Abilene network, 326, 329, 334, 458, 460
Acceptance stage, of standardization process, 23
Access BN layer, 243
Access control list (ACL), 173, 364–65, 518–19
Access layer, 414
of backbone network, 9, 12–14, 25, 126, 239–62, 346, 359
of network, 245, 250, 259, 356, 414–16, 421
Access points (AP), 201–03, 219–20, 226, 232, 241, 248, 255, 318, 326, 362–63
Access request technique, 121
Acknowledgment (ACK), 128
negative, 128
Active Directory Service (ADS), 206
Adaptive differential pulse code modulation (ADPCM), 108, 498
Address field, 133–35, 151, 215
Address resolution, 162–65, 193
data link layer, 16–19, 21, 25, 30, 120, 126–27, 131–32, 135, 157–65, 178–79, 502–12
server name resolution, 162–64
Address Resolution Protocol (ARP), 165
data link layer address resolution, 164
domain name service (DNS), 163
server name resolution, 162
application layer address, 157
classless addressing, 159
data link layer address, 158
internet addresses, 159
network layer address, 157
subnet mask, 161
types of, 158
Advanced Encryption Standard (AES), 217, 377
Advanced Research and Development Network Operations Center (ARDNOC), 326
Adware, 374
Agent, 427
Ticketmaster and, 434
message, 424
storm, 425
Alternating current (AC), 97
American National Standards Institute (ANSI), 23
American Telephone and Telegraph Company (AT&T), 6, 295, 312, 341, 356
global/IP network, 470
Amperes (amps), 97
Amplifiers, 125
Amplitude, 100
Amplitude modulation (AM), 101
Amplitude shift keying (ASK), 101
Analog circuit, 77
Analog data, 78
translating to digital, 105–06
Analog transmission of digital data, 100–04
amplitude modulation (AM), 101
bit rate versus baud rate versus symbol rate, 103
frequency modulation (FM), 101–02
modems transmitting data, 104
data compression, 104
basic modulation, 101
multiple bits, sending, 102
quadrature amplitude modulation (QAM), 103
Anomaly detection, 387
Antennas
directional, 205
omnidirectional, 204
Antivirus software, 352
AOL Instant Messenger, 60
Apple Mac Operating System, 59, 206
Application architectures, 40–64
client-server, 40, 43–46, 56–57
Application layer, 39–65, 504–05
address, 157
application logic, 40
client-based architectures, 40, 42–43
clients, 41
client-server architectures, 40, 43–46
cluster, 41
data access logic, 40
data storage, 40
dumb terminals, 41
functions, 40
host-based architectures, 40–42
internet model, 19
mainframe, 41
message transmission using, 19
network computer, 41
OSI model, 18
peer-to-peer architectures, 40, 46–47
personal computer, 41
presentation logic, 40
servers, 41
structured query language (SQL), 40
terminal, 41
transaction terminal, 41
virtual server, 41
Application management software, 426
Application service providers (ASPs), 28
Application systems, 46, 410, 414
Application-based VLANs, 428
Application-level firewall, 365–66
Architectures, choosing, 47–49
ASCII. See United States of America Standard Code for Information Interchange (USASCII)
Assets, network, 345
Association, 213
associating with AP, 214
Asymmetric digital subscriber line (ADSL), 319
G.Lite, 87
Asymmetric encryption, 375
Asynchronous transfer mode (ATM), 282–3
Asynchronous transmission, 132–33
AT&T. See American Telephone and Telegraph Company (AT&T)
Attenuation, 124
Audit, software, 199
Australia, networking in, 85
Authentication, 378–381. See also User authentication
authentication server, 385
central authentication, 385
Automated teller machine (ATM) network, 383
Automatic number identification (ANI), 273
Automatic Repeat reQuest (ARQ), 128
continuous ARQ, 128
stop-and-wait ARQ, 128
Autonomous systems, 168–69, 314
Auxiliary port, 172
B
Back Orifice Trojan horse, 373–75, 391
Backbone networks (BNs), 12–15, 239–67. See also Switched backbones
access layer, 243
core layer, 244
distribution layer, 244
campus network, 239
enterprise network, 240
computer and device performance, 260
switches, 240
Bain, Alexander, 5
Bandwidth, 104
limiters, 432
Basic access service. See Basic rate interface (BRI)
Basic rate interface (BRI), 273
Batch processing, 8
Baud rate, 103
Beacon frame, 214
Bell Canada, 270
Biometrics, 384
Bipolar signaling, 98
Bit rate, 103
BITNET network, 9
Bits per second (bps), 15, 104
Gbps, 27
Kbps, 15
Mbps, 27
Pbps, 27
Bluetooth, 226
media access control, 120, 202
Body, of SMTP packet, 57
BONDING (Bandwidth on Demand Interoperability Networking Group) standard, 86
Border Gateway Protocol (BGP), 168–69, 314
Border router, 169
Bottleneck, 223
Bridge Protocol Data Unit (BPDU), 495
Broadband communication, 27
Broadband ISDN (B-ISDN), 272–73
Broadband technologies, 318, 328
Browser, web, 49
Brute-force attacks, 376
Building-block network design process, 411–13
needs analysis, 412–18. See also individual entry
technology design, 412, 418–21. See also individual entry
Burst error, 123
Business continuity, 342, 351–61
denial-of-service protection, 352–56
device failure protection, 356–57
intrusion prevention systems, 387–88
server and client protection, 369–74
social engineering prevention, 385–87
theft protection, 356
Byte, 96
C
Cable modem termination system (CMTS), 321
types of, 322
Cables, 12
coaxial, 89
managing network, 205
moving, 125
network, 202
plan for, 205
problems with, 204
Cache engine. See Content engine
Campus network, 239
Canadian Radio-Television and Telecommunications Commission (CRTC), 270
Capacity management, 432
Career opportunities, 5
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), 213–14
contention-based CSMA/CD approach, 213
Carrier Sense Multiple Access with Collision Detection (CSMA/CD), 211, 213
Carrier wave, 101
Carterfone court decision, 6
Casual intruders, 361
CDMA2000, 501
Central authentication, 385
Central distribution facility (CDF), 246
Centralized routing, 167
Certificate, 385
Certificate authority (CA), 381
Chambers, John, 4
Channel service unit (CSU), 273
Character, in coding, 95
Charge-back policies, 470
Chassis switch, 249
Checksum technique, 127
Ciphertext, 375
analog, 78
capacity of, 104
dedicated, 79
digital, 78
DSL transmission of data, 87
logical, 78
multipoint, 80
permanent virtual, 282
physical, 78
shared, 80
switched virtual, 282
virtual, 281
Circuit-switched networks, 271–73
integrated services digital network (ISDN), 272–73
plain old telephone service (POTS), 272
Circuit-switched services, 271
Classes of service, 156
Classless addressing, 159
Clear to transmit (CTS), 215
Client-based architectures, 40, 42–43
Clients, 12
client-based architectures, 40, 42–43
Client-server architectures, 40, 43–47
thick-client approach, 46
thin-client approach, 46
three-tier, 44
two-tier, 44
Client-server computing, 8
Closed source software, 372
Closed source software, open source versus, 372
Cloud architecture, 271
Cloud computing, 47–48, 271–72
Gmail, 48
green computing, 48
server virtualization, 48
Coaxial cable, 89
Code Division Multiple Access (CDMA), 500
Codecs, 78
byte, 96
character, 95
Collapsed backbones, 421
Collision, 211
collision detection (CD), 211
Comfort noise, 498
Committed information rate (CIR), 282
Common Management Interface Protocol (CMIP), 427
Common Messaging Calls (CMC), 54
Common Object Request Broker Architecture (CORBA), 44
coaxial cable, 89
guided media, 88
guided media, 94
network type, 94
radiated media, 94
wireless media, 88
Communication services, 88
Communications
during Desert Shield/Desert Storm, 10
history of, in North America, 5–7
Compressed Real Time Protocol (CRTP), 498
Computer Emergency Response Team (CERT), 340
Computer forensics, 389
Confidentiality, 342
Configuration management, 454–56
desktop management, 454
network and client computers, configuring, 454
Connectionless messaging, 155–56
Connection-oriented messaging, 155–56
data signaling/synchronization, 487–88
firewire, 492
null modem cable connections, 485–87
Console port, 172
at Olympic Games, 436
provider, 435
Content engine, 433
Contention-based CSMA/CD approach, 213
Continuous data protection (CDP), 359
Control
Control signals, 80
Controlled access, 121–22, 215
basic principles of secure network, 341–45
identification and documentation of, 349–50
preventive, 343
Convergence, 27
in Maryland, 28
Copyright law, 53
Core BN layer, 244
of backbone network, 244
of network, 244
Corrective controls, 344
Corrupted data, 123
Cost assessment
in building-block network design process, 412, 421–24
circuit costs, 421
request for proposal (RFP), 422
selling proposal to management, 422–23
application software, 468
charge-back policies, 470
client hardware, 468
end user support, 468
network cost of ownership (NCO), 469
network operations, 468
by automation, 472
by centralizing help desks, 472
by developing standards, 470–71
by reducing installation cost, 472
thin-client architectures, 472
total cost of ownership (TCO), 469
Costs
networking, 472
Crackers, 362
Credit card data theft, 340
Cross-talk, 124
Cryptography, 374
Customer premises equipment (CPE), 87, 318
Cut through switching, 210
Cyclical redundancy check (CRC), 127–28
D
Data
corrupted, 123
credit card theft, 340
destruction of, 342
disruptions in, 342
efficiency of, 126
integration with voice and video, 27–28
lost, 123
Data access logic, 40
Data between the terminal (DTE), 482
Data circuit terminating equipment (DCE), 482
Data communications networks, 11–15
Data compression, 104
Data Encryption Standard (DES), 377
Triple, 377
full-duplex transmission, 81
half-duplex transmission, 80–81
turnaround time, 81
Data flow diagram (DFD), 208
Data link layer, 119–45, 508–10
address, 158
address resolution, 164
internet model, 18
logical link control (LLC) sublayer, 120
media access control (MAC) sublayer, 120–22. See also individual entry
message transmission using, 21
OSI model, 16
asynchronous transmission, 132–33
point-to-point protocol (PPP), 135–36
synchronous transmission, 133–36
Data over Cable Service Interface Specification (DOCSIS), 320
Data rate, 104
Data service unit (DSU), 273
Data set, 487
ready, 487
Data signaling/synchronization, 487–88
carrier detect, 488
data terminal ready, 488
request to send and clear to send signals, 488
transmit data pins, 488
Data storage, 40
Data terminal equipment (DTE), 482
Data terminal ready, 488
Data transmission
DSL and, 87
full-duplex, 81
half-duplex, 80
Database servers, 47, 199, 207
Datagram, 281
DDoS agent, 352
DDoS handler, 352
acceptance stage, 23
identification of choices stage, 23
specification stage, 23
Decryption, 374
Dedicated circuits, 79
Dedicated-circuit networks, 273–79
distributed star architecture, 274
dedicated-circuit services, 278
mesh architecture, 276
ring architecture, 274
star architecture, 275
Dedicated-circuit services, 269
Dedicated-server LANs, 199–200
Dedicated server networks, 199–200
Deep Space Communications Centers (DSCCs), 85
Deliverables
Delphi team, 350
Demilitarized zone (DMZ), 366
Denial-of-service attack (DoS), 352
inside, 355
Denial-of-service (DoS) attack, 352–55
DDoS agent, 352
DDoS handler, 352
distributed, 353
Denial-of-service protection, 352–55
Dense WDM (DWDM), 85
Designated port, 495
Designated router, 169
Desirable requirements, 417
Desktop videoconferencing, 61–62
Destination box, 508
Destination port address, 153
Destruction, of data, 342
Detection
anomaly, 387
error, 126
misuse, 387
Detective controls, 343
Device failure protection, 356–57
Device management software, 424
Device performance, improving, 260
Digital circuit, 78
Digital data, 78
digital transmission of, 98–99
translating from analog, 105–06
Digital signatures, 378
Digital subscriber line (DSL), 87, 318–20
access multiplexer, 319
asymmetric, 319
asymmetric DSL (ADSL), 319
data transmission, 318
modem, 318
Digital transmission of analog data, 105–08
adaptive differential pulse code modulation (ADPCM), 108
voice data transmission
by instant messenger, 108
voice over internet protocol (VoIP), 108
Digital transmission of digital data, 95–100
double current signaling, 98
ethernet transmitting data, 99–100
Manchester encoding, 100
polarity, 97
Unicode, 96
Direct current (DC), 97
Directional antennas, 205
Directory service, 206
avoiding disaster, 357
backup controls, 358
business continuity plan, 358
continuous data protection
(CDP), 359
disaster recovery, 358
disaster recovery drill, 360
disaster recovery outsourcing, 360
disaster recovery plan, 358–59
online backup, 360
recovery controls, 358
drill, 360
example of, 358
Disaster recovery plan, 358
elements of, 359
Disasters, 342
Discard eligible (DE), 282
Discarding port, 495
Disk mirroring, 357
Disruptions, 342
Distance vector dynamic routing, 167
Distortion, 123
harmonic, 125
Distributed Computing Environment (DCE), 44
Distributed computing model, 46
Distributed coordination function (DCF), 214
Distributed denial-of-service attack (DDoS), 352
agent, 352
distributed, 352
handler, 352
Distributed star architecture, 274
Distribution BN layer, 244
Distribution hub, 321
Distribution layer, 244
of network, 243
Distribution list, 53
Documentation, network, 454–56
Domain account, 513
Domain controllers, 206
Domain Name Server (DNS), 163
recursion attacks, 355
registering, 325
Double current signaling, 98
Downtime, 462
DSL access multiplexer (DSLAM), 319
Dumb terminals, 41
Dynamic Host Configuration Protocol (DHCP), 156, 161
distance vector, 167
link state, 167
E
Eavesdropping, 368
Echoes, 124
Efficiency, of data, 126
802.11b Wi-Fi, 216
802.11g Wi-Fi, 216
802.11i Wi-Fi, 217
802.11n Wi-Fi, 216
802.11n wireless LANs, 30
Electrical current, 97
Electronic mail (email), 53–58
distribution list, 53
Internet Message Access Protocol (IMAP), 54
mail transfer agent, 54
mail user agent, 54
Post Office Protocol (POP), 54
three-tier thin client-server architecture, 56
two-tier email architecture, 54
web-based email, 56
Electronic software distribution (ESD), 454
Electronics Industries Association (EIA), 482
Encapsulating Security Payload (ESP), 289, 382
Encapsulation, 21
Encoding
Lempel-Ziv, 104
asymmetric encryption, 375
brute-force attacks, 376
digital signatures, 378
key management, 376
algorithm, 375
key, 375
symmetric encryption, 375
triple DES (3DES), 377
problem resolution, 466
training for, 467
Energy Sciences Network, 291
Enhanced Data GSM Environment (EDGE), 501
Enhanced Interior Gateway Routing Protocol (EIGRP), 169
Enterprise network, 240
Entity relation diagram (ERD), 208
Entrapment techniques, 389
Error box, 508
burst error, 123
corrupted data, 123
lost data, 123
Error correction via retransmission, 128–30
checksum technique, 127
cyclical redundancy check, 127–28
Error prevention
moving cables, 125
shielding, 125
Error rates, 123
media selection and, 95
Errors
burst, 123
human, 123
minimizing, 124
network, 123
Ethernet, 134–35. See also Wired Ethernet; Wireless Ethernet
1 GbE, 212
100Base-T, 212
10Base-T, 212
error control in, 224
in home, 352
Manchester encoding, 100
shared, 208
switched, 219
types of, 212
European Particle Physics Laboratory (CERN), 49
Even parity, 127
Extensible Authentication Protocol (EAP), 217
Exterior routing protocols, 168
Extranet VPN, 287
Extranets, 15
F
Failure control function, 459–62
Fake antivirus, 370
Fast packet services, 286
Fat-client approach. See Thick-client approach
failure control function, 459–62
performance and failure statistics, 462–64
Fault-tolerant servers, 357
Fax services, 6
Federal Communications Commission (FCC), 6, 270
Fiber channel, 207
Fiber to the home (FTTH), 27, 322–23
architecture, 322
types, 322
radio, 91
single-mode, 90
Fiber-to-the-home (FTTH), 329
Fields
address, 133
frame check sequence, 134
message, 134
File sharing, managing, 518–24
creating shared folder, 519–20
File Transfer Protocol (FTP), 39
Final Destination, 507
Finger of Death attacks, 355
Firefighting, 450
application-level firewall, 365
architecture, 366
packet-level firewall, 364
Firewire, 492
Firewire cables, 492
First router (R1), 165
Flag, 133
Flow control, 129
Formal language, 19
Formal standards, 22
40 GbE, 212
Forward error correction, 130–31
Forward Ethernet switching, 211
Forwarding equivalence classes (FEC), 259
Forwarding table, 210
4G wireless services, 501
Four-way handshake, 156
Fractional T1 circuit (FT1), 278
Fragment-free Ethernet switching, 211
Fragment-free switching, 211
Frame check sequence field, 134
in California, 311
Free speech, Internet and, 53
Frequency, 100
Frequency division multiplexing (FDM), 82–84, 87
Frequency modulation (FM), 101
Frequency shift keying (FSK), 101
Full-duplex transmission, 81
Full-mesh architecture, 276
G
G.Lite ADSL, 87
Gartner Group, Inc., 469
building TCP/IP, 243
Gaussian noise. See White noise
Gbps, 27
Geographic scope, of network, 414–15
Geosynchronous satellites, 93
Gigabits per second, 15
Gigapops, 325
Pacific/Northwest, 326
Global System for Mobile Communication (GSM), 500
Gmail, 48
Go-Back-N ARQ, 128
Green computing, 48
Ground communication network at NASA, 85
coaxial cable, 89
H
H.320 standard, 62
H.323 standard, 62
Hackers, 362
Half-duplex transmission, 80–81
Hamming code, 130
Hardware
layers, 19
life spans of, 411
Header, of SMTP packet, 57
Health Insurance Portability and Accountability Act (HIPAA), 340
Help desk, 459
Hertz (Hz), 98
Hidden node problem, 214
Hierarchical backbones, 250
High-level data link control (HDLC), 134
High-speed serial interface (HSSI), 484
Hi-Speed USB, 491
Honey pot, 389
Host computer, 40
Host-based IPS, 387
Hotmail, 56
HTTP request, 50
example of, 51
HTTP response, 50
example of, 52
HTTP Viewer, 68
Hub polling, 122
Hub-based Ethernet, 208
Human errors, 123
Hurricane Katrina, recovering from, 358
Hybrid fiber coax (HFC), 320
Hypertext Markup Language (HTML), 53
Hypertext networks, 49
Hypertext Transfer Protocol (HTTP), 50
request body, 51
request header, 51
request line, 50
response body, 51
response header, 51
I
ICANN (Internet Corporation for Assigned Names and Numbers), 159
ICMP attacks, 355
Identification of choices stage, of standardization process, 23
Idle signal, 132
IEEE 802.11a standard, 216
IEEE 802.15 standard, 242
IEEE 802.1D standard, 494
IEEE 802.1q standard, 254
IEEE 802.1w standard, 495
IEEE 802.3ac standard, 134
Impulse noise, 124
source of, 124
Incoming messages accepting, 506–09
Information bits, 136
Information frame, 134
Information lag, 4
Information services, new, 28–29
Information sharing, 198
Information sharing through LANs, 198
Information systems, history of, 7–9
1950s, 8
1970s, 8
1980s, 8
Information utilities, 29
Instant messenger, 108
Institute of Electrical and Electronics Engineers (IEEE), standard-making process and, 23
Integrated services digital network (ISDN), 272
basic rate interface, 273
narrowband, 272
primary rate interface, 273
Integration of voice, video, and data, 27–28
Integrity, 342
Interchange carriers (IXC), 6, 270
Interface, routing, 165
Interior Gateway Routing Protocol (IGRP), 171
Interior routing protocols, 168
Intermediate System to Intermediate System (IS-IS), 169–70
Intermodulation noise, 125
International Organization for Standardization (ISO), 16
standard-making process and, 23
International Telecommunications Union-Telecommunications Group (ITU-T), standard-making process and, 23
applications used on, 40
domain names, 11
free speech and, 53
Internet access technologies, 317–23
Internet addresses, 159
classes, 159
Internet Architecture Board (IAB), 324
Internet Control Message Protocol (ICMP), 168–69
Internet Corporation for Assigned Names and Numbers (ICANN), 159, 325
Internet domain names, 11
Internet Engineering Steering Group (IESG), 324, 325
Internet Engineering Task Force (IETF), 24, 324
management focus on, 24
standard-making process and, 24
Internet Exchange Points (IXPs), 314
Internet Explorer, 12, 17, 49, 51, 145, 154
Internet Group Management Protocol (IGMP), 172
Internet Key Exchange (IKE), 381
Internet Message Access Protocol (IMAP), 54–57
application layer, 19
data link layer, 18
hardware layers, 19
internetwork layer, 19
network layer, 18
physical layer, 18
transport layer, 18
Internet Protocol (IP), 151–52
spoofing, 365
Internet Research Task Force (IRTF), 324, 325
Internet Service Provider (ISP), 4, 286, 289, 311–36
basic architecture, 313
cable modems, 322
fiber to the home (FTTH), 322–23
national ISPs/tier 1 ISPs, 314
optical unit network (ONU), 322
Internet Society (ISOC), 324
Internet video, at Reuters, 29
Internet2, weather map, 460, 461
Internetwork layer, 19
Internetwork Operating Systems (IOS), Cisco, 173
Interstate Commerce Commission (ICC), 6
Intranet VPN, 287
Intranets, 15
Intrusion, 342
perimeter security and firewalls, 362–69
security policy, 362
Intrusion prevention systems (IPS), 387–88
anomaly detection, 387
casual intruders, 361
crackers, 362
hackers, 362
host-based IPS, 387
management console, 387
misuse detection, 387
network-based IPS, 387
Inverse multiplexing (IMUX), 85–86
IP Security Protocol (IPSec), 381
IP spoofing, 365
IPS management console, 387
IPS sensor, 387
IPSec transport mode, 382
IPSec tunnel mode, 382
ISO8859, 96
J
Jet Propulsion Laboratory (JPL), 85
K
Kbps, 15
Kerckhoffs, Auguste, 372
management, 376
private, 378
public, 378
Knoppix, 369
L
L2TP, 286
Label Switched Routers (LSRs), 259
LAN metering software, 198
Layer address
application, 157
data link, 158
network, 157
Layer-2 tunneling protocol (L2TP), 286
Layer-2 VPN, 286
tunneling protocol, 286
Layer-3 switches, 243
Layer-3 VPN, 286
Layers, 18–22. See also Message transmission using layers pros and cons of using, 21
Lempel-Ziv encoding, 104
Lightweight directory services (LDAP), 207
Line noise, 123
Line splitter, 318
Link Access Protocol for Modems (LAP-M), 128
Link Access Protocol-Balanced (LAP-B), 134
Link state dynamic routing, 167
Linux, 30, 49, 59, 132, 199, 206, 371, 432
at Bryam Healthcare, 435
server, 431
switch, 431
Local account, 513
Local area networks (LANs), 12–15, 198–237. See also Wired LANs; Wireless LANs
file servers, 200
improving LAN performance, 223–27
circuit capacity, 226
reducing network demand, 226–27
LAN metering software, 198
print servers, 200
information sharing, 198
resource sharing, 198
Local exchange carriers (LEC), 6, 270
Logical circuit, 78
Logical link control (LLC) sublayer, 120
Logical network design, 414
Logical network parameters, 458–59
Logical topology, 208
Long-distance telephone, 6
Lost data, 123
Low earth orbit (LEO) satellites, 93
M
MAC address filtering, 217
Macintosh, 49
Mail transfer agent, 54
Mail user agent, 54
Main distribution facility (MDF), 246, 344
network diagram, 248
Mainframe, 41
policy-based management, 427–28
Management console, IPS, 387
Management implications, application layer, 63–64
Management information base (MIB), 427
Management, implications for, 29–30
backbone networks and, 261
data transmission and, 109
Internet and, 328
local area networks and, 227
MANs and WANs, 261
network management and, 472–73
networking environment and, 29–30
networks and, 63
protocol and, 139
TCP/IP and, 182
WLAN and, 227
Manager
network policy, 407
network security, 391
Mandatory requirements, 417
Master, 217
Maximum allowable rate (MAR), 282
Mbps, 27
MCI, 6
Mean Opinion Score (MOS), 498
Mean time between failures (MTBF), 462
Mean time to diagnose (MTTD), 462
Mean time to fix (MTTF), 463
Mean time to repair (MTTR), 462
Mean time to respond (MTTR), 463
Media access control (MAC), 120–21, 211–12
Bluetooth and, 226
contention, 121
distributed coordination function, 214
point coordination function, 214–15
relative performance, 122
sublayer, 120
switched Ethernet and, 219
WiMAX and, 323
guided, 88
wireless, 88
Media Gateway Control Protocol (MGCP), 497
Media selection
cost and, 95
error rates and, 95
network types, 94
transmission distance and, 95
transmission speeds and, 95
Memory, device, 430
full-mesh architecture, 276
partial-mesh architecture, 276
Message box, 505
Message field, 134
Message Number box, 508
Message transmission using layers, 19–22, 149
application layer, 19
data link layer, 21
network layer, 20
physical layer, 21
protocol, 19
transport layer, 20
Messages from the Network Layer, 508
Messages from the Physical Layer pile, 509
Messaging
connectionless, 156
Metcalfe, Bob, 134
Metropolitan area exchange (MAE), 313
Metropolitan area networks (MAN), 12–15
of Cisco Systems Inc., 290
relationship to other networks, 14
Microcomputer, explosion in, 450
Microsoft Outlook, 57
Microsoft Windows Server, 199
Microwave tower, 92
Middleware, 44
Middleware problem, 44
Mini-cases
ABC Warehouse, 232
AdviceNet, 442
Amalgamated Stores, 113
Asia Importers, 34
Atlas Advertising, 33
Belmont State Bank, 395
Boyle Transportation, 114
CareGroup, 300
Cathy's Collectibles, 332
Central Textiles, 476
Central University, 185
CISCO Systems Inc., 301
City School District, 476
Classic Catalog Company, 396
Computer Dynamics, 441
Connectus, 185
Consolidated Supplies, 33
Drop and Forge, 441
Energy Sciences Network, 301
Ethernet, designing, 230
fire departments, 301
Fred's Donuts, 185
General Hospital, 255
General Stores, 187
Global Consultants, 33
Hospitality Hotel, 262
Household Wireless, 231
Internet2, 476
Ling Galleries, 67
Mary's Manufacturing, 442
Mega Investments, 34
MegaCorp, 300
Metro Motel, 232
NASA's Ground Network, 114
Old Army, 187
Organic Foods, 332
Pat's Engineering Works, 263
personal security, 396
Sally's Shoes, 231
Salt Lake City Olympics, 442
South West State University, 231
Speedy Package, 114
Sunrise Consultancy, 300
Surfing Sam, 332
SURFnet, 301
Tom's Home Automation, 231
Ubiquitous Offices, 232
Western Bank, 395
Western Trucking, 264
Mission-critical application, 347
Misuse detection, 387
Mobile wireless, 323
data transmission by, 104
defined, 105
DSL, 318
adaptive differential pulse code, 108
amplitude, 101
bit rate versus baud rate versus symbol rate, 103
frequency, 101
phase, 102
pulse code, 107
quadrature amplitude, 103
sending multiples bits simultaneously, 102–03
Modules, 249
Monopoly, 7
Morse, Samuel, 5
Mosaic browser, 49
MoSucker Trojan horse, 373
MPEG-2 standard, 63
Multicast message, 171
broadcast message, 171
unicast message, 171
Multi-Level Transmission–3 Level (MLT-3), 490
Multimode fiber-optic systems, 89
BONDING (Bandwidth on Demand Interoperability Networking Group), 86–87
frequency division multiplexing (FDM), 82–83
inverse multiplexing (IMUX), 85–86
statistical time division multiplexing (STDM), 83–84
time division multiplexing (TDM), 83
wavelength division multiplexing (WDM), 84–85
Multipoint circuit, 80
Multiprotocol label switching (MPLS), 259, 282, 285–86
Multiprotocol routers, 259
Multipurpose Internet Mail Extension (MIME), attachments in, 58
Multiswitch VLAN, 254
N
Name servers, 163
Nanoseconds, 490
Narrowband ISDN, 272
NASA, ground communication, network of, 85
National Center for Supercomputing Applications (NCSA), 49
National Science Foundation, 9
Needs analysis
in building-block network design process, 412–18
access layer, 414
categorizing needs, 417
core layer, 414
desirable requirements, 417
distribution layer, 415
mandatory requirements, 417
network users, 416
wish-list requirements, 417
Negative acknowledgment (NAK), 128
Net neutrality, 10
NetEqualizer, 432
Network
cables, 12
circuit, 12
file server, 12
peer-to-peer networks, 12
print server, 12
router, 12
switch, 12
web server, 12
Network access points (NAP), 312
inside Chicago, 316
Network address translation (NAT), 365–66
Network cables, 203
standards, 202
Network circuits, 201–03, 428–30
service-level agreement (SLA), 430
Network computer, 41
Network cost of ownership (NCO), 469
Network demand, reducing, 226–27, 285–86, 296–97
building-block network design process, 411–13
cyclical nature of network design, 413
alarm storm, 425
application management software, 426
capacity management, 432
device management software, 424–25
management software, 424
minimizing network traffic, 432–36
network management standards, 426
policy-based management, 427
root cause analysis, 425
system management software, 425
capacity management, 432
latency of, 430
Network documentation, 454
Network interface cards (NIC), 201
Network interface port, 172
address, 157
internet model, 18
message transmission using, 20–21
OSI model, 17
Network management, 449–80. Seealso Configuration management
failure control function, 459–62
firefighting, 450
integrating LANs, WANs, and Internet, 451–52
logical network parameters, 458
manager job requirements, 453
performance and failure statistics, 462–64
physical network parameters, 458
policy-based management, 465
problem statistics, 461
software, 427
standards, 426
voice and data communications, integrating, 452–53
weather map, 459
message transmission using layers, 19–22
Open Systems Interconnection Reference (OSI) model, 16–18
Network monitoring software, 478
Network operating systems (NOS), 206–07
network profiles, 207
server software, 206
Network operations center (NOC), 458, 460
Network policy manager, 457
Network profiles, 207
Network security, 338–407. See also Encryption; Intrusion prevention; Risk assessment
device failure protection, 356–57
ensuring business continuity, 351–61. See also Business continuity
operating systems, 371
phishing, 387
physical security, 356
redundancy, 356
security policy, 362
security threats, types of, 342
availability, 342
business continuity, 342
confidentiality, 342
destruction of data, 342
disasters, 342
disruptions, 342
integrity, 342
intrusion, 342
server and client protection, 369–74
theft protection, 356
Network segmentation, 226
Network servers, 206
standards-making process, 22–24
Network support technician, 136
Network terminator (NT-1 or NT-2), 272
Network traffic, minimizing, 432–36
content caching, 433
content delivery, 434
content delivery provider, 435
content engine, 433
Network users, 416
Network weather map, 459
Network-attached storage (NAS) devices, 207
Network-based IPS, 387
Networking, 8
car, 419
costs, 472
expertise, demand for, 5
passive optical, 322
access layer, 414
backbone, 12
campus, 239
components of, 12
core layer, 244
distribution layer, 414
efficiency, 136
enterprise, 240
errors, 123
ground communication, 85
hypertext, 49
local area networks, 12
metropolitan area networks, 12
overlay, 219
secure, 342
users, 416
wide area networks, 15
New information services, 28–9
Next Generation Internet (NGI), 326, 328
Noise
impulse, 124
intermodulation, 125
white, 123
North America
cellular telephone networks, 7
fax services, 6
long-distance telephone, 6
picturefone service, 6
Telstar I satellite, 6
transatlantic voice connections, 6
transcontinental telephone service, 6
Null modem cable connections, 485–87
pin configurations, 486
O
Odd parity, 127
Omnidirectional antennas, 204
1000Base-T, 212, 226, 249, 490
One-time passwords, 384
Online backup services, 360
Open Database Connectivity (ODBC), 44
Open Shortest Path First (OSPF), 169
Open source software, closed, source versus, 372
Open Systems Interconnection Reference (OSI) model, 16–18
application layer, 18
data link layer, 16
network layer, 17
physical layer, 16
presentation layer, 17
session layer, 17
transport layer, 17
Operating systems, security, 371
Operating systems, server and, client protection and, 369–74
Optical unit network (ONU), 322
Optical-electrical (OE) converter, 321
Optix Pro Trojan horse, 373
Ordered chaos, 211
Outgoing messages, accepting, 506
Outsourcing, disaster recovery, 360–61
Overhead bits, 136
Overlay networks, 219
Oversampling, 105
P
Packet assembly/disassembly device (PAD), 280
Packet service, 284
unreliable, 283
Packet-switched networks, 279–86
asynchronous transfer mode, 282–83
X.25, 484
Parallel transmission, 97
Parity bit, 126
Parity checking, 126
even parity, 127
odd parity, 127
Partial-mesh architecture, 276
Pass phrases, 383
Passive optical networking, 322
Passive scanning, 214
Passphrases, 383
Passwords, 383
cracking, 383
one-time, 384
Patch, 369
Patch cables, 247
Pbps, 27
Peering, 314
Peer-to-peer (P2P) architectures, 40, 46–47
advantages, 47
scalability, 47
Peer-to-peer networks, 12, 200
Performance
Performance and failure statistics, 462–64
Performance improvement, in satellite communications, 94
Performance management, 456–66
failure control function, 459–62
performance and failure statistics, 462–64
Performance statistics, 462–64
Perimeter security and firewalls, 362–69
application-level firewall, 365
network address translation firewalls, 365–66
packet-level firewalls, 391–92
Perl, 56
Permanent virtual circuits (PVC), 282
Permissions, 518
Personal computer, 41
Personal digital assistants (PDA), 41, 500
Phase, 100
Phase hits, 107
Phase shift keying (PSK), 102
Phishing, 387
attack, 401
Physical carrier sense method, 214
Physical circuit, 78
Physical layer, 77–117, 510–11. See also Circuits
internet model, 18
message transmission using, 21
OSI model, 16
Physical network
design, 415
parameters, 458
Physical security, 356, 367–69
data security and, 369
Physical topology, 208
Piconet, 243
Picturefone service, 6
Pin configurations, 486
Piracy, software, 199
Plain old telephone service (POTS), 100, 272
Plaintext, 374
Podcasting, 181
Point coordination function (PCF), 214–15, 323
Point-to-point circuit, 79
Point-to-point protocol (PPP), 135–36
Points of presence (POP), 282, 314
Polarity, 97
Policy-based management, 427–28, 465
Polling, 121
hub, 122
roll-call, 121
designated, 495
Port address, 153
destination, 153
source, 153
Post Office Protocol (POP), 54
POTS (plain old telephone service), 100
Power over Ethernet (POE), 204
Preamble, 134
Presentation layer, OSI model, 17
Presentation logic, 40
Pretty Good Privacy (PGP), 381
Preventive controls, 343
Primary access service. See Primary rate interface (PRI)
Primary rate interface (PRI), 273
Private Branch Exchange (PBX), 497
Private key, 378
Private line services, 273
Probe frame, 214
Problem prioritizing, 461
Problem statistics, 461
Problem tracking, 460
Propagation delay, 93
Proposals, selling to management, 472–73
exterior routing, 168
interior routing, 168
stack, 22
Protocol Data Unit (PDU), 19, 20, 120, 149
Public key, 378
encryption, 378
Public key infrastructure (PKI), 378, 380
Public switched telephone network (PSTN), 271, 497
Public utilities commission (PUC), 270
Pulse Amplitude Modulation (PAM), 106–07
Pulse Amplitude Modulation–5 (PAM-5), 491
Pulse code modulation (PCM), 107
PuTTY package, 59
Q
Quadrature amplitude modulation (QAM), 103
Quality control charts, 464
Quality of Service (QoS), 156–57, 499
Quantizing error, 105
R
Rack of equipment, 246
Radiated media, 94
Radio Frequency Identification (RFID) chip, 60
Raindrop attenuation, satellite transmission and, 93
RC4, 377
RC4 encryption algorithm, 377
Real-Time Streaming Protocol (RTSP), 157
Real-Time Transport Protocol (RTP), 157
Recovery controls, 358
Redundancy, 356
Redundant array of independent disks (RAID), 226, 357
Regional Bell operating companies (RBOCs), 6
Regional ISP, 313
Relative performance, 122
Reliable packet service, 283
Remote monitoring (RMON), 427
probes, 427
Remote-access server (RAS), 314
Repeaters, 125
Replication, 163
Request body, 51
Request for Comment (RFC), 24
Request for proposal (RFP), 422
Request header, 51
Request line, 50
Request to transmit (RTS), 215
Requests for comment (RFC), 324
Requirements, network
desirable, 417
mandatory, 417
wish-list, 417
Resolution
address, 162–65. See also Addressing
Resource Reservation Protocol (RSVP), 157
Resource sharing through LANs, 198
Response body, 52
Response header, 52
Response status, 52
Retrain time. See Turnaround time
Retransmission, error correction via, 128–30
Return to zero (RZ), 98
Reuters, Internet video at, 29
Rich Site Summary (RSS), 181
Ring indicator, 487
control spreadsheet, developing, 345–49
identifying and documenting control, 349–50
Roaming, 247
Roll-call polling, 121
Root cause analysis, 425
Root node, 495
Root switch, 495
design, 250
hierarchical backbones, 250
subnetted backbones, 250
auxiliary port, 172
border, 169
console port, 172
designated, 169
functions, 172
label switched, 259
multiprotocol, 259
network interface port, 172
centralized routing, 167
distance vector dynamic routing, 167
dynamic routing, 167
first router (R1), 165
interface, 165
link state dynamic routing, 167
autonomous system, 168
Border Gateway Protocol (BGP), 168–69
Enhanced Interior Gateway
Routing Protocol (EIGRP), 169
exterior routing protocols, 168
interior routing protocols, 168
Intermediate System to
Intermediate System (IS-IS), 169
Internet Control Message Protocol (ICMP), 168–69
Open Shortest Path First (OSPF), 169–70
Routing Information Protocol (RIP), 158, 168, 170
static routing, 167
RS232 (DB-25)/RS449 (DB-9), 482–85
RS449 cable specifications, 482–85
S
Sarbanes-Oxley Act (SOX), 340
geosynchronous, 93
improvement of performance, 94
raindrop attenuation and, 93
Scalability, 47
Scanning, 214
Script kiddies, 344
Secure network, principles of, 342
Secure shell (SSH) encryption, 59
Secure Sockets Layer (SSL), 381
Secure switch, 369
Security
media selection and, 94
Security account manager (SAM), 383
exploiting, 371
Security policy, 390
elements of, 391
Security, network. See Network security
Segment, 149
Sequence number, 506
Serial transmission, 97
server name resolution, 162
server virtualization, 48–49, 431–32
web, 50
Server and client protection, 369–74
Server load balancing, 431
Servers, 12
authentication, 385
clusters, 431
database, 207
farms, 199
fault-tolerant, 357
as honey pot, 389
remote-access, 314
software for, 206
technology design, 412, 418–21
terminology for, 159
Web, 12
wireless telephony application, 350
Service profile identifier (SPID), 273
Service-level agreement (SLA), 430, 465
Session Initiation Protocol (SIP), 497
Session layer, OSI model, 17
connectionless messaging, 155
connection-oriented messaging, 155–56
four-way handshake, 156
Quality of Service (QoS), 156
three-way handshake, 155
Shared circuit, 80
Shared Ethernet, 208
Shared folder, creating, 519
Shielded twisted pair (STP), 201
Shielding, 125
Shields Up website, 402, 403, 405
Signaling rate, 490
Signal-to-noise ratio (SNR), 237
Simple Mail Transfer Protocol (SMTP), 54–58
body, 57
header, 57
message ID, 58
Simple Network Management Protocol (SNMP), 427
Simplex circuit, 81
Simplex transmission, 80
Simulation, 420
Single-mode fiber-optic cable, 90
Single-switch VLAN, 252
Site survey, 220
Skinny Call Control Protocol (SCCP), 497
Slash notation, 159
Sliding window, 129
Small office, home office (SOHO), 204
environments, designing for, 222–23
Smart card, 383
SmartDraw, 469
system management, 452
SmartDraw software, 445
Sniffer program, 369
Social engineering, 388
Social engineering, preventing, 385–87
Software, 225
antivirus, 352
application management, 426
audit, 199
device management, 424
improving performance, 218
network monitoring, 456
open versus closed source, 372
piracy, 199
server, 206
Software Publishers Association (SPA), 199
SOHO switch, 203
Something you are approach, 383
Something you have approach, 383
Something you know approach, 383
SONET services. See Synchronous optical network (SONET)
Sony's spyware, 375
Sound wave, 100
Source address, 134
Source box, 508
Source port address, 153
Spanning tree protocol, 493–96
Specification stage, of, standardization process, 23
Spyware, 374
at Sony, 375
Standardization process, 23
acceptance stage, 23
identification of choices stage, 23
specification stage, 23
Standard-making process
American National Standards Institute, 23
Institute of Electrical and Electronics Engineers, 23
International Organization for Standardization and, 23
International
Telecommunications
Union-Telecommunications
Group, 23
Internet Engineering Task Force, 24
American National Standards Institute (ANSI), 23
De facto standards, 22
De juro standards, 22
importance of, 22
Institute of Electrical and Electronics Engineers (IEEE), 23
International Organization for Standardization (ISO), 23
protocols, 24
Telecommunications Group (ITU-T), 23
Star architecture, 275
Start bit, 132
Static routing, 167
Statistical time division multiplexing (STDM), 83–84
Stop bit, 132
Storage area network (SAN), 207
Store and forward switching, 211
Store Ethernet switching, 211
Structured query language (SQL), 40
Subnetted backbones, 250
Supervisory frame, 134
Switch-based Ethernet, 208
cut-through switching, 210
forward switching, 211
fragment-free switching, 211
latency, 210
store switching, 211
chassis switch, 249
main distribution facility (MDF), 246
modules, 249
patch cables, 247
performance benefits, 276
Switched virtual circuits (SVCs), 282
Switched-circuit services
integrated services digital network, 272–73
plain old telephone service, 100, 272
chassis, 249
layer-2, 240
layer-3, 243
load balancing, 431
root, 495
Switching
fragment-free, 211
store and forward, 211
Symmetric encryption, 375
Symmetric multiprocessing (SMP), 226
Synchronization, 132
Synchronization characters (SYN), 133
Synchronous data link control (SDLC), 133–34
Synchronous digital hierarchy (SDH), 279
Synchronous optical network (SONET), 278–79
Synchronous transmission, 133–36
high-level data link control, 134
point-to-point protocol, 135–36
synchronous data link control, 133–34
System management software, 425
T
T carrier circuits, 278
fractional T1, 278
synchronous optical network (SONET), 279
T1 circuit, 278
T3 circuit, 278
T1 circuit, 278
fractional, 278
T2 circuit, 278
T3 circuit, 278
T4 circuit, 278
Tagging, with RFID chip, 60
Tbps, 27
TCP/IP. See Transmission Control Protocol/Internet Protocol (TCP/IP)
TCP connection, 155
TCP SYN floods, 355
Technical reports, 462
Technology design
in building-block network design process, 418–21
capacity planning, 419
circuit loading, 419
design tools, 420
turnpike effect, 419
Telecommunications Act, 53
Telecommunications Group (ITU-T), 23
Telecommunications, 11
Telephone
relative capacities of, 26
transmission of voice data, 91
voice data transmission by, 106–08
Telepresence, Cisco, 64
Telstar I satellite, 6
10Base-T standard, 212, 488–90
10/100 Ethernet, 316
10/100/1000 Ethernet, 212
Terminal, 41
dumb, 41
transaction, 41
Terminal adapter (TA), 272
Theft, credit card data, 340
Theft protection, 356
Thick-client approach, 46
Thin-client approach, 46
Threats
security, 342
3G wireless, 501
Three-tier architecture, 44–45
Three-tier thin client-server architectures, 56–57
Three-way handshake, 155
Ticket-Granting Ticket (TGT), 386
Tier 1 ISP, 312
Tier 2 ISP, 313
Tier 3 ISP, 315
Time-based tokens, 384
Time Division Multiple Access (TDMA), 500
Time division multiplexing (TDM), 82, 83
Token passing, 122
Tokens, 384
time-based, 384
Toolkits, network management, 438
logical, 208
physical, 208
Total cost of ownership (TCO), 469
Traditional network design process, 410–11
Traffic anomaly analyzer, 354
Traffic anomaly detector, 354
Traffic filtering, 353
Transaction terminal, 41
Transmission asynchronous, 132–33
laser/LED/fiber optic cable, 89
Transmission Control Protocol/Internet Protocol (TCP/IP), 148, 150–52
known addresses, different subnet, 177–78
known addresses, same subnet, 174–77
TCP connections, 179
TCP/IP and network layers, 179–81
network layer protocol, 150
transport layer protocol, 150
Transmission distance, media selection and, 95
Transmission efficiency, 136–39
defined, 137
bipolar signaling, 98
unipolar signaling, 98
parallel transmission, 97
serial transmission, 97
Transmission rate of information bits (TRIB), 139
calculation of, 139
Transmission speeds, media selection and, 95
Transmit data pins, 488
Transport layer, 148–94, 505–06
internet model, 18
linking to application layer, 153–54
message transmission using, 20
OSI model, 17
Transport mode, in IPSec, 382
Transport/network layer protocols, 150–52
transmission control protocol, 151
Triple DES (3DES), 377
Black Orifice, 402
at home, 376
MoSucker, 373
Optix Pro, 373
Trouble report, elements of, 463
Trouble tickets, 460
Tunnel mode, in IPSec, 382
Turnaround time, 81
Turnpike effect, 419
Twisted-pair cable, 88–89, 203
Two-bit amplitude modulation, 103
Two-tier architecture, 44–45, 49
World Wide Web as, 49
Two-tier e-mail architecture, 54–56
U
Unicast message, 171
Unicode, 96
Uniform resource locator (URL), 50
Uninterruptable power supplies (UPS), 108, 357
Unipolar signaling, 98
United States of America Standard Code for Information Interchange (USASCII), 96
Universal Serial Bus (USB), 491–92
University Corporation for Advanced Internet Development (UCAID), 326
process table attacks, 355
Unreliable packet service, 283
Unshielded twisted-pair (UTP) wires, 201
User accounts, managing, 513–16
active directory, 513
domain account, 513
group, 513
local account, 513
setting user properties, 515–16
access cards, 383
account, 382
automated teller machine (ATM) network, 383
one-time passwords, 384
passphrases, 383
passwords, 383
smart card, 383
time-based tokens, 384
token, 384
user profile, 382
User Datagram Protocol (UDP), 151, 156
attacks, 355
V
Video, integration with voice and data, 27–28
H.320 standard, 62
H.323 standard, 62
MPEG-2 standard, 63
webcasting, 63
Virtual carrier sense method, 214
Virtual circuit, 281
benefits of, 253
multiswitch VLAN, 254
single-switch VLAN, 252
VLAN tag, 256
VLAN trunks, 257
working, 255
Virtual private networks (VPNs), 286–92
access VPN, 287
extranet VPN, 287
intranet VPN, 287
layer-2 tunneling protocol (L2TP), 286
layer-3 VPN, 286
VPN gateway, 286
VPN software, 286
Viruses, 351
VLAN trunks, 257
Voice Activity Detection (VAD), 498
Voice communications
integration with data, 452
integration with video and data, 27–28
instant messenger transmission of, 108–09
telephone transmission of, 318
Voice data transmission
by instant messenger, 108
Voice over ATM (VoATM), 497
Voice over Frame Relay (VoFR), 497
Voice over Internet Protocol (VoIP), 27, 108–09, 497
VoIP. See Voice Over Internet Protocol (VoIP)
Voltage, 97
W
Wal-Mart, 8
Warchalking, 216
Wardriving, 216
War-walking, 235
Watson, Tom, 5
Wavelength division multiplexing (WDM), 81–85, 322, 328
Weather map, Internet2, 334, 460
Weather map, network, 459
Web packets, 63
response from, 51
Webcasting, 65
Westinghouse, George, 22
Wide area networks (WANs), 15, 268–309. See also Circuit-switched networks; Dedicated-circuit networks; Packet-switched networks
reducing network demand, 296–97
Wideband Code Division Multiple Access (WCDMA), 501
802.11a, 216
802.11b, 216
802.11g, 216
802.11n, 216
on cruise ships, 236
interference, 220
media access control, 120, 140
mooching, 218
public, 235
topology, 245
Wi-Fi Protected Access (WPA), 217
WiMAX (Worldwide Interoperability for Microwave Access), 323
media access control, 323
topology, 323
types of, 323
Windows, 22, 30, 49, 59, 96, 175, 200, 206, 371, 515
managing user accounts, 513–18
Wire speed, 430
Wired Equivalent Privacy (WEP), 216
Wired Ethernet, 208–13, 219–20
error control in, 224
shared Ethernet, 208
bus topology, 208
frames, 208
logical topology, 208
physical topology, 208
Wired LANs, 201
Wireless Application Environment (WAE), 350
banking and, 213
Wireless Ethernet, 213–18, 220–22
802.11a, 216
802.11b, 216
802.11g, 216
802.11n, 216
associating with AP, 214
association, 213
controlled-access methods, 215
distributed coordination function (DCF), 214
frame layout, 215
hidden node problem, 214
MAC address filtering, 217
point coordination function (PCF), 214
site survey, 220
topology, 213
virtual carrier sense method, 214
Wireless LANs (WLANs), 33, 91, 144, 202–03, 221, 228–29, 235, 457, 501
802.11i, 217
best practice design, 218, 424
Bluetooth, 226
circuit capacity improvement, 260–61, 419
device performance improvement, 294–97
MAC address filtering, 217
multistory design, 221
network interface cards, 201, 227
physical design, 420
reducing network demand, 226–27
security, 217
SSID, 237
Wi-Fi Protected Access, 217
Wired Equivalent Privacy, 216–17
radio transmission, 91
in Munich airport, 91
satellite transmission, 93–94, 125, 130, 139
Wireless telephony application (WTA) server, 350
Wish-list requirements, 417
Workgroup switch, 214
Web browser, 49
Web server, 50
Worldwide Interoperability for Microwave Access (WiMAX), 323
Slammer, 399
X
X.25 packet switching, 484
Y
Yahoo, 34, 316, 319, 344, 431, 434–36
Z
Zero day attacks, 370
3.145.111.107