skip to content
Building resilient ip networks Preview this item
ClosePreview this item
Checking...

Building resilient ip networks

Author: Kok-Keong Lee; Safari Tech Books Online.
Publisher: Indianapolis, IN : Cisco Press, 2005.
Edition/Format:   Computer file : EnglishView all editions and formats
Summary:

Aiming to capture the essence of technologies that contribute to the uptime of networks, this is a practical guide to building resilient and highly available IP networks. It helps you examine  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Kok-Keong Lee; Safari Tech Books Online.
OCLC Number: 873842737
Notes: Made available through: Safari Books Online, LLC.
Mode of access: World Wide Web.
Reproduction Notes: Electronic reproduction Available via World Wide Web Boston, MA : Safari.
Description: p. cm S.
Contents: IntroductionChapter 1 Rise of the IP Transport SystemThe Internet ExplosionNext-Generation IP ApplicationsVoice over IPIP StorageMPLS: New Kid on the BlockNext-Generation IP Transport SystemContinuous Improvements of ProtocolsChapter 2 Establishing a High-Availability NetworkUnderstanding the Five-Nines Availability DebateDifferentiating Between Reliability and AvailabilityThe Five-Nines ApproachIdiosyncrasies of the Telcordia GR-512-Core DocumentThe Truth About 50-ms ResiliencyA Practical Approach to Achieving High AvailabilityMeasuring AvailabilityDefining a MetricUnderstanding the Issue of Network AvailabilitySetting a Strategy to Achieve High AvailabilityDesigning a Network for High AvailabilityEstablishing Continuous Fault Detection and Measurement of Network AvailabilityMaking Full Use of Scheduled DowntimeInstituting a Disciplined Approach to Network Operation and ProcessesSummaryChapter 3 Fundamentals of IP Resilient NetworksRevisiting IP, TCP, and UDPInternet ProtocolTransmission Control ProtocolTCP Three-Way HandshakeTCP Sliding WindowUser Datagram ProtocolDevice-Level ResiliencyOnline Insertion and Removal (OIR)Single Line Card ReloadHigh System AvailabilityRoute Processor RedundancyRoute Processor Redundancy PlusStateful SwitchoverNonstop ForwardingImpact of Different Switching PathsProcess SwitchingCisco Express Forwarding SwitchingCentral CEFDistributed CEFProtecting the Control Plane and Data PlaneEstablishing a Resiliency StrategyRedundancy StrategyLogical ResiliencyPhysical ResiliencyScaling StrategyKey Principles for Designing Resilient NetworksSimplicityModularitySecuritySummaryChapter 4 Quality of ServiceProtecting the Control Plane with QoSTraffic Types That Affect the Control PlaneTagging Routing Protocol and Layer 2 Control PacketsIP PrecedenceThe pak_priority FlagSelective Packet DiscardReceive ACLControl-Plane PolicingProtecting Applications with QoSUnderstanding the Need for Application QoSLatencyJitterLossDetermining When to Deploy QoSScenario 1: Undercongested LinkScenario 2: Occasionally Congested LinkScenario 3: Badly Congested LinkBuilding Blocks of QoSClassification and MarkingCongestion AvoidanceCongestion ManagementTraffic ConditioningApplication QoS and Control-Plane TrafficQoS Deployment StrategyClassifying ApplicationsDefining PoliciesTesting PoliciesImplementing QoS FeaturesMonitoringSummaryChapter 5 Core ModuleNetwork Convergence in the CoreOSPF EnhancementsShortest Path First (SPF) ThrottlingOSPF LSA ThrottlingOSPF LSA Flooding ReductionOSPF Fast HelloOSPF Update Packet-Pacing TimerOSPF Incremental SPFOSPF Graceful RestartRFC 3623Cisco ImplementationIS-IS EnhancementsIS-IS SPF ThrottlingIS-IS LSP GenerationIS-IS LSA Flooding ReductionIS-IS Fast HellosIS-IS Update Packet-Pacing TimerIS-IS Incremental SPFIS-IS Graceful RestartCisco ImplementationIETF ImplementationEIGRP EnhancementsEIGRP Graceful ShutdownEIGRP Graceful RestartEIGRP Stub Router FunctionalityBidirectional Forwarding Detection (BFD)IP Event DampeningMultipath RoutingLoad BalancingEqual-Cost Multipath (ECMP)Per PacketPer DestinationMPLS Traffic EngineeringFast Reroute Link ProtectionFast Reroute Node ProtectionMulticast Subsecond ConvergenceSummaryChapter 6 Access ModuleMultilayer Campus DesignAccess LayerDistribution LayerCore LayerAccess Module Building BlocksLayer 2 DomainThe Spanning Tree Protocol: IEEE 802.1dPortFastUplinkFastBackboneFastUnidirectional Link Detection (UDLD)RootGuardLoopGuardBPDUGuardVLANs and TrunkingCommon Spanning Tree (CST)Per-VLAN Spanning Tree (PVST)Per-VLAN Spanning Tree Plus (PVST+)IEEE 802.1wIEEE 802.1sChanneling TechnologyLayer 2 Best PracticesSimple Is BetterLimit the Span of VLANsBuild Triangles, Not SquaresProtect the Network from UsersSelecting Root BridgesUse Value-Added FeaturesEtherChannel DeploymentEtherChannel Load BalancingConsistent EtherChannel Port SettingsLayer 2 Setting for EtherChannelTurning Off AutonegotiationLayer 3 DomainHot Standby Routing Protocol (HSRP)Virtual Router Redundancy Protocol (VRRP)Global Load Balancing Protocol (GLBP)Layer 3 Best PracticesAdopt Topology-Based SwitchingUsing Equal-Cost MultipathConserve Peering ResourcesAdopt a Hierarchical Addressing SchemeSummaryChapter 7 Internet ModuleUnderstanding Addressing and Routing in the Internet ModuleAddress-Assignment SchemeRoutingRouting for Internal UsersRouting for External UsersEstablishing Internet Module RedundancyLink-Level RedundancyDevice-Level RedundancyISP-Level RedundancySite-Level RedundancyImplementing Security MeasuresSecurity PolicyFiltering at the Internet ModuleResilient Border Gateway Protocol (BGP) DesignBGP Soft ReconfigurationBGP Convergence OptimizationBGP Next-Hop Address TrackingBGP Support for Fast Peering Session DeactivationBGP Route DampeningNonstop Forwarding with Stateful Switchover (NSF/SSO) for BGPUsing Network Address Translation (NAT)Enhanced NAT ResiliencyNAT with Route MapStatic Mapping with Hot Standby Routing Protocol (HSRP) SupportStateful NATLimiting NAT EntriesMultihoming with NATEffects of NAT on Network and ApplicationsImplications on TCP and ICMP TrafficApplication-Specific GatewaysEffects on Voice over IP (VoIP) TrafficEffects on Router Performance Effects on Network SecuritySummaryChapter 8 WAN ModuleLeased LineDomestic Leased Circuit Versus International Private Leased CircuitLeased Circuit EncapsulationEqual-Cost Load BalancingMultilink Point-to-Point Protocol (MPPP)SONET/SDHSONET/SDH FramingPPP over SONET/SDHSONET/SDH Protection SwitchingResilient Packet RingDPT ArchitectureDPT/SRP Classes of ServiceSRP QueuingSRP Fairness AlgorithmRPR StandardsDifferences Between 802.17 and DPT/SRPDial BackupVirtual Private Network (VPN)IP TunnelL2TPv3L2TPv3 DeploymentMPLS-VPNSummaryChapter 9 Data Center ModuleData Center Environmental ConsiderationsCablingTaggingDocumentationDisciplineRack SpaceServer SizePowerNext-Generation Server ArchitectureData Center Network ConsiderationsSecurityServer PerformanceFault-Tolerant Server FeaturesMultifaceted ServerData Center Network ArchitectureAccess Layer DesignNIC TeamingClusteringAggregation Layer Design Trunk Ports on an Aggregation Switch Routed Ports on an Aggregation SwitchArchitecture Scaling ConsiderationData Center Network SecurityLayer 2 SecurityPrivate VLANs (PVLANs)VLAN Access Control List (VACL)Port SecurityDynamic ARP InspectionLayer 3 SecuritySwitch Forwarding ArchitectureControl Plane PolicingDHCP Server ProtectionService OptimizationServer Load BalancingGlobal Site SelectorUnderstanding DNS ResolutionUsing GSSWeb Cache Communication Protocol (WCCP)Integrated Service ModulesSummaryChapter 10 Beyond Implemention: Network ManagmentComponents of Network ManagementFault ManagementConfiguration ManagementConfiguration File ManagementInventory ManagementSoftware ManagementAccounting Management Performance ManagementSecurity ManagementACLsUser IDs and PasswordsTACACSEstablishing a BaselineStep 1: Take a Snapshot of InventoryStep 2: Collect Relevant DataMIB Entries and Object IdentifiersMulti-Router Traffic GrapherStep 3: Analyze DataStep 4: Prioritize Problem AreasStep 5: Determine a Course of ActionManaging Cisco IOS DeploymentOverview of IOS ReleasesUnderstanding IOS Naming ConventionIOS Software Life Cycle ManagementPlanningDesignTestingImplementationOperationMoving Toward Proactive ManagementIP Service Level AgreementICMP-Based IP SLA OperationResponder-Based IP SLA OperationNonresponder-Based IP SLA OperationExamples of IP SLA OperationsComponent Outage Online (COOL) MeasurementEmbedded Event Manager (EEM)Next-Generation IOS ArchitectureSummaryEnd NotesAppendix A Calculating Network AvailabilityAppendix BRFCs Relevant to Building a Resilient IP NetworkAppendix CThe Cisco Powered Network ChecklistIndex1587052156TOC112205
Responsibility: Kok-Keong Lee, Seo-Boon Ng.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(1)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/873842737> # Building resilient ip networks
    a schema:CreativeWork, bgn:ComputerFile ;
   library:oclcnum "873842737" ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/47135806#Place/indianapolis_in> ; # Indianapolis, IN
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/sz> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/47135806#Thing/electronic_books_local> ; # Electronic books / local
   schema:contributor <http://experiment.worldcat.org/entity/work/data/47135806#Organization/safari_tech_books_online> ; # Safari Tech Books Online.
   schema:creator <http://experiment.worldcat.org/entity/work/data/47135806#Person/lee_kok_keong> ; # Kok-Keong Lee
   schema:datePublished "2005" ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/47135806> ;
   schema:inLanguage "en" ;
   schema:isSimilarTo <http://worldcat.org/entity/work/data/47135806#CreativeWork/> ;
   schema:name "Building resilient ip networks" ;
   schema:productID "873842737" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/873842737#PublicationEvent/indianapolis_in_cisco_press_2005> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/47135806#Agent/cisco_press> ; # Cisco Press
   schema:url <http://proquest.tech.safaribooksonline.de/1587052156> ;
   schema:url <http://proquest.safaribooksonline.com/1587052156> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/873842737> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/47135806#Organization/safari_tech_books_online> # Safari Tech Books Online.
    a schema:Organization ;
   schema:name "Safari Tech Books Online." ;
    .

<http://experiment.worldcat.org/entity/work/data/47135806#Person/lee_kok_keong> # Kok-Keong Lee
    a schema:Person ;
   schema:familyName "Lee" ;
   schema:givenName "Kok-Keong" ;
   schema:name "Kok-Keong Lee" ;
    .

<http://experiment.worldcat.org/entity/work/data/47135806#Place/indianapolis_in> # Indianapolis, IN
    a schema:Place ;
   schema:name "Indianapolis, IN" ;
    .

<http://experiment.worldcat.org/entity/work/data/47135806#Thing/electronic_books_local> # Electronic books / local
    a schema:Thing ;
   schema:name "Electronic books / local" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.