IntroductionAfter you’ve had some experience with Linux, you don’t need someone telling you toclick the Help button for help or to drag a file to the trash icon to delete it. What youneed is a reference that shows you powerful commands and options tha[r]
N GatewaysN FirewallsN Short-haul modems for short interbuilding connectionsIt is essential that you understand these basic components that go into building a network, as well as the job each performs.Directing Network TrafficThe critical test of any network design is its capability to[r]
to networking would be complete without at least of brief discussion of this topic. This chapter provides an overview of how multiple computers in a home can be networked together.Benefits from Home NetworkingMany of the benefits that businesses receive from having a network als[r]
67Chapter 6: Understanding Network Hardware Putting together all the necessary pieces in the proper way is the art of network design. Chapter 15 discusses important aspects of assembling these devices so they work together optimally, but first you need to know what they are and what th[r]
72Networking: A Beginner’s GuideNOTE Because they operate below the network layer at which protocols such as TCP/IP and IPX/SPX are defined, bridges don’t care about the network protocols they’re carrying. They care only about the information required to operate at the data-link[r]
information.N What equipment does the contractor use to certify the cable plant? What certification documentation will the contractor provide upon completion?N Does the contractor also provide postinstallation troubleshooting services?Make sure to spend time finding the best local cabl[r]
DEFINE-IT! Physical Versus LogicalYou’ll often hear the terms physical and logical bandied about when discussing networks. These terms are used for quite a few different things. Physical, used in the context of networking, means the actual, physical thing—what you can see and fe[r]
DEFINE-IT! Network SegmentThe term network segment can mean somewhat different things depending on the topology of the network, but the concept is simplest to understand when thinking about a bus network, and is essentially the same for any topology. A segment is a[r]
47Chapter 4: Understanding Network Cabling of Token Ring networks are offset somewhat by the greater overhead and processing needs to handle the tokens. Overall, Token Ring networks perform about as fast as Ethernet networks with similar bandwidth.IBM invented the Token Ring network te[r]
77Chapter 7Making WAN Connections78Networking: A Beginner’s GuideMany companies have multiple locations that need to share network resources. For example, maybe the company’s accounting system runs at the headquarters building where the accounting and MIS staff are located, but[r]
serviceable, it is rare to see it in use today. NOTE It is possible to run a Cat-3 network connection over Cat-5 cable. Because of this, many companies installed the higher-grade cable, even if they didn’t immediately need it, because the cost of rewiring an entire building is very hig[r]
higher security by segregating network services in various ways. Most networks have quite a few services that need to be provided, and often these services run on different servers. Even a relatively simple network now offers the following services:N File storage and[r]
102Networking: A Beginner’s GuideTIP Recent versions of Windows also support FTP connections using Internet Explorer. Just open Internet Explorer and instead of entering an http:// address in the address bar, type an address preceded by ftp://. For example, to connect to[r]
entities. The following are other common domain types:N .edu for educational institutionsN .gov for governmental entitiesN .mil for military entitiesN .net for Internet-related entitiesN .org for nonprofit entitiesN .xx for different countries, such as .it for Italy and .de for Germany (Deuts[r]
112Networking: A Beginner’s GuideYou should know about five important directory services: Novell eDirectory, Microsoft’s Windows NT domains, Microsoft’s Active Directory, X.500 Directory Access Protocol, and Lightweight Directory Access Protocol. These are described later in this chapt[r]
117Chapter 9: Exploring Directory ServicesTrees are then aggregated into a larger forest structure. According to Microsoft, Active Directory can handle millions of objects through this approach.Active Directory does not require the management of trust relationships, except when connect[r]
3,600 meters (12,000 feet, or about 2 miles). In particular, the 8 Mbps downstream and 1 Mbps upstream data rates of ADSL are possible only within the 3600-meter distance to the CO. Longer distances are possible, but not at that full possible data rate. For instance, running an ADSL co[r]
87Chapter 7: Making WAN ConnectionsThe U.S. military originally developed and designed X.25 to make military voice traffic available even after a nuclear strike. As you might guess from this design objective, X.25 is an extremely reliable, secure protocol for transmitting data.[r]