Acknowledgments |
|
xxiii | |
Introduction |
|
xxv | |
|
|
1 | (42) |
|
|
2 | (1) |
|
|
2 | (1) |
|
|
2 | (1) |
|
|
3 | (1) |
|
The OSI Seven-Layer Model on a Simple Network |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
Let's Get Physical--Network Hardware and Layers 1-2 |
|
|
6 | (15) |
|
Beyond the Single Wire--Network Software and Layers 3-7 |
|
|
21 | (14) |
|
The OSI Seven-Layer Model and Remote Work |
|
|
35 | (4) |
|
|
39 | (1) |
|
|
39 | (1) |
|
|
40 | (3) |
|
Chapter 2 Cabling and Topology |
|
|
43 | (24) |
|
|
44 | (1) |
|
|
44 | (1) |
|
|
44 | (2) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
50 | (1) |
|
Copper Cabling and Connectors |
|
|
50 | (9) |
|
Fiber-Optic Cabling and Connectors |
|
|
59 | (4) |
|
|
63 | (1) |
|
Networking Industry Standards--IEEE |
|
|
63 | (2) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
Chapter 3 Ethernet Basics |
|
|
67 | (24) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
69 | (1) |
|
|
69 | (2) |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
72 | (4) |
|
|
76 | (3) |
|
|
79 | (2) |
|
Enhancing and Extending Ethernet Networks |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
81 | (3) |
|
Connecting Ethernet Segments |
|
|
84 | (3) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
87 | (2) |
|
|
89 | (2) |
|
Chapter 4 Ethernet Standards |
|
|
91 | (20) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
92 | (2) |
|
|
94 | (1) |
|
|
95 | (1) |
|
|
95 | (2) |
|
|
97 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
98 | (1) |
|
Mechanical Connection Variations |
|
|
99 | (1) |
|
Implementing Multiple Types of Gigabit Ethernet |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
100 | (7) |
|
|
107 | (1) |
|
|
107 | (2) |
|
|
109 | (2) |
|
Chapter 5 Installing a Physical Network |
|
|
111 | (60) |
|
|
113 | (1) |
|
Understanding Structured Cabling |
|
|
113 | (1) |
|
Cable Basics--A Star Is Born |
|
|
114 | (1) |
|
|
115 | (1) |
|
Structured Cable--Network Components |
|
|
115 | (15) |
|
Structured Cable--Beyond the Star |
|
|
130 | (4) |
|
Installing Structured Cabling |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
135 | (1) |
|
Determining the Location of the |
|
|
|
|
136 | (1) |
|
|
137 | (4) |
|
|
141 | (7) |
|
|
148 | (9) |
|
|
157 | (1) |
|
|
158 | (2) |
|
|
160 | (2) |
|
Diagnostics and Repair of Physical Cabling |
|
|
162 | (1) |
|
Diagnosing Physical Problems |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
Problems in the Telecommunications Room |
|
|
165 | (1) |
|
|
166 | (2) |
|
|
168 | (1) |
|
|
168 | (2) |
|
|
170 | (1) |
|
|
171 | (60) |
|
|
172 | (1) |
|
|
172 | (1) |
|
The TCP/IP Protocol Suite |
|
|
172 | (1) |
|
|
173 | (1) |
|
Transport Layer Protocols |
|
|
174 | (2) |
|
Application Layer Protocols |
|
|
176 | (1) |
|
|
177 | (4) |
|
|
181 | (7) |
|
|
188 | (9) |
|
|
197 | (2) |
|
|
199 | (1) |
|
|
199 | (10) |
|
|
209 | (1) |
|
|
209 | (1) |
|
|
210 | (4) |
|
|
214 | (13) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
228 | (1) |
|
|
229 | (2) |
|
|
231 | (50) |
|
|
232 | (1) |
|
|
232 | (2) |
|
|
234 | (1) |
|
|
234 | (9) |
|
|
243 | (1) |
|
Network Address Translation |
|
|
244 | (6) |
|
|
250 | (1) |
|
|
251 | (2) |
|
Distance Vector and Path Vector |
|
|
253 | (7) |
|
|
260 | (1) |
|
|
261 | (1) |
|
Dynamic Routing Makes the Internet |
|
|
262 | (1) |
|
Route Redistribution and Administrative Distance |
|
|
262 | (1) |
|
|
263 | (1) |
|
|
263 | (8) |
|
Basic Router Configuration |
|
|
271 | (2) |
|
|
273 | (4) |
|
|
277 | (1) |
|
|
277 | (2) |
|
|
279 | (2) |
|
Chapter 8 TCP/IP Applications |
|
|
281 | (36) |
|
|
282 | (1) |
|
Transport Layer and Network Layer Protocols |
|
|
282 | (1) |
|
|
282 | (1) |
|
|
283 | (1) |
|
|
283 | (1) |
|
|
284 | (2) |
|
|
286 | (2) |
|
|
288 | (1) |
|
The Power of Port Numbers |
|
|
288 | (3) |
|
|
291 | (3) |
|
|
294 | (2) |
|
Rules for Determining Good vs. Bad Communications |
|
|
296 | (1) |
|
Common TCP/IP Applications |
|
|
297 | (1) |
|
|
297 | (2) |
|
|
299 | (5) |
|
|
304 | (1) |
|
|
305 | (2) |
|
|
307 | (4) |
|
TCP/IP Applications Chart |
|
|
311 | (1) |
|
|
312 | (1) |
|
Other Layer 7 pplications |
|
|
312 | (2) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
315 | (2) |
|
|
317 | (36) |
|
|
318 | (1) |
|
|
318 | (1) |
|
|
318 | (2) |
|
|
320 | (1) |
|
|
321 | (1) |
|
|
321 | (1) |
|
|
321 | (12) |
|
Administering DNS Servers |
|
|
333 | (10) |
|
Troubleshooting DNS on Clients |
|
|
343 | (4) |
|
Diagnosing TCP/IP Network Issues |
|
|
347 | (3) |
|
|
350 | (1) |
|
|
350 | (1) |
|
|
351 | (2) |
|
Chapter 10 Securing TCP/IP |
|
|
353 | (42) |
|
|
354 | (1) |
|
|
354 | (1) |
|
|
354 | (7) |
|
|
361 | (4) |
|
|
365 | (5) |
|
|
370 | (1) |
|
|
370 | (1) |
|
|
371 | (1) |
|
TCP/IP Security Standards |
|
|
372 | (1) |
|
User Authentication Standards |
|
|
373 | (7) |
|
|
380 | (5) |
|
Combining Authentication and Encryption |
|
|
385 | (2) |
|
Secure TCP/IP Applications |
|
|
387 | (1) |
|
|
387 | (1) |
|
Securing E-Mail Protocols |
|
|
388 | (1) |
|
|
389 | (1) |
|
|
389 | (1) |
|
|
390 | (1) |
|
|
391 | (1) |
|
|
391 | (1) |
|
|
391 | (1) |
|
|
391 | (2) |
|
|
393 | (2) |
|
Chapter 11 Switch Features |
|
|
395 | (30) |
|
|
396 | (1) |
|
|
396 | (1) |
|
|
397 | (1) |
|
|
398 | (1) |
|
|
399 | (1) |
|
|
400 | (1) |
|
|
401 | (1) |
|
Configuring a VLAN-Capable Switch |
|
|
402 | (3) |
|
Assigning VLANs and Tagging |
|
|
405 | (1) |
|
|
406 | (1) |
|
|
407 | (1) |
|
|
408 | (1) |
|
|
409 | (1) |
|
|
409 | (1) |
|
|
409 | (1) |
|
|
409 | (1) |
|
|
410 | (3) |
|
|
413 | (1) |
|
|
414 | (1) |
|
|
414 | (7) |
|
|
421 | (1) |
|
|
421 | (2) |
|
|
423 | (2) |
|
|
425 | (24) |
|
|
426 | (1) |
|
|
426 | (1) |
|
|
426 | (6) |
|
|
432 | (2) |
|
|
434 | (1) |
|
Stateless Address Autoconfiguration (SLAAC) |
|
|
434 | (4) |
|
|
438 | (3) |
|
|
441 | (1) |
|
|
442 | (1) |
|
|
442 | (2) |
|
|
444 | (2) |
|
|
446 | (1) |
|
|
446 | (2) |
|
|
448 | (1) |
|
Chapter 13 WAN Connectivity |
|
|
449 | (34) |
|
|
450 | (1) |
|
|
450 | (1) |
|
|
451 | (1) |
|
|
451 | (1) |
|
|
451 | (1) |
|
|
452 | (4) |
|
|
456 | (1) |
|
|
456 | (3) |
|
|
459 | (1) |
|
|
460 | (1) |
|
|
461 | (1) |
|
|
461 | (4) |
|
|
465 | (1) |
|
|
466 | (1) |
|
|
466 | (4) |
|
|
470 | (7) |
|
WAN Troubleshooting Scenarios |
|
|
477 | (1) |
|
Loss of Internet Connectivity |
|
|
477 | (1) |
|
|
477 | (1) |
|
|
478 | (1) |
|
|
478 | (2) |
|
|
480 | (1) |
|
|
480 | (1) |
|
|
481 | (2) |
|
Chapter 14 Wireless Networking |
|
|
483 | (58) |
|
|
483 | (1) |
|
|
484 | (1) |
|
|
484 | (1) |
|
|
485 | (8) |
|
|
493 | (1) |
|
|
494 | (1) |
|
|
494 | (1) |
|
|
495 | (1) |
|
|
496 | (1) |
|
|
496 | (1) |
|
|
497 | (1) |
|
|
497 | (8) |
|
|
505 | (4) |
|
|
509 | (1) |
|
|
509 | (4) |
|
|
513 | (1) |
|
Setting Up an Ad Hoc Network |
|
|
514 | (1) |
|
Setting Up an Infrastructure Network |
|
|
515 | (12) |
|
|
527 | (1) |
|
Verifying the Installation |
|
|
528 | (1) |
|
|
528 | (1) |
|
|
528 | (4) |
|
|
532 | (3) |
|
|
535 | (2) |
|
|
537 | (1) |
|
|
537 | (2) |
|
|
539 | (2) |
|
Chapter 15 Virtualization and Cloud Computing |
|
|
541 | (40) |
|
|
542 | (1) |
|
Virtualization and Cloud Computing Concepts |
|
|
542 | (1) |
|
|
542 | (6) |
|
|
548 | (6) |
|
|
554 | (2) |
|
|
556 | (7) |
|
Putting Network Virtualization and Cloud Computing to Work |
|
|
563 | (1) |
|
Setting Up Rocket.Chat in a Local Hypervisor |
|
|
564 | (5) |
|
|
569 | (2) |
|
Setting Up Rocket.Chat on IaaS |
|
|
571 | (3) |
|
|
574 | (2) |
|
Interconnecting Local and Cloud Resources |
|
|
576 | (2) |
|
|
578 | (1) |
|
|
578 | (2) |
|
|
580 | (1) |
|
|
581 | (24) |
|
|
582 | (1) |
|
Classic Data Center Architecture and Design |
|
|
582 | (1) |
|
|
583 | (2) |
|
|
585 | (2) |
|
|
587 | (2) |
|
Where Is the Classic Data Center? |
|
|
589 | (1) |
|
|
589 | (1) |
|
|
589 | (1) |
|
Software-Defined Networking |
|
|
590 | (1) |
|
|
590 | (1) |
|
High Availability in the Data Center |
|
|
591 | (1) |
|
|
591 | (1) |
|
|
592 | (1) |
|
Facilities and Infrastructure Support |
|
|
593 | (1) |
|
Documenting the Data Center |
|
|
594 | (1) |
|
|
595 | (5) |
|
|
600 | (1) |
|
|
600 | (2) |
|
|
602 | (1) |
|
|
602 | (2) |
|
|
604 | (1) |
|
Chapter 17 Integrating Network Devices |
|
|
605 | (24) |
|
|
607 | (1) |
|
|
607 | (1) |
|
|
607 | (2) |
|
|
609 | (1) |
|
IoT Communications Technologies |
|
|
610 | (2) |
|
|
612 | (1) |
|
|
613 | (1) |
|
|
613 | (1) |
|
Unified Communication Features |
|
|
614 | (3) |
|
|
617 | (1) |
|
|
618 | (1) |
|
|
619 | (1) |
|
|
620 | (3) |
|
|
623 | (1) |
|
|
623 | (2) |
|
|
625 | (1) |
|
|
625 | (2) |
|
|
627 | (2) |
|
Chapter 18 Network Operations |
|
|
629 | (26) |
|
|
629 | (1) |
|
|
629 | (1) |
|
Hardening and Security Policies |
|
|
630 | (4) |
|
|
634 | (2) |
|
|
636 | (2) |
|
|
638 | (1) |
|
|
639 | (1) |
|
|
640 | (5) |
|
|
645 | (1) |
|
|
645 | (1) |
|
|
646 | (1) |
|
|
647 | (1) |
|
|
648 | (3) |
|
|
651 | (1) |
|
|
651 | (2) |
|
|
653 | (2) |
|
Chapter 19 Protecting Your Network |
|
|
655 | (52) |
|
|
655 | (1) |
|
|
655 | (1) |
|
|
656 | (1) |
|
|
657 | (1) |
|
|
657 | (1) |
|
|
658 | (1) |
|
|
658 | (1) |
|
|
659 | (1) |
|
|
660 | (1) |
|
|
660 | (1) |
|
|
661 | (1) |
|
|
662 | (1) |
|
|
662 | (4) |
|
|
666 | (2) |
|
|
668 | (1) |
|
|
669 | (1) |
|
|
669 | (1) |
|
|
669 | (3) |
|
|
672 | (2) |
|
|
674 | (3) |
|
|
677 | (1) |
|
Unnecessary Running Services |
|
|
677 | (2) |
|
|
679 | (1) |
|
|
679 | (1) |
|
|
679 | (1) |
|
|
680 | (1) |
|
|
680 | (1) |
|
|
680 | (5) |
|
|
685 | (7) |
|
|
692 | (1) |
|
|
693 | (4) |
|
|
697 | (1) |
|
|
697 | (2) |
|
Implementing and Configuring Firewalls |
|
|
699 | (3) |
|
Troubleshooting Firewalls |
|
|
702 | (1) |
|
|
703 | (1) |
|
|
703 | (2) |
|
|
705 | (2) |
|
Chapter 20 Network Monitoring |
|
|
707 | (24) |
|
|
708 | (1) |
|
|
708 | (4) |
|
|
712 | (1) |
|
|
713 | (1) |
|
|
713 | (5) |
|
|
718 | (1) |
|
|
719 | (1) |
|
|
720 | (2) |
|
|
722 | (1) |
|
Scenario: Monitoring and Managing |
|
|
722 | (4) |
|
|
726 | (1) |
|
|
727 | (1) |
|
|
727 | (2) |
|
|
729 | (2) |
|
Chapter 21 Network Troubleshooting |
|
|
731 | (46) |
|
|
732 | (1) |
|
|
732 | (1) |
|
|
732 | (6) |
|
|
738 | (12) |
|
The Troubleshooting Process |
|
|
750 | (1) |
|
|
751 | (2) |
|
Establish a Theory of Probable Cause |
|
|
753 | (1) |
|
Test the Theory to Determine the Cause |
|
|
754 | (1) |
|
Establish a Plan of Action and Identify Potential Effects |
|
|
754 | (1) |
|
Implement the Solution or Escalate as Necessary |
|
|
755 | (1) |
|
Verify Full System Functionality and Implement |
|
|
|
|
756 | (1) |
|
Document Findings, Actions, Outcomes, and Lessons Learned |
|
|
756 | (1) |
|
Resolving Common Network Service Issues |
|
|
757 | (1) |
|
"We Can't Access Our Web Server in Istanbul!" |
|
|
757 | (2) |
|
Network Troubleshooting Considerations |
|
|
759 | (1) |
|
|
760 | (3) |
|
|
763 | (6) |
|
|
769 | (3) |
|
Network Performance Issues |
|
|
772 | (1) |
|
|
773 | (1) |
|
|
773 | (1) |
|
|
773 | (2) |
|
|
775 | (2) |
|
Appendix A Exam Objective Map |
|
|
777 | (22) |
|
|
777 | (22) |
|
Appendix B Create Your study Plan |
|
|
799 | (2) |
|
Review Your Overall Score |
|
|
799 | (1) |
|
Review Your Score by CompTIA Networks Exam Domain |
|
|
800 | (1) |
|
Appendix C About the Online Content |
|
|
801 | (4) |
|
|
801 | (1) |
|
Your Total Seminars Training Hub Account |
|
|
801 | (1) |
|
|
802 | (1) |
|
Single User License Terms and Conditions |
|
|
802 | (1) |
|
|
803 | (1) |
|
|
803 | (1) |
|
|
804 | (1) |
|
Playing the CompTIA Networks - Introduction Video |
|
|
804 | (1) |
|
Mike's CompTIA Network+ Video Training Sample |
|
|
804 | (1) |
|
Total Sims Sample for CompTIA Network+ |
|
|
804 | (1) |
|
|
804 | (1) |
|
|
804 | (1) |
Glossary |
|
805 | (88) |
Index |
|
893 | |