Top-Down Network Design
14%
off

Top-Down Network Design

3.75 (62 ratings by Goodreads)
By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 3 business days
When will my order arrive?

Description

ObjectivesThe purpose of Top-Down Network Design, Third Edition, is to help you design networks that meet a customer's business and technical goals. Whether your customer is another department within your own company or an external client, this book provides you with tested processes and tools to help you understand traffic flow, protocol behavior, and internetworking technologies. After completing this book, you will be equipped to design enterprise networks that meet a customer's requirements for functionality, capacity, performance, availability, scalability, affordability, security, and manageability. AudienceThis book is for you if you are an internetworking professional responsible for designing and maintaining medium- to large-sized enterprise networks. If you are a network engineer, architect, or technician who has a working knowledge of network protocols and technologies, this book will provide you with practical advice on applying your knowledge to internetwork design. This book also includes useful information for consultants, systems engineers, and sales engineers who design corporate networks for clients. In the fast-paced presales environment of many systems engineers, it often is difficult to slow down and insist on a top-down, structured systems analysis approach. Wherever possible, this book includes shortcuts and assumptions that can be made to speed up the network design process. Finally, this book is useful for undergraduate and graduate students in computer science and information technology disciplines. Students who have taken one or two courses in networking theory will find Top-Down Network Design, Third Edition, an approachable introduction to the engineering and business issues related to developing real-world networks that solve typical business problems. Changes for the Third EditionNetworks have changed in many ways since the second edition was published. Many legacy technologies have disappeared and are no longer covered in the book. In addition, modern networks have become multifaceted, providing support for numerous bandwidth-hungry applications and a variety of devices, ranging from smart phones to tablet PCs to high-end servers. Modern users expect the network to be available all the time, from any device, and to let them securely collaborate with coworkers, friends, and family. Networks today support voice, video, high-definition TV, desktop sharing, virtual meetings, online training, virtual reality, and applications that we can't even imagine that brilliant college students are busily creating in their dorm rooms. As applications rapidly change and put more demand on networks, the need to teach a systematic approach to network design is even more important than ever. With that need in mind, the third edition has been retooled to make it an ideal textbook for college students. The third edition features review questions and design scenarios at the end of each chapter to help students learn top-down network design. To address new demands on modern networks, the third edition of Top-Down Network Design also has updated material on the following topics:? Network redundancy? Modularity in network designs? The Cisco SAFE security reference architecture? The Rapid Spanning Tree Protocol (RSTP)? Internet Protocol version 6 (IPv6)? Ethernet scalability options, including 10-Gbps Ethernet and Metro Ethernet? Network design and management toolsshow more

Product details

  • Hardback | 600 pages
  • 193.04 x 233.68 x 27.94mm | 952.54g
  • Pearson Education (US)
  • Cisco Press
  • Indianapolis, United States
  • English
  • 3rd edition
  • 1587202832
  • 9781587202834
  • 187,846

Back cover copy

Top-Down Network DesignThird Edition Priscilla Oppenheimer A systems analysis approach to enterprise network design The authoritative book on designing networks that align with business goals" ""Top-Down Network Design," Third Edition, is a practical and comprehensive guide to designing enterprise networks that are reliable, secure, and scalable. The book uses a top-down approach to help you focus first on applications and user requirements before selecting devices, cabling, and other technologies to implement the network. The book takes you through an explanation of how to design networks that align with business goals so that the network can keep pace with changing user requirements. This new edition provides a comprehensive look at enterprise network design and the different modules of an enterprise network. Using illustrations and real-world examples, the book covers campus network design, wireless networks, remote access, and wide-area connectivity. You learn how to analyze business and technical requirements and select topologies and technologies that are based on that analysis. A major focus is on security as network users become more mobile. You also develop an understanding of network performance factors and methods for building reliable networks that can scale as traffic loads increase. This Third Edition includes updated and expanded material on wireless networks, virtual private networks (VPN), network security, network redundancy, modularity in network designs, dynamic addressing for IPv4 and IPv6, Ethernet scalability options (including 10-Gbps Ethernet, Metro Ethernet, and Long-Reach Ethernet), and networks that carry voice and data traffic. In addition you will learn how to build networks that can support real-time video, collaborative computing, and social networking tools and that adhere to the Cisco SAFE Security Reference Architecture. Every chapter now includes a set of essay questions and design scenarios to give you a chance to practice what you have learned. The book also has a companion website at www.topdownbook.com, which includes updates to the book, links to white papers, and supplemental information about design resources. Learn a network design process that results in networks that perform well, provide security, and scale to meet growing demands for bandwidthDevelop network designs that provide the high bandwidth and low delay required for real-time applications such as multimedia, distance learning, videoconferencing, teleprescene, virtual communities, and IP telephonyMaster techniques for checking the health of an existing network to develop a baseline for measuring performance of a new network designExplore solutions for meeting QoS requirements, including IETF controlled-load and guaranteed services, IP multicast, and advanced switching, queuing, and routing algorithmsIdentify the advantages and disadvantages of various switching and routing protocols, including Rapid Spanning Tree Protocol (RSTP), IEEE 802.1Q, EIGRP, OSPF, and BGP4 "This book is part of the Networking Technology Series from Cisco Press' which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers." Category: NetworkingCovers: Network Designshow more

About Priscilla Oppenheimer

Priscilla Oppenheimer has been developing data communications and networking systems since 1980 when she earned her master's degree in information science from the University of Michigan. After many years as a software developer, she became a technical instructor and training developer and has taught more than 3000 network engineers from most of the Fortune 500 companies. Her employment at such companies as Apple Computer, Network General, and Cisco gave her a chance to troubleshoot real-world network design problems and the opportunity to develop a practical methodology for enterprise network design. Priscilla was one of the developers of the Cisco Internetwork Design course and the creator of the Designing Cisco Networks course. Priscilla teaches network design, configuration, and troubleshooting around the world and practices what she preaches in her network consulting business.show more

Table of contents

IntroductionPart I Identifying Your Customer's Needs and GoalsChapter 1 Analyzing Business Goals and Constraints 3Using a Top-Down Network Design Methodology 3 Using a Structured Network Design Process 5 Systems Development Life Cycles 6 Plan Design Implement Operate Optimize (PDIOO) Network Life Cycle 7Analyzing Business Goals 8 Working with Your Client 8 Changes in Enterprise Networks 10 Networks Must Make Business Sense 10 Networks Offer a Service 11 The Need to Support Mobile Users 12 The Importance of Network Security and Resiliency 12 Typical Network Design Business Goals 13 Identifying the Scope of a Network Design Project 14 Identifying a Customer's Network Applications 16Analyzing Business Constraints 19 Politics and Policies 19 Budgetary and Staffing Constraints 20 Project Scheduling 21Business Goals Checklist 22Summary 23Review Questions 23Design Scenario 24Chapter 2 Analyzing Technical Goals and Tradeoffs 25Scalability 25 Planning for Expansion 26 Expanding Access to Data 26 Constraints on Scalability 27Availability 27 Disaster Recovery 28 Specifying Availability Requirements 29 Five Nines Availability 30 The Cost of Downtime 31 Mean Time Between Failure and Mean Time to Repair 31Network Performance 32 Network Performance Definitions 33 Optimum Network Utilization 34 Throughput 35 Throughput of Internetworking Devices 36 Application Layer Throughput 37 Accuracy 38 Efficiency 39 Delay and Delay Variation 40 Causes of Delay 41 Delay Variation 43 Response Time 44Security 44 Identifying Network Assets 45 Analyzing Security Risks 46 Reconnaissance Attacks 47 Denial-of-Service Attacks 48 Developing Security Requirements 48Manageability 49Usability 50Adaptability 50Affordability 51Making Network Design Tradeoffs 52Technical Goals Checklist 54Summary 55Review Questions 56Design Scenario 56Chapter 3 Characterizing the Existing Internetwork 59Characterizing the Network Infrastructure 59 Developing a Network Map 60 Characterizing Large Internetworks 60 Characterizing the Logical Architecture 62 Developing a Modular Block Diagram 64 Characterizing Network Addressing and Naming 64 Characterizing Wiring and Media 65 Checking Architectural and Environmental Constraints 68 Checking a Site for a Wireless Installation 69 Performing a Wireless Site Survey 70Checking the Health of the Existing Internetwork 71 Developing a Baseline of Network Performance 72 Analyzing Network Availability 73 Analyzing Network Utilization 73 Measuring Bandwidth Utilization by Protocol 75 Analyzing Network Accuracy 76 Analyzing Errors on Switched Ethernet Networks 77 Analyzing Network Efficiency 79 Analyzing Delay and Response Time 80 Checking the Status of Major Routers, Switches, and Firewalls 82Network Health Checklist 83Summary 84Review Questions 84Hands-On Project 85Design Scenario 85Chapter 4 Characterizing Network Traffic 87Characterizing Traffic Flow 87 Identifying Major Traffic Sources and Stores 87 Documenting Traffic Flow on the Existing Network 89 Characterizing Types of Traffic Flow for New Network Applications 90 Terminal/Host Traffic Flow 91 Client/Server Traffic Flow 91 Peer-to-Peer Traffic Flow 93 Server/Server Traffic Flow 94 Distributed Computing Traffic Flow 94 Traffic Flow in Voice over IP Networks 94 Documenting Traffic Flow for New and Existing Network Applications 95Characterizing Traffic Load 96 Calculating Theoretical Traffic Load 97 Documenting Application-Usage Patterns 99 Refining Estimates of Traffic Load Caused by Applications 99 Estimating Traffic Load Caused by Routing Protocols 101Characterizing Traffic Behavior 101 Broadcast/Multicast Behavior 101 Network Efficiency 102 Frame Size 103 Windowing and Flow Control 103 Error-Recovery Mechanisms 104Characterizing Quality of Service Requirements 105 ATM QoS Specifications 106 Constant Bit Rate Service Category 107 Real-time Variable Bit Rate Service Category 107 Non-real-time Variable Bit Rate Service Category 107 Unspecified Bit Rate Service Category 108 Available Bit Rate Service Category 108 Guaranteed Frame Rate Service Category 108 IETF Integrated Services Working Group QoS Specifications 109 Controlled-Load Service 110 Guaranteed Service 110 IETF Differentiated Services Working Group QoS Specifications 111 Grade of Service Requirements for Voice Applications 112 Documenting QoS Requirements 113Network Traffic Checklist 114Summary 114Review Questions 114Design Scenario 115Summary for Part I 115Part II Logical Network Design Chapter 5 Designing a Network Topology 119Hierarchical Network Design 120 Why Use a Hierarchical Network Design Model? 121 Flat Versus Hierarchical Topologies 122 Flat WAN Topologies 122 Flat LAN Topologies 123 Mesh Versus Hierarchical-Mesh Topologies 124 Classic Three-Layer Hierarchical Model 125 Core Layer 127 Distribution Layer 127 Access Layer 128 Guidelines for Hierarchical Network Design 128Redundant Network Design Topologies 130 Backup Paths 131 Load Sharing 132Modular Network Design 133 Cisco SAFE Security Reference Architecture 133Designing a Campus Network Design Topology 135 Spanning Tree Protocol 135 Spanning Tree Cost Values 136 Rapid Spanning Tree Protocol 137 RSTP Convergence and Reconvergence 138 Selecting the Root Bridge 139 Scaling the Spanning Tree Protocol 140 Virtual LANs 141 Fundamental VLAN Designs 142 Wireless LANs 144 Positioning an Access Point for Maximum Coverage 145 WLANs and VLANs 146 Redundant Wireless Access Points 146 Redundancy and Load Sharing in Wired LANs 147 Server Redundancy 148 Workstation-to-Router Redundancy 150 Hot Standby Router Protocol 152 Gateway Load Balancing Protocol 153Designing the Enterprise Edge Topology 153 Redundant WAN Segments 153 Circuit Diversity 154 Multihoming the Internet Connection 154 Virtual Private Networking 157 Site-to-Site VPNs 158 Remote-Access VPNs 159 Service Provider Edge 160Secure Network Design Topologies 162 Planning for Physical Security 162 Meeting Security Goals with Firewall Topologies 162Summary 163Review Questions 165Design Scenario 165Chapter 6 Designing Models for Addressing and Numbering 167Guidelines for Assigning Network Layer Addresses 168 Using a Structured Model for Network Layer Addressing 168 Administering Addresses by a Central Authority 169 Distributing Authority for Addressing 170 Using Dynamic Addressing for End Systems 170 IP Dynamic Addressing 171 IP Version 6 Dynamic Addressing 174 Zero Configuration Networking 175 Using Private Addresses in an IP Environment 175 Caveats with Private Addressing 177 Network Address Translation 177Using a Hierarchical Model for Assigning Addresses 178 Why Use a Hierarchical Model for Addressing and Routing? 178 Hierarchical Routing 179 Classless Interdomain Routing 179 Classless Routing Versus Classful Routing 180 Route Summarization (Aggregation) 181 Route Summarization Example 182 Route Summarization Tips 183 Discontiguous Subnets 183 Mobile Hosts 184 Variable-Length Subnet Masking 185 Hierarchy in IP Version 6 Addresses 186 Link-Local Addresses 187 Global Unicast Addresses 188 IPv6 Addresses with Embedded IPv4 Addresses 189Designing a Model for Naming 189 Distributing Authority for Naming 190 Guidelines for Assigning Names 191 Assigning Names in a NetBIOS Environment 192 Assigning Names in an IP Environment 193 The Domain Name System 193 Dynamic DNS Names 194 IPv6 Name Resolution 195Summary 195Review Questions 196Design Scenario 197Chapter 7 Selecting Switching and Routing Protocols 199Making Decisions as Part of the Top-Down Network Design Process 200Selecting Switching Protocols 201 Switching and the OSI Layers 202 Transparent Bridging 202 Selecting Spanning Tree Protocol Enhancements 203 PortFast 204 UplinkFast and BackboneFast 204 Unidirectional Link Detection 205 LoopGuard 206 Protocols for Transporting VLAN Information 207 IEEE 802.1Q 207 Dynamic Trunk Protocol 208 VLAN Trunking Protocol 208Selecting Routing Protocols 209 Characterizing Routing Protocols 209 Distance-Vector Routing Protocols 210 Link-State Routing Protocols 212 Routing Protocol Metrics 214 Hierarchical Versus Nonhierarchical Routing Protocols 214 Interior Versus Exterior Routing Protocols 214 Classful Versus Classless Routing Protocols 214 Dynamic Versus Static and Default Routing 215 On-Demand Routing 216 Scalability Constraints for Routing Protocols 216 Routing Protocol Convergence 217 IP Routing 218 Routing Information Protocol 218 Enhanced Interior Gateway Routing Protocol 219 Open Shortest Path First 221 Intermediate System-to-Intermediate System 224 Border Gateway Protocol 225 Using Multiple Routing Protocols in an Internetwork 225 Routing Protocols and the Hierarchical Design Model 226 Redistribution Between Routing Protocols 227 Integrated Routing and Bridging 229A Summary of Routing Protocols 230Summary 231Review Questions 231Design Scenario 232Chapter 8 Developing Network Security Strategies 233Network Security Design 233 Identifying Network Assets 234 Analyzing Security Risks 234 Analyzing Security Requirements and Tradeoffs 235 Developing a Security Plan 235 Developing a Security Policy 236 Components of a Security Policy 237 Developing Security Procedures 237 Maintaining Security 237Security Mechanisms 238 Physical Security 238 Authentication 239 Authorization 239 Accounting (Auditing) 240 Data Encryption 240 Public/Private Key Encryption 241 Packet Filters 243 Firewalls 244 Intrusion Detection and Prevention Systems 244Modularizing Security Design 245 Securing Internet Connections 245 Securing Public Servers 246 Securing E-Commerce Servers 247 Securing Remote-Access and VPNs 248 Securing Remote-Access Technologies 248 Securing VPNs 249 Securing Network Services and Network Management 250 Securing Server Farms 251 Securing User Services 252 Securing Wireless Networks 253 Authentication in Wireless Networks 254 Data Privacy in Wireless Networks 258Summary 261Review Questions 261Design Scenario 262Chapter 9 Developing Network Management Strategies 263Network Management Design 263 Proactive Network Management 264 Network Management Processes 264 Fault Management 265 Configuration Management 266 Accounting Management 266 Performance Management 266 Security Management 268Network Management Architectures 269 In-Band Versus Out-of-Band Monitoring 270 Centralized Versus Distributed Monitoring 270Selecting Network Management Tools and Protocols 271 Selecting Tools for Network Management 271 Simple Network Management Protocol 271 Management Information Bases (MIB) 272 Remote Monitoring (RMON) 273 Cisco Discovery Protocol 274 Cisco NetFlow Accounting 276 Estimating Network Traffic Caused by Network Management 276Summary 277Review Questions 278Design Scenario 278Summary for Part II 279Part III Physical Network Design Chapter 10 Selecting Technologies and Devices for Campus Networks 283LAN Cabling Plant Design 284 Cabling Topologies 284 Building-Cabling Topologies 285 Campus-Cabling Topologies 285 Types of Cables 285LAN Technologies 289 Ethernet Basics 290 Ethernet and IEEE 802.3 290 Ethernet Technology Choices 291 Half-Duplex and Full-Duplex Ethernet 292 100-Mbps Ethernet 292 Gigabit Ethernet 293 10-Gbps Ethernet 295Selecting Internetworking Devices for a Campus Network Design 299 Criteria for Selecting Campus Internetworking Devices 300 Optimization Features on Campus Internetworking Devices 302Example of a Campus Network Design 303 Background Information for the Campus Network Design Project 303 Business Goals 304 Technical Goals 304 Network Applications 305 User Communities 306 Data Stores (Servers) 307 Current Network at WVCC 307 Traffic Characteristics of Network Applications 310 Summary of Traffic Flows 311 Performance Characteristics of the Current Network 312 Network Redesign for WVCC 313 Optimized IP Addressing and Routing for the Campus Backbone 313 Wireless Network 314 Improved Performance and Security for the Edge of the Network 315Summary 316Review Questions 317Design Scenario 317Chapter 11 Selecting Technologies and Devices for Enterprise Networks 319Remote-Access Technologies 320 PPP 321 Multilink PPP and Multichassis Multilink PPP 321 Password Authentication Protocol and Challenge Handshake Authentication Protocol 322 Cable Modem Remote Access 323 Challenges Associated with Cable Modem Systems 324 Digital Subscriber Line Remote Access 325 Other DSL Implementations 326 PPP and ADSL 326Selecting Remote-Access Devices for an Enterprise Network Design 327 Selecting Devices for Remote Users 327 Selecting Devices for the Central Site 328WAN Technologies 328 Systems for Provisioning WAN Bandwidth 329 Leased Lines 330 Synchronous Optical Network 331 Frame Relay 332 Frame Relay Hub-and-Spoke Topologies and Subinterfaces 333 Frame Relay Congestion Control Mechanisms 335 Frame Relay Traffic Control 335 Frame Relay/ATM Interworking 336 ATM 337 Ethernet over ATM 337 Metro Ethernet 338 Selecting Routers for an Enterprise WAN Design 339 Selecting a WAN Service Provider 340Example of a WAN Design 341 Background Information for the WAN Design Project 341 Business and Technical Goals 342 Network Applications 343 User Communities 343 Data Stores (Servers) 344 Current Network 344 Traffic Characteristics of the Existing WAN 345 WAN Design for Klamath Paper Products 346Summary 348Review Questions 349Design Scenario 349Summary for Part III 350Part IV Testing, Optimizing, and Documenting Your Network Design Chapter 12 Testing Your Network Design 353Using Industry Tests 354Building and Testing a Prototype Network System 355 Determining the Scope of a Prototype System 355 Testing a Prototype on a Production Network 356Writing and Implementing a Test Plan for Your Network Design 357 Developing Test Objectives and Acceptance Criteria 357 Determining the Types of Tests to Run 358 Documenting Network Equipment and Other Resources 359 Writing Test Scripts 360 Documenting the Project Timeline 361 Implementing the Test Plan 361Tools for Testing a Network Design 362 Types of Tools 362 Examples of Network Testing Tools 363 CiscoWorks Internetwork Performance Monitor 364 WANDL Network Planning and Analysis Tools 364 OPNET Technologies 364 Ixia Tools 365 NetIQ Voice and Video Management Solution 365 NetPredict's NetPredictor 365Summary 366Review Questions 366Design Scenario 366Chapter 13 Optimizing Your Network Design 367Optimizing Bandwidth Usage with IP Multicast Technologies 368 IP Multicast Addressing 369 Internet Group Management Protocol 370 Multicast Routing Protocols 370 Distance Vector Multicast Routing Protocol 371 Protocol Independent Multicast 371Reducing Serialization Delay 372 Link-Layer Fragmentation and Interleaving 373 Compressed Real-Time Transport Protocol 374Optimizing Network Performance to Meet Quality of Service Requirements 374 IP Precedence and Type of Service 375 IP Differentiated Services Field 376 Resource Reservation Protocol 377 Common Open Policy Service Protocol 379 Classifying LAN Traffic 379Cisco IOS Features for Optimizing Network Performance 380 Switching Techniques 380 Classic Methods for Layer 3 Packet Switching 381 NetFlow Switching 382 Cisco Express Forwarding 382 Queuing Services 383 First-In, First-Out Queuing 383 Priority Queuing 384 Custom Queuing 384 Weighted Fair Queuing 385 Class-Based Weighted Fair Queuing 386 Low-Latency Queuing 387 Random Early Detection 388 Weighted Random Early Detection 388 Traffic Shaping 389 Committed Access Rate 389Summary 389Review Questions 390Design Scenario 391Chapter 14 Documenting Your Network Design 393Responding to a Customer's Request for Proposal 394Contents of a Network Design Document 395 Executive Summary 396 Project Goal 396 Project Scope 396 Design Requirements 397 Business Goals 397 Technical Goals 398 User Communities and Data Stores 399 Network Applications 399 Current State of the Network 399 Logical Design 400 Physical Design 400 Results of Network Design Testing 401 Implementation Plan 401 Project Schedule 402 Project Budget 403 Return on Investment 403 Design Document Appendix 404Summary 404Review Questions 405Design Scenario 405Glossary 407 9781587202834 TOC 8/2/2010show more

Rating details

62 ratings
3.75 out of 5 stars
5 24% (15)
4 39% (24)
3 27% (17)
2 8% (5)
1 2% (1)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X