Table of content


   
  Table of Contents
  Index
Upgrading and Repairing Networks, Fourth Edition
By Terry William Ogletree
 
Publisher : Que
Pub Date : August 12, 2003
ISBN : 0-7897-2817-6
Pages : 1248


    Copyright
    About the Authors
    Acknowledgments
    We Want to Hear from You!
    Introduction
      Who Should Use This Book?
      What Will You Find Inside?
      What's New in This Edition
      What's Missing from This Edition?
    Part I.  Up Front: Network Planning and Design Concepts
      Chapter 1.  A Short History of Computer Networking
      Chapter 2.  Overview of Network Topologies
      LAN Topologies
      Building and Campus Topologies
      A Multi-Tiered Network Topology
      Chapter 3.  Network Design Strategies
      Planning a Logical Network Design
      Planning and Design Components
      The Physical Network
      Planning Resources
      Chapter 4.  Upgrading Strategies and Project Management
      Where Do You Start?
      Determining When an Upgrade Is NecessaryThe Evaluation Process
      What Resources Are Needed for the Upgrade?
      Planning an Upgrade
      Testing the Plan
      Deployment
      User Training
      Closing the BookDocumenting What Has Changed and Why
      Other Considerations for Upgrading
      Chapter 5.  Protecting the Network: Preventative Maintenance Techniques
      Power Conditioning and Uninterruptible Power Supplies (UPSs)
      Network Monitoring
      Server and Workstation Backups
      Routine Maintenance
      Building Redundancy into the Network
      Recovery Planning
      Justifying Preventative Maintenance
    Part II.  Physical Networking Components
      Chapter 6.  Wiring the NetworkCables, Connectors, Concentrators, and Other Network Components
      Structured Wiring
      Important Definitions
      Physical Cable Types
      Terminations and Connections
      Telecommunications Rooms
      Chapter 7.  Network Interface Cards
      Choosing a Hardware Bus Type
      The Wired for Management (WfM) Initiative and Wake on LAN (WOL) Technology
      Multi-Homed Systems
      Load Balancing and Dual-Redundant Network Controllers
      Software Drivers
      IRQs and I/O Ports
      Troubleshooting Network Cards
      Chapter 8.  Network Switches
      How Switches Work
      Switch Hardware Types
      Switch Troubleshooting and Management
      Chapter 9.  Virtual LANs
      Virtual LANs and Network Topologies
      Switching Based on Network Frames
      Implicit and Explicit Tagging
      Using Explicit Tagging on the Network Backbone
      Switch StandardsThe IEEE Standards
      What Kind of Switch Should You Buy?
      Chapter 10.  Routers
      What Routers Do
      The Difference Between Routable Protocols and Routing Protocols
      When Do You Need to Use a Router?
      Router Ports and Connections
      Configuring Routers
      Routers Come in All Sizes
      Chapter 11.  Network Attached Storage and Storage Area Networks
      Local Versus Networked Storage Devices
      Network Attached Storage
      Storage Area Networks
      Basic SANs: Arbitrated Loops
      Using a Fabric Switched Topology for SANs
      A Mixed Topology of Loops and Switches
      IP SANs and the Future
      What Kind of NAS or SAN Solution Should You Use?
    Part III.  Low-Level Network Protocols
      Chapter 12.  The IEEE LAN/MAN Committee Networking Standards
      What Is the LAN/MAN Committee?
      Obtaining the IEEE 802 Standards Documents Free
      Chapter 13.  The Oldest LAN Protocol Is Still Kicking: ARCnet
      Overview of ARCnet
      Troubleshooting ARCnet
      Chapter 14.  Ethernet: The Universal Standard
      A Short History of Ethernet
      Collisions: What Are CSMA/CA and CSMA/CD?
      Restrictions on Legacy Ethernet Topologies
      Using a Bus Topology
      Using a Star Topology
      Hybrid LAN Topologies
      Using a Backbone to Connect the Enterprise
      Ethernet Frames
      Fast Ethernet (IEEE 802.3u) and Gigabit Ethernet (IEEE 802.3z)
      Ethernet Problems
      Ethernet Errors
      Monitoring Errors
    Part IV.  Dedicated Connections and WAN Protocols
      Chapter 15.  Dial-Up Connections
      The Point-to Point Protocol and the Serial Line Internet Protocol
      The Serial Line Internet Protocol (SLIP)
      The Point-to-Point Protocol (PPP)
      An Example: Configuring a Windows XP Professional Client
      When Dial-Up Isn't Fast Enough
      Chapter 16.  Dedicated Connections
      Leased Lines
      Asynchronous Transfer Mode (ATM)
      The Importance of Frame Relay and the X.25 Interface
      Chapter 17.  Digital Subscriber Lines (DSL) Technology
      DSL and Cable Modems
      The Future of DSL
      Chapter 18.  Using a Cable Modem
      How Cable Modems Work
      How Cable Modems Differ from xDSL Broadband Access
      The Data Over Cable Service Interface Specification (DOCSIS)
      Which Should You ChooseCable or DSL?
    Part V.  Wireless Networking Protocols
      Chapter 19.  Introduction to Wireless Networking
      Why Wireless Networks Are Inevitable
      Access Points and Ad Hoc Networks
      Physical Transmission Technologies
      The IEEE 802.11 Wireless Standard
      Sources of Interference for Wireless Networks
      Chapter 20.  IEEE 802.11b: It's Here and It's Inexpensive
      Why Wi-Fi?
      What to Look For When Using 802.11b Networking
      Do You Need a Wireless Network?
      Connecting the Wireless Network to a Wired LAN
      Dual-Mode Access Points
      Chapter 21.  Faster Service: IEEE 802.11a
      Overview of the IEEE 802.11a Standard
      Chapter 22.  The IEEE 802.11g Standard
      Overview of the 802.11g Standard
      Installing Linksys Wireless-G Broadband Router (Model Number WRT54G)
      Installing and Configuring a Wireless Network Adapter
      Which Wireless Protocol Should You Use?
      Chapter 23.  Bluetooth Wireless Technology
      The Bluetooth Special Interest Group (SIG)
      General Overview of Bluetooth
      Piconets and Scatternets
      Bluetooth Device Modes
      SCO and ACL Links
      What Are Bluetooth Profiles?
      Bluetooth Is More Than a Wireless Communication Protocol
      Chapter 24.  Other Wireless Technologies
      Instant Messaging and Consumer Devices
      Wireless Security
      Personal Area Networks (PANs)
    Part VI.  LAN and WAN Network, Service, and Application Protocols
      Chapter 25.  Overview of the TCP/IP Protocol Suite
      TCP/IP and the OSI Reference Model
      The Internet Protocol (IP)
      The Address Resolution ProtocolResolving IP Addresses to Hardware Addresses
      The Transmission Control Protocol (TCP)
      The User Datagram Protocol (UDP)
      Ports, Services, and Applications
      The Internet Control Message Protocol (ICMP)
      Chapter 26.  Basic TCP/IP Services and Applications
      The File Transfer Protocol (FTP)
      The Telnet Protocol
      Using Telnet and FTP with a Firewall
      The R-Utilities
      The Finger Utility
      Other Services and Applications Built on the TCP/IP Suite
      Chapter 27.  Internet Mail Protocols: POP3, SMTP, and IMAP
      How SMTP Works
      Putting It All Together
      The Post Office Protocol (POP3)
      The Internet Message Access Protocol Version 4 (IMAP4)
      Chapter 28.  Troubleshooting Tools for TCP/IP Networks
      Checking the Host System's Configuration First
      Using ping and tracert to Check Connectivity
      Using the nslookup Command to Troubleshoot Name Resolution Issues
      Other Useful Commands
      Chapter 29.  BOOTP and Dynamic Host Configuration Protocol (DHCP)
      What Is BOOTP?
      Taking BOOTP One Step Further: DHCP
      An Example: Installing and Configuring a DHCP Server on Windows 2000/2003
      Using DHCP with Red Hat Linux
      Chapter 30.  Network Name Resolution
      Hardware Versus Protocol Addresses
      NetBIOS
      Installing and Configuring WINS on Windows 2000/2003 Servers
      TCP/IP Names
      Installing DNS on a Windows 2000 or 2003 Server
      Network Information Service
      Chapter 31.  Using the Active Directory
      Early Directories
      Objects and Attributes
      What Is a Domain Tree? What Is a Forest?
      The Active Directory and Dynamic DNS
      Active Directory Service Interfaces (ADSI)
      The Active Directory Schema
      Finding Objects in the Active Directory
      Windows Server 2003: New Active Directory Features
      Installing the Active Directory on a Windows Server 2003 Computer
      Chapter 32.  Overview of Novell NetWare IPX/SPX
      Using the Novell Proprietary Protocols
      Connectionless Service and Protocols
      Connection-Oriented Service and Protocols
      Internetwork Packet Exchange (IPX)
      Sequenced Packet Exchange (SPX)
      NetWare Core Protocol (NCP)
      NetWare Security Guidelines
      NCP Protocol Independence
      Chapter 33.  Overview of the Novell Bindery and Novell Directory Services
      Understanding NetWare Directory Structures
      Using Novell Directory Services
      Chapter 34.  Expanding and Enhancing NDS: NetWare's eDirectory
      Basics of the eDirectory
      The eDirectory Can Be Installed on Many Different Operating Systems
      Options to Consider for Installing the eDirectory
      New Features the eDirectory Delivers
      Chapter 35.  File Server Protocols
      Why Should You Read This Chapter?
      Server Message Block (SMB) and the Common Internet File System (CIFS)
      NetWare Core Protocol (NCP)
      Unix Network File System (NFS)
      Microsoft Distributed File System (DFS): Windows 2000 and Windows Server 2003
      Chapter 36.  The Hypertext Transfer Protocol
      It All Started with the World Wide Web Consortium (W3C) at CERN
      What Is HTTP?
      URLs, URIs, and URNs
      Chapter 37.  Routing Protocols
      Basic Types of Routing Protocols
      Multi-Protocol Label Switching
      Chapter 38.  The Secure Sockets Layer (SSL) Protocol
      Symmetric and Asymmetric Encryption
      Does SSL Provide Enough Security for Internet Transactions?
      OpenSource SSL
      Chapter 39.  Introduction to the IPv6 Protocol
      What's the Difference Between IPv4 and IPv6?
      The IPv6 Headers
      Other IPv6 Considerations
      The Future of IPv6
    Part VII.  Network User and Resource Management
      Chapter 40.  Windows NT Domains
      Workgroups and Domains
      Windows NT User Groups
      Managing User Accounts
      Passwords and Policies
      Strategies to Minimize Logon Problems
      Chapter 41.  Windows 2000 and Windows Server 2003 User and Computer Management Utilities
      The Microsoft Management Console
      User Management
      Computer Management
      Windows 2000 User Groups
      Chapter 42.  Managing Unix and Linux Users
      User Administration
      Network Information Service (NIS)
      Common Login Problems
      Chapter 43.  Rights and Permissions
      User-Level and Share-Level Security
      Assigning User Rights for Windows 2000, Server 2003, and XP
      Windows NT/2000/2003 NTFS Standard Permissions and Special Permissions
      User Groups Make Managing User Rights Easier
      User Groups in Windows 2000 and 2003
      Active Directory Groups
      NetWare
      Unix and Linux
      Chapter 44.  Network Printing Protocols
      Printing Protocols and Printing Languages
      Data Link Control Protocol (DLC)
      Internet Printing Protocol (IPP)
      Chapter 45.  Print Servers
      Unix/Linux Printing
      Configuring Windows Print Servers
      Installing and Configuring Printers on Windows Servers
      Printing Under NetWare
      Hardware-Based Print ServersPrint Server Appliances
    Part VIII.  System and Network Security
      Chapter 46.  Basic Security Measures Every Network Administrator Needs to Know
      Policies and Procedures
      Physical Security Measures
      The Two Sides of Security
      System Daemons and Services
      Removing Dead Wood
      Delegating Authority
      Don't Forget About Firewalls
      Chapter 47.  Auditing and Other Monitoring Measures
      Unix and Linux Systems
      Configuring Windows NT 4.0 Auditing Policies
      Configuring Windows 2000 and Windows 2003 Auditing Policies
      Auditing Windows XP Professional Computers
      Novell Security
      NetWare 6 Advanced Audit Service
      Chapter 48.  Security Issues for Wide Area Networks
      You've Been Targeted!
      Computer Viruses, Trojan Horses, and Other Destructive Programs
      Your Network Under FireCommon Attacks
      Network Probes
      Spoofing and Impersonation
      If It's Too Good to Be True, It Isn't
      Preventative Measures
      Staying on Top of Security Issues
      Chapter 49.  Firewalls
      What Is a Firewall?
      Packet Filters
      Intrusion Detection (Stateful Inspection)
      Proxy Servers
      Hybrids
      Inexpensive Firewalls for SOHO Environments
      How Do You Know That the Firewall Is Secure?
      Chapter 50.  Virtual Private Networks (VPNs) and Tunneling
      What Is a VPN?
      Protocols, Protocols, and More Protocols!
      IPSec Protocols
      The Point-to-Point Tunneling Protocol (PPTP)
      Layer Two Tunneling Protocol (L2TP)
      Chapter 51.  Encryption Technology
      Computers and Privacy
      What Is Encryption?
      Digital Certificates
      Pretty Good Privacy (PGP)
    Part IX.  Troubleshooting Networks
      Chapter 52.  Strategies for Troubleshooting Network Problems
      A Documented Network Is Easier to Troubleshoot
      Problem-Solving Techniques
      Pitfalls of Troubleshooting
      Chapter 53.  Network Testing and Analysis Tools
      Basics: Testing Cables
      Network and Protocol Analyzers
      Simple Network Management Protocol (SNMP)
      Chapter 54.  Troubleshooting Small Office and Home Office (SOHO) Networks
      Power Troubles
      Computer Configuration Issues
      Component ProblemsYou Can't Get There from Here
      Secure Those Cables!
      Firewall Problems
      Keeping Your Network Healthy
      Wireless Networking Problems
      When All Else Fails
    Part X.  Upgrading Network Hardware
      Chapter 55.  Upgrading from ARCnet to Ethernet or Token-Ring
      ARCnet Overview
      Upgrading to Ethernet or Token-Ring
      Chapter 56.  Upgrading from Token-Ring to Ethernet
      The Future of Token-Ring
      Phasing Ethernet into the Token-Ring Network
      Replacing All Token-Ring Equipment
      Chapter 57.  Upgrading Older Ethernet Networks
      Upgrading from 10BASE-2 or 10BASE-T
      Hardware and Software Factors to Consider for 10BASE-2, 10BASE-T, and 100BASE-T
      Connecting Networks That Use Different Cables or Topologies
      Other Possibilities
      Upgrading the Network Backbone to Gigabit Ethernet
      Using Gigabit Ethernet for High-End Servers
      Gigabit Ethernet Can Cover the Distance
      10 Gigabit Ethernet Is Becoming Economically Feasible
      Chapter 58.  Upgrading from Bridges and Hubs to Routers and Switches
      Growing Beyond a Small LAN
      From Bridges to Routers
      From Bridges to Switches
      Chapter 59.  Adding Wireless Networking to a LAN
      Why Go Wireless?
      Choosing Locations for Access Points
      Security Issues
    Part XI.  Migration and Integration
      Chapter 60.  Migrating from NetWare to Windows 2000 or Windows Server 2003
      Windows Protocols and Services
      Microsoft's Services for NetWare Version 5.0 (SFN)
      Chapter 61.  Migration and Integration Issues: Windows NT, Windows 2000, Windows 2003, Unix, and Linux
      Windows 2000/2003 Support for Unix Protocols and Utilities
      Managing the FTP Service on a Windows Server 2003
      Applications
      Microsoft Windows Services for Unix 3.0
      Samba
      Sun Network Information System
      Chapter 62.  Migrating from Windows NT 4.0 to Windows 2000, Windows 2003, and Windows XP
      Do You Need to Upgrade the Operating System or Applications?
      Upgrading to Windows 2000 Server
      Before You Begin
      Implementing a Migration to the Active Directory for Windows 2000
      Upgrading Windows NT 4.0 or Windows 2000 to Windows 2003 Servers
      Chapter 63.  Migration and Integration: NetWare, Unix, and Linux
      Why Use Unix or Linux?
      Key Differences Between Unix/Linux and NetWare
      Moving User Accounts
      Networking Protocols
      Applications
      NetWare for Linux
    Appendixes
      Appendix A.  Overview of the OSI Seven-Layer Networking Reference Model
      It's Only a Model!
      Appendix B.  Networking Glossary
      Glossary
      Appendix C.  Internet Resources for Network Administrators
      Standards Organizations
      Network Hardware and Software Manufacturers
      Wireless Networking
      Security
      Appendix D.  The Lightweight Directory Access Protocol
      A Quick Introduction to LDAP
      The X.500 Protocols and Standards
      The Lightweight Directory Access Protocol
      LDAP Directories
      Appendix E.  Introduction to Setting Up a SOHO Network
      Assessing Your Requirements: What Do You Need?
      SOHO Network Topologies
      Backup Solutions for a SOHO Network
    Index


Upgrading and Repairing Networks
Upgrading and Repairing Networks (5th Edition)
ISBN: 078973530X
EAN: 2147483647
Year: 2003
Pages: 434

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net