Tài liệu Cisco - Network Consultants Handbook pptx

1.3K 587 0
Tài liệu Cisco - Network Consultants Handbook pptx

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Network Consultants Handbook About the Author 10 About the Technical Reviewers 11 Acknowledgments . 12 Foreword 13 Introduction . 14 Purpose of This Book . 16 How This Book Can Be Used . 17 The Twelve Networking Truths 17 Feedback 19 Chapter 1. Open System Interconnection (OSI) Model . 20 OSI Reference Model . 20 Summary 31 Chapter 2. LAN Topologies 32 Unicast . 32 Multicast 33 Broadcast . 34 LAN Addressing 38 LAN Topologies . 39 LAN Topologies . 47 Routers . 56 Summary 56 Chapter 3. Ethernet/IEEE 802.3 . 58 Ethernet Network Elements 62 Ethernet Network Topologies and Structures 63 IEEE 802.3 Logical Relationship to the OSI Reference Model . 65 CSMA/CD Operation . 71 The Ethernet Physical Layers . 82 10 Mbps Ethernet Operation . 83 100 Mbps, or Fast Ethernet . 92 100VG-AnyLAN 99 1000 Mbps, or Gigabit (Gbps) Ethernet 104 10 Gbps, or 10 Gigabit Ethernet . 107 Summary 113 Chapter 4. Ethernet Documentation 113 Case Study: Naming Conventions . 114 Small Ethernet (Hub-Based) Networks . 117 Documentation Case Study . 121 Summary 150 Chapter 5. Ethernet Network Review and Analysis . 150 Cisco Router Interface Commands . 151 show interface ethernet number accounting 170 show buffers ethernet . 173 Buffer Misses . 177 show processes cpu 179 CPU Utilization 181 Ethernet Network Analysis . 182 Ethernet Frame Transmission . 182 Ethernet Baseline 187 Ethernet MTU 191 Ethernet Throughput . 192 Ethernet Effective Utilization . 195 Ethernet with IP Networking 197 Ethernet with IPX Networking . 204 Case Study: Ethernet Network Analyzers . 211 Summary 216 Chapter 6. Token Ring/IEEE 802.5 . 221 Token Ring 221 Physical Connections 224 Token Ring Operation 225 Token Holding Time (THT) . 233 Frame Format . 239 Dedicated Token Ring 243 Summary 247 Chapter 7. FDDI . 248 Fiber-Optic Transmission Modes 249 FDDI Topology 250 FDDI LAN Applications 261 Summary 261 Chapter 8. Token Ring and FDDI LAN Documentation . 262 Case Study: Naming Conventions . 264 Case Study: Simple Token Ring LAN 267 Case Study: Simple FDDI LAN 271 Summary 275 Chapter 9. Token Ring and FDDI Network Review and Analysis . 275 Token Ring LANs 276 FDDI LANs . 312 FDDI LANs . 348 Summary 385 Chapter 10. ATM LAN Emulation (LANE) . 385 Emulated LAN Environments . 387 LAN Emulation Clients (LECs) 394 LAN Emulation Servers (LESs) 395 LAN Emulation Applications . 417 Summary 418 Chapter 11. ATM LANE Documentation, Review, and Analysis . 419 Effective Operating Rate 420 ATM LANE Traffic Classes . 421 IOS Commands 427 ATM LANE Documentation 443 Summary 450 Chapter 12. Telecommunications and Telephony . 451 Voice Signaling 451 ANI 460 Lines and Trunks 463 ISDN 473 DSL 483 Summary 494 Chapter 13. Private Line WANs . 496 T1 Basics . 496 TDM 500 T1 Documentation 515 T1 Access . 520 T1 Testing and Analysis . 523 DS0 Basics . 526 DS3 530 Summary 533 Chapter 14. Fiber-Optic Technology . 534 Optic Bands and Transmission Windows 536 SONET/SDH 541 DWDM 550 Summary 554 Chapter 15. Frame Relay . 557 Frame Relay Terms and Concepts 559 Frame Relay Applications 599 Frame Relay Traffic Shaping 631 Traffic Policing and Shaping 639 Summary 651 Chapter 16. Frame Relay Documentation . 656 Case Study: Naming Conventions . 658 Frame Relay DLCI Table . 697 Summary 700 Chapter 17. Frame Relay WAN Analysis 702 Frame Relay Traffic Shaping 702 Frame Relay Oversubscription 708 Frame Relay Data Delivery Ratio (DDR) . 713 Frame Relay SLAs . 719 Summary 720 Chapter 18. ATM Wide-Area Networking (WAN) and MPOA . 722 ATM Network Architecture . 725 ATM WAN Interfaces 727 PNNI Signaling 732 ATM Connections 733 ATM Cells and Cell Relay 734 ATM Service Classes . 736 ATM Service Architecture 737 ATM Service Categories Description . 741 ATM Functional Layers . 748 ATM Addressing 755 ATM Applications 757 Multiprotocol Over ATM (MPOA) . 761 Three Elements of MPOA 763 MPOA Logical Components 765 Caching 766 Virtual Subnets . 766 Network Layer Mapping . 767 Taking a Shortcut: The Basic Concept 768 MPOA Packet Flow 770 Migration and Coexistence . 772 Inverse Multiplexing for ATM (IMA) 773 Summary 775 Chapter 19. ATM WAN Documentation 777 Case Study: Naming Conventions . 