9781418019440

The Complete Guide to Networking and Network+

by
  • ISBN13:

    9781418019440

  • ISBN10:

    1418019445

  • Edition: 2nd
  • Format: Paperback
  • Copyright: 2005-06-09
  • Publisher: Delmar Cengage Learning

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $215.33 Save up to $116.50
  • Rent Book $107.67
    Add to Cart Free Shipping

    TERM
    PRICE
    DUE

Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The Used and Rental copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Summary

Prepare to pass CompTIA's new Network+ Exam! This straightforward, no-nonsense guide to installing, configuring, and troubleshooting computer networks not only prepares readers to pass the certification exam, but serves to provide information on basic computer technology to the networking professional as well. Topics are thoughtfully organized in accordance with CompTIA's test objectives, taking readers through the seven layers of OSI so readers learn how information starts at one computer and ends up at another. From there, hands-on coverage of how networks are set up and configured is provided, which transports readers out of the realm of theory and into the "real world" of networking.

Author Biography

Michael Graves has taught computer hardware courses at Champlain College and The Essex Technical Center in Vermont.

Table of Contents

Preface xvii
Introducing the New Network+ xxii
On Certification and Testing xxiii
About the Exam xxiii
The Test Objectives xxiii
Part 1: An Introduction to Networking
Some Raw Basics of Networking
3(32)
Getting Down to the Basics
3(5)
Why Are We Bothering with a Network?
4(4)
Some Basic Networking Hardware
8(4)
Transceivers
8(1)
Repeaters
8(2)
Hubs
10(1)
Switches
10(1)
Bridges
10(1)
Routers
11(1)
Brouter
11(1)
CSU/DSU
12(1)
The Basic Concepts of Networking
12(17)
Media
13(2)
Network Topologies
15(7)
The Hardware Protocols
22(6)
Networking Standards
28(1)
Chapter Summary
29(6)
Brain Drain
29(1)
The 64K$ Questions
29(4)
Tricky Terminology
33(1)
Acronym Alert
34(1)
Clients and Servers---Who's the Boss?
35(28)
Are We Peer-to-Peer, or Are We Client-Server?
36(4)
Working in Peer-to-Peer
36(2)
Managing the Client-Server Network
38(2)
Network Models
40(7)
The Domain Model
40(5)
Directory Services
45(2)
Network Operating Systems---The Server
47(7)
Linux
49(2)
Microsoft
51(1)
Novell
52(1)
Unix
53(1)
Network Clients
54(2)
Chapter Summary
56(7)
Brain Drain
57(1)
The 64K$ Questions
57(3)
Tricky Terminology
60(2)
Acronym Alert
62(1)
The Highways and Byways of the Network
63(36)
Moving Data over the Medium
64(7)
Reviewing Binary
65(1)
Hexadecimal
66(1)
Do You Want Your Data in Tune or with the Beat?
67(3)
Are You Living in a Full Duplex or a Half Duplex?
70(1)
Bounded Media
71(10)
Twisted Pair
72(3)
Coaxial Cabling
75(3)
Fiber-Optic Cable
78(3)
SC-Connectors
81(1)
Unbounded Media
81(9)
Optical Networking
83(3)
Networking over the Radio
86(3)
Networking over Microwaves
89(1)
Chapter Summary
90(9)
Brain Drain
90(1)
The 64K$ Questions
90(4)
Tricky Terminology
94(1)
Acronym Alert
94(5)
Part 2: The World of OSI
Welcome to OSI
99(30)
The Seven Layers of OSI
100(5)
Movement of Data Between Layers
103(1)
Protocol Data Units
104(1)
The Layers Defined
105(10)
The Application Layer
106(1)
The Presentation Layer
107(1)
The Session Layer
108(2)
The Transport Layer
110(2)
The Network Layer
112(1)
The Data Link Layer
112(3)
The Physical Layer
115(1)
Putting It All Together
115(5)
Where Do the 802 Standards Fit In?
120(2)
Chapter Summary
122(7)
Brain Drain
122(1)
The 64K$ Questions
123(3)
Tricky Terminology
126(1)
Acronym Alert
127(2)
Understanding the Physical Layer
129(20)
The Functions of the Physical Layer
130(1)
Bounded Physical Signaling
130(8)
Moving Data Over Copper
131(5)
Moving Data Over Fiber
136(2)
Unbounded Physical Signaling
138(4)
Networking Over Radio
139(2)
Networking Over Microwaves
141(1)
Chapter Summary
142(7)
Brain Drain
142(1)
The 64K$ Questions
142(4)
Tricky Terminology
146(1)
Acronym Alert
146(3)
The Data Link Layer
149(36)
Addressing Functions of the Data Link Layer
150(3)
Physical Addressing in Data Link
151(1)
Logical Addressing in Data Link
152(1)
Encapsulation in the Data Link Layer
153(1)
Defining Network Topologies and Implementation
153(13)
CSMA/CD
154(4)
Demand Priority
158(2)
CSMA/CA
160(1)
Token Passing
161(5)
10-Gigabyte Ethernet
166(2)
FDDI
168(1)
Error Detection and Data Link
169(4)
Lost Frames
170(1)
Incorrect Checksum or CRC
171(1)
Offending Frame Size
172(1)
Buffer Overflow
172(1)
Interference
173(1)
Error Correction in Data Link
173(1)
Flow Control in the Data Link Layer
173(1)
Data Link Protocols
174(2)
HDLC
174(1)
PPP
175(1)
Chapter Summary
176(9)
Brain Drain
176(1)
The 64K$ Questions
177(3)
Tricky Terminology
180(1)
Acronym Alert
181(4)
The Network Layer
185(24)
Addressing in the Network Layer
186(5)
Logical Addressing in IPX/SPX
187(1)
Logical Addressing in TCP/IP
188(3)
Address Resolution
191(1)
Routing and the Network Layer
191(3)
Routing in IP/IPX
192(1)
Routing in TCP/IP
192(2)
Route Determination at the Network Layer
194(8)
Routing Tables
194(2)
Routing Protocols
196(6)
Chapter Summary
202(7)
Brain Drain
202(1)
The 64K$ Questions
202(4)
Tricky Terminology
206(1)
Acronym Alert
207(2)
The Transport Layer
209(22)
Addressing in the Transport Layer
210(1)
Packaging Data in the Transport Layer
211(6)
The Concepts of Flow Control
217(3)
Error Control in the Transport Layer
220(3)
Congestion Control at the Transport Layer
223(1)
Chapter Summary
223(8)
Brain Drain
224(1)
The 64K$ Questions
225(3)
Tricky Terminology
228(1)
Acronym Alert
229(2)
The Session Layer
231(18)
Establishing a Connection
232(7)
Initiating a Link
233(1)
Logon Authentication
234(1)
The Connection ID
234(2)
The Duration of the Connection and Services Required
236(1)
The Final Steps of Initializing a Session
237(2)
Dialogue Management and Synchronization
239(3)
Dialogue Control
239(2)
Synchronization Methods at the Session Layer
241(1)
Releasing the Connection
242(1)
Chapter Summary
242(7)
Brain Drain
243(1)
The 64K$ Questions
243(4)
Tricky Terminology
247(1)
Acronym Alert
248(1)
View the Video
248(1)
The Application and Presentation Layers
249(22)
The Presentation Layer
250(9)
Functions of the Presentation Layer
252(1)
File Format and Compression
253(4)
Data Encryption
257(2)
The Application Layer
259(3)
Chapter Summary
262(9)
Brain Drain
262(1)
The 64K$ Questions
263(3)
Tricky Terminology
266(1)
Acronym Alert
267(4)
Part 3: The Networking Protocols
An Introduction to TCP/IP
271(40)
TCP/IP's Illustrious Background
272(1)
TCP/IP vs. OSI
273(1)
The Basics of IP Addressing
274(6)
Address Classes
277(3)
The TCP/IP Protocol Suite
280(20)
Process/Application Protocols
280(7)
The Host-to-Host Protocols
287(4)
Internet Layer Protocols
291(9)
Address Translation in TCP/IP
300(3)
WINS
301(1)
HOSTS and LMHOSTS Files
302(1)
Chapter Summary
303(8)
Brain Drain
304(1)
The 64K$ Questions
304(3)
Tricky Terminology
307(1)
Acronym Alert
308(3)
Using TCP/IP on the Network
311(30)
Configuring a Device for TCP/IP
312(4)
Subnetting in TCP/IP
316(5)
Classless Interdomain Routing
321(3)
The TCP/IP Utilities
324(11)
Ping
325(1)
Trace Route
326(2)
Netstat
328(1)
Route
329(1)
Nbtstat
330(1)
Ipconfig
331(1)
Nslookup
332(2)
Dig
334(1)
Ifconfig
334(1)
Chapter Summary
335(6)
Brain Drain
335(1)
The 64K$ Questions
335(4)
Tricky Terminology
339(1)
Acronym Alert
340(1)
The Other Protocols
341(22)
IPX/SPX
341(5)
Addressing in IPX/SPX
342(2)
Configuring IPX/SPX
344(1)
The IPX Packet Structure
345(1)
Routing in IPX/SPX
346(2)
Pros and Cons of IPX/SPX
348(1)
NetBEUI
348(2)
AppleTalk
350(3)
Addressing in AppleTalk
351(1)
AppleTalk over IP
352(1)
The Other Protocols and OSI
353(1)
Chapter Summary
354(9)
Brain Drain
354(1)
The 64K$ Questions
354(4)
Tricky Terminology
358(1)
Acronym Alert
358(5)
Part 4: Putting It All to Work
Working with Remote Access
363(34)
The Protocols
364(4)
PPP
364(2)
PPTP
366(1)
PPPoE
367(1)
RDP and ICA
367(1)
Remote Connection Options
368(2)
Circuit Switching vs. Packet Switching
368(2)
Circuit Switching Options
370(4)
PSTN
370(2)
Radius
372(1)
ISDN
372(2)
Packet Switching Technologies
374(7)
T-Lines and E-Lines
375(2)
Frame Relay
377(1)
FDDI
378(1)
ATM
379(1)
Sonet/SDH
380(1)
Understanding OCx
381(1)
Making the Connection
381(7)
Dial-up Networking
383(1)
Virtual Private Networks
383(2)
Line Printer Remote
385(1)
Remote Access Services
386(1)
RDP
387(1)
Chapter Summary
388(9)
Brain Drain
388(1)
The 64K$ Questions
388(4)
Tricky Terminology
392(1)
Acronym Alert
393(4)
Working with Network Security
397(42)
Just What Are We Protecting Ourselves From?
398(1)
Some Basic Concepts of Security
399(3)
Protection From the Inside
399(1)
Securing Your Network From the Outside
400(1)
Physical Security
401(1)
Security Considerations
402(4)
How Much Security is Needed?
402(1)
Permitting Access From the Outside
403(3)
Security in the NOS
406(9)
Share Level Security vs. User Level
407(2)
User Authentication
409(1)
File System Security
410(2)
Securing Printing Devices
412(1)
Directory Services
413(2)
Password Policy Management
415(3)
Data Encryption
418(3)
Building Your Barriers
421(3)
Firewalls
422(1)
Access Lists
423(1)
Proxy Servers
423(1)
The Security Protocols
424(2)
SSL and TLS
425(1)
SMIME
425(1)
IPSEC
426(1)
Secure Shell
426(3)
The Secure Command Shell
427(1)
Secure File Transfer
427(1)
Port Forwarding
427(1)
Secure Copy
428(1)
WEP and WPA
428(1)
Defending Against Viruses
429(3)
Chapter Summary
432(7)
Brain Drain
432(1)
The 64K$ Questions
433(3)
Tricky Terminology
436(1)
Acronym Alert
437(2)
Data Recovery and Fault Tolerance
439(48)
Disk Structure and Data Recovery
440(14)
Partitions
443(2)
The Master Boot Record
445(4)
Partition Tables
449(1)
File Allocation Tables
450(2)
Disk Editors and Partioning Utilities
452(2)
Unformatting Utilities
454(1)
Initiating Disaster Recovery
454(2)
Holding Off Disaster
455(1)
Planning a Good Backup Routine
456(4)
Backup Hardware
457(2)
Backup Software
459(1)
Backup and Recovery Strategies
460(9)
Determining a Backup Type
461(1)
Determining a Backup Rotation
462(2)
One-Touch Disaster Recovery
464(2)
Internet Backup Storage Solutions
466(1)
Network Attached Storage versus the Storage Area Network
467(2)
Fault Tolerance
469(9)
Implementing Fault Tolerance
469(9)
Backup Data Sites
478(2)
The Hot Site
478(1)
Warm Sites
479(1)
Cold Sites
479(1)
Chapter Summary
480(7)
Brain Drain
480(1)
The 64K$ Questions
481(3)
Tricky Terminology
484(1)
Acronym Alert
485(2)
Planning a Network Installation
487(26)
Developing Your Plan
487(9)
Creating Administrative Accounts
488(2)
A Naming Convention for User Accounts
490(1)
Creating a Computer Naming Convention
491(2)
Developing an Addressing Scheme
493(2)
Creating a Network Policy
495(1)
Networking and the Environment
496(5)
Heat
496(1)
Humidity
497(1)
EMI and RFI
498(1)
ESD
499(1)
Pollution
500(1)
The Basic Components
501(4)
Network Cabling
501(1)
Managing the Hardware
502(3)
Finalizing the Network
505(1)
Chapter Summary
506(7)
Brain Drain
506(1)
The 64K$ Questions
506(4)
Tricky Terminology
510(1)
Acronym Alert
511(2)
Network Documentation and Scheduled Maintenance
513(22)
Hardware and Software Documentation
514(2)
Documenting Your Network
516(4)
Maintaining a Technical Library
520(1)
Preventative Maintenance
521(7)
NOS Maintenance
521(1)
Device Drivers
522(1)
Hardware Maintenance
523(4)
Other Maintenance Routines
527(1)
Chapter Summary
528(7)
Brain Drain
528(1)
The 64K$ Questions
529(3)
Tricky Terminology
532(1)
Acronym Alert
533(2)
Troubleshooting the Network
535(36)
The Network+ Troubleshooting Method
536(5)
Identifying the Problem
537(1)
Re-creating the Problem
538(1)
Isolating the Cause of the Problem
538(1)
Deciding on a Possible Solution
539(1)
Testing Your Idea
540(1)
Fixing the Problem
540(1)
Following Up
540(1)
Other Troubleshooting Approaches
541(3)
The Novell Troubleshooting Model
541(2)
The Collect, Isolate, and Correct Model
543(1)
Troubleshooting Remote Connections
544(2)
Troubleshooting Tools
546(10)
Hardware-Based Troubleshooting Tools
546(4)
Software-Based Troubleshooting Tools
550(6)
A Session in Troubleshooting
556(2)
Troubleshooting the Small Network
558(2)
User Error/Intervention
558(1)
Network Topology
559(1)
Media Type
560(1)
When Network Services Go Wrong
560(2)
Machines That Can't Get Onto the Network
562(2)
Chapter Summary
564(7)
Brain Drain
564(1)
The 64K$ Questions
564(4)
Tricky Terminology
568(1)
Acronym Alert
569(2)
Navigating the Internet
571(86)
The History of the Internet
571(2)
Foundations of the Internet
573(7)
The User's PC
574(1)
The User's Datacom
574(2)
The Local Loop Carrier
576(1)
The ISP Point of Presence
576(1)
The User Services
577(1)
The ISP Backbone
578(1)
On-line Content
578(1)
Origin of Content
579(1)
Administering the Internet
580(2)
Chapter Summary
582(7)
Brain Drain
582(1)
The 64K$ Questions
582(4)
Tricky Terminology
586(1)
Acronym Alert
586(3)
Appendices
Appendix A Answers to Chapter Exercises
589(24)
Appendix B Complete Listing of Well-Known Ports
613(14)
Appendix C Glossary
627(16)
Appendix D Networking Acronyms
643(14)
Index 657

Rewards Program

Write a Review