Fundamentals of Communications and Networking, 3rd Edition

Book description


Today's networks are required to support an increasing array of real-time communication methods. Video chat and live resources put demands on networks that were previously unimagined. Written to be accessible to all, Fundamentals of Communications and Networking, Third Edition helps readers better understand today's networks and the way they support the evolving requirements of different types of organizations. While displaying technical depth, this new edition presents an evolutionary perspective of data networking from the early years to the local area networking boom, to advanced IP data networks that support multimedia and real-time applications. The Third Edition is loaded with real-world examples, network designs, and network scenarios that provide the reader with a wealth of data networking information and practical implementation tips.

Key Features of the third Edition:

- Introduces network basics by describing how networks work
- Discusses how networks support the increasing demands of advanced communications
- Illustrates how to map the right technology to an organization's needs and business goals
- Outlines how businesses use networks to solve business problems, both technically and operationally.

Table of contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Brief Contents
  5. Contents
  6. Dedication
  7. Preface
  8. Acknowledgments
  9. About the Authors
  10. CHAPTER 1 Evolution of Communication Technologies
    1. Today’s Hyperconnected World
    2. From Analog to Digital to IP
    3. Internet and IP Connectivity Are Pervasive
    4. How Unified Communications Connect People and Businesses
    5. How Communications Have Evolved
      1. Snail Mail
      2. Store-and-Forward Messages
      3. Real-Time Communication
      4. Social Media
    6. The Web’s Impact on Business
      1. E-commerce Business Models
      2. Solving E-commerce Business Challenges
    7. The Internet of Things’ Impact on Business
    8. The Cloud’s Impact on Business
      1. Virtualization
      2. Types of Cloud Services and Delivery Models
    9. CHAPTER SUMMARY
    10. KEY CONCEPTS AND TERMS
    11. CHAPTER 1 ASSESSMENT
  11. CHAPTER 2 Solving Today’s Business Communication Challenges
    1. Introducing Organizational Communication Challenges
      1. Enterprise Challenges
      2. Government Challenges
      3. SMB/SOHO Challenges
    2. Solving Enterprise Business Communication Challenges
      1. Banking and Financial Services Challenges
      2. Healthcare and Patient Care Services Challenges
      3. K–12 and Higher Education Services Challenges
      4. Commercial Retail Products and Services Challenges
      5. Manufacturing Services Challenges
      6. Travel and Transportation Services Challenges
    3. Solving Government Business Communication Challenges
    4. Solving SMB Business Communication Challenges
    5. Solving SOHO Business Communication Challenges
    6. Transforming Communication Requirements into Network Solutions
    7. Defining Your Organization’s Networking Requirements
    8. CHAPTER SUMMARY
    9. KEY CONCEPTS AND TERMS
    10. CHAPTER 2 ASSESSMENT
  12. CHAPTER 3 Circuit-Switched, Packet-Switched, and IP-Based Communications
    1. Open Systems Interconnection Reference Model
    2. TCP/IP Reference Model
      1. Application Layer
      2. Transport Layer
      3. Internet Layer
      4. Network Access Layer
    3. TCP/IP Suite
    4. Circuit Switching Versus Packet Switching
      1. Circuit Switching
      2. Packet Switching
    5. IP-Based Communications
    6. Network Topology Overview
      1. Point-to-Point Networks
      2. Bus
      3. Ring
      4. Star
      5. Mesh
      6. Fully Connected Mesh
      7. Hybrid
    7. Internetworking
      1. Internetworking with Bridges
      2. Internetworking with Switches
      3. Internetworking with Routers
      4. Internetworking with a Bridge/Router
      5. Internetworking with a Gateway
    8. Switching Concepts
      1. Switch Functionality
      2. Switch Forwarding Methods
    9. Routing Concepts
      1. Network Layer Address
      2. Static Route
      3. Dynamic Route
    10. Resiliency and Redundancy
      1. Layer 2 Resiliency
      2. Layer 3 Resiliency
      3. Virtual Networking Components
      4. Network Storage Types
    11. CHAPTER SUMMARY
    12. KEY CONCEPTS AND TERMS
    13. CHAPTER 3 ASSESSMENT
  13. CHAPTER 4 The Physical and Data Link Layers
    1. Physical Layer and Data Link Layer
      1. Physical Layer: OSI Layer
      2. Data Link Layer: OSI Layer
    2. Ethernet and IEEE 802.3 Frame Formats
    3. Ethernet Evolution
    4. IEEE 802.3 Standards and Specifications
      1. Solving Business Challenges
      2. IEEE 802.3 CSMA/CD Standards
    5. How Multiple Nodes Share Network Media
    6. Internetworking LANs: Bridging Versus Routing
      1. Repeaters and Hubs: Layer 1 Forwarding
      2. Bridges and Switches: Layer 2 Forwarding
    7. Ethernet Network Design Fundamentals
      1. Edge Network: Workgroup LANs
      2. Edge Network: Use of PoE Switches
      3. Edge Network: Departmental LAN
      4. Building Backbone: Collapsed Backbones
      5. Campus Backbone: Collapsed Data Center Backbone
      6. Metropolitan Area Backbone: Metro Ethernet Backbone
    8. GigE and 10 GigE Specifications
    9. 25, 40, and 100 GigE: Server Farms and Backbone Trunking
    10. CHAPTER SUMMARY
    11. KEY CONCEPTS AND TERMS
    12. CHAPTER 4 ASSESSMENT
  14. CHAPTER 5 The Network and Transport Layers
    1. Network and Transport Layers
      1. Network Layer: OSI Layer
      2. Transport Layer: OSI Layer
    2. The Internet Protocol
    3. IP Addressing: IPv4 versus IPv6
      1. IPv4
      2. IPv6
      3. IPv4 to IPv6
    4. IP Communications
    5. Connectionless Versus Connection-Oriented Communications
      1. Scenario 1: Connection-Oriented Conversation
      2. Scenario 2: Connectionless Conversation
    6. CHAPTER SUMMARY
    7. KEY CONCEPTS AND TERMS
    8. CHAPTER 5 ASSESSMENT
  15. CHAPTER 6 The Session, Presentation, and Application Layers
    1. Session, Presentation, and Application Layers
      1. Session Layer: OSI Layer 5
      2. Presentation Layer: OSI Layer 6
      3. Application Layer: OSI Layer 7
    2. Application Architectures
      1. Architecture Types and Examples
      2. Features and Benefits of Each Architecture Type
      3. Aligning Architecture with Business Requirements
    3. Application Layer Ports and Sockets
    4. World Wide Web
      1. From the Internet to the Web: How the World Wide Web Works
      2. HTTP: The Web’s Workhorse
    5. Impact on Security
    6. CHAPTER SUMMARY
    7. KEY CONCEPTS AND TERMS
    8. CHAPTER 6 ASSESSMENT
  16. CHAPTER 7 Layer 2 Networking
    1. Layer 2 Networking Basics
      1. Layer 1 and Layer 2 Evolution
      2. What Layer 2 Networking Means
    2. Ethernet LAN Topologies
      1. Layer 2 Network Redundancy and Resiliency
      2. VLAN Tagging
    3. IEEE 802.3ad Link Aggregation
      1. Network Backbones
      2. Network Power
    4. Layer 2 Business Solutions
      1. SOHO Organization
      2. SMB Organization
      3. Enterprise Organization
    5. CHAPTER SUMMARY
    6. KEY CONCEPTS AND TERMS
    7. CHAPTER 7 ASSESSMENT
  17. CHAPTER 8 Layer 3 Networking
    1. Network Layer Basics
    2. Network Layer Protocols
      1. Router Protocols
      2. Convergence
      3. Load Balancing
      4. Traffic Flow
    3. Internetwork Routing Functions
      1. LAN-to-LAN Routing
      2. LAN-to-WAN Routing
    4. Routing Metrics and Protocols
      1. Exterior Versus Interior Routing Protocols
      2. Routing Information Protocol (RIP)
      3. RIP Version 2 (RIPv2)
      4. Open Shortest Path First Version 2 (OSPFv2)
      5. Intermediate System-to-Intermediate System (IS-IS)
      6. Interior Gateway Routing Protocol (IGRP)
      7. Enhanced Interior Gateway Routing Protocol (EIGRP)
      8. Border Gateway Protocol (BGP)
    5. Layer 3 Network Redundancy and Resiliency
      1. Configuring Resilience
      2. Routing Protocol Resilience
    6. CHAPTER SUMMARY
    7. KEY CONCEPTS AND TERMS
    8. CHAPTER 8 ASSESSMENT
  18. CHAPTER 9 Network Infrastructure Implementations
    1. Physical Infrastructures
    2. Hosting Infrastructures
    3. Foundational Network Services
      1. IP Address Management (IPAM)
      2. Dynamic Host Control Protocol (DHCP)
      3. Domain Name System (DNS)
      4. Network Time Protocol (NTP)
    4. Network Devices and Where to Position Them
    5. Asset Visibility
      1. Creating an IT Asset Inventory
    6. Access Controls
      1. Identification, Authentication, Authorization, and Accounting
      2. Remote Access Controls and Multifactor Authentication
    7. Network Access Controls
      1. Visibility
      2. Control
      3. Device Identification
    8. Advanced Networking Devices
      1. Advanced Switching Devices
      2. Layered Security Solutions
      3. Performance-Enhancing Devices
    9. CHAPTER SUMMARY
    10. KEY CONCEPTS AND TERMS
    11. CHAPTER 9 ASSESSMENT
  19. CHAPTER 10 Wireless Networks
    1. Supporting the Mobile Worker
      1. Wired Versus Wireless
      2. Evolution of Wireless LAN Networking
    2. IEEE 802.11 Family of Standards
      1. The IEEE 802.11 Legacy Standard
      2. The IEEE 802.11b WLAN Standard
      3. The IEEE 802.11a WLAN Standard
      4. The IEEE 802.11g WLAN Standard
      5. The IEEE 802.11n WLAN Standard
      6. The IEEE 802.11ac WLAN Standard
      7. The IEEE 802.11ax WLAN Standard
    3. WLAN Security
      1. Authentication and Access Control
      2. Security Threats to WLANs
      3. IEEE 802.1X Security
      4. Encryption and Data Privacy
      5. Security Protocols and Access Control
      6. Security Practices
      7. Unauthorized Access to Shared Resources
    4. WLAN Planning and Design
      1. RF Design Issues
      2. Capacity and Coverage
      3. Speed and Distance Requirements
      4. Channel Bandwidth
      5. Channel Bonding
      6. MIMO/MU-MIMO
      7. Unidirectional/Omnidirectional
    5. Performing a Site Survey
      1. Conducting the Site Tests
    6. CHAPTER SUMMARY
    7. KEY CONCEPTS AND TERMS
    8. CHAPTER 10 ASSESSMENT
  20. CHAPTER 11 Wide Area Networks
    1. WAN Business Drivers
      1. WANs and Service Providers
      2. WAN and SD-WAN Business Drivers
    2. Evolution of WAN Technologies
      1. WAN Technologies in the 1970s
      2. WAN Technologies in the 1980s
      3. WAN Technologies in the 1990s
      4. WAN Technologies in the 2000s
      5. WAN Technologies in the 2010s
    3. WAN Management and Requirements
      1. Fault Management Requirements
      2. Configuration Management Requirements
      3. Accounting Management Requirements
      4. Performance Management Requirements
      5. Security Management Requirements
    4. WAN Solutions for Different Scenarios
      1. Enterprise Business
      2. Small to Medium Business (SMB)
      3. Small Office/Home Office (SOHO)
    5. CHAPTER SUMMARY
    6. KEY CONCEPTS AND TERMS
    7. CHAPTER 11 ASSESSMENT
  21. CHAPTER 12 Network Operations and Management
    1. The Scope of Network Operations and Management
      1. IT and IT Security Policy Framework
      2. Policy and Procedure Best Practices
    2. Network Operations and Management
      1. Staffing and Resources
      2. Real-Time Availability
      3. Audit and Monitoring
      4. Collecting Data
      5. Reporting Information
      6. Configuration Change Management
      7. Change Control Board Membership
      8. Change Control Board Function
      9. Change Control Board Policies and Practices
      10. Capacity Planning and Readiness
      11. IT Asset Inventory
      12. Network Performance
      13. Service Providers
    3. Network Management
      1. Simple Network Management Protocol (SNMP)
      2. Management Information Bases (MIBs)
      3. SNMP Traps
      4. FCAPS: Fault Management
      5. FCAPS: Configuration Management
      6. FCAPS: Accounting Management
      7. FCAPS: Performance Management
      8. FCAPS: Security Management
    4. Network Security
      1. Physical Security
      2. Access Controls
      3. Wireless Security
      4. Common Network Attacks
      5. Network Device Hardening
      6. Network Mitigation Solutions
      7. Changing Attacks
      8. Blended Response
    5. CHAPTER SUMMARY
    6. KEY CONCEPTS AND TERMS
    7. CHAPTER 12 ASSESSMENT
  22. CHAPTER 13 Network Auditing, Monitoring, and Incident Response
    1. Security Auditing and Analysis
      1. Purpose of Audits
      2. Customer Confidence
      3. Auditing Benchmarks
    2. Security Monitoring
      1. Security Monitoring for Computer Systems
      2. Types of Log Information to Capture
    3. Responding to Security Incidents
      1. Incident Response Plan, Policies, Procedures, and Guidelines
      2. Incident Response Team
      3. Phases of an Incident and Response
    4. The Role of Business Continuity and Disaster Recovery Plans
      1. Recovering Systems
      2. Business Impact Analysis
      3. Risk Assessment
      4. Risk Management
    5. Planning for Disaster and Recovery
      1. Policies, Procedures, Priorities, and Practice
      2. Testing and Evaluation
      3. Preparation and Staging of Testing Procedures
      4. Frequency of Tests
      5. Analysis of Test Results
    6. CHAPTER SUMMARY
    7. KEY CONCEPTS AND TERMS
    8. CHAPTER 13 ASSESSMENT
  23. CHAPTER 14 Network Security
    1. Network Security
      1. What Is Confidentiality?
      2. What Is Integrity?
      3. What Is Availability?
    2. Network Security Scope
    3. Network Risks, Threats, and Vulnerabilities
    4. Conducting a Network Security Risk Assessment
    5. Layered Network Security Architectures
    6. Network Security Controls
    7. How to Implement Security Controls
    8. CHAPTER SUMMARY
    9. KEY CONCEPTS AND TERMS
    10. CHAPTER 14 ASSESSMENT
  24. CHAPTER 15 Network Troubleshooting
    1. Network Operations Center
      1. Network Troubleshooting and Ticketing
      2. NOC and IT Service Desk Structure
    2. Network Troubleshooting Approach
    3. Network Troubleshooting Tools
      1. Physical Layer Tools
      2. Network Performance Monitoring Tools
      3. Network Traffic Tools
      4. Network Connectivity Tool
      5. Network Scanning and Discovery Tools
      6. Vulnerability Assessment Tools
      7. Protocol Analyzer Tools
    4. Network Troubleshooting Using Protocol Analysis
      1. How Protocols Behave
    5. Network Troubleshooting Scenarios
      1. Names Not Resolving
      2. Incorrect Gateway Definition
      3. Incorrect Netmask
      4. Duplicate IP Address
      5. Duplicate MAC Addresses
      6. Expired IP Address
      7. Rogue DHCP Server
      8. Untrusted SSL Certificate
      9. Incorrect Time
      10. Exhausted DHCP Scope
      11. Blocked TCP/UDP Ports
      12. Incorrect Host-Based Firewall Settings
      13. Incorrect ACL Settings
      14. Unresponsive Service
    6. CHAPTER SUMMARY
    7. KEY CONCEPTS AND TERMS
    8. CHAPTER 15 ASSESSMENT
  25. APPENDIX A Answer Key
  26. APPENDIX B IP Addressing Primer
  27. APPENDIX C Structured Wiring System Primer
  28. APPENDIX D Sample Security Policies and Templates
  29. APPENDIX E Standard Acronyms
  30. Glossary of Key Terms
  31. References
  32. Index

Product information

  • Title: Fundamentals of Communications and Networking, 3rd Edition
  • Author(s): Michael G. Solomon, David Kim
  • Release date: January 2021
  • Publisher(s): Jones & Bartlett Learning
  • ISBN: 9781284200126