Chapter 1 Introduction to Computer Networks 1 1.1 The Formation and Development of Computer Networks 1 1.2 Classification and Application of Computer Networks 3 1.2.1 Classification of Computer Networks 3 1.2.2 Applications of Computer Networks 6 1.3 my country’s Internet Development 7 1.3.1 Construction of my country’s Internet 7 1.3.2 my country’s built Internet 9 1.4 Computer network architecture 11 1.4.1 Functional characteristics of computer networks 11 1.4.2 Basic concepts of the open system interconnection reference model 14 1.5 Geometry Architecture of commercial networks 20 1.5.1 SNA 20 1.5.2 1 Channel bandwidth 30 2.2.2 Bit error rate 32 2.2.3 Channel delay 32 2.3 Transmission medium 32 2.3.1 Twisted pair 32 2.3.2 Coaxial cable 33 2.3.3 Optical cable 35 2.3.4 Wireless channel 36 2.4 Data encoding 37 2.5 Digital modulation technology 41 2.6 Pulse code modulation 42 2.6.1 Sampling 43 2.6.2 Quantization 43 2.6.3 Coding 43 2.7 Spread spectrum communication 44 2.7.1 Frequency running spread spectrum 44 2.7.2 Direct sequence spread spectrum 45 2.8 Communication methods and switching mode 47 2.8.1 Data communication mode 47 2.8.2 Switching mode 48 2.9 Multiplexing technology 51 2.9.1 Frequency division multiplexing 51 2.9.2 Time division multiplexing 52 2.9.3 Wavelength division multiplexing Multiplexing 53 2.9.4 Code division multiplexing 53 2.9.5 Digital transmission system 54 2.9.6 Synchronous digital series 56 2.10 Error control 56 2.10.1 Error detection code 57 2.10.2 Hamming code 57 2.10.3 Cyclic redundancy Check code 59 Chapter 3 Wide area communication network 61 3.1 Public switched telephone network 61 3.1.1 Structure of the telephone system 61 3.1.2 Local loop 62 3.1.3 Modem 66 3.2 X.25 public data network 68 3.2 .1 CCITT X.21 interface 68 3.2.2 Flow control and error control70 3.2.3 HDLC protocol75 3.2.4 Relay protocol 89 3.3.3 Fixed virtual circuit 90 3.3.4 Application of frame relay 92 3.4 ISDN and ATM 94 3.4.1 Integrated Services Digital Network 94 3.4.2 ATM physical layer 98 3.4.3 ATM layer 98 3.4.4 ATM High layer 101 3.4.5 ATM adaptation layer 102 3.4.6 ATM communication management 104 Chapter 4 LAN and metropolitan area network 106 4.1 Introduction to LAN technology 106 4.1.1 Topology and transmission medium 106 4.1.2 IEEE 802 standard for LAN/MAN 111 4.2 Logical link control sublayer113 4.2.1 LLC address 113 4.2.2 LLC service 114 4.2.3 LLC protocol 115 4.3 Media access control technology 116 4.3.1 Round-robin 116 4.3.2 Reservation 117 4.3.3 Competitive style 117 4.4 IEEE 802.3 standard 117 4.4.1 ALOHA protocol 118 4.4.2 CSMA/CD protocol 120
4.4.3 Performance analysis of CSMA/CD protocol 125 4.4.4 MAC and PHY specifications 126 4.4.5 Switched Ethernet 130 4.4.6 High-speed Ethernet 131 4.4.7 Virtual LAN 134 4.5 LAN interconnection 137 4.5.1 Bridge Protocol architecture 137 4.5.2 Spanning tree bridge 140 4.5.3 Source routing bridge 144 4.6 Metropolitan area network 146 4.6.1 Metropolitan Ethernet 146 4.6.2 Resilient packet ring 149 4.7 Wireless LAN 153 4.7.1 Wireless LAN Basic concepts of 153 4.7.2 WLAN communication technology 155 4.7.3 IEEE 802.11 WLAN architecture 158 Chapter 5 Network interconnection and the Internet 165 5.1 Network interconnection equipment 165 5.1.1 Repeater 165 5.1.2 Bridge 166 5.1. 3 Routers 167 5.1.4 Gateways 168 5.2 WAN interconnection 169 5.2.1 OSI network layer internal structure 170 5.2.2 Connection-oriented Internet 171 5.2.3 Connectionless Internet 173 5.3 IP protocol 176 5.3.1 IP Address 177 5.3.2 IP protocol operation 179 5.3.3 IP protocol data unit 181 5.4 ICMP 182 5.5 TCP and UDP 183 5.5.1 TCP service 183 5.5.2 TCP header format 184 5.5.3 User Datagram Protocol 186 5.6 Domain name and addresses 188 5.6.1 Domain name system 189 5.6.2 Address resolution protocols 191 5.7 Gateway protocols 194 5.7.1 Autonomous systems 194 5.7.2 Exterior gateway protocols 195 5.7.3 Interior gateway protocols 196 5.7.4 Core gateway protocols 197 5.8 Router technology 198 5.8.1 NAT technology 198 5.8.2 CIDR technology 200 5.8.3 Third layer switching technology 202 5.9 IP QoS technology 204 5.9.1 