Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Network Fundamentals
Figure 1.1:
A small LAN
Figure 1.2:
A sample network including servers and workstations
Figure 1.3:
A peer-to-peer network
Figure 1.4:
A client/server network
Figure 1.5:
An example of a physical bus topology
Figure 1.6:
A typical star topology with a hub
Figure 1.7:
A typical ring topology
Figure 1.8:
A typical mesh topology
Figure 1.9:
An example of an ad hoc RF network
Figure 1.10:
An example of an RF multipoint network
Figure 1.11:
Backbone and segments on a sample network
Figure 1.12:
Thicknet and vampire taps
Figure 1.13:
An N-series connector
Figure 1.14:
A stripped-back Thinnet
Figure 1.15:
A male and female BNC connector
Figure 1.16:
RJ-11 and RJ-45 connectors
Figure 1.17:
An example of an ST connector
Figure 1.18:
A sample SC connector
Chapter 2: The OSI Model
Figure 2.1:
The Open Systems Interconnect (OSI) model
Figure 2.2:
How data travels through the layers of the OSI model
Figure 2.3:
A sample physical bus topology
Figure 2.4:
A physical star topology
Figure 2.5:
A physical ring topology
Figure 2.6:
A physical mesh topology
Figure 2.7:
A sample network interface card
Figure 2.8:
A repeater installed on a network
Figure 2.9:
The 5-4-3 Rule for network repeaters
Figure 2.10:
A standard hub
Figure 2.11:
MAUs in a Token Ring network
Figure 2.12:
Sublayers of the Data Link layer
Figure 2.13:
The IEEE standards’ relationship to the OSI model
Figure 2.14:
A sample network before and after bridging
Figure 2.15:
A switch builds a table of all MAC addresses of all connected stations
Figure 2.16:
Address conflicts on a network
Figure 2.17:
Routing components
Figure 2.18:
Initiating communications using a connection-oriented service
Chapter 3: TCP/IP Fundamentals
Figure 3.1:
A comparison of the seven-layer OSI model, the four-layer DoD model, and how TCP/IP maps to each model
Figure 3.2:
A datagram with its TCP header
Figure 3.3:
A datagram with TCP and IP headers
Figure 3.4:
The components in a TCP/IP block diagram
Figure 3.5:
The IP address structure
Figure 3.6:
How a proxy server works
Figure 3.7:
The IP Address tab of the TCP/IP Properties dialog box
Figure 3.8:
The Bindings tab of the TCP/IP Properties dialog box
Figure 3.9:
The Gateway tab of the TCP/IP Properties dialog box
Figure 3.10:
The WINS Configuration tab of the TCP/IP Properties dialog box
Figure 3.11:
The DNS Configuration tab of the TCP/IP Properties dialog box
Chapter 4: TCP/IP Utilities
Figure 4.1:
Output of the
netstat
command without any switches
Figure 4.2:
Sample output of the
netstat -a
command
Figure 4.3:
Sample output of the
netstat -e
command
Figure 4.4:
Sample output of the
netstat -r
command
Figure 4.5:
Sample output of the
nbtstat -a
command
Figure 4.6:
Sample output of the
nbtstat -c
command
Figure 4.7:
Sample output of the
nbtstat -n
command
Figure 4.8:
Sample output of the
nbtstat -r
command
Figure 4.9:
Sample output of the
nbtstat -S
command
Figure 4.10:
Sample output of the
nbtstat -s
command
Figure 4.11:
Sample output produced by using the /all switch
Figure 4.12:
Sample tracert output
Figure 4.13:
The Windows 95/98 and NT Telnet utility
Figure 4.14:
Using Telnet to find out if your SMTP mail system is responding
Chapter 5: Major Network Operating Systems
Figure 5.1:
The NetWare command-line console
Figure 5.2:
The Monitor menu-based utility
Figure 5.3:
The NetWare architecture
Figure 5.4:
A sample NDS Tree
Figure 5.5:
A NetWare Administrator screen
Figure 5.6:
Sample network and a sample NDS tree
Figure 5.7:
Gateway Services for NetWare (GSNW) operation
Figure 5.8:
Windows NT architecture
Figure 5.9:
An NTDS network
Figure 5.10:
User Manager for Domains
Figure 5.11:
The basic Macintosh GUI
Figure 5.12:
Mac OS X
Chapter 6: Network Installation and Upgrades
Figure 6.1:
Comparing a power spike and a power surge
Figure 6.2:
Comparing power underage problems
Figure 6.3:
A sample log file from the Windows NT Event Viewer
Figure 6.4:
A typical UTP installation
Figure 6.5:
A sample DB-25 female SCSI connector
Figure 6.6:
Male Centronics-50 SCSI connector
Figure 6.7:
A high-density, 68-pin SCSI connector
Figure 6.8:
A sample male and female D-type connector
Figure 6.9:
A sample BNC connector
Figure 6.10:
A typical RJ-45 connector
Figure 6.11:
An IBM data connector
Figure 6.12:
A jumper and how it is used
Figure 6.13:
The DIP switch
Figure 6.14:
The Select Network Component Type window
Figure 6.15:
Selecting the software you want to install
Figure 6.16:
Choosing a primary network logon
Figure 6.17:
The Network and Dial-up Connections window
Figure 6.18:
NDC with the NetWare client and NWLink installed
Figure 6.19:
The NetWare default server/tree option screen
Figure 6.20:
An example of a crimper
Figure 6.21:
Using a punchdown tool
Figure 6.22:
An example of a punchdown tool
Chapter 7: WAN and Remote Access Technologies
Figure 7.1:
A local PSTN (or POTS) network
Figure 7.2:
A typical frame relay configuration
Figure 7.3:
A PPTP implementation connecting two LANs over the Internet
Figure 7.4:
A workstation is connected to a corporate LAN over the Internet using PPTP
Chapter 8: Network Access and Security
Figure 8.1:
Two networks with an ACL-enabled router
Figure 8.2:
A firewall with a DMZ
Figure 8.3:
Protocol switching with and without a dead zone
Figure 8.4:
A hacker denied by a dynamic state list
Figure 8.5:
A packet going to a proxy
Figure 8.6:
IP spoofing
Figure 8.7:
Public key encryption
Chapter 9: Fault Tolerance and Disaster Recovery
Figure 9.1:
Disk mirroring
Figure 9.2:
Disk duplexing
Figure 9.3:
How disk striping works
Figure 9.4:
The amount of data backed up with a full backup
Figure 9.5:
The amount of data backed up in a differential backup
Figure 9.6:
The amount of data backed up with an incremental backup
Figure 9.7:
Grandfather-Father-Son rotation
Chapter 10: Network Troubleshooting
Figure 10.1:
TCP/IP DNS properties for the misconfigured workstation
Figure 10.2:
A sample
CONSOLE.LOG
file
Figure 10.3:
Sample Log event types and their associated icons
Figure 10.4:
A sample System Log (note the different error types and event IDs)
Figure 10.5:
The Event Detail dialog box for an event listed in Figure 10.4
Figure 10.6:
The Security Log in Event Viewer
Figure 10.7:
The Security Log event types and their associated icons
Figure 10.8:
A sample Application event log
Figure 10.9:
A standard Ethernet 10BaseT cable
Figure 10.10:
A standard Ethernet 10BaseT crossover cable
Figure 10.11:
A hardware loopback and its connections
Figure 10.12:
Use of a common tone generator and locator
Previous page
Table of content
Next page
Network+ Study Guide
ISBN: 470427477
EAN: N/A
Year: 2002
Pages: 151
BUY ON AMAZON
The Complete Cisco VPN Configuration Guide
VPN Definition
VPN Implementations
Key Exchange
Summary
Summary
C & Data Structures (Charles River Media Computer Engineering)
Control Structures
Address and Pointers
Storage of Variables
Memory Allocation
Problems in Graphs
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Objectives of this book
What this book does not cover
Common characteristics of contemporary SOA
The continuing evolution of SOA (standards organizations and contributing vendors)
The top-down strategy
Microsoft WSH and VBScript Programming for the Absolute Beginner
Overview of the Windows Script Host
VBScript Basics
Constants, Variables, and Arrays
Appendix B Built-In VBScript Functions
Appendix C Whats on the CD-ROM?
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Summary
Authenticating Firewall Sessions (Cut-Through Proxy Feature)
Configuring Authorization
HTTP
Cisco IPS Software Architecture
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Strings and Regular Expressions
Numbers, Dates, and Other Data Types
Multithreading
Windows Services
Useful COM Interop
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies