Sunteți pe pagina 1din 31

it

z
CL-- !-
6e.-

ü*

E-
rw
w
3e.,srÉP!

RKS
4
t
F
I
,,

i"

JAMES E. GOTDMAI\
PHIILIP T. RA\rytES
Purdue Unioersity .,

,,,,
nf\-q ft-fT.JAA.,li
f., sr -Í- \, LJ (,} $'¡ -l_

tr_

@
John Wiley & Sons, Inc.
NewYork . Chichester . Weinheim' Brisbane . Singapore 'Toronto
ACQUISITIO\S EDITOR Beth Lang Golub
ASSISTANT EDITOR Samantha Alducin
MARKETING IVÍA\ACER Jessica Garcra
SENIOR PRODUCTIO\ EDITOR Patncia \,lcFadden
DESIGN DIRECTOR lvladeh-n Lesure
ILLUSTRATOR Curtis A. Snyder
PRODUCTION MANACEMENT Hermitage Publishing Services

This book was set in 10/12 Palatino by Hermitage Publishing Services and printed and bound
by R. R. Donnellel. & Sons. The cover was printed by Phoenix Color.

This book is printed on acid-free paper. @

Cop¡rright 20000 John Wiiey & Sons, Inc. All rights reserved.

No part of this publication may be reproduced, stored in a retrievai system or transmitted in


any form or by any means, electronic, mechanical, photocopying, recording, scanning or
otherwise, except as permiited under Sections 107 or 108 oÍ t]ne 1.976 United States Copyright
Act, without either the prior written permission of the Publisher, or authorization through
payment of the appropriate per-copy fee to the Copyright Clearance Center,222 Rosewood
i)rir.e, Danvers ,MA07923, (978) 750-8400, fax (978) 750-4470. Requests to the Pubiisher for
permission should be addressed to the Permissions Department, John Wiley & Sons, inc., 605
Third Avenue, New York, NY 10158-0012 , (212) 850-6011', fax (272) 850-6008, E-Mai1:
PERMREQ@WILEY.COM. To order books please call 1(800)-225-5945.

ISBN 0-471-33047-7

Printed in the United States of America

10987654
lames E. Goldmnn: To Susan, Eric, nnd Grant

Phillip T. Rautles: To Cheri


Pnnrrcn

!X THE NEED FOR THIS BOOK

The field of information systems has undergone a major paradigm shift


from mainframe-oriented, hierarchical information systems architectures
to distributed, LAN-based client-server information systems architectures.
However, this transition is far from complete as information systems archi-
tectures continue to evolve to include seamless integration with world
wide web and Internet technologies, as well as more transparent interoper-
ability with legacy or mainframe systems. Today's resultant information
systems architecture is comprised of a complicated artay of interacting
technologies combining elements of client-server, web-based, Internet,
intranet, legacy applications, and database management systems. How-
ever, the Local Area Network is the key building block to all of these inter-
acting technologies.
Designing, implementing, and managing Local Area Networks require
sophisticated business-oriented analysis, design, and problem-solving skills.
Furthermore, the collaborative computing and multimedia applications that
are likely to be executed on these information systems are highly dependent
on properly designed networks for successful delivery of interactive content.
The interdependency of application and network development for success-
ful deployment of distributed information systems is all too often over-
looked by information systems professionals.
In order to effectively design today's highly integrated, distributed local
area networks, a comprehensive systems engineering approach that incorpo-
rates business analysis, application development, database systems integra-
tion, distributed network design, and structured technology analysis is
required. Such a business-first, technology-last, top-down model was intro-
duced in Applied Data Communications: A Business-Oriented Approach bv
james E. Goldman of Purdue University.
Analyzing and designing Local Area Networks was introduced in the
first edition of Locol Area Networks. Unlike many of the currently available
books and texts on Local Area Networks that seem to be either too broadlr'
focused and conceptual or too narrowly focused and technical, this teri
struck a balance between the two extremes while offering the reader a
structured approach to local area network analysis and design from nii:¿-
business considerations through final technology choices.
\¡1 F:e::. ¡¿

\E$ TO THI SECOND II}ITION


any
i,.,e authors have tried to improve upon the first edition without losing
of the previously mentioneá positive attributes of that text. Among the
changei to be found in the second edition are the following:

More emphasis on organizing the entire text according to the OSI 7


layer model
All new case studies in every chapter'
Created a dedicated LAN protocoi chapter (Chapter 4) before going
into network operating tytt"to specifics in Chapters 5 through 8
Increased the technical depth as well as breadth of coverage through-
out the text
Added a dedicated chapter on Network Design using TCP/IP
(Chapter 12)
Expanded coverage of network security architecture design (Chapter
i6)
Created a ne'¡,¡ chapter on Middleware (Chapter 9)
Backgrottnd chapters on client and server hardware and software
ha'eieen included on a supplementary CD. These chapters are from
Client Sercet Inforrnntio,L StJslenrs' A Busittess Oriented Appronch (1999,
John Wiley & Sons)

DF]SCRIPTION

A Bttsiness-oriented Approach, second Edition provides a


Locnl Aren I'Jetruorks:
thorough explanation of the analysis, design, integration, and technology
choices"invoived with deploying effective local area networks and Internet-
rr-orks.
The text is flexibly organized to cater to a variety of course__orientations.
Tl..e qer-Leral organization ut a t"y features of the text will be as follows:

Tl-re tert is divided into four major sections to maximize flexible use
l.r' a rvide variety of course orientations:
P.rrt 1: Local Area Network Infrastructure
P¡.rt l: Local Area Network Software
Part l: Local Area Network Connectivity
Part Local Area Netrt'ork Administration
-1:

There are sixteen chapters of manageable length that allow


tors to pick and choose chapters as appropriate for course
focus, length, and intended audience.

.l l

t,
'rll
,l l
tt,
,l

'.l]
Mace YN

o It is written in a logical, problem-solving style applauded by boür


students and faculty from academia and industry.
The text material is organized into overall architecture or models. By
providing students with the "big picture" htst, the text assists stu-
dents in understanding how particular individual topics relate to
other topics and to the overall scheme of things.
The text stresses analytical questioning and problem solving skills as
being key to successful design of client-server information systems.
The text provides working models into which students can organize
their problem solving approach. These models are reinforced and
used throughout the text. Examples include:
Top Down Model
TCP/IP Model
OSI Model
Business cases reprinted from professional periodicals are included
in each chapter. Questions guide students toward development of
analytical skills and business-oriented client-server information sys-
tems design capabilities.
The text equips students with real world skills. In a fashion similar to
Professor Goldman's previous texts, Local Aren Networks: A Business-
Oriented Approach teaihes students how to do LAN design rather
than merely read about it.

ffi APPROACH

The text follows the top down model used in Professor Goldman's previous
textbooks, examining the many options, standards, interfaces, implications,
advantages, and disadvantages in each of the top down model's five layers:
Business
Application
Data
Network
Technology
Concept roadmaps are located throughout the text stressing the relationship
between chapters and to an overall LAN architecture, as well as between top
ics within chapters. Each chapter begins with an outline of new concepts into
duced, previous concepts reinforced, and the learning objectives for that
chapter. Section and paragraph headings help students to organize and iderr
tify key concepts introduced in each chapter. End of chapter material indudes:
chapter summaries, key term listings, abundant review questions, as weill as
activities and problems for active student learning. As previously mentiure4
YIII Mce
close of each
business cases from professional periodicals are reprinted_at the
or used
chapter with associat"a ullutytlt questions to be answered by students
diagrams
as ti-re basis for classroom discusiion. A liberal use of clear, concise
adds to the usability of the text and the understanding of the students.

W* TARGBTAUDIENCES/COURSDS

could
Due to the modular nature of this text, a variety of audiences/courses
text the
be well served. Among the courses as potential adoptees of this
are
following:

¡ An introductory level course on local area networks. The practical


nature of the táxt would make this book appealing as well as its
broad coverage and architectural orientation' Advanced sections of
the text could be easiiY avoided.
. A junior level course on LAN design and implementation in either a
leéture only or lab/lecture format. such a course would be part of a
concentration in data communications and networking or telecom-
munications.
. As client/server information systems have taken on strategic impor-
tance to businesses, and local area networks are no longer
just
departmentalcomputingsolutions,thetextmayalsohaveappealin
thóse M.B.A. progiu-, offering a concentration in M.I.S. The man-
agerialp"''p".ti,'"sectionsandbusinesscaseswouldhaveparticu-
lar appeal to this potential audience'

ffi SPECIATFBATURES

Although some of these features have been mentioned previously, they are
repeateá here to stress the unique nature of this text as a Purveyor of practi-
ca^l, business-oriented local areá network analysis skills
and problem solving
abilities rather than a mere collection of concepts and facts.

. A modular approach allows flexible use of text to fit instructor and


course needs.
. Real business case studies stressing the business impact of
client/server architectures integrated with web, Internet, and legacy
application technologies assist itudents in sharpening their analysis
aná problem solvini skills. Directed questions accompanying each
case itimulate classroom discussion as well'
P¡eface tLx

"InSharperFocus"sectionshightightmoredetailed'more
advancedl or background information for concepts int¡oduced
within a chapter. These sections can be included or excluded at the
instructor's discretion.
"Managerial Perspective" sections take a "bottom-line" approach to
client sérver information systems analysis and design' The potenüal
impactofmanagementdecisionsinavariety-ofsituationsarehigh-
ligirted in these sections which may be of particular interest to
M.B.A. audiences.
Applied Problem Solving sections of chapters focusing on the use of
uriJtyti.ut models for Applied Problem Solving activities are high-
lighied for the benefit of both instructors and students' By stressing
pioblem solving activities, students can be assured of learning how
io dolocalarea network analysis and design'
Emphasizing the practical nature of the text, instances of practical
advice or wirningi are highlighted in order to call the reader's atten-
tion to important but often overlooked information'
. The osl (open systems Interconnection) Model is used throughout
the text u, án ut álytis tool for student problem solving and design
opportunities.

ffi SUPPTEMENTS

answers to
The CD-bas ed. Instructor's Resource Guide will contain thorough
uu ,".ri"* questions featured at the end of each chapter in the
text. In addi-
tion, solutións to case study questions will be provided. An abundant
selec-
for
tionof additional questioná in a variety of formats will be provided each
Finally, all illustrations in PowerPotntgT format will be provided on
thebD in ordér to expedite the production of transparencies and class notes
"r.rupt"t.
F to accompanY the text'
F

of
Ey
sis
¡ih
-

AnOUT THE AUTHORS

JAMES E. GOTDIIMN

]ames E. Goldman is currently Professor of Computer


Information systems
and Assistant Department Head for Telecommunications and Networking in
the nationally prominent Department of Computer Technology at Purdue
IJniversity. An áward winning teacher, Professor Goldman is the only faculty
member it-r th" hittoty of the School of Technology to win all three school-level
teaching awards: Thé james G. Dwyer Outstanding Teacher Award, the School
of Techáology outstanding Non-Tenured Faculty Award, and the school of
Technology Íenured Faculty Award, as well as the Purdue University Charles
B. Murphy Award for Outstanding Undergraduate Teaching'
Prófessor Goldman is the author of Applied Datn Communications: ABusi-
ness oriented Approach (third edition under development), a first-of-its-kind
text that took a process-oriented, business-first, problem-solving approach
to data co*-rroi"utions education. This text has been adopted around the
world at all levels of higher and professional educational institutions.
Client/Seraer Information Syitems: ABusiness Oriented Approachwas published
in 1998 with fellow Purdue professors Phil Rawles and Julie Mariga. Profes-
sor Goldman is Executive Vice President of Dynamic Systems
provider to Fortune 100 global cor-
(zuww.dssg.coru), a technology solutions
porations, and is a MCSE (Microsoft Certified Systems Engineer)'

PHIttP T. RAWTES

Phillip T. Rawles is an Assistant Professor of Computer Information Systems


and Technology at Purdue University in West Lafayetfe,Indiana. Professor
Rawles'primáiy areas of interest are network systems administration, enter-
prise neiwork management, and network simulation and optimization. In
ih."" ,u*"rters at Purdue, Professor Rawles has developed or significantly
re-developed courses in local area netwolking, systems administration, and
enterprise network management.
Professor Rawles is a contributing author to High-Performance Netuork-
ing l-lnlenshed (7997, SAMS, IN.) and is co-author of Client/Seraer Informntion
Sistems: A Business Oriented Approach (1999 , John Wiley & Sons, NY) Profes-
sór Rawles maintains an active consulting practice, is a MCSE (Microsoft
Certified systems Engineer), and holds Master of Technology and Bachelor
of Compuier Integraied Manufacturing Technology degrees from Purdue
University.

n
)

ACKNOWTEDGMEI\TS

We are indebted to a number of people whose efforts were crucial in the


development of this book.
Foi the outstanding quality illustrations which appeal in the book as
well as for his unwavering support, we'd like to thank Curt Snyder, our
wonderful and talented illustrator.
For their collaborative efforts in turning a manuscript into a professional
published book, we'd like to thank the following professionals at ]ohn Wiley
-&
Sonr, Beth Golub, Acquisitions Editor, Samantha Alducin, Assistant
Editor, Madelyn Lesure, Design Director, Patricia McFadden, senior Produc-
tion Editor, and the Staff at Hermitage Publishing Services.

Reviewers

A special debt of gratitude is owed to the professionals who were kind


enolgh to review the manuscript of this book prior to publication. It is
through your effort that an accurate text of high quality can be produced.

Russell Albright, City University, WA


Ray ]. Blankenship, Marshal University
Gregory B. Brewster, DePaul University
Gerald C. Canfield, University of Maryland, Baltimore County
Lauren Eder, Rider UniversitY
Coomaraswamy Gopinath, Suffolk Community College
Thomas Gorecki, Charles County Community College
Russell ]ones, Arkansas State University
Robert E. Morris, DeVry Institute of Technology, GA
Sharon W. Tabor, Boise State University
jeffrey M. Whitmer, Indiana University

nu
CONTENTS

I PART1 tOCAt AREA NETWORK INFRASTRUCTURE

CHAPTER 1 tOCAt AREA NETWORKS: A BUSINESS PBRSPECTNT

\ /hat Is A Local Area Network 3


How Is A Locai Area Network Implemented
4

Networking Hardware 6
Networking Software 7
Networking Media 8
\A/hy Are Local Area Networks Implemented?
1-0

Business Needs-The Underlying Motivation


10

Strategic Role of Local Area Networks


11
Area Networks 11
Key Business-Driven Characteristics of Local
The Importance of Effective LAN Analysis
and Design 12

Challenges and Solutions to Effective LAN


Analysis' Design' and Imple-
mentation 72
Gains'
Challenge: Information Technology Investment vs' Productivity
--Urrr.rtírrg
Implemented TechnJlogy Meets Business Needs 12

Solution: The ToP-Down APProach 13

The Top-Down Model 14


Challenge:AnalysisofComplexLANConnectivityandCompatibility
Issues 1'6

Introduction to Protocols and Compatibility


L6

Solution: The OSI Model 17


Solution: The Internet Suite of Protocols Model
21

Solution: The I-P-O Modei 21'


Analysis and Design 22
Getting Started with Business-Oriented LAN
Business Activities Should Support Business
Needs 23
RoleoftheNetworkAnalystasaBusiness/Technology
IntermediarY 24

Business Analysis Questions Dig Deeper 24


xvl Contents

'1,,,:,1,'l Accurate and Complete Budgets Are a Must 29

The Logical Network Design 29

Summary 30
Key Terms 31
Review Questions 37
Activities 32
Case Study 33

CHAPTIR 2 LOCAT ARNA NETWORK ARCHITBCTURBS 3ó

Introduction 37
The OSI Model Revisited 37
Overall Structure and Characteristics 37
PhysicalLayer 38
Data-Link Layer 38
Sub-Lavers 39
Net*'ork Laver 39
Transport Layer 40
Session Layer 40
Presentation Layer 40
Application Layer 41'
Encapsulation,/De-encapsulation 47
The Local Area Network Architecture Model 43
AccessMethodology 44
Logical Topology 47
Physical Topology 47
NetworkArchitectures 48
Ethernet 48
IBEE 802.2 and Ethernet SNAP 57

Token Ring 55

Address Bit-Order Reversal 5B

i
.,,,::r,i:,,r.,, Token Ring and Timing 59
!*' -=..- t
iñ,
t\\
(\ && Token Ring or Bthernet? 60
i\
il
\\
F.
t.
Conter¡ts xtll

ARCNet 67

FDDI 61.
n*** FDDI's Future óB
ffi

High-SpeedNetworkArchitectures 68
100BaseT 68

$ia- fiming Issues and 100BaseT Network Diamefer 69

10OVG-AnyLAN 70

7'
ke* Cascading Hubs and the Round Robin Polling Scheme

IsochronousEthernet 73
High-Speed Token Ring-HSTR 75

Full Duplex Network Arehitectures 76

GigabitEthernet 77
Fibre Channel 78
LAN-basedATM 79
t& Network Architectures in a Nutshell 79

Summary 80
Key Terms 81
Review Questions 82
Activities 83
Case Study 84

o4
LOCAT AREA NETWORK HARD\ryARE o¿
CHAPTBR 3

lntroduction 88
The Local Area Network Technology Architecture 88
Implications of LAN Technology Choices 89
PC Hardware 89
Media-Sharing LAN Architectures vs. switched LAN Architectures 90

Advantages ofSwitched LAN Arehitectures 91


e$ffi

x.#
{ry
LAN Switeh Thaffie Analysis 93
Xviii Contenis

Implementation Scenarios for Switched LAN Architectures


Network Interface Cards 94
Functionality 94
Technology Analysis 96

Netrvork Interface Card TechnologlAnalvsis Grid 97

PCNICT{ Standards 103

Network Interface Card Trends 104


Netr,vork Interface Card Drivers 105
Role of Adapter Card Drivers 105
DriverAvailability 106
Multiprotocol Network Interface Card Drivers I07
NDIS 1()B

( )I)t 109

PCMCIA Drivers 110


Shared-Media LAN Wiring Centers I1I
Wiring Center Categories 7I2
Repeaters 774
Hubs f74
Stackable Hubs 115
MAUs i15
Enterprise Hubs 175
Hub Management 716

\\riring {-enters Technolog"l Anall'sis 119

LAN Su'itches 720


SwitchClassification 720
SrvitchTechnologl'lssues 122

IAN Slitch Technolop Anal"vsis 123

ATM for the LAN 725


LAN Media Alternatives 126
Not Twisted Pair 726
CLrnie:r:: tItL

Unshielded Twisted Pair 128

Beyond CAT 5 729

Common UTP Installation Nlistakes 130

STP-Shielded Twisted Pair 131

Coxial Cable 131


Fiber-OPtic Cable 132

LAN Encoding Schemes 134


ASCII 135
EBCDIC 135

Using ASCII and EBCDIC Tables 135

Encoding
Line 137

SummarY 138
Key Terms 139
Review Questions 140

Activities 141'
Cnse StudY 142

145
( TI{PTER 4 NETWORK tA}tsR COIIINIUNICATIONS PROTOCOTS

Tntroduction 746
Layer 3-The Network LaYer r46

Frames and Packets 1'46

Networks and Segments 746

Network LaYer Addressing L47


Routing 151

Layer 4-The TransPort LaYer 154

ConnectionlessorConnection-0riented? 156
Layer S-The Session LaYer L57
Layers r57
Layers 6 andT--The Presentation and Application
Local Area Network Protocols 158

rtii
)

Nehr-are(lP\ SPX)ProtocolSuite 158


\etrr-ork Lar-er Protocol-iPx 158
IP\ Linritations 161
Transport/SessionLayerProtocols 765
Upper-LayerProtocols 766
The Internet Suite of Protocols: Overall Architecture and
Functionality 168
OverallArchitecture 168
IPVersion 4 170

Improving \llndoxs Internet Access b¡' Reducing Fragmentation 183

IP Version 6 184
Transport Layer Protocols 787
Internet Support Protocols and Services 197

Lse of DHCP for Seners 192

AppleTalk 793
DDP 794
Transport Layer Protocols 795
Session Layer Protocols 196
Stand Alone Transport Layer Protocols I97
NeIBEUI (NBF) 197
Useof\etBEtl 198

DLC 19E
Nehvork Printers and DLC 199

WAN or Remote -\ccess Protocols 799


SLIP 799
PPP 2OO
MLPPP 201
Summary 203
Key Terms 204
Review Questions 205
Activities 206
Case Study 207
Contents TÜ]I

2ttq
r$ P{RT 2 tOCAt AREA NETWORK SOFTWARE

2t1
i H{PTER 5 I,OCAI AREA NETWORK OPERATING SYSTEMS

Introduction 212
Network Operating Systems Architectures 212
TraditionalDifferentiation:Peer-to-Peervs'Client/Server2l2
Current Differentiation: Client NOS vs' Server NOS
273

Client Network Operating System Functionality


217

Operating System Capabilities 218


Peer-to-PeerNetworkingCapabilities 222

ClientNetworkingCapabilities 224
::.' :, Client Netrvork 0perating System Technolog'v Analvsis 229

Server Network Operating System Functionality


23L

Changing Role of the Server Network Operating System


231'

DirectorY Services 232

233
..:,r,,,,t'' DirectoryServicesCommunication
APPlicationServices 234
Networking and Connectivity Services 236
Management and Administration Services 238
SecuritY 242

¡,,/" Server Network


gperating System Technology Analysis 244

246
NetworkOperatingSystemlnteroperability
SummarY 247
KeY Terms 248
Review Questions 248
Activities 249
Case StudY 250

251
f H\PTER 6 NO\TTI NBTWARB
Introduction 253

,'i llrliri:l
tl'
tr'ilii,

l
iili:tirl
i r,il,,
iirlr i

,l'l
'1.'
lli"'
'¡:
']
xxtl Contents

\etrrare 3 253
OverallArchitecture 255
Operating System Architecture and Characteristics 255
Management and Administration 256
CommunicationsProtocols 258
NetWare 4 259
OverallArchitecture 260
Operating System Architecture and Characteristics 262

Rin-g \Icmory: Protection 262

\ef\\are I SN'IP 263

Management and Administration 266

\DS Structure Design 270

CommunicationProtocols 272
Application Layer Services 274
5

F
Net!\Iare 276
Or-erallArchitecture 276
Operating System Architecture and Characteristics 278

NSS Disk Drirers 279

Management and Administration 280

LDAP Clients 282

CommunicationProtocols 283
The Fel'cr'\efilork Prolocols the Better 285

Appiication Layer Services 285


Netware WAN/Remote Access 287
NetWare Internet Access Server/NetWare Connect 288
BorderManager 290
NetWare Client Support 29I
DOS/Windor'r's3.11 297
Microsoft Windon s 9.x and Windows NT Workstation 293
;
\\'lrich Clienl Should Be Used: Nlicrosoft's or Novell's? 294
Apple Macintosh 294
Contents mn

295
MacintoshClientlnteroperabilif
295
NetWareServerlnteroperability
295
NetWare/Windowslnteroperability
296
NetWare/UNIXInteroperability
SummarY 297

Key Terms 298


299
Review Questions
Activities 300

CaseStudY 301

303
CHAPTER 7 wIND0ws NT (2ooo)
Introduction 304

Windows NT 4'0 304

OverallArchitecture 304
305
and Characteristics
Operating System Architecture
SMP Scatability 372
Multithreaded Kernels and

NT FATversus FAT32 314

NTFS 3T4

Recoverability 31'4
NTFS File System

"i;:r.'MasterFilelhbleDesignEnsuresFastAceessandReliability516
3L8
Management and Administration
320
DomainArchitectures
NT Security Model 323
Components of the Windows
325
CommunicationsProtocols
DHCP andWINS 329
333
InterProcessCommunication
APPlication LaYer Services
335

Windows 2000 (NT 5'0)


338
338
OverallArchitecture
and Characteristics 340
Operating System Architecture
\ Ianagement and Admrnistration J+-1

LD{P Clients 347

$Iigration to Active Directory 347

CommunicationProtocols 349
Application Layer Services 351
NAT WAN/Remote Access 351
Windows Serverlnteroperability 353
Windows/NetWarelnteroperability 354

Setting Gatewa.v Sen'ices for Net\lhre Rights and Permissions 355

Windows/UNIXlnteroperability 355
Summary 356
Key Terms 357
Review Questions 358
Activities 359
Case Study 360

CTI{PTER B UNN 363

Introduction 363
OverallArchitecture 365
UNIX Compatibility and Open Systems 365
Common UNIX Implementations 367
AIX 368
Digital UNIX 368
HP-UX 369
IRIX 369
Linus 369
Open Source Sofhvare 370

Solaris 371
Operating System Architecture and Characteristics 371
MultiprocessingKernel 372
System Programs 375
InterprocessCommunications 376
UNIX Filesystem 376
Contents

User Interfaces 378


Modularity, Portability, and Scalability 381

UNX Source Code Modifieation and Forward Compatibilin 381

Management and Administration 382

Root Password Management 383

Server Grouping and User Authentication 383


CommunicationProtocols 384
NFS-Network File System 384
UNX and NFS as a NOS Alternative 386

UNIX/PC Integration Beyond NFS 386


Application Layer Services 387
User Interaction 388
Filer Transfer Services 389
Management 390
Other Common Services 392
Summary 392
Key Terms 393
Review Questions 394
Activities 394
Cnse Study 395

CHAPTER 9 MIDDTEWARB 397

Introduction 397
The Need For Middleware 398
MiddlewareArchitecture 398
LogicalArchitecture 399
&
& Interfaees as Middleware Selection Criteria 400
d*m
PhysicalArchitecture 401'
Synchronousvs. Asynchronous Middleware Communication 403

MiddlewareCategorization 404
Application-BasedMiddlewareCategories 405
DatabaseMiddleware 405
1lit. SQL Standardization 406
xxvi Contents

0DBC Portability 41,0

Legacy Application Middleware 413


Web Middleware 413
Communications-BasedMiddlewareCategories 41'3

Remote Procedure Calls 473


'.tl-._,..
The Distributed Computing Environment (DCE) 413
A
"w&
ffi
RPC Analysis 418

Message-OrientedMiddleware 418
Message-OrientedMiddlewareAnalysis 424
ffi
Thansaetion Processing 426

TiansactionProcessingMonitors 425

".-:."" t!. Characteristics of Tfansaction Proeess Monitor Systems 428

cffi!. Tbansaction Proeess Monitor Analysis 429

Object-OrientedMiddleware 430
1:"-.',.
CORBA Services 434

Obiect Oriented Middleware Analysis 436

."¡ri--
'-:\:i' CORBA versus DCOM Teehnical Analysis 436

.8&
6#ó¿{
Middleware Seleetion 437

Summary 438
Key Terms 439
Review Questions 440
Case Study 441

CHAPTER 10 CTIENT/SERVBR APPTICATION DEITLOPMENT ANI)


NTNGERATION 444

Introduction 445
ApplicationDevelopmentEnvironments 445
Contents xxvlr

Low-LevelLanguages 445
High-LevelLanguages 446
Interpreters versus Compilers 447

Compiler Selection 441

&
C0B0t and the Year 2000 450

Visual BASIC Exeeution 454

458
DevelopmentEnüronmentSelection

The Need for CASE 460

,$,
PersPective 460
KeePing CASE in
461'
ApPlicationDePloYment
^ 46L
S"rrr", APPlication DePloYment
Processing 462
Transaction
Deploymenf 463
Client Application
Applieations 464
versus Sewer-Based
l.¡¡;, Client-Based Applications
..¡:
Distribution 465
Software
ai Requirements for Automatic

JavaScriPt 469

Configuration 474
Windows Terminal Ser"ver

Represent the End of the


PC? 475
Does Network Computing

t Computing 475
Netuork Impact of Network
Applications 475
Integration with Existing
Third-PartYSoftware 475
LegacYAPPlications 477
N[ainframes Aren't DeadYet 47P'

{{1 ,*.
SummarY 482
KeY Terms 482
xxviii Contents

Rer-ien' Questions 483


Activities 484
Case Study 485

CHAPTER 11 tOCAt AREA NETWORK APPTICATIONS SOFTIVARE 487

Introduction 488
LAN Software Architecture 488
GroupWare 489
E-Mail 497

.&& B-['lail is a Double-Edged Sword in Terms of Productiüh 492

Calendaring and Scheduling 499


Workflow 503

&
tirii!ii. Workflow 0nly Automates Existing Systems 506

Conferencing 509

*&. Issues in Real-Time Conferencing 574

Electronic Meeting Support 515


LAN Resource Management Software 517
MultiprotocolNetworkPrinting 517
Printer Management 520
Network Backup 521.

Network Backup Analysis 523

Network Faxing 524

Netu'ork Faxing Analysis 527

ElectronicSoftwareDistribution 529
License Metering Software 529
Asset Management Software 531
Summary 533
Key Terms 533
Review Questions 534
Activities 536
Case Studt¡ 536
Contents )o(lx

539
iie P.{RT 3 tOCAt AREA NETWORK CONNECTMTY

TCP/P 541
I ilPTER 12 NETWORK DESIGN USING

D.
Introduction 542
Classfull Addressing-A Brief Review 542

Address Classes 542


Network Design with Classfull IP Addressing 544
Subnet Masks 544
How Routers Use Classfull IP Address Information 549

Split Horizon, Poison Reverse, and Tfiggered Updates 555

Limitations of Classfull Addressing and Fixed Length subjet Masks


559
Classless Addressing and Variable Length Subnet Masks 560

Variable Length Subnet Masks 560


Classless Interdomain Routing 567
Address Allocation Using CIDR 562

Reducing Route Advertisements with CIDR 564

CIDR versus VLSM: Similarities and Differences 564


Network Design with Variable Length Subnet Masks 565
Recursive Division of a Network with VLSM 565

Route Aggregation with VLSM 565


Working with Variable Length Subnet Masks-subnet Design 568

Summary 571'
Key Terms 571,

Review Questions 571'

Activities 572
Case Study 573

T,OCAL ARAA NETWORK INTERNETWORKING


;lltl
I H{PTER 13

Introduction 577
InternetworkingDesign 577

..".}r Business Motivation and Internetworking Challenges 5t J


Contents

OveralllnternetworkingDesignStrategies 578
Bridging 580
Routing 582
Switching 585
Addressing 585
InternetworkingTechnology 586
Internetworking Technology and the OSI Model 586
Repeaters 588

''ii:::ri:,:-,, Technology Analysis 5BB

Bridges 590

"11:,.,:,¡ Technology Analysis 592

Routers 596

,.r;r,',, Routing Protocols 597

TechnologyAnalysis 599
Boundary Routers and Branch Office Routers 600
Virtual LANs 605

