Cover image for Network+ 2005 In Depth.
Network+ 2005 In Depth.
Title:
Network+ 2005 In Depth.
Author:
Dean, Tamara.
Personal Author:
Physical Description:
1 online resource (889 pages)
Contents:
Contents -- Preface -- Acknowledgments -- Photo Credits -- State of the Information Technology (IT) Field -- Chapter 1 An Introduction to Networking -- Why Use Networks? -- Types of Networks -- Peer-to-peer Networks -- Client/Server Networks -- LANs, MANs, and WANs -- Elements Common to Client/Server Networks -- How Networks Are Used -- File and Print Services -- Communications Services -- Mail Services -- Internet Services -- Management Services -- Becoming a Networking Professional -- Mastering the Technical Challenges -- Developing Your "Soft Skills" -- Pursuing Certification -- Finding a Job in Networking -- Joining Professional Associations -- Chapter Summary -- Key Terms -- Review Questions -- Chapter 2 Networking Standards and the OSI Model -- Networking Standards Organizations -- ANSI -- EIA and TIA -- IEEE -- ISO -- ITU -- ISOC -- IANA and ICANN -- The OSI Model -- Application Layer -- Presentation Layer -- Session Layer -- Transport Layer -- Network Layer -- Data Link Layer -- Physical Layer -- Applying the OSI Model -- Communication Between Two Systems -- Frame Specifications -- IEEE Networking Specifications -- Chapter Summary -- Key Terms -- Review Questions -- Chapter 3 Transmission Basics and Networking Media -- Transmission Basics -- Analog and Digital Signaling -- Data Modulation -- Transmission Direction -- Relationships Between Nodes -- Throughput and Bandwidth -- Baseband and Broadband -- Transmission Flaws -- Common Media Characteristics -- Throughput -- Cost -- Size and Scalability -- Connectors and Media Converters -- Noise Immunity -- Coaxial Cable -- Twisted-Pair Cable -- STP (Shielded Twisted-Pair) -- UTP (Unshielded Twisted-Pair) -- Comparing STP and UTP -- 10BASE-T -- 100BASE-T (Fast Ethernet) -- 1000BASE-T (Gigabit Ethernet over Twisted-pair) -- 1000BASE-CX (Gigabit Ethernet over Twinax) -- Fiber-Optic Cable.

SMF (Single-Mode Fiber) -- MMF (Multimode Fiber) -- 10BASE-FL -- 100BASE-FX -- 1000BASE-LX -- 1000BASE-SX -- 10-Gigabit Fiber-Optic Standards -- Cable Design and Management -- Installing Cable -- Wireless Transmission -- The Wireless Spectrum -- Characteristics of Wireless Transmission -- Infrared Transmission -- Wireless LAN (WLAN) Architecture -- Chapter Summary -- Key Terms -- Review Questions -- Chapter 4 Network Protocols -- Introduction to Protocols -- TCP/IP (Transmission Control Protocol/Internet Protocol) -- The TCP/IP Core Protocols -- Addressing in TCP/IP -- Assigning IP Addresses -- Sockets and Ports -- Addressing in IPv6 -- Host Names and DNS (Domain Name System) -- Some TCP/IP Application Layer Protocols -- IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange) -- The IPX and SPX Protocols -- Addressing in IPX/SPX -- NetBIOS and NetBEUI -- Addressing in NetBEUI -- WINS (Windows Internet Naming Service) -- AppleTalk -- Binding Protocols on a Windows XP Workstation -- Chapter Summary -- Key Terms -- Review Questions -- Chapter 5 Networking Hardware -- NICs (Network Interface Cards) -- Types of NICs -- Installing NICs -- Repeaters and Hubs -- Bridges -- Switches -- Installing a Switch -- Cut-Through Mode -- Store and Forward Mode -- Using Switches to Create VLANs -- Higher-Layer Switches -- Routers -- Router Features and Functions -- Routing Protocols: RIP, OSPF, EIGRP, and BGP -- Brouters -- Gateways -- Chapter Summary -- Key Terms -- Review Questions -- Chapter 6 Topologies and Access Methods -- Simple Physical Topologies -- Bus -- Ring -- Star -- Hybrid Physical Topologies -- Star-Wired Ring -- Star-Wired Bus -- Backbone Networks -- Serial Backbone -- Distributed Backbone -- Collapsed Backbone -- Parallel Backbone -- Logical Topologies -- Switching -- Circuit Switching -- Message Switching -- Packet Switching -- Ethernet.

CSMA/CD (Carrier Sense Multiple Access with Collision Detection) -- Switched Ethernet -- Ethernet Frames -- PoE (Power over Ethernet) -- Token Ring -- FDDI (Fiber Distributed Data Interface) -- ATM (Asynchronous Transfer Mode) -- Wireless Networks -- 802.11 -- Bluetooth -- Infrared (IR) -- Chapter Summary -- Key Terms -- Review Questions -- Chapter 7 WANs, Internet Access, and Remote Connectivity -- WAN Essentials -- WAN Topologies -- Bus -- Ring -- Star -- Mesh -- Tiered -- PSTN -- X.25 and Frame Relay -- ISDN -- T-Carriers -- Types of T-Carriers -- T-Carrier Connectivity -- DSL -- Types of DSL -- DSL Connectivity -- Broadband Cable -- SONET (Synchronous Optical Network) -- Wireless WANs and Internet Access -- IEEE 802.11 Internet Access -- IEEE 802.16 (WiMAX) Internet Access -- Satellite Internet Access -- WAN Technologies Compared -- Remote Connectivity -- Dial-up Networking -- Remote Access Servers -- Remote Access Protocols -- Remote Control -- Terminal Services -- Web Portals -- VPNs (Virtual Private Networks) -- Chapter Summary -- Key Terms -- Review Questions -- Chapter 8 Network Operating Systems and Windows Server 2003-Based Networking -- Introduction to Network Operating Systems -- Selecting a Network Operating System -- Network Operating Systems and Servers -- Network Operating System Services and Features -- Client Support -- Identifying and Organizing Network Elements -- Sharing Applications -- Sharing Printers -- Managing System Resources -- Introduction to Windows Server 2003 -- Windows Server 2003 Hardware Requirements -- A Closer Look at Windows Server 2003 -- Windows Server 2003 Memory Model -- Windows Server 2003 File Systems -- MMC (Microsoft Management Console) -- Active Directory -- Planning for Installation -- Installing and Configuring a Windows Server 2003 Server -- The Installation Process -- Initial Configuration.

Establishing Users and Groups -- Internetworking with Other Network Operating Systems -- Chapter Summary -- Key Terms -- Review Questions -- Chapter 9 Networking with UNIX-Type of Operating Systems -- A Brief History of UNIX -- Varieties of UNIX -- Proprietary UNIX -- Open Source UNIX -- Three Flavors of UNIX -- UNIX Server Hardware Requirements -- Solaris Hardware Requirements -- Linux Hardware Requirements -- Mac OS X Server Hardware Requirements -- A Closer Look at UNIX -- UNIX Multiprocessing -- The UNIX Memory Model -- The UNIX Kernel -- UNIX System File and Directory Structure -- UNIX System File Services -- A UNIX Command Sampler -- Installing Linux -- Planning a Linux Installation -- Installing and Configuring Fedora Core -- Administering a UNIX-Type of Server -- Establishing Groups and Users on Linux and Solaris -- Establishing Groups and Users on Mac OS X Server -- Changing File Access Permissions -- Connecting to UNIX-Type of Servers -- Chapter Summary -- Key Terms -- Review Questions -- Chapter 10 NetWare-Based Networking -- Introduction to NetWare -- NetWare Server Hardware Requirements -- A Closer Look at the NetWare 6.5 Operating System -- NetWare Integrated Kernel -- NetWare File System -- eDirectory -- Planning for Installation -- Installing and Configuring a NetWare 6.5 Server -- The Installation Process -- Establishing Users and Groups -- Client Services -- Traditional Client Access -- Native File Access -- Browser-Based Access -- Internetworking with Other Operating Systems -- Chapter Summary -- Key Terms -- Review Questions -- Chapter 11 In-Depth TCP/IP Networking -- Designing TCP/IP-Based Networks -- Subnetting -- CIDR (Classless Inter-Domain Routing) -- Internet Gateways -- NAT (Network Address Translation) -- ICS (Internet Connection Sharing) -- Intranets and Extranets -- TCP/IP Mail Services.

SMTP (Simple Mail Transfer Protocol) -- MIME (Multipurpose Internet Mail Extensions) -- POP (Post Office Protocol) -- IMAP (Internet Message Access Protocol) -- Additional TCP/IP Utilities -- Netstat -- Nbtstat -- Nslookup -- Dig -- Whois -- Traceroute (Tracert) -- Ipconfig -- Winipcfg -- Ifconfig -- VoIP (Voice Over IP) -- Chapter Summary -- Key Terms -- Review Questions -- Chapter 12 Troubleshooting Network Problems -- Troubleshooting Methodology -- Identify the Symptoms and Potential Causes -- Identify the Affected Area -- Establish What Has Changed -- Select the Most Probable Cause -- Implement an Action Plan and Solution Including Potential Effects -- Test the Result -- Identify the Results and Effects of the Solution -- Document the Solution and Process -- Help to Prevent Future Problems -- Troubleshooting Tools -- Crossover Cable -- Tone Generator and Tone Locator -- Multimeter -- Cable Continuity Testers -- Cable Performance Testers -- Network Monitors -- Protocol Analyzers -- Wireless Network Testers -- Chapter Summary -- Key Terms -- Review Questions -- Chapter 13 Ensuring Integrity and Availability -- What Are Integrity and Availability? -- Viruses -- Types of Viruses -- Virus Characteristics -- Virus Protection -- Virus Hoaxes -- Fault Tolerance -- Environment -- Power -- Topology and Connectivity -- Servers -- Storage -- Data Backup -- Backup Media and Methods -- Backup Strategy -- Disaster Recovery -- Disaster Recovery Planning -- Disaster Recovery Contingencies -- Chapter Summary -- Key Terms -- Review Questions -- Chapter 14 Network Security -- Security Audits -- Security Risks -- Risks Associated with People -- Risks Associated with Transmission and Hardware -- Risks Associated with Protocols and Software -- Risks Associated with Internet Access -- An Effective Security Policy -- Security Policy Goals -- Security Policy Content.

Response Policy.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: