CompTIA Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2E
  • Alternative view 1 of CompTIA Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2E
  • Alternative view 2 of CompTIA Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2E

CompTIA Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2E

by Robert Shimonski, Naomi Alpern, Michael Cross, Dustin L. Fritz

View All Available Formats & Editions

CompTIA Network+ Certification Study Guide: Exam N10-004, Second Edition, offers a practical guide for those interested in pursuing CompTIA Network+ certification. It presents the fundamental terminology needed to perform duties as a network technician and to pass the CompTIA Network+ exam.

The book begins with a brief history of the development of networks,


CompTIA Network+ Certification Study Guide: Exam N10-004, Second Edition, offers a practical guide for those interested in pursuing CompTIA Network+ certification. It presents the fundamental terminology needed to perform duties as a network technician and to pass the CompTIA Network+ exam.

The book begins with a brief history of the development of networks, including their origins and where they are heading. It describes network models such as centralized and decentralized, and distinguishes between a local area network (LAN) and a wide area network (WAN). The discussions include cable connections and termination for the Network+ exam; the meaning of convergence; and the most common network devices being used on small and large networks, including the Internet. The role of switches in improving network functionality and enhancing security is described. The book also contains chapters on wireless networking; Open Systems Interconnection (OSI) model; Transmission Control Protocol/Internet Protocol (TCP/IP); wide area network (WAN) technologies; network security; and network management and troubleshooting.

  • New to this edition in accordance with the newly revised exam is an intensified focus on network security
  • Two NEW practice exams to help eliminate test-day jitters
  • Tiered chapter ending questions that allow for graduated learning
  • Covers everything from test taking techniques to advanced topics - keeping the beginner and intermediate IT professional in mind
  • Layout of the guide parallels the Network+ N10-004 objectives for ease of study

Product Details

Elsevier Science
Publication date:
Sold by:
Barnes & Noble
File size:
7 MB

Read an Excerpt

CompTIA Network+ Certification Study Guide Exam N10-004 2E

By Robert J. Shimonski

Elsevier Science

Copyright © 2009 Elsevier, Inc.
All rights reserved.
ISBN: 978-1-59749-488-5



Network Fundamentals




Networks have been around for many years, long before the first home computer was ever designed or created. Other forms of networking have been around since the dawn of time. Today, designing, planning, implementing, deploying, and managing computer networks is somewhat of a never-ending journey into technology as it develops and integrates, standardizes and grows. It's amazing to see where the computer networks are today from just 15 years ago. Now, more than ever, computer networks are relied upon to produce not only data in the form of files or connectivity to a printer for printing, but also everything from surfing the Internet securely to making a call from New York to Tianjin, works off of the power of a network. Wired to wireless, satellites in the sky to home PC networks allow two computers in your home to share the Internet at the same time. This is all done through networking. The wonderful world of networking is colorful, exciting, and is growing each and every day. Routers, switches, and other infrastructure devices are deployed every day from companies such as Cisco, Juniper, Nortel, and 3Com to name a few. So who deploys them? Who plans, designs, and leads the way for all of this equipment to be planned, purchased, implemented, and managed? Each and every day technology grows more and more complicated, and it evolves as we do.

By the end of this chapter, you will have learned what a network is, and you will start to build upon the initial concepts you need to develop to become a network technician, as well as to pass the Network+ exam. In this chapter, we cover a brief history on the development of networks, as well where they originated from and where they are heading. We also cover the fundamental terminology you absolutely must know to perform your duties as a network technician and to pass the CompTIA Network+ exam.

We cover network models such as centralized and decentralized, the differences between a local area network (LAN) and a wide area network (WAN). Network topologies such as bus, ring, mesh, and star are covered, as well as a discussion on wired and wireless networks.

We then cover the Institute of Electrical and Electronics Engineers (IEEE), which is a standards committee aimed at making things in networking standardized, and easier to support and maintain. We cover in detail the most common standards, testable on the exam. Finally, we cover Requests for Comments (RFCs), a common source for networking professionals to get the definitive source on networking knowledge. So let us start from the very beginning, what exactly is a network anyway?


Even someone who's new to computers has experienced the basic concept of networking; it is the difference between standing alone or being part of a group. Networks are systems that are interconnected in some way and provide a method of communication. If you think of your own experiences, you've probably networked with groups of colleagues, and perhaps discussed how you're planning on taking the Network+ exam. Doing so provided a method of sharing information and possibly opened avenues to accessing important resources. Computers are the same; they can be standalone, or part of a network.

A computer network exists when two or more machines are connected together, thereby allowing them to share data, equipment, and other resources. Using a combination of software and hardware the computers gain added functionality, including the ability to:

* Transfer data between machines.

* Save and access files on the same hard disks or other storage devices.

* Share printers, scanners, modems, and other peripheral devices.

* Allow messages to be exchanged via e-mail, instant messaging, and other technologies.

Although networks may provide similar functions, they can be as different from one another as groups of people. Networks are characterized by a number of factors, which we'll discuss later in this chapter and throughout this book. Some of the elements that will define your network and make it different from others include:

* Hardware, such as network interface cards (NIC) or network adapters, that allow computers to transmit and receive data across the network; or routers, switches, and hubs that passes the data to other computers or networks.

* Media, which consists of cables or wireless technologies that carry the data across the network.

* Protocols, which are sets of rules that control how the data is sent between computers. The most popular of these is the protocol used on the Internet, Transmission Control Protocol/Internet Protocol (TCP/IP), while other protocols used on networks include IPX/SPX and AppleTalk.

* Topology, which is shape of the network. It defines how the network is designed and describes how computers are connected together (discussed later in this chapter).

* Network type, which defines the size of the network and its scale within a geographical area (discussed later in this chapter).

* Network model, which determines the levels of security available to the network, and the components needed to connect the computers together (discussed later in this chapter).

* Access, which determines who can use the network and how, and if features of the network are available for private or public use.

* Network operating systems (NOS), such as Windows, NetWare, and Linux. A NOS may be used on a server, which is a computer that provides services to numerous computers, and/or installed on computers that are used by individual users of the network. In some cases, such as with Novell NetWare, additional software may need to be installed on computers that use the server, who are referred to as clients.

* Other software and services, such as whether the network provides access to internal Web sites, e-mail, databases, and so forth.

As you can imagine, these factors influence the design of networks, so they aren't consistently the same. Networks may use different protocols, topologies, and other elements that make them unique. This means that you can look at two networks in two different homes or businesses, and they can be completely different from one another.

Despite this, there are similarities that will exist between different networks. In all cases, a computer is configured to use the network (either by configuring its operating system (OS) or installing client software) and has a device capable of transmitting and receiving data, such as a network adapter or modem. Using a protocol like TCP/IP, it communicates with other computers, and sends data over media (i.e. cables or wireless) to a device (i.e. hub, router, or switch) that will send the data to its destination (i.e. another computer or device, such as a printer). Although the specifics may vary greatly, the basic aspects of a network remain the same.

What Is an Internetwork?

Just as computers can be connected together, so can networks. An internetwork exists when two or more networks that are connected together. By connecting networks together, different businesses or locations can share data between their systems.

Internetworks are particularly important in organizations where sharing data is vital to its ability to function or operate effectively. For example, the police may have a network of computers in their cars, which connects to a network of computers located in police stations. If you're pulled over by the police, the officer may check your license plate number on the computer in his or her car. This computer would connect to a server used by the network of cars, and then pass along the request to a server on a different network that's used by other members of the organization, such as a records department. If additional information was requested, the request might also be sent to networks belonging to state/provincial or federal police. By internetworking these different systems, the police can determine if the car is stolen, if it was used to commit a crime, or if the owner is wanted or believed dangerous.

As you've probably guessed from the name, the largest internetwork is the Internet. The Internet originated as a Department of Defense (DOD) project in 1969, when the cold war was still going on between the West and the former Union of Soviet Socialist Republics (USSR). Under the direction of the DOD's Advanced Research Projects Agency (ARPA), the goal was to create a network that could withstand a nuclear attack. If any part of ARPANet was destroyed, the other parts of it would continue to function. Initially connecting four universities (University of California Los Angeles (UCLA), Stanford Research Institute, University of California Santa Barbara, and University of Utah), it allowed researchers and government to exchange information and quickly grew to include other organizations. Using the TCP/IP protocol suite that ARPA developed, additional computers and networks were added over the years, until finally in 1990, ARPANet was disbanded and removed from the Internet. Today, hundreds of millions of computers and networks connect to the Internet, making it a fundamental method of communication and data exchange.

Internetworks and the Internet aren't to be confused with intranets. Intranets use the same technologies and features of the Internet, such as Internet browsers, Web sites, and so on. This allows users of a network to view documents, distribute data, share employee information, access shared databases, online programs, and other components that are needed or wanted by an organization. The major difference between an intranet and the Internet is that an intranet is used internally. Although the Internet allows the public to view Web pages and other resources, intranets are private and available to employees of a company.

A Brief History on Networking and Communications

Although the Network+ exam won't quiz you on the history, it is nevertheless important to understand past achievements and how we've reached our present state of technology. The history of networking and communications is rich and complex, stretching over a hundred years in the past, with massive changes in the later part of the twentieth century. By looking at these changes, you will see the development of OSes, hardware, and innovations that are still used today.

Early Telecommunications and Computers

Telecommunications got its start in 1870s in Brantford Ontario, when Alexander Graham Bell developed the idea of a telephone. After the first successful words were sent over the device on March 10, 1876, a revolution of communication began. Within decades of its conception, millions of telephones were sold, with operators connecting people using manual circuit switching. This method of calling the operator to have them connect you to another party was routine until the mid-twentieth century, when mechanical and electronic circuit switching became commonplace. These events would have a massive impact on the innovation of computers, even though they wouldn't be invented until 60 years after Bell's first successful phone call.

Although arguments could be made as to whether ancient devices (such as the abacus) could be considered a type of computer, the first computer that could be programmed was developed by a German engineer named Konrad Zuse. In 1936, Zuse created the Z1, a mechanical calculator that was the first binary computer. Zuse continued making innovations to his design, and five years later had reached the point where the Z3 was able to accept programming. Although the next version of his computer would use punch cards to store programs, Zuse used movie film to store programming and data on the Z3 due to a supply shortage of paper during World War II. Just as his computers evolved, so did his programming skills. Zuse's achievements also extended to creating the first algorithmic programming language called Plankalkül, which later was used to create the first computer chess game.

During this same time, John Atanasoff and Clifford Berry developed what is acknowledged to be the first electronic-binary computer. Created at the University of Iowa, the initial prototype acquired this team a grant that allowed them to build their 700 pound final product, containing more than 300 vacuum tubes and approximately one mile of wire. Because the war prevented them from completing a patent on their computer, the computer was dismantled when the physics department needed storage space that was being used by the machine. The distinction of being first initially went to John Mauchly and J. Presper Eckert for their Electrical Numerical Integrator And Calculator (ENIAC I) computer, until a 1973 patent infringement case determined Atanasoff and Berry were the first.

Excerpted from CompTIA Network+ Certification Study Guide Exam N10-004 2E by Robert J. Shimonski. Copyright © 2009 by Elsevier, Inc.. Excerpted by permission of Elsevier Science.
All rights reserved. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher.
Excerpts are provided by Dial-A-Book Inc. solely for the personal use of visitors to this web site.

Meet the Author

Rob Shimonski ( is an experienced entrepreneur and an active participant in the business community. Rob is a best-selling author and editor with over 15 years experience developing, producing and distributing print media in the form of books, magazines and periodicals. To date, Rob has successfully created over 100 books that are currently in circulation. Rob has worked for countless companies to include CompTIA, Entrepreneur Magazine, Microsoft, McGraw Hill Education, Cisco, the National Security Agency and Digidesign. Rob has an extremely diverse background in the print media industry filling roles such as author, co-author, technical editor, copy editor and developmental editor. Since print media shifted to the digital domain, Rob has focused the past decade on developing all of the needed skills to produce professional audio and video media. An expert in Digital Audio Workstation (DAW) design and video production, Rob has created over 500 different media packages to include commercials for TV, online advertising clips, audio podcasts and much more. Rob started to train others while in the US Marine Corps. Since, Rob has held a NY State teaching certificate as well as multiple trainer roles in colleges and trade schools across the world.
Naomi Alpern currently works for Microsoft as a consultant specializing in unified communications. She holds many Microsoft certifications, including an MCSE and MCT, as well as additional industry certifications such as Citrix Certified Enterprise Administrator, Security+, Network+, and A+. Since the start of her technical career she has worked in many facets of the technology world, including IT administration, technical training, and most recently, full-time consulting.
Michael Cross is a SharePoint Administrator and Developer, and has worked in the areas of software development, Web design, hardware installation/repairs, database administration, graphic design, and network administration. Working for law enforcement, he is part of an Information Technology team that provides support to over 1,000 civilian and uniformed users. His theory is that when the users carry guns, you tend to be more motivated in solving their problems.

Michael has a diverse background in technology. He was the first computer forensic analyst for a local police service, and performed digital forensic examinations on computers involved in criminal investigations. Over five years, he recovered and examined evidence involved in a wide range of crimes, inclusive to homicides, fraud, and possession of child pornography. In addition to this, he successfully tracked numerous individuals electronically, as in cases involving threatening e-mail. He has consulted and assisted in numerous cases dealing with computer-related/Internet crimes and served as an expert witness on computers for criminal trials. In 2007, he was awarded a Police Commendation for work he did in developing a system to track local high-risk offenders and sexual offenders.

With extensive experience in Web design and Internet-related technologies, Michael has created and maintained numerous Web sites and implementations of Microsoft SharePoint. This has included public Web sites, private ones on corporate intranets, and solutions that integrate them. In doing so, he has incorporated and promoted social networking features, created software to publish press releases online, and developed a wide variety of solutions that make it easier to get work done.

Michael has been a freelance writer and technical editor on over four dozen I.T. related books, as well as writing material for other genres. He previously taught as an instructor and has written courseware for IT training courses. He has also made presentations on Internet safety, SharePoint and other topics related to computers and the Internet. Despite his experience as a speaker, he still finds his wife won't listen to him.

Over the years, Michael has acquired a number of certifications from Microsoft, Novell and Comptia, including MCSE, MCP+I, CNA, Network+. When he isn’t writing or otherwise attached to a computer, he spends as much time as possible with the joys of his life: his lovely wife, Jennifer; darling daughter Sara; adorable daughter Emily; and charming son Jason.

For the latest information on him, his projects, and a variety of other topics, you can follow him on Twitter @mybinarydreams, visit his Facebook page at, follow him on LinkedIn at, or read his blog at
Dustin L. Fritz [BSISS; E|CSA] is owner and Chief Executive Officer of The Computer Network Defense Group LLC in Owings Mills, Maryland providing executive-level strategic and tactical cybersecurity consulting services. He specializes in Information Operations Conditions, Information Assurance Vulnerability Management, risk and vulnerability assessments, certification-n-accreditation, security awareness and planning, configuration management, and incident response team development.

Dustin has over 10 years of Information Assurance and Computer Network Defense (CND) experience, with core foundations in creating enterprise-wide CND strategies for the Department of the Navy, realigning incident response throughout the United States Pacific Fleet, and implementing the first-ever Information Operations Condition response team (IRT). Dustin’s contributions and outstanding achievements in cybersecurity have been consistently recognized over the years by the United States Navy and the Secretary of the Navy; most recently in November 2007 for his actions in attaining 100 percent readiness for all Forward Deployed Naval Forces. Dustin holds a Bachelor of Science in Information Systems Security (BSISS) from Westwood College out of Denver, Colorado and is a EC-Council | Certified Security Analyst (E|CSA). He is an active member of Institute of Electrical and Electronics Engineers, Association of Information Technology Professionals, the Cyber Warfare Forum Initiative and can always be found speaking in public about cybersecurity and providing professional mentoring. Along with being the technical editor for Dissecting the Hack: The Forbidden Network, Dustin has also contributed to Syngress’ CompTIA Network+ Certification Study Guide (2009) (ISBN-10: 1597494291; ISBN-13: 978-1597494298) as a technical editor and author.
Mohan Krishnamurthy Madwachar (MCSE, CCA) is the GM-Network Security at Almoayed Group in Bahrain. Mohan is a key contributor to Almoayed Group's projects division and plays an important role in the organization's network security initiatives. Mohan has a strong networking, security, and training background. His tenure with companies such as Schlumberger Omnes and Secure Network Solutions India adds to his experience and expertise in implementing large and complex network and security projects. Mohan holds leading IT industry-standard and vendor certifications in systems, networking, and security. He is a member of the IEEE and PMI. Mohan has coauthored five books published by Syngress: Designing&Building Enterprise DMZs (ISBN: 1597491004), Configuring Juniper Networks NetScreen&SSG Firewalls (ISBN: 1597491187), How to Cheat at Securing Linux (ISBN: 1597492078), How to Cheat at Administering Office Communications Server 2007 (ISBN: 1597492126), and Microsoft Forefront Security Administration Guide (ISBN: 1597492447). He also writes newspaper columns on various subjects and has contributed to leading content companies as a technical writer and subject matter expert.

Customer Reviews

Average Review:

Write a Review

and post it to your social network


Most Helpful Customer Reviews

See all customer reviews >