Data Networks

Book description

Data Networks builds on the foundation laid in Kenyon's first book, High-Performance Data Network Design, with expanded coverage of routing, security, multicasting, and advanced design topics such as performance optimization and fault tolerance. Kenyon provides strategies for overcoming some of the most challenging problems in network design and management. He provides clear, specific solutions for day-to-day problems facing network designers and IT managers. In this book, you will find optimization advice from an experienced practitioner that you can put to work in your own system.

As security and network performance become more and more critical to a company's success, the system administrator's job becomes even more difficult. Use the principles, tips, and techniques Kenyon offers here to enhance and protect the flow of data within your enterprise.

· Covers Addressing, Routing, Multicasting, and Quality of Service (QoS) design for enterprise network design.
· Extensive coverage on relevant Security Technologies and Virtual Private Network (VPN) implementation
· Provides advanced coverage on Risk Assessment, Availability Analysis, Fault Tolerance, Disaster Recovery, and Network Optimization.

Table of contents

  1. Front Cover
  2. Data Networks
  3. Copyright Page
  4. Contents
  5. Preface
  6. Acknowledgments
  7. Chapter 1. A Review of the Basics
    1. 1.1 Network design and performance
    2. 1.2 An overview of the design process (1/3)
    3. 1.2 An overview of the design process (2/3)
    4. 1.2 An overview of the design process (3/3)
    5. 1.3 Building block 1: The framework
    6. 1.4 Building block 2: Applications
    7. 1.5 Building block 3: Protocols (1/3)
    8. 1.5 Building block 3: Protocols (2/3)
    9. 1.5 Building block 3: Protocols (3/3)
    10. 1.6 Building block 4: Hardware (1/3)
    11. 1.6 Building block 4: Hardware (2/3)
    12. 1.6 Building block 4: Hardware (3/3)
    13. 1.7 Building block 5: Physical connectivity
    14. 1.8 Summary
    15. References
  8. Chapter 2. Addressing, Naming, and Configuration
    1. 2.1 The IP addressing model (1/5)
    2. 2.1 The IP addressing model (2/5)
    3. 2.1 The IP addressing model (3/5)
    4. 2.1 The IP addressing model (4/5)
    5. 2.1 The IP addressing model (5/5)
    6. 2.2 Address mapping and configuration techniques (1/5)
    7. 2.2 Address mapping and configuration techniques (2/5)
    8. 2.2 Address mapping and configuration techniques (3/5)
    9. 2.2 Address mapping and configuration techniques (4/5)
    10. 2.2 Address mapping and configuration techniques (5/5)
    11. 2.3 Name-to-address mapping (1/4)
    12. 2.3 Name-to-address mapping (2/4)
    13. 2.3 Name-to-address mapping (3/4)
    14. 2.3 Name-to-address mapping (4/4)
    15. 2.4 Directory services (1/2)
    16. 2.4 Directory services (2/2)
    17. 2.5 Design techniques for optimizing addressing (1/4)
    18. 2.5 Design techniques for optimizing addressing (2/4)
    19. 2.5 Design techniques for optimizing addressing (3/4)
    20. 2.5 Design techniques for optimizing addressing (4/4)
    21. 2.6 Summary
    22. References
  9. Chapter 3. Routing Technology
    1. 3.1 Internetwork architecture and topology
    2. 3.2 Routing algorithms
    3. 3.3 Routing design issues (1/3)
    4. 3.3 Routing design issues (2/3)
    5. 3.3 Routing design issues (3/3)
    6. 3.4 Routing protocols (1/9)
    7. 3.4 Routing protocols (2/9)
    8. 3.4 Routing protocols (3/9)
    9. 3.4 Routing protocols (4/9)
    10. 3.4 Routing protocols (5/9)
    11. 3.4 Routing protocols (6/9)
    12. 3.4 Routing protocols (7/9)
    13. 3.4 Routing protocols (8/9)
    14. 3.4 Routing protocols (9/9)
    15. 3.5 Router addressing issues
    16. 3.6 Route redistribution
    17. 3.7 Router architecture (1/3)
    18. 3.7 Router architecture (2/3)
    19. 3.7 Router architecture (3/3)
    20. 3.8 Summary
    21. References
  10. Chapter 4. Multicast Network Design
    1. 4.1 Multicast application and routing concepts (1/4)
    2. 4.1 Multicast application and routing concepts (2/4)
    3. 4.1 Multicast application and routing concepts (3/4)
    4. 4.1 Multicast application and routing concepts (4/4)
    5. 4.2 Group registration with IGMP (1/2)
    6. 4.2 Group registration with IGMP (2/2)
    7. 4.3 Multicast routing with DVMRP (1/2)
    8. 4.3 Multicast routing with DVMRP (2/2)
    9. 4.4 Multicast routing with MOSPF
    10. 4.5 Multicast routing with PIM (1/2)
    11. 4.5 Multicast routing with PIM (2/2)
    12. 4.6 Multicast routing with CBT
    13. 4.7 Interoperability and interdomain routing (1/2)
    14. 4.7 Interoperability and interdomain routing (2/2)
    15. 4.8 Multicast support protocols
    16. 4.9 Service and management issues
    17. 4.10 Summary
    18. References
  11. Chapter 5. Designing Secure Networks
    1. 5.1 The driving forces and issues behind security (1/2)
    2. 5.1 The driving forces and issues behind security (2/2)
    3. 5.2 Developing the security policy
    4. 5.3 Security technology and solutions (1/7)
    5. 5.3 Security technology and solutions (2/7)
    6. 5.3 Security technology and solutions (3/7)
    7. 5.3 Security technology and solutions (4/7)
    8. 5.3 Security technology and solutions (5/7)
    9. 5.3 Security technology and solutions (6/7)
    10. 5.3 Security technology and solutions (7/7)
    11. 5.4 VPN architectures
    12. 5.5 IP Security architecture (IPSec) (1/5)
    13. 5.5 IP Security architecture (IPSec) (2/5)
    14. 5.5 IP Security architecture (IPSec) (3/5)
    15. 5.5 IP Security architecture (IPSec) (4/5)
    16. 5.5 IP Security architecture (IPSec) (5/5)
    17. 5.6 Designing VPNs (1/2)
    18. 5.6 Designing VPNs (2/2)
    19. 5.7 Summary
    20. References
  12. Chapter 6. Designing Reliable Networks
    1. 6.1 Planning for failure (1/5)
    2. 6.1 Planning for failure (2/5)
    3. 6.1 Planning for failure (3/5)
    4. 6.1 Planning for failure (4/5)
    5. 6.1 Planning for failure (5/5)
    6. 6.2 Network resilience (1/4)
    7. 6.2 Network resilience (2/4)
    8. 6.2 Network resilience (3/4)
    9. 6.2 Network resilience (4/4)
    10. 6.3 Fault-tolerant, high-availability, and clustering systems (1/5)
    11. 6.3 Fault-tolerant, high-availability, and clustering systems (2/5)
    12. 6.3 Fault-tolerant, high-availability, and clustering systems (3/5)
    13. 6.3 Fault-tolerant, high-availability, and clustering systems (4/5)
    14. 6.3 Fault-tolerant, high-availability, and clustering systems (5/5)
    15. 6.4 Component-level availability (1/2)
    16. 6.4 Component-level availability (2/2)
    17. 6.5 Example resilient network design
    18. 6.6 Summary
    19. References
  13. Chapter 7. Network Optimization
    1. 7.1 Optimizing network bandwidth (1/3)
    2. 7.1 Optimizing network bandwidth (2/3)
    3. 7.1 Optimizing network bandwidth (3/3)
    4. 7.2 System-level traffic engineering (1/3)
    5. 7.2 System-level traffic engineering (2/3)
    6. 7.2 System-level traffic engineering (3/3)
    7. 7.3 Load-splitting and load-sharing techniques (1/4)
    8. 7.3 Load-splitting and load-sharing techniques (2/4)
    9. 7.3 Load-splitting and load-sharing techniques (3/4)
    10. 7.3 Load-splitting and load-sharing techniques (4/4)
    11. 7.4 Optimizing applications (1/4)
    12. 7.4 Optimizing applications (2/4)
    13. 7.4 Optimizing applications (3/4)
    14. 7.4 Optimizing applications (4/4)
    15. 7.5 Optimizing protocols (1/2)
    16. 7.5 Optimizing protocols (2/2)
    17. 7.6 Optimizing storage
    18. 7.7 Summary
    19. References
  14. Chapter 8. Quality of Service
    1. 8.1 Quality-of-service models (1/4)
    2. 8.1 Quality-of-service models (2/4)
    3. 8.1 Quality-of-service models (3/4)
    4. 8.1 Quality-of-service models (4/4)
    5. 8.2 Traffic engineering with policy and QoS constraints (1/4)
    6. 8.2 Traffic engineering with policy and QoS constraints (2/4)
    7. 8.2 Traffic engineering with policy and QoS constraints (3/4)
    8. 8.2 Traffic engineering with policy and QoS constraints (4/4)
    9. 8.3 LAN and WAN media QoS features (1/3)
    10. 8.3 LAN and WAN media QoS features (2/3)
    11. 8.3 LAN and WAN media QoS features (3/3)
    12. 8.4 Integrated Services (IS) (1/4)
    13. 8.4 Integrated Services (IS) (2/4)
    14. 8.4 Integrated Services (IS) (3/4)
    15. 8.4 Integrated Services (IS) (4/4)
    16. 8.5 Differentiated Services (DS) (1/2)
    17. 8.5 Differentiated Services (DS) (2/2)
    18. 8.6 Integrating QoS
    19. 8.7 Summary
    20. References
  15. Chapter 9. Network Management
    1. 9.1 Network management technologies (1/9)
    2. 9.1 Network management technologies (2/9)
    3. 9.1 Network management technologies (3/9)
    4. 9.1 Network management technologies (4/9)
    5. 9.1 Network management technologies (5/9)
    6. 9.1 Network management technologies (6/9)
    7. 9.1 Network management technologies (7/9)
    8. 9.1 Network management technologies (8/9)
    9. 9.1 Network management technologies (9/9)
    10. 9.2 Network troubleshooting tools (1/4)
    11. 9.2 Network troubleshooting tools (2/4)
    12. 9.2 Network troubleshooting tools (3/4)
    13. 9.2 Network troubleshooting tools (4/4)
    14. 9.3 Policy-based management (1/2)
    15. 9.3 Policy-based management (2/2)
    16. 9.4 Summary
    17. References
  16. Appendix A: Mathematical Review (1/2)
  17. Appendix A: Mathematical Review (2/2)
  18. Appendix B: DNS Top Level Domain Codes
  19. Appendix C: IP Protocol Numbers (1/2)
  20. Appendix C: IP Protocol Numbers (2/2)
  21. Appendix D: UDP and TCP Port Numbers (1/6)
  22. Appendix D: UDP and TCP Port Numbers (2/6)
  23. Appendix D: UDP and TCP Port Numbers (3/6)
  24. Appendix D: UDP and TCP Port Numbers (4/6)
  25. Appendix D: UDP and TCP Port Numbers (5/6)
  26. Appendix D: UDP and TCP Port Numbers (6/6)
  27. Appendix E: Multicast and Broadcast Addresses (1/3)
  28. Appendix E: Multicast and Broadcast Addresses (2/3)
  29. Appendix E: Multicast and Broadcast Addresses (3/3)
  30. Appendix F: EtherType Assignments (1/2)
  31. Appendix F: EtherType Assignments (2/2)
  32. Appendix G: Example MTTR Procedures
  33. Index (1/7)
  34. Index (2/7)
  35. Index (3/7)
  36. Index (4/7)
  37. Index (5/7)
  38. Index (6/7)
  39. Index (7/7)

Product information

  • Title: Data Networks
  • Author(s): Tony Kenyon
  • Release date: June 2002
  • Publisher(s): Digital Press
  • ISBN: 9780080503660