注冊(cè) | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當(dāng)前位置: 首頁(yè)出版圖書科學(xué)技術(shù)計(jì)算機(jī)/網(wǎng)絡(luò)網(wǎng)絡(luò)與數(shù)據(jù)通信網(wǎng)絡(luò)組建與管理Network Warrior:思科網(wǎng)絡(luò)工程師必備手冊(cè)(影印版)

Network Warrior:思科網(wǎng)絡(luò)工程師必備手冊(cè)(影印版)

Network Warrior:思科網(wǎng)絡(luò)工程師必備手冊(cè)(影印版)

定 價(jià):¥98.00

作 者: (美)唐納修 著
出版社: 東南大學(xué)出版社
叢編項(xiàng):
標(biāo) 簽: 網(wǎng)絡(luò)配置與管理

ISBN: 9787564129392 出版時(shí)間: 2011-10-01 包裝: 平裝
開本: 16開 頁(yè)數(shù): 757 字?jǐn)?shù):  

內(nèi)容簡(jiǎn)介

  撿起認(rèn)證考試的遺珠。這是一本細(xì)致而實(shí)用的網(wǎng)絡(luò)基礎(chǔ)架構(gòu)指南,《Network Warrior:思科網(wǎng)絡(luò)工程師必備手冊(cè)(影印版)(第2版)》將助你一臂之力來(lái)處理真實(shí)的思科網(wǎng)絡(luò),而不是解決考試中的假想問(wèn)題,比如ccna那樣的。在作者廣博的專業(yè)經(jīng)驗(yàn)基礎(chǔ)上,《network warrior》指導(dǎo)你一步一步地遍歷路由器、交換機(jī)、防火墻以及其他的技術(shù)領(lǐng)域。在這本經(jīng)過(guò)全面修訂的第二版中,你會(huì)發(fā)現(xiàn)針對(duì)mpls、ipv6、voip和無(wú)線網(wǎng)絡(luò)的新增加內(nèi)容,同時(shí)還有針對(duì)思科nexus 5000和7000交換機(jī)的實(shí)例講解。主體包括:深入介紹路由器和網(wǎng)絡(luò)路由,使用思科catalyst和nexus交換機(jī)作為實(shí)例講解網(wǎng)絡(luò)交換,小型網(wǎng)絡(luò)和家庭網(wǎng)絡(luò)的voip和無(wú)線接入點(diǎn)設(shè)計(jì)與配置,用配置實(shí)例講解ipv6,數(shù)據(jù)網(wǎng)絡(luò)世界中的電信技術(shù),包括t1、ds3、幀中繼和mpls,網(wǎng)絡(luò)安全,防火墻原理及配置,還有訪問(wèn)控制和認(rèn)證,服務(wù)質(zhì)量(qos),重點(diǎn)講解低延遲隊(duì)列(llq),ip地址分配、網(wǎng)絡(luò)時(shí)間協(xié)議(ntp)以及設(shè)備故障。

作者簡(jiǎn)介

  Gary A. Donahue擔(dān)任過(guò)程序員、主機(jī)管理員、技術(shù)幫助中心工程師、網(wǎng)絡(luò)管理員、網(wǎng)絡(luò)設(shè)計(jì)師和咨詢師?,F(xiàn)在擔(dān)任在新澤西的他自己的咨詢公司GAD Technologies的主席。

圖書目錄

preface
1. what is a network?
2. hubs and switches
hubs
switches
switch types
planning a chassis-based switch installation
3. autonegotjatjon
what is autonegotiation?
how autonegotiation works
when autonegotiation fails
autonegotiation best practices
configuring autonegotiation
4. vlans
connecting vlans
configuring vlans
catos
ios using vlan database
ios using global commands
nexus and nx-os
5. trunkjng
how trunks work
isl
802.1q
which protocol to use
trunk negotiation
configuring trunks
los
catos
nexus and nx-os
6. vlan trunking protocol
vtp pruning
dangers of vtp
configuring vtp
vtp domains
vtp mode
vtp password
vtp pruning
7. link aggregation
etherchannel
etherchannel load balancing
configuring and managing etherchannel
cross-stack etherchannel
multichassis etherchannel (mec)
virtual port channel
initial vpc configuration
adding a vpc
8. spanning tree
broadcast storms
mac address table instability
preventing loops with spanning tree
how spanning tree works
managing spanning tree
additional spanning tree features
portfast
bpdu guard
uplinkfast
backbonefast
common spanning tree problems
duplex mismatch
unidirectional links
bridge assurance
designing to prevent spanning tree problems
use routing instead of switching for redundancy
always configure the root bridge
9. routing and routers
routing tables
route types
the ip routing table
host route
subnet
summary (group of subnets)
major network
supernet (group of major networks)
default route
virtual routing and forwarding
10. routing protocols
communication between routers
metrics and protocol types
administrative distance
specific routing protocols
rip
ripv2
eigrp
ospf
bgp
11. redistribution
redistributing into rip
redistributing into eigrp
redistributing into ospf
mutual redistribution
redistribution loops
limiting redistribution
route tags
a real-world example
12. tunnels
gre tunnels
gre tunnels and routing protocols
gre and access lists
13. first hop redundancy
hsrp
hsrp interface tracking
when hsrp isn't enough
nexus and hsrp
glbp
object tracking in glbp
14. route maps
building a route map
policy routing example
monitoring policy routing

15. switching algorithms in cisco routers
process switching
interrupt context switching
fast switching
optimum switching
cef
configuring and managing switching paths
process switching
fast switching
cef
16. multilayer switches
configuring svis
ios (4500, 6500, 3550, 3750, etc.)
hybrid mode (4500, 6500)
nx-os (nexus 7000, 5000)
multilayer switch models
17. cisco 6500 multilayer switches
architecture
buses
enhanced chassis
vertical enhanced chassis
supervisors
modules
catos versus ios
installing vss
other recommended vss commands
vss failover commands
miscellaneous vss commands
vss best practices
18. cisco nexus
nexus hardware
nexus 7000
nexus 5000
nexus 2000
nexus 1000 series
nx-os
nx-os versus ios
nexus iconography
nexus design features
virtual routing and forwarding
virtual device contexts
shared and dedicated rate-mode
configuring fabric extenders (fexs)
virtual port channel
config-sync
configuration rollback
upgrading nx-os
19. catalyst 3750 features
stacking
interface ranges
macros
flex links
storm control
port security
span
voice vlan
qos
20. telecom nomenclature
telecom glossary
21. t1
understanding t1 duplex
types of t1
encoding
ami
b8zs
framing
d4/superframe
extended super frame
performance monitoring
loss of signal
out of frame
bipolar violation
crc6
errored seconds
extreme errored seconds
alarms
red alarm
yellow alarm
blue alarm
troubleshooting tls
loopback tests
integrated csu/dsus
configuring tls
csu/dsu configuration
csu/dsu troubleshooting
22. ds3
framing
m13
c-bits
clear-channel ds3 framing
line coding
configuring ds3s
clear-channel ds3
channelized ds3
23. frame relay
ordering frame relay service
frame relay network design
oversubscription
local management interface
congestion avoidance in frame relay
configuring frame relay
basic frame relay with two nodes
basic frame relay with more than two nodes
frame relay subinterfaces
troubleshooting frame relay
24. mpls
25. access lists
designing access lists
named versus numbered
wildcard masks
where to apply access lists
naming access lists
top-down processing
most-used on top
using groups in asa and pix acls
deleting acls
turbo acls
allowing outbound traceroute and ping
allowing mtu path discovery packets
acls in multilayer switches
configuring port acls
configuring router acls
configuring vlan maps
reflexive access lists
configuring reflexive access lists
26. authentication in cisco devices
basic (non-aaa) authentication
line passwords
configuring local users
ppp authentication
aaa authentication
enabling aaa
configuring security server information
creating method lists
applying method lists
27. basic firewall theory
best practices
the dmz
another dmz example
multiple dmz example
alternate designs
28. asa firewallconfiguration
contexts
interfaces and security levels
names
object groups
inspects
managing contexts
context types
the classifier
configuring contexts
interfaces and contexts
write mere behavior
failover
failover terminology
understanding failover
configuring failover--active/standby
monitoring failover
configuring failover--active/active
nat
nat commands
nat examples
miscellaneous
remote access
saving configuration changes
logging
troubleshooting
29. wireless
wireless standards
security
configuring a wap
mac address filtering
troubleshooting
30. volp
how volp works
protocols
telephony terms
cisco telephony terms
common issues with volp
small-office volp example
vlans
switch ports
qos on the cme router
dhcp for phones
tftp service
telephony service
dial plan
voice ports
configuring phones
dial peers
sip
troubleshooting
phone registration
tftp
dial peer
sip
31. introduction to(los
types of qos
qos mechanics
priorities
flavors of qos
common qos misconceptions
qos "carves up" a link into smaller logical links
qos limits bandwidth
qos resolves a need for more bandwidth
qos prevents packets from being dropped
qos will make you more attractive to the opposite sex
32. designing (los
llq scenario
protocols
priorities
determine bandwidth requirements
configuring the routers
class maps
policy maps
service policies
traffic-shaping scenarios
scenario 1: ethernet handoff
scenario 2: frame relay speed mismatch
33. the congested network
determining whether the network is congested
resolving the problem
34. the converged network
configuration
monitoring qos
troubleshooting a converged network
incorrect queue configuration
priority queue too small
priority queue too large
nonpriority queue too small
nonpriority queue too large
default queue too small
default queue too large
35. designing networks
documentation
requirements documents
port layout spreadsheets
ip and vlan spreadsheets
bay face layouts
power and cooling requirements
tips for network diagrams
naming conventions for devices
network designs
corporate networks
ecommerce websites
modern virtual server environments
small networks
36. ip design
public versus private ip space
vlsm
c1dr
allocating ip network space
allocating ip subnets
sequential
divide by half
reverse binary
ip subnetting made easy
37. ipv6
addressing
subnet masks
address types
subnetting
nat
simple router configuration
38. network time protocol
what is accurate time?
ntp design
configuring ntp
ntp client
ntp server
39. failures
human error
multiple component failure
disaster chains
no failover testing
troubleshooting
remain calm
log your actions
find out what changed
check the physical layer first!
assume nothing; prove everything
isolate the problem
don't look for zebras
do a physical audit
escalate
troubleshooting in a team environment
the janitor principle
40. gad's maxims
maxim # 1
politics
money
the right way to do it
maxim #2
simplify
standardize
stabilize
maxim #3
lower costs
increase performance or capacity
increase reliability

41. avoiding frustration
why everything is messed up
how to sell your ideas to management
when to upgrade and why
the dangers of upgrading
valid reasons to upgrade
why change control is your friend
how not to be a computer jerk
behavioral
environmental
leadership and mentoring
index

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號(hào) 鄂公網(wǎng)安備 42010302001612號(hào)