Preface |
|
ix | |
What You Need to Know |
|
xi | |
Acknowledgments |
|
xi | |
|
|
|
|
3 | (18) |
|
|
3 | (11) |
|
|
5 | (2) |
|
Clients, Servers, and Peers |
|
|
7 | (2) |
|
Data Communications Protocols |
|
|
9 | (2) |
|
|
11 | (2) |
|
Another Word on Protocol Stacks |
|
|
13 | (1) |
|
Network Operating Systems |
|
|
14 | (1) |
|
What Ethernet Really Means |
|
|
15 | (1) |
|
|
15 | (3) |
|
The Speed and Bandwidth Connection |
|
|
17 | (1) |
|
|
18 | (1) |
|
A Bit of Ethernet History |
|
|
19 | (2) |
|
How TCP/IP and Ethernet Work |
|
|
21 | (20) |
|
Network Data Transmission |
|
|
22 | (1) |
|
|
23 | (10) |
|
The Operation of a Protocol Stack |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
25 | (4) |
|
|
29 | (2) |
|
The Logical Link Control Layer |
|
|
31 | (2) |
|
The Ethernet MAC Protocol |
|
|
33 | (5) |
|
|
33 | (2) |
|
|
35 | (3) |
|
Alternative Protocol Stacks |
|
|
38 | (3) |
|
Part Two: Design and Connectivity |
|
|
|
Fast and Gigabit Ethernet Media and Standards |
|
|
41 | (14) |
|
|
41 | (6) |
|
|
42 | (2) |
|
|
44 | (2) |
|
|
46 | (1) |
|
|
47 | (3) |
|
Single versus Multimode Fiber Optics |
|
|
48 | (1) |
|
Fiber Optic Cable Bundles |
|
|
49 | (1) |
|
|
50 | (2) |
|
|
51 | (1) |
|
|
51 | (1) |
|
Gigabit Ethernet Standards |
|
|
52 | (3) |
|
|
52 | (1) |
|
|
53 | (2) |
|
Creating Network Segments |
|
|
55 | (34) |
|
|
56 | (8) |
|
|
57 | (2) |
|
|
59 | (3) |
|
|
62 | (1) |
|
|
62 | (2) |
|
|
64 | (11) |
|
|
66 | (2) |
|
Creating a Simple Switched Segment |
|
|
68 | (1) |
|
Creating Hierarchical Switched Configurations |
|
|
68 | (5) |
|
|
73 | (1) |
|
|
74 | (1) |
|
Where Do You Put It? Wiring Closets, Walls, Floors, and Ceilings---Oh, My! |
|
|
75 | (6) |
|
Appendix: Wiring RJ-45 Plugs and Connectors |
|
|
81 | (8) |
|
Connecting to the Internet |
|
|
89 | (22) |
|
|
89 | (2) |
|
Internet Connection Protocols |
|
|
91 | (1) |
|
|
91 | (1) |
|
Point-to-Point Protocol Over Ethernet for Cable and DSL |
|
|
92 | (1) |
|
|
92 | (8) |
|
|
92 | (5) |
|
Integrated Services Digital Network |
|
|
97 | (3) |
|
|
100 | (11) |
|
|
100 | (3) |
|
|
103 | (2) |
|
|
105 | (3) |
|
|
108 | (1) |
|
|
109 | (2) |
|
|
111 | (30) |
|
|
112 | (5) |
|
|
113 | (2) |
|
|
115 | (2) |
|
|
117 | (8) |
|
|
118 | (1) |
|
|
118 | (4) |
|
|
122 | (3) |
|
|
125 | (2) |
|
|
127 | (3) |
|
Routers and the TCP/IP Protocol Stack |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
130 | (3) |
|
Making Connections and Network Address Translation |
|
|
131 | (1) |
|
Firewalls and Port Management |
|
|
132 | (1) |
|
Adding Routers to an Ethernet |
|
|
133 | (8) |
|
|
133 | (2) |
|
|
135 | (6) |
|
Integrating Wireless Transmissions |
|
|
141 | (14) |
|
Wireless MAC Protocol versus Ethernet MAC Protocol |
|
|
142 | (1) |
|
Wireless Speeds and Standards |
|
|
142 | (2) |
|
|
144 | (4) |
|
|
144 | (3) |
|
Adding Access Points to a Wired Network |
|
|
147 | (1) |
|
|
148 | (7) |
|
|
148 | (2) |
|
|
150 | (5) |
|
Part Three: Making the Network Work |
|
|
|
Network Servers: Files, the Web, and Printers |
|
|
155 | (22) |
|
Client-Server versus Peer-to-Peer File Sharing |
|
|
156 | (1) |
|
|
157 | (9) |
|
|
157 | (1) |
|
Widely Used Server Operating Systems |
|
|
158 | (8) |
|
|
166 | (1) |
|
|
167 | (10) |
|
Shared Printer Architectures |
|
|
168 | (1) |
|
Occasional Printer Sharing |
|
|
168 | (6) |
|
Printing through a Server |
|
|
174 | (3) |
|
Network Maintenance, Monitoring, and Control |
|
|
177 | (26) |
|
|
178 | (5) |
|
|
179 | (3) |
|
|
182 | (1) |
|
|
183 | (10) |
|
|
184 | (2) |
|
For Very Small Networks: Network Magic |
|
|
186 | (3) |
|
For Larger Networks: LANsurveyor |
|
|
189 | (4) |
|
Real-Time Monitoring and Packet Sniffing |
|
|
193 | (3) |
|
|
193 | (3) |
|
|
196 | (7) |
|
|
196 | (1) |
|
|
197 | (3) |
|
|
200 | (1) |
|
|
200 | (3) |
|
|
203 | (48) |
|
Security Threats to Home and Small Offices |
|
|
204 | (10) |
|
|
204 | (1) |
|
Denial-of-Service Attacks |
|
|
205 | (1) |
|
Authentication Vulnerabilities |
|
|
206 | (1) |
|
Employees and Other Local People |
|
|
207 | (7) |
|
|
214 | (1) |
|
|
214 | (27) |
|
|
214 | (8) |
|
|
222 | (4) |
|
|
226 | (1) |
|
|
227 | (7) |
|
|
234 | (1) |
|
Enhancing Password Security with Tokens |
|
|
234 | (2) |
|
|
236 | (1) |
|
|
236 | (5) |
|
|
241 | (7) |
|
Intrusion Detection Systems |
|
|
241 | (3) |
|
|
244 | (4) |
|
|
248 | (3) |
|
Professional Security Update Sites |
|
|
248 | (1) |
|
|
249 | (2) |
|
Network Design and Simulation Software |
|
|
251 | (26) |
|
|
252 | (1) |
|
|
253 | (14) |
|
Choosing and Configuring Network Devices |
|
|
254 | (9) |
|
|
263 | (4) |
|
Simulating Network Traffic |
|
|
267 | (5) |
|
|
268 | (2) |
|
|
270 | (2) |
|
Documenting the Network Design |
|
|
272 | (5) |
|
Part Four: Ethernet Solution Examples |
|
|
|
Network Example 1: Professional Home Network |
|
|
277 | (4) |
|
Ethernet Example 2: Small-But-Growing Real Estate |
|
|
281 | (8) |
|
|
281 | (2) |
|
|
283 | (1) |
|
Network Design Considerations |
|
|
284 | (5) |
|
Network Example 3: Small Law Firm |
|
|
289 | (10) |
|
The Internet, the Backbone, and Equipment Rooms |
|
|
291 | (4) |
|
|
293 | (1) |
|
The Fifth-Floor Server Room |
|
|
294 | (1) |
|
The Fourth-Floor Wiring Closet |
|
|
295 | (1) |
|
Connecting End-User Devices |
|
|
295 | (2) |
|
|
297 | (2) |
|
Appendix A: Older Ethernet Standards |
|
|
299 | (10) |
|
Thick Coaxial Cable (10Base5) |
|
|
300 | (1) |
|
Thin Coaxial Cable (10Base2) |
|
|
301 | (4) |
|
|
305 | (4) |
|
Creating 10Base-T Network Segments with a Hub |
|
|
305 | (4) |
|
Appendix B: TCP and UDP Ports |
|
|
309 | (8) |
|
|
309 | (5) |
|
|
314 | (1) |
|
|
315 | (2) |
|
Appendix C: Products and Vendors |
|
|
317 | (6) |
Glossary |
|
323 | (10) |
Index |
|
333 | |