See Internet Protocol Security IPX.. See Layer 2 Tunneling Protocol LAN.. See network address translation National Center for Supercomputing Applications NCSA, 360 NCSA.. See National Ce
Trang 1intranet, 28
intruder detection, 145
IP See Internet Protocol
IP address, 92, 93, 94–96
Fedora Linux, 329, 329
static, 299
with virtual machine, 379
with Windows Server 2008, 238–239, 243
IP Next Generation, 95
IP packet, 90, 92, 93, 94
with VoIP, 104–105
IPSec See Internet Protocol Security
IPX See Internet Protocol Exchange
IPX protocol, 106
Is commands, 337, 337
ISDN See Integrated Services Digital Network
ISDN-based DSL (IDSL), 84
ISO See International Standards Organization
ISP See Internet service provider
IT See information technology
IT department narrative, 396
access management, 398–399
change control in, 399–400, 411–413
disaster recovery plan, 397–398, 402–405
server maintenance, 405–407
system account management, 407–411
system maintenance, 399
terminations, 399
Itanium series, 178
ITU See International Telecommunications Union
J
jobs, 8
Juniper Networks, 136
K
Kbps See thousands of bits per second
kernel, 310
KHz See thousands of hertz
kill program, 354–355
kilobit, 12
kilobyte, 12
L
L2TP See Layer 2 Tunneling Protocol
LAN See local area network
LAN Manager HOSTS (LMHOSTS), 107
laser printers, 24
Layer 2 Tunneling Protocol (L2TP), 134
layers, 18
application, 32
data-link, 30
network, 30–31
Open Systems Interconnection model, 29, 30–32
seven-layer model, 28–32 sublayers, 30, 71, 72
LDAP See Lightweight Directory Access Protocol
leaf object, 112 leases, 100 least-significant digit, 12 license, 25
per server, 230, 231 Windows Terminal Services, 305 Lightweight Directory Access Protocol (LDAP), 115, 117–119
Linear Tape-Open (LTO), 168, 169 Linux, 21 See also Fedora Linux
command line, 331–333 directory, 338, 339 host with, 100 SUSE, 308
live cd, 384, 385 LLC See logical link control sublayer LMHOSTS See LAN Manager HOSTS
ln command, 342–343 local area network (LAN), 27 packets on, 31
switches for, 71 LocalTalk, 106 log in
Fedora Linux, 319, 320 hours, 259, 261 security, 259–260, 261, 262
user list, 356
VMware Server, 370
Log On To feature, 260–262 logging, 311
logic bomb, 154 logical, 44 logical link control (LLC) sublayer, 30 logon name, 256
long-distance charge, 130 loopback address, 95–96 Lotus Notes, 26
LTO See Linear Tape-Open
M
MAC See media access control sublayer
Macintosh platform, 200 protocols of, 105, 106 mailboxes, 26
e-mail, 278
Exchange Server 2010, 286–294, 291, 292, 293
maintenance
in IT department narrative, 399 network, 6
server, 194, 405–407 system, 399 with virtualization, 367
Man pages, 335, 336
managers, 4
Trang 2mapping, 271
MAU See multistation access unit
Mbps See millions of bits per second
McCool, Rob, 360
media access control (MAC) sublayer, 30
bridges with, 71, 72
Meinel, Carolyn P., 156
member server, 230
MHz See millions of hertz
microprocessors, 72
Microsoft See also Exchange Server 2010
Access, 199
Active Directory, 113, 114, 116–117,
248, 248, 300–301
Customer Experience Improvement
Program, 282–283, 284
Exchange, 26
Exchange Server, 129
Hardware Compatibility List of, 190, 225–226
Hyper-V, 367
LDAP terms, 118
Management Console, 300, 301
Novell and, 205
Outlook, 129
Outlook Web Access, 291–293, 294
protocols of, 105–106
Windows Small Business Server 2008, 26
millions of bits per second (Mbps), 15
millions of hertz (MHz), 15
MIME See Multipurpose Internet Message Encoding
mirroring, 183
mkdir command, 346
mknod command, 338
modem, 82
international use of, 131
remote access with, 130
speed of, 131
modem farm, 130
monolithic application, 122
more command, 349
most-significant digit, 12
motherboards, 164
multimaster model, 113, 116
Multipurpose Internet Message
Encoding (MIME), 102
multistation access unit (MAU), 41
mv command, 342
N
named pipes, 338
naming, Fedora Linux, 313, 313
naming model, 118
narrative, 396–397
narrow traveler, 123–124, 124
NAT See network address translation
National Center for Supercomputing
Applications (NCSA), 360
NCSA See National Center for Supercomputing
Applications Neoteris, 136 NET command, 271
NetBEUI See Network Basic Input/Output System
Extended User Interface
NetBIOS See Network Basic Input/Output System netid See network ID
NetNews See Usenet
NetScreen, 136 NetWare, 146, 180, 190, 191, 193, 205
NetWare 4.x, 115
network applications, 212–214 backbone, 219 bandwidth for, 212, 215 capabilities, 5
design process, 210–211 diagram of, 397 equipment, 6 Ethernet, 217 experience with, 211
extension of, 67, 67
fallback plan for, 210–211 growth of, 217–218 maintenance, 6 needs assessment for, 211–218 safety, 216–217
security, 28, 216–217 services, 215–216 storage, 213, 215 structure, 218–220 support by, 6 type, 218 undersized, 5 unreliable, 5 users, 214–215
network adapter, 378, 378, 379
bridged, 379 NAT, 379–380 network address translation (NAT), 74, 379–380 network architect/designer, 7 Network Basic Input/Output System (NetBIOS), 106–107
Network Basic Input/Output System Extended User Interface (NetBEUI), 106
Network Basic Input/Output System (NetBIOS) Names, 106–107
network cable, 30 network clients, 36 network engineer, 7 Network File System (NFS), 350 network ID (netid), 96
network interface card (NIC), 24, 30, 49 consistency with, 203
for desktop computer, 204–205 for SOHO networking, 61 network layer, 30–31
Trang 3Network News Transfer Protocol (NNTP), 102
in IIS, 303
network operating system (NOS), 21, 176
installation of, 192–193
by network, 220
network printing, 272, 273
setup, 273–275
network relationships, 18
network segment, 38
network topology, 38
network workstation, 36
NIC for, 204–205
software, 205
network-based firewall, 74
NFS See Network File System
nibble, 12
NIC See network interface card
NNTP See Network News Transfer Protocol
nonplenum cable, 53
normal files, 337
NOS See network operating system
notification, 165
Novell
BorderManager, 135
eDirectory, 113, 114, 115
Microsoft and, 205
NetWare, 146, 180, 190, 191, 193, 205
protocols of, 105, 106
NT File System (NTFS), 229
NTFS See NT File System
numbering systems, 12–14, 15
O
objectives, 4
octal numbering system, 14
off-site storage, 165–166, 168
Open Systems Interconnection (OSI) model, 16, 28–29
layers of, 29, 30–32
operating system
guest, 366, 374, 375, 385
host, 366
for SOHO networking, 61
Opteron, 179
Oracle, 20
OSI See Open Systems Interconnection model
Outlook Web Access, 291–293, 294
outputs, 5
ownership, 339
P
packet, 90
packet filtering, 74, 150
packet layer, 31
packet protocols, 30–31
packet-switched link, 79–80
PAN See personal area network
partition, 44
by directory service, 114
by hub, 68 partitioning
Fedora Linux, 310–311, 314–315, 315
WAN, 114 password, 6
changing, 254, 257
definition, 408
Fedora Linux, 327, 328
in IT department narrative, 398 mixed-case, 145
options, 257–258 policy for, 409–410 security of, 144–146 strategies, 326 usability of, 146
Windows Server 2008, 240, 254, 257–258, 258
patch cable, 49 payment, 55
PC platform, 200–201 pcAnywhere, 26
PCAOB See Public Company Accounting
Oversight Board
PDC See primary domain controller peer-to-peer network, 18, 19
client/server network or, 20–23 cons, 21–22
dedicated computer, 19 pros, 21
pension fund blackout, 392 performance, 130
client/server network, 22 periodic report, 392
permissions, 147–148 with AP process, 400–401 assigned, 144
form for, 398
Linux, 340, 340–341, 341
no access, 269 for Windows Server 2008, 269 per-seat licensing, 230, 231 per-server licensing, 230, 231 personal area network (PAN), 27 personal loans, 393
perspective, corporate, 4–6 phoneline networks, 62 physical, 44
physical layer, 30
PID See process identification number
PING command, 363 pipes, named, 346 plain old telephone service (POTS), 81–82 bandwidth of, 84
platform choice of, 198–200 cost analysis for, 200 desktop computer, 198–200 Macintosh, 200
PC, 200–201 programming language by, 199
Trang 4plenum cable, 53
plenum space, 53
plug and play (PnP), 228
PnP See plug and play
Point-to-Point Protocol (PPP), 133
Point-to-Point Tunneling
Protocol(PPTP), 134
ports, 91, 92
positions, of numbers, 12
POTS See plain old telephone service
power, requirements, 366
powerline networks, 62
PowerPC, 179
PPP See Point-to-Point Protocol
PPTP See Point-to-Point
Tunneling Protocol
presentation layer, 31
PRI See Primary Rate Interface
primary domain controller (PDC), 115, 230
Primary Rate Interface (PRI), 82, 83
primary/backup model, 113
print directory, 347
print driver, 272
print job, 272
print queue, 24, 272
print server, 24–25, 272
print working directory, 347
printer, 24
printer leaf object, 113
printer pooling, 275
printer sharing, 24, 274
in SOHO networking, 60
printf, 335
printing
environment variables, 333–334
network, 272, 273, 273–275
private network, 81
process identification number (PID), 354
process manipulation, 351
processes
listing of, 351, 351–352, 352, 353, 354
UNIX, 351
processing, server, 176–179
processors
multiple, 176–178
speed of, 178
virtual machine, 375
Windows, 176, 177
Windows Server 2008, 226
productivity, 254
programming
language, 199
router, 73
properties
dialog box, 205, 206
hub, 68–69
virtual hard disk, 377, 385
protocol, 90 See also individual protocols
proprietary, 105–107
router and, 72
proxy server, 150
ps command, 351, 351–352, 352, 353, 354, 362
Public Company Accounting Oversight Board (PCAOB), 390
public network, 81 pwd command, 347
Q
QoS See quality of service
quality of service (QoS), 105
R
RADSL See Rate-adaptive DSL RAID See redundant array of independent disks RAM See random access memory
random access memory (RAM), 177
allocation of, 374, 375
error checking and correction, 180, 181 nonparity, 180
parity-based, 180–181 server, 180–181, 190–191
for virtual machine, 373, 374, 375
VMware Server, 374 Windows Server 2008, 226
RAS See remote access service
Rate-adaptive DSL (RADSL), 84
RBOC See regional Bell operating company RDNs See relative distinguished names
read only, 147, 148 rebuild kit, 195 Red Hat, 308, 309 reduced instruction set computer (RISC) type, 72 redundancy, 21
backup, 168 client/server network, 22 directory service, 111, 113 server, 33
of switches, 71 redundant array of independent disks (RAID), 163, 168, 182
Raid 0, 183, 184
Raid 1, 183, 184, 184
Raid 2, 184
Raid 3, 184, 185, 185
Raid 4, 185
Raid 5, 185, 186
Raid 6, 185 hot-swap configuration of, 187
levels of, 183, 183–184, 184, 185, 185, 186, 186
reference count, 338 referral, 119 regional Bell operating company (RBOC), 83 registrars, 95
relative distinguished names (RDNs), 118 reliability
client/server network, 22 desktop computer, 201 network, 5
Trang 5Reliability and Performance Monitor, 276
remote access, 27 See also Windows
Apache web server, 363
bandwidth for, 126–127
dedicated, 26
modem use for, 130
with monolithic application, 122
needs, 126
security with, 151
session, 123
with short-haul modem, 75
virtual private network
for, 132, 132–134
remote access service (RAS), 26
remote control connection, 128–129
remote control program, 26
Remote Desktop, 242
remote node connection, 128, 129
Windows Terminal Services or, 304
remote office group, 124, 125
remote office user, 124, 125
remove directory, 346–347
repeaters, 41, 66, 67
replacement
cost of, 202
disaster recovery list, 166, 398
server, 193
replication, 113
Requests for Comments (RFCs), 118
resources, 111
in SOHO networking, 60
virtualization efficiency with, 366
Windows Terminal Services with, 304
RFCs See Requests for Comments
RG-56, 36
RG-58, 36, 48
RG-58/U, 52
RG-58A/U, 52
ring topology, 44, 45
RISC See reduced instruction set
computer type
RJ-45 connector, 49–50, 50, 51, 51
rmdir command, 346–347
roles, 147–148
root account, 313–314, 324, 327, 328
kill command from, 355
switching identity as, 356–357
root entry, 112
rotation, 169–172
router, 28, 31, 34, 66, 73
hub, 68
programming of, 73
protocol and, 72
wide area network, 72
Routing and Remote Access Service
(RRAS), 301, 302
row locking, 24
RS-232C device, 75
Ryan, Tony, 158
S
safety, 216–217 Sarbanes-Oxley Act of 2002 (SOX), 8–9, 144 compliance testing, 400–401
download of, 390 sample procedures with, 400–413 Section 301, 391
Section 302, 392 Section 303, 392 Section 304, 392 Section 305, 392 Section 306, 392 Section 307, 393 Section 308, 393 Section 401, 393 Section 402, 393 Section 403, 393–394 Section 404, 8–9, 393, 395 Section 405, 394 Section 406, 394 Section 407, 394 Section 408, 394 Section 409, 394 Title I: Public Company Accounting Oversight Board, 390
Title II: Auditor Independence, 391 Title III: Corporate Responsibility, 391–392 Title IV: Enhanced Financial Disclosures, 393 Title IX: White-Collar Crime Penalty Enhancements, 395
Title V: Analyst Conflicts of Interest, 394 Title VI: Commission Resources and Authority, 394
Title VII: Studies and Reports, 394 Title VIII: Corporate and Criminal Fraud Accountability Act of 2002, 395 Title X: Corporate Tax Returns, 395 Title XI: Corporate Fraud Accountability, 395
SASL See Simple Authentication
and Security Layer
SATA See Serial Advanced Technology Attachment
Sayan, Karanjit, 156 scaling, 217–218 schema, 118 scope, 100 security group, 266–267 TCP/IP, 298, 299
SCSI See Small Computer Systems Interface
SCSI controller, 378 SCSI-1, 181 SCSI-2, 181
SDSL See Symmetric DSL
Seattle, City of, 158–160
SEC See U.S Securities and Exchange Commission Secure Sockets Layer (SSL), 101, 135–136, 136, 137–138, 138, 139
Securities Act of 1934, 392