The Switch Book: The Complete Guide to LAN Switching Technology

The Switch Book: The Complete Guide to LAN Switching Technology
ISBN-10
0471345865
ISBN-13
9780471345862
Category
Computers / Networking / General
Pages
720
Language
English
Published
2000-07-11
Publisher
Wiley
Author
Rich Seifert

Description

The most in-depth guide to the capabilities, application, and design of LAN switches and switched internetworksWritten by an innovator who has been at the forefront of networking technology for more than two decades, this comprehensive book covers everything you need to know about LAN switching. From understanding switch functions and features to technology integration and network management, it provides valuable insights for network planners, developers, and managers. Seifert helps you gain a clear understanding of the often-complex features and options available in LAN switches, along with detailed explanations of the latest technology enhancements-including previously unpublished information on Link Aggregation, Virtual LANs, and Layer 3 switches. Packed with the most up-to-date and complete information on LAN switches, this book:
* Explains how switches and bridges operate, and explores implementation and performance issues
* Details how switches can be deployed in both homogeneous and heterogeneous LAN environments
* Provides a comprehensive explanation of the Spanning Tree Protocol
* Covers source routing, which is available on Token Ring and FDDI networks
* Explains full duplex LAN operation and link flow control methods
* Looks at the applications and IEEE 802.3ad standard for aggregated links and their effect on system and higher-layer protocol behavior
* Introduces Virtual LANs and the IEEE 802.1Q standard
* Discusses the Simple Network Management Protocol (SNMP) as well as other forms of itch management
* Explores the architecture and data flow through a typical switch, including an analysis of switch fabric options

Similar books

  • Voice Over IP
    By Uyless D. Black

    Voice Over IP is the #1 guide for professionals planning or running VoIP applications. Uyless Black covers every current technical standard, protocol, and interoperability solution.

  • Electronic Communications Systems
    By William C. House

    The men responsible for turning such possibilities into realities are Phillip Whittaker , the president of S.B.s. , and John E. Fox , director of marketing and business planning . Whittaker , fifty - eight , is a silver - haired veteran ...

  • Computer Networking Illuminated
    By Todd King, Diane Barrett

    Included are numerous Challenge Exercises, which allow students to gain hands-on experience with networking related tools and utilities, and Challenge Scenarios.

  • Cisco IOS Configuration Fundamentals
    By Cisco Systems, Inc

    Cisco Systems, Inc. Modify the current configuration register setting to reflect the way in which you want to load a system image . To do so , change the least significant hexadecimal digit to one of the following : • 0 to load the ...

  • From Millwrights to Shipwrights to the Twenty-first Century: Explorations in a History of Technical Communication in the United States
    By R. John Brockmann

    The millwrights ' and millers ' resistance to Evans's message was so great that their first recorded reaction was : “ It will not do ! it cannot do !! it is impossible that it should do !!! " 9 Nevertheless , Evans persisted in his ...

  • Principles, Protocols, and Architecture
    By Douglas Comer, David L. Stevens

    Principles, Protocols, and Architecture

  • Network Security Illustrated
    By Jason Albanese, Wes Sonnenreich

    The device has a chin rest , a keypad , and a card - swiping receptacle that resembles those used in retail stores . Steve places his chin on the rest , at which time his retina is scanned .

  • XML: Designing XML internet applications
    By David Megginson

    XML: Designing XML internet applications

  • Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions
    By Bill Pennington, David Pollino, Tony Bradley

    The stories about phishing attacks against banks are so true-to-life, it’s chilling.” --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network.

  • 软件定义网络核心原理与应用实践
    By 刘江, 魏亮, 黄韬

    本书分为核心原理和应用实践两大部分, 对软件定义网络(SDN)技术进行了剖析和解读. 第一部分首先阐述了SDN的设计思想与体系架构, ...