Business data networks and security
β Scribed by Panko, Julia L.; Panko, Raymond R
- Publisher
- Pearson
- Year
- 2014;2015
- Tongue
- English
- Leaves
- 516
- Edition
- Tenth edition
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Business Data Networks and Securityguides readers through the details of networking with its clear writing style, job-ready detail, and focus on the technologies that are used in today's marketplace.
KEY TOPICS:Welcome to the Cloud; Hands On: A Few Internet Tools; Design Exercise: A Small Home Network; Network Standards; Wireshark; Network Security; Network and Security Management; Ethernet (802.3) Switched LANs; Hands-On: Cutting and Connectorizing UTP; Wireless LANs I; Wireless LANs II; TCP/IP Internetworking I; TCP/IP Internetworking II; Wide Area Networks; Networked Applications.
MARKET:This text is a great reference for business professionals looking for the most recent developments in data communications and networking.
β¦ Table of Contents
Cover......Page 1
Title......Page 4
Copyright......Page 5
Contents......Page 8
Preface for Students......Page 22
About the Authors......Page 25
Chapter 1 Welcome to the Cloud......Page 26
Netflix Dives into the Amazon......Page 27
Hosts, Messages, and Addresses......Page 28
The Internet......Page 29
Netflix Dives into the Amazon......Page 31
Virtualization and Agility......Page 33
Infrastructure as a Service (IaaS) and Software as a Service (SaaS)......Page 34
Clients Move into the Cloud......Page 36
Networks and the Cloud......Page 37
Service Level Agreements (SLAs): Speed......Page 38
Box 2: Writing Speeds in Metric Notation......Page 39
Message Fragmentation, Frames, and Packets......Page 40
Single-Network Host Addresses......Page 43
Point-to-Point Single Networks, Physical Links, and Data links......Page 44
Wireless Single Networks......Page 47
Switched Single Networks......Page 48
Hybrid Switched/Wireless Single Networks......Page 49
Hosts on Different Single Networks......Page 50
Creating the Internet......Page 51
Routes and Layer......Page 54
Box 3: βPacket Switchingβ......Page 56
Layers 1 through 3 (Physical, Data Link, and Internet Layers)......Page 57
Standards Agencies and Architectures......Page 58
TCP/IP Supervisory Applications: The Domain NameSystem (DNS)......Page 60
Synopsis......Page 61
End-of-Chapter Questions......Page 63
Chapter 1a Hands On: A Few Internet Tols......Page 65
Components......Page 66
The Wireless Access Router......Page 68
Configuration......Page 69
Design Exercise......Page 70
How Internet Standards Came to Be......Page 71
Standard = Protocol......Page 74
Network Standards......Page 75
Recap of Chapter 1 Standards Concepts......Page 76
Network Standard Characteristics......Page 78
Message Ordering in HTTP......Page 80
Message Ordering and Reliability in TCP at the Transport Layer......Page 81
Syntax: General Message Organization......Page 84
The Ethernet Frame Syntax......Page 86
The Internet Protocol (IP) Packet Syntax......Page 87
Transmission Control Protocol Segment Syntax......Page 89
Port Numbers......Page 91
HTTP Request and Response Message Syntax......Page 93
Encoding......Page 95
Encoding Text as ASCII......Page 96
Converting Integers into Binary Numbers (1s and 0s)......Page 97
Encoding Alternatives......Page 98
Encoding Voice......Page 100
Vertical Communication on Hosts......Page 101
Synopsis......Page 102
End-of-Chapter Question......Page 104
Getting Wireshark......Page 105
Starting a Packet Capture......Page 106
Getting Data......Page 107
Looking at Individual Packets......Page 108
Options......Page 110
The Target Breach......Page 111
The Attack......Page 112
Damages......Page 114
Perspective......Page 115
Malware Attacks......Page 116
Vulnerabilities and Patches......Page 117
Viruses and Worms......Page 118
Other Types of Malware......Page 119
Payloads......Page 120
Attacks on Human Judgment......Page 121
Human Break-Ins (Hacking)......Page 123
Stages in the Attack......Page 124
Denial-of-Service (DOS) Attacks Using Bots......Page 125
Advanced Persistent Threats......Page 126
Hackers......Page 127
Cyberterrorists and National Governments......Page 129
Protecting Dialogues Cryptography......Page 130
Symmetric Key Encryption for Confidentiality......Page 131
Electronic Signatures: Message Authentication and Integrity......Page 132
Host-to-Host Virtual Private Networks (VPNs)......Page 133
Terminology and Concepts......Page 134
Reusable Passwords......Page 135
Other Forms of Authentication......Page 137
Firewalls......Page 140
Dropping and Logging Provable Attack Packets......Page 141
Stateful Packet Inspection (SPI) Firewalls......Page 142
Next-Generation Firewalls (NGFWs)......Page 146
Box: Antivirus Protection......Page 149
Synopsis......Page 150
End-of-Chapter Questions......Page 152
Failures in the Target Breach......Page 153
Introduction......Page 155
Network Quality of Service (QOS)......Page 156
Rated Speed versus Throughput and Aggregate Throughput......Page 157
Other Quality-of-Service Metrics......Page 158
Service Level Agreements (SLAs)......Page 160
Network Design......Page 161
Traffic Analysis......Page 162
Redundancy......Page 163
Momentary Traffic Peaks......Page 164
Security Is a Management Issue......Page 166
The PlanβProtectβRespond Cycle......Page 167
Security Planning Principles......Page 168
Policy-Based Security......Page 174
Ping......Page 178
The Simple Network Management Protocol (SNMP)......Page 179
Software-Defined Networking (SDN)......Page 181
Centralized Security Management......Page 183
Synopsis......Page 184
End-of-Chapter Questions......Page 186
Using Visio......Page 187
Ethernet Begins......Page 191
Local Area Networks......Page 192
Switched Technology......Page 193
Ethernet Standards Development......Page 195
Physical and Data Link Layer Operation......Page 196
Signaling......Page 197
4-Pair Unshielded Twisted Pair Copper Wiring......Page 200
Serial and Parallel Transmission......Page 201
UTP Installation Limitations......Page 202
Optical Fiber......Page 203
Multimode Optical Fiber Quality Standards......Page 206
Link Aggregation (Bonding)......Page 207
Ethernet Physical Layer Standards and Network Design......Page 208
The Ethernet Frame......Page 210
Basic Ethernet Data Link Layer Switch Operation......Page 213
The Rapid Spanning Tree Protocol (RSTP)......Page 215
Manageability......Page 217
Power over Ethernet (POE)......Page 218
Port-Based Access Control (802.1X)......Page 219
Man in the Middle Attack in an Ethernet LAN......Page 220
Synopsis......Page 222
End-of-Chapter Questions......Page 223
Solid-Wire UTP versus Stranded-Wire UTP......Page 225
Cutting the Cord......Page 226
Untwisting the Pairs......Page 227
Cutting the Wires......Page 228
Making Electrical Contact......Page 229
Testing for Signal Quality......Page 230
What You Will Need......Page 232
Creating a Loop......Page 233
Chapter 6 Wireless LANs I......Page 235
802.11 versus Wi-Fi......Page 236
Wireless LAN Operation......Page 237
Radio Signal Propagation......Page 238
Frequencies......Page 239
Antennas......Page 240
Wireless Propagation Problems......Page 241
Service Bands......Page 244
Signal and Channel Bandwidth......Page 245
The 2.4 GHz and 5 GHz Service Bands......Page 246
Spread Spectrum Transmission......Page 248
Licensed and Unlicensed Radio Bands......Page 249
Implementing Spread Spectrum Transmission......Page 250
Wireless Access Points......Page 252
Basic Service Sets (BSSs)......Page 253
Extended Service Sets (ESSs), Handoffs, and Roaming......Page 254
Media Access Control......Page 255
Box 1: Media Access Control (MAC)......Page 256
Characteristics of802.11g, 602.11a, 802.11n, and 802.11ac......Page 258
Bands and Channel Bandwidth......Page 260
MIMO......Page 261
Beamforming and Multiuser MIMO......Page 262
Speed, Throughput, and Distance......Page 263
Backward Compatibility......Page 264
Wireless Mesh Networking......Page 265
Synopsis......Page 266
End-of-Chapter Questions......Page 268
The Four Windows......Page 269
The Radar Window (Read the Fine Print)......Page 270
The Networks Window......Page 272
Signal History......Page 273
Connection Test......Page 274
Speed Test......Page 275
Quality Test......Page 276
Activity......Page 277
The TJX Breach......Page 278
WLAN Security Threats......Page 281
The 802.11i WLAN Security Standard......Page 282
Pre-Shared Key (PSK) Mode in 802.11i......Page 284
802.1X Mode Operation......Page 287
Rogue Access Points......Page 288
Evil Twin Access Points and Virtual Private Networks (VPNs)......Page 289
Access Point Placement......Page 292
Remote Management......Page 293
Bluetooth......Page 295
Box 1: Expressing Power Ratios in Decibels......Page 296
Two Modes of Operation......Page 298
One-to-One, MasterβSlave Operation......Page 300
Bluetooth Profiles......Page 301
Other Local Wireless Technologies......Page 302
Near Field Communication (NFC)......Page 303
Security in Emerging Local Wireless Technologies......Page 304
Synopsis......Page 306
End-of-Chapter Questions......Page 307
Introduction......Page 308
Hierarchical IP Addressing......Page 309
Routers, Networks, and Subnets......Page 311
Network and Subnet Masks......Page 312
Switching versus Routing......Page 314
Rows Are Routes for All IP Addresses in a Range......Page 316
Step 1: Finding All Row Matches......Page 317
Step 2: Selecting the Best-Match Row......Page 320
Cheating (Decision Caching)......Page 321
Box 1: Masking When Masks Do Not Break at 8-Bit Boundaries......Page 322
Box 2: The Address Resolution Protocol......Page 323
The First Row......Page 325
The Third Row......Page 326
IPv6......Page 327
Writing 128-Bit IPv6 Addresses......Page 328
The IPv6 Header......Page 330
Extension Headers......Page 331
Fields in TCP/IP Segments......Page 333
Openings and Abrupt TCP Closes......Page 335
The User Datagram Protocol (UDP)......Page 336
Synopsis......Page 337
End-of-Chapter Questions......Page 338
Core TCP/IP Management Tasks......Page 339
IP Subnet Planning......Page 340
Network Address Translation (NAT)......Page 341
The Domain Name System (DNS)......Page 344
Simple Network Management Protocol (SNMP)......Page 347
Virtual Private Networks......Page 350
IPsec Transport Mode......Page 351
IPsec Tunnel Mode......Page 352
IPsec Security Associations and Policy Servers......Page 353
SSL/TLS VPNs......Page 354
Internet Layer Protocol Stacks......Page 355
IPv6 Subnetting......Page 356
The Domain Name System for IPv6......Page 359
Dynamic Routing Protocols......Page 360
Internet Control Message Protocol (ICMP) for Supervisory Messagesat the Internet Layer......Page 362
Synopsis......Page 363
End-of-Chapter Questions......Page 364
Chapter 10 Carrier Wide Area Networks (WANs)......Page 366
LANs versus MANs and WANs......Page 367
Other Aspects of WANs......Page 369
Carrier WAN Components and Business Uses......Page 370
The Telephone System......Page 371
Residential Asymmetric Digital Subscriber Line (ADSL) Service......Page 372
Cable Modem Service......Page 374
Cellular Service......Page 376
Cellular Data Speeds......Page 378
Leased Lines......Page 380
Reaching the ISP via a Leased Line......Page 381
Leased Line Private Corporate WANs......Page 382
Public Switched Data Network (PSDN) Carrier WANs......Page 384
Multiprotocol Label Switching (MPLS)......Page 387
WAN Optimization......Page 389
Concepts and Benefits......Page 392
SDN Applications......Page 394
Application Program Interfaces (APIs)......Page 395
Synopsis......Page 396
End-of-Chapter Questions......Page 397
GhostNet......Page 398
Networked Applications......Page 400
The Evolution of Client Devices and Networking......Page 401
Application Security......Page 403
Cross-Site Scripting (XSS)......Page 405
SQL Injection Attacks......Page 406
Message Body Standards......Page 407
Receiving Mail (POP and IMAP)......Page 408
SMTP for Transmission between Mail Hosts......Page 409
Malware Filtering in E-Mail......Page 410
Encryption for Confidentiality in E-Mail Transmission......Page 411
Basics......Page 413
VoIP Signaling......Page 414
VoIP Transport......Page 415
HTTP and HTML Standards......Page 416
Complex Webpages......Page 417
Traditional Client/Server Applications......Page 418
P2P Applications......Page 419
P2P File-Sharing Applications: BitTorrent......Page 420
P2P Communication Applications: Skype......Page 422
P2P Processing Applications: [email protected] 424
Privacy Protection: Tor......Page 425
Synopsis......Page 426
End-of-Chapter Questions......Page 428
Numbering Octets......Page 476
Ordering TCP Segments upon Arrival......Page 477
Flow Control: Window Size......Page 478
Review Questions......Page 479
Amplitude Modulation......Page 480
Phase Modulation......Page 481
Quadrature Amplitude Modulation (QAM)......Page 482
Review Questions......Page 483
The Transport Core......Page 484
Time Division Multiplexing (TDM) Lines......Page 485
Leased Lines and Trunk Lines......Page 487
Signaling......Page 489
Microwave Transmission......Page 490
Satellite Transmission......Page 491
Low Earth Orbit (LEO) and Medium Earth Orbit (MEO) Satellites......Page 492
Facilities......Page 493
Telephone Wiring......Page 494
Data Wiring......Page 496
Carrier Services and Pricing......Page 497
Basic Voice Services......Page 498
Advanced Services......Page 500
PTTs and Ministries of Telecommunications......Page 501
AT&T, the FCC, and PUCs......Page 502
Deregulation......Page 503
Voice Over IP......Page 506
Hierarchical Organization......Page 507
Directory Servers and The Networking Staff......Page 508
Domain Controllers......Page 509
Authentication and Directory Servers......Page 510
Glossary......Page 429
Index......Page 456
A......Page 457
B......Page 458
C......Page 459
D......Page 460
E......Page 461
F......Page 462
I......Page 463
M......Page 465
N......Page 466
P......Page 467
R......Page 468
S......Page 469
T......Page 471
V......Page 473
W......Page 474
Z......Page 475
β¦ Subjects
Textbooks
π SIMILAR VOLUMES
For undergraduate and graduate courses in Business Data Communication / Networking (MIS). Prepare for the modern workplace with networking and security essentials. With a clear writing style and a focus on contemporary technologies, Business Data Networks and Security guides readers through the deta
<p><b>For Business Data Communications, Data Communications, and introductory Networking for Business courses. </b><b>T</b><b>he content is also appropriate for the Introduction to Networking course in a MBA program. </b></p> <p><i>Business Data Communications: Infrastructure, Networking and Securi
<span>This guide helps you protect networks from unauthorized access. It discusses counter security threats, optimum use of encryption, integrity checks, and uniqueness mechanisms.</span>
The increasing business use of wireless and mobile technologies on a variety of devices has accelerated the need for a better understanding of the technologies involved. Business Data Communications and Networking: A Research Perspective addresses the key issues for businesses utilizing data communi
The 11th edition of FitzGerald and Dennis' Business Data Communications and Networking focuses on more comprehensive updating, as well as more hands-on and applied exercises. The new edition has more in-depth coverage of routing; revisions and updates on wireless; additional cases for team-based lea