Cisco Networking Simplified Second Edition
- Master today's world of Cisco networking with this book's completely updated, fully illustrated visual approach
- Easy enough for novices, substantive enough for networking professionals
- Covers the latest networking topics-from network architecture to secure wireless, unified communications to telepresence
In Full Color
Jim Doherty . Neil Anderson . Paul Della Maggiora
Now 100 percent updated for the latest technologies, this is today's easiest, most visual guide to Cisco® networking. Even if you've never set up or managed a network, Cisco Networking Simplified, Second Edition, helps you quickly master the concepts you need to understand. Its full-color diagrams and clear explanations give you the big picture: how each important networking technology works, what it can do for you, and how they all fit together. The authors illuminate networking from the smallest LANs to the largest enterprise infrastructures, offering practical introductions to key issues ranging from security to availability, mobility to virtualization.
What you always wanted to know about networking but were afraid to ask!
- How networks and the Internet work
- How to build coherent, cost-effective network infrastructures
- How to design networks for maximum reliability and availability
- What you need to know about data center and application networking
- How to secure networks against today's threats and attacks
- How to take advantage of the latest mobility technologies
- How virtualizing networks can help businesses leverage their network investments even further
- How to combine messaging, calendaring, telephony, audio, video, and web conferencing into a unified communications architecture
This book is part of the Networking Technology Series from Cisco Press®, the only authorized publisher for Cisco®.
Category: Cisco
Covers: General Networking
Autorentext
Jim Doherty is the Chief Marketing Officer at CipherOptics. Before joining the CipherOptics team, he held leadership positions with Symbol Technologies and Cisco Systems. He has more than 16 years of technical marketing and engineering experience and has led various marketing campaigns for IP telephony, routing and switching solutions, and network security solutions. He is the coauthor of the Networking Simplifiedseries, published by Cisco Press. He is a former Marine Corps sergeant. He holds a B.S. in electrical engineering from North Carolina State University and an MBA from Duke University.
Neil Anderson is the Senior Manager of Technology Systems Engineering with Cisco Systems. He has more than 20 years of broad engineering experience, including public telephone systems, mobile phone systems, Internet, and home networking. At Cisco, his focus is on business networks in the areas of network architecture, wireless, security, unified communications, and emerging technologies. He is the coauthor of the Networking Simplified series, published by Cisco Press. He holds a B.S. in computer science.
Inhalt
Introduction
Part I: Networking Fundamentals
How Computers Communicate
The OSI Model
Open Versus Proprietary Systems
Seven Layers
At-a-Glance: OSI Model
Internet Infrastructure: How It All Connects
TCP/IP and IP Addressing
Computers Speaking the Same Language
What Is an Address?
Dynamically Allocated IP Addresses
Domain Names and Relationship to IP Addresses
Matching Domain Names to IP Addresses
At-a-Glance: TCP/IP
At-a-Glance: IP Addressing
At-a-Glance: IPv6
NAT and PAT
Internet Applications
The Internet and Its Applications
Web Browsing
Peer-to-Peer Sharing
Part II: Networking Infrastructure
Ethernet
History of Ethernet
What Is Ethernet?
Evolution of Ethernet
At-a-Glance: Ethernet
Reducing Collisions on Ethernet
LAN Switching
Fast Computers Need Faster Networks
Switching Basics: It's a Bridge
Switching Ethernets
Switches Take Over the World
At-a-Glance: Switching
Spanning Tree
Network Loops
Sometimes, the Earth Is Flat
Preventing Network Loops
Spanning-Tree Fundamentals
At-a-Glance: Spanning Tree
Routing
Routers
Routers Talk Among Themselves to Find Routes
Routers Route Packets
Routers Bridge and Switches Route
At-a-Glance: Routing
Routing and Switching
Part III: Network Design
Campus Networks and Hierarchical Design
Building Networks for Ease of Use
At-a-Glance: Hierarchical Campus Design
WAN Network Design
Moving Traffic Across the Street and the World
WAN Services
Integrated Services Digital Network
Frame Relay
ATM
MPLS
Broadband
Virtual Private Networks (VPN)
WAN Devices
At-a-Glance: Frame Relay
At-a-Glance: Asynchronous Transfer Mode (ATM)
Multiprotocol Label Switching (MPLS) Services
At-a-Glance: MPLS
MPLS Traffic Separation
Broadband Technologies
Always-on Access
Broadband Technology Evolution
At-a-Glance: ISDN
At-a-Glance: Broadband
Virtual Private Networks
Secure Networking Over the Internet
At-a-Glance: VPNs
Establishing a VPN Connection
At-a-Glance: Encryption
Client Authentication
Optical Technologies
LANs, WANs-and Now MANs
SONET, DWDM, and DPT
At-a-Glance: Metro Optical
Branch Office Network Designs
Distributed Workforce
Distributed Office Challenges
At-a-Glance: Branch Office Design
Part IV: Network Availability
High Availability
At-a-Glance: High Availability
Control Plane
When Good Networks Go Bad
Control Plane Protection
At-a-Glance: Control Plane Protection
Quality of Service and Network Availability
Quality of Service as Network Protection?
Scavenger QoS
At-a-Glance: QoS for Network Resiliency
Disaster Recovery
What Happens When the Network Stops Working
DR Planning
Resiliency and Backup Services
Preparedness Testing
At-a-Glance: Disaster Recovery: Business Continuance
Disaster Recovery
Network Management
Keeping the Network Alive from Afar
Network Documentation: A Must-Have
Network-Management Protocols
Troubleshooting Tools
At-a-Glance: Network Management
Network Management
Part V: Securing the Network
Network Security
Identity
Perimeter Security
Data Privacy
Security Monitoring
Policy Enforcement
At-a-Glance: Network Security
At-a-Glance: Hacking
DoS Attacks
Snooping and Spoofing
Firewalls
Protecting the Perimeter
Get Off the Net!
Firewall for Your Protection
Personal Firewalls
At-a-Glance: Firewalls and IDS
Firewalls and IDS
Access and Content Security
Intrusion Prevention Systems
Intrusion Detection Systems
Intrusion Prevention Systems
The Problem with False Positives
At-a-Glance: Intrusion Detection
Port-Based Security
Combating Access-Based Attacks
At-a-Glance: Port-Based Security
Identity-Base…