Flylib.com
Upgrading and Repairing Networks (5th Edition)
Upgrading and Repairing Networks (5th Edition)
ISBN: 078973530X
EAN: 2147483647
Year: 2003
Pages: 434
Authors:
Scott Mueller
,
Terry William Ogletree
,
Mark Edward Soper
BUY ON AMAZON
Main Page
Table of content
Copyright
About the Authors
Acknowledgments
We Want to Hear from You
Introduction
Who Should Use This Book?
What Will You Find Inside?
What s New in This Edition
What s Missing from This Edition?
Part I: Up Front: Network Planning and Design Concepts
Chapter 1. A Short History of Computer Networking
Chapter 2. Overview of Network Topologies
LAN Topologies
Building and Campus Topologies
A Multi-Tiered Network Topology
Chapter 3. Network Design Strategies
Planning a Logical Network Design
Planning and Design Components
The Physical Network
Planning Resources
Chapter 4. Upgrading Strategies and Project Management
Where Do You Start?
Determining When an Upgrade Is NecessaryThe Evaluation Process
What Resources Are Needed for the Upgrade?
Planning an Upgrade
Testing the Plan
Deployment
User Training
Closing the BookDocumenting What Has Changed and Why
Other Considerations for Upgrading
Chapter 5. Protecting the Network: Preventative Maintenance Techniques
Power Conditioning and Uninterruptible Power Supplies (UPSs)
Network Monitoring
Server and Workstation Backups
Routine Maintenance
Building Redundancy into the Network
Recovery Planning
Justifying Preventative Maintenance
Part II: Physical Networking Components
Chapter 6. Wiring the NetworkCables, Connectors, Concentrators, and Other Network Components
Structured Wiring
Important Definitions
Physical Cable Types
Terminations and Connections
Telecommunications Rooms
Chapter 7. Network Interface Cards
Choosing a Hardware Bus Type
The Wired for Management (WfM) Initiative and Wake on LAN (WOL) Technology
Multi-Homed Systems
Load Balancing and Dual-Redundant Network Controllers
Software Drivers
IRQs and IO Ports
Troubleshooting Network Cards
Chapter 8. Network Switches
How Switches Work
Switch Hardware Types
Switch Troubleshooting and Management
Chapter 9. Virtual LANs
Virtual LANs and Network Topologies
Switching Based on Network Frames
Implicit and Explicit Tagging
Using Explicit Tagging on the Network Backbone
Switch StandardsThe IEEE Standards
What Kind of Switch Should You Buy?
Chapter 10. Routers
What Routers Do
The Difference Between Routable Protocols and Routing Protocols
When Do You Need to Use a Router?
Router Ports and Connections
Configuring Routers
Routers Come in All Sizes
Chapter 11. Network Attached Storage and Storage Area Networks
Local Versus Networked Storage Devices
Network Attached Storage
Storage Area Networks
Basic SANs: Arbitrated Loops
Using a Fabric Switched Topology for SANs
A Mixed Topology of Loops and Switches
IP SANs and the Future
What Kind of NAS or SAN Solution Should You Use?
Part III: Low-Level Network Protocols
Chapter 12. The IEEE LANMAN Committee Networking Standards
What Is the LANMAN Committee?
Obtaining the IEEE 802 Standards Documents Free
Chapter 13. The Oldest LAN Protocol Is Still Kicking: ARCnet
Overview of ARCnet
Troubleshooting ARCnet
Chapter 14. Ethernet: The Universal Standard
A Short History of Ethernet
Collisions: What Are CSMACA and CSMACD?
Restrictions on Legacy Ethernet Topologies
Using a Bus Topology
Using a Star Topology
Hybrid LAN Topologies
Using a Backbone to Connect the Enterprise
Ethernet Frames
Fast Ethernet (IEEE 802.3u) and Gigabit Ethernet (IEEE 802.3z)
Ethernet Problems
Ethernet Errors
Monitoring Errors
Part IV: Dedicated Connections and WAN Protocols
Chapter 15. Dial-Up Connections
The Point-to Point Protocol and the Serial Line Internet Protocol
The Serial Line Internet Protocol (SLIP)
The Point-to-Point Protocol (PPP)
An Example: Configuring a Windows XP Professional Client
When Dial-Up Isn t Fast Enough
Chapter 16. Dedicated Connections
Leased Lines
Asynchronous Transfer Mode (ATM)
The Importance of Frame Relay and the X.25 Interface
Chapter 17. Digital Subscriber Lines (DSL) Technology
DSL and Cable Modems
The Future of DSL
Chapter 18. Using a Cable Modem
How Cable Modems Work
How Cable Modems Differ from xDSL Broadband Access
The Data Over Cable Service Interface Specification (DOCSIS)
Which Should You ChooseCable or DSL?
