Tải bản đầy đủ (.pdf) (676 trang)

Tài liệu The Novell Guide to Network Volume 2 - Instructor Guide doc

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (1.84 MB, 676 trang )


INSTRUCTOR GUIDE
Education

This document should only be used by a Novell-certified instructor.
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.

The Novell Guide to Network + (Volume 2)

COURSE 1400

The Novell

®

Guide to Network



+

TM

Volume 2

100-004506-001
Revision 1.0

Proprietary Statement

Copyright © Novell, Inc. 1999. All rights reserved.


No part of this publication may be reproduced, photocopied, stored on a retrieval
system, or transmitted without the express prior consent of the publisher. This
manual, and any portion thereof, may not be copied without the express written
permission of Novell, Inc.
Novell, Inc.
1555 North Technology Way
Orem, Utah 84097-2399

Disclaimer

Novell, Inc. makes no representations or warranties with respect to the contents or
use of this manual, and specifically disclaims any express or implied warranties of
merchantability or fitness for any particular purpose.
Further, Novell, Inc. reserves the right to revise this publication and to make changes
in its content at any time, without obligation to notify any person or entity of such
revisions or changes.
Further, Novell, Inc. makes no representations or warranties with respect to any
NetWare software, and specifically disclaims any express or implied warranties of
merchantability or fitness for any particular purpose.
Further, Novell, Inc. reserves the right to make changes to any and all parts of
NetWare software at any time, without obligation to notify any person or entity of
such changes.
This Novell Training Manual is published solely to instruct students in the use of
Novell networking software. Although third-party application software packages are
used in Novell training courses, this is for demonstration purposes only and shall not
constitute an endorsement of any of these software applications.
Further, Novell, Inc. does not represent itself as having any particular expertise in
these application software packages and any use by students of the same shall be
done at the students’ own risk.


Software Piracy

Throughout the world, unauthorized duplication of software is subject to both criminal
and civil penalties.
If you know of illegal copying of software, contact your local Software Antipiracy
Hotline.
For the Hotline number for your area, access Novell’s World Wide Web page at
and look for the piracy page under “Programs.”
Or, contact Novell’s anti-piracy headquarters in the U.S. at 800-PIRATES (747-2837)
or 801-861-7101.

Trademarks

Novell, Inc. has attempted to supply trademark information about company names,
products, and services mentioned in this manual. The following list of trademarks
was derived from various sources.

Novell, Inc.

NetWare, the N-Design, and Novell are registered trademarks of Novell, Inc. in the
United States and other countries. The NetWare Logotype (teeth logo) is a
trademark of Novell, Inc.
Application Launcher is a trademark of Novell, Inc.
AppNotes is a trademark of Novell, Inc.
BorderManager is a trademark of Novell, Inc.
Certified Novell Administrator, Certified Novell Engineer, and CNA are service marks
of Novell, Inc.
Client 32 is a trademark of Novell, Inc.
CNA (Certified Novell Administrator) and CNI (Certified Novell Instructor) are service
marks of Novell, Inc. CNE is a registered service mark of Novell, Inc. in the United

States and other countries. Master CNE is a trademark of Novell, Inc.
ConsoleOne is a trademark of Novell, Inc.
GroupWise is a registered trademark of Novell, Inc. in the United States and other
countries.
Hot Fix is a trademark of Novell, Inc.
Internetwork Packet Exchange and IPX are trademarks of Novell, Inc.
intraNetWare Client is a trademark of Novell, Inc.
IntranetWare Client is a trademark of Novell, Inc.
IPX and IPX/SPX are trademarks of Novell, Inc.
LANalyzer is a registered trademark of Novell, Inc. in the United States and other
countries. LANalyzer Agent is a trademark of Novell, Inc.
Link Support Layer and LSL are trademarks of Novell, Inc.
ManageWise is a registered trademark of Novell, Inc. in the United States.
Multiple-Link Interface Driver and MLID are trademarks of Novell, Inc.
NDPS is a registered trademark of Novell, Inc. in the United States and other
countries. Novell Distributed Print Services is a trademark of Novell, Inc.
NE1000 and NE2000 are trademarks of Novell, Inc.
NEAP (Novell Education Academic Partner) is a service mark of Novell, Inc.
NetSync is a trademark of Novell, Inc.
NetWare 2, NetWare 3, NetWare 3.12, NetWare 4, NetWare 5, and NetWare/IP are
trademarks of Novell, Inc.

NetWare Application Manager is a trademark of Novell, Inc.
NetWare Core Protocol and NCP are trademarks of Novell, Inc.
NetWare DOS Requester is a trademark of Novell, Inc.
NetWare Expert is a trademark of Novell, Inc.
NetWare Link Services Protocol and NLSP are trademarks of Novell, Inc.
NetWare Loadable Module and NLM are trademarks of Novell, Inc.
NetWare Management Agent is a trademark of Novell, Inc.
NetWare Management Map is a trademark of Novell, Inc.

NetWare MultiProtocol Router (MPR) is a trademark of Novell, Inc.
NetWare Name Service is a trademark of Novell, Inc.
NetWare Peripheral Architecture is a trademark of Novell, Inc.
NetWire is a registered service mark of Novell, Inc.
Novell Application Launcher is a trademark of Novell, Inc.
Novell Authorized Education Center and NAEC are service marks of Novell, Inc.
Novell Client is a trademark of Novell, Inc.
Novell Directory Services is a registered trademark of Novell, Inc. NDS is a
trademark of Novell, Inc.
Novell Labs is a trademark of Novell, Inc.
Novell Network Registry is a service mark of Novell, Inc.
Novell Press is a trademark of Novell, Inc. in the United States.
Novell Storage Services is a trademark of Novell, Inc.
Novell Support Connection is a trademark of Novell, Inc.
Novell Technical Services is a service mark of Novell, Inc.
Novell Technical Support is a service mark of Novell, Inc.
Open Data-Link Interface and ODI are trademarks of Novell, Inc.
Packet Burst is a trademark of Novell, Inc.
Remote Console is a trademark of Novell, Inc.
RX-Net and RX-Net/2 are trademarks of Novell, Inc.
Sequenced Packet Exchange and SPX are trademarks of Novell, Inc.
SFT III is a trademark of Novell, Inc.
snAppShot is a trademark of Novell, Inc.
Storage Management Services and SMS are trademarks of Novell, Inc.
Transaction Tracking System is a trademark of Novell, Inc.
Virtual Loadable Module (VLM) is a trademark of Novell, Inc.

VLM is a trademark of Novell, Inc.
Z.E.N.works is a trademark of Novell, Inc.


Other Trademarks

286, 386, and 486 are trademarks of Intel Corporation.
386Max is a registered trademark of Qualitas Corporation.
3Com is a registered trademark of 3Com Corporation.
3M is a registered trademark of Minnesota Mining and Manufacturing Company.
Acrobat and Adobe are registered trademarks of Adobe Systems Incorporated.
Adaptec is a registered trademark of Adaptec, Inc.
Advanced Peer-to-Peer Networking is a registered trademark of International
Business Machines Corporation.
AltaVista is a trademark of Digital Equipment Corporation.
America Online is a registered service mark of America Online, Inc.
AMP is a registered trademark of AMP, Inc.
Apple, AppleShare, AppleTalk, EtherTalk, LocalTalk, and TokenTalk are registered
trademarks of Apple Computer, Inc.
ARCnet is a registered trademark of Datapoint Corporation.
AT is a registered trademark of International Business Machines Corporation.
AT&T is a registered trademark of AT&T Corporation.
ATM is a registered trademark of Adobe Systems Incorporated.
AUSTPAC is a registered trademark of Telstra Corporation.
AutoCAD is a registered trademark of AutoDESK, Inc.
Castelle is a registered trademark of Silicon Valley Bank.
CheckIT is a registered trademark of Touchstone Software Corporation.
Compaq is a registered trademark of Compaq Computer Corporation.
CompuServe is a registered trademark of CompuServe Incorporated.
Corporate Systems Center is a trademark of Computer Performance, Inc.
Datapac is a registered trademark of BCE, Inc.
DATASHOW is a registered trademark of Sayett Technology, Inc.
DEC, DECnet, and LAT are trademarks of Digital Equipment Corporation.
Digital Equipment Corporation is a registered trademark of Digital Equipment

Corporation.
DR DOS is a registered trademark of Caldera, Inc. in the United States and other
countries.
DynaText is a registered trademark of Electronic Book Technologies, Inc.

EtherExpress is a trademark of Intel Corporation.
EtherLink II is a registered trademark of 3Com Corporation.
GTE is a registered trademark of GTE Corporation.
Hewlett Packard and HP are registered trademarks of Hewlett-Packard Company.
IBM and IBM-AT are registered trademarks of International Business Machines
Corporation. XT is a trademark of International Business Machines Corporation.
IBM is a registered trademark of International Business Machines Corporation.
Infinite Technologies is a registered trademark of Infinite Technologies, Inc.
Intel is a registered trademark of Intel Corporation. Intel386 and Intel486 are
trademarks of Intel Corporation.
Java is a registered trademark of Sun Microsystems, Inc. in the United States and
other countries.
JavaSoft is a registered trademark of Sun Microsystmes, Inc.
JetDirect and LaserJet are registered trademarks of Hewlett-Packard Company
JetPress and LANPress are registered trademarks of Silicon Valley Bank.
JetXPrint is a registered trademark of Digital Products, Inc.
KDD is a registered trademark of KDD Network Systems Co., Ltd.
LANdecoder is a trademark of Infoseek Corporation.
LANDesk is a registered trademark of Intel Corporation.
LANSchool is a registered trademark of Lan Fan Technologies.
LaserJet is a registered trademark of Hewlett-Packard Company.
Macintosh is a registered trademark of Apple Computer, Inc.
Micro Channel is a registered trademark of International Business Machines
Corporation.
Micro House Technical Library is a trademark of Micro House International, Inc.

Microdyne is a trademark of Microdyne Corporation.
Micropolis is a registered trademark of Micropolis Corporation.
Microsoft and MS-DOS are registered trademarks of Microsoft Corporation.
NEC is a registered trademark of NEC Corporation.
NetBasic is a registered trademark of High Technology SoftWare Corporation
NetDirector is a registered trademark of UB Networks.
NetLens is a trademark of Telecommunications Techniques Corporation.
NetPort is a registered trademark of Intel Corporation.
NETPrint is a registered trademark of Digital Products, Inc.
Netscape and Netscape Navigator are registered trademarks of Netscape

Communications Corporation. Netscape Communicator and Netscape FastTrack
are trademarks of Netscape Communications Corporation.
NetView is a registered trademark of International Business Machines Corporation.
Network Driver Interface Specification and NDIS are trademarks of PC Plus
Communications LP.
NTT is a registered trademark of Nippon Telegraph and Telephone Corporation.
Ontrack Data Recovery is a trademark of Ontrack Data International, Inc.
OpenView is a registered trademark of Hewlett-Packard Company.
OS/2 is a registered trademark of International Business Machines Corporation.
Pentium is a registered trademark of Intel Corporation.
Persuasion is a registered trademark of Adobe Systems Incorporated.
PhoneNet is a registered trademark of Farallon Computing, Inc.
PostScript is a registered trademark of Adobe Systems Incorporated.
PowerPC is a trademark of International Business Machines Corporation.
PS/2 is a registered trademark of International Business Machines Corporation.
PSS is a registered trademark of British Telecom.
QEMM is a registered trademark and QEMM386 is a trademark of Quarterdeck
Office Systems.
Quantum is a registered trademark of Quantum Corporation.

SCSI Express is a registered trademark of Security Control Systems, Inc.
Seagate is a registered trademark of Seagate Technology, Inc.
SideKick is a registered trademark of Borland International, Inc.
SMC is a registered trademark of Standard Microsystems Corporation.
Sniffer is a trademark of Network General Corporation.
Software Shopper is a registered trademark of Falsoft, Inc.
SprintNet is a restered trademark of Sprint Communications Company L.P.
Stacker is a registered trademark of Stac Electronics.
Sun Microsystems is a registered trademark of Sun Microsystems, Inc.
SunNet Manager is a trademark of Sun Microsystems, Inc.
Support Group is a trademark of Support Group, Inc.
System 7 is a trademark of Apple Computer, Inc.
Total Recall is a registered trademark of Total Recall, Inc.
Transpac is a registered trademark of France Telecom Transpac.
TrueType is a registered trademark of Apple Computer, Inc.
Tymnet is a registered trademark of MCI Telecommunications Corporation.

