Professional Documents
Culture Documents
Networking Essentials 6Th Edition Beasley Full Chapter
Networking Essentials 6Th Edition Beasley Full Chapter
Beasley
Visit to download the full and correct content document:
https://ebookmass.com/product/networking-essentials-6th-edition-beasley/
NETWORKING ESSENTIALS:
SIXTH EDITION
A COMPTIA NETWORK+ N10-008
TEXTBOOK
INSTRUCTOR EDITION
All rights reserved. This publication is protected by copyright, and permission must be DEVELOPMENT EDITOR
obtained from the publisher prior to any prohibited reproduction, storage in a retrieval Marianne Bartow
system, or transmission in any form or by any means, electronic, mechanical, photo-
copying, recording, or likewise. For information regarding permissions, request forms, MANAGING EDITOR
and the appropriate contacts within the Pearson Education Global Rights & Permissions Sandra Schroeder
Department, please visit www.pearson.com/permissions.
PROJECT EDITOR
No patent liability is assumed with respect to the use of the information contained herein. Mandie Frank
Although every precaution has been taken in the preparation of this book, the publisher
COPY EDITOR
and author assume no responsibility for errors or omissions. Nor is any liability assumed
Kitty Wilson
for damages resulting from the use of the information contained herein.
ISBN-13: 978-0-13-745582-9 INDEXER
Ken Johnson
ISBN-10: 0-13-745582-8
Library of Congress Control Number: 2021913557 PROOFREADER
Abigail Manheim
ScoutAutomatedPrintCode
TECHNICAL EDITOR
Chris Crayton
Trademarks
All terms mentioned in this book that are known to be trademarks or service marks have PEER REVIEWERS
been appropriately capitalized. Pearson IT Certification cannot attest to the accuracy of DeAnnia Clements
this information. Use of a term in this book should not be regarded as affecting the validity Osman Guzide
of any trademark or service mark. Gene Carwile
Dr. Theodor Richardson
Warning and Disclaimer PUBLISHING COORDINATOR
Every effort has been made to make this book as complete and as accurate as possible, Cindy Teeters
but no warranty or fitness is implied. The information provided is on an “as is” basis. The
authors and the publisher shall have neither liability nor responsibility to any person or DESIGNER
entity with respect to any loss or damages arising from the information contained in this Chuti Prasertsith
book.
COMPOSITOR
codeMantra
Special Sales
For information about buying this title in bulk quantities, or for special sales opportunities
(which may include electronic versions; custom cover designs; and content particular to
your business, training goals, marketing focus, or branding interests), please contact our
corporate sales department at [email protected] or (800) 382-3419.
For government sales inquiries, please contact [email protected].
For questions about sales outside the U.S., please contact [email protected].
ii
iii
iv
6 TCP/IP 290
Glossary 742
Index 764
Wireshark Captures
Network+ quizzes
vi
CONTENTS vii
viii CONTENTS
CONTENTS ix
x CONTENTS
CONTENTS xi
xii CONTENTS
CONTENTS xiii
xiv CONTENTS
CONTENTS xv
xvi CONTENTS
CONTENTS xvii
xviii CONTENTS
CONTENTS xix
Glossary 742
Index 764
xx CONTENTS
DEDICATIONS
This book is dedicated to my family: Kim, Damon/Heather, and Dana/Sam. —Jeff Beasley
This book is dedicated to my family: Boonsong, Pariya, June, Ariya, and Atisat. —Piyasat Nilkaew
ACKNOWLEDGMENTS
I am grateful to the many people who have helped with this text. My sincere thanks go to the following technical
consultants:
● Danny Bosch and Matthew Peralta for sharing their expertise with optical networks and unshielded
twisted-pair cabling
● Don Yates for his help with the initial Net-Challenge software
I would also like to thank my many past and present students for their help with this book:
● Abel Sanchez, Kathryn Sager, and Joshua Cook for their work on the Net-Challenge software; Adam
Segura for his help taking pictures of the steps for CAT6 termination; Marc Montez, Carine George-Morris,
Brian Morales, Michael Thomas, Jacob Ulibarri, Scott Leppelman, and Aarin Buskirk for their help with
laboratory development; Josiah Jones and Raul Marquez Jr. for their help with the Wireshark material; and
Ariya Nilkaew for her help with revising and editing many of the captured pictures
xxi
READER SERVICES
Register your copy of Networking Essentials, Sixth Edition at www.pearsonitcertification.com for conve-
nient access to downloads, updates, and corrections as they become available. To start the registration process,
go to www.pearsonitcertification.com/register and log in or create an account.* Enter the product ISBN
9780137455928 and click Submit. When the process is complete, you will find any available bonus content under
Registered Products.
*Be sure to check the box that you would like to hear from us to receive exclusive discounts on future editions of
this product.
xxii
xxiii
174
FIGURE I-1
xxiv
380 381
FIGURE I-2
xxv
When the Wireshark software is installed, you are ready to begin using it.
To open a saved capture file, click File > Open or click Open on the Wireshark
home screen.
To change capture options, click Capture > Options and change the options to
your preferred settings.
FIGURE I-3
xxvi
The users (clients) in the wireless LAN can communicate with other members of
Extended Service the network as long as a link is established with the access point. For example, data
Set (ESS) traffic from PC-A to PC-E first passes through the access point and then to PC-E in
A network with multiple the wired LAN.
access points to extend
user mobility The problem with a basic service set is that mobile users can travel outside the
radio range of a station’s wireless link if there is only one access point. One
Hand-off solution is to add multiple access points to the network. Multiple access points
The process in which extend the range of mobility of a wireless client in the LAN. This arrangement is
a user’s computer called an extended service set (ESS). In the example of an ESS in Figure 4-3, the
establishes an mobile computer establishes an authorized connection with the access point that
association with another
has the strongest signal level (for example, AP-1). As the user moves, the strength
access point
of the signal from AP-1 decreases. At some point, the signal strength from AP-2
Roaming exceeds that from AP-1, and the wireless bridge establishes a new connection
The term used to with AP-2. This is called a hand-off. The hand-off is an automatic process for the
describe a user’s ability wireless client adapter in 802.11, and the term used to describe this is roaming.
to maintain network
Network access in 802.11 uses a technique called carrier sense multiple access with
connectivity while
moving through the collision avoidance (CSMA/CA). In CSMA/CA, the client station listens for other
workplace users of the wireless network. If the channel is quiet (that is, no data transmission
is occurring), the client station can transmit. If the channel is busy, the station(s)
must wait until transmission stops. Each client station uses a unique random
CSMA/CA back-off time. This technique prevents client stations from trying to gain access
Carrier sense multiple to the wireless channel as soon as it becomes quiet. Currently four physical layer
access with collision technologies are being used in 802.11 wireless networking: direct-sequence spread
avoidance spectrum (DSSS), frequency-hopping spread spectrum (FHSS), infrared, and
orthogonal frequency-division multiplexing (OFDM). DSSS is used in 802.11b/g/n
wireless networks, and OFDM is used in 802.11a, 802.11g, 802.11n, 802.11ac, and
802.11ax.
Laptop
Computer
AP-1 AP-3
AP-2
FIGURE 4-3 An example of an extended service set used for increased user mobility.
FIGURE I-4
xxvii
664 674
FIGURE I-5
xxviii
? The help command, which can be used at any Active/active An architecture in which both the Symbols 40GBASE-T cabling, 41
64-bit CPU architectures, 679
prompt in the command-line interface for the Cisco primary site and the disaster recovery site are up and ? (help) command, 367
IOS software running at the same time 100BASE-FX cabling, 41
100BASE-SX cabling, 41
10GBASE-T Twisted-pair copper capable of 10Gbps Active/passive An architecture in which the disaster
recovery site is idle, in standby mode
Numbers 100BASE-TX cabling, 41
3G/4G Third Generation and Fourth Generation, 802.1x (dot1x) wireless standard, 633
digital mobile phone technologies developed to provide Adaptive cut-through A mode that is a combination 3DES (Triple Data Encryption Standard), 651
802.11 wireless standard, 175–176
broadband network wireless services of the store-and-forward and cut-through modes 3G wireless standard, 204
ad hoc networks, 176, 177
6to4 prefix A globally routable address that enables Ad hoc network An independent network 4G wireless standard, 204
AP, 177–178
IPv6 hosts to communicate over the IPv4 Internet 4G/LTE, 204
Address Resolution Protocol (ARP)A protocol used to BSS, 176, 177, 178
5G wireless standard, 204
802.1X An IEEE standard protocol for access control map IP addresses to MAC addresses channel bonding, 179
and authentication; also called dot1x 6to4 prefix, 335
Administrative distance A feature used by routers to CSMA/CD, 178
8P8C connectors, 70–71
8P8C The proper term for an RJ-45 modular plug select the best path when more than one path is available DSSS, 179
10BASE2 cabling, 41
ESS, 178
A record (Address record)The most common record Administratively down An indication that the router 10BASE5 cabling, 41
in DNS, which maps a hostname to an IP address interface has been shut off by an administrator FHSS, 180
10BASE-FL cabling, 41
frequency channels, 179
AAAA record (Quad-A record) A DNS record for IPv6 ADSL (Asymmetric DSL) A service that provides up to 10BASE-T cabling, 41
hand-offs, 178
1.544Mbps from the user to the service provider and 10GBASE-LR cabling, 41
Absorption Light interaction with the atomic structure hopping sequences, 180
up to 8Mbps back to the user from the service provider 10GBASE-SR cabling, 41
of the fiber material; also involves the conversion of ISM band, 179
optical power to heat Advertise To share route information 10GBASE-T cabling, 41, 76, 97–98
MAC layer, 176
Access control Physical security measures such as AES Advanced Encryption Standard, the encryption AXT, 98
OFDM, 180
access control cards, possibly biometric access control algorithm used by WPA2 full-duplex transmissions, 100
Open Authentication, 638
systems, and lockable fencing F/UTP, 99
Aging time The length of time a MAC address PHY layer, 176
Access control hardware Hardware used to identify remains assigned to a port hybrid echo cancellation circuits, 100
pseudorandom numbering sequences, 180
and authenticate someone entering a facility IEEE 802.3an-2006, 98
AH Authentication Header, a security protocol that roaming, 178
performance, 100–101
Access control list (ACL) A basic form of firewall guarantees the authenticity of IP packets shared-key authentication, 638
protection PSAACRF, 98, 99
Alien crosstalk (AXT) Unwanted signal coupling from transceivers, 177
PSANEXT, 98, 99
Access control vestibule/mantrap A control device one permanent link to another transmit power, 180
signal transmission, 100–101
that consists of two interlocking doors in which the WMN, 176
Angled physical contact (APC) A green fiber connector 29 CFR 1910.1200 (Hazard Communication), 716
first set of doors must be closed before the second set 802.11a (Wi-Fi 2) wireless standard, 24, 180–181,
whose endface is polished and has an 8-degree angle 29 CFR 1910.157 (Portable Fire Extinguishers),
of doors can open 183
Ant+ An ultra-low-power wireless protocol for 712–713
access-list permit Ip any any The instruction added 802.11ac (Wi-Fi 5) wireless standard, 24, 182, 183
wireless sensor networks operating at 2.4GHz 29 CFR 1910.160 (Fixed Extinguishing Systems),
to the last line of an access list to allow all other data 802.11ax (Wi-Fi 6) wireless standard, 25, 182, 183
713–714
packets to enter and exit the router Anycast address An address obtained from a list of 802.11b (Wi-Fi 1) wireless standard, 24, 181, 183
addresses 29 CFR 1910.164 (Fire Detection Systems), 714–715
Access point A transceiver used to interconnect a 802.11g (Wi-Fi 3) wireless standard, 24, 181, 182,
29 CFR 1910.165 (Employee Alarm Systems),
wireless and a wired LAN APIPA Automatic Private IP Addressing, a Windows 183
715–716
process that automatically configures reserved private 802.11i wireless standard, 183
ACK Acknowledgment packet, a packet in the TCP 29 CFR 1910.36 (Design and Construction
IP addresses and subnet masks 802.11n (Wi-Fi 4) wireless standard, 24, 181, 182,
three-way connection handshake Requirements for Exit Routes), 709–710
Application layer Layer 7 of the OSI model, which 183
ACR A measurement that compares the signal level 29 CFR 1910.37 (Maintenance, Safeguards, and
interacts with application programs that incorporate a Operational Features for Exit Routes), 710 802.11r wireless standard, 183
from a transmitter at the far end to the crosstalk
communication component such as an Internet browser 29 CFR 1910.38 (Emergency Action Plans), 710–711 802.16a (WiMAX) wireless standard, 200
measured at the near end
and email 1000BASE-LX cabling, 41
29 CFR 1910.39 (Fire Prevention Plans), 711–712
32-bit CPU architectures, 679 1000BASE-SX cabling, 41
FIGURE I-6
Companion Website
The companion website includes the captured data packets used throughout the book. It also includes the Net-
Challenge software, which was developed specifically for this text. The companion website also includes chapter-
based quiz modules for you to test your knowledge and all of the key terms in an online flash card application.
Finally, you can access your 10% off Network+ exam voucher from the companion website.
xxix
Objectives
● Explain the various LAN topologies ● Describe the purpose of a MAC address
● Define the function of a networking on a networking device
protocol ● Discuss how to determine the MAC
● Describe CSMA/CD for the Ethernet address for a computer
protocol ● Discuss the fundamentals of IP addressing
● Describe the structure of an Ethernet ● Discuss the issues involved in configuring
frame a home network
● Define the function of a network interface ● Discuss the issues involved in assembling
card an office LAN
Key Terms
local area network (LAN) transport layer ISP
protocol session layer private addresses
topology presentation layer intranet
Token Ring network application layer IP internetwork
Token passing CSMA/CD TCP/IP
IEEE frame wired network
deterministic network interface card wireless network
Token Ring hub (NIC) Wi-Fi Alliance
bus topology MAC address wireless router
star topology organizationally unique range extender
hub identifier (OUI) hotspot
multiport repeater Ethernet address, physical service set identifier
address, hardware (SSID)
broadcast
address, or adapter
switch firewall protection
address
port stateful packet inspection
ipconfig /all
mesh topology (SPI)
IANA
OSI model virtual private network
IP address (VPN)
physical layer network number network address
data link layer host number translation (NAT)
network layer host address
1-1 INTRODUCTION
Each day, computer users use their computers for browsing the Internet, sending and
retrieving email, scheduling meetings, sharing files, preparing reports, exchanging
images, downloading music, and checking the current prices of auction items. A
network connects computers with the goal of sharing their resources. The networks
around the world that are connected together form the Internet. Networking requires
that computers be able to access multiple networks and share their resources. This
chapter looks at the various types of computer networks that are in use today.
This book introduces the essentials involved in implementing modern computer
networks, stepping you through the various modern networking technologies. The
accompanying textbook web link takes you to the Net-Challenge simulator software
developed specifically for this text. This software gives you invaluable insight into
the inner workings of computer networking and the experience of configuring
routers and switches for use in computer networks.
The ease of connecting to the Internet and the dramatic decrease in the cost of
computer systems have led to an explosion in the use of computer systems. Organiza-
tions such as corporations, colleges, and government agencies have acquired large
numbers of single-user computer systems. Such systems might be dedicated to word
processing, scientific computation, or process control, or they might be general-
purpose computers that perform many tasks. Interconnection of locally distributed
computer networks enables users to exchange information (data) with other network
members. It also makes possible resource sharing, enabling many to access expensive
equipment such as file servers and high-quality graphics printers as well as more
powerful computers for tasks too complicated for the local computer to process.
The networks in use today can be generally categorized based on their geographic
span:
● Personal area network (PAN): A PAN is the smallest type of network and
has a limited span, interconnecting personal devices such as those that are
Bluetooth enabled.
Table 1-1 outlines the CompTIA Network+ objectives related to this chapter and
identifies the chapter section that covers each objective. At the end of each chapter
section you will find a review with comments on the Network+ objectives presented
in that section. These comments are provided to help reinforce your understanding
of each Network+ objective. The chapter review also includes “Test Your
Knowledge” questions to help you understand key concepts before you advance to
the next section of the chapter. At the end of the chapter you will find a complete
set of questions as well as sample certification exam-type questions.
1-1: INTRODUCTION 5
IEEE
Institute of Electrical
and Electronics Engi-
neers, one of the major
standards-setting
bodies for technological
development
Deterministic
A type of network in
(a) Star network (b) Ring network
which access to the
network is provided at
fixed time intervals
FIGURE 1-1 Network topologies. (From Modern Electronic Communication 9/e, by G. M. Miller &
J. S. Beasley, © 2008 Pearson Education, Inc. Upper Saddle River, NJ.)
One disadvantage of the Token Ring topology is that if an error changes the token
pattern, the token may stop circulating. In addition, ring networks rely on each
system to relay the data to the next user. A failed station can cause data traffic to
cease. Token Ring networks also have disadvantages in terms of troubleshooting
and maintenance. In order to remove a device from a Token Ring network or add
a device to the network, the Token Ring path must be temporarily broken (that is,
the path must be interrupted). This results in downtime for the network. One way to
fix this issue is by attaching all the computers to a central Token Ring hub, which
is a device that manages the passing of the token rather than relying on individual Token Ring Hub
computers to pass it, thereby improving the reliability of the network. A hub that manages the
passing of the token in a
It is important to note that Token Ring has been replaced by Ethernet technology in Token Ring network
almost all modern computer networks.
Laptop computer
Plotter
T
Token ring
Power Mac
PC
Laser printer
PC
PC
The passing of the token
Figure 1-3 illustrates a bus topology, in which the computers share the media
Bus Topology (coaxial cable) for data transmission. In this topology, a coaxial cable (called
A system in which the ThinNet) is looped through each networking device to facilitate data transfer.
computers share the
media (coaxial cable) for In a bus topology, all LAN data traffic is carried over a common coaxial cable
data transmission link. In Figure 1-3, for example, if computer 1 is printing a large file, the line of
communications is between computer 1 and the printer. However, in a bus system,
all networking devices can see computer 1’s data traffic to the printer, and the other
devices have to wait for pauses in transmission or until transmission is complete
before they can initiate their own transmissions. If more than one computer’s
data is placed on the network at the same time, the data is corrupted and has
to be retransmitted. This means that the use of a shared coaxial cable in a bus
topology prevents data transmission from being very bandwidth efficient. This is
one reason—but not the only reason—bus topologies are seldom used in modern
computer networks.
50 Ω Ethernet 50 Ω
Laser printer PC
Traffic
Star Topology
The most common
FIGURE 1-3 The bus topology.
networking topology
in today’s LANs, where
The star topology (also called hub-and-spoke topology), illustrated in Figure 1-4, is all networking devices
the most common networking topology in today’s LANs. Twisted-pair cables with connect to a central
modular plugs are used to connect the computers and other networking devices switch or hub
(see Chapter 2, “Physical Layer Cabling: Twisted-Pair”). At the center of a star Hub
network is either a switch or a hub that connects the network devices and facilitates A device that broadcasts
the transfer of data. For example, if computer 1 in Figure 1-4 wants to send data the data it receives to
to the network laser printer, the hub or switch provides the network connection. If all devices connected to
a hub is used, computer 1’s data is sent to the hub, which then forwards it to the its ports
printer. However, a hub is a multiport repeater, which means the data it receives is
broadcast and seen by all devices connected to its ports. Therefore, the hub broad- Multiport Repeater
casts computer 1’s data traffic to all networking devices that are interconnected in Another name for a hub
the star network. Figure 1-4 shows this data traffic path as solid black arrowed lines Broadcast
going to all networking devices. Much as with the bus topology, all data traffic on Transmission of data
the LAN is being seen by all computers. Because a hub broadcasts all data traffic by a hub to all devices
to the devices connected to its network ports, this device is of limited use in a large connected to its ports
network.
