出版時(shí)間:2011-11 出版社:人民郵電出版社 作者:奧本海默 頁(yè)數(shù):447
Tag標(biāo)簽:無(wú)
內(nèi)容概要
本書(shū)是圍繞自頂向下網(wǎng)絡(luò)設(shè)計(jì)步驟編寫(xiě)的,提供給網(wǎng)絡(luò)設(shè)計(jì)者一種系統(tǒng)的結(jié)構(gòu)化網(wǎng)絡(luò)設(shè)計(jì)方法。
本書(shū)分為4個(gè)部分,即客戶需求和目標(biāo)、邏輯網(wǎng)絡(luò)設(shè)計(jì)、物理網(wǎng)絡(luò)設(shè)計(jì),以及網(wǎng)絡(luò)測(cè)試、優(yōu)化和文檔編寫(xiě)。4個(gè)部分分別對(duì)應(yīng)著網(wǎng)絡(luò)
設(shè)計(jì)的各個(gè)重要階段,每個(gè)階段都提供給讀者詳細(xì)的設(shè)計(jì)指導(dǎo)原則,內(nèi)容涵蓋網(wǎng)絡(luò)設(shè)計(jì)的方方面面。本書(shū)從用戶商業(yè)和技術(shù)目標(biāo)的分析入手,從而制定出相應(yīng)的網(wǎng)絡(luò)流量、負(fù)載和qos需求,進(jìn)而開(kāi)發(fā)網(wǎng)絡(luò)的邏輯拓?fù)浣Y(jié)構(gòu),然后進(jìn)入地址規(guī)劃、協(xié)議選擇、網(wǎng)絡(luò)安全和網(wǎng)絡(luò)管理實(shí)施策略制定,最后是對(duì)網(wǎng)絡(luò)設(shè)備的選型建議以及網(wǎng)絡(luò)實(shí)施、測(cè)試和文檔編寫(xiě)。本書(shū)每章以復(fù)習(xí)題和設(shè)計(jì)環(huán)境作為一章的總結(jié)和回顧,理論與實(shí)踐相結(jié)合,從而讓讀者更好地理解和掌握自頂向下網(wǎng)絡(luò)設(shè)計(jì)的思想。
本書(shū)適合cisco代理商、網(wǎng)絡(luò)運(yùn)營(yíng)商、其他網(wǎng)絡(luò)設(shè)備商的網(wǎng)絡(luò)部署人員、售后技術(shù)支持人員閱讀;網(wǎng)絡(luò)維護(hù)人員,以及網(wǎng)絡(luò)技術(shù)愛(ài)好者也可以從本書(shū)中獲益。
作者簡(jiǎn)介
作者:(美國(guó))奧本海默(Priscilla Oppenheimer)
書(shū)籍目錄
introduction xxii
part i identifying your customer's needs and goals
chapter analyzing business goals and constraints
using a top-down network design methodology
using a structured network design process
systems development life cycles
plan design implement operate optimize (pdioo) network life
cycle
analyzing business goals
working with your client
changes in enterprise networks
networks must make business sense
networks offer a service
the need to support mobile users
the importance of network security and resiliency
typical network design business goals
identifying the scope of a network design project
identifying a customer's network applications
analyzing business constraints
politics and policies
.budgetary and staffing constraints
project scheduling
business goals checklist
summary
review questions
design scenario
chapter analyzing technical goals and tradeoffs
scalability
planning for expansion
expanding access to data
constraints on scalability
availability
disaster recovery
specifying availability requirements
five nines availability
the cost of downtime
mean time between failure and mean time to repair
network performance
network performance definitions
optimum network utilization
throughput
throughput of internetworking devices
application layer throughput
accuracy
efficiency
delay and delay variation
causes of delay
delay variation
response time
security
identifying network assets
analyzing security risks
reconnaissance attacks
denial-of-service attacks
developing security requirements
manageability
usability
adaptability
affordability
making network design tradeoffs
technical goals checklist
summary
review questions
design scenario
chapter characterizing the existing internetwork
characterizing the network infrastructure
developing a network map
characterizing large internetworks
characterizing the logical architecture
developing a modular block diagram
characterizing network addressing and naming
characterizing wiring and media
checking architectural and environmental constraints
checking a site for a wireless installation
performing a wireless site survey
checking the health of the existing internetwork
developing a baseline of network performance
analyzing network availability
analyzing network utilization
measuring bandwidth utilization by protocol
analyzing network accuracy
analyzing errors on switched ethernet networks
analyzing network efficiency
analyzing delay and response time
checking the status of major routers, switches, and
firewalls
network health checklist
summary
review questions
hands-on project
design scenario
chapter characterizing network traffic
characterizing traffic flow
identifying major traffic sources and stores
documenting traffic flow on the existing network
characterizing types of traffic flow for new network
applications
terminal/host traffic flow
client/server traffic flow
peer-to-peer traffic flow
server/server traffic flow
distributed computing traffic flow
traffic flow in voice over ip networks
documenting traffic flow for new and existing network
applications
characterizing traffic load
calculating theoretical traffic load
documenting application-usage patterns
refining estimates of traffic load caused by applications
estimating traffic load caused by routing protocols
characterizing traffic behavior
broadcast/multicast behavior
network efficiency
frame size
windowing and flow control
error-recovery mechanisms
characterizing quality of service requirements
atm qos specifications
constant bit rate service category
real-time variable bit rate service category
non-real-time variable bit rate service category
unspecified bit rate service category
available bit rate service category
guaranteed frame rate service category
ietf integrated services working group qos specifications
controlled-load service
guaranteed service
ietf differentiated services working group qos
specifications
grade of service requirements for voice applications
documenting qos requirements
network traffic checklist
summary
review questions
design scenario
summary for part i
part ii logical network design
chapter designing a network topology
hierarchical network design
why use a hierarchical network design model?
flat versus hierarchical topologies
flat wan topologies
flat lan topologies
mesh versus hierarchical-mesh topologies
classic three-layer hierarchical model
core layer
distribution layer
access layer
guidelines for hierarchical network design
redundant network design topologies
backup paths
load sharing
modular network design
cisco safe security reference architecture
designing a campus network design topology
spanning tree protocol
spanning tree cost values
rapid spanning tree protocol
rstp convergence and reconvergence
selecting the root bridge
scaling the spanning tree protocol
virtual lans
fundamental vlan designs
wireless lans
positioning an access point for maximum coverage
wlans and vlans
redundant wireless access points
redundancy and load sharing in wired lans
server redundancy
workstation-to-router redundancy
hot standby router protocol
gateway load balancing protocol
designing the enterprise edge topology
redundant wan segments
circuit diversity
multihoming the internet connection
virtual private networking
site-to-site vpns
remote-access vpns
service provider edge
secure network design topologies
planning for physical security
meeting security goals with firewall topologies
summary
review questions
design scenario
chapter designing models for addressing and numbering
guidelines for assigning network layer addresses
using a structured model for network layer addressing
administering addresses by a central authority
distributing authority for addressing
using dynamic addressing for end systems
ip dynamic addressing
ip version dynamic addressing
zero configuration networking
using private addresses in an ip environment
caveats with private addressing
network address translation
using a hierarchical model for assigning addresses
why use a hierarchical model for addressing and routing?
