Introduction |
|
xix | |
|
Chapter 1 Introduction to Networking |
|
|
1 | (20) |
|
Comparing Logical and Physical Networks |
|
|
1 | (1) |
|
Networking Home Computers |
|
|
2 | (2) |
|
Networking Small Offices and Home Offices |
|
|
4 | (6) |
|
Understanding Local Area Networks |
|
|
6 | (1) |
|
Comparing Workgroups and Domains |
|
|
7 | (2) |
|
Exploring the Benefits of Domains and Domain Controllers |
|
|
9 | (1) |
|
|
10 | (2) |
|
|
12 | (3) |
|
Understanding Wide Area Networks |
|
|
12 | (1) |
|
Understanding Branch Offices |
|
|
13 | (1) |
|
Accessing Networks Remotely |
|
|
14 | (1) |
|
Understanding Standards Organizations |
|
|
15 | (3) |
|
Understanding the Internet Engineering Task Force |
|
|
16 | (1) |
|
Understanding the World Wide Web Consortium |
|
|
17 | (1) |
|
Understanding the Institute of Electrical and Electronics Engineers |
|
|
18 | (1) |
|
Understanding the International Telecommunication Union |
|
|
18 | (1) |
|
The Essentials and Beyond |
|
|
18 | (3) |
|
Chapter 2 Overview of Networking Components |
|
|
21 | (20) |
|
Comparing Unicast, Broadcast, and Multicast Traffic |
|
|
21 | (5) |
|
Understanding Unicast Traffic |
|
|
22 | (1) |
|
Understanding Broadcast Traffic |
|
|
23 | (2) |
|
Understanding Multicast Traffic |
|
|
25 | (1) |
|
Understanding Network Hardware |
|
|
26 | (10) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
30 | (2) |
|
|
32 | (2) |
|
|
34 | (2) |
|
Exploring Protocols and Services |
|
|
36 | (2) |
|
|
36 | (1) |
|
|
37 | (1) |
|
Understanding Basic Topologies |
|
|
38 | (1) |
|
The Essentials and Beyond |
|
|
39 | (2) |
|
Chapter 3 Understanding the OSI Model |
|
|
41 | (22) |
|
Understanding the OSI Model |
|
|
41 | (14) |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
46 | (2) |
|
|
48 | (1) |
|
|
49 | (3) |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
53 | (2) |
|
Understanding the TCP/IP Model |
|
|
55 | (1) |
|
Mapping Devices on the OSI and TCP Models |
|
|
56 | (4) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
Mapping Protocols on the OSI and TCP/IP Models |
|
|
60 | (1) |
|
The Essentials and Beyond |
|
|
61 | (2) |
|
Chapter 4 Core TCP/IP Protocols |
|
|
63 | (22) |
|
Understanding TCP and UDP |
|
|
63 | (4) |
|
|
64 | (2) |
|
|
66 | (1) |
|
Exploring Common Protocols |
|
|
67 | (12) |
|
Address Resolution Protocol |
|
|
67 | (1) |
|
Hypertext Transfer Protocol |
|
|
68 | (1) |
|
|
69 | (2) |
|
Trivial File Transfer Protocol |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
73 | (1) |
|
Internet Protocol Security |
|
|
74 | (1) |
|
Simple Mail Transfer Protocol |
|
|
74 | (1) |
|
|
75 | (1) |
|
Internet Message Access Protocol |
|
|
75 | (1) |
|
Lightweight Directory Access Protocol |
|
|
76 | (1) |
|
|
77 | (1) |
|
Point-to-point Tunneling Protocol |
|
|
77 | (1) |
|
Layer 2 Tunneling Protocol |
|
|
77 | (1) |
|
Simple Network Management Protocol |
|
|
78 | (1) |
|
Internet Group Multicast Protocol |
|
|
78 | (1) |
|
Internet Control Message Protocol |
|
|
78 | (1) |
|
|
79 | (4) |
|
Controlling Port Traffic with a Firewall |
|
|
81 | (1) |
|
Mapping Internally Used Ports and Protocols |
|
|
81 | (2) |
|
The Essentials and Beyond |
|
|
83 | (2) |
|
|
85 | (32) |
|
Exploring the Components of an IPv4 Address |
|
|
85 | (10) |
|
Ascertaining the Network ID and Host ID of an IP Address |
|
|
86 | (4) |
|
Identifying the Default Gateway |
|
|
90 | (1) |
|
Determining Local and Remote Addresses |
|
|
91 | (1) |
|
Understanding Classful IP Addresses |
|
|
92 | (2) |
|
Identifying Reserved IP Address Ranges |
|
|
94 | (1) |
|
Exploring an IPv4 Address in Binary |
|
|
95 | (5) |
|
Understanding the Bits of an IP Address |
|
|
95 | (3) |
|
Understanding CIDR Notation |
|
|
98 | (1) |
|
|
98 | (2) |
|
Using Classless IP Addresses |
|
|
100 | (1) |
|
Subnetting IPv4 Addresses |
|
|
100 | (10) |
|
Determining the Number of Subnet Bits |
|
|
101 | (2) |
|
Determining the Number of Hosts in a Network |
|
|
103 | (2) |
|
Identifying Local and Remote Addresses |
|
|
105 | (2) |
|
Applying Subnetting Knowledge |
|
|
107 | (3) |
|
Comparing Manual and Automatic Assignment of IPv4 Addresses |
|
|
110 | (3) |
|
Manually Configuring IPv4 |
|
|
110 | (1) |
|
|
110 | (2) |
|
|
112 | (1) |
|
The Essentials and Beyond |
|
|
113 | (4) |
|
|
117 | (16) |
|
|
117 | (6) |
|
Comparing IPv4 Classes and IPv6 Prefixes |
|
|
118 | (1) |
|
Understanding Hexadecimal |
|
|
119 | (1) |
|
Displaying IPv6 Addresses |
|
|
120 | (1) |
|
Comparing IPv6 Transmission Types |
|
|
121 | (1) |
|
Understanding the Need for IPv6 |
|
|
122 | (1) |
|
Understanding Neighbor Discovery |
|
|
122 | (1) |
|
Exploring the Components of an IPv6 Address |
|
|
123 | (4) |
|
Understanding Global Unicast Addresses |
|
|
124 | (1) |
|
Understanding Link-Local Addresses |
|
|
125 | (1) |
|
Understanding Unique Local Addresses |
|
|
126 | (1) |
|
Understanding the Dual IP Stack |
|
|
127 | (2) |
|
Using IPv4-Mapped IPv6 Addresses |
|
|
127 | (1) |
|
Understanding IPv4 to IPv6 Tunneling Protocols |
|
|
128 | (1) |
|
Comparing Manual and Automatic Assignment of IPv6 |
|
|
129 | (2) |
|
Manually Configuring IPv6 |
|
|
129 | (1) |
|
|
130 | (1) |
|
The Essentials and Beyond |
|
|
131 | (2) |
|
Chapter 7 Connecting Computers to a Network |
|
|
133 | (20) |
|
Identifying Potential Problems with Connectivity |
|
|
133 | (11) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
134 | (3) |
|
|
137 | (5) |
|
|
142 | (1) |
|
|
142 | (2) |
|
Exploring Cable Types and Their Characteristics |
|
|
144 | (6) |
|
Understanding Twisted Pair |
|
|
144 | (2) |
|
Comparing Unshielded and Shielded Twisted Pair |
|
|
146 | (1) |
|
Comparing Straight-Through and Crossover Cables |
|
|
146 | (1) |
|
Understanding Fiber Optic |
|
|
147 | (2) |
|
|
149 | (1) |
|
The Essentials and Beyond |
|
|
150 | (3) |
|
Chapter 8 Networking Computers with Switches |
|
|
153 | (22) |
|
Connecting Multiple Computers |
|
|
153 | (3) |
|
Understanding Physical Ports |
|
|
156 | (2) |
|
Identifying the Number and Type of Ports |
