Welcome to UE Central Library

Keep Smiling

A practical guide to advanced networking / (Record no. 19473)

MARC details
000 -LEADER
fixed length control field 07609cam a2200253 i 4500
001 - CONTROL NUMBER
control field 17549985
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20191217094222.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 121205s2013 inu 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780789749048
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789332515895 (hbk)
040 ## - CATALOGING SOURCE
Transcribing agency DLC
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.6
Edition number 23
Item number B3805
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Beasley, Jeffrey S.,
245 12 - TITLE STATEMENT
Title A practical guide to advanced networking /
Statement of responsibility, etc Jeffrey S. Beasley and Piyasat Nilkaew.
250 ## - EDITION STATEMENT
Edition statement 3rd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New Delhi :
Name of publisher, distributor, etc Pearson Education,
Date of publication, distribution, etc 2013
300 ## - PHYSICAL DESCRIPTION
Extent xxv, 504 p. :
Dimensions 27 cm +
Accompanying material 1 CD-ROM
500 ## - GENERAL NOTE
General note Includes index.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Design and construction
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internetworking (Telecommunication)
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Nilkaew, Piyasat.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Machine generated contents note: ch. 1 Network Infrastructure Design --<br/>Chapter Outline --<br/>Objectives --<br/>Key Terms --<br/>Introduction --<br/>1-1. Physical Network Design --<br/>Core --<br/>Distribution Layer --<br/>Access Layer --<br/>Data Flow --<br/>Selecting the Media --<br/>1-2. IP Subnet Design --<br/>IP Address Range --<br/>Determining the Number of Subnetworks Needed for the Network --<br/>Determining the Size or the Number of IP Host Addresses Needed for the Network --<br/>IP Assignment --<br/>1-3. VLAN Network --<br/>Virtual LAN (VLAN) --<br/>VLAN Configuration --<br/>VLAN Tagging --<br/>802.1Q Configuration --<br/>Networking Challenge: Static VLAN Configuration --<br/>Configuring the HP Procurve Switch --<br/>1-4. Routed Network --<br/>Router --<br/>Gateway Address --<br/>Network Segments --<br/>Multilayer Switch --<br/>Layer 3 Routed Networks --<br/>Routed Port Configuration --<br/>InterVLAN Routing Configuration --<br/>Serial and ATM Port Configuration --<br/>Summary --<br/>Questions and Problems --<br/>ch. 2 Advanced Router Configuration I --<br/>Chapter Outline --<br/>Objectives --<br/>Key Terms --<br/>Introduction --<br/>2-1. Configuring Static Routing --<br/>Gateway of Last Resort --<br/>Configuring Static Routes --<br/>Load Balancing and Redundancy --<br/>Networking Challenge --<br/>Static Routes --<br/>2-2. Dynamic Routing Protocols --<br/>Distance Vector Protocols --<br/>Link State Protocols --<br/>2-3. Configuring RIPv2 --<br/>Configuring Routes with RIP --<br/>Configuring Routes with RIP Version 2 --<br/>Networking Challenge --<br/>RIP --<br/>2-4. TFTP --<br/>Trivial File Transfer Protocol --<br/>Configuring TFTP --<br/>Summary --<br/>Questions and Problems --<br/>ch. 3 Advanced Router Configuration II --<br/>Chapter Outline --<br/>Objectives --<br/>Key Terms --<br/>Introduction --<br/>3-1. Configuring Link State Protocols --<br/>OSPF --<br/>Link State Protocols --<br/>Configuring Routes with OSPF --<br/>Load Balancing and Redundancy with OSPF --<br/>Networking Challenge --<br/>OSPF --<br/>3-2. Configuring Link State Protocols --<br/>IS-IS --<br/>Configuring Routes with IS-IS --<br/>Load Balancing and Redundancy with IS-IS --<br/>Networking Challenge: IS-IS --<br/>3-3. Configuring Hybrid Routing Protocols --<br/>EIGRP --<br/>Configuring Routes with EIGRP --<br/>Load Balancing and Redundancy --<br/>Networking Challenge: EIGRP --<br/>3-4. Advanced Routing Redistribution --<br/>Route Redistribution into RIP --<br/>Route Redistribution into OSPF --<br/>Route Redistribution into EIGRP --<br/>Route Redistribution into IS-IS --<br/>3-5. Analyzing OSPF "Hello" Packets --<br/>Summary --<br/>Questions and Problems --<br/>ch. 4 Configuring Juniper Routers --<br/>Chapter Outline --<br/>Objectives --<br/>Key Terms --<br/>Introduction --<br/>4-1. Operational Mode --<br/>4-2. Router Configuration Mode --<br/>Displaying the Router Interfaces --<br/>Hostname Configuration --<br/>Assigning an IP Address to an Interface --<br/>4-3. Configuring Routes On Juniper Routers --<br/>Configure STATIC Routes on Juniper Routers --<br/>Configure RIP on Juniper Routers --<br/>Configure OSPF on Juniper Routers --<br/>Configure IS-IS on Juniper Routers --<br/>4-4. Configuring Route Redistribution On Juniper Routers --<br/>Summary --<br/>Questions and Problems --<br/>ch. 5 Configuring And Managing The Netwoi Infrastructure --<br/>Chapter Outline --<br/>Objectives --<br/>Key Terms --<br/>Introduction --<br/>5-1. Domain Name And IP Assignment --<br/>5-2. Ip Management With DHCP --<br/>DHCP Data Packets --<br/>DHCP Deployment --<br/>5-3. Scaling The Network With Nat And Pat --<br/>Configuring NAT --<br/>5-4. Domain Name Service (DNS) --<br/>DNS Tree Hierarchy --<br/>DNS Resource Records --<br/>Summary --<br/>Questions and Problems --<br/>ch. 6 Analyzing Network Data Traffic --<br/>Chapter Outline --<br/>Objectives --<br/>Key Terms --<br/>INTRODUCTION --<br/>6-1. Protocol Analysis/Forensics --<br/>Basic TCP/UDP Forensics --<br/>ARP and ICMP --<br/>6-2. Wireshark Protocol Analyzer --<br/>Using Wireshark to Capture Packets --<br/>6-3. Analyzing Network Data Traffic --<br/>Configuring SNMP --<br/>NetFLow --<br/>6-4. Filtering --<br/>FTP Filtering --<br/>Right-Click Filtering Logic Rules --<br/>Filtering DHCP --<br/>Summary --<br/>Questions and Problems --<br/>ch. 7 Network Security --<br/>Chapter Outline --<br/>Objectives --<br/>Key Terms --<br/>Introduction --<br/>7-1. Denial Of Service --<br/>Distributed Denial of Service Attacks (DDoS) --<br/>7-2. Firewalls And Access Lists --<br/>Network Attack Prevention --<br/>Access Lists --<br/>7-3. Router Security --<br/>Router Access --<br/>Router Services --<br/>Router Logging and Access-List --<br/>7-4. Switch Security --<br/>Switch Port Security --<br/>Switch Special Features --<br/>7-5. Wireless Security --<br/>7-6. VPN Security --<br/>VPN Tunneling Protocols --<br/>Configuring a VPN Virtual Interface (Router to Router) --<br/>Troubleshooting the VPN Tunnel Link --<br/>Summary --<br/>Questions and Problems --<br/>ch. 8 IPv6 --<br/>Chapter Outline --<br/>Objectives --<br/>Key Terms --<br/>Introduction --<br/>8-1.Comparison of IPv6 and IPv4 --<br/>8-2. IPV6 ADDRESSING --<br/>8-3. IPv6 Network Settings --<br/>8-4. Configuring a Router for IPv6 --<br/>8-5. IPv6 Routing --<br/>IPv6: Static --<br/>IPv6: RIP --<br/>IPv6: OSPF --<br/>IPv6: EIGRP --<br/>IPv6: IS-IS --<br/>8-6. Troubleshooting IPv6 Connection --<br/>Summary --<br/>Questions and Problems --<br/>ch. 9 Linux Networking --<br/>Chapter Outline --<br/>Objectives --<br/>Key Terms --<br/>Introduction --<br/>9-1. Logging On To Linux --<br/>Adding a User Account --<br/>9-2. Linux File Structure And File Commands --<br/>Listing Files --<br/>Displaying File Contents --<br/>Directory Operations --<br/>File Operations --<br/>Permissions and Ownership --<br/>9-3. Linux Administration Commands --<br/>The man (manual) Command --<br/>The ps (processes) Command --<br/>Thesu (substitute user) Command --<br/>The mount Command --<br/>The shutdown Command --<br/>Linux Tips --<br/>9-4. Adding Applications To Linux --<br/>9-5. Linux Networking --<br/>Installing SSH --<br/>The FTP Client --<br/>DNS Service on Linux --<br/>Changing the Hostname --<br/>9-6. Troubleshooting System And Network Problems With Linux --<br/>Troubleshooting Boot Processes --<br/>Listing Users on the System --<br/>Network Security --<br/>Enabling and Disabling Boot Services --<br/>9-7. Managing The Linux System --<br/>Summary --<br/>Questions and Problems --<br/>ch. 10 Internet Routing --<br/>Chapter Outline --<br/>Objectives --<br/>Key Terms --<br/>Introduction --<br/>10-1. Internet Routing --<br/>BGP --<br/>Configuring a WAN Connection --<br/>Configuring an Internet Connection --<br/>10-2. Configuring BGP --<br/>Configuring BGP --<br/>Networking Challenge: BGP --<br/>10-3. BGP Best Path Selection --<br/>10-4. IPv6 Over The Internet --<br/>10-5. Configure BGP On Juniper Routers --<br/>Summary --<br/>Questions and Problems --<br/>ch. 11 Voice over IP --<br/>Chapter Outline --<br/>Objectives --<br/>Key Terms --<br/>Introduction --<br/>11-1. The Basics Of Voice Over IP --<br/>11-2. Voice Over IP Networks --<br/>Replacing an Existing PBX Tie Line --<br/>Upgrading Existing PBXs to Support IP Telephony --<br/>Switching to a Complete IP Telephony Solution --<br/>11-3. Quality Of Service --<br/>Jitter --<br/>Network Latency --<br/>Queuing --<br/>QOS Configuration Example --<br/>11-4. Analyzing VoIP Data Packets --<br/>Analyzing VoIP Telephone Call Data Packets --<br/>11-5. VoIP SECURITY --<br/>Summary --<br/>Questions and Problems.
Holdings
Withdrawn status Damaged status Not for loan Home library Current library Date acquired Source of acquisition Full call number Barcode Date last seen Price effective from Koha item type
      UE-Central Library UE-Central Library 17.12.2019 U.E. 004.6 B3805 T12963 17.12.2019 17.12.2019 Books
Copyright © 2023, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk