Flylib.com
Campus Network Design Fundamentals
Campus Network Design Fundamentals
ISBN: 1587052229
EAN: 2147483647
Year: 2005
Pages: 156
Authors:
Diane Teare
,
Catherine Paquet
BUY ON AMAZON
Campus Network Design Fundamentals
Table of Contents
Copyright
About the Authors
About the Technical Reviewers. (cisco network administrator)
Acknowledgments
Icons Used in This Book
Introduction
Part I: Designing Networks
Chapter 1. Network Design
What Is Design?
Design Principles
Modular Network Design
Summary
Endnotes
Part II: Technologies: What you Need to know and why you Need to know it
Chapter 2. Switching Design
Making the Business Case
Switching Types
Spanning Tree Protocol
Virtual LANs
Multilayer Switching and Cisco Express Forwarding
Switching Security
Switching Design Considerations
Summary
Endnotes
Chapter 3. Pv4 Routing Design
Making the Business Case
IPv4 Address Design
IPv4 Routing Protocols
IPv4 Routing Protocol Selection
Summary
Endnotes
Chapter 4. Network Security Design
Making the Business Case
Hacking
Vulnerabilities
Threats
Mitigating Technologies
SAFE Campus Design
Summary
Endnotes
Chapter 5. Wireless LAN Design
Making the Business Case
Wireless Technology Overview
Wireless Security
Wireless Management
Wireless Design Considerations
Summary
Endnotes
Chapter 6. Quality of Service Design
Making the Business Case
QoS Requirements for Voice, Data, Video, and Other Traffic
QoS Models
QoS Tools
QoS Design Guidelines
Summary
Endnotes
Chapter 7. Voice Transport Design
What Is Voice Transport?
Quality of Service
VoIP Components
IP Telephony Components
Voice Coding and Compression Techniques
Bandwidth Requirements
IP Telephony Design
Voice Security
Summary
Endnotes
Chapter 8. Content Networking Design
Making the Business Case
Content Networking
Content Caches and Content Engines
Content Routing
Content Distribution and Management
Content Switching
Designing Content Networking
Summary
Endnotes
Chapter 9. Network Management Design
Making the Business Case
ISO Network Management Standard
Network Management Protocols and Tools
Managing a Network
Network Management Design
Summary
Endnotes
Chapter 10. Other Enabling Technologies
IP Multicast
Increasing Network Availability
Storage Networking
IP Version 6
Summary
Endnotes
Part III: Designing Your Network: How to Apply What You Know
Chapter 11. Case Study Context: Venti Systems
Background Information and Context
Network Requirements After Acquisitions Are Complete
Summary
Chapter 12. Case Study Solution: Venti Systems
Design Model
Switching
Security
IP Addressing and Routing Protocol
E-Mail
QoS and Voice
Wireless
Network Management
Future Considerations
Summary
Endnotes
Part IV: Appexdixes
Appendix A. References
Appendix B. Network Fundamentals
Introduction to Networks
Protocols and the OSI Model
LANs and WANs
Network Devices
Introduction to the TCPIP Suite
Routing
Addressing
Comprehensive Example
Summary
Appendix C. Decimal-Binary Conversion
Decimal-to-Binary Conversion Chart
Decimal Numbers
Binary Numbers
Converting Binary IP Addresses to Decimal
Converting Decimal IP Addresses to Binary
Appendix D. Abbreviations
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
L
M
N
O
P
Q
R
S
T
U
V
W
Page #155 (Index)
Campus Network Design Fundamentals
ISBN: 1587052229
EAN: 2147483647
Year: 2005
Pages: 156
Authors:
Diane Teare
,
Catherine Paquet
BUY ON AMAZON
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
Command-Line Completion
The line Command
Cable
Dial-on-Demand Routing
Tunnels
Cisco CallManager Fundamentals (2nd Edition)
Storage and Maintenance of CDR Data
Identifying CDR Data Generated for Each Call Type
Telephony Service Solutions
Appendix C. Protocol Details
SIP Signaling
MySQL Cookbook
Obtaining the Number of Rows Affected by a Query
Exporting Table Contents or Definitions in SQL Format
Finding Rows in One Table That Match Rows in Another
Generating Click to Sort Table Headings
A.1. Obtaining Sample Source Code and Data
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity II
Tcpdump
Snort
NFR Security
Incident Response
Mastering Delphi 7
The Delphi Programming Language
Writing Delphi Components
Reporting with Rave
Web Programming with WebBroker and WebSnap
The Microsoft .NET Architecture from the Delphi Perspective
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 3. Connect Mac OS X with a Bluetooth Phone
Hack 27. Detect Networks on Mac OS X
Hack 44. Authenticate Wireless Users
Hack 54. Boot from a Compact Flash Hard Drive
Section A.5. 802.16: WiMAX Long Distance Wireless Infrastructure
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies