-54%
-81%

₹471 ₹2599

 Hurry up!  This offer ends in

 Hurry up! 

This offer ends in

Why Buy This Book?

What exactly do I get in this?

3 Pack Bundle

What’s Covered?

Table of content

• Understanding Local Area Networking
    ✔ Examining Local Area Networks, Devices, and Data Transfer
    ✔ Defining the LAN
    ✔ Identifying Types of LANs
    ✔ Getting to Know Perimeter Networks
    ✔ Identifying Network Topologies and Standards
    ✔ Identifying Network Topologies
    ✔ Defining Ethernet Standards
    ✔ Identifying the Differences Between Client/Server and
    ✔ Peer-to-Peer
    ✔ Skill Summary
    ✔ Knowledge Assessment
    ✔ Multiple Choice
    ✔ Fill in the Blank
    ✔ Business Case Scenarios
    ✔ Scenario 1-1: Planning and Documenting a Basic LAN
    ✔ Scenario 1-2f: Selecting the Correct Networking Model
    ✔ Scenario 1-3: Selecting Network Adapters for Your
    ✔ LAN Computers
    ✔ Scenario 1-4: Configuring the Correct Subnet Mask
    ✔ Solutions to Business Case Scenarios
• Defining Networks with the OSI Model
    ✔ Understanding OSI Basics
    ✔ Defining the OSI Model Layers
    ✔ Defining the Communications Subnetwork
    ✔ Define the Physical Layer
    ✔ Define the Data Link Layer
    ✔ Understanding Layer 2 Switching
    ✔ Understanding Layer 3 Switching
    ✔ Understanding Characteristics of Switches
    ✔ Defining the Upper OSI Layers
    ✔ Defining the Transport Layer
    ✔ Defining the Session Layer
    ✔ Defining the Presentation Layer
    ✔ Defining the Application Layer
    ✔ Reviewing the OSI Layers
    ✔ Defining the TCP/IP Model
    ✔ Skill Summary
    ✔ Knowledge Assessment
    ✔ Multiple Choice
    ✔ Fill in the Blank
    ✔ Business Case Scenarios
    ✔ Scenario 2-1: Installing the Appropriate Switch
    ✔ Scenario 2-2: Defining the IP Address and Ports Used
    ✔ by Destination Servers
    ✔ Scenario 2-3: Ensuring a Newly Created Email Account’s
    ✔ Logon Is Encrypted
    ✔ Scenario 2-4: Creating a Permanent ARP Table Entry
• Understanding Wired and Wireless Networks
    ✔ Recognizing Wired Networks and Media Types
    ✔ Identifying and Working with Twisted-Pair Cables
    ✔ Identifying and Working with Fiber-Optic Cable
    ✔ Understanding Wireless Networks
    ✔ Identifying Wireless Devices
    ✔ Identifying Wireless Networking Standards
    ✔ Skill Summary
    ✔ Knowledge Assessment
    ✔ Multiple Choice
    ✔ Fill in the Blank
    ✔ Business Case Scenarios
    ✔ Scenario 3-1: Selecting Channels for a WLAN
    ✔ Scenario 3-2: Running Cable Drops Properly
    ✔ Scenario 3-3: Selecting Network Adapters for Your
    ✔ WLAN Computers
    ✔ Scenario 3-4: Securing a WLAN
• Understanding Internet Protocol
    ✔ Working with IPV4
    ✔ Categorizing IPv4 Addresses
    ✔ Default Gateways and DNS Servers
    ✔ Defining Advanced IPv4 Concepts
    ✔ Working with IPV6
    ✔ Understanding IPv6
    ✔ Configuring IPv6
    ✔ Skill Summary
    ✔ Knowledge Assessment
    ✔ Multiple Choice
    ✔ Fill in the Blank
    ✔ Business Case Scenarios
    ✔ Scenario 4-1: Defining a Private Class C IP Network
    ✔ Scenario 4-2: Specifying the Correct Device
    ✔ Scenario 4-3: Implementing the Correct Class Network
    ✔ Scenario 4-4: Implementing the Correct Subnet Mask
• Implementing TCP/IP in the Command Line
    ✔ Using Basic TCP/IP Commands
    ✔ Working with the Command Prompt Window
    ✔ Using ipconfig and ping
    ✔ Working with Advanced TCP/IP Commands
    ✔ Using netstat and nbtstat
    ✔ Using tracert and pathping
    ✔ Using nslookup
    ✔ Using ftp and telnet
    ✔ Using Windows PowerShell
    ✔ Using net
    ✔ Skill Summary
    ✔ Knowledge Assessment
    ✔ Multiple Choice
    ✔ Fill in the Blank
    ✔ Business Case Scenarios
    ✔ Scenario 5-1: Connecting to an FTP Server
    ✔ Scenario 5-2: Troubleshooting TCP/IP Results
    ✔ Scenario 5-3: Documenting a Basic Wide Area Network
    ✔ Scenario 5-4: Using Advanced Ping
• Working with Networking Services
    ✔ Setting Up Common Networking Services
    ✔ Working with the Dynamic Host Configuration
    ✔ Protocol (DHCP)
    ✔ Introducing Remote Administration
    ✔ Enable Remote Desktop
    ✔ Access Remote Desktop
    ✔ Defining More Networking Services
    ✔ Defining RRAS
    ✔ Defining IPsec
    ✔ Defining Name Resolution Techniques
    ✔ Defining DNS
    ✔ Defining WINS
    ✔ Skill Summary
    ✔ Knowledge Assessment
    ✔ Multiple Choice
    ✔ Fill in the Blank
    ✔ Business Case Scenarios
    ✔ Scenario 6-1: Selecting the Appropriate Services
    ✔ Scenario 6-2: Selecting the Appropriate Services
    ✔ Scenario 6-3: Setting Up a DHCP Server
    ✔ Scenario 6-4: Setting Up a New DHCP and Migrating
    ✔ Old Computers
    ✔ Scenario 6-5: Managing Remote Connections
• Understanding Wide Area Networks
    ✔ Understanding Routing
    ✔ Identifying Static and Dynamic Routing
    ✔ Understanding Quality of Service (QOS)
    ✔ Defining Common WAN Technologies and Connections
    ✔ Defining Packet Switching
    ✔ Defining T-Carriers
    ✔ Defining Other WAN Technologies and Internet
    ✔ Connectivity
    ✔ Skill Summary
    ✔ Knowledge Assessment
    ✔ Multiple Choice
    ✔ Fill in the Blank
    ✔ Business Case Scenarios
    ✔ Scenario 7-1: Selecting the Appropriate Service
    ✔ and Protocol
    ✔ Scenario 7-2: Selecting the Appropriate WAN Technology
    ✔ Scenario 7-3: Recommending the Right Service
    ✔ Scenario 7-4: Setting Up Routes to Other Networks
• Defining Network Infrastructures and Network
    ✔ Security
    ✔ Understanding Networks Outside the LAN
    ✔ Defining the Internet
    ✔ Defining Intranets and Extranets
    ✔ Configuring VPN Connections and Authentication
    ✔ Selecting Types of VPN Protocols
    ✔ Selecting Authentication for VPN Connections
    ✔ Creating a VPN Connection Using the Create a VPN
    ✔ Connection Wizard
    ✔ Creating a VPN Connection Using Windows 10 Settings
    ✔ Using Connection Manager (CM) and the Connection
    ✔ Manager Administration Kit (CMAK)
    ✔ Understanding Security Devices and Zones
    ✔ Defining Firewalls and Other Perimeter Security Devices
    ✔ Redefining the DMZ

Table of content

• Protocols and Layers
    ✔ The Illustrated Network
    ✔ Remote Access to Network Devices
    ✔ File Transfer to a Router
    ✔ CLI and GUI
    ✔ Wireshark and Packet Capture
    ✔ First Explorations in Networking
    ✔ Protocols
    ✔ Standards and Organizations
    ✔ Request for Comment and the Internet Engineering
    ✔ Task Force
    ✔ Internet Administration
    ✔ Layers
    ✔ Simple Networking
    ✔ Protocol Layers
    ✔ The TCP/IP Protocol Suite
    ✔ The TCP/IP Layers
    ✔ Protocols and Interfaces
    ✔ Encapsulation
    ✔ The Layers of TCP/IP
    ✔ The Physical Layer
    ✔ The Data Link Layer
    ✔ The Network Layer
    ✔ The Transport Layer
    ✔ The Application Layer
    ✔ Session Support
    ✔ Internal Representation Conversion
    ✔ Applications in TCP/IP
    ✔ The TCP/IP Protocol Suite
• TCP/IP Protocols and Devices
    ✔ Protocol Stacks on the Illustrated Network
    ✔ Layers, Protocols, Ports, and Sockets
    ✔ The TCP/IP Protocol Stack
    ✔ The Client—Server Model
    ✔ TCP/IP Layers and Client—Server
    ✔ The IP Layer
    ✔ The Transport Layer
    ✔ Transmission Control Protocol
    ✔ User Datagram Protocol
    ✔ The Application Layer
    ✔ Bridges, Routers, and Switches
    ✔ Segmenting LANs
    ✔ Bridges
    ✔ Routers
    ✔ LAN Switches
    ✔ Virtual LANs
    ✔ VLAN Frame Tagging
    ✔ •Network Link Technologies
    ✔ Illustrated Network Connections
    ✔ Displaying Ethernet Traffic
    ✔ Displaying SONET Links
    ✔ Displaying DSL Links
    ✔ Displaying Wireless Links
    ✔ Frames and the Link Layer
    ✔ The Data Link Layer
    ✔ The Evolution of Ethernet
    ✔ Ethernet II and IEEE 802 3 Frames
    ✔ MAC Addresses
    ✔ The Evolution of DSL
    ✔ PPP and DSL
    ✔ PPP Framing for Packets
    ✔ DSL Encapsulation
    ✔ Forms of DSL
    ✔ The Evolution of SONET
    ✔ A Note about Network Errors
    ✔ Packet over SONET/SDH
    ✔ Wireless LANs and IEEE 802 11
    ✔ Wi-Fi
    ✔ IEEE 802 11 MAC Layer Protocol
    ✔ The IEEE 802 11 Frame
• Packet Optical Networks and Forward Error
    ✔ Correction
    ✔ Packet Optical Networks and Error Correction
    ✔ Packet Optical Networks and the Optical Transport
    ✔ Network
    ✔ Standards for Packet Optical Networks and Forward
    ✔ Error Correction
    ✔ Handling Single Bit Errors and Burst Errors
    ✔ Hamming Distance and Hamming Codes
    ✔ A Better Hamming Code Method
    ✔ Hamming Code in Action
    ✔ Hamming Code Implementation
    ✔ Burst Errors and Interleaving
    ✔ Modern FEC Operation
    ✔ FEC and SONET/SDH
    ✔ FEC and OTN
    ✔ The OTN Frame and FEC
    ✔ Generic Framing Procedure
    ✔ FEC Research and Development
    ✔ OTN for the Illustrated Network
• IPv4 and IPv6 Addressing
    ✔ IP Addressing
    ✔ The Network/Host Boundary
    ✔ The IPv4 Address
    ✔ Private IPv4 Addresses
    ✔ Understanding IPv4 Addresses
    ✔ The IPv6 Address
    ✔ Features of IPv6 Addressing
    ✔ IPv6 Address Types and Notation
    ✔ IPv6 Address Prefixes
    ✔ Subnetting and Supernetting
    ✔ Subnetting in IPv4
    ✔ Subnetting Basics
    ✔ CIDR and VLSM
    ✔ IPv6 Addressing Details
    ✔ IP Address Assignment
    ✔ Complete IPv4 and IPv6 Address Ranges
• Address Resolution Protocol
    ✔ ARP and LANs
    ✔ ARP Packets
    ✔ Example ARP Operation
    ✔ ARP Variations
    ✔ Proxy ARP
    ✔ Reverse ARP
    ✔ ARPs on WANs
    ✔ ARP and IPv6
    ✔ Neighbor Discovery Protocol
    ✔ ND Address Resolution
• IPv4 and IPv6 Headers
    ✔ Packet Headers and Addresses
    ✔ The IPv4 Packet Header
    ✔ Fragmentation and IPv4
    ✔ Fragmentation and MTU
    ✔ Fragmentation and Reassembly
    ✔ Path MTU Determination
    ✔ A Fragmentation Example
    ✔ Limitations of IPv4
    ✔ The IPv6 Header Structure
    ✔ IPv4 and IPv6 Headers Compared
    ✔ IPv6 Header Changes
    ✔ IPv6 and Fragmentation
• Internet Control Message Protocol
    ✔ ICMP and Ping
    ✔ The ICMP Message Format
    ✔ ICMP Message Fields
    ✔ ICMP Types and Codes
    ✔ Sending ICMP Messages
    ✔ When ICMP Must Be Sent
    ✔ When ICMP Must Not Be Sent
    ✔ Ping
    ✔ Traceroute
    ✔ Path MTU
    ✔ ICMPv6
    ✔ Basic ICMPv6 Messages
    ✔ Time Exceeded
    ✔ Neighbor Discovery and Autoconfiguration
    ✔ Routers and Neighbor Discovery
    ✔ Interface Addresses
    ✔ Neighbor Solicitation and Advertisement
• Routing
    ✔ Routers and Routing Tables
    ✔ Hosts and Routing Tables
    ✔ Direct and Indirect Delivery
    ✔ Routing
    ✔ Direct Delivery Without Routing
    ✔ Indirect Delivery and the Router
• Forwarding IP Packets
    ✔ Router Architectures
    ✔ Basic Router Architectures
    ✔ Another Router Architecture
    ✔ Router Access
    ✔ The Console Port
    ✔ The Auxiliary Port
    ✔ The Network
    ✔ Forwarding Table Lookups
    ✔ Dual Stacks, Tunneling, and IPv6
    ✔ Dual Protocol Stacks
    ✔ Tunneling
    ✔ Tunneling Mechanisms
    ✔ Transition Considerations
• User Datagram Protocol
    ✔ UDP Ports and Sockets
    ✔ What UDP Is For
    ✔ The UDP Header
    ✔ IPv4 and IPv6 Notes
    ✔ Port Numbers
    ✔ Well-Known Ports
    ✔ The Socket
    ✔ UDP Operation
    ✔ UDP Overflows
• Transmission Control Protocol
    ✔ TCP and Connections
    ✔ The TCP Header
    ✔ TCP Mechanisms
    ✔ Connections and the Three-Way Handshake
    ✔ Connection Establishment
    ✔ Data Transfer
    ✔ Closing the Connection
    ✔ Flow Control
    ✔ TCP Windows
    ✔ Flow Control and Congestion Control
    ✔ Performance Algorithms
    ✔ TCP Behaving Badly?
    ✔ TCP and FTP
• Multiplexing and Sockets
    ✔ Layers and Applications
    ✔ The Socket Interface
    ✔ Socket Libraries
    ✔ TCP Stream Service Calls
    ✔ The Socket Interface: Good or Bad?
    ✔ The “Threat” of Raw Sockets
    ✔ Socket Libraries
    ✔ The Windows Socket Interface
    ✔ TCP/IP and Windows
    ✔ Sockets for Windows
    ✔ Sockets on Linux
• ROUTING AND ROUTING PROTOCOLS
• Routing and Peering
    ✔ Network Layer Routing and Switching
    ✔ Connection-Oriented and Connectionless Networks
    ✔ Quality of Service
    ✔ Host Routing Tables
    ✔ Routing Tables and FreeBSD
    ✔ Routing Tables and RedHat Linux
    ✔ Routing and Windows
    ✔ The Internet and the Autonomous System
    ✔ The Internet Today
    ✔ The Role of Routing Policies
    ✔ Peering
    ✔ Picking a Peer
• IGPs: RIP, OSPF, and IS-IS
    ✔ Interior Routing Protocols
    ✔ The Three Major IGPs
    ✔ Routing Information Protocol
    ✔ Distance-Vector Routing
    ✔ Broken Links
    ✔ Distance-Vector Consequences
    ✔ RIPv1
    ✔ RIPv2
    ✔ RIPng for IPv6
    ✔ A Note on IGRP and EIGRP
    ✔ Open Shortest Path First
    ✔ Link States and Shortest Paths
    ✔ What OSPF Can Do
    ✔ OSPF Router Types and Areas
    ✔ Non-backbone, Non-stub Areas
    ✔ OSPF Designated Router and Backup Designated
    ✔ Router
    ✔ OSPF Packets
    ✔ OSPFv3 for IPv6
    ✔ Intermediate System-Intermediate System
    ✔ The IS-IS Attraction
    ✔ IS-IS and OSPF
    ✔ Similarities of OSPF and IS-IS
    ✔ Differences between OSPF and IS-IS
    ✔ IS-IS for IPv6
• Border Gateway Protocol
    ✔ BGP as a Routing Protocol
    ✔ Configuring BGP
    ✔ The Power of Routing Policy
    ✔ BGP and the Internet
    ✔ EGP and the Early Internet
    ✔ The Birth of BGP
    ✔ BGP as a Path-Vector Protocol
    ✔ IBPG and EBGP
    ✔ IGP Next Hops and BGP Next Hops
    ✔ BGP and the IGP
    ✔ Other Types of BGP
    ✔ BGP Attributes
    ✔ BGP and Routing Policy
    ✔ BGP Scaling
    ✔ BGP Message Types
    ✔ BGP Message Formats
    ✔ The Open Message
    ✔ The Update Message
    ✔ The Notification Message
• Expanded Uses for BGP
    ✔ Introduction
    ✔ Optimal Route Reflection (ORR)
    ✔ “Regular” Route Reflection
    ✔ ORR Considered
    ✔ BGP and Flow Specification
    ✔ BGP and DDoS
    ✔ BGP Flow Spec Details
    ✔ BGP in the Very Large Data Center
    ✔ Data Centers as CLOS Networks
    ✔ Layer 2 and Layer 3 in a Folded CLOS Network
    ✔ Data Center
    ✔ Use iBGP or eBGP?
    ✔ Let Data Center Use eBGP, Not an IGP
    ✔ Example of BGP Use in the Data Center
    ✔ Distributing Link-State Information with BGP
    ✔ The IGP Limitations
    ✔ The BGP Solution
    ✔ Implementing BGP for Link-State Protocols
    ✔ Juniper Network’s Implementation Details
    ✔ Summary of Supported and Unsupported Features
    ✔ Configuring BGP-LS on the Illustrated Network
• Multicast
    ✔ A First Look at IPv4 Multicast
    ✔ Multicast Terminology
    ✔ Dense and Sparse Multicast
    ✔ Dense-Mode Multicast
    ✔ Sparse-Mode Multicast
    ✔ Multicast Notation
    ✔ Multicast Concepts
    ✔ Reverse-Path Forwarding
    ✔ The RPF Table
    ✔ Populating the RPF Table
    ✔ Shortest-Path Tree
    ✔ Rendezvous Point and Rendezvous-Point
    ✔ Shared Trees
    ✔ Protocols for Multicast
    ✔ Multicast Hosts and Routers
    ✔ Multicast Group Membership Protocols
    ✔ Multicast Routing Protocols
    ✔ Any-Source Multicast and SSM
    ✔ Multicast Source Discovery Protocol
    ✔ Frames and Multicast
    ✔ IPv4 Multicast Addressing
    ✔ IPv6 Multicast Addressing
    ✔ PIM-SM
    ✔ The Resource Reservation Protocol and PGM
    ✔ Multicast Routing Protocols
    ✔ IPv6 Multicast
• MPLS and IP Switching
    ✔ Converging What?
    ✔ Fast Packet Switching
    ✔ Frame Relay
    ✔ Asynchronous Transfer Mode
    ✔ Why Converge on TCP/IP?
    ✔ MPLS
    ✔ Basic MPLS Terminology
    ✔ Signaling and MPLS
    ✔ Label Stacking
    ✔ MPLS and VPNs
    ✔ MPLS Tables
    ✔ Configuring MPLS Using Static LSPS
    ✔ The Ingress Router
    ✔ The Transit Routers
    ✔ The Egress Router
    ✔ Traceroute and LSPs
• MPLS-Based Virtual Private Networks
    ✔ PPTP for Privacy
    ✔ Types of VPNs
    ✔ Security and VPNs
    ✔ VPNs and Protocols
    ✔ PPTP
    ✔ L2TP
    ✔ PPTP and L2TP Compared
    ✔ Types of MPLS-Based VPNs
    ✔ Layer 3 VPNs
    ✔ Layer 2 VPNs
    ✔ VPLS: An MPLS-Based L2VPN
    ✔ Router-by-Router VPLS Configuration
    ✔ P Router (P9)
    ✔ CE6 Router
    ✔ Does it Really Work?
• EVPN and VXLAN
    ✔ EVPN Overview
    ✔ L2VPNs and EVPN Compared
    ✔ EVPN Services Overview
    ✔ EVPN Control Plane Operation
    ✔ Layer 2 and Layer 3 and EVPN
    ✔ VXLAN and EVPN Data Planes
    ✔ Configuring an EVPN with VXLAN on the Illustrated
    ✔ Network
• Dynamic Host Configuration Protocol
    ✔ DHCP and Addressing
    ✔ DHCP Server Configuration
    ✔ Router Relay Agent Configuration
    ✔ Getting Addresses on LAN2
    ✔ Using DHCP on a Network
    ✔ BOOTP
    ✔ BOOTP Implementation
    ✔ BOOTP Messages
    ✔ BOOTP Relay Agents
    ✔ BOOTP “Vendor-Specific Area” Options
    ✔ Trivial File Transfer Protocol
    ✔ TFTP Messages
    ✔ TFTP Download
    ✔ DHCP
    ✔ DHCP Operation
    ✔ DHCP Message Type Options
    ✔ DHCP and Routers
    ✔ DHCPv6
    ✔ DHCPv6 and Router Advertisements
    ✔ DHCPv6 Operation
• The Domain Name System
    ✔ DNS Basics
    ✔ The DNS Hierarchy
    ✔ Root Name Servers
    ✔ Root Server Operation
    ✔ Root Server Details
    ✔ DNS in Theory: Name Server, Database, and Resolver
    ✔ Adding a New Host
    ✔ Recursive and Iterative Queries
    ✔ Delegation and Referral
    ✔ Glue Records
    ✔ DNS in Practice: Resource Records and Message Formats
    ✔ DNS Message Header
    ✔ DNSSec
    ✔ DNS Tools: nslookup, dig, and drill
    ✔ DNS in Action
• File Transfer Protocol
    ✔ Overview
    ✔ PORT and PASV
    ✔ FTP and GUIS
    ✔ FTP Basics
    ✔ FTP Commands and Reply Codes
    ✔ FTP Data Transfers
    ✔ Passive and Port
    ✔ File Transfer Types
    ✔ When Things Go Wrong
    ✔ FTP Commands
    ✔ Variations on a Theme
    ✔ A Note on NFS
• SMTP and Email
    ✔ Architectures for Email
    ✔ Sending Email Today
    ✔ The Evolution of Email in Brief
    ✔ SMTP Authentication
    ✔ Simple Mail Transfer Protocol
    ✔ Multipurpose Internet Mail Extensions
    ✔ MIME Media Types
    ✔ MIME Encoding
    ✔ An Example of a MIME Message
    ✔ Using POP3 to Access Email
    ✔ Headers and Email
    ✔ Home Office Email
• Hypertext Transfer Protocol
    ✔ HTTP in Action
    ✔ Uniform Resources
    ✔ URIs
    ✔ URLs
    ✔ URNs
    ✔ HTTP
    ✔ The Evolution of HTTP
    ✔ HTTP Model
    ✔ HTTP Messages
    ✔ Trailers and Dynamic Web Pages
    ✔ HTTP Requests and Responses
    ✔ HTTP Methods
    ✔ HTTP Status Codes
    ✔ HTTP Headers
    ✔ General Headers
    ✔ Request Headers
    ✔ Response Headers
    ✔ Entity Headers
    ✔ Cookies
• Securing Sockets with SSL
    ✔ SSL and Web Sites
    ✔ The Lock
    ✔ Secure Socket Layer
    ✔ Privacy, Integrity, and Authentication
    ✔ Privacy
    ✔ Integrity
    ✔ Authentication
    ✔ Public Key Encryption
    ✔ Pocket Calculator Encryption at the Client
    ✔ Example
    ✔ Pocket Calculator Decryption at the Server
    ✔ Public Keys and Symmetrical Encryption
    ✔ SSL as a Protocol
    ✔ SSL Protocol Stack
    ✔ SSL Session Establishment
    ✔ SSL Data Transfer
    ✔ SSL Implementation
    ✔ SSL Issues and Problems
    ✔ SSL and Certificates
• Simple Network Management Protocol
    ✔ SNMP Capabilities
    ✔ The SNMP Model
    ✔ The MIB and SMI
    ✔ The SMI
    ✔ The MIB
    ✔ RMON
    ✔ The Private MIB
    ✔ SNMP Operation
    ✔ SNMPv2 Enhancements
    ✔ SNMPv3
• Cloud, SDN, and NFV
    ✔ Cloud Computing and Networking Defined
    ✔ Cloud Computing Service Models
    ✔ Infrastructure as a Service (IaaS)
    ✔ Platform as a Service (PaaS)
    ✔ Software as a Service (SaaS)
    ✔ Cloud Computing Models
    ✔ SDNs
    ✔ Service Chaining
    ✔ Implementing SDNs
    ✔ Contrail: An Example SDN Architecture
    ✔ NFV
    ✔ Virtio and SR-IOV
    ✔ NFV and Service Chaining
    ✔ Cloud Networking and TCP/IP
    ✔ Clouds and Security
• Secure Shell (Remote Access)
    ✔ Using SSH
    ✔ SSH Basics
    ✔ SSH Features
    ✔ SSH Architecture
    ✔ SSH Keys
    ✔ SSH Protocol Operation
    ✔ Transport Layer Protocol
    ✔ Authentication Protocol
    ✔ The Connection Protocol
    ✔ The File Transfer Protocol
    ✔ SSH in Action
    ✔ Questions For Readers
• Network Address Translation
    ✔ Using NAT
    ✔ Advantages and Disadvantages of NAT
    ✔ Four Types of NAT
    ✔ NAT in Action
    ✔ Questions For Readers
• Firewalls
    ✔ What Firewalls Do
    ✔ A Router Packet Filter
    ✔ Stateful Inspection on a Router
    ✔ Types of Firewalls
    ✔ Packet Filters
    ✔ Application Proxy
    ✔ Stateful Inspection
    ✔ DMZ
• IP Security
    ✔ IPSEC in Action
    ✔ CE0
    ✔ CE6
    ✔ Introduction to IPSec
    ✔ IPSec RFCs
    ✔ IPSec Implementation
    ✔ IPSec Transport and Tunnel Mode
    ✔ Security Associations and More
    ✔ Security Policies
    ✔ Authentication Header
    ✔ Encapsulating Security Payload
    ✔ Internet Key Exchange
• Voice over Internet Protocol
    ✔ VoIP in Action
    ✔ The Attraction of VoIP
    ✔ What Is “Voice”?
    ✔ The Problem of Delay
    ✔ Packetized Voice
    ✔ Protocols for VoIP
    ✔ RTP for VoIP Transport
    ✔ Signaling
    ✔ H 323, the International Standard
    ✔ SIP, the Internet Standard
    ✔ MGCP and Megaco/H
    ✔ Putting It All Together

Table of content

• INTRODUCTION TO NETWORK BASICS AND ADMINISTRATION
• Network Administration: Scope, Goals, And Philosophy
    ✔ Introduction
    ✔ Objectives
    ✔ Main content
    ✔ What is network and system administration?
    ✔ Scope of Network administration
    ✔ The goal of Network administration
    ✔ The challenges of system administration
    ✔ The Meta principles of system administration
    ✔ Advice to the students
    ✔ Conclusion
    ✔ Summary
    ✔ Tutor-Marked Assignments
    ✔ References/Further Reading
• Network Structure
    ✔ Introduction
    ✔ Objectives
    ✔ Main Content
    ✔ Physical Topology
    ✔ Ring Topology
    ✔ Hybrid Topology
    ✔ Conclusion
    ✔ Summary
    ✔ Tutor-Marked Assignments
    ✔ References/Further Reading
• Network Technology
    ✔ Introduction
    ✔ Objectives
    ✔ Main Content
    ✔ Categories of Networks / Network Technologies
    ✔ Conclusion
    ✔ Summary
    ✔ Tutor-Marked Assignments
• PROTOCOLS, PACKETS AND STANDARDS
    ✔ Introduction
    ✔ Objectives
    ✔ Main Content
    ✔ Protocols, Packets and Standards
    ✔ Protocols
    ✔ The layered approach to computer communications
    ✔ Standards
    ✔ The OSI model
    ✔ The TCP/IP protocol
    ✔ Conclusion
    ✔ Summary
    ✔ Tutor-Marked Assignments
    ✔ References/Further Reading
• SYSTEM COMPONENTS AND MANAGEMENT
• SYTSTEM COMPONENTS
    ✔ Introduction
    ✔ Objectives
    ✔ Main Content
    ✔ What Is ‘The System’?
    ✔ Handling hardware
    ✔ Operating systems
    ✔ Filesystems
    ✔ Networks
    ✔ IPv4 networks
    ✔ Address space in IPv4
    ✔ IPv6 networks
    ✔ Conclusion
    ✔ Summary
    ✔ Tutor Marked Assignment
    ✔ References/Further Reading
• NETWORKED COMMUNITIES
    ✔ Introduction
    ✔ Objectives
    ✔ Main Content
    ✔ Communities and Enterprises
    ✔ Policy Blueprints
    ✔ System Uniformity
    ✔ User behavior: socio-anthropology
    ✔ Clients, servers and delegation
    ✔ Host identities and name services
    ✔ Common network sharing models
    ✔ Local Network Orientation and Analysis
    ✔ Conclusion
    ✔ Summary
    ✔ Tutor Marked Assignments
    ✔ References/Further Reading
• HOST MANAGEMENT
    ✔ Introduction
    ✔ Objectives
    ✔ Main Content
    ✔ Computer startup and shutdown
    ✔ Configuring and personalizing workstations
    ✔ Installation of the operating system
    ✔ Conclusion
    ✔ Summary
    ✔ Tutor-Marked Assignments
    ✔ References/Further Reading
• USER MANAGEMENT
    ✔ Introduction
    ✔ Objectives
    ✔ Main Content
    ✔ Issues
    ✔ User Registration
    ✔ Account Policy
    ✔ Conclusion
    ✔ Summary
    ✔ Tutor-Marked Assignments
• NETWORK MANAGEMENT
• METHODS OF NETWORK ADMINISTRATION: SNMP & RMON
    ✔ Introduction
    ✔ Objectives
    ✔ Main Content
    ✔ What Is Network Management?
    ✔ SNMP Network Management
    ✔ SNMP Tools
    ✔ TCP/IP Remote Network Monitoring (RMON)
    ✔ Conclusion
    ✔ Summary
    ✔ Tutor-Marked Assignments
    ✔ References/Further Reading
• CONFIGURATION AND MAINTENANCE
    ✔ Introduction
    ✔ Objectives
    ✔ Main Content
    ✔ System Configuration Policy
    ✔ Methods: controlling causes and symptoms
    ✔ Change management
    ✔ Automation of host configuration
    ✔ Conclusion
    ✔ Summary
    ✔ Tutor-Marked Assignments
    ✔ References/Further Reading
• DIAGNOSTICS, FAULT AND CHANGE MANAGEMENT
    ✔ Introduction
    ✔ Objectives
    ✔ Main Content
    ✔ Fault Tolerance and Propagation
    ✔ Faults
    ✔ Conclusion
    ✔ Summary
    ✔ Tutor-Marked Assignments
    ✔ References/Further Reading
• MONITORING AND SYSTEM PERFORMANCE TUNING
    ✔ Introduction
    ✔ Objectives
    ✔ Main Content
    ✔ Monitoring
    ✔ System performance tuning
    ✔ Conclusion
    ✔ Summary
    ✔ Tutor-Marked Assignments
    ✔ References/Further Reading
• NETWORK SIMULATION, DOCUMENTATION AND SECURITY
• NETWORK SIMULATION AND DOCUMENTATION
    ✔ Introduction
    ✔ Objectives
    ✔ Main Point
    ✔ What Is Network Simulation?
    ✔ Network Simulator
    ✔ Simulations
    ✔ Documentation
    ✔ Conclusion
    ✔ Summary
    ✔ Tutor-Marked Assignments
    ✔ References/Further Reading
• NETWORK SECURITY
    ✔ Introduction
    ✔ Objectives
    ✔ Main Content
    ✔ Principles of Security
    ✔ Security Implementation
    ✔ Conclusion
    ✔ Summary
    ✔ Tutor-Marked Assignments
    ✔ References/Further Reading
• OUTLOOK AND THE FUTURE OF NETWORK ADMINISTRATION
    ✔ Introduction
    ✔ Objectives
    ✔ Main Content
    ✔ Outlook
    ✔ Pervasive computing
    ✔ The future of system administration
    ✔ Conclusion
    ✔ Summary
    ✔ Tutor-Marked Assignments
    ✔ References/Further Reading
Still Have Questions?

No Problem! Mail us at [email protected] to Connect

Contact Us

24/7 WhatsApp and email support

Unlock the power of simplified business knowledge with engineeringexplained.in. Explore our collection of easy-to-understand ebooks today!

Contact Information