Anda di halaman 1dari 19
eac ourse Networking Joe Habraken Matt Hayden THIRD EDITION SAMS 200 £252 96th sreet indianapolis, indians, 46240 USA Sams Teach Yourself Networking in 24 Hours, Third Edition Copyright © 2004 by Sams Publishing Al rights reserved. No part ofthis book shall be reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher No patent liability is assumed with respect tothe use of the information contained herein. Although every precaution has been taken in the preparation ofthis book, the publisher and author assume no responsiblity for errors or omissions. Nor is any liability assumed for {damages resulting from the use ofthe information contained herein, International Standard Book Number: 0-672-32608-6 Library of Congress Catalog Card Number: 2003094095 Printed in the United States of America First Printing: May 2008 07 06 05 of 432 ‘Trademarks All terms mentioned in this book that are known to be trademarks oF service marks have been appropriately capitalized. Sams Publishing fannot attest o the accuracy ofthis information, Use ofa term in this bbook should not be regarded as affecting the validity of any trademark or service mark. Warning and Disclaimer Every effort has been made to make this book as complete and as accu rate as possible, but no warranty of ftness is implied The information provided is on an “as is" basis. The authors and the publisher shall hhave neither lability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained inthis book. Bulk Sales Sams Publishing offers excellent discounts on this book when ordered in {quantity for bulk purchases or special sales. For more information, please contact U.S. Corporate and Government Sales 1-800-382-2419 corpsales@pearsontechgroup.com For sales outside of the US., please contact International Sales 1-317-428-3341 international@pearsontechgroup.com ‘Acquisitions Ealtor Jenry Watson Development Editor Jonathan Steever ‘Managing Etor CChafote Clapp Senior Project Editor George Neder (copy Eaitor honda Tine Mize Indexer Rebecca Salemo Proofreader Lindo Seifert Technical Editor Mare Charney Publishing Coordinator Vanessa Evans Interior Designer (ay Adair cover Designer Alan Clements Page Layout ely Maish Contents at a Glance Introduction rt I: What Exactly Is Networking? HOUR 1 An Overview of Networking 2 The Benefits of Networking Part Il: The Basics HOUR 3 Getting Data from Here to There: How Networking Works 4 Computer Concepts 5 Network Concepts 6 Extending Your LAN: Wide Area Networks 7 Remote Networking Part Ill: Building Networks HOUR 8 Network Criteria 9 Designing a Network 10 Selecting Network Hardware and Software 411. Assembling a Network 12. Network Applications 13 Connecting to the Internet 41 63 81 109 133 1st 163 187 205 219 237 Part IV: Network Operating Systems and Providing Network-Wide Services Hour 14 TCP/IP 415 Microsoft Networking 16 UNIX and Linux Networking 17 Common Network Services and How to Provide Them 255 271 291 309 rt V: Introduction to Network Administration HOUR 18 What Is a Network Administrator? 19 Security 20 Managing an Existing Network 24 Network Troubleshooting Tips and Tricks 22 A Day in the Life of a Network Administrator rt VI The Future of Networking HOUR 23 Wireless Networking 24 Where Are Networks Going from Here? Glossary Index 325 339 387 375 393 405 417 429 449 Table of Contents Introduction art I: What Exactly Is Networking? HOUR 1: An Overview of Networking What Is a Network? Why Build a Network? How Networks Are Put Together The Physical Network ‘Network Devices The Varieties of Networks LANs WANs How the Internet Relates to Your Network What Is the Internet? Understanding Bandwidth Understanding Different Kinds of Internet Connections Why Does the Internet Matter for Your Network? Intranets, Extranets, VPN, and the Internet Summary Q&A HOUR 2: The Benefits of Networking Computing Before Computer Networks ‘Networking's Breakthrough: Packet-Switched Data, Life Without Computer Networks Inefficient Resource Sharing Slo-o-ow Communications 10 10 1s 16 16 7 19 19 2 2 23 23 24 25 27 31 31 32 ‘No Centralized Data Management Expense Benefits of Networking Simplified Resource Sharing Networking Is Faster Centralized Management Summary Q&A Part ‘The Basies HOUR 3: Getting Data from Here to There: How Networking Works Logical Topologies Ethernet Token Ring and FDDI Asynchronous Transfer Mode (ATM) ‘Network Protocols The OSI Model (And Why You Should Be Familiar with It) Tep/P PX ‘NetBIOS and NetBEUI Summary Q&A HOUR 