ISBN-13: 9781119811633 / Angielski / Miękka / 2021 / 1040 str.
ISBN-13: 9781119811633 / Angielski / Miękka / 2021 / 1040 str.
Introduction xxxiAssessment Test xliChapter 1 Introduction to Networks 1First Things First: What's a Network? 3The Local Area Network 4Common Network Components 6Metropolitan Area Network 9Wide Area Network 9Personal Area Network 10Campus Area Network 10Storage Area Network 10Software-Defined Wide Area Network 11Multiprotocol Label Switching 11Multipoint Generic Routing Encapsulation 12Network Architecture: Peer-to-Peer or Client-Server? 12Physical Network Topologies 14Bus Topology 14Star Topology 15Ring Topology 17Mesh Topology 17Point-to-Point Topology 18Point-to-Multipoint Topology 19Hybrid Topology 20Topology Selection, Backbones, and Segments 21Selecting the Right Topology 22The Network Backbone 22Network Segments 23Service-Related Entry Points 23Service Provider Links 23Virtual Networking 24Summary 24Exam Essentials 25Written Lab 25Review Questions 26Chapter 2 The Open Systems Interconnection Specifications 31Internetworking Models 32The Layered Approach 33Advantages of Reference Models 33The OSI Reference Model 34The Application Layer 36The Presentation Layer 37The Session Layer 37The Transport Layer 37The Network Layer 43The Data Link Layer 46The Physical Layer 48Introduction to Encapsulation 49Modulation Techniques 50Summary 51Exam Essentials 51Written Lab 52Review Questions 53Chapter 3 Networking Connectors and Wiring Standards 57Physical Media 59Coaxial Cable 60Twisted-Pair Cable 62Twinaxial Cable 62Fiber-Optic Cable 66Transceivers 71Media Converters 72Serial Cables 74Cable Properties 76Transmission Speeds 76Distance 76Duplex 77Noise Immunity (Security, EMI) 77Frequency 77Wiring Standards 78T568A vs. T568B 78Straight-Through Cable 80Crossover Cable 81Rolled/Rollover Cable 83T1 Crossover Cable 83Installing Wiring Distributions 85MDF/IDF 85Summary 87Exam Essentials 88Written Lab 88Review Questions 89Chapter 4 The Current Ethernet Specifications 93Network Basics 94Ethernet Basics 96Collision Domain 96Broadcast Domain 97CSMA/CD 97Broadband/Baseband 99Bit Rates vs. Baud Rate 99Wavelength 99Half-and Full-Duplex Ethernet 100Ethernet at the Data Link Layer 102Binary to Decimal and Hexadecimal Conversion 102Ethernet Addressing 106Ethernet Frames 107Ethernet at the Physical Layer 109Ethernet over Other Standards (IEEE 1905.1-2013) 115Ethernet over Power Line 115Ethernet over HDMI 117Bidirectional Wavelength-Division Multiplexing (WDM) 117Course Wavelength-Division Multiplexing (CWDM) 117Dense Wavelength-Division Multiplexing (DWDM) 117Summary 118Exam Essentials 119Written Lab 119Review Questions 124Chapter 5 Networking Devices 129Common Network Connectivity Devices 132Network Interface Card 133Hub 135Bridge 135Switch 136Router 137Firewall 141IDS/IPS 142HIDS 142Access Point 142Wireless Range Extender 143Wireless LAN Controller 143Load Balancer 144Contention Methods 144Dynamic Host Configuration Protocol Server 147IPAM 152Other Specialized Devices 152Multilayer Switch 153Domain Name Service Server 153Network Time Protocol 160Proxy Server 160Encryption and Content Filtering 162Analog Modem 163Packet Shaper 164VPN Concentrator/Headend 164Media Converter 165VoIP PBX 165VoIP Endpoint 166NGFW/Layer 7 Firewall 166VoIP Gateway 166Cable Modem 166DSL Modem 166Networked Devices 167VoIP Phones 167Printers 167Physical Access Control Devices 167Cameras 167Heating Ventilation, and Air Conditioning (HVAC) Sensors 167Internet of Things (IoT) 168Industrial Control Systems 168Planning and Implementing a Basic SOHO Network Using Network Segmentation 168Determining Requirements 169Switches and Bridges at the