Preface |
|
xix | |
Introduction |
|
xx | |
Additional Resources For Teachers |
|
xxix | |
Chapter 1 Network Models |
|
1 | (29) |
|
|
1 | (1) |
|
|
1 | (2) |
|
|
2 | (1) |
|
|
2 | (1) |
|
The OSI Seven-Layer Model on a Simple Network |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
4 | (19) |
|
Let's Get Physical-Network Hardware and Layers 1-2 |
|
|
4 | (10) |
|
Beyond the Single Wire-Network Software and Layers 3-7 |
|
|
14 | (9) |
|
The OSI Seven-Layer Model and Remote Work |
|
|
23 | (3) |
|
|
26 | (4) |
Chapter 2 Cabling and Topology |
|
30 | (18) |
|
|
31 | (12) |
|
|
31 | (3) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
34 | (8) |
|
Copper Cabling and Connectors |
|
|
35 | (4) |
|
Fiber-Optic Cabling and Connectors |
|
|
39 | (2) |
|
|
41 | (1) |
|
Networking Industry Standards-IEEE |
|
|
42 | (1) |
|
|
43 | (5) |
Chapter 3 Ethernet Basics |
|
48 | (20) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
50 | (14) |
|
|
50 | (2) |
|
|
52 | (6) |
|
|
52 | (1) |
|
|
52 | (3) |
|
|
55 | (1) |
|
|
56 | (2) |
|
Enhancing and Extending Ethernet Networks |
|
|
58 | (11) |
|
|
58 | (1) |
|
|
58 | (2) |
|
Connecting Ethernet Segments |
|
|
60 | (2) |
|
|
62 | (2) |
|
|
64 | (4) |
Chapter 4 Ethernet Standards |
|
68 | (18) |
|
|
69 | (12) |
|
|
69 | (3) |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
72 | (3) |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
73 | (1) |
|
Mechanical Connection Variations |
|
|
74 | (1) |
|
Implementing Multiple Types of Gigabit Ethernet |
|
|
74 | (1) |
|
|
75 | (12) |
|
|
75 | (6) |
|
|
81 | (5) |
Chapter 5 Installing a Physical Network |
|
86 | (42) |
|
|
87 | (2) |
|
Understanding Structured Cabling |
|
|
87 | (2) |
|
Cable Basics-A Star Is Born |
|
|
88 | (1) |
|
|
89 | (33) |
|
Structured Cable-Network Components |
|
|
89 | (8) |
|
Structured Cable-Beyond the Star |
|
|
97 | (1) |
|
|
97 | (2) |
|
Installing Structured Cabling |
|
|
99 | (15) |
|
|
99 | (1) |
|
|
100 | (1) |
|
Determining the Location of the Telecommunications Room |
|
|
101 | (1) |
|
|
102 | (2) |
|
|
104 | (3) |
|
|
107 | (7) |
|
|
114 | (3) |
|
|
114 | (2) |
|
|
116 | (1) |
|
Diagnostics and Repair of Physical Cabling |
|
|
117 | (12) |
|
Diagnosing Physical Problems |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
Problems in the Telecommunications Room |
|
|
119 | (2) |
|
|
121 | (1) |
|
|
122 | (6) |
Chapter 6 TCP/IP Basics |
|
128 | (44) |
|
|
129 | (1) |
|
|
129 | (38) |
|
The TCP/IP Protocol Suite |
|
|
129 | (18) |
|
|
130 | (1) |
|
Transport Layer Protocols |
|
|
131 | (1) |
|
Application Layer Protocols |
|
|
132 | (1) |
|
|
133 | (2) |
|
|
135 | (5) |
|
|
140 | (5) |
|
|
145 | (2) |
|
|
147 | (6) |
|
|
147 | (6) |
|
|
153 | (1) |
|
|
153 | (20) |
|
|
154 | (2) |
|
|
156 | (10) |
|
|
166 | (1) |
|
|
167 | (5) |
Chapter 7 Routing |
|
172 | (40) |
|
|
173 | (34) |
|
|
173 | (1) |
|
|
174 | (12) |
|
|
174 | (7) |
|
|
181 | (1) |
|
Network Address Translation |
|
|
181 | (5) |
|
|
186 | (9) |
|
|
186 | (1) |
|
Distance Vector and Path Vector |
|
|
187 | (6) |
|
|
193 | (1) |
|
|
194 | (1) |
|
Dynamic Routing Makes the Internet |
|
|
195 | (1) |
|
Route Redistribution and Administrative Distance |
|
|
195 | (1) |
|
|
195 | (18) |
|
|
196 | (5) |
|
Basic Router Configuration |
|
|
201 | (2) |
|
|
203 | (4) |
|
|
207 | (5) |
Chapter 8 TCP/IP Applications |
|
212 | (30) |
|
|
213 | (1) |
|
Transport Layer and Network Layer Protocols |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
214 | (20) |
|
|
214 | (3) |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
216 | (1) |
|
The Power of Port Numbers |
|
|
217 | (6) |
|
|
219 | (2) |
|
|
221 | (2) |
|
Rules for Determining Good vs. Bad Communications |
|
|
223 | (1) |
|
Common TCP/IP Applications |
|
|
223 | (11) |
|
|
224 | (1) |
|
|
225 | (4) |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
231 | (3) |
|
TCP/IP Applications Chart |
|
|
234 | (1) |
|
|
234 | (2) |
|
Other Layer 7 Applications |
|
|
234 | (2) |
|
|
236 | (6) |
Chapter 9 Network Naming |
|
242 | (28) |
|
|
243 | (2) |
|
|
243 | (2) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
245 | (21) |
|
|
245 | (18) |
|
|
245 | (9) |
|
Administering DNS Servers |
|
|
254 | (7) |
|
Troubleshooting DNS on Clients |
|
|
261 | (2) |
|
Diagnosing TCP/IP Network Issues |
|
|
263 | (3) |
|
|
266 | (4) |
Chapter 10 Securing TCP/IP |
|
270 | (36) |
|
|
271 | (29) |
|
|
271 | (13) |
|
|
271 | (5) |
|
|
276 | (4) |
|
|
280 | (4) |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
284 | (1) |
|
TCP/IP Security Standards |
|
|
285 | (11) |
|
User Authentication Standards |
|
|
285 | (6) |
|
|
291 | (3) |
|
Combining Authentication and Encryption |
|
|
294 | (2) |
|
Secure TCP/IP Applications |
|
|
296 | (11) |
|
|
296 | (1) |
|
Securing E-Mail Protocols |
|
|
297 | (1) |
|
|
297 | (1) |
|
|
297 | (1) |
|
|
298 | (1) |
|
|
299 | (1) |
|
|
299 | (1) |
|
|
300 | (6) |
Chapter 11 Switch Features |
|
306 | (26) |
|
|
307 | (19) |
|
|
307 | (3) |
|
|
308 | (1) |
|
|
308 | (1) |
|
|
309 | (1) |
|
|
310 | (6) |
|
|
311 | (1) |
|
Configuring a VLAN-Capable Switch |
|
|
311 | (1) |
|
Assigning VLANs and Tagging |
|
|
312 | (1) |
|
|
313 | (1) |
|
|
314 | (1) |
|
|
315 | (1) |
|
|
315 | (1) |
|
|
316 | (1) |
|
|
316 | (1) |
|
|
316 | (17) |
|
|
317 | (2) |
|
|
319 | (1) |
|
|
320 | (1) |
|
|
320 | (6) |
|
|
326 | (6) |
Chapter 12 IPv6 |
|
332 | (20) |
|
|
333 | (15) |
|
|
333 | (6) |
|
|
333 | (5) |
|
|
338 | (1) |
|
|
339 | (6) |
|
Stateless Address Autoconfiguration (SLAAC) |
|
|
339 | (3) |
|
|
342 | (3) |
|
|
345 | (1) |
|
|
345 | (8) |
|
|
345 | (1) |
|
|
346 | (2) |
|
|
348 | (4) |
Chapter 13 WAN Connectivity |
|
352 | (28) |
|
|
353 | (1) |
|
|
353 | (1) |
|
|
353 | (1) |
|
|
354 | (21) |
|
|
354 | (1) |
|
|
354 | (3) |
|
|
357 | (7) |
|
|
358 | (2) |
|
|
360 | (1) |
|
|
361 | (1) |
|
|
361 | (1) |
|
|
362 | (2) |
|
|
364 | (1) |
|
|
364 | (8) |
|
|
365 | (2) |
|
|
367 | (5) |
|
WAN Troubleshooting Scenarios |
|
|
372 | (9) |
|
Loss of Internet Connectivity |
|
|
372 | (1) |
|
|
372 | (1) |
|
|
373 | (1) |
|
|
373 | (2) |
|
|
375 | (5) |
Chapter 14 Wireless Networking |
|
380 | (46) |
|
|
381 | (1) |
|
|
381 | (39) |
|
|
381 | (19) |
|
|
381 | (7) |
|
|
388 | (1) |
|
|
388 | (1) |
|
|
389 | (1) |
|
|
389 | (1) |
|
|
390 | (1) |
|
|
390 | (1) |
|
|
391 | (1) |
|
|
391 | (6) |
|
|
397 | (3) |
|
|
400 | (12) |
|
|
400 | (2) |
|
|
402 | (1) |
|
Setting Up an Ad Hoc Network |
|
|
403 | (1) |
|
Setting Up an Infrastructure Network |
|
|
404 | (7) |
|
|
411 | (1) |
|
Verifying the Installation |
|
|
412 | (1) |
|
|
412 | (15) |
|
|
412 | (2) |
|
|
414 | (3) |
|
|
417 | (3) |
|
|
420 | (6) |
Chapter 15 Virtualization and Cloud Computing |
|
426 | (36) |
|
|
427 | (29) |
|
Virtualization and Cloud Computing Concepts |
|
|
427 | (12) |
|
|
427 | (5) |
|
|
432 | (5) |
|
|
437 | (2) |
|
|
439 | (5) |
|
Putting Network Virtualization and Cloud Computing to Work |
|
|
444 | (19) |
|
Setting Up Rocket.Chat in a Local Hypervisor |
|
|
444 | (3) |
|
|
447 | (3) |
|
Setting Up Rocket.Chat on IaaS |
|
|
450 | (2) |
|
|
452 | (2) |
|
Interconnecting Local and Cloud Resources |
|
|
454 | (2) |
|
|
456 | (6) |
Chapter 16 Data Centers |
|
462 | (22) |
|
|
463 | (15) |
|
Classic Data Center Architecture and Design |
|
|
463 | (5) |
|
|
464 | (1) |
|
|
465 | (1) |
|
|
466 | (2) |
|
Where Is the Classic Data Center? |
|
|
468 | (1) |
|
|
468 | (1) |
|
|
468 | (1) |
|
Software-Defined Networking |
|
|
469 | (1) |
|
|
469 | (1) |
|
High Availability in the Data Center |
|
|
469 | (3) |
|
|
470 | (1) |
|
|
470 | (1) |
|
Facilities and Infrastructure Support |
|
|
471 | (1) |
|
Documenting the Data Center |
|
|
472 | (13) |
|
|
473 | (3) |
|
|
476 | (1) |
|
|
476 | (2) |
|
|
478 | (6) |
Chapter 17 Integrating Network Devices |
|
484 | (18) |
|
|
485 | (13) |
|
|
485 | (4) |
|
|
486 | (1) |
|
|
487 | (1) |
|
IoT Communications Technologies |
|
|
487 | (2) |
|
|
489 | (1) |
|
|
489 | (4) |
|
|
489 | (1) |
|
Unified Communication Features |
|
|
490 | (1) |
|
|
491 | (2) |
|
|
493 | (1) |
|
|
493 | (10) |
|
|
494 | (2) |
|
|
496 | (1) |
|
|
496 | (2) |
|
|
498 | (4) |
Chapter 18 Network Operations |
|
502 | (26) |
|
|
503 | (20) |
|
|
503 | (14) |
|
Hardening and Security Policies |
|
|
503 | (4) |
|
|
507 | (2) |
|
|
509 | (1) |
|
|
510 | (1) |
|
|
511 | (1) |
|
|
512 | (5) |
|
|
517 | (12) |
|
|
517 | (1) |
|
|
518 | (1) |
|
|
519 | (1) |
|
|
520 | (3) |
|
|
523 | (5) |
Chapter 19 Protecting Your Network |
|
528 | (48) |
|
|
529 | (40) |
|
|
529 | (2) |
|
|
529 | (1) |
|
|
530 | (1) |
|
|
530 | (1) |
|
|
531 | (1) |
|
|
531 | (15) |
|
|
532 | (1) |
|
|
532 | (1) |
|
|
533 | (1) |
|
|
534 | (1) |
|
|
534 | (1) |
|
|
535 | (2) |
|
|
537 | (2) |
|
|
539 | (1) |
|
|
539 | (1) |
|
|
540 | (1) |
|
|
540 | (3) |
|
|
543 | (2) |
|
|
545 | (1) |
|
|
546 | (3) |
|
Unnecessary Running Services |
|
|
547 | (1) |
|
|
548 | (1) |
|
|
548 | (1) |
|
|
548 | (1) |
|
|
549 | (1) |
|
|
549 | (14) |
|
|
549 | (4) |
|
|
553 | (6) |
|
|
559 | (1) |
|
|
560 | (3) |
|
|
563 | (14) |
|
|
563 | (1) |
|
Implementing and Configuring Firewalls |
|
|
564 | (3) |
|
Troubleshooting Firewalls |
|
|
567 | (2) |
|
|
569 | (7) |
Chapter 20 Network Monitoring |
|
576 | (20) |
|
|
577 | (15) |
|
|
577 | (2) |
|
|
579 | (8) |
|
|
580 | (1) |
|
|
580 | (3) |
|
|
583 | (1) |
|
|
584 | (1) |
|
|
585 | (2) |
|
|
587 | (10) |
|
Scenario: Monitoring and Managing |
|
|
587 | (4) |
|
|
591 | (1) |
|
|
592 | (4) |
Chapter 21 Network Troubleshooting |
|
596 | (42) |
|
|
597 | (34) |
|
|
597 | (12) |
|
|
597 | (3) |
|
|
600 | (9) |
|
The Troubleshooting Process |
|
|
609 | (7) |
|
|
610 | (2) |
|
Establish a Theory of Probable Cause |
|
|
612 | (1) |
|
Test the Theory to Determine the Cause |
|
|
613 | (1) |
|
Establish a Plan of Action and Identify Potential Effects |
|
|
614 | (1) |
|
Implement the Solution or Escalate as Necessary |
|
|
614 | (1) |
|
Verify Full System Functionality and Implement Preventive Measures |
|
|
615 | (1) |
|
Document Findings, Actions, Outcomes, and Lessons Learned |
|
|
615 | (1) |
|
Resolving Common Network Service Issues |
|
|
616 | (40) |
|
"We Can't Access Our Web Server in Istanbul!" |
|
|
616 | (1) |
|
Network Troubleshooting Considerations |
|
|
617 | (2) |
|
|
619 | (2) |
|
|
621 | (6) |
|
|
627 | (2) |
|
Network Performance Issues |
|
|
629 | (1) |
|
|
630 | (1) |
|
|
631 | (7) |
Appendix A Exam Objective Map |
|
638 | (17) |
|
|
638 | (17) |
Appendix B Create Your Study Plan |
|
655 | (1) |
|
Review Your Overall Score |
|
|
655 | (1) |
|
Review Your Score by CompTIA Network+ Exam Domain |
|
|
655 | (1) |
Appendix C About the Online Content |
|
656 | (5) |
|
|
656 | (1) |
|
Your Total Seminars Training Hub Account |
|
|
656 | (1) |
|
|
657 | (1) |
|
Single User License Terms and Conditions |
|
|
657 | (1) |
|
|
658 | (1) |
|
|
659 | (1) |
|
|
659 | (1) |
|
Playing the CompTIA Network+ Introduction Video |
|
|
659 | (1) |
|
Mike's CompTIA Network+ Video Training Sample |
|
|
659 | (1) |
|
TotalSims Sample for CompTIA Network+ |
|
|
659 | (1) |
|
|
660 | (1) |
|
|
660 | (1) |
Glossary |
|
661 | (54) |
Index |
|
715 | |