About the Authors |
|
v | |
Preface |
|
vi | |
|
|
1 | (26) |
|
Chapter 1 Introduction to Data Communications |
|
|
1 | (26) |
|
|
1 | (4) |
|
1.2 Data Communications Networks |
|
|
5 | (3) |
|
1.2.1 Components of a Network |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
8 | (6) |
|
1.3.1 Open Systems Interconnection Reference Model |
|
|
9 | (1) |
|
|
10 | (2) |
|
1.3.3 Message Transmission Using Layers |
|
|
12 | (2) |
|
|
14 | (4) |
|
1.4.1 The Importance of Standards |
|
|
14 | (1) |
|
1.4.2 The Standards-Making Process |
|
|
15 | (2) |
|
|
17 | (1) |
|
|
18 | (2) |
|
1.5.1 Wireless LAN and BYOD |
|
|
18 | (1) |
|
1.5.2 The Internet of Things |
|
|
18 | (1) |
|
|
19 | (1) |
|
1.6 Implications for Cyber Security |
|
|
20 | (7) |
|
PART TWO FUNDAMENTAL CONCEPTS |
|
|
27 | (135) |
|
Chapter 2 Application Layer |
|
|
27 | (32) |
|
|
27 | (1) |
|
2.2 Application Architectures |
|
|
28 | (9) |
|
2.2.1 Host-Based Architectures |
|
|
29 | (1) |
|
2.2.2 Client-Based Architectures |
|
|
30 | (1) |
|
2.2.3 Client-Server Architectures |
|
|
30 | (3) |
|
2.2.4 Cloud Computing Architectures |
|
|
33 | (2) |
|
2.2.5 Peer-to-Peer Architectures |
|
|
35 | (1) |
|
2.2.6 Choosing Architectures |
|
|
36 | (1) |
|
|
37 | (4) |
|
|
37 | (1) |
|
2.3.2 Inside an HTTP Request |
|
|
38 | (1) |
|
2.3.3 Inside an HTTP Response |
|
|
39 | (2) |
|
|
41 | (4) |
|
|
41 | (3) |
|
2.4.2 Inside an SMTP Packet |
|
|
44 | (1) |
|
2.4.3 Attachments in Multipurpose Internet Mail Extension |
|
|
45 | (1) |
|
|
45 | (3) |
|
|
46 | (1) |
|
|
47 | (1) |
|
2.6 Implications for Cyber Security |
|
|
48 | (11) |
|
|
59 | (32) |
|
|
59 | (2) |
|
|
61 | (4) |
|
3.2.1 Circuit Configuration |
|
|
61 | (1) |
|
|
62 | (1) |
|
|
62 | (3) |
|
|
65 | (6) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
68 | (2) |
|
|
70 | (1) |
|
3.4 Digital Transmission of Digital Data |
|
|
71 | (4) |
|
|
71 | (1) |
|
|
72 | (1) |
|
3.4.3 Digital Transmission |
|
|
73 | (1) |
|
3.4.4 How Ethernet Transmits Data |
|
|
74 | (1) |
|
3.5 Analog Transmission of Digital Data |
|
|
75 | (4) |
|
|
75 | (3) |
|
3.5.2 Capacity of a Circuit |
|
|
78 | (1) |
|
3.5.3 How Modems Transmit Data |
|
|
78 | (1) |
|
3.6 Digital Transmission of Analog Data |
|
|
79 | (4) |
|
3.6.1 Translating from Analog to Digital |
|
|
79 | (1) |
|
3.6.2 How Telephones Transmit Voice Data |
|
|
80 | (1) |
|
3.6.3 How Instant Messenger Transmits Voice Data |
|
|
81 | (1) |
|
3.6.4 Voice over Internet Protocol (VoIP) |
|
|
82 | (1) |
|
3.7 Implications for Cyber Security |
|
|
83 | (8) |
|
Chapter 4 Data Link Layer |
|
|
91 | (23) |
|
|
91 | (1) |
|
|
92 | (2) |
|
|
92 | (1) |
|
|
92 | (1) |
|
4.2.3 Relative Performance |
|
|
93 | (1) |
|
|
94 | (6) |
|
|
94 | (2) |
|
|
96 | (1) |
|
|
97 | (1) |
|
4.3.4 Error Correction via Retransmission |
|
|
98 | (1) |
|
4.3.5 Forward Error Correction |
|
|
98 | (1) |
|
4.3.6 Error Control in Practice |
|
|
99 | (1) |
|
|
100 | (4) |
|
4.4.1 Asynchronous Transmission |
|
|
101 | (1) |
|
4.4.2 Synchronous Transmission |
|
|
101 | (3) |
|
4.5 Transmission Efficiency |
|
|
104 | (2) |
|
4.6 Implications for Cyber Security |
|
|
106 | (8) |
|
Chapter 5 Network and Transport Layers |
|
|
114 | (48) |
|
|
114 | (2) |
|
5.2 Transport and Network Layer Protocols |
|
|
116 | (2) |
|
5.2.1 Transmission Control Protocol (TCP) |
|
|
116 | (1) |
|
5.2.2 Internet Protocol (IP) |
|
|
117 | (1) |
|
5.3 Transport Layer Functions |
|
|
118 | (5) |
|
5.3.1 Linking to the Application Layer |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
120 | (3) |
|
|
123 | (8) |
|
5.4.1 Assigning Addresses |
|
|
124 | (5) |
|
|
129 | (2) |
|
|
131 | (7) |
|
|
132 | (2) |
|
|
134 | (2) |
|
|
136 | (1) |
|
5.5.4 The Anatomy of a Router |
|
|
137 | (1) |
|
|
138 | (7) |
|
|
140 | (1) |
|
|
141 | (1) |
|
|
142 | (1) |
|
5.6.4 TCP/IP and Network Layers |
|
|
143 | (2) |
|
5.7 Implications for Cyber Security |
|
|
145 | (17) |
|
PART THREE NETWORK TECHNOLOGIES |
|
|
162 | (130) |
|
|
162 | (20) |
|
|
162 | (4) |
|
6.1.1 Network Architecture Components |
|
|
163 | (1) |
|
6.1.2 The Traditional Network Design Process |
|
|
164 | (2) |
|
6.1.3 The Building-Block Network Design Process |
|
|
166 | (1) |
|
|
166 | (5) |
|
6.2.1 Network Architecture Component |
|
|
168 | (1) |
|
6.2.2 Application Systems |
|
|
169 | (1) |
|
|
169 | (1) |
|
6.2.4 Categorizing Network Needs |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
171 | (3) |
|
6.3.1 Designing Clients and Servers |
|
|
171 | (1) |
|
|
171 | (3) |
|
6.3.3 Network Design Tools |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
174 | (2) |
|
6.4.1 Request for Proposal |
|
|
175 | (1) |
|
6.4.2 Selling the Proposal to Management |
|
|
175 | (1) |
|
|
176 | (1) |
|
6.5 Implications for Cyber Security |
|
|
176 | (6) |
|
Chapter 7 Wired and Wireless Local Area Networks |
|
|
182 | (38) |
|
|
182 | (1) |
|
|
183 | (6) |
|
7.2.1 Network Interface Cards |
|
|
183 | (1) |
|
|
184 | (1) |
|
7.2.3 Network Hubs, Switches, and Access Points |
|
|
185 | (3) |
|
7.2.4 Network Operating Systems |
|
|
188 | (1) |
|
|
189 | (5) |
|
|
190 | (2) |
|
7.3.2 Media Access Control |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
194 | (5) |
|
|
194 | (1) |
|
7.4.2 Media Access Control |
|
|
194 | (2) |
|
7.4.3 Wireless Ethernet Frame Layout |
|
|
196 | (1) |
|
7.4.4 Types of Wireless Ethernet |
|
|
196 | (2) |
|
|
198 | (1) |
|
7.5 The Best Practice LAN Design |
|
|
199 | (8) |
|
7.5.1 Designing User Access with Wired Ethernet |
|
|
200 | (1) |
|
7.5.2 Designing User Access with Wireless Ethernet |
|
|
200 | (3) |
|
7.5.3 Designing the Data Center |
|
|
203 | (3) |
|
7.5.4 Designing the e-Commerce Edge |
|
|
206 | (1) |
|
7.5.5 Designing the SOHO Environment |
|
|
206 | (1) |
|
7.6 Improving LAN Performance |
|
|
207 | (3) |
|
7.6.1 Improving Server Performance |
|
|
208 | (2) |
|
7.6.2 Improving Circuit Capacity |
|
|
210 | (1) |
|
7.6.3 Reducing Network Demand |
|
|
210 | (1) |
|
7.7 Implications for Cyber Security |
|
|
210 | (10) |
|
Chapter 8 Backbone Networks |
|
|
220 | (23) |
|
|
220 | (1) |
|
|
221 | (3) |
|
|
224 | (3) |
|
|
227 | (5) |
|
|
227 | (2) |
|
|
229 | (3) |
|
8.5 The Best Practice Backbone Design |
|
|
232 | (1) |
|
8.6 Improving Backbone Performance |
|
|
233 | (1) |
|
8.6.1 Improving Device Performance |
|
|
233 | (1) |
|
8.6.2 Improving Circuit Capacity |
|
|
234 | (1) |
|
8.6.3 Reducing Network Demand |
|
|
234 | (1) |
|
8.7 Implications for Cyber Security |
|
|
234 | (9) |
|
Chapter 9 Wide Area Networks |
|
|
243 | (31) |
|
|
243 | (1) |
|
9.2 Dedicated-Circuit Networks |
|
|
244 | (6) |
|
|
245 | (3) |
|
|
248 | (1) |
|
|
249 | (1) |
|
9.3 Packet-Switched Networks |
|
|
250 | (4) |
|
|
250 | (1) |
|
9.3.2 Frame Relay Services |
|
|
251 | (1) |
|
|
252 | (1) |
|
|
252 | (2) |
|
9.4 Virtual Private Networks |
|
|
254 | (4) |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
256 | (2) |
|
9.5 The Best Practice WAN Design |
|
|
258 | (3) |
|
9.5.1 Software Defined WAN |
|
|
258 | (1) |
|
9.5.2 Choosing WAN Circuits |
|
|
259 | (2) |
|
9.6 Improving WAN Performance |
|
|
261 | (1) |
|
9.6.1 Improving Device Performance |
|
|
261 | (1) |
|
9.6.2 Improving Circuit Capacity |
|
|
261 | (1) |
|
9.6.3 Reducing Network Demand |
|
|
262 | (1) |
|
9.7 Implications for Cyber Security |
|
|
262 | (12) |
|
|
274 | (18) |
|
|
274 | (1) |
|
10.2 How the Internet Works |
|
|
275 | (4) |
|
10.2.1 Basic Architecture |
|
|
275 | (2) |
|
10.2.2 Connecting to an ISP |
|
|
277 | (1) |
|
10.2.3 The Internet Today |
|
|
278 | (1) |
|
10.3 Internet Access Technologies |
|
|
279 | (4) |
|
10.3.1 Digital Subscriber Line |
|
|
279 | (1) |
|
|
280 | (2) |
|
|
282 | (1) |
|
10.4 The Future of the Internet |
|
|
283 | (2) |
|
10.4.1 Internet Governance |
|
|
283 | (1) |
|
10.4.2 Building the Future |
|
|
284 | (1) |
|
10.5 Implications for Cyber Security |
|
|
285 | (7) |
|
PART FOUR NETWORK MANAGEMENT |
|
|
292 | |
|
Chapter 11 Network Security |
|
|
292 | (60) |
|
|
292 | (4) |
|
11.1.1 Why Networks Need Security |
|
|
294 | (1) |
|
11.1.2 Types of Security Threats |
|
|
294 | (1) |
|
|
295 | (1) |
|
|
296 | (8) |
|
11.2.1 Develop Risk Measurement Criteria |
|
|
297 | (1) |
|
11.2.2 Inventory IT Assets |
|
|
298 | (1) |
|
|
299 | (2) |
|
11.2.4 Document Existing Controls |
|
|
301 | (3) |
|
11.2.5 Identify Improvements |
|
|
304 | (1) |
|
11.3 Ensuring Business Continuity |
|
|
304 | (9) |
|
|
304 | (1) |
|
11.3.2 Denial-of-Service Protection |
|
|
305 | (3) |
|
|
308 | (1) |
|
11.3.4 Device Failure Protection |
|
|
309 | (1) |
|
11.3.5 Disaster Protection |
|
|
310 | (3) |
|
11.4 Intrusion Prevention |
|
|
313 | (23) |
|
|
314 | (1) |
|
11.4.2 Perimeter Security and Firewalls |
|
|
314 | (6) |
|
11.4.3 Server and Client Protection |
|
|
320 | (3) |
|
|
323 | (6) |
|
11.4.5 User Authentication |
|
|
329 | (3) |
|
11.4.6 Preventing Social Engineering |
|
|
332 | (1) |
|
11.4.7 Intrusion Prevention Systems |
|
|
333 | (2) |
|
11.4.8 Intrusion Recovery |
|
|
335 | (1) |
|
11.5 Best Practice Recommendations |
|
|
336 | (2) |
|
11.6 Implications for Your Cyber Security |
|
|
338 | (14) |
|
Chapter 12 Network Management |
|
|
352 | |
|
|
352 | (1) |
|
12.2 Designing for Network Performance |
|
|
353 | (8) |
|
|
353 | (4) |
|
12.2.2 Managing Network Traffic |
|
|
357 | (1) |
|
12.2.3 Reducing Network Traffic |
|
|
358 | (3) |
|
12.3 Configuration Management |
|
|
361 | (3) |
|
12.3.1 Configuring the Network and Client Computers |
|
|
361 | (1) |
|
12.3.2 Documenting the Configuration |
|
|
362 | (2) |
|
12.4 Performance and Fault Management |
|
|
364 | (7) |
|
12.4.1 Network Monitoring |
|
|
364 | (2) |
|
12.4.2 Failure Control Function |
|
|
366 | (2) |
|
12.4.3 Performance and Failure Statistics |
|
|
368 | (2) |
|
12.4.4 Improving Performance |
|
|
370 | (1) |
|
|
371 | (2) |
|
12.5.1 Resolving Problems |
|
|
371 | (1) |
|
12.5.2 Providing End User Training |
|
|
372 | (1) |
|
|
373 | (4) |
|
|
373 | (2) |
|
|
375 | (2) |
|
12.7 Implications for Cyber Security |
|
|
377 | |
Appendices (Online) |
|
Glossary (Online) |
|
Index |
|
1 | |