自頂向下網(wǎng)絡(luò)設(shè)計(jì)

出版時(shí)間:2011-11  出版社:人民郵電出版社  作者:奧本海默  頁數(shù):447  
Tag標(biāo)簽:無  

內(nèi)容概要

  本書是圍繞自頂向下網(wǎng)絡(luò)設(shè)計(jì)步驟編寫的,提供給網(wǎng)絡(luò)設(shè)計(jì)者一種系統(tǒng)的結(jié)構(gòu)化網(wǎng)絡(luò)設(shè)計(jì)方法。
  本書分為4個(gè)部分,即客戶需求和目標(biāo)、邏輯網(wǎng)絡(luò)設(shè)計(jì)、物理網(wǎng)絡(luò)設(shè)計(jì),以及網(wǎng)絡(luò)測試、優(yōu)化和文檔編寫。4個(gè)部分分別對(duì)應(yīng)著網(wǎng)絡(luò)
設(shè)計(jì)的各個(gè)重要階段,每個(gè)階段都提供給讀者詳細(xì)的設(shè)計(jì)指導(dǎo)原則,內(nèi)容涵蓋網(wǎng)絡(luò)設(shè)計(jì)的方方面面。本書從用戶商業(yè)和技術(shù)目標(biāo)的分析入手,從而制定出相應(yīng)的網(wǎng)絡(luò)流量、負(fù)載和qos需求,進(jìn)而開發(fā)網(wǎng)絡(luò)的邏輯拓?fù)浣Y(jié)構(gòu),然后進(jìn)入地址規(guī)劃、協(xié)議選擇、網(wǎng)絡(luò)安全和網(wǎng)絡(luò)管理實(shí)施策略制定,最后是對(duì)網(wǎng)絡(luò)設(shè)備的選型建議以及網(wǎng)絡(luò)實(shí)施、測試和文檔編寫。本書每章以復(fù)習(xí)題和設(shè)計(jì)環(huán)境作為一章的總結(jié)和回顧,理論與實(shí)踐相結(jié)合,從而讓讀者更好地理解和掌握自頂向下網(wǎng)絡(luò)設(shè)計(jì)的思想。
  本書適合cisco代理商、網(wǎng)絡(luò)運(yùn)營商、其他網(wǎng)絡(luò)設(shè)備商的網(wǎng)絡(luò)部署人員、售后技術(shù)支持人員閱讀;網(wǎng)絡(luò)維護(hù)人員,以及網(wǎng)絡(luò)技術(shù)愛好者也可以從本書中獲益。

作者簡介

作者:(美國)奧本海默(Priscilla Oppenheimer)

書籍目錄

introduction xxii
part i identifying your customer's needs and goals 
chapter  analyzing business goals and constraints 
using a top-down network design methodology 
using a structured network design process 
systems development life cycles 
plan design implement operate optimize (pdioo) network life
cycle 
analyzing business goals 
working with your client 
changes in enterprise networks 
networks must make business sense 
networks offer a service 
the need to support mobile users 
the importance of network security and resiliency 
typical network design business goals 
identifying the scope of a network design project 
identifying a customer's network applications 
analyzing business constraints 
politics and policies 
.budgetary and staffing constraints 
project scheduling 
business goals checklist 
summary 
review questions 
design scenario 
chapter  analyzing technical goals and tradeoffs 
scalability 
planning for expansion 
expanding access to data 
constraints on scalability 
availability 
disaster recovery 
specifying availability requirements 
five nines availability 
the cost of downtime 
mean time between failure and mean time to repair 
network performance 
network performance definitions 
optimum network utilization 
throughput 
throughput of internetworking devices 
application layer throughput 
accuracy 
efficiency 
delay and delay variation 
causes of delay 
delay variation 
response time 
security 
identifying network assets 
analyzing security risks 
reconnaissance attacks 
denial-of-service attacks 
developing security requirements 
manageability 
usability 
adaptability 
affordability 
making network design tradeoffs 
technical goals checklist 
summary 
review questions 
design scenario 
chapter  characterizing the existing internetwork 
characterizing the network infrastructure 
developing a network map 
characterizing large internetworks 
characterizing the logical architecture 
developing a modular block diagram 
characterizing network addressing and naming 
characterizing wiring and media 
checking architectural and environmental constraints 
checking a site for a wireless installation 
performing a wireless site survey 
checking the health of the existing internetwork 
developing a baseline of network performance 
analyzing network availability 
analyzing network utilization 
measuring bandwidth utilization by protocol 
analyzing network accuracy 
analyzing errors on switched ethernet networks 
analyzing network efficiency 
analyzing delay and response time 
checking the status of major routers, switches, and
firewalls 
network health checklist 
summary 
review questions 
hands-on project 
design scenario 
chapter  characterizing network traffic 
characterizing traffic flow 
identifying major traffic sources and stores 
documenting traffic flow on the existing network 
characterizing types of traffic flow for new network
applications 
terminal/host traffic flow 
client/server traffic flow 
peer-to-peer traffic flow 
server/server traffic flow 
distributed computing traffic flow 
traffic flow in voice over ip networks 
documenting traffic flow for new and existing network
applications 
characterizing traffic load 
calculating theoretical traffic load 
documenting application-usage patterns 
refining estimates of traffic load caused by applications 
estimating traffic load caused by routing protocols 
characterizing traffic behavior 
broadcast/multicast behavior 
network efficiency 
frame size 
windowing and flow control 
error-recovery mechanisms 
characterizing quality of service requirements 
atm qos specifications 
constant bit rate service category 
real-time variable bit rate service category 
non-real-time variable bit rate service category 
unspecified bit rate service category 
available bit rate service category 
guaranteed frame rate service category 
ietf integrated services working group qos specifications 
controlled-load service 
guaranteed service 
ietf differentiated services working group qos
specifications 
grade of service requirements for voice applications 
documenting qos requirements 
network traffic checklist 
summary 
review questions 
design scenario 
summary for part i 
part ii logical network design 
chapter  designing a network topology 
hierarchical network design 
why use a hierarchical network design model? 
flat versus hierarchical topologies 
flat wan topologies 
flat lan topologies 
mesh versus hierarchical-mesh topologies 
classic three-layer hierarchical model 
core layer 
distribution layer 
access layer 
guidelines for hierarchical network design 
redundant network design topologies 
backup paths 
load sharing 
modular network design 
cisco safe security reference architecture 
designing a campus network design topology 
spanning tree protocol 
spanning tree cost values 
rapid spanning tree protocol 
rstp convergence and reconvergence 
selecting the root bridge 
scaling the spanning tree protocol 
virtual lans 
fundamental vlan designs 
wireless lans 
positioning an access point for maximum coverage 
wlans and vlans 
redundant wireless access points 
redundancy and load sharing in wired lans 
server redundancy 
workstation-to-router redundancy 
hot standby router protocol 
gateway load balancing protocol 
designing the enterprise edge topology 
redundant wan segments 
circuit diversity 
multihoming the internet connection 
virtual private networking 
site-to-site vpns 
remote-access vpns 
service provider edge 
secure network design topologies 
planning for physical security 
meeting security goals with firewall topologies 
summary 
review questions 
design scenario 
chapter  designing models for addressing and numbering 
guidelines for assigning network layer addresses 
using a structured model for network layer addressing 
administering addresses by a central authority 
distributing authority for addressing 
using dynamic addressing for end systems 
ip dynamic addressing 
ip version dynamic addressing 
zero configuration networking 
using private addresses in an ip environment 
caveats with private addressing 
network address translation 
using a hierarchical model for assigning addresses 
why use a hierarchical model for addressing and routing? 
hierarchical routing 
classless interdomain routing 
classless routing versus classful routing 
route summarization (aggregation) 
route summarization example 
route summarization tips 
discontiguous subnets 
mobile hosts 
variable-length subnet masking 
hierarchy in ip version addresses 
link-local addresses 
global unicast addresses 
ipv addresses with embedded ipv addresses 
designing a model for naming 
distributing authority for naming 
guidelines for assigning names 
assigning names in a netbios environment 
assigning names in an ip environment 
the domain name system 
dynamic dns names 
ipv name resolution 
summary 
review questions 
design scenario 
chapter  selecting switching and routing protocols 
making decisions as part of the top-down network design
process 
selecting switching protocols 
switching and the osi layers 
transparent bridging 
selecting spanning tree protocol enhancements 
portfast 
uplinkfast and backbonefast 
unidirectional link detection 
loopguard 
protocols for transporting vlan information 
ieee .q 
dynamic trunk protocol 
vlan trunking protocol 
selecting routing protocols 
characterizing routing protocols 
distance-vector routing protocols 
link-state routing protocols 
routing protocol metrics 
hierarchical versus nonhierarchical routing protocols 
interior versus exterior routing protocols 
classful versus classless routing protocols 
dynamic versus static and default routing 
on-demand routing 
scalability constraints for routing protocols 
routing protocol convergence 
ip routing 
routing information protocol 
enhanced interior gateway routing protocol 
open shortest path first 
intermediate system-to-intermediate system 
border gateway protocol 
using multiple routing protocols in an internetwork 
routing protocols and the hierarchical design model 
redistribution between routing protocols 
integrated routing and bridging 
a summary of routing protocols 
summary 
review questions 
design scenario 
chapter  developing network security strategies 
network security design 
identifying network assets 
analyzing security risks 
analyzing security requirements and tradeoffs 
developing a security plan 
developing a security policy 
components of a security policy 
developing security procedures 
maintaining security 
security mechanisms 
physical security 
authentication 
authorization 
accounting (auditing) 
data encryption 
public/private key encryption 
packet filters 
firewalls 
intrusion detection and prevention systems 
modularizing security design 
securing internet connections 
securing public servers 
securing e-commerce servers 
securing remote-access and vpns 
securing remote-access technologies 
securing vpns 
securing network services and network management 
securing server farms 
securing user services 
securing wireless networks 
authentication in wireless networks 
data privacy in wireless networks 
summary 
review questions 
design scenario 
chapter  developing network management strategies 
network management design 
proactive network management 
network management processes 
fault management 
configuration management 
accounting management 
performance management 
security management 
network management architectures 
in-band versus out-of-band monitoring 
centralized versus distributed monitoring 
selecting network management tools and protocols 
selecting tools for network management 
simple network management protocol 
management information bases (mib) 
remote monitoring (rmon) 
cisco discovery protocol 
cisco netflow accounting 
estimating network traffic caused by network management 
summary 
review questions 
design scenario 
summary for part ii 
part iii physical network design 
chapter  selecting technologies and devices for campus
networks 
lan cabling plant design 
cabling topologies 
building-cabling topologies 
campus-cabling topologies 
types of cables 
lan technologies 
ethernet basics 
ethernet and ieee . 
ethernet technology choices 
half-duplex and full-duplex ethernet 
-mbps ethernet 
gigabit ethernet 
-gbps ethernet 
selecting internetworking devices for a campus network
design 
criteria for selecting campus internetworking devices 
optimization features on campus internetworking devices 
example of a campus network design 
background information for the campus network design project 
business goals 
technical goals 
network applications 
user communities 
data stores (servers) 
current network at wvcc 
traffic characteristics of network applications 
summary of traffic flows 
performance characteristics of the current network 
network redesign for wvcc 
optimized ip addressing and routing for the campus backbone 
wireless network 
improved performance and security for the edge of the
network 
summary 
review questions 
design scenario 
chapter  selecting technologies and devices for enterprise
networks 
remote-access technologies 
ppp 
multilink ppp and multichassis multilink ppp 
password authentication protocol and challenge handshake
authentication protocol 
cable modem remote access 
challenges associated with cable modem systems 
digital subscriber line remote access 
other dsl implementations 
ppp and adsl 
selecting remote-access devices for an enterprise
network design 
selecting devices for remote users 
selecting devices for the central site 
wan technologies 
systems for provisioning wan bandwidth 
leased lines 
synchronous optical network 
frame relay 
frame relay hub-and-spoke topologies and subinterfaces 
frame relay congestion control mechanisms 
frame relay traffic control 
frame relay/atm interworking 
atm 
ethernet over atm 
metro ethernet 
selecting routers for an enterprise wan design 
selecting a wan service provider 
example of a wan design 
background information for the wan design project 
business and technical goals 
network applications 
user communities 
data stores (servers) 
current network 
traffic characteristics of the existing wan 
wan design for klamath paper products 
summary 
review questions 
design scenario 
summary for part iii 
part iv testing, optimizing, and documenting your network
design 
chapter  testing your network design 
using industry tests 
building and testing a prototype network system 
determining the scope of a prototype system 
testing a prototype on a production network 
writing and implementing a test plan for your network design 
developing test objectives and acceptance criteria 
determining the types of tests to run 
documenting network equipment and other resources 
writing test scripts 
documenting the project timeline 
implementing the test plan 
tools for testing a network design 
types of tools 
examples of network testing tools 
ciscoworks internetwork performance monitor 
wandl network planning and analysis tools 
opnet technologies 
ixia tools 
netiq voice and video management solution 
netpredict’s netpredictor 
summary 
review questions 
design scenario 
chapter  optimizing your network design 
optimizing bandwidth usage with ip multicast technologies 
ip multicast addressing 
internet group management protocol 
multicast routing protocols 
distance vector multicast routing protocol 
protocol independent multicast 
reducing serialization delay 
link-layer fragmentation and interleaving 
compressed real-time transport protocol 
optimizing network performance to meet quality of service
requirements 
ip precedence and type of service 
ip differentiated services field 
resource reservation protocol 
common open policy service protocol 
classifying lan traffic 
cisco ios features for optimizing network performance 
switching techniques 
classic methods for layer packet switching 
netflow switching 
cisco express forwarding 
queuing services 
first-in, first-out queuing 
priority queuing 
custom queuing 
weighted fair queuing 
class-based weighted fair queuing 
low-latency queuing 
random early detection 
weighted random early detection 
traffic shaping 
committed access rate 
summary 
review questions 
design scenario 
chapter  documenting your network design 
responding to a customer’s request for proposal 
contents of a network design document 
executive summary 
project goal 
project scope 
design requirements 
business goals 
technical goals 
user communities and data stores 
network applications 
current state of the network 
logical design 
physical design 
results of network design testing 
implementation plan 
project schedule 
project budget 
return on investment 
design document appendix 
summary 
review questions 
design scenario 
glossary 
index

章節(jié)摘錄

版權(quán)頁:插圖:One advantage of private network numbers is security.Private network numbers are notadvertised to the Internet.Private network numbers musf not be advertised to theInternet because they are not globally unique.By not advertising private internal networknumbers,a modicum of security iS achieved.Additional security,including firewalls andintrusion detection systems,should also be deployed,as discussed in Chapter 5,“Designing a Network Topology,”and Chapter 8.Developing Network SecurityStrategies.Private addressing also helps meet goals for adaptability and flexibility.Using privateaddressing makes it easier to change ISPs in the future.If private addressing has beenused,when moving to a new ISP,the only address changes required are in the router orfirewall providing NAT services and in any public servers.You should recommend privateaddressing to customers who want the flexibility of easily switching to a different ISP inthe future.Another advantage of private network numbers iS that an enterprise network can advet-tise iust one network number,or a small block of network numbers,to the Internet.It iSgood practice to avoid advertising many network numbers to the Internet.One of thegoals of modern Internet practices iS that Internet routers should not need to managehuge routing tables.As an enterprise network grows,the network manager can assign pri-vate addresses to new networks,rather than requesting additional public network num。bers from an ISP or RIR.This avoids increasing the size of Internet routing tables.Private network numbers let a network designer reserve scarce Internet addresses forpublic servers.During the mid一1990s,as the Internet became commercialized and popu-larized,a scare rippled through the Internet community about the shortage of addresses.Dire predictions were made that no more addresses would be available by the turn of thecentury.Because of this scare,many companies(and many ISPs)were given a small set ofaddresses that needed to be carefully managed to avoid depletion.These companies rec.ognize the value of orivate addresses for internal networks.

編輯推薦

《自頂向下網(wǎng)絡(luò)設(shè)計(jì)(英文版)(第3版)》:學(xué)習(xí)網(wǎng)絡(luò)設(shè)計(jì)流程。確保網(wǎng)絡(luò)運(yùn)作良好而且具有安全性,同時(shí)還可以進(jìn)行擴(kuò)展.以滿足帶寬的增長需求:制定網(wǎng)絡(luò)設(shè)計(jì).來為實(shí)時(shí)應(yīng)用(比如多媒體、遠(yuǎn)程教學(xué)、視頻會(huì)議、Teleprescene、虛擬通信和IP電話通訊)提供高帶寬和低延遲:掌握用于檢查現(xiàn)有網(wǎng)絡(luò)健康狀況的技術(shù).并定制基線來測量新網(wǎng)絡(luò)設(shè)計(jì)的性能;制定滿足QOS需求的解決方案,其中包括IETF控制的負(fù)載和保障服務(wù)、IP組播、高級(jí)交換、隊(duì)列和路由算法;識(shí)別各種交換和路由協(xié)議的優(yōu)勢(shì)和劣勢(shì)。其中包括RSTP、IEEE 802.1Q、EIGRP、OSPF和BGP4?!蹲皂斚蛳戮W(wǎng)絡(luò)設(shè)計(jì)(英文版)(第3版)》是網(wǎng)絡(luò)技術(shù)系列叢書之一。該系列叢書可以為網(wǎng)絡(luò)從業(yè)人員提供搭建高效網(wǎng)絡(luò)、學(xué)習(xí)最新技術(shù)、打造輝煌職業(yè)生涯所需要的寶貴信息。《自頂向下網(wǎng)絡(luò)設(shè)計(jì)(英文版)(第3版)》新增并擴(kuò)展了無線網(wǎng)絡(luò)、VPN、網(wǎng)絡(luò)安全、網(wǎng)絡(luò)冗余性、模塊化網(wǎng)絡(luò)設(shè)計(jì)、JPv4和JPv6的動(dòng)態(tài)尋址、以太網(wǎng)可擴(kuò)展性選項(xiàng)包括10Gbit/S以太網(wǎng)、城域以太網(wǎng)和長距離以太網(wǎng)),以及承載語音/數(shù)據(jù)流量的網(wǎng)絡(luò)等相關(guān)內(nèi)容。除此之外。讀者還將學(xué)到如何設(shè)計(jì)出符合CISCOSAFE安全參考架構(gòu)的網(wǎng)絡(luò),使其能夠支持實(shí)時(shí)視頻、協(xié)同計(jì)算和社交網(wǎng)絡(luò)工具。Priscilla Oppenheimer自從1 980年在密歇根大學(xué)獲得信息科學(xué)碩士學(xué)位后,就投身于數(shù)據(jù)通信和網(wǎng)絡(luò)系統(tǒng)的開發(fā)。在以軟件開發(fā)人員身份工作數(shù)年之后,她成為技術(shù)指導(dǎo)講師和培訓(xùn)開發(fā)師,并教授過3000余名來自世界500強(qiáng)企業(yè)的網(wǎng)絡(luò)工程師。她曾先后供職于蘋果公司、Network General和思科公司,這些工作經(jīng)歷使她有機(jī)會(huì)開發(fā)一套實(shí)用的方法來進(jìn)行企業(yè)網(wǎng)絡(luò)設(shè)計(jì)。Priscilia在世界各地講授網(wǎng)絡(luò)設(shè)計(jì)、配置和排錯(cuò)課程,這使得她可以去實(shí)踐她在網(wǎng)絡(luò)咨詢業(yè)務(wù)中的觀點(diǎn)。

圖書封面

圖書標(biāo)簽Tags

評(píng)論、評(píng)分、閱讀與下載


    自頂向下網(wǎng)絡(luò)設(shè)計(jì) PDF格式下載


用戶評(píng)論 (總計(jì)2條)

 
 

  •   送來的書封面像舊書的
  •   針對(duì)傳統(tǒng)網(wǎng)絡(luò)設(shè)計(jì),是部不錯(cuò)的書。
 

250萬本中文圖書簡介、評(píng)論、評(píng)分,PDF格式免費(fèi)下載。 第一圖書網(wǎng) 手機(jī)版

京ICP備13047387號(hào)-7