8mm tape, 346
10BASE-T, 88–89
100BASE-T, 183–184
110 blocks, 207
568B standards (EIA), 89
802.11a standard, 122
802.11b standard, 122
802.11g standard, 123
802.11n standard, 123
1000BASE-T, 184
A resource record, 253
AAA resource record, 253
access control, 322–323
access rules, 164
Active Directory, 273–274
adapter cards, installing, 202–206
addresses
destination addresses, 24
email addresses, 14
Ethernet addresses, 40
I/O addresses, 202
IP addresses
configuring network devices with, 259–260
obtaining, 258
overview, 255
subnet masks, 257–258
subnetting, 255–256
network addresses
CIDR, 38–39
IP addresses, 37–38
IPv6 (version 6) addresses, 39
NAT (Network Address Protocol), 39
prefixes, 38
overview, 304
relationship within network, 305
relaying traffic with, 40–42
source addresses, 24
administrators
budgeting, 313–314
education and certification, 311–313
help desk analysts, 310
IT directors, 311
network administrators, 310
daily tasks, 376–378
establishing network policies, 379–380
responsibilities of, 373–376
strategies for supporting users, 378–379
overview, 309
project management, 315–317
responsibilities, 313
support specialists, 310
user support advisors, 310
ADSL (Asymmetric DSL), 102
Advanced Research Projects Agency (ARPA), 14, 232
Advanced Technology Attachment (ATA) disks, 56
advantages of networking, 6–7
centralized configuration management, 26–27
file management, 25
overview, 25
printer sharing, 26
software sharing, 25–26
speed and economy, 27
aero domain name, 250
Allman, Eric, 213
Amazon Web Services (AWS), 385
American National Standards Institute (ANSI), 150
American Registry for Internet Numbers (ARIN), 258
American Standard Code for Information Interchange (ASCII), 20
ANSI (American National Standards Institute), 150
antispam software, 219
antistatic mats, 200
antistatic wrist straps, 200
APIs (application programming interfaces), 30, 62
Apple, 67
AppleTalk, 67
application layer (OSI model), 31
application programming interfaces (APIs), 30, 62
application-specific integrated circuits (ASICs), 75
applications
CloudMark, 219
contact management, 221–223
configuring, 215–217
IMAP4, 214
MIME, 217
open-standards email, 215
overview, 213
POP3, 214
proprietary mail systems, 214–215
SMTP, 214
spam, 218–219
troubleshooting, 217–218
file transfer and FTP, 227–228
groupware, 212–213
Lotus Notes, 224–225
Microsoft Exchange Outlook, 225–227
Novell GroupWise, 223–224
OSs, 211
overview, 211
scheduling and calendars, 219–221
SonicWALL, 219
SpamAssassin, 219
archives, 353
ARIN (American Registry for Internet Numbers), 258
ARM (Asynchronous Transfer Mode), 78
ARPA (Advanced Research Projects Agency), 14, 232
ASCII (American Standard Code for Information Interchange), 20
ASICs (application-specific integrated circuits), 75
adapter cards, 202–206
electrical damage, preventing, 199–200
precautions, 200–202
wireless networks, 210
wiring closets, 207–209
assigning permissions, 287
Asymmetric DSL (ADSL), 102
Asynchronous Transfer Mode. See ATM
ATA (Advanced Technology Attachment) disks, 56
ATM (Asynchronous Transfer Mode)
cells, 110–111
permanent virtual circuits, 109–110
QoS (quality of service), 110
attacks, 330
audits, 326–327
authentication, 322
authentication servers, 164, 298
AWS (Amazon Web Services), 385
backups
backup media, 346
differential backup, 347
full backup, 347
Grandfather-Father-Son scheme, 347–349
incremental backup, 347
overview, 345
on server-based networks, 165
base 10 numbering system, 50
batch processing, 20
baud, 132
Bayesian filters, 219
BBN (Bolt, Beranek, and Newman), 21
benefits of networking, 6–7
centralized configuration management, 26–27
file management, 25
overview, 25
printer sharing, 26
software sharing, 25–26
speed and economy, 27
best practices
applying, 147–149
benefits of, 144–145
definition of, 143–144
design, 146
implementation, 146
planning, 146
security
monitoring, 152–153
overview, 150–151
secure behaviors, defining, 151–152
usage policies and procedures, 151
standards, 149–150
tuning, 147
BGP (Border Gateway Protocol), 235
bioengineering, 385–387
bits, 50
.biz domain name, 250
Bolt, Beranek, and Newman (BBN), 21
bombs, 322
boot sector viruses, 328
Border Gateway Protocol (BGP), 235
bottlenecks, 196–197
broadband, 12–13
definition of, 101
DSL, 101–102
satellite services, 103
broadcast networks, 10
budgeting, 313–314
building networks. See assembling networks
bus topology, 10
business impact, assessing, 350–351
bytes, 49
CA (certificate authority), 321
cable modem, 102–103
cabling
100BASE-T, 183–184
1000BASE-T, 184
calendars, 219–221
cards
expansion cards, 57–58
NICs (network interface cards), 58–59
PCI (peripheral component interconnect) cards, 58
video adapter cards, 59–60
cases, opening, 201
Category 1 twisted-pair wires, 89
Category 2 twisted-pair wires, 89
Category 3 twisted-pair wires, 89
Category 4 twisted-pair wires, 89
Category 5 twisted-pair wires, 89
Category 5e twisted-pair wires, 89
Category 6 twisted-pair wires, 89
cellular modems, 132
cellular topology, 10
centralized configuration management, 26–27
certificate authority (CA), 321
certificates, 321
certification, 311–313
channels, 11
CHAP (Challenge Handshake Authentication Protocol), 332
choosing
bridges, 182
hubs, 181
ISPs (Internet service providers), 237
network architecture
client/server networking, 185–187
peer-to-peer networking, 187–188
NOSs (network operating systems)
Linux, 195–196
Microsoft Windows Server, 194–195
Novell NetWare, 192–194
UNIX, 195–196
protocols, 197
routers, 182
server hardware, 180–181
switches, 182
WAPs (wireless access points), 182
CIDR (Classless Inter-Domain Routing), 37–39
ciphertext, 320
circuit switching, 21
Cisco Career Certifications, 312
Class A addresses, 37
Class B addresses, 37
Class C addresses, 37
Class D addresses, 38
Classless Inter-Domain Routing (CIDR), 37–39
cleartext, 320
Clearwire, 384
clients
adding to domains, 279–280
configuring for Microsoft Windows Server, 279
licensing, 343–345
servers
fault tolerance, 81–82
high availability, 81–82
overview, 80
RAID (redundant arrays of inexpensive disks), 80–81
SOSs (server operating systems), 83–87
CloudMark, 219
clouds, 385–386
CNAME resource record, 254
coaxial cable, 90
color depth, 60
.com domain name, 249
commands
nslookup, 371
ping, 367–368
traceroute, 370–371
communication servers, 163, 297
ATM (Asynchronous Transfer Mode), 44–45, 78
BGP (Border Gateway Protocol), 235
CHAP (Challenge Handshake Authentication Protocol), 332
choosing, 197
CIDR (Classless Inter-Domain Routing), 38–39
definition of, 5
DHCP (Dynamic Host Configuration Protocol)
client configuration, 262–263
deploying, 263–264
overview, 261–262
DNS (Domain Name System)
deploying, 254–255
how it works, 251–252
namespaces, 248–250
obtaining domain names, 252–253
overview, 247–248
root name servers, 250
RRs (resource records), 253–254
DNSSEC (DNS Security Protocol), 334
Ethernet, 42–43
FTP (File Transfer Protocol), 227–228, 369–370
HTTP (Hypertext Transfer Protocol), 266–267
IMAP4 (Internet Message Access Protocol), 214
IP (Internet Protocol) addresses, 37–38, 43–44, 242–243
configuring network devices with, 259–260
obtaining, 258
overview, 255
subnet masks, 257–258
subnetting, 255–256
IPSec (Internet Security Protocol), 334
IPv6, 39
IPX (Internetwork Packet Exchange), 45–46
L2TP (Layer 2 Tunneling Protocol), 135–136
LMP (Link Manager Protocol), 124
MPLS (Multiprotocol Label Switching), 111–112
NAT (Network Address Protocol), 39
NetBEUI (Network BIOS Extended User Interface), 46
NetBIOS (Network Basic Input/Output System), 46
OSI model
development of, 30
illustration, 31
Layer 1 (physical), 35
Layer 2 (data link), 33–34
Layer 3 (network), 33
Layer 4 (transport), 32
Layer 5 (session), 32
Layer 6 (presentation), 32
Layer 7 (application), 31
overview, 30–31
relationship between layers, 34–35
PAP (Password Authentication Protocol), 332
POP3 (Post Office Protocol 3), 214
PPP (Point-to-Point Protocol), 133–135
PPTP (Point-to-Point Tunneling Protocol), 333
protocol converters, 5
RADIUS (Remote Authentication Dial In User Service), 332–333
SMTP (Simple Mail Transfer Protocol), 214
SNMP (Simple Network Management Protocol), 356
SSH (Secure Shell), 333
SSL (Secure Sockets Layer), 333
SSTP (Secure Socket Tunneling Protocol), 333
TCP (Transmission Control Protocol), 243–244
TCP/IP, 238–240
UDP (User Datagram Protocol), 244
VoIP (Voice over IP), 102
WEP (Wired Equivalent Privacy), 336
WINS (Windows Internet Naming Service), 260
WPA (Wi-Fi Protected Access), 336
computer hardware, 50
computing environment vulnerabilities, assessing, 351
computing infrastructure, defining, 350
concentrators, 208
configuring
configuration management, 26–27, 166
DHCP (Dynamic Host Configuration Protocol), 262–263
email, 215–217
IP addresses, 259–260
Microsoft Windows Server 2003
domain client configuration, 279–280
protocol configuration, 280–282
server configuration, 276–278
Window client configuration, 279
network services on Linux server, 293–294
connecting to Internet, 14–15
BGP, 235
DHCP (Dynamic Host Configuration Protocol), 261–264
DNS. See DNS (Domain Name System), 247
IP (Internet Protocol), 242–243
IP addresses. See IP addresses
overview, 255
ISPs (Internet service providers), 233–234, 237
IXPs (Internet Exchange Points), 234–235
peering, 236–237
ports, 240–241
sockets, 241–242
TCP (Transmission Control Protocol), 243–244
TCP/IP, 238–240
UDP (User Datagram Protocol), 244
contact management, 221–223
cooperative multitasking, 63
copper wire, 88–89
CPUs, 52–53
DAT (digital audio tape), 346
data communications equipment (DCE), 60
data link layer (OSI model), 33–34
data terminal equipment (DTE), 60
datagrams, 44
DCE (data communications equipment), 60
decryption, 320
deployment
DHCP (Dynamic Host Configuration Protocol), 263–264
DNS (Domain Name System), 254–255
design
definition of, 146
logical network diagrams, 167–171
network needs, determining, 156–159
overview, 155–156
peer-to-peer networks, 161–162
physical network diagrams, 171–174
server-based networks, 163–164
application servers, 163
authentication servers, 164
backups, 165
communication servers, 163
configuration management, 166
file servers, 163–165
mail servers, 164
print servers, 163
web servers, 164
specification documents
reviewing with users, 176
writing, 174–175
topologies, 166–167
user needs, determining, 159–161
destination addresses, 24
device drivers, 68
DHCP (Dynamic Host Configuration Protocol)
client configuration, 262–263
deploying, 263–264
overview, 261–262
servers, 297
diagrams
logical network diagrams, 167–171
physical network diagrams, 171–174
Diamond, David, 87
differential backup, 347
digital audio tape (DAT), 346
digital signatures, 321
digital subscriber line (DSL), 101–102
DIMMs (Dual Inline Memory Modules), 54
direct sequence spread spectrum (DSSS), 122
disaster recovery planning
assessing business impact, 350–351
assessing computing environment vulnerabilities, 351
defining computing infrastructure, 350
developing plan, 351–353
overview, 349–350
DLTtape, 346
deploying, 254–255
DNSSEC (DNS Security Protocol), 334
how it works, 251–252
namespaces, 248–250
obtaining domain names, 252–253
overview, 247–248
root name servers, 250
RRs (resource records), 253–254
servers, 297
DNSSEC (DNS Security Protocol), 334
Domain Name System. See DNS
domains, 272. See also DNS (Domain Name System)
adding clients to, 279–280
DNS (Domain Name System)
deploying, 254–255
how it works, 251–252
namespaces, 248–250
obtaining domain names, 252–253
overview, 247–248
root name servers, 250
RRs (resource records), 253–254
names
list of, 249–250
obtaining, 252–253
DOS, 66
DSL (digital subscriber line), 101–102
DSSS (direct sequence spread spectrum), 122
DTE (data terminal equipment), 60
Dual Inline Memory Modules (DIMMs), 54
Dynamic Host Configuration Protocol. See DHCP
dynamic ports, 240
economy of networking, 27
edu domain name, 249
education and certification, 311–313
EIA (Electronic Industries Association), 56, 60, 89, 150
electrical damage, preventing, 199–200
Electronic Industries Association (EIA), 56, 60, 89, 150
addresses, 14
configuring, 215–217
IMAP4, 214
MIME, 217
open-standards email, 215
overview, 213
POP3, 214
proprietary mail systems, 214–215
SMTP, 214
spam, 218–219
troubleshooting, 217–218
EMTA (Embedded Multimedia Terminal Adapter), 102
encryption
private key, 320
public key, 320–321
error checks, 24
Ethernet, 42–43
addresses, 40
headers, 36
network hardware selection, 182–183
100BASE-T, 183–184
1000BASE-T, 184
Gigabit Ethernet, 184
Megabit Ethernet, 184
EtherType, 36
evaluating
bridges, 182
hubs, 181
ISPs (Internet service providers), 237
network architecture
client/server networking, 185–187
peer-to-peer networking, 187–188
NOSs (network operating systems)
Linux, 195–196
Microsoft Windows Server, 194–195
Novell NetWare, 192–194
UNIX, 195–196
routers, 182
server hardware, 180–181
switches, 182
WAPs (wireless access points), 182
event logs, 364–366
expansion cards, 57–58
external attacks, 330
extranets, 16
fault tolerance, 81–82
FDDI (Fiber Distributed Data Interface), 43
FHSS (frequency hopping spread spectrum), 122
Fiber Distributed Data Interface (FDDI), 43
File Transfer Protocol (FTP), 227–228, 369–370
files
file management, 25
file viruses, 329
sharing on Linux networks, 295–296
in UNIX, 291
filtering packets, 331
firewalls, 14
overview, 330–331
packet filtering, 331
Windows Firewall settings, 331–332
FireWire, 62
firmware, 50
FLOPS (floating point operations per second), 73
folders, sharing on Microsoft Windows Server 2003, 282–285
forwarding, 77–78
fragmentation, 44
frame relay, 111
frames, 34–35
frequency hopping spread spectrum (FHSS), 122
frequency interference between W-Fi and Bluetooth, 125
FTP (File Transfer Protocol), 227–228, 369–370
full backup, 347
function calls, 30
future of Microsoft Windows Server, 286–287
future of networking
bioengineering, 385–387
clouds, 385–386
growth of Linux, 383–384
WiMax, 384
Gigabit Ethernet, 184
.gov domain name, 249
Grandfather-Father-Son scheme, 347–349
GroupWise (Novell), 223–224
Habraken, Joe, 287
hard drives, 361–362
hardware
adapter cards, 202–206
ASICs (application-specific integrated circuits), 75
bridges, 182
definition of, 50
for Ethernet networks, 182–183
100BASE-T, 183–184
1000BASE-T, 184
Gigabit Ethernet, 184
Megabit Ethernet, 184
expansion cards, 57–58
FireWire, 62
hard drives, 361–362
hubs, 181
memory, 53–55
motherboards, 52–53
NICs (network interface cards), 58–59
PCI (peripheral component interconnect) cards, 58
remote access hardware, 138–140
routers
capabilities of, 78
choosing, 182
definition of, 74–75
forwarding, 77–78
routing, 75–76
troubleshooting, 356–357
speed, 73
SSDs (solid state drives), 56–57
switches, 182
upgrades, 340–341
USB (universal serial bus), 60–62
video adapter cards, 59–60
WAPs (wireless access points), 182
Hayes Communication Smartmodem, 131
help desk analysts, 310
hierarchical file system in UNIX, 292
high availability, 81–82
history
of Internet, 231–233
of networking
ARPAnet, 20
circuit switching, 21
mobile wireless networking, 119–120
overview, 19–21
packet switching, 21–24
Telnet, 129–130
of UNIX, 289–290
HTML (Hypertext Markup Language), 265–266
HTTP (Hypertext Transfer Protocol), 266–267
HughesNet, 103
hybrid networks, 118
Hypertext Markup Language (HTML), 265–266
Hypertext Transfer Protocol (HTTP), 266–267
I/O addresses, 202
IANA (Internet Assigned Numbers Authority), 240, 258
IDE (Integrated Drive Electronics) disks, 56
IEEE (Institute of Electronic and Electrical Engineers), 150
IETF (Internet Engineering Task Force), 36, 149, 215
IMAP4, 214
implementation
definition of, 146
mobile wireless networks, 126–127
IMPs (Interface Message Processors), 21, 232
incremental backup, 347
.info domain name, 250
information technology (IT) jobs, 310–311
education and certification, 311–313
help desk analysts, 310
IT directors, 311
network administrators, 310
daily tasks, 376–378
establishing network policies, 379–380
responsibilities of, 373–376
strategies for supporting users, 378–379
support specialists, 310
user support advisors, 310
inheritance, 164
INI (inner-network interface), 99
installing
adapter cards, 202–206
Microsoft Windows Server 2003, 274–276
Institute of Electronic and Electrical Engineers (IEEE), 150
Integrated Drive Electronics (IDE) disks, 56
integrity, 322
Intel-compatible IRQ settings, 203
Interface Message Processors (IMPs), 21, 232
International Organization for Standardization (ISO), 30, 150
International Telecommunications Union (ITU), 15, 24, 30, 150
Internet
compared to intranets, 16
connections, 14–15
BGP (Border Gateway Protocol), 235
choosing, 237
DHCP (Dynamic Host Configuration Protocol), 261–264
DNS. See DNS (Domain Name System)
IP (Internet Protocol), 242–243
ISPs (Internet service providers), 233–234, 237
IXPs (Internet Exchange Points), 234–235
peering, 236–237
ports, 240–241
sockets, 241–242
TCP (Transmission Control Protocol), 243–244
TCP/IP, 238–240
UDP (User Datagram Protocol), 244
history of, 231–233
importance of, 15–16
IP addresses
configuring network devices with, 259–260
obtaining, 258
overview, 255
subnet masks, 257–258
subnetting, 255–256
names
overview, 304
relationship within network, 305
network components’ position in layers, 302–304
Internet Assigned Numbers Authority (IANA), 240, 258
Internet Engineering Task Force (IETF), 36, 149, 215
Internet Exchange Points (IXPs), 234–235
Internet Message Access Protocol 4 (IMAP4), 214
Internet Protocol. See IP addresses
Internet Security Protocol (IPSec), 334
Internet service providers (ISPs), 13, 233–234, 237
internets, 16
interoperability of UNIX, 292
intranets, 16
IP (Internet Protocol) addresses, 37–38, 43–44, 242–243
configuring network devices with, 259–260
obtaining, 258
overview, 255
subnet masks, 257–258
subnetting, 255–256
IPSec (Internet Security Protocol), 334
IPv6 addresses, 39
IPX (Internetwork Packet Exchange), 45–46
IRQ settings, 203
ISO (International Organization for Standardization), 30, 150
ISPs (Internet service providers), 13, 233–234, 237
IT (information technology) jobs
education and certification, 311–313
help desk analysts, 310
IT directors, 311
network administrators, 310
daily tasks, 376–378
establishing network policies, 379–380
responsibilities of, 373–376
strategies for supporting users, 378–379
support specialists, 310
user support advisors, 310
ITU (International Telecommunications Union), 15, 24, 30, 150
IXPs (Internet Exchange Points), 234–235
Jobs, Steve, 67
jump blocks, 205
Just for Fun: The Story of an Accidental Revolutionary (Torvalds and Diamond), 87
kernels (UNIX), 86
killer apps, 26
L2TP (Layer 2 Tunneling Protocol), 135–136
LAC (L2TP Access Concentrator), 135
LNS (L2TP Network Server), 136
labels (ATM), 108
LAC (L2TP Access Concentrator), 135
examples, 13
overview, 11–12
WLANs (wireless LANs), 118
Layer 2 (Ethernet) addresses, 40
Layer 2 Tunneling Protocol (L2TP), 135–136
Layer 3 addresses, 37
layers
of Internet model
network components’ position in layers, 302–304
overview, 301–302
of OSI model
Layer 1 (physical), 35
Layer 2 (data link), 33–34
Layer 3 (network), 33
Layer 4 (transport), 32
Layer 5 (session), 32
Layer 6 (presentation), 32
Layer 7 (application), 31
relationship between layers, 34–35
leased lines, 106
levels (RAID)
RAID 0, 80
RAID 1, 80
RAID 5, 81
RAID 6, 81
library calls, 30
licensing, 343
Microsoft Windows Server 2003 licensing, 344
Microsoft Windows Server 2008 licensing, 344–345
Licklider, J. C. R., 232
Link Manager Protocol (LMP), 124
links, 11
LINUX, 67–68, 86–87, 188, 195–196
Linux
file sharing, 295–296
growth of, 383–384
as network platform, 292–293
network service configuration, 293–294
upgrading, 296
LMP (Link Manager Protocol), 124
LNS (L2TP Network Server), 136
local area networks. See LANs
LocalTalk, 67
logical network, 8, 11, 29, 167–171
diagrams, 167–171
structure, 272–274
logons, auditing, 326–327
logs, event, 364–366
Lotus Notes, 224–225
MAC (Media Access Control) addresses, 40
macro viruses, 329
MacTCP, 67
MAE-East, 236
magnetism, disks and, 55
mail servers, 164
Management Information Bases (MIBs), 355–356
MCP (Microsoft Certified Professional), 312
media
Bluetooth, 91
coaxial cable, 90
copper wire, 88–89
optical fiber, 90
overview, 88
Wi-Fi, 91
Media Access Control (MAC) addresses, 40
Megabit Ethernet, 184
memory, 54
DIMMs (Dual Inline Memory Modules), 54
RAM (random access memory), 53–55
SIMMs (Single Inline Memory Modules), 54
troubleshooting, 363–364
MIBs (Management Information Bases), 355–356
microprocessors, 52–53
Microsoft Certified Professional (MCP), 312
Microsoft Exchange Outlook, 225–227
Microsoft Windows, 188–190, 192
Microsoft Windows NT Server 4.0, 272
Microsoft Windows Server 2003, 84–85, 194–195
domain client configuration, 279–280
folder sharing, 282–285
future of, 286
installing, 274–276
licensing, 344
logical network structure, 272–274
managing, 285–286
overview, 271
printers sharing, 282–285
protocol configuration, 280–282
server configuration, 276–278
Window client configuration, 279
Microsoft Windows Server 2008, 85, 287, 344–345
MIME (Multipurpose Internet Mail Extensions), 217
Minix, 86
mobile wireless networking
Bluetooth, 123–125
cell concept, 120–121
history of, 119–120
hybrid networks, 118
implementing, 126–127
overview, 117–119
security, 125–126
signal interference, 118
Wi-Fi
802.11a standard, 122
802.11b standard, 122
802.11g standard, 123
802.11n standard, 123
DSSS (direct sequence spread spectrum), 122
FHSS (frequency hopping spread spectrum), 122
frequency interference between W-Fi and Bluetooth, 125
WLANs (wireless LANs), 118
modems, 14
broadband modems, 132
cable modem, 102–103
cellular modems, 132
modulation/demodulation process, 131
proprietary modems, 131
V-Series modems, 131
modulation/demodulation process, 131
motherboards, 52–53
MPLS, 111–112
MS-DOS, 66
multicasting, 38
multipartite viruses, 329
multiple-user computers, 160–161
multiplexing, 24
multiprocessing systems, 63
multitasking, 63
multiuser systems, 63
MX resource record, 254
name servers, 267
names
domain names
list of, 249–250
obtaining, 252–253
overview, 304
relationship within network, 305
usernames, 323
WINS (Windows Internet Naming Service), 260
namespaces, 248–250
NAT (Network Address Protocol), 39
needs, determining
of network, 156–159
of users, 159–161
.net domain name, 249
NetBEUI (Network BIOS Extended User Interface), 46
NetBIOS (Network Basic Input/Output System), 46
NetWare (Novell), 83–84, 192–194
Network Address Protocol (NAT), 39
network addresses
CIDR, 38–39
IP addresses, 37–38
IPv6 (version 6) addresses, 39
NAT (Network Address Protocol), 39
prefixes, 38
network administrators
budgeting, 313–314
daily tasks, 376–378
education and certification, 311–313
establishing network policies, 379–380
help desk analysts, 310
IT directors, 311
network administrators, 310
daily tasks, 376–378
establishing network policies, 379–380
responsibilities of, 373–376
strategies for supporting users, 378–379
overview, 309–310
project management, 315–317
responsibilities, 313, 373–376
strategies for supporting users, 378–379
support specialists, 310
user support advisors, 310
network architecture
client/server. See client/server model
Internet model
network components’ position in layers, 302–304
overview, 301–302
media
Bluetooth, 91
coaxial cable, 90
copper wire, 88–89
optical fiber, 90
overview, 88
Wi-Fi, 91
overview, 71
peer-to-peer networks
Linux, 188
Macintosh OS X, 189
Microsoft Windows OS, 188–192
when to use, 187–188
physical network, 8–9
bus topology, 10
cellular topology, 10
ring topology, 10
star topology, 9
position of components in layers, 302–304
protocols, 78
routers
capabilities of, 78
definition of, 74–75
forwarding, 77–78
routing, 75–76
speed
definition of, 72
factors contributing to, 72–73
hardware considerations, 73
software considerations, 73–74
network assembly, 199
Network Basic Input/Output System (NetBIOS), 46
Network BIOS Extended User Interface (NetBEUI), 46
network design, 155
network interface cards (NICs), 58–59, 202–206
network layer (OSI model), 33
network management
archives, 353
backups
backup media, 346
differential backup, 347
full backup, 347
Grandfather-Father-Son scheme, 347–349
incremental backup, 347
overview, 345
client licensing, 343
Microsoft Windows Server 2003 licensing, 344
Microsoft Windows Server 2008 licensing, 344–345
disaster recovery planning
assessing business impact, 350–351
assessing computing environment vulnerabilities, 351
defining computing infrastructure, 350
developing plan, 351–353
overview, 349–350
hardware upgrades, 340–341
network upgrades, 339–340
overview, 339
software upgrades, 341–343
network needs, determining, 156–159
network-network interface (NNI), 99
network operating systems. See NOSs
network policies, establishing, 379–380
network requirements, 5–6
network services, configuring on Linux server, 293–294
network upgrades, 339–340
networking definition, 4
NICs (network interface cards), 58–59, 202–206
NNI (network-network interface), 99
No Access, 164
nodes, 10
nonrepudiation, 322
NOSs (network operating systems)
client licensing, 343
Microsoft Windows Server 2003 licensing, 344
Microsoft Windows Server 2008 licensing, 344–345
Linux, 195–196
Microsoft Windows Server, 194–195
Novell NetWare, 192–194
UNIX, 195–196
Novell GroupWise, 223–224
Novell NetWare, 83–84, 192–194
NS resource record, 254
nslookup command, 371
number terminology, 49–50
open-standards email, 215
Open Systems Interconnection (OSI) protocols, 15
opening computer cases, 201
device drivers, 68
Linux, 67–68, 86–87, 188, 195–196
file sharing, 295–296
growth of, 383–384
as network platform, 292–293
network service configuration, 293–294
upgrading, 296
Microsoft Windows, 189–192
Microsoft Windows Server, 194–195
Microsoft Windows Server 2003, 84–85
Microsoft Windows Server 2008, 85
multitasking, 63
NOSs (network operating systems), 192–196
Novell NetWare, 83–84, 192–194
SOSs (server operating systems), 83–87
startup process, 63–65
files, 291
hierarchical file system, 292
history and development, 289–290
interoperability, 292
as network platform, 292–293
redirection, 291
Windows and Vista, 66
optical fiber, 90
.org domain name, 249
OSI (Open Systems Interconnection) model, 15
development of, 30
illustration, 31
Layer 1 (physical), 35
Layer 2 (data link), 33–34
Layer 3 (network), 33
Layer 4 (transport), 32
Layer 5 (session), 32
Layer 6 (presentation), 32
Layer 7 (application), 31
overview, 30–31
relationship between layers, 34–35
OSs. See operating systems
Outlook, 225–227
frames, 34–35
identifying type of, 36
packet filtering, 331
packet switching, 21–24
paging, 74
Palo Alto Research Center (PARC), 67
PAP (Password Authentication Protocol), 332
PARC (Palo Alto Research Center), 67
passwords, 324–325
patch cords, 208
payloads, 104
PCI (peripheral component interconnect) cards, 58
PDU (protocol data unit), 36, 110–111
peer-to-peer networks, 161–162
OS (operating system) software
Linux, 188
Macintosh OS X, 189
Microsoft Windows, 188–192
when to use, 187–188
peering, 235–237
peripheral component interconnect (PCI) cards, 58
permanent virtual circuits, 109–110
physical layer (OSI model), 35
bus topology, 10
cellular topology, 10
physical network diagrams, 171–174
ring topology, 10
star topology, 9
ping command, 367–368
planning networks
best practices
applying, 147–149
benefits of, 144–145
definition of, 143–144
design, 146
implementation, 146
planning, 146
tuning, 147
disaster recovery planning
assessing business impact, 350–351
assessing computing environment vulnerabilities, 351
defining computing infrastructure, 350
developing plan, 351–353
overview, 349–350
overview, 143
security
monitoring, 152–153
overview, 150–151
secure behaviors, defining, 151–152
usage policies and procedures, 151
standards, 149–150
Point-to-Point Protocol (PPP), 133–135
Point-to-Point Tunneling Protocol (PPTP), 333
policies
establishing, 379–380
usage policies and procedures, 151
POP3, 214
ports, 240–241
Post Office Protocol 3 (POP3), 214
PPP (Point-to-Point Protocol), 133–135
PPTP (Point-to-Point Tunneling Protocol), 333
preemptive multitasking, 63
prefixes, 38
presentation layer (OSI model), 32
printers, sharing, 26, 282–285
privacy, 322
private addresses, 38
private key encryption, 320
private ports, 240
.pro domain name, 250
processors, 52–53
troubleshooting, 358–361
project management, 315–317
proprietary mail systems, 214–215
proprietary modems, 131
protocol converters, 5
protocol data unit (PDU), 36
protocols. See communications protocols
provisioning T1 trunks, 106
PTR resource record, 254
public key encryption, 320–321
QoS (quality of service), 110
RADIUS (Remote Authentication Dial-In Service), 136, 332–333
RAID (redundant arrays of inexpensive disks)
RAID 0, 80
RAID 1, 80
RAID 5, 81
RAID 6, 81
RAM (random access memory), 53–54
read-only memoy (ROM), 50
Read-Write Access, 164
Red Hat Certification Program, 312
redirection in UNIX, 291
redundant arrays of inexpensive disks, 80
regional Internet registries (RIRs), 258
registered ports, 240
relaying traffic with addresses, 40–42
remote access hardware, 138–140
Remote Authentication Dial-In Service (RADIUS), 136, 332–333
remote networking, 131
history of, 129–130
L2TP (Layer 2 Tunneling Protocol), 135–136
PPP (Point-to-Point Protocol), 133–135
remote access hardware, 138–140
security, 136
system administration, 130
VPNs (virtual private networks), 137–138
replay, 322
Request for Comments (RFCs), 15
residential broadband
cable modem, 102–103
definition of, 101
DSL, 101–102
satellite services, 103
resource permissions, 327–328
resource records (RRs), 253–254
reviewing specification documents, 176
RFCs (Request for Comments), 15
RIB (routing information base), 75
ring topology, 10
RIRs (regional Internet registries), 258
RJ-45 jacks, 207
ROM (read-only memory), 50
root name servers (DNS), 250
routers, 9
capabilities of, 78
choosing, 182
definition of, 74–75
forwarding, 77–78
routing, 75–76
troubleshooting, 356–357
routing, 75–76
route aggregation, 39
route discovery, 75–76
route filtering, 235
routing information base (RIB), 75
routing tables, 75
RRs (resource records), 253–254
Sams Teach Yourself Microsoft Windows Server 2008 in 24 Hours (Habraken), 287
SATA (Serial Advanced Technology Attachment), 56
satellite services, 103
scheduling, 219–221
SCP (Sun Certified Professional), 312
secure behaviors, defining, 151–152
Secure Shell (SSH), 333
Secure Socket Tunneling Protocol (SSTP), 333
Secure Sockets Layer (SSL), 333
security
access control, 322–323
audits, 326–327
authentication, 322
best practices, 336–337
bombs, 322
certificates, 321
CHAP (Challenge Handshake Authentication Protocol), 332
digital signatures, 321
DNSSEC (DNS Security Protocol), 334
encryption
private key, 320
public key, 320–321
external attacks, 330
file servers, 164–165
firewalls
overview, 330–331
packet filtering, 331
Windows Firewall settings, 331–332
inheritance, 164
integrity, 322
IPSec (Internet Security Protocol), 334
mobile wireless networks, 125–126
monitoring, 152–153
nonrepudiation, 322
PAP (Password Authentication Protocol), 332
passwords, 324–325
permissions, 287
PPTP (Point-to-Point Tunneling Protocol), 333
privacy, 322
RADIUS (Remote Authentication Dial In User Service), 332–333
remote networking, 136
replay, 322
resource permissions, 327–328
secure behaviors, defining, 151–152
SSH (Secure Shell), 333
SSL (Secure Sockets Layer), 333
SSTP (Secure Socket Tunneling Protocol), 333
Trojan horses, 321
usage policies and procedures, 151
wireless networks, 335–336
worms, 321
sendmail, 213
sequence numbers, 24
Serial Advanced Technology Attachment (SATA), 56
server-based networks
application servers, 163
authentication servers, 164
backups, 165
communication servers, 163
configuration management, 166
file servers, 163–165
mail servers, 164
print servers, 163
web servers, 164
server operating systems (SOSs), 83–87
servers
authentication servers, 164, 298
choosing, 180–181
communication servers, 163, 297
DHCP servers, 297
DNS servers, 297
fault tolerance, 81–82
high availability, 81–82
Linux. See Linux
mail servers, 164
Microsoft Windows NT Server 4.0, 272
Microsoft Windows Server 2003
domain client configuration, 279–280
folder sharing, 282–285
future of, 286
installing, 274–276
logical network structure, 272–274
managing, 285–286
overview, 271
printers sharing, 282–285
protocol configuration, 280–282
server configuration, 276–278
Window client configuration, 279
Microsoft Windows Server 2008, 287
name servers, 267
overview, 80
RAID (redundant arrays of inexpensive disks), 80–81
server-based networks, 163–164
backups, 165
configuration management, 166
SOSs (server operating systems), 83–87
static IP settings, 259–260
troubleshooting, 357–358
service set identifier (SSID), 335
session layer (OSI model), 32
sharing
files on Linux networks, 295–296
folders on Microsoft Windows Server 2003, 282–285
printers, 26 on Microsoft Windows Server 2003, 282–285
software, 25–26
Showstopper (Zachary), 84
signal interference, 118
signatures, digital, 321
SIMMs (Single Inline Memory Modules), 54
Simple Mail Transport Protocol (SMTP), 214
Simple Network Management Protocol (SNMP), 356
Single Inline Memory Modules (SIMMs), 54
single-tasking systems, 63
single-user systems, 63
Smartmodem, 131
SMTP (Simple Mail Transfer Protocol), 214
SNMP (Simple Network Management Protocol), 356
SOA resource record, 253
software
definition of, 50
device drivers, 68
firmware, 50
groupware, 25
killer apps, 26
OSs (operating systems)
device drivers, 68
LINUX, 67–68
Mac OS, 66–67
multitasking, 63
overview, 62–65
startup process, 63–65
UNIX, 67–68
Windows and Vista, 66
sharing, 25–26
speed, 73–74
upgrades, 341–343
solid state drives (SSDs), 56–57
SONET (Synchronous Optical Network), 90, 103–104, 107–108, 236
SONET and T1: Architectures for Digital Transport Networks (Black and Waters), 104
SonicWALL, 219
SOSs (server operating systems), 83–87
source addresses, 24
spam, 218–219
SpamAssassin, 219
specification documents
reviewing with users, 176
writing, 174–175
SSDs (solid state drives), 56–57
SSH (Secure Shell), 333
SSID (service set identifier), 335
SSL (Secure Sockets Layer), 333
SSTP (Secure Socket Tunneling Protocol), 333
standards, 149–150
star topology, 9
startup process, 63–65
static electricity, 199–200
subnet masks, 257–258
subnetting, 255–256
Sun Certified Professional (SCP), 312
support specialists, 310
synchronization, T1, 105
Synchronous Optical Network (SONET), 90, 236
system calls, 62
system logs, 364–366
T1, 103–104
leased lines, 106
provisioning trunks, 106
synchronization of signals, 105
T-carrier family, 105–106
uses for T1 lines, 106
tables, routing, 75
TCP (Transmission Control Protocol), 243–244
TCP/IP, 238–240
nslookup command, 371
ping command, 367–368
traceroute command, 370–371
Telnet, 129–130
templates (website), 268–269
threats to security
bombs, 322
external attacks, 330
replay, 322
Trojan horses, 321
worms, 321
time-division multiplexing, 24
Tocqueville, Alexis de, 19
Token Ring, 43
Torvalds, Linus, 86–87
TOS (Type of Service), 43, 242
traceroute command, 370–371
traffic, 10
flow of, 112–113
relaying with addresses, 40–42
Transmission Control Protocol (TCP), 243–244
transport layer (OSI model), 32
Trojan horses, 321
troubleshooting
email, 217–218
hard drive performance, 361–362
memory utilization, 363–364
MIBs (Management Information Bases), 355–356
overview, 355
processor performance, 358–361
routers, 356–357
server hardware, 357–358
SNMP (Simple Network Management Protocol), 356
tools
event logs, 364–366
FTP (File Transfer Protocol), 369–370
nslookup command, 371
ping command, 367–368
traceroute command, 370–371
trusts, 272
tuning, 147
twisted-pair wires, 88–89
Type of Service (TOS), 43, 242
UDP (User Datagram Protocol), 244
Ultra DMA, 56
UNI (user-network interface), 99
universal serial bus (USB), 60–62
files, 291
history and development, 289–290
interoperability, 292
as network platform, 292–293
redirection, 291–292
unplugging computers, 200
upgrading
hardware, 340–341
Linux server, 296
networks, 339–340
software, 341–343
usage policies and procedures, 151
USB (universal serial bus), 60–62
User Datagram Protocol (UDP), 244
user-network interface (UNI), 99
user support advisors, 310
users
needs, determining, 159–161
reviewing specification documents with, 176
usernames, 323
V-Series modems, 131
video adapter cards, 59–60
virtual circuit/path IDs, 44
virtual private networks (VPNs), 7, 137–138
Vista, 66
VoIP (Voice over IP), 102
VPNs (virtual private networks), 7, 137–138
vulnerabilities, assessing, 351
components
ATM, 108–111
frame relay, 111
MPLS, 111–112
overview, 97–99
T1, 103–106
interfaces, 99–101
residential broadband
cable modem, 102–103
definition of, 101
DSL, 101–102
satellite services, 103
traffic flow, 112–113
WAPs (wireless access points), 182
wardriving, 335
Waters, Sharleen, 104
Web
HTML (Hypertext Markup Language), 265–266
HTTP (Hypertext Transfer Protocol), 266–267
overview, 264–265
well-known ports, 240
WEP, 336
802.11a standard, 122
802.11b standard, 122
802.11g standard, 123
802.11n standard, 123
DSSS (direct sequence spread spectrum), 122
FHSS (frequency hopping spread spectrum), 122
frequency interference between W-Fi and Bluetooth, 125
Wi-Fi Alliance, 336
wide area networks. See WANs
Wikipedia, 4
Wild Blue, 103
WiMax, 384
Windows Internet Naming Service (WINS), 260
Windows Firewall, 331–332
Windows NT Server 4.0, 272
Windows Server 2003, 84–85, 194–195
domain client configuration, 279–280
folder sharing, 282–285
future of, 286
installing, 274–276
licensing, 344
logical network structure, 272–274
managing, 285–286
overview, 271
printers sharing, 282–285
protocol configuration, 280–282
server configuration, 276–278
Window client configuration, 279
Windows Server 2008, 85, 287, 344–345
Windows XP, 66
WINS (Windows Internet Naming Service), 260
wireless access points (WAPs), 182
wireless networking, 8
mobile wireless networking
cell concept, 120–121
history of, 119–120
hybrid networks, 118
implementing, 126–127
overview, 117–119
security, 125–126
signal interference, 118
WLANs (wireless LANs), 118
network assembly, 210
security, 335–336
WAPs (wireless access points), 182
WiMax, 384
wiring closets, 207–209
WLANs (wireless LANs), 118
worms, 321
WPA, 336
wrist straps, 200
writing specification documents, 174–175
Xerox Network Services (XNS), 45
Zachar, Pascal, 84