Top-down network design / (Registro nro. 12841)

Detalles MARC
000 -Cabecera
Campo de control de longitud fija 18859nam a2200301 a 4500
003 - Identificador del Número de control
Identificador del número de control AR-sfUTN
008 - Códigos de información de longitud fija-Información general
Códigos de información de longitud fija 170717b ||||| |||| 00| 0 d
020 ## - ISBN
ISBN 1587051524
040 ## - Fuente de la catalogación
Centro transcriptor AR-sfUTN
041 ## - Código de lengua
Código de lengua del texto eng
080 ## - CDU
Clasificación Decimal Universal 004.7 OP5
Edición de la CDU 2000
100 1# - Punto de acceso principal-Nombre de persona
Nombre personal Oppenheimer, Priscilla
245 10 - Mención de título
Título Top-down network design /
Mención de responsabilidad Priscilla Oppenheimer.
250 ## - Mención de edición
Mención de edición 2nd.
260 ## - Publicación, distribución, etc. (pie de imprenta)
Lugar de publicación, distribución, etc. Indianápolis:
Nombre del editor, distribuidor, etc. Cisco,
Fecha de publicación, distribución, etc. 2004
300 ## - Descripción física
Extensión 566 p.
336 ## - Tipo de contenido
Fuente rdacontent
Término de tipo de contenido texto
Código de tipo de contenido txt
337 ## - Tipo de medio
Fuente rdamedia
Nombre del tipo de medio sin mediación
Código del tipo de medio n
338 ## - Tipo de soporte
Fuente rdacarrier
Nombre del tipo de soporte volumen
Código del tipo de soporte nc
505 80 - Nota de contenido con formato
Nota de contenido con formato CONTENIDO<br/>Part I. Identifying Your Customer´s Needs and Goals 3<br/>Chapter 1. Analyzing Business Goals and Constraints 5<br/>Using a Top-Down Network Design Methodology 5<br/>Using a Structured Network Design Process 7<br/>Systems Development Life Cycles 7<br/>The Plan Design Implement Operate Optimize (PDIOO) Network Life Cycle 9<br/>Analyzing Business Goals 10<br/>Working with Your Client la Changes in Enterprise Networks 12<br/>Networks Must Make Business Sense 13<br/>The Need to Support Mobile Users 14<br/>The Importance of Network Security and Resiliency 14<br/>Typical Network Design Business Goals 16<br/>Identifying the Scope of a Network Design Project 16<br/>Identifying a Customer's Network Applications 18<br/>Analyzing Business Constraints 21<br/>Politics and Policies 21<br/>Budgetary and Staffing Constraints 23<br/>Project Scheduling 24<br/>Business Goals Checklist 24<br/>Summary 25<br/>Chapter 2. Analyzing Technical Goals and Tradeoffs 27<br/>Scalability 27<br/>Planning for Expansion 27<br/>Expanding Access to Data 28<br/>Constraints on Scalability 29<br/>Availability 29<br/>Disaster Recovery 30<br/>Specifying Availability Requirements 31<br/>Five Nines Availability 32<br/>The Cost of Downtime 34<br/>Mean Time Between Failure and Mean Time to Repair 34<br/>Network Performance 35<br/>Network Performance Definitions 35<br/>Optimum Network Utilization 36<br/>Throughput 39<br/>Throughput of Internetworking Devices 39<br/>Application Layer Throughput 40<br/>Accuracy 42<br/>Efficiency 43<br/>Delay and Delay Variation 45<br/>Causes of Delay 46<br/>Delay Variation 48<br/>Response Time 48<br/>Security 49<br/>Identifying Network Assets 50<br/>Analyzing Security Risks 51<br/>Reconnaissance Attacks 52<br/>Denial-of-Service Attacks 53<br/>Developing Security Requirements 53<br/>Manageability 54<br/>Usability 55<br/>Adaptability 55<br/>Affordability 56<br/>Making Network Design Tradeoffs 57<br/>Technical Goals Checklist 59<br/>Summary 60<br/>Chapter 3. Characterizing the Existing Internetwork 63<br/>Characterizing the Network Infrastructure 63<br/>Developing a Network Map 64<br/>Tools for Developing Network Maps 64<br/>Characterizing Large Internetworks 64<br/>Characterizing