| | Copyright |
| | About the Authors |
| | Acknowledgments |
| | We Want to Hear from You! |
| | Reader Services |
| | Introduction |
| | Part I: Up Front: Network Planning and Design Concepts |
| | | Chapter 1. A Short History of Computer Networking |
| | | Chapter 2. Overview of Network Topologies |
| | | LAN Topologies |
| | | Building and Campus Topologies |
| | | Multi-Tiered Network Topology |
| | | Chapter 3. Network Design Strategies |
| | | Planning a Logical Network Design |
| | | Planning and Design Components |
| | | The Physical Network |
| | | Planning Resources |
| | | Chapter 4. Upgrading Strategies and Project Management |
| | | Where Do You Start? |
| | | Determining When an Upgrade Is NecessaryThe Evaluation Process |
| | | What Resources Are Needed for the Upgrade? |
| | | Planning an Upgrade |
| | | Testing the Plan |
| | | Deployment |
| | | User Training |
| | | Closing the BookDocumenting What Has Changed and Why |
| | | Other Considerations for Upgrading |
| | | Chapter 5. Protecting the Network: Preventative Maintenance Techniques |
| | | Power Conditioning and Uninterruptible Power Supplies (UPSs) |
| | | Network Monitoring |
| | | Server and Workstation Backups |
| | | Routine Maintenance |
| | | Building Redundancy into the Network |
| | | Recovery Planning |
| | | Justifying Preventative Maintenance |
| | Part II: Physical Networking Components |
| | | Chapter 6. Wiring the NetworkCables, Connectors, Concentrators, and Other Network Components |
| | | Structured Wiring |
| | | Important Definitions |
| | | Physical Cable Types |
| | | Terminations and Connections |
| | | Telecommunications Rooms |
| | | Chapter 7. Network Interface Cards |
| | | Choosing a Hardware Bus Type |
| | | The Wired for Management (WfM) Initiative |
| | | Multi-Homed Systems |
| | | Load Balancing and Dual-Redundant Network Controllers |
| | | Software Drivers |
| | | IRQs and I/O Ports |
| | | Troubleshooting Network Cards |
| | | Chapter 8. Network Switches |
| | | How Switches Work |
| | | Switch Hardware Types |
| | | Switch Troubleshooting and Management |
| | | Chapter 9. Virtual LANs |
| | | Virtual LANs and Network Topologies |
| | | Switching Based on Network Frames |
| | | Implicit and Explicit Tagging |
| | | IEEE Standards for Virtual LANs |
| | | What Kind of Switch Should You Buy? |
| | | Chapter 10. Routers |
| | | What Routers Do |
| | | The Difference Between Routable Protocols and Routing Protocols |
| | | When Do You Need to Use a Router? |
| | | Router Ports and Connections |
| | | Configuring Routers |
| | | Router Chassis Types |
| | | Chapter 11. Network Attached Storage (NAS) and Storage Area Networks (SANs) |
| | | Local Versus Networked Storage Devices |
| | | Network Attached Storage |
| | | Storage Area Networks |
| | | Basic SANs: Arbitrated Loops |
| | | Using a Fabric Switched Topology for SANs |
| | | A Mixed Topology of Loops and Switches |
| | | IP SANs and iSCSI |
| | | What Kind of NAS or SAN Solution Should You Use? |
| | Part III: Low-Level Network Protocols |
| | | Chapter 12. The IEEE LAN/MAN Committee Networking Standards |
| | | What Is the LAN/MAN Committee? |
| | | Obtaining the IEEE 802 Standards Documents Free |
| | | Chapter 13. Ethernet: The Universal Standard |
| | | A Short History of Ethernet |
| | | Collisions: What Are CSMA/CA and CSMA/CD? |
| | | Restrictions on Legacy Ethernet Topologies |
| | | Using a Bus Topology |
| | | Using a Star Topology |
| | | Hybrid LAN Topologies |
| | | Using a Backbone to Connect the Enterprise |
| | | Ethernet Frames |
| | | Fast Ethernet (IEEE 802.3u) and Gigabit Ethernet (IEEE 802.3z) |
| | | Ethernet Problems |
| | | Ethernet Errors |
| | | Monitoring Errors |
| | Part IV: Dedicated Connections and WAN Protocols |
| | | Chapter 14. Dial-Up Connections |
| | | The Point-to-Point Protocol and the Serial Line Internet Protocol |
| | | The Serial Line Internet Protocol (SLIP) |
| | | The Point-to-Point Protocol (PPP) |
| | | Configuring a Windows XP Professional Client for Dial-Up |
| | | When Dial-Up Isn't Fast Enough |
| | | Chapter 15. Dedicated Connections |
| | | Leased Lines |
| | | Asynchronous Transfer Mode (ATM) |
| | | The Importance of Frame Relay and the X.25 Interface |
| | | Chapter 16. Digital Subscriber Lines (DSL) Technology |
| | | DSL and Cable Modems |
| | | The Future of DSL |
| | | Chapter 17. Using a Cable Modem |
| | | How Cable Modems Work |
| | | How Cable Modems Differ from xDSL Broadband Access |
| | | The Data Over Cable Service Interface Specification (DOCSIS) |
| | | Choosing Between Cable and DSL |
| | Part V: Wireless Networking Protocols |
| | | Chapter 18. Introduction to Wireless Networking |
| | | Why Wireless Networks Have Proliferated |
| | | Access Points and Ad Hoc Networks |
| | | Physical Transmission Technologies |
| | | The IEEE 802.11 Wireless Standard |
| | | Sources of Interference for Wireless Networks |
| | | Chapter 19. IEEE 802.11b: Wi-Fi Pioneer |
| | | Components of an 802.11-Based Wireless Network |
| | | Section 802.11. bFirst, But Fading Away |
| | | What to Look for in an Access Point |
| | | Do You Need a Wireless Network? |
| | | Connecting the Wireless Network to a Wired LAN |
| | | Dual-Mode Access Points |
| | | Why Wi-Fi? |
| | | Chapter 20. Faster Service: IEEE 802.11a |
| | | Overview of the IEEE 802.11a Standard |
| | | Comparing 802.11a with 802.11b and 802.11g |
| | | Chapter 21. The IEEE 802.11g Standard |
| | | Overview of the 802.11g Standard |
| | | Installing a Wireless-G Broadband Router |
| | | Installing and Configuring a Wireless Network Adapter |
| | | Proprietary Extensions to the IEEE 802.11g Standard |
| | | Improving Network Performance with Dual-Band Wireless Technology |
| | | Which Wireless Protocol Should You Use? |
| | | Chapter 22. Bluetooth Wireless Technology |
| | | The Bluetooth Special Interest Group (SIG) |
| | | General Overview of Bluetooth |
| | | Piconets and Scatternets |
| | | Bluetooth Device Modes |
| | | SCO and ACL Links |
| | | What Are Bluetooth Profiles? |
| | | Bluetooth Is More Than a Wireless Communication Protocol |
| | | Chapter 23. Security and Other Wireless Technologies |
| | | Instant Messaging and Consumer Devices |
| | | Wireless Security |
| | | Personal Area Networks (PANs) |
| | Part VI: Lan and Wan Network, Service, and Application Protocols |
| | | Chapter 24. Overview of the TCP/IP Protocol Suite |
| | | TCP/IP and the OSI Reference Model |
| | | The Internet Protocol (IP) |
| | | The Address Resolution ProtocolResolving IP Addresses to Hardware Addresses |
| | | The Transmission Control Protocol (TCP) |
| | | The User Datagram Protocol (UDP) |
| | | Ports, Services, and Applications |
| | | The Internet Control Message Protocol (ICMP) |
| | | Chapter 25. Basic TCP/IP Services and Applications |
| | | The File Transfer Protocol (FTP) |
| | | The Telnet Protocol |
| | | Using Telnet and FTP with a Firewall |
| | | The R-Utilities |
| | | The Finger Utility |
| | | Other Services and Applications Built on the TCP/IP Suite |
| | | Chapter 26. Internet Mail Protocols: POP3, SMTP, and IMAP |
| | | How SMTP Works |
| | | Putting It All Together |
| | | The Post Office Protocol (POP3) |
| | | The Internet Message Access Protocol Version 4 (IMAP4) |
| | | Chapter 27. Troubleshooting Tools for TCP/IP Networks |
| | | Checking the Host System's Configuration First |
| | | Using ping and tracert to Check Connectivity |
| | | Using the nslookup Command to Troubleshoot Name Resolution Issues |
| | | Other Useful Commands |
| | | Using Network Connection Repair in Windows XP |
| | | Chapter 28. BOOTP and Dynamic Host Configuration Protocol (DHCP) |
| | | What Is BOOTP? |
| | | Taking BOOTP One Step Further: DHCP |
| | | Installing and Configuring a DHCP Server on Windows 2000/2003 |
| | | Using DHCP with Red Hat Linux |
| | | Configuring a Router or WAP to Provide DHCP Services |
| | | Chapter 29. Network Name Resolution |
| | | Hardware Versus Protocol Addresses |
| | | NetBIOS |
| | | Installing and Configuring WINS on Windows 2000/2003 Servers |
| | | TCP/IP Names |
| | | Installing DNS on a Windows Server |
| | | Network Information Service |
| | | Chapter 30. Using the Active Directory Service |
| | | Early Directory Technologies |
| | | Objects and Attributes |
| | | What Is a Domain Tree? What Is a Forest? |
| | | The Active Directory and Dynamic DNS |
| | | Active Directory Service Interfaces (ADSI) |
| | | The Active Directory Schema |
| | | Finding Objects in the Active Directory |
| | | The Active Directory Service and Windows Server 2003 |
| | | New Active Directory Features in Windows Server 2003 |
| | | Chapter 31. File Server Protocols |
| | | Why File Server Protocols are Important |
| | | Server Message Block (SMB) and the Common Internet File System (CIFS) |
| | | NetWare Core Protocol (NCP) |
| | | Unix Network File System (NFS) |
| | | Microsoft Distributed File System (DFS) |
| | | Chapter 32. The Hypertext Transfer Protocol |
| | | The Beginning of HTTP |
| | | Defining HTTP |
| | | URLs, URIs, and URNs |
| | | Chapter 33. Routing Protocols |
| | | Basic Types of Routing Protocols |
| | | Multi-Protocol Label Switching (MPLS) |
| | | Chapter 34. The Secure Sockets Layer (SSL) Protocol |
| | | Symmetric and Asymmetric Encryption |
| | | Does SSL Provide Enough Security for Internet Transactions? |
| | | OpenSource SSL |
| | | Chapter 35. Introduction to the IPv6 Protocol |
| | | What's the Difference Between IPv4 and IPv6? |
| | | The IPv6 Headers |
| | | Other IPv6 Considerations |
| | | The Future of IPv6 |
| | Part VII: Network User and Resource Management |
| | | Chapter 36. Windows NT Domains |
| | | Workgroups and Domains |
| | | Windows NT User Groups |
| | | Managing User Accounts |
| | | Passwords and Policies |
| | | Strategies to Minimize Logon Problems |
| | | Chapter 37. Windows 2000 and Windows Server 2003 User and Computer Management Utilities |
| | | The Microsoft Management Console |
| | | User Management |
| | | Computer Management |
| | | Windows 2000 User Groups |
| | | Chapter 38. Managing Unix and Linux Users |
| | | User Administration |
| | | Network Information Service (NIS) |
| | | Common Login Problems |
| | | Chapter 39. Rights and Permissions |
| | | User-Level and Share-Level Security |
| | | Assigning User Rights for Windows 2000, Server 2003, and XP |
| | | NTFS Standard and Special Permissions |
| | | User Groups Make Managing User Rights Easier |
| | | User Groups in Windows 2000 and Server 2003 |
| | | Active Directory Groups |
| | | NetWare |
| | | Unix and Linux |
| | | Chapter 40. Network Printing Protocols |
| | | Printing Protocols and Printing Languages |
| | | Data Link Control Protocol (DLC) |
| | | Internet Printing Protocol (IPP) |
| | | Chapter 41. Print Servers |
| | | Unix/Linux Printing |
| | | Configuring Windows Print Servers |
| | | Installing and Configuring Printers on Windows Servers |
| | | Printing Under NetWare |
| | | Hardware-Based Print ServersPrint Server Appliances |
| | Part VIII: System and Network Security |
| | | Chapter 42. Basic Security Measures Every Network Administrator Needs to Know |
| | | Policies and Procedures |
| | | Physical Security Measures |
| | | The Two Sides of Security |
| | | System Daemons and Services |
| | | Removing Dead Wood |
| | | Delegating Authority |
| | | Don't Forget About Firewalls |
| | | Chapter 43. Auditing and Other Monitoring Measures |
| | | Unix and Linux Systems |
| | | Configuring Windows NT 4.0 Auditing Policies |
| | | Configuring Windows 2000 and Windows Server 2003 Auditing Policies |
| | | Auditing Windows XP Professional Computers |
| | | Novell Security |
| | | NetWare Auditing Solutions |
| | | Chapter 44. Security Issues for Wide Area Networks |
| | | You've Been Targeted! |
| | | Computer Viruses, Trojan Horses, and Other Destructive Programs |
| | | Your Network Under FireCommon Attacks |
| | | Network Probes |
| | | Spoofing and Impersonation |
| | | If It's Too Good to Be True, It Isn't |
| | | Preventative Measures |
| | | Staying on Top of Security Issues |
| | | Chapter 45. Firewalls |
| | | What Is a Firewall? |
| | | Packet Filters |
| | | Intrusion Detection (Stateful Inspection) |
| | | Proxy Servers |
| | | Hybrids |
| | | Inexpensive Firewalls for SOHO Environments |
| | | How Do You Know That the Firewall Is Secure? |
| | | Chapter 46. Virtual Private Networks (VPNs) and Tunneling |
| | | What Is a VPN? |
| | | Protocols, Protocols, and More Protocols! |
| | | IPSec Protocols |
| | | The Point-to-Point Tunneling Protocol (PPTP) |
| | | Layer Two Tunneling Protocol (L2TP) |
| | | Creating a VPN Connection with Windows XP Professional |
| | | Selecting a Router with VPN Support |
| | | Chapter 47. Encryption Technology |
| | | Computers and Privacy |
| | | What Is Encryption? |
| | | Digital Certificates |
| | | Pretty Good Privacy (PGP) |
| | Part IX: Troubleshooting Networks |
| | | Chapter 48. Strategies for Troubleshooting Network Problems |
| | | A Documented Network Is Easier to Troubleshoot |
| | | Problem-Solving Techniques |
| | | Pitfalls of Troubleshooting |
| | | Chapter 49. Network Testing and Analysis Tools |
| | | Basics: Testing Cables |
| | | Network and Protocol Analyzers |
| | | Simple Network Management Protocol (SNMP) |
| | | Chapter 50. Troubleshooting Small Office and Home Office (SOHO) Networks |
| | | Power Problems |
| | | Computer Configuration Issues |
| | | Component ProblemsYou Can't Get There from Here |
| | | Secure Those Cables! |
| | | Firewall Problems |
| | | Keeping Your Network Healthy |
| | | Wireless Networking Problems |
| | | When All Else Fails |
| | Part X: Upgrading Network Hardware |
| | | Chapter 51. Upgrading Older Ethernet Networks |
| | | Upgrading from 10BASE-2 or 10BASE-T |
| | | Hardware and Software Factors to Consider for 10BASE-2, 10BASE-T, and 100BASE-T |
| | | Connecting Networks That Use Different Cables or Topologies |
| | | Other Possibilities |
| | | Upgrading the Network Backbone to Gigabit Ethernet |
| | | Using Gigabit Ethernet for High-End Servers |
| | | Gigabit Ethernet Can Cover the Distance |
| | | Section 10. Gigabit Ethernet Is Becoming Economically Feasible |
| | | Chapter 52. Upgrading from Bridges and Hubs to Routers and Switches |
| | | Growing Beyond a Small LAN |
| | | From Bridges to Routers |
| | | From Bridges to Switches |
| | | Chapter 53. Adding Wireless Networking to a LAN |
| | | Why Go Wireless? |
| | | Choosing Locations for Access Points |
| | | Security Issues |
| | Part XI: Migration and Integration |
| | | Chapter 54. Migrating from NetWare to Windows 2000 or Windows 2003 |
| | | Windows Protocols and Services |
| | | Microsoft's Services for NetWare Version 5.0 (SFN) |
| | | Chapter 55. Migration and Integration Issues: Windows NT, Windows 2000, Windows 2003, Unix, and Linux |
| | | Windows Server Support for Unix Protocols and Utilities |
| | | Managing the FTP Service on Windows Server 2003 |
| | | Applications |
| | | Microsoft Windows Services for Unix 3.5 |
| | | Samba |
| | | Sun Network Information System |
| | | Chapter 56. Migrating from Windows NT 4.0 to Windows 2000, Windows 2003, and Windows XP |
| | | Do You Need to Upgrade the Operating System or Applications? |
| | | Upgrading to Windows 2000 Server |
| | | Implementing a Migration to the Active Directory for Windows 2000 |
| | | Upgrading Windows NT 4.0 or Windows 2000 to Windows Server 2003 |
| | | Chapter 57. Migration and Integration: NetWare, Unix, and Linux |
| | | Why Use Unix or Linux? |
| | | Key Differences Between Unix/Linux and NetWare |
| | | Moving User Accounts |
| | | Networking Protocols |
| | | Applications |
| | | Finding Linux Drivers for Hardware |
| | | Novell Open Enterprise Server |
| | Appendixes |
| | | Appendix A. Overview of the OSI Seven-Layer Networking Reference Model |
| | | It's Only a Model! |
| | | Appendix B. Networking Glossary |
| | | Appendix C. Internet Resources for Network Administrators |
| | | Standards Organizations |
| | | Network Hardware and Software Manufacturers |
| | | Wireless Networking |
| | | Security |
| | | Appendix D. The Lightweight Directory Access Protocol |
| | | A Quick Introduction to LDAP |
| | | The X.500 Protocols and Standards |
| | | The Lightweight Directory Access Protocol |
| | | LDAP Directories |
| | | Appendix E. Introduction to Setting Up a SOHO Network |
| | | Assessing Your Requirements: What Do You Need? |
| | | SOHO Network Topologies |
| | | Backup Solutions for a SOHO Network |
| | Index |