- Used Books
- Staff Picks
- Gifts & Gift Cards
- Sell Books
- Stores & Events
- Let's Talk Books
Special Offers see all
More at Powell's
Recently Viewed clear list
New Trade Paper
Ships in 1 to 3 days
Network Warriorby Gary A. Donahue
Synopses & Reviews
Written by networking veteran with 20 years of experience, Network Warrior provides a thorough and practical introduction to the entire network infrastructure, from cabling to the routers. What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive in the real world are two very different things. The strategies that this book offers weren 't on the exam, but they 're exactly what you need to do your job well.
Network Warrior takes you step by step through the world of hubs, switches, firewalls, and more, including ways to troubleshoot a congested network, and when to upgrade and why. Along the way, you 'll gain an historical perspective of various networking features, such as the way Ethernet evolved. Based on the author 's own experience as well as those he worked for and with, Network Warrior is a Cisco-centric book, focused primarily on the TCP/IP protocol and Ethernet networks — the realm that Cisco Systems now dominates. The book covers:
The type of networks now in use, from LANs, WANs and MANs to CANs
The book also explains how to sell your ideas to management, how networks become a mess as a company grows, and why change control is your friend. Network Warrior will help network administrators and engineers win the complex battles they face every day.
Written by a networking veteran with 20 years of experience, this book provides a thorough and practical introduction to the entire network infrastructure, from cabling to the routers.
Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, youll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout.
This book starts where certification exams leave off. Network Warrior provides a thorough and practical guide to the entire network infrastructure, from cabling to the routers and beyond. You'll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. The strategies and examples outlined in this book provide the tools you need to do your job well.
Revised and updated for the latest Cisco technology — including the Nexus 7000 series — this second edition takes you step by step through the world of routers, switches, firewalls, and more, including ways to troubleshoot a congested network, and when to upgrade and why.
About the Author
Gary A. Donahue is a working consultant who has been in the computer industry for 25 years. Gary has worked as a programmer, mainframe administrator, Technical Assistance Center engineer, network administrator, network designer, and consultant. Gary has worked as the Director of Network Infrastructure for a national consulting company and has been the president of his own New Jersey consulting company; GAD Technologies.
Table of Contents
Preface; Who Should Read This Book; Conventions Used in This Book; Using Code Examples; We'd Like to Hear from You; Safari® Books Online; Acknowledgments; Chapter 1: What Is a Network?; Chapter 2: Hubs and Switches; 2.1 Hubs; 2.2 Switches; Chapter 3: Autonegotiation; 3.1 What Is Autonegotiation?; 3.2 How Autonegotiation Works; 3.3 When Autonegotiation Fails; 3.4 Autonegotiation Best Practices; 3.5 Configuring Autonegotiation; Chapter 4: VLANs; 4.1 Connecting VLANs; 4.2 Configuring VLANs; Chapter 5: Trunking; 5.1 How Trunks Work; 5.2 Configuring Trunks; Chapter 6: VLAN Trunking Protocol; 6.1 VTP Pruning; 6.2 Dangers of VTP; 6.3 Configuring VTP; Chapter 7: Link Aggregation; 7.1 EtherChannel; 7.2 Cross-Stack EtherChannel; 7.3 Multichassis EtherChannel (MEC); 7.4 Virtual Port Channel; Chapter 8: Spanning Tree; 8.1 Broadcast Storms; 8.2 MAC Address Table Instability; 8.3 Preventing Loops with Spanning Tree; 8.4 Managing Spanning Tree; 8.5 Additional Spanning Tree Features; 8.6 Common Spanning Tree Problems; 8.7 Designing to Prevent Spanning Tree Problems; Chapter 9: Routing and Routers; 9.1 Routing Tables; 9.2 Route Types; 9.3 The IP Routing Table; 9.4 Virtual Routing and Forwarding; Chapter 10: Routing Protocols; 10.1 Communication Between Routers; 10.2 Metrics and Protocol Types; 10.3 Administrative Distance; 10.4 Specific Routing Protocols; Chapter 11: Redistribution; 11.1 Redistributing into RIP; 11.2 Redistributing into EIGRP; 11.3 Redistributing into OSPF; 11.4 Mutual Redistribution; 11.5 Redistribution Loops; 11.6 Limiting Redistribution; Chapter 12: Tunnels; 12.1 GRE Tunnels; 12.2 GRE Tunnels and Routing Protocols; 12.3 GRE and Access Lists; Chapter 13: First Hop Redundancy; 13.1 HSRP; 13.2 HSRP Interface Tracking; 13.3 When HSRP Isn't Enough; 13.4 Nexus and HSRP; 13.5 GLBP; Chapter 14: Route Maps; 14.1 Building a Route Map; 14.2 Policy Routing Example; Chapter 15: Switching Algorithms in Cisco Routers; 15.1 Process Switching; 15.2 Interrupt Context Switching; 15.3 Configuring and Managing Switching Paths; Chapter 16: Multilayer Switches; 16.1 Configuring SVIs; 16.2 Multilayer Switch Models; Chapter 17: Cisco 6500 Multilayer Switches; 17.1 Architecture; 17.2 CatOS Versus IOS; 17.3 Installing VSS; Chapter 18: Cisco Nexus; 18.1 Nexus Hardware; 18.2 NX-OS; 18.3 Nexus Iconography; 18.4 Nexus Design Features; Chapter 19: Catalyst 3750 Features; 19.1 Stacking; 19.2 Interface Ranges; 19.3 Macros; 19.4 Flex Links; 19.5 Storm Control; 19.6 Port Security; 19.7 SPAN; 19.8 Voice VLAN; 19.9 QoS; Chapter 20: Telecom Nomenclature; 20.1 Telecom Glossary; Chapter 21: T1; 21.1 Understanding T1 Duplex; 21.2 Types of T1; 21.3 Encoding; 21.4 Framing; 21.5 Performance Monitoring; 21.6 Alarms; 21.7 Troubleshooting T1s; 21.8 Configuring T1s; Chapter 22: DS3; 22.1 Framing; 22.2 Line Coding; 22.3 Configuring DS3s; Chapter 23: Frame Relay; 23.1 Ordering Frame Relay Service; 23.2 Frame Relay Network Design; 23.3 Oversubscription; 23.4 Local Management Interface; 23.5 Configuring Frame Relay; 23.6 Troubleshooting Frame Relay; Chapter 24: MPLS; Chapter 25: Access Lists; 25.1 Designing Access Lists; 25.2 ACLs in Multilayer Switches; 25.3 Reflexive Access Lists; Chapter 26: Authentication in Cisco Devices; 26.1 Basic (Non-AAA) Authentication; 26.2 AAA Authentication; Chapter 27: Basic Firewall Theory; 27.1 Best Practices; 27.2 The DMZ; 27.3 Alternate Designs; Chapter 28: ASA Firewall Configuration; 28.1 Contexts; 28.2 Interfaces and Security Levels; 28.3 Names; 28.4 Object Groups; 28.5 Inspects; 28.6 Managing Contexts; 28.7 Failover; 28.8 NAT; 28.9 Miscellaneous; 28.10 Troubleshooting; Chapter 29: Wireless; 29.1 Wireless Standards; 29.2 Security; 29.3 Configuring a WAP; 29.4 Troubleshooting; Chapter 30: VoIP; 30.1 How VoIP Works; 30.2 Small-Office VoIP Example; 30.3 Troubleshooting; Chapter 31: Introduction to QoS; 31.1 Types of QoS; 31.2 QoS Mechanics; 31.3 Common QoS Misconceptions; Chapter 32: Designing QoS; 32.1 LLQ Scenario; 32.2 Configuring the Routers; 32.3 Traffic-Shaping Scenarios; Chapter 33: The Congested Network; 33.1 Determining Whether the Network Is Congested; 33.2 Resolving the Problem; Chapter 34: The Converged Network; 34.1 Configuration; 34.2 Monitoring QoS; 34.3 Troubleshooting a Converged Network; Chapter 35: Designing Networks; 35.1 Documentation; 35.2 Naming Conventions for Devices; 35.3 Network Designs; Chapter 36: IP Design; 36.1 Public Versus Private IP Space; 36.2 VLSM; 36.3 CIDR; 36.4 Allocating IP Network Space; 36.5 Allocating IP Subnets; 36.6 IP Subnetting Made Easy; Chapter 37: IPv6; 37.1 Addressing; 37.2 Simple Router Configuration; Chapter 38: Network Time Protocol; 38.1 What Is Accurate Time?; 38.2 NTP Design; 38.3 Configuring NTP; Chapter 39: Failures; 39.1 Human Error; 39.2 Multiple Component Failure; 39.3 Disaster Chains; 39.4 No Failover Testing; 39.5 Troubleshooting; Chapter 40: GAD's Maxims; 40.1 Maxim #1; 40.2 Maxim #2; 40.3 Maxim #3; Chapter 41: Avoiding Frustration; 41.1 Why Everything Is Messed Up; 41.2 How to Sell Your Ideas to Management; 41.3 When to Upgrade and Why; 41.4 Why Change Control Is Your Friend; 41.5 How Not to Be a Computer Jerk; Colophon;
What Our Readers Are Saying
Other books you might like