,

Practical Guide to Advanced Networking, A (paperback)

Paperback Engels 2016 9780789757494
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

This book takes a pragmatic, hands-on approach to teaching advanced modern networking concepts from the network administrator's point of view. It introduces each new concept in clear, easy-to-understand language, explaining how each technology is used, and reinforcing every idea and technique with practical examples and exercises. Readers will learn how to design, configure, and manage campus networks, connect networks to the Internet, and apply advanced networking technologies. They will learn today's most valuable techniques for designing network infrastructure; configuring routers with RIPv2, OSPF, EIGRP, IS-IS, and BGP; using network management and analysis tools; running IPv6; networking Linux; securing networks, and using VoIP. This new Third Edition has been revised and reorganized to serve as a text for a second-semester networking course, following logically from the authors' Networking Essentials, Third Edition, ISBN 9780789749031.

Specificaties

ISBN13:9780789757494
Taal:Engels
Bindwijze:Paperback

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<p> Introduction xvi</p> <p><strong>CHAPTER 1 Network Infrastructure Design 2</strong></p> <p> Chapter Outline 3</p> <p> Objectives 3</p> <p> Key Terms 3</p> <p> INTRODUCTION 4</p> <p> 1-1 PHYSICAL NETWORK DESIGN 4</p> <p> Core 5</p> <p> Distribution Layer 5</p> <p> Access Layer 6</p> <p> Data Flow 6</p> <p> Selecting the Media 6</p> <p> 1-2 IP SUBNET DESIGN 7</p> <p> IP Address Range 8</p> <p> Determining the Number of Subnetworks Needed for the Network 9</p> <p> Determining the Size or the Number of IP Host Addresses Needed for the Network 11</p> <p> IP Assignment 15</p> <p> 1-3 VLAN NETWORK 16</p> <p> Virtual LAN (VLAN) 17</p> <p> VLAN Configuration 18</p> <p> VLAN Tagging 23</p> <p> 802.1Q Configuration 25</p> <p> Networking Challenge: Static VLAN Configuration 26</p> <p> Configuring the HP Procurve Switch 27</p> <p> 1-4 ROUTED NETWORK 28</p> <p> Router 29</p> <p> Gateway Address 30</p> <p> Network Segments 31</p> <p> Multilayer Switch 32</p> <p> Layer 3 Routed Networks 33</p> <p> Routed Port Configuration 33</p> <p> InterVLAN Routing Configuration 35</p> <p> Serial and ATM Port Configuration 37</p> <p> Summary 44</p> <p> Questions and Problems 46</p> <p><strong>CHAPTER 2 Advanced Router Configuration I 52</strong></p> <p> Chapter Outline 53</p> <p> Objectives 53</p> <p> Key Terms 53</p> <p> Introduction 54</p> <p> 2-1 CONFIGURING STATIC ROUTING 54</p> <p> Gateway of Last Resort 61</p> <p> Configuring Static Routes 61</p> <p> Load Balancing and Redundancy 68</p> <p> Networking Challenge–Static Routes 70</p> <p> 2-2 DYNAMIC ROUTING PROTOCOLS 70</p> <p> Distance Vector Protocols 73</p> <p> Link State Protocols 74</p> <p> 2-3 CONFIGURING RIPv2 75</p> <p> Configuring Routes with RIP 77</p> <p> Configuring Routes with RIP Version 2 82</p> <p> Networking Challenge–RIP 84</p> <p> 2-4 TFTP–Trivial File Transfer Protocol 85</p> <p> Configuring TFTP 85</p> <p> Summary 89</p> <p> Questions and Problems 89</p> <p><strong>CHAPTER 3 Advanced Router Configuration II 98</strong></p> <p> Chapter Outline 99</p> <p> Objectives 99</p> <p> Key Terms 99</p> <p> INTRODUCTION 101</p> <p> 3-1 CONFIGURING LINK STATE PROTOCOLS–OSPF 101</p> <p> Link State Protocols 102</p> <p> Configuring Routes with OSPF 103</p> <p> Load Balancing and Redundancy with OSPF 109</p> <p> Networking Challenge–OSPF 111</p> <p> 3-2 CONFIGURING LINK STATE PROTOCOLS–IS-IS 112</p> <p> Configuring Routes with IS-IS 113</p> <p> Load Balancing and Redundancy with IS-IS 117</p> <p> Networking Challenge: IS-IS 118</p> <p> 3-3 CONFIGURING HYBRID ROUTING PROTOCOLS–EIGRP 119</p> <p> Configuring Routes with EIGRP 120</p> <p> Load Balancing and Redundancy 125</p> <p> Networking Challenge: EIGRP 128</p> <p> 3-4 ADVANCED ROUTING REDISTRIBUTION 129</p> <p> Route Redistribution into RIP 130</p> <p> Route Redistribution into OSPF 134</p> <p> Route Redistribution into EIGRP 137</p> <p> Route Redistribution into IS-IS 141</p> <p> 3-5 ANALYZING OSPF “HELLO” PACKETS 143</p> <p> Summary 147</p> <p> Questions and Problems 147</p> <p><strong>CHAPTER 4 Configuring Juniper Routers 158</strong></p> <p> Chapter Outline 159</p> <p> Objectives 159</p> <p> Key Terms 159</p> <p> INTRODUCTION 160</p> <p> 4-1 OPERATIONAL MODE 160</p> <p> 4-2 ROUTER CONFIGURATION MODE 166</p> <p> Displaying the Router Interfaces 166</p> <p> Hostname Configuration 167</p> <p> Assigning an IP Address to an Interface 168</p> <p> 4-3 CONFIGURING ROUTES ON JUNIPER ROUTERS 169</p> <p> Configure STATIC Routes on Juniper Routers 169</p> <p> Configure RIP on Juniper Routers 171</p> <p> Configure OSPF on Juniper Routers 173</p> <p> Configure IS-IS on Juniper Routers 175</p> <p> 4-4 CONFIGURING ROUTE REDISTRIBUTION ON JUNIPER ROUTERS 178</p> <p> Summary 182</p> <p> Questions and Problems 182</p> <p><strong>CHAPTER 5 CONFIGURING AND MANAGING THE NETWORK INFRASTRUCTURE 188</strong></p> <p> Chapter Outline 189</p> <p> Objectives 189</p> <p> Key Terms 189</p> <p> Introduction 190</p> <p> 5-1 DOMAIN NAME AND IP ASSIGNMENT 190</p> <p> 5-2 IP MANAGEMENT WITH DHCP 195</p> <p> DHCP Data Packets 197</p> <p> DHCP Deployment 201</p> <p> 5-3 SCALING THE NETWORK WITH NAT AND PAT 204</p> <p> Configuring NAT 205</p> <p> 5-4 DOMAIN NAME SERVICE (DNS) 209</p> <p> DNS Tree Hierarchy 210</p> <p> DNS Resource Records 214</p> <p> Summary 220</p> <p> Questions and Problems 220</p> <p><strong>CHAPTER 6 Analyzing Network Data Traffic 226</strong></p> <p> Chapter Outline 227</p> <p> Objectives 227</p> <p> Key Terms 227</p> <p> INTRODUCTION 228</p> <p> 6-1 PROTOCOL ANALYSIS/FORENSICS 228</p> <p> Basic TCP/UDP Forensics 234</p> <p> ARP and ICMP 236</p> <p> 6-2 WIRESHARK PROTOCOL ANALYZER 239</p> <p> Using Wireshark to Capture Packets 243</p> <p> 6-3 ANALYZING NETWORK DATA TRAFFIC 244</p> <p> Configuring SNMP 244</p> <p> NetFlow 250</p> <p> 6-4 FILTERING 251</p> <p> FTP Filtering 256</p> <p> Right-Click Filtering Logic Rules 258</p> <p> Filtering DHCP 260</p> <p> Summary 262</p> <p> Questions and Problems 262</p> <p><strong>CHAPTER 7 Network Security 266</strong></p> <p> Chapter Outline 267</p> <p> Objectives 267</p> <p> Key Terms 267</p> <p> INTRODUCTION 268</p> <p> 7-1 DENIAL OF SERVICE 268</p> <p> Distributed Denial of Service Attacks (DDoS) 270</p> <p> 7-2 FIREWALLS AND ACCESS LISTS 270</p> <p> Network Attack Prevention 272</p> <p> Access Lists 272</p> <p> 7-3 Router Security 279</p> <p> Router Access 280</p> <p> Router Services 282</p> <p> Router Logging and Access-List 283</p> <p> 7-4 Switch Security 285</p> <p> Switch Port Security 286</p> <p> Switch Special Features 288</p> <p> 7-5 Wireless Security 289</p> <p> 7-6 VPN Security 292</p> <p> VPN Tunneling Protocols 293</p> <p> Configuring a VPN Virtual Interface (Router to Router) 294</p> <p> Troubleshooting the VPN Tunnel Link 299</p> <p> Summary 302</p> <p> Questions and Problems 302</p> <p><strong>CHAPTER 8 IPv6 306</strong></p> <p> Chapter Outline 307</p> <p> Objectives 307</p> <p> Key Terms 307</p> <p> Introduction 308</p> <p> 8-1 Comparison of IPv6 and IPv4 308</p> <p> 8-2 IPV6 ADDRESSING 311</p> <p> 8-3 IPv6 Network Settings 315</p> <p> 8-4 Configuring a Router for IPv6 320</p> <p> 8-5 IPv6 Routing 324</p> <p> IPv6: Static 324</p> <p> IPv6: RIP 324</p> <p> IPv6: OSPF 325</p> <p> IPv6: EIGRP 325</p> <p> IPv6: IS-IS 326</p> <p> 8-6 Troubleshooting IPv6 Connection 327</p> <p> Summary 329</p> <p> Questions and Problems 329</p> <p><strong>CHAPTER 9 Linux Networking 336</strong></p> <p> Chapter Outline 337</p> <p> Objectives 337</p> <p> Key Terms 337</p> <p> INTRODUCTION 338</p> <p> 9-1 LOGGING ON TO LINUX 339</p> <p> Adding a User Account 340</p> <p> 9-2 LINUX FILE STRUCTURE AND FILE COMMANDS 344</p> <p> Listing Files 344</p> <p> Displaying File Contents 346</p> <p> Directory Operations 348</p> <p> File Operations 351</p> <p> Permissions and Ownership 353</p> <p> 9-3 LINUX ADMINISTRATION COMMANDS 357</p> <p> The man (manual) Command 358</p> <p> The ps (processes) Command 359</p> <p> The su (substitute user) Command 362</p> <p> The mount Command 362</p> <p> The shutdown Command 364</p> <p> Linux Tips 364</p> <p> 9-4 ADDING APPLICATIONS TO LINUX 365</p> <p> 9-5 LINUX NETWORKING 371</p> <p> Installing SSH 375</p> <p> The FTP Client 376</p> <p> DNS Service on Linux 376</p> <p> Changing the Hostname 377</p> <p> 9-6 TROUBLESHOOTING SYSTEM AND NETWORK PROBLEMS WITH LINUX 378</p> <p> Troubleshooting Boot Processes 378</p> <p> Listing Users on the System 380</p> <p> Network Security 382</p> <p> Enabling and Disabling Boot Services 382</p> <p> 9-7 MANAGING THE LINUX SYSTEM 385</p> <p> Summary 390</p> <p> Questions and Problems 391</p> <p><strong>CHAPTER 10 Internet Routing 396</strong></p> <p> Chapter Outline 397</p> <p> Objectives 397</p> <p> Key Terms 397</p> <p> INTRODUCTION 398</p> <p> 10-1 INTERNET ROUTING–BGP 398</p> <p> Configuring a WAN Connection 398</p> <p> Configuring an Internet Connection 400</p> <p> 10-2 CONFIGURING BGP 401</p> <p> Configuring BGP 401</p> <p> Networking Challenge: BGP 409</p> <p> 10-3 BGP BEST PATH SELECTION 410</p> <p> 10-4 IPv6 OVER THE INTERNET 412</p> <p> 10-5 CONFIGURE BGP ON JUNIPER ROUTERS 415</p> <p> Summary 421</p> <p> Questions and Problems 421</p> <p><strong>CHAPTER 11 Voice over IP 428</strong></p> <p> Chapter Outline 429</p> <p> Objectives 429</p> <p> Key Terms 429</p> <p> INTRODUCTION 430</p> <p> 11-1 THE BASICS OF VOICE OVER IP 430</p> <p> 11-2 VOICE OVER IP NETWORKS 433</p> <p> Replacing an Existing PBX Tie Line 433</p> <p> Upgrading Existing PBXs to Support IP Telephony 435</p> <p> Switching to a Complete IP Telephony Solution 436</p> <p> 11-3 QUALITY OF SERVICE 438</p> <p> Jitter 438</p> <p> Network Latency 439</p> <p> Queuing 439</p> <p> QOS Configuration Example 440</p> <p> 11-4 ANALYZING VoIP DATA PACKETS 442</p> <p> Analyzing VoIP Telephone Call Data Packets 446</p> <p> 11-5 VoIP SECURITY 449</p> <p> Summary 452</p> <p> Questions and Problems 452</p> <p><strong>Key Terms Glossary 456</strong></p> <p><strong>TOC, 9780789749048, 10/12/2012</strong></p>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Practical Guide to Advanced Networking, A (paperback)