To minimize unnecessary data traffic and isolate sections of a network, you can use
a switch at the center of a star network, as shown in Figure 1-4. Each networking Switch
device, such as a computer, has a hardware or physical address. (This concept is A device that forwards a
fully detailed in Section 1-4, “The Ethernet LAN.”) A switch stores the hardware or frame it receives directly
physical address for each device connected to its ports. The storage of the address out the port associated
enables the switch to directly connect two communicating devices without broad- with its destination
casting the data to all devices connected to its ports. address
Port
A physical input/output
interface to networking
hardware
Laptop computer
5 7
PC PC
4 Hub or switch 1
PC PC
2
3
Laser printer
iMac Pro
PC
For example, if a switch is used instead of a hub, the data from computer 1 is trans-
mitted directly to the printer, and the other computers do not see the data traffic.
The dotted lines in Figure 1-4 indicate the traffic path for a switched network. The
use of a switched connection greatly improves the efficiency of the available band-
width. It also permits additional devices in the LAN to simultaneously commu-
nicate with each other without tying up network resources. For example, while
computer 1 is printing a large file, computers 5 and 6 can communicate with each
other, as illustrated by the dashed line in Figure 1-4. During troubleshooting and
maintenance, individual computers can be removed without negatively affecting
the network in a star or extended star topology. Also, the upgrade from a hub to a
switched topology can be accomplished without requiring a change in the cable
infrastructure and therefore requires minimal downtime and expense.
In a mesh topology, as illustrated in Figure 1-5, all networking devices are directly
connected to each other. This provides for full redundancy in the network data
Mesh Topology
paths—but at a cost. The additional data paths increase the costs related to cabling
A topology in which all
and networking hardware (for example, multiple network ports for each device
networking devices are
directly connected to
connected to the network). In addition, the mesh design adds complexity. This
each other topology can be suitable for high-reliability applications but can be too costly for
general networking applications.
7. Application
6. Presentation
5. Session
4. Transport
3. Network
2. Data link
1. Physical
Note
Network administrators often refer to layer numbers when describing networking problems.
For example, a physical link problem is described as a layer 1 problem, and a router problem is
a layer 3 issue.
984
of vertigo,
425
220
806
of the brain,
774
777
of the spine,
805
Anæmic headache,
402
Anæsthesia, hysterical,
246
in acute myelitis,
819
in chronic alcoholism,
620
spinal meningitis,
753
in hemiplegia,
955
in hystero-epilepsy,
298
in injuries of nerves,
1182
1185
1186
in neuritis,
1191
1192
752
meningitis,
750
syphilis,
1025
in symmetrical gangrene,
1259
1042
1092
1166
of peripheral origin,
1198
Causes,
1199
Diagnosis,
1200
Symptoms,
1199-1201
Treatment,
1201
35
37
35
hysterical,
246
Neuralgia
).
1049
1252
1262
Anidrosis in progressive unilateral facial atrophy,
696
868
888
in nervous diseases,
54
862
864
Anterior cornua, changes in, in amyotrophic lateral sclerosis,
867
1133-1144
397
398
278
1240
Aphasia in nervous diseases,
31
in cerebral anæmia,
776
hemorrhage,
941
syphilis,
1008
956
960
post-epileptic,
481
Aphonia, hysterical,
239
Apoplexy,
917
710
933-952
930
Apoplectiform attacks in tumors of the brain,
1040
817
40
51
in tabes dorsalis,
830
454
in malarial form of cerebral anæmia,
790
in neuralgia,
1224
in paralysis agitans,
438
in tetanus,
559
in tremor,
432
in writers' cramp,
538
711
922
806
684
962
in tabes dorsalis,
837
278
285
59
Asthma, hysterical,
245
671
treatment of insane by removal to,
128
130-135
831
833
848
1041
1094
muscular, in general paralysis of the insane,
189
193
47
612
991
457
pathology, prognosis, and treatment,
46
1219
Atrophy,
1266
54-57
693
868
muscular, in chronic lead-poisoning,
687
688
962
in labio-glosso-laryngeal paralysis,
1172
in nervous diseases,
54
in neuralgia,
1214
1041
in tumors of the spinal cord,
1054
1133-1144
1124
of brain,
170
993
994
388
in labio-glosso-laryngeal paralysis,
1175
905
in writers' cramp,
537
475
421
Auras in migraine,
1230