Home Page Icon
Home Page
Table of Contents for
E. Bibliography
Close
E. Bibliography
by Matthew J. Castelli
Network Consultants Handbook
Copyright
Dedications
About the Author
About the Technical Reviewers
Acknowledgments
Foreword
Introduction
Purpose of This Book
How This Book Can Be Used
The Twelve Networking Truths
The Twelve Networking Truths
Status of This Memo
Abstract
Acknowledgments
Feedback
1. Open System Interconnection (OSI) Model
OSI Reference Model
OSI Layer Characteristics
OSI Model Layers
Layer 1: Physical Layer
Layer 2: Data Link Layer
Layer 3: Network Layer
Layer 4: Transport Layer
Layer 5: Session Layer
Layer 6: Presentation Layer
Layer 7: Application Layer
Layering Benefits and Concepts
Layer Interactions
Interaction Between Layers on Different Hosts
Data Encapsulation
Summary
2. LAN Topologies
Unicast
Multicast
Broadcast
LAN Addressing
MAC Addresses
Network Layer Addresses
LAN Topologies
Star (Hub-and-Spoke) Topology
Ring Topology
Bus Topology
Tree Topology
Network Devices
Hubs
Intelligent Hubs
Managed Hubs
Stackable Hubs
Bridges
Bridge Operation
Latency
Types of Bridging
Transparent Bridging
Source-Route Bridging
Source-Route Translational, or Mixed-Media, Bridging
Source-Route Transparent Bridging
Cisco-Specific Bridging Solutions
Switches
Switch Operations
Switching Modes
Store and Forward Switching
Cut-Through Switching
Fast Switching
Layer 3 Switching
Spanning Tree Algorithm
Spanning Tree Protocol (IEEE 802.1d)
Spanning Tree Operation
Spanning Tree Topology
Port States
Routers
Summary
3. Ethernet/IEEE 802.3
Ethernet Network Elements
Ethernet Network Topologies and Structures
IEEE 802.3 Logical Relationship to the OSI Reference Model
The Ethernet MAC Sublayer
The Basic Ethernet Frame Format
Frame Transmission
Half-Duplex Transmission: The CSMA/CD Access Method
Network Diameter
Cable Case Study
Full-Duplex Transmission
Flow Control
Frame Reception
The Ethernet Physical Layers
10 Mbps Ethernet Operation
Bit Times
Backoff Algorithm
Exponential Backoff
Ethernet Case Study
Alternative Ethernet Technologies
Ethernet Applications
100 Mbps, or Fast Ethernet
100BaseT Overview
100BaseT Operation
Bit Times
Backoff Algorithm
Exponential Backoff
100BaseT FLPs
100BaseT Autonegotiation
100BaseT Media Types
Fast Ethernet Applications
100VG-AnyLAN
100VG-AnyLAN Operation
100VG-AnyLAN Applications
1000 Mbps, or Gigabit (Gbps) Ethernet
Burst Mode
Gigabit Ethernet CSMA/CD
1000 Mbps, or 1 Gbps Ethernet Applications
10 Gbps, or 10 Gigabit Ethernet
10 Gigabit Ethernet Applications
LAN Applications
MAN Applications
WAN Applications
Summary
4. Ethernet Documentation
Case Study: Naming Conventions
Small Ethernet (Hub-Based) Networks
Commands
show hub
Documentation Case Study
Small Ethernet (Bridge-Based) Networks
Commands
show bridge
Documentation Case Study
Small Ethernet (Layer 2 Switch-Based) Networks
Commands
show module
show port
show spantree
Documentation Case Study
Summary
5. Ethernet Network Review and Analysis
Cisco Router Interface Commands
show interfaces ethernet
show interfaces ethernet number
CRC Errors
Ethernet Collisions
Local Collisions
Remote Collisions
Late Collisions
Output Queue Drops
Input Queue Drops
Ignored Packets
show interface ethernet number accounting
Input Distribution Percentage
Output Distribution Percentage
Total Distribution Percentage
show buffers ethernet
Buffer Misses
show processes cpu
CPU Utilization
Ethernet Network Analysis
Ethernet Frame Transmission
10 Mbps Ethernet
100 Mbps (Fast) Ethernet
1000 Mbps (Gigabit) Ethernet
Ethernet Baseline
Ethernet MTU
Ethernet Throughput
Ethernet Effective Utilization
Ethernet with IP Networking
Ethernet with IPX Networking
Case Study: Ethernet Network Analyzers
Ethernet Network Analysis
Ethernet Network Throughput
Network Transfer Rate (Effective Throughput)
Average Bandwidth Per User
Ethernet with IP and IPX Network Throughput
Summary
6. Token Ring/IEEE 802.5
Token Ring
Physical Connections
Token Ring Operation
Joining a Ring
Ring Operation Frames
Ring Special Servers
Error Types
Token Priority
Token Holding Time (THT)
Token Ring Fault Management
Monitor Election Process
Active Monitor
Beaconing
Frame Format
Token Frame Fields
Data/Command Frame Fields
Dedicated Token Ring
Dedicated Token Ring Concentrators/Switches
C-Ports
Full-Duplex Operation
High-Speed Token Ring
High-Speed Token Ring Applications
Summary
7. FDDI
Fiber-Optic Transmission Modes
FDDI Topology
Dual Homing
Primary and Secondary Rings
Single Attachment Stations (SAS): The S Port
Dual Attachment Stations (DAS): The A and B Ports
Concentrator M Ports
FDDI Ring Failure
FDDI Media and Encoding
FDDI Operation
Claim Frames
Station Management
Beacon Frames
FDDI Frames
FDDI Token Frame Format
FDDI Frame Format
FDDI LAN Applications
Summary
8. Token Ring and FDDI LAN Documentation
Case Study: Naming Conventions
Case Study: Simple Token Ring LAN
Case Study: Simple FDDI LAN
Summary
9. Token Ring and FDDI Network Review and Analysis
Token Ring LANs
Cisco Router Interface Commands
show interfaces tokenring
show interfaces tokenring number
CRC Errors
Token Ring Soft Errors
Soft Errors
Output Queue Drops
Input Queue Drops
Ignored Packets
show interfaces tokenring number accounting
Input Distribution Percentage
Output Distribution Percentage
Total Distribution Percentage
Buffer Misses
show processes CPU
CPU Utilization
Token Ring Network Analysis
Token Ring Bit Times [Propagation Delay]
Token Ring Network Performance
Token Ring Propagation Delay Equation
Token Ring LAN Effective Throughput
Token Ring Performance Model
Token Ring Fault Management
FDDI LANs
Cisco Router Interface Commands
show interfaces FDDI
show interfaces fddi number
CRC Errors
FDDI Ring Operations
Output Queue Drops
Input Queue Drops
Ignored Packets
show interfaces FDDI number accounting
Input Distribution Percentage
Output Distribution Percentage
Total Distribution Percentage
Buffer Misses
show processes cpu
CPU Utilization
FDDI Network Analysis
FDDI Bit Times (Propagation Delay)
FDDI Network Performance
FDDI Propagation Delay Equation
FDDI LAN Effective Throughput
FDDI Performance Model
Summary
10. ATM LAN Emulation (LANE)
Emulated LAN Environments
Ethernet Emulated LAN Environments
Token Ring-Emulated LAN Environments
LAN Emulation Clients (LECs)
LAN Emulation Servers (LESs)
LAN Emulation Configuration Server (LECS)
Configuration Server Implementation
Configuration Server Location
LAN Emulation or LANE Server (LES)
Address Resolution (LE ARP)
Broadcast/Unknown Server (BUS)
ATM LANE Protocol
ATM Addresses
ILMI Initialization
LANE Data Frames
LANE Control Frames
LANE Control Frame Format
LANE Version 2
Server Cache Synchronization Protocol (SCSP)
Class of Service (CoS)
VPI and VCI
LAN Emulation Applications
Summary
11. ATM LANE Documentation, Review, and Analysis
Effective Operating Rate
ATM LANE Traffic Classes
AAL-1 / CBR
Effective Throughput of AAL1
AAL-2 / VBR-rt
Effective Throughput of AAL2
AAL-3/4 / VBR-nrt
Effective Throughput of AAL3/4
AAL5 / VBR-nrt
Effective Throughput for AAL-5
IOS Commands
show lane
Example
show lane bus
Example
show lane client
Examples
show lane config
Examples
show lane database
Example
ATM LANE Documentation
Summary
12. Telecommunications and Telephony
Voice Signaling
Supervisory Signaling
Loop-Start Signaling
Ground-Start Signaling
Wink-Start Signaling
Immediate-Start Signaling
Tone-Start Signaling
E&M Signaling
Address Signaling
Informational Signaling
ANI
NANP
Area Code (NPA)
456 NXX
900/976 NXX
500 NXX
Exchange Code (NXX)
555-Numbers
800-855
Subscriber Extension (XXXX)
Lines and Trunks
Direct Inward Dialing (DID)
Direct Outward Dialing (DOD)
Tie Lines
Telephone Network
Pulse Code Modulation (PCM)
TDM
Local Loop and Transmission Media
Copper Cable
Coaxial Cable
Fiber-Optic Cable
Wireless
ISDN
ISDN Standards
ITU I.430
Q.921
Q.931
G.711
ISDN BRI
ISDN Primary Rate Interface (PRI)
Signaling
ISDN Reference Points
ISDN SPIDs
ISDN Call Setup
DSL
Attenuation
DSL Modulation Techniques
Crosstalk
Minimizing Crosstalk
ADSL
RADSL
SDSL
DSL-Based Services and Components
Transport System
Local Access Network
Digital Subscriber Line Access Multiplexer (DSLAM)
DSL Transceiver Unit (xTU-R)
POTS Splitters
Summary
13. Private Line WANs
T1 Basics
Time Division Multiplexing (TDM) Hierarchy
Pulse Code Modulation (PCM)
TDM
1.544 Mbps
D4, or Superframe (SF)
Extended Superframe (ESF)
T1/DS1 Signaling/Line Coding
Alternate Mark Inversion (AMI)
Bi-Polar with 8-Zero Substitution (B8ZS)
AMI/B8ZS Mismatches
T1 Documentation
End-to-End T1 Links
T1 Access
T1 Testing and Analysis
DS0 Basics
DS0/DDS Alarm Codes
DS3
Summary
14. Fiber-Optic Technology
Optic Bands and Transmission Windows
Multimode Fiber
Single-Mode Fiber
Non-Dispersion Shifted Fiber (NDSF)
Dispersion-Shifted Fiber (DSF)
Zero-Dispersion Shifted Fiber (ZDSF)
Non-Zero Dispersion Shifted Fiber (NZDF)
SONET/SDH
SONET Synchronization
SONET Standards
SONET Frames
SONET Frame Overhead
Section Overhead
Line Overhead
Path Overhead
Packet Over SONET (PoS)
PoS Frame Format
PoS Synchronization
DWDM
DWDM Technology
DWDM Capacity
Optical Switching
Summary
15. Frame Relay
Frame Relay Terms and Concepts
Frame Relay Components
Customer Premise FRAD
Local Access Loop to the Service Provider Network
Frame Relay Virtual Circuits
DLCIs
PVCs
SVCs
FECN and BECN
Frame Relay Virtual Circuit (VC) Parameters
Frame Relay CIR
Frame Relay Discard Eligibility (DE)
PVC DLCIs
SVC X.121/E.164 Addressing
Frame Relay Status Polling
Frame Relay Error Handling
Frame Relay Frame Format
Frame Relay LMI
LMI Types
LMI Frame Format
LMI Extensions
Frame Relay Applications
Frame Relay and the TCP/IP Suite
Virtual LANs (VLANs) and IP Subnets
Address Resolution Protocol (ARP)
Inverse ARP
Inverse ARP and Routing Tables
Frame Relay and the Novell IPX Suite
Frame Relay IPX Bandwidth Guidelines
Novell SAP
Frame Relay and the IBM SNA Suite
Traditional IBM SNA Network Configuration
SNA Data Link Protocols
SDLC and LLC2
Data-Link Switching (DLSw)
SNA and DLSw Traffic Management
Custom Versus Priority Queuing
Voice over Frame Relay (VoFr)
Voice Coders-Decoders (Codecs)
VoFr Quality
VFRADs
Frame Relay Traffic Shaping
Frame Relay DE Bit
Differences Between Traffic-Shaping Mechanisms
Derived Rates
Traffic Shaping Restrictions
Traffic Policing and Shaping
Token Bucket
Traffic Policing with CAR
CAR Operation
CAR Traffic-Matching Criteria
Rate Limits
Conform and Exceed Actions
Multiple Rate Policies
CAR Restrictions
Summary
16. Frame Relay Documentation
Case Study: Naming Conventions
Frame Relay Site View
IOS Commands
show frame-relay map
Command-Based Documentation
show frame-relay pvc
Statistics Reporting
Traffic Shaping
LMI Status Inquiries
Example
debug frame-relay lmi
show frame-relay route
Global Frame Relay WAN Documentation
Frame Relay DLCI Table
Summary
17. Frame Relay WAN Analysis
Frame Relay Traffic Shaping
CIR
Committed Burst Rate
Excess Burst Rate
Minimum CIR
Frame Relay Oversubscription
Frame Relay Port Oversubscription
Frame Relay PVC/CIR Oversubscription
Frame Relay Data Delivery Ratio (DDR)
Frame Relay SLAs
Summary
18. ATM Wide-Area Networking (WAN) and MPOA
ATM Network Architecture
ATM WAN Interfaces
ATM UNI
ATM NNI
ATM DXI
ATM PNNI
PNNI Signaling
ATM Connections
Virtual Paths
ATM Virtual Channels
ATM Cells and Cell Relay
Cell Transmission
ATM Service Classes
ATM Service Architecture
CAC
UPC
ATM Traffic Parameters
ATM Traffic Contract and Negotiation
ATM Service Categories Description
CBR
Input Path
Output Path
Real-Time Variable Bit Rate (rt-VBR)
Near-Real-Time (nrt-VBR)
Available Bit Rate (ABR)
Unspecified Bit Rate (UBR)
ATM Functional Layers
Physical Layer
ATM Layer
ATM Adaptation Layer (AAL)
AAL1
AAL3/4
AAL5
Traffic Classes
Permanent Virtual Circuits Versus Switched Virtual Circuits
ATM Addressing
ATM Applications
CBR Applications
VBR Applications
ABR Applications
UBR Applications
ATM Applications Summary
Multiprotocol Over ATM (MPOA)
Three Elements of MPOA
LANE
NHRP
Virtual Router
MPOA Logical Components
MPOA Client: MPC
MPOA Router
MPOA Server: MPS
Caching
Virtual Subnets
Network Layer Mapping
Taking a Shortcut: The Basic Concept
MPOA Packet Flow
Migration and Coexistence
LANE and MPOA
NHRP and MPOA
Inverse Multiplexing for ATM (IMA)
Summary
19. ATM WAN Documentation
Case Study: Naming Conventions
ATM Site View
IOS Command Based
show atm vp
show atm vp Examples
show atm vc
show atm vc Examples
Global ATM WAN Documentation
ATM VPI/VCI Table
Summary
20. Voice Technology
VoIP Network Elements
H.323 Terminals
Audio Codecs
Codec Complexity
Analog (Voice) Waveform Coding Techniques
PCM
Filtering
Sampling
Voice Digitization
Quantization
Companding
A-Law and U-Law Companding
Differential Pulse Code Modulation
Adaptive DPCM (ADPCM)
Specific 32 Kbps Steps
Gateways
Gatekeeper
MCU
H.323 Protocol Stack
Latency
Measuring Latency
Jitter
Measuring Jitter
Packet Loss
VoX Network Parameters
Session Initiation Protocol (SIP)
SIP Protocol Operation
SIP Clients
SIP Servers
SIP Operation
VoIP Equipment Adjustment
Jitter Buffers
Packet Size
Silence Suppression
VoX Call Establishment
Measuring Voice Quality
VoX Summary
Voice over ATM (VoATM)
VoATM Issues
Delay
Telephony Phenomenon
ATM Telephony Delay
ATM Packetization Delay (Cell Construction Delay)
VoATM Buffering (Build-Out) Delay
VoATM Encoding Delay
VoATM Signaling Support
Synchronization
VoATM Applications
Two Basic VoATM Models
Network Requirements
VoATM Expectations
VoATM Solutions
CES
DBCES
VBR Voice Solutions Using AAL2 Adaption
VoATM Switching
Encapsulation Techniques
VoATM Comparison
VoATM Summary
Voice over Frame Relay (VoFR)
VoFR Prioritization
VoFR Fragmentation
VoFR Variable Delay
Voice Compression
Silence Suppression
Echo Cancellation
VoIP
VoX Circuit Sizing
VoX Erlangs
Summary
21. Remote Access and VPNs
Remote Access
VPNs
VPN Basics
Tunneling Protocols
PPP
PPTP
L2TP
L2F
LAN-to-LAN VPN
Authentication
PPTP-PAP/CHAP
Digital Certificates
Smart Cards
Hardware Tokens/PKCS #11
Lightweight Directory Access Protocol (LDAP)
RADIUS Servers
TACACS+++ (Terminal Access Controller Access Control System Plus)
Encryption Alternatives
Pretty Good Privacy (PGP)
PKI
MD5 (Message Digest 5)
IPSec
Internet Key Exchange (IKE)
VPN Products: Gateways, Clients, and Applications
Common Criteria (CC) for Information Technology Security
CC Protection Profiles
Enterprise Assurance Levels
Telecommunications Access Methods to a Local ISP
POTS Dial-Up
ISDN
Cable Modems
Digital Subscriber Line (DSL)
Policy and Administrative Management
Centralized Security Management
Worst-Case Scenario
Backup/Restore Procedures
Security Policy
Key Management
VPN Network Requirements
Network Architecture
Firewall-Based VPNs
Black-Box-Based VPNs
Router-Based VPNs
Remote Access-Based VPNs
Remote Access VPN Network Design
Network Access Points
Dynamic Protocol Support
IP Service Requirements
Existing Routers, Firewalls, and Proxy Servers
Types of Applications That Cross VPN Boundaries
Bandwidth Requirements
Cryptographic Processing Requirements on Servers and Desktops
Support Personnel Requirements
Future Network Plans
Scalability of Critical Devices
Security Policy
VPN User-Access Requirements
Remote Office Locations
NSP or ISP Requirements
VPN Performance Requirements
Cryptographic Hardware Accelerator Support
Clustering of Servers for Scalability
SLAs
Network Uptime
Bandwidth
Latency
Failover to Redundant Devices
VPN Client Essentials, Security Guidelines, and Vulnerabilities
Windows 9x (95/98)
Windows 9x Security Guidelines
Windows 9x Vulnerabilities
UNIX
Windows NT
Windows NT Security Guidelines
Windows NT Vulnerabilities
DHCP Support
Security Policy
Summary
22. Network Management Introduction
Network Management Architecture
Network Management Agents
Network Management Protocols
Network Management Model
Fault Management
Configuration Management
Accounting Management
Performance Management
Security Management
Network Management Categories
Network Management Components
Element Managers
Network Management Platforms
Network Management Probes
Remote Monitoring (RMON)
RMON2
Protocol Analyzers
Performance Reporting/Analysis
Performance-Related Terms
Service-Level Agreements (SLAs)
SLA Service-Level Metrics
Network Management Functional Architecture
Managed Objects
EMS
MoM
User Interface
Network Operation Centers (NOCs)
Network Utilization Reporting
Alarms and Alerts
Alarm Correlation
MIB
MIB Hierarchy
Cisco MIB Hierarchy
Summary
23. IP VPN WAN Documentation
Remote Access Documentation Template
IP WAN VPN Documentation
IOS Commands
show ip route vrf
Example
show ip vrf
Example
Summary
24. Routing Protocols, Part I
Routing: Static Versus Dynamic
Administrative Distance
Distance-Vector Routing
Distance-Vector Routing Concerns
Link-State, or Shortest Path First, Routing
Link-State Routing Concerns
Hybrid Routing
Hybrid Routing Concerns
Routing Metrics
Routing Information Protocol (RIP)
RIP Routing Table
RIP Routing Convergence
Count to Infinity
Split Horizon
RIP Split Horizon with Poison Reverse
RIP Triggered Updates
RIP Hold-Down Timers
RIP Concerns
RIP Hop Count Limit
RIP Fixed Metrics
RIP Network Bandwidth Consumption for Routing Table Updates
RIP Slow Convergence
RIP's Lack of Dynamic Load Balancing
RIP Routing Protocol Summary
RIP Version 2 (RIPv2)
RIPv2 Authentication
RIPv2 Subnet Mask Support
RIPv2 Next Hop Identification
RIPv2 Multicasting
RIPv2 Concerns
RIPv2 Maximum Hop Count (15)
RIPv2 Count to Infinity
RIPv2 (Static) Fixed Metrics for Route Calculation
RIPv2 Lack of Alternative Routing Support
RIPv2 Summary
IGRP
IGRP Metrics
IGRP Hop Count
IGRP Packet Size (MTU)
IGRP Link Bandwidth
IGRP Delay
IGRP Load
IGRP Reliability
Metric Calculation
IGRP Timers
IGRP Convergence Mechanisms
IGRP Flash Update
IGRP Hold-Downs
IGRP Split Horizon
IGRP Poison Reverse
IGRP Load Balancing
IGRP Equal-Cost Load Balancing
IGRP Unequal-Cost Load Balancing
IGRP Feasibility and Feasible Successors
IGRP Summary
EIGRP
EIGRP Features
Neighbor Discovery and Recovery
Reliable Transport Protocol
DUAL Finite-State Machine
Protocol-Specific Modules
EIGRP Tables
EIGRP Packet Types
EIGRP Convergence
EIGRP Summary
OSPF
OSPF Areas
OSPF Area Router Types
OSPF Routing Types
OSPF Area Types
OSPF Packets
OSPF Convergence
OSPF Adjacencies
OSPF Route Summarization
OSPF Authentication
OSPF Security
OSPF Authentication
Testing and Troubleshooting
OSPF Summary
Summary
25. Routing Protocols, Part II
Intermediate System to Intermediate System (IS-IS)
IS-IS Operation
IS-IS Areas
IS-IS Metrics
IS-IS Network Types
IS-IS Adjacencies
Designated IS (DIS)
IS-IS LSPs
LSP Flooding
IS-IS Authentication
IS-IS Summary
Border Gateway Protocol, Version 4 (BGP4)
BGP Multihoming
Interior BGP (IBGP) Versus Exterior BGP (EBGP)
Common BGP Implementation
BGP Autonomous System Numbers
BGP Attributes
AS Path Attribute
Origin Attribute
Next Hop Attribute
Weight Attribute
Multiexit Discriminator (MED) Attribute
Local Preference Attribute
Atomic Aggregate Attribute
Aggregator Attribute
Additional Attributes
BGP Route Selection
BGP Peering
BGP Route Reflectors
BGP Confederations
BGP Administrative Distances
BGP Timers
BGP Summary
EGP
EGP Configuration
EGP Summary
Summary
26. IPv6 Introduction
IPv6 Terms
IPv6 Addressing
IPv6 Multicast
IPv6 Extension Headers
IPv6 Quality of Service (QoS)
IPv6 Migration
Host Address Autoconfiguration
IPv6 Renumbering Issues
IPv6 Neighbor Discover Protocol (NDP)
IPv4/IPv6 Transition
IPv6 Host Transition
IPv6 Routing Transition
IPv4/IPv6 Tunneling
IPv4/IPv6 Network Address Translation (NAT)
IPv6 Header
IPv6/IPv4 Tunneling
6to4 Tunnel Management
6to4 Case Study
6to4 Communication
6to4 Relay
6to4 Maximum Transmission Unit (MTU) Issues
Summary
27. Multiprotocol Label Switching (MPLS)
Label-Edge Routers (LERs) and Label\_Switching Routers (LSRs)
Forward Equivalence Classes (FECs)
Labels and Label Bindings
MPLS Fundamentals
Control and Forwarding Components
Label-Swapping Forwarding Algorithm
Multilayer Switching
Multilayer-Switching Solutions Similarities
Multilayer Switching Solutions Fundamental Differences
Data-Driven Model
Control-Driven Model
MPLS Evolution
MPLS Model
MPLS Header
MPLS Requirements
MPLS and Layer 3 Forwarding
MPLS Operation
MPLS Enhanced Routing
MPLS Applications
MPLS Traffic Engineering (MPLS-TE)
MPLS Class of Service (MPLS-CoS)
MPLS Virtual Private Networks (MPLS-VPNs)
IP/MPLS Network
BGP-Extended Community Attributes
MPLS VPN Operational Model
VPN Routing Maintenance
Provider Edge (PE) Router Resources
Customer Edge (CE) Routing
Summary
A. LAN/WAN Network Assessment
Introduction
Executive Summary of Findings
Current Network Topology and Characterization
Characterize Network Applications and Protocols
Characterize Existing Network Availability and Performance
Characterize Existing Network Reliability and Utilization
Characterize the Status of the Major Routers
Recommendations
Network Health
Network Health Checklist
Traffic Overhead
Traffic Caused by Workstation Initialization
Packets for NetWare Client Initialization
Packets for AppleTalk Client Initialization
Packets for NetBIOS Client Initialization
Packets for Traditional TCP/IP Client Initialization
Packets for DHCP Client Initialization
Provisioning Hardware and Media for the LAN
100 Mbps Ethernet Topologies
Path Delay Value
Calculating Cable Delays
Network Provisioning
Subnet Masks
Interface Types by Region/Country
Data Transmission Throughput
Mesh Network Connectivity
VoIP Bandwidth Consumption
B. Protocol List
C. List of ITU-T X.121 Data Country or Geographical Area Codes
D. International Country Codes
E. Bibliography
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
D. International Country Codes
Next
Next Chapter
Appendix E. Bibliography
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset