Cisco Networking Simplified, Second Edition / Edition 2
  • Cisco Networking Simplified, Second Edition / Edition 2
  • Cisco Networking Simplified, Second Edition / Edition 2

Cisco Networking Simplified, Second Edition / Edition 2

by Neil Anderson, Jim Doherty, Paul Della Maggiora

Cisco Networking Simplified
Second Edition

  • Master today’s world of Cisco networking with this book’s completely updated, fully illustrated visual approach
  • Easy enough for novices, substantive enough for networking professionals
  • Covers the latest networking topics—from network architecture to secure wireless, unified

See more details below


Cisco Networking Simplified
Second Edition

  • Master today’s world of Cisco networking with this book’s completely updated, fully illustrated visual approach
  • Easy enough for novices, substantive enough for networking professionals
  • Covers the latest networking topics—from network architecture to secure wireless, unified communications to telepresence

In Full Color

Jim Doherty • Neil Anderson • Paul Della Maggiora

Now 100 percent updated for the latest technologies, this is today’s easiest, most visual guide to Cisco® networking. Even if you’ve never set up or managed a network, Cisco Networking Simplified, Second Edition, helps you quickly master the concepts you need to understand. Its full-color diagrams and clear explanations give you the big picture: how each important networking technology works, what it can do for you, and how they all fit together. The authors illuminate networking from the smallest LANs to the largest enterprise infrastructures, offering practical introductions to key issues ranging from security to availability, mobility to virtualization.

What you always wanted to know about networking but were afraid to ask!

  • How networks and the Internet work
  • How to build coherent, cost-effective network infrastructures
  • How to design networks for maximum reliability and availability
  • What you need to know about data center and application networking
  • How to secure networks against today’s threats and attacks
  • How to take advantage of the latest mobility technologies
  • How virtualizing networks can help businesses leverage their network investments even further
  • How to combine messaging, calendaring, telephony, audio, video, and web conferencing into a unified communications architecture

This book is part of the Networking Technology Series from Cisco Press®, the only authorized publisher for Cisco®.

Category: Cisco

Covers: General Networking

Read More

Product Details

Cisco Press
Publication date:
Networking Technology
Sales rank:
Product dimensions:
8.43(w) x 10.75(h) x 0.60(d)

Table of Contents


Part I: Networking Fundamentals

How Computers Communicate

The OSI Model

Open Versus Proprietary Systems

Seven Layers

At-a-Glance: OSI Model

Internet Infrastructure: How It All Connects

TCP/IP and IP Addressing

Computers Speaking the Same Language

What Is an Address?

Dynamically Allocated IP Addresses

Domain Names and Relationship to IP Addresses

Matching Domain Names to IP Addresses

At-a-Glance: TCP/IP

At-a-Glance: IP Addressing

At-a-Glance: IPv6


Internet Applications

The Internet and Its Applications


Web Browsing


Peer-to-Peer Sharing

Part II: Networking Infrastructure


History of Ethernet

What Is Ethernet?

Evolution of Ethernet

At-a-Glance: Ethernet

Reducing Collisions on Ethernet

LAN Switching

Fast Computers Need Faster Networks

Switching Basics: It’s a Bridge

Switching Ethernets

Switches Take Over the World

At-a-Glance: Switching

Spanning Tree

Network Loops

Sometimes, the Earth Is Flat

Preventing Network Loops

Spanning-Tree Fundamentals

At-a-Glance: Spanning Tree



Routers Talk Among Themselves to Find Routes

Routers Route Packets

Routers Bridge and Switches Route

At-a-Glance: Routing

Routing and Switching

Part III: Network Design

Campus Networks and Hierarchical Design

Building Networks for Ease of Use

At-a-Glance: Hierarchical Campus Design

WAN Network Design

Moving Traffic Across the Street and the World

WAN Services

Integrated Services Digital Network

Frame Relay




Virtual Private Networks (VPN)

WAN Devices

At-a-Glance: Frame Relay

At-a-Glance: Asynchronous Transfer Mode (ATM)

Multiprotocol Label Switching (MPLS) Services

At-a-Glance: MPLS

MPLS Traffic Separation

Broadband Technologies

Always-on Access

Broadband Technology Evolution

At-a-Glance: ISDN

At-a-Glance: Broadband

Virtual Private Networks

Secure Networking Over the Internet

At-a-Glance: VPNs

Establishing a VPN Connection

At-a-Glance: Encryption

Client Authentication

Optical Technologies

LANs, WANs—and Now MANs


At-a-Glance: Metro Optical

Branch Office Network Designs

Distributed Workforce

Distributed Office Challenges

At-a-Glance: Branch Office Design

Part IV: Network Availability

High Availability

At-a-Glance: High Availability

Control Plane

When Good Networks Go Bad

Control Plane Protection

At-a-Glance: Control Plane Protection

Quality of Service and Network Availability

Quality of Service as Network Protection?

Scavenger QoS

At-a-Glance: QoS for Network Resiliency

Disaster Recovery

What Happens When the Network Stops Working

DR Planning

Resiliency and Backup Services

Preparedness Testing

At-a-Glance: Disaster Recovery: Business Continuance

Disaster Recovery

Network Management

Keeping the Network Alive from Afar

Network Documentation: A Must-Have

Network-Management Protocols

Troubleshooting Tools

At-a-Glance: Network Management

Network Management

Part V: Securing the Network

Network Security


Perimeter Security

Data Privacy

Security Monitoring

Policy Enforcement

At-a-Glance: Network Security

At-a-Glance: Hacking

DoS Attacks

Snooping and Spoofing


Protecting the Perimeter

Get Off the Net!

Firewall for Your Protection

Personal Firewalls

At-a-Glance: Firewalls and IDS

Firewalls and IDS

Access and Content Security

Intrusion Prevention Systems

Intrusion Detection Systems

Intrusion Prevention Systems

The Problem with False Positives

At-a-Glance: Intrusion Detection

Port-Based Security

Combating Access-Based Attacks

At-a-Glance: Port-Based Security

Identity-Based Networking

Network Access Conundrum

Identity-Based Networking


At-a-Glance: Identity


Network Admission Control

Combating Virus Outbreaks

Assessing Device “Health”

Network Admission Control

At-a-Glance: NAC

URL Filtering: Eliminating Unwanted Web Page Access

Internet Access and Liability Issues

Enforcing Corporate Internet Usage Policies

At-a-Glance: URL Filtering

URL Filtering and Firewalls

Deep Packet Inspection: Controlling Unwanted Applications

How Do You Catch a Criminal When Everyone Wears a Mask?

Deep Packet Inspection

At-a-Glance: Deep Packet Inspection

Packet Inspection

Telemetry: Identifying and Isolating Attack Sources

Normal or Abnormal

Using Telemetry to Combat Attacks

At-a-Glance: Telemetry

Physical Security: IP Video Surveillance

Locks on the Doors

Video Surveillance

At-a-Glance: Physical Security

Physical and Logical Security

Part VI: Data Centers and Application Networking

Moving Data Efficiently

Data Centers

Store Once, Use Often

n-Tier Model

Functions and Requirements

At-a-Glance: Data Centers

Data Center Application: Corporate Expense System

Storage Area Networks

Efficient Deployment of Critical Data

Fiber Channel and IP


At-a-Glance: Storage Networking

Server-Centric Storage


Moving Content Close to the User

How Caching Works

Caching More Than Web Pages

Storage Caching: From Disk to Memory

Issues Affecting Caching


Wide Area File Services

Branch Offices Rule

Centralizing Storage

Enter Wide Area File Services (WAFS)

At-a-Glance: Wide Area File Services

Wide Area Application Services

Centralizing Applications

Enter Wide Area Application Services (WAAS)

At-a-Glance: Wide Area Application Services

Part VII: Unified Communications

Voice over IP

Making Calls over the Web

Unifying Communications

Client Layer

Infrastructure Layer

Call-Processing Layer

Application Layer

Deployment Models

At-a-Glance: Voice over IP

Voice over IP

At-a-Glance: Unified Communications

Voice over IP: Toll Bypass

Quality of Service

Converged Networks and QoS

What Is QoS?

QoS and Unified Communications

At-a-Glance: QoS

How Packets Are Prioritized

Unified Personal Communications

Too Many Communications, Too Little Time

Unify Me

Cisco Unified Personal Communicator (CUPC)

At-a-Glance: Unified Communications

Meeting Collaboration Spaces

Meetings, Meetings, Meetings

Meetings Are an Activity, Not a Place

At-a-Glance: Meeting Collaboration

Traditional Videoconferencing

I See You

Video over IP Networks

At-a-Glance: IP Videoconferencing


Videoconferencing Application E-Learning


Conferencing Gets Simple

Video Killed the Radio Star

The Next-Best Thing to Being There

At-a-Glance: Telepresence

Presence and Location-Aware Services

I Sense a Presence

The Importance of Location

At-a-Glance: Presence and Location-Aware Services

IP Call Center

Why Can’t I Talk to a Real Person?

Anatomy of a Contact Center

From the Caller to the Agent, and Back Again

Managing Caller and Contact Agent Efficiency

New Methods for Customer Interaction

At-a-Glance: IP Contact Center

Call-Center Tech Support

Call-Center Telemarketing

Multicast and IPTV Broadcasts

Watching Movies Without Flooding the World

At-a-Glance: IP Multicast


Part VIII: Mobility

Wireless World

Mobility and Wireless Networks

Throwing Away the Ties That Bind

At-a-Glance: Wireless LANs

Wired LANs

Wireless LANs

Selecting and Building Wireless Networks

Designing a Wireless Network

At-a-Glance: Designing Wi-Fi Networks

Securing Wireless Networks

Locking Down Wireless

Balancing Security and Access

At-a-Glance: Securing Wi-Fi

Outdoor and Municipal Wireless Networks

It’s Just Like a Building, Only Way Bigger

At-a-Glance: Municipal Wi-Fi

VoIP over Wireless Networks

Wireless VoIP

At-a-Glance: Wireless VoIP

Wireless VoIP

Wireless Guest Access

Mi Casa Es Su Casa

At-a-Glance: Wireless Guest Access

RFID and Location-Based Services

Finding Your Stuff

Wireless LANS: They’re Not Just for Checking E-Mail on the Toilet Anymore!

At-a-Glance: Location-Based Services

Wireless Location Services

Part IX: Virtualized Networks

Virtualizing Data Centers

Growth of the Data Center

Data Center Virtualization

At-a-Glance: Virtual Data Centers

Virtualizing Network Infrastructure

Leveraging Network Investment

A Network Is a Network

Virtualizing Network Infrastructure

At-a-Glance: Virtual Network Infrastructure

Applications of Virtualized Networks

What Can You Do with Virtualized Networks?

Corporate Employee “Clean” and “Dirty” Networks

Guest and Partner Networks

Isolating Specialized Devices and Applications

Load Balancing

Providing Hosted Networks to Entities Within Entities

Departmental Virtual Networks

Challenges with Virtual Networks

At-a-Glance: Virtualized Network Applications

Evolution of Virtual Networks

1587201992 TOC 11/19/2007

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network


Most Helpful Customer Reviews

See all customer reviews >