TY - BOOK AU - Beasley,Jeffrey S. AU - Nilkaew,Piyasat TI - A practical guide to advanced networking SN - 9780789749048 U1 - 004.6 23 PY - 2013/// CY - New Delhi PB - Pearson Education KW - Computer networks KW - Design and construction KW - Internetworking (Telecommunication) N1 - Includes index; Machine generated contents note: ch. 1 Network Infrastructure Design -- Chapter Outline -- Objectives -- Key Terms -- Introduction -- 1-1. Physical Network Design -- Core -- Distribution Layer -- Access Layer -- Data Flow -- Selecting the Media -- 1-2. IP Subnet Design -- IP Address Range -- Determining the Number of Subnetworks Needed for the Network -- Determining the Size or the Number of IP Host Addresses Needed for the Network -- IP Assignment -- 1-3. VLAN Network -- Virtual LAN (VLAN) -- VLAN Configuration -- VLAN Tagging -- 802.1Q Configuration -- Networking Challenge: Static VLAN Configuration -- Configuring the HP Procurve Switch -- 1-4. Routed Network -- Router -- Gateway Address -- Network Segments -- Multilayer Switch -- Layer 3 Routed Networks -- Routed Port Configuration -- InterVLAN Routing Configuration -- Serial and ATM Port Configuration -- Summary -- Questions and Problems -- ch. 2 Advanced Router Configuration I -- Chapter Outline -- Objectives -- Key Terms -- Introduction -- 2-1. Configuring Static Routing -- Gateway of Last Resort -- Configuring Static Routes -- Load Balancing and Redundancy -- Networking Challenge -- Static Routes -- 2-2. Dynamic Routing Protocols -- Distance Vector Protocols -- Link State Protocols -- 2-3. Configuring RIPv2 -- Configuring Routes with RIP -- Configuring Routes with RIP Version 2 -- Networking Challenge -- RIP -- 2-4. TFTP -- Trivial File Transfer Protocol -- Configuring TFTP -- Summary -- Questions and Problems -- ch. 3 Advanced Router Configuration II -- Chapter Outline -- Objectives -- Key Terms -- Introduction -- 3-1. Configuring Link State Protocols -- OSPF -- Link State Protocols -- Configuring Routes with OSPF -- Load Balancing and Redundancy with OSPF -- Networking Challenge -- OSPF -- 3-2. Configuring Link State Protocols -- IS-IS -- Configuring Routes with IS-IS -- Load Balancing and Redundancy with IS-IS -- Networking Challenge: IS-IS -- 3-3. Configuring Hybrid Routing Protocols -- EIGRP -- Configuring Routes with EIGRP -- Load Balancing and Redundancy -- Networking Challenge: EIGRP -- 3-4. Advanced Routing Redistribution -- Route Redistribution into RIP -- Route Redistribution into OSPF -- Route Redistribution into EIGRP -- Route Redistribution into IS-IS -- 3-5. Analyzing OSPF "Hello" Packets -- Summary -- Questions and Problems -- ch. 4 Configuring Juniper Routers -- Chapter Outline -- Objectives -- Key Terms -- Introduction -- 4-1. Operational Mode -- 4-2. Router Configuration Mode -- Displaying the Router Interfaces -- Hostname Configuration -- Assigning an IP Address to an Interface -- 4-3. Configuring Routes On Juniper Routers -- Configure STATIC Routes on Juniper Routers -- Configure RIP on Juniper Routers -- Configure OSPF on Juniper Routers -- Configure IS-IS on Juniper Routers -- 4-4. Configuring Route Redistribution On Juniper Routers -- Summary -- Questions and Problems -- ch. 5 Configuring And Managing The Netwoi Infrastructure -- Chapter Outline -- Objectives -- Key Terms -- Introduction -- 5-1. Domain Name And IP Assignment -- 5-2. Ip Management With DHCP -- DHCP Data Packets -- DHCP Deployment -- 5-3. Scaling The Network With Nat And Pat -- Configuring NAT -- 5-4. Domain Name Service (DNS) -- DNS Tree Hierarchy -- DNS Resource Records -- Summary -- Questions and Problems -- ch. 6 Analyzing Network Data Traffic -- Chapter Outline -- Objectives -- Key Terms -- INTRODUCTION -- 6-1. Protocol Analysis/Forensics -- Basic TCP/UDP Forensics -- ARP and ICMP -- 6-2. Wireshark Protocol Analyzer -- Using Wireshark to Capture Packets -- 6-3. Analyzing Network Data Traffic -- Configuring SNMP -- NetFLow -- 6-4. Filtering -- FTP Filtering -- Right-Click Filtering Logic Rules -- Filtering DHCP -- Summary -- Questions and Problems -- ch. 7 Network Security -- Chapter Outline -- Objectives -- Key Terms -- Introduction -- 7-1. Denial Of Service -- Distributed Denial of Service Attacks (DDoS) -- 7-2. Firewalls And Access Lists -- Network Attack Prevention -- Access Lists -- 7-3. Router Security -- Router Access -- Router Services -- Router Logging and Access-List -- 7-4. Switch Security -- Switch Port Security -- Switch Special Features -- 7-5. Wireless Security -- 7-6. VPN Security -- VPN Tunneling Protocols -- Configuring a VPN Virtual Interface (Router to Router) -- Troubleshooting the VPN Tunnel Link -- Summary -- Questions and Problems -- ch. 8 IPv6 -- Chapter Outline -- Objectives -- Key Terms -- Introduction -- 8-1.Comparison of IPv6 and IPv4 -- 8-2. IPV6 ADDRESSING -- 8-3. IPv6 Network Settings -- 8-4. Configuring a Router for IPv6 -- 8-5. IPv6 Routing -- IPv6: Static -- IPv6: RIP -- IPv6: OSPF -- IPv6: EIGRP -- IPv6: IS-IS -- 8-6. Troubleshooting IPv6 Connection -- Summary -- Questions and Problems -- ch. 9 Linux Networking -- Chapter Outline -- Objectives -- Key Terms -- Introduction -- 9-1. Logging On To Linux -- Adding a User Account -- 9-2. Linux File Structure And File Commands -- Listing Files -- Displaying File Contents -- Directory Operations -- File Operations -- Permissions and Ownership -- 9-3. Linux Administration Commands -- The man (manual) Command -- The ps (processes) Command -- Thesu (substitute user) Command -- The mount Command -- The shutdown Command -- Linux Tips -- 9-4. Adding Applications To Linux -- 9-5. Linux Networking -- Installing SSH -- The FTP Client -- DNS Service on Linux -- Changing the Hostname -- 9-6. Troubleshooting System And Network Problems With Linux -- Troubleshooting Boot Processes -- Listing Users on the System -- Network Security -- Enabling and Disabling Boot Services -- 9-7. Managing The Linux System -- Summary -- Questions and Problems -- ch. 10 Internet Routing -- Chapter Outline -- Objectives -- Key Terms -- Introduction -- 10-1. Internet Routing -- BGP -- Configuring a WAN Connection -- Configuring an Internet Connection -- 10-2. Configuring BGP -- Configuring BGP -- Networking Challenge: BGP -- 10-3. BGP Best Path Selection -- 10-4. IPv6 Over The Internet -- 10-5. Configure BGP On Juniper Routers -- Summary -- Questions and Problems -- ch. 11 Voice over IP -- Chapter Outline -- Objectives -- Key Terms -- Introduction -- 11-1. The Basics Of Voice Over IP -- 11-2. Voice Over IP Networks -- Replacing an Existing PBX Tie Line -- Upgrading Existing PBXs to Support IP Telephony -- Switching to a Complete IP Telephony Solution -- 11-3. Quality Of Service -- Jitter -- Network Latency -- Queuing -- QOS Configuration Example -- 11-4. Analyzing VoIP Data Packets -- Analyzing VoIP Telephone Call Data Packets -- 11-5. VoIP SECURITY -- Summary -- Questions and Problems ER -