Muutke küpsiste eelistusi

Internet Infrastructure: Networking, Web Services, and Cloud Computing [Pehme köide]

(Northern Kentucky University, Highland Heights, USA), (Department of Computer Science, Northern Kentucky University)
  • Formaat: Paperback / softback, 612 pages, kõrgus x laius: 254x178 mm, kaal: 2650 g
  • Ilmumisaeg: 30-Jun-2020
  • Kirjastus: CRC Press
  • ISBN-10: 0367572796
  • ISBN-13: 9780367572792
Teised raamatud teemal:
  • Formaat: Paperback / softback, 612 pages, kõrgus x laius: 254x178 mm, kaal: 2650 g
  • Ilmumisaeg: 30-Jun-2020
  • Kirjastus: CRC Press
  • ISBN-10: 0367572796
  • ISBN-13: 9780367572792
Teised raamatud teemal:
Internet Infrastructure: Networking, Web Services, and Cloud Computing provides a comprehensive introduction to networks and the Internet from several perspectives: the underlying media, the protocols, the hardware, the servers, and their uses. The material in the text is divided into concept chapters that are followed up with case study chapters that examine how to install, configure, and secure a server that offers the given service discussed.





The book covers in detail the Bind DNS name server, the Apache web server, and the Squid proxy server. It also provides background on those servers by discussing DNS, DHCP, HTTP, HTTPS, digital certificates and encryption, web caches, and the variety of protocols that support web caching.





Introductory networking content, as well as advanced Internet content, is also included in chapters on networks, LANs and WANs, TCP/IP, TCP/IP tools, cloud computing, and an examination of the Amazon Cloud Service.





Online resources include supplementary content that is available via the textbooks companion website, as well useful resources for faculty and students alike, including: a complete lab manual; power point notes, for installing, configuring, securing and experimenting with many of the servers discussed in the text; power point notes; animation tutorials to illustrate some of the concepts; two appendices; and complete input/output listings for the example Amazon cloud operations covered in the book.
Acknowledgments xv
Preface xvii
Authors xix
Chapter 1 An Introduction to Networks 1(42)
1.1 Network Communication
1(12)
1.1.1 Network Devices
2(3)
1.1.2 Servers
5(2)
1.1.3 Network Media
7(4)
1.1.4 Network Hardware
11(2)
1.2 Types of Networks
13(4)
1.2.1 Network Topology
13(3)
1.2.2 Classifications of Networks
16(1)
1.3 Network Protocols
17(7)
1.3.1 Transmission Control Protocol/Internet Protocol
18(1)
1.3.2 Open Systems Interconnection
19(3)
1.3.3 Bluetooth
22(1)
1.3.4 Frame Relay
23(1)
1.4 Ethernet
24(2)
1.5 The Internet: An Introduction
26(13)
1.5.1 What Is a Network Address?
26(2)
1.5.2 Error Handling
28(4)
1.5.3 Encryption Technologies
32(4)
1.5.4 The Firewall
36(1)
1.5.5 Network Caches
37(2)
1.6
Chapter Review
39(1)
Review Questions
39(1)
Review Problems
40(1)
Discussion Questions
41(2)
Chapter 2 Case Study: Building Local Area Networks 43(38)
2.1 Introduction
43(2)
2.2 Ethernet
45(8)
2.2.1 Ethernet at the Physical Layer
45(4)
2.2.2 Ethernet Data Link Layer Specifications
49(2)
2.2.3 Building an Ethernet Local Area Network
51(2)
2.3 Wireless Local Area Networks
53(18)
2.3.1 Wireless Local Area Network Topologies and Associations
54(3)
2.3.2 Wireless Local Area Network Standards
57(2)
2.3.3 Wireless Hardware Devices
59(3)
2.3.4 Wireless Local Area Network Frames
62(3)
2.3.5 Setting Up a Wireless Local Area Network
65(3)
2.3.6 Related Technologies
68(3)
2.4 Securing Your Local Area Network
71(4)
2.5 Virtual Private Networks
75(2)
2.6
Chapter Review
77(1)
Review Questions
78(1)
Review Problems
78(1)
Discussion Questions
79(2)
Chapter 3 Transmission Control Protocol/Internet Protocol 81(44)
3.1 Introduction
81(1)
3.2 Application Layer
82(12)
3.2.1 File Transfer Protocol
83(2)
3.2.2 Dynamic Host Configuration Protocol
85(2)
3.2.3 Secure Sockets Layer and Transport Layer Security
87(4)
3.2.4 Email Protocols
91(2)
3.2.5 Secure Shell and Telnet
93(1)
3.3 Transport Layer
94(8)
3.3.1 Transmission Control Protocol Handshake and Connections
95(1)
3.3.2 Datagrams: Transmission Control Protocol, User Datagram Protocol, and Others
96(5)
3.3.3 Flow Control and Multiplexing
101(1)
3.4 Internet Layer
102(16)
3.4.1 Internet Protocol Version 4 and Internet Protocol Version 6 Addresses
102(5)
3.4.2 Internet Protocol Version 4 Packets
107(2)
3.4.3 Internet Protocol Version 6 Addresses
109(3)
3.4.4 Establishing Internet Protocol Addresses: Statically and Dynamically
112(2)
3.4.5 Internet Control Message Protocol and Internet Group Management Protocol
114(2)
3.4.6 Network Address Translation
116(2)
3.5 Link Layer
118(3)
3.6
Chapter Review
121(1)
Review Questions
121(1)
Review Problems
122(1)
Discussion Questions
123(2)
Chapter 4 Case Study: Transmission Control Protocol/Internet Protocol Tools 125(36)
4.1 Packet Capture Programs
125(12)
4.1.1 Wireshark
126(10)
4.1.2 tcpdump
136(1)
4.2 Netcat
137(4)
4.3 Linux/Unix Network Programs
141(11)
4.3.1 The Linux/Unix ip Command
142(1)
4.3.2 Other Noteworthy Network Resources
143(6)
4.3.3 Logging Programs
149(3)
4.4 Domain Name System Commands
152(4)
4.5 Base64 Encoding
156(2)
4.6
Chapter Review
158(1)
Review Questions
158(1)
Review Problems
159(1)
Discussion Questions
160(1)
Chapter 5 Domain Name System 161(58)
5.1 Domain Name System Infrastructure
162(24)
5.1.1 Domain Name System Client
162(5)
5.1.2 Domain Name System Server
167(11)
5.1.3 Domain Name System Databases
178(8)
5.2 Domain Name System Protocol
186(3)
5.3 Domain Name System Performance
189(22)
5.3.1 Client-Side Domain Name System Caching
191(3)
5.3.2 Server-Side Domain Name System Caching
194(2)
5.3.3 Domain Name System Prefetching
196(2)
5.3.4 Load Balancing and Domain Name System-Based Load Balancing
198(11)
5.3.5 Client-Side Domain Name System versus Server-Side Domain Name System Load Balancing
209(2)
5.4 Domain Name System-Based Content Distribution Networks
211(2)
5.5 Domain Name System-Based Spam Prevention
213(2)
5.6
Chapter Review
215(1)
Review Questions
215(1)
Review Problems
216(1)
Discussion Questions
217(2)
Chapter 6 Case Study: BIND and DHCP 219(42)
6.1 Bind
219(24)
6.1.1 Installing BIND
219(2)
6.1.2 Configuring BIND
221(7)
6.1.3 Running the BIND Server
228(1)
6.1.4 The rndc Utility
229(1)
6.1.5 Simple BIND Configuration Example
230(5)
6.1.6 Master and Slave BIND Configuration Example
235(2)
6.1.7 Configuring Caching-Only and Forwarding DNS Servers
237(6)
6.2 Dynamic Internet Protocol Addressing
243(9)
6.2.1 Dynamic Host Configuration Protocol
243(2)
6.2.2 ISC DHCP Server
245(6)
6.2.3 Integrating the ISC DHCP Server with the BIND DNS Server
251(1)
6.3 Configuring Dnssec for a Bind Server
252(4)
6.4
Chapter Review
256(1)
Review Questions
257(1)
Review Problems
258(1)
Discussion Questions
259(2)
Chapter 7 Introduction to Web Servers 261(46)
7.1 Hypertext Transfer Protocol
262(10)
7.1.1 How Hypertext Transfer Protocol Works
262(4)
7.1.2 Hypertext Transfer Protocol Request and Response Messages
266(5)
7.1.3 Cookies
271(1)
7.2 Hypertext Transfer Protocol Secure and Building Digital Certificates
272(4)
7.3 HTTP/2
276(5)
7.4 Content Negotiation
281(4)
7.4.1 Language Negotiation
282(1)
7.4.2 Other Forms of Negotiation
283(2)
7.5 Server-Side Includes and Scripts
285(5)
7.5.1 Uses of Common Gateway Interface
286(1)
7.5.2 Server-Side Includes
286(2)
7.5.3 Server-Side Scripts
288(2)
7.6 Other Web Server Features
290(6)
7.6.1 Virtual Hosts
290(1)
7.6.2 Cache Control
291(1)
7.6.3 Authentication
292(1)
7.6.4 Filtering
293(1)
7.6.5 Forms of Redirection
294(2)
7.7 Web Server Concerns
296(8)
7.7.1 Backend Databases
297(2)
7.7.2 Web Server Security
299(3)
7.7.3 Load Balancing
302(2)
7.8
Chapter Review
304(1)
Review Questions
304(1)
Review Problems
305(1)
Discussion Questions
306(1)
Chapter 8 Case Study: The Apache Web Server 307(66)
8.1 Installing and Running Apache
307(5)
8.1.1 Installing an Apache Executable
307(1)
8.1.2 Installing Apache from Source Code
308(3)
8.1.3 Running Apache
311(1)
8.2 Basic Apache Configuration
312(19)
8.2.1 Loading Modules
313(2)
8.2.2 Server Directives
315(5)
8.2.3 Directory Containers
320(5)
8.2.4 Access Files
325(1)
8.2.5 Other Containers
326(3)
8.2.6 Handlers
329(2)
8.3 Modules
331(2)
8.4 Advanced Configuration
333(12)
8.4.1 Logging
333(4)
8.4.2 Content Negotiation
337(4)
8.4.3 Filters
341(2)
8.4.4 Authentication and Handling Hypertext Transfer Protocol Secure
343(2)
8.5 Other Useful Apache Features
345(12)
8.5.1 Spell Checking
345(1)
8.5.2 Controlling Headers
346(3)
8.5.3 Virtual Hosts
349(3)
8.5.4 Indexes Options
352(2)
8.5.5 Controlling Caching
354(1)
8.5.6 Efficiency Considerations
355(2)
8.6 Redirection and Rewrite Rules
357(4)
8.7 Executing Server-Side Scripts in Apache
361(6)
8.8
Chapter Review
367(1)
Review Questions
367(2)
Review Problems
369(1)
Discussion Questions
370(3)
Chapter 9 Web Caching 373(38)
9.1 Introduction to the Cache
374(3)
9.2 Cache Strategies
377(6)
9.2.1 Cache Replacement Strategies
377(3)
9.2.2 Cache Consistency
380(3)
9.3 Cooperative Caching
383(5)
9.4 Establishing a Web Proxy
388(10)
9.4.1 Manual Proxy Setup
389(1)
9.4.2 Proxy Auto Configuration
390(1)
9.4.3 Web Cache Communication Protocol Interception
391(7)
9.5 Dynamic Proxy Caching Techniques
398(7)
9.5.1 Caching Partial Content of Dynamic Pages
398(2)
9.5.2 Dynamic Content Caching Protocol
400(3)
9.5.3 Internet Content Adaptation Protocol
403(1)
9.5.4 Database Query Result Caching
404(1)
9.6
Chapter Review
405(1)
Review Questions
405(1)
Review Problems
406(3)
Discussion Questions
409(2)
Chapter 10 Case Study: The Squid Proxy Server 411(42)
10.1 Introduction to Squid
412(1)
10.2 Installing and Running Squid
412(4)
10.3 Basic Squid Configuration
416(4)
10.4 The Squid Caches
420(5)
10.4.1 Squid File System Types
420(2)
10.4.2 Configuring Squid Caches
422(3)
10.5 Squid Neighbors
425(9)
10.6 Access Control in Squid
434(7)
10.6.1 The acl Directive
435(2)
10.6.2 Example acl Statements
437(2)
10.6.3 Access Control Directives
439(2)
10.7 Other Squid Features
441(8)
10.7.1 Squid Log Files
441(4)
10.7.2 Redirection
445(2)
10.7.3 Authentication Helpers
447(2)
10.8
Chapter Review
449(1)
Review Questions
449(1)
Review Problems
450(1)
Discussion Problems
451(2)
Chapter 11 Cloud Computing 453(44)
11.1 Web System Qualities
454(8)
11.1.1 Performance
454(4)
11.1.2 Availability
458(4)
11.2 Mechanisms to Ensure Availability
462(7)
11.2.1 Redundant Array of Independent Disks
462(4)
11.2.2 Redundant Array of Independent Network Interfaces
466(2)
11.2.3 High-Availability Clustering
468(1)
11.3 Scalability
469(5)
11.3.1 Vertical Scaling
470(1)
11.3.2 Horizontal Scaling
471(1)
11.3.3 Auto Scaling
472(2)
11.4 Cloud Computing
474(7)
11.4.1 Cloud Characteristics
474(4)
11.4.2 Cloud Deployment Models
478(3)
11.5 Virtualization
481(7)
11.5.1 Compute Virtualization
481(1)
11.5.2 Storage Virtualization
482(5)
11.5.3 Network Virtualization
487(1)
11.6 Web Services
488(3)
11.7
Chapter Review
491(1)
Review Questions
492(1)
Review Problems
493(2)
Discussion Questions
495(2)
Chapter 12 Case Study: Amazon Web Services 497(94)
12.1 Amazon Web Service Infrastructure
497(3)
12.1.1 Global Infrastructure
497(1)
12.1.2 Foundation Services
497(2)
12.1.3 Platform Services
499(1)
12.2 Using Amazon Web Service
500(3)
12.2.1 Using Amazon Web Service through the Graphical User Interface
500(1)
12.2.2 Using the Amazon Web Service Command Line Interface
501(2)
12.3 Compute Service: Elastic Compute Cloud
503(23)
12.3.1 Elastic Compute Cloud Concepts
503(3)
12.3.2 Building a Virtual Server in the Cloud
506(6)
12.3.3 Elastic Compute Cloud Storage Service
512(14)
12.4 Amazon Web Service Network Service
526(15)
12.4.1 Virtual Private Cloud
526(5)
12.4.2 Route 53
531(10)
12.5 Cloudwatch, Simple Notification Service, and Elastic Load Balancer
541(8)
12.6 Establishing Scalability
549(3)
12.7 Performance
552(11)
12.7.1 ElastiCache
553(7)
12.7.2 CloudFront
560(3)
12.8 Security
563(7)
12.9 Platform Services
570(7)
12.9.1 Email through Simple Email Service
570(4)
12.9.2 Relational Database Service
574(3)
12.10 Deployment and Logging
577(8)
12.10.1 CloudFormation
577(6)
12.10.2 CloudTrail
583(2)
12.11
Chapter Review
585(1)
Review Questions
585(2)
Review Problems
587(4)
Bibliography 591(8)
Index 599
Richard Fox is a professor of computer science at Northern Kentucky University (NKU) who regularly teaches courses in both computer science and computer information technology, Dr. Fox, who has been at NKU since 2001, is the current chair of NKUs University Curriculum Committee. Prior to NKU, Dr. Fox taught for 9 years at the University of Texas Pan American. He has received two Teaching Excellence awards, from the University of Texas Pan American in 2000 and from Northern Kentucky University in 2012, and NKUs University Service award in 2016. This is Dr. Foxs third textbook. He is also author or co-author of over 50 peer reviewed research articles, primarily in the area of Artificial Intelligence.





Wei Hao is an Associate Professor of Computer Science at Northern Kentucky University (NKU). He came to NKU in August 2008 from Cisco Systems in San Jose, California, where he worked as a software engineer. He also worked for Motorola and Alcatel, where he co-invented a patent.





Wei has 38 peer-reviewed publications in scholarly journals and conference proceedings. His research interests include Web Technologies, Cloud Computing, and Mobile Computing. He won the Faculty Excellent Performance in Scholarly or Creative Activity Award from NKU in 2012. Dr. Hao teaches a wide variety of undergraduate and graduate courses in computer science and computer information technology.