Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Network Fundamentals
Figure 1.1:
A small LAN
Figure 1.2:
A sample network including servers and workstations
Figure 1.3:
A peer-to-peer network
Figure 1.4:
A client/server network
Figure 1.5:
An example of a physical bus topology
Figure 1.6:
A typical star topology with a hub
Figure 1.7:
A typical ring topology
Figure 1.8:
A typical mesh topology
Figure 1.9:
An example of an ad hoc RF network
Figure 1.10:
An example of an RF multipoint network
Figure 1.11:
Backbone and segments on a sample network
Figure 1.12:
Thicknet and vampire taps
Figure 1.13:
An N-series connector
Figure 1.14:
A stripped-back Thinnet
Figure 1.15:
A male and female BNC connector
Figure 1.16:
RJ-11 and RJ-45 connectors
Figure 1.17:
An example of an ST connector
Figure 1.18:
A sample SC connector
Chapter 2: The OSI Model
Figure 2.1:
The Open Systems Interconnect (OSI) model
Figure 2.2:
How data travels through the layers of the OSI model
Figure 2.3:
A sample physical bus topology
Figure 2.4:
A physical star topology
Figure 2.5:
A physical ring topology
Figure 2.6:
A physical mesh topology
Figure 2.7:
A sample network interface card
Figure 2.8:
A repeater installed on a network
Figure 2.9:
The 5-4-3 Rule for network repeaters
Figure 2.10:
A standard hub
Figure 2.11:
MAUs in a Token Ring network
Figure 2.12:
Sublayers of the Data Link layer
Figure 2.13:
The IEEE standards’ relationship to the OSI model
Figure 2.14:
A sample network before and after bridging
Figure 2.15:
A switch builds a table of all MAC addresses of all connected stations
Figure 2.16:
Address conflicts on a network
Figure 2.17:
Routing components
Figure 2.18:
Initiating communications using a connection-oriented service
Chapter 3: TCP/IP Fundamentals
Figure 3.1:
A comparison of the seven-layer OSI model, the four-layer DoD model, and how TCP/IP maps to each model
Figure 3.2:
A datagram with its TCP header
Figure 3.3:
A datagram with TCP and IP headers
Figure 3.4:
The components in a TCP/IP block diagram
Figure 3.5:
The IP address structure
Figure 3.6:
How a proxy server works
Figure 3.7:
The IP Address tab of the TCP/IP Properties dialog box
Figure 3.8:
The Bindings tab of the TCP/IP Properties dialog box
Figure 3.9:
The Gateway tab of the TCP/IP Properties dialog box
Figure 3.10:
The WINS Configuration tab of the TCP/IP Properties dialog box
Figure 3.11:
The DNS Configuration tab of the TCP/IP Properties dialog box
Chapter 4: TCP/IP Utilities
Figure 4.1:
Output of the
netstat
command without any switches
Figure 4.2:
Sample output of the
netstat -a
command
Figure 4.3:
Sample output of the
netstat -e
command
Figure 4.4:
Sample output of the
netstat -r
command
Figure 4.5:
Sample output of the
nbtstat -a
command
Figure 4.6:
Sample output of the
nbtstat -c
command
Figure 4.7:
Sample output of the
nbtstat -n
command
Figure 4.8:
Sample output of the
nbtstat -r
command
Figure 4.9:
Sample output of the
nbtstat -S
command
Figure 4.10:
Sample output of the
nbtstat -s
command
Figure 4.11:
Sample output produced by using the /all switch
Figure 4.12:
Sample tracert output
Figure 4.13:
The Windows 95/98 and NT Telnet utility
Figure 4.14:
Using Telnet to find out if your SMTP mail system is responding
Chapter 5: Major Network Operating Systems
Figure 5.1:
The NetWare command-line console
Figure 5.2:
The Monitor menu-based utility
Figure 5.3:
The NetWare architecture
Figure 5.4:
A sample NDS Tree
Figure 5.5:
A NetWare Administrator screen
Figure 5.6:
Sample network and a sample NDS tree
Figure 5.7:
Gateway Services for NetWare (GSNW) operation
Figure 5.8:
Windows NT architecture
Figure 5.9:
An NTDS network
Figure 5.10:
User Manager for Domains
Figure 5.11:
The basic Macintosh GUI
Figure 5.12:
Mac OS X
Chapter 6: Network Installation and Upgrades
Figure 6.1:
Comparing a power spike and a power surge
Figure 6.2:
Comparing power underage problems
Figure 6.3:
A sample log file from the Windows NT Event Viewer
Figure 6.4:
A typical UTP installation
Figure 6.5:
A sample DB-25 female SCSI connector
Figure 6.6:
Male Centronics-50 SCSI connector
Figure 6.7:
A high-density, 68-pin SCSI connector
Figure 6.8:
A sample male and female D-type connector
Figure 6.9:
A sample BNC connector
Figure 6.10:
A typical RJ-45 connector
Figure 6.11:
An IBM data connector
Figure 6.12:
A jumper and how it is used
Figure 6.13:
The DIP switch
Figure 6.14:
The Select Network Component Type window
Figure 6.15:
Selecting the software you want to install
Figure 6.16:
Choosing a primary network logon
Figure 6.17:
The Network and Dial-up Connections window
Figure 6.18:
NDC with the NetWare client and NWLink installed
Figure 6.19:
The NetWare default server/tree option screen
Figure 6.20:
An example of a crimper
Figure 6.21:
Using a punchdown tool
Figure 6.22:
An example of a punchdown tool
Chapter 7: WAN and Remote Access Technologies
Figure 7.1:
A local PSTN (or POTS) network
Figure 7.2:
A typical frame relay configuration
Figure 7.3:
A PPTP implementation connecting two LANs over the Internet
Figure 7.4:
A workstation is connected to a corporate LAN over the Internet using PPTP
Chapter 8: Network Access and Security
Figure 8.1:
Two networks with an ACL-enabled router
Figure 8.2:
A firewall with a DMZ
Figure 8.3:
Protocol switching with and without a dead zone
Figure 8.4:
A hacker denied by a dynamic state list
Figure 8.5:
A packet going to a proxy
Figure 8.6:
IP spoofing
Figure 8.7:
Public key encryption
Chapter 9: Fault Tolerance and Disaster Recovery
Figure 9.1:
Disk mirroring
Figure 9.2:
Disk duplexing
Figure 9.3:
How disk striping works
Figure 9.4:
The amount of data backed up with a full backup
Figure 9.5:
The amount of data backed up in a differential backup
Figure 9.6:
The amount of data backed up with an incremental backup
Figure 9.7:
Grandfather-Father-Son rotation
Chapter 10: Network Troubleshooting
Figure 10.1:
TCP/IP DNS properties for the misconfigured workstation
Figure 10.2:
A sample
CONSOLE.LOG
file
Figure 10.3:
Sample Log event types and their associated icons
Figure 10.4:
A sample System Log (note the different error types and event IDs)
Figure 10.5:
The Event Detail dialog box for an event listed in Figure 10.4
Figure 10.6:
The Security Log in Event Viewer
Figure 10.7:
The Security Log event types and their associated icons
Figure 10.8:
A sample Application event log
Figure 10.9:
A standard Ethernet 10BaseT cable
Figure 10.10:
A standard Ethernet 10BaseT crossover cable
Figure 10.11:
A hardware loopback and its connections
Figure 10.12:
Use of a common tone generator and locator
Previous page
Table of content
Next page
Network+ Study Guide
ISBN: 470427477
EAN: N/A
Year: 2002
Pages: 151
BUY ON AMAZON
The CISSP and CAP Prep Guide: Platinum Edition
Cryptography
Business Continuity Planning and Disaster Recovery Planning
Initiation of the System Authorization Process
Appendix B Glossary of Terms and Acronyms
Appendix D The Information System Security Engineering Professional (ISSEP) Certification
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Individual change
Organizational change
Leading change
Part II - The Applications
Cultural change
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 6. Use Your Treo as a Modem
Hacks 2339: Introduction
Hack 31. Analyze Traffic with Ethereal
Appendix A. Wireless Standards
Section A.12. BSS Versus IBSS
InDesign Type: Professional Typography with Adobe InDesign CS2
Type Classification
Numbered Lists
Working with Rows and Columns
Creating Default Styles
Your Grid Tool Kit
DNS & BIND Cookbook
Introduction
Monitoring a Name Server
Delegating a Subdomain
Protecting a Name Server from Spoofing
Looking Up Records with dig
MPLS Configuration on Cisco IOS Software
MPLS VPN Architecture and Terminology
Carrier Supporting Carriers
Virtual Private LAN Service (VPLS)
MPLS QoS Operating Modes
Implementing MPLS QoS for Layer 2 VPN Implementations
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies