Mastering Networks

Preface

Computer networks are a crucial part of many organisations and many users now even have a network connection in their own home. Without networks there would be no Electronic Mail, no Internet access and no Networked Applications. It is one of the fastest moving technologies areas and brings benefits to virtually every country in the world. With the interconnection of networks to the Internet, the world has truly become a Global Village. For many people, especially children, the first place to search for a given topic is the World Wide Web (WWW). Who would believe the pace of technology over ten short years, such as:

Author:
Dr W.Buchanan,
Napier University,
Edinburgh.

Downloads:
None yet

Code:
WinSock

From networks of tens of computers operating at speeds of a thousands of bits per second to networks with thousands of computers operating at billions of bits per second.

From organisations which passed paper documents back and forward, to totally paperless organisations.

From people who sent one letter each month to people who send tens of electronic mails every day?

From sending letters around the world which would take days or weeks to be arrive to the transmission of information around the world within a second

From businesses who relied on central operations to ones that can be distributed around the world, but can communicate as if they were next door.

From the transmission of message which could be viewed by people and organisation which were not meant to the read the message, to the transmission of messages can only be read by the intended destination (and maybe, space aliens).

From written signatures that can be easily forged, to digital signatures which are almost impossible to forge, and not only authenticate the sender but also all of the contents of a message.


The number of applications of networks increases by the day, they include:

Electronic Mail.

Video Conferencing.

Downloading Hardware Drivers.

Distributing Information.

Multimedia Education.

Remote Access.

Application Software Downloads.

Client/server Processing.

News Groups.

Product Information.

Remote Control/Transmission of Data.

Chat Programs.

Daily News Events.

Information Archives.

On-line Libraries.

Electronic Commerce.

Search Facilities.

WWW Surfing.

Sampling Material.

Centralised Configuration.

Centralised Software Licence Control.

Distributed/Centralised Printer/File Facilities.

Networked Peripherals.

Source Code Download.

Direct Access to Experts.

Special Interest Groups.

On-line Help.

Software Registration.

Distributed Databases.

Bulletin Boards.

Internet Telephone.

Archived/Off-line Conferencing.

Distributed Databases.

Digital TV/Hi-fi.

The amount of transmitted information over networks increases by a large factor every year (over the Internet, traffic doubles every 100 days), and the demand for bandwidth seems unlimited. Unfortunately there are many different types of networks, from low-speed single computer connections, to high-speed multiple computer networks. There are also many different types of computer systems, there are different protocols, and so on. It is an exciting area, but also a difficult area to keep up-to-date with. Thus, the main aim of this book is to cover many of the important networking areas, from net-working technologies to data encryption. It splits into ten main areas, these are:

Networking Technologies.
Network Topologies, Ethernet (including Fast and Gi-gabit Ethernet), Token Ring, FDDI, ATM, ISDN and Example MANs.

Networking Protocols.
TCP/IP, ICMP, DNS, ARP, Bootp, IP multicasting, UDP, WinSock, IP Version 6, SPX/IPX and HTTP.

Sockets.
C++/Java/Visual Basic implementation.

World Wide Web.
HTTP, Client/server architecture, Web browsers, Internet re-sources, URLs, URI, Web browser design, SSL, S-HTTP, Content advisor, Secu-rity zones, Microsoft Wallet and Profile assistant.

Network Security/Intranets.
Proxy servers, Firewalls, Filtering routers, Passwords, Extranets, Hacking methods, Hacker problems and Hardware security.

Data Encryption Principles.
Cryptography, Legal issues, Cracking the code, Message hash, Private-Key Encryption, Public-key Encryption, RSA, PGP, Sample PGP encryption.

Authentication.
Shared secret-key authentication, Diffie-Hellman key exchange, Key distribution centre, Digital signatures and PGP authentication.

Electronic Mail.
Architecture, Email addresses, SMTP, X.400 and MIME.

Viruses.
Virus types, Anti-virus programs, Trojan horses, Polymorphic viruses, Stealth viruses, Slow viruses, Retro viruses, Worms and Macro viruses.

Appendices.
Extensive Glossary and Abbreviations, HDLC and RFC listings.

Source code

Client-server code for Visual Basic.

Errata

Page

Description

11

'If data packets required to go out of a network then the transport layer routes them through interconnected networks' should be:

'If data packets required to go out of a network then the network layer routes them through interconnected networks'

Send comments

Please complete the following details:

Your name (Surname, First name):

E-mail:


Please add you comments:

 

Contacts

S.Tipple, Editor, Palgrave. E-mail: s.tipple@palgrave.com
W.Buchanan, Series Editor, Computing and IT. E-mail: w.buchanan@napier.ac.uk

RECOMMENDED READING AT AN AFFORDABLE PRICE!

 

Paperback - 496 pages (June 1999)
Palgrave, formerly Macmillan Press; ISBN: 0333748042