Introduction |
|
xviii | |
|
Part I Designing Networks |
|
|
2 | (24) |
|
|
4 | (22) |
|
|
5 | (2) |
|
|
7 | (7) |
|
|
9 | (2) |
|
Analyzing the Existing Network |
|
|
11 | (1) |
|
Preparing the Preliminary Design |
|
|
12 | (1) |
|
Completing the Final Design Development |
|
|
12 | (1) |
|
|
12 | (1) |
|
Monitoring and Redesigning |
|
|
13 | (1) |
|
Maintaining Design Documentation |
|
|
13 | (1) |
|
|
14 | (10) |
|
|
14 | (1) |
|
Hierarchical Network Design |
|
|
15 | (2) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
Limitations of the Hierarchical Model |
|
|
18 | (1) |
|
The Cisco Enterprise Composite Network Model |
|
|
18 | (2) |
|
Enterprise Campus Functional Area |
|
|
20 | (3) |
|
Enterprise Edge Functional Area |
|
|
23 | (1) |
|
Service Provider Edge Functional Area |
|
|
24 | (1) |
|
|
24 | (2) |
|
Part II Technologies: What You Need to Know and Why You Need to Know It |
|
|
26 | (224) |
|
|
28 | (30) |
|
|
29 | (1) |
|
|
30 | (4) |
|
|
30 | (3) |
|
|
33 | (1) |
|
|
34 | (6) |
|
Redundancy in Layer 2 Switched Networks |
|
|
35 | (1) |
|
STP Terminology and Operation |
|
|
36 | (1) |
|
|
36 | (4) |
|
|
40 | (1) |
|
|
40 | (1) |
|
|
40 | (7) |
|
|
42 | (1) |
|
|
42 | (2) |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
46 | (1) |
|
Multilayer Switching and Cisco Express Forwarding |
|
|
47 | (3) |
|
|
47 | (2) |
|
|
49 | (1) |
|
|
50 | (3) |
|
|
51 | (2) |
|
Catalyst Hardware Security |
|
|
53 | (1) |
|
Switching Design Considerations |
|
|
53 | (2) |
|
|
55 | (3) |
|
|
58 | (42) |
|
|
59 | (1) |
|
|
60 | (14) |
|
Determining How Many IP Addresses Are Required |
|
|
61 | (1) |
|
Using Private and Public Addresses and NAT |
|
|
61 | (2) |
|
How Routers Use Subnet Masks |
|
|
63 | (1) |
|
Determining the Subnet Mask to Use |
|
|
64 | (3) |
|
Hierarchical IP Address Design and Summarization |
|
|
67 | (3) |
|
Variable-Length Subnet Masks |
|
|
70 | (4) |
|
|
74 | (20) |
|
Classifying Routing Protocols |
|
|
75 | (1) |
|
Interior and Exterior Routing Protocols |
|
|
75 | (1) |
|
Distance Vector, Link-State, and Hybrid Routing Protocols |
|
|
75 | (2) |
|
Flat and Hierarchical Routing Protocols |
|
|
77 | (1) |
|
Classful and Classless Routing Protocols |
|
|
77 | (2) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
Routing Protocol Comparison |
|
|
82 | (1) |
|
Routing Information Protocol, Versions 1 and 2 |
|
|
83 | (1) |
|
Interior Gateway Routing Protocol |
|
|
84 | (2) |
|
Enhanced Interior Gateway Routing Protocol |
|
|
86 | (2) |
|
|
88 | (2) |
|
Integrated Intermediate System-to-Intermediate System |
|
|
90 | (3) |
|
Border Gateway Protocol Version 4 |
|
|
93 | (1) |
|
IPv4 Routing Protocol Selection |
|
|
94 | (4) |
|
Choosing Your Routing Protocol |
|
|
94 | (1) |
|
Redistribution, Filtering, and Administrative Distance |
|
|
95 | (3) |
|
|
98 | (2) |
|
|
100 | (30) |
|
|
101 | (2) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
104 | (2) |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
106 | (5) |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
Information Disclosure Attacks |
|
|
107 | (1) |
|
|
107 | (1) |
|
|
107 | (1) |
|
Denial of Service Attacks |
|
|
108 | (3) |
|
|
111 | (14) |
|
|
111 | (1) |
|
|
112 | (1) |
|
|
112 | (2) |
|
Intrusion Detection and Prevention |
|
|
114 | (3) |
|
|
117 | (1) |
|
|
117 | (2) |
|
|
119 | (2) |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
121 | (1) |
|
Authentication, Authorization, and Accounting |
|
|
121 | (1) |
|
Network Admission Control |
|
|
122 | (1) |
|
Public Key Infrastructure |
|
|
123 | (1) |
|
Network Security Best Practices |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
125 | (4) |
|
|
129 | (1) |
|
|
130 | (18) |
|
|
131 | (1) |
|
Wireless Technology Overview |
|
|
132 | (5) |
|
|
133 | (2) |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
137 | (4) |
|
|
138 | (1) |
|
Wireless Threat Mitigation |
|
|
138 | (1) |
|
|
138 | (2) |
|
Enhanced Wireless Security |
|
|
140 | (1) |
|
Wireless Intrusion Detection |
|
|
141 | (1) |
|
|
141 | (2) |
|
Wireless Design Considerations |
|
|
143 | (3) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
145 | (1) |
|
Design Considerations for Wireless IP Phones |
|
|
145 | (1) |
|
|
146 | (2) |
|
Quality of Service Design |
|
|
148 | (24) |
|
|
149 | (2) |
|
QoS Requirements for Voice, Data, Video, and Other Traffic |
|
|
151 | (2) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
154 | (14) |
|
Classification and Marking |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
156 | (5) |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
164 | (2) |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
168 | (2) |
|
|
170 | (2) |
|
|
172 | (24) |
|
|
174 | (3) |
|
|
175 | (1) |
|
Packetization and Call Processing |
|
|
176 | (1) |
|
Conversation and Control Traffic |
|
|
177 | (1) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
179 | (3) |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
182 | (1) |
|
Voice Coding and Compression Techniques |
|
|
182 | (3) |
|
|
182 | (2) |
|
|
184 | (1) |
|
Compressed Real-Time Transport Protocol |
|
|
184 | (1) |
|
|
185 | (3) |
|
|
185 | (1) |
|
Calculating Trunk Capacity or Bandwidth |
|
|
186 | (2) |
|
Signaling Traffic Bandwidth |
|
|
188 | (1) |
|
|
188 | (2) |
|
Single-Site IP Telephony Design |
|
|
189 | (1) |
|
Multisite Centralized IP Telephony Design |
|
|
189 | (1) |
|
Multisite Distributed IP Telephony Design |
|
|
190 | (1) |
|
|
190 | (3) |
|
IP Telephony Network Security Concerns |
|
|
191 | (1) |
|
|
191 | (1) |
|
Denial of Service Attacks |
|
|
191 | (1) |
|
|
191 | (1) |
|
Mitigating to Protect IP Telephony |
|
|
192 | (1) |
|
|
193 | (3) |
|
Content Networking Design |
|
|
196 | (18) |
|
|
197 | (1) |
|
|
198 | (1) |
|
Content Caches and Content Engines |
|
|
199 | (5) |
|
|
200 | (1) |
|
|
201 | (2) |
|
|
203 | (1) |
|
|
204 | (3) |
|
|
204 | (2) |
|
|
206 | (1) |
|
Content Distribution and Management |
|
|
207 | (1) |
|
|
208 | (1) |
|
Designing Content Networking |
|
|
209 | (3) |
|
|
209 | (1) |
|
Live Video and Video on Demand for a Corporation |
|
|
210 | (2) |
|
|
212 | (2) |
|
Network Management Design |
|
|
214 | (20) |
|
|
215 | (1) |
|
ISO Network Management Standard |
|
|
216 | (1) |
|
Network Management Protocols and Tools |
|
|
216 | (12) |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
218 | (2) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
221 | (1) |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
225 | (1) |
|
|
225 | (3) |
|
|
228 | (2) |
|
Network Management Strategy |
|
|
228 | (1) |
|
|
228 | (1) |
|
IP Service-Level Agreements |
|
|
229 | (1) |
|
Network Management Design |
|
|
230 | (2) |
|
|
232 | (2) |
|
Other Enabling Technologies |
|
|
234 | (16) |
|
|
235 | (4) |
|
Internet Group Management Protocol (IGMP) and Cisco Group Management Protocol (CGMP) |
|
|
236 | (1) |
|
Protocol Independent Multicast (PIM) Routing Protocol |
|
|
237 | (2) |
|
Increasing Network Availability |
|
|
239 | (3) |
|
|
242 | (2) |
|
|
244 | (3) |
|
|
247 | (3) |
|
Part III Designing Your Network: How to Apply What You Know |
|
|
250 | (42) |
|
Case Study Context: Venti Systems |
|
|
252 | (12) |
|
Background Information and Context |
|
|
253 | (4) |
|
Network Requirements After Acquisitions Are Complete |
|
|
257 | (6) |
|
|
263 | (1) |
|
Case Study Solution: Venti Systems |
|
|
264 | (28) |
|
|
265 | (8) |
|
|
267 | (1) |
|
|
267 | (1) |
|
Enterprise Edge and Service Provider Edge |
|
|
268 | (2) |
|
|
270 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
273 | (1) |
|
|
273 | (2) |
|
|
274 | (1) |
|
|
275 | (1) |
|
|
275 | (1) |
|
|
275 | (6) |
|
|
278 | (3) |
|
|
281 | (1) |
|
|
281 | (1) |
|
IP Addressing and Routing Protocol |
|
|
281 | (2) |
|
Head-Office IP Addressing and Routing Protocol |
|
|
281 | (1) |
|
Branch-Office IP Addressing and Routing Protocol |
|
|
282 | (1) |
|
Remote User IP Addressing and Routing Protocol |
|
|
283 | (1) |
|
|
283 | (1) |
|
|
283 | (1) |
|
|
284 | (1) |
|
|
284 | (1) |
|
|
284 | (4) |
|
Head-Office QoS and Voice |
|
|
284 | (4) |
|
Branch-Office QoS and Voice |
|
|
288 | (1) |
|
Remote User QoS and Voice |
|
|
288 | (1) |
|
|
288 | (1) |
|
|
288 | (1) |
|
|
288 | (1) |
|
|
288 | (1) |
|
|
289 | (2) |
|
Head-Office Network Management |
|
|
289 | (2) |
|
Branch-Office Network Management |
|
|
291 | (1) |
|
Remote User Network Management |
|
|
291 | (1) |
|
|
291 | (1) |
|
|
291 | (1) |
|
|
292 | (74) |
|
|
294 | (6) |
|
Appendix B Network Fundamentals |
|
|
300 | (40) |
|
Appendix C Decimal-Binary Conversion |
|
|
340 | (10) |
|
|
350 | (16) |
Index |
|
366 | |