778 ATM VPI/VCI Table 804 Summary 807 Chapter 20. Voice Technology . 807 VoIP Network Elements . 808 Session Initiation Protocol (SIP) . 839 VoIP Equipment Adjustment 844 VoX Call Establishment . 848 VoX Summary . 849 Voice over ATM (VoATM) 850 VoATM Expectations . 861 VoATM Summary 870 Voice over Frame Relay (VoFR) 871 VoIP . 876 VoX Circuit Sizing . 877 Summary 880 Chapter 21. Remote Access and VPNs 882 Remote Access . 882 LAN-to-LAN VPN . 890 Authentication 890 Encryption Alternatives 898 Telecommunications Access Methods to a Local ISP . 907 Policy and Administrative Management . 910 VPN Network Requirements 916 Remote Access VPN Network Design 922 VPN User-Access Requirements 927 VPN Performance Requirements 928 VPN Client Essentials, Security Guidelines, and Vulnerabilities . 931 DHCP Support . 936 Summary 938 Chapter 22. Network Management Introduction . 938 Network Management Architecture 939 Network Management Model . 941 Network Management Functional Architecture . 953 MIB 957 Summary 965 Chapter 23. IP VPN WAN Documentation 967 Remote Access Documentation Template . 969 IOS Commands 977 Summary 982 Chapter 24. Routing Protocols, Part I 982 Routing: Static Versus Dynamic . 983 Routing Information Protocol (RIP) 991 RIP Routing Protocol Summary 1006 RIP Version 2 (RIPv2) . 1006 RIPv2 Summary . 1010 IGRP 1010 IGRP Summary 1020 EIGRP 1021 EIGRP Summary 1028 OSPF 1029 OSPF Summary 1042 Summary 1042 Chapter 25. Routing Protocols, Part II . 1047 Intermediate System to Intermediate System (IS-IS) . 1047 IS-IS Summary . 1057 Border Gateway Protocol, Version 4 (BGP4) 1058 BGP Summary . 1082 EGP 1086 EGP Summary 1088 Summary . 1089 Chapter 26. IPv6 Introduction . 1091 IPv6 Terms . 1095 IPv6 Addressing . 1096 IPv6 Neighbor Discover Protocol (NDP) 1109 IPv4/IPv6 Transition 1110 IPv4/IPv6 Network Address Translation (NAT) . 1112 IPv6 Header . 1112 IPv6/IPv4 Tunneling 1115 6to4 Tunnel Management . 1117 6to4 Case Study 1118 Summary 1126 Chapter 27. Multiprotocol Label Switching (MPLS) 1127 Label-Edge Routers (LERs) and Label\_Switching Routers (LSRs) 1129 Forward Equivalence Classes (FECs) . 1129 Labels and Label Bindings . 1130 MPLS Fundamentals . 1131 Multilayer Switching 1134 MPLS Evolution . 1139 MPLS Model 1140 MPLS and Layer 3 Forwarding 1143 MPLS Operation 1144 MPLS Enhanced Routing . 1147 MPLS Applications 1148 MPLS Virtual Private Networks (MPLS-VPNs) . 1152 IP/MPLS Network 1154 BGP-Extended Community Attributes 1155 MPLS VPN Operational Model 1156 Summary 1162 Appendix A. LAN/WAN Network Assessment 1163 Introduction . 1163 Executive Summary of Findings . 1163 Current Network Topology and Characterization 1164 Recommendations 1173 Network Health 1173 Network Provisioning . 1195 Subnet Masks . 1197 Data Transmission Throughput . 1200 Mesh Network Connectivity . 1205 VoIP Bandwidth Consumption . 1210 Appendix B. Protocol List 1212 Appendix C. List of ITU-T X.121 Data Country or Geographical Area Codes . 1242 Appendix E. Bibliography 1255 About the Author Matthew "Cat" Castelli has more than 13 years of experience in the telecommunications networking industry, starting as a cryptologic technician (communications) in the United States Navy. Cat has since been working as a principal consultant for a Cisco Professional Services partner and as a senior technical consultant/enterprise network design engineer for a global telecommunications integrator. Cat has broad exposure to LAN/WAN, Internet, and Alternative technologies (VoX) for service provider and enterprise networks of all sizes, including implementation, application, configuration, integration, network management, and security solutions. Cat currently holds CCNA, CCDA, CCNP, and CCDP certifications and recently completed Technical Review for Advanced MPLS Design and Implementation (Cisco Press). When Cat is not involved with network design or engineering, he can be found pursuing his degree, reading, cheering for the Los Angeles Dodgers, or simply enjoying a cigar and scotch. Cat is currently a network architect engineer for Global Crossing. He can be contacted at mjcastelli@earthlink.net . [...]