1. Trang chủ
  2. » Ngoại Ngữ

Ebook network certification part 1

298 182 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 298
Dung lượng 1,88 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Textbook and Lab Manual Coverage of Exam Objectives for CompTIA Network+ Objective Textbook Chapter Lab Manual Content DOMAIN 1.0: Media and Topologies 1.1 Recognize the following logica

Trang 2

SubAssy Part No X11-77572

Body Part No X11-77574

One Microsoft Way

Redmond, Washington 98052-6399

Copyright © 2006 by Microsoft Corporation

All rights reserved No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher.

Library of Congress Control Number 2005935315

Printed and bound in the United States of America.

1 2 3 4 5 6 7 8 9 QWT 9 8 7 6 5

Distributed in Canada by H.B Fenn and Company Ltd.

A CIP catalogue record for this book is available from the British Library.

Microsoft Press books are available through booksellers and distributors worldwide For further information about international editions, contact your local Microsoft Corporation office or contact Microsoft Press International directly at fax

(425) 936-7329 Visit our Web site at www.microsoft.com/learning/ Send comments to moac@microsoft.com.

Microsoft, Active Directory, MS-DOS, PowerPoint, Windows, Windows NT, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious No association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred.

This book expresses the author’s views and opinions The information contained in this book is provided without any express, statutory, or implied warranties Neither the authors, Microsoft Corporation, nor its resellers, or distributors will be held liable for any damages caused or alleged to be caused either directly or indirectly by this book.

Acquisitions Editor: Lori Oviatt

Project Editor: Laura Sackerman

Trang 3

CHAPTER 1: Networking Basics 1

CHAPTER 2: Network Cabling 39

CHAPTER 3: Network Connection Hardware 93

CHAPTER 4: Data-Link Layer Protocols 143

CHAPTER 5: Network Layer Protocols 191

CHAPTER 6: Transport Layer Protocols 239

CHAPTER 7: TCP/IP 267

CHAPTER 8: Networking Software 339

CHAPTER 9: Network Security and Availability 413

CHAPTER 10: Remote Network Access 471

CHAPTER 11: Network Troubleshooting Tools 503

CHAPTER 12: Network Troubleshooting Procedures 553

Trang 5

Introduction xv

Target Audience xv

Prerequisites xv

The Textbook xv

Supplemental Materials on Student CD xvi

eBook Instructions xvii

The Lab Manual xvii

Coverage of Exam Objectives xviii

The Microsoft Certified Professional Program xxviii

Certifications xxix

MCP Requirements xxix

About the Author xxx

Microsoft Official Academic Course Support xxx

Evaluation Edition Software Support xxxi

CHAPTER 1: Networking Basics 1

Understanding Network Communications 1

Network Media 2

LANs, WANs, and MANs 2

Intranets and Extranets 4

Signals and Protocols 5

Broadband and Baseband Communications 8

Introducing the OSI Reference Model 10

Protocol Interaction 12

Data Encapsulation 13

The Physical Layer 16

The Data-Link Layer 18

The Network Layer 21

The Transport Layer 25

The Session Layer 28

The Presentation Layer 31

The Application Layer 32

Summary 34

Exercises 34

Exercise 1-1: Defining Networking Terms 34

Exercise 1-2: Identifying OSI Layer Functions 35

Exercise 1-3: Associating Protocols with OSI Model Layers 35

Review Questions 35

Trang 6

Case Scenarios 37

Scenario 1-1: Diagnosing a Network Layer Problem 37

Scenario 1-2: Troubleshooting an Internetwork Problem 37

CHAPTER 2: Network Cabling 39

Understanding Network Cables 39

Cable Topologies 40

Cabling Standards 46

Cable Types 48

Pulling Cable 58

External Installations 58

Internal Installations 66

Making Connections 73

Two-Computer Networking 73

Connecting External Cables 76

Connecting Internal Cables 77

Exercises 87

Exercise 2-1: Identifying Network Cable Types 87

Exercise 2-2: Cable Troubleshooting 87

Exercise 2-3: Internal and External Cabling 87

Exercise 2-4: Identifying Cable Installation Tools 88

Review Questions 88

Case Scenarios 90

Scenario 2-1: Installing UTP Cable 90

Scenario 2-2: Expanding a Network 91

CHAPTER 3: Network Connection Hardware 93

Using Network Interface Adapters 94

Understanding Network Interface Adapter Functions 95

Selecting a Network Interface Adapter 100

Installing a Network Interface Adapter 101

Configuring a Network Interface Adapter 103

Installing Network Interface Adapter Drivers 105

Network Adapter Configuration Tools 105

Troubleshooting a Network Interface Adapter 109

Using Network Hubs 110

Understanding Ethernet Hubs 111

Using Media Converters 114

Understanding Token Ring MAUs 115

Using Wireless Access Points (WAPs) 116

Using Advanced Network Connection Devices 117

Bridging 118

Routing 123

Trang 7

Switching 129

Using Gateways 132

Summary 133

Exercises 134

Exercise 3-1: Hub Concepts 134

Exercise 3-2: Bridging Concepts 134

Exercise 3-3: Using Switches 135

Review Questions 136

Case Scenarios 139

Scenario 3-1: Segmenting a Network 139

Scenario 3-2: Boosting Network Performance 141

CHAPTER 4: Data-Link Layer Protocols 143

Ethernet 144

Ethernet Standards 144

The Ethernet Frame 148

CSMA/CD Mechanism 152

Physical Layer Specifications 155

Token Ring 167

Physical Layer Specifications 168

Token Passing 169

Token Ring Frames 171

Fiber Distributed Data Interface (FDDI) 173

Physical Layer Specifications 173

The FDDI Frames 175

Wireless Networking 177

Wireless Networking Standards 178

The IEEE 802.11 Physical Layer 178

The IEEE 802.11 MAC Layer 181

Summary 183

Exercises 184

Exercise 4-1: IEEE Standards and Technologies 184

Exercise 4-2: CSMA/CD Procedures 184

Exercise 4-3: Selecting a Data-Link Layer Protocol 184

Exercise 4-4: FDDI Concepts 185

Exercise 4-5: IEEE 802.11 Concepts 185

Review Questions 186

Case Scenarios 189

Scenario 4-1: Troubleshooting an Ethernet Network 189

Scenario 4-2: Designing an Ethernet Network 189

CHAPTER 5: Network Layer Protocols 191

Internet Protocol (IP) 191

IP Standards 192

Trang 8

IP Functions 193

Data Encapsulation 194

Understanding IP Addressing 205

Internetwork Packet Exchange (IPX) 216

IPX Functions 216

NetBIOS Extended User Interface (NetBEUI) 221

NetBEUI Standards 222

NetBIOS Naming 222

The NetBEUI Frame 223

AppleTalk 227

Datagram Delivery Protocol (DDP) 228

AppleTalk over IP 229

Summary 230

Exercises 231

Exercise 5-1: Understanding IP Functions 231

Exercise 5-2: Calculating Subnet Masks 231

Exercise 5-3: Understanding IPX Properties 232

Exercise 5-4: NBF Protocols 232

Review Questions 232

Case Scenarios 236

Scenario 5-1: Choosing a Network Layer Protocol 236

Scenario 5-2: Subnetting a Class C Address 237

Scenario 5-3: Calculating a Subnet Mask 237

CHAPTER 6: Transport Layer Protocols 239

TCP/IP and the Transport Layer 239

Transmission Control Protocol (TCP) 240

User Datagram Protocol (UDP) 252

Ports and Sockets 254

Novell NetWare and the Transport Layer 256

Sequenced Packet Exchange (SPX) 257

NetWare Core Protocol (NCP) 258

Exercises 262

Exercise 6-1: TCP Header Fields 262

Exercise 6-2: TCP and UDP Functions 262

Exercise 6-3: Port Numbers 263

Review Questions 263

Case Scenarios 265

Scenario 6-1: Troubleshooting TCP 265

Scenario 6-2: Using Port Numbers 266

CHAPTER 7: TCP/IP 267

Introducing TCP/IP 267

Trang 9

TCP/IP Development 268

TCP/IP Standards 271

The TCP/IP Protocol Stack 276

TCP/IP Protocols 278

Link Layer Protocols 278

Address Resolution Protocol (ARP) 278

Internet Protocol (IP) 282

Internet Control Message Protocol (ICMP) 282

Internet Group Management Protocol (IGMP) 288

TCP/IP Transport Layer Protocols 290

Application Layer Protocols 290

IP Routing 293

Understanding Routing 294

Router Products 294

Understanding Routing Tables 295

Building Routing Tables 300

Configuring TCP/IP 311

Configuring TCP/IP in Windows 312

Configuring TCP/IP in UNIX/Linux 323

Configuring TCP/IP in NetWare 327

Summary 329

Exercises 330

Exercise 7-1: TCP/IP Layers and Protocols 330

Exercise 7-2: TCP/IP Protocols 330

Exercise 7-3: Routing Tables 331

Exercise 7-4: Static and Dynamic Routing 331

Exercise 7-5: Windows TCP/IP Configuration Requirements 332

Review Questions 332

Case Scenarios 336

Scenario 7-1: Creating Static Routes 336

Scenario 7-2: Choosing a Routing Method 337

Scenario 7-3: Configuring TCP/IP Clients 338

CHAPTER 8: Networking Software 339

Client/Server and Peer-to-Peer Networking 340

Using Server Operating Systems 341

Microsoft Windows 341

Windows XP Versions 343

Windows Server 2003 Versions 343

Novell NetWare 352

UNIX and Linux 357

Trang 10

Connecting Clients 363

Windows Client Capabilities 364

UNIX/Linux Client Capabilities 371

Macintosh Client Capabilities 372

Understanding Directory Services 374

The NetWare Bindery 374

Novell eDirectory 375

Windows NT Domains 377

Active Directory 378

Network Information System (NIS) 379

Understanding TCP/IP Services 380

Using Dynamic Host Configuration Protocol (DHCP) 381

Understanding Zeroconf 389

Host Files 390

Understanding the Domain Name System (DNS) 391

Windows Internet Name Service (WINS) 401

Exercises 404

Exercise 8-1: Selecting an Operating System 404

Exercise 8-2: Network Operating System Products 404

Exercise 8-3: Directory Service Concepts 405

Exercise 8-4: DHCP Message Types 405

Review Questions 406

Case Scenarios 410

Scenario 8-1: Deploying eDirectory 410

Scenario 8-2: Troubleshooting DHCP 411

CHAPTER 9: Network Security and Availability 413

Understanding Firewalls 414

Packet Filtering Firewalls 415

Stateful Packet Inspection Firewalls 422

Using Network Address Translation (NAT) 422

NAT Communications 423

NAT Types 424

NAT Security 425

Port Forwarding 426

NAT Implementations 426

Using a Proxy Server 427

Proxy Packet Inspection 428

Adaptive Proxy 428

Proxy Server Implementations 429

Understanding Security Protocols 430

IPSec 430

Layer Two Tunneling Protocol (L2TP) 435

Trang 11

Secure Sockets Layer (SSL) 436

Wireless Security Protocols 437

Providing Fault Tolerance 438

Redundant Power Sources 439

Data Availability 439

Server Availability 443

Hot, Warm, and Cold Standbys 445

Performing Backups 446

Backup Hardware 447

Backup Software 452

Preventing Virus Infections 461

Understanding the Hazards 461

Using Antivirus Software 463

Exercises 466

Exercise 9-1: Identifying Security Protocols 466

Exercise 9-2: Data Availability Technologies 466

Exercise 9-3: Distinguishing Between Incremental and Differential Backups 467

Review Questions 467

Case Scenarios 469

Scenario 9-1: Designing a Network Backup Solution 469

Scenario 9-2: Recovering from a Disaster 470

CHAPTER 10: Remote Network Access 471

Remote Connection Requirements 472

WAN Connection Types 473

Public Switched Telephone Network 473

Integrated Services Digital Network (ISDN) 474

Digital Subscriber Line (DSL) 476

Cable Television (CATV) Networks 479

Satellite 480

Leased Lines 480

SONET/Synchronous Digital Hierarchy 483

X.25 483

Remote Networking Protocols 484

Serial Line Internet Protocol (SLIP) 484

Point-to-Point Protocol (PPP) 485

Authentication Protocols 490

Point-to-Point Protocol over Ethernet 494

Virtual Private Networks (VPNs) 494

Exercises 498

Exercise 10-1: Remote Connection Technologies 498

Exercise 10-2: WAN Concepts 498

Exercise 10-3: PPP Connection Establishment 499

Trang 12

Review Questions 499

Case Scenarios 502

Scenario 10-1: Selecting a WAN Technology 502

CHAPTER 11: Network Troubleshooting Tools 503

Logs and Indicators 504

Power and Drive Lights 504

Link Pulse LEDs 504

Speed Indicator LEDs 506

Collision LEDs 507

Error Displays 508

Event Logs 509

Network Management Products 513

Performance Monitors 514

Protocol Analyzers 520

Network Testing and Monitoring Tools 527

Crossover Cables 527

Hardware Loopback Connectors 528

Tone Generators and Tone Locators 528

Wire Map Testers 530

Multifunction Cable Testers 531

Fiber-optic Cable Testing 533

TCP/IP Utilities 534

Ping 534

Traceroute 535

Ifconfig, Ipconfig.exe, and Winipcfg.exe 538

ARP 539

Netstat 540

Nbtstat.exe 543

Nslookup 544

Exercises 547

Review Questions 549

Case Scenarios 551

Scenario 11-1: Troubleshooting a Cable Installation 551

CHAPTER 12: Network Troubleshooting Procedures 553

Troubleshooting a Network 554

Establishing the Symptoms 554

Identifying the Affected Area 556

Establishing What Has Changed 557

Selecting the Most Probable Cause 557

Implementing a Solution 558

Testing the Results 558

Trang 13

Recognizing the Potential Effects of the Solution 559

Documenting the Solution 559

Network Troubleshooting Scenario: “I Can’t Access a Web Site” 560

Incident Administration 560

Gathering Information 561

Possible Cause: Internet Router Problem 562

Possible Cause: Internet Communication Problem 565

Possible Cause: DNS Failure 566

Possible Cause: LAN Communications Problem 572

Possible Cause: Computer Configuration Problem 577

Possible Cause: User Error 581

Exercises 584

Exercise 12-1: Network Troubleshooting 584

Exercise 12-2: Network Hardware Problems 585

Review Questions 585

Case Scenarios 588

Scenario 12-1: Identifying the Affected Area 588

Scenario 12-2: Assigning Priorities 588

Scenario 12-3: Locating the Source of a Problem 589

Glossary 591

Index 643

Trang 15

Welcome to Network+ Certification Through lectures, discussions,

demonstra-tions, textbook exercises, and classroom labs, this course teaches you the skills

and knowledge necessary to work as an entry-level administrator of a computer

network The 12 chapters in this book walk you through key concepts of

net-working theory and practice, including a study of protocols, operating systems,

and troubleshooting

TARGET AUDIENCE

This textbook was developed for beginning information technology (IT) students

who want to learn to support and troubleshoot local area networks (LANs) and

wide area networks (WANs) consisting of computers running Microsoft

Win-dows and other operating systems The target audience will provide direct,

front-line user support, either at a help desk or call center, or they will use their

knowl-edge to work in their own network support businesses

PREREQUISITES

This textbook requires students to meet the following prerequisites:

■ A working knowledge of the desktop PC running Microsoft Windows

XP or Windows Server 2003

■ Prerequisite knowledge and coursework as defined by the learning

institution and the instructor

THE TEXTBOOK

The textbook content has been crafted to provide a meaningful learning

experi-ence to students in an academic classroom setting Key features of the Microsoft

Official Academic Course textbooks include the following:

■ Learning objectives for each chapter that prepare the student for the

topic areas covered in that chapter

Trang 16

■ Chapter introductions that explain why the information is important.

■ An inviting design with screen shots, diagrams, tables, bulleted lists, and other graphical formats that makes the book easy to comprehend and supports a number of learning styles

■ Clear explanations of concepts and principles and frequent exposition

of step-by-step procedures

■ A variety of reader aids that highlight a wealth of additional tion, including:

informa-❑ NOTE Real-world application tips and alternative procedures and

explanations of complex procedures and concepts

CAUTION Warnings about mistakes that can result in loss of data or

are difficult to resolve

IMPORTANT Explanations of essential setup steps before a

proce-dure and other critical instructions

MORE INFO Additional resources for students

■ End-of-chapter review questions that assess knowledge and can serve

as homework, quizzes, and review activities before or after lectures

(Answers to the textbook questions are available from the instructor.)

■ Chapter summaries that distill the main ideas in a chapter and force learning

rein-■ Case scenarios, approximately two per chapter, that provide students with an opportunity to evaluate, analyze, synthesize, and apply infor-mation learned in the chapter

■ A comprehensive glossary that defines key terms introduced in the book

SUPPLEMENTAL MATERIALS ON STUDENT CD

This book comes with a Student CD that contains supplemental materials, a ety of informational and learning aids that complement the textbook content

vari-■ An electronic version of this textbook (eBook) For information about using the eBook, see the section “eBook Instructions” later in this introduction

An eBook of the Microsoft Encyclopedia of Networking, Second Edition.

■ Microsoft PowerPoint slides based on textbook chapters, to assist with note-taking

■ Microsoft Word Viewer and Microsoft PowerPoint Viewer

Trang 17

A second CD contains a 180-day evaluation edition of Windows Server 2003

Enterprise Edition

The 180-day evaluation edition of Windows Server 2003 Enterprise Edition

pro-vided with this book is not the full retail product; it is propro-vided only for the

pur-poses of training and evaluation Microsoft Technical Support does not support

evaluation editions

eBook Instructions

The eBook is in Portable Document Format (PDF) and must be viewed using

Adobe Acrobat Reader

1 Insert the Supplemental Course Materials Student CD into your

CD-ROM drive

If AutoRun is disabled on your machine, refer to the Readme.txt file on

the CD

2 On the user interface menu, select Textbook eBook and follow the

prompts You also can review any of the other eBooks provided for

your use

You must have the Student CD in your CD-ROM drive to run the

eBook

THE LAB MANUAL

The lab manual is designed for use in either a combined or separate lecture and

lab The exercises in the lab manual correspond to the textbook chapters and are

for use in a classroom setting supervised by an instructor

The lab manual presents a rich, hands-on learning experience that encourages

practical solutions and strengthens critical problem-solving skills:

■ Lab Exercises teach procedures by using a step-by-step format

Ques-tions interspersed throughout Lab Exercises encourage reflection and

critical thinking about the lab activity

■ Lab Review Questions appear at the end of each lab and ask questions

about the lab They are designed to promote critical reflection

■ Lab Challenges are review activities that ask students to perform a

vari-ation on a task they performed in the Lab Exercises but to do so

with-out detailed instructions

Trang 18

■ Troubleshooting Labs, which appear after a number of regular labs and consist of mid-length review projects, are based on true-to-life scenar-ios These labs challenge students to “think like an expert” to solve complex problems.

■ Labs are based on realistic business settings and include an opening scenario and a list of learning objectives

Students who successfully complete the Lab Exercises, Lab Review Questions, Lab Challenges, and Troubleshooting Labs in the lab manual will have a richer learning experience and deeper understanding of the concepts and methods cov-ered in the course They will be better able to answer and understand the test-bank questions, especially the knowledge application and knowledge synthesis questions They will also be much better prepared to pass the associated certifica-tion exams if they choose to take them

COVERAGE OF EXAM OBJECTIVES

This book is the foundation of a course that is structured around concepts and practical knowledge fundamental to this topic area In doing so, it also addresses the tasks that are covered in the objectives for the CompTIA Network+ exam The following table correlates the exam objectives with the textbook chapters and lab manual lab exercises Students might find this table useful if they decide to take the certification exam

NOTE The Microsoft Learning Web site, microsoft.com/learning/,

describes the various MCP certification exams and their corresponding courses It provides up-to-date certification information and explains the certification process and the course options for MCP, as well as specific certifications offered by Microsoft

Textbook and Lab Manual Coverage of Exam Objectives for CompTIA Network+ Objective

Textbook Chapter

Lab Manual Content DOMAIN 1.0: Media and Topologies

1.1 Recognize the following logical or

physical network topologies given a

schematic diagram or description:

Trang 19

1.2 Specify the main features of 802.2

(Logical Link Control), 802.3 (Ethernet),

802.5 (Token Ring), 802.11 (wireless), and

FDDI (Fiber Distributed Data Interface)

networking technologies, including:

Sense Multiple Access with Collision

Avoidance] and CSMA/CD [Carrier

Sense Multiple Access with Collision

Detection])

1.3 Specify the characteristics (for example:

speed, length, topology, and cable type) of

the following cable standards:

1000Base-SX, and 1000Base-LX

10GBase-ER

1.4 Recognize the following media

connectors or describe their uses, or both:

■ RJ-11 (Registered Jack)

■ RJ-45 (Registered Jack)

■ ST (straight tip) SC (subscriber

connector or standard connector)

■ MT-RJ (Mechanical Transfer

Lab Manual Content

Trang 20

1.5 Recognize the following media types and

describe their uses:

■ Category 3, 5, 5e, and 6

■ STP (shielded twisted pair)

Lab 3

1.6 Identify the purposes, features, and

functions of the following network

Data Service Unit)

■ NICs (network interface cards)

■ ISDN (Integrated Services Digital

Lab 2, Lab 3

1.7 Specify the general characteristics (for

example: carrier speed, frequency,

transmis-sion type, and topology) of the following

Lab Manual Content

Trang 21

1.8 Identify factors which affect the range

and speed of wireless service (for example:

interference, antenna type, and

environmen-tal factors)

Chapter 4

DOMAIN 2.0: Protocols and Standards

2.1 Identify a MAC (Media Access Control)

address and its parts

2.2 Identify the seven layers of the OSI

(Open Systems Interconnect) model and

their functions

2.3 Identify the OSI layers at which the

following network components operate:

2.4 Differentiate between the following

network protocols in terms of routing,

addressing schemes, interoperability, and

naming conventions:

Exchange/Sequence Packet

Exchange)

System Extended User Interface)

2.5 Identify the components and structure of

IP addresses (IPv4, IPv6) and the required

setting for connections across the Internet

Lab 6, Lab 72.6 Identify classful IP ranges and their

subnet masks (for example: Class A, B,

and C)

Lab 6, Lab 72.7 Identify the purpose of subnetting Chapter 5,

Chapter 7

Lab 7, Lab 8

Textbook and Lab Manual Coverage of Exam Objectives for CompTIA Network+

Objective

Textbook Chapter

Lab Manual Content

Trang 22

2.8 Identify the differences between public

and private network addressing schemes

Chapter 5

2.9 Identify and differentiate between the

following IP addressing methods:

Lab 8

2.10 Define the purpose, function and use of

the following protocols used in the TCP/IP

suite:

■ FTP (File Transfer Protocol)

■ SFTP (Secure File Transfer Protocol)

■ TFTP (Trivial File Transfer Protocol)

■ SMTP (Simple Mail Transfer Protocol)

Secure)

version 3/Internet Message Access Protocol version 4)

Protocol)

Protocol/Reverse Address Resolution Protocol)

Protocol)

Textbook and Lab Manual Coverage of Exam Objectives for CompTIA Network+ Objective

Textbook Chapter

Lab Manual Content

Trang 23

2.11 Define the function of TCP/UDP

(Transmission Control Protocol/User

Data-gram Protocol) ports

2.12 Identify the well-known ports

associated with the following commonly

used services and protocols:

2.13 Identify the purpose of network

services and protocols (for example: DNS,

NAT [Network Address Translation], ICS

[Internet Connection Sharing], WINS

[Win-dows Internet Name Service], SNMP [Simple

Network Management Protocol], NFS

[Net-work File System], Zeroconf [Zero

configura-tion], SMB [Server Message Block], AFP

[Apple File Protocol], LPD [Line Printer

Dae-mon], and Samba)

Chapter 8, Chapter 9

Lab 8, Lab 10

Textbook and Lab Manual Coverage of Exam Objectives for CompTIA Network+

Objective

Textbook Chapter

Lab Manual Content

Trang 24

2.14 Identify the basic characteristics (for

example: speed, capacity, and media) of the

following WAN technologies:

Packet switching

Circuit switching

■ T1 (T Carrier level 1)/E1/J1

■ T3 (T Carrier level 3)/E3/J3

■ X.25

Chapter 10

2.15 Identify the basic characteristics of the

following Internet access technologies:

■ xDSL (Digital Subscriber Line)

Service/Public Switched Telephone Network)

Chapter 10

2.16 Define the function of the following

remote access protocols and services:

■ PPP (Point-to-Point Protocol)

■ SLIP (Serial Line Internet Protocol)

■ PPPoE (Point-to-Point Protocol over

Ethernet)

■ PPTP (Point-to-Point Tunneling

Protocol)

Textbook and Lab Manual Coverage of Exam Objectives for CompTIA Network+ Objective

Textbook Chapter

Lab Manual Content

Trang 25

2.17 Identify the following security protocols

and describe their purpose and function:

■ IPSec (IP security)

2.18 Identify authentication protocols (for

example: CHAP [Challenge Handshake

Authentication Protocol], MS-CHAP

[Microsoft Challenge Handshake

Authentica-tion Protocol], PAP [Password AuthenticaAuthentica-tion

Protocol], RADIUS [Remote Authentication

Dial-In User Service], Kerberos, and EAP

[Extensible Authentication Protocol])

Chapter 10

DOMAIN 3.0: Network Implementation

3.1 Identify the basic capabilities (for

exam-ple: client support, interoperability,

authen-tication, file and print services, application

support, and security) of the following

server operating systems to access network

3.2 Identify the basic capabilities needed for

client workstations to connect to and use

net-work resources (for example: media, netnet-work

protocols, and peer and server services)

3.3 Identify the appropriate tool for a given

wiring task (for example: wire crimper,

media tester/certifier, punchdown tool, or

tone generator)

Chapter 2, Chapter 11

Textbook and Lab Manual Coverage of Exam Objectives for CompTIA Network+

Objective

Textbook Chapter

Lab Manual Content

Trang 26

3.4 Given a remote connectivity scenario

comprised of a protocol, an authentication

scheme, and physical connectivity, configure

the connection Includes connection to the

3.5 Identify the purpose, benefits, and

characteristics of using a firewall

Lab 103.6 Identify the purpose, benefits, and

characteristics of using a proxy service

3.7 Given a connectivity scenario, determine

the impact on network functionality of a

par-ticular security implementation (for

exam-ple: port blocking/filtering, authentication,

and encryption)

3.8 Identify the main characteristics of

VLANs (virtual local area networks)

Chapter 3

3.9 Identify the main characteristics and

purpose of extranets and intranets

Chapter 1

3.10 Identify the purpose, benefits, and

characteristics of using antivirus software

Hot and cold spares

Hot, warm, and cold sites

Textbook and Lab Manual Coverage of Exam Objectives for CompTIA Network+ Objective

Textbook Chapter

Lab Manual Content

Trang 27

DOMAIN 4.0: Network Support

4.1 Given a troubleshooting scenario, select

the appropriate network utility from among

4.2 Given output from a network diagnostic

utility (for example, those utilities listed in

objective 4.1), identify the utility and

inter-pret the output

4.3 Given a network scenario, interpret

visual indicators (for example: link LEDs

[light-emitting diodes] and collision LEDs to

determine the nature of a stated problem.)

Chapter 11

4.4 Given a troubleshooting scenario

involving a client accessing remote network

services, identify the cause of the problem

(for example: file services, print services,

authentication failure, protocol

configura-tion, physical connectivity, and SOHO

[Small Office/Home Office] router)

4.5 Given a troubleshooting scenario between

a client and the following server

environ-ments, identify the cause of a stated problem:

Lab Manual Content

Trang 28

MICROSOFT CERTIFIED PROFESSIONAL PROGRAM

The Microsoft Certified Professional (MCP) program is one way to prove your proficiency with current Microsoft products and technologies These exams and corresponding certifications are developed to validate your mastery of critical competencies as you design and develop, or implement and support, solutions using Microsoft products and technologies Computer professionals who become

4.6 Given a scenario, determine the impact

of modifying, adding, or removing network

services (for example: DHCP [Dynamic Host

Configuration Protocol], DNS, and WINS)

for network resources and users

4.7 Given a troubleshooting scenario

involving a network with a particular

physi-cal topology (for example: bus, star, mesh,

or ring) and including a network diagram,

identify the network area affected and the

cause of the stated failure

4.8 Given a network troubleshooting

scenario involving an infrastructure (for

example: wired or wireless) problem,

iden-tify the cause of a stated problem (for

exam-ple: bad media, interference, network

hardware, or environment)

4.9 Given a network problem scenario,

select an appropriate course of action based

on a logical troubleshooting strategy This

strategy can include the following steps:

1 Identify the symptoms and potential

causes

2 Identify the affected area

3 Establish what has changed

4 Select the most probable cause

5 Implement an action plan and solution

including potential effects

6 Test the result

7 Identify the results and effects of the

Lab Manual Content

Trang 29

Microsoft certified are recognized as experts and are sought after industry-wide

Certification brings a variety of benefits to the individual and to employers and

organizations For a full list of MCP benefits, go to microsoft.com/learning/itpro/

default.asp.

Certifications

The MCP program offers multiple certifications, based on specific areas of

techni-cal expertise The certifications offered are as follows:

■ Microsoft Certified Professional (MCP) In-depth knowledge of at

least one Windows operating system or architecturally significant

plat-form An MCP is qualified to implement a Microsoft product or

tech-nology as part of a business solution for an organization

■ Microsoft Certified Systems Engineer (MCSE) Qualified to

effec-tively analyze the business requirements for business solutions and

design and implement the infrastructure based on the Windows and

Windows Server 2003 operating systems

manage and troubleshoot existing network and system environments

based on the Windows and Windows Server 2003 operating systems

to design, implement, and administer Microsoft SQL Server databases

(MCDST) Qualified to support end users and to troubleshoot

desk-top environments on the Windows operating system

MCP Requirements

Requirements differ for each certification and are specific to the products and job

functions addressed by the certification To become an MCP you must pass

rigor-ous certification exams that provide a valid and reliable measure of technical

pro-ficiency and expertise These exams are designed to test your expertise and ability

to perform a role or task with a product, and they are developed with the input of

industry professionals Exam questions reflect how Microsoft products are used

in actual organizations, giving them real-world relevance The requirements for

each certification are as follows:

■ Microsoft Certified Professional (MCP) candidates are required to pass

one current Microsoft certification exam Candidates can pass

addi-tional Microsoft certification exams to validate their skills with other

Microsoft products, development tools, or desktop applications

Trang 30

■ Microsoft Certified Systems Engineer (MCSE) candidates are required

to pass five core exams and two elective exams

■ Microsoft Certified Systems Administrator (MCSA) candidates are required to pass three core exams and one elective exam

■ Microsoft Certified Database Administrator (MCDBA) candidates are required to pass three core exams and one elective exam

■ Microsoft Certified Desktop Support Technician (MCDST) candidates are required to pass two core exams

ABOUT THE AUTHOR

Craig Zacker is a writer, editor, and networker whose computing experience

began in the days of teletypes and paper tape After making the move from computers to PCs, he worked as an administrator of Novell NetWare networks and as a PC support technician while operating a freelance desktop publishing business After earning a masters degree in English and American literature from New York University, Craig worked extensively on the integration of Microsoft Windows NT into existing internetworks, supported fleets of Windows worksta-tions, and was employed as a technical writer, content provider, and Webmaster for the online services group of a large software company Since devoting himself

mini-to writing and editing full-time, Craig has written or contributed mini-to many books

on networking topics, operating systems, and PC hardware, including Microsoft

Official Academic Course: Implementing and Administering Security in a Microsoft Windows Server 2003 Network (70-299) and Windows XP Pro: The Missing Manual

He has also developed educational texts for college courses and online training courses for the Web and has published articles in top industry publications For

more information on Craig’s books and other works, see zacker.com.

MICROSOFT OFFICIAL ACADEMIC COURSE SUPPORT

Every effort has been made to ensure the accuracy of the material in this book and the contents of the companion CD Microsoft Learning provides corrections for books through the World Wide Web at the following address:

microsoft.com/learning/support/

To connect directly to the Microsoft Learning Knowledge Base and enter a query regarding a question or issue that you have, go to:

microsoft.com/learning/support/search.asp

Trang 31

If you have comments, questions, or ideas regarding this book or the companion

CD that are not answered by querying the Knowledge Base, please send them to

Microsoft Learning by e-mail to:

moac@microsoft.com

Or send them by postal mail to:

Microsoft Learning

Attn: Network+ Certification Editor

One Microsoft Way

Redmond, WA 98052-6399

Please note that product support is not offered through the preceding addresses

EVALUATION EDITION SOFTWARE SUPPORT

A 180-day software evaluation edition of Windows Server 2003 Enterprise

Edi-tion is provided with this textbook This version is not the full retail product and

is provided only for training and evaluation purposes Microsoft and Microsoft

Technical Support do not support this evaluation edition It differs from the retail

version only in that Microsoft and Microsoft Technical Support does not support

it, and it expires after 180 days For information about issues relating to the use of

evaluation editions, go to the Support section of the Microsoft Learning Web site

(microsoft.com/learning/support/)

For online support information relating to the full version of Windows Server

2003 Enterprise Edition that might also apply to the evaluation edition, go to

support.microsoft.com For information about ordering the full version of any

Microsoft software, call Microsoft Sales at (800) 426-9400 or visit microsoft.com.

Trang 33

NETWORKING BASICS

Upon completion of this chapter, you will be able to:

■ List the services provided by network protocols.

■ Describe how protocols enable networked computers to communicate.

■ Identify the layers of the OSI reference model.

■ Describe the functions associated with each of the OSI model layers.

This chapter introduces the basic principles and architectural structures of

com-puter network communications There are many kinds of data networks—from an

enterprise network used by a large corporation to a simple two-node local area

network (LAN) used in a private home However, many of the same principles

apply to all networks, regardless of size or complexity The concepts and

struc-tures discussed in this chapter are referred to repeatedly in the rest of this

text-book as well as in real-life networking situations Even if you skip other chapters

in this book, you should read and fully understand this one You will need it—

both for the rest of the course and on the job

UNDERSTANDING NETWORK COMMUNICATIONS

When you connect two or more computers so they can communicate, you create

a data network This is true whether you connect the computers with cables,

wireless technologies such as infrared or radio waves, or modems and telephone

lines Therefore, although most people might not be aware of it, connecting to the

Internet in any way makes your computer part of a data network

Computers are generally networked for two reasons: to share hardware resources

and to share data For example, networking enables multiple computers to share a

single printer or to open the same documents Resource sharing was the original

motivation for creating computer networks, and all the technologies you will learn

about in this course are designed to facilitate this end efficiently and securely

Trang 34

Network Media

The technology connecting networked computers, no matter what form it takes,

is called the network medium Copper-based cables are the most common form

of network medium, but a network can also use fiber-optic cables (which are metallic) as its medium or it can use a variety of wireless media An individual or

non-a compnon-any cnon-an own the network medium, or non-a third-pnon-arty service provider such

as a telephone company can provide it

When you purchase the equipment needed to connect multiple computers in your home, for example, the cables you install are the network medium and you are completely responsible for them When you use a dial-up modem to connect your computer to an Internet service provider (ISP), your local telephone com-pany provides the network medium connecting your computer to the ISP’s server These same principles apply to a business network, whether it connects a handful

of computers or tens of thousands The company owns the network medium that connects computers in the same location, while outside providers usually supply the network media for longer distance connections

NOTE Compound Media The network medium connecting two puters doesn’t have to consist of one single technology For example, when you connect to your ISP using a dial-up modem connection, the sig-nals transmitted by your computer might pass through a standard tele-phone cable connecting your modem to the wall jack, through a copper cable connecting your home to a local telephone company facility, through

com-a fiber-optic ccom-able in the telephone compcom-any’s own network, com-and then through another copper cable leading to the ISP’s computer When you are using an outside provider for network connectivity, you often have no way of knowing exactly what types of media are being used

LANs, WANs, and MANs

A LAN is a group of computers located within relatively close proximity and connected by a common medium, such as a particular type of cable Each computer or other communicating device on the LAN is called a node A LAN

is characterized by three primary attributes: its topology, its medium, and its tocols The topology is the pattern in which the computers are connected In a bus topology, a network cable connects each computer to the next one, forming a chain In a star topology, each computer is connected to a central nexus called a hub or switch A ring topology is essentially a bus network with the two ends joined together You’ll learn more about the various types of network topologies and how they affect network communications in Chapter 2

Trang 35

pro-The network medium, as defined previously, is the actual physical connection

between the networked computers The topology and the medium used on a

par-ticular LAN are specified by the protocol operating at the data-link layer of the

International Organization for Standardization (OSI) model, such as Ethernet or

Token Ring You will learn more about protocols and the OSI model layers later in

this chapter and throughout the course Ethernet, for example, supports several

topologies and media When building a new LAN, you typically select one

topol-ogy and medium, such as unshielded twisted pair (UTP) cable in a star topoltopol-ogy,

and use the same topology and medium for all the computers on that LAN There

are, however, hardware products that let you connect computers to the same LAN

with different media You might use these products when you have two existing

networks that you want to connect together by using different types of cable

or when you want to combine cabled and wireless systems on the same LAN

In most cases a LAN is confined to a room, a floor, or, perhaps, a building To

expand the network beyond these limits, you can connect multiple LANs using

devices called routers This forms an internetwork, which is essentially a network

of networks A computer on one LAN can communicate with the systems on

another LAN if the two LANs are connected using a router By connecting LANs

in this way, you can build an internetwork as large as you need The term network

is often used when describing a LAN, but just as often the term is used to refer to

an internetwork

NOTE Internetworks and the Internet It’s important to distinguish

between the generic term internetwork (with a lowercase “i”), which is any

collection of interconnected LANs, and the Internet The Internet is the

ultimate example of an internetwork, but not every internetwork involves

the Internet

In many cases an internetwork is composed of LANs in distant locations

To connect remote LANs, you use a different type of network connection: a wide

area network (WAN) connection WAN connections can use telephone lines,

radio waves, or any one of many other technologies, typically furnished by

an outside provider such as a telephone company WAN links are usually

point-to-point connections, meaning that they connect only two systems This is in

direct contrast to a LAN, which can connect many systems together using a

shared network medium An example of a WAN connection would be the case of

Trang 36

a company with two offices in distant cities, each with its own LAN and nected by a leased telephone line This type of WAN connection is illustrated in Figure 1-1.

con-Ft01np01

Figure 1-1 A WAN connection

Each end of the leased line is connected to a router, and the routers are connected

to the individual LAN at each site Routers are essential when you connect LANs using a WAN link because WANs almost invariably use different media than LANs and you need a router to connect two different network types Using the WAN connection, a computer on either LAN can communicate with any com-puter on the other LAN

You’ll learn about the various types of communications technologies used to create WAN connections in Chapter 10 Routers and other network connection devices are covered in Chapter 3

In addition to LANs and WANs, another type of network deserves mention here, even though it’s not critical to this course A metropolitan area network (MAN) is

a data network that services an area larger than a LAN does and smaller than a WAN does The most common types of MAN implementation seen today are the fiber-optic networks run by cable television (CATV) providers When you access the Internet using your CATV network, you share bandwidth with your neigh-bors because you are all connected to the same Ethernet MAN

Intranets and Extranets

Two other terms commonly associated with business networking are intranet and extranet These terms aren’t actually descriptions of network types Instead, they describe methods of accessing a network An intranet is a private Transmission Control Protocol/Internet Protocol (TCP/IP) network with resources that are accessible only by internal members of the organization running the network

WAN

Chicago

LAN Router

New York

LAN Router

Trang 37

The most common example of an intranet is a company network running a Web

server that’s accessible only by the employees of the company The Web server

might host internal information such as client lists or human resources

docu-ments The firewall that protects the company network from intruders on the

Internet also prevents outsiders from accessing the intranet resources

An extranet is essentially an intranet with resources made available to a select

group of outside users For example, a company might maintain an extranet that

permits its clients to access servers that provide them with order status, inventory

data, or other information Extranets are always secured, so that outside access

to these resources is limited to individuals with the appropriate credentials,

typically a user name and password The same firewall that protects a company

intranet from outside intrusion can also protect an extranet from access by

unauthorized users

Signals and Protocols

Computers can communicate over a network in many ways and for many

rea-sons, but much of the networking process is not directly concerned with the

nature of the data transmitted over the network medium By the time the data

generated by the transmitting computer reaches the cable or other medium, it has

been reduced to signals that are native to that medium These signals might be

electrical voltages on a copper cable network, pulses of light on a fiber-optic cable

network, or infrared or radio waves on a wireless network

These signals form a code that the network interface in a receiving computer

converts back into the binary data understood by the software running on that

computer The computer then interprets the binary data, converting it into

infor-mation it can use in a variety of ways Of course there is a great deal more to the

network communications process than this description indicates, but one of the

primary elements of computer networking is the reduction of complex data

struc-tures into simple signals that can be transmitted over a network medium and

then converted back into the same data structures on the destination system The

software components that perform this reduction on a computer are known

collectively as the protocol stack, shown in Figure 1-2 At the top of the stack are

the applications running on the computer and at the bottom is the connection to

the network medium

Trang 38

Figure 1-2 A networked computer’s protocol stack

In some cases a network consists of computers that are nearly identical; they run the same version of the same operating system and use all the same applications Other networks consist of different computing platforms, all running entirely dif-ferent software It might seem that the identical computers would communicate more easily than the different ones would, and in some ways this is true But no matter what kind of computers the network uses or what software the computers are running, they must have a common language to understand one another These common languages are called protocols, and computers use many of them during even the simplest exchanges of network data Just as two people must speak a common language to communicate, two computers must have one or more protocols in common The various protocols running on a computer com-prise the stack that connects the applications and the network medium

A network protocol can be relatively simple or highly complex The bottom ponent of the protocol stack defines the sequence of signals transmitted over the network medium In this case the protocol is simply a code—such as a pattern of electrical voltages—that defines the binary value of a bit of data: 0 or 1

com-The concept is the same as that of Morse code, in which a pattern of dots and dashes represents a letter of the alphabet

More complicated networking protocols can provide a variety of services, ing the following:

includ-Application

Protocol stack

Network medium

Trang 39

■ Packet acknowledgment The transmission of a return message by

the recipient to verify the receipt of a packet or packets A packet is the

fundamental unit of data transmitted over a data network

■ Segmentation The division of a lengthy data stream into segments

sufficiently small for transmission over the network inside packets

■ Flow control The generation, by a receiving system, of messages that

instruct the sending system to speed up or slow down its rate of

trans-mission

■ Error detection The inclusion in a packet of special codes used by

the receiving system to verify that the content of the packet wasn’t

damaged in transit

■ Error correction The retransmission of packets that have been

garbled or lost in transit

transmitted over a network by eliminating redundant information

■ Data encryption A mechanism for protecting the data transmitted

over a network by encoding it using a cryptographic key already

known by the receiving system

In most cases protocols are based on public standards developed and published

by an independent committee rather than a single manufacturer or developer

Public standards ensure the interoperability of different types of systems because

manufacturers can use the protocols without incurring any obligation to a

partic-ular company There are still a few proprietary protocols in use, however, that

have been developed by a single company and have never been released into the

public domain

Some of the organizations that are responsible for the protocol standards used

today are as follows:

■ Institute of Electrical and Electronics Engineers (IEEE) The

U.S.-based society responsible for the publication of the IEEE 802

working group, which includes the standards that define the protocols

commonly known as Ethernet and Token Ring, as well as many others

world-wide federation of standards bodies from over 100 countries,

responsi-ble for the publication of the OSI reference model document

non-profit organization that administers and coordinates the U.S voluntary

Trang 40

standardization and conformity assessment system ANSI is the official U.S representative to the ISO, as well as to several other inter-national bodies.

con-tributors and consultants that collaborates to develop and publish standards for Internet technologies, including the TCP/IP protocols

Alliance (TIA/ EIA) Two organizations that have joined together to develop and publish the Commercial Building Telecommunications Wiring Standards, which define how the cables for data networks should be installed

within which governments and the private sector work together to coordinate the operation of telecommunication networks and services and to advance the development of communications technology

ITU-T was formerly known as the Comité Consultatif International Téléphonique et Télégraphique (CCITT)

One of the most important things to remember about computer networking is that all the computers on a network use many protocols during the communica-tions process and all of these protocols work together to form the protocol stack For example, you might see a reference to an Ethernet network in a book or an article Although Ethernet is certainly a protocol running on the network that the author is discussing, it’s not the only protocol running on the network Many other protocols are running at the same time, and, although they might not be as relevant to the author’s subject as Ethernet is, they are no less important to the overall networking process

Broadband and Baseband Communications

In most cases LANs use a shared network medium All the computers on the LAN are connected to a network that can carry only one signal at a time, and the sys-tems take turns using it This type of network is called a baseband network

To make sharing a baseband network among many computers practical, the data transmitted by each system is broken up into discrete packets If you were to tap into the cable of a baseband network and interpret the signals as they flow by, you would see a succession of packets generated by various systems and destined for various systems, as shown in Figure 1-3

Ngày đăng: 23/04/2015, 12:00

TỪ KHÓA LIÊN QUAN