OmniTraining

Real Information for Real IT

Advertising:
NetworkNinja
What Every Network Engineer Needs to Know
Written by Charlie Schluting   

Support independent publishing: buy this book on Lulu.

Network Ninja, published July 2008, is essential reading for all network engineers or administrators (and unix/linux sysadmins too!).

This book is about "the way things work." It's a quick, straight to the point reference for various networking concepts, targeted at the middle-level network engineer. Instead of memorizing tidbits of information to pass a test, gain a real understanding about the protocols and concepts you need to use. Easy to read, easy to understand, but certainly not skimping on the important details.

See the lulu.com page for more information and a book preview.
Also available in various eBook formats: https://www.smashwords.com/books/view/1649

Table of Contents:

Prologue
1 Introduction and Review of Basic Networking Concepts
1.1 Introduction: The Plan
1.2 Basics
2 IP Addresses and Subnetting
2.1 IPv4 Addresses and 32-bit numbers
2.2 Subnetting with CIDR and VLSM
2.3 Larger Subnets and Supernets
2.4 Subnet Masks and OS Configuration
2.5 IPv6
2.6 Subnetting: Why, and Huh?
3 Network Layers
3.1 Layer 1 – Physical
3.2 Layer 2 – Data-link
3.3 Layer 3 – Network
3.4 Layer 4 – Transport
3.5 Layer 7 – Application
3.6 Working Together
4 Layer 1
4.1 Fiber: Cabling and Connectors
4.2 Ethernet Cabling: Cu
5 Layer 2
5.1 Ethernet
5.2 Gigabit Ethernet Performance
5.3 Bridges
5.4 Vlans
5.5 ARP
6 Spanning Tree
7 Layer 3 Concepts
7.1 IP
7.2 ICMP
7.3 IPv6
7.4 IP Forwarding and Routing Tables
8 Layer 4: TCP and UDP
8.1 TCP Introduction
8.2 TCP Gone Wild
8.3 UDP
8.4 Understanding Tunnels
8.5 NAT is Not What You Think
9 Routing Theory: An Introduction to Routing
9.1 Routing Overview
9.2 Internet Routing and Peering
9.3 Internet Governance
9.4 Practical Layer 2/3 Routing
10 Routing Protocols
10.1 RIP
10.2 OSPF
10.3 BGP
10.4 iBGP
10.5 Multicast Routing
11 Network Security
11.1 Border Security
11.2 VPN Security Concerns
11.3 IRC Botnets
11.4 DDoS Attacks
11.5 DNS Cache Poisoning
11.6 Configuring A Management Network
12 Cisco-isms
12.1 Command-line Usage, Serial Ports
12.2 Cisco Layer 2 Security
12.3 About Router Hardware: TCAMs
References

Support independent publishing: buy this book on Lulu.

 


 
Joomla 1.5 Templates by Joomlashack