did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780789735300

Upgrading and Repairing Networks

by ; ;
  • ISBN13:

    9780789735300

  • ISBN10:

    078973530X

  • Edition: 5th
  • Format: Paperback
  • Copyright: 2006-01-01
  • Publisher: Que
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $64.99 Save up to $2.90
  • Digital
    $62.09
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

The DEFINITIVE book on network upgrading and repair, updated with the latest changes in wireless and wired networking.

Table of Contents

Introduction 1(1)
Who Should Use This Book?
1(1)
What Will You Find Inside?
1(2)
What's New in This Edition
3(2)
I. UP FRONT: NETWORK PLANNING AND DESIGN CONCEPTS
5(66)
A Short History of Computer Networking
7(4)
Overview of Network Topologies
11(18)
LAN Topologies
12(11)
Bus Topology
12(1)
Star Topology
13(2)
Ring Topology
15(2)
Mesh Topology
17(1)
Hybrid Topologies
18(3)
Shared and Nonshared Network Media Topologies
21(1)
Bridged Versus Routed Topologies
22(1)
Building and Campus Topologies
23(3)
Connecting Network Segments Within a Building: The Backbone
23(1)
Design Considerations in a Campus LAN Environment
24(1)
Scalability
25(1)
Redundancy
26(1)
Multi-Tiered Network Topology
26(3)
Scalability
26(1)
Redundancy
26(1)
Fault Tolerance
27(2)
Network Design Strategies
29(12)
Planning a Logical Network Design
31(5)
Who Are Your Clients?
32(1)
What Kinds of Services or Applications Will the Network Offer?
32(1)
What Degree of Reliability Do I Require for Each Network Link?
33(1)
Choosing a LAN Protocol
33(3)
Planning and Design Components
36(3)
Document Everything
36(1)
Test, Test, and Then Test Some More
37(1)
Creating Policies and Procedures for Network Usage
38(1)
Providing Training for Technical Personnel
39(1)
You Can't Forget the Budget (or Can You?)
39(1)
The Physical Network
39(1)
Planning Resources
40(1)
Upgrading Strategies and Project Management
41(16)
Where Do You Start?
42(1)
Determining When an Upgrade Is Necessary---The Evaluation Process
43(5)
Determining User Requirements and Expectations
46(1)
Maintaining Support for Legacy Applications
47(1)
What Resources Are Needed for the Upgrade?
48(1)
Planning an Upgrade
49(2)
Documenting the Plan
49(1)
Evaluating the Plan As It Applies to Corporate Policies and Procedures
50(1)
Setting Goals
50(1)
Scheduling Downtime
51(1)
Milestones and Criteria
51(1)
Back-Out Procedures
51(1)
Testing the Plan
51(2)
Evaluating Competing Products
52(1)
The Pilot Project
52(1)
Deployment
53(1)
Team Personnel
53(1)
Keeping Users Informed
53(1)
Tracking Progress
54(1)
User Training
54(1)
Closing the Book---Documenting What Has Changed and Why
54(1)
Other Considerations for Upgrading
54(3)
Protecting the Network: Preventative Maintenance Techniques
57(14)
Power Conditioning and Uninterruptible Power Supplies (UPSs)
58(4)
Power Is Money
58(2)
Advanced Configuration and Power Interface (ACPI) and Standalone UPS Systems
60(2)
Network Devices
62(1)
Network Monitoring
62(1)
Server and Workstation Backups
62(5)
Backup Media---Tape, Optical Storage, and Hard Disk
63(2)
Backup Rotation Schedules
65(1)
Off-Site Storage
66(1)
Routine Maintenance
67(1)
Building Redundancy into the Network
68(1)
Recovery Planning
68(1)
Justifying Preventative Maintenance
69(2)
II. PHYSICAL NETWORKING COMPONENTS
71(114)
Wiring the Network---Cables, Connectors, Concentrators, and Other Network Components
73(30)
Structured Wiring
74(3)
The Work Area
75(1)
The Backbone Cabling System Structure
75(1)
The Horizontal Cabling System Structure
76(1)
The Telecommunications Closet
77(1)
Important Definitions
77(4)
Physical Cable Types
81(11)
Twisted-Pair Cabling
81(4)
Coaxial Cables
85(3)
Fiber-Optic Cables
88(4)
Terminations and Connections
92(7)
Crimping
92(1)
Insulation Displacement Contact
92(1)
Modular Jacks and Plugs
92(1)
Modular Plug Pair Configurations
93(1)
Common Outlet Configurations
93(2)
Patch Panels
95(1)
Terminating Fiber
95(2)
Fiber-Optic Splicing
97(1)
Fiber-Optic Patch Panels
98(1)
General Considerations for Fiber-Optic Cabling
98(1)
Small Form Factor Connectors (SFF)
99(1)
Telecommunications Rooms
99(4)
Open Office Cabling
99(1)
Consolidation Points
99(1)
General Horizontal Cabling Subsystem Specifications
100(1)
Documenting and the Administration of the Installation
100(1)
Records
100(1)
Drawings
101(1)
Work Orders
101(1)
Reports
101(2)
Network Interface Cards
103(22)
Choosing a Hardware Bus Type
104(6)
ISA
105(1)
PCI
105(2)
PCMCIA
107(1)
CardBus
108(1)
Different Cards, Different Speeds
109(1)
Network Cable Connectors and Terminators
109(1)
The Wired for Management (WfM) Initiative
110(3)
Universal Network Boot
110(1)
Asset Management
110(1)
Power Management
111(1)
Remote Wake-Up
111(2)
Should You Enable WOL?
113(1)
Multi-Homed Systems
113(1)
Load Balancing and Dual-Redundant Network Controllers
114(1)
Software Drivers
114(2)
Packet Drivers
115(1)
The Open Data-Link Interface (ODI)
115(1)
The Network Driver Interface Specification (NDIS)
116(1)
IRQs and I/O Ports
116(3)
IRQs
116(2)
Base I/O Ports
118(1)
Troubleshooting Network Cards
119(6)
Checking the NIC Configuration on Linux
119(2)
Checking the LEDs---Activity and Link Lights
121(2)
Running the Adapter's Diagnostic Program
123(1)
Contiguration Conflicts
123(1)
Checking the Computer's Network Configuration
124(1)
Preventative Steps to Take
124(1)
Network Switches
125(12)
How Switches Work
126(6)
Segmenting the Collision Domain
128(1)
Full-Duplex Ethernet Switches
129(1)
Using Switches to Create a Collapsed Backbone
130(2)
Switch Hardware Types
132(3)
Cut-Through Switches
133(1)
Store-and-Forward Switches
133(1)
Layer 3 Switches
133(1)
Putting a Switch in Your Home Office
134(1)
Stackable and Chassis Switches
135(1)
Switch Troubleshooting and Management
135(2)
Virtual LANs
137(10)
Virtual LANs and Network Topologies
138(1)
Switching Based on Network Frames
139(2)
Implicit and Explicit Tagging
141(3)
Implicit Tagging
141(1)
Explicit Tagging
141(1)
MAC Address VLANs
142(1)
Protocol Rule-Based VLANs
142(1)
Using Explicit Tagging on the Network Backbone
143(1)
IEEE Standards for Virtual LANs
144(2)
What Kind of Switch Should You Buy?
146(1)
Routers
147(16)
What Routers Do
148(2)
Hierarchical Network Organization
149(1)
Providing Security
149(1)
The Difference Between Routable Protocols and Routing Protocols
150(1)
When Do You Need to Use a Router?
151(6)
Growing LAN Sizes
151(4)
Delegating Responsibility for Local Area Networks
155(1)
Connecting Branch Offices
156(1)
Using a Router to Protect Your Network---NAT and Packet Filtering
156(1)
Router Ports and Connections
157(1)
Configuring Routers
158(1)
Router Chassis Types
159(4)
Using Routers over Wide Area Networks (WANs)
161(1)
Routers and the Internet
161(2)
Network Attached Storage (NAS) and Storage Area Networks (SANs)
163(22)
Local Versus Networked Storage Devices
165(2)
Defining Network Attached Storage (NAS)
165(1)
Defining a Storage Area Network (SAN)
166(1)
Network Attached Storage
167(2)
Network Appliances
167(1)
NAS Protocols
168(1)
NAS Capacity Limitations---Bandwidth and Storage
168(1)
Storage Area Networks
169(3)
SAN and NAS---Mix and Match
170(1)
Using Fibre Channel as a Network Transport
170(1)
Encoding Data on Fibre Channel Networks
170(2)
Basic SANs: Arbitrated Loops
172(4)
Initializing the Loop
173(2)
Arbitrating for Loop Access
175(1)
Using a Fabric Switched Topology for SANs
176(2)
A Mixed Topology of Loops and Switches
178(2)
IP SANs and iSCSI
180(2)
What Kind of NAS or SAN Solution Should You Use?
182(3)
III. LOW-LEVEL NETWORK PROTOCOLS
185(40)
The IEEE LAN/MAN Committee Networking Standards
187(8)
What Is the LAN/MAN Committee?
189(4)
IEEE 802: Overview and Architecture
189(2)
IEEE 802.1: Bridging and Management
191(1)
IEEE 802.2: Logical Link Control
191(1)
IEEE 802.3: CSMA/CD Access Method
192(1)
IEEE 802.4: Token-Passing Bus Access Method and IEEE 802.5: Token-Ring Access Method
192(1)
IEEE 802.7: Recommended Practices for Broadband Local Area Networks
193(1)
IEEE 802.10: Security
193(1)
IEEE 802.11: Wireless
193(1)
Obtaining the IEEE 802 Standards Documents Free
193(2)
Ethernet: The Universal Standard
195(30)
A Short History of Ethernet
196(3)
Variations on a Theme: How Many Kinds of Ethernet Are There?
197(2)
Collisions: What Are CSMA/CA and CSMA/CD?
199(4)
The Backoff Algorithm
202(1)
Defining the Collision Domain---Buses, Hubs, and Switches
202(1)
Restrictions on Legacy Ethernet Topologies
203(1)
Limiting Factors of Ethernet Technologies
203(1)
Interconnecting Devices and Cable Segment Length
203(1)
The 5-4-3 Rule
204(1)
Using a Bus Topology
204(1)
Using a Star Topology
205(1)
Hybrid LAN Topologies
206(2)
Tree
206(1)
Hierarchical Star
207(1)
Using a Backbone to Connect the Enterprise
208(1)
Ethernet Frames
208(5)
XEROX PARC Ethernet and Ethernet II
209(1)
The 802.3 Standard
210(1)
The 802.2 Logical Link Control (LLC) Standard
211(2)
Fast Ethernet (IEEE 802.3u) and Gigabit Ethernet (IEEE 802.3z)
213(4)
Fast Ethernet
213(2)
Gigabit Ethernet
215(1)
10Gigabit Ethernet (IEEE 802.3ae)
216(1)
Ethernet Problems
217(3)
Collision Rates
217(1)
Collision Types
218(1)
Sampling Intervals
219(1)
Reducing Collisions
219(1)
Ethernet Errors
220(3)
Simple Error Detection
220(1)
Bad FCS and Misaligned Frames
220(1)
Short Frames (Runts)
221(1)
Giant Frames and labber
222(1)
Multiple Errors
222(1)
Broadcast Storms
222(1)
Monitoring Errors
223(2)
IV. DEDICATED CONNECTIONS AND WAN PROTOCOLS
225(52)
Dial-Up Connections
227(12)
The Point-to-Point Protocol and the Serial Line Internet Protocol
229(1)
The Serial Line Internet Protocol (SLIP)
230(1)
The Point-to-Point Protocol (PPP)
231(5)
Establishing a Link: The Link Control Protocol (LCP)
234(2)
Network Control Protocols (NCPs)
236(1)
Configuring a Windows XP Professional Client for Dial-Up
236(2)
When Dial-Up Isn't Fast Enough
238(1)
Dedicated Connections
239(18)
Leased Lines
240(4)
The T-Carrier System
242(1)
Fractional T1
243(1)
Diagnosing Problems with T-Carrier Services
243(1)
Asynchronous Transfer Mode (ATM)
244(7)
ATM Frames
245(1)
ATM Connections
246(1)
The ATM Architecture Model (B-ISDN/ATM Model)
247(2)
LAN Emulation (LANE)
249(1)
ATM Service Categories
250(1)
The Importance of Frame Relay and the X.25 Interface
251(6)
The Frame Relay Header
252(1)
Network Congestion Signaling
253(1)
The Local Management Interface Signal Mechanism
254(1)
Using Switched Virtual Circuits (SVCs)
254(1)
Possible Problems Using Frame Relay
255(2)
Digital Subscriber Lines (DSL) Technology
257(12)
DSL and Cable Modems
258(9)
Topological Differences Between Cable and DSL
259(2)
A Quick Primer on the PSTN
261(1)
xDSL
262(5)
The Future of DSL
267(2)
Using a Cable Modem
269(8)
How Cable Modems Work
270(3)
Providing IP Addresses to Cable Modems
271(2)
First Generation Cable Modem Systems
273(1)
How Cable Modems Differ from xDSL Broadband Access
273(1)
The Data Over Cable Service Interface Specification (DOCSIS)
274(1)
Choosing Between Cable and DSL
275(2)
V. WIRELESS NETWORKING PROTOCOLS
277(80)
Introduction to Wireless Networking
279(12)
Why Wireless Networks Have Proliferated
281(2)
Access Points and Ad Hoc Networks
283(3)
Ad Hoc Networks
283(1)
Using an Access Point to Mediate Wireless Communications
284(2)
Physical Transmission Technologies
286(2)
Frequency Hopping Versus Spread Spectrum
286(2)
The IEEE 802.11 Wireless Standard
288(2)
The Physical Layer
288(1)
The MAC Layer
288(1)
Other Services Performed at the MAC Layer
289(1)
Sources of Interference for Wireless Networks
290(1)
IEEE 802.11b: Wi-Fi Pioneer
291(10)
Components of an 802.11-Based Wireless Network
292(1)
802.11b---First, But Fading Away
292(2)
802.11b/g Channels
292(1)
Proprietary Extensions to 802.11b
293(1)
What to Look for in an Access Point
294(3)
Distance Limitations
296(1)
Firewalls
296(1)
Access Points with VPN Support
297(1)
Do You Need a Wireless Network?
297(1)
Connecting the Wireless Network to a Wired LAN
298(1)
Dual-Mode Access Points
298(1)
Why Wi-Fi?
299(2)
Faster Service: IEEE 802.11a
301(8)
Overview of the IEEE 802.11a Standard
302(4)
Interference from Consumer Devices
302(1)
Increased Bandwidth in the 5GHz Band
303(1)
802.11a Signal Modulation
304(1)
802.11a Channels
304(1)
Proprietary Extensions to 802.11a
305(1)
Using Wireless Networking in Public Places
305(1)
Security Concerns
306(1)
Comparing 802.11a with 802.11b and 802.11g
306(3)
The IEEE 802.11g Standard
309(22)
Overview of the 802.11g Standard
310(2)
Installing a Wireless-G Broadband Router
312(9)
Installing and Configuring a Wireless Network Adapter
321(6)
Using the Setup CD
321(3)
Using the Windows XP Service Pack 2 Wireless Network Setup Wizard
324(3)
Proprietary Extensions to the IEEE 802.11g Standard
327(1)
Improving Network Performance with Dual-Band Wireless Technology
328(1)
Which Wireless Protocol Should You Use?
329(2)
Bluetooth Wireless Technology
331(16)
The Bluetooth Special Interest Group (SIG)
333(1)
General Overview of Bluetooth
333(2)
Piconets and Scatternets
335(3)
Piconets
336(1)
Scatternets
336(2)
Bluetooth Device Modes
338(1)
SCO and ACL Links
339(1)
SCO Links
339(1)
ACL Links
339(1)
Bluetooth Packets
339(1)
What Are Bluetooth Profiles?
340(5)
The Generic Access Profile
341(1)
The Service Discovery Application Profile
342(1)
The Cordless Telephony Profile and the Intercom Profile
342(1)
The Serial Port Profile
343(1)
The Headset Profile
343(1)
The Dial-Up Networking Profile
343(1)
Other Bluetooth Profiles
344(1)
Bluetooth Is More Than a Wireless Communication Protocol
345(2)
Security and Other Wireless Technologies
347(10)
Instant Messaging and Consumer Devices
348(1)
Comparing Mobile Information Devices
348(1)
BlackBerry PDAs
349(1)
Wireless Security
349(7)
WEP
350(2)
Wired Protected Access (WPA), WPA2, and 802.11i
352(3)
How Well Do You Know Your Users?
