Cisco Networking Simplified

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

I highly recommend this book to anyone desiring to learn the basics about Cisco networking. This book has great visual illustration and easy to understand wording that a person can learn the terminologies and their functions. You will learn the OSI model and the way each layer communicate with each other. The technical aspect of the book is a guideline to understanding networking infrastructure, network design, securing a network and many more function such as VPN.

Author(s): Neil Anderson, Paul L. Della Maggiora, Jim Doherty
Edition: 2nd ed
Publisher: Cisco Press
Year: 2008

Language: English
Pages: 417
City: Indianapolis, IN

Cisco Networking Simplified......Page 1
Contents......Page 8
Introduction......Page 14
Part I: Networking Fundamentals......Page 17
How Computers Communicate......Page 19
Seven Layers......Page 20
At-a-Glance: OSI Model......Page 22
Internet Infrastructure: How It All Connects......Page 25
TCP/IP and IP Addressing......Page 27
What Is an Address?......Page 28
Domain Names and Relationship to IP Addresses......Page 29
Matching Domain Names to IP Addresses......Page 30
At-a-Glance: TCP/IP......Page 31
At-a-Glance: IP Addressing......Page 34
At-a-Glance: IPv6......Page 37
NAT and PAT......Page 40
Internet Applications......Page 41
E-Mail......Page 42
Web Browsing......Page 43
E-Mail......Page 45
Peer-to-Peer Sharing......Page 46
Part II: Networking Infrastructure......Page 47
Ethernet......Page 49
What Is Ethernet?......Page 50
Evolution of Ethernet......Page 51
At-a-Glance: Ethernet......Page 52
Reducing Collisions on Ethernet......Page 55
LAN Switching......Page 57
Switching Basics: It’s a Bridge......Page 58
Switches Take Over the World......Page 59
At-a-Glance: Switching......Page 60
Spanning Tree......Page 63
Spanning-Tree Fundamentals......Page 64
At-a-Glance: Spanning Tree......Page 66
Routing......Page 69
Routers Route Packets......Page 70
Routers Bridge and Switches Route......Page 71
At-a-Glance: Routing......Page 72
Routing and Switching......Page 75
Part III: Network Design......Page 77
Campus Networks and Hierarchical Design......Page 79
Building Networks for Ease of Use......Page 80
At-a-Glance: Hierarchical Campus Design......Page 81
WAN Network Design......Page 85
Integrated Services Digital Network......Page 86
ATM......Page 87
WAN Devices......Page 88
At-a-Glance: Frame Relay......Page 89
At-a-Glance: Asynchronous Transfer Mode (ATM)......Page 91
Multiprotocol Label Switching (MPLS) Services......Page 93
At-a-Glance: MPLS......Page 94
MPLS Traffic Separation......Page 97
Broadband Technologies......Page 99
Broadband Technology Evolution......Page 100
At-a-Glance: ISDN......Page 102
At-a-Glance: Broadband......Page 104
Virtual Private Networks......Page 107
Secure Networking Over the Internet......Page 108
At-a-Glance: VPNs......Page 110
Establishing a VPN Connection......Page 113
At-a-Glance: Encryption......Page 115
Client Authentication......Page 118
Optical Technologies......Page 121
SONET, DWDM, and DPT......Page 122
At-a-Glance: Metro Optical......Page 124
Branch Office Network Designs......Page 127
Distributed Office Challenges......Page 128
At-a-Glance: Branch Office Design......Page 129
Part IV: Network Availability......Page 133
High Availability......Page 135
At-a-Glance: High Availability......Page 139
Control Plane......Page 143
Control Plane Protection......Page 144
At-a-Glance: Control Plane Protection......Page 145
Quality of Service and Network Availability......Page 147
Scavenger QoS......Page 148
At-a-Glance: QoS for Network Resiliency......Page 149
Disaster Recovery......Page 153
DR Planning......Page 154
Preparedness Testing......Page 155
At-a-Glance: Disaster Recovery: Business Continuance......Page 156
Disaster Recovery......Page 159
Network Management......Page 161
Keeping the Network Alive from Afar......Page 162
Network-Management Protocols......Page 163
Troubleshooting Tools......Page 164
At-a-Glance: Network Management......Page 165
Network Management......Page 167
Part V: Securing the Network......Page 169
Network Security......Page 171
Data Privacy......Page 172
Policy Enforcement......Page 173
At-a-Glance: Network Security......Page 174
At-a-Glance: Hacking......Page 176
DoS Attacks......Page 179
Snooping and Spoofing......Page 181
Firewalls......Page 183
Firewall for Your Protection......Page 184
Personal Firewalls......Page 185
At-a-Glance: Firewalls and IDS......Page 186
Firewalls and IDS......Page 188
Access and Content Security......Page 189
Intrusion Prevention Systems......Page 191
The Problem with False Positives......Page 192
At-a-Glance: Intrusion Detection......Page 193
Port-Based Security......Page 195
Combating Access-Based Attacks......Page 196
At-a-Glance: Port-Based Security......Page 197
Identity-Based Networking......Page 201
802.1x......Page 202
At-a-Glance: Identity......Page 203
Authentication......Page 206
Network Admission Control......Page 207
Assessing Device “Health”......Page 208
Network Admission Control......Page 209
At-a-Glance: NAC......Page 210
URL Filtering: Eliminating Unwanted Web Page Access......Page 213
Enforcing Corporate Internet Usage Policies......Page 214
At-a-Glance: URL Filtering......Page 215
URL Filtering and Firewalls......Page 217
Deep Packet Inspection: Controlling Unwanted Applications......Page 219
Deep Packet Inspection......Page 220
At-a-Glance: Deep Packet Inspection......Page 221
Packet Inspection......Page 224
Telemetry: Identifying and Isolating Attack Sources......Page 225
Using Telemetry to Combat Attacks......Page 226
At-a-Glance: Telemetry......Page 227
Physical Security: IP Video Surveillance......Page 229
Video Surveillance......Page 230
At-a-Glance: Physical Security......Page 231
Physical and Logical Security......Page 233
Part VI: Data Centers and Application Networking......Page 235
Moving Data Efficiently......Page 236
Data Centers......Page 237
Functions and Requirements......Page 238
At-a-Glance: Data Centers......Page 240
Data Center Application: Corporate Expense System......Page 243
Storage Area Networks......Page 245
Fiber Channel and IP......Page 246
Infiniband......Page 247
At-a-Glance: Storage Networking......Page 248
Server-Centric Storage......Page 251
Caching......Page 253
Caching More Than Web Pages......Page 254
Issues Affecting Caching......Page 255
Caching......Page 256
Wide Area File Services......Page 257
Enter Wide Area File Services (WAFS)......Page 258
At-a-Glance: Wide Area File Services......Page 259
Wide Area Application Services......Page 263
Enter Wide Area Application Services (WAAS)......Page 264
At-a-Glance: Wide Area Application Services......Page 265
Part VII: Unified Communications......Page 269
Voice over IP......Page 271
Unifying Communications......Page 272
Call-Processing Layer......Page 273
Deployment Models......Page 274
At-a-Glance: Voice over IP......Page 276
Voice over IP......Page 279
At-a-Glance: Unified Communications......Page 280
Voice over IP: Toll Bypass......Page 282
Quality of Service......Page 283
QoS and Unified Communications......Page 284
At-a-Glance: QoS......Page 286
How Packets Are Prioritized......Page 288
Unified Personal Communications......Page 289
Cisco Unified Personal Communicator (CUPC)......Page 290
At-a-Glance: Unified Communications......Page 291
Meeting Collaboration Spaces......Page 293
Meetings Are an Activity, Not a Place......Page 294
At-a-Glance: Meeting Collaboration......Page 295
Traditional Videoconferencing......Page 297
Video over IP Networks......Page 298
At-a-Glance: IP Videoconferencing......Page 299
Videoconferencing......Page 301
Videoconferencing Application E-Learning......Page 302
Telepresence......Page 303
The Next-Best Thing to Being There......Page 304
At-a-Glance: Telepresence......Page 305
Presence and Location-Aware Services......Page 307
The Importance of Location......Page 308
At-a-Glance: Presence and Location-Aware Services......Page 309
IP Call Center......Page 311
From the Caller to the Agent, and Back Again......Page 312
New Methods for Customer Interaction......Page 313
At-a-Glance: IP Contact Center......Page 314
Call-Center Tech Support......Page 316
Call-Center Telemarketing......Page 317
Multicast and IPTV Broadcasts......Page 319
Watching Movies Without Flooding the World......Page 320
At-a-Glance: IP Multicast......Page 322
Multicast......Page 324
Part VIII: Mobility......Page 325
Wireless World......Page 326
Mobility and Wireless Networks......Page 327
Throwing Away the Ties That Bind......Page 328
At-a-Glance: Wireless LANs......Page 329
Wired LANs......Page 331
Wireless LANs......Page 332
Selecting and Building Wireless Networks......Page 333
Designing a Wireless Network......Page 334
At-a-Glance: Designing Wi-Fi Networks......Page 335
Securing Wireless Networks......Page 339
Balancing Security and Access......Page 340
At-a-Glance: Securing Wi-Fi......Page 341
Outdoor and Municipal Wireless Networks......Page 345
It’s Just Like a Building, Only Way Bigger......Page 346
At-a-Glance: Municipal Wi-Fi......Page 347
VoIP over Wireless Networks......Page 351
Wireless VoIP......Page 352
At-a-Glance: Wireless VoIP......Page 353
Wireless VoIP......Page 355
Wireless Guest Access......Page 357
Mi Casa Es Su Casa......Page 358
At-a-Glance: Wireless Guest Access......Page 359
RFID and Location-Based Services......Page 361
Wireless LANS: They’re Not Just for Checking E-Mail on the Toilet Anymore!......Page 362
At-a-Glance: Location-Based Services......Page 363
Wireless Location Services......Page 366
Part IX: Virtualized Networks......Page 367
Virtualizing Data Centers......Page 369
Data Center Virtualization......Page 370
At-a-Glance: Virtual Data Centers......Page 371
Virtualizing Network Infrastructure......Page 375
Virtualizing Network Infrastructure......Page 376
At-a-Glance: Virtual Network Infrastructure......Page 377
Applications of Virtualized Networks......Page 381
Providing Hosted Networks to Entities Within Entities......Page 382
Challenges with Virtual Networks......Page 383
At-a-Glance: Virtualized Network Applications......Page 384
Evolution of Virtual Networks......Page 388
Index......Page 391
A......Page 392
B......Page 393
C......Page 394
D......Page 396
E......Page 398
G......Page 399
H......Page 400
I......Page 401
L......Page 402
M......Page 403
P......Page 405
R......Page 408
S......Page 409
U......Page 412
V......Page 413
W......Page 414
X-Z......Page 415