Welcome to UE Central Library

Keep Smiling

A practical guide to advanced networking / Jeffrey S. Beasley and Piyasat Nilkaew.

By: Contributor(s): Material type: TextTextPublication details: New Delhi : Pearson Education, 2013Edition: 3rd edDescription: xxv, 504 p. : 27 cm + 1 CD-ROMISBN:
  • 9780789749048
  • 9789332515895 (hbk)
Subject(s): DDC classification:
  • 004.6 23 B3805
Contents:
Machine generated contents note: ch. 1 Network Infrastructure Design -- Chapter Outline -- Objectives -- Key Terms -- Introduction -- 1-1. Physical Network Design -- Core -- Distribution Layer -- Access Layer -- Data Flow -- Selecting the Media -- 1-2. IP Subnet Design -- IP Address Range -- Determining the Number of Subnetworks Needed for the Network -- Determining the Size or the Number of IP Host Addresses Needed for the Network -- IP Assignment -- 1-3. VLAN Network -- Virtual LAN (VLAN) -- VLAN Configuration -- VLAN Tagging -- 802.1Q Configuration -- Networking Challenge: Static VLAN Configuration -- Configuring the HP Procurve Switch -- 1-4. Routed Network -- Router -- Gateway Address -- Network Segments -- Multilayer Switch -- Layer 3 Routed Networks -- Routed Port Configuration -- InterVLAN Routing Configuration -- Serial and ATM Port Configuration -- Summary -- Questions and Problems -- ch. 2 Advanced Router Configuration I -- Chapter Outline -- Objectives -- Key Terms -- Introduction -- 2-1. Configuring Static Routing -- Gateway of Last Resort -- Configuring Static Routes -- Load Balancing and Redundancy -- Networking Challenge -- Static Routes -- 2-2. Dynamic Routing Protocols -- Distance Vector Protocols -- Link State Protocols -- 2-3. Configuring RIPv2 -- Configuring Routes with RIP -- Configuring Routes with RIP Version 2 -- Networking Challenge -- RIP -- 2-4. TFTP -- Trivial File Transfer Protocol -- Configuring TFTP -- Summary -- Questions and Problems -- ch. 3 Advanced Router Configuration II -- Chapter Outline -- Objectives -- Key Terms -- Introduction -- 3-1. Configuring Link State Protocols -- OSPF -- Link State Protocols -- Configuring Routes with OSPF -- Load Balancing and Redundancy with OSPF -- Networking Challenge -- OSPF -- 3-2. Configuring Link State Protocols -- IS-IS -- Configuring Routes with IS-IS -- Load Balancing and Redundancy with IS-IS -- Networking Challenge: IS-IS -- 3-3. Configuring Hybrid Routing Protocols -- EIGRP -- Configuring Routes with EIGRP -- Load Balancing and Redundancy -- Networking Challenge: EIGRP -- 3-4. Advanced Routing Redistribution -- Route Redistribution into RIP -- Route Redistribution into OSPF -- Route Redistribution into EIGRP -- Route Redistribution into IS-IS -- 3-5. Analyzing OSPF "Hello" Packets -- Summary -- Questions and Problems -- ch. 4 Configuring Juniper Routers -- Chapter Outline -- Objectives -- Key Terms -- Introduction -- 4-1. Operational Mode -- 4-2. Router Configuration Mode -- Displaying the Router Interfaces -- Hostname Configuration -- Assigning an IP Address to an Interface -- 4-3. Configuring Routes On Juniper Routers -- Configure STATIC Routes on Juniper Routers -- Configure RIP on Juniper Routers -- Configure OSPF on Juniper Routers -- Configure IS-IS on Juniper Routers -- 4-4. Configuring Route Redistribution On Juniper Routers -- Summary -- Questions and Problems -- ch. 5 Configuring And Managing The Netwoi Infrastructure -- Chapter Outline -- Objectives -- Key Terms -- Introduction -- 5-1. Domain Name And IP Assignment -- 5-2. Ip Management With DHCP -- DHCP Data Packets -- DHCP Deployment -- 5-3. Scaling The Network With Nat And Pat -- Configuring NAT -- 5-4. Domain Name Service (DNS) -- DNS Tree Hierarchy -- DNS Resource Records -- Summary -- Questions and Problems -- ch. 6 Analyzing Network Data Traffic -- Chapter Outline -- Objectives -- Key Terms -- INTRODUCTION -- 6-1. Protocol Analysis/Forensics -- Basic TCP/UDP Forensics -- ARP and ICMP -- 6-2. Wireshark Protocol Analyzer -- Using Wireshark to Capture Packets -- 6-3. Analyzing Network Data Traffic -- Configuring SNMP -- NetFLow -- 6-4. Filtering -- FTP Filtering -- Right-Click Filtering Logic Rules -- Filtering DHCP -- Summary -- Questions and Problems -- ch. 7 Network Security -- Chapter Outline -- Objectives -- Key Terms -- Introduction -- 7-1. Denial Of Service -- Distributed Denial of Service Attacks (DDoS) -- 7-2. Firewalls And Access Lists -- Network Attack Prevention -- Access Lists -- 7-3. Router Security -- Router Access -- Router Services -- Router Logging and Access-List -- 7-4. Switch Security -- Switch Port Security -- Switch Special Features -- 7-5. Wireless Security -- 7-6. VPN Security -- VPN Tunneling Protocols -- Configuring a VPN Virtual Interface (Router to Router) -- Troubleshooting the VPN Tunnel Link -- Summary -- Questions and Problems -- ch. 8 IPv6 -- Chapter Outline -- Objectives -- Key Terms -- Introduction -- 8-1.Comparison of IPv6 and IPv4 -- 8-2. IPV6 ADDRESSING -- 8-3. IPv6 Network Settings -- 8-4. Configuring a Router for IPv6 -- 8-5. IPv6 Routing -- IPv6: Static -- IPv6: RIP -- IPv6: OSPF -- IPv6: EIGRP -- IPv6: IS-IS -- 8-6. Troubleshooting IPv6 Connection -- Summary -- Questions and Problems -- ch. 9 Linux Networking -- Chapter Outline -- Objectives -- Key Terms -- Introduction -- 9-1. Logging On To Linux -- Adding a User Account -- 9-2. Linux File Structure And File Commands -- Listing Files -- Displaying File Contents -- Directory Operations -- File Operations -- Permissions and Ownership -- 9-3. Linux Administration Commands -- The man (manual) Command -- The ps (processes) Command -- Thesu (substitute user) Command -- The mount Command -- The shutdown Command -- Linux Tips -- 9-4. Adding Applications To Linux -- 9-5. Linux Networking -- Installing SSH -- The FTP Client -- DNS Service on Linux -- Changing the Hostname -- 9-6. Troubleshooting System And Network Problems With Linux -- Troubleshooting Boot Processes -- Listing Users on the System -- Network Security -- Enabling and Disabling Boot Services -- 9-7. Managing The Linux System -- Summary -- Questions and Problems -- ch. 10 Internet Routing -- Chapter Outline -- Objectives -- Key Terms -- Introduction -- 10-1. Internet Routing -- BGP -- Configuring a WAN Connection -- Configuring an Internet Connection -- 10-2. Configuring BGP -- Configuring BGP -- Networking Challenge: BGP -- 10-3. BGP Best Path Selection -- 10-4. IPv6 Over The Internet -- 10-5. Configure BGP On Juniper Routers -- Summary -- Questions and Problems -- ch. 11 Voice over IP -- Chapter Outline -- Objectives -- Key Terms -- Introduction -- 11-1. The Basics Of Voice Over IP -- 11-2. Voice Over IP Networks -- Replacing an Existing PBX Tie Line -- Upgrading Existing PBXs to Support IP Telephony -- Switching to a Complete IP Telephony Solution -- 11-3. Quality Of Service -- Jitter -- Network Latency -- Queuing -- QOS Configuration Example -- 11-4. Analyzing VoIP Data Packets -- Analyzing VoIP Telephone Call Data Packets -- 11-5. VoIP SECURITY -- Summary -- Questions and Problems.
List(s) this item appears in: Computer | Computer_2022
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

Includes index.

Machine generated contents note: ch. 1 Network Infrastructure Design --
Chapter Outline --
Objectives --
Key Terms --
Introduction --
1-1. Physical Network Design --
Core --
Distribution Layer --
Access Layer --
Data Flow --
Selecting the Media --
1-2. IP Subnet Design --
IP Address Range --
Determining the Number of Subnetworks Needed for the Network --
Determining the Size or the Number of IP Host Addresses Needed for the Network --
IP Assignment --
1-3. VLAN Network --
Virtual LAN (VLAN) --
VLAN Configuration --
VLAN Tagging --
802.1Q Configuration --
Networking Challenge: Static VLAN Configuration --
Configuring the HP Procurve Switch --
1-4. Routed Network --
Router --
Gateway Address --
Network Segments --
Multilayer Switch --
Layer 3 Routed Networks --
Routed Port Configuration --
InterVLAN Routing Configuration --
Serial and ATM Port Configuration --
Summary --
Questions and Problems --
ch. 2 Advanced Router Configuration I --
Chapter Outline --
Objectives --
Key Terms --
Introduction --
2-1. Configuring Static Routing --
Gateway of Last Resort --
Configuring Static Routes --
Load Balancing and Redundancy --
Networking Challenge --
Static Routes --
2-2. Dynamic Routing Protocols --
Distance Vector Protocols --
Link State Protocols --
2-3. Configuring RIPv2 --
Configuring Routes with RIP --
Configuring Routes with RIP Version 2 --
Networking Challenge --
RIP --
2-4. TFTP --
Trivial File Transfer Protocol --
Configuring TFTP --
Summary --
Questions and Problems --
ch. 3 Advanced Router Configuration II --
Chapter Outline --
Objectives --
Key Terms --
Introduction --
3-1. Configuring Link State Protocols --
OSPF --
Link State Protocols --
Configuring Routes with OSPF --
Load Balancing and Redundancy with OSPF --
Networking Challenge --
OSPF --
3-2. Configuring Link State Protocols --
IS-IS --
Configuring Routes with IS-IS --
Load Balancing and Redundancy with IS-IS --
Networking Challenge: IS-IS --
3-3. Configuring Hybrid Routing Protocols --
EIGRP --
Configuring Routes with EIGRP --
Load Balancing and Redundancy --
Networking Challenge: EIGRP --
3-4. Advanced Routing Redistribution --
Route Redistribution into RIP --
Route Redistribution into OSPF --
Route Redistribution into EIGRP --
Route Redistribution into IS-IS --
3-5. Analyzing OSPF "Hello" Packets --
Summary --
Questions and Problems --
ch. 4 Configuring Juniper Routers --
Chapter Outline --
Objectives --
Key Terms --
Introduction --
4-1. Operational Mode --
4-2. Router Configuration Mode --
Displaying the Router Interfaces --
Hostname Configuration --
Assigning an IP Address to an Interface --
4-3. Configuring Routes On Juniper Routers --
Configure STATIC Routes on Juniper Routers --
Configure RIP on Juniper Routers --
Configure OSPF on Juniper Routers --
Configure IS-IS on Juniper Routers --
4-4. Configuring Route Redistribution On Juniper Routers --
Summary --
Questions and Problems --
ch. 5 Configuring And Managing The Netwoi Infrastructure --
Chapter Outline --
Objectives --
Key Terms --
Introduction --
5-1. Domain Name And IP Assignment --
5-2. Ip Management With DHCP --
DHCP Data Packets --
DHCP Deployment --
5-3. Scaling The Network With Nat And Pat --
Configuring NAT --
5-4. Domain Name Service (DNS) --
DNS Tree Hierarchy --
DNS Resource Records --
Summary --
Questions and Problems --
ch. 6 Analyzing Network Data Traffic --
Chapter Outline --
Objectives --
Key Terms --
INTRODUCTION --
6-1. Protocol Analysis/Forensics --
Basic TCP/UDP Forensics --
ARP and ICMP --
6-2. Wireshark Protocol Analyzer --
Using Wireshark to Capture Packets --
6-3. Analyzing Network Data Traffic --
Configuring SNMP --
NetFLow --
6-4. Filtering --
FTP Filtering --
Right-Click Filtering Logic Rules --
Filtering DHCP --
Summary --
Questions and Problems --
ch. 7 Network Security --
Chapter Outline --
Objectives --
Key Terms --
Introduction --
7-1. Denial Of Service --
Distributed Denial of Service Attacks (DDoS) --
7-2. Firewalls And Access Lists --
Network Attack Prevention --
Access Lists --
7-3. Router Security --
Router Access --
Router Services --
Router Logging and Access-List --
7-4. Switch Security --
Switch Port Security --
Switch Special Features --
7-5. Wireless Security --
7-6. VPN Security --
VPN Tunneling Protocols --
Configuring a VPN Virtual Interface (Router to Router) --
Troubleshooting the VPN Tunnel Link --
Summary --
Questions and Problems --
ch. 8 IPv6 --
Chapter Outline --
Objectives --
Key Terms --
Introduction --
8-1.Comparison of IPv6 and IPv4 --
8-2. IPV6 ADDRESSING --
8-3. IPv6 Network Settings --
8-4. Configuring a Router for IPv6 --
8-5. IPv6 Routing --
IPv6: Static --
IPv6: RIP --
IPv6: OSPF --
IPv6: EIGRP --
IPv6: IS-IS --
8-6. Troubleshooting IPv6 Connection --
Summary --
Questions and Problems --
ch. 9 Linux Networking --
Chapter Outline --
Objectives --
Key Terms --
Introduction --
9-1. Logging On To Linux --
Adding a User Account --
9-2. Linux File Structure And File Commands --
Listing Files --
Displaying File Contents --
Directory Operations --
File Operations --
Permissions and Ownership --
9-3. Linux Administration Commands --
The man (manual) Command --
The ps (processes) Command --
Thesu (substitute user) Command --
The mount Command --
The shutdown Command --
Linux Tips --
9-4. Adding Applications To Linux --
9-5. Linux Networking --
Installing SSH --
The FTP Client --
DNS Service on Linux --
Changing the Hostname --
9-6. Troubleshooting System And Network Problems With Linux --
Troubleshooting Boot Processes --
Listing Users on the System --
Network Security --
Enabling and Disabling Boot Services --
9-7. Managing The Linux System --
Summary --
Questions and Problems --
ch. 10 Internet Routing --
Chapter Outline --
Objectives --
Key Terms --
Introduction --
10-1. Internet Routing --
BGP --
Configuring a WAN Connection --
Configuring an Internet Connection --
10-2. Configuring BGP --
Configuring BGP --
Networking Challenge: BGP --
10-3. BGP Best Path Selection --
10-4. IPv6 Over The Internet --
10-5. Configure BGP On Juniper Routers --
Summary --
Questions and Problems --
ch. 11 Voice over IP --
Chapter Outline --
Objectives --
Key Terms --
Introduction --
11-1. The Basics Of Voice Over IP --
11-2. Voice Over IP Networks --
Replacing an Existing PBX Tie Line --
Upgrading Existing PBXs to Support IP Telephony --
Switching to a Complete IP Telephony Solution --
11-3. Quality Of Service --
Jitter --
Network Latency --
Queuing --
QOS Configuration Example --
11-4. Analyzing VoIP Data Packets --
Analyzing VoIP Telephone Call Data Packets --
11-5. VoIP SECURITY --
Summary --
Questions and Problems.

There are no comments on this title.

to post a comment.
Copyright © 2023, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk