Introduction to computer networks and cybersecurity. ([2013])
- Record Type:
- Book
- Title:
- Introduction to computer networks and cybersecurity. ([2013])
- Main Title:
- Introduction to computer networks and cybersecurity
- Further Information:
- Note: Chwan-Hwa (John) Wu, Auburn University, J. David Irwin, Auburn University.
- Authors:
- Wu, Chwan-Hwa
Irwin, J. David, 1939- - Contents:
- An Introduction to Information Networks; Introduction; The Internet Architecture; Access Networks; The Network Core; Circuit Switching vs. Packet Switching; Packet Switching Delays and Congestion; The Protocol Stack; Providing the Benefits of Circuit Switching to Packet Switching; Cyber Security; History of the Internet; Concluding Remarks; References; Problems; ; SECTION 1 — APPLICATIONS; ; The Application Layer ; Overview; Client/Server and Peer-to-Peer Architectures; Inter-process Communication through the Internet; Sockets; Transport Layer Services; The Hypertext Transfer Protocol (http); Cookies: Providing States to HTTP; The Design of Efficient Information Delivery through Use of a Proxy; The File Transfer Protocol (FTP); Electronic Mail; Concluding Remarks; References; Problems; ; DNS and Active Directory; The Domain Name Service (DNS); Active Directory (AD); Concluding Remarks; References; Problems; ; XML-Based Web Services ; Overview of XML-Based Web Applications; Client/Server Web Application Development; The PHP Server Script; AJAX; XML; XML Schema; The XML Document Object Model (DOM); Concluding Remarks; References; Problems; ; Socket Programming; Motivation; Socket Concepts; TCP Socket Programming; Single-Thread TCP Socket Programming; Multi-thread TCP Socket Programming; UDP Socket Programming; Multi-thread UDP Socket Programming; IPv6 Socket Programming; Concluding Remarks; References; Problems; ; Peer-to-Peer (P2P) Networks and Applications;An Introduction to Information Networks; Introduction; The Internet Architecture; Access Networks; The Network Core; Circuit Switching vs. Packet Switching; Packet Switching Delays and Congestion; The Protocol Stack; Providing the Benefits of Circuit Switching to Packet Switching; Cyber Security; History of the Internet; Concluding Remarks; References; Problems; ; SECTION 1 — APPLICATIONS; ; The Application Layer ; Overview; Client/Server and Peer-to-Peer Architectures; Inter-process Communication through the Internet; Sockets; Transport Layer Services; The Hypertext Transfer Protocol (http); Cookies: Providing States to HTTP; The Design of Efficient Information Delivery through Use of a Proxy; The File Transfer Protocol (FTP); Electronic Mail; Concluding Remarks; References; Problems; ; DNS and Active Directory; The Domain Name Service (DNS); Active Directory (AD); Concluding Remarks; References; Problems; ; XML-Based Web Services ; Overview of XML-Based Web Applications; Client/Server Web Application Development; The PHP Server Script; AJAX; XML; XML Schema; The XML Document Object Model (DOM); Concluding Remarks; References; Problems; ; Socket Programming; Motivation; Socket Concepts; TCP Socket Programming; Single-Thread TCP Socket Programming; Multi-thread TCP Socket Programming; UDP Socket Programming; Multi-thread UDP Socket Programming; IPv6 Socket Programming; Concluding Remarks; References; Problems; ; Peer-to-Peer (P2P) Networks and Applications; P2P-vs-Client/Server; Types of P2P Networks; Pure P2P: Gnutella Networks; Partially Centralized Architectures; Hybrid Decentralized (or Centralized) P2P; Structured vs. Unstructured P2P; Skype; P2P Client Software; Peer-to-Peer Name Resolution (PNRP); Apple’s Bonjour; Wi-Fi Direct Devices and P2P Technology; P2P Security; Internet Relay Chat (IRC); Concluding Remarks; References; Problems; ; SECTION 2 — LINK AND PHYSICAL LAYERS; ; The Data Link Layer and Physical Layer; The Physical Layer; Link Layer Functions; Link Layer Realization; Multiple Access Protocols; The Link Layer Address; MAC Layer Frame Format; The 802.2 Logic Link Control (LLC) Sublayer; Loop Prevention and Multipathing; Error Detection; Concluding Remarks; References; Problems; ; The Ethernet and Switches; Ethernet Overview; The 802.3 Medium Access Control and Physical Layers; The Ethernet Carrier Sense Multiple Access/Collision Detection Algorithm; Ethernet Hubs; Minimum Ethernet Frame Length; Ethernet Cables and Connectors; Gigabit Ethernet and Beyond; Bridges and Switches; A Layer 2 (L2) Switch and Layer 3 (L3) Switch/Router; Design Issues in Network Processors (NPs) and ASICs; Design Issues for the Packet Buffer/Memory and Switch Fabric; Cut-Through or Store-and-Forward Ethernet for Low-Latency Switching; Switch Management; Concluding Remarks; References; Problems; ; Virtual LAN, Class of Service, and Multilayer Networks; The Virtual LAN (VLAN-802.11q); Class of Service (CoS-802.11p); Switch Design Issues in CoS, Queues and Switch Fabric; Asynchronous Transfer Mode (ATM); Classical IP over ATM; Multiprotocol Label Switching (MPLS); Multilayer Network (MLN) Architectures; Concluding Remarks; References; Problems; ; Wireless and Mobile Networks ; An Overview of Wireless Networks; 802.11 Wireless LANs; Wireless Personal Area Network (WPAN); WLANs and WPANs Comparison; WiMAX (802.16); Cellular Networks; Concluding Remarks; References; Problems; ; SECTION 3 — NETWORK LAYER; ; The Network Layer; Network Layer Overview; Connection-Oriented Networks; Connectionless Datagram Forwarding; Datagram Networks vs. Virtual Circuit ATM Networks; Network Layer Functions in the Protocol Stack; The IPv4 Header; IP Datagram Fragmentation/Reassembly; Type of Service (ToS); The IPv4 Address; The Dynamic Host Configuration Protocol (DHCP); IP Multicast; Routing between LANs; Multiprotocol Label Switching (MPLS); Network Address Translation (NAT); The Internet Control Message Protocol (ICMP); The Mobile Internet Protocol; Concluding Remarks; References; Problems; ; IPv6 ; The Need for IPv6; The IPv6 Packet Format; IPv6 Addresses; The Transition from IPv4 to IPv6; IPv6 Configuration and Testing; Concluding Remarks; References; Problems; ; Routing and Interior Gateways; Routing Protocol Overview; Configuring a Router; VLAN Routing; Open Shortest Path First (OSPF); The OSPF Routing Algorithm; The Routing Information Protocol (RIP); OSPF-vs.-RIP; Concluding Remarks; References; Problems; ; Border Gateway Routing ; Autonomous Systems; Border Gateway Protocol (BGP) Overview; A Real-World BGP Case; BGP Route Advertisements; BGP Route Selection; BGP Import and Export Policies; BGP Security; Concluding Remarks; References; Problems; ; SECTION 4 — TRANSPORT LAYER; ; The Transport Layer ; Transport Layer Overview; The Socket; The User Datagram Protocol (UDP); A Reliable Transport Protocol: TCP; The TCP Packet Header and Options; The Buffer and Sliding Window; Features of the Stream Control Transmission Protocol (SCTP); The SCTP Packet Format; SCTP Association Establishment; The SCTP SHUTDOWN; SCTP Multi-Homing; Concluding Remarks; References; Problems; ; Packet Loss Recovery; Packet Acknowledgment (ACK) and Retransmission; Round Trip Time and Retransmission Timeout; Cumulative ACK and Duplicate ACK; The Sliding Window and Cumulative ACK; Delayed ACK; Fast Retransmit; Lost Synchronization (SYN) Packet and Recovery; The Silly Window Syndrome/Solution; The TCP Selective Acknowledgment (SACK) Option; Concluding Remarks; References; Problems; ; TCP Congestion Control; TCP Flow Control; TCP Congestion Control; Standard TCP End-to-end Congestion Control Methods; TCP Tahoe and TCP Reno in Request for Comment (RFC) 2001; An Improvement for the Reno algorithm—RFC 2581 and RFC 5681; TCP NewReno; TCP Throughput for a Real-World Download in Microsoft’s Windows XP; A Selective Acknowledgment (SACK)-Based Loss Recovery Algorithm; High-Speed TCP (HSTCP) Congestion Control Design Issues; CUBIC TCP; Loss-Based TCP End-to-End Congestion Control Summary; Delay-Based Congestion Control Algorithms; Compound TCP (CTCP); The Adaptive Receive Window Size; TCP Explicit Congestion Control and Its Design Issues; The Absence of Congestion Control in UDP and TCP Compatibility; Concluding Remarks; References; Problems; ; SECTION 5 — CYBER SECURITY; ; Cyber Security Overview; Introduction; Security from a Global Perspective; Trends in the Types of Attacks and Malware; The Types of Malware; Vulnerability Naming Schemes and Security Configuration Settings; Obfuscation and Mutations in Malware; The Attacker’s Motivation and Tactics; Zero-Day Vulnerabilities; Attacks on the Power Grid and Utility Networks; Network and Information Infrastructure Defense Overview; Concluding Remarks; References; Problems; ; Firewalls; Overview; Unified Threat Management; Firewalls; Stateless Packet Filtering; Stateful/Session Filtering; Application-Level Gateways; Circuit-Level Gateways; A Comparison of Four Types of Firewalls; The Architecture for a … (more)
- Publisher Details:
- Boca Raton, FL : CRC Press
- Publication Date:
- 2013
- Copyright Date:
- 2013
- Extent:
- 1 online resource (xlvi, 1324 pages), illustrations
- Subjects:
- 005.8
Computer networks
Computer networks -- Security measures
COMPUTERS / Information Technology
COMPUTERS / Networking / General
COMPUTERS / Security / General
Computer networks
Computer networks -- Security measures
Electronic books
Electronic books - Languages:
- English
- ISBNs:
- 9781466572133
1466572132
1466572140
9781466572140
1466575409
9781466575400 - Related ISBNs:
- 9781466575400
9781466572140 - Notes:
- Note: Includes bibliographical references.
Note: Description based on print version record. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.154107
- Ingest File:
- 01_012.xml