Even if you aren't a networking professional, Upgrading and Repairing Networks explains those tough networking concepts in a way that won't make you reach for a bottle of aspirin, starting with the fundamentals and working through more advanced concepts. Now in its fourth edition, this industry classic networking reference gives you real world, in-depth explanations of confusing networking architectures and protocols, and helps you track down and repair networking problems that are costing you and/or your company money - right now. Don't be the only networking professional caught in a network meltdown without a copy of this trusty tome at your side.
Author(s): Scott Mueller, Terry W. Ogletree
Edition: 4
Publisher: Que
Year: 2003
Language: English
Pages: 1247
Tags: Библиотека;Компьютерная литература;Компьютерные сети;
UPGRADING AND REPAIRING NETWORKS, Fourth Edition......Page 2
Copyright © 2004 by Que® Publishing......Page 3
Contents......Page 4
About the Authors......Page 20
We Want to Hear from You!......Page 22
Who Should Use This Book?......Page 24
What Will You Find Inside?......Page 25
What’s Missing from This Edition?......Page 28
PART I Up Front: Network Planning and Design Concepts......Page 30
CHAPTER 1 A Short History of Computer......Page 32
CHAPTER 2 Overview of Network Topologies......Page 36
LAN Topologies......Page 37
Building and Campus Topologies......Page 47
A Multi-Tiered Network Topology......Page 51
CHAPTER 3 Network Design Strategies......Page 54
Planning a Logical Network Design......Page 56
Planning and Design Components......Page 61
Planning Resources......Page 64
CHAPTER 4 Upgrading Strategies and Project Management......Page 66
Where Do You Start?......Page 67
Determining When an Upgrade Is Necessary— The Evaluation Process......Page 68
What Resources Are Needed for the Upgrade?......Page 72
Planning an Upgrade......Page 73
Testing the Plan......Page 76
Deployment......Page 77
Other Considerations for Upgrading......Page 78
CHAPTER 5 Protecting the Network: Preventative Maintenance Techniques......Page 80
Power Conditioning and Uninterruptible Power Supplies (UPSs)......Page 81
Server and Workstation Backups......Page 85
Building Redundancy into the Network......Page 90
Justifying Preventative Maintenance......Page 91
PART II Physical Networking Components......Page 94
CHAPTER 6 Wiring the Network— Cables, Connectors, Concentrators, and Other Network Components......Page 96
Structured Wiring......Page 97
Important Definitions......Page 100
Physical Cable Types......Page 104
Terminations and Connections......Page 115
Telecommunications Rooms......Page 122
CHAPTER 7 Network Interface Cards......Page 126
Choosing a Hardware Bus Type......Page 127
The Wired for Management (WfM) Initiative and Wake on LAN (WOL) Technology......Page 133
Multi-Homed Systems......Page 136
Software Drivers......Page 137
IRQs and I/O Ports......Page 139
Troubleshooting Network Cards......Page 142
CHAPTER 8 Network Switches......Page 148
How Switches Work......Page 150
Switch Hardware Types......Page 155
Switch Troubleshooting and Management......Page 158
CHAPTER 9 Virtual LANs......Page 160
Virtual LANs and Network Topologies......Page 161
Switching Based on Network Frames......Page 162
Implicit and Explicit Tagging......Page 164
Using Explicit Tagging on the Network Backbone......Page 166
Switch Standards—The IEEE Standards......Page 167
What Kind of Switch Should You Buy?......Page 169
CHAPTER 10 Routers......Page 170
What Routers Do......Page 171
The Difference Between Routable Protocols and Routing Protocols......Page 173
When Do You Need to Use a Router?......Page 174
Router Ports and Connections......Page 180
Configuring Routers......Page 181
Routers Come in All Sizes......Page 182
CHAPTER 11 Network Attached Storage and Storage Area Networks......Page 186
Local Versus Networked Storage Devices......Page 188
Network Attached Storage......Page 190
Storage Area Networks......Page 192
Basic SANs: Arbitrated Loops......Page 195
Using a Fabric Switched Topology for SANs......Page 199
A Mixed Topology of Loops and Switches......Page 201
What Kind of NAS or SAN Solution Should You Use?......Page 203
PART III Low-Level Network Protocols......Page 206
CHAPTER 12 The IEEE LAN/MAN Committee Networking Standards......Page 208
What Is the LAN/MAN Committee?......Page 210
Obtaining the IEEE 802 Standards Documents Free......Page 214
CHAPTER 13 The Oldest LAN Protocol Is Still Kicking: ARCnet......Page 216
Overview of ARCnet......Page 217
Troubleshooting ARCnet......Page 226
CHAPTER 14 Ethernet: The Universal Standard......Page 228
A Short History of Ethernet......Page 229
Collisions: What Are CSMA/CA and CSMA/CD?......Page 232
Restrictions on Legacy Ethernet Topologies......Page 236
Using a Bus Topology......Page 237
Using a Star Topology......Page 238
Hybrid LAN Topologies......Page 239
Ethernet Frames......Page 241
Fast Ethernet (IEEE 802.3u) and Gigabit Ethernet (IEEE 802.3z)......Page 246
Ethernet Problems......Page 250
Ethernet Errors......Page 253
Monitoring Errors......Page 256
PART IV Dedicated Connections and WAN Protocols......Page 258
CHAPTER 15 Dial-Up Connections......Page 260
The Point-to Point Protocol and the Serial Line Internet Protocol......Page 261
The Serial Line Internet Protocol (SLIP)......Page 262
The Point-to-Point Protocol (PPP)......Page 264
An Example: Configuring a Windows XP Professional Client......Page 268
CHAPTER 16 Dedicated Connections......Page 272
Leased Lines......Page 273
Asynchronous Transfer Mode (ATM)......Page 277
The Importance of Frame Relay and the X.25 Interface......Page 284
CHAPTER 17 Digital Subscriber Lines (DSL) Technology......Page 290
DSL and Cable Modems......Page 291
The Future of DSL......Page 300
CHAPTER 18 Using a Cable Modem......Page 302
How Cable Modems Work......Page 303
How Cable Modems Differ from xDSL Broadband Access......Page 306
The Data Over Cable Service Interface Specification (DOCSIS)......Page 307
Which Should You Choose—Cable or DSL?......Page 308
PART V Wireless Networking Protocols......Page 310
CHAPTER 19 Introduction to Wireless Networking......Page 312
Why Wireless Networks Are Inevitable......Page 314
Access Points and Ad Hoc Networks......Page 316
Physical Transmission Technologies......Page 319
The IEEE 802.11 Wireless Standard......Page 320
Sources of Interference for Wireless Networks......Page 323
CHAPTER 20 IEEE 802.11b: It’s Here and It’s Inexpensive......Page 324
Why Wi-Fi?......Page 325
What to Look For When Using 802.11b Networking......Page 326
Do You Need a Wireless Network?......Page 327
Dual-Mode Access Points......Page 328
CHAPTER 21 Faster Service: IEEE 802.11a......Page 330
Overview of the IEEE 802.11a Standard......Page 331
CHAPTER 22 The IEEE 802.11g Standard......Page 336
Installing Linksys Wireless-G Broadband Router (Model Number WRT54G)......Page 338
Installing and Configuring a Wireless Network Adapter......Page 346
Which Wireless Protocol Should You Use?......Page 349
CHAPTER 23 Bluetooth Wireless Technology......Page 352
The Bluetooth Special Interest Group (SIG)......Page 354
General Overview of Bluetooth......Page 355
Piconets and Scatternets......Page 356
Bluetooth Device Modes......Page 359
SCO and ACL Links......Page 360
What Are Bluetooth Profiles?......Page 361
Bluetooth Is More Than a Wireless Communication Protocol......Page 366
CHAPTER 24 Other Wireless Technologies......Page 368
Instant Messaging and Consumer Devices......Page 369
Wireless Security......Page 370
Personal Area Networks (PANs)......Page 373
PART VI LAN and WAN Network, Service, and Application Protocols......Page 376
CHAPTER 25 Overview of the TCP/IP Protocol Suite......Page 378
TCP/IP and the OSI Reference Model......Page 379
The Internet Protocol (IP)......Page 383
The Address Resolution Protocol—Resolving IP Addresses to Hardware Addresses......Page 399
The Transmission Control Protocol (TCP)......Page 405
The User Datagram Protocol (UDP)......Page 414
Ports, Services, and Applications......Page 416
The Internet Control Message Protocol (ICMP)......Page 417
CHAPTER 26 Basic TCP/IP Services and Applications......Page 422
The File Transfer Protocol (FTP)......Page 423
The Telnet Protocol......Page 438
Using Telnet and FTP with a Firewall......Page 443
The R-Utilities......Page 444
The Finger Utility......Page 450
Other Services and Applications Built on the TCP/IP Suite......Page 451
CHAPTER 27 Internet Mail Protocols: POP3, SMTP, and IMAP......Page 454
How SMTP Works......Page 455
Putting It All Together......Page 461
The Post Office Protocol (POP3)......Page 462
The Internet Message Access Protocol Version 4 (IMAP4)......Page 464
CHAPTER 28 Troubleshooting Tools for TCP/IP Networks......Page 470
Checking the Host System’s Configuration First......Page 471
Using ping and tracert to Check Connectivity......Page 475
Using the nslookup Command to Troubleshoot Name Resolution Issues......Page 492
Other Useful Commands......Page 493
CHAPTER 29 BOOTP and Dynamic Host Configuration Protocol (DHCP)......Page 496
What Is BOOTP?......Page 497
Taking BOOTP One Step Further: DHCP......Page 503
An Example: Installing and Configuring a DHCP Server on Windows 2000/2003......Page 511
Using DHCP with Red Hat Linux......Page 532
CHAPTER 30 Network Name Resolution......Page 536
NetBIOS......Page 538
Installing and Configuring WINS on Windows 2000/2003 Servers......Page 547
TCP/IP Names......Page 554
Installing DNS on a Windows 2000 or 2003 Server......Page 565
Network Information Service......Page 566
CHAPTER 31 Using the Active Directory......Page 568
Early Directories......Page 569
Objects and Attributes......Page 575
What Is a Domain Tree? What Is a Forest?......Page 577
The Active Directory and Dynamic DNS......Page 580
Active Directory Service Interfaces (ADSI)......Page 584
The Active Directory Schema......Page 586
Finding Objects in the Active Directory......Page 594
Windows Server 2003: New Active Directory Features......Page 598
Installing the Active Directory on a Windows Server 2003 Computer......Page 599
CHAPTER 32 Overview of Novell NetWare IPX/SPX......Page 606
Using the Novell Proprietary Protocols......Page 607
Connectionless Service and Protocols......Page 609
Internetwork Packet Exchange (IPX)......Page 610
Sequenced Packet Exchange (SPX)......Page 613
NetWare Core Protocol (NCP)......Page 616
NCP Protocol Independence......Page 620
CHAPTER 33 Overview of the Novell Bindery and Novell Directory Services......Page 622
Understanding NetWare Directory Structures......Page 623
Using Novell Directory Services......Page 633
CHAPTER 34 Expanding and Enhancing NDS: NetWare’s eDirectory......Page 646
The eDirectory Can Be Installed on Many Different Operating Systems......Page 647
Options to Consider for Installing the eDirectory......Page 648
New Features the eDirectory Delivers......Page 650
CHAPTER 35 File Server Protocols......Page 654
Why Should You Read This Chapter?......Page 655
Server Message Block (SMB) and the Common Internet File System (CIFS)......Page 656
NetWare Core Protocol (NCP)......Page 669
Unix Network File System (NFS)......Page 671
Microsoft Distributed File System (DFS): Windows 2000 and Windows Server 2003......Page 684
CHAPTER 36 The Hypertext Transfer Protocol......Page 688
It All Started with the World Wide Web Consortium (W3C) at CERN......Page 689
What Is HTTP?......Page 690
URLs, URIs, and URNs......Page 691
CHAPTER 37 Routing Protocols......Page 696
Basic Types of Routing Protocols......Page 697
Multi-Protocol Label Switching......Page 704
CHAPTER 38 The Secure Sockets Layer (SSL) Protocol......Page 708
Symmetric and Asymmetric Encryption......Page 709
OpenSource SSL......Page 713
CHAPTER 39 Introduction to the IPv6 Protocol......Page 714
What’s the Difference Between IPv4 and IPv6?......Page 715
The IPv6 Headers......Page 716
The Future of IPv6......Page 720
PART VII Network User and Resource Management......Page 722
CHAPTER 40 Windows NT Domains......Page 724
Workgroups and Domains......Page 726
Windows NT User Groups......Page 733
Managing User Accounts......Page 736
Passwords and Policies......Page 742
Strategies to Minimize Logon Problems......Page 744
CHAPTER 41 Windows 2000 and Windows Server 2003 User and Computer Management Utilities......Page 746
User Management......Page 747
Computer Management......Page 754
Windows 2000 User Groups......Page 757
CHAPTER 42 Managing Unix and Linux Users......Page 764
User Administration......Page 765
Network Information Service (NIS)......Page 774
Common Login Problems......Page 780
CHAPTER 43 Rights and Permissions......Page 782
User-Level and Share-Level Security......Page 783
Assigning User Rights for Windows 2000, Server 2003, and XP......Page 786
Windows NT/2000/2003 NTFS Standard Permissions and Special Permissions......Page 794
User Groups Make Managing User Rights Easier......Page 797
User Groups in Windows 2000 and 2003......Page 798
Active Directory Groups......Page 799
NetWare......Page 801
Unix and Linux......Page 805
CHAPTER 44 Network Printing Protocols......Page 810
Printing Protocols and Printing Languages......Page 811
Internet Printing Protocol (IPP)......Page 813
CHAPTER 45 Print Servers......Page 818
Unix/Linux Printing......Page 819
Configuring Windows Print Servers......Page 834
Installing and Configuring Printers on Windows Servers......Page 836
Printing Under NetWare......Page 860
Hardware-Based Print Servers—Print Server Appliances......Page 864
PART VIII System and Network Security......Page 868
CHAPTER 46 Basic Security Measures Every Network Administrator Needs to Know......Page 870
Policies and Procedures......Page 871
Physical Security Measures......Page 877
The Two Sides of Security......Page 878
System Daemons and Services......Page 883
Delegating Authority......Page 884
Don’t Forget About Firewalls......Page 886
CHAPTER 47 Auditing and Other Monitoring Measures......Page 888
Unix and Linux Systems......Page 890
Configuring Windows NT 4.0 Auditing Policies......Page 893
Configuring Windows 2000 and Windows 2003 Auditing Policies......Page 897
Auditing Windows XP Professional Computers......Page 906
Novell Security......Page 907
NetWare 6 Advanced Audit Service......Page 909
CHAPTER 48 Security Issues for Wide Area Networks......Page 912
You’ve Been Targeted!......Page 914
Computer Viruses, Trojan Horses, and Other Destructive Programs......Page 915
Your Network Under Fire—Common Attacks......Page 918
Spoofing and Impersonation......Page 925
Preventative Measures......Page 926
Staying on Top of Security Issues......Page 930
CHAPTER 49 Firewalls......Page 932
What Is a Firewall?......Page 933
Packet Filters......Page 934
Proxy Servers......Page 938
Hybrids......Page 945
Inexpensive Firewalls for SOHO Environments......Page 948
How Do You Know That the Firewall Is Secure?......Page 950
CHAPTER 50 Virtual Private Networks (VPNs) and Tunneling......Page 952
What Is a VPN?......Page 953
IPSec Protocols......Page 954
The Point-to-Point Tunneling Protocol (PPTP)......Page 958
Layer Two Tunneling Protocol (L2TP)......Page 959
CHAPTER 51 Encryption Technology......Page 962
What Is Encryption?......Page 963
Digital Certificates......Page 967
Pretty Good Privacy (PGP)......Page 968
PART IX Troubleshooting Networks......Page 970
CHAPTER 52 Strategies for Troubleshooting Network Problems......Page 972
A Documented Network Is Easier to Troubleshoot......Page 973
Problem-Solving Techniques......Page 977
Pitfalls of Troubleshooting......Page 981
CHAPTER 53 Network Testing and Analysis Tools......Page 982
Basics: Testing Cables......Page 983
Network and Protocol Analyzers......Page 987
Simple Network Management Protocol (SNMP)......Page 995
CHAPTER 54 Troubleshooting Small Office and Home Office (SOHO) Networks......Page 1002
Computer Configuration Issues......Page 1004
Secure Those Cables!......Page 1008
Keeping Your Network Healthy......Page 1009
Wireless Networking Problems......Page 1010
When All Else Fails......Page 1011
PART X Upgrading Network Hardware......Page 1012
CHAPTER 55 Upgrading from ARCnet to Ethernet or Token-Ring......Page 1014
Upgrading to Ethernet or Token-Ring......Page 1015
CHAPTER 56 Upgrading from Token-Ring to Ethernet......Page 1022
The Future of Token-Ring......Page 1023
Phasing Ethernet into the Token-Ring Network......Page 1024
Replacing All Token-Ring Equipment......Page 1026
CHAPTER 57 Upgrading Older Ethernet Networks......Page 1028
Upgrading from 10BASE-2 or 10BASE-T......Page 1029
Hardware and Software Factors to Consider for 10BASE-2, 10BASE-T, and 100BASE-T......Page 1030
Other Possibilities......Page 1035
Using Gigabit Ethernet for High-End Servers......Page 1036
10 Gigabit Ethernet Is Becoming Economically Feasible......Page 1037
CHAPTER 58 Upgrading from Bridges and Hubs to Routers and Switches......Page 1038
Growing Beyond a Small LAN......Page 1039
From Bridges to Routers......Page 1042
From Bridges to Switches......Page 1046
CHAPTER 59 Adding Wireless Networking to a LAN......Page 1050
Why Go Wireless?......Page 1051
Choosing Locations for Access Points......Page 1052
Security Issues......Page 1053
PART XI Migration and Integration......Page 1056
CHAPTER 60 Migrating from NetWare to Windows 2000 or Windows Server 2003......Page 1058
Windows Protocols and Services......Page 1059
Microsoft’s Services for NetWare Version 5.0 (SFN)......Page 1065
CHAPTER 61 Migration and Integration Issues: Windows NT, Windows 2000, Windows 2003, Unix, and Linux......Page 1082
Windows 2000/2003 Support for Unix Protocols and Utilities......Page 1083
Managing the FTP Service on a Windows Server 2003......Page 1093
Applications......Page 1097
Microsoft Windows Services for Unix 3.0......Page 1098
Sun Network Information System......Page 1108
CHAPTER 62 Migrating from Windows NT 4.0 to Windows 2000, Windows 2003, and Windows XP......Page 1110
Do You Need to Upgrade the Operating System or Applications?......Page 1111
Upgrading to Windows 2000 Server......Page 1113
Before You Begin......Page 1115
Implementing a Migration to the Active Directory for Windows 2000......Page 1120
Upgrading Windows NT 4.0 or Windows 2000 to Windows 2003 Servers......Page 1126
CHAPTER 63 Migration and Integration: NetWare, Unix, and Linux......Page 1134
Why Use Unix or Linux?......Page 1135
Key Differences Between Unix/Linux and NetWare......Page 1136
Applications......Page 1137
NetWare for Linux......Page 1139
Appendixes......Page 1142
APPENDIX A Overview of the OSI Seven-Layer Networking Reference Model......Page 1144
It’s Only a Model!......Page 1145
APPENDIX B Networking Glossary......Page 1150
APPENDIX C Internet Resources for Network Administrators......Page 1168
Standards Organizations......Page 1169
Network Hardware and Software Manufacturers......Page 1170
Wireless Networking......Page 1172
Security......Page 1173
APPENDIX D The Lightweight Directory Access Protocol......Page 1176
The X.500 Protocols and Standards......Page 1177
The Lightweight Directory Access Protocol......Page 1180
APPENDIX E Introduction to Setting Up a SOHO Network......Page 1186
Assessing Your Requirements: What Do You Need?......Page 1187
SOHO Network Topologies......Page 1193
Backup Solutions for a SOHO Network......Page 1195
INDEX......Page 1198