Page 1


PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright Š 2006 by Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. Library of Congress Control Number 2005935315 Printed and bound in the United States of America. 1 2 3 4 5 6 7 8 9

QWT

9 8 7 6 5

Distributed in Canada by H.B. Fenn and Company Ltd. A CIP catalogue record for this book is available from the British Library. Microsoft Press books are available through booksellers and distributors worldwide. For further information about international editions, contact your local Microsoft Corporation office or contact Microsoft Press International directly at fax (425) 936-7329. Visit our Web site at www.microsoft.com/learning/. Send comments to moac@microsoft.com. Microsoft, Active Directory, MS-DOS, PowerPoint, Windows, Windows NT, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious. No association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. This book expresses the author’s views and opinions. The information contained in this book is provided without any express, statutory, or implied warranties. Neither the authors, Microsoft Corporation, nor its resellers, or distributors will be held liable for any damages caused or alleged to be caused either directly or indirectly by this book. Acquisitions Editor: Lori Oviatt Project Editor: Laura Sackerman

SubAssy Part No. X11-77572 Body Part No. X11-77574

A02L622337.p65

2

11/8/2005, 2:58 PM


CONTENTS AT A GLANCE CHAPTER 1:

Networking Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

CHAPTER 2:

Network Cabling . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

CHAPTER 3:

Network Connection Hardware . . . . . . . . . . . . . . . 93

CHAPTER 4:

Data-Link Layer Protocols . . . . . . . . . . . . . . . . . . . 143

CHAPTER 5:

Network Layer Protocols. . . . . . . . . . . . . . . . . . . . 191

CHAPTER 6:

Transport Layer Protocols . . . . . . . . . . . . . . . . . . . 239

CHAPTER 7:

TCP/IP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267

CHAPTER 8:

Networking Software. . . . . . . . . . . . . . . . . . . . . . . 339

CHAPTER 9:

Network Security and Availability . . . . . . . . . . . . 413

CHAPTER 10:

Remote Network Access . . . . . . . . . . . . . . . . . . . . 471

CHAPTER 11:

Network Troubleshooting Tools. . . . . . . . . . . . . . 503

CHAPTER 12:

Network Troubleshooting Procedures . . . . . . . . 553

iii


CONTENTS Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Target Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Prerequisites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv The Textbook . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Supplemental Materials on Student CD . . . . . . . . . . . . . . . . . . . . . . . . . . xvi eBook Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii The Lab Manual. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii Coverage of Exam Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii The Microsoft Certified Professional Program . . . . . . . . . . . . . . . . . . . xxviii Certifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxix MCP Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxix About the Author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xxx Microsoft Official Academic Course Support . . . . . . . . . . . . . . . . . . . . . .xxx Evaluation Edition Software Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxxi CHAPTER 1:

Networking Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Understanding Network Communications . . . . . . . . . . . . . . . . . . . . . . . . . 1 Network Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 LANs, WANs, and MANs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Intranets and Extranets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Signals and Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Broadband and Baseband Communications . . . . . . . . . . . . . . . . . . . . 8 Introducing the OSI Reference Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Protocol Interaction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Data Encapsulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 The Physical Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 The Data-Link Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 The Network Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 The Transport Layer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 The Session Layer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 The Presentation Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 The Application Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Exercise 1-1: Defining Networking Terms . . . . . . . . . . . . . . . . . . . . . 34 Exercise 1-2: Identifying OSI Layer Functions . . . . . . . . . . . . . . . . . . 35 Exercise 1-3: Associating Protocols with OSI Model Layers . . . . . . 35 Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

v


vi

CONTENTS

Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Scenario 1-1: Diagnosing a Network Layer Problem . . . . . . . . . . . . 37 Scenario 1-2: Troubleshooting an Internetwork Problem . . . . . . . . 37 CHAPTER 2:

Network Cabling . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

Understanding Network Cables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Cable Topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Cabling Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Cable Types. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Pulling Cable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 External Installations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Internal Installations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Making Connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Two-Computer Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Connecting External Cables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Connecting Internal Cables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Exercise 2-1: Identifying Network Cable Types . . . . . . . . . . . . . . . . . 87 Exercise 2-2: Cable Troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . 87 Exercise 2-3: Internal and External Cabling . . . . . . . . . . . . . . . . . . . . 87 Exercise 2-4: Identifying Cable Installation Tools . . . . . . . . . . . . . . . 88 Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Scenario 2-1: Installing UTP Cable . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Scenario 2-2: Expanding a Network . . . . . . . . . . . . . . . . . . . . . . . . . 91 CHAPTER 3:

Network Connection Hardware . . . . . . . . . . . . . . . 93

Using Network Interface Adapters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Understanding Network Interface Adapter Functions. . . . . . . . . . . 95 Selecting a Network Interface Adapter . . . . . . . . . . . . . . . . . . . . . . 100 Installing a Network Interface Adapter . . . . . . . . . . . . . . . . . . . . . . 101 Configuring a Network Interface Adapter. . . . . . . . . . . . . . . . . . . . 103 Installing Network Interface Adapter Drivers . . . . . . . . . . . . . . . . . 105 Network Adapter Configuration Tools . . . . . . . . . . . . . . . . . . . . . . . 105 Troubleshooting a Network Interface Adapter . . . . . . . . . . . . . . . . 109 Using Network Hubs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Understanding Ethernet Hubs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Using Media Converters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Understanding Token Ring MAUs . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Using Wireless Access Points (WAPs) . . . . . . . . . . . . . . . . . . . . . . . . 116 Using Advanced Network Connection Devices . . . . . . . . . . . . . . . . . . . 117 Bridging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123


CONTENTS

Switching. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 Using Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 Exercise 3-1: Hub Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 Exercise 3-2: Bridging Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 Exercise 3-3: Using Switches. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 Scenario 3-1: Segmenting a Network. . . . . . . . . . . . . . . . . . . . . . . . 139 Scenario 3-2: Boosting Network Performance . . . . . . . . . . . . . . . . 141 CHAPTER 4:

Data-Link Layer Protocols . . . . . . . . . . . . . . . . . . . 143

Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 Ethernet Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 The Ethernet Frame . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 CSMA/CD Mechanism. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 Physical Layer Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 Token Ring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 Physical Layer Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 Token Passing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 Token Ring Frames . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Fiber Distributed Data Interface (FDDI). . . . . . . . . . . . . . . . . . . . . . . . . . 173 Physical Layer Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 The FDDI Frames . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 Wireless Networking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 Wireless Networking Standards. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 The IEEE 802.11 Physical Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 The IEEE 802.11 MAC Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 Exercise 4-1: IEEE Standards and Technologies . . . . . . . . . . . . . . . . 184 Exercise 4-2: CSMA/CD Procedures . . . . . . . . . . . . . . . . . . . . . . . . . 184 Exercise 4-3: Selecting a Data-Link Layer Protocol. . . . . . . . . . . . . 184 Exercise 4-4: FDDI Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 Exercise 4-5: IEEE 802.11 Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . 185 Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 Scenario 4-1: Troubleshooting an Ethernet Network. . . . . . . . . . 189 Scenario 4-2: Designing an Ethernet Network . . . . . . . . . . . . . . . . 189 CHAPTER 5:

Network Layer Protocols. . . . . . . . . . . . . . . . . . . . 191

Internet Protocol (IP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 IP Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

vii


viii

CONTENTS

IP Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 Data Encapsulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 Understanding IP Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 Internetwork Packet Exchange (IPX). . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 IPX Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 NetBIOS Extended User Interface (NetBEUI) . . . . . . . . . . . . . . . . . . . . . 221 NetBEUI Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 NetBIOS Naming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 The NetBEUI Frame . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 AppleTalk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 Datagram Delivery Protocol (DDP). . . . . . . . . . . . . . . . . . . . . . . . . . 228 AppleTalk over IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 Exercise 5-1: Understanding IP Functions . . . . . . . . . . . . . . . . . . . . 231 Exercise 5-2: Calculating Subnet Masks . . . . . . . . . . . . . . . . . . . . . . 231 Exercise 5-3: Understanding IPX Properties . . . . . . . . . . . . . . . . . . 232 Exercise 5-4: NBF Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232 Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232 Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 Scenario 5-1: Choosing a Network Layer Protocol. . . . . . . . . . . . . 236 Scenario 5-2: Subnetting a Class C Address . . . . . . . . . . . . . . . . . . 237 Scenario 5-3: Calculating a Subnet Mask. . . . . . . . . . . . . . . . . . . . . 237 CHAPTER 6:

Transport Layer Protocols . . . . . . . . . . . . . . . . . . . 239

TCP/IP and the Transport Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 Transmission Control Protocol (TCP). . . . . . . . . . . . . . . . . . . . . . . . . 240 User Datagram Protocol (UDP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 Ports and Sockets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 Novell NetWare and the Transport Layer . . . . . . . . . . . . . . . . . . . . . . . . 256 Sequenced Packet Exchange (SPX) . . . . . . . . . . . . . . . . . . . . . . . . . . 257 NetWare Core Protocol (NCP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262 Exercise 6-1: TCP Header Fields. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262 Exercise 6-2: TCP and UDP Functions . . . . . . . . . . . . . . . . . . . . . . . . 262 Exercise 6-3: Port Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263 Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263 Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265 Scenario 6-1: Troubleshooting TCP. . . . . . . . . . . . . . . . . . . . . . . . . . 265 Scenario 6-2: Using Port Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . 266 CHAPTER 7:

TCP/IP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267

Introducing TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267


CONTENTS

TCP/IP Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268 TCP/IP Standards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 The TCP/IP Protocol Stack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276 TCP/IP Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 Link Layer Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 Address Resolution Protocol (ARP) . . . . . . . . . . . . . . . . . . . . . . . . . . 278 Internet Protocol (IP). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282 Internet Control Message Protocol (ICMP) . . . . . . . . . . . . . . . . . . . 282 Internet Group Management Protocol (IGMP) . . . . . . . . . . . . . . . . 288 TCP/IP Transport Layer Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . 290 Application Layer Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290 IP Routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 Understanding Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 Router Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 Understanding Routing Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 Building Routing Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 Configuring TCP/IP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311 Configuring TCP/IP in Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312 Configuring TCP/IP in UNIX/Linux . . . . . . . . . . . . . . . . . . . . . . . . . . 323 Configuring TCP/IP in NetWare. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330 Exercise 7-1: TCP/IP Layers and Protocols . . . . . . . . . . . . . . . . . . . . 330 Exercise 7-2: TCP/IP Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330 Exercise 7-3: Routing Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331 Exercise 7-4: Static and Dynamic Routing . . . . . . . . . . . . . . . . . . . . 331 Exercise 7-5: Windows TCP/IP Configuration Requirements . . . . 332 Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332 Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336 Scenario 7-1: Creating Static Routes. . . . . . . . . . . . . . . . . . . . . . . . . 336 Scenario 7-2: Choosing a Routing Method . . . . . . . . . . . . . . . . . . . 337 Scenario 7-3: Configuring TCP/IP Clients. . . . . . . . . . . . . . . . . . . . . 338 CHAPTER 8:

Networking Software. . . . . . . . . . . . . . . . . . . . . . . 339

Client/Server and Peer-to-Peer Networking . . . . . . . . . . . . . . . . . . . . . . 340 Using Server Operating Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341 Microsoft Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341 Windows XP Versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 Windows Server 2003 Versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 Novell NetWare . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352 UNIX and Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357

ix


x

CONTENTS

Connecting Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363 Windows Client Capabilities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364 UNIX/Linux Client Capabilities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371 Macintosh Client Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372 Understanding Directory Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374 The NetWare Bindery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374 Novell eDirectory. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375 Windows NT Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377 Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378 Network Information System (NIS) . . . . . . . . . . . . . . . . . . . . . . . . . . 379 Understanding TCP/IP Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380 Using Dynamic Host Configuration Protocol (DHCP) . . . . . . . . . . 381 Understanding Zeroconf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389 Host Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390 Understanding the Domain Name System (DNS) . . . . . . . . . . . . . 391 Windows Internet Name Service (WINS) . . . . . . . . . . . . . . . . . . . . . 401 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404 Exercise 8-1: Selecting an Operating System . . . . . . . . . . . . . . . . . 404 Exercise 8-2: Network Operating System Products . . . . . . . . . . . . 404 Exercise 8-3: Directory Service Concepts . . . . . . . . . . . . . . . . . . . . . 405 Exercise 8-4: DHCP Message Types. . . . . . . . . . . . . . . . . . . . . . . . . . 405 Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406 Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410 Scenario 8-1: Deploying eDirectory . . . . . . . . . . . . . . . . . . . . . . . . . 410 Scenario 8-2: Troubleshooting DHCP . . . . . . . . . . . . . . . . . . . . . . . . 411 CHAPTER 9:

Network Security and Availability . . . . . . . . . . . . 413

Understanding Firewalls. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414 Packet Filtering Firewalls. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415 Stateful Packet Inspection Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . 422 Using Network Address Translation (NAT) . . . . . . . . . . . . . . . . . . . . . . . 422 NAT Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423 NAT Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424 NAT Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425 Port Forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426 NAT Implementations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 426 Using a Proxy Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427 Proxy Packet Inspection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428 Adaptive Proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428 Proxy Server Implementations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429 Understanding Security Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430 IPSec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430 Layer Two Tunneling Protocol (L2TP) . . . . . . . . . . . . . . . . . . . . . . . . 435


CONTENTS

Secure Sockets Layer (SSL) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436 Wireless Security Protocols. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437 Providing Fault Tolerance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438 Redundant Power Sources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439 Data Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439 Server Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443 Hot, Warm, and Cold Standbys . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445 Performing Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446 Backup Hardware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447 Backup Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452 Preventing Virus Infections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461 Understanding the Hazards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461 Using Antivirus Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466 Exercise 9-1: Identifying Security Protocols. . . . . . . . . . . . . . . . . . . 466 Exercise 9-2: Data Availability Technologies . . . . . . . . . . . . . . . . . . 466 Exercise 9-3: Distinguishing Between Incremental and Differential Backups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467 Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467 Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469 Scenario 9-1: Designing a Network Backup Solution . . . . . . . . . . 469 Scenario 9-2: Recovering from a Disaster . . . . . . . . . . . . . . . . . . . . 470 CHAPTER 10:

Remote Network Access . . . . . . . . . . . . . . . . . . . . 471

Remote Connection Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472 WAN Connection Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473 Public Switched Telephone Network . . . . . . . . . . . . . . . . . . . . . . . . 473 Integrated Services Digital Network (ISDN) . . . . . . . . . . . . . . . . . . 474 Digital Subscriber Line (DSL) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476 Cable Television (CATV) Networks . . . . . . . . . . . . . . . . . . . . . . . . . . 479 Satellite . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480 Leased Lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480 SONET/Synchronous Digital Hierarchy . . . . . . . . . . . . . . . . . . . . . . 483 X.25 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483 Remote Networking Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 484 Serial Line Internet Protocol (SLIP) . . . . . . . . . . . . . . . . . . . . . . . . . . 484 Point-to-Point Protocol (PPP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 485 Authentication Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490 Point-to-Point Protocol over Ethernet . . . . . . . . . . . . . . . . . . . . . . . 494 Virtual Private Networks (VPNs) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498 Exercise 10-1: Remote Connection Technologies . . . . . . . . . . . . . . 498 Exercise 10-2: WAN Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498 Exercise 10-3: PPP Connection Establishment . . . . . . . . . . . . . . . . 499

xi


xii

CONTENTS

Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499 Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502 Scenario 10-1: Selecting a WAN Technology . . . . . . . . . . . . . . . . . 502 CHAPTER 11:

Network Troubleshooting Tools. . . . . . . . . . . . . . 503

Logs and Indicators. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504 Power and Drive Lights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504 Link Pulse LEDs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504 Speed Indicator LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506 Collision LEDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507 Error Displays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508 Event Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509 Network Management Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513 Performance Monitors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514 Protocol Analyzers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 520 Network Testing and Monitoring Tools . . . . . . . . . . . . . . . . . . . . . . . . . . 527 Crossover Cables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527 Hardware Loopback Connectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528 Tone Generators and Tone Locators . . . . . . . . . . . . . . . . . . . . . . . . . 528 Wire Map Testers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 530 Multifunction Cable Testers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531 Fiber-optic Cable Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533 TCP/IP Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534 Ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534 Traceroute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535 Ifconfig, Ipconfig.exe, and Winipcfg.exe . . . . . . . . . . . . . . . . . . . . . 538 ARP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539 Netstat. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540 Nbtstat.exe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543 Nslookup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547 Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549 Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551 Scenario 11-1: Troubleshooting a Cable Installation . . . . . . . . . . . 551 CHAPTER 12:

Network Troubleshooting Procedures . . . . . . . . 553

Troubleshooting a Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554 Establishing the Symptoms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 554 Identifying the Affected Area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556 Establishing What Has Changed . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557 Selecting the Most Probable Cause . . . . . . . . . . . . . . . . . . . . . . . . . 557 Implementing a Solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558 Testing the Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558


CONTENTS

Recognizing the Potential Effects of the Solution . . . . . . . . . . . . . 559 Documenting the Solution. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559 Network Troubleshooting Scenario: “I Can’t Access a Web Site”. . . . . 560 Incident Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 560 Gathering Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561 Possible Cause: Internet Router Problem . . . . . . . . . . . . . . . . . . . . . 562 Possible Cause: Internet Communication Problem . . . . . . . . . . . . 565 Possible Cause: DNS Failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 566 Possible Cause: LAN Communications Problem . . . . . . . . . . . . . . . 572 Possible Cause: Computer Configuration Problem . . . . . . . . . . . . 577 Possible Cause: User Error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 581 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 584 Exercise 12-1: Network Troubleshooting . . . . . . . . . . . . . . . . . . . . . 584 Exercise 12-2: Network Hardware Problems . . . . . . . . . . . . . . . . . . 585 Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585 Case Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 588 Scenario 12-1: Identifying the Affected Area . . . . . . . . . . . . . . . . . 588 Scenario 12-2: Assigning Priorities . . . . . . . . . . . . . . . . . . . . . . . . . . 588 Scenario 12-3: Locating the Source of a Problem . . . . . . . . . . . . . 589 Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643

xiii


INTRODUCTION Welcome to Network+ Certification. Through lectures, discussions, demonstrations, textbook exercises, and classroom labs, this course teaches you the skills and knowledge necessary to work as an entry-level administrator of a computer network. The 12 chapters in this book walk you through key concepts of networking theory and practice, including a study of protocols, operating systems, and troubleshooting.

TARGET AUDIENCE This textbook was developed for beginning information technology (IT) students who want to learn to support and troubleshoot local area networks (LANs) and wide area networks (WANs) consisting of computers running Microsoft Windows and other operating systems. The target audience will provide direct, frontline user support, either at a help desk or call center, or they will use their knowledge to work in their own network support businesses.

PREREQUISITES This textbook requires students to meet the following prerequisites: ■

A working knowledge of the desktop PC running Microsoft Windows XP or Windows Server 2003

Prerequisite knowledge and coursework as defined by the learning institution and the instructor

THE TEXTBOOK The textbook content has been crafted to provide a meaningful learning experience to students in an academic classroom setting. Key features of the Microsoft Official Academic Course textbooks include the following: ■

Learning objectives for each chapter that prepare the student for the topic areas covered in that chapter.

xv


xvi

Introduction

Chapter introductions that explain why the information is important.

An inviting design with screen shots, diagrams, tables, bulleted lists, and other graphical formats that makes the book easy to comprehend and supports a number of learning styles.

Clear explanations of concepts and principles and frequent exposition of step-by-step procedures.

A variety of reader aids that highlight a wealth of additional information, including: ❑

NOTE Real-world application tips and alternative procedures and explanations of complex procedures and concepts

CAUTION Warnings about mistakes that can result in loss of data or are difficult to resolve

IMPORTANT Explanations of essential setup steps before a procedure and other critical instructions

MORE INFO Additional resources for students

End-of-chapter review questions that assess knowledge and can serve as homework, quizzes, and review activities before or after lectures. (Answers to the textbook questions are available from the instructor.)

Chapter summaries that distill the main ideas in a chapter and reinforce learning.

Case scenarios, approximately two per chapter, that provide students with an opportunity to evaluate, analyze, synthesize, and apply information learned in the chapter.

A comprehensive glossary that defines key terms introduced in the book.

SUPPLEMENTAL MATERIALS ON STUDENT CD This book comes with a Student CD that contains supplemental materials, a variety of informational and learning aids that complement the textbook content. ■

An electronic version of this textbook (eBook). For information about using the eBook, see the section “eBook Instructions” later in this introduction.

An eBook of the Microsoft Encyclopedia of Networking, Second Edition.

Microsoft PowerPoint slides based on textbook chapters, to assist with note-taking.

Microsoft Word Viewer and Microsoft PowerPoint Viewer.


Introduction

A second CD contains a 180-day evaluation edition of Windows Server 2003 Enterprise Edition. The 180-day evaluation edition of Windows Server 2003 Enterprise Edition provided with this book is not the full retail product; it is provided only for the purposes of training and evaluation. Microsoft Technical Support does not support evaluation editions.

eBook Instructions The eBook is in Portable Document Format (PDF) and must be viewed using Adobe Acrobat Reader. 1. Insert the Supplemental Course Materials Student CD into your CDROM drive. If AutoRun is disabled on your machine, refer to the Readme.txt file on the CD. 2. On the user interface menu, select Textbook eBook and follow the prompts. You also can review any of the other eBooks provided for your use. You must have the Student CD in your CD-ROM drive to run the eBook.

THE LAB MANUAL The lab manual is designed for use in either a combined or separate lecture and lab. The exercises in the lab manual correspond to the textbook chapters and are for use in a classroom setting supervised by an instructor. The lab manual presents a rich, hands-on learning experience that encourages practical solutions and strengthens critical problem-solving skills: ■

Lab Exercises teach procedures by using a step-by-step format. Questions interspersed throughout Lab Exercises encourage reflection and critical thinking about the lab activity.

Lab Review Questions appear at the end of each lab and ask questions about the lab. They are designed to promote critical reflection.

Lab Challenges are review activities that ask students to perform a variation on a task they performed in the Lab Exercises but to do so without detailed instructions.

xvii


xviii

Introduction

Troubleshooting Labs, which appear after a number of regular labs and consist of mid-length review projects, are based on true-to-life scenarios. These labs challenge students to “think like an expert” to solve complex problems.

Labs are based on realistic business settings and include an opening scenario and a list of learning objectives.

Students who successfully complete the Lab Exercises, Lab Review Questions, Lab Challenges, and Troubleshooting Labs in the lab manual will have a richer learning experience and deeper understanding of the concepts and methods covered in the course. They will be better able to answer and understand the testbank questions, especially the knowledge application and knowledge synthesis questions. They will also be much better prepared to pass the associated certification exams if they choose to take them.

COVERAGE OF EXAM OBJECTIVES This book is the foundation of a course that is structured around concepts and practical knowledge fundamental to this topic area. In doing so, it also addresses the tasks that are covered in the objectives for the CompTIA Network+ exam. The following table correlates the exam objectives with the textbook chapters and lab manual lab exercises. Students might find this table useful if they decide to take the certification exam. The Microsoft Learning Web site, microsoft.com/learning/, describes the various MCP certification exams and their corresponding courses. It provides up-to-date certification information and explains the certification process and the course options for MCP, as well as specific certifications offered by Microsoft.

NOTE

Textbook and Lab Manual Coverage of Exam Objectives for CompTIA Network+ Objective DOMAIN 1.0: Media and Topologies

1.1 Recognize the following logical or physical network topologies given a schematic diagram or description: ■ Star ■

Bus

Mesh

Ring

Textbook Chapter

Chapter 2

Lab Manual Content


Introduction

Textbook and Lab Manual Coverage of Exam Objectives for CompTIA Network+ Objective

1.2 Specify the main features of 802.2 (Logical Link Control), 802.3 (Ethernet), 802.5 (Token Ring), 802.11 (wireless), and FDDI (Fiber Distributed Data Interface) networking technologies, including: ■ Speed ■

Access method (CSMA/CA [Carrier Sense Multiple Access with Collision Avoidance] and CSMA/CD [Carrier Sense Multiple Access with Collision Detection])

Topology

Textbook Chapter

Lab Manual Content

Chapter 4

Lab 4

Chapter 4

Lab 4

Chapter 2

Lab 2, Lab 3

Media 1.3 Specify the characteristics (for example: speed, length, topology, and cable type) of the following cable standards: ■ 10Base-T and 10Base-FL ■

100Base-TX and 100Base-FX

1000Base-T, 1000Base-CX, 1000Base-SX, and 1000Base-LX

10GBase-SR, 10GBase-LR, and 10GBase-ER 1.4 Recognize the following media connectors or describe their uses, or both: ■ RJ-11 (Registered Jack) ■

RJ-45 (Registered Jack)

F-type

ST (straight tip) SC (subscriber connector or standard connector)

IEEE 1394 (FireWire)

Fiber LC (Local Connector)

MT-RJ (Mechanical Transfer Registered Jack)

USB (universal serial bus)

xix


xx

Introduction

Textbook and Lab Manual Coverage of Exam Objectives for CompTIA Network+ Objective

Textbook Chapter

1.5 Recognize the following media types and Chapter 2 describe their uses: ■ Category 3, 5, 5e, and 6 ■

UTP (unshielded twisted pair)

STP (shielded twisted pair)

Coaxial cable

SMF (Single Mode Fiber) optic cable

Lab Manual Content

Lab 2, Lab 3

MMF (Multimode Fiber) optic cable 1.6 Identify the purposes, features, and functions of the following network components: ■ Hubs ■

Switches

Bridges

Routers

Gateways

CSU/DSU (Channel Service Unit/ Data Service Unit)

NICs (network interface cards)

ISDN (Integrated Services Digital Network) adapters

WAPs (wireless access points)

Modems

Transceivers (media converters)

Chapter 2, Chapter 3, Chapter 9, Chapter 10

Firewalls 1.7 Specify the general characteristics (for Chapter 4 example: carrier speed, frequency, transmission type, and topology) of the following wireless technologies: ■ 802.11 (Frequency hopping spread spectrum) ■

802.11x (Direct sequence spread spectrum)

Infrared

Bluetooth

Lab 2, Lab 3

67779546158  

http://www.ebooksos.com/2006/09/network-certification-package-microsoft-official-academic-course-series/

67779546158  

http://www.ebooksos.com/2006/09/network-certification-package-microsoft-official-academic-course-series/

Advertisement