Textbook and Lab Manual Coverage of Exam Objectives for CompTIA Network+ Objective Textbook Chapter Lab Manual Content DOMAIN 1.0: Media and Topologies 1.1 Recognize the following logica
Trang 2SubAssy Part No X11-77572
Body Part No X11-77574
One Microsoft Way
Redmond, Washington 98052-6399
Copyright © 2006 by Microsoft Corporation
All rights reserved No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher.
Library of Congress Control Number 2005935315
Printed and bound in the United States of America.
1 2 3 4 5 6 7 8 9 QWT 9 8 7 6 5
Distributed in Canada by H.B Fenn and Company Ltd.
A CIP catalogue record for this book is available from the British Library.
Microsoft Press books are available through booksellers and distributors worldwide For further information about international editions, contact your local Microsoft Corporation office or contact Microsoft Press International directly at fax
(425) 936-7329 Visit our Web site at www.microsoft.com/learning/ Send comments to moac@microsoft.com.
Microsoft, Active Directory, MS-DOS, PowerPoint, Windows, Windows NT, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious No association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred.
This book expresses the author’s views and opinions The information contained in this book is provided without any express, statutory, or implied warranties Neither the authors, Microsoft Corporation, nor its resellers, or distributors will be held liable for any damages caused or alleged to be caused either directly or indirectly by this book.
Acquisitions Editor: Lori Oviatt
Project Editor: Laura Sackerman
Trang 3CHAPTER 1: Networking Basics 1
CHAPTER 2: Network Cabling 39
CHAPTER 3: Network Connection Hardware 93
CHAPTER 4: Data-Link Layer Protocols 143
CHAPTER 5: Network Layer Protocols 191
CHAPTER 6: Transport Layer Protocols 239
CHAPTER 7: TCP/IP 267
CHAPTER 8: Networking Software 339
CHAPTER 9: Network Security and Availability 413
CHAPTER 10: Remote Network Access 471
CHAPTER 11: Network Troubleshooting Tools 503
CHAPTER 12: Network Troubleshooting Procedures 553
Trang 5Introduction xv
Target Audience xv
Prerequisites xv
The Textbook xv
Supplemental Materials on Student CD xvi
eBook Instructions xvii
The Lab Manual xvii
Coverage of Exam Objectives xviii
The Microsoft Certified Professional Program xxviii
Certifications xxix
MCP Requirements xxix
About the Author xxx
Microsoft Official Academic Course Support xxx
Evaluation Edition Software Support xxxi
CHAPTER 1: Networking Basics 1
Understanding Network Communications 1
Network Media 2
LANs, WANs, and MANs 2
Intranets and Extranets 4
Signals and Protocols 5
Broadband and Baseband Communications 8
Introducing the OSI Reference Model 10
Protocol Interaction 12
Data Encapsulation 13
The Physical Layer 16
The Data-Link Layer 18
The Network Layer 21
The Transport Layer 25
The Session Layer 28
The Presentation Layer 31
The Application Layer 32
Summary 34
Exercises 34
Exercise 1-1: Defining Networking Terms 34
Exercise 1-2: Identifying OSI Layer Functions 35
Exercise 1-3: Associating Protocols with OSI Model Layers 35
Review Questions 35
Trang 6Case Scenarios 37
Scenario 1-1: Diagnosing a Network Layer Problem 37
Scenario 1-2: Troubleshooting an Internetwork Problem 37
CHAPTER 2: Network Cabling 39
Understanding Network Cables 39
Cable Topologies 40
Cabling Standards 46
Cable Types 48
Pulling Cable 58
External Installations 58
Internal Installations 66
Making Connections 73
Two-Computer Networking 73
Connecting External Cables 76
Connecting Internal Cables 77
Exercises 87
Exercise 2-1: Identifying Network Cable Types 87
Exercise 2-2: Cable Troubleshooting 87
Exercise 2-3: Internal and External Cabling 87
Exercise 2-4: Identifying Cable Installation Tools 88
Review Questions 88
Case Scenarios 90
Scenario 2-1: Installing UTP Cable 90
Scenario 2-2: Expanding a Network 91
CHAPTER 3: Network Connection Hardware 93
Using Network Interface Adapters 94
Understanding Network Interface Adapter Functions 95
Selecting a Network Interface Adapter 100
Installing a Network Interface Adapter 101
Configuring a Network Interface Adapter 103
Installing Network Interface Adapter Drivers 105
Network Adapter Configuration Tools 105
Troubleshooting a Network Interface Adapter 109
Using Network Hubs 110
Understanding Ethernet Hubs 111
Using Media Converters 114
Understanding Token Ring MAUs 115
Using Wireless Access Points (WAPs) 116
Using Advanced Network Connection Devices 117
Bridging 118
Routing 123
Trang 7Switching 129
Using Gateways 132
Summary 133
Exercises 134
Exercise 3-1: Hub Concepts 134
Exercise 3-2: Bridging Concepts 134
Exercise 3-3: Using Switches 135
Review Questions 136
Case Scenarios 139
Scenario 3-1: Segmenting a Network 139
Scenario 3-2: Boosting Network Performance 141
CHAPTER 4: Data-Link Layer Protocols 143
Ethernet 144
Ethernet Standards 144
The Ethernet Frame 148
CSMA/CD Mechanism 152
Physical Layer Specifications 155
Token Ring 167
Physical Layer Specifications 168
Token Passing 169
Token Ring Frames 171
Fiber Distributed Data Interface (FDDI) 173
Physical Layer Specifications 173
The FDDI Frames 175
Wireless Networking 177
Wireless Networking Standards 178
The IEEE 802.11 Physical Layer 178
The IEEE 802.11 MAC Layer 181
Summary 183
Exercises 184
Exercise 4-1: IEEE Standards and Technologies 184
Exercise 4-2: CSMA/CD Procedures 184
Exercise 4-3: Selecting a Data-Link Layer Protocol 184
Exercise 4-4: FDDI Concepts 185
Exercise 4-5: IEEE 802.11 Concepts 185
Review Questions 186
Case Scenarios 189
Scenario 4-1: Troubleshooting an Ethernet Network 189
Scenario 4-2: Designing an Ethernet Network 189
CHAPTER 5: Network Layer Protocols 191
Internet Protocol (IP) 191
IP Standards 192
Trang 8IP Functions 193
Data Encapsulation 194
Understanding IP Addressing 205
Internetwork Packet Exchange (IPX) 216
IPX Functions 216
NetBIOS Extended User Interface (NetBEUI) 221
NetBEUI Standards 222
NetBIOS Naming 222
The NetBEUI Frame 223
AppleTalk 227
Datagram Delivery Protocol (DDP) 228
AppleTalk over IP 229
Summary 230
Exercises 231
Exercise 5-1: Understanding IP Functions 231
Exercise 5-2: Calculating Subnet Masks 231
Exercise 5-3: Understanding IPX Properties 232
Exercise 5-4: NBF Protocols 232
Review Questions 232
Case Scenarios 236
Scenario 5-1: Choosing a Network Layer Protocol 236
Scenario 5-2: Subnetting a Class C Address 237
Scenario 5-3: Calculating a Subnet Mask 237
CHAPTER 6: Transport Layer Protocols 239
TCP/IP and the Transport Layer 239
Transmission Control Protocol (TCP) 240
User Datagram Protocol (UDP) 252
Ports and Sockets 254
Novell NetWare and the Transport Layer 256
Sequenced Packet Exchange (SPX) 257
NetWare Core Protocol (NCP) 258
Exercises 262
Exercise 6-1: TCP Header Fields 262
Exercise 6-2: TCP and UDP Functions 262
Exercise 6-3: Port Numbers 263
Review Questions 263
Case Scenarios 265
Scenario 6-1: Troubleshooting TCP 265
Scenario 6-2: Using Port Numbers 266
CHAPTER 7: TCP/IP 267
Introducing TCP/IP 267
Trang 9TCP/IP Development 268
TCP/IP Standards 271
The TCP/IP Protocol Stack 276
TCP/IP Protocols 278
Link Layer Protocols 278
Address Resolution Protocol (ARP) 278
Internet Protocol (IP) 282
Internet Control Message Protocol (ICMP) 282
Internet Group Management Protocol (IGMP) 288
TCP/IP Transport Layer Protocols 290
Application Layer Protocols 290
IP Routing 293
Understanding Routing 294
Router Products 294
Understanding Routing Tables 295
Building Routing Tables 300
Configuring TCP/IP 311
Configuring TCP/IP in Windows 312
Configuring TCP/IP in UNIX/Linux 323
Configuring TCP/IP in NetWare 327
Summary 329
Exercises 330
Exercise 7-1: TCP/IP Layers and Protocols 330
Exercise 7-2: TCP/IP Protocols 330
Exercise 7-3: Routing Tables 331
Exercise 7-4: Static and Dynamic Routing 331
Exercise 7-5: Windows TCP/IP Configuration Requirements 332
Review Questions 332
Case Scenarios 336
Scenario 7-1: Creating Static Routes 336
Scenario 7-2: Choosing a Routing Method 337
Scenario 7-3: Configuring TCP/IP Clients 338
CHAPTER 8: Networking Software 339
Client/Server and Peer-to-Peer Networking 340
Using Server Operating Systems 341
Microsoft Windows 341
Windows XP Versions 343
Windows Server 2003 Versions 343
Novell NetWare 352
UNIX and Linux 357
Trang 10Connecting Clients 363
Windows Client Capabilities 364
UNIX/Linux Client Capabilities 371
Macintosh Client Capabilities 372
Understanding Directory Services 374
The NetWare Bindery 374
Novell eDirectory 375
Windows NT Domains 377
Active Directory 378
Network Information System (NIS) 379
Understanding TCP/IP Services 380
Using Dynamic Host Configuration Protocol (DHCP) 381
Understanding Zeroconf 389
Host Files 390
Understanding the Domain Name System (DNS) 391
Windows Internet Name Service (WINS) 401
Exercises 404
Exercise 8-1: Selecting an Operating System 404
Exercise 8-2: Network Operating System Products 404
Exercise 8-3: Directory Service Concepts 405
Exercise 8-4: DHCP Message Types 405
Review Questions 406
Case Scenarios 410
Scenario 8-1: Deploying eDirectory 410
Scenario 8-2: Troubleshooting DHCP 411
CHAPTER 9: Network Security and Availability 413
Understanding Firewalls 414
Packet Filtering Firewalls 415
Stateful Packet Inspection Firewalls 422
Using Network Address Translation (NAT) 422
NAT Communications 423
NAT Types 424
NAT Security 425
Port Forwarding 426
NAT Implementations 426
Using a Proxy Server 427
Proxy Packet Inspection 428
Adaptive Proxy 428
Proxy Server Implementations 429
Understanding Security Protocols 430
IPSec 430
Layer Two Tunneling Protocol (L2TP) 435
Trang 11Secure Sockets Layer (SSL) 436
Wireless Security Protocols 437
Providing Fault Tolerance 438
Redundant Power Sources 439
Data Availability 439
Server Availability 443
Hot, Warm, and Cold Standbys 445
Performing Backups 446
Backup Hardware 447
Backup Software 452
Preventing Virus Infections 461
Understanding the Hazards 461
Using Antivirus Software 463
Exercises 466
Exercise 9-1: Identifying Security Protocols 466
Exercise 9-2: Data Availability Technologies 466
Exercise 9-3: Distinguishing Between Incremental and Differential Backups 467
Review Questions 467
Case Scenarios 469
Scenario 9-1: Designing a Network Backup Solution 469
Scenario 9-2: Recovering from a Disaster 470
CHAPTER 10: Remote Network Access 471
Remote Connection Requirements 472
WAN Connection Types 473
Public Switched Telephone Network 473
Integrated Services Digital Network (ISDN) 474
Digital Subscriber Line (DSL) 476
Cable Television (CATV) Networks 479
Satellite 480
Leased Lines 480
SONET/Synchronous Digital Hierarchy 483
X.25 483
Remote Networking Protocols 484
Serial Line Internet Protocol (SLIP) 484
Point-to-Point Protocol (PPP) 485
Authentication Protocols 490
Point-to-Point Protocol over Ethernet 494
Virtual Private Networks (VPNs) 494
Exercises 498
Exercise 10-1: Remote Connection Technologies 498
Exercise 10-2: WAN Concepts 498
Exercise 10-3: PPP Connection Establishment 499
Trang 12Review Questions 499
Case Scenarios 502
Scenario 10-1: Selecting a WAN Technology 502
CHAPTER 11: Network Troubleshooting Tools 503
Logs and Indicators 504
Power and Drive Lights 504
Link Pulse LEDs 504
Speed Indicator LEDs 506
Collision LEDs 507
Error Displays 508
Event Logs 509
Network Management Products 513
Performance Monitors 514
Protocol Analyzers 520
Network Testing and Monitoring Tools 527
Crossover Cables 527
Hardware Loopback Connectors 528
Tone Generators and Tone Locators 528
Wire Map Testers 530
Multifunction Cable Testers 531
Fiber-optic Cable Testing 533
TCP/IP Utilities 534
Ping 534
Traceroute 535
Ifconfig, Ipconfig.exe, and Winipcfg.exe 538
ARP 539
Netstat 540
Nbtstat.exe 543
Nslookup 544
Exercises 547
Review Questions 549
Case Scenarios 551
Scenario 11-1: Troubleshooting a Cable Installation 551
CHAPTER 12: Network Troubleshooting Procedures 553
Troubleshooting a Network 554
Establishing the Symptoms 554
Identifying the Affected Area 556
Establishing What Has Changed 557
Selecting the Most Probable Cause 557
Implementing a Solution 558
Testing the Results 558
Trang 13Recognizing the Potential Effects of the Solution 559
Documenting the Solution 559
Network Troubleshooting Scenario: “I Can’t Access a Web Site” 560
Incident Administration 560
Gathering Information 561
Possible Cause: Internet Router Problem 562
Possible Cause: Internet Communication Problem 565
Possible Cause: DNS Failure 566
Possible Cause: LAN Communications Problem 572
Possible Cause: Computer Configuration Problem 577
Possible Cause: User Error 581
Exercises 584
Exercise 12-1: Network Troubleshooting 584
Exercise 12-2: Network Hardware Problems 585
Review Questions 585
Case Scenarios 588
Scenario 12-1: Identifying the Affected Area 588
Scenario 12-2: Assigning Priorities 588
Scenario 12-3: Locating the Source of a Problem 589
Glossary 591
Index 643
Trang 15Welcome to Network+ Certification Through lectures, discussions,
demonstra-tions, textbook exercises, and classroom labs, this course teaches you the skills
and knowledge necessary to work as an entry-level administrator of a computer
network The 12 chapters in this book walk you through key concepts of
net-working theory and practice, including a study of protocols, operating systems,
and troubleshooting
TARGET AUDIENCE
This textbook was developed for beginning information technology (IT) students
who want to learn to support and troubleshoot local area networks (LANs) and
wide area networks (WANs) consisting of computers running Microsoft
Win-dows and other operating systems The target audience will provide direct,
front-line user support, either at a help desk or call center, or they will use their
knowl-edge to work in their own network support businesses
PREREQUISITES
This textbook requires students to meet the following prerequisites:
■ A working knowledge of the desktop PC running Microsoft Windows
XP or Windows Server 2003
■ Prerequisite knowledge and coursework as defined by the learning
institution and the instructor
THE TEXTBOOK
The textbook content has been crafted to provide a meaningful learning
experi-ence to students in an academic classroom setting Key features of the Microsoft
Official Academic Course textbooks include the following:
■ Learning objectives for each chapter that prepare the student for the
topic areas covered in that chapter
Trang 16■ Chapter introductions that explain why the information is important.
■ An inviting design with screen shots, diagrams, tables, bulleted lists, and other graphical formats that makes the book easy to comprehend and supports a number of learning styles
■ Clear explanations of concepts and principles and frequent exposition
of step-by-step procedures
■ A variety of reader aids that highlight a wealth of additional tion, including:
informa-❑ NOTE Real-world application tips and alternative procedures and
explanations of complex procedures and concepts
❑ CAUTION Warnings about mistakes that can result in loss of data or
are difficult to resolve
❑ IMPORTANT Explanations of essential setup steps before a
proce-dure and other critical instructions
❑ MORE INFO Additional resources for students
■ End-of-chapter review questions that assess knowledge and can serve
as homework, quizzes, and review activities before or after lectures
(Answers to the textbook questions are available from the instructor.)
■ Chapter summaries that distill the main ideas in a chapter and force learning
rein-■ Case scenarios, approximately two per chapter, that provide students with an opportunity to evaluate, analyze, synthesize, and apply infor-mation learned in the chapter
■ A comprehensive glossary that defines key terms introduced in the book
SUPPLEMENTAL MATERIALS ON STUDENT CD
This book comes with a Student CD that contains supplemental materials, a ety of informational and learning aids that complement the textbook content
vari-■ An electronic version of this textbook (eBook) For information about using the eBook, see the section “eBook Instructions” later in this introduction
■ An eBook of the Microsoft Encyclopedia of Networking, Second Edition.
■ Microsoft PowerPoint slides based on textbook chapters, to assist with note-taking
■ Microsoft Word Viewer and Microsoft PowerPoint Viewer
Trang 17A second CD contains a 180-day evaluation edition of Windows Server 2003
Enterprise Edition
The 180-day evaluation edition of Windows Server 2003 Enterprise Edition
pro-vided with this book is not the full retail product; it is propro-vided only for the
pur-poses of training and evaluation Microsoft Technical Support does not support
evaluation editions
eBook Instructions
The eBook is in Portable Document Format (PDF) and must be viewed using
Adobe Acrobat Reader
1 Insert the Supplemental Course Materials Student CD into your
CD-ROM drive
If AutoRun is disabled on your machine, refer to the Readme.txt file on
the CD
2 On the user interface menu, select Textbook eBook and follow the
prompts You also can review any of the other eBooks provided for
your use
You must have the Student CD in your CD-ROM drive to run the
eBook
THE LAB MANUAL
The lab manual is designed for use in either a combined or separate lecture and
lab The exercises in the lab manual correspond to the textbook chapters and are
for use in a classroom setting supervised by an instructor
The lab manual presents a rich, hands-on learning experience that encourages
practical solutions and strengthens critical problem-solving skills:
■ Lab Exercises teach procedures by using a step-by-step format
Ques-tions interspersed throughout Lab Exercises encourage reflection and
critical thinking about the lab activity
■ Lab Review Questions appear at the end of each lab and ask questions
about the lab They are designed to promote critical reflection
■ Lab Challenges are review activities that ask students to perform a
vari-ation on a task they performed in the Lab Exercises but to do so
with-out detailed instructions
Trang 18■ Troubleshooting Labs, which appear after a number of regular labs and consist of mid-length review projects, are based on true-to-life scenar-ios These labs challenge students to “think like an expert” to solve complex problems.
■ Labs are based on realistic business settings and include an opening scenario and a list of learning objectives
Students who successfully complete the Lab Exercises, Lab Review Questions, Lab Challenges, and Troubleshooting Labs in the lab manual will have a richer learning experience and deeper understanding of the concepts and methods cov-ered in the course They will be better able to answer and understand the test-bank questions, especially the knowledge application and knowledge synthesis questions They will also be much better prepared to pass the associated certifica-tion exams if they choose to take them
COVERAGE OF EXAM OBJECTIVES
This book is the foundation of a course that is structured around concepts and practical knowledge fundamental to this topic area In doing so, it also addresses the tasks that are covered in the objectives for the CompTIA Network+ exam The following table correlates the exam objectives with the textbook chapters and lab manual lab exercises Students might find this table useful if they decide to take the certification exam
NOTE The Microsoft Learning Web site, microsoft.com/learning/,
describes the various MCP certification exams and their corresponding courses It provides up-to-date certification information and explains the certification process and the course options for MCP, as well as specific certifications offered by Microsoft
Textbook and Lab Manual Coverage of Exam Objectives for CompTIA Network+ Objective
Textbook Chapter
Lab Manual Content DOMAIN 1.0: Media and Topologies
1.1 Recognize the following logical or
physical network topologies given a
schematic diagram or description:
Trang 191.2 Specify the main features of 802.2
(Logical Link Control), 802.3 (Ethernet),
802.5 (Token Ring), 802.11 (wireless), and
FDDI (Fiber Distributed Data Interface)
networking technologies, including:
Sense Multiple Access with Collision
Avoidance] and CSMA/CD [Carrier
Sense Multiple Access with Collision
Detection])
1.3 Specify the characteristics (for example:
speed, length, topology, and cable type) of
the following cable standards:
1000Base-SX, and 1000Base-LX
10GBase-ER
1.4 Recognize the following media
connectors or describe their uses, or both:
■ RJ-11 (Registered Jack)
■ RJ-45 (Registered Jack)
■ ST (straight tip) SC (subscriber
connector or standard connector)
■ MT-RJ (Mechanical Transfer
Lab Manual Content
Trang 201.5 Recognize the following media types and
describe their uses:
■ Category 3, 5, 5e, and 6
■ STP (shielded twisted pair)
Lab 3
1.6 Identify the purposes, features, and
functions of the following network
Data Service Unit)
■ NICs (network interface cards)
■ ISDN (Integrated Services Digital
Lab 2, Lab 3
1.7 Specify the general characteristics (for
example: carrier speed, frequency,
transmis-sion type, and topology) of the following
Lab Manual Content
Trang 211.8 Identify factors which affect the range
and speed of wireless service (for example:
interference, antenna type, and
environmen-tal factors)
Chapter 4
DOMAIN 2.0: Protocols and Standards
2.1 Identify a MAC (Media Access Control)
address and its parts
2.2 Identify the seven layers of the OSI
(Open Systems Interconnect) model and
their functions
2.3 Identify the OSI layers at which the
following network components operate:
2.4 Differentiate between the following
network protocols in terms of routing,
addressing schemes, interoperability, and
naming conventions:
Exchange/Sequence Packet
Exchange)
System Extended User Interface)
2.5 Identify the components and structure of
IP addresses (IPv4, IPv6) and the required
setting for connections across the Internet
Lab 6, Lab 72.6 Identify classful IP ranges and their
subnet masks (for example: Class A, B,
and C)
Lab 6, Lab 72.7 Identify the purpose of subnetting Chapter 5,
Chapter 7
Lab 7, Lab 8
Textbook and Lab Manual Coverage of Exam Objectives for CompTIA Network+
Objective
Textbook Chapter
Lab Manual Content
Trang 222.8 Identify the differences between public
and private network addressing schemes
Chapter 5
2.9 Identify and differentiate between the
following IP addressing methods:
Lab 8
2.10 Define the purpose, function and use of
the following protocols used in the TCP/IP
suite:
■ FTP (File Transfer Protocol)
■ SFTP (Secure File Transfer Protocol)
■ TFTP (Trivial File Transfer Protocol)
■ SMTP (Simple Mail Transfer Protocol)
Secure)
version 3/Internet Message Access Protocol version 4)
Protocol)
Protocol/Reverse Address Resolution Protocol)
