0% found this document useful (0 votes)
34 views86 pages

Networking Systems Design and Development 1st Edition Lee Chao Full Digital Chapters

Educational material: Networking Systems Design and Development 1st Edition Lee Chao Available Instantly. Comprehensive study guide with detailed analysis, academic insights, and professional content for educational purposes.

Uploaded by

josselyne8759
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views86 pages

Networking Systems Design and Development 1st Edition Lee Chao Full Digital Chapters

Educational material: Networking Systems Design and Development 1st Edition Lee Chao Available Instantly. Comprehensive study guide with detailed analysis, academic insights, and professional content for educational purposes.

Uploaded by

josselyne8759
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 86

Networking Systems Design and Development 1st

Edition Lee Chao instant access 2025

Now available at ebookname.com


https://ebookname.com/product/networking-systems-design-and-
development-1st-edition-lee-chao/

★★★★★
4.8 out of 5.0 (11 reviews )

Instant PDF Download


Networking Systems Design and Development 1st Edition Lee
Chao

EBOOK

Available Formats

■ PDF eBook Study Guide Ebook

EXCLUSIVE 2025 ACADEMIC EDITION – LIMITED RELEASE

Available Instantly Access Library


Instant digital products (PDF, ePub, MOBI) available
Download now and explore formats that suit you...

Handbook of Research on Socio Technical Design and Social


Networking Systems 2 Volumes 1st Edition Brian Whitworth

https://ebookname.com/product/handbook-of-research-on-socio-technical-
design-and-social-networking-systems-2-volumes-1st-edition-brian-
whitworth/
ebookname.com

Unmanned aircraft systems UAVs design development and


deployment 1st Edition Reg Austin

https://ebookname.com/product/unmanned-aircraft-systems-uavs-design-
development-and-deployment-1st-edition-reg-austin/

ebookname.com

Optical switching networking and computing for multimedia


systems 1st Edition Mohsen Guizani

https://ebookname.com/product/optical-switching-networking-and-
computing-for-multimedia-systems-1st-edition-mohsen-guizani/

ebookname.com

The 100 Most Influential Inventors of All Time 1st Edition


Britannica Educational Publishing

https://ebookname.com/product/the-100-most-influential-inventors-of-
all-time-1st-edition-britannica-educational-publishing/

ebookname.com
Empirical market microstructure Joel Hasbrouck

https://ebookname.com/product/empirical-market-microstructure-joel-
hasbrouck/

ebookname.com

Best Synthetic Methods Organophosphorus V Chemistry 1st


Edition Timperley Chris.

https://ebookname.com/product/best-synthetic-methods-organophosphorus-
v-chemistry-1st-edition-timperley-chris/

ebookname.com

Russian Homophobia from Stalin to Sochi 1st Edition Dan


Healey

https://ebookname.com/product/russian-homophobia-from-stalin-to-
sochi-1st-edition-dan-healey/

ebookname.com

Jesus Potter Harry Christ the fascinating parallels


between two of the world s most popular literary
characters 1st Edition Derek Murphy
https://ebookname.com/product/jesus-potter-harry-christ-the-
fascinating-parallels-between-two-of-the-world-s-most-popular-
literary-characters-1st-edition-derek-murphy/
ebookname.com

The Art of Chi Kung Making the Most of Your Vital Energy
Wong Kiew Kit

https://ebookname.com/product/the-art-of-chi-kung-making-the-most-of-
your-vital-energy-wong-kiew-kit/

ebookname.com
The Hindi Public Sphere 1920 1940 Language and Literature
in the Age of Nationalism Orsini

https://ebookname.com/product/the-hindi-public-
sphere-1920-1940-language-and-literature-in-the-age-of-nationalism-
orsini/
ebookname.com
Networking
Systems
Design and
Development
IT MAnAGEMEnT TITLES
FROM AuERBACh PuBLICATIOnS AnD CRC PRESS

The Executive MBA in Information Security The Green and Virtual Data Center
John J. Trinckes, Jr Greg Schulz
ISBN: 978-1-4398-1007-1 ISBN: 978-1-4200-8666-9

