Contents Foreword xxv Introduction xxix Assessment Test li Chapter 1 Introduction to Networks 1 First Things First: What’s a Network? 2 The Local Area Network (LAN) 3 Common Network Components 5 Wide Area Network (WAN) 7 Network Architecture: Peer-to-Peer or Client-Server? 9 Physical Network Topologies 12 Bus Topology 12 Star Topology 13 Ring Topology 14 Mesh Topology 15 Point-to-Point Topology 16 Point-to-Multipoint Topology 17 Hybrid Topology 18 Topology Selection, Backbones, and Segments 18 Selecting the Right Topology 19 The Network Backbone 20 Network Segments 21 Summary 21 Exam Essentials 21 Written Labs 22 Review Questions 23 Chapter 2 The Open Systems Interconnection Specifications 27 Internetworking Models 28 The Layered Approach 28 Advantages of Reference Models 29 The OSI Reference Model 30 The Application Layer 31 The Presentation Layer 33 The Session Layer 33 The Transport Layer 33 The Network Layer 39 The Data Link Layer 42 The Physical Layer 44 Introduction to Encapsulation 45 COPYRIGHTED MATERIAL
13
Embed
Contents · Topology Selection, Backbones, ... EIGRP 282 Border Gateway Protocol (BGP) 285 Link State Routing Protocols 286 Open Shortest Path First (OSPF) 287
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
ContentsForeword xxv
Introduction xxix
Assessment Test li
Chapter 1 Introduction to Networks 1
First Things First: What’s a Network? 2The Local Area Network (LAN) 3Common Network Components 5Wide Area Network (WAN) 7Network Architecture: Peer-to-Peer or Client-Server? 9
Chapter 2 The Open Systems Interconnection Specifications 27
Internetworking Models 28The Layered Approach 28Advantages of Reference Models 29
The OSI Reference Model 30The Application Layer 31The Presentation Layer 33The Session Layer 33The Transport Layer 33The Network Layer 39The Data Link Layer 42The Physical Layer 44
Common Network Connectivity Devices 117Hub 118Network Interface Card 118Bridge 120Switch 120Router 121Firewall 125Dynamic Host Configuration Protocol Server 126
Other Specialized Devices 129Multilayer Switch 130Load Balancer 130Domain Name Service Server 130Proxy Server 135Encryption Devices 136VPN Concentrator 137
Planning and Implementing a Basic SOHO Network Using Network Segmentation 137
Determining Requirements 138Switches and Bridges at the Data Link Layer 144Hubs at the Physical Layer 146Environmental Considerations 147
Chapter 6 Introduction to the Internet Protocol 155
Introducing TCP/IP 157A Brief History of TCP/IP 157TCP/IP and the DoD Model 158The Process/Application Layer Protocols 159The Host-to-Host Layer Protocols 168The Internet Layer Protocols 173
Data Encapsulation 178Summary 182Exam Essentials 182Written Lab 183Review Questions 184
137550ftoc.indd 13 12/22/11 5:54 AM
xiv Contents
Chapter 7 IP Addressing 189
IP Terminology 190The Hierarchical IP Addressing Scheme 191
Internet Protocol Version 6 (IPv6) 200Why Do We Need IPv6? 200The Benefits of and Uses for IPv6 201IPv6 Addressing and Expressions 202Shortened Expression 203Address Types 203Special Addresses 204
Chapter 8 IP Subnetting, Troubleshooting IP, and Introduction to NAT 211
Subnetting Basics 212How to Create Subnets 213Subnet Masks 214Classless Inter-Domain Routing (CIDR) 215Subnetting Class C Addresses 217Subnetting Class B Addresses 226
Troubleshooting IP Addressing 234Determining IP Address Problems 237
Introduction to Network Address Translation (NAT) 241Types of Network Address Translation 243NAT Names 243How NAT Works 244
Routing Basics 254The IP Routing Process 257Testing Your IP Routing Understanding 263Static and Dynamic Routing 264Summary 267Exam Essentials 267Written Lab 267Review Questions 269
Chapter 10 Routing Protocols 273
Routing Protocol Basics 274Administrative Distances 275Classes of Routing Protocols 277
Distance Vector Routing Protocols 278Routing Information Protocol (RIP) 279RIP Version 2 (RIPv2) 280VLSM and Discontiguous Networks 280EIGRP 282Border Gateway Protocol (BGP) 285
Link State Routing Protocols 286Open Shortest Path First (OSPF) 287Intermediate System-to-Intermediate System (IS-IS) 289
Installing a Wireless Network 351Ad Hoc Mode: Independent Basic Service Set 351Infrastructure Mode: Basic Service Set 352Signal Degradation 354Installing and Configuring Hardware 355
Wireless Security 362Open Access 363Service Set Identifiers, Wired Equivalent Privacy,
and Media Access Control Address Authentication 364Remote Authentication Dial In User Service 365
Recognizing Security Threats 414Denial of Service 415Viruses 417Worms 421Buffer Overflow 421Wireless Threats 421Attackers and Their Tools 424Social Engineering (Phishing) 427
Policies and Procedures 430Security Policies 431Security Training 436Patches and Upgrades 437Updating Antivirus Components 439Fixing an Infected Computer 441
Narrowing Down the Problem 598Are There Any Cabling Issues? Did You Check
the Super Simple Stuff? 599Is Hardware or Software Causing the Problem? 603Is It a Workstation or a Server Problem? 604Which Segments of the Network Are Affected? 604Is It Bad Cabling? 604
Troubleshooting Steps 609Step 1: Identify the Problem 610Step 2: Establish a Theory of Probable Cause 613Step 3: Test the Theory to Determine Cause 616Step 4: Establish a Plan of Action to Resolve the
Problem and Identify Potential Effects 618Step 5: Implement the Solution or Escalate as Necessary 620Step 6: Verify Full System Functionality and
If Applicable Implement Preventative Measures 622Step 7: Document Findings, Actions, and Outcomes 623
Troubleshooting Tips 623Don’t Overlook the Small Stuff 624Prioritize Your Problems 624Check the Software Configuration 625Don’t Overlook Physical Conditions 625Don’t Overlook Cable Problems 626Check for Viruses 626
Chapter 20 Management, Monitoring, and Optimization 635
Managing Network Documentation 638Using SNMP 638Schematics and Diagrams 639Baselines 645Policies, Procedures, and Regulations 647
Monitoring the Network and Optimizing Its Performance 649Network Monitoring and Logging 650Reasons to Optimize Your Network’s Performance 652How to Optimize Performance 654Virtual Networking 658
Chapter 1: Introduction to Networks 670Chapter 2: The Open Systems Interconnection Specifications 672Chapter 3: Networking Topologies, Connectors, and
Wiring Standards 673Chapter 4: The Current Ethernet Specifications 675Chapter 5: Networking Devices 676Chapter 6: Introduction to the Internet Protocol 677Chapter 7: IP Addressing 679Chapter 8: IP Subnetting, Troubleshooting IP, and
Introduction to NAT 681Chapter 9: Introduction to IP Routing 683Chapter 10: Routing Protocols 684Chapter 11: Switching and Virtual LANs 686Chapter 12: Wireless Networking 688Chapter 13: Authentication and Access Control 689Chapter 14: Network Threats and Mitigation 691Chapter 15: Physical and Hardware Security 692Chapter 16: Wide Area Networks 694Chapter 17: Troubleshooting Tools 695Chapter 18: Software and Hardware Tools 697Chapter 19: Network Troubleshooting 699Chapter 20: Management, Monitoring, and Optimization 700
Appendix B Answers to Written Labs 703
Chapter 1: Introduction to Networks 704Chapter 2: The Open Systems Interconnection Specifications 704Chapter 3: Networking Topologies, Connectors, and
Wiring Standards 705
137550ftoc.indd 22 12/22/11 5:54 AM
Contents xxiii
Chapter 4: The Current Ethernet Specifications 705Chapter 5: Networking Devices 708Chapter 6: Introduction to the Internet Protocol 708Chapter 7: IP Addressing 709Chapter 8: IP Subnetting, Troubleshooting IP, and
Introduction to NAT 710Chapter 9: Introduction to IP Routing 710Chapter 10: Routing Protocols 711Chapter 11: Switching and Virtual LANs 711Chapter 12: Wireless Networking 712Chapter 13: Authentication and Access Control 712Chapter 14: Network Threats and Mitigation 712Chapter 15: Physical and Hardware Security 713Chapter 16: Wide Area Networks 713Chapter 17: Troubleshooting Tools 714Chapter 18: Software and Hardware Tools 714Chapter 19: Network Troubleshooting 715Chapter 20: Management, Monitoring, and Optimization 715
Appendix C Subnetting Class A 717
Subnetting Practice Examples: Class A Addresses 718Practice Example #1A: 255.255.0.0 (/16) 719Practice Example #2A: 255.255.240.0 (/20) 719Practice Example #3A: 255.255.255.192 (/26) 720
Subnetting in Your Head: Class A Addresses 720Written Lab 1 721Written Lab 2 722Answers to Written Lab 1 722Answers to Written Lab 2 723
Appendix D About the Additional Study Tools 725
Additional Study Tools 726Sybex Test Engine 726Electronic Flashcards 726PDF of Glossary of Terms 726Adobe Reader 726
System Requirements 727Using the Study Tools 727Troubleshooting 727