Atjaunināt sīkdatņu piekrišanu

E-grāmata: Ethernet Networking for the Small Office and Professional Home Office

(Professor and Department Chair, Computer Science, Marist College, Hyde Park, NY, USA)
  • Formāts: PDF+DRM
  • Izdošanas datums: 28-Jul-2010
  • Izdevniecība: Morgan Kaufmann Publishers In
  • Valoda: eng
  • ISBN-13: 9780080553603
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 29,04 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Izdošanas datums: 28-Jul-2010
  • Izdevniecība: Morgan Kaufmann Publishers In
  • Valoda: eng
  • ISBN-13: 9780080553603
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

In a local area network (LAN) or intranet, there are many pieces of hardare trying to gain access to the network transmission media at the same time (i.e., phone lines, coax, wireless, etc.). However, a network cable or wireless transmission frequency can physically only allow one node to use it at a given time. Therefore, there must be some way to regulate which node has control of the medium (a media access control, or MAC, protocol). Ethernet is a MAC protocol; it is one way to regulate physical access to network tranmission media.

Ethernet networking is used primarily by networks that are contained within a single physical location. If you need to design, install, and manage a network in such an envronment, i.e., home or small business office, then this book will give you an in-depth understanding of the technology involved in an Ethernet network.

One of the major goals of this book is to demystify the jargon of networks so that the reader gains a working familiarity with common networking terminology and acronyms.

In addition, this books explains not only how to choose and configure network hardware but also provides practical information about the types of network devices and software needed to make it all work. Tips and direction on how to manage an Ethernet network are also provided.

This book therefore goes beyond the hardware aspects of Ethernet to look at the entire network from bottom to top, along with enough technical detail to enable the reader to make intelligent choices about what types of transmission media are used and the way in which the various parts of the network are interconnected.

*Explains how the Ethernet works, with emphasis on current technologies and emerging trends in gigabit and fast Ethernet, WiFi, routers, and security issues
*Teaches how to design and select complementary components of Ethernet networks with a focus on home and small business applications
*Discuses the various types of cables, software, and hardware involved in constructing, connecting, operating and monitoring Ethernet networks

Papildus informācija

This book is perfect for home and small office professionals responsible for designing and implementing an Ethernet network.
Preface ix
What You Need to Know xi
Acknowledgments xi
Part One: Introduction
Introduction
3(18)
Anatomy of a Network
3(11)
Network Components
5(2)
Clients, Servers, and Peers
7(2)
Data Communications Protocols
9(2)
Layered Protocols
11(2)
Another Word on Protocol Stacks
13(1)
Network Operating Systems
14(1)
What Ethernet Really Means
15(1)
Types of Ethernet
15(3)
The Speed and Bandwidth Connection
17(1)
Ethernet Standards
18(1)
A Bit of Ethernet History
19(2)
How TCP/IP and Ethernet Work
21(20)
Network Data Transmission
22(1)
Major TCP/IP Protocols
23(10)
The Operation of a Protocol Stack
23(1)
The Application Layer
24(1)
The Transport Layer
25(4)
The Internet Layer
29(2)
The Logical Link Control Layer
31(2)
The Ethernet MAC Protocol
33(5)
Ethernet Frames
33(2)
Ethernet Media Access
35(3)
Alternative Protocol Stacks
38(3)
Part Two: Design and Connectivity
Fast and Gigabit Ethernet Media and Standards
41(14)
UTP Cabling
41(6)
UTP Standards
42(2)
UTP Cabling Lengths
44(2)
UTP Jack Wiring
46(1)
Fiber Optic Cabling
47(3)
Single versus Multimode Fiber Optics
48(1)
Fiber Optic Cable Bundles
49(1)
Fast Ethernet Standards
50(2)
Twisted-Pair Wire
51(1)
Fiber Optics
51(1)
Gigabit Ethernet Standards
52(3)
Fiber Optics
52(1)
Twisted-Pair Wire
53(2)
Creating Network Segments
55(34)
Hubs (Repeaters)
56(8)
Unmanaged Hubs
57(2)
Managed Hubs
59(3)
Stackable Hubs
62(1)
Propagation Delay
62(2)
Switches
64(11)
Switch Learning
66(2)
Creating a Simple Switched Segment
68(1)
Creating Hierarchical Switched Configurations
68(5)
Cabling Issues
73(1)
Looping Issues
74(1)
Where Do You Put It? Wiring Closets, Walls, Floors, and Ceilings---Oh, My!
75(6)
Appendix: Wiring RJ-45 Plugs and Connectors
81(8)
Connecting to the Internet
89(22)
ISPs and IP Addresses
89(2)
Internet Connection Protocols
91(1)
Point-to-Point Protocol
91(1)
Point-to-Point Protocol Over Ethernet for Cable and DSL
92(1)
Dial-up Connections
92(8)
Modems and POTS
92(5)
Integrated Services Digital Network
97(3)
Direct Connections
100(11)
Satellite
100(3)
Cable
103(2)
Digital Subscriber Line
105(3)
Leased Lines
108(1)
Wireless
109(2)
Routing
111(30)
IP Addressing
112(5)
IPv4 Addressing
113(2)
IPv6 Addressing
115(2)
Getting an IP Address
117(8)
ISPs and IP Addresses
118(1)
Static IP Addresses
118(4)
Dynamic IP Addresses
122(3)
Domain Names and DNS
125(2)
Making Routing Decisions
127(3)
Routers and the TCP/IP Protocol Stack
127(1)
Routing Tables
128(1)
Subnet Masking
129(1)
Router Capabilities
130(3)
Making Connections and Network Address Translation
131(1)
Firewalls and Port Management
132(1)
Adding Routers to an Ethernet
133(8)
Physical Connections
133(2)
Configuring the Router
135(6)
Integrating Wireless Transmissions
141(14)
Wireless MAC Protocol versus Ethernet MAC Protocol
142(1)
Wireless Speeds and Standards
142(2)
Wireless Access Points
144(4)
Service Set Identifiers
144(3)
Adding Access Points to a Wired Network
147(1)
Wireless Security Issues
148(7)
WEP
148(2)
WiFi Protected Access
150(5)
Part Three: Making the Network Work
Network Servers: Files, the Web, and Printers
155(22)
Client-Server versus Peer-to-Peer File Sharing
156(1)
Server Operating Systems
157(9)
File Server Services
157(1)
Widely Used Server Operating Systems
158(8)
Web Servers
166(1)
Print Serving
167(10)
Shared Printer Architectures
168(1)
Occasional Printer Sharing
168(6)
Printing through a Server
174(3)
Network Maintenance, Monitoring, and Control
177(26)
Command-Line Tools
178(5)
netstat
179(3)
ping
182(1)
Sample GUI-Based Tools
183(10)
Freeware: Spiceworks
184(2)
For Very Small Networks: Network Magic
186(3)
For Larger Networks: LANsurveyor
189(4)
Real-Time Monitoring and Packet Sniffing
193(3)
Example: LANdecoder32
193(3)
Remote Control
196(7)
Making a Connection
196(1)
Observation and Control
197(3)
File Exchange
200(1)
Messaging
200(3)
Security Issues
203(48)
Security Threats to Home and Small Offices
204(10)
Malware
204(1)
Denial-of-Service Attacks
205(1)
Authentication Vulnerabilities
206(1)
Employees and Other Local People
207(7)
Physical Vulnerabilities
214(1)
Basic Defenses
214(27)
Virus Detection Software
214(8)
Firewalls
222(4)
Software Patching
226(1)
Backup
227(7)
Passwords
234(1)
Enhancing Password Security with Tokens
234(2)
User Education
236(1)
Handling DoS Attacks
236(5)
Advanced Defenses
241(7)
Intrusion Detection Systems
241(3)
Virtual Private Networks
244(4)
Security Resources
248(3)
Professional Security Update Sites
248(1)
Other Sites of Interest
249(2)
Network Design and Simulation Software
251(26)
Network Design Tools
252(1)
The Network Hierarchy
253(14)
Choosing and Configuring Network Devices
254(9)
Linking Network Devices
263(4)
Simulating Network Traffic
267(5)
Assigning Traffic Loads
268(2)
Running Simulations
270(2)
Documenting the Network Design
272(5)
Part Four: Ethernet Solution Examples
Network Example 1: Professional Home Network
277(4)
Ethernet Example 2: Small-But-Growing Real Estate
281(8)
Business Overview
281(2)
Network Plans
283(1)
Network Design Considerations
284(5)
Network Example 3: Small Law Firm
289(10)
The Internet, the Backbone, and Equipment Rooms
291(4)
Between the Floors
293(1)
The Fifth-Floor Server Room
294(1)
The Fourth-Floor Wiring Closet
295(1)
Connecting End-User Devices
295(2)
Security Considerations
297(2)
Appendix A: Older Ethernet Standards
299(10)
Thick Coaxial Cable (10Base5)
300(1)
Thin Coaxial Cable (10Base2)
301(4)
10Base-T
305(4)
Creating 10Base-T Network Segments with a Hub
305(4)
Appendix B: TCP and UDP Ports
309(8)
Well-Known Ports
309(5)
Registered Ports
314(1)
Port List References
315(2)
Appendix C: Products and Vendors
317(6)
Glossary 323(10)
Index 333


Jan L. Harrington, author of more than 35 books on a variety of technical subjects, has been writing about databases since 1984. She retired in 2013 from her position as professor and chair of the Department of Computing Technology at Marist College, where she taught database design and management, data communications, computer architecture, and the impact of technology on society for 25 years.