Thansmission Betrveen Layer 2 LAN Switches 606

Virtual IAN Realities-The Bottom line 610

ATM Switching on the LAN 674

ATM tAN Emulation Arehitecture 614

LAN-To-Mainframelnterworking 679
Micro-Mainframe Connectivity versus Peer-to-Peer Internetworking
619
Hierarchical Networks and Peer-to-Peer Communications Networks
619
ClassSNAArchitecture 620
Micro-MainframeConnectivity 621
TheSNAArchitecture 624
Challenges to SNA/LAN Integration 627
SNA/LAN Integration Solutions 627
Summary 633
Key Terms 634
Contents )oü1

Review Questions 635


Activities 635
Cnse Study 637

REMOTE ACCESS AND WIRETESS NETWORKING 639


I I{PTER 14

Introduction 640

Business Issues of Remote Access 640

The Hidden Costs of Telecommuting 642

Architectural Issues of Remote Access 642


Logical Design Issues 643

Token Authentication 649

Physical Design Issues 650


Remote Access TechnologY 652
F{ardware: Communications servers and Remote Access servers 652

Dialing-out the LAN 655

Frequency Hoppingversus Direct Sequence Spread Spectrum 659

Wireless LAN Standards: IBEE 802.11 and Mobile IP 667

Software 663
Management and Configuration of Remote Access Technology 673
,r:illl

..¡::,:l::r gptimizing Remote Node and Remote Control Software Performance 6?3

Network Services 674


Wireless WAN Services 674

''' .'' A Top-Dorm Approach to \\ireless WAN Sen'ices Analysis 675

Two-WaY Messaging 678


Analog Cellular 678
Digital Cellular/Personal Communications Services 679

The Future ofPCS 684

Summary 685
Key Terms 686
xxxii Contents

Revielv Questions 687


Activities 688
Case Study 689

W PART4 tOCAt ARBA NBTWORK ADMINISTR{TION 691

CHAPTER 15 LOCAT AREA NETWORK DI,{NAGEMENT 693

Introduction 694
Application and Database Management 695
DistributedApplicationManagement 695
EnterpriseDatabaseManagement 697
Client and Desktop Management 698
Desktop Management 698
ConfigurationManagement 703
Help Desks 704
Asset Management 705
Client/Server InfrastructureArchitecture 711
Consolidated Service Desk 713
Server Management and Systems Administration 775
Server Management 715
Enterprise NetworkManagement 718
Enterprise Network Management Architecture and Protocols 778
Enterprise Network Management Technology 729
Analysis-NefworkAnalyzers 732
Monitoring-NetworkBaseliningTools 736
Simulation-Network Modeling and Simulation Tools 736
Auditing-NetworkAuditingTools 737
Business Issues 739
Containment
Cost 740
Outsourcing 740
Flexibility 742
SummaryT43
Key Terms 743
Review Questions 744
)

Contents ffi.tl

Activities 745
Case Study 746

I H{PTIR 16 I,OCAL ARBA NETWORK SECURITY 749

! Introduction 750
Business lmpact 750
Security Policy DeveloPmenl 751'

13
The Security Policy Development Life Cycle 751,

SecurityRequirementsAssessment 753
Some Definition and Feasibility Studies 754
Assets, Threats, Vulnerabilities, and Risks 756
Attack Strategies 760
Management Role and Responsibilities 762
Policy Development Process 763
Policy Implementation Process 764
Auditing 769
Virus ProtectionTTL
Virus Categories 772
AntivirusStrategies 773
AntivirusTechnology 775
Firewalls 777
FirewallArchitectures 778
Firewall Functionality and Technology Analysis 783
Authentication and Access Control 786
TokenAuthentication-SmartCards 787
BiometricAuthentication 788
Authorization 790
Kerberos 790
Encryption 792
DES-Private Key EncrYPtion 792
RSA-Public Key EncryPtion 793
Digital Signature EncrYPtion 793
Key Management Alternatives 795
Applied Security Scenarios 796
Overall Design Strategies 796
xxxlv Contents

Integration with Information Systems and Application


Development 797
Remote Access SecuritY 798
PAP/CHAP 8OO
E-Mail, Web, and Internet/Intranet Security 801

Virtual Private Network Security 803


Enteprise Network SecuritY 805
Government Impact 806
Standards-MakingOrganizations 806
Encryption Export Policy and Key Recovery 808
Summary 810
Key Terms 811
Review Questions 812
Activities 814
Case Study 815

GTOSSARY 819

INDEX 879

S-ar putea să vă placă și