355(1)
Personal Area Networks (PANs)
356(1)
VI. LAN AND WAN NETWORK, SERVICE, AND APPLICATION PROTOCOLS
357(304)
Overview of the TCP/IP Protocol Suite
359(44)
TCP/IP and the OSI Reference Model
360(4)
TCP/IP Is a Collection of Protocols, Services, and Applications
362(1)
TCP/IP, IP, and UDP
362(1)
Other Miscellaneous Protocols
363(1)
The Internet Protocol (IP)
364(16)
IP Is a Connectionless Transport Protocol
365(1)
IP Is an Unacknowledged Protocol
365(1)
IP Is an Unreliable Protocol
365(1)
IP Provides the Address Space for the Network
365(1)
Just What Does IP Do?
366(1)
Examining IP Datagram Header Information
366(3)
IP Addressing
369(11)
The Address Resolution Protocol---Resolving IP Addresses to Hardware Addresses
380(6)
Proxy ARP
385(1)
RARP---The Reverse Address Resolution Protocol
385(1)
The Transmission Control Protocol (TCP)
386(9)
TCP Provides a Reliable Connection-Oriented Session
386(1)
Examining TCP Header Information
386(2)
TCP Sessions
388(7)
TCP Session Security Issues
395(1)
The User Datagram Protocol (UDP)
395(2)
Examining UDP Header Information
395(1)
Interaction Between UDP and ICMP
396(1)
Ports, Services, and Applications
397(1)
Well-Known Ports
397(1)
Registered Ports
398(1)
The Internet Control Message Protocol (ICMP)
398(5)
ICMP Message Types
399(4)
Basic TCP/IP Services and Applications
403(32)
The File Transfer Protocol (FTP)
404(15)
FTP Ports and Processes
405(1)
Data Transfers
406(1)
FTP Protocol Commands
407(2)
Server Replies to FTP Commands
409(2)
Using a Windows FTP Command-Line Client
411(3)
Using Red Hat Linux FTP
414(1)
Using the Red Hat Linux Command-Line FTP Client
415(2)
The Trivial File Transfer Protocol (TFTP)
417(2)
The Telnet Protocol
419(5)
What Is a Network Virtual Terminal and NVT ASCII?
419(1)
Telnet Protocol Commands and Option Negotiations
420(3)
Telnet and Authentication
423(1)
Using Telnet and FTP with a Firewall
424(1)
The R-Utilities
425(6)
How the Traditional R-Utilities Authorize Access to Your Network's Resources
425(1)
The rlogin Utility
426(2)
Using rsh
428(1)
Using rcp
429(1)
Using rwho
430(1)
Using ruptime
430(1)
The Finger Utility
431(2)
Other Services and Applications Built on the TCP/IP Suite
433(2)
Secure Network Services
433(2)
Internet Mail Protocols: POP3, SMTP, and IMAP
435(16)
How SMTP Works
436(6)
The SMTP Model
438(1)
SMTP Service Extensions
439(1)
SMTP Commands and Response Codes
439(2)
SMTP Response Codes
441(1)
Putting It All Together
442(1)
The Post Office Protocol (POP3)
443(2)
The Authorization State
444(1)
The Transaction State
444(1)
The Update State
445(1)
The Internet Message Access Protocol Version 4 (IMAP4)
445(6)
Transport Protocols
446(1)
Client Commands
446(1)
System Flags
446(1)
Retrieving the Message Header and Body of the Message
447(1)
Data Formatting
447(1)
The User's Inbox and Other Mailbox Naming
447(1)
Universal Commands
447(1)
Other IMAP Commands
448(1)
Non Authenticated Commands
448(1)
Authenticated Commands
448(3)
Troubleshooting Tools for TCP/IP Networks
451(30)
Checking the Host System's Configuration First
452(5)
Using hostname and Related Commands
452(1)
Using ipconfig and ifconfig to Check Host Configurations
453(4)
Using ping and tracert to Check Connectivity
457(19)
The ping Command
458(4)
The traceroute Command
462(4)
The netstat and route Commands
466(6)
The arp Command
472(1)
The tcpdump Utility
473(2)
The WinDump Utility
475(1)
Using the nslookup Command to Troubleshoot Name Resolution Issues
476(1)
Other Useful Commands
477(1)
Using Network Connection Repair in Windows XP
478(3)
BOOTP and Dynamic Host Configuration Protocol (DHCP)
481(42)
What Is BOOTP?
482(7)
Format of the BOOTP Packet
483(1)
The BOOTP Request/Reply Mechanism
484(1)
BOOTP Vendor-Specific Information Options
485(3)
Downloading an Operating System
488(1)
Taking BOOTP One Step Further: DHCP
489(8)
The DHCP Packet Format and Additional Options
491(2)
The DHCP Client/Server Exchange
493(4)
Installing and Configuring a DHCP Server on Windows 2000/2003
497(26)
Installing the DHCP Server Service on Windows 2000 or Server 2003
497(1)
Authorizing the Server
497(2)
Using the MMC Action Menu
499(5)
Configuring the DHCP Server and Scope Options
504(3)
Providing Support for BOOTP Clients
507(1)
Enabling the DHCP Relay Agent
508(2)
What Is a DHCP Cluster?
510(1)
Considerations for Using DHCP in Large or Routed Environments
510(1)
How DHCP Interacts with Microsoft's Dynamic Domain Name Service (DNS)
511(2)
Reservations and Exclusions
513(1)
What Is APIPA?
514(1)
Troubleshooting Microsoft DHCP
515(1)
Managing Logging
516(1)
Using DHCP with Red Hat Linux
517(1)
The DHCP Server Daemon
517(1)
The DHCP Relay Agent
518(1)
Configuring a Router or WAP to Provide DHCP Services
519(2)
Using MAC Address Filtering to Stop Unauthorized Users
521(2)
Network Name Resolution
523(32)
Hardware Versus Protocol Addresses
525(1)
NetBIOS
525(9)
The LMHOSTS File
525(3)
Windows Internet Name Service
528(6)
Installing and Configuring WINS on Windows 2000/2003 Servers
534(7)
Managing the Windows 2000 WINS Server
535(4)
Managing the Windows Server 2003 WIN Service
539(1)
Using netsh Commands to Manage WINS
540(1)
TCP/IP Names
541(11)
The HOSTS File
543(1)
Domain Name System
543(7)
Configuring DNS Clients
550(1)
Using nslookup
550(1)
Dynamic DNS
551(1)
Installing DNS on a Windows Server
552(1)
Network Information Service
553(2)
Using the Active Directory Service
555(38)
Early Directory Technologies
556(6)
The Difference Between the Directory and the Directory Service
557(1)
Interesting Objects
557(1)
What Active Directory Delivers
558(1)
Evolution of Directory Services from X.500 to LDAP
559(2)
The Active Directory Schema
561(1)
Objects and Attributes
562(2)
Standard Objects in the Active Directory
563(1)
What Is a Domain Tree? What Is a Forest?
564(3)
Domain Models---May They Rest in Peace
565(1)
Partitioning the Active Directory into Domains
565(1)
A Domain Is Still a Domain
566(1)
Active Directory Trees and Forests
566(1)
The Active Directory and Dynamic DNS
567(4)
Dynamic DNS
568(1)
How the Active Directory Uses DNS
568(1)
Using Sites to Manage Large Enterprises
569(1)
Directory Replication
570(1)
Summarizing the Directory Data Using the Global Catalog
571(1)
Active Directory Service Interfaces (ADSI)
571(2)
Directory-Aware Application Programming
572(1)
Now It's Just Domain Controllers and Member Servers
572(1)
The Active Directory Schema
573(8)
Modifying the Active Directory Schema
573(8)
Finding Objects in the Active Directory
581(4)
Finding a User Account
581(3)
Finding a Printer in the Active Directory
584(1)
Using Start/Search
585(1)
The Active Directory Service and Windows Server 2003
585(1)
New Active Directory Features in Windows Server 2003
585(8)
Installing Active Directory on a Windows Server 2003 Computer
586(7)
File Server Protocols
593(34)
Why File Server Protocols are Important
594(1)
Server Message Block (SMB) and the Common Internet File System (CIFS)
595(13)
SMB Message Types
596(1)
SMB Security Provisions
597(1)
Protocol Negotiation and Session Setup
598(1)
Accessing Files
599(2)
Using NET Commands
601(3)
Monitoring and Troubleshooting SMB Communications
604(3)
Using the SMB/CIFS Protocol on Non-Microsoft Clients: Samba
607(1)
The Common Internet File System (CIFS)
607(1)
NetWare Core Protocol (NCP)
608(2)
General Requests and Responses
609(1)
Burst Mode
609(1)
Request Being Processed Response
609(1)
Terminating Connections
610(1)
Unix Network File System (NFS)
610(13)
Protocol Components: Remote Procedure Call (RPC) Protocol
610(2)
External Data Representation (XDR)
612(1)
The NFS Protocol and Mount Protocol
612(1)
Configuring NFS Servers and Clients
613(1)
NFS Client Daemons
614(2)
Server-Side Daemons
616(5)
Troubleshooting NFS Problems
621(2)
Microsoft Distributed File System (DFS)
623(4)
Creating a DFS Root
623(1)
Adding Links to the DFS Root
624(3)
The Hypertext Transfer Protocol
627(8)
The Beginning of HTTP
628(1)
Defining HTTP
629(1)
HTTP Mechanics
630(1)
HTTP Header Fields
630(1)
URLs, URIs, and URNs
630(5)
Routing Protocols
635(12)
Basic Types of Routing Protocols
636(7)
The Routing Information Protocol (RIP)
636(6)
OSPF (Open Shortest Path First)
642(1)
Multi-Protocol Label Switching (MPLS)
643(4)
Combining Routing and Switching
644(1)
Adding a Label
644(1)
Using Frame Relay and ATM with MPLS
645(2)
The Secure Sockets Layer (SSL) Protocol
647(6)
Symmetric and Asymmetric Encryption
648(4)
Digital Certificates
649(1)
The SSI Handshake Procedure
649(1)
Using Information in the Digital Certificate to Prevent Interception Attacks
650(1)
http:// and https://
651(1)
Adding Another Layer to the Network Protocol Stack
651(1)
Does SSL Provide Enough Security for Internet Transactions?
652(1)
OpenSource SSL
652(1)
Introduction to the IPv6 Protocol
653(8)
What's the Difference Between IPv4 and IPv6?