|
|
156 | (1) |
|
Identifying Ports in Drawings |
|
|
157 | (1) |
|
Comparing Hubs and Switches |
|
|
158 | (4) |
|
Understanding Collision Domains |
|
|
159 | (1) |
|
Identifying a Collision Domain with a Hub |
|
|
159 | (1) |
|
Identifying Collision Domains with a Switch |
|
|
160 | (1) |
|
Mapping Ports to MAC Addresses |
|
|
161 | (1) |
|
Comparing Managed and Unmanaged Switches |
|
|
162 | (5) |
|
Understanding Unmanaged Switches |
|
|
163 | (1) |
|
Understanding Managed Switches |
|
|
163 | (1) |
|
Comparing Layer 2 and Layer 3 Switches |
|
|
164 | (1) |
|
Using a Managed Switch to Create a VLAN |
|
|
164 | (3) |
|
|
167 | (3) |
|
Identifying Transmission Speeds |
|
|
168 | (1) |
|
Understanding the Uplink Port |
|
|
169 | (1) |
|
Identifying Backplane Speed |
|
|
170 | (1) |
|
Understanding Security Options |
|
|
170 | (2) |
|
Understanding Port Security |
|
|
171 | (1) |
|
Planning Hardware Redundancy |
|
|
171 | (1) |
|
The Essentials and Beyond |
|
|
172 | (3) |
|
Chapter 9 Connecting Networks with Routers |
|
|
175 | (22) |
|
Connecting Multiple Networks |
|
|
175 | (5) |
|
Comparing Hardware Routers and Software Routers |
|
|
177 | (1) |
|
Understanding Default Routes |
|
|
177 | (2) |
|
Understanding Directly Connected Routes |
|
|
179 | (1) |
|
Routing Traffic on a Network |
|
|
180 | (7) |
|
|
180 | (2) |
|
Configuring Dynamic Routing |
|
|
182 | (3) |
|
Understanding the Routing Table |
|
|
185 | (2) |
|
Identifying Transmission Speeds |
|
|
187 | (1) |
|
Routing Software in Windows Server 2008 |
|
|
188 | (4) |
|
Adding Routing Services to Windows Server 2008 |
|
|
188 | (2) |
|
Configuring a Router on Windows Server 2008 |
|
|
190 | (2) |
|
Understanding Other Routing Protocols |
|
|
192 | (3) |
|
|
193 | (1) |
|
Using an IGMP Router and Proxy |
|
|
194 | (1) |
|
|
195 | (1) |
|
The Essentials and Beyond |
|
|
195 | (2) |
|
Chapter 10 Resolving Names to IP Addresses |
|
|
197 | (22) |
|
Exploring Types of Names Used in Networks |
|
|
197 | (7) |
|
|
199 | (1) |
|
Understanding NetBIOS Names |
|
|
199 | (3) |
|
Creating NetBIOS Names from Host Names |
|
|
202 | (1) |
|
Viewing and Modifying a Computer Name |
|
|
203 | (1) |
|
Exploring Types of Name Resolution |
|
|
204 | (11) |
|
Understanding Domain Naming Service |
|
|
205 | (5) |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
212 | (1) |
|
Viewing the NetBIOS Cache |
|
|
213 | (1) |
|
Understanding the Lmhosts File |
|
|
214 | (1) |
|
Understanding Broadcast Name Resolution |
|
|
214 | (1) |
|
Understanding Link-Local Multicast Name Resolution |
|
|
214 | (1) |
|
Identifying the Steps in Name Resolution |
|
|
215 | (2) |
|
Identifying Steps in Host Name Resolution |
|
|
215 | (1) |
|
Identifying Steps in NetBIOS Name Resolution |
|
|
216 | (1) |
|
The Essentials and Beyond |
|
|
217 | (2) |
|
Chapter 11 Understanding Network Security Zones |
|
|
219 | (20) |
|
Understanding Risks on the Internet |
|
|
219 | (2) |
|
|
221 | (6) |
|
Understanding Network Address Translation |
|
|
222 | (2) |
|
Understanding Proxy Servers |
|
|
224 | (3) |
|
|
227 | (5) |
|
Exploring the Windows Server 2008 Firewall |
|
|
229 | (3) |
|
Identifying a Perimeter Network |
|
|
232 | (3) |
|
Understanding a Reverse Proxy Server |
|
|
233 | (1) |
|
Understanding Guest Networks |
|
|
234 | (1) |
|
|
235 | (1) |
|
The Essentials and Beyond |
|
|
236 | (3) |
|
Chapter 12 Understanding Wireless Networking |
|
|
239 | (24) |
|
Exploring Basic Wireless Components |
|
|
239 | (4) |
|
Using Wireless Access Points |
|
|
240 | (1) |
|
Naming the Wireless Network |
|
|
241 | (2) |
|
Comparing CSMA/CD and CSMA/CA |
|
|
243 | (1) |
|
Comparing Networking Standards and Characteristics |
|
|
243 | (5) |
|
Comparing FHSS, DSSS, and OFDM |
|
|
244 | (1) |
|
|
245 | (1) |
|
|
246 | (1) |
|
|
247 | (1) |
|
|
247 | (1) |
|
|
248 | (1) |
|
Comparing Network Security Methods |
|
|
248 | (6) |
|
|
249 | (2) |
|
|
251 | (1) |
|
|
252 | (1) |
|
Using an IEEE 802.1x Authentication Server |
|
|
253 | (1) |
|
|
254 | (5) |
|
|
255 | (3) |
|
Wireless Networks in a Business |
|
|
258 | (1) |
|
Understanding Point-to-Point Wireless |
|
|
259 | (2) |
|
The Essentials and Beyond |
|
|
261 | (2) |
|
Chapter 13 Understanding Internet Access Methods and Wide Area Networks |
|
|
263 | (20) |
|
Comparing Connectivity Methods Used in Homes and SOHOs |
|
|
263 | (6) |
|
Using a Dial-up Connection |
|
|
264 | (1) |
|
|
265 | (1) |
|
Employing Broadband Cable |
|
|
266 | (1) |
|
|
267 | (2) |
|
Comparing Connectivity Methods in Enterprises |
|
|
269 | (4) |
|
Exploring Digital Signal Lines |
|
|
271 | (1) |
|
|
271 | (1) |
|
Using T1/T3 Lines and E1/E3 Lines |
|
|
272 | (1) |
|
|
273 | (1) |
|
Exploring Remote Access Services |
|
|
273 | (6) |
|
Connecting to RAS via Dial-up |
|
|
274 | (2) |
|
Connecting to RAS via a VPN |
|
|
276 | (2) |
|
Comparing Client VPNs with Gateway VPNs |
|
|
278 | (1) |
|
Adding Remote Access Services to Windows Server 2008 |
|
|
278 | (1) |
|
|
279 | (1) |
|
The Essentials and Beyond |
|
|
280 | (3) |
|
Chapter 14 Troubleshooting TCP/IP |
|
|
283 | (26) |
|
|
283 | (4) |
|
Getting Help at the Command Prompt |
|
|
284 | (1) |
|
|
285 | (1) |
|
Understanding Case Sensitivity |
|
|
285 | (2) |
|
Checking the TCP/IP Configuration with ipconfig |
|
|
287 | (4) |
|
Troubleshooting Connectivity with ping |
|
|
291 | (4) |
|
Identifying Routers with tracert |
|
|
295 | (2) |
|
Verifying the Routed Path with pathping |
|
|
297 | (2) |
|
Viewing TCP/IP Statistics with netstat |
|
|
299 | (5) |
|
|
304 | (2) |
|
The Essentials and Beyond |
|
|
306 | (3) |
|
Appendix A Answers to Review Questions |
|
|
309 | (10) |
|
|
309 | (1) |
|
|
310 | (1) |
|
|
310 | (1) |
|
|
311 | (1) |
|
|
312 | (1) |
|
|
312 | (1) |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
314 | (1) |
|
|
315 | (1) |
|
|
316 | (1) |
|
|
316 | (1) |
|
|
317 | (1) |
|
|
317 | (2) |
|
Appendix B Microsoft's Certification Program |
|
|
319 | (6) |
|
Certification Objectives Map |
|
|
320 | (5) |
Index |
|
325 | |