote Virtual Computing
        1. Remote Desktop
        2. VNC (Virtual Network Computing)
        3. ICA (Independent Computing Architecture)
    13. (VPNs) Virtual Private Networks
    14. Chapter Summary
    15. Key Terms
    16. Review Questions
  10. 8. Wireless Networking
    1. The Wireless Spectrum
    2. Characteristics of Wireless Transmission
      1. Antennas
      2. Signal Propagation
      3. Signal Degradation
      4. Frequency Ranges
      5. Narrowband, Broadband, and Spread Spectrum Signals
      6. Fixed versus Mobile
    3. WLAN Architecture
    4. 802.11 WLANs
      1. Access Method
      2. Association
      3. Frames
      4. 802.11b
      5. 802.11a
      6. 802.11g
      7. 802.11n
    5. Bluetooth Networks
    6. Summary of WLAN Standards
    7. Implementing a WLAN
      1. Determining the Design
      2. Configuring Wireless Connectivity Devices
      3. Configuring Wireless Clients
      4. Avoiding Pitfalls
    8. Wireless WANs and Internet Access
      1. 802.11 Internet Access
      2. 802.16 (WiMAX) Internet Access
      3. Satellite Internet Access
        1. Satellite Orbits
        2. Satellite Frequencies
        3. Satellite Internet Services
    9. Chapter Summary
    10. Key Terms
    11. Review Questions
  11. 9. Network Operating Systems
    1. Characteristics of Network Operating Systems
      1. Network Operating Systems and Servers
      2. Client Support
        1. Client/Server Communication
        2. Users and Groups
      3. Identifying and Organizing Network Elements
      4. Sharing Applications
      5. Sharing Printers
      6. Managing System Resources
        1. Memory
        2. Multitasking
        3. Multiprocessing
    2. Windows Server 2008
      1. Hardware Requirements
      2. Memory Model
      3. NTFS (New Technology File System)
      4. Active Directory
        1. Workgroups
        2. Domains
        3. OUs (Organizational Units)
        4. Trees and Forests
        5. Trust Relationships
        6. Naming Conventions
      5. Server Management
    3. UNIX and Linux
      1. A Brief History of UNIX
      2. Varieties of UNIX
        1. Proprietary UNIX
        2. Open Source UNIX
      3. Two Flavors of UNIX
      4. Hardware Requirements
        1. Solaris Hardware Requirements
      5. Linux Hardware Requirements
      6. UNIX Multiprocessing
      7. The UNIX Memory Model
      8. The UNIX Kernel
      9. UNIX System File and Directory Structure
      10. UNIX File Systems
        1. Disk File Systems
        2. Network File Systems
      11. A UNIX and Linux Command Sampler
    4. Chapter Summary
    5. Key Terms
    6. Review Questions
  12. 10. In-Depth TCP/IP Networking
    1. Designing TCP/IP-Based Networks
      1. Subnetting
        1. Classful Addressing in IPv4
        2. IPv4 Subnet Masks
        3. Reserved Addresses
        4. IPv4 Subnetting Techniques
        5. Calculating IPv4 Subnets
      2. CIDR (Classless Interdomain Routing)
      3. Internet Gateways
      4. Address Translation
    2. TCP/IP Mail Services
      1. SMTP (Simple Mail Transfer Protocol)
      2. MIME (Multipurpose Internet Mail Extensions)
      3. POP (Post Office Protocol)
      4. IMAP (Internet Message Access Protocol)
    3. Additional TCP/IP Utilities
      1. Ipconfig
      2. Ifconfig
      3. Netstat
      4. Nbtstat
      5. Hostname, Host, and Nslookup
      6. Dig
      7. Whois
      8. Traceroute (Tracert)
      9. Mtr (my traceroute)
      10. Route
    4. Chapter Summary
    5. Key Terms
    6. Review Questions
  13. 11. Voice and Video over IP
    1. Terminology
    2. VoIP (Voice over IP) Applications and Interfaces
      1. Analog Telephones
      2. IP Telephones
      3. Softphones
    3. Video over IP Applications and Interfaces
      1. Streaming Video
      2. IPTV (IP Television)
      3. Videoconferencing
    4. Signaling Protocols
      1. H.323
      2. SIP (Session Initiation Protocol)
      3. MGCP (Media Gateway Control Protocol) and MEGACO (H.248)
    5. Transport Protocols
      1. RTP (Real-Time Transport Protocol)
      2. RTCP (Real-Time Transport Control Protocol)
    6. QoS (Quality of Service) Assurance
      1. RSVP (Resource Reservation Protocol)
      2. DiffServ (Differentiated Service)
      3. MPLS (Multiprotocol Label Switching)
    7. Chapter Summary
    8. Key Terms
    9. Review Questions
  14. 12. Network Security
    1. Security Audits
    2. Security Risks
      1. Risks Associated with People
      2. Risks Associated with Transmission and Hardware
      3. Risks Associated with Protocols and Software
      4. Risks Associated with Internet Access
    3. An Effective Security Policy
      1. Security Policy Goals
      2. Security Policy Content
      3. Response Policy
    4. Physical Security
    5. Security in Network Design
      1. Router Access Lists
      2. Intrusion Detection and Prevention
      3. Firewalls
      4. Proxy Servers
    6. NOS (Network Operating System) Security
      1. Logon Restrictions
      2. Passwords
    7. Encryption
      1. Key Encryption
        1. Private Key Encryption
        2. Public Key Encryption
      2. PGP (Pretty Good Privacy)
      3. SSL (Secure Sockets Layer)
      4. SSH (Secure Shell)
