Synopses & Reviews
Develop the skills you need in the real world
Hit the ground running with the street-smart training you'll find in this practical book. Using a "year in the life" approach, it gives you an inside look at network administration, with key information organized around the actual day-to-day tasks, scenarios, and challenges you'll face in the field. This valuable training tool is loaded with hands-on, step-by-step exercises covering all phases of network administration, including:
Designing a network
Implementing and configuring networks
Maintaining and securing networks
Troubleshooting a network
An invaluable study tool
This no-nonsense book also covers the common tasks that CompTIA expects all of its Network+ candidates to know how to perform. So whether you're preparing for certification or seeking practical skills to break into the field, you'll find the instruction you need, including:
Designing and drawing an internetwork
Identifying devices and components
Configuring wireless components
Planning for static and dynamic routing
Setting up hubs, switches, and routers
Maintaining security with encryption, scans, and more
Troubleshooting your network
The Street Smarts series is designed to help current or aspiring IT professionals put their certification to work for them. Full of practical, real world scenarios, each book features actual tasks from the field and then offers step-by-step exercises that teach the skills necessary to complete those tasks. And because the exercises are based upon exam objectives from leading technology certifications, each Street Smarts book can be used as a lab manual for certification prep.
Synopsis
Building on the most common and challenging tasks Network Admins must face, this book shows the reader step-by-step how to perform these tasks. Designed to give the reader an inside look into the field of network administration. The book is written as if the reader was actually on the job, offering a variety of scenarios as well as potential roadblocks one might face in the field.
The book is broken down in the various “phases” of network administration:
• Designing a Network
• Implementing and Configuring the Network
• Maintaining and Securing the Network
• Troubleshooting the Network
Each phases will include step-by-step instructions to how to perform a the most common of tasks a network admin can expect to perform, including:
• Choosing an Internet access technology
• Configuring of wireless components
• Considering optimal placement of routers and servers
• Configuring hubs, switches, and routers
• Configuring a Windows client
• Troubleshooting your network
Synopsis
Helpful preparation for the new CompTIA Network+ exam–with real-world scenarios
- Provides step-by-step instructions for many of the tasks network administrators perform on a day-to-day basis, such as configuring wireless components; placing routers and servers; configuring hubs, switches, and routers; configuring a Windows client; and troubleshooting a network
- Addresses the CompTIA objectives and also includes a variety of labs on tasks that the reader can expect to experience on the job, providing hands-on practice to boost their success
- Organized by the phases of network administration: designing a network, implementing and configuring it, maintenance and security, and troubleshooting
Toby Skandier, Network +, i-Net+, Server+ (Raleigh, NC) is founder of Talskan Technologies, LLC, a technical education provider based in North Carolina. He has coauthored numerous books for Sybex, including previous editions of the bestselling Network+ Study Guide.
About the Author
Toby Skandier, Network+, A+, i-Net+, Server+, is founder of Talskan Technologies, LLC, a technical education provider based in North Carolina. He is the author of the previous edition of Network Administrator Street Smarts and has coauthored numerous books for Sybex, including the bestselling Network+ Study Guide and CompTIA A+ Complete Study Guide.
Table of Contents
Introduction.
Phase 1 Designing an Internetwork.
Task 1.1: Drawing an Internetwork.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 1.2: Identifying Network Components.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 1.3: Differentiating Ethernet Devices.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 1.4: Discovering and Filtering MAC Addresses.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 1.5: Applying the OSI Model.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 1.6: Developing an IP Addressing Scheme.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 1.7: Designing a VLAN Scheme.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 1.8: Planning for Static and Dynamic Routing.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Implementing and Configuring the Design.
Task 2.1: Assigning IP Addresses.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 2.2: Naming Network Devices.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 2.3: Implementing Static and Dynamic Routing.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 2.4: Installing Wireless NICs.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 2.5: Measuring Wireless Signal Strength.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 2.6: Implementing Bluetooth.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 2.7: Implementing Ad Hoc Wireless Networking.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 2.8: Using an Analog Modem.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 2.9: Using a DSL Modem.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 2.10: Using a Router as a Frame Relay Switch.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 2.11: Simulating T1 CSU/DSUs.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Phase 3 Maintaining and Securing the Network.
Task 3.1: Creating Local User Accounts.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.2: Creating Local User Groups.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.3: Managing Access to Resources.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.4: Disabling Local User Accounts.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.5: Setting Password Restrictions.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.6: Mitigating the Ping of Death.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.7: Securing Links Between Routers.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.8: Guarding against SYN Flood Attacks.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.9: Implementing File-Level Encryption.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.10: Establishing Data Encryption Between Routers.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.11: Creating Data Backups.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.12: Running an Antivirus Scan.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.13: Running an Antispyware Scan.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 3.14: Searching for Operating System Updates.
Scenario.
Scope of Task Procedure Criteria for Completion.
Phase 4 Troubleshooting the Network.
Task 4.1: Using ARP Utilities.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 4.2: Using the NETSTAT.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 4.3: Using the FTP Utility.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 4.4: Using Ping Utilities.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 4.5: Using the IPCONFIG.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 4.6: Using Traceroute Utilities.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 4.7: Using Telnet Scenario.
Scope of Task Procedure Criteria for Completion.
Task 4.8: Using the NSLOOKUP Utility.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 4.9a: Using the Built-in Protocol Analyzer.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 4.9b: Using a Third-party Protocol Analyzer.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Task 4.10: Displaying Computer Event Logs.
Scenario.
Scope of Task.
Procedure.
Criteria for Completion.
Index.