What Will You Find Inside?


You will find a few chapters in this book that I did not write. This is because I was able to find someone who could write a better chapter due to his or her deep knowledge of the subject matter.

Part I, "Up Front: Network Planning and Design Concepts," starts off with a short chapter about the history of computer networks so that you can see how far computer interconnection technologies have developed in just a few short years . Following that is a great chapter written by Tom Crayner about network topologies ”might as well start with the basics. Today you need careful planning to create a large, complex network, and Tom will show you the options to consider before you even begin to think about network protocols or other topics covered in this book. This part also contains information that will help you put together a network design or upgrade strategy, as well as some ideas about preventive maintenance that can be used to keep problems from happening in the first place.

Part II, "Physical Networking Components," covers the physical components that make up your network, from the network cables and network adapter cards to the devices that are used to connect these components. Chapter 6, "Wiring the Network ”Cables, Connectors, Concentrators, and Other Network Components," was written by Dwight Torlay, an engineer who not only works in this capacity every day, but also teaches classes on these topics. In this edition the chapter has been updated, and you can learn a lot about components that are usually installed by contractors. If you want to know what they are doing, and why, then read this chapter so that you can ask the right questions and make the correct decisions when it comes to the physical cable plant and other devices that will connect your network.

Of course, you'll also find a chapter here on network adapter cards, which connect your computers to the network. If you want to expand your knowledge further on this topic, you should consider using Scott Mueller's Upgrading and Repairing PCs . That book will give you information about network adapter cards. The basics are covered here, such as different bus types and troubleshooting. However, Scott's book can give you greater insight about choosing the correct card, and the differences between cards on the market. It can also show you exactly how to install the hardware.

The upgradingandrepairingpcs.com Web site that comes with this book now contains chapters on older technology, such as repeaters, bridges, and hubs. Just because these chapters are now on the Web site doesn't mean you should ignore them. Many certification exams still require that you know the basics of computer networking, and these devices were revolutionary for their time. Chapter 8 gives you a quick lesson on network switches, which have now replaced hubs in most all networks. For the price of a hub a few years ago, you can now use a switch, and achieve a greater bandwidth on your network. Chapter 9 discusses virtual LANs (VLANs), which make managing a large network easier, and Chapter 10 discusses routers ”those devices that can be used to connect different segments of your LAN or intranet, as well as connect your network to the Internet.

A new topic for this book can also be found in Chapter 11. And it should not be underestimated by the simple title: "Network Attached Storage and Storage Area Networks." With the need for terabytes of storage, technologies such as SCSI interfaces can no longer suffice for a large network because of distance limitations and expandability. In this chapter you can learn the difference between connecting additional storage to your LAN and adding a separate network that contains the storage that your servers need to have fast access to. This chapter alone could be the topic of an entire book.

Part III, "Low-Level Network Protocols," is where you'll find information about many types of technologies you can use to transmit data across your network. This section starts with a quick review of the IEEE 802.11 standards, followed by a chapter on the oldest LAN technology still in widespread use today: ARCnet. If you think that older solutions are always supplanted by newer ones that perform the same functions more efficiently , then read that chapter. And the next time someone asks you whether you want fries with that burger, you just might find that ARCnet is still there, as a viable solution to small networks that cannot afford a full-time network administrator. Because of ARCnet's simplicity, it is still employed in various situations, such as in point-of-sale registers and on some factory floors.

Today the major LAN wire protocol is Ethernet. It's been here for years, and will continue to be around as it evolves to meet newer demands for bandwidth and adapts to newer devices and technologies.

Token-Ring is still being used by a small percentage of networks, supported mainly by IBM and a few other vendors . However, because of its miniscule market share, and because there is very little development in process to update the technology as compared to Ethernet, this updated chapter is now found on the upgradingandrepairingpcs.com Web site.

Part IV, "Dedicated Connections and WAN Protocols," is written for both network administrators who need to connect LANs across large distances and those who need a local dedicated connection to another LAN or the Internet. Here you can find the choices available to you from the high-end T-class connections that give you huge bandwidth data paths. You will also find information about other dedicated connections, such as cable and DSL access. Keep in mind that cable and DSL access are not just for home users. Many of the large providers of these services are now targeting small businesses. If this is your environment, you might find this a less expensive method for giving your company an Internet presence.

Part V, "Wireless Networking Protocols," covers just what it says. In the previous edition of this book, wireless networking was just making its way into the marketplace . Even Bluetooth ”used for very close connections, such as to replace cables used between keyboards, mice, and other devices to your computer ”has probably finally arrived. In the past few years there has been much marketing hype about this technology, and it finally seems to have made it. You can also learn here about the major wireless technologies ”many available at the consumer level as well as for the corporate network ”including both IEEE 802.11b and IEEE 802.11a. The newest protocol in this section is IEEE 802.11g, which combines the best of both of the other two protocols. The 802.11g network devices are backward compatible with IEEE 802.11a and b, and can offer bandwidths up to 54Mbps. For wireless networks, you won't notice much of a difference from this sort of connection to your company's network than if you had a 100Mbps 100BASE-T connection. To top off this section, there is a chapter on other wireless developments, including everything from wireless security to new uses for wireless technology.

Part VI, "LAN and WAN Network, Service, and Application Protocols," contains such subjects as the all-important TCP/IP suite of protocols, applications, and troubleshooting utilities. Because TCP/IP is the main protocol used in LANs today, this is a must-read section for new readers as well as a refresher course for those who already are familiar with the topic. In addition to the basics of TCP/IP, this section covers everything from email protocols to directory services, routing protocols, and SSL, among many others.

Part VII, "Network User and Resource Management," will help you learn about managing users and controlling access to network resources. Coverage here includes Windows, NetWare, and Unix/Linux. One of the newest additions to this section is Windows 2003 and how you can use it and the updated Active Directory to manage and secure the network. A chapter devoted to network printing protocols has been updated to include the latest coverage of the Internet Printing Protocol (IPP), which is now supported by all the major operating systems. This is a topic that will revolutionize printing in the next few years, and it's a good idea to start brushing up on your skills today.

Part VIII, "System and Network Security," contains chapters to help you learn the basics about protecting your system. Topics include everything from creating policies and procedures for the workplace, to computer viruses and auditing the actions users perform on the network. Encryption technology is also covered in its own chapter, as are Virtual Private Networks (VPNs) and firewalls. If you connect to the Internet, or if you operate a large enterprise network, then this section has a lot of good security issues you should be cognizant of.

Part IX, "Troubleshooting Networks," complements most of the previous chapters. Tools you can use for troubleshooting and strategies for going about this process are found here. For small office/home office (SOHO) network users, there is an entire chapter devoted to your network. Because many SOHO networks are operated by small business owners , this chapter can help you understand more complex topics without having to read this entire book. Off-the-shelf cable/DSL routers and inexpensive firewall solutions might make you feel comfortable about your network, but everyday there are new threats that can make your small network a target.

Part X, "Upgrading Network Hardware," is a valuable reference for those who want to make use of the latest hardware devices, while trying to protect your investment in existing equipment where possible. A special chapter gives a good overview of adding wireless networking to your wired network.

Part XI, "Migration and Integration," covers the other side of the coin, upgrading from one operating system to another, as well as using multiple operating systems on the same network. This section discusses the many things that are common to most operating systems, as well as tools that can be used to help you integrate a diverse collection of systems into a single heterogeneous network. Topping off this section is another chapter of interest to SOHO users that discusses how you might go about setting up a LAN for your business. Again, you don't need to be versed in all the topics covered in this book in order to operate a small LAN. This chapter does refer to topics in other parts of the book, but it is a good starting place for those who either have a small LAN that needs to be upgraded, or are just starting out.

Finally, the appendixes contain information that can be used as a quick reference. You can get an overview of the OSI network reference model, as well as a concise explanation of how directory services work, specifically the Lightweight Directory Access Protocol (LDAP). An important resource here is a comprehensive glossary of networking terms. If you are reading a chapter in this book and find yourself stymied about a term or an acronym, then just look to this appendix for help.

As discussed earlier in this introduction, the upgradingandrepairingpcs.com Web site contains several chapters that had to be moved out of the main text. This is due to several factors. First, some of these topics apply to older networks and, second, this book would cost you a lot more if the page count were to increase by a few hundred pages! The chapters on the Web site, however, should not be dismissed as irrelevant. You may have a network that still uses the technologies found in these chapters. And, when studying for a certification exam, you should understand older technologies because they will probably turn up as questions when you sit down to take the test.



Upgrading and Repairing Networks
Upgrading and Repairing Networks (5th Edition)
ISBN: 078973530X
EAN: 2147483647
Year: 2003
Pages: 434

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net