Home Page Icon
Home Page
Table of Contents for
I. Designing Networks
Close
I. Designing Networks
by Catherine Paquet, Diane Teare
Campus Network Design Fundamentals
Copyright
Dedications
About the Authors
About the Technical Reviewers
Acknowledgments
Icons Used in This Book
I. Designing Networks
1. Network Design
What Is Design?
Design Principles
Determining Requirements
Analyzing the Existing Network
Preparing the Preliminary Design
Completing the Final Design Development
Deploying the Network
Monitoring and Redesigning
Maintaining Design Documentation
Modular Network Design
What Is Modular Design?
Hierarchical Network Design
Access Layer
Distribution Layer
Core Layer
Limitations of the Hierarchical Model
The Cisco Enterprise Composite Network Model
Enterprise Campus Functional Area
Campus Infrastructure Module
Management Module
Server Module
Edge Distribution Module
Enterprise Edge Functional Area
Service Provider Edge Functional Area
Summary
Endnotes
2. Switching Design
Making the Business Case
Switching Types
Layer 2 Switching
Layer 3 Switching
Spanning Tree Protocol
Redundancy in Layer 2 Switched Networks
STP Terminology and Operation
STP Terminology
STP States
STP Options
Rapid STP (RSTP)
Virtual LANs
VLAN Membership
Trunks
STP and VLANs
VLAN Trunking Protocol
Inter-VLAN Routing
Multilayer Switching and Cisco Express Forwarding
Multilayer Switching
Cisco Express Forwarding
Switching Security
Catalyst Native Security
Catalyst Hardware Security
Switching Design Considerations
Summary
Endnotes
3. Pv4 Routing Design
Making the Business Case
IPv4 Address Design
Determining How Many IP Addresses Are Required
Using Private and Public Addresses and NAT
How Routers Use Subnet Masks
Determining the Subnet Mask to Use
Hierarchical IP Address Design and Summarization
Variable-Length Subnet Masks
IPv4 Routing Protocols
Classifying Routing Protocols
Interior and Exterior Routing Protocols
Distance Vector, Link-State, and Hybrid Routing Protocols
Flat and Hierarchical Routing Protocols
Classful and Classless Routing Protocols
Metrics
Convergence Time
Route Summarization
Routing Protocol Comparison
Routing Information Protocol, Versions 1 and 2
Interior Gateway Routing Protocol
Enhanced Interior Gateway Routing Protocol
Open Shortest Path First
Integrated Intermediate System-to-Intermediate System
Border Gateway Protocol Version 4
IPv4 Routing Protocol Selection
Choosing Your Routing Protocol
Redistribution, Filtering, and Administrative Distance
Summary
Endnotes
4. Network Security Design
Making the Business Case
Hacking
Types of Hackers
White-Hat Hackers
Vulnerabilities
Design Issues
Human Issues
Implementation Issues
Threats
Reconnaissance Attacks
Access Attacks
Access Subterfuges
Information Disclosure Attacks
Social Engineering
Phishing
Denial of Service Attacks
Mitigating Technologies
Threat Defense
Virus protection
Traffic Filtering
Static Packet Filtering
Dynamic Packet Filtering
Intrusion Detection and Prevention
Intrusion Detection Systems
Network-Based IDSs
Host-Based IDSs
Intrusion Prevention Systems
Target-Based Intrusion Detection Systems
Content Filtering
URL Filtering
E-mail Filtering
Secure Communication
Encrypted VPN
SSL
File Encryption
Trust and Identity
Authentication, Authorization, and Accounting
Network Admission Control
Public Key Infrastructure
Network Security Best Practices
Network Management
Assessment and Audits
Policies
SAFE Campus Design
Summary
Endnotes
5. Wireless LAN Design
Making the Business Case
Wireless Technology Overview
Wireless Standards
Wireless Components
Wireless Access Points
Integrated Access Point
Wireless Client Devices
User Workstations and Laptops: Ad-Hoc Network
PDAs
Wireless IP Phones
Wireless Security
Wireless Security Issues
Wireless Threat Mitigation
Basic Wireless Security
SSIDs
Wired Equivalent Privacy
MAC Address Verification
Enhanced Wireless Security
802.1x
Wi-Fi Protected Access
802.11i
Wireless Intrusion Detection
Wireless Management
Wireless Design Considerations
Site Survey
WLAN Roaming
Point-to-Point Bridging
Design Considerations for Wireless IP Phones
Summary
Endnotes
6. Quality of Service Design
Making the Business Case
QoS Requirements for Voice, Data, Video, and Other Traffic
QoS Models
IntServ
DiffServ
QoS Tools
Classification and Marking
Classification
Marking
Policing and Shaping
Policing Tools
Shaping Tools
Congestion Avoidance
Congestion Management
Link-Specific Tools
AutoQoS
QoS Design Guidelines
Summary
Endnotes
7. Voice Transport Design
What Is Voice Transport?
Digitization
Packetization and Call Processing
Conversation and Control Traffic
Quality of Service
VoIP Components
IP Telephony Components
IP Infrastructure
IP Phones
Video Telephony
Call Processing
Applications
Voice Gateway
Voice Coding and Compression Techniques
Voice Compression
Voice Activity Detection
Compressed Real-Time Transport Protocol
Bandwidth Requirements
Definitions
Calculating Trunk Capacity or Bandwidth
Signaling Traffic Bandwidth
IP Telephony Design
Single-Site IP Telephony Design
Multisite Centralized IP Telephony Design
Multisite Distributed IP Telephony Design
Voice Security
IP Telephony Network Security Concerns
Access Attacks
Denial of Service Attacks
Platform Security Issues
Mitigating to Protect IP Telephony
Summary
Endnotes
8. Content Networking Design
Making the Business Case
Content Networking
Content Caches and Content Engines
Transparent Caching
Nontransparent Caching
Reverse Proxy Caching
Content Routing
Direct Mode
WCCP Mode
Content Distribution and Management
Content Switching
Designing Content Networking
School Curriculum
Live Video and Video on Demand for a Corporation
Summary
Endnotes
9. Network Management Design
Making the Business Case
ISO Network Management Standard
Network Management Protocols and Tools
Terminology
SNMP
MIB
RMON
RMON 1
RMON2
RMON Extensions
Cisco NetFlow
Syslog
CiscoWorks
Other Tools
Managing a Network
Network Management Strategy
SLCs and SLAs
IP Service-Level Agreements
Network Management Design
Summary
Endnotes
10. Other Enabling Technologies
IP Multicast
Internet Group Management Protocol (IGMP) and Cisco Group Management Protocol (CGMP)
Protocol Independent Multicast (PIM) Routing Protocol
Increasing Network Availability
Storage Networking
IP Version 6
Summary
Endnotes
III. Designing Your Network: How to Apply What You Know
11. Case Study Context: Venti Systems
Background Information and Context
Network Requirements After Acquisitions Are Complete
Summary
12. Case Study Solution: Venti Systems
Design Model
Head Office
Enterprise Campus
Enterprise Edge and Service Provider Edge
Branch Office
Remote Users
User Devices
Servers
Switching
Head-Office Switching
Branch-Office Switching
Remote User Switching
Security
Head-Office Security
Branch-Office Security
Remote User Security
IP Addressing and Routing Protocol
Head-Office IP Addressing and Routing Protocol
Branch-Office IP Addressing and Routing Protocol
Remote User IP Addressing and Routing Protocol
E-Mail
Head-Office E-Mail
Branch-Office E-Mail
Remote User E-Mail
QoS and Voice
Head-Office QoS and Voice
Branch-Office QoS and Voice
Remote User QoS and Voice
Wireless
Head-Office Wireless
Branch-Office Wireless
Remote User Wireless
Network Management
Head-Office Network Management
Branch-Office Network Management
Remote User Network Management
Future Considerations
Summary
Endnotes
IV. Appexdixes
A. References
B. Network Fundamentals
Introduction to Networks
Protocols and the OSI Model
The OSI Model
Protocols
The OSI Layers
Physical Layer (Layer 1)
Data Link Layer (Layer 2)
Network Layer (Layer 3)
Transport Layer (Layer 4)
Upper Layers (Layers 5 through 7)
Communication Among OSI Layers
LANs and WANs
Network Devices
Terminology: Domains, Bandwidth, Broadcast, and Multicast
Hubs
Switches
Routers
Introduction to the TCP/IP Suite
TCP/IP Transport Layer Protocols
Port Numbers
TCP Sequencing, Acknowledgment, and Windowing
TCP/IP Internet Layer Protocols
Protocols
IP Datagrams
Routing
Routers Work at the Lower Three OSI Layers
Routing Tables
Routing Protocols
Addressing
Physical and Logical Addresses
Routing and Network Layer Addresses
IP Addresses
IP Address Classes
Private and Public IP Addresses
Subnets
Comprehensive Example
Summary
C. Decimal-Binary Conversion
Decimal-to-Binary Conversion Chart
Decimal Numbers
Binary Numbers
Converting Binary IP Addresses to Decimal
Converting Decimal IP Addresses to Binary
D. Abbreviations
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Introduction
Next
Next Chapter
1. Network Design
Part I. Designing Networks
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset