| | Copyright |
| | About the Author |
| | Acknowledgments |
| | We Want to Hear from You! |
| | Reader Services |
| | Introduction |
| | | Conventions Used in This Book |
| | | How This Book Is Organized |
|
| | Part I: Networking Basics |
| | | Chapter 1. Computer Networking Overview |
| | | What Is a Network? |
| | | Why Network Your Computers? |
| | | PC Networking: How It All Began |
| | | Clients and Servers: What Does It All Mean? |
| | | Network Players: Users and Administrators |
| | | Understanding LAN Data Transmission |
| | | Networking Does Not Require the "All Knowing" |
|
| | | Chapter 2. Different Needs, Different Networks |
| | | Understanding Peer-to-Peer Networking |
| | | Server-Based Networks |
| | | Understanding Network Topologies |
| | | Assessing Your Network Needs |
| | | Planning the Network |
|
| | | Chapter 3. Networking Hardware |
| | | Working with Network Interface Cards |
| | | Working with Network Connectivity Devices |
| | | Some Thoughts on PC Hardware |
|
| | | Chapter 4. Building the Network Infrastructure |
| | | Understanding Network Architectures |
| | | Understanding Ethernet |
| | | Understanding IBM Token-Ring |
| | | Understanding FDDI |
| | | Choosing a Network Connectivity Strategy |
|
| | | Chapter 5. Network Protocols: Real and Imagined |
| | | Understanding the OSI Model |
| | | How the OSI Model Works |
| | | Thoughts on Using a Conceptual Model |
| | | TCP/IP |
| | | IPX/SPX |
| | | Other Network Protocols of Note |
|
|
| | Part II: Getting the Network Up and Running |
| | | Chapter 6. Configuring Peer-to-Peer Networks |
| | | Selecting and Configuring Network Protocols |
| | | Setting Up the Peer-to-Peer Network |
| | | Combining Linux and Windows |
| | | Accessing Windows Workgroup Shares |
| | | A Final Word on Peer-to-Peer Networking |
|
| | | Chapter 7. Network Operating System Overview |
| | | What Is an NOS? |
| | | Client and NOS Interaction |
| | | Configuring a Server with an NOS |
| | | Sharing Folders and Directories |
| | | How Network Printing Works |
|
| | | Chapter 8. Networking with Novell NetWare 6.5 |
| | | NetWare and Networking |
| | | The Netware Network Structure |
| | | Installing NetWare |
| | | Administering a Novell Network |
| | | Working with Volumes and Folders |
| | | Working with Users and Groups |
| | | Configuring Network Clients |
| | | NetWare DNS and DHCP |
|
| | | Chapter 9. Networking with Microsoft Windows Server 2003 |
| | | Understanding the Microsoft Networking Model |
| | | Installing Microsoft Windows Server 2003 |
| | | Choosing a Server's Role |
| | | Understanding Windows Active Directory |
| | | Creating User Accounts |
| | | Sharing Windows Folders |
| | | Understanding Share Permissions |
| | | Windows and NTFS Permissions |
| | | Sharing Printers |
| | | Security and Windows Server 2003 |
|
| | | Chapter 10. Networking with Linux |
| | | Installing Red Hat Linux |
| | | Network Configuration |
| | | Root Configuration |
| | | Selecting Installation Packages |
| | | Booting Your Linux System |
| | | Upgrading Your Linux System Software |
| | | Linux Administrative Tools |
| | | Working with Users |
| | | Working with Red Hat Network Services |
| | | Sharing Network Resources |
| | | Monitoring the System and Network |
|
| | | Chapter 11. Working with Applications on the Network |
| | | Selecting Application Software |
| | | Using Application Software on the Network |
| | | Understanding Microsoft .NET |
| | | Understanding Client/Server Databases |
|
|
| | Part III: Expanding Your Network |
| | | Chapter 12. TCP/IP Network Administration |
| | | Working with IP Addresses |
| | | Configuring IP Addresses |
| | | Working with DHCP |
| | | Understanding DNS |
| | | Routing and Subnetting IP Networks |
| | | Introducing IPv6 |
|
| | | Chapter 13. Expanding a LAN with WAN Technology |
| | | Working with the Plain Old Telephone System |
| | | Working with Dial-up and Dedicated Connections |
| | | The T-Carrier System |
| | | Understanding Switched Networks |
| | | Circuit Switching |
| | | Packet-Switching Networks |
| | | A Word Regarding Remote Access |
|
| | | Chapter 14. How the Internet Works |
| | | Where Did the Internet Come From? |
| | | Working with the File Transfer Protocol |
| | | Understanding Electronic Mail |
| | | Working with the Web |
| | | Other Internet Onramps |
|
| | | Chapter 15. Connecting a Network to the Internet |
| | | Connecting to the Internet |
| | | Getting Your Own Domain Name |
| | | Getting Your IP Addresses |
| | | Sharing an Internet Connection |
| | | Sharing an Internet Connection with Windows Server 2003 |
| | | Working with Proxy Servers |
| | | Understanding Network Address Translation |
|
| | | Chapter 16. Hosting a Web Site |
| | | The Internet and Your Corporate Presence |
| | | Who Will Host Your Web Site? |
| | | Creating a Web Site |
| | | Taking Advantage of an Intranet |
|
| | | Chapter 17. Networking on the Run |
| | | The Evolution of Mobile Computing Devices |
| | | Working with Laptops |
| | | Understanding Remote Access |
| | | Understanding Access Protocols |
| | | Managing Remote Connections |
| | | Working with Virtual Private Networks |
| | | PDAs and the Network |
|
|
| | Part IV: Keeping the Network Running Smoothly |
| | | Chapter 18. Protecting Network Data |
| | | Understanding Hard Drives |
| | | Working with RAID |
| | | Understanding the RAID Flavors |
| | | Backing Up Data |
| | | Working with Uninterruptible Power Supplies |
|
| | | Chapter 19. Network Troubleshooting |
| | | It's Not Always User Error |
| | | Identifying Network Operating System Problems |
| | | Diagnosing Hardware Problems |
| | | Monitoring the Network |
| | | Dealing with Connectivity Issues |
| | | Your Approach to Troubleshooting |
|
| | | Chapter 20. A Network Security Primer |
| | | Administrators and Users |
| | | Working with User Accounts |
| | | Understanding Share Permissions |
| | | Using Groups to Provide Access Levels |
| | | Fighting Against Viruses |
| | | Protecting a Network from Outside Attack |
| | | Understanding Firewalls |
| | | Types of Firewalls |
| | | A Final Word on Network Security |
|
| | | Glossary |
|
| | Index |