0%


Today's networks are required to support an increasing array of real-time communication methods. Video chat and live resources put demands on networks that were previously unimagined. Written to be accessible to all, Fundamentals of Communications and Networking, Third Edition helps readers better understand today's networks and the way they support the evolving requirements of different types of organizations. While displaying technical depth, this new edition presents an evolutionary perspective of data networking from the early years to the local area networking boom, to advanced IP data networks that support multimedia and real-time applications. The Third Edition is loaded with real-world examples, network designs, and network scenarios that provide the reader with a wealth of data networking information and practical implementation tips.

Key Features of the third Edition:

- Introduces network basics by describing how networks work
- Discusses how networks support the increasing demands of advanced communications
- Illustrates how to map the right technology to an organization's needs and business goals
- Outlines how businesses use networks to solve business problems, both technically and operationally.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Brief Contents
  5. Contents
  6. Dedication
  7. Preface
  8. Acknowledgments
  9. About the Authors
  10. CHAPTER 1 Evolution of Communication Technologies
    1. Today’s Hyperconnected World
    2. From Analog to Digital to IP
    3. Internet and IP Connectivity Are Pervasive
    4. How Unified Communications Connect People and Businesses
    5. How Communications Have Evolved
    6. Snail Mail
    7. Store-and-Forward Messages
    8. Real-Time Communication
    9. Social Media
    10. The Web’s Impact on Business
    11. E-commerce Business Models
    12. Solving E-commerce Business Challenges
    13. The Internet of Things’ Impact on Business
    14. The Cloud’s Impact on Business
    15. Virtualization
    16. Types of Cloud Services and Delivery Models
    17. CHAPTER SUMMARY
    18. KEY CONCEPTS AND TERMS
    19. CHAPTER 1 ASSESSMENT
  11. CHAPTER 2 Solving Today’s Business Communication Challenges
    1. Introducing Organizational Communication Challenges
    2. Enterprise Challenges
    3. Government Challenges
    4. SMB/SOHO Challenges
    5. Solving Enterprise Business Communication Challenges
    6. Banking and Financial Services Challenges
    7. Healthcare and Patient Care Services Challenges
    8. K–12 and Higher Education Services Challenges
    9. Commercial Retail Products and Services Challenges
    10. Manufacturing Services Challenges
    11. Travel and Transportation Services Challenges
    12. Solving Government Business Communication Challenges
    13. Solving SMB Business Communication Challenges
    14. Solving SOHO Business Communication Challenges
    15. Transforming Communication Requirements into Network Solutions
    16. Defining Your Organization’s Networking Requirements
    17. CHAPTER SUMMARY
    18. KEY CONCEPTS AND TERMS
    19. CHAPTER 2 ASSESSMENT
  12. CHAPTER 3 Circuit-Switched, Packet-Switched, and IP-Based Communications
    1. Open Systems Interconnection Reference Model
    2. TCP/IP Reference Model
    3. Application Layer
    4. Transport Layer
    5. Internet Layer
    6. Network Access Layer
    7. TCP/IP Suite
    8. Circuit Switching Versus Packet Switching
    9. Circuit Switching
    10. Packet Switching
    11. IP-Based Communications
    12. Network Topology Overview
    13. Point-to-Point Networks
    14. Bus
    15. Ring
    16. Star
    17. Mesh
    18. Fully Connected Mesh
    19. Hybrid
    20. Internetworking
    21. Internetworking with Bridges
    22. Internetworking with Switches
