Network Virtualization

Network Virtualization

4 (2 ratings by Goodreads)
By (author)  , By (author) 

List price: US$70.00

Currently unavailable

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks

Description

Share network resources and reduce costs while providing secure network services to diverse user communities Presents the business drivers for network virtualization and the major challenges facing network designers today Shows how to use virtualization designs with existing applications, such as VoIP and network services, such as quality of service and multicast Provides design alternatives for different real-world deployment scenarios, with configuration examples and case studies Today's enterprises have several groups of users with specific needs. The differences between these groups translate into specific network requirements. Within some organizations, these requirements are so dissimilar that the different groups need to be treated as totally separate customers by the enterprise's IT department. As the number of groups increases, keeping them separate and secure is a challenge to IT departments, particularly with the advent of wireless networks, the requirement for enterprise-wide user mobility, and the need for cross group collaboration with resource sharing on a per project basis. Network Virtualization provides design guidance for virtualized enterprise networks and arms network architects with the background necessary to make sound technological choices in the face of different business requirements. As a means of introduction, Network Virtualization lays out the fundamentals of enterprise network design. The book builds upon these fundamental principles to introduce the different virtualization methods as the logical evolution of the enterprise network architecture. Detailed descriptions of the technology, design principles, network configurations, and real-world case studies are provided throughout the book, helping readers develop a pragmatic understanding of virtualized enterprise network architectures. Specific examples are included that tailor deployment advice to the small, medium, and large enterprise environment.
show more

Product details

  • Hardback | 408 pages
  • 182.9 x 233.7 x 27.9mm | 816.48g
  • Pearson Education (US)
  • Cisco Press
  • Indianapolis, United States
  • English
  • 1587052482
  • 9781587052484

Back cover copy

Share network resources and reduce costs while providing secure network services to diverse user communities Presents the business drivers for network virtualization and the major challenges facing network designers today Shows how to use virtualization designs with existing applications, such as VoIP and network services, such as quality of service and multicast Provides design alternatives for different real-world deployment scenarios, with configuration examples and case studies Today's enterprises have several groups of users with specific needs. The differences between these groups translate into specific network requirements. Within some organizations, these requirements are so dissimilar that the different groups need to be treated as totally separate customers by the enterprise's IT department. As the number of groups increases, keeping them separate and secure is a challenge to IT departments, particularly with the advent of wireless networks, the requirement for enterprise-wide user mobility, and the need for cross group collaboration with resource sharing on a per project basis. "Network Virtualization" provides design guidance for virtualized enterprise networks and arms network architects with the background necessary to make sound technological choices in the face of different business requirements. As a means of introduction, "Network Virtualization" lays out the fundamentals of enterprise network design. The book builds upon these fundamental principles to introduce the different virtualization methods as the logical evolution of the enterprise network architecture. Detailed descriptions of the technology, design principles, network configurations, and real-world case studies are provided throughout the book, helping readers develop a pragmatic understanding of virtualized enterprise network architectures. Specific examples are included that tailor deployment advice to the small, medium, and large enterprise environment.
show more

Table of contents

Table of ContentsIntroductionPart I A Network Architecture for the Virtual Enterprise3Chapter 1 Business Drivers Behind Enterprise Network VirtualizationWhy Virtualize?Visitors, Partners, Contractors, and Quarantine AreasRegulatory ComplianceSecure Service AreasNetwork ConsolidationAcquisitions and MergersMultitenant EnterprisesVirtual Project Environment: Next-Generation Business ProcessesBusiness Requirements Drive Technical RequirementsSummaryChapter 2 Designing Scalable Enterprise NetworksHierarchical Campus DesignVirtualizing the CampusWAN DesignWAN Provider Service OfferingsWAN ArchitectureWAN ResiliencyWAN Routing ConsiderationsSecuring the WANWAN VirtualizationSummaryChapter 3 Basic Virtualized EnterpriseThe Virtual EnterpriseTransport Virtualization-VNsVLANs and ScalabilityVirtualizing the Routed CoreThe LAN Edge: Authentication and AuthorizationCentral Services Access: Virtual Network PerimeterUnprotected ServicesSummaryChapter 4 A Virtualization Technologies Primer: TheoryNetwork Device VirtualizationLayer 2: VLANsLayer 3: VRF InstancesLayer 2 Again: VFIsVirtual Firewall ContextsNetwork Device Virtualization SummaryData-Path VirtualizationLayer 2: 802.1q TrunkingGeneric Routing EncapsulationIPsecL2TPv3Label Switched PathsData-Path Virtualization SummaryControl-Plane Virtualization-Routing ProtocolsVRF-Aware RoutingMulti-Topology RoutingControl-Plane Virtualization SummarySummaryChapter 5 Infrastructure Segmentation Architectures: TheoryHop to HopLayer 3 H2HSingle Address Space AlternativesH2H SummaryTunnel Overlay for L3VPNL3VPN Using GRE and IPsec OverlayPutting It All Together: DMVPNLayer 3 Tunnel SummaryTunnel Overlay for Layer 2 VPNsLayer 2 P2P Overlay Using L2TPv3Layer 2 P2P Overlay Using MPLSLayer 2 VPN MP2MP Using MPLS (VPLS)Layer 2 VPN SummaryPeer-Based Model for Layer 3 VPNsRFC 2547bis the MPLS WayRFC 2547bis Forwarding-Plane AlternativesInter-Autonomous System Connectivity: Another Application of TunnelsCarrier Supporting CarrierInter-Autonomous System RoutingInter-Autonomous System Connectivity SummarySummaryPart II Enterprise Virtualization Techniques and Best PracticesChapter 6 Infrastructure Segmentation Architectures: PracticeHop-to-Hop VLANsLayer 3 Hop to HopSingle Address Space SolutionsTunnel Overlay for Layer 3 VPNsGRE TunnelsMultipoint GRE TunnelsMapping Traffic to TunnelsResiliency and Routing ConsiderationsEncryption ConsiderationsLayer 3 VPNsRFC 2547bis the MPLS WayRFC 2547bis over L2TPv3RFC 2547bis over GREIGP Best PracticesBGP Best Practices: Route ReflectorsBGP Best Practices: Route Distinguishers and ECMP RoutingMigration RecommendationsLayer 2 VPNsEthernet over MPLSVPLSSummary Chapter 7 Extending the Virtualized Enterprise over the WANWAN ServicesIP ServicesLayer 2 CircuitsP2P GREMultipoint GREDynamic Multipoint VPNExtending Segmentation over the WANMPLS over Layer 2 CircuitsVRF-to-VRF Connections at the Autonomous System Border RoutersMP-eBGP Exchange of Labeled VPN-IPv4 Routes Between Adjacent ASBRsMultihop MP-eBGP Between Remote Autonomous SystemsUsing MPLS over Layer 2 Circuits for Segmented Branch AggregationBenefits and DrawbacksContracting Multiple IP VPNsBenefits and DrawbacksCarrier Supporting Carrier (CsC)Using CsC for Segmented Branch AggregationBenefits and DrawbacksMPLS over GREBenefits and DrawbacksRFC 2547 VPNs over L2TPv3 TunnelsBenefits and DrawbacksVRFs Interconnected by a GRE or DMVPN OverlayBenefits and DrawbacksRFC 2547 VPNs over DMVPNBenefits and DrawbacksSummaryChapter 8 Traffic Steering and Service CentralizationShared Services: Protected vs. UnprotectedUnprotected ServicesProtected ServicesUnprotected Services AccessBasic Import/Export MechanismAny-to-Any and Hub-and-Spoke VPNsExtranet VPNLocalized Inter-VPN CommunicationLeaking Traffic with the Global TableProtected Services AccessFirewalling for Common ServicesRouted Firewalls and Transparent FirewallsRouted Firewall DeploymentsTransparent Firewall DeploymentsProviding IP ServicesDHCPDomain Name System (DNS) ServicesSummaryChapter 9 Multicast in a Virtualized EnvironmentMulticast IntroductionInternet Group Management Protocol (IGMP)Multicast RoutingProtocol Independent Multicast (PIM)VRFs and MulticastMulticast Sourced from an External IP NetworkMulticast Across VRFs (mVPN Extranet)mVPN TransportGlobalTunnel OverlaymVPNConnecting the WANSummary Chapter 10 Quality of Service in a Virtualized EnvironmentQoS Models and Mechanisms: A ReviewDifferentiated ServicesMPLS Quality of ServiceTunnels and PipesMPLS Traffic Engineering and Guaranteed BandwidthDS-TE and Guaranteed BandwidthDo I Really Need This in an Enterprise Network?QoS Models for Virtualized NetworksOne Policy per GroupSummaryChapter 11 The Virtualized Access LayerAccess Layer SwitchingImplementing Dynamic Authentication and AuthorizationClientless AuthenticationClient-Based Layer 2Virtualizing the Access LayerLayer 3 AccessSummaryPart III AppendixesAppendix A L2TPv3 Expanded CoverageL2TPv3 Control ChannelL2TPv3 Data ChannelAppendix B MPLS QoS, Traffic Engineering, and Guaranteed BandwidthMPLS QoS-Uniform Tunnel and Pipe ModesMPLS Traffic EngineeringMPLS Fast RerouteGuaranteed BandwidthAppendix C Recommended ReadingAppendix D RFCs and Internet DraftsIndex
show more

About Victor Moreno

Kumar Reddy is a senior manager of Technical Marketing Engineering at Cisco Systems. Kumar has more than 15 years of industry experience. He has held a variety of roles at Cisco as a technical specialist for a range of products and technology, including Broadband DSL, LAN Switching and, most recently, designing end-to-end systems for small and medium businesses. Victor Moreno, CCIE #6908, is a Technical Marketing Engineer at Cisco Systems. Victor is a CCIE and has more than 10 years of industry experience. Victor is a recognized expert in the field of virtual enterprise networks and has been involved with enterprise campus network virtualization since 2001. Victor resides in San Jose, CA.
show more

Rating details

2 ratings
4 out of 5 stars
5 0% (0)
4 100% (2)
3 0% (0)
2 0% (0)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X