UNIX is a registered trademark in the United States and other countries, licensed
exclusively through X/Open Company, Ltd.
UnixWare is a registered trademark of The Santa Cruz Operation, Inc. in the US and
other countries.
Windows and Windows NT are registered trademarks of Microsoft
Corporation.Windows 95 and Windows 98 are trademarks of Microsoft Corporation.
WordPerfect is a registered trademark of Corel Corporation Limited in the US and
other countries.
Xerox is a registered trademark of Xerox Corporation.
Yahoo! is a trademark of Yahoo!, Inc.
All other products not listed are the property of their respective owners.

Revision 1.0 This document should only be used by a Novell-certified instructor. IG TOC-ix

If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.

Contents

Contents

Section 7 TCP/IP Fundamentals

TCP/IP Fundamentals ...................................................................... IG 7-3
Objectives......................................................................................... IG 7-3
Exercise 7-1: Pre-Test...................................................................... IG 7-5
Describe the IP Address Structure ................................................... IG 7-9
Identify Network Classes ................................................................ IG 7-15
Address Types .......................................................................... IG 7-17
Special IP Addresses ................................................................ IG 7-21
Exercise 7-2: Binary to Decimal Conversion and Address
Classes........................................................................................... IG 7-23
Obtain a Registered IP Address ..................................................... IG 7-25
The Role of InterNIC ................................................................. IG 7-25
How to Contact IP Registries .................................................... IG 7-27
Managing Your Registered IP Addresses ................................. IG 7-29
Register a Domain Name ............................................................... IG 7-31
Applying for a Domain Name in the U.S.................................... IG 7-37
Applying for a Domain Name Outside the US ........................... IG 7-39
Assign Addresses to Hosts.............................................................IG 7-39
Addresses for Private Networks ................................................ IG 7-39
Describe How Host Names, Host Tables, and DNS Work ............. IG 7-41
Host Tables ............................................................................... IG 7-41
DNS Zones................................................................................ IG 7-43
Describe Windows Internet Name Services (WINS) ...................... IG 7-57

Describe How Ports are Used ........................................................ IG 7-59
Port Numbers Commonly Assigned to Services ....................... IG 7-59
Explain the Purpose of Subnets ..................................................... IG 7-61
Define a Subnet Mask .................................................................... IG 7-65
Creating the Subnet Address from the Subnet Mask ................ IG 7-69
Describe How Subnet Masks are Used.......................................... IG 7-71
Example 1: GAMES Unlimited .................................................. IG 7-75
Example 2: BJC Corporation..................................................... IG 7-79
Using Partial Bytes or Octets .................................................... IG 7-81
Example 3: Software, Inc. ......................................................... IG 7-87

IG TOC-x This document should only be used by a Novell-certified instructor. Revision 1.0
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.

The Novell Guide to Network + (Volume 1)

Assign Subnet Addresses ..............................................................IG 7-89
Plan for Growth ......................................................................... IG 7-91
Understand Subnets Using an Example ................................... IG 7-97
Exercise 7-3: Assigning and Managing IP Subnets......................IG 7-109
Exercise 7-4: Establishing Subnets .............................................. IG 7-115
Exercise 7-5: Planning your IP Network ....................................... IG 7-119
Exercise 7-6: Planning Your Network........................................... IG 7-121
Exercise 7-7: Post-Test ................................................................ IG 7-125
Summary ...................................................................................... IG 7-135

Section 8 The TCP/IP Protocol Suite and Utilities

The TCP/IP Protocol Suite and Utilities............................................ IG 8-3
Objectives......................................................................................... IG 8-3

