Atnaujinkite slapukų nuostatas

El. knyga: Cloud Computing Networking: Theory, Practice, and Development

(University of Houston-Victoria, Texas, USA)
  • Formatas: 527 pages
  • Išleidimo metai: 22-Sep-2015
  • Leidėjas: Apple Academic Press Inc.
  • Kalba: eng
  • ISBN-13: 9781482254822
Kitos knygos pagal šią temą:
  • Formatas: 527 pages
  • Išleidimo metai: 22-Sep-2015
  • Leidėjas: Apple Academic Press Inc.
  • Kalba: eng
  • ISBN-13: 9781482254822
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

Cloud computing is the most significant technology transformation since the introduction of the Internet in the early 1990s. As more and more companies and educational institutions plan to adopt a cloud-based IT infrastructure, today’s job market requires IT professionals who understand cloud computing and have hands-on experience developing cloud-based networks.Cloud Computing Networking: Theory, Practice, and Development covers the key networking and system administration concepts as well as the vital hands-on skills you need to master cloud technology.This book is designed to help you quickly get started in deploying cloud services for a real-world business. It provides detailed step-by-step instructions for creating a fully functioning cloud-based IT infrastructure using the Microsoft Azure cloud platform. In this environment, you can develop cloud services collaboratively or individually. The book enhances your hands-on skills through numerous lab activities. In these lab activities, you will learn toImplement the following services in a cloud environment: Active Directory, DHCP, DNS, and Certificate ServicesConfigure Windows Server so it can route IP trafficImplement IP Security Policy and Windows Firewall with Advanced Security toolsCreate a point-to-site connection between Microsoft Azure and a local computerCreate a site-to-site connection between Microsoft Azure and an on-premises networkDevelop a hybrid cloud that integrates Microsoft Azure with a private cloud created on a local networkCloud Computing Networking: Theory, Practice, and Development includes numerous examples, figures, and screen shots to help you understand the information. Each chapter concludes with a summary of the major topics and a set of review questions. With this book, you will soon have the critical knowledge and skills to develop and manage cloud-based networks.
Preface xi
Acknowledgments xvii
Author xix
Chapter 1 Overview On Cloud And Networking 1(34)
Objectives
1(1)
1.1 Introduction
1(1)
1.2 Networks
2(3)
1.3 Network Operating Systems
5(15)
1.3.1 Windows Server® 2012
5(2)
1.3.2 Microsoft Azure™
7(3)
1.3.3 VMware vCloud Suite
10(5)
1.3.4 Linux
15(5)
1.4 Network Architecture
20(5)
Activity 1.1: Preparing for Hands-On Activities
25(8)
Getting Started with Microsoft Azure™
25(8)
1.5 Summary
33(1)
Review Questions
33(2)
Chapter 2 Network Protocols 35(44)
Objectives
35(1)
2.1 Introduction
35(1)
2.2 Application Layer Protocols
35(4)
2.3 Transport Layer Protocols
39(7)
2.3.1 Transmission Control Protocol
40(5)
2.3.2 User Datagram Protocol
45(1)
2.4 Internet Layer Protocols
46(8)
2.4.1 Internet Protocol
46(3)
2.4.2 Internet Control Message Protocol
49(1)
2.4.3 Address Resolution Protocol
50(1)
2.4.4 IP Security
51(1)
2.4.5 Internet Routing Protocols
52(2)
2.5 Network Interface Layer Protocols
54(3)
2.6 Network Protocol Graph
57(1)
Activity 2.1: Exploring Windows Server® 2012
58(10)
Task 1: Exploring Windows Server® 2012 Operating System
58(2)
Task 2: Viewing Ethernet Properties
60(3)
Task 3: Viewing Available Roles and Features
63(5)
Task 4: Viewing Installed Roles and Features
68(1)
Activity 2.2: Viewing IP Configuration in the Command Prompt Window
68(3)
Activity 2.3: Viewing Protocols with Network Monitor
71(7)
Task 1: Installing Network Monitor
71(1)
Task 2: Viewing TCP and HTTP
72(2)
Task 3: Viewing ARP and ICMP
74(1)
Task 4: Viewing IP and UDP
75(3)
2.7 Summary
78(1)
Review Questions
78(1)
Chapter 3 Network Concepts And Design 79(46)
Objectives
79(1)
3.1 Introduction
79(1)
3.2 Network Types
79(18)
3.2.1 Local Area Network
80(4)
3.2.1.1 Ethernet
80(3)
3.2.1.2 Fibre Channel
83(1)
3.2.1.3 LAN Segment
83(1)
3.2.2 Wide Area Network
84(5)
3.2.2.1 WAN Technology
85(1)
3.2.2.2 Modulation
86(1)
3.2.2.3 Multiplexing
87(1)
3.2.2.4 WAN Network Media
88(1)
3.2.3 Internet
89(2)
3.2.4 Wireless Network
91(4)
3.2.4.1 Wi-Fi Technology
91(2)
3.2.4.2 WiMAX Technology
93(1)
3.2.4.3 Infrared
94(1)
3.2.4.4 Bluetooth
94(1)
3.2.5 Virtual Network
95(2)
3.3 IP Addressing
97(21)
3.3.1 Network Planning
97(2)
3.3.2 IP Addressing Strategy
99(1)
3.3.3 IP Addressing
99(9)
3.3.3.1 IPv4 IP Addressing
99(3)
3.3.3.2 Special IP Addresses
102(2)
3.3.3.3 Private and Public IP Addressing
104(1)
3.3.3.4 IPv6 IP Addressing
104(4)
3.3.4 Subnets
108(23)
3.3.4.1 Reasons for Using Subnets
108(1)
3.3.4.2 Subnet Masks
109(2)
3.3.4.3 Network Subnetting
111(6)
3.3.4.4 Classless Inter-Domain Routing
117(1)
Activity 3.1: Implementing Simple Network
118(4)
3.4 Summary
122(1)
Review Questions
122(3)
Chapter 4 Network Directory Services 125(36)
Objectives
125(1)
4.1 Introduction
125(1)
4.2 Active Directory® Logical Structure
126(5)
4.3 Active Directory® Design
131(7)
4.3.1 Requirement Analysis
131(1)
4.3.2 Structure Specification
132(6)
4.4 Active Directory® Implementation
138(1)
4.5 Active Directory® Deployment
139(1)
Activity 4.1: Active Directory® Domain Services
140(19)
Task 1: Installing Active Directory® Domain Services on servera
140(3)
Task 2: Joining serverb to Active Directory® Domain
143(8)
Task 3: Configuring serverb as a Replica Domain Controller
151(2)
Task 4: Creating and Viewing Active Directory® Objects
153(6)
4.6 Summary
159(1)
Review Questions
159(2)
Chapter 5 Dynamic Host Service And Name Service 161(42)
Objectives
161(1)
5.1 Introduction
161(1)
5.2 Dynamic Host Configuration Protocol
161(6)
5.2.1 Dynamic IP Address Assignment Process
162(3)
5.2.2 DHCP Configuration
165(2)
5.3 Domain Name System
167(15)
5.3.1 Naming Hierarchy
168(1)
5.3.2 DNS Server Hierarchy
169(1)
5.3.3 Name Resolution Process
170(1)
5.3.4 DNS Zones
171(3)
5.3.5 Types of DNS Records
174(1)
5.3.6 Stub Zone
174(1)
5.3.7 Dynamic DNS
174(1)
5.3.8 DNS Server Management
175(4)
5.3.9 DNS Security
179(3)
Activity 5.1: Network Services
182(18)
Task 1: DNS Service Development
182(10)
Task 2: DHCP Service Development
192(8)
5.4 Summary
200(1)
Review Questions
200(3)
Chapter 6 Networking With Windows Powershell® 203(40)
Objectives
203(1)
6.1 Introduction
203(1)
6.2 Windows PowerShell®
204(10)
6.2.1 Cmdlets
204(3)
6.2.2 PowerShell Functions
207(4)
6.2.3 Windows PowerShell® Scripts
211(2)
6.2.4 Native Commands
213(1)
6.3 Networking with PowerShell
214(8)
Activity 6.1: Networking with Windows PowerShell®
222(12)
Task 1: Basic Networking with PowerShell
222(2)
Task 2: DNS Management with PowerShell
224(5)
Task 3: Managing Active Directory® with PowerShell
229(5)
6.4 Microsoft Azure™ PowerShell
234(1)
Activity 6.2: Using Microsoft Azure™ PowerShell
235(5)
Task 1: Preparing Microsoft Azure™ PowerShell
235(1)
Task 2: Managing Microsoft Azure™ with Microsoft Azure™ PowerShell
235(5)
6.5 Summary
240(1)
Review Questions
241(2)
Chapter 7 Internet Data Transaction Protection 243(48)
Objectives
243(1)
7.1 Introduction
243(1)
7.2 Secure Sockets Layer
243(6)
7.2.1 Confidentiality
244(2)
7.2.1.1 Symmetric Encryption
245(1)
7.2.1.2 Asymmetric Encryption
245(1)
7.2.2 Integrity
246(1)
7.2.2.1 Hash Encryption
246(1)
7.2.3 Nonrepudiation
247(2)
7.2.4 Authentication
249(1)
7.3 Certificate Services
249(2)
7.4 Enabling SSL
251(1)
7.5 Certificates on Microsoft Azure™
252(1)
7.5.1 Management Certificate (.CER)
252(1)
7.5.2 Service Certificate (.PFX)
252(1)
7.5.3 SSH Keys
253(1)
Activity 7.1: Certificate Services
253(36)
Task 1: Installing and Configuring CA
254(7)
Task 2: Certificate Management with CA
261(13)
Task 3: Creating SSL Certificate for Web Server
274(9)
Task 4: Repairing Certificate
283(6)
7.6 Summary
289(1)
Review Questions
290(1)
Chapter 8 Internet Protocol Security 291(40)
Objectives
291(1)
8.1 Introduction
291(1)
8.2 TCP/IP-Related Security Issues
291(2)
8.3 IP Security
293(4)
8.3.1 Tunnel Mode
293(1)
8.3.2 Transport Mode
