Here's how: The basic, introductory topics provide a firm foundation. The flow of the text guides students through the material. The basic, introductory topics provide a firm foundation: Security : Threats, the plan-protect-respond cycle for corporate security management, security planning, and protection-phase issues, such as authentication, firewalls, and cryptography.
Network Design and Management: Shows students how to analyze requirements and turn them into simple network designs. This chapter also covers quality of service goals and the management of temporary traffic peaks and permanent bottlenecks. Goes beyond the basic topology and switch operation to cover topics such as: link aggregation, the Rapid Spanning Tree Protocol, overprovisioning versus priority, switch purchasing considerations, and more Focuses on skills and issues likely to arise in job interviews and on the job: laying out an Ethernet LAN with 8.
Security : More information on security than previous editions Wireless : A strong focus on wireless, including the revolutionary Non-essential content has been eliminated. Even greater emphasis on security, in response to the growing importance of security in networking. General content updates: for example, Chapter 1 is more heavily cloud-focused with stronger business cloud content. Software defined networking, which was barely on the radar in the last edition, is demonstrating capabilities that could revolutionize network management in the future.
Chapter 3 length reduced , with security management moved to Chapter 4. Some nonessential content was removed from Chapter 4 to leave more room for security.
Chapter-by-chapter changes: Chapter 1 Welcome to the Cloud : Wireless, peer-to-peer applications, nodes, and a small home network are out. To give more focus. Standards agencies and architectures are there in simplified form. This chapter was rewritten to allow students to use websites to work with basic network management tools. This module has the material on creating a small home networks from Chapter 1 in the 9th edition.
Begins with the story of how Internet standards were and are created. The encoding of integers is better. Chapter 3 Network Security : Starts with the Target breach. It covers attacks and then defenses, as in the last edition. Security management is moved to Chapter 4. Advanced persistent threats are added, but static packet inspection is dropped. The deep packet inspection firewall section is retitled application-aware firewalls and content was changed appropriately.
Chapter 4 Network and Security Management : begins with management aspects of the Target breach. Network management is reduced. Application response time is out because it goes well beyond networking.
Topology is out as a general topic It is introduced in the context of specific standards. Hub and spoke are out. Centralized network management and visualization are improved by introducing basic concepts in software defined networking. More on SDN in Chapter Chapter 5 Ethernet Reduced optical fiber. Frame discussion is simplified to focus on important fields for Ethernet management.
Fiber is simplified, but OM standards are introduced. The chapter adds man-in-the-middle attacks with ARP poisoning. VLANs are out because network segmentation is done differently today, as discussed in Chapter Golden zone and the Shannon equation are dropped, although the bandwidth part of the Shannon equation is used.
Wi-Fi Direct moved to Chapter 7 with other short-distance standards. Evil twin improved with a little more detail. Denial-of-service attacks are out because these are now rare and difficult to do. In laying out access point circles, 10 m is used instead of 30 m. Decibels is reduced. UWB is out because it is being absorbed into other technologies.
Bluetooth is reduced somewhat. ICMP and dynamic routing protocols are moved to Chapter 9. Figure now shows only the IPv6 header. This is too complex a topic for introductory courses, and it is less important than often touted.
Author Doug Lowe also includes updated coverage of broadband technologies as well as storage and back-up procedures, all in his easy-to-follow style.
It starts with the basics of security and network design and management; goes beyond the basic topology and switch operation covering topics like VLANs, link aggregation, switch purchasing considerations, and more; and covers the latest in networking techniques, wireless networking, with an emphasis on security. With this text as a guide, readers learn the basic, introductory topics as a firm foundation; get sound training for the marketplace; see the latest advances in wireless networking; and learn the importance and ins and outs of security.
Teaching and Learning Experience This textbook will provide a better teaching and learning experience—for you and your students. Here's how:.
0コメント