| Introduction |
|
1 | (4) |
|
Conventions Used in This Book |
|
|
1 | (2) |
|
How This Book Is Organized |
|
|
3 | (2) |
| I Networking Basics |
|
5 | (100) |
|
1 Computer Networking Overview |
|
|
7 | (1) |
|
|
|
8 | (11) |
|
Why Network Your Computers |
|
|
9 | (1) |
|
PC Networking: How It All Began |
|
|
10 | (3) |
|
Mainframes and Miniframes |
|
|
10 | (1) |
|
|
|
11 | (1) |
|
|
|
12 | (1) |
|
Clients and Servers: What Does It All Mean |
|
|
13 | (2) |
|
Network Players: Users and Administrators |
|
|
15 | (1) |
|
Understanding LAN Data Transmission |
|
|
15 | (2) |
|
Networking Does Not Require the "All Knowing" |
|
|
17 | (2) |
|
2 Different Needs, Different Networks |
|
|
19 | (20) |
|
Understanding Peer-to-Peer Networking |
|
|
20 | (4) |
|
Peer Products Come and Go |
|
|
20 | (1) |
|
Peer-to-Peer Networking Today |
|
|
21 | (1) |
|
Pros of Peer-to-Peer Networking |
|
|
22 | (1) |
|
Cons of Peer-to-Peer Networking |
|
|
23 | (1) |
|
|
|
24 | (6) |
|
Pros and Cons of Server-Based Networking |
|
|
25 | (2) |
|
|
|
27 | (3) |
|
Understanding Network Topologies |
|
|
30 | (4) |
|
|
|
31 | (1) |
|
|
|
32 | (1) |
|
|
|
33 | (1) |
|
Assessing Your Network Needs |
|
|
34 | (1) |
|
|
|
35 | (4) |
|
|
|
39 | (20) |
|
Working with Network Interface Cards |
|
|
40 | (6) |
|
|
|
41 | (2) |
|
|
|
43 | (3) |
|
Working with Network Connectivity Devices |
|
|
46 | (6) |
|
|
|
47 | (1) |
|
|
|
48 | (1) |
|
|
|
48 | (1) |
|
|
|
48 | (2) |
|
|
|
50 | (2) |
|
Some Thoughts on PC Hardware |
|
|
52 | (7) |
|
|
|
52 | (1) |
|
|
|
53 | (1) |
|
|
|
53 | (2) |
|
|
|
55 | (1) |
|
Network Server Considerations |
|
|
56 | (1) |
|
Network Client Considerations |
|
|
57 | (1) |
|
A Final Word on Computer Hardware |
|
|
58 | (1) |
|
4 Building the Network Infrastructure |
|
|
59 | (20) |
|
Understanding Network Architectures |
|
|
60 | (1) |
|
|
|
61 | (5) |
|
Ethernet Network Access Strategy |
|
|
62 | (1) |
|
|
|
63 | (1) |
|
|
|
63 | (1) |
|
Ethernet IEEE and Cable Specifications |
|
|
64 | (2) |
|
Understanding IBM Token-Ring |
|
|
66 | (3) |
|
Token-Ring Network Access Strategy |
|
|
67 | (1) |
|
Token-Ring IEEE and Cabling Standards |
|
|
68 | (1) |
|
|
|
69 | (1) |
|
Choosing a Network Connectivity Strategy |
|
|
70 | (9) |
|
|
|
70 | (3) |
|
|
|
73 | (1) |
|
Phone and Electrical Wire Networks |
|
|
74 | (1) |
|
|
|
75 | (4) |
|
|
|
79 | (1) |
|
5 Network Protocols: Real and Imagined |
|
|
79 | (26) |
|
Understanding the OSI Model |
|
|
81 | (1) |
|
|
|
82 | (7) |
|
|
|
84 | (1) |
|
|
|
85 | (1) |
|
|
|
85 | (1) |
|
|
|
86 | (1) |
|
|
|
87 | (1) |
|
|
|
88 | (1) |
|
|
|
89 | (1) |
|
Thoughts on Using a Conceptual Model |
|
|
89 | (1) |
|
|
|
90 | (5) |
|
|
|
92 | (1) |
|
|
|
92 | (1) |
|
|
|
93 | (1) |
|
|
|
94 | (1) |
|
|
|
95 | (4) |
|
|
|
96 | (1) |
