Networking Self-Teaching Guide - James Edwards - E-Book

Networking Self-Teaching Guide E-Book

James Edwards

0,0
53,99 €

oder
-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

IT professionals who want to move into the networking side in a corporate or enterprise setting will find the detailed content they need to get up to speed on the very latest networking technologies; plus, current networking professionals will find this a valuable and up-to-date resource. This hands-on guide is designed so that you can select, design, and implement an actual network using the tutorials and steps in the book. Coverage includes an overview of networking technologies, including the hardware, software, transmission media, and data transfer processes; in-depth coverage of OSI and TCP/IP reference models; operating systems and other systems software used in today?s networks; LANs, WANS, and MANs, including the components and standards that operate within each type of area network; and more.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 1330

Veröffentlichungsjahr: 2015

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Contents

Cover

Contents

Title Page

Copyright

Dedication

About the Authors

Credits

Acknowledgments

Introduction

Part I: Networking Nuts and Bolts

Chapter 1: Introduction to Networking

1.1 Networking: A Brief Introduction

1.2 History of Networking

1.3 Standards and Standards Organizations

1.4 An Introduction to the OSI Reference Model

1.5 TCP/IP, Please (and Don’t Be Stingy with the IP)

1.6 Chapter Exercises

1.7 Pop Quiz Answers

Chapter 2: LANs, MANs, and WANs

2.1 Local Area Networks

2.2 Metropolitan Area Networks

2.3 Wide Area Networks

2.4 Chapter Exercises

2.5 Pop Quiz Answers

Chapter 3: Network Hardware and Transmission Media

3.1 Stuff You Just Need to Know

3.2 Transmission Media

3.3 Network Hardware

3.4 Chapter Exercises

3.5 Pop Quiz Answers

Chapter 4: Operating Systems and Networking Software

4.1 Computer Operating System Basics

4.2 Network Operating System Basics

4.3 Other Operating Systems

4.4 Chapter Exercises

4.5 Pop Quiz Answers

Chapter 5: The TCP/IP Protocol Suite

5.1 The TCP/IP Layers

5.2 Popular TCP/IP Protocols

5.3 End of Chapter Hodgepodge

5.4 Chapter Exercises

5.5 Pop Quiz Answers

Chapter 6: Ethernet Concepts

6.1 The Beginning of Ethernet Technology

6.2 Ethernet Components

6.3 Ethernet and IEEE 802.3’s Relationship to the OSI Model

6.4 Ethernet Frame Format

6.5 Traffic Optimization

6.6 Chapter Exercises

6.7 Pop Quiz Answers

Chapter 7: Not to Be Forgotten

7.1 Can’t Get Enough of Those LAN Technologies

7.2 As If You Haven’t Had Enough of These Sweet Protocols

7.3 Chapter Exercises

7.4 Pop Quiz Answers

Part II: The OSI Layers

Chapter 8: The Upper Layers

8.1 Background

8.2 The TCP/IP Model

8.3 OSI Application Layer

8.4 OSI Presentation Layer

8.5 OSI Session Layer

8.6 Chapter Exercises

8.7 Pop Quiz Answers

Chapter 9: The Transport Layer

9.1 The Terms and Conditions of Chapter 9

9.2 Transport Layer Operations

9.3 Transport Layer Protocols

9.4 The Meaning of Control

9.5 Chapter Exercises

9.6 Pop Quiz Answers

Chapter 10: The Network Layer

10.1 Network Connection Types

10.2 TCP/IP Network Layer Protocols

10.3 Chapter Exercises

10.4 Pop Quiz Answers

Chapter 11: The Data Link Layer

11.1 Concerns of the LAN

11.2 Accessing the Medium

11.3 Meet the Sublayers

11.4 The “ings” — Casting, Detecting, and Addressing

11.5 ’’Knode’’ the LAN

11.6 Chapter Exercises

11.7 Pop Quiz Answers

Part III: Network Design and Implementation

Chapter 12: Design Methodologies

12.1 Your Task Is to Design a Network

12.2 Let’s Start Planning

12.3 A Hierarchical Design Model

12.4 5-4-3-2-1, Speed Is Not the Big Concern

12.5 Making Determinations

12.6 Network Implementation

12.7 Chapter Exercises

12.8 Pop Quiz Answers

Chapter 13: Implementation

13.1 Planning

13.2 Network Supporting Infrastructure

13.3 Budgeting

13.4 Staging

13.5 Rollout

13.6 Verification

13.7 Documentation

13.8 The Final Stretch

13.9 Chapter Exercise

13.10 Pop Quiz Answer

Part IV: Managing and Maintaining the Network

Chapter 14: Network Security

14.1 Elements of Network Security

14.2 Network Security Methodologies

14.3 Chapter Exercises

14.4 Pop Quiz Answers

Chapter 15: Network Management

15.1 Operation

15.2 Administration

15.3 Maintenance

15.4 Provisioning

15.5 Tools

15.6 Chapter Exercises

15.7 Pop Quiz Answers

Chapter 16: Troubleshooting

16.1 The Little LAN that Cried Wolf

16.2 The Proactive Approach Beats the Reactive Approach Hands Down

16.3 Troubleshooting Tools

16.4 A Logical Order

16.5 Layered Strategy

16.6 Troubleshooting Examples

16.7 Chapter Exercises

16.8 Pop Quiz Answers

Appendix A Additional Exercises

Appendix B Exercise Answers

Appendix C Glossary

Appendix D Acronyms

Index

Wiley End User License Agreement

List of Tables

Chapter 1: Introduction to Networking

Table 1-1 TCP/IP utilities

Chapter 2: LANs, MANs, and WANs

Table 2-1 DB9 Pin Assignments

Table 2-2 RJ-45 Pin Assignments

Table 2-3 DB15 Pin Assignments

Table 2-4 RJ-45 Pin Assignments

Chapter 3: Network Hardware and Transmission Media

Table 3-1 Decimal Numbers and Their Binary Number Equivalents

Table 3-2 Decimal/Binary Conversions

Table 3-3 Grouping of Bits

Table 3-4 Grouping of Bytes

Table 3-5 ANSI/TIA/EIA-568-B Standard Categories

Table 3-6 T568A Straight-Through Pin-Outs

Table 3-7 T568B Straight-Through Pin-Outs

List of Illustrations

Appendix A Additional Exercises

Figure A-1

Figure A-2

Chapter 1: Introduction to Networking

Figure 1-1 A computer network sharing applications as well as hardware

Figure 1-2 A client/server network relationship

Figure 1-3 A peer-to-peer network relationship

Figure 1-4 A bus topology

Figure 1-5 The dreaded collision

Figure 1-6 A full mesh topology

Figure 1-7 A partial mesh topology

Figure 1-8 A star topology

Figure 1-9 A ring (logical) topology

Figure 1-10 A dual-ring topology

Figure 1-11 A hierarchical topology

Figure 1-12 The OSI reference model

Figure 1-13 Using a mnemonic device as a memory aid

Figure 1-14 A complete, end-to-end network connection

Figure 1-15 The TCP/IP reference model

Chapter 2: LANs, MANs, and WANs

Figure 2-1 The IEEE 802.2 LLC structure

Figure 2-2 The IEEE 802 MAC address format

Figure 2-3 The CSMA/CD MAC structure

Figure 2-4 A simple 10BASE2 network

Figure 2-5 A CSMA/CD network using UTP cabling and a hub

Figure 2-6 The IEEE 802.5 Token Ring frame structure

Figure 2-7 The token-passing sequence

Figure 2-8 A Token Ring network using MAUs

Figure 2-9 The 802.3 frame structure

Figure 2-10 The Ethernet frame

Figure 2-11 A sample LAN’s topological map

Figure 2-12 A simple Token Ring network

Figure 2-13 A typical Token Ring network

Figure 2-14 A typical bus network

Figure 2-15 A star network

Figure 2-16 A logical drawing of tree network topology

Figure 2-17 A tree topology network segment

Figure 2-18 Daisy-chaining for an expanded network segment

Figure 2-19 An FDDI network

Figure 2-20 Anytown’s MAN

Figure 2-21 A POTS WAN connection

Figure 2-22 A point-to-point WAN network

Figure 2-23 A frame relay network

Figure 2-24 A VPN as a WAN

Chapter 3: Network Hardware and Transmission Media

Figure 3-1 Encapsulation

Figure 3-2 PDUs used at each layer in the OSI reference model

Figure 3-3 Layer-by-layer encapsulation

Figure 3-4 IP address network classes

Figure 3-5 UTP cable

Figure 3-6 STP cable

Figure 3-7 An 8P8C plug (RJ45)

Figure 3-8 RJ45 pin numbering

Figure 3-9 An example of coaxial cable

Figure 3-10 Total internal reflection in a fiber optic cable

Figure 3-11 Single-mode signaling

Figure 3-12 Multi-mode signaling

Figure 3-13 End-user hardware types

Figure 3-14 A user trying to interface with a router

Figure 3-15 A router trying to send an email to a user

Figure 3-16 An NIC card

Figure 3-17 Sending data to the pseudo-net

Figure 3-18 Hub deployment

Figure 3-19 An MAU — physical star, logical ring

Figure 3-20 An example of a switch bridging two LAN segments to one another

Figure 3-21 LAN switch deployment

Figure 3-22 An example of a router deployment

Figure 3-23 Deployment of a server load balancer

Figure 3-24 Modem remote access

Figure 3-25 Wireless remote access

Chapter 4: Operating Systems and Networking Software

Figure 4-1 A block diagram of a basic CPU

Figure 4-2 A block diagram of a basic computer

Figure 4-3 A computer network under the control of a network operating system

Figure 4-4 A small, Windows-based peer-to-peer network

Figure 4-5 Windows XP Local Area Connection Properties

Figure 4-6 Windows XP Internet Protocol (TCP/IP) Properties screen

Figure 4-7 A small local network connected to the Internet

Figure 4-8 Windows XP drive properties

Figure 4-9 Windows XP Map Network Drive screen

Figure 4-10 Windows XP Printer Sharing screen

Chapter 5: The TCP/IP Protocol Suite

Figure 5-1 TCP/IP reference model layering

Figure 5-2 TCP/IP layering in action

Figure 5-3 TCP/IP layering in multiple networks

Figure 5-4 DNS namespace hierarchy

Figure 5-5 An example of the hierarchical tree structure for the widgets.co domain

Figure 5-6 An example of SNMP’s five PDUs in action

Figure 5-7 The OID structure for SNMP MIB variables

Figure 5-8 An NVT example

Figure 5-9 An example that proves why TCP is very helpful

Figure 5-10 Hops in a RIP-routed environment

Chapter 6: Ethernet Concepts

Figure 6-1 A DIX/Ethernet II frame

Figure 6-2 Interconnection of DCE and DTE Ethernet devices

Figure 6-3 An RJ-45 modular plug

Figure 6-4 Two PCs interconnected via Ethernet

Figure 6-5 A LAN created with passive hubs

Figure 6-6 A larger LAN implementation

Figure 6-7 OSI’s relationship to IEEE 802.3

Figure 6-8 The basic Ethernet frame format

Figure 6-9 The Gigabit Ethernet frame

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!