Download as pdf or txt
Download as pdf or txt
You are on page 1of 67

Networking Essentials, 6th Edition

Beasley
Visit to download the full and correct content document:
https://ebookmass.com/product/networking-essentials-6th-edition-beasley/
NETWORKING ESSENTIALS:
SIXTH EDITION
A COMPTIA NETWORK+ N10-008
TEXTBOOK
INSTRUCTOR EDITION

JEFFREY S. BEASLEY AND PIYASAT NILKAEW

A01_Beasley_FM_pi-xxxi_new.indd 1 24/09/21 7:32 PM


Networking Essentials: Sixth Edition EDITOR-IN-CHIEF
Mark Taber

Instructor Edition DIRECTOR, ITP PRODUCT


MANAGEMENT
Copyright © 2022 by Pearson Education, Inc. Brett Bartow

All rights reserved. This publication is protected by copyright, and permission must be DEVELOPMENT EDITOR
obtained from the publisher prior to any prohibited reproduction, storage in a retrieval Marianne Bartow
system, or transmission in any form or by any means, electronic, mechanical, photo-
copying, recording, or likewise. For information regarding permissions, request forms, MANAGING EDITOR
and the appropriate contacts within the Pearson Education Global Rights & Permissions Sandra Schroeder
Department, please visit www.pearson.com/permissions.
PROJECT EDITOR
No patent liability is assumed with respect to the use of the information contained herein. Mandie Frank
Although every precaution has been taken in the preparation of this book, the publisher
COPY EDITOR
and author assume no responsibility for errors or omissions. Nor is any liability assumed
Kitty Wilson
for damages resulting from the use of the information contained herein.
ISBN-13: 978-0-13-745582-9 INDEXER
Ken Johnson
ISBN-10: 0-13-745582-8
Library of Congress Control Number: 2021913557 PROOFREADER
Abigail Manheim
ScoutAutomatedPrintCode
TECHNICAL EDITOR
Chris Crayton
Trademarks
All terms mentioned in this book that are known to be trademarks or service marks have PEER REVIEWERS
been appropriately capitalized. Pearson IT Certification cannot attest to the accuracy of DeAnnia Clements
this information. Use of a term in this book should not be regarded as affecting the validity Osman Guzide
of any trademark or service mark. Gene Carwile
Dr. Theodor Richardson
Warning and Disclaimer PUBLISHING COORDINATOR
Every effort has been made to make this book as complete and as accurate as possible, Cindy Teeters
but no warranty or fitness is implied. The information provided is on an “as is” basis. The
authors and the publisher shall have neither liability nor responsibility to any person or DESIGNER
entity with respect to any loss or damages arising from the information contained in this Chuti Prasertsith
book.
COMPOSITOR
codeMantra
Special Sales
For information about buying this title in bulk quantities, or for special sales opportunities
(which may include electronic versions; custom cover designs; and content particular to
your business, training goals, marketing focus, or branding interests), please contact our
corporate sales department at [email protected] or (800) 382-3419.
For government sales inquiries, please contact [email protected].
For questions about sales outside the U.S., please contact [email protected].

ii

A01_Beasley_FM_pi-xxxi_new.indd 2 24/09/21 7:32 PM


CREDITS
Figure 1-8 Screenshot of The command prompt in Windows 10 © Microsoft 2020
Figure 1-9 Screenshot of A typical text screen result when entering the ipconfig /all command in the command window.
© Microsoft 2020
Figure 1-15 courtesy for Linksys
Figure 1-18 courtesy Zoom Telephonics, Inc.
Figure 1-19 courtesy for Linksys
Figure 1-27 Screenshot of (a) An example of displaying the IP address for computer 1 using the ipconfig command in Windows
and (b) an example of the displayed IP address in macOS for the built-in Ethernet connection © Microsoft 2020
Figure 2-34 Screenshot of DTX-1800 certification report: Failure due to a termination problem. ©Fluke Corporation
Figure 2-35 Screenshot of DTX-1800 certification report: Failure due to excessive insertion loss. ©Fluke Corporation
Figure 2-36 Screenshot of The certification report for Test 1, showing that a short jumper cable passes the CAT5e link test.
©Fluke Corporation
Figure 2-37 Screenshot of The results for Test 2, showing that the cable failed the CAT5e link test. ©Fluke Corporation
Figure 2-38 Screenshot of The Test 3 CAT5e link test, showing failures with attenuation. ©Fluke Corporation
Figure 2-39 Screenshot of A CAT5e link test, showing failures with delay skew (Test 4). ©Fluke Corporation
Unnumbered
Figure 2-1 Screenshot of Answer the following questions related to the certification report shown here. ©Fluke Corporation
Unnumbered
Figure 2-2 Screenshot of Answer the following questions related to the certification report shown here. ©Fluke Corporation
Unnumbered
Figure 2-3 Screenshot of Answer the following questions related to the certification report shown here - OMNI Scanner. ©Fluke
Corporation
Figure 4-7 Screenshot of An example of the information displayed when an association is formed between a client and an access
point. © Microsoft 2020
Figure 4-8 Screenshot of An example of a lost association. © Microsoft 2020
Figure 4-18 Screenshot of The window for configuring Bluetooth settings on a Mac. © 2020 Apple Inc
Figure 4-19 Screenshot of The Mac window showing the settings for a file transfer. © 2020 Apple Inc
Figure 4-20 Screenshot of The Mac window showing that a text file is coming in from another Bluetooth device.
© 2020 Apple Inc
Figure 4-28 Screenshot of The excellent signal quality measured for the multipoint distribution. © Microsoft 2020
Figure 4-29 Screenshot of The poor signal quality measured at the remote site near the lake. © Microsoft 2020
Figure 5-7 Screenshot of The data traffic captured by computer 2 for the LAN using a hub. © Microsoft 2020
Figure 5-8 Screenshot of The data traffic captured by computer 2 for the LAN using a switch. © Microsoft 2020
Figure 5-9 Screenshot of The startup menu of a Cisco Catalyst switch in the CNA software. © Microsoft 2020
Figure 5-10 Screenshot of The highlighted ports showing the current connections and the location of the stacked switches icon.
© Microsoft 2020
Figure 5-11 Screenshot of The window listing the MAC addresses currently connected to a switch. © Microsoft 2020
Figure 5-13 Screenshot of Configuring an IP address on an interface. © Microsoft 2020
Figure 5-19 Screenshot of Putty configuration © 1997-2020 Simon Tatham
Figure 5-20 Screenshot of The HyperTerminal Connect To dialog © 1997-2020 Simon Tatham
Figure 5-21 Screenshot of The Properties dialogs for configuring the serial port connection PuTTY © 1997-2020 Simon Tatham
Figure 5-23 Screenshot of The macOS dialog for configuring the settings for the serial interface. © 2020 Apple Inc
Figure 5-24 Screenshot of The macOS dialog for setting the serial port to PL2303-000. © 2020 Apple Inc
Figure 5-25 Screenshot of The macOS window listing the serial communication link settings. © 2020 Apple Inc
Figure 6-6 Screenshot of An example of the three packets exchanged in the initial TCP handshake. © Microsoft 2020
Figure 6-8 Screenshot of An example of the four-packet TCP connection termination. © Microsoft 2020
Figure 6-10 Screenshot of An example of a UDP packet transfer. © Microsoft 2020
Figure 6-12 Screenshot of Captured packets showing the (a) ARP request and the (b) ARP reply. © Microsoft 2020
Figure 6-13 Screenshot of The details of the ARP broadcast packet. © Microsoft 2020
Figure 6-14 Screenshot of An example of the use of hex numbers in data packets. © Microsoft 2020
Figure 7-3 Screenshot of The TCP/IP dialog for setting the default gateway address for computer A1. © Microsoft 2020
Figure 7-6 Screenshot of The Net-Challenge screen. © Microsoft 2020
Figure 7-7 Screenshot of The check box window for the Net-Challenge software User EXEC Mode challenge.
© Microsoft 2020

iii

A01_Beasley_FM_pi-xxxi_new.indd 3 24/09/21 7:39 PM


Figure 7-8 Screenshot of The display for step 6, using the show command. © Microsoft 2020
Figure 7-11 Screenshot of The network topology for Net-Challenge. The arrows indicate where to click to display the router IP address
configurations. © Microsoft 2020
Figure 7-14 Screenshot of An example of the port management options available with a Cisco switch: (a) Speed auto-negotiation option;
(b) Duplex auto option. © Microsoft 2020
Figure 9-1a Screenshot of Setting the default gateway address or default static route on a host computer (PC). © Microsoft 2020
Figure 9-1b Screenshot of Setting the default gateway address or default static route on a host computer (macOS). © Microsoft 2020
FIG10-4 Screenshot of Captured DHCP packets. © Microsoft 2020
FIG10-9 Screenshot of An example of using an SNMP software management tool to obtain descriptions of a router’s
interfaces using the MIB ifDescr. © Microsoft 2020
FIG10-11 Screenshot of Using an SNMP software management tool to obtain interface speed settings. © Microsoft 2020
FIG10-12 Screenshot of An example of using SNMP to collect data traffic statistics. © Microsoft 2020
FIG10-23 Screenshot of Initializing Wireshark to capture data packets from a network. © Microsoft 2020
FIG10-24 Screenshot of Starting a capture. © Microsoft 2020
FIG10-25 Screenshot of The captured packets showing the ping from computer 1 to computer 2. © Microsoft 2020
FIG10-26 Screenshot of Computer 2 replying to computer 1 with its MAC address. © Microsoft 2020
FIG10-27 Screenshot of Computer 1 is sending an echo request to computer 2. © Microsoft 2020
FIG10-28 Screenshot of The echo reply received by computer 1. © Microsoft 2020
FIG10-30 Screenshot of (a) The beginning of the FTP data packet transfer and the request for an ASCII data transfer by the client.
(b) The FTP data packet transfer and the closing of the FTP transfer. © Microsoft 2020
FIG10-31 Screenshot of Figure for problems 64–68. © Microsoft 2020
FIG11-9 Screenshot of Windows Firewall in Windows 10. © Microsoft 2020
FIG11-10 Screenshot of Windows 10 Firewall status. © Microsoft 2020
FIG11-11 Screenshot of Windows 10 allowed apps. © Microsoft 2020
FIG11-12 Screenshot of Windows 10 advanced firewall settings. © Microsoft 2020
FIG11-13 Screenshot of Windows 10 echo request properties. © Microsoft 2020
FIG11-14 Screenshot of Windows 10 echo request protocols and ports. © Microsoft 2020
FIG11-15 Screenshot of macOS firewall. © 2020 Apple Inc
FIG11-16 Screenshot of macOS advanced settings. © 2020 Apple Inc
FIG11-17 Screenshot of Linux iptables © The Netfilter’s webmasters
FIG11-19 Screenshot of An example of setting WEP encryption on a wireless client. © Microsoft 2020
FIG11-26 Screenshot of The traceroute from the VPN server to the VPN remote client. © Microsoft 2020
FIG11-27 Screenshot of The first window, the VPN Client status window, is displayed after starting the VPN client software.
© Cisco systems
FIG11-28 Screenshot of The connection screen for establishing a VPN link. © Cisco systems
FIG11-29 Screenshot of The initial handshake screen for the VPN client. © Cisco systems
FIG11-30 Screenshot of The menu showing that the VPN client has successfully connected to the virtual private network.
© Cisco systems
FIG11-31 Screenshot of The Preferences window for the VPN client. © Cisco systems
FIG11-32 Screenshot of The Statistics window (a) and Route Details window (b) for the VPN client. © Cisco systems
FIG12-1 Screenshot of Enabling Hyper-V © Microsoft 2020
FIG12-2 Screenshot of Using Hyper-V Manager © Microsoft 2020
FIG12-3 Screenshot of Creating a virtual switch in Hyper-V © Microsoft 2020
FIG12-4 Screenshot of Specifying the name of a virtual switch © Microsoft 2020
FIG12-5 Screenshot of Creating a virtual machine © Microsoft 2020
FIG12-6 Screenshot of Specifying the name and location of a virtual machine. © Microsoft 2020
FIG12-7 Screenshot of Specifying the generation of the virtual machine © Microsoft 2020
FIG12-8 Screenshot of Specifying the desired memory size for a VM. © Microsoft 2020
FIG12-9 Screenshot of Selecting the connection name of the virtual switch. © Microsoft 2020
FIG12-10 Screenshot of Specifying a virtual hard disk name, location, and size. © Microsoft 2020
FIG12-11 Screenshot of The options for installing the VM’s operating system. © Microsoft 2020
FIG12-12 Screenshot of Starting the new VM. © Microsoft 2020
FIG12-13 Screenshot of The final VM screen, showing that the machine is up. © Microsoft 2020
Peter Mell (NIST), Tim Grance (NIST), The NIST Definition of Cloud Computing, SP 800-145
Cover Artistdesign29/Shutterstock

iv

A01_Beasley_FM_pi-xxxi_new.indd 4 24/09/21 7:39 PM


CONTENTS AT A GLANCE
Introduction xxiii

1 Introduction to Computer Networks 2

2 Physical Layer Cabling: Twisted-Pair 62

3 Physical Layer Cabling: Fiber Optics 124

4 Wireless Networking 172

5 Interconnecting the LANs 228

6 TCP/IP 290

7 Introduction to Router Configuration 354

8 Introduction to Switch Configuration 404

9 Routing Protocols 444

10 Managing the Network Infrastructure 524

11 Network Security 590

12 Cloud Computing and Virtualization 676

13 Codes and Standards 706

Glossary 742

Index 764

Online Only Elements:


Net-Challenge Software

Wireshark Captures

Network+ quizzes

A01_Beasley_FM_pi-xxxi_new.indd 5 24/09/21 7:32 PM


CONTENTS
Introduction xxiii

CHAPTER 1 Introduction to Computer Networks 2


Chapter Outline 3
Objectives 3
Key Terms 3
1-1 Introduction 4
1-2 Network Topologies 6
Section 1-2 Review 11
Test Your Knowledge 11
1-3 The OSI Model 12
Section 1-3 Review 15
Test Your Knowledge 15
1-4 The Ethernet LAN 16
IP Addressing 20
Section 1-4 Review 22
Test Your Knowledge 23
1-5 Home Networking 24
Securing a Home Network 33
IP Addressing in a Home Network 34
Section 1-5 Review 36
Test Your Knowledge 38
1-6 Assembling an Office LAN 38
Diagram the Network 39
Connect the Network Devices 40
Configure the Computers to Operate on the LAN 44
Section 1-6 Review 44
Test Your Knowledge 45
1-7 Testing and Troubleshooting a LAN 45
Section 1-7 Review 48
Test Your Knowledge 49
Summary 50
Questions and Problems 50
Certification Questions 59

vi

A01_Beasley_FM_pi-xxxi_new.indd 6 24/09/21 7:32 PM


CHAPTER 2 Physical Layer Cabling: Twisted-Pair 62
Chapter Outline 63
Objectives 63
Key Terms 63
2-1 Introduction 65
2-2 Structured Cabling 66
Horizontal Cabling 69
Section 2-2 Review 73
Test Your Knowledge 73
2-3 Twisted-Pair Cable 74
Unshielded Twisted-Pair Cable 74
Shielded Twisted-Pair Cable 76
Section 2-3 Review 77
Test Your Knowledge 77
2-4 Terminating Twisted-Pair Cables 78
Computer Communication 79
Straight-Through and Crossover Patch Cables 82
Section 2-4 Review 90
Test Your Knowledge 91
2-5 Cable Testing and Certification 92
Section 2-5 Review 96
Test Your Knowledge 97
2-6 10 Gigabit Ethernet over Copper 97
Overview 98
Alien Crosstalk 98
Signal Transmission 100
Section 2-6 Review 101
Test Your Knowledge 101
2-7 Troubleshooting Cabling Systems 102
Cable Stretching 102
Cable Failing to Meet Manufacturer Specifications 102
CAT5e Cable Test Examples 104
Section 2-7 Review 111
Test Your Knowledge 111
Summary 112
Questions and Problems 112
Certification Questions 121

CONTENTS vii

A01_Beasley_FM_pi-xxxi_new.indd 7 24/09/21 7:32 PM


CHAPTER 3 Physical Layer Cabling: Fiber Optics 124
Chapter Outline 125
Objectives 125
Key Terms 125
3-1 Introduction 126
3-2 The Nature of Light 129
Graded-Index Fiber 133
Single-Mode Fibers 134
Section 3-2 Review 135
Test Your Knowledge 135
3-3 Fiber Attenuation and Dispersion 136
Attenuation 136
Dispersion 137
Dispersion Compensation 139
Section 3-3 Review 140
Test Your Knowledge 140
3-4 Optical Components 141
Intermediate Components 142
Detectors 143
Fiber Connectorization 145
Section 3-4 Review 146
Test Your Knowledge 147
3-5 Optical Networking 147
Defining Optical Networking 148
Building Distribution 151
Campus Distribution 154
Optical Link Budget 157
Section 3-5 Review 158
Test Your Knowledge 159
3-6 Safety 160
Section 3-6 Review 161
Test Your Knowledge 162
3-7 Troubleshooting Fiber Optics: The OTDR 162
Section 3-7 Review 164
Test Your Knowledge 164
Summary 165
Questions and Problems 165
Certification Questions 169

viii CONTENTS

A01_Beasley_FM_pi-xxxi_new.indd 8 24/09/21 7:32 PM


CHAPTER 4 Wireless Networking 172
Chapter Outline 173
Objectives 173
Key Terms 173
4-1 Introduction 174
4-2 The IEEE 802.11 Wireless LAN Standard 175
Section 4-2 Review 184
Test Your Knowledge 185
4-3 802.11 Wireless Networking 185
Section 4-3 Review 195
Test Your Knowledge 196
4-4 Bluetooth, WiMAX, RFID, and Mobile Communications 197
Bluetooth 197
WiMAX 199
Radio Frequency Identification 200
Mobile (Cellular) Communications 204
Section 4-4 Review 205
Test Your Knowledge 206
4-5 Configuring a Point-to-Multipoint Wireless LAN: A Case Study 206
Step 1: Conducting an Antenna Site Survey 207
Step 2: Establishing a Point-to-Point Wireless Link to the Home Network 208
Steps 3 and 4: Configuring the Multipoint Distribution and Conducting an RF Site Survey 209
Step 5: Configuring the Remote Installations 211
Section 4-5 Review 212
Test Your Knowledge 212
4-6 Troubleshooting Wireless Networks 213
Access Point Hardware Issues 213
Wireless Router Issues 213
Wireless Compatibility 213
Signal Strength Problems 214
Wireless Coverage 214
Extending the Wireless Range 214
Frequency Interference Problems 214
Wireless Channel Utilization 214
Load Issues 215
SSID Issues 215
Securing Wi-Fi Issues 215
Cable Issues 215
Deauthentication/Disassociation Attacks 215

CONTENTS ix

A01_Beasley_FM_pi-xxxi_new.indd 9 24/09/21 7:32 PM


DHCP Issues 216
Wireless Printer Issues 216
Section 4-6 Review 216
Test Your Knowledge 216
Summary 217
Questions and Problems 217
Critical Thinking 224
Certification Questions 224

CHAPTER 5 Interconnecting the LANs 228


Chapter Outline 229
Objectives 229
Key Terms 229
5-1 Introduction 230
5-2 The Network Bridge 232
Section 5-2 Review 236
Test Your Knowledge 237
5-3 The Network Switch 237
Hub and Switch Comparison 239
Managed Switches 242
Multilayer Switches 247
Section 5-3 Review 247
Test Your Knowledge 248
5-4 The Router 249
The Router Interface 250
Quality of Service 251
Section 5-4 Review 253
Test Your Knowledge 254
5-5 The Console Port Connection 254
Configuring the PuTTY Software (Windows) 256
Configuring the ZTerm Serial Communications Software (Mac) 259
Section 5-5 Review 261
Test Your Knowledge 261
5-6 Interconnecting LANs with the Router 262
Gateway Address 265
Network Segments 265
Section 5-6 Review 266
Test Your Knowledge 266

x CONTENTS

A01_Beasley_FM_pi-xxxi_new.indd 10 24/09/21 7:32 PM


5-7 Interconnecting LANs and WANs 267
Three-Tiered LAN Architecture 267
Core 268
Distribution/Aggregation Layer 269
Access/Edge Layer 269
Traffic Flow 269
Data Center Architecture 269
WAN High-Speed Serial Connections 270
Data Channels 270
Point of Presence 271
Metro Optical Ethernet/Carrier Ethernet 273
Ethernet Service Types 274
Service Attributes 276
Section 5-7 Review 277
Test Your Knowledge 277
Summary 279
Questions and Problems 279
Critical Thinking 287
Certification Questions 287

