BN.com Gift Guide

CompTIA Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2E [NOOK Book]

Overview

CompTIA Network+ Certification Study Guide: Exam N10-004, Second Edition, offers a practical guide for those interested in pursuing CompTIA Network+ certification. It presents the fundamental terminology needed to perform duties as a network technician and to pass the CompTIA Network+ exam.

The book begins with a brief history of the development of networks, including their origins and where they are heading. It describes network models such ...
See more details below
CompTIA Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2E

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$34.49
BN.com price
(Save 42%)$59.95 List Price

Overview

CompTIA Network+ Certification Study Guide: Exam N10-004, Second Edition, offers a practical guide for those interested in pursuing CompTIA Network+ certification. It presents the fundamental terminology needed to perform duties as a network technician and to pass the CompTIA Network+ exam.

The book begins with a brief history of the development of networks, including their origins and where they are heading. It describes network models such as centralized and decentralized, and distinguishes between a local area network (LAN) and a wide area network (WAN). The discussions include cable connections and termination for the Network+ exam; the meaning of convergence; and the most common network devices being used on small and large networks, including the Internet. The role of switches in improving network functionality and enhancing security is described. The book also contains chapters on wireless networking; Open Systems Interconnection (OSI) model; Transmission Control Protocol/Internet Protocol (TCP/IP); wide area network (WAN) technologies; network security; and network management and troubleshooting.

  • New to this edition in accordance with the newly revised exam is an intensified focus on network security
  • Two NEW practice exams to help eliminate test-day jitters
  • Tiered chapter ending questions that allow for graduated learning
  • Covers everything from test taking techniques to advanced topics - keeping the beginner and intermediate IT professional in mind
  • Layout of the guide parallels the Network+ N10-004 objectives for ease of study
Read More Show Less

Product Details

  • ISBN-13: 9781597494885
  • Publisher: Elsevier Science
  • Publication date: 8/6/2009
  • Sold by: Barnes & Noble
  • Format: eBook
  • Edition number: 2
  • Pages: 816
  • File size: 8 MB

Meet the Author

Rob Shimonski (www.shimonski.com) is an experienced entrepreneur and an active participant in the business community. Rob is a best-selling author and editor with over 15 years experience developing, producing and distributing print media in the form of books, magazines and periodicals. To date, Rob has successfully created over 100 books that are currently in circulation. Rob has worked for countless companies to include CompTIA, Entrepreneur Magazine, Microsoft, McGraw Hill Education, Cisco, the National Security Agency and Digidesign. Rob has an extremely diverse background in the print media industry filling roles such as author, co-author, technical editor, copy editor and developmental editor. Since print media shifted to the digital domain, Rob has focused the past decade on developing all of the needed skills to produce professional audio and video media. An expert in Digital Audio Workstation (DAW) design and video production, Rob has created over 500 different media packages to include commercials for TV, online advertising clips, audio podcasts and much more. Rob started to train others while in the US Marine Corps. Since, Rob has held a NY State teaching certificate as well as multiple trainer roles in colleges and trade schools across the world.
Naomi Alpern currently works for Microsoft as a consultant specializing in unified communications. She holds many Microsoft certifications, including an MCSE and MCT, as well as additional industry certifications such as Citrix Certified Enterprise Administrator, Security+, Network+, and A+. Since the start of her technical career she has worked in many facets of the technology world, including IT administration, technical training, and most recently, full-time consulting.
Michael Cross (MCSE, MCP+I, CNA, Network+) is an Internet Specialist/Computer Forensic Analyst with the Niagara Regional Police Service (NRPS). He performs computer forensic examinations on computers involved in criminal investigation. He also has consulted and assisted in cases dealing with computer-related/Internet crimes. In addition to designing and maintaining the NRPS Web site at www.nrps.com and the NRPS intranet, he has provided support in the areas of programming, hardware, and network administration. As part of an information technology team that provides support to a user base of more than 800 civilian and uniform users, he has a theory that when the users carry guns, you tend to be more motivated in solving their problems.

Michael also owns KnightWare (www.knightware.ca), which provides computer-related services such as Web page design, and Bookworms (www.bookworms.ca), where you can purchase collectibles and other interesting items online. He has been a freelance writer for several years, and he has been published more than three dozen times in numerous books and anthologies. He currently resides in St. Catharines, Ontario, Canada, with his lovely wife, Jennifer, his darling daughter, Sara, and charming son, Jason.
Dustin L. Fritz [BSISS; E|CSA] is owner and Chief Executive Officer of The Computer Network Defense Group LLC in Owings Mills, Maryland providing executive-level strategic and tactical cybersecurity consulting services. He specializes in Information Operations Conditions, Information Assurance Vulnerability Management, risk and vulnerability assessments, certification-n-accreditation, security awareness and planning, configuration management, and incident response team development.

Dustin has over 10 years of Information Assurance and Computer Network Defense (CND) experience, with core foundations in creating enterprise-wide CND strategies for the Department of the Navy, realigning incident response throughout the United States Pacific Fleet, and implementing the first-ever Information Operations Condition response team (IRT). Dustin’s contributions and outstanding achievements in cybersecurity have been consistently recognized over the years by the United States Navy and the Secretary of the Navy; most recently in November 2007 for his actions in attaining 100 percent readiness for all Forward Deployed Naval Forces. Dustin holds a Bachelor of Science in Information Systems Security (BSISS) from Westwood College out of Denver, Colorado and is a EC-Council | Certified Security Analyst (E|CSA). He is an active member of Institute of Electrical and Electronics Engineers, Association of Information Technology Professionals, the Cyber Warfare Forum Initiative and can always be found speaking in public about cybersecurity and providing professional mentoring. Along with being the technical editor for Dissecting the Hack: The Forbidden Network, Dustin has also contributed to Syngress’ CompTIA Network+ Certification Study Guide (2009) (ISBN-10: 1597494291; ISBN-13: 978-1597494298) as a technical editor and author.
Mohan Krishnamurthy Madwachar (MCSE, CCA) is the GM-Network Security at Almoayed Group in Bahrain. Mohan is a key contributor to Almoayed Group's projects division and plays an important role in the organization's network security initiatives. Mohan has a strong networking, security, and training background. His tenure with companies such as Schlumberger Omnes and Secure Network Solutions India adds to his experience and expertise in implementing large and complex network and security projects. Mohan holds leading IT industry-standard and vendor certifications in systems, networking, and security. He is a member of the IEEE and PMI. Mohan has coauthored five books published by Syngress: Designing & Building Enterprise DMZs (ISBN: 1597491004), Configuring Juniper Networks NetScreen & SSG Firewalls (ISBN: 1597491187), How to Cheat at Securing Linux (ISBN: 1597492078), How to Cheat at Administering Office Communications Server 2007 (ISBN: 1597492126), and Microsoft Forefront Security Administration Guide (ISBN: 1597492447). He also writes newspaper columns on various subjects and has contributed to leading content companies as a technical writer and subject matter expert.
Read More Show Less

Read an Excerpt

CompTIA Network+ Certification Study Guide Exam N10-004 2E


By Robert J. Shimonski

Elsevier Science

Copyright © 2009 Elsevier, Inc.
All rights reserved.
ISBN: 978-1-59749-488-5


Excerpt

CHAPTER 1

Network Fundamentals


EXAM OBJECTIVES IN THIS CHAPTER

WHAT IS A NETWORK? 2
LOGICAL NETWORKING TOPOLOGIES 14
PHYSICAL NETWORKING MODELS 24
NETWORK TYPES 31


INTRODUCTION

Networks have been around for many years, long before the first home computer was ever designed or created. Other forms of networking have been around since the dawn of time. Today, designing, planning, implementing, deploying, and managing computer networks is somewhat of a never-ending journey into technology as it develops and integrates, standardizes and grows. It's amazing to see where the computer networks are today from just 15 years ago. Now, more than ever, computer networks are relied upon to produce not only data in the form of files or connectivity to a printer for printing, but also everything from surfing the Internet securely to making a call from New York to Tianjin, works off of the power of a network. Wired to wireless, satellites in the sky to home PC networks allow two computers in your home to share the Internet at the same time. This is all done through networking. The wonderful world of networking is colorful, exciting, and is growing each and every day. Routers, switches, and other infrastructure devices are deployed every day from companies such as Cisco, Juniper, Nortel, and 3Com to name a few. So who deploys them? Who plans, designs, and leads the way for all of this equipment to be planned, purchased, implemented, and managed? Each and every day technology grows more and more complicated, and it evolves as we do.

By the end of this chapter, you will have learned what a network is, and you will start to build upon the initial concepts you need to develop to become a network technician, as well as to pass the Network+ exam. In this chapter, we cover a brief history on the development of networks, as well where they originated from and where they are heading. We also cover the fundamental terminology you absolutely must know to perform your duties as a network technician and to pass the CompTIA Network+ exam.

We cover network models such as centralized and decentralized, the differences between a local area network (LAN) and a wide area network (WAN). Network topologies such as bus, ring, mesh, and star are covered, as well as a discussion on wired and wireless networks.

We then cover the Institute of Electrical and Electronics Engineers (IEEE), which is a standards committee aimed at making things in networking standardized, and easier to support and maintain. We cover in detail the most common standards, testable on the exam. Finally, we cover Requests for Comments (RFCs), a common source for networking professionals to get the definitive source on networking knowledge. So let us start from the very beginning, what exactly is a network anyway?


WHAT IS A NETWORK?

Even someone who's new to computers has experienced the basic concept of networking; it is the difference between standing alone or being part of a group. Networks are systems that are interconnected in some way and provide a method of communication. If you think of your own experiences, you've probably networked with groups of colleagues, and perhaps discussed how you're planning on taking the Network+ exam. Doing so provided a method of sharing information and possibly opened avenues to accessing important resources. Computers are the same; they can be standalone, or part of a network.

A computer network exists when two or more machines are connected together, thereby allowing them to share data, equipment, and other resources. Using a combination of software and hardware the computers gain added functionality, including the ability to:

* Transfer data between machines.

* Save and access files on the same hard disks or other storage devices.

* Share printers, scanners, modems, and other peripheral devices.

* Allow messages to be exchanged via e-mail, instant messaging, and other technologies.

Although networks may provide similar functions, they can be as different from one another as groups of people. Networks are characterized by a number of factors, which we'll discuss later in this chapter and throughout this book. Some of the elements that will define your network and make it different from others include:

* Hardware, such as network interface cards (NIC) or network adapters, that allow computers to transmit and receive data across the network; or routers, switches, and hubs that passes the data to other computers or networks.

* Media, which consists of cables or wireless technologies that carry the data across the network.

* Protocols, which are sets of rules that control how the data is sent between computers. The most popular of these is the protocol used on the Internet, Transmission Control Protocol/Internet Protocol (TCP/IP), while other protocols used on networks include IPX/SPX and AppleTalk.

* Topology, which is shape of the network. It defines how the network is designed and describes how computers are connected together (discussed later in this chapter).

* Network type, which defines the size of the network and its scale within a geographical area (discussed later in this chapter).

* Network model, which determines the levels of security available to the network, and the components needed to connect the computers together (discussed later in this chapter).

* Access, which determines who can use the network and how, and if features of the network are available for private or public use.

* Network operating systems (NOS), such as Windows, NetWare, and Linux. A NOS may be used on a server, which is a computer that provides services to numerous computers, and/or installed on computers that are used by individual users of the network. In some cases, such as with Novell NetWare, additional software may need to be installed on computers that use the server, who are referred to as clients.

* Other software and services, such as whether the network provides access to internal Web sites, e-mail, databases, and so forth.


As you can imagine, these factors influence the design of networks, so they aren't consistently the same. Networks may use different protocols, topologies, and other elements that make them unique. This means that you can look at two networks in two different homes or businesses, and they can be completely different from one another.

Despite this, there are similarities that will exist between different networks. In all cases, a computer is configured to use the network (either by configuring its operating system (OS) or installing client software) and has a device capable of transmitting and receiving data, such as a network adapter or modem. Using a protocol like TCP/IP, it communicates with other computers, and sends data over media (i.e. cables or wireless) to a device (i.e. hub, router, or switch) that will send the data to its destination (i.e. another computer or device, such as a printer). Although the specifics may vary greatly, the basic aspects of a network remain the same.


What Is an Internetwork?

Just as computers can be connected together, so can networks. An internetwork exists when two or more networks that are connected together. By connecting networks together, different businesses or locations can share data between their systems.

Internetworks are particularly important in organizations where sharing data is vital to its ability to function or operate effectively. For example, the police may have a network of computers in their cars, which connects to a network of computers located in police stations. If you're pulled over by the police, the officer may check your license plate number on the computer in his or her car. This computer would connect to a server used by the network of cars, and then pass along the request to a server on a different network that's used by other members of the organization, such as a records department. If additional information was requested, the request might also be sent to networks belonging to state/provincial or federal police. By internetworking these different systems, the police can determine if the car is stolen, if it was used to commit a crime, or if the owner is wanted or believed dangerous.

As you've probably guessed from the name, the largest internetwork is the Internet. The Internet originated as a Department of Defense (DOD) project in 1969, when the cold war was still going on between the West and the former Union of Soviet Socialist Republics (USSR). Under the direction of the DOD's Advanced Research Projects Agency (ARPA), the goal was to create a network that could withstand a nuclear attack. If any part of ARPANet was destroyed, the other parts of it would continue to function. Initially connecting four universities (University of California Los Angeles (UCLA), Stanford Research Institute, University of California Santa Barbara, and University of Utah), it allowed researchers and government to exchange information and quickly grew to include other organizations. Using the TCP/IP protocol suite that ARPA developed, additional computers and networks were added over the years, until finally in 1990, ARPANet was disbanded and removed from the Internet. Today, hundreds of millions of computers and networks connect to the Internet, making it a fundamental method of communication and data exchange.

Internetworks and the Internet aren't to be confused with intranets. Intranets use the same technologies and features of the Internet, such as Internet browsers, Web sites, and so on. This allows users of a network to view documents, distribute data, share employee information, access shared databases, online programs, and other components that are needed or wanted by an organization. The major difference between an intranet and the Internet is that an intranet is used internally. Although the Internet allows the public to view Web pages and other resources, intranets are private and available to employees of a company.


A Brief History on Networking and Communications

Although the Network+ exam won't quiz you on the history, it is nevertheless important to understand past achievements and how we've reached our present state of technology. The history of networking and communications is rich and complex, stretching over a hundred years in the past, with massive changes in the later part of the twentieth century. By looking at these changes, you will see the development of OSes, hardware, and innovations that are still used today.


Early Telecommunications and Computers

Telecommunications got its start in 1870s in Brantford Ontario, when Alexander Graham Bell developed the idea of a telephone. After the first successful words were sent over the device on March 10, 1876, a revolution of communication began. Within decades of its conception, millions of telephones were sold, with operators connecting people using manual circuit switching. This method of calling the operator to have them connect you to another party was routine until the mid-twentieth century, when mechanical and electronic circuit switching became commonplace. These events would have a massive impact on the innovation of computers, even though they wouldn't be invented until 60 years after Bell's first successful phone call.

Although arguments could be made as to whether ancient devices (such as the abacus) could be considered a type of computer, the first computer that could be programmed was developed by a German engineer named Konrad Zuse. In 1936, Zuse created the Z1, a mechanical calculator that was the first binary computer. Zuse continued making innovations to his design, and five years later had reached the point where the Z3 was able to accept programming. Although the next version of his computer would use punch cards to store programs, Zuse used movie film to store programming and data on the Z3 due to a supply shortage of paper during World War II. Just as his computers evolved, so did his programming skills. Zuse's achievements also extended to creating the first algorithmic programming language called Plankalkül, which later was used to create the first computer chess game.

During this same time, John Atanasoff and Clifford Berry developed what is acknowledged to be the first electronic-binary computer. Created at the University of Iowa, the initial prototype acquired this team a grant that allowed them to build their 700 pound final product, containing more than 300 vacuum tubes and approximately one mile of wire. Because the war prevented them from completing a patent on their computer, the computer was dismantled when the physics department needed storage space that was being used by the machine. The distinction of being first initially went to John Mauchly and J. Presper Eckert for their Electrical Numerical Integrator And Calculator (ENIAC I) computer, until a 1973 patent infringement case determined Atanasoff and Berry were the first.
(Continues...)


Excerpted from CompTIA Network+ Certification Study Guide Exam N10-004 2E by Robert J. Shimonski. Copyright © 2009 by Elsevier, Inc.. Excerpted by permission of Elsevier Science.
All rights reserved. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher.
Excerpts are provided by Dial-A-Book Inc. solely for the personal use of visitors to this web site.

Read More Show Less

Table of Contents

  • Chapter 1: Network Fundamentals
  • Chapter 2: Network Media
  • Chapter 3: Network Devices
  • Chapter 4: Switching
  • Chapter 5: Wireless Networking
  • Chapter 6: The OSI Model and Networking Protocols
  • Chapter 7: TCP/IP and Routing
  • Chapter 8: Wide Area Networking
  • Chapter 9: Security Standards and Services
  • Chapter 10: Network Management
  • Chapter 11: Network Troubleshooting Tools
  • Chapter 12: Network Troubleshooting Methodology
  • Appendix A: The Institute of Electrical and Electronics Engineers (IEEE)
  • Appendix B: Understanding Request for Comments (RFC)
  • Appendix C: Self Test Appendix
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)