Index

Numbers

8mm tape, 346

10BASE-T, 88–89

100BASE-T, 183–184

110 blocks, 207

568B standards (EIA), 89

802.11a standard, 122

802.11b standard, 122

802.11g standard, 123

802.11n standard, 123

1000BASE-T, 184

A

A resource record, 253

AAA resource record, 253

access control, 322–323

access rules, 164

Active Directory, 273–274

adapter cards, installing, 202–206

addresses

destination addresses, 24

email addresses, 14

Ethernet addresses, 40

I/O addresses, 202

IP addresses

configuring network devices with, 259–260

obtaining, 258

overview, 255

subnet masks, 257–258

subnetting, 255–256

network addresses

CIDR, 38–39

IP addresses, 37–38

IPv6 (version 6) addresses, 39

NAT (Network Address Protocol), 39

prefixes, 38

overview, 304

relationship within network, 305

relaying traffic with, 40–42

source addresses, 24

administrators

budgeting, 313–314

education and certification, 311–313

help desk analysts, 310

IT directors, 311

network administrators, 310

daily tasks, 376–378

establishing network policies, 379–380

responsibilities of, 373–376

strategies for supporting users, 378–379

overview, 309

project management, 315–317

responsibilities, 313

support specialists, 310

user support advisors, 310

ADSL (Asymmetric DSL), 102

Advanced Research Projects Agency (ARPA), 14, 232

Advanced Technology Attachment (ATA) disks, 56

advantages of networking, 6–7

centralized configuration management, 26–27

file management, 25

overview, 25

printer sharing, 26

software sharing, 25–26

speed and economy, 27

aero domain name, 250

Allman, Eric, 213

Amazon Web Services (AWS), 385

American National Standards Institute (ANSI), 150

American Registry for Internet Numbers (ARIN), 258

American Standard Code for Information Interchange (ASCII), 20

ANSI (American National Standards Institute), 150

antispam software, 219

antistatic mats, 200

antistatic wrist straps, 200

APIs (application programming interfaces), 30, 62

Apple, 67

AppleTalk, 67

application layer (OSI model), 31

application programming interfaces (APIs), 30, 62

application servers, 163, 297

application-specific integrated circuits (ASICs), 75

applications

CloudMark, 219

contact management, 221–223

email

configuring, 215–217

IMAP4, 214

MIME, 217

open-standards email, 215

overview, 213

POP3, 214

proprietary mail systems, 214–215

SMTP, 214

spam, 218–219

troubleshooting, 217–218

file transfer and FTP, 227–228

groupware, 212–213

Lotus Notes, 224–225

Microsoft Exchange Outlook, 225–227

Novell GroupWise, 223–224

OSs, 211

overview, 211

scheduling and calendars, 219–221

SonicWALL, 219

SpamAssassin, 219

archives, 353

ARIN (American Registry for Internet Numbers), 258

ARM (Asynchronous Transfer Mode), 78

ARPA (Advanced Research Projects Agency), 14, 232

ARPANET, 14, 20, 232

ASCII (American Standard Code for Information Interchange), 20

ASICs (application-specific integrated circuits), 75

assembling networks

adapter cards, 202–206

electrical damage, preventing, 199–200

overview, 176–177, 199

precautions, 200–202

wireless networks, 210

wiring closets, 207–209

assigning permissions, 287

Asymmetric DSL (ADSL), 102

Asynchronous Transfer Mode. See ATM

ATA (Advanced Technology Attachment) disks, 56

ATM (Asynchronous Transfer Mode)

cells, 110–111

overview, 44–45, 108–109, 236

permanent virtual circuits, 109–110

QoS (quality of service), 110

attacks, 330

audits, 326–327

authentication, 322

authentication servers, 164, 298

AWS (Amazon Web Services), 385

B

backups

backup media, 346

differential backup, 347

full backup, 347

Grandfather-Father-Son scheme, 347–349

incremental backup, 347

overview, 345

on server-based networks, 165

base 10 numbering system, 50

batch processing, 20

baud, 132

Bayesian filters, 219

BBN (Bolt, Beranek, and Newman), 21

benefits of networking, 6–7

centralized configuration management, 26–27

file management, 25

overview, 25

printer sharing, 26

software sharing, 25–26

speed and economy, 27

best practices

applying, 147–149

benefits of, 144–145

definition of, 143–144

design, 146

implementation, 146

planning, 146

security

monitoring, 152–153

overview, 150–151

secure behaviors, defining, 151–152

usage policies and procedures, 151

standards, 149–150

tuning, 147

BGP (Border Gateway Protocol), 235

bioengineering, 385–387

bits, 50

.biz domain name, 250

Bluetooth, 91, 123–125

Bolt, Beranek, and Newman (BBN), 21

bombs, 322

boot sector viruses, 328

Border Gateway Protocol (BGP), 235

bottlenecks, 196–197

bridges, 9, 182

broadband, 12–13

cable modem, 102–103, 132

definition of, 101

DSL, 101–102

satellite services, 103

broadcast networks, 10

budgeting, 313–314

building networks. See assembling networks

bus topology, 10

business impact, assessing, 350–351

bytes, 49

C

CA (certificate authority), 321

cable modem, 102–103

cabling

100BASE-T, 183–184

1000BASE-T, 184

calendars, 219–221

cards

expansion cards, 57–58

NICs (network interface cards), 58–59

PCI (peripheral component interconnect) cards, 58

video adapter cards, 59–60

cases, opening, 201

Category 1 twisted-pair wires, 89

Category 2 twisted-pair wires, 89

Category 3 twisted-pair wires, 89

Category 4 twisted-pair wires, 89

Category 5 twisted-pair wires, 89

Category 5e twisted-pair wires, 89

Category 6 twisted-pair wires, 89

cells, 45, 110–111, 120–121

cellular modems, 132

cellular topology, 10

centralized configuration management, 26–27

certificate authority (CA), 321

certificates, 321

certification, 311–313

channels, 11

CHAP (Challenge Handshake Authentication Protocol), 332

choosing

bridges, 182

hubs, 181

ISPs (Internet service providers), 237

network architecture

client/server networking, 185–187

peer-to-peer networking, 187–188

NOSs (network operating systems)

Linux, 195–196

Microsoft Windows Server, 194–195

Novell NetWare, 192–194

UNIX, 195–196

protocols, 197

routers, 182

server hardware, 180–181

switches, 182

WAPs (wireless access points), 182

CIDR (Classless Inter-Domain Routing), 37–39

ciphertext, 320

circuit switching, 21

Cisco Career Certifications, 312

Class A addresses, 37

Class B addresses, 37

Class C addresses, 37

Class D addresses, 38

Classless Inter-Domain Routing (CIDR), 37–39

cleartext, 320

Clearwire, 384

client/server model

clients

adding to domains, 279–280

configuring for Microsoft Windows Server, 279

licensing, 343–345

overview, 79, 185–187

servers

fault tolerance, 81–82

high availability, 81–82

overview, 80

RAID (redundant arrays of inexpensive disks), 80–81

SOSs (server operating systems), 83–87

CloudMark, 219

clouds, 385–386

CNAME resource record, 254

coaxial cable, 90

color depth, 60

.com domain name, 249

commands

nslookup, 371

ping, 367–368

traceroute, 370–371

communication servers, 163, 297

communications protocols

ATM (Asynchronous Transfer Mode), 44–45, 78

BGP (Border Gateway Protocol), 235

CHAP (Challenge Handshake Authentication Protocol), 332

choosing, 197

CIDR (Classless Inter-Domain Routing), 38–39

definition of, 5

DHCP (Dynamic Host Configuration Protocol)

client configuration, 262–263

deploying, 263–264

overview, 261–262

DNS (Domain Name System)

deploying, 254–255

how it works, 251–252

namespaces, 248–250

obtaining domain names, 252–253

overview, 247–248

root name servers, 250

RRs (resource records), 253–254

DNSSEC (DNS Security Protocol), 334

Ethernet, 42–43

FTP (File Transfer Protocol), 227–228, 369–370

HTTP (Hypertext Transfer Protocol), 266–267

IMAP4 (Internet Message Access Protocol), 214

IP (Internet Protocol) addresses, 37–38, 43–44, 242–243

configuring network devices with, 259–260

obtaining, 258

overview, 255

subnet masks, 257–258

subnetting, 255–256

IPSec (Internet Security Protocol), 334

IPv6, 39

IPX (Internetwork Packet Exchange), 45–46

L2TP (Layer 2 Tunneling Protocol), 135–136

LMP (Link Manager Protocol), 124

MPLS (Multiprotocol Label Switching), 111–112

NAT (Network Address Protocol), 39

NetBEUI (Network BIOS Extended User Interface), 46

NetBIOS (Network Basic Input/Output System), 46

OSI model

development of, 30

illustration, 31

Layer 1 (physical), 35

Layer 2 (data link), 33–34

Layer 3 (network), 33

Layer 4 (transport), 32

Layer 5 (session), 32

Layer 6 (presentation), 32

Layer 7 (application), 31

overview, 30–31

relationship between layers, 34–35

overview, 29–30, 42

PAP (Password Authentication Protocol), 332

POP3 (Post Office Protocol 3), 214

PPP (Point-to-Point Protocol), 133–135

PPTP (Point-to-Point Tunneling Protocol), 333

protocol converters, 5

RADIUS (Remote Authentication Dial In User Service), 332–333

SMTP (Simple Mail Transfer Protocol), 214

SNMP (Simple Network Management Protocol), 356

SSH (Secure Shell), 333

SSL (Secure Sockets Layer), 333

SSTP (Secure Socket Tunneling Protocol), 333

TCP (Transmission Control Protocol), 243–244

TCP/IP, 238–240

UDP (User Datagram Protocol), 244

VoIP (Voice over IP), 102

WEP (Wired Equivalent Privacy), 336

WINS (Windows Internet Naming Service), 260

WPA (Wi-Fi Protected Access), 336

computer hardware, 50

computing environment vulnerabilities, assessing, 351

computing infrastructure, defining, 350

concentrators, 208

configuring

configuration management, 26–27, 166

DHCP (Dynamic Host Configuration Protocol), 262–263

email, 215–217

IP addresses, 259–260

Microsoft Windows Server 2003

domain client configuration, 279–280

protocol configuration, 280–282

server configuration, 276–278

Window client configuration, 279

network services on Linux server, 293–294

connecting to Internet, 14–15

BGP, 235

DHCP (Dynamic Host Configuration Protocol), 261–264

DNS. See DNS (Domain Name System), 247

IP (Internet Protocol), 242–243

IP addresses. See IP addresses

overview, 255

ISPs (Internet service providers), 233–234, 237

IXPs (Internet Exchange Points), 234–235

peering, 236–237

ports, 240–241

sockets, 241–242

TCP (Transmission Control Protocol), 243–244

TCP/IP, 238–240

UDP (User Datagram Protocol), 244

contact management, 221–223

cooperative multitasking, 63

copper wire, 88–89

CPUs, 52–53

D

DAT (digital audio tape), 346

data communications equipment (DCE), 60

data link layer (OSI model), 33–34

data terminal equipment (DTE), 60

datagrams, 44

DCE (data communications equipment), 60

decryption, 320

deployment

DHCP (Dynamic Host Configuration Protocol), 263–264

DNS (Domain Name System), 254–255

design

definition of, 146

logical network diagrams, 167–171

network needs, determining, 156–159

overview, 155–156

peer-to-peer networks, 161–162

physical network diagrams, 171–174

server-based networks, 163–164

application servers, 163

authentication servers, 164

backups, 165

communication servers, 163

configuration management, 166

file servers, 163–165

mail servers, 164

print servers, 163

web servers, 164

specification documents

reviewing with users, 176

writing, 174–175

topologies, 166–167

user needs, determining, 159–161

destination addresses, 24

device drivers, 68

DHCP (Dynamic Host Configuration Protocol)

client configuration, 262–263

deploying, 263–264

overview, 261–262

servers, 297

diagrams

logical network diagrams, 167–171

physical network diagrams, 171–174

Diamond, David, 87

differential backup, 347

digital audio tape (DAT), 346

digital signatures, 321

digital subscriber line (DSL), 101–102

DIMMs (Dual Inline Memory Modules), 54

direct sequence spread spectrum (DSSS), 122

disaster recovery planning

assessing business impact, 350–351

assessing computing environment vulnerabilities, 351

defining computing infrastructure, 350

developing plan, 351–353

overview, 349–350

disks, 55–56, 181

DLTtape, 346

DNS (Domain Name System)

deploying, 254–255

DNSSEC (DNS Security Protocol), 334

how it works, 251–252

namespaces, 248–250

obtaining domain names, 252–253

overview, 247–248

root name servers, 250

RRs (resource records), 253–254

servers, 297

DNSSEC (DNS Security Protocol), 334

Domain Name System. See DNS

domains, 272. See also DNS (Domain Name System)

adding clients to, 279–280

DNS (Domain Name System)

deploying, 254–255

how it works, 251–252

namespaces, 248–250

obtaining domain names, 252–253

overview, 247–248

root name servers, 250

RRs (resource records), 253–254

names

list of, 249–250

obtaining, 252–253

DOS, 66

DSL (digital subscriber line), 101–102

DSSS (direct sequence spread spectrum), 122

DTE (data terminal equipment), 60

Dual Inline Memory Modules (DIMMs), 54

Dynamic Host Configuration Protocol. See DHCP

dynamic ports, 240

E

economy of networking, 27

edu domain name, 249

education and certification, 311–313

EIA (Electronic Industries Association), 56, 60, 89, 150

electrical damage, preventing, 199–200

Electronic Industries Association (EIA), 56, 60, 89, 150

email

addresses, 14

configuring, 215–217

IMAP4, 214

MIME, 217

open-standards email, 215

overview, 213

POP3, 214

proprietary mail systems, 214–215

SMTP, 214

spam, 218–219

troubleshooting, 217–218

EMTA (Embedded Multimedia Terminal Adapter), 102

encryption

private key, 320

public key, 320–321

error checks, 24

Ethernet, 42–43

addresses, 40

headers, 36

network hardware selection, 182–183

100BASE-T, 183–184

1000BASE-T, 184

Gigabit Ethernet, 184

Megabit Ethernet, 184

EtherType, 36

evaluating

bridges, 182

hubs, 181

ISPs (Internet service providers), 237

network architecture

client/server networking, 185–187

peer-to-peer networking, 187–188

NOSs (network operating systems)

Linux, 195–196

Microsoft Windows Server, 194–195

Novell NetWare, 192–194

UNIX, 195–196

routers, 182

server hardware, 180–181

switches, 182

WAPs (wireless access points), 182

event logs, 364–366

expansion cards, 57–58

external attacks, 330

extranets, 16

F

fault tolerance, 81–82

FDDI (Fiber Distributed Data Interface), 43

FHSS (frequency hopping spread spectrum), 122

Fiber Distributed Data Interface (FDDI), 43

file servers, 163–165, 297

File Transfer Protocol (FTP), 227–228, 369–370

files

file management, 25

file viruses, 329

sharing on Linux networks, 295–296

in UNIX, 291

filtering packets, 331

firewalls, 14

overview, 330–331

packet filtering, 331

Windows Firewall settings, 331–332

FireWire, 62

firmware, 50

FLOPS (floating point operations per second), 73

folders, sharing on Microsoft Windows Server 2003, 282–285

forwarding, 77–78

fragmentation, 44

frame relay, 111

frames, 34–35

frequency hopping spread spectrum (FHSS), 122

frequency interference between W-Fi and Bluetooth, 125

FTP (File Transfer Protocol), 227–228, 369–370

full backup, 347

function calls, 30

future of Microsoft Windows Server, 286–287

future of networking

bioengineering, 385–387

clouds, 385–386

growth of Linux, 383–384

WiMax, 384

G

Gigabit Ethernet, 184

.gov domain name, 249

Grandfather-Father-Son scheme, 347–349

groupware, 25, 212–213

GroupWise (Novell), 223–224

H

Habraken, Joe, 287

hard drives, 361–362

hardware

adapter cards, 202–206

ASICs (application-specific integrated circuits), 75

bridges, 182

CPUs, 52–53, 358–361

definition of, 50

disks, 55–56, 181

for Ethernet networks, 182–183

100BASE-T, 183–184

1000BASE-T, 184

Gigabit Ethernet, 184

Megabit Ethernet, 184

expansion cards, 57–58

FireWire, 62

hard drives, 361–362

hubs, 181

memory, 53–55

motherboards, 52–53

NICs (network interface cards), 58–59

overview, 51, 179

PCI (peripheral component interconnect) cards, 58

remote access hardware, 138–140

routers

capabilities of, 78

choosing, 182

definition of, 74–75

forwarding, 77–78

routing, 75–76

troubleshooting, 356–357

server hardware, 180, 357–358

speed, 73

SSDs (solid state drives), 56–57

switches, 182

upgrades, 340–341

USB (universal serial bus), 60–62

video adapter cards, 59–60

WAPs (wireless access points), 182

Hayes Communication Smartmodem, 131

help desk analysts, 310

hierarchical file system in UNIX, 292

high availability, 81–82

history

of Internet, 231–233

of networking

ARPAnet, 20

circuit switching, 21

mobile wireless networking, 119–120

overview, 19–21

packet switching, 21–24

Telnet, 129–130

of UNIX, 289–290

HTML (Hypertext Markup Language), 265–266

HTTP (Hypertext Transfer Protocol), 266–267

hubs, 9, 181, 208

HughesNet, 103

hybrid networks, 118

Hypertext Markup Language (HTML), 265–266

Hypertext Transfer Protocol (HTTP), 266–267

I

I/O addresses, 202

IANA (Internet Assigned Numbers Authority), 240, 258

IDE (Integrated Drive Electronics) disks, 56

IEEE (Institute of Electronic and Electrical Engineers), 150

IETF (Internet Engineering Task Force), 36, 149, 215

IMAP4, 214

implementation

definition of, 146

mobile wireless networks, 126–127

IMPs (Interface Message Processors), 21, 232

incremental backup, 347

.info domain name, 250

information technology (IT) jobs, 310–311

education and certification, 311–313

help desk analysts, 310

IT directors, 311

network administrators, 310

daily tasks, 376–378

establishing network policies, 379–380

responsibilities of, 373–376

strategies for supporting users, 378–379

support specialists, 310

user support advisors, 310

inheritance, 164

INI (inner-network interface), 99

installing

adapter cards, 202–206

Microsoft Windows Server 2003, 274–276

Institute of Electronic and Electrical Engineers (IEEE), 150

Integrated Drive Electronics (IDE) disks, 56

integrity, 322

Intel-compatible IRQ settings, 203

Interface Message Processors (IMPs), 21, 232

interfaces, 99–101, 306

International Organization for Standardization (ISO), 30, 150

International Telecommunications Union (ITU), 15, 24, 30, 150

Internet

compared to intranets, 16

connections, 14–15

BGP (Border Gateway Protocol), 235

choosing, 237

DHCP (Dynamic Host Configuration Protocol), 261–264

DNS. See DNS (Domain Name System)

IP (Internet Protocol), 242–243

ISPs (Internet service providers), 233–234, 237

IXPs (Internet Exchange Points), 234–235

peering, 236–237

ports, 240–241

sockets, 241–242

TCP (Transmission Control Protocol), 243–244

TCP/IP, 238–240

UDP (User Datagram Protocol), 244

history of, 231–233

importance of, 15–16

IP addresses

configuring network devices with, 259–260

obtaining, 258

overview, 255

subnet masks, 257–258

subnetting, 255–256

names

overview, 304

relationship within network, 305

network components’ position in layers, 302–304

overview, 13–14, 36, 301–302

Internet Assigned Numbers Authority (IANA), 240, 258

Internet Engineering Task Force (IETF), 36, 149, 215

Internet Exchange Points (IXPs), 234–235

Internet Message Access Protocol 4 (IMAP4), 214

Internet Protocol. See IP addresses

Internet Security Protocol (IPSec), 334

Internet service providers (ISPs), 13, 233–234, 237

internets, 16

interoperability of UNIX, 292

intranets, 16

IP (Internet Protocol) addresses, 37–38, 43–44, 242–243

configuring network devices with, 259–260

obtaining, 258

overview, 255

subnet masks, 257–258

subnetting, 255–256

IPSec (Internet Security Protocol), 334

IPv6 addresses, 39

IPX (Internetwork Packet Exchange), 45–46

IRQ settings, 203

ISO (International Organization for Standardization), 30, 150

ISPs (Internet service providers), 13, 233–234, 237

IT (information technology) jobs

education and certification, 311–313

help desk analysts, 310

IT directors, 311

network administrators, 310

daily tasks, 376–378

establishing network policies, 379–380

responsibilities of, 373–376

strategies for supporting users, 378–379

support specialists, 310

user support advisors, 310

ITU (International Telecommunications Union), 15, 24, 30, 150

IXPs (Internet Exchange Points), 234–235

J-K-L

Jobs, Steve, 67

jump blocks, 205

Just for Fun: The Story of an Accidental Revolutionary (Torvalds and Diamond), 87

kernels (UNIX), 86

killer apps, 26

L

L2TP (Layer 2 Tunneling Protocol), 135–136

LAC (L2TP Access Concentrator), 135

LNS (L2TP Network Server), 136

labels (ATM), 108

LAC (L2TP Access Concentrator), 135

LANs (local area networks)

examples, 13

overview, 11–12

WLANs (wireless LANs), 118

Layer 2 (Ethernet) addresses, 40

Layer 2 Tunneling Protocol (L2TP), 135–136

Layer 3 addresses, 37

layers

of Internet model

network components’ position in layers, 302–304

overview, 301–302

of OSI model

Layer 1 (physical), 35

Layer 2 (data link), 33–34

Layer 3 (network), 33

Layer 4 (transport), 32

Layer 5 (session), 32

Layer 6 (presentation), 32

Layer 7 (application), 31

relationship between layers, 34–35

leased lines, 106

levels (RAID)

RAID 0, 80

RAID 1, 80

RAID 5, 81

RAID 6, 81

library calls, 30

licensing, 343

Microsoft Windows Server 2003 licensing, 344

Microsoft Windows Server 2008 licensing, 344–345

Licklider, J. C. R., 232

Link Manager Protocol (LMP), 124

links, 11

LINUX, 67–68, 86–87, 188, 195–196

Linux

file sharing, 295–296

growth of, 383–384

as network platform, 292–293

network service configuration, 293–294

upgrading, 296

LMP (Link Manager Protocol), 124

LNS (L2TP Network Server), 136

local area networks. See LANs

LocalTalk, 67

logical network, 8, 11, 29, 167–171

diagrams, 167–171

structure, 272–274

logons, auditing, 326–327

logs, event, 364–366

Lotus Notes, 224–225

M

MAC (Media Access Control) addresses, 40

Macintosh OS X, 66–67, 189

macro viruses, 329

MacTCP, 67

MAE-East, 236

magnetism, disks and, 55

mail servers, 164

Management Information Bases (MIBs), 355–356

MCP (Microsoft Certified Professional), 312

media

Bluetooth, 91

coaxial cable, 90

copper wire, 88–89

optical fiber, 90

overview, 88

Wi-Fi, 91

Media Access Control (MAC) addresses, 40

Megabit Ethernet, 184

memory, 54

DIMMs (Dual Inline Memory Modules), 54

RAM (random access memory), 53–55

SIMMs (Single Inline Memory Modules), 54

troubleshooting, 363–364

MIBs (Management Information Bases), 355–356

microprocessors, 52–53

Microsoft Certified Professional (MCP), 312

Microsoft Exchange Outlook, 225–227

Microsoft Windows, 188–190, 192

Microsoft Windows NT Server 4.0, 272

Microsoft Windows Server 2003, 84–85, 194–195

domain client configuration, 279–280

folder sharing, 282–285

future of, 286

installing, 274–276

licensing, 344

logical network structure, 272–274

managing, 285–286

overview, 271

printers sharing, 282–285

protocol configuration, 280–282

server configuration, 276–278

Window client configuration, 279

Microsoft Windows Server 2008, 85, 287, 344–345

MIME (Multipurpose Internet Mail Extensions), 217

Minix, 86

mobile wireless networking

Bluetooth, 123–125

cell concept, 120–121

history of, 119–120

hybrid networks, 118

implementing, 126–127

overview, 117–119

security, 125–126

signal interference, 118

Wi-Fi

802.11a standard, 122

802.11b standard, 122

802.11g standard, 123

802.11n standard, 123

DSSS (direct sequence spread spectrum), 122

FHSS (frequency hopping spread spectrum), 122

frequency interference between W-Fi and Bluetooth, 125

WLANs (wireless LANs), 118

modems, 14

broadband modems, 132

cable modem, 102–103

cellular modems, 132

modulation/demodulation process, 131

proprietary modems, 131

V-Series modems, 131

modulation/demodulation process, 131

monitoring, 152–153, 357–358

motherboards, 52–53

MPLS, 111–112

MS-DOS, 66

multicasting, 38

multipartite viruses, 329

multiple-user computers, 160–161

multiplexing, 24

multiprocessing systems, 63

multitasking, 63

multiuser systems, 63

MX resource record, 254

N

name servers, 267

names

domain names

list of, 249–250

obtaining, 252–253

overview, 304

relationship within network, 305

usernames, 323

WINS (Windows Internet Naming Service), 260

namespaces, 248–250

NAT (Network Address Protocol), 39

needs, determining

of network, 156–159

of users, 159–161

.net domain name, 249

NetBEUI (Network BIOS Extended User Interface), 46

NetBIOS (Network Basic Input/Output System), 46

NetWare (Novell), 83–84, 192–194

Network Address Protocol (NAT), 39

network addresses

CIDR, 38–39

IP addresses, 37–38

IPv6 (version 6) addresses, 39

NAT (Network Address Protocol), 39

prefixes, 38

network administrators

budgeting, 313–314

daily tasks, 376–378

education and certification, 311–313

establishing network policies, 379–380

help desk analysts, 310

IT directors, 311

network administrators, 310

daily tasks, 376–378

establishing network policies, 379–380

responsibilities of, 373–376

strategies for supporting users, 378–379

overview, 309–310

project management, 315–317

responsibilities, 313, 373–376

strategies for supporting users, 378–379

support specialists, 310

user support advisors, 310

network architecture

client/server. See client/server model

Internet model

network components’ position in layers, 302–304

overview, 301–302

logical network, 8, 11

media

Bluetooth, 91

coaxial cable, 90

copper wire, 88–89

optical fiber, 90

overview, 88

Wi-Fi, 91

overview, 71

peer-to-peer networks

Linux, 188

Macintosh OS X, 189

Microsoft Windows OS, 188–192

when to use, 187–188

physical network, 8–9

bus topology, 10

cellular topology, 10

ring topology, 10

star topology, 9

position of components in layers, 302–304

protocols, 78

routers

capabilities of, 78

definition of, 74–75

forwarding, 77–78

routing, 75–76

speed

definition of, 72

factors contributing to, 72–73

hardware considerations, 73

software considerations, 73–74

network assembly, 199

Network Basic Input/Output System (NetBIOS), 46

Network BIOS Extended User Interface (NetBEUI), 46

network design, 155

network interface cards (NICs), 58–59, 202–206

network layer (OSI model), 33

network management

archives, 353

backups

backup media, 346

differential backup, 347

full backup, 347

Grandfather-Father-Son scheme, 347–349

incremental backup, 347

overview, 345

client licensing, 343

Microsoft Windows Server 2003 licensing, 344

Microsoft Windows Server 2008 licensing, 344–345

disaster recovery planning

assessing business impact, 350–351

assessing computing environment vulnerabilities, 351

defining computing infrastructure, 350

developing plan, 351–353

overview, 349–350

hardware upgrades, 340–341

network upgrades, 339–340

overview, 339

software upgrades, 341–343

network needs, determining, 156–159

network-network interface (NNI), 99

network operating systems. See NOSs

network policies, establishing, 379–380

network requirements, 5–6

network services, configuring on Linux server, 293–294

network upgrades, 339–340

networking definition, 4

NICs (network interface cards), 58–59, 202–206

NNI (network-network interface), 99

No Access, 164

nodes, 10

nonrepudiation, 322

NOSs (network operating systems)

client licensing, 343

Microsoft Windows Server 2003 licensing, 344

Microsoft Windows Server 2008 licensing, 344–345

Linux, 195–196

Microsoft Windows Server, 194–195

Novell NetWare, 192–194

UNIX, 195–196

Novell GroupWise, 223–224

Novell NetWare, 83–84, 192–194

NS resource record, 254

nslookup command, 371

number terminology, 49–50

O

open-standards email, 215

Open Systems Interconnection (OSI) protocols, 15

opening computer cases, 201

operating systems (OSs)

device drivers, 68

Linux, 67–68, 86–87, 188, 195–196

file sharing, 295–296

growth of, 383–384

as network platform, 292–293

network service configuration, 293–294

upgrading, 296

Macintosh OS X, 66–67, 189

Microsoft Windows, 189–192

Microsoft Windows Server, 194–195

Microsoft Windows Server 2003, 84–85

Microsoft Windows Server 2008, 85

multitasking, 63

NOSs (network operating systems), 192–196

Novell NetWare, 83–84, 192–194

overview, 62–65, 83

SOSs (server operating systems), 83–87

startup process, 63–65

UNIX, 67–68, 85–86, 195–196

files, 291

hierarchical file system, 292

history and development, 289–290

interoperability, 292

as network platform, 292–293

redirection, 291

Windows and Vista, 66

optical fiber, 90

.org domain name, 249

OSI (Open Systems Interconnection) model, 15

development of, 30

illustration, 31

Layer 1 (physical), 35

Layer 2 (data link), 33–34

Layer 3 (network), 33

Layer 4 (transport), 32

Layer 5 (session), 32

Layer 6 (presentation), 32

Layer 7 (application), 31

overview, 30–31

relationship between layers, 34–35

OSs. See operating systems

Outlook, 225–227

P

packets, 10, 44

frames, 34–35

identifying type of, 36

packet filtering, 331

packet switching, 21–24

paging, 74

Palo Alto Research Center (PARC), 67

PAP (Password Authentication Protocol), 332

PARC (Palo Alto Research Center), 67

passwords, 324–325

patch cords, 208

payloads, 104

PCI (peripheral component interconnect) cards, 58

PDU (protocol data unit), 36, 110–111

peer-to-peer networks, 161–162

OS (operating system) software

Linux, 188

Macintosh OS X, 189

Microsoft Windows, 188–192

when to use, 187–188

peering, 235–237

peripheral component interconnect (PCI) cards, 58

permanent virtual circuits, 109–110

permissions, 287, 327–328

physical layer (OSI model), 35

physical network, 8–9, 29

bus topology, 10

cellular topology, 10

physical network diagrams, 171–174

ring topology, 10

star topology, 9

ping command, 367–368

planning networks

best practices

applying, 147–149

benefits of, 144–145

definition of, 143–144

design, 146

implementation, 146

planning, 146

tuning, 147

disaster recovery planning

assessing business impact, 350–351

assessing computing environment vulnerabilities, 351

defining computing infrastructure, 350

developing plan, 351–353

overview, 349–350

overview, 143

security

monitoring, 152–153

overview, 150–151

secure behaviors, defining, 151–152

usage policies and procedures, 151

standards, 149–150

Point-to-Point Protocol (PPP), 133–135

Point-to-Point Tunneling Protocol (PPTP), 333

policies

establishing, 379–380

usage policies and procedures, 151

POP3, 214

ports, 240–241

Post Office Protocol 3 (POP3), 214

PPP (Point-to-Point Protocol), 133–135

PPTP (Point-to-Point Tunneling Protocol), 333

preemptive multitasking, 63

prefixes, 38

presentation layer (OSI model), 32

print servers, 163, 297

printers, sharing, 26, 282–285

privacy, 322

private addresses, 38

private key encryption, 320

private ports, 240

.pro domain name, 250

processors, 52–53

troubleshooting, 358–361

project management, 315–317

proprietary mail systems, 214–215

proprietary modems, 131

protocol converters, 5

protocol data unit (PDU), 36

protocols. See communications protocols

provisioning T1 trunks, 106

PTR resource record, 254

public key encryption, 320–321

Q-R

QoS (quality of service), 110

RADIUS (Remote Authentication Dial-In Service), 136, 332–333

RAID (redundant arrays of inexpensive disks)

RAID 0, 80

RAID 1, 80

RAID 5, 81

RAID 6, 81

RAM (random access memory), 53–54

read-only memoy (ROM), 50

Read-Write Access, 164

Red Hat Certification Program, 312

redirection in UNIX, 291

redundant arrays of inexpensive disks, 80

regional Internet registries (RIRs), 258

registered ports, 240

relaying traffic with addresses, 40–42

remote access hardware, 138–140

Remote Authentication Dial-In Service (RADIUS), 136, 332–333

remote networking, 131

history of, 129–130

L2TP (Layer 2 Tunneling Protocol), 135–136

overview, 129, 132–133

PPP (Point-to-Point Protocol), 133–135

remote access hardware, 138–140

security, 136

system administration, 130

VPNs (virtual private networks), 137–138

replay, 322

Request for Comments (RFCs), 15

residential broadband

cable modem, 102–103

definition of, 101

DSL, 101–102

satellite services, 103

resource permissions, 327–328

resource records (RRs), 253–254

reviewing specification documents, 176

RFCs (Request for Comments), 15

RIB (routing information base), 75

ring topology, 10

RIRs (regional Internet registries), 258

RJ-45 jacks, 207

ROM (read-only memory), 50

root name servers (DNS), 250

routers, 9

capabilities of, 78

choosing, 182

definition of, 74–75

forwarding, 77–78

routing, 75–76

troubleshooting, 356–357

routing, 75–76

route aggregation, 39

route discovery, 75–76

route filtering, 235

routing information base (RIB), 75

routing tables, 75

RRs (resource records), 253–254

S

Sams Teach Yourself Microsoft Windows Server 2008 in 24 Hours (Habraken), 287

SATA (Serial Advanced Technology Attachment), 56

satellite services, 103

scheduling, 219–221

SCP (Sun Certified Professional), 312

secure behaviors, defining, 151–152

Secure Shell (SSH), 333

Secure Socket Tunneling Protocol (SSTP), 333

Secure Sockets Layer (SSL), 333

security

access control, 322–323

audits, 326–327

authentication, 322

best practices, 336–337

bombs, 322

certificates, 321

CHAP (Challenge Handshake Authentication Protocol), 332

digital signatures, 321

DNSSEC (DNS Security Protocol), 334

encryption

private key, 320

public key, 320–321

external attacks, 330

file servers, 164–165

firewalls

overview, 330–331

packet filtering, 331

Windows Firewall settings, 331–332

inheritance, 164

integrity, 322

IPSec (Internet Security Protocol), 334

mobile wireless networks, 125–126

monitoring, 152–153

nonrepudiation, 322

overview, 150–151, 319–320

PAP (Password Authentication Protocol), 332

passwords, 324–325

permissions, 287

PPTP (Point-to-Point Tunneling Protocol), 333

privacy, 322

RADIUS (Remote Authentication Dial In User Service), 332–333

remote networking, 136

replay, 322

resource permissions, 327–328

secure behaviors, defining, 151–152

SSH (Secure Shell), 333

SSL (Secure Sockets Layer), 333

SSTP (Secure Socket Tunneling Protocol), 333

Trojan horses, 321

usage policies and procedures, 151

viruses, 321, 328–329

wireless networks, 335–336

worms, 321

sendmail, 213

sequence numbers, 24

Serial Advanced Technology Attachment (SATA), 56

server-based networks

application servers, 163

authentication servers, 164

backups, 165

communication servers, 163

configuration management, 166

file servers, 163–165

mail servers, 164

print servers, 163

web servers, 164

server operating systems (SOSs), 83–87

servers

application servers, 163, 297

authentication servers, 164, 298

choosing, 180–181

communication servers, 163, 297

DHCP servers, 297

DNS servers, 297

fault tolerance, 81–82

file servers, 163–165, 297

high availability, 81–82

Linux. See Linux

mail servers, 164

Microsoft Windows NT Server 4.0, 272

Microsoft Windows Server 2003

domain client configuration, 279–280

folder sharing, 282–285

future of, 286

installing, 274–276

logical network structure, 272–274

managing, 285–286

overview, 271

printers sharing, 282–285

protocol configuration, 280–282

server configuration, 276–278

Window client configuration, 279

Microsoft Windows Server 2008, 287

name servers, 267

overview, 80

print servers, 163, 297

RAID (redundant arrays of inexpensive disks), 80–81

server-based networks, 163–164

backups, 165

configuration management, 166

SOSs (server operating systems), 83–87

static IP settings, 259–260

troubleshooting, 357–358

web servers, 164, 297

service set identifier (SSID), 335

session layer (OSI model), 32

sharing

files on Linux networks, 295–296

folders on Microsoft Windows Server 2003, 282–285

printers, 26 on Microsoft Windows Server 2003, 282–285

software, 25–26

Showstopper (Zachary), 84

signal interference, 118

signatures, digital, 321

SIMMs (Single Inline Memory Modules), 54

Simple Mail Transport Protocol (SMTP), 214

Simple Network Management Protocol (SNMP), 356

Single Inline Memory Modules (SIMMs), 54

single-tasking systems, 63

single-user systems, 63

Smartmodem, 131

SMTP (Simple Mail Transfer Protocol), 214

SNMP (Simple Network Management Protocol), 356

SOA resource record, 253

sockets, 241–242, 304–305

software

definition of, 50

device drivers, 68

firmware, 50

groupware, 25

killer apps, 26

OSs (operating systems)

device drivers, 68

LINUX, 67–68

Mac OS, 66–67

multitasking, 63

overview, 62–65

startup process, 63–65

UNIX, 67–68

Windows and Vista, 66

sharing, 25–26

speed, 73–74

upgrades, 341–343

solid state drives (SSDs), 56–57

SONET (Synchronous Optical Network), 90, 103–104, 107–108, 236

SONET and T1: Architectures for Digital Transport Networks (Black and Waters), 104

SonicWALL, 219

SOSs (server operating systems), 83–87

source addresses, 24

spam, 218–219

SpamAssassin, 219

specification documents

reviewing with users, 176

writing, 174–175

speed, 27, 72–74

SSDs (solid state drives), 56–57

SSH (Secure Shell), 333

SSID (service set identifier), 335

SSL (Secure Sockets Layer), 333

SSTP (Secure Socket Tunneling Protocol), 333

standards, 149–150

star topology, 9

startup process, 63–65

static electricity, 199–200

subnet masks, 257–258

subnetting, 255–256

Sun Certified Professional (SCP), 312

support specialists, 310

switches, 9, 182, 208

synchronization, T1, 105

Synchronous Optical Network (SONET), 90, 236

system calls, 62

system logs, 364–366

T

T1, 103–104

leased lines, 106

provisioning trunks, 106

synchronization of signals, 105

T-carrier family, 105–106

uses for T1 lines, 106

tables, routing, 75

TCP (Transmission Control Protocol), 243–244

TCP/IP, 238–240

nslookup command, 371

ping command, 367–368

traceroute command, 370–371

Telnet, 129–130

templates (website), 268–269

threats to security

bombs, 322

external attacks, 330

replay, 322

Trojan horses, 321

viruses, 321, 328–329

worms, 321

time-division multiplexing, 24

Time to Live (TTL), 43, 242

Tocqueville, Alexis de, 19

Token Ring, 43

topologies, 9–10, 166–167

Torvalds, Linus, 86–87

TOS (Type of Service), 43, 242

traceroute command, 370–371

traffic, 10

flow of, 112–113

relaying with addresses, 40–42

Transmission Control Protocol (TCP), 243–244

transport layer (OSI model), 32

Trojan horses, 321

troubleshooting

email, 217–218

hard drive performance, 361–362

memory utilization, 363–364

MIBs (Management Information Bases), 355–356

overview, 355

processor performance, 358–361

routers, 356–357

server hardware, 357–358

SNMP (Simple Network Management Protocol), 356

tools

event logs, 364–366

FTP (File Transfer Protocol), 369–370

nslookup command, 371

ping command, 367–368

traceroute command, 370–371

trusts, 272

TTL (Time to Live), 43, 242

tuning, 147

twisted-pair wires, 88–89

Type of Service (TOS), 43, 242

U

UDP (User Datagram Protocol), 244

Ultra DMA, 56

UNI (user-network interface), 99

universal serial bus (USB), 60–62

UNIX, 67–68, 85–86, 195–196

files, 291

history and development, 289–290

interoperability, 292

as network platform, 292–293

redirection, 291–292

unplugging computers, 200

upgrading

hardware, 340–341

Linux server, 296

networks, 339–340

software, 341–343

usage policies and procedures, 151

USB (universal serial bus), 60–62

User Datagram Protocol (UDP), 244

user-network interface (UNI), 99

user support advisors, 310

users

needs, determining, 159–161

reviewing specification documents with, 176

usernames, 323

V

V-Series modems, 131

video adapter cards, 59–60

virtual circuit/path IDs, 44

virtual private networks (VPNs), 7, 137–138

viruses, 321, 328–329

Vista, 66

VoIP (Voice over IP), 102

VPNs (virtual private networks), 7, 137–138

vulnerabilities, assessing, 351

W-X-Y-Z

WANs (wide area networks)

components

ATM, 108–111

frame relay, 111

MPLS, 111–112

overview, 97–99

SONET, 103–104, 107–108

T1, 103–106

examples, 13, 97

interfaces, 99–101

overview, 12–13, 95–97

residential broadband

cable modem, 102–103

definition of, 101

DSL, 101–102

satellite services, 103

traffic flow, 112–113

WAPs (wireless access points), 182

wardriving, 335

Waters, Sharleen, 104

Web

HTML (Hypertext Markup Language), 265–266

HTTP (Hypertext Transfer Protocol), 266–267

overview, 264–265

websites, 4, 267–269

web servers, 164, 297

well-known ports, 240

WEP, 336

Wi-Fi, 8, 91, 122–123

802.11a standard, 122

802.11b standard, 122

802.11g standard, 123

802.11n standard, 123

DSSS (direct sequence spread spectrum), 122

FHSS (frequency hopping spread spectrum), 122

frequency interference between W-Fi and Bluetooth, 125

Wi-Fi Alliance, 336

wide area networks. See WANs

Wikipedia, 4

Wild Blue, 103

WiMax, 384

Windows Internet Naming Service (WINS), 260

Windows, 188–190, 192

Windows Firewall, 331–332

Windows NT Server 4.0, 272

Windows Server 2003, 84–85, 194–195

domain client configuration, 279–280

folder sharing, 282–285

future of, 286

installing, 274–276

licensing, 344

logical network structure, 272–274

managing, 285–286

overview, 271

printers sharing, 282–285

protocol configuration, 280–282

server configuration, 276–278

Window client configuration, 279

Windows Server 2008, 85, 287, 344–345

Windows XP, 66

WINS (Windows Internet Naming Service), 260

wireless access points (WAPs), 182

wireless networking, 8

mobile wireless networking

Bluetooth, 91, 123–125

cell concept, 120–121

history of, 119–120

hybrid networks, 118

implementing, 126–127

overview, 117–119

security, 125–126

signal interference, 118

Wi-Fi, 91, 122–125

WLANs (wireless LANs), 118

network assembly, 210

security, 335–336

WAPs (wireless access points), 182

WiMax, 384

wiring closets, 207–209

WLANs (wireless LANs), 118

worms, 321

WPA, 336

wrist straps, 200

writing specification documents, 174–175

Xerox Network Services (XNS), 45

Zachar, Pascal, 84

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.194.123