Synopses & Reviews
Written by networking veteran with 20 years of experience, Network Warrior provides a thorough and practical introduction to the entire network infrastructure, from cabling to the routers. What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive in the real world are two very different things. The strategies that this book offers weren 't on the exam, but they 're exactly what you need to do your job well.
Network Warrior takes you step by step through the world of hubs, switches, firewalls, and more, including ways to troubleshoot a congested network, and when to upgrade and why. Along the way, you 'll gain an historical perspective of various networking features, such as the way Ethernet evolved. Based on the author 's own experience as well as those he worked for and with, Network Warrior is a Cisco-centric book, focused primarily on the TCP/IP protocol and Ethernet networks -- the realm that Cisco Systems now dominates. The book covers:
The type of networks now in use, from LANs, WANs and MANs to CANs
- The OSI Model and the layers involved in sending data
- Hubs, repeaters, switches, and trunks in practice
- Auto negotiation and why it 's a common problem in network slowdowns
- Route maps, routing protocols, and switching algorithms in Cisco routers
- The resilient Ethernet -- how to make things truly redundant
- Cisco 6500 multi-layer switches and the Catalyst 3750 switch
- Telecom nomenclature -- why it 's different from the data world
- T1 and DS3
- Firewall theory, designing access lists, authentication in Cisco devices
- Server load balancing technology
- Content switch module in action
- Designing QOS and what QOS does not do
- IP design and subnetting made easy
The book also explains how to sell your ideas to management, how networks become a mess as a company grows, and why change control is your friend. Network Warrior
will help network administrators and engineers win the complex battles they face every day.
Written by a networking veteran with 20 years of experience, this book provides a thorough and practical introduction to the entire network infrastructure, from cabling to the routers.
This book starts where certification exams leave off. Network Warrior provides a thorough and practical guide to the entire network infrastructure, from cabling to the routers and beyond. You'll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. The strategies and examples outlined in this book provide the tools you need to do your job well.
Revised and updated for the latest Cisco technology -- including the Nexus 7000 series -- this second edition takes you step by step through the world of routers, switches, firewalls, and more, including ways to troubleshoot a congested network, and when to upgrade and why.
- Types of networks in use, from LANs, WANs and MANs to CANs
- Switches, routers, firewalls, and many other devices
- Auto negotiation and why its a common cause of network slowdowns
- Telecom nomenclature and why its different from the data world
- T1 and DS3 explained for the networking professional
- Firewall theory, design, and configuration
- How to design route maps and access lists in Cisco devices
- Server load balancing technology
- How QoS really works (and what it cannot do)
- How to plan and deploy a network
About the Author
Gary A. Donahue is a working consultant who has been in the computer industry for 25 years. Gary has worked as a programmer, mainframe administrator, Technical Assistance Center engineer, network administrator, network designer, and consultant. Gary has worked as the Director of Network Infrastructure for a national consulting company and has been the president of his own New Jersey consulting company; GAD Technologies.
Table of Contents
Dedication; Preface; Who Should Read This Book; Conventions Used in This Book; Using Code Examples; We'd Like to Hear from You; Safari® Enabled; Acknowledgments; Part I: Hubs, Switches, and Switching; Chapter 1: What Is a Network?; Chapter 2: Hubs and Switches; 2.1 Hubs; 2.2 Switches; Chapter 3: Auto-Negotiation; 3.1 What Is Auto-Negotiation?; 3.2 How Auto-Negotiation Works; 3.3 When Auto-Negotiation Fails; 3.4 Auto-Negotiation Best Practices; 3.5 Configuring Auto-Negotiation; Chapter 4: VLANs; 4.1 Connecting VLANs; 4.2 Configuring VLANs; Chapter 5: Trunking; 5.1 How Trunks Work; 5.2 Configuring Trunks; Chapter 6: VLAN Trunking Protocol; 6.1 VTP Pruning; 6.2 Dangers of VTP; 6.3 Configuring VTP; Chapter 7: EtherChannel; 7.1 Load Balancing; 7.2 Configuring and Managing EtherChannel; Chapter 8: Spanning Tree; 8.1 Broadcast Storms; 8.2 MAC Address Table Instability; 8.3 Preventing Loops with Spanning Tree; 8.4 Managing Spanning Tree; 8.5 Additional Spanning Tree Features; 8.6 Common Spanning Tree Problems; 8.7 Designing to Prevent Spanning Tree Problems; Part II: Routers and Routing; Chapter 9: Routing and Routers; 9.1 Routing Tables; 9.2 Route Types; 9.3 The IP Routing Table; Chapter 10: Routing Protocols; 10.1 Communication Between Routers; 10.2 Metrics and Protocol Types; 10.3 Administrative Distance; 10.4 Specific Routing Protocols; Chapter 11: Redistribution; 11.1 Redistributing into RIP; 11.2 Redistributing into EIGRP; 11.3 Redistributing into OSPF; 11.4 Mutual Redistribution; 11.5 Redistribution Loops; 11.6 Limiting Redistribution; Chapter 12: Tunnels; 12.1 GRE Tunnels; 12.2 GRE Tunnels and Routing Protocols; 12.3 GRE and Access Lists; Chapter 13: Resilient Ethernet; 13.1 HSRP; 13.2 HSRP Interface Tracking; 13.3 When HSRP Isn't Enough; Chapter 14: Route Maps; 14.1 Building a Route Map; 14.2 Policy-Routing Example; Chapter 15: Switching Algorithms in Cisco Routers; 15.1 Process Switching; 15.2 Interrupt Context Switching; 15.3 Configuring and Managing Switching Paths; Part III: Multilayer Switches; Chapter 16: Multilayer Switches; 16.1 Configuring SVIs; 16.2 Multilayer Switch Models; Chapter 17: Cisco 6500 Multilayer Switches; 17.1 Architecture; 17.2 CatOS Versus IOS; Chapter 18: Catalyst 3750 Features; 18.1 Stacking; 18.2 Interface Ranges; 18.3 Macros; 18.4 Flex Links; 18.5 Storm Control; 18.6 Port Security; 18.7 SPAN; 18.8 Voice VLAN; 18.9 QoS; Part IV: Telecom; Chapter 19: Telecom Nomenclature; 19.1 Introduction and History; 19.2 Telecom Glossary; Chapter 20: T1; 20.1 Understanding T1 Duplex; 20.2 Types of T1; 20.3 Encoding; 20.4 Framing; 20.5 Performance Monitoring; 20.6 Alarms; 20.7 Troubleshooting T1s; 20.8 Configuring T1s; Chapter 21: DS3; 21.1 Framing; 21.2 Line Coding; 21.3 Configuring DS3s; Chapter 22: Frame Relay; 22.1 Ordering Frame-Relay Service; 22.2 Frame-Relay Network Design; 22.3 Oversubscription; 22.4 Local Management Interface (LMI); 22.5 Configuring Frame Relay; 22.6 Troubleshooting Frame Relay; Part V: Security and Firewalls; Chapter 23: Access Lists; 23.1 Designing Access Lists; 23.2 ACLs in Multilayer Switches; 23.3 Reflexive Access Lists; Chapter 24: Authentication in Cisco Devices; 24.1 Basic (Non-AAA) Authentication; 24.2 AAA Authentication; Chapter 25: Firewall Theory; 25.1 Best Practices; 25.2 The DMZ; 25.3 Alternate Designs; Chapter 26: PIX Firewall Configuration; 26.1 Interfaces and Priorities; 26.2 Names; 26.3 Object Groups; 26.4 Fixups; 26.5 Failover; 26.6 NAT; 26.7 Miscellaneous; 26.8 Troubleshooting; Part VI: Server Load Balancing; Chapter 27: Server Load-Balancing Technology; 27.1 Types of Load Balancing; 27.2 How Server Load Balancing Works; 27.3 Configuring Server Load Balancing; Chapter 28: Content Switch Modules in Action; 28.1 Common Tasks; 28.2 Upgrading the CSM; Part VII: Quality of Service; Chapter 29: Introduction to QoS; 29.1 Types of QoS; 29.2 QoS Mechanics; 29.3 Common QoS Misconceptions; Chapter 30: Designing a QoS Scheme; 30.1 Determining Requirements; 30.2 Configuring the Routers; Chapter 31: The Congested Network; 31.1 Determining Whether the Network Is Congested; 31.2 Resolving the Problem; Chapter 32: The Converged Network; 32.1 Configuration; 32.2 Monitoring QoS; 32.3 Troubleshooting a Converged Network; Part VIII: Designing Networks; Chapter 33: Designing Networks; 33.1 Documentation; 33.2 Naming Conventions for Devices; 33.3 Network Designs; Chapter 34: IP Design; 34.1 Public Versus Private IP Space; 34.2 VLSM; 34.3 CIDR; 34.4 Allocating IP Network Space; 34.5 Allocating IP Subnets; 34.6 IP Subnetting Made Easy; Chapter 35: Network Time Protocol; 35.1 What Is Accurate Time?; 35.2 NTP Design; 35.3 Configuring NTP; Chapter 36: Failures; 36.1 Human Error; 36.2 Multiple Component Failure; 36.3 Disaster Chains; 36.4 No Failover Testing; 36.5 Troubleshooting; Chapter 37: GAD's Maxims; 37.1 Maxim #1; 37.2 Maxim #2; 37.3 Maxim #3; Chapter 38: Avoiding Frustration; 38.1 Why Everything Is Messed Up; 38.2 How to Sell Your Ideas to Management; 38.3 When to Upgrade and Why; 38.4 Why Change Control Is Your Friend; 38.5 How Not to Be a Computer Jerk; Colophon;