Protocol)
Textbook and Lab Manual Coverage of Exam Objectives for CompTIA Network+ Objective
Textbook Chapter
Lab Manual Content
Trang 232.11 Define the function of TCP/UDP
(Transmission Control Protocol/User
Data-gram Protocol) ports
2.12 Identify the well-known ports
associated with the following commonly
used services and protocols:
2.13 Identify the purpose of network
services and protocols (for example: DNS,
NAT [Network Address Translation], ICS
[Internet Connection Sharing], WINS
[Win-dows Internet Name Service], SNMP [Simple
Network Management Protocol], NFS
[Net-work File System], Zeroconf [Zero
configura-tion], SMB [Server Message Block], AFP
[Apple File Protocol], LPD [Line Printer
Dae-mon], and Samba)
Chapter 8, Chapter 9
Lab 8, Lab 10
Textbook and Lab Manual Coverage of Exam Objectives for CompTIA Network+
Objective
Textbook Chapter
Lab Manual Content
Trang 242.14 Identify the basic characteristics (for
example: speed, capacity, and media) of the
following WAN technologies:
Packet switching
Circuit switching
■ T1 (T Carrier level 1)/E1/J1
■ T3 (T Carrier level 3)/E3/J3
■ X.25
Chapter 10
2.15 Identify the basic characteristics of the
following Internet access technologies:
■ xDSL (Digital Subscriber Line)
Service/Public Switched Telephone Network)
Chapter 10
2.16 Define the function of the following
remote access protocols and services:
■ PPP (Point-to-Point Protocol)
■ SLIP (Serial Line Internet Protocol)
■ PPPoE (Point-to-Point Protocol over
Ethernet)
■ PPTP (Point-to-Point Tunneling
Protocol)
Textbook and Lab Manual Coverage of Exam Objectives for CompTIA Network+ Objective
Textbook Chapter
Lab Manual Content
Trang 252.17 Identify the following security protocols
and describe their purpose and function:
■ IPSec (IP security)
2.18 Identify authentication protocols (for
example: CHAP [Challenge Handshake
Authentication Protocol], MS-CHAP
[Microsoft Challenge Handshake
Authentica-tion Protocol], PAP [Password AuthenticaAuthentica-tion
Protocol], RADIUS [Remote Authentication
Dial-In User Service], Kerberos, and EAP
[Extensible Authentication Protocol])
Chapter 10
DOMAIN 3.0: Network Implementation
3.1 Identify the basic capabilities (for
exam-ple: client support, interoperability,
authen-tication, file and print services, application
support, and security) of the following
server operating systems to access network
3.2 Identify the basic capabilities needed for
client workstations to connect to and use
net-work resources (for example: media, netnet-work
protocols, and peer and server services)
3.3 Identify the appropriate tool for a given
wiring task (for example: wire crimper,
media tester/certifier, punchdown tool, or
tone generator)
Chapter 2, Chapter 11
Textbook and Lab Manual Coverage of Exam Objectives for CompTIA Network+
Objective
Textbook Chapter
Lab Manual Content
Trang 263.4 Given a remote connectivity scenario
comprised of a protocol, an authentication
scheme, and physical connectivity, configure
the connection Includes connection to the
3.5 Identify the purpose, benefits, and
characteristics of using a firewall
Lab 103.6 Identify the purpose, benefits, and
characteristics of using a proxy service
3.7 Given a connectivity scenario, determine
the impact on network functionality of a
par-ticular security implementation (for
exam-ple: port blocking/filtering, authentication,
and encryption)
3.8 Identify the main characteristics of
VLANs (virtual local area networks)
Chapter 3
3.9 Identify the main characteristics and
purpose of extranets and intranets
Chapter 1
3.10 Identify the purpose, benefits, and
characteristics of using antivirus software
Hot and cold spares
Hot, warm, and cold sites
Textbook and Lab Manual Coverage of Exam Objectives for CompTIA Network+ Objective
Textbook Chapter
Lab Manual Content
Trang 27DOMAIN 4.0: Network Support
4.1 Given a troubleshooting scenario, select
the appropriate network utility from among
4.2 Given output from a network diagnostic
utility (for example, those utilities listed in
objective 4.1), identify the utility and
inter-pret the output
4.3 Given a network scenario, interpret
visual indicators (for example: link LEDs
[light-emitting diodes] and collision LEDs to
determine the nature of a stated problem.)
Chapter 11
4.4 Given a troubleshooting scenario
involving a client accessing remote network
services, identify the cause of the problem
(for example: file services, print services,
authentication failure, protocol
configura-tion, physical connectivity, and SOHO
[Small Office/Home Office] router)
4.5 Given a troubleshooting scenario between
a client and the following server
environ-ments, identify the cause of a stated problem:
Lab Manual Content
Trang 28MICROSOFT CERTIFIED PROFESSIONAL PROGRAM
The Microsoft Certified Professional (MCP) program is one way to prove your proficiency with current Microsoft products and technologies These exams and corresponding certifications are developed to validate your mastery of critical competencies as you design and develop, or implement and support, solutions using Microsoft products and technologies Computer professionals who become
4.6 Given a scenario, determine the impact
of modifying, adding, or removing network
services (for example: DHCP [Dynamic Host
Configuration Protocol], DNS, and WINS)
for network resources and users
4.7 Given a troubleshooting scenario
involving a network with a particular
physi-cal topology (for example: bus, star, mesh,
or ring) and including a network diagram,
identify the network area affected and the
cause of the stated failure
4.8 Given a network troubleshooting
scenario involving an infrastructure (for
example: wired or wireless) problem,
iden-tify the cause of a stated problem (for
exam-ple: bad media, interference, network
hardware, or environment)
4.9 Given a network problem scenario,
select an appropriate course of action based
on a logical troubleshooting strategy This
strategy can include the following steps:
1 Identify the symptoms and potential
causes
2 Identify the affected area
3 Establish what has changed
4 Select the most probable cause
5 Implement an action plan and solution
including potential effects
6 Test the result
7 Identify the results and effects of the
Lab Manual Content
Trang 29Microsoft certified are recognized as experts and are sought after industry-wide
Certification brings a variety of benefits to the individual and to employers and
organizations For a full list of MCP benefits, go to microsoft.com/learning/itpro/
default.asp.
Certifications
The MCP program offers multiple certifications, based on specific areas of
techni-cal expertise The certifications offered are as follows:
■ Microsoft Certified Professional (MCP) In-depth knowledge of at
least one Windows operating system or architecturally significant
plat-form An MCP is qualified to implement a Microsoft product or
tech-nology as part of a business solution for an organization
■ Microsoft Certified Systems Engineer (MCSE) Qualified to
effec-tively analyze the business requirements for business solutions and
design and implement the infrastructure based on the Windows and
Windows Server 2003 operating systems
manage and troubleshoot existing network and system environments
based on the Windows and Windows Server 2003 operating systems
to design, implement, and administer Microsoft SQL Server databases
(MCDST) Qualified to support end users and to troubleshoot
desk-top environments on the Windows operating system
MCP Requirements
Requirements differ for each certification and are specific to the products and job
functions addressed by the certification To become an MCP you must pass
rigor-ous certification exams that provide a valid and reliable measure of technical
pro-ficiency and expertise These exams are designed to test your expertise and ability
to perform a role or task with a product, and they are developed with the input of
industry professionals Exam questions reflect how Microsoft products are used
in actual organizations, giving them real-world relevance The requirements for
each certification are as follows:
■ Microsoft Certified Professional (MCP) candidates are required to pass
one current Microsoft certification exam Candidates can pass
addi-tional Microsoft certification exams to validate their skills with other
Microsoft products, development tools, or desktop applications
Trang 30■ Microsoft Certified Systems Engineer (MCSE) candidates are required
to pass five core exams and two elective exams
■ Microsoft Certified Systems Administrator (MCSA) candidates are required to pass three core exams and one elective exam
■ Microsoft Certified Database Administrator (MCDBA) candidates are required to pass three core exams and one elective exam
■ Microsoft Certified Desktop Support Technician (MCDST) candidates are required to pass two core exams
ABOUT THE AUTHOR
Craig Zacker is a writer, editor, and networker whose computing experience
began in the days of teletypes and paper tape After making the move from computers to PCs, he worked as an administrator of Novell NetWare networks and as a PC support technician while operating a freelance desktop publishing business After earning a masters degree in English and American literature from New York University, Craig worked extensively on the integration of Microsoft Windows NT into existing internetworks, supported fleets of Windows worksta-tions, and was employed as a technical writer, content provider, and Webmaster for the online services group of a large software company Since devoting himself
mini-to writing and editing full-time, Craig has written or contributed mini-to many books
on networking topics, operating systems, and PC hardware, including Microsoft
Official Academic Course: Implementing and Administering Security in a Microsoft Windows Server 2003 Network (70-299) and Windows XP Pro: The Missing Manual
He has also developed educational texts for college courses and online training courses for the Web and has published articles in top industry publications For
more information on Craig’s books and other works, see zacker.com.
MICROSOFT OFFICIAL ACADEMIC COURSE SUPPORT
Every effort has been made to ensure the accuracy of the material in this book and the contents of the companion CD Microsoft Learning provides corrections for books through the World Wide Web at the following address:
microsoft.com/learning/support/
To connect directly to the Microsoft Learning Knowledge Base and enter a query regarding a question or issue that you have, go to:
microsoft.com/learning/support/search.asp
Trang 31If you have comments, questions, or ideas regarding this book or the companion
CD that are not answered by querying the Knowledge Base, please send them to
Microsoft Learning by e-mail to:
moac@microsoft.com
Or send them by postal mail to:
Microsoft Learning
Attn: Network+ Certification Editor
One Microsoft Way
Redmond, WA 98052-6399
Please note that product support is not offered through the preceding addresses
EVALUATION EDITION SOFTWARE SUPPORT
A 180-day software evaluation edition of Windows Server 2003 Enterprise
Edi-tion is provided with this textbook This version is not the full retail product and
is provided only for training and evaluation purposes Microsoft and Microsoft
Technical Support do not support this evaluation edition It differs from the retail
version only in that Microsoft and Microsoft Technical Support does not support
it, and it expires after 180 days For information about issues relating to the use of
evaluation editions, go to the Support section of the Microsoft Learning Web site
(microsoft.com/learning/support/)
For online support information relating to the full version of Windows Server
2003 Enterprise Edition that might also apply to the evaluation edition, go to
support.microsoft.com For information about ordering the full version of any
Microsoft software, call Microsoft Sales at (800) 426-9400 or visit microsoft.com.
Trang 33NETWORKING BASICS
Upon completion of this chapter, you will be able to:
■ List the services provided by network protocols.
■ Describe how protocols enable networked computers to communicate.
■ Identify the layers of the OSI reference model.
■ Describe the functions associated with each of the OSI model layers.
This chapter introduces the basic principles and architectural structures of
com-puter network communications There are many kinds of data networks—from an
enterprise network used by a large corporation to a simple two-node local area
network (LAN) used in a private home However, many of the same principles
apply to all networks, regardless of size or complexity The concepts and
struc-tures discussed in this chapter are referred to repeatedly in the rest of this
text-book as well as in real-life networking situations Even if you skip other chapters
in this book, you should read and fully understand this one You will need it—
both for the rest of the course and on the job
UNDERSTANDING NETWORK COMMUNICATIONS
When you connect two or more computers so they can communicate, you create
a data network This is true whether you connect the computers with cables,
wireless technologies such as infrared or radio waves, or modems and telephone
lines Therefore, although most people might not be aware of it, connecting to the
Internet in any way makes your computer part of a data network
Computers are generally networked for two reasons: to share hardware resources
and to share data For example, networking enables multiple computers to share a
single printer or to open the same documents Resource sharing was the original
motivation for creating computer networks, and all the technologies you will learn
about in this course are designed to facilitate this end efficiently and securely
Trang 34Network Media
The technology connecting networked computers, no matter what form it takes,
is called the network medium Copper-based cables are the most common form
of network medium, but a network can also use fiber-optic cables (which are metallic) as its medium or it can use a variety of wireless media An individual or
non-a compnon-any cnon-an own the network medium, or non-a third-pnon-arty service provider such
as a telephone company can provide it
When you purchase the equipment needed to connect multiple computers in your home, for example, the cables you install are the network medium and you are completely responsible for them When you use a dial-up modem to connect your computer to an Internet service provider (ISP), your local telephone com-pany provides the network medium connecting your computer to the ISP’s server These same principles apply to a business network, whether it connects a handful
of computers or tens of thousands The company owns the network medium that connects computers in the same location, while outside providers usually supply the network media for longer distance connections
NOTE Compound Media The network medium connecting two puters doesn’t have to consist of one single technology For example, when you connect to your ISP using a dial-up modem connection, the sig-nals transmitted by your computer might pass through a standard tele-phone cable connecting your modem to the wall jack, through a copper cable connecting your home to a local telephone company facility, through
com-a fiber-optic ccom-able in the telephone compcom-any’s own network, com-and then through another copper cable leading to the ISP’s computer When you are using an outside provider for network connectivity, you often have no way of knowing exactly what types of media are being used
LANs, WANs, and MANs
A LAN is a group of computers located within relatively close proximity and connected by a common medium, such as a particular type of cable Each computer or other communicating device on the LAN is called a node A LAN
is characterized by three primary attributes: its topology, its medium, and its tocols The topology is the pattern in which the computers are connected In a bus topology, a network cable connects each computer to the next one, forming a chain In a star topology, each computer is connected to a central nexus called a hub or switch A ring topology is essentially a bus network with the two ends joined together You’ll learn more about the various types of network topologies and how they affect network communications in Chapter 2
Trang 35pro-The network medium, as defined previously, is the actual physical connection
between the networked computers The topology and the medium used on a
par-ticular LAN are specified by the protocol operating at the data-link layer of the
International Organization for Standardization (OSI) model, such as Ethernet or
Token Ring You will learn more about protocols and the OSI model layers later in
this chapter and throughout the course Ethernet, for example, supports several
topologies and media When building a new LAN, you typically select one
topol-ogy and medium, such as unshielded twisted pair (UTP) cable in a star topoltopol-ogy,
and use the same topology and medium for all the computers on that LAN There
are, however, hardware products that let you connect computers to the same LAN
with different media You might use these products when you have two existing
networks that you want to connect together by using different types of cable
or when you want to combine cabled and wireless systems on the same LAN
In most cases a LAN is confined to a room, a floor, or, perhaps, a building To
expand the network beyond these limits, you can connect multiple LANs using
devices called routers This forms an internetwork, which is essentially a network
of networks A computer on one LAN can communicate with the systems on
another LAN if the two LANs are connected using a router By connecting LANs
in this way, you can build an internetwork as large as you need The term network
is often used when describing a LAN, but just as often the term is used to refer to
an internetwork
NOTE Internetworks and the Internet It’s important to distinguish
between the generic term internetwork (with a lowercase “i”), which is any
collection of interconnected LANs, and the Internet The Internet is the
ultimate example of an internetwork, but not every internetwork involves
the Internet
In many cases an internetwork is composed of LANs in distant locations
To connect remote LANs, you use a different type of network connection: a wide
area network (WAN) connection WAN connections can use telephone lines,
radio waves, or any one of many other technologies, typically furnished by
an outside provider such as a telephone company WAN links are usually
point-to-point connections, meaning that they connect only two systems This is in
direct contrast to a LAN, which can connect many systems together using a
shared network medium An example of a WAN connection would be the case of
Trang 36a company with two offices in distant cities, each with its own LAN and nected by a leased telephone line This type of WAN connection is illustrated in Figure 1-1.
con-Ft01np01
Figure 1-1 A WAN connection
Each end of the leased line is connected to a router, and the routers are connected
to the individual LAN at each site Routers are essential when you connect LANs using a WAN link because WANs almost invariably use different media than LANs and you need a router to connect two different network types Using the WAN connection, a computer on either LAN can communicate with any com-puter on the other LAN
You’ll learn about the various types of communications technologies used to create WAN connections in Chapter 10 Routers and other network connection devices are covered in Chapter 3
In addition to LANs and WANs, another type of network deserves mention here, even though it’s not critical to this course A metropolitan area network (MAN) is
a data network that services an area larger than a LAN does and smaller than a WAN does The most common types of MAN implementation seen today are the fiber-optic networks run by cable television (CATV) providers When you access the Internet using your CATV network, you share bandwidth with your neigh-bors because you are all connected to the same Ethernet MAN
Intranets and Extranets
Two other terms commonly associated with business networking are intranet and extranet These terms aren’t actually descriptions of network types Instead, they describe methods of accessing a network An intranet is a private Transmission Control Protocol/Internet Protocol (TCP/IP) network with resources that are accessible only by internal members of the organization running the network
WAN
Chicago
LAN Router
New York
LAN Router
Trang 37The most common example of an intranet is a company network running a Web
server that’s accessible only by the employees of the company The Web server
might host internal information such as client lists or human resources
docu-ments The firewall that protects the company network from intruders on the
Internet also prevents outsiders from accessing the intranet resources
An extranet is essentially an intranet with resources made available to a select
group of outside users For example, a company might maintain an extranet that
permits its clients to access servers that provide them with order status, inventory
data, or other information Extranets are always secured, so that outside access
to these resources is limited to individuals with the appropriate credentials,
typically a user name and password The same firewall that protects a company
intranet from outside intrusion can also protect an extranet from access by
unauthorized users
Signals and Protocols
Computers can communicate over a network in many ways and for many
rea-sons, but much of the networking process is not directly concerned with the
nature of the data transmitted over the network medium By the time the data
generated by the transmitting computer reaches the cable or other medium, it has
been reduced to signals that are native to that medium These signals might be
electrical voltages on a copper cable network, pulses of light on a fiber-optic cable
network, or infrared or radio waves on a wireless network
These signals form a code that the network interface in a receiving computer
converts back into the binary data understood by the software running on that
computer The computer then interprets the binary data, converting it into
infor-mation it can use in a variety of ways Of course there is a great deal more to the
network communications process than this description indicates, but one of the
primary elements of computer networking is the reduction of complex data
struc-tures into simple signals that can be transmitted over a network medium and
then converted back into the same data structures on the destination system The
software components that perform this reduction on a computer are known
collectively as the protocol stack, shown in Figure 1-2 At the top of the stack are
the applications running on the computer and at the bottom is the connection to
the network medium
Trang 38Figure 1-2 A networked computer’s protocol stack
In some cases a network consists of computers that are nearly identical; they run the same version of the same operating system and use all the same applications Other networks consist of different computing platforms, all running entirely dif-ferent software It might seem that the identical computers would communicate more easily than the different ones would, and in some ways this is true But no matter what kind of computers the network uses or what software the computers are running, they must have a common language to understand one another These common languages are called protocols, and computers use many of them during even the simplest exchanges of network data Just as two people must speak a common language to communicate, two computers must have one or more protocols in common The various protocols running on a computer com-prise the stack that connects the applications and the network medium
A network protocol can be relatively simple or highly complex The bottom ponent of the protocol stack defines the sequence of signals transmitted over the network medium In this case the protocol is simply a code—such as a pattern of electrical voltages—that defines the binary value of a bit of data: 0 or 1
com-The concept is the same as that of Morse code, in which a pattern of dots and dashes represents a letter of the alphabet
More complicated networking protocols can provide a variety of services, ing the following:
includ-Application
Protocol stack
Network medium
Trang 39■ Packet acknowledgment The transmission of a return message by
the recipient to verify the receipt of a packet or packets A packet is the
fundamental unit of data transmitted over a data network
■ Segmentation The division of a lengthy data stream into segments
sufficiently small for transmission over the network inside packets
■ Flow control The generation, by a receiving system, of messages that
instruct the sending system to speed up or slow down its rate of
trans-mission
■ Error detection The inclusion in a packet of special codes used by
the receiving system to verify that the content of the packet wasn’t
damaged in transit
■ Error correction The retransmission of packets that have been
garbled or lost in transit
transmitted over a network by eliminating redundant information
■ Data encryption A mechanism for protecting the data transmitted
over a network by encoding it using a cryptographic key already
known by the receiving system
In most cases protocols are based on public standards developed and published
by an independent committee rather than a single manufacturer or developer
Public standards ensure the interoperability of different types of systems because
manufacturers can use the protocols without incurring any obligation to a
partic-ular company There are still a few proprietary protocols in use, however, that
have been developed by a single company and have never been released into the
public domain
Some of the organizations that are responsible for the protocol standards used
today are as follows:
■ Institute of Electrical and Electronics Engineers (IEEE) The
U.S.-based society responsible for the publication of the IEEE 802
working group, which includes the standards that define the protocols
commonly known as Ethernet and Token Ring, as well as many others
world-wide federation of standards bodies from over 100 countries,
responsi-ble for the publication of the OSI reference model document
non-profit organization that administers and coordinates the U.S voluntary
Trang 40standardization and conformity assessment system ANSI is the official U.S representative to the ISO, as well as to several other inter-national bodies.
con-tributors and consultants that collaborates to develop and publish standards for Internet technologies, including the TCP/IP protocols
Alliance (TIA/ EIA) Two organizations that have joined together to develop and publish the Commercial Building Telecommunications Wiring Standards, which define how the cables for data networks should be installed
within which governments and the private sector work together to coordinate the operation of telecommunication networks and services and to advance the development of communications technology
ITU-T was formerly known as the Comité Consultatif International Téléphonique et Télégraphique (CCITT)
One of the most important things to remember about computer networking is that all the computers on a network use many protocols during the communica-tions process and all of these protocols work together to form the protocol stack For example, you might see a reference to an Ethernet network in a book or an article Although Ethernet is certainly a protocol running on the network that the author is discussing, it’s not the only protocol running on the network Many other protocols are running at the same time, and, although they might not be as relevant to the author’s subject as Ethernet is, they are no less important to the overall networking process
Broadband and Baseband Communications
In most cases LANs use a shared network medium All the computers on the LAN are connected to a network that can carry only one signal at a time, and the sys-tems take turns using it This type of network is called a baseband network
To make sharing a baseband network among many computers practical, the data transmitted by each system is broken up into discrete packets If you were to tap into the cable of a baseband network and interpret the signals as they flow by, you would see a succession of packets generated by various systems and destined for various systems, as shown in Figure 1-3