Ethernet networks : design, implementation, operation, management / / Gilbert Held |
Autore | Held Gilbert <1943-> |
Edizione | [4th ed.] |
Pubbl/distr/stampa | London ; ; New York, : Wiley, 2003 |
Descrizione fisica | 1 online resource (611 p.) |
Disciplina | 004.6/8 |
Soggetto topico | Ethernet (Local area network system) |
ISBN |
1-280-27026-8
9786610270262 0-470-29925-8 0-470-85563-0 0-470-85564-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
ethernet networks Fourth Edition; contents; Preface; Acknowledgments; Chapter 1 Introduction to Networking Concepts; 1.1 WIDE AREA NETWORKS; COMPUTER-COMMUNICATIONS EVOLUTION; REMOTE BATCH TRANSMISSION; IBM 3270 INFORMATION DISPLAY SYSTEM; NETWORK CONSTRUCTION; NETWORK CHARACTERISTICS; 1.2 LOCAL AREA NETWORKS; COMPARISON TO WANS; TECHNOLOGICAL CHARACTERISTICS; TRANSMISSION MEDIUM; ACCESS METHOD; 1.3 WHY ETHERNET; Chapter 2 Networking Standards; 2.1 STANDARDS ORGANIZATIONS; NATIONAL STANDARDS ORGANIZATIONS; INTERNATIONAL STANDARDS ORGANIZATIONS; 2.2 THE ISO REFERENCE MODEL
LAYERED ARCHITECTUREOSI LAYERS; DATA FLOW; 2.3 IEEE 802 STANDARDS; 802 COMMITTEES; DATA LINK SUBDIVISION; 2.4 INTERNET STANDARDS; RFC EVOLUTION; TYPES AND SUBMISSION; OBTAINING RFCS; 2.5 CABLING STANDARDS; EIA/TIA-568; UTP CATEGORIES; CABLE SPECIFICATIONS; OTHER METRICS; CAT 5E AND CAT 6; Chapter 3 Ethernet Networks; 3.1 ETHERNET; EVOLUTION; NETWORK COMPONENTS; THE 5-4-3 RULE; 3.2 IEEE 802.3 NETWORKS; NETWORK NAMES; 10BASE-5; 10BASE-2; 10BROAD-36; 1BASE-5; 10BASE-T; 3.3 USE OF FIBER-OPTIC TECHNOLOGY; FOIRL; OPTICAL TRANSCEIVER; FIBER HUBS; FIBER ADAPTER; WIRE AND FIBER DISTANCE LIMITS 3.4 HIGH-SPEED ETHERNETISOCHRONOUS ETHERNET; FAST ETHERNET; 100VG-ANYLAN; 3.5 GIGABIT ETHERNET; COMPONENTS; MEDIA SUPPORT; 3.6 10 GIGABIT ETHERNET; RATIONALE; ARCHITECTURE; OPERATING RATES; Chapter 4 Frame Operations; 4.1 FRAME COMPOSITION; PREAMBLE FIELD; START-OF-FRAME DELIMITER FIELD; DESTINATION ADDRESS FIELD; SOURCE ADDRESS FIELD; TYPE FIELD; LENGTH FIELD; DATA FIELD; FRAME CHECK SEQUENCE FIELD; INTERFRAME GAP; 4.2 MEDIA ACCESS CONTROL; TRANSMIT MEDIA ACCESS MANAGEMENT; SERVICE PRIMITIVES; PRIMITIVE OPERATIONS; HALF- VERSUS FULL-DUPLEX OPERATION; 4.3 LOGICAL LINK CONTROL TYPES AND CLASSES OF SERVICESERVICE PRIMITIVES; 4.4 OTHER ETHERNET FRAME TYPES; ETHERNET-802.3; ETHERNET-SNAP; IEEE 802.1Q FRAME; FRAME DETERMINATION; 4.5 FAST ETHERNET; START-OF-STREAM DELIMITER; END-OF-STREAM DELIMITER; 4.6 GIGABIT ETHERNET; CARRIER EXTENSION; FRAME BURSTING; 4.7 10 GIGABIT ETHERNET; Chapter 5 Networking Hardware and Software; 5.1 WIRED NETWORK HARDWARE COMPONENTS; REPEATERS; BRIDGES; ROUTERS; BROUTERS; GATEWAY; FILE SERVERS; WIRE HUBS; INTELLIGENT HUBS; SWITCHING HUBS; 5.2 WIRELESS NETWORK HARDWARE COMPONENTS; NETWORK TOPOLOGIES; ACCESS POINT; WIRELESS ROUTER WIRELESS BRIDGE5.3 NETWORKING SOFTWARE; DOS; NETWORK SOFTWARE COMPONENTS; NETWORK OPERATING