Cisco Networking Simplified, Second Edition

Paperback
from $0.00

Author: Jim Doherty

ISBN-10: 1587201992

ISBN-13: 9781587201998

Category: General & Miscellaneous Networking & Telecommunications

Cisco Networking Simplified\ Second Edition\ \ Master today’s world of Cisco networking with this book’s completely updated, fully illustrated visual approach\ Easy enough for novices, substantive enough for networking professionals\ Covers the latest networking topics—from network architecture to secure wireless, unified communications to telepresence\ \ In Full Color\ Jim Doherty • Neil Anderson • Paul Della Maggiora\ Now 100 percent updated for the latest technologies, this is today’s...

Search in google:

Cisco Networking SimplifiedSecond Edition Master today’s world of Cisco networking with this book’s completely updated, fully illustrated visual approach Easy enough for novices, substantive enough for networking professionals Covers the latest networking topics—from network architecture to secure wireless, unified communications to telepresenceIn Full ColorJim Doherty • Neil Anderson • Paul Della MaggioraNow 100 percent updated for the latest technologies, this is today’s easiest, most visual guide to Cisco® networking. Even if you’ve never set up or managed a network, Cisco Networking Simplified, Second Edition, helps you quickly master the concepts you need to understand. Its full-color diagrams and clear explanations give you the big picture: how each important networking technology works, what it can do for you, and how they all fit together. The authors illuminate networking from the smallest LANs to the largest enterprise infrastructures, offering practical introductions to key issues ranging from security to availability, mobility to virtualization.What you always wanted to know about networking but were afraid to ask! How networks and the Internet work How to build coherent, cost-effective network infrastructures How to design networks for maximum reliability and availability What you need to know about data center and application networking How to secure networks against today’s threats and attacks How to take advantage of the latest mobility technologies How virtualizing networks can help businesses leverage their network investments even further How to combine messaging, calendaring, telephony, audio, video, and web conferencing into a unified communications architectureThis book is part of the Networking Technology Series from Cisco Press®, the only authorized publisher for Cisco®.Category: CiscoCovers: General Networking

IntroductionPart I: Networking FundamentalsHow Computers CommunicateThe OSI ModelOpen Versus Proprietary SystemsSeven LayersAt-a-Glance: OSI ModelInternet Infrastructure: How It All ConnectsTCP/IP and IP AddressingComputers Speaking the Same LanguageWhat Is an Address?Dynamically Allocated IP AddressesDomain Names and Relationship to IP AddressesMatching Domain Names to IP AddressesAt-a-Glance: TCP/IPAt-a-Glance: IP AddressingAt-a-Glance: IPv6NAT and PATInternet ApplicationsThe Internet and Its ApplicationsE-MailWeb BrowsingE-MailPeer-to-Peer SharingPart II: Networking InfrastructureEthernetHistory of EthernetWhat Is Ethernet?Evolution of EthernetAt-a-Glance: EthernetReducing Collisions on EthernetLAN SwitchingFast Computers Need Faster NetworksSwitching Basics: It’s a BridgeSwitching EthernetsSwitches Take Over the WorldAt-a-Glance: SwitchingSpanning TreeNetwork LoopsSometimes, the Earth Is FlatPreventing Network LoopsSpanning-Tree FundamentalsAt-a-Glance: Spanning TreeRoutingRoutersRouters Talk Among Themselves to Find RoutesRouters Route PacketsRouters Bridge and Switches RouteAt-a-Glance: RoutingRouting and SwitchingPart III: Network DesignCampus Networks and Hierarchical DesignBuilding Networks for Ease of UseAt-a-Glance: Hierarchical Campus DesignWAN Network DesignMoving Traffic Across the Street and the WorldWAN ServicesIntegrated Services Digital NetworkFrame RelayATMMPLSBroadbandVirtual Private Networks (VPN)WAN DevicesAt-a-Glance: Frame RelayAt-a-Glance: Asynchronous Transfer Mode (ATM)Multiprotocol Label Switching (MPLS) ServicesAt-a-Glance: MPLSMPLS Traffic SeparationBroadband TechnologiesAlways-on AccessBroadband Technology EvolutionAt-a-Glance: ISDNAt-a-Glance: BroadbandVirtual Private NetworksSecure Networking Over the InternetAt-a-Glance: VPNsEstablishing a VPN ConnectionAt-a-Glance: EncryptionClient AuthenticationOptical TechnologiesLANs, WANs—and Now MANsSONET, DWDM, and DPTAt-a-Glance: Metro OpticalBranch Office Network DesignsDistributed WorkforceDistributed Office ChallengesAt-a-Glance: Branch Office DesignPart IV: Network AvailabilityHigh AvailabilityAt-a-Glance: High AvailabilityControl PlaneWhen Good Networks Go BadControl Plane ProtectionAt-a-Glance: Control Plane ProtectionQuality of Service and Network AvailabilityQuality of Service as Network Protection?Scavenger QoSAt-a-Glance: QoS for Network ResiliencyDisaster RecoveryWhat Happens When the Network Stops WorkingDR PlanningResiliency and Backup ServicesPreparedness TestingAt-a-Glance: Disaster Recovery: Business ContinuanceDisaster RecoveryNetwork ManagementKeeping the Network Alive from AfarNetwork Documentation: A Must-HaveNetwork-Management ProtocolsTroubleshooting ToolsAt-a-Glance: Network ManagementNetwork ManagementPart V: Securing the NetworkNetwork SecurityIdentityPerimeter SecurityData PrivacySecurity MonitoringPolicy EnforcementAt-a-Glance: Network SecurityAt-a-Glance: HackingDoS AttacksSnooping and SpoofingFirewallsProtecting the PerimeterGet Off the Net!Firewall for Your ProtectionPersonal FirewallsAt-a-Glance: Firewalls and IDSFirewalls and IDSAccess and Content SecurityIntrusion Prevention SystemsIntrusion Detection SystemsIntrusion Prevention SystemsThe Problem with False PositivesAt-a-Glance: Intrusion DetectionPort-Based SecurityCombating Access-Based AttacksAt-a-Glance: Port-Based SecurityIdentity-Based NetworkingNetwork Access ConundrumIdentity-Based Networking802.1xAt-a-Glance: IdentityAuthenticationNetwork Admission ControlCombating Virus OutbreaksAssessing Device “Health”Network Admission ControlAt-a-Glance: NACURL Filtering: Eliminating Unwanted Web Page AccessInternet Access and Liability IssuesEnforcing Corporate Internet Usage PoliciesAt-a-Glance: URL FilteringURL Filtering and FirewallsDeep Packet Inspection: Controlling Unwanted ApplicationsHow Do You Catch a Criminal When Everyone Wears a Mask?Deep Packet InspectionAt-a-Glance: Deep Packet InspectionPacket InspectionTelemetry: Identifying and Isolating Attack SourcesNormal or AbnormalUsing Telemetry to Combat AttacksAt-a-Glance: TelemetryPhysical Security: IP Video SurveillanceLocks on the DoorsVideo SurveillanceAt-a-Glance: Physical SecurityPhysical and Logical SecurityPart VI: Data Centers and Application NetworkingMoving Data EfficientlyData CentersStore Once, Use Oftenn-Tier ModelFunctions and RequirementsAt-a-Glance: Data CentersData Center Application: Corporate Expense SystemStorage Area NetworksEfficient Deployment of Critical DataFiber Channel and IPInfinibandAt-a-Glance: Storage NetworkingServer-Centric StorageCachingMoving Content Close to the UserHow Caching WorksCaching More Than Web PagesStorage Caching: From Disk to MemoryIssues Affecting CachingCachingWide Area File ServicesBranch Offices RuleCentralizing StorageEnter Wide Area File Services (WAFS)At-a-Glance: Wide Area File ServicesWide Area Application ServicesCentralizing ApplicationsEnter Wide Area Application Services (WAAS)At-a-Glance: Wide Area Application ServicesPart VII: Unified CommunicationsVoice over IPMaking Calls over the WebUnifying CommunicationsClient LayerInfrastructure LayerCall-Processing LayerApplication LayerDeployment ModelsAt-a-Glance: Voice over IPVoice over IPAt-a-Glance: Unified CommunicationsVoice over IP: Toll BypassQuality of ServiceConverged Networks and QoSWhat Is QoS?QoS and Unified CommunicationsAt-a-Glance: QoSHow Packets Are PrioritizedUnified Personal CommunicationsToo Many Communications, Too Little TimeUnify MeCisco Unified Personal Communicator (CUPC)At-a-Glance: Unified CommunicationsMeeting Collaboration SpacesMeetings, Meetings, MeetingsMeetings Are an Activity, Not a PlaceAt-a-Glance: Meeting CollaborationTraditional VideoconferencingI See YouVideo over IP NetworksAt-a-Glance: IP VideoconferencingVideoconferencingVideoconferencing Application E-LearningTelepresenceConferencing Gets SimpleVideo Killed the Radio StarThe Next-Best Thing to Being ThereAt-a-Glance: TelepresencePresence and Location-Aware ServicesI Sense a PresenceThe Importance of LocationAt-a-Glance: Presence and Location-Aware ServicesIP Call CenterWhy Can’t I Talk to a Real Person?Anatomy of a Contact CenterFrom the Caller to the Agent, and Back AgainManaging Caller and Contact Agent EfficiencyNew Methods for Customer InteractionAt-a-Glance: IP Contact CenterCall-Center Tech SupportCall-Center TelemarketingMulticast and IPTV BroadcastsWatching Movies Without Flooding the WorldAt-a-Glance: IP MulticastMulticastPart VIII: MobilityWireless WorldMobility and Wireless NetworksThrowing Away the Ties That BindAt-a-Glance: Wireless LANsWired LANsWireless LANsSelecting and Building Wireless NetworksDesigning a Wireless NetworkAt-a-Glance: Designing Wi-Fi NetworksSecuring Wireless NetworksLocking Down WirelessBalancing Security and AccessAt-a-Glance: Securing Wi-FiOutdoor and Municipal Wireless NetworksIt’s Just Like a Building, Only Way BiggerAt-a-Glance: Municipal Wi-FiVoIP over Wireless NetworksWireless VoIPAt-a-Glance: Wireless VoIPWireless VoIPWireless Guest AccessMi Casa Es Su CasaAt-a-Glance: Wireless Guest AccessRFID and Location-Based ServicesFinding Your StuffWireless LANS: They’re Not Just for Checking E-Mail on the Toilet Anymore!At-a-Glance: Location-Based ServicesWireless Location ServicesPart IX: Virtualized NetworksVirtualizing Data Centers Growth of the Data CenterData Center VirtualizationAt-a-Glance: Virtual Data CentersVirtualizing Network InfrastructureLeveraging Network InvestmentA Network Is a NetworkVirtualizing Network InfrastructureAt-a-Glance: Virtual Network InfrastructureApplications of Virtualized Networks What Can You Do with Virtualized Networks?Corporate Employee “Clean” and “Dirty” NetworksGuest and Partner NetworksIsolating Specialized Devices and ApplicationsLoad BalancingProviding Hosted Networks to Entities Within EntitiesDepartmental Virtual NetworksChallenges with Virtual NetworksAt-a-Glance: Virtualized Network ApplicationsEvolution of Virtual Networks1587201992 TOC 11/19/2007