Thư viện tri thức trực tuyến
Kho tài liệu với 50,000+ tài liệu học thuật
© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Networking
Nội dung xem thử
Mô tả chi tiết
TEAMFLY
Team-Fly®
ABOUT THE AUTHOR
Bruce Hallberg has consulted on many network system and software implementations for
Fortune 1000 companies and presently works as an IT director in the biopharmaceutical
industry. He is the author of more than 20 computer books on Windows NT, NetWare, Exchange Server, and other networking and computer technologies.
ABOUT THE TECHNICAL REVIEWER
Tony Ryan, CNE, MCP, is a network engineer, consultant, and project manager with a
wide range of experience in LANand WANtechnologies, client/server implementations, and LANadministration and management. He is currently the manager of Distributed Computing for the City of Seattle.
Copyright 2001 The McGraw-Hill Companies, Inc. Click Here for Terms of Use.
Networking:
A Beginner’s Guide,
Second Edition
BRUCE HALLBERG
Osborne/McGraw-Hill
New York Chicago San Francisco
Lisbon London Madrid Mexico City
Milan New Delhi San Juan
Seoul Singapore Sydney Toronto
Copyright © 2001 by The McGraw-Hill Companies. All rights reserved. Manufactured in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by
any means, or stored in a database or retrieval system, without the prior written permission of the publisher.
0-07-219454-5
The material in this eBook also appears in the print version of this title: 0-07-213231-0.
All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps.
McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate
training programs. For more information, please contact George Hoare, Special Sales, at [email protected] or (212)
904-4069.
TERMS OF USE
This is a copyrighted work and The McGraw-Hill Companies, Inc. (“McGraw-Hill”) and its licensors reserve all rights in and to the
work. Use of this work is subject to these terms. Except as permitted under the Copyright Act of 1976 and the right to store and
retrieve one copy of the work, you may not decompile, disassemble, reverse engineer, reproduce, modify, create derivative works
based upon, transmit, distribute, disseminate, sell, publish or sublicense the work or any part of it without McGraw-Hill’s prior consent. You may use the work for your own noncommercial and personal use; any other use of the work is strictly prohibited. Your
right to use the work may be terminated if you fail to comply with these terms.
THE WORK IS PROVIDED “AS IS”. McGRAW-HILL AND ITS LICENSORS MAKE NO GUARANTEES OR WARRANTIES
AS TO THE ACCURACY, ADEQUACY OR COMPLETENESS OF OR RESULTS TO BE OBTAINED FROM USING THE
WORK, INCLUDING ANY INFORMATION THAT CAN BE ACCESSED THROUGH THE WORK VIA HYPERLINK OR
OTHERWISE, AND EXPRESSLY DISCLAIM ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED
TO IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. McGraw-Hill and its
licensors do not warrant or guarantee that the functions contained in the work will meet your requirements or that its operation will
be uninterrupted or error free. Neither McGraw-Hill nor its licensors shall be liable to you or anyone else for any inaccuracy, error
or omission, regardless of cause, in the work or for any damages resulting therefrom. McGraw-Hill has no responsibility for the content of any information accessed through the work. Under no circumstances shall McGraw-Hill and/or its licensors be liable for any
indirect, incidental, special, punitive, consequential or similar damages that result from the use of or inability to use the work, even
if any of them has been advised of the possibility of such damages. This limitation of liability shall apply to any claim or cause whatsoever whether such claim or cause arises in contract, tort or otherwise.
DOI: 10.1036/0072194545
For Maxine Clarity Hallberg, a sweet and gentle girl, who was born
during the writing of this second edition
This page intentionally left blank.
vii
AT A GLANCE
Part I Networking Ins and Outs
▼ 1 The Business of Networking . . . . . . . . . . 3
▼ 2 Laying the Foundation . . . . . . . . . . . . . . 9
▼ 3 Understanding Networking . . . . . . . . . . 15
▼ 4 Understanding Network Cabling . . . . . . . 37
▼ 5 Understanding Network Hardware . . . . . . 63
▼ 6 Making WAN Connections . . . . . . . . . . . 75
▼ 7 Understanding Networking Protocols . . . . . 87
▼ 8 Exploring Directory Services . . . . . . . . . . 107
▼ 9 Connections from Afar: Remote Network
Access . . . . . . . . . . . . . . . . . . . . . . 119
▼ 10 Securing Your Network . . . . . . . . . . . . . 135
▼ 11 Network Disaster Recovery . . . . . . . . . . . 149
▼ 12 Network Servers: Everything You Wanted
to Know, But Were Afraid to Ask . . . . . . 165
▼ 13 All About Client Computers . . . . . . . . . . 189
Copyright 2001 The McGraw-Hill Companies, Inc. Click Here for Terms of Use.
viii Networking: A Beginner’s Guide, Second Edition
Part II Hands-On Knowledge
▼ 14 Designing a Network . . . . . . . . . . . . . . 203
▼ 15 Installing and Setting Up NetWare 5.1 . . . . 217
▼ 16 Administering NetWare: The Basics . . . . . . 229
▼ 17 Understanding Other NetWare Services . . . 247
▼ 18 Installing and Setting Up Windows 2000
Server . . . . . . . . . . . . . . . . . . . . . . 253
▼ 19 Administering Windows 2000 Server:
The Basics . . . . . . . . . . . . . . . . . . . 279
▼ 20 Understanding Other Windows 2000
Server Services . . . . . . . . . . . . . . . . . 315
▼ 21 Installing Linux in a Server Configuration . . . 325
▼ 22 Introduction to Linux Systems
Administration . . . . . . . . . . . . . . . . . 353
▼ Glossary . . . . . . . . . . . . . . . . . . . . . . 397
▼ Index . . . . . . . . . . . . . . . . . . . . . . . 409
▼ 3 Understanding Networking . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Knowing Network Relationship Types . . . . . . . . . . . . . . . . 16
Peer-to-Peer Network Relationships . . . . . . . . . . . . . . 17
Client/Server Network Relationships . . . . . . . . . . . . . 17
Comparing Peer-to-Peer and Client/Server Networks . . . . 18
Learning Network Features . . . . . . . . . . . . . . . . . . . . . . 22
File Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Printer Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Application Services . . . . . . . . . . . . . . . . . . . . . . . 23
E-Mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Wide Area Networks . . . . . . . . . . . . . . . . . . . . . . . 25
Internet and Intranet . . . . . . . . . . . . . . . . . . . . . . . 26
Network Security . . . . . . . . . . . . . . . . . . . . . . . . . 27
Understanding the OSI Networking Model . . . . . . . . . . . . . 27
Physical Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Data-Link Layer . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Network Layer . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Transport Layer . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Session Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Presentation Layer . . . . . . . . . . . . . . . . . . . . . . . . 30
Application Layer . . . . . . . . . . . . . . . . . . . . . . . . . 30
Understanding How Data Travels Through the OSI Layers . . 31
Learning About Network Hardware Components . . . . . . . . . 31
Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Hubs, Routers, and Switches . . . . . . . . . . . . . . . . . . 32
Cabling and Cable Plants . . . . . . . . . . . . . . . . . . . . 33
Workstation Hardware . . . . . . . . . . . . . . . . . . . . . . 35
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
▼ 4 Understanding Network Cabling . . . . . . . . . . . . . . . . . . . . . . . 37
Understanding Cable Topologies . . . . . . . . . . . . . . . . . . . 38
Bus Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Star Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Ring Topology . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Comparing Rings to Stars and Buses . . . . . . . . . . . . . . 45
Demystifying Network Cabling . . . . . . . . . . . . . . . . . . . . 46
Learning Basic Cable Types . . . . . . . . . . . . . . . . . . . 47
Twisted-Pair Cabling: The King of Network Cables . . . . . 48
Coaxial Cable . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Installing and Maintaining Network Cabling . . . . . . . . . . . . 54
Choosing a Cabling Contractor . . . . . . . . . . . . . . . . . 54
Solving Cable Problems . . . . . . . . . . . . . . . . . . . . . 55
x Networking: A Beginner’s Guide, Second Edition
Selecting and Installing a SOHO Network . . . . . . . . . . . . . . 58
Choosing a SOHO Network . . . . . . . . . . . . . . . . . . . 58
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
▼ 5 Understanding Network Hardware . . . . . . . . . . . . . . . . . . . . . . 63
Directing Network Traffic . . . . . . . . . . . . . . . . . . . . . . . 64
Repeaters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Hubs and Concentrators . . . . . . . . . . . . . . . . . . . . . 66
Bridges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Routers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Making High-Level Connections with Gateways . . . . . . . . . . 71
Protecting a Network with Firewalls . . . . . . . . . . . . . . . . . 71
Connecting RS-232 Devices with Short-Haul Modems . . . . . . . 72
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
▼ 6 Making WAN Connections . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Determining WAN Needs . . . . . . . . . . . . . . . . . . . . . . . 76
Analyzing Requirements . . . . . . . . . . . . . . . . . . . . 77
Switched or Dedicated? . . . . . . . . . . . . . . . . . . . . . 77
Private or Public? . . . . . . . . . . . . . . . . . . . . . . . . . 78
Understanding WAN Connections . . . . . . . . . . . . . . . . . . 79
Plain Old Telephone Service (POTS) . . . . . . . . . . . . . . 80
Integrated Services Digital Network (ISDN) . . . . . . . . . 80
Digital Subscriber Line (DSL) . . . . . . . . . . . . . . . . . . 81
T-1/T-3 (DS1/DS3) Connections . . . . . . . . . . . . . . . . 84
Asynchronous Transfer Mode (ATM) . . . . . . . . . . . . . 84
X.25 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
▼ 7 Understanding Networking Protocols . . . . . . . . . . . . . . . . . . . . . 87
Understanding TCP/IP and UDP . . . . . . . . . . . . . . . . . . . 88
TCP and UDP Ports . . . . . . . . . . . . . . . . . . . . . . . 89
IP Addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
IP Subnetting . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Subnet Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Other Internet Protocols . . . . . . . . . . . . . . . . . . . . . . . . 96
Domain Name System . . . . . . . . . . . . . . . . . . . . . . 96
Dynamic Host Configuration Protocol (DHCP) . . . . . . . . 98
Hypertext Transfer Protocol (HTTP) . . . . . . . . . . . . . . 98
File Transfer Protocol (FTP) . . . . . . . . . . . . . . . . . . . 99
NetNews Transfer Protocol (NNTP) . . . . . . . . . . . . . . 99
Telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Simple Mail Transfer Protocol (SMTP) . . . . . . . . . . . . . 100
VoIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Contents xi
Other Important Protocols . . . . . . . . . . . . . . . . . . . . . . . 103
Novell’s IPX/SPX . . . . . . . . . . . . . . . . . . . . . . . . . 103
NetBIOS and NetBEUI Protocols . . . . . . . . . . . . . . . . 104
AppleTalk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
▼ 8 Exploring Directory Services . . . . . . . . . . . . . . . . . . . . . . . . . 107
What Is a Directory Service? . . . . . . . . . . . . . . . . . . . . . . 108
Forests, Trees, Roots, and Leaves . . . . . . . . . . . . . . . . 110
Department of Redundancy Department . . . . . . . . . . . 110
Learning About Specific Directory Services . . . . . . . . . . . . . 112
NDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Windows NT Domains . . . . . . . . . . . . . . . . . . . . . . 113
Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . 114
X.500 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
LDAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
▼ 9 Connections from Afar: Remote Network Access . . . . . . . . . . . . . . 119
Classifying Remote Users . . . . . . . . . . . . . . . . . . . . . . . 120
Understanding Remote Access Needs . . . . . . . . . . . . . . . . 124
Learning Remote Access Technologies . . . . . . . . . . . . . . . . 126
Remote Node Versus Remote Control . . . . . . . . . . . . . 126
To Modem or Not to Modem, That Is the Question . . . . . . 128
Virtual Private Networks . . . . . . . . . . . . . . . . . . . . 131
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
▼ 10 Securing Your Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Internal Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Account Security . . . . . . . . . . . . . . . . . . . . . . . . . 138
File and Directory Permissions . . . . . . . . . . . . . . . . . 140
Practices and User Education . . . . . . . . . . . . . . . . . . 141
External Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Front-Door Threats . . . . . . . . . . . . . . . . . . . . . . . . 143
Back-Door Threats . . . . . . . . . . . . . . . . . . . . . . . . 144
Denial of Service Threats . . . . . . . . . . . . . . . . . . . . . 145
Viruses and Other Malicious Software . . . . . . . . . . . . . . . . 146
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
▼ 11 Network Disaster Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Notes from the Field: The City of Seattle . . . . . . . . . . . . . . . 150
Disaster Recovery Plans . . . . . . . . . . . . . . . . . . . . . . . . 153
Assessing Needs . . . . . . . . . . . . . . . . . . . . . . . . . 154
Disaster Scenarios . . . . . . . . . . . . . . . . . . . . . . . . 155
xii Networking: A Beginner’s Guide, Second Edition
TEAMFLY
Team-Fly®
Communication . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Offsite Storage . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Critical Components for Rebuilding . . . . . . . . . . . . . . 158
Network Backup and Restore . . . . . . . . . . . . . . . . . . . . . 158
Assessing Needs . . . . . . . . . . . . . . . . . . . . . . . . . 158
Acquiring Backup Media and Technologies . . . . . . . . . . 159
Choosing Backup Strategies . . . . . . . . . . . . . . . . . . . 160
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
▼ 12 Network Servers: Everything You Wanted to Know, But Were Afraid to Ask . . 165
What Distinguishes a Server from a Workstation . . . . . . . . . . 166
Server Processors . . . . . . . . . . . . . . . . . . . . . . . . . 166
Bus Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . 170
RAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Disk Subsystems . . . . . . . . . . . . . . . . . . . . . . . . . 172
Server State Monitoring . . . . . . . . . . . . . . . . . . . . . 178
Hot-Swap Components . . . . . . . . . . . . . . . . . . . . . 178
Choosing Servers for Windows NT and NetWare . . . . . . . . . 179
Defining Needs . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Selecting the Server . . . . . . . . . . . . . . . . . . . . . . . . 181
Purchasing the System . . . . . . . . . . . . . . . . . . . . . . 183
Installing Servers . . . . . . . . . . . . . . . . . . . . . . . . . 184
Maintaining and Troubleshooting Servers . . . . . . . . . . . . . . 185
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
▼ 13 All About Client Computers . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Choosing Desktop Computers . . . . . . . . . . . . . . . . . . . . . 190
Desktop Platforms . . . . . . . . . . . . . . . . . . . . . . . . 190
Reliability and Serviceability . . . . . . . . . . . . . . . . . . 193
Price and Performance . . . . . . . . . . . . . . . . . . . . . . 195
Understanding Network Workstation Requirements . . . . . . . . 196
Network Workstation Hardware . . . . . . . . . . . . . . . . 196
Network Workstation Software . . . . . . . . . . . . . . . . . 197
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Part II
Hands-On Knowledge
▼ 14 Designing a Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Assessing Network Needs . . . . . . . . . . . . . . . . . . . . . . . 205
Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Network Services . . . . . . . . . . . . . . . . . . . . . . . . . 209
Contents xiii
Security and Safety . . . . . . . . . . . . . . . . . . . . . . . . 210
Growth and Capacity Planning . . . . . . . . . . . . . . . . . 211
Meeting Network Needs . . . . . . . . . . . . . . . . . . . . . . . . 212
Choosing Network Type . . . . . . . . . . . . . . . . . . . . . 212
Choosing Network Structure . . . . . . . . . . . . . . . . . . 212
Choosing Servers . . . . . . . . . . . . . . . . . . . . . . . . . 214
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
▼ 15 Installing and Setting Up NetWare 5.1 . . . . . . . . . . . . . . . . . . . . 217
Understanding NetWare 5.1 . . . . . . . . . . . . . . . . . . . . . . 218
Preparing for Installation . . . . . . . . . . . . . . . . . . . . . . . . 219
Checking Hardware Compatibility . . . . . . . . . . . . . . . 219
Checking Hardware Configuration . . . . . . . . . . . . . . . 220
Testing the Server Hardware . . . . . . . . . . . . . . . . . . 221
Surveying the Server . . . . . . . . . . . . . . . . . . . . . . . 221
Installing NetWare 5.1 . . . . . . . . . . . . . . . . . . . . . . . . . 222
Configuring a NetWare 5.1 Client . . . . . . . . . . . . . . . . . . . 225
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
▼ 16 Administering NetWare: The Basics . . . . . . . . . . . . . . . . . . . . . 229
Working with User Accounts . . . . . . . . . . . . . . . . . . . . . 230
Modifying User Accounts . . . . . . . . . . . . . . . . . . . . 233
Deleting User Accounts . . . . . . . . . . . . . . . . . . . . . 239
Working with Security Groups . . . . . . . . . . . . . . . . . . . . 239
Creating Groups . . . . . . . . . . . . . . . . . . . . . . . . . 240
Maintaining Group Membership . . . . . . . . . . . . . . . . 240
Managing File System Access . . . . . . . . . . . . . . . . . . . . . 241
Understanding NetWare Folder Permissions . . . . . . . . . 243
Assigning Rights . . . . . . . . . . . . . . . . . . . . . . . . . 245
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
▼ 17 Understanding Other NetWare Services . . . . . . . . . . . . . . . . . . . 247
NDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
Novell BorderManager . . . . . . . . . . . . . . . . . . . . . . . . . 249
Improving Server Reliability . . . . . . . . . . . . . . . . . . . . . . 250
DNS and DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
▼ 18 Installing and Setting Up Windows 2000 Server . . . . . . . . . . . . . . . . 253
Understanding Windows 2000 Versions . . . . . . . . . . . . . . . 254
Preparing for Installation . . . . . . . . . . . . . . . . . . . . . . . . 255
Checking Hardware Compatibility . . . . . . . . . . . . . . . 256
Checking the Hardware Configuration . . . . . . . . . . . . 256
Testing the Server Hardware . . . . . . . . . . . . . . . . . . 258
xiv Networking: A Beginner’s Guide, Second Edition
Survey the Server . . . . . . . . . . . . . . . . . . . . . . . . . 259
Making Preinstallation Decisions . . . . . . . . . . . . . . . . 259
Wait! Back Up Before Upgrading! . . . . . . . . . . . . . . . 262
Installing Windows 2000 Server . . . . . . . . . . . . . . . . . . . . 262
Running the Windows 2000 Server Setup Program . . . . . . 262
Completing Windows 2000 Server Setup . . . . . . . . . . . 266
Configuring a Server Client . . . . . . . . . . . . . . . . . . . . . . 271
Creating a User Account . . . . . . . . . . . . . . . . . . . . . 271
Creating a Shared Folder . . . . . . . . . . . . . . . . . . . . 273
Setting Up a Windows 9x Client to Access the Server . . . . 274
Testing the Client Connection . . . . . . . . . . . . . . . . . . 276
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
▼ 19 Administering Windows 2000 Server: The Basics . . . . . . . . . . . . . . 279
Thinking About Network Security . . . . . . . . . . . . . . . . . . 280
Working with User Accounts . . . . . . . . . . . . . . . . . . . . . 281
Adding a User . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
Modifying a User Account . . . . . . . . . . . . . . . . . . . . 284
Deleting or Disabling a User Account . . . . . . . . . . . . . 288
Working with Groups . . . . . . . . . . . . . . . . . . . . . . . . . 288
Creating Groups . . . . . . . . . . . . . . . . . . . . . . . . . 290
Maintaining Group Membership . . . . . . . . . . . . . . . . 294
Working with Shares . . . . . . . . . . . . . . . . . . . . . . . . . . 295
Understanding Share Security . . . . . . . . . . . . . . . . . 295
Creating Shares . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Mapping Drives . . . . . . . . . . . . . . . . . . . . . . . . . . 299
Working with Printers . . . . . . . . . . . . . . . . . . . . . . . . . 300
Setting Up a Network Printer . . . . . . . . . . . . . . . . . . 301
Working with Backups . . . . . . . . . . . . . . . . . . . . . . . . . 305
Using Windows 2000 Server’s Backup Software . . . . . . . 309
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
▼ 20 Understanding Other Windows 2000 Server Services . . . . . . . . . . . . 315
DHCP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
RAS and RRAS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
Internet Information Server . . . . . . . . . . . . . . . . . . . . . . 321
Cluster Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
Windows Terminal Services . . . . . . . . . . . . . . . . . . . . . . 322
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
▼ 21 Installing Linux in a Server Configuration . . . . . . . . . . . . . . . . . . . 325
Before the Installation . . . . . . . . . . . . . . . . . . . . . . . . . 326
Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
Contents xv
Server Design . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Uptime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
Dual-Booting Issues . . . . . . . . . . . . . . . . . . . . . . . 328
Methods of Installation . . . . . . . . . . . . . . . . . . . . . . 329
If It Just Won’t Work Right . . . . . . . . . . . . . . . . . . . . 329
Installing Red Hat Linux . . . . . . . . . . . . . . . . . . . . . . . . 330
Creating a Boot Disk . . . . . . . . . . . . . . . . . . . . . . . 331
Starting the Installation . . . . . . . . . . . . . . . . . . . . . 331
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
▼ 22 Introduction to Linux Systems Administration . . . . . . . . . . . . . . . . . 353
About Linuxconf . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354
Managing Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356
Adding Users . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
Removing Users . . . . . . . . . . . . . . . . . . . . . . . . . 359
Editing Users . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
Changing Root’s Password . . . . . . . . . . . . . . . . . . . 360
Network Configuration . . . . . . . . . . . . . . . . . . . . . . . . 360
Changing Your Host Name . . . . . . . . . . . . . . . . . . . 361
Changing Your IP Address . . . . . . . . . . . . . . . . . . . 362
The /etc/hosts File . . . . . . . . . . . . . . . . . . . . . . . . 363
Changing DNS Client Configuration . . . . . . . . . . . . . . 365
Changing Your Default Route . . . . . . . . . . . . . . . . . . 366
Changing How Host Names Are Looked Up . . . . . . . . . 367
Managing Client NFS Filesystems with LinuxConf . . . . . . . . . 368
Linux Command-Line Basics . . . . . . . . . . . . . . . . . . . . . 369
Environment Variables . . . . . . . . . . . . . . . . . . . . . . 370
Nuances on the Command-Line Itself . . . . . . . . . . . . . 371
Documentation Tools . . . . . . . . . . . . . . . . . . . . . . 373
File Listings, Ownerships, and Permissions . . . . . . . . . . 375
File Management and Manipulation . . . . . . . . . . . . . . 380
Process Manipulation . . . . . . . . . . . . . . . . . . . . . . 389
Miscellaneous Tools . . . . . . . . . . . . . . . . . . . . . . . 394
Chapter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
▼ Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397
▼ Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
xvi Networking: A Beginner’s Guide, Second Edition