Network+ Study Guide
Chapter 1: Network Fundamentals
- Figure 1.1: A small LAN
- Figure 1.2: A sample network including servers and workstations
- Figure 1.3: A peer-to-peer network
- Figure 1.4: A client/server network
- Figure 1.5: An example of a physical bus topology
- Figure 1.6: A typical star topology with a hub
- Figure 1.7: A typical ring topology
- Figure 1.8: A typical mesh topology
- Figure 1.9: An example of an ad hoc RF network
- Figure 1.10: An example of an RF multipoint network
- Figure 1.11: Backbone and segments on a sample network
- Figure 1.12: Thicknet and vampire taps
- Figure 1.13: An N-series connector
- Figure 1.14: A stripped-back Thinnet
- Figure 1.15: A male and female BNC connector
- Figure 1.16: RJ-11 and RJ-45 connectors
- Figure 1.17: An example of an ST connector
- Figure 1.18: A sample SC connector
Chapter 2: The OSI Model
- Figure 2.1: The Open Systems Interconnect (OSI) model
- Figure 2.2: How data travels through the layers of the OSI model
- Figure 2.3: A sample physical bus topology
- Figure 2.4: A physical star topology
- Figure 2.5: A physical ring topology
- Figure 2.6: A physical mesh topology
- Figure 2.7: A sample network interface card
- Figure 2.8: A repeater installed on a network
- Figure 2.9: The 5-4-3 Rule for network repeaters
- Figure 2.10: A standard hub
- Figure 2.11: MAUs in a Token Ring network
- Figure 2.12: Sublayers of the Data Link layer
- Figure 2.13: The IEEE standards’ relationship to the OSI model
- Figure 2.14: A sample network before and after bridging
- Figure 2.15: A switch builds a table of all MAC addresses of all connected stations
- Figure 2.16: Address conflicts on a network
- Figure 2.17: Routing components
- Figure 2.18: Initiating communications using a connection-oriented service
Chapter 3: TCP/IP Fundamentals
- Figure 3.1: A comparison of the seven-layer OSI model, the four-layer DoD model, and how TCP/IP maps to each model
- Figure 3.2: A datagram with its TCP header
- Figure 3.3: A datagram with TCP and IP headers
- Figure 3.4: The components in a TCP/IP block diagram
- Figure 3.5: The IP address structure
- Figure 3.6: How a proxy server works
- Figure 3.7: The IP Address tab of the TCP/IP Properties dialog box
- Figure 3.8: The Bindings tab of the TCP/IP Properties dialog box
- Figure 3.9: The Gateway tab of the TCP/IP Properties dialog box
- Figure 3.10: The WINS Configuration tab of the TCP/IP Properties dialog box
- Figure 3.11: The DNS Configuration tab of the TCP/IP Properties dialog box
Chapter 4: TCP/IP Utilities
- Figure 4.1: Output of the netstat command without any switches
- Figure 4.2: Sample output of the netstat -a command
- Figure 4.3: Sample output of the netstat -e command
- Figure 4.4: Sample output of the netstat -r command
- Figure 4.5: Sample output of the nbtstat -a command
- Figure 4.6: Sample output of the nbtstat -c command
- Figure 4.7: Sample output of the nbtstat -n command
- Figure 4.8: Sample output of the nbtstat -r command
- Figure 4.9: Sample output of the nbtstat -S command
- Figure 4.10: Sample output of the nbtstat -s command
- Figure 4.11: Sample output produced by using the /all switch
- Figure 4.12: Sample tracert output
- Figure 4.13: The Windows 95/98 and NT Telnet utility
- Figure 4.14: Using Telnet to find out if your SMTP mail system is responding
Chapter 5: Major Network Operating Systems
- Figure 5.1: The NetWare command-line console
- Figure 5.2: The Monitor menu-based utility
- Figure 5.3: The NetWare architecture
- Figure 5.4: A sample NDS Tree
- Figure 5.5: A NetWare Administrator screen
- Figure 5.6: Sample network and a sample NDS tree
- Figure 5.7: Gateway Services for NetWare (GSNW) operation
- Figure 5.8: Windows NT architecture
- Figure 5.9: An NTDS network
- Figure 5.10: User Manager for Domains
- Figure 5.11: The basic Macintosh GUI
- Figure 5.12: Mac OS X
Chapter 6: Network Installation and Upgrades
- Figure 6.1: Comparing a power spike and a power surge
- Figure 6.2: Comparing power underage problems
- Figure 6.3: A sample log file from the Windows NT Event Viewer
- Figure 6.4: A typical UTP installation
- Figure 6.5: A sample DB-25 female SCSI connector
- Figure 6.6: Male Centronics-50 SCSI connector
- Figure 6.7: A high-density, 68-pin SCSI connector
- Figure 6.8: A sample male and female D-type connector
- Figure 6.9: A sample BNC connector
- Figure 6.10: A typical RJ-45 connector
- Figure 6.11: An IBM data connector
- Figure 6.12: A jumper and how it is used
- Figure 6.13: The DIP switch
- Figure 6.14: The Select Network Component Type window
- Figure 6.15: Selecting the software you want to install
- Figure 6.16: Choosing a primary network logon
- Figure 6.17: The Network and Dial-up Connections window
- Figure 6.18: NDC with the NetWare client and NWLink installed
- Figure 6.19: The NetWare default server/tree option screen
- Figure 6.20: An example of a crimper
- Figure 6.21: Using a punchdown tool
- Figure 6.22: An example of a punchdown tool
Chapter 7: WAN and Remote Access Technologies
- Figure 7.1: A local PSTN (or POTS) network
- Figure 7.2: A typical frame relay configuration
- Figure 7.3: A PPTP implementation connecting two LANs over the Internet
- Figure 7.4: A workstation is connected to a corporate LAN over the Internet using PPTP
Chapter 8: Network Access and Security
- Figure 8.1: Two networks with an ACL-enabled router
- Figure 8.2: A firewall with a DMZ
- Figure 8.3: Protocol switching with and without a dead zone
- Figure 8.4: A hacker denied by a dynamic state list
- Figure 8.5: A packet going to a proxy
- Figure 8.6: IP spoofing
- Figure 8.7: Public key encryption
Chapter 9: Fault Tolerance and Disaster Recovery
- Figure 9.1: Disk mirroring
- Figure 9.2: Disk duplexing
- Figure 9.3: How disk striping works
- Figure 9.4: The amount of data backed up with a full backup
- Figure 9.5: The amount of data backed up in a differential backup
- Figure 9.6: The amount of data backed up with an incremental backup
- Figure 9.7: Grandfather-Father-Son rotation
Chapter 10: Network Troubleshooting
- Figure 10.1: TCP/IP DNS properties for the misconfigured workstation
- Figure 10.2: A sample CONSOLE.LOG file
- Figure 10.3: Sample Log event types and their associated icons
- Figure 10.4: A sample System Log (note the different error types and event IDs)
- Figure 10.5: The Event Detail dialog box for an event listed in Figure 10.4
- Figure 10.6: The Security Log in Event Viewer
- Figure 10.7: The Security Log event types and their associated icons
- Figure 10.8: A sample Application event log
- Figure 10.9: A standard Ethernet 10BaseT cable
- Figure 10.10: A standard Ethernet 10BaseT crossover cable
- Figure 10.11: A hardware loopback and its connections
- Figure 10.12: Use of a common tone generator and locator