Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover Page
Title Page
Copyright Page
Dedication
Contents
Preface
Acknowledgments
Introduction
1 Basic Network Concepts
Identifying Characteristics of a Network
Servers, Workstations, and Hosts
WANs, LANs, and MANs
Types of Networks
Internet, Intranet, and Extranet
Identifying Network Topologies
Bus Topologies
Star Topologies
Mesh Topologies
Ring Topologies
Hybrid Topologies
Wireless Topologies
Point-to-Point and Point-to-Multipoint
Segments and Backbones
Network Media and Connectors
Coaxial Cable
Twisted-Pair Cable
Exercise 1-1: Crimping a Category 5 Cable
Fiber-Optic Cable
Connector Types
Networking over Power Lines
Media Converters
Access Methods
CSMA/CD
CSMA/CA
Token Passing
Modulation Techniques
Multiplexing and De-multiplexing
Bit Rates vs. Baud Rate
Network Architectures
Baseband and Broadband
Ethernet
Token Ring
FDDI
Exercise 1-2: Identifying the Different Network Architectures
Network Operating Systems
Windows Servers
Exercise 1-3: Installing DNS on a Windows Server
UNIX/Linux
Certification Summary
✓ Two-Minute Drill
Q&A Self Test
Self Test Answers
2 Network Protocols and Standards
Network Protocols
NetBEUI
What Is NetBIOS?
IPX/SPX
AppleTalk
TCP/IP
Routable vs. Nonroutable Protocols
The OSI Model
Layer 7: The Application Layer
Layer 6: The Presentation Layer
Layer 5: The Session Layer
Layer 4: The Transport Layer
Layer 3: The Network Layer
Layer 2: The Data Link Layer
Layer 1: The Physical Layer
Data Encapsulation
Exercise 2-1: Mixing and Matching OSI Model Definitions
Protocols and the OSI Layers
Exercise 2-2: Viewing Protocol Information with Network Monitor
Exercise 2-3: Analyzing Network Traffic
802 Project Standards
IEEE 802 Categories
Certification Summary
✓ Two-Minute Drill
Q&A Self Test
Self Test Answers
3 Networking Components
Network Interface Cards
Transceivers
Exercise 3-1: Configuring a Network Card
MAC Address
Exercise 3-2: Determining Your Local Machine’s MAC Address
Troubleshooting Network Cards
Hubs, MAUs, and Repeaters
Hubs
Multistation Access Units
Repeaters
Bridges and Switches
Bridges
Switches
Routers and Brouters
Routers
Brouters
Collision Domains and Broadcast Domains
Gateways and Security Devices
Gateways
Firewalls
Intrusion Detection Systems
Exercise 3-3: Identifying Network Components
Other Networking Devices
Wireless Access Points
Analog Modems
CSU/DSU
ISDN
Network Appliances
Virtualization
Cloud Computing
Storage Area Networks
SCADA/ICS and Medianets
Power Management
Wiring Distribution and Rack Systems
Device Placement and Labeling
Certification Summary
✓ Two-Minute Drill
Q&A Self Test
Self Test Answers
4 TCP/IP Addressing
TCP/IP Fundamentals
TCP/IP Settings
Exercise 4-1: Identifying Remote Systems
TCP/IP Addressing
Understanding Binary
Exercise 4-2: Converting Decimal to Binary
Exercise 4-3: Converting Binary to Decimal
Address Classes
Exercise 4-4: Identifying Address Classes
Loopback Address
Private Addresses
Exercise 4-5: Understanding Valid Addresses
Addressing Schemes
TCP/IP Ports
Exercise 4-6: Viewing TCP/IP Port Values
TCP/IP Configuration Concepts
Manual Configuration
Dynamic Host Configuration Protocol (DHCP)
Exercise 4-7: Configuring TCP/IP to Use DHCP
APIPA
Boot Protocol
Domain Name System
Windows Internet Naming Service
Exercise 4-8: Configuring a Client for DNS
Configuring a Linux Machine for TCP/IP
Certification Summary
✓ Two-Minute Drill
Q&A Self Test
Self Test Answers
5 TCP/IP Protocols
TCP/IP Protocol Suite
The TCP/IP Model
Exercise 5-1: Identifying TCP/IP Protocols
IPv6 Fundamentals
IPv6 Addressing and Hexadecimal Addressing
IPv6 Protocols
Tunneling Protocols
Exercise 5-2: Exploring IPv6
Network Services
Web Services
Network Controllers
DHCP
DNS
RDP
WINS
NAT/PAT/SNAT
ICS
SMB/CIFS
NFS
AFP
Samba
ZeroConfig
VoIP
Unified Voice Services
Certification Summary
✓ Two-Minute Drill
Q&A Self Test
Self Test Answers
6 TCP/IP Utilities and Troubleshooting
Communication Requires ARP
How ARP Works
ARP Cache
Exercise 6-1: Using ARP to See Your Local ARP Cache
RARP
Common TCP/IP Commands
IPCONFIG and ifconfig
Exercise 6-2: Using IPCONFIG
Ping and Hping2
Exercise 6-3: Using Ping
Tracert/traceroute
Netstat
Exercise 6-4: Using Netstat to Determine Open Connections to a System
Telnet
Exercise 6-5: Using Telnet to Remotely Administer a Cisco Router
FTP
Exercise 6-6: Configuring and Using FTP
Name Resolution Commands
NBTSTAT
Exercise 6-7: Using NBTSTAT to View NetBIOS Name Tables
NSLOOKUP and DIG
Exercise 6-8: Using NSLOOKUP
TCP/IP Utilities
Hostname and Host
MTR
Route
Arping
Pathping
MAC Address Lookup Table
Troubleshooting with TCP/IP Utilities
Connectivity Problems
Name-Resolution Problems
Certification Summary
✓ Two-Minute Drill
Q&A Self Test
Self Test Answers
7 Configuring Routers and Switches
Basic Router Configuration
Configuration Modes
Configuring the Hostname
Configuring Interfaces
Exercise 7-1: Performing Basic Configuration of Cisco Routers
Basic Switch Configuration
Configuring Interfaces
Configuring VLANs
Port Mirroring
Exercise 7-2: Configuring VLANs on Cisco Switches
Configuring Port Security
Switch Management
Troubleshooting Connectivity
Layer-1 and Layer-2 Troubleshooting
Layer-3 Troubleshooting
Certification Summary
✓ Two-Minute Drill
Q&A Self Test
Self Test Answers
8 Subnetting and Routing
Understanding Subnetting
Exercise 8-1: Subnetting IP Addresses
Classful vs. Classless Addressing
CIDR
Exercise 8-2: Subnetting Networks
Supernetting
Understanding Routing and Static Routes
Routing Concepts
Cisco Routers
Exercise 8-3: Configuring Cisco Routers
Windows Routers
Dynamic Routing Protocols
Routing Metrics
Distance Vector
Link State
Advanced Concepts
Certification Summary
✓ Two-Minute Drill
Q&A Self Test
Self Test Answers
9 Configuring Network Services
Understanding DNS
DNS Overview
Configuring DNS Records
Dynamic DNS
Exercise 9-1: Installing and Configuring DNS
Deploying DHCP
DHCP Overview
Configuring DHCP
Configuring Reservations
Exercise 9-2: Installing and Configuring DHCP
DHCP Relay and IP Helper
Implementing NAT
NAT Overview
Configuring NAT
Exercise 9-3: Configuring NAT on Windows Server
Port Forwarding, Proxy Servers, and Unified Communications
Port Forwarding
Exercise 9-4: Configuring Port Forwarding
Proxy Servers
Unified Communications
Certification Summary
✓ Two-Minute Drill
Q&A Self Test
Self Test Answers
10 Wireless Networking
Wireless Basics
Wireless Concepts
Wireless Network Types
Wireless Standards
Channels
Authentication and Encryption
Securing Wireless
Security Best Practices
Threats Against Wireless
Implementing a Wireless Network
Configuring the Wireless Router/Access Point
Wireless Security
Configuring the Client
Exercise 10-1: Configuring a Wireless Network
Implementing MAC Filtering
Changing the SSID and Implementing WEP
Configuring a Windows 8 Client
Configuring Roaming Wireless
Understanding Mobile Devices
Troubleshooting Wireless
PAN Networking
Infrared (IR)
Bluetooth
NFC
Certification Summary
✓ Two-Minute Drill
Q&A Self Test
Self Test Answers
11 Remote Access and VPN Connectivity
Remote Connectivity Concepts
Public Switched Telephone Network
Integrated Services Digital Network
Remote Access Service (RAS)
Serial Line Internet Protocol
Point-to-Point Protocol
Exercise 11-1: Enabling Modem Logging in Windows
Dial-Up Networking
Modem Configuration Parameters
Unimodem
Telephony API
Requirements for a Remote Connection
Exercise 11-2: Creating a PPP Dial-Up Connection
Virtual Private Networks (VPNs)
VPN Overview
VPN Protocols
Exercise 11-3: Setting Up a VPN Server
Exercise 11-4: Setting Up a VPN Client
Certification Summary
✓ Two-Minute Drill
Q&A Self Test
Self Test Answers
12 Wide Area Network Technologies
Packet-Switching vs. Circuit-Switching Networks
Packet Switching
Circuit Switching
X.25 and Frame Relay
Fiber-Optic WAN Technologies
Synchronous Optical Network/Synchronous Digital Hierarchy
Optical Carrier Level-X
Fiber Distributed Data Interface
Asynchronous Transfer Mode
Internet Access Technologies
Leased Lines with Tx-/Ex-Carriers
DSL/ADSL
Broadband Cable
High Speed via Satellite and Cellular Networks
Other Methods of Internet Access
Certification Summary
✓ Two-Minute Drill
Q&A Self Test
Self Test Answers
13 Implementing a Network
Installing a Network
Networking Options
Network Requirements
Exercise 13-1: Confirming Networking Components in Windows
Installing a Network Server
Creating User Accounts
Built-in Accounts
Creating User Accounts
Exercise 13-2: Creating Users in Active Directory
Password Policies
Exercise 13-3: Configuring a Password Policy
Managing Groups
Built-in Groups
Creating Groups
Exercise 13-4: Creating Groups in Active Directory
Securing Files and Folders
Securing Files in Windows
Exercise 13-5: Configuring Permissions in Windows Server 2012
Connecting to a Shared Folder
Securing Files in Linux
Installing Printers
Installing a Print Server
Changing Printer Permissions
Exercise 13-6: Installing a Printer on Windows Server 2012
Configuring a Print Client
Working with Network Hardware
Environmental Factors that Affect Computer Networks
Common Peripheral Ports and Network Components
Compatibility and Cabling Issues
Implementing a SOHO Network
Implement a Network Based on Requirements
Certification Summary
✓ Two-Minute Drill
Q&A Self Test
Self Test Answers
14 Maintaining and Supporting a Network
Network Upgrades and Downgrades
Safety Practices
Software Upgrades
Hardware Upgrades
Installing Patches and Updates
Exercise 14-1: Configuring Windows Update
Windows Server Update Services (WSUS)
Antivirus and Antispyware Software
Antivirus Software
Antispyware/Adware
Backing Up Network Data
Tape Drives
Archives
Full, Incremental, and Differential Backups
Scheduling Backups
Exercise 14-2: Backing Up and Restoring Data on a Windows Server
Providing Fault Tolerance
RAID Level 0
RAID Level 1
RAID 5
Exercise 14-3: Understanding and Configuring Fault Tolerance
Network Documentation and Configuration Management
Wiring Schematics
Physical Network Diagrams
Logical Network Diagrams
Asset Management
IP Address Utilization
Vendor Documentation
Baselines
Internal Policies, Procedures, and Standards
Change Management
Configuration Management
Certification Summary
✓ Two-Minute Drill
Q&A Self Test
Self Test Answers
15 Network Security Principles
Understanding Attack Types
Social Engineering
Phishing Attack
Network-Based Attacks
Common Vulnerabilities
Malicious Software
Mitigating Attacks
Understanding System Security
Authentication
Authorization
Windows Security Subsystem
Configuring Permissions
Securing the Registry
Exercise 15-1: Setting Permissions on Registry Keys
Configuring User Rights
Exercise 15-2: Modifying User Rights on a Windows System
Configuring Auditing
Exercise 15-3: Implementing Auditing in Windows