Exercise 8-1: Pretest ........................................................................ IG 8-5
Identify the Components of the TCP/IP Protocol Suite as They
Relate to the OSI and DoD Models .................................................. IG 8-9
Routing IP.................................................................................. IG 8-15
Describe Distance Vector Routing with IP...................................... IG 8-19
Disadvantages of RIP and Distance Vector Routing................. IG 8-21
RIP II ......................................................................................... IG 8-29
Describe Link State Routing with IP ............................................... IG 8-31
Open Shortest Path First (OSPF).............................................. IG 8-31
OSPF Compared to RIP............................................................ IG 8-49
Exercise 8-2: Reviewing IP Routing ............................................... IG 8-51
List the Protocols That Comprise TCP/IP....................................... IG 8-55
Internet Layer Protocols ............................................................ IG 8-55
Internet Protocol (IP) ................................................................. IG 8-57
Internet Control Message Protocol (ICMP) ............................... IG 8-59
The Address Resolution Protocols: ARP and RARP or
BOOTP...................................................................................... IG 8-65
Dynamic Host Configuration Protocol (DHCP).......................... IG 8-71
Host-to-Host Layer Protocol ...................................................... IG 8-75
Process/Application Layer Protocol........................................... IG 8-79
Use Windows TCP/IP Utilities ........................................................ IG 8-89

Revision 1.0 This document should only be used by a Novell-certified instructor. IG TOC-xi
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.

Contents

Describe the IPX/SPX Protocol Suite and the OSI Reference
Model............................................................................................ IG 8-101
Purpose of IPX/SPX ................................................................ IG 8-103

IPX Network Address Elements .............................................. IG 8-105
Internetwork Packet Exchange Protocol (IPX) ........................ IG 8-109
Sequenced Packet Exchange Protocol (SPX) ........................ IG 8-111
Describe Routing with RIP/SAP ................................................... IG 8-113
Distance Vector Routing: IPX RIP and SAP............................ IG 8-113
Router Information Protocol (RIP) ........................................... IG 8-113
Service Advertising Protocol (SAP)......................................... IG 8-117
Describe the Utilities Used in a Windows NT Network ................. IG 8-125
NetBEUI Protocol .................................................................... IG 8-125
NWLink IPX/SPX Protocol....................................................... IG 8-127
Additional Protocols Included with Windows NT ..................... IG 8-129
Exercise 8-3: Post-Test ................................................................ IG 8-131
Summary ...................................................................................... IG 8-135

Section 9 Implementing the Network

Implementing the Network................................................................ IG 9-3
Objectives......................................................................................... IG 9-3
Exercise 9-1: Pre-Test...................................................................... IG 9-5
Plan the Network and Install the Network Cabling ........................... IG 9-7
Plan the Network ......................................................................... IG 9-7
Install Network Cabling................................................................ IG 9-9
Crimping Network Cables............................................................ IG 9-9
Exercise 9-2: Installing Network Cabling ........................................ IG 9-13
Install and Configure Network Interface Boards ............................. IG 9-17
Choosing the Board................................................................... IG 9-19
Understanding PC Architectures ............................................... IG 9-19
Identifying Configuration Information......................................... IG 9-31
Configuring the Network Board with Jumpers and DIP
Switches .................................................................................... IG 9-41

Installing the Board ................................................................... IG 9-45
Configuring the Network Board with Software........................... IG 9-45
Configuring Plug-n-Play Network Boards.................................. IG 9-51
Connecting to the Network ........................................................ IG 9-53
Exercise 9-3: Installing a 10BASE-T Ethernet Connection.............IG 9-55

IG TOC-xii This document should only be used by a Novell-certified instructor. Revision 1.0
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.

The Novell Guide to Network + (Volume 1)

Install and Configure Hard Disk Drives........................................... IG 9-59
Disk Interface Types.................................................................. IG 9-59
Hard Disk Tips .......................................................................... IG 9-63
Installing SCSI Hard Disks ........................................................ IG 9-65
Physically Installing the SCSI Disk............................................ IG 9-67
Exercise 9-4: Installing SCSI Hard Disks ....................................... IG 9-81
Installing IDE Hard Disks................................................................ IG 9-85
Step 1. Configuring and Installing the Controller Board ............ IG 9-85
Step 2. Configuring and Installing the IDE Disk ........................ IG 9-87
Step 3. Attaching Disk Cables................................................... IG 9-89
Step 4. Setting the CMOS Disk Type ........................................ IG 9-89
Step 5. Completing Controller Board and IDE Disk
Configuration ............................................................................. IG 9-93
Exercise 9-5: Installing IDE Hard Disks ......................................... IG 9-95
Prepare Hard Disks for Use............................................................ IG 9-99
Creating Partitions..................................................................... IG 9-99
Performing High-Level Formatting .......................................... IG 9-103
Tips for Formatting Hard Disks................................................ IG 9-103
Exercise 9-6: Preparing Hard Disks for Use................................. IG 9-105

Install Workstation Operating Systems......................................... IG 9-107
Exercise 9-7: Installing Windows 98............................................. IG 9-109
Install Network Client Software..................................................... IG 9-113
Types of Client Software ......................................................... IG 9-113
Loading Client Software and Protocols ................................... IG 9-115
Configuring Client Software and Protocols.............................. IG 9-119
Exercise 9-8: Configuring Client Software and Protocols............. IG 9-121
Exercise 9-9: Post-Test ................................................................ IG 9-123
Summary ...................................................................................... IG 9-127

Section 10 Security

Security...........................................................................................IG 10-3
Objectives....................................................................................... IG 10-3
Exercise 10-1: Pre-Test.................................................................. IG 10-5
Describe Network Security Models................................................. IG 10-9
Share-Level Security Model ...................................................... IG 10-9
User-Level Security Model ........................................................ IG 10-9

Revision 1.0 This document should only be used by a Novell-certified instructor. IG TOC-xiii
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.

Contents

List the Elements of Secure Password and User Account
Policies ......................................................................................... IG 10-11
Implementing a Password Security Policy .............................. IG 10-13
Implementing a User Account Security Policy......................... IG 10-15
Describe How Encryption Works .................................................. IG 10-19
Encryption Schemes ............................................................... IG 10-19

Digital Signatures .................................................................... IG 10-23
Describe How Firewalls Work....................................................... IG 10-25
Filtering by IP Address ............................................................ IG 10-25
Filtering by Port Number ......................................................... IG 10-25
Describe How Proxy Servers Work .............................................. IG 10-27
Exercise 10-2: Post-Test .............................................................. IG 10-29
Summary ...................................................................................... IG 10-35

Section 11 Implementing Remote Connectivity

Implementing Remote Connectivity................................................ IG 11-3
Objectives....................................................................................... IG 11-3
Exercise 11-1: Pre-Test.................................................................. IG 11-5
Explain the Capabilities and Requirements for Remote
Access ............................................................................................ IG 11-7
Network Services Available Anywhere...................................... IG 11-7
Limitations ................................................................................. IG 11-9
Implementing Remote Access................................................. IG 11-11
Evaluate the Current Network and User Environment..................IG 11-11
Selecting the Best Physical Server Locations ......................... IG 11-13
Determining Users and Services............................................. IG 11-13
Select an Appropriate Data Transmission Technology ................IG 11-15
ISDN........................................................................................ IG 11-15
POTS....................................................................................... IG 11-15
xDSL........................................................................................ IG 11-17
Selecting an Appropriate Data Transmission Technology ...... IG 11-19
Design a Secure Remote Access Solution................................... IG 11-21
Determining an Organizational Security Policy ....................... IG 11-21
Determining a Network Security Policy ................................... IG 11-23
Determining a Data-Level Security Policy ............................... IG 11-23

Isolating a Remote Access Server .......................................... IG 11-25
Special Security Concerns ...................................................... IG 11-27

IG TOC-xiv This document should only be used by a Novell-certified instructor. Revision 1.0
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.

The Novell Guide to Network + (Volume 1)

Design Optimal Performance in a Remote Access Solution ........ IG 11-27
Maximizing Client Performance............................................... IG 11-27
Maximizing Server Performance ............................................. IG 11-31
Configure Windows 95/98 or Windows NT clients for remote
access ..........................................................................................IG 11-31
Tasks to Configure a Remote Access Windows Client ........... IG 11-33
Exercise 11-2: Configuring Windows Workstations for Remote
Access .......................................................................................... IG 11-35
Connect Remotely to a Server Using a Modem-Equipped
Windows Client............................................................................. IG 11-49
Connecting a Remote Client ................................................... IG 11-49
Exercise 11-3: Making a Remote Connection ............................. IG 11-51
Exercise 11-4: Post-Test .............................................................. IG 11-55
Summary ...................................................................................... IG 11-59

Section 12 Maintaining the Network

Maintaining the Network ................................................................. IG 12-3
Objectives....................................................................................... IG 12-3
Exercise 12-1: Pre-Test.................................................................. IG 12-5
Choose a Backup Strategy............................................................. IG 12-7
Time Requirements for Completing a Backup........................... IG 12-9

Time Requirements for Restoring a Backup ........................... IG 12-13
Assigning Backup Responsibility............................................. IG 12-15
Exercise 12-2: Choosing a Backup Strategy ................................ IG 12-17
Describe Strategies for Anti-Virus Protection ............................... IG 12-19
Types of Viruses...................................................................... IG 12-19
Characteristics of Virus Infection............................................. IG 12-19
Preventing Virus Infection ....................................................... IG 12-21
Describe Uninterruptible Power Supplies (UPS) .......................... IG 12-23
Three Types of UPSs .............................................................. IG 12-23
Advantages of a UPS .............................................................. IG 12-25
Explain RAID and Define Each of its Levels.................................IG 12-27
Determining the Appropriate RAID Level ................................ IG 12-29
The Six Levels of RAID ........................................................... IG 12-29
Strategies, Benefits, and Drawbacks of RAID Levels ............. IG 12-33
Use Patches to Maintain Workstations and Servers .................... IG 12-39

Revision 1.0 This document should only be used by a Novell-certified instructor. IG TOC-xv
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.

Contents

Describe Disaster Recovery Options............................................ IG 12-41
Planning for a Disaster ............................................................ IG 12-41
Recovering from a Disaster..................................................... IG 12-41
Exercise 12-3: Post-Test .............................................................. IG 12-47
Summary ...................................................................................... IG 12-51

Section 13 Troubleshooting the Network

Troubleshooting the Network..........................................................IG 13-3

Objectives....................................................................................... IG 13-3
Exercise 13-1: Pre-Test.................................................................. IG 13-5
List and Describe Tasks Related to Providing Service and
Support on a Network..................................................................... IG 13-7
Describe the Six-Step Troubleshooting Model Used in this
Course ............................................................................................ IG 13-9
Step One: Try a Quick Fix ....................................................... IG 13-11
Step Two: Gather Basic Information ....................................... IG 13-15
Step Three: Develop a Plan to Isolate the Problem ................ IG 13-15
Step Four: Execute the Plan ................................................... IG 13-17
Step Five: Ensure User Satisfaction........................................ IG 13-19
Step Six: Document the Solution and Take Steps to Avoid
or Prepare for Recurrence....................................................... IG 13-19
Describe Record-Keeping Practices.............................................IG 13-21
Components of the LAN System ............................................. IG 13-21
History of the LAN ................................................................... IG 13-23
Resources Used with the LAN ................................................ IG 13-25
Exercise 13-2: Understanding the Basic Principles of Service
and Support .................................................................................. IG 13-27
Troubleshoot Network and Workstation Problems ....................... IG 13-29
Using Troubleshooting Tools................................................... IG 13-29
Describe the Tools that Are Commonly Used to Resolve
Network Equipment Problems ..................................................... IG 13-45
Crossover cable ..................................................................... IG 13-45
Hardware Loopback ............................................................... IG 13-47
Tone Generator ...................................................................... IG 13-47
Tone Locator (Fox and Hound) .............................................. IG 13-47
Documentation Sources ......................................................... IG 13-49

IG TOC-xvi This document should only be used by a Novell-certified instructor. Revision 1.0

If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.

The Novell Guide to Network + (Volume 1)

Exercise 13-3: Troubleshooting Skills Practice ............................ IG 13-51
Exercise 13-4: Post-Test .............................................................. IG 13-53
Summary ...................................................................................... IG 13-57

Appendix A

Answers to Exercises ........................................................................... A-1

Appendix B

IEEE 802.5 Token Ring Frame Formats .............................................. B-1

Appendix C

Installing NetWare 5 ............................................................................. C-1

TCP/IP Fundamentals
Revision 1.0 This document should only be used by a Novell-certified instructor. IG 7-1
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.

0

SECTION 7

TCP/IP Fundamentals


Duration

03:00

Preparation

None

1

The Novell Guide to Network + (Volume 2)
IG 7-2 This document should only be used by a Novell-certified instructor. Revision 1.0
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.

0
0

SECTION 7

TCP/IP Fundamentals

In this section you learn how to obtain a registered IP address and
domain name. You also learn the function of host names, host tables, the
Domain Name System (DNS), WINS and subnets.

