Part I Identifying Your Customer’s Needs and Goals
Chapter 1 Analyzing Business Goals and Constraints
Using a Top-Down Network Design Methodology
Using a Structured Network Design Process
Systems Development Life Cycles
Plan Design Implement Operate Optimize (PDIOO) Network Life Cycle
Changes in Enterprise Networks
Networks Must Make Business Sense
The Need to Support Mobile Users
The Importance of Network Security and Resiliency
Typical Network Design Business Goals
Identifying the Scope of a Network Design Project
Identifying a Customer’s Network Applications
Analyzing Business Constraints
Budgetary and Staffing Constraints
Chapter 2 Analyzing Technical Goals and Tradeoffs
Specifying Availability Requirements
Mean Time Between Failure and Mean Time to Repair
Network Performance Definitions
Throughput of Internetworking Devices
Developing Security Requirements
Making Network Design Tradeoffs
Chapter 3 Characterizing the Existing Internetwork
Characterizing the Network Infrastructure
Characterizing Large Internetworks
Characterizing the Logical Architecture
Developing a Modular Block Diagram
Characterizing Network Addressing and Naming
Characterizing Wiring and Media
Checking Architectural and Environmental Constraints
Checking a Site for a Wireless Installation
Performing a Wireless Site Survey
Checking the Health of the Existing Internetwork
Developing a Baseline of Network Performance
Analyzing Network Availability
Measuring Bandwidth Utilization by Protocol
Analyzing Errors on Switched Ethernet Networks
Analyzing Delay and Response Time
Checking the Status of Major Routers, Switches, and Firewalls
Chapter 4 Characterizing Network Traffic
Identifying Major Traffic Sources and Stores
Documenting Traffic Flow on the Existing Network
Characterizing Types of Traffic Flow for New Network Applications
Distributed Computing Traffic Flow
Traffic Flow in Voice over IP Networks
Documenting Traffic Flow for New and Existing Network Applications
Calculating Theoretical Traffic Load
Documenting Application-Usage Patterns
Refining Estimates of Traffic Load Caused by Applications
Estimating Traffic Load Caused by Routing Protocols
Characterizing Traffic Behavior
Characterizing Quality of Service Requirements
Constant Bit Rate Service Category
Real-time Variable Bit Rate Service Category
Non-real-time Variable Bit Rate Service Category
Unspecified Bit Rate Service Category
Available Bit Rate Service Category
Guaranteed Frame Rate Service Category
IETF Integrated Services Working Group QoS Specifications
IETF Differentiated Services Working Group QoS Specifications
Grade of Service Requirements for Voice Applications
Part II Logical Network Design
Chapter 5 Designing a Network Topology
Why Use a Hierarchical Network Design Model?
Flat Versus Hierarchical Topologies
Mesh Versus Hierarchical-Mesh Topologies
Classic Three-Layer Hierarchical Model
Guidelines for Hierarchical Network Design
Redundant Network Design Topologies
Cisco SAFE Security Reference Architecture
Designing a Campus Network Design Topology
RSTP Convergence and Reconvergence
Scaling the Spanning Tree Protocol
Positioning an Access Point for Maximum Coverage
Redundant Wireless Access Points
Redundancy and Load Sharing in Wired LANs
Workstation-to-Router Redundancy
Gateway Load Balancing Protocol
Designing the Enterprise Edge Topology
Multihoming the Internet Connection
Secure Network Design Topologies
Planning for Physical Security
Meeting Security Goals with Firewall Topologies
Chapter 6 Designing Models for Addressing and Numbering
Guidelines for Assigning Network Layer Addresses
Using a Structured Model for Network Layer Addressing
Administering Addresses by a Central Authority
Distributing Authority for Addressing
Using Dynamic Addressing for End Systems
IP Version 6 Dynamic Addressing
Using Private Addresses in an IP Environment
Caveats with Private Addressing
Using a Hierarchical Model for Assigning Addresses
Why Use a Hierarchical Model for Addressing and Routing?
Classless Routing Versus Classful Routing
Route Summarization (Aggregation)
Variable-Length Subnet Masking
Hierarchy in IP Version 6 Addresses
IPv6 Addresses with Embedded IPv4 Addresses
Distributing Authority for Naming
Guidelines for Assigning Names
Assigning Names in a NetBIOS Environment
Assigning Names in an IP Environment
Chapter 7 Selecting Switching and Routing Protocols
Making Decisions as Part of the Top-Down Network Design Process
Selecting Spanning Tree Protocol Enhancements
Protocols for Transporting VLAN Information
Characterizing Routing Protocols
Distance-Vector Routing Protocols
Hierarchical Versus Nonhierarchical Routing Protocols
Interior Versus Exterior Routing Protocols
Classful Versus Classless Routing Protocols
Dynamic Versus Static and Default Routing
Scalability Constraints for Routing Protocols
Enhanced Interior Gateway Routing Protocol
Intermediate System-to-Intermediate System
Using Multiple Routing Protocols in an Internetwork
Routing Protocols and the Hierarchical Design Model
Redistribution Between Routing Protocols
Integrated Routing and Bridging
A Summary of Routing Protocols
Chapter 8 Developing Network Security Strategies
Analyzing Security Requirements and Tradeoffs
Components of a Security Policy
Developing Security Procedures
Intrusion Detection and Prevention Systems
Securing Remote-Access and VPNs
Securing Remote-Access Technologies
Securing Network Services and Network Management
Authentication in Wireless Networks
Data Privacy in Wireless Networks
Chapter 9 Developing Network Management Strategies
Network Management Architectures
In-Band Versus Out-of-Band Monitoring
Centralized Versus Distributed Monitoring
Selecting Network Management Tools and Protocols
Selecting Tools for Network Management
Simple Network Management Protocol
Management Information Bases (MIB)
Estimating Network Traffic Caused by Network Management
Part III Physical Network Design
Chapter 10 Selecting Technologies and Devices for Campus Networks
Half-Duplex and Full-Duplex Ethernet
Selecting Internetworking Devices for a Campus Network Design
Criteria for Selecting Campus Internetworking Devices
Optimization Features on Campus Internetworking Devices
Example of a Campus Network Design
Background Information for the Campus Network Design Project
Traffic Characteristics of Network Applications
Performance Characteristics of the Current Network
Optimized IP Addressing and Routing for the Campus Backbone
Improved Performance and Security for the Edge of the Network
Chapter 11 Selecting Technologies and Devices for Enterprise Networks
Multilink PPP and Multichassis Multilink PPP
Password Authentication Protocol and Challenge Handshake Authentication Protocol
Challenges Associated with Cable Modem Systems
Digital Subscriber Line Remote Access
Selecting Remote-Access Devices for an Enterprise Network Design
Selecting Devices for Remote Users
Selecting Devices for the Central Site
Systems for Provisioning WAN Bandwidth
Frame Relay Hub-and-Spoke Topologies and Subinterfaces
Frame Relay Congestion Control Mechanisms
Selecting Routers for an Enterprise WAN Design
Selecting a WAN Service Provider
Background Information for the WAN Design Project
Traffic Characteristics of the Existing WAN
WAN Design for Klamath Paper Products
Part IV Testing, Optimizing, and Documenting Your Network Design
Chapter 12 Testing Your Network Design
Building and Testing a Prototype Network System
Determining the Scope of a Prototype System
Testing a Prototype on a Production Network
Writing and Implementing a Test Plan for Your Network Design
Developing Test Objectives and Acceptance Criteria
Determining the Types of Tests to Run
Documenting Network Equipment and Other Resources
Documenting the Project Timeline
Tools for Testing a Network Design
Examples of Network Testing Tools
CiscoWorks Internetwork Performance Monitor
WANDL Network Planning and Analysis Tools
NetIQ Voice and Video Management Solution
Chapter 13 Optimizing Your Network Design
Optimizing Bandwidth Usage with IP Multicast Technologies