List of Figures

Chapter 1: Network Fundamentals

Figure 1.1: A small LAN
Figure 1.2: A sample network including servers and workstations
Figure 1.3: A peer-to-peer network
Figure 1.4: A client/server network
Figure 1.5: An example of a physical bus topology
Figure 1.6: A typical star topology with a hub
Figure 1.7: A typical ring topology
Figure 1.8: A typical mesh topology
Figure 1.9: An example of an ad hoc RF network
Figure 1.10: An example of an RF multipoint network
Figure 1.11: Backbone and segments on a sample network
Figure 1.12: Thicknet and vampire taps
Figure 1.13: An N-series connector
Figure 1.14: A stripped-back Thinnet
Figure 1.15: A male and female BNC connector
Figure 1.16: RJ-11 and RJ-45 connectors
Figure 1.17: An example of an ST connector
Figure 1.18: A sample SC connector

Chapter 2: The OSI Model

Figure 2.1: The Open Systems Interconnect (OSI) model
Figure 2.2: How data travels through the layers of the OSI model
Figure 2.3: A sample physical bus topology
Figure 2.4: A physical star topology
Figure 2.5: A physical ring topology
Figure 2.6: A physical mesh topology
Figure 2.7: A sample network interface card
Figure 2.8: A repeater installed on a network
Figure 2.9: The 5-4-3 Rule for network repeaters
Figure 2.10: A standard hub
Figure 2.11: MAUs in a Token Ring network
Figure 2.12: Sublayers of the Data Link layer
Figure 2.13: The IEEE standards’ relationship to the OSI model
Figure 2.14: A sample network before and after bridging
Figure 2.15: A switch builds a table of all MAC addresses of all connected stations
Figure 2.16: Address conflicts on a network
Figure 2.17: Routing components
Figure 2.18: Initiating communications using a connection-oriented service

Chapter 3: TCP/IP Fundamentals

Figure 3.1: A comparison of the seven-layer OSI model, the four-layer DoD model, and how TCP/IP maps to each model
Figure 3.2: A datagram with its TCP header
Figure 3.3: A datagram with TCP and IP headers
Figure 3.4: The components in a TCP/IP block diagram
Figure 3.5: The IP address structure
Figure 3.6: How a proxy server works
Figure 3.7: The IP Address tab of the TCP/IP Properties dialog box
Figure 3.8: The Bindings tab of the TCP/IP Properties dialog box
Figure 3.9: The Gateway tab of the TCP/IP Properties dialog box
Figure 3.10: The WINS Configuration tab of the TCP/IP Properties dialog box
Figure 3.11: The DNS Configuration tab of the TCP/IP Properties dialog box

Chapter 4: TCP/IP Utilities

Figure 4.1: Output of the netstat command without any switches
Figure 4.2: Sample output of the netstat -a command
Figure 4.3: Sample output of the netstat -e command
Figure 4.4: Sample output of the netstat -r command
Figure 4.5: Sample output of the nbtstat -a command
Figure 4.6: Sample output of the nbtstat -c command
Figure 4.7: Sample output of the nbtstat -n command
Figure 4.8: Sample output of the nbtstat -r command
Figure 4.9: Sample output of the nbtstat -S command
Figure 4.10: Sample output of the nbtstat -s command
Figure 4.11: Sample output produced by using the /all switch
Figure 4.12: Sample tracert output
Figure 4.13: The Windows 95/98 and NT Telnet utility
Figure 4.14: Using Telnet to find out if your SMTP mail system is responding

Chapter 5: Major Network Operating Systems

Figure 5.1: The NetWare command-line console
Figure 5.2: The Monitor menu-based utility
Figure 5.3: The NetWare architecture
Figure 5.4: A sample NDS Tree
Figure 5.5: A NetWare Administrator screen
Figure 5.6: Sample network and a sample NDS tree
Figure 5.7: Gateway Services for NetWare (GSNW) operation
Figure 5.8: Windows NT architecture
Figure 5.9: An NTDS network
Figure 5.10: User Manager for Domains
Figure 5.11: The basic Macintosh GUI
Figure 5.12: Mac OS X

Chapter 6: Network Installation and Upgrades

Figure 6.1: Comparing a power spike and a power surge
Figure 6.2: Comparing power underage problems
Figure 6.3: A sample log file from the Windows NT Event Viewer
Figure 6.4: A typical UTP installation
Figure 6.5: A sample DB-25 female SCSI connector
Figure 6.6: Male Centronics-50 SCSI connector
Figure 6.7: A high-density, 68-pin SCSI connector
Figure 6.8: A sample male and female D-type connector
Figure 6.9: A sample BNC connector
Figure 6.10: A typical RJ-45 connector
Figure 6.11: An IBM data connector
Figure 6.12: A jumper and how it is used
Figure 6.13: The DIP switch
Figure 6.14: The Select Network Component Type window
Figure 6.15: Selecting the software you want to install
Figure 6.16: Choosing a primary network logon
Figure 6.17: The Network and Dial-up Connections window
Figure 6.18: NDC with the NetWare client and NWLink installed
Figure 6.19: The NetWare default server/tree option screen
Figure 6.20: An example of a crimper
Figure 6.21: Using a punchdown tool
Figure 6.22: An example of a punchdown tool

Chapter 7: WAN and Remote Access Technologies

Figure 7.1: A local PSTN (or POTS) network
Figure 7.2: A typical frame relay configuration
Figure 7.3: A PPTP implementation connecting two LANs over the Internet
Figure 7.4: A workstation is connected to a corporate LAN over the Internet using PPTP

Chapter 8: Network Access and Security

Figure 8.1: Two networks with an ACL-enabled router
Figure 8.2: A firewall with a DMZ
Figure 8.3: Protocol switching with and without a dead zone
Figure 8.4: A hacker denied by a dynamic state list
Figure 8.5: A packet going to a proxy
Figure 8.6: IP spoofing
Figure 8.7: Public key encryption

Chapter 9: Fault Tolerance and Disaster Recovery

Figure 9.1: Disk mirroring
Figure 9.2: Disk duplexing
Figure 9.3: How disk striping works
Figure 9.4: The amount of data backed up with a full backup
Figure 9.5: The amount of data backed up in a differential backup
Figure 9.6: The amount of data backed up with an incremental backup
Figure 9.7: Grandfather-Father-Son rotation

Chapter 10: Network Troubleshooting

Figure 10.1: TCP/IP DNS properties for the misconfigured workstation
Figure 10.2: A sample CONSOLE.LOG file
Figure 10.3: Sample Log event types and their associated icons
Figure 10.4: A sample System Log (note the different error types and event IDs)
Figure 10.5: The Event Detail dialog box for an event listed in Figure 10.4
Figure 10.6: The Security Log in Event Viewer
Figure 10.7: The Security Log event types and their associated icons
Figure 10.8: A sample Application event log
Figure 10.9: A standard Ethernet 10BaseT cable
Figure 10.10: A standard Ethernet 10BaseT crossover cable
Figure 10.11: A hardware loopback and its connections
Figure 10.12: Use of a common tone generator and locator




Network+ Study Guide
Network+ Study Guide
ISBN: 470427477
EAN: N/A
Year: 2002
Pages: 151

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net