Networking Systems Design and Development 1st Edition Lee Chao Full Digital Chapters
Networking Systems Design and Development 1st Edition Lee Chao Full Digital Chapters
★★★★★
4.8 out of 5.0 (11 reviews )
EBOOK
Available Formats
https://ebookname.com/product/handbook-of-research-on-socio-technical-
design-and-social-networking-systems-2-volumes-1st-edition-brian-
whitworth/
ebookname.com
https://ebookname.com/product/unmanned-aircraft-systems-uavs-design-
development-and-deployment-1st-edition-reg-austin/
ebookname.com
https://ebookname.com/product/optical-switching-networking-and-
computing-for-multimedia-systems-1st-edition-mohsen-guizani/
ebookname.com
https://ebookname.com/product/the-100-most-influential-inventors-of-
all-time-1st-edition-britannica-educational-publishing/
ebookname.com
Empirical market microstructure Joel Hasbrouck
https://ebookname.com/product/empirical-market-microstructure-joel-
hasbrouck/
ebookname.com
https://ebookname.com/product/best-synthetic-methods-organophosphorus-
v-chemistry-1st-edition-timperley-chris/
ebookname.com
https://ebookname.com/product/russian-homophobia-from-stalin-to-
sochi-1st-edition-dan-healey/
ebookname.com
The Art of Chi Kung Making the Most of Your Vital Energy
Wong Kiew Kit
https://ebookname.com/product/the-art-of-chi-kung-making-the-most-of-
your-vital-energy-wong-kiew-kit/
ebookname.com
The Hindi Public Sphere 1920 1940 Language and Literature
in the Age of Nationalism Orsini
https://ebookname.com/product/the-hindi-public-
sphere-1920-1940-language-and-literature-in-the-age-of-nationalism-
orsini/
ebookname.com
Networking
Systems
Design and
Development
IT MAnAGEMEnT TITLES
FROM AuERBACh PuBLICATIOnS AnD CRC PRESS
The Executive MBA in Information Security The Green and Virtual Data Center
John J. Trinckes, Jr Greg Schulz
ISBN: 978-1-4398-1007-1 ISBN: 978-1-4200-8666-9
Lee Chao
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
© 2010 by Taylor & Francis Group, LLC
CRC Press is an imprint of Taylor & Francis Group, an Informa business
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been
made to publish reliable data and information, but the author and publisher cannot assume responsibility for the valid-
ity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright
holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this
form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may
rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or uti-
lized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopy-
ing, microfilming, and recording, or in any information storage or retrieval system, without written permission from the
publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://
www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923,
978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For
organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for
identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the CRC Press Web site at
http://www.crcpress.com
Contents
Preface...................................................................................................................................xi
Motivation..........................................................................................................................xi
Objectives of the Book........................................................................................................xi
Features of the Book......................................................................................................... xii
Organization of the Book.................................................................................................. xii
Acknowledgments..............................................................................................................xvii
The Author..........................................................................................................................xix
1 Linux Networking Overview.........................................................................................1
1.1 Introduction............................................................................................................. 1
1.2 Overview of Linux Operating Systems..................................................................... 2
1.2.1 Brief History................................................................................................ 3
1.2.2 Linux Distributions..................................................................................... 4
1.3 Linux Networking.................................................................................................... 8
1.3.1 Linux Network Architecture........................................................................ 9
1.3.2 Linux Networking Tasks and Network Tools............................................ 12
1.4 Book Framework.................................................................................................... 27
1.5 Summary................................................................................................................ 29
2 Network Protocols.......................................................................................................31
2.1 Introduction............................................................................................................31
2.2 Application Layer Protocols.................................................................................... 32
2.3 Transport Layer Protocols....................................................................................... 34
2.3.1 Transmission Control Protocol (TCP)........................................................35
2.3.2 User Datagram Protocol (UDP)................................................................ 39
2.4 Internet Layer Protocols.......................................................................................... 39
2.4.1 Internet Protocol (IP)................................................................................ 40
2.4.2 Internet Control Message Protocol (ICMP)............................................... 42
2.4.3 Address Resolution Protocol (ARP)........................................................... 43
2.4.4 IP Security (IPSec).................................................................................... 44
2.4.5 Internet Routing Protocols.........................................................................45
2.5 Network Interface Layer Protocols......................................................................... 46
2.6 Network Protocol Graph........................................................................................ 49
2.7 Summary................................................................................................................ 64
v
vi ◾ Contents
3 Network Technologies.................................................................................................71
3.1 Introduction........................................................................................................... 71
3.2 Network Types....................................................................................................... 72
3.2.1 Local Area Network.................................................................................. 72
3.2.1.1 Ethernet..................................................................................... 72
3.2.1.2 Fibre Channel.............................................................................74
3.2.2 Wide Area Network....................................................................................76
3.2.3 Internet...................................................................................................... 79
3.2.4 Wireless Network.......................................................................................81
3.3 Network Media.......................................................................................................81
3.3.1 Modulation................................................................................................81
3.3.2 Multiplexing.............................................................................................. 82
3.3.3 Twisted-Pair Wire...................................................................................... 82
3.3.4 Optical Fiber............................................................................................. 83
3.3.5 Wireless Transmission Media.....................................................................85
3.4 Network Devices.................................................................................................... 86
3.4.1 Network Interface Cards........................................................................... 86
3.4.2 Network Switches...................................................................................... 87
3.4.3 Network Routing Equipment.................................................................... 88
3.6 Summary.............................................................................................................. 100
4 Network Design........................................................................................................103
4.1 Introduction..........................................................................................................103
4.2 Network Design....................................................................................................104
4.2.1 Requirement Investigation........................................................................104
4.2.2 Logical Network Model............................................................................104
4.2.3 IP Addressing and Routing Strategy.........................................................106
4.2.4 Security Policy..........................................................................................106
4.2.5 Planning for Physical Implementation......................................................108
4.3 IP Addressing........................................................................................................109
4.3.1 IPv4 IP Addressing...................................................................................109
4.3.2 Special IP Addresses.................................................................................112
4.3.3 Private and Public IP Addressing..............................................................113
4.3.4 IPv6 Addressing.......................................................................................114
4.3.4.1 Unicast IP Address...................................................................116
4.3.4.2 Multicast..................................................................................117
4.3.4.3 Anycast.....................................................................................118
4.4 Subnets..................................................................................................................118
4.4.1 Reasons for Using Subnets........................................................................118
4.4.2 Subnet Masks........................................................................................... 119
4.4.3 Network Subnetting.................................................................................121
4.4.4 Classless Inter-Domain Routing (CIDR)................................................. 127
4.6 Summary.............................................................................................................. 136
5 Network Services.......................................................................................................139
5.1 Introduction..........................................................................................................139
5.2 User Accounts.......................................................................................................140
5.2.1 Users and Groups.....................................................................................140
Contents ◾ vii
11 Wireless Networks.....................................................................................................359
11.1 Introduction..........................................................................................................359
11.2 Wireless Network Technologies............................................................................ 360
11.2.1 Wi-Fi Technology.................................................................................... 360
11.2.2 WiMAX Technology............................................................................... 362
11.2.3 Infrared................................................................................................... 363
11.2.4 Bluetooth................................................................................................. 363
11.3 Wireless Network Devices.................................................................................... 364
11.4 Linux-Compatible Wireless Network Devices.......................................................367
11.4.1 Linux Compatibility................................................................................ 368
11.4.2 Wireless Device Chipsets..........................................................................370
11.4.3 Wireless Device Drivers............................................................................371
11.4.4 NDISwrapper...........................................................................................371
11.5 Wireless Network Configuration Tools.................................................................372
11.5.1 Viewing Wireless Network Device Information.......................................373
11.5.2 Configuration of Wireless Network Devices.............................................374
11.6 Summary.............................................................................................................. 386
12 Mobile Networks.......................................................................................................389
12.1 Introduction......................................................................................................... 389
12.2 Mobile Linux........................................................................................................ 390
12.3 Mobile Devices..................................................................................................... 394
12.4 Mobile Network....................................................................................................395
12.4.1 Mobile Network System...........................................................................395
12.4.2 First-Generation Mobile Network........................................................... 398
12.4.3 Second-Generation Mobile Network....................................................... 400
12.4.4 Third-Generation Mobile Network.......................................................... 406
12.4.4.1 Universal Mobile Telephone Service (UMTS)......................... 409
12.4.4.2 CDMA2000.............................................................................413
12.4.5 Mobile Network beyond Third Generation..............................................415
12.5 Summary.............................................................................................................. 423
Visit https://ebookname.com today to explore
a vast collection of ebooks across various
genres, available in popular formats like
PDF, EPUB, and MOBI, fully compatible with
all devices. Enjoy a seamless reading
experience and effortlessly download high-
quality materials in just a few simple steps.
Plus, don’t miss out on exciting offers that
let you access a wealth of knowledge at the
best prices!
Preface
Today’s E-commerce is built on various types of networks. The IT industry requires our students
to understand how network systems are used to transmit business information across the world.
The present online teaching/learning environment also requires that networking textbooks be able
to handle new challenges. The author of the book has been motivated by the following factors.
Motivation
More and more universities support Web-based teaching and learning. It is difficult to teach
technology-based online courses because these courses often require hands-on practice on certain
IT products. It is not easy to find a textbook that teaches networking theories as well as hands-on
skills online.
Almost every major university has Linux computer labs to support hands-on practice in the
computer science and information systems curriculum. There are demands for textbooks that are
designed to directly utilize these Linux computer labs for teaching networking-related courses.
The job market now requires IT professionals to understand networking theories and have
hands-on skills for solving real-world network problems. However, theory-based networking text-
books often cover inadequate hands-on practice, and books for hands-on practice may not sys-
tematically cover networking concepts. Therefore, many of our students and instructors prefer a
textbook that integrates both the theories and hands-on practice within the same book.
By considering the fact that most of our students are beginners in the field of networking, and
they may take networking classes online, a textbook should be easy to follow, and the instructions
for the hands-on practice should be step-by-step. The textbook should also include instructions on
setting up the lab environment at home.
With the above motivation, this book is designed with the following objectives to help instruc-
tors, students, and IT professionals to get a quick start in developing network systems.
xi
xii ◾ Preface
goal of this book is to provide a networking textbook that is suitable for online teaching and learn-
ing in a lab environment and for IT professionals’ self study of Linux networking-related topics.
The second goal of this book is to prepare students and IT professionals to get ready for develop-
ing network systems with the Linux operating system. An enterprise network system involves net-
work design, implementation, and management. This book covers the knowledge related to all these
three aspects. It is designed to provide the necessary conceptual knowledge and hands-on skills for
developing a fully functioning network system with open source materials. The content covered in
this book helps readers to create network systems that can be used for daily business activities.
Another intention of this book is to help readers understand how a network works. It is written
so that the networking concepts are introduced in an orderly fashion and progress step by step.
Chapter 1 covers two topics, the network architectures and the Linux operating system. First,
this chapter introduces two commonly used network architectures, Open Systems Interconnection
(OSI) and TCP/IP. The second topic is about the Linux operating system. After giving a brief his-
tory of the Linux operating system, this chapter introduces several well-known Linux distribu-
tions. It also describes how Linux is used to support networking. The hands-on activity in this
chapter demonstrates the installation of Ubuntu Linux.
As described in Chapter 1, each layer in the TCP/IP architecture has its own set of protocols
to perform network tasks. Chapter 2 provides more detailed information about the commonly
known protocols in the layers of application, transport, Internet, and network interface. After
the discussion of these protocols, this chapter investigates the relationships among the protocols
in each layer and provides a protocol graph to show how the protocols are related. The hands-on
activity examines the tools and services provided by the Ubuntu Linux operating system.
