throbber

`
`Computer Networking Essentials
`
`Debra Littlejohn Suhinder
`
`Elm Stmus
`
`
`'
`t3
`CISCO PRESS
`
`Cisco Press
`201 West 103rd Street
`
`lndianapolis, [N 46290 USA
`
`001
`
`US. Patent No. 8,724,622
`
`Apple Inc.
`APLl 1 17
`
`001
`
`Apple Inc.
`APL1117
`U.S. Patent No. 8,724,622
`
`

`

`Computer Networking Essentials
`Debra Littlejohn Shinder
`
`Copyright © 2001 Cisco Systems, Inc.
`
`Cisco Press logo is a trademark of Cisco Systems, Inc.
`Published by:
`Cisco Press
`201 West 103rd Street
`
`Indianapolis, IN 46290 USA
`All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic
`or mechanical, including photocopying, recording, or by any information storage and retrieval system, without writ-
`ten permission from the publisher, except for the inclusion of brief quotations in a review.
`Printed in the United States of America 1 2 3 4 S 6 7 8 9 0
`
`Library of Congress Cataloging—in—Publication Number: 2001090429
`ISBN: 1-58713—038—6
`
`Trademark Acknowledgments
`All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capital—
`
`ized. Cisco Press or Cisco Systems, Inc., cannot attest to the accuracy of this information. Use of a term in this book
`should not be regarded as affecting the validity of any trademark or service mark.
`
`Warning and Disclaimer
`This book is designed to provide information about basic networking and operating system technologies. Every
`effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is
`implied.
`
`The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc., shall have neither
`liability nor responsibility to any person or entity with respect to any loss or damages arising from the information
`contained in this book or from the use of the discs or programs that may accompany it.
`
`The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc.
`
`
`
`002
`
`002
`
`

`

`
`
`Contents
`
`Part I
`Chapter 1
`
`Introduction to Networking Concepts
`Introduction to PC Networking
`5
`
`3
`
`5
`A Brief History of PC Networking
`The First Communications Networks
`Disadvantages of Standalone Systems
`What Is a Network, Anyway?
`11
`Why Network Computers?
`1 1
`Benefits of Getting Connected
`The Birth of the Internet
`13
`The Cost of Technology: More and More for Less and Less
`
`6
`10
`
`12
`
`15
`
`16
`
`PC Networking Today
`16
`Home Computing
`16
`Web Presence and E-commerce
`High-Performance Business Solutions
`Online Learning
`17
`
`16
`
`17
`
`Tomorrow‘s Networks
`
`17
`
`“Smart” Appliances and Homes
`Phoning Home
`18
`19
`The Wired Workplace
`20
`Schools of the Future
`20
`Networking Health Care
`Technology and the Law 21
`Intergalactic Networking?
`21
`
`A Brief Overview of Networking Terminology
`Concept—Related Terminology
`22
`Network Hardware-Related Terminology
`Software-Related Terminology
`23
`Design and Topology Terminology
`MeasurementwRelated Terminology
`
`24
`24
`
`22
`
`21
`
`What This Book Covers and What It Doesn’t
`
`25
`
`26
`Networking Certifications
`26
`Vendor-Specific Certifications
`Non-Vendor—Specific Certifications
`This Book and Certification
`27
`
`26
`
`003
`
`003
`
`

`

`
`
`Summary
`
`27
`
`Further Reading
`
`28
`
`Review Questions
`
`28
`
`Chapterz
`
`Categorizing Networks
`
`33
`
`Categorizing Networks by Physical Scope
`Characteristics of a LAN 34
`Characteristics of a MAN 35
`Characteristics of a WAN 37
`
`33
`
`Categorizing Networks by Administrative Method
`Servers and Clients
`39
`Characteristics of Peer-to-Peer Networks
`Characteristics of Server-Based Networks
`
`44
`4'?
`
`38
`
`Categorizing Networks by NOS 49
`Windows Networks
`50
`NetWare Networks
`50
`UNIX Networks
`50
`
`Hybrid Networks
`
`51
`
`Categorizng Networks by Protocol
`NetBEUI Networks
`52
`IPXJSPX Networks
`52
`TCPHP Networks
`53
`Other LAN Protocols Used in Networks
`
`52
`
`53
`
`Categorizing Networks by Topology
`Linear Bus Networks
`55
`
`54
`
`56
`Ring Networks
`Star Bus Networks
`Mesh Networks
`59
`
`57
`
`Hybrid Topologies
`
`60
`
`Categorizing Networks by Architecture
`Ethernet Networks
`62
`
`61
`
`Token Ring Networks
`AppleTaIk Networks
`ARCnet Networks
`
`68
`
`6'?
`68
`
`Summary
`
`70
`
`Further Reading
`
`70
`
`Review Questions
`
`71
`
`004
`
`004
`
`

`

`
`
`Chapter 3
`
`Networking Concepts, Models, and Standards
`
`75
`
`Computer Communication Concepts
`The Language of the Machine
`76
`Common Numbering Systems
`76
`Using Packets
`80
`A Layered Communication Process
`
`75
`
`82
`
`84
`Networking Models
`The Purpose of Models
`The 031 Model
`85
`The DoD Model
`97
`
`84 '
`
`Vendor-Specific Models
`
`99
`
`Networking Standards and Specifications
`Why Standardize?
`100
`Standards—Setting Bodies
`
`100
`
`99
`
`Summary
`
`104
`
`Further Reading
`
`104
`
`Review Questions
`
`105
`
`Chapter 4
`
`Networking Communications Methods
`
`109
`
`Signaling Methods and Characteristics
`Analog and Digital
`109
`Baseband and Broadband
`
`112
`
`109
`
`113
`Multiplexing
`11'5
`Asynchronous and Synchronous Transmission
`Simplex, Half-Duplex, and Full—Duplex Transmission
`
`116
`
`Signaling and Communications Problems
`Electromagnetic Interference
`119
`Radio Frequency Interference
`119
`Crosstalk
`1 19
`Attenuation
`120
`
`118
`
`Bandwidth Capacity Issues
`
`121
`
`Media Access Methods
`CSMAJ'CD 122
`CSMAICA 123
`
`121
`
`Token Passing
`Demand Priority
`
`123
`125
`
`Summary
`
`126
`
`Further Reading
`
`126
`
`Review Questions
`
`127
`
`005
`
`005
`
`

`

`xii
`
`Chapter 5
`
`LAN Links
`
`131
`
`132
`Ethernet
`lOBaseZ 132
`lOBaseS
`134
`IOBaseT 136
`IOOBaseX 137
`IOOOBaseT
`137
`The Structure of an Ethernet Frame
`
`138
`
`139
`Rules of Ethernet Engagement
`Summary of Ethernet Characteristics
`
`142
`
`142
`Token Ring
`143
`Token Ring Topology
`The Token Ring Communication Process
`Token Ring Hardware Components
`144
`Advantages of Token Ring
`14S
`Disadvantages of Token Ring
`145
`The Structure of the Token Ring Frame
`Rules of the Ring
`147‘r
`Summary of Token Ring Characteristics
`
`143
`
`146
`
`14?
`
`14'?
`FDDI
`How FDDI Works
`
`147
`
`148
`FDDI Specifications
`149
`Advantages of FDDI
`149
`Disadvantages of FDDI
`The FDDI Frame Structure
`
`149
`
`Summary of FDDI Characteristics
`
`149
`
`150
`AppleTalk
`150
`AppleTalk Specifications
`150
`How AppIeTalk Works
`151
`Advantages of AppleTalk
`Disadvantages of AppleTalk
`151
`LocalTalk Data Transmission
`15]
`
`Summary of AppleTalk Characteristics
`
`151
`
`151
`ARCnet
`How ARCnet Works
`
`151
`
`152
`ARCnet Specifications
`153
`Advantages of ARCnet
`153
`Disadvantages of ARCnet
`The ARCnet Packet Structure
`
`153
`
`Summary of ARCnet Characteristics
`
`153
`
`006
`
`006
`
`

`

`
`
`xiii
`
`Comparing Networking Architectures
`
`154
`
`Summary
`
`154
`
`Further Reading
`
`155
`
`Review Questions
`
`155
`
`Chapter 6
`
`WAN Links
`
`159
`
`WAN Hardware
`Modems
`160
`
`160
`
`165
`ISDN and DSL Adapters
`Customer Premises Equipment
`
`165
`
`166
`WAN Topologies
`The Point—to-Point WAN 166
`
`16?
`The WAN Ring
`168
`The WAN Star
`Multitiered WANs
`
`169
`
`170
`Network Switching Types
`Circuit-Switching Networks NO
`Packet-Switching Networks
`176
`
`Emerging WAN Technologies US
`0C~SONET 179 _
`Broadband ISDN 179
`CATV 179
`SMDS
`181
`Wireless WAN 181
`
`LAN/WAN Connectivity
`Translated Connections
`Proxy Servers
`185
`Routed Connections
`
`186
`
`182
`182
`
`Summary
`
`18'!
`
`FurtherReading
`
`188
`
`Review Questions
`
`188
`
`Part II
`Chapter 7
`
`Networking Hardware and Software
`Physical Components of the Network
`NICs
`195
`
`_
`
`193
`195
`
`_
`
`;
`
`The Role of the N[C in Network Communications
`Selecting a NIC 196
`
`195
`
`007
`
`
`
`007
`
`

`

`xiv
`
`Configuring and Using a NIC 197
`
`Network Media
`
`200
`
`200
`Cable Types
`Wireless Media
`207
`
`Network Connectivity Devices
`Simple Connectors
`211
`Complex Connectors
`213
`Segmenting and Subnetting Devices
`
`210
`
`214
`
`Summary
`
`222
`
`Further Reading
`
`222
`
`Review Questions
`
`222
`
`Chapter 8
`
`Networking Protocols and Services
`
`227
`
`NetBIOSr’NetBEUI
`IPXI'SPX 229
`
`227
`
`The Network Layer Protocol: IPX 229
`The Transport Layer Protocol: SPX 230
`
`TCPHP 231
`The TCPIIF' Suite
`
`231
`
`The Network Layer Protocol: IP 231
`The Transport Layer Protocols: TCP and UDP 245
`Addressing the Envelope: Packet Headers
`2/48
`Name Resolution
`249
`TCPHP Utilities
`254
`
`Application Layer Protocols
`
`261
`
`Summary
`
`262
`
`Further Reading
`
`262
`
`Review Questions
`
`263
`
`Chapter 9
`
`The Widest Area Network: The Global Internet 267 .
`
`The Evolution of the Internet
`
`267
`
`The Development of the Backbone
`The Internet2 Project
`269
`
`268
`
`269
`The Components of the Internet
`The Local Computer or LAN 270
`The ISP 270
`-
`
`The Regional Network 270
`NAPS 2?]
`
`008
`
`008
`
`

`

`XV
`
`
`MAEs
`
`271
`
`How Internet Components Work Together
`
`272
`
`What the Internet Does
`The World Wide Web
`
`273
`274
`
`283
`
`E—mail and Mailing Lists
`Newsgroups
`287
`File Transfer
`289
`Telnet
`290
`
`Streaming Media
`Live Chat
`291
`
`291
`
`AudioNideoconferencing
`Internet Telephony
`292
`Virtual Private Networking
`
`292
`
`293
`
`293
`
`TCPHP Routing and the Internet
`How IP Routing Works
`294
`An Example of a Simple Routed Network
`Types of Routing Interfaces _ 296
`296
`Static Versus Dynamic Routing
`Distance~Vector Versus Link-State Protocols
`Common Routing Protocols
`299
`
`294
`
`298
`
`301
`
`Who Owns the Internet?
`ISOC 302
`IAB 302
`IETF 302
`IESG 302
`
`IANAHCANN 302
`W3C 302
`
`Summary
`
`303
`
`Further Reading
`
`303
`
`Chapter 10
`
`Review Questions
`304
`I Network Operating Systems 30?
`
`General Network Administration
`The Clientherver Environment
`Sharing Network Resources
`311
`
`307
`309
`
`Overview of NOSs
`
`320
`
`.
`
`Windows NT and Windows 2000 Networks
`NetWai-e Networks
`326
`UNIX and Linux Networks
`Other NOSs
`334
`
`329
`
`320
`
`009
`
`
`
`009
`
`

`

`xvi
`
`Summary
`
`335
`
`Further Reading
`
`336
`
`Review Questions
`
`336
`
`Chapter 11
`
`Directory Services
`
`341
`
`What Are Directories and Directory Services?
`What Is a Directory?
`341
`What Are Directory Services?
`
`343
`
`341
`
`Directory Services Standards
`X500 346
`DAP and LDAP 347
`
`346
`
`Directory-Enabled Networking
`
`349
`
`Popular Directory Services
`Novel] NDS
`349
`
`349
`
`Microsoft Active Directory
`Other Directory services
`
`350
`354
`
`Summary
`
`356
`
`Further Reading
`
`357
`
`Review Questions
`
`35?
`
`Chapter 12
`
`Desktop Operating Systems
`
`361
`
`361
`Operating System Basics
`Operating System Interfaces
`Using Commands
`364
`Files and File Systems
`
`367
`
`362
`
`Common Desktop Operating Systems
`MS-DOS and Windows 3.x
`379
`Windows 9x
`381
`Windows NT Workstation
`Windows 2000 Professional
`LinufoNIX 396
`Macintosh
`401
`0812 403
`
`388
`392
`
`37"9
`
`Summary
`
`404
`
`Further Reading
`
`404
`
`Review Questions
`
`405
`
`010
`
`010
`
`

`

`xvii
`
`
`Chapter 13
`
`Hybrid Networks 409
`
`409
`Characteristics of the Hybrid Network
`Inability of a Single Vendor to Provide All Desired Features
`Personal Preferences of Users
`410
`
`410
`
`Budgetary Factors
`Haphazard Growth
`
`410
`411
`
`41 1
`Multiple—Protocol Networks
`Networlo‘Transport Protocols
`411
`File-Sharing Protocols
`415
`
`415
`Multiple-Operating-System Networks
`415
`Multiple Server Operating Systems
`41?
`Multiple Client Operating Systems
`Multiple Server and Multiple Client Operating Systems
`
`417
`
`Multiple-Platform Networks 41?
`418
`PC-to-Macintosh Communications
`418
`PC-to—Mainframe Communications
`PDA-to-PC and Handheld-to-PC Communications
`
`419
`
`Gateway: The Hybrid Connectivity Solution
`Windows~to-NetWare Redirectors
`420
`Cross—Platform Solutions
`420
`SNA 421
`Samba
`422
`
`419
`
`Summary
`
`424
`
`Further Reading
`
`425
`
`Review Questions
`
`425
`
`Part III
`
`Network Specialty Areas 429
`
`Chapter 14
`
`Protecting the Network
`
`431
`
`431
`Network Security
`432
`Assessing Security Needs
`434
`Assessing Security Threats
`441
`Implementing Security Measures
`How Security Components Work 448
`Advanced Identification and Authentication Technologies
`Developing Security Policies
`457
`
`454
`
`Disaster Protection and Recovery
`Power Backup
`465
`Data Backup
`466
`
`465
`
`011
`
`011
`
`

`

`xuili
`
`
`Disk Fault Tolerance 469
`
`Clustering Technologies
`
`471
`
`Summary 471
`
`Further Reading
`
`472
`
`Review Questions
`
`473
`
`Chapter 15
`
`Remote Access 477
`
`Why Remote Access?
`Branch Offices
`478
`
`478
`
`After—Hours Connectivity 478
`Telecommuting 479
`Mobile Users
`480
`
`Providing Access to Clients and Partners
`
`480
`
`481
`How Remote Access Works
`Protocols Used for Remote Access
`Remote Access Authentication 482
`Assignment of IP Addresses
`483
`Aggregation of Bandwidth on Dialup Connections
`Control of Bandwidth Usage 484
`
`482
`
`483
`
`Remote Access Connectivity Devices
`Modems
`484
`
`484
`
`ISBN Terminal Adapters
`Cable Modems
`493
`CSUJ'DSUS
`494
`
`492
`
`Configuring Remote Access Clients and Servers
`Configuring a Remote Access Client
`495
`Configuring a Remote Access Server
`496
`
`495
`
`Remote Access Security Issues 496
`Callback Security 497
`RADIUS 498
`
`Remote Access Policies
`Account Lockout
`499
`
`498
`
`Security Hosts
`
`499
`
`Summary 499
`
`Further Reading
`
`500
`
`Review Questions
`
`501
`
`012
`
`012
`
`

`

`xix
`
`
`Chapter 16
`
`Virtual Private Networking
`
`505
`
`What Is a VPN?
`
`505
`
`Virtual Networking
`Private Networking
`
`505
`506
`
`How VPNs Work
`
`506
`
`50?
`Digging the Tunnel
`Operating System Support for VPNs
`
`509
`
`510
`Why Use Virtual Private Networking?
`VPN Versus Dialup Networking: Advantages and Disadvantages
`VPN Scenarios
`512
`'
`
`510
`
`VPN Protocols
`
`516
`
`Tunneling Protocols
`Encryption Protocols
`LAN Protocols
`520
`
`516
`519
`
`VPN Security
`Authentication
`Authorization
`
`520
`5 2i
`521
`
`Encryption
`
`521
`
`VPN Performance Issues - 521
`
`522
`Types of VPNs
`Software-Based VPNs
`Hardware-Based VPNs
`
`522
`522
`
`Configuring a VPN Connection
`
`522
`
`Summary
`
`525
`
`I
`
`Further Reading
`
`526
`
`Review Questions
`
`526
`
`Chapter 1?
`
`Thin Client Networking
`
`531
`
`The Evolution of Thin Client Networking
`Thin Client Technology
`533
`Advantages of Thin Client Technology
`
`532
`
`534
`
`Thin Client Protocols
`RDP 536
`ICA 536
`
`535
`
`X and X Display Manager Communication Protocol (XDMCP)
`RFB 537
`BOOTP, DHCP, and TFI‘P 53';'
`
`-
`
`536
`-
`
`013
`
`013
`
`

`

`XX
`
`
`
`
`Thin Client Hardware
`WBTs
`539
`
`Network Computers
`Net PCs
`540
`
`538
`
`539
`
`540
`DesktOp Computers
`The Thinnest Clients: Handheld PCs
`
`540
`
`541
`Thin Client Software
`Microsoft Terminal Services
`Citrix WinframefMetaFrame
`
`541
`542
`
`The X Window System 543
`Web—Based Computing
`544
`The JVM 544
`
`545
`ASPs
`Microsoft .NET 545
`
`Summary
`
`546
`
`Further Reading
`
`546
`
`Review Questions
`
`'54?
`
`Chapter 18
`
`Monitoring, Management, and Troubleshooting Tools
`
`551
`
`Analyzing and Optimizing Network Performance
`Bottlenecks
`552
`Baselines
`553
`Best Practices
`
`554
`
`551
`
`Determining Internet Connection Speed
`
`554
`
`Network Monitoring and Management Tools
`Networking Monitoring Software
`556
`Network Management Software
`562
`Management Software for Small and Medium—Sized Networks
`Management Service Providers
`568
`
`556
`
`567
`
`Hardware Monitoring and Troubleshooting Devices
`
`568
`
`Troubleshooting Network Problems
`Troubleshooting Basics
`569
`Using Operating System Log Files
`Using TCPr'IP Utilities
`573
`Problem—Solving Guidelines
`
`57'9
`
`569
`
`571
`
`Summary
`
`580
`
`Further Reading
`
`581
`
`Revieruestions
`
`581
`
`014
`
`014
`
`

`

`xxi
`
`
`Part IV
`
`The Future of Networking 585
`
`Chapter 19
`
`Tomorrow’s Technologies 58?
`
`58?
`Ubiquitous Computing
`588
`Bringing Networking Home
`Overcoming the Limits of IP 589
`New Directions in Networking Technologies
`
`590
`
`592
`Universal Connectivity
`593
`"Smart" Everything
`Networking the Family
`594
`That’s Entertainment
`594
`
`Privacy Issues: Big Brother Is Watching
`
`594
`
`595
`Networking at Work
`The Impact of Networking Technologies on Government
`The Impact of Networking Technologies on Law 598
`The Impact of Networking Technologies on Medicine
`The Impact of Networking Technologies on Publishing
`
`599
`600
`
`596
`
`New Ways of Learning
`
`601
`
`602
`Artificial Intelligence
`Computers That Think
`602
`Cybernetic Life-Forms: The Ultimate Network
`
`603
`
`Summary
`
`603
`
`Further Reading
`
`604
`
`Parting Questions
`
`604
`
`Appendix A
`
`Chapter Review Answer Key 607
`
`Glossary 635
`
`Index 695
`
`015
`
`015
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket