Networking A Beginner's Guide pdf pdf (2023)

Networks

A Beginner's Guide

sixth edition

  About the author bruce hallberghas 30 years of experience in information technology, including executive

global network administration, system implementations, and consulting for Fortune 1000 companies. He is the author of more than 30 books on a wide variety of computing topics, including operating systems, networks, and server and desktop applications. He holds an MBA from Heriot Watt University and resides in the Silicon Valley area of ​​California with his two daughters.

  About the technical editor

steve langfordhas over 17 years of experience in network administration in various

industries such as biotechnology, chemical manufacturing, and venture capital. Currently at a private school, he was an IT project manager for software upgrades and new building construction.

Networks

A Beginner's Guide

sixth edition

BRUCE HALLBERG

New York Chicago San Francisco Athens

Copyright © 2014 by McGraw-Hill Education (publisher). All rights reserved. Printed in the United States of America.

Except as permitted under the Copyright Act 1976, no part of this publication may be reproduced or distributed in any

form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher, with

except that program listings may be entered, stored, and executed on a computer system, but may not be

reproduced for publication.

ISBN: 978-0-07-181225-2 DNI: 0-07-181225-3®Ebook Conversion by Cenveo Publisher Services Version 1.0 Material in this ebook also appears in the print version of this title: ISBN: 978-0-07-181224-5, MHID: 0-07-181224-5 McGraw- Los Hill Education eBooks are available with special quantity discounts for use as bonuses and sales promotions or for use in corporate training programs. To contact a representative, visit the Contact Us pages at www.mhprofessional.com.

McGraw-Hill Education obtained the information from sources believed to be reliable. However, due to

possibility of human or mechanical error by our sources, McGraw-Hill Education or others, McGraw-Hill Education

does not guarantee the accuracy, adequacy or completeness of any information and is not responsible for any errors or

omissions or the results obtained from the use of such information.

All trademarks or copyrights mentioned in this document are the property of their respective owners and McGraw-Hill Education.

does not claim ownership by mention of products bearing these marks. TERMS OF USE

This is a copyrighted work and McGraw-Hill Education ("McGraw-Hill") and its licensors reserve all rights to and from the

to work. Use of this work is subject to these terms. Except as permitted by the Copyright Act 1976 and the right to

store and retrieve a copy of the work, you may not decompile, disassemble, reverse engineer, reproduce, modify, create

derivative works based on, transmit, distribute, disseminate, sell, publish or sublicense the work or any part thereof without

prior consent of McGraw-Hill. You may use the Work for your personal, non-commercial use; any other use of

Work is strictly prohibited. Your right to use the work may terminate if you fail to comply with these terms. THE WORK IS PROVIDED “AS IS”. McGRAW-HILL AND ITS LICENSORS MAKE NO WARRANTIES OR

WARRANTIES AS TO THE ACCURACY, ADEQUACY OR COMPLETENESS OF THE RESULTS TO BE OBTAINED

USE OF THE WORK, INCLUDING ANY INFORMATION ACCESSIBLE THROUGH THE WORK, BY HYPERLINK OR OTHERWISE, AND EXPRESSLY DISCLAIMS ANY WARRANTIES, EXPRESS OR

IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS

FOR A SPECIFIC PURPOSE. McGraw-Hill and its licensors do not represent or warrant that the functions contained

at work will meet your needs or that your operation will be uninterrupted or error free. Neither McGraw-Hill nor

its licensors shall be liable to you or anyone else for any inaccuracies, errors or omissions, however caused, in the work or

for the damages resulting therefrom. McGraw-Hill is not responsible for the content of any information accessed through the work. Under no circumstances will McGraw-Hill and/or its licensors be liable for indirect, incidental, special, punitive, consequential or similar damages resulting from the use or inability to use the work, even if any of these have been advised of the possibility of such damage. This limitation of liability applies to any claim or cause, whether such claim or cause arises in contract, tort or otherwise.

With all my love, to Bonnie Gordon,

and my two daughters, Vivian and Maxine.This page was intentionally left blank.

  take a look

  Part I Pros and Cons of Networking

1 The business of networks . . . . . . . . . . . . 3

2 Understanding networks . . . . . . . . . . . . . eleven

3 Description of network cabling. . . . . . . . . 35

4 Network Hardware Description . . . . . . . 57

5 Making WAN connections. . . . . . . . . . . . . 69

6 Description of network protocols. . . . . 85

7 Browse the directory services. . . . . . . . . . . . 105

8 Remote Connections: Remote Network Access . . . . . . . . . . . . . . 117

9 Securing your network . . . . . . . . . . . . . . . . 135

10 Network Disaster Recovery. . . . . . . . . . . . . 151

11 Network Servers: Everything You Wanted to Know but Were Afraid to Ask. . . . . . . 169

12 Buying and Managing Customer Networks: A Beginner's Guide viii

  Part II Practical Knowledge

14 Installing and configuring Windows Server 2012 . . . . . . . . . . . . . . . . 213

15 Windows Server 2012 Administration: Basic Concepts . . . . . . . . . . . . . . . . . . . . . . . . . 237

16 Introduction to Exchange Server 2013 . . . . . . . . 261

17 Understanding Other Windows Server 2012 Services . . . . . . . . . . . . . . . . . . . . . . . . . . . 275

18 Installing Linux . . . . . . . . . . . . . . . . . . . . . . 285

19 Introduction to Linux System Administration . . . . . . . . . . . . . . . . . . . . . 303

20 Setting up a Linux web server with Apache . . . . . . . . . . . . . . . . . . 337

21 Introduction to Virtualization . . . . . . . . . . . . 343 Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357 Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373

  Satisfied

Thanks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix

Part I

Network inputs and outputs

1 The business of networks . . . . . . . . . . . . . . . . . . . . . . . 3

Understanding networking: the corporate perspective. . . . . . 4 What does the company need? . . . . . . . . . . . . . . . . . . . . . . 4 How will the network benefit the company? . . . . . . . . . . . 5

Understand how networks work. . . . . . . . . . . . . . . . . . . . . . . . 6 Network Administrator. . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Network engineer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Network Architect/Designer . . . . . . . . . . . . . . . . . . . . . . . . 8 Other network-related work . . . . . . . . . . . . . . . . . . . . . . . . . 8

Sarbanes-Oxley Act of 2002. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Networking: A Beginner's Guide x

  2 Understanding networks. . . . . . . . . . . . . . . . . . . . . . . . .11

Laying the foundations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Bits, Nibbles and Bytes. . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Basic terminology for describing network speeds. . . . . . . fifteen

Know the types of networking relationships. . . . . . . . . . . . . . . . . . . . 16 Peer-to-Peer Network Relationships . . . . . . . . . . . . . . . . . . . 16 Client/Server Network Relationships . . . . . . . . . . . . . . . . . 17 Comparing Peer-to-Peer and Client/Server Networks . . . . 18

Characteristics of the learning network. . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 File Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Printer Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Application services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Remote Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Wide Area Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Internet and Intranet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Network Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

Understand the OSI networking model. . . . . . . . . . . . . . . . 26 Physical layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Data Link Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Network layer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Transport Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Session Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Presentation layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Application Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Understand how data travels through the OSI layers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

Learn about networking hardware components. . . . . . . . . . . 30 servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Hubs, Routers, and Switches . . . . . . . . . . . . . . . . . . . . . . . . 31 Spinning and spinning plants . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Workstation Hardware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3. 4

Chapter summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3. 4

  3 Description of network cabling. . . . . . . . . . . . . . . . . . . . .35

Description of cable topologies. . . . . . . . . . . . . . . . . . . . . . . . 36 Bus Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Star topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Ring Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Comparison of Rings with Stars and Buses . . . . . . . . . . . . . . . . . . 42

Demystifying network cabling. . . . . . . . . . . . . . . . . . . . . . . . . 45 Overview of Basic Cable Types. . . . . . . . . . . . . . . . . . . . . . . Four five

content xi

Installation and maintenance of network cabling. . . . . . . . . . . . . . . 52 Choosing a Wiring Supplier . . . . . . . . . . . . . . . . . . . . . . 52 Troubleshooting Cables . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

Chapter summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56

  4 Description of network hardware. . . . . . . . . . . . . . . . . . .57

Direct network traffic. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 repeaters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Hubs and Concentrators . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 switches. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Bridges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Catwalks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . sixty-five

Protection of a network with firewalls. . . . . . . . . . . . . . . . . . . . . 66 Connecting RS-232 Devices to Short Range Modems . . . . . . . . 67 Chapter summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

  5 Making WAN Connections. . . . . . . . . . . . . . . . . . . . . . . . . .69

Determining WAN needs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Requirements Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Switched or Dedicated? . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Private or Public? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

Comparison of WAN connection types. . . . . . . . . . . . . . . . . . . . . . 74 Traditional Telephone Service (POTS) . . . . . . . . . . . . . . . . . . . 74 Integrated services digital network . . . . . . . . . . . . . . . . . . 75 Digital Subscriber Line . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 T-1/T-3 (DS1/DS3) Connections . . . . . . . . . . . . . . . . . . . . . 77 Asynchronous Transfer Mode (ATM) . . . . . . . . . . . . . . . . . . 78

Corporate WAN networks. . . . . . . . . . . . . . . . . . . . . . . . . . . 79 WAN Components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Quality of Service and Class of Service . . . . . . . . . . . . . . . . . 80 WAN Redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

Chapter summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84

  6 Understand network protocols. . . . . . . . . . . . . . . . .85

Understand TCP/IP and UDP. . . . . . . . . . . . . . . . . . . . . . . . 86 TCP and UDP ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87

IP packets and IP addressing. . . . . . . . . . . . . . . . . . . . . . . . 89

sub-redes IP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92

IP Addresses: Public or Private? . . . . . . . . . . . . . . . . . . . . . . 93 Subnet Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Networking: A Beginner's Guide xii

Hypertext Transfer Protocol. . . . . . . . . . . . . . . . . . . . . . . . . 98 File transfer protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 Network News Transfer Protocol . . . . . . . . . . . . . . . . . . . . 99 Telnet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Simple mail transfer protocol. . . . . . . . . . . . . . . . . . . . . . . 100 Voice over IP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

Comparison of the main proprietary protocols. . . . . . . . . . . . . . . 103 Novell IPX/SPX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 NetBIOS and NetBEUI. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 Apple Talk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

Chapter summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

  7 Browse the directory services. . . . . . . . . . . . . . . . . . . . . . . .105

What is a directory service? . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 Forests, roots, trees and leaves . . . . . . . . . . . . . . . . . . . . . 108 Department of Redundancy Department . . . . . . . . . . . . . . . 109

Information about specific directory services. . . . . . . . . . . . . . . . 110 electronic yearbook . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Windows NT Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Active Directory. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 X.500 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 LDAP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113

Chapter summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115

  8 Connections from afar: remote network access. . . . . . .117

Determining remote access needs. . . . . . . . . . . . . . . . . . . . . . 118 What types of remote users do you need to support? . . . . 119 What types of remote access are required? . . . . . . . . . . . 122 How much bandwidth do you need? . . . . . . . . . . . . . . . . . 122

Learn remote access technologies. . . . . . . . . . . . . . . . . . . . 124 Remote Node vs. Remote Control . . . . . . . . . . . . . . . . . . . . 124 Virtual Private Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

Chapter summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133

  9 Securing your network. . . . . . . . . . . . . . . . . . . . . . . . . . . . .135

Understanding Homeland Security. . . . . . . . . . . . . . . . . . . . . . . . . 136 Account security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 Password Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 File and Directory Permissions . . . . . . . . . . . . . . . . . . . . . . . 141 User Practices and Education . . . . . . . . . . . . . . . . . . . . . . . . 142

Content xiii

Understand external threats. . . . . . . . . . . . . . . . . . . . . . . . . 143 Threats at the front door . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 Backdoor threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 DOS Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147

Viruses and other malicious software. . . . . . . . . . . . . . . . . . . . 147 Chapter summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149

  10 Network disaster recovery. . . . . . . . . . . . . . . . . . . . . . . .151

Field Notes: The City of Seattle. . . . . . . . . . . . . . . . . . 152 Disaster Recovery Plans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156

Assessing disaster recovery needs. . . . . . . . . . . . . . . . . . . 156 Consideration of Disaster Scenarios . . . . . . . . . . . . . . . . . . . . . . 157 Communications Management . . . . . . . . . . . . . . . . . . . . . . . . . 159 Planning external storage. . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 Description of Critical Components . . . . . . . . . . . . . . . . . . . . . . 161

Network backup and restore procedures. . . . . . . . . . . . . . . . . . 161 Assessing Backup Needs. . . . . . . . . . . . . . . . . . . . . . . . . . . 161 Media Acquisition and Backup Technologies . . . . . . . . . . . . . 162 Choosing Backup Strategies. . . . . . . . . . . . . . . . . . . . . . . . . 164

Chapter summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167

  11 Network Servers: Everything You Wanted to Know But we were afraid to ask. . . . . . . . . . . . . . . . . . . . . . . . . .169

What distinguishes a server from a workstation? . . . . . . . . . . . 170 Server Processors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 Bus Capacities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 RAM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 Disk Subsystems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 Server health monitoring. . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 Hot-Swap Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181

Choice of servers for Windows. . . . . . . . . . . . . . . . . . . . . . . . . . 182 Defining Server Needs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 Server selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 System purchase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 Installing Servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186

Server maintenance and troubleshooting. . . . . . . . . . . . . . . . . 187 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189

  12 Purchasing and Managing Client Computers. . . . . . . . . .191

Choice of desktop computers. . . . . . . . . . . . . . . . . . . . . . . . . . 192 desktop platforms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 Networking: A Beginner's Guide xiv

  13 Designing a network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .199

The network design process. . . . . . . . . . . . . . . . . . . . . . . . . . . 200 Assessing Network Needs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201

Forms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 Network services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 Security and protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 Planning for growth and capacity. . . . . . . . . . . . . . . . . . . . . . 207

Meet network needs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Choosing a Network Type . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Network Structuring . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Selecting Servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209

Chapter summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210

  part II practical knowledge

  14 Installing and configuring Windows Server 2012. . . . . . .213

Description of Windows Server 2012 editions. . . . . . . . . . . . . 214 Preparing for Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215

Hardware Compatibility Check. . . . . . . . . . . . . . . . . . . 215 Checking the hardware configuration. . . . . . . . . . . . . . . . 216 Server Hardware Test. . . . . . . . . . . . . . . . . . . . . . . . 217 Making Preinstallation Decisions . . . . . . . . . . . . . . . . . . . . 218 Wait! Make a backup before updating! . . . . . . . . . . . . . . . . . . . . . 219

Installing Windows Server 2012. . . . . . . . . . . . . . . . . . . . . . . . . 210 Running Windows Server 2012 Setup . . . . . . . 220 Performing initial setup. . . . . . . . . . . . . . . . . . 224

Chapter summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236

  15 Windows Server 2012 administration: basic concepts. . . . . .237

Thinking about network security. . . . . . . . . . . . . . . . . . . . . . . 238 Working with User Accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . 239

Adding a user. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240 Modifying a User Account. . . . . . . . . . . . . . . . . . . . . . . . . . 242 Deleting or Deactivating a User Account . . . . . . . . . . . . . . . . . 247

Working with Active Directory Security Groups. . . . . . . . . . . . 247 Creating groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 Maintaining Group Membership . . . . . . . . . . . . . . . . . . . . . 251

Work with shared resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 Description of security actions. . . . . . . . . . . . . . . . . . . . . . . 252

Contents xiv

I work with printers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 Understanding Network Printing. . . . . . . . . . . . . . . . . . . . 256 Configuring a network printer . . . . . . . . . . . . . . . . . . . . . . . . 257

Chapter summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259

  16 Introduction to Exchange Server 2013. . . . . . . . . . . . . . . . . . .261

Exchange Server 2013 features. . . . . . . . . . . . . . . . . . . . . . . . . 262 Installing Exchange Server 2013 . . . . . . . . . . . . . . . . . . . . . . . . . 263 Mailbox Setup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268

Create a mailbox. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269 ​​​​​​​​Testing your mailbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272

Chapter summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274

  17 Understanding Other Windows Server 2012 Services. . . .275

Looking for DHCP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276 DNS Probing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 Remote Access Description . . . . . . . . . . . . . . . . . . . . . . . . . . 279 Checking IIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260 Understanding Remote Desktop Services. . . . . . . . . . . . . . . . . . 282 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283

  18 Installation of Linux. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .285

Computer hardware configuration for Linux. . . . . . . . . . . . . . . . 286 Hardware Compatibility. . . . . . . . . . . . . . . . . . . . . . . . . . . . 286 Server Project . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 Server Uptime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288 Dual boot issues. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288

OracleLinux installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289 Choosing an Installation Method . . . . . . . . . . . . . . . . . . . . . 289 Starting the installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270 Initial Oracle Linux Setup . . . . . . . . . . . . . . . . . . . . 295 Logging in to Oracle Linux . . . . . . . . . . . . . . . . . . . . . . . . . . 298 And that's it! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299 If it just doesn't work right. . . . . . . . . . . . . . . . . . . . . . . . . . 300

Chapter summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301

  19 Introduction to Linux System Administration. . . . . . . . .303

Oracle Linux management with graphical tools. . . . . . . . . . . . . . 304 User Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 Change the root password. . . . . . . . . . . . . . . . . . . . . . . . . . 307 Configuring common network settings. . . . . . . . . . . . . . . 307 Networking: A Beginner's Guide xvi

Master the basics of the Linux command line. . . . . . . . . . . . . . . . . . . 310 Work from the command line. . . . . . . . . . . . . . . . . . . . 310 Environment variables. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312 Documentation Tools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313 File Listings, Ownership, and Permissions . . . . . . . . . . . . . 315 Managing and manipulating files . . . . . . . . . . . . . . . . . . 320 Process handling. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329 Miscellaneous Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333

Chapter summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335

  20 Setting up a Linux web server with Apache. . . . . . . . . . .337

Apache web server overview. . . . . . . . . . . . . . . . . . . . . . . . 348 Enabling the Apache Web Server on Oracle Linux . . . . . . . . . . 339 Apache Web Server Administration. . . . . . . . . . . . . . . . . . . . . . . 340

Stop and start Apache. . . . . . . . . . . . . . . . . . . . . . . 340 Change Apache configuration. . . . . . . . . . . . . . . . . . 341 Publication of web pages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341

Chapter summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342

  21 Introduction to Virtualization. . . . . . . . . . . . . . . . . . . . . . . .343

Benefits of virtualization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324 Getting Started with Windows Server 2012 Hyper-V . . . . . . . . . . . . . . . . 325 Introduction to VMware Virtualization Products . . . . . . . . . . . . . . . 346

Introducing Oracle VM VirtualBox. . . . . . . . . . . . . . . . . . . . 347 Creating a virtual machine for Oracle Linux. . . . . . . . . . . . 348 Running Oracle Linux in the virtual machine. . . . . . . . . . . 352

Virtual machine data backup. . . . . . . . . . . . . . . . . . . . . . . . 356 Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356

  Glossary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .357 Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .373

expressions of gratitude

I would like to thank Amy Jollymore for putting this project together. An acquisitions editor's job is rarely easy (think "passing cats"), but Amy has always been a joy to work with.

I Amanda Russell was the editorial coordinator for this book, which means that she

he had the difficult task of ensuring that all the numerous tasks were tracked and carried out. Amanda brought an incredible combination of poise and skill to this work.

Sandhya Gola was our project manager, and after the manuscript was written, she was in charge of managing the overall editing and production process of the book. I would like to thank Sandhya for her competent work on the project; I enjoyed working with her!

I would also like to thank Lisa McCoy, who reviewed the entire book. I really appreciate Lisa's skillful improvements to the book's text. Finally, Steve Langford was the technical editor for this edition of the book. I've known Steve for many years, originally when we were colleagues and Steve was the administrator of a rather complex network. I am grateful to Steve for being willing to take on this job.

This page was intentionally left blank.

  Introduction

Over the years, I've met many people who have gained a good, even impressive, working knowledge of PCs, operating systems, applications, and common problems and solutions. Many of these people are magicians.

EU

with desktop computers. However, many of them were unable to make the transition to working with networks and struggled to gain the knowledge needed to conceptualize, understand, install, manage, and troubleshoot networks. In many cases, this deficiency limits career growth because most companies believe that networking experience is essential for high-level information technology (IT) jobs. And, in fact, the experience in networksesvery important.

Certainly, networks can be tricky beasts to learn. To add to the difficulty, most companies are unwilling to let people who are not trained with networks experiment and learn about them using the company's production network. This leaves the networking newbie in the difficult position of having to learn about networking.

Read numerous books and articles ■

Attend classes ■

Building Small Experimental Networks at Home Using Improvised and/or Borrowed Parts and Software Networking: A Beginner's Guide xx

This book is designed for people who understand computers and the rudiments of computer science, but want to start an education in networking and networking. I assume that you understand and are comfortable with the following topics:

How bits and bytes work ■

The notion of binary, octal, decimal and hexadecimal notation ■

How Basic PC Hardware Works and How to Install and Replace Peripheral PC Components ■

Two or three desktop operating systems in detail, such as Windows, Mac OS, ■

Linux or Unix Detailed knowledge of a wide variety of application software

■ The purpose of this book is to educate and familiarize. The first part of the book discusses basic networking hardware and technology. Its purpose is to help you understand the basic components of networking so that you can build a conceptual framework into which you can fit more detailed knowledge in your chosen area of ​​specialization. The second part of the book is about familiarizing you with the two main network operating systems: Windows Server 2012 and Oracle Linux.

In Part Two, you'll learn the basics of configuring and managing these network operating systems, as well as virtualization.

This book is intended to be a springboard from which you can begin to seek more detailed knowledge in the areas that interest you. The following are some areas you might want to continue exploring, depending on your career goals:

  Small to medium network administratorIf you intend to build and

■ When managing networks with 200 users or less, you should expand your knowledge by studying the network operating systems you plan to use, server hardware, client PC administration, and network management. You may find a more detailed understanding of networking hardware such as routers, bridges, gateways, switches, and the like useful, but this may not be a major focus for you.

  large network adminIf you intend to work with networks with

■ 200+ users, so you need to get detailed knowledge about TCP/

IP addressing and routing and network hardware including routers, bridges, gateways, switches and firewalls. Also, in large networks, administrators tend to specialize in certain areas, so you should consider several areas of specific expertise, such as email servers like Microsoft Exchange or database servers like Oracle or SQL Server.

  internet administratorMany people these days are looking for specialization.

■ in Internet-based technologies. Depending on the area you want to work in, you should learn more about web servers and FTP, HTTP and other applications.

Introduction xxiend user supportIf your main job is to support end users, perhaps with

■ Compatibility with client computers or applications, you can still benefit from a deeper understanding of the network. Client computing applications often interact with the network, and understanding networks will certainly help you be more efficient.

  ADVICE

If you are looking for a job in networking, search the Internet for job postings and carefully study the job requirements. This can be a useful technique to properly direct your studies. As you do this, you'll notice that for the most important jobs, most employers ask for people who are certified by Microsoft, Cisco, or other companies. You should seriously consider getting a proper certification. While certifications can never replace experience, they are a way for an individual to demonstrate a required level of knowledge and experience in a specific area. That difference could be the key to getting the best possible job offers and gaining more experience. Proper certification can often be worth several years of experience in terms of pay and job responsibilities, making it an investment in yourself that will usually pay for itself in a fairly short period of time.

This page intentionally left blank PART I Pros and Cons of Networking

The business

Networking CHAPTER 1 Networking: A Beginner's Guide

4

his book is a beginner's guide to networking for beginners. Before we delve into the bits and bytes of networks, which are covered in the rest of the book, you should start by understanding the whys and wherefores of networks.

T

This chapter discusses networking from a business perspective. You will learn about the benefits networking brings to a company and the different types of networking jobs available. You'll also find out how networking is supported from a business perspective and how you can start a career in networking. Finally, you'll learn about the Sarbanes-Oxley Act of 2002 and how its requirements affect networking professionals.

  Understanding networks: the corporate perspective

To be truly effective in the field of networking, you need to start by understanding networking from an enterprise perspective. Why are networks important for companies? What do they get for the company? How can network professionals more clearly address business needs with the networks they build and maintain? It is important to realize that there is no single correct answer to these questions. Each company will have different needs and expectations of its network. What's important is that you learn the relevant networking questions to ask for your business and find the best possible answers to those questions for your specific business. This will ensure that the company's network best meets your needs.

  What does the company need?There are many possible reasons why a business might need or benefit from a network.

To understand your particular company, you should start by exploring the following questions. You may need to ask a variety of different people in the company for their perspectives on these issues. Some of the managers you may need to interview include the CEO or owner, the CFO, and the heads of several key departments within the company such as manufacturing, sales and marketing, accounting, purchasing and materials, retail. operations, etc. The variety of managers you will interview will depend on the type of business the company is in.

It is important that you start by understanding the business itself and the business-oriented perspectives of these different individuals and the people in your departments. Consider the following questions for each of these key areas of the organization:

What is your role for the company? ■

How do your goals relate to the company's goals? ■

What are the main goals for your role in the coming year? How about in ■

Chapter 1: The Network Business

5 How can information technology (IT) play a role in supporting your goals?

■ What kind of automation do you think could help you achieve your goals?

■ goals? How is work done in your area? For example, do most of the

■ Employees perform mechanical work, such as on a production line, or most of them are so-called "knowledge workers" who generate documents, analyze information, etc. What are the main inputs to the functional area in terms of information or

■ materials and what are the main products for the functional area? What processes convert inputs into outputs? Does the current network performance meet your needs? if not how

■ does it affect them? What level of performance improvement is needed and what benefits will the company as a whole gain from addressing them? Do the existing network resources meet your needs? otherwise that

■ Are the features needed and how will adding those features benefit your functional area and business?

Your goal in asking these questions, and others that may come to mind, is to gain a good understanding of each functional area: what it does and how it does it, as well as what you want to be able to do in the future. With this knowledge, you can begin to analyze the impact that the network or improvements to the existing network can have in these various areas.

From a business perspective it is absolutely essential. Networks are not built and improved “just for the hell of it”. Instead, any specific network or network upgrade should be driven by business needs. Justifications for networks or improvements to existing networks should clearly show how they are necessary for the smooth running of the business or how they will play an important role in achieving business objectives, according to the cost and effort involved.

  How will the network benefit the company?

Once you have a good understanding of the company, its goals, and how it does its job, you can discuss different ideas you might have for networking and how those ideas will benefit some or all parts of the business. In doing so, you should consider at least the following areas:

Are there areas where the lack of a network, or a failure in the existing ■ network, is preventing the company from achieving its goals or doing its job? For example, if an existing network is undersized and this causes people to spend a lot of time on routine tasks (such as saving or sending files, performing system transactions, or getting system information), what improvements could address these shortcomings? Or Maybe Networking and Networking: A Beginner's Guide

6 Are there features you could add to the network that would provide

■ business benefits? For example, if many people in the company fax constantly (for example, salespeople send price quotes to customers), would adding a network-based fax system yield significant productivity benefits? What about other network-based applications? (Chapter 2 lists some common networking features you might want to review to help answer this question.) What other automation plans are there that will require networking support?

■ For example, suppose you are a company's network administrator. What new applications or features will be added to the network that you need to support? Does the company intend to install some kind of videoconferencing system, for example? If so, do you know what changes you will need to make to the network to support the system? What must be done with the network simply to maintain it? In most companies,

■ File space requirements are growing rapidly even if the business itself is not expanding.

How much additional storage space does the network need to keep moving forward? How many additional servers and other components will be needed to keep the network running smoothly?

Obviously, a list like the one above cannot be exhaustive. The important point is that you must first approach networking from the perspective of the company and its needs. Within that framework, use your creativity, knowledge, experience, and business and technical acumen to propose and execute a plan for the network. The rest of this book discusses the information you need to start learning about this important part of any business infrastructure.

  understand the network

If you plan on getting into the networking field (and this book is designed to be a good start for that), it's important to understand the various networking jobs you're likely to encounter and what they usually require. Of course, actual job requirements vary greatly between companies and for different established networks. Also, companies may have different starting opportunities through which you can jump into a networking career. With that said, the following descriptions are general summaries of some important work.

  Network administrator

References

Top Articles
Latest Posts
Article information

Author: Merrill Bechtelar CPA

Last Updated: 11/06/2023

Views: 6045

Rating: 5 / 5 (70 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Merrill Bechtelar CPA

Birthday: 1996-05-19

Address: Apt. 114 873 White Lodge, Libbyfurt, CA 93006

Phone: +5983010455207

Job: Legacy Representative

Hobby: Blacksmithing, Urban exploration, Sudoku, Slacklining, Creative writing, Community, Letterboxing

Introduction: My name is Merrill Bechtelar CPA, I am a clean, agreeable, glorious, magnificent, witty, enchanting, comfortable person who loves writing and wants to share my knowledge and understanding with you.