Edwards ffirs.tex V3 - 03/27/2009 10:42am Page...
Transcript of Edwards ffirs.tex V3 - 03/27/2009 10:42am Page...
NETWORKINGS E L F - TE A C H I N G G U I D E
OSI, TCP/IP, LANs, MANs, WANs, Implementation, Management, and Maintenance James Edwards
Richard Bramante
Select, design, and implement a network If you want to make the move into a networking career, this is the resource for you. It
covers the technologies you need to know, including the hardware, software, data transfer
processes, and more. Th is guide fi rst takes you through the essentials of networking and
progresses through the advanced features and capabilities available in many of the standards.
You’ll then delve into network design as well as the important tasks of securing, managing,
and troubleshooting issues within a given network.
James Edwards has over 10 years of experience as a Premium
Support Network Engineer. He also served as a technical
editor and expert in networking technologies.
Rich Bramante has been a network engineer for 10 years
as well as a technical lead. He was also a technical writer
for functional specifi cations and testing procedures.
• Manage all the components within a node
• Take advantage of the Ethernet, today’s most prominent LAN technology
• Utilize the most commonly deployed standards and technologies in networking
• Ensure that information fl ows smoothly and without error between the upper layers
• Allow for direct communication between network nodes over a physical channel
• Apply and develop design concepts for a given network
• Prevent network attacks and perform traffi c monitoring and analysis
• Troubleshoot any network problem using proven strategies
Cover Image: © Chad Baker/Photodisc/Getty Images
Networking / General
$60.00 US$72.00 CAN
Visit our Web site at www.wiley.com/compbooksN
ET
WO
RK
ING
S
EL
F-
TE
AC
HI
NG
GU
ID
E
EdwardsBramante
Edwards ffirs.tex V3 - 03/27/2009 10:42am Page iii
NetworkingSelf-Teaching Guide
OSI, TCP/IP, LANs, MANs, WANs,Implementation, Management,
and Maintenance
James EdwardsRichard Bramante
Wiley Publishing, Inc.
Edwards ffirs.tex V3 - 03/27/2009 10:42am Page iv
Networking Self-Teaching Guide
Published byWiley Publishing, Inc.10475 Crosspoint BoulevardIndianapolis, IN 46256www.wiley.com
Copyright © 2009 by Wiley Publishing, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN: 978-0-470-40238-2
Manufactured in the United States of America
10 9 8 7 6 5 4 3 2 1
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form orby any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permittedunder Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior writtenpermission of the Publisher, or authorization through payment of the appropriate per-copy fee to theCopyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, JohnWiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online athttp://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations orwarranties with respect to the accuracy or completeness of the contents of this work and specifically disclaimall warranties, including without limitation warranties of fitness for a particular purpose. No warranty maybe created or extended by sales or promotional materials. The advice and strategies contained herein may notbe suitable for every situation. This work is sold with the understanding that the publisher is not engaged inrendering legal, accounting, or other professional services. If professional assistance is required, the servicesof a competent professional person should be sought. Neither the publisher nor the author shall be liable fordamages arising herefrom. The fact that an organization or Web site is referred to in this work as a citationand/or a potential source of further information does not mean that the author or the publisher endorses theinformation the organization or Web site may provide or recommendations it may make. Further, readersshould be aware that Internet Web sites listed in this work may have changed or disappeared between whenthis work was written and when it is read.
Library of Congress Cataloging-in-Publication Data:
Edwards, James, 1962-Networking self-teaching guide : OSI, TCP/IP, LANs, MANs, WANs, implementation, management, and
maintenance / James Edwards, Richard Bramante.p. cm.
Includes index.ISBN 978-0-470-40238-2 (pbk.)1. Computer networks. 2. Computer network protocols. 3. Computer network architectures. I. Bramante,Richard, 1944- II. Title.TK5105.5.E28 2009004.6’5 — dc22
2009004168
For general information on our other products and services please contact our Customer Care Departmentwithin the United States at (877) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.
Trademarks: Wiley and the Wiley logo are trademarks or registered trademarks of John Wiley & Sons, Inc.and/or its affiliates, in the United States and other countries, and may not be used without written permission.All other trademarks are the property of their respective owners. Wiley Publishing, Inc. is not associated withany product or vendor mentioned in this book.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may notbe available in electronic books.
Edwards ffirs.tex V3 - 03/27/2009 10:42am Page v
This book is dedicated to my brother, Joel, for all that he has done for somany over the years. I sincerely hope that he will forever be able to enjoyall of the good things that life has to offer. Whether he knows it or not, hehas always been a source of inspiration for me and his encouragementhas kept me going whenever a challenge was thrown my way. The best
brother in the world! That’s my brother, Joel.— Jim Edwards
This book is dedicated to those who have supported me, not just duringthe writing of this book, but throughout my life. There have been manyand too numerous to mention, but to all who have been there for me, Iam deeply grateful. Deserving special mention are: My son, Rich; his
wife, Michelle; my three grandchildren, Vanessa, Ethan, and Olivia; myparents; my siblings, Margaret, Mary, Josephine, Frank, and Salvatore;and the person who believed in me, unfailingly, even through all my
blunders, my deceased wife, Barbara.— Rich Bramante
Edwards f01.tex V2 - 03/27/2009 10:44am Page vii
About the Authors
Jim Edwards has more than 10 years of experience supporting data networksas a Premium Support Engineer. He has authored four books pertaining todata networking, as well as served as a technical editor.
Rich Bramante earned both a bachelor’s and master’s degree in electricalengineering from the University of Massachusetts – Lowell. He has worked inthe technology industry for more than 40 years. For the past 11 years, he hasworked for a major telecommunications equipment manufacturer, primarilywithin the VPN technology area.
vii
Edwards f02.tex V3 - 03/27/2009 3:50pm Page viii
Credits
Executive EditorCarol Long
Development EditorJohn Sleeva
Technical EditorDon Thoreson
Production EditorAngela Smith
Copy EditorLunaea Weatherstone
Editorial ManagerMary Beth Wakefield
Production ManagerTim Tate
Vice President and ExecutiveGroup PublisherRichard Swadley
Vice President and ExecutivePublisherBarry Pruett
Associate PublisherJim Minatel
Project Coordinator, CoverLynsey Stanford
ProofreaderPublication Services, Inc.
IndexerJack Lewis
Cover Image© Chad Baker/Photodisc/GettyImages
Cover DesignerMichael Trent
Edwards f03.tex V1 - 03/27/2009 11:21am Page ix
Acknowledgments
First and foremost, Jim wants to thank Rich for being such a great co-author towork with. Rich and Jim had the opportunity to work together on a previousbook and we make a great team. Jim is a bit of a pain in the neck,1 so Rich mayhave other opinions on this whole team thing.
We would also like to send out a huge word of thanks for all of theindividuals involved in the development of this book. To Carol Long, thankyou for bringing the idea to us and trusting us to see it through. We reallyenjoyed it as much as we all thought we would. We also want to send a wordof thanks to the development editor, John Sleeva, for keeping us in line. Itwas a pleasure working with you, sir. To Angela Smith, thank you for all theassistance you gave us during the production phase. It is always nice to workwith people who are as friendly and helpful as everyone we have had thepleasure of working with at Wiley. Additionally, thank you to Don Thorensonfor being our technical guinea pig and to Lunaea Weatherstone for catching allof our mistakes. Finally, to all the people who work behind the scenes, thankyou for your support of this project.
1There are times when a bit of a pain in the neck is a good thing. Rich would like to thankJim for his enduring good nature and understanding of the predicaments Rich finds himselfinvolved with from time to time. We do make a good team because we have come to understandthat although we work together each has his own methods when it comes to his work. Overall,mutual respect and understanding have helped us endure some trials and tribulations, and atthe end of the day we can open a beer and still find a good laugh to share.
ix
Contents
Introduction xxiii
Part I Networking Nuts and Bolts 1
Chapter 1 Introduction to Networking 3Networking: A Brief Introduction 4
Internetworking 5An internet 6The Internet 6Intranets (Give Me an ‘‘A’’, Remove My ‘‘E’’, Now Flip the
‘‘R’’ and the ‘‘A’’) 7Extranets 7Virtual Private Networks 8Catenet 9Area Networks 9
Network Relationships and Topologies 13Network Relationship Types 13Network Topology Types 17
Protocols 24Transmission Control Protocol 26User Datagram Protocol 27Internet Protocol 27
History of Networking 28Standards and Standards Organizations 32
American National Standards Institute 34International Organization for Standardization 35International Electrotechnical Commission 36Telecommunications Industry Association 36
xi
xii Contents
Electronic Industries Alliance 37International Telecommunication Union 37IEEE 38
IEEE 802 Working Groups 38IEEE 802.1 39IEEE 802.3 41IEEE 802.5 41IEEE 802.11 42
Internet Society (ISOC) 43Internet Engineering Task Force 43
An Introduction to the OSI Reference Model 45All People Seem to Need Data Processing — A Mnemonic
Device 46A Layered Approach 47
Layer 7 — The Application Layer 48Layer 6 — The Presentation Layer 49Layer 5 — The Session Layer 50Layer 4 — The Transport Layer 50Layer 3 — The Network Layer 51Layer 2 — The Data Link Layer 52Layer 1 — The Physical Layer 53
TCP/IP, Please (and Don’t Be Stingy with the IP) 53TCP/IP Applications 55TCP/IP Utilities 56The TCP/IP Reference Model 57
Chapter Exercises 58Pop Quiz Answers 60
Chapter 2 LANs, MANs, and WANs 63Local Area Networks 64
LAN Standards 64802.2 Logical Link Control 64802.3 CSMA/CD Access Method and Physical Layer 66802.5 Token Ring Access Method and Physical Layer 70The Collision Domain Battle 73The Most Common Wireless Standards 76
LAN Topologies 77Token Ring Network Topologies 79Bus Networks Topologies 83
Metropolitan Area Networks 93Fiber Distributed Data Interface 93A MAN Example 96
Wide Area Networks 98Whose POTS? 99
Contents xiii
Integrated Services Digital Network 100Point-to-Point WANs 101Frame Relay 103Using the Internet for Your WAN 105
Chapter Exercises 107Pop Quiz Answers 108
Chapter 3 Network Hardware and Transmission Media 109Stuff You Just Need to Know 110
Bits, Bytes, and Binary 110Non-human Resources 112
Volatile Memory 114Nonvolatile Memory 115
Encapsulation 117Data Communication Equipment and Data Terminal
Equipment 120All Your Base Are Belong to Us 120Computer Buses 121IP Addressing 121
Transmission Media 123Network Cabling 124
Twisted Pair Cable 125Coaxial Cable 129Fiber Optic Cable 131
Wireless Communication 133Network Hardware 133
End-User Interface Hardware Types 134Connecting End Users 134
Network Interfaces and Adapters 136Network Interface Controllers 138
To Boldly Go Where Data Needs to Flow (or, How Does thatE-mail Get to Brother Joel?) 139
Concentrators 140Hubs 141Media Access Units 142Repeaters 143Bridges and Switches 143Routers 146Layer 3 Switches 148Upper-Layer Switch Types 148Remote Access 150Servers 154
Chapter Exercises 154Pop Quiz Answers 155
xiv Contents
Chapter 4 Operating Systems and Networking Software 157Computer Operating System Basics 158
CPU Basics 158Computer Basics 161
Read-Only Memory 162Random-Access Memory 162Mass Storage System 164Input/Output System 166
Operating System Basics 167Network Operating System Basics 169
Peer-to-Peer Networking 171File Sharing on a Peer-to-Peer Network 181Printer Sharing on a Peer-to-Peer Network 183
Other Operating Systems 185Unix 185Linux 188Sun Solaris 191
Chapter Exercises 193Pop Quiz Answers 194
Chapter 5 The TCP/IP Protocol Suite 197The TCP/IP Layers 198Popular TCP/IP Protocols 201
The Application Layer 202Domain Name System 202Simple Network Management Protocol 206File Transfer Protocol 212Trivial File Transfer Protocol 217Simple Mail Transfer Protocol 220Network File System 222Telecommunications Network 224Secure Shell Protocol 227
The Transport Layer 228Transmission Control Protocol 228User Datagram Protocol 231
The Internet Layer 232Internet Protocol 233Internet Group Multicast Protocol 234Internet Control Message Protocol 234Routing Information Protocol 235Open Shortest Path First 237Border Gateway Protocol 238Internet Protocol Security 238
End of Chapter Hodgepodge 239
Contents xv
There Is Hope for Diskless Nodes 240A Little More Information on Routing 240Sockets and Ports Are Not the Same Thing 241
Chapter Exercises 244Pop Quiz Answers 245
Chapter 6 Ethernet Concepts 247The Beginning of Ethernet Technology 248Ethernet Components 250
DCE and DTE Cabling Considerations 253Interconnecting Like Ethernet Devices 255
Ethernet and IEEE 802.3’s Relationship to the OSI Model 263Logical Link Control 265Media Access Control 265
Ethernet Frame Format 267Transmitting a Frame 270
Half-Duplex Transmission 270Full-Duplex Transmission 274Autonegotiation 277
Receiving a Frame 279Traffic Optimization 280
Traffic Shaping 281VLAN Tagging 283
Chapter Exercises 285Pop Quiz Answers 285
Chapter 7 Not to Be Forgotten 289Can’t Get Enough of Those LAN Technologies 290
Attached Resource Computer Network 290StarLAN 291Token Ring 292
Token Ring’s Modus Operandi 295Token Ring Media 295The Format of the Token Ring Frame 295
Fiber Distributed Data Interface 298FDDI Does What FDDI Does 298FDDI Node Types 301The FDDI Frame Format 301
As If You Haven’t Had Enough of These Sweet Protocols 303Digital Equipment Company Network 303Xerox Network Systems 305Internetwork Packet Exchange 306Point-to-Point Protocol 313
PPP Encapsulation Method 313
xvi Contents
PPP Link Control Protocol 314PPP Network Control Protocol 314Please, Tell Us More 314PPP Frame Format 314
X.25 315X.25 Operations 318Link Access Procedure, Balanced 319Packet Layer Protocol 320
Asynchronous Transfer Mode 321ATM Generic Cell Format 321An Overview of ATM Operations 322ATM Reference Model 325Traffic Management 326ATM Adaptation Layer Types 327
Frame Relay 328Frame Relay Node Types 329Virtual Circuits . . . Again? 330Data Link Connection Identifier 330Feckens and Beckens 330Local Management Interface 332Frame Relay Frame Format 332
Integrated Services Digital Network 333Basic Rate Interface and Primary Rate Interface 333ISDN Nodes 333The ISDN Reference Model 334
AppleTalk 336AppleTalk Physical and Data Link Layers 336AppleTalk Network Layer 337AppleTalk Upper Layers 338
Chapter Exercises 339Pop Quiz Answers 339
Part II The OSI Layers 343
Chapter 8 The Upper Layers 345Background 346The TCP/IP Model 349
TCP/IP Application Layer 362TCP/IP Transport Layer 362TCP/IP Internet Layer 366TCP/IP Link Layer 367
TCP/IP Link Layer Protocols 370OSI Application Layer 372OSI Presentation Layer 374OSI Session Layer 374
Contents xvii
Chapter Exercises 376Pop Quiz Answers 377
Chapter 9 The Transport Layer 379The Terms and Conditions of Chapter 9 380
End-to-End Delivery 380Standards 381
ISO/IEC 8072 381ISO/IEC 8073 382
This, That, and the Other 382Types of Transport Service 382Data Units 383Classes of Transport Service 383Types of Network Service 383Multiplexing 384
Transport Layer Operations 387Connection-Oriented Operations 387
Setting Up the Connection 388Maintaining the Connection 389Terminating the Connection 389
Connectionless Operations 390Transport Layer Protocols 393
A Few More Words about TCP 393The TCP Header Format 395A Little More on UDP 397The UDP Header Format 398
The Meaning of Control 399Chapter Exercises 399Pop Quiz Answers 400
Chapter 10 The Network Layer 403Network Connection Types 404
Connectionless Network Services 405Connection-Oriented Network Services 410Domain Name Services 412
TCP/IP Network Layer Protocols 417Internet Protocol 417
Internet Protocol Version 4 418Internet Protocol Version 6 423
Internet Control Message Protocol 425Ping 425Traceroute 427
Internet Group Management Protocol 429Internet Protocol Security 431
xviii Contents
Chapter Exercises 433Pop Quiz Answers 433
Chapter 11 The Data Link Layer 435Concerns of the LAN 436
It Just Is 436Highs and Lows 437
Accessing the Medium 439Rules of Accessing the Medium 439From Tokens to Contention 440
Using the Token Method 441Using the Contention Method 442
Meet the Sublayers 443Logical Link Control 444
LLC Framing 444Subnetwork Access Protocol 447
The MAC Sublayer 449The MAC Address 450Access Control for the Channel 450
The ‘‘ings’’ — Casting, Detecting, and Addressing 451Data Link Addressing 451
The MAC Address Format 452Unicast Addressing 453Multicast Addressing 454
Error Detection 457Control of the Flow 464
‘‘Knode’’ the LAN 465Diary of a Network Bridge 466
Unicast Operation 467Multicast Operation 469When the Bridge Just Does Not Know 469
The Address Table 470Chapter Exercises 472Pop Quiz Answers 472
Part III Network Design and Implementation 475
Chapter 12 Design Methodologies 477Your Task Is to Design a Network 478
Types of Organizational LANs 479Other Things to Consider 480Building the Foundation 480
Let’s Start Planning 481Development of Scope 481
Contents xix
You Are Not Alone 483A Hierarchical Design Model 483
Access Layer 483Distribution Layer 485Core Layer 486Why Hierarchical? 489
5-4-3-2-1, Speed Is Not the Big Concern 491Making Determinations 492
Determining Which Topology to Use 493Bus Network Topology 493Star Network Topology 494Ring Network Topology 495
Determining Which Nodes to Use 496Traditional Nodes 497Node Evolution 501
LAN Switching Technology 505Switch Types 506By All Means, Be Redundant 506I’m Loopy! 507Link Aggregation 513Virtual LANs 514
Determining What Other Determinations Need to BeDetermined 518
Talking to a WAN 518Management and Security 519Choosing Protocols 521Proactive Thinking 522
Network Implementation 522Chapter Exercises 523Pop Quiz Answers 524
Chapter 13 Implementation 527Planning 528
Totally New Network Planning Phase 529Initial Planning 530Finalizing the Plan 542
Network Revision Planning 544Reworking Network Access 544Upgrading a Network’s Core Routers 546Upgrading the Network’s Distribution Components 547
Network Supporting Infrastructure 547Budgeting 548Staging 549Rollout 550Verification 551
xx Contents
Documentation 553The Final Stretch 554Chapter Exercise 556Pop Quiz Answer 557
Part IV Managing and Maintaining the Network 559
Chapter 14 Network Security 561Elements of Network Security 562
Network Security Policies 562Network Access Control 566
Network Premises Access Security 566Network Access Security and Control 568Restricting Network Access 571
Network Data Integrity 573Network Security Monitoring 575Network Security Assurance 576
Network Security Methodologies 577Authentication 578
Lightweight Directory Access Protocol 578RADIUS 584Certificates 585
Data Integrity 588Point-to-Point Tunneling Protocol 591Layer 2 Tunneling Protocol 592Internet Protocol Security 592
Chapter Exercises 595Pop Quiz Answers 595
Chapter 15 Network Management 597Operation 598
Help Desk Software 600Network Operations Staff 601Network Monitoring 602
Administration 604Network Management Staff Members 604
Executive Level 605Department Heads/Managers 605
Maintenance 610Provisioning 612Tools 613
Simple Network Management Protocol 615Packet-Capture Capability 618
Chapter Exercises 620Pop Quiz Answers 620
Contents xxi
Chapter 16 Troubleshooting 621The Little LAN that Cried Wolf 622
Feedback 623End-User Feedback 623Management Station Feedback 624Hmm . . . 624
What Could Possibly Go Wrong? 624Food for Thought 625
The Proactive Approach Beats the Reactive Approach HandsDown 627
Baseline 627Proactive Documentation 628There Is No Such Thing as Too Much 630
Troubleshooting Tools 631Helpful TCP/IP Utilities 631
Ping 632Traceroute 634Netstat 637Route 639Arp 642Ipconfig 643
More Helpful Tools 646Even More Helpful Tools 647
A Logical Order 648Define the Problem 649Consider the Possibilities 649Determine the Issue 650Find a Possible Solution 650Test the Possible Solution 651Develop an Action Plan 651Implement the Action Plan 652Monitor the Results 652Another Fantastic Bonus from the Authors 653
Layered Strategy 654Common Lower-Layer Issues 656
Layer 1 656Layer 2 657Layer 3 658
Thoughts Pertaining to the Upper Layers 659Troubleshooting Examples 660
Example 1: PC Can’t Connect 661Example 2: Reading a Sniffer Trace 663Example 3: Identifying a Broadcast Storm 665
xxii Contents
Example 4: VPN Client Can’t Connect to VPN Server 666Example 5: Two Common LAN Issues 667
Duplex Mismatch 668Spanning Tree 669
Chapter Exercises 671Pop Quiz Answers 672
Appendix A Additional Exercises 675
Appendix B Exercise Answers 701
Appendix C Glossary 765
Appendix D Acronyms 793
Index 805
Edwards f04.tex V3 - 03/27/2009 11:10am Page xxiii
Introduction
The tremendous growth of local area networks (LANs) into the organizational,corporate, and home networks in the last 20 years has shown that there is aneed for individuals with networking experience, and that need will remainfor a long time coming. The U.S. Department of Labor forecasts an increase of58 percent in the network and system support job market by 2016. With thatgrowth comes opportunities for individuals with networking knowledge tosecure their future.
There are very few instances where a business is run without a networkof some sort. Retail environments maintain inventory, report income, trans-fer personnel information, and many other functions are handled within aLAN. LAN-to-LAN communication, secure tunneling, encryption and authen-tication, and many other functions are now handled by specific nodes andapplication programs that are part of the network.
In the beginning, most LANs were created around a shared data communi-cation channel. Although not very reliable, these networks laid the foundationfor the LANs of today. In the late 1980s, LANs migrated from a shared mediumto more standardized and reliable media. These were twisted pair cabling andthe use of a node called a hub. End-user needs were also a driving force insome of the advancements made in all facets of networking technology. Today,the advancements made in areas related to networking are far superior thanwhat one would have dreamed possible back in the days of punch card codingand computers that filled huge rooms.
We have written this book to serve as a self-study guide for individualslooking to move into a networking career. Written as a basic networking guide,the book covers networking technologies, including the hardware, software,transmission media, and data transfer processes, along with operating systemsand systems software; LANs, WANs, and MANs; and the interactions ofnetwork components.
xxiii
Edwards f04.tex V3 - 03/27/2009 11:10am Page xxiv
xxiv Introduction
How this Book Is Organized
The book is divided into four sections.
Part I: Networking Nuts and BoltsThe first part of the book teaches the essentials of networking. It is made upof seven chapters. The information covered in this part is a basic overview ofmany technologies used in networking today.
Chapter 1, ‘‘Introduction to Networking,’’ provides a review of basicnetworking concepts, including network types, relationships, topologies,protocols, history of networking, networking topologies, and standardsand standards organizations. This chapter is intended as a primer forthe target reader of the book. It can also be a great refresher chapter forthose of us who like to get back to the basics from time to time. Thischapter sets the framework for the rest of the book. Some importantinsights are provided into the relationship between network architectureand implementation, along with a lot of the history behind the devel-opment of modern LAN technology and the relevant standards.
Chapter 2, ‘‘LANs, MANs, and WANs,’’ explains the details of area net-works, including the practices, standards, and standards organizationsthat operate at each level.
Chapter 3, ‘‘Network Hardware and Transmission Media,’’ takesa glance at the hardware and cabling that make up a network.Additionally, there is an introduction to binary numbering, IPaddressing, and Ethernet concepts that provides an introductionto the in-depth coverage of these topics throughout this book.
Chapter 4, ‘‘Operating Systems and Networking Software,’’ covers theprograms that are involved in a given network. The chapter showshow the operating systems interact with the components withina node and some of the basic services that are provided becauseof these interactions. Details are provided on how peer-to-peernetworking operates, and the services and standards that allowthis to happen. Finally, an overview of the more popular operatingstandards that are found in networks around the world is provided.
Chapter 5, ‘‘The TCP/IP Protocol Suite,’’ explains how the suite allowsdata communication to take place. No matter where a device is located,if it has a connection to the Internet and the device supports TCP/IP, youhave a connection to the world. The chapter also covers the more popu-lar TCP/IP protocols and what these technologies and standards do.
Edwards f04.tex V3 - 03/27/2009 11:10am Page xxv
Introduction xxv
Chapter 6, ‘‘Ethernet Concepts,’’ explains the term Ethernet andhow it is used to describe the most common network architectureused in a majority of today’s networks. Beginning from the devel-opment of Ethernet all the way to current Ethernet technology, youwill gain insight in the predominant LAN technology of today.
Chapter 7, ‘‘Not to Be Forgotten,’’ provides a basic overview of themost commonly deployed standards and technologies in networkingtoday. From standards that are the tried and true technologiesto the up-and-coming standards, this chapter will provide youwith the understanding of the protocol and how it is used.
Part II: The OSI LayersThe second part of the book builds on the fundamentals discussed earlier toexplore advanced features and capabilities offered in many of the standardsthat we discussed in the first part of the book. We provide an overview of theindividual layers of the OSI model, and explain how the layers work with oneanother to communicate.
Chapter 8, ‘‘The Upper Layers,’’ covers the upper layers of the OSIreference model: the Application layer, Presentation layer, andSession layer. The chapter also provides information relating to the‘‘translators’’ used so that information can flow smoothly and withouterror between these layers and eventually be sent over the networkmedium to another network node and the device servicing that node.
Chapter 9, ‘‘The Transport Layer,’’ explains how the Trans-port layer interacts with the Network layer and the Sessionlayer. This layer is responsible for the end-to-end connectionand datagram delivery, as well as congestion control and flowcontrol. How connections are set up, monitored, and takendown is discussed. Operations of connection-oriented and con-nectionless protocols are also explained, with some furtherexploration of some protocols that operate at this layer.
Chapter 10, ‘‘The Network Layer,’’ looks at the Network layer andexplains how it interfaces with the Data Link and Transport layers incommunication processes.
Chapter 11, ‘‘The Data Link Layer,’’ discusses the Data Link layer andhow it is used to allow for direct communication between networknodes over a physical channel. Covered are topics such as one-to-onecommunication as well as one-to-many. We cover concerns that areexperienced in a LAN, as well as some of the mechanisms that are in
Edwards f04.tex V3 - 03/27/2009 11:10am Page xxvi
xxvi Introduction
place to recover from problems. In addition to the operations of thislayer, we discuss the use of Layer 2 switches and bridges in a LAN.
Part III: Network Design and ImplementationThe third part of the book takes the information that was covered in the firsttwo parts and uses it to show provide practical insight into how thoughtprocesses work in network design.
Chapter 12, ‘‘Design Methodologies,’’ covers every facet of networkingdesign, from inception to rollout. More of a guide that can be followed,the information that is provided will allow you to understand(and possibly develop) design concepts for a given network.
Chapter 13, ‘‘Implementation,’’ expands on the information inChapter 12 and walks you through the process of implementingyour design. At the end of the chapter is an exercise that willallow you to test all that you covered in this part of the book.
Part IV: Managing and Maintaining the NetworkThe last part of the book wraps up our journey to learning networking andcovers the important tasks of securing, managing, and troubleshooting issueswithin a given network.
Chapter 14, ‘‘Network Security,’’ details the security con-cerns that those who manage networks need to be aware ofand what you can do to assist in preventing attacks.
Chapter 15, ‘‘Network Management,’’ considers the extra functionalitythat allows nodes to be configured and managed and also allowsfor traffic monitoring and analysis. The chapter explains the SimpleNetwork Management Protocol (SNMP), along with the structureand content of the management database. Special considerationis given to network operations, including software, staffing andsupport types, and network management and monitoring tools.
Chapter 16, ‘‘Troubleshooting’’ details the top troubleshooting strategiesfor any network. The chapter covers the frequent issues that mayarise and outlines some troubleshooting strategies. It also gives anoverview of the troubleshooting process from beginning to end.
This book also includes the following four appendixes:
Appendix A, ‘‘Additional Exercises’’ contains 265 additional questions,broken down by the chapters in which the answers can be found.
Edwards f04.tex V3 - 03/27/2009 11:10am Page xxvii
Introduction xxvii
Appendix B, ‘‘Exercise Answers’’ provides an answer to all of thequestions that were asked throughout the book. It’s up to you (oryour instructor) how these can be used. We suggest you try to answerthe questions before peeking . . . they are really quite simple.
Appendix C, ‘‘Glossary’’ provides gives definitions for thetechnical terms that are used throughout the book.
Appendix D, ‘‘Acronyms’’ contains a multitude of common networkingabbreviations and acronyms.
Who Should Read This Book
This book is a self-study guide that is geared toward individuals who have abackground in information technology and want to migrate into a networkingcareer, and individuals who are working for a certification or a degree in anetworking field of study. Some of these career fields include
Computer engineering
Network sales and marketing
Networking engineering
Networking support
Network field service engineering
Network planning
Network design
Network administration
Network security
Network operations
The reader is assumed to be at least casually familiar with computers andinformation technology. It is not necessary to understand any networkingconcepts, as we cover networks from very basic concepts to more advancedprotocols and standards that mandate today’s technology, as well as futuregrowth.
There is no attempt on our part to provide a complete, from-the-ground-uptutorial that will make you a professional in networking. That would be a taskrequiring several volumes of work. Our focus was to provide you with theinformation you need to have some experience for any popular standard inuse in networking today.
The readers of this book can expect to learn everything they need tounderstand the concepts of networking. We have also provided addresses of
Edwards f04.tex V3 - 03/27/2009 11:10am Page xxviii
xxviii Introduction
websites you can explore to better understand the specifics of a standard thatyou have an interest in learning more about. Upon completion of this guide,you will have a knowledge of the more popular technologies out there and inthe process you will learn about why things work and get some insight intothe reasons why things in networking are the way it is.
N O T E If you are interested, we have provided two course syllabi on our website(www.wiley.com/compbooks). One syllabus is formatted for a quarter and theother will fit with an 18-month course schedule.
A Few Words from the Authors
We hope that you enjoy reading this book as much as we enjoyed writing it.We attempted to tie it all together, while providing details to some currentand up and coming practices that you will come across at some point in yourcareer.
ACRONYM ALERT
VMS — Virtual memory system
As you start reading the book, you willnotice that we have included a few extrasthroughout each chapter. Some of these willshow up as an Acronym Alert or a Ran-dom Bonus Definition. Here are a couple ofexamples:
RANDOM BONUS DEFINITION
10BASE5 — A baseband Ethernet systemoperating at 10 Mbps over thick coaxialcable.
Don’t get confused when youcome across these. The defini-tions and acronyms are randomand do not necessarily applyto the subject in the particularchapter. We did this on pur-pose. One reason is that it helpsbreak the monotony that onemay experience when reading through these darn technical books. The otherreason is that it will hopefully help you to remember the terms as you progressthrough the book.
Another extra that we have included are our pop quizzes, which do apply tomaterial that has been covered in that particular chapter. Here is an example:
POP QUIZ
Name 10 issues that you might have on theLAN.
At the end of each chapterare the answers to the popquiz questions in that particu-lar chapter. This should serveas a quick reference for you asyou progress through the book.Additionally, each chapter will