Cisco press top down network design 2nd ed

672 36 0
Cisco press top down network design 2nd ed

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

< Day Day Up > Top-Down Network Design Second Edition By Priscilla Oppenheimer Publisher: Cisco Press Pub Date: May 27, 2004 ISBN: 1-58705-152-4 Table of • Contents • Index Pages: 600 A systems analysis approach to enterprise network design • • • • • Master techniques for checking the health of an existing network to develop a baseline for measuring performance of a new network design Explore solutions for meeting QoS requirements, including ATM traffic management, IETF controlled-load and guaranteed services, IP multicast, and advanced switching, queuing, and routing algorithms Develop network designs that provide the high bandwidth and low delay required for real-time applications such as multimedia, distance learning, and videoconferencing Identify the advantages and disadvantages of various switching and routing protocols, including transparent bridging, InterSwitch Link (ISL), IEEE 802.1Q, IGRP, EIGRP, OSPF, and BGP4 Effectively incorporate new technologies into enterprise network designs, including VPNs, wireless networking, and IP Telephony Top-Down Network Design, Second Edition, is a practical and comprehensive guide to designing enterprise networks that are reliable, secure, and manageable Using illustrations and real-world examples, it teaches a systematic method for network design that can be applied to campus LANs, remote-access networks, WAN links, and large-scale internetworks You will learn to analyze business and technical requirements, examine traffic flow and QoS requirements, and select protocols and technologies based on performance goals You will also develop an understanding of network performance factors such as network utilization, throughput, accuracy, efficiency, delay, and jitter Several charts and job aids will help you apply a top-down approach to network design This Second Edition has been revised to include new and updated material on wireless networks, virtual private networks (VPNs), network security, network redundancy, modularity in network designs, dynamic addressing for IPv4 and IPv6, new network design and management tools, Ethernet scalability options (including 10-Gbps Ethernet, Metro Ethernet, and Long-Reach Ethernet), and networks that carry voice and data traffic Top-Down Network Design, Second Edition, has a companion website at http://www.topdownbook.com, which includes updates to the book, links to white papers, and supplemental information about design resources This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers < Day Day Up > < Day Day Up > Copyright About the Author About the Technical Reviewers Acknowledgments Icons Used in This Book Command Syntax Conventions Introduction Changes for the Second Edition Objectives Audience Organization Part I: Identifying Your Customer's Needs and Goals Part II: Logical Network Design Part III: Physical Network Design Part IV: Testing, Optimizing, and Documenting Your Network Design Companion Website Part I Identifying Your Customer's Needs and Goals Chapter Analyzing Business Goals and Constraints Using a Top-Down Network Design Methodology Analyzing Business Goals Analyzing Business Constraints Business Goals Checklist Summary Chapter Analyzing Technical Goals and Tradeoffs Scalability Availability Network Performance Security Manageability Usability Adaptability Affordability Making Network Design Tradeoffs Technical Goals Checklist Summary Chapter Characterizing the Existing Internetwork Characterizing the Network Infrastructure Checking the Health of the Existing Internetwork Tools for Characterizing the Existing Internetwork Network Health Checklist Summary Chapter Characterizing Network Traffic Characterizing Traffic Flow Characterizing Traffic Load Characterizing Traffic Behavior Characterizing Quality of Service Requirements Network Traffic Checklist Summary Summary for Part I Part II Logical Network Design Chapter Designing a Network Topology Hierarchical Network Design Redundant Network Design Topologies Modular Network Design Designing a Campus Network Design Topology Designing the Enterprise Edge Topology Secure Network Design Topologies Summary Chapter Designing Models for Addressing and Naming Guidelines for Assigning Network Layer Addresses Using a Hierarchical Model for Assigning Addresses Designing a Model for Naming Summary Chapter Selecting Switching and Routing Protocols Making Decisions as Part of the Top-Down Network Design Process Selecting Bridging and Switching Protocols Selecting Routing Protocols A Summary of IP, AppleTalk, and IPX Routing Protocols Summary Chapter Developing Network Security Strategies Network Security Design Security Mechanisms Modularizing Security Design Summary Chapter Developing Network Management Strategies Network Management Design Network Management Processes Network Management Architectures Selecting Protocols for Network Management Selecting Tools for Network Management Summary Summary for Part II Part III Physical Network Design Chapter 10 Selecting Technologies and Devices for Campus Networks LAN Cabling Plant Design LAN Technologies Selecting Internetworking Devices for a Campus Network Design An Example of a Campus Network Design Summary Chapter 11 Selecting Technologies and Devices for Enterprise Networks Remote-Access Technologies Selecting Remote-Access Devices for an Enterprise Network Design WAN Technologies An Example of a WAN Design Summary Summary for Part III Part IV Testing, Optimizing, and Documenting Your Network Design Chapter 12 Testing Your Network Design Using Industry Tests Building and Testing a Prototype Network System Tools for Testing a Network Design An Example of a Network Design Testing Scenario Summary Chapter 13 Optimizing Your Network Design Optimizing Bandwidth Usage with IP Multicast Technologies Reducing Serialization Delay Optimizing Network Performance to Meet Quality of Service Requirements Cisco Internetwork Operating System Features for Optimizing Network Performance Summary Chapter 14 Documenting Your Network Design Responding to a Customer's Request for Proposal Contents of a Network Design Document Summary Appendix A Characterizing Network Traffic When Workstations Boot Novell NetWare Packets AppleTalk Packets TCP/IP Packets TCP/IP DHCP Packets NetBIOS (NetBEUI) Packets NetBIOS with WINS Packets SNA Packets Appendix B References and Recommended Reading Glossary A B C D E F G-H I J-K-L M N O-P Q-R S T U V W X-Z Index < Day Day Up > < Day Day Up > Copyright Copyright © 2004 Cisco Systems, Inc Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review Printed in the United States of America First Printing June 2004 Library of Congress Cataloging-in-Publication Number: 2003107988 Trademark Acknowledgments All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized Cisco Press or Cisco Systems, Inc cannot attest to the accuracy of this information Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark Warning and Disclaimer This book is designed to provide information about top-down network design Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied The information is provided on an "as is" basis The authors, Cisco Press, and Cisco Systems, Inc shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc Corporate and Government Sales Cisco Press offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales For more information, please contact: U.S Corporate and Government Sales 1-800-382-3419 corpsales@pearsontechgroup.com For sales outside of the U.S please contact: international@pearsoned.com Feedback Information At Cisco Press, our goal is to create in-depth technical books of the highest quality and value Each book is crafted with care and precision, undergoing rigorous development that involves the unique expertise of members from the professional technical community Readers' feedback is a natural continuation of this process If you have any comments regarding how we could improve the quality of this book, or otherwise alter it to better suit your needs, you can contact us through email at feedback@ciscopress.com Please make sure to include the book title and ISBN in your message We greatly appreciate your assistance Credits Publisher John Wait Editor-in-Chief John Kane Cisco Representative Anthony Wolfenden Cisco Press Program Manager Nannette M Noble Manager, Marketing Communications Production Manager Patrick Kanouse Development Editor Jill Batistick Project Editor Ginny Bess Munroe Copy Editor Keith Cline Technical Editors Matthew H Birkner Blair Buchanan Dr Peter J Welcher Team Coordinator Tammi Barnett Book and Cover Designer Louisa Adair Composition Octal Publishing, Inc Indexer Julie Bess Corporate Headquarters Cisco Systems, Inc 170 West Tasman Drive San Jose, CA 95134-1706 USA www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 European Headquarters Cisco Systems International BV Haarlerbergpark Haarlerbergweg 13-19 1101 CH Amsterdam The Netherlands www-europe.cisco.com Tel: 31 20 357 1000 Fax: 31 20 357 1100 Americas Headquarters Cisco Systems, Inc 170 West Tasman Drive San Jose, CA 95134-1706 USA www.cisco.com Tel: 408 526-7660 Fax: 408 527-0883 Asia Pacific Headquarters Cisco Systems, Inc Capital Tower 168 Robinson Road #22-01 to #29-01 Singapore 068912 www.cisco.com Tel: +65 6317 7777 Fax: +65 6317 7799 Cisco Systems has more than 200 offices in the following countries and regions Addresses, phone numbers, and fax numbers are listed on the Cisco.com Web site at www.cisco.com/go/offices Argentina • Australia • Austria • Belgium • Brazil • Bulgaria • Canada • Chile • China PRC • Colombia • Costa Rica • Croatia • Czech Republic Denmark • Dubai, UAE • Finland • France • Germany • Greece • Hong Kong SAR • Hungary • India • Indonesia • Ireland • Israel • Italy Japan • Korea • Luxembourg • Malaysia • Mexico • The Netherlands • New Zealand • Norway • Peru • Philippines • Poland • Portugal Puerto Rico • Romania • Russia • Saudi Arabia • Scotland • Singapore • Slovakia • Slovenia • South Africa • Spain • Sweden Switzerland • Taiwan • Thailand • Turkey • Ukraine • United Kingdom • United States • Venezuela • Vietnam • Zimbabwe Copyright © 2003 Cisco Systems, Inc All rights reserved CCIP, CCSP, the Cisco Arrow logo, the Cisco Powered Network mark, the Cisco Systems Verified logo, Cisco Unity, Follow Me Browsing, FormShare, iQ Net Readiness Scorecard, Networking Academy, and ScriptShare are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, The Fastest Way to Increase Your Internet Quotient, and iQuick Study are service marks of Cisco Systems, Inc.; and Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, the Cisco IOS logo, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherSwitch, Fast Step, GigaStack, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, LightStream, MGX, MICA, the Networkers logo, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, RateMUX, Registrar, SlideCast, SMARTnet, Strata View Plus, Stratm, SwitchProbe, TeleRouter, TransPath, and VCO are registered trademarks of Cisco Systems, Inc and/or its affiliates in the U.S and certain other countries All other trademarks mentioned in this document or Web site are the property of their respective owners The use of the word partner does not imply a partnership relationship between Cisco and any other company (0303R) Printed in the USA Dedications To my parents, Dr Stephen T Worland, Ph.D., and Mrs Roberta Worland, M.S They gave me an appreciation for knowledge, logic, and analysis, and taught me that "where there's a will, there's a way." < Day Day Up > constraints 2nd data access 2nd 3rd expansion planning 2nd security 2nd analyzing risks 2nd 3rd 4th 5th 6th 7th identifying network assets 2nd requirements 2nd usability 2nd technologies management designs 2nd NetFlow 2nd SAA (Service Assurance Agent) 2nd Telnet protocol delay sensitivity Temporal Key Integrity Protocol (TKIP) Terminal Access Controller Access Control System (TACACS) terminal adapters (TAs) ISDN terminal services terminal/host traffic flow 2nd testing backup paths designs 2nd 3rd independent test labs 2nd 3rd prototype 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st tools 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th Umqua Systems, Inc example 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th documenting designs 2nd existing networks testing designs goals TFTP (Trivial File Transfer Protocol) thick Ethernet cables (10BASE5) thin client traffic flow 2nd thin Ethernet cables (10Base2) threats security 2nd 3rd denial-of-service (DoS) attacks 2nd reconnaissance attacks 2nd three-layer hierarchical topologies 2nd access layer 2nd core layer 2nd distribution layer 2nd three-part firewall topology throughput performance 2nd application layer 2nd 3rd internetwork devices 2nd 3rd througput testing ticks IPX RIP routing metric time stamps RTP (Real-Time Protocol) time-domain reflectometer (TDR) time-to-live (TTL) field time-to-live fields timeframe business networks 2nd timeframes uptime requirements timelines documenting prototype tests 2nd TKIP (Temporal Key Integrity Protocol) token buckets token passing performance Token Ring networks switches Tolly Group tools characterizing existing networks Cisco tools 2nd 3rd 4th 5th 6th monitoring 2nd 3rd protocol analyzer 2nd remote monitoring 2nd mapping 2nd network design tests Agilent RouterTester 2nd IPM (CiscoWorks Internetwork Performace Monitor) 2nd NetIQ 2nd NetPredictor 2nd NPAT 2nd OPNET technologies 2nd types 2nd 3rd 4th network management 2nd Cisc technologies 2nd 3rd 4th 5th 6th top-down network design methodology 2nd 3rd PDIOO life cycle 2nd 3rd structured process 2nd 3rd system development life cycle 2nd 3rd topologies 2nd cabling 2nd buidlings 2nd campus 2nd campus network 2nd 3rd redundant LANs 2nd 3rd server redundancy 2nd 3rd 4th 5th STP (Spanning Tree Protocol) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th VLANs 2nd 3rd 4th 5th 6th 7th WLANs 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th workstation-to-router redundancy 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th documenting designs 2nd enterprise edge 2nd multihoming 2nd 3rd 4th 5th redundant WANs 2nd 3rd 4th service provider 2nd 3rd 4th VPNs (virtual private networks) 2nd 3rd 4th 5th 6th 7th 8th full-mesh 2nd 3rd 4th hierarchical 2nd guidelines 2nd 3rd reasons for use 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th three-layer 2nd 3rd 4th 5th 6th 7th 8th hub-and-spoke 2nd 3rd Klamath Paper Products WAN 2nd 3rd 4th loop mapping 2nd modular 2nd 3rd Enterprise Composite Network Model 2nd redundant 2nd backup paths 2nd load sharing 2nd 3rd security firewalls 2nd 3rd physical 2nd three-part firewall topology documenting prototype testing 2nd 3rd topology tables EIGRP (Enhanced Interior Gateway Routing Protocol) totally stubby areas TPID (Tag Protocol Identifier) traceroute command 2nd tradeoffs design 2nd traffic capacity planning characterizing 2nd application usage 2nd broadcast frame 2nd 3rd calculating 2nd 3rd 4th checklist 2nd client/server 2nd distributed computing 2nd documenting 2nd efficiency 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th existing networks 2nd 3rd multicast frame 2nd 3rd peer-to-peer 2nd QoS requirements 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th refining application usage 2nd 3rd 4th 5th 6th 7th routing protocols 2nd server/server 2nd terminal/host 2nd thin client 2nd VoIP networks 2nd 3rd flow data stores 2nd user communities 2nd IOS shaping 2nd Klamath Paper Products WAN 2nd 3rd LANs IEEE 802.1p 2nd 3rd management design 2nd Umqua Systems, Inc example DS-1 circuit 2nd FDDI backbone 2nd 3rd 4th 5th Wandering Valley Community College campus LAN 2nd 3rd 4th 5th WANs frame relay 2nd 3rd traffic class fields traffic load (offered load) traffic specification (Tspec) 2nd transit networks translation IPv4 to IPv6 addresses translational bridging Transmission Control Protocol (TCP) congestion control transmission delays transparent bridges spanning-tree algorithm 2nd BackboneFast 2nd Loop Guard 2nd PortFast 2nd 3rd UDLD (Unidirectional Link Detection) 2nd UplinkFast 2nd transparent bridging 2nd 3rd 4th transparent switching 2nd multilayers 2nd 3rd OSI layers 2nd Trap packets SNMP triggered updates IGRP (Interior Gateway Routing Protocol) Trivial File Transfer Protocol (TFTP) troubleshooting count-to-infinity problems fault management 2nd Trunk Frame Relay fragmentation trunk links trunk networks Gigabit Ethernet TSpec (traffic specification) 2nd TTL (time-to-live) field tunneling IPv4 to IPv6 addresses twin-axial cables (twinax) twinax cables type-of-service QoS 2nd 3rd 4th DS (Differentiated Services) field 2nd field 2nd < Day Day Up > < Day Day Up > [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] U reference point ISDN 2nd UBR (unspecified bit rate) ATM Forum 2nd UDLD (Unidirectional Link Detection) 2nd UDP (User Datagram Protocol) flow control traceroute packet umbrella NMSs Umqua Systems, Inc design testing example background information conclusions 2nd 3rd current network 2nd DS-1 circuit 2nd FDDI backbone traffic 2nd 3rd 4th 5th goals 2nd methods 2nd network applications 2nd Oracle user data 2nd 3rd 4th 5th unicast addresses IPv6 aggregatable global 2nd 3rd IPv4 in IPv6 2nd link-local 2nd site-local 2nd Unidirectional Link Detection (UDLD) 2nd UNIX RIP daemon unshielded copper cables unshielded twisted-pair cables (UTP cables) categories 2nd unspecified bit rate [See UBR] UplinkFast 2nd upstream bandwidth cable modems uptime availability reliability usability documenting technical goals 2nd user communities documenting designs Klamath Paper Products WAN 2nd LANs design example 2nd User Datagram Protocol [See UDP] User History Collection group RMON2 users remote access device 2nd 3rd securing services 2nd traffic flow 2nd utilization existing networks 2nd 3rd bandwidth measures 2nd performance 2nd 3rd 4th 5th UTP cables (unshielded twisted-pair cables) categories 2nd < Day Day Up > < Day Day Up > [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] variable-length subnet masking [See VLSM] (VLSM) variance IGRP (Interior Gateway Routing Protocol) load sharing variance measurements VDSL (Very-High-Bit-Rate DSL) version logging vertical wiring 2nd 3rd Very-High-Bit-Rate DSL (VDSL) videoconferencing traffic virtual private networking [See VPNs] virtual private networks [See VPNs] Virtual Router Redundancy Protocol (VRRP) virtual routers Vivinet Assessor (NetIQ) VLAN Trunk Protocol (VTP) 2nd VLAN Trunking Protocol (VTP) VLANs campus network topology 2nd 3rd 4th design 2nd 3rd hierarchical topology distribution layer limiting broadcast domains switches switching protocols 2nd DISL (Dynamic Inter-Switch Link) 2nd IEEE 802.1Q document 2nd ISL (Inter-Switch Link) 2nd VTP (VLAN Trunk Protocol) 2nd VLSM (variable-length subnet masking) 2nd 3rd voice networks GoS (grade of service) requirements 2nd Voice over IP networks [See VoIP networks] voice-grade cabling VoIP networks (Voice over IP networks) traffic flow 2nd 3rd VPNs (virtual private networking) (virtual private networks) concentrators 2nd encryption enterprise edge topology 2nd remote-access 2nd 3rd site-to-site 2nd 3rd security 2nd 3rd 4th software securing wireless networks 2nd 3rd VRRP (Virtual Router Redundancy Protocol) VTP (VLAN Trunk Protocol) 2nd (VLAN Trunking Protocol) < Day Day Up > < Day Day Up > [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] WAN Survival Guide Wandering Valley Community College (WVCC) LANs design example background information 2nd business goals 2nd current network 2nd 3rd 4th 5th 6th 7th 8th 9th 10th data stores 2nd network applications 2nd redesign 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th technical goals 2nd user communities 2nd WANDL, Inc Network-Planning and Analysis Tool [See NPAT] WANs 2nd 3rd 4th (wide area networks) 2nd (wide-area networks) accuracy goals ATM (Asynchronous Transfer Mode) 2nd Ethernet over ATM 2nd bandwidth 2nd 3rd cable modem 2nd challenges 2nd 3rd design example background information 2nd business goals 2nd current network 2nd 3rd 4th 5th data stores 2nd network applications 2nd technical goals 2nd topology 2nd 3rd 4th user communities 2nd device selection central sites 2nd 3rd 4th 5th remote users 2nd 3rd DSL (Digital Subscriber Line) 2nd ADSL PPP implementation 2nd supported services 2nd flat topologies 2nd Frame Relay 2nd ATM (Asynchronous Transfer Mode) 2nd congestion 2nd 3rd hub-and-spoke topology 2nd split horizon subinterfaces 2nd traffic control 2nd 3rd ISDN (Integrate Services Digital Network) 2nd 3rd components 2nd 3rd ISDNs (Integrated Services Digital Network) leased lines 2nd operation affordability optimum utilization PPP (Point-to-Point Protocol) 2nd CHAP (Challenge Handshake Authentication Protocol) 2nd MPPP (Multilink PPP) 2nd PAP (Password Authentication Protocol) 2nd redundant 2nd circuit diversity 2nd routers 2nd servers service providers 2nd 3rd 4th SONET (Synchronous Optical Network) 2nd 3rd wave-division multiplexing (WDM) wave-division multiplexing (WDM) WDM (wave-division multiplexing) WDM (wave-division multiplexing) websites Frame Relay Forum Zeroconf Weighted Fair Queuing (WFQ) 2nd Weighted Random Early Detection (WRED) 2nd weighted-fair queuing (WFQ) Welcherm, Dr Peter fur-ball networks WEP keys (Wired Equivalent Privacy keys) WFQ (Weighted Fair Queuing) 2nd WFQ (weighted-fair queuing) Wi-Fi Protected Access (WPA) 2nd wide area networks [See WANs] wide wavelength-division multiplexing (WWDM) wide-area networks 2nd [See WANs] [See WANs] WildPackets AiroPeek analyzer windowing traffic efficiency 2nd 3rd 4th windows sizing 2nd WINS booting 2nd NetBT 2nd integrating DNS 2nd Wired Equivalent Privacy keys [See WEP keys] wireless access points LANs devices 2nd wireless cells wireless networks security 2nd authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th data privacy 2nd 3rd 4th 5th 6th 7th wireless site surveys 2nd 3rd 4th 5th wiring existing networks 2nd 3rd 4th environmental constraints 2nd 3rd 4th 5th 6th 7th 8th wirless networks LANs design example 2nd 3rd 4th WLANs campus network topology 2nd access points 2nd 3rd 4th multiple access points 2nd redundant access points 2nd 3rd LANs redesign example 2nd 3rd 4th work-area wiring 2nd workstation-to-router redundancy 2nd AppleTalk 2nd IP 2nd 3rd 4th GLBP (Gateway Load Balancing Protocol) 2nd HSRP (Hot Standby Router Protocol) 2nd 3rd 4th Novell NetWare 2nd workstations initialization 2nd 3rd World Wide Web public server access WPA (Wi-Fi Protected Access) 2nd WRED (Weighted Random Early Detection) 2nd WWDM (wide wavelength-division multiplexing) < Day Day Up > < Day Day Up > [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] X Windows X_Hlt430507403 X_Hlt430507914 XOR operation EtherChannel < Day Day Up > < Day Day Up > [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] your address (yiaddr) fields < Day Day Up > < Day Day Up > [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] Zero Configuration Networking [See Zeroconf] Zeroconf (Zero Configuration Networking) IP dynamic addressing 2nd website ZIP (Zone Information Protocol) 2nd ZIP queries ZIP storms Zone Information Protocol (ZIP) 2nd zone information tables < Day Day Up > ... Design Topologies Modular Network Design Designing a Campus Network Design Topology Designing the Enterprise Edge Topology Secure Network Design Topologies Summary Chapter Designing Models for Addressing... Requirements Network Traffic Checklist Summary Summary for Part I Part II Logical Network Design Chapter Designing a Network Topology Hierarchical Network Design Redundant Network Design Topologies... need to support mobile and remote users An increased need for network security An increased need for resilient networks An increased need for manageable networks A renewed recognition that network

Ngày đăng: 27/10/2019, 21:45

Từ khóa liên quan

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan