Introduction Part I: Networking Fundamentals How Computers Communicate The OSI Model Open Versus Proprietary Systems Seven Layers At-a-Glance: OSI Model Internet Infrastructure: How It All Connects TCP/IP and IP Addressing Computers Speaking the Same Language What Is an Address? Dynamically Allocated IP Addresses Domain Names and Relationship to IP Addresses Matching Domain Names to IP Addresses At-a-Glance: TCP/IP At-a-Glance: IP Addressing At-a-Glance: IPv6 NAT and PAT Internet Applications The Internet and Its Applications E-Mail Web Browsing E-Mail Peer-to-Peer Sharing Part II: Networking Infrastructure Ethernet History of Ethernet What Is Ethernet? Evolution of Ethernet At-a-Glance: Ethernet Reducing Collisions on Ethernet LAN Switching Fast Computers Need Faster Networks Switching Basics: It''s a Bridge Switching Ethernets Switches Take Over the World At-a-Glance: Switching Spanning Tree Network Loops Sometimes, the Earth Is Flat Preventing Network Loops Spanning-Tree Fundamentals At-a-Glance: Spanning Tree Routing Routers Routers Talk Among Themselves to Find Routes Routers Route Packets Routers Bridge and Switches Route At-a-Glance: Routing Routing and Switching Part III: Network Design Campus Networks and Hierarchical Design Building Networks for Ease of Use At-a-Glance: Hierarchical Campus Design WAN Network Design Moving Traffic Across the Street and the World WAN Services Integrated Services Digital Network Frame Relay ATM MPLS Broadband Virtual Private Networks (VPN) WAN Devices At-a-Glance: Frame Relay At-a-Glance: Asynchronous Transfer Mode (ATM) Multiprotocol Label Switching (MPLS) Services At-a-Glance: MPLS MPLS Traffic Separation Broadband Technologies Always-on Access Broadband Technology Evolution At-a-Glance: ISDN At-a-Glance: Broadband Virtual Private Networks Secure Networking Over the Internet At-a-Glance: VPNs Establishing a VPN Connection At-a-Glance: Encryption Client Authentication Optical Technologies LANs, WANs and Now MANs SONET, DWDM, and DPT At-a-Glance: Metro Optical Branch Office Network Designs Distributed Workforce Distributed Office Challenges At-a-Glance: Branch Office Design Part IV: Network Availability High Availability At-a-Glance: High Availability Control Plane When Good Networks Go Bad Control Plane Protection At-a-Glance: Control Plane Protection Quality of Service and Network Availability Quality of Service as Network Protection? Scavenger QoS At-a-Glance: QoS for Network Resiliency Disaster Recovery What Happens When the Network Stops Working DR Planning Resiliency and Backup Services Preparedness Testing At-a-Glance: Disaster Recovery: Business Continuance Disaster Recovery Network Management Keeping the Network Alive from Afar Network Documentation: A Must-Have Network-Management Protocols Troubleshooting Tools At-a-Glance: Network Management Network Management Part V: Securing the Network Network Security Identity Perimeter Security Data Privacy Security Monitoring Policy Enforcement At-a-Glance: Network Security At-a-Glance: Hacking DoS Attacks Snooping and Spoofing Firewalls Protecting the Perimeter Get Off the Net! Firewall for Your Protection Personal Firewalls At-a-Glance: Firewalls and IDS Firewalls and IDS Access and Content Security Intrusion Prevention Systems Intrusion Detection Systems Intrusion Prevention Systems The Problem with False Positives At-a-Glance: Intrusion Detection Port-Based Security Combating Access-Based Attacks At-a-Glance: Port-Based Security Identity-Based Networking Network Access Conundrum Identity-Based Networking 802.1x At-a-Glance: Identity Authentication Network Admission Control Combating Virus Outbreaks Assessing Device "Health" Network Admission Control At-a-Glance: NAC URL Filtering: Eliminating Unwanted Web Page Access Internet Access and Liability Issues Enforcing Corporate Internet Usage Policies At-a-Glance: URL Filtering URL Filtering and Firewalls Deep Packet Inspection: Controlling Unwanted Applications How Do You Catch a Criminal When Everyone Wears a Mask? Deep Packet Inspection At-a-Glance: Deep Packet Inspection Packet Inspection Telemetry: Identifying and Isolating Attack Sources Normal or Abnormal Using Telemetry to Combat Attacks At-a-Glance: Telemetry Physical Security: IP Video Surveillance Locks on the Doors Video Surveillance At-a-Glance: Physical Security Physical and Logical Security Part VI: Data Centers and Application Networking Moving Data Efficiently Data Centers Store Once, Use Often n-Tier Model Functions and Requirements At-a-Glance: Data Centers Data Center Application: Corporate Expense System Storage Area Networks Efficient Deployment of Critical Data Fiber Channel and IP Infiniband At-a-Glance: Storage Networking Server-Centric Storage Caching Moving Content Close to the User How Caching Works Caching More Than Web Pages Storage Caching: From Disk to Memory Issues Affecting Caching Caching Wide Area File Services Branch Offices Rule Centralizing Storage Enter Wide Area File Services (WAFS) At-a-Glance: Wide Area File Services Wide Area Application Services Centralizing Applications Enter Wide Area Application Services (WAAS) At-a-Glance: Wide Area Application Services Part VII: Unified Communications Voice over IP Making Calls over the Web Unifying Communications Client Layer Infrastructure Layer Call-Processing Layer Application Layer Deployment Models At-a-Glance: Voice over IP Voice over IP At-a-Glance: Unified Communications Voice over IP: Toll Bypass Quality of Service Converged Networks and QoS What Is QoS? QoS and Unified Communications At-a-Glance: QoS How Packets Are Prioritized Unified Personal Communications Too Many Communications, Too Little Time Unify Me Cisco Unified Personal Communicator (CUPC) At-a-Glance: Unified Communications Meeting Collaboration Spaces Meetings, Meetings, Meetings Meetings Are an Activity, Not a Place At-a-Glance: Meeting Collaboration Traditional Videoconferencing I See You Video over IP Networks At-a-Glance: IP Videoconferencing Videoconferencing Videoconferencing Application E-Learning Telepresence Conferencing Gets Simple Video Killed the Radio Star The Next-Best Thing to Being There At-a-Glance: Telepresence Presence and Location-Aware Services I Sense a Presence The Importance of Location At-a-Glance: Presence and Location-Aware Services IP Call Center Why Can''t I Talk to a Real Person? Anatomy of a Contact Center From the Caller to the Agent, and Back Again Managing Caller and Contact Agent Efficiency New Methods for Customer Interaction At-a-Glance: IP Contact Center Call-Center Tech Support Call-Center Telemarketing Multicast and IPTV Broadcasts Watching Movies Without Flooding the World At-a-Glance: IP Multicast Multicast Part VIII: Mobility Wireless World Mobility and Wireless Networks Throwing Away the Ties That Bind At-a-Glance: Wireless LANs Wired LANs Wireless LANs Selecting and Building Wireless Networks Designing a Wireless Network At-a-Glance: Designing Wi-Fi Networks Securing Wireless Networks Locking Down Wireless Balancing Security and Access At-a-Glance: Securing Wi-Fi Outdoor and Municipal Wireless Networks It''s Just Like a Building, Only Way Bigger At-a-Glance: Municipal Wi-Fi VoIP over Wireless Networks Wireless VoIP At-a-Glance: Wireless VoIP Wireless VoIP Wireless Guest Access Mi Casa Es Su Casa At-a-Glance: Wireless Guest Access RFID and Location-Based Services Finding Your Stuff Wireless LANS: They''re Not Just for Checking E-Mail on the Toilet Anymore! At-a-Glance: Location-Based Services Wireless Location Services Part IX: Virtualized Networks Virt.
Cisco Networking Simplified