reklama - zainteresowany?

Network Warrior - Helion

Network Warrior
ebook
Autor: Gary A. Donahue
ISBN: 978-05-965-5485-9
stron: 600, Format: ebook
Data wydania: 2007-06-21
Księgarnia: Helion

Cena książki: 135,15 zł (poprzednio: 157,15 zł)
Oszczędzasz: 14% (-22,00 zł)

Dodaj do koszyka Network Warrior

Tagi: Budowa sieci | Konfiguracja sieci | Sieci komputerowe

Written by networking veteran with 20 years of experience, Network Warrior provides a thorough and practical introduction to the entire network infrastructure, from cabling to the routers. What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive in the real world are two very different things. The strategies that this book offers weren 't on the exam, but they 're exactly what you need to do your job well.

Network Warrior takes you step by step through the world of hubs, switches, firewalls, and more, including ways to troubleshoot a congested network, and when to upgrade and why. Along the way, you 'll gain an historical perspective of various networking features, such as the way Ethernet evolved. Based on the author 's own experience as well as those he worked for and with, Network Warrior is a Cisco-centric book, focused primarily on the TCP/IP protocol and Ethernet networks -- the realm that Cisco Systems now dominates. The book covers:

The type of networks now in use, from LANs, WANs and MANs to CANs



  • The OSI Model and the layers involved in sending data
  • Hubs, repeaters, switches, and trunks in practice
  • Auto negotiation and why it 's a common problem in network slowdowns
  • Route maps, routing protocols, and switching algorithms in Cisco routers
  • The resilient Ethernet -- how to make things truly redundant
  • Cisco 6500 multi-layer switches and the Catalyst 3750 switch
  • Telecom nomenclature -- why it 's different from the data world
  • T1 and DS3
  • Firewall theory, designing access lists, authentication in Cisco devices
  • Server load balancing technology
  • Content switch module in action
  • Designing QOS and what QOS does not do
  • IP design and subnetting made easy




The book also explains how to sell your ideas to management, how networks become a mess as a company grows, and why change control is your friend. Network Warrior will help network administrators and engineers win the complex battles they face every day.

Dodaj do koszyka Network Warrior

 

Osoby które kupowały "Network Warrior", wybierały także:

  • Praktyczne projekty sieciowe
  • Sieci komputerowe. Kurs. Wydanie II
  • Sieci komputerowe. Kurs
  • Cisco CCNA 200-301. Kurs video. Podstawy sieci komputerowych i konfiguracji. Część 1
  • MikroTik. Kurs video. Przygotowanie do egzaminu MTCNA

Dodaj do koszyka Network Warrior

Spis treści

Network Warrior eBook -- spis treści

  • Network Warrior
    • SPECIAL OFFER: Upgrade this ebook with OReilly
    • Preface
      • Who Should Read This Book
      • Conventions Used in This Book
      • Using Code Examples
      • Wed Like to Hear from You
      • Safari Enabled
      • Acknowledgments
    • I. Hubs, Switches, and Switching
      • 1. What Is a Network?
      • 2. Hubs and Switches
        • 2.1. Hubs
        • 2.2. Switches
          • 2.2.1. Switch Types
          • 2.2.2. Planning a Chassis-Based Switch Installation
            • 2.2.2.1. Rack space
            • 2.2.2.2. Power
            • 2.2.2.3. Cooling
            • 2.2.2.4. Installing and removing modules
            • 2.2.2.5. Routing cables
      • 3. Auto-Negotiation
        • 3.1. What Is Auto-Negotiation?
        • 3.2. How Auto-Negotiation Works
        • 3.3. When Auto-Negotiation Fails
        • 3.4. Auto-Negotiation Best Practices
        • 3.5. Configuring Auto-Negotiation
      • 4. VLANs
        • 4.1. Connecting VLANs
        • 4.2. Configuring VLANs
          • 4.2.1. CatOS
          • 4.2.2. IOS Using VLAN Database
          • 4.2.3. IOS Using Global Commands
      • 5. Trunking
        • 5.1. How Trunks Work
          • 5.1.1. ISL
          • 5.1.2. 802.1Q
          • 5.1.3. Which Protocol to Use
          • 5.1.4. Trunk Negotiation
        • 5.2. Configuring Trunks
          • 5.2.1. IOS
          • 5.2.2. CatOS
      • 6. VLAN Trunking Protocol
        • 6.1. VTP Pruning
        • 6.2. Dangers of VTP
        • 6.3. Configuring VTP
          • 6.3.1. VTP Domains
            • 6.3.1.1. IOS
            • 6.3.1.2. CatOS
          • 6.3.2. VTP Mode
            • 6.3.2.1. IOS
            • 6.3.2.2. CatOS
          • 6.3.3. VTP Password
            • 6.3.3.1. IOS
            • 6.3.3.2. CatOS
          • 6.3.4. VTP Pruning
            • 6.3.4.1. IOS
            • 6.3.4.2. CatOS
      • 7. EtherChannel
        • 7.1. Load Balancing
        • 7.2. Configuring and Managing EtherChannel
          • 7.2.1. EtherChannel Protocols
          • 7.2.2. CatOS Example
          • 7.2.3. IOS Example
      • 8. Spanning Tree
        • 8.1. Broadcast Storms
        • 8.2. MAC Address Table Instability
        • 8.3. Preventing Loops with Spanning Tree
          • 8.3.1. How Spanning Tree Works
        • 8.4. Managing Spanning Tree
        • 8.5. Additional Spanning Tree Features
          • 8.5.1. PortFast
          • 8.5.2. BPDU Guard
          • 8.5.3. UplinkFast
          • 8.5.4. BackboneFast
        • 8.6. Common Spanning Tree Problems
          • 8.6.1. Duplex Mismatch
          • 8.6.2. Unidirectional Links
        • 8.7. Designing to Prevent Spanning Tree Problems
          • 8.7.1. Use Routing Instead of Switching for Redundancy
          • 8.7.2. Always Configure the Root Bridge
    • II. Routers and Routing
      • 9. Routing and Routers
        • 9.1. Routing Tables
        • 9.2. Route Types
        • 9.3. The IP Routing Table
          • 9.3.1. Host Route
          • 9.3.2. Subnet
          • 9.3.3. Summary (Group of Subnets)
          • 9.3.4. Major Network
          • 9.3.5. Supernet (Group of Major Networks)
          • 9.3.6. Default Route
      • 10. Routing Protocols
        • 10.1. Communication Between Routers
        • 10.2. Metrics and Protocol Types
        • 10.3. Administrative Distance
        • 10.4. Specific Routing Protocols
          • 10.4.1. RIP
          • 10.4.2. RIPv2
          • 10.4.3. EIGRP
          • 10.4.4. OSPF
          • 10.4.5. BGP
      • 11. Redistribution
        • 11.1. Redistributing into RIP
        • 11.2. Redistributing into EIGRP
        • 11.3. Redistributing into OSPF
        • 11.4. Mutual Redistribution
        • 11.5. Redistribution Loops
        • 11.6. Limiting Redistribution
          • 11.6.1. Route Tags
          • 11.6.2. A Real-World Example
            • 11.6.2.1. Another method
      • 12. Tunnels
        • 12.1. GRE Tunnels
        • 12.2. GRE Tunnels and Routing Protocols
        • 12.3. GRE and Access Lists
      • 13. Resilient Ethernet
        • 13.1. HSRP
        • 13.2. HSRP Interface Tracking
        • 13.3. When HSRP Isn't Enough
      • 14. Route Maps
        • 14.1. Building a Route Map
        • 14.2. Policy-Routing Example
          • 14.2.1. Monitoring Policy Routing
      • 15. Switching Algorithms in Cisco Routers
        • 15.1. Process Switching
        • 15.2. Interrupt Context Switching
          • 15.2.1. Fast Switching
          • 15.2.2. Optimum Switching
          • 15.2.3. Cisco Express Forwarding
        • 15.3. Configuring and Managing Switching Paths
          • 15.3.1. Process Switching
          • 15.3.2. Fast Switching
          • 15.3.3. Cisco Express Forwarding
    • III. Multilayer Switches
      • 16. Multilayer Switches
        • 16.1. Configuring SVIs
          • 16.1.1. Native Mode (4500, 6500, 3550, 3750)
          • 16.1.2. Hybrid Mode (4500, 6500)
        • 16.2. Multilayer Switch Models
      • 17. Cisco 6500 Multilayer Switches
        • 17.1. Architecture
          • 17.1.1. Buses
          • 17.1.2. Enhanced Chassis
          • 17.1.3. Supervisors
            • 17.1.3.1. MSFC
            • 17.1.3.2. PFC
            • 17.1.3.3. Models
          • 17.1.4. Modules
            • 17.1.4.1. Module interaction
            • 17.1.4.2. Module types
              • 17.1.4.2.1. Ethernet modules
              • 17.1.4.2.2. Firewall Services Modules
              • 17.1.4.2.3. Content Switch Modules
              • 17.1.4.2.4. Network Analysis Modules
              • 17.1.4.2.5. Intrusion Detection System Modules
              • 17.1.4.2.6. FlexWAN modules
              • 17.1.4.2.7. Communication Media Modules
        • 17.2. CatOS Versus IOS
      • 18. Catalyst 3750 Features
        • 18.1. Stacking
        • 18.2. Interface Ranges
        • 18.3. Macros
        • 18.4. Flex Links
        • 18.5. Storm Control
        • 18.6. Port Security
        • 18.7. SPAN
        • 18.8. Voice VLAN
        • 18.9. QoS
    • IV. Telecom
      • 19. Telecom Nomenclature
        • 19.1. Introduction and History
        • 19.2. Telecom Glossary
      • 20. T1
        • 20.1. Understanding T1 Duplex
        • 20.2. Types of T1
        • 20.3. Encoding
          • 20.3.1. AMI
          • 20.3.2. B8ZS
        • 20.4. Framing
          • 20.4.1. D4/Superframe
          • 20.4.2. Extended Superframe (ESF)
        • 20.5. Performance Monitoring
          • 20.5.1. Loss of Signal (LOS)
          • 20.5.2. Out of Frame (OOF)
          • 20.5.3. Bipolar Violation (BPV)
          • 20.5.4. CRC6
          • 20.5.5. Errored Seconds (ES)
          • 20.5.6. Extreme Errored Seconds (EES)
        • 20.6. Alarms
          • 20.6.1. Red Alarm
          • 20.6.2. Yellow Alarm (RAI)
          • 20.6.3. Blue Alarm (AIS)
        • 20.7. Troubleshooting T1s
          • 20.7.1. Loopback Tests
          • 20.7.2. Integrated CSU/DSUs
        • 20.8. Configuring T1s
          • 20.8.1. CSU/DSU Configuration
          • 20.8.2. CSU/DSU Troubleshooting
      • 21. DS3
        • 21.1. Framing
          • 21.1.1. M13
          • 21.1.2. C-Bits
          • 21.1.3. Clear-Channel DS3 Framing
        • 21.2. Line Coding
        • 21.3. Configuring DS3s
          • 21.3.1. Clear-Channel DS3
          • 21.3.2. Channelized DS3
      • 22. Frame Relay
        • 22.1. Ordering Frame-Relay Service
        • 22.2. Frame-Relay Network Design
        • 22.3. Oversubscription
        • 22.4. Local Management Interface (LMI)
          • 22.4.1. Congestion Avoidance in Frame Relay
        • 22.5. Configuring Frame Relay
          • 22.5.1. Basic Frame Relay with Two Nodes
          • 22.5.2. Basic Frame Relay with More Than Two Nodes
          • 22.5.3. Frame-Relay Subinterfaces
        • 22.6. Troubleshooting Frame Relay
    • V. Security and Firewalls
      • 23. Access Lists
        • 23.1. Designing Access Lists
          • 23.1.1. Wildcard Masks
          • 23.1.2. Where to Apply Access Lists
          • 23.1.3. Naming Access Lists
          • 23.1.4. Top-Down Processing
          • 23.1.5. Most-Used on Top
          • 23.1.6. Using Groups in PIX ACLs
          • 23.1.7. Turbo ACLs
          • 23.1.8. Allowing Outbound Traceroute and Ping
          • 23.1.9. Allowing MTU Path Discovery Packets
        • 23.2. ACLs in Multilayer Switches
          • 23.2.1. Configuring Port ACLs
          • 23.2.2. Configuring Router ACLs
          • 23.2.3. Configuring VLAN Maps
        • 23.3. Reflexive Access Lists
          • 23.3.1. Configuring Reflexive Access Lists
      • 24. Authentication in Cisco Devices
        • 24.1. Basic (Non-AAA) Authentication
          • 24.1.1. Line Passwords
          • 24.1.2. Configuring Local Users
          • 24.1.3. PPP Authentication
            • 24.1.3.1. PAP
              • 24.1.3.1.1. One-way authentication
              • 24.1.3.1.2. Two-way authentication
              • 24.1.3.1.3. Debugging PPP authentication
            • 24.1.3.2. CHAP
              • 24.1.3.2.1. One-way authentication
              • 24.1.3.2.2. Two-way authentication
              • 24.1.3.2.3. Changing the sent hostname
        • 24.2. AAA Authentication
          • 24.2.1. Enabling AAA
          • 24.2.2. Configuring Security Server Information
            • 24.2.2.1. Default RADIUS and TACACS+ server groups
            • 24.2.2.2. Custom groups
          • 24.2.3. Creating Method Lists
            • 24.2.3.1. Login authentication
            • 24.2.3.2. PPP authentication
          • 24.2.4. Applying Method Lists
      • 25. Firewall Theory
        • 25.1. Best Practices
        • 25.2. The DMZ
          • 25.2.1. Another DMZ Example
          • 25.2.2. Multiple DMZ Example
        • 25.3. Alternate Designs
      • 26. PIX Firewall Configuration
        • 26.1. Interfaces and Priorities
        • 26.2. Names
        • 26.3. Object Groups
        • 26.4. Fixups
        • 26.5. Failover
          • 26.5.1. Failover Terminology
          • 26.5.2. Understanding Failover
          • 26.5.3. Configuring Failover
          • 26.5.4. Monitoring Failover
        • 26.6. NAT
          • 26.6.1. NAT Commands
          • 26.6.2. NAT Examples
            • 26.6.2.1. Simple PAT using the outside interface
            • 26.6.2.2. Simple PAT using a dedicated IP address
            • 26.6.2.3. Simple PAT with public servers on the inside
            • 26.6.2.4. Port redirection
            • 26.6.2.5. DMZ
        • 26.7. Miscellaneous
          • 26.7.1. Remote Access
          • 26.7.2. Saving Configuration Changes
          • 26.7.3. Logging
        • 26.8. Troubleshooting
    • VI. Server Load Balancing
      • 27. Server Load-Balancing Technology
        • 27.1. Types of Load Balancing
        • 27.2. How Server Load Balancing Works
          • 27.2.1. Balancing Algorithms
        • 27.3. Configuring Server Load Balancing
          • 27.3.1. IOS SLB
            • 27.3.1.1. Real servers
            • 27.3.1.2. Server farms
            • 27.3.1.3. Virtual servers
            • 27.3.1.4. Port translation using SLB
          • 27.3.2. Content Switch Modules
            • 27.3.2.1. Real servers
            • 27.3.2.2. Server farms
            • 27.3.2.3. Virtual servers
            • 27.3.2.4. Port redirection
      • 28. Content Switch Modules in Action
        • 28.1. Common Tasks
        • 28.2. Upgrading the CSM
    • VII. Quality of Service
      • 29. Introduction to QoS
        • 29.1. Types of QoS
        • 29.2. QoS Mechanics
          • 29.2.1. Priorities
          • 29.2.2. Flavors of QoS
        • 29.3. Common QoS Misconceptions
      • 30. Designing a QoS Scheme
        • 30.1. Determining Requirements
          • 30.1.1. Protocols
          • 30.1.2. Priorities
          • 30.1.3. Determine Bandwidth Requirements
        • 30.2. Configuring the Routers
          • 30.2.1. Class Maps
          • 30.2.2. Policy Maps
          • 30.2.3. Service Policies
      • 31. The Congested Network
        • 31.1. Determining Whether the Network Is Congested
        • 31.2. Resolving the Problem
      • 32. The Converged Network
        • 32.1. Configuration
        • 32.2. Monitoring QoS
        • 32.3. Troubleshooting a Converged Network
          • 32.3.1. Incorrect Queue Configuration
          • 32.3.2. Priority Queue Too Small
          • 32.3.3. Priority Queue Too Large
          • 32.3.4. Nonpriority Queue Too Small
          • 32.3.5. Nonpriority Queue Too Large
          • 32.3.6. Default Queue Too Small
          • 32.3.7. Default Queue Too Large
    • VIII. Designing Networks
      • 33. Designing Networks
        • 33.1. Documentation
          • 33.1.1. Requirements Documents
          • 33.1.2. Port Layout Spreadsheets
          • 33.1.3. IP and VLAN Spreadsheets
          • 33.1.4. Bay Face Layouts
          • 33.1.5. Power and Cooling Requirements
          • 33.1.6. Tips for Network Diagrams
        • 33.2. Naming Conventions for Devices
        • 33.3. Network Designs
          • 33.3.1. Corporate Networks
            • 33.3.1.1. Three-tiered architecture
            • 33.3.1.2. Collapsed coreno distribution
            • 33.3.1.3. Collapsed coreno distribution or access
            • 33.3.1.4. Configuration concerns
              • 33.3.1.4.1. Trunks
              • 33.3.1.4.2. EtherChannels
              • 33.3.1.4.3. Spanning Tree
              • 33.3.1.4.4. VTP
              • 33.3.1.4.5. VLANs
          • 33.3.2. E-Commerce Web Sites
          • 33.3.3. Small Networks
      • 34. IP Design
        • 34.1. Public Versus Private IP Space
        • 34.2. VLSM
        • 34.3. CIDR
        • 34.4. Allocating IP Network Space
        • 34.5. Allocating IP Subnets
          • 34.5.1. Sequential
          • 34.5.2. Divide by Half
          • 34.5.3. Reverse Binary
        • 34.6. IP Subnetting Made Easy
      • 35. Network Time Protocol
        • 35.1. What Is Accurate Time?
        • 35.2. NTP Design
        • 35.3. Configuring NTP
          • 35.3.1. NTP Client
          • 35.3.2. NTP Server
      • 36. Failures
        • 36.1. Human Error
        • 36.2. Multiple Component Failure
        • 36.3. Disaster Chains
        • 36.4. No Failover Testing
        • 36.5. Troubleshooting
          • 36.5.1. Remain Calm
          • 36.5.2. Log Your Actions
          • 36.5.3. Find Out What Changed
          • 36.5.4. Check the Physical Layer First!
          • 36.5.5. Assume Nothing; Prove Everything
          • 36.5.6. Isolate the Problem
          • 36.5.7. Don't Look for Zebras
          • 36.5.8. Do a Physical Audit
          • 36.5.9. Escalate
          • 36.5.10. Troubleshooting in a Team Environment
          • 36.5.11. The Janitor Principle
      • 37. GAD's Maxims
        • 37.1. Maxim #1
        • 37.2. Maxim #2
        • 37.3. Maxim #3
      • 38. Avoiding Frustration
        • 38.1. Why Everything Is Messed Up
        • 38.2. How to Sell Your Ideas to Management
        • 38.3. When to Upgrade and Why
          • 38.3.1. The Dangers of Upgrading
          • 38.3.2. Valid Reasons to Upgrade
        • 38.4. Why Change Control Is Your Friend
        • 38.5. How Not to Be a Computer Jerk
    • Index
    • About the Author
    • Colophon
    • SPECIAL OFFER: Upgrade this ebook with OReilly

Dodaj do koszyka Network Warrior

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2024 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.