Flylib.com
Upgrading and Repairing Networks (5th Edition)
Upgrading and Repairing Networks (5th Edition)
ISBN: 078973530X
EAN: 2147483647
Year: 2006
Pages: 411
Authors:
Scott Mueller
,
Terry William Ogletree
,
Mark Edward Soper
BUY ON AMAZON
Upgrading and Repairing Networks
Table of Contents
Copyright
About the Authors
Acknowledgments
We Want to Hear from You
Reader Services
Introduction
Part I: Up Front: Network Planning and Design Concepts
Chapter 1. A Short History of Computer Networking
Chapter 2. Overview of Network Topologies
LAN Topologies
Building and Campus Topologies
Multi-Tiered Network Topology
Chapter 3. Network Design Strategies
Planning a Logical Network Design
Planning and Design Components
The Physical Network
Planning Resources
Chapter 4. Upgrading Strategies and Project Management
Where Do You Start?
Determining When an Upgrade Is NecessaryThe Evaluation Process
What Resources Are Needed for the Upgrade?
Planning an Upgrade
Testing the Plan
Deployment
User Training
Closing the BookDocumenting What Has Changed and Why
Other Considerations for Upgrading
Chapter 5. Protecting the Network: Preventative Maintenance Techniques
Power Conditioning and Uninterruptible Power Supplies (UPSs)
Network Monitoring
Server and Workstation Backups
Routine Maintenance
Building Redundancy into the Network
Recovery Planning
Justifying Preventative Maintenance
Part II: Physical Networking Components
Chapter 6. Wiring the NetworkCables, Connectors, Concentrators, and Other Network Components
Structured Wiring
Important Definitions
Physical Cable Types
Terminations and Connections
Telecommunications Rooms
Chapter 7. Network Interface Cards
Choosing a Hardware Bus Type
The Wired for Management (WfM) Initiative
Multi-Homed Systems
Load Balancing and Dual-Redundant Network Controllers
Software Drivers
IRQs and IO Ports
Troubleshooting Network Cards
Chapter 8. Network Switches
How Switches Work
Switch Hardware Types
Switch Troubleshooting and Management
Chapter 9. Virtual LANs
Virtual LANs and Network Topologies
Switching Based on Network Frames
Implicit and Explicit Tagging
IEEE Standards for Virtual LANs
What Kind of Switch Should You Buy?
Chapter 10. Routers
What Routers Do
The Difference Between Routable Protocols and Routing Protocols
When Do You Need to Use a Router?
Router Ports and Connections
Configuring Routers
Router Chassis Types
Chapter 11. Network Attached Storage (NAS) and Storage Area Networks (SANs)
Local Versus Networked Storage Devices
Network Attached Storage
Storage Area Networks
Basic SANs: Arbitrated Loops
Using a Fabric Switched Topology for SANs
A Mixed Topology of Loops and Switches
IP SANs and iSCSI
What Kind of NAS or SAN Solution Should You Use?
Part III: Low-Level Network Protocols
Chapter 12. The IEEE LANMAN Committee Networking Standards
What Is the LANMAN Committee?
Obtaining the IEEE 802 Standards Documents Free
Chapter 13. Ethernet: The Universal Standard
A Short History of Ethernet
Collisions: What Are CSMACA and CSMACD?
Restrictions on Legacy Ethernet Topologies
Using a Bus Topology
Using a Star Topology
Hybrid LAN Topologies
Using a Backbone to Connect the Enterprise
Ethernet Frames
Fast Ethernet (IEEE 802.3u) and Gigabit Ethernet (IEEE 802.3z)
Ethernet Problems
Ethernet Errors
Monitoring Errors
Part IV: Dedicated Connections and WAN Protocols
Chapter 14. Dial-Up Connections
The Point-to-Point Protocol and the Serial Line Internet Protocol
The Serial Line Internet Protocol (SLIP)
The Point-to-Point Protocol (PPP)
Configuring a Windows XP Professional Client for Dial-Up
When Dial-Up Isn t Fast Enough
Chapter 15. Dedicated Connections
Leased Lines
Asynchronous Transfer Mode (ATM)
The Importance of Frame Relay and the X.25 Interface
Chapter 16. Digital Subscriber Lines (DSL) Technology
DSL and Cable Modems
The Future of DSL
Chapter 17. Using a Cable Modem
How Cable Modems Work
How Cable Modems Differ from xDSL Broadband Access
The Data Over Cable Service Interface Specification (DOCSIS)
Choosing Between Cable and DSL
Part V: Wireless Networking Protocols
Chapter 18. Introduction to Wireless Networking
Why Wireless Networks Have Proliferated
Access Points and Ad Hoc Networks
Physical Transmission Technologies
The IEEE 802.11 Wireless Standard
Sources of Interference for Wireless Networks
Chapter 19. IEEE 802.11b: Wi-Fi Pioneer
Components of an 802.11-Based Wireless Network
Section 802.11. bFirst, But Fading Away
What to Look for in an Access Point
Do You Need a Wireless Network?
Connecting the Wireless Network to a Wired LAN
Dual-Mode Access Points
Why Wi-Fi?
Chapter 20. Faster Service: IEEE 802.11a
Overview of the IEEE 802.11a Standard
Comparing 802.11a with 802.11b and 802.11g
Chapter 21. The IEEE 802.11g Standard
Overview of the 802.11g Standard
Installing a Wireless-G Broadband Router
Installing and Configuring a Wireless Network Adapter
Proprietary Extensions to the IEEE 802.11g Standard
Improving Network Performance with Dual-Band Wireless Technology
Which Wireless Protocol Should You Use?
Chapter 22. Bluetooth Wireless Technology
The Bluetooth Special Interest Group (SIG)
General Overview of Bluetooth
Piconets and Scatternets
Bluetooth Device Modes
SCO and ACL Links
What Are Bluetooth Profiles?
Bluetooth Is More Than a Wireless Communication Protocol
Chapter 23. Security and Other Wireless Technologies
Instant Messaging and Consumer Devices
Wireless Security
Personal Area Networks (PANs)
Part VI: Lan and Wan Network, Service, and Application Protocols
Chapter 24. Overview of the TCPIP Protocol Suite
TCPIP and the OSI Reference Model
The Internet Protocol (IP)
The Address Resolution ProtocolResolving IP Addresses to Hardware Addresses
The Transmission Control Protocol (TCP)
The User Datagram Protocol (UDP)
Ports, Services, and Applications
The Internet Control Message Protocol (ICMP)
Chapter 25. Basic TCPIP Services and Applications
The File Transfer Protocol (FTP)
The Telnet Protocol
Using Telnet and FTP with a Firewall
The R-Utilities
The Finger Utility
Other Services and Applications Built on the TCPIP Suite
Chapter 26. Internet Mail Protocols: POP3, SMTP, and IMAP
How SMTP Works
Putting It All Together
The Post Office Protocol (POP3)
The Internet Message Access Protocol Version 4 (IMAP4)
Chapter 27. Troubleshooting Tools for TCPIP Networks
Checking the Host System s Configuration First
Using ping and tracert to Check Connectivity
Using the nslookup Command to Troubleshoot Name Resolution Issues
Other Useful Commands
Using Network Connection Repair in Windows XP
Chapter 28. BOOTP and Dynamic Host Configuration Protocol (DHCP)
What Is BOOTP?
Taking BOOTP One Step Further: DHCP
Installing and Configuring a DHCP Server on Windows 20002003
Using DHCP with Red Hat Linux
Configuring a Router or WAP to Provide DHCP Services
Chapter 29. Network Name Resolution
Hardware Versus Protocol Addresses
NetBIOS
Installing and Configuring WINS on Windows 20002003 Servers
TCPIP Names
Installing DNS on a Windows Server
Network Information Service
Chapter 30. Using the Active Directory Service
Early Directory Technologies
Objects and Attributes
What Is a Domain Tree? What Is a Forest?
The Active Directory and Dynamic DNS
Active Directory Service Interfaces (ADSI)
The Active Directory Schema
Finding Objects in the Active Directory
The Active Directory Service and Windows Server 2003
New Active Directory Features in Windows Server 2003
Chapter 31. File Server Protocols
Why File Server Protocols are Important
Server Message Block (SMB) and the Common Internet File System (CIFS)
NetWare Core Protocol (NCP)
Unix Network File System (NFS)
Microsoft Distributed File System (DFS)
Chapter 32. The Hypertext Transfer Protocol
The Beginning of HTTP
Defining HTTP
URLs, URIs, and URNs
Chapter 33. Routing Protocols
Basic Types of Routing Protocols
Multi-Protocol Label Switching (MPLS)
Chapter 34. The Secure Sockets Layer (SSL) Protocol
Symmetric and Asymmetric Encryption
Does SSL Provide Enough Security for Internet Transactions?
OpenSource SSL
Chapter 35. Introduction to the IPv6 Protocol
What s the Difference Between IPv4 and IPv6?
The IPv6 Headers
Other IPv6 Considerations
The Future of IPv6
Part VII: Network User and Resource Management
Chapter 36. Windows NT Domains
Workgroups and Domains
Windows NT User Groups
Managing User Accounts
Passwords and Policies
Strategies to Minimize Logon Problems
Chapter 37. Windows 2000 and Windows Server 2003 User and Computer Management Utilities
The Microsoft Management Console
User Management
Computer Management
Windows 2000 User Groups
Chapter 38. Managing Unix and Linux Users
User Administration
Network Information Service (NIS)
Common Login Problems
Chapter 39. Rights and Permissions
User-Level and Share-Level Security
Assigning User Rights for Windows 2000, Server 2003, and XP
NTFS Standard and Special Permissions
User Groups Make Managing User Rights Easier
User Groups in Windows 2000 and Server 2003
Active Directory Groups
NetWare
Unix and Linux
Chapter 40. Network Printing Protocols
Printing Protocols and Printing Languages
Data Link Control Protocol (DLC)
Internet Printing Protocol (IPP)
Chapter 41. Print Servers
UnixLinux Printing
Configuring Windows Print Servers
Installing and Configuring Printers on Windows Servers
Printing Under NetWare
Hardware-Based Print ServersPrint Server Appliances
Part VIII: System and Network Security
Chapter 42. Basic Security Measures Every Network Administrator Needs to Know
Policies and Procedures
Physical Security Measures
The Two Sides of Security
System Daemons and Services
Removing Dead Wood
Delegating Authority
Don t Forget About Firewalls
Chapter 43. Auditing and Other Monitoring Measures
Unix and Linux Systems
Configuring Windows NT 4.0 Auditing Policies
Configuring Windows 2000 and Windows Server 2003 Auditing Policies
Auditing Windows XP Professional Computers
Novell Security
NetWare Auditing Solutions
Chapter 44. Security Issues for Wide Area Networks
You ve Been Targeted
Computer Viruses, Trojan Horses, and Other Destructive Programs
Your Network Under FireCommon Attacks
Network Probes
Spoofing and Impersonation
If It s Too Good to Be True, It Isn t
Preventative Measures
Staying on Top of Security Issues
Chapter 45. Firewalls
What Is a Firewall?
Packet Filters
Intrusion Detection (Stateful Inspection)
Proxy Servers
Hybrids
Inexpensive Firewalls for SOHO Environments
How Do You Know That the Firewall Is Secure?
Chapter 46. Virtual Private Networks (VPNs) and Tunneling
What Is a VPN?
Protocols, Protocols, and More Protocols
IPSec Protocols
The Point-to-Point Tunneling Protocol (PPTP)
Layer Two Tunneling Protocol (L2TP)
Creating a VPN Connection with Windows XP Professional
Selecting a Router with VPN Support
Chapter 47. Encryption Technology
Computers and Privacy
What Is Encryption?
Digital Certificates
Pretty Good Privacy (PGP)
Part IX: Troubleshooting Networks
Chapter 48. Strategies for Troubleshooting Network Problems
A Documented Network Is Easier to Troubleshoot
Problem-Solving Techniques
Pitfalls of Troubleshooting
Chapter 49. Network Testing and Analysis Tools
Basics: Testing Cables
Network and Protocol Analyzers
Simple Network Management Protocol (SNMP)
Chapter 50. Troubleshooting Small Office and Home Office (SOHO) Networks
Power Problems
Computer Configuration Issues
Component ProblemsYou Can t Get There from Here
Secure Those Cables
Firewall Problems
Keeping Your Network Healthy
Wireless Networking Problems
When All Else Fails
Part X: Upgrading Network Hardware
Chapter 51. Upgrading Older Ethernet Networks
Upgrading from 10BASE-2 or 10BASE-T
Hardware and Software Factors to Consider for 10BASE-2, 10BASE-T, and 100BASE-T
Connecting Networks That Use Different Cables or Topologies
Other Possibilities
Upgrading the Network Backbone to Gigabit Ethernet
Using Gigabit Ethernet for High-End Servers
Gigabit Ethernet Can Cover the Distance
Section 10. Gigabit Ethernet Is Becoming Economically Feasible
Chapter 52. Upgrading from Bridges and Hubs to Routers and Switches
Growing Beyond a Small LAN
From Bridges to Routers
From Bridges to Switches
Chapter 53. Adding Wireless Networking to a LAN
Why Go Wireless?
Choosing Locations for Access Points
Security Issues
Part XI: Migration and Integration
Chapter 54. Migrating from NetWare to Windows 2000 or Windows 2003
Windows Protocols and Services
Microsoft s Services for NetWare Version 5.0 (SFN)
Chapter 55. Migration and Integration Issues: Windows NT, Windows 2000, Windows 2003, Unix, and Linux
Windows Server Support for Unix Protocols and Utilities
Managing the FTP Service on Windows Server 2003
Applications
Microsoft Windows Services for Unix 3.5
Samba
Sun Network Information System
Chapter 56. Migrating from Windows NT 4.0 to Windows 2000, Windows 2003, and Windows XP
Do You Need to Upgrade the Operating System or Applications?
Upgrading to Windows 2000 Server
Implementing a Migration to the Active Directory for Windows 2000
Upgrading Windows NT 4.0 or Windows 2000 to Windows Server 2003
Chapter 57. Migration and Integration: NetWare, Unix, and Linux
Why Use Unix or Linux?
Key Differences Between UnixLinux and NetWare
Moving User Accounts
Networking Protocols
Applications
Finding Linux Drivers for Hardware
Novell Open Enterprise Server
Appendixes
Appendix A. Overview of the OSI Seven-Layer Networking Reference Model
It s Only a Model
Appendix B. Networking Glossary
Appendix C. Internet Resources for Network Administrators
Standards Organizations
Network Hardware and Software Manufacturers
Wireless Networking
Security
Appendix D. The Lightweight Directory Access Protocol
A Quick Introduction to LDAP
The X.500 Protocols and Standards
The Lightweight Directory Access Protocol
LDAP Directories
Appendix E. Introduction to Setting Up a SOHO Network
Assessing Your Requirements: What Do You Need?
SOHO Network Topologies
Backup Solutions for a SOHO Network
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Upgrading and Repairing Networks (5th Edition)
ISBN: 078973530X
EAN: 2147483647
Year: 2006
Pages: 411
Authors:
Scott Mueller
,
Terry William Ogletree
,
Mark Edward Soper
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Phase: Speculate
Phase: Close
Judgment Required
Practice: Product Feature List
A Hub Organizational Structure
Oracle Developer Forms Techniques
Timers and Displaying a Clock
Programmatically Canceling a Query
When to Use WHEN-VALIDATE-RECORD and When to Use WHEN-VALIDATE-ITEM
Planting and Growing Trees -Dynamically Adding Nodes Along with Data to an Existing Base Tree
Record Groups and LOVs Based on Objects
SQL Hacks
Hack 6. Dont Perform the Same Calculation Over and Over
Hack 28. Avoid Dividing by Zero
Hack 52. Display Columns As Rows
Hack 87. Generate a Calendar
Hack 89. Choose Any Three of Five
C++ How to Program (5th Edition)
Another C++ Program: Adding Integers
Exercises
Wrap-Up
string Assignment and Concatenation
F.4. The #define Preprocessor Directive: Macros
Programming .Net Windows Applications
Events
Termination Buttons
Class Hierarchy
ADO.NET
Exceptions
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the TNS Listener and Dispatchers
Indirect Privilege Escalation
Defeating Virtual Private Databases
Attacking Oracle PL/SQL Web Applications
Accessing the File System
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies