Cover image for Networking complete
Title:
Networking complete
Author:
Coleman, Pat.
Publication Information:
San Francisco, Calif. : Sybex, [2000]

©2000
Physical Description:
xxxi, 999 pages : illustrations ; 21 cm
General Note:
Includes index.
Language:
English
Subject Term:
Added Author:
ISBN:
9780782126105
Format :
Book

Available:*

Library
Call Number
Material Type
Home Location
Status
Item Holds
Searching...
TK5105.5 .N46685 2000 Adult Non-Fiction Central Closed Stacks
Searching...

On Order

Summary

Summary

Covering NT Server, NetWare 5, and UNIX, this networking resource explores hardware, software, and technologies. Over a thousand pages of networking coverage at a low price makes this a great value for network administrators and home networkers.


Table of Contents

Introductionp. xxvi
Part I Networking Fundamentalsp. 1
Chapter 1 An Introduction to Networksp. 3
What Is Networking?p. 4
Chapter 2 Networks in the Workplacep. 17
Why Networks Existp. 18
Who Needs to Network?p. 22
Networks in the Workplacep. 24
What You Have Learnedp. 27
Chapter 3 Network Topologies and Typesp. 31
Clients, Servers, and Peersp. 32
Network Topologyp. 49
Network Mediap. 60
Network Protocolsp. 65
Chapter 4 The OSI Modelp. 69
Introducing the Open Systems Interconnect (OSI) Modelp. 70
The OSI Model Lower Layer Functionsp. 73
The OSI Model Middle Layersp. 89
The OSI Model Upper Layersp. 98
Chapter 5 Major Protocol Suitesp. 101
Review of Protocols, Models, and Implementationsp. 102
NetWare IPX/SPX Protocolsp. 102
Internet Protocolsp. 107
Apple Talk Protocolsp. 115
Miscellaneous Protocols and Standardsp. 120
Part II Network Hardware and Softwarep. 129
Chapter 6 Installing Cards and Cablesp. 131
Cable Installation Considerationsp. 132
Installing and Configuring Network Cardsp. 138
Summaryp. 154
Chapter 7 Repeaters, Hubs, Routers, and Bridgesp. 157
Repeatersp. 158
Hubsp. 159
Splitting Up Networksp. 165
Bridgesp. 167
Switchesp. 181
Routersp. 193
Switch Routersp. 200
Broutersp. 201
Summaryp. 201
Chapter 8 Network Operating Systemsp. 205
Peer Network Operating Systemsp. 207
Client/Server Network Operating Systemsp. 215
Summaryp. 237
Chapter 9 Essentials of Networking 98p. 241
Microsoft Networking Overviewp. 242
Sharing Files and Printers under 98p. 255
Network Software: Drivers, Protocols, and Redirectorsp. 263
Browsingp. 276
Integrating 98 Workstations into an NT Domainp. 290
Chapter 10 Client Softwarep. 295
DOS Clientsp. 296
Windows Clientsp. 298
Macintosh Clientsp. 302
Where to Go from Herep. 303
Chapter 11 Network Applicationsp. 307
Stand-Alone Applications on the Networkp. 308
Types of Desktop Applicationsp. 308
Databasesp. 309
Electronic Messagingp. 317
Groupwarep. 322
Office Suitesp. 324
Where to Go from Herep. 325
Chapter 12 Thin Client Networkingp. 331
Diagramming the Processp. 332
Preparing for Thin Client Networkingp. 336
Why Use Thin Client Networking?p. 345
Summaryp. 351
Part III Network Design, Maintenance, and Troubleshootingp. 353
Chapter 13 The Principles of Network Designp. 355
Design: A Definitionp. 356
Basic Design Principlesp. 356
The Five Elements of a Successful Designp. 368
Considering the Alternativesp. 378
The Pilot Project--Making Sure Everything Works Before It's Too Latep. 380
Chapter 14 Home Networking Technologiesp. 389
Your Home Networking Optionsp. 390
Understanding Standard Ethernet Cabled Networksp. 390
Understanding Phoneline Networksp. 396
Understanding Powerline Networksp. 399
