Cisco Networking Simplified, Second Edition / Edition 2

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $9.88
Usually ships in 1-2 business days
(Save 82%)
Other sellers (Paperback)
  • All (12) from $9.88   
  • New (4) from $29.27   
  • Used (8) from $9.88   

Overview

Cisco Networking Simplified
Second Edition

  • Master today’s world of Cisco networking with this book’s completely updated, fully illustrated visual approach
  • Easy enough for novices, substantive enough for networking professionals
  • Covers the latest networking topics—from network architecture to secure wireless, unified communications to telepresence

In Full Color

Jim Doherty • Neil Anderson • Paul Della Maggiora

Now 100 percent updated for the latest technologies, this is today’s easiest, most visual guide to Cisco® networking. Even if you’ve never set up or managed a network, Cisco Networking Simplified, Second Edition, helps you quickly master the concepts you need to understand. Its full-color diagrams and clear explanations give you the big picture: how each important networking technology works, what it can do for you, and how they all fit together. The authors illuminate networking from the smallest LANs to the largest enterprise infrastructures, offering practical introductions to key issues ranging from security to availability, mobility to virtualization.

What you always wanted to know about networking but were afraid to ask!

  • How networks and the Internet work
  • How to build coherent, cost-effective network infrastructures
  • How to design networks for maximum reliability and availability
  • What you need to know about data center and application networking
  • How to secure networks against today’s threats and attacks
  • How to take advantage of the latest mobility technologies
  • How virtualizing networks can help businesses leverage their network investments even further
  • How to combine messaging, calendaring, telephony, audio, video, and web conferencing into a unified communications architecture

This book is part of the Networking Technology Series from Cisco Press®, the only authorized publisher for Cisco®.

Category: Cisco

Covers: General Networking

Read More Show Less

Product Details

  • ISBN-13: 9781587201998
  • Publisher: Cisco Press
  • Publication date: 1/1/2008
  • Series: Networking Technology
  • Edition number: 2
  • Pages: 432
  • Sales rank: 679,050
  • Product dimensions: 8.43 (w) x 10.75 (h) x 0.60 (d)

Meet the Author

Jim Doherty is the Chief Marketing Officer at CipherOptics. Before joining the CipherOptics team, he held leadership positions with Symbol Technologies and Cisco Systems. He has more than 16 years of technical marketing and engineering experience and has led various marketing campaigns for IP telephony, routing and switching solutions, and network security solutions. He is the coauthor of the Networking Simplifiedseries, published by Cisco Press. He is a former Marine Corps sergeant. He holds a B.S. in electrical engineering from North Carolina State University and an MBA from Duke University.

Neil Anderson is the Senior Manager of Technology Systems Engineering with Cisco Systems. He has more than 20 years of broad engineering experience, including public telephone systems, mobile phone systems, Internet, and home networking. At Cisco, his focus is on business networks in the areas of network architecture, wireless, security, unified communications, and emerging technologies. He is the coauthor of the Networking Simplified series, published by Cisco Press. He holds a B.S. in computer science.

Read More Show Less

Table of Contents

Introduction

Part I: Networking Fundamentals

How Computers Communicate

The OSI Model

Open Versus Proprietary Systems

Seven Layers

At-a-Glance: OSI Model

Internet Infrastructure: How It All Connects

TCP/IP and IP Addressing

Computers Speaking the Same Language

What Is an Address?

Dynamically Allocated IP Addresses

Domain Names and Relationship to IP Addresses

Matching Domain Names to IP Addresses

At-a-Glance: TCP/IP

At-a-Glance: IP Addressing

At-a-Glance: IPv6

NAT and PAT

Internet Applications

The Internet and Its Applications

E-Mail

Web Browsing

E-Mail

Peer-to-Peer Sharing

Part II: Networking Infrastructure

Ethernet

History of Ethernet

What Is Ethernet?

Evolution of Ethernet

At-a-Glance: Ethernet

Reducing Collisions on Ethernet

LAN Switching

Fast Computers Need Faster Networks

Switching Basics: It’s a Bridge

Switching Ethernets

Switches Take Over the World

At-a-Glance: Switching

Spanning Tree

Network Loops

Sometimes, the Earth Is Flat

Preventing Network Loops

Spanning-Tree Fundamentals

At-a-Glance: Spanning Tree

Routing

Routers

Routers Talk Among Themselves to Find Routes

Routers Route Packets

Routers Bridge and Switches Route

At-a-Glance: Routing

Routing and Switching

Part III: Network Design

Campus Networks and Hierarchical Design

Building Networks for Ease of Use

At-a-Glance: Hierarchical Campus Design

WAN Network Design

Moving Traffic Across the Street and the World

WAN Services

Integrated Services Digital Network

Frame Relay

ATM

MPLS

Broadband

Virtual Private Networks (VPN)

WAN Devices

At-a-Glance: Frame Relay

At-a-Glance: Asynchronous Transfer Mode (ATM)

Multiprotocol Label Switching (MPLS) Services

At-a-Glance: MPLS

MPLS Traffic Separation

Broadband Technologies

Always-on Access

Broadband Technology Evolution

At-a-Glance: ISDN

At-a-Glance: Broadband

Virtual Private Networks

Secure Networking Over the Internet

At-a-Glance: VPNs

Establishing a VPN Connection

At-a-Glance: Encryption

Client Authentication

Optical Technologies

LANs, WANs—and Now MANs

SONET, DWDM, and DPT

At-a-Glance: Metro Optical

Branch Office Network Designs

Distributed Workforce

Distributed Office Challenges

At-a-Glance: Branch Office Design

Part IV: Network Availability

High Availability

At-a-Glance: High Availability

Control Plane

When Good Networks Go Bad

Control Plane Protection

At-a-Glance: Control Plane Protection

Quality of Service and Network Availability

Quality of Service as Network Protection?

Scavenger QoS

At-a-Glance: QoS for Network Resiliency

Disaster Recovery

What Happens When the Network Stops Working

DR Planning

Resiliency and Backup Services

Preparedness Testing

At-a-Glance: Disaster Recovery: Business Continuance

Disaster Recovery

Network Management

Keeping the Network Alive from Afar

Network Documentation: A Must-Have

Network-Management Protocols

Troubleshooting Tools

At-a-Glance: Network Management

Network Management

Part V: Securing the Network

Network Security

Identity

Perimeter Security

Data Privacy

Security Monitoring

Policy Enforcement

At-a-Glance: Network Security

At-a-Glance: Hacking

DoS Attacks

Snooping and Spoofing

Firewalls

Protecting the Perimeter

Get Off the Net!

Firewall for Your Protection

Personal Firewalls

At-a-Glance: Firewalls and IDS

Firewalls and IDS

Access and Content Security

Intrusion Prevention Systems

Intrusion Detection Systems

Intrusion Prevention Systems

The Problem with False Positives

At-a-Glance: Intrusion Detection

Port-Based Security

Combating Access-Based Attacks

At-a-Glance: Port-Based Security

Identity-Based Networking

Network Access Conundrum

Identity-Based Networking

802.1x

At-a-Glance: Identity

Authentication

Network Admission Control

Combating Virus Outbreaks

Assessing Device “Health”

Network Admission Control

At-a-Glance: NAC

URL Filtering: Eliminating Unwanted Web Page Access

Internet Access and Liability Issues

Enforcing Corporate Internet Usage Policies

At-a-Glance: URL Filtering

URL Filtering and Firewalls

Deep Packet Inspection: Controlling Unwanted Applications

How Do You Catch a Criminal When Everyone Wears a Mask?

Deep Packet Inspection

At-a-Glance: Deep Packet Inspection

Packet Inspection

Telemetry: Identifying and Isolating Attack Sources

Normal or Abnormal

Using Telemetry to Combat Attacks

At-a-Glance: Telemetry

Physical Security: IP Video Surveillance

Locks on the Doors

Video Surveillance

At-a-Glance: Physical Security

Physical and Logical Security

Part VI: Data Centers and Application Networking

Moving Data Efficiently

Data Centers

Store Once, Use Often

n-Tier Model

Functions and Requirements

At-a-Glance: Data Centers

Data Center Application: Corporate Expense System

Storage Area Networks

Efficient Deployment of Critical Data

Fiber Channel and IP

Infiniband

At-a-Glance: Storage Networking

Server-Centric Storage

Caching

Moving Content Close to the User

How Caching Works

Caching More Than Web Pages

Storage Caching: From Disk to Memory

Issues Affecting Caching

Caching

Wide Area File Services

Branch Offices Rule

Centralizing Storage

Enter Wide Area File Services (WAFS)

At-a-Glance: Wide Area File Services

Wide Area Application Services

Centralizing Applications

Enter Wide Area Application Services (WAAS)

At-a-Glance: Wide Area Application Services

Part VII: Unified Communications

Voice over IP

Making Calls over the Web

Unifying Communications

Client Layer

Infrastructure Layer

Call-Processing Layer

Application Layer

Deployment Models

At-a-Glance: Voice over IP

Voice over IP

At-a-Glance: Unified Communications

Voice over IP: Toll Bypass

Quality of Service

Converged Networks and QoS

What Is QoS?

QoS and Unified Communications

At-a-Glance: QoS

How Packets Are Prioritized

Unified Personal Communications

Too Many Communications, Too Little Time

Unify Me

Cisco Unified Personal Communicator (CUPC)

At-a-Glance: Unified Communications

Meeting Collaboration Spaces

Meetings, Meetings, Meetings

Meetings Are an Activity, Not a Place

At-a-Glance: Meeting Collaboration

Traditional Videoconferencing

I See You

Video over IP Networks

At-a-Glance: IP Videoconferencing

Videoconferencing

Videoconferencing Application E-Learning

Telepresence

Conferencing Gets Simple

Video Killed the Radio Star

The Next-Best Thing to Being There

At-a-Glance: Telepresence

Presence and Location-Aware Services

I Sense a Presence

The Importance of Location

At-a-Glance: Presence and Location-Aware Services

IP Call Center

Why Can’t I Talk to a Real Person?

Anatomy of a Contact Center

From the Caller to the Agent, and Back Again

Managing Caller and Contact Agent Efficiency

New Methods for Customer Interaction

At-a-Glance: IP Contact Center

Call-Center Tech Support

Call-Center Telemarketing

Multicast and IPTV Broadcasts

Watching Movies Without Flooding the World

At-a-Glance: IP Multicast

Multicast

Part VIII: Mobility

Wireless World

Mobility and Wireless Networks

Throwing Away the Ties That Bind

At-a-Glance: Wireless LANs

Wired LANs

Wireless LANs

Selecting and Building Wireless Networks

Designing a Wireless Network

At-a-Glance: Designing Wi-Fi Networks

Securing Wireless Networks

Locking Down Wireless

Balancing Security and Access

At-a-Glance: Securing Wi-Fi

Outdoor and Municipal Wireless Networks

It’s Just Like a Building, Only Way Bigger

At-a-Glance: Municipal Wi-Fi

VoIP over Wireless Networks

Wireless VoIP

At-a-Glance: Wireless VoIP

Wireless VoIP

Wireless Guest Access

Mi Casa Es Su Casa

At-a-Glance: Wireless Guest Access

RFID and Location-Based Services

Finding Your Stuff

Wireless LANS: They’re Not Just for Checking E-Mail on the Toilet Anymore!

At-a-Glance: Location-Based Services

Wireless Location Services

Part IX: Virtualized Networks

Virtualizing Data Centers

Growth of the Data Center

Data Center Virtualization

At-a-Glance: Virtual Data Centers

Virtualizing Network Infrastructure

Leveraging Network Investment

A Network Is a Network

Virtualizing Network Infrastructure

At-a-Glance: Virtual Network Infrastructure

Applications of Virtualized Networks

What Can You Do with Virtualized Networks?

Corporate Employee “Clean” and “Dirty” Networks

Guest and Partner Networks

Isolating Specialized Devices and Applications

Load Balancing

Providing Hosted Networks to Entities Within Entities

Departmental Virtual Networks

Challenges with Virtual Networks

At-a-Glance: Virtualized Network Applications

Evolution of Virtual Networks

1587201992 TOC 11/19/2007

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted April 28, 2008

    Quick, concise and accurate information to the current network technologies on the market today!

    Cisco Networking Simplified, Second Edition by Jim Doherty, Neil Anderson and Paul Della Maggiora gives the reader a clear, brief explanation of computer networking terminology, concepts and their components, as it relates to Cisco products. Whether you are a novice in the field, a senior network engineer or an IT executive, you will learn about the current technologies that you will find in a home and/or corporate network environment. The book contains cutting edge technology that several IT managers may deploy in their infrastructure. Examples are: Radio Frequency Identification (RFID), Voice Over Internet Protocol (VOIP) and Virtualization of Data Centers and Network Infrastructure. Over time, these services can save the enterprise significant resources and money. There are also a several sections within the book that offers the reader trouble-shooting information on the how and why to deploy the hardware and software securely. You will learn where the equipment can be placed on your network and how they interact with one another. This is the second edition of the book and it has been changed significantly from the first version published in 2003. The authors include color diagrams and pictures to enhance the comprehension level, as well as, to reinforce the content for the reader. This volume is based on many of the Cisco components and products that are currently available by the manufacturer. There are two criticisms that I have of the book. The first is the organization of the topics from one chapter to another. The second is the lack of suggested references and materials for the reader to follow-up and obtain additional information. The book starts out clearly explaining the OSI model. I like that the authors introduce the readers to this approach, but I wish that the book was organized in the same way. I would suggest starting from the Physical level and then progressing through each of the seven layers to explain each of the components and concepts. Also, they may want to include references to the Department of Defense (DoD) model and how the two approaches relate to one another. The second issue that I found with the book was the references and materials for the reader to follow-up on were noticeably missing from this version. Perhaps future editions will contain additional information and links for the readers to obtain supplementary data. Overall, I found this book very enjoyable and interesting to read. I will look forward to future editions and books from all of the authors. I give this book 3 out 5 stars.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)