BN.com Gift Guide

Networking Complete

Overview

With Networking Complete, you'll learn all about designing, installing, maintaining, and administering networks using a variety of operating systems - Windows 98, Windows NT Server, NetWare, and UNIX. You'll quickly take advantage of all that networking has to offer. Get up to speed with the basics, then move on to develop intranet and extranet systems. Finally, an extensive section on network security will help you ensure the reliability and security of your home or business ...
See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (14) from $1.99   
  • New (3) from $8.74   
  • Used (11) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$8.74
Seller since 2014

Feedback rating:

(23)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
PAPERBACK New 0782129145 Inventory acquired from closing store. May have shelf wear from storage.

Ships from: Deland, FL

Usually ships in 1-2 business days

  • Canadian
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$11.99
Seller since 2008

Feedback rating:

(172)

Condition: New
0782129145 BRAND NEW NEVER USED IN STOCK 125,000+ HAPPY CUSTOMERS SHIP EVERY DAY WITH FREE TRACKING NUMBER

Ships from: fallbrook, CA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
$31.16
Seller since 2014

Feedback rating:

(320)

Condition: New
Brand New Item.

Ships from: Chatham, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

With Networking Complete, you'll learn all about designing, installing, maintaining, and administering networks using a variety of operating systems - Windows 98, Windows NT Server, NetWare, and UNIX. You'll quickly take advantage of all that networking has to offer. Get up to speed with the basics, then move on to develop intranet and extranet systems. Finally, an extensive section on network security will help you ensure the reliability and security of your home or business network.
Read More Show Less

Editorial Reviews

From Barnes & Noble
The Barnes & Noble Review
Networking Complete, Second Edition is a broad, useful overview of networking at a price that's hard to beat. Drawing from the best books in their networking library, Sybex's editors have brought together authoritative coverage of an exceptionally wide range of day-to-day networking techniques and concepts, from network design to maintenance, security to troubleshooting.

Among the highlights: an excellent chapter on preparing for -- and then installing -- a local area network; the principles of network design (written originally for Windows networks but useful in any environment); and two chapters on tracking down network problems (one offering a step-by-step methodology, the other outlining several common scenarios, including ping problems, undelivered email, connectivity trouble, and poor performance. There's also a full chapter on disaster recovery for small-to-midsize companies: planning, effective backups, RAID, clustering, et cetera.

The authors walk you through the basics of building an infrastructure for delivering Internet and intranet services, including setting up DNS, and working with a business ISP. There's also a five-chapter section on security and remote connectivity -- focused primarily on Windows 2000 and NetWare environments, but including some basic guidance for UNIX/Linux servers, as well. Tucked in at the end: a handy 35-page networking glossary.

If you're just starting out with networking, or if you've got a problem to solve and no idea where to start, this book will get you rolling -- and still leave cash in your pocket. (Bill Camarda)

Bill Camarda is a consultant, writer, and web/multimedia content developer with nearly 20 years' experience in helping technology companies deploy and market advanced software, computing, and networking products and services. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks For DummiesĀ®, Second Edition.

Read More Show Less

Product Details

  • ISBN-13: 9780782129144
  • Publisher: Sybex, Incorporated
  • Publication date: 3/1/2001
  • Series: Sybex Complete Series
  • Edition description: Older Edition
  • Edition number: 2
  • Pages: 912
  • Product dimensions: 5.86 (w) x 8.24 (h) x 2.06 (d)

Read an Excerpt

Chapter 5: Major Protocol Suites

This chapter provides a detailed discussion of the most important of these suites and takes a look at some other protocols and protocol standards. Although your Networking Essentials exam will not require that you have mastered much of this material, a further understanding of protocol suites broadens your knowledge base as a network administrator.

These are the protocol suites examined in this chapter:

  • NetWare IPX/SPX, Novell NetWare's proprietary pro- tocol suite
  • TCP/IP, the nonproprietary protocols that make up the Internet
  • AppleTalk, Apple Computer's proprietary protocols, which began with the Macintosh

Review of Protocols, Models, and Implementations

A protocol is a set of rules for communication. A simple example of a protocol from the realm of human communications is the different ways of greeting people: should you bow, shake hands, or kiss both cheeks of the person you're greeting? It depends on where you are and whom you are greeting. If you make a mistake,you could be misunderstood.

Although in the data communications world protocols are more complex and precise, the same idea holds true. For example, a protocol may define the shape of a packet that will be transmitted across the network, as well as all the fields within the packet and how they should be interpreted. Obviously, both the sender and receiver must agree on the exact way the packet should be formatted in order for communication to occur.


NOTE
Any protocol product available on the market will necessarily be a protocol implementation, which means any one company's interpretation of the protocol definition or standard. Therefore, one company may interpret a standard in a different way than another, which can cause incompatibility.

A protocol suite is a group of protocols that evolved together, whether created by the same company, as in the case of IBM's SNA, or used in the same environment, such as the Internet protocol suite. Protocol suites have definitions for the interface between protocols that occur at adjacent layers of the OSI model, such as IPX and SPX in the NetWare suite.

NetWare IPX/SPX Protocols

The NetWare protocol suite takes its name from the two main protocols at the network and transport layers of the OSI model: IPX and SPX.
NOTE
NetWare was first developed by Novell,Inc., in the early 1980s. Its design was based on a network developed by Xerox at its Palo Alto Research Center (PARC) called Xerox Network System (XNS).

The NetWare IPX/SPX protocol suite provides file, print, message, and application services. This architecture is server-centric because workstations make requests for file services or other services from the server. To the user at a workstation, all resources appear local to that workstation. For example, saving a file to a file server on the network is simply a matter of saving it to drive F (or another mapped drive) in the same way it would be saved to the user's C hard drive.

The NetWare protocols are modular; you can use them with many different hardware configurations. You can also use other protocols, such as TCP/IP and AppleTalk, with NetWare, making it very flexible. NetWare, therefore, is not limited to its proprietary protocols,IPX and SPX. Allowing additional protocols provides more interoperability with other computer systems.

The NetWare protocol suite can be mapped to the OSI model as shown in Figure 5.1. The following sections discuss the NetWare protocols, organized by their function with respect to the OSI model.

Figure 5.1: The NetWare protocol suite mapped to the OSI model

NetWare Lower-Layer Protocols

NetWare normally runs over standard lower-layer protocols, such as Ethernet (IEEE 802.3) and Token Ring (IEEE 802.5). The lower-layer protocol discussed here, MLID, is a proprietary standard for network interface card drivers.

MLID (Multiple Link Interface Driver)

The MLID protocol operates at the MAC sublayer of the OSI model's data link layer. It is concerned with medium access and uses these methods:

  • Contention
  • Token passing
  • Polling
The MLID is a standard for network drivers. Each type of network board has a unique MLID driver. The MLID is implemented in software. A common example is the DOS file called NE2000.COM, written for the Novell/Eagle NE2000 network card.

The MLID is also called the network driver or LAN driver. Its job is to communicate directly with the hardware network card. The MLID is independent of upper-layer protocols because of the LSL (link support layer) module at the LLC sublayer of the data link layer, which acts as an interface between the MLID and network layer protocols.

The interaction between the MLID, LSL, and other components is specified by the ODI (Open Data-link Interface) specification, a Novell standard for modular network communications. The ODI specification allows you to easily configure client software using the same programs, regardless of the type of network board used. With this architecture only the MLID changes; before ODI, you needed to create a customized version of the IPX driver for each network card.

NetWare Middle-Layer Protocols

NetWare's middle-layer protocols include the following:
  • IPX: Used for transporting packets
  • RIP and NLSP: Routing protocols
  • SPX: Runs at the transport layer and adds connection-oriented service when added reliability is required

IPX (Internetwork Packet Exchange)

Novell's main network layer protocol is IPX. It deals with addressing (the logical network and service addresses), route selection, and connection services. IPX provides connectionless datagram service, which means that data is sent over the whole network segment rather than across a direct connection.IPX is based on the IDP (Internetwork Datagram Protocol) of XNS (Xerox Network System).

Because of its connectionless nature, IPX is not suitable for some types of network communications. Most of the communication on a network, including workstation connections and printing, uses the SPX protocol, described later in this chapter. Simple IPX is used for broadcast messages, such as error notifications and time synchronization.

IPX performs dynamic route selections based on RIP tables, which contain a list of identified and reachable networks. In NetWare 4.1, IPX is usually implemented by the IPXODI.COM program, which follows the ODI specification. Earlier NetWare versions used a program called IPX.COM. As discussed in the section "MLID (Multiple Link Interface Driver)" earlier in this chapter,before ODI, a custom version of IPX was required for each type of network card and settings.

RIP (Routing Information Protocol)

RIP is the default protocol NetWare uses for routing. RIP uses the distance-vector route discovery method to determine hop counts. The hop count is the number of intermediate routers a packet must cross to reach a particular device.

RIP functions at the network layer of the OSI model, although it has a service address assigned to it. Because it is a distance-vector routing protocol, RIP periodically broadcasts routing table information across the internetwork. This can create a bottleneck when the information must be transmitted over wide area links. For WANs, you should use a link-state routing protocol instead,such as NLSP.

NLSP (Network Link Services Protocol)

NLSP is another routing protocol that functions at the network layer. NLSP uses the link-state route discovery method to build routing tables. It is based on an OSI routing protocol called IS-IS (Intermediate System-to-Intermediate System)....

Read More Show Less

Table of Contents

Introduction
Part I: Networking Fundamentals
Chapter 1: An Introduction to Networks
From MCSE: Networking Essentials Study Guide
Chapter 2: Networks in the Workplace
From Introduction to Local Area Networks
Chapter 3: Network Topologies and Types
From Networking Essentials Study Guide and Mastering Local Area Networks
Chapter 4: The OSI Model
From Network+ Study Guide
Chapter 5: Major Protocol Suites
From MCSE: Networking Essentials Study Guide
Part II: Network Hardware and Software
Chapter 6: Installing Cards and Cables
From Mastering Local Area Networks
Chapter 7: Repeaters, Hubs, Routers, and Bridges
From The Complete Network Upgrade & Maintenance Guide
Chapter 8: Network Operating Systems
Written especially for Networking Complete, Second Edition
Chapter 9: Configuring Network Hardware
From MCSE: Networking Essentials Study Guide
Chapter 10: Network Applications
From Introduction to Local Area Networks and Mastering Local Area Networks
Chapter 11: Thin Client Networking
From Mastering Local Area Networks
Part III: Network Design, Maintenance, and Troubleshooting
Chapter 12: The Principles of Network Design
From NT Enterprise Network Design
Chapter 13: Home Networking Technologies
From Mastering Home Networking
Chapter 14: Network Troubleshooting
From Network+ Study Guide
Chapter 15: Diagnosing Real-World Problems
From Multiprotocol Network Design and Troubleshooting
Chapter 16: Disaster Recovery
From Mastering Local Area Networks
Part IV: Intranets, Extranets, and Interconnecting Networks
Chapter 17: Building an Intranet Infrastructure
From Building Intranets on NT, NetWare and Solaris
Chapter 18: Intranet, Extranet, and Internet Services
From Extranet Design and Implementation, MSCE: Windows 2000 Network Infrastructure Administration Study Guide, Mastering HTML 4 Premium Edition, and MCSE: Windows 2000 Network Security Design Study Guide
Chapter 19: Web Site Content and Design
From Mastering Local Area Networks
Part V: Network Security
Chapter 20: Security with Certificates
From MCSE: Windows 2000 Network Infrastructure Administration Study Guide
Chapter 21: Security Concepts and Terminology
From NT 4 Network Security
Chapter 22: Securing Your NetWare 5 Network
From Mastering NetWare 5
Chapter 23: Unix Security
From Mastering Network Security
Chapter 24: Remote Connectivity
From Mastering Network Security, NT Enterprise Network Design, and Mastering Windows 2000 Server
Appendix A: Should You Get Certified?
From Computer and Network Professional's Certification Guide
Appendix B: Glossary of Networking Terms
From Network+ Study Guide
Index
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)