Network+ guide to networks / Tamara Dean
Material type:

Item type | Current library | Home library | Collection | Shelving location | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|---|---|
![]() |
LRC - Main | National University - Manila | Mobile and Web Applications | General Circulation | GC TK 5105.5 .D43 2013 (Browse shelf (Opens below)) | c.1 | Available | NULIB000008798 |
Includes index.
An introduction to networking --
Why Use Networks? --
Types of Networks --
Peer-to-Peer Networks --
Client/Server Networks --
LANs, MANs, and WANs --
Elements Common to Client/Server Networks --
How Networks Are Used --
File and Print Services --
Access Services --
Communications Services --
Internet Services --
Management Services --
Becoming a Networking Professional --
Mastering the Technical Challenges --
Developing Your Soft Skills --
Pursuing Certification --
Finding a Job in Networking --
Joining Professional Associations --
Chapter Summary --
Key Terms --
Review Questions --
Hands-On Projects --
Case Projects --
Networking Standards Organizations --
ANSI --
EIA and TIA --
IEEE --
ISO --
ITU --
ISOC --
IANA and ICANN --
The OSI Model --
Application Layer --
Presentation Layer --
Session Layer --
Transport Layer --
Network Layer --
Data Link Layer --
Physical Layer --
Applying the OSI Model --
Communication Between Two Systems --
Frame Specifications --
IEEE Networking Specifications --
Chapter Summary --
Key Terms --
Review Questions --
Hands-On Projects --
Case Projects --
Transmission Basics --
Analog and Digital Signaling --
Data Modulation --
Simplex, Half-Duplex, and Duplex --
Multiplexing --
Relationships Between Nodes --
Throughput and Bandwidth --
Baseband and Broadband --
Transmission Flaws --
Common Media Characteristics --
Throughput --
Cost --
Noise Immunity --
Size and Scalability --
Connectors and Media Converters --
Coaxial Cable --
Twisted Pair Cable --
STP (Shielded Twisted Pair) --
UTP (Unshielded Twisted Pair) --
Comparing STP and UTP --
Terminating Twisted Pair Cable --
Fiber-Optic Cable --
SMF (Single-Mode Fiber) --
MMF (Multimode Fiber) --
Fiber-Optic Converters --
Serial Cables --
Structured Cabling --
Best Practices for Cable Installation and Management --
Chapter Summary --
Key Terms --
Review Questions --
Hands-On Projects --
Case Projects --
Characteristics of TCP/IP (Transmission Control Protocol/Internet Protocol) --
The TCP/IP Model --
The TCP/IP Core Protocols --
TCP (Transmission Control Protocol) --
UDP (User Datagram Protocol) --
IP (Internet Protocol) --
IGMP (Internet Group Management Protocol) --
ARP (Address Resolution Protocol) --
ICMP (Internet Control Message Protocol) --
IPv4 Addressing --
Binary and Dotted Decimal Notation --
Subnet Mask --
IPv6 Addressing --
Assigning IP Addresses --
DHCP (Dynamic Host Configuration Protocol) --
Private and Link-Local Addresses --
Sockets and Ports --
Host Names and DNS (Domain Name System) --
Domain Names --
Host Files --
DNS (Domain Name System) --
Configuring DNS --
DDNS (Dynamic DNS) --
Application Layer Protocols --
Telnet --
FTP (File Transfer Protocol) --
TFTP (Trivial File Transfer Protocol) --
NTP (Network Time Protocol) --
PING (Packet Internet Groper) --
Chapter Summary --
Key Terms --
Review Questions --
Hands-On Projects --
Case Projects --
Simple Physical Topologies --
Bus --
Ring --
Star --
Hybrid Topologies --
Star-Wired Ring --
Star-Wired Bus --
Logical Topologies --
Backbone Networks --
Serial Backbone --
Distributed Backbone --
Collapsed Backbone --
Parallel Backbone --
Switching --
Circuit Switching --
Packet Switching --
MPLS (Multiprotocol Label Switching) --
Ethernet --
CSMA/CD (Carrier Sense Multiple Access with Collision Detection) --
Ethernet Standards for Copper Cable --
Ethernet Standards for Fiber-Optic Cable --
10-Gigabit Fiber-Optic Standards --
Summary of Common Ethernet Standards --
Ethernet Frames --
Using and Configuring Frames --
Frame Fields --
Ethernet II (DIX) --
PoE (Power over Ethernet) F --
Chapter Summary --
Key Terms --
Review Questions --
Hands-On Projects --
Case Projects --
NICs (Network Interface Cards) --
Types of NICs --
Installing and Configuring NICs --
Modular Interfaces --
Repeaters and Hubs --
Bridges --
Switches --
Switch Installation --
Switching Methods --
VLANs and Trunking --
STP(Spanning Tree Protocol) --
Content and Multilayer Switches --
Routers --
Router Characteristics and Functions --
Routing Protocols --
Gateways and Other Multifunction Devices --
Chapter Summary --
Key Terms --
Review Questions --
Hands-On Projects --
Case Projects --
WAN Essentials --
WAN Topologies --
Bus --
Ring --
Star --
Mesh --
Tiered --
PSTN --
X.25 and Frame Relay --
ISDN --
T-Carriers --
Types of T-Carriers --
T-Carrier Connectivity --
DSL (Digital Subscriber Line) --
Types of DSL --
DSL Connectivity --
Broadband Cable --
BPL (Broadband over Powerline) --
ATM (Asynchronous Transfer Mode) --
SONET (Synchronous Optical Network) --
WAN Technologies Compared --
Chapter Summary --
Key Terms --
Review Questions --
Hands-On Projects --
Case Projects --
The Wireless Spectrum --
Characteristics of Wireless Transmission --
Antennas --
Signal Propagation --
Signal Degradation. Contents note continued: Frequency Ranges --
Narrowband, Broadband, and Spread-Spectrum Signals --
Fixed vs. Mobile --
WLAN (Wireless LAN Architecture) --
802.11 WLANs --
Access Method --
Association --
Frames --
802.11b --
802.11a --
802.11g --
802.11n --
Implementing a WLAN --
Determining the Design --
Configuring Wireless Connectivity Devices --
Configuring Wireless Clients --
Avoiding Pitfalls --
Wireless WANs --
802.16 (WiMAX) --
Cellular --
Satellite --
Chapter Summary --
Key Terms --
Review Questions --
Hands-On Projects --
Case Projects --
Designing TCP/IP-Based Networks --
Subnetting --
CIDR (Classless Interdomain Routing) --
Subnetting in IPv6 --
Internet Gateways --
Address Translation --
TCP/IP Mail Services --
SMTP (Simple Mail Transfer Protocol) --
MIME (Multipurpose Internet Mail Extensions) --
POP (Post Office Protocol) --
IMAP (Internet Message Access Protocol) --
Additional TCP/IP Utilities --
Ipconfig --
Ifconfig --
Netstat --
Nbtstat --
Hostname, Host, and Nslookup --
Dig --
Traceroute (Tracert) --
Mtr (my traceroute) --
Route --
Chapter Summary --
Key Terms --
Review Questions --
Hands-On Projects --
Case Projects --
Virtualization --
Virtual Network Components --
Virtual Machines and Adapters --
Virtual Switches and Bridges --
Network Connection Types --
Virtual Appliances --
Virtual Networks and VLANs --
Remote Access and Virtual Computing --
Dial-Up Networking --
Remote Access Servers --
Remote Access Protocols --
Remote Virtual Computing --
VPNs (Virtual Private Networks) --
Cloud Computing --
Chapter Summary --
Key Terms --
Review Questions --
Hands-On Projects --
Case Projects --
Security Assessment --
Security Risks --
Risks Associated with People --
Risks Associated with Transmission and Hardware --
Risks Associated with Protocols and Software --
Risks Associated with Internet Access --
An Effective Security Policy --
Security Policy Goals --
Security Policy Content --
Response Policy --
Physical Security --
Security in Network Design --
505 Router Access Lists --
Intrusion Detection and Prevention --
Firewalls --
Proxy Servers --
Scanning Tools --
Lures --
NOS (Network Operating System) Security --
Logon Restrictions --
Passwords --
Encryption --
Key Encryption --
PGP (Pretty Good Privacy) --
SSL (Secure Sockets Layer) --
SSH (Secure Shell) --
SCP (Secure CoPy) and SFTP (Secure File Transfer Protocol) --
IPSec (Internet Protocol Security) --
Authentication Protocols --
RADIUS and TACACS+ --
PAP (Password Authentication Protocol) --
CHAP and MS-CHAP --
EAP (Extensible Authentication Protocol) --
802.1x (EAPoL) --
Kerberos --
Wireless Network Security --
WEP (Wired Equivalent Privacy) --
IEEE 802.11i and WPA (Wi-Fi Protected Access) --
Chapter Summary --
Key Terms --
Review Questions --
Hands-On Projects --
Case Projects --
Terminology --
VoIP Applications and Interfaces --
Analog Telephones --
IP Telephones --
Softphones --
Video-over-IP Applications and Interfaces --
Streaming Video --
IPTV (IP Television) --
Videoconferencing --
Signaling Protocois --
H.323 --
SIP (Session Initiation Protocol) --
MGCP (Media Gateway Control Protocol) and MEGACO (H.248) --
Transport Protocols --
RTP (Real-time Transport Protocol) --
RTCP (Real-time Transport Control Protocol) --
QoS (Quality of Service) Assurance --
RSVP (Resource Reservation Protocol) --
DiffServ (Differentiated Service) --
MPLS (Multiprotocol Label Switching) --
Chapter Summary --
Key Terms --
Review Questions --
Hands-On Projects --
Case Projects --
Troubleshooting Methodology --
Identify the Problem and Its Symptoms --
Establish a Theory of Probable Cause --
Test the Theory to Determine Cause --
Establish a Plan of Action to Resolve the Problem --
Implement the Solution or Escalate as Necessary --
Verify Full System Functionality --
Document Findings, Actions, and Outcomes --
Troubleshooting Tools --
Tone Generator and Tone Locator --
Multimeter --
Cable Continuity Testers --
Cable Performance Testers --
Voltage Event Recorders --
Butt Set --
Network Monitors --
Protocol Analyzers --
Wireless Network Testers --
Chapter Summary --
Key Terms --
Review Questions --
Hands-On Projects --
Case Projects --
What Are Integrity and Availability? --
Malware --
Malware Types and Characteristics --
Malware Protection --
Fault Tolerance --
Environment --
Power --
Network Design --
Servers --
Storage --
Data Backup --
Backup Media and Methods --
Backup Strategy --
Disaster Recovery --
Disaster Recovery Planning --
Disaster Recovery Contingencies --
Chapter Summary --
Key Terms --
Review Questions --
Hands-On Projects --
Case Projects --
Fundamentals of Network Management --
Documentation --
Baseline Measurements --
Policies, Procedures, and Regulations --
Fault and Performance Management --
Network Management Systems --
System and Event Logs --
Traffic Shaping --
Caching --
Asset Management --
Change Management --
Software Changes --
Hardware and Physical Plant Changes --
Chapter Summary --
Key Terms --
Review Questions --
Hands-On Projects --
Case Projects --
Domain 1.0 Networking Concepts-21% of Examination --
Network+ Examination Objectives-Networking Concepts --
Domain 2.0 Network Installation and Configuration-23% of Examination --
Network+ Examination Objectives-Network Installation and Configuration --
Domain 3.0 Network Media and Topologies-17% of Examination --
Network+ Examination Objectives-Network Media and Topologies --
Domain 4.0 Network Management-20% of Examination --
Network+ Examination Objectives-Network Management --
Domain 5.0 Network Security-19% of Examination --
Network+ Examination Objectives-Network Security --
Characteristics of Network Operating Systems --
Network Operating Systems and Servers --
Client Support --
Directory Services --
Sharing Applications --
Sharing Printers --
Managing System Resources --
Windows Server 2008 R2 --
Hardware Requirements --
NTFS (New Technology File System) --
Active Directory --
UNIX and Linux --
Common Characteristics of UNIX and Linux --
Versions of UNIX and Linux --
Hardware Requirements --
Multiprocessing --
Memory Allocation --
The Kernel --
File and Directory Structure --
File Systems --
A UNIX and Linux Command Sampler --
The completely updated NETWORK+ GUIDE TO NETWORKS, 6th Edition gives readers the technical skills and industry know-how required to begin an exciting career installing, configuring, and troubleshooting computer networks. The text also prepares readers for CompTIA's Network+ N10-005 certification exam with fundamentals in protocols, topologies, hardware, and network design. After exploring TCP/IP, Ethernet, wireless transmission, and security concepts, as well as an all-new chapter on virtual networks, readers can increase their knowledge with the practical "On-the Job" stories, Review Questions, Hands-On Projects, and Case Projects. NETWORK+ GUIDE TO NETWORKS, 6th Edition also includes reference appendices, a glossary, and full-color illustrations. The features of the text combined with its emphasis on real-world problem solving, provides readers with the tools they need to succeed in any computing environment.
There are no comments on this title.