rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9781587052224

Campus Network Design Fundamentals

by ;
  • ISBN13:

    9781587052224

  • ISBN10:

    1587052229

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2005-12-08
  • Publisher: Cisco Press
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $67.99

Summary

The all-in-one guide to the what, why, and how of modern campus network design.

Author Biography

Diane Teare, CCNP®, CCDP®, is a 20-year veteran in the networking, training, and e-learning fields. Diane has extensive knowledge of network design and routing technologies and is a Cisco instructor with one of the largest Cisco Learning Partners.

 

Catherine Paquet, CCSP™, CCNP, works in the field of internetworking and security. Catherine has in-depth knowledge of security systems, remote-access, and routing technology. She is a Cisco instructor with one of the largest Cisco Learning Partners.

 

Table of Contents

Introduction xviii
Part I Designing Networks
2(24)
Network Design
4(22)
What Is Design?
5(2)
Design Principles
7(7)
Determining Requirements
9(2)
Analyzing the Existing Network
11(1)
Preparing the Preliminary Design
12(1)
Completing the Final Design Development
12(1)
Deploying the Network
12(1)
Monitoring and Redesigning
13(1)
Maintaining Design Documentation
13(1)
Modular Network Design
14(10)
What Is Modular Design?
14(1)
Hierarchical Network Design
15(2)
Access Layer
17(1)
Distribution Layer
17(1)
Core Layer
18(1)
Limitations of the Hierarchical Model
18(1)
The Cisco Enterprise Composite Network Model
18(2)
Enterprise Campus Functional Area
20(3)
Enterprise Edge Functional Area
23(1)
Service Provider Edge Functional Area
24(1)
Summary
24(2)
Part II Technologies: What You Need to Know and Why You Need to Know It
26(224)
Switching Design
28(30)
Making the Business Case
29(1)
Switching Types
30(4)
Layer 2 Switching
30(3)
Layer 3 Switching
33(1)
Spanning-Tree Protocol
34(6)
Redundancy in Layer 2 Switched Networks
35(1)
STP Terminology and Operation
36(1)
STP Terminology
36(4)
STP Options
40(1)
Rapid STP (RSTP)
40(1)
Virtual LANs
40(7)
VLAN Membership
42(1)
Trunks
42(2)
STP and VLANs
44(1)
VLAN Trunking Protocol
45(1)
Inter-VLAN Routing
46(1)
Multilayer Switching and Cisco Express Forwarding
47(3)
Multilayer Switching
47(2)
Cisco Express Forwarding
49(1)
Switching Security
50(3)
Catalyst Native Security
51(2)
Catalyst Hardware Security
53(1)
Switching Design Considerations
53(2)
Summary
55(3)
IPv4 Routing Design
58(42)
Making the Business Case
59(1)
IPv4 Address Design
60(14)
Determining How Many IP Addresses Are Required
61(1)
Using Private and Public Addresses and NAT
61(2)
How Routers Use Subnet Masks
63(1)
Determining the Subnet Mask to Use
64(3)
Hierarchical IP Address Design and Summarization
67(3)
Variable-Length Subnet Masks
70(4)
IPv4 Routing Protocols
74(20)
Classifying Routing Protocols
75(1)
Interior and Exterior Routing Protocols
75(1)
Distance Vector, Link-State, and Hybrid Routing Protocols
75(2)
Flat and Hierarchical Routing Protocols
77(1)
Classful and Classless Routing Protocols
77(2)
Metrics
79(1)
Convergence Time
80(1)
Route Summarization
81(1)
Routing Protocol Comparison
82(1)
Routing Information Protocol, Versions 1 and 2
83(1)
Interior Gateway Routing Protocol
84(2)
Enhanced Interior Gateway Routing Protocol
86(2)
Open Shortest Path First
88(2)
Integrated Intermediate System-to-Intermediate System
90(3)
Border Gateway Protocol Version 4
93(1)
IPv4 Routing Protocol Selection
94(4)
Choosing Your Routing Protocol
94(1)
Redistribution, Filtering, and Administrative Distance
95(3)
Summary
98(2)
Network Security Design
100(30)
Making the Business Case
101(2)
Hacking
103(1)
Types of Hackers
104(1)
White-Hat Hackers
104(1)
Vulnerabilities
104(2)
Design Issues
105(1)
Human Issues
105(1)
Implementation Issues
105(1)
Threats
106(5)
Reconnaissance Attacks
106(1)
Access Attacks
106(1)
Access Subterfuges
107(1)
Information Disclosure Attacks
107(1)
Social Engineering
107(1)
Phishing
107(1)
Denial of Service Attacks
108(3)
Mitigating Technologies
111(14)
Threat Defense
111(1)
Virus protection
112(1)
Traffic Filtering
112(2)
Intrusion Detection and Prevention
114(3)
Content Filtering
117(1)
Secure Communication
117(2)
Encrypted VPN
119(2)
SSL
121(1)
File Encryption
121(1)
Trust and Identity
121(1)
Authentication, Authorization, and Accounting
121(1)
Network Admission Control
122(1)
Public Key Infrastructure
123(1)
Network Security Best Practices
124(1)
Network Management
124(1)
Assessment and Audits
124(1)
Policies
125(1)
Safe Campus Design
125(4)
Summary
129(1)
Wireless LAN Design
130(18)
Making the Business Case
131(1)
Wireless Technology Overview
132(5)
Wireless Standards
133(2)
Wireless Components
135(1)
Wireless Access Points
135(1)
Wireless Client Devices
136(1)
Wireless Security
137(4)
Wireless Security Issues
138(1)
Wireless Threat Mitigation
138(1)
Basic Wireless Security
138(2)
Enhanced Wireless Security
140(1)
Wireless Intrusion Detection
141(1)
Wireless Management
141(2)
Wireless Design Considerations
143(3)
Site Survey
143(1)
WLAN Roaming
144(1)
Point-to-Point Bridging
145(1)
Design Considerations for Wireless IP Phones
145(1)
Summary
146(2)
Quality of Service Design
148(24)
Making the Business Case
149(2)
QoS Requirements for Voice, Data, Video, and Other Traffic
151(2)
QoS Models
153(1)
IntServ
153(1)
DiffServ
154(1)
QoS Tools
154(14)
Classification and Marking
155(1)
Classification
156(1)
Marking
156(5)
Policing and Shaping
161(1)
Policing Tools
162(1)
Shaping Tools
163(1)
Congestion Avoidance
163(1)
Congestion Management
164(2)
Link-Specific Tools
166(1)
AutoQoS
167(1)
QoS Design Guidelines
168(2)
Summary
170(2)
Voice Transport Design
172(24)
What Is Voice Transport?
174(3)
Digitization
175(1)
Packetization and Call Processing
176(1)
Conversation and Control Traffic
177(1)
Quality of Service
177(1)
VoIP Components
178(1)
IP Telephony Components
179(3)
IP Infrastructure
179(1)
IP Phones
180(1)
Video Telephony
181(1)
Call Processing
181(1)
Applications
181(1)
Voice Gateway
182(1)
Voice Coding and Compression Techniques
182(3)
Voice Compression
182(2)
Voice Activity Detection
184(1)
Compressed Real-Time Transport Protocol
184(1)
Bandwidth Requirements
185(3)
Definitions
185(1)
Calculating Trunk Capacity or Bandwidth
186(2)
Signaling Traffic Bandwidth
188(1)
IP Telephony Design
188(2)
Single-Site IP Telephony Design
189(1)
Multisite Centralized IP Telephony Design
189(1)
Multisite Distributed IP Telephony Design
190(1)
Voice Security
190(3)
IP Telephony Network Security Concerns
191(1)
Access Attacks
191(1)
Denial of Service Attacks
191(1)
Platform Security Issues
191(1)
Mitigating to Protect IP Telephony
192(1)
Summary
193(3)
Content Networking Design
196(18)
Making the Business Case
197(1)
Content Networking
198(1)
Content Caches and Content Engines
199(5)
Transparent Caching
200(1)
Nontransparent Caching
201(2)
Reverse Proxy Caching
203(1)
Content Routing
204(3)
Direct Mode
204(2)
WCCP Mode
206(1)
Content Distribution and Management
207(1)
Content Switching
208(1)
Designing Content Networking
209(3)
School Curriculum
209(1)
Live Video and Video on Demand for a Corporation
210(2)
Summary
212(2)
Network Management Design
214(20)
Making the Business Case
215(1)
ISO Network Management Standard
216(1)
Network Management Protocols and Tools
216(12)
Terminology
217(1)
SNMP
218(1)
MIB
218(2)
RMON
220(1)
RMON 1
221(1)
RMON 2
221(1)
RMON Extensions
222(1)
Cisco NetFlow
223(1)
Syslog
224(1)
CiscoWorks
225(1)
Other Tools
225(3)
Managing a Network
228(2)
Network Management Strategy
228(1)
SLCs and SLAs
228(1)
IP Service-Level Agreements
229(1)
Network Management Design
230(2)
Summary
232(2)
Other Enabling Technologies
234(16)
IP Multicast
235(4)
Internet Group Management Protocol (IGMP) and Cisco Group Management Protocol (CGMP)
236(1)
Protocol Independent Multicast (PIM) Routing Protocol
237(2)
Increasing Network Availability
239(3)
Storage Networking
242(2)
IP Version 6
244(3)
Summary
247(3)
Part III Designing Your Network: How to Apply What You Know
250(42)
Case Study Context: Venti Systems
252(12)
Background Information and Context
253(4)
Network Requirements After Acquisitions Are Complete
257(6)
Summary
263(1)
Case Study Solution: Venti Systems
264(28)
Design Model
265(8)
Head Office
267(1)
Enterprise Campus
267(1)
Enterprise Edge and Service Provider Edge
268(2)
Branch Office
270(1)
Remote Users
271(1)
User Devices
272(1)
Servers
273(1)
Switching
273(2)
Head-Office Switching
274(1)
Branch-Office Switching
275(1)
Remote User Switching
275(1)
Security
275(6)
Head-Office Security
278(3)
Branch-Office Security
281(1)
Remote User Security
281(1)
IP Addressing and Routing Protocol
281(2)
Head-Office IP Addressing and Routing Protocol
281(1)
Branch-Office IP Addressing and Routing Protocol
282(1)
Remote User IP Addressing and Routing Protocol
283(1)
E-Mail
283(1)
Head-Office E-Mail
283(1)
Branch-Office E-Mail
284(1)
Remote User E-Mail
284(1)
QoS and Voice
284(4)
Head-Office QoS and Voice
284(4)
Branch-Office QoS and Voice
288(1)
Remote User QoS and Voice
288(1)
Wireless
288(1)
Head-Office Wireless
288(1)
Branch-Office Wireless
288(1)
Remote User Wireless
288(1)
Network Management
289(2)
Head-Office Network Management
289(2)
Branch-Office Network Management
291(1)
Remote User Network Management
291(1)
Future Considerations
291(1)
Summary
291(1)
Part IV Appendixes
292(74)
Appendix A References
294(6)
Appendix B Network Fundamentals
300(40)
Appendix C Decimal-Binary Conversion
340(10)
Appendix D Abbreviations
350(16)
Index 366

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program