Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Network warrior
Bookmark Share

Text

Network warrior

Donahue, Gary A. - Personal Name;

Table of Contents
1. What Is a Network?
2. Hubs and Switches
Hubs
Switches
3. Autonegotiation
What Is Autonegotiation?
How Autonegotiation Works
When Autonegotiation Fails
Autonegotiation Best Practices
Configuring Autonegotiation
4. VLANs
Connecting VLANs
Configuring VLANs
5. Trunking
How Trunks Work
Configuring Trunks
6. VLAN Trunking Protocol
VTP Pruning
Dangers of VTP
Configuring VTP
7. Link Aggregation
EtherChannel
Cross-Stack EtherChannel
Multichassis EtherChannel (MEC)
Virtual Port Channel
8. Spanning Tree
Broadcast Storms
MAC Address Table Instability
Preventing Loops with Spanning Tree
Managing Spanning Tree
Additional Spanning Tree Features
Common Spanning Tree Problems
Designing to Prevent Spanning Tree Problems
9. Routing and Routers
Routing Tables
Route Types
The IP Routing Table
Virtual Routing and Forwarding
10. Routing Protocols
Communication Between Routers
Metrics and Protocol Types
Administrative Distance
Specific Routing Protocols
11. Redistribution
Redistributing into RIP
Redistributing into EIGRP
Redistributing into OSPF
Mutual Redistribution
Redistribution Loops
Limiting Redistribution
12. Tunnels
GRE Tunnels
GRE Tunnels and Routing Protocols
GRE and Access Lists
13. First Hop Redundancy
HSRP
HSRP Interface Tracking
When HSRP Isn’t Enough
Nexus and HSRP
GLBP
14. Route Maps
Building a Route Map
Policy Routing Example
15. Switching Algorithms in Cisco Routers
Process Switching
Interrupt Context Switching
Configuring and Managing Switching Paths
16. Multilayer Switches
Configuring SVIs
Multilayer Switch Models
17. Cisco 6500 Multilayer Switches
Architecture
Installing VSS
18. Cisco Nexus
Nexus Hardware
NX-OS
Nexus Iconography
Nexus Design Features
19. Catalyst 3750 Features
Stacking
Interface Ranges
Macros
Flex Links
Storm Control
Port Security
SPAN
Voice VLAN
QoS
20. Telecom Nomenclature
Telecom Glossary
21. T1
Understanding T1 Duplex
Types of T1
Encoding
Framing
Performance Monitoring
Alarms
Troubleshooting T1s
Configuring T1s
22. DS3
Framing
Line Coding
Configuring DS3s
23. Frame Relay
Ordering Frame Relay Service
Frame Relay Network Design
Oversubscription
Local Management Interface
Configuring Frame Relay
Troubleshooting Frame Relay
24. MPLS
25. Access Lists
Designing Access Lists
ACLs in Multilayer Switches
Reflexive Access Lists
26. Authentication in Cisco Devices
Basic (Non-AAA) Authentication
AAA Authentication
27. Basic Firewall Theory
Best Practices
The DMZ
Another DMZ Example
Multiple DMZ Example
Alternate Designs
28. ASA Firewall Configuration
Contexts
Interfaces and Security Levels
Names
Object Groups
Inspects
Managing Contexts
Failover
NAT
Miscellaneous
Troubleshooting
29. Wireless
Wireless Standards
Security
Configuring a WAP
Troubleshooting
30. VoIP
How VoIP Works
Small-Office VoIP Example
31. Introduction to QoS
Types of QoS
QoS Mechanics
Common QoS Misconceptions
32. Designing QoS
LLQ Scenario
Configuring the Routers
Traffic-Shaping Scenarios
33. The Congested Network
Determining Whether the Network Is Congested
Resolving the Problem
34. The Converged Network
Configuration
Monitoring QoS
Troubleshooting a Converged Network
35. Designing Networks
Documentation
Naming Conventions for Devices
Network Designs
36. IP Design
Public Versus Private IP Space
VLSM
CIDR
Allocating IP Network Space
Allocating IP Subnets
IP Subnetting Made Easy
37. IPv6
Addressing
Simple Router Configuration
38. Network Time Protocol
What Is Accurate Time?
NTP Design
Configuring NTP
39. Failures
Human Error
Multiple Component Failure
Disaster Chains
No Failover Testing
Troubleshooting
40. GAD’s Maxims
Maxim #1
Maxim #2
Maxim #3
41. Avoiding Frustration
Why Everything Is Messed Up
How to Sell Your Ideas to Management
When to Upgrade and Why
Why Change Control Is Your Friend
How Not to Be a Computer Jerk

Index


Availability
#
Perpustakaan Poltek SSN (Rak 000) 004.65 DON n
b0001346
Available - Available
Detail Information
Series Title
--
Call Number
004.65 DON n
Publisher
California : O'Reilly Media., 2011
Collation
xxiii, 757 hal.; ilus.; 23 cm
Language
English
ISBN/ISSN
9781449387860
Classification
004.65
Content Type
-
Media Type
-
Carrier Type
-
Edition
2nd Edition
Subject(s)
Networks and Switching
Computer networks
Jaringan komputer
Cisco DSL
Specific Detail Info
--
Statement of Responsibility
Gary a. Donahue
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?