654(1)
The IPv6 Headers
655(4)
IPv6 Extension Headers
656(2)
The Options Type Field for Hop-by-Hop and Destination Options
658(1)
Other IPv6 Considerations
659(1)
The Future of IPv6
659(2)
VII. NETWORK USER AND RESOURCE MANAGEMENT
661(146)
Windows NT Domains
663(22)
Workgroups and Domains
665(7)
Interdomain Trust Relationships
666(3)
Domain Controllers
669(1)
Windows NT Domain Models
669(3)
Windows NT User Groups
672(3)
Built-In User Groups
673(1)
Creating User Groups
674(1)
Special User Groups
675(1)
Managing User Accounts
675(6)
Adding a User to a Group
676(1)
User Profiles
676(1)
Limiting the Time a User Can Log On
677(1)
Limiting Which Workstations a User Can Log On To
678(1)
Account Information
678(1)
Allowing Dial-Up Access
679(1)
Replication Between Domain Controllers
680(1)
Passwords and Policies
681(2)
Detecting Failed Logon Attempts
682(1)
Strategies to Minimize Logon Problems
683(2)
Windows 2000 and Windows Server 2003 User and Computer Management Utilities
685(18)
The Microsoft Management Console
686(1)
User Management
686(7)
Creating a New User Domain in the Active Directory
686(3)
Managing Other User Account Information
689(3)
Using the Action Menu
692(1)
Computer Management
693(3)
Adding a Computer to the Domain
693(1)
Managing Other Computer Account Information
694(2)
Windows 2000 User Groups
696(7)
Choosing a Group Based on the Group's Scope
696(2)
Built-In Groups
698(2)
Creating a New User Group
700(2)
Other Things You Can Do with the Active Directory Computers and Users Snap-In
702(1)
Managing Unix and Linux Users
703(18)
User Administration
704(9)
The /etc/passwd File
704(2)
Using a Shadow Password File
706(1)
The /etc/groups File
706(1)
Adding or Removing User Accounts
707(2)
Using a Linux GUI Utility to Manage Users
709(4)
Network Information Service (NIS)
713(6)
Master and Slave NIS Servers
714(1)
NIS Maps
714(1)
The NIS Server ypserve Daemon and Maps Location
715(1)
Setting the NIS Domain Name Using the Command domainname
715(1)
Starting NIS: ypinit, ypserve, and ypxfrd
716(1)
NIS Slaves
717(1)
Changing NIS Maps
718(1)
Pushing Modifications to NIS Slave Servers
718(1)
Other Useful NIS YP Commands
718(1)
NIS Clients
718(1)
Common Login Problems
719(2)
Rights and Permissions
721(28)
User-Level and Share-Level Security
722(3)
Microsoft Windows Share-Level Security
724(1)
Assigning User Rights for Windows 2000, Server 2003, and XP
725(8)
Managing User Password Policies
730(3)
NTFS Standard and Special Permissions
733(3)
Windows Permissions Are Cumulative
736(1)
User Groups Make Managing User Rights Easier
736(1)
User Groups in Windows 2000 and Server 2003
737(1)
Active Directory Groups
738(2)
NetWare
740(4)
Trustees
740(1)
File-System Rights
740(1)
Object and Property Rights
741(1)
Differences Between NDS and File-System and Directory Rights
742(1)
Inheritance of Rights
743(1)
The Everyone Group and the (Public) Group
744(1)
Unix and Linux
744(5)
Viewing File Permissions
745(1)
SUID and SGID File Permissions
746(2)
Using the su Command
748(1)
Network Printing Protocols
749(8)
Printing Protocols and Printing Languages
750(2)
Using lpr/lpd and the TCP Stream Protocols
751(1)
Data Link Control Protocol (DLC)
752(1)
Internet Printing Protocol (IPP)
752(5)
IPP Object Types
753(1)
IPP Operations
754(1)
What's New in Version 1.1?
755(1)
Where Can You Find IPP?
755(2)
Print Servers
757(50)
Unix/Linux Printing
758(15)
The BSD Spooling System: lpr and lpd
758(10)
The SVR4 Printing System
768(5)
Configuring Windows Print Servers
773(2)
Printers and Printing Devices
773(2)
Installing and Configuring Printers on Windows Servers
775(24)
Windows NT 4.0
775(6)
Windows 2000 Server
781(14)
Windows XP
795(4)
Printing Under NetWare
799(4)
Print Queue Object Properties
800(1)
Printer Object Properties
801(1)
Print Server Object Properties
802(1)
Pserver.NLM and Nprinter.NLM
802(1)
The NetWare 6.x iPrint Utility
803(1)
Hardware-Based Print Servers---Print Server Appliances
803(4)
VIII. SYSTEM AND NETWORK SECURITY
807(108)
Basic Security Measures Every Network Administrator Needs to Know
809(18)
Policies and Procedures
810(6)
Network Connection Policy
810(1)
Acceptable Use Statement and Usage Guidelines
811(3)
Escalation Procedures
814(1)
What a Security Policy Should Include
815(1)
Physical Security Measures
816(1)
Locking the Door
816(1)
Uninterruptible Power Supply (UPS)
816(1)
Disposing of Hardware and Media in a Secure Manner
817(1)
The Two Sides of Security
817(5)
Before the Fact: Controlling Access
817(2)
After the Fact: Auditing Use
819(1)
Passwords
820(2)
System Daemons and Services
822(1)
Removing Dead Wood
823(1)
Delegating Authority
823(2)
User Accounts
824(1)
Application Servers, Print Servers, and Web Servers
824(1)
Don't Forget About Firewalls
825(2)
Auditing and Other Monitoring Measures
827(24)
Unix and Linux Systems
829(3)
Using syslog
829(3)
System Log Files
832(1)
Configuring Windows NT 4.0 Auditing Policies
832(4)
Setting Up Events to Audit
833(2)
Using the Windows NT 4.0 Event Viewer
835(1)
Configuring Windows 2000 and Windows Server 2003 Auditing Policies
836(9)
Enabling Auditing for Files and Folders
838(3)
Enabling Auditing for Printers
841(1)
Logging Shutdown and Startup Events with Windows 2003 Server
841(2)
Using the Event Viewer
843(2)
Auditing Windows XP Professional Computers
845(1)
Novell Security
846(2)
Syscon and Auditcon
846(2)
NetWare Auditing Solutions
848(3)
Security Issues for Wide Area Networks
851(20)
You've Been Targeted!
853(1)
Computer Viruses, Trojan Horses, and Other Destructive Programs
854(3)
Trojan Horse Programs
855(1)
Computer Viruses
855(1)
How Infections Occur
856(1)
Your Network Under Fire---Common Attacks
857(7)
Denial-of-Service Attacks
858(1)
Distributed Denial-of-Service Attacks
858(2)
SYN Flooding
860(1)
ICMP Redirects
860(1)
The Ping of Death
861(1)
Forged Email
862(1)
Password Protection and SecurID and Smart Cards
862(1)
Network Back Doors
863(1)
Network Probes
864(1)
Spoofing and Impersonation
864(1)
If It's Too Good to Be True, It Isn't
865(1)
Preventative Measures
865(4)
Protecting Routers
865(1)
The Network As Target
866(1)
Protecting Host Computers---Encryption and Virus-Protection Software
866(1)
Using Tripwire
867(1)
User Awareness and Training
868(1)
Staying on Top of Security Issues
869(2)
Firewalls
871(22)
What Is a Firewall?
872(1)
Packet Filters
873(4)
Filtering on IP Addresses
874(1)
Filtering Based on Protocols
874(1)
Filtering Based on Port Numbers
875(2)
Intrusion Detection (Stateful Inspection)
877(2)
Filtering Based on Applications
877(1)
Windows Firewall Versus Third-Party Firewall Programs
877(2)
Proxey Servers
879(7)
Standard Proxy Applications
882(2)
Impersonating the End User: Network Address Translation (NAT)
884(1)
Advantages and Disadvantages of a Proxy Server
885(1)
Hybrids
886(3)
What to Expect from a Firewall
887(2)
Inexpensive Firewalls for SOHO Environments
889(2)
Hardware Solutions
889(1)
Software Solutions
890(1)
Using Both Hardware and Software Firewalls
891(1)
How Do You Know That the Firewall Is Secure?
891(2)
Virtual Private Networks (VPNs) and Tunneling
893(14)
What Is a VPN?
894(1)
The Mobile Workforce
894(1)
Protocols, Protocols, and More Protocols!
895(1)
IPSec Protocols
895(4)
Internet Key Exchange (IKE)
896(1)
The Authentication Header (AH)
897(1)
Encapsulation Security Payload (ESP)
898(1)
The Point-to-Point Tunneling Protocol (PPTP)
899(1)
Layer Two Tunneling Protocol (L2TP)
900(1)
L2TP Encapsulation
900(1)
Creating a VPN Connection with Windows XP Professional
901(3)
Setting Up and Using a VPN Connection in Windows XP
901(3)
Troubleshooting a VPN Connection
904(1)
Selecting a Router with VPN Support
904(3)
Encryption Technology
907(8)
Computers and Privacy
908(1)
What Is Encryption?
908(4)
Single-Key Encryption---Symmetric Encryption
909(1)
Public-Key Encryption
910(1)
RSA Public Key Cryptography
911(1)
Digital Certificates
912(1)
Pretty Good Privacy (PGP)
913(2)
IX. TROUBLESHOOTING NETWORKS
915(46)
Strategies for Troubleshooting Network Problems
917(10)
A Documented Network Is Easier to Troubleshoot
918(4)
Documentation and Maintenance---Keeping Things Up-to-Date
921(1)
Problem-Solving Techniques
922(4)
The Problem Resolution Cycle
923(3)
Auditing the Network to Locate Problem Sources
926(1)
Pitfalls of Troubleshooting
926(1)
Network Testing and Analysis Tools
927(20)
Basics: Testing Cables
928(4)
Handheld Cable Checkers
929(1)
Cable Testers
929(1)
Bit Error Rate Testers (BERT)
929(1)
Time Domain Reflectometers
930(1)
Impedance
931(1)
Setting a Pulse Width
931(1)
Velocity
931(1)
Network and Protocol Analyzers
932(8)
Establishing a Baseline
933(1)
Statistical Data
934(1)
Protocol Decoding
934(1)
Filtering
934(1)
Software-Based Analyzers
934(4)
Other Software LAN Analyzer Products
938(1)
Hardware Analyzers
939(1)
Simple Network Management Protocol (SNMP)
940(7)
SNMP Primitives
941(1)
Network Objects: The Management Information Base (MIB)
941(2)
Proxy Agents
943(1)
The Complex Road to SNMPv2 and SNMPv3
943(1)
RMON
944(3)
Troubleshooting Small Office and Home Office (SOHO) Networks
947(14)
Power Problems
949(2)
Computer Configuration Issues
951(5)
Component Problems---You Can't Get There from Here
956(1)
Secure Those Cables!
956(1)
Firewall Problems
957(1)
Keeping Your Network Healthy
958(1)
Wireless Networking Problems
959(1)
When All Else Fails
960(1)
X. UPGRADING NETWORK HARDWARE
961(30)
Upgrading Older Ethernet Networks
963(10)
Upgrading from 10Base-2 or 10Base-T
964(1)
Hardware and Software Factors to Consider for 10Base-2, 10Base-T, and 100Base-T
965(5)
Network Cables
966(2)
Network Interface Card (NIC)
968(1)
Network Cable Connectors
968(1)
Bridges, Hubs, Repeaters, and Switches
969(1)
Connecting Networks That Use Different Cables or Topologies
970(1)
Other Possibilities
970(1)
Upgrading the Network Backbone to Gigabit Ethernet
971(1)
Using Gigabit Ethernet for High-End Servers
971(1)
Gigabit Ethernet to the Desktop?