Part V: Wireless Networking Protocols
Chapter 19. Introduction to Wireless Networking
Why Wireless Networks Are Inevitable
Access Points and Ad Hoc Networks
Physical Transmission Technologies
The IEEE 802.11 Wireless Standard
Sources of Interference for Wireless Networks
Chapter 20. IEEE 802.11b: It s Here and It s Inexpensive
Why Wi-Fi?
What to Look For When Using 802.11b Networking
Do You Need a Wireless Network?
Connecting the Wireless Network to a Wired LAN
Dual-Mode Access Points
Chapter 21. Faster Service: IEEE 802.11a
Overview of the IEEE 802.11a Standard
Chapter 22. The IEEE 802.11g Standard
Overview of the 802.11g Standard
Installing Linksys Wireless-G Broadband Router (Model Number WRT54G)
Installing and Configuring a Wireless Network Adapter
Which Wireless Protocol Should You Use?
Chapter 23. Bluetooth Wireless Technology
The Bluetooth Special Interest Group (SIG)
General Overview of Bluetooth
Piconets and Scatternets
Bluetooth Device Modes
SCO and ACL Links
What Are Bluetooth Profiles?
Bluetooth Is More Than a Wireless Communication Protocol
Chapter 24. Other Wireless Technologies
Instant Messaging and Consumer Devices
Wireless Security
Personal Area Networks (PANs)
Part VI: LAN and WAN Network, Service, and Application Protocols
Chapter 25. Overview of the TCPIP Protocol Suite
TCPIP and the OSI Reference Model
The Internet Protocol (IP)
The Address Resolution ProtocolResolving IP Addresses to Hardware Addresses
The Transmission Control Protocol (TCP)
The User Datagram Protocol (UDP)
Ports, Services, and Applications
The Internet Control Message Protocol (ICMP)
Chapter 26. Basic TCPIP Services and Applications
The File Transfer Protocol (FTP)
The Telnet Protocol
Using Telnet and FTP with a Firewall
The R-Utilities
The Finger Utility
Other Services and Applications Built on the TCPIP Suite
Chapter 27. Internet Mail Protocols: POP3, SMTP, and IMAP
How SMTP Works
Putting It All Together
The Post Office Protocol (POP3)
The Internet Message Access Protocol Version 4 (IMAP4)
Chapter 28. Troubleshooting Tools for TCPIP Networks
Checking the Host System s Configuration First
Using ping and tracert to Check Connectivity
Using the nslookup Command to Troubleshoot Name Resolution Issues
Other Useful Commands
Chapter 29. BOOTP and Dynamic Host Configuration Protocol (DHCP)
What Is BOOTP?
Taking BOOTP One Step Further: DHCP
An Example: Installing and Configuring a DHCP Server on Windows 20002003
Using DHCP with Red Hat Linux
Chapter 30. Network Name Resolution
Hardware Versus Protocol Addresses
NetBIOS
Installing and Configuring WINS on Windows 20002003 Servers
TCPIP Names
Installing DNS on a Windows 2000 or 2003 Server
Network Information Service
Chapter 31. Using the Active Directory
Early Directories
Objects and Attributes
What Is a Domain Tree? What Is a Forest?
The Active Directory and Dynamic DNS
Active Directory Service Interfaces (ADSI)
The Active Directory Schema
Finding Objects in the Active Directory
Windows Server 2003: New Active Directory Features
Installing the Active Directory on a Windows Server 2003 Computer
Chapter 32. Overview of Novell NetWare IPXSPX
Using the Novell Proprietary Protocols
Connectionless Service and Protocols
Connection-Oriented Service and Protocols
Internetwork Packet Exchange (IPX)
Sequenced Packet Exchange (SPX)
NetWare Core Protocol (NCP)
NetWare Security Guidelines
NCP Protocol Independence
Chapter 33. Overview of the Novell Bindery and Novell Directory Services
Understanding NetWare Directory Structures
Using Novell Directory Services
Chapter 34. Expanding and Enhancing NDS: NetWare s eDirectory
Basics of the eDirectory
The eDirectory Can Be Installed on Many Different Operating Systems
Options to Consider for Installing the eDirectory
New Features the eDirectory Delivers
Chapter 35. File Server Protocols
Why Should You Read This Chapter?
Server Message Block (SMB) and the Common Internet File System (CIFS)
NetWare Core Protocol (NCP)
Unix Network File System (NFS)
Microsoft Distributed File System (DFS): Windows 2000 and Windows Server 2003
Chapter 36. The Hypertext Transfer Protocol
It All Started with the World Wide Web Consortium (W3C) at CERN
What Is HTTP?
URLs, URIs, and URNs
Chapter 37. Routing Protocols
Basic Types of Routing Protocols
Multi-Protocol Label Switching
Chapter 38. The Secure Sockets Layer (SSL) Protocol
Symmetric and Asymmetric Encryption
Does SSL Provide Enough Security for Internet Transactions?
OpenSource SSL
Chapter 39. Introduction to the IPv6 Protocol
What s the Difference Between IPv4 and IPv6?
The IPv6 Headers
Other IPv6 Considerations
The Future of IPv6
Part VII: Network User and Resource Management
Chapter 40. Windows NT Domains
Workgroups and Domains
Windows NT User Groups
Managing User Accounts
Passwords and Policies
Strategies to Minimize Logon Problems
Chapter 41. Windows 2000 and Windows Server 2003 User and Computer Management Utilities
The Microsoft Management Console
User Management
Computer Management
Windows 2000 User Groups
Chapter 42. Managing Unix and Linux Users
User Administration
Network Information Service (NIS)
Common Login Problems
Chapter 43. Rights and Permissions
User-Level and Share-Level Security
Assigning User Rights for Windows 2000, Server 2003, and XP
Windows NT20002003 NTFS Standard Permissions and Special Permissions
User Groups Make Managing User Rights Easier
User Groups in Windows 2000 and 2003
Active Directory Groups
NetWare
Unix and Linux
Chapter 44. Network Printing Protocols
Printing Protocols and Printing Languages
Data Link Control Protocol (DLC)
Internet Printing Protocol (IPP)
Chapter 45. Print Servers
UnixLinux Printing
Configuring Windows Print Servers
Installing and Configuring Printers on Windows Servers
Printing Under NetWare
Hardware-Based Print ServersPrint Server Appliances
Part VIII: System and Network Security
Chapter 46. Basic Security Measures Every Network Administrator Needs to Know
Policies and Procedures
Physical Security Measures
The Two Sides of Security
System Daemons and Services
Removing Dead Wood
Delegating Authority
Don t Forget About Firewalls
Chapter 47. Auditing and Other Monitoring Measures
Unix and Linux Systems
Configuring Windows NT 4.0 Auditing Policies
Configuring Windows 2000 and Windows 2003 Auditing Policies
Auditing Windows XP Professional Computers
Novell Security
NetWare 6 Advanced Audit Service
Chapter 48. Security Issues for Wide Area Networks
You ve Been Targeted
Computer Viruses, Trojan Horses, and Other Destructive Programs
Your Network Under FireCommon Attacks
Network Probes
Spoofing and Impersonation
If It s Too Good to Be True, It Isn t
Preventative Measures
Staying on Top of Security Issues
Chapter 49. Firewalls
What Is a Firewall?
Packet Filters
Intrusion Detection (Stateful Inspection)
Proxy Servers
Hybrids
Inexpensive Firewalls for SOHO Environments
How Do You Know That the Firewall Is Secure?
Chapter 50. Virtual Private Networks (VPNs) and Tunneling
What Is a VPN?
Protocols, Protocols, and More Protocols
IPSec Protocols
The Point-to-Point Tunneling Protocol (PPTP)
Layer Two Tunneling Protocol (L2TP)
Chapter 51. Encryption Technology
Computers and Privacy
What Is Encryption?
Digital Certificates
Pretty Good Privacy (PGP)
Part IX: Troubleshooting Networks
Chapter 52. Strategies for Troubleshooting Network Problems
A Documented Network Is Easier to Troubleshoot
Problem-Solving Techniques
Pitfalls of Troubleshooting
Chapter 53. Network Testing and Analysis Tools
Basics: Testing Cables
Network and Protocol Analyzers
Simple Network Management Protocol (SNMP)
Chapter 54. Troubleshooting Small Office and Home Office (SOHO) Networks
Power Troubles
Computer Configuration Issues
Component ProblemsYou Can t Get There from Here
Secure Those Cables
Firewall Problems
Keeping Your Network Healthy
Wireless Networking Problems
When All Else Fails
Part X: Upgrading Network Hardware
Chapter 55. Upgrading from ARCnet to Ethernet or Token-Ring
ARCnet Overview
Upgrading to Ethernet or Token-Ring
Chapter 56. Upgrading from Token-Ring to Ethernet
The Future of Token-Ring
Phasing Ethernet into the Token-Ring Network
Replacing All Token-Ring Equipment
Chapter 57. Upgrading Older Ethernet Networks
Upgrading from 10BASE-2 or 10BASE-T
Hardware and Software Factors to Consider for 10BASE-2, 10BASE-T, and 100BASE-T
Connecting Networks That Use Different Cables or Topologies
Other Possibilities
Upgrading the Network Backbone to Gigabit Ethernet
Using Gigabit Ethernet for High-End Servers
Gigabit Ethernet Can Cover the Distance
10 Gigabit Ethernet Is Becoming Economically Feasible
Chapter 58. Upgrading from Bridges and Hubs to Routers and Switches
Growing Beyond a Small LAN
From Bridges to Routers
From Bridges to Switches
Chapter 59. Adding Wireless Networking to a LAN
Why Go Wireless?
Choosing Locations for Access Points
Security Issues
Part XI: Migration and Integration
Chapter 60. Migrating from NetWare to Windows 2000 or Windows Server 2003
Windows Protocols and Services
Microsoft s Services for NetWare Version 5.0 (SFN)
Chapter 61. Migration and Integration Issues: Windows NT, Windows 2000, Windows 2003, Unix, and Linux
Windows 20002003 Support for Unix Protocols and Utilities
Managing the FTP Service on a Windows Server 2003
Applications
Microsoft Windows Services for Unix 3.0
Samba
Sun Network Information System
Chapter 62. Migrating from Windows NT 4.0 to Windows 2000, Windows 2003, and Windows XP
Do You Need to Upgrade the Operating System or Applications?
Upgrading to Windows 2000 Server
Before You Begin
Implementing a Migration to the Active Directory for Windows 2000
Upgrading Windows NT 4.0 or Windows 2000 to Windows 2003 Servers
Chapter 63. Migration and Integration: NetWare, Unix, and Linux
Why Use Unix or Linux?
Key Differences Between UnixLinux and NetWare
Moving User Accounts
Networking Protocols
Applications
NetWare for Linux
Appendixes
Appendix A. Overview of the OSI Seven-Layer Networking Reference Model
It s Only a Model
Appendix B. Networking Glossary
Glossary
Appendix C. Internet Resources for Network Administrators
Standards Organizations
Network Hardware and Software Manufacturers
Wireless Networking
Security
Appendix D. The Lightweight Directory Access Protocol
A Quick Introduction to LDAP
The X.500 Protocols and Standards
The Lightweight Directory Access Protocol
LDAP Directories
Appendix E. Introduction to Setting Up a SOHO Network
Assessing Your Requirements: What Do You Need?
SOHO Network Topologies
Backup Solutions for a SOHO Network
Index
Index SYMBOL
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index J
Index K
Index L
Index M
Index N
Index O
Index P
Index Q
Index R
Index S
Index T
Index U
Index V
Index W
Index X
Index Y
Upgrading and Repairing Networks (5th Edition)
ISBN: 078973530X
EAN: 2147483647
Year: 2003
Pages: 434
Authors:
Scott Mueller
,
Terry William Ogletree
,
Mark Edward Soper
BUY ON AMAZON
Beginning Cryptography with Java
Message Digests, MACs, and HMACs
Key and Certificate Management Using Keystores
Appendix A Solutions to Exercises
Appendix B Algorithms Provided by the Bouncy Castle Provider
Appendix C Using the Bouncy Castle API for Elliptic Curve
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.1 Install OpenSSH to Replace the Remote Access Protocols with Encrypted Versions
Step 4.4 How to Generate a Key Using PuTTY
Step 4.6 How to use PuTTY Passphrase Agents
Step 5.1 General Troubleshooting
Appendix - Sample sshd_config File
Software Configuration Management
Configuration Control
Configuration Status Accounting
Configuration Management and Data Management
Appendix D Problem Change Report
Appendix J Document Change Request (DCR)
Microsoft Office Visio 2007 Step by Step (Step By Step (Microsoft))
Working with Groups
Tracking Project Details with Gantt Charts
Customizing the Layout of Organization Charts
Creating Scaled Office Spaces
Storing Information with Network Shapes
.NET-A Complete Development Cycle
Visual Studio.NET: Platform of Choice
The Project Vision and Business Case
Analysis of the GDI+ Extensions Requirements
Breakdown of the Code Modules
Secure Web Applications
The Oracle Hackers Handbook: Hacking and Defending Oracle
The Oracle Network Architecture
Attacking the Authentication Process
Oracle and PL/SQL
Indirect Privilege Escalation
Defeating Virtual Private Databases
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies