Preface for Teachers |
|
xxiii | |
Preface for Students |
|
xxxi | |
|
An Introduction To Networking |
|
|
1 | (76) |
|
|
1 | (4) |
|
|
2 | (2) |
|
Internal Corporate Network Applications |
|
|
4 | (1) |
|
Data Communications and Telecommunications |
|
|
4 | (1) |
|
|
5 | (7) |
|
The Nine Elements of a Network |
|
|
5 | (1) |
|
Client Computers, Server Computers, and Applications |
|
|
6 | (1) |
|
Frames and Packet Switching |
|
|
6 | (1) |
|
|
7 | (1) |
|
Access Lines, Trunk Lines, and Multiplexing |
|
|
8 | (1) |
|
|
9 | (1) |
|
How to Talk About Network Costs |
|
|
9 | (3) |
|
|
12 | (6) |
|
The First Bank of Paradise |
|
|
12 | (1) |
|
The Bank's Major Buildings |
|
|
12 | (2) |
|
Wide Area Networks (WANs) |
|
|
14 | (1) |
|
Local Area Networks (LANs) |
|
|
15 | (2) |
|
LAN and WAN Transmission Costs and Speeds |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (15) |
|
|
21 | (2) |
|
|
23 | (1) |
|
|
24 | (4) |
|
|
28 | (2) |
|
|
30 | (1) |
|
|
30 | (3) |
|
|
33 | (3) |
|
|
34 | (1) |
|
|
35 | (1) |
|
Cryptographic Protections |
|
|
35 | (1) |
|
|
36 | (6) |
|
|
36 | (6) |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
44 | (1) |
|
Access Router and Cable Modem |
|
|
44 | (2) |
|
|
44 | (1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
46 | (1) |
|
Network Interface Cards (NICs) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
Wires, Connectors, and Jacks |
|
|
47 | (2) |
|
|
47 | (1) |
|
RJ-45 Connectors and Jacks |
|
|
48 | (1) |
|
|
49 | (1) |
|
The Access Router's Functions |
|
|
49 | (4) |
|
The Access Router's Ethernet Switch |
|
|
49 | (1) |
|
The Access Router's Router Function |
|
|
50 | (1) |
|
The Access Router's DHCP Server |
|
|
50 | (1) |
|
The Access Router's Network Address Translation (NAT) Function |
|
|
51 | (2) |
|
Adding Wireless Transmission |
|
|
53 | (2) |
|
|
53 | (1) |
|
Access Router/Wireless Access Point Alternatives |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
Reflections on Peer-to-Peer Networks Versus Dedicated Servers |
|
|
55 | (3) |
|
|
55 | (2) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
Setting Up an Internet Connection |
|
|
60 | (3) |
|
|
60 | (1) |
|
|
61 | (2) |
|
Allowing Peer-to-Peer Directory and File Sharing |
|
|
63 | (5) |
|
Network Setup Wizard: Welcome to the Network Setup Wizard |
|
|
63 | (1) |
|
Network Setup Wizard: Before You Begin |
|
|
63 | (1) |
|
Network Setup Wizard: Select a Connection Method |
|
|
63 | (3) |
|
Network Setup Wizard: Your Computer Has Multiple Connections |
|
|
66 | (1) |
|
Network Setup Wizard: Give This Computer a Description and Name |
|
|
66 | (1) |
|
New Connection Wizard: Name Your Network |
|
|
66 | (1) |
|
Network Setup Wizard: Ready to Apply Network Settings |
|
|
67 | (1) |
|
Network Setup Wizard: Finish |
|
|
68 | (1) |
|
|
68 | (2) |
|
|
68 | (1) |
|
Shared Documents (SharedDocs) |
|
|
68 | (1) |
|
Weak Security in Simple File Sharing |
|
|
69 | (1) |
|
Sharing Additional Directories |
|
|
70 | (2) |
|
Run the Network Setup Wizard |
|
|
70 | (1) |
|
Select Another Directory You Wish to Share |
|
|
70 | (1) |
|
In the Directory's Properties Dialog Box |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
72 | (5) |
|
Making a Printer Available for Sharing |
|
|
72 | (1) |
|
|
73 | (4) |
|
Case Study: XTR Consulting: A SOHO Network with Dedicated Servers |
|
|
77 | (17) |
|
|
77 | (2) |
|
|
79 | (2) |
|
|
79 | (1) |
|
|
79 | (2) |
|
|
81 | (1) |
|
|
81 | (6) |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
82 | (2) |
|
Network Operating Systems (NOSs) for PC Servers |
|
|
84 | (3) |
|
XTR: The Initial Situation |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
88 | (5) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
Network Interface Card (NIC) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
92 | (1) |
|
Remote Access Service (RAS) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
94 | (46) |
|
|
94 | (1) |
|
Standards Govern the Exchange of Messages |
|
|
95 | (5) |
|
Message Semantics (Meaning) |
|
|
96 | (1) |
|
|
96 | (2) |
|
General Message Organization |
|
|
98 | (1) |
|
Fields in Headers and Trailers |
|
|
99 | (1) |
|
Reliability and Connections |
|
|
100 | (4) |
|
|
100 | (2) |
|
Connection-Oriented and Connectionless Protocols |
|
|
102 | (2) |
|
Connectionless and Unreliable Protocols Dominate |
|
|
104 | (1) |
|
Layered Standards Architectures |
|
|
104 | (7) |
|
|
104 | (2) |
|
Layer 1 and Layer 2 Standards for Single Networks (LANs and WANs) |
|
|
106 | (1) |
|
|
107 | (1) |
|
Standards for Internet Transmission |
|
|
108 | (2) |
|
Standards for Applications |
|
|
110 | (1) |
|
Why Layered Architectures? |
|
|
111 | (2) |
|
Breaking Up Large Tasks into Smaller Tasks |
|
|
111 | (1) |
|
Specialization in Standards Design |
|
|
111 | (1) |
|
Simplification in Standards Design |
|
|
112 | (1) |
|
If You Change a Standard at One Layer, You Do Not Have to Change Standards at Other Layers |
|
|
112 | (1) |
|
Layers 1 (Physical) and 2 (Data Link) in Ethernet |
|
|
113 | (2) |
|
Ethernet Physical Layer Standards |
|
|
113 | (1) |
|
|
113 | (2) |
|
|
115 | (1) |
|
Layer 3: The Internet Protocol (IP) |
|
|
115 | (3) |
|
|
115 | (1) |
|
|
116 | (2) |
|
|
118 | (1) |
|
Layer 4: The Transport Layer |
|
|
118 | (3) |
|
|
118 | (1) |
|
|
119 | (1) |
|
The User Datagram Protocol (UDP) |
|
|
120 | (1) |
|
Layer 5: HTTP and Other Application Standards |
|
|
121 | (1) |
|
Vertical Communication on Hosts, Switches, and Routers |
|
|
121 | (6) |
|
Layered Communication on the Source Host |
|
|
121 | (4) |
|
|
125 | (1) |
|
On Switches and Routers Along the Way |
|
|
126 | (1) |
|
Major Standards Architectures |
|
|
127 | (9) |
|
TCP/IP and OSI Architectures |
|
|
128 | (1) |
|
|
129 | (3) |
|
|
132 | (2) |
|
|
134 | (1) |
|
TCP/IP and OSI: The Hybrid TCP/IP-OSI Standards Architecture |
|
|
134 | (1) |
|
A Multiprotocol World at Higher Layers |
|
|
135 | (1) |
|
Standards at the First Bank of Paradise |
|
|
136 | (1) |
|
Physical and Data Link Layer Standards |
|
|
136 | (1) |
|
Protocols at Higher Layers |
|
|
136 | (1) |
|
|
136 | (4) |
|
|
136 | (4) |
|
Physical Layer Propagation: UTP and Optical Fiber |
|
|
140 | (47) |
|
Introduction: The Physical Layer |
|
|
140 | (1) |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
141 | (1) |
|
|
141 | (1) |
|
Binary Data Representation |
|
|
142 | (4) |
|
|
142 | (1) |
|
|
142 | (1) |
|
|
143 | (1) |
|
Text (ASCII and Extended ASCII) |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
146 | (6) |
|
Converting Data to Signals |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
146 | (3) |
|
Binary Signaling Versus Digital Signaling |
|
|
149 | (1) |
|
Multistate Digital Signaling |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
151 | (1) |
|
Unshielded Twisted Pair (UTP) Wiring |
|
|
152 | (12) |
|
|
152 | (2) |
|
Attenuation and Noise Problems |
|
|
154 | (4) |
|
Electromagnetic Interference (EMI) in UTP Wiring |
|
|
158 | (2) |
|
Serial and Parallel Transmission |
|
|
160 | (2) |
|
Wire Quality Standard Categories |
|
|
162 | (2) |
|
|
164 | (10) |
|
|
164 | (1) |
|
The Roles of Fiber and Copper |
|
|
165 | (1) |
|
Optical Fiber Construction and Operation |
|
|
166 | (3) |
|
|
169 | (3) |
|
|
172 | (2) |
|
Noise and Electromagnetic Interference |
|
|
174 | (1) |
|
|
174 | (2) |
|
|
175 | (1) |
|
Star Topology and Extended Star (Hierarchy) Topology |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
176 | (1) |
|
|
176 | (4) |
|
|
176 | (4) |
|
|
180 | (1) |
|
Solid and Stranded Wiring |
|
|
180 | (1) |
|
Solid-Wire UTP Versus Stranded-Wire UTP |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
181 | (1) |
|
Working with the Exposed Pairs |
|
|
182 | (2) |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
182 | (2) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
Some Jacket Inside the Connector |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
Making Electrical Contact |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
185 | (2) |
|
Testing with Continuity Testers |
|
|
185 | (1) |
|
Testing for Signal Quality |
|
|
185 | (2) |
|
|
187 | (46) |
|
|
187 | (1) |
|
A Short History of Ethernet Standards |
|
|
188 | (2) |
|
Prehistory: Xerox, Intel, and Digital Equipment |
|
|
188 | (1) |
|
|
188 | (1) |
|
The 802.3 Ethernet Working Group |
|
|
188 | (1) |
|
|
188 | (1) |
|
Ethernet Standards Are OSI Standards |
|
|
188 | (2) |
|
Ethernet Physical Standards |
|
|
190 | (7) |
|
Major Ethernet Physical Layer Standards |
|
|
190 | (4) |
|
Link Aggregation (Trunking) |
|
|
194 | (1) |
|
Ethernet Physical Layer Standards and Network Design |
|
|
194 | (3) |
|
|
197 | (4) |
|
|
197 | (1) |
|
The Ethernel Frame's Organization |
|
|
197 | (4) |
|
Basic Data Link Layer Switch Operation |
|
|
201 | (4) |
|
Frame Forwarding with Multiple Ethernet Switches |
|
|
201 | (1) |
|
Hierarchical Switch Topology |
|
|
202 | (2) |
|
Only One Possible Path: Low Switching Cost |
|
|
204 | (1) |
|
Advanced Ethernet Switch Operation |
|
|
205 | (10) |
|
802.1D: The Spanning Tree Protocol (STP) |
|
|
205 | (3) |
|
Virtual LANs and Ethernet Switches |
|
|
208 | (2) |
|
Handling Momentary Traffic Peaks |
|
|
210 | (3) |
|
|
213 | (1) |
|
|
213 | (1) |
|
Media Access Control (MAC) |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
215 | (7) |
|
Number and Speeds of Ports |
|
|
215 | (1) |
|
Switching Matrix Throughput |
|
|
216 | (1) |
|
Store-and-Forward Versus Cut-Through Switching |
|
|
217 | (1) |
|
Store-and-Forward Ethernet Switches |
|
|
217 | (1) |
|
Cut Through Ethernet Switches |
|
|
217 | (1) |
|
|
218 | (2) |
|
Advanced Purchasing Considerations: Physical and Electrical Features |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
220 | (2) |
|
|
222 | (1) |
|
|
222 | (1) |
|
Port Access Control (802.1X) |
|
|
222 | (1) |
|
Media Access Control (MAC) Security (802.1AE) |
|
|
222 | (1) |
|
|
223 | (4) |
|
|
223 | (4) |
|
|
227 | (1) |
|
|
227 | (2) |
|
|
227 | (1) |
|
|
228 | (1) |
|
Early Ethernet and 802.5 Token-Ring Networks |
|
|
229 | (2) |
|
Early Ethernet: CSMA/CD-Bus Networks |
|
|
229 | (1) |
|
802.5 Token-Ring Networks Appear |
|
|
230 | (1) |
|
|
230 | (1) |
|
Shielded Twisted Pair Wiring |
|
|
231 | (1) |
|
Fiber Distributed Data Interface (FDDI) |
|
|
231 | (1) |
|
|
232 | (1) |
|
|
233 | (45) |
|
|
233 | (4) |
|
|
233 | (3) |
|
Bluetooth Personal Area Networks |
|
|
236 | (1) |
|
Emerging Local Wireless Technologies |
|
|
236 | (1) |
|
|
237 | (13) |
|
|
237 | (1) |
|
|
238 | (1) |
|
Wireless Propagation Problems |
|
|
239 | (2) |
|
|
241 | (4) |
|
Normal and Spread Spectrum Transmission |
|
|
245 | (2) |
|
Spread Spectrum Transmission Methods |
|
|
247 | (3) |
|
|
250 | (6) |
|
|
250 | (3) |
|
Controlling 802.11 Transmission |
|
|
253 | (1) |
|
|
253 | (1) |
|
CSMA/CA + ACK Media Access Control |
|
|
253 | (1) |
|
|
253 | (1) |
|
|
254 | (2) |
|
Request to Send/Clear to Send (RTS/CTS) |
|
|
256 | (1) |
|
802.11 Transmission Standards |
|
|
256 | (6) |
|
How Fast Are 802.11 Networks? |
|
|
256 | (1) |
|
|
257 | (1) |
|
|
258 | (1) |
|
802.11g: Today's Dominant Technology |
|
|
258 | (1) |
|
|
259 | (1) |
|
|
260 | (2) |
|
802.11e Quality of Service (QoS) |
|
|
262 | (1) |
|
|
262 | (7) |
|
|
262 | (1) |
|
|
263 | (2) |
|
WPA (Wireless Protected Access) |
|
|
265 | (1) |
|
|
266 | (1) |
|
|
266 | (2) |
|
Pre-Shared Key (PSK) Mode |
|
|
268 | (1) |
|
802.11 Wireless LAN Management |
|
|
269 | (3) |
|
|
269 | (1) |
|
Remote Management: Smart Access Points and Wireless Switches |
|
|
270 | (2) |
|
|
272 | (2) |
|
Personal Area Networks (PANs) for Cable Replacement |
|
|
272 | (1) |
|
Disadvantages Compared to 802.11 |
|
|
273 | (1) |
|
Advantages Compared to 802.11 |
|
|
273 | (1) |
|
|
273 | (1) |
|
|
274 | (4) |
|
|
274 | (4) |
|
|
278 | (33) |
|
|
278 | (4) |
|
Telecommunications and the PSTN |
|
|
278 | (1) |
|
The Four Elements of the PSTN |
|
|
279 | (2) |
|
|
281 | (1) |
|
|
282 | (3) |
|
|
282 | (1) |
|
Voice Versus Data Traffic |
|
|
283 | (1) |
|
|
283 | (1) |
|
|
284 | (1) |
|
|
285 | (7) |
|
|
285 | (1) |
|
|
286 | (1) |
|
Analog-Digital Conversion for Analog Local Loops |
|
|
286 | (3) |
|
|
289 | (1) |
|
Analog-to-Digital Conversion |
|
|
289 | (2) |
|
Digital-to-Analog Conversion (DAC) |
|
|
291 | (1) |
|
|
292 | (4) |
|
|
292 | (1) |
|
|
292 | (1) |
|
|
293 | (1) |
|
|
294 | (1) |
|
Cellular Telephone Standards |
|
|
295 | (1) |
|
|
296 | (5) |
|
|
296 | (1) |
|
Corporate VoIP Alternatives |
|
|
297 | (1) |
|
Corporate Concerns with VoIP |
|
|
298 | (1) |
|
|
299 | (1) |
|
|
299 | (1) |
|
|
299 | (2) |
|
|
301 | (1) |
|
Residential Internet Access |
|
|
301 | (7) |
|
|
301 | (2) |
|
Digital Subscriber Lines (DSLs) |
|
|
303 | (2) |
|
|
305 | (1) |
|
|
306 | (1) |
|
|
306 | (1) |
|
Broadband over Power Lines |
|
|
307 | (1) |
|
|
308 | (1) |
|
Perspective on Speeds and Prices |
|
|
308 | (1) |
|
|
308 | (3) |
|
|
308 | (3) |
|
Wide Area Networks (WANs) |
|
|
311 | (35) |
|
|
311 | (3) |
|
WANs and the Telephone Network |
|
|
311 | (1) |
|
|
312 | (1) |
|
High Costs and Low Speeds |
|
|
313 | (1) |
|
|
313 | (1) |
|
Point-to-Point Leased Line Networks |
|
|
314 | (6) |
|
Leased Line Networks for Voice and Data |
|
|
314 | (1) |
|
Leased Line Network Topologies |
|
|
314 | (3) |
|
|
317 | (2) |
|
Digital Subscriber Lines (DSLs) |
|
|
319 | (1) |
|
Public Switched Data Networks (PSDNs) |
|
|
320 | (4) |
|
Leased Lines in Leased Line Data Networks |
|
|
320 | (1) |
|
Public Switched Data Network (PSDN) Access Lines |
|
|
321 | (1) |
|
|
321 | (1) |
|
OAM&P: Operation, Administration, Maintenance and Provisioning |
|
|
322 | (1) |
|
Service Level Agreements (SLAs) |
|
|
323 | (1) |
|
Virtual Circuit Operation |
|
|
323 | (1) |
|
|
324 | (4) |
|
|
324 | (1) |
|
|
324 | (3) |
|
Frame Relay Virtual Circuits |
|
|
327 | (1) |
