You are previewing Cisco Networking Simplified.
O'Reilly logo
Cisco Networking Simplified

Book Description

A visual explanation of networking technologies

What you always wanted to know about networking but were afraid to ask!

  • How the Internet works

  • How e-mail, e-learning, and telephony work on the Internet

  • What makes a network safe

  • How traffic gets from here to there

  • Disaster recovery and other ways to keep a network running

  • How businesses share data

  • See the world of Cisco networking with this illustrated guide's visual approach to learning

  • Useful for both novices and networking professionals

  • Covers a broad variety of internetworking topics-from e-mail to VPNs

  • At last-an illustrated guide to the world of Cisco networking. Cisco Networking Simplified breaks down the complicated world of internetworking into easy-to-understand parts. Learn quickly and easily the fundamentals of a variety of topics, such as security, IP telephony, and quality of service, from the full-color diagrams and clear explanations found in Cisco Networking Simplified.

    This book is part of the Networking Technology Series from Cisco Press, the only authorized publisher for Cisco Systems.

    Table of Contents

    1. Copyright
      1. Dedications
    2. About the Technical Reviewers
    3. Acknowledgments
    4. Introduction
      1. Keeping It Simple, Keeping It Real
      2. So How Do I Use This Thing?
    5. About the Authors
      1. Paul L. Della Maggiora
      2. Jim Doherty
    6. I. How the Internet Works
      1. How Computers Communicate
        1. The OSI Model
        2. Open Versus Proprietary Systems
        3. The Seven Layers
      2. TCP/IP and IP Addressing
        1. Computers Speaking the Same Language
      3. Internet Applications
        1. Going to Class—Virtually
        2. E-Learning Delivery Mechanisms
        3. Other Internet Applications
    7. II. Telephones and Movies on the Internet
      1. IP Telephony
        1. Making Calls Over the Net
        2. Components of an IP Telephony Implementation
          1. Client Layer
          2. Infrastructure Layer
          3. Call-Processing Layer
          4. Application Layer
        3. Deployment Models
      2. IP Call Center
        1. Why Can’t I Talk to a Real Person?
        2. Anatomy of a Call Center
        3. From the Caller to the Agent, and Back Again
        4. Managing Caller and Call Agent Efficiency
        5. New Methods for Customer Interaction
      3. IP Convergence with Tunneling
        1. Pushing All Traffic Types Through an IP Network
      4. Multicast
        1. Watching Movies Without Flooding the World
      5. Videoconference
        1. Conducting Videoconferences Across the Net
        2. IP-Based Videoconferencing Components
    8. III. Making the Network Safe
      1. Security
        1. Network Security
        2. Identity
        3. Perimeter Security
        4. Data Privacy
        5. Security Monitoring
        6. Policy Management
        7. Identity and Network Access Control
      2. Hacking
      3. Firewall and IDS
        1. Protecting the Perimeter
        2. Get Off the Net!
        3. Firewalls for Your Protection
        4. Intrusion Detection Systems
        5. Keeping Up with the Times
      4. VPNs
        1. Secure Networking Over the Internet
        2. Making Secure IPSec Connections Secure
      5. Client Authentication and Public Key Encryption
    9. IV. How Traffic Gets from Here to There
      1. Ethernet
        1. History of Ethernet
        2. What Is Ethernet?
        3. Evolution of Ethernet
      2. LAN Switching
        1. Fast Computers Need Faster Networks
        2. Switching Basics—It’s a Bridge
        3. Switching Ethernets
        4. Virtual LANs
        5. Switches Take Over the World
      3. Routing and Switching
        1. Bridges and Switches
        2. Routers
        3. Routers Bridge and Switches Route
      4. Mobility and Wireless Networks
        1. Throwing Away the Ties That Bind
    10. V. Keeping the Network Running
      1. Disaster Recovery
        1. What Happens When the Network Stops Working?
        2. DR Planning
        3. Resiliency and Backup Services
        4. Preparedness Testing
      2. High Availability
        1. Twenty-Four Seven
        2. Practices for Avoiding Downtime
      3. Network Management
        1. Keeping the Network Alive from Afar
        2. Network Documentation: A Must Have
        3. Network-Management Protocols
        4. Troubleshooting Tools
      4. QoS
        1. QoS: Frequent Flyers and Air-Traffic Controllers
      5. Routing Protocols
        1. Moving Network Traffic Smartly
        2. Path Determination
        3. Packet Switching
        4. Determining a Good Path Through the Network
        5. Differences Among Routing Algorithms
      6. Spanning Tree
        1. Protecting the Flat Earth of Networking
        2. Spanning-Tree Fundamentals
    11. VI. Moving Traffic Across the Street and the World
      1. Campus Networks and Hierarchical Design
        1. Building Networks for Ease of Use
      2. Optical Technologies
        1. The Need for Speed
        2. SONET, DWDM, and DPT
      3. Broadband Technologies
        1. Always-On Access
        2. Broadband Technology Evolution
        3. Cable Modem
        4. DSL
        5. Which One Is Better?
      4. WAN Technologies
        1. Moving Information Across Vast Areas
        2. WAN Services
        3. High-Speed Serial Interface
        4. Frame Relay
        5. ATM
        6. WAN Devices
      5. Traffic Engineering with MPLS
        1. Bagging and Tagging
    12. VII. How Businesses Share Data
      1. Data Center
        1. Store Once, Use Often
        2. n-Tier Model
        3. Functions and Requirements
      2. Storage Area Networks
        1. Efficient Deployment of Critical Data
        2. Fiber Channel and IP
      3. Content Networking
        1. Coordinating Access to Limited Resources
      4. Caching
        1. Moving Content Close to the User
        2. How Caching Works
        3. Caching More than Web Pages
        4. Issues Affecting Caching
      5. Desktop Protocols
        1. From Thin to Fat
        2. Network Operating Systems
        3. Xerox Network Systems
        4. DECnet
        5. AppleTalk
        6. Banyan VINES
        7. Novell NetWare
      6. SNA Infrastructure
        1. Systems Network Architecture
        2. Why Are Companies Migrating Their SNA Networks?
        3. SNA to IP Migration Paths