Implementing Network Security
Network Access Security
Securing Communication
Defining Data Encryption
Encryption Methods
Encryption Standards
Methods of Securing Traffic
Fault Tolerance and Disaster Recovery
Fault Tolerance
Disaster Recovery and Business Continuity
Guidelines to Protect the Network
Physical Security
Firewalls
Intrusion Detection Systems
Patch Management
Hardening Devices and Systems
Data Encryption
Policies and Procedures
Vulnerability Testing and Penetration Testing
End-User Awareness and Training
Certification Summary
✓ Two-Minute Drill
Q&A Self Test
Self Test Answers
16 Network Security Practices
Implement Network Hardening Techniques
Security Policy and Access Control Models
Antimalware Software
Switch Port Security
Disable Unneeded Network Services
Network Segmentation and Access Lists
Use Secure Protocols
Physical Security Controls
Securing the Premises
Network Closet/Server Room
Access Control Methods
Implementing Firewalls
Firewall Architecture
Firewall Types
Other Firewall Features
Configuring Access Control Lists
Exercise 16-1: Enabling the Windows Firewall
Basic Forensics Concepts
First Responder
Evidence Collection
Handling Evidence
Forensics Report
Legal Hold
Certification Summary
✓ Two-Minute Drill
Q&A Self Test
Self Test Answers
17 Monitoring the Network
Monitoring and Logging
Monitoring
Logging
Monitoring Tools
Packet/Network Analyzer
Port Scanner
Exercise 17-1: Using a Port Scanner
System Monitor
Exercise 17-2: Using System Monitor
Event Viewer
Exercise 17-3: Checking Event Logs
Other Monitoring Tools
Environmental and Power Monitoring
Monitoring Techniques to Track Problems
Monitoring Best Practices
Monitoring Utilization
Interface Monitoring
Certification Summary
✓ Two-Minute Drill
Q&A Self Test
Self Test Answers
18 Troubleshooting the Network
Managing Network Problems
Does the Problem Exist Across the Network?
Workstation, Workgroup, LAN, or WAN Problem?
Is the Problem Consistent and Replicable?
Standard Troubleshooting Methods
Network Troubleshooting Methodology
Step 1: Identify the Problem
Step 2: Establish a Theory of Probable Cause
Step 3: Test the Theory to Determine Cause
Step 4: Establish a Plan of Action to Resolve the Problem and Identify Potential Effects
Step 5: Implement the Solution or Escalate as Necessary
Step 6: Verify Full System Functionality and, If Applicable, Implement Preventative Measures
Step 7: Document Findings, Actions, and Outcomes
Other Methodology Steps
Sample Troubleshooting Situations
System or Operator Problems
Checking Physical and Logical Indicators
Link Lights
Collision Lights
Power Lights
Error Displays
Error Logs and Displays
Performance Issues and Optimization
Physical and Logical Issues
Other Symptoms and Causes of Network Problems
Recognizing Abnormal Physical Conditions
Isolating and Correcting Problems in the Physical Media
Checking the Status of Servers
Checking for Configuration Problems
Checking for Viruses
Checking the Validity of the Account Name and Password
Rechecking Operator Logon Procedures
Selecting and Running Appropriate Diagnostics
Network Troubleshooting Tools
Cable Crimper, Wire Stripper, and Punch-Down Tool
Cable Tester, Certifier, and Butt Set
Crossover Cables
Loopback Plug, Line Testers, and Light Meter
Tone Generator/Toner Probe
TDR and OTDR
Oscilloscopes
Multimeter
Software Troubleshooting Tools
Certification Summary
✓ Two-Minute Drill
Q&A Self Test
Self Test Answers
A About the Download
B How to Score Your Pre-assessment
C Performance-Based Questions and Answers
Glossary
Index
← Prev
Back
Next →
← Prev
Back
Next →