Cover image for Network administrator's reference
Title:
Network administrator's reference
Author:
Parnell, Tere.
Personal Author:
Publication Information:
Berkeley, Calif. : Osborne/McGraw-Hill, [1999]

©1999
Physical Description:
xxviii, 740 pages : illustrations ; 24 cm.
General Note:
Includes index.
Language:
English
Added Author:
ISBN:
9780078825880
Format :
Book

Available:*

Library
Call Number
Material Type
Home Location
Status
Central Library TK5105.7 .P296 1999 Adult Non-Fiction Central Closed Stacks
Searching...

On Order

Summary

Author Notes

Tere' Parnell, MSEE, is the former Executive Technology Editor for LAN Times magazine. She has more than 18 years of experience in information services as a programmer/analyst, network engineer, and manager.
Christopher Null, MBA, is the Reviews Editor for PC Computing and former Managing Reviews Editor of LAN Times. His work experience includes positions as a programmer, IS manager, and CIO.


Table of Contents

Acknowledgmentsp. xxi
Introductionp. xxv
Part I Building a Network
1 Front-Office Functionsp. 3
It's the (Seemingly) Little Things That Countp. 4
Scheduling and Time Managementp. 4
Personal Information Managementp. 5
Contact Managementp. 6
Call Managementp. 6
Order Entryp. 6
Customer Servicep. 7
Document Preparationp. 7
Researchp. 8
Document Management and Retrievalp. 8
Electronic Mailp. 8
Internal News Managementp. 8
Timekeepingp. 8
Preparing Expense Reportsp. 9
On to the Back Doorp. 9
2 Back-Office Functionsp. 11
Where Is the Back End?p. 12
Systems That Support Operationsp. 12
Systems That Provide Services to Usersp. 13
The Futurep. 15
3 Electronic Commercep. 17
Using What You've Gotp. 18
EDIp. 19
Making the Jump to the Consumerp. 20
Getting What You Needp. 20
Electronic Storefrontsp. 21
Electronic Payment Systemsp. 22
Securityp. 23
Outsourcing and Doing Withoutp. 27
Part II The Applications
4 Layer 7 and What It Means to Youp. 31
What's an Application?p. 32
Taking Instructionp. 33
Speaking the Languagep. 34
How Applications Workp. 36
Capturep. 37
Transmitp. 37
Storep. 37
Retrievep. 37
Manipulatep. 37
Displayp. 38
What Does This Have to Do with Layer 7?p. 38
Applications and the Internetp. 39
Applications Are Born Stupidp. 39
5 Where Applications Livep. 41
Server Farmingp. 42
Do Servers Grow on Farms?p. 43
Enterprise-Wide Access to Informationp. 43
Distribute Processing Load Across Specialized Platformsp. 46
Implementations of Distributed Computing Systemsp. 46
Distributed Application Processingp. 47
Distributed Databasesp. 47
Data Warehousingp. 47
Building Blocks of Distributed Computing Systemsp. 48
Relational Databasesp. 48
Structured Query Languagep. 49
Middlewarep. 49
Data Propagationp. 52
Network Requirements of a Server Farmp. 53
Indications of Bandwidth Drought on the Farmp. 54
Other Causes and Cures for Slow Performance on the Server Farmp. 55
Location of Data and Applicationsp. 55
Inadequate Hardwarep. 55
Buying the Farmp. 56
6 Application Neighborhoodsp. 57
The Apps in the 'Hood: Distributed Applicationsp. 58
Distributed Databasesp. 58
The Nuts and Bolts of Client/Server Computingp. 60
Multitiered Architecturesp. 65
Planned Neighborhoodsp. 66
Finding Your Way Through the 'Hoodp. 72
7 What Every Application Should Knowp. 73
Problems with Distributed Datap. 74
Transaction Tracking Essentialsp. 74
Transaction Processing on the Webp. 76
MiddleSpeakp. 76
One Size Does Not Fit Allp. 77
Web Middlewarep. 78
Common Object Request Broker Architecture (CORBA)p. 79
8 Applications Going the Distancep. 83
Directory Assistance, Pleasep. 84
Getting on the Listp. 85
Containing the Listp. 86
Safeguarding the Directory: Replication and Partitioningp. 57
Locking It Downp. 88
A Directory of Directory Servicesp. 88
X.500p. 88
Banyan StreetTalkp. 90
Novell Directory Services (NDS)p. 91
Windows NT Server Directory Servicesp. 92
DCE Directory Services, the Open Groupp. 94
Netscape Directory Serverp. 94
Moving on Down the Chainp. 94
9 Layer 6 and What It Means to Youp. 95
Happenings at Layer 6p. 96
Data Encryption and Data Compressionp. 98
Minding Your (Data) Grammarp. 98
Presentation Layer Functional Unitsp. 98
But What Does It Mean?p. 101
Part III The infrastructure
10 Operating Environmentsp. 105
Layer 5 and What It Means to Youp. 106
NetWare Core Protocol (NCP)p. 108
Burst Mode Protocol (BMP)p. 109
Remote Procedure Call (RPC)p. 110
Banyan VINES Remote Procedure Call (NetRPC)p. 111
Network Basic Input/Output System (NetBIOS)p. 112
Server Message Block Protocol (SMB)p. 113
NetBIOS Namesp. 114
SMB Protocol Variantsp. 114
Securityp. 115
Browsing the Networkp. 115
CIFS: The Latest Incarnation?p. 115
An Example SMB Exchangep. 115
Named Pipesp. 116
TCPp. 117
FTP, SMTP, SNMP, and Telnetp. 118
File Transfer Protocol (FTP)p. 118
Simple Mail Transfer Protocol (SMTP)p. 118
Simple Network Management Protocol (SNMP)p. 119
Telnetp. 119
What Layer 5 Tells You About Your Networkp. 119
ISO Technical Documentsp. 120
RFCsp. 121
Web Sitesp. 121
11 Managing and Monitoring Softwarep. 123
Traffic Managementp. 124
Packet Generatorsp. 124
Network Analyzersp. 125
Application Testersp. 125
Application Managementp. 125
Device Managementp. 126
Simple Network Management Protocol (SNMP)p. 126
Web-Based Network Managementp. 131
Java Management APIp. 132
Management Platformsp. 133
IETF Network Management Developmentsp. 134
12 Securityp. 135
Software vs. Hardware Securityp. 136
How Secure Is Your Operating System?p. 136
Microsoftp. 137
Novellp. 138
UNIXp. 139
Firewallsp. 140
Types of Internet Attacksp. 140
How Firewalls Workp. 142
The Packp. 146
Cryptographyp. 147
Authentication and Encryptionp. 147
Virtual Private Networksp. 148
Secure Messagingp. 149
PGPp. 149
S/MIMEp. 151
Enterprise Solutionsp. 153
Web Securityp. 154
Browsersp. 154
Microsoft Internet Explorerp. 155
Cookiesp. 155
Java, JavaScript, and ActiveXp. 155
Web Security Toolsp. 156
Virusesp. 157
Antivirus Softwarep. 157
Intrusion Detectionp. 158
Security Auditing Tools and Scannersp. 158
Packet Sniffersp. 159
Physical Securityp. 160
Location, Location, Locationp. 160
Social Engineeringp. 160
The Futurep. 161
Security Consolidationp. 161
The New IPp. 162
13 The Desktopp. 163
Finding Your Desktopp. 164
The Distributed Computing Environment (DCE)p. 164
Desktop Impact of Distributed Computing Environmentp. 166
Functions of the Desktopp. 167
Types of Desktopsp. 167
Inventoryp. 168
Standardsp. 168
Service-Level Agreementsp. 169
Trainingp. 169
Cost of Ownershipp. 170
Heart of Hardware: Microprocessorsp. 170
Microchips and Salsa: A Primerp. 171
Microprocessors in Practice: What You'll Find on Desktopsp. 180
The Softer Side of the Desktop: Software Clientsp. 188
UNIXp. 189
Windowsp. 192
WinFramep. 193
Managing the Desktopp. 194
Zero Administration for Windows Initiativep. 194
Wired for Management (WfM) Initiativep. 194
Desktop Management Interface (DMI)p. 195
Where It Begins and Endsp. 196
14 The Serverp. 199
Server Functionsp. 200
File Serversp. 201
Application Serversp. 201
Database Serversp. 202
Web Serversp. 202
Mail Serversp. 202
Print Serversp. 203
Fax Serversp. 203
Remote Access Serversp. 203
Backup Serversp. 203
Server Marketing Categoriesp. 204
Workgroup/Department Serversp. 204
Midrange Serversp. 204
Enterprise Serversp. 205
Server Architecturep. 205
Server Design: The Big Picturep. 206
Server Motherboard Designp. 208
Microprocessorsp. 208
Intelp. 208
AMDp. 216
Cyrixp. 217
Sun Microsystemsp. 217
Digital Equipment Corp. (R.I.P.)p. 218
Silicon Graphicsp. 219
Motorolap. 219
Hewlett-Packardp. 219
IBMp. 220
One Chip or More?p. 220
Memoryp. 221
The Two Basic Memory Typesp. 221
Memory Cardsp. 223
RAM Technologiesp. 225
Video and Graphics RAMp. 228
Further Readingp. 229
Input/Outputp. 229
Hard Disk Drivesp. 229
RAIDp. 235
Controller Cardsp. 241
External Storage Systemsp. 242
Choosing an I/O Strategyp. 242
Additional Resourcesp. 242
Slots Galorep. 243
ISAp. 243
EISAp. 243
Microchannelp. 244
VESAp. 244
PCIp. 244
AGPp. 245
PC Cardsp. 245
USBp. 245
1394p. 246
Server Managementp. 246
Intel LANDeskp. 246
Hewlett-Packard Open Viewp. 246
Server Management Hardwarep. 247
Backupp. 247
Disaster Planningp. 247
Tape and Tape Drivesp. 248
Other Backup Devicesp. 250
Other Server Considerationsp. 250
Server NICsp. 251
Power Suppliesp. 251
UPSsp. 252
CD-ROM Drivesp. 252
CYA: Technical Support and Warrantiesp. 252
Name Brand or Clone?p. 253
How Much Will It Cost?p. 253
Upgradingp. 254
Working with Serversp. 254
ESDp. 254
Toolsp. 255
Storagep. 255
Further Readingp. 256
15 The Gluep. 257
Connectivity 101p. 258
Types of Backbonesp. 260
Why Build a Backbone?p. 262
How Do You Build a Backbone?p. 264
The Effects of Excessive Internetwork Trafficp. 266
Causes and Cures for a Clogged Backbonep. 266
The Final Analysisp. 268
What You Gainp. 268
Selecting a High-Speed Backbone Protocolp. 268
Local Area Protocolsp. 269
Fiber Distributed Data Interface (FDDI)p. 269
The Topologyp. 275
100VG-AnyLANp. 280
So Close, but So Far from 10Base-Tp. 280
100Base-Tp. 288
A Smorgasbord of Specsp. 289
Understanding the Differences Between 100Base-T and 10Base-Tp. 292
Interoperability and Obstaclesp. 293
Gigabit Ethernetp. 296
The 802.3 Standardp. 298
How Gigabit Ethernet Differs from 100Base-Tp. 299
Scalability Considerationsp. 301
Cabling Considerationsp. 301
Managementp. 302
Costp. 302
Performancep. 302
Support for Voice and Videop. 303
Fibre Channelp. 309
Going Through Channelsp. 309
The Standard and Its Supporting Groupsp. 310
How Do They Do That?p. 311
Cabling Considerationsp. 317
Installation and Configurationp. 319
Advantages: Fibre Channel vs. ATMp. 320
Disadvantagesp. 321
Asynchronous Transfer Modep. 321
How It Startedp. 322
Who Started Itp. 322
ATM: The Short Answerp. 322
If ATM Is the Answer, What Were the Questions?p. 323
How It All Works Togetherp. 327
The ATM and the OSI Modelp. 332
ATM Migration Issuesp. 333
Expect to Phase It Inp. 342
The Promised LANp. 348
Moving on Down the Linep. 349
16 The Cablingp. 351
All That Glistens Isn't Copperp. 352
Cabling Primerp. 352
The TIA and EIA Cabling Standardsp. 353
Work Area Wiringp. 353
Horizontal Wiringp. 353
Telecommunications Closetsp. 353
Equipment Rooms and Cross-Connectsp. 354
Backbone Wiringp. 354
Entrance Facilitiesp. 354
Reaching Up from Layer 1p. 354
A Segment Definedp. 354
Creating Internetworksp. 355
The Bridging Primerp. 357
Bridge Performance Issuesp. 365
The Router Primerp. 366
The Router Shopping Guidep. 368
Planning Segmented Networksp. 369
Microsegmentationp. 370
Switchingp. 370
Making the Switchp. 370
Which Switch?p. 374
Analysis Is Keyp. 380
10/100/1000 Switchingp. 382
Full-Duplex Protocolsp. 383
A Time for Everythingp. 384
Bridgingp. 384
Routingp. 384
Switchingp. 384
Virtual LANsp. 384
Part IV The 'Nets
17 Intranets and Extranetsp. 387
Intranets Demystifiedp. 388
Making New Rulesp. 388
Intranets: Enabling Technologiesp. 389
Hypertext Markup Language (HTML)p. 389
Hypertext Transfer Protocol (HTTP)p. 393
Component Technologyp. 395
Pushp. 397
Extranetsp. 399
Standard Data Exchange Formatsp. 399
Securityp. 400
The Local 'Netsp. 400
18 The Internetp. 401
A Network Is a Networkp. 402
How It All Beganp. 402
Internet Protocol (IP)p. 402
Growth Factorsp. 403
The Business Side of the Internetp. 406
Internet Service Providersp. 407
PPP and SLIP Connectionsp. 407
Selecting an Internet Service Providerp. 407
Internet Domain Namesp. 410
Connecting to the Internetp. 412
Internet Client Softwarep. 413
E-Mailp. 413
NetNewsp. 414
FTPp. 416
World Wide Webp. 416
Conclusionp. 417
19 Wide Area Connectionsp. 419
So You Think You're Ready for the Long Haulp. 420
The Wide Area Definedp. 421
Carrier Servicesp. 427
Performance Over the Wide Areap. 429
Tests to Confirm Insufficient WAN Bandwidthp. 431
Requirements for Wide Area Protocolsp. 432
Ready to Roll?p. 433
Codes and Signalingp. 433
Codes: Computer Wordsp. 434
Analog Signalingp. 434
Digital Signalingp. 438
The Importance of Being Well-Modulatedp. 438
It's Not Only How You Say It, but Also What You Sayp. 440
And What Does This Have to Do with My LAN?p. 444
Basic Trunkingp. 445
Two Tin Cans and a String = a Loopp. 446
Are You Dedicated, or Are You Going to Switch?p. 446
Pack Your Trunkp. 448
Putting It Togetherp. 456
Now That Your Trunk Is Packed, We Can Move Onp. 457
Circuit Switching and Packet Switchingp. 457
Basic Transmissionp. 458
Transmission Facilities: An Overviewp. 459
How It Works in Practicep. 466
The Regulatory Environment: Past, Present, and Futurep. 468
First Is the Deedp. 468
The 1956 Consent Decreep. 469
The Carterphone Decision (1968)p. 469
The U.S. District Court's Modification of Final Judgmentp. 470
The Telecommunications Act of 1996 (February 8, 1996)p. 474
Make Your Markp. 476
What Does All This Mean to You?p. 478
The Playersp. 479
The Rosterp. 479
The Lineupp. 480
Managementp. 486
Now We're Ready to Playp. 486
Determining the Requirements for Wide Area Connectionsp. 487
The Bandwidth Question: How Much Speed?p. 487
Flexibilityp. 494
Recommendationsp. 494
WAN Usage Surveyp. 495
20 Wide Area Protocols and Devicesp. 497
T1 Servicesp. 498
T1 Definedp. 498
T1 Transmission Facilitiesp. 503
Carrier Systemsp. 504
T1 Equipmentp. 508
Flexibilityp. 512
Availabilityp. 513
Costp. 513
T1: A Telecommunications Basicp. 513
Switched Multimegabit Data Servicep. 513
What Is ...?p. 515
Where ...?p. 518
How ...?p. 519
Why ...?p. 519
Support Groupp. 522
Disadvantagesp. 522
The Futurep. 523
X.25p. 523
An Early Packet-Switching Protocolp. 523
X.25 and the ISO/OSIp. 524
Packet Connectionsp. 531
Making Connections in a Connectionless Worldp. 533
Other Concerns in a Packet-Switched Networkp. 536
Ordering X.25p. 539
X.25 and Frame Relayp. 540
Frame Relayp. 541
Son of ISDNp. 541
What It Isp. 541
How It Worksp. 542
Can Your Vendor Do This?p. 553
The Good Newsp. 555
The Bad Newsp. 556
Voice and Frame Relayp. 557
Frame Relay Forump. 557
Integrated Services Digital Networkp. 557
The Primordial Mirep. 557
Anatomy of the ISDN Speciesp. 558
It's All in the Packagingp. 560
ISDN's Function in the Wide Area Food Chainp. 560
The Goal of Evolution: What These Services Can Providep. 563
Making ISDN Happenp. 566
Mediap. 567
The Future: Broadband ISDNp. 575
Asynchronous Transfer Modep. 576
Digital Subscriber Line Services and Cable Modemsp. 576
Digital Subscriber Line (DSL)p. 576
Cable Modemsp. 582
DSL vs. Cable Modemsp. 582
Are You Ready to Order?p. 583
21 Purchasing and Managing Wide Area Servicesp. 585
Tariffed Servicesp. 586
What Is a Tariff?p. 586
Which Services Are Tariffed?p. 586
How Do Price Lists Become Tariffs?p. 587
Who Has Jurisdiction?p. 587
Why File Tariffs?p. 588
Bedtime Stories: How to Read a Tariffp. 589
What Types of WAN Services Are Tariffed?p. 593
Contract Servicesp. 595
Think of It As Buying a Carp. 595
Size Mattersp. 596
Negotiation Strategiesp. 596
Negotiation Tacticsp. 596
Value-Added Carriersp. 599
Private Wide Area Networksp. 599
Public Wide Area Networksp. 600
Give Us Names!p. 602
Preparing a Request for Proposals for WAN Servicep. 603
Talking Turkeyp. 603
Step 1 Define Your Wide Area Network Requirementsp. 604
Step 2 Preparing the Outlinep. 604
Step 3 Write Draft Request for Proposalsp. 607
Step 4 Submit Draft RFP for Review and Commentp. 608
Step 5 Prepare Final Draft of RFPp. 608
Step 6 Send RFP to Vendorsp. 608
Step 7 Evaluate Vendor Responsesp. 608
Step 8 Prepare and Submit Questions to Vendorsp. 608
Step 9 Select Vendorp. 608
Questions for the Finalistsp. 609
Vendor Background Questionsp. 609
Installation Questionsp. 610
Equipment Support Questionsp. 610
Software Support Questionsp. 611
Training Questionsp. 612
Getting What You Pay for: Reviewing the Billsp. 613
The Importance of Itemizationp. 613
Bill Reconciliationp. 613
Managing Wide Area Servicesp. 615
Things That Go Wrongp. 615
Now That We Know What's Broken, Who's Going to Fix It?p. 621
22 Encryptionp. 623
The Origins of Encryptionp. 624
Encryption Todayp. 624
Encryption in Practicep. 625
Building the Encrypted Messagep. 625
The Encryption Processp. 626
Encryption Algorithmsp. 628
Other Functions of Encryptionp. 633
Personal Encryption Toolsp. 633
Encrypted Web Browsingp. 635
Speed Considerationsp. 637
Cryptographic Acceleratorsp. 637
Problems in Public Key Cryptographyp. 637
Cryptanalysisp. 638
Poor Password Selectionp. 639
Attacks on Certificate Authoritiesp. 639
Key Revocationp. 640
Cross-Certificationp. 641
Multinational Issuesp. 641
Limitations of Public Key Cryptographyp. 643
User Trainingp. 643
Additional Resourcesp. 644
23 Authenticationp. 645
The Evolution of Computer Authenticationp. 646
Passwordsp. 647
IP Address Authenticationp. 648
Secret Key Cryptographyp. 648
Public Key Cryptographyp. 650
Public Key Cryptography and Authenticationp. 651
Digital Certificatesp. 652
Certificate Authoritiesp. 653
The Roles of the CAp. 654
Digital Certificate Issuancep. 654
Key Managementp. 655
Internal vs. External CAsp. 656
Public and Private Keysp. 659
Obtaining a Key Pairp. 659
Public Key Derivationp. 659
Key Lengthp. 660
Personal Key Managementp. 660
Public Key Authentication in Practicep. 661
Key Expirationp. 663
Advanced Authentication Toolsp. 664
Cryptographic Tokensp. 664
Smartcardsp. 665
Biometricsp. 665
24 Virtual Private Networkingp. 667
Do You Need a VPN?p. 668
VPN Paradigmsp. 670
Proper VPN Deploymentp. 672
Introducing Tunnelingp. 673
VPNs and Tunneling Protocols in Practicep. 673
Authentication with VPNsp. 677
Encryption with VPNsp. 679
Another Option: Outsourcing Your VPNp. 680
Service Level Agreementsp. 680
The Future of Remote Accessp. 682
Other VPN Resourcesp. 682
25 Unified Messagingp. 685
Why Has Unified Messaging Taken So Long?p. 686
Unified Messaging Architecturesp. 687
Telephony Standards and Protocolsp. 692
Implementation Tipsp. 694
What's Next?p. 695
Appendix Keeping It Runningp. 697
Upgrade and Enhancement Projectsp. 698
Hardware Worksheetp. 698
Service Cost Worksheetp. 700
Staffing and Staff Development Worksheetp. 700
Time Estimate Worksheetp. 701
Applications Worksheetp. 701
Live Fast, Die Youngp. 701
More Project Pointersp. 701
1 Try Before You Buyp. 701
2 Identify the Next Bottleneckp. 702
3 Make a Schedulep. 702
4 Get Your Budget Approvedp. 703
5 Set Expectationsp. 708
Survivingp. 710
Hardware Worksheetp. 711
Service Cost Worksheetp. 713
Staff Development Worksheetp. 714
Staffing Worksheetp. 715
Time Estimate Worksheetp. 716
Application Worksheetp. 718
Indexp. 719

Google Preview