Introduction |
|
xii | |
|
|
1 | (13) |
|
|
2 | (1) |
|
|
3 | (5) |
|
|
4 | (1) |
|
Metropolitan Area Networks |
|
|
5 | (1) |
|
|
6 | (2) |
|
Laying the Foundation: The Public Telephone System |
|
|
8 | (1) |
|
|
9 | (2) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
11 | (3) |
|
The Future of the Internet |
|
|
11 | (3) |
|
|
14 | (26) |
|
|
16 | (2) |
|
How Data Flows through the OSI Model |
|
|
18 | (1) |
|
Understanding Each OSI Layer |
|
|
19 | (15) |
|
Layer 7: The Application Layer |
|
|
20 | (2) |
|
Layer 6: The Presentation Layer |
|
|
22 | (2) |
|
Layer 5: The Session Layer |
|
|
24 | (2) |
|
Layer 4: The Transport Layer |
|
|
26 | (2) |
|
Layer 3: The Network Layer |
|
|
28 | (2) |
|
Layer 2: The Data Link Layer |
|
|
30 | (2) |
|
Layer 1: The Physical Layer |
|
|
32 | (2) |
|
The OSI Model versus the TCP/IP Model |
|
|
34 | (6) |
|
Application or Process Layer |
|
|
34 | (1) |
|
Host-to-Host or Transport Layer |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
36 | (4) |
|
|
40 | (30) |
|
Understanding Network Architectures |
|
|
42 | (1) |
|
|
43 | (16) |
|
Selecting Peer-to-Peer Networks |
|
|
44 | (1) |
|
Security on Peer-to-Peer Networks |
|
|
45 | (1) |
|
Implementing a Peer-to-Peer Network |
|
|
46 | (2) |
|
Configuring Windows Peer-to-Peer Networking |
|
|
48 | (7) |
|
Configuring Macintosh Peer-to-Peer Networking |
|
|
55 | (4) |
|
|
59 | (8) |
|
|
60 | (1) |
|
|
61 | (1) |
|
Selecting a Client-Server Network |
|
|
62 | (1) |
|
Security on Client-Server Networks |
|
|
62 | (1) |
|
Implementing Client-Server Models |
|
|
63 | (4) |
|
|
67 | (3) |
|
Network Services and Software |
|
|
70 | (26) |
|
Types of Network Services |
|
|
72 | (2) |
|
|
74 | (3) |
|
What to Look for in an NOS |
|
|
74 | (2) |
|
|
76 | (1) |
|
Types of Network Operating Systems |
|
|
77 | (10) |
|
|
77 | (2) |
|
|
79 | (2) |
|
|
81 | (2) |
|
|
83 | (2) |
|
|
85 | (2) |
|
Client Network Configuration |
|
|
87 | (9) |
|
Configuring Windows XP Clients |
|
|
87 | (2) |
|
Configuring Internet Addresses |
|
|
89 | (7) |
|
|
96 | (20) |
|
Physical versus Logical Topologies |
|
|
98 | (1) |
|
Types of Physical Topologies |
|
|
99 | (10) |
|
|
100 | (1) |
|
|
101 | (3) |
|
|
104 | (2) |
|
|
106 | (2) |
|
|
108 | (1) |
|
Types of Logical Topologies |
|
|
109 | (3) |
|
|
109 | (1) |
|
|
110 | (2) |
|
|
112 | (4) |
|
|
116 | (16) |
|
Types of Electrical Currents |
|
|
118 | (5) |
|
|
118 | (3) |
|
|
121 | (2) |
|
Power Problems and Solutions |
|
|
123 | (5) |
|
|
123 | (1) |
|
|
123 | (3) |
|
|
126 | (2) |
|
|
128 | (4) |
|
|
132 | (18) |
|
|
134 | (2) |
|
|
136 | (1) |
|
|
137 | (7) |
|
|
137 | (1) |
|
|
138 | (3) |
|
|
141 | (1) |
|
An Analog and Digital World |
|
|
142 | (2) |
|
Understanding Transmission |
|
|
144 | (6) |
|
|
144 | (1) |
|
|
145 | (5) |
|
|
150 | (30) |
|
Network Media and Connectors |
|
|
152 | (1) |
|
|
153 | (11) |
|
|
153 | (1) |
|
|
154 | (3) |
|
Shielded Twisted-Pair Cable |
|
|
157 | (3) |
|
|
160 | (4) |
|
|
164 | (5) |
|
|
164 | (5) |
|
Wireless Networking Options |
|
|
169 | (6) |
|
|
170 | (2) |
|
|
172 | (2) |
|
|
174 | (1) |
|
|
175 | (5) |
|
|
180 | (24) |
|
|
182 | (1) |
|
|
183 | (2) |
|
|
184 | (1) |
|
|
185 | (3) |
|
|
186 | (2) |
|
|
188 | (1) |
|
|
189 | (2) |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
194 | (2) |
|
|
194 | (2) |
|
|
196 | (1) |
|
|
197 | (2) |
|
How Routers Select the Best Path |
|
|
197 | (2) |
|
|
199 | (1) |
|
Comparing Networking Devices |
|
|
200 | (4) |
|
|
204 | (28) |
|
|
206 | (2) |
|
How Does an Idea Become a Standard? |
|
|
206 | (2) |
|
Major Standards Organizations |
|
|
208 | (5) |
|
ISO: International Organization for Standardization |
|
|
209 | (1) |
|
IEEE: Institute of Electrical and Electronics Engineers |
|
|
210 | (1) |
|
EIA/TIA: Electronics Industry Alliance and Telecommunications Industry Association |
|
|
210 | (1) |
|
ANSI: American National Standards Institute |
|
|
211 | (1) |
|
ITU: International Telecommunications Union |
|
|
212 | (1) |
|
IEEE 802: Standards for Local and Metropolitan Area Networks |
|
|
213 | (7) |
|
LAN and MAN Bridging and Management |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
214 | (2) |
|
Token Passing Bus Access Method |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
Broadband Local Area Networks |
|
|
216 | (1) |
|
Fiber-Optic Local and Metropolitan Area Networks |
|
|
217 | (1) |
|
|
217 | (1) |
|
|
217 | (1) |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
218 | (1) |
|
Wireless Personal Area Network |
|
|
218 | (2) |
|
EIA/TIA Structured Cabling Standards |
|
|
220 | (3) |
|
568-A: Commercial Building Telecommunications Wiring Standard |
|
|
220 | (1) |
|
|
220 | (1) |
|
569: Commercial Building Standard for Telecommunications Pathways and Spaces |
|
|
221 | (1) |
|
606: Administration Standard for the Telecommunications Infrastructure of Commercial Buildings |
|
|
221 | (1) |
|
607: Commercial Building Grounding and Bonding Requirements for Telecommunications |
|
|
222 | (1) |
|
|
223 | (9) |
|
CCITT/ITU-T WAN Standards |
|
|
223 | (3) |
|
|
226 | (6) |
|
|
232 | (24) |
|
Why Protocols Are Important |
|
|
234 | (2) |
|
Understanding Protocol Suites |
|
|
236 | (1) |
|
|
237 | (9) |
|
|
238 | (1) |
|
Protocols of the TCP/IP Stack |
|
|
238 | (8) |
|
|
246 | (3) |
|
|
246 | (1) |
|
Protocols of the IPX/SPX Stack |
|
|
247 | (2) |
|
|
249 | (7) |
|
|
249 | (1) |
|
Protocols of the AppleTalk Stack |
|
|
250 | (6) |
|
|
256 | (24) |
|
|
258 | (2) |
|
|
260 | (7) |
|
|
260 | (4) |
|
Facility Assessment and Documentation |
|
|
264 | (2) |
|
|
266 | (1) |
|
|
267 | (13) |
|
|
267 | (2) |
|
|
269 | (4) |
|
|
273 | (2) |
|
Media Selection and Installation |
|
|
275 | (1) |
|
Testing and Certifying Cable |
|
|
276 | (1) |
|
Connecting the LAN Devices |
|
|
277 | (1) |
|
|
278 | (2) |
|
|
280 | (32) |
|
|
282 | (3) |
|
First Steps in Network Management |
|
|
285 | (8) |
|
|
286 | (4) |
|
|
290 | (1) |
|
|
291 | (2) |
|
|
293 | (6) |
|
Baselining: Setting the Starting Point |
|
|
293 | (1) |
|
Analyzing Network Performance |
|
|
294 | (2) |
|
Monitoring Server Performance |
|
|
296 | (1) |
|
|
296 | (3) |
|
Network Management Systems |
|
|
299 | (6) |
|
The Management Model for TCP/IP Networks |
|
|
299 | (1) |
|
|
300 | (3) |
|
Implementing Network Management Systems |
|
|
303 | (2) |
|
|
305 | (7) |
|
Documentation for Troubleshooting |
|
|
305 | (1) |
|
A Layered Approach to Network Troubleshooting |
|
|
306 | (6) |
|
|
312 | (19) |
|
|
314 | (2) |
|
Connecting to the Internet |
|
|
316 | (2) |
|
|
317 | (1) |
|
|
318 | (13) |
|
Telecommunications Services |
|
|
319 | (1) |
|
|
320 | (6) |
|
|
326 | (1) |
|
|
326 | (5) |
Appendix A Answers to Review Questions |
|
331 | (18) |
|
|
332 | (1) |
|
|
333 | (1) |
|
|
334 | (2) |
|
|
336 | (1) |
|
|
337 | (2) |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
340 | (2) |
|
|
342 | (1) |
|
|
343 | (1) |
|
|
344 | (1) |
|
|
345 | (1) |
|
|
346 | (1) |
|
|
347 | (2) |
Appendix B Acronyms and Abbreviations |
|
349 | (16) |
Appendix C Glossary |
|
365 | (19) |
Index |
|
384 | |