Cisco Networking Simplified, Second Edition

Book description

Cisco Networking Simplified
Second Edition

  • Master today’s world of Cisco networking with this book’s completely updated, fully illustrated visual approach

  • Easy enough for novices, substantive enough for networking professionals

  • Covers the latest networking topics—from network architecture to secure wireless, unified communications to telepresence

  • In Full Color

    Jim Doherty • Neil Anderson • Paul Della Maggiora

    Now 100 percent updated for the latest technologies, this is today’s easiest, most visual guide to Cisco® networking. Even if you’ve never set up or managed a network, Cisco Networking Simplified, Second Edition, helps you quickly master the concepts you need to understand. Its full-color diagrams and clear explanations give you the big picture: how each important networking technology works, what it can do for you, and how they all fit together. The authors illuminate networking from the smallest LANs to the largest enterprise infrastructures, offering practical introductions to key issues ranging from security to availability, mobility to virtualization.

    What you always wanted to know about networking but were afraid to ask!

  • How networks and the Internet work

  • How to build coherent, cost-effective network infrastructures

  • How to design networks for maximum reliability and availability

  • What you need to know about data center and application networking

  • How to secure networks against today’s threats and attacks

  • How to take advantage of the latest mobility technologies

  • How virtualizing networks can help businesses leverage their network investments even further

  • How to combine messaging, calendaring, telephony, audio, video, and web conferencing into a unified communications architecture

  • This book is part of the Networking Technology Series from Cisco Press®, the only authorized publisher for Cisco®.

    Category: Cisco

    Covers: General Networking

    Table of contents

    1. Copyright
      1. Dedications
    2. About the Technical Reviewers
    3. Acknowledgments
    4. Introduction
      1. What’s New in This Edition?
      2. So How Do I Use This Thing?
    5. I. Networking Fundamentals
      1. How Computers Communicate
        1. The OSI Model
        2. Open Versus Proprietary Systems
        3. Seven Layers
        4. At-a-Glance: OSI Model
          1. Why Should I Care About the OSI Model?
          2. OSI Layers and Definitions
          3. What Problems Need to Be Solved?
          4. Communicating Between Layers
          5. Encapsulation
          6. De-encapsulation
          7. Extra Layers?
        5. Internet Infrastructure: How It All Connects
      2. TCP/IP and IP Addressing
        1. Computers Speaking the Same Language
        2. What Is an Address?
        3. Dynamically Allocated IP Addresses
        4. Domain Names and Relationship to IP Addresses
        5. Matching Domain Names to IP Addresses
        6. At-a-Glance: TCP/IP
          1. Why Should I Care About TCP/IP?
          2. What Problems Need to Be Solved?
          3. TCP/IP Datagrams
          4. How TCP Connections Are Established
          5. TCP Windowing
          6. UDP
          7. Port Numbers
          8. History of TCP/IP
        7. At-a-Glance: IP Addressing
          1. Why Should I Care About IP Addressing?
          2. What Problems Need to Be Solved?
          3. Logical Versus Physical
          4. Address Classes
          5. Subnetting
          6. Subnet Masks
          7. Identifying Subnet Addresses
        8. At-a-Glance: IPv6
          1. Why Should I Care About IPv6?
          2. What Problems Need to Be Solved?
          3. IPv6 Addresses
          4. IPv6 Notation
          5. IPv6 Autoconfiguration
          6. IPv6 Security
          7. IPv6 Mobility
          8. IPv6 Transition
        9. NAT and PAT
      3. Internet Applications
        1. The Internet and Its Applications
        2. E-Mail
          1. E-Mail Tools
          2. What’s Up with the @ Sign?
          3. Sending E-Mails
          4. Receiving E-Mails
        3. Web Browsing
          1. What Are HTTP and HTML, and What Do They Do?
        4. E-Mail
        5. Peer-to-Peer Sharing
    6. II. Networking Infrastructure
      1. Ethernet
        1. History of Ethernet
        2. What Is Ethernet?
        3. Evolution of Ethernet
        4. At-a-Glance: Ethernet
          1. Why Should I Care About Ethernet?
          2. What Problems Need to Be Solved?
          3. Ethernet Collisions
          4. Smaller Segments
          5. Increasing Bandwidth
          6. Ethernet Segments
          7. Hubs
          8. Repeaters
          9. Bridges
          10. Switched Ethernet
          11. LAN Routers
          12. What They Gave Away
        5. Reducing Collisions on Ethernet
      2. LAN Switching
        1. Fast Computers Need Faster Networks
        2. Switching Basics: It’s a Bridge
        3. Switching Ethernets
        4. Switches Take Over the World
        5. At-a-Glance: Switching
          1. Why Should I Care About Switching?
          2. What Problems Need to Be Solved?
          3. Broadcast and Collision Domains
            1. Forwarding and Filtering
          4. Address Learning
          5. Frame Transmission Modes
          6. Virtual LANs (VLAN)
      3. Spanning Tree
        1. Network Loops
        2. Sometimes, the Earth Is Flat
        3. Preventing Network Loops
        4. Spanning-Tree Fundamentals
        5. At-a-Glance: Spanning Tree
          1. Why Should I Care About Spanning Tree?
          2. What Problems Need to Be Solved?
          3. Problems with Loops
            1. Broadcast Storms
            2. Multiple Copies of the Same Frame
            3. MAC Address Table Instability
          4. How Spanning Tree Works
            1. Port Roles
            2. Port States
            3. Assessing the Health of Links
            4. Recalculating Paths
          5. Reflections on Spanning Tree
      4. Routing
        1. Routers
        2. Routers Talk Among Themselves to Find Routes
        3. Routers Route Packets
        4. Routers Bridge and Switches Route
        5. At-a-Glance: Routing
          1. Why Should I Care About Routing?
          2. What Problems Need to Be Solved?
          3. What Exactly Does “Best” Mean?
          4. Static Versus Dynamic
          5. Flat Versus Hierarchical
          6. Intradomain Versus Interdomain
          7. Distance Vector Versus Link-State
            1. How Information Is Discovered with Distance Vectors
          8. Link-State Routing
        6. Routing and Switching
    7. III. Network Design
      1. Campus Networks and Hierarchical Design
        1. Building Networks for Ease of Use
        2. At-a-Glance: Hierarchical Campus Design
          1. Why Should I Care About Campus Design?
          2. Campus Design Best Practices
            1. High Availability
            2. Oversubscription
            3. Redundancy
          3. Campus Size Design Considerations
            1. Small Campus
            2. Medium Campus
            3. Large Campus
          4. Campus Services
      2. WAN Network Design
        1. Moving Traffic Across the Street and the World
        2. WAN Services
        3. Integrated Services Digital Network
        4. Frame Relay
        5. ATM
        6. MPLS
        7. Broadband
        8. Virtual Private Networks (VPN)
        9. WAN Devices
        10. At-a-Glance: Frame Relay
          1. Why Should I Care About Frame Relay?
          2. What Problems Need to Be Solved?
          3. Frame Relay Equipment
          4. Virtual Circuits
            1. Switched Virtual Circuit (SVC)
            2. Permanent Virtual Circuit (PVC)
          5. Local Management Interface (LMI)
          6. Data Link Connection Identifier
          7. Congestion Notification
          8. Performance
        11. At-a-Glance: Asynchronous Transfer Mode (ATM)
          1. Why Should I Care About ATM?
          2. What Problems Need to Be Solved?
          3. ATM Devices
          4. ATM Network Interfaces
          5. ATM Features
            1. Asynchronous Transmission
            2. Fixed Cell Size
          6. ATM Connections
          7. Virtual Connection
          8. LAN Emulation (LANE)
        12. Multiprotocol Label Switching (MPLS) Services
        13. At-a-Glance: MPLS
          1. Why Should I Care About MPLS?
          2. What Problems Need to Be Solved?
          3. Equipment and Stuff
          4. MPLS Labels
          5. MPLS Security
          6. MPLS Architecture
          7. How Does the Router Know Where to Send Stuff?
          8. Other MPLS Features
        14. MPLS Traffic Separation
      3. Broadband Technologies
        1. Always-on Access
        2. Broadband Technology Evolution
          1. Cable Modem
          2. DSL
          3. Which One Is Better?
        3. At-a-Glance: ISDN
          1. Why Should I Care About ISDN?
          2. What Problems Need to Be Solved?
          3. ISDN and Internet Access
          4. ISDN Standard Access Methods
          5. Making an ISDN Call
          6. ISDN Device Types and Reference Points
          7. Service Provider Identifiers (SPID)
        4. At-a-Glance: Broadband
          1. Why Should I Care About Broadband?
          2. What Problems Need to Be Solved?
          3. The Need for Speed
          4. Digital Subscriber Line (DSL)
            1. DSL Equipment
            2. Limitations and Advantages
          5. Cable
          6. Cable Equipment
          7. Limitations and Advantages
      4. Virtual Private Networks
        1. Secure Networking Over the Internet
        2. At-a-Glance: VPNs
          1. Why Should I Care About VPNs?
          2. What Problems Need to Be Solved?
          3. Deployment Modes
          4. VPN Architecture
          5. Generic Routing Encapsulation (GRE)
          6. IPsec
          7. VPN Architecture
          8. Dynamic Multipoint VPNs (DMVPN)
          9. MPLS
        3. Establishing a VPN Connection
        4. At-a-Glance: Encryption
          1. Why Should I Care About Encryption?
          2. What Problems Need to Be Solved?
          3. Bullets, Bombs, and Secret Codes
          4. Data Encryption Standard (DES)
          5. Triple Data Encryption Standard (3DES)
          6. Advanced Encryption Standard (AES)
          7. Using Keys to Encrypt Stuff
          8. Diffie-Hellman Key Exchange
          9. Where You Encrypt Matters
        5. Client Authentication
      5. Optical Technologies
        1. LANs, WANs—and Now MANs
        2. SONET, DWDM, and DPT
        3. At-a-Glance: Metro Optical
          1. Why Should I Care About Metro Optical?
          2. What Problems Need to Be Solved?
          3. Fiber Basics
          4. Key Design Criteria
            1. Multiplexing
          5. Optical Ethernet
          6. CWDM
          7. DWDM
          8. SONET
      6. Branch Office Network Designs
        1. Distributed Workforce
        2. Distributed Office Challenges
        3. At-a-Glance: Branch Office Design
          1. Why Should I Care About Branch Office Design?
          2. What Problems Need to Be Solved?
          3. Architecting a Branch Network
          4. Scaling the Branch
          5. Critical Design Questions to Answer
          6. Branch Security
          7. Critical Security Questions to Answer
          8. Branch Communication
          9. Critical Communication Questions to Answer
    8. IV. Network Availability
      1. High Availability
        1. At-a-Glance: High Availability
          1. Why Should I Care About High Availability?
          2. What Affects Network Availability?
          3. How Is Availability Measured?
          4. Best Practices
          5. Reducing Network Complexity
          6. Software Availability
          7. Link/Carrier Availability
          8. Clean Implementation/Cable Management
          9. Network Monitoring
          10. Network/Server Redundancy
          11. Training
          12. Change Control Management
          13. Security Posture and Policies
      2. Control Plane
        1. When Good Networks Go Bad
        2. Control Plane Protection
        3. At-a-Glance: Control Plane Protection
          1. Why Should I Care About Control Plane Protection?
          2. What Problems Need to Be Solved?
          3. How Does Control Plane Protection Work?
          4. Control Plane Policing
          5. Dedicated CPUs
      3. Quality of Service and Network Availability
        1. Quality of Service as Network Protection?
        2. Scavenger QoS
        3. At-a-Glance: QoS for Network Resiliency
          1. Why Should I Care About QoS for Network Resiliency?
          2. QoS Basics
          3. QoS: Protecting the Good, Dumping the Bad
          4. What Is “Normal”?
          5. Don’t Go It Alone
          6. Defining Scavenger Traffic/Normal Traffic
          7. First-Order Traffic Anomalies
          8. Second-Order Traffic Anomaly
      4. Disaster Recovery
        1. What Happens When the Network Stops Working
        2. DR Planning
        3. Resiliency and Backup Services
        4. Preparedness Testing
        5. At-a-Glance: Disaster Recovery: Business Continuance
          1. Why Should I Care About Disaster Recovery?
          2. What Are Typical Causes of Disasters?
            1. Natural Disasters
            2. Unintentional Man-Made Disasters
            3. Intentional Man-Made Disasters
          3. What Problems Need to Be Solved?
          4. Before a Disaster Occurs
            1. Risk Assessment
            2. Planning for a Disaster
          5. Backing Up Systems
          6. Preparedness Testing
          7. After a Disaster Occurs
            1. Recovery to Normal Operations
          8. Restoring Primary Systems
        6. Disaster Recovery
      5. Network Management
        1. Keeping the Network Alive from Afar
        2. Network Documentation: A Must-Have
        3. Network-Management Protocols
        4. Troubleshooting Tools
        5. At-a-Glance: Network Management
          1. Why Should I Care About Network Management?
          2. What Problems Need to Be Solved?
          3. Nightmare of Mobility
        6. Network Management
    9. V. Securing the Network
      1. Network Security
        1. Identity
        2. Perimeter Security
        3. Data Privacy
        4. Security Monitoring
        5. Policy Enforcement
        6. At-a-Glance: Network Security
          1. Why Should I Care About Network Security?
          2. What Problems Need to Be Solved?
          3. Balancing Trust Versus Security
          4. Establishing Identity
          5. Perimeter Security
          6. Data Privacy
          7. Security Monitoring
          8. Policy Enforcement
        7. At-a-Glance: Hacking
          1. Why Should I Care About Hacking?
          2. What Problems Need to Be Solved?
          3. Hacks and Attacks
          4. Inside Jobs
          5. Rogue Access Points
          6. Back Doors
          7. Denial of Service (DoS)
          8. Anarchists, Crackers, and Kiddies
          9. Viruses and Worms
          10. Trojan Horses
          11. Botnets
          12. Sniffing/Spoofing
        8. DoS Attacks
        9. Snooping and Spoofing
      2. Firewalls
        1. Protecting the Perimeter
        2. Get Off the Net!
        3. Firewall for Your Protection
        4. Personal Firewalls
        5. At-a-Glance: Firewalls and IDS
          1. Why Should I Care About Firewalls and IDS?
          2. What Problems Need to Be Solved?
          3. What Does a Firewall Do?
          4. Are You a Good Packet or a Bad Packet?
          5. Clean Net
          6. Inside Filter
          7. Isolation LAN
          8. Outside Filter
          9. The Dirty Net
          10. Hackers and Their Evil Ways
        6. Firewalls and IDS
        7. Access and Content Security
      3. Intrusion Prevention Systems
        1. Intrusion Detection Systems
        2. Intrusion Prevention Systems
        3. The Problem with False Positives
        4. At-a-Glance: Intrusion Detection
          1. Why Should I Care About Intrusion Detection?
          2. What Problems Need to Be Solved?
          3. Where Can IDS Be Deployed?
          4. Passive Monitoring
          5. Active Monitoring
          6. Sneak Attacks
      4. Port-Based Security
        1. Combating Access-Based Attacks
        2. At-a-Glance: Port-Based Security
          1. Why Should I Care About Port-Based Security?
          2. What Problems Need to Be Solved?
          3. Where Port Security Fits
          4. MAC Flooding
          5. Malicious DHCP Server
          6. ARP Poisoning/Spoofing
          7. Spoofed IP Addresses
      5. Identity-Based Networking
        1. Network Access Conundrum
        2. Identity-Based Networking
        3. 802.1x
        4. At-a-Glance: Identity
          1. Why Should I Care About Identity?
          2. What Problems Need to Be Solved?
          3. What the Heck Is 802.1x?
          4. Extensible Authentication Protocol (EAP)
          5. What Does Identity Do for Me?
            1. Preventing Unwanted Access
            2. Limiting Access to Networked Resources
            3. User-Based Service Provisioning
          6. Working with Authentication Servers
          7. RADIUS
          8. PKI
        5. Authentication
      6. Network Admission Control
        1. Combating Virus Outbreaks
        2. Assessing Device “Health”
        3. Network Admission Control
        4. At-a-Glance: NAC
          1. Why Should I Care About Network Admission Control?
          2. What Problems Need to Be Solved?
          3. What Does NAC Do, Exactly?
          4. Appliance-Based Cisco Clean Access
          5. Network-Based Cisco NAC Framework
      7. URL Filtering: Eliminating Unwanted Web Page Access
        1. Internet Access and Liability Issues
        2. Enforcing Corporate Internet Usage Policies
        3. At-a-Glance: URL Filtering
          1. Why Should I Care About URL Filtering?
          2. What Problems Need to Be Solved?
          3. How URL Filtering Works
          4. Using Black/White Lists
          5. Using Third-Party Servers
        4. URL Filtering and Firewalls
      8. Deep Packet Inspection: Controlling Unwanted Applications
        1. How Do You Catch a Criminal When Everyone Wears a Mask?
        2. Deep Packet Inspection
        3. At-a-Glance: Deep Packet Inspection
          1. Why Should I Care About Deep Packet Inspection?
          2. What Problems Need to Be Solved?
          3. How Does It Work?
          4. Catalyst Example
        4. Packet Inspection
      9. Telemetry: Identifying and Isolating Attack Sources
        1. Normal or Abnormal
        2. Using Telemetry to Combat Attacks
        3. At-a-Glance: Telemetry
          1. Why Should I Care About Telemetry?
          2. What Problems Need to Be Solved?
          3. What Does Telemetry Do?
          4. Anomaly Detection
          5. Source Location Using Traceback
          6. Mitigation/Reaction
      10. Physical Security: IP Video Surveillance
        1. Locks on the Doors
        2. Video Surveillance
        3. At-a-Glance: Physical Security
          1. Why Should I Care About Physical Security?
          2. What Problems Need to Be Solved?
          3. Digital Systems Overview
          4. IP-Enabled Video Systems
          5. Bells and Whistles
        4. Physical and Logical Security
    10. VI. Data Centers and Application Networking
      1. Data Centers
        1. Store Once, Use Often
        2. n-Tier Model
        3. Functions and Requirements
        4. At-a-Glance: Data Centers
          1. Why Should I Care About Data Centers?
          2. What Problems Need to Be Solved?
          3. Types of Data Centers
          4. Data Center Layers
          5. Distribution (n-Tier Model)
          6. Traditional Client/Server Versus n-Tier
          7. Data Center Facilities
          8. Storage Methods
          9. Data Center Management
          10. Security Services
        5. Data Center Application: Corporate Expense System
      2. Storage Area Networks
        1. Efficient Deployment of Critical Data
        2. Fiber Channel and IP
        3. Infiniband
        4. At-a-Glance: Storage Networking
          1. Why Should I Care About Storage Networking?
          2. What Problems Need to Be Solved?
          3. What Is Storage Networking?
          4. Traditional Server-Centric Storage Methods
          5. Storage Networking Technologies
            1. Small Computer Systems Interface (SCSI)
            2. Fiber Channel
            3. Internet Small Computer Systems Interface (iSCSI)
            4. Serial Advanced Technology Attachment (SATA)
          6. Retrieval Methods
          7. Network Attached Storage (NAS)
          8. Storage Area Network (SAN)
        5. Server-Centric Storage
      3. Caching
        1. Moving Content Close to the User
        2. How Caching Works
        3. Caching More Than Web Pages
        4. Storage Caching: From Disk to Memory
        5. Issues Affecting Caching
        6. Caching
      4. Wide Area File Services
        1. Branch Offices Rule
        2. Centralizing Storage
        3. Enter Wide Area File Services (WAFS)
        4. At-a-Glance: Wide Area File Services
          1. Why Should I Care About Wide Area File Services?
          2. What Problems Need to Be Solved?
          3. How Cisco WAFS Works
          4. Ensuring Transparency
            1. File System Transparency
          5. Caching
            1. File Caching
      5. Wide Area Application Services
        1. Centralizing Applications
        2. Enter Wide Area Application Services (WAAS)
        3. At-a-Glance: Wide Area Application Services
          1. Why Should I Care About Wide Area Application Services?
          2. What Problems Need to Be Solved?
          3. How Wide Area Application Services Works
          4. Transparency
            1. WAFS Uses Mapped TCP Flows
          5. TCP Compatibility
          6. DRE
            1. TCP Flow Optimization (TFO)
            2. Data Redundancy Elimination (DRE)
    11. VII. Unified Communications
      1. Voice over IP
        1. Making Calls over the Web
        2. Unifying Communications
        3. Client Layer
        4. Infrastructure Layer
        5. Call-Processing Layer
        6. Application Layer
        7. Deployment Models
        8. At-a-Glance: Voice over IP
          1. Why Should I Care About Voice over IP?
          2. What Problems Need to Be Solved?
            1. Converting Analog Voice Signals to Digital Packets
            2. Transporting Packets in Real Time
          3. Analog Voice-to-Digital Conversion
          4. Compressing Voice
          5. Comfort Noise
        9. Voice over IP
        10. At-a-Glance: Unified Communications
          1. Why Should I Care About Unified Communications?
          2. What Problems Need to Be Solved?
          3. Explaining Toll Bypass
          4. Making a Call on an IP Phone
          5. The Big Picture
          6. Client Layer
          7. Call Processing Layer
          8. Application Layer
          9. Infrastructure Layer
        11. Voice over IP: Toll Bypass
      2. Quality of Service
        1. Converged Networks and QoS
        2. What Is QoS?
        3. QoS and Unified Communications
        4. At-a-Glance: QoS
          1. Why Should I Care About QoS?
          2. What Problems Need to Be Solved?
            1. The Three Evils
          3. Three Steps to Quality
          4. Low-Bandwidth Tools
        5. How Packets Are Prioritized
      3. Unified Personal Communications
        1. Too Many Communications, Too Little Time
        2. Unify Me
        3. Cisco Unified Personal Communicator (CUPC)
        4. At-a-Glance: Unified Communications
          1. Why Should I Care About Unifying Communications?
          2. What Problems Need to Be Solved?
          3. How Unifying Communications Works
          4. Reach out and Touch Someone
          5. Management Capabilities
          6. Increased Productivity
      4. Meeting Collaboration Spaces
        1. Meetings, Meetings, Meetings
        2. Meetings Are an Activity, Not a Place
        3. At-a-Glance: Meeting Collaboration
          1. Why Should I Care About Meeting Collaboration?
          2. What Problems Need to Be Solved?
          3. How Does It Work?
          4. Working with What You Have
          5. Videoconferencing
          6. Presence and Instant Messaging
      5. Traditional Videoconferencing
        1. I See You
        2. Video over IP Networks
        3. At-a-Glance: IP Videoconferencing
          1. Why Should I Care About Videoconferencing?
          2. What Problems Need to Be Solved?
          3. Videoconferencing Equipment
          4. H.323
          5. T.120
          6. Zones
          7. Single Zones
          8. Multiple Zones
        4. Videoconferencing
        5. Videoconferencing Application E-Learning
      6. Telepresence
        1. Conferencing Gets Simple
        2. Video Killed the Radio Star
        3. The Next-Best Thing to Being There
        4. At-a-Glance: Telepresence
          1. Why Should I Care About Telepresence?
          2. What Problems Need to Be Solved?
          3. What Does Telepresence Do?
          4. IT Furniture
          5. Telepresence over IP
          6. QoS Required
          7. Multipoint Connections
      7. Presence and Location-Aware Services
        1. I Sense a Presence
        2. The Importance of Location
        3. At-a-Glance: Presence and Location-Aware Services
          1. Why Should I Care About Presence and Location-Aware Services?
          2. What Problems Need to Be Solved?
          3. How It Works
          4. Present and Accounted For
          5. Let’s Go Live
      8. IP Call Center
        1. Why Can’t I Talk to a Real Person?
        2. Anatomy of a Contact Center
        3. From the Caller to the Agent, and Back Again
        4. Managing Caller and Contact Agent Efficiency
        5. New Methods for Customer Interaction
        6. At-a-Glance: IP Contact Center
          1. Why Should I Care About IP Contact Center?
          2. What Problems Need to Be Solved?
          3. IPCC Equipment
          4. Two Simple Call Flow Examples
          5. Other Cool Stuff
        7. Call-Center Tech Support
        8. Call-Center Telemarketing
      9. Multicast and IPTV Broadcasts
        1. Watching Movies Without Flooding the World
        2. At-a-Glance: IP Multicast
          1. Why Should I Care About IP Multicast?
          2. What Problems Need to Be Solved?
          3. Internet Group Management Protocol (IGMP)
          4. Multicast Distribution Trees
          5. Layer 2 Multicast
          6. Cisco Group Management Protocol (CGMP)
          7. IGMP Snooping
          8. Multicast Forwarding
          9. Protocol-Independent Multicast (PIM)
        3. Multicast
    12. VIII. Mobility
      1. Mobility and Wireless Networks
        1. Throwing Away the Ties That Bind
        2. At-a-Glance: Wireless LANs
          1. Why Should I Care About Wireless LANs?
          2. What Problems Need to Be Solved?
          3. In Building Systems
          4. WLAN Roaming
          5. Building-to-Building Bridge Systems
          6. Security Issues and Options
        3. Wired LANs
        4. Wireless LANs
      2. Selecting and Building Wireless Networks
        1. Designing a Wireless Network
        2. At-a-Glance: Designing Wi-Fi Networks
          1. Why Should I Care About Wireless Design?
          2. What Problems Need to Be Solved?
          3. Cisco Unified Wireless Solution
          4. Wireless Standards
          5. Wireless Network Designs
            1. WLAN RF Coverage Site Survey
            2. Effects of Lowering WLAN AP RF Power
          6. Portability Versus Mobility
      3. Securing Wireless Networks
        1. Locking Down Wireless
        2. Balancing Security and Access
        3. At-a-Glance: Securing Wi-Fi
          1. Why Should I Care About Wireless Security?
          2. What Problems Need to Be Solved?
          3. Securing Wireless Networks
          4. Wireless Encryption
          5. Health Checks
          6. Rogue Access Points
      4. Outdoor and Municipal Wireless Networks
        1. It’s Just Like a Building, Only Way Bigger
        2. At-a-Glance: Municipal Wi-Fi
          1. Why Should I Care About Municipal Wireless?
          2. What Problems Need to Be Solved?
          3. High-Level Diagram
            1. Wireless Mesh Deployment
          4. Muni Access Points
            1. Wireless Backhaul
          5. Wireless Backhaul
          6. Security
      5. VoIP over Wireless Networks
        1. Wireless VoIP
        2. At-a-Glance: Wireless VoIP
          1. Why Should I Care About Wireless VoIP?
          2. What Problems Need to Be Solved?
          3. Integrating Cisco Wireless Networks with Unified Communications
          4. Coverage and Quality
          5. Packet Loss
          6. QoS for Wireless VoIP
            1. Managing Call Capacity per AP
        3. Wireless VoIP
      6. Wireless Guest Access
        1. Mi Casa Es Su Casa
        2. At-a-Glance: Wireless Guest Access
          1. Why Should I Care About Wireless Guest Access?
          2. What Problems Need to Be Solved?
          3. Providing Wi-Fi Guest Access
            1. Wireless Guest Access Design
          4. Guest SSID
          5. Guest Access: Step by Step
      7. RFID and Location-Based Services
        1. Finding Your Stuff
        2. Wireless LANS: They’re Not Just for Checking E-Mail on the Toilet Anymore!
        3. At-a-Glance: Location-Based Services
          1. Why Should I Care About Wireless Location Services?
          2. What Problems Need to Be Solved?
            1. Radio Frequency Identification (RFID) Technologies
          3. Unified Wireless and Location Services Architecture
          4. Planning
            1. Cisco Unified Wireless Architecture Including Location Services
          5. Monitoring Asset Location
        4. Wireless Location Services
    13. IX. Virtualized Networks
      1. Virtualizing Data Centers
        1. Growth of the Data Center
        2. Data Center Virtualization
        3. At-a-Glance: Virtual Data Centers
          1. Why Should I Care About Virtual Data Centers?
          2. What Problems Need to Be Solved?
          3. Data Center Virtualization
          4. Fixed Versus Virtual
          5. Data Center Migration
      2. Virtualizing Network Infrastructure
        1. Leveraging Network Investment
        2. A Network Is a Network
        3. Virtualizing Network Infrastructure
        4. At-a-Glance: Virtual Network Infrastructure
          1. Why Should I Care About Virtual Networks?
          2. What Problems Need to Be Solved?
          3. High-Level Diagram
          4. Three-Part Framework
          5. Authentication and Isolation
          6. Partitions Across the WAN
      3. Applications of Virtualized Networks
        1. What Can You Do with Virtualized Networks?
        2. Corporate Employee “Clean” and “Dirty” Networks
        3. Guest and Partner Networks
        4. Isolating Specialized Devices and Applications
        5. Load Balancing
        6. Providing Hosted Networks to Entities Within Entities
        7. Departmental Virtual Networks
        8. Challenges with Virtual Networks
        9. At-a-Glance: Virtualized Network Applications
          1. Why Should I Care About Virtualized Network Applications?
          2. What Problems Need to Be Solved?
          3. High-Level Diagram
          4. Network Admission Control
          5. Guest and Partner Access
          6. Device Isolation
        10. Evolution of Virtual Networks
    14. About the Authors

    Product information

    • Title: Cisco Networking Simplified, Second Edition
    • Author(s): Jim Doherty, Neil Anderson, Paul Della Maggiora
    • Release date: December 2007
    • Publisher(s): Cisco Press
    • ISBN: 9781587056017