| |
| |
Introduction | |
| |
| |
| |
Networking Fundamentals How Computers Communicate | |
| |
| |
The OSI Model | |
| |
| |
Open Versus Proprietary Systems | |
| |
| |
Seven Layers | |
| |
| |
At-a-Glance: OSI Model | |
| |
| |
Internet Infrastructure: How It All Connects TCP/IP and IP Addressing | |
| |
| |
Computers Speaking the Same Language | |
| |
| |
What Is an Address? | |
| |
| |
Dynamically Allocated IP Addresses | |
| |
| |
Domain Names and Relationship to IP Addresses | |
| |
| |
Matching Domain Names to IP Addresses | |
| |
| |
At-a-Glance: TCP/IP | |
| |
| |
At-a-Glance: IP Addressing | |
| |
| |
At-a-Glance: IPv6 | |
| |
| |
NAT and PAT Internet Applications | |
| |
| |
The Internet and Its Applications | |
| |
| |
E-Mail | |
| |
| |
Web Browsing | |
| |
| |
E-Mail | |
| |
| |
Peer-to-Peer Sharing | |
| |
| |
| |
Networking Infrastructure Ethernet | |
| |
| |
History of Ethernet | |
| |
| |
What Is Ethernet? | |
| |
| |
Evolution of Ethernet | |
| |
| |
At-a-Glance: Ethernet | |
| |
| |
Reducing Collisions on Ethernet LAN Switching | |
| |
| |
Fast Computers Need Faster Networks | |
| |
| |
Switching Basics: It s a Bridge | |
| |
| |
Switching Ethernets | |
| |
| |
Switches Take Over the World | |
| |
| |
At-a-Glance: Switching Spanning Tree | |
| |
| |
Network Loops | |
| |
| |
Sometimes, the Earth Is Flat | |
| |
| |
Preventing Network Loops | |
| |
| |
Spanning-Tree Fundamentals | |
| |
| |
At-a-Glance: Spanning Tree Routing | |
| |
| |
Routers | |
| |
| |
Routers Talk Among Themselves to Find Routes | |
| |
| |
Routers Route Packets | |
| |
| |
Routers Bridge and Switches Route | |
| |
| |
At-a-Glance: Routing | |
| |
| |
Routing and Switching | |
| |
| |
| |
Network Design Campus Networks and Hierarchical Design | |
| |
| |
Building Networks for Ease of Use | |
| |
| |
At-a-Glance: Hierarchical Campus Design WAN Network Design | |
| |
| |
Moving Traffic Across the Street and the World | |
| |
| |
WAN Services | |
| |
| |
Integrated Services Digital Network | |
| |
| |
Frame Relay | |
| |
| |
ATM | |
| |
| |
MPLS | |
| |
| |
Broadband | |
| |
| |
Virtual Private Networks (VPN) | |
| |
| |
WAN Devices | |
| |
| |
At-a-Glance: Frame Relay | |
| |
| |
At-a-Glance: Asynchronous Transfer Mode (ATM) | |
| |
| |
Multiprotocol Label Switching (MPLS) Services | |
| |
| |
At-a-Glance: MPLS | |
| |
| |
MPLS Traffic Separation Broadband Technologies | |
| |
| |
Always-on Access | |
| |
| |
Broadband Technology Evolution | |
| |
| |
At-a-Glance: ISDN | |
| |
| |
At-a-Glance: Broadband Virtual Private Networks | |
| |
| |
Secure Networking Over the Internet | |
| |
| |
At-a-Glance: VPNs | |
| |
| |
Establishing a VPN Connection | |
| |
| |
At-a-Glance: Encryption | |
| |
| |
Client Authentication Optical Technologies | |
| |
| |
LANs, WANs and Now MANs | |
| |
| |
SONET, DWDM, and DPT | |
| |
| |
At-a-Glance: Metro Optical Branch Office Network Designs | |
| |
| |
Distributed Workforce | |
| |
| |
Distributed Office Challenges | |
| |
| |
At-a-Glance: Branch Office Design | |
| |
| |
| |
Network Availability High Availability | |
| |
| |
At-a-Glance: High Availability Control Plane | |
| |
| |
When Good Networks Go Bad | |
| |
| |
Control Plane Protection | |
| |
| |
At-a-Glance: Control Plane Protection Quality of Service and Network Availability | |
| |
| |
Quality of Service as Network Protection? | |
| |
| |
Scavenger QoS | |
| |
| |
At-a-Glance: QoS for Network Resiliency Disaster Recovery | |
| |
| |
What Happens When the Network Stops Working | |
| |
| |
DR Planning | |
| |
| |
Resiliency and Backup Services | |
| |
| |
Preparedness Testing | |
| |
| |
At-a-Glance: Disaster Recovery: Business Continuance | |
| |
| |
Disaster Recovery Network Management | |
| |
| |
Keeping the Network Alive from Afar | |
| |
| |
Network Documentation: A Must-Have | |
| |
| |
Network-Management Protocols | |
| |
| |
Troubleshooting Tools | |
| |
| |
At-a-Glance: Network Management | |
| |
| |
Network Management | |
| |
| |
| |
Securing the Network Network Security | |
| |
| |
Identity | |
| |
| |
Perimeter Security | |
| |
| |
Data Privacy | |
| |
| |
Security Monitoring | |
| |
| |
Policy Enforcement | |