SYSTEMS; APPLICATION SOFTWARE; 5.4 THE TCP/IP PROTOCOL SUITE; OVERVIEW; PROTOCOL DEVELOPMENT; THE TCP/IP STRUCTURE; DATAGRAMS VERSUS VIRTUAL CIRCUITS; ICMP; ARP; TCP; UDP; IP; DOMAIN NAME SERVICE; NAME SERVER; TCP/IP CONFIGURATION; OPERATING MULTIPLE STACKS; Chapter 6 Bridging and Switching Methods and Performance Issues; 6.1 BRIDGING METHODS; ADDRESS ISSUES; TRANSPARENT BRIDGING; SPANNING TREE PROTOCOL; PROTOCOL DEPENDENCY; SOURCE ROUTING; SOURCE ROUTING TRANSPARENT BRIDGES 6.2 BRIDGE NETWORK UTILIZATION |
Record Nr. | UNINA-9910142530503321 |
Held Gilbert <1943-> | ||
London ; ; New York, : Wiley, 2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Securing wireless LANs [[electronic resource] ] : a practical guide for network managers, LAN administrators, and the home office user / / Gilbert Held |
Autore | Held Gilbert <1943-> |
Pubbl/distr/stampa | Hoboken, NJ, : J. Wiley, c2003 |
Descrizione fisica | 1 online resource (274 p.) |
Disciplina |
004.68
005.8 |
Soggetto topico | Wireless LANs - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-27248-1
9786610272488 0-470-29978-9 0-470-86968-2 0-470-86969-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
securing wireless LANs; contents; Preface; Acknowledgements; Chapter 1 Introduction to Wireless LANs; 1.1 SECURING THE INSECURE; 1.1.1 AAE AND A FUNCTIONS; 1.1.2 AUTHENTICATION; 1.1.3 AUTHORIZATION; 1.1.4 ENCRYPTION; 1.1.5 ACCOUNTING; 1.1.6 PRACTICAL NETWORK PROTECTION METHODS; 1.2 NETWORK ARCHITECTURE; 1.2.1 BASIC NETWORKING DEVICES; 1.2.2 THE WIRELESS LAN STATION; 1.2.3 THE ACCESS POINT; 1.2.4 THE WIRELESS BRIDGE; 1.2.5 THE WIRELESS ROUTER; 1.2.6 THE BASIC SERVICE SET; 1.2.7 THE EXTENDED SERVICE SET (ESS); 1.2.8 STATION SERVICES; 1.3 IEEE WIRELESS LAN STANDARDS
1.3.1 THE BASIC IEEE 802.11 STANDARD1.3.2 802.11B; 1.3.3 802.11A; 1.3.4 802.11C; 1.3.5 802.11D; 1.3.6 802.11E; 1.3.7 802.11F; 1.3.8 802.11G; 1.3.9 802.11H; 1.3.10 802.11I; 1.4 BOOK PREVIEW; 1.4.1 FRAME FORMATS AND BASIC SECURITY OPERATIONS; 1.4.2 UNDERSTANDING WIRELESS SIGNALS; 1.4.3 UNDERSTANDING WEP; 1.4.4 SECURITY RISKS; 1.4.5 PROPRIETARY SECURITY ENHANCEMENT TECHNIQUES; 1.4.6 STANDARDS BASED SECURITY; Chapter 2 Frame Formats and Basic Security Operation; 2.1 FRAME FORMATS; 2.1.1 BASIC FRAME FORMAT; 2.1.2 FRAME CONTROL FIELD; 2.1.3 CONTROL FRAMES; 2.1.4 MANAGEMENT FRAMES 2.1.5 THE AUTHENTICATION PROCESS2.2 WEP AND PRIVACY; 2.2.1 MISCONCEPTIONS; 2.2.2 DEVELOPMENT CONSTRAINTS; 2.2.3 DEFICIENCIES; Chapter 3 Understanding Wireless Signals; 3.1 THE WIRELESS RF SPECTRUM AND BASIC MEASUREMENTS; 3.1.1 FREQUENCY; 3.1.2 PERIOD AND WAVELENGTH; 3.1.3 BANDWIDTH; 3.1.4 THE FREQUENCY SPECTRUM; 3.1.5 POWER MEASUREMENTS; 3.1.6 POWER LEVEL; 3.1.7 SIGNAL-TO-NOISE RATIO; 3.2 ANTENNA BASICS; 3.2.1 BASIC OPERATION; 3.2.2 CATEGORIES; 3.2.3 ANTENNA GAIN; 3.2.4 DIRECTIONALITY AND EIRP; 3.2.5 POWER LEVELS; 3.2.6 PROPAGATION LOSS; 3.2.7 INCREASING ANTENNA GAIN; 3.2.8 POWER LIMITS 3.2.9 RECEIVER SENSITIVITY3.2.10 REDUCING EMITTED RADIATION; 3.2.11 HORIZONTAL TRANSMISSION DISTANCE; 3.2.12 EQUIPMENT POSITIONING; 3.2.13 USING MONITORING EQUIPMENT; Chapter 4 Understanding WEP; 4.1 THE WEP FRAME BODY; 4.1.1 THE IV; 4.1.2 THE ICV; 4.1.3 THE NAKED DEFAULT; 4.1.4 WEP KEY LIMITATIONS; 4.2 LOCATING AND OBSERVING WIRELESS LAN TRAFFIC; 4.2.1 NETWORK STUMBLER; 4.2.2 MONITORING WITH AIROPEEK; 4.3 RC4; 4.3.1 OVERVIEW; 4.3.2 OPERATION; 4.3.3 ILLUSTRATIVE EXAMPLE; 4.3.4 STRENGTHS AND WEAKNESSES; 4.4 WEP WEAKNESS; 4.4.1 UNSAFE AT ANY SIZE; 4.4.2 THE INSECURITY OF 802.11 4.4.3 EXPLOITING RC4 WEAKNESS4.4.4 BREAKING WEP; 4.4.5 AIRSNORT; 4.4.6 WEPCRACK; Chapter 5 Security Risks and Countermeasures; 5.1 THE SSID; 5.1.1 OVERVIEW; 5.1.2 OVERRIDING THE SSID; 5.1.3 OBTAINING THE SSID; 5.1.4 COUNTERMEASURES; 5.2 EAVESDROPPING; 5.2.1 OVERVIEW; 5.2.2 THREATS; 5.2.3 COUNTERMEASURES; 5.3 MASQUERADE; 5.3.1 OVERVIEW; 5.3.2 COUNTERMEASURES; 5.4 DATA MODIFICATION; 5.4.1 OVERVIEW; 5.4.2 COUNTERMEASURES; 5.5 FILE SHARING; 5.5.1 OVERVIEW; 5.5.2 WINDOWS 95; 5.5.3 WINDOWS 2000; 5.5.4 COUNTERMEASURES; 5.6 JAMMING; 5.6.1 OVERVIEW; 5.6.2 COUNTERMEASURES; 5.7 ENCRYPTION ATTACKS 5.7.1 OVERVIEW |
Record Nr. | UNINA-9910143226203321 |
Held Gilbert <1943-> | ||
Hoboken, NJ, : J. Wiley, c2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Securing wireless LANs [[electronic resource] ] : a practical guide for network managers, LAN administrators, and the home office user / / Gilbert Held |
Autore | Held Gilbert <1943-> |
Pubbl/distr/stampa | Hoboken, NJ, : J. Wiley, c2003 |
Descrizione fisica | 1 online resource (274 p.) |
Disciplina |
004.68
005.8 |
Soggetto topico | Wireless LANs - Security measures |
ISBN |
1-280-27248-1
9786610272488 0-470-29978-9 0-470-86968-2 0-470-86969-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
securing wireless LANs; contents; Preface; Acknowledgements; Chapter 1 Introduction to Wireless LANs; 1.1 SECURING THE INSECURE; 1.1.1 AAE AND A FUNCTIONS; 1.1.2 AUTHENTICATION; 1.1.3 AUTHORIZATION; 1.1.4 ENCRYPTION; 1.1.5 ACCOUNTING; 1.1.6 PRACTICAL NETWORK PROTECTION METHODS; 1.2 NETWORK ARCHITECTURE; 1.2.1 BASIC NETWORKING DEVICES; 1.2.2 THE WIRELESS LAN STATION; 1.2.3 THE ACCESS POINT; 1.2.4 THE WIRELESS BRIDGE; 1.2.5 THE WIRELESS ROUTER; 1.2.6 THE BASIC SERVICE SET; 1.2.7 THE EXTENDED SERVICE SET (ESS); 1.2.8 STATION SERVICES; 1.3 IEEE WIRELESS LAN STANDARDS
1.3.1 THE BASIC IEEE 802.11 STANDARD1.3.2 802.11B; 1.3.3 802.11A; 1.3.4 802.11C; 1.3.5 802.11D; 1.3.6 802.11E; 1.3.7 802.11F; 1.3.8 802.11G; 1.3.9 802.11H; 1.3.10 802.11I; 1.4 BOOK PREVIEW; 1.4.1 FRAME FORMATS AND BASIC SECURITY OPERATIONS; 1.4.2 UNDERSTANDING WIRELESS SIGNALS; 1.4.3 UNDERSTANDING WEP; 1.4.4 SECURITY RISKS; 1.4.5 PROPRIETARY SECURITY ENHANCEMENT TECHNIQUES; 1.4.6 STANDARDS BASED SECURITY; Chapter 2 Frame Formats and Basic Security Operation; 2.1 FRAME FORMATS; 2.1.1 BASIC FRAME FORMAT; 2.1.2 FRAME CONTROL FIELD; 2.1.3 CONTROL FRAMES; 2.1.4 MANAGEMENT FRAMES 2.1.5 THE AUTHENTICATION PROCESS2.2 WEP AND PRIVACY; 2.2.1 MISCONCEPTIONS; 2.2.2 DEVELOPMENT CONSTRAINTS; 2.2.3 DEFICIENCIES; Chapter 3 Understanding Wireless Signals; 3.1 THE WIRELESS RF SPECTRUM AND BASIC MEASUREMENTS; 3.1.1 FREQUENCY; 3.1.2 PERIOD AND WAVELENGTH; 3.1.3 BANDWIDTH; 3.1.4 THE FREQUENCY SPECTRUM; 3.1.5 POWER MEASUREMENTS; 3.1.6 POWER LEVEL; 3.1.7 SIGNAL-TO-NOISE RATIO; 3.2 ANTENNA BASICS; 3.2.1 BASIC OPERATION; 3.2.2 CATEGORIES; 3.2.3 ANTENNA GAIN; 3.2.4 DIRECTIONALITY AND EIRP; 3.2.5 POWER LEVELS; 3.2.6 PROPAGATION LOSS; 3.2.7 INCREASING ANTENNA GAIN; 3.2.8 POWER LIMITS 3.2.9 RECEIVER SENSITIVITY3.2.10 REDUCING EMITTED RADIATION; 3.2.11 HORIZONTAL TRANSMISSION DISTANCE; 3.2.12 EQUIPMENT POSITIONING; 3.2.13 USING MONITORING EQUIPMENT; Chapter 4 Understanding WEP; 4.1 THE WEP FRAME BODY; 4.1.1 THE IV; 4.1.2 THE ICV; 4.1.3 THE NAKED DEFAULT; 4.1.4 WEP KEY LIMITATIONS; 4.2 LOCATING AND OBSERVING WIRELESS LAN TRAFFIC; 4.2.1 NETWORK STUMBLER; 4.2.2 MONITORING WITH AIROPEEK; 4.3 RC4; 4.3.1 OVERVIEW; 4.3.2 OPERATION; 4.3.3 ILLUSTRATIVE EXAMPLE; 4.3.4 STRENGTHS AND WEAKNESSES; 4.4 WEP WEAKNESS; 4.4.1 UNSAFE AT ANY SIZE; 4.4.2 THE INSECURITY OF 802.11 4.4.3 EXPLOITING RC4 WEAKNESS4.4.4 BREAKING WEP; 4.4.5 AIRSNORT; 4.4.6 WEPCRACK; Chapter 5 Security Risks and Countermeasures; 5.1 THE SSID; 5.1.1 OVERVIEW; 5.1.2 OVERRIDING THE SSID; 5.1.3 OBTAINING THE SSID; 5.1.4 COUNTERMEASURES; 5.2 EAVESDROPPING; 5.2.1 OVERVIEW; 5.2.2 THREATS; 5.2.3 COUNTERMEASURES; 5.3 MASQUERADE; 5.3.1 OVERVIEW; 5.3.2 COUNTERMEASURES; 5.4 DATA MODIFICATION; 5.4.1 OVERVIEW; 5.4.2 COUNTERMEASURES; 5.5 FILE SHARING; 5.5.1 OVERVIEW; 5.5.2 WINDOWS 95; 5.5.3 WINDOWS 2000; 5.5.4 COUNTERMEASURES; 5.6 JAMMING; 5.6.1 OVERVIEW; 5.6.2 COUNTERMEASURES; 5.7 ENCRYPTION ATTACKS 5.7.1 OVERVIEW |
Record Nr. | UNINA-9910830816203321 |
Held Gilbert <1943-> | ||
Hoboken, NJ, : J. Wiley, c2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Securing wireless LANs : a practical guide for network managers, LAN administrators, and the home office user / / Gilbert Held |
Autore | Held Gilbert <1943-> |
Pubbl/distr/stampa | Hoboken, NJ, : J. Wiley, c2003 |
Descrizione fisica | 1 online resource (274 p.) |
Disciplina | 005.8 |
Soggetto topico | Wireless LANs - Security measures |
ISBN |
1-280-27248-1
9786610272488 0-470-29978-9 0-470-86968-2 0-470-86969-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
securing wireless LANs; contents; Preface; Acknowledgements; Chapter 1 Introduction to Wireless LANs; 1.1 SECURING THE INSECURE; 1.1.1 AAE AND A FUNCTIONS; 1.1.2 AUTHENTICATION; 1.1.3 AUTHORIZATION; 1.1.4 ENCRYPTION; 1.1.5 ACCOUNTING; 1.1.6 PRACTICAL NETWORK PROTECTION METHODS; 1.2 NETWORK ARCHITECTURE; 1.2.1 BASIC NETWORKING DEVICES; 1.2.2 THE WIRELESS LAN STATION; 1.2.3 THE ACCESS POINT; 1.2.4 THE WIRELESS BRIDGE; 1.2.5 THE WIRELESS ROUTER; 1.2.6 THE BASIC SERVICE SET; 1.2.7 THE EXTENDED SERVICE SET (ESS); 1.2.8 STATION SERVICES; 1.3 IEEE WIRELESS LAN STANDARDS
