Cantitate/Preț
Produs

CompTIA Network+ (N10-004) Cert Guide

Autor Mike Harwood
en Limba Engleză Mixed media product – 14 aug 2010
Learn, prepare, and practice for exam success
 
  • Master every topic on the newest 2010 Network+ exam.
  • Assess your knowledge and focus your learning.
  • Get the practical workplace knowledge you need!
 
Start-to-finish Network+ preparation from top network administrator, consultant, and best-selling Network+ author Mike Harwood!
 
Master every Network+ topic!
  • Networking components, devices, media, and connectors
  • TCP/IP protocols, addressing, and routing
  • Ethernet networking standards
  • Wireless networks
  • Wide area networks
  • The OSI Model
  • Network performance and optimization
  • Troubleshooting procedures and best practices
  • Command-line networking tools
  • Network management tools
  • Documentation procedures
  • Network access security
  • Security technologies and malicious software
 
Test your knowledge, build your confidence, and succeed!
  • Packed with visuals to help you learn fast
  • Dozens of troubleshooting scenarios
  • Real-world Network+ prep advice from experts
  • Easy-to-use exam preparation task lists
 
From Mike Harwood, professional network systems manager, consultant, and author of three best-selling books on the Network+ exam
 
CD Features 1 Complete Sample Exam
  • Detailed explanations of correct and incorrect answers
  • Multiple test modes
  • Random questions and order of answers
 
Shelving Category: Network Certification
 
 
 
Citește tot Restrânge

Preț: 28865 lei

Preț vechi: 36080 lei
-20% Nou

Puncte Express: 433

Preț estimativ în valută:
5524 5811$ 4585£

Carte indisponibilă temporar

Doresc să fiu notificat când acest titlu va fi disponibil:

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9780789745590
ISBN-10: 0789745593
Pagini: 688
Dimensiuni: 187 x 232 mm
Greutate: 1.33 kg
Ediția:1
Editura: Pearson Education
Colecția Pearson IT Certification
Locul publicării:Indianapolis, United States

Cuprins

Introduction 3
    How This Book Helps You 4
        Exam Objectives and Chapter Organization 4
    Instructional Features 18
    Network Hardware and Software Requirements 19
    Advice on Taking the Exam 20
Chapter 1 Introduction to Computer Networking 23
    What Is a Network? 24
    LANs and WANs 25
    Peer-to-Peer Versus Client/Server Networks 28
        The Peer-to-Peer Networking Model 28
        Advantages of Peer-to-Peer Networks 29
        Disadvantages of Peer-to-Peer Networks 30
        The Client/Server Networking Model 30
        Servers 31
        Client Computers 32
        Advantages of Client/Server Networking 32
        Disadvantages of Client/Server Networking 32
        Distributed and Centralized Computing 33
    Virtual Private Networks (VPN) 34
        Components of the VPN Connection 35
        VPN Pros and Cons 35
    Virtual Local Area Network (VLAN) 36
        VLAN Membership 37
        Protocol-Based VLANs 37
        Port-Based VLANs 38
        MAC Address-Based VLANs 38
        VLAN Segmentation 39
    LAN Topologies 40
        Physical and Logical Topologies 41
        Bus Topology 41
        Star Topology 42
        Ring Topology 44
        Wired Mesh Topology 45
    Wireless Network Topologies 47
        Infrastructure Wireless Topology 47
        Ad Hoc Wireless Networking 48
        Point-to-Point, Point-to—Multipoint, and Mesh-Wireless Topology 48
        Point-to-Point Networks 48
        Point-to-Multipoint 50
        Mesh Networks 50
        Hybrid Topologies 51
    Summary 52
Chapter 2 Media and Connectors 61
    Networking Media 62
        Media Interference 62
        Data Transmission Rates 63
        Media Length 63
    Secure Transmission and Physical Media 64
        Installation and Repair 65
        Simplex, Half-Duplex, and Full-Duplex 65
        Cable Media 66
        Twisted-Pair Cable 67
        Coaxial Cable 69
        Fiber-Optic Cable 70
    Media Connectors 72
        RJ Connectors 72
        F-Type Connectors and RG-59/RG-6 Cables 73
        RS-232 Standard 74
        Fiber Connectors 74
        IEEE 1394 (FireWire) 75
        Universal Serial Bus Connectors (USB) 76
        Cable Summary 76
    Wiring Standards and Specialized Cable 77
        568A and 568B Wiring Standards 77
        Straight Versus Crossover Cable 78
        Rollover and Loopback Cables 80
    Components of Wiring Distribution 80
        Network Cross Connects 81
        Horizontal Cabling 81
        Vertical Cable 82
        Patch Panels 83
        Type 66 and Type 110 Punchdown Blocks 84
        MDF and IDF 85
        Demarcation Point 86
        Verify Wiring Installation and Termination 87
    Summary 89
Chapter 3 Networking Components and Devices 99
    Common Network Devices 100
        Hubs 100
        Network Switches 102
        Switching Methods 105
        Advanced Switch Features 105
        Power over Ethernet (PoE) 106
        Trunking 106
        Port Authentication 107
        Working with Hubs and Switches 107
        Hub and Switch Ports 107
        Hub and Switch Indicator Lights 109
        Rack-Mount, Stackable, and Freestanding Devices 109
        Managed Hubs and Switches 109
        Repeaters 110
        Bridges 110
        Bridge Implementation Considerations 111
        Types of Bridges 114
        Routers 114
        Gateways 117
        Modems 118
        Modem Connection Speeds 119
        Network Interface Cards (NIC) 120
        Types of Network Interfaces 121
        Installing Network Cards 123
        Media Converters 124
        Firewalls 125
        DHCP Server 126
    Specialized Network Devices 127
        Multilayer and Content Switches 127
        Intrusion Detection and Prevention Systems 128
        Load Balancer 129
        Multifunction Network Devices 129
        DNS Server 129
        Bandwidth Shaper 130
        Proxy Server 131
        CSUs/DSUs 133
        Network Devices Summary 134
    Summary 136
Chapter 4 Understanding the TCP/IP Protocol Suite 145
    A Brief Introduction to Protocols 146
        Protocols from the Sending Device 147
        Protocols on the Receiving Device 147
    Transmission Control Protocol/Internet Protocol (TCP/IP) Protocol Suite 148
        Internet Protocol (IP) 149
        Transmission Control Protocol (TCP) 149
        User Datagram Protocol (UDP) 150
        File Transfer Protocol (FTP) 151
        Secure Shell (SSH) 152
        Secure File Transfer Protocol (SFTP) 152
        Trivial File Transfer Protocol (TFTP) 153
        Simple Mail Transfer Protocol (SMTP) 153
        Hypertext Transfer Protocol (HTTP) 154
        Hypertext Transfer Protocol Secure (HTTPS) 154
        Post Office Protocol Version 3/Internet Message Access Protocol Version 4 (POP3/IMAP4) 155
        Telnet 155
        Internet Control Message Protocol (ICMP) 156
        Address Resolution Protocol (ARP) and Reverse Address Resolution Protocol
        (RARP) 156
        Network Time Protocol (NTP) 157
        Network News Transfer Protocol (NNTP) 157
        Secure Copy Protocol (SCP) 158
        Lightweight Directory Access Protocol (LDAP) 158
        Internet Group Management Protocol (IGMP) 158
        Domain Name System (DNS) 159
        The DNS Namespace 160
        Types of DNS Entries 162
        DNS in a Practical Implementation 163
        Simple Network Management Protocol (SNMP) 163
        Components of SNMP 164
        SNMP Management Systems 164
        SNMP Agents 165
        Management Information Bases (MIB) 165
        SNMP Communities 166
        Dynamic Host Configuration Protocol (DHCP) 167
        Transport Layer Security 170
        Session Initiation Protocol 170
        Real-time Transport Protocol (RTP) 171
        TCP/IP Protocol Suite Summary 171
    Identifying Common TCP/IP Port Numbers 173
    Summary 175
Chapter 5 TCP/IP Addressing and Routing 185
    Identifying MAC Addresses 186
    Understanding IPv4 Addressing Fundamentals 187
        General IP Addressing Principles 188
        IPv4 Addressing 188
        IPv4 Address Types 190
        Distributing IPv4 Addresses to the Network 191
        Static Addressing 191
        Dynamic Addressing 191
        Bootstrap Protocol (BOOTP) 191
        APIPA and IPv4 192
        Broadcast Addresses and “This Network” 193
        Classless Interdomain Routing (CIDR) 193
        Default Gateways 194
    Understanding Subnetting 195
    Public and Private IP Address Schemes 198
        Private Address Ranges 199
        Practical Uses of Public and Private IP Addressing 200
    IPv6 Addressing 201
        Identifying IPv6 Addresses 201
        IPv6 Address Types 202
    Differentiating Between Routable and Routing Protocols 204
        Routable Protocols 204
        Routing Protocols 205
        Distance-Vector Routing Protocols 206
        Link-State Routing Protocols 208
    NAT, PAT, and SNAT 209
    Summary 211
Chapter 6 Ethernet Networking Standards 221
    Characteristics Specified in the IEEE 802 Standards 223
        Speed 223
        Access Methods 223
        Carrier Sense Multiple Access/Collision Detection 224
        CSMA/CA 225
        Token Passing 226
        Bonding 226
        Topology 226
        Media 227
    Differentiating Between Baseband and Broadband Signaling 227
        Baseband 227
        Broadband 227
    Ethernet Standards 228
        10Base2 228
        10BaseT 229
        10BaseFL 230
        Fast Ethernet 230
        100BaseTX 231
        100BaseT4 231
        100BaseFX 231
        Fast Ethernet Comparison 231
        Gigabit Ethernet 232
        1000BaseX 232
        1000BaseT 233
        10Gigabit Ethernet 234
        10GBaseSR/SW 234
        10GBaseLR/LW 235
        10GBaseER/EW 235
        10GBaseT 236
    Summary 236
Chapter 7 Wireless Networking 245
    Understanding Wireless Devices 246
        Wireless Access Point 246
        Wireless Antennas 248
        Antenna Ratings 249
        Types of Wireless Antennas 249
    802.11 Wireless Standards 251
        The Magic Behind 802.11n 254
        Wireless Radio Channels 254
    Spread Spectrum Technology 257
        Frequency-Hopping Spread Spectrum (FHSS) Technology 257
        Direct-Sequence Spread Spectrum (DSSS) Technology 258
        Orthogonal Frequency Division Multiplexing 258
        FHSS, DSSS, OFDM, and 802.11 Standards 258
    Beacon Management Frame 259
    Configuring and Troubleshooting the Wireless Connection 260
        Configuring Communications Between Wireless Devices 262
        Troubleshooting Wireless Signals 264
        Site Surveys 265
        Troubleshooting AP Coverage 266
        Wireless Troubleshooting Checklist 267
    Securing Wireless Networks 268
        Defining Access Control, Authentication, Authorization, and Encryption 268
        Wireless Authentication and Encryption Methods 269
        Wired Equivalent Privacy (WEP) 270
        Wi-Fi Protected Access (WPA) 270
        Temporal Key Integrity Protocol (TKIP) 271
        802.1X 272
        Securing the Access Point 273
    Summary 273
Chapter 8 Wide Area Networking 283
    Public and Private Networks 284
        Public Networks 284
        Public Switched Telephone Network (PSTN) 284
        The Internet 285
        Advantages and Disadvantages of Public Networks 286
        Private Networks 286
    Switching Methods 287
        Packet Switching 288
        Virtual-Circuit Packet Switching 289
        Datagram Packet Switching 289
        Circuit Switching 290
        Message Switching 290
        Comparing Switching Methods 291
    WAN Technologies 292
        X.25 293
        Frame Relay 293
        T-Carrier Lines 295
        T1/E1/J1 Lines 295
        T3 Lines 297
        SONET/OCx Levels 297
        Asynchronous Transfer Mode (ATM) 298
        Integrated Services Digital Network (ISDN) 299
        Basic Rate Interface (BRI) 301
        Primary Rate Interface (PRI) 301
        Comparing BRI and PRI ISDN 301
        WAN Technology Summary 301
    Internet Access Technologies 302
        POTS Internet Access 303
        POTS Troubleshooting Procedures 303
        Troubleshooting Poor Connection Speeds 305
        Modem-Specific Troubleshooting 306
        xDSL 307
        Cable Internet Access 310
        Satellite Internet Access 313
    Wireless Wide Area Networking 315
    Summary 316
Chapter 9 OSI Model 325
    OSI Reference Model 101 326
        Layer 1: The Physical Layer 328
        Layer 2: The Data Link Layer 329
        Layer 3: The Network Layer 329
        Switching Methods 330
        Network Layer Addressing 331
        Layer 4: The Transport Layer 331
        Connection-Oriented Protocols 332
        Connectionless Protocols 332
        Flow Control 333
        Layer 5: The Session Layer 333
        Layer 6: The Presentation Layer 333
        Layer 7: The Application Layer 334
        OSI Model Summary 334
The Layers at Which Devices Operate 335
        Hubs 336
        Switches 336
        Bridges 336
        Routers 336
        NICs 336
        Wireless Access Points (APs) 337
        Summary of the Layers at Which Devices Operate 337
    TCP/IP Protocol Suite Summary 337
    Summary 340
Chapter 10 Network Performance and Optimization 349
    Understanding Uptime 350
    Understanding the Risks 352
        RAID 353
        RAID 0 354
        Advantages of RAID 0 354
        Disadvantages of RAID 0 355
        Recovering from a Failed RAID 0 Array 355
        RAID 1 355
        Advantages of RAID 1 357
        Disadvantages of RAID 1 357
        Recovering from a Failed RAID 1 Array 358
        RAID 5 358
        Advantages of RAID 5 358
        Disadvantages of RAID 5 359
        Recovering from a RAID 5 Array Failure 359
        RAID 10 360
        Choosing a RAID Level 361
        Hardware and Software RAID 362
        Other Fault-Tolerance Measures 363
        Link Redundancy 363
        Using Uninterruptible Power Supplies 364
        Why Use a UPS? 365
        Power Threats 365
        Using Redundant Power Supplies 366
        Server and Services Fault Tolerance 366
        Using Standby Servers 366
        Server Clustering 367
        Preparing for Memory Failures 368
        Managing Processor Failures 368
    Disaster Recovery 368
        Backup Methods 368
        Full Backups 369
        Incremental Backups 370
        Differential Backups 370
        A Comparison of Backup Methods 371
        Backup Rotation Schedules 371
        Offsite Storage 372
        Backup Best Practices 373
    Hot and Cold Spares 374
        Hot Spare and Hot Swapping 374
        Cold Spare and Cold Swapping 375
        Recovery Sites 375
        Cold Site 375
        Hot Site 376
        Warm Site 376
    Network Optimization Strategies 377
        QoS 377
        Latency-Sensitive High-Bandwidth Applications 378
        Voice over Internet Protocol (VoIP) 378
        Video Applications 379
        Traffic Shaping 379
        Load Balancing 381
        Caching Engines 381
    Summary 382
Chapter 11 Troubleshooting Procedures and Best Practices 393
    The Art of Troubleshooting 394
        Troubleshooting Servers and Workstations 394
        General Troubleshooting Considerations 395
        Troubleshooting Methods and Procedures 396
        Step 1: Information Gathering–Identify Symptoms and Problems 397
        Information from the Computer 397
        Information from the User 398
        Observation Techniques 399
        Effective Questioning Techniques 399
        Step 2: Identify the Affected Areas of the Network 399
        Step 3: Determine if Anything Has Changed 400
        Changes to the Network 400
        Changes to the Server 401
        Changes to the Workstation 402
        Step 4: Establish the Most Probable Cause 402
        Step 5: Determine if Escalation Is Necessary 403
        Step 6: Create an Action Plan and Solution Identifying Potential Effects 403
        Step 7: Implement and Test the Solution 404
        Step 8: Identify the Results and Effects of the Solution 405
        Step 9: Document the Solution and the Entire Process 406
    Troubleshooting the Network 407
        Troubleshooting Wiring 407
        Where the Cable Is Used 408
        Wiring Issues 409
        Crosstalk 409
        Near-End Crosstalk (NEXT) 409
        Far-End Crosstalk (FEXT) 409
        Electromagnetic interference (EMI) 409
        Attenuation 410
        Open Impedance Mismatch (Echo) 410
        Shorts 410
        Managing Collisions 410
        Troubleshooting Infrastructure Hardware 411
        Configuring and Troubleshooting Client Connectivity 413
        Verifying Client TCP/IP Configurations 413
        Setting Port Speeds and Duplex 415
        Troubleshooting Incorrect VLANs 416
    Identifying Issues That Might Need Escalation 417
    Troubleshooting Wireless Issues 418
        Troubleshooting Wireless Signals 418
        Troubleshooting Wireless Configurations 420
    Summary 421
Chapter 12 Command-Line Networking Tools 431
    Common Networking Utilities 432
        The ping Utility 432
        Switches for ping 434
        Troubleshooting Steps with ping 435
        Ping Error Messages 436
        The Destination Host Unreachable Message 437
        The Unknown Host Message 438
        The traceroute Utility 439
        Reviewing tracert Command Printouts 441
        The traceroute Command 444
        The mtr Utility 445
        The arp Utility 445
        The ARP Cache 445
        Switches for arp 446
        The arp Command Printout 447
        The arp ping Utility 447
        The netstat Utility 448
        The netstat Command Printouts 450
        netstat -e 450
        netstat -a 451
        netstat -r 452
        netstat -s 453
        The nbtstat Utility 454
        The ipconfig and ifconfig Utilities 456
        The ipconfig Utility 457
        The ipconfig Command Printouts 458
        The ifconfig Command Printout 460
        The nslookup and dig Utilities 461
        The nslookup Utility 461
        The nslookup Command Printout 463
        The dig Utility 464
        The dig Command Printout 465
        The host Command 466
        The route Utility 466
    Summary 468
Chapter 13 Network Management Tools and Documentation Procedures 479
    Documentation Management 480
        Wiring Schematics 481
        Physical and Logical Network Diagrams 484
        Physical Network Documentation 484
        Logical Network Documentation 485
        Baselines 487
        Policies, Procedures, Configurations, and Regulations 488
        Policy Documentation 488
        Network Procedure Documentation 489
        Configuration Documentation 490
        Regulations 491
    Monitoring the Network to Identify Performance 492
        Throughput Testing 493
        Port Scanners 495
        Network Testing 498
        Performance Testing 498
        Load Testing 498
        Stress Testing 499
        Logging 499
        Security Logs 500
        Application Logs 501
        System Logs 502
        History Logs 502
        Log Management 503
Networking Tools 503
        Wire Crimpers 504
        Strippers and Snips 504
        Punchdown Tools 505
        Cable Certifiers 505
        Voltage Event Recorders 506
        Temperature Monitors 506
        Toner Probes 508
        Protocol Analyzer 509
        Media/Cable Testers 509
        Media Testers 510
        TDR 510
        OTDR 510
        Multimeter 511
        Network Qualification Tester 512
        Butt Set 512
        Wireless Detector 512
    Summary 513
Chapter 14 Network Access Security 525
    Understanding Network Security Threats 526
    Security Responsibilities of a Network Administrator 527
    Physical and Logical Security 528
        Physical Security 528
        Network Hardware and Server Room Access 529
        Lock and Key 529
        Swipe Card and PIN Access 529
        Biometrics 530
        Hardware Room Best Practices 531
        Logical Security 532
    Firewalls 532
        The Purpose and Function of a Firewall 534
        Stateful and Stateless Firewalls 536
        Firewall Methods 536
        Network Layer Firewalls 536
        Circuit-Level Firewalls 537
        Application-Layer Firewalls 537
        Demilitarized Zones 538
    Intrusion Detection and Intrusion Prevention Systems 539
    Network Access Security 539
        Access Control Lists 540
        Access Control and MAC Filtering 540
        TCP/IP Filtering 540
        Port Blocking/Filtering 541
    Remote Access Protocols and Services 542
        Routing and Remote Access Service (RRAS) 542
        SLIP 543
        PPP 543
        PPPoE 544
    Tunneling and Encryption 545
        SSL VPNs 546
        VPN Concentrators 546
        Point-to-Point Tunneling Protocol (PPTP) 547
        Layer Two Tunneling Protocol (L2TP) 548
        Advantages of L2TP and PPTP 548
    Inside IPsec 548
        Authentication Headers 549
        Encapsulating Security Payloads 549
        IPsec Transmission Modes 550
    Remote Control Protocols 550
    Summary 551
Chapter 15 Security Technologies and Malicious Software 561
    Authentication, Authorization, and Accounting (AAA) 562
        Authentication 562
        Password Policies 562
        Password Strength 563
        Multifactor Authentication 565
        Authentication Tokens 565
        Biometrics 565
        Multifactor Authentication/Two-Factor Authentication 566
        Authorization 566
        Accountability 567
    RADIUS and TACACS+ 568
        RADIUS 568
        TACACS+ 570
        Understanding Cryptography Keys 570
        Kerberos Authentication 572
    Public Key Infrastructure 573
        Components of a PKI 574
        Certificates 575
        Certificate Stores 576
        Trusts 576
        Certificate Authorities (CAs) 577
        Public CAs 577
        Private CAs 577
    Network Access Control 578
        Mandatory Access Control (MAC) 578
        Discretionary Access Control (DAC) 579
        Rule-Based Access Control (RBAC) 579
        Role-Based Access Control (RBAC) 579
    Remote Authentication Protocols 580
    Using Secure Protocols 581
    Malicious Software 582
        Malware Distribution 583
        Malware Payloads 584
        More About Viruses 585
        More About Trojan Horses and Worms 586
        Comparing Malware Types 586
        Types of Attacks 587
        Denial of Service and Distributed Denial of Service Attacks 587
        Other Common Attacks 589
        An Ounce of Prevention 590
    Maintaining Operating System Software 592
        Reasons to Use a Service Pack 593
        When to Use a Service Pack 593
        How to Apply a Service Pack 594
        Server Patches 595
    Summary 596
Appendix A Answers to the Review Questions 605
Index 639
Elements on the CD-ROM:
Appendix B Memory Tables
Appendix C Memory Tables Answer Key
Glossary
TOC, 9780789745590, 7/8/10
 

Notă biografică

Mike Harwood (MCSE, A+, Network+, Server+, Linux+) has more than 14 years experience in information technology and related fields. He has held a number of roles in the IT field including network administrator, instructor, technical writer, website designer, consultant, and online marketing strategist. Mike has been a regular on-air technology contributor for CBC radio and has coauthored numerous computer books, including the Network+ Exam Cram published by Pearson.

Caracteristici

  • Contains clear explanations, quizzes, memory tables, study strategies, tips, notes, cautions, key terms, troubleshooting scenarios, CD-based exam questions, last-minute review tearsheet, and more
  • Exclusive "Do I Know This Already?" quizzes help readers gauge knowledge, focus study, and save time
  • The ideal core study resource for 4,000+ new candidates who take the exam every month
  • Instructor's manual available for professors
  • This book will also be available as a bundled package with a MyIT Certification lab, an online product that provides students with the most robust online studie environment available, and provides instuctors with unparalleled assessment tools.