Business Data Networks and Security. Business Data Networks and Security. Raymond R. Panko Julia A. Panko

Similar documents
BRIEF CONTENTS. Online Modules

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

CompTIA Network+ Study Guide Table of Contents

MTA_98-366_Vindicator930

BUSINESS DATA NETWORKS AND SECURITY

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview

DATA AND COMPUTER COMMUNICATIONS

Network Connectivity and Mobility Part 2

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Objective Applications, Devices, Protocols Applications, Devices, Protocols Classifying Network Components Objective 1.

Understanding Networking Fundamentals

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

University of Southern California EE450: Introduction to Computer Networks

Wide Area Networks (WANs) Slide Set 6

CompTIA Network+ N10-005

University of San Francisco Course Syllabus and Outline

Data Communications and Networks Spring Syllabus and Reading Assignments

Wireless# Guide to Wireless Communications. Objectives

Chapter 14: Introduction to Networking

Special expressions, phrases, abbreviations and terms of Computer Networks

Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

CCNA Exploration Network Fundamentals

MORGANSTATEUNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING. EEGR510 Communications Networks Credits: 3 COURSE SYLLABUS

Cisco Technologies, Routers, and Switches p. 1 Introduction p. 2 The OSI Model p. 2 The TCP/IP Model, the DoD Model, or the Internet Model p.

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks

Computer Networks. Andrew S. Tanenbaum

It is the process of sharing data, programs, and information between two or more computers.

Electrical and Telecommunications Engineering Technology_TCET3142/TC570 NEW YORK CITY COLLEGE OF TECHNOLOGY THE CITY UNIVERSITY OF NEW YORK

MORGANSTATEUNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING. EEGR410 Introduction to Networks. Credits: 3 COURSE SYLLABUS

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE

Section 1.1: Networking Overview

Wireless technology Principles of Security

Module Three SG. Study Guide. Exam Three Content Areas. Module Three. Chapter Seven, Backbone Networks

FINAL EXAM REVIEW PLEASE NOTE THE MATERIAL FROM LECTURE #16 at the end. Exam 1 Review Material

Communication Networks

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

Networking. Networking and Communication Trends Convergence (Accessibility) Speed Stability Simplicity* Embeddedness

Course overview. CompTIA Network+ Certification (Exam N10-007) Study Guide (G525eng v038)

Chapter 1: introduction

Fundamental Issues. System Models and Networking Chapter 2,3. System Models. Architectural Model. Middleware. Bina Ramamurthy

Hands-On TCP/IP Networking

COMPUTER NETWORK. PREPARED BY: DHAVAL R. PATEL Page 1. Q.1 Explain IP address. IP address is unique number of network device in network.

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

Table of Contents. Computer Networks and the Internet

Wednesday, May 16, 2018

end systems, access networks, links 1.3 network core

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

ELC 537 Communication Networks

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

Review: Networking Fall Final

Contents. Introduction to Networking. Preface...i. Introduction... xix

Communications and Networks The McGraw-Hill Companies, Inc. All rights reserved.

CCNA. Course Catalog

Introduction to Networking

Chapter 2 Communicating Over the Network

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

NZQA unit standard version 2 Page 1 of 6. Demonstrate basic knowledge of telecommunications concepts

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

Chapter 7. Telecommunications, the Internet, and Wireless Technology

The Internet and the World Wide Web

Local area network (LAN) Wide area networks (WANs) Circuit. Circuit switching. Packets. Based on Chapter 2 of Gary Schneider.

Facilitator. Introduction to IT Networking for Facilities Managers. Class Logistics

CHAPTER -1. Introduction to Computer Networks

Data Communication and Network. Introducing Networks

Network basics. Unit objectives Describe the basic components of a network Identify characteristics of network technologies Analyze the OSI model

Computer Networking Introduction

PracticeDump. Free Practice Dumps - Unlimited Free Access of practice exam

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ

Communicating over the Network

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Study Guide. Module Two

Computer Networks (Unit wise Questions)

Lecture 8 Winter 2006 Enterprise and Personal Communications Networks

IT4405 Computer Networks (Compulsory)

Networks and Communications MS216 - Course Outline -

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

Wired internetworking devices. Unit objectives Differentiate between basic internetworking devices Identify specialized internetworking devices

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS

job task analysis (exam Blueprint) Electronic Systems Certified Networking Specialist (ESC-N)

Gigabit SSL VPN Security Router

Entry Level Assessment Blueprint Computer Networking Fundamentals

Computer Networking Fundamentals

VoIP Dictionary, Glossary and Terminology

Course Outline. CompTIA Network+ Deluxe Study Guide Third Edition (Course & Labs)

Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ.

Chapter 4: Networking and the Internet

INTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com

CompTIA Network+ N ucertify Course & Labs. Course Outline. CompTIA Network+ N ucertify Course & Labs.

Number: Passing Score: 750 Time Limit: 120 min File Version: 1.0. Microsoft Exam Name: Identity with Windows Server 2016 (beta)

ITEC 3800 Data Communication and Network. Introducing Networks

Transcription:

tenth edition Panko Panko This is a special edition of an established title widely used by colleges and universities throughout the world. Pearson published this exclusive edition for the benefit of students outside the United States and Canada. If you purchased this book within the United States or Canada you should be aware that it has been imported without the approval of the Publisher or Author. Business Data Networks and Security For these Global Editions, the editorial team at Pearson has collaborated with educators across the world to address a wide range of subjects and requirements, equipping students with the best possible learning tools. This Global Edition preserves the cutting-edge approach and pedagogy of the original, but also features alterations, customization, and adaptation from the North American version. Global edition Global edition Global edition Business Data Networks and Security TENTH edition Raymond R. Panko Julia A. Panko Pearson Global Edition CVR_PANK5419_10_SE_CVR.indd 1 11/11/14 7:00 PM

Business Data Networks and Security, Global Edition - PDF - PDF Table of Contents Cover Title Copyright Contents Preface for Students About the Authors Chapter 1 Welcome to the Cloud Box 1: By the Numbers Netflix Dives into the Amazon Hosts, Messages, and Addresses The Internet Netflix Dives into the Amazon Virtualization and Agility Infrastructure as a Service (IaaS) and Software as a Service (SaaS) Clients Move into the Cloud Rain Clouds: Security Networks and the Cloud Service Level Agreements (SLAs): Speed Box 2: Writing Speeds in Metric Notation Messages Application Messages Message Fragmentation, Frames, and Packets Single Networks Single-Network Host Addresses Point-to-Point Single Networks, Physical Links, and Data links Wireless Single Networks Switched Single Networks Hybrid Switched/Wireless Single Networks Internet Transmission Hosts on Different Single Networks Creating the Internet Routes and Layer Box 3: Packet Switching Standards Layers Five Layers Layers 1 through 3 (Physical, Data Link, and Internet Layers) Layers 4 and 5 (Transport and Application Layers) Standards Agencies and Architectures TCP/IP Supervisory Applications: The Domain NameSystem (DNS)

Chapter 1a Hands On: A Few Internet Tols Chapter 1b Design Exercise: A Small Home Network A Small Home Network Components The Wireless Access Router Services Configuration Design Exercise Chapter 2 Network Standards How Internet Standards Came to Be Box 1: April 1 and RFCs Standard = Protocol Network Standards Recap of Chapter 1 Standards Concepts Network Standard Characteristics Examples of Message Ordering Message Ordering in HTTP Message Ordering and Reliability in TCP at the Transport Layer Examples of Message Syntax Syntax: General Message Organization The Ethernet Frame Syntax The Internet Protocol (IP) Packet Syntax Transmission Control Protocol Segment Syntax User Datagram Protocol Datagram Syntax Port Numbers HTTP Request and Response Message Syntax Converting Application Messages Into Bits Encoding Encoding Text as ASCII Converting Integers into Binary Numbers (1s and 0s) Encoding Alternatives Encoding Voice Vertical Communication on Hosts End-of-Chapter Question Chapter 2a Hands-On: Wireshark Packet Capture

Getting Wireshark Using Wireshark Getting Started Starting a Packet Capture Getting Data Stopping Data Collection Looking at Individual Packets Options Chapter 3 Network Security The Target Breach The Attack Damages Perspective Types of Attacks Malware Attacks Vulnerabilities and Patches Viruses and Worms Other Types of Malware Payloads Attacks on Human Judgment Human Break-Ins (Hacking) Stages in the Attack Denial-of-Service (DOS) Attacks Using Bots Advanced Persistent Threats Types of Attackers Hackers Employees, Ex-Employees, and Other Insiders Malware Attackers Cyberterrorists and National Governments Table of Contents Protecting Dialogues Cryptography Symmetric Key Encryption for Confidentiality Electronic Signatures: Message Authentication and Integrity Host-to-Host Virtual Private Networks (VPNs) Other Forms of Authentication Terminology and Concepts Reusable Passwords Other Forms of Authentication Firewalls Dropping and Logging Provable Attack Packets

Stateful Packet Inspection (SPI) Firewalls Next-Generation Firewalls (NGFWs) Box: Antivirus Protection Chapter 4 Network and Security Management Failures in the Target Breach Network Quality of Service (QOS) Transmission Speed Rated Speed versus Throughput and Aggregate Throughput Other Quality-of-Service Metrics Service Level Agreements (SLAs) Network Design Traffic Analysis Redundancy Momentary Traffic Peaks Strategic Security Planning Principles Security Is a Management Issue The PlanProtectRespond Cycle Security Planning Principles Policy-Based Security Centralized Network Management Ping The Simple Network Management Protocol (SNMP) Software-Defined Networking (SDN) Centralized Security Management Chapter 4a Hands-On: Microsoft Office Visio What is Visio? Using Visio Chapter 5 Ethernet (802.3) Switched LANs Ethernet Begins Local Area Networks Switched Technology Ethernet Standards Development

Physical and Data Link Layer Operation Ethernet Physical Layer Standards Signaling 4-Pair Unshielded Twisted Pair Copper Wiring Serial and Parallel Transmission UTP Installation Limitations Optical Fiber Multimode Optical Fiber Quality Standards Link Aggregation (Bonding) Ethernet Physical Layer Standards and Network Design Ethernet Data Link Layer Standards The Ethernet Frame Basic Ethernet Data Link Layer Switch Operation Advanced Ethernet Switch Operation The Rapid Spanning Tree Protocol (RSTP) Priority Manageability Power over Ethernet (POE) Ethernet Security Port-Based Access Control (802.1X) Man in the Middle Attack in an Ethernet LAN Chapter 5a Hands-On: Cutting and Connectorizing UTP1 Solid and Stranded Wiring Solid-Wire UTP versus Stranded-Wire UTP Relative Advantages Adding Connectors Cutting the Cord Stripping the Cord Working with the Exposed Pairs Pair Colors Untwisting the Pairs Ordering the Pairs Cutting the Wires Adding the Connector Holding the Connector Sliding in the Wires Some Jacket Inside the Connector

Crimping Pressing Down Making Electrical Contact Strain Relief Testing Testing with Continuity Testers Testing for Signal Quality Chapter 5b Hands-On: Ethernet Switching The Exercise What You Will Need Creating the Network Creating a Loop Chapter 6 Wireless LANs I OSI Standards 802.11 versus Wi-Fi Wireless LAN Operation Radio Signal Propagation Frequencies Antennas Wireless Propagation Problems Radio Bands, Bandwidth, and Spread Spectrum Transmission Service Bands Signal and Channel Bandwidth The 2.4 GHz and 5 GHz Service Bands Normal and Spread Spectrum Transmission Spread Spectrum Transmission Licensed and Unlicensed Radio Bands Implementing Spread Spectrum Transmission 802.11 WLAN Operation Wireless Access Points Basic Service Sets (BSSs) Extended Service Sets (ESSs), Handoffs, and Roaming Media Access Control Box 1: Media Access Control (MAC) 802.11 Transmission Standards Characteristics of802.11g, 602.11a, 802.11n, and 802.11ac Bands and Channel Bandwidth MIMO Beamforming and Multiuser MIMO Speed, Throughput, and Distance Backward Compatibility

Standards and Options Wireless Mesh Networking Chapter 6a Using Xirrus Wi-Fi Inspector The Four Windows The Radar Window (Read the Fine Print) Connection Window The Networks Window Signal History Other Groups on the Ribbon Tests Connection Test Speed Test Quality Test Activities Activity Chapter 7 Wireless LANs II The TJX Breach 802.11i WLAN Security WLAN Security Threats The 802.11i WLAN Security Standard Pre-Shared Key (PSK) Mode in 802.11i 802.1X Mode Operation Beyond 802.11i Security Rogue Access Points Evil Twin Access Points and Virtual Private Networks (VPNs) 802.11 Wi-Fi Wireless LAN Management Access Point Placement Remote Management Bluetooth Box 1: Expressing Power Ratios in Decibels Two Modes of Operation One-to-One, MasterSlave Operation Bluetooth Profiles Other Local Wireless Technologies Near Field Communication (NFC) Wi-Fi Direct

Security in Emerging Local Wireless Technologies Chapter 8 TCP/IP Internetworking I IP Routing Hierarchical IP Addressing Routers, Networks, and Subnets Network and Subnet Masks How Routers Process Packets Switching versus Routing Routing Table Rows Are Routes for All IP Addresses in a Range Step 1: Finding All Row Matches Step 2: Selecting the Best-Match Row Step 3: Sending the Packet Back Out Cheating (Decision Caching) Box 1: Masking When Masks Do Not Break at 8-Bit Boundaries Box 2: The Address Resolution Protocol The Internet Protocol Version 4 (IPV4) Fields The First Row The Second Row The Third Row IP Options IP Version 6 (IPV6) Outgrowing IPv4 IPv6 Writing 128-Bit IPv6 Addresses The IPv6 Header Extension Headers The Transmission Control Protocol (TCP) Fields in TCP/IP Segments Openings and Abrupt TCP Closes The User Datagram Protocol (UDP) Chapter 9 TCP/IP Internetworking II Core TCP/IP Management Tasks IP Subnet Planning Network Address Translation (NAT)

The Domain Name System (DNS) Simple Network Management Protocol (SNMP) Securing Internet Transmission Virtual Private Networks IPsec VPNs IPsec Transport Mode IPsec Tunnel Mode Remote-Site-Access and Site-to-Site VPNs IPsec Security Associations and Policy Servers SSL/TLS VPNs Managing IP Version 6 (IPV6) Internet Layer Protocol Stacks IPv6 Subnetting The Domain Name System for IPv6 Other TCP/IP Standards Dynamic Routing Protocols Internet Control Message Protocol (ICMP) for Supervisory Messagesat the Internet Layer Chapter 10 Carrier Wide Area Networks (WANs) Lans and Wans (and Mans) LANs versus MANs and WANs Other Aspects of WANs Carrier WAN Components and Business Uses The Telephone System Residential Wired Internet Access Residential Asymmetric Digital Subscriber Line (ADSL) Service Cable Modem Service ADSL versus Cable Modem Service Cellular Data Service Cellular Service Why Cells? Cellular Data Speeds Wired Business WANs Leased Lines Reaching the ISP via a Leased Line Leased Line Private Corporate WANs Public Switched Data Network (PSDN) Carrier WANs Multiprotocol Label Switching (MPLS)

WAN Optimization Software Defined Networking (SDN) Concepts and Benefits Forwarding Tables SDN Applications Application Program Interfaces (APIs) Chapter 11 Networked Aplications GhostNet Networked Applications The Evolution of Client Devices and Networking Application Security Cross-Site Scripting (XSS) SQL Injection Attacks Electronic Mail (E-Mail) E-Mail Standards Message Body Standards Simple Mail Transfer Protocol (SMTP) Receiving Mail (POP and IMAP) Web-Enabled E-Mail SMTP for Transmission between Mail Hosts Malware Filtering in E-Mail Encryption for Confidentiality in E-Mail Transmission Voice Over IP (VOIP) Basics VoIP Signaling VoIP Transport The World Wide Web HTTP and HTML Standards Complex Webpages Peer-to-Peer (P2P) Application Architectures Traditional Client/Server Applications P2P Applications P2P File-Sharing Applications: BitTorrent P2P Communication Applications: Skype P2P Processing Applications: SETI@Home Privacy Protection: Tor Facilitating Servers and P2P Applications

Online Modules Module A More on TCP Numbering Octets Ordering TCP Segments upon Arrival The TCP Acknowledgment Process Flow Control: Window Size Review Questions Module B More on Modulation Modulation Frequency Modulation Amplitude Modulation Phase Modulation Quadrature Amplitude Modulation (QAM) Review Questions Module C More on Telecomunications The PSTN Transport Core and Signaling The Transport Core Time Division Multiplexing (TDM) Lines Leased Lines and Trunk Lines Asynchronous Transfer Mode (ATM) Transport Signaling Communication Satellites Microwave Transmission Satellite Transmission Geosynchronous Earth Orbit (GEO) Satellites Low Earth Orbit (LEO) and Medium Earth Orbit (MEO) Satellites VSAT Satellites Wiring The First Bank of Paradise Headquarters Building Facilities Telephone Wiring Data Wiring Plenum Cabling PBX Services Carrier Services and Pricing Basic Voice Services Advanced Services Call Waiting Voice Mail Telephone Carriers and Regulation PTTs and Ministries of Telecommunications

AT&T, the FCC, and PUCs Deregulation Voice Over IP Module D Directory Servers Hierarchical Organization Lightweight Directory Access Protocol (LDAP) Directory Servers and The Networking Staff Microsofts Active Directory (AD) Glossary Index A B C D E F G H I J K L M N O P Q R S T U V W Active Directory Domains Domain Controllers Domains in an Active Directory Tree Complex Structures Authentication and Directory Servers

X Z