Network Warrior. Everything You Need to Know That Wasn't on the CCNA Exam. 2nd Edition
- Autor: :
- Gary A. Donahue
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 788
- Dostępne formaty:
-
ePubMobi
Opis ebooka: Network Warrior. Everything You Need to Know That Wasn't on the CCNA Exam. 2nd Edition
Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you’ll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout.
Topics include:
- An in-depth view of routers and routing
- Switching, using Cisco Catalyst and Nexus switches as examples
- SOHO VoIP and SOHO wireless access point design and configuration
- Introduction to IPv6 with configuration examples
- Telecom technologies in the data-networking world, including T1, DS3, frame relay, and MPLS
- Security, firewall theory, and configuration, as well as ACL and authentication
- Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ)
- IP address allocation, Network Time Protocol (NTP), and device failures
Wybrane bestsellery
-
Written by networking veteran with 20 years of experience, Network Warrior provides a thorough and practical introduction to the entire network infrastructure, from cabling to the routers. What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive ...(100.53 zł najniższa cena z 30 dni)
100.43 zł
149.00 zł(-33%) -
Arista Networks has become a key player when it comes to software-driven cloud networking solutions for large data center storage and computing environments. In this updated edition of Arista Warrior, renowned consultant and technical author Gary Donahue Network Arista Networks has become a key p...(183.16 zł najniższa cena z 30 dni)
182.96 zł
249.00 zł(-27%) -
W trakcie lektury poznasz najlepsze sposoby projektowania wydajnej sieci SOHO VoIP oraz wykorzystania adresów IPv6. Twoją szczególną ciekawość powinny wzbudzić rozdziały poświęcone bezpieczeństwu. Poprawna konfiguracja firewalla, list ACL i autoryzacji to klucz do niezawodności Twojej sieci i pou...(49.50 zł najniższa cena z 30 dni)
49.50 zł
99.00 zł(-50%) -
Windows Server 2022 to sieciowy system operacyjny stworzony przez Microsoft. Został zaprojektowany z myślą o obsłudze dużych sieci komputerowych i infrastruktur IT. Jego popularność ciągle rośnie, szczególnie w zastosowaniach sieciowych jako serwery lokalne i serwery usług, takich jak WWW, FTP, c...(96.85 zł najniższa cena z 30 dni)
59.59 zł
149.00 zł(-60%) -
This book offers a holistic view of edge computing and the IoT space, helping you develop a foundational set of skills and learn terminologies to explore the subject in greater depth.
-
This book will help you explore HashiCorp Terraform and prepare for Associate (003) certification, from understanding core concepts to advanced modules. You'll gain hands-on expertise, troubleshoot with confidence, and more.
-
This book will help you understand why a network source of truth is needed for long-term network automation success, which will in turn save you hundreds of hours in deploying and integrating Nautobot into network automation.
Network Automation with Nautobot. Adopt a network source of truth and a data-driven approach to networking
Jason Edelman, Glenn Matthews, Josh VanDeraa, Ken Celenza, Christian Adell, Brad Haas
Kup polskie wydanie:
Wojownik sieci. Wydanie II
- Autor:
- Gary A. Donahue
49,50 zł
99,00 zł
(49.50 zł najniższa cena z 30 dni)
Ebooka "Network Warrior. Everything You Need to Know That Wasn't on the CCNA Exam. 2nd Edition" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Network Warrior. Everything You Need to Know That Wasn't on the CCNA Exam. 2nd Edition" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Network Warrior. Everything You Need to Know That Wasn't on the CCNA Exam. 2nd Edition" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-14-493-0935-0, 9781449309350
- Data wydania ebooka:
- 2011-05-13 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 8.1MB
- Rozmiar pliku Mobi:
- 8.1MB
Spis treści ebooka
- Network Warrior
- SPECIAL OFFER: Upgrade this ebook with OReilly
- Preface
- Who Should Read This Book
- Conventions Used in This Book
- Using Code Examples
- Wed Like to Hear from You
- Safari Books Online
- Acknowledgments
- 1. What Is a Network?
- 2. Hubs and Switches
- Hubs
- Switches
- Switch Types
- Planning a Chassis-Based Switch Installation
- Rack space
- Power
- Cooling
- Installing and removing modules
- Routing cables
- 3. Autonegotiation
- What Is Autonegotiation?
- How Autonegotiation Works
- When Autonegotiation Fails
- Autonegotiation Best Practices
- Configuring Autonegotiation
- 4. VLANs
- Connecting VLANs
- Configuring VLANs
- CatOS
- IOS Using VLAN Database
- IOS Using Global Commands
- Nexus and NX-OS
- 5. Trunking
- How Trunks Work
- ISL
- 802.1Q
- Which Protocol to Use
- Trunk Negotiation
- How Trunks Work
- Configuring Trunks
- IOS
- CatOS
- Nexus and NX-OS
- 6. VLAN Trunking Protocol
- VTP Pruning
- Dangers of VTP
- Configuring VTP
- VTP Domains
- IOS
- CatOS
- NX-OS
- VTP Domains
- VTP Mode
- IOS
- CatOS
- NX-OS
- VTP Password
- IOS
- CatOS
- NX-OS
- VTP Pruning
- IOS
- CatOS
- NX-OS
- 7. Link Aggregation
- EtherChannel
- EtherChannel Load Balancing
- Configuring and Managing EtherChannel
- EtherChannel protocols
- CatOS example
- IOS example
- NX-OS example
- EtherChannel
- Cross-Stack EtherChannel
- Multichassis EtherChannel (MEC)
- Virtual Port Channel
- Initial vPC Configuration
- Adding a vPC
- 8. Spanning Tree
- Broadcast Storms
- MAC Address Table Instability
- Preventing Loops with Spanning Tree
- How Spanning Tree Works
- Managing Spanning Tree
- Additional Spanning Tree Features
- PortFast
- BPDU Guard
- UplinkFast
- BackboneFast
- Common Spanning Tree Problems
- Duplex Mismatch
- Unidirectional Links
- Bridge Assurance
- Designing to Prevent Spanning Tree Problems
- Use Routing Instead of Switching for Redundancy
- Always Configure the Root Bridge
- 9. Routing and Routers
- Routing Tables
- Route Types
- The IP Routing Table
- Host Route
- Subnet
- Summary (Group of Subnets)
- Major Network
- Supernet (Group of Major Networks)
- Default Route
- Virtual Routing and Forwarding
- 10. Routing Protocols
- Communication Between Routers
- Metrics and Protocol Types
- Administrative Distance
- Specific Routing Protocols
- RIP
- RIPv2
- EIGRP
- OSPF
- BGP
- 11. Redistribution
- Redistributing into RIP
- Redistributing into EIGRP
- Redistributing into OSPF
- Mutual Redistribution
- Redistribution Loops
- Limiting Redistribution
- Route Tags
- A Real-World Example
- Another method
- 12. Tunnels
- GRE Tunnels
- GRE Tunnels and Routing Protocols
- GRE and Access Lists
- 13. First Hop Redundancy
- HSRP
- HSRP Interface Tracking
- When HSRP Isnt Enough
- Nexus and HSRP
- GLBP
- Object Tracking in GLBP
- 14. Route Maps
- Building a Route Map
- Policy Routing Example
- Monitoring Policy Routing
- 15. Switching Algorithms in Cisco Routers
- Process Switching
- Interrupt Context Switching
- Fast Switching
- Optimum Switching
- CEF
- Configuring and Managing Switching Paths
- Process Switching
- Fast Switching
- CEF
- 16. Multilayer Switches
- Configuring SVIs
- IOS (4500, 6500, 3550, 3750, etc.)
- Hybrid Mode (4500, 6500)
- NX-OS (Nexus 7000, 5000)
- Configuring SVIs
- Multilayer Switch Models
- 17. Cisco 6500 Multilayer Switches
- Architecture
- Buses
- Enhanced Chassis
- Vertical Enhanced Chassis
- Supervisors
- MSFC
- PFC
- Models
- Modules
- Module interaction
- Module types
- Ethernet modules
- FWSMs
- CSMs
- NAM
- Intrusion Detection System modules
- FlexWAN modules
- Communication Media Modules
- Architecture
- CatOS Versus IOS
- Installing VSS
- Other Recommended VSS Commands
- VSS dual-active detection
- Other Recommended VSS Commands
- VSS Failover Commands
- Miscellaneous VSS Commands
- VSS Best Practices
- 18. Cisco Nexus
- Nexus Hardware
- Nexus 7000
- Nexus 5000
- Nexus 2000
- Nexus 1000 Series
- Nexus Hardware
- NX-OS
- NX-OS Versus IOS
- No more speed-related interface names
- No hidden configuration in NX-OS
- Interface status displays operational state along with a reason
- The show interface brief command
- No more write memory
- No more do command
- No more show arp
- No more interface range command
- Slash notation supported on all IPv4 and IPv6 commands
- Two CLI help levels
- Routing configuration mostly within interfaces
- Many more pipe options
- NX-OS Versus IOS
- Nexus Iconography
- Nexus Design Features
- Virtual Routing and Forwarding
- Virtual Device Contexts
- Shared and Dedicated Rate-Mode
- Configuring Fabric Extenders (FEXs)
- Describing FEXs
- Physical connection
- Pinning
- FEX fabric uplinks using vPC
- Virtual Port Channel
- Config-Sync
- Configuration Rollback
- Upgrading NX-OS
- 19. Catalyst 3750 Features
- Stacking
- Interface Ranges
- Macros
- Flex Links
- Storm Control
- Port Security
- SPAN
- Voice VLAN
- QoS
- 20. Telecom Nomenclature
- Telecom Glossary
- 21. T1
- Understanding T1 Duplex
- Types of T1
- Encoding
- AMI
- B8ZS
- Framing
- D4/Superframe
- Extended Super Frame
- Performance Monitoring
- Loss of Signal
- Out of Frame
- Bipolar Violation
- CRC6
- Errored Seconds
- Extreme Errored Seconds
- Alarms
- Red Alarm
- Yellow Alarm
- Blue Alarm
- Troubleshooting T1s
- Loopback Tests
- Integrated CSU/DSUs
- Configuring T1s
- CSU/DSU Configuration
- CSU/DSU Troubleshooting
- 22. DS3
- Framing
- M13
- C-Bits
- Clear-Channel DS3 Framing
- Framing
- Line Coding
- Configuring DS3s
- Clear-Channel DS3
- Channelized DS3
- 23. Frame Relay
- Ordering Frame Relay Service
- Frame Relay Network Design
- Oversubscription
- Local Management Interface
- Congestion Avoidance in Frame Relay
- Configuring Frame Relay
- Basic Frame Relay with Two Nodes
- Basic Frame Relay with More Than Two Nodes
- Frame Relay Subinterfaces
- Troubleshooting Frame Relay
- 24. MPLS
- 25. Access Lists
- Designing Access Lists
- Named Versus Numbered
- Wildcard Masks
- Where to Apply Access Lists
- Naming Access Lists
- Top-Down Processing
- Most-Used on Top
- Using Groups in ASA and PIX ACLs
- Deleting ACLs
- Turbo ACLs
- Allowing Outbound Traceroute and Ping
- Allowing MTU Path Discovery Packets
- Designing Access Lists
- ACLs in Multilayer Switches
- Configuring Port ACLs
- Configuring Router ACLs
- Configuring VLAN Maps
- Reflexive Access Lists
- Configuring Reflexive Access Lists
- 26. Authentication in Cisco Devices
- Basic (Non-AAA) Authentication
- Line Passwords
- Configuring Local Users
- PPP Authentication
- PAP
- One-way authentication
- Two-way authentication
- Debugging PPP authentication
- PAP
- CHAP
- One-way authentication
- Two-way authentication
- Changing the sent hostname
- Basic (Non-AAA) Authentication
- AAA Authentication
- Enabling AAA
- Configuring Security Server Information
- Default RADIUS and TACACS+ server groups
- Custom groups
- Creating Method Lists
- IOS login authentication
- NX-OS login authentication
- PPP authentication
- Applying Method Lists
- 27. Basic Firewall Theory
- Best Practices
- The DMZ
- Another DMZ Example
- Multiple DMZ Example
- Alternate Designs
- 28. ASA Firewall Configuration
- Contexts
- Interfaces and Security Levels
- Names
- Object Groups
- Inspects
- Managing Contexts
- Context Types
- The Classifier
- No shared interfaces
- Shared outside interfaces
- Shared inside interface
- Sharing inside and outside interfaces
- Cascading contexts
- Configuring Contexts
- Interfaces and Contexts
- Write Mem Behavior
- Failover
- Failover Terminology
- Understanding Failover
- Configuring FailoverActive/Standby
- Monitoring Failover
- Configuring FailoverActive/Active
- NAT
- NAT Commands
- NAT Examples
- Simple PAT using the outside interface
- Simple PAT using a dedicated IP address
- Simple PAT with public servers on the inside
- Port redirection
- DMZ
- Miscellaneous
- Remote Access
- Saving Configuration Changes
- Logging
- Troubleshooting
- 29. Wireless
- Wireless Standards
- Security
- Configuring a WAP
- MAC Address Filtering
- Troubleshooting
- 30. VoIP
- How VoIP Works
- Protocols
- Telephony Terms
- Cisco Telephony Terms
- Common Issues with VoIP
- Latency
- Packet loss
- Jitter
- How VoIP Works
- Small-Office VoIP Example
- VLANs
- Switch Ports
- QoS on the CME Router
- DHCP for Phones
- TFTP Service
- Telephony Service
- Dial Plan
- Voice Ports
- Configuring Phones
- Ephone-DN
- Paging
- Ephone
- PTT
- Message waiting lamps
- Dial Peers
- POTS
- VoIP
- Dial-peer pattern matching
- Outbound dial peers
- Inbound dial peers
- SIP
- SIP and NAT
- Troubleshooting
- Phone Registration
- TFTP
- Dial Peer
- SIP
- 31. Introduction to QoS
- Types of QoS
- QoS Mechanics
- Priorities
- Flavors of QoS
- Traffic-shaping theory
- Common QoS Misconceptions
- QoS Carves Up a Link into Smaller Logical Links
- QoS Limits Bandwidth
- QoS Resolves a Need for More Bandwidth
- QoS Prevents Packets from Being Dropped
- QoS Will Make You More Attractive to the Opposite Sex
- 32. Designing QoS
- LLQ Scenario
- Protocols
- Priorities
- Determine Bandwidth Requirements
- LLQ Scenario
- Configuring the Routers
- Class Maps
- Policy Maps
- Service Policies
- Traffic-Shaping Scenarios
- Scenario 1: Ethernet Handoff
- Scenario 2: Frame Relay Speed Mismatch
- Traffic-shaping terminology
- 33. The Congested Network
- Determining Whether the Network Is Congested
- Resolving the Problem
- 34. The Converged Network
- Configuration
- Monitoring QoS
- Troubleshooting a Converged Network
- Incorrect Queue Configuration
- Priority Queue Too Small
- Priority Queue Too Large
- Nonpriority Queue Too Small
- Nonpriority Queue Too Large
- Default Queue Too Small
- Default Queue Too Large
- 35. Designing Networks
- Documentation
- Requirements Documents
- Port Layout Spreadsheets
- IP and VLAN Spreadsheets
- Bay Face Layouts
- Power and Cooling Requirements
- Tips for Network Diagrams
- Documentation
- Naming Conventions for Devices
- Network Designs
- Corporate Networks
- Three-tiered architecture
- Collapsed coreno distribution
- Collapsed coreno distribution or access
- Configuration concerns
- Trunks
- EtherChannels
- Spanning tree
- VTP
- VLANs
- Corporate Networks
- Ecommerce Websites
- Modern Virtual Server Environments
- Small Networks
- 36. IP Design
- Public Versus Private IP Space
- VLSM
- CIDR
- Allocating IP Network Space
- Allocating IP Subnets
- Sequential
- Divide by Half
- Reverse Binary
- IP Subnetting Made Easy
- 37. IPv6
- Addressing
- Subnet Masks
- Address Types
- Subnetting
- NAT
- Addressing
- Simple Router Configuration
- 38. Network Time Protocol
- What Is Accurate Time?
- NTP Design
- Configuring NTP
- NTP Client
- NTP Server
- 39. Failures
- Human Error
- Multiple Component Failure
- Disaster Chains
- No Failover Testing
- Troubleshooting
- Remain Calm
- Log Your Actions
- Find Out What Changed
- Check the Physical Layer First!
- Assume Nothing; Prove Everything
- Isolate the Problem
- Dont Look for Zebras
- Do a Physical Audit
- Escalate
- Troubleshooting in a Team Environment
- The Janitor Principle
- 40. GADs Maxims
- Maxim #1
- Politics
- Money
- The Right Way to Do It
- Maxim #1
- Maxim #2
- Simplify
- Standardize
- Stabilize
- Maxim #3
- Lower Costs
- Increase Performance or Capacity
- Increase Reliability
- 41. Avoiding Frustration
- Why Everything Is Messed Up
- How to Sell Your Ideas to Management
- When to Upgrade and Why
- The Dangers of Upgrading
- Valid Reasons to Upgrade
- Why Change Control Is Your Friend
- How Not to Be a Computer Jerk
- Behavioral
- Environmental
- Leadership and Mentoring
- Index
- About the Author
- Colophon
- SPECIAL OFFER: Upgrade this ebook with OReilly
O'Reilly Media - inne książki
-
Large language models (LLMs) and generative AI are rapidly changing the healthcare industry. These technologies have the potential to revolutionize healthcare by improving the efficiency, accuracy, and personalization of care. This practical book shows healthcare leaders, researchers, data scient...(150.14 zł najniższa cena z 30 dni)
149.94 zł
199.00 zł(-25%) -
With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, Kali Linux can also be overwhelming. The new edition of this practical book covers updates to the ...(162.42 zł najniższa cena z 30 dni)
162.32 zł
209.00 zł(-22%) -
Learn how to implement and manage a modern customer data platform (CDP) through the Salesforce Data Cloud platform. This practical book provides a comprehensive overview that shows architects, administrators, developers, data engineers, and marketers how to ingest, store, and manage real-time cus...(185.94 zł najniższa cena z 30 dni)
185.89 zł
249.00 zł(-25%) -
Real-time applications are becoming the norm today. But building a model that works properly requires real-time data from the source, in-flight stream processing, and low latency serving of its analytics. With this practical book, data engineers, data architects, and data analysts will learn how ...(210.80 zł najniższa cena z 30 dni)
210.70 zł
279.00 zł(-24%) -
Methods of delivering software are constantly evolving in order to increase speed to market without sacrificing reliability and stability. Mastering development end to end, from version control to production, and building production-ready code is now more important than ever. Continuous deploymen...(172.32 zł najniższa cena z 30 dni)
172.22 zł
239.00 zł(-28%) -
As the transformation to hybrid multicloud accelerates, businesses require a structured approach to securing their workloads. Adopting zero trust principles demands a systematic set of practices to deliver secure solutions. Regulated businesses, in particular, demand rigor in the architectural pr...(154.18 zł najniższa cena z 30 dni)
153.98 zł
209.00 zł(-26%) -
This concise yet comprehensive guide explains how to adopt a data lakehouse architecture to implement modern data platforms. It reviews the design considerations, challenges, and best practices for implementing a lakehouse and provides key insights into the ways that using a lakehouse can impact ...(182.23 zł najniższa cena z 30 dni)
181.73 zł
249.00 zł(-27%) -
In today's fast-paced world, more and more organizations require rapid application development with reduced development costs and increased productivity. This practical guide shows application developers how to use PowerApps, Microsoft's no-code/low-code application framework that helps developer...(151.37 zł najniższa cena z 30 dni)
151.27 zł
209.00 zł(-28%) -
Welcome to the systems age, where software professionals are no longer building software&emdash;we're building systems of software. Change is continuously deployed across software ecosystems coordinated by responsive infrastructure. In this world of increasing relational complexity, we need t...(141.74 zł najniższa cena z 30 dni)
141.24 zł
209.00 zł(-32%) -
This book provides an ideal guide for Python developers who want to learn how to build applications with large language models. Authors Olivier Caelen and Marie-Alice Blete cover the main features and benefits of GPT-4 and GPT-3.5 models and explain how they work. You'll also get a step-by-step g...(143.63 zł najniższa cena z 30 dni)
143.43 zł
209.00 zł(-31%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: Network Warrior. Everything You Need to Know That Wasn't on the CCNA Exam. 2nd Edition Gary A. Donahue (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.