Introduction |
|
xxiii | |
Chapter 1 Introduction to Computer Networks |
|
2 | (60) |
|
|
3 | (1) |
|
|
3 | (1) |
|
|
3 | (1) |
|
|
4 | (2) |
|
|
6 | (6) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (4) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (8) |
|
|
20 | (2) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
24 | (14) |
|
|
33 | (1) |
|
IP Addressing in a Home Network |
|
|
34 | (2) |
|
|
36 | (2) |
|
|
38 | (1) |
|
1-6 Assembling an Office LAN |
|
|
38 | (7) |
|
|
39 | (1) |
|
Connect the Network Devices |
|
|
40 | (4) |
|
Configure the Computers to Operate on the LAN |
|
|
44 | (1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
1-7 Testing and Troubleshooting a LAN |
|
|
45 | (5) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
50 | (12) |
|
|
59 | (3) |
Chapter 2 Physical Layer Cabling: Twisted-Pair |
|
62 | (62) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
63 | (2) |
|
|
65 | (1) |
|
|
66 | (8) |
|
|
69 | (4) |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
74 | (4) |
|
Unshielded Twisted-Pair Cable |
|
|
74 | (2) |
|
Shielded Twisted-Pair Cable |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
2-4 Terminating Twisted-Pair Cables |
|
|
78 | (14) |
|
|
79 | (3) |
|
Straight-Through and Crossover Patch Cables |
|
|
82 | (8) |
|
|
90 | (1) |
|
|
91 | (1) |
|
2-5 Cable Testing and Certification |
|
|
92 | (5) |
|
|
96 | (1) |
|
|
97 | (1) |
|
2-6 10 Gigabit Ethernet over Copper |
|
|
97 | (5) |
|
|
98 | (1) |
|
|
98 | (2) |
|
|
100 | (1) |
|
|
101 | (1) |
|
|
101 | (1) |
|
2-7 Troubleshooting Cabling Systems |
|
|
102 | (10) |
|
|
102 | (1) |
|
Cable Failing to Meet Manufacturer Specifications |
|
|
102 | (2) |
|
CAT5e Cable Test Examples |
|
|
104 | (7) |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
112 | (1) |
|
|
112 | (12) |
|
|
121 | (3) |
Chapter 3 Physical Layer Cabling: Fiber Optics |
|
124 | (48) |
|
|
125 | (1) |
|
|
125 | (1) |
|
|
125 | (1) |
|
|
126 | (3) |
|
|
129 | (7) |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
135 | (1) |
|
3-3 Fiber Attenuation and Dispersion |
|
|
136 | (5) |
|
|
136 | (1) |
|
|
137 | (2) |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
141 | (6) |
|
|
142 | (1) |
|
|
143 | (2) |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
147 | (13) |
|
Defining Optical Networking |
|
|
148 | (3) |
|
|
151 | (3) |
|
|
154 | (3) |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
160 | (2) |
|
|
161 | (1) |
|
|
162 | (1) |
|
3-7 Troubleshooting Fiber Optics: The OTDR |
|
|
162 | (3) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
165 | (7) |
|
|
169 | (3) |
Chapter 4 Wireless Networking |
|
172 | (56) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
173 | (1) |
|
|
174 | (1) |
|
4-2 The IEEE 802.11 Wireless LAN Standard |
|
|
175 | (10) |
|
|
184 | (1) |
|
|
185 | (1) |
|
4-3 802.11 Wireless Networking |
|
|
185 | (12) |
|
|
195 | (1) |
|
|
196 | (1) |
|
4-4 Bluetooth, WiMAX, RFID, and Mobile Communications |
|
|
197 | (9) |
|
|
197 | (2) |
|
|
199 | (1) |
|
Radio Frequency Identification |
|
|
200 | (4) |
|
Mobile (Cellular) Communications |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
206 | (1) |
|
4-5 Configuring a Point-to-Multipoint Wireless LAN: A Case Study |
|
|
206 | (7) |
|
Step 1: Conducting an Antenna Site Survey |
|
|
207 | (1) |
|
Step 2: Establishing a Point-to-Point Wireless Link to the Home Network |
|
|
208 | (1) |
|
Steps 3 and 4: Configuring the Multipoint Distribution and Conducting an RF Site Survey |
|
|
209 | (2) |
|
Step 5: Configuring the Remote Installations |
|
|
211 | (1) |
|
|
212 | (1) |
|
|
212 | (1) |
|
4-6 Troubleshooting Wireless Networks |
|
|
213 | (4) |
|
Access Point Hardware Issues |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
214 | (1) |
|
Extending the Wireless Range |
|
|
214 | (1) |
|
Frequency Interference Problems |
|
|
214 | (1) |
|
Wireless Channel Utilization |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
Deauthentication/Disassociation Attacks |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
217 | (11) |
|
|
224 | (1) |
|
|
224 | (4) |
Chapter 5 Interconnecting the LANs |
|
228 | (62) |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
230 | (2) |
|
|
232 | (5) |
|
|
236 | (1) |
|
|
237 | (1) |
|
|
237 | (12) |
|
Hub and Switch Comparison |
|
|
239 | (3) |
|
|
242 | (5) |
|
|
247 | (1) |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
249 | (5) |
|
|
250 | (1) |
|
|
251 | (2) |
|
|
253 | (1) |
|
|
254 | (1) |
|
5-5 The Console Port Connection |
|
|
254 | (8) |
|
Configuring the PuTTY Software (Windows) |
|
|
256 | (3) |
|
Configuring the ZTerm Serial Communications Software (Mac) |
|
|
259 | (2) |
|
|
261 | (1) |
|
|
261 | (1) |
|
5-6 Interconnecting LANs with the Router |
|
|
262 | (5) |
|
|
265 | (1) |
|
|
265 | (1) |
|
|
266 | (1) |
|
|
266 | (1) |
|
5-7 Interconnecting LANs and WANs |
|
|
267 | (12) |
|
Three-Tiered LAN Architecture |
|
|
267 | (1) |
|
|
268 | (1) |
|
Distribution/Aggregation Layer |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
269 | (1) |
|
WAN High-Speed Serial Connections |
|
|
270 | (1) |
|
|
270 | (1) |
|
|
271 | (2) |
|
Metro Optical Ethernet/Carrier Ethernet |
|
|
273 | (1) |
|
|
274 | (2) |
|
|
276 | (1) |
|
|
277 | (1) |
|
|
277 | (2) |
|
|
279 | (1) |
|
|
279 | (11) |
|
|
287 | (1) |
|
|
287 | (3) |
Chapter 6 TCP/IP |
|
290 | (64) |
|
|
291 | (1) |
|
|
291 | (1) |
|
|
291 | (1) |
|
|
292 | (2) |
|
|
294 | (12) |
|
|
295 | (1) |
|
|
296 | (5) |
|
|
301 | (3) |
|
The Network Interface Layer |
|
|
304 | (1) |
|
|
304 | (1) |
|
|
305 | (1) |
|
|
306 | (6) |
|
Binary-to-Decimal Conversion |
|
|
306 | (1) |
|
Decimal-to-Binary Conversion |
|
|
307 | (2) |
|
|
309 | (1) |
|
|
309 | (3) |
|
|
312 | (1) |
|
|
312 | (1) |
|
|
312 | (5) |
|
|
316 | (1) |
|
|
316 | (1) |
|
6-5 Subnet Masks: Subnetting and Supernetting |
|
|
317 | (11) |
|
|
318 | (5) |
|
Alternative Technique to Derive the Subnets: Magic Number |
|
|
323 | (1) |
|
|
324 | (2) |
|
|
326 | (1) |
|
|
327 | (1) |
|
|
327 | (1) |
|
6-6 Supernetting, CIDR Blocks, and VLSM |
|
|
328 | (5) |
|
|
332 | (1) |
|
|
332 | (1) |
|
|
333 | (7) |
|
|
335 | (2) |
|
|
337 | (1) |
|
|
338 | (1) |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
340 | (14) |
|
|
349 | (1) |
|
|
350 | (4) |
Chapter 7 Introduction to Router Configuration |
|
354 | (50) |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
356 | (2) |
|
|
358 | (8) |
|
|
359 | (5) |
|
|
364 | (1) |
|
|
365 | (1) |
|
7-3 The Router's User EXEC Mode (Router>) |
|
|
366 | (7) |
|
|
366 | (3) |
|
Router Configuration Challenge: User EXEC Mode |
|
|
369 | (3) |
|
|
372 | (1) |
|
|
372 | (1) |
|
7-4 The Router's Privileged EXEC Mode (Router#) |
|
|
373 | (10) |
|
|
374 | (1) |
|
The enable secret Command |
|
|
375 | (1) |
|
Setting the Line Console Passwords |
|
|
375 | (1) |
|
FastEthernet Interface Configuration |
|
|
376 | (1) |
|
Serial Interface Configuration |
|
|
377 | (3) |
|
Router Configuration Challenge: Privileged EXEC Mode |
|
|
380 | (2) |
|
|
382 | (1) |
|
|
382 | (1) |
|
7-5 Configuring the Network Interface: Auto-negotiation |
|
|
383 | (4) |
|
|
384 | (1) |
|
|
384 | (2) |
|
|
386 | (1) |
|
|
387 | (1) |
|
7-6 Troubleshooting the Router Interface |
|
|
387 | (6) |
|
|
392 | (1) |
|
|
392 | (1) |
|
|
393 | (1) |
|
|
393 | (11) |
|
|
399 | (1) |
|
|
400 | (4) |
Chapter 8 Introduction to Switch Configuration |
|
404 | (40) |
|
|
405 | (1) |
|
|
405 | (1) |
|
|
405 | (1) |
|
|
406 | (1) |
|
8-2 Introduction to VLANs |
|
|
407 | (3) |
|
|
407 | (2) |
|
|
409 | (1) |
|
|
410 | (1) |
|
8-3 Introduction to Switch Configuration |
|
|
410 | (12) |
|
|
411 | (1) |
|
|
412 | (1) |
|
Setting the Line Console Passwords |
|
|
412 | (2) |
|
Static VLAN Configuration |
|
|
414 | (4) |
|
|
418 | (1) |
|
Networking Challenge: Switch Configuration |
|
|
419 | (1) |
|
|
420 | (1) |
|
|
421 | (1) |
|
8-4 Spanning Tree Protocol |
|
|
422 | (3) |
|
|
424 | (1) |
|
|
425 | (1) |
|
|
425 | (4) |
|
|
428 | (1) |
|
|
429 | (1) |
|
8-6 Troubleshooting the Switch Interface |
|
|
429 | (7) |
|
|
434 | (1) |
|
|
435 | (1) |
|
|
436 | (1) |
|
|
436 | (8) |
|
|
440 | (1) |
|
|
441 | (3) |
Chapter 9 Routing Protocols |
|
444 | (80) |
|
|
445 | (1) |
|
|
445 | (1) |
|
|
445 | (1) |
|
|
446 | (1) |
|
|
447 | (13) |
|
|
454 | (1) |
|
Configuring Static Routes |
|
|
454 | (4) |
|
Networking Challenge: Static Routes |
|
|
458 | (1) |
|
|
458 | (1) |
|
|
459 | (1) |
|
9-3 Dynamic Routing Protocols |
|
|
460 | (3) |
|
|
462 | (1) |
|
|
463 | (1) |
|
9-4 Distance Vector Protocols |
|
|
463 | (3) |
|
|
465 | (1) |
|
|
466 | (1) |
|
9-5 Configuring RIP and RIPv2 |
|
|
466 | (10) |
|
Configuring Routes with RIP |
|
|
468 | (5) |
|
Configuring Routes with RIPv2 |
|
|
473 | (1) |
|
Networking Challenge: RIPv2 |
|
|
474 | (1) |
|
|
475 | (1) |
|
|
476 | (1) |
|
|
476 | (5) |
|
|
480 | (1) |
|
|
480 | (1) |
|
9-7 Configuring the Open Shortest Path First (OSPF) Routing Protocol |
|
|
481 | (6) |
|
Networking Challenge: OSPF |
|
|
485 | (1) |
|
|
486 | (1) |
|
|
487 | (1) |
|
9-8 Advanced Distance Vector Protocol: Configuring Enhanced Interior Gateway Routing Protocol (EIGRP) |
|
|
487 | (9) |
|
Configuring Routes with EIGRP |
|
|
488 | (6) |
|
Networking Challenge: EIGRP |
|
|
494 | (1) |
|
|
495 | (1) |
|
|
495 | (1) |
|
9-9 Internet Routing with Border Gateway Protocol (BGP) |
|
|
496 | (3) |
|
|
496 | (2) |
|
|
498 | (1) |
|
|
498 | (1) |
|
|
499 | (5) |
|
|
499 | (1) |
|
|
499 | (1) |
|
|
500 | (1) |
|
|
501 | (1) |
|
|
501 | (1) |
|
|
502 | (1) |
|
|
503 | (1) |
|
|
504 | (1) |
|
|
504 | (20) |
|
|
520 | (1) |
|
|
520 | (4) |
Chapter 10 Managing the Network Infrastructure |
|
524 | (66) |
|
|
525 | (1) |
|
|
525 | (1) |
|
|
525 | (2) |
|
|
527 | (1) |
|
10-2 Domain Name and IP Address Assignment |
|
|
528 | (3) |
|
|
531 | (1) |
|
|
531 | (1) |
|
10-3 IP Address Management with DHCP |
|
|
531 | (6) |
|
|
534 | (1) |
|
|
535 | (2) |
|
|
537 | (1) |
|
|
537 | (1) |
|
10-4 Scaling a Network with NAT and PAT |
|
|
537 | (2) |
|
|
539 | (1) |
|
|
539 | (1) |
|
10-5 Domain Name System (DNS) |
|
|
539 | (7) |
|
|
541 | (5) |
|
|
546 | (1) |
|
|
546 | (1) |
|
10-6 Network Management Protocols |
|
|
546 | (6) |
|
|
547 | (4) |
|
|
551 | (1) |
|
|
552 | (1) |
|
10-7 Analyzing Network Traffic |
|
|
552 | (8) |
|
|
559 | (1) |
|
|
559 | (1) |
|
10-8 Network Analyzer: Wireshark |
|
|
560 | (6) |
|
Downloading and Installing Wireshark |
|
|
560 | (1) |
|
Using Wireshark to Capture Packets |
|
|
561 | (1) |
|
Using Wireshark to Inspect Data Packets |
|
|
562 | (3) |
|
|
565 | (1) |
|
|
565 | (1) |
|
10-9 Analyzing Computer Networks: FTP Data Packets |
|
|
566 | (2) |
|
|
567 | (1) |
|
|
567 | (1) |
|
10-10 Troubleshooting IP Networks |
|
|
568 | (6) |
|
Verifying Network Settings |
|
|
570 | (1) |
|
Investigating IP Address Issues |
|
|
570 | (1) |
|
Finding Subnet Mask Issues |
|
|
570 | (1) |
|
Looking for Gateway Issues |
|
|
571 | (1) |
|
Identifying Name Resolution Issues |
|
|
571 | (1) |
|
Investigating DHCP Issues |
|
|
571 | (2) |
|
Checking for Blocked TCP/UDP Ports |
|
|
573 | (1) |
|
|
573 | (1) |
|
|
573 | (1) |
|
|
574 | (1) |
|
|
574 | (16) |
|
|
587 | (3) |
Chapter 11 Network Security |
|
590 | (86) |
|
|
591 | (1) |
|
|
591 | (1) |
|
|
591 | (1) |
|
|
592 | (2) |
|
11-2 Intrusion: How Attackers Gain Control of a Network |
|
|
594 | (12) |
|
|
595 | (1) |
|
|
596 | (1) |
|
|
597 | (1) |
|
|
598 | (1) |
|
|
599 | (1) |
|
Preventing Vulnerable Software Attacks |
|
|
600 | (2) |
|
|
602 | (2) |
|
|
604 | (1) |
|
|
605 | (1) |
|
|
606 | (4) |
|
Distributed Denial-of-Service Attacks |
|
|
608 | (1) |
|
|
609 | (1) |
|
|
609 | (1) |
|
11-4 Security Software and Hardware |
|
|
610 | (13) |
|
|
610 | (1) |
|
Antivirus/Anti-malware Software |
|
|
610 | (1) |
|
Configuring Firewall Settings for Windows 10 |
|
|
611 | (4) |
|
Configuring Firewall Settings for macOS |
|
|
615 | (1) |
|
Configuring Firewall Settings for Linux |
|
|
616 | (1) |
|
|
617 | (2) |
|
Other Security Appliances |
|
|
619 | (2) |
|
|
621 | (1) |
|
|
622 | (1) |
|
|
622 | (1) |
|
11-5 Managing Network Access |
|
|
623 | (3) |
|
|
625 | (1) |
|
|
625 | (1) |
|
|
626 | (5) |
|
|
626 | (2) |
|
|
628 | (2) |
|
|
630 | (1) |
|
|
631 | (1) |
|
|
631 | (1) |
|
|
631 | (6) |
|
|
633 | (2) |
|
|
635 | (1) |
|
|
635 | (2) |
|
|
637 | (1) |
|
|
637 | (1) |
|
|
637 | (5) |
|
|
641 | (1) |
|
|
642 | (1) |
|
11-9 Remote Access and VPN Technologies |
|
|
642 | (17) |
|
Analog Modem Technologies |
|
|
643 | (1) |
|
|
644 | (1) |
|
|
644 | (3) |
|
|
647 | (1) |
|
|
647 | (1) |
|
|
648 | (4) |
|
Configuring a Remote Client's VPN Connection |
|
|
652 | |
|
|
10 | (642) |
|
|
652 | (1) |
|
Configuring a macOS VPN Client |
|
|
652 | (1) |
|
Configuring a Cisco VPN Client |
|
|
653 | (5) |
|
|
658 | (1) |
|
|
658 | (1) |
|
|
659 | (5) |
|
|
660 | (1) |
|
|
661 | (1) |
|
|
662 | (1) |
|
Internet of Things (IoT) Security Devices |
|
|
662 | (1) |
|
|
663 | (1) |
|
|
663 | (1) |
|
|
664 | (1) |
|
|
664 | (12) |
|
|
674 | (1) |
|
|
674 | (2) |
Chapter 12 Cloud Computing and Virtualization |
|
676 | (30) |
|
|
677 | (1) |
|
|
677 | (1) |
|
|
677 | (1) |
|
|
678 | (1) |
|
|
679 | (13) |
|
Setting Up Virtualization on Windows10 |
|
|
682 | (9) |
|
|
691 | (1) |
|
|
691 | (1) |
|
|
692 | (6) |
|
Cloud Computing Service Models |
|
|
694 | (2) |
|
|
696 | (1) |
|
|
697 | (1) |
|
|
698 | (1) |
|
|
698 | (3) |
|
|
700 | (1) |
|
|
700 | (1) |
|
|
701 | (1) |
|
|
701 | (5) |
|
|
704 | (2) |
Chapter 13 Codes and Standards |
|
706 | (36) |
|
|
707 | (1) |
|
|
707 | (1) |
|
|
707 | (1) |
|
|
708 | (1) |
|
13-2 Safety Standards and Codes |
|
|
708 | (10) |
|
Design and Construction Requirements for Exit Routes (29 CFR 1910.36) |
|
|
709 | (1) |
|
Maintenance, Safeguards, and Operational Features for Exit Routes (29 CFR 1910.37) |
|
|
710 | (1) |
|
Emergency Action Plans (29 CFR 1910.38) |
|
|
710 | (1) |
|
Fire Prevention Plans (29 CFR 1910.39) |
|
|
711 | (1) |
|
Portable Fire Extinguishers (29 CFR 1910.157) |
|
|
712 | (1) |
|
Fixed Extinguishing Systems (29 CFR 1910.160) |
|
|
713 | (1) |
|
Fire Detection Systems (29 CFR 1910.164) |
|
|
714 | (1) |
|
Employee Alarm Systems (29 CFR 1910.165) |
|
|
715 | (1) |
|
Hazard Communication (29 CFR 1910.1200) |
|
|
716 | (1) |
|
|
717 | (1) |
|
|
717 | (1) |
|
|
718 | (1) |
|
|
718 | (1) |
|
13-3 Industry Regulatory Compliance |
|
|
718 | (5) |
|
|
719 | (1) |
|
|
719 | (1) |
|
|
719 | (1) |
|
|
719 | (1) |
|
|
720 | (1) |
|
|
720 | (1) |
|
International Export Controls |
|
|
720 | (2) |
|
|
722 | (1) |
|
|
722 | (1) |
|
13-4 Business Policies, Procedures, and Other Best Practices |
|
|
723 | (6) |
|
Memorandum of Understanding |
|
|
723 | (1) |
|
|
724 | (1) |
|
|
724 | (1) |
|
|
724 | (1) |
|
|
725 | (1) |
|
|
725 | (1) |
|
|
725 | (1) |
|
|
725 | (1) |
|
|
726 | (1) |
|
Privileged User Agreement |
|
|
726 | (1) |
|
Standard Operating Procedure |
|
|
726 | (1) |
|
Onboarding and Offboarding Policies |
|
|
727 | (1) |
|
|
727 | (1) |
|
|
728 | (1) |
|
|
728 | (1) |
|
13-5 Business Continuity and Disaster Recovery |
|
|
729 | (4) |
|
|
732 | (1) |
|
|
732 | (1) |
|
|
733 | (1) |
|
|
733 | (9) |
|
|
739 | (3) |
Glossary |
|
742 | |