Edwards ffirs.tex V3 - 03/27/2009 10:42am Page...

30
N ETWORKIN G SELF-TEACHING GUIDE OSI, TCP/IP, LANs, MANs, WANs, Implementation, Management, and Maintenance James Edwards Richard Bramante

Transcript of Edwards ffirs.tex V3 - 03/27/2009 10:42am Page...

NETWORKINGS E L F - TE A C H I N G G U I D E

OSI, TCP/IP, LANs, MANs, WANs, Implementation, Management, and Maintenance James Edwards

Richard Bramante

Select, design, and implement a network If you want to make the move into a networking career, this is the resource for you. It

covers the technologies you need to know, including the hardware, software, data transfer

processes, and more. Th is guide fi rst takes you through the essentials of networking and

progresses through the advanced features and capabilities available in many of the standards.

You’ll then delve into network design as well as the important tasks of securing, managing,

and troubleshooting issues within a given network.

James Edwards has over 10 years of experience as a Premium

Support Network Engineer. He also served as a technical

editor and expert in networking technologies.

Rich Bramante has been a network engineer for 10 years

as well as a technical lead. He was also a technical writer

for functional specifi cations and testing procedures.

• Manage all the components within a node

• Take advantage of the Ethernet, today’s most prominent LAN technology

• Utilize the most commonly deployed standards and technologies in networking

• Ensure that information fl ows smoothly and without error between the upper layers

• Allow for direct communication between network nodes over a physical channel

• Apply and develop design concepts for a given network

• Prevent network attacks and perform traffi c monitoring and analysis

• Troubleshoot any network problem using proven strategies

Cover Image: © Chad Baker/Photodisc/Getty Images

Networking / General

$60.00 US$72.00 CAN

Visit our Web site at www.wiley.com/compbooksN

ET

WO

RK

ING

S

EL

F-

TE

AC

HI

NG

GU

ID

E

EdwardsBramante

Edwards ffirs.tex V3 - 03/27/2009 10:42am Page ii

Edwards ffirs.tex V3 - 03/27/2009 10:42am Page i

NetworkingSelf-Teaching Guide

Edwards ffirs.tex V3 - 03/27/2009 10:42am Page ii

Edwards ffirs.tex V3 - 03/27/2009 10:42am Page iii

NetworkingSelf-Teaching Guide

OSI, TCP/IP, LANs, MANs, WANs,Implementation, Management,

and Maintenance

James EdwardsRichard Bramante

Wiley Publishing, Inc.

Edwards ffirs.tex V3 - 03/27/2009 10:42am Page iv

Networking Self-Teaching Guide

Published byWiley Publishing, Inc.10475 Crosspoint BoulevardIndianapolis, IN 46256www.wiley.com

Copyright © 2009 by Wiley Publishing, Inc., Indianapolis, Indiana

Published simultaneously in Canada

ISBN: 978-0-470-40238-2

Manufactured in the United States of America

10 9 8 7 6 5 4 3 2 1

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form orby any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permittedunder Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior writtenpermission of the Publisher, or authorization through payment of the appropriate per-copy fee to theCopyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, JohnWiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online athttp://www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations orwarranties with respect to the accuracy or completeness of the contents of this work and specifically disclaimall warranties, including without limitation warranties of fitness for a particular purpose. No warranty maybe created or extended by sales or promotional materials. The advice and strategies contained herein may notbe suitable for every situation. This work is sold with the understanding that the publisher is not engaged inrendering legal, accounting, or other professional services. If professional assistance is required, the servicesof a competent professional person should be sought. Neither the publisher nor the author shall be liable fordamages arising herefrom. The fact that an organization or Web site is referred to in this work as a citationand/or a potential source of further information does not mean that the author or the publisher endorses theinformation the organization or Web site may provide or recommendations it may make. Further, readersshould be aware that Internet Web sites listed in this work may have changed or disappeared between whenthis work was written and when it is read.

Library of Congress Cataloging-in-Publication Data:

Edwards, James, 1962-Networking self-teaching guide : OSI, TCP/IP, LANs, MANs, WANs, implementation, management, and

maintenance / James Edwards, Richard Bramante.p. cm.

Includes index.ISBN 978-0-470-40238-2 (pbk.)1. Computer networks. 2. Computer network protocols. 3. Computer network architectures. I. Bramante,Richard, 1944- II. Title.TK5105.5.E28 2009004.6’5 — dc22

2009004168

For general information on our other products and services please contact our Customer Care Departmentwithin the United States at (877) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.

Trademarks: Wiley and the Wiley logo are trademarks or registered trademarks of John Wiley & Sons, Inc.and/or its affiliates, in the United States and other countries, and may not be used without written permission.All other trademarks are the property of their respective owners. Wiley Publishing, Inc. is not associated withany product or vendor mentioned in this book.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may notbe available in electronic books.

Edwards ffirs.tex V3 - 03/27/2009 10:42am Page v

This book is dedicated to my brother, Joel, for all that he has done for somany over the years. I sincerely hope that he will forever be able to enjoyall of the good things that life has to offer. Whether he knows it or not, hehas always been a source of inspiration for me and his encouragementhas kept me going whenever a challenge was thrown my way. The best

brother in the world! That’s my brother, Joel.— Jim Edwards

This book is dedicated to those who have supported me, not just duringthe writing of this book, but throughout my life. There have been manyand too numerous to mention, but to all who have been there for me, Iam deeply grateful. Deserving special mention are: My son, Rich; his

wife, Michelle; my three grandchildren, Vanessa, Ethan, and Olivia; myparents; my siblings, Margaret, Mary, Josephine, Frank, and Salvatore;and the person who believed in me, unfailingly, even through all my

blunders, my deceased wife, Barbara.— Rich Bramante

Edwards ffirs.tex V3 - 03/27/2009 10:42am Page vi

Edwards f01.tex V2 - 03/27/2009 10:44am Page vii

About the Authors

Jim Edwards has more than 10 years of experience supporting data networksas a Premium Support Engineer. He has authored four books pertaining todata networking, as well as served as a technical editor.

Rich Bramante earned both a bachelor’s and master’s degree in electricalengineering from the University of Massachusetts – Lowell. He has worked inthe technology industry for more than 40 years. For the past 11 years, he hasworked for a major telecommunications equipment manufacturer, primarilywithin the VPN technology area.

vii

Edwards f02.tex V3 - 03/27/2009 3:50pm Page viii

Credits

Executive EditorCarol Long

Development EditorJohn Sleeva

Technical EditorDon Thoreson

Production EditorAngela Smith

Copy EditorLunaea Weatherstone

Editorial ManagerMary Beth Wakefield

Production ManagerTim Tate

Vice President and ExecutiveGroup PublisherRichard Swadley

Vice President and ExecutivePublisherBarry Pruett

Associate PublisherJim Minatel

Project Coordinator, CoverLynsey Stanford

ProofreaderPublication Services, Inc.

IndexerJack Lewis

Cover Image© Chad Baker/Photodisc/GettyImages

Cover DesignerMichael Trent

Edwards f03.tex V1 - 03/27/2009 11:21am Page ix

Acknowledgments

First and foremost, Jim wants to thank Rich for being such a great co-author towork with. Rich and Jim had the opportunity to work together on a previousbook and we make a great team. Jim is a bit of a pain in the neck,1 so Rich mayhave other opinions on this whole team thing.

We would also like to send out a huge word of thanks for all of theindividuals involved in the development of this book. To Carol Long, thankyou for bringing the idea to us and trusting us to see it through. We reallyenjoyed it as much as we all thought we would. We also want to send a wordof thanks to the development editor, John Sleeva, for keeping us in line. Itwas a pleasure working with you, sir. To Angela Smith, thank you for all theassistance you gave us during the production phase. It is always nice to workwith people who are as friendly and helpful as everyone we have had thepleasure of working with at Wiley. Additionally, thank you to Don Thorensonfor being our technical guinea pig and to Lunaea Weatherstone for catching allof our mistakes. Finally, to all the people who work behind the scenes, thankyou for your support of this project.

1There are times when a bit of a pain in the neck is a good thing. Rich would like to thankJim for his enduring good nature and understanding of the predicaments Rich finds himselfinvolved with from time to time. We do make a good team because we have come to understandthat although we work together each has his own methods when it comes to his work. Overall,mutual respect and understanding have helped us endure some trials and tribulations, and atthe end of the day we can open a beer and still find a good laugh to share.

ix

Edwards f03.tex V1 - 03/27/2009 11:21am Page x

Contents

Introduction xxiii

Part I Networking Nuts and Bolts 1

Chapter 1 Introduction to Networking 3Networking: A Brief Introduction 4

Internetworking 5An internet 6The Internet 6Intranets (Give Me an ‘‘A’’, Remove My ‘‘E’’, Now Flip the

‘‘R’’ and the ‘‘A’’) 7Extranets 7Virtual Private Networks 8Catenet 9Area Networks 9

Network Relationships and Topologies 13Network Relationship Types 13Network Topology Types 17

Protocols 24Transmission Control Protocol 26User Datagram Protocol 27Internet Protocol 27

History of Networking 28Standards and Standards Organizations 32

American National Standards Institute 34International Organization for Standardization 35International Electrotechnical Commission 36Telecommunications Industry Association 36

xi

xii Contents

Electronic Industries Alliance 37International Telecommunication Union 37IEEE 38

IEEE 802 Working Groups 38IEEE 802.1 39IEEE 802.3 41IEEE 802.5 41IEEE 802.11 42

Internet Society (ISOC) 43Internet Engineering Task Force 43

An Introduction to the OSI Reference Model 45All People Seem to Need Data Processing — A Mnemonic

Device 46A Layered Approach 47

Layer 7 — The Application Layer 48Layer 6 — The Presentation Layer 49Layer 5 — The Session Layer 50Layer 4 — The Transport Layer 50Layer 3 — The Network Layer 51Layer 2 — The Data Link Layer 52Layer 1 — The Physical Layer 53

TCP/IP, Please (and Don’t Be Stingy with the IP) 53TCP/IP Applications 55TCP/IP Utilities 56The TCP/IP Reference Model 57

Chapter Exercises 58Pop Quiz Answers 60

Chapter 2 LANs, MANs, and WANs 63Local Area Networks 64

LAN Standards 64802.2 Logical Link Control 64802.3 CSMA/CD Access Method and Physical Layer 66802.5 Token Ring Access Method and Physical Layer 70The Collision Domain Battle 73The Most Common Wireless Standards 76

LAN Topologies 77Token Ring Network Topologies 79Bus Networks Topologies 83

Metropolitan Area Networks 93Fiber Distributed Data Interface 93A MAN Example 96

Wide Area Networks 98Whose POTS? 99

Contents xiii

Integrated Services Digital Network 100Point-to-Point WANs 101Frame Relay 103Using the Internet for Your WAN 105

Chapter Exercises 107Pop Quiz Answers 108

Chapter 3 Network Hardware and Transmission Media 109Stuff You Just Need to Know 110

Bits, Bytes, and Binary 110Non-human Resources 112

Volatile Memory 114Nonvolatile Memory 115

Encapsulation 117Data Communication Equipment and Data Terminal

Equipment 120All Your Base Are Belong to Us 120Computer Buses 121IP Addressing 121

Transmission Media 123Network Cabling 124

Twisted Pair Cable 125Coaxial Cable 129Fiber Optic Cable 131

Wireless Communication 133Network Hardware 133

End-User Interface Hardware Types 134Connecting End Users 134

Network Interfaces and Adapters 136Network Interface Controllers 138

To Boldly Go Where Data Needs to Flow (or, How Does thatE-mail Get to Brother Joel?) 139

Concentrators 140Hubs 141Media Access Units 142Repeaters 143Bridges and Switches 143Routers 146Layer 3 Switches 148Upper-Layer Switch Types 148Remote Access 150Servers 154

Chapter Exercises 154Pop Quiz Answers 155

xiv Contents

Chapter 4 Operating Systems and Networking Software 157Computer Operating System Basics 158

CPU Basics 158Computer Basics 161

Read-Only Memory 162Random-Access Memory 162Mass Storage System 164Input/Output System 166

Operating System Basics 167Network Operating System Basics 169

Peer-to-Peer Networking 171File Sharing on a Peer-to-Peer Network 181Printer Sharing on a Peer-to-Peer Network 183

Other Operating Systems 185Unix 185Linux 188Sun Solaris 191

Chapter Exercises 193Pop Quiz Answers 194

Chapter 5 The TCP/IP Protocol Suite 197The TCP/IP Layers 198Popular TCP/IP Protocols 201

The Application Layer 202Domain Name System 202Simple Network Management Protocol 206File Transfer Protocol 212Trivial File Transfer Protocol 217Simple Mail Transfer Protocol 220Network File System 222Telecommunications Network 224Secure Shell Protocol 227

The Transport Layer 228Transmission Control Protocol 228User Datagram Protocol 231

The Internet Layer 232Internet Protocol 233Internet Group Multicast Protocol 234Internet Control Message Protocol 234Routing Information Protocol 235Open Shortest Path First 237Border Gateway Protocol 238Internet Protocol Security 238

End of Chapter Hodgepodge 239

Contents xv

There Is Hope for Diskless Nodes 240A Little More Information on Routing 240Sockets and Ports Are Not the Same Thing 241

Chapter Exercises 244Pop Quiz Answers 245

Chapter 6 Ethernet Concepts 247The Beginning of Ethernet Technology 248Ethernet Components 250

DCE and DTE Cabling Considerations 253Interconnecting Like Ethernet Devices 255

Ethernet and IEEE 802.3’s Relationship to the OSI Model 263Logical Link Control 265Media Access Control 265

Ethernet Frame Format 267Transmitting a Frame 270

Half-Duplex Transmission 270Full-Duplex Transmission 274Autonegotiation 277

Receiving a Frame 279Traffic Optimization 280

Traffic Shaping 281VLAN Tagging 283

Chapter Exercises 285Pop Quiz Answers 285

Chapter 7 Not to Be Forgotten 289Can’t Get Enough of Those LAN Technologies 290

Attached Resource Computer Network 290StarLAN 291Token Ring 292

Token Ring’s Modus Operandi 295Token Ring Media 295The Format of the Token Ring Frame 295

Fiber Distributed Data Interface 298FDDI Does What FDDI Does 298FDDI Node Types 301The FDDI Frame Format 301

As If You Haven’t Had Enough of These Sweet Protocols 303Digital Equipment Company Network 303Xerox Network Systems 305Internetwork Packet Exchange 306Point-to-Point Protocol 313

PPP Encapsulation Method 313

xvi Contents

PPP Link Control Protocol 314PPP Network Control Protocol 314Please, Tell Us More 314PPP Frame Format 314

X.25 315X.25 Operations 318Link Access Procedure, Balanced 319Packet Layer Protocol 320

Asynchronous Transfer Mode 321ATM Generic Cell Format 321An Overview of ATM Operations 322ATM Reference Model 325Traffic Management 326ATM Adaptation Layer Types 327

Frame Relay 328Frame Relay Node Types 329Virtual Circuits . . . Again? 330Data Link Connection Identifier 330Feckens and Beckens 330Local Management Interface 332Frame Relay Frame Format 332

Integrated Services Digital Network 333Basic Rate Interface and Primary Rate Interface 333ISDN Nodes 333The ISDN Reference Model 334

AppleTalk 336AppleTalk Physical and Data Link Layers 336AppleTalk Network Layer 337AppleTalk Upper Layers 338

Chapter Exercises 339Pop Quiz Answers 339

Part II The OSI Layers 343

Chapter 8 The Upper Layers 345Background 346The TCP/IP Model 349

TCP/IP Application Layer 362TCP/IP Transport Layer 362TCP/IP Internet Layer 366TCP/IP Link Layer 367

TCP/IP Link Layer Protocols 370OSI Application Layer 372OSI Presentation Layer 374OSI Session Layer 374

Contents xvii

Chapter Exercises 376Pop Quiz Answers 377

Chapter 9 The Transport Layer 379The Terms and Conditions of Chapter 9 380

End-to-End Delivery 380Standards 381

ISO/IEC 8072 381ISO/IEC 8073 382

This, That, and the Other 382Types of Transport Service 382Data Units 383Classes of Transport Service 383Types of Network Service 383Multiplexing 384

Transport Layer Operations 387Connection-Oriented Operations 387

Setting Up the Connection 388Maintaining the Connection 389Terminating the Connection 389

Connectionless Operations 390Transport Layer Protocols 393

A Few More Words about TCP 393The TCP Header Format 395A Little More on UDP 397The UDP Header Format 398

The Meaning of Control 399Chapter Exercises 399Pop Quiz Answers 400

Chapter 10 The Network Layer 403Network Connection Types 404

Connectionless Network Services 405Connection-Oriented Network Services 410Domain Name Services 412

TCP/IP Network Layer Protocols 417Internet Protocol 417

Internet Protocol Version 4 418Internet Protocol Version 6 423

Internet Control Message Protocol 425Ping 425Traceroute 427

Internet Group Management Protocol 429Internet Protocol Security 431

xviii Contents

Chapter Exercises 433Pop Quiz Answers 433

Chapter 11 The Data Link Layer 435Concerns of the LAN 436

It Just Is 436Highs and Lows 437

Accessing the Medium 439Rules of Accessing the Medium 439From Tokens to Contention 440

Using the Token Method 441Using the Contention Method 442

Meet the Sublayers 443Logical Link Control 444

LLC Framing 444Subnetwork Access Protocol 447

The MAC Sublayer 449The MAC Address 450Access Control for the Channel 450

The ‘‘ings’’ — Casting, Detecting, and Addressing 451Data Link Addressing 451

The MAC Address Format 452Unicast Addressing 453Multicast Addressing 454

Error Detection 457Control of the Flow 464

‘‘Knode’’ the LAN 465Diary of a Network Bridge 466

Unicast Operation 467Multicast Operation 469When the Bridge Just Does Not Know 469

The Address Table 470Chapter Exercises 472Pop Quiz Answers 472

Part III Network Design and Implementation 475

Chapter 12 Design Methodologies 477Your Task Is to Design a Network 478

Types of Organizational LANs 479Other Things to Consider 480Building the Foundation 480

Let’s Start Planning 481Development of Scope 481

Contents xix

You Are Not Alone 483A Hierarchical Design Model 483

Access Layer 483Distribution Layer 485Core Layer 486Why Hierarchical? 489

5-4-3-2-1, Speed Is Not the Big Concern 491Making Determinations 492

Determining Which Topology to Use 493Bus Network Topology 493Star Network Topology 494Ring Network Topology 495

Determining Which Nodes to Use 496Traditional Nodes 497Node Evolution 501

LAN Switching Technology 505Switch Types 506By All Means, Be Redundant 506I’m Loopy! 507Link Aggregation 513Virtual LANs 514

Determining What Other Determinations Need to BeDetermined 518

Talking to a WAN 518Management and Security 519Choosing Protocols 521Proactive Thinking 522

Network Implementation 522Chapter Exercises 523Pop Quiz Answers 524

Chapter 13 Implementation 527Planning 528

Totally New Network Planning Phase 529Initial Planning 530Finalizing the Plan 542

Network Revision Planning 544Reworking Network Access 544Upgrading a Network’s Core Routers 546Upgrading the Network’s Distribution Components 547

Network Supporting Infrastructure 547Budgeting 548Staging 549Rollout 550Verification 551

xx Contents

Documentation 553The Final Stretch 554Chapter Exercise 556Pop Quiz Answer 557

Part IV Managing and Maintaining the Network 559

Chapter 14 Network Security 561Elements of Network Security 562

Network Security Policies 562Network Access Control 566

Network Premises Access Security 566Network Access Security and Control 568Restricting Network Access 571

Network Data Integrity 573Network Security Monitoring 575Network Security Assurance 576

Network Security Methodologies 577Authentication 578

Lightweight Directory Access Protocol 578RADIUS 584Certificates 585

Data Integrity 588Point-to-Point Tunneling Protocol 591Layer 2 Tunneling Protocol 592Internet Protocol Security 592

Chapter Exercises 595Pop Quiz Answers 595

Chapter 15 Network Management 597Operation 598

Help Desk Software 600Network Operations Staff 601Network Monitoring 602

Administration 604Network Management Staff Members 604

Executive Level 605Department Heads/Managers 605

Maintenance 610Provisioning 612Tools 613

Simple Network Management Protocol 615Packet-Capture Capability 618

Chapter Exercises 620Pop Quiz Answers 620

Contents xxi

Chapter 16 Troubleshooting 621The Little LAN that Cried Wolf 622

Feedback 623End-User Feedback 623Management Station Feedback 624Hmm . . . 624

What Could Possibly Go Wrong? 624Food for Thought 625

The Proactive Approach Beats the Reactive Approach HandsDown 627

Baseline 627Proactive Documentation 628There Is No Such Thing as Too Much 630

Troubleshooting Tools 631Helpful TCP/IP Utilities 631

Ping 632Traceroute 634Netstat 637Route 639Arp 642Ipconfig 643

More Helpful Tools 646Even More Helpful Tools 647

A Logical Order 648Define the Problem 649Consider the Possibilities 649Determine the Issue 650Find a Possible Solution 650Test the Possible Solution 651Develop an Action Plan 651Implement the Action Plan 652Monitor the Results 652Another Fantastic Bonus from the Authors 653

Layered Strategy 654Common Lower-Layer Issues 656

Layer 1 656Layer 2 657Layer 3 658

Thoughts Pertaining to the Upper Layers 659Troubleshooting Examples 660

Example 1: PC Can’t Connect 661Example 2: Reading a Sniffer Trace 663Example 3: Identifying a Broadcast Storm 665

xxii Contents

Example 4: VPN Client Can’t Connect to VPN Server 666Example 5: Two Common LAN Issues 667

Duplex Mismatch 668Spanning Tree 669

Chapter Exercises 671Pop Quiz Answers 672

Appendix A Additional Exercises 675

Appendix B Exercise Answers 701

Appendix C Glossary 765

Appendix D Acronyms 793

Index 805

Edwards f04.tex V3 - 03/27/2009 11:10am Page xxiii

Introduction

The tremendous growth of local area networks (LANs) into the organizational,corporate, and home networks in the last 20 years has shown that there is aneed for individuals with networking experience, and that need will remainfor a long time coming. The U.S. Department of Labor forecasts an increase of58 percent in the network and system support job market by 2016. With thatgrowth comes opportunities for individuals with networking knowledge tosecure their future.

There are very few instances where a business is run without a networkof some sort. Retail environments maintain inventory, report income, trans-fer personnel information, and many other functions are handled within aLAN. LAN-to-LAN communication, secure tunneling, encryption and authen-tication, and many other functions are now handled by specific nodes andapplication programs that are part of the network.

In the beginning, most LANs were created around a shared data communi-cation channel. Although not very reliable, these networks laid the foundationfor the LANs of today. In the late 1980s, LANs migrated from a shared mediumto more standardized and reliable media. These were twisted pair cabling andthe use of a node called a hub. End-user needs were also a driving force insome of the advancements made in all facets of networking technology. Today,the advancements made in areas related to networking are far superior thanwhat one would have dreamed possible back in the days of punch card codingand computers that filled huge rooms.

We have written this book to serve as a self-study guide for individualslooking to move into a networking career. Written as a basic networking guide,the book covers networking technologies, including the hardware, software,transmission media, and data transfer processes, along with operating systemsand systems software; LANs, WANs, and MANs; and the interactions ofnetwork components.

xxiii

Edwards f04.tex V3 - 03/27/2009 11:10am Page xxiv

xxiv Introduction

How this Book Is Organized

The book is divided into four sections.

Part I: Networking Nuts and BoltsThe first part of the book teaches the essentials of networking. It is made upof seven chapters. The information covered in this part is a basic overview ofmany technologies used in networking today.

Chapter 1, ‘‘Introduction to Networking,’’ provides a review of basicnetworking concepts, including network types, relationships, topologies,protocols, history of networking, networking topologies, and standardsand standards organizations. This chapter is intended as a primer forthe target reader of the book. It can also be a great refresher chapter forthose of us who like to get back to the basics from time to time. Thischapter sets the framework for the rest of the book. Some importantinsights are provided into the relationship between network architectureand implementation, along with a lot of the history behind the devel-opment of modern LAN technology and the relevant standards.

Chapter 2, ‘‘LANs, MANs, and WANs,’’ explains the details of area net-works, including the practices, standards, and standards organizationsthat operate at each level.

Chapter 3, ‘‘Network Hardware and Transmission Media,’’ takesa glance at the hardware and cabling that make up a network.Additionally, there is an introduction to binary numbering, IPaddressing, and Ethernet concepts that provides an introductionto the in-depth coverage of these topics throughout this book.

Chapter 4, ‘‘Operating Systems and Networking Software,’’ covers theprograms that are involved in a given network. The chapter showshow the operating systems interact with the components withina node and some of the basic services that are provided becauseof these interactions. Details are provided on how peer-to-peernetworking operates, and the services and standards that allowthis to happen. Finally, an overview of the more popular operatingstandards that are found in networks around the world is provided.

Chapter 5, ‘‘The TCP/IP Protocol Suite,’’ explains how the suite allowsdata communication to take place. No matter where a device is located,if it has a connection to the Internet and the device supports TCP/IP, youhave a connection to the world. The chapter also covers the more popu-lar TCP/IP protocols and what these technologies and standards do.

Edwards f04.tex V3 - 03/27/2009 11:10am Page xxv

Introduction xxv

Chapter 6, ‘‘Ethernet Concepts,’’ explains the term Ethernet andhow it is used to describe the most common network architectureused in a majority of today’s networks. Beginning from the devel-opment of Ethernet all the way to current Ethernet technology, youwill gain insight in the predominant LAN technology of today.

Chapter 7, ‘‘Not to Be Forgotten,’’ provides a basic overview of themost commonly deployed standards and technologies in networkingtoday. From standards that are the tried and true technologiesto the up-and-coming standards, this chapter will provide youwith the understanding of the protocol and how it is used.

Part II: The OSI LayersThe second part of the book builds on the fundamentals discussed earlier toexplore advanced features and capabilities offered in many of the standardsthat we discussed in the first part of the book. We provide an overview of theindividual layers of the OSI model, and explain how the layers work with oneanother to communicate.

Chapter 8, ‘‘The Upper Layers,’’ covers the upper layers of the OSIreference model: the Application layer, Presentation layer, andSession layer. The chapter also provides information relating to the‘‘translators’’ used so that information can flow smoothly and withouterror between these layers and eventually be sent over the networkmedium to another network node and the device servicing that node.

Chapter 9, ‘‘The Transport Layer,’’ explains how the Trans-port layer interacts with the Network layer and the Sessionlayer. This layer is responsible for the end-to-end connectionand datagram delivery, as well as congestion control and flowcontrol. How connections are set up, monitored, and takendown is discussed. Operations of connection-oriented and con-nectionless protocols are also explained, with some furtherexploration of some protocols that operate at this layer.

Chapter 10, ‘‘The Network Layer,’’ looks at the Network layer andexplains how it interfaces with the Data Link and Transport layers incommunication processes.

Chapter 11, ‘‘The Data Link Layer,’’ discusses the Data Link layer andhow it is used to allow for direct communication between networknodes over a physical channel. Covered are topics such as one-to-onecommunication as well as one-to-many. We cover concerns that areexperienced in a LAN, as well as some of the mechanisms that are in

Edwards f04.tex V3 - 03/27/2009 11:10am Page xxvi

xxvi Introduction

place to recover from problems. In addition to the operations of thislayer, we discuss the use of Layer 2 switches and bridges in a LAN.

Part III: Network Design and ImplementationThe third part of the book takes the information that was covered in the firsttwo parts and uses it to show provide practical insight into how thoughtprocesses work in network design.

Chapter 12, ‘‘Design Methodologies,’’ covers every facet of networkingdesign, from inception to rollout. More of a guide that can be followed,the information that is provided will allow you to understand(and possibly develop) design concepts for a given network.

Chapter 13, ‘‘Implementation,’’ expands on the information inChapter 12 and walks you through the process of implementingyour design. At the end of the chapter is an exercise that willallow you to test all that you covered in this part of the book.

Part IV: Managing and Maintaining the NetworkThe last part of the book wraps up our journey to learning networking andcovers the important tasks of securing, managing, and troubleshooting issueswithin a given network.

Chapter 14, ‘‘Network Security,’’ details the security con-cerns that those who manage networks need to be aware ofand what you can do to assist in preventing attacks.

Chapter 15, ‘‘Network Management,’’ considers the extra functionalitythat allows nodes to be configured and managed and also allowsfor traffic monitoring and analysis. The chapter explains the SimpleNetwork Management Protocol (SNMP), along with the structureand content of the management database. Special considerationis given to network operations, including software, staffing andsupport types, and network management and monitoring tools.

Chapter 16, ‘‘Troubleshooting’’ details the top troubleshooting strategiesfor any network. The chapter covers the frequent issues that mayarise and outlines some troubleshooting strategies. It also gives anoverview of the troubleshooting process from beginning to end.

This book also includes the following four appendixes:

Appendix A, ‘‘Additional Exercises’’ contains 265 additional questions,broken down by the chapters in which the answers can be found.

Edwards f04.tex V3 - 03/27/2009 11:10am Page xxvii

Introduction xxvii

Appendix B, ‘‘Exercise Answers’’ provides an answer to all of thequestions that were asked throughout the book. It’s up to you (oryour instructor) how these can be used. We suggest you try to answerthe questions before peeking . . . they are really quite simple.

Appendix C, ‘‘Glossary’’ provides gives definitions for thetechnical terms that are used throughout the book.

Appendix D, ‘‘Acronyms’’ contains a multitude of common networkingabbreviations and acronyms.

Who Should Read This Book

This book is a self-study guide that is geared toward individuals who have abackground in information technology and want to migrate into a networkingcareer, and individuals who are working for a certification or a degree in anetworking field of study. Some of these career fields include

Computer engineering

Network sales and marketing

Networking engineering

Networking support

Network field service engineering

Network planning

Network design

Network administration

Network security

Network operations

The reader is assumed to be at least casually familiar with computers andinformation technology. It is not necessary to understand any networkingconcepts, as we cover networks from very basic concepts to more advancedprotocols and standards that mandate today’s technology, as well as futuregrowth.

There is no attempt on our part to provide a complete, from-the-ground-uptutorial that will make you a professional in networking. That would be a taskrequiring several volumes of work. Our focus was to provide you with theinformation you need to have some experience for any popular standard inuse in networking today.

The readers of this book can expect to learn everything they need tounderstand the concepts of networking. We have also provided addresses of

Edwards f04.tex V3 - 03/27/2009 11:10am Page xxviii

xxviii Introduction

websites you can explore to better understand the specifics of a standard thatyou have an interest in learning more about. Upon completion of this guide,you will have a knowledge of the more popular technologies out there and inthe process you will learn about why things work and get some insight intothe reasons why things in networking are the way it is.

N O T E If you are interested, we have provided two course syllabi on our website(www.wiley.com/compbooks). One syllabus is formatted for a quarter and theother will fit with an 18-month course schedule.

A Few Words from the Authors

We hope that you enjoy reading this book as much as we enjoyed writing it.We attempted to tie it all together, while providing details to some currentand up and coming practices that you will come across at some point in yourcareer.

ACRONYM ALERT

VMS — Virtual memory system

As you start reading the book, you willnotice that we have included a few extrasthroughout each chapter. Some of these willshow up as an Acronym Alert or a Ran-dom Bonus Definition. Here are a couple ofexamples:

RANDOM BONUS DEFINITION

10BASE5 — A baseband Ethernet systemoperating at 10 Mbps over thick coaxialcable.

Don’t get confused when youcome across these. The defini-tions and acronyms are randomand do not necessarily applyto the subject in the particularchapter. We did this on pur-pose. One reason is that it helpsbreak the monotony that onemay experience when reading through these darn technical books. The otherreason is that it will hopefully help you to remember the terms as you progressthrough the book.

Another extra that we have included are our pop quizzes, which do apply tomaterial that has been covered in that particular chapter. Here is an example:

POP QUIZ

Name 10 issues that you might have on theLAN.

At the end of each chapterare the answers to the popquiz questions in that particu-lar chapter. This should serveas a quick reference for you asyou progress through the book.Additionally, each chapter will