viii Contents
Domain Name Server ............................................................................................ B-10
IP Configuration by DHCP .....................................................................................B-11
Internet Security and Firewalls .....................................................................................B-11
What is a Firewall? .................................................................................................B-11
Stateful Packet Inspection ..................................................................................... B-12
Denial of Service Attack ........................................................................................ B-12
Ethernet Cabling .......................................................................................................... B-13
Uplink Switches and Crossover Cables ................................................................ B-13
Cable Quality ......................................................................................................... B-14
Appendix C
Preparing Your Network
Preparing Your Computers for TCP/IP Networking ....................................................... C-1
Configuring Windows 95, 98, and Me for TCP/IP Networking ....................................... C-2
Install or Verify Windows Networking Components ................................................. C-2
Enabling DHCP to Automatically Configure TCP/IP Settings ................................. C-4
Selecting Windows’ Internet Access Method .......................................................... C-6
Verifying TCP/IP Properties .................................................................................... C-6
Configuring Windows NT4, 2000 or XP for IP Networking ............................................ C-7
Configuring the Macintosh for TCP/IP Networking ...................................................... C-15
Verifying the Readiness of Your Internet Account ....................................................... C-18
Are Login Protocols Used? ................................................................................... C-18
What Is Your Configuration Information? .............................................................. C-18
Obtaining ISP Configuration Information for Windows Computers ....................... C-19
Obtaining ISP Configuration Information for Macintosh Computers ..................... C-20
Restarting the Network ................................................................................................ C-21
Glossary
Index