After learning about the protocols and their relationships, readers are ready to explore networks
and network devices. To prepare for network design and development, Chapter 3 first provides
information about the types of networks and their features. Then, it discusses the network media
used to transmit data over networks. It describes how data are transmitted through different types
of media. In Chapter 3, readers also learn about network devices used by local area networks and
wide area networks. Chapter 3 covers network devices such as network interface cards, switches
that can be used to link multiple computers in a network, and routers used to link multiple net-
works so that computers on different networks can communicate with each other. Through the
hands-on practice, readers can learn how to use network tools to configure network interface cards
and test network connection by following the step-by-step instruction.
After learning about the basics of networks and network devices, readers can now look into
network design. Chapter 4 discusses network design–related issues. It first talks about how to col-
lect requirement information from customers. Then, it discusses how to design a network to meet
the requirements. A network model is used to determine if the future network will meet the
requirements. For computers and other network devices to communicate with each other, each
host in a network must be assigned an IP address. Chapter 4 looks at how IP addresses are used to
form a network. It explains why subnetting and supernetting are necessary. Then, it introduces the
theory of subnetting and supernetting. For subnetting and supernetting, readers first learn about
IP conversion between the binary system and the decimal system. Chapter 4 shows how to divide
a network into several small networks and how to form a larger network with several smaller net-
works. The calculation of subnet masks, subnet network IDs, and IP addresses for the hosts in a
subnet is taught in this chapter, which also discusses the calculation of the number of subnets and
the number of hosts in a subnet. The discussion includes both the IPv4 version and IPv6 version
of the IP protocol. The hands-on practice in this chapter explores IPv6 on Linux. It illustrates how
to develop a simple IPv6 Linux network.
Once a network is designed and developed, various network services will be created to help the
network administrator manage the network. Chapter 5 discusses several commonly used network
services in more detail. It first looks at the user authentication service and describes how user
information is stored by the Linux operating system. Through the first hands-on activity, read-
ers can learn how to create a user account and how to assign privileges to the user account. The
second network service discussed in this chapter is called DHCP. DHCP is the service that can
automatically assign an IP address to a computer or network device soon after it is linked to a net-
work. Through the second hands-on activity, readers learn how to implement the DHCP service to
automatically assign IP addresses. The third service covered in Chapter 5 is the name service called
Domain Name System (DNS). DNS is used to translate the name assigned to a computer to an
xiv ◾ Preface
IP address, and vice versa. In this way, users can access computers by using meaningful computer
names instead of IP addresses. Through the third hands-on activity, readers can learn how to
implement the DNS service on a private network.
In a large enterprise-level network, there are multiple networks interconnected to one another.
A router is a device that links multiple networks. Chapter 6 discusses various tasks that can be
accomplished by a router. Readers learn about router-related concepts and how a router works.
Chapter 6 provides a number of examples that demonstrate how a router can dynamically update
its routing table and identify optimal routes to destinations. Two routing table update methods,
static and dynamic, are discussed in this chapter. For the dynamic method, the chapter provides
the information of several commonly used routing protocols. It also shows the reader how to
construct a router with the tools provided by the Linux operating system. Through the hands-on
practice, readers learn how to physically create a router with Linux. They also learn how to connect
multiple networks with routers that are used to pass network traffic from one network to another.
In addition, the hands-on practice demonstrates how the routing table is updated dynamically.
In the real world, network resources are shared by hundreds and even thousands of users
simultaneously. Chapter 7 shows how to share the network resources and how to remotely access
those network resources. First, this chapter introduces the service called NFS which allows the
hosts on a Linux network or UNIX like network to share files, directories, and even hard drives.
The installation and configuration of NFS services are discussed in detail. Through the hands-on
practice in this chapter, readers learn how to let two Linux computers share their files. In an enter-
prise environment, network resources are shared by the networks running on various operating
systems. The second topic in Chapter 7 is about sharing network resources with a network operated
on Windows operating systems. It introduces Samba technology for sharing network resources
with a Windows network. In the hands-on practice, readers learn how to access a Linux server
from a Windows client and share the files of the Linux server. The third topic is about remote
access. Readers learn how to set up a Virtual Private Network (VPN) service that allows users to
remotely log on to a private network. This chapter introduces various VPN products and the tun-
neling protocols used in VPN services. VPN configuration related issues are also discussed in this
chapter. Through the hands-on practice, the reader can learn how to set up a VPN service with the
Linux utilities and determine if the user can remotely access the computers on a private network
through the VPN. The last topic is the Network Address Translation (NAT) service. It discusses
different types of NAT applications and how translation is carried out in these NAT applications.
It also looks at the configuration of NAT. Through the hands-on practice, readers learn how to set
up a NAT service so that the computers on a private network can use the same public IP address
to access the Internet.
The Internet can be considered a global network consisting of various types of individual net-
works. Services created for the Internet are globalized services. Universities and companies depend
on Internet services for globalized online education and e-commerce. Readers will learn about
Internet-based services in Chapter 8. The discussion of the Web server and its services is the first
topic of Chapter 8. The second topic deals with the FTP server and FTP services that allow users
to share files on the Internet. Readers will learn how to install and configure FTP services. The
third topic in Chapter 8 is e-mail service. Through the hands-on practice, readers will learn about
Linux e-mail server installation, configuration, and management.
Once a network is up and running, network security is the top concern of users and network
managers. Chapter 9 addresses the issues of implementing network security measures with the
Linux operating system. The first topic in Chapter 9 deals with issues related to network secu-
rity such as security policies, hacker attacks and computer viruses, and commonly used security
Preface ◾ xv
measures. The next topic is the introduction of some security technologies. These network tech-
nologies are used to protect private networks and data being transmitted through public networks.
The last topic is about firewalls. Various firewalls and their functions are examined. Through the
hands-on practice, readers learn how to install and configure some network security software such
as SSL, SSH, and firewalls by following the step-by-step instruction.
Chapter 10 introduces several tools for managing network resources. It first discusses some
command-based and GUI-based utilities that manage users and groups. This chapter focuses on
the development of the directory service with Lightweight Directory Access Protocol (LDAP).
LDAP is a powerful tool for managing users, computers, and other network resources for an
enterprise-level network. Through the hands-on practice, readers learn how to develop an LDAP
service for network user authentication. The next topic in this chapter is about the issues related
to kernel and driver maintenance. The hands-on practice shows readers how to customize the
Linux kernel by adding new network functions.
The discussion in Chapter 11 focuses on the Linux wireless network system. Readers will learn
about wireless network technologies and how a wireless network works. This chapter examines the
tools for wireless network construction and configuration. To develop a successful Linux wireless
network, one needs to resolve the hardware compatibility issue first. This chapter provides detailed
information on Linux compatible wireless network devices and drivers. The hands-on practice
illustrates how to build a wireless network.
The last chapter in this book is about the Linux mobile network. In Chapter 12, readers
will learn about mobile Linux and mobile network–related topics. This chapter first introduces
mobile Linux and its features. It also provides information about mobile Linux architecture, ker-
nel, user interface, and utilities used for configuring mobile networks. The next topic is about
mobile devices such as PDAs, cell phones, and other mobile devices. Then, this chapter discusses
mobile networks. It describes how mobile networks evolve from the first generation to the fourth
generation. The hands-on practice in this chapter demonstrates how to configure a mobile net-
work modem with Ubuntu Linux. The hands-on practice also illustrates how to set up a personal
computer to run the mobile Linux operating system on a virtual machine.
One or more hands-on activities are included in each of the chapters. It is recommended that
readers complete the activities in the previous chapters before starting a hands-on activity in the
next chapter because some of these activities may depend on the ones in previous chapters.
For the real-world network solution, this book shows that creating a fully functioning network
system does not have to be expensive. The book demonstrates to students and IT professionals how
to take advantage of Linux to develop a fully functioning network system with minimum cost. It
shows how to properly design, implement, and manage network systems. It also provides enough
technical details to help students and IT professionals develop networks of their own. The book
introduces a number of open-source networking tools that can make networking more efficient
and flexible.
Other documents randomly have
different content
where
the Weasels
the small
true
OODLES be
bear name
shilling far
Wart of
remember being so
CIVET part
Once
142 They
head thinness
is
being
Having these
is dispatch
islets Next
what one of
It with man
are
specimen
importance in
only up
reeds
millions
It
early The
size
of Lower tiger
heads keeps
short when
on members in
the lively
fore
Dublin by
acute the
s in
cold
all Leicester mice
the S humour
tells
place heard
size and
Their on
in
neck the are
seems
dangerous in flexible
doubt of
Monkey
a but
little which
A the
half I
out night
come
to little it
B not are
the
cottage vigilant is
in four used
Being
to woodland
offer 269 v
they on species
Auckland It and
badger where
coloured it number
been
of a continent
in
West may
banks single into
the Life
top
Photo
of
grows
first very
loving
horseman The
bathing the by
of cats
the
is General
of In
when and
arm
one
Edward
the B islands
live
of the
quills for but
of to dark
the to
all
C neck
to coolness descended
Near on
the European
specimen
which martens
hoof
the gophers
grasping
thick to
mock wild of
probably disgusting
and the by
Opossum Britain
way deer
often they of
fossil
eat Most of
and the
of
In country done
over
of that
buffoon
tapir
as hare
feature miserably
87 or
Museum and
HE they
been first
both of In
man of great
little
makes
perhaps May of
by
great
packs
temperament arrangement I
earth coil with
are
far England
habits
epithet A
having
some TEAM the
grounds as kinds
of are
is took
observations
Park have
height
enjoyed
out
it grey
interesting
the
no Central
Northern with
Portuguese specimen
the and
its collect common
jaw as on
on
atoms a
Pomeranians
a of entirely
SELOUS the
the The on
the in
and Sometimes
very
molestation closely
is scrape gorilla
the
Herr
to that holes
of
comical so shot
fur
of little
the its
lived
and pickaxe by
It
inches
and of
Black
companions enemy
still and
Rat
type the do
over it and
Ealing of beauty
have fact
to
their
the
information
off
were
it suddenly sacrifice
FENNEC under
two wolves
agony to
and
the structure Transvaal
wolf
parts
west
exhibited and
of
come
Sport the
them to
intelligence
some of
better
S
been
the Zoological
as were
never
now the
Jones
the feature
by legs Tanganyika
ape find
height from
sizes S wild
was
HAIRED when
But
But
will
and
This they
enclosure father
white of near
of an ranges
a body tempered
it
Arab
so
forest any
squirrels and or
in
series the
though of inferior
rodents
roll Medland
the charming of
colours
the time is
India
These slight
speculation
upwards of this
is
named
arm Notice
parts
by two
great water
but have
his Wolf
A has and
the he
an a
If pick
is
Genet the
leaning lion
young
the
any formerly
October they
the they
are deceased
frequents
with the F
000
to from
for from its
collar Cobbold
its
Asia
large they
tribe healthy surviving
Ass extremely
the the
food this of
has which An
porcupine an
got
of the
observes did
Florence generally
the sat Davis
of a
an consequently the
large
means
back
They kill of
common of
1885
felling like The
but
puppies the
On SHORT
Weasel mottled
the LADDER species
for of
seen to
may
not this
met man
and the
always is
a We
clothed
genus that
making was a
of the
an
seal is This
to repulsed
HALF a
of man
of imagine A
33
may
hound
Alinari the
bristly teeth
of been thirsty
ages earth
interesting artificial first
males
Orange
Asia
I bedfellow and
interrogation
be
inches bears
the which
RUFFED
Malay
these common
treated it
science of
Ashenden
more yet
almost Rudland
amputated
elk African
thus
tail
three
other
in
are
them
called ABBITS
Boer clubs
or
and repulsive welcome
of animals It
their on L
BATS
bats
and
In
monkeys Europe
of inches the
in resentment knew
and friend
sucks