ebook img

CompTIA Network+ Certification Study Guide, Fourth Edition PDF

801 Pages·2009·27.04 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview CompTIA Network+ Certification Study Guide, Fourth Edition

® CompTIA Network+ Certification Study Guide, Fourth Edition Glen E. Clarke McGraw-Hill is an independent entity from CompTIA®. This publication and CD may be used in assisting students to prepare for the CompTIA Network+ Exam. Neither CompTIA nor McGraw-Hill warrants that use of this publication and CD will ensure passing any exam. CompTIA and CompTIA Network+ are registered trademarks of CompTIA in the United States and/or other countries. New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Copyright © 2009 by The McGraw-Hill Companies. All rights reserved. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval sys- tem, without the prior written permission of the publisher. ISBN: 978-0-07-161539-6 MHID: 0-07-161539-3 The material in this eBook also appears in the print version of this title: ISBN: 978-0-07-161538-9, MHID: 0-07-161538-5. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. To contact a representative please visit the Contact Us page at www.mhprofessional.com. Information has been obtained by McGraw-Hill from sources believed to be reliable. However, because of the possibility of human or mechanical error by our sources, McGraw-Hill, or others, McGraw-Hill does not guarantee the accuracy, adequacy, or completeness of any information and is not responsible for any errors or omissions or the results obtained from the use of such information. TERMS OF USE This is a copyrighted work and The McGraw-Hill Companies, Inc. (“McGraw-Hill”) and its licensors reserve all rights in and to the work. Use of this work is subject to these terms. Except as permitted under the Copyright Act of 1976 and the right to store and retrieve one copy of the work, you may not decompile, disassemble, reverse engineer, reproduce, modify, create derivative works based upon, transmit, distribute, disseminate, sell, publish or sublicense the work or any part of it without McGraw-Hill’s prior consent. You may use the work for your own noncommercial and personal use; any other use of the work is strictly prohibited. Your right to use the work may be terminated if you fail to comply with these terms. THE WORK IS PROVIDED “AS IS.” McGRAW-HILL AND ITS LICENSORS MAKE NO GUARANTEES OR WARRANTIES AS TO THE ACCURACY, ADEQUACY OR COMPLETENESS OF OR RESULTS TO BE OBTAINED FROM USING THE WORK, INCLUDING ANY INFORMATION THAT CAN BE ACCESSED THROUGH THE WORK VIA HYPERLINK OR OTHERWISE, AND EXPRESSLY DISCLAIM ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. McGraw-Hill and its licensors do not warrant or guarantee that the functions contained in the work will meet your requirements or that its operation will be uninterrupted or error free. Neither McGraw-Hill nor its licensors shall be liable to you or anyone else for any inaccuracy, error or omission, regardless of cause, in the work or for any damages resulting therefrom. McGraw-Hill has no responsibility for the content of any information accessed through the work. Under no circumstances shall McGraw-Hill and/or its licensors be liable for any indirect, incidental, special, punitive, consequential or similar damages that result from the use of or inability to use the work, even if any of them has been advised of the possibility of such damages. This limitation of liability shall apply to any claim or cause whatsoever whether such claim or cause arises in contract, tort or otherwise. Disclaimer: This eBook does not include the ancillary media that was packaged with the original printed version of the book. To my beautiful wife, Tanya, who continues to show amazing patience and support. You are a true inspiration! About the Author Glen E. Clarke, MCSE/MCSD/MCDBA/MCT/CEH/SCNP/Security+/ Network+/A+, is an independent trainer and consultant, focusing on network security and security auditing services. Glen spends most of his time delivering certified courses on Windows Server, SQL Server, Exchange Server, Visual Basic .NET, and ASP.NET. Glen also teaches a number of security-related courses covering topics such as ethical hacking, vulnerability testing, firewall design, and packet analysis topics. Glen is an experienced author and technical editor whose published work has been nominated for a referenceware excellence award in 2003 and 2004. Glen has worked on a number of certification titles, including topics on A+ certification, Windows 2000/2003 certification, and Network+ and Security+ certification. When he’s not working, Glen loves to spend quality time with his wife, Tanya, and their four children, Sara, Brendon, Ashlyn, and Rebecca. He is an active member of High Technology Crime Investigation Association (HTCIA). You can visit Glen online at www.gleneclarke.com, or contact him at Contents At A GLAnCe 1 Basic Network Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2 Network P rotocols and Standards . . . . . . . . . . . . . . . . . . . . . . . . . . 71 3 Networking C omponents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 4 TCP/IP F undamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 5 Subnetting and Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 6 TCP/IP Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267 7 Wireless N etworking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351 8 Remote C onnectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387 9 Wide Area N etwork T echnologies . . . . . . . . . . . . . . . . . . . . . . . . . . 437 10 Implementing a Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469 11 Maintaining and Supporting a N etwork . . . . . . . . . . . . . . . . . . . . . . 533 12 Network Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597 13 Troubleshooting the Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685 A About the CD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 743 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 747 v Contents Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxii 1 basic network Concepts . . . . . . . . . . . . . . . . . . . . . . . 1 Identifying Characteristics of a Network . . . . . . . . . . . . . . . . . . . . . . 2 Servers, Workstations, and Hosts . . . . . . . . . . . . . . . . . . . . . 2 WANs, LANs, and MANs . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Types of Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Internet, Intranet, and Extranet . . . . . . . . . . . . . . . . . . . . . . 8 Identifying Network Topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Bus Topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Star Topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Mesh Topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Ring Topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Hybrid Topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Wireless Topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Point-to-Point and Point-to-Multipoint . . . . . . . . . . . . . . . . 18 Segments and Backbones . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Network Media and Connectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Coaxial Cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Twisted-Pair Cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 exercise 1-1: Crimping a Category 5 Cable . . . . . . . . . . . . 28 Fiber-Optic Cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Connector Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Access Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 CSMA/CD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 CSMA/CA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Token Passing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 vi Contents vii Network Architectures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Broadband and Baseband . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Token Ring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 FDDI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Network Operating Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Windows Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Novell NetWare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 UNIX/Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 3 Two-Minute Drill . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Q&A Self Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Self Test Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 2 Network Protocols and Standards . . . . . . . . . . . . . . . 71 Network Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 NetBEUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 What Is NetBIOS? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 IPX/SPX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 AppleTalk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Routable vs. Nonroutable Protocols . . . . . . . . . . . . . . . . . . . 78 The OSI Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Layer 7: The Application Layer . . . . . . . . . . . . . . . . . . . . . . 81 Layer 6: The Presentation Layer . . . . . . . . . . . . . . . . . . . . . . 82 Layer 5: The Session Layer . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Layer 4: The Transport Layer . . . . . . . . . . . . . . . . . . . . . . . . 83 Layer 3: The Network Layer . . . . . . . . . . . . . . . . . . . . . . . . . 84 Layer 2: The Data Link Layer . . . . . . . . . . . . . . . . . . . . . . . . 85 Layer 1: The Physical Layer . . . . . . . . . . . . . . . . . . . . . . . . . 86 Protocols and the OSI Layers . . . . . . . . . . . . . . . . . . . . . . . . 86 Exercise 2-4: Viewing Protocol Information with Network Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 802 Project Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 IEEE 802 Categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Certification Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 3 Two-Minute Drill . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 Q&A Self Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Self Test Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 viii Network+ Certifcation Study Guide 3 networking C omponents . . . . . . . . . . . . . . . . . . . . . . 115 Network Interface Cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 Transceivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 MAC A ddress . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 exercise 3-2: Determining Your Local Machine’s MAC Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Troubleshooting Network Cards . . . . . . . . . . . . . . . . . . . . . . 127 Hubs, MAUs, and Repeaters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Hubs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Multistation Access Units . . . . . . . . . . . . . . . . . . . . . . . . . . 135 Repeaters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 Bridges and Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 Bridges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 Routers and Brouters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 Brouters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 Gateways and Security Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 Intrusion Detection Systems . . . . . . . . . . . . . . . . . . . . . . . . . 148 Other Networking Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 Wireless Access Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 Modems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 CSU/DSU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 ISDN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 Wiring Distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 Certification Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 3 Two-Minute Drill . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 Q&A Self Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 Self Test Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 4 tCP/IP F undamentals . . . . . . . . . . . . . . . . . . . . . . . . . 169 TCP/IP Protocol Suite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 The TCP/IP Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 Application-Layer Protocols . . . . . . . . . . . . . . . . . . . . . . . . . 174 TCP/IP Fundamentals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 TCP/IP Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 Contents ix TCP/IP Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 Understanding Binary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 Address Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 Loopback Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 Private Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 Addressing Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 IPv6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 TCP/IP Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 Exercise 4-5: Viewing TCP/IP Port Values . . . . . . . . . . . . 191 TCP/IP Configuration Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 Manual Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 Dynamic Host Configuration Protocol (DHCP) . . . . . . . . . . 194 APIPA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 Boot Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 Domain Name System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 Windows Internet Naming Service . . . . . . . . . . . . . . . . . . . . 201 Configuring a Linux Machine for TCP/IP . . . . . . . . . . . . . . . 203 Network Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 WINS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 NAT/PAT/SNAT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 ICS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 SMB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212 NFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212 AFP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 Samba . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 ZeroConfig . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 Certification Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 3 Two-Minute Drill . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 Q&A Self Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 Self Test Answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 5 Subnetting and Routing . . . . . . . . . . . . . . . . . . . . . . . . 229 Understanding Subnetting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 Exercise 5-1: Subnetting a Class A Address . . . . . . . . . . . 238 Classful vs. Classless Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 CIDR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 Supernetting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.