- ISBN: 9781587201998 | 1587201992
- Cover: Paperback
- Copyright: 12/18/2007
Jim Doherty is the Chief Marketing Officer at CipherOptics. Before joining the CipherOptics team, he held leadership positions with Symbol Technologies and Cisco Systems. He has more than 16 years of technical marketing and engineering experience and has led various marketing campaigns for IP telephony, routing and switching solutions, and network security solutions. He is the coauthor of the Networking Simplifiedseries, published by Cisco Press. He is a former Marine Corps sergeant. He holds a B.S. in electrical engineering from North Carolina State University and an MBA from Duke University.
Neil Anderson is the Senior Manager of Technology Systems Engineering with Cisco Systems. He has more than 20 years of broad engineering experience, including public telephone systems, mobile phone systems, Internet, and home networking. At Cisco, his focus is on business networks in the areas of network architecture, wireless, security, unified communications, and emerging technologies. He is the coauthor of the Networking Simplified series, published by Cisco Press. He holds a B.S. in computer science.
Introduction | |
Networking Fundamentals How Computers Communicate | |
The OSI Model | |
Open Versus Proprietary Systems | |
Seven Layers | |
At-a-Glance: OSI Model | |
Internet Infrastructure: How It All Connects TCP/IP and IP Addressing | |
Computers Speaking the Same Language | |
What Is an Address? | |
Dynamically Allocated IP Addresses | |
Domain Names and Relationship to IP Addresses | |
Matching Domain Names to IP Addresses | |
At-a-Glance: TCP/IP | |
At-a-Glance: IP Addressing | |
At-a-Glance: IPv6 | |
NAT and PAT Internet Applications | |
The Internet and Its Applications | |
Web Browsing | |
Peer-to-Peer Sharing | |
Networking Infrastructure Ethernet | |
History of Ethernet | |
What Is Ethernet? | |
Evolution of Ethernet | |
At-a-Glance: Ethernet | |
Reducing Collisions on Ethernet LAN Switching | |
Fast Computers Need Faster Networks | |
Switching Basics: It s a Bridge | |
Switching Ethernets | |
Switches Take Over the World | |
At-a-Glance: Switching Spanning Tree | |
Network Loops | |
Sometimes, the Earth Is Flat | |
Preventing Network Loops | |
Spanning-Tree Fundamentals | |
At-a-Glance: Spanning Tree Routing | |
Routers | |
Routers Talk Among Themselves to Find Routes | |
Routers Route Packets | |
Routers Bridge and Switches Route | |
At-a-Glance: Routing | |
Routing and Switching | |
Network Design Campus Networks and Hierarchical Design | |
Building Networks for Ease of Use | |
At-a-Glance: Hierarchical Campus Design WAN Network Design | |
Moving Traffic Across the Street and the World | |
WAN Services | |
Integrated Services Digital Network | |
Frame Relay | |
ATM | |
MPLS | |
Broadband | |
Virtual Private Networks (VPN) | |
WAN Devices | |
At-a-Glance: Frame Relay | |
At-a-Glance: Asynchronous Transfer Mode (ATM) | |
Multiprotocol Label Switching (MPLS) Services | |
At-a-Glance: MPLS | |
MPLS Traffic Separation Broadband Technologies | |
Always-on Access | |
Broadband Technology Evolution | |
At-a-Glance: ISDN | |
At-a-Glance: Broadband Virtual Private Networks | |
Secure Networking Over the Internet | |
At-a-Glance: VPNs | |
Establishing a VPN Connection | |
At-a-Glance: Encryption | |
Client Authentication Optical Technologies | |
LANs, WANs and Now MANs | |
SONET, DWDM, and DPT | |
At-a-Glance: Metro Optical Branch Office Network Designs | |
Distributed Workforce | |
Distributed Office Challenges | |
At-a-Glance: Branch Office Design | |
Network Availability High Availability | |
At-a-Glance: High Availability Control Plane | |
When Good Networks Go Bad | |
Control Plane Protection | |
At-a-Glance: Control Plane Protection Quality of Service and Network Availability | |
Quality of Service as Network Protection? | |
Scavenger QoS | |
At-a-Glance: QoS for Network Resiliency Disaster Recovery | |
What Happens When the Network Stops Working | |
DR Planning | |
Resiliency and Backup Services | |
Preparedness Testing | |
At-a-Glance: Disaster Recovery: Business Continuance | |
Disaster Recovery Network Management | |
Keeping the Network Alive from Afar | |
Network Documentation: A Must-Have | |
Network-Management Protocols | |
Troubleshooting Tools | |
At-a-Glance: Network Management | |
Network Management | |
Securing the Network Network Security | |
Identity | |
Perimeter Security | |
Data Privacy | |
Security Monitoring | |
Policy Enforcement | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.