Foreword |
|
xv | |
Acknowledgments |
|
xvii | |
|
|
1 | (114) |
|
Chapter 1 What Is a Network? |
|
|
3 | (18) |
|
Defining the Modern Network |
|
|
3 | (2) |
|
|
5 | (1) |
|
|
5 | (3) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
8 | (5) |
|
|
9 | (1) |
|
|
10 | (2) |
|
|
12 | (1) |
|
|
13 | (3) |
|
Client-Server Architecture |
|
|
14 | (1) |
|
Peer-to-Peer Architecture |
|
|
15 | (1) |
|
|
16 | (1) |
|
Network Standards and Organizations |
|
|
16 | (1) |
|
|
17 | (4) |
|
|
18 | (1) |
|
|
19 | (2) |
|
Chapter 2 Layers of a Network |
|
|
21 | (30) |
|
|
21 | (4) |
|
|
22 | (3) |
|
Physical Layer Transmission Media |
|
|
25 | (6) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
28 | (3) |
|
Common Transmission Media Problems |
|
|
31 | (1) |
|
The Physical Layer and Networked AV Systems |
|
|
31 | (12) |
|
|
33 | (7) |
|
|
40 | (3) |
|
Long-Distance Communication Media |
|
|
43 | (2) |
|
Data Link Layers and Networked AV |
|
|
45 | (2) |
|
|
45 | (1) |
|
Why Pro AV Needs Its Own Protocols |
|
|
46 | (1) |
|
|
47 | (4) |
|
|
48 | (1) |
|
|
49 | (2) |
|
Chapter 3 Bandwidth, Encoding, and Transport |
|
|
51 | (14) |
|
|
51 | (3) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
54 | (6) |
|
Analog-to-Digital Encoding |
|
|
54 | (4) |
|
Encoding Digital Signals for Transmission |
|
|
58 | (2) |
|
|
60 | (1) |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
61 | (4) |
|
|
61 | (2) |
|
|
63 | (2) |
|
Chapter 4 Network Building Blocks |
|
|
65 | (26) |
|
|
65 | (6) |
|
|
67 | (2) |
|
|
69 | (1) |
|
NIC Card and MAC Addresses |
|
|
70 | (1) |
|
Network Operating Systems |
|
|
71 | (5) |
|
|
71 | (3) |
|
|
74 | (2) |
|
|
76 | (8) |
|
|
77 | (1) |
|
|
78 | (2) |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
82 | (1) |
|
Network Time Protocol Server |
|
|
83 | (1) |
|
|
84 | (2) |
|
|
84 | (2) |
|
|
86 | (1) |
|
|
86 | (5) |
|
|
87 | (2) |
|
|
89 | (2) |
|
Chapter 5 Designing a Network for AV Systems |
|
|
91 | (24) |
|
|
91 | (6) |
|
The Network Needs Analysis |
|
|
93 | (2) |
|
The Customer Is Not Always Right |
|
|
95 | (1) |
|
|
96 | (1) |
|
Physical and Logical Design |
|
|
97 | (4) |
|
|
97 | (2) |
|
Planning Structured Cabling |
|
|
99 | (1) |
|
|
99 | (2) |
|
Electrical and HVAC Considerations |
|
|
101 | (1) |
|
|
101 | (4) |
|
Risk-Management Frameworks |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
103 | (1) |
|
Confidentiality, Integrity, and Availability |
|
|
103 | (2) |
|
|
105 | (3) |
|
|
105 | (1) |
|
|
105 | (1) |
|
Differentiated Service Categories |
|
|
106 | (2) |
|
|
108 | (2) |
|
|
108 | (2) |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
110 | (5) |
|
|
111 | (2) |
|
|
113 | (2) |
|
PART II Networking for AV |
|
|
115 | (86) |
|
Chapter 6 Ethernet, AVB, and More |
|
|
117 | (20) |
|
|
117 | (1) |
|
|
118 | (5) |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
123 | (1) |
|
Audio Video Bridging (AVB) |
|
|
123 | (4) |
|
Ethernet Requirements and Capabilities |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
127 | (1) |
|
Ethernet Requirements and Capabilities |
|
|
127 | (1) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
Ethernet Requirements and Capabilities |
|
|
128 | (1) |
|
CobraNet Topologies and Latency |
|
|
129 | (1) |
|
|
129 | (1) |
|
Ethernet Requirements and Capabilities |
|
|
129 | (1) |
|
Dante Topologies and Latency |
|
|
130 | (1) |
|
|
130 | (2) |
|
Ethernet Requirements and Capabilities |
|
|
131 | (1) |
|
Q-Sys Topologies and Latency |
|
|
131 | (1) |
|
|
132 | (5) |
|
|
132 | (2) |
|
|
134 | (3) |
|
Chapter 7 Network Addressing |
|
|
137 | (34) |
|
|
137 | (7) |
|
Address Resolution Protocol |
|
|
138 | (1) |
|
|
139 | (4) |
|
Internet Control Messaging Protocol (ICMP) |
|
|
143 | (1) |
|
|
144 | (3) |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
147 | (3) |
|
|
147 | (1) |
|
Network Classes and Classless Interdomain Routing |
|
|
148 | (2) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
151 | (5) |
|
|
151 | (1) |
|
|
151 | (3) |
|
|
154 | (1) |
|
|
154 | (2) |
|
|
156 | (1) |
|
|
156 | (2) |
|
Dynamic Host Configuration Protocol |
|
|
157 | (1) |
|
|
158 | (6) |
|
|
158 | (1) |
|
|
159 | (5) |
|
|
164 | (7) |
|
|
165 | (4) |
|
|
169 | (2) |
|
Chapter 8 Subnetting: Networking AV Devices Together |
|
|
171 | (16) |
|
|
171 | (3) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
174 | (3) |
|
|
174 | (1) |
|
|
175 | (1) |
|
Subnetting within an Organization |
|
|
176 | (1) |
|
Calculating IPv4 Subnets: CIDR Notation |
|
|
177 | (1) |
|
Calculating IPv4 Subnets: Dot-Decimal Notation |
|
|
178 | (1) |
|
Calculating Hosts on IPv4 Subnets |
|
|
179 | (2) |
|
Determining Subnets for IPv4 Addresses |
|
|
181 | (1) |
|
|
181 | (3) |
|
|
182 | (1) |
|
Calculating Subnets for IPv6 Networks |
|
|
182 | (1) |
|
Calculating Hosts on IPv6 Subnets |
|
|
183 | (1) |
|
|
184 | (3) |
|
|
184 | (2) |
|
|
186 | (1) |
|
Chapter 9 Protocols, Ports, and Documenting AV Devices and Protocols |
|
|
187 | (14) |
|
Transport Layer Protocols |
|
|
187 | (4) |
|
|
188 | (1) |
|
|
189 | (2) |
|
|
191 | (1) |
|
|
192 | (1) |
|
Identifying Protocols and Ports |
|
|
193 | (4) |
|
Networked Device Inventory |
|
|
195 | (2) |
|
|
197 | (4) |
|
|
198 | (2) |
|
|
200 | (1) |
|
PART III Networked AV Applications |
|
|
201 | (110) |
|
Chapter 10 Audio and Video Streaming |
|
|
203 | (108) |
|
Streaming AV Needs Analysis |
|
|
203 | (5) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
Using Copyrighted Content |
|
|
206 | (1) |
|
Cheat Sheet: Streaming Needs Analysis Questions |
|
|
207 | (1) |
|
Streaming Media and the Networking Environment |
|
|
208 | (93) |
|
|
209 | (1) |
|
Bandwidth: Matching Content to the Network |
|
|
209 | (2) |
|
Streaming and Quality of Service |
|
|
211 | (1) |
|
|
211 | (1) |
|
Network Policies and Restrictions |
|
|
212 | (1) |
|
Cheat Sheet: Streaming Network Analysis Questions |
|
|
212 | (86) |
|
Remote Management and Monitoring Access and Reporting Methods |
|
|
298 | (1) |
|
Alarm Notification and Response Plan |
|
|
299 | (1) |
|
Required Ports and Protocols |
|
|
300 | (1) |
|
Scoping Remote Management and Monitoring System |
|
|
301 | (7) |
|
Determine What Data to Monitor |
|
|
303 | (2) |
|
|
305 | (1) |
|
Determine Data Retention and Redundancy Requirements |
|
|
305 | (2) |
|
Implications of Cloud-Based Monitoring |
|
|
307 | (1) |
|
|
308 | (3) |
|
|
308 | (2) |
|
|
310 | (1) |
|
PART IV Ensuring Exceptional AV Experiences |
|
|
311 | (74) |
|
Chapter 14 Service-Level Agreements |
|
|
313 | (20) |
|
Get Acquainted with Service-Level Agreements |
|
|
313 | (6) |
|
|
315 | (2) |
|
|
317 | (1) |
|
Types of Service-Level Agreement |
|
|
317 | (2) |
|
Discovering SLA Requirements |
|
|
319 | (7) |
|
The AV Pro's Role in an SLA |
|
|
321 | (1) |
|
Components of a Service-Level Agreement |
|
|
322 | (1) |
|
|
323 | (3) |
|
Areas of AV Focus in an SLA |
|
|
326 | (4) |
|
|
327 | (1) |
|
|
327 | (1) |
|
|
328 | (1) |
|
|
329 | (1) |
|
|
330 | (3) |
|
|
330 | (1) |
|
|
331 | (2) |
|
Chapter 15 Network Security |
|
|
333 | (26) |
|
Vulnerabilities and Threats |
|
|
333 | (4) |
|
|
334 | (1) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
337 | (3) |
|
|
337 | (1) |
|
|
337 | (1) |
|
|
338 | (2) |
|
|
340 | (6) |
|
|
340 | (3) |
|
Application Layer Gateways and Session Border Controllers |
|
|
343 | (2) |
|
Third-Party Security Tools |
|
|
345 | (1) |
|
|
346 | (2) |
|
|
347 | (1) |
|
User Authentication Protocols |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
348 | (2) |
|
Secure Sockets Layer and Transport Layer Security |
|
|
349 | (1) |
|
Secure Shell and Secure Copy Protocol |
|
|
350 | (1) |
|
Virtual Private Networking |
|
|
350 | (1) |
|
|
351 | (2) |
|
Weak Wireless Security Measures |
|
|
352 | (1) |
|
Wireless Security Protocols |
|
|
352 | (1) |
|
|
353 | (6) |
|
|
354 | (3) |
|
|
357 | (2) |
|
Chapter 16 Troubleshooting Networked AV Systems |
|
|
359 | (26) |
|
Troubleshooting Methodology |
|
|
359 | (4) |
|
Symptom Recognition and Elaboration |
|
|
360 | (1) |
|
Listing and Localizing Faulty Functions |
|
|
361 | (2) |
|
|
363 | (1) |
|
Network Infrastructure Troubleshooting Tools |
|
|
363 | (5) |
|
|
364 | (1) |
|
|
364 | (1) |
|
Optical Time-Domain Reflectometer |
|
|
365 | (1) |
|
Wireless Network Tester/Analyzer |
|
|
366 | (1) |
|
|
366 | (1) |
|
Network Protocol Analyzer |
|
|
367 | (1) |
|
Troubleshooting with TCP/IP Utilities |
|
|
368 | (8) |
|
|
369 | (1) |
|
|
370 | (3) |
|
|
373 | (1) |
|
|
373 | (2) |
|
Address Resolution Protocol Command Tool |
|
|
375 | (1) |
|
|
376 | (1) |
|
Troubleshooting Windows NT and UNIX-Based Operating Systems |
|
|
376 | (2) |
|
|
378 | (2) |
|
Maintaining System Software |
|
|
378 | (2) |
|
Maintaining System Hardware |
|
|
380 | (1) |
|
|
380 | (5) |
|
|
381 | (2) |
|
|
383 | (2) |
|
Appendix Networked AV Systems Project |
|
|
385 | (18) |
|
Project Expectations and Requirements |
|
|
386 | (1) |
|
|
387 | (1) |
|
Networked Device Inventory/Ports and Protocols |
|
|
388 | (2) |
|
Network Topology/Addressing/Subnetting |
|
|
390 | (1) |
|
|
391 | (1) |
|
|
391 | (5) |
|
|
396 | (1) |
|
Videoconferencing/Firewall Strategy |
|
|
396 | (1) |
|
Secure Remote Management and Monitoring Requirements |
|
|
396 | (1) |
|
|
397 | (6) |
Glossary |
|
403 | (10) |
Index |
|
413 | |