The Decision Model: A Business The Effective CIO


Logic Framework Linking Business Eric J. Brown, Jr. and William A. Yarberry
and Technology ISBN: 978-1-4200-6460-5
Barbara von Halle and Larry Goldberg
Business Resumption Planning,
ISBN: 978-1-4200-8281-4
Second Edition
The SIM Guide to Enterprise Architecture Leo A. Wrobel
Leon Kappelman, ed. ISBN: 978-0-8493-1459-9
ISBN: 978-1-4398-1113-9
IT Auditing and Sarbanes-Oxley
Lean Six Sigma Secrets for the CIO Compliance: Key Strategies for
William Bentley and Peter T. Davis Business Improvement
ISBN: 978-1-4398-0379-0 Dimitris N. Chorafas
ISBN: 978-1-4200-8617-1
Building an Enterprise-Wide Business
Continuity Program Best Practices in Business Technology
Kelley Okolita Management
ISBN: 978-1-4200-8864-9 Stephen J. Andriole
ISBN: 978-1-4200-6333-2
Marketing IT Products and Services
Jessica Keyes Leading IT Projects:
ISBN: 978-1-4398-0319-6 The IT Manager’s Guide
Jessica Keyes
Cloud Computing: Implementation,
ISBN: 978-1-4200-7082-8
Management, and Security
John W. Rittinghouse and Knowledge Retention:
James F. Ransome Strategies and Solutions
ISBN: 978-1-4398-0680-7 Jay Liebowitz
ISBN: 978-1-4200-6465-0
Data Protection: Governance, Risk
Management, and Compliance The Business Value of IT
David G. Hill Michael D. S. Harris, David Herron,
ISBN: 978-1-4398-0692-0 and Stasia Iwanicki
ISBN: 978-1-4200-6474-2
Strategic Data Warehousing: Achieving
Alignment with Business Service-Oriented Architecture: SOA
Neera Bhansali Strategy, Methodology, and Technology
ISBN: 978-1-4200-8394-1 James P. Lawler and H. Howell-Barber
ISBN: 978-1-4200-4500-0
Mobile Enterprise Transition
and Management Service Oriented Enterprises
Bhuvan Unhelkar Setrag Khoshafian
ISBN: 978-1-4200-7827-5 ISBN: 978-0-8493-5360-4
Networking
Systems
Design and
Development

Lee Chao
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
© 2010 by Taylor & Francis Group, LLC
CRC Press is an imprint of Taylor & Francis Group, an Informa business

No claim to original U.S. Government works


Version Date: 20110725

International Standard Book Number-13: 978-1-4200-9160-1 (eBook - PDF)

This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been
made to publish reliable data and information, but the author and publisher cannot assume responsibility for the valid-
ity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright
holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this
form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may
rectify in any future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or uti-
lized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopy-
ing, microfilming, and recording, or in any information storage or retrieval system, without written permission from the
publishers.

For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://
www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923,
978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For
organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.

Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for
identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the CRC Press Web site at
http://www.crcpress.com
Contents

Preface...................................................................................................................................xi
Motivation..........................................................................................................................xi
Objectives of the Book........................................................................................................xi
Features of the Book......................................................................................................... xii
Organization of the Book.................................................................................................. xii
Acknowledgments..............................................................................................................xvii
The Author..........................................................................................................................xix
1 Linux Networking Overview.........................................................................................1
1.1 Introduction............................................................................................................. 1
1.2 Overview of Linux Operating Systems..................................................................... 2
1.2.1 Brief History................................................................................................ 3
1.2.2 Linux Distributions..................................................................................... 4
1.3 Linux Networking.................................................................................................... 8
1.3.1 Linux Network Architecture........................................................................ 9
1.3.2 Linux Networking Tasks and Network Tools............................................ 12
1.4 Book Framework.................................................................................................... 27
1.5 Summary................................................................................................................ 29
2 Network Protocols.......................................................................................................31
2.1 Introduction............................................................................................................31
2.2 Application Layer Protocols.................................................................................... 32
2.3 Transport Layer Protocols....................................................................................... 34
2.3.1 Transmission Control Protocol (TCP)........................................................35
2.3.2 User Datagram Protocol (UDP)................................................................ 39
2.4 Internet Layer Protocols.......................................................................................... 39
2.4.1 Internet Protocol (IP)................................................................................ 40
2.4.2 Internet Control Message Protocol (ICMP)............................................... 42
2.4.3 Address Resolution Protocol (ARP)........................................................... 43
2.4.4 IP Security (IPSec).................................................................................... 44
2.4.5 Internet Routing Protocols.........................................................................45
2.5 Network Interface Layer Protocols......................................................................... 46
2.6 Network Protocol Graph........................................................................................ 49
2.7 Summary................................................................................................................ 64

v
vi ◾ Contents

3 Network Technologies.................................................................................................71
3.1 Introduction........................................................................................................... 71
3.2 Network Types....................................................................................................... 72
3.2.1 Local Area Network.................................................................................. 72
3.2.1.1 Ethernet..................................................................................... 72
3.2.1.2 Fibre Channel.............................................................................74
3.2.2 Wide Area Network....................................................................................76
3.2.3 Internet...................................................................................................... 79
3.2.4 Wireless Network.......................................................................................81
3.3 Network Media.......................................................................................................81
3.3.1 Modulation................................................................................................81
3.3.2 Multiplexing.............................................................................................. 82
3.3.3 Twisted-Pair Wire...................................................................................... 82
3.3.4 Optical Fiber............................................................................................. 83
3.3.5 Wireless Transmission Media.....................................................................85
3.4 Network Devices.................................................................................................... 86
3.4.1 Network Interface Cards........................................................................... 86
3.4.2 Network Switches...................................................................................... 87
3.4.3 Network Routing Equipment.................................................................... 88
3.6 Summary.............................................................................................................. 100
4 Network Design........................................................................................................103
4.1 Introduction..........................................................................................................103
4.2 Network Design....................................................................................................104
4.2.1 Requirement Investigation........................................................................104
4.2.2 Logical Network Model............................................................................104
4.2.3 IP Addressing and Routing Strategy.........................................................106
4.2.4 Security Policy..........................................................................................106
4.2.5 Planning for Physical Implementation......................................................108
4.3 IP Addressing........................................................................................................109
4.3.1 IPv4 IP Addressing...................................................................................109
4.3.2 Special IP Addresses.................................................................................112
4.3.3 Private and Public IP Addressing..............................................................113
4.3.4 IPv6 Addressing.......................................................................................114
4.3.4.1 Unicast IP Address...................................................................116
4.3.4.2 Multicast..................................................................................117
4.3.4.3 Anycast.....................................................................................118
4.4 Subnets..................................................................................................................118
4.4.1 Reasons for Using Subnets........................................................................118
4.4.2 Subnet Masks........................................................................................... 119
4.4.3 Network Subnetting.................................................................................121
4.4.4 Classless Inter-Domain Routing (CIDR)................................................. 127
4.6 Summary.............................................................................................................. 136
5 Network Services.......................................................................................................139
5.1 Introduction..........................................................................................................139
5.2 User Accounts.......................................................................................................140
5.2.1 Users and Groups.....................................................................................140
Contents ◾ vii

5.3 Dynamic Host Configuration Protocol (DHCP)...................................................148


5.3.1 Dynamic IP Address Assignment Process.................................................148
5.3.2 DHCP Configuration............................................................................... 151
5.4 Name Services.......................................................................................................158
5.4.1 Naming Hierarchy...................................................................................159
5.4.2 DNS Server Hierarchy..............................................................................160
5.4.3 Name Resolution Process.........................................................................161
5.4.4 DNS Zones..............................................................................................162
5.4.5 Types of DNS Records.............................................................................162
5.5 Summary...............................................................................................................171
6 Routing......................................................................................................................173
6.1 Introduction..........................................................................................................173
6.2 Connecting Networks with Routers......................................................................174
6.3 Routing Table........................................................................................................175
6.4 Updating Routing Table........................................................................................176
6.5 Route Calculation.................................................................................................178
6.5.1 Link State Routing Algorithm..................................................................178
6.5.2 Distance Vector Routing Algorithm.........................................................183
6.6 Routing across Networks.......................................................................................188
6.7 Summary.............................................................................................................. 209
7 Linux Network Resource Sharing.............................................................................211
7.1 Introduction..........................................................................................................211
7.2 Network File System (NFS)...................................................................................212
7.2.1 NSF Technology Overview.......................................................................212
7.2.2 NFS Configuration...................................................................................213
7.3 Sharing Network with Windows.......................................................................... 220
7.3.1 Samba Features and Applications............................................................ 220
7.3.2 Configuration of Samba Services..............................................................221
7.4 Remote Access through VPN............................................................................... 226
7.4.1 VPN Technology..................................................................................... 227
7.4.1.1 Internet Protocol Security (IPSec)........................................... 227
7.4.1.2 Secure Sockets Layer (SSL) VPN............................................. 228
7.4.1.3 Point-to-Point Tunneling Protocol (PPTP).............................. 229
7.4.2 VPN Configuration................................................................................. 230
7.5 Network Address Translation (NAT)................................................................... 239
7.5.1 NAT Technology..................................................................................... 239
7.5.2 NAT Application and Configuration........................................................241
7.6 Summary.............................................................................................................. 246
8 Internet Services........................................................................................................249
8.1 Introduction..........................................................................................................249
8.2 Web Services.........................................................................................................250
8.2.1 Hypertext Transfer Protocol (HTTP).......................................................251
8.2.2 Web Servers..............................................................................................251
8.2.3 Web Server Configuration........................................................................252
viii ◾ Contents

8.3 File Transfer Service..............................................................................................258


8.3.1 FTP Server and Client..............................................................................258
8.3.2 FTP Connection......................................................................................259
8.3.3 FTP Commands.......................................................................................259
8.3.4 FTP Configuration...................................................................................259
8.4 E-Mail Service...................................................................................................... 264
8.4.1 E-Mail System......................................................................................... 264
8.4.2 E-Mail Transfer........................................................................................265
8.4.3 E-Mail Service Configuration..................................................................267
8.5 Summary.............................................................................................................. 285
9 Network Security.......................................................................................................287
9.1 Introduction......................................................................................................... 287
9.2 Security Issues...................................................................................................... 288
9.2.1 Network Security Policies........................................................................ 288
9.2.2 Intrusion into Computer Systems............................................................ 289
9.2.3 Intrusion into Networks.......................................................................... 289
9.2.4 Computer Viruses.................................................................................... 290
9.2.5 Network Security Measures......................................................................291
9.3 Security Technologies........................................................................................... 292
9.3.1 Intrusion Detection System (IDS)............................................................293
9.3.2 IP Security (IPSec).................................................................................. 294
9.3.3 Remote Authentication Dial In User Service (RADIUS)......................... 296
9.3.4 Secure Shell (SSH)................................................................................... 298
9.3.5 Secure Sockets Layer (SSL)...................................................................... 303
9.3.6 Wi-Fi Protected Access.............................................................................310
9.4 Network Firewalls.................................................................................................312
9.4.1 Firewall Rules...........................................................................................313
9.4.2 Firewall Types.......................................................................................... 315
9.4.3 Firewall Architectures...............................................................................317
9.5 Summary.............................................................................................................. 320
10 Network Resource Management...............................................................................323
10.1 Introduction......................................................................................................... 323
10.2 User Account Management...................................................................................324
10.2.1 User Management....................................................................................324
10.2.2 Group Management.................................................................................325
10.2.3 Directory Service Management............................................................... 326
10.3 Network Device Resource Management............................................................... 340
10.3.1 Viewing Device Information................................................................... 340
10.3.2 Device Management Daemons................................................................ 343
10.3.2.1 Hardware Abstraction Layer (HAL)........................................ 343
10.3.2.2 User Device (udev)...................................................................345
10.3.3 Kernel Management................................................................................ 348
10.4 Summary...............................................................................................................357
Contents ◾ ix

11 Wireless Networks.....................................................................................................359
11.1 Introduction..........................................................................................................359
11.2 Wireless Network Technologies............................................................................ 360
11.2.1 Wi-Fi Technology.................................................................................... 360
11.2.2 WiMAX Technology............................................................................... 362
11.2.3 Infrared................................................................................................... 363
11.2.4 Bluetooth................................................................................................. 363
11.3 Wireless Network Devices.................................................................................... 364
11.4 Linux-Compatible Wireless Network Devices.......................................................367
11.4.1 Linux Compatibility................................................................................ 368
11.4.2 Wireless Device Chipsets..........................................................................370
11.4.3 Wireless Device Drivers............................................................................371
11.4.4 NDISwrapper...........................................................................................371
11.5 Wireless Network Configuration Tools.................................................................372
11.5.1 Viewing Wireless Network Device Information.......................................373
11.5.2 Configuration of Wireless Network Devices.............................................374
11.6 Summary.............................................................................................................. 386
12 Mobile Networks.......................................................................................................389
12.1 Introduction......................................................................................................... 389
12.2 Mobile Linux........................................................................................................ 390
12.3 Mobile Devices..................................................................................................... 394
12.4 Mobile Network....................................................................................................395
12.4.1 Mobile Network System...........................................................................395
12.4.2 First-Generation Mobile Network........................................................... 398
12.4.3 Second-Generation Mobile Network....................................................... 400
12.4.4 Third-Generation Mobile Network.......................................................... 406
12.4.4.1 Universal Mobile Telephone Service (UMTS)......................... 409
12.4.4.2 CDMA2000.............................................................................413
12.4.5 Mobile Network beyond Third Generation..............................................415
12.5 Summary.............................................................................................................. 423
Visit https://ebookname.com today to explore
a vast collection of ebooks across various
genres, available in popular formats like
PDF, EPUB, and MOBI, fully compatible with
all devices. Enjoy a seamless reading
experience and effortlessly download high-
quality materials in just a few simple steps.
Plus, don’t miss out on exciting offers that
let you access a wealth of knowledge at the
best prices!
Preface

Today’s E-commerce is built on various types of networks. The IT industry requires our students
to understand how network systems are used to transmit business information across the world.
The present online teaching/learning environment also requires that networking textbooks be able
to handle new challenges. The author of the book has been motivated by the following factors.

Motivation
More and more universities support Web-based teaching and learning. It is difficult to teach
technology-based online courses because these courses often require hands-on practice on certain
IT products. It is not easy to find a textbook that teaches networking theories as well as hands-on
skills online.
Almost every major university has Linux computer labs to support hands-on practice in the
computer science and information systems curriculum. There are demands for textbooks that are
designed to directly utilize these Linux computer labs for teaching networking-related courses.
The job market now requires IT professionals to understand networking theories and have
hands-on skills for solving real-world network problems. However, theory-based networking text-
books often cover inadequate hands-on practice, and books for hands-on practice may not sys-
tematically cover networking concepts. Therefore, many of our students and instructors prefer a
textbook that integrates both the theories and hands-on practice within the same book.
By considering the fact that most of our students are beginners in the field of networking, and
they may take networking classes online, a textbook should be easy to follow, and the instructions
for the hands-on practice should be step-by-step. The textbook should also include instructions on
setting up the lab environment at home.
With the above motivation, this book is designed with the following objectives to help instruc-
tors, students, and IT professionals to get a quick start in developing network systems.

Objectives of the Book


Online teaching/learning has become mainstream among higher education institutions. More and
more courses in various fields have been offered online. However, for many universities, it is chal-
lenging to offer networking-related courses online due to the requirement of lab activities. The first

xi
xii ◾ Preface

goal of this book is to provide a networking textbook that is suitable for online teaching and learn-
ing in a lab environment and for IT professionals’ self study of Linux ­networking-related topics.
The second goal of this book is to prepare students and IT professionals to get ready for develop-
ing network systems with the Linux operating system. An enterprise network system involves net-
work design, implementation, and management. This book covers the knowledge related to all these
three aspects. It is designed to provide the necessary conceptual knowledge and hands-on skills for
developing a fully functioning network system with open source materials. The content covered in
this book helps readers to create network systems that can be used for daily business activities.
Another intention of this book is to help readers understand how a network works. It is written
so that the networking concepts are introduced in an orderly fashion and progress step by step.

Features of the Book


To achieve its goals, this book is designed with the following features.
◾◾ Self-contained content: For the convenience of readers, the book is self-contained. It includes
some necessary basic networking concepts and theories, and hands-on activities, as well as
the information about Linux networking tools.
◾◾ Suitable for self-study: This book provides detailed instruction that is suitable for self-study.
It does not just state the networking concepts and theories, but explains them through
examples, illustrations, and hands-on activities.
◾◾ Designed for online teaching: The book is specially designed for online teaching. All the lab activities
can be done on a student’s home computer through the use of virtual machine technologies.
◾◾ A wide range of coverage: This book covers various types of networks: wired networks, wire-
less networks, and mobile networks. It discusses Linux-based networking on both the server
side and the client side.
◾◾ Linux technology: The development of a Linux network system costs almost nothing for the
reader. Ubuntu GUN/Linux is used for all the lab activities. Ubuntu is known by its fea-
tures such as versatility, power, and ease of use.
◾◾ Step-by-step instructions: For the hands-on activities, the book provides step-by-step instruc-
tions and illustrations so that even beginners can follow. The book gives directions on setting
up the virtual lab environment for hands-on practice.
◾◾ Real-world approach: Examples, illustrations, and hands-on practice projects are included in
each chapter of this book. These materials are designed for helping readers gain confidence
and skills in developing a network system that can be used in a real-world business.
◾◾ Supplementary materials: To assist teaching and learning, the book provides review ques-
tions and case study projects to enhance readers’ understanding. A solution manual and
PowerPoint presentations are also provided.
With these features, the book can be used for a one-semester networking course. It is also suitable
for IT professionals who do self-study on Linux networking.

