By Toby Velte, Anthony Velte

Here's a absolutely up to date version of the bestselling introductory advisor to Cisco items and applied sciences. Cisco: A Beginner's consultant, Fourth variation offers you a pragmatic hands-on source for effectively designing and dealing with a Cisco community. discover ways to paintings with Cisco routers and switches, instant applied sciences, and garage instruments. you are going to additionally get complete info on community defense, together with firewalls, in addition to communications recommendations corresponding to VoIP. this can be a must-have source for a person attracted to internetworking and Cisco applied sciences. * paintings with Cisco's net applied sciences * Configure Cisco routers and networks* comprehend Cisco internetworking applied sciences together with LAN switches, multilayered switching, and VLANs* safe your community utilizing CiscoSecure ACS, Cisco photographs firewall, IOS Firewall, and different tools * let instant internetworking utilizing the Cisco Aironet andAirespace items* install VoIP through Cisco Unified Communications* enforce Cisco garage sector community (SAN) and content material supply community (CDN) ideas * Use either open commonplace routing protocols (RIP, OSPF, BGP) and Cisco-proprietary protocols (IGRP and EIGRP)* layout, deal with, and troubleshoot a strong Cisco community

Show description

Read or Download Cisco: A Beginner's Guide PDF

Similar network security books

Network+ Guide to Networks, 5th Edition

Understanding the right way to set up, configure, and troubleshoot a working laptop or computer community is a hugely marketable and intriguing ability. This ebook first introduces the basic construction blocks that shape a latest community, reminiscent of protocols, topologies, undefined, and community working structures. It then offers in-depth assurance of an important suggestions in modern networking, equivalent to TCP/IP, Ethernet, instant transmission, and protection.

Reverse Deception: Organized Cyber Threat Counter-Exploitation

In-depth counterintelligence strategies to struggle cyber-espionage "A accomplished and unheard of assessment of the subject via specialists within the box. "--Slashdot disclose, pursue, and prosecute the perpetrators of complex continual threats (APTs) utilizing the proven safeguard strategies and real-world case reports featured during this distinctive advisor.

Physical-Layer Security for Cooperative Relay Networks

This e-book provides physical-layer safeguard as a promising paradigm for reaching the information-theoretic secrecy required for instant networks. It explains how instant networks are tremendous prone to eavesdropping assaults and discusses quite a number safety thoughts together with information-theoretic safeguard, synthetic noise aided safeguard, security-oriented beamforming, and variety assisted safeguard techniques.

Walling Out the Insiders. Controlling Access to Improve Organizational Security

Insider threats are in all places. to handle them in an affordable demeanour that doesn't disrupt the whole association or create an environment of paranoia calls for commitment and a spotlight over a long term. enterprises can develop into a safer, yet to stick that means it is crucial to increase a firm tradition the place safeguard issues are inherent in all elements of association improvement and administration.

Additional resources for Cisco: A Beginner's Guide

Example text

For example, if you're trying to connect to a Web server from your PC, you might think that both end-stations would use port 80 (HTTP) to conduct a Web page download. In fact, the requesting client uses a random port number in the request packet's source port field and uses assigned HTTP port number 80 only in the destination port field. Figure 2-13 demonstrates how port numbers are used during a transmission. Figure 2-13: Port numbers identify the network application the message is using The client uses a random port number to help keep track of conversations during a connection.

ISDN was introduced in the 1980s, but local telephone carriers were somewhat remiss in making it widely available. While not what one would really think of as dial-in, DSL superseded ISDN by delivering better speeds and wider availability. Dial-in technologies differ from other WAN media in that connections made using them are temporary. In other words, once the computer user has finished with the session, the circuit is terminated by hanging up the telephone. To this day, most homes are connected through analog phone circuits.

TCP/IP's four abstract layers include: • Network interface This allows TCP/IP to interact with all modern network technologies by complying with the OSI model. • Internet This defines how IP directs messages through routers over internetworks such as the Internet. • Transport This defines the mechanics of how messages are exchanged between computers. • Application This defines network applications to perform tasks such as file transfer, e-mail, and other useful functions. TCP/IP is the de facto standard that unifies the Internet.

Download PDF sample

Download Cisco: A Beginner's Guide by Toby Velte, Anthony Velte PDF
Rated 4.57 of 5 – based on 21 votes