Home   FAQs   New Arrivals   Specials   Pricing & Shipping   Location   Corporate Services   Why Choose Bookware?  
 Search:   
Call our store: 9955 5567 (from within Sydney) or 1800 734 567 (from outside Sydney)
 View Cart   Check Out   
 
Browse by Subject
 TAFE Accounting
 TAFE I.T./Computing
 TAFE - Other
I.T
 .NET
 Windows 8
 Adobe CS6
 Cisco
 CCNA 2012
 CCNP 2012
 Java
 VB
 ASP
 Web Design
 E-Commerce
 Project Management
 ITIL
 Macintosh
 Mobile Devices
 Linux
 Windows Server 2012
 SQL Server 2012
 SAP
Certification
 MCITP
 MCTS
Economics and Business
 Accounting
 Business Information Systems
 Economics
 Finance
 Management
 Marketing
 TAX
 Human Resources
Academic
 Law
 Nursing
 Medical
 Psychology
 Engineering

Networking, 2nd Edition

by: Jeffrey S. Beasley

Notify me when in stock

On-line Price: $79.96 (includes GST)

Magazine package 698

20%Off Retail Price

You save: $19.99

Usually ships within 4 - 5 business days.

Retail Price: $99.95

Publisher: PRENTICE HALL,28.10.08

Category: NETWORKING Level:

ISBN: 0131358383
ISBN13: 9780131358386

Add to Shopping Cart

Features and Benefits


    top


Revision of the best selling applied introduction to networking


  * Completely updated with coverage of home networking, wireless, IPv6, Layer 4 switching, and voice and video over IP


  * Practice network design and troubleshooting with the included Finisar Network Analyzer


  * Instructor and reader additional resources help to convey the material, including the Net-Challenge Software and instructor manuals



Table of Contents

top


Chapter 1 Introduction to Computer Networks

1-1 INTRODUCTION 5

1-2 NETWORK TOPOLOGIES 5

1-3 THE ETHERNET LAN


  IP (Internet Protocol) Addressing

1-4 ASSEMBLING A HOME NETWORK


  Securing the Home Network


  IP Addressing in the Home Network

1-5 ASSEMBLING AN OFFICE LAN

1-6 TESTING AND TROUBLESHOOTING A LAN

1-7 ANALYZING COMPUTER NETWORKS

Summary

Questions and Problems

Chapter 2 Physical Layer Cabling: Twisted Pair

2-1 INTRODUCTION

2-2 STRUCTURED CABLING


  Horizontal Cabling

2-3 UNSHIELDED TWISTED-PAIR CABLE


  Shielded Twisted-pair Cable

2-4 TERMINATING CAT6/5E/5 UTP CABLES


  Computer Communication


  Straight-through and Crossover Patch Cables

2-5 CABLE TESTING AND CERTIFICATION


  Testing the CAT6 Link

2-6 10 Gigabit Ethernet over Copper


  Overview


  Alien Crosstalk (AXT)


  Signal Transmission

2-7 TROUBLESHOOTING COMPUTER NETWORKS


  Installation


  Cable Stretching


  Cable Failing to Meet Manufacturer Specifications


  CAT5e Cable Test Examples

Summary

Questions and Problems

Chapter 3 Computer Fundamentals

3-1 INTRODUCTION

3-2 THE COMPUTER BUS CONNECTION


  Motherboard Bus Connections

3-3 DEVICE DRIVERS


  Verifying Device Drivers on Windows Vista/XP


  Verifying Device Drivers on Mac OS X

3-4 COMPUTER MEMORY


  Types of Memory

3-5 AN OVERVIEW OF FAT AND NTFS


  FAT


  FAT32


  NTFS

3-6 CONFIGURING THE BIOS BOOT SEQUENCE

Summary

Questions and Problems

Chapter 4 Interconnecting the LANs

4-1 INTRODUCTION

4-2 THE OSI MODEL

4-3 THE NETWORK BRIDGE

4-4 THE NETWORK SWITCH


  Hub-Switch Comparison


  Managed Switches


  Multilayer Switches

4-5 THE ROUTER


  The Router Interface: Cisco 2800 Series


  The Router Interface-Cisco 2600 Series


  The Router Interface-Cisco 2500 Series

4-6 INTERCONNECTING LANS WITH THE ROUTER


  Gateway Address


  Network Segments

4-7 CONFIGURING THE NETWORK INTERFACE-AUTONEGOTIATION


  Auto-Negotiation Steps


  Full Duplex/Half Duplex

Summary

Questions and Problems

Chapter 5 TCP/IP

5-1 INTRODUCTION

5-2 THE TCP/IP LAYERS


  The Application Layer


  The Transport Layer


  The Internet Layer


  The Network Interface Layer

5-3 NUMBER CONVERSION


  Binary-Decimal Conversion


  Decimal-Binary Conversion


  Hexadecimal Numbers

5-4 IPV4 ADDRESSING


  Private IP Addresses


  IP Address Assignment

5-5 SUBNET MASKS

5-6 CIDR BLOCKS

5-7 IPV6 ADDRESSING

5-8 ANALYZING COMPUTER NETWORKS-FTP DATA PACKETS

Summary

Questions and Problems

Chapter 6 Introduction to Router Configuration

6-1 INTRODUCTION

6-2 ROUTER FUNDAMENTALS


  Layer 3 Networks

6-3 THE CONSOLE PORT CONNECTION


  Configuring the HyperTerminal Software (Windows)


  Configuring the Z-Term Serial Communications Software (Mac)

6-4 THE ROUTER'S USER EXEC MODE (ROUTER>)


  The User EXEC Mode


  Router Configuration Challenge-The User EXEC Mode

6-5 THE ROUTER'S PRIVILEGED EXEC MODE (ROUTER#)


  Hostname


  Enable Secret


  Setting the Line Console Passwords


  Fast Ethernet Interface Configuration


  Serial Interface Configuration


  Router Configuration Challenge-The Privileged EXEC Mode

6-6 TROUBLESHOOTING THE ROUTER INTERFACE

Summary

Questions and Problems

Chapter 7 Routing Protocols

7-1 INTRODUCTION

7-2 STATIC ROUTING


  Gateway of Last Resort


  Configuring Static Routes


  Networking Challenge-Static Routes

7-3 DYNAMIC ROUTING PROTOCOLS


  Distance Vector Protocols


  Link State Protocols

7-4 RIP-ROUTING INFORMATION PROTOCOL


  Configuring Routes with RIP


  Networking Challenge-RIP

7-5 IGRP-INTERIOR GATEWAY ROUTING PROTOCOL


  Configuring Routes with IGRP


  Networking Challenge-IGRP

7-6 OSPF-OPEN SHORTEST PATH FIRST ROUTING PROTOCOL


  Configuring Routes with OSPF


  Networking Challenge-OSPF

7-7 EIGRP-ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL


  Configuring Routes with EIGRP


  Networking Challenge-EIGRP

7-8 CONFIGURING A JUNIPER ROUTER


  Operational Mode


  Router Configuration Mode


  Displaying the Router Interfaces


  Hostname Configuration


  Assigning an IP Address to an Interface


  Static Route


  RIP Configuration


  OSPF Configuration

7-9 TFTP-Trivial File Transfer Protocol


  Configuring TFTP


  Networking Challenge-TFTP

7-10 ANALYZING OSPF 'HELLO' PACKETS

Summary

Questions and Problems

Chapter 8 Wide Area Networking

8-1 INTRODUCTION

8-2 THE LINE CONNECTION


  Data Channels


  Point of Presence


  T1 Framing


  Line Coding Formats

8-3 FRAME RELAY


  Establishing a Frame Relay Connection


  Configuring Frame Relay Point-to-Point on the Router


  Networking Challenge-Frame Relay

8-4 ATM


  Establishing the ATM Connection

8-5 DIAL-IN ACCESS


  Analog Modem Technologies


  Cable Modems


  ISDN


  xDSL Modems


  The Remote Access Server

8-6 VPN


  Configuring a VPN Virtual Interface (Router to Router)


  Troubleshooting the VPN Tunnel Link


  Configuring a VPN Server


  Configuring a Remote Client's VPN Connection

8-7 WIDE AREA NETWORK ROUTING

8-8 INTERNET ROUTING


  Configuring BGP


  Networking Challenge-BGP

8-9 ANALYZING INTERNET DATA TRAFFIC


  Utilization/Errors Strip Chart


  Network Layer Matrix


  Network Layer Host Table


  Frame Size Distribution

Summary

Questions and Problems

Chapter 9 Configuring and Managing the Campus Network

9-1 INTRODUCTION

9-2 DESIGNING THE CAMPUS NETWORK


  Core Layer


  Distribution Layer


  Access Layer


  Data Flow


  Selecting the Media


  Load Balancing

9-3 IP ASSIGNMENT AND DHCP


  The DHCP Data Packets

9-4 NETWORK SERVICES-DNS


  Campus DNS

9-5 NETWORK MANAGEMENT


  Configuring SNMP


  Power over Ethernet (PoE)

9-6 Switch/VLAN Configuration


  Virtual LAN (VLAN)


  Switch Configuration


  Hostname


  Enable Secret


  Setting the Line Console Passwords


  Static VLAN Configuration


  Networking Challenge-Static VLAN Configuration


  Spanning-Tree Protocol

9-7 ANALYZING CAMPUS NETWORK DATA TRAFFIC

Summary

Questions and Problems

Chapter 10 Network Security

10-1 INTRODUCTION

10-2 INTRUSION (HOW AN ATTACKER GAINS CONTROL OF A NETWORK)


  Social Engineering


  Password Cracking


  Packet Sniffing


  Vulnerable Software


  Viruses and Worms


  Wireless Vulnerabilities

10-3 DENIAL OF SERVICE


  Distributed Denial of Service Attacks (DDoS)

10-4 FIREWALLS AND ACCESS LISTS


  Attack Prevention

10-5 INTRUSION DETECTION

10-6 ANALYZING UNSECURED DATA PACKETS

Summary

Questions and Problems

Chapter 11 Wireless Networking

11-1 INTRODUCTION

11-2 THE IEEE 802.11 WIRELESS LAN STANDARD

11-3 802.11 WIRELESS NETWORKING

11-4 Bluetooth, WiMAX, and RFID


  Bluetooth


  WiMAX


  RFID (Radio Frequency Identification)

11-5 SECURING WIRELESS LANS

11-6 CONFIGURING A POINT-TO-MULTIPOINT WIRELESS LAN: A CASE STUDY


  1. Antenna Site Survey


  2. Establishing a Point-to-Point Wireless Link to the Home Network


  3-4. Configuring the Multipoint Distribution/Conducting an RF Site Survey


  5. Configuring the Remote Installations

Summary

Questions and Problems

Chapter 12 Optical Networking

12-1 INTRODUCTION

12-2 THE NATURE OF LIGHT


  Graded-Index Fiber


  Single-Mode Fibers

12-3 FIBER ATTENUATION AND DISPERSION


  Attenuation


  Dispersion


  Dispersion Compensation

12-4 OPTICAL COMPONENTS


  Intermediate Components


  Detectors


  Fiber Connectorization

12-5 OPTICAL NETWORKING ARCHITECTURES


  Defining Optical Networking


  Building Distribution


  Campus Distribution

12-6 SYSTEM DESIGN AND OPERATIONAL ISSUES

12-7 SAFETY

12-8 TROUBLESHOOTING COMPUTER NETWORKS (THE OTDR)

Summary

Questions and Problems

Chapter 13 Voice over IP

13-1 INTRODUCTION

13-2 THE BASICS OF VOICE OVER IP

13-3 VOICE OVER IP NETWORKS


  Replacing an Existing PBX Tie Line


  Upgrading Existing PBXs to Support IP Telephony


  Switching to a Complete IP Telephony Solution

13-4 QUALITY OF SERVICE


  Jitter


  Network Latency


  Queuing

13-5 ANALYZING VoIP DATA PACKETS


  Analyzing VoIP Telephone Call Data Packets

Summary

Questions and Problems

Chapter 14 The Network Server

14-1 INTRODUCTION


  Network Definitions


  Network Types


  Server Types


  Adding the Network Server

14-2 INSTALLING AND CONFIGURING THE NETWORK SERVER


  Creating a Server Domain (Windows 2003 Server)


  Configuring Windows 2008 Server


  Configuring the IP Address

14-3 ADDING COMPUTERS, USERS, AND GROUPS


  Adding Computers to the Windows 2008/2003 Server Domain


  Adding Users to the Windows 2008/2003 Server Domain


  Adding Organizational Units and Groups to the Windows 2008/2003 Server Domain

14-4 SETTING GROUP PERMISSIONS AND POLICIES


  2008 Server: Setting Domain Policies


  2003 Server: Setting Domain Policies

14-5 VERIFYING 'NETWORK' AND 'MY NETWORK PLACES' IN WINDOWS-BASED PCS


  'Network,' Windows Vista


  'My Network Places' on Windows XP


  'My Network Places' on Windows 2000


  'Network Neighborhood' for Windows NT and 98

14-6 CONFIGURING THE NETWORK SERVER'S ACCOUNT LOCKOUT POLICY

Summary

Questions and Problems

Chapter 15 Linux Networking

15-1 INTRODUCTION

15-2 LOGGING ON TO LINUX


  Adding a User Account

15-3 LINUX FILE STRUCTURE AND FILE COMMANDS


  Listing Files


  Displaying File Contents


  Directory Operations


  File Operations


  Permissions and Ownership

15-4 LINUX ADMINISTRATION COMMANDS


  The man (manual) Command


  The ps (processes) Command


  The su (substitute user) Command


  The mountCommand


  The shutdown Command


  Linux Tips

15-5 ADDING APPLICATIONS TO LINUX

15-6 LINUX NETWORKING


  Installing SSH


  The ftp Client


  The ftp Server


  DNS Service on Linux


  Changing the Hostname

15-7 TROUBLESHOOTING SYSTEM AND NETWORK PROBLEMS WITH LINUX


  Troubleshooting Boot Processes


  Listing Users on the System


  Network Security


  Enabling and Disabling Boot Services

15-8 MANAGING THE LINUX SYSTEM

Summary

Questions and Problems

Chapter 16 Industrial Networks

16-1 INTRODUCTION

16-2 OVERVIEW OF INDUSTRIAL NETWORKS


  Characteristics of Industrial Networks

16-3 INDUSTRIAL ETHERNET


  Achieving Determinism


  Topology


  Switching


  Cabling and Components

16-4 INDUSTRIAL ETHERNET PROTOCOLS


  Ethernet/IP


  Foundation Fieldbus High-Speed Ethernet (HSE)


  Profinet


  Interface for Distributed Automation (IDA)


  Manufacturing Message Specification (MMS)


  Modbus TCP

16-5 LEGACY DEVICE AND CONTROLLER LEVEL BUSES


  Open Buses


  Proprietary Buses

Summary

Questions and Problems

Glossary

0131358383


TOC


8/4/2008



Preface

top


Networking, Second Edition
Preface

This book provides a comprehensive look at computer networking from the point of view of the network administrator. It guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet networks, router configuration, TCP/IP networks, routing protocols, local, campus, and wide area network configuration, network security, wireless networking, optical networks, Voice over IP, the network server, Linux networking, and industrial networks. After covering the entire text, readers will have gained a solid knowledge base in computer networks.

In my years of teaching, I have observed that technology students prefer to learn 'how to swim' after they have gotten wet and taken in a little water. Then they are ready for more challenges. Show the students the technology, how it is used, and why, and they will take the applications of the technology to the next level. Allowing them to experiment with the technology helps them to develop a greater understanding. This book does just that.
Organization of the Text

This text is designed to cover two semesters. The recommended chapters for the first semester are Chapters 1 to 8. Throughout the semester, the students will gain an appreciation of how basic computer networks and related hardware are interconnected to form a network. This involves understanding the concepts and issues of twisted-pair cable, interconnecting LANs, configuring TCP/IP, subnet masking, basic router configuration, and configuring routing protocols and wide area networking.

Chapters 9 to 16 are recommended for the second semester-configuring and managing the campus network, network security, wireless LANs, and optical networks. The instructor can choose from the following topics to complete the semester: installing and configuring Windows 2008/2003 network server, Voice over IP, Linux configuration, and industrial networks.
Key Pedagogical Features


  *


      Chapter Outline, Objectives, Key Terms, and Introduction at the beginning of each chapter clearly outline specific goals for the reader. An example of these features is shown in Figure P-1.


  *


      Net-Challenge Software provides a simulated, hands-on experience in configuring routers. Exercises provided in the text (see Figure P-2) and on the CD challenge readers to undertake certain router/network configuration tasks. The challenges check the students' ability to enter basic networking commands and to set up router function, such as configuring the interface (Ethernet and Serial) and routing protocols (that is, OSPF, BGP, EIGRP, IGRP, RIP, and static). The software has the look and feel of actually being connected to the router's console port.


  *


      Protocol Analyzer Software packaged with the text uses the Finisar Surveyor Demo. Examples of using the software to analyze data traffic are included throughout the text, as shown in Figure P-3.


  *


      Numerous worked-out examples are included in every chapter to reinforce key concepts and aid in subject mastery, as shown in Figure P-3.


  *


      Configuring, Analyzing, or Troubleshooting sections, as shown in Figure P-4, are included with each chapter to guide the reader through advanced techniques in networking.


  *


      Key Terms and their definitions are highlighted in the margins to foster inquisitiveness and ensure retention. This is illustrated in Figure P-5.


  *


      Extensive Summaries, Questions, and Problems as well as Critical Thinking Questions are found at the end of each chapter, as shown in Figure P-6.


  *


      An extensive Glossary is found at the end of the book and offers quick, accessible definitions to key terms and acronyms, as well as an exhaustive Index (Figure P-7).

Accompanying CD-ROM

The CD-ROM packaged with the text includes the Finisar Surveyor Demo software and captured data traffic used in the text. This software provides readers with the opportunity to capture data traffic on their own network. It also includes the Net-Challenge Software, which was developed specifically for this text.
Instructor Resources

The Instructor's Manual to accompany Networking, Second Edition (ISBN 0-13-135838-3) provides the entire book in PDF format along with instructor notes for each section within each chapter, recommending key concepts that should be covered in each chapter. Solutions to all chapter Questions and Problems sections are also included. In addition, the instructor will find a separate Solutions to the Net-Challenges Instructor's Edition PDF as well as a 18 laboratory exercises. Also a test bank with which to generate quizzes on the material found within the student edition of the book is provided.

Copyright Pearson Education. All rights reserved.



About the Authors

top


Jeff Beasley is a professor with the Department of Engineering Technology at New Mexico State University. He has been teaching with the department since 1988 and is the co-author of Modern Electronic Communication and Electronic Devices and Circuits.

http://web.nmsu.edu/~jbeasley/