    23. Internetworking with Routers
    24. Internetworking with a Bridge/Router
    25. Internetworking with a Gateway
    26. Switching Concepts
    27. Switch Functionality
    28. Switch Forwarding Methods
    29. Routing Concepts
    30. Network Layer Address
    31. Static Route
    32. Dynamic Route
    33. Resiliency and Redundancy
    34. Layer 2 Resiliency
    35. Layer 3 Resiliency
    36. Virtual Networking Components
    37. Network Storage Types
    38. CHAPTER SUMMARY
    39. KEY CONCEPTS AND TERMS
    40. CHAPTER 3 ASSESSMENT
  13. CHAPTER 4 The Physical and Data Link Layers
    1. Physical Layer and Data Link Layer
    2. Physical Layer: OSI Layer
    3. Data Link Layer: OSI Layer
    4. Ethernet and IEEE 802.3 Frame Formats
    5. Ethernet Evolution
    6. IEEE 802.3 Standards and Specifications
    7. Solving Business Challenges
    8. IEEE 802.3 CSMA/CD Standards
    9. How Multiple Nodes Share Network Media
    10. Internetworking LANs: Bridging Versus Routing
    11. Repeaters and Hubs: Layer 1 Forwarding
    12. Bridges and Switches: Layer 2 Forwarding
    13. Ethernet Network Design Fundamentals
    14. Edge Network: Workgroup LANs
    15. Edge Network: Use of PoE Switches
    16. Edge Network: Departmental LAN
    17. Building Backbone: Collapsed Backbones
    18. Campus Backbone: Collapsed Data Center Backbone
    19. Metropolitan Area Backbone: Metro Ethernet Backbone
    20. GigE and 10 GigE Specifications
    21. 25, 40, and 100 GigE: Server Farms and Backbone Trunking
    22. CHAPTER SUMMARY
    23. KEY CONCEPTS AND TERMS
    24. CHAPTER 4 ASSESSMENT
  14. CHAPTER 5 The Network and Transport Layers
    1. Network and Transport Layers
    2. Network Layer: OSI Layer
    3. Transport Layer: OSI Layer
    4. The Internet Protocol
    5. IP Addressing: IPv4 versus IPv6
    6. IPv4
    7. IPv6
    8. IPv4 to IPv6
    9. IP Communications
    10. Connectionless Versus Connection-Oriented Communications
    11. Scenario 1: Connection-Oriented Conversation
    12. Scenario 2: Connectionless Conversation
    13. CHAPTER SUMMARY
    14. KEY CONCEPTS AND TERMS
    15. CHAPTER 5 ASSESSMENT
  15. CHAPTER 6 The Session, Presentation, and Application Layers
    1. Session, Presentation, and Application Layers
    2. Session Layer: OSI Layer 5
    3. Presentation Layer: OSI Layer 6
    4. Application Layer: OSI Layer 7
    5. Application Architectures
    6. Architecture Types and Examples
    7. Features and Benefits of Each Architecture Type
    8. Aligning Architecture with Business Requirements
    9. Application Layer Ports and Sockets
    10. World Wide Web
    11. From the Internet to the Web: How the World Wide Web Works
    12. HTTP: The Web’s Workhorse
    13. Impact on Security
    14. CHAPTER SUMMARY
    15. KEY CONCEPTS AND TERMS
    16. CHAPTER 6 ASSESSMENT
  16. CHAPTER 7 Layer 2 Networking
    1. Layer 2 Networking Basics
    2. Layer 1 and Layer 2 Evolution
    3. What Layer 2 Networking Means
    4. Ethernet LAN Topologies
    5. Layer 2 Network Redundancy and Resiliency
    6. VLAN Tagging
    7. IEEE 802.3ad Link Aggregation
    8. Network Backbones
    9. Network Power
    10. Layer 2 Business Solutions
    11. SOHO Organization
    12. SMB Organization
    13. Enterprise Organization
    14. CHAPTER SUMMARY
    15. KEY CONCEPTS AND TERMS
    16. CHAPTER 7 ASSESSMENT
  17. CHAPTER 8 Layer 3 Networking
    1. Network Layer Basics
    2. Network Layer Protocols
    3. Router Protocols
    4. Convergence
    5. Load Balancing
    6. Traffic Flow
    7. Internetwork Routing Functions
    8. LAN-to-LAN Routing
    9. LAN-to-WAN Routing
    10. Routing Metrics and Protocols
    11. Exterior Versus Interior Routing Protocols
    12. Routing Information Protocol (RIP)
    13. RIP Version 2 (RIPv2)
    14. Open Shortest Path First Version 2 (OSPFv2)
    15. Intermediate System-to-Intermediate System (IS-IS)
    16. Interior Gateway Routing Protocol (IGRP)
    17. Enhanced Interior Gateway Routing Protocol (EIGRP)
    18. Border Gateway Protocol (BGP)
    19. Layer 3 Network Redundancy and Resiliency
    20. Configuring Resilience
    21. Routing Protocol Resilience
    22. CHAPTER SUMMARY
    23. KEY CONCEPTS AND TERMS
    24. CHAPTER 8 ASSESSMENT
  18. CHAPTER 9 Network Infrastructure Implementations
    1. Physical Infrastructures
    2. Hosting Infrastructures
    3. Foundational Network Services
    4. IP Address Management (IPAM)
    5. Dynamic Host Control Protocol (DHCP)
    6. Domain Name System (DNS)
    7. Network Time Protocol (NTP)
    8. Network Devices and Where to Position Them
    9. Asset Visibility
    10. Creating an IT Asset Inventory
    11. Access Controls
    12. Identification, Authentication, Authorization, and Accounting
    13. Remote Access Controls and Multifactor Authentication
    14. Network Access Controls
    15. Visibility
    16. Control
    17. Device Identification
    18. Advanced Networking Devices
    19. Advanced Switching Devices
    20. Layered Security Solutions
    21. Performance-Enhancing Devices
    22. CHAPTER SUMMARY
    23. KEY CONCEPTS AND TERMS
    24. CHAPTER 9 ASSESSMENT
  19. CHAPTER 10 Wireless Networks
    1. Supporting the Mobile Worker
    2. Wired Versus Wireless
    3. Evolution of Wireless LAN Networking
    4. IEEE 802.11 Family of Standards
    5. The IEEE 802.11 Legacy Standard
    6. The IEEE 802.11b WLAN Standard
    7. The IEEE 802.11a WLAN Standard
    8. The IEEE 802.11g WLAN Standard
    9. The IEEE 802.11n WLAN Standard
    10. The IEEE 802.11ac WLAN Standard
    11. The IEEE 802.11ax WLAN Standard
    12. WLAN Security
    13. Authentication and Access Control
    14. Security Threats to WLANs
    15. IEEE 802.1X Security
    16. Encryption and Data Privacy
    17. Security Protocols and Access Control
    18. Security Practices
    19. Unauthorized Access to Shared Resources
    20. WLAN Planning and Design
    21. RF Design Issues
    22. Capacity and Coverage
    23. Speed and Distance Requirements
    24. Channel Bandwidth
    25. Channel Bonding
    26. MIMO/MU-MIMO
    27. Unidirectional/Omnidirectional
    28. Performing a Site Survey
    29. Conducting the Site Tests
    30. CHAPTER SUMMARY
    31. KEY CONCEPTS AND TERMS
    32. CHAPTER 10 ASSESSMENT
  20. CHAPTER 11 Wide Area Networks
    1. WAN Business Drivers
    2. WANs and Service Providers
    3. WAN and SD-WAN Business Drivers
    4. Evolution of WAN Technologies
    5. WAN Technologies in the 1970s
    6. WAN Technologies in the 1980s
    7. WAN Technologies in the 1990s
    8. WAN Technologies in the 2000s
    9. WAN Technologies in the 2010s
    10. WAN Management and Requirements
    11. Fault Management Requirements
    12. Configuration Management Requirements
    13. Accounting Management Requirements
    14. Performance Management Requirements
    15. Security Management Requirements
    16. WAN Solutions for Different Scenarios
    17. Enterprise Business
    18. Small to Medium Business (SMB)
    19. Small Office/Home Office (SOHO)
    20. CHAPTER SUMMARY
    21. KEY CONCEPTS AND TERMS
    22. CHAPTER 11 ASSESSMENT
  21. CHAPTER 12 Network Operations and Management
    1. The Scope of Network Operations and Management
    2. IT and IT Security Policy Framework
    3. Policy and Procedure Best Practices
    4. Network Operations and Management
    5. Staffing and Resources
    6. Real-Time Availability
    7. Audit and Monitoring
    8. Collecting Data
    9. Reporting Information
    10. Configuration Change Management
    11. Change Control Board Membership
    12. Change Control Board Function
    13. Change Control Board Policies and Practices
    14. Capacity Planning and Readiness
    15. IT Asset Inventory
    16. Network Performance
    17. Service Providers
    18. Network Management
    19. Simple Network Management Protocol (SNMP)
    20. Management Information Bases (MIBs)
    21. SNMP Traps
    22. FCAPS: Fault Management
    23. FCAPS: Configuration Management
    24. FCAPS: Accounting Management
    25. FCAPS: Performance Management
    26. FCAPS: Security Management
    27. Network Security
    28. Physical Security
    29. Access Controls
    30. Wireless Security
    31. Common Network Attacks
    32. Network Device Hardening
    33. Network Mitigation Solutions
    34. Changing Attacks
    35. Blended Response
    36. CHAPTER SUMMARY
    37. KEY CONCEPTS AND TERMS
    38. CHAPTER 12 ASSESSMENT
  22. CHAPTER 13 Network Auditing, Monitoring, and Incident Response
    1. Security Auditing and Analysis
    2. Purpose of Audits
    3. Customer Confidence
    4. Auditing Benchmarks
    5. Security Monitoring
    6. Security Monitoring for Computer Systems
    7. Types of Log Information to Capture
    8. Responding to Security Incidents
    9. Incident Response Plan, Policies, Procedures, and Guidelines
    10. Incident Response Team
    11. Phases of an Incident and Response
    12. The Role of Business Continuity and Disaster Recovery Plans
    13. Recovering Systems
    14. Business Impact Analysis
    15. Risk Assessment
    16. Risk Management
    17. Planning for Disaster and Recovery
    18. Policies, Procedures, Priorities, and Practices
    19. Testing and Evaluation
    20. Preparation and Staging of Testing Procedures
    21. Frequency of Tests
    22. Analysis of Test Results
    23. CHAPTER SUMMARY
    24. KEY CONCEPTS AND TERMS
    25. CHAPTER 13 ASSESSMENT
  23. CHAPTER 14 Network Security
    1. Network Security Essentials
    2. What Is Confidentiality?
    3. What Is Integrity?
    4. What Is Availability?
    5. Network Security Scope
    6. Network Risks, Threats, and Vulnerabilities
    7. Conducting a Network Security Risk Assessment
    8. Layered Network Security Architectures
    9. Network Security Controls
    10. How to Implement Security Controls
    11. CHAPTER SUMMARY
    12. KEY CONCEPTS AND TERMS
    13. CHAPTER 14 ASSESSMENT
  24. CHAPTER 15 Network Troubleshooting
    1. Network Operations Center
    2. Network Troubleshooting and Ticketing
    3. NOC and IT Service Desk Structure
    4. Network Troubleshooting Approach
    5. Network Troubleshooting Tools
    6. Physical Layer Tools
    7. Network Performance Monitoring Tools
    8. Network Traffic Tools
    9. Network Connectivity Tools
    10. Network Scanning and Discovery Tools
    11. Vulnerability Assessment Tools
    12. Protocol Analyzer Tools
    13. Network Troubleshooting Using Protocol Analysis
    14. How Protocols Behave
    15. Network Troubleshooting Scenarios
    16. Names Not Resolving
    17. Incorrect Gateway Definition
    18. Incorrect Netmask
    19. Duplicate IP Address
    20. Duplicate MAC Addresses
    21. Expired IP Address
    22. Rogue DHCP Server
    23. Untrusted SSL Certificate
    24. Incorrect Time
    25. Exhausted DHCP Scope
    26. Blocked TCP/UDP Ports
    27. Incorrect Host-Based Firewall Settings
    28. Incorrect ACL Settings
    29. Unresponsive Service
    30. CHAPTER SUMMARY
    31. KEY CONCEPTS AND TERMS
    32. CHAPTER 15 ASSESSMENT
  25. APPENDIX A Answer Key
  26. APPENDIX B IP Addressing Primer
  27. APPENDIX C Structured Wiring System Primer
  28. APPENDIX D Sample Security Policies and Templates
  29. APPENDIX E Standard Acronyms
  30. Glossary of Key Terms
  31. References
  32. Index
44.222.220.101