Practical Guide to Advanced Networking, A (paperback)

Author:   Jeffrey S. Beasley ,  Piyasat Nilkaew
Publisher:   Pearson Education (US)
Edition:   3rd edition
ISBN:  

9780789757494


Pages:   528
Publication Date:   19 January 2016
Format:   Paperback
Availability:   Temporarily unavailable   Availability explained
The supplier advises that this item is temporarily unavailable. It will be ordered for you and placed on backorder. Once it does come back in stock, we will ship it out to you.

Our Price $198.00 Quantity:  
Add to Cart

Share |

Practical Guide to Advanced Networking, A (paperback)


Add your own review!

Overview

A Practical Guide to Advanced Networking, Third Edition takes a pragmatic, hands-on approach to teaching advanced modern networking concepts from the network administrator’s point of view. Thoroughly updated for the latest networking technologies and applications, the book guides you through designing, configuring, and managing campus networks, connecting networks to the Internet, and using the latest networking technologies. The authors first show how to solve key network design challenges, including data flow, selection of network media, IP allocation, subnetting, and configuration of both VLANs and Layer 3 routed networks. Next, they illuminate advanced routing techniques using RIP/RIPv2, OSPF, IS-IS, EIGRP, and other protocols, and show how to address common requirements such as static routing and route redistribution. You’ll find thorough coverage of configuring IP-based network infrastructure, and using powerful WireShark and NetFlow tools to analyze and troubleshoot traffic. A full chapter on security introduces best practices for preventing DoS attacks, configuring access lists, and protecting routers, switches, VPNs, and wireless networks. This book’s coverage also includes IPv6, Linux-based networking, Juniper routers, BGP Internet routing, and Voice over IP (VoIP). Every topic is introduced in clear, easy-to-understand language; key ideas are reinforced with working examples, and hands-on exercises based on powerful network simulation software. Key Pedagogical Features NET-CHALLENGE SIMULATION SOFTWARE provides hands-on experience with advanced router and switch commands, interface configuration, and protocols–now including RIPv2 and IS-IS WIRESHARK NETWORK PROTOCOL ANALYZER TECHNIQUES and EXAMPLES of advanced data traffic analysis throughout PROVEN TOOLS FOR MORE EFFECTIVE LEARNING, including chapter outlines and summaries WORKING EXAMPLES IN EVERY CHAPTER to reinforce key concepts and promote mastery KEY TERMS DEFINITIONS, LISTINGS, and EXTENSIVE GLOSSARY to help you master the language of networking QUESTIONS, PROBLEMS, and CRITICAL THINKING QUESTIONS to help you deepen your understanding CD-ROM includes Net-Challenge Simulation Software and the Wireshark Network Protocol Analyzer Software examples.

Full Product Details

Author:   Jeffrey S. Beasley ,  Piyasat Nilkaew
Publisher:   Pearson Education (US)
Imprint:   Pearson IT Certification
Edition:   3rd edition
Dimensions:   Width: 20.20cm , Height: 3.00cm , Length: 25.40cm
Weight:   1.120kg
ISBN:  

9780789757494


ISBN 10:   0789757494
Pages:   528
Publication Date:   19 January 2016
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Temporarily unavailable   Availability explained
The supplier advises that this item is temporarily unavailable. It will be ordered for you and placed on backorder. Once it does come back in stock, we will ship it out to you.

Table of Contents

Introduction xvi CHAPTER 1 Network Infrastructure Design 2 Chapter Outline 3 Objectives 3 Key Terms 3 INTRODUCTION 4 1-1 PHYSICAL NETWORK DESIGN 4 Core 5 Distribution Layer 5 Access Layer 6 Data Flow 6 Selecting the Media 6 1-2 IP SUBNET DESIGN 7 IP Address Range 8 Determining the Number of Subnetworks Needed for the Network 9 Determining the Size or the Number of IP Host Addresses Needed for the Network 11 IP Assignment 15 1-3 VLAN NETWORK 16 Virtual LAN (VLAN) 17 VLAN Configuration 18 VLAN Tagging 23 802.1Q Configuration 25 Networking Challenge: Static VLAN Configuration 26 Configuring the HP Procurve Switch 27 1-4 ROUTED NETWORK 28 Router 29 Gateway Address 30 Network Segments 31 Multilayer Switch 32 Layer 3 Routed Networks 33 Routed Port Configuration 33 InterVLAN Routing Configuration 35 Serial and ATM Port Configuration 37 Summary 44 Questions and Problems 46 CHAPTER 2 Advanced Router Configuration I 52 Chapter Outline 53 Objectives 53 Key Terms 53 Introduction 54 2-1 CONFIGURING STATIC ROUTING 54 Gateway of Last Resort 61 Configuring Static Routes 61 Load Balancing and Redundancy 68 Networking Challenge–Static Routes 70 2-2 DYNAMIC ROUTING PROTOCOLS 70 Distance Vector Protocols 73 Link State Protocols 74 2-3 CONFIGURING RIPv2 75 Configuring Routes with RIP 77 Configuring Routes with RIP Version 2 82 Networking Challenge–RIP 84 2-4 TFTP–Trivial File Transfer Protocol 85 Configuring TFTP 85 Summary 89 Questions and Problems 89 CHAPTER 3 Advanced Router Configuration II 98 Chapter Outline 99 Objectives 99 Key Terms 99 INTRODUCTION 101 3-1 CONFIGURING LINK STATE PROTOCOLS–OSPF 101 Link State Protocols 102 Configuring Routes with OSPF 103 Load Balancing and Redundancy with OSPF 109 Networking Challenge–OSPF 111 3-2 CONFIGURING LINK STATE PROTOCOLS–IS-IS 112 Configuring Routes with IS-IS 113 Load Balancing and Redundancy with IS-IS 117 Networking Challenge: IS-IS 118 3-3 CONFIGURING HYBRID ROUTING PROTOCOLS–EIGRP 119 Configuring Routes with EIGRP 120 Load Balancing and Redundancy 125 Networking Challenge: EIGRP 128 3-4 ADVANCED ROUTING REDISTRIBUTION 129 Route Redistribution into RIP 130 Route Redistribution into OSPF 134 Route Redistribution into EIGRP 137 Route Redistribution into IS-IS 141 3-5 ANALYZING OSPF “HELLO” PACKETS 143 Summary 147 Questions and Problems 147 CHAPTER 4 Configuring Juniper Routers 158 Chapter Outline 159 Objectives 159 Key Terms 159 INTRODUCTION 160 4-1 OPERATIONAL MODE 160 4-2 ROUTER CONFIGURATION MODE 166 Displaying the Router Interfaces 166 Hostname Configuration 167 Assigning an IP Address to an Interface 168 4-3 CONFIGURING ROUTES ON JUNIPER ROUTERS 169 Configure STATIC Routes on Juniper Routers 169 Configure RIP on Juniper Routers 171 Configure OSPF on Juniper Routers 173 Configure IS-IS on Juniper Routers 175 4-4 CONFIGURING ROUTE REDISTRIBUTION ON JUNIPER ROUTERS 178 Summary 182 Questions and Problems 182 CHAPTER 5 CONFIGURING AND MANAGING THE NETWORK INFRASTRUCTURE 188 Chapter Outline 189 Objectives 189 Key Terms 189 Introduction 190 5-1 DOMAIN NAME AND IP ASSIGNMENT 190 5-2 IP MANAGEMENT WITH DHCP 195 DHCP Data Packets 197 DHCP Deployment 201 5-3 SCALING THE NETWORK WITH NAT AND PAT 204 Configuring NAT 205 5-4 DOMAIN NAME SERVICE (DNS) 209 DNS Tree Hierarchy 210 DNS Resource Records 214 Summary 220 Questions and Problems 220 CHAPTER 6 Analyzing Network Data Traffic 226 Chapter Outline 227 Objectives 227 Key Terms 227 INTRODUCTION 228 6-1 PROTOCOL ANALYSIS/FORENSICS 228 Basic TCP/UDP Forensics 234 ARP and ICMP 236 6-2 WIRESHARK PROTOCOL ANALYZER 239 Using Wireshark to Capture Packets 243 6-3 ANALYZING NETWORK DATA TRAFFIC 244 Configuring SNMP 244 NetFlow 250 6-4 FILTERING 251 FTP Filtering 256 Right-Click Filtering Logic Rules 258 Filtering DHCP 260 Summary 262 Questions and Problems 262 CHAPTER 7 Network Security 266 Chapter Outline 267 Objectives 267 Key Terms 267 INTRODUCTION 268 7-1 DENIAL OF SERVICE 268 Distributed Denial of Service Attacks (DDoS) 270 7-2 FIREWALLS AND ACCESS LISTS 270 Network Attack Prevention 272 Access Lists 272 7-3 Router Security 279 Router Access 280 Router Services 282 Router Logging and Access-List 283 7-4 Switch Security 285 Switch Port Security 286 Switch Special Features 288 7-5 Wireless Security 289 7-6 VPN Security 292 VPN Tunneling Protocols 293 Configuring a VPN Virtual Interface (Router to Router) 294 Troubleshooting the VPN Tunnel Link 299 Summary 302 Questions and Problems 302 CHAPTER 8 IPv6 306 Chapter Outline 307 Objectives 307 Key Terms 307 Introduction 308 8-1 Comparison of IPv6 and IPv4 308 8-2 IPV6 ADDRESSING 311 8-3 IPv6 Network Settings 315 8-4 Configuring a Router for IPv6 320 8-5 IPv6 Routing 324 IPv6: Static 324 IPv6: RIP 324 IPv6: OSPF 325 IPv6: EIGRP 325 IPv6: IS-IS 326 8-6 Troubleshooting IPv6 Connection 327 Summary 329 Questions and Problems 329 CHAPTER 9 Linux Networking 336 Chapter Outline 337 Objectives 337 Key Terms 337 INTRODUCTION 338 9-1 LOGGING ON TO LINUX 339 Adding a User Account 340 9-2 LINUX FILE STRUCTURE AND FILE COMMANDS 344 Listing Files 344 Displaying File Contents 346 Directory Operations 348 File Operations 351 Permissions and Ownership 353 9-3 LINUX ADMINISTRATION COMMANDS 357 The man (manual) Command 358 The ps (processes) Command 359 The su (substitute user) Command 362 The mount Command 362 The shutdown Command 364 Linux Tips 364 9-4 ADDING APPLICATIONS TO LINUX 365 9-5 LINUX NETWORKING 371 Installing SSH 375 The FTP Client 376 DNS Service on Linux 376 Changing the Hostname 377 9-6 TROUBLESHOOTING SYSTEM AND NETWORK PROBLEMS WITH LINUX 378 Troubleshooting Boot Processes 378 Listing Users on the System 380 Network Security 382 Enabling and Disabling Boot Services 382 9-7 MANAGING THE LINUX SYSTEM 385 Summary 390 Questions and Problems 391 CHAPTER 10 Internet Routing 396 Chapter Outline 397 Objectives 397 Key Terms 397 INTRODUCTION 398 10-1 INTERNET ROUTING–BGP 398 Configuring a WAN Connection 398 Configuring an Internet Connection 400 10-2 CONFIGURING BGP 401 Configuring BGP 401 Networking Challenge: BGP 409 10-3 BGP BEST PATH SELECTION 410 10-4 IPv6 OVER THE INTERNET 412 10-5 CONFIGURE BGP ON JUNIPER ROUTERS 415 Summary 421 Questions and Problems 421 CHAPTER 11 Voice over IP 428 Chapter Outline 429 Objectives 429 Key Terms 429 INTRODUCTION 430 11-1 THE BASICS OF VOICE OVER IP 430 11-2 VOICE OVER IP NETWORKS 433 Replacing an Existing PBX Tie Line 433 Upgrading Existing PBXs to Support IP Telephony 435 Switching to a Complete IP Telephony Solution 436 11-3 QUALITY OF SERVICE 438 Jitter 438 Network Latency 439 Queuing 439 QOS Configuration Example 440 11-4 ANALYZING VoIP DATA PACKETS 442 Analyzing VoIP Telephone Call Data Packets 446 11-5 VoIP SECURITY 449 Summary 452 Questions and Problems 452 Key Terms Glossary 456 TOC, 9780789749048, 10/12/2012

Reviews

Author Information

Jeffrey S. Beasley is with the Department of Engineering Technology and Surveying Engineering at New Mexico State University. He has been teaching with the department since 1988 and is the co-author of Modern Electronic Communication and Electronic Devices and Circuits, and the author of Networking. Piyasat Nilkaew is a network engineer with 15 years of experience in network management and consulting, and has extensive expertise in deploying and integrating multiprotocol and multivendor data, voice, and video network solutions on limited budgets.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List