Network Warrior: Everything You Need to Know That Wasn't on the CCNA Exam

Network Warrior: Everything You Need to Know That Wasn't on the CCNA Exam

by Gary A. Donahue
Network Warrior: Everything You Need to Know That Wasn't on the CCNA Exam

Network Warrior: Everything You Need to Know That Wasn't on the CCNA Exam

by Gary A. Donahue

eBook

$38.49  $50.99 Save 25% Current price is $38.49, Original price is $50.99. You Save 25%.

Available on Compatible NOOK Devices and the free NOOK Apps.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you’ll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout.

Topics include:

  • An in-depth view of routers and routing
  • Switching, using Cisco Catalyst and Nexus switches as examples
  • SOHO VoIP and SOHO wireless access point design and configuration
  • Introduction to IPv6 with configuration examples
  • Telecom technologies in the data-networking world, including T1, DS3, frame relay, and MPLS
  • Security, firewall theory, and configuration, as well as ACL and authentication
  • Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ)
  • IP address allocation, Network Time Protocol (NTP), and device failures

Product Details

ISBN-13: 9781449309350
Publisher: O'Reilly Media, Incorporated
Publication date: 05/13/2011
Sold by: Barnes & Noble
Format: eBook
Pages: 788
File size: 9 MB

About the Author

Gary A. Donahue is a working consultant who has been in the computer industry for 25 years. Gary has worked as a programmer, mainframe administrator, Technical Assistance Center engineer, network administrator, network designer, and consultant. Gary has worked as the Director of Network Infrastructure for a national consulting company and has been the president of his own New Jersey consulting company; GAD Technologies.

Table of Contents

Dedication;
Preface;
Who Should Read This Book;
Conventions Used in This Book;
Using Code Examples;
We'd Like to Hear from You;
Safari® Enabled;
Acknowledgments;
Part I: Hubs, Switches, and Switching;
Chapter 1: What Is a Network?;
Chapter 2: Hubs and Switches;
2.1 Hubs;
2.2 Switches;
Chapter 3: Auto-Negotiation;
3.1 What Is Auto-Negotiation?;
3.2 How Auto-Negotiation Works;
3.3 When Auto-Negotiation Fails;
3.4 Auto-Negotiation Best Practices;
3.5 Configuring Auto-Negotiation;
Chapter 4: VLANs;
4.1 Connecting VLANs;
4.2 Configuring VLANs;
Chapter 5: Trunking;
5.1 How Trunks Work;
5.2 Configuring Trunks;
Chapter 6: VLAN Trunking Protocol;
6.1 VTP Pruning;
6.2 Dangers of VTP;
6.3 Configuring VTP;
Chapter 7: EtherChannel;
7.1 Load Balancing;
7.2 Configuring and Managing EtherChannel;
Chapter 8: Spanning Tree;
8.1 Broadcast Storms;
8.2 MAC Address Table Instability;
8.3 Preventing Loops with Spanning Tree;
8.4 Managing Spanning Tree;
8.5 Additional Spanning Tree Features;
8.6 Common Spanning Tree Problems;
8.7 Designing to Prevent Spanning Tree Problems;
Part II: Routers and Routing;
Chapter 9: Routing and Routers;
9.1 Routing Tables;
9.2 Route Types;
9.3 The IP Routing Table;
Chapter 10: Routing Protocols;
10.1 Communication Between Routers;
10.2 Metrics and Protocol Types;
10.3 Administrative Distance;
10.4 Specific Routing Protocols;
Chapter 11: Redistribution;
11.1 Redistributing into RIP;
11.2 Redistributing into EIGRP;
11.3 Redistributing into OSPF;
11.4 Mutual Redistribution;
11.5 Redistribution Loops;
11.6 Limiting Redistribution;
Chapter 12: Tunnels;
12.1 GRE Tunnels;
12.2 GRE Tunnels and Routing Protocols;
12.3 GRE and Access Lists;
Chapter 13: Resilient Ethernet;
13.1 HSRP;
13.2 HSRP Interface Tracking;
13.3 When HSRP Isn't Enough;
Chapter 14: Route Maps;
14.1 Building a Route Map;
14.2 Policy-Routing Example;
Chapter 15: Switching Algorithms in Cisco Routers;
15.1 Process Switching;
15.2 Interrupt Context Switching;
15.3 Configuring and Managing Switching Paths;
Part III: Multilayer Switches;
Chapter 16: Multilayer Switches;
16.1 Configuring SVIs;
16.2 Multilayer Switch Models;
Chapter 17: Cisco 6500 Multilayer Switches;
17.1 Architecture;
17.2 CatOS Versus IOS;
Chapter 18: Catalyst 3750 Features;
18.1 Stacking;
18.2 Interface Ranges;
18.3 Macros;
18.4 Flex Links;
18.5 Storm Control;
18.6 Port Security;
18.7 SPAN;
18.8 Voice VLAN;
18.9 QoS;
Part IV: Telecom;
Chapter 19: Telecom Nomenclature;
19.1 Introduction and History;
19.2 Telecom Glossary;
Chapter 20: T1;
20.1 Understanding T1 Duplex;
20.2 Types of T1;
20.3 Encoding;
20.4 Framing;
20.5 Performance Monitoring;
20.6 Alarms;
20.7 Troubleshooting T1s;
20.8 Configuring T1s;
Chapter 21: DS3;
21.1 Framing;
21.2 Line Coding;
21.3 Configuring DS3s;
Chapter 22: Frame Relay;
22.1 Ordering Frame-Relay Service;
22.2 Frame-Relay Network Design;
22.3 Oversubscription;
22.4 Local Management Interface (LMI);
22.5 Configuring Frame Relay;
22.6 Troubleshooting Frame Relay;
Part V: Security and Firewalls;
Chapter 23: Access Lists;
23.1 Designing Access Lists;
23.2 ACLs in Multilayer Switches;
23.3 Reflexive Access Lists;
Chapter 24: Authentication in Cisco Devices;
24.1 Basic (Non-AAA) Authentication;
24.2 AAA Authentication;
Chapter 25: Firewall Theory;
25.1 Best Practices;
25.2 The DMZ;
25.3 Alternate Designs;
Chapter 26: PIX Firewall Configuration;
26.1 Interfaces and Priorities;
26.2 Names;
26.3 Object Groups;
26.4 Fixups;
26.5 Failover;
26.6 NAT;
26.7 Miscellaneous;
26.8 Troubleshooting;
Part VI: Server Load Balancing;
Chapter 27: Server Load-Balancing Technology;
27.1 Types of Load Balancing;
27.2 How Server Load Balancing Works;
27.3 Configuring Server Load Balancing;
Chapter 28: Content Switch Modules in Action;
28.1 Common Tasks;
28.2 Upgrading the CSM;
Part VII: Quality of Service;
Chapter 29: Introduction to QoS;
29.1 Types of QoS;
29.2 QoS Mechanics;
29.3 Common QoS Misconceptions;
Chapter 30: Designing a QoS Scheme;
30.1 Determining Requirements;
30.2 Configuring the Routers;
Chapter 31: The Congested Network;
31.1 Determining Whether the Network Is Congested;
31.2 Resolving the Problem;
Chapter 32: The Converged Network;
32.1 Configuration;
32.2 Monitoring QoS;
32.3 Troubleshooting a Converged Network;
Part VIII: Designing Networks;
Chapter 33: Designing Networks;
33.1 Documentation;
33.2 Naming Conventions for Devices;
33.3 Network Designs;
Chapter 34: IP Design;
34.1 Public Versus Private IP Space;
34.2 VLSM;
34.3 CIDR;
34.4 Allocating IP Network Space;
34.5 Allocating IP Subnets;
34.6 IP Subnetting Made Easy;
Chapter 35: Network Time Protocol;
35.1 What Is Accurate Time?;
35.2 NTP Design;
35.3 Configuring NTP;
Chapter 36: Failures;
36.1 Human Error;
36.2 Multiple Component Failure;
36.3 Disaster Chains;
36.4 No Failover Testing;
36.5 Troubleshooting;
Chapter 37: GAD's Maxims;
37.1 Maxim #1;
37.2 Maxim #2;
37.3 Maxim #3;
Chapter 38: Avoiding Frustration;
38.1 Why Everything Is Messed Up;
38.2 How to Sell Your Ideas to Management;
38.3 When to Upgrade and Why;
38.4 Why Change Control Is Your Friend;
38.5 How Not to Be a Computer Jerk;
Colophon;
From the B&N Reads Blog

Customer Reviews