Pub. Date:
Cisco Press
Cisco Networking Simplified / Edition 2

Cisco Networking Simplified / Edition 2

Current price is , Original price is $54.99. You

Temporarily Out of Stock Online

Please check back later for updated availability.


Cisco Networking Simplified
Second Edition

  • Master today’s world of Cisco networking with this book’s completely updated, fully illustrated visual approach
  • Easy enough for novices, substantive enough for networking professionals
  • Covers the latest networking topics—from network architecture to secure wireless, unified communications to telepresence

In Full Color

Jim Doherty • Neil Anderson • Paul Della Maggiora

Now 100 percent updated for the latest technologies, this is today’s easiest, most visual guide to Cisco® networking. Even if you’ve never set up or managed a network, Cisco Networking Simplified, Second Edition, helps you quickly master the concepts you need to understand. Its full-color diagrams and clear explanations give you the big picture: how each important networking technology works, what it can do for you, and how they all fit together. The authors illuminate networking from the smallest LANs to the largest enterprise infrastructures, offering practical introductions to key issues ranging from security to availability, mobility to virtualization.

What you always wanted to know about networking but were afraid to ask!

  • How networks and the Internet work
  • How to build coherent, cost-effective network infrastructures
  • How to design networks for maximum reliability and availability
  • What you need to know about data center and application networking
  • How to secure networks against today’s threats and attacks
  • How to take advantage of the latest mobility technologies
  • How virtualizing networks can help businesses leverage their network investments even further
  • How to combine messaging, calendaring, telephony, audio, video, and web conferencing into a unified communications architecture

This book is part of the Networking Technology Series from Cisco Press®, the only authorized publisher for Cisco®.

Category: Cisco

Covers: General Networking

Product Details

ISBN-13: 9781587201998
Publisher: Cisco Press
Publication date: 01/01/2008
Series: Networking Technology Series
Pages: 432
Sales rank: 748,690
Product dimensions: 8.43(w) x 10.75(h) x 0.60(d)

About the Author

Jim Doherty is the Chief Marketing Officer at CipherOptics. Before joining the CipherOptics team, he held leadership positions with Symbol Technologies and Cisco Systems. He has more than 16 years of technical marketing and engineering experience and has led various marketing campaigns for IP telephony, routing and switching solutions, and network security solutions. He is the coauthor of the Networking Simplifiedseries, published by Cisco Press. He is a former Marine Corps sergeant. He holds a B.S. in electrical engineering from North Carolina State University and an MBA from Duke University.

Neil Anderson is the Senior Manager of Technology Systems Engineering with Cisco Systems. He has more than 20 years of broad engineering experience, including public telephone systems, mobile phone systems, Internet, and home networking. At Cisco, his focus is on business networks in the areas of network architecture, wireless, security, unified communications, and emerging technologies. He is the coauthor of the Networking Simplified series, published by Cisco Press. He holds a B.S. in computer science.

Table of Contents


Part I: Networking Fundamentals

How Computers Communicate

The OSI Model

Open Versus Proprietary Systems

Seven Layers

At-a-Glance: OSI Model

Internet Infrastructure: How It All Connects

TCP/IP and IP Addressing

Computers Speaking the Same Language

What Is an Address?

Dynamically Allocated IP Addresses

Domain Names and Relationship to IP Addresses

Matching Domain Names to IP Addresses

At-a-Glance: TCP/IP

At-a-Glance: IP Addressing

At-a-Glance: IPv6


Internet Applications

The Internet and Its Applications


Web Browsing


Peer-to-Peer Sharing

Part II: Networking Infrastructure


History of Ethernet

What Is Ethernet?

Evolution of Ethernet

At-a-Glance: Ethernet

Reducing Collisions on Ethernet

LAN Switching

Fast Computers Need Faster Networks

Switching Basics: It’s a Bridge

Switching Ethernets

Switches Take Over the World

At-a-Glance: Switching

Spanning Tree

Network Loops

Sometimes, the Earth Is Flat

Preventing Network Loops

Spanning-Tree Fundamentals

At-a-Glance: Spanning Tree



Routers Talk Among Themselves to Find Routes

Routers Route Packets

Routers Bridge and Switches Route

At-a-Glance: Routing

Routing and Switching

Part III: Network Design

Campus Networks and Hierarchical Design

Building Networks for Ease of Use

At-a-Glance: Hierarchical Campus Design

WAN Network Design

Moving Traffic Across the Street and the World

WAN Services

Integrated Services Digital Network

Frame Relay




Virtual Private Networks (VPN)

WAN Devices

At-a-Glance: Frame Relay

At-a-Glance: Asynchronous Transfer Mode (ATM)

Multiprotocol Label Switching (MPLS) Services

At-a-Glance: MPLS

MPLS Traffic Separation

Broadband Technologies

Always-on Access

Broadband Technology Evolution

At-a-Glance: ISDN

At-a-Glance: Broadband

Virtual Private Networks

Secure Networking Over the Internet

At-a-Glance: VPNs

Establishing a VPN Connection

At-a-Glance: Encryption

Client Authentication

Optical Technologies

LANs, WANs—and Now MANs


At-a-Glance: Metro Optical

Branch Office Network Designs

Distributed Workforce

Distributed Office Challenges

At-a-Glance: Branch Office Design

Part IV: Network Availability

High Availability

At-a-Glance: High Availability

Control Plane

When Good Networks Go Bad

Control Plane Protection

At-a-Glance: Control Plane Protection

Quality of Service and Network Availability

Quality of Service as Network Protection?

Scavenger QoS

At-a-Glance: QoS for Network Resiliency

Disaster Recovery

What Happens When the Network Stops Working

DR Planning

Resiliency and Backup Services

Preparedness Testing

At-a-Glance: Disaster Recovery: Business Continuance

Disaster Recovery

Network Management

Keeping the Network Alive from Afar

Network Documentation: A Must-Have

Network-Management Protocols

Troubleshooting Tools

At-a-Glance: Network Management

Network Management

Part V: Securing the Network

Network Security


Perimeter Security

Data Privacy

Security Monitoring

Policy Enforcement

At-a-Glance: Network Security

At-a-Glance: Hacking

DoS Attacks

Snooping and Spoofing


Protecting the Perimeter

Get Off the Net!

Firewall for Your Protection

Personal Firewalls

At-a-Glance: Firewalls and IDS

Firewalls and IDS

Access and Content Security

Intrusion Prevention Systems

Intrusion Detection Systems

Intrusion Prevention Systems

The Problem with False Positives

At-a-Glance: Intrusion Detection

Port-Based Security

Combating Access-Based Attacks

At-a-Glance: Port-Based Security

Identity-Based Networking

Network Access Conundrum

Identity-Based Networking


At-a-Glance: Identity


Network Admission Control

Combating Virus Outbreaks

Assessing Device “Health”

Network Admission Control

At-a-Glance: NAC

URL Filtering: Eliminating Unwanted Web Page Access

Internet Access and Liability Issues

Enforcing Corporate Internet Usage Policies

At-a-Glance: URL Filtering

URL Filtering and Firewalls

Deep Packet Inspection: Controlling Unwanted Applications

How Do You Catch a Criminal When Everyone Wears a Mask?

Deep Packet Inspection

At-a-Glance: Deep Packet Inspection

Packet Inspection

Telemetry: Identifying and Isolating Attack Sources

Normal or Abnormal

Using Telemetry to Combat Attacks

At-a-Glance: Telemetry

Physical Security: IP Video Surveillance

Locks on the Doors

Video Surveillance

At-a-Glance: Physical Security

Physical and Logical Security

Part VI: Data Centers and Application Networking

Moving Data Efficiently

Data Centers

Store Once, Use Often

n-Tier Model

Functions and Requirements

At-a-Glance: Data Centers

Data Center Application: Corporate Expense System

Storage Area Networks

Efficient Deployment of Critical Data

Fiber Channel and IP


At-a-Glance: Storage Networking

Server-Centric Storage


Moving Content Close to the User

How Caching Works

Caching More Than Web Pages

Storage Caching: From Disk to Memory

Issues Affecting Caching


Wide Area File Services

Branch Offices Rule

Centralizing Storage

Enter Wide Area File Services (WAFS)

At-a-Glance: Wide Area File Services

Wide Area Application Services

Centralizing Applications

Enter Wide Area Application Services (WAAS)

At-a-Glance: Wide Area Application Services

Part VII: Unified Communications

Voice over IP

Making Calls over the Web

Unifying Communications

Client Layer

Infrastructure Layer

Call-Processing Layer

Application Layer

Deployment Models

At-a-Glance: Voice over IP

Voice over IP

At-a-Glance: Unified Communications

Voice over IP: Toll Bypass

Quality of Service

Converged Networks and QoS

What Is QoS?

QoS and Unified Communications

At-a-Glance: QoS

How Packets Are Prioritized

Unified Personal Communications

Too Many Communications, Too Little Time

Unify Me

Cisco Unified Personal Communicator (CUPC)

At-a-Glance: Unified Communications

Meeting Collaboration Spaces

Meetings, Meetings, Meetings

Meetings Are an Activity, Not a Place

At-a-Glance: Meeting Collaboration

Traditional Videoconferencing

I See You

Video over IP Networks

At-a-Glance: IP Videoconferencing


Videoconferencing Application E-Learning


Conferencing Gets Simple

Video Killed the Radio Star

The Next-Best Thing to Being There

At-a-Glance: Telepresence

Presence and Location-Aware Services

I Sense a Presence

The Importance of Location

At-a-Glance: Presence and Location-Aware Services

IP Call Center

Why Can’t I Talk to a Real Person?

Anatomy of a Contact Center

From the Caller to the Agent, and Back Again

Managing Caller and Contact Agent Efficiency

New Methods for Customer Interaction

At-a-Glance: IP Contact Center

Call-Center Tech Support

Call-Center Telemarketing

Multicast and IPTV Broadcasts

Watching Movies Without Flooding the World

At-a-Glance: IP Multicast


Part VIII: Mobility

Wireless World

Mobility and Wireless Networks

Throwing Away the Ties That Bind

At-a-Glance: Wireless LANs

Wired LANs

Wireless LANs

Selecting and Building Wireless Networks

Designing a Wireless Network

At-a-Glance: Designing Wi-Fi Networks

Securing Wireless Networks

Locking Down Wireless

Balancing Security and Access

At-a-Glance: Securing Wi-Fi

Outdoor and Municipal Wireless Networks

It’s Just Like a Building, Only Way Bigger

At-a-Glance: Municipal Wi-Fi

VoIP over Wireless Networks

Wireless VoIP

At-a-Glance: Wireless VoIP

Wireless VoIP

Wireless Guest Access

Mi Casa Es Su Casa

At-a-Glance: Wireless Guest Access

RFID and Location-Based Services

Finding Your Stuff

Wireless LANS: They’re Not Just for Checking E-Mail on the Toilet Anymore!

At-a-Glance: Location-Based Services

Wireless Location Services

Part IX: Virtualized Networks

Virtualizing Data Centers

Growth of the Data Center

Data Center Virtualization

At-a-Glance: Virtual Data Centers

Virtualizing Network Infrastructure

Leveraging Network Investment

A Network Is a Network

Virtualizing Network Infrastructure

At-a-Glance: Virtual Network Infrastructure

Applications of Virtualized Networks

What Can You Do with Virtualized Networks?

Corporate Employee “Clean” and “Dirty” Networks

Guest and Partner Networks

Isolating Specialized Devices and Applications

Load Balancing

Providing Hosted Networks to Entities Within Entities

Departmental Virtual Networks

Challenges with Virtual Networks

At-a-Glance: Virtualized Network Applications

Evolution of Virtual Networks

1587201992 TOC 11/19/2007

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews

Cisco Networking Simplified 3 out of 5 based on 0 ratings. 1 reviews.
Guest More than 1 year ago
Cisco Networking Simplified, Second Edition by Jim Doherty, Neil Anderson and Paul Della Maggiora gives the reader a clear, brief explanation of computer networking terminology, concepts and their components, as it relates to Cisco products. Whether you are a novice in the field, a senior network engineer or an IT executive, you will learn about the current technologies that you will find in a home and/or corporate network environment. The book contains cutting edge technology that several IT managers may deploy in their infrastructure. Examples are: Radio Frequency Identification (RFID), Voice Over Internet Protocol (VOIP) and Virtualization of Data Centers and Network Infrastructure. Over time, these services can save the enterprise significant resources and money. There are also a several sections within the book that offers the reader trouble-shooting information on the how and why to deploy the hardware and software securely. You will learn where the equipment can be placed on your network and how they interact with one another. This is the second edition of the book and it has been changed significantly from the first version published in 2003. The authors include color diagrams and pictures to enhance the comprehension level, as well as, to reinforce the content for the reader. This volume is based on many of the Cisco components and products that are currently available by the manufacturer. There are two criticisms that I have of the book. The first is the organization of the topics from one chapter to another. The second is the lack of suggested references and materials for the reader to follow-up and obtain additional information. The book starts out clearly explaining the OSI model. I like that the authors introduce the readers to this approach, but I wish that the book was organized in the same way. I would suggest starting from the Physical level and then progressing through each of the seven layers to explain each of the components and concepts. Also, they may want to include references to the Department of Defense (DoD) model and how the two approaches relate to one another. The second issue that I found with the book was the references and materials for the reader to follow-up on were noticeably missing from this version. Perhaps future editions will contain additional information and links for the readers to obtain supplementary data. Overall, I found this book very enjoyable and interesting to read. I will look forward to future editions and books from all of the authors. I give this book 3 out 5 stars.