Beasley, Jeffrey S.,

A practical guide to advanced networking / Jeffrey S. Beasley and Piyasat Nilkaew. - 3rd ed. - New Delhi : Pearson Education, 2013 - xxv, 504 p. : 27 cm + 1 CD-ROM

Includes index.

Machine generated contents note: ch. 1 Network Infrastructure Design --
Chapter Outline --
Objectives --
Key Terms --
Introduction --
1-1. Physical Network Design --
Core --
Distribution Layer --
Access Layer --
Data Flow --
Selecting the Media --
1-2. IP Subnet Design --
IP Address Range --
Determining the Number of Subnetworks Needed for the Network --
Determining the Size or the Number of IP Host Addresses Needed for the Network --
IP Assignment --
1-3. VLAN Network --
Virtual LAN (VLAN) --
VLAN Configuration --
VLAN Tagging --
802.1Q Configuration --
Networking Challenge: Static VLAN Configuration --
Configuring the HP Procurve Switch --
1-4. Routed Network --
Router --
Gateway Address --
Network Segments --
Multilayer Switch --
Layer 3 Routed Networks --
Routed Port Configuration --
InterVLAN Routing Configuration --
Serial and ATM Port Configuration --
Summary --
Questions and Problems --
ch. 2 Advanced Router Configuration I --
Chapter Outline --
Objectives --
Key Terms --
Introduction --
2-1. Configuring Static Routing --
Gateway of Last Resort --
Configuring Static Routes --
Load Balancing and Redundancy --
Networking Challenge --
Static Routes --
2-2. Dynamic Routing Protocols --
Distance Vector Protocols --
Link State Protocols --
2-3. Configuring RIPv2 --
Configuring Routes with RIP --
Configuring Routes with RIP Version 2 --
Networking Challenge --
RIP --
2-4. TFTP --
Trivial File Transfer Protocol --
Configuring TFTP --
Summary --
Questions and Problems --
ch. 3 Advanced Router Configuration II --
Chapter Outline --
Objectives --
Key Terms --
Introduction --
3-1. Configuring Link State Protocols --
OSPF --
Link State Protocols --
Configuring Routes with OSPF --
Load Balancing and Redundancy with OSPF --
Networking Challenge --
OSPF --
3-2. Configuring Link State Protocols --
IS-IS --
Configuring Routes with IS-IS --
Load Balancing and Redundancy with IS-IS --
Networking Challenge: IS-IS --
3-3. Configuring Hybrid Routing Protocols --
EIGRP --
Configuring Routes with EIGRP --
Load Balancing and Redundancy --
Networking Challenge: EIGRP --
3-4. Advanced Routing Redistribution --
Route Redistribution into RIP --
Route Redistribution into OSPF --
Route Redistribution into EIGRP --
Route Redistribution into IS-IS --
3-5. Analyzing OSPF "Hello" Packets --
Summary --
Questions and Problems --
ch. 4 Configuring Juniper Routers --
Chapter Outline --
Objectives --
Key Terms --
Introduction --
4-1. Operational Mode --
4-2. Router Configuration Mode --
Displaying the Router Interfaces --
Hostname Configuration --
Assigning an IP Address to an Interface --
4-3. Configuring Routes On Juniper Routers --
Configure STATIC Routes on Juniper Routers --
Configure RIP on Juniper Routers --
Configure OSPF on Juniper Routers --
Configure IS-IS on Juniper Routers --
4-4. Configuring Route Redistribution On Juniper Routers --
Summary --
Questions and Problems --
ch. 5 Configuring And Managing The Netwoi Infrastructure --
Chapter Outline --
Objectives --
Key Terms --
Introduction --
5-1. Domain Name And IP Assignment --
5-2. Ip Management With DHCP --
DHCP Data Packets --
DHCP Deployment --
5-3. Scaling The Network With Nat And Pat --
Configuring NAT --
5-4. Domain Name Service (DNS) --
DNS Tree Hierarchy --
DNS Resource Records --
Summary --
Questions and Problems --
ch. 6 Analyzing Network Data Traffic --
Chapter Outline --
Objectives --
Key Terms --
INTRODUCTION --
6-1. Protocol Analysis/Forensics --
Basic TCP/UDP Forensics --
ARP and ICMP --
6-2. Wireshark Protocol Analyzer --
Using Wireshark to Capture Packets --
6-3. Analyzing Network Data Traffic --
Configuring SNMP --
NetFLow --
6-4. Filtering --
FTP Filtering --
Right-Click Filtering Logic Rules --
Filtering DHCP --
Summary --
Questions and Problems --
ch. 7 Network Security --
Chapter Outline --
Objectives --
Key Terms --
Introduction --
7-1. Denial Of Service --
Distributed Denial of Service Attacks (DDoS) --
7-2. Firewalls And Access Lists --
Network Attack Prevention --
Access Lists --
7-3. Router Security --
Router Access --
Router Services --
Router Logging and Access-List --
7-4. Switch Security --
Switch Port Security --
Switch Special Features --
7-5. Wireless Security --
7-6. VPN Security --
VPN Tunneling Protocols --
Configuring a VPN Virtual Interface (Router to Router) --
Troubleshooting the VPN Tunnel Link --
Summary --
Questions and Problems --
ch. 8 IPv6 --
Chapter Outline --
Objectives --
Key Terms --
Introduction --
8-1.Comparison of IPv6 and IPv4 --
8-2. IPV6 ADDRESSING --
8-3. IPv6 Network Settings --
8-4. Configuring a Router for IPv6 --
8-5. IPv6 Routing --
IPv6: Static --
IPv6: RIP --
IPv6: OSPF --
IPv6: EIGRP --
IPv6: IS-IS --
8-6. Troubleshooting IPv6 Connection --
Summary --
Questions and Problems --
ch. 9 Linux Networking --
Chapter Outline --
Objectives --
Key Terms --
Introduction --
9-1. Logging On To Linux --
Adding a User Account --
9-2. Linux File Structure And File Commands --
Listing Files --
Displaying File Contents --
Directory Operations --
File Operations --
Permissions and Ownership --
9-3. Linux Administration Commands --
The man (manual) Command --
The ps (processes) Command --
Thesu (substitute user) Command --
The mount Command --
The shutdown Command --
Linux Tips --
9-4. Adding Applications To Linux --
9-5. Linux Networking --
Installing SSH --
The FTP Client --
DNS Service on Linux --
Changing the Hostname --
9-6. Troubleshooting System And Network Problems With Linux --
Troubleshooting Boot Processes --
Listing Users on the System --
Network Security --
Enabling and Disabling Boot Services --
9-7. Managing The Linux System --
Summary --
Questions and Problems --
ch. 10 Internet Routing --
Chapter Outline --
Objectives --
Key Terms --
Introduction --
10-1. Internet Routing --
BGP --
Configuring a WAN Connection --
Configuring an Internet Connection --
10-2. Configuring BGP --
Configuring BGP --
Networking Challenge: BGP --
10-3. BGP Best Path Selection --
10-4. IPv6 Over The Internet --
10-5. Configure BGP On Juniper Routers --
Summary --
Questions and Problems --
ch. 11 Voice over IP --
Chapter Outline --
Objectives --
Key Terms --
Introduction --
11-1. The Basics Of Voice Over IP --
11-2. Voice Over IP Networks --
Replacing an Existing PBX Tie Line --
Upgrading Existing PBXs to Support IP Telephony --
Switching to a Complete IP Telephony Solution --
11-3. Quality Of Service --
Jitter --
Network Latency --
Queuing --
QOS Configuration Example --
11-4. Analyzing VoIP Data Packets --
Analyzing VoIP Telephone Call Data Packets --
11-5. VoIP SECURITY --
Summary --
Questions and Problems.

9780789749048 9789332515895 (hbk)


Computer networks--Design and construction
Internetworking (Telecommunication)

004.6 / B3805