Networking

cover image

Where to find it

Information & Library Science Library

Call Number
TK5105.5 .B39 2009
Status
Available

Authors, etc.

Names:

Summary

Networking

Second Edition

 

Jeffrey S. Beasley

 

This text provides a comprehensive look at computer networking from the point of view of the network administrator. It guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet networks; router configuration; TCP/IP networks; local-, campus-, and wide-area network configuration; network security; optical networks; voice over IP; and industrial networks. Extensive examples on the Windows Server 2003/2008 configuration and system configuration for the Linux operating system are also included. A complete chapter is devoted to protecting and securing a network from potential network attacks. Topics include denial of service attacks, firewalls, intrusion detection, password cracking, packet sniffing, and analyzing unsecured data packets. Other key network security issues, such as configuring router access lists, configuring a virtual private network (VPN) connection, and securing wireless networks, are also covered. Router configuration is examined, ranging from an introduction to router configuration to configuring multiple routing protocols for intranet and Internet data traffic. Routing protocols key to basic network operations are examined, including static, RIP, IGRP, OSPF, EIGRP, and BGP. The discussions on routing protocols are accompanied with in-depth steps for configuring the router to run the protocol, verify operation, and troubleshoot the router.

 

Key Pedagogical Features

NET-CHALLENGE SOFTWARE provides a simulated, hands-on experience in configuring routers and switches. Exercises provided in the text and on the CD challenge readers to undertake certain router/switch network configuration tasks. The software has the look and feel of actually being connected to the router or switch console port. PROTOCOL ANALYZER SOFTWARE included with the text uses the Finisar Surveyor Demo. Examples of using the software to analyze data traffic are included throughout the text. ACCOMPANYING CD-ROM includes the Finisar Surveyor Demo software and captured data traffic used in the text, which enables readers to capture data traffic on their own networks. CONFIGURING, ANALYZING, or TROUBLESHOOTING sections are included with each chapter to guide the reader through advanced techniques in networking. OBJECTIVES and INTRODUCTION at the beginning of each chapter clearly outline specific goals for the reader. EXTENSIVE PROBLEM SETS, SUMMARIES, and QUESTIONS AND PROBLEMS (including Critical Thinking questions) are found at the end of each chapter. KEY TERMS and their definitions are highlighted in the margins to foster inquisitiveness and ensure retention.

Contents

  • Chapter 1 Introduction to Computer Networks
  • 1-1 Introduction p. 5
  • 1-2 Network Topologies p. 5
  • 1-3 The Ethernet Lanip (Internet Protocol) Addressing
  • 1-4 Assembling a Home Network
  • Securing the Home Network
  • IP Addressing in the Home Network
  • 1-5 Assembling an Office Lan
  • 1-6 Testing and Troubleshooting a Lan
  • 1-7 Analyzing Computer Networks
  • Summary
  • Questions and Problems
  • Chapter 2 Physical Layer Cabling: Twisted Pair
  • 2-1 Introduction
  • 2-2 Structured Cabling
  • Horizontal Cabling
  • 2-3 Unshielded Twisted-Pair Cable
  • Shielded Twisted-pair Cable
  • 2-4 Terminating Cat6/5e/5 Utp Cables
  • Computer Communication
  • Straight-through and Crossover Patch Cables
  • 2-5 Cable Testing and Certification
  • Testing the CAT6 Link
  • 2-6 10 Gigabit Ethernet over Copper
  • Overview
  • Alien Crosstalk (AXT)
  • Signal Transmission
  • 2-7 Troubleshooting Computer Networks
  • Installation
  • Cable Stretching
  • Cable Failing to Meet Manufacturer Specifications
  • CAT5e Cable Test Examples
  • Summary
  • Questions and Problems
  • Chapter 3 Computer Fundamentals
  • 3-1 Introduction
  • 3-2 The Computer Bus Connection
  • Motherboard Bus Connections
  • 3-3 Device Drivers
  • Verifying Device Drivers on Windows Vista/XP
  • Verifying Device Drivers on Mac OS X
  • 3-4 Computer Memory
  • Types of Memory
  • 3-5 An overview of Fat and NTFSFATFAT32NTFS
  • 3-6 Configuring The Bios Boot Sequence
  • Summary
  • Questions and Problems
  • Chapter 4 Interconnecting the LANs
  • 4-1 Introduction
  • 4-2 The Osi Model
  • 4-3 The Network Bridge
  • 4-4 The Network Switch
  • Hub-Switch Comparison
  • Managed Switches
  • Multilayer Switches
  • 4-5 The Router
  • The Router Interface: Cisco 2800 Series
  • The Router Interface Cisco 2600 Series
  • The Router Interface Cisco 2500 Series
  • 4-6 Interconnecting Lans with The Router
  • Gateway Address
  • Network Segments
  • 4-7 Configuring The Network Interface Autonegotiation
  • Auto-Negotiation Steps
  • Full Duplex/Half Duplex
  • Summary
  • Questions and Problems
  • Chapter 5 TCP/IP5-1 INTRODUCTION
  • 5-2 The TCP/IP Layers
  • The Application Layer
  • The Transport Layer
  • The Internet Layer
  • The Network Interface Layer
  • 5-3 Number Conversion
  • Binary-Decimal Conversion
  • Decimal-Binary Conversion
  • Hexadecimal Numbers
  • 5-4 IPV4 Addressing
  • Private IP Addresses
  • IP Address Assignment
  • 5-5 Subnet Masks
  • 5-6 Cidr Blocks
  • 5-7 IPV6 Addressing
  • 5-8 Analyzing Computer Networks FTP Data Packets
  • Summary
  • Questions and Problems
  • Chapter 6 Introduction to Router Configuration
  • 6-1 Introduction
  • 6-2 Router Fundamentals
  • Layer 3 Networks
  • 6-3 The Console Port Connection
  • Configuring the Hyper
  • Terminal Software (Windows)
  • Configuring the Z-Term Serial Communications Software (Mac)
  • 6-4 The Router's User Exec Mode (ROUTER> )
  • The User EXEC Mode
  • Router Configuration Challenge The User EXEC Mode
  • 6-5 The Router's Privileged Exec Mode (ROUTER#)
  • Hostname
  • Enable Secret
  • Setting the Line Console Passwords
  • Fast Ethernet Interface Configuration
  • Serial Interface Configuration
  • Router Configuration Challenge The Privileged EXEC Mode
  • 6-6 Troubleshooting The Router Interface
  • Summary
  • Questions and Problems
  • Chapter 7 Routing Protocols
  • 7-1 Introduction
  • 7-2 Static Routing
  • Gateway of Last Resort
  • Configuring Static Routes
  • Networking Challenge Static Routes
  • 7-3 

Sample chapter

Networking, Second Edition Preface This book provides a comprehensive look at computer networking from the point of view of the network administrator. It guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet networks, router configuration, TCP/IP networks, routing protocols, local, campus, and wide area network configuration, network security, wireless networking, optical networks, Voice over IP, the network server, Linux networking, and industrial networks. After covering the entire text, readers will have gained a solid knowledge base in computer networks. In my years of teaching, I have observed that technology students prefer to learn "how to swim" after they have gotten wet and taken in a little water. Then they are ready for more challenges. Show the students the technology, how it is used, and why, and they will take the applications of the technology to the next level. Allowing them to experiment with the technology helps them to develop a greater understanding. This book does just that. Organization of the Text This text is designed to cover two semesters. The recommended chapters for the first semester are Chapters 1 to 8. Throughout the semester, the students will gain an appreciation of how basic computer networks and related hardware are interconnected to form a network. This involves understanding the concepts and issues of twisted-pair cable, interconnecting LANs, configuring TCP/IP, subnet masking, basic router configuration, and configuring routing protocols and wide area networking. Chapters 9 to 16 are recommended for the second semester--configuring and managing the campus network, network security, wireless LANs, and optical networks. The instructor can choose from the following topics to complete the semester: installing and configuring Windows 2008/2003 network server, Voice over IP, Linux configuration, and industrial networks. Key Pedagogical Features Chapter Outline, Objectives, Key Terms, and Introduction at the beginning of each chapter clearly outline specific goals for the reader. An example of these features is shown in Figure P-1. Net-Challenge Software provides a simulated, hands-on experience in configuring routers. Exercises provided in the text (see Figure P-2) and on the CD challenge readers to undertake certain router/network configuration tasks. The challenges check the students' ability to enter basic networking commands and to set up router function, such as configuring the interface (Ethernet and Serial) and routing protocols (that is, OSPF, BGP, EIGRP, IGRP, RIP, and static). The software has the look and feel of actually being connected to the router's console port. Protocol Analyzer Software packaged with the text uses the Finisar Surveyor Demo. Examples of using the software to analyze data traffic are included throughout the text, as shown in Figure P-3. Numerous worked-out examples are included in every chapter to reinforce key concepts and aid in subject mastery, as shown in Figure P-3. Configuring, Analyzing, or Troubleshooting sections, as shown in Figure P-4, are included with each chapter to guide the reader through advanced techniques in networking. Key Terms and their definitions are highlighted in the margins to foster inquisitiveness and ensure retention. This is illustrated in Figure P-5. Extensive Summaries, Questions, and Problems as well as Critical Thinking Questions are found at the end of each chapter, as shown in Figure P-6. An extensive Glossary is found at the end of the book and offers quick, accessible definitions to key terms and acronyms, as well as an exhaustive Index (Figure P-7). Accompanying CD-ROM The CD-ROM packaged with the text includes the Finisar Surveyor Demo software and captured data traffic used in the text. This software provides readers with the opportunity to capture data traffic on their own network. It also includes the Net-Challenge Software, which was developed specifically for this text. Instructor Resources The Instructor's Manual to accompany Networking, Second Edition (ISBN 0-13-135838-3) provides the entire book in PDF format along with instructor notes for each section within each chapter, recommending key concepts that should be covered in each chapter. Solutions to all chapter Questions and Problems sections are also included. In addition, the instructor will find a separate Solutions to the Net-Challenges Instructor's Edition PDF as well as a 18 laboratory exercises. Also a test bank with which to generate quizzes on the material found within the student edition of the book is provided. (c) Copyright Pearson Education. All rights reserved. Excerpted from Networking by Jeffrey S. Beasley All rights reserved by the original copyright owners. Excerpts are provided for display purposes only and may not be reproduced, reprinted or distributed without the written permission of the publisher.

Other details