Integrated services 205 5.9.2 Differentiated services 207 5.9.3 Traffic engineering 209 5.10 Internet applications 211 5.10 .1 Remote Login Protocol 211 5.10.2 File Transfer Protocol 212 5.10.3 Simple Mail Transfer Protocol 213 5.10.4 Hypertext Transfer Protocol 214 5.11 IPv6 217 5.11.1 IPv6 Grouping Format 218 5.11.2 IPv6 Address 222 5.11.3 IPv6 Routing Protocol 228 5.11.4 IPv6 improvements over IPv4 229 5.12 Mobile IP 229 5.12.1 Mobile IP communication process 230 5.12.2 Mobile IPv6 232 Chapter 6 Network Security 237 6.1 Basic concepts of network security 237 6.1.1 Network security threats Type 237 6.1.2 Network security vulnerability 238 6.1.3 Network attack 238 6.1.4 Target of security measures 239 6.1.5 Basic security technology 239 6.2 Information encryption technology 240 6.2.1 Data encryption principle 240 6.2.2 Classic encryption technology 241 6.2 .3 Modern encryption technology 241 6.3 Authentication 245 6.3.1 Authentication based on shared keys 245 6.3.2 Needham-Schroeder authentication protocol 246 6.3.3 Authentication based on public keys 247 6.4 Digital signatures 247 6.4.1 Key-based Digital signature 247 6.4.2 Digital signature based on public key 248 6.5 Message
Abstract 248 6.5.1 Message digest algorithm 249 6.5.2 Secure hash algorithm 250 6.5.3 Hash message authentication code 251 6.6 Digital certificate 252 6.6.1 The concept of digital certificate 252 6.6.2 Obtaining certificate 253 6.6. 3 Certificate revocation 254 6.7 Key management 254 6.7.1 Overview of key management 254 6.7.2 Key management system 255 6.8 Virtual private network 258 6.8.1 Working principle of virtual private network 258 6.8.2 Layer 2 tunnel protocol 260 6.8.3 IPSec 266 6.8.4 Secure Socket Layer 269 6.9 Application Layer Security Protocol 274 6.9.1 S-HTTP 274 6.9.2 PGP 274 6.9.3 S/MIME 276 6.9.4 Secure Electronic Transactions 277 6.9.5 Kerberos 278 6.10 Trusted system 279 6.11 Firewall 281 6.11.1 Firewall concept 281 6.11.2 Basic types of firewall 282 6.11.3 Firewall design 284 6.11.4 Firewall function and network topology 284 6.12 Virus protection and intrusion detection 285 6.12.1 Virus protection 285 6.12.2 Intrusion detection 289 Chapter 7 Network operating system and application server configuration 292 7.1 Network operating system 292 7.1.1 Basic concepts of network operating system 292 7.1.2 Windows Server 2003 Operating system 295 7.1.3 Linux operating system Introduction 298 7.2 Basic configuration of network operating systems 298 7.2.1 Windows Server 2003 local users and groups 298 7.2.2 Windows Server 2003 Active Directory 299 7.2.3 Windows Server 2003 Terminal Services 305 7.2.4 Windows Server 2003 Remote Management 308 7.2. 5 Linux network configuration 312 7.2.6 Linux file and directory management 320 7.2.7 Linux user and group management 328 7.3 Windows Server 2003 IIS Service configuration 334 7.3.1 Basic concepts of IIS server 334 7.3.2 Installing IIS service 335 7.3. 3 Configuring the Web server 336 7.3.4 Configuring the FTP server 339 7.4 Linux Apache server configuration 342 7.4.1 Apache installation and configuration 342 7.4.2 Establishing a virtual host based on domain name 343 7.4.3 Establishing a virtual host based on IP address 344 7.4 .4 Access control in Apache 344 7.5 DNS server configuration 346 7.5.1 DNS server basics 346 7.5.2 Windows Server 2003 DNS Server installation and configuration 355 7.5.3 Linux BIND DNS server installation 358 7.6 DHCP server configuration 360 7.6.1 DHCP server basics 360 7.6.2 Windows Server 2003 DHCP Server configuration 361 7.6.3 Linux DHCP server configuration 365 7.7 Email server configuration 367 7.7.1 Email server installation 367 7.7.2 Mailbox storage location settings 368 7.7.3 Domain Management 369 7.7.4 Mailbox Management 370 7.8 Samba Server Configuration 371
7.8.1 Basics of Samba protocol 371 7.8.2 Main functions of Samba 371 7.8.3 Simple configuration of Samba 372 7.9 Windows Server 2003 security policy 373 7.9.1 Concept of security policy 373 7.9.2 Account password policy settings 377 7.9.3 IPSec policy Settings 378 7.9.4 Web site digital certificate 382 Chapter 8 Networking technology 386 8.1 Switches and routers 386 8.1.1 Switch basics 386 8.1.2 Router basics 393 8.1.3 Access routers and switches 395 8.2 Switch configuration 396 8.2.1 Overview of the switch 397 8.2.2 Basic configuration of the switch 397 8.2.3 Configuring and managing VLAN 403 8.2.4 Spanning Tree Protocol configuration 407 8.3 Configuration of the router 410 8.3.1 Overview of the router 410 8.3.2 Basic configuration of the router 411 8.4 Configuring the routing protocol 421 8.4.1 Configure RIP protocol 421 8.4.2 Configure IGRP protocol 425 8.4.3 Configure OSPF protocol 429 8.4.4 Configure EIGRP protocol 432 8.5 Configure WAN access 433 8.5.1 Configure ISDN 433 8.5.2 Configure PPP and DDR 436 8.5 .3 Configuring Frame Relay 440 8.6 IPSec configuration and testing 444 8.6.1 IPSec implementation workflow 444 8.6.2 Cisco configuration examples 445 8.6.3 Common faults during testing 448 8.7 IPv6 configuration and deployment 451 8.7.1 IPv6-over -IPv4 GRE Tunnel Configuration 452 8.7.2 ISATAP Tunnel Configuration 455 8.7.3 NAT-PT 459 8.8 Access Control List 463 8.8.1 Basic ACL Concept 463 8.8.2 ACL Configuration Command 464 8.8.3 Named Access Control List 472 8.8 .4 Comprehensive application of ACL 473 Chapter 9 Network Management 475 9.1 Network management system architecture 475 9.1.1 Hierarchical structure of network management system 475 9.1.2 Configuration of network management system 476 9.1.3 Structure of network management software 478 9.2 Network monitoring System composition 480 9.2.1 Management information composition 480 9.2.2 Network monitoring system configuration 481 9.2.3 Network monitoring system communication mechanism 482 9.3 Network management functional domain 483 9.3.1 Performance management 483 9.3.2 Fault management 489 9.3 .3 Accounting management 490 9.3.4 Configuration management 491 9.3.5 Security management 493 9.4 Simple Network Management Protocol 497 9.4.1 SNMPv1 498 9.4.2 SNMPv2 504 9.4.3 SNMPv3 507 9.5 Management database MIB-2 510 9.5.1 Definition of management objects 510 9.5.2 MIB-2 functional groups 515 9.5.3 SNMPv2 management information base 519 9.6 RMON 522 9.6.1 Basic concepts of RMON 522 9.6.2 RMON management information base 523 9.6.3 RMON2 management information Library 524 | 9.7 Network Diagnostic and Configuration Commands 525 | 9.7.1 Ipconfig 525 | 9.7.2 Ping 528 | 9.7.3 Arp 529 | 9.7.4 Netstat 531 | 9.7.5 Tracert 533 | 9.7.6 Pathping 535 | 9
.7.7 Nbtstat 537 9.7.8 Route 540 9.7.9 Netsh 543 9.7.10 Nslookup 547 9.7.11 Net 553 9.8 Network monitoring and management tools 555 9.8.1 Network monitoring principles 556 9.8.2 Network sniffer 556 9.8.3 Sniffer Functions and usage of software557 9.8.4 HP OpenView 558 9.8.5 IBM Tivoli NetView 561 9.8.6 CiscoWorks for Windows 563 9.9 Network storage technology 565 9.9.1 Inexpensive disk redundant array 565 9.9.2 Network storage 569 Chapter 10 Network planning and design 572 10.1 Structured cabling system 572 10.2 Network analysis and design process 575 10.2.1 Network system life cycle 575 10.2.2 Network development process 578 10.2.3 Constraints of network design 582 10.3 Network requirements analysis 583 10.3.1 Scope of requirements analysis 584 10.3.2 Preparation of requirements specification 596 10.4 Communication traffic analysis 598 10.4.1 Methods of communication traffic analysis 598 10.4.2 Steps of communication traffic analysis 599 10.5 Logical network design 605 10.5.1 Logical network design goals 605 10.5. 2 Issues requiring attention 606 10.5.3 Main network services 607 10.5.4 Technical evaluation 608 10.5.5 Work content of logical network design 609 10.6 Network structure design 610 10.6.1 Local area network structure 610 10.6.2 Hierarchical network design 614 10.6 .3 Network redundancy design 616 10.6.4 Wide area network technology 618 10.6.5 WAN interconnection technology 623 10.6.6 Safe operation and maintenance 630 10.7 Network fault diagnosis 635 10.7.1 Network fault diagnosis 635 10.7.2 Network troubleshooting tools 637 10.7.3 Hierarchical diagnosis of network faults 639 10.8 Network planning cases 640 10.8.1 Case 1 640 10.8.2 Case 2 646