Details

Systems and Network Infrastructure Integration


Systems and Network Infrastructure Integration

Design, Implementation, Safety and Supervision
1. Aufl.

von: Saida Helali

126,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 27.10.2020
ISBN/EAN: 9781119779940
Sprache: englisch
Anzahl Seiten: 208

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p>Preface ix</p> <p><b>Chapter 1. Introduction to Project Management </b><b>1</b></p> <p>1.1. Introduction 1</p> <p>1.2. Project management 2</p> <p>1.3. Project management methods and tools 3</p> <p>1.3.1. Gantt diagram 5</p> <p>1.3.2. RACI (Responsible, Accountable, Consulted, Informed) matrix 5</p> <p>1.3.3. The concept of specifications 6</p> <p>1.4. Chapter summary 8</p> <p><b>Chapter 2. Simulating Network Architectures with GNS3 </b><b>9</b></p> <p>2.1. Introduction 9</p> <p>2.2. Definition 10</p> <p>2.3. Introduction to GNS3 11</p> <p>2.3.1. Functionalities of GNS3 12</p> <p>2.3.2. Limitations 12</p> <p>2.3.3. GNS3 installation 12</p> <p>2.3.4. Getting started with GNS3 13</p> <p>2.4. Chapter summary 25</p> <p><b>Chapter 3. Green IT </b><b>27</b></p> <p>3.1. Introduction 27</p> <p>3.2. Introduction of concept 28</p> <p>3.3. Green IT trigger factors 29</p> <p>3.4. Benefits of Green IT 29</p> <p>3.5. The lifecycle of ICTs 30</p> <p>3.6. Mechanisms and technical solutions for the implementation of a Green IT infrastructure 31</p> <p>3.7. Green IT labels and standards 33</p> <p>3.8. Some examples of Eco-ICTs 34</p> <p>3.9. Chapter summary 36</p> <p><b>Chapter 4. Design of Network Infrastructures </b><b>37</b></p> <p>4.1. Introduction 37</p> <p>4.2. The founding principles of networks 38</p> <p>4.2.1. Definition and preliminaries 38</p> <p>4.2.2. Classification of digital data networks 39</p> <p>4.2.3. Components of a network 40</p> <p>4.2.4. Measuring network performance 45</p> <p>4.2.5. Concepts of collision domain/broadcast domain and VLANs 47</p> <p>4.3. Methods and models of IT network design 48</p> <p>4.3.1. Principles of structured engineering 48</p> <p>4.4. Assessment of needs and choice of equipment 54</p> <p>4.5. Chapter summary 56</p> <p><b>Chapter 5. Network Services </b><b>57</b></p> <p>5.1. Introduction 57</p> <p>5.2. DHCP service 58</p> <p>5.2.1. Introduction 58</p> <p>5.2.2. Operating principle 58</p> <p>5.2.3. Renewal of lease 62</p> <p>5.2.4. The concept of a DHCP relay 62</p> <p>5.3. DNS service 63</p> <p>5.3.1. Introduction 63</p> <p>5.3.2. Operating principle 63</p> <p>5.4. LDAP service 66</p> <p>5.4.1. Introduction 66</p> <p>5.4.2. LDAP protocol 67</p> <p>5.4.3. LDAP directory 68</p> <p>5.5. E-mail service 70</p> <p>5.5.1. Introduction 70</p> <p>5.5.2. Architecture and operating principle. 