294(3)
8.4 Creating and Using IP Security (IPSec)
297(7)
8.4.1 IP Security Policy
298(2)
8.4.2 Windows Firewall with Advanced Security
300(4)
Activity 8.1: IPSec Implementation with IP Security Policy
304(15)
Activity 8.2: IPSec Implementation with Windows Firewall with Advanced Security
319(10)
8.5 Summary
329(1)
Review Questions
330(1)
Chapter 9 Routing And Remote Access Service 331(48)
Objectives
331(1)
9.1 Introduction
331(1)
9.2 Routing
332(17)
9.2.1 Connecting Network Segments to Router
332(2)
9.2.2 Routing Table
334(1)
9.2.3 Routing across Networks
335(2)
9.2.3.1 Identifying Next Hop Router
335(2)
9.2.3.2 Dynamically Adjusting Payload Size
337(1)
9.2.4 Updating Routing Table
337(2)
9.2.5 Routing Calculation
339(10)
9.2.5.1 Link State Routing Algorithm
340(3)
9.2.5.2 Distance Vector Routing Algorithm
343(6)
9.3 Network Address Translation
349(4)
9.3.1 NAT Technology
350(3)
9.3.2 NAT Applications
353(1)
9.4 Routing and Remote Access Service
353(6)
Activity 9.1: Routing
359(13)
Task 1: Checking on Network Interface Cards
360(2)
Task 2: Installing RRAS
362(4)
Task 3: Installing and Using RIP
366(6)
Activity 9.2: NAT
372(4)
9.5 Summary
376(1)
Review Questions
377(2)
Chapter 10 Virtual Private Network 379(40)
Objectives
379(1)
10.1 Introduction
379(1)
10.2 Virtual Private Network Architecture
379(2)
10.3 VPN Tunneling
381(5)
10.3.1 Internet Protocol Security VPN
381(2)
10.3.2 Secure Sockets Layer VPN
383(1)
10.3.3 Point-to-Point Tunneling Protocol VPN
383(2)
10.3.4 VPN Tunneling Type
385(1)
10.4 VPN Security
386(4)
10.4.1 VPN Authentication
386(3)
10.4.1.1 Windows Authentication
386(2)
10.4.1.2 Remote Authentication Dial-In User Service
388(1)
10.4.2 VPN Encryption
389(1)
10.5 Remote Accessing on Microsoft Azure™
390(1)
Activity 10.1: Point-to-Site Connection between Local Computer and Microsoft Azure™
391(13)
Task 1: Creating Virtual Network
393(1)
Task 2: Preparing VPN Gateway
393(2)
Task 3: Creating and Uploading Certificates
395(6)
Task 4: Downloading and Installing VPN Package
401(3)
Activity 10.2: Site-to-Site Connection between Microsoft Azure™ and On-Premises Network
404(13)
10.6 Summary
417(1)
Review Questions
417(2)
Chapter 11 Hybrid Cloud 419(70)
Objectives
419(1)
11.1 Introduction
419(2)
11.2 Hybrid Cloud Solution
421(1)
11.3 Hybrid Cloud Technology
422(5)
11.3.1 Hybrid Cloud Management Strategies
422(1)
11.3.2 Hybrid Cloud Management Platform
423(1)
11.3.3 Virtualization Technology
424(3)
11.4 System Center Virtual Machine Manager
427(10)
11.4.1 SCVMM Installation Consideration
427(1)
11.4.2 Creating Private Cloud
428(9)
Activity 11.1: Developing Hybrid Cloud with System Center 2012 R2
437(49)
Task 1: Installing and Configuring Windows Server® 2012 R2
437(1)
Task 2: Installing and Configuring Server Roles
438(5)
Task 3: Installing and Configuring Software
443(14)
Part 1: Installing and Configuring SQL Server 2012
443(3)
Part 2: Installing and Configuring Windows Assessment and Deployment Kit (Windows ADK) for Windows 8.1
446(1)
Part 3: Installing and Configuring System Center R2 Virtual Machine Manager (SCVMM) for Windows 8.1
447(4)
Part 4: System Center R2 App Controller
451(6)
Task 4: Private Cloud Development
457(17)
Part 1: Adding ISO File
457(1)
Part 2: Preparing Fabric
458(4)
Part 3: Creating Private Cloud
462(1)
Part 4: Creating VM Template
463(3)
Part 5: Creating Virtual Machines
466(5)
Part 6: App Controller Connection
471(3)
Task 5: Hybrid Cloud Development
474(12)
Part 1: Connecting Private Cloud to Public Cloud
475(8)
Part 2: Creating Virtual Machine on Hybrid Cloud
483(3)
11.5 Summary
486(1)
Review Questions
487(2)
Bibliography 489(4)
Index 493
Dr. Lee Chao is currently a professor of the Science, Technology, Engineering, and Mathematics division at the University of Houston, Victoria, Texas. He received his PhD from the University of Wyoming, Laramie, Wyoming. He has been teaching IT courses for over 20 years. His current research interests are database system development and cloud computing. He is also the author of more than a dozen research articles and books in various areas of IT.