4: Computer Concepts Computer Hardware The CPU ‘Memory Disks Add-In Adapter Cards Operating System Software ‘Multitasking Versus Single-Tasking Systems ‘Mac OS 32 33 33 33 34 35 36 37 a4 42 42 45 47 48 48 82 39 39 60 61 63 63 64 6s 66 6 74 74 76 Contents, Windows Systems UNIX Summary Q&A HOUR 5: Network Concepts ‘What Networks Are Made Of Network-Specific Hardware Software: Server Operating Systems Microsoft Windows Server 2003 Summary Q&A HOUR 6: Extending Your LAN: Wide Area Networks What Is a WAN? WAN Hardware Bridges Gateways: Protocol Translators Routers High-Speed Data Access Trunk Lines: TI and T3 Digital Subscriber Lines (DSL) Service Level Agreements and Quality of Service Agreements, Can the Intemet Help You Build Your WAN? So Who Needs a WAN, Anyway? summary O&A HOUR 7: Remote Networking A Brief History of Remote Access: Remote Control and Remote Node Remote Control Remote Node 76 78 79 80 at 81 81 99 101 107 108 109 110 12 113 113 14 123 124 127 129 130 131 131 132 133 134 134 136 ww | Sams Teach Yourself Networking in 24 Hours Remote Access Requirements 138 ‘Modems 138 Protocols 140 Authentication and Security 142, Using the Intemet for Remote Access 143 Remote Access Hardware: Build or Buy? 14s Building a Remote Access Solution 146 Buying Turnkey Remote Access Solutions 146 Summary 147 Q8A 148 Building Networks HOUR 8: Network Criteria 451. Best Practices and Networking 151 Planning Best Practices: Plan, Design, Implement, and Tune 153 Dealing with Change 154 Applying the Best Practices 155 Interoperability and Standards-Based Networking 157 Security 158 Enunciating Usage Policies and Procedures 159 Defining Secure Behaviors 159 Monitoring 160 Why Monitor? 160 How Do I Monitor? 161 Collating What You've Learned 161 Summary 161 Q8A 162 Contents | ix HOUR 9: Designing a Network 163 Step 1: Identify the Uses of Your Network 164 Defining the Organizational Purpose 164 Quantifying the Network 16 Step 2: List Which Tasks Happen at Which Computers 167 ‘The Many-User Computer 168 Step 3: Selecting the Type of Network: To Centralize or Not to Centralize 169) Peer-to-Peer Networks 170 Server-Based Networks qi File Servers and Security 172, Easier Backup 173 Easier Configuration Management 174 Step 4: Making It Real—Drawing the Network 175 Step 5: Writing the Specification and Getting Others’ Input 182 ‘Writing the Specification Document 183 Meeting with Other Users 184 Step 6: Building the Network 185 Summary 185 Q&A 186 HOUR 40: Selecting Network Hardware and Software 187 Making the Right Choices 187 Selecting a Network Architecture 188 Working with Ethernet 100BASE-T 189 Selecting the Network Type: Client/Server or Peer to Peer igi Client/Server Networking 191 Peer Networking 192 Peer-to-Peer Operating Systems 194 Peer Networking with Microsoft Windows XP 195 x | Sams Teach Yourself Networking in 24 Hours Network Operating Systems Novell NetWare Microsoft Windows Server UNIX and Linux A Word Regarding Network Protocols Summary, QsA HOUR 11: Assembling a Network Before Installation Installing Adapter Cards Working on Wiring: Closets, Cables, and Connections The Wiring Closet: The Network's Home Sweet Home A Word About Wireless Networking Summary, QsA HOUR 12: Network Applications Email Proprietary Mail Systems Open-Standards Email Configuring Email Understanding Multipurpose Internet Mail Extensions Diagnosing Email Problems Dealing with Spam Scheduling and Calendars Networked Contact Management A Sampler of Network-Based Software Novell GroupWise Lotus Notes 198 199 201 201 203 203 204 205 205 209 213 213 217 217 218, 219 221 222 223 223 225 225 226 227 229 230 230 232 Contents Microsoft Exchange/Outlook 233 A Few Others 235 Summary 235 Q&A 236 HOUR 43: Connecting to the Internet 237 The Origins of the Internet 237 Getting Connected to the Internet, 238 ‘Types of Internet Connections 240 Dial-Up Connections 240 DSL. 241 Broadband 242 Using Firewalls, Proxy Servers, and Network Address Translation 243 Firewalls 243 Proxy Servers 244 Understanding Network Address Translation 245 Internet Email 246 ‘The World Wide Web and Other Internet Services 248 Using the Web 248 File Transport Protocol 249 Summary 251 Q&A 282 Part IV: Network Operating Systems and Providing Network-Wide Services HOUR 44: TCP/IP Understanding IP Addressing Getting Your IP Addresses Configuring Network Devices for TCP/IP Static IP Settings on Servers Static IP Settings on Network Clients 255 256 258 259 259 261 xi | Sams Teach Yourself Networking in 24 Hours Understanding the Dynamic Host Configuration Protocol 262 Configuring a Network Client for DHCP 263 Understanding DNS 264 The Domain Namespace 265 How DNS Works 267 Getting a Domain Name 268 Summary, 269 QsA 270 HOUR 15: Microsoft Networking 27a. Microsoft's Logical Network Structure 271 Installing and Configuring a Microsoft Server 274 The Installation Process 275 Configuring a Windows 2003 Server 276 Configuring Windows Clients for Domain Membership 279 Adding Client Computers to the Domain 279 Configuring Network Protocols in Windows 281 Sharing Folders and Printers on the Network 283 Managing a Microsoft Server 286 Summary, 288 QsA 289 HOUR 16: UNIX and Linux Networking 201. How UNIX Got Its Start 291 Basic UNIX Concepts 293 UNIX/LINUX as a Network Platform. 296 Network Services and Settings on a Linux Server 299 Options for Sharing Files 301 Upgrading a Linux Server 305 Summary, 306 QsA 307 HOUR 17: Common Network Services and How to Provide Them Deploying Common Network Services Providing File and Print Services Deploying a File Server Providing Print Services Providing DHCP on the Network Deploying DNS on the Network Summary Q&A HOUR 18: What Is @ Network Administrator? Information Technology Jobs Computer Networking Education and Certification Planning and Installing a Network A Few Thoughts on Budgets Managing Network Projects Summary Q&A HOUR 19: Security Securing the Internal Network User Access Resource Permissions Dealing with Viruses Understanding External Attacks Using IP Security Thoughts on Securing a Network Wardriving and Wireless Networks Summary Q&A, Contents 309 309 312 312 31s 316 318, 321 322 325 326 327 331 332 333 337 338, 339 340 341 345 346 348, 350 351 353 355 356 HOUR 20: Managing an Existing Network 387 Upgrading the Network 387 ‘Managing Hardware Upgrades and Growth 358 ‘Managing Software Upgrades and Growth 360 Dealing with NOS and Client Licensing 361 Backing Up Network Data 363 The Basics of Back Up 363 ‘Types of Backups 365 ‘The Grandfather-Father-Son Scheme 366 Your Network and Disaster Recovery Planning 367 Defining the Computing Infrastructure 368 Assessing Business Impact 369 Assessing Computing Environment Vulnerabilities 369 Developing the Plan 370 Summary 372 Q8A 373 HOUR 21: Network Troubleshooting Tips and Tricks 375 ‘Monitoring Server Hardware 375 Processor Performance 376 Hard Drive Performance and Space 380 ‘Memory Utilization 381 Using Event Logs to Track Problems 382 ‘TCP/IP Connectivity Command-Line Tools 385 Ping 385 FIP 388 Traceroute 388, Nslookup 389 Summary 390 Q8A 391 Contents | HOUR 22: A Day in the Life of a Network Administrator 393 A Day in the Life 394 Daily Tasks 396 Strategies for Supporting Users 399 Establishing Network Policies 400 Summary 401 Q&A 402 rt VI The Future of Networking HOUR 23: Wireless Networking 405 Understanding Wireless Networking 405 Ethernet 802.11 Wireless 406 Bluetooth 409 Using WiFi Technology 409 Implementing a Wireless Network au Wireless Networks and Security 412 Summary 41s Q&A 416 HOUR 24: Where Are Networks Going from Here? aa7 Linux: Lawsuits and Open Source 417 The Internet and Regulation 421 The Advent of IPv6 422 Wireless Technology Gains Ground 426 Summary 427 Glossary 429 Index 449 About the Authors ‘Matt Hayden is a systems engineer for a Silicon Valley technical firm, His primary expertise is operating systems and networking, and his background indudes a stint {5 a technologist for a merchant banking firm. Matt holds a bachelor’s degree in History and a master's degree in English. When he's not networking or traveling, he spends his time playing music, reading, and cycling. Joe Habraken is a best-selling author, information technology professional, and ‘educator. Joe has more than 15 years of experience as a network administrator, con- sultant, and IT professional. He is currently an assistant professor at the University of New England where he teaches a variety of information technology classes, intro- ducing undergraduate students to computer basics, software applications, Web design, and the use of personal computers in business settings. His books include “Microsoft Office 2003 All in One, Practical Cisco Routers, and Sams Teach Yourself “Microsoft Server 2003 in 24 Hours. Dedication To all the computer professionals out there who try to make some sense ‘ut of the chaos that is information technology. Acknowledgments It really does take a team to create a book that covers a subject that seems to change on a daily basis. First of all, I would like to thank Jenny Watson, our acquisitions editor. She worked. hard to get the book through the approval process and assembled the team who ‘worked on this book. She is truly a joy to work with, T would also like to thank Jon Steever, the development editor, who burned the mid- night oil to make sure that this was the best book possible. He also made many use- ful suggestions related to the subject matter included in the book. Another big thanks goes out to our technical editor, Marc Charney, who verified the technical ‘aspects of the text and provided expert advice on the material we covered, would also like to thank Rhonda Tinch-Mize, our copy editor, for diligently clean- ing up the text and making a number of great suggestions; finally, a big thanks to the project editor, George Nedeff, who ran the last leg of the race and made sure that this book got into print (and into your local bookstore). Thank you all very much! We Want to Hear from You! [As the reader of this book, you are our most important ctitic and commentator. We value your opinion and want to know what we're doing right, what we could do bet- tet, what areas you'd like to see us publish in, and any other words of wisdom you're willing to pass our way. You can email or write me directly to let me know what you did or didn’t like about this book—as well as what we can do to make our books stronger. Please note that I cannot help you with technical problems related to the topic of this book, ‘and that due to the high volume of mail I receive, I might not be able to reply to every message. ‘When you write, please be sure to include this book's title and author as well as your name and phone or email address. I will carefully review your comments and share ‘them with the author and editors who worked on the book. Email: networking@samspublishing.com Mail: Mark Taber Associate Publisher Sams Publishing 800 East 96th Street Indianapolis, IN 46240 USA Reader Services For more information about this book or others from Sams Publishing, visit our Web site at www. samspublishing.con. Type the ISBN (excluding hyphens) or the title of the book in the Search box to find the book you're looking for. Introduction There is no doubt that computer technology continues to evolve at a rapid pace. And although the basic client/server model that we embrace for most networking services has remained a constant, computer hardware, software, and connectivity options still continue to change and grow, making the body of knowledge necessary to be a network administrator a constantly moving target. Although it has always been a business necessity for medium and large companies to network their computer services, the options for networking make it possible for even the smallest companies to deploy networks. This means that people with the knowledge of how networks operate and how to deploy networks remain in demand even though recent years have seen a somewhat depressed computer technology job market. This book provides a basic resource for someone who wants to get up to speed on networking theory and networking technologies. Because each piece of computer and networking hardware has its own particular idiosyncrasies and would require a bbook the size of the New York City white pages, this book concentrates on funda- ‘mental concepts and information shared across the different networking hardware and software options. Emphasis is placed on solid planning and the best practices for deploying and administrating networks that remain operational and secure. Conventions Used in This Book Certain conventions have been followed in this book to help you digest all the mate- rial. For example, new terms appear in bold. These terms can also be found in the Glossary, which supplies a short definition for each term, At the beginning of each hour, you'll find a list of the major topics that will be cov- ered. The end of each hour provides a Q&A Workshop, which provides a list of ques- tions that have been posed from what we consider the reader's perspective. The answers will help you better understand the practical applications of the material covered in the hour. You will also find special notes used throughout this book. These notes are accompa- nied by additional information on a subject, supply asides that provide useful Insight and tips, or give warnings that can help you steer clear of problem areas related to a certain subject or technology. These notes are as follows:

Anda mungkin juga menyukai