You are previewing Networking Self-Teaching Guide: OSI, TCP/IP, LANs, MANs, WANs, Implementation, Management, and Maintenance.
O'Reilly logo
Networking Self-Teaching Guide: OSI, TCP/IP, LANs, MANs, WANs, Implementation, Management, and Maintenance

Book Description

IT professionals who want to move into the networking side in a corporate or enterprise setting will find the detailed content they need to get up to speed on the very latest networking technologies; plus, current networking professionals will find this a valuable and up-to-date resource. This hands-on guide is designed so that you can select, design, and implement an actual network using the tutorials and steps in the book. Coverage includes an overview of networking technologies, including the hardware, software, transmission media, and data transfer processes; in-depth coverage of OSI and TCP/IP reference models; operating systems and other systems software used in today?s networks; LANs, WANS, and MANs, including the components and standards that operate within each type of area network; and more.

Table of Contents

  1. Copyright
  2. About the Authors
  3. Credits
  4. Acknowledgments
  5. Introduction
    1. How this Book Is Organized
      1. Part I: Networking Nuts and Bolts
      2. Part II: The OSI Layers
      3. Part III: Network Design and Implementation
      4. Part IV: Managing and Maintaining the Network
    2. Who Should Read This Book
    3. A Few Words from the Authors
    4. Contact the Authors
  6. I. Networking Nuts and Bolts
    1. 1. Introduction to Networking
      1. 1.1. Networking: A Brief Introduction
        1. 1.1.1. Internetworking
          1. 1.1.1.1. An internet
          2. 1.1.1.2. The Internet
          3. 1.1.1.3. Intranets (Give Me an "A", Remove My "E", Now Flip the "R" and the "A")
          4. 1.1.1.4. Extranets
          5. 1.1.1.5. Virtual Private Networks
          6. 1.1.1.6. Catenet
          7. 1.1.1.7. Area Networks
            1. 1.1.1.7.1. Campus Area Networks
            2. 1.1.1.7.2. Global Area Networks
            3. 1.1.1.7.3. Local Area Network
            4. 1.1.1.7.4. Metropolitan Area Networks
            5. 1.1.1.7.5. Personal Area Networks
            6. 1.1.1.7.6. Wide Area Networks
            7. 1.1.1.7.7. Wireless Local Area Networks
        2. 1.1.2. Network Relationships and Topologies
          1. 1.1.2.1. Network Relationship Types
            1. 1.1.2.1.1. Client/Server Network Relationship
            2. 1.1.2.1.2. Peer-to-Peer Network Relationship
          2. 1.1.2.2. Network Topology Types
            1. 1.1.2.2.1. Bus Topology
            2. 1.1.2.2.2. Mesh Topology
            3. 1.1.2.2.3. Star Topology
            4. 1.1.2.2.4. Ring Topology
            5. 1.1.2.2.5. Hierarchical Topology (a.k.a. Tree Topology)
        3. 1.1.3. Protocols
          1. 1.1.3.1. Transmission Control Protocol
          2. 1.1.3.2. User Datagram Protocol
          3. 1.1.3.3. Internet Protocol
      2. 1.2. History of Networking
      3. 1.3. Standards and Standards Organizations
        1. 1.3.1. American National Standards Institute
        2. 1.3.2. International Organization for Standardization
        3. 1.3.3. International Electrotechnical Commission
        4. 1.3.4. Telecommunications Industry Association
        5. 1.3.5. Electronic Industries Alliance
        6. 1.3.6. International Telecommunication Union
        7. 1.3.7. IEEE
          1. 1.3.7.1. IEEE 802 Working Groups
          2. 1.3.7.2. IEEE 802.1
          3. 1.3.7.3. IEEE 802.3
          4. 1.3.7.4. IEEE 802.5
          5. 1.3.7.5. IEEE 802.11
        8. 1.3.8. Internet Society (ISOC)
        9. 1.3.9. Internet Engineering Task Force
      4. 1.4. An Introduction to the OSI Reference Model
        1. 1.4.1. All People Seem to Need Data Processing—A Mnemonic Device
        2. 1.4.2. A Layered Approach
          1. 1.4.2.1. Layer 7—The Application Layer
          2. 1.4.2.2. Layer 6—The Presentation Layer
          3. 1.4.2.3. Layer 5—The Session Layer
          4. 1.4.2.4. Layer 4—The Transport Layer
          5. 1.4.2.5. Layer 3—The Network Layer
          6. 1.4.2.6. Layer 2—The Data Link Layer
          7. 1.4.2.7. Layer 1—The Physical Layer
      5. 1.5. TCP/IP, Please (and Don't Be Stingy with the IP)
        1. 1.5.1. TCP/IP Applications
        2. 1.5.2. TCP/IP Utilities
        3. 1.5.3. The TCP/IP Reference Model
      6. 1.6. Chapter Exercises
      7. 1.7. Pop Quiz Answers
    2. 2. LANs, MANs, and WANs
      1. 2.1. Local Area Networks
        1. 2.1.1. LAN Standards
          1. 2.1.1.1. 802.2 Logical Link Control
          2. 2.1.1.2. 802.3 CSMA/CD Access Method and Physical Layer
          3. 2.1.1.3. 802.5 Token Ring Access Method and Physical Layer
          4. 2.1.1.4. The Collision Domain Battle
          5. 2.1.1.5. The Most Common Wireless Standards
        2. 2.1.2. LAN Topologies
          1. 2.1.2.1. Token Ring Network Topologies
            1. 2.1.2.1.1. Token Ring Cabling
            2. 2.1.2.1.2. High-Speed Token Ring
          2. 2.1.2.2. Bus Networks Topologies
            1. 2.1.2.2.1. Star Network Topology
            2. 2.1.2.2.2. Tree Network Topologies
            3. 2.1.2.2.3. Devices that Make Up a Network
            4. 2.1.2.2.4. Bus Network Cabling
      2. 2.2. Metropolitan Area Networks
        1. 2.2.1. Fiber Distributed Data Interface
        2. 2.2.2. A MAN Example
      3. 2.3. Wide Area Networks
        1. 2.3.1. Whose POTS?
        2. 2.3.2. Integrated Services Digital Network
        3. 2.3.3. Point-to-Point WANs
        4. 2.3.4. Frame Relay
        5. 2.3.5. Using the Internet for Your WAN
      4. 2.4. Chapter Exercises
      5. 2.5. Pop Quiz Answers
    3. 3. Network Hardware and Transmission Media
      1. 3.1. Stuff You Just Need to Know
        1. 3.1.1. Bits, Bytes, and Binary
        2. 3.1.2. Non-human Resources
          1. 3.1.2.1. Volatile Memory
            1. 3.1.2.1.1. Random Access Memory
            2. 3.1.2.1.2. Dynamic Random Access Memory
            3. 3.1.2.1.3. Static Random Access Memory
          2. 3.1.2.2. Nonvolatile Memory
            1. 3.1.2.2.1. Magnetic Storage Media
            2. 3.1.2.2.2. Read-Only Memory
            3. 3.1.2.2.3. Flash Memory
        3. 3.1.3. Encapsulation
        4. 3.1.4. Data Communication Equipment and Data Terminal Equipment
        5. 3.1.5. All Your Base Are Belong to Us
        6. 3.1.6. Computer Buses
        7. 3.1.7. IP Addressing
      2. 3.2. Transmission Media
        1. 3.2.1. Network Cabling
          1. 3.2.1.1. Twisted Pair Cable
          2. 3.2.1.2. Coaxial Cable
          3. 3.2.1.3. Fiber Optic Cable
        2. 3.2.2. Wireless Communication
      3. 3.3. Network Hardware
        1. 3.3.1. End-User Interface Hardware Types
        2. 3.3.2. Connecting End Users
          1. 3.3.2.1. Network Interfaces and Adapters
          2. 3.3.2.2. Network Interface Controllers
        3. 3.3.3. To Boldly Go Where Data Needs to Flow (or, How Does that E-mail Get to Brother Joel?)
          1. 3.3.3.1. Concentrators
          2. 3.3.3.2. Hubs
          3. 3.3.3.3. Media Access Units
          4. 3.3.3.4. Repeaters
          5. 3.3.3.5. Bridges and Switches
          6. 3.3.3.6. Routers
          7. 3.3.3.7. Layer 3 Switches
          8. 3.3.3.8. Upper-Layer Switch Types
          9. 3.3.3.9. Remote Access
            1. 3.3.3.9.1. Modems
            2. 3.3.3.9.2. VPNs
            3. 3.3.3.9.3. Wireless
          10. 3.3.3.10. Servers
      4. 3.4. Chapter Exercises
      5. 3.5. Pop Quiz Answers
    4. 4. Operating Systems and Networking Software
      1. 4.1. Computer Operating System Basics
        1. 4.1.1. CPU Basics
        2. 4.1.2. Computer Basics
          1. 4.1.2.1. Read-Only Memory
          2. 4.1.2.2. Random-Access Memory
          3. 4.1.2.3. Mass Storage System
          4. 4.1.2.4. Input/Output System
        3. 4.1.3. Operating System Basics
      2. 4.2. Network Operating System Basics
        1. 4.2.1. Peer-to-Peer Networking
          1. 4.2.1.1. File Sharing on a Peer-to-Peer Network
          2. 4.2.1.2. Printer Sharing on a Peer-to-Peer Network
      3. 4.3. Other Operating Systems
        1. 4.3.1. Unix
        2. 4.3.2. Linux
        3. 4.3.3. Sun Solaris
      4. 4.4. Chapter Exercises
      5. 4.5. Pop Quiz Answers
    5. 5. The TCP/IP Protocol Suite
      1. 5.1. The TCP/IP Layers
      2. 5.2. Popular TCP/IP Protocols
        1. 5.2.1. The Application Layer
          1. 5.2.1.1. Domain Name System
          2. 5.2.1.2. Simple Network Management Protocol
            1. 5.2.1.2.1. SNMP Managers
            2. 5.2.1.2.2. SNMP Managed Devices
            3. 5.2.1.2.3. SNMP Agents
            4. 5.2.1.2.4. Management Information Base
            5. 5.2.1.2.5. SNMP version 2
            6. 5.2.1.2.6. SNMP version 3
          3. 5.2.1.3. File Transfer Protocol
          4. 5.2.1.4. Trivial File Transfer Protocol
          5. 5.2.1.5. Simple Mail Transfer Protocol
          6. 5.2.1.6. Network File System
          7. 5.2.1.7. Telecommunications Network
            1. 5.2.1.7.1. Network Virtual Terminal
            2. 5.2.1.7.2. Options and Option Negotiation
            3. 5.2.1.7.3. Modes of Operation
          8. 5.2.1.8. Secure Shell Protocol
        2. 5.2.2. The Transport Layer
          1. 5.2.2.1. Transmission Control Protocol
          2. 5.2.2.2. User Datagram Protocol
        3. 5.2.3. The Internet Layer
          1. 5.2.3.1. Internet Protocol
          2. 5.2.3.2. Internet Group Multicast Protocol
          3. 5.2.3.3. Internet Control Message Protocol
          4. 5.2.3.4. Routing Information Protocol
          5. 5.2.3.5. Open Shortest Path First
          6. 5.2.3.6. Border Gateway Protocol
          7. 5.2.3.7. Internet Protocol Security
      3. 5.3. End of Chapter Hodgepodge
        1. 5.3.1. There Is Hope for Diskless Nodes
        2. 5.3.2. A Little More Information on Routing
        3. 5.3.3. Sockets and Ports Are Not the Same Thing
      4. 5.4. Chapter Exercises
      5. 5.5. Pop Quiz Answers
    6. 6. Ethernet Concepts
      1. 6.1. The Beginning of Ethernet Technology
      2. 6.2. Ethernet Components
        1. 6.2.1. DCE and DTE Cabling Considerations
          1. 6.2.1.1. Interconnecting Like Ethernet Devices
      3. 6.3. Ethernet and IEEE 802.3's Relationship to the OSI Model
        1. 6.3.1. Logical Link Control
        2. 6.3.2. Media Access Control
      4. 6.4. Ethernet Frame Format
        1. 6.4.1. Transmitting a Frame
          1. 6.4.1.1. Half-Duplex Transmission
            1. 6.4.1.1.1. Gigabit Ethernet Considerations
          2. 6.4.1.2. Full-Duplex Transmission
            1. 6.4.1.2.1. Full-Duplex Flow Control
          3. 6.4.1.3. Autonegotiation
        2. 6.4.2. Receiving a Frame
      5. 6.5. Traffic Optimization
        1. 6.5.1. Traffic Shaping
          1. 6.5.1.1. VLAN Tagging
      6. 6.6. Chapter Exercises
      7. 6.7. Pop Quiz Answers
    7. 7. Not to Be Forgotten
      1. 7.1. Can't Get Enough of Those LAN Technologies
        1. 7.1.1. Attached Resource Computer Network
        2. 7.1.2. StarLAN
        3. 7.1.3. Token Ring
          1. 7.1.3.1. Token Ring's Modus Operandi
          2. 7.1.3.2. Token Ring Media
          3. 7.1.3.3. The Format of the Token Ring Frame
        4. 7.1.4. Fiber Distributed Data Interface
          1. 7.1.4.1. FDDI Does What FDDI Does
            1. 7.1.4.1.1. Fiber Distributed Data Interface
            2. 7.1.4.1.2. Copper Distributed Data Interface
          2. 7.1.4.2. FDDI Node Types
          3. 7.1.4.3. The FDDI Frame Format
      2. 7.2. As If You Haven't Had Enough of These Sweet Protocols
        1. 7.2.1. Digital Equipment Company Network
        2. 7.2.2. Xerox Network Systems
        3. 7.2.3. Internetwork Packet Exchange
        4. 7.2.4. Point-to-Point Protocol
          1. 7.2.4.1. PPP Encapsulation Method
          2. 7.2.4.2. PPP Link Control Protocol
          3. 7.2.4.3. PPP Network Control Protocol
          4. 7.2.4.4. Please, Tell Us More
          5. 7.2.4.5. PPP Frame Format
        5. 7.2.5. X.25
          1. 7.2.5.1. X.25 Operations
          2. 7.2.5.2. Link Access Procedure, Balanced
          3. 7.2.5.3. Packet Layer Protocol
        6. 7.2.6. Asynchronous Transfer Mode
          1. 7.2.6.1. ATM Generic Cell Format
          2. 7.2.6.2. An Overview of ATM Operations
            1. 7.2.6.2.1. ATM: Virtual Paths, Circuits, and Channels
            2. 7.2.6.2.2. ATM: Link Interface Types
            3. 7.2.6.2.3. ATM Cell Header Format
          3. 7.2.6.3. ATM Reference Model
          4. 7.2.6.4. Traffic Management
          5. 7.2.6.5. ATM Adaptation Layer Types
        7. 7.2.7. Frame Relay
          1. 7.2.7.1. Frame Relay Node Types
          2. 7.2.7.2. Virtual Circuits . . . Again?
          3. 7.2.7.3. Data Link Connection Identifier
          4. 7.2.7.4. Feckens and Beckens
          5. 7.2.7.5. Local Management Interface
          6. 7.2.7.6. Frame Relay Frame Format
        8. 7.2.8. Integrated Services Digital Network
          1. 7.2.8.1. Basic Rate Interface and Primary Rate Interface
          2. 7.2.8.2. ISDN Nodes
          3. 7.2.8.3. The ISDN Reference Model
        9. 7.2.9. AppleTalk
          1. 7.2.9.1. AppleTalk Physical and Data Link Layers
          2. 7.2.9.2. AppleTalk Network Layer
          3. 7.2.9.3. AppleTalk Upper Layers
      3. 7.3. Chapter Exercises
      4. 7.4. Pop Quiz Answers
  7. II. The OSI Layers
    1. 8. The Upper Layers
      1. 8.1. Background
      2. 8.2. The TCP/IP Model
        1. 8.2.1. TCP/IP Application Layer
        2. 8.2.2. TCP/IP Transport Layer
        3. 8.2.3. TCP/IP Internet Layer
        4. 8.2.4. TCP/IP Link Layer
          1. 8.2.4.1. TCP/IP Link Layer Protocols
      3. 8.3. OSI Application Layer
      4. 8.4. OSI Presentation Layer
      5. 8.5. OSI Session Layer
      6. 8.6. Chapter Exercises
      7. 8.7. Pop Quiz Answers
    2. 9. The Transport Layer
      1. 9.1. The Terms and Conditions of Chapter 9
        1. 9.1.1. End-to-End Delivery
        2. 9.1.2. Standards
          1. 9.1.2.1. ISO/IEC 8072
          2. 9.1.2.2. ISO/IEC 8073
        3. 9.1.3. This, That, and the Other
          1. 9.1.3.1. Types of Transport Service
          2. 9.1.3.2. Data Units
          3. 9.1.3.3. Classes of Transport Service
          4. 9.1.3.4. Types of Network Service
          5. 9.1.3.5. Multiplexing
      2. 9.2. Transport Layer Operations
        1. 9.2.1. Connection-Oriented Operations
          1. 9.2.1.1. Setting Up the Connection
          2. 9.2.1.2. Maintaining the Connection
          3. 9.2.1.3. Terminating the Connection
        2. 9.2.2. Connectionless Operations
      3. 9.3. Transport Layer Protocols
        1. 9.3.1. A Few More Words about TCP
        2. 9.3.2. The TCP Header Format
        3. 9.3.3. A Little More on UDP
        4. 9.3.4. The UDP Header Format
      4. 9.4. The Meaning of Control
      5. 9.5. Chapter Exercises
      6. 9.6. Pop Quiz Answers
    3. 10. The Network Layer
      1. 10.1. Network Connection Types
        1. 10.1.1. Connectionless Network Services
        2. 10.1.2. Connection-Oriented Network Services
        3. 10.1.3. Domain Name Services
      2. 10.2. TCP/IP Network Layer Protocols
        1. 10.2.1. Internet Protocol
          1. 10.2.1.1. Internet Protocol Version 4
            1. 10.2.1.1.1. Network Address Translation
          2. 10.2.1.2. Internet Protocol Version 6
        2. 10.2.2. Internet Control Message Protocol
          1. 10.2.2.1. Ping
          2. 10.2.2.2. Traceroute
        3. 10.2.3. Internet Group Management Protocol
        4. 10.2.4. Internet Protocol Security
      3. 10.3. Chapter Exercises
      4. 10.4. Pop Quiz Answers
    4. 11. The Data Link Layer
      1. 11.1. Concerns of the LAN
        1. 11.1.1. It Just Is
        2. 11.1.2. Highs and Lows
      2. 11.2. Accessing the Medium
        1. 11.2.1. Rules of Accessing the Medium
        2. 11.2.2. From Tokens to Contention
          1. 11.2.2.1. Using the Token Method
          2. 11.2.2.2. Using the Contention Method
      3. 11.3. Meet the Sublayers
        1. 11.3.1. Logical Link Control
          1. 11.3.1.1. LLC Framing
          2. 11.3.1.2. Subnetwork Access Protocol
        2. 11.3.2. The MAC Sublayer
          1. 11.3.2.1. The MAC Address
          2. 11.3.2.2. Access Control for the Channel
      4. 11.4. The "ings"—Casting, Detecting, and Addressing
        1. 11.4.1. Data Link Addressing
          1. 11.4.1.1. The MAC Address Format
          2. 11.4.1.2. Unicast Addressing
          3. 11.4.1.3. Multicast Addressing
        2. 11.4.2. Error Detection
        3. 11.4.3. Control of the Flow
      5. 11.5. "Knode" the LAN
        1. 11.5.1. Diary of a Network Bridge
          1. 11.5.1.1. Unicast Operation
          2. 11.5.1.2. Multicast Operation
          3. 11.5.1.3. When the Bridge Just Does Not Know
        2. 11.5.2. The Address Table
      6. 11.6. Chapter Exercises
      7. 11.7. Pop Quiz Answers
  8. III. Network Design and Implementation
    1. 12. Design Methodologies
      1. 12.1. Your Task Is to Design a Network
        1. 12.1.1. Types of Organizational LANs
        2. 12.1.2. Other Things to Consider
        3. 12.1.3. Building the Foundation
      2. 12.2. Let's Start Planning
        1. 12.2.1. Development of Scope
        2. 12.2.2. You Are Not Alone
      3. 12.3. A Hierarchical Design Model
        1. 12.3.1. Access Layer
        2. 12.3.2. Distribution Layer
        3. 12.3.3. Core Layer
        4. 12.3.4. Why Hierarchical?
      4. 12.4. 5-4-3-2-1, Speed Is Not the Big Concern
      5. 12.5. Making Determinations
        1. 12.5.1. Determining Which Topology to Use
          1. 12.5.1.1. Bus Network Topology
          2. 12.5.1.2. Star Network Topology
          3. 12.5.1.3. Ring Network Topology
        2. 12.5.2. Determining Which Nodes to Use
          1. 12.5.2.1. Traditional Nodes
            1. 12.5.2.1.1. Repeaters
            2. 12.5.2.1.2. Concentrators
            3. 12.5.2.1.3. Bridges
            4. 12.5.2.1.4. Routers
          2. 12.5.2.2. Node Evolution
            1. 12.5.2.2.1. Layer 3 Switches
            2. 12.5.2.2.2. Layer 4–7 Switching
            3. 12.5.2.2.3. Virtual Private Networks
            4. 12.5.2.2.4. Wireless Networks
        3. 12.5.3. LAN Switching Technology
          1. 12.5.3.1. Switch Types
          2. 12.5.3.2. By All Means, Be Redundant
          3. 12.5.3.3. I'm Loopy!
            1. 12.5.3.3.1. Darn that Redundancy Anyway
            2. 12.5.3.3.2. Loop Resolution
            3. 12.5.3.3.3. Spanning Tree
            4. 12.5.3.3.4. Spanning Tree Port States
          4. 12.5.3.4. Link Aggregation
          5. 12.5.3.5. Virtual LANs
            1. 12.5.3.5.1. Benefits of VLANs
            2. 12.5.3.5.2. VLAN-Awareness
            3. 12.5.3.5.3. Tag! You're It!
            4. 12.5.3.5.4. VLAN Types
        4. 12.5.4. Determining What Other Determinations Need to Be Determined
          1. 12.5.4.1. Talking to a WAN
          2. 12.5.4.2. Management and Security
            1. 12.5.4.2.1. Network Security
            2. 12.5.4.2.2. Network Management
          3. 12.5.4.3. Choosing Protocols
          4. 12.5.4.4. Proactive Thinking
      6. 12.6. Network Implementation
      7. 12.7. Chapter Exercises
      8. 12.8. Pop Quiz Answers
    2. 13. Implementation
      1. 13.1. Planning
        1. 13.1.1. Totally New Network Planning Phase
          1. 13.1.1.1. Initial Planning
            1. 13.1.1.1.1. Office Interconnection Planning
            2. 13.1.1.1.2. Network Operations Area
            3. 13.1.1.1.3. Environmental Requirements
            4. 13.1.1.1.4. Network Access Requirements
            5. 13.1.1.1.5. Remote User Access
            6. 13.1.1.1.6. Network Distribution
            7. 13.1.1.1.7. Network Backbone Distribution
            8. 13.1.1.1.8. Wireless Access
          2. 13.1.1.2. Finalizing the Plan
        2. 13.1.2. Network Revision Planning
          1. 13.1.2.1. Reworking Network Access
          2. 13.1.2.2. Upgrading a Network's Core Routers
          3. 13.1.2.3. Upgrading the Network's Distribution Components
      2. 13.2. Network Supporting Infrastructure
      3. 13.3. Budgeting
      4. 13.4. Staging
      5. 13.5. Rollout
      6. 13.6. Verification
      7. 13.7. Documentation
      8. 13.8. The Final Stretch
      9. 13.9. Chapter Exercise
      10. 13.10. Pop Quiz Answer
  9. IV. Managing and Maintaining the Network
    1. 14. Network Security
      1. 14.1. Elements of Network Security
        1. 14.1.1. Network Security Policies
        2. 14.1.2. Network Access Control
          1. 14.1.2.1. Network Premises Access Security
          2. 14.1.2.2. Network Access Security and Control
          3. 14.1.2.3. Restricting Network Access
        3. 14.1.3. Network Data Integrity
        4. 14.1.4. Network Security Monitoring
        5. 14.1.5. Network Security Assurance
      2. 14.2. Network Security Methodologies
        1. 14.2.1. Authentication
          1. 14.2.1.1. Lightweight Directory Access Protocol
          2. 14.2.1.2. RADIUS
          3. 14.2.1.3. certificates
        2. 14.2.2. Data Integrity
          1. 14.2.2.1. Point-to-Point Tunneling Protocol
          2. 14.2.2.2. Layer 2 Tunneling Protocol
          3. 14.2.2.3. Internet Protocol Security
      3. 14.3. Chapter Exercises
      4. 14.4. Pop Quiz Answers
    2. 15. Network Management
      1. 15.1. Operation
        1. 15.1.1. Help Desk Software
        2. 15.1.2. Network Operations Staff
        3. 15.1.3. Network Monitoring
      2. 15.2. Administration
        1. 15.2.1. Network Management Staff Members
          1. 15.2.1.1. Executive Level
          2. 15.2.1.2. Department Heads/Managers
            1. 15.2.1.2.1. Telecommunications Department
            2. 15.2.1.2.2. Security Department
            3. 15.2.1.2.3. Network Support Group
            4. 15.2.1.2.4. Server Support Team
            5. 15.2.1.2.5. PC Support
            6. 15.2.1.2.6. Infrastructure Group
            7. 15.2.1.2.7. Logistics Group
      3. 15.3. Maintenance
      4. 15.4. Provisioning
      5. 15.5. Tools
        1. 15.5.1. Simple Network Management Protocol
        2. 15.5.2. Packet-Capture Capability
      6. 15.6. Chapter Exercises
      7. 15.7. Pop Quiz Answers
    3. 16. Troubleshooting
      1. 16.1. The Little LAN that Cried Wolf
        1. 16.1.1. Feedback
          1. 16.1.1.1. End-User Feedback
          2. 16.1.1.2. Management Station Feedback
          3. 16.1.1.3. Hmm. . .
        2. 16.1.2. What Could Possibly Go Wrong?
        3. 16.1.3. Food for Thought
      2. 16.2. The Proactive Approach Beats the Reactive Approach Hands Down
        1. 16.2.1. Baseline
        2. 16.2.2. Proactive Documentation
        3. 16.2.3. There Is No Such Thing as Too Much
      3. 16.3. Troubleshooting Tools
        1. 16.3.1. Helpful TCP/IP Utilities
          1. 16.3.1.1. Ping
          2. 16.3.1.2. Traceroute
          3. 16.3.1.3. Netstat
          4. 16.3.1.4. Route
          5. 16.3.1.5. Arp
          6. 16.3.1.6. Ipconfig
        2. 16.3.2. More Helpful Tools
        3. 16.3.3. Even More Helpful Tools
      4. 16.4. A Logical Order
        1. 16.4.1. Define the Problem
        2. 16.4.2. Consider the Possibilities
        3. 16.4.3. Determine the Issue
        4. 16.4.4. Find a Possible Solution
        5. 16.4.5. Test the Possible Solution
        6. 16.4.6. Develop an Action Plan
        7. 16.4.7. Implement the Action Plan
        8. 16.4.8. Monitor the Results
        9. 16.4.9. Another Fantastic Bonus from the Authors
      5. 16.5. Layered Strategy
        1. 16.5.1. Common Lower-Layer Issues
          1. 16.5.1.1. Layer 1
          2. 16.5.1.2. Layer 2
          3. 16.5.1.3. Layer 3
        2. 16.5.2. Thoughts Pertaining to the Upper Layers
      6. 16.6. Troubleshooting Examples
        1. 16.6.1. Example 1: PC Can't Connect
        2. 16.6.2. Example 2: Reading a Sniffer Trace
        3. 16.6.3. Example 3: Identifying a Broadcast Storm
        4. 16.6.4. Example 4: VPN Client Can't Connect to VPN Server
        5. 16.6.5. Example 5: Two Common LAN Issues
          1. 16.6.5.1. Duplex Mismatch
          2. 16.6.5.2. Spanning Tree
      7. 16.7. Chapter Exercises
      8. 16.8. Pop Quiz Answers
  10. A. Additional Exercises
    1. A.1. Chapter 1 — Introduction to Networking
    2. A.2. Chapter 2 — LANs, WANs, and MANs
    3. A.3. Chapter 3 — Network Hardware and Transmission Media
    4. A.4. Chapter 4 — Operating Systems and Networking Software
    5. A.5. Chapter 5 — The TCP/IP Protocol Suite
    6. A.6. Chapter 6 — Ethernet Concepts
    7. A.7. Chapter 7 — Not to Be Forgotten
    8. A.8. Chapter 8 — The Upper Layers
    9. A.9. Chapter 9 — The Transport Layer
    10. A.10. Chapter 10 — The Network Layer
    11. A.11. Chapter 11 — The Data Link Layer
    12. A.12. Chapter 12 — Design Methodologies
    13. A.13. Chapter 13 — Implementation
    14. A.14. Chapter 14 — Network Security
    15. A.15. Chapter 15 — Network Management
    16. A.16. Chapter 16 — Troubleshooting
  11. B. Exercise Answers
    1. B.1. Chapter 1 Exercises
    2. B.2. Chapter 2 Exercises
    3. B.3. Chapter 3 Exercises
    4. B.4. Chapter 4 Exercises
    5. B.5. Chapter 5 Exercises
    6. B.6. Chapter 6 Exercises
    7. B.7. Chapter 7 Exercises
    8. B.8. Chapter 8 Exercises
    9. B.9. Chapter 9 Exercises
    10. B.10. Chapter 10 Exercises
    11. B.11. Chapter 11 Exercises
    12. B.12. Chapter 12 Exercises
    13. B.13. Chapter 13 Exercises
    14. B.14. Chapter 14 Exercises
    15. B.15. Chapter 15 Exercises
    16. B.16. Chapter 16 Exercises
    17. B.17. Appendix A Exercises
  12. C. Glossary
  13. D. Acronyms