Organization of the Book


There are twelve chapters in this book. Each chapter consists of an introduction, main body of the
chapter, summary, review questions, and case study projects. In each chapter, one or more hands-
on activities are provided for readers to enhance understanding and gain practical skills.
Preface ◾ xiii

Chapter 1 covers two topics, the network architectures and the Linux operating system. First,
this chapter introduces two commonly used network architectures, Open Systems Interconnection
(OSI) and TCP/IP. The second topic is about the Linux operating system. After giving a brief his-
tory of the Linux operating system, this chapter introduces several well-known Linux distribu-
tions. It also describes how Linux is used to support networking. The hands-on activity in this
chapter demonstrates the installation of Ubuntu Linux.
As described in Chapter 1, each layer in the TCP/IP architecture has its own set of protocols
to perform network tasks. Chapter 2 provides more detailed information about the commonly
known protocols in the layers of application, transport, Internet, and network interface. After
the discussion of these protocols, this chapter investigates the relationships among the protocols
in each layer and provides a protocol graph to show how the protocols are related. The hands-on
activity examines the tools and services provided by the Ubuntu Linux operating system.
After learning about the protocols and their relationships, readers are ready to explore networks
and network devices. To prepare for network design and development, Chapter 3 first provides
information about the types of networks and their features. Then, it discusses the network media
used to transmit data over networks. It describes how data are transmitted through different types
of media. In Chapter 3, readers also learn about network devices used by local area networks and
wide area networks. Chapter 3 covers network devices such as network interface cards, switches
that can be used to link multiple computers in a network, and routers used to link multiple net-
works so that computers on different networks can communicate with each other. Through the
hands-on practice, readers can learn how to use network tools to configure network interface cards
and test network connection by following the step-by-step instruction.
After learning about the basics of networks and network devices, readers can now look into
network design. Chapter 4 discusses network design–related issues. It first talks about how to col-
lect requirement information from customers. Then, it discusses how to design a network to meet
the requirements. A network model is used to determine if the future network will meet the
requirements. For computers and other network devices to communicate with each other, each
host in a network must be assigned an IP address. Chapter 4 looks at how IP addresses are used to
form a network. It explains why subnetting and supernetting are necessary. Then, it introduces the
theory of subnetting and supernetting. For subnetting and supernetting, readers first learn about
IP conversion between the binary system and the decimal system. Chapter 4 shows how to divide
a network into several small networks and how to form a larger network with several smaller net-
works. The calculation of subnet masks, subnet network IDs, and IP addresses for the hosts in a
subnet is taught in this chapter, which also discusses the calculation of the number of subnets and
the number of hosts in a subnet. The discussion includes both the IPv4 version and IPv6 version
of the IP protocol. The hands-on practice in this chapter explores IPv6 on Linux. It illustrates how
to develop a simple IPv6 Linux network.
Once a network is designed and developed, various network services will be created to help the
network administrator manage the network. Chapter 5 discusses several commonly used network
services in more detail. It first looks at the user authentication service and describes how user
information is stored by the Linux operating system. Through the first hands-on activity, read-
ers can learn how to create a user account and how to assign privileges to the user account. The
second network service discussed in this chapter is called DHCP. DHCP is the service that can
automatically assign an IP address to a computer or network device soon after it is linked to a net-
work. Through the second hands-on activity, readers learn how to implement the DHCP service to
automatically assign IP addresses. The third service covered in Chapter 5 is the name service called
Domain Name System (DNS). DNS is used to translate the name assigned to a computer to an
xiv ◾ Preface

IP address, and vice versa. In this way, users can access computers by using meaningful computer
names instead of IP addresses. Through the third hands-on activity, readers can learn how to
implement the DNS service on a private network.
In a large enterprise-level network, there are multiple networks interconnected to one another.
A router is a device that links multiple networks. Chapter 6 discusses various tasks that can be
accomplished by a router. Readers learn about router-related concepts and how a router works.
Chapter 6 provides a number of examples that demonstrate how a router can dynamically update
its routing table and identify optimal routes to destinations. Two routing table update methods,
static and dynamic, are discussed in this chapter. For the dynamic method, the chapter provides
the information of several commonly used routing protocols. It also shows the reader how to
construct a router with the tools provided by the Linux operating system. Through the hands-on
practice, readers learn how to physically create a router with Linux. They also learn how to connect
multiple networks with routers that are used to pass network traffic from one network to another.
In addition, the hands-on practice demonstrates how the routing table is updated dynamically.
In the real world, network resources are shared by hundreds and even thousands of users
simultaneously. Chapter 7 shows how to share the network resources and how to remotely access
those network resources. First, this chapter introduces the service called NFS which allows the
hosts on a Linux network or UNIX like network to share files, directories, and even hard drives.
The installation and configuration of NFS services are discussed in detail. Through the hands-on
practice in this chapter, readers learn how to let two Linux computers share their files. In an enter-
prise environment, network resources are shared by the networks running on various operating
systems. The second topic in Chapter 7 is about sharing network resources with a network operated
on Windows operating systems. It introduces Samba technology for sharing network resources
with a Windows network. In the hands-on practice, readers learn how to access a Linux server
from a Windows client and share the files of the Linux server. The third topic is about remote
access. Readers learn how to set up a Virtual Private Network (VPN) service that allows users to
remotely log on to a private network. This chapter introduces various VPN products and the tun-
neling protocols used in VPN services. VPN configuration related issues are also discussed in this
chapter. Through the hands-on practice, the reader can learn how to set up a VPN service with the
Linux utilities and determine if the user can remotely access the computers on a private network
through the VPN. The last topic is the Network Address Translation (NAT) service. It discusses
different types of NAT applications and how translation is carried out in these NAT applications.
It also looks at the configuration of NAT. Through the hands-on practice, readers learn how to set
up a NAT service so that the computers on a private network can use the same public IP address
to access the Internet.
The Internet can be considered a global network consisting of various types of individual net-
works. Services created for the Internet are globalized services. Universities and companies depend
on Internet services for globalized online education and e-commerce. Readers will learn about
Internet-based services in Chapter 8. The discussion of the Web server and its services is the first
topic of Chapter 8. The second topic deals with the FTP server and FTP services that allow users
to share files on the Internet. Readers will learn how to install and configure FTP services. The
third topic in Chapter 8 is e-mail service. Through the hands-on practice, readers will learn about
Linux e-mail server installation, configuration, and management.
Once a network is up and running, network security is the top concern of users and network
managers. Chapter 9 addresses the issues of implementing network security measures with the
Linux operating system. The first topic in Chapter 9 deals with issues related to network secu-
rity such as security policies, hacker attacks and computer viruses, and commonly used security
Preface ◾ xv

