Synopses & Reviews
Designed for the beginner yet useful for the expert, COMPUTER NETWORKING FROM LANS TO WANS: HARDWARE, SOFTWARE, AND SECURITY covers all aspects of computer networking. Hardware details such as the operation of Ethernet, network media and devices, including hubs, switches, routers, and physical topology, are provided, with many design and troubleshooting examples. Software details such as the operation of the TCP/IP protocols, routing protocols, and network operating systems are examined. Applications, such as FTP, Telnet, and email are explained in detail, as are the requirements of writing client/server applications, with several working examples provided. Techniques for applying security to networking and computing activities are covered, including network management, secure communication methods such as SSH, TLS, and VPN, and the fundamentals of forensics. A strong pedagogical approach introduces each new topic with practical, real-world examples, and step-by-step Hands-On Projects. A companion CD includes videos and numerous files that allow the reader to perform important hands-on networking, security, and forensic activities.
Review
"Excellent text, I found it informative and interesting based on my own computer networking experience. It would be appropriate for an undergraduate course or for a person interested in knowing more about the subject of computer networking. A student should have a good knowledge of using a computer and the Internet, and should also have had some formal programming experience such as C or Java to get value from the programming examples. I agree with the authors that it's important to have some understanding of the Windows 95/98 as these operating systems are still out there to be debugged and fixed."
Review
"This book is best suited for the introductory course on computer networking. A Computer Technology student in either a Community College or University setting who has an intermediate knowledge of computers would best utilize this book. A student would need a good grounding of basic computer knowledge as a pre-requisite for using this book. I would personally use this book for my introductory course on computer networking as well as some chapters for a computer security course, and keep it around as a good reference book."
Synopsis
Designed for the beginner yet useful for the expert, COMPUTER NETWORKING FROM LANS TO WANS: HARDWARE, SOFTWARE, AND SECURITY provides comprehensive coverage of all aspects of networking. This book contains 24 chapters illustrating network hardware and software, network operating systems, multimedia and the Internet, and computer and network security and forensics. Six appendices provide coverage of the history of the Internet, the ASCII code, the operation of MODEMs, tips on becoming certified in network, security, and forensics, telecommunication technologies, and setting up a computer repair shop. A companion CD includes numerous videos and files that allow the reader to perform important hands-on networking, security, and forensic activities.
About the Author
Kenneth C. Mansfield Jr. is a Professor in the Computer Studies Department at Broome Community College in Binghamton, NY. He has written over 20 books on networking, operating systems, programming, and computer technology. James L. Antonakos is a Professor in the Computer Studies Department at Broome Community College in Binghamton, NY. He has written over 40 books on electronics, microprocessors, networking, operating systems, and computer technology.
Table of Contents
PART I: NETWORK HARDWARE CHAPTER 1 WHAT IS A COMPUTER NETWORK? Objectives Introduction Computer Network Topology Wired Networks Versus Wireless Networks Representing Digital Data Working with Digital Data Communication Protocols Ethernet LANs Token Ring LANs Network Operating Systems IEEE 802 Standards Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 2 NETWORK TOPOLOGY Objectives Introduction Physical Topology Versus Logical Topology Fully Connected Networks Star Networks Bus Networks Ring Networks Hybrid Networks Network Hierarchy Subnets Network Access Points Public Networks Versus Private Networks Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 3 NETWORKING HARDWARE Objectives Introduction Ethernet Cabling The NIC Token Ring Repeaters Transceivers Hubs Bridges/Switches Routers Cable Modems Satellite Network System Exotic Hardware and Software Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 4 ETHERNET TECHNOLOGY Objectives Introduction The Ethernet Frame Format The Interframe Gap CSMA/CD Ethernet Controllers 10-Mbps Ethernet 100-Mbps Ethernet (Fast Ethernet) 1000-Mbps Ethernet (Gigabit Ethernet) Wireless Ethernet Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 5 TOKEN RING, FDDI, AND OTHER LAN TECHNOLOGIES Objectives Introduction Token Ring Token-Ring Topology Token-Ring Frame Formats Ring Management Comparing Token Ring and Ethernet Token Bus FDDI Broadband LANs ARCnet Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 6 NETWORK DESIGN AND TROUBLESHOOTING SCENARIOS Objectives Introduction Networking Two Computers Networking a Small Lab Networking a Small Business Networking a College Campus Remote Access Methods Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects PART II: NETWORK PROTOCOLS CHAPTER 7 LOW-LEVEL PROTOCOLS Objectives Introduction Serial Data Communication SLIP PPP PPPoE IEEE 802.2 Logical Link Control NetBIOS NetBEUI Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 8 THE TCP/IP PROTOCOLS Objectives Introduction RFCs IP IP Addresses TCP UDP ARP and RARP TCP/IP Support Protocols TCP/IP Applications IP Version 6 Protocol Analyzers Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 9 IPX/SPX, APPLETALK, AND OTHER NETWORK PROTOCOLS Objectives Introduction IPX/SPX AppleTalk DECnet SNA Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 10 SWITCHING AND ROUTING Objectives Introduction Hubs Versus Switches Inside a Switch Store-and-Forward Switching Cut-Through Switching Switches Versus Routers Routing Protocols Autonomous Systems Interior Gateway Protocols Exterior Gateway Protocols Classless Inter-Domain Routing Distance-Vector Routing Link-State Routing Policy Routing Multi-Protocol Label Switching Private Network-Network Interface Layer 3 Switching Inside an ISP Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 11 NETWORK MANAGEMENT AND SECURITY Objectives Introduction Network Management Network Security Storage Management Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects PART III: NETWORK APPLICATIONS CHAPTER 12 ELECTRONIC MAIL Objectives Introduction What Is E-Mail? Simple Mail Transport Protocol Format of E-Mail Messages E-Mail Client Software Sending an E-Mail Message Receiving an E-Mail Message Using the Post Office Protocol E-Mail Error Messages Access to E-Mail Using the Web Multipurpose Internet Mail Extensions Internet Message Access Protocol E-Mail Packet Capture Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 13 FTP AND TELNET Objectives Introduction FTP Clients and Servers Telnet Clients and Servers Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 14 MULTIMEDIA NETWORKING Objectives Introduction Image Files Sound Files The Digital Conversation Transmitting Data Over a Network Voice-Over-IP Video Multicasting Games Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 15 THE INTERNET Objectives Introduction The Organization of the Internet Windows and the Internet World Wide Web HTML CGI JAVA Virtual Private Networks Instant Messaging Setting Up a Web Server Related Sites Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 16 WRITING A NETWORK APPLICATION Objectives Introduction Client-Server Model Connection-Oriented Versus Connectionless Communication Sockets Network Programming Languages Network Applications CGI IP Address Calculator Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects PART IV: NETWORK OPERATING SYSTEMS CHAPTER 17 AN INTRODUCTION TO NETWORKING WITH WINDOWS Objectives Introduction Microsoft Networking The NetBEUI Protocol The Network Neighborhood Network Printing Sharing Files Over a Network Dial-Up Networking ICA Technology Connecting to the Internet Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 18 WINDOWS NT/2000 DOMAINS Objectives Introduction Windows NT Operating System Logon Windows NT Security Menu Domains Windows 2000 Windows NT Domains Basic Capabilities of Windows Server Operating Systems Adding a Client to a Windows Network Logging onto a Network Running a Network Server User Profiles Security Windows 2000 Domains Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 19 UNIX AND LINUX Objectives Introduction Red Hat Linux Environment Linux Graphical User Environment Installation and Configuration Application Software System Administration, Management, and Security TCP/IP Network Management Samba Network Information Services Network File System Services Apache Web Server Linux Documentation Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 20 OTHER NETWORK OPERATING SYSTEMS Objectives Introduction NetWare OpenVMS Macintosh OS (MACOS) OS/2 Warp Additional Network Operating Systems Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects PART V: NETWORK SECURITY AND FORENSICS CHAPTER 21 CRYPTOGRAPHY AND SECURITY Objectives Introduction History of Cryptography and Security Symmetric versus Asymmetric Encryption Encryption Strength Encryption Algorithms Encryption versus Hashing Security Protocols Steganography Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 22 SECURITY HARDWARE Objectives Introduction Media Vulnerabilities Managed Switches Firewalls IDS Hardware Biometric Devices Fault Tolerance Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 23 SECURITY SOFTWARE Objectives Introduction Packet Sniffing Port Scanning Password Cracking Host-Based Intrusion Detection Network-Based Intrusion Detection Secure Remote Access Security Policies Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects CHAPTER 24 FORENSIC TECHNIQUES Objectives Introduction Forming a CSIRT Digital Evidence Handling File Systems and Operating Systems Where is the Information? Live Analysis versus Static Analysis Analyzing Network Traffic Legal and Ethical Issues The Forensic Marketplace Troubleshooting Techniques Summary Key Terms Review Questions Hands-On Projects Case Projects GLOSSARY APPENDIX A INTERNET MILESTONES APPENDIX B WEB RESOURCES APPENDIX C EXTENDED ASCII CHARACTER SET APPENDIX D MATHEMATICS FOR NETWORKING AND SECURITY APPENDIX E MODEMS APPENDIX F THE ETHEREAL - WIRESHARK PROTOCOL ANALYZER APPENDIX G NETWORK AND SECURITY CERTIFICATIONS APPENDIX H TELECOMMUNICATION TECHNOLOGIES APPENDIX I SECURITY POLICY EXAMPLES APPENDIX J SETTING UP A NETWORKING REPAIR SHOP ANSWERS TO ODD-NUMBERED REVIEW QUIZ QUESTIONS INDEX