Data Link Layer 175Hubs at the Physical Layer 177Environmental Considerations 178Summary 178Exam Essentials 179Written Lab 180Review Questions 181Chapter 6 Introduction to the Internet Protocol 185Introducing TCP/IP 188A Brief History of TCP/IP 188TCP/IP and the DoD Model 189The Process/Application Layer Protocols 191The Host-to-Host Layer Protocols 204The Internet Layer Protocols 210Data Encapsulation 220Summary 224Exam Essentials 224Written Lab 225Review Questions 226Chapter 7 IP Addressing 231IP Terminology 233The Hierarchical IP Addressing Scheme 234Network Addressing 235Private IP Addresses (RFC 1918) 239IPv4 Address Types 241Layer 2 Broadcasts 242Layer 3 Broadcasts 242Unicast Address 243Multicast Address (Class D) 243Internet Protocol Version 6 (IPv6) 243Why Do We Need IPv6? 244The Benefits of and Uses for IPv6 244IPv6 Addressing and Expressions 246Shortened Expression 246Address Types 247Special Addresses 248Stateless Address Autoconfiguration (SLAAC) 249DHCPv6 (Stateful) 251Migrating to IPv6 251Summary 253Exam Essentials 254Written Labs 255Written Lab 7.1 255Written Lab 7.2 255Review Questions 257Chapter 8 IP Subnetting, Troubleshooting IP, and Introduction to NAT 261Subnetting Basics 263How to Create Subnets 264Subnet Masks 265Classless Inter-Domain Routing (CIDR) 266Subnetting Class C Addresses 268Subnetting Class B Addresses 278Troubleshooting IP Addressing 286Determining IP Address Problems 289Introduction to Network Address Translation (NAT) 294Types of Network Address Translation 295NAT Names 295How NAT Works 296Summary 298Exam Essentials 298Written Lab 299Review Questions 300Chapter 9 Introduction to IP Routing 305Routing Basics 306The IP Routing Process 309Testing Your IP Routing Understanding 315Static and Dynamic Routing 316Summary 319Exam Essentials 319Written Lab 320Review Questions 321Chapter 10 Routing Protocols 325Routing Protocol Basics 326Administrative Distances 327Classes of Routing Protocols 329Distance-Vector Routing Protocols 330Routing Information Protocol (RIP) 332RIP Version 2 (RIPv2) 332VLSMs and Discontiguous Networks 333EIGRP 336Border Gateway Protocol (BGP) 338Link-State Routing Protocols 340Open Shortest Path First (OSPF) 340Intermediate System-to-Intermediate System (IS-IS) 343High Availability 344Hot Standby Router Protocol (HSRP) 346Virtual Router Redundancy Protocol 350Advanced IPv6 Concepts 351Router Advertisement 351Neighbor Discovery Protocol 353Tunneling 354Dual Stack 357IPv6 Routing Protocols 357RIPng 358EIGRPv6 358OSPFv3 359Summary 359Exam Essentials 359Written Lab 360Review Questions 361Chapter 11 Switching and Virtual LANs 365Networking Before Layer 2 Switching 367Switching Services 370Limitations of Layer 2 Switching 371Bridging vs. LAN Switching 372Three Switch Functions at Layer 2 372Distributed Switching 378Spanning Tree Protocol 378Spanning Tree Port States 379STP Convergence 380Rapid Spanning Tree Protocol 802.1w 381Virtual LANs 382VLAN Basics 383Quality of Service 386VLAN Memberships 387Static VLANs 387Dynamic VLANs 388Identifying VLANs 388VLAN Identification Methods 390VLAN Trunking Protocol 392VTP Modes of Operation 393Do We Really Need to Put an IP Address on a Switch? 394Switch Port Protection 396Port Bonding 399Device Hardening 401Two Additional Advanced Features of Switches 401Power over Ethernet (802.3af, 802.3at) 401Port Mirroring/Spanning (SPAN/RSPAN) 404Summary 405Exam Essentials 406Written Lab 406Review Questions 408Chapter 12 Wireless Networking 413Introduction to Wireless Technology 415Cellular Technologies 418The 802.11 Standards (Regulatory Impacts) 4192.4 GHz (802.11b) 4212.4 GHz (802.11g) 4225 GHz (802.11a) 4235 GHz (802.11h) 4242.4 GHz/5 GHz (802.11n) 4255 GHz (802.11ac) 426WiFi 6 (802.11ax) 426Comparing 802.11 Standards 427Range and Speed Comparisons 428Wireless Network Components 428Wireless Access Points 429Wireless Network Interface Card 430Wireless Antennas 431Installing a Wireless Network 432Ad Hoc Mode: Independent Basic Service Set 432Infrastructure Mode: Basic Service Set 433Wireless Controllers 434Mobile Hot Spots 436Signal Degradation 438Other Network Infrastructure Implementations 438Technologies That Facilitate the Internet of Things (IoT) 440Installing and Configuring WLAN Hardware 441Site Survey 447Providing Capacity 448Multiple Floors 449Location-Based WLAN 450Site Survey Tools 450Wireless Security 451Wireless Threats 451Open Access 455Service Set Identifiers, Wired Equivalent Privacy, and Media Access Control Address Authentication 455Remote Authentication Dial-In User Service (802.1X) 457Temporal Key Integrity Protocol 458Wi-Fi Protected Access or WPA2 Pre-Shared Key 459Summary 462Exam Essentials 462Written Lab 464Review Questions 465Chapter 13 Using Statistics and Sensors to Ensure Network Availability 469Performance Metrics/Sensors 471Device/Chassis 471Network Metrics 473SNMP 474Traps 475Object Identifiers (OIDs) 476Management Information Bases (MIBs) 476Network Device Logs 476Log Reviews 476Logging Levels/Severity Levels 480Interface Statistics/Status 482Link State (Up/Down) 482Speed/Duplex 483Send/Receive Traffic 484Cyclic Redundancy Checks (CRCs) 485Protocol Packet and Byte Counts 486Interface Errors or Alerts 486CRC Errors 487Giants and Runts 488Encapsulation Errors 488Environmental Factors and Sensors 489Temperature 489Humidity 489Electrical 490Flooding 495Baselines 495NetFlow Data 496NetFlow Overview and Flows 496Uptime/Downtime 498Summary 498Exam Essentials 498Written Lab 499Review Questions 501Chapter 14 Organizational Documents and Policies 505Plans and Procedures 507Change Management 508Incident Response Plan 510Disaster Recovery Plan 510Business Continuity Plan 510System Life Cycle 511Standard Operating Procedures 511Hardening and Security Policies 511Acceptable Use Policy 512Password Policy 512Bring Your Own Device (BYOD) Policy 513Remote Access Policy 513Onboarding and Offboarding Policy 513Security Policy 514Data Loss Prevention 519Common Documentation 519Physical Network Diagram 520Logical Network Diagram 524Wiring Diagram 525Site Survey Report 526Audit and Assessment Report 526Baseline Configurations 527Common Agreements 528Nondisclosure Agreement (NDA) 528Service-Level Agreement (SLA) 529Memorandum of Understanding (MOU) 529Summary 529Exam Essentials 529Written Lab 530Review Questions 531Chapter 15 High Availability and Disaster Recovery 533Load Balancing 535Multipathing 536Network Interface Card (NIC) Teaming 537Redundant Hardware/Clusters 538Switches 538Routers 540Firewalls 542Facilities and Infrastructure Support 542Uninterruptible Power Supply (UPS) 542Power Distribution Units (PDUs) 543Generator 543HVAC 544Fire Suppression 544Redundancy and High Availability (HA) Concepts 545Recovery Sites 545Cold Site 545Warm Site 545Hot Site 546Cloud Site 546Active/Active vs. Active/Passive 546Mean Time to Repair (MTTR) 553Mean Time Between Failure (MTBF) 554Recovery Time Objective (RTO) 554Recovery Point Objective (RPO) 554Network Device Backup/Restore 554State/Configuration 554Summary 555Exam Essentials 555Written Lab 556Review Questions 557Chapter 16 Common Security Concepts 559Confidentiality, Integrity, and Availability (CIA) 561Confidentiality 561Integrity 561Availability 562Threats 562Internal 562External 562Vulnerabilities 562Common Vulnerabilities and Exposures (CVE) 563Zero-Day 563Exploits 563Least Privilege 563Role-BasedAccess 564Zero Trust 564Defense in Depth 564Network Segmentation Enforcement 564Screened Subnet (aka Demilitarized Zone) 565Separation of Duties 565Network Access Control 566Honeypot 567Authentication Methods 567Multifactor 567Authentication, Authorization, and Accounting (AAA) 568Remote Authentication Dial-In User Service (RADIUS) 568Terminal Access Controller Access Control System Plus (TACACS+) 568Single Sign-On (SSO) 570LDAP 570Kerberos 570Local Authentication 571802.1X 571Extensible Authentication Protocol (EAP) 572Security Risk Assessments 573Threat Assessment 573Vulnerability Assessment 574Penetration Testing 575Business Risk Assessments 575Security Information and Event Management (SIEM) 576Notifications 576Summary 576Exam Essentials 577Written Lab 577Review Questions 578Chapter 17 Common Types of Attacks 581Technology-Based Attacks 582Denial of Service (DoS)/Distributed Denial of Service (DDoS) 583On-Path Attack (Previously Known as Man-in-the-Middle Attack) 588DNS Poisoning 589VLAN Hopping 589ARP Spoofing 590Rogue DHCP 590Rogue Access Point (AP) 591Evil Twin 592Ransomware 593Password Attacks 593MAC Spoofing 594IP Spoofing 594Deauthentication 594Malware 594Human and Environmental 598Social Engineering 598Phishing 599Environmental 599Summary 600Exam Essentials 600Written Lab 601Review Questions 602Chapter 18 Network Hardening Techniques 605Best Practices 607Secure SNMP 608Router Advertisement (RA) Guard 608Port Security 608Dynamic ARP Inspection 609Control Plane Policing 609Private VLANs 609Disable Unneeded Switchports 610Disable Unneeded Network Services 610Change Default Passwords 610Password Complexity/Length 610Enable DHCP Snooping 613Change Default VLAN 613Patch and Firmware Management 614Access Control List 615Role-Based Access 616Firewall Rules 617Wireless Security 618MAC Filtering 618Antenna Placement 618Power Levels 619Wireless Client Isolation 619Guest Network Isolation 620Preshared Keys (PSKs) 620EAP 620Geofencing 620Captive Portal 621IoT Access Considerations 621Summary 621Exam Essentials 621Written Lab 622Review Questions 623Chapter 19 Remote Access Security 625Site-to-Site VPN 626Client-to-Site VPN 626Clientless VPN 627Split Tunnel vs. Full Tunnel 628Remote Desktop Connection 628Remote Desktop Gateway 629SSH 630Virtual Network Computing (VNC) 630Virtual Desktop 631Authentication and Authorization Considerations 631In-Band vs. Out-of-Band Management 631Summary 632Exam Essentials 632Written Lab 632Review Questions 634Chapter 20 Physical Security 637Detection Methods 639Cameras 639Motion Detection 640Asset Tags 641Tamper Detection 641Prevention Methods 642Employee Training 642Access Control Hardware 643Locking Racks 643Locking Cabinets 644Access Control Vestibule (Previously Known as a Mantrap) 644Smart Lockers 645Asset Disposal 646Factory Reset/Wipe Configuration 646Sanitize Devices for Disposal 646Summary 647Exam Essentials 647Written Lab 648Review Questions 649Chapter 21 Data Center Architecture and Cloud Concepts 651Data Center Network Architectures 654Access/Edge Layer 654Distribution Layer 655Core Layer 655Software-Defined Networking 655Application Layer 656Control Layer 656Infrastructure Layer 656Management Plane 656Spine-Leaf-Based Two-Tier Networks 657Top-of-Rack Switching 658Backbone 658Traffic Flows 658North-South 659East-West 659Branch Office vs. On-premises Data Center vs. Colocation 660Cloud Computing and Its Effect on the Enterprise Network 661Service Models 663Overview of Network Programmability in Enterprise Network 665Software-Defined Networking 666Application Programming Interfaces (APIs) 666Southbound APIs 667Northbound APIs 669Managing Network Documentation 