CONTENTS

PART ONE INTRODUCTION

CHAPTER 1 INTRODUCTION TO DATA COMMUNICATIONS

1.1 INTRODUCTION

1.1.1 A Brief History of Communications in North America

1.1.2 A Brief History of Information Systems

1.1.3 A Brief History of the Internet

1.2 DATA COMMUNICATIONS NETWORKS

1.2.1 Components of a Network

1.2.2 Types of Networks

1.3 NETWORK MODELS

1.3.1 Open Systems Interconnection Reference Model

1.3.2 Internet Model

1.3.3 Message Transmission Using Layers

1.4 NETWORK STANDARDS

1.4.1 The Importance of Standards

1.4.2 The Standards-Making Process

1.4.3 Common Standards

1.5 FUTURE TRENDS

1.5.1 Pervasive Networking

1.5.2 The Integration of Voice, Video, and Data

1.5.3 New Information Services

1.6 IMPLICATIONS FOR MANAGEMENT

SUMMARY

PART TWO FUNDAMENTAL CONCEPTS

CHAPTER 2 APPLICATION LAYER

2.1 INTRODUCTION

2.2 APPLICATION ARCHITECTURES

2.2.1 Host-Based Architectures

2.2.2 Client-Based Architectures

2.2.3 Client-Server Architectures

2.2.4 Peer-to-Peer Architectures

2.2.5 Choosing Architectures

2.3 WORLD WIDE WEB

2.3.1 How the Web Works

2.3.2 Inside an HTTP Request

2.3.3 Inside an HTTP Response

2.4 ELECTRONIC MAIL

2.4.1 How Email Works

2.4.2 Inside an SMTP Packet

2.4.3 Attachments in Multipurpose Internet Mail Extension

2.5 OTHER APPLICATIONS

2.5.1 Telnet

2.5.2 Instant Messaging

2.5.3 Videoconferencing

2.6 IMPLICATIONS FOR MANAGEMENT

SUMMARY

CHAPTER 3 PHYSICAL LAYER

3.1 INTRODUCTION

3.2 CIRCUITS

3.2.1 Circuit Configuration

3.2.2 Data Flow

3.2.3 Multiplexing

3.2.4 How DSL Transmits Data

3.3 COMMUNICATION MEDIA

3.3.1 Twisted Pair Cable

3.3.2 Coaxial Cable

3.3.3 Fiber-Optic Cable

3.3.4 Radio

3.3.5 Microwave

3.3.6 Satellite

3.3.7 Media Selection

3.4 DIGITAL TRANSMISSION OF DIGITAL DATA

3.4.1 Coding

3.4.2 Transmission Modes

3.4.3 Digital Transmission

3.4.4 How Ethernet Transmits Data

3.5 ANALOG TRANSMISSION OF DIGITAL DATA

3.5.1 Modulation

3.5.2 Capacity of a Circuit

3.5.3 How Modems Transmit Data

3.6 DIGITAL TRANSMISSION OF ANALOG DATA

3.6.1 Translating from Analog to Digital

3.6.2 How Telephones Transmit Voice Data

3.6.3 How Instant Messenger Transmits Voice Data

3.6.4 Voice over Internet Protocol (VoIP)

3.7 IMPLICATIONS FOR MANAGEMENT

SUMMARY

CHAPTER 4 DATA LINK LAYER

4.1 INTRODUCTION

4.2 MEDIA ACCESS CONTROL

4.2.1 Contention

4.2.2 Controlled Access

4.2.3 Relative Performance

4.3 ERROR CONTROL

4.3.1 Sources of Errors

4.3.2 Error Prevention

4.3.3 Error Detection

4.3.4 Error Correction via Retransmission

4.3.5 Forward Error Correction

4.3.6 Error Control in Practice

4.4 DATA LINK PROTOCOLS

4.4.1 Asynchronous Transmission

4.4.2 Synchronous Transmission

4.5 TRANSMISSION EFFICIENCY

4.6 IMPLICATIONS FOR MANAGEMENT

SUMMARY

CHAPTER 5 NETWORK AND TRANSPORT LAYERS

5.1 INTRODUCTION

5.2 TRANSPORT AND NETWORK LAYER PROTOCOLS

5.2.1 Transmission Control Protocol (TCP)

5.2.2 Internet Protocol (IP)

5.3 TRANSPORT LAYER FUNCTIONS

5.3.1 Linking to the Application Layer

5.3.2 Segmenting

5.3.3 Session Management

5.4 ADDRESSING

5.4.1 Assigning Addresses

5.4.2 Address Resolution

5.5 ROUTING

5.5.1 Types of Routing

5.5.2 Routing Protocols

5.5.3 Multicasting

5.5.4 The Anatomy of a Router

5.6 TCP/IP EXAMPLE

5.6.1 Known Addresses, Same Subnet

5.6.2 Known Addresses, Different Subnet

5.6.3 Unknown Addresses

5.6.4 TCP Connections

5.6.5 TCP/IP and Network Layers

5.7 IMPLICATIONS FOR MANAGEMENT

SUMMARY

PART THREE NETWORK TECHNOLOGIES

CHAPTER 6 WIRED AND WIRELESS LOCAL AREA NETWORKS

6.1 INTRODUCTION

6.1.1 Why Use a LAN?

6.1.2 Dedicated-Server versus Peer-to-Peer LANs

6.2 LAN COMPONENTS

6.2.1 Network Interface Cards

6.2.2 Network Circuits

6.2.3 Network Hubs, Switches, and Access Points

6.2.4 Network Operating Systems

6.3 WIRED ETHERNET

6.3.1 Topology

6.3.2 Media Access Control

6.3.3 Types of Ethernet

6.4 WIRELESS ETHERNET

6.4.1 Topology

6.4.2 Media Access Control

6.4.3 Wireless Ethernet Frame Layout

6.4.4 Types of Wireless Ethernet

6.4.5 Security

6.5 THE BEST PRACTICE LAN DESIGN

6.5.1 Wired Ethernet

6.5.2 Wireless Ethernet

6.5.3 Designing for SOHO Environments

6.6 IMPROVING LAN PERFORMANCE

6.6.1 Improving Server Performance

6.6.2 Improving Circuit Capacity

6.6.3 Reducing Network Demand

6.7 IMPLICATIONS FOR MANAGEMENT

SUMMARY

CHAPTER 7 BACKBONE NETWORKS

7.1 INTRODUCTION

7.2 BACKBONE NETWORK COMPONENTS

7.2.1 Switches

7.2.2 Routers

7.2.3 Gateways

7.2.4 A Caution

7.3 BACKBONE NETWORK ARCHITECTURES

7.3.1 Backbone Architecture Layers

7.3.2 Switched Backbones

7.3.3 Routed Backbones

7.3.4 Virtual LANs

7.4 THE BEST PRACTICE BACKBONE DESIGN

7.5 IMPROVING BACKBONE PERFORMANCE

7.5.1 Improving Computer and Device Performance

7.5.2 Improving Circuit Capacity

7.5.3 Reducing Network Demand

7.6 IMPLICATIONS FOR MANAGEMENT

SUMMARY

CHAPTER 8 WIDE AREA NETWORKS

8.1 INTRODUCTION

8.2 CIRCUIT-SWITCHED NETWORKS

8.2.1 Basic Architecture

8.2.2 Plain Old Telephone Service

8.2.3 Integrated Services Digital Network (ISDN)

8.3 DEDICATED-CIRCUIT NETWORKS

8.3.1 Basic Architecture

8.3.2 T Carrier Services

8.3.3 Synchronous Optical Network

8.4 PACKET-SWITCHED NETWORKS

8.4.1 Basic Architecture

8.4.2 Asynchronous Transfer Mode

8.4.3 Frame Relay

8.4.4 Ethernet Services

8.4.5 Multi-Protocol Label Switching

8.5 VIRTUAL PRIVATE NETWORKS

8.5.1 Basic Architecture

8.5.2 VPN Types

8.5.3 How VPNs Work

8.6 THE BEST PRACTICE WAN DESIGN

8.7 IMPROVING WAN PERFORMANCE

8.7.1 Improving Device Performance

8.7.2 Improving Circuit Capacity

8.7.3 Reducing Network Demand

8.8 IMPLICATIONS FOR MANAGEMENT

SUMMARY

CHAPTER 9 THE INTERNET

9.1 INTRODUCTION

9.2 HOW THE INTERNET WORKS

9.2.1 Basic Architecture

9.2.2 Connecting to an ISP

9.2.3 The Internet Today

9.3 INTERNET ACCESS TECHNOLOGIES

9.3.1 Digital Subscriber Line (DSL)

9.3.2 Cable Modem

9.3.3 Fiber to the Home

9.3.4 WiMax

9.4 THE FUTURE OF THE INTERNET

9.4.1 Internet Governance

9.4.2 Building the Future

9.5 IMPLICATIONS FOR MANAGEMENT

SUMMARY

PART FOUR NETWORK MANAGEMENT

CHAPTER 10 NETWORK SECURITY

10.1 INTRODUCTION

10.1.1 Why Networks Need Security

10.1.2 Types of Security Threats

10.1.3 Network Controls

10.2 RISK ASSESSMENT

10.2.1 Develop a Control Spreadsheet

10.2.2 Identify and Document the Controls

10.2.3 Evaluate the Network's Security

10.3 ENSURING BUSINESS CONTINUITY

10.3.1 Virus Protection

10.3.2 Denial of Service Protectio

10.3.3 Theft Protection

10.3.4 Device Failure Protection

10.3.5 Disaster Protection

10.4 INTRUSION PREVENTION

10.4.1 Security Policy

10.4.2 Perimeter Security and Firewalls

10.4.3 Server and Client Protection

10.4.4 Encryption

10.4.5 User Authentication

10.4.6 Preventing Social Engineering

10.4.7 Intrusion Prevention Systems

10.4.8 Intrusion Recovery

10.5 BEST PRACTICE RECOMMENDATIONS

10.6 IMPLICATIONS FOR MANAGEMENT

SUMMARY

CHAPTER 11 NETWORK DESIGN

11.1 INTRODUCTION

11.1.1 The Traditional Network Design Process

11.1.2 The Building-Block Network Design Process

11.2 NEEDS ANALYSIS

11.2.1 Geographic Scope

11.2.2 Application Systems

11.2.3 Network Users

11.2.4 Categorizing Network Needs

11.2.5 Deliverables

11.3 TECHNOLOGY DESIGN

11.3.1 Designing Clients and Servers

11.3.2 Designing Circuits and Devices

11.3.3 Network Design Tools

11.3.4 Deliverables

11.4 COST ASSESSMENT

11.4.1 Request for Proposal

11.4.2 Selling the Proposal to Management

11.4.3 Deliverables

11.5 DESIGNING FOR NETWORK PERFORMANCE

11.5.1 Managed Networks

11.5.2 Network Circuits

11.5.3 Network Devices

11.5.4 Minimizing Network Traffic

11.5.5 Green IT

11.6 IMPLICATIONS FOR MANAGEMENT

SUMMARY

CHAPTER 12 NETWORK MANAGEMENT

12.1 INTRODUCTION

12.2 ORGANIZING THE NETWORK MANAGEMENT FUNCTION

12.2.1 The Shift to LANs and the Internet

12.2.2 Integrating LANs, WANs, and the Internet

12.2.3 Integrating Voice and Data Communications

12.3 CONFIGURATION MANAGEMENT

12.3.1 Configuring the Network and Client Computers

12.3.2 Documenting the Configuration

12.4 PERFORMANCE AND FAULT MANAGEMENT

12.4.1 Network Monitoring

12.4.2 Failure Control Function

12.4.3 Performance and Failure Statistics

12.4.4 Improving Performance

12.5 END USER SUPPORT

12.5.1 Resolving Problems

12.5.2 Providing End User Training

12.6 COST MANAGEMENT

12.6.1 Sources of Costs

12.6.2 Reducing Costs

12.7 IMPLICATIONS FOR MANAGEMENT

SUMMARY

PART FIVE APPENDICES

APPENDIX A CONNECTOR CABLES

APPENDIX B SPANNING TREE PROTOCOL

APPENDIX C IP TELEPHONY

APPENDIX D CELLULAR TECHNOLOGIES

APPENDIX E TCP/IP GAME

APPENDIX F WINDOWS SERVER

GLOSSARY

INDEX

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.142.250.203