Book Image

Building Modern Networks

By : Steven Noble
Book Image

Building Modern Networks

By: Steven Noble

Overview of this book

<p>As IT infrastructures become more software-defined, networking operations tend to be more automated with falling levels of manual configuration at the hardware level. Building Modern Networks will brush up your knowledge on the modern networking concepts and help you apply them to your software-defined infrastructure.</p> <p>In this book you'll gain the knowledge necessary to evaluate, choose, and deploy a next generation network design. We will cover open and closed network operating systems (NOS) along with the protocols used to control them such as OpenFlow, Thrift, Opflex, and REST. You will also learn about traffic engineering and security concepts for NGNs. You will also find out how to fine-tune your network using QoS and QoE.</p> <p>By the end of the book, you'll be well versed in simplifying the way you design, build, operate, and troubleshoot your network.</p>
Table of Contents (20 chapters)
Title Page
Credits
About the Author
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface
2
Networking Hardware and Software
4
Using REST and Thrift APIs to Manage Switches
9
Where to Start When Building a Next Generation Network

Demilitarized/Demarcation Zone (DMZ)


A network DMZ is a location where network devices can be placed and accessed from the outside world directly. In most corporate networks, all of the internal systems are behind firewalls and filters. If there is a need to provide external access, a DMZ is created. The name DMZ comes from the concept of creating safe zones/areas where no military presence is allowed between countries or in contested areas. There is a demilitarized zone between North and South Vietnam, which also acts as the border. When we look at this from a networking perspective, DMZ is an area where there is less protection/monitoring, which is a similar idea.

DMZs are often used to host servers such as FTP, mail, and others that are likely to be compromised systems, such as DNS. A DMZ offers a secondary level of protection for your internal network by segregating dangerous traffic.

Design of a DMZ in concert with an internal network

Some companies, such as Cisco Systems, offer a DMZ...