Details

Systems and Network Infrastructure Integration


Systems and Network Infrastructure Integration

Design, Implementation, Safety and Supervision
1. Aufl.

von: Saida Helali

139,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 27.10.2020
ISBN/EAN: 9781119779940
Sprache: englisch
Anzahl Seiten: 208

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

IT infrastructures are now essential in all areas and sectors of human activity; they are the cornerstone of any information system. Thus, it is clear that the greatest of care must be given to their design, implementation, security and supervision in order to ensure optimum functionality and better performance. Within this context, Systems and Network Infrastructure Integration presents the methodological and theoretical principles necessary to successfully carry out an integration project for network and systems infrastructures. This book is aimed at anyone interested in the field of networks in general. In particular, it is intended for students of fields relating to networks and computer systems who are called upon to integrate their knowledge and skills, gained throughout their academic study, into a comprehensive project to set up a complete infrastructure, while respecting the necessary specifications.
<p>Preface ix</p> <p><b>Chapter 1. Introduction to Project Management </b><b>1</b></p> <p>1.1. Introduction 1</p> <p>1.2. Project management 2</p> <p>1.3. Project management methods and tools 3</p> <p>1.3.1. Gantt diagram 5</p> <p>1.3.2. RACI (Responsible, Accountable, Consulted, Informed) matrix 5</p> <p>1.3.3. The concept of specifications 6</p> <p>1.4. Chapter summary 8</p> <p><b>Chapter 2. Simulating Network Architectures with GNS3 </b><b>9</b></p> <p>2.1. Introduction 9</p> <p>2.2. Definition 10</p> <p>2.3. Introduction to GNS3 11</p> <p>2.3.1. Functionalities of GNS3 12</p> <p>2.3.2. Limitations 12</p> <p>2.3.3. GNS3 installation 12</p> <p>2.3.4. Getting started with GNS3 13</p> <p>2.4. Chapter summary 25</p> <p><b>Chapter 3. Green IT </b><b>27</b></p> <p>3.1. Introduction 27</p> <p>3.2. Introduction of concept 28</p> <p>3.3. Green IT trigger factors 29</p> <p>3.4. Benefits of Green IT 29</p> <p>3.5. The lifecycle of ICTs 30</p> <p>3.6. Mechanisms and technical solutions for the implementation of a Green IT infrastructure 31</p> <p>3.7. Green IT labels and standards 33</p> <p>3.8. Some examples of Eco-ICTs 34</p> <p>3.9. Chapter summary 36</p> <p><b>Chapter 4. Design of Network Infrastructures </b><b>37</b></p> <p>4.1. Introduction 37</p> <p>4.2. The founding principles of networks 38</p> <p>4.2.1. Definition and preliminaries 38</p> <p>4.2.2. Classification of digital data networks 39</p> <p>4.2.3. Components of a network 40</p> <p>4.2.4. Measuring network performance 45</p> <p>4.2.5. Concepts of collision domain/broadcast domain and VLANs 47</p> <p>4.3. Methods and models of IT network design 48</p> <p>4.3.1. Principles of structured engineering 48</p> <p>4.4. Assessment of needs and choice of equipment 54</p> <p>4.5. Chapter summary 56</p> <p><b>Chapter 5. Network Services </b><b>57</b></p> <p>5.1. Introduction 57</p> <p>5.2. DHCP service 58</p> <p>5.2.1. Introduction 58</p> <p>5.2.2. Operating principle 58</p> <p>5.2.3. Renewal of lease 62</p> <p>5.2.4. The concept of a DHCP relay 62</p> <p>5.3. DNS service 63</p> <p>5.3.1. Introduction 63</p> <p>5.3.2. Operating principle 63</p> <p>5.4. LDAP service 66</p> <p>5.4.1. Introduction 66</p> <p>5.4.2. LDAP protocol 67</p> <p>5.4.3. LDAP directory 68</p> <p>5.5. E-mail service 70</p> <p>5.5.1. Introduction 70</p> <p>5.5.2. Architecture and operating principle. 71</p> <p>5.5.3. Protocols involved 72</p> <p>5.6. Web server 73</p> <p>5.6.1. Introduction 73</p> <p>5.6.2. Operating principle 73</p> <p>5.6.3. The principle of virtual hosting 74</p> <p>5.7. FTP file transfer service 76</p> <p>5.7.1. Definition 76</p> <p>5.7.2. Operating principle 77</p> <p>5.7.3. Types 77</p> <p>5.8. Chapter summary 78</p> <p><b>Chapter 6. System and Network Security </b><b>79</b></p> <p>6.1. Introduction 79</p> <p>6.2. Definitions, challenges and basic concepts 80</p> <p>6.3. Threats/attacks 82</p> <p>6.3.1. Access attacks 82</p> <p>6.3.2. Modification attacks 83</p> <p>6.3.3. Saturation attacks 83</p> <p>6.3.4. Repudiation attacks 83</p> <p>6.4. Security mechanisms 83</p> <p>6.4.1. Encryption tools 84</p> <p>6.4.2. Antivirus programs 84</p> <p>6.4.3. Firewalls/IDS and IPS 84</p> <p>6.4.4. VPNs 86</p> <p>6.4.5. Other means of security 89</p> <p>6.5. Security management systems: norms and security policies 91</p> <p>6.5.1. Norms 91</p> <p>6.5.2. The idea of security policy 92</p> <p>6.6. Chapter summary 93</p> <p><b>Chapter 7. Virtualization and Cloud Computing </b><b>95</b></p> <p>7.1. Introduction 95</p> <p>7.2. Virtualization 96</p> <p>7.2.1. Definition 96</p> <p>7.2.2. Benefits of virtualization 96</p> <p>7.2.3. Areas of application 97</p> <p>7.2.4. Categories of virtualization 100</p> <p>7.2.5. Limits of virtualization 103</p> <p>7.3. Cloud computing 103</p> <p>7.3.1. Definitions 103</p> <p>7.3.2. Leverage factors and generic principles 104</p> <p>7.3.3. Architecture models 104</p> <p>7.3.4. Types of cloud 107</p> <p>7.3.5. Areas of application 109</p> <p>7.3.6. Advantages and limitations 110</p> <p>7.4. Chapter summary 111</p> <p><b>Chapter 8. Quality of Service and High Availability </b><b>113</b></p> <p>8.1. Introduction 113</p> <p>8.2. Quality of service 114</p> <p>8.2.1. Motivation 114</p> <p>8.2.2. Definition(s) 115</p> <p>8.2.3. Objectives of QoS 116</p> <p>8.2.4. Metrics of QoS 117</p> <p>8.2.5. General principles of QoS 118</p> <p>8.2.6. QoS mechanisms 120</p> <p>8.3. High availability 141</p> <p>8.3.1. Redundancy in the physical layer 143</p> <p>8.3.2. Redundancy in the data link layer 143</p> <p>8.3.3. Redundancy in the network layer 149</p> <p>8.3.4. Redundancy in the application layer 154</p> <p>8.4. Chapter summary 156</p> <p><b>Chapter 9. Monitoring Systems and Networks </b><b>157</b></p> <p>9.1. Introduction 157</p> <p>9.2. Main concepts of network and service supervision 158</p> <p>9.2.1. Definition 158</p> <p>9.2.2. Challenges of monitoring 158</p> <p>9.2.3. Typology 159</p> <p>9.3. Monitoring protocols 161</p> <p>9.3.1. SNMP protocol (Simple Network Management Protocol) 161</p> <p>9.3.2. WMI (Windows Management Instrumentation) 164</p> <p>9.3.3. WS-Management (Web Services for Management) 164</p> <p>9.3.4. IPMI (Intelligent Platform Management Interface) 164</p> <p>9.3.5. NetFlow/IPFIX 165</p> <p>9.3.6. Netconf 165</p> <p>9.4. Monitoring tools 165</p> <p>9.4.1. Commercial monitoring solutions (HP OpenView, Tivoli) and software publisher solutions 166</p> <p>9.4.2. Free monitoring solutions 167</p> <p>9.5. Chapter summary 171</p> <p>References 173</p> <p>Index 179</p>
<p><b>Saida Helali</b> is a university lecturer in Information Technology (specializing in networks and information systems) at the Institut Supérieur des Etudes Technologiques de Radès (Tunisia). He holds an ACREDITE master's degree (Analysis, Conception and Research in the Domain of Educational Technology Engineering), which was jointly awarded by the Université de Cergy-Pontoise (France), the Université de MONS (Belgium) and the Université de Genève (Switzerland). In 2017, he was chair of the Tunisian branch of the IEEE Education Society and he is also an acting member of AIPU TUNISIE, an international association about university pedagogy.</p>

Diese Produkte könnten Sie auch interessieren:

Schreiben in technischen Berufen
Schreiben in technischen Berufen
von: Monika Weissgerber
PDF ebook
25,99 €
Skype For Dummies
Skype For Dummies
von: Loren Abdulezer, Susan Abdulezer, Howard Dammond, Niklas Zennstrom
PDF ebook
19,99 €