Cisco Networking Simplified
Lieferbar innert 2 Wochen
BeschreibungCisco Networking Simplified Second Edition
- Master today's world of Cisco networking with this book's completely updated, fully illustrated visual approach
- Easy enough for novices, substantive enough for networking professionals
- Covers the latest networking topics-from network architecture to secure wireless, unified communications to telepresence
In Full Color
Jim Doherty . Neil Anderson . Paul Della Maggiora
Now 100 percent updated for the latest technologies, this is today's easiest, most visual guide to Cisco® networking. Even if you've never set up or managed a network, Cisco Networking Simplified, Second Edition, helps you quickly master the concepts you need to understand. Its full-color diagrams and clear explanations give you the big picture: how each important networking technology works, what it can do for you, and how they all fit together. The authors illuminate networking from the smallest LANs to the largest enterprise infrastructures, offering practical introductions to key issues ranging from security to availability, mobility to virtualization.
What you always wanted to know about networking but were afraid to ask!
- How networks and the Internet work
- How to build coherent, cost-effective network infrastructures
- How to design networks for maximum reliability and availability
- What you need to know about data center and application networking
- How to secure networks against today's threats and attacks
- How to take advantage of the latest mobility technologies
- How virtualizing networks can help businesses leverage their network investments even further
- How to combine messaging, calendaring, telephony, audio, video, and web conferencing into a unified communications architecture
This book is part of the Networking Technology Series from Cisco Press®, the only authorized publisher for Cisco®.
Covers: General Networking
InhaltsverzeichnisIntroduction Part I: Networking Fundamentals How Computers Communicate The OSI Model Open Versus Proprietary Systems Seven Layers At-a-Glance: OSI Model Internet Infrastructure: How It All Connects TCP/IP and IP Addressing Computers Speaking the Same Language What Is an Address? Dynamically Allocated IP Addresses Domain Names and Relationship to IP Addresses Matching Domain Names to IP Addresses At-a-Glance: TCP/IP At-a-Glance: IP Addressing At-a-Glance: IPv6 NAT and PAT Internet Applications The Internet and Its Applications E-Mail Web Browsing E-Mail Peer-to-Peer Sharing Part II: Networking Infrastructure Ethernet History of Ethernet What Is Ethernet? Evolution of Ethernet At-a-Glance: Ethernet Reducing Collisions on Ethernet LAN Switching Fast Computers Need Faster Networks Switching Basics: It's a Bridge Switching Ethernets Switches Take Over the World At-a-Glance: Switching Spanning Tree Network Loops Sometimes, the Earth Is Flat Preventing Network Loops Spanning-Tree Fundamentals At-a-Glance: Spanning Tree Routing Routers Routers Talk Among Themselves to Find Routes Routers Route Packets Routers Bridge and Switches Route At-a-Glance: Routing Routing and Switching Part III: Network Design Campus Networks and Hierarchical Design Building Networks for Ease of Use At-a-Glance: Hierarchical Campus Design WAN Network Design Moving Traffic Across the Street and the World WAN Services Integrated Services Digital Network Frame Relay ATM MPLS Broadband Virtual Private Networks (VPN) WAN Devices At-a-Glance: Frame Relay At-a-Glance: Asynchronous Transfer Mode (ATM) Multiprotocol Label Switching (MPLS) Services At-a-Glance: MPLS MPLS Traffic Separation Broadband Technologies Always-on Access Broadband Technology Evolution At-a-Glance: ISDN At-a-Glance: Broadband Virtual Private Networks Secure Networking Over the Internet At-a-Glance: VPNs Establishing a VPN Connection At-a-Glance: Encryption Client Authentication Optical Technologies LANs, WANs-and Now MANs SONET, DWDM, and DPT At-a-Glance: Metro Optical Branch Office Network Designs Distributed Workforce Distributed Office Challenges At-a-Glance: Branch Office Design Part IV: Network Availability High Availability At-a-Glance: High Availability Control Plane When Good Networks Go Bad Control Plane Protection At-a-Glance: Control Plane Protection Quality of Service and Network Availability Quality of Service as Network Protection? Scavenger QoS At-a-Glance: QoS for Network Resiliency Disaster Recovery What Happens When the Network Stops Working DR Planning Resiliency and Backup Services Preparedness Testing At-a-Glance: Disaster Recovery: Business Continuance Disaster Recovery Network Management Keeping the Network Alive from Afar Network Documentation: A Must-Have Network-Management Protocols Troubleshooting Tools At-a-Glance: Network Management Network Management Part V: Securing the Network Network Security Identity Perimeter Security Data Privacy Security Monitoring Policy Enforcement At-a-Glance: Network Security At-a-Glance: Hacking DoS Attacks Snooping and Spoofing Firewalls Protecting the Perimeter Get Off the Net! Firewall for Your Protection Personal Firewalls At-a-Glance: Firewalls and IDS Firewalls and IDS Access and Content Security Intrusion Prevention Systems Intrusion Detection Systems Intrusion Prevention Systems The Problem with False Positives At-a-Glance: Intrusion Detection Port-Based Security Combating Access-Based Attacks At-a-Glance: Port-Based Security Identity-Based Networking Network Access Conundrum Identity-Based Networking 802.1x At-a-Glance: Identity Authentication Network Admission Control Combating Virus Outbreaks Assessing Device "Health" Network Admission Control At-a-Glance: NAC URL Filtering: Eliminating Unwanted Web Page Access Internet Access and Liability Issues Enforcing Corporate Internet Usage Policies At-a-Glance: URL Filtering URL Filtering and Firewalls Deep Packet Inspection: Controlling Unwanted Applications How Do You Catch a Criminal When Everyone Wears a Mask? Deep Packet Inspection At-a-Glance: Deep Packet Inspection Packet Inspection Telemetry: Identifying and Isolating Attack Sources Normal or Abnormal Using Telemetry to Combat Attacks At-a-Glance: Telemetry Physical Security: IP Video Surveillance Locks on the Doors Video Surveillance At-a-Glance: Physical Security Physical and Logical Security Part VI: Data Centers and Application Networking Moving Data Efficiently Data Centers Store Once, Use Often n-Tier Model Functions and Requirements At-a-Glance: Data Centers Data Center Application: Corporate Expense System Storage Area Networks Efficient Deployment of Critical Data Fiber Channel and IP Infiniband At-a-Glance: Storage Networking Server-Centric Storage Caching Moving Content Close to the User How Caching Works Caching More Than Web Pages Storage Caching: From Disk to Memory Issues Affecting Caching Caching Wide Area File Services Branch Offices Rule Centralizing Storage Enter Wide Area File Services (WAFS) At-a-Glance: Wide Area File Services Wide Area Application Services Centralizing Applications Enter Wide Area Application Services (WAAS) At-a-Glance: Wide Area Application Services Part VII: Unified Communications Voice over IP Making Calls over the Web Unifying Communications Client Layer Infrastructure Layer Call-Processing Layer Application Layer Deployment Models At-a-Glance: Voice over IP Voice over IP At-a-Glance: Unified Communications Voice over IP: Toll Bypass Quality of Service Converged Networks and QoS What Is QoS? QoS and Unified Communications At-a-Glance: QoS How Packets Are Prioritized Unified Personal Communications Too Many Communications, Too Little Time Unify Me Cisco Unified Personal Communicator (CUPC) At-a-Glance: Unified Communications Meeting Collaboration Spaces Meetings, Meetings, Meetings Meetings Are an Activity, Not a Place At-a-Glance: Meeting Collaboration Traditional Videoconferencing I See You Video over IP Networks At-a-Glance: IP Videoconferencing Videoconferencing Videoconferencing Application E-Learning Telepresence Conferencing Gets Simple Video Killed the Radio Star The Next-Best Thing to Being There At-a-Glance: Telepresence Presence and Location-Aware Services I Sense a Presence The Importance of Location At-a-Glance: Presence and Location-Aware Services IP Call Center Why Can't I Talk to a Real Person? Anatomy of a Contact Center From the Caller to the Agent, and Back Again Managing Caller and Contact Agent Efficiency New Methods for Customer Interaction At-a-Glance: IP Contact Center Call-Center Tech Support Call-Center Telemarketing Multicast and IPTV Broadcasts Watching Movies Without Flooding the World At-a-Glance: IP Multicast Multicast Part VIII: Mobility Wireless World Mobility and Wireless Networks Throwing Away the Ties That Bind At-a-Glance: Wireless LANs Wired LANs Wireless LANs Selecting and Building Wireless Networks Designing a Wireless Network At-a-Glance: Designing Wi-Fi Networks Securing Wireless Networks Locking Down Wireless Balancing Security and Access At-a-Glance: Securing Wi-Fi Outdoor and Municipal Wireless Networks It's Just Like a Building, Only Way Bigger At-a-Glance: Municipal Wi-Fi VoIP over Wireless Networks Wireless VoIP At-a-Glance: Wireless VoIP Wireless VoIP Wireless Guest Access Mi Casa Es Su Casa At-a-Glance: Wireless Guest Access RFID and Location-Based Services Finding Your Stuff Wireless LANS: They're Not Just for Checking E-Mail on the Toilet Anymore! At-a-Glance: Location-Based Services Wireless Location Services Part IX: Virtualized Networks Virtualizing Data Centers Growth of the Data Center Data Center Virtualization At-a-Glance: Virtual Data Centers Virtualizing Network Infrastructure Leveraging Network Investment A Network Is a Network Virtualizing Network Infrastructure At-a-Glance: Virtual Network Infrastructure Applications of Virtualized Networks What Can You Do with Virtualized Networks? Corporate Employee "Clean" and "Dirty" Networks Guest and Partner Networks Isolating Specialized Devices and Applications Load Balancing Providing Hosted Networks to Entities Within Entities Departmental Virtual Networks Challenges with Virtual Networks At-a-Glance: Virtualized Network Applications Evolution of Virtual Networks 1587201992 TOC 11/19/2007
PortraitJim Doherty is the Chief Marketing Officer at CipherOptics. Before joining the CipherOptics team, he held leadership positions with Symbol Technologies and Cisco Systems. He has more than 16 years of technical marketing and engineering experience and has led various marketing campaigns for IP telephony, routing and switching solutions, and network security solutions. He is the coauthor of the Networking Simplifiedseries, published by Cisco Press. He is a former Marine Corps sergeant. He holds a B.S. in electrical engineering from North Carolina State University and an MBA from Duke University. Neil Anderson is the Senior Manager of Technology Systems Engineering with Cisco Systems. He has more than 20 years of broad engineering experience, including public telephone systems, mobile phone systems, Internet, and home networking. At Cisco, his focus is on business networks in the areas of network architecture, wireless, security, unified communications, and emerging technologies. He is the coauthor of the Networking Simplified series, published by Cisco Press. He holds a B.S. in computer science.
Untertitel: Sprache: Englisch.
Erscheinungsdatum: Dezember 2007
Seitenanzahl: 400 Seiten