Network Warrior and over 2 million other books are available for Amazon Kindle . Learn more

Buy New

or
Sign in to turn on 1-Click ordering.
Buy Used
Used - Good See details
Price: £18.52

or
 
   
Trade in Yours
For a £3.74 Gift Card
Trade in
More Buying Choices
Have one to sell? Sell yours here
Start reading Network Warrior on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Network Warrior [Paperback]

Gary A. Donahue
5.0 out of 5 stars  See all reviews (4 customer reviews)
RRP: £32.50
Price: £31.57 & FREE Delivery in the UK. Details
You Save: £0.93 (3%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 4 left in stock (more on the way).
Dispatched from and sold by Amazon. Gift-wrap available.
Want it tomorrow, 20 Sep.? Choose Express delivery at checkout. Details
‹  Return to Product Overview

Table of Contents

Preface; Who Should Read This Book; Conventions Used in This Book; Using Code Examples; We’d Like to Hear from You; Safari® Books Online; Acknowledgments; Chapter 1: What Is a Network?; Chapter 2: Hubs and Switches; 2.1 Hubs; 2.2 Switches; Chapter 3: Autonegotiation; 3.1 What Is Autonegotiation?; 3.2 How Autonegotiation Works; 3.3 When Autonegotiation Fails; 3.4 Autonegotiation Best Practices; 3.5 Configuring Autonegotiation; Chapter 4: VLANs; 4.1 Connecting VLANs; 4.2 Configuring VLANs; Chapter 5: Trunking; 5.1 How Trunks Work; 5.2 Configuring Trunks; Chapter 6: VLAN Trunking Protocol; 6.1 VTP Pruning; 6.2 Dangers of VTP; 6.3 Configuring VTP; Chapter 7: Link Aggregation; 7.1 EtherChannel; 7.2 Cross-Stack EtherChannel; 7.3 Multichassis EtherChannel (MEC); 7.4 Virtual Port Channel; Chapter 8: Spanning Tree; 8.1 Broadcast Storms; 8.2 MAC Address Table Instability; 8.3 Preventing Loops with Spanning Tree; 8.4 Managing Spanning Tree; 8.5 Additional Spanning Tree Features; 8.6 Common Spanning Tree Problems; 8.7 Designing to Prevent Spanning Tree Problems; Chapter 9: Routing and Routers; 9.1 Routing Tables; 9.2 Route Types; 9.3 The IP Routing Table; 9.4 Virtual Routing and Forwarding; Chapter 10: Routing Protocols; 10.1 Communication Between Routers; 10.2 Metrics and Protocol Types; 10.3 Administrative Distance; 10.4 Specific Routing Protocols; Chapter 11: Redistribution; 11.1 Redistributing into RIP; 11.2 Redistributing into EIGRP; 11.3 Redistributing into OSPF; 11.4 Mutual Redistribution; 11.5 Redistribution Loops; 11.6 Limiting Redistribution; Chapter 12: Tunnels; 12.1 GRE Tunnels; 12.2 GRE Tunnels and Routing Protocols; 12.3 GRE and Access Lists; Chapter 13: First Hop Redundancy; 13.1 HSRP; 13.2 HSRP Interface Tracking; 13.3 When HSRP Isn’t Enough; 13.4 Nexus and HSRP; 13.5 GLBP; Chapter 14: Route Maps; 14.1 Building a Route Map; 14.2 Policy Routing Example; Chapter 15: Switching Algorithms in Cisco Routers; 15.1 Process Switching; 15.2 Interrupt Context Switching; 15.3 Configuring and Managing Switching Paths; Chapter 16: Multilayer Switches; 16.1 Configuring SVIs; 16.2 Multilayer Switch Models; Chapter 17: Cisco 6500 Multilayer Switches; 17.1 Architecture; 17.2 CatOS Versus IOS; 17.3 Installing VSS; Chapter 18: Cisco Nexus; 18.1 Nexus Hardware; 18.2 NX-OS; 18.3 Nexus Iconography; 18.4 Nexus Design Features; Chapter 19: Catalyst 3750 Features; 19.1 Stacking; 19.2 Interface Ranges; 19.3 Macros; 19.4 Flex Links; 19.5 Storm Control; 19.6 Port Security; 19.7 SPAN; 19.8 Voice VLAN; 19.9 QoS; Chapter 20: Telecom Nomenclature; 20.1 Telecom Glossary; Chapter 21: T1; 21.1 Understanding T1 Duplex; 21.2 Types of T1; 21.3 Encoding; 21.4 Framing; 21.5 Performance Monitoring; 21.6 Alarms; 21.7 Troubleshooting T1s; 21.8 Configuring T1s; Chapter 22: DS3; 22.1 Framing; 22.2 Line Coding; 22.3 Configuring DS3s; Chapter 23: Frame Relay; 23.1 Ordering Frame Relay Service; 23.2 Frame Relay Network Design; 23.3 Oversubscription; 23.4 Local Management Interface; 23.5 Configuring Frame Relay; 23.6 Troubleshooting Frame Relay; Chapter 24: MPLS; Chapter 25: Access Lists; 25.1 Designing Access Lists; 25.2 ACLs in Multilayer Switches; 25.3 Reflexive Access Lists; Chapter 26: Authentication in Cisco Devices; 26.1 Basic (Non-AAA) Authentication; 26.2 AAA Authentication; Chapter 27: Basic Firewall Theory; 27.1 Best Practices; 27.2 The DMZ; 27.3 Alternate Designs; Chapter 28: ASA Firewall Configuration; 28.1 Contexts; 28.2 Interfaces and Security Levels; 28.3 Names; 28.4 Object Groups; 28.5 Inspects; 28.6 Managing Contexts; 28.7 Failover; 28.8 NAT; 28.9 Miscellaneous; 28.10 Troubleshooting; Chapter 29: Wireless; 29.1 Wireless Standards; 29.2 Security; 29.3 Configuring a WAP; 29.4 Troubleshooting; Chapter 30: VoIP; 30.1 How VoIP Works; 30.2 Small-Office VoIP Example; 30.3 Troubleshooting; Chapter 31: Introduction to QoS; 31.1 Types of QoS; 31.2 QoS Mechanics; 31.3 Common QoS Misconceptions; Chapter 32: Designing QoS; 32.1 LLQ Scenario; 32.2 Configuring the Routers; 32.3 Traffic-Shaping Scenarios; Chapter 33: The Congested Network; 33.1 Determining Whether the Network Is Congested; 33.2 Resolving the Problem; Chapter 34: The Converged Network; 34.1 Configuration; 34.2 Monitoring QoS; 34.3 Troubleshooting a Converged Network; Chapter 35: Designing Networks; 35.1 Documentation; 35.2 Naming Conventions for Devices; 35.3 Network Designs; Chapter 36: IP Design; 36.1 Public Versus Private IP Space; 36.2 VLSM; 36.3 CIDR; 36.4 Allocating IP Network Space; 36.5 Allocating IP Subnets; 36.6 IP Subnetting Made Easy; Chapter 37: IPv6; 37.1 Addressing; 37.2 Simple Router Configuration; Chapter 38: Network Time Protocol; 38.1 What Is Accurate Time?; 38.2 NTP Design; 38.3 Configuring NTP; Chapter 39: Failures; 39.1 Human Error; 39.2 Multiple Component Failure; 39.3 Disaster Chains; 39.4 No Failover Testing; 39.5 Troubleshooting; Chapter 40: GAD’s Maxims; 40.1 Maxim #1; 40.2 Maxim #2; 40.3 Maxim #3; Chapter 41: Avoiding Frustration; 41.1 Why Everything Is Messed Up; 41.2 How to Sell Your Ideas to Management; 41.3 When to Upgrade and Why; 41.4 Why Change Control Is Your Friend; 41.5 How Not to Be a Computer Jerk; Colophon;

‹  Return to Product Overview