CNAP.BOOK Page 694 Monday, April 30, 2001 12:45 PM CNAP.BOOK Page 695 Monday, April 30, 2001 12:45 PM

I N D E X

compatibility, 354 Symbols database structure, 351–352 DDNS, 353 _ (underscore character), in filenames, 375 domains, 351 forests, 351 multimaster replication, 353 Numerics replication, 353 security, 354 3DES, 450 servers, 353 5-4-3 rule, 140–141 trust relationships, 352 6bone, 590 Active Directory Users and Computers MMC 10BaseFL, 67 snap-in, 322 10BaseT active hubs, 58, 96, 214 5-4-3 rule, 140 active primary partition, 378 node capacity, 141 active topologies, 143 upgradability, 136 ring topology, 56 10Base2, 63–64, 132–133, 202 , 68 10Base5, 62, 134–135 actual connection speed, 555 100BaseT, 65 adapters, 165 100BaseVG-AnyLAN, 66, 125–126 addgroup command (UNIX), 333 100BaseX, 137 addresses 802.3z specification, Gigabit , 66 AppleTalk, 150 1000BaseT, 137–138 classes (IP), 232–239 logical, 93 translation, 182–185 A administration, server-based networks, 48 ADSL (Asymmetric DSL), 173–174 AARP (AppleTalk Address Resolution Protocol), 53 Advanced Peer-to-Peer Networking (APPN), 422 ABRs (area border routers), 301 Advanced Research Projects Agency network, 9, acceptable use policies, 458 267, 597 access control lists (ACLs), 312, 443–444, 464 AF_INET addressing, 248 Active Directory, 354 AF_UNIX, 248 access interfaces, ISDN, 172 affordability of Internet services, 592 access methods AFIS (Automated Fingerprint Identification CSMA/CD, 122–123 System), 458 demand priority, 125–126 after-hours connectivity, 478–479 token passing, 123–124 agents, SNMP, 88 access points, 207 AH (Authentication Header), 445, 518 accessibility of networks, 432 AI (artificial intelligence), 602 accessing User Manager for domains, 321 alerts, 558 account lockout, 499 algorithms, encryption, 448–449 acknowledgments, 245 amplifiers, 120 ACLs (access control lists), 312, 443–444, 464 amplitude, 110 acoustic couplers, 486 analog signaling, 80, 109 active detection, 461 amplifiers, 120 Active Directory, 50, 322, 350 comparing to digital, 111–112 CNAP.BOOK Page 696 Monday, April 30, 2001 12:45 PM

696 analog signaling

multiplexing, 113–114 archive bits, 468 ANDing, 244–245 ARCnet (Attached Resource ), AnyLAN, demand priority, 125–126 68–69, 151–152 APIPA (Automatic Private IP Addressing), 239, 242 data transfer, 151 APIs (application programming interfaces), 362 packets, 153 Apple Macintosh, 401–402 RG-62 cabling, 204 AppleShareIP, 335 ARCnet Plus, 69 AppleTalk, 53, 68, 150 areas (OSPF), 301 addressing, 150 argon lasers, 209 data transfer, 151 arguments, text-based operating systems, 365–366 zones, 150, 401 ARP (Address Resolution Protocol), 255 AppleTalk Address Resolution Protocol (AARP), 53 ARPAnet (Advanced Research Projects Agency applets, 544 network), 9, 267, 597 appliances, user friendly, 593 artificial intelligence, 591 application programming interfaces (APIs), 362 Ask Jeeves, 282 application filtering, 462 assessing need for security, 432 application layer (OSI reference model), 88–89, management philosophy, 433 261, 274 threats, 434 Application Server mode (Microsoft Terminal external, 434 Services), 541–542 internal, 439–441 application servers, 42, 319 type of business, 432 application/process layer (DoD model), 97 type of data, 433 applications assigned permissions, Active Directory, 354 backward compatibility, 373 assigning boot managers, 372 IP addresses, IANA, 233 client/server, 310 permissions to individual accounts, 48 defragmenters, 373 asymmetric encryption, 451 file types, 367 asynchronous communication ports, 485 instant messaging, 291 asynchronous transmission, 115 multitasking, 381 ATM (Asynchronous Transfer Mode), 178 scripts, 332 Attached Resource Computer Network. See ARCnet shells, 363 attacks telephony, 292–293 brute force, 435 Trojan horses, 438 DDoS, 433 Web browsers, 278–279 DoS, 436 APPN (Advanced Peer-to-Peer Networking), 422 ICMP floods, 436 architecture Ping of Death, 437 AppleTalk, 68 smurf attacks, 437 ARCnet, 68–69 SYN attacks, 438 combined topologies, 60 impersonation, 435 comparing, 154 IP spoofing, 438 data , 196–197 nuke, 436 Ethernet, 62 social engineering, 435 10Base2, 63–64 attenuation, 56, 67, 96, 112, 120, 133 10Base5, 62 attributes, 341–342 UTP, 64–67 audio conferencing, 292 Token Ring, 67–68 auditing, 460–461 CNAP.BOOK Page 697 Monday, April 30, 2001 12:45 PM

bridges 697

AUI (attachment unit interface), 96, 196 baselining performance, 553–554 authentication, 451 battery mode (UPSs), 466 in biometrics, 458 BDCs (backup domain controllers), 321 Kerberos, 453–455 beaconing, 143 MS-CHAP, 483 bearer channels (ISDN), 172 mutual authentication, 483 Bellman’s equation, 298 passwords, 443–444 Berkeley Sockets, 248 remote access, 482–483 Berners-Lee, Tim, 279 smart cards, 455–456 best practices, 554 VPNs, 521 bin (UNIX), 330 authorization, VPNs, 521 binary automatic address allocation, 239–242 bits, 77 autonomous systems, 219 characters, 78 axis, 200 converting to decimal, 79, 236 converting to digital signals, 80 Bindery, 50, 326–327 B Novell NDS, 349 binding order, 414 backbone, 61, 268 Biometrics, 455–457 10Base5, 134 authentication, 458 commercial backbone, development, 268 BISDN (Broadband ISDN), 179 nodes, 268 bits, 77, 232 segments, 61 archive bits, 468 vBNS, 268–269 subnet masks, 242–244 backbone area (OSPF), 301 synchronization, 115 backing up data, 469 black boxes, 462 backslashes (\), 370 bloatware, 532 backward compatibility, operating systems, 373. Blowfish encryption, 516, 520 See also upgradability BNC connectors, 63, 132, 211–212 bands, HPFS, 376 Bohr, Neils, 592 bandwidth, 121 bonding, 484 aggregation, 483 books, electronic publishing, 600–601 channels, 112 boot manager programs, 372 measuring, 553 booting, 361 multilink, 484 BOOTP (Boot Protocol) protocol, 43, 537–538 on demand, 177 bootstrap code, PXE cards, 538 Banyan VINES (Virtual Integrated Network bootstrap loader, 375 Service), 334 bottlenecks, 552 Banyan VINES StreetTalk, 356 boundary layers, 99 BAP (Bandwidth Allocation Protocol), 484 branch offices, 478 barrel connectors, 211 connecting with VPNs, 515 base 2 numbering system, 78 BRI (Basic Rate Interface), 172, 483 base 10 numbering system, 76 bridges, 214–215 base 16 numbering system, 77–78 looping, 103, 217 baseband transmission, 112–113 nonroutable protocols, 216 source route, 216 CNAP.BOOK Page 698 Monday, April 30, 2001 12:45 PM

698 broadband

broadband caching, proxy servers, 185 BISDN, 179 calculating CATV, 179–180 host per address class, 237 midsplit broadband configuration, 113 subnet masks, 243–244 broadcast addresses, 216, 230 callback security, 490, 497 broadcast storms, 219 CallNotes voice mail, 489 brouters, 220 capabilities of the Internet, 273–274 browse lists, 41, 386 capacity planning, 121 browsers (Web), 278–279 capture command (NetWare), 329 brute force attacks, 435 captured data, displaying, 559 b-tree (binary tree) capturing the printer port, 319 directory scheme, 373 carrier sense mulitple access collision detect, 62, indexing algorithms, 377 122–123 budetary factors in hybrid network case sensitivity implementation, 410 of operating systems, 364 burstiness, 181 passwords, 570 bus topology, 55–56 UNIX, 331, 375 bypassing operating system passwords, 443 catalog records, 377 bytes, 77–79 categorizing networks by administrative method, 38–49 by architecture, 62–69 C by NOS, 49–51 by physical scope, 33 cable modems, 493–494 LANs, 34 cable testers, 569 MANs, 35–36 cabling WANs, 37–38 ARCnet, 152 by protocol, 52–54 bandwidth, 121 by topology, 54–61 BNC connectors, 132 CATV, 179–180 cheapernet, 64 CDDI (Copper Distributed Data Interface), 149 coaxial, 200–202 cells (ATM), 178 impedence, 201 cellular technologies, 181 thicknet, 62 centralized computing, 308 thin coax, 201–202 server-based networks, 47 crossover cables, 136 WANs, 37 fiber-optic, 206–207 channels, 112 length specifications, 133 IDSN, 172 patch panels, 212–213 SPIDs, 165 plenum-grade, 200 CHAP (Challenge Handshake Authentication RG specifications, 64, 202 Protocol), MS-CHAP, 483 RJ-62, 204 character-based operating systems, 363 shielding, 119 characteristics thinnet, 202 of analog signaling, 109 Token Ring, 144–145 of digital signaling, 110–111 twisted-pair, 136, 204–205 of hybrid networks, 409–411 Type A connectors, 145 UTP, 64–67 CNAP.BOOK Page 699 Monday, April 30, 2001 12:45 PM

command-line utilities, ping 699

of LANs, 34 NetWare, 328–329 of peer-to-peer networks, 44 remote access, configuring, 495–496 of server-based networks, 47 security, 48–49 characters, 78 shares, 40 chat rooms, 291 thin clients, 532–533 cheapernet, 64 advantages, 534 checkpointing, 90 BOOTP, 537–538 child objects, 344–345 cost, 534 Children’s Online Privacy Protection Act, 595 desktop computers, 540 chipping, 210 DHCP, 537–538 CIDR (classless interdomain routing), 238–239 handheld PCs, 541 CIFS (Common Internet File System), 422 hardware, 538–541 ciphers, 448 ICA, 536 CIR (committed information rate), 175 Net PCs, 540 circuit boards Network Computers, 539 data bus, 196–197 RDP, 536 jumpers, 162 RFB, 537 UART chips, 164, 486 security, 535 circuit filtering, 462 software, 541–542, 544–545 circuit switched networks, 6–7, 170 TFTP, 537–538 comparing to packet-switched, 8 WBTs, 539 DDS, 174 XDMCP, 536 DSL, 172 UNIX, 333 ISDN, 171–172 clouds, 176 leased lines, 174 cluster servers, 43 PSTN, 171 clustering technologies, 471 switched 56, 175–176 clusters, 43, 371–373 T-carriers, 174–175 CMIP (Common Management Information Citrix, 536 Protocol), 567 Winframe/MetaFrame, 542 coax cable, 22, 200–202 Class A addresses, 236–237 BNC connectors, 132 Class B addresses, 237 Ethernet, 5-4-3 rule, 140–141 Class C addresses, 237 impedence, 201 classes of FDDI networks, 148 thicknet, 62, 203 classful addressing, 235–237 thin coax, 201–202 classifying RFCs, 102 collisions, 122, 133 classless addressing, 233, 238 avoidance, 123 CLI commands, ping, 573–574 domains, 141 client operating systems, 23, 44 Ethernet, rules of engagement, 139 client/server systems, 22, 39, 43, 309 COM ports administration, 48 modem banks, 480 ASPs, 545 troubleshooting modem connections, 489–491 characteristics, 47 combat, unmanned, 597 comparing to peer-to-peer networks, 38–39 combined topologies, 60 configuration, 310–311 combo cards, 95, 198 dedicated servers, 42 command-line utilities, ping, 254–255 guest accounts, remote access, 481 CNAP.BOOK Page 700 Monday, April 30, 2001 12:45 PM

700 commands

commands, 364–365 peer-to-peer config (NetWare), 576 centralized administration, 45 DOS, 366 security, 46 FTP, 290 server-based, 47 ifconfig computer viruses, 438 Linux, 399–400 communication, unidirectional, 90 Windows NT, 577–578 concentrators, 96, 168 nbstat, 364 conferencing over Internet, 292 net view, 365 config command (NetWare), 576 parameters, listing, 366 config utility, 259 ping, syntax, 573–574 configuration utilities commercial backbone, development, 268 TCP/IP, 259 communication troubleshooting, 576–578 asynchronous, 485 configuring layered approach, 82–84 modems, 164 networking models, 84 NICs, 197 DoD, 97–98 I/O port, 199 OSI, 85–86, 88–96 IRQ, 198–199 standardization, 84 memory address, 199 vendor-specific, 99 remote access clients, 495–496 protocol binding order, 414 routed connections, 187 communications networks, 6–9 VPNs, 515–516, 522–525 comparing Windows 2000 dialing properties, 489 analog and digital signaling, 111–112 connecting circuit-switching and packet-switching, 8 to Internet, 400 data and information, 80–81 to Microsoft network IPv4 and IPv6, 589 Linux, 398 network architectures, 154 UNIX, 398 share and user-level security, 46 Windows 2000 Professional, 393–395 compatibility, Active Directory, 354 Windows 9.x, 382–386 complex connectors, 213–214 Windows NT Workstation, 389 compression, file systems, 372 to NetWare network computer accounts, 313 Linux, 399 computer networks UNIX, 399 advantages of, 11–12 Windows 9.x, 386 defining, 11 Windows 2000 Professional, 395 home computing, 16 Windows NT Workstation, 390–391 input devices, sharing, 12 to remote server Internet Windows 9.x, 388 development, 13–14 Windows 2000 Professional, 396 e-commerce, 16 Windows NT Workstation, 391 future of, 17–18 to UNIX/Linux networks, 399–400 high-speed connectivity, 16 to workgroups, 401 online learning, 17 connection speeds, measuring, 554–556 online services, 15 Connection Status dialog box (Windows 2000), LANs, TCP/IP, 53 394–395 connectionless protocols, 8, 91 CNAP.BOOK Page 701 Monday, April 30, 2001 12:45 PM

data link layer 701

connection-oriented protocols, 91 cooperative multitasking, 380 connectivity Copper Distributed Data Interface (CDDI), 149 after-hours, 478–479 core protocol, 411, 415 devices, 23, 210 corporate espionage, 439 BNC connectors, 212 counters, monitoring, 559 passive hubs, 213 counting systems. See numbering systems path panels, 213 country codes (domains), 250 Ethernet, rules of engagement, 139 CPE (customer premises equipment), 165 Internet, requirements for, 270–271 crackers, 435 proxy servers, 185–186 CRC (cyclical redundancy check), 82, 139 remote access, 478 creating account lockout, 499 shares, 311 authentication, 482–483 user accounts, 315 bandwidth aggregation, 483 crossover cables, 136, 568 branch offices, 478 cross-platform gateways, 420 callback security, 497 crosstalk, 119, 204 devices, 484 cryptanalysis, 448 IP addressing, 483 cryptography, 448 mobile users, 480 CSMA/CA (carrier sense multiple access collision modems, 484–491 detect), 62, 122–123 protocols, 482 CSNW (Client Services for NetWare), 51, 390–391 RADIUS, 498 CSU/DSU (channel service unit/data service unit), security, 496–499 166, 494 telecommuters, 479 customizing modems, 488 VPNs, 481, 505–525 cut-through switching, 220 routed connections, 186–187 cXML (commerce XML), 514 testing utilities cyber terrorists, 597 pathping, 574 cybercafes, 280 ping, 573–574 cyberstalkers, 595 translated connections, 182–185 cyborgs, 603 troubleshooting, 569, 579 cycles, 110 univeral, 20, 592–595 cylinder (disk drive), 378 connectors cyphertext, 448 BNC, 132, 211 complex connectors, 213–214 fiber-optic connectors, 212 D patch panels, 212 RJ (registered jack), 198, 212 daemons, 275 simple, 211 data backups, 466–469 T-connectors, 63 data bus, 196–197 twist-and-push, 63 data collisions, 67 Type A, 145 data forks, 377 vampire taps, 203 data frames (Token Ring), 146 container objects, 349 data link layer contiguous namespace, 345 OSI reference model, 93–94 convergence, 299–300 tunneling protocols, 508 converting binary to decimal, 79 CNAP.BOOK Page 702 Monday, April 30, 2001 12:45 PM

702 data transfer

data transfer development of Internet, 267–268 AppleTalk, 151 devices, 456 ARCnet, 151 acoustic couplers, 486 FDDI, 147–148 amplifiers, 120 data warehousing, 311 bridges, 214–216 databases brouters, 220 Active Directory, 351–352 cable modems, 493–494 bindery, 326–327 connectivity, 23, 210 link-state, 298 active hubs, 214 NDS, 349 BNC connectors, 211–212 dcpromo.exe command, 353 complex connectors, 213–214 DCs (domain controllers), 353 fiber-optic connectors, 212 DDNS (Dynamic DNS), 353 intelligent hubs, 214 DDoS (Distributed Denial of Service) attacks, 433 media connectors, 213 DDS, 174 passive hubs, 213 decentralized administration, peer-to-peer networks, 45 patch panels, 212–213 decimal numbering system, 76 repeaters, 213–214 dedicated connections, 481 RJ connectors, 212 dedicated ISDN, 172 simple connectors, 211 dedicated leased lines CSU/DSU, 494 T-carriers, 174–175 endpoints, 165 versus dialup, 170 gateways, 89 dedicated routing devices, 217 hubs, 96 dedicated servers, 42–43 crossover cables, 136 Deep Blue, 602 intelligent, 66 default gateways, 187, 218, 244, 294 MSAUs, 143 default groups, 316 Layer 3 switches, 93 default routes, 296 modems default subnet masks, 243 asynchronous communication, 485 Defense Data Network, 14 PnP, 162 defining computer networks, 11 port speed, 555 defragmenters, 373 network monitoring/management, 568–569 demand priority, 67, 125–126 NICs, 134, 195 demultiplexers, 114 combo cards, 198 DEN (directory-enabled networking), 349 configuring, 197 Department of Defense (DoD), ARPAnet, 597 I/O port, configuring, 199 deploying IPv6, 590 IRQ, setting, 198–199 DES (Data Encryption Standard), 450 memory address, configuring, 199 designing networks role of, 195 capacity planning, 121 selecting, 95, 196–198 WANs, 160 transceivers, 196 desktop computers nodes, 44 thin clients, 540 PnP, 162 operating systems, 379 print devices, 326 Linux, 396–397 sharing on Windows networks, 324, 326 MS-DOS, 379–381 UNIX shares, 334 developing software, Open Source Initiative, 329 remote access connectivity, 484–491 CNAP.BOOK Page 703 Monday, April 30, 2001 12:45 PM

disgruntled employees, as internal security threat 703

repeaters, 56, 96, 120 digital volt-ohm meters, 569 routers, 217–219 dip switches, 162 ACLs, 464 dir command (FTP), 290 interfaces, 296 directory services, 317, 341–343 shared resources, 12, 317–319 Active Directory, 350 switches, 220–221 compatibility, 354 terminal adapters, 492–493 database structure, 351–352 terminators, 55 DDNS, 353 thin clients, 538–541 domains, 351 desktop computers, 540 forests, 351 handheld PCs, 541 multimaster replication, 353 Net PCs, 540 replication, 353 Network Computer, 539 security, 354 WBTs, 539 servers, 353 Token Ring trust relationships, 352 cable types, 144–145 attributes, 342 MSAUs, 144 Banyan VINES StreetTalk, 356 repeaters, 145 home directories, 318 transceivers, 63, 95 IBM OS/400, 355 vampire taps, 63 Internet-based, 356 WANs namespace, 344 concentrator routers, 168 NDS, 327, 349–350 CPE, 165 PKI (public key infrastructure), 349 modems, 160–165 published shares, 42 terminal adapters, 165 SDS (Sun Directory Services), 355 DHCP (Dynamic Host Configuration Protocol), shared resources, 343 537–538 standards, 346 obtaining IP addresses, 239–242 DAP, 347 servers, 43, 242 LDAP, 347–348 dialog boxes, Connection Status, 394 X.500, 346 dialup, 510–512 tree structure, 344–345 switched 56, 175 UNIX file systems, 374 versus dedicated leased lines, 170 Directory Information Base (DIB), 346 DIB (Directory Information Base), 346 Directory System Agent (DSA), 346 differential backups, 468 directory trees, 370 Diffie-Hellman algorithm, 450 Directory User Agent (DUA), 346 digital certificates, 452–453 disaster protection/recovery digital links data backups, 466–469 DSL, 172 fault tolerance, 469–470 ISDN, 171–172 generators, 466 terminal adapters, 165 power backups, 465 digital signaling, 110–111 surge protection, 465–466 comparing to analog, 111–112 UPSs, 466 discrete state, 80, 110–111 disconnections (modem), troubleshooting, 490 multiplexing, 113 discrete state, 80, 110–111 repeaters, 120 disgruntled employees, as internal security digital signatures, 452 threat, 440 CNAP.BOOK Page 704 Monday, April 30, 2001 12:45 PM

704 disk drives

disk drives User Manager for Domains, 321 cylinder, 378 domestic life, effect of Internet on, 594 duplexing, 470 domestic use of PCs, 16–18 fault tolerance, 469–470 DOS (disk operating system), 379 fragmentation, 373 commands, 366 heads, 378 directories, 371 mapping in NetWare networks, 328 DoS (Denial of Service) attacks, 436 mirroring, 469 ICMP floods, 436 partitioning, 377–379 Ping of Death attacks, 437 seek time, 378 smurf attacks, 437 striping with parity drive, 470 SYN attacks, 438 disk quotas, NTFS 5, 374 dotted quad, 233 dispersion, 207 dotted-decimal format, IP addresses, 232 displaying downlevel domains, 50 captured data, 559 downstream neighbors, 56 command parameters, 366 drivers, 164 Microsoft servers, 365 file system drivers, 372 routing tables, 297 drives. See disk drives TCP/IP configuration information, 366 DSA (Directory System Agent), 346 distance-learning, 601 DSL (Digital Subscriber Line), 113, 172 distance-vector routing protocols, 298 terminal adapters, 165 RIP, 299–300 DSSS (direct sequence spread spectrum), 210 Distributed Denial of Service (DDoS) attacks, 433 DUA (Directory User Agent), 346 distributed directory services, 343 dual ring (FDDI), 147 distributed link-tracking, NTFS 5, 374 dual stacking, 590 distributed WANs, 37 dual-boot computers, 372 distribution groups, 316 DWDM (dense-wavelength division distribution packages, Microsoft SMS, 564 multiplexing), 114 DMZs (demilitarized zones), 461 dynamic disks, 379 DN (distinguished name), 347–348 Dynamic DNS, 252 DNS (Domain Name System), 14, 92, 278 dynamic routing, 219, 298–299 names, 345 resolving, 252 translating to IP addresses, 251–253 E servers, 43 zones, 252 e-books, 600 documenting troubleshooting procedures, 571 echo cancellation, 173 DoD (Department of Defense) Echo Requests, 573–574 model, 97–98 e-commerce, 16 role in Internet development, 13 editing passwd file, 332–333 domain controllers, 42, 353 EDS (Electronic Directory Service) standards, 346 Domain Name System. See DNS education domain trees, 322 distance learning, 601 domain-level security, 314 online learning, 17, 20 domains, 22, 50, 250 EFS (Encrypting File System), 374 Active Directory, 351 EGPs (exterior gateway protocols), 219 BDCs, 321 Einstein, Albert, 592 CNAP.BOOK Page 705 Monday, April 30, 2001 12:45 PM

executable binary files 705

EISA (Extended Industry Standard public/private key, 450–451 Architecture), 197 secret key, 449–450 electrical ground, 212 VPNs, 506, 521 electromagnetic interference, 119, 206 end nodes, 422 electronic publishing, 600–601 endpoints, 165 e-mail, 283 end-to-end security, 445 advantages, 283 enhanced serial port cards, 164 Carnivore, 595 enterprise networks, 16 emoticons, 284 error checking gateway, 89 CRC, 82, 139 mailbox, 285 parity, 470 mailing lists, 286–287 error messages, HTTP, 275 newsgroups, 287–288 ESP (Encapsulating Security Payload), 445, 518 privacy, 284 establishing security, 446, 448 access control policies, 443–444 SMTP, 284 baseline performance, 553 software, 284–286 identifying high usage, 553 spam, 283–284 mapping utilization patterns, 554 emerging technologies, 17 best practices, 554 healthcare industry, role of Internet, 20 Ethernet, 62, 132 in law enforcement, 21 5-4-3 rule, 140–141 PCs in the workplace, 19 10Base2, 63–64, 132–133, 202 smart appliances, 17–18 10Base5, 62, 134–135 telephone technology, 18 10BaseFL, 67 WANs 10BaseT BISDN, 179 5-4-3 rule, 140–141 CATV, 179–180 node capacity, 141 OC-SONET, 179 upgradability, 136 SMDS, 181 100BaseX, 137 wireless, 181 1000BaseT, 137–138 EMI (electromagnetic interference), 119, 206 cheapernet, 64 emoticons, 284 collision domains, 141 Emware, Inc., 593 CSMA/CD, 122 encapsulation, 86, 248–249 frames, 82, 138 bridges, 216 CRC, 139 VPN tunnels, 508–509 preamble, 139 encoding, 109 NICs, 134 encryption, 445 rules of engagement, 139 asymmetric, 451 specifications summary, 142 Blowfish, 516, 520 star bus topology, 140 digital signatures, 452 thicknet, 203 IPSec, tunneling, 509, 520 twisted-pair cable, 204–205 laws governing, 449 UTP, 64–67 low-level, 519 EtherTalk, 53 MPPE, 519 exabytes, 373 Exceed (X client), 544 executable binary files, 374 CNAP.BOOK Page 706 Monday, April 30, 2001 12:45 PM

706 Expert Analyzer (Sniffer)

Expert Analyzer (Sniffer), 562 scatter, 120 expert systems, 602 SONET, 179 exporting encrypted characters, 449 fields extended partitions, 378 IP headers, 249 extensions of file types, 368–370 Token Ring frames, 146 external modems, 160, 163–164, 487 File and Print Sharing, 312 banks, 164–165 file encryption, 445 cable modems, 494 file forking, 377 configuration, 164 file fragmentation, 373 drivers, 164 file servers, 42, 318 external security threats, 434, 438 file systems, 369 computer viruses, 438 backward compatibility, 373 DoS attacks, 436–438 compression, 372 IP spoofing, 438 directories, 341 worms, 438 disk drive, heads, 378 external transceivers, 63, 95 drivers, 372 extranet VPNs, 514–515 FAT, 371–373 extranets, 37 hard disks, 377–379 HFS, 376–377 HPFS, 376 F inverted tree structure, 370 NFS, 377 fallback, 485 NTFS, 372–373 Fast Ethernet, 62, 137 recoverability, 376 fast packet technologies, Frame Relay, 177 reliability, 376 FAT (File Allocation Table), 371–373 sector sparing, 373 fault tolerance, 10, 379, 469–470 selecting, 377 clustering technologies, 471 SMBF, 424 data backups, 466–469 tree structure, 370 RAID, parity, 470 UNIX, 374–376 recoverability in file systems, 376 VFAT, 372 star topologies, 58 File Transfer Protocol. See FTP fax servers, 43 filenames, underscore character (_), 375 FDDI (Fiber Distributed Data Interface) files, 367–368 data transfer, 147–148 boot.ini, 372 frames, 149 clusters, 371–373 wrapped state, 148 extensions, 368–370 FDM (frequency-division multiplexing), 113, 173 kernel, 375 federal government Web site, 596 naming conventions, 370 feedback as troubleshooting methodology, 571 pathnames, 370 fees, online services, 15 file-sharing protocols, 415 FHSS (frequency hopping spread spectrum), 210 CIFS, 422 fiber-optic cable, 23, 206 filtering mechanisms (firewalls), 462 10BaseFL, 67 FingerSec Corporation, 456 connectors, 212 firewalls, 461–463 dispersion, 207 VPNs, 522 flame wars, 284 CNAP.BOOK Page 707 Monday, April 30, 2001 12:45 PM

half-duplex transmission 707

flat files, UNIX, 376 gateways, 89 flat namespace, 344 cross-platform, 420 folders, 371 firewalls, 462 foreign countries, development of security rating Microsoft SNA, 422 systems, 460 Samba, 422–424 forests, 322, 351 SNA, 421–422 forks, 377 Windows-to-NetWare redirectors, 420 forward slashes (/), 370 generators, 466 fox and hound, 568 get command (FTP), 290 FQDNs (fully qualified domain names), 250–253 , 62, 66, 137–138 fractional T-1, 175 global connectivity, 592–593 frame, 82 effect on government, 596 Frame Relay, 177–178 effect on healthcare, 599–600 frames, 81. See also packets effect on legislation, 598 Ethernet, 138 entertainment, 594 CRC (cyclical redundancy check), 139 home networking, 588–589 preamble, 139 privacy issues, 594–595 FDDI, 149 global directory services, 343 preamble, 139 government Token Ring, 146 global connectivity, 596 FreeS/WAN, 518 legislation, universal connectivity, 598 freeware, 279 security ratings, 459–460 frequency, 110 GPS (global positioning systems), 597 FTP (File Transfer Protocol), 88, 289–290 ground (electrical), 212 full backups, 468 Group Policy, 351 full duplex transmission, 90, 118 GSNW (Gateway Services for NetWare), 51, 89 full mesh topologies, 169 guaranteed state change, 115 fully qualified pathnames, 370 guest accounts fundamentals of network troubleshooting, 569–571 NetWare 3.x, 327 future of Internet, 17 remote access, 481 law enforcement, 21 GUI-based operating systems, 363 online learning, 20 backslashes, 370 PCs in the workplace, 19 file systems, 369 role in healthcare industry, 20 files, 367–368 smart appliances, 17–18 extensions, 368–370 telephone technology, 18G pathnames, 370 Help files, 367 Windows NT 4.0, 321 G H gateways, 38, 419 VPN configuration, 515 hackers, 435 gateway of last resort, 187, 218, 244, 294 corporate spies, 439 Gateway Services for NetWare (GSNW), 51, 89 disgruntled employees, 440 impersonation, 435 half-duplex transmission, 90, 117–118 CNAP.BOOK Page 708 Monday, April 30, 2001 12:45 PM

708 handheld PCs, thin clients

handheld PCs, thin clients, 541 home networking, 588–589 handheld-to-PC communication, 419 effect on family life, 594 hard disks, 377 host-to-host layer (DoD model), 98 fault tolerance, 469–470 hosts, 44 partitions, 378 per address class, calculating, 237 tracks, 378 per subnet, calculating, 244 volume, 379 HOSTS file, name resolution, 251 hard links, UNIX, 376 hot fixing, 373 hardware household appliances loopbacks, 568 smart appliances, 17–18 profiles, 393 user friendliness, 593 thin clients, 538–541 HPFS (High Performance File System), 376 desktop computers, 540 HTML (Hypertext Markup Language), 275, handheld PCs, 541 277, 514 Net PCs, 540 HTTP (HyperText Transfer Protocol), 274–275 Network Computers, 539 hubs, 94, 96 WBTs, 539 crossover cables, 136 troubleshooting devices, 568–570 intelligent, 66 WANs MSAUs, 143–144 CPE, 165 human brain modems, 160–165 AI (artificial intelligence), 602 hardware address, 93 neural network model, 591 hardware-based VPNs, 522 hybrid mesh topologies, 60, 268 hash algorithms, 452 hybrid networks, 23, 51, 409 HCL (Hardware Compatiblity List), selecting characteristics, 409–411 NICs, 197 file-sharing protocols, 415 HDSL (High Data Rate DSL), 173–174 gateways, 419 headers, 81, 248–249 cross-platform solutions, 420–421 encapsulation, 87 firewalls, 462 fields, 82 Microsoft SNA, 422 heads, 378 Samba, 422–423 healthcare SNA, 421–422 modern technologies, 599–600 Windows-to-NetWare redirectors, 420 role of Internet, 20 hybrid topology, 60 Heisenberg, Werner, 592 hypertext files, 275 Help files, 367 hertz, 110 Hewlett Packard OpenView, 566 hexadecimal numbering system, 77–78 I hierarchical namespace, 344 object-oriented systems, 343 I/O (input/output) address, 161, 197 high-order bits, 235 NIC configuration, 199 high-speed connectivity, 16 IAB (Internet Architecture Board), 302 High-Speed Token Ring Alliance, white papers, 68 IANA (Internet Assigned Numbers Authority), history of communications networks, 6–7 233, 302 home computing, 16 home directories, 318 CNAP.BOOK Page 709 Monday, April 30, 2001 12:45 PM

indicator lights (modems) 709

IBM MSAUs, 144 HPFS, 376 repeaters, 145 OS/2, 335, 403 IESG (Internet Engineering Steering Group), OS/400 directory services, 355 102, 302 SNA, 51, 89, 421–422 IETF (Internet Engineering Task Force), 14, Tivoli Enterprise, 566 101–102, 302 ICA (Independent Computing Architecture), 536 ifconfig command (Linux), 399–400 ICANN (Internet Corporation for Assigned Names ifconfig utility, 259 and Numbers), 302 IGPs (interior gateway protocols), 219 ICMP (Internet Control Message Protocol) I-keys, 456 echo requests, 254, 436 ILD (injection laser diode), 207 floods, 436 impedance, 201 icons, 363 impersonation, 435 ICS (Internet Connection Sharing), 185 implementing Identification tag, Network Properties dialog box disaster recovery mechanisms (Windows 9.x), 390 generators, 466 identification technologies power backups, 465 biometrics, 456–457 surge protection, 465–466 privacy issues, 594–595 UPSs, 466 smart cards, 455–456 fault tolerance, data backups, 466–467 identifying hybrid networks, budgetary factors, 410 high bandwidth consumption, 553 IPv6, 590 IP address classes, 236 security IDSL, 173–174 acceptable use policies, 458 IEC (Electrotechnical Commission), 101 access control policies, 443–444 IEEE (Institute of Electrical and Electronic audits, 460–461 Engineers), 67, 102–104 e-mail, 446, 448 IEEE 802 project, 103 file encryption, 445 IEEE 802.3 standard, 62, 143 firewalls, 461, 463 5-4-3 rule, 140–141 government ratings, 459–460 10Base2, 132–133 IPSec, 445 10Base5, 134–135 login permissions, 442–444 10BaseT, 136, 140–141 multiple protocols, 464 100BaseX, 137 operating systems, 441 1000BaseT, 137–138 physical security, 464 collision domains, 141 policies, 457 frames, 138–139 SSL, 446 specifications summary, 142 termination policies, 459 IEEE 802.3ab standard, 66 importing encrypted characters, 449 IEEE 802.5 standard, Token Ring, 67, 142 IMTC (International Multimedia Teleconferencing cable types, 144–145 Consortium), 292 communication process, 143 incompatibility in modems, troubleshooting, 491 frames, 146 incremental backups, 468 limitations on implementing, 147 indexes, 281 MICs, 145 indicator lights (modems), 487 CNAP.BOOK Page 710 Monday, April 30, 2001 12:45 PM

710 information units

information units cyberstalkers, 595 frames, 81 development, 13–14, 267 packets, 80–81 directory services, 356 headers, 81 e-commerce, 16 trailers, 82 effect on family life, 594 segments, 81 effect on healthcare, 599–600 information-based legislation, 598 effect on medicine, 599 infotainment, 594 effect on publishing, 600 infrared emitting diodes (IREDs), 207 e-mail, 283 infrastructure of Internet, backbone, 268–269 advantages, 283 inherited permissions, Active Directory, 354 emoticons, 284 initialization files, boot.ini, 372 mailbox, 285 I-node mapping, UNIX, 375 mailing lists, 286 input devices, sharing, 12 privacy, 284 instant messaging programs, 291 software, 284–286 intelligent hubs, 58, 66, 96, 214 spam, 283–284 interfaces future of, 17 GUIs, 363–364 healthcare, 20 routers, 296 online learning, 20 Sniffer network analyzer, 561 PCs in the workplace, 19 text-based, 362–363 smart appliances, 17–18 interference telephone technology, 18 attenuation, 120 high-speed connectivity, 16 crosstalk, 119 home networking, 588–589 EMI, 119 IPv6, comparing to IPv4, 589 RFI, 119 live chat, 291 internal cable modems, 494 neural networking, 591 internal configuration parameters, modems, newsgroups, 287–288 161–162 online learning, 17 internal modems, 160–162, 487 online services, fees, 15 drivers, 164 ownership, 301 UART chips, 486 portals, NFuse, 543 internal security threats privacy issues, 594–595 accidental breaches, 440 requirements for connectivity corporate espionage, 439 ISP, 270 disgruntled employees, 440 local computer/LAN, 270 internal politics, 440 MAEs, 271 rebellious users, 441 NAPs, 271 Internet. See also WWW regional providers, 270 affordability, 592 search engines, 281 as source of entertainment, 594 standardizing bodies, 301 audio/videoconferencing, 292 streaming media, 291 backbone, development, 268 telephony application, 292–293 capabilities, 273–274 universal connectivity connectivity, multiple protocol networks, 412 effect on government, 596 conversion to IPv6, 589 effect on legal system, 598 cybercafes, 280 virtual private networking, 293 CNAP.BOOK Page 711 Monday, April 30, 2001 12:45 PM

JVM 711

Internet appliance, 593 ipconfig command (Windows NT), 577–578 Internet Drafts, 302 ipconfig utility, 259 Internet Engineering Task Force (IETF), 14, IPSec (IP Security), 445, 509, 518, 520 101–102, 302 iptrace utility, 260 Internet2 Project, 269 IPv6 (Internet Protocol version 6) Internetwork Packet Exchange/Sequenced Packet comparing to IPv4, 589 Exchange, 52, 229 deploying, 590 internetworking layer (DoD model), 98 dual stacking, 590 internetworks, 37 security, 589 intranets, 37 IPv6 Forum, 590 intrusion detection, 460–461 IPX (Internetwork Packet Exchange), 230 inverse multiplexing, 172 IPX/SPX (Internetwork Packet Exchange/ inverted tree structure, 344–345, 370 Sequenced Packet Exchange), 52, 229 Novell NDS, 349 IR (infrared) technology, 209 IP addressing, 92, 231 IRC (Internet Relay Chat), 291 address classes, 232–239 IrDA (Infrared Data Association), 209 APIPA, 239 IREDs (infrared emitting diodes), 207 bits, 232 iris recognition, 456 CIDR, 238–239 IRQ (interrupt request line), 161, 198–199 classful, 235–237 ISA (Industry Standard Architecture), 196 classless, 233, 238 ISDN (Integrated Services Digital Network), dotted-decimal notation, 232 171–172 IANA, 233 bearer channels, 172 logical addresses, 239 bonding, 484 name resolution, 249–251 BRI, 483 translating names to numbers, 251–253 terminal adapters, 165, 492–493 NAT, 183–184 ISO (International Organization for obtaining, 239, 241–242 Standardization), 54, 100 octets, 232–233 ISOC (Internet Society), 14, 302 packet headers, 248–249 ISPs (Internet service providers), 270 remote access, 483 cable companies, 180 shortage of, 588–589 peering agreements, 268 subnetting, 242–245 VPN connections, 511 ANDing, 244–245 ITEN (Internet Talk and Entertainment calculating subnet masks, 243–244 Network), 594 default gateway address, 244 ITU (International Telecommunications Union), 101 quick reference chart, 244 supernetting, 239 translation, 182–185 IP forwarding, 294 J IP routing, 294 default gateway, 294 jacks, 212 dynamic, 298 JIT (just-in-time) program compilation, 544 example, 294–295 jumpers, 162 interfaces, 296 JVM, 544–545 static, 296 IP spoofing, 438 CNAP.BOOK Page 712 Monday, April 30, 2001 12:45 PM

712 Kasparov, Gary

node capacity (10BaseT), 141 K specifications summary, 142 FDDI, 147 Kasparov, Gary, 602 data transfer, 147–148 KDCs (key distribution centers), 453 frames, 149 Kerberos, 453–455 interfaces, 296 kernel, 375 IPX/SPX, 52 key pairs, 451 NetBEUI, 52 keys (security), 435 OSI protocol suite, 54 kilobytes per second (kps), Internet connection packet-switched, ATM, 178 speed, 556 proxy servers, 185–186 routed connections, 186–187 TCP/IP, 53 L Token Ring beaconing, 143 L2F (Layer 2 Forwarding), 508, 517 cable types, 144–145 L2TP (Layer 2 Tunneling Protocol), 509, 517 communication process, 143 LAN meters, 569 frames, 146 LANalyzer, 562 limitations on implementing, 147 LANs, 24 MICs, 145 advantages of, 12 MSAUs, 143–144 AppleTalk, 53, 150 repeaters, 145 addressing, 150 topology, 142 data transfer, 151 topologies zones, 150 hybrid, 60 architectures linear bus, 55–56 AppleTalk, 68 mesh, 59 ARCnet, 68–69 ring, 56 comparing, 154 star, 57–58 Ethernet, 62–67 translated connections, 182–183 Token Ring, 67–68 NAT, 185 ARCnet, 151 VPNs, 520 data transfer, 151 LANtastic, 335 packets, 153 LAPB (Link Access Procedure Balanced), 177 RJ-62 cabling, 204 laser (light amplification by stimulation and capacity planning, 121 emission of radiation), 208 characteristics, 34 law enforcement connecting with Windows 2000 future of, 21 Professional, 393 MDTs (mobile display terminals), 599 Ethernet, 132 laws governing encryption technologies, 449 5-4-3 rule, 140–141 Layer 2 switching, 220–221 10BaseT, 136, 140 Layer 3 switching, 93, 221 10Base2, 132–133 Layer 4 switching, 221 10Base5, 134–135 layered communication process, 82–84 100BaseX, 137 layered networking models, 22 1000BaseT, 137–138 boundary layers, 99 collision domains, 141 DoD, 97–98 frames, 138–139 CNAP.BOOK Page 713 Monday, April 30, 2001 12:45 PM

management software, SNMP 713

OSI, 85 LLC (logical link control) application layer, 88–89 frames, 146 communication, 86, 88–96 sublayer, 94 data link layer, 93–94 LMHOSTS file, name resolution, 252 encapsulation, 86 LOAF (Linux On A Floppy), 331 network layer, 92 local directory services, 343 physical layer, 94–96 LocalTalk, 53, 68, 150 presentation layer, 89 log files, Active Directory, 351 session layer, 90–91 logging in, permissions, 442–444 structure, 85 logical addresses, 93, 239 transport layer, 91–92 logical connection points, ports, 247 vendor-specific, 99 logical drives, 378 LBX (Low-Bandwidth X), 536 logical topologies, 24, 54, 94–96 LDAP (Lightweight Directory Access logon servers, 42 Protocol), 347–348 long distance calls over Internet, 293 leaf objects, 327, 346, 349 loopbacks, 494, 234 leased lines, 174–175 loops, bridging, 217 LEDs (light emitting diodes), 207 low-level encryption, 519 legislation lpr command (UNIX), 334 Children’s Online Privacy Protection Act, 595 information-based, 598 Networking and Information Technology M Research and Development Act, 597 length specifications, cabling, 133 MAC (Media Access Control) sublayer, 93–94 LFN (long filename) support, NTFS, 373 machine language, 76, 364 limitations on Token Ring implementations, 147 Macintosh, 401 line printer daemon, 334 connecting linear bus topology, 55–56 to Internet, 402 line-of-sight technology, 209 to Microsoft network, 401–402 link-state routing protocols, 299–301 to NetWare network, 401–402 Linux, 51, 329–331, 396–397 to UNIX network, 401–402 access remote SMB shares, 424 to workgroups, 401 connecting HFS file system, 376–377 to Internet, 400 zones, 401 to Microsoft network, 398 MAEs (metropolitan area exchanges), 271 to NetWare network, 399 mail clients, 44 to UNIX/Linux network, 399–400 mail servers, 42 FreeS/WAN, 518 mailbox, 285 ifconfig command, 399–400, 578 mailing lists, 286–287 passwd file, editing, 332–333 mainframes SNA, 422 single point of failure, 10 listing command parameters, 366 SNA, 51 ListServ, 287 Majordomo, 287 live chat, 291 management frames (Token Ring), 146 LLAP (LocalTalk Link Access Protocol), 68 management philosophy, as security selection criteria, 433 management software, SNMP, 88 CNAP.BOOK Page 714 Monday, April 30, 2001 12:45 PM

714 ManageWise (Novell)

ManageWise (Novell), 564 cryptoanalysis, 448 ManageX component (OpenView), 567 digital certificates, 452–453 managing ICMP Echo Requests, 436 network performance, hardware, 568–569 MetaCrawler, 282 network services, 562 MetaFrame (Citrix), 542 permissions, 48 metasearch engines, 282 shared resources, 317–319 metatags, 281 user accounts, 313–317 methodology of troubleshooting, 569–571, 579–580 mandatory directory objects, 342 metric, 298 MANs (metropolitan area networks), 24, 35–36 MIBs (Management Information Bases), 88 mapping Microsoft network drives DOS NetWare networks, 328 commands, 366 UNIX, 334 directories, 371 Windows, 323 NWLink, 52 utilization patterns, 554 print devices, 326 MCA (Micro Channel Architecture), 197 servers, displaying, 365 MD netguide, 599 SMB (Server Message Block), 415 MD5 (Message Digest 5), 452 wizards, 325 MDTs (mobile display terminals), 21, 599 Microsoft Active Directory, 350–352 measuring Microsoft .NET, 545 baseline performance, 553–554 Microsoft Performance Monitor. See Performance Internet connection speed, 554–556 Monitor media, 22, 200 Microsoft Plus! Pack, 388 , 200–202 Microsoft Services for UNIX, 398 impedence, 201 Microsoft SMS, 563–564 thicknet, 203 Microsoft SNA Server, 422 thin coax, 201–202 Microsoft Terminal Services, 541 connectors, 213 Microsoft Windows 9.x, folders, 371 data backups, 469 microwave technologies, 119, 181 fiber-optic cable, 206 MICs (media interface connectors), 145 filters, 196 midsplit broadband configuration, 113 RG (Registered Grade) specifications, 202 Milnet, 9 twisted-pair cable, 204–205 minicom, 400 wireless, 207 mixed gas lasers, 209 IR, 209 MMV (Microsoft Management Console), 322 laser, 208 mobile users, 480 radio, 210 models of human intelligence, 602 media access, 121 models of networking, 84 CSMA/CD, 62 DoD, 97–98 demand priority, 67 OSI, 85 token passing, 143–144, 152 application layer, 88–89 memory, bytes, 79 communication between layers, 86, 88–96 memory address, NIC configuration, 199 data link layer, 93–94 mesh topologies, 59–60, 169 encapsulation, 86 message digest, 452 network layer, 92 messages physical layer, 94, 96 CNAP.BOOK Page 715 Monday, April 30, 2001 12:45 PM

NAUNs (nearest upstream active neighbors) 715

presentation layer, 89 multicast messaging, 234 session layer, 90–91 multilink configuration, 484 structure, 85 ISDN, 165 transport layer, 91–92 multimaster replication, 353 standardization, 84 multimode fiber-optic cable, 206–207 vendor-specific, 99 multiple client/server operating systems, 417 modems, 160, 484, 486. See also terminal adapters multiple platform networks, PC-to-Macintosh acoustic couplers, 486 communications, 418 actual connection speed, 555 multiple security protocols, implementing, 464 asynchronous communication, 485 multiple-operating system networks, 415 banks, 164–165 multiple client systems, 417 callback security, 490 multiple server systems, 415–417 COM port, troubleshooting, 489 multiple-platform networks, 411, 417, 419 configuration, 164 handheld-to-PC, 419 customizing, 488 Internet connectivity, 412 drivers, 164 multiple NOSs, 412 external, 163–164, 487 network/transport protocols, 411 fallback, 485 PC communication, 419 half-duplex transmission, 118 PC-to-mainframe communication, 418–419 initialization strings, 486 security, 412–413 internal, 161–162, 487 multiplexing, 113–114 internal configuration parameters, 161–162 multipoint videoconferencing software, 292 PCMCIA, 487 multiport repeaters, 214 PnP, 162, 487 multistation repeaters, 94–96 port speed, 555 multitasking, 92 SecurID, 499 cooperative multitasking, 380 sharing, 12 multitiered WANs, 169 troubleshooting, 489–491 multiverses, 592 UART chips, 486 mutual authentication, 483 modulation, 109 monitoring counters, 559 N Internet activity, privacy issues, 595 performance, 556–557 name resolution, 249–251 protocol-specific traffic patterns, 554 domains, 250 mount command (UNIX), 334 translating names to numbers, 251–253 MPPE, 519 name resolution servers, 43 MSAUs (multistation access units), 57, 94, 143–144 namespace, 344–345 MS-CHAP (Microsoft Challenge Handshake naming conventions Authentication Protocol), 483 files, 370 MS-DOS, 379–381 LDAP, 347–348 MSN Speedtest, 556 NAPs (network access points), 269–271 MSPs (management service provicers), 568 narrowband radio, 210 MTU (maximum transmission unit), Ping of Death NAT (Network Address Translation), 183–185 attacks, 437 necessity of TCP/IP, 412 multiboot computers, 372 National Physicians Database, 600 NAUNs (nearest upstream active neighbors), 143 CNAP.BOOK Page 716 Monday, April 30, 2001 12:45 PM

716 navigating the Internet

navigating the Internet, 280–282 network management nbstat command, 258, 364 devices, 568–569 NCPFS (NCP File System), 399 software, 562 NDS (Novell Directory Service), 327, 349–350 CMIP, 567 need for VPNs, 510 Hewlett Packard OpenView, 566 Nelson, Ted, 279 IBM Tivoli Enterprise, 566 nesting user accounts, 317 Microsoft SMS, 563–564 Net PCs, 540 MSPs (management service net use command, 325 providers), 568 net view command, 365 Novell ManageWise, 564 Net Watcher, 556 SNMP, 567 NetBEUI (NetBIOS Extended User Interface), 52, network media, 200 227–228 coaxial cable, 200–202 NetBIOS (Network Basic Input/Output System), 43, impedence, 201 90, 227–228 thicknet, 203 netstat command, 256–257 thin coax, 201–202 NetWare, 326–328 fiber-optic cable, 206 Bindery, 326–327 RG (Registered Grade) specifications, 202 capture command, 329 twisted-pair cable, 204–205 clients, 328–329 wireless, 207 config command, 576 IR, 209 CSNW, 390–391 laser, 208 drives, mapping, 328 radio, 210 NDS, 327 Network Monitor, displaying captured data, 559 NetWare Lite, 308 network nodes, 422 network administration network numbers, 230 best practices, 554 Network Services properties dialog box (Windows client/server systems, 309–311 2000), 394 proactive, 552 network transport protocols, NetBEUI, 227–228 reactive, 551 Network+ certification program, 570 user accounts network/transport protocols creating, 315 IPX/SPX, 229–230 default groups, 316 NetBIOS, 227–228 distribution groups, 316 networking LINUX, 331–333 accessibility, 432 managing, 313, 315, 317 AppleTalk, 53 nesting, 317 architecture security groups, 316 AppleTalk, 68 universal, 316 ARCnet, 68–69 UNIX, 331–333 Ethernet, 62–67 Network Computer architecture, 539 Token Ring, 67–68 Network Connection Wizard, Windows 2000, 396 bandwidth, 112 network interface layer (DoD model), 98 capacity planning, 121 network layer (OSI reference model), 92 Ethernet frames, 82 IPX, 229 hybrid, 51 IPX/SPX, 52 LAN characteristics, 34 CNAP.BOOK Page 717 Monday, April 30, 2001 12:45 PM

NICs (network interface cards) 717

layered communication process, 82–84 ring, 56 MANs, 35–36 star, 57–58 NetBEUI, 52 transmission methods neural, 590–591 baseband, 112–113 nodes, 44 broadband, 113 peer-to-peer, 44 VPNs centralized administration, 45 comparing to dialup, 510–512 security, 45 configuring, 522–525 quantum physics, application of, 591 extranets, 514–515 segmentation, 214 gateway configuration, 515 server-based, 47 hardware-based, 522 administration, 48 operation, 506 security, 48–49 performance, 512, 521 sharing resources, 311, 313 privacy, 506 standards-setting bodies, 100 remote access, 512–514 IEC, 101 scenarios, 512–515 IEEE, 102–104 software-based, 522 IETF, 101–102 tunneling, 507–509 ISO, 100 WANs, 37–38 ITU, 101 Networking and Information Technology Research subnets per address class, calculating, 237 and Development Act, 597 subnetting, 242–245 networking models, 22, 84 TCP/IP, 53 DoD, 97–98 teamwork methodology, 83–84 OSI, 85 thin client, 532–533 application layer, 88–89 advantages of, 534 communication between layers, 86–96 BOOTP, 537–538 data link layer, 93–94 cost, 534 encapsulation, 86 desktop computers, 540 network layer, 92 DHCP, 537–538 physical layer, 94–96 handheld PCs, 541 presentation layer, 89 hardware, 538–541 session layer, 90–91 ICA, 536 structure, 85 Net PCs, 540 transport layer, 91–92 Network Computer, 539 standardization, 84 RDP, 536 vendor-specific, 99 RFB, 537 network-level security, 314 security, 535 neural networking, 590–591 software, 541–542, 544–545 newsgroups, 287 TFTP, 537–538 NNTP, 288 WBTs, 539 software, 288 XDMCP, 536 NFS file system, 377 topologies NFuse (Citrix), 543 hybrid, 60 NICs (network interface cards), 22, 95, 134, 195 linear bus, 55–56 combo cards, 95, 198 mesh, 59 configuring, 197 I/O port, configuring, 199 CNAP.BOOK Page 718 Monday, April 30, 2001 12:45 PM

718 NICs (network interface cards)

IRQ, configuring, 198–199 NSF (National Science Foundation), development of MAC address, 93–94 Internet backbone, 9, 268 memory address, configuring, 199 nslookup, 255 role in addressing, 195 ntbackup.exe command, 364 selecting, 95, 196–198 NTFS (New Technology File System), 372–373 transceivers, 196 NTFS 5, 374 NIS (Network Information System), 331 nuke attacks, 436 NLMs (NetWare loadable modules), 256–257, 327 null modem cable, 95 NLSP (NetWare Link Services Protocol), 299 numbering systems, 76 NNTP (Network News Protocol), 288 binary, 78–80 node numbers, 230 decimal, 76 nodes, 43–44, 268 hexadecimal, 77–78 addresses, 68 NWLink, 52, 229 capacity, 10BaseT Ethernet, 141 nonaxial light transfer, 207 noncontention methods, token passing, 123 O nonroutable protocols, 216, 219 NOSs (network operating system), 23, 38 OBI (Open Buying on the Internet), 515 Banyan VINES, 334 object classes, 343 hybrid, 51 object-oriented systems, 341 LANtastic, 335 objects multiple per network, 412 LDAP, naming conventions, 347–348 NetWare, 50, 326–327 namespace, 344–345 capture command, 329 obtaining IP addresses, 239–242 clients, 328–329 OC-SONET, 179 network drives, mapping, 323 octets, 232–233, 437 security, 317 on-demand VPN connections, 507 selecting, 320 one-way cable, 180 shared resources, managing, 317–319 online learning, 17, 20 terminal services, 310 online services, costs of, 15 UNIX, 50, 329–330 Open Source Initiative, 329 user accounts, creating, 315, 317 operating systems, 50, 379 Windows 9.x, 50 backward compatibility, 373 printers, sharing, 324–326 boot managers, 372 wizards, 325 booting, 361 Windows 2000, 322–323 case sensitivity, 364 Windows NT 4.0, 321 client operating systems, 44 Novell command prompt, 362 Bindery, 326–327 commands, 364 IPX/SPX, 52 arguments, 365–366 LANalyzer, 562 backslashes, 370 leaf objects, 327 syntax, 364–365 ManageWise, 564 configurations, troubleshooting, 576–578 NDS, 349–350 DOS, commands, 366 NetWare, 50 file extensions, 368–370 tcpn NLM, 256–257 file systems, 369 NSA security ratings, 460 FAT, 371–372 CNAP.BOOK Page 719 Monday, April 30, 2001 12:45 PM

operating systems 719

fragmentation, 373 managing shared resources, 317–319 hard disk, 377 security, 317 HFS, 376–377 selecting, 320 HPFS, 376 UNIX, 50 inverted tree structure, 370 Windows networks, 50 NFS, 377 NSA security ratings, 460 NTFS, 372–373 OS/2, 335, 403 recoverability, 376 security reliability, 376 blank passwords, 443 sector sparing, 373 implementing, 441 selecting, 377 server operating systems, 47 SMBF, 424 shells, 363 tree structure, 370 text-based, 363 UNIX, 374–375 thin client networking, 532–533 VFAT, 372 thin clients, 533 files, 367–368 advantages of, 534 boot.ini, 372 BOOTP, 537–538 naming conventions, 370 cost, 534 pathnames, 370 desktop computers, 540 GUI-based, 363–364, 367 DHCP, 537–538 kernel, 375 handheld PCs, 541 Linux, 330–331, 396–397 hardware, 538–541 connecting to Internet, 400 ICA, 536 connecting to Microsoft network, 398 Net PCs, 540 connecting to NetWare network, 399 Network Computer, 539 connecting to UNIX/Linux network, RDP, 536 399–400 RFB, 537 ifconfig command, 399–400 security, 535 ipconfig command, 578 software, 541–545 SNA, 422 TFTP, 537–538 log files, 571–573 WBTs, 539 Macintosh, 401 XDMCP, 536 connecting to Internet, 402 UNIX, 329–330, 396–397 connecting to Microsoft network, 401– clients, 333 402 connecting to Internet, 400 connecting to NetWare network, 401–402 connecting to Microsoft network, 398 connecting to UNIX network, 401–402 connecting to NetWare network, 399 connecting to workgroups, 401 connecting to UNIX network, 399–400 zones, 401 forward slashes, 370 MS-DOS, 379, 381 mapping network drives, 334 multiple client/server, 417 open source code, 330 multitasking, 92 VPNs, 509 NetWare, 326–327 Windows 2000 Professional, 322–323, 392– clients, 328–329 393 CSNW, 390–391 connecting to Microsoft network, 393– NOSs, 38 395 hybrid, 51 connecting to NetWare network, 395 CNAP.BOOK Page 720 Monday, April 30, 2001 12:45 PM

720 operating systems

connecting to remote server, 396 oversampling, 116 dynamic disks, 379 ownership of Internet, 301 NTFS 5, 374 Windows 3.x, 379–381 Windows 9.x, 381–382 P connecting to Microsoft network, 382– 386 packet data network technologies, 181 connecting to NetWare network, 386 packet filtering, 462 connecting to remote server, 388 packet sniffers, 436 mapping network drives, 323 packet switched networks, 7, 176 Microsoft Plus! Pack, 388 ARPAnet, 9 peer configuration, 383–386 ATM, 178 printers, sharing, 324–326 clouds, 176 Windows NT 4.0, 321 comparing to circuit-switching, 8 Windows NT Workstation, 388–391 Frame Relay, 177–178 connecting to Microsoft network, 389 SMDS, 181 connecting to NetWare network, 390–391 versus circuit switching, 170 connecting to remote server, 391 X.25, 176–177 operations masters, PDCs, 353 packets, 80–81 operator error, troubleshooting, 570 ARCnet, 153 optical fiber, 206 headers, 81, 248–249 dispersion, 207 structure, 82 FDDI, dual-ring topology, 147–148 tracing utilities, 575 optimizing network performance, 552 trailers, 82 orange book, 459 PAD (packet assembler/disassembler), 166 organizations, standards-setting bodies, 100–104 parallel processing, 160 OS/2 (IBM), 335, 403 neural networking, 591 HPFS, 376 parameters, listing for commands, 366 Warp Server, 403 parent objects, 344–345 OS/400 directory services, 355 parity, 470 oscilloscopes, 569 partial mesh topologies, 169 OSI (Open Systems Interconnection) reference partitions, 378 model, 85 passive detection, 461 application layer, 88–89 passive hubs, 58, 96, 213 communication between layers, 86–96 passive topologies, buses, 56 encapsulation, 86 passwd file, editing, 332–333 data link layer, 93–94, 508 passwords, 434, 436, 443–444 network layer, 92 authentication, 451 physical layer, 94–96 Kerberos, 453–454 presentation layer, 89 mutual authentication, 483 session layer, 90–91 smart cards, 455–456 structure, 85 bypassing, 443 transport layer, 91–92 case-sensitivity, 570 OSI protocol suite, 54 login permissions, 442–444 OSPF (Open Shortest Path First), 301 share-level security, 46 OTDR (optical time domain reflector), 464 patch panels, 212–213 OUs (organizational units), 323 pathnames, 370 CNAP.BOOK Page 721 Monday, April 30, 2001 12:45 PM

power backups 721

pathping, 574 counters, 559 PBX (private branch exchange), 172 PCI (Peripheral Component Interconnect), 197 PCMCIA (Personal Computer Memory Card permissions, 48 International Association), 197, 487 Active Directory, 354 PCs managing, 48 domestic use, 16–18 NTFS, 372 dual-boot, 372 phase, 110, 208 in the workplace, 19 Phase 1 (AppleTalk), 150 standalone systems, 10 Phase 2 (AppleTalk), 150 standard IRQ settings, 199 physical layer (OSI reference model), 87, 94, 96 PC-to-Macintosh communications, 418 NICs, 195–196 PC-to-mainframe communication, 418–419 physical security, implementing, 464 PDA-to-PC communication, 419 physical topology, 24, 54 PDCs (primary domain controllers), 321 ping, 254–255, 573–574 operations masters, 353 Ping of Death attacks, 437 SAM database, 321 ping time, 574 peer configuration, Windows 9.x, 383–386 PKI (public key infrastructure), 349, 453 peering agreements, 268 Planck, Max, 592 peer-to-peer networks, 22 platform, 417–419 centralized administration, 45 plenum-grade cable, 23, 200 characteristics, 44 PLP (Packet Layer Protocol), 177 comparing to client/server networks, 38–39 plugs, 212 NetWare Lite, 308 PnP (Plug and Play), 162, 487 security, 45–46 point-to-point dedicated connections, 481 performance point-to-point videoconferencing software, 292 baselining, 553 point-to-point WANs, 166–167 identifying high usage, 553 poison reverse, 300 mapping utilization patterns, 554 policies monitoring protocol-specific traffic, 554 remote access security, 498 best practices, 554 security, 457 connectivity testing utilities, 579 acceptable use, 458 Internet connection speed, measuring, 554–556 auditing, 460–461 logging, 571, 573 firewalls, 461–463 monitoring tools, 556–557 government ratings, 459–460 Novell LANalyzer, 562 multiple protocols, 464 Sniffer, 560 physical security, 464 MSPs (management service providers), 568 termination, 459 software, 570 polynomials, 139 throughput, optimizing, 552 POP (Post Office Protocol), 284–285 tracing utilities, 575 PoPToP, 517 troubleshooting port numbers, 92 configurations, 576–578 port switches, 220 methodology, 569–571 portals, 282, 543 VPNs, 512, 521 ports, 246–248 Performance Monitor, 558 asynchronous communication ports, 485 alerts, 558 well-known, 247 CNAP.BOOK Page 722 Monday, April 30, 2001 12:45 PM

722 PPP (Point-to-Point Protocol)

power backups, 465 remote access, 482 generators, 466 UPSs, 466 PPP (Point-to-Point Protocol), 400 routing PPTP (Point-to-Point Tunneling Protocol), 508, 517 distance-vector, 298 preamble, 139 link-state, 299 preemptive multitasking, 381 session layer, 90 presentation layer (OSI reference model), 89 thin client PRI (Primary Rate ISDN), 172 BOOTP, 537–538 primary domain controllers (PDCs), 50 DHCP, 537–538 primary partitions, 378 ICA, 536 primary ring (FDDI), 147 RDP, 536 print servers, 42 RFB, 537 print spool, 326 TFTP, 537–538 printers XCMCP, 536 sharing on Windows networks, 324–326 transport layer, 245 UNIX shares, 334 ports, 247–248 privacy, 594–595 sockets, 248 Children’s Online Privacy Protection Act, 595 TCP, 246 e-mail, 284, 446–448 UDP, 246 VPNs, 506 tunneling private addresses (NAT), 183–184 CIPE, 519 private data types, 433 IPSec, 518 proactive network administration, 552 L2F, 517 problem-solving skills, troubleshooting L2TP, 517 methodologies, 579–580 PPTP, 517 production networks, 380 SSH, 519 protocol-specific traffic patterns, monitoring, 554 profiles, hardware, 393 proxy servers, 43, 185–186, 461–463 programming languages, XML, 545 reverse hosting, 463 programs reverse proxy, 463 expert systems, 602 software, 185 Trojan horses, 438 transparent proxies, 186 protocol analyzers, 554, 557 PSDN (Public Switched Data Network), 176–177 protocol stack, 228 PSTNs (public switched telephone networks), 171 protocol suites, 231 public education, online learning, 17, 20 layers, 85 public/private key encryption, 450–451 TCP/IP, IP addressing, 231 published shared resources, 42 protocols, 23 publishing, 600–601 application layer, 88, 261 put command (FTP), 290 binding order, 414 PVC (polyvinyl chloride), 23 captured data, displaying, 559 PVCs (permanent virtual circuits), 177 encryption PXE (Preboot Execution Environment) Blowfish, 520 standard, 538 IPSec, 520 MPPE, 519 LAN, 520 CNAP.BOOK Page 723 Monday, April 30, 2001 12:45 PM

remote access 723

devices, 484 Q-R cable modems, 493–494 CSUs/DSUs, 494 Qbone, 269 terminal adapters, 492–493 quantum physics, applying to networking, 591 guest accounts, 481 qubits, 592 IP addressing, 483 mobile users, 480 radio frequency interference, 119 modems, 484–486 radio technology, 210 customizing, 488 RADIUS (Remote Authentication Dial-In User external, 487 Service), 483, 498 internal, 487 RAID (redundant array of inexpensive disks), PCMCIA, 487 469–470 PnP, 487 Rainbow Technologies, I-key, 456 troubleshooting, 489–491 RAM (random access memory), configuring protocols, 482 memory address, 199 security, 496 RBOCs (regional Bell operating companies), 269 account lockout, 499 RC (Rivest Cipher)-4, 450 callback, 497 RDNs (relative distinguished names), 348 hosts, 499 RDP (Remote Desktop Protocol), 536 policies, 498 reactive network administration, 551 RADIUS, 498 receptacles, 212 telecommuting, 479 recoverability of file systems, 376 VPNs, 481, 505–506 red book, 459 authentication, 521 redirectors, 89 authorization, 521 Windows-to-NetWare, 420 Blowfish, 520 redundancy, 471 CIPE, 519 clustering technologies, 471 comparing to dialup networking, 510–512 fault tolerance, 10 configuring, 522–525 star WANs, single point of failure, 168 encapsulation, 508–509 redundant array of inexpensive disks (RAID), encryption, 521 469–470 hardware-based, 522 regional providers, 270 IPSec, 518, 520 relative distinguished names (RDNs), 348 L2F, 517 relative pathnames, 370 L2TP, 517 reliability LAN protocols, 520 of file systems, 376 MPPE, 519 of ring topologies, 57 need for, 510 remote access, 478 operating system support, 509 after-hours connectivity, 478–479 operation, 506 authentication, 482–483 performance, 512, 521 bandwidth aggregation, 483 PPTP, 517 branch offices, 478 privacy, 506 clients, configuring, 495–496 scenarios, 512–515 dedicated connections, 481 software-based, 522 SSH, 519 tunneling, 507–509 CNAP.BOOK Page 724 Monday, April 30, 2001 12:45 PM

724 remote access servers

remote access servers, 43 routable protocols, 219 Remote Administration mode (Microsoft Terminal route print command, 297 Services), 542 route tracing utilities, 260 Remote Authentication Dial-In User Service routed connections, 186–187 (RADIUS), 483, 498 routed networks, 38 Remote Desktop Protocol (RDP), 536 router-based VPNs, 522 removable storage support, NTFS 5, 374 router-to-router VPNs, 515 repeaters, 56–58, 96, 120, 213–214 configuring, 515–516 Token Ring, 145 routing, 92, 217–219, 294 replication, Active Directory, 353 ACLs, 464 requirements default gateway, 187, 218, 294 for Internet connectivity, 270–271 dynamic, 219, 298 for thin clients, 532 example, 294–295 research and development gateway services, 419–420 AI (artificial intelligence), 602 cross-platform solutions, 420–421 ARPAnet, 597 firewalls, 462 cybernetics, 603 Microsoft SNA, 422 medical, 599 Samba, 422–423 resource forks, 377 SNA, 421–422 resources interfaces, 296 browse list, 41 poison reverse, 300 leaf objects, 327 split horizon, 299–300 printers, capturing a printer port, 319 static, 219, 296 shares, 40 triggered updates, 300 retinal scanners, 456 routing protocols reverse hosting, 463 distance-vector, 298–300 reverse proxy, 463 link-state, 299–301 RF (radio frequency) technologies, 181 routing tables, 216 RFB (Remote Frame Buffer) protocol, 537 viewing, 297 RFCs (Requests for Comments), 102, 302 RPC (remote procedure calls), 377 RFI (radio frequency interference), 119 RSA public key encryption, 450 RG (Registered Grade) specifications, 202–203 RTS (request to send), 123 RG-8 cabling, 62 RG-11 cabling, 62 RG-58 cabling, 201 S RG-58U cabling, 64 RG-62 A/U cabling, 152 SAINT (Security Administrator’s Integrated ring topologies, 56–57 Network Tool), 461 rings (WAN), 167 SAM (security accounts manager) database, 50, 321 RIP (Routing Information Protocol), 299–300 Samba, 51, 422 Rivest, Ron, 450, 452 SAP (Service Advertising Protocol), 230 RJ connectors, 212 SATAN (Security Administrator’s Tool for RJ-45 connectors, 198 Analyzing Networks), 461 RJ-62 cabling, 204 satellite technologies, 181 rogue servers, 242 SavvySearch, 282 role of NICs, 195 scattering, 120 root (UNIX), 330 schemata, 343 CNAP.BOOK Page 725 Monday, April 30, 2001 12:45 PM

security 725

Schrödinger, Erwin, 592 laws governing, 449 science fiction, cybernetics, 603 MPPE, 519 scripts, 332 public/private key, 450–451 modem initialization strings, 486 secret key, 449–450 SDS (Sun Directory Services), 355 VPNs, 506 SDSL (Symmetric DSL), 173–174 end-to-end, 445 search engines, 281–282 file encryption, 445 search/retrieval mechanisms, 281 hackers, 435 secondary ring (FDDI), 147 hash algorithms, 452 second-level domain names, 250 identification technologies translating to IP addresses, 251–253 biometrics, 456–457 secret key encryption, 453 smart cards, 455–456 sectors implementing, 441 signatures, 376 SSL, 446 sparing, 373 internal threats SecurID modem, 499 accidental breaches, 440 security, 431 corporate espionage, 439 access control lists, 312, 464 disgruntled employees, 440 access control policies, 443–444 internal politics, 440 Active Directory, 354 rebellious users, 441 assessing need for, 432 IP spoofing, 438 management philosophy, 433 IPSec, 445 type of business, 432 tunneling, 509 type of data, 433 IPv6, 589 attacks keys, 435 brute force, 435 multiple protocol networks, 412–413 DDoS, 433 NOSs, 317 authentication, 451 Novell NDS, 350 biometrics, 458 nuke attacks, 436 Kerberos, 453–455 operating systems, implementing, 441 mutual authentication, 483 passwords, 434–436 clustering technologies, 471 case-sensitivity, 570 computer viruses, 438 peer-to-peer networks, 45–46 crackers, 435 permissions, 442–444 databases, 42 PKI (public key infrastructure), 349, 453 digital certificates, 452–453 policies, 457 digital signatures, 452 acceptable use, 458 DoS attacks, 436 auditing, 460–461 ICMP floods, 436 firewalls, 461, 463 Ping of Death attacks, 437 government ratings, 459–460 smurf attacks, 437 multiple protocols, 464 SYN attacks, 438 physical security, 464 e-mail, 446, 448 termination, 459 encryption remote access, 496 asymmetric, 451 account lockout, 499 Blowfish, 516, 520 callback, 497 IPSec, 520 hosts, 499 CNAP.BOOK Page 726 Monday, April 30, 2001 12:45 PM

726 security

policies, 498 security, 48–49 RADIUS, 498 user authentication, 48 server-based networks, 48–49 servers, 39, 43 share-level, 313 Active Directory, 353 social engineering attacks, 435 AppleShareIP, 335 thin clients, 535 application servers, 319 threats, 434 ASPs, 545 external, 434 BOOTP, 538 internal, 439–441 dedicated servers, 42–43 trade-offs, 432 DHCP, 538 Trojan horses, 438 Microsoft, displaying, 365 user accounts, 312 multiple client operating systems, 417 creating, 315 multiple server operating systems, 415–417 managing, 313–317 rogue (DHCP), 242 user-level, 312 shares, 40 VPNs SMTP, 284–285 authentication, 521 thin clients, 532–533 authorization, 521 advantages of, 534 encapsulation, 508–509 BOOTP, 537–538 encryption, 521 cost, 534 need for, 510 desktop computers, 540 operating system support, 509 DHCP, 537–538 security groups, 316 handheld PCs, 541 seek time, 378 hardware, 538–541 segmentation, 214 ICA, 536 bridges, 214–216 Net PCs, 540 brouters, 220 Network Computer, 539 routers, 217–219 RDP, 536 switches, 220–221 RFB, 537 segments, 61, 81 security, 535 selecting software, 541–542, 544–545 data backup media, 469 TFTP, 537–538 file systems, 377 WBTs, 539 NICs, 95, 196–198 XDMCP, 536 NOSs, 320 Web, 277 WAN technologies, 160 services, WWW, 282 Sendmail, 285 Services for UNIX, 398 separate clock signal, 115 session layer (OSI reference model), 90–91 serial devices, modems, 160, 163 SHA (Secure Hashing Algorithm), 452 serial ports, UART chips, 163–164 share names, 317 server farms, 311, 543 share permissions, 372 Server Message Block (SMB) protocol, 398 shared network technologies, 148 server-based networks, 22, 47 shared resources administration, 48 application servers, 319 centralized computing, 308 browse list, 41 client machines, operating systems, 361–404 directory services, 343 permissions, 48–49 home directories, 318 CNAP.BOOK Page 727 Monday, April 30, 2001 12:45 PM

software 727

managing, 317–319 smart sets, Tivoli Enterprise, 566 mapping to (Windows networks), 324 SMB (Server Message Block), 398, 415 shared secret encryption, 449–450 SMBF (SMB File System), 424 shared-bandwidth technologies, CATV, 180 SMDS (Switched Multimegabit Data Service), 181 share-level security, 46, 312–313 smileys, 284 shares, 40 SMSAU (smart MSAU), 144 leaf objects, 327 SMTP (Simple Mail Transfer Protocol), 88, Linux, remote access, 424 284–285 printers, capturing a printer port, 319 smurf attacks, 437 publishing, 42 SNA (Systems Network Architecture), 51, 89, shareware, 279 421– 422 sharing network resources, 12, 311–313 snap-ins, 322 shell account, 400 Sniffer network analyzer, 560 shells, 363 sniffers, 557 SSH, 519 SNMP (Simple Network Management Protocol, shielding, 119, 206 88, 567 shortage of IP addresses, 588–589 social engineering attacks, 435 signal bounce, 55 sockets, 246, 248 signaling software analog, 109 active detection, 461 attenuation, 120 ASPs, 545 baseband, 112 backup programs, 469 broadband, 113 Citrix, 536 crosstalk, 119 drivers, 164 digital, 110–111 e-mail, 89, 284–286, 447 EMI, 119 gateway services, 419 physical layer, 94–95 cross-platform solutions, 420–421 RFI, 119 Microsoft SNA, 422 silver satin, 212 Samba, 422–424 simple connectivity devices, 211–213 SNA, 421–422 simple connectors, 211 Windows-to-NetWare redirectors, 420 BNC connectors, 211 NAT, 185 fiber-optic connectors, 212 network management, 562 patch panels, 212 CMIP, 567 RJ connectors, 212 Hewlett Packard OpenView, 566 Simple Mail Transfer Protocol (SMTP), 88, IBM Tivoli Enterprise, 566 284–285 Microsoft SMS, 563–564 Simple Network Management Protocol (SNMP), Novell ManageWise, 564 88, 567 SNMP, 567 simplex communication, 90, 116–117 newsgroups, 288 single point of failure, 10, 168 Open Source Initiative, 329 single-master operations, 353 performance monitoring, 556–557 single-mode fiber-optic cable, 206 proxy servers, 185–186 “slash x” networks, 238 terminal services, 310 smart appliances, 17–18 thin clients smart bombs, 597 Citrix Winframe/MetaFrame, 542 smart cards, 455–456 JVM, 544–545 CNAP.BOOK Page 728 Monday, April 30, 2001 12:45 PM

728 software

Microsoft Terminal Services, 541 star topologies, 57, 168 Web-based solutions, 544 bus, 140 X Window, 543 fault tolerance, 58 troubleshooting, 570 start delimiter (Token Ring frames), 146 videoconferencing, 292 starting User Manager for domains, 321 Web authoring, 277 star-wired ring topology, 143 software-based VPNs, 522 static routing, 219, 296 SOHO (small office/home office), home networking, storage devices, sharing, 12 588–589 store-and-forward switching, 220 SONET (Synchronous Optical Network), 179 STP (shielded twisted-pair), 22, 204–205) source code, HTML, 277 strategic weapons, smart bombs, 597 source route bridging, 216 streaming media, 291 Space and Naval Warfare Center, 597 telemedicine, 599 spams, 283–284 strong encryption, 449 sparse files (NTFS 5), 374 structure specifications of ARCnet packets, 153 AppleTalk, 150 of DNS domains, 346 FDDI, 148 of Ethernet frames, 138 Net PCs, 540 of FDDI frames, 149 spiders, 281 of OSI model, 85 SPIDs (service profile identifiers), 165, 492 of packets, 82 split horizon, 299–300 of Token Ring frames, 146 spread spectrum radio, 210 sublayers of data link layer, 93 SPX (Sequenced Packet Exchange), 230 subnets, 214, 217, 242–245 SQL (Structured Query Language), 310 ANDing, 244–245 SSH (Secure Shell), 519 bridges, 214, 216 SSL (Secure Sockets Layer), 446 brouters, 220 STA (Spanning-Tree Algorithm), 217 default gateway address, 218, 244 standalone systems, 10 masks, 242–244 standard encryption, 449 per address class, calculating, 237 standard Ethernet, 134–135 quick reference chart, 244 standards, 84 routing, 217, 219 directory services, 346 switching, 220–221 DAP, 347 Sun Microsystems LDAP, 347–348 Network Computer, 539 X.500, 346 NFS, 377 Internet, 301 NIS, 331 IR, 209 supercomputer centers, 269 RFCs, 102 supernetting, 239 RG specifications, 202–203 Supervisor account (NetWare 3.x), 327 standards-setting bodies, 100 surge protection, 465–466 IEC, 101 SVCs (switched virtual circuits), 178 IEEE, 102–104 switched 56, 175–176 IETF, 101–102 switched routers, 221 ISO, 100 ITU, 101 CNAP.BOOK Page 729 Monday, April 30, 2001 12:45 PM

Telus.net High Speed Internet 729

switches (commands) address classes, 232–239 ARP command, 256 APIPA, 239 netstat command, 256 automatic address allocation, 239–242 text-based operating systems, 365 bits, 232 switching, 170 CIDR, 238–239 circuit-switching, 6–7, 170 classful, 235–237 DDS, 174 classless addressing, 238 DSL, 172 dotted-decimal notation, 232 ISDN, 171–172 IANA, 233 leased lines, 174 logical addresses, 239 PSTN, 171 name resolution, 251–253 switched 56, 175–176 octets, 232–233 T-carriers, 174–175 packet headers, 248–249 hubs, 220 subnetting, 242–245 Layer 2, 220–221 supernetting, 239 Layer 3, 93 routing, 294 Layer 4, 221 dynamic, 298 packet-switching, 7–8, 176 example, 294–295 ATM, 178 interfaces, 296 Frame Relay, 177–178 static, 296 X.25, 176–177 Telnet protocol, 290 symmetric encryption, 449 utilities, 254–255, 573 SYN attacks, 438 ARP, 255 synchronous transmission, 115–116 configuration, 259 syntax nbstat command, 258 commands, 364–365 netstat command, 256–257 UNIX file systems, 375 route tracing, 260 sys (UNIX), 330 tcpn NLM, 256–257 System Monitor (Windows 2000), 558 TCSEC (Trusted Computer System Evaluation system requirements, thin client, 532 Criteria), 459–460 Systems Network Architecture. See SNA TDM (time-division multiplexing), 114 Sysvol (Shared System Volume), Active TDRs (time domain reflectometers), 568 Directory, 351 teamwork methodology of networking, 83–84 technology, effect on military strategy, 597 telcos, 18 T telecommuting distance-learning, 601 T-carriers, 174–175 remote access, 479 T-connectors, 63, 211 tele-examinations, 20 TCP (Transport Control Protocol), 91, 246 telegraph cables, development of, 6 three-way handshakes, 437 telemedicine, 599 TCP/IP, 53 telephony applications, 274, 292–293 application layer protocols, 261 acoustic couplers, 486 configuration information, viewing, 366 development of, 6–7 connectivity testing utilities, 579 servers, 43 FTP, 289–290 Telnet, 88, 290 IP addresses Telus.net High Speed Internet, 556 CNAP.BOOK Page 730 Monday, April 30, 2001 12:45 PM

730 terminal adapters

terminal adapters, 165, 492–493 third-party boot management utilities, 372 SPIDs, 165 threads, 377 terminal servers, 43, 531 threats to security terminal services, 310 external attacks, 434 terminals, 9 computer viruses, 438 termination policies, 459 DoS attacks, 436–438 terminators, 55, 211 IP spoofing, 438 terrorists, cyber terrorists, 597 worms, 438 text-based operating systems, 363 internal, 439–441 case sensitivity, 364 three-way combo cards, 198 commands, 364 three-way handshakes (TCP), 437 arguments, 365–366 throughput backslashes, 370 bottlenecks, 552 syntax, 364–365 Internet connection speed, measuring, 554–556 files, 367–368 TIDs (two-digit terminal identifiers), 165 exensions, 368–370 time slicing, 380 pathnames, 370 Tivoli Enterprise (IBM), 566 machine language, 364 TNI (Trusted Network Interpretation of the TFTP (Trivial File Transfer Protocol), 537–538 TCSEC), 459–460 thicknet, 62–63, 134–135, 201–203 Toast.net Internet Service, 556 thin client networking, 43, 532–533 token passing, 123–124, 152 advantages of, 534 Token Ring, 67–68 BOOTP, 537–538 beaconing, 143 cost, 534 cable types, 144–145 DHCP, 537–538 communication process, 143 hardware, 538–541 frames, 146 desktop computers, 540 limitations on implementing, 147 handheld PCs, 541 MICs, 145 Net PCs, 540 MSAU, 143 Network Computers, 539 MSAUs, 144 WBTs, 539 repeaters, 145 ICA, 536 topology, 142 PXE cards, 538 TokenTalk, 53 RDP, 536 tone generators/locators, 568 RFB, 537 tools security, 535 LANalyzer, 562 software protocol analyzers, 554 Citrix Winframe/MetaFrame, 542 top-level domain names, translating to IP addresses, JVM, 544–545 250–253 Microsoft Terminal Services, 541 topologies Web-based solutions, 544 active, 56, 143 X Window, 543 AppleTalk, 150 system requirements, 532 addressing, 150 TFTP, 537–538 data transfer, 151 XDMCP, 536 ARCnet, 151 thin coax cable, 201–202 data transfer, 151 thinnet, 132–133, 201–202 packets, 153 CNAP.BOOK Page 731 Monday, April 30, 2001 12:45 PM

tunneling protocols 731

combined, 60 transmission technologies comparing, 154 full-duplex, 118 FDDI, 147 half-duplex, 117–118 data transfer, 147–148 simplex, 116–117 frames, 149 transparent bridges, 216 hybrid, 60 transparent proxies, 186 linear bus, 55–56 Transport Control Protocol. See TCP mesh, 59, 169 transport layer (OSI reference model), 91–92, 245 multitiered WANs, 169 ports, 247–248 passive, buses, 56 sockets, 248 point-to-point WANs, 166–167 SPX, 230 ring, 56 TCP, 246 star, 57–58, 168 UDP, 246 star bus, 140 transport mode (IPSec), 445, 509 Token Ring, 142 transport protocols beaconing, 143 IPX/SPX, 229 cable types, 144–145 network numbers, 230 frames, 146 node numbers, 230 limitations on implementing, 147 NetBEUI, 227–228 MICs, 145 NetBIOS, 227–228 MSAUs, 144 tree structure, 370 repeaters, 145 directory services, 344–345 WAN rings, 167 triggered updates, 300 tping command, 573–574 Trojan horses, 438 traceroute utility, 260 troubleshooting tracert utility, 260 configurations, 576–578 tracing utilities, 575 hardware, 570 tracks, 377–378 layered methodology, 84 traffic methodology, 569–571, 579–580 bursty, 181 modems, 489–491 captured, displaying, 559 COM port, 489 FDDI, data transfer, 148 incompatibility, 491 protocol-specific, monitoring, 554 Network+ certification program, 570 sniffers, 557, 560 operator error, 570 trailers, 82 performance, 571–573 transceivers, 63, 95, 196 software, 570 access points, 207 terminal adapters, 493 cables, 134 troubleshooting utilities, 568–569 transitive trusts, Active Directory, 352 connectivity, 573 translated connections, 182–185 pathping, 574 translation ping, 573–574 IPv6, 590 TCP/IP, 573 names to numbers, 251–253 trust relationships, 352 NAT, 183–184 tunnel mode (IPSec), 445, 509 translation bridges, 216 tunneling protocols translation tables, 183 CIPE, 519 IPSec, 518 CNAP.BOOK Page 732 Monday, April 30, 2001 12:45 PM

732 tunneling protocols

IPv6, 590 universal group accounts, 316 L2F, 517 UNIX, 50, 329–330, 396–397 L2TP, 517 case-sensitivity, 331 PPTP, 517 clients, 333 SSH, 519 connecting VPNs, 507–509 to Microsoft network, 398 wrappers, 509 to NetWare network, 399 twisted-pair cable, 22, 136, 204–205 to UNIX network, 399–400 two-way cable, 180 to Internet, 400 Type A connectors, 145 file system, 374–375 flat files, 376 forward slashes, 370 hard links, 376 I-node mapping, 375 mapping network drives, 334 U open source code, 330 passwd file, editing, 332–333 U.S. Department of Defense model, 13, 97–98 printer shares, 334 U.S. federal government Web site, 596 scripts, 332 UART (Universal Asynchronous Receiver/ unreachable destinations, poison reverse, 300 Transmitter), 163–164, 486 unsolicited e-mail, 283–284 ubiquitous computing, 587–588 upgradability effect on healthcare, 599–600 capacity planning, 121 effect on legal system, 598 of 10BaseT, 136 effect on medicine, 599 UPSs (uninterruptible power supplies), 465–466 home networking, 588–589 upstream neighbors, 56 modern technologies, in warfare, 597 user accounts, 312 quantum physics, applying to networking, 591 creating, 315 universal connectivity, 592–593 default groups, 316 user friendly appliances, 593 distribution groups, 316 UDP (User Datagram Protocol), 91, 246, 538 LINUX, 331–333 UNC (Universal naming Convention) path, 324 managing, 313–317 underscore character (_), in filenames, 375 nesting, 317 Unicode characters, 347, 373 NetWare, 327 unidirectional transmission, 90, 116 permissions, 442–444 universal connectivity, 20, 592–593 security groups, 48, 316 effect on family life, 594 universal groups, 316 effect on government, 596 UNIX, 331–333 effect on healthcare, 599–600 user authentication, server-based networks, 48 effect on legal system, 598 user friendly appliances, 593 effect on legislation, 598 user interfaces effect on medicine, 599 GUIs, 363–364 effect on publishing, 600 text-based, 362–363 entertainment, 594 User Manager for Domains, 321 privacy issues, 594–595 user-level security, 46, 312 CNAP.BOOK Page 733 Monday, April 30, 2001 12:45 PM

WANs (wide-area networks) 733

utilities routing tables, 297 ARP, 255 TCP/IP configuration information, 366 connectivity-testing, 573 VINES (Virtual Networking System), 334 pathping, 574 virtual com port, 161 ping, 573–574 virtual private networks. See VPNs defragmenters, 373 viruses (computer), 438 nbstat command, 258 VLANs (virtual LANs), 221 netstat command, 256–257 Voice over IP, 292 network management, 562 voiceprint verification, 457 CMIP, 567 volt-ohm meters, 569 Hewlett Packard OpenView, 566 volume mount points, NTFS 5, 374 IBM Tivoli Enterprise, 566 VPNs, 481, 505–506, 293, 480 Novell ManageWise, 564 authentication, 521 SNMP, 567 authorization, 521 performance monitoring, 556–557 circuit-level, 521 ping, 254–255 comparing to dialup networking, 510–512 protocol analyzers, 554, 557 configuring, 522, 524–525 route tracing, 260 encryption protocols, 521 sniffers, 557, 560 Blowfish, 520 TCP/IP configuration, 259, 579, 573 IPSec, 520 utilization patterns, mapping, 554 MPPE, 519 UTP (unshielded ), 22, 64–67, 204–205 hardware-based, 522 10BaseT, 136 LAN protocols, 520 5-4-3 rule, 140 need for, 510 node capacity, 141 operating system support, 509 100BaseX Ethernet, 137 operation, 506 categories of, 65 performance, 512, 521 crossover cables, 136 privacy, 506 UUCP (UNIX-to-UNIX Copy Protocol), 400 router-to-router, configuring, 515–516 software-based, 522 tunneling, 507–509 V CIPE, 519 encapsulation, 508–509 vampire taps, 63, 134, 203 IPSec, 518 vBNS (Very High-Speed Backbone Network L2F, 517 Service), 268–269 L2TP, 517 VCs (virtual circuits), 178 PPTP, 517 VDSL (Very-High Data Rate DSL), 173–174 SSH, 519 vendor-specific mode (networking), 99 wrappers, 509 VFAT (Virtual FAT), 372 VG-AnyLAN, demand priority, 125–126 videoconferencing, 292 W telemedicine, 599 viewing W3C (World Wide Web Consortium), 302 captured data, 559 WANs (wide-area networks), 24, 37–38 command parameters, 366 ARPAnet, 9 Microsoft servers on network, 365 backbone, 268 CNAP.BOOK Page 734 Monday, April 30, 2001 12:45 PM

734 WANs (wide-area networks)

BISDN, 179 Web designers, 275 CATV, 179–180 Web servers, 42, 277 circuit-switched, 170 Web sites DDS, 174 ISO, 100–101 DSL, 173 U.S. federal government, 596 ISDN, 171–172 Web-based computing, 544 leased lines, 174 Web-based list servers, 287 PSTN, 171 WebNFS, 377 switched 56, 175–176 well-known ports, 247–248 T-carriers, 174–175 white papers, High-Speed Token Ring Alliance, 68 CPE, 165 wideband technologies, 210 designing, 160 Windows 3.x, 379, 381 interfaces, 296 Windows 9.x, 381–382 mesh topologies, 169 connecting modems, 160 to Microsoft network, 382–386 banks, 164–165 to NetWare network, 386 configuration, 164 to remote server, 388 drivers, 164 folders, 371 external, 163–164 peer configuration, 383–386 half-duplex transmission, 118 backup programs, 469 internal, 161–162 Windows 95, Microsoft Plus! Pack, 388 internal configuration parameters, Windows 2000 Professional, 322–323, 392–393 161–162 Active Directory, 322 PnP, 162 connecting multitiered, 169 to Microsoft network, 393–395 OC-SONET, 179 to NetWare network, 395 packet-switched, 176 to remote server, 396 ATM, 178 dialing properties, configuring, 489 Frame Relay, 177–178 dynamic disks, 379 X.25, 176–177 NTFS 5, 374 point-to-point, 166–167 System Monitor, 558 proxy servers, 185–186 VPNs, configuring, 523–525 ring topology, 167 Windows ME, 381 routed connections, 186–187 Windows networks, 50 SMDS, 181 mapping network drives, 323 star topology, 168 printers, sharing, 324, 326 terminal adapters, 165 Windows NT 4.0, 321, 577–578 translated connections, 182–185 Windows NT Workstation, 388–391 wireless, 181 Winframe (Citrix), 542 X.25, dialup connections, 481 winipcfg utility, 259 Warp Server (OS/2), 403 WINS (Windows Internet Name Service), name wavelength, resolution, 253 laser light, 209 Winsock interface, 91, 248 phase, 208 wireless media, 22, 181, 207 weapons, smart bombs, 597 IR, 209 Web authoring software, 277 laser, 208 Web browsers, 278–279 radio, 210 CNAP.BOOK Page 735 Monday, April 30, 2001 12:45 PM

zones 735

wizards, 325 workgroups, 34, 44 share-level security, 46 Windows 9.x, peer configuration, 383–386 workstations, 44 worms, 438 wrapped state (FDDI), 148 wrappers, tunneling, 509 WWW (World Wide Web) content, 279 DNS, 278 HTML, 275–277 HTTP, 274 metasearch engines, 282 metatags, 281 portals, 282 search engines, 281 services, 282 spiders, 281 users, 279–280 Web browsers, 278–279 Web servers, 277 Wyse Technology, 539

X-Z

X Window system, 329, 543 X.25, 176–177 dialup connections, 481 X.500, 346 XDMCP (XDM ), 536 XML (Extensible Markup Language), 514, 545

ZIP (Zone Information Protocol), 68 zones, 401 AppleTalk, 150 DNS, 252