Objectives

Upon completing this section, you should be able to
1. Describe the IP address structure.
2. Identify network classes.

3. Obtain a registered IP address.
4. Register a domain name.
5. Assign addresses to hosts.
6. Describe how host names, host tables, and DNS work.
7. Describe Windows Internet Name Services (WINS).
8. Describe how ports are used.
9. Explain the purpose of subnets.
10. Define a subnet mask.
11. Describe how subnet masks are used.
12. Assign subnet addresses.

7-1

TCP/IP Fundamentals

NotesPresentation

Revision 1.0 This document should only be used by a Novell-certified instructor. IG 7-3
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.

TCP/IP Fundamentals
Objectives



Introduce the section.



Present the section

objectives.

The Novell Guide to Network + (Volume 2)
IG 7-4 This document should only be used by a Novell-certified instructor. Revision 1.0
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.

0
0

Exercise 7-1: Pre-Test

Answer the following questions. Don’t be alarmed if you don’t know the
answer. These questions help you assess your knowledge prior to
beginning this section.
1. How many bits compose an IPv4 address?
________________________________
2. What is the function of a host table?
a. It registers host names.
b. It registers domain names.
c. It maintains IP routing information.
d. It resolves host names to IP addresses.
3. What does every node on the DNS tree represent?
a. A root
b. A zone
c. A domain
d. An individual host
4. What service provides dynamic registration and resolution of
NetBIOS names to addresses?
________________________________
5. Which IPv4 address classes can be assigned for use by hosts on a

network? (Choose three.)
a. Class A
b. Class B
c. Class C
d. Class D
e. Class E
6. List an IP registry that manages IP address allocation.
________________________________

7-2

TCP/IP Fundamentals

NotesPresentation

Revision 1.0 This document should only be used by a Novell-certified instructor. IG 7-5
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.

Exercise 7-1: Pre-Test



Introduce the exercise.

:10
a

Conduct the exercise.

Assist students as necessary.


The Novell Guide to Network + (Volume 2)
IG 7-6 This document should only be used by a Novell-certified instructor. Revision 1.0
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.

0
0

7. What is the function of DNS?
a. It registers Internet domain names.
b. It resolves domain names to IP addresses.
c. It builds and maintains domain routing tables.
d. It dynamically assigns IP addresses to network hosts.
8. Why might a network administrator create subnets? (Choose three.)
a. To improve security
b. To simplify routing
c. To reduce congestion
d. To provide full-duplex communication
e. To increase the number of hosts on the network

(End of Exercise)

7-3

TCP/IP Fundamentals

NotesPresentation

Revision 1.0 This document should only be used by a Novell-certified instructor. IG 7-7
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.


Exercise 7-1: Pre-Test

(continued)



Review the exercise and
discuss the answers.

Answers:
1. 32 bits.
2. d. It resolves host names to IP addresses
3. c. A domain
4. Windows Internet Name Service (WINS)
5. a. Class A
b. Class B
c. Class C
6. ARIN, RIPE, APNIC, InterNIC
7. b. It resolves domain names to IP addresses
8. a. To improve security
b. To reduce conjestion
e. To increase the number of hosts on the network

The Novell Guide to Network + (Volume 2)
IG 7-8 This document should only be used by a Novell-certified instructor. Revision 1.0
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.

0
0


Describe the IP Address
Structure

An IP address occupies 32 bits and includes both a network ID and a
host ID.
A

host

refers to either a workstation or a server. A host is also referred to
as a node or station.
Routers locate hosts on the Internet based on their assigned IP
addresses.
The IP address of a host consists of four bytes divided into two parts:



A network address (varying from one to three bytes)



A node or station address (varying from one to three bytes)

Figure 7-1: TCP/IP Addressing
132 132
132 132
87 176
87 176
Network:

Node:
IP Address:
IP network: 132.132.0.0
Node 87.176
IP Address:
• Four bytes long
• Identify IP network and node
• First byte determines class

7-4

TCP/IP Fundamentals

NotesPresentation

Revision 1.0 This document should only be used by a Novell-certified instructor. IG 7-9
If you think this document was pirated, call 1-800-PIRATES or 1-801-861-7101.

Describe the IP Address
Structure



Discuss the IP address
structure.
d

7-1 (Figure 7-1: TCP/IP
Addressing)

×