Atjaunināt sīkdatņu piekrišanu

E-grāmata: CompTIA Network+ Study Guide: Exam N10-008

4.25/5 (24 ratings by Goodreads)
  • Formāts: EPUB+DRM
  • Sērija : Sybex Study Guide
  • Izdošanas datums: 20-Sep-2021
  • Izdevniecība: Sybex Inc.,U.S.
  • Valoda: eng
  • ISBN-13: 9781119811640
Citas grāmatas par šo tēmu:
  • Formāts - EPUB+DRM
  • Cena: 53,53 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Sērija : Sybex Study Guide
  • Izdošanas datums: 20-Sep-2021
  • Izdevniecība: Sybex Inc.,U.S.
  • Valoda: eng
  • ISBN-13: 9781119811640
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Prepare for the Network+ certification and a new career in network installation and administration 

In the newly revised Fifth Edition of CompTIA Network+ Study Guide Exam N10-008, bestselling author and network expert Todd Lammle delivers thorough coverage of how to install, configure, and troubleshoot today’s basic networking hardware peripherals and protocols. 

This book will prepare you to succeed on the sought-after CompTIA Network+ certification exam, impress interviewers in the network industry, and excel in your first role as a junior network administrator, support technician, or related position. 

The accomplished author draws on his 30 years of networking experience to walk you through the ins and outs of the five functional domains covered by the Network+ Exam N10-008: Networking fundamentals, implementations, operations, security, and troubleshooting. You’ll also get: 

  • Complete, domain-specific coverage of the updated Network+ Exam N10-008 
  • Preparation to obtain a leading network certification enjoyed by over 350,000 networking professionals 
  • Access to a superior set of online study tools, including practice exams, flashcards, and glossary of key terms. 

Perfect for anyone preparing for the latest version of the CompTIA Network+ Exam N10-008, the Fifth Edition of CompTIA Network+ Study Guide Exam N10-008 is a must-have resource for network administrators seeking to enhance their skillset with foundational skills endorsed by industry and thought leaders from around the world. 

Introduction xxxi
Assessment Test xli
Chapter 1 Introduction to Networks 1(30)
First Things First: What's a Network?
3(11)
The Local Area Network
4(2)
Common Network Components
6(3)
Metropolitan Area Network
9(1)
Wide Area Network
9(1)
Personal Area Network
10(1)
Campus Area Network
10(1)
Storage Area Network
10(1)
Software-Defined Wide Area Network
11(1)
Multiprotocol Label Switching
11(1)
Multipoint Generic Routing Encapsulation
12(1)
Network Architecture: Peer-to-Peer or Client-Server?
12(2)
Physical Network Topologies
14(7)
Bus Topology
14(1)
Star Topology
15(2)
Ring Topology
17(1)
Mesh Topology
17(1)
Point-to-Point Topology
18(1)
Point-to-Multipoint Topology
19(1)
Hybrid Topology
20(1)
Topology Selection, Backbones, and Segments
21(3)
Selecting the Right Topology
22(1)
The Network Backbone
22(1)
Network Segments
23(1)
Service-Related Entry Points
23(1)
Service Provider Links
23(1)
Virtual Networking
24(1)
Summary
24(1)
Exam Essentials
25(1)
Written Lab
25(1)
Review Questions
26(5)
Chapter 2 The Open Systems Interconnection Specifications 31(26)
Internetworking Models
32(2)
The Layered Approach
33(1)
Advantages of Reference Models
33(1)
The OSI Reference Model
34(15)
The Application Layer
36(1)
The Presentation Layer
37(1)
The Session Layer
37(1)
The Transport Layer
37(6)
The Network Layer
43(3)
The Data Link Layer
46(2)
The Physical Layer
48(1)
Introduction to Encapsulation
49(1)
Modulation Techniques
50(1)
Summary
51(1)
Exam Essentials
51(1)
Written Lab
52(1)
Review Questions
53(4)
Chapter 3 Networking Connectors and Wiring Standards 57(36)
Physical Media
59(17)
Coaxial Cable
60(2)
Twisted-Pair Cable
62(1)
Twinaxial Cable
62(4)
Fiber-Optic Cable
66(5)
Transceivers
71(1)
Media Converters
72(2)
Serial Cables
74(2)
Cable Properties
76(2)
Transmission Speeds
76(1)
Distance
76(1)
Duplex
77(1)
Noise Immunity (Security, EMI)
77(1)
Frequency
77(1)
Wiring Standards
78(7)
T568A vs. T568B
78(2)
Straight-Through Cable
80(1)
Crossover Cable
81(2)
Rolled/Rollover Cable
83(1)
T1 Crossover Cable
83(2)
Installing Wiring Distributions
85(2)
MDF/IDF
85(2)
Summary
87(1)
Exam Essentials
88(1)
Written Lab
88(1)
Review Questions
89(4)
Chapter 4 The Current Ethernet Specifications 93(36)
Network Basics
94(2)
Ethernet Basics
96(6)
Collision Domain
96(1)
Broadcast Domain
97(1)
CSMA/CD
97(2)
Broadband/Baseband
99(1)
Bit Rates vs. Baud Rate
99(1)
Wavelength
99(1)
Half- and Full-Duplex Ethernet
100(2)
Ethernet at the Data Link Layer
102(7)
Binary to Decimal and Hexadecimal Conversion
102(4)
Ethernet Addressing
106(1)
Ethernet Frames
107(2)
Ethernet at the Physical Layer
109(6)
Ethernet over Other Standards (IEEE 1905.1-2013)
115(3)
Ethernet over Power Line
115(2)
Ethernet over HDMI
117(1)
Bidirectional Wavelength-Division Multiplexing (WDM)
117(1)
Course Wavelength-Division Multiplexing (CWDM)
117(1)
Dense Wavelength-Division Multiplexing (DWDM)
117(1)
Summary
118(1)
Exam Essentials
119(1)
Written Lab
119(5)
Review Questions
124(5)
Chapter 5 Networking Devices 129(56)
Common Network Connectivity Devices
132(20)
Network Interface Card
133(2)
Hub
135(1)
Bridge
135(1)
Switch
136(1)
Router
137(4)
Firewall
141(1)
IDS/IPS
142(1)
HIDS
142(1)
Access Point
142(1)
Wireless Range Extender
143(1)
Wireless LAN Controller
143(1)
Load Balancer
144(1)
Contention Methods
144(3)
Dynamic Host Configuration Protocol Server
147(5)
IPAM
152(1)
Other Specialized Devices
152(15)
Multilayer Switch
153(1)
Domain Name Service Server
153(7)
Network Time Protocol
160(1)
Proxy Server
160(2)
Encryption and Content Filtering
162(1)
Analog Modem
163(1)
Packet Shaper
164(1)
VPN Concentrator/Headend
164(1)
Media Converter
165(1)
VoIP PBX
165(1)
VoIP Endpoint
166(1)
NGFW/Layer 7 Firewall
166(1)
VoIP Gateway
166(1)
Cable Modem
166(1)
DSL Modem
166(1)
Networked Devices
167(1)
VoIP Phones
167(1)
Printers
167(1)
Physical Access Control Devices
167(1)
Cameras
167(1)
Heating Ventilation, and Air Conditioning (HVAC) Sensors
167(1)
Internet of Things (IoT)
168(1)
Industrial Control Systems
168(1)
Planning and Implementing a Basic SOHO Network Using Network Segmentation
168(10)
Determining Requirements
169(6)
Switches and Bridges at the Data Link Layer
175(2)
Hubs at the Physical Layer
177(1)
Environmental Considerations
178(1)
Summary
178(1)
Exam Essentials
179(1)
Written Lab
180(1)
Review Questions
181(4)
Chapter 6 Introduction to the Internet Protocol 185(46)
Introducing TCP/IP
188(32)
A Brief History of TCP/IP
188(1)
TCP/IP and the DoD Model
189(2)
The Process/Application Layer Protocols
191(13)
The Host-to-Host Layer Protocols
204(6)
The Internet Layer Protocols
210(10)
Data Encapsulation
220(4)
Summary
224(1)
Exam Essentials
224(1)
Written Lab
225(1)
Review Questions
226(5)
Chapter 7 IP Addressing 231(30)
IP Terminology
233(1)
The Hierarchical IP Addressing Scheme
234(7)
Network Addressing
235(4)
Private IP Addresses (RFC 1918)
239(2)
IPv4 Address Types
241(2)
Layer 2 Broadcasts
242(1)
Layer 3 Broadcasts
242(1)
Unicast Address
243(1)
Multicast Address (Class D)
243(1)
Internet Protocol Version 6 (IPv6)
243(10)
Why Do We Need IPv6?
244(1)
The Benefits of and Uses for IPv6
244(2)
IPv6 Addressing and Expressions
246(1)
Shortened Expression
246(1)
Address Types
247(1)
Special Addresses
248(1)
Stateless Address Autoconfiguration (SLAAC)
249(2)
DHCPv6 (Stateful)
251(1)
Migrating to IPv6
251(2)
Summary
253(1)
Exam Essentials
254(1)
Written Labs
255(2)
Written Lab 7.1
255(1)
Written Lab 7.2
255(2)
Review Questions
257(4)
Chapter 8 IP Subnefting, Troubleshooting IP, and Introduction to NAT 261(44)
Subnetting Basics
263(23)
How to Create Subnets
264(1)
Subnet Masks
265(1)
Classless Inter-Domain Routing (CIDR)
266(2)
Subnetting Class C Addresses
268(10)
Subnetting Class B Addresses
278(8)
Troubleshooting IP Addressing
286(8)
Determining IP Address Problems
289(5)
Introduction to Network Address Translation (NAT)
294(4)
Types of Network Address Translation
295(1)
NAT Names
295(1)
How NAT Works
296(2)
Summary
298(1)
Exam Essentials
298(1)
Written Lab
299(1)
Review Questions
300(5)
Chapter 9 Introduction to IP Routing 305(20)
Routing Basics
306(3)
The IP Routing Process
309(6)
Testing Your IP Routing Understanding
315(1)
Static and Dynamic Routing
316(3)
Summary
319(1)
Exam Essentials
319(1)
Written Lab
320(1)
Review Questions
321(4)
Chapter 10 Routing Protocols 325(40)
Routing Protocol Basics
326(4)
Administrative Distances
327(2)
Classes of Routing Protocols
329(1)
Distance-Vector Routing Protocols
330(10)
Routing Information Protocol (RIP)
332(1)
RIP Version 2 (RIPv2)
332(1)
VLSMs and Discontiguous Networks
333(3)
EIGRP
336(2)
Border Gateway Protocol (BGP)
338(2)
Link-State Routing Protocols
340(4)
Open Shortest Path First (OSPF)
340(3)
Intermediate System-to-Intermediate System (IS-IS)
343(1)
High Availability
344(7)
Hot Standby Router Protocol (HSRP)
346(4)
Virtual Router Redundancy Protocol
350(1)
Advanced IPv6 Concepts
351(6)
Router Advertisement
351(2)
Neighbor Discovery Protocol
353(1)
Tunneling
354(3)
Dual Stack
357(1)
IPv6 Routing Protocols
357(2)
RIPng
358(1)
EIGRPv6
358(1)
OSPFv3
359(1)
Summary
359(1)
Exam Essentials
359(1)
Written Lab
360(1)
Review Questions
361(4)
Chapter 11 Switching and Virtual LANs 365(48)
Networking Before Layer 2 Switching
367(3)
Switching Services
370(8)
Limitations of Layer 2 Switching
371(1)
Bridging vs. LAN Switching
372(1)
Three Switch Functions at Layer 2
372(6)
Distributed Switching
378(1)
Spanning Tree Protocol
378(4)
Spanning Tree Port States
379(1)
STP Convergence
380(1)
Rapid Spanning Tree Protocol 802.1w
381(1)
Virtual LANs
382(10)
VLAN Basics
383(3)
Quality of Service
386(1)
VLAN Memberships
387(1)
Static VLANs
387(1)
Dynamic VLANs
388(1)
Identifying VLANs
388(2)
VLAN Identification Methods
390(2)
VLAN Trunking Protocol
392(9)
VTP Modes of Operation
393(1)
Do We Really Need to Put an IP Address on a Switch?
394(2)
Switch Port Protection
396(3)
Port Bonding
399(2)
Device Hardening
401(1)
Two Additional Advanced Features of Switches
401(4)
Power over Ethernet (802.3af, 802.3at)
401(3)
Port Mirroring/Spanning (SPAN/RSPAN)
404(1)
Summary
405(1)
Exam Essentials
406(1)
Written Lab
406(2)
Review Questions
408(5)
Chapter 12 Wireless Networking 413(56)
Introduction to Wireless Technology
415(3)
Cellular Technologies
418(1)
The 802.11 Standards (Regulatory Impacts)
419(8)
2.4 GHz (802.11b)
421(1)
2.4 GHz (802.11g)
422(1)
5 GHz (802.11a)
423(1)
5 GHz (802.11h)
424(1)
2.4 GHz/5 GHz (802.11n)
425(1)
5 GHz (802.11ac)
426(1)
WiFi 6 (802.11ax)
426(1)
Comparing 802.11 Standards
427(1)
Range and Speed Comparisons
428(1)
Wireless Network Components
428(4)
Wireless Access Points
429(1)
Wireless Network Interface Card
430(1)
Wireless Antennas
431(1)
Installing a Wireless Network
432(15)
Ad Hoc Mode: Independent Basic Service Set
432(1)
Infrastructure Mode: Basic Service Set
433(1)
Wireless Controllers
434(2)
Mobile Hot Spots
436(2)
Signal Degradation
438(1)
Other Network Infrastructure Implementations
438(2)
Technologies That Facilitate the Internet of Things (IoT)
440(1)
Installing and Configuring WLAN Hardware
441(6)
Site Survey
447(4)
Providing Capacity
448(1)
Multiple Floors
449(1)
Location-Based WLAN
450(1)
Site Survey Tools
450(1)
Wireless Security
451(11)
Wireless Threats
451(4)
Open Access
455(1)
Service Set Identifiers, Wired Equivalent Privacy, and Media Access Control Address Authentication
455(2)
Remote Authentication Dial-In User Service (802.1X)
457(1)
Temporal Key Integrity Protocol
458(1)
Wi-Fi Protected Access or WPA2 Pre-Shared Key
459(3)
Summary
462(1)
Exam Essentials
462(2)
Written Lab
464(1)
Review Questions
465(4)
Chapter 13 Using Statistics and Sensors to Ensure Network Availability 469(36)
Performance Metrics/Sensors
471(3)
Device/Chassis
471(2)
Network Metrics
473(1)
SNMP
474(2)
Traps
475(1)
Object Identifiers (OIDs)
476(1)
Management Information Bases (MIBs)
476(1)
Network Device Logs
476(6)
Log Reviews
476(4)
Logging Levels/Severity Levels
480(2)
Interface Statistics/Status
482(4)
Link State (Up/Down)
482(1)
Speed/Duplex
483(1)
Send/Receive Traffic
484(1)
Cyclic Redundancy Checks (CRCs)
485(1)
Protocol Packet and Byte Counts
486(1)
Interface Errors or Alerts
486(3)
CRC Errors
487(1)
Giants and Runts
488(1)
Encapsulation Errors
488(1)
Environmental Factors and Sensors
489(6)
Temperature
489(1)
Humidity
489(1)
Electrical
490(5)
Flooding
495(1)
Baselines
495(1)
NetFlow Data
496(2)
NetFlow Overview and Flows
496(2)
Uptime/Downtime
498(1)
Summary
498(1)
Exam Essentials
498(1)
Written Lab
499(2)
Review Questions
501(4)
Chapter 14 Organizational Documents and Policies 505(28)
Plans and Procedures
507(4)
Change Management
508(2)
Incident Response Plan
510(1)
Disaster Recovery Plan
510(1)
Business Continuity Plan
510(1)
System Life Cycle
511(1)
Standard Operating Procedures
511(1)
Hardening and Security Policies
511(8)
Acceptable Use Policy
512(1)
Password Policy
512(1)
Bring Your Own Device (BYOD) Policy
513(1)
Remote Access Policy
513(1)
Onboarding and Offboarding Policy
513(1)
Security Policy
514(5)
Data Loss Prevention
519(1)
Common Documentation
519(9)
Physical Network Diagram
520(4)
Logical Network Diagram
524(1)
Wiring Diagram
525(1)
Site Survey Report
526(1)
Audit and Assessment Report
526(1)
Baseline Configurations
527(1)
Common Agreements
528(1)
Nondisclosure Agreement (NDA)
528(1)
Service-Level Agreement (SLA)
529(1)
Memorandum of Understanding (MOU)
529(1)
Summary
529(1)
Exam Essentials
529(1)
Written Lab
530(1)
Review Questions
531(2)
Chapter 15 High Availability and Disaster Recovery 533(26)
Load Balancing
535(1)
Multipathing
536(1)
Network Interface Card (NIC) Teaming
537(1)
Redundant Hardware/Clusters
538(4)
Switches
538(2)
Routers
540(2)
Firewalls
542(1)
Facilities and Infrastructure Support
542(3)
Uninterruptible Power Supply (UPS)
542(1)
Power Distribution Units (PDUs)
543(1)
Generator
543(1)
HVAC
544(1)
Fire Suppression
544(1)
Redundancy and High Availability (HA) Concepts
545(8)
Recovery Sites
545(1)
Cold Site
545(1)
Warm Site
545(1)
Hot Site
546(1)
Cloud Site
546(1)
Active/Active vs. Active/Passive
546(7)
Mean Time to Repair (MTTR)
553(1)
Mean Time Between Failure (MTBF)
554(1)
Recovery Time Objective (RTO)
554(1)
Recovery Point Objective (RPO)
554(1)
Network Device Backup/Restore
554(1)
State/Configuration
554(1)
Summary
555(1)
Exam Essentials
555(1)
Written Lab
556(1)
Review Questions
557(2)
Chapter 16 Common Security Concepts 559(22)
Confidentiality, Integrity, and Availability (CIA)
561(1)
Confidentiality
561(1)
Integrity
561(1)
Availability
562(1)
Threats
562(1)
Internal
562(1)
External
562(1)
Vulnerabilities
562(1)
Common Vulnerabilities and Exposures (CVE)
563(1)
Zero-Day
563(1)
Exploits
563(1)
Least Privilege
563(1)
Role-Based Access
564(1)
Zero Trust
564(1)
Defense in Depth
564(3)
Network Segmentation Enforcement
564(1)
Screened Subnet (aka Demilitarized Zone)
565(1)
Separation of Duties
565(1)
Network Access Control
566(1)
Honeypot
567(1)
Authentication Methods
567(6)
Multifactor
567(1)
Authentication, Authorization, and Accounting (AAA)
568(1)
Remote Authentication Dial-In User Service (RADIUS)
568(1)
Terminal Access Controller Access Control System Plus (TACACS+)
568(2)
Single Sign-On (SSO)
570(1)
LDAP
570(1)
Kerberos
570(1)
Local Authentication
571(1)
802.1X
571(1)
Extensible Authentication Protocol (EAP)
572(1)
Security Risk Assessments
573(3)
Threat Assessment
573(1)
Vulnerability Assessment
574(1)
Penetration Testing
575(1)
Business Risk Assessments
575(1)
Security Information and Event Management (SIEM)
576(1)
Notifications
576(1)
Summary
576(1)
Exam Essentials
577(1)
Written Lab
577(1)
Review Questions
578(3)
Chapter 17 Common Types of Attacks 581(24)
Technology-Based Attacks
582(16)
Denial of Service (DoS)/Distributed Denial of Service (DDoS)
583(5)
On-Path Attack (Previously Known as Man-in-the-Middle Attack)
588(1)
DNS Poisoning
589(1)
VLAN Hopping
589(1)
ARP Spoofing
590(1)
Rogue DHCP
590(1)
Rogue Access Point (AP)
591(1)
Evil Twin
592(1)
Ransomware
593(1)
Password Attacks
593(1)
MAC Spoofing
594(1)
IP Spoofing
594(1)
Deauthentication
594(1)
Malware
594(4)
Human and Environmental
598(2)
Social Engineering
598(1)
Phishing
599(1)
Environmental
599(1)
Summary
600(1)
Exam Essentials
600(1)
Written Lab
601(1)
Review Questions
602(3)
Chapter 18 Network Hardening Techniques 605(20)
Best Practices
607(11)
Secure SNMP
608(1)
Router Advertisement (RA) Guard
608(1)
Port Security
608(1)
Dynamic ARP Inspection
609(1)
Control Plane Policing
609(1)
Private VLANs
609(1)
Disable Unneeded Switchports
610(1)
Disable Unneeded Network Services
610(1)
Change Default Passwords
610(1)
Password Complexity/Length
610(3)
Enable DHCP Snooping
613(1)
Change Default VLAN
613(1)
Patch and Firmware Management
614(1)
Access Control List
615(1)
Role-Based Access
616(1)
Firewall Rules
617(1)
Wireless Security
618(3)
MAC Filtering
618(1)
Antenna Placement
618(1)
Power Levels
619(1)
Wireless Client Isolation
619(1)
Guest Network Isolation
620(1)
Preshared Keys (PSKs)
620(1)
EAP
620(1)
Geofencing
620(1)
Captive Portal
621(1)
IoT Access Considerations
621(1)
Summary
621(1)
Exam Essentials
621(1)
Written Lab
622(1)
Review Questions
623(2)
Chapter 19 Remote Access Security 625(12)
Site-to-Site VPN
626(1)
Client-to-Site VPN
626(2)
Clientless VPN
627(1)
Split Tunnel vs. Full Tunnel
628(1)
Remote Desktop Connection
628(1)
Remote Desktop Gateway
629(1)
SSH
630(1)
Virtual Network Computing (VNC)
630(1)
Virtual Desktop
631(1)
Authentication and Authorization Considerations
631(1)
In-Band vs. Out-of-Band Management
631(1)
Summary
632(1)
Exam Essentials
632(1)
Written Lab
632(2)
Review Questions
634(3)
Chapter 20 Physical Security 637(14)
Detection Methods
639(3)
Cameras
639(1)
Motion Detection
640(1)
Asset Tags
641(1)
Tamper Detection
641(1)
Prevention Methods
642(4)
Employee Training
642(1)
Access Control Hardware
643(1)
Locking Racks
643(1)
Locking Cabinets
644(1)
Access Control Vestibule (Previously Known as a Mantrap)
644(1)
Smart Lockers
645(1)
Asset Disposal
646(1)
Factory Reset/Wipe Configuration
646(1)
Sanitize Devices for Disposal
646(1)
Summary
647(1)
Exam Essentials
647(1)
Written Lab
648(1)
Review Questions
649(2)
Chapter 21 Data Center Architecture and Cloud Concepts 651(74)
Data Center Network Architectures
654(1)
Access/Edge Layer
654(1)
Distribution Layer
655(1)
Core Layer
655(1)
Software-Defined Networking
655(3)
Application Layer
656(1)
Control Layer
656(1)
Infrastructure Layer
656(1)
Management Plane
656(1)
Spine-Leaf-Based Two-Tier Networks
657(1)
Top-of-Rack Switching
658(1)
Backbone
658(1)
Traffic Flows
658(2)
North-South
659(1)
East-West
659(1)
Branch Office vs. On-premises Data Center vs. Colocation
660(1)
Cloud Computing and Its Effect on the Enterprise Network
661(4)
Service Models
663(2)
Overview of Network Programmability in Enterprise Network
665(1)
Software-Defined Networking
666(1)
Application Programming Interfaces (APIs)
666(4)
Southbound APIs
667(2)
Northbound APIs
669(1)
Managing Network Documentation
670(6)
Using SNMP
670(1)
Schematics and Diagrams
671(5)
Network Monitoring
676(13)
Baselines
676(1)
Processes
676(1)
Onboarding and Offboarding of Mobile Devices
677(1)
NAC
677(1)
Policies, Procedures, and Regulations
677(4)
Safety Practices
681(5)
Implementing Network Segmentation
686(3)
Network Optimization
689(28)
Reasons to Optimize Your Network's Performance
689(2)
How to Optimize Performance
691(3)
Unified Communications
694(1)
Traffic Shaping
694(1)
Load Balancing
695(1)
High Availability
695(1)
Caching Engines
695(1)
Fault Tolerance
696(1)
Archives/Backups
696(1)
Common Address Redundancy Protocol
697(1)
Virtual Networking
697(11)
Locating and Installing Equipment
708(7)
Change Management Procedures
715(2)
Summary
717(2)
Exam Essentials
719(1)
Written Lab
720(1)
Review Questions
721(4)
Chapter 22 Ensuring Network Availability 725(20)
Performance Metrics/Sensors
727(1)
Network Metrics
728(3)
SNMP
729(2)
Network Device Logs
731(2)
Interface Statistics/Status
733(1)
Interface Errors
734(2)
Environmental Factors and Sensors
735(1)
Baseline
736(1)
NetFlow
737(1)
Uptime
738(1)
Downtime
738(1)
Summary
739(1)
Exam Essentials
739(1)
Written Lab
740(1)
Review Questions
741(4)
Chapter 23 Cable Connectivity Issues and Tools 745(26)
Specifications and Limitations
747(1)
Cable Considerations
747(1)
Cable Applications
748(1)
Common Issues
749(2)
Identifying Hardware Tools
751(14)
Cable Testers
752(3)
Protocol Analyzer
755(1)
Certifiers
755(1)
Time-Domain Reflectometer
756(1)
Optical Time-Domain Reflectometer
756(1)
Multimeter
757(1)
Spectrum Analyzer
758(1)
Toner Generator (Probe)
759(1)
Tap
760(1)
Metrics
760(1)
Butt Set
761(1)
Punch-Down Tool
761(2)
Cable Snips/Cutters
763(1)
Voltage Event Recorder (Power)
763(1)
Fiber Light Meter
764(1)
Fiber Fusion Splicer
764(1)
Summary
765(1)
Exam Essentials
765(1)
Written Lab
766(1)
Review Questions
767(4)
Chapter 24 Network Troubleshooting Methodology 771(54)
Narrowing Down the Problem
775(16)
Did You Check the Super Simple Stuff?
776(4)
Is Hardware or Software Causing the Problem?
780(1)
Is It a Workstation or a Server Problem?
781(1)
Which Segments of the Network Are Affected?
781(1)
Is It Bad Cabling?
782(9)
Troubleshooting Steps
791(24)
Step 1: Identify the Problem
792(4)
Step 2: Establish a Theory of Probable Cause
796(10)
Step 3: Test the Theory to Determine Cause
806(3)
Step 4: Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
809(1)
Step 5: Implement the Solution or Escalate as Necessary
810(3)
Step 6: Verify Full System Functionality, and If Applicable, Implement Preventative Measures
813(1)
Step 7: Document Findings, Actions, Outcomes, and Lessons Learned
814(1)
Troubleshooting Tips
815(3)
Don't Overlook the Small Stuff
815(1)
Prioritize Your Problems
815(1)
Check the Software Configuration
816(1)
Don't Overlook Physical Conditions
817(1)
Don't Overlook Cable Problems
817(1)
Check for Viruses
818(1)
Summary
818(1)
Exam Essentials
818(1)
Written Lab
819(2)
Review Questions
821(4)
Chapter 25 Network Software Tools and Commands 825(62)
Software Tools
827(6)
Wi-Fi Analyzers
827(1)
Protocol Analyzer/Packet Capture
828(1)
Bandwidth Speed Testers
829(1)
Port Scanners
830(1)
NetFlow Analyzers
830(1)
Trivial File Transfer Protocol (TFTP) Server
831(1)
Connectivity Software
831(1)
IP Scanner
832(1)
Using traceroute
833(3)
Using ipconfig, ifconfig, and ip
836(4)
Using the ipconfig Utility
836(4)
Using the ifconfig Utility
840(1)
Using the ip Utility
840(1)
Using the iptables Utility
841(1)
Examples of iptables
841(1)
Using the ping Utility
841(4)
Using the Address Resolution Protocol
845(1)
The Windows ARP Table
845(1)
Using the arp Utility
846(3)
Using the nslookup Utility
849(1)
Resolving Names with the Hosts File
850(2)
Using the Mtr Command (pathping)
852(1)
Using the Nmap Utility
853(1)
Using the route Command
854(3)
Using the route Command Options
854(3)
Some Examples of the route Command
857(1)
Using the nbtstat Utility
857(6)
The -a Switch
858(2)
The -A Switch
860(1)
The -c Switch
860(1)
The -n Switch
860(1)
The -r Switch
861(1)
The -R Switch
862(1)
The -S Switch
862(1)
The -s Switch
863(1)
Using the netstat Utility
863(8)
The -a Switch
866(1)
The -e Switch
866(1)
The -r Switch
867(1)
The -s Switch
867(1)
The -p Switch
868(1)
The -n Switch
869(2)
Using tcpdump
871(1)
Examples of Using tcpdump
871(1)
Using the File Transfer Protocol
871(5)
Starting FTP and Logging In to an FTP Server
872(2)
Downloading Files
874(2)
Uploading Files
876(1)
Using the Telnet Utility
876(2)
How to Enable Telnet in Windows
877(1)
Don't Use Telnet, Use Secure Shell
878(1)
Summary
878(1)
Exam Essentials
879(1)
Written Lab
880(1)
Review Questions
881(6)
Appendix A Answers to Written Labs 887(18)
Chapter 1: Introduction to Networks
888(1)
Chapter 2: The Open Systems Interconnection Specifications
888(1)
Chapter 3: Networking Connectors and Wiring Standards
889(1)
Chapter 4: The Current Ethernet Specifications
889(2)
Chapter 5: Networking Devices
891(1)
Chapter 6: Introduction to the Internet Protocol
892(1)
Chapter 7: IP Addressing
893(1)
Written Lab 7.1
893(1)
Written Lab 7.2
893(1)
Chapter 8: IP Subnetting, Troubleshooting IP, and Introduction to NAT
894(1)
Chapter 9: Introduction to IP Routing
895(1)
Chapter 10: Routing Protocols
895(1)
Chapter 11: Switching and Virtual LANs
895(1)
Chapter 12: Wireless Networking
896(1)
Chapter 13: Using Statistics and Sensors to Ensure Network Availability
896(1)
Chapter 14: Organizational Documents and Policies
897(1)
Chapter 15: High Availability and Disaster Recovery
898(1)
Chapter 16: Common Security Concepts
898(1)
Chapter 17: Common Types of Attacks
899(1)
Chapter 18: Network Hardening Techniques
899(1)
Chapter 19: Remote Access Security
900(1)
Chapter 20: Physical Security
900(1)
Chapter 21: Data Center Architecture and Cloud Concepts
901(1)
Chapter 22: Ensuring Network Availability
901(1)
Chapter 23: Cable Connectivity Issues and Tools
902(1)
Chapter 24: Network Troubleshooting Methodology
902(1)
Chapter 25: Network Software Tools and Commands
903(2)
Appendix B Answers to Review Questions 905(34)
Chapter 1: Introduction to Networks
906(1)
Chapter 2: The Open Systems Interconnection Specifications
907(2)
Chapter 3: Networking Connectors and Wiring Standards
909(1)
Chapter 4: The Current Ethernet Specifications
910(1)
Chapter 5: Networking Devices
911(2)
Chapter 6: Introduction to the Internet Protocol
913(1)
Chapter 7: IP Addressing
914(2)
Chapter 8: IP Subnetting, Troubleshooting IP, and Introduction to NAT
916(2)
Chapter 9: Introduction to IP Routing
918(1)
Chapter 10: Routing Protocols
919(2)
Chapter 11: Switching and Virtual LANs
921(1)
Chapter 12: Wireless Networking
922(2)
Chapter 13: Using Statistics and Sensors to Ensure Network Availability
924(1)
Chapter 14: Organizational Documents and Policies
925(1)
Chapter 15: High Availability and Disaster Recovery
926(1)
Chapter 16: Common Security Concepts
927(1)
Chapter 17: Common Types of Attacks
927(1)
Chapter 18: Network Hardening Techniques
928(1)
Chapter 19: Remote Access Security
929(1)
Chapter 20: Physical Security
930(1)
Chapter 21: Data Center Architecture and Cloud Concepts
931(2)
Chapter 22: Ensuring Network Availability
933(1)
Chapter 23: Cable Connectivity Issues and Tools
934(1)
Chapter 24: Network Troubleshooting Methodology
935(2)
Chapter 25: Network Software Tools and Commands
937(2)
Appendix C Subnetting Class A 939(8)
Subnetting Practice Examples: Class A Addresses
940(2)
Practice Example #1A: 255.255.0.0 (/16)
941(1)
Practice Example #2A: 255.255.240.0 (/20)
941(1)
Practice Example #3A: 255.255.255.192 (/26)
942(1)
Subnetting in Your Head: Class A Addresses
942(1)
Written Lab 1
943(1)
Written Lab 2
944(1)
Answers to Written Lab 1
944(1)
Answers to Written Lab 2
945(2)
Index 947
Todd Lammle, Network+, CCSI, CCNA, CCNP, is the networking authority. He has been involved in computers and networking with Fortune 500 companies for over 30 years. Todd is President of GlobalNet System Solutions, Inc., a networking integration and training firm. He is the bestselling author of numerous titles, with over 900,000 copies of his books in print. He can be reached through his website at www.lammle.com.