|
|
|
97 | (1) |
|
|
|
98 | (1) |
|
Other Network Protocols of Note |
|
|
99 | (8) |
|
|
|
99 | (1) |
|
|
|
100 | (1) |
|
|
|
101 | (4) |
| II Getting the Network Up and Running |
|
105 | (142) |
|
6 Configuring Peer-to-Peer Networks |
|
|
107 | (24) |
|
Selecting and Configuring Network Protocols |
|
|
108 | (6) |
|
Windows and LAN Protocols |
|
|
109 | (3) |
|
|
|
112 | (2) |
|
Setting Up the Peer-to-Peer Network |
|
|
114 | (7) |
|
Creating Windows Workgroups |
|
|
115 | (3) |
|
Windows Folder and Printer Sharing |
|
|
118 | (3) |
|
Combining Linux and Windows |
|
|
121 | (7) |
|
Configuring and Using Samba |
|
|
122 | (2) |
|
|
|
124 | (4) |
|
Accessing Windows Workgroup Shares |
|
|
128 | (1) |
|
A Final Word on Peer-to-Peer Networking |
|
|
129 | (2) |
|
7 Network Operating System Overview |
|
|
131 | (14) |
|
|
|
132 | (1) |
|
Client and NOS Interaction |
|
|
132 | (4) |
|
Configuring Network Clients |
|
|
133 | (2) |
|
Configuring Client Computers with LAN Protocols |
|
|
135 | (1) |
|
Configuring a Server with an NOS |
|
|
136 | (5) |
|
Server Hardware Configuration |
|
|
136 | (2) |
|
|
|
138 | (1) |
|
|
|
139 | (2) |
|
Sharing Folders and Directories |
|
|
141 | (1) |
|
How Network Printing Works |
|
|
142 | (3) |
|
8 Networking with Novell NetWare 6.5 |
|
|
145 | (28) |
|
|
|
146 | (1) |
|
The Netware Network Structure |
|
|
147 | (1) |
|
|
|
148 | (5) |
|
NetWare Installation: DOS Phase |
|
|
150 | (1) |
|
NetWare Installation: GUI Phase |
|
|
151 | (2) |
|
Administering a Novell Network |
|
|
153 | (3) |
|
Working with Volumes and Folders |
|
|
156 | (10) |
|
Creating and Sharing Directories |
|
|
159 | (2) |
|
|
|
161 | (3) |
|
Configuring an iPrint Client |
|
|
164 | (2) |
|
Working with Users and Groups |
|
|
166 | (2) |
|
Configuring Network Clients |
|
|
168 | (1) |
|
|
|
169 | (4) |
|
9 Networking with Microsoft Windows Server 2003 |
|
|
173 | (26) |
|
Understanding the Microsoft Networking Model |
|
|
174 | (1) |
|
Installing Microsoft Windows Server 2003 |
|
|
175 | (4) |
|
|
|
176 | (1) |
|
Performing a Clean Install or an Upgrade |
|
|
177 | (1) |
|
|
|
178 | (1) |
|
|
|
179 | (3) |
|
Understanding Windows Active Directory |
|
|
182 | (2) |
|
Active Directory Users and Computers |
|
|
182 | (1) |
|
Active Directory Domains and Trusts |
|
|
183 | (1) |
|
Active Directory Sites and Services |
|
|
183 | (1) |
|
|
|
184 | (1) |
|
|
|
185 | (1) |
|
Understanding Share Permissions |
|
|
186 | (2) |
|
Windows and NTFS Permissions |
|
|
188 | (3) |
|
|
|
191 | (3) |
|
Security and Windows Server 2003 |
|
|
194 | (5) |
|
|
|
199 | (22) |
|
|
|
200 | (7) |
|
|
|
202 | (1) |
|
|
|
203 | (1) |
|
Selecting Installation Packages |
|
|
204 | (1) |
|
Booting Your Linux System |
|
|
205 | (1) |
|
Upgrading Your Linux System Software |
|
|
205 | (2) |
|
Linux Administrative Tools |
|
|
207 | (3) |
|
|
|
210 | (3) |
|
Working with Red Hat Network Services |
|
|
213 | (3) |
|
Sharing Network Resources |
|
|
216 | (7) |
|
Configuring the Network File System |
|
|
217 | (2) |
|
|
|
219 | (1) |
|
|
|
220 | (3) |
|
Monitoring the System and Network |
|
|
223 | |
|
11 Working with Applications on the Network |
|
|
221 | (26) |
|
Selecting Application Software |
|
|
228 | (1) |
|
Using Application Software on the Network |
|
|
229 | (4) |
|
Client-Based Applications |
|
|
230 | (1) |
|
Network-Based Applications |
|
|
230 | (1) |
|
Sharing Application Files with SharePoint |
|
|
231 | (2) |
|
Working with Groupware Products |
|
|
233 | (10) |
|
|
|
234 | (2) |
|
|
|
236 | (4) |
|
Using Microsoft Exchange Server |
|
|
240 | (3) |
|
Understanding Microsoft.NET |
|
|
243 | (1) |
|
Understanding Client/Server Databases |
|
|
244 | (3) |
| III Expanding Your Network |
|
247 | (118) |
|
12 TCP/IP Network Administration |
|
|
249 | (26) |
|
Working with IP Addresses |
|
|
250 | (1) |
|
|
|
251 | (2) |
|
|
|
253 | (5) |
|
DHCP Client Address Requests |
|
|
253 | (2) |
|
Configuring a DHCP Server |
|
|
255 | (3) |
|
|
|
258 | (8) |
|
|
|
259 | (2) |
|
|
|
261 | (1) |
|
|
|
262 | (4) |
|
Routing and Subnetting IP Networks |
|
|
266 | (6) |
|
Configuring a Router Interface |
|
|
266 | (2) |
|
Subnetting IP Address Pools |
|
|
268 | (4) |
|
|
|
272 | (3) |
|
13 Expanding a LAN with WAN Technology |
|
|
275 | (18) |
|
Working with the Plain Old Telephone System |
|
|
276 | (2) |
|
Working with Dial-up and Dedicated Connections |
|
|
278 | (4) |
|
Asynchronous Modem Connections |
|
|
279 | (2) |
|
|
|
281 | (1) |
|
|
|
282 | (1) |
|
Understanding Switched Networks |
|
|
283 | (7) |
|
|
|
284 | (3) |
|
Packet-Switching Networks |
|
|
287 | (3) |
|
A Word Regarding Remote Access |
|
|
290 | (3) |
|
14 How the Internet Works |
|
|
293 | (18) |
|
Where Did the Internet Come From? |
|
|
294 | (1) |
|
Working with the File Transfer Protocol |
|
|
295 | (5) |
|
|
|
296 | (2) |
|
|
|
298 | (1) |
|
|
|
299 | (1) |
|
Understanding Electronic Mail |
|
|
300 | (5) |
|
|
|
301 | (1) |
|
|
|
302 | (1) |
|
|
|
302 | (1) |
|
|
|
303 | (2) |
|
Configuring an Email Client |
|
|
305 | (1) |
|
|
|
305 | (1) |
|
|
|
306 | (5) |
|
|
|
307 | (1) |
|
|
|
308 | (3) |
|
15 Connecting a Network to the Internet |
|
|
311 | (18) |
|
Connecting to the Internet |
|
|
312 | (4) |
|
Accessing the Internet Backbone |
|
|
312 | (1) |
|
Choosing an Internet Service Provider |
|
|
313 | (2) |
|
Choosing a Connection Type |
|
|
315 | (1) |
|
Getting Your Own Domain Name |
|
|
316 | (2) |
|
Getting Your IP Addresses |
|
|
318 | (1) |
|
Sharing an Internet Connection |
|
|
319 | (3) |
|
Hardware Required for Sharing an Internet Connection |
|
|
320 | (1) |
|
IP Addressing for the Computer Sharing the Connection |
|
|
320 | (2) |
|
Sharing an Internet Connection with Windows Server 2003 |
|
|
322 | (1) |
|
Working with Proxy Servers |
|
|
323 | (2) |
|
Understanding Network Address Translation |
|
|
325 | (4) |
|
|
|
329 | (16) |
|
The Internet and Your Corporate Presence |
|
|
330 | (4) |
|
|
|
331 | (1) |
|
|
|
332 | (1) |
|
|
|
332 | (2) |
|
Who Will Host Your Web Site? |
|
|
334 | (5) |
|
Hosting Your Own Web Site |
|
|
335 | (2) |
|
|
|
337 | (2) |
|
|
|
339 | (4) |
|
|
|
340 | (1) |
|
|
|
341 | (2) |
|
Taking Advantage of an Intranet |
|
|
343 | (2) |
|
|
|
345 | (20) |
|
The Evolution of Mobile Computing Devices |
|
|
346 | (1) |
|
|
|
347 | (2) |
|
Understanding Remote Access |
|
|
349 | (5) |
|
Configuring an RAS Server for Dial-Up Access |
|
|
350 | (2) |
|
Configuring an RAS Client |
|
|
352 | (2) |
|
Understanding Access Protocols |
|
|
354 | (1) |
|
Managing Remote Connections |
|
|
354 | (1) |
|
Working with Virtual Private Networks |
|
|
355 | (4) |
|
Configuring a Tunnel Server |
|
|
356 | (1) |
|
Configuring a Tunnel Client |
|
|
357 | (1) |
|
Monitoring VPN Connections |
|
|
358 | (1) |
|
|
|
359 | (8) |
|
PDA and PC Synchronization |
|
|
359 | (3) |
|
|
|
362 | (3) |
| IV Keeping the Network Running Smoothly |
|
365 | (66) |
|
18 Protecting Network Data |
|
|
367 | (18) |
|
Understanding Hard Drives |
|
|
368 | (3) |
|
|
|
368 | (3) |
|
|
|
371 | (1) |
|
|
|
371 | (1) |
|
Understanding the RAID Flavors |
|
|
372 | (5) |
|
|
|
374 | (1) |
|
|
|
375 | (1) |
|
|
|
376 | (1) |
|
|
|
377 | (6) |
|
|
|
379 | (2) |
|
Creating a Backup Strategy |
|
|
381 | (2) |
|
Working with Uninterruptible Power Supplies |
|
|
383 | (2) |
|
19 Network Troubleshooting |
|
|
385 | (20) |
|
It's Not Always User Error |
|
|
386 | (1) |
|
Identifying Network Operating System Problems |
|
|
387 | (3) |
|
Diagnosing Hardware Problems |
|
|
390 | (5) |
|
|
|
395 | (2) |
|
Dealing with Connectivity Issues |
|
|
397 | (5) |
|
Checking Settings and Connections from the Command Line |
|
|
398 | (3) |
|
Basic Connectivity Troubleshooting Tools |
|
|
401 | (1) |
|
Your Approach to Troubleshooting |
|
|
402 | (3) |
|
20 A Network Security Primer |
|
|
405 | (26) |
|
|
|
406 | (1) |
|
Working with User Accounts |
|
|
407 | (6) |
|
|
|
408 | (3) |
|
Other User Account Options |
|
|
411 | (2) |
|
Understanding Share Permissions |
|
|
413 | (2) |
|
Using Groups to Provide Access Levels |
|
|
415 | (2) |
|
|
|
417 | (5) |
|
|
|
418 | (2) |
|
|
|
420 | (1) |
|
|
|
421 | (1) |
|
Protecting a Network from Outside Attack |
|
|
422 | (2) |
|
|
|
424 | (3) |
|
|
|
427 | (2) |
|
A Final Word on Network Security |
|
|
429 | (2) |
| Glossary |
|
431 | (20) |
| Index |
|
451 | |