|
Asynchronous Transfer Mode (ATM) |
|
|
328 | (2) |
|
Not a Competitor for Frame Relay |
|
|
328 | (1) |
|
|
329 | (1) |
|
|
329 | (1) |
|
ATM Quality-of-Service Guarantees |
|
|
329 | (1) |
|
Manageability, Complexity, and Cost |
|
|
329 | (1) |
|
|
330 | (1) |
|
Metropolitan Area Ethernet |
|
|
330 | (3) |
|
Metropolitan Area Networking |
|
|
330 | (1) |
|
|
330 | (1) |
|
Attractions of Metropolitan Area Ethernet |
|
|
330 | (2) |
|
|
332 | (1) |
|
|
332 | (1) |
|
Virtual Private Networks (VPNs) |
|
|
333 | (5) |
|
The Attractiveness of Internet Transmission |
|
|
333 | (2) |
|
|
335 | (3) |
|
|
338 | (2) |
|
|
338 | (1) |
|
|
339 | (1) |
|
Metropolitan Area Ethernet |
|
|
340 | (1) |
|
Virtual Private Networks (VPNs) |
|
|
340 | (1) |
|
|
340 | (2) |
|
|
340 | (2) |
|
|
342 | (1) |
|
|
342 | (2) |
|
|
342 | (1) |
|
|
342 | (2) |
|
|
344 | (1) |
|
The FBP Wide Area Network (WAN) |
|
|
344 | (1) |
|
|
344 | (1) |
|
|
344 | (1) |
|
Da Kine Island Affiliate Branch |
|
|
344 | (1) |
|
|
344 | (1) |
|
|
344 | (1) |
|
|
344 | (1) |
|
|
344 | (2) |
|
|
344 | (1) |
|
Fractional T1 Lines to Branches |
|
|
344 | (2) |
|
|
346 | (51) |
|
|
346 | (1) |
|
|
347 | (1) |
|
The TCP/IP Architecture and the IETF |
|
|
347 | (1) |
|
Simple IP at the Internet Layer |
|
|
347 | (1) |
|
Reliable Heavyweight TCP at the Transport Layer |
|
|
347 | (1) |
|
Unreliable Lightweight UDP at the Transport Layer |
|
|
348 | (1) |
|
|
348 | (6) |
|
Hierarchical IP Addressing |
|
|
349 | (1) |
|
Routers, Networks, and Subnets |
|
|
350 | (1) |
|
|
351 | (2) |
|
|
353 | (1) |
|
How Routers Process Packets |
|
|
354 | (7) |
|
|
354 | (1) |
|
A Simplified Routing Table |
|
|
354 | (3) |
|
|
357 | (1) |
|
|
358 | (1) |
|
Two Routing Table Details |
|
|
359 | (1) |
|
Is the Destination IP Address in a Row's Address Range? |
|
|
359 | (2) |
|
Other Internet Layer Standards |
|
|
361 | (15) |
|
Dynamic Routing Protocols |
|
|
361 | (4) |
|
Address Resolution Protocol (ARP) |
|
|
365 | (2) |
|
Multiprotocol Label Switching (MPLS) |
|
|
367 | (2) |
|
|
369 | (2) |
|
Internet Control Message Protocol (ICMP) for Supervisory Messages at the Internet Layer |
|
|
371 | (1) |
|
|
372 | (1) |
|
|
372 | (3) |
|
|
375 | (1) |
|
The Transmission Control Protocol (TCP) |
|
|
376 | (5) |
|
Fields in TCP/IP Segments |
|
|
376 | (1) |
|
Openings and Normal Closings |
|
|
376 | (3) |
|
|
379 | (2) |
|
The User Datagram Protocol (UDP) |
|
|
381 | (1) |
|
Layer 3 and Layer 4 Switches |
|
|
382 | (2) |
|
|
382 | (1) |
|
|
383 | (1) |
|
Application Switches (Layer 5 or Layer 7 Switches) |
|
|
384 | (1) |
|
|
384 | (5) |
|
|
384 | (5) |
|
What are WinDUMP and TCPDUMP? |
|
|
389 | (1) |
|
|
390 | (1) |
|
|
390 | (1) |
|
|
390 | (1) |
|
|
391 | (1) |
|
|
391 | (2) |
|
Opening the TCP Connection |
|
|
391 | (1) |
|
|
391 | (1) |
|
|
392 | (1) |
|
|
392 | (1) |
|
The HTTP Response Message |
|
|
393 | (1) |
|
|
393 | (1) |
|
Some Popular WinDUMP Options |
|
|
393 | (1) |
|
|
393 | (1) |
|
|
394 | (1) |
|
|
394 | (1) |
|
|
394 | (3) |
|
|
394 | (1) |
|
|
395 | (1) |
|
|
395 | (2) |
|
|
397 | (41) |
|
|
397 | (1) |
|
|
397 | (12) |
|
|
399 | (3) |
|
Human Break-Ins (Hacking) |
|
|
402 | (3) |
|
Denial-of-Service (DoS) Attacks |
|
|
405 | (1) |
|
|
406 | (1) |
|
|
407 | (2) |
|
|
409 | (2) |
|
Security Is a Management Issue |
|
|
409 | (1) |
|
|
409 | (2) |
|
|
411 | (8) |
|
|
411 | (1) |
|
|
412 | (1) |
|
|
413 | (2) |
|
Digital Certificate Authentication |
|
|
415 | (2) |
|
|
417 | (2) |
|
Firewalls, IDSs, and IPSs |
|
|
419 | (8) |
|
|
419 | (1) |
|
Stateful Firewall Filtering |
|
|
420 | (4) |
|
Intrusion Detection Systems (IDSs) |
|
|
424 | (1) |
|
Intrusion Prevention System (IPS) Filtering |
|
|
425 | (1) |
|
|
426 | (1) |
|
Protection with Cryptographic Systems |
|
|
427 | (4) |
|
|
427 | (1) |
|
Encryption for Confidentiality |
|
|
428 | (2) |
|
|
430 | (1) |
|
Other Aspects of Protection |
|
|
431 | (2) |
|
|
431 | (2) |
|
|
433 | (1) |
|
|
433 | (2) |
|
|
433 | (1) |
|
Major Incidents and CSIRTs |
|
|
434 | (1) |
|
Disasters and Disaster Response |
|
|
435 | (1) |
|
|
435 | (1) |
|
|
435 | (3) |
|
|
435 | (3) |
|
Hands-On: Windows XP Home Security |
|
|
438 | (31) |
|
|
439 | (2) |
|
|
439 | (1) |
|
|
440 | (1) |
|
|
440 | (1) |
|
The Windows Security Center |
|
|
440 | (1) |
|
|
441 | (4) |
|
|
441 | (1) |
|
The Most Ignored Protection |
|
|
441 | (2) |
|
|
443 | (1) |
|
|
444 | (1) |
|
Keeping Installation Disks |
|
|
444 | (1) |
|
|
444 | (1) |
|
|
444 | (1) |
|
|
445 | (1) |
|
|
445 | (15) |
|
|
447 | (1) |
|
|
447 | (2) |
|
|
449 | (4) |
|
Internet Options for Privacy and Security |
|
|
453 | (7) |
|
|
460 | (9) |
|
Virus Definitions Updates |
|
|
461 | (1) |
|
Configuration and Breadth of Protection |
|
|
461 | (1) |
|
|
461 | (8) |
|
|
469 | (30) |
|
|
469 | (1) |
|
|
469 | (4) |
|
|
469 | (1) |
|
|
469 | (2) |
|
|
471 | (1) |
|
Total Cost of Ownership (TCO) |
|
|
471 | (2) |
|
|
473 | (5) |
|
Network Simulation Purposes |
|
|
473 | (1) |
|
Before the Simulation: Collecting Data |
|
|
473 | (1) |
|
|
474 | (4) |
|
|
478 | (5) |
|
|
478 | (2) |
|
Administrative IP Servers |
|
|
480 | (2) |
|
|
482 | (1) |
|
Network Management Utilities |
|
|
483 | (11) |
|
|
483 | (2) |
|
|
485 | (4) |
|
|
489 | (1) |
|
|
489 | (1) |
|
Simple Network Management Protocol (SNMP) |
|
|
490 | (4) |
|
Traffic Management Methods |
|
|
494 | (2) |
|
|
494 | (1) |
|
|
495 | (1) |
|
|
496 | (3) |
|
|
496 | (3) |
|
|
499 | (32) |
|
|
499 | (1) |
|
|
499 | (1) |
|
Traditional Application Architectures |
|
|
500 | (3) |
|
Hosts with Dumb Terminals |
|
|
500 | (1) |
|
|
501 | (2) |
|
|
503 | (7) |
|
|
503 | (1) |
|
|
504 | (1) |
|
Simple Mail Transfer Protocol (SMTP) |
|
|
504 | (2) |
|
Receiving Mail (POP and IMAP) |
|
|
506 | (1) |
|
|
506 | (2) |
|
Viruses and Trojan Horses |
|
|
508 | (1) |
|
|
509 | (1) |
|
The World Wide Web and E-Commerce |
|
|
510 | (7) |
|
|
510 | (3) |
|
Electronic Commerce (E-Commerce) |
|
|
513 | (1) |
|
|
514 | (1) |
|
|
514 | (2) |
|
|
516 | (1) |
|
Service-Oriented Architecture (SOA) |
|
|
517 | (4) |
|
|
517 | (1) |
|
|
518 | (2) |
|
Universal Description, Discovery, and Integration (UDDI) Protocol |
|
|
520 | (1) |
|
Peer-to-Peer (P2P) Application Architectures |
|
|
521 | (8) |
|
Traditional Client/Server Applications |
|
|
521 | (1) |
|
|
522 | (1) |
|
Pure Peer-to-Peer Applications: Gnutella |
|
|
523 | (1) |
|
Using Servers to Facilitate P2P Interactions |
|
|
524 | (3) |
|
|
527 | (1) |
|
Facilitating Servers and P2P-Applications |
|
|
528 | (1) |
|
|
528 | (1) |
|
|
529 | (2) |
|
|
529 | (2) |
|
Module a More on TCP and IP |
|
|
531 | (25) |
|
|
531 | (1) |
|
|
531 | (8) |
|
|
531 | (2) |
|
|
533 | (1) |
|
|
533 | (2) |
|
Ordering TCP Segments upon Arrival |
|
|
535 | (1) |
|
The TCP Acknowledgement Process |
|
|
536 | (1) |
|
Flow Control: Window Size |
|
|
536 | (1) |
|
|
537 | (2) |
|
Bidirectional Communication |
|
|
539 | (1) |
|
More on Internet Layer Standards |
|
|
539 | (17) |
|
|
539 | (3) |
|
|
542 | (2) |
|
Dynamic Routing Protocols |
|
|
544 | (5) |
|
Address Resolution Protocol (ARP) |
|
|
549 | (2) |
|
|
551 | (2) |
|
|
553 | (3) |
|
Module B More on Modulation |
|
|
556 | (4) |
|
|
556 | (4) |
|
|
556 | (1) |
|
|
556 | (1) |
|
|
556 | (2) |
|
Quadrature Amplitude Modulation (QAM) |
|
|
558 | (2) |
|
Module C More on Telecommunications |
|
|
560 | (26) |
|
|
560 | (1) |
|
The PSTN Transport Core and Signaling |
|
|
560 | (6) |
|
|
560 | (1) |
|
Time Division Multiplexing (TDM) Lines |
|
|
560 | (4) |
|
Leased Lines and Trunk Lines |
|
|
564 | (1) |
|
Asynchronous Transfer Mode (ATM) Transport |
|
|
565 | (1) |
|
|
566 | (1) |
|
|
566 | (5) |
|
|
566 | (1) |
|
|
567 | (1) |
|
Geosynchronous Earth Orbit (GEO) Satellites |
|
|
568 | (1) |
|
Low Earth Orbit (LEO) and Medium Earth Orbit (MEO) Satellites |
|
|
569 | (1) |
|
|
570 | (1) |
|
Wiring the First Bank of Paradise Headquarters Building |
|
|
571 | (4) |
|
|
571 | (2) |
|
|
573 | (1) |
|
|
574 | (1) |
|
|
575 | (1) |
|
|
575 | (1) |
|
Carrier Services and Pricing |
|
|
575 | (4) |
|
|
577 | (2) |
|
|
579 | (1) |
|
Telephone Carriers and Regulation |
|
|
579 | (7) |
|
PTTs and Ministries of Telecommunications |
|
|
581 | (1) |
|
|
581 | (1) |
|
|
582 | (4) |
Glossary |
|
586 | (35) |
Index |
|
621 | |