Table of Contents


book cover
Upgrading and Repairing Networks
By Terry W. Ogletree, Mark Edward Soper
...............................................
Publisher: Que
Pub Date: May 11, 2006
Print ISBN-10: 0-7897-3530-X
Print ISBN-13: 978-0-7897-3530-0
Pages: 1200
 

Table of Contents  | Index

   Copyright
   About the Authors
   Acknowledgments
   We Want to Hear from You!
   Reader Services
   Introduction
    Part I:  Up Front: Network Planning and Design Concepts
        Chapter 1.  A Short History of Computer Networking
        Chapter 2.  Overview of Network Topologies
      LAN Topologies
      Building and Campus Topologies
      Multi-Tiered Network Topology
        Chapter 3.  Network Design Strategies
      Planning a Logical Network Design
      Planning and Design Components
      The Physical Network
      Planning Resources
        Chapter 4.  Upgrading Strategies and Project Management
      Where Do You Start?
      Determining When an Upgrade Is NecessaryThe Evaluation Process
      What Resources Are Needed for the Upgrade?
      Planning an Upgrade
      Testing the Plan
      Deployment
      User Training
      Closing the BookDocumenting What Has Changed and Why
      Other Considerations for Upgrading
        Chapter 5.  Protecting the Network: Preventative Maintenance Techniques
      Power Conditioning and Uninterruptible Power Supplies (UPSs)
      Network Monitoring
      Server and Workstation Backups
      Routine Maintenance
      Building Redundancy into the Network
      Recovery Planning
      Justifying Preventative Maintenance
    Part II:  Physical Networking Components
        Chapter 6.  Wiring the NetworkCables, Connectors, Concentrators, and Other Network Components
      Structured Wiring
      Important Definitions
      Physical Cable Types
      Terminations and Connections
      Telecommunications Rooms
        Chapter 7.  Network Interface Cards
      Choosing a Hardware Bus Type
      The Wired for Management (WfM) Initiative
      Multi-Homed Systems
      Load Balancing and Dual-Redundant Network Controllers
      Software Drivers
      IRQs and I/O Ports
      Troubleshooting Network Cards
        Chapter 8.  Network Switches
      How Switches Work
      Switch Hardware Types
      Switch Troubleshooting and Management
        Chapter 9.  Virtual LANs
      Virtual LANs and Network Topologies
      Switching Based on Network Frames
      Implicit and Explicit Tagging
      IEEE Standards for Virtual LANs
      What Kind of Switch Should You Buy?
        Chapter 10.  Routers
      What Routers Do
      The Difference Between Routable Protocols and Routing Protocols
      When Do You Need to Use a Router?
      Router Ports and Connections
      Configuring Routers
      Router Chassis Types
        Chapter 11.  Network Attached Storage (NAS) and Storage Area Networks (SANs)
      Local Versus Networked Storage Devices
      Network Attached Storage
      Storage Area Networks
      Basic SANs: Arbitrated Loops
      Using a Fabric Switched Topology for SANs
      A Mixed Topology of Loops and Switches
      IP SANs and iSCSI
      What Kind of NAS or SAN Solution Should You Use?
    Part III:  Low-Level Network Protocols
        Chapter 12.  The IEEE LAN/MAN Committee Networking Standards
      What Is the LAN/MAN Committee?
      Obtaining the IEEE 802 Standards Documents Free
        Chapter 13.  Ethernet: The Universal Standard
      A Short History of Ethernet
      Collisions: What Are CSMA/CA and CSMA/CD?
      Restrictions on Legacy Ethernet Topologies
      Using a Bus Topology
      Using a Star Topology
      Hybrid LAN Topologies
      Using a Backbone to Connect the Enterprise
      Ethernet Frames
      Fast Ethernet (IEEE 802.3u) and Gigabit Ethernet (IEEE 802.3z)
      Ethernet Problems
      Ethernet Errors
      Monitoring Errors
    Part IV:  Dedicated Connections and WAN Protocols
        Chapter 14.  Dial-Up Connections
      The Point-to-Point Protocol and the Serial Line Internet Protocol
      The Serial Line Internet Protocol (SLIP)
      The Point-to-Point Protocol (PPP)
      Configuring a Windows XP Professional Client for Dial-Up
      When Dial-Up Isn't Fast Enough
        Chapter 15.  Dedicated Connections
      Leased Lines
      Asynchronous Transfer Mode (ATM)
      The Importance of Frame Relay and the X.25 Interface
        Chapter 16.  Digital Subscriber Lines (DSL) Technology
      DSL and Cable Modems
      The Future of DSL
        Chapter 17.  Using a Cable Modem
      How Cable Modems Work
      How Cable Modems Differ from xDSL Broadband Access
      The Data Over Cable Service Interface Specification (DOCSIS)
      Choosing Between Cable and DSL
    Part V:  Wireless Networking Protocols
        Chapter 18.  Introduction to Wireless Networking
      Why Wireless Networks Have Proliferated
      Access Points and Ad Hoc Networks
      Physical Transmission Technologies
      The IEEE 802.11 Wireless Standard
      Sources of Interference for Wireless Networks
        Chapter 19.  IEEE 802.11b: Wi-Fi Pioneer
      Components of an 802.11-Based Wireless Network
      Section 802.11.  bFirst, But Fading Away
      What to Look for in an Access Point
      Do You Need a Wireless Network?
      Connecting the Wireless Network to a Wired LAN
      Dual-Mode Access Points
      Why Wi-Fi?
        Chapter 20.  Faster Service: IEEE 802.11a
      Overview of the IEEE 802.11a Standard
      Comparing 802.11a with 802.11b and 802.11g
        Chapter 21.  The IEEE 802.11g Standard
      Overview of the 802.11g Standard
      Installing a Wireless-G Broadband Router
      Installing and Configuring a Wireless Network Adapter
      Proprietary Extensions to the IEEE 802.11g Standard
      Improving Network Performance with Dual-Band Wireless Technology
      Which Wireless Protocol Should You Use?
        Chapter 22.  Bluetooth Wireless Technology
      The Bluetooth Special Interest Group (SIG)
      General Overview of Bluetooth
      Piconets and Scatternets
      Bluetooth Device Modes
      SCO and ACL Links
      What Are Bluetooth Profiles?
      Bluetooth Is More Than a Wireless Communication Protocol
        Chapter 23.  Security and Other Wireless Technologies
      Instant Messaging and Consumer Devices
      Wireless Security
      Personal Area Networks (PANs)
    Part VI:  Lan and Wan Network, Service, and Application Protocols
        Chapter 24.  Overview of the TCP/IP Protocol Suite
      TCP/IP and the OSI Reference Model
      The Internet Protocol (IP)
      The Address Resolution ProtocolResolving IP Addresses to Hardware Addresses
      The Transmission Control Protocol (TCP)
      The User Datagram Protocol (UDP)
      Ports, Services, and Applications
      The Internet Control Message Protocol (ICMP)
        Chapter 25.  Basic TCP/IP Services and Applications
      The File Transfer Protocol (FTP)
      The Telnet Protocol
      Using Telnet and FTP with a Firewall
      The R-Utilities
      The Finger Utility
      Other Services and Applications Built on the TCP/IP Suite
        Chapter 26.  Internet Mail Protocols: POP3, SMTP, and IMAP
      How SMTP Works
      Putting It All Together
      The Post Office Protocol (POP3)
      The Internet Message Access Protocol Version 4 (IMAP4)
        Chapter 27.  Troubleshooting Tools for TCP/IP Networks
      Checking the Host System's Configuration First
      Using ping and tracert to Check Connectivity
      Using the nslookup Command to Troubleshoot Name Resolution Issues
      Other Useful Commands
      Using Network Connection Repair in Windows XP
        Chapter 28.  BOOTP and Dynamic Host Configuration Protocol (DHCP)
      What Is BOOTP?
      Taking BOOTP One Step Further: DHCP
      Installing and Configuring a DHCP Server on Windows 2000/2003
      Using DHCP with Red Hat Linux
      Configuring a Router or WAP to Provide DHCP Services
        Chapter 29.  Network Name Resolution
      Hardware Versus Protocol Addresses
      NetBIOS
      Installing and Configuring WINS on Windows 2000/2003 Servers
      TCP/IP Names
      Installing DNS on a Windows Server
      Network Information Service
        Chapter 30.  Using the Active Directory Service
      Early Directory Technologies
      Objects and Attributes
      What Is a Domain Tree? What Is a Forest?
      The Active Directory and Dynamic DNS
      Active Directory Service Interfaces (ADSI)
      The Active Directory Schema
      Finding Objects in the Active Directory
      The Active Directory Service and Windows Server 2003
      New Active Directory Features in Windows Server 2003
        Chapter 31.  File Server Protocols
      Why File Server Protocols are Important
      Server Message Block (SMB) and the Common Internet File System (CIFS)
      NetWare Core Protocol (NCP)
      Unix Network File System (NFS)
      Microsoft Distributed File System (DFS)
        Chapter 32.  The Hypertext Transfer Protocol
      The Beginning of HTTP
      Defining HTTP
      URLs, URIs, and URNs
        Chapter 33.  Routing Protocols
      Basic Types of Routing Protocols
      Multi-Protocol Label Switching (MPLS)
        Chapter 34.  The Secure Sockets Layer (SSL) Protocol
      Symmetric and Asymmetric Encryption
      Does SSL Provide Enough Security for Internet Transactions?
      OpenSource SSL
        Chapter 35.  Introduction to the IPv6 Protocol
      What's the Difference Between IPv4 and IPv6?
      The IPv6 Headers
      Other IPv6 Considerations
      The Future of IPv6
    Part VII:  Network User and Resource Management
        Chapter 36.  Windows NT Domains
      Workgroups and Domains
      Windows NT User Groups
      Managing User Accounts
      Passwords and Policies
      Strategies to Minimize Logon Problems
        Chapter 37.  Windows 2000 and Windows Server 2003 User and Computer Management Utilities
      The Microsoft Management Console
      User Management
      Computer Management
      Windows 2000 User Groups
        Chapter 38.  Managing Unix and Linux Users
      User Administration
      Network Information Service (NIS)
      Common Login Problems
        Chapter 39.  Rights and Permissions
      User-Level and Share-Level Security
      Assigning User Rights for Windows 2000, Server 2003, and XP
      NTFS Standard and Special Permissions
      User Groups Make Managing User Rights Easier
      User Groups in Windows 2000 and Server 2003
      Active Directory Groups
      NetWare
      Unix and Linux
        Chapter 40.  Network Printing Protocols
      Printing Protocols and Printing Languages
      Data Link Control Protocol (DLC)
      Internet Printing Protocol (IPP)
        Chapter 41.  Print Servers
      Unix/Linux Printing
      Configuring Windows Print Servers
      Installing and Configuring Printers on Windows Servers
      Printing Under NetWare
      Hardware-Based Print ServersPrint Server Appliances
    Part VIII:  System and Network Security
        Chapter 42.  Basic Security Measures Every Network Administrator Needs to Know
      Policies and Procedures
      Physical Security Measures
      The Two Sides of Security
      System Daemons and Services
      Removing Dead Wood
      Delegating Authority
      Don't Forget About Firewalls
        Chapter 43.  Auditing and Other Monitoring Measures
      Unix and Linux Systems
      Configuring Windows NT 4.0 Auditing Policies
      Configuring Windows 2000 and Windows Server 2003 Auditing Policies
      Auditing Windows XP Professional Computers
      Novell Security
      NetWare Auditing Solutions
        Chapter 44.  Security Issues for Wide Area Networks
      You've Been Targeted!
      Computer Viruses, Trojan Horses, and Other Destructive Programs
      Your Network Under FireCommon Attacks
      Network Probes
      Spoofing and Impersonation
      If It's Too Good to Be True, It Isn't
      Preventative Measures
      Staying on Top of Security Issues
        Chapter 45.  Firewalls
      What Is a Firewall?
      Packet Filters
      Intrusion Detection (Stateful Inspection)
      Proxy Servers
      Hybrids
      Inexpensive Firewalls for SOHO Environments
      How Do You Know That the Firewall Is Secure?
        Chapter 46.  Virtual Private Networks (VPNs) and Tunneling
      What Is a VPN?
      Protocols, Protocols, and More Protocols!
      IPSec Protocols
      The Point-to-Point Tunneling Protocol (PPTP)
      Layer Two Tunneling Protocol (L2TP)
      Creating a VPN Connection with Windows XP Professional
      Selecting a Router with VPN Support
        Chapter 47.  Encryption Technology
      Computers and Privacy
      What Is Encryption?
      Digital Certificates
      Pretty Good Privacy (PGP)
    Part IX:  Troubleshooting Networks
        Chapter 48.  Strategies for Troubleshooting Network Problems
      A Documented Network Is Easier to Troubleshoot
      Problem-Solving Techniques
      Pitfalls of Troubleshooting
        Chapter 49.  Network Testing and Analysis Tools
      Basics: Testing Cables
      Network and Protocol Analyzers
      Simple Network Management Protocol (SNMP)
        Chapter 50.  Troubleshooting Small Office and Home Office (SOHO) Networks
      Power Problems
      Computer Configuration Issues
      Component ProblemsYou Can't Get There from Here
      Secure Those Cables!
      Firewall Problems
      Keeping Your Network Healthy
      Wireless Networking Problems
      When All Else Fails
    Part X:  Upgrading Network Hardware
        Chapter 51.  Upgrading Older Ethernet Networks
      Upgrading from 10BASE-2 or 10BASE-T
      Hardware and Software Factors to Consider for 10BASE-2, 10BASE-T, and 100BASE-T
      Connecting Networks That Use Different Cables or Topologies
      Other Possibilities
      Upgrading the Network Backbone to Gigabit Ethernet
      Using Gigabit Ethernet for High-End Servers
      Gigabit Ethernet Can Cover the Distance
      Section 10.  Gigabit Ethernet Is Becoming Economically Feasible
        Chapter 52.  Upgrading from Bridges and Hubs to Routers and Switches
      Growing Beyond a Small LAN
      From Bridges to Routers
      From Bridges to Switches
        Chapter 53.  Adding Wireless Networking to a LAN
      Why Go Wireless?
      Choosing Locations for Access Points
      Security Issues
    Part XI:  Migration and Integration
        Chapter 54.  Migrating from NetWare to Windows 2000 or Windows 2003
      Windows Protocols and Services
      Microsoft's Services for NetWare Version 5.0 (SFN)
        Chapter 55.  Migration and Integration Issues: Windows NT, Windows 2000, Windows 2003, Unix, and Linux
      Windows Server Support for Unix Protocols and Utilities
      Managing the FTP Service on Windows Server 2003
      Applications
      Microsoft Windows Services for Unix 3.5
      Samba
      Sun Network Information System
        Chapter 56.  Migrating from Windows NT 4.0 to Windows 2000, Windows 2003, and Windows XP
      Do You Need to Upgrade the Operating System or Applications?
      Upgrading to Windows 2000 Server
      Implementing a Migration to the Active Directory for Windows 2000
      Upgrading Windows NT 4.0 or Windows 2000 to Windows Server 2003
        Chapter 57.  Migration and Integration: NetWare, Unix, and Linux
      Why Use Unix or Linux?
      Key Differences Between Unix/Linux and NetWare
      Moving User Accounts
      Networking Protocols
      Applications
      Finding Linux Drivers for Hardware
      Novell Open Enterprise Server
   Appendixes
        Appendix A.  Overview of the OSI Seven-Layer Networking Reference Model
      It's Only a Model!
        Appendix B.  Networking Glossary
        Appendix C.  Internet Resources for Network Administrators
      Standards Organizations
      Network Hardware and Software Manufacturers
      Wireless Networking
      Security
        Appendix D.  The Lightweight Directory Access Protocol
      A Quick Introduction to LDAP
      The X.500 Protocols and Standards
      The Lightweight Directory Access Protocol
      LDAP Directories
        Appendix E.  Introduction to Setting Up a SOHO Network
      Assessing Your Requirements: What Do You Need?
      SOHO Network Topologies
      Backup Solutions for a SOHO Network
   Index



Upgrading and Repairing Networks
Upgrading and Repairing Networks (5th Edition)
ISBN: 078973530X
EAN: 2147483647
Year: 2006
Pages: 411

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net