the Logical Architecture 66<br/>Developing a Modular Block Diagram 67<br/>Characterizing Network Addressing and Naming 67<br/>Characterizing Wiring and Media 70<br/>Checking Architectural and Environmental Constraints 73<br/>Checking a Site for a Wireless Installation 74<br/>Doing a Wireless Site Survey 75<br/>Checking the Health of the Existing Internetwork 76<br/>Developing a Baseline of Network Performance 77<br/>Analyzing Network Availability 77<br/>Analyzing Network Utilization 78<br/>Measuring Bandwidth Utilization by Protocol 80<br/>Analyzing Network Accuracy 81<br/>Analyzing Errors on Switched Ethemet Networks 82<br/>Analyzing Network Efficiency 84<br/>Analyzing Delay and Response Time 86<br/>Checking the Status of Major Routers, Switches, and Firewalls 87<br/>Tools for Characterizing the Existing Internetwork 89<br/>Protocol Analyzers 89<br/>Network-Monitoring and Management Tools 89<br/>Remote Monitoring Tools 90<br/>Cisco Tools for Characterizing an Existing Internetwork 91<br/>Organizations That Provide Information on Characterizing an Existing Internetwork 92<br/>Network Health Checklist 92<br/>Summary 93<br/>Chapter 4. Characterizing Network Traffic 95<br/>Characterizing Traffic Flow 95<br/>Identifying Major Traffic Sources and Stores 95<br/>Documenting Traffic Flow on the Existing Network 97<br/>Characterizing Types of Traffic Flow for New Network Applications 98<br/>Terminal/Host Traffic Flow 99<br/>Client/Server Traffic Flow 99<br/>Thin Client Traffic Flow 100<br/>Peer-to-Peer Traffic Flow 101<br/>Server/Server Traffic Flow 102<br/>Distributed Computing Traffic Flow 102<br/>Traffic Flow in Voice over IP Networks 103<br/>Documenting Traffic Flow for New and Existing Network Applications 104<br/>Characterizing Traffic Load 105<br/>Calculating Theoretical Traffic Load 106<br/>Documenting Application-Usage Patterns 107<br/>Refining Estimates of Traffic Load Caused by Applications 108<br/>Estimating Traffic Overhead for Various Protocols 109<br/>Estimating Traffic Load Caused by Workstation and Session Initialization 109<br/>Estimating Traffic Load Caused by Routing Protocols 111<br/>Characterizing Traffic Behavior 111<br/>Broadeast/Multieast Behavior 112<br/>Network Efficiency 113<br/>Frame Size 113<br/>Protocol Interaction 114<br/>Windowing and Flow Control 116<br/>Error-Recovery Mechanisms 118<br/>Characterizing Quality of Service Requirements 119<br/>ATM Quality of Service Specifications 119<br/>Constant Bit Rate Service Category 120<br/>Realtime Variable Bit Rate Service Category 121<br/>Non-Realtime Variable Bit Rate Service Category 121<br/>Unspecified Bit Rate Service Category 121<br/>Available Bit Rate Service Category 121<br/>Guaranteed Frame Rate Service Category 122<br/>IETF Integrated Services Working Group Quality of Service Specifications 122<br/>Controlled-Load Service 123<br/>Guaranteed Service 124<br/>IETF Differentiated Services Working Group Quality of Service Specifications 125<br/>Grade of Service Requirements for Voice Applications 126<br/>Documenting QoS Requirements 127<br/>Network Traffic Checklist 128<br/>Summary 128<br/>Summary for Part I 128<br/>Part II. Logical Network Design 131<br/>Chapter 5. Designing a Network Topology 133<br/>Hierarchical Network Design 133<br/>Why Use a Hierarchical Network Design Model? 135<br/>Flat Versus Hierarchical Topologies 136<br/>Mesh Versus Hierarchical-Mesh Topologies 138<br/>The Classic Three-Layer Hierarchical Model 141<br/>The Core Layer 142<br/>The Distribution Layer 142<br/>The Access Layer 143<br/>Guidelines for Hierarchical Network Design 143<br/>Redundant Network Design Topologies 145<br/>Backup Paths 146<br/>Load Sharing 147<br/>Modular Network Design 148<br/>The Enterprise Composite Network Model 148<br/>Designing a Campus Network Design Topology 150<br/>The Spanning Tree Protocol 151<br/>STP Convergence 151<br/>Selecting the Root Bridge 153<br/>The STP Topology Change Process 154<br/>Scaling the Spanning Tree Protocol 155<br/>Rapid Reconfiguration of the Spanning Tree 155<br/>Virtual LANs 156<br/>Fundamental VLAN Designs 157<br/>Wireless LANs 160<br/>Positioning an Access Point for Maximum Coverage 160<br/>WLANs and VLANs 161<br/>Redundant Wireless Access Points 161<br/>Redundancy and Load Sharing in Wired LANs 162<br/>Server Redundancy 163<br/>Workstation-to-Router Redundancy 165<br/>AppleTalk Workstation-to-Router Communication 166<br/>Novell NetWare Workstation-to-Router Communication 167<br/>IP Workstation-to-Router Communication 167<br/>Designing the Enterprise Edge Topology 170<br/>Redundant WAN Segments 170<br/>Circuit Diversity 171<br/>Multihoming the Internet Connection 171<br/>Virtual Private Networking 175<br/>Site-to-Site VPNs 176<br/>Remote-Access VPNs 177<br/>The Service Provider Edge 178<br/>Secure Network Design Topologies 180<br/>Planning for Physical Security 180<br/>Meeting Security Goals with Firewall Topologies 180<br/>Summary 182<br/>Chapter 6. Designing Models for Addressing and Naming 185<br/>Guidelines for Assigning Network Layer Addresses 186<br/>Using a Structured Model for Network Layer Addressing 186<br/>Administering Addresses by a Central Authority 187<br/>Distributing Authority for Addressing 188<br/>Using Dynamic Addressing for End Systems 188<br/>AppleTalk Dynamic Addressing 189<br/>Novell NetWare Dynamic Addressing 190<br/>IP Dynamic Addressing 191<br/>Using Private Addresses in an IP Environment 195<br/>Caveats with Private Addressing 196<br/>Network Address Translation 197<br/>Using a Hierarchical Model for Assigning Addresses 197<br/>Why Use a Hierarchical Model for Addressing and Routing? 198<br/>Hierarchical Routing 198<br/>Classless Interdomain Routing 199<br/>Classless Routing Versus Classful Routing 199<br/>Route Summarization (Aggregation) 201<br/>Route Summarization Example 201<br/>Route Summarization Tips 202<br/>Discontiguous Subnets 203<br/>Mobile Hosts 204<br/>Variable-Length Subnet Masking 204<br/>Hierarchy in IP Version 6 Addresses 205<br/>IPv6 Address Types 206<br/>Strategies for Moving fram IPv4 to IPv6 209<br/>Designing a Model for Naming 209<br/>Distributing Authority for Naming 210<br/>Guidelines for Assigning Names 211<br/>Assigning Names in a NetBIOS Environment 212<br/>NetBIOS in a Bridged or Switched Environment (NetBEUI) 212<br/>NetBIOS in a Novell NetWare Environment (NWLink) 213<br/>NetBIOS in a TCP/IP Environment (NetBT) 213<br/>Assigning Names in an IP Environment 215<br/>The Domain Name System 215<br/>Summary 217<br/>Chapter 7. Selecting Switching and Routing Protocols 221<br/>Making Decisions as Part of the Top-Down Network Design Process 222<br/>Selecting Bridging and Switching Protocols 223<br/>Transparent Bridging 224<br/>Transparent Switching 225<br/>Switching and tue OSI Layers 225<br/>Multilayer Switching 226<br/>Selecting Spanning Tree Protocol Enhancements 227<br/>PortFast 227<br/>UplinkFast and BackboneFast 228<br/>Unidirectional Link Detection 230<br/>Loop Guard 230<br/>Protocols for Transporting VLAN Information 231<br/>Inter-Switch Link Protocol 231<br/>Dynamic Inter-Switch Link Protocol 231<br/>IEEE 802.1Q 232<br/>VLAN Trunk Protocol 233<br/>Selecting Routing Protocols 234<br/>Characterizing Routing Protocols 234<br/>Distance-Vector Versus Link-State Routing Protocols 235<br/>Routing Protocol Metrics 239<br/>Hierarchical Versus Nonhierarchical Routing Protocols 239<br/>Interior Versus Exterior Routing Protocols 239<br/>Classful Versus Classless Routing Protocols 23<br/>Dynamic Versus Static and Default Routing 240<br/>On-Demand Routing 241<br/>Scalability Constraints for Routing Protocols 241<br/>IP Routing 243<br/>Routing Information Protocol 243<br/>Interior Gateway Routing Protocol 244<br/>Enhanced Interior Gateway Routing Protocol 246<br/>Open Shortest Path First 247<br/>Intermediate System-to-Intermediate System 250<br/>Border Gateway Protocol 251<br/>AppleTalk Routing 252<br/>Routing Table Maintenance Protocol 252<br/>AppleTalk Update-Based Routing Protocol 253<br/>EIGRP for AppleTalk 254<br/>Migrating an AppleTalk Network to IP Routing 254<br/>Novell NetWare Routing 254<br/>Internetwork Packet Exchange Routing Information Protocol 255<br/>NetWare Link Services Protocol 255<br/>EIGRP for IPX 256<br/>Migrating a NetWare Network to IP Routing 256<br/>Using Multiple Routing Protocols in an Internetwork 257<br/>Routing Protocols and the Hierarchical Design Model 257<br/>Routing Protocols for the Core Layer 258<br/>Routing Protocols for the Distribution Layer 258<br/>Routing Protocols for the Access Layer 258<br/>Redistribution Between Routing Protocols 259<br/>Integrated Routing and Bridging 261<br/>A Summary of IP, AppleTalk, and IPX Routing Protocols 261<br/>Summary 264<br/>Chapter 8. Developing Network Security Strategies 267<br/>Network Security Design 267<br/>Identifying Network Assets and Risks 268<br/>Analyzing Security Tradeoffs 269<br/>Developing a Security Plan 269<br/>Developing a Security Policy 270<br/>Components of a Security Policy 271<br/>Developing Security Procedures 271<br/>Security Mechanisms 271<br/>Physical Security 272<br/>Authentication 272<br/>Authorization 273<br/>Accounting (Auditing) 274<br/>Data Encryption 274<br/>Public/Private Key Encryption 275<br/>Packet Filters 277<br/>Firewalls 277<br/>Intrusion Detection Systems 278<br/>Modularizing Security Design 278<br/>Securing Internet Connections 279<br/>Securing Public Servers 280<br/>Securing E-Commerce Servers 281<br/>Securing Remote-Access and Virtual Private Networks 281<br/>Securing Dialup Access 282<br/>Securing Virtual Private Networks 283<br/>Securing Network Services and Network Management 284<br/>Securing Server Farms 285<br/>Securing User Services 286<br/>Securing Wireless Networks 287<br/>Authentication in Wireless Networks 28<br/>Data Privacy in Wireless Networks 293<br/>Summary 295<br/>Chapter 9. Developing Network Management Strategies 299<br/>Network Management Strategies 299<br/>Proactive Network Management 300<br/>Network Management Processes 300<br/>Performance Management 301<br/>Fault Management 302<br/>Configuration Management 303<br/>Security Management 304<br/>Accounting Management 304<br/>Network Management Architectures 305<br/>In-Band Versus Out-of-Band Monitoring 306<br/>Centralized Versus Distributed Monitoring 306<br/>Selecting Protocols for Network Management 307<br/>Simple Network Management Protocol 307<br/>Management Information Bases (MIEs) 308<br/>Remote Monitoring (RMON) 309<br/>Cisco Discovery Protocol 311<br/>Estimating Network Traffic Caused by Network Management 312<br/>Selecting Tools for Network Management 312<br/>Cisco Tools 313<br/>Cisco NetFlow Accounting 313<br/>Cisco's Service Assurance Agent (SAA) 314<br/>Summary 315<br/>Summary for Part II 315<br/>Part III Physical Network Design 317<br/>Chapter 10. Selecting Technologies and Devices for Campus Networks 319<br/>LAN Cabling Plant Design 320<br/>Cabling Topologies 320<br/>Building-Cabling Topologies 321<br/>Campus-Cabling Topologies 322<br/>Types of Cables 323<br/>LAN Technologies 325<br/>Ethernet 326<br/>Ethernet and IEEE 802.3 327<br/>Ethernet Technology Choices 328<br/>Campus ATM Networks 339<br/>Selecting Internetworking Devices for a Campus Network Design 341<br/>Optimization Features on Campus Internetworking Devices 344<br/>An Example of a Campus Network Design 344<br/>Background Information for the Campus Network Design Project 345<br/>Business Goals 345<br/>Technical Goals 346<br/>Network Applications 347<br/>User Communities 347<br/>Data Stores (Servers) 349The Current Network at WVCC 349<br/>Traffic Characteristics of Network Applications 352<br/>A Surnmary of Traffic Flows 353<br/>Performance Characteristics of the Current Network 355<br/>The Network Redesign for WVCC 355<br/>Optimized IP Addressing and Routing for the Campus Backbone 355<br/>The Wireless Network 356<br/>Improved Performance and Security for the Edge of the Network 358<br/>Future Enhancements for the WVCC Campus Network 359<br/>Summary 360<br/>Chapter 11. Selecting Technologies and Devices tor Enterprise Networks 363<br/>Remote-Access Technologies 364<br/>Point-to-Point Protocol 365<br/>Multilink PPP and Multichassis Multilink PPP 365<br/>Password Authentication Protocol and Challenge Handshake Authentication Protocol 366<br/>Integrated Services Digital Network 367<br/>ISDN Components 369<br/>Cable Modem Remote Access 370<br/>Challenges Associated with Cable Modem Systems 371<br/>Digital Subscriber Line Remote Access 372<br/>Other DSL Implementations 373<br/>PPP and ADSL 373<br/>Selecting Remote-Access Devices for an Enterprise Network Design 374<br/>Selecting Devices for Remote Users 374<br/>Selecting Devices for the Central Site 375<br/>VPN Concentrators 376<br/>WAN Technologies 377<br/>Systems for Provisioning WAN Bandwidth 377<br/>Leased Lines 379<br/>Synchronous Optical Network 379<br/>Frame Relay 381<br/>Frame Relay Hub-and-Spoke Topologies and Subinterfaces 382<br/>Frame Relay Congestion Control Mechanisms 383<br/>Frame Relay Traffic Control 384<br/>Frame Relay/ATM Interworking 385<br/>ATM Wide-Area Networks 385<br/>Ethernet over ATM 386<br/>Selecting Routers for an Enterprise WAN Design 387<br/>Selecting a WAN Service Provider 387<br/>An Example of a WAN Design 389<br/>Background Information for the WAN Design Project 389<br/>Business and Technical Goals 390<br/>Network Applications 390<br/>User Communities 391<br/>Data Stores (Servers) 392<br/>The Current Network 392<br/>Traffic Characteristics of the Existing WAN 392<br/>The WAN Design for Klamath Paper Products 394<br/>Summary 397<br/>Summary for Part III 398<br/>Part IV. Testing, Optimizing, and Documenting Your Network Design 401<br/>Chapter 12. Testing Your Network Design 403<br/>Using Industry Tests 404<br/>Building and Testing a Prototype Network System 405<br/>Determining the Scope of a Prototype System 405<br/>Writing a Test Plan for the Prototype System 407<br/>Developing Test Objectives and Aeceptance Criteria 407<br/>Determining the Types of Tests to Run 408<br/>Documenting Network Equipment and Other Resources 409<br/>Writing Test Scripts 410<br/>Documenting the Project Timeline 411<br/>Implementing the Test Plan 412<br/>Tools for Testing a Network Design 412<br/>Types of Tools 412<br/>Specific Tools for Testing a Network Design 414<br/>CiscoWorks Internetwork Performance Monitor 414<br/>WANDL's Network-Planning and Analysis Tools 414<br/>OPNET Technologies 415<br/>Agilent's RouterTester 415<br/>NetIQ Voice and Video Management Solution 415<br/>NetPredict's NetPredictor 415<br/>An Example of a Network Design Testing Scenario 416<br/>Background Information for the Design and Testing Project at Umqua Systems, Inc. 416<br/>Goals for the Design and Testing Project 416<br/>Network Applications 417<br/>The Current Network 418<br/>Testing Methods Used 419<br/>Measured Data 419<br/>Load on the FDDI Backbone 419<br/>Load on the DS-1 Circuits 423<br/>Analysis of the New Order-Entry System 424<br/>Delay Characteristics for the New Order-Entry System 425<br/>Conclusions 426<br/>Summary 427<br/>Chapter 13. Optimizing Your Network Design 429<br/>Optimizing Bandwidth Usage with IP Multicast Technologies 430<br/>IP Multicast Addressing 431<br/>The Internet Group Management Protocol 431<br/>Multicast Routing Protocols 432<br/>Multicast Open Shortest Path First 432<br/>Protocol-Independent Multicast 433<br/>Reducing Serialization Delay 435<br/>Link-Layer Fragmentation and Interleaving 435<br/>Compressed Real Time Protocol 436<br/>Optimizing Network Performance to Meet Quality of Service Requirements 437<br/>IP Precedence and Type of Service 438<br/>The IP Precedence Field 439<br/>The IP Type-of-Service Field 439<br/>The IP Differentiated Services Field 440<br/>IP Version 6 QoS 440<br/>The Resource Reservation Protocol 441<br/>The Common Open Policy Service Protocol 443<br/>Classifying LAN Traffic 443<br/>Cisco Internetwork Operating System Features for Optimizing Network Performance 444<br/>Switching Techniques 444<br/>Classic Methods for Layer 3 Packet Switching 445<br/>NetFlow Switching 446<br/>Cisco Express Forwarding 447<br/>Queuing Services 448<br/>First In, First Out Queuing 448<br/>Priority Queuing 449<br/>Custom Queuing 450<br/>Weighted Fair Queuing 451<br/>Class-Based Weighted Fair Queuing 451<br/>Low-Latency Queuing 452<br/>Random Early Detection 453<br/>Weighted Random Early Detection 453<br/>Traffic Shaping 454<br/>Committed Access Rate 454<br/>Summary 455<br/>Chapter 14. Documenting Your Network Design 457<br/>Responding to a Customer's Request for Proposal 458<br/>Contents of a Network Design Document 460<br/>Executive Summary 460<br/>Project Goal 460<br/>Project Scope 460<br/>Design Requirements 461<br/>Business Goals 461<br/>Technical Goals 462<br/>User Communities and Data Stores 463<br/>Network Applications 463<br/>Current State of the Network 463<br/>Logical Design 464<br/>Physical Design 464<br/>Results of Network Design Testing 465<br/>Implementation Plan 465<br/>Project Schedule 466<br/>Project Budget 467<br/>Return on Investment 467<br/>Design Document Appendix 468<br/>Summary 469<br/>Appendix A Characterizing Network Traffic When Workstations Boot 471<br/>Appendix B References and Recommended Reading 479<br/>Glossary 483<br/>Index 535
650 ## - Punto de acceso adicional de materia - Término de materia
Término de materia LOGICAL NETWORK DESIGN
650 ## - Punto de acceso adicional de materia - Término de materia
Término de materia PHYSICAL NETWORK DESIGN
650 ## - Punto de acceso adicional de materia - Término de materia
Término de materia NETWORK DESIGN
650 ## - Punto de acceso adicional de materia - Término de materia
Término de materia BUSINESS ENTERPRISES
650 ## - Punto de acceso adicional de materia - Término de materia
Término de materia SYSTEMS ANALYSIS
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Tipo de ítem Koha Libro
Esquema de clasificación Clasificación Decinal Universal
Existencias
Estado Estado perdido Estado de conservación Tipo de préstamo Biblioteca Biblioteca Fecha de adquisición Origen de la adquisición Número de inventario Total Checkouts ST completa de Koha Código de barras Date last seen Precio efectivo a partir de Tipo de ítem Koha
      Sólo Consulta Facultad Regional Santa Fe - Biblioteca "Rector Comodoro Ing. Jorge Omar Conca" Facultad Regional Santa Fe - Biblioteca "Rector Comodoro Ing. Jorge Omar Conca" 02/02/2018 Compra Exp. 21/2009 10126   004.7 OP5 10126 02/02/2018 02/02/2018 Libro