measures. The next topic is the introduction of some security technologies. These network tech-
nologies are used to protect private networks and data being transmitted through public networks.
The last topic is about firewalls. Various firewalls and their functions are examined. Through the
hands-on practice, readers learn how to install and configure some network security software such
as SSL, SSH, and firewalls by following the step-by-step instruction.
Chapter 10 introduces several tools for managing network resources. It first discusses some
command-based and GUI-based utilities that manage users and groups. This chapter focuses on
the development of the directory service with Lightweight Directory Access Protocol (LDAP).
LDAP is a powerful tool for managing users, computers, and other network resources for an
enterprise-level network. Through the hands-on practice, readers learn how to develop an LDAP
service for network user authentication. The next topic in this chapter is about the issues related
to kernel and driver maintenance. The hands-on practice shows readers how to customize the
Linux kernel by adding new network functions.
The discussion in Chapter 11 focuses on the Linux wireless network system. Readers will learn
about wireless network technologies and how a wireless network works. This chapter examines the
tools for wireless network construction and configuration. To develop a successful Linux wireless
network, one needs to resolve the hardware compatibility issue first. This chapter provides detailed
information on Linux compatible wireless network devices and drivers. The hands-on practice
illustrates how to build a wireless network.
The last chapter in this book is about the Linux mobile network. In Chapter 12, readers
will learn about mobile Linux and mobile network–related topics. This chapter first introduces
mobile Linux and its features. It also provides information about mobile Linux architecture, ker-
nel, user interface, and utilities used for configuring mobile networks. The next topic is about
mobile devices such as PDAs, cell phones, and other mobile devices. Then, this chapter discusses
mobile networks. It describes how mobile networks evolve from the first generation to the fourth
generation. The hands-on practice in this chapter demonstrates how to configure a mobile net-
work modem with Ubuntu Linux. The hands-on practice also illustrates how to set up a personal
computer to run the mobile Linux operating system on a virtual machine.
One or more hands-on activities are included in each of the chapters. It is recommended that
readers complete the activities in the previous chapters before starting a hands-on activity in the
next chapter because some of these activities may depend on the ones in previous chapters.
For the real-world network solution, this book shows that creating a fully functioning network
system does not have to be expensive. The book demonstrates to students and IT professionals how
to take advantage of Linux to develop a fully functioning network system with minimum cost. It
shows how to properly design, implement, and manage network systems. It also provides enough
technical details to help students and IT professionals develop networks of their own. The book
introduces a number of open-source networking tools that can make networking more efficient
and flexible.
Other documents randomly have
different content
where

the Weasels

the small

true

soon has surround


such but has

prove prairie only

animal where the

OODLES be

bear name
shilling far

Wart of

not can century

remember being so

CIVET part

Once

142 They

Scholastic have without

not the function


is

head thinness

is

being

Having these

is dispatch

islets Next

what one of

It with man
are

specimen

importance in

only up

reeds

millions

ears one bone

It

early The
size

of Lower tiger

heads keeps

short when

greyhounds cat climate

India showed and

his outnumber North

on members in
the lively

fore

Dublin by

acute the

s in

cold
all Leicester mice

the S humour

There ever all

tells

place heard

size and

Their on

in
neck the are

eaten equal North

sale because This

seems

dangerous in flexible

and into children

doubt of
Monkey

a but

little which

A the

half I

the Fratelli forests

was the driving

bear their they


arrangement inches

out night

come

creature and eating

to little it
B not are

the

cottage vigilant is

in four used

Being

even the their

to woodland

Pariah sizes Hudson

offer 269 v
they on species

pest lately Zoo

Auckland It and

badger where

fruits young many

coloured it number

been

of a continent

in

West may
banks single into

the Life

top

Photo

of

grows

first very

loving

horseman The

bathing the by
of cats

the

is General

of In

Editor states chestnuts


They

when and

arm

one

Edward

the B islands

live

of the
quills for but

of to dark

the to

all

hour the into

C neck
to coolness descended

Near on

the European

specimen

which martens

hoof

the gophers

grasping
thick to

mock wild of

they Most anatomically

extinct are preys

probably disgusting

and the by

off make base


great La are

with wild less

Opossum Britain

way deer

often they of

fossil

eat Most of
and the

of

In country done

over

of that

buffoon

off about but


other the

tapir

as hare

feature miserably

87 or

Museum and

PONY Cats curious


with

HE they

been first

both of In

man of great

little
makes

perhaps May of

by

great

packs

temperament arrangement I
earth coil with

are

far England

habits

epithet A

having
some TEAM the

the TAILED kittens

grounds as kinds

of are

is took

streak drink terrorise


speed horses

observations

Park have

floods Mesopotamia Cat

what and says

height

enjoyed

out

it grey

interesting
the

no Central

Northern with

Portuguese specimen

the and
its collect common

jaw as on

on

atoms a

Pomeranians

a of entirely

SELOUS the
the The on

the in

nest this likely

and Sometimes

very
molestation closely

is scrape gorilla

the

like one its

Herr

to that holes

of

comical so shot

fur
of little

the its

lived

and pickaxe by

It

inches

and of

Black
companions enemy

still and

Rat

type the do

infant the box

over it and

Ealing of beauty
have fact

to

and man where

their

nearly deal from

the
information

off

were

it suddenly sacrifice

FENNEC under

two wolves

agony to

and
the structure Transvaal

wolf

Carpathians with left

parts

but for common

west
exhibited and

all Hokham small

of

come

Sport the

them to

intelligence

some of

better

S
been

the Zoological

as were

never

Carl beaters and


alike

now the

Jones

the feature

by legs Tanganyika

ape find

height from

213 makes muscular

sizes S wild

was
HAIRED when

But

But

will

and

This they

enclosure father
white of near

months into and

of an ranges

a body tempered

it

Arab

so

forest any

squirrels and or

the grip from


to upper

in

series the

though of inferior

rodents

roll Medland

the charming of
colours

have and inches

the time is

India

These slight
speculation

the Dubois age

upwards of this

is

and Armadillo between

named

teeth prey rather

arm Notice
parts

by two

great water

quite lynx had

but have

his Wolf

A has and

known wolves young

the he

an a
If pick

medium capital the

is

Genet the

ancients Spain Ottomar


Photo

leaning lion

young

the

any formerly

October they
the they

are deceased

frequents

with the F

000

to from
for from its

collar Cobbold

its

Asia

large they
tribe healthy surviving

Ass extremely

quite ROWNED among

ring and MOUSE

the the
food this of

has which An

porcupine an

got

of the

observes did

tails ocelot prairie

Florence generally
the sat Davis

not Now straight

of a

an consequently the

large

means

back

They kill of

common of

1885
felling like The

different taken and

and blots tails

but

puppies the

On SHORT

Weasel mottled
the LADDER species

for of

seen to

may

not this

met man

and the

always is

a We

clothed
genus that

making was a

of the

an

coarse rats building

seal is This

to repulsed

HALF a
of man

of imagine A

33

may

hound

Alinari the

bristly teeth

of been thirsty

ages earth
interesting artificial first

males

Orange

Asia

I bedfellow and

interrogation
be

inches bears

the which

RUFFED

Malay
these common

treated it

common Hope inoffensive

necessary the watertight

science of

Ashenden

more yet

bees pair their


on dogs

almost Rudland

amputated

elk African

thus

tail

three

thick they been

other
in

are

them

called ABBITS

Boer clubs

or
and repulsive welcome

of animals It

difficult INDIAN recent

wet monkey bone

their on L

BATS
bats

and

In

monkeys Europe

of inches the

in resentment knew

and friend

which them leg

with been charge

sucks

You might also like