Siêu thị PDFTải ngay đi em, trời tối mất

Thư viện tri thức trực tuyến

Kho tài liệu với 50,000+ tài liệu học thuật

© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Networking
PREMIUM
Số trang
444
Kích thước
7.5 MB
Định dạng
PDF
Lượt xem
1349

Networking

Nội dung xem thử

Mô tả chi tiết

TEAMFLY

Team-Fly®

ABOUT THE AUTHOR

Bruce Hallberg has consulted on many network system and software implementations for

Fortune 1000 companies and presently works as an IT director in the biopharmaceutical

industry. He is the author of more than 20 computer books on Windows NT, NetWare, Ex￾change Server, and other networking and computer technologies.

ABOUT THE TECHNICAL REVIEWER

Tony Ryan, CNE, MCP, is a network engineer, consultant, and project manager with a

wide range of experience in LANand WANtechnologies, client/server implementa￾tions, and LANadministration and management. He is currently the manager of Distrib￾uted Computing for the City of Seattle.

Copyright 2001 The McGraw-Hill Companies, Inc. Click Here for Terms of Use.

Networking:

A Beginner’s Guide,

Second Edition

BRUCE HALLBERG

Osborne/McGraw-Hill

New York Chicago San Francisco

Lisbon London Madrid Mexico City

Milan New Delhi San Juan

Seoul Singapore Sydney Toronto

Copyright © 2001 by The McGraw-Hill Companies. All rights reserved. Manufactured in the United States of America. Except as per￾mitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by

any means, or stored in a database or retrieval system, without the prior written permission of the publisher.

0-07-219454-5

The material in this eBook also appears in the print version of this title: 0-07-213231-0.

All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trade￾marked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringe￾ment of the trademark. Where such designations appear in this book, they have been printed with initial caps.

McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate

training programs. For more information, please contact George Hoare, Special Sales, at [email protected] or (212)

904-4069.

TERMS OF USE

This is a copyrighted work and The McGraw-Hill Companies, Inc. (“McGraw-Hill”) and its licensors reserve all rights in and to the

work. Use of this work is subject to these terms. Except as permitted under the Copyright Act of 1976 and the right to store and

retrieve one copy of the work, you may not decompile, disassemble, reverse engineer, reproduce, modify, create derivative works

based upon, transmit, distribute, disseminate, sell, publish or sublicense the work or any part of it without McGraw-Hill’s prior con￾sent. You may use the work for your own noncommercial and personal use; any other use of the work is strictly prohibited. Your

right to use the work may be terminated if you fail to comply with these terms.

THE WORK IS PROVIDED “AS IS”. McGRAW-HILL AND ITS LICENSORS MAKE NO GUARANTEES OR WARRANTIES

AS TO THE ACCURACY, ADEQUACY OR COMPLETENESS OF OR RESULTS TO BE OBTAINED FROM USING THE

WORK, INCLUDING ANY INFORMATION THAT CAN BE ACCESSED THROUGH THE WORK VIA HYPERLINK OR

OTHERWISE, AND EXPRESSLY DISCLAIM ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED

TO IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. McGraw-Hill and its

licensors do not warrant or guarantee that the functions contained in the work will meet your requirements or that its operation will

be uninterrupted or error free. Neither McGraw-Hill nor its licensors shall be liable to you or anyone else for any inaccuracy, error

or omission, regardless of cause, in the work or for any damages resulting therefrom. McGraw-Hill has no responsibility for the con￾tent of any information accessed through the work. Under no circumstances shall McGraw-Hill and/or its licensors be liable for any

indirect, incidental, special, punitive, consequential or similar damages that result from the use of or inability to use the work, even

if any of them has been advised of the possibility of such damages. This limitation of liability shall apply to any claim or cause what￾soever whether such claim or cause arises in contract, tort or otherwise.

DOI: 10.1036/0072194545

For Maxine Clarity Hallberg, a sweet and gentle girl, who was born

during the writing of this second edition

This page intentionally left blank.

vii

AT A GLANCE

Part I Networking Ins and Outs

▼ 1 The Business of Networking . . . . . . . . . . 3

▼ 2 Laying the Foundation . . . . . . . . . . . . . . 9

▼ 3 Understanding Networking . . . . . . . . . . 15

▼ 4 Understanding Network Cabling . . . . . . . 37

▼ 5 Understanding Network Hardware . . . . . . 63

▼ 6 Making WAN Connections . . . . . . . . . . . 75

▼ 7 Understanding Networking Protocols . . . . . 87

▼ 8 Exploring Directory Services . . . . . . . . . . 107

▼ 9 Connections from Afar: Remote Network

Access . . . . . . . . . . . . . . . . . . . . . . 119

▼ 10 Securing Your Network . . . . . . . . . . . . . 135

▼ 11 Network Disaster Recovery . . . . . . . . . . . 149

▼ 12 Network Servers: Everything You Wanted

to Know, But Were Afraid to Ask . . . . . . 165

▼ 13 All About Client Computers . . . . . . . . . . 189

Copyright 2001 The McGraw-Hill Companies, Inc. Click Here for Terms of Use.

viii Networking: A Beginner’s Guide, Second Edition

Part II Hands-On Knowledge

▼ 14 Designing a Network . . . . . . . . . . . . . . 203

▼ 15 Installing and Setting Up NetWare 5.1 . . . . 217

▼ 16 Administering NetWare: The Basics . . . . . . 229

▼ 17 Understanding Other NetWare Services . . . 247

▼ 18 Installing and Setting Up Windows 2000

Server . . . . . . . . . . . . . . . . . . . . . . 253

▼ 19 Administering Windows 2000 Server:

The Basics . . . . . . . . . . . . . . . . . . . 279

▼ 20 Understanding Other Windows 2000

Server Services . . . . . . . . . . . . . . . . . 315

▼ 21 Installing Linux in a Server Configuration . . . 325

▼ 22 Introduction to Linux Systems

Administration . . . . . . . . . . . . . . . . . 353

▼ Glossary . . . . . . . . . . . . . . . . . . . . . . 397

▼ Index . . . . . . . . . . . . . . . . . . . . . . . 409

▼ 3 Understanding Networking . . . . . . . . . . . . . . . . . . . . . . . . . . 15

Knowing Network Relationship Types . . . . . . . . . . . . . . . . 16

Peer-to-Peer Network Relationships . . . . . . . . . . . . . . 17

Client/Server Network Relationships . . . . . . . . . . . . . 17

Comparing Peer-to-Peer and Client/Server Networks . . . . 18

Learning Network Features . . . . . . . . . . . . . . . . . . . . . . 22

File Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

Printer Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . 22

Application Services . . . . . . . . . . . . . . . . . . . . . . . 23

E-Mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . 25

Wide Area Networks . . . . . . . . . . . . . . . . . . . . . . . 25

Internet and Intranet . . . . . . . . . . . . . . . . . . . . . . . 26

Network Security . . . . . . . . . . . . . . . . . . . . . . . . . 27

Understanding the OSI Networking Model . . . . . . . . . . . . . 27

Physical Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

Data-Link Layer . . . . . . . . . . . . . . . . . . . . . . . . . . 29

Network Layer . . . . . . . . . . . . . . . . . . . . . . . . . . 29

Transport Layer . . . . . . . . . . . . . . . . . . . . . . . . . . 30

Session Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

Presentation Layer . . . . . . . . . . . . . . . . . . . . . . . . 30

Application Layer . . . . . . . . . . . . . . . . . . . . . . . . . 30

Understanding How Data Travels Through the OSI Layers . . 31

Learning About Network Hardware Components . . . . . . . . . 31

Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

Hubs, Routers, and Switches . . . . . . . . . . . . . . . . . . 32

Cabling and Cable Plants . . . . . . . . . . . . . . . . . . . . 33

Workstation Hardware . . . . . . . . . . . . . . . . . . . . . . 35

Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

▼ 4 Understanding Network Cabling . . . . . . . . . . . . . . . . . . . . . . . 37

