Book Image

Building Modern Networks

By : Steven Noble
Book Image

Building Modern Networks

By: Steven Noble

Overview of this book

<p>As IT infrastructures become more software-defined, networking operations tend to be more automated with falling levels of manual configuration at the hardware level. Building Modern Networks will brush up your knowledge on the modern networking concepts and help you apply them to your software-defined infrastructure.</p> <p>In this book you'll gain the knowledge necessary to evaluate, choose, and deploy a next generation network design. We will cover open and closed network operating systems (NOS) along with the protocols used to control them such as OpenFlow, Thrift, Opflex, and REST. You will also learn about traffic engineering and security concepts for NGNs. You will also find out how to fine-tune your network using QoS and QoE.</p> <p>By the end of the book, you'll be well versed in simplifying the way you design, build, operate, and troubleshoot your network.</p>
Table of Contents (20 chapters)
Title Page
Credits
About the Author
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface
2
Networking Hardware and Software
4
Using REST and Thrift APIs to Manage Switches
9
Where to Start When Building a Next Generation Network

The evolution of security on the internet


The first rule of security is that you need to treat all devices on your network as if they are compromised and may be used against you. The second rule of security is to refer to the first rule. I say this not because security is impossible but more to point out that when securing a network, you need to separate or create segments/VLANs for the devices on the network to provide security against each other. This segmentation protects the network from an attacker connecting directly to an open port and having access to secure devices.

Right now, in mid-2017, the security issue all over the news is Ransomware, where computer files are encrypted or hidden from their owners displaying a screen on the computer stating this and that the user is to send money to the kidnapper. Before Ransomware, and continuing today, a big issue has been Distributed Denial of Service (DDoS) attacks, where thousands of compromised systems send traffic to a single destination...