Que upgrading and repairing networks 5th edition may 2006 ISBN 078973530x

2.7K 179 1
Que upgrading and repairing networks 5th edition may 2006 ISBN 078973530x

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Upgrading and Repairing Networks By Terry W Ogletree, Mark Edward Soper Publisher: Que Pub Date: May 11, 2006 Print ISBN-10: 0-7897-3530-X Print ISBN-13: 978-0-7897-3530-0 Pages: 1200 Table of Contents | Index Upgrading and Repairing Networks, Fifth Edition is the definitive guide for anyone with a network, from home networking enthusiasts to professional network administrators The book explains network architectures and protocols using plain English and real-world examples, and gives valuable insight for fixing network problems This updated edition includes the latest on network planning and design, and building a network using wired, wireless, or both technologies It covers the latest updates in Windows XP Service Pack 2, as well as Gigabit Ethernet, virtual LANs, Bluetooth, WAP, security, firewalls, and VPN use Upgrading and Repairing Networks By Terry W Ogletree, Mark Edward Soper Publisher: Que Pub Date: May 11, 2006 Print ISBN-10: 0-7897-3530-X Print ISBN-13: 978-0-7897-3530-0 Pages: 1200 Table of Contents | Index Copyright About the Authors Acknowledgments We Want to Hear from You! Reader Services Introduction Part I: Up Front: Network Planning and Design Concepts Chapter 1 A Short History of Computer Networking Chapter 2 Overview of Network Topologies LAN Topologies Building and Campus Topologies Multi-Tiered Network Topology Chapter 3 Network Design Strategies Planning a Logical Network Design Planning and Design Components The Physical Network Planning Resources Chapter 4 Upgrading Strategies and Project Management Where Do You Start? Determining When an Upgrade Is NecessaryThe Evaluation Process What Resources Are Needed for the Upgrade? Planning an Upgrade Testing the Plan Deployment User Training Closing the BookDocumenting What Has Changed and Why Other Considerations for Upgrading Chapter 5 Protecting the Network: Preventative Maintenance Techniques Power Conditioning and Uninterruptible Power Supplies (UPSs) Network Monitoring Server and Workstation Backups Routine Maintenance Building Redundancy into the Network Recovery Planning Justifying Preventative Maintenance Part II: Physical Networking Components Chapter 6 Wiring the NetworkCables, Connectors, Concentrators, and Other Network Components Structured Wiring Important Definitions Physical Cable Types Terminations and Connections Telecommunications Rooms Chapter 7 Network Interface Cards Choosing a Hardware Bus Type The Wired for Management (WfM) Initiative Multi-Homed Systems Load Balancing and Dual-Redundant Network Controllers Software Drivers IRQs and I/O Ports Troubleshooting Network Cards Chapter 8 Network Switches How Switches Work Switch Hardware Types Switch Troubleshooting and Management Chapter 9 Virtual LANs Virtual LANs and Network Topologies Switching Based on Network Frames Implicit and Explicit Tagging IEEE Standards for Virtual LANs What Kind of Switch Should You Buy? Chapter 10 Routers What Routers Do The Difference Between Routable Protocols and Routing Protocols When Do You Need to Use a Router? Router Ports and Connections Configuring Routers Router Chassis Types Chapter 11 Network Attached Storage (NAS) and Storage Area Networks (SANs) Local Versus Networked Storage Devices Network Attached Storage Storage Area Networks Basic SANs: Arbitrated Loops Using a Fabric Switched Topology for SANs A Mixed Topology of Loops and Switches IP SANs and iSCSI What Kind of NAS or SAN Solution Should You Use? Part III: Low-Level Network Protocols Chapter 12 The IEEE LAN/MAN Committee Networking Standards What Is the LAN/MAN Committee? Obtaining the IEEE 802 Standards Documents Free Chapter 13 Ethernet: The Universal Standard A Short History of Ethernet Collisions: What Are CSMA/CA and CSMA/CD? Restrictions on Legacy Ethernet Topologies Using a Bus Topology Using a Star Topology Hybrid LAN Topologies Using a Backbone to Connect the Enterprise Ethernet Frames Fast Ethernet (IEEE 802.3u) and Gigabit Ethernet (IEEE 802.3z) Ethernet Problems Ethernet Errors Monitoring Errors Part IV: Dedicated Connections and WAN Protocols Chapter 14 Dial-Up Connections The Point-to-Point Protocol and the Serial Line Internet Protocol The Serial Line Internet Protocol (SLIP) The Point-to-Point Protocol (PPP) Configuring a Windows XP Professional Client for Dial-Up When Dial-Up Isn't Fast Enough Chapter 15 Dedicated Connections Leased Lines Asynchronous Transfer Mode (ATM) The Importance of Frame Relay and the X.25 Interface Chapter 16 Digital Subscriber Lines (DSL) Technology DSL and Cable Modems The Future of DSL Chapter 17 Using a Cable Modem How Cable Modems Work How Cable Modems Differ from xDSL Broadband Access The Data Over Cable Service Interface Specification (DOCSIS) Choosing Between Cable and DSL Part V: Wireless Networking Protocols Chapter 18 Introduction to Wireless Networking Why Wireless Networks Have Proliferated Access Points and Ad Hoc Networks Physical Transmission Technologies The IEEE 802.11 Wireless Standard Sources of Interference for Wireless Networks Chapter 19 IEEE 802.11b: Wi-Fi Pioneer Components of an 802.11-Based Wireless Network Section 802.11 bFirst, But Fading Away What to Look for in an Access Point Do You Need a Wireless Network? Connecting the Wireless Network to a Wired LAN Dual-Mode Access Points Why Wi-Fi? Chapter 20 Faster Service: IEEE 802.11a Overview of the IEEE 802.11a Standard Comparing 802.11a with 802.11b and 802.11g Chapter 21 The IEEE 802.11g Standard Overview of the 802.11g Standard Installing a Wireless-G Broadband Router Installing and Configuring a Wireless Network Adapter Proprietary Extensions to the IEEE 802.11g Standard Improving Network Performance with Dual-Band Wireless Technology Which Wireless Protocol Should You Use? Chapter 22 Bluetooth Wireless Technology The Bluetooth Special Interest Group (SIG) General Overview of Bluetooth Piconets and Scatternets Bluetooth Device Modes SCO and ACL Links What Are Bluetooth Profiles? Bluetooth Is More Than a Wireless Communication Protocol Chapter 23 Security and Other Wireless Technologies Instant Messaging and Consumer Devices Wireless Security Personal Area Networks (PANs) Part VI: Lan and Wan Network, Service, and Application Protocols Chapter 24 Overview of the TCP/IP Protocol Suite TCP/IP and the OSI Reference Model The Internet Protocol (IP) The Address Resolution ProtocolResolving IP Addresses to Hardware Addresses The Transmission Control Protocol (TCP) The User Datagram Protocol (UDP) Ports, Services, and Applications The Internet Control Message Protocol (ICMP) Chapter 25 Basic TCP/IP Services and Applications The File Transfer Protocol (FTP) The Telnet Protocol Using Telnet and FTP with a Firewall The R-Utilities The Finger Utility Other Services and Applications Built on the TCP/IP Suite Chapter 26 Internet Mail Protocols: POP3, SMTP, and IMAP How SMTP Works Putting It All Together The Post Office Protocol (POP3) The Internet Message Access Protocol Version 4 (IMAP4) Chapter 27 Troubleshooting Tools for TCP/IP Networks Checking the Host System's Configuration First Using ping and tracert to Check Connectivity Using the nslookup Command to Troubleshoot Name Resolution Issues Other Useful Commands Using Network Connection Repair in Windows XP Chapter 28 BOOTP and Dynamic Host Configuration Protocol (DHCP) What Is BOOTP? Taking BOOTP One Step Further: DHCP Installing and Configuring a DHCP Server on Windows 2000/2003 Using DHCP with Red Hat Linux Configuring a Router or WAP to Provide DHCP Services Chapter 29 Network Name Resolution Hardware Versus Protocol Addresses NetBIOS Installing and Configuring WINS on Windows 2000/2003 Servers TCP/IP Names Installing DNS on a Windows Server Network Information Service Chapter 30 Using the Active Directory Service Early Directory Technologies Objects and Attributes What Is a Domain Tree? What Is a Forest? The Active Directory and Dynamic DNS Active Directory Service Interfaces (ADSI) The Active Directory Schema Finding Objects in the Active Directory The Active Directory Service and Windows Server 2003 New Active Directory Features in Windows Server 2003 Chapter 31 File Server Protocols Why File Server Protocols are Important Server Message Block (SMB) and the Common Internet File System (CIFS) NetWare Core Protocol (NCP) Unix Network File System (NFS) Microsoft Distributed File System (DFS) Chapter 32 The Hypertext Transfer Protocol The Beginning of HTTP Defining HTTP URLs, URIs, and URNs Chapter 33 Routing Protocols Basic Types of Routing Protocols Multi-Protocol Label Switching (MPLS) Chapter 34 The Secure Sockets Layer (SSL) Protocol Symmetric and Asymmetric Encryption Does SSL Provide Enough Security for Internet Transactions? OpenSource SSL Chapter 35 Introduction to the IPv6 Protocol What's the Difference Between IPv4 and IPv6? The IPv6 Headers Other IPv6 Considerations The Future of IPv6 Part VII: Network User and Resource Management Chapter 36 Windows NT Domains Workgroups and Domains Windows NT User Groups Managing User Accounts Passwords and Policies Strategies to Minimize Logon Problems Chapter 37 Windows 2000 and Windows Server 2003 User and Computer Management Utilities The Microsoft Management Console User Management Computer Management Windows 2000 User Groups Chapter 38 Managing Unix and Linux Users User Administration Network Information Service (NIS) Common Login Problems Chapter 39 Rights and Permissions User-Level and Share-Level Security Assigning User Rights for Windows 2000, Server 2003, and XP NTFS Standard and Special Permissions User Groups Make Managing User Rights Easier User Groups in Windows 2000 and Server 2003 Active Directory Groups NetWare Unix and Linux Chapter 40 Network Printing Protocols Printing Protocols and Printing Languages Data Link Control Protocol (DLC) Internet Printing Protocol (IPP) Chapter 41 Print Servers Unix/Linux Printing Configuring Windows Print Servers Installing and Configuring Printers on Windows Servers Printing Under NetWare Hardware-Based Print ServersPrint Server Appliances Part VIII: System and Network Security Chapter 42 Basic Security Measures Every Network Administrator Needs to Know Policies and Procedures Physical Security Measures The Two Sides of Security System Daemons and Services Removing Dead Wood Delegating Authority Don't Forget About Firewalls Chapter 43 Auditing and Other Monitoring Measures Unix and Linux Systems Configuring Windows NT 4.0 Auditing Policies Configuring Windows 2000 and Windows Server 2003 Auditing Policies Auditing Windows XP Professional Computers Novell Security NetWare Auditing Solutions Chapter 44 Security Issues for Wide Area Networks You've Been Targeted! Computer Viruses, Trojan Horses, and Other Destructive Programs Your Network Under FireCommon Attacks Network Probes Spoofing and Impersonation If It's Too Good to Be True, It Isn't Preventative Measures Staying on Top of Security Issues Chapter 45 Firewalls What Is a Firewall? Packet Filters Intrusion Detection (Stateful Inspection) Proxy Servers Hybrids Inexpensive Firewalls for SOHO Environments How Do You Know That the Firewall Is Secure? Chapter 46 Virtual Private Networks (VPNs) and Tunneling What Is a VPN? Protocols, Protocols, and More Protocols! IPSec Protocols The Point-to-Point Tunneling Protocol (PPTP) Layer Two Tunneling Protocol (L2TP) Creating a VPN Connection with Windows XP Professional Selecting a Router with VPN Support Chapter 47 Encryption Technology Computers and Privacy What Is Encryption? Digital Certificates Pretty Good Privacy (PGP) Part IX: Troubleshooting