throbber
Computer Networking Essentials
`
`Debra Littlejohn Shinder
`
`t
`
`Cisco SYSTEMS
`o
`Bare
`
`b
`as ®
`saat
`Cisco Press
`
`Cisco Press
`201 West 103rd Street
`Indianapolis, IN 46290 USA
`
`Facebook's Exhibit No. 1017/1117
`_ Page 1
`
`Facebook's Exhibit No. 1017/1117
`Page 1
`
`

`

`Computer Networking Essentials
`Debra Littlejohn Shinder
`Copyright © 2001 Cisco Systems,Inc.
`Cisco Press logo is a trademark of Cisco Systems,Inc.
`Published by:
`Cisco Press
`201 West 103rd Street
`Indianapolis, IN 46290 USA
`All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means,electronic
`or mechanical, including photocopying, recording,or by any information storage and retrieval system, without writ-
`ten permission from the publisher, exceptfor the inclusion ofbrief quotations in a review.
`Printed in the United States of America 1234567890
`Library of Congress Cataloging-in-Publication Number: 2001090429
`ISBN: 1-58713-038-6
`
`Trademark Acknowledgments
`All terms mentioned in this book that are known to be trademarksor service marks have been appropriately capital-
`ized. Cisco Press or Cisco Systems, Inc., cannotattest to the accuracy of this information. Useof a term in this book
`should not be regarded as affecting the validity of any trademark or service mark.
`
`Warning and Disclaimer
`This book is designed to provide information about basic networking and operating system technologies. Every
`effort has been made to make this book as complete and as accurate as possible, but no warranty orfitnessis
`implied.
`The information is provided on an “asis” basis. The author, Cisco Press, and Cisco Systems, Inc., shall have neither
`liability nor responsibility to any person or entity with respect to any loss or damagesarising from the information
`contained in this book or from the useof the discs or programs that may accompanyit.
`The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc.
`
`B
`
`Facebook's Exhibit No. 1017/1117
`Page 2
`
`Facebook's Exhibit No. 1017/1117
`Page 2
`
`

`

`Contents
`
`Part I
`Chapter1
`
`Introduction to Networking Concepts
`Introduction to PC Networking
`5
`5
`A Brief History of PC Networking
`The First Communications Networks
`Disadvantages of Standalone Systems
`What Is a Network, Anyway?
`11
`Why Network Computers?
`11
`Benefits of Getting Connected
`The Birth of the Internet
`13
`The Cost of Technology: More and Morefor Less and Less
`PC Networking Today
`16
`Home Computing
`16
`16
`Web Presence and E-commerce
`High-Performance Business Solutions
`Online Learning
`17
`
`3
`
`6
`10
`
`16
`
`12
`
`15
`
`17
`
`17
`Tomorrow’s Networks
`*Smart” Appliances and Homes
`Phoning Home
`18
`19
`The Wired Workplace
`20
`Schools of the Future
`20
`Networking Health Care
`Technology and the Law 21
`Intergalactic Networking?
`21
`A Brief Overview of Networking Terminology
`Concept-Related Terminology
`22
`Network Hardware-Related Terminology
`Software-Related Terminology
`23
`24
`Design and Topology Terminology
`24
`Measurement-Related Terminology
`What This Book Covers and What It Doesn’t
`
`21
`
`22
`
`25
`
`26
`Networking Certifications
`26
`Vendor-Specific Certifications
`Non-Vendor-Specific Certifications
`This Book and Certification
`27
`
`26
`
`Facebook's Exhibit No. 1017/1117
`Page 3
`
`Facebook's Exhibit No. 1017/1117
`Page 3
`
`

`

`Summary
`
`27
`
`Further Reading
`
`28
`
`Review Questions
`
`28
`
`Chapter2
`
`Categorizing Networks 33
`
`Categorizing Networks by Physical Scope
`Characteristics of aLAN 34
`Characteristics of a MAN 35
`Characteristics of a WAN 37
`
`33
`
`Categorizing Networks by Administrative Method
`Servers and Clients
`39
`Characteristics of Peer-to-Peer Networks
`Characteristics of Server-Based Networks
`
`44
`47
`
`38
`
`49
`
`Categorizing Networks by NOS
`Windows Networks
`50
`NetWare Networks
`50
`UNIX Networks
`50
`Hybrid Networks
`51
`
`Categorizing Networks by Protocol
`NetBEUI Networks
`52
`IPX/SPX Networks
`52
`TCP/IP Networks
`53
`Other LAN Protocols Used in Networks
`
`52
`
`53
`
`54
`
`Categorizing Networks by Topology
`Linear Bus Networks
`55
`Ring Networks
`56
`Star Bus Networks
`Mesh Networks
`59
`Hybrid Topologies
`
`60
`
`57
`
`Categorizing Networks by Architecture
`Ethernet Networks
`62
`Token Ring Networks
`AppleTalk Networks
`ARCnet Networks
`
`67
`68
`
`68
`
`61
`
`Ea
`
`Summary
`
`70
`
`Further Reading
`
`70
`
`Review Questions
`
`71
`
`Facebook's Exhibit No. 1017/1117
`Page 4
`
`Facebook's Exhibit No. 1017/1117
`Page 4
`
`

`

`Chapter 3
`
`Networking Concepts, Models, and Standards
`
`75
`
`Computer Communication Concepts
`The Language of the Machine
`76
`Common Numbering Systems
`76
`Using Packets
`80
`A Layered Communication Process
`
`75
`
`82
`
`84
`Networking Models
`The Purpose of Models
`The OSI Model
`85
`The DoD Model
`97
`Vendor-Specific Models
`
`84 -
`
`99
`
`Networking Standards and Specifications
`WhyStandardize?
`100
`Standards-Setting Bodies
`
`100
`
`99
`
`Summary
`
`104
`
`Further Reading
`
`104
`
`Chapter4
`
`Review Questions
`105
`Networking Communications Methods
`
`109
`
`109
`
`112
`
`Signaling Methods and Characteristics
`Analog and Digital
`109
`Baseband and Broadband
`Multiplexing
`113
`115
`Asynchronous and Synchronous Transmission
`Simplex, Half-Duplex, and Full-Duplex Transmission
`Signaling and Communications Problems
`118
`Electromagnetic Interference
`119
`Radio FrequencyInterference
`119
`Crosstalk
`119
`Attenuation
`120
`Bandwidth Capacity Issues
`
`116
`
`121
`
`121
`
`Media Access Methods
`CSMA/CD 122
`CSMA/CA 123
`123
`Token Passing
`DemandPriority 125
`
`Summary
`
`126
`
`Further Reading
`
`126
`
`Review Questions
`
`127
`
`Facebook's Exhibit No. 1017/1117
`Page 5
`
`Facebook's Exhibit No. 1017/1117
`Page 5
`
`

`

`xii
`
`Chapter 5
`
`LAN Links
`
`131
`
`132
`Ethernet
`132
`10Base2
`134
`10Base5
`10BaseT 136
`100BaseX 137
`1000BaseT 137
`The Structure of an Ethernet Frame
`Rules of Ethernet Engagement
`139
`Summary of Ethernet Characteristics
`
`138
`
`142
`
`142
`Token Ring
`143
`Token Ring Topology
`The Token Ring Communication Process
`Token Ring Hardware Components
`144
`Advantages of Token Ring
`145
`Disadvantages of Token Ring
`145
`The Structure of the Token Ring Frame
`Rules of the Ring
`147
`Summary of Token Ring Characteristics
`
`143
`
`146
`
`147
`
`147
`FDDI
`147
`How FDDI Works
`148
`FDDI Specifications
`149
`Advantages of FDDI
`149
`Disadvantages of FDDI
`The FDDI FrameStructure
`149
`Summary of FDDI Characteristics
`
`149
`
`150
`AppleTalk
`150
`AppleTalk Specifications
`150
`How AppleTalk Works
`151
`Advantages of AppleTalk
`151
`Disadvantages of AppleTalk
`151
`LocalTalk Data Transmission
`Summary of AppleTalk Characteristics
`
`151
`
`151
`ARCnet
`151
`How ARCnet Works
`152
`ARCnet Specifications
`153
`Advantages of ARCnet
`Disadvantages of ARCnet
`153
`153
`The ARCnet Packet Structure
`Summary of ARCnet Characteristics
`
`153
`
`—
`
`Facebook's Exhibit No. 1017/1117
`Page 6
`
`Facebook's Exhibit No. 1017/1117
`Page 6
`
`

`

`xiii
`
`Comparing Networking Architectures
`
`154
`
`Summary
`
`154
`
`Further Reading
`
`155
`
`Review Questions
`
`155
`
`Chapter 6
`
`WANLinks
`
`159
`
`160
`
`WANHardware
`Modems
`160
`165
`ISDN and DSL Adapters
`Customer Premises Equipment
`WANTopologies
`166
`The Point-to-Point WAN 166
`The WAN Ring
`167
`The WANStar
`168
`Multitiered WANs
`
`169
`
`165
`
`170
`Network Switching Types
`Circuit-Switching Networks
`Packet-Switching Networks
`
`170
`176
`
`178
`
`Emerging WAN Technologies
`OC-SONET 179°
`Broadband ISDN 179
`CATV 179
`SMDS
`181
`Wireless WAN 181
`
`LAN/WANConnectivity 182
`Translated Connections
`182
`Proxy Servers
`185
`Routed Connections
`
`186
`
`Summary
`
`187
`
`Further Reading
`
`188
`
`Review Questions
`
`188
`
`Part Il
`Chapter 7
`
`Networking Hardware and Software
`Physical Components of the Network
`
`193
`195
`
`.
`
`;
`
`195
`NICs
`The Role of the NIC in Network Communications
`195
`Selecti
`NIC 196
`erecting
`Facebook's Exhibit No. 1017/1117
`Page 7
`
`
`
`Facebook's Exhibit No. 1017/1117
`Page 7
`
`

`

`xiv
`
`Configuring and Using a NIC 197
`
`200
`Network Media
`200
`Cable Types
`Wireless Media
`207
`
`Network Connectivity Devices
`Simple Connectors
`211
`Complex Connectors
`213
`Segmenting and Subnetting Devices
`
`210
`
`214
`
`Summary
`
`222
`
`Further Reading
`
`222
`
`Review Questions
`
`222
`
`Chapter 8
`
`Networking Protocols and Services
`
`227
`
`227
`
`NetBIOS/NetBEUI
`IPX/SPX 229
`The Network Layer Protocol: IPX 229
`The Transport Layer Protocol: SPX 230
`
`TCP/IP 23]
`The TCP/IP Suite
`231
`The Network Layer Protocol: IP 231
`The Transport Layer Protocols: TCP and UDP 245
`Addressing the Envelope: Packet Headers
`248
`Name Resolution
`249
`TCP/IP Utilities
`254
`Application Layer Protocols
`
`261
`
`Summary
`
`262
`
`Further Reading
`
`262
`
`Review Questions
`
`263
`
`Chapter 9
`
`The Widest Area Network: The Global Internet 267 .
`
`267
`The Evolution of the Internet
`The Development of the Backbone
`The Internet2 Project
`269
`
`268
`
`269
`The Components of the Internet
`The Local Computer or LAN 270
`The ISP 270
`The Regional Network
`NAPs
`271
`
`270
`
`Facebook's Exhibit No. 1017/1117
`Page 8
`
`Facebook's Exhibit No. 1017/1117
`Page 8
`
`

`

`XV
`
`272
`
`271
`MAEs
`How Internet Components Work Together
`Whatthe Internet Does
`273
`The World Wide Web.
`274
`E-mail and Mailing Lists
`283
`Newsgroups
`287
`File Transfer
`289
`Telnet
`290
`Streaming Media
`Live Chat
`291
`Audio/Videoconferencing
`Internet Telephony
`292
`Virtual Private Networking
`
`292
`
`293
`
`291
`
`293
`
`TCP/IP Routing and the Internet
`How IP Routing Works
`294
`An Example of a Simple Routed Network
`Types of Routing Interfaces 296
`296
`Static Versus Dynamic Routing
`Distance-Vector Versus Link-State Protocols
`Common Routing Protocols
`299
`
`294
`
`301
`
`Who Ownsthe Internet?
`ISOC 302
`IAB 302
`IETF 302
`IESG 302
`IANA/JICANN 302
`W3C 302
`
`Summary
`
`303
`
`Further Reading
`
`303
`
`Chapter10
`
`Review Questions
`304
`307
`— Network Operating Systems
`General Network Administration
`307
`The Client/Server Environment
`309
`Sharing Network Resources
`311
`
`298
`
`320
`
`‘
`
`.
`320
`Overview of NOSs
`Windows NT and Windows 2000 Networks
`NetWare Networks
`326
`UNIX and Linux Networks
`Other NOSs
`334
`me

`
`329
`
`Facebook's Exhibit No. 1017/1117
`Page 9
`
`
`
`Facebook's Exhibit No. 1017/1117
`Page 9
`
`

`

`xvi
`
`Summary
`
`335
`
`Further Reading
`
`336
`
`Review Questions
`
`336
`
`Chapter 11
`
`Directory Services
`
`341
`
`WhatAre Directories and Directory Services?
`What Is a Directory?
`341
`What Are Directory Services?
`
`343
`
`34]
`
`Directory Services Standards
`X.500
`346
`DAP and LDAP 347
`
`346
`
`Directory-Enabled Networking
`
`349
`
`Popular Directory Services
`Novell NDS
`349
`Microsoft Active Directory
`Other Directory Services
`
`349
`
`350
`354
`
`Summary
`
`356
`
`Further Reading
`
`357
`
`Review Questions
`
`357
`
`Chapter 12
`
`Desktop Operating Systems
`
`361
`
`361
`Operating System Basics
`Operating System Interfaces
`Using Commands
`364
`Files and File Systems
`
`367
`
`362
`
`Common Desktop Operating Systems
`MS-DOSand Windows 3.x
`379
`Windows 9x
`381
`Windows NT Workstation
`Windows 2000 Professional
`Linux/UNIX 396
`Macintosh
`401
`OS/2
`403
`
`388
`392
`
`379
`
`Summary
`
`404
`
`Further Reading
`
`404
`
`Review Questions
`
`405
`
`Facebook's Exhibit No. 1017/1117
`Page 10arrene
`
`Facebook's Exhibit No. 1017/1117
`Page 10
`
`

`

`Chapter 13
`
`Hybrid Networks 409
`
`xvii
`
`409
`Characteristics of the Hybrid Network
`Inability of a Single Vendor to Provide All Desired Features
`Personal Preferences of Users
`410
`Budgetary Factors
`410
`Haphazard Growth
`411
`
`410
`
`411
`Multiple-Protocol Networks
`Network/Transport Protocols
`411
`File-Sharing Protocols
`415
`
`415
`Multiple-Operating-System Networks
`415
`Multiple Server Operating Systems
`417
`Multiple Client Operating Systems
`Multiple Server and Multiple Client Operating Systems
`Multiple-Platform Networks
`417
`418
`PC-to-Macintosh Communications
`418
`PC-to-Mainframe Communications
`PDA-to-PC and Handheld-to-PC Communications
`
`419
`
`417
`
`Gateway: The Hybrid Connectivity Solution
`Windows-to-NetWare Redirectors
`420
`Cross-Platform Solutions-420
`SNA 421
`Samba
`422
`
`419
`
`Summary
`
`424
`
`Further Reading
`
`425
`
`Review Questions
`
`425
`
`Part Ill
`Chapter 14
`
`Network Specialty Areas 429
`Protecting the Network
`431
`
`431
`Network Security
`432
`Assessing Security Needs
`434
`Assessing Security Threats
`441
`Implementing Security Measures
`448
`How Security Components Work
`AdvancedIdentification and Authentication Technologies
`Developing Security Policies 457
`
`454
`
`Disaster Protection and Recovery
`Power Backup
`465
`Data Backup
`466
`
`465
`
`Facebook's Exhibit No. 1017/1117
`Page 11
`
`Facebook's Exhibit No. 1017/1117
`Page 11
`
`

`

`xviii
`
`
`
`
`469
`Disk Fault Tolerance
`Clustering Technologies
`471
`
`Summary
`
`47]
`
`Further Reading
`
`472
`
`Review Questions
`
`473
`
`Chapter 15
`
`Remote Access 477
`
`478
`
`Why Remote Access?
`Branch Offices
`478
`After-Hours Connectivity
`Telecommuting
`479
`Mobile Users
`480
`Providing Accessto Clients and Partners
`
`478
`
`480
`
`481
`How Remote Access Works
`Protocols Used for Remote Access
`Remote Access Authentication
`482
`Assignment of IP Addresses
`483
`Aggregation of Bandwidth on Dialup Connections
`Control of Bandwidth Usage
`484
`Remote Access Connectivity Devices
`Modems
`484
`ISDN Terminal Adapters
`Cable Modems
`493
`CSU/DSUs
`494
`
`482
`
`484
`
`483
`
`492
`
`495
`
`Configuring Remote Access Clients and Servers
`Configuring a Remote Access Client
`495
`Configuring a Remote Access Server 496
`Remote Access Security Issues
`496
`Callback Security
`497
`RADIUS 498
`Remote Access Policies
`Account Lockout
`499
`Security Hosts
`499
`
`498
`
`Summary
`
`499
`
`Further Reading
`
`500
`
`Review Questions
`
`501
`
`Facebook's Exhibit No. 1017/1117
`Page 12
`
`Facebook's Exhibit No. 1017/1117
`Page 12
`
`

`

`Chapter 16
`
`Virtual Private Networking
`
`505
`
`505
`What Isa VPN?
`Virtual Networking
`Private Networking
`
`505
`506
`
`506
`How VPNs Work
`Digging the Tunnel
`507
`Operating System Support for VPNs
`
`509
`
`Why UseVirtual Private Networking?
`510
`VPNVersus Dialup Networking: Advantages and Disadvantages
`
`VPN Scenarios
`
`512
`
`xix
`
`510
`
`516
`VPN Protocols
`Tunneling Protocols
`Encryption Protocols
`LANProtocols
`520
`
`516
`519
`
`520
`VPN Security
`Authentication
`521
`Authorization
`52]
`Encryption
`521
`
`VPN Performance Issues . 521
`
`522
`Types of VPNs
`Software-Based VPNs
`Hardware-Based VPNs
`
`522
`522
`
`Configuring a VPN Connection
`Summary
`525
`
`522
`.
`
`Further Reading
`
`526
`
`Chapter 17
`
`526
`Review Questions
`531
`Thin Client Networking
`The Evolution of Thin Client Networking . 532
`Thin Client Technology
`533
`Advantages of Thin Client Technology
`Thin Client Protocols
`535
`RDP 536
`ICA 536
`X and X Display Manager Communication Protocol (XDMCP)
`RFB 537
`BOOTP, DHCP, and TFTP_
`
`534
`
`536
`
`fBbebook's Exhibit No. 1017/1117
`Page 13
`
`Facebook's Exhibit No. 1017/1117
`Page 13
`
`

`

`XX
`
`
`
`538
`
`Thin Client Hardware
`WBTs
`539
`Network Computers
`Net PCs
`540
`540
`Desktop Computers
`The Thinnest Clients: Handheld PCs
`
`539
`
`540
`
`541
`Thin Client Software
`Microsoft Terminal Services
`Citrix Winframe/MetaFrame
`The X Window System 543
`Web-Based Computing
`544
`The JVM 544
`
`541
`542
`
`ASPs
`
`545
`
`MicrosoftNET 545
`
`Summary
`
`546
`
`546
`Further Reading
`Review Questions 547
`
`Chapter 18
`
`Monitoring, Management, and Troubleshooting Tools
`Analyzing and Optimizing Network Performance
`551
`Bottlenecks
`552
`Baselines
`553
`554
`Best Practices
`Determining Internet Connection Speed
`
`554
`
`551
`
`Network Monitoring and Management Tools
`Networking Monitoring Software
`556
`Network Management Software
`562
`Management Software for Small and Medium-Sized Networks
`Management Service Providers 568
`
`556
`
`567
`
`Hardware Monitoring and Troubleshooting Devices
`
`568
`
`Troubleshooting Network Problems
`Troubleshooting Basics
`569
`Using Operating System Log Files
`Using TCP/IP Utilities
`573
`Problem-Solving Guidelines
`
`579
`
`569
`
`571
`
`Summary
`
`580
`
`Further Reading
`Review Questions
`
`581
`581
`
`Facebook's Exhibit No. 1017/1117
`Page 14
`
`Facebook's Exhibit No. 1017/1117
`Page 14
`
`

`

`xxi
`
`
`Part IV
`Chapter 19
`
`The Future of Networking 585
`Tomorrow’s Technologies 587
`
`587
`Ubiquitous Computing
`588
`Bringing Networking Home
`Overcoming the Limits of IP 589
`New Directions in Networking Technologies
`Universal Connectivity
`592
`*Smart” Everything
`593
`Networking the Family
`594
`That’s Entertainment
`594
`Privacy Issues: Big Brother Is Watching
`Networking at Work
`595
`The Impact of Networking Technologies on Government
`The Impact of Networking Technologies on Law 598
`The Impact of Networking Technologies on Medicine
`The Impact of Networking Technologies on Publishing
`New Waysof Learning
`601
`
`590
`
`594
`
`596
`
`599
`600
`
`602
`Artificial Intelligence
`Computers That Think
`602
`Cybernetic Life-Forms: The Ultimate Network
`
`603
`
`Summary
`
`603
`
`Further Reading
`
`604
`
`Parting Questions
`604
`Chapter Review Answer Key 607
`
`Appendix A
`Glossary 635
`
`Index 695
`
`Facebook's Exhibit No. 1017/1117
`Page 15
`
`Facebook's Exhibit No. 1017/1117
`Page 15
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket