`
`Computer Networking Essentials
`
`Debra Littlejohn S‘hinder
`t
`
` stco PRESS
`
`Cisco Press I
`201 West 103rd Street
`Indianapolis, IN 46290 USA
`
`Huawei V. Uniloc - Exhibit No. 1017 - 1/ 15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 1/15
`
`
`
`
`
`Computer Networking Essentials
`Debra Littlejohn Shinder
`Copyright © 2001 Cisco Systems, Inc.
`Cisco Press logo is a trademark of Cisco Systems, Inc.
`Published by:
`Cisco Press
`201 West 103rd Street
`Indianapolis, IN 46290 USA
`All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic
`or mechanical, including photocopying, recording, or by any information storage and retrieval system. without writ—
`ten permission from the publisher, except for the inclusion of brief quotations in a review.
`Printed in the United States of America 1 2 3 4 5 6 7 8 9 0
`
`Library of Congress Cataloging-in-Publication Number: 2001090429
`ISBN: [-58713—038—6
`
`Trademark Acknowledgments
`All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capital-
`ized. Cisco Press or Cisco Systems, Inc., cannot attest to the accuracy of this information. Use of a term in this book
`should not be regarded as affecting the validity of any trademark or service mark.
`
`Warning and Disclaimer
`This book is designed to provide information about basic networking and operating system technologies. Every
`effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is
`implied.
`The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc, shall have neither
`liability nor responsibility to any person or entity with respect to any loss or damages arising from the information
`contained in this book or from the use of the discs or programs that may accompany it.
`The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc.
`
`
`
`Huawei v. Uniloc - Exhibit No. 1017 - 2/ 15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 2/15
`
`
`
`ix
`
`
`Contents
`
`Part |
`Chapter 1
`
`Introduction to Networking Concepts
`Introduction to PC Networking
`5
`
`3
`
`6
`10
`
`16
`
`15
`
`5
`A Brief History of PC Networking
`The First Communications Networks
`Disadvantages of Standalone Systems
`What Is a Network, Anyway?
`11
`Why Network Computers?
`11
`Benefits of Getting Connected
`The Birth of the Internet
`13
`The Cost of Technology: More and More for Less and Less
`PC Networking Today
`16
`16
`Home Computing
`16
`Web Presence and E-cornmerce
`High—Performance Business Solutions
`Online Learning
`17
`17
`Tomorrow’s Networks
`”Smart” Appliances and Homes
`Phoning Home
`18
`19
`The Wired Workplace
`20
`Schools of the Future
`20
`Networking Health Care
`Technology and the Law 21
`Intergalactic Networking?
`21
`
`12
`
`17
`
`A Brief Overview of Networking Terminology
`Concept-Related Terminology
`22
`Network Hardware-Related Terminology
`Software-Related Terminology
`23
`24
`Design and Topology Terminology
`24
`Measurement-Related Terminology
`What This Book Covers and What It Doesn’t
`Networking Certifications
`26
`26
`Vendor-Specific Certifications
`Non—Vendor—Specific Certifications
`This Book and Certification
`27
`
`26
`
`21
`
`22
`
`25
`
`Huawei v. Uniloc - Exhibit No. 1017 - 3/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 3/15
`
`
`
`
`
`Summary
`
`27
`
`Further Reading
`
`28
`
`Review Questions
`
`28
`
`Chapterz
`
`Categorizing Networks
`
`33
`
`Categorizing Networks by Physical Scope
`Characteristics of a LAN 34
`Characteristics of a MAN 35
`Characteristics of a WAN 37
`
`33
`
`Categorizing Networks by Administrative Method
`Servers and Clients
`39
`Characteristics of Peer-to-Peer Networks
`Characteristics of Server-Based Networks
`
`44
`47
`
`38
`
`49
`
`Categorizing Networks by NOS
`Windows Networks
`50
`NetWare Networks
`50
`UNIX Networks
`50
`Hybrid Networks
`51
`
`Categorizing Networks by Protocol
`NetBEUI Networks
`52
`IPX/SPX Networks
`52
`TCP/IP Networks
`53
`Other LAN Protocols Used in Networks
`
`52
`
`53
`
`54
`
`Categorizing Networks by Topology
`Linear Bus Networks
`55
`Ring Networks
`56
`Star Bus Networks
`Mesh Networks
`59
`Hybrid Topologies
`
`60
`
`57
`
`61
`
`Categorizing Networks by Architecture
`Ethernet Networks
`62
`Token Ring Networks
`AppleTalk Networks
`ARCnet Networks
`Summary
`70
`
`67
`68
`
`68
`
`Further Reading
`
`70
`
`Review Questions
`
`71
`
`Huawei V. Uniloc - Exhibit No. 1017 - 4/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 4/15
`
`
`
`
`
`xi
`
`Chapter 3
`
`Networking Concepts, Models, and Standards
`
`75
`
`Computer Communication Concepts
`The Language of the Machine
`76
`Common Numbering Systems
`76
`Using Packets
`80
`A Layered Communication Process
`
`75
`
`82
`
`84
`Networking Models
`The Purpose of Models
`The 051 Model
`85
`The DOD Model
`97
`Vendor-Specific Models
`
`84
`
`99
`
`Networking Standards and Specifications
`Why Standardize?
`100
`Standards-Setting Bodies
`
`100
`
`99
`
`Summary
`
`104
`
`Further Reading
`
`104
`
`Review Questions
`
`105
`
`Chapter 4
`
`109
`109
`
`116
`
`Networking Communications Methods
`Signaling Methods and Characteristics
`Analog and Digital
`109
`Baseband and Broadband
`Multiplexing
`1 13
`115
`Asynchronous and Synchronous Transmission
`Simplex, Half~Duplex, and Full—Duplex Transmission
`Signaling and Communications Problems
`118
`Electromagnetic Interference
`119
`Radio Frequency Interference
`1 19
`Crosstalk
`119
`Attenuation
`120
`Bandwidth Capacity Issues
`Media Access Methods
`121
`CSMA/CD 122
`CSMA/CA 123
`Token Passing
`Demand Priority
`
`112
`
`121
`
`123
`125
`
`Summary
`
`126
`
`Further Reading
`Review Questions
`
`126
`127
`
`Huawei V. Uniloc - Exhibit No. 1017 - 5/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 5/15
`
`
`
`xii
`
`Chapters
`
`131
`LAN Links
`132
`Ethernet
`132
`10Base2
`134
`IOBaSCS
`10BaseT 136
`100BaseX 137
`lOOOBaseT
`137
`The Structure of an Ethernet Frame
`Rules of Ethernet Engagement
`139
`Summary of Ethernet Characteristics
`
`138
`
`142
`
`143
`
`146
`
`147
`
`142
`Token Ring
`143
`Token Ring Topology
`The Token Ring Communication Process
`Token Ring Hardware Components
`144
`Advantages of Token Ring
`145
`Disadvantages of Token Ring
`145
`The Structure of the Token Ring Frame
`Rules of the Ring
`147
`Summary of Token Ring Characteristics
`FDDI
`147
`147
`How FDDI Works
`148
`FDDI Specifications
`149
`Advantages of FDDI
`I49
`Disadvantages of FDDI
`The FDDI Frame Structure
`149
`Summary of FDDI Characteristics
`
`149
`
`150
`AppleTalk
`150
`AppIeTalk Specifications
`150
`How AppleTalk Works
`l51
`Advantages of AppleTalk
`151
`Disadvantages of AppleTalk
`15 1
`LocalTalk Data Transmission
`Summary of AppleTalk Characteristics
`ARCnet
`151
`[51
`How ARCnet Works
`152
`ARCnetSpecifications
`153
`Advantages of ARCnet
`153
`Disadvantages of ARCnet
`153
`The ARCnet Packet Structure
`Summary of ARCnet Characteristics
`
`151
`
`153
`
`Huawei V. Uniloc - Exhibit No. 1017 - 6/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 6/15
`
`
`
`
`
`xiii
`
`Comparing Networking Architectures
`Summary
`154
`
`154
`
`Further Reading
`Review Questions
`WAN Links
`159
`
`155
`155
`
`Chapter 6
`
`160
`
`WAN Hardware
`Modems
`160
`165
`ISDN and DSL Adapters
`Customer Premises Equipment
`WAN Topologies
`166
`The Point-to—Point WAN 166
`The WAN Ring
`167
`The WAN Star
`168
`Multitiered WANs
`
`169
`
`165
`
`170
`Network Switching Types
`Circuit-Switching Networks
`Packet—Switching Networks
`
`170
`176
`
`178
`
`Emerging WAN Technologies
`OC-SONET 179
`Broadband ISDN 179
`CATV 179
`SMDS
`1 8 1
`Wireless WAN 181
`
`LAN/WAN Connectivity
`Translated Connections
`Proxy Servers
`185
`Routed Connections
`
`186
`
`182
`182
`
`Summary
`
`187
`
`Further Reading
`
`188
`
`Review Questions
`
`188
`
`Part II
`Chapter 7
`
`Networking Hardware and Software
`Physical Components of the Network
`NICs
`195
`
`193
`195
`
`./
`
`The Role of the NIC in Network Communications
`Selecting a NIC 196
`
`195
`
`
`
`Huawei V. Uniloc - Exhibit No. 1017 - 7/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 7/15
`
`
`
`xiv
`
`Configuring and Using a NIC 197
`Network Media
`200
`Cable Types
`200
`Wireless Media
`207
`
`Network Connectivity Devices
`Simple Connectors
`211
`Complex Connectors
`213
`Segmenting and Subnetting Devices
`
`210
`
`214
`
`Summary
`
`222
`
`Further Reading
`
`222
`
`Review Questions
`
`222
`
`Chapter 8
`
`Networking Protocols and Services 227
`NetBIOS/NetBEUI
`227
`
`IPX/SPX 229
`The Network Layer Protocol: IPX 229
`The Transport Layer Protocol: SPX 230
`TCP/1P
`231
`231
`The TCP/1P Suite
`The Network Layer Protocol: IP 231
`The Transport Layer Protocols: TCP and UDP 245
`Addressing the Envelope: Packet Headers
`248
`Name Resolution
`249
`TCP/1P Utilities
`254
`Application Layer Protocols
`
`261
`
`Summary
`
`262
`
`Further Reading
`
`262
`
`Review Questions
`
`263
`
`Chapter 9
`
`The Widest Area Network: The Global Internet 267
`The Evolution of the Internet
`267
`The Development of the Backbone
`The lnternet2 Project
`269
`
`268
`
`269
`The Components of the Internet
`The Local Computer or LAN 270
`The TSP
`270
`The Regional Network
`NAPs
`271
`
`270
`
`Huawei V. Uniloc - Exhibit No. 1017 - 8/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 8/15
`
`
`
`XV
`
`
`MAEs
`
`271
`
`272
`
`How Internet Components Work Together
`What the Internet Does
`273
`The World Wide Web
`274
`E-mail and Mailing Lists
`283
`Newsgroups
`287
`File Transfer
`289
`Telnet
`290
`Streaming Media
`Live Chat
`291
`
`291
`
`292
`
`Audio/Videoconferencing
`Internet Telephony
`292
`293
`Virtual Private Networking
`TCP/IP Routing and the Internet
`293
`How IP Routing Works
`294
`An Example of a Simple Routed Network
`Types of Routing Interfaces
`296
`296
`Static Versus Dynamic Routing
`Distance-Vector Versus Link-State Protocols
`Common Routing Protocols
`299
`Who Owns the Internet?
`301
`ISOC 302
`IAB 302
`IETF 302
`IESG 302
`IANA/ICANN 302
`W3C 302
`
`294
`
`298
`
`Summary
`
`303
`
`Further Reading
`Review Questions
`
`303
`304
`
`Chapter 10
`
`Network Operating Systems 307
`General Network Administration
`307
`The Client/Server Environment
`309
`Sharing Network Resources
`311
`
`.
`320
`Overview of N085
`Windows NT and Windows 2000 Networks
`NetWare Networks
`326
`UNIX and Linux Networks
`Other NOSs
`334
`
`329
`
`320
`
`;
`
`
`
`Huawei v. Uniloc - Exhibit No. 1017 - 9/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 9/15
`
`
`
`xvi
`
`Summary
`
`335
`
`Further Reading
`
`336
`
`Review Questions
`
`336
`
`Chapter 11
`
`Directory Services
`
`341
`
`Chapter 12
`
`What Are Directories and Directory Services?
`What Is a Directory?
`341
`What Are Directory Services?
`
`343
`
`34]
`
`Directory Services Standards
`X500 346
`DA? and LDAP 347
`
`346
`
`Directory«Enabled Networking
`
`349
`
`Popular Directory Services
`Novell NDS
`349
`Microsoft Active Directory
`Other Directory Services
`
`349
`
`350
`354
`
`Summary
`
`356
`
`Further Reading
`
`357
`
`Review Questions
`
`357
`
`Desktop Operating Systems
`Operating System Basics
`361
`Operating System Interfaces
`Using Commands
`364
`Files and File Systems
`
`367
`
`361
`
`362
`
`379
`
`Common Desktop Operating Systems
`MS-DOS and Windows 3.x
`379
`Windows 9x
`381
`Windows NT Workstation
`Windows 2000 Professional
`Linux/UNIX 396
`Macintosh
`401
`05/2 403
`
`388
`392
`
`Summary
`
`404
`
`Further Reading
`Review Questions
`
`404
`405
`
`Huawei v. Uniloc - Exhibit No. 1017 - 10/ 15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 10/15
`
`
`
`xvii
`
`
`Chapter 13
`
`Hybrid Networks 409
`
`409
`Characteristics of the Hybrid Network
`Inability of a Single Vendor to Provide All Desired Features
`Personal Preferences of Users
`410
`Budgetary Factors
`410
`Haphazard Growth
`411
`
`410
`
`411
`Multiple-Protocol Networks
`Network/Transport Protocols
`411
`File-Sharing Protocols
`415
`
`415
`Multiple-Operating-System Networks
`415
`Multiple Server Operating Systems
`417
`Multiple Client Operating Systems
`Multiple Server and Multiple Client Operating Systems
`Multiple-Platform Networks
`417
`418
`PC-to-Macintosh Communications
`418
`PC-to-Mainframe Communications
`PDA—to-PC and Handheld—to—PC Communications
`
`419
`
`417
`
`Gateway: The Hybrid Connectivity Solution
`Windows~to—NetWare Redirectors
`420
`Cross-Platfomi Solutions
`420
`SNA 421
`Samba
`422
`
`419
`
`Summary
`
`424
`
`Further Reading
`
`425
`
`Review Questions
`
`425
`
`Part III
`
`Network Specialty Areas
`
`429
`
`Chapter 14
`
`431
`
`Protecting the Network
`Network Security
`431
`432
`Assessing Security Needs
`434
`Assessing Security Threats
`441
`Implementing Security Measures
`How Security Components Work 448
`Advanced Identification and Authentication Technologies
`Developing Security Policies
`457
`
`454
`
`Disaster Protection and Recovery
`Power Backup
`465
`Data Backup
`466
`
`465
`
`Huawei V. Uniloc - Exhibit No. 1017 - 11/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 11/15
`
`
`
`xvili
`
`
`469
`Disk Fault Tolerance
`Clustering Technologies
`471
`Summary
`47]
`
`472
`Further Reading
`473
`Review Questions
`Remote Access 477
`
`Chapter 15
`
`478
`
`478
`
`Why Remote Access?
`Branch Offices
`478
`After-Hours Connectivity
`Telecommuting
`479
`Mobile Users
`480
`Providing Access to Clients and Partners
`How Remote Access Works
`481
`Protocols Used for Remote Access
`Remote Access Authentication
`482
`Assignment of IP Addresses
`483
`Aggregation of Bandwidth on Dialup Connections
`Control of Bandwidth Usage
`484
`
`480
`
`482
`
`483
`
`Remote Access Connectivity Devices
`Modems
`484
`
`484
`
`ISDN Terminal Adapters
`Cable Modems
`493
`CSU/DSUs
`494
`
`492
`
`Configuring Remote Access Clients and Servers
`Configuring a Remote Access Client
`495
`Configuring a Remote Access Server
`496
`
`495
`
`496
`
`Remote Access Security Issues
`Callback Security
`497
`RADIUS
`498
`Remote Access Policies
`Account Lockout
`499
`Security Hosts
`499
`
`498
`
`Summary
`
`499
`
`Further Reading
`
`500
`
`Review Questions
`
`501
`
`Huawei V. Uniloc - Exhibit No. 1017 - 12/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 12/15
`
`
`
`xix
`
`
`Chapter 16
`
`Virtual Private Networking 505
`What Is a VPN?
`505
`Virtual Networking
`Private Networking
`How VPNs Work
`506
`507
`Digging the Tunnel
`Operating System Support for VPNs
`
`505
`506
`
`509
`
`510
`Why Use Virtual Private Networking?
`VPN Versus Dialup Networking: Advantages and Disadvantages
`VPN Scenarios
`512
`
`510
`
`516
`VPN Protocols
`Tunneling Protocols
`Encryption Protocols
`LAN Protocols
`520
`
`516
`519
`
`520
`VPN Security
`Authentication
`521
`Authorization
`521
`Encryption
`521
`VPN Performance Issues
`
`522
`Types of VPNs
`Software-Based VPNs
`Hardware-Based VPNs
`
`521
`
`522
`522
`
`Configuring a VPN Connection
`
`522
`
`Summary
`
`525
`
`V
`
`Further Reading
`Review Questions
`
`526
`526
`
`Chapter 17
`
`Thin Client Networking
`
`531
`
`The Evolution of Thin Client Networking
`Thin Client Technology
`533
`Advantages of Thin Client Technology
`Thin Client Protocols
`535
`RDP 536
`ICA 536
`
`532
`
`534
`
`X and X Display Manager Communication Protocol (XDMCP)
`RFB 537
`BOOTP, DHCP, and TFI‘P 537
`
`536
`,
`
`Huawei v. Uniloc - Exhibit No. 1017 - 13/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 13/15
`
`
`
`XX
`
`
`538
`
`539
`
`Thin Client Hardware
`WBTs
`539
`Network Computers
`Net PCs
`540
`540
`Desktop Computers
`The Thinnest Clients: Handheld PCs
`Thin Client Software
`541
`Microsoft Terminal Services
`Citrix Winframe/MetaFrame
`The X Window System 543
`Web—Based Computing
`544
`The JVM 544
`
`540
`
`541
`542
`
`545
`ASPs
`Microsoft .NET 545
`
`Summary
`
`546
`
`Further Reading
`
`546
`
`Review Questions 547
`
`Chapter 18
`
`Monitoring, Management, and Troubleshooting Tools
`Analyzing and Optimizing Network Performance
`551
`Bottlenecks
`552
`Baselines
`553
`554
`Best Practices
`Determining Internet Connection Speed
`
`554
`
`551
`
`Network Monitoring and Management Tools
`Networking Monitoring Software
`556
`Network Management Software
`562
`Management Software for Small and Medium—Sized Networks
`Management Service Providers
`568
`
`556
`
`567
`
`Hardware Monitoring and Troubleshooting Devices
`Troubleshooting Network Problems
`569
`Troubleshooting Basics
`569
`Using Operating System Log Files
`Using TCP/IP Utilities
`573
`Problem-Solving Guidelines
`
`579
`
`571
`
`568
`
`Summary
`
`580
`
`Further Reading
`
`581
`
`Review‘Questions
`
`5 81
`
`Huawei V. Uniloc - Exhibit No. 1017 - 14/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 14/15
`
`
`
`Part IV
`
`The Future of Networking 585
`
`Chapter 19
`
`587
`
`Tomorrow’s Technologies
`Ubiquitous Computing
`587
`588
`Bringing Networking Home
`Overcoming the Limits of IP 589
`New Directions in Networking Technologies
`Universal Connectivity
`592
`”Smart" Everything
`593
`Networking the Family
`594
`That’s Entertainment
`594
`
`590
`
`594
`
`Privacy Issues: Big Brother Is Watching
`Networking at Work
`595
`The Impact of Networking Technologies on Government
`The Impact of Networking Technologies on Law 598
`The Impact of Networking Technologies on Medicine
`The Impact of Networking Technologies on Publishing
`New Ways of Learning
`601
`
`xxi
`
`596
`
`599
`600
`
`602
`Artificial Intelligence
`Computers That Think
`602
`Cybernetic Life—Forms: The Ultimate Network
`Summary
`603
`
`603
`
`Further Reading
`
`604
`
`Patting Questions
`
`604
`
`Chapter Review Answer Key 607
`
`AppendixA
`Glossary 635
`Index 695
`
`Huawei V. Uniloc - Exhibit No. 1017 - 15/15
`
`Huawei v. Uniloc - Exhibit No. 1017 - 15/15
`
`