1.3.1 THE BASIC IEEE 802.11 STANDARD1.3.2 802.11B; 1.3.3 802.11A; 1.3.4 802.11C; 1.3.5 802.11D; 1.3.6 802.11E; 1.3.7 802.11F; 1.3.8 802.11G; 1.3.9 802.11H; 1.3.10 802.11I; 1.4 BOOK PREVIEW; 1.4.1 FRAME FORMATS AND BASIC SECURITY OPERATIONS; 1.4.2 UNDERSTANDING WIRELESS SIGNALS; 1.4.3 UNDERSTANDING WEP; 1.4.4 SECURITY RISKS; 1.4.5 PROPRIETARY SECURITY ENHANCEMENT TECHNIQUES; 1.4.6 STANDARDS BASED SECURITY; Chapter 2 Frame Formats and Basic Security Operation; 2.1 FRAME FORMATS; 2.1.1 BASIC FRAME FORMAT; 2.1.2 FRAME CONTROL FIELD; 2.1.3 CONTROL FRAMES; 2.1.4 MANAGEMENT FRAMES 2.1.5 THE AUTHENTICATION PROCESS2.2 WEP AND PRIVACY; 2.2.1 MISCONCEPTIONS; 2.2.2 DEVELOPMENT CONSTRAINTS; 2.2.3 DEFICIENCIES; Chapter 3 Understanding Wireless Signals; 3.1 THE WIRELESS RF SPECTRUM AND BASIC MEASUREMENTS; 3.1.1 FREQUENCY; 3.1.2 PERIOD AND WAVELENGTH; 3.1.3 BANDWIDTH; 3.1.4 THE FREQUENCY SPECTRUM; 3.1.5 POWER MEASUREMENTS; 3.1.6 POWER LEVEL; 3.1.7 SIGNAL-TO-NOISE RATIO; 3.2 ANTENNA BASICS; 3.2.1 BASIC OPERATION; 3.2.2 CATEGORIES; 3.2.3 ANTENNA GAIN; 3.2.4 DIRECTIONALITY AND EIRP; 3.2.5 POWER LEVELS; 3.2.6 PROPAGATION LOSS; 3.2.7 INCREASING ANTENNA GAIN; 3.2.8 POWER LIMITS 3.2.9 RECEIVER SENSITIVITY3.2.10 REDUCING EMITTED RADIATION; 3.2.11 HORIZONTAL TRANSMISSION DISTANCE; 3.2.12 EQUIPMENT POSITIONING; 3.2.13 USING MONITORING EQUIPMENT; Chapter 4 Understanding WEP; 4.1 THE WEP FRAME BODY; 4.1.1 THE IV; 4.1.2 THE ICV; 4.1.3 THE NAKED DEFAULT; 4.1.4 WEP KEY LIMITATIONS; 4.2 LOCATING AND OBSERVING WIRELESS LAN TRAFFIC; 4.2.1 NETWORK STUMBLER; 4.2.2 MONITORING WITH AIROPEEK; 4.3 RC4; 4.3.1 OVERVIEW; 4.3.2 OPERATION; 4.3.3 ILLUSTRATIVE EXAMPLE; 4.3.4 STRENGTHS AND WEAKNESSES; 4.4 WEP WEAKNESS; 4.4.1 UNSAFE AT ANY SIZE; 4.4.2 THE INSECURITY OF 802.11 4.4.3 EXPLOITING RC4 WEAKNESS4.4.4 BREAKING WEP; 4.4.5 AIRSNORT; 4.4.6 WEPCRACK; Chapter 5 Security Risks and Countermeasures; 5.1 THE SSID; 5.1.1 OVERVIEW; 5.1.2 OVERRIDING THE SSID; 5.1.3 OBTAINING THE SSID; 5.1.4 COUNTERMEASURES; 5.2 EAVESDROPPING; 5.2.1 OVERVIEW; 5.2.2 THREATS; 5.2.3 COUNTERMEASURES; 5.3 MASQUERADE; 5.3.1 OVERVIEW; 5.3.2 COUNTERMEASURES; 5.4 DATA MODIFICATION; 5.4.1 OVERVIEW; 5.4.2 COUNTERMEASURES; 5.5 FILE SHARING; 5.5.1 OVERVIEW; 5.5.2 WINDOWS 95; 5.5.3 WINDOWS 2000; 5.5.4 COUNTERMEASURES; 5.6 JAMMING; 5.6.1 OVERVIEW; 5.6.2 COUNTERMEASURES; 5.7 ENCRYPTION ATTACKS 5.7.1 OVERVIEW |
Record Nr. | UNINA-9910877713703321 |
Held Gilbert <1943-> | ||
Hoboken, NJ, : J. Wiley, c2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Understanding data communications : from fundamentals to networking / / Gilbert Held |
Autore | Held Gilbert <1943-> |
Edizione | [Third edition.] |
Pubbl/distr/stampa | Chichester : , : John Wiley & Sons, Ltd., , [2000] |
Descrizione fisica | 1 online resource (857 pages) |
Disciplina | 004.6 |
Soggetto topico |
Data transmission systems
Computer networks Dades - Transmissió Ordinadors, Xarxes d' |
ISBN |
9780470841488
1-280-55492-4 9786610554928 0-470-85393-X 0-470-84148-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preface. -- Acknowledgements. -- Communications in a Modern Society. -- Basic Telegraph and Telephone Operations. -- Basic Circuit Parameters, Measurement Units and Media Overview. -- Fundamental Data Transmission Concepts. -- Terminals, Workstations and WAN and LAN Networking Overview. -- Representative Standards Organizations: the OSI Reference Model. -- The Physical Layer, Cables, Connectors, Plugs and Jacks. -- Basic Transmission Devices: Line Drivers, Modems, and Service Units. -- Regulators and Carriers. -- Transmission Errors: Causes, Measurements and Correction Methods. -- The WAN Data Link Layer. -- Increasing WAN Line Utilization. -- Local Area Networks. -- Basic LAN Internetworking. -- Digital Transmission Systems and Equipment. -- Network Architecture. -- Packet Networks. -- Communications Software. -- Fiber-Optic, Satellite and Wireless Terrestrial Communications. -- Evolving Technologies. -- Index. |
Record Nr. | UNINA-9910142490203321 |
Held Gilbert <1943-> | ||
Chichester : , : John Wiley & Sons, Ltd., , [2000] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Virtual private networking [[electronic resource] ] : a construction, operation and utilization guide / / Gilbert Held |
Autore | Held Gilbert <1943-> |
Pubbl/distr/stampa | Chichester, : John Wiley, c2004 |
Descrizione fisica | 1 online resource (308 p.) |
Disciplina | 004.678 |
Soggetto topico |
Extranets (Computer networks)
Computer networks - Security measures |
ISBN |
1-280-27491-3
9786610274918 0-470-02033-4 0-470-02034-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
virtual private networking; contents; Preface; Acknowledgements; Chapter 1 Introduction to Virtual Private Networking; 1.1 THE VPN CONCEPT; 1.1.1 DEFINITION; 1.1.2 TYPES OF VPNS; 1.1.3 CATEGORIES OF VPNS; 1.1.4 INFRASTRUCTURE; 1.1.5 BENEFITS OF USE; 1.1.6 DISADVANTAGES OF VPNS; 1.1.7 VPN PROTOCOLS; 1.1.8 SUMMARY; 1.1.9 ALTERNATIVES TO VPNS; 1.1.10 ECONOMIC ISSUES; 1.1.11 OTHER ALTERNATIVES; 1.2 BOOK PREVIEW; 1.2.1 UNDERSTANDING AUTHENTICATION AND CRYPTOLOGY; 1.2.2 UNDERSTANDING THE TCP/IP PROTOCOL SUITE; 1.2.3 LAYER 2 VPN TECHNIQUES; 1.2.4 HIGHER LAYER VPNS; 1.2.5 VPN HARDWARE AND SOFTWARE
1.2.6 SERVICE PROVIDER-BASED VPNSChapter 2 Understanding Authentication and Encryption; 2.1 AUTHENTICATION; 2.1.1 PASSWORD AUTHENTICATION PROTOCOL; 2.1.2 CHALLENGE-HANDSHAKE AUTHENTICATION PROTOCOL; 2.1.3 EXTENSIBLE AUTHENTICATION PROTOCOL - TRANSPORT LEVEL SECURITY; 2.1.4 TOKEN AUTHENTICATION; 2.2 ENCRYPTION; 2.2.1 GENERAL METHOD OF OPERATION; 2.2.2 PRIVATE VERSUS PUBLIC KEY SYSTEMS; 2.2.3 PUBLIC KEY ENCRYPTION; 2.2.4 THE RSA ALGORITHM; 2.2.5 DIGITAL CERTIFICATES; 2.2.6 HASHING AND DIGITAL SIGNATURES; Chapter 3 Understanding the TCP/IP Protocol Suite; 3.1 FRAME FORMATION 3.1.1 HEADER SEQUENCING3.1.2 SEGMENTS AND DATAGRAMS; 3.1.3 ICMP MESSAGES; 3.1.4 ON THE LAN; 3.1.5 DATAFLOW CONTROL FIELDS; 3.2 THE NETWORK LAYER; 3.2.1 THE IPV4 HEADER; 3.2.2 SUBNETTING; 3.2.3 THE SUBNET MASK; 3.2.4 THE WILDCARD MASK; 3.2.5 ICMP; 3.3 THE TRANSPORT LAYER; 3.3.1 TRANSPORT LAYER PROTOCOLS; 3.3.2 THE TCP HEADER; 3.3.3 THE UDP HEADER; 3.3.4 SOURCE AND DESTINATION PORT FIELDS; 3.4 PROXY SERVICES AND NETWORK ADDRESS TRANSLATION; 3.4.1 PROXY SERVICE; 3.4.2 NETWORK ADDRESS TRANSLATION; 3.4.3 TYPES OF ADDRESS TRANSLATION; 3.4.4 VPN CONSIDERATIONS; Chapter 4 Layer 2 Operations 4.1 THE POINT-TO-POINT PROTOCOL4.1.1 COMPONENTS; 4.1.2 PPP ENCAPSULATION; 4.1.3 LINK CONTROL PROTOCOL OPERATIONS; 4.1.4 MULTILINK PPP; 4.2 POINT-TO-POINT TUNNELING PROTOCOL; 4.2.1 IMPLEMENTATION MODELS; 4.2.2 NETWORKING FUNCTIONS; 4.2.3 ESTABLISHING THE PPTP TUNNEL; 4.2.4 PPTP ENCAPSULATED PACKETS; 4.2.5 THE PPTP CONTROL CONNECTION PACKET; 4.2.6 CONTROL CONNECTION PROTOCOL OPERATION; 4.2.7 PPTP DATA TUNNELING; 4.3 LAYER TWO FORWARDING; 4.3.1 EVOLUTION; 4.3.2 OPERATION; 4.3.3 THE L2F PACKET FORMAT; 4.3.4 TUNNEL OPERATIONS; 4.3.5 MANAGEMENT MESSAGES; 4.4 LAYER TWO TUNNELING PROTOCOL 4.4.1 OVERVIEW4.4.2 ARCHITECTURAL MODELS; 4.4.3 THE L2TP PACKET FORMAT; 4.4.4 CONTROL MESSAGES; 4.4.5 PROTOCOL OPERATIONS; Chapter 5 Higher Layer VPNs; 5.1 UNDERSTANDING IPSEC; 5.1.1 OVERVIEW; 5.1.2 TOPOLOGIES SUPPORTED; 5.1.3 SPECIFYING SESSION PARAMETERS; 5.1.4 THE SPI; 5.1.5 PROTOCOLS; 5.1.6 AUTHENTICATION HEADER; 5.1.7 ENCAPSULATING SECURITY PAYLOAD; 5.1.8 OPERATIONS; 5.1.9 KEY MANAGEMENT; 5.2 WORKING WITH IPSEC; 5.2.1 CONFIGURING IPSEC POLICIES; 5.2.2 ADDING THE IPSEC SNAP-IN; 5.2.3 CREATING AN IPSEC POLICY; 5.2.4 WORKING WITH IPSEC FILTERS; 5.3 SSL AND TLS; 5.3.1 RATIONALE FOR SSL 5.3.2 OVERVIEW OF SSL |
Record Nr. | UNINA-9910145753003321 |
Held Gilbert <1943-> | ||
Chichester, : John Wiley, c2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Virtual private networking : a construction, operation and utilization guide / / Gilbert Held |
Autore | Held Gilbert <1943-> |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Chichester, : John Wiley, c2004 |
Descrizione fisica | 1 online resource (308 p.) |
Disciplina | 004.678 |
Soggetto topico |
Extranets (Computer networks)
Computer networks - Security measures |
ISBN |
1-280-27491-3
9786610274918 0-470-02033-4 0-470-02034-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
virtual private networking; contents; Preface; Acknowledgements; Chapter 1 Introduction to Virtual Private Networking; 1.1 THE VPN CONCEPT; 1.1.1 DEFINITION; 1.1.2 TYPES OF VPNS; 1.1.3 CATEGORIES OF VPNS; 1.1.4 INFRASTRUCTURE; 1.1.5 BENEFITS OF USE; 1.1.6 DISADVANTAGES OF VPNS; 1.1.7 VPN PROTOCOLS; 1.1.8 SUMMARY; 1.1.9 ALTERNATIVES TO VPNS; 1.1.10 ECONOMIC ISSUES; 1.1.11 OTHER ALTERNATIVES; 1.2 BOOK PREVIEW; 1.2.1 UNDERSTANDING AUTHENTICATION AND CRYPTOLOGY; 1.2.2 UNDERSTANDING THE TCP/IP PROTOCOL SUITE; 1.2.3 LAYER 2 VPN TECHNIQUES; 1.2.4 HIGHER LAYER VPNS; 1.2.5 VPN HARDWARE AND SOFTWARE
1.2.6 SERVICE PROVIDER-BASED VPNSChapter 2 Understanding Authentication and Encryption; 2.1 AUTHENTICATION; 2.1.1 PASSWORD AUTHENTICATION PROTOCOL; 2.1.2 CHALLENGE-HANDSHAKE AUTHENTICATION PROTOCOL; 2.1.3 EXTENSIBLE AUTHENTICATION PROTOCOL - TRANSPORT LEVEL SECURITY; 2.1.4 TOKEN AUTHENTICATION; 2.2 ENCRYPTION; 2.2.1 GENERAL METHOD OF OPERATION; 2.2.2 PRIVATE VERSUS PUBLIC KEY SYSTEMS; 2.2.3 PUBLIC KEY ENCRYPTION; 2.2.4 THE RSA ALGORITHM; 2.2.5 DIGITAL CERTIFICATES; 2.2.6 HASHING AND DIGITAL SIGNATURES; Chapter 3 Understanding the TCP/IP Protocol Suite; 3.1 FRAME FORMATION 3.1.1 HEADER SEQUENCING3.1.2 SEGMENTS AND DATAGRAMS; 3.1.3 ICMP MESSAGES; 3.1.4 ON THE LAN; 3.1.5 DATAFLOW CONTROL FIELDS; 3.2 THE NETWORK LAYER; 3.2.1 THE IPV4 HEADER; 3.2.2 SUBNETTING; 3.2.3 THE SUBNET MASK; 3.2.4 THE WILDCARD MASK; 3.2.5 ICMP; 3.3 THE TRANSPORT LAYER; 3.3.1 TRANSPORT LAYER PROTOCOLS; 3.3.2 THE TCP HEADER; 3.3.3 THE UDP HEADER; 3.3.4 SOURCE AND DESTINATION PORT FIELDS; 3.4 PROXY SERVICES AND NETWORK ADDRESS TRANSLATION; 3.4.1 PROXY SERVICE; 3.4.2 NETWORK ADDRESS TRANSLATION; 3.4.3 TYPES OF ADDRESS TRANSLATION; 3.4.4 VPN CONSIDERATIONS; Chapter 4 Layer 2 Operations 4.1 THE POINT-TO-POINT PROTOCOL4.1.1 COMPONENTS; 4.1.2 PPP ENCAPSULATION; 4.1.3 LINK CONTROL PROTOCOL OPERATIONS; 4.1.4 MULTILINK PPP; 4.2 POINT-TO-POINT TUNNELING PROTOCOL; 4.2.1 IMPLEMENTATION MODELS; 4.2.2 NETWORKING FUNCTIONS; 4.2.3 ESTABLISHING THE PPTP TUNNEL; 4.2.4 PPTP ENCAPSULATED PACKETS; 4.2.5 THE PPTP CONTROL CONNECTION PACKET; 4.2.6 CONTROL CONNECTION PROTOCOL OPERATION; 4.2.7 PPTP DATA TUNNELING; 4.3 LAYER TWO FORWARDING; 4.3.1 EVOLUTION; 4.3.2 OPERATION; 4.3.3 THE L2F PACKET FORMAT; 4.3.4 TUNNEL OPERATIONS; 4.3.5 MANAGEMENT MESSAGES; 4.4 LAYER TWO TUNNELING PROTOCOL 4.4.1 OVERVIEW4.4.2 ARCHITECTURAL MODELS; 4.4.3 THE L2TP PACKET FORMAT; 4.4.4 CONTROL MESSAGES; 4.4.5 PROTOCOL OPERATIONS; Chapter 5 Higher Layer VPNs; 5.1 UNDERSTANDING IPSEC; 5.1.1 OVERVIEW; 5.1.2 TOPOLOGIES SUPPORTED; 5.1.3 SPECIFYING SESSION PARAMETERS; 5.1.4 THE SPI; 5.1.5 PROTOCOLS; 5.1.6 AUTHENTICATION HEADER; 5.1.7 ENCAPSULATING SECURITY PAYLOAD; 5.1.8 OPERATIONS; 5.1.9 KEY MANAGEMENT; 5.2 WORKING WITH IPSEC; 5.2.1 CONFIGURING IPSEC POLICIES; 5.2.2 ADDING THE IPSEC SNAP-IN; 5.2.3 CREATING AN IPSEC POLICY; 5.2.4 WORKING WITH IPSEC FILTERS; 5.3 SSL AND TLS; 5.3.1 RATIONALE FOR SSL 5.3.2 OVERVIEW OF SSL |
Record Nr. | UNINA-9910813377403321 |
Held Gilbert <1943-> | ||
Chichester, : John Wiley, c2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|