CompTIA Network N10-006 Exam Cram

Transcription

CompTIANetwork N10-006Emmett Dulaney800 East 96th StreetIndianapolis, Indiana 46240 USA

CompTIA Network N10-006 Exam Cram, Fifth EditionCopyright 2015 by Pearson Education, Inc.All rights reserved. No part of this book shall be reproduced, stored ina retrieval system, or transmitted by any means, electronic, mechanical,photocopying, recording, or otherwise, without written permission fromthe publisher. No patent liability is assumed with respect to the use ofthe information contained herein. Although every precaution has beentaken in the preparation of this book, the publisher and author assumeno responsibility for errors or omissions. Nor is any liability assumed fordamages resulting from the use of the information contained herein.ISBN-13: 978-0-7897-5410-3ISBN-10: 0-7897-5410-XLibrary of Congress Control Number: 2015934591Printed in the United States of AmericaSecond Printing: September 2015TrademarksAll terms mentioned in this book that are known to be trademarks or servicemarks have been appropriately capitalized. Que Publishing cannot attest tothe accuracy of this information. Use of a term in this book should not beregarded as affecting the validity of any trademark or service mark.Warning and DisclaimerEvery effort has been made to make this book as complete and as accurateas possible, but no warranty or fitness is implied. The information providedis on an “as is” basis. The author and the publisher shall have neitherliability nor responsibility to any person or entity with respect to any loss ordamages arising from the information contained in this book or from the useof the CD or programs accompanying it.Special SalesFor information about buying this title in bulk quantities, or for special salesopportunities (which may include electronic versions; custom cover designs;and content particular to your business, training goals, marketing focus,or branding interests), please contact our corporate sales department atcorpsales@pearsoned.com or (800) 382-3419.For government sales inquiries, please contactgovernmentsales@pearsoned.com.For questions about sales outside the U.S., please Dave DusthimerAcquisitionsEditorBetsy BrownDevelopmentEditorJeff RileyManaging EditorSandra SchroederSenior ProjectEditorTonya SimpsonCopy EditorKeith ClineIndexerJohnna VanHooseDinseProofreaderPaula LowellTechnical EditorChristopher A.CraytonEditorial AssistantVanessa EvansMedia ProducerLisa MatthewsCover DesignerAlan ClementsCompositorMary Sudul

Contents at a GlanceIntroduction1CHAPTER 1Introduction to Networking9CHAPTER 2The OSI Model and Networking Protocols41CHAPTER 3Addressing and Routing93CHAPTER 4Components and Devices135CHAPTER 5Cloud Computing Basics161CHAPTER 6Installation and Configuration173CHAPTER 7Cabling and Wiring219CHAPTER 8Wireless279CHAPTER 9Network Management325CHAPTER 10Network Optimization367CHAPTER 11Network Security383CHAPTER 12Network Troubleshooting471Glossary555Index603On the CD:Practice Exam 1Answers to Practice Exam 1Practice Exam 2Answers to Practice Exam 2

Table of ContentsIntroduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1CHAPTER 1Introduction to Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9LANs, WANs, MANs, SCADA/ICS, Medianets, and Network Models . 10LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10WANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11MANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12SCADA/ICS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12Medianets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13Network Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13Centralized Versus Distributed Computing . . . . . . . . . . . . . . . . 15Network Topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17Bus Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17Ring Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18Star Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20Wired Mesh Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21Wireless Topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22Point-to-Point, Point-to-Multipoint, and Wireless MeshTopologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24Hybrid Topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27Creating a SOHO Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32What’s Next? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39CHAPTER 2The OSI Model and Networking Protocols. . . . . . . . . . . . . . . . . . . . . . . . 41The Networking Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42The OSI Seven-Layer Model . . . . . . . . . . . . . . . . . . . . . . . . . . 42The TCP/IP Four-Layer Model . . . . . . . . . . . . . . . . . . . . . . . 48Identifying the OSI Layers at Which Various NetworkComponents Operate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48Dynamic Host Configuration Protocol (DHCP) . . . . . . . . . . . . . . . . . 51The DHCP Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53DHCP and DNS Suffixes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54DHCP Relays and IP Helpers . . . . . . . . . . . . . . . . . . . . . . . . . 54

Domain Name Service (DNS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56The DNS Namespace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58Types of DNS Entries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60DNS Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61DNS in a Practical Implementation . . . . . . . . . . . . . . . . . . . . . 62Simple Network Management Protocol (SNMP) . . . . . . . . . . . . . . . . 65Components of SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65SNMP Management Systems. . . . . . . . . . . . . . . . . . . . . . . . . . 66SNMP Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67Management Information Bases . . . . . . . . . . . . . . . . . . . . . . . 67SNMP Communities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68SNMPv3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71Connection-Oriented Protocols Versus ConnectionlessProtocols. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72Internet Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73Transmission Control Protocol . . . . . . . . . . . . . . . . . . . . . . . . 73User Datagram Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74File Transfer Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75Secure File Transfer Protocol . . . . . . . . . . . . . . . . . . . . . . . . . 76Trivial File Transfer Protocol . . . . . . . . . . . . . . . . . . . . . . . . . 77Simple Mail Transfer Protocol . . . . . . . . . . . . . . . . . . . . . . . . 78Hypertext Transfer Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . 78Hypertext Transfer Protocol Secure . . . . . . . . . . . . . . . . . . . . . 79Post Office Protocol Version 3/Internet Message Access ProtocolVersion 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79Telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80Secure Shell. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80Internet Control Message Protocol . . . . . . . . . . . . . . . . . . . . . 81Address Resolution Protocol/Reverse Address ResolutionProtocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82Network Time Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83Network News Transfer Protocol . . . . . . . . . . . . . . . . . . . . . . 84Secure Copy Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84Lightweight Directory Access Protocol . . . . . . . . . . . . . . . . . . . 85Internet Group Management Protocol . . . . . . . . . . . . . . . . . . . 85Transport Layer Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

viCompTIA Network N10-006 Exam CramSession Initiation Protocol/Real-Time Transport Protocol . . . . . 86Remote Desktop Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87Server Message Block . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88Understanding Port Functions . . . . . . . . . . . . . . . . . . . . . . . . . 88What’s Next? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92CHAPTER 3Addressing and Routing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93IP Addressing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94IPv4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95IP Address Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95Subnet Mask Assignment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97Subnetting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97Identifying the Differences Between IPv4 Public andPrivate Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98Classless Interdomain Routing . . . . . . . . . . . . . . . . . . . . . . . . . 100Default Gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100IPv4 Address Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102IPv6 Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102Comparing IPv4 and IPv6 Addressing . . . . . . . . . . . . . . . . . . . . 107Assigning IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107Identifying MAC Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . 111NAT, PAT, SNAT, and DNAT . . . . . . . . . . . . . . . . . . . . . . . 113Managing TCP/IP Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119The Default Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119Routing Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120Static Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121Dynamic Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122Routing Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126Configuring Routers and Switches . . . . . . . . . . . . . . . . . . . . . . . . . . 128Proxy Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128The Spanning Tree Protocol . . . . . . . . . . . . . . . . . . . . . . . . . 130Trunking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132Port Mirroring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132Port Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133High Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133What’s Next? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134

viiContentsCHAPTER 4Components and Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135Common Network Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136Access Point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136Analog Modem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137Content Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138Firewall. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138IDS and IPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139Hub . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140Load Balancer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141Packet Shaper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143Multilayer Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146VPN Concentrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147Network Devices Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . 147Switch Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150Virtual Local-Area Networks . . . . . . . . . . . . . . . . . . . . . . . . . 150Working with Spanning Tree . . . . . . . . . . . . . . . . . . . . . . . . . 155Interface Configuration and Switch Management . . . . . . . . . . . . 156Power over Ethernet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157Switch Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157Managed and Unmanaged . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158What’s Next? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159CHAPTER 5Cloud Computing Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161Cloud Concepts . . . . . . . . . . . . . . . . . . . . . . . .

CompTIA Network N10-006 Emmett Dulaney 800 East 96th Street Indianapolis, Indiana 46240 USA