Skip to content

Upgrading and Repairing Networks

Best in textbook rentals since 2012!

ISBN-10: 078973530X

ISBN-13: 9780789735300

Edition: 5th 2006 (Revised)

Authors: Terry W. Ogletree, Mark Edward Soper, Mark Edward Soper

List price: $59.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

This is a reference guide to help network administrators upgrade and repair daily network problems, updated with the latest changes in wireless an wired networking. The fifth edition contains the latest hardware and technology improvements.
Customers also bought

Book details

List price: $59.99
Edition: 5th
Copyright year: 2006
Publisher: Que
Binding: Paperback
Pages: 1200
Size: 7.00" wide x 9.25" long x 2.00" tall
Weight: 3.982
Language: English

Introduction
Who Should Use This Book?
What Will You Find Inside?
What's New in This Edition
Up Front: Network Planning and Design Concepts
A Short History of Computer Networking
Overview of Network Topologies
LAN Topologies
Building and Campus Topologies
Multi-Tiered Network Topology
Network Design Strategies
Planning a Logical Network Design
Planning and Design Components
The Physical Network
Planning Resources
Upgrading Strategies and Project Management
Where Do You Start?
Determining When an Upgrade is Necessary-The Evaluation Process
What Resources Are Needed for the Upgrade?
Planning an Upgrade
Testing the Plan
Deployment
User Training
Closing the Book-Documenting What Has Changed and Why
Other Considerations for Upgrading
Protecting the Network: Preventative Maintenance Techniques
Power Conditioning and Uninterruptible Power Supplies (UPSs)
Network Monitoring
Server and Workstation Backups
Routine Maintenance
Building Redundancy into the Network
Recovery Planning
Justifying Preventative Maintenance
Physical Networking Components
Wiring the Network-Cables, Connectors, Concentrators, and Other Network Components
Structured Wiring
Important Definitions
Physical Cable Types
Terminations and Connections
Telecommunications Rooms
Network Interface Cards
Choosing a Hardware Bus Type
The Wired for Management (WfM) Initiative
Multi-Homed Systems
Load Balancing and Dual-Redundant Network Controllers
Software Drivers
IRQs and I/O Ports
Troubleshooting Network Cards
Network Switches
How Switches Work
Switch Hardware Types
Switch Troubleshooting and Management
Virtual LANs
Virtual LANs and Network Topologies
Switching Based on Network Frames
Implicit and Explicit Tagging
IEEE Standards for Virtual LANs
What Kind of Switch Should You Buy?
Routers
What Routers Do
The Difference Between Routable Protocols and Routing Protocols
When Do You Need to Use a Router?
Router Ports and Connections
Configuring Routers
Router Chassis Types
Network Attached Storage (NAS) and Storage Area Networks (SANs)
Local Versus Networked Storage Devices
Network Attached Storage
Storage Area Networks
Basic SANs: Arbitrated Loops
Using a Fabric Switched Topology for SANs
A Mixed Topology of Loops and Switches
IP SANs and iSCSI
What Kind of NAS or SAN Solution Should You Use?
Low-Level Network Protocols
The IEEE LAN/MAN Committee Networking Standards
What Is the LAN/MAN Committee?
Obtaining the IEEE 802 Standards Documents Free
Ethernet: The Universal Standard
A Short History of Ethernet
Collisions: What Are CSMA/CA and CSMA/CD?
Restrictions on Legacy Ethernet Topologies
Using a Bus Topology
Using a Star Topology
Hybrid LAN Topologies
Using a Backbone to Connect the Enterprise
Ethernet Frames
Fast Ethernet (IEEE 802.3u) and Gigabit Ethernet (IEEE 802.3z)
Ethernet Problems
Ethernet Errors
Monitoring Errors
Dedicated Connections and Wan Protocols
Dial-Up Connections
The Point-to-Point Protocol and the Serial Line Internet Protocol
The Serial Line Internet Protocol (SLIP)
The Point-to-Point Protocol (PPP)
Configuring a Windows XP Professional Client for Dial-Up
When Dial-Up Isn't Fast Enough
Dedicated Connections
Leased Lines
Asynchronous Transfer Mode (ATM)
The Importance of Frame Relay and the X.25 Interface
Digital Subscriber Lines (DSL) Technology
DSL and Cable Modems
The Future of DSL
Using a Cable Modem
How Cable Modems Work
How Cable Modems Differ from xDSL Broadband Access
The Data Over Cable Service Interface Specification (DOCSIS)
Choosing Between Cable and DSL
Wireless Networking Protocols
Introduction to Wireless Networking
Why Wireless Networks Have Proliferated
Access Points and Ad Hoc Networks
Physical Transmission Technologies
The IEEE 802.11 Wireless Standard
Sources of Interference for Wireless Networks
