Documente Academic
Documente Profesional
Documente Cultură
z
CL-- !-
6e.-
&á
ü*
E-
rw
w
3e.,srÉP!
RKS
4
t
F
I
,,
i"
JAMES E. GOTDMAI\
PHIILIP T. RA\rytES
Purdue Unioersity .,
,,,,
nf\-q ft-fT.JAA.,li
f., sr -Í- \, LJ (,} $'¡ -l_
tr_
@
John Wiley & Sons, Inc.
NewYork . Chichester . Weinheim' Brisbane . Singapore 'Toronto
ACQUISITIO\S EDITOR Beth Lang Golub
ASSISTANT EDITOR Samantha Alducin
MARKETING IVÍA\ACER Jessica Garcra
SENIOR PRODUCTIO\ EDITOR Patncia \,lcFadden
DESIGN DIRECTOR lvladeh-n Lesure
ILLUSTRATOR Curtis A. Snyder
PRODUCTION MANACEMENT Hermitage Publishing Services
This book was set in 10/12 Palatino by Hermitage Publishing Services and printed and bound
by R. R. Donnellel. & Sons. The cover was printed by Phoenix Color.
Cop¡rright 20000 John Wiiey & Sons, Inc. All rights reserved.
ISBN 0-471-33047-7
10987654
lames E. Goldmnn: To Susan, Eric, nnd Grant
DF]SCRIPTION
Tl-re tert is divided into four major sections to maximize flexible use
l.r' a rvide variety of course orientations:
P.rrt 1: Local Area Network Infrastructure
P¡.rt l: Local Area Network Software
Part l: Local Area Network Connectivity
Part Local Area Netrt'ork Administration
-1:
.l l
t,
'rll
,l l
tt,
,l
'.l]
Mace YN
ffi APPROACH
The text follows the top down model used in Professor Goldman's previous
textbooks, examining the many options, standards, interfaces, implications,
advantages, and disadvantages in each of the top down model's five layers:
Business
Application
Data
Network
Technology
Concept roadmaps are located throughout the text stressing the relationship
between chapters and to an overall LAN architecture, as well as between top
ics within chapters. Each chapter begins with an outline of new concepts into
duced, previous concepts reinforced, and the learning objectives for that
chapter. Section and paragraph headings help students to organize and iderr
tify key concepts introduced in each chapter. End of chapter material indudes:
chapter summaries, key term listings, abundant review questions, as weill as
activities and problems for active student learning. As previously mentiure4
YIII Mce
close of each
business cases from professional periodicals are reprinted_at the
or used
chapter with associat"a ullutytlt questions to be answered by students
diagrams
as ti-re basis for classroom discusiion. A liberal use of clear, concise
adds to the usability of the text and the understanding of the students.
W* TARGBTAUDIENCES/COURSDS
could
Due to the modular nature of this text, a variety of audiences/courses
text the
be well served. Among the courses as potential adoptees of this
are
following:
ffi SPECIATFBATURES
Although some of these features have been mentioned previously, they are
repeateá here to stress the unique nature of this text as a Purveyor of practi-
ca^l, business-oriented local areá network analysis skills
and problem solving
abilities rather than a mere collection of concepts and facts.
"InSharperFocus"sectionshightightmoredetailed'more
advancedl or background information for concepts int¡oduced
within a chapter. These sections can be included or excluded at the
instructor's discretion.
"Managerial Perspective" sections take a "bottom-line" approach to
client sérver information systems analysis and design' The potenüal
impactofmanagementdecisionsinavariety-ofsituationsarehigh-
ligirted in these sections which may be of particular interest to
M.B.A. audiences.
Applied Problem Solving sections of chapters focusing on the use of
uriJtyti.ut models for Applied Problem Solving activities are high-
lighied for the benefit of both instructors and students' By stressing
pioblem solving activities, students can be assured of learning how
io dolocalarea network analysis and design'
Emphasizing the practical nature of the text, instances of practical
advice or wirningi are highlighted in order to call the reader's atten-
tion to important but often overlooked information'
. The osl (open systems Interconnection) Model is used throughout
the text u, án ut álytis tool for student problem solving and design
opportunities.
ffi SUPPTEMENTS
answers to
The CD-bas ed. Instructor's Resource Guide will contain thorough
uu ,".ri"* questions featured at the end of each chapter in the
text. In addi-
tion, solutións to case study questions will be provided. An abundant
selec-
for
tionof additional questioná in a variety of formats will be provided each
Finally, all illustrations in PowerPotntgT format will be provided on
thebD in ordér to expedite the production of transparencies and class notes
"r.rupt"t.
F to accompanY the text'
F
€
of
Ey
sis
¡ih
-
JAMES E. GOTDIIMN
PHIttP T. RAWTES
n
)
ACKNOWTEDGMEI\TS
Reviewers
nu
CONTENTS
Networking Hardware 6
Networking Software 7
Networking Media 8
\A/hy Are Local Area Networks Implemented?
1-0
Summary 30
Key Terms 31
Review Questions 37
Activities 32
Case Study 33
Introduction 37
The OSI Model Revisited 37
Overall Structure and Characteristics 37
PhysicalLayer 38
Data-Link Layer 38
Sub-Lavers 39
Net*'ork Laver 39
Transport Layer 40
Session Layer 40
Presentation Layer 40
Application Layer 41'
Encapsulation,/De-encapsulation 47
The Local Area Network Architecture Model 43
AccessMethodology 44
Logical Topology 47
Physical Topology 47
NetworkArchitectures 48
Ethernet 48
IBEE 802.2 and Ethernet SNAP 57
Token Ring 55
i
.,,,::r,i:,,r.,, Token Ring and Timing 59
!*' -=..- t
iñ,
t\\
(\ && Token Ring or Bthernet? 60
i\
il
\\
F.
t.
Conter¡ts xtll
ARCNet 67
FDDI 61.
n*** FDDI's Future óB
ffi
High-SpeedNetworkArchitectures 68
100BaseT 68
10OVG-AnyLAN 70
7'
ke* Cascading Hubs and the Round Robin Polling Scheme
IsochronousEthernet 73
High-Speed Token Ring-HSTR 75
GigabitEthernet 77
Fibre Channel 78
LAN-basedATM 79
t& Network Architectures in a Nutshell 79
Summary 80
Key Terms 81
Review Questions 82
Activities 83
Case Study 84
o4
LOCAT AREA NETWORK HARD\ryARE o¿
CHAPTBR 3
lntroduction 88
The Local Area Network Technology Architecture 88
Implications of LAN Technology Choices 89
PC Hardware 89
Media-Sharing LAN Architectures vs. switched LAN Architectures 90
x.#
{ry
LAN Switeh Thaffie Analysis 93
Xviii Contenis
( )I)t 109
Encoding
Line 137
SummarY 138
Key Terms 139
Review Questions 140
Activities 141'
Cnse StudY 142
145
( TI{PTER 4 NETWORK tA}tsR COIIINIUNICATIONS PROTOCOTS
Tntroduction 746
Layer 3-The Network LaYer r46
ConnectionlessorConnection-0riented? 156
Layer S-The Session LaYer L57
Layers r57
Layers 6 andT--The Presentation and Application
Local Area Network Protocols 158
rtii
)
IP Version 6 184
Transport Layer Protocols 787
Internet Support Protocols and Services 197
AppleTalk 793
DDP 794
Transport Layer Protocols 795
Session Layer Protocols 196
Stand Alone Transport Layer Protocols I97
NeIBEUI (NBF) 197
Useof\etBEtl 198
DLC 19E
Nehvork Printers and DLC 199
2ttq
r$ P{RT 2 tOCAt AREA NETWORK SOFTWARE
2t1
i H{PTER 5 I,OCAI AREA NETWORK OPERATING SYSTEMS
Introduction 212
Network Operating Systems Architectures 212
TraditionalDifferentiation:Peer-to-Peervs'Client/Server2l2
Current Differentiation: Client NOS vs' Server NOS
273
ClientNetworkingCapabilities 224
::.' :, Client Netrvork 0perating System Technolog'v Analvsis 229
233
..:,r,,,,t'' DirectoryServicesCommunication
APPlicationServices 234
Networking and Connectivity Services 236
Management and Administration Services 238
SecuritY 242
246
NetworkOperatingSystemlnteroperability
SummarY 247
KeY Terms 248
Review Questions 248
Activities 249
Case StudY 250
251
f H\PTER 6 NO\TTI NBTWARB
Introduction 253
,'i llrliri:l
tl'
tr'ilii,
l
iili:tirl
i r,il,,
iirlr i
,l'l
'1.'
lli"'
'¡:
']
xxtl Contents
\etrrare 3 253
OverallArchitecture 255
Operating System Architecture and Characteristics 255
Management and Administration 256
CommunicationsProtocols 258
NetWare 4 259
OverallArchitecture 260
Operating System Architecture and Characteristics 262
CommunicationProtocols 272
Application Layer Services 274
5
F
Net!\Iare 276
Or-erallArchitecture 276
Operating System Architecture and Characteristics 278
CommunicationProtocols 283
The Fel'cr'\efilork Prolocols the Better 285
295
MacintoshClientlnteroperabilif
295
NetWareServerlnteroperability
295
NetWare/Windowslnteroperability
296
NetWare/UNIXInteroperability
SummarY 297
CaseStudY 301
303
CHAPTER 7 wIND0ws NT (2ooo)
Introduction 304
OverallArchitecture 304
305
and Characteristics
Operating System Architecture
SMP Scatability 372
Multithreaded Kernels and
NTFS 3T4
Recoverability 31'4
NTFS File System
"i;:r.'MasterFilelhbleDesignEnsuresFastAceessandReliability516
3L8
Management and Administration
320
DomainArchitectures
NT Security Model 323
Components of the Windows
325
CommunicationsProtocols
DHCP andWINS 329
333
InterProcessCommunication
APPlication LaYer Services
335
CommunicationProtocols 349
Application Layer Services 351
NAT WAN/Remote Access 351
Windows Serverlnteroperability 353
Windows/NetWarelnteroperability 354
Windows/UNIXlnteroperability 355
Summary 356
Key Terms 357
Review Questions 358
Activities 359
Case Study 360
Introduction 363
OverallArchitecture 365
UNIX Compatibility and Open Systems 365
Common UNIX Implementations 367
AIX 368
Digital UNIX 368
HP-UX 369
IRIX 369
Linus 369
Open Source Sofhvare 370
Solaris 371
Operating System Architecture and Characteristics 371
MultiprocessingKernel 372
System Programs 375
InterprocessCommunications 376
UNIX Filesystem 376
Contents
Introduction 397
The Need For Middleware 398
MiddlewareArchitecture 398
LogicalArchitecture 399
&
& Interfaees as Middleware Selection Criteria 400
d*m
PhysicalArchitecture 401'
Synchronousvs. Asynchronous Middleware Communication 403
MiddlewareCategorization 404
Application-BasedMiddlewareCategories 405
DatabaseMiddleware 405
1lit. SQL Standardization 406
xxvi Contents
Message-OrientedMiddleware 418
Message-OrientedMiddlewareAnalysis 424
ffi
Thansaetion Processing 426
TiansactionProcessingMonitors 425
Object-OrientedMiddleware 430
1:"-.',.
CORBA Services 434
."¡ri--
'-:\:i' CORBA versus DCOM Teehnical Analysis 436
.8&
6#ó¿{
Middleware Seleetion 437
Summary 438
Key Terms 439
Review Questions 440
Case Study 441
Introduction 445
ApplicationDevelopmentEnvironments 445
Contents xxvlr
Low-LevelLanguages 445
High-LevelLanguages 446
Interpreters versus Compilers 447
&
C0B0t and the Year 2000 450
458
DevelopmentEnüronmentSelection
,$,
PersPective 460
KeePing CASE in
461'
ApPlicationDePloYment
^ 46L
S"rrr", APPlication DePloYment
Processing 462
Transaction
Deploymenf 463
Client Application
Applieations 464
versus Sewer-Based
l.¡¡;, Client-Based Applications
..¡:
Distribution 465
Software
ai Requirements for Automatic
JavaScriPt 469
Configuration 474
Windows Terminal Ser"ver
t Computing 475
Netuork Impact of Network
Applications 475
Integration with Existing
Third-PartYSoftware 475
LegacYAPPlications 477
N[ainframes Aren't DeadYet 47P'
{{1 ,*.
SummarY 482
KeY Terms 482
xxviii Contents
Introduction 488
LAN Software Architecture 488
GroupWare 489
E-Mail 497
&
tirii!ii. Workflow 0nly Automates Existing Systems 506
Conferencing 509
ElectronicSoftwareDistribution 529
License Metering Software 529
Asset Management Software 531
Summary 533
Key Terms 533
Review Questions 534
Activities 536
Case Studt¡ 536
Contents )o(lx
539
iie P.{RT 3 tOCAt AREA NETWORK CONNECTMTY
TCP/P 541
I ilPTER 12 NETWORK DESIGN USING
D.
Introduction 542
Classfull Addressing-A Brief Review 542
Summary 571'
Key Terms 571,
Activities 572
Case Study 573
Introduction 577
InternetworkingDesign 577
OveralllnternetworkingDesignStrategies 578
Bridging 580
Routing 582
Switching 585
Addressing 585
InternetworkingTechnology 586
Internetworking Technology and the OSI Model 586
Repeaters 588
Bridges 590
Routers 596
TechnologyAnalysis 599
Boundary Routers and Branch Office Routers 600
Virtual LANs 605
LAN-To-Mainframelnterworking 679
Micro-Mainframe Connectivity versus Peer-to-Peer Internetworking
619
Hierarchical Networks and Peer-to-Peer Communications Networks
619
ClassSNAArchitecture 620
Micro-MainframeConnectivity 621
TheSNAArchitecture 624
Challenges to SNA/LAN Integration 627
SNA/LAN Integration Solutions 627
Summary 633
Key Terms 634
Contents )oü1
Introduction 640
Software 663
Management and Configuration of Remote Access Technology 673
,r:illl
..¡::,:l::r gptimizing Remote Node and Remote Control Software Performance 6?3
Summary 685
Key Terms 686
xxxii Contents
Introduction 694
Application and Database Management 695
DistributedApplicationManagement 695
EnterpriseDatabaseManagement 697
Client and Desktop Management 698
Desktop Management 698
ConfigurationManagement 703
Help Desks 704
Asset Management 705
Client/Server InfrastructureArchitecture 711
Consolidated Service Desk 713
Server Management and Systems Administration 775
Server Management 715
Enterprise NetworkManagement 718
Enterprise Network Management Architecture and Protocols 778
Enterprise Network Management Technology 729
Analysis-NefworkAnalyzers 732
Monitoring-NetworkBaseliningTools 736
Simulation-Network Modeling and Simulation Tools 736
Auditing-NetworkAuditingTools 737
Business Issues 739
Containment
Cost 740
Outsourcing 740
Flexibility 742
SummaryT43
Key Terms 743
Review Questions 744
)
Contents ffi.tl
Activities 745
Case Study 746
! Introduction 750
Business lmpact 750
Security Policy DeveloPmenl 751'
13
The Security Policy Development Life Cycle 751,
SecurityRequirementsAssessment 753
Some Definition and Feasibility Studies 754
Assets, Threats, Vulnerabilities, and Risks 756
Attack Strategies 760
Management Role and Responsibilities 762
Policy Development Process 763
Policy Implementation Process 764
Auditing 769
Virus ProtectionTTL
Virus Categories 772
AntivirusStrategies 773
AntivirusTechnology 775
Firewalls 777
FirewallArchitectures 778
Firewall Functionality and Technology Analysis 783
Authentication and Access Control 786
TokenAuthentication-SmartCards 787
BiometricAuthentication 788
Authorization 790
Kerberos 790
Encryption 792
DES-Private Key EncrYPtion 792
RSA-Public Key EncryPtion 793
Digital Signature EncrYPtion 793
Key Management Alternatives 795
Applied Security Scenarios 796
Overall Design Strategies 796
xxxlv Contents
GTOSSARY 819
INDEX 879