... a single packet is sent from the source to a destination on a network The source-node addresses the packet by using the network address of the destination node The packet is then forwarded to the destination network and the network passes the packet to its final destination Figure 2-1 is an example of a unicast network Figure 2-1 Unicast Network Multicast With a multicast transmission, a single data... across the network Figure 2-3 is an example of a broadcast network Figure 2-3 Broadcast Network Multimedia broadcast traffic is a much more bandwidth-intensive broadcast traffic type Multimedia broadcasts, unlike data broadcasts, typically are several megabits in size; therefore, they can quickly consume network and bandwidth resources Broadcast-based protocols are not preferred because every network. .. that makes it more manageable for a consultant to apply the knowledge to the problem Cisco Press has numerous books on networking What Matt offers in this book is something that I have not seen presented elsewhere Network Consultants Handbook is a must-have for those professionals who need to solve various complex networking problems on a daily basis The reader gets a general overview, followed by... another layer provides services to the higher layer, which makes remembering what each layer does easier For example, the network layer needs to deliver data end-to-end To do this task, the network layer uses data links to forward the data to the next successive device along that end-to-end path Layer Interactions The following sequence outlines the basics of processing at each layer and explains how each... data A network device, such as a router (demonstrated by Router 1), will interconnect the two host devices—in this case, Host A and Host B Router 1 is involved in this process of data delivery because Router 1 is interconnected to both Host A's and B's network, data link, and physical layers Figure 1-3 OSI Model Internetworking Data Encapsulation The process by which data is handled layer-to-layer... in care of Cisco Press, or directly at mjcastelli@earthlink.net Chapter 1 Open System Interconnection (OSI) Model Although practically every networking book on the market today discusses the Open System Interconnection (OSI) model, its importance should not be taken for granted For this reason, the OSI model will be discussed here as it pertains to local-area networks (LANs) and wide-area networks (WANs)... subset of nodes on the network The source node addresses the packet by using a multicast address For example, the TCP/IP suite uses 224.0.0.0 to 239.255.255.255 The packet is then sent to the network, which makes copies of the packet and sends a copy to each segment with a node that is part of the multicast address Figure 2-2 is an example of a multicast network Figure 2-2 Multicast Network Broadcast Broadcasts... are found in LAN environments Broadcasts do not traverse a WAN unless the Layer 3 edge-routing device is configured with a helper address (or the like) to direct these broadcasts to a specified network address This Layer 3 routing device acts as an interface between the local-area network (LAN) and the wide-area network (WAN) NOTE Broadcasts will traverse a WAN if the WAN is bridged NOTE Ethernet... example, RJ-45 defines the shape of the connector and the number of wires/pins in the cable Ethernet and 802.3 define the use of wires/pins 1, 2, 3, and 6 To use a category 5 cable with an RJ-45 connector for an Ethernet connection, Ethernet and RJ-45 physical layer specifications are used Examples of Layer 1 (physical) protocol specifications include EIA/TIA-232, EIA/TIA-449, V.35, V.24, RJ-45, Ethernet,... large projects in the networking industry, especially in the professional services or consulting arenas, have started with the statements: "There's something wrong in the network! " or the famous "The network is slow!" A large part of a networking consultant's working life can be devoted to identifying and resolving the underlying cause of those statements When asked to resolve a networking issue, a consultant . problem. Cisco Press has numerous books on networking. What Matt offers in this book is something that I have not seen presented elsewhere. Network Consultants. a "greatest hits" of internetworking technologies, augmenting Cisco Press’s Internetworking Technologies Handbook: Third Edition, with the addition

Ngày đăng: 10/12/2013, 14:16

Từ khóa liên quan

Tài liệu cùng người dùng

Tài liệu liên quan