Book description
Data Networks builds on the foundation laid in Kenyon's first book, High-Performance Data Network Design, with expanded coverage of routing, security, multicasting, and advanced design topics such as performance optimization and fault tolerance. Kenyon provides strategies for overcoming some of the most challenging problems in network design and management. He provides clear, specific solutions for day-to-day problems facing network designers and IT managers. In this book, you will find optimization advice from an experienced practitioner that you can put to work in your own system.As security and network performance become more and more critical to a company's success, the system administrator's job becomes even more difficult. Use the principles, tips, and techniques Kenyon offers here to enhance and protect the flow of data within your enterprise.
· Covers Addressing, Routing, Multicasting, and Quality of Service (QoS) design for enterprise network design.
· Extensive coverage on relevant Security Technologies and Virtual Private Network (VPN) implementation
· Provides advanced coverage on Risk Assessment, Availability Analysis, Fault Tolerance, Disaster Recovery, and Network Optimization.
Table of contents
- Front Cover
- Data Networks
- Copyright Page
- Contents
- Preface
- Acknowledgments
-
Chapter 1. A Review of the Basics
- 1.1 Network design and performance
- 1.2 An overview of the design process (1/3)
- 1.2 An overview of the design process (2/3)
- 1.2 An overview of the design process (3/3)
- 1.3 Building block 1: The framework
- 1.4 Building block 2: Applications
- 1.5 Building block 3: Protocols (1/3)
- 1.5 Building block 3: Protocols (2/3)
- 1.5 Building block 3: Protocols (3/3)
- 1.6 Building block 4: Hardware (1/3)
- 1.6 Building block 4: Hardware (2/3)
- 1.6 Building block 4: Hardware (3/3)
- 1.7 Building block 5: Physical connectivity
- 1.8 Summary
- References
-
Chapter 2. Addressing, Naming, and Configuration
- 2.1 The IP addressing model (1/5)
- 2.1 The IP addressing model (2/5)
- 2.1 The IP addressing model (3/5)
- 2.1 The IP addressing model (4/5)
- 2.1 The IP addressing model (5/5)
- 2.2 Address mapping and configuration techniques (1/5)
- 2.2 Address mapping and configuration techniques (2/5)
- 2.2 Address mapping and configuration techniques (3/5)
- 2.2 Address mapping and configuration techniques (4/5)
- 2.2 Address mapping and configuration techniques (5/5)
- 2.3 Name-to-address mapping (1/4)
- 2.3 Name-to-address mapping (2/4)
- 2.3 Name-to-address mapping (3/4)
- 2.3 Name-to-address mapping (4/4)
- 2.4 Directory services (1/2)
- 2.4 Directory services (2/2)
- 2.5 Design techniques for optimizing addressing (1/4)
- 2.5 Design techniques for optimizing addressing (2/4)
- 2.5 Design techniques for optimizing addressing (3/4)
- 2.5 Design techniques for optimizing addressing (4/4)
- 2.6 Summary
- References
-
Chapter 3. Routing Technology
- 3.1 Internetwork architecture and topology
- 3.2 Routing algorithms
- 3.3 Routing design issues (1/3)
- 3.3 Routing design issues (2/3)
- 3.3 Routing design issues (3/3)
- 3.4 Routing protocols (1/9)
- 3.4 Routing protocols (2/9)
- 3.4 Routing protocols (3/9)
- 3.4 Routing protocols (4/9)
- 3.4 Routing protocols (5/9)
- 3.4 Routing protocols (6/9)
- 3.4 Routing protocols (7/9)
- 3.4 Routing protocols (8/9)
- 3.4 Routing protocols (9/9)
- 3.5 Router addressing issues
- 3.6 Route redistribution
- 3.7 Router architecture (1/3)
- 3.7 Router architecture (2/3)
- 3.7 Router architecture (3/3)
- 3.8 Summary
- References
-
Chapter 4. Multicast Network Design
- 4.1 Multicast application and routing concepts (1/4)
- 4.1 Multicast application and routing concepts (2/4)
- 4.1 Multicast application and routing concepts (3/4)
- 4.1 Multicast application and routing concepts (4/4)
- 4.2 Group registration with IGMP (1/2)
- 4.2 Group registration with IGMP (2/2)
- 4.3 Multicast routing with DVMRP (1/2)
- 4.3 Multicast routing with DVMRP (2/2)
- 4.4 Multicast routing with MOSPF
- 4.5 Multicast routing with PIM (1/2)
- 4.5 Multicast routing with PIM (2/2)
- 4.6 Multicast routing with CBT
- 4.7 Interoperability and interdomain routing (1/2)
- 4.7 Interoperability and interdomain routing (2/2)
- 4.8 Multicast support protocols
- 4.9 Service and management issues
- 4.10 Summary
- References
-
Chapter 5. Designing Secure Networks
- 5.1 The driving forces and issues behind security (1/2)
- 5.1 The driving forces and issues behind security (2/2)
- 5.2 Developing the security policy
- 5.3 Security technology and solutions (1/7)
- 5.3 Security technology and solutions (2/7)
- 5.3 Security technology and solutions (3/7)
- 5.3 Security technology and solutions (4/7)
- 5.3 Security technology and solutions (5/7)
- 5.3 Security technology and solutions (6/7)
- 5.3 Security technology and solutions (7/7)
- 5.4 VPN architectures
- 5.5 IP Security architecture (IPSec) (1/5)
- 5.5 IP Security architecture (IPSec) (2/5)
- 5.5 IP Security architecture (IPSec) (3/5)
- 5.5 IP Security architecture (IPSec) (4/5)
- 5.5 IP Security architecture (IPSec) (5/5)
- 5.6 Designing VPNs (1/2)
- 5.6 Designing VPNs (2/2)
- 5.7 Summary
- References
-
Chapter 6. Designing Reliable Networks
- 6.1 Planning for failure (1/5)
- 6.1 Planning for failure (2/5)
- 6.1 Planning for failure (3/5)
- 6.1 Planning for failure (4/5)
- 6.1 Planning for failure (5/5)
- 6.2 Network resilience (1/4)
- 6.2 Network resilience (2/4)
- 6.2 Network resilience (3/4)
- 6.2 Network resilience (4/4)
- 6.3 Fault-tolerant, high-availability, and clustering systems (1/5)
- 6.3 Fault-tolerant, high-availability, and clustering systems (2/5)
- 6.3 Fault-tolerant, high-availability, and clustering systems (3/5)
- 6.3 Fault-tolerant, high-availability, and clustering systems (4/5)
- 6.3 Fault-tolerant, high-availability, and clustering systems (5/5)
- 6.4 Component-level availability (1/2)
- 6.4 Component-level availability (2/2)
- 6.5 Example resilient network design
- 6.6 Summary
- References
-
Chapter 7. Network Optimization
- 7.1 Optimizing network bandwidth (1/3)
- 7.1 Optimizing network bandwidth (2/3)
- 7.1 Optimizing network bandwidth (3/3)
- 7.2 System-level traffic engineering (1/3)
- 7.2 System-level traffic engineering (2/3)
- 7.2 System-level traffic engineering (3/3)
- 7.3 Load-splitting and load-sharing techniques (1/4)
- 7.3 Load-splitting and load-sharing techniques (2/4)
- 7.3 Load-splitting and load-sharing techniques (3/4)
- 7.3 Load-splitting and load-sharing techniques (4/4)
- 7.4 Optimizing applications (1/4)
- 7.4 Optimizing applications (2/4)
- 7.4 Optimizing applications (3/4)
- 7.4 Optimizing applications (4/4)
