INet+ Exam Prep with CD-ROM

( 1 )

Overview

This comprehensive title contains content-rich coverage of the curriculum objectives for the new I-Net+ exam (IKO-001). The Exam Prep format offers proven methods for in-depth study, review, and practice. Real-world projects help readers understand networking terms, Web interaction, and HTML, and learn how to decipher IP addressing, deal with client/server issues, use e-commerce fundamentals, and plan Web pages. Additional exam practice is included on CD-ROM with 122 questions ...
See more details below
Available through our Marketplace sellers.
Other sellers (Hardcover)
  • All (8) from $1.99   
  • New (2) from $45.00   
  • Used (6) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$45.00
Seller since 2015

Feedback rating:

(214)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$89.64
Seller since 2015

Feedback rating:

(332)

Condition: New
Brand New Item.

Ships from: Chatham, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

This comprehensive title contains content-rich coverage of the curriculum objectives for the new I-Net+ exam (IKO-001). The Exam Prep format offers proven methods for in-depth study, review, and practice. Real-world projects help readers understand networking terms, Web interaction, and HTML, and learn how to decipher IP addressing, deal with client/server issues, use e-commerce fundamentals, and plan Web pages. Additional exam practice is included on CD-ROM with 122 questions in a variety of test formats.
Read More Show Less

Product Details

  • ISBN-13: 9781576105986
  • Publisher: Coriolis Group
  • Publication date: 6/28/2000
  • Series: Exam Prep Series
  • Edition description: BK&CD-ROM
  • Pages: 624
  • Product dimensions: 7.75 (w) x 9.54 (h) x 1.87 (d)

Meet the Author

Tcat (Tim) Houser holds multiple certifications including Microsoft (MCSE, MCT), IBM, (PSE), Cisco (CCDP), A+, iNet+, Network+, and CTT in addition to co-leading Certified Technical Trainer courses.

Laurel Ann Spivey Dumas has worn many hats and now enjoys a career in IT. Milestones include: iNet+, A+, Network +, MCSE, and CTT certifications. Current projects include team teaching MCSE and CompTIA certification classes.

Matt Simmons attained his A+, Network+, and MCSE and passed the beta exam for the iNet+ certification. He's now working on Microsoft's corporate intranet and team teaching MCSE and CompTIA classes.

Read More Show Less

Read an Excerpt

Chapter 1: Networking Basics

In this chapter, we'll introduce you to the basic concept of computer networking, and we'll begin by giving you a background history of networking. We'll then introduce you to the two current methods of networking-peer-to-peer and client/server-and with these concepts in mind, we'll show you the industry standard for networking-the OSI model.

We'll then introduce you to the various forms networks can appear in, known as network topologies. We'll also show you how these forms are implemented in LANs, MANs, and WANs.

You'll build on the previous concepts by learning about all of the various components and hardware devices used in networks, and you'll then learn how networks communicate with these devices and other networks using network protocols. We'll then define the standards that dictate how these devices and media are implemented in networks, known as the ISO 8802 specifications.

Following these discussions, you'll learn about how all of these concepts are controlled by the network operating system. Finally, you'll learn about the various tools and methodologies employed by network technicians to troubleshoot common network challenges.

A Brief History of Networking

In 1957, the Soviet Union launched Sputnik, an unmanned satellite that orbited the planet for three months before falling back to Earth. This technology prompted the United States, in 1958, to form the Advanced Research Projects Agency (ARPA) to develop advanced communications by means of the computer.

Eleven years later in 1969, ARPA focused on implementing a network of computers that could span large geographical distances. A four-node network called ARPANET was created, with locations at UCLA, the Stanford Research Institute (SRI), the University of California Santa Barbara, and the University of Utah. On October 29, 1969, history was made when the first data packets were sent across a network. Charley Kline at UCLA attempted to log in (gain access) to a computer located at SRI. The login attempt caused a system crash as the letter G in the word LOGIN was typed. This minor drawback was overcome, and the data packets were sent. To grasp how this technology affects all of us today, a discussion of the elements of a network is in order.

Elements of Networking

To understand the concept of networking, consider for a moment the following analogy. You wish to talk to a friend who lives far away-say, in another country. You pick up the telephone and dial the number. After a series of rings, your friend picks up the phone and says, "Hello?"You greet your friend and begin a conversation. After your conversation is completed, you both say," Goodbye" and hang up your respective phones. What you've just participated in is a networking communication, which is what millions of computer systems around the globe do every day.

This analogy outlines, in simple terms, three of the core components of computer networking:

  • Hardware
  • Protocols
  • Media

The telephone represents the hardware component. It's an electronic device with a specific purpose. However, it isn't necessary for your friend to have an exact duplicate of your telephone for the transmission to occur. The same holds true for computer networks. It's possible in networking for an Apple PowerBook G3 to communicate with an IBM AS/400 Server (a large, powerful computer) and for that IBM to communicate with a Compaq Presario. This is referred to as platform independence. In computer terms, a platform refers to a type of computer system.

Now consider the greeting portion of your telephone call. When your friend answered the phone and said "Hello," he was using what's referred to as a protocol, which is nothing more than a method or standard of communication. If, for example, the person who answered the phone had said "Hej," you would probably have sat there baffled at this greeting (because you don't speak Danish) and terminated the communication by hanging up the phone. For two computers to communicate, they must speak the same language or protocol. Otherwise, the data that's being presented by one computer is unrecognizable by the receiving computer.

Finally, let's consider the media portion of our analogy. When you pick up your phone, you hear a dial tone that indicates the device is ready to initiate a communication sequence. As you dial the number, a series of electronic pulses is sent down the copper wire from your phone, through the wall, out of your house, and through a series of relays that forward the pulses around the world to your friend's telephone, causing it to ring.

Along the communication path, these electronic pulses are transformed into pulses of light that are carried along fiber-optic cables and then converted back into electronic pulses that are carried along the copper wire to your friend's telephone.

In computer networks, each computer sends its data along a form of media that carries the signals. So these signals can be converted from one media type to another, allowing computers to use dissimilar forms of media while communicating. Thanks to further advancements in technology, it's now possible for computer systems to communicate through the air without the need of a physical media. This is known as wireless communication.

In its purest sense, networking is defined as the communication of two separate computers using a defined protocol over a form of media. The purpose of these networks is to share resources, whether the resources are data (such as a document) or devices (such as a printer).

In today's world, the term networking encompasses a broad range of technologies and methods. Computers are now able to not only communicate across relatively short distances, such as from room-to-room, but across entire continents, even from planet to planet. To understand how these communications take place, let's continue our discussion on the basic elements of a network.

Nodes

Now that you have a sense of how a network operates, we can begin to define the elements that make up a network. Looking back at our telephone analogy; two people participated in the communication-you and your friend. Think of these positions as points at each end of a line. Along that line, or communication path, there existed points (the relays) that forwarded the electronic pulses to the next relay in the path. Also on that path were devices that converted the electronic pulses to pulses of light that traveled down fiberoptic cables. These, too, were points along that path. In computer networks, each of these points is referred to as a node, which can be a computer (you and your friend would each be a node) or any device along the path that moves the communication along. With that concept in mind, we can now begin to discuss two standard types of networks-peer-to-peer networks and client/server networks.

Peer-to-Peer Networks

Using the telephone analogy, a peer-to-peer network allows a conversation, or information exchange, between two individuals. An important element to point out is that at the beginning of the phone call, the person receiving the call is responsible for allowing the communication to start. For example, if the receiver of the phone call doesn't want to speak with the person who made the call, the receiver of the call simply hangs up the phone. The receiver makes this determination after the caller identifies himself. Furthermore, if the receiver does wish to talk to the caller, she simply needs to continue the conversation.

In networking terms, this process is called authentication. In a peer-to-peer network, each node in the network is responsible for authenticating all incoming requests for information. This is accomplished by assigning a password to each resource associated with any given computer. For example, let's say Bob would like to access a file on another computer on the network. In a peer-to-peer model, Bob is prompted to supply a password each time he attempts to access that file over the network. Furthermore, if Bob wants to access a file on a different computer, he's prompted to supply a different password assigned to that file. It becomes readily apparent that trying to maintain passwords for each separate resource on a large network is quite cumbersome. In response to this dilemma, a new model of networking was introduced-the client/server model.

Client/Server Networking

The major drawback of the peer-to peer model is its lack of centralized administration. Network administrators essentially have two choices: keep all of the passwords the same for all resources (creating a serious lack of security), or maintain a list of the passwords and update the list when changes occurred. To solve this problem, the client/server model was introduced. In this model, all usernames are stored centrally on one computer. Each user, then, has a unique password that allows the user to access the network. To allow a user to access a resource on the network, the network administrator need only add that user's name to the list of allowed users. When that user attempts to access the resource, her username is compared with that list, and access is granted or denied.

Using our telephone analogy, this is like placing an operator-assisted call. The caller dials the operator and requests that a connection be made between her and her friend. Before making the connection, the operator contacts her friend and verifies that the friend would like to receive the connection. If the receiver accepts the request, the connection is made and the conversation can take place. However, if the receiver doesn't wish to accept the call, the operator denies the connection request of the caller.

As you can see, the client/server model lends itself well to a large-scale network with thousands of users and resources. The process of allowing access to a resource on a network is referred to as sharing, and two types of resource sharing exist: share-level and user-level...

Read More Show Less

Table of Contents

Insights xxv
Self-Assessment xxxvii
Chapter 1 Networking Basics 1
A Brief History of Networking 2
Elements of Networking 2
The OSI Reference Model 6
Network Topologies 10
Types of Networks 15
Networking Hardware 16
ISO 8802 Specifications 23
Networking Protocols 26
Network Operating Systems 29
Troubleshooting Challenges 31
Chapter Summary 38
Review Questions 38
Real-World Projects 42
Chapter 2 TCP/IP 47
TCP/IP History 48
TCP/IP Model and RFCs 49
IP Addressing 50
Class Addresses 55
Reserved and Private IP Addresses 56
Gateways 57
Ports 58
TCP/IP Protocols 59
TCP/IP Services 61
Email 71
Lists and Newsgroups 72
Remote Access Protocols 74
Multipoint Access and Point-to-Point 78
Troubleshooting Challenges 79
Chapter Summary 81
Review Questions 82
Real-World Projects 85
Chapter 3 The Internet 89
Data Transport Methods 91
Wired Access 93
Wireless Access 106
Backbones 108
Troubleshooting Challenges 114
Chapter Summary 117
Review Questions 117
Real-World Projects 120
Chapter 4 The Client 123
Operating Systems 124
Client-Side Software 125
Mime 126
Web Browsers 129
Boolean Searches 133
Configuration 134
Legacy Clients 136
Cookies 139
Viruses 141
Modem 143
Chapter Summary 145
Review Questions 146
Real-World Projects 149
Chapter 5 The Server 153
Operating Systems 155
Server Services 157
DNS 159
Proxy Server 160
DHCP Server 161
Mail Server 162
Certificate Servers 163
SAN 164
IAPs 164
Transaction Server 166
Application Server 167
SQL 167
CTI 169
Troubleshooting Challenges 171
Chapter Summary 176
Review Questions 176
Real-World Projects 179
Chapter 6 Security 183
Triangle of Security 184
Designing Security 187
Implementing Security: Authentication 191
Security Management 193
Virtual Private Networks 197
Monitoring and Maintenance 201
Types of Attacks 204
Defense 209
Breaking News about Security 213
Troubleshooting Challenges 215
Chapter Summary 215
Review Questions 217
Real-World Projects 221
Chapter 7 Creating Web Pages 225
HTML Fundamentals 226
Creation Tools 229
HTML Structure 231
Link Elements 258
Browser Compatibility 269
Troubleshooting Challenges 270
Chapter Summary 270
Review Questions 271
Real-World Projects 274
Chapter 8 Creating Interactive Web Pages with Multimedia 279
Images 280
Sound 293
Advanced Multimedia 295
Troubleshooting Challenges 305
Chapter Summary 306
Review Questions 306
Real-World Projects 310
Chapter 9 Advanced Web Development 313
Frames 314
Style Sheets 316
Scripting 318
Web Application Interfaces 321
Databases 337
Creating Database-Driven Web Sites 348
Troubleshooting Challenges 354
Chapter Summary 354
Review Questions 355
Real-World Projects 358
Chapter 10 Web Design Fundamentals 363
Web Page Design 364
Web Page Content 372
Internet Web Site Design 382
Testing the Web Site 394
Maintaining the Web Site 395
Intranet Web Site Design 396
The Future of Web Sites 399
Troubleshooting Challenges 401
Chapter Summary 402
Review Questions 403
Real-World Projects 406
Chapter 11 E-Commerce Fundamentals 411
Putting the .com in Commerce 412
Marketing on the Internet 424
Business Models 435
Working in a Global Market 439
Troubleshooting Challenges 441
Chapter Summary 444
Review Questions 444
Real-World Projects 448
Chapter 12 Legal Issues 451
Web Site Issues 452
Email Issues 454
Trademarks 461
Copyright 464
Patents 467
Global Issues 468
Troubleshooting Challenges 469
Chapter Summary 469
Review Questions 470
Real-World Projects 472
Chapter 13 Sample Test 475
Chapter 14 Answer Key 495
Appendix A Answers to Review Questions 509
Appendix B I-Net+ Exam Objectives 523
Appendix C Study Resources 525
Appendix D Essential HTML Tags 529
Appendix E List Processor Commands 541
Glossary 547
Index 567
Read More Show Less

Customer Reviews

Average Rating 1
( 1 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(1)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted October 20, 2000

    Keep Searching

    When I first started studying for the exam, there were very few titles available. This publisher has produced some very good technical works that I have used in the past and that's why I selected this book. After taking the exam, I have to say that I learned more from work experience, technical websites, and white papers, than I did from the book. The text is not an interesting book to read and not because it is a technical piece. It's just plain dull. The graphics and illustrations fall completely short of supporting the text. Furthermore, it spends too much time on topics that didn't appear on the exam, with not enough pages devoted to some important core topics. Do yourself a favor and purchase a different book.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)