CHAPTER 6 TCP/IP 290


Chapter Outline 291
Objectives 291
Key Terms 291
6-1 Introduction 292
6-2 The TCP/IP Layers 294
The Application Layer 295
The Transport Layer 296
The Internet Layer 301
The Network Interface Layer 304
Section 6-2 Review 304
Test Your Knowledge 305
6-3 Number Conversion 306
Binary-to-Decimal Conversion 306
Decimal-to-Binary Conversion 307
Hexadecimal Numbers 309
Converting Hexadecimal 309
Section 6-3 Review 312
Test Your Knowledge 312

CONTENTS xi

A01_Beasley_FM_pi-xxxi_new.indd 11 24/09/21 7:32 PM


6-4 IPv4 Addressing 312
Section 6-4 Review 316
Test Your Knowledge 316
6-5 Subnet Masks: Subnetting and Supernetting 317
Subnetting 318
Alternative Technique to Derive the Subnets: Magic Number 323
Subnet Masking Examples 324
Gateway IP Address 326
Section 6-5 Review 327
Test Your Knowledge 327
6-6 Supernetting, CIDR Blocks, and VLSM 328
Section 6-6 Review 332
Test Your Knowledge 332
6-7 IPv6 Addressing 333
Transitioning to IPv6 335
CIDR for IPv6 337
Section 6-7 Review 338
Test Your Knowledge 339
Summary 340
Questions and Problems 340
Critical Thinking 349
Certification Questions 350

CHAPTER 7 Introduction to Router Configuration 354


Chapter Outline 355
Objectives 355
Key Terms 355
7-1 Introduction 356
7-2 Router Fundamentals 358
Layer 3 Networks 359
Section 7-2 Review 364
Test Your Knowledge 365
7-3 The Router’s User EXEC Mode (Router>) 366
The User EXEC Mode 366
Router Configuration Challenge: User EXEC Mode 369
Section 7-3 Review 372
Test Your Knowledge 372
7-4 The Router’s Privileged EXEC Mode (Router#) 373
The hostname Command 374

xii CONTENTS

A01_Beasley_FM_pi-xxxi_new.indd 12 24/09/21 7:32 PM


The enable secret Command 375
Setting the Line Console Passwords 375
FastEthernet Interface Configuration 376
Serial Interface Configuration 377
Router Configuration Challenge: Privileged EXEC Mode 380
Section 7-4 Review 382
Test Your Knowledge 382
7-5 Configuring the Network Interface: Auto-negotiation 383
Auto-negotiation Steps 384
Full-Duplex/Half-Duplex 384
Section 7-5 Review 386
Test Your Knowledge 387
7-6 Troubleshooting the Router Interface 387
Section 7-6 Review 392
Test Your Knowledge 392
Summary 393
Questions and Problems 393
Critical Thinking 399
Certification Questions 400

CHAPTER 8 Introduction to Switch Configuration 404


Chapter Outline 405
Objectives 405
Key Terms 405
8-1 Introduction 406
8-2 Introduction to VLANs 407
Virtual LANs 407
Section 8-2 Review 409
Test Your Knowledge 410
8-3 Introduction to Switch Configuration 410
Hostname 411
Enable Secret 412
Setting the Line Console Passwords 412
Static VLAN Configuration 414
VLAN Subinterfaces 418
Networking Challenge: Switch Configuration 419
Section 8-3 Review 420
Test Your Knowledge 421

CONTENTS xiii

A01_Beasley_FM_pi-xxxi_new.indd 13 24/09/21 7:32 PM


8-4 Spanning Tree Protocol 422
Section 8-4 Review 424
Test Your Knowledge 425
8-5 Power over Ethernet 425
Section 8-5 Review 428
Test Your Knowledge 429
8-6 Troubleshooting the Switch Interface 429
Section 8-6 Review 434
Test Your Knowledge 435
Summary 436
Questions and Problems 436
Critical Thinking 440
Certification Questions 441

CHAPTER 9 Routing Protocols 444


Chapter Outline 445
Objectives 445
Key Terms 445
9-1 Introduction 446
9-2 Static Routing 447
Gateway of Last Resort 454
Configuring Static Routes 454
Networking Challenge: Static Routes 458
Section 9-2 Review 458
Test Your Knowledge 459
9-3 Dynamic Routing Protocols 460
Section 9-3 Review 462
Test Your Knowledge 463
9-4 Distance Vector Protocols 463
Section 9-4 Review 465
Test Your Knowledge 466
9-5 Configuring RIP and RIPv2 466
Configuring Routes with RIP 468
Configuring Routes with RIPv2 473
Networking Challenge: RIPv2 474
Section 9-5 Review 475
Test Your Knowledge 476
9-6 Link State Protocols 476
Section 9-6 Review 480

xiv CONTENTS

A01_Beasley_FM_pi-xxxi_new.indd 14 24/09/21 7:32 PM


Test Your Knowledge 480
9-7 Configuring the Open Shortest Path First (OSPF) Routing Protocol 481
Networking Challenge: OSPF 485
Section 9-7 Review 486
Test Your Knowledge 487
9-8 Advanced Distance Vector Protocol: Configuring Enhanced Interior
Gateway Routing Protocol (EIGRP) 487
Configuring Routes with EIGRP 488
Networking Challenge: EIGRP 494
Section 9-8 Review 495
Test Your Knowledge 495
9-9 Internet Routing with Border Gateway Protocol (BGP) 496
Configuring BGP 496
Section 9-9 Review 498
Test Your Knowledge 498
9-10 IPv6 Routing 499
IPv6 Static Routing 499
RIP for IPv6 499
OSPF for IPv6 500
EIGRP for IPv6 501
BGP for IPv6 501
Section 9-10 Review 502
Test Your Knowledge 503
Summary 504
Questions and Problems 504
Critical Thinking 520
Certification Questions 520

CHAPTER 10 Managing the Network Infrastructure 524


Chapter Outline 525
Objectives 525
Key Terms 525
10-1 Introduction 527
10-2 Domain Name and IP Address Assignment 528
Section 10-2 Review 531
Test Your Knowledge 531
10-3 IP Address Management with DHCP 531
The DHCP Data Packets 534
DHCP Deployment 535

CONTENTS xv

A01_Beasley_FM_pi-xxxi_new.indd 15 24/09/21 7:32 PM


Section 10-3 Review 537
Test Your Knowledge 537
10-4 Scaling a Network with NAT and PAT 537
Section 10-4 Review 539
Test Your Knowledge 539
10-5 Domain Name System (DNS) 539
DNS Resource Records 541
Section 10-5 Review 546
Test Your Knowledge 546
10-6 Network Management Protocols 546
Configuring SNMP 547
Section 10-6 Review 551
Test Your Knowledge 552
10-7 Analyzing Network Traffic 552
Section 10-7 Review 559
Test Your Knowledge 559
10-8 Network Analyzer: Wireshark 560
Downloading and Installing Wireshark 560
Using Wireshark to Capture Packets 561
Using Wireshark to Inspect Data Packets 562
Section 10-8 Review 565
Test Your Knowledge 565
10-9 Analyzing Computer Networks: FTP Data Packets 566
Section 10-9 Review 567
Test Your Knowledge 567
10-10 Troubleshooting IP Networks 568
Verifying Network Settings 570
Investigating IP Address Issues 570
Finding Subnet Mask Issues 570
Looking for Gateway Issues 571
Identifying Name Resolution Issues 571
Investigating DHCP Issues 571
Checking for Blocked TCP/UDP Ports 573
Section 10-10 Review 573
Test Your Knowledge 573
Summary 574
Questions and Problems 574
Certification Questions 587

xvi CONTENTS

A01_Beasley_FM_pi-xxxi_new.indd 16 24/09/21 7:32 PM


CHAPTER 11 Network Security 590
Chapter Outline 591
Objectives 591
Key Terms 591
11-1 Introduction 592
11-2 Intrusion: How Attackers Gain Control of a Network 594
Social Engineering 595
Password Cracking 596
Packet Sniffing 597
Packet Sniffing Attacks 598
Vulnerable Software 599
Preventing Vulnerable Software Attacks 600
Malware 602
Section 11-2 Review 604
Test Your Knowledge 605
11-3 Denial-of-Service 606
Distributed Denial-of-Service Attacks 608
Section 11-3 Review 609
Test Your Knowledge 609
11-4 Security Software and Hardware 610
Personal Firewalls 610
Antivirus/Anti-malware Software 610
Configuring Firewall Settings for Windows 10 611
Configuring Firewall Settings for macOS 615
Configuring Firewall Settings for Linux 616
Firewalls 617
Other Security Appliances 619
Computer Forensics 621
Section 11-4 Review 622
Test Your Knowledge 622
11-5 Managing Network Access 623
Section 11-5 Review 625
Test Your Knowledge 625
11-6 Router Security 626
Router Access 626
Router Services 628
Logging 630
Section 11-6 Review 631
Test Your Knowledge 631

CONTENTS xvii

A01_Beasley_FM_pi-xxxi_new.indd 17 24/09/21 7:32 PM


11-7 Switch Security 631
Switch Port Security 633
Dynamic ARP Inspection 635
STP Special Features 635
Section 11-7 Review 637
Test Your Knowledge 637
11-8 Wireless Security 637
Section 11-8 Review 641
Test Your Knowledge 642
11-9 Remote Access and VPN Technologies 642
Analog Modem Technologies 643
Cable Modems 644
xDSL Modems 644
Remote Access Server 647
Virtual Private Network 647
VPN Tunneling Protocols 648
Configuring a Remote Client’s VPN Connection 652
Configuring a Windows 10 VPN Client 652
Configuring a macOS VPN Client 652
Configuring a Cisco VPN Client 653
Section 11-9 Review 658
Test Your Knowledge 658
11-10 Physical Security 659
Access Control Hardware 660
Detection Methods 661
Asset Disposal 662
Internet of Things (IoT) Security Devices 662
Section 11-10 Review 663
Test Your Knowledge 663
Summary 664
Questions and Problems 664
Critical Thinking 674
Certification Questions 674

CHAPTER 12 Cloud Computing and Virtualization 676


Chapter Outline 677
Objectives 677
Key Terms 677
12-1 Introduction 678

xviii CONTENTS

A01_Beasley_FM_pi-xxxi_new.indd 18 24/09/21 7:32 PM


12-2 Virtualization 679
Setting Up Virtualization on Windows 10 682
Section 12-2 Review 691
Test Your Knowledge 691
12-3 Cloud Computing 692
Cloud Computing Service Models 694
Cloud Infrastructures 696
Section 12-3 Review 697
Test Your Knowledge 698
12-4 Enterprise Storage 698
Section 12-4 Review 700
Test Your Knowledge 700
Summary 701
Questions and Problems 701
Certification Questions 704

CHAPTER 13 Codes and Standards 706


Chapter Outline 707
Objectives 707
Key Terms 707
13-1 Introduction 708
13-2 Safety Standards and Codes 708
Design and Construction Requirements for Exit Routes (29 CFR 1910.36) 709
Maintenance, Safeguards, and Operational Features for Exit Routes (29 CFR 1910.37) 710
Emergency Action Plans (29 CFR 1910.38) 710
Fire Prevention Plans (29 CFR 1910.39) 711
Portable Fire Extinguishers (29 CFR 1910.157) 712
Fixed Extinguishing Systems (29 CFR 1910.160) 713
Fire Detection Systems (29 CFR 1910.164) 714
Employee Alarm Systems (29 CFR 1910.165) 715
Hazard Communication (29 CFR 1910.1200) 716
HVAC Systems 717
Door Access 717
Section 13-2 Review 718
Test Your Knowledge 718
13-3 Industry Regulatory Compliance 718
FERPA 719
FISMA 719
GDPR 719

CONTENTS xix

A01_Beasley_FM_pi-xxxi_new.indd 19 24/09/21 7:32 PM


GLBA 719
HIPAA 720
PCI DSS 720
International Export Controls 720
Section 13-3 Review 722
Test Your Knowledge 722
13-4 Business Policies, Procedures, and Other Best Practices 723
Memorandum of Understanding 723
Service-Level Agreement 724
Master Service Agreement 724
Master License Agreement 724
Non-Disclosure Agreement 725
Statement of Work 725
Acceptable Use Policy 725
Incident Response Policy 725
Password Policy 726
Privileged User Agreement 726
Standard Operating Procedure 726
Onboarding and Offboarding Policies 727
Other Best Practices 727
Section 13-4 Review 728
Test Your Knowledge 728
13-5 Business Continuity and Disaster Recovery 729
Section 13-5 Review 732
Test Your Knowledge 732
Summary 733
Questions and Problems 733
Certification Questions 739

Glossary 742
Index 764

Online Only Elements:


Net-Challenge Software
Wireshark Captures
Network+ quizzes

xx CONTENTS

A01_Beasley_FM_pi-xxxi_new.indd 20 24/09/21 7:32 PM


ABOUT THE AUTHORS
Jeffrey S. Beasley is a professor emeritus in the Information and Communications Technology program at
New Mexico State University, where he taught computer networking and many related topics. He is coauthor of
Modern Electronic Communication, ninth edition, the author of Networking, second edition, and co-author of
Networking Essentials, fifth edition, and A Practical Guide to Advanced Networking.
Piyasat Nilkaew is the director of Computing and Networking Infrastructure at New Mexico State University
and has more than 20 years of experience in network management and consulting. He has extensive expertise
in deploying and integrating multiprotocol and multivendor data, voice, and video network solutions. He is
co-author of Networking Essentials, fifth edition, and A Practical Guide to Advanced Networking.

ABOUT THE TECHNICAL REVIEWER


Chris Crayton is a technical consultant, trainer, author, and industry-leading technical editor. He has worked as
a computer technology and networking instructor, information security director, network administrator, network
engineer, and PC specialist. Chris has authored several print and online books on PC repair, CompTIA A+,
CompTIA Security+, and Microsoft Windows. He has also served as technical editor and content contributor on
numerous technical titles for several of the leading publishing companies. He holds numerous industry certifica-
tions, has been recognized with many professional and teaching awards, and has served as a state-level SkillsUSA
final competition judge. Chris tech edited and contributed to this book to make it better for students and those
wishing to better their lives.

DEDICATIONS
This book is dedicated to my family: Kim, Damon/Heather, and Dana/Sam. —Jeff Beasley

This book is dedicated to my family: Boonsong, Pariya, June, Ariya, and Atisat. —Piyasat Nilkaew

ACKNOWLEDGMENTS
I am grateful to the many people who have helped with this text. My sincere thanks go to the following technical
consultants:

● Danny Bosch and Matthew Peralta for sharing their expertise with optical networks and unshielded
twisted-pair cabling
● Don Yates for his help with the initial Net-Challenge software

I would also like to thank my many past and present students for their help with this book:

● Abel Sanchez, Kathryn Sager, and Joshua Cook for their work on the Net-Challenge software; Adam
Segura for his help taking pictures of the steps for CAT6 termination; Marc Montez, Carine George-Morris,
Brian Morales, Michael Thomas, Jacob Ulibarri, Scott Leppelman, and Aarin Buskirk for their help with
laboratory development; Josiah Jones and Raul Marquez Jr. for their help with the Wireshark material; and
Ariya Nilkaew for her help with revising and editing many of the captured pictures

xxi

A01_Beasley_FM_pi-xxxi_new.indd 21 24/09/21 7:32 PM


● Aaron Shapiro and Aaron Jackson for their help testing the many network connections presented in the text
● Paul Bueno and Anthony Bueno for reading through an early draft of the text

Your efforts are greatly appreciated.


We appreciate the excellent feedback of the following reviewers: Phillip Davis, DelMar College, Texas; Thomas
D. Edwards, Carteret Community College, North Carolina; William Hessmiller, Editors & Training Associates;
Bill Liu, DeVry University, California; and Timothy Staley, DeVry University, Texas.
Our thanks to the people at Pearson for making this project possible. Thanks to Brett Bartow for providing
us with the opportunity to work on the sixth edition and for helping make this process enjoyable. Thanks to
Marianne Bartow, to all the people at Pearson IT Certification, and also to the many technical editors for their
help editing the manuscript.
Special thanks to our families for their continued support and patience.
—Jeffrey S. Beasley and Piyasat Nilkaew

WE WANT TO HEAR FROM YOU!


As the reader of this book, you are our most important critic and commentator. We value your opinion and want
to know what we’re doing right, what we could do better, what areas you’d like to see us publish in, and any other
words of wisdom you’re willing to pass our way.
We welcome your comments. You can email or write to let us know what you did or didn’t like about this book—
as well as what we can do to make our books better.
Please note that we cannot help you with technical problems related to the topic of this book.
When you write, please be sure to include this book’s title and author as well as your name and email address. We
will carefully review your comments and share them with the authors and editors who worked on the book.
Email: [email protected]

READER SERVICES
Register your copy of Networking Essentials, Sixth Edition at www.pearsonitcertification.com for conve-
nient access to downloads, updates, and corrections as they become available. To start the registration process,
go to www.pearsonitcertification.com/register and log in or create an account.* Enter the product ISBN
9780137455928 and click Submit. When the process is complete, you will find any available bonus content under
Registered Products.
*Be sure to check the box that you would like to hear from us to receive exclusive discounts on future editions of
this product.

xxii

A01_Beasley_FM_pi-xxxi_new.indd 22 24/09/21 7:32 PM


INTRODUCTION
This book provides a look at computer networking from the point of view of a network administrator. It guides
readers from an entry-level knowledge of computer networks to advanced concepts related to Ethernet networks;
router configuration; TCP/IP networks; routing protocols; local, campus, and wide area network configuration;
network security; wireless networking; optical networks; voice over IP; network servers; and Linux networking.
After reading the entire text, you will have gained a solid knowledge base in computer networks.
In our years of teaching, we have observed that technology students prefer to learn “how to swim” after they have
gotten wet and taken in a little water. Then they are ready for more challenges. In this book, we therefore show
you the technology, how it is used, and why, and you can take the applications of the technology to the next level.
Allowing you to experiment with the technology helps you develop a greater understanding.

ORGANIZATION OF THE TEXT


This book has been thoroughly updated to reflect the latest version of the CompTIA Network+ exam. Networking
Essentials, sixth edition, is a practical, up-to-date, and hands-on guide to the basics of networking. Written from
the viewpoint of the network administrator, it requires absolutely no previous experience with either network
concepts or day-to-day network management. Throughout the text, you will gain an appreciation of how basic
computer networks and related hardware are interconnected to form a network. You will come to understand the
concepts of twisted-pair cable, fiber optics, LANs interconnection, TCP/IP configuration, subnet masking, basic
router configuration, switch configuration and management, wireless networking, and network security.
The textbook’s companion website contains laboratory exercises, the Net-Challenge software, Wireshark
captures, and the Network+ terminology quizzes.

xxiii

A01_Beasley_FM_pi-xxxi_new.indd 23 24/09/21 7:32 PM


Key Pedagogical Features
● The Chapter Outline, Network+ Objectives, Key Terms, and Introduction at the beginning of each chapter
clearly outline specific goals for you, the reader. Figure I-1 shows an example of these features.

Introduction: Chapter openers


Chapter Outline Chapter Objectives clearly outline specific goals

174

Key Terms for this Chapter

FIGURE I-1

xxiv

A01_Beasley_FM_pi-xxxi_new.indd 24 24/09/21 7:32 PM


● The Net-Challenge software provides simulated hands-on experience configuring routers and switches.
Exercises provided in the text (see Figure I-2) and companion website challenge you to undertake certain
router/network configuration tasks. These challenges help you check your ability to enter basic networking
commands and to set up router functions, such as configuring the interface (Ethernet and serial) and rout-
ing protocols (for example, RIP, static). The software has the look and feel of actually being connected to a
router’s console port.

Net-Challenge exercises are found Exercises challenge readers to


throughout the text where applicable undertake certain tasks

380 381

FIGURE I-2

xxv

A01_Beasley_FM_pi-xxxi_new.indd 25 24/09/21 7:32 PM


● The textbook features and introduces how to use the Wireshark network protocol analyzer. Examples of
using the software to analyze data traffic are included throughout the text. Numerous worked-out examples
are included in every chapter to reinforce key concepts and aid in subject mastery, as shown in Figure I-3.

Examples using the Wireshark


protocol analyzer are included
throughout the text where applicable

Downloading and Installing Wireshark


To download and install the latest version of the Wireshark software, follow these
steps:

1. Visit www.Wireshark.org, click Download Wireshark, and select your


corresponding operating system.
2. Click Run when the dialog box appears to initiate the download process.
3. At the setup wizard prompt, select Next and agree to the license agreement.
4. Choose the components you would like to install and click Next to continue.
5. Select program shortcuts and click Next to continue.
6. Use the default directory paths specified in the setup menu and click Install
to start the installation process.

When the Wireshark software is installed, you are ready to begin using it.

Using Wireshark to Capture Packets


In most cases, you will want to capture data packets from your own network. The
following steps describe how to use Wireshark to capture packets:

1. In Windows, click Start > Programs > Wireshark and selectWireshark to


start the program. In macOS, go to the Applications folder and then select
Wireshark to start the program.
2. To capture packets on an operating network, select the interfaces in which you
would like to obtain the capture (see Figure 10-23) by going to Capture >
Interfaces. After selecting your interfaces, click Start to start capturing,
as shown in Figure 10-24. You can also get to the interface list by clicking
Interface List on the Wireshark home screen.
3. To examine the packets, stop the simulation by clicking Capture > Stop.
Remember that there must be some activity on your network for packets to
be transferred. You might see little traffic activity if your network is in the lab
and there is limited network activity. You can always use the ping command
to generate some network data activity, if needed.

To open a saved capture file, click File > Open or click Open on the Wireshark
home screen.
To change capture options, click Capture > Options and change the options to
your preferred settings.

10-8: NETWORK ANALYZER: WIRESHARK 561

FIGURE I-3

xxvi

A01_Beasley_FM_pi-xxxi_new.indd 26 24/09/21 7:32 PM


● Key Terms and their definitions are highlighted in the margins to foster inquisitiveness and ensure retention.
Illustrations and photos are used throughout to aid in understanding the concepts discussed (see Figure I-4).

Key terms are


highlighted in the
text and defined
in the margin

The users (clients) in the wireless LAN can communicate with other members of
Extended Service the network as long as a link is established with the access point. For example, data
Set (ESS) traffic from PC-A to PC-E first passes through the access point and then to PC-E in
A network with multiple the wired LAN.
access points to extend
user mobility The problem with a basic service set is that mobile users can travel outside the
radio range of a station’s wireless link if there is only one access point. One
Hand-off solution is to add multiple access points to the network. Multiple access points
The process in which extend the range of mobility of a wireless client in the LAN. This arrangement is
a user’s computer called an extended service set (ESS). In the example of an ESS in Figure 4-3, the
establishes an mobile computer establishes an authorized connection with the access point that
association with another
has the strongest signal level (for example, AP-1). As the user moves, the strength
access point
of the signal from AP-1 decreases. At some point, the signal strength from AP-2
Roaming exceeds that from AP-1, and the wireless bridge establishes a new connection
The term used to with AP-2. This is called a hand-off. The hand-off is an automatic process for the
describe a user’s ability wireless client adapter in 802.11, and the term used to describe this is roaming.
to maintain network
Network access in 802.11 uses a technique called carrier sense multiple access with
connectivity while
moving through the collision avoidance (CSMA/CA). In CSMA/CA, the client station listens for other
workplace users of the wireless network. If the channel is quiet (that is, no data transmission
is occurring), the client station can transmit. If the channel is busy, the station(s)
must wait until transmission stops. Each client station uses a unique random
CSMA/CA back-off time. This technique prevents client stations from trying to gain access
Carrier sense multiple to the wireless channel as soon as it becomes quiet. Currently four physical layer
access with collision technologies are being used in 802.11 wireless networking: direct-sequence spread
avoidance spectrum (DSSS), frequency-hopping spread spectrum (FHSS), infrared, and
orthogonal frequency-division multiplexing (OFDM). DSSS is used in 802.11b/g/n
wireless networks, and OFDM is used in 802.11a, 802.11g, 802.11n, 802.11ac, and
802.11ax.

Laptop
Computer

AP-1 AP-3

AP-2

FIGURE 4-3 An example of an extended service set used for increased user mobility.

178 CHAPTER 4: WIRELESS NETWORKING

FIGURE I-4

xxvii

A01_Beasley_FM_pi-xxxi_new.indd 27 24/09/21 7:32 PM


● A Summary, Questions and Problems, Critical Thinking, and Certification Questions are provided at the
end of each chapter, as shown in Figure I-5

Summary of Questions and problems Critical Thinking questions and problems


key concepts are organized by section further develop analytical skills

664 674

FIGURE I-5

xxviii

A01_Beasley_FM_pi-xxxi_new.indd 28 24/09/21 7:32 PM


● An extensive Glossary at the end of the book offers quick, accessible definitions to key terms and acro-
nyms, and this book also includes an exhaustive Index (see Figure I-6).

Complete Glossary of terms and Exhaustive Index provides


acronyms provide quick reference quick reference

? The help command, which can be used at any Active/active An architecture in which both the Symbols 40GBASE-T cabling, 41
64-bit CPU architectures, 679
prompt in the command-line interface for the Cisco primary site and the disaster recovery site are up and ? (help) command, 367
IOS software running at the same time 100BASE-FX cabling, 41
100BASE-SX cabling, 41
10GBASE-T Twisted-pair copper capable of 10Gbps Active/passive An architecture in which the disaster
recovery site is idle, in standby mode
Numbers 100BASE-TX cabling, 41
3G/4G Third Generation and Fourth Generation, 802.1x (dot1x) wireless standard, 633
digital mobile phone technologies developed to provide Adaptive cut-through A mode that is a combination 3DES (Triple Data Encryption Standard), 651
802.11 wireless standard, 175–176
broadband network wireless services of the store-and-forward and cut-through modes 3G wireless standard, 204
ad hoc networks, 176, 177
6to4 prefix A globally routable address that enables Ad hoc network An independent network 4G wireless standard, 204
AP, 177–178
IPv6 hosts to communicate over the IPv4 Internet 4G/LTE, 204
Address Resolution Protocol (ARP)A protocol used to BSS, 176, 177, 178
5G wireless standard, 204
802.1X An IEEE standard protocol for access control map IP addresses to MAC addresses channel bonding, 179
and authentication; also called dot1x 6to4 prefix, 335
Administrative distance A feature used by routers to CSMA/CD, 178
8P8C connectors, 70–71
8P8C The proper term for an RJ-45 modular plug select the best path when more than one path is available DSSS, 179
10BASE2 cabling, 41
ESS, 178
A record (Address record)The most common record Administratively down An indication that the router 10BASE5 cabling, 41
in DNS, which maps a hostname to an IP address interface has been shut off by an administrator FHSS, 180
10BASE-FL cabling, 41
frequency channels, 179
AAAA record (Quad-A record) A DNS record for IPv6 ADSL (Asymmetric DSL) A service that provides up to 10BASE-T cabling, 41
hand-offs, 178
1.544Mbps from the user to the service provider and 10GBASE-LR cabling, 41
Absorption Light interaction with the atomic structure hopping sequences, 180
up to 8Mbps back to the user from the service provider 10GBASE-SR cabling, 41
of the fiber material; also involves the conversion of ISM band, 179
optical power to heat Advertise To share route information 10GBASE-T cabling, 41, 76, 97–98
MAC layer, 176
Access control Physical security measures such as AES Advanced Encryption Standard, the encryption AXT, 98
OFDM, 180
access control cards, possibly biometric access control algorithm used by WPA2 full-duplex transmissions, 100
Open Authentication, 638
systems, and lockable fencing F/UTP, 99
Aging time The length of time a MAC address PHY layer, 176
Access control hardware Hardware used to identify remains assigned to a port hybrid echo cancellation circuits, 100
pseudorandom numbering sequences, 180
and authenticate someone entering a facility IEEE 802.3an-2006, 98
AH Authentication Header, a security protocol that roaming, 178
performance, 100–101
Access control list (ACL) A basic form of firewall guarantees the authenticity of IP packets shared-key authentication, 638
protection PSAACRF, 98, 99
Alien crosstalk (AXT) Unwanted signal coupling from transceivers, 177
PSANEXT, 98, 99
Access control vestibule/mantrap A control device one permanent link to another transmit power, 180
signal transmission, 100–101
that consists of two interlocking doors in which the WMN, 176
Angled physical contact (APC) A green fiber connector 29 CFR 1910.1200 (Hazard Communication), 716
first set of doors must be closed before the second set 802.11a (Wi-Fi 2) wireless standard, 24, 180–181,
whose endface is polished and has an 8-degree angle 29 CFR 1910.157 (Portable Fire Extinguishers),
of doors can open 183
Ant+ An ultra-low-power wireless protocol for 712–713
access-list permit Ip any any The instruction added 802.11ac (Wi-Fi 5) wireless standard, 24, 182, 183
wireless sensor networks operating at 2.4GHz 29 CFR 1910.160 (Fixed Extinguishing Systems),
to the last line of an access list to allow all other data 802.11ax (Wi-Fi 6) wireless standard, 25, 182, 183
713–714
packets to enter and exit the router Anycast address An address obtained from a list of 802.11b (Wi-Fi 1) wireless standard, 24, 181, 183
addresses 29 CFR 1910.164 (Fire Detection Systems), 714–715
Access point A transceiver used to interconnect a 802.11g (Wi-Fi 3) wireless standard, 24, 181, 182,
29 CFR 1910.165 (Employee Alarm Systems),
wireless and a wired LAN APIPA Automatic Private IP Addressing, a Windows 183
715–716
process that automatically configures reserved private 802.11i wireless standard, 183
ACK Acknowledgment packet, a packet in the TCP 29 CFR 1910.36 (Design and Construction
IP addresses and subnet masks 802.11n (Wi-Fi 4) wireless standard, 24, 181, 182,
three-way connection handshake Requirements for Exit Routes), 709–710
Application layer Layer 7 of the OSI model, which 183
ACR A measurement that compares the signal level 29 CFR 1910.37 (Maintenance, Safeguards, and
interacts with application programs that incorporate a Operational Features for Exit Routes), 710 802.11r wireless standard, 183
from a transmitter at the far end to the crosstalk
communication component such as an Internet browser 29 CFR 1910.38 (Emergency Action Plans), 710–711 802.16a (WiMAX) wireless standard, 200
measured at the near end
and email 1000BASE-LX cabling, 41
29 CFR 1910.39 (Fire Prevention Plans), 711–712
32-bit CPU architectures, 679 1000BASE-SX cabling, 41

GLOSSARY 743 INDEX 3

FIGURE I-6

Companion Website
The companion website includes the captured data packets used throughout the book. It also includes the Net-
Challenge software, which was developed specifically for this text. The companion website also includes chapter-
based quiz modules for you to test your knowledge and all of the key terms in an online flash card application.
Finally, you can access your 10% off Network+ exam voucher from the companion website.

xxix

A01_Beasley_FM_pi-xxxi_new.indd 29 24/09/21 7:32 PM


Einführung
1
CHAPTER
to Computer
Networks

97801374558290_print.indb 2 10/09/21 11:17 AM


Chapter Outline
1-1 Introduction 1-6 Assembling an Office LAN
1-2 Network Topologies 1-7 Testing and Troubleshooting a LAN
1-3 The OSI Model Summary
1-4 The Ethernet LAN Questions and Problems
1-5 Home Networking

Objectives
● Explain the various LAN topologies ● Describe the purpose of a MAC address
● Define the function of a networking on a networking device
protocol ● Discuss how to determine the MAC
● Describe CSMA/CD for the Ethernet address for a computer
protocol ● Discuss the fundamentals of IP addressing
● Describe the structure of an Ethernet ● Discuss the issues involved in configuring
frame a home network
● Define the function of a network interface ● Discuss the issues involved in assembling
card an office LAN

Key Terms
local area network (LAN) transport layer ISP
protocol session layer private addresses
topology presentation layer intranet
Token Ring network application layer IP internetwork
Token passing CSMA/CD TCP/IP
IEEE frame wired network
deterministic network interface card wireless network
Token Ring hub (NIC) Wi-Fi Alliance
bus topology MAC address wireless router
star topology organizationally unique range extender
hub identifier (OUI) hotspot
multiport repeater Ethernet address, physical service set identifier
address, hardware (SSID)
broadcast
address, or adapter
switch firewall protection
address
port stateful packet inspection
ipconfig /all
mesh topology (SPI)
IANA
OSI model virtual private network
IP address (VPN)
physical layer network number network address
data link layer host number translation (NAT)
network layer host address

97801374558290_print.indb 3 10/09/21 11:17 AM


Key Terms continued

overloading Mbps client


port address numerics peer
translation crossover peer-to-peer
(PAT) straight-through network
port forwarding uplink port client/server
(or port network
link light
mapping) ping
link integrity
CAT6 ICMP
test
(Category 6)
link pulses ipconfig
RJ-45

1-1 INTRODUCTION
Each day, computer users use their computers for browsing the Internet, sending and
retrieving email, scheduling meetings, sharing files, preparing reports, exchanging
images, downloading music, and checking the current prices of auction items. A
network connects computers with the goal of sharing their resources. The networks
around the world that are connected together form the Internet. Networking requires
that computers be able to access multiple networks and share their resources. This
chapter looks at the various types of computer networks that are in use today.
This book introduces the essentials involved in implementing modern computer
networks, stepping you through the various modern networking technologies. The
accompanying textbook web link takes you to the Net-Challenge simulator software
developed specifically for this text. This software gives you invaluable insight into
the inner workings of computer networking and the experience of configuring
routers and switches for use in computer networks.
The ease of connecting to the Internet and the dramatic decrease in the cost of
computer systems have led to an explosion in the use of computer systems. Organiza-
tions such as corporations, colleges, and government agencies have acquired large
numbers of single-user computer systems. Such systems might be dedicated to word
processing, scientific computation, or process control, or they might be general-
purpose computers that perform many tasks. Interconnection of locally distributed
computer networks enables users to exchange information (data) with other network
members. It also makes possible resource sharing, enabling many to access expensive
equipment such as file servers and high-quality graphics printers as well as more
powerful computers for tasks too complicated for the local computer to process.
The networks in use today can be generally categorized based on their geographic
span:

● Personal area network (PAN): A PAN is the smallest type of network and
has a limited span, interconnecting personal devices such as those that are
Bluetooth enabled.

4 CHAPTER 1: INTRODUCTION TO COMPUTER NETWORKS

97801374558290_print.indb 4 10/09/21 11:17 AM


● Local area network (LAN): A LAN is a network commonly used to intercon-
Local Area Network
nect and share computer resources inside a building or multiple buildings in a
(LAN)
limited area.
A network of users
● Campus area network (CAN): A CAN—often called simple an enterprise that share computer
network—spans multiple buildings in a campus environment such as a resources in a limited
university or another large organization. area

● Metropolitan area network (MAN): A MAN spans multiple buildings in a


city area.
● Wide area network (WAN): A WAN is much larger than the other network
types and can span many areas, such as cities, states, or countries.

Table 1-1 outlines the CompTIA Network+ objectives related to this chapter and
identifies the chapter section that covers each objective. At the end of each chapter
section you will find a review with comments on the Network+ objectives presented
in that section. These comments are provided to help reinforce your understanding
of each Network+ objective. The chapter review also includes “Test Your
Knowledge” questions to help you understand key concepts before you advance to
the next section of the chapter. At the end of the chapter you will find a complete
set of questions as well as sample certification exam-type questions.

TABLE 1-1 Chapter 1 CompTIA Network+ Objectives


Domain/Objective Domain/Objective Description Section(s) Where
Number Objective Is Covered
1.0 Networking Fundamentals
1.1 Compare and contrast the Open Systems Interconnection (OSI) 1-3, 1-4
model layers and encapsulation concepts.
1.2 Explain the characteristics of network topologies and network 1-2, 1-5, 1-7
types.
1.3 Summarize the types of cables and connectors and explain 1-6
which is the appropriate type for a solution.
1.4 Given a scenario, configure a subnet and use appropriate IP 1-4, 1-5
addressing schemes.
1.5 Explain common ports and protocols, their application, and 1-3, 1-7
encrypted alternatives.
1.6 Explain the use and purpose of network services. 1-5, 1-7
1.7 Explain basic corporate and datacenter network architecture. 1-3
1.8 Summarize cloud concepts and connectivity options 1-4, 1-5, 1-6
2.0 Network Implementations
2.1 Compare and contrast various devices, their features, and their 1-2, 1-4, 1-5, 1-6
appropriate placement on the network.
2.2 Compare and contrast routing technologies and bandwidth man- 1-5
agement concepts.

1-1: INTRODUCTION 5

97801374558290_print.indb 5 10/09/21 11:17 AM


Domain/Objective Domain/Objective Description Section(s) Where
Number Objective Is Covered
2.3 Given a scenario, configure and deploy common Ethernet switching 1-3, 1-4, 1-5, 1-6
features.
2.4 Given a scenario, install and configure the appropriate wireless 1-5
standards and technologies.
3.0 Network Operations
3.1 Given a scenario, use the appropriate statistics and sensors to 1-3, 1-4, 1-5
ensure network availability.
3.3 Explain high availability and disaster recovery concepts and 1-5, 1-6
summarize which is the best solution.
4.0 Network Security
4.3 Given a scenario, apply network hardening techniques. 1-5
4.5 Explain the importance of physical security. 1-6
5.0 Network Troubleshooting
5.2 Given a scenario, troubleshoot common cable connectivity issues 1-5, 1-6
and select the appropriate tools.
5.3 Given a scenario, use the appropriate network software tools and 1-3, 1-4, 1-5, 1-7
commands.
5.4 Given a scenario, troubleshoot common wireless connectivity 1-5, 1-6
issues.

1-2 NETWORK TOPOLOGIES


This chapter presents the networking topologies commonly used in computer
networks today. It is important for students to understand the structure of the star
topology. Students should also understand the Token Ring and bus topologies even
though they are seldom used today.
A LAN is defined in terms of the protocol and the topology used for accessing
Protocol the network. The networking protocol is the set of rules established for users to
A set of rules established exchange information. The topology is the network architecture used to inter-
for users to exchange
connect the networking equipment. The most common architectures for LANs are
information
the point-to-point, ring, bus, and star/hub-and-spoke architectures, as illustrated in
Topology Figure 1-1.
The architecture of a The simplest network topology is a point-to-point architecture, where two
network
computers are connected directly together. In this topology, communication
Token Ring Network flows only between the two computers. Figure 1-2 shows an example of a LAN
A network topology configured using the ring topology. This topology is predominantly used by
configured in a logical Token Ring networks, in which a token (indicated with the letter T in the network
ring that complements diagram) is placed in the data channel and circulates around the ring (hence the
the token passing
protocol

6 CHAPTER 1: INTRODUCTION TO COMPUTER NETWORKS

97801374558290_print.indb 6 10/09/21 11:17 AM


name Token Ring). If a user wants to transmit, the computer waits until it has
control of the token. This technique, called token passing, is based on the IEEE Token Passing
802.5 Token Ring Network standard. (IEEE is the Institute of Electrical and Elec- A technique in which an
electrical token circu-
tronics Engineers.) A Token Ring network is a deterministic network, which
lates around a network,
means each station connected to the network is ensured access for transmission of
and control of the token
its messages at regular or fixed time intervals. enables the user to gain
access to the network

IEEE
Institute of Electrical
and Electronics Engi-
neers, one of the major
standards-setting
bodies for technological
development

Deterministic
A type of network in
(a) Star network (b) Ring network
which access to the
network is provided at
fixed time intervals

(c) Bus network

FIGURE 1-1 Network topologies. (From Modern Electronic Communication 9/e, by G. M. Miller &
J. S. Beasley, © 2008 Pearson Education, Inc. Upper Saddle River, NJ.)

One disadvantage of the Token Ring topology is that if an error changes the token
pattern, the token may stop circulating. In addition, ring networks rely on each
system to relay the data to the next user. A failed station can cause data traffic to
cease. Token Ring networks also have disadvantages in terms of troubleshooting
and maintenance. In order to remove a device from a Token Ring network or add
a device to the network, the Token Ring path must be temporarily broken (that is,
the path must be interrupted). This results in downtime for the network. One way to
fix this issue is by attaching all the computers to a central Token Ring hub, which
is a device that manages the passing of the token rather than relying on individual Token Ring Hub
computers to pass it, thereby improving the reliability of the network. A hub that manages the
passing of the token in a
It is important to note that Token Ring has been replaced by Ethernet technology in Token Ring network
almost all modern computer networks.

1-2: NETWORK TOPOLOGIES 7

97801374558290_print.indb 7 10/09/21 11:17 AM


Workstation

Laptop computer

Plotter

T
Token ring

Power Mac
PC

Laser printer
PC

PC
The passing of the token

FIGURE 1-2 The Token Ring network topology.

Figure 1-3 illustrates a bus topology, in which the computers share the media
Bus Topology (coaxial cable) for data transmission. In this topology, a coaxial cable (called
A system in which the ThinNet) is looped through each networking device to facilitate data transfer.
computers share the
media (coaxial cable) for In a bus topology, all LAN data traffic is carried over a common coaxial cable
data transmission link. In Figure 1-3, for example, if computer 1 is printing a large file, the line of
communications is between computer 1 and the printer. However, in a bus system,
all networking devices can see computer 1’s data traffic to the printer, and the other
devices have to wait for pauses in transmission or until transmission is complete
before they can initiate their own transmissions. If more than one computer’s
data is placed on the network at the same time, the data is corrupted and has
to be retransmitted. This means that the use of a shared coaxial cable in a bus
topology prevents data transmission from being very bandwidth efficient. This is
one reason—but not the only reason—bus topologies are seldom used in modern
computer networks.

8 CHAPTER 1: INTRODUCTION TO COMPUTER NETWORKS

97801374558290_print.indb 8 10/09/21 11:17 AM


1 2 3

PC Laptop computer Power Mac

50 Ω Ethernet 50 Ω

Laser printer PC

Traffic
Star Topology
The most common
FIGURE 1-3 The bus topology.
networking topology
in today’s LANs, where
The star topology (also called hub-and-spoke topology), illustrated in Figure 1-4, is all networking devices
the most common networking topology in today’s LANs. Twisted-pair cables with connect to a central
modular plugs are used to connect the computers and other networking devices switch or hub
(see Chapter 2, “Physical Layer Cabling: Twisted-Pair”). At the center of a star Hub
network is either a switch or a hub that connects the network devices and facilitates A device that broadcasts
the transfer of data. For example, if computer 1 in Figure 1-4 wants to send data the data it receives to
to the network laser printer, the hub or switch provides the network connection. If all devices connected to
a hub is used, computer 1’s data is sent to the hub, which then forwards it to the its ports
printer. However, a hub is a multiport repeater, which means the data it receives is
broadcast and seen by all devices connected to its ports. Therefore, the hub broad- Multiport Repeater
casts computer 1’s data traffic to all networking devices that are interconnected in Another name for a hub
the star network. Figure 1-4 shows this data traffic path as solid black arrowed lines Broadcast
going to all networking devices. Much as with the bus topology, all data traffic on Transmission of data
the LAN is being seen by all computers. Because a hub broadcasts all data traffic by a hub to all devices
to the devices connected to its network ports, this device is of limited use in a large connected to its ports
network.
To minimize unnecessary data traffic and isolate sections of a network, you can use
a switch at the center of a star network, as shown in Figure 1-4. Each networking Switch
device, such as a computer, has a hardware or physical address. (This concept is A device that forwards a
fully detailed in Section 1-4, “The Ethernet LAN.”) A switch stores the hardware or frame it receives directly
physical address for each device connected to its ports. The storage of the address out the port associated
enables the switch to directly connect two communicating devices without broad- with its destination
casting the data to all devices connected to its ports. address

Port
A physical input/output
interface to networking
hardware

1-2: NETWORK TOPOLOGIES 9

97801374558290_print.indb 9 10/09/21 11:17 AM


6

Laptop computer

5 7

PC PC

4 Hub or switch 1

PC PC

2
3
Laser printer
iMac Pro
PC

Hub traffic from computer 1 to the printer


Switch traffic from computer 1 to the printer
Switch traffic from computer 5 to computer 6

FIGURE 1-4 The star topology.

For example, if a switch is used instead of a hub, the data from computer 1 is trans-
mitted directly to the printer, and the other computers do not see the data traffic.
The dotted lines in Figure 1-4 indicate the traffic path for a switched network. The
use of a switched connection greatly improves the efficiency of the available band-
width. It also permits additional devices in the LAN to simultaneously commu-
nicate with each other without tying up network resources. For example, while
computer 1 is printing a large file, computers 5 and 6 can communicate with each
other, as illustrated by the dashed line in Figure 1-4. During troubleshooting and
maintenance, individual computers can be removed without negatively affecting
the network in a star or extended star topology. Also, the upgrade from a hub to a
switched topology can be accomplished without requiring a change in the cable
infrastructure and therefore requires minimal downtime and expense.
In a mesh topology, as illustrated in Figure 1-5, all networking devices are directly
connected to each other. This provides for full redundancy in the network data
Mesh Topology
paths—but at a cost. The additional data paths increase the costs related to cabling
A topology in which all
and networking hardware (for example, multiple network ports for each device
networking devices are
directly connected to
connected to the network). In addition, the mesh design adds complexity. This
each other topology can be suitable for high-reliability applications but can be too costly for
general networking applications.

10 CHAPTER 1: INTRODUCTION TO COMPUTER NETWORKS

97801374558290_print.indb 10 10/09/21 11:17 AM


FIGURE 1-5 The mesh topology.

Section 1-2 Review

This section covers the following Network+ exam objectives.


1.2 Explain the characteristics of network topologies and network types.
This section presents the star, ring, bus, and mesh network topologies. You
should be able to identify each topology and understand how data travels in
each network topology. You should also have a basic understanding of the
difference between a topology and a protocol.
2.1 Compare and contrast various devices, their features, and their
appropriate placement on the network.
This section introduces some basic networking hardware, such as the hub and
switch. Make sure you have a basic understanding of each device. You should
also understand that data from a hub is replicated out all ports, which means
the information is seen by all networking devices connected to its ports.

Test Your Knowledge


1. What is the most common network topology today?
a. Star
b. Hub
c. Ring
d. Mesh
2. True or false: A hub is also called a multiport repeater.
a. True
b. False

1-2: NETWORK TOPOLOGIES 11

97801374558290_print.indb 11 10/09/21 11:17 AM


3. In a deterministic network, access to the network is provided ____.
a. at random time intervals
b. using CSMA/CD
c. at fixed time intervals
d. None of these answers are correct.
4. True or false: A protocol defines the network architecture used to
interconnect the networking equipment.
a. True
b. False

1-3 THE OSI MODEL


This section examines the seven layers of the OSI model. Students should
memorize all seven layers and know the function of each layer. Students should
refer to Table 1-2 for a summary of the OSI model layers and their functions.
The Open Systems Interconnection (OSI) reference model was developed by the
OSI International Organization for Standardization in 1984 as an open standard for all
Open Systems communication systems to enable different types of networks to be linked together.
Interconnection As illustrated in Figure 1-6, the OSI model contains seven layers that describe
OSI Model networking functions from the physical network interface to the software application
interfaces. Different protocols operate at each layer. Each layer performs data encap-
Open Systems
Interconnection model,
sulation by putting its own message format or header onto the data as it is being
a seven-layer model passed down from layer 7 to layer 1 for transmission. When the data is received by
that describes network an end device, the inverse process, called decapsulation, occurs. Each corresponding
functions layer reads its layer message format or header and takes it off before passing the
data to the upper layers. The intent of the OSI model is to provide a framework for
networking that ensures compatibility in the network hardware and software and to
accelerate the development of new networking technologies. A discussion of the OSI
model follows, along with a summary of the seven layers outlined in Table 1-2.

7. Application

6. Presentation

5. Session

4. Transport

3. Network

2. Data link

1. Physical

FIGURE 1-6 The seven layers of the OSI reference model.

12 CHAPTER 1: INTRODUCTION TO COMPUTER NETWORKS

97801374558290_print.indb 12 10/09/21 11:17 AM


TABLE 1-2 Summary of the OSI Layers
Layer Function Examples
7. Application Provides support for applications HTTP, FTP, SMTP (email)
6. Presentation Handles protocol conversion and data ASCII, JPEG
translation
5. Session Establishes, manages, and terminates NFS, SQL
sessions
Physical Layer
4. Transport Handles end-to-end delivery to ensure TCP, UDP
Layer 1 of the OSI
error-free packets
model, which provides
3. Network Provides addressing and routing decisions IP, ICMP the electrical and
2. Data link Provides for the flow of data MAC addresses mechanical connection
to the network
1. Physical Handles signals and media NICs, twisted-pair
cable, fiber, wireless Data Link Layer
Layer 2 of the OSI
model, which handles
The OSI model layers are as follows: error recovery, flow
control (synchroni-
1. Physical layer: This layer provides electrical and mechanical connection to zation), and sequencing
the network. Examples of technologies working in this layer are Electronic Network Layer
Industries Alliance/Telecommunications Industry Association (EIA/TIA)– Layer 3 of the OSI
related technologies, unshielded twisted-pair (UTP), fiber, and network model, which accepts
interface cards (NICs). outgoing messages and
combines messages or
2. Data link layer: This layer handles error recovery, flow control (synchro- segments into packets,
nization), and sequencing (that is, which terminals are sending and which adding a header that
are receiving). It is considered the media access control (MAC) layer and is includes routing
where MAC addressing is defined. The Ethernet 802.3 standard relates to this information
layer, and a MAC address is sometimes called an Ethernet address. Transport Layer
3. Network layer: This layer accepts outgoing messages and combines messages Layer 4 of the OSI
model, which is
or segments into packets, adding a header that includes routing information.
concerned with message
It acts as the network controller. An example of a protocol working in this integrity between
layer is Internet Protocol (IP). source and destination
4. Transport layer: This layer is responsible for end-to-end delivery between Session Layer
devices. It is concerned with message integrity between source and Layer 5 of the OSI
destination. It also segments/reassembles packets and handles flow control. model, which provides
Examples of protocols working in this layer are Transmission Control the control functions
Protocol (TCP) and User Datagram Protocol (UDP). necessary to establish,
manage, and terminate
5. Session layer: This layer provides the control functions necessary to the connections
establish, manage, and terminate connections, as required, to satisfy user Presentation Layer
requests. Examples of technologies working in this layer are Network File Layer 6 of the OSI
System (NFS) and Structured Query Language (SQL). model, which accepts
and structures the
6. Presentation layer: This layer accepts and structures messages for an
messages for the
application. It translates the message from one code to another, if necessary. application
This layer is responsible for data compression and encryption. Examples of

1-3: THE OSI MODEL 13

97801374558290_print.indb 13 10/09/21 11:17 AM


technologies working in this layer are American Standard Code for Informa-
Application Layer
tion Interchange (ASCII) and Joint Photographic Experts Group (JPEG).
Layer 7 of the OSI model,
which interacts with 7. Application layer: This layer interacts with application programs that
application programs incorporate a communication component such as an Internet browser and
that incorporate email. This layer is responsible for logging in the message, interpreting the
a communication
component such as an
request, and determining what information is needed to support the request.
Internet browser and Examples include Hypertext Transfer Protocol (HTTP) for web browsing,
email File Transfer Protocol (FTP) for transferring files, and Simple Mail Transfer
Protocol (SMTP) for email transmission.

Note
Network administrators often refer to layer numbers when describing networking problems.
For example, a physical link problem is described as a layer 1 problem, and a router problem is
a layer 3 issue.

A network administrator needs to have a good understanding of all seven layers of


the OSI model in order to be able to isolate network problems. There are three basic
steps in the process of isolating a network problem:

1. Is the connection to the machine down? (This is a layer 1 issue.)


2. Is the network down? (This is a layer 3 issue.)
3. Is a service on a specific machine down? (This is a layer 7 issue.)

A network administrator uses the OSI model to troubleshoot network problems by


verifying the functionality of each layer. In many cases, troubleshooting network
problems requires the network administrator to isolate at which layer a network
problem occurs.
For example, say that a network is having problems accessing an email server
that uses SMTP—a layer 7 application. The first troubleshooting step for the
network administrator is to ping the IP address of the email server (layer 3 test).
A ping to an IP address can be used to quickly check whether there is a network
connection. (The ping command is discussed in detail in Section 1-7, “Testing and
Troubleshooting a LAN.”) A “reply from” response for the ping indicates that the
connection to the server is up. A “request timed out” response indicates that the
network connection is down. This could be due to a cabling problem (layer 1) or
a problem with a switch (layer 2) or a router (layer 3), or the email server could
be completely down (layer 7). In the event of a “request timed out” response, the
network administrator has to go directly to the telecommunications closet or the
machine to troubleshoot the problem. In this case, the administrator should first
check for layer 1 (physical layer) problems. Many times this just requires verifying
that a network cable is connected. Cables sometimes get knocked loose or break.

14 CHAPTER 1: INTRODUCTION TO COMPUTER NETWORKS

97801374558290_print.indb 14 10/09/21 11:17 AM


Section 1-3 Review

This section covers the following Network+ exam objectives.


1.1 Compare and contrast the Open Systems Interconnection (OSI) model
layers and encapsulation concepts.
A network administrator needs to have a good understanding of all seven layers
of the OSI model in order to be able to isolate a network problem. Remember
that there are three basic steps in the process of isolating a network problem:

1. Is the connection to the machine down? (This is a layer 1 issue.)


2. Is the network down? (This is a layer 3 issue.)
3. Is a service on a specific machine down? (This is a layer 7 issue.)
1.5 Explain common ports and protocols, their application, and encrypted
alternatives.
A network administrator uses the OSI model to troubleshoot network problems
by verifying the functionality of each layer. In many cases, troubleshooting
network problems requires a network administrator to isolate at which layer the
network problem occurs.
1.7 Explain basic corporate and datacenter network architecture.
A network administrator uses the OSI model to troubleshoot network problems
by verifying the functionality of each layer.
2.3 Given a scenario, configure and deploy common Ethernet switching
features.
This section examines the various features of the OSI model that handle flow
control.
3.1 Given a scenario, use the appropriate statistics and sensors to ensure
network availability.
This section examines Layer 1 of the OSI model, which provides the electrical
and mechanical connection to the network.
5.3 Given a scenario, use the appropriate network software tools and
commands.
This section introduces the ping command, which is a very useful tool for
troubleshooting computer networks.

Test Your Knowledge


1. TCP functions at which layer of the OSI model?
a. Layer 4
b. Layer 2
c. Layer 3
d. Layer 5
e. Layer 7

1-3: THE OSI MODEL 15

97801374558290_print.indb 15 10/09/21 11:17 AM


2. HTTP functions at which layer of the OSI model?
a. Layer 6
b. Layer 5
c. Layer 4
d. Layer 7
e. All of these answers are correct.
3. IP is an example of a protocol that operates at which layer of the OSI
model?
a. Layer 7
b. Layer 6
c. Layer 5
d. Layer 2
e. None of these answers are correct.
4. A NIC operates at which layer of the OSI model?
a. Layer 1
b. Layer 3
c. Layer 5
d. Layer 7
e. All of these answers are correct.
5. True or false: Network address is another name for a layer 4 address.
a. True
b. False

1-4 THE ETHERNET LAN


The key LAN protocol to understand today is Ethernet (CSMA/CD). This section
discusses the Token Ring topology and compares deterministic (Token Ring)
and nondeterministic (CSMA/CD) networks. Students should be able to use the
ipconfig command to determine a computer’s MAC address. The concept of IP
addresses is introduced, and students should understand the concept of Class A–D
networks.
The networking protocol used in most modern computer networks is Ethernet, a
CSMA/CD
carrier-sense multiple access with collision detection (CSMA/CD) protocol for local
Carrier-sense multiple
area networks. It originated in 1972, and the full specification for the protocol was
access with collision
detection, the Ethernet provided in 1980, as a joint effort of Xerox, Digital Equipment Corporation, and
LAN media access Intel. Basically, for a computer to “talk” on an Ethernet network, it first “listens” to
method see whether there is any data traffic (carrier-sense). This means that any computer
connected to the LAN can be “listening” for data traffic, and any of the computers

16 CHAPTER 1: INTRODUCTION TO COMPUTER NETWORKS

97801374558290_print.indb 16 10/09/21 11:17 AM


Another random document with
no related content on Scribd:
of thrombosis of cerebral veins and sinuses,

984

of vertigo,

425

and chlorosis, influence on causation of hysteria,

220

general, as a cause of spinal anæmia,

806

of the brain,

774

777

of the spine,

805
Anæmic headache,

402

Anæsthesia, hysterical,

246

in acute myelitis,

819

in chronic alcoholism,

620

spinal meningitis,

753

in hemiplegia,

955
in hystero-epilepsy,

298

in injuries of nerves,

1182

1185

1186

in neuritis,

1191

1192

in spinal meningeal hemorrhage,

752

meningitis,
750

syphilis,

1025

in symmetrical gangrene,

1259

in tumors of the brain,

1042

of the spinal cord,

1092

in unilateral spinal paralysis,

1166

of peripheral origin,

1198
Causes,

1199

Diagnosis,

1200

Symptoms,

1199-1201

Treatment,

1201

Varieties of, in nervous diseases,

35

37

Analgesia, definition of,

35
hysterical,

246

Angina pectoris (see

Neuralgia

).

Angiomata in brain tumors,

1049

Angio-paralysis in vaso-motor neuroses,

1252

Angio-spasm in vaso-motor neuroses,

1262
Anidrosis in progressive unilateral facial atrophy,

696

Ankle-clonus in amyotrophic lateral sclerosis,

868

in diffuse spinal sclerosis,

888

in nervous diseases,

54

in spastic spinal paralysis,

862

864
Anterior cornua, changes in, in amyotrophic lateral sclerosis,

867

in infantile spinal paralysis,

1133-1144

Antipyrine, use, in thermic fever,

397

398

Antispasmodics, use, in hysteria,

278

Anus and rectum, neuralgia of,

1240
Aphasia in nervous diseases,

31

in cerebral anæmia,

776

hemorrhage,

941

syphilis,

1008

hemiplegia, characters and varieties of,

956

960

post-epileptic,
481

Aphonia, hysterical,

239

Apoplexy,

917

of the brain, meningeal,

710

Apoplectic attack, symptoms of,

933-952

constitution, peculiarities of,

930
Apoplectiform attacks in tumors of the brain,

1040

type of acute myelitis,

817

Argyll-Robertson pupil in nervous diseases,

40

51

in tabes dorsalis,

830

Arsenic, use of, in chorea,

454
in malarial form of cerebral anæmia,

790

in neuralgia,

1224

in paralysis agitans,

438

in tetanus,

559

in tremor,

432

in writers' cramp,

538

Arteries, cerebral, atheroma of,


991

in cerebral meningeal hemorrhage,

711

diseases of, in intracranial hemorrhage and apoplexy,

922

Arterial spasm in spinal anæmia,

806

Arthralgia, the, of chronic lead-poisoning,

684

Arthropathies in hemiplegia of apoplexy and intracranial


hemorrhage,

962
in tabes dorsalis,

837

Asafœtida, use, in hysteria,

278

285

Assimilation, alterations of, in nervous diseases,

59

Asthma, hysterical,

245

Asylums in the treatment of opium and alcohol habit, question of,

671
treatment of insane by removal to,

128

130-135

Ataxia in tabes dorsalis,

831

833

848

in tumors of the brain,

1041

in tumors of the spinal cord,

1094
muscular, in general paralysis of the insane,

189

193

Ataxic tremor, in nervous diseases,

47

Atheroma, in chronic alcoholism,

612

of the cerebral arteries,

991

Athetosis, definition and symptoms,

457
pathology, prognosis, and treatment,

46

Atmospheric and thermic influences as cause of neuralgia,

1219

Atrophy,

1266

degenerative, in nervous diseases,

54-57

facial, progressive unilateral,

693

in amyotrophic lateral sclerosis,

868
muscular, in chronic lead-poisoning,

687

688

in hemiplegia from apoplexy,

962

in labio-glosso-laryngeal paralysis,

1172

in nervous diseases,

54

in neuralgia,

1214

in tumors of the brain,

1041
in tumors of the spinal cord,

1054

of anterior gray cornua in infantile spinal paralysis,

1133-1144

of bones and muscles in atrophic infantile paralysis,

1124

of brain,

170

993

994

Atropia, use of, in heat-exhaustion,

388
in labio-glosso-laryngeal paralysis,

1175

in tremor of spinal sclerosis,

905

in writers' cramp,

537

Auræ of epilepsy, characters,

475

Aural vertigo, causes and symptoms,

421

Auras in migraine,

1230

You might also like