      5. SCP (Secure CoPy) and SFTP (Secure File Transfer Protocol)
      6. IPSec (Internet Protocol Security)
    8. Authentication Protocols
      1. RADIUS and TACACS
      2. PAP (Password Authentication Protocol)
      3. CHAP and MS-CHAP
      4. EAP (Extensible Authentication Protocol)
      5. 802.1x (EAPoL)
      6. Kerberos
    9. Wireless Network Security
      1. WEP (Wired Equivalent Privacy)
      2. IEEE 802.11i and WPA (Wi-Fi Protected Access)
    10. Chapter Summary
    11. Key Terms
    12. Review Questions
  15. 13. Troubleshooting Network Problems
    1. Troubleshooting Methodology
      1. Identify the Symptoms and Problems
      2. Identify the Affected Area
      3. Determine What Has Changed
      4. Establish the Most Probable Cause
        1. Verify User Competency
        2. Re-Create the Problem
        3. Verify Physical Layer Connectivity
          1. Symptoms of Physical Layer Problems
          2. Diagnosing Physical Layer Problems
          3. Swapping Equipment
        4. Verify Logical Connectivity
      5. Determine Whether Escalation Is Necessary
      6. Create an Action Plan and Solution Including Potential Effects
        1. Scope
        2. Trade-Offs
        3. Security
        4. Scalability
        5. Cost
        6. Use Vendor Information
      7. Implement and Test the Solution
      8. Identify the Results and Effects of the Solution
      9. Document the Solution and Process
        1. Document the Solution and Process
        2. Notify Others of Changes
      10. Help to Prevent Future Problems
    2. Troubleshooting Tools
      1. Crossover Cable
      2. Tone Generator and Tone Locator
      3. Multimeter
      4. Cable Continuity Testers
      5. Cable Performance Testers
      6. Voltage Event Recorders
      7. Butt Set
      8. Network Monitors
      9. Protocol Analyzers
      10. Wireless Network Testers
    3. Chapter Summary
    4. Key Terms
    5. Review Questions
  16. 14. Ensuring Integrity and Availability
    1. What Are Integrity and Availability?
    2. Malware
      1. Types of Malware
      2. Malware Characteristics
      3. Malware Protection
        1. Anti-Malware Software
        2. Anti-Malware Policies
      4. Hoaxes
    3. Fault Tolerance
      1. Environment
      2. Power
        1. Power Flaws
        2. UPSs (Uninterruptible Power Supplies)
        3. Generators
      3. Topology and Connectivity
      4. Servers
        1. Server Mirroring
        2. Clustering
      5. Storage
        1. RAID (Redundant Array of Independent [or Inexpensive] Disks)
          1. RAID Level 0—Disk Striping
          2. RAID Level 1—Disk Mirroring
          3. RAID Level 3—Disk Striping with Parity ECC
          4. RAID Level 5—Disk Striping with Distributed Parity
        2. NAS (Network Attached Storage)
        3. SANs (Storage Area Networks)
    4. Data Backup
      1. Backup Media and Methods
        1. Optical Media
        2. Tape Backups
        3. External Disk Drives
        4. Network Backups
      2. Backup Strategy
    5. Disaster Recovery
      1. Disaster Recovery Planning
      2. Disaster Recovery Contingencies
    6. Chapter Summary
    7. Key Terms
    8. Review Questions
  17. 15. Network Management
    1. Fundamentals of Network Management
      1. Documentation
      2. Baseline Measurements
      3. Policies, Procedures, and Regulations
    2. Fault and Performance Management
      1. Network Management Software
      2. System and Event Logs
      3. Traffic Shaping
      4. Caching
    3. Asset Management
    4. Change Management
      1. Software Changes
        1. Patches
        2. Client Upgrades
        3. Shared Application Upgrades
        4. NOS (Network Operating System) Upgrades
        5. Reversing a Software Upgrade
      2. Hardware and Physical Plant Changes
        1. Adding or Upgrading Equipment
        2. Cabling Upgrades
        3. Backbone Upgrades
        4. Reversing Hardware Changes
    5. Chapter Summary
    6. Key Terms
    7. Review Questions
  18. A. Network+ Examination Objectives
    1. Domain 1.0 Network Technologies – 20% of Examination
      1. Network+ Examination Objectives—Network Technologies
    2. Domain 2.0 Network Media and Topologies – 20% of Examination
      1. Network+ Examination Objectives—Network Media and Topologies
    3. Domain 3.0 Network Devices – 17% of Examination
      1. Network+ Examination Objectives—Network Devices
    4. Domain 4.0 Network Management – 20% of Examination
      1. Network+ Examination Objectives—Network Management
    5. Domain 5.0 Network Tools – 12% of Examination
      1. Network+ Examination Objectives—Network Tools
    6. Domain 6.0 Network Security – 11% of Examination
      1. Network+ Examination Objectives—Network Security
  19. B. Network+ Practice Exam
  20. C. Visual Guide to Connectors
  21. D. Answers to Chapter Review Questions
    1. Chapter 1
    2. Chapter 2
    3. Chapter 3
    4. Chapter 4
    5. Chapter 5
    6. Chapter 6
    7. Chapter 7
    8. Chapter 8
    9. Chapter 9
    10. Chapter 10
    11. Chapter 11
    12. Chapter 12
    13. Chapter 13
    14. Chapter 14
    15. Chapter 15
  22. E. Glossary
  23. F. Answers to Network+ Practice Exam Questions