Networks Chapter 48 Strategies for Troubleshooting Network Problems A Documented Network Is Easier to Troubleshoot Problem-Solving Techniques Pitfalls of Troubleshooting Chapter 49 Network Testing and Analysis Tools Basics: Testing Cables Network and Protocol Analyzers Simple Network Management Protocol (SNMP) Chapter 50 Troubleshooting Small Office and Home Office (SOHO) Networks Power Problems Computer Configuration Issues Component ProblemsYou Can't Get There from Here Secure Those Cables! Firewall Problems Keeping Your Network Healthy Wireless Networking Problems When All Else Fails Part X: Upgrading Network Hardware Chapter 51 Upgrading Older Ethernet Networks Upgrading from 10BASE-2 or 10BASE-T Windows XP Professional connections Advanced tab creating General tab Networking tab Options tab VRFY command Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] W3C (World Wide Web Consortium) 2nd Wake on LAN (WOL) WANs (wide area networks) 2nd back doors forged email LAN comparing connections passwords PHY preventing attacks protocols routers security host computers network sniffers preventive measures spoofing training Tripwire updating virus-checking applications Trojan horses types of attacks viruses WAP wardriving WatchGuard SOHO Web archives browsers pages, saving Web sites ACPI Bluetooth Web-based printers folder WECA (Wireless Ethernet Compatibility Alliance) 2nd WEP (Wired Equivalent Privacy) 2nd WEPCrack WfM (Wired for Management) 2nd Wi-Fi [See 802.11b networks, decline of.] wide area networks [See WANs (wide area networks), LAN, comparing ] Wildpackets WILL command Windows 2000 Administration Tools auditing policies DHCP servers directories Event Viewer groups migrating from Novell Netware [See NetWare, decline Windows 2000 migration.] MMC [See MMC (Microsoft Management Console), DHCP.] name resolution printers, adding Professional Professional Client servers support Telnet user groups user-level permissions WINS 2000 Server ActiveState ActivePerl 5.6 DFS DNS Korn Shell command NetWare passwords Telnet Unix [See Unix, DNS servers.] upgrading user name mapping Windows 2003 Server upgrade 2003 Active Directory ActiveState ActivePerl 5.6 auditing policies BOOTP DFS DNS Event Viewer groups installing Korn Shell command NetWare operating systems passwords servers Telnet 2nd Unix [See Unix, NIS.] upgrading to user name mapping WINS 95 98 Components Wizard 2nd firewalls FTP command-line clients integrated Windows authentication Internet Naming Service [See WINS (Windows Internet Naming Service), NetBIOS.] ipconfig command Mobile devices netstat command NFS NT [See NT (Windows), domains, controllers ] NT 4.0 configuring Event Viewer migrating from Novell Netware printers permissions ping command print servers adding printers printers/printing devices Server 2003 DHCP DOS-mode, booting in Itanium servers upgrading to Windows 2000 SFU SOHO Vista XP 64-bit support DOS-mode, booting in network connection repair Windows 2000 and XP Professional auditing printing VPN connections Windows 2003 Server windows backup congestion offered sizes sliding WinDump command winipcfg command WINS (Windows Internet Naming Service) 2nd configuring NetBIOS Windows 2000 2003 Server wire-mapping Wired Equivalent Privacy (WEP) 2nd Wired for Management (WfM) 2nd Wired Protected Access [See WPA (Wired Protected Access), Personal certification.] wireless devices 2.4GHz devices PDAs Ethernets IEEE 802.11 routers APs, comparing features of integrated Ethernet switches topologies Wireless Equivalent Privacy (WEP) 2nd Wireless Ethernet Compatibility Alliance (WECA) 2nd wireless networks 802.11-based [See 802.11-based networks.] ad-hoc networks 2nd adapters, installing advantages 2nd AMA APs definition IEEE 2nd interference LANs, connecting to manual client configuration needs, determining PANs public places/spaces 2nd radio wave transmission security features/standards crossreference knowing your users neighbors overview 2nd SSIDs WEP wired networks, comparing WPA [See also WPA (Wired Protected Access), WPA2.] WPA2 2nd Service Pack 2 wireless network setup wizard setup wizard SOHO [See SOHO (small offices and home offices), routers.] spread-spectrum technologies 2nd topologies of Wireless-B [See also 802.11b networks, decline of.] Wireless-G broadband router installation LAN connections PCs, configuring 2nd properties sheet tabs saving configurations wireless access ports, configuring wiring drawings records reports structured backbone cabling system horizontal cabling system work area specification terminologies ACR attenuation 2nd bandwidth 2nd characteristic impedance cross-talk dialectic electromagnetic field EMI FEXT 2nd frequency 2nd full-duplex communication half-duplex communication impedance leakage minimal velocity of propagation NEXT 2nd Power SUM radio frequencies shields TDR 2nd twisted-pair 2nd work orders wizards Add Printer 2nd Administration Tools Setup Installation Windows Components 2nd WMM certification WOL (Wake on LAN) WON'T command word processors WordPerfect Office X3 work area specifications work patterns, assessing workgroups (Windows NT) domains controllers models replication between domain controllers trust relationships workstations backbones backups BOOTP client/server exchanges (DHCP) DHCP downloading operating systems options fields packet formats request/reply mechanisms Gigabit Ethernets limiting NIC World Wide Web Consortium (W3C) 2nd WPA (Wired Protected Access) Enterprise certification overview Personal Personal certification Pre-Shared Key with TKIP RADIUS vulnerabilities, overcoming WEP WPA2 2nd WPA2 Enterprise certification Personal Personal certification WRITE command Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] X.25 X.500 X.5000 XDR (External Data Representation) xDSL 2nd Xerox 2nd Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] yp commands (NIS) ypinit command (NIS) ypserve command (NIS) ypserve daemon (NIS) ypxfrd command (NIS) Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] Zone Labs zone transfers ZoneAlarm ... including Upgrading and Repairing PCs, 1st through 17th and Academic editions; Upgrading and Repairing Laptops 1st and 2nd editions; Upgrading and Repairing Servers; Upgrading and Repairing Windows; Upgrading and Repairing PCs: A+... video training that were included in each of the 10th, and 12th through 17th editions of Upgrading and Repairing PCs, as well as Upgrading and Repairing Laptops, Upgrading and Repairing Windows, and Upgrading and Repairing Servers... Repairing Windows; Upgrading and Repairing PCs: A+ Certification Study Guide, 1st and 2nd editions; Upgrading and Repairing PCs Technician's Portable Reference, 1st and 2nd editions; Upgrading and Repairing PCs Field Guide; Upgrading

Ngày đăng: 26/03/2019, 16:01

Từ khóa liên quan

Mục lục

  • Upgrading and Repairing Networks

  • Table of Contents

  • Copyright

  • About the Authors

  • Acknowledgments

  • We Want to Hear from You!

  • Reader Services

    • Introduction

    • Part I: Up Front: Network Planning and Design Concepts

      • Chapter 1. A Short History of Computer Networking

      • Chapter 2. Overview of Network Topologies

        • LAN Topologies

        • Building and Campus Topologies

        • Multi-Tiered Network Topology

        • Chapter 3. Network Design Strategies

          • Planning a Logical Network Design

          • Planning and Design Components

          • The Physical Network

          • Planning Resources

          • Chapter 4. Upgrading Strategies and Project Management

            • Where Do You Start?

            • Determining When an Upgrade Is NecessaryThe Evaluation Process

            • What Resources Are Needed for the Upgrade?

            • Planning an Upgrade

            • Testing the Plan

Tài liệu cùng người dùng

Tài liệu liên quan