| |
| |
Acknowledgments | |
| |
| |
Preface | |
| |
| |
| |
Introduction | |
| |
| |
Who Needs Net+? I Just Want to Learn About Networks! | |
| |
| |
What Is Network+ Certification? | |
| |
| |
What Is CompTIA? | |
| |
| |
The Current Network+ Certification Exam Release | |
| |
| |
How Do I Become Network+ Certified? | |
| |
| |
What Are the Tests Like? | |
| |
| |
How Do I Take the Tests? | |
| |
| |
How Much Does the Test Cost? | |
| |
| |
How to Pass the Network+ Exam | |
| |
| |
Obligate Yourself | |
| |
| |
Set Aside the Right Amount of Study Time | |
| |
| |
Studying for the Test | |
| |
| |
| |
Defining Networking | |
| |
| |
The Birth of Networking | |
| |
| |
Pre-Networking Issues | |
| |
| |
ARPANET | |
| |
| |
The Goal of Networking | |
| |
| |
What to Share? | |
| |
| |
How Do We Share? | |
| |
| |
Servers and Clients | |
| |
| |
Making Shared Resources Usable | |
| |
| |
Sharing a Resource | |
| |
| |
Accessing a Shared Resource | |
| |
| |
The Goal of Networking Redux | |
| |
| |
Chapter 2 Review | |
| |
| |
| |
Building a Network with OSI | |
| |
| |
Welcome to MHTechEd! | |
| |
| |
Let's Get Physical | |
| |
| |
The NIC | |
| |
| |
The Two Aspects of Hardware | |
| |
| |
Beyond the Single Wire--Network Software | |
| |
| |
There's Frames in Them Thar Frames! | |
| |
| |
Assembly and Disassembly | |
| |
| |
Talking on a Network | |
| |
| |
Standardized Formats | |
| |
| |
Network Applications | |
| |
| |
How Dana Gets Her Document | |
| |
| |
The OSI Seven-Layer Model | |
| |
| |
Biography of a Model | |
| |
| |
The Seven Layers | |
| |
| |
Chapter 3 Review | |
| |
| |
| |
Hardware Concepts | |
| |
| |
Topology | |
| |
| |
Hybrid Topologies | |
| |
| |
Cabling | |
| |
| |
Coax | |
| |
| |
Twisted Pair | |
| |
| |
Fiber-Optic | |
| |
| |
Networking Industry Standards--IEEE | |
| |
| |
Chapter 4 Review | |
| |
| |
| |
Ethernet Basics | |
| |
| |
Information in a Teeming Sea of Proto-Geeks | |
| |
| |
How Ethernet Works | |
| |
| |
Physical Bus | |
| |
| |
Organizing the Data: Ethernet Frames | |
| |
| |
CSMA/CD | |
| |
| |
Termination | |
| |
| |
Cable Breaks | |
| |
| |
Ethernet Cabling Systems | |
| |
| |
10Base5 | |
| |
| |
10Base2 | |
| |
| |
Extending the Network: Repeaters and Bridges | |
| |
| |
Repeaters | |
| |
| |
Bridges | |
| |
| |
Chapter 5 Review | |
| |
| |
| |
Modern Ethernet | |
| |
| |
10BaseT | |
| |
| |
10BaseT Topology | |
| |
| |
UTP | |
| |
| |
10BaseT Limits and Specifications | |
| |
| |
10BaseFL | |
| |
| |
Connecting Ethernet Segments | |
| |
| |
How Big Can an Ethernet Network Be? The 5-4-3 Rule | |
| |
| |
A Useful Approximation | |
| |
| |
High-Speed Ethernet | |
| |
| |
100Base Ethernet | |
| |
| |
Gigabit Ethernet | |
| |
| |
Switched Ethernet | |
| |
| |
Full-Duplex Ethernet | |
| |
| |
Chapter 6 Review | |
| |
| |
| |
Non-Ethernet Networks | |
| |
| |
Token Ring | |
| |
| |
Logical Ring Topology | |
| |
| |
Physical Star | |
| |
| |
Token Ring vs. Ethernet | |
| |
| |
Gone But Not Forgotten--ARCnet and LocalTalk | |
| |
| |
ARCnet | |
| |
| |
LocalTalk | |
| |
| |
LAN to WAN--FDDI and ATM | |
| |
| |
FDDI | |
| |
| |
ATM | |
| |
| |
Don't Be an Ethernet Snob! | |
| |
| |
Chapter 7 Review | |
| |
| |
| |
Installing a Physical Network | |
| |
| |
Structured Cabling | |
| |
| |
Cable Basics--A Star Is Born | |
| |
| |
The Basic Star | |
| |
| |
Structured Cable Network Components | |
| |
| |
Planning the Installation | |
| |
| |
Installing the Cable | |
| |
| |
Making Connections | |
| |
| |
Labeling the Cable | |
| |
| |
Testing the Cable Runs | |
| |
| |
Getting Physical | |
| |
| |
Beyond the Basic Star | |
| |
| |
Switched Networks | |
| |
| |
Multispeed Networks | |
| |
| |
Multiple Floors, Multiple Buildings | |
| |
| |
Backbones and Building Entrances | |
| |
| |
Complexity Is Cool! | |
| |
| |
NICs | |
| |
| |
Ethernet NICs | |
| |
| |
Token Ring NICs | |
| |
| |
Installing NICs | |
| |
| |
Lights | |
| |
| |
Direct Cable Connections | |
| |
| |
Diagnostics and Repair of Physical Cabling | |
| |
| |
Diagnosing Physical Problems | |
| |
| |
Check Your Lights | |
| |
| |
Check the NIC | |
| |
| |
Cable Testing | |
| |
| |
Toners | |
| |
| |
Chapter 8 Review | |
| |
| |
| |
Wireless Networking | |
| |
| |
Wireless Networking Basics | |
| |
| |
Wireless Networking Hardware | |
| |
| |
Wireless Networking Software | |
| |
| |
Wireless Network Modes | |
| |
| |
Wireless Networking Security | |
| |
| |
Wireless Networking Speed | |
| |
| |
Wireless Networking Range | |
| |
| |
Wireless Network Broadcasting Frequencies | |
| |
| |
Wireless Networking Media Access Methods | |
| |
| |
Wireless Networking Standards | |
| |
| |
IEEE 802.11-Based Wireless Networking | |
| |
| |
Bluetooth | |
| |
| |
Configuring Wireless Networking | |
| |
| |
Wi-Fi and HomeRF | |
| |
| |
Bluetooth | |
| |
| |
Troubleshooting Wireless Networks | |
| |
| |
Troubleshooting Wi-Fi and HomeRF Wireless Networks | |
| |
| |
Troubleshooting Bluetooth | |
| |
| |
Chapter 9 Review | |
| |
| |
| |
Protocols | |
| |
| |
Network Protocols | |
| |
| |
Protocol Stacks | |
| |
| |
Protocols by Layer | |
| |
| |
Implementing Protocols | |
| |
| |
Multiple Protocols | |
| |
| |
Binding | |
| |
| |
Installation | |
| |
| |
Protocol Concepts | |
| |
| |
NetBIOS/NetBEUI | |
| |
| |
In the Early Days | |
| |
| |
NetBIOS at Session | |
| |
| |
NetBEUI at Transport | |
| |
| |
NetBIOS/NetBEUI Naming Weaknesses | |
| |
| |
Installing NetBIOS/NetBEUI | |
| |
| |
NetBIOS/NetBEUI--Fading Away | |
| |
| |
IPX/SPX | |
| |
| |
NCP/SAP at Session | |
| |
| |
IPX/SPX at Transport and Network | |
| |
| |
Installing IPX/SPX | |
| |
| |
Splitting Protocols I: NetBIOS over IPX/SPX | |
| |
| |
TCP/IP | |
| |
| |
Applications | |
| |
| |
TCP at Session | |
| |
| |
TCP as Transport | |
| |
| |
IP at Network | |
| |
| |
Installing TCP/IP | |
| |
| |
Splitting Protocols II: NetBIOS over TCP/IP | |
| |
| |
Also-Ran Protocols | |
| |
| |
AppleTalk | |
| |
| |
DLC | |
| |
| |
Chapter 10 Review | |
| |
| |
| |
TCP/IP | |
| |
| |
IP Address Basics | |
| |
| |
IP Address Format | |
| |
| |
Converting IP Addresses | |
| |
| |
Local vs. Remote | |
| |
| |
ARP | |
| |
| |
Gateways | |
| |
| |
Subnet Masks and Subnetting | |
| |
| |
Network IDs | |
| |
| |
Subnet Mask | |
| |
| |
Class Licenses | |
| |
| |
Classless Subnetting | |
| |
| |
Special IP Addresses | |
| |
| |
Other Critical TCP/IP Settings | |
| |
| |
DNS | |
| |
| |
DHCP | |
| |
| |
WINS | |
| |
| |
TCP/UDP/ICMP Ports | |
| |
| |
TCP | |
| |
| |
UDP | |
| |
| |
ICMP | |
| |
| |
IPv6 | |
| |
| |
Chapter 11 Review | |
| |
| |
| |
Network Operating Systems | |
| |
| |
Categorizing Operating Systems | |
| |
| |
Client/Server vs. Peer-to-Peer | |
| |
| |
Security | |
| |
| |
Security Models | |
| |
| |
The Major Network Operating Systems | |
| |
| |
Microsoft Windows | |
| |
| |
Windows 9x | |
| |
| |
Windows NT | |
| |
| |
Windows 2000 | |
| |
| |
Windows XP | |
| |
| |
Windows Server 2003 | |
| |
| |
User Profiles | |
| |
| |
Novell NetWare | |
| |
| |
UNIX and Linux | |
| |
| |
Mac OS | |
| |
| |
Creating Servers and Clients | |
| |
| |
Network Interface | |
| |
| |
Protocol | |
| |
| |
Naming | |
| |
| |
Server or Client | |
| |
| |
Super User Accounts | |
| |
| |
Groups | |
| |
| |
Passwords | |
| |
| |
Chapter 12 Review | |
| |
| |
| |
Sharing Resources | |
| |
| |
Resource Naming | |
| |
| |
UNC | |
| |
| |
URL | |
| |
| |
Permissions | |
| |
| |
Dueling Security Models | |
| |
| |
Windows 9x Permissions | |
| |
| |
Windows NT Permissions | |
| |
| |
Windows 2000/2003 Permissions | |
| |
| |
Windows XP Permissions | |
| |
| |
NetWare 3.x Rights | |
| |
| |
NetWare 4.x/5.x/6.x | |
| |
| |
UNIX/Linux | |
| |
| |
Sharing Is Sharing | |
| |
| |
Sharing Resources | |
| |
| |
Sharing Folders | |
| |
| |
Sharing Printers | |
| |
| |
Accessing Shared Resources | |
| |
| |
Accessing Files in Windows | |
| |
| |
Accessing Shared Printers in Windows | |
| |
| |
Troubleshooting Shared Resources | |
| |
| |
Access Errors | |
| |
| |
Chapter 13 Review | |
| |
| |
| |
Going Large with TCP/IP | |
| |
| |
DNS | |
| |
| |
DNS in Detail | |
| |
| |
The DNS Cache | |
| |
| |
DNS Servers | |
| |
| |
Troubleshooting DNS | |
| |
| |
DHCP | |
| |
| |
DHCP in Detail | |
| |
| |
DHCP Servers | |
| |
| |
Troubleshooting DHCP | |
| |
| |
Release or Renew? | |
| |
| |
WINS | |
| |
| |
WINS in Detail | |
| |
| |
Configuring WINS Clients | |
| |
| |
Troubleshooting WINS | |
| |
| |
Diagnosing TCP/IP Networks | |
| |
| |
Chapter 14 Review | |
| |
| |
| |
TCP/IP and the Internet | |
| |
| |
Real-World Routers | |
| |
| |
Static Routes | |
| |
| |
SNMP | |
| |
| |
Dynamic Routing | |
| |
| |
Connecting to the Internet | |
| |
| |
NAT | |
| |
| |
Proxy Server | |
| |
| |
So What's the Big Difference Between NAT and a Proxy, Anyway? | |
| |
| |
TCP/IP Applications | |
| |
| |
The Web | |
| |
| |
E-mail | |
| |
| |
FTP | |
| |
| |
Telnet | |
| |
| |
Chapter 15 Review | |
| |
| |
| |
Remote Connectivity | |
| |
| |
SOHO LAN Connections | |
| |
| |
Telephone Options | |
| |
| |
Public Switched Telephone Network | |
| |
| |
ISDN | |
| |
| |
DSL | |
| |
| |
Cable Modems | |
| |
| |
Satellite | |
| |
| |
Which Connection? | |
| |
| |
WAN Connections | |
| |
| |
Copper Carriers: T1 and T3 | |
| |
| |
Fiber Carriers: SONET/SDH and OC | |
| |
| |
Packet Switching | |
| |
| |
Using Remote Access | |
| |
| |
Dial-Up to the Internet | |
| |
| |
Private Dial-Up | |
| |
| |
VPNs | |
| |
| |
Dedicated Connection | |
| |
| |
Internet Connection Sharing | |
| |
| |
Troubleshooting Remote Access | |
| |
| |
Is the Physical Remote Connection Running? | |
| |
| |
Is Your Hardware Running? | |
| |
| |
Are You Configured? | |
| |
| |
Is the Server Awake? | |
| |
| |
Chapter 16 Review | |
| |
| |
| |
Protecting Your Network | |
| |
| |
Defining Network Threats | |
| |
| |
Internal Threats | |
| |
| |
External Threats | |
| |
| |
Protecting from Internal Threats | |
| |
| |
Passwords | |
| |
| |
User Account Control | |
| |
| |
Careful Use of Permissions | |
| |
| |
Policies | |
| |
| |
Protecting a Network from External Threats | |
| |
| |
Physical Protection | |
| |
| |
Firewalls | |
| |
| |
Encryption | |
| |
| |
Public Keys and Certificates | |
| |
| |
VLAN | |
| |
| |
Implementing External Network Security | |
| |
| |
Personal Connections | |
| |
| |
SOHO Connections | |
| |
| |
Large Network Connections | |
| |
| |
Chapter 17 Review | |
| |
| |
| |
Interconnecting Network Operating Systems | |
| |
| |
Connecting to Windows | |
| |
| |
Connecting Macintosh to Windows 9x Shared Resources | |
| |
| |
Connecting UNIX/Linux Systems to Windows 9x Systems | |
| |
| |
Connecting to Windows Workstations (NT 2000 XP) | |
| |
| |
Connecting to Windows Server Systems | |
| |
| |
Connecting to NetWare | |
| |
| |
Connecting Windows Systems to NetWare | |
| |
| |
Connecting Macintosh to NetWare | |
| |
| |
Native File Access | |
| |
| |
Connecting to Macintosh | |
| |
| |
Connecting Windows Systems to Macintosh Serving Systems | |
| |
| |
Connecting UNIX/Linux Systems to Macintosh Sharing Systems | |
| |
| |
Connecting to UNIX/Linux | |
| |
| |
Connecting Windows Systems to UNIX/Linux Sharing Systems | |
| |
| |
Connecting Macintosh Systems to UNIX/Linux Sharing Systems | |
| |
| |
When All Else Fails, Terminal Emulate! | |
| |
| |
Chapter 18 Review | |
| |
| |
| |
The Perfect Server | |
| |
| |
Protection of Data--Fault Tolerance | |
| |
| |
RAID | |
| |
| |
NAS | |
| |
| |
SAN | |
| |
| |
Tape Backup | |
| |
| |
Data Redundancy Is the Key | |
| |
| |
Speed | |
| |
| |
Fast NICs | |
| |
| |
Make the Drives Faster | |
| |
| |
It's Not Just Hardware | |
| |
| |
Reliability | |
| |
| |
Good Power | |
| |
| |
The Computer Virus | |
| |
| |
Environment | |
| |
| |
Putting Them All Together | |
| |
| |
Nothing's Perfect | |
| |
| |
Chapter 19 Review | |
| |
| |
| |
Zen and the Art of Network Support | |
| |
| |
Troubleshooting Tools | |
| |
| |
"Touchy" Tools | |
| |
| |
Hardware Tools | |
| |
| |
Software Tools | |
| |
| |
Your Toolbox | |
| |
| |
The Troubleshooting Process | |
| |
| |
Backups | |
| |
| |
Baselines | |
| |
| |
Troubleshooting Model | |
| |
| |
Troubleshooting as Art--Mike's Four-Layer Model | |
| |
| |
Using the Four-Layer Model | |
| |
| |
Troubleshooting Scenarios | |
| |
| |
"I Can't Log In!" | |
| |
| |
"I Can't Get to This Web Site!" | |
| |
| |
"Our Web Server Is Sluggish!" | |
| |
| |
"I Can't See Anything in Network Neighborhood!" | |
| |
| |
Troubleshooting Is Fun! | |
| |
| |
Chapter 20 Review | |
| |
| |
Glossary | |
| |
| |
Index | |