1st Edition

Networking Systems Design and Development




ISBN 9781420091595
Published December 21, 2009 by CRC Press
464 Pages 310 B/W Illustrations

USD $125.00

Prices & shipping based on shipping country


Preview

Book Description

Effectively integrating theory and hands-on practice, Networking Systems Design and Development provides students and IT professionals with the knowledge and skills needed to design, implement, and manage fully functioning network systems using readily available Linux networking tools. Recognizing that most students are beginners in the field of networking, the text provides step-by-step instruction for setting up a virtual lab environment at home.

Grounded in real-world applications, this book provides the ideal blend of conceptual instruction and lab work to give students and IT professionals a quick start in developing network systems using the Linux operating system. Leaving nothing to chance, it provides readers with detailed guidance through the many hands-on exercises.

  • Highlights fundamental networking concepts and theories
  • Addresses the server and client sides of Linux-based networking
  • Includes comprehensive lab exercises that use Ubuntu GUN/Linux
  • Supplies professors with instructions and resources to create and manage online computer labs as well as supplemental instructional materials 
  • Provides an effective, low-cost alternative to traditional proprietary-based network systems

Creating and maintaining a fully functioning enterprise network system doesn’t have to be expensive. This self-contained text provides readers with the tools to create their own networks using open source materials—and the virtual lab environment to develop problem-solving skills that will serve them well in their careers.

Table of Contents

Linux Networking Overview
Overview of Linux Operating Systems
     Brief History
     Linux Distributions
Linux Networking
     Linux Network Architecture
     Linux Networking Tasks and Network Tools
Book Framework

Network Protocols
Application Layer Protocols
Transport Layer Protocols
     Transmission Control Protocol (TCP)
     User Datagram Protocol (UDP)
Internet Layer Protocols
     Internet Protocol (IP)
     Internet Control Message Protocol (ICMP)
    Address Resolution Protocol (ARP) 
     IP Security (IPSec)
     Internet Routing Protocols
Network Interface Layer Protocols
Network Protocol Graph

Network Technologies
Network Types
     Local Area Network
          Ethernet
          Fibre Channel
     Wide Area Network
     Internet
     Wireless Network
Network Media
     Modulation
     Multiplexing
     Twisted-Pair Wire
     Optical Fiber
     Wireless Transmission Media
Network Devices
     Network Interface Cards
     Network Switches
     Network Routing Equipment

Network Design
Network Design
     Requirement Investigation
     Logical Network Model
     IP Addressing and Routing Strategy
     Security Policy
     Planning for Physical Implementation
     IPv4 IP Addressing
     Special IP Addresses
     Private and Public IP Addressing
     IPv6 Addressing
          Unicast IP Address
          Multicast
          Anycast
Subnets
     Reasons for Using Subnets
     Subnet Masks
     Network Subnetting
     Classless Inter-Domain Routing (CIDR)

Network Services
User Accounts
     Users and Groups
Dynamic Host Configuration Protocol (DHCP)
     Dynamic IP Address Assignment Process
     DHCP Configuration
Name Services
     Naming Hierarchy
     DNS Server Hierarchy
     Name Resolution Process
     DNS Zones
     Types of DNS Records

Routing
Connecting Networks with Routers
Routing Table
Updating Routing Table
Route Calculation
     Link State Routing Algorithm
     Distance Vector Routing Algorithm
Routing across Networks

Linux Network Resource Sharing
Network File System (NFS) 
     NSF Technology Overview
     NFS Configuration
Sharing Network with Windows
     Samba Features and Applications
     Configuration of Samba Services
Remote Access through VPN
     VPN Technology7.4.1.1 Internet Protocol Security (IPSec)
          Secure Sockets Layer (SSL) VPN
     Point-to-Point Tunneling Protocol (PPTP) 
     VPN Configuration
Network Address Translation (NAT)
     NAT Technology
     NAT Application and Configuration

Internet Services
Web Services
     Hypertext Transfer Protocol (HTTP)
     Web Servers
     Web Server Configuration
File Transfer Service
FTP Connection
8.3.3 FTP Commands
8.3.4 FTP Configuration
E-Mail Service
8.4.1 E-Mail System
8.4.2 E-Mail Transfer
8.4.3 E-Mail Service Configuration

Network Security
Security Issues
     Network Security Policies
     Intrusion into Computer Systems
     Intrusion into Networks
     Computer Viruses
     Network Security Measures
Security Technologies
     Intrusion Detection System (IDS)
     IP Security (IPSec)
     Remote Authentication Dial In User Service (RADIUS)
     Secure Shell (SSH)
     Secure Sockets Layer (SSL)
     Wi-Fi Protected Access
Network Firewalls
     Firewall Rules
     Firewall Types
     Firewall Architectures

Network Resource Management
User Account Management
     User Management
     Group Management
     Directory Service Management
Network Device Resource Management
     Viewing Device Information
     Device Management Daemons
          Hardware Abstraction Layer (HAL)
          User Device (udev)
     Kernel Management

Wireless Networks
Wireless Network Technologies
     Wi-Fi Technology
     WiMAX Technology
     Infrared
     Bluetooth
Wireless Network Devices
Linux-Compatible Wireless Network Devices
     Linux Compatibility
     Wireless Device Chipsets
     Wireless Device Drivers
     NDISwrapper
Wireless Network Configuration Tools
     Viewing Wireless Network Device Information
     Configuration of Wireless Network Devices

Mobile Networks
Mobile Linux
Mobile Devices
Mobile Network
     Mobile Network System
     First-Generation Mobile Network
     Second-Generation Mobile Network
     Third-Generation Mobile Network
     Universal Mobile Telephone Service (UMTS)
     CDMA2000
     Mobile Network beyond Third Generation

Index

Each chapter begins with an Introduction and concludes with a Summary

...
View More

Support Material

Ancillaries

  • Instructor Resources

    To gain access to the instructor resources for this title, please visit the Instructor Resources Download Hub.

    You will be prompted to fill out a regist