REVIEW: "Network Warrior", Gary A. Donahue
- BKNTWWRR.RVW 20090118
"Network Warrior", Gary A. Donahue, 2007, 978-0-596-10151-0,
%A Gary A. Donahue
%C 103 Morris Street, Suite A, Sebastopol, CA 95472
%G 978-0-596-10151-0 0-596-10151-1
%I O'Reilly & Associates, Inc.
%O U$44.99/C$58.99 800-998-9938 fax: 707-829-0104 nuts@...
%O Audience i- Tech 1 Writing 1 (see revfaq.htm for explanation)
%P 576 p.
%T "Network Warrior"
The preface says that this book is intended for readers who hold a
first-level networking certificate or higher, and that it deals with
real-world practicalities rather than the theory presented in courses.
He also mentions that Cisco equipment will be used in examples.
However, the author doesn't really say what the book will help you to
Part one is entitled hubs, switches and switching, which is fair
enough, since those items are at the (physical) heart of networking.
Unfortunately, in the eight following chapters we have networks
defined in terms of size, hubs and switches defined in terms of
Ethernet, auto-negotiation defined in terms of Cisco commands, VLANs
(virtual LANs) defined in terms of subsetting of ports on a single
switch, trunking defined in terms of broadcast to multiple VLANs,
EtherChannel (a Cisco product) defined in marketing terms, and
spanning tree defined in terms of reducing a packet network back to
Ethernet (with no mention of the risk analysis meaning). Routing is
the logical basis for network, and part two, while still presenting a
great deal of Cisco-specific material, is somewhat better at providing
the general concepts. The content is limited in many respects: only
four routing protocols are described, two of which are Cisco's.
Security, for example, is notable by its absence, except for some
discussion of availability. Part three is completely Cisco-specific;
three chapters dealing with means of managing VLANs. Some terms (and
Cisco functions) related to telephony and high-speed data
communications are provided in part four.
Although the title of part five is "Security and Firewalls," there
isn't much content about security, as such. There is a fair amount of
detail on building different entries in firewall access control lists,
a brief description of a few authentication protocols, a terse look at
firewall topologies, and some PIX firewall settings. Server load
balancing is noted in the two chapters of part six. Two of the
chapters on quality of service (part seven) present a decent overview
of the issues: two outline Cisco configurations.
Part eight is a grab bag of miscellaneous tips, relating to network
documentation, IP (Internet Protocol) addressing schemes, network time
protocol, some general troubleshooting guidelines, and a couple of
chapters of opining.
What real-world practicalities, as opposed to the theory presented in
courses, seems to mean to Donahue is that networking and
telecommunications courses don't always see the world as Cisco does,
and occasionally dare to use terms in ways other than as defined by
Cisco. Well, maybe that statement is unfair: there is a little bit of
material in this book that will be of use regardless of what kind of
network you run. There is, of course, a lot of networking activity
that isn't, and can't, be included in this text. Overall, though,
this work will be valuable if you are running a lot of Cisco gear in a
large environment, and not too useful if you aren't.
copyright Robert M. Slade, 2009 BKNTWWRR.RVW 20090118
====================== (quote inserted randomly by Pegasus Mailer)
rslade@... slade@... rslade@...
Review index: http://victoria.tc.ca/techrev/review.htm