Normal view MARC view ISBD view

A practical introduction to enterprise network and security management /

By: Shin, Bongsik
Material type: BookPublisher: Boca Raton : Taylor & Francis, CRC Press, c2017.Description: xix, 593 p. : ill. ; 26 cm.ISBN: 9781498787970Subject(s): Computer networks -- Management | Computer networks -- Security measuresDDC classification: 005.8 SH PR Online resources: Location Map
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Home library Call number Status Notes Date due Barcode Item holds
REGULAR University of Wollongong in Dubai
Main Collection
005.8 SH PR (Browse shelf) Available Mar2018 T0057837
Total holds: 0

Includes index.

Machine generated contents note: 1.1.Introduction
1.2.Network Elements
1.2.1.Host
1.2.1.1.Client-Server Mode
1.2.1.2.P2P Mode
1.2.1.3.Network Interface Card
1.2.2.Intermediary Device
1.2.3.Network Link
1.2.4.Application
1.2.5.Data/​Message
1.2.6.Protocol
1.3.Modes of Communication
1.3.1.Methods of Data Distribution
1.3.1.1.Unicasting
1.3.1.2.Broadcasting
1.3.1.3.Multicasting
1.3.2.Directionality in Data Exchange
1.3.2.1.Simplex
1.3.2.2.Duplex
1.4.Network Topology
1.4.1.Point-to-Point Topology
1.4.2.Bus Topology
1.4.3.Ring Topology
1.4.4.Star (Hub-and-Spoke) Topology
1.4.5.Mesh Topology
1.4.6.Tree (or Hierarchical) Topology
1.5.Classification of Networks
1.5.1.Personal Area Network
1.5.2.Local Area Network
1.5.3.Metropolitan Area Network
1.5.4.Wide Area Network
1.5.5.Rise of Internet of Things
1.6.Subnetwork versus Inter-network
1.7.Measures of Network Performance
1.7.1.Capacity
Contents note continued: 1.7.1.1.Data Types and Data Rate
1.7.2.Delay
1.7.3.Reliability
1.7.4.Quality of Service
1.8.Numbering Systems
1.8.1.Binary versus Decimal
1.8.2.Binary versus Hexadecimal
1.9.Network Addressing
1.9.1.Characterizing Network Addressing
1.9.2.MAC Address
1.9.3.IP Address
1.9.4.Pairing of MAC and IP Addresses
Summary
Key Terms
Summary Questions
2.1.Introduction
2.2.TCP/​IP versus OSI
2.2.1.Standard Architecture
2.2.2.Standard and Protocol
2.2.3.Protocol Data Unit
2.3.Layer Functions: An Analogy
2.4.Layer Processing
2.5.Application Layer (Layer 5)
2.5.1.HTTP Demonstration
2.5.2.Select Application Layer Protocols
2.6.Transport Layer (Layer 4)
2.6.1.Provision of Data Integrity
2.6.1.1.Error Control
2.6.1.2.Flow Control
2.6.1.3.TCP and Data Integrity
2.6.1.4.UDP and Data Integrity
2.6.2.Session Management
2.6.2.1.Session versus No Session
Contents note continued: 2.6.2.2.Session Management by TCP
2.6.2.3.TCP Session in Real Setting
2.6.2.4.Additional Notes
2.6.3.Port Management
2.6.3.1.Port Types and Ranges
2.6.3.2.Source versus Destination Port
2.6.3.3.Socket
2.7.Internet Layer (Layer 3)
2.7.1.Packet Creation and Routing Decision
2.7.1.1.Packet Creation
2.7.1.2.Packet Routing Decision
2.7.2.Performing Supervisory Functions
2.8.Data Link Layer (Layer 2)
2.8.1.LAN Data Link
2.8.1.1.Frame and Switching
2.8.1.2.Link Types
2.8.1.3.Technology Standard(s)
2.8.1.4.Single Active Delivery Path
2.8.1.5.Frame's MAC Addresses
2.8.2.WAN Data Link
2.9.Physical Layer (Layer 1)
2.10.Layer Implementation
2.10.1.Application Layer
2.10.2.Transport and Internet Layers
2.10.3.Data Link and Physical Layers
3.1.Introduction
3.2.Intermediary Devices
3.2.1.Operational Layers
3.2.2.Operating System
Contents note continued: 3.2.2.1.General Attributes
3.2.2.2.Access to Operating System
3.3.Hub (Multiport Repeater)
3.4.Bridge and Wireless Access Point
3.5.Switch
3.5.1.General Features
3.5.2.Switch Port
3.5.3.Switch Table
3.5.3.1.Switch Table Entries
3.5.3.2.Switch Learning
3.5.3.3.Aging of Entries
3.5.4.Switch Types
3.5.4.1.Nonmanaged versus Managed Switches
3.5.4.2.Store-and-Forward versus Cut-Through Switches
3.5.4.3.Symmetric versus Asymmetric Switches
3.5.4.4.Layer 2 versus Layer 3 Switches
3.5.4.5.Fixed, Stackable, and Modular Switches
3.5.4.6.Power over Ethernet
3.5.5.Security Issues
3.5.5.1.Safeguarding Switch Ports
3.5.5.2.Port Mirroring
3.6.Routers
3.6.1.Two Primary Functions
3.6.1.1.Routing Table Development and Its Update
3.6.1.2.Packet Forwarding
3.6.2.Router Components
3.6.3.Router Ports and Naming
3.6.4.Router Configuration
3.6.4.1.Basic Features
3.6.4.2.Advanced Features
Contents note continued: 3.7.Switching versus Routing
3.7.1.Data Link Layer versus Internet Layer
3.7.2.Connection-Oriented versus Connectionless
3.7.3.Single Delivery versus Multiple Delivery Paths
3.8.Address Resolution Protocol
3.8.1.Background
3.8.2.ARP Usage Scenarios
3.9.Choice of Intermediary Devices
3.10.Collision versus Broadcast Domains
3.10.1.Collision Domain
3.10.1.1.Collision Domain Types
3.10.1.2.Collision Domain and Network Design
3.10.1.3.CSMA/​CD
3.10.2.Broadcast Domain
4.1.Introduction
4.2.Data Transmission Elements
4.2.1.Digital Signaling
4.2.1.1.On I Off Signaling
4.2.1.2.Voltage Signaling
4.2.2.Analog Signaling
4.2.2.1.Properties of Analog Signal
4.2.2.2.Modulation
4.2.3.Signaling Devices
4.2.3.1.Modem and Analog Signaling
4.2.3.2.CSU/​DSU and Digital Signaling
4.2.4.Bandwidth and Related Concepts
4.2.4.1.Bandwidth
Contents note continued: 4.2.4.2.Baseband and Broadband
4.2.5.Synchronous versus Asynchronous Transmissions
4.2.5.1.Asynchronous Transmission
4.2.5.2.Synchronous Transmission
4.2.6.Multiplexing
4.2.6.1.Frequency Division Multiplexing
4.2.6.2.FDM Example: ADSL
4.2.6.3.Time Division Multiplexing
4.2.6.4.TDM Example: T-1 Line
4.2.6.5.Spread Spectrum
4.2.7.Digital Speed Hierarchies
4.2.7.1.Digital Signal
4.2.7.2.Optical Carrier/​Synchronous Transport Module
4.3.Networking Media
4.3.1.Propagation Effects
4.3.1.1.Attenuation
4.3.1.2.Distortion
4.3.2.Twisted Pairs
4.3.2.1.UTP versus STP
4.3.2.2.Cable Structure and Categories
4.3.2.3.Twisted-Pair Patch Cable
4.3.3.Optical Fibers
4.3.3.1.Advantages
4.3.3.2.Physical Structure
4.3.3.3.Single Mode versus Multimode
4.3.3.4.Fiber Patch Cable
4.3.4.LAN Cabling Standards
4.4.Structured Cabling
4.4.1.Background
4.4.2.Structured Cabling System
Contents note continued: Key Terms
5.1.Introduction
5.2.Governance of IP Address Space
5.3.Structure of the IP Address
5.3.1.Binary versus Decimal Value Conversion
5.3.2.Structure of the IP Address
5.4.Classful IP: Legacy
5.4.1.Class A Network
5.4.2.Class B Network
5.4.3.Class C Network
5.5.Classless IP: Today
5.6.Special IP Address Ranges
5.6.1.Loopback
5.6.1.1.Internal Testing of TCP/​IP Stack
5.6.1.2.Off-Line Testing of an Application
5.6.2.Broadcasting
5.6.2.1.Limited Broadcasting
5.6.2.2.Directed Broadcasting
5.6.2.3.Security Risk of Directed Broadcasting
5.6.3.Multicasting
5.6.4.Private IP and NAT
5.6.4.1.NAT: One-to-One IP Mapping
5.6.4.2.NAT: Many-to-One IP Mapping
5.6.4.3.Pros and Cons of NAT
5.7.Subnetting
5.7.1.Defining Subnet Boundary (Review)
5.7.2.Subnetwork Addressing
5.8.Subnet Mask
5.8.1.Subnet Mask
5.8.2.Subnetting Address Space
Contents note continued: 5.8.3.Broadcasting within a Subnet
5.9.Supernetting
5.10.Managing IP Address SPACE
5.10.1.Determining Number of Nodes
5.10.2.Determining Subnets
5.10.2.1.Managing Security with DMZ Subnet
5.10.2.2.Developing IP Assignment Policy
Hands-On Exercise: Enterprise IP Management at Atlas Co.
6.1.Introduction
6.2.Routing Mechanism
6.3.Routing Table
6.3.1.Background
6.3.2.Routing Table Elements
6.4.Packet Forwarding Decision
6.5.Entry Types of Routing Table
6.5.1.Directly Connected Routes
6.5.2.Static Routes
6.5.2.1.Static Routes of a Router
6.5.2.2.Static Routes of a Host
6.5.3.Dynamic Routes
6.6.Dynamic Routing Protocols
6.6.1.Protocol Categories
6.6.1.1.Interior Gateway Protocols
6.6.1.2.Exterior Gateway Protocols
6.6.2.Delivery of Advertisement
6.6.3.Determination of Dynamic Routes
6.6.4.Security Management
Contents note continued: 6.6.5.Static versus Dynamic Routing
6.7.Inter-domain Routing
6.8.Perspectives on Packet Routing
7.1.Introduction
7.2.Standard Layers
7.3.Ethernet Frame
7.3.1.Frame Structure
7.3.2.Addressing Modes
7.4.Ethernet LAN Design
7.4.1.Flat versus Hierarchical Design
7.4.2.Access Layer
7.4.3.Distribution and Core Layers
7.4.4.Benefits of Hierarchical Design
7.5.Spanning Tree Protocol
7.5.1.Link Redundancy
7.5.2.Protocols and Mechanism
7.6.Link Aggregation Review Questions: EQUIP Co. Case
7.7.Virtual LANs (VLANs)
7.7.1.Background: Without VLANs
7.7.2.VLAN Concept
7.8.VLAN Scenarios
7.8.1.Without VLANs
7.8.2.With VLANs
7.8.2.1.Define VLANs on Switches
7.8.2.2.Plan the Range of Trunk and Access Ports
7.8.2.3.Assign Access Ports to VLANs
7.8.3.How VLANs Work
7.8.4.VLAN ID versus Subnet Addressing
7.9.VLAN Tagging/​Trunking (IEEE802.1Q)
Contents note continued: 7.9.1.Background
7.9.2.VLAN Tagging
7.9.3.VLAN Tagging/​Untagging Process
7.10.VLAN Types
7.10.1.Default VLAN
7.10.2.Data VLAN
7.10.2.1.Data VLAN and Security
7.10.3.Voice VLAN
7.11.Inter-VLAN Routing
7.11.1.A Router Interface per VLAN
7.11.1.1.Scenario 1
7.11.1.2.Scenario 2
7.11.2.Sub-Interfaces/​Ports (Advanced)
7.12.VLANs and Network Management
8.1.Introduction
8.2.Standard Layers and Wireless Cards
8.3.WiFi Setup Modes
8.3.1.Ad Hoc Mode
8.3.2.Infrastructure Mode
8.4.Wireless Access Points
8.4.1.AP in Infrastructure Mode
8.4.2.AP in Non-infrastructure Modes
8.4.2.1.Repeater Mode
8.4.2.2.Bridge Mode
8.5.SSID, BSS, and ESS
8.5.1.Service Set Identifier
8.5.2.BSS versus ESS
8.5.2.1.Basic Service Set
8.5.2.2.Extended Service Set
8.6.Media Access Control
8.6.1.CSMA I CA
8.6.2.RTS/​CTS
8.7.WiFi Frames
8.7.1.Data Frame
Contents note continued: 8.7.2.Management Frame
8.7.3.Control Frame
8.8.WiFi and Radio Frequency
8.8.1.Radio Spectrum
8.8.1.1.Low versus High Radio Frequency
8.8.1.2.Governance
8.8.1.3.Licensed versus Unlicensed Radio
8.8.2.WiFi Channels
8.8.3.Planning Basic Service Sets
8.9.Authentication and Association
8.9.1.Three-Stage Process
8.9.2.Authentication Methods of a Station
8.9.2.1.Open Authentication
8.9.2.2.Pre-shared Key Authentication
8.9.2.3.Authentication Server
8.9.2.4.Additional Notes on Security
8.10.WiFi Standards
8.10.1.IEEE802.11n
8.10.1.1.Throughput Modes
8.10.1.2.2.415.0 GHz Bands
8.10.1.3.Single-User MIMO
8.10.1.4.QoS Support
8.10.2.IEEE802.11ac
8.10.2.1.5.0 GHz Band
8.10.2.2.Throughput Modes
8.10.2.3.Multi-user MIMO
8.11.WiFi Mesh Network (IEEE802.11s)
8.12.WiFi Home/​ SOHO Network
8.12.1.DSL/​Cable Modem
8.12.2.Wireless Access Router
8.12.3.IP Configuration
Contents note continued: 8.12.4.Case: Wireless Access Router Configuration
9.1.Introduction
9.2.WAN and Enterprise Networks
9.2.1.WAN Connection Scenarios
9.2.2.Service-Level Agreement
9.2.3.CPE versus SPF
9.2.3.1.Demarcation Point
9.2.4.WAN Design Considerations
9.3.Layers of WAN Standards
9.3.1.Physical Layer
9.3.2.Data Link Layer
9.3.2.1.Circuit Switching
9.3.2.2.Packet Switching
9.3.3.Comparison: WAN versus LAN
9.4.IP Addressing for WAN Links
9.4.1.Leased Lines
9.4.2.Packet Switched Data Network
9.4.2.1.One Subnet between Two Locations
9.4.2.2.One Subnet for All Locations
9.5.Physical Layer Options: Leased Lines
9.5.1.T-Carrier/​E-Carrier
9.5.1.1.T1 and T3 Circuits
9.5.2.SONET/​SDH
9.6.Data Link Standard: Leased Lines
9.6.1.PPP Frame Structure
9.6.2.Router Authentication
9.6.2.1.PAP versus CHAP
9.7.Data Link Standards: PSDN
9.7.1.General Attributes
Contents note continued: 9.7.2.Virtual Circuits
9.7.2.1.WAN Switch Table
9.7.2.2.PVC versus SVC
9.7.2.3.Access Link Speeds
9.8.Frame Relay
9.8.1.General Characteristics
9.8.2.Frame Structure
9.8.3.Data Link Connection Identifier
9.8.3.1.How DLCI Works
9.8.3.2.FR Switch Table
9.8.3.3.Multiple VCs and DLCIs
9.8.4.Mapping IP Addresses
9.9.Asynchronous Transfer Mode
9.9.1.Background
9.9.2.Cell Switching
9.9.3.Quality of Service
9.10.Carrier Ethernet
9.10.1.Background
9.10.2.Strengths
9.10.3.Service Transport
9.11.Multi-Protocol Label Switching
9.11.1.Labels and Label Information Base
9.11.2.Benefits of MPLS
9.12.Wireless WAN: Cellular Network
9.12.1.General Architecture
9.12.1.1.Cell
9.12.1.2.Base Station
9.12.1.3.Mobile Terminal Switching Office
9.12.1.4.Call Channels
9.12.2.Multiple Access Technologies
9.12.2.1.Frequency Division Multiple Access
9.12.2.2.Time Division Multiple Access
Contents note continued: 9.12.2.3.Code Division Multiple Access
9.12.2.4.Orthogonal Frequency Division Multiple Access
9.12.3.Generations of Cellular Standards
9.12.4.LTE and Future
9.12.4.1.Long-Term Evolution
9.12.4.2.What Does the Future Hold?
10.1.Introduction
10.2.Internet Architecture
10.2.1.Internet Service Provider
10.2.1.1.National ISPs
10.2.1.2.Regional Local ISPs
10.2.1.3.ISP Network Architecture
10.2.2.Internet Exchange Point
10.2.3.Autonomous System
10.2.4.World Wide Web and Search Engine
10.2.4.1.World Wide Web
10.2.4.2.Deep Web
10.3.VPN for Secure Communications
10.3.1.Technology
10.3.1.1.Background
10.3.1.2.VPN Technology
10.3.2.Benefits of VPN
10.3.2.1.Cost-Effectiveness
10.3.2.2.Accessibility and Scalability
10.3.2.3.Flexibility
10.3.3.Risks of VPN
10.3.3.1.Reliability
10.3.3.2.Security
10.3.4.Types of VPN
Contents note continued: 10.3.4.1.Remote-Access VPN
10.3.4.2.Site-to-Site VPN
10.3.5.VPN Standards
10.3.6.IP Security
10.3.6.1.Tunnel Mode
10.3.6.2.Transport Mode
10.3.7.Secure Socket Layer
10.3.7.1.Broad Acceptance
10.3.7.2.VPN Implementation
10.3.7.3.SSL and Internet Commerce
10.3.8.IPSec versus SSL
10.4.IPv6 (IP Next Generation)
10.4.1.Background
10.4.2.IP Packet Structure
10.4.3.IP Addressing
10.4.3.1.Subnet Address Bits
10.4.3.2.Host Address Bits
10.4.4.Address Abbreviation
10.4.5.IPv6 versus IPv4 Standards
10.4.6.Transition Approaches
10.4.6.1.Dual IP Stacks within a Node
10.4.6.2.Direct Address Conversion
10.4.6.3.Packet Tunneling
10.5.Client-Server Applications
10.5.1.Domain Name System
10.5.1.1.Domain and Name Resolution
10.5.1.2.Domain Hierarchy
10.5.1.3.DNS Architecture
10.5.1.4.Host DNS File
10.5.2.Dynamic Host Configuration Protocol
10.5.2.1.The Process View
Contents note continued: 10.6.Server Virtualization
10.6.1.Traditional Computing Model
10.6.2.Virtualization Concept
10.6.3.Virtualization Approaches
10.6.3.1.Hosted Virtualization
10.6.3.2.Hypervisor-Based Virtualization
10.6.4.Shared Infrastructure
10.6.5.Summary: Benefits Realized
11.1.Introduction
11.2.Malicious Codes: Malware
11.2.1.Virus
11.2.2.Worm
11.2.3.Trojan
11.2.4.Bot
11.2.5.Other Malware Types
11.2.6.Malware Issues
11.3.Password Cracking
11.3.1.Brute Force Method
11.3.2.Dictionary Method
11.4.Spoofing
11.4.1.Source Address Spoofing
11.4.1.1.IP Spoofing
11.4.1.2.MAC Spoofing
11.4.2.Email Spoofing
11.4.3.Web (or HTTP) Spoofing
11.5.Denial of Service
11.5.1.Pinging and SYN Requests
11.5.1.1.Pinging
11.5.1.2.SYN Requests
11.5.2.Distributed DOS
11.5.3.MAC Address Flooding
11.6.Packet Sniffing
11.6.1.Packet Sniffing with Wireshark
Contents note continued: 11.7.Port Scanning
11.7.1.Port Scanning with Zenmap
11.8.Social Engineering
11.9.Man-in-the-Middle
11.9.1.MITM with Bogus DHCP Server
11.10.Spam
11.11.Poisoning
11.11.1.ARP Poisoning (ARP Spoofing)
11.11.2.DNS Poisoning (DNS Spoofing)
11.12.Zero-Day Attack
11.13.WiFi Threats
11.13.1.Wardriving
11.13.2.Denial of Service
11.13.3.Rogue AP
11.13.4.MITM
12.1.Introduction
12.2.Security Requirements and Solutions
12.2.1.Security Requirements
12.2.1.1.Confidentiality (Privacy)
12.2.1.2.Data Integrity
12.2.1.3.Authentication
12.2.1.4.Access Control/​Authorization
12.2.1.5.Availability
12.2.2.Technology Solutions
12.3.Principles in Architecting Defense
12.3.1.Layering
12.3.2.Limiting
12.3.3.Simplicity
12.4.Firewall
12.4.1.Firewall and DMZ
12.4.1.1.Separating Firewall and Border Router
12.4.2.Firewall Functions and Management
Contents note continued: 12.4.2.1.Firewall Functions
12.4.2.2.Managing Firewall
12.4.3.Stateless versus Stateful Filtering
12.4.3.1.Stateless Filtering
12.4.3.2.Stateful Filtering
12.5.Access Control List
12.5.1.How Many ACLs?
12.5.2.ACL Filtering versus Packet Routing
12.6.Cryptography
12.6.1.Cryptography System
12.6.1.1.Basic Components
12.6.1.2.How It Works
12.6.2.Symmetric-Key Cryptography
12.6.3.Asymmetric-Key Cryptography
12.6.3.1.How It Works
12.6.3.2.Pros and Cons
12.6.4.Hybrid Approach
12.6.5.Hashing Cryptography
12.7.Digital Signature
12.8.Digital Certificate
12.8.1.Digital Certificate
12.8.2.Certificate Authority
12.9.Security Protocol
12.9.1.WiFi Security Standards
12.9.1.1.Wired Equivalent Privacy
12.9.1.2.WiFi Protected Access (WPA and WPA2)
12.9.1.3.Enterprise Mode versus Personal Mode
Summary Questions.

Powered by Koha