Introduction |
|
xix | |
Assessment Test |
|
xxxi | |
|
|
1 | (44) |
|
|
3 | (7) |
|
|
3 | (1) |
|
|
4 | (1) |
|
Host, Workstation, and Server |
|
|
5 | (2) |
|
Peer-to-Peer vs. Client/Server Architecture |
|
|
7 | (3) |
|
|
10 | (6) |
|
|
10 | (1) |
|
|
11 | (2) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
Selecting the Right Topology |
|
|
16 | (1) |
|
|
16 | (15) |
|
|
17 | (3) |
|
|
20 | (5) |
|
|
25 | (5) |
|
|
30 | (1) |
|
Common Network Connectivity Devices |
|
|
31 | (6) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
34 | (3) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
38 | (4) |
|
Answers to Review Questions |
|
|
42 | (3) |
|
|
45 | (54) |
|
Introducing the OSI Model |
|
|
46 | (5) |
|
The OSI Model's Lower Layers |
|
|
51 | (19) |
|
|
51 | (8) |
|
|
59 | (11) |
|
The OSI Model's Middle Layers |
|
|
70 | (10) |
|
|
70 | (7) |
|
|
77 | (3) |
|
The OSI Model's Upper Layers |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
81 | (10) |
|
|
82 | (2) |
|
|
84 | (2) |
|
|
86 | (1) |
|
AppleTalk and AppleTalk over IP |
|
|
87 | (4) |
|
|
91 | (1) |
|
|
91 | (2) |
|
|
93 | (4) |
|
Answers to Review Questions |
|
|
97 | (2) |
|
|
99 | (64) |
|
|
102 | (5) |
|
A Brief History of TCP/IP |
|
|
102 | (1) |
|
|
103 | (2) |
|
|
105 | (2) |
|
The Transmission Control Protocol |
|
|
107 | (2) |
|
The Internet Layer Protocols |
|
|
109 | (5) |
|
|
109 | (3) |
|
Internet Control Message Protocol (ICMP) |
|
|
112 | (1) |
|
Address Resolution Protocol (ARP) and Reverse ARP (RARP) |
|
|
112 | (1) |
|
|
113 | (1) |
|
The Application Protocols |
|
|
114 | (5) |
|
Simple Network Management Protocol (SNMP) |
|
|
115 | (1) |
|
File Transfer Protocol (FTP) |
|
|
115 | (1) |
|
Trivial File Transfer Protocol (TFTP) |
|
|
115 | (1) |
|
Secure File Transfer Protocol (SFTP) |
|
|
115 | (1) |
|
Simple Mail Transfer Protocol (SMTP) |
|
|
116 | (1) |
|
Post Office Protocol (POP) |
|
|
116 | (1) |
|
Internet Message Access Protocol, Version 4 (IMAP4) |
|
|
116 | (1) |
|
Line Printer Daemon (LPD) |
|
|
116 | (1) |
|
Network File System (NFS) |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
117 | (1) |
|
Hypertext Transfer Protocol (HTTP) |
|
|
117 | (1) |
|
Hypertext Transfer Protocol Secure (HTTPS) |
|
|
117 | (1) |
|
Network Time Protocol (NTP) |
|
|
117 | (1) |
|
Network News Transfer Protocol (NNTP) |
|
|
118 | (1) |
|
Secure Copy Protocol (SCP) |
|
|
118 | (1) |
|
Lightweight Directory Access Protocol (LDAP) |
|
|
118 | (1) |
|
Internet Group Management Protocol (IGMP) |
|
|
118 | (1) |
|
Line Printer Remote (LPR) |
|
|
119 | (1) |
|
Other Upper-Layer Protocols |
|
|
119 | (2) |
|
User Datagram Protocol (UDP) |
|
|
119 | (1) |
|
Server Message Block (SMB) |
|
|
120 | (1) |
|
AppleTalk Filing Protocol (AFP) |
|
|
120 | (1) |
|
Internet Connection Sharing (ICS) |
|
|
121 | (1) |
|
Overview of Ports and Sockets |
|
|
121 | (4) |
|
Understanding IP Addressing |
|
|
125 | (11) |
|
Overview of Ethernet Addresses |
|
|
125 | (1) |
|
|
125 | (5) |
|
|
130 | (1) |
|
Subnetting a Class C Network |
|
|
131 | (2) |
|
Classless Inter-Domain Routing (CIDR) |
|
|
133 | (1) |
|
|
134 | (2) |
|
|
136 | (9) |
|
Internet Domain Organization |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
138 | (4) |
|
|
142 | (3) |
|
Configuring TCP/IP on Windows Workstations |
|
|
145 | (8) |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
148 | (2) |
|
|
150 | (1) |
|
|
151 | (1) |
|
Zero Configuration (ZeroConf) |
|
|
151 | (2) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
155 | (2) |
|
|
157 | (4) |
|
Answers to Review Questions |
|
|
161 | (2) |
|
|
163 | (40) |
|
Using the Address Resolution Protocol (ARP) |
|
|
164 | (3) |
|
|
165 | (1) |
|
|
165 | (2) |
|
Using the netstat Utility |
|
|
167 | (7) |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
171 | (2) |
|
|
173 | (1) |
|
|
174 | (1) |
|
Using the nbtstat Utility |
|
|
174 | (6) |
|
|
175 | (2) |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
179 | (1) |
|
|
180 | (1) |
|
Using The File Transfer Protocol (FTP) |
|
|
180 | (5) |
|
Starting FTP and Logging In to an FTP Server |
|
|
181 | (1) |
|
|
182 | (2) |
|
|
184 | (1) |
|
|
185 | (1) |
|
Using winipcfg, ipconfig, and ifconfig |
|
|
186 | (5) |
|
Using the winipcfg Utility |
|
|
186 | (2) |
|
Using the ipconfig Utility |
|
|
188 | (2) |
|
Using the ifconfig Utility |
|
|
190 | (1) |
|
Using the tracert Utility |
|
|
191 | (1) |
|
|
191 | (3) |
|
Using the nslookup Utility |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
195 | (2) |
|
|
197 | (4) |
|
Answers to Review Questions |
|
|
201 | (2) |
|
Network Operating Systems |
|
|
203 | (28) |
|
|
204 | (5) |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
209 | (7) |
|
|
209 | (1) |
|
|
210 | (1) |
|
|
210 | (1) |
|
|
211 | (2) |
|
|
213 | (2) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
216 | (3) |
|
|
216 | (1) |
|
Client Support and Interoperability |
|
|
217 | (1) |
|
|
217 | (1) |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
218 | (1) |
|
|
219 | (4) |
|
|
219 | (2) |
|
|
221 | (1) |
|
|
221 | (1) |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
223 | (2) |
|
|
225 | (4) |
|
Answers to Review Questions |
|
|
229 | (2) |
|
Wired and Wireless Networks |
|
|
231 | (50) |
|
Before Installing New Hardware or Software |
|
|
232 | (12) |
|
Standard Operating Procedures |
|
|
232 | (5) |
|
|
237 | (5) |
|
Error Messages and Log Files |
|
|
242 | (1) |
|
Current Configuration and Baselines |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
244 | (16) |
|
Wireless Network Components |
|
|
244 | (4) |
|
Wireless Network Installation |
|
|
248 | (4) |
|
|
252 | (8) |
|
Workstation Configuration |
|
|
260 | (7) |
|
Configuring a Windows 9x Network |
|
|
260 | (4) |
|
Configuring a Windows 2000 Network Client |
|
|
264 | (1) |
|
Configuring Windows Clients for NetWare Network Access |
|
|
265 | (2) |
|
Network Installation Tools |
|
|
267 | (6) |
|
|
267 | (1) |
|
|
268 | (3) |
|
|
271 | (2) |
|
|
273 | (1) |
|
|
273 | (2) |
|
|
275 | (4) |
|
Answers to Review Questions |
|
|
279 | (2) |
|
WAN and Remote Access Technologies |
|
|
281 | (36) |
|
Remote Access Connection Configuration Requirements |
|
|
283 | (3) |
|
|
284 | (1) |
|
|
285 | (1) |
|
Remote Access Connection Methods |
|
|
286 | (10) |
|
The Public Switched Telephone Network (PSTN) |
|
|
286 | (2) |
|
Integrated Services Digital Network (ISDN) |
|
|
288 | (1) |
|
|
289 | (7) |
|
|
296 | (13) |
|
Serial Line Internet Protocol (SLIP) |
|
|
296 | (1) |
|
Point-to-Point Protocol (PPP) and PPPoE (Point-to-Point Protocol over Ethernet) |
|
|
297 | (5) |
|
Point-to-Point Tunneling Protocol (PPTP) |
|
|
302 | (6) |
|
Windows Remote Access Services (RAS) |
|
|
308 | (1) |
|
Remote Desktop Protocol (RDP) |
|
|
308 | (1) |
|
|
309 | (1) |
|
|
309 | (1) |
|
|
310 | (4) |
|
Answers to Review Questions |
|
|
314 | (3) |
|
Network Access and Security |
|
|
317 | (50) |
|
Accessing Network Resources |
|
|
320 | (4) |
|
|
320 | (1) |
|
Installing the Windows 95/98 and NT/2000 Client |
|
|
320 | (1) |
|
Installing the NetWare Client |
|
|
321 | (2) |
|
Installing the UNIX Client |
|
|
323 | (1) |
|
Selecting a Primary Client |
|
|
324 | (1) |
|
Managing User Account and Password Security |
|
|
324 | (8) |
|
Network Resource-Sharing Security Models |
|
|
325 | (1) |
|
|
325 | (3) |
|
|
328 | (4) |
|
|
332 | (11) |
|
|
332 | (9) |
|
Comparing Firewall Operating System Platforms |
|
|
341 | (2) |
|
Understanding and Defending against Hacker Attacks |
|
|
343 | (4) |
|
Hacker Tools: Common Network Attacks |
|
|
344 | (1) |
|
Intruder Detection: Defense Techniques |
|
|
345 | (2) |
|
|
347 | (3) |
|
|
347 | (1) |
|
Trusted Network Interpretation |
|
|
348 | (1) |
|
Certified Operating Systems and Networks |
|
|
348 | (2) |
|
|
350 | (3) |
|
|
350 | (1) |
|
|
351 | (1) |
|
|
351 | (2) |
|
|
353 | (5) |
|
|
354 | (1) |
|
|
354 | (1) |
|
|
354 | (1) |
|
Other Common Security Policies |
|
|
355 | (2) |
|
|
357 | (1) |
|
|
357 | (1) |
|
|
358 | (1) |
|
|
358 | (2) |
|
|
360 | (4) |
|
Answers to Review Questions |
|
|
364 | (3) |
|
Fault Tolerance and Disaster Recovery |
|
|
367 | (40) |
|
Assessing Fault Tolerance and Disaster Recovery Needs |
|
|
368 | (4) |
|
|
369 | (2) |
|
|
371 | (1) |
|
|
372 | (1) |
|
|
372 | (5) |
|
|
373 | (1) |
|
|
374 | (2) |
|
|
376 | (1) |
|
Disk System Fault Tolerance |
|
|
377 | (5) |
|
|
378 | (1) |
|
|
378 | (2) |
|
|
380 | (1) |
|
Redundant Array of Inexpensive (or Independent) Disks (RAID) |
|
|
380 | (2) |
|
|
382 | (10) |
|
|
383 | (2) |
|
|
385 | (1) |
|
|
386 | (4) |
|
|
390 | (2) |
|
|
392 | (5) |
|
|
393 | (1) |
|
Updating Antivirus Components |
|
|
394 | (1) |
|
|
395 | (2) |
|
|
397 | (2) |
|
|
397 | (1) |
|
|
397 | (1) |
|
|
398 | (1) |
|
|
399 | (1) |
|
|
400 | (1) |
|
|
401 | (4) |
|
Answers to Review Questions |
|
|
405 | (2) |
|
|
407 | (44) |
|
Narrowing Down the Problem |
|
|
409 | (6) |
|
Did You Check the Simple Stuff? |
|
|
409 | (3) |
|
Is Hardware or Software Causing the Problem? |
|
|
412 | (1) |
|
Is It a Workstation or a Server Problem? |
|
|
413 | (1) |
|
Which Segments of the Network Are Affected? |
|
|
414 | (1) |
|
Are There Any Cabling Issues? |
|
|
414 | (1) |
|
|
415 | (6) |
|
Step 1: Establish Symptoms |
|
|
415 | (1) |
|
Step 2: Identify the Affected Area |
|
|
415 | (1) |
|
Step 3: Establish What Has Changed |
|
|
416 | (1) |
|
Step 4: Select the Most Probable Cause |
|
|
417 | (1) |
|
Step 5: Implement a Solution |
|
|
418 | (2) |
|
|
420 | (1) |
|
Step 7: Recognize the Potential Effects of the Solution |
|
|
420 | (1) |
|
Step 8: Document the Solution |
|
|
420 | (1) |
|
The Troubleshooter's Resources |
|
|
421 | (19) |
|
|
421 | (13) |
|
Manufacturers' Troubleshooting Resources |
|
|
434 | (2) |
|
Hardware Network Troubleshooting Tools |
|
|
436 | (3) |
|
Software Troubleshooting Tools |
|
|
439 | (1) |
|
|
440 | (3) |
|
Don't Overlook the Small Stuff |
|
|
440 | (1) |
|
|
440 | (1) |
|
Check the Software Configuration |
|
|
441 | (1) |
|
Don't Overlook Physical Conditions |
|
|
441 | (1) |
|
Don't Overlook Cable Problems |
|
|
442 | (1) |
|
|
442 | (1) |
|
|
443 | (1) |
|
|
443 | (2) |
|
|
445 | (4) |
|
Answers to Review Questions |
|
|
449 | (2) |
Glossary |
|
451 | (40) |
Index |
|
491 | |