Book 16

IP Address Management

by Timothy Rooney and Michael Dooley

Published 18 October 2010

Rediscover fundamental and advanced topics in IPAM, DNS, DHCP and other core networking technologies with this updated one-stop reference

The thoroughly revised second edition of IP Address Management is the definitive reference for working with core IP management technologies, like address allocation, assignment, and network navigation via DNS. Accomplished professionals and authors Timothy Rooney and Michael Dooley offer readers coverage of recent IPAM developments in the world of cloud computing, Internet of Things (IoT), and security, as well as a comprehensive treatment of foundational concepts in IPAM.

The new edition addresses the way that IPAM needs and methods have evolved since the publication of the first edition. The book covers the impact of mainstream use of private and public cloud services, the maturation of IPv6 implementations, new DNS security approaches, and the proliferation of IoT devices. The authors have also reorganized the flow of the book, with much of the technical reference material appearing at the end and making for a smoother and simpler reading experience.

The 2nd edition of IP Address Management also covers topics like such as:

  • Discussions about the fundamentals of Internet Protocol Address Management (IPAM), including IP addressing, address allocation and assignment, DHCP, and DNS
  • An examination of IPAM practices, including core processes and tasks, deployment strategies, IPAM security best-practices, and DNS security approaches
  • A treatment of IPAM in the modern context, including how to adapt to cloud computing, the Internet of Things, IPv6, and new trends in IPAM
  • A one-stop reference for IPAM topics, including IP addressing, DHCP, DNS, IPv6, and DNS security

Perfect for IP network engineers and managers, network planners, network architects, and security engineers, the second edition of IP Address Management also belongs on the bookshelves of senior undergraduate and graduate students studying in networking, information technology, and computer security-related courses and programs.


Book 18

A step-by-step guide to managing critical technologies of today's converged services IP networks Effective IP Address Management (IPAM) has become crucial to maintaining high-performing IP services such as data, video, and voice over IP. This book provides a concise introduction to the three core IPAM networking technologies-IPv4 and IPv6 addressing, Dynamic Host Configuration Protocol (DHCP), and Domain Name System (DNS)-as well as IPAM practice and techniques needed to manage them cohesively. The book begins with a basic overview of IP networking, including a discussion of protocol layering, addressing, and routing. After a review of the IPAM technologies, the book introduces the major components, motivation, benefits, and basic approaches of IPAM.
Emphasizing the necessity of a disciplined "network management" approach to IPAM, the subsequent chapters enable you to: * Understand IPAM practices, including managing your IP address inventory and tracking of address transactions (such as allocation and splitting address space, discovering network occupancy, and managing faults and performance) * Weigh the costs and justifications for properly implementing an IPAM strategy * Use various approaches to automating IPAM functions through workflow * Learn about IPv4-IPv6 co-existence technologies and approaches * Assess security issues with DHCP network access control approaches and DNS vulnerabilities and mitigation including DNSSEC * Evaluate the business case for IPAM, which includes derivation of the business case cost basis, identification of savings when using an IP address management system, associated costs, and finally net results Introduction to IP Address Management concludes with a business case example, providing a real-world financial perspective of the costs and benefits of implementing an IP address management solution.
No other book covers all these subjects cohesively from a network management perspective, which makes this volume imperative for manager-level networking professionals who need a broad understanding of both the technical and business aspects of IPAM. In addition, technologists interested in IP networking and address management will find this book valuable. To obtain a free copy of the IPAM Configuration Guide please send an email to: ieeeproposals@wiley.com

Book 22

With the announcement in 2011 that the current Internet Protocol (IP), IPv4, has nearly run out, interest in IPv6 -- the latest IP version -- has grown substantially. This book describes IPv6 technology and its repercussions on organizations, including strategies and techniques for assessing the impact of deploying IPv6 on a network, discovering current IP assets, assessing network readiness, creating a plan to deploy IPv6 while retaining IPv4 connectivity, and for managing a dual protocol IPv4-IPv6 network. It is a must read for IP network engineers, managers, and those who work in IT.

An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies

DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors-noted experts on the topic-offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented.

Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC). In addition, the text includes discussions on security applications facility by DNS, such as anti-spam, SPF, DANE and related CERT/SSHFP records. This important resource:

  • Presents security approaches for the various types of DNS deployments by role (e.g., recursive vs. authoritative)
  • Discusses DNS resolvers including host access protections, DHCP configurations and DNS recursive server IPs
  • Examines DNS data collection, data analytics, and detection strategies

With cyber attacks ever on the rise worldwide, DNS Security Management offers network engineers a much-needed resource that provides a clear understanding of the threats to networks in order to mitigate the risks and assess the strategies to defend against threats.