INDEX

A

Abilene network, 326, 329, 334, 458, 460

Acceptance stage, of standardization process, 23

Access BN layer, 243

Access cards, 38384

Access control list (ACL), 173, 36465, 51819

Access layer, 414

of backbone network, 9, 1214, 25, 126, 23962, 346, 359

of network, 245, 250, 259, 356, 41416, 421

Access points (AP), 20103, 21920, 226, 232, 241, 248, 255, 318, 326, 36263

Access request technique, 121

Access VPN, 28789

Account, 397, 468

Acknowledgment (ACK), 128

negative, 128

Active Directory Service (ADS), 206

Adaptive differential pulse code modulation (ADPCM), 108, 498

Address field, 13335, 151, 215

Address resolution, 16265, 193

data link layer, 1619, 21, 25, 30, 120, 12627, 13132, 135, 15765, 17879, 50212

server name resolution, 16264

Address Resolution Protocol (ARP), 165

Addressing, 15765

address resolution, 16265

data link layer address resolution, 164

domain name service (DNS), 163

server name resolution, 162

application layer address, 157

assigning addresses, 15862

classless addressing, 159

data link layer address, 158

dynamic addressing, 16162

internet addresses, 159

network layer address, 157

subnet mask, 161

subnets, 16061

types of, 158

Advanced Encryption Standard (AES), 217, 377

Advanced Research and Development Network Operations Center (ARDNOC), 326

Adware, 374

Agent, 427

Akamai, 43435

Ticketmaster and, 434

Alarm, 42425

message, 424

storm, 425

Algorithms, 37476

Alternating current (AC), 97

Amazon.com, 349

American National Standards Institute (ANSI), 23

American Telephone and Telegraph Company (AT&T), 6, 295, 312, 341, 356

global/IP network, 470

Amperes (amps), 97

Amplifiers, 125

Amplitude, 100

Amplitude modulation (AM), 101

Amplitude shift keying (ASK), 101

Analog circuit, 77

Analog data, 78

translating to digital, 10506

Analog transmission of digital data, 10004

amplitude modulation (AM), 101

bit rate versus baud rate versus symbol rate, 103

frequency modulation (FM), 10102

modems transmitting data, 104

data compression, 104

modulation, 10104

basic modulation, 101

phase modulation (PM), 10203

multiple bits, sending, 102

quadrature amplitude modulation (QAM), 103

Anomaly detection, 387

Antennas

directional, 205

omnidirectional, 204

Antivirus software, 352

AOL Instant Messenger, 60

Apple Mac Operating System, 59, 206

Application architectures, 4064

client-based, 40, 4243

client-server, 40, 4346, 5657

factors in choosing, 4749

host-based, 40, 4142

peer-to-peer, 40, 4647

Application layer, 3965, 50405

address, 157

application logic, 40

architectures, 4049

client-based architectures, 40, 4243

clients, 41

client-server architectures, 40, 4346

cluster, 41

data access logic, 40

data storage, 40

dumb terminals, 41

functions, 40

host-based architectures, 4042

internet model, 19

mainframe, 41

message transmission using, 19

network computer, 41

OSI model, 18

peer-to-peer architectures, 40, 4647

personal computer, 41

presentation logic, 40

servers, 41

structured query language (SQL), 40

terminal, 41

transaction terminal, 41

virtual server, 41

Application logic, 40, 46

Application management software, 426

Application service providers (ASPs), 28

Application systems, 46, 410, 414

Application-based VLANs, 428

Application-level firewall, 36566

Architectures, choosing, 4749

ARPANET, 9, 59, 150

ASCII. See United States of America Standard Code for Information Interchange (USASCII)

Assets, network, 345

Assigning addresses, 15862

Association, 213

associating with AP, 214

Asymmetric digital subscriber line (ADSL), 319

G.Lite, 87

Asymmetric encryption, 375

Asynchronous transfer mode (ATM), 2823

Asynchronous transmission, 13233

AT&T. See American Telephone and Telegraph Company (AT&T)

Attenuation, 124

Audit, software, 199

Australia, networking in, 85

Authentication, 378381. See also User authentication

authentication server, 385

central authentication, 385

Automated teller machine (ATM) network, 383

Automatic number identification (ANI), 273

Automatic Repeat reQuest (ARQ), 128

continuous ARQ, 128

stop-and-wait ARQ, 128

Autonomous systems, 16869, 314

Auxiliary port, 172

Availability, 294, 342, 462

B

Back Orifice Trojan horse, 37375, 391

Backbone networks (BNs), 1215, 23967. See also Switched backbones

architecture layers, 24344

access layer, 243

core layer, 244

distribution layer, 244

architectures, 24358

campus network, 239

components, 24043

enterprise network, 240

gateways, 24243

improving performance, 26061

circuit capacity, 26061

computer and device performance, 260

routers, 24042

switches, 240

Backup, 35859

Bain, Alexander, 5

Bandwidth, 104

limiters, 432

Baseline, 41415

Basic access service. See Basic rate interface (BRI)

Basic rate interface (BRI), 273

Batch processing, 8

Baud rate, 103

Beacon frame, 214

Bell Canada, 270

Bell, Alexander Graham, 56

BellSouth, 7, 270, 284, 315

Biometrics, 384

Bipolar signaling, 98

Bit rate, 103

BITNET network, 9

Bits per second (bps), 15, 104

Gbps, 27

Kbps, 15

Mbps, 27

Pbps, 27

Bluetooth, 226

media access control, 120, 202

topology, 20811

Body, of SMTP packet, 57

BONDING (Bandwidth on Demand Interoperability Networking Group) standard, 86

Border Gateway Protocol (BGP), 16869, 314

Border router, 169

Bottleneck, 223

Bridge Protocol Data Unit (BPDU), 495

Broadband communication, 27

Broadband ISDN (B-ISDN), 27273

Broadband technologies, 318, 328

Broadcast message, 164, 171

Browser, web, 49

Brute-force attacks, 376

Building-block network design process, 41113

cost assessment, 412, 42124

needs analysis, 41218. See also individual entry

technology design, 412, 41821. See also individual entry

Burst error, 123

Bus topology, 208, 228

Business continuity, 342, 35161

denial-of-service protection, 35256

device failure protection, 35657

disaster protection, 35761

intrusion prevention, 36190

intrusion prevention systems, 38788

intrusion recovery, 38890

server and client protection, 36974

social engineering prevention, 38587

theft protection, 356

virus protection, 35152

Byte, 96

C

CA*net, 9, 10, 326

Cable modem termination system (CMTS), 321

Cable modems, 104, 32022

architecture, 32022

types of, 322

Cables, 12

Cat 5, 88

coaxial, 89

connector, 48292

fiber-optic, 8991

looking inside, 11416

managing network, 205

moving, 125

network, 202

patch, 116, 247

plan for, 205

problems with, 204

twisted-pair, 8889, 484

Cabling, 205, 219

Cache engine. See Content engine

Campus network, 239

Canadian Radio-Television and Telecommunications Commission (CRTC), 270

Capacity management, 432

Capacity planning, 419, 428

Career opportunities, 5

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), 21314

contention-based CSMA/CD approach, 213

Carrier Sense Multiple Access with Collision Detection (CSMA/CD), 211, 213

Carrier wave, 101

Carterfone court decision, 6

Casual intruders, 361

Cat 5 cable, 11415

Cat 5e patch cable, 11617

Cat5, 11416

pin connection for, 115, 486

CDMA2000, 501

Cellular technologies, 50001

Cellular telephone, 7, 500

Central authentication, 385

Central distribution facility (CDF), 246

Centralized routing, 167

Certificate, 385

Certificate authority (CA), 381

Chambers, John, 4

Channel service unit (CSU), 273

Channels, 82, 202, 221

Character, in coding, 95

Charge-back policies, 470

Chassis switch, 249

Checksum technique, 127

Ciphertext, 375

Circuit loading, 419, 428

Circuits, 7, 13, 7887

analog, 78

capacity of, 104

configuration, 7980

data flow, 8081

dedicated, 79

designing, 44546

digital, 78

DSL transmission of data, 87

logical, 78

multiplexing, 8187

multipoint, 80

network, 42830

permanent virtual, 282

physical, 78

point-to-point, 7980

shared, 80

simplex, 8081

switched virtual, 282

virtual, 281

Circuit-switched networks, 27173

basic architecture, 27172

integrated services digital network (ISDN), 27273

plain old telephone service (POTS), 272

Circuit-switched services, 271

Cisco telepresence, 62, 64

Classes of service, 156

Classless addressing, 159

Clear to transmit (CTS), 215

Client-based architectures, 40, 4243

Clients, 12

client-based architectures, 40, 4243

protection, 36974

Client-server architectures, 40, 4347

n-tier, 4546

thick-client approach, 46

thin-client approach, 46

three-tier, 44

two-tier, 44

Client-server computing, 8

Closed source software, 372

Closed source software, open source versus, 372

Cloud architecture, 271

Cloud computing, 4748, 27172

Gmail, 48

green computing, 48

server virtualization, 48

Clusters, 41, 431

Coaxial cable, 89

Code Division Multiple Access (CDMA), 500

Codecs, 78

Coding, 9596

Coding scheme, 9597

byte, 96

character, 95

Collapsed backbones, 421

Collision, 211

collision detection (CD), 211

Comfort noise, 498

Committed information rate (CIR), 282

Common carriers, 7, 270

Common Management Interface Protocol (CMIP), 427

Common Messaging Calls (CMC), 54

Common Object Request Broker Architecture (CORBA), 44

Communication media, 8895

coaxial cable, 89

fiber-optic cable, 8991

guided media, 88

media selection, 9495

guided media, 94

network type, 94

radiated media, 94

twisted-pair cable, 8889

wireless media, 88

Communication services, 88

Communications

during Desert Shield/Desert Storm, 10

history of, in North America, 57

Compressed Real Time Protocol (CRTP), 498

Computer Emergency Response Team (CERT), 340

Computer forensics, 389

Confidentiality, 342

Configuration, circuit, 7980

Configuration management, 45456

desktop management, 454

documenting, 45456

network and client computers, configuring, 454

Connectionless messaging, 15556

Connection-oriented messaging, 15556

Connector cables, 48293

data signaling/synchronization, 48788

Ethernet and RJ45, 48892

firewire, 492

null modem cable connections, 48587

RS232 cable standard, 48285

universal serial bus, 49192

Console port, 172

Content caching, 43334

at Olympic Games, 436

Content delivery, 43436

provider, 435

Content engine, 433

Contention, 119, 121

Contention-based CSMA/CD approach, 213

Continuous ARQ, 12829

Continuous data protection (CDP), 359

Control

documenting, 34950

identifying, 34950

Control field, 13335

Control signals, 80

Control spreadsheet, 34549

assets, 34647

threats, 34749

Controlled access, 12122, 215

Controls, network, 34273

basic principles of secure network, 34145

control spreadsheet, 34549

corrective, 34445

detective, 34344

identification and documentation of, 34950

preventive, 343

Convergence, 27

in Maryland, 28

Copyright law, 53

Core BN layer, 244

Core layer, 244, 414

of backbone network, 244

of network, 244

Corrective controls, 344

Corrupted data, 123

Cost assessment

in building-block network design process, 412, 42124

circuit costs, 421

deliverables, 42324

request for proposal (RFP), 422

selling proposal to management, 42223

Cost management, 46772

application software, 468

charge-back policies, 470

client hardware, 468

end user support, 468

network cost of ownership (NCO), 469

network operations, 468

reducing costs, 47072

by automation, 472

by centralizing help desks, 472

by developing standards, 47071

by reducing installation cost, 472

thin-client architectures, 472

sources of costs, 46770

total cost of ownership (TCO), 469

Costs

media selection and, 9495

networking, 472

reducing, 47072

sources, 46770

Crackers, 362

Credit card data theft, 340

Cross-talk, 124

Cryptography, 374

Customer premises equipment (CPE), 87, 318

Cut through switching, 210

Cyclical redundancy check (CRC), 12728

D

Data

corrupted, 123

credit card theft, 340

destruction of, 342

disruptions in, 342

efficiency of, 126

integration with voice and video, 2728

lost, 123

Data access logic, 40

Data between the terminal (DTE), 482

Data circuit terminating equipment (DCE), 482

Data communications, 230

future trends in, 2627

integration with voice, 2728

Data communications networks, 1115

Data compression, 104

Data Encryption Standard (DES), 377

Triple, 377

Data flow, 8081

full-duplex transmission, 81

half-duplex transmission, 8081

simplex transmission, 8081

turnaround time, 81

Data flow diagram (DFD), 208

Data flow, in circuits, 8081

Data link layer, 11945, 50810

address, 158

address resolution, 164

internet model, 18

logical link control (LLC) sublayer, 120

media access control (MAC) sublayer, 12022. See also individual entry

message transmission using, 21

OSI model, 16

Data link protocols, 13136

asynchronous transmission, 13233

point-to-point protocol (PPP), 13536

synchronous transmission, 13336

Data over Cable Service Interface Specification (DOCSIS), 320

Data rate, 104

Data service unit (DSU), 273

Data set, 487

ready, 487

Data signaling/synchronization, 48788

carrier detect, 488

data terminal ready, 488

request to send and clear to send signals, 488

transmit data pins, 488

Data storage, 40

Data synchronization, 48788

Data terminal equipment (DTE), 482

Data terminal ready, 488

Data transmission

DSL and, 87

full-duplex, 81

half-duplex, 80

simplex, 8081

Database servers, 47, 199, 207

Datagram, 281

DDoS agent, 352

DDoS handler, 352

De facto standards, 2223

De juro standards, 2223

acceptance stage, 23

identification of choices stage, 23

specification stage, 23

Decryption, 374

Dedicated circuits, 79

Dedicated-circuit networks, 27379

basic architecture, 27378

distributed star architecture, 274

dedicated-circuit services, 278

mesh architecture, 276

ring architecture, 274

star architecture, 275

T carrier services, 27879

Dedicated-circuit services, 269

Dedicated-server LANs, 199200

Dedicated server networks, 199200

Deep Space Communications Centers (DSCCs), 85

Deliverables

cost assessment, 42324

needs analysis and, 41718

technology design, 42021

Delphi team, 350

Demilitarized zone (DMZ), 366

Denial-of-service attack (DoS), 352

inside, 355

Denial-of-service (DoS) attack, 35255

DDoS agent, 352

DDoS handler, 352

distributed, 353

Denial-of-service protection, 35255

Dense WDM (DWDM), 85

Design, network, 40839

Designated port, 495

Designated router, 169

Desirable requirements, 417

Desktop management, 391, 454

Desktop videoconferencing, 6162

Destination box, 508

Destination port address, 153

Destruction, of data, 342

Detection

anomaly, 387

error, 126

misuse, 387

Detective controls, 343

Device failure protection, 35657

Device management software, 424

Device memory, 43031

Device performance, improving, 260

Devices, managed, 424, 459

Digital circuit, 78

Digital data, 78

analog transmission, 10001

digital transmission of, 9899

translating from analog, 10506

Digital signatures, 378

Digital subscriber line (DSL), 87, 31820

access multiplexer, 319

architecture, 31819

asymmetric, 319

asymmetric DSL (ADSL), 319

data transmission, 318

modem, 318

types of, 31920

Digital transmission, 9899

Digital transmission of analog data, 10508

adaptive differential pulse code modulation (ADPCM), 108

voice data transmission

by instant messenger, 108

by telephones, 10608

voice over internet protocol (VoIP), 108

Digital transmission of digital data, 95100

coding scheme, 9597

double current signaling, 98

ethernet transmitting data, 99100

Manchester encoding, 100

polarity, 97

transmission modes, 9798

Unicode, 96

Direct current (DC), 97

Directional antennas, 205

Directory service, 206

Disaster protection, 35761

avoiding disaster, 357

backup controls, 358

business continuity plan, 358

continuous data protection

(CDP), 359

disaster recovery, 358

disaster recovery drill, 360

disaster recovery outsourcing, 360

disaster recovery plan, 35859

online backup, 360

recovery controls, 358

Disaster recovery, 35860

drill, 360

example of, 358

outsourcing, 36061

Disaster recovery plan, 358

elements of, 359

Disasters, 342

Discard eligible (DE), 282

Discarding port, 495

Disk mirroring, 357

Disruptions, 342

Distance vector dynamic routing, 167

Distortion, 123

harmonic, 125

Distributed Computing Environment (DCE), 44

Distributed computing model, 46

Distributed coordination function (DCF), 214

Distributed denial-of-service attack (DDoS), 352

agent, 352

distributed, 352

handler, 352

Distributed star architecture, 274

Distribution BN layer, 244

Distribution hub, 321

Distribution layer, 244

of backbone network, 24344

of network, 243

Distribution list, 53

Documentation, network, 45456

Domain account, 513

Domain controllers, 206

Domain Name Server (DNS), 163

cache, 19193

recursion attacks, 355

Domain names, 11, 159

registering, 325

Double current signaling, 98

Downtime, 462

DSL access multiplexer (DSLAM), 319

Dumb terminals, 41

Dynamic addressing, 16162

Dynamic Host Configuration Protocol (DHCP), 156, 161

Dynamic routing, 16768

distance vector, 167

link state, 167

E

Eavesdropping, 368

Echoes, 124

Edison, Thomas, 5, 22

Efficiency, of data, 126

802.11a Wi-Fi, 213, 216

802.11b Wi-Fi, 216

802.11g Wi-Fi, 216

802.11i Wi-Fi, 217

802.11n Wi-Fi, 216

802.11n wireless LANs, 30

Electrical current, 97

Electronic mail (email), 5358

distribution list, 53

Internet Message Access Protocol (IMAP), 54

mail transfer agent, 54

mail user agent, 54

Post Office Protocol (POP), 54

three-tier thin client-server architecture, 56

two-tier email architecture, 54

web-based email, 56

working, 5457

Electronic software distribution (ESD), 454

Electronics Industries Association (EIA), 482

Encapsulating Security Payload (ESP), 289, 382

Encapsulation, 21

Encoding

Lempel-Ziv, 104

Manchester, 100, 490

Encryption, 37482

asymmetric encryption, 375

authentication, 37881

brute-force attacks, 376

digital signatures, 378

encryption software, 381382

key management, 376

single key encryption, 37577

algorithm, 375

key, 375

symmetric encryption, 375

triple DES (3DES), 377

End user support, 46667

problem resolution, 466

training for, 467

Energy Sciences Network, 291

Enhanced Data GSM Environment (EDGE), 501

Enhanced Interior Gateway Routing Protocol (EIGRP), 169

Enterprise network, 240

Entity relation diagram (ERD), 208

Entrapment techniques, 389

Error box, 508

Error control, 12331

burst error, 123

corrupted data, 123

error detection, 12628

error prevention, 1256

lost data, 123

sources of errors, 12325

Error correction via retransmission, 12830

Error detection, 12628

checksum technique, 127

cyclical redundancy check, 12728

parity checking, 12627

Error prevention

moving cables, 125

shielding, 125

Error rates, 123

media selection and, 95

Errors

burst, 123

human, 123

minimizing, 124

network, 123

sources of, 12325

Ethernet, 13435. See also Wired Ethernet; Wireless Ethernet

1 GbE, 212

100Base-T, 212

10Base-T, 212

data transmission by, 99100

error control in, 224

gigabit, 15, 213

in home, 352

Manchester encoding, 100

media access control, 21112

RJ45 and, 48891

services, 28485

shared, 208

switched, 219

topology, 208, 213

traditional, 208, 214

types of, 212

European Particle Physics Laboratory (CERN), 49

Even parity, 127

Extensible Authentication Protocol (EAP), 217

Exterior routing protocols, 168

Extranet VPN, 287

Extranets, 15

F

Failure control function, 45962

Failure statistics, 46264

Fake antivirus, 370

Fast packet services, 286

Fat-client approach. See Thick-client approach

Fault management, 45666

failure control function, 45962

network monitoring, 45659

performance and failure statistics, 46264

Fault-tolerant servers, 357

Fax services, 6

Federal Communications Commission (FCC), 6, 270

Fiber channel, 207

Fiber to the home (FTTH), 27, 32223

architecture, 322

types, 322

Fiber-optic cable, 8991, 201

microwave transmission, 9293

radio, 91

satellite transmission, 9394

single-mode, 90

Fiber-to-the-home (FTTH), 329

Fields

address, 133

control, 133, 134

frame check sequence, 134

message, 134

File servers, 12, 200

File sharing, managing, 51824

creating shared folder, 51920

defining security, 52124

enabling sharing, 52021

File Transfer Protocol (FTP), 39

Final Destination, 507

Finger of Death attacks, 355

Firefighting, 450

Firewalls, 36269

application-level firewall, 365

architecture, 366

packet-level firewall, 364

Firewire, 492

Firewire cables, 492

First router (R1), 165

Fixed wireless, 32324

Flag, 133

Flow control, 129

Formal language, 19

Formal standards, 22

40 GbE, 212

Forward error correction, 13031

Forward Ethernet switching, 211

Forwarding equivalence classes (FEC), 259

Forwarding table, 210

4G wireless services, 501

Four-way handshake, 156

Fractional T1 circuit (FT1), 278

Fragment-free Ethernet switching, 211

Fragment-free switching, 211

Frame check sequence field, 134

Frame relay, 28386

in California, 311

Frames, 132, 138

Free speech, Internet and, 53

Frequency, 100

Frequency division multiplexing (FDM), 8284, 87

Frequency modulation (FM), 101

Frequency shift keying (FSK), 101

Full-duplex transmission, 81

Full-mesh architecture, 276

Future trends, 2629

pervasive networking, 2627

G

G.Lite ADSL, 87

Gartner Group, Inc., 469

Gateways, 181, 24243

building TCP/IP, 243

VPN, 28692

Gaussian noise. See White noise

Gbps, 27

Geographic scope, of network, 41415

Geosynchronous satellites, 93

Gigabit Ethernet, 295, 491

Gigabits per second, 15

Gigapops, 325

Pacific/Northwest, 326

Global System for Mobile Communication (GSM), 500

Gmail, 48

Go-Back-N ARQ, 128

Green computing, 48

Green IT, 43637

Ground communication network at NASA, 85

Guardbands, 8283

Guided media, 8895

coaxial cable, 89

fiber-optic cable, 8891

twisted-pair cable, 8889

H

H.320 standard, 62

H.323 standard, 62

Hackers, 362

Half-duplex transmission, 8081

Hamming code, 130

Hardware

improving performance, 22526

layers, 19

life spans of, 411

Header, of SMTP packet, 57

Health Insurance Portability and Accountability Act (HIPAA), 340

Help desk, 459

Hertz (Hz), 98

Hidden node problem, 214

Hierarchical backbones, 250

High-level data link control (HDLC), 134

High-speed serial interface (HSSI), 484

Hi-Speed USB, 491

Honey pot, 389

Hops, 167, 286

Host computer, 40

Host-based IPS, 387

Hotmail, 56

HTTP request, 50

example of, 51

inside, 5051

HTTP response, 50

example of, 52

inside, 5153

HTTP Viewer, 68

Hub polling, 122

Hub-based Ethernet, 208

Hubs, 20305

Human errors, 123

Hurricane Katrina, recovering from, 358

Hybrid fiber coax (HFC), 320

Hypertext Markup Language (HTML), 53

Hypertext networks, 49

Hypertext Transfer Protocol (HTTP), 50

HTTP request, 5051

request body, 51

request header, 51

request line, 50

HTTP response, 5053

response body, 51

response header, 51

I

ICANN (Internet Corporation for Assigned Names and Numbers), 159

ICMP attacks, 355

Identification of choices stage, of standardization process, 23

Idle signal, 132

IEEE 802.11a standard, 216

IEEE 802.15 standard, 242

IEEE 802.1D standard, 494

IEEE 802.1q standard, 254

IEEE 802.1w standard, 495

IEEE 802.3ac standard, 134

Impulse noise, 124

source of, 124

Incoming messages accepting, 50609

Information bits, 136

Information frame, 134

Information lag, 4

Information services, new, 2829

Information sharing, 198

Information sharing through LANs, 198

Information systems, history of, 79

1950s, 8

1970s, 8

1980s, 8

Information utilities, 29

Information warfare, 362, 392

Instant messaging (IM), 6061

Instant messenger, 108

Institute of Electrical and Electronics Engineers (IEEE), standard-making process and, 23

Integrated services digital network (ISDN), 272

basic rate interface, 273

narrowband, 272

primary rate interface, 273

Integration of voice, video, and data, 2728

Integrity, 342

Interchange carriers (IXC), 6, 270

Interface, routing, 165

Interior Gateway Routing Protocol (IGRP), 171

Interior routing protocols, 168

Intermediate System to Intermediate System (IS-IS), 16970

Intermodulation noise, 125

International Organization for Standardization (ISO), 16

standard-making process and, 23

International Telecommunications Union-Telecommunications Group (ITU-T), standard-making process and, 23

Internet, 31164

applications used on, 40

basic architecture, 31214

connecting to ISP, 31416

contemporary, 34243

domain names, 11

free speech and, 53

functioning of, 33843

governance, 32425

history of, 911

integration of, 47475

Internet access technologies, 31723

cable modems, 32022

DSL, 31820

Internet addresses, 159

classes, 159

Internet Architecture Board (IAB), 324

Internet Control Message Protocol (ICMP), 16869

Internet Corporation for Assigned Names and Numbers (ICANN), 159, 325

Internet domain names, 11

Internet Engineering Steering Group (IESG), 324, 325

Internet Engineering Task Force (IETF), 24, 324

management focus on, 24

standard-making process and, 24

Internet Exchange Points (IXPs), 314

Internet Explorer, 12, 17, 49, 51, 145, 154

Internet Group Management Protocol (IGMP), 172

Internet Key Exchange (IKE), 381

Internet Message Access Protocol (IMAP), 5457

Internet model, 1819

application layer, 19

data link layer, 18

hardware layers, 19

internetwork layer, 19

network layer, 18

physical layer, 18

transport layer, 18

Internet Protocol (IP), 15152

spoofing, 365

Internet Research Task Force (IRTF), 324, 325

Internet Service Provider (ISP), 4, 286, 289, 31136

basic architecture, 313

cable modems, 322

fiber to the home (FTTH), 32223

internet today, 31617

national ISPs/tier 1 ISPs, 314

optical unit network (ONU), 322

Internet Society (ISOC), 324

Internet video, at Reuters, 29

Internet2, weather map, 460, 461

Internetwork layer, 19

Internetwork Operating Systems (IOS), Cisco, 173

Interstate Commerce Commission (ICC), 6

Intranet VPN, 287

Intranets, 15

Intrusion, 342

recovery, 38890

Intrusion prevention, 36188

perimeter security and firewalls, 36269

security policy, 362

Intrusion prevention systems (IPS), 38788

anomaly detection, 387

casual intruders, 361

crackers, 362

hackers, 362

host-based IPS, 387

management console, 387

misuse detection, 387

network-based IPS, 387

Intrusion recovery, 38890

Inverse multiplexing (IMUX), 8586

IP Security Protocol (IPSec), 381

IP spoofing, 365

IP telephony, 49799

IP version 4 (IPv4), 151

IPS management console, 387

IPS sensor, 387

IPSec, 287, 381

IPSec transport mode, 382

IPSec tunnel mode, 382

ISO8859, 96

J

Jet Propulsion Laboratory (JPL), 85

K

Kbps, 15

Kerberos, 38586

Kerckhoffs, Auguste, 372

Key, 375, 452

management, 376

private, 378

public, 378

Knoppix, 369

L

L2TP, 286

Label Switched Routers (LSRs), 259

LAN metering software, 198

Latency, 210, 294, 430

Layer address

application, 157

data link, 158

network, 157

Layer-2 switches, 210, 240

Layer-2 tunneling protocol (L2TP), 286

Layer-2 VPN, 286

tunneling protocol, 286

Layer-3 switches, 243

Layer-3 VPN, 286

Layers, 1822. See also Message transmission using layers pros and cons of using, 21

Lempel-Ziv encoding, 104

Lightweight directory services (LDAP), 207

Line noise, 123

Line splitter, 318

Link Access Protocol for Modems (LAP-M), 128

Link Access Protocol-Balanced (LAP-B), 134

Link state dynamic routing, 167

Linux, 30, 49, 59, 132, 199, 206, 371, 432

Load balancing, 4312

at Bryam Healthcare, 435

server, 431

switch, 431

Local account, 513

Local area networks (LANs), 1215, 198237. See also Wired LANs; Wireless LANs

components, 20113

dedicated-server, 199200

design practice, 21823

file servers, 200

improving LAN performance, 22327

circuit capacity, 226

reducing network demand, 22627

server performance, 22426

LAN metering software, 198

peer-to-peer LANs, 199200

print servers, 200

usage reasons, 19899

information sharing, 198

resource sharing, 198

Local exchange carriers (LEC), 6, 270

Local loop, 107, 318

Logical circuit, 78

Logical link control (LLC) sublayer, 120

Logical network design, 414

Logical network parameters, 45859

Logical topology, 208

Long-distance telephone, 6

Lost data, 123

Low earth orbit (LEO) satellites, 93

M

MAC address filtering, 217

Macintosh, 49

Mail transfer agent, 54

Mail user agent, 54

Main distribution facility (MDF), 246, 344

network diagram, 248

Mainframe, 41

Managed devices, 424, 459

Managed networks, 42454

policy-based management, 42728

software, 42426

standards, 42627

Management console, IPS, 387

Management implications, application layer, 6364

Management information base (MIB), 427

Management reports, 461, 464

Management, implications for, 2930

backbone networks and, 261

data transmission and, 109

Internet and, 328

local area networks and, 227

MANs and WANs, 261

network design and, 42738

network management and, 47273

network security and, 39192

networking environment and, 2930

networks and, 63

protocol and, 139

TCP/IP and, 182

WLAN and, 227

Management, network, 44973

Manager

network, 59, 450

network policy, 407

network security, 391

Manchester encoding, 100, 490

Mandatory requirements, 417

Master, 217

Maximum allowable rate (MAR), 282

Mbps, 27

MCI, 6

Mean Opinion Score (MOS), 498

Mean time between failures (MTBF), 462

Mean time to diagnose (MTTD), 462

Mean time to fix (MTTF), 463

Mean time to repair (MTTR), 462

Mean time to respond (MTTR), 463

Media access control (MAC), 12021, 21112

Bluetooth and, 226

contention, 121

controlled access, 12122

distributed coordination function, 214

Ethernet and, 21112

point coordination function, 21415

relative performance, 122

sublayer, 120

switched Ethernet and, 219

Wi-Fi and, 21318

WiMAX and, 323

Media communication, 8895

guided, 88

selection, 9495

wireless, 88

Media Gateway Control Protocol (MGCP), 497

Media selection

cost and, 95

error rates and, 95

network types, 94

transmission distance and, 95

transmission speeds and, 95

Memory, device, 430

Mesh architecture, 274, 276

full-mesh architecture, 276

partial-mesh architecture, 276

Message box, 505

Message field, 134

Message Number box, 508

Message transmission using layers, 1922, 149

application layer, 19

common standards, 2425

data link layer, 21

network layer, 20

physical layer, 21

protocol, 19

transport layer, 20

Messages from the Network Layer, 508

Messages from the Physical Layer pile, 509

Messaging

connectionless, 156

connection-oriented, 15556

Metcalfe, Bob, 134

Metropolitan area exchange (MAE), 313

Metropolitan area networks (MAN), 1215

best practice design, 31820

of Cisco Systems Inc., 290

improving performance, 29497

relationship to other networks, 14

Microcomputer, explosion in, 450

Microsoft Outlook, 57

Microsoft Windows Server, 199

Microwave tower, 92

Microwave transmission, 9293

Middleware, 44

Middleware problem, 44

Mini-cases

ABC Warehouse, 232

Accurate Accounting, 67, 442

AdviceNet, 442

Amalgamated Stores, 113

Asia Importers, 34

Atlas Advertising, 33

Belmont State Bank, 395

Big E. Bank, 3234

Boyle Transportation, 114

CareGroup, 300

Cathy's Collectibles, 332

Central Textiles, 476

Central University, 185

CISCO Systems Inc., 301

City School District, 476

Classic Catalog Company, 396

Computer Dynamics, 441

Connectus, 185

Consolidated Supplies, 33

Cookies Are Us, 300, 332

Deals-R-Us Brokers, 667

Drop and Forge, 441

Energy Sciences Network, 301

Ethernet, designing, 230

Eureka!, 113, 231

fire departments, 301

Fred's Donuts, 185

General Hospital, 255

General Stores, 187

Global Consultants, 33

Hospitality Hotel, 262

Household Wireless, 231

Internet2, 476

Ling Galleries, 67

Mary's Manufacturing, 442

Mega Investments, 34

MegaCorp, 300

Metro Motel, 232

NASA's Ground Network, 114

Old Army, 187

Organic Foods, 332

Pat's Engineering Works, 263

Pat's Petunias, 23031

personal security, 396

Sally's Shoes, 231

Salt Lake City Olympics, 442

South West State University, 231

Speedy Package, 114

Sunrise Consultancy, 300

Surfing Sam, 332

SURFnet, 301

Tom's Home Automation, 231

Ubiquitous Offices, 232

Western Bank, 395

Western Trucking, 264

Mission-critical application, 347

Misuse detection, 387

Mobile wireless, 323

Modems, 78, 104

cable, 32022

data transmission by, 104

defined, 105

DSL, 318

Modulation, 10003

adaptive differential pulse code, 108

amplitude, 101

basic, 10102

bit rate versus baud rate versus symbol rate, 103

frequency, 101

phase, 102

pulse amplitude, 107, 491

pulse code, 107

quadrature amplitude, 103

sending multiples bits simultaneously, 10203

Modules, 249

Monitoring, network, 45659

Monopoly, 7

Morse, Samuel, 5

Mosaic browser, 49

MoSucker Trojan horse, 373

MPEG-2 standard, 63

Multicast message, 171

Multicasting, 17172

broadcast message, 171

unicast message, 171

Multi-Level Transmission–3 Level (MLT-3), 490

Multimode fiber-optic systems, 89

Multiplexing, 8187

BONDING (Bandwidth on Demand Interoperability Networking Group), 8687

frequency division multiplexing (FDM), 8283

inverse multiplexing (IMUX), 8586

statistical time division multiplexing (STDM), 8384

time division multiplexing (TDM), 83

wavelength division multiplexing (WDM), 8485

Multipoint circuit, 80

Multiprotocol label switching (MPLS), 259, 282, 28586

Multiprotocol routers, 259

Multipurpose Internet Mail Extension (MIME), attachments in, 58

Multiswitch VLAN, 254

N

Name servers, 163

Nanoseconds, 490

Narrowband ISDN, 272

NASA, ground communication, network of, 85

National Center for Supercomputing Applications (NCSA), 49

National Science Foundation, 9

Needs analysis

in building-block network design process, 41218

access layer, 414

application systems, 41516

categorizing needs, 417

core layer, 414

deliverables, 41718

desirable requirements, 417

distribution layer, 415

geographic scope, 41415

mandatory requirements, 417

network users, 416

wish-list requirements, 417

Negative acknowledgment (NAK), 128

Net neutrality, 10

NetEqualizer, 432

Network

cables, 12

circuit, 12

file server, 12

future trends, 2629

models, 1522

peer-to-peer networks, 12

print server, 12

router, 12

standards, 2225

switch, 12

types of, 1215

web server, 12

Network access points (NAP), 312

inside Chicago, 316

Network address translation (NAT), 36566

Network cables, 203

standards, 202

Network circuits, 20103, 42830

service-level agreement (SLA), 430

traffic analysis, 42829

Network computer, 41

Network cost of ownership (NCO), 469

Network demand, reducing, 22627, 28586, 29697

Network design, 40847

building-block network design process, 41113

cyclical nature of network design, 413

for performance, 42427

alarm storm, 425

application management software, 426

capacity management, 432

device management software, 42425

device memory, 43031

load balancing, 43132

managed networks, 42428

management software, 424

minimizing network traffic, 43236

network circuits, 42830

network devices, 43032

network management standards, 426

policy-based management, 427

root cause analysis, 425

system management software, 425

virtual server, 43132

traditional process, 41011

Network devices, 43036

capacity management, 432

content caching, 43334

content delivery, 43436

latency of, 430

load balancing, 43132

memory, 43031

minimizing traffic, 43233

Network documentation, 454

Network interface cards (NIC), 201

Network interface port, 172

Network layer, 14894, 50607

address, 157

internet model, 18

message transmission using, 2021

OSI model, 17

Network management, 44980. Seealso Configuration management

failure control function, 45962

firefighting, 450

improving performance, 46566

integrating LANs, WANs, and Internet, 45152

internet2 weather map, 46061

logical network parameters, 458

manager job requirements, 453

organizing, 45053

performance and failure statistics, 46264

physical network parameters, 458

policy-based management, 465

problem statistics, 461

shift to Internet, 45051

shift to LANs, 45051

software, 427

standards, 426

voice and data communications, integrating, 45253

weather map, 459

Network models, 1522

Internet model, 1819

message transmission using layers, 1922

Open Systems Interconnection Reference (OSI) model, 1618

Network monitoring software, 478

Network operating systems (NOS), 20607

client software, 20607

network profiles, 207

server software, 206

Network operations center (NOC), 458, 460

Network policy manager, 457

Network profiles, 207

Network security, 338407. See also Encryption; Intrusion prevention; Risk assessment

device failure protection, 35657

disaster protection, 35761

ensuring business continuity, 35161. See also Business continuity

evaluating, 35051

firewalls, 36269

need for, 34142

network controls, 34245

operating systems, 371

perimeter security, 36269

phishing, 387

physical security, 356

redundancy, 356

security policy, 362

security threats, types of, 342

availability, 342

business continuity, 342

confidentiality, 342

destruction of data, 342

disasters, 342

disruptions, 342

integrity, 342

intrusion, 342

server and client protection, 36974

theft protection, 356

Network segmentation, 226

Network servers, 206

Network standards, 2226

common, 2426

standards-making process, 2224

Network support technician, 136

Network terminator (NT-1 or NT-2), 272

Network traffic, minimizing, 43236

content caching, 433

content delivery, 434

content delivery provider, 435

content engine, 433

green IT, 43637

Network users, 416

Network weather map, 459

Network-attached storage (NAS) devices, 207

Network-based IPS, 387

Networking, 8

car, 419

costs, 472

expertise, demand for, 5

passive optical, 322

pervasive, 2627

Networks/Networking, 89

access layer, 414

backbone, 12

campus, 239

circuit-switched, 27173

components of, 12

core layer, 244

dedicated server, 199200

dedicated-circuit, 27378

distribution layer, 414

efficiency, 136

enterprise, 240

errors, 123

geographic scope of, 41415

ground communication, 85

hypertext, 49

local area networks, 12

managed, 42428

metropolitan area networks, 12

monitoring, 45659

overlay, 219

packet-switched, 27986

peer-to-peer, 12, 200

secure, 342

types of, 1215, 94

users, 416

wide area networks, 15

New information services, 289

Next Generation Internet (NGI), 326, 328

Next Node, 50708

Noise

impulse, 124

intermodulation, 125

white, 123

North America

communications in, 57

cellular telephone networks, 7

fax services, 6

history, 57

long-distance telephone, 6

picturefone service, 6

Telstar I satellite, 6

transatlantic voice connections, 6

transcontinental telephone service, 6

NSFNET, 9, 10

N-tier architecture, 4546

Null modem cable connections, 48587

pin configurations, 486

O

Odd parity, 127

Omnidirectional antennas, 204

1 GbE, 212, 495

1000Base-T, 212, 226, 249, 490

100Base-T, 212, 218, 490

1 GbE, 49091

One-time passwords, 384

1000Base-T standard, 212, 490

100Base-T standard, 212, 490

Online backup services, 360

Open Database Connectivity (ODBC), 44

Open Shortest Path First (OSPF), 169

Open source software, closed, source versus, 372

Open Systems Interconnection Reference (OSI) model, 1618

application layer, 18

data link layer, 16

network layer, 17

physical layer, 16

presentation layer, 17

session layer, 17

transport layer, 17

Operating systems, security, 371

Operating systems, server and, client protection and, 36974

Optical unit network (ONU), 322

Optical-electrical (OE) converter, 321

Optix Pro Trojan horse, 373

Ordered chaos, 211

Outgoing messages, accepting, 506

Outsourcing, disaster recovery, 36061

Overhead bits, 136

Overlay networks, 219

Oversampling, 105

P

Packet assembly/disassembly device (PAD), 280

Packet service, 284

unreliable, 283

Packet-level firewall, 36465

Packet-switched networks, 27986

asynchronous transfer mode, 28283

basic architecture, 28081

Ethernet services, 28485

frame relay, 28384

X.25, 484

Parallel transmission, 97

Parity bit, 126

Parity check, 12627

Parity checking, 126

even parity, 127

odd parity, 127

Partial-mesh architecture, 276

Pass phrases, 383

Passive optical networking, 322

Passive scanning, 214

Passphrases, 383

Passwords, 383

cracking, 383

one-time, 384

Patch, 369

Patch cables, 247

Pbps, 27

Peering, 314

Peer-to-peer (P2P) architectures, 40, 4647

advantages, 47

scalability, 47

Peer-to-peer LANs, 199200

Peer-to-peer networks, 12, 200

Performance

designing for network, 42463

managed networks and, 42428

network circuits and, 42830

network devices and, 43032

Performance and failure statistics, 46264

Performance improvement, in satellite communications, 94

Performance management, 45666

failure control function, 45962

improving performance, 46566

network monitoring, 45659

performance and failure statistics, 46264

Performance statistics, 46264

Perimeter security and firewalls, 36269

application-level firewall, 365

firewall architecture, 36668

network address translation firewalls, 36566

packet-level firewalls, 39192

physical security, 36768

Perl, 56

Permanent virtual circuits (PVC), 282

Permissions, 518

Personal computer, 41

Personal digital assistants (PDA), 41, 500

Pervasive networking, 2627

Phase, 100

Phase hits, 107

Phase modulation (PM), 10203

Phase shift keying (PSK), 102

Phishing, 387

attack, 401

Physical carrier sense method, 214

Physical circuit, 78

Physical layer, 77117, 51011. See also Circuits

internet model, 18

message transmission using, 21

OSI model, 16

Physical network

design, 415

parameters, 458

Physical security, 356, 36769

data security and, 369

Physical topology, 208

Piconet, 243

Picturefone service, 6

Pin configurations, 486

PING, 18890

Piracy, software, 199

Plain old telephone service (POTS), 100, 272

Plaintext, 374

Podcasting, 181

Point coordination function (PCF), 21415, 323

Point-to-point circuit, 79

Point-to-point protocol (PPP), 13536

Points of presence (POP), 282, 314

Polarity, 97

Policy-based management, 42728, 465

Polling, 121

hub, 122

roll-call, 121

Port, 203204

designated, 495

Port address, 153

destination, 153

source, 153

Post Office Protocol (POP), 54

POTS (plain old telephone service), 100

Power over Ethernet (POE), 204

Preamble, 134

Presentation layer, OSI model, 17

Presentation logic, 40

Pretty Good Privacy (PGP), 381

Preventive controls, 343

Primary access service. See Primary rate interface (PRI)

Primary rate interface (PRI), 273

Print servers, 12, 200

Private Branch Exchange (PBX), 497

Private key, 378

Private line services, 273

Probe frame, 214

Problem prioritizing, 461

Problem statistics, 461

Problem tracking, 460

Propagation delay, 93

Proposals, selling to management, 47273

Protocol, 19, 22, 50

data link, 1316

exterior routing, 168

interior routing, 168

point-to-point, 13536

routing, 16871

spanning tree, 49396

stack, 22

Protocol Data Unit (PDU), 19, 20, 120, 149

Public key, 378

encryption, 378

Public key infrastructure (PKI), 378, 380

Public switched telephone network (PSTN), 271, 497

Public utilities commission (PUC), 270

Public Wi-Fi, 198, 213

Pulse Amplitude Modulation (PAM), 10607

Pulse Amplitude Modulation–5 (PAM-5), 491

Pulse code modulation (PCM), 107

PuTTY package, 59

Q

Quadrature amplitude modulation (QAM), 103

Quality control charts, 464

Quality of Service (QoS), 15657, 499

Quantizing error, 105

R

Rack of equipment, 246

Radiated media, 94

Radio frequencies, 9193

Radio Frequency Identification (RFID) chip, 60

Radio transmission, 9193

Raindrop attenuation, satellite transmission and, 93

RC4, 377

RC4 encryption algorithm, 377

Real-Time Streaming Protocol (RTSP), 157

Real-Time Transport Protocol (RTP), 157

Recovery controls, 358

Redundancy, 356

Redundant array of independent disks (RAID), 226, 357

Regional Bell operating companies (RBOCs), 6

Regional ISP, 313

Relative performance, 122

Reliable packet service, 283

Remote monitoring (RMON), 427

probes, 427

Remote-access server (RAS), 314

Repeaters, 125

Replication, 163

Request body, 51

Request for Comment (RFC), 24

Request for proposal (RFP), 422

Request header, 51

Request line, 50

Request to transmit (RTS), 215

Requests for comment (RFC), 324

Requirements, network

desirable, 417

mandatory, 417

wish-list, 417

Resolution

address, 16265. See also Addressing

server name, 16265

Resolving problems, 46667

Resource Reservation Protocol (RSVP), 157

Resource sharing through LANs, 198

Response body, 52

Response header, 52

Response status, 52

Retrain time. See Turnaround time

Retransmission, error correction via, 12830

Return to zero (RZ), 98

Reuters, Internet video at, 29

Rich Site Summary (RSS), 181

Ring architecture, 27475

Ring indicator, 487

Risk assessment, 34551

assets, 34647

control spreadsheet, developing, 34549

identifying and documenting control, 34950

threat, 34748

RJ– 45, 48891

Roaming, 247

Roll-call polling, 121

Root cause analysis, 425

Root node, 495

Root switch, 495

Rootkits, 373, 375

Routed backbones, 24952

design, 250

hierarchical backbones, 250

subnetted backbones, 250

Routers, 12, 24042

anatomy of, 17273

auxiliary port, 172

border, 169

console port, 172

designated, 169

functions, 172

label switched, 259

multiprotocol, 259

network interface port, 172

Routing, 16573

centralized routing, 167

distance vector dynamic routing, 167

dynamic routing, 167

first router (R1), 165

interface, 165

link state dynamic routing, 167

multicasting, 17172

protocols, 16871

autonomous system, 168

Border Gateway Protocol (BGP), 16869

Enhanced Interior Gateway

Routing Protocol (EIGRP), 169

exterior routing protocols, 168

interior routing protocols, 168

Intermediate System to

Intermediate System (IS-IS), 169

Internet Control Message Protocol (ICMP), 16869

Open Shortest Path First (OSPF), 16970

Routing Information Protocol (RIP), 158, 168, 170

static routing, 167

types, 16768

RS232 (DB-25)/RS449 (DB-9), 48285

RS232 cable standard, 48285

RS449 cable specifications, 48285

S

Sarbanes-Oxley Act (SOX), 340

Satellite transmission, 9394

geosynchronous, 93

improvement of performance, 94

raindrop attenuation and, 93

Satellite, 9394

Scalability, 47

Scanning, 214

Script kiddies, 344

Secure network, principles of, 342

Secure shell (SSH) encryption, 59

Secure Sockets Layer (SSL), 381

Secure switch, 369

Security

media selection and, 94

network, 33892

Security account manager (SAM), 383

Security holes, 362, 369

exploiting, 371

Security policy, 390

elements of, 391

Security, network. See Network security

Segment, 149

Segmenting, 15455

Sequence number, 506

Serial transmission, 97

Server, 12, 41

server farms, 199, 431

server name resolution, 162

server protection, 36974

server virtualization, 4849, 43132

web, 50

Server and client protection, 36974

encryption, 37482

operating systems, 37173

security holes, 36970

Trojan horses, 37374

Server farm, 29, 199

Server load balancing, 431

Servers, 12

authentication, 385

clusters, 431

database, 207

farms, 199

fault-tolerant, 357

file, 12, 200

as honey pot, 389

improving performance, 22426

print, 12, 200

remote-access, 314

software for, 206

technology design, 412, 41821

terminology for, 159

virtual, 41, 431

Web, 12

Windows, 51324

wireless telephony application, 350

Service profile identifier (SPID), 273

Service-level agreement (SLA), 430, 465

Session Initiation Protocol (SIP), 497

Session layer, OSI model, 17

Session management, 15557

connectionless messaging, 155

connection-oriented messaging, 15556

four-way handshake, 156

Quality of Service (QoS), 156

three-way handshake, 155

Shared circuit, 80

Shared Ethernet, 208

Shared folder, creating, 519

Shielded twisted pair (STP), 201

Shielding, 125

Shields Up website, 402, 403, 405

Signaling rate, 490

Signal-to-noise ratio (SNR), 237

Simple Mail Transfer Protocol (SMTP), 5458

inside SMTP packet, 578

body, 57

header, 57

message ID, 58

Simple Network Management Protocol (SNMP), 427

Simplex circuit, 81

Simplex transmission, 80

Simulation, 420

Single key encryption, 37577

Single-mode fiber-optic cable, 90

Single-switch VLAN, 252

Site survey, 220

Skinny Call Control Protocol (SCCP), 497

Slash notation, 159

Sliding window, 129

Small office, home office (SOHO), 204

environments, designing for, 22223

Smart card, 383

SmartDraw, 469

system management, 452

VPN, 313, 315316

SmartDraw software, 445

Sniffer program, 369

Social engineering, 388

Social engineering, preventing, 38587

Software, 225

Akamai, 43536

antivirus, 352

application management, 426

audit, 199

client, 20607

device management, 424

encryption, 38182

improving performance, 218

network management, 42426

network monitoring, 456

open versus closed source, 372

piracy, 199

server, 206

Software Publishers Association (SPA), 199

SOHO switch, 203

Something you are approach, 383

Something you have approach, 383

Something you know approach, 383

SONET services. See Synchronous optical network (SONET)

Sony's spyware, 375

Sound wave, 100

Source address, 134

Source box, 508

Source port address, 153

Spanning tree protocol, 49396

Specification stage, of, standardization process, 23

Sprint, 31617

Spyware, 374

at Sony, 375

Standardization process, 23

acceptance stage, 23

identification of choices stage, 23

specification stage, 23

Standard-making process

American National Standards Institute, 23

Institute of Electrical and Electronics Engineers, 23

International Organization for Standardization and, 23

International

Telecommunications

Union-Telecommunications

Group, 23

Internet Engineering Task Force, 24

Standards, network, 2225

American National Standards Institute (ANSI), 23

De facto standards, 22

De juro standards, 22

importance of, 22

Institute of Electrical and Electronics Engineers (IEEE), 23

International Organization for Standardization (ISO), 23

protocols, 24

Telecommunications Group (ITU-T), 23

Star architecture, 275

Start bit, 132

Static routing, 167

Statistical time division multiplexing (STDM), 8384

Stop bit, 132

Stop-and-wait ARQ, 128, 214

Storage area network (SAN), 207

Store and forward switching, 211

Store Ethernet switching, 211

Structured query language (SQL), 40

Subnets, 16061

Subnetted backbones, 250

Supervisory frame, 134

Switch, 12, 107

Switch-based Ethernet, 208

cut-through switching, 210

forward switching, 211

fragment-free switching, 211

latency, 210

store switching, 211

Switched backbones, 24449

chassis switch, 249

main distribution facility (MDF), 246

modules, 249

network design, 24546

patch cables, 247

Switched Ethernet, 20811

media access control, 21112

performance benefits, 276

topology, 20811

Switched virtual circuits (SVCs), 282

Switched-circuit services

integrated services digital network, 27273

plain old telephone service, 100, 272

Switches, 203, 240, 431, 495

chassis, 249

layer-2, 240

layer-3, 243

load balancing, 431

root, 495

Switching

fragment-free, 211

store and forward, 211

Symbol rate, 79, 103

Symmetric encryption, 375

Symmetric multiprocessing (SMP), 226

Synchronization, 132

Synchronization characters (SYN), 133

Synchronous data link control (SDLC), 13334

Synchronous digital hierarchy (SDH), 279

Synchronous optical network (SONET), 27879

Synchronous transmission, 13336

Ethernet, 13435

high-level data link control, 134

point-to-point protocol, 13536

synchronous data link control, 13334

System management software, 425

T

T carrier circuits, 278

T carrier services, 27879

fractional T1, 278

synchronous optical network (SONET), 279

T1 circuit, 278

T3 circuit, 278

T1 circuit, 278

fractional, 278

T2 circuit, 278

T3 circuit, 278

T4 circuit, 278

Tagging, with RFID chip, 60

Tbps, 27

TCP/IP. See Transmission Control Protocol/Internet Protocol (TCP/IP)

TCP connection, 155

TCP SYN floods, 355

Technical reports, 462

Technology design

in building-block network design process, 41821

capacity planning, 419

circuit loading, 419

circuits, designing, 41920

clients, designing, 41819

design tools, 420

devices, designing 41920

servers, designing, 41819

turnpike effect, 419

Telecommunications Act, 53

Telecommunications Group (ITU-T), 23

Telecommunications, 11

Telephone

relative capacities of, 26

transmission of voice data, 91

voice data transmission by, 10608

Telepresence, Cisco, 64

Telnet, 5960, 132, 398

Telstar I satellite, 6

10Base-T standard, 212, 48890

10 GbE, 212, 213

10/100 Ethernet, 316

10/100/1000 Ethernet, 212

Terminal, 41

dumb, 41

transaction, 41

Terminal adapter (TA), 272

Theft, credit card data, 340

Theft protection, 356

Thick-client approach, 46

Thin-client approach, 46

Threats

control spreadsheet, 34549

security, 342

3G wireless, 501

Three-tier architecture, 4445

Three-tier thin client-server architectures, 5657

Three-way handshake, 155

Throughput, 13738

Ticket-Granting Ticket (TGT), 386

Tier 1 ISP, 312

Tier 2 ISP, 313

Tier 3 ISP, 315

Time-based tokens, 384

Time Division Multiple Access (TDMA), 500

Time division multiplexing (TDM), 82, 83

Token passing, 122

Tokens, 384

time-based, 384

Toolkits, network management, 438

Topology, 20811

bus, 208, 228

logical, 208

physical, 208

Total cost of ownership (TCO), 469

TracePlus Ethernet, 22728

TRACERT, 192, 194

Traditional network design process, 41011

Traffic analysis, 354, 42829

Traffic anomaly analyzer, 354

Traffic anomaly detector, 354

Traffic filtering, 353

Transaction terminal, 41

Transmission asynchronous, 13233

laser/LED/fiber optic cable, 89

microwave, 9293

satellite, 9393

synchronous, 13235

Transmission Control Protocol/Internet Protocol (TCP/IP), 148, 15052

example, 17481

known addresses, different subnet, 17778

known addresses, same subnet, 17477

TCP connections, 179

TCP/IP and network layers, 17981

unknown addresses, 17879

network layer protocol, 150

TCP/IP game, 50212

general rules, 50203

transport layer protocol, 150

Transmission distance, media selection and, 95

Transmission efficiency, 13639

defined, 137

Transmission modes, 9798

digital transmission, 9899

bipolar signaling, 98

unipolar signaling, 98

parallel transmission, 97

serial transmission, 97

Transmission rate of information bits (TRIB), 139

calculation of, 139

Transmission speeds, media selection and, 95

Transmit data pins, 488

Transport layer, 14894, 50506

functions, 15257

internet model, 18

linking to application layer, 15354

message transmission using, 20

OSI model, 17

segmenting, 15455

session management, 15557

Transport mode, in IPSec, 382

Transport/network layer protocols, 15052

Internet protocol, 15152

transmission control protocol, 151

Triple DES (3DES), 377

Trojan horses, 37374

Black Orifice, 402

at home, 376

MoSucker, 373

Optix Pro, 373

Trouble report, elements of, 463

Trouble tickets, 460

Tunnel mode, in IPSec, 382

Turnaround time, 81

Turnpike effect, 419

Twisted-pair cable, 8889, 203

Two-bit amplitude modulation, 103

Two-tier architecture, 4445, 49

World Wide Web as, 49

Two-tier e-mail architecture, 5456

U

Unicast message, 171

Unicode, 96

Uniform resource locator (URL), 50

Uninterruptable power supplies (UPS), 108, 357

Unipolar signaling, 98

United States of America Standard Code for Information Interchange (USASCII), 96

Universal Serial Bus (USB), 49192

University Corporation for Advanced Internet Development (UCAID), 326

UNIX, 49, 59

process table attacks, 355

Unreliable packet service, 283

Unshielded twisted-pair (UTP) wires, 201

User accounts, managing, 51316

active directory, 513

creating users, 51314

domain account, 513

group, 513

local account, 513

setting user properties, 51516

User authentication, 38285

access cards, 383

account, 382

automated teller machine (ATM) network, 383

one-time passwords, 384

passphrases, 383

passwords, 383

smart card, 383

time-based tokens, 384

token, 384

user profile, 382

User Data space, 50607

User Datagram Protocol (UDP), 151, 156

attacks, 355

User profile, 207, 382

V

V.44 standard, 104, 110

Video, integration with voice and data, 2728

Videoconferencing, 6163

desktop, 6163

H.320 standard, 62

H.323 standard, 62

MPEG-2 standard, 63

webcasting, 63

Virtual carrier sense method, 214

Virtual circuit, 281

Virtual LANs (VLANs), 25258

benefits of, 253

design, 25859

multiswitch VLAN, 254

single-switch VLAN, 252

VLAN tag, 256

VLAN trunks, 257

working, 255

Virtual private networks (VPNs), 28692

access VPN, 287

basic architecture, 28687

extranet VPN, 287

intranet VPN, 287

layer-2 tunneling protocol (L2TP), 286

layer-3 VPN, 286

VPN gateway, 286

VPN software, 286

working, 28892

Virtual server, 41, 43132

Virus protection, 35152

Viruses, 351

VLAN ID, 25558

VLAN tag, 13435, 25457

VLAN trunks, 257

Voice Activity Detection (VAD), 498

Voice communications

integration with data, 452

integration with video and data, 2728

Voice data

instant messenger transmission of, 10809

telephone transmission of, 318

Voice data transmission

by instant messenger, 108

by telephones, 10608

Voice over ATM (VoATM), 497

Voice over Frame Relay (VoFR), 497

Voice over Internet Protocol (VoIP), 27, 10809, 497

VoIP. See Voice Over Internet Protocol (VoIP)

Voltage, 97

W

Wal-Mart, 8

Warchalking, 216

Wardriving, 216

War-walking, 235

Watson, Tom, 5

Wavelength division multiplexing (WDM), 8185, 322, 328

Weather map, Internet2, 334, 460

Weather map, network, 459

Web browser, 12, 44, 153, 302

Web packets, 63

Web server, 12, 51

response from, 51

Web-based email, 5657

Webcasting, 65

Westinghouse, George, 22

White noise, 12324

Wide area networks (WANs), 15, 268309. See also Circuit-switched networks; Dedicated-circuit networks; Packet-switched networks

design, 29294

improving performance, 29497

circuit capacity, 29596

device performance, 29495

reducing network demand, 29697

Wideband Code Division Multiple Access (WCDMA), 501

Wi-Fi, 21322

802.11a, 216

802.11b, 216

802.11g, 216

802.11n, 216

on cruise ships, 236

interference, 220

media access control, 120, 140

mooching, 218

public, 235

topology, 245

tourism and types of, 21516

Wi-Fi Protected Access (WPA), 217

WiMAX (Worldwide Interoperability for Microwave Access), 323

media access control, 323

topology, 323

types of, 323

Windows, 22, 30, 49, 59, 96, 175, 200, 206, 371, 515

Windows server, 199, 51324

managing file sharing, 51824

managing user accounts, 51318

Wire speed, 430

Wired Equivalent Privacy (WEP), 216

Wired Ethernet, 20813, 21920

error control in, 224

media access control, 21112

shared Ethernet, 208

switch-based Ethernet, 20809

topology, 20811

bus topology, 208

frames, 208

hub-based Ethernet, 20809

logical topology, 208

physical topology, 208

Wired LANs, 201

Wireless Application Environment (WAE), 350

banking and, 213

Wireless Ethernet, 21318, 22022

802.11a, 216

802.11b, 216

802.11g, 216

802.11n, 216

associating with AP, 214

association, 213

controlled-access methods, 215

distributed coordination function (DCF), 214

frame layout, 215

hidden node problem, 214

MAC address filtering, 217

media access control, 21315

point coordination function (PCF), 214

security, 21618

site survey, 220

topology, 213

types of, 21516

virtual carrier sense method, 214

Wireless LANs (WLANs), 33, 91, 144, 20203, 221, 22829, 235, 457, 501

802.11i, 217

access points, 20203

best practice design, 218, 424

Bluetooth, 226

circuit capacity improvement, 26061, 419

components of, 198213

device performance improvement, 29497

improving performance, 22427

MAC address filtering, 217

multistory design, 221

network interface cards, 201, 227

physical design, 420

radio frequencies, 80, 213

recommendations for, 261, 292

reducing network demand, 22627

security, 217

SSID, 237

Wi-Fi, 198228

Wi-Fi Protected Access, 217

WiMAX, 318, 323, 329

Wired Equivalent Privacy, 21617

Wireless media, 88, 9195

radio transmission, 91

microwave transmission, 9394

in Munich airport, 91

satellite transmission, 9394, 125, 130, 139

Wireless networking, 10, 201

Wireless telephony application (WTA) server, 350

Wish-list requirements, 417

Workgroup switch, 214

World Wide Web, 4953

functioning of, 4950

Web browser, 49

Web server, 50

Worldwide Interoperability for Microwave Access (WiMAX), 323

Worm, 340, 352, 370, 393

Slammer, 399

X

X.25 packet switching, 484

Y

Yahoo, 34, 316, 319, 344, 431, 43436

Yipes.com, 87, 284

Z

Zero day attacks, 370

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.111.107