972(1)
Gigabit Ethernet Can Cover the Distance
972(1)
10 Gigabit Ethernet Is Becoming Economically Feasible
972(1)
Upgrading from Bridges and Hubs to Routers and Switches
973(12)
Growing Beyond a Small LAN
974(3)
Segmenting the Network Can Improve Performance
976(1)
Connecting Remote Locations
977(1)
From Bridges to Routers
977(4)
Network Protocol Issues
978(1)
Network Addressing Issues
978(1)
Other Router Management Issues
979(1)
Using a Router to Segment the Network
979(1)
Connecting to a Larger WAN or the Internet
980(1)
From Bridges to Switches
981(4)
Adding Wireless Networking to a LAN
985(6)
Why Go Wireless?
986(2)
Choosing Locations for Access Points
988(2)
Security Issues
990(1)
XI. MIGRATION AND INTEGRATION
991(88)
Migrating from NetWare to Windows 2000 or Windows 2003
993(24)
Windows Protocols and Services
994(6)
Client Services for NetWare (CSNW)
995(1)
Gateway Services for NetWare (GSNW)
996(4)
Microsoft's Services for NetWare Version 5.0 (SFN)
1000(17)
Comparison of Windows Server and NetWare File Permission Rights
1001(2)
Installing File and Print Services for NetWare Version 5.0 (FPNW 5.0)
1003(3)
Microsoft Directory Synchronization Services (MSDSS)
1006(5)
File Migration Utility (FMU)
1011(6)
Migration and Integration Issues: Windows NT, Windows 2000, Windows 2003, Unix, and Linux
1017(28)
Windows Server Support for Unix Protocols and Utilities
1018(10)
TCP/IP
1019(1)
Telnet
1020(5)
The File Transfer Protocol
1025(3)
Managing the FTP Service on Windows Server 2003
1028(4)
The Dynamic Host Configuration Protocol and BOOTP
1030(1)
DNS
1031(1)
Applications
1032(1)
Microsoft Windows Services for Unix 3.5
1033(10)
Installing SFU 3.0
1034(3)
Network File System
1037(1)
The Korn Shell
1038(2)
Password Synchronization
1040(1)
User Name Mapping
1041(1)
New Telnet Server and Client
1042(1)
ActiveState ActivePerl 5.6
1043(1)
Samba
1043(1)
Sun Network Information System
1043(2)
Migrating from Windows NT 4.0 to Windows 2000, Windows 2003, and Windows XP
1045(26)
Do You Need to Upgrade the Operating System or Applications?
1046(3)
Upgrading to Windows 2000 Server
1049(6)
Before You Begin
1050(1)
Windows NT Domain Controllers and Member Servers
1051(1)
Modeling the Directory Structure After Your Business Organization
1052(1)
Domains Are Partitions of the Active Directory
1053(1)
Migration Considerations: Centralized Versus Decentralized Management
1054(1)
Implementing a Migration to the Active Directory for Windows 2000
1055(6)
Start by Upgrading Primary Domain Controller
1056(1)
Adding Other Domains to the Active Directory
1057(1)
Upgrade the Master Domain First
1057(4)
Upgrade the BDCs Next
1061(1)
Upgrading Windows NT 4.0 or Windows 2000 to Windows Server 2003
1061(10)
Hardware Requirements for a Windows Server 2003 Upgrade
1062(1)
The Application Compatibility Toolkit Application
1063(1)
What Role Will Your Server Perform?
1064(1)
An Example of Upgrading Windows 2000 Server to Windows Server 2003 Standard Edition
1065(3)
Should You Continue to Use Windows 2000 Professional or Move to Windows XP Professional?
1068(1)
Upgrading for SOHO Clients
1068(3)
Migration and Integration: NetWare, Unix, and Linux
1071(8)
Why Use Unix or Linux?
1072(1)
Key Differences Between Unix/Linux and NetWare
1073(1)
File Sharing
1073(1)
Printer Sharing
1073(1)
User Authentication
1073(1)
Moving User Accounts
1074(1)
Networking Protocols
1074(1)
Applications
1074(3)
Finding Linux Drivers for Hardware
1077(1)
Novell Open Enterprise Server
1077(2)
XII. APPENDIXES
1079(2)
A. Overview of the OSI Seven-Layer Networking Reference Model
1081(6)
It's Only a Model!
1082(5)
Encapsulation
1083(1)
Physical Layer
1083(1)
Data Link Layer
1083(1)
Network Layer
1084(1)
Transport Layer
1084(1)
Session Layer
1084(1)
Presentation Layer
1084(1)
Application Layer
1085(2)
B. Networking Glossary
1087(20)
C. Internet Resources for Network Administrators
1107(10)
Standards Organizations
1108(1)
Network Hardware and Software Manufacturers
1109(3)
Wireless Networking
1112(1)
Security
1112(5)
D. The Lightweight Directory Access Protocol
1117(10)
A Quick Introduction to LDAP
1118(1)
The X.500 Protocols and Standards
1118(3)
Acronyms, Acronyms, Acronyms!
1119(2)
The Schema
1121(1)
The Lightweight Directory Access Protocol
1121(3)
The LDAP Protocol
1122(1)
Binding to the Server
1122(1)
Searching the Database
1123(1)
Adding, Modifying, or Deleting Information in the Directory
1123(1)
Comparing Information in the Directory
1123(1)
LDAP Directories
1124(3)
Windows 2000 Server, Windows Server 2003, and NetWare Are Not the Only Choices You Have
1124(1)
Sticking to Standards: Interoperability Between Directories
1124(3)
E. Introduction to Setting Up a SOHO Network
1127(9)
Assessing Your Requirements: What Do You Need?
1128(6)
Applications Drive Hardware Purchases
1130(4)
SOHO Network Topologies
1134(2)
Backup Solutions for a SOHO Network
1136
Index

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program