A practical guide to advanced networking / (Record no. 19473)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 07609cam a2200253 i 4500 |
001 - CONTROL NUMBER | |
control field | 17549985 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20191217094222.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 121205s2013 inu 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780789749048 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9789332515895 (hbk) |
040 ## - CATALOGING SOURCE | |
Transcribing agency | DLC |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 004.6 |
Edition number | 23 |
Item number | B3805 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Beasley, Jeffrey S., |
245 12 - TITLE STATEMENT | |
Title | A practical guide to advanced networking / |
Statement of responsibility, etc | Jeffrey S. Beasley and Piyasat Nilkaew. |
250 ## - EDITION STATEMENT | |
Edition statement | 3rd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | New Delhi : |
Name of publisher, distributor, etc | Pearson Education, |
Date of publication, distribution, etc | 2013 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxv, 504 p. : |
Dimensions | 27 cm + |
Accompanying material | 1 CD-ROM |
500 ## - GENERAL NOTE | |
General note | Includes index. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Design and construction |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Internetworking (Telecommunication) |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Nilkaew, Piyasat. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Machine generated contents note: ch. 1 Network Infrastructure Design --<br/>Chapter Outline --<br/>Objectives --<br/>Key Terms --<br/>Introduction --<br/>1-1. Physical Network Design --<br/>Core --<br/>Distribution Layer --<br/>Access Layer --<br/>Data Flow --<br/>Selecting the Media --<br/>1-2. IP Subnet Design --<br/>IP Address Range --<br/>Determining the Number of Subnetworks Needed for the Network --<br/>Determining the Size or the Number of IP Host Addresses Needed for the Network --<br/>IP Assignment --<br/>1-3. VLAN Network --<br/>Virtual LAN (VLAN) --<br/>VLAN Configuration --<br/>VLAN Tagging --<br/>802.1Q Configuration --<br/>Networking Challenge: Static VLAN Configuration --<br/>Configuring the HP Procurve Switch --<br/>1-4. Routed Network --<br/>Router --<br/>Gateway Address --<br/>Network Segments --<br/>Multilayer Switch --<br/>Layer 3 Routed Networks --<br/>Routed Port Configuration --<br/>InterVLAN Routing Configuration --<br/>Serial and ATM Port Configuration --<br/>Summary --<br/>Questions and Problems --<br/>ch. 2 Advanced Router Configuration I --<br/>Chapter Outline --<br/>Objectives --<br/>Key Terms --<br/>Introduction --<br/>2-1. Configuring Static Routing --<br/>Gateway of Last Resort --<br/>Configuring Static Routes --<br/>Load Balancing and Redundancy --<br/>Networking Challenge --<br/>Static Routes --<br/>2-2. Dynamic Routing Protocols --<br/>Distance Vector Protocols --<br/>Link State Protocols --<br/>2-3. Configuring RIPv2 --<br/>Configuring Routes with RIP --<br/>Configuring Routes with RIP Version 2 --<br/>Networking Challenge --<br/>RIP --<br/>2-4. TFTP --<br/>Trivial File Transfer Protocol --<br/>Configuring TFTP --<br/>Summary --<br/>Questions and Problems --<br/>ch. 3 Advanced Router Configuration II --<br/>Chapter Outline --<br/>Objectives --<br/>Key Terms --<br/>Introduction --<br/>3-1. Configuring Link State Protocols --<br/>OSPF --<br/>Link State Protocols --<br/>Configuring Routes with OSPF --<br/>Load Balancing and Redundancy with OSPF --<br/>Networking Challenge --<br/>OSPF --<br/>3-2. Configuring Link State Protocols --<br/>IS-IS --<br/>Configuring Routes with IS-IS --<br/>Load Balancing and Redundancy with IS-IS --<br/>Networking Challenge: IS-IS --<br/>3-3. Configuring Hybrid Routing Protocols --<br/>EIGRP --<br/>Configuring Routes with EIGRP --<br/>Load Balancing and Redundancy --<br/>Networking Challenge: EIGRP --<br/>3-4. Advanced Routing Redistribution --<br/>Route Redistribution into RIP --<br/>Route Redistribution into OSPF --<br/>Route Redistribution into EIGRP --<br/>Route Redistribution into IS-IS --<br/>3-5. Analyzing OSPF "Hello" Packets --<br/>Summary --<br/>Questions and Problems --<br/>ch. 4 Configuring Juniper Routers --<br/>Chapter Outline --<br/>Objectives --<br/>Key Terms --<br/>Introduction --<br/>4-1. Operational Mode --<br/>4-2. Router Configuration Mode --<br/>Displaying the Router Interfaces --<br/>Hostname Configuration --<br/>Assigning an IP Address to an Interface --<br/>4-3. Configuring Routes On Juniper Routers --<br/>Configure STATIC Routes on Juniper Routers --<br/>Configure RIP on Juniper Routers --<br/>Configure OSPF on Juniper Routers --<br/>Configure IS-IS on Juniper Routers --<br/>4-4. Configuring Route Redistribution On Juniper Routers --<br/>Summary --<br/>Questions and Problems --<br/>ch. 5 Configuring And Managing The Netwoi Infrastructure --<br/>Chapter Outline --<br/>Objectives --<br/>Key Terms --<br/>Introduction --<br/>5-1. Domain Name And IP Assignment --<br/>5-2. Ip Management With DHCP --<br/>DHCP Data Packets --<br/>DHCP Deployment --<br/>5-3. Scaling The Network With Nat And Pat --<br/>Configuring NAT --<br/>5-4. Domain Name Service (DNS) --<br/>DNS Tree Hierarchy --<br/>DNS Resource Records --<br/>Summary --<br/>Questions and Problems --<br/>ch. 6 Analyzing Network Data Traffic --<br/>Chapter Outline --<br/>Objectives --<br/>Key Terms --<br/>INTRODUCTION --<br/>6-1. Protocol Analysis/Forensics --<br/>Basic TCP/UDP Forensics --<br/>ARP and ICMP --<br/>6-2. Wireshark Protocol Analyzer --<br/>Using Wireshark to Capture Packets --<br/>6-3. Analyzing Network Data Traffic --<br/>Configuring SNMP --<br/>NetFLow --<br/>6-4. Filtering --<br/>FTP Filtering --<br/>Right-Click Filtering Logic Rules --<br/>Filtering DHCP --<br/>Summary --<br/>Questions and Problems --<br/>ch. 7 Network Security --<br/>Chapter Outline --<br/>Objectives --<br/>Key Terms --<br/>Introduction --<br/>7-1. Denial Of Service --<br/>Distributed Denial of Service Attacks (DDoS) --<br/>7-2. Firewalls And Access Lists --<br/>Network Attack Prevention --<br/>Access Lists --<br/>7-3. Router Security --<br/>Router Access --<br/>Router Services --<br/>Router Logging and Access-List --<br/>7-4. Switch Security --<br/>Switch Port Security --<br/>Switch Special Features --<br/>7-5. Wireless Security --<br/>7-6. VPN Security --<br/>VPN Tunneling Protocols --<br/>Configuring a VPN Virtual Interface (Router to Router) --<br/>Troubleshooting the VPN Tunnel Link --<br/>Summary --<br/>Questions and Problems --<br/>ch. 8 IPv6 --<br/>Chapter Outline --<br/>Objectives --<br/>Key Terms --<br/>Introduction --<br/>8-1.Comparison of IPv6 and IPv4 --<br/>8-2. IPV6 ADDRESSING --<br/>8-3. IPv6 Network Settings --<br/>8-4. Configuring a Router for IPv6 --<br/>8-5. IPv6 Routing --<br/>IPv6: Static --<br/>IPv6: RIP --<br/>IPv6: OSPF --<br/>IPv6: EIGRP --<br/>IPv6: IS-IS --<br/>8-6. Troubleshooting IPv6 Connection --<br/>Summary --<br/>Questions and Problems --<br/>ch. 9 Linux Networking --<br/>Chapter Outline --<br/>Objectives --<br/>Key Terms --<br/>Introduction --<br/>9-1. Logging On To Linux --<br/>Adding a User Account --<br/>9-2. Linux File Structure And File Commands --<br/>Listing Files --<br/>Displaying File Contents --<br/>Directory Operations --<br/>File Operations --<br/>Permissions and Ownership --<br/>9-3. Linux Administration Commands --<br/>The man (manual) Command --<br/>The ps (processes) Command --<br/>Thesu (substitute user) Command --<br/>The mount Command --<br/>The shutdown Command --<br/>Linux Tips --<br/>9-4. Adding Applications To Linux --<br/>9-5. Linux Networking --<br/>Installing SSH --<br/>The FTP Client --<br/>DNS Service on Linux --<br/>Changing the Hostname --<br/>9-6. Troubleshooting System And Network Problems With Linux --<br/>Troubleshooting Boot Processes --<br/>Listing Users on the System --<br/>Network Security --<br/>Enabling and Disabling Boot Services --<br/>9-7. Managing The Linux System --<br/>Summary --<br/>Questions and Problems --<br/>ch. 10 Internet Routing --<br/>Chapter Outline --<br/>Objectives --<br/>Key Terms --<br/>Introduction --<br/>10-1. Internet Routing --<br/>BGP --<br/>Configuring a WAN Connection --<br/>Configuring an Internet Connection --<br/>10-2. Configuring BGP --<br/>Configuring BGP --<br/>Networking Challenge: BGP --<br/>10-3. BGP Best Path Selection --<br/>10-4. IPv6 Over The Internet --<br/>10-5. Configure BGP On Juniper Routers --<br/>Summary --<br/>Questions and Problems --<br/>ch. 11 Voice over IP --<br/>Chapter Outline --<br/>Objectives --<br/>Key Terms --<br/>Introduction --<br/>11-1. The Basics Of Voice Over IP --<br/>11-2. Voice Over IP Networks --<br/>Replacing an Existing PBX Tie Line --<br/>Upgrading Existing PBXs to Support IP Telephony --<br/>Switching to a Complete IP Telephony Solution --<br/>11-3. Quality Of Service --<br/>Jitter --<br/>Network Latency --<br/>Queuing --<br/>QOS Configuration Example --<br/>11-4. Analyzing VoIP Data Packets --<br/>Analyzing VoIP Telephone Call Data Packets --<br/>11-5. VoIP SECURITY --<br/>Summary --<br/>Questions and Problems. |
Withdrawn status | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
UE-Central Library | UE-Central Library | 17.12.2019 | U.E. | 004.6 B3805 | T12963 | 17.12.2019 | 17.12.2019 | Books |