About the Authors |
|
iii | |
Preface |
|
v | |
|
|
1 | (25) |
|
Chapter 1 Introduction to Data Communications |
|
|
1 | (25) |
|
|
1 | (3) |
|
1.2 Data Communications Networks |
|
|
4 | (3) |
|
1.2.1 Components of a Network |
|
|
4 | (2) |
|
|
6 | (1) |
|
|
7 | (6) |
|
1.3.1 Open Systems Interconnection Reference Model |
|
|
8 | (1) |
|
|
9 | (1) |
|
1.3.3 Message Transmission Using Layers |
|
|
10 | (3) |
|
|
13 | (3) |
|
1.4.1 The Importance of Standards |
|
|
13 | (1) |
|
1.4.2 The Standards-Making Process |
|
|
13 | (3) |
|
|
16 | (1) |
|
|
16 | (2) |
|
1.5.1 Wireless LAN and BYOD |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
1.6 Implications for Management |
|
|
18 | (8) |
|
PART TWO FUNDAMENTAL CONCEPTS |
|
|
26 | (140) |
|
Chapter 2 Application Layer |
|
|
26 | (34) |
|
|
26 | (1) |
|
2.2 Application Architectures |
|
|
27 | (9) |
|
2.2.1 Host-Based Architectures |
|
|
28 | (1) |
|
2.2.2 Client-Based Architectures |
|
|
28 | (1) |
|
2.2.3 Client-Server Architectures |
|
|
29 | (3) |
|
2.2.4 Cloud Computing Architectures |
|
|
32 | (2) |
|
2.2.5 Peer-to-Peer Architectures |
|
|
34 | (1) |
|
2.2.6 Choosing Architectures |
|
|
35 | (1) |
|
|
36 | (3) |
|
|
36 | (1) |
|
2.3.2 Inside an HTTP Request |
|
|
37 | (1) |
|
2.3.3 Inside an HTTP Response |
|
|
38 | (1) |
|
|
39 | (5) |
|
|
40 | (3) |
|
2.4.2 Inside an SMTP Packet |
|
|
43 | (1) |
|
2.4.3 Attachments in Multipurpose Internet Mail Extension |
|
|
43 | (1) |
|
|
44 | (4) |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
46 | (2) |
|
2.6 Implications for Management |
|
|
48 | (12) |
|
|
60 | (32) |
|
|
60 | (2) |
|
|
62 | (4) |
|
3.2.1 Circuit Configuration |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
64 | (2) |
|
|
66 | (6) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
67 | (2) |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
3.4 Digital Transmission of Digital Data |
|
|
72 | (4) |
|
|
72 | (1) |
|
|
73 | (1) |
|
3.4.3 Digital Transmission |
|
|
74 | (1) |
|
3.4.4 How Ethernet Transmits Data |
|
|
75 | (1) |
|
3.5 Analog Transmission of Digital Data |
|
|
76 | (4) |
|
|
77 | (2) |
|
3.5.2 Capacity of a Circuit |
|
|
79 | (1) |
|
3.5.3 How Modems Transmit Data |
|
|
80 | (1) |
|
3.6 Digital Transmission of Analog Data |
|
|
80 | (4) |
|
3.6.1 Translating from Analog to Digital |
|
|
80 | (1) |
|
3.6.2 How Telephones Transmit Voice Data |
|
|
81 | (2) |
|
3.6.3 How Instant Messenger Transmits Voice Data |
|
|
83 | (1) |
|
3.6.4 Voice over Internet Protocol (VoIP) |
|
|
83 | (1) |
|
3.7 Implications for Management |
|
|
84 | (8) |
|
Chapter 4 Data Link Layer |
|
|
92 | (24) |
|
|
92 | (1) |
|
|
93 | (2) |
|
|
93 | (1) |
|
|
93 | (1) |
|
4.2.3 Relative Performance |
|
|
94 | (1) |
|
|
95 | (8) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
4.3.4 Error Correction via Retransmission |
|
|
99 | (3) |
|
4.3.5 Forward Error Correction |
|
|
102 | (1) |
|
4.3.6 Error Control in Practice |
|
|
102 | (1) |
|
|
103 | (4) |
|
4.4.1 Asynchronous Transmission |
|
|
103 | (1) |
|
4.4.2 Synchronous Transmission |
|
|
104 | (3) |
|
4.5 Transmission Efficiency |
|
|
107 | (2) |
|
4.6 Implications for Management |
|
|
109 | (7) |
|
Chapter 5 Network and Transport Layers |
|
|
116 | (50) |
|
|
116 | (2) |
|
5.2 Transport and Network Layer Protocols |
|
|
118 | (2) |
|
5.2.1 Transmission Control Protocol (TCP) |
|
|
118 | (1) |
|
5.2.2 Internet Protocol (IP) |
|
|
119 | (1) |
|
5.3 Transport Layer Functions |
|
|
120 | (4) |
|
5.3.1 Linking to the Application Layer |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
122 | (2) |
|
|
124 | (8) |
|
5.4.1 Assigning Addresses |
|
|
124 | (6) |
|
|
130 | (2) |
|
|
132 | (8) |
|
|
134 | (1) |
|
|
135 | (2) |
|
|
137 | (1) |
|
5.5.4 The Anatomy of a Router |
|
|
138 | (2) |
|
|
140 | (7) |
|
5.6.1 Known Addresses, Same Subnet |
|
|
140 | (3) |
|
5.6.2 Known Addresses, Different Subnet |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
144 | (1) |
|
5.6.5 TCP/IP and Network Layers |
|
|
145 | (2) |
|
5.7 Implications for Management |
|
|
147 | (19) |
|
PART THREE NETWORK TECHNOLOGIES |
|
|
166 | (130) |
|
|
166 | (18) |
|
|
166 | (5) |
|
6.1.1 Network Architecture Components |
|
|
166 | (2) |
|
6.1.2 The Traditional Network Design Process |
|
|
168 | (1) |
|
6.1.3 The Building-Block Network Design Process |
|
|
169 | (2) |
|
|
171 | (4) |
|
6.2.1 Network Architecture Component |
|
|
172 | (1) |
|
6.2.2 Application Systems |
|
|
173 | (1) |
|
|
173 | (1) |
|
6.2.4 Categorizing Network Needs |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
175 | (3) |
|
6.3.1 Designing Clients and Servers |
|
|
175 | (1) |
|
|
175 | (2) |
|
6.3.3 Network Design Tools |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
178 | (2) |
|
6.4.1 Request for Proposal |
|
|
178 | (1) |
|
6.4.2 Selling the Proposal to Management |
|
|
179 | (1) |
|
|
180 | (1) |
|
6.5 Implications for Management |
|
|
180 | (4) |
|
Chapter 7 Wired and Wireless Local Area Networks |
|
|
184 | (38) |
|
|
184 | (1) |
|
|
185 | (6) |
|
7.2.1 Network Interface Cards |
|
|
186 | (1) |
|
|
186 | (1) |
|
7.2.3 Network Hubs, Switches, and Access Points |
|
|
187 | (3) |
|
7.2.4 Network Operating Systems |
|
|
190 | (1) |
|
|
191 | (5) |
|
|
191 | (3) |
|
7.3.2 Media Access Control |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
196 | (5) |
|
|
196 | (1) |
|
7.4.2 Media Access Control |
|
|
196 | (1) |
|
7.4.3 Wireless Ethernet Frame Layout |
|
|
197 | (1) |
|
7.4.4 Types of Wireless Ethernet |
|
|
198 | (1) |
|
|
199 | (2) |
|
7.5 The Best Practice LAN Design |
|
|
201 | (7) |
|
7.5.1 Designing User Access with Wired Ethernet |
|
|
202 | (1) |
|
7.5.2 Designing User Access with Wireless Ethernet |
|
|
202 | (2) |
|
7.5.3 Designing the Data Center |
|
|
204 | (2) |
|
7.5.4 Designing the e-Commerce Edge |
|
|
206 | (1) |
|
7.5.5 Designing the SOHO Environment |
|
|
207 | (1) |
|
7.6 Improving LAN Performance |
|
|
208 | (3) |
|
7.6.1 Improving Server Performance |
|
|
209 | (1) |
|
7.6.2 Improving Circuit Capacity |
|
|
210 | (1) |
|
7.6.3 Reducing Network Demand |
|
|
211 | (1) |
|
7.7 Implications for Management |
|
|
211 | (11) |
|
Chapter 8 Backbone Networks |
|
|
222 | (23) |
|
|
222 | (1) |
|
|
223 | (3) |
|
|
226 | (3) |
|
|
229 | (5) |
|
8.5 The Best Practice Backbone Design |
|
|
234 | (2) |
|
8.6 Improving Backbone Performance |
|
|
236 | (1) |
|
8.6.1 Improving Device Performance |
|
|
236 | (1) |
|
8.6.2 Improving Circuit Capacity |
|
|
236 | (1) |
|
8.6.3 Reducing Network Demand |
|
|
236 | (1) |
|
8.7 Implications for Management |
|
|
237 | (8) |
|
Chapter 9 Wide Area Networks |
|
|
245 | (31) |
|
|
245 | (1) |
|
9.2 Dedicated-Circuit Networks |
|
|
246 | (5) |
|
|
246 | (3) |
|
|
249 | (2) |
|
|
251 | (1) |
|
9.3 Packet-Switched Networks |
|
|
251 | (6) |
|
|
252 | (1) |
|
9.3.2 Frame Relay Services |
|
|
253 | (1) |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
9.4 Virtual Private Networks |
|
|
257 | (4) |
|
|
257 | (1) |
|
|
258 | (1) |
|
|
258 | (3) |
|
9.5 The Best Practice WAN Design |
|
|
261 | (1) |
|
9.6 Improving WAN Performance |
|
|
262 | (2) |
|
9.6.1 Improving Device Performance |
|
|
262 | (1) |
|
9.6.2 Improving Circuit Capacity |
|
|
263 | (1) |
|
9.6.3 Reducing Network Demand |
|
|
263 | (1) |
|
9.7 Implications for Management |
|
|
264 | (12) |
|
|
276 | (20) |
|
|
276 | (1) |
|
10.2 How the Internet Works |
|
|
277 | (4) |
|
10.2.1 Basic Architecture |
|
|
277 | (2) |
|
10.2.2 Connecting to an ISP |
|
|
279 | (1) |
|
10.2.3 The Internet Today |
|
|
280 | (1) |
|
10.3 Internet Access Technologies |
|
|
281 | (5) |
|
10.3.1 Digital Subscriber Line (DSL) |
|
|
281 | (2) |
|
|
283 | (2) |
|
|
285 | (1) |
|
|
285 | (1) |
|
10.4 The Future of the Internet |
|
|
286 | (3) |
|
10.4.1 Internet Governance |
|
|
286 | (1) |
|
10.4.2 Building the Future |
|
|
287 | (2) |
|
10.5 Implications for Management |
|
|
289 | (7) |
|
PART FOUR NETWORK MANAGEMENT |
|
|
296 | (93) |
|
Chapter 11 Network Security |
|
|
296 | (57) |
|
|
296 | (5) |
|
11.1.1 Why Networks Need Security |
|
|
298 | (1) |
|
11.1.2 Types of Security Threats |
|
|
298 | (2) |
|
|
300 | (1) |
|
|
301 | (7) |
|
11.2.1 Develop risk measurement criteria |
|
|
301 | (1) |
|
11.2.2 Inventory IT assets |
|
|
302 | (2) |
|
|
304 | (3) |
|
11.2.4 Document Existing Controls |
|
|
307 | (1) |
|
11.2.5 Identify Improvements |
|
|
308 | (1) |
|
11.3 Ensuring Business Continuity |
|
|
308 | (10) |
|
|
309 | (1) |
|
11.3.2 Denial of Service Protection |
|
|
310 | (3) |
|
|
313 | (1) |
|
11.3.4 Device Failure Protection |
|
|
313 | (1) |
|
11.3.5 Disaster Protection |
|
|
314 | (4) |
|
11.4 Intrusion Prevention |
|
|
318 | (24) |
|
|
319 | (1) |
|
11.4.2 Perimeter Security and Firewalls |
|
|
319 | (6) |
|
11.4.3 Server and Client Protection |
|
|
325 | (4) |
|
|
329 | (6) |
|
11.4.5 User Authentication |
|
|
335 | (3) |
|
11.4.6 Preventing Social Engineering |
|
|
338 | (1) |
|
11.4.7 Intrusion Prevention Systems |
|
|
339 | (2) |
|
11.4.8 Intrusion Recovery |
|
|
341 | (1) |
|
11.5 Best Practice Recommendations |
|
|
342 | (2) |
|
11.6 Implications for Management |
|
|
344 | (9) |
|
Chapter 12 Network Management |
|
|
353 | (36) |
|
|
353 | (2) |
|
12.2 Designing for Network Performance |
|
|
355 | (8) |
|
|
355 | (4) |
|
12.2.2 Managing Network Traffic |
|
|
359 | (1) |
|
12.2.3 Reducing Network Traffic |
|
|
360 | (3) |
|
12.3 Configuration Management |
|
|
363 | (3) |
|
12.3.1 Configuring the Network and Client Computers |
|
|
363 | (2) |
|
12.3.2 Documenting the Configuration |
|
|
365 | (1) |
|
12.4 Performance and Fault Management |
|
|
366 | (7) |
|
12.4.1 Network Monitoring |
|
|
366 | (2) |
|
12.4.2 Failure Control Function |
|
|
368 | (2) |
|
12.4.3 Performance and Failure Statistics |
|
|
370 | (3) |
|
12.4.4 Improving Performance |
|
|
373 | (1) |
|
|
373 | (2) |
|
12.5.1 Resolving Problems |
|
|
373 | (2) |
|
12.5.2 Providing End User Training |
|
|
375 | (1) |
|
|
375 | (5) |
|
|
375 | (3) |
|
|
378 | (2) |
|
12.7 Implications for Management |
|
|
380 | (9) |
Index |
|
389 | |