Understanding Cable Topologies . . . . . . . . . . . . . . . . . . . 38

Bus Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

Star Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

Ring Topology . . . . . . . . . . . . . . . . . . . . . . . . . . 43

Comparing Rings to Stars and Buses . . . . . . . . . . . . . . 45

Demystifying Network Cabling . . . . . . . . . . . . . . . . . . . . 46

Learning Basic Cable Types . . . . . . . . . . . . . . . . . . . 47

Twisted-Pair Cabling: The King of Network Cables . . . . . 48

Coaxial Cable . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

Installing and Maintaining Network Cabling . . . . . . . . . . . . 54

Choosing a Cabling Contractor . . . . . . . . . . . . . . . . . 54

Solving Cable Problems . . . . . . . . . . . . . . . . . . . . . 55

x Networking: A Beginner’s Guide, Second Edition

Selecting and Installing a SOHO Network . . . . . . . . . . . . . . 58

Choosing a SOHO Network . . . . . . . . . . . . . . . . . . . 58

Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

▼ 5 Understanding Network Hardware . . . . . . . . . . . . . . . . . . . . . . 63

Directing Network Traffic . . . . . . . . . . . . . . . . . . . . . . . 64

Repeaters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

Hubs and Concentrators . . . . . . . . . . . . . . . . . . . . . 66

Bridges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69

Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69

Making High-Level Connections with Gateways . . . . . . . . . . 71

Protecting a Network with Firewalls . . . . . . . . . . . . . . . . . 71

Connecting RS-232 Devices with Short-Haul Modems . . . . . . . 72

Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

▼ 6 Making WAN Connections . . . . . . . . . . . . . . . . . . . . . . . . . . 75

Determining WAN Needs . . . . . . . . . . . . . . . . . . . . . . . 76

Analyzing Requirements . . . . . . . . . . . . . . . . . . . . 77

Switched or Dedicated? . . . . . . . . . . . . . . . . . . . . . 77

Private or Public? . . . . . . . . . . . . . . . . . . . . . . . . . 78

Understanding WAN Connections . . . . . . . . . . . . . . . . . . 79

Plain Old Telephone Service (POTS) . . . . . . . . . . . . . . 80

Integrated Services Digital Network (ISDN) . . . . . . . . . 80

Digital Subscriber Line (DSL) . . . . . . . . . . . . . . . . . . 81

T-1/T-3 (DS1/DS3) Connections . . . . . . . . . . . . . . . . 84

Asynchronous Transfer Mode (ATM) . . . . . . . . . . . . . 84

X.25 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

▼ 7 Understanding Networking Protocols . . . . . . . . . . . . . . . . . . . . . 87

Understanding TCP/IP and UDP . . . . . . . . . . . . . . . . . . . 88

TCP and UDP Ports . . . . . . . . . . . . . . . . . . . . . . . 89

IP Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . 90

IP Subnetting . . . . . . . . . . . . . . . . . . . . . . . . . . . 93

Subnet Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

Other Internet Protocols . . . . . . . . . . . . . . . . . . . . . . . . 96

Domain Name System . . . . . . . . . . . . . . . . . . . . . . 96

Dynamic Host Configuration Protocol (DHCP) . . . . . . . . 98

Hypertext Transfer Protocol (HTTP) . . . . . . . . . . . . . . 98

File Transfer Protocol (FTP) . . . . . . . . . . . . . . . . . . . 99

NetNews Transfer Protocol (NNTP) . . . . . . . . . . . . . . 99

Telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

Simple Mail Transfer Protocol (SMTP) . . . . . . . . . . . . . 100

VoIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

Contents xi

Other Important Protocols . . . . . . . . . . . . . . . . . . . . . . . 103

Novell’s IPX/SPX . . . . . . . . . . . . . . . . . . . . . . . . . 103

NetBIOS and NetBEUI Protocols . . . . . . . . . . . . . . . . 104

AppleTalk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

▼ 8 Exploring Directory Services . . . . . . . . . . . . . . . . . . . . . . . . . 107

What Is a Directory Service? . . . . . . . . . . . . . . . . . . . . . . 108

Forests, Trees, Roots, and Leaves . . . . . . . . . . . . . . . . 110

Department of Redundancy Department . . . . . . . . . . . 110

Learning About Specific Directory Services . . . . . . . . . . . . . 112

NDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113

Windows NT Domains . . . . . . . . . . . . . . . . . . . . . . 113

Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . 114

X.500 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115

LDAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115

Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117

▼ 9 Connections from Afar: Remote Network Access . . . . . . . . . . . . . . 119

Classifying Remote Users . . . . . . . . . . . . . . . . . . . . . . . 120

Understanding Remote Access Needs . . . . . . . . . . . . . . . . 124

Learning Remote Access Technologies . . . . . . . . . . . . . . . . 126

Remote Node Versus Remote Control . . . . . . . . . . . . . 126

To Modem or Not to Modem, That Is the Question . . . . . . 128

Virtual Private Networks . . . . . . . . . . . . . . . . . . . . 131

Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133

▼ 10 Securing Your Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135

Internal Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137

Account Security . . . . . . . . . . . . . . . . . . . . . . . . . 138

File and Directory Permissions . . . . . . . . . . . . . . . . . 140

Practices and User Education . . . . . . . . . . . . . . . . . . 141

External Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142

Front-Door Threats . . . . . . . . . . . . . . . . . . . . . . . . 143

Back-Door Threats . . . . . . . . . . . . . . . . . . . . . . . . 144

Denial of Service Threats . . . . . . . . . . . . . . . . . . . . . 145

Viruses and Other Malicious Software . . . . . . . . . . . . . . . . 146

Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147

▼ 11 Network Disaster Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . 149

Notes from the Field: The City of Seattle . . . . . . . . . . . . . . . 150

Disaster Recovery Plans . . . . . . . . . . . . . . . . . . . . . . . . 153

Assessing Needs . . . . . . . . . . . . . . . . . . . . . . . . . 154

Disaster Scenarios . . . . . . . . . . . . . . . . . . . . . . . . 155

xii Networking: A Beginner’s Guide, Second Edition

TEAMFLY

Team-Fly®

Communication . . . . . . . . . . . . . . . . . . . . . . . . . . 156

Offsite Storage . . . . . . . . . . . . . . . . . . . . . . . . . . 157

Critical Components for Rebuilding . . . . . . . . . . . . . . 158

Network Backup and Restore . . . . . . . . . . . . . . . . . . . . . 158

Assessing Needs . . . . . . . . . . . . . . . . . . . . . . . . . 158

Acquiring Backup Media and Technologies . . . . . . . . . . 159

Choosing Backup Strategies . . . . . . . . . . . . . . . . . . . 160

Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164

▼ 12 Network Servers: Everything You Wanted to Know, But Were Afraid to Ask . . 165

What Distinguishes a Server from a Workstation . . . . . . . . . . 166

Server Processors . . . . . . . . . . . . . . . . . . . . . . . . . 166

Bus Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . 170

RAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171

Disk Subsystems . . . . . . . . . . . . . . . . . . . . . . . . . 172

Server State Monitoring . . . . . . . . . . . . . . . . . . . . . 178

Hot-Swap Components . . . . . . . . . . . . . . . . . . . . . 178

Choosing Servers for Windows NT and NetWare . . . . . . . . . 179

Defining Needs . . . . . . . . . . . . . . . . . . . . . . . . . . 179

Selecting the Server . . . . . . . . . . . . . . . . . . . . . . . . 181

Purchasing the System . . . . . . . . . . . . . . . . . . . . . . 183

Installing Servers . . . . . . . . . . . . . . . . . . . . . . . . . 184

Maintaining and Troubleshooting Servers . . . . . . . . . . . . . . 185

Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187

▼ 13 All About Client Computers . . . . . . . . . . . . . . . . . . . . . . . . . . 189

Choosing Desktop Computers . . . . . . . . . . . . . . . . . . . . . 190

Desktop Platforms . . . . . . . . . . . . . . . . . . . . . . . . 190

Reliability and Serviceability . . . . . . . . . . . . . . . . . . 193

Price and Performance . . . . . . . . . . . . . . . . . . . . . . 195

Understanding Network Workstation Requirements . . . . . . . . 196

Network Workstation Hardware . . . . . . . . . . . . . . . . 196

Network Workstation Software . . . . . . . . . . . . . . . . . 197

Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200

Part II

Hands-On Knowledge

▼ 14 Designing a Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203

Assessing Network Needs . . . . . . . . . . . . . . . . . . . . . . . 205

Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206

Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208

Network Services . . . . . . . . . . . . . . . . . . . . . . . . . 209

Contents xiii

Security and Safety . . . . . . . . . . . . . . . . . . . . . . . . 210

Growth and Capacity Planning . . . . . . . . . . . . . . . . . 211

Meeting Network Needs . . . . . . . . . . . . . . . . . . . . . . . . 212

Choosing Network Type . . . . . . . . . . . . . . . . . . . . . 212

Choosing Network Structure . . . . . . . . . . . . . . . . . . 212

Choosing Servers . . . . . . . . . . . . . . . . . . . . . . . . . 214

Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215

▼ 15 Installing and Setting Up NetWare 5.1 . . . . . . . . . . . . . . . . . . . . 217

Understanding NetWare 5.1 . . . . . . . . . . . . . . . . . . . . . . 218

Preparing for Installation . . . . . . . . . . . . . . . . . . . . . . . . 219

Checking Hardware Compatibility . . . . . . . . . . . . . . . 219

Checking Hardware Configuration . . . . . . . . . . . . . . . 220

Testing the Server Hardware . . . . . . . . . . . . . . . . . . 221

Surveying the Server . . . . . . . . . . . . . . . . . . . . . . . 221

Installing NetWare 5.1 . . . . . . . . . . . . . . . . . . . . . . . . . 222

Configuring a NetWare 5.1 Client . . . . . . . . . . . . . . . . . . . 225

Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227

▼ 16 Administering NetWare: The Basics . . . . . . . . . . . . . . . . . . . . . 229

Working with User Accounts . . . . . . . . . . . . . . . . . . . . . 230

Modifying User Accounts . . . . . . . . . . . . . . . . . . . . 233

Deleting User Accounts . . . . . . . . . . . . . . . . . . . . . 239

Working with Security Groups . . . . . . . . . . . . . . . . . . . . 239

Creating Groups . . . . . . . . . . . . . . . . . . . . . . . . . 240

Maintaining Group Membership . . . . . . . . . . . . . . . . 240

Managing File System Access . . . . . . . . . . . . . . . . . . . . . 241

Understanding NetWare Folder Permissions . . . . . . . . . 243

Assigning Rights . . . . . . . . . . . . . . . . . . . . . . . . . 245

Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245

▼ 17 Understanding Other NetWare Services . . . . . . . . . . . . . . . . . . . 247

NDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248

Novell BorderManager . . . . . . . . . . . . . . . . . . . . . . . . . 249

Improving Server Reliability . . . . . . . . . . . . . . . . . . . . . . 250

DNS and DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251

Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252

▼ 18 Installing and Setting Up Windows 2000 Server . . . . . . . . . . . . . . . . 253

Understanding Windows 2000 Versions . . . . . . . . . . . . . . . 254

Preparing for Installation . . . . . . . . . . . . . . . . . . . . . . . . 255

Checking Hardware Compatibility . . . . . . . . . . . . . . . 256

Checking the Hardware Configuration . . . . . . . . . . . . 256

Testing the Server Hardware . . . . . . . . . . . . . . . . . . 258

xiv Networking: A Beginner’s Guide, Second Edition

Survey the Server . . . . . . . . . . . . . . . . . . . . . . . . . 259

Making Preinstallation Decisions . . . . . . . . . . . . . . . . 259

Wait! Back Up Before Upgrading! . . . . . . . . . . . . . . . 262

Installing Windows 2000 Server . . . . . . . . . . . . . . . . . . . . 262

Running the Windows 2000 Server Setup Program . . . . . . 262

Completing Windows 2000 Server Setup . . . . . . . . . . . 266

Configuring a Server Client . . . . . . . . . . . . . . . . . . . . . . 271

Creating a User Account . . . . . . . . . . . . . . . . . . . . . 271

Creating a Shared Folder . . . . . . . . . . . . . . . . . . . . 273

Setting Up a Windows 9x Client to Access the Server . . . . 274

Testing the Client Connection . . . . . . . . . . . . . . . . . . 276

Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276

▼ 19 Administering Windows 2000 Server: The Basics . . . . . . . . . . . . . . 279

Thinking About Network Security . . . . . . . . . . . . . . . . . . 280

Working with User Accounts . . . . . . . . . . . . . . . . . . . . . 281

Adding a User . . . . . . . . . . . . . . . . . . . . . . . . . . . 282

Modifying a User Account . . . . . . . . . . . . . . . . . . . . 284

Deleting or Disabling a User Account . . . . . . . . . . . . . 288

Working with Groups . . . . . . . . . . . . . . . . . . . . . . . . . 288

Creating Groups . . . . . . . . . . . . . . . . . . . . . . . . . 290

Maintaining Group Membership . . . . . . . . . . . . . . . . 294

Working with Shares . . . . . . . . . . . . . . . . . . . . . . . . . . 295

Understanding Share Security . . . . . . . . . . . . . . . . . 295

Creating Shares . . . . . . . . . . . . . . . . . . . . . . . . . . 297

Mapping Drives . . . . . . . . . . . . . . . . . . . . . . . . . . 299

Working with Printers . . . . . . . . . . . . . . . . . . . . . . . . . 300

Setting Up a Network Printer . . . . . . . . . . . . . . . . . . 301

Working with Backups . . . . . . . . . . . . . . . . . . . . . . . . . 305

Using Windows 2000 Server’s Backup Software . . . . . . . 309

Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312

▼ 20 Understanding Other Windows 2000 Server Services . . . . . . . . . . . . 315

DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316

DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317

RAS and RRAS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319

Internet Information Server . . . . . . . . . . . . . . . . . . . . . . 321

Cluster Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322

Windows Terminal Services . . . . . . . . . . . . . . . . . . . . . . 322

Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324

▼ 21 Installing Linux in a Server Configuration . . . . . . . . . . . . . . . . . . . 325

Before the Installation . . . . . . . . . . . . . . . . . . . . . . . . . 326

Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326

Contents xv

Server Design . . . . . . . . . . . . . . . . . . . . . . . . . . . 327

Uptime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328

Dual-Booting Issues . . . . . . . . . . . . . . . . . . . . . . . 328

Methods of Installation . . . . . . . . . . . . . . . . . . . . . . 329

If It Just Won’t Work Right . . . . . . . . . . . . . . . . . . . . 329

Installing Red Hat Linux . . . . . . . . . . . . . . . . . . . . . . . . 330

Creating a Boot Disk . . . . . . . . . . . . . . . . . . . . . . . 331

Starting the Installation . . . . . . . . . . . . . . . . . . . . . 331

Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351

▼ 22 Introduction to Linux Systems Administration . . . . . . . . . . . . . . . . . 353

About Linuxconf . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354

Managing Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356

Adding Users . . . . . . . . . . . . . . . . . . . . . . . . . . . 357

Removing Users . . . . . . . . . . . . . . . . . . . . . . . . . 359

Editing Users . . . . . . . . . . . . . . . . . . . . . . . . . . . 359

Changing Root’s Password . . . . . . . . . . . . . . . . . . . 360

Network Configuration . . . . . . . . . . . . . . . . . . . . . . . . 360

Changing Your Host Name . . . . . . . . . . . . . . . . . . . 361

Changing Your IP Address . . . . . . . . . . . . . . . . . . . 362

The /etc/hosts File . . . . . . . . . . . . . . . . . . . . . . . . 363

Changing DNS Client Configuration . . . . . . . . . . . . . . 365

Changing Your Default Route . . . . . . . . . . . . . . . . . . 366

Changing How Host Names Are Looked Up . . . . . . . . . 367

Managing Client NFS Filesystems with LinuxConf . . . . . . . . . 368

Linux Command-Line Basics . . . . . . . . . . . . . . . . . . . . . 369

Environment Variables . . . . . . . . . . . . . . . . . . . . . . 370

Nuances on the Command-Line Itself . . . . . . . . . . . . . 371

Documentation Tools . . . . . . . . . . . . . . . . . . . . . . 373

File Listings, Ownerships, and Permissions . . . . . . . . . . 375

File Management and Manipulation . . . . . . . . . . . . . . 380

Process Manipulation . . . . . . . . . . . . . . . . . . . . . . 389

Miscellaneous Tools . . . . . . . . . . . . . . . . . . . . . . . 394

Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395

▼ Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397

▼ Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409

xvi Networking: A Beginner’s Guide, Second Edition

Tải ngay đi em, còn do dự, trời tối mất!