Introduction xixPart I Domain 1.0: Networking Fundamentals 1Chapter 1 OSI Model 3OSI Model 3Data Encapsulation 12Chapter 2 Network Topologies 17Network Topologies 17Network Types and Characteristics 19Network Roles 21Service- Related Entry Points 22Virtual Network Concepts 22Provider Links 24Chapter 3 Cables and Connectors 29Cable Types 30Connector Types 33Cable Management 35Ethernet Standards 36Chapter 4 IP Addressing 41IP Addresses 42IPv4 vs. IPv6 48Chapter 5 Ports and Protocols 55IP Protocol Types 55Application Layer Protocols 60Chapter 6 Network Services 67Dhcp 67Dns 70Ntp 75Chapter 7 Network Architecture 79Three- Tiered Architecture 79Software- Defined Networking 82Spine and Leaf Architecture 83Traffic Flows 84Data Center Locations 84Storage Area Networking 85Chapter 8 Cloud Computing 91Deployment Models 91Service Models 93Part II Domain 2.0: Network Implementations 103Chapter 9 Network Devices 105Networking Devices 105Networked Devices 111Chapter 10 Routing and Bandwidth Management 117Routing 118Bandwidth Management 124Chapter 11 Switching 129Ethernet Basics 129Switching 131Chapter 12 Wireless Standards 141Wireless Networking 142Cellular Technologies 149Part III Domain 3.0: Network Operations 153Chapter 13 Network Availability 155Performance Metrics 156Snmp 158Network Device Logs 159Interface Errors or Alerts 161Environmental Sensors 162Baselines 162Uptime/Downtime 163Chapter 14 Organizational Documents and Policies 167Plans and Procedures 167Hardening and Security Policies 171Common Documentation 172Common Agreements 175Chapter 15 High Availability and Disaster Recovery 179Load Balancing 180Multipathing 180NIC Teaming 180Redundant Hardware/Clusters 181Facilities and Infrastructure Support 182Redundancy and High Availability Concepts 185Network Device Backup/Restore 188Part IV Domain 4.0: Network Security 191Chapter 16 Security Concepts 193Confidentiality, Integrity, and Availability 193Threats 194Vulnerabilities 194Exploits 195Least Privilege 195Role- Based Access 196Zero Trust 196Defense in Depth 197Authentication Methods 198Risk Management 201Siem 202Chapter 17 Network Attacks 207Technology- Based Attacks 207Human and Environmental Attacks 212Chapter 18 Network Hardening 217Best Practices 217Wireless Security 223IoT Access Considerations 227Chapter 19 Remote Access 231Virtual Private Networks 232Remote Desktop Gateway 234Virtual Network Computing (VNC) 235Virtual Desktop 235Authentication and Authorization Considerations 236In- band vs. Out- of- band Management 236Chapter 20 Physical Security 241Detection Methods 241Prevention Methods 243Asset Disposal 246Part V Domain 5.0: Network Troubleshooting 251Chapter 21 Network Troubleshooting Methodology 253Identify the Problem 254Establish a Theory of Probable Cause 256Test the Theory to Determine the Cause 256Establish a Plan of Action to Resolve the Problem and Identify Potential Effects 257Implement the Solution or Escalate as Necessary 258Verify Full System Functionality and, if Applicable, Implement Preventive Measures 259Document Findings, Actions, Outcomes, and Lessons Learned 259Chapter 22 Troubleshooting Cable Connectivity 263Specifications and Limitations 264Cable Considerations 265Cable Application 265Common Issues 267Common Tools 271Chapter 23 Network Software Tools and Commands 275Software Tools 275Command- Line Tools 279Basic Network Platform Commands 284Chapter 24 Troubleshooting Wireless Connectivity 289Specifications and Limitations 289Considerations 291Common Issues 293Chapter 25 Troubleshooting Network Issues 301Considerations 301Common Issues 303Index 315
ABOUT THE AUTHORSMike Chapple, PhD is Teaching Professor of Information Technology, Analytics, and Operations at Notre Dame's Mendoza College of Business. He is a bestselling author of over 25 books and serves as the Academic Director of the University's Master of Science in Business Analytics program. He holds multiple additional certifications, including the CISSP (Certified Information Systems Security Professional), CySA+ (CompTIA Cybersecurity Analyst), CIPP/US (Certified Information Privacy Professional), CompTIA PenTest+, and CompTIA Security+. Mike provides cybersecurity certification resources at his website, CertMike.com.Craig Zacker is the author or co-author of dozens of books, manuals, articles, and web sites on computer and networking topics.