670Using SNMP 670Schematics and Diagrams 671Network Monitoring 676Baselines 676Processes 676Onboarding and Offboarding of Mobile Devices 677NAC 677Policies, Procedures, and Regulations 677Safety Practices 681Implementing Network Segmentation 686Network Optimization 689Reasons to Optimize Your Network's Performance 689How to Optimize Performance 691Unified Communications 694Traffic Shaping 694Load Balancing 695High Availability 695Caching Engines 695Fault Tolerance 696Archives/Backups 696Common Address Redundancy Protocol 697Virtual Networking 697Locating and Installing Equipment 708Change Management Procedures 715Summary 717Exam Essentials 719Written Lab 720Review Questions 721Chapter 22 Ensuring Network Availability 725Performance Metrics/Sensors 727Network Metrics 728SNMP 729Network Device Logs 731Interface Statistics/Status 733Interface Errors 734Environmental Factors and Sensors 735Baseline 736NetFlow 737Uptime 738Downtime 738Summary 739Exam Essentials 739Written Lab 740Review Questions 741Chapter 23 Cable Connectivity Issues and Tools 745Specifications and Limitations 747Cable Considerations 747Cable Applications 748Common Issues 749Identifying Hardware Tools 751Cable Testers 752Protocol Analyzer 755Certifiers 755Time-Domain Reflectometer 756Optical Time-Domain Reflectometer 756Multimeter 757Spectrum Analyzer 758Toner Generator (Probe) 759Tap 760Metrics 760Butt Set 761Punch-Down Tool 761Cable Snips/Cutters 763Voltage Event Recorder (Power) 763Fiber Light Meter 764Fiber Fusion Splicer 764Summary 765Exam Essentials 765Written Lab 766Review Questions 767Chapter 24 Network Troubleshooting Methodology 771Narrowing Down the Problem 775Did You Check the Super Simple Stuff? 776Is Hardware or Software Causing the Problem? 780Is It a Workstation or a Server Problem? 781Which Segments of the Network Are Affected? 781Is It Bad Cabling? 782Troubleshooting Steps 791Step 1: Identify the Problem 792Step 2: Establish a Theory of Probable Cause 796Step 3: Test the Theory to Determine Cause 806Step 4: Establish a Plan of Action to Resolve the Problem and Identify Potential Effects 809Step 5: Implement the Solution or Escalate as Necessary 810Step 6: Verify Full System Functionality, and If Applicable, Implement Preventative Measures 813Step 7: Document Findings, Actions, Outcomes, and Lessons Learned 814Troubleshooting Tips 815Don't Overlook the Small Stuff 815Prioritize Your Problems 815Check the Software Configuration 816Don't Overlook Physical Conditions 817Don't Overlook Cable Problems 817Check for Viruses 818Summary 818Exam Essentials 818Written Lab 819Review Questions 821Chapter 25 Network Software Tools and Commands 825Software Tools 827Wi-Fi Analyzers 827Protocol Analyzer/Packet Capture 828Bandwidth Speed Testers 829Port Scanners 830NetFlow Analyzers 830Trivial File Transfer Protocol (TFTP) Server 831Connectivity Software 831IP Scanner 832Using traceroute 833Using ipconfig, ifconfig, and ip 836Using the ipconfig Utility 836Using the ifconfig Utility 840Using the ip Utility 840Using the iptables Utility 841Examples of iptables 841Using the ping Utility 841Using the Address Resolution Protocol 845The Windows ARP Table 845Using the arp Utility 846Using the nslookup Utility 849Resolving Names with the Hosts File 850Using the Mtr Command (pathping) 852Using the Nmap Utility 853Using the route Command 854Using the route Command Options 854Some Examples of the route Command 857Using the nbtstat Utility 857The -a Switch 858The -A Switch 860The -c Switch 860The -n Switch 860The -r Switch 861The -R Switch 862The -S Switch 862The -s Switch 863Using the netstat Utility 863The -a Switch 866The -e Switch 866The -r Switch 867The -s Switch 867The -p Switch 868The -n Switch 869Using tcpdump 871Examples of Using tcpdump 871Using the File Transfer Protocol 871Starting FTP and Logging In to an FTP Server 872Downloading Files 874Uploading Files 876Using the Telnet Utility 876How to Enable Telnet in Windows 877Don't Use Telnet, Use Secure Shell 878Summary 878Exam Essentials 879Written Lab 880Review Questions 881Appendix A Answers to Written Labs 887Chapter 1: Introduction to Networks 888Chapter 2: The Open Systems Interconnection Specifications 888Chapter 3: Networking Connectors and Wiring Standards 889Chapter 4: The Current Ethernet Specifications 889Chapter 5: Networking Devices 891Chapter 6: Introduction to the Internet Protocol 892Chapter 7: IP Addressing 893Written Lab 7.1 893Written Lab 7.2 893Chapter 8: IP Subnetting, Troubleshooting IP, and Introduction to NAT 894Chapter 9: Introduction to IP Routing 895Chapter 10: Routing Protocols 895Chapter 11: Switching and Virtual LANs 895Chapter 12: Wireless Networking 896Chapter 13: Using Statistics and Sensors to Ensure Network Availability 896Chapter 14: Organizational Documents and Policies 897Chapter 15: High Availability and Disaster Recovery 898Chapter 16: Common Security Concepts 898Chapter 17: Common Types of Attacks 899Chapter 18: Network Hardening Techniques 899Chapter 19: Remote Access Security 900Chapter 20: Physical Security 900Chapter 21: Data Center Architecture and Cloud Concepts 901Chapter 22: Ensuring Network Availability 901Chapter 23: Cable Connectivity Issues and Tools 902Chapter 24: Network Troubleshooting Methodology 902Chapter 25: Network Software Tools and Commands 903Appendix B Answers to Review Questions 905Chapter 1: Introduction to Networks 906Chapter 2: The Open Systems Interconnection Specifications 907Chapter 3: Networking Connectors and Wiring Standards 909Chapter 4: The Current Ethernet Specifications 910Chapter 5: Networking Devices 911Chapter 6: Introduction to the Internet Protocol 913Chapter 7: IP Addressing 914Chapter 8: IP Subnetting, Troubleshooting IP, and Introduction to NAT 916Chapter 9: Introduction to IP Routing 918Chapter 10: Routing Protocols 919Chapter 11: Switching and Virtual LANs 921Chapter 12: Wireless Networking 922Chapter 13: Using Statistics and Sensors to Ensure Network Availability 924Chapter 14: Organizational Documents and Policies 925Chapter 15: High Availability and Disaster Recovery 926Chapter 16: Common Security Concepts 927Chapter 17: Common Types of Attacks 927Chapter 18: Network Hardening Techniques 928Chapter 19: Remote Access Security 929Chapter 20: Physical Security 930Chapter 21: Data Center Architecture and Cloud Concepts 931Chapter 22: Ensuring Network Availability 933Chapter 23: Cable Connectivity Issues and Tools 934Chapter 24: Network Troubleshooting Methodology 935Chapter 25: Network Software Tools and Commands 937Appendix C Subnetting Class A 939Subnetting Practice Examples: Class A Addresses 940Practice Example #1A: 255.255.0.0 (/16) 941Practice Example #2A: 255.255.240.0 (/20) 941Practice Example #3A: 255.255.255.192 (/26) 942Subnetting in Your Head: Class A Addresses 942Written Lab 1 943Written Lab 2 944Answers to Written Lab 1 944Answers to Written Lab 2 945Index 947
Todd Lammle, Network+, CCSI, CCNA, CCNP, is the networking authority. He has been involved in computers and networking with Fortune 500 companies for over 30 years. Todd is President of GlobalNet System Solutions, Inc., a networking integration and training firm. He is the bestselling author of numerous titles, with over 900,000 copies of his books in print. He can be reached through his website at www.lammle.com.
1997-2024 DolnySlask.com Agencja Internetowa