- 7.5 Optimizing protocols (1/2)
- 7.5 Optimizing protocols (2/2)
- 7.6 Optimizing storage
- 7.7 Summary
- References
-
Chapter 8. Quality of Service
- 8.1 Quality-of-service models (1/4)
- 8.1 Quality-of-service models (2/4)
- 8.1 Quality-of-service models (3/4)
- 8.1 Quality-of-service models (4/4)
- 8.2 Traffic engineering with policy and QoS constraints (1/4)
- 8.2 Traffic engineering with policy and QoS constraints (2/4)
- 8.2 Traffic engineering with policy and QoS constraints (3/4)
- 8.2 Traffic engineering with policy and QoS constraints (4/4)
- 8.3 LAN and WAN media QoS features (1/3)
- 8.3 LAN and WAN media QoS features (2/3)
- 8.3 LAN and WAN media QoS features (3/3)
- 8.4 Integrated Services (IS) (1/4)
- 8.4 Integrated Services (IS) (2/4)
- 8.4 Integrated Services (IS) (3/4)
- 8.4 Integrated Services (IS) (4/4)
- 8.5 Differentiated Services (DS) (1/2)
- 8.5 Differentiated Services (DS) (2/2)
- 8.6 Integrating QoS
- 8.7 Summary
- References
-
Chapter 9. Network Management
- 9.1 Network management technologies (1/9)
- 9.1 Network management technologies (2/9)
- 9.1 Network management technologies (3/9)
- 9.1 Network management technologies (4/9)
- 9.1 Network management technologies (5/9)
- 9.1 Network management technologies (6/9)
- 9.1 Network management technologies (7/9)
- 9.1 Network management technologies (8/9)
- 9.1 Network management technologies (9/9)
- 9.2 Network troubleshooting tools (1/4)
- 9.2 Network troubleshooting tools (2/4)
- 9.2 Network troubleshooting tools (3/4)
- 9.2 Network troubleshooting tools (4/4)
- 9.3 Policy-based management (1/2)
- 9.3 Policy-based management (2/2)
- 9.4 Summary
- References
- Appendix A: Mathematical Review (1/2)
- Appendix A: Mathematical Review (2/2)
- Appendix B: DNS Top Level Domain Codes
- Appendix C: IP Protocol Numbers (1/2)
- Appendix C: IP Protocol Numbers (2/2)
- Appendix D: UDP and TCP Port Numbers (1/6)
- Appendix D: UDP and TCP Port Numbers (2/6)
- Appendix D: UDP and TCP Port Numbers (3/6)
- Appendix D: UDP and TCP Port Numbers (4/6)
- Appendix D: UDP and TCP Port Numbers (5/6)
- Appendix D: UDP and TCP Port Numbers (6/6)
- Appendix E: Multicast and Broadcast Addresses (1/3)
- Appendix E: Multicast and Broadcast Addresses (2/3)
- Appendix E: Multicast and Broadcast Addresses (3/3)
- Appendix F: EtherType Assignments (1/2)
- Appendix F: EtherType Assignments (2/2)
- Appendix G: Example MTTR Procedures
- Index (1/7)
- Index (2/7)
- Index (3/7)
- Index (4/7)
- Index (5/7)
- Index (6/7)
- Index (7/7)
Product information
- Title: Data Networks
- Author(s):
- Release date: June 2002
- Publisher(s): Digital Press
- ISBN: 9780080503660
You might also like
book
Optimization of Computer Networks
This book covers the design and optimization of computer networks applying a rigorous optimization methodology, applicable …
book
Ad Hoc Networks: Routing, Qos and Optimization
This work presents ad hoc networks and their characteristics. It explains a new protocol of routing …
book
Convergence Through All-IP Networks
The convergence of two powerful technologies-wireless and the Internet-through IPv4/v6 protocol has led to emergence of …
book
SOHO Networking: A Guide to Installing a Small-Office/Home-Office Network
Choose the right network-wired or wireless Set up your hardware and Windows networking—step by step! Share …