Book Image

CompTIA Network+ N10-008 Certification Guide - Second Edition

By : Glen D. Singh
Book Image

CompTIA Network+ N10-008 Certification Guide - Second Edition

By: Glen D. Singh

Overview of this book

This book helps you to easily understand core networking concepts without the need of prior industry experience or knowledge within this fi eld of study. This updated second edition of the CompTIA Network+ N10-008 Certification Guide begins by introducing you to the core fundamentals of networking technologies and concepts, before progressing to intermediate and advanced topics using a student-centric approach. You’ll explore best practices for designing and implementing a resilient and scalable network infrastructure to support modern applications and services. Additionally, you’ll learn network security concepts and technologies to effectively secure organizations from cyber attacks and threats. The book also shows you how to efficiently discover and resolve networking issues using common troubleshooting techniques. By the end of this book, you’ll have gained sufficient knowledge to efficiently design, implement, and maintain a network infrastructure as a successful network professional within the industry. You’ll also have gained knowledge of all the official CompTIA Network+ N10-008 exam objectives, networking technologies, and how to apply your skills in the real world.
Table of Contents (26 chapters)
1
Part 1: Networking Concepts
9
Part 2: Network Implementation
13
Part 3: Network Operations
17
Part 4: Network Security and Troubleshooting
22
Chapter 18: Practice Exam

Determining the network ID

During my experience within the networking industry, I have seen IT professionals mistakenly configure the incorrect IP address and/or subnet mask on devices within their network. As an aspiring network professional, it’s important to understand how to identify whether devices are on the same IP network or not. Let’s take a look at the following network topology, which contains a computer, a switch, and a router:

Figure 5.8 – Network topology

As shown in the preceding diagram, there’s a small network that contains a computer with a label of PC 1 that has an IPv4 address of 192.168.1.126 that uses a custom subnet mask of 255.255.255.128. On the same network, there’s a router as the default gateway that provides access to the internet, which is configured using an IPv4 address of 192.168.1.129 with a custom subnet mask of 255.255.255.128.

In this scenario, the computer is connected to the same physical...