Jeżeli nie znalazłeś poszukiwanej książki, skontaktuj się z nami wypełniając formularz kontaktowy.

Ta strona używa plików cookies, by ułatwić korzystanie z serwisu. Mogą Państwo określić warunki przechowywania lub dostępu do plików cookies w swojej przeglądarce zgodnie z polityką prywatności.

Wydawcy

Literatura do programów

Informacje szczegółowe o książce

Designing and Developing Scalable IP Networks - ISBN 9780470867396

Designing and Developing Scalable IP Networks

ISBN 9780470867396

Autor: Guy Davies

Wydawca: Wiley

Dostępność: 3-6 tygodni

Cena: 605,85 zł

Przed złożeniem zamówienia prosimy o kontakt mailowy celem potwierdzenia ceny.


ISBN13:      

9780470867396

ISBN10:      

0470867396

Autor:      

Guy Davies

Oprawa:      

Hardback

Rok Wydania:      

2004-07-27

Ilość stron:      

302

Wymiary:      

253x178

Tematy:      

TJ

Today′s aggressively competitive networking market requires offering the maximum range of services using prevailing assets, not building bigger, more complicated networks, but smarter, more scalable infrastructures. It isn′t an easy thing to do.
The challenge is to develop an existing network so as to maximise its profitability. A multi–vendor approach to the subject is necessary, since existing infrastructure is rarely homogeneous. Discussion cannot merely be rooted in theory, but has to bring to the fore actual designs and real development.
Guy Davies′s invaluable reference tool is the product of many years′ experience in designing and developing real scalable systems for both service providers and enterprise networks. It is a comprehensive demonstration of how to build scalable networks, the pitfalls to avoid, and a compilation of the most successful mechanisms available for engineers building and operating IP networks.
Designing and Developing Scalable IP Networks:Documents practical scaling mechanisms for both service providers and enterprise networks using illustrative real world configuration examples.Recommends policy choices and explains them in the context of the commercial environment.Provides a reference for engineers building and migrating networks based on the author′s familiarity with both Juniper Networks′ components and Cisco Systems′ routers.Is founded on the author’s experience working with large networks in the USA and Europe, as well as Asia Pacific.
This incomparable reference to scaling networks is suitable for network designers, architects, engineers and managers. It will also be an authoritative guide for technically aware sales and marketing staff and service engineers. It is a valuable resource for graduate and final year computing and communications engineering students and for engineers studying for both the JNCIE and CCIE examinatio ns.

Spis treści:
List of Figures.
List of Tables.
About the Author.
Acknowledgements.
Abbreviations.
Introduction.
1 Hardware Design.
1.1 Separation of Routing and Forwarding Functionality.
1.2 Building Blocks.
1.2.1 Control Module.
1.2.2 Forwarding Module.
1.2.3 Non–Stop Forwarding.
1.2.4 Stateful Failover.
1.3 To Flow or Not to Flow?
1.4 Hardware Redundancy, Single Chassis or Multi Chassis.
2 Transport Media.
2.1 Maximum Transmission Unit (MTU).
2.1.1 Path MTU Discovery.
2.1.2 Port Density.
2.1.3 Channelized Interfaces.
2.2 Ethernet.
2.2.1 Address Resolution Protocol (ARP).
2.2.2 MTU.
2.3 Asynchronous Transfer Mode (ATM).
2.4 Packet Over SONET (POS).
2.5 SRP/RPR and DPT.
2.5.1 Intelligent Protection Switching.
2.6 (Fractional) E1/T1/E3/T3.
2.7 Wireless Transport.
2.7.1 Regulatory Constraints.
2.7.2 Interference.
2.7.3 Obstructions.
2.7.4 Atmospheric Conditions.
2.7.5 If it is so bad . . . .
3 Router and Network Management.
3.1 The Importance of an Out–Of–Band (OOB) Network.
3.1.1 Management Ethernet.
3.1.2 Console Port.
3.1.3 Auxiliary (Aux) Port.
3.1.4 Remote Power Management.
3.1.5 Uninterruptible Power Supplies (UPS).
3.2 Network Time Protocol (NTP).
3.3 Logging.
3.4 Simple Network Management Protocol (SNMP).
3.4.1 SNMPv1, v2c and v3.
3.5 Remote Monitoring (RMON).
3.6 Network Management Systems.
3.6.1 CiscoWorks.
3.6.2 JUNOScope.
3.6.3 Non–Proprietary Systems.
3.7 Configuration Management.
3.7.1 Concurrent Version System (CVS).
3.7.2 Scripting and Other Automated Configuration Distribution and Storage Mechanisms.
3.8 To Upgrade or Not to Upgrade.
3.8.1 Software Release Cycles.
3.9 Capacity Planning Techniques.
4 Network Security.
4.1 Securing Access to Your Network Devices.
4.1.1 Physical Security.
4.1.2 Au thentication, Authorization and Accounting (AAA).
4.2 Securing Access to the Network Infrastructure.
4.2.1 Authentication of Users, Hosts and Servers.
4.2.2 Encryption of Information.
4.2.3 Access Tools and Protocols.
4.2.4 IP Security (IPsec).
4.2.5 Access Control Lists.
4.2.6 RFC 1918 Addresses.
4.2.7 Preventing and Tracing Denial of Service (DoS) Attacks.
4.3 Protecting Your Own and Others’ Network Devices.
5 Routing Protocols.
5.1 Why Different Routing Protocols?
5.2 Interior Gateway Protocols (IGP).
5.2.1 Open Shortest Path First (OSPF).
5.2.2 Authentication of OSPF.
5.2.3 Stub Areas, Not So Stubby Areas (NSSA) and Totally Stubby Areas.
5.2.4 OSPF Graceful Restart.
5.2.5 OSPFv3.
5.2.6 Intermediate System to Intermediate System (IS–IS).
5.2.7 Authentication of IS–IS.
5.2.8 IS–IS Graceful Restart.
5.2.9 Routing Information Protocol (RIP).
5.2.10 Interior Gateway Routing Protocol (IGRP) and Enhanced Interior Gateway Routing Protocol (EIGRP).
5.2.11 Diffusing Update Algorithm (DUAL).
5.2.12 Stuck–in–Active.
5.2.13 Why use EIGRP?
5.3 Exterior Protocols.
5.3.1 Border Gateway Protocol (BGP).
5.3.2 Authentication of BGP.
5.3.3 BGP Graceful Restart.
5.3.4 Multiprotocol BGP.
6 Routing Policy.
6.1 What is Policy For?
6.1.1 Who Pays Whom?
6.2 Implementing Scalable Routing Policies.
6.3 How is Policy Evaluated?
6.3.1 AND or OR?
6.3.2 The Flow of Policy Evaluation.
6.4 Policy Matches.
6.5 Policy Actions.
6.5.1 The Default Action.
6.5.2 Accept/Permit, Reject/Deny, and Discard.
6.6 Policy Elements.
6.7 AS Paths.
6.8 Prefix Lists and Route Lists.
6.9 Internet Routing Registries.
6.10 Communities.
6.11 Multi–Exit Discriminator (MED).
6.12 Local Preference.
6.13 Damping.
6.14 Unicast Reverse Path Forwarding.
6.15 Policy Routing/Filter–Based Forwarding.
6.16 Policy Recommendations.
6.16.1 Policy Recommendations for Customer Connections.
6.16.2 Policy Recommendations for Peering Connections.
6.16.3 Policy Recommendations for Transit Connections.
6.17 Side Effects of Policy.
7 Multiprotocol Label Switching (MPLS).
7.1 Traffic Engineering.
7.2 Label Distribution Protocols.
7.3 Tag Distribution Protocol (TDP).
7.4 Label Distribution Protocol (LDP).
7.4.1 LDP Graceful Restart.
7.5 RSVP with Traffic Engineering Extensions (RSVP–TE).
7.5.1 RSVP–TE Graceful Restart.
7.5.2 OSPF with Traffic Engineering Extensions (OSPF–TE).
7.5.3 IS–IS with Traffic Engineering Extensions (IS–IS–TE).
7.6 Fast Reroute.
7.7 Integrating ATM and IP Networks.
7.8 Generalized MPLS (GMPLS).
8 Virtual Private Networks (VPNs).
8.1 VPNs at Layer 3.
8.1.1 Layer 3 VPN (RFC 2547bis).
8.1.2 Generic Router Encapsulation (GRE).
8.1.3 IPsec.
8.2 VPNs at Layer 2.
8.2.1 Circuit Cross–Connect (CCC).
8.2.2 Translational Cross–Connect (TCC).
8.2.3 Martini (Layer 2 circuits).
8.2.4 Virtual Private Wire Service (VPWS).
8.2.5 Virtual Private LAN Service (VPLS).
8.2.6 Layer 2 Tunnelling Protocol (L2TP).
9 Class of Service and Quality of Service.
9.1 Design and Architectural Issues of CoS/QoS.
9.2 CoS/QoS Functional Elements.
9.2.1 Classification.
9.2.2 Congestion Notification Mechanisms.
9.2.3 Congestion Avoidance Mechanisms.
9.2.4 Queueing Strategies.
9.3 QoS Marking Mechanisms.
9.3.1 Layer 2 Marking.
9.3.2 Layer 3 QoS.
9.3.3 MPLS EXP.
9.4 Integrating QoS at Layer 2, in IP and in MPLS.
9.4.1 DiffServ Integration with MPLS.
10 Multicast.
10.1 Multicast Forwarding at Layer 2.
10.1.1 Multicast on Ethernet and FDDI.
10.1.2 Multicast Over Token Ring.
10.1.3 Internet Group Management Protocol (IGMP).
10.1.4 IGMP Snooping.
10.1.5 PIM/DVMRP Snooping.
10.1.6 Immed

Koszyk

Książek w koszyku: 0 szt.

Wartość zakupów: 0,00 zł

ebooks
covid

Kontakt

Gambit
Centrum Oprogramowania
i Szkoleń Sp. z o.o.

Al. Pokoju 29b/22-24

31-564 Kraków


Siedziba Księgarni

ul. Kordylewskiego 1

31-542 Kraków

+48 12 410 5991

+48 12 410 5987

+48 12 410 5989

Zobacz na mapie google

Wyślij e-mail

Subskrypcje

Administratorem danych osobowych jest firma Gambit COiS Sp. z o.o. Na podany adres będzie wysyłany wyłącznie biuletyn informacyjny.

Autoryzacja płatności

PayU

Informacje na temat autoryzacji płatności poprzez PayU.

PayU banki

© Copyright 2012: GAMBIT COiS Sp. z o.o. Wszelkie prawa zastrzeżone.

Projekt i wykonanie: Alchemia Studio Reklamy