000 18859nam a2200301 a 4500
003 AR-sfUTN
008 170717b ||||| |||| 00| 0 d
020 _a1587051524
040 _cAR-sfUTN
041 _aeng
080 _a004.7 OP5
_22000
100 1 _aOppenheimer, Priscilla
_916269
245 1 0 _aTop-down network design /
_cPriscilla Oppenheimer.
250 _a2nd.
260 _aIndianápolis:
_bCisco,
_c2004
300 _a566 p.
336 _2rdacontent
_atexto
_btxt
337 _2rdamedia
_asin mediación
_bn
338 _2rdacarrier
_avolumen
_bnc
505 8 0 _aCONTENIDO Part I. Identifying Your Customer´s Needs and Goals 3 Chapter 1. Analyzing Business Goals and Constraints 5 Using a Top-Down Network Design Methodology 5 Using a Structured Network Design Process 7 Systems Development Life Cycles 7 The Plan Design Implement Operate Optimize (PDIOO) Network Life Cycle 9 Analyzing Business Goals 10 Working with Your Client la Changes in Enterprise Networks 12 Networks Must Make Business Sense 13 The Need to Support Mobile Users 14 The Importance of Network Security and Resiliency 14 Typical Network Design Business Goals 16 Identifying the Scope of a Network Design Project 16 Identifying a Customer's Network Applications 18 Analyzing Business Constraints 21 Politics and Policies 21 Budgetary and Staffing Constraints 23 Project Scheduling 24 Business Goals Checklist 24 Summary 25 Chapter 2. Analyzing Technical Goals and Tradeoffs 27 Scalability 27 Planning for Expansion 27 Expanding Access to Data 28 Constraints on Scalability 29 Availability 29 Disaster Recovery 30 Specifying Availability Requirements 31 Five Nines Availability 32 The Cost of Downtime 34 Mean Time Between Failure and Mean Time to Repair 34 Network Performance 35 Network Performance Definitions 35 Optimum Network Utilization 36 Throughput 39 Throughput of Internetworking Devices 39 Application Layer Throughput 40 Accuracy 42 Efficiency 43 Delay and Delay Variation 45 Causes of Delay 46 Delay Variation 48 Response Time 48 Security 49 Identifying Network Assets 50 Analyzing Security Risks 51 Reconnaissance Attacks 52 Denial-of-Service Attacks 53 Developing Security Requirements 53 Manageability 54 Usability 55 Adaptability 55 Affordability 56 Making Network Design Tradeoffs 57 Technical Goals Checklist 59 Summary 60 Chapter 3. Characterizing the Existing Internetwork 63 Characterizing the Network Infrastructure 63 Developing a Network Map 64 Tools for Developing Network Maps 64 Characterizing Large Internetworks 64 Characterizing the Logical Architecture 66 Developing a Modular Block Diagram 67 Characterizing Network Addressing and Naming 67 Characterizing Wiring and Media 70 Checking Architectural and Environmental Constraints 73 Checking a Site for a Wireless Installation 74 Doing a Wireless Site Survey 75 Checking the Health of the Existing Internetwork 76 Developing a Baseline of Network Performance 77 Analyzing Network Availability 77 Analyzing Network Utilization 78 Measuring Bandwidth Utilization by Protocol 80 Analyzing Network Accuracy 81 Analyzing Errors on Switched Ethemet Networks 82 Analyzing Network Efficiency 84 Analyzing Delay and Response Time 86 Checking the Status of Major Routers, Switches, and Firewalls 87 Tools for Characterizing the Existing Internetwork 89 Protocol Analyzers 89 Network-Monitoring and Management Tools 89 Remote Monitoring Tools 90 Cisco Tools for Characterizing an Existing Internetwork 91 Organizations That Provide Information on Characterizing an Existing Internetwork 92 Network Health Checklist 92 Summary 93 Chapter 4. Characterizing Network Traffic 95 Characterizing Traffic Flow 95 Identifying Major Traffic Sources and Stores 95 Documenting Traffic Flow on the Existing Network 97 Characterizing Types of Traffic Flow for New Network Applications 98 Terminal/Host Traffic Flow 99 Client/Server Traffic Flow 99 Thin Client Traffic Flow 100 Peer-to-Peer Traffic Flow 101 Server/Server Traffic Flow 102 Distributed Computing Traffic Flow 102 Traffic Flow in Voice over IP Networks 103 Documenting Traffic Flow for New and Existing Network Applications 104 Characterizing Traffic Load 105 Calculating Theoretical Traffic Load 106 Documenting Application-Usage Patterns 107 Refining Estimates of Traffic Load Caused by Applications 108 Estimating Traffic Overhead for Various Protocols 109 Estimating Traffic Load Caused by Workstation and Session Initialization 109 Estimating Traffic Load Caused by Routing Protocols 111 Characterizing Traffic Behavior 111 Broadeast/Multieast Behavior 112 Network Efficiency 113 Frame Size 113 Protocol Interaction 114 Windowing and Flow Control 116 Error-Recovery Mechanisms 118 Characterizing Quality of Service Requirements 119 ATM Quality of Service Specifications 119 Constant Bit Rate Service Category 120 Realtime Variable Bit Rate Service Category 121 Non-Realtime Variable Bit Rate Service Category 121 Unspecified Bit Rate Service Category 121 Available Bit Rate Service Category 121 Guaranteed Frame Rate Service Category 122 IETF Integrated Services Working Group Quality of Service Specifications 122 Controlled-Load Service 123 Guaranteed Service 124 IETF Differentiated Services Working Group Quality of Service Specifications 125 Grade of Service Requirements for Voice Applications 126 Documenting QoS Requirements 127 Network Traffic Checklist 128 Summary 128 Summary for Part I 128 Part II. Logical Network Design 131 Chapter 5. Designing a Network Topology 133 Hierarchical Network Design 133 Why Use a Hierarchical Network Design Model? 135 Flat Versus Hierarchical Topologies 136 Mesh Versus Hierarchical-Mesh Topologies 138 The Classic Three-Layer Hierarchical Model 141 The Core Layer 142 The Distribution Layer 142 The Access Layer 143 Guidelines for Hierarchical Network Design 143 Redundant Network Design Topologies 145 Backup Paths 146 Load Sharing 147 Modular Network Design 148 The Enterprise Composite Network Model 148 Designing a Campus Network Design Topology 150 The Spanning Tree Protocol 151 STP Convergence 151 Selecting the Root Bridge 153 The STP Topology Change Process 154 Scaling the Spanning Tree Protocol 155 Rapid Reconfiguration of the Spanning Tree 155 Virtual LANs 156 Fundamental VLAN Designs 157 Wireless LANs 160 Positioning an Access Point for Maximum Coverage 160 WLANs and VLANs 161 Redundant Wireless Access Points 161 Redundancy and Load Sharing in Wired LANs 162 Server Redundancy 163 Workstation-to-Router Redundancy 165 AppleTalk Workstation-to-Router Communication 166 Novell NetWare Workstation-to-Router Communication 167 IP Workstation-to-Router Communication 167 Designing the Enterprise Edge Topology 170 Redundant WAN Segments 170 Circuit Diversity 171 Multihoming the Internet Connection 171 Virtual Private Networking 175 Site-to-Site VPNs 176 Remote-Access VPNs 177 The Service Provider Edge 178 Secure Network Design Topologies 180 Planning for Physical Security 180 Meeting Security Goals with Firewall Topologies 180 Summary 182 Chapter 6. Designing Models for Addressing and Naming 185 Guidelines for Assigning Network Layer Addresses 186 Using a Structured Model for Network Layer Addressing 186 Administering Addresses by a Central Authority 187 Distributing Authority for Addressing 188 Using Dynamic Addressing for End Systems 188 AppleTalk Dynamic Addressing 189 Novell NetWare Dynamic Addressing 190 IP Dynamic Addressing 191 Using Private Addresses in an IP Environment 195 Caveats with Private Addressing 196 Network Address Translation 197 Using a Hierarchical Model for Assigning Addresses 197 Why Use a Hierarchical Model for Addressing and Routing? 198 Hierarchical Routing 198 Classless Interdomain Routing 199 Classless Routing Versus Classful Routing 199 Route Summarization (Aggregation) 201 Route Summarization Example 201 Route Summarization Tips 202 Discontiguous Subnets 203 Mobile Hosts 204 Variable-Length Subnet Masking 204 Hierarchy in IP Version 6 Addresses 205 IPv6 Address Types 206 Strategies for Moving fram IPv4 to IPv6 209 Designing a Model for Naming 209 Distributing Authority for Naming 210 Guidelines for Assigning Names 211 Assigning Names in a NetBIOS Environment 212 NetBIOS in a Bridged or Switched Environment (NetBEUI) 212 NetBIOS in a Novell NetWare Environment (NWLink) 213 NetBIOS in a TCP/IP Environment (NetBT) 213 Assigning Names in an IP Environment 215 The Domain Name System 215 Summary 217 Chapter 7. Selecting Switching and Routing Protocols 221 Making Decisions as Part of the Top-Down Network Design Process 222 Selecting Bridging and Switching Protocols 223 Transparent Bridging 224 Transparent Switching 225 Switching and tue OSI Layers 225 Multilayer Switching 226 Selecting Spanning Tree Protocol Enhancements 227 PortFast 227 UplinkFast and BackboneFast 228 Unidirectional Link Detection 230 Loop Guard 230 Protocols for Transporting VLAN Information 231 Inter-Switch Link Protocol 231 Dynamic Inter-Switch Link Protocol 231 IEEE 802.1Q 232 VLAN Trunk Protocol 233 Selecting Routing Protocols 234 Characterizing Routing Protocols 234 Distance-Vector Versus Link-State Routing Protocols 235 Routing Protocol Metrics 239 Hierarchical Versus Nonhierarchical Routing Protocols 239 Interior Versus Exterior Routing Protocols 239 Classful Versus Classless Routing Protocols 23 Dynamic Versus Static and Default Routing 240 On-Demand Routing 241 Scalability Constraints for Routing Protocols 241 IP Routing 243 Routing Information Protocol 243 Interior Gateway Routing Protocol 244 Enhanced Interior Gateway Routing Protocol 246 Open Shortest Path First 247 Intermediate System-to-Intermediate System 250 Border Gateway Protocol 251 AppleTalk Routing 252 Routing Table Maintenance Protocol 252 AppleTalk Update-Based Routing Protocol 253 EIGRP for AppleTalk 254 Migrating an AppleTalk Network to IP Routing 254 Novell NetWare Routing 254 Internetwork Packet Exchange Routing Information Protocol 255 NetWare Link Services Protocol 255 EIGRP for IPX 256 Migrating a NetWare Network to IP Routing 256 Using Multiple Routing Protocols in an Internetwork 257 Routing Protocols and the Hierarchical Design Model 257 Routing Protocols for the Core Layer 258 Routing Protocols for the Distribution Layer 258 Routing Protocols for the Access Layer 258 Redistribution Between Routing Protocols 259 Integrated Routing and Bridging 261 A Summary of IP, AppleTalk, and IPX Routing Protocols 261 Summary 264 Chapter 8. Developing Network Security Strategies 267 Network Security Design 267 Identifying Network Assets and Risks 268 Analyzing Security Tradeoffs 269 Developing a Security Plan 269 Developing a Security Policy 270 Components of a Security Policy 271 Developing Security Procedures 271 Security Mechanisms 271 Physical Security 272 Authentication 272 Authorization 273 Accounting (Auditing) 274 Data Encryption 274 Public/Private Key Encryption 275 Packet Filters 277 Firewalls 277 Intrusion Detection Systems 278 Modularizing Security Design 278 Securing Internet Connections 279 Securing Public Servers 280 Securing E-Commerce Servers 281 Securing Remote-Access and Virtual Private Networks 281 Securing Dialup Access 282 Securing Virtual Private Networks 283 Securing Network Services and Network Management 284 Securing Server Farms 285 Securing User Services 286 Securing Wireless Networks 287 Authentication in Wireless Networks 28 Data Privacy in Wireless Networks 293 Summary 295 Chapter 9. Developing Network Management Strategies 299 Network Management Strategies 299 Proactive Network Management 300 Network Management Processes 300 Performance Management 301 Fault Management 302 Configuration Management 303 Security Management 304 Accounting Management 304 Network Management Architectures 305 In-Band Versus Out-of-Band Monitoring 306 Centralized Versus Distributed Monitoring 306 Selecting Protocols for Network Management 307 Simple Network Management Protocol 307 Management Information Bases (MIEs) 308 Remote Monitoring (RMON) 309 Cisco Discovery Protocol 311 Estimating Network Traffic Caused by Network Management 312 Selecting Tools for Network Management 312 Cisco Tools 313 Cisco NetFlow Accounting 313 Cisco's Service Assurance Agent (SAA) 314 Summary 315 Summary for Part II 315 Part III Physical Network Design 317 Chapter 10. Selecting Technologies and Devices for Campus Networks 319 LAN Cabling Plant Design 320 Cabling Topologies 320 Building-Cabling Topologies 321 Campus-Cabling Topologies 322 Types of Cables 323 LAN Technologies 325 Ethernet 326 Ethernet and IEEE 802.3 327 Ethernet Technology Choices 328 Campus ATM Networks 339 Selecting Internetworking Devices for a Campus Network Design 341 Optimization Features on Campus Internetworking Devices 344 An Example of a Campus Network Design 344 Background Information for the Campus Network Design Project 345 Business Goals 345 Technical Goals 346 Network Applications 347 User Communities 347 Data Stores (Servers) 349The Current Network at WVCC 349 Traffic Characteristics of Network Applications 352 A Surnmary of Traffic Flows 353 Performance Characteristics of the Current Network 355 The Network Redesign for WVCC 355 Optimized IP Addressing and Routing for the Campus Backbone 355 The Wireless Network 356 Improved Performance and Security for the Edge of the Network 358 Future Enhancements for the WVCC Campus Network 359 Summary 360 Chapter 11. Selecting Technologies and Devices tor Enterprise Networks 363 Remote-Access Technologies 364 Point-to-Point Protocol 365 Multilink PPP and Multichassis Multilink PPP 365 Password Authentication Protocol and Challenge Handshake Authentication Protocol 366 Integrated Services Digital Network 367 ISDN Components 369 Cable Modem Remote Access 370 Challenges Associated with Cable Modem Systems 371 Digital Subscriber Line Remote Access 372 Other DSL Implementations 373 PPP and ADSL 373 Selecting Remote-Access Devices for an Enterprise Network Design 374 Selecting Devices for Remote Users 374 Selecting Devices for the Central Site 375 VPN Concentrators 376 WAN Technologies 377 Systems for Provisioning WAN Bandwidth 377 Leased Lines 379 Synchronous Optical Network 379 Frame Relay 381 Frame Relay Hub-and-Spoke Topologies and Subinterfaces 382 Frame Relay Congestion Control Mechanisms 383 Frame Relay Traffic Control 384 Frame Relay/ATM Interworking 385 ATM Wide-Area Networks 385 Ethernet over ATM 386 Selecting Routers for an Enterprise WAN Design 387 Selecting a WAN Service Provider 387 An Example of a WAN Design 389 Background Information for the WAN Design Project 389 Business and Technical Goals 390 Network Applications 390 User Communities 391 Data Stores (Servers) 392 The Current Network 392 Traffic Characteristics of the Existing WAN 392 The WAN Design for Klamath Paper Products 394 Summary 397 Summary for Part III 398 Part IV. Testing, Optimizing, and Documenting Your Network Design 401 Chapter 12. Testing Your Network Design 403 Using Industry Tests 404 Building and Testing a Prototype Network System 405 Determining the Scope of a Prototype System 405 Writing a Test Plan for the Prototype System 407 Developing Test Objectives and Aeceptance Criteria 407 Determining the Types of Tests to Run 408 Documenting Network Equipment and Other Resources 409 Writing Test Scripts 410 Documenting the Project Timeline 411 Implementing the Test Plan 412 Tools for Testing a Network Design 412 Types of Tools 412 Specific Tools for Testing a Network Design 414 CiscoWorks Internetwork Performance Monitor 414 WANDL's Network-Planning and Analysis Tools 414 OPNET Technologies 415 Agilent's RouterTester 415 NetIQ Voice and Video Management Solution 415 NetPredict's NetPredictor 415 An Example of a Network Design Testing Scenario 416 Background Information for the Design and Testing Project at Umqua Systems, Inc. 416 Goals for the Design and Testing Project 416 Network Applications 417 The Current Network 418 Testing Methods Used 419 Measured Data 419 Load on the FDDI Backbone 419 Load on the DS-1 Circuits 423 Analysis of the New Order-Entry System 424 Delay Characteristics for the New Order-Entry System 425 Conclusions 426 Summary 427 Chapter 13. Optimizing Your Network Design 429 Optimizing Bandwidth Usage with IP Multicast Technologies 430 IP Multicast Addressing 431 The Internet Group Management Protocol 431 Multicast Routing Protocols 432 Multicast Open Shortest Path First 432 Protocol-Independent Multicast 433 Reducing Serialization Delay 435 Link-Layer Fragmentation and Interleaving 435 Compressed Real Time Protocol 436 Optimizing Network Performance to Meet Quality of Service Requirements 437 IP Precedence and Type of Service 438 The IP Precedence Field 439 The IP Type-of-Service Field 439 The IP Differentiated Services Field 440 IP Version 6 QoS 440 The Resource Reservation Protocol 441 The Common Open Policy Service Protocol 443 Classifying LAN Traffic 443 Cisco Internetwork Operating System Features for Optimizing Network Performance 444 Switching Techniques 444 Classic Methods for Layer 3 Packet Switching 445 NetFlow Switching 446 Cisco Express Forwarding 447 Queuing Services 448 First In, First Out Queuing 448 Priority Queuing 449 Custom Queuing 450 Weighted Fair Queuing 451 Class-Based Weighted Fair Queuing 451 Low-Latency Queuing 452 Random Early Detection 453 Weighted Random Early Detection 453 Traffic Shaping 454 Committed Access Rate 454 Summary 455 Chapter 14. Documenting Your Network Design 457 Responding to a Customer's Request for Proposal 458 Contents of a Network Design Document 460 Executive Summary 460 Project Goal 460 Project Scope 460 Design Requirements 461 Business Goals 461 Technical Goals 462 User Communities and Data Stores 463 Network Applications 463 Current State of the Network 463 Logical Design 464 Physical Design 464 Results of Network Design Testing 465 Implementation Plan 465 Project Schedule 466 Project Budget 467 Return on Investment 467 Design Document Appendix 468 Summary 469 Appendix A Characterizing Network Traffic When Workstations Boot 471 Appendix B References and Recommended Reading 479 Glossary 483 Index 535
650 _aLOGICAL NETWORK DESIGN
650 _aPHYSICAL NETWORK DESIGN
650 _aNETWORK DESIGN
650 _aBUSINESS ENTERPRISES
650 _aSYSTEMS ANALYSIS
942 _cBK
_2udc
999 _c12841
_d12841