You are previewing Networking The Complete Reference, Third Edition.
O'Reilly logo
Networking The Complete Reference, Third Edition

Book Description

The most comprehensive, current guide to networking Build and administer high-performance networks of all sizes—from small home systems to enterprise internetworks—using the practical information in this detailed resource. Thoroughly revised to cover the latest technologies, Networking: The Complete Reference, Third Edition offers concise explanations, start-to-finish deployment plans, real-world examples, and expert tips. Find out how to select a networking protocol, connect devices, set up wireless LANs and WANs, configure Internet servers, virtualize your network, and migrate to the cloud. Cutting-edge backup, tuning, and security techniques are fully explained. Filled with proven solutions to a wide array of networking issues, this comprehensive guide is ideal for beginners and seasoned IT professionals alike. Design, configure, and administer wireless and wired networks Work with interface cards, hubs, routers, switches, and repeaters Understand Ethernet, Token Ring, TCP/IP, and IPX protocols Build wireless LANs using WiFi, IEEE 802.11, and Bluetooth technology Deploy server clusters, multiprocessors, and Fibre Channel connections Deliver Web, FTP, e-mail, and Active Directory services Implement a cloud-based network infrastructure Set up, configure, and manage virtual networks Handle troubleshooting and network security Connect Macintosh and Unix systems to Windows networks

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Dedication
  5. About the Author
  6. Contents
  7. Acknowledgments
  8. Introduction
  9. Part I Network Basics
    1. Chapter 1 What Is a Network?
      1. Local Area Network
        1. Baseband vs. Broadband
        2. Packet Switching vs. Circuit Switching
        3. Cables and Topologies
        4. Media Access Control
        5. Addressing
      2. Repeaters, Bridges, Switches, and Routers
      3. Wide Area Networks
      4. Protocols and Standards
      5. Clients and Servers
      6. Operating Systems and Applications
    2. Chapter 2 The OSI Reference Model
      1. Communications Between the Layers
        1. Data Encapsulation
        2. Horizontal Communications
        3. Vertical Communications
        4. Encapsulation Terminology
      2. The Physical Layer
        1. Physical Layer Specifications
        2. Physical Layer Signaling
      3. The Data Link Layer
        1. Addressing
        2. Media Access Control
        3. Protocol Indicator
        4. Error Detection
      4. The Network Layer
        1. Routing
        2. Fragmenting
        3. Connection-Oriented and Connectionless Protocols
      5. The Transport Layer
        1. Protocol Service Combinations
        2. Transport Layer Protocol Functions
        3. Segmentation and Reassembly
        4. Flow Control
        5. Error Detection and Recovery
      6. The Session Layer
        1. Dialog Control
        2. Dialog Separation
      7. The Presentation Layer
      8. The Application Layer
  10. Part II Network Hardware
    1. Chapter 3 Network Interface Adapters
      1. NIC Functions
      2. NIC Features
        1. Full Duplex
        2. Bus Mastering
        3. Parallel Tasking
        4. Wake-on-LAN or Wake-on-Wireless-LAN
      3. Selecting a NIC
        1. Protocol
        2. Transmission Speed
        3. Network Interface
        4. Bus Interface
        5. Bottlenecks
        6. ISA or PCI?
        7. Integrated Adapters
        8. Fiber-Optic NICs
        9. Portable Systems
      4. Hardware Resource Requirements
        1. Power Requirements
        2. Server vs. Workstation NICs
    2. Chapter 4 Network Interface Adapters and Connection Devices
      1. Repeaters
      2. Hubs
        1. Passive Hubs
        2. Repeating, Active, and Intelligent Hubs
        3. Token Ring MAUs
      3. Hub Configurations
        1. The Uplink Port
        2. Stackable Hubs
        3. Modular Hubs
      4. Bridges
        1. Transparent Bridging
        2. Bridge Loops
        3. Source Route Bridging
        4. Bridging Ethernet and Token Ring Networks
      5. Routers
        1. Router Applications
        2. Router Functions
        3. Routing Tables
        4. Windows Routing Tables
        5. Routing Table Parsing
        6. Static and Dynamic Routing
        7. Selecting the Most Efficient Route
        8. Discarding Packets
        9. Packet Fragmentation
        10. Routing and ICMP
        11. Routing Protocols
      6. Switches
        1. Switch Types
        2. Routing vs. Switching
        3. Virtual LANs
        4. Layer 3 Switching
        5. Multiple-Layer Switching
    3. Chapter 5 Cabling a Network
      1. Cable Properties
        1. Cabling Standards
        2. Data Link Layer Protocol Standards
      2. Coaxial Cable
        1. Thick Ethernet
        2. Thin Ethernet
        3. Cable Television
      3. Twisted-Pair Cable
        1. Unshielded Twisted-Pair
        2. Category 5e
        3. Cat 6 and 6a
        4. Cat 7
      4. Connector Pinouts
      5. Shielded Twisted-Pair
      6. Fiber-Optic Cable
        1. Fiber-Optic Cable Construction
        2. Fiber-Optic Connectors
    4. Chapter 6 Wireless LANs
      1. Wireless Networks
        1. Advantages and Disadvantages of Wireless Networks
        2. Types of Wireless Networks
        3. Wireless Applications
      2. The IEEE 802.11 Standards
        1. The Physical Layer
        2. Physical Layer Frames
        3. The Data Link Layer
        4. Data Link Layer Frames
        5. Media Access Control
    5. Chapter 7 Wide Area Networks
      1. Introduction to Telecommunications
      2. WAN Utilization
        1. Selecting a WAN Technology
        2. PSTN (POTS) Connections
      3. Leased Lines
        1. Leased-Line Types
        2. Leased-Line Hardware
        3. Leased-Line Applications
      4. ISDN
        1. ISDN Services
        2. ISDN Communications
        3. ISDN Hardware
      5. DSL
      6. Switching Services
        1. Packet-Switching Services
        2. Circuit-Switching Services
      7. Frame Relay
        1. Frame-Relay Hardware
        2. Virtual Circuits
        3. Frame-Relay Messaging
      8. ATM
        1. The Physical Layer
        2. The ATM Layer
        3. The ATM Adaptation Layer
        4. ATM Support
      9. SONET
    6. Chapter 8 Server Technologies
      1. Purchasing a Server
      2. Using Multiple Processors
        1. Parallel Processing
        2. Server Clustering
        3. Using Hierarchical Storage Management
        4. Fibre Channel Networking
        5. Network Storage Subsystems
    7. Chapter 9 Designing a Network
      1. Reasoning the Need
      2. Seeking Approval
      3. Designing a Home or Small-Office Network
        1. Selecting Computers
        2. Selecting a Networking Protocol
        3. Choosing a Network Medium
        4. Choosing a Network Speed
      4. Designing an Internetwork
        1. Segments and Backbones
        2. Distributed and Collapsed Backbones
        3. Backbone Fault Tolerance
        4. Selecting a Backbone LAN Protocol
        5. Connecting to Remote Networks
        6. Selecting a WAN Topology
        7. Planning Internet Access
        8. Locating Equipment
        9. Wiring Closets
        10. Data Centers
      5. Finalizing the Design
  11. Part III Network Protocols
    1. Chapter 10 Ethernet Basics
      1. Ethernet Defined
      2. Ethernet Standards
        1. Ethernet II
        2. IEEE 802.3
        3. DIX Ethernet and IEEE 802.3 Differences
        4. IEEE Shorthand Identifiers
      3. CSMA/CD
        1. Collisions
        2. Late Collisions
      4. Physical Layer Guidelines
        1. 10Base-5 (Thick Ethernet)
        2. 10Base-2 (Thin Ethernet)
        3. 10Base-T or 100Base-T (Twisted-Pair Ethernet)
        4. Fiber-Optic Ethernet
        5. Cabling Guidelines
        6. Exceeding Ethernet Cabling Specifications
      5. The Ethernet Frame
        1. The IEEE 802.3 Frame
        2. The Ethernet II Frame
        3. The Logical Link Control Sublayer
        4. The SNAP Header
      6. Full-Duplex Ethernet
        1. Full-Duplex Requirements
        2. Full-Duplex Flow Control
      7. Full-Duplex Applications
    2. Chapter 11 100Base Ethernet and Gigabit Ethernet
      1. 100Base Ethernet
        1. Physical Layer Options
        2. Cable Length Restrictions
        3. Autonegotiation
      2. Gigabit Ethernet
        1. Gigabit Ethernet Architecture
        2. Media Access Control
        3. The Gigabit Media-Independent Interface
        4. The Physical Layer
      3. Ethernet Troubleshooting
        1. Ethernet Errors
        2. Isolating the Problem
      4. 100VG-AnyLAN
        1. The Logical Link Control Sublayer
        2. The MAC and RMAC Sublayers
        3. The Physical Medium–Independent Sublayer
        4. The Medium-Independent Interface Sublayer
        5. The Physical Medium–Dependent Sublayer
        6. The Medium-Dependent Interface
        7. Working with 100VG-AnyLAN
    3. Chapter 12 Networking Protocols
      1. Token Ring
        1. The Token Ring Physical Layer
        2. Token Passing
        3. Token Ring Frames
        4. Token Ring Errors
      2. FDDI
        1. FDDI Topology
  12. Part IV Network Systems
    1. Chapter 13 TCP/IP
      1. TCP/IP Attributes
      2. TCP/IP Architecture
        1. The TCP/IP Protocol Stack
        2. IP Versions
        3. IPv4 Addressing
        4. Subnet Masking
        5. IP Address Registration
        6. Special IP Addresses
        7. Subnetting
        8. Ports and Sockets
        9. TCP/IP Naming
      3. TCP/IP Protocols
        1. SLIP and PPP
        2. ARP
        3. IP
    2. Chapter 14 Other TCP/IP Protocols
      1. IPv6
        1. IPv6 Addresses
        2. IPv6 Address Structure
      2. Other Protocols
        1. ICMP
        2. UDP
        3. TCP
    3. Chapter 15 The Domain Name System
      1. Host Tables
        1. Host Table Problems
        2. DNS Objectives
      2. Domain Naming
        1. Top-Level Domains
        2. Second-Level Domains
        3. Subdomains
      3. DNS Functions
        1. Resource Records
        2. DNS Name Resolution
        3. Reverse Name Resolution
        4. DNS Name Registration
        5. Zone Transfers
      4. DNS Messaging
        1. The DNS Header Section
        2. The DNS Question Section
        3. DNS Resource Record Sections
        4. DNS Message Notation
        5. Name Resolution Messages
        6. Root Name Server Discovery
        7. Zone Transfer Messages
    4. Chapter 16 Internet Services
      1. Web Servers
        1. Selecting a Web Server
        2. HTML
        3. HTTP
        4. FTP Servers
        5. FTP Commands
        6. FTP Reply Codes
        7. FTP Messaging
      2. E-mail
        1. E-mail Addressing
        2. E-mail Clients and Servers
        3. Simple Mail Transfer Protocol
        4. Post Office Protocol
        5. Internet Message Access Protocol
  13. Part V Network Operating Services
    1. Chapter 17 Windows
      1. The Role of Windows
      2. Versions
        1. Service Packs
        2. Microsoft Technical Support
      3. Operating System Overview
        1. Kernel Mode Components
        2. User Mode Components
        3. Services
      4. The Windows Networking Architecture
        1. The NDIS Interface
        2. The Transport Driver Interface
        3. The Workstation Service
        4. The Server Service
        5. APIs
      5. File Systems
        1. FAT16
        2. FAT32
        3. NTFS
        4. Resilient File System
        5. The Windows Registry
      6. Optional Windows Networking Services
        1. Active Directory
        2. Microsoft DHCP Server
        3. Microsoft DNS Server
        4. Windows Internet Naming Service
    2. Chapter 18 Active Directory
      1. Active Directory Architecture
        1. Object Types
        2. Object Naming
        3. Domains, Trees, and Forests
        4. DNS and Active Directory
        5. Global Catalog Server
      2. Deploying Active Directory
        1. Creating Domain Controllers
        2. Directory Replication
        3. Sites
      3. Microsoft Management Console
      4. Designing an Active Directory
        1. Planning Domains, Trees, and Forests
    3. Chapter 19 Linux
      1. Understanding Linux
        1. Linux Distributions
        2. Advantages and Disadvantages of Linux
        3. File Systems
        4. Linux Installation Questions
        5. Directory Structure
        6. Quick Commands in Linux
      2. Working with Linux Files
        1. Journaling
        2. Editing
        3. Lack of Fragmentation
    4. Chapter 20 Unix
      1. Unix Principles
      2. Unix Architecture
      3. Unix Versions
        1. Unix System V
        2. BSD Unix
      4. Unix Networking
      5. Using Remote Commands
        1. Berkeley Remote Commands
        2. DARPA Commands
      6. Network File System
      7. Client-Server Networking
    5. Chapter 21 Other Network Operating Systems and Networking in the Cloud
      1. Historical Systems
        1. FreeBSD
        2. NetBSD
        3. OpenBSD
        4. Oracle Solaris
      2. Operating in the Cloud
        1. History of the Cloud
        2. Benefits of the Cloud
        3. Disadvantages in the Cloud
        4. How the Cloud Works
        5. Cloud Types
      3. Cloud Service Models
        1. Infrastructure as a Service
        2. Platform as a Service
        3. Software as a Service
        4. Network as a Service
  14. Part VI Network Services
    1. Chapter 22 Network Clients
      1. Windows Network Clients
        1. Windows Networking Architecture
        2. NetWare Clients
      2. Macintosh Clients
        1. Connecting Macintosh Systems to Windows Networks
      3. Unix Clients
        1. Applications
        2. Unix Access
        3. Windows 7 Interface
        4. Windows 8 Interface
    2. Chapter 23 Network Security Basics
      1. Securing the File System
        1. The Windows Security Model
        2. Windows File System Permissions
        3. Unix File System Permissions
      2. Verifying Identities
        1. FTP User Authentication
        2. Kerberos
        3. Public Key Infrastructure
        4. Digital Certificates
        5. Token-Based and Biometric Authentication
      3. Securing Network Communications
        1. IPsec
        2. SSL
      4. Firewalls
        1. Packet Filters
        2. Network Address Translation
        3. Proxy Servers
        4. Circuit-Level Gateways
        5. Combining Firewall Technologies
    3. Chapter 24 Wireless Security
      1. Wireless Functionality
        1. Wireless Network Components
        2. Wireless Router Types
      2. Wireless Transmission
        1. Wireless Access Points
      3. Creating a Secure Wireless Network
        1. Securing a Wireless Home Network
        2. Securing a Business Network
        3. Securing a Wireless Router
        4. Securing Mobile Devices
      4. What Are the Risks?
        1. Unsecured Home Networks
        2. Wireless Invasion Tools
        3. Understanding Encryption
    4. Chapter 25 Overview of Network Administration
      1. Locating Applications and Data in Windows Systems
        1. Server-Based Operating Systems
        2. Server-Based Applications
        3. Storing Data Files
      2. Controlling the Workstation Environment
        1. Drive Mappings in Windows
        2. User Profiles
      3. Controlling the Workstation Registry
        1. Using System Policies
    5. Chapter 26 Network Management and Troubleshooting Tools
      1. Operating System Utilities
        1. Windows Utilities
        2. TCP/IP Utilities
        3. Network Analyzers
        4. Filtering Data
        5. Traffic Analysis
        6. Protocol Analysis
      2. Cable Testers
    6. Chapter 27 Backing Up
      1. Backup Hardware
        1. Backup Capacity Planning
        2. Hard Disk Drives
      2. RAID Systems
        1. Using RAID
        2. Network-Attached Storage
        3. Magnetic Tape Drives
        4. Tape Drive Interfaces
        5. Magnetic Tape Capacities
      3. Backup Software
        1. Selecting Backup Targets
        2. Backing Up Open Files
        3. Recovering from a Disaster
        4. Job Scheduling
        5. Rotating Media
      4. Backup Administration
        1. Event Logging
        2. Performing Restores
  15. Index