Understanding Wireless Networksp. 401
Understanding Hybrid Wireless-Wired Networksp. 405
Weighing the Pros and Consp. 406
How to Make a Smart Choicep. 418
Chapter 15 Cross-Domain Management in NT Networksp. 421
Why Build Multi-Domain Networks?p. 422
Multi-Domain Management Tasksp. 426
Getting Acquainted: Trust Relationshipsp. 428
Extending File Permissions across Domainsp. 438
Cross-Domain Groups: Local and Global Groupsp. 442
Granting User Rights and Printer Permissions across Domainsp. 454
Setting Up NT Workstations in a Resource Domainp. 455
Logging On from Foreign Domainsp. 456
Enterprise Designs: Single- and Multiple-Domain Modelsp. 458
Fixing Broken Trustsp. 461
Chapter 16 Network Troubleshootingp. 467
Narrowing Down the Problemp. 468
Troubleshooting Stepsp. 474
The Troubleshooter's Resourcesp. 481
Troubleshooting Tipsp. 502
Chapter 17 Diagnosing Real-World Problemsp. 509
Ping Strangenessp. 510
Duplicate IP Addressesp. 513
Undeliverable Mailp. 515
Connectivity Problems after a Server Upgradep. 521
Excessive Network Collisionsp. 527
Summaryp. 530
Chapter 18 Disaster Recoveryp. 533
Defeating Disasters: An Overviewp. 534
Backup Strategiesp. 534
Planning for Disaster Recoveryp. 569
Diagnosing Server Boot Failuresp. 573
The Load Sequencep. 582
Part IV Intranets, Extranets, and Interconnecting Networksp. 585
Chapter 19 Building an Intranet Infrastructurep. 587
Elements of a TCP/IP Networkp. 588
Do Your Homeworkp. 589
Assigning IP Addressesp. 595
Routing Issuesp. 597
Configuring Your Windows NT Serverp. 597
Configuring Your NetWare Serverp. 612
The TCPCON Utilityp. 631
Testing Your IP Networkp. 637
Chapter 20 Extranet Infrastructurep. 643
Interorganizational Internetworkingp. 644
Virtual Private Networksp. 659
Extranet Design Structuresp. 664
Chapter 21 Managing and Administering Extranetsp. 671
Introduction to Extranet Management and Administrationp. 672
Administration of Extranet Infrastructurep. 673
Administering Extranet User Accountsp. 683
Managing Extranet Devicesp. 684
Managing Extranet Security Issuesp. 687
Special Extranet Issuesp. 688
Chapter 22 Remote Access Concepts and LAN to WAN Design Issuesp. 691
Remote Access Network Technologiesp. 692
Remote Access Conceptsp. 705
Remote Access: Emphasis on LAN to WAN Internetwork Designp. 715
Part V Network Securityp. 725
Chapter 23 Security Concepts and Terminologyp. 727
Security Definedp. 728
Planning a Security Approachp. 733
Security Problems and Their Consequencesp. 736
Operating Systems and Securityp. 740
Summaryp. 743
Chapter 24 Securing Your NetWare 5 Networkp. 747
Should I Be Concerned If My NetWare Network Is Connected to the Internet?p. 748
NetWare 5 Admin Compared with NetWare 3.x SUPERVISORp. 750
File System Securityp. 752
Using File Attributes as a Security Enhancementp. 759
NDS Securityp. 765
Security Management with NetWare Administratorp. 772
Using AUDITCONp. 793
NetWare 5 Security Improvementsp. 799
When Security Stinks, Management Smells the Worstp. 801
Chapter 25 Unix Securityp. 805
Unix Historyp. 806
Unix File Systemp. 807
Account Administrationp. 813
Optimizing the Unix Kernelp. 820
IP Service Administrationp. 834
Summaryp. 847
Chapter 26 Virtual Private Networkingp. 849
VPN Basicsp. 850
Setting Up a VPNp. 862
Summaryp. 879
Appendices
Appendix A Should You Get Certified?p. 881
Why Become Certified?p. 882
Instructor-Led Trainingp. 892
Self-Study for Certificationp. 895
Appendix B Glossary of Networking Termsp. 901
Indexp. 945