IEEE 802.11b: Wi-Fi Pioneer
Components of an 802.11-Based Wireless Network
802.11b-First, But Fading Away
What to Look for in an Access Point
Do You Need a Wireless Network?
Connecting the Wireless Network to a Wired LAN
Dual-Mode Access Points
Why Wi-Fi?
Faster Service: IEEE 802.11a
Overview of the IEEE 802.11a Standard
Comparing 802.11a with 802.11b and 802.11g
The IEEE 802.11g Standard
Overview of the 802.11g Standard
Installing a Wireless-G Broadband Router
Installing and Configuring a Wireless Network Adapter
Proprietary Extensions to the IEEE 802.11g Standard
Improving Network Performance with Dual-Band Wireless Technology
Which Wireless Protocol Should You Use?
Bluetooth Wireless Technology
The Bluetooth Special Interest Group (SIG)
General Overview of Bluetooth
Piconets and Scatternets
Bluetooth Device Modes
SCO and ACL Links
What Are Bluetooth Profiles?
Bluetooth Is More Than a Wireless Communication Protocol
Security and Other Wireless Technologies
Instant Messaging and Consumer Devices
Wireless Security
Personal Area Networks (PANs)
Lan and Wan Network, Service, and Application Protocols
Overview of the TCP/IP Protocol Suite
TCP/IP and the OSI Reference Model
The Internet Protocol (IP)
The Address Resolution Protocol-Resolving IP Addresses to Hardware Addresses
The Transmission Control Protocol (TCP)
The User Datagram Protocol (UDP)
Ports, Services, and Applications
The Internet Control Message Protocol (ICMP)
Basic TCP/IP Services and Applications
The File Transfer Protocol (FTP)
The Telnet Protocol
Using Telnet and FTP with a Firewall
The R-Utilities
The Finger Utility
Other Services and Applications Built on the TCP/IP Suite
Internet Mail Protocols: POP3, SMTP, and IMAP
How SMTP Works
Putting It All Together
The Post Office Protocol (POP3)
The Internet Message Access Protocol Version 4 (IMAP4)
Troubleshooting Tools for TCP/IP Networks
Checking the Host System's Configuration First
Using ping and tracert to Check Connectivity
Using the nslookup Command to Trouble-shoot Name Resolution Issues
Other Useful Commands
Using Network Connection Repair in Windows XP
BOOTP and Dynamic Host Configuration Protocol (DHCP)
What Is BOOTP?
Taking BOOTP One Step Further: DHCP
Installing and Configuring a DHCP Server on Windows 2000/2003
Using DHCP with Red Hat Linux
Configuring a Router or WAP to Provide DHCP Services
Network Name Resolution
Hardware Versus Protocol Addresses
NetBIOS
Installing and Configuring WINS on Windows 2000/2003 Servers
TCP/IP Names
Installing DNS on a Windows Server
Network Information Service
Using the Active Directory Service
Early Directory Technologies
Objects and Attributes
What Is a Domain Tree? What Is a Forest?
The Active Directory and Dynamic DNS
Active Directory Service Interfaces (ADSI)
The Active Directory Schema
Finding Objects in the Active Directory
The Active Directory Service and Windows Server 2003
New Active Directory Features in Windows Server 2003
File Server Protocols
Why File Server Protocols are Important
Server Message Block (SMB) and the Common Internet File System (CIFS)
NetWare Core Protocol (NCP)
Unix Network File System (NFS)
Microsoft Distributed File System (DFS)
The Hypertext Transfer Protocol
The Beginning of HTTP
Defining HTTP
URLs, URIs, and URNs
Routing Protocols
Basic Types of Routing Protocols
Multi-Protocol Label Switching (MPLS)
The Secure Sockets Layer (SSL) Protocol
Symmetric and Asymmetric Encryption
Does SSL Provide Enough Security for Internet Transactions?
OpenSource SSL
Introduction to the IPv6 Protocol
What's the Difference Between IPv4 and IPv6?
The IPv6 Headers
Other IPv6 Considerations
The Future of IPv6
Network User and Resource Management
Windows NT Domains
Workgroups and Domains
Windows NT User Groups
Managing User Accounts
Passwords and Policies
Strategies to Minimize Logon Problems
Windows 2000 and Windows Server 2003 User and Computer Management Utilities
The Microsoft Management Console
User Management
Computer Management
Windows 2000 User Groups
Managing Unix and Linux Users
User Administration
Network Information Service (NIS)
Common Login Problems
Rights and Permissions
User-Level and Share-Level Security
Assigning User Rights for Windows 2000, Server 2003, and XP
NTFS Standard and Special Permissions
User Groups Make Managing User Rights Easier
User Groups in Windows 2000 and Server 2003
Active Directory Groups
NetWare
Unix and Linux
Network Printing Protocols
Printing Protocols and Printing Languages
Data Link Control Protocol (DLC)
Internet Printing Protocol (IPP)
Print Servers
Unix/Linux Printing
Configuring Windows Print Servers
Installing and Configuring Printers on Windows Servers
Printing Under Netware
Hardware-Based Print Servers-Print Server Appliances
System and Network Security
Basic Security Measures Every Network Administrator Needs to Know
Policies and Procedures
Physical Security Measures
The Two Sides of Security
System Daemons and Services
Removing Dead Wood
Delegating Authority
Don't Forget About Firewalls
Auditing and Other Monitoring Measures
Unix and Linux Systems
Configuring Windows NT 4.0 Auditing Policies
Configuring Windows 2000 and Windows Server 2003 Auditing Policies
Auditing Windows XP Professional Computers
Novell Security
NetWare Auditing Solutions
Security Issues for Wide Area Networks
You've Been Targeted!
Computer Viruses, Trojan Horses, and Other Destructive Programs
Your Network Under Fire-Common Attacks
Network Probes
Spoofing and Impersonation
If It's Too Good to Be True, It Isn't
Preventative Measures
Staying on Top of Security Issues
Firewalls
What Is a Firewall?
Packet Filters
Intrusion Detection (Stateful Inspection)
Proxey Servers
Hybrids
Inexpensive Firewalls for SOHO Environments
How Do You Know That the Firewall Is Secure?
Virtual Private Networks (VPNs) and Tunneling
What Is a VPN?
Protocols, Protocols, and More Protocols!
IPSec Protocols
The Point-to-Point Tunneling Protocol (PPTP)
Layer Two Tunneling Protocol (L2TP)
Creating a VPN Connection with Windows XP Professional
Selecting a Router with VPN Support
Encryption Technology
Computers and Privacy
What Is Encryption?
Digital Certificates
Pretty Good Privacy (PGP)
Troubleshooting Networks
Strategies for Troubleshooting Network Problems
A Documented Network Is Easier to Troubleshoot
Problem-Solving Techniques
Pitfalls of Troubleshooting
Network Testing and Analysis Tools
Basics: Testing Cables
Network and Protocol Analyzers
Simple Network Management Protocol (SNMP)
Troubleshooting Small Office and Home Office (SOHO) Networks
Power Problems
Computer Configuration Issues
Component Problems-You Can't Get There from Here
Secure Those Cables!
Firewall Problems
Keeping Your Network Healthy
Wireless Networking Problems
When All Else Fails
Upgrading Network Hardware
Upgrading Older Ethernet Networks
Upgrading from 10BASE-2 or 10BASE-T
Hardware and Software Factors to Consider for 10BASE-2, 10BASE-T, and 100BASE-T
Connecting Networks That Use Different Cables or Topologies
Other Possibilities
Upgrading the Network Backbone to Gigabit Ethernet
Using Gigabit Ethernet for High-End Servers
Gigabit Ethernet Can Cover the Distance
10 Gigabit Ethernet Is Becoming Economically Feasible
Upgrading from Bridges and Hubs to Routers and Switches
Growing Beyond a Small LAN
From Bridges to Routers
From Bridges to Switches
Adding Wireless Networking to a LAN
Why Go Wireless?
Choosing Locations for Access Points
Security Issues
Migration and Integration
Migrating from NetWare to Windows 2000 or Windows 2003
Windows Protocols and Services
Microsoft's Services for NetWare Version 5.0 (SFN)
Migration and Integration Issues: Windows NT, Windows 2000, Windows 2003, Unix, and Linux
Windows Server Support for Unix Protocols and Utilities
Managing the FTP Service on Windows Server 2003
Applications
Microsoft Windows Services for Unix 3.5
Samba
Sun Network Information System
Migrating from Windows NT 4.0 to Windows 2000, Windows 2003, and Windows XP
Do You Need to Upgrade the Operating System or Applications?
Upgrading to Windows 2000 Server
Implementing a Migration to the Active Directory for Windows 2000
Upgrading Windows NT 4.0 or Windows 2000 to Windows Server 2003
Migration and Integration: NetWare, Unix, and Linux
Why Use Unix or Linux?
Key Differences Between Unix/Linux and NetWare
Moving User Accounts
Networking Protocols
Applications
Finding Linux Drivers for Hardware
Novell Open Enterprise Server
Appendixes
Overview of the OSI Seven-Layer Networking Reference Model
It's Only a Model!
Networking Glossary
Internet Resources for Network Administrators
Standards Organizations
Network Hardware and Software Manufacturers
Wireless Networking
Security
The Lightweight Directory Access Protocol
A Quick Introduction to LDAP
The X.500 Protocols and Standards
The Lightweight Directory Access Protocol
LDAP Directories
Introduction to Setting Up a SOHO Network
Assessing Your Requirements: What Do You Need?
SOHO Network Topologies
Backup Solutions for a SOHO Network
Index