71</p> <p>5.5.3. Protocols involved 72</p> <p>5.6. Web server 73</p> <p>5.6.1. Introduction 73</p> <p>5.6.2. Operating principle 73</p> <p>5.6.3. The principle of virtual hosting 74</p> <p>5.7. FTP file transfer service 76</p> <p>5.7.1. Definition 76</p> <p>5.7.2. Operating principle 77</p> <p>5.7.3. Types 77</p> <p>5.8. Chapter summary 78</p> <p><b>Chapter 6. System and Network Security </b><b>79</b></p> <p>6.1. Introduction 79</p> <p>6.2. Definitions, challenges and basic concepts 80</p> <p>6.3. Threats/attacks 82</p> <p>6.3.1. Access attacks 82</p> <p>6.3.2. Modification attacks 83</p> <p>6.3.3. Saturation attacks 83</p> <p>6.3.4. Repudiation attacks 83</p> <p>6.4. Security mechanisms 83</p> <p>6.4.1. Encryption tools 84</p> <p>6.4.2. Antivirus programs 84</p> <p>6.4.3. Firewalls/IDS and IPS 84</p> <p>6.4.4. VPNs 86</p> <p>6.4.5. Other means of security 89</p> <p>6.5. Security management systems: norms and security policies 91</p> <p>6.5.1. Norms 91</p> <p>6.5.2. The idea of security policy 92</p> <p>6.6. Chapter summary 93</p> <p><b>Chapter 7. Virtualization and Cloud Computing </b><b>95</b></p> <p>7.1. Introduction 95</p> <p>7.2. Virtualization 96</p> <p>7.2.1. Definition 96</p> <p>7.2.2. Benefits of virtualization 96</p> <p>7.2.3. Areas of application 97</p> <p>7.2.4. Categories of virtualization 100</p> <p>7.2.5. Limits of virtualization 103</p> <p>7.3. Cloud computing 103</p> <p>7.3.1. Definitions 103</p> <p>7.3.2. Leverage factors and generic principles 104</p> <p>7.3.3. Architecture models 104</p> <p>7.3.4. Types of cloud 107</p> <p>7.3.5. Areas of application 109</p> <p>7.3.6. Advantages and limitations 110</p> <p>7.4. Chapter summary 111</p> <p><b>Chapter 8. Quality of Service and High Availability </b><b>113</b></p> <p>8.1. Introduction 113</p> <p>8.2. Quality of service 114</p> <p>8.2.1. Motivation 114</p> <p>8.2.2. Definition(s) 115</p> <p>8.2.3. Objectives of QoS 116</p> <p>8.2.4. Metrics of QoS 117</p> <p>8.2.5. General principles of QoS 118</p> <p>8.2.6. QoS mechanisms 120</p> <p>8.3. High availability 141</p> <p>8.3.1. Redundancy in the physical layer 143</p> <p>8.3.2. Redundancy in the data link layer 143</p> <p>8.3.3. Redundancy in the network layer 149</p> <p>8.3.4. Redundancy in the application layer 154</p> <p>8.4. Chapter summary 156</p> <p><b>Chapter 9. Monitoring Systems and Networks </b><b>157</b></p> <p>9.1. Introduction 157</p> <p>9.2. Main concepts of network and service supervision 158</p> <p>9.2.1. Definition 158</p> <p>9.2.2. Challenges of monitoring 158</p> <p>9.2.3. Typology 159</p> <p>9.3. Monitoring protocols 161</p> <p>9.3.1. SNMP protocol (Simple Network Management Protocol) 161</p> <p>9.3.2. WMI (Windows Management Instrumentation) 164</p> <p>9.3.3. WS-Management (Web Services for Management) 164</p> <p>9.3.4. IPMI (Intelligent Platform Management Interface) 164</p> <p>9.3.5. NetFlow/IPFIX 165</p> <p>9.3.6. Netconf 165</p> <p>9.4. Monitoring tools 165</p> <p>9.4.1. Commercial monitoring solutions (HP OpenView, Tivoli) and software publisher solutions 166</p> <p>9.4.2. Free monitoring solutions 167</p> <p>9.5. Chapter summary 171</p> <p>References 173</p> <p>Index 179</p>

Diese Produkte könnten Sie auch interessieren:

Schreiben in technischen Berufen
Schreiben in technischen Berufen
von: Monika Weissgerber
PDF ebook
25,99 €
Skype For Dummies
Skype For Dummies
von: Loren Abdulezer, Susan Abdulezer, Howard Dammond, Niklas Zennstrom
PDF ebook
19,99 €