hierarchical routing
classless interdomain routing
classless routing versus classful routing
route summarization (aggregation)
route summarization example
route summarization tips
discontiguous subnets
mobile hosts
variable-length subnet masking
hierarchy in ip version addresses
link-local addresses
global unicast addresses
ipv addresses with embedded ipv addresses
designing a model for naming
distributing authority for naming
guidelines for assigning names
assigning names in a netbios environment
assigning names in an ip environment
the domain name system
dynamic dns names
ipv name resolution
summary
review questions
design scenario
chapter selecting switching and routing protocols
making decisions as part of the top-down network design
process
selecting switching protocols
switching and the osi layers
transparent bridging
selecting spanning tree protocol enhancements
portfast
uplinkfast and backbonefast
unidirectional link detection
loopguard
protocols for transporting vlan information
ieee .q
dynamic trunk protocol
vlan trunking protocol
selecting routing protocols
characterizing routing protocols
distance-vector routing protocols
link-state routing protocols
routing protocol metrics
hierarchical versus nonhierarchical routing protocols
interior versus exterior routing protocols
classful versus classless routing protocols
dynamic versus static and default routing
on-demand routing
scalability constraints for routing protocols
routing protocol convergence
ip routing
routing information protocol
enhanced interior gateway routing protocol
open shortest path first
intermediate system-to-intermediate system
border gateway protocol
using multiple routing protocols in an internetwork
routing protocols and the hierarchical design model
redistribution between routing protocols
integrated routing and bridging
a summary of routing protocols
summary
review questions
design scenario
chapter developing network security strategies
network security design
identifying network assets
analyzing security risks
analyzing security requirements and tradeoffs
developing a security plan
developing a security policy
components of a security policy
developing security procedures
maintaining security
security mechanisms
physical security
authentication
authorization
accounting (auditing)
data encryption
public/private key encryption
packet filters
firewalls
intrusion detection and prevention systems
modularizing security design
securing internet connections
securing public servers
securing e-commerce servers
securing remote-access and vpns
securing remote-access technologies
securing vpns
securing network services and network management
securing server farms
securing user services
securing wireless networks
authentication in wireless networks
data privacy in wireless networks
summary
review questions
design scenario
chapter developing network management strategies
network management design
proactive network management
network management processes
fault management
configuration management
accounting management
performance management
security management
network management architectures
in-band versus out-of-band monitoring
centralized versus distributed monitoring
selecting network management tools and protocols
selecting tools for network management
simple network management protocol
management information bases (mib)
remote monitoring (rmon)
cisco discovery protocol
cisco netflow accounting
estimating network traffic caused by network management
summary
review questions
design scenario
summary for part ii
part iii physical network design
chapter selecting technologies and devices for campus
networks
lan cabling plant design
cabling topologies
building-cabling topologies
campus-cabling topologies
types of cables
lan technologies
ethernet basics
ethernet and ieee .
ethernet technology choices
half-duplex and full-duplex ethernet
-mbps ethernet
gigabit ethernet
-gbps ethernet
selecting internetworking devices for a campus network
design
criteria for selecting campus internetworking devices
optimization features on campus internetworking devices
example of a campus network design
background information for the campus network design project
business goals
technical goals
network applications
user communities
data stores (servers)
current network at wvcc
traffic characteristics of network applications
summary of traffic flows
performance characteristics of the current network
network redesign for wvcc
optimized ip addressing and routing for the campus backbone
wireless network
improved performance and security for the edge of the
network
summary
review questions
design scenario
chapter selecting technologies and devices for enterprise
networks
remote-access technologies
ppp
multilink ppp and multichassis multilink ppp
password authentication protocol and challenge handshake
authentication protocol
cable modem remote access
challenges associated with cable modem systems
digital subscriber line remote access
other dsl implementations
ppp and adsl
selecting remote-access devices for an enterprise
network design
selecting devices for remote users
selecting devices for the central site
wan technologies
systems for provisioning wan bandwidth
leased lines
synchronous optical network
frame relay
frame relay hub-and-spoke topologies and subinterfaces
frame relay congestion control mechanisms
frame relay traffic control
frame relay/atm interworking
atm
ethernet over atm
metro ethernet
selecting routers for an enterprise wan design
selecting a wan service provider
example of a wan design
background information for the wan design project
business and technical goals
network applications
user communities
data stores (servers)
current network
traffic characteristics of the existing wan
wan design for klamath paper products
summary
review questions
design scenario
summary for part iii
part iv testing, optimizing, and documenting your network
design
chapter testing your network design
using industry tests
building and testing a prototype network system
determining the scope of a prototype system
testing a prototype on a production network
writing and implementing a test plan for your network design
developing test objectives and acceptance criteria
determining the types of tests to run
documenting network equipment and other resources
writing test scripts
documenting the project timeline
implementing the test plan
tools for testing a network design
types of tools
examples of network testing tools
ciscoworks internetwork performance monitor
wandl network planning and analysis tools
opnet technologies
ixia tools
netiq voice and video management solution
netpredict’s netpredictor
summary
review questions
design scenario
chapter optimizing your network design
optimizing bandwidth usage with ip multicast technologies
ip multicast addressing
internet group management protocol
multicast routing protocols
distance vector multicast routing protocol
protocol independent multicast
reducing serialization delay
link-layer fragmentation and interleaving
compressed real-time transport protocol
optimizing network performance to meet quality of service
requirements
ip precedence and type of service
ip differentiated services field
resource reservation protocol
common open policy service protocol
classifying lan traffic
cisco ios features for optimizing network performance
switching techniques
classic methods for layer packet switching
netflow switching
cisco express forwarding
queuing services
first-in, first-out queuing
priority queuing
custom queuing
weighted fair queuing
class-based weighted fair queuing
low-latency queuing
random early detection
weighted random early detection
traffic shaping
committed access rate
summary
review questions
design scenario
chapter documenting your network design
responding to a customer’s request for proposal
contents of a network design document
executive summary
project goal
project scope
design requirements
business goals
technical goals
user communities and data stores
network applications
current state of the network
logical design
physical design
results of network design testing
implementation plan
project schedule
project budget
return on investment
design document appendix
summary
review questions
design scenario
glossary
index
章節(jié)摘錄
版權(quán)頁(yè):插圖:One advantage of private network numbers is security.Private network numbers are notadvertised to the Internet.Private network numbers musf not be advertised to theInternet because they are not globally unique.By not advertising private internal networknumbers,a modicum of security iS achieved.Additional security,including firewalls andintrusion detection systems,should also be deployed,as discussed in Chapter 5,“Designing a Network Topology,”and Chapter 8.Developing Network SecurityStrategies.Private addressing also helps meet goals for adaptability and flexibility.Using privateaddressing makes it easier to change ISPs in the future.If private addressing has beenused,when moving to a new ISP,the only address changes required are in the router orfirewall providing NAT services and in any public servers.You should recommend privateaddressing to customers who want the flexibility of easily switching to a different ISP inthe future.Another advantage of private network numbers iS that an enterprise network can advet-tise iust one network number,or a small block of network numbers,to the Internet.It iSgood practice to avoid advertising many network numbers to the Internet.One of thegoals of modern Internet practices iS that Internet routers should not need to managehuge routing tables.As an enterprise network grows,the network manager can assign pri-vate addresses to new networks,rather than requesting additional public network num。bers from an ISP or RIR.This avoids increasing the size of Internet routing tables.Private network numbers let a network designer reserve scarce Internet addresses forpublic servers.During the mid一1990s,as the Internet became commercialized and popu-larized,a scare rippled through the Internet community about the shortage of addresses.Dire predictions were made that no more addresses would be available by the turn of thecentury.Because of this scare,many companies(and many ISPs)were given a small set ofaddresses that needed to be carefully managed to avoid depletion.These companies rec.ognize the value of orivate addresses for internal networks.
編輯推薦
《自頂向下網(wǎng)絡(luò)設(shè)計(jì)(英文版)(第3版)》:學(xué)習(xí)網(wǎng)絡(luò)設(shè)計(jì)流程。確保網(wǎng)絡(luò)運(yùn)作良好而且具有安全性,同時(shí)還可以進(jìn)行擴(kuò)展.以滿足帶寬的增長(zhǎng)需求:制定網(wǎng)絡(luò)設(shè)計(jì).來(lái)為實(shí)時(shí)應(yīng)用(比如多媒體、遠(yuǎn)程教學(xué)、視頻會(huì)議、Teleprescene、虛擬通信和IP電話通訊)提供高帶寬和低延遲:掌握用于檢查現(xiàn)有網(wǎng)絡(luò)健康狀況的技術(shù).并定制基線來(lái)測(cè)量新網(wǎng)絡(luò)設(shè)計(jì)的性能;制定滿足QOS需求的解決方案,其中包括IETF控制的負(fù)載和保障服務(wù)、IP組播、高級(jí)交換、隊(duì)列和路由算法;識(shí)別各種交換和路由協(xié)議的優(yōu)勢(shì)和劣勢(shì)。其中包括RSTP、IEEE 802.1Q、EIGRP、OSPF和BGP4?!蹲皂斚蛳戮W(wǎng)絡(luò)設(shè)計(jì)(英文版)(第3版)》是網(wǎng)絡(luò)技術(shù)系列叢書(shū)之一。該系列叢書(shū)可以為網(wǎng)絡(luò)從業(yè)人員提供搭建高效網(wǎng)絡(luò)、學(xué)習(xí)最新技術(shù)、打造輝煌職業(yè)生涯所需要的寶貴信息。《自頂向下網(wǎng)絡(luò)設(shè)計(jì)(英文版)(第3版)》新增并擴(kuò)展了無(wú)線網(wǎng)絡(luò)、VPN、網(wǎng)絡(luò)安全、網(wǎng)絡(luò)冗余性、模塊化網(wǎng)絡(luò)設(shè)計(jì)、JPv4和JPv6的動(dòng)態(tài)尋址、以太網(wǎng)可擴(kuò)展性選項(xiàng)包括10Gbit/S以太網(wǎng)、城域以太網(wǎng)和長(zhǎng)距離以太網(wǎng)),以及承載語(yǔ)音/數(shù)據(jù)流量的網(wǎng)絡(luò)等相關(guān)內(nèi)容。除此之外。讀者還將學(xué)到如何設(shè)計(jì)出符合CISCOSAFE安全參考架構(gòu)的網(wǎng)絡(luò),使其能夠支持實(shí)時(shí)視頻、協(xié)同計(jì)算和社交網(wǎng)絡(luò)工具。Priscilla Oppenheimer自從1 980年在密歇根大學(xué)獲得信息科學(xué)碩士學(xué)位后,就投身于數(shù)據(jù)通信和網(wǎng)絡(luò)系統(tǒng)的開(kāi)發(fā)。在以軟件開(kāi)發(fā)人員身份工作數(shù)年之后,她成為技術(shù)指導(dǎo)講師和培訓(xùn)開(kāi)發(fā)師,并教授過(guò)3000余名來(lái)自世界500強(qiáng)企業(yè)的網(wǎng)絡(luò)工程師。她曾先后供職于蘋(píng)果公司、Network General和思科公司,這些工作經(jīng)歷使她有機(jī)會(huì)開(kāi)發(fā)一套實(shí)用的方法來(lái)進(jìn)行企業(yè)網(wǎng)絡(luò)設(shè)計(jì)。Priscilia在世界各地講授網(wǎng)絡(luò)設(shè)計(jì)、配置和排錯(cuò)課程,這使得她可以去實(shí)踐她在網(wǎng)絡(luò)咨詢(xún)業(yè)務(wù)中的觀點(diǎn)。
圖書(shū)封面
圖書(shū)標(biāo)簽Tags
無(wú)
評(píng)論、評(píng)分、閱讀與下載
自頂向下網(wǎng)絡(luò)設(shè)計(jì) PDF格式下載
250萬(wàn)本中文圖書(shū)簡(jiǎn)介、評(píng)論、評(píng)分,PDF格式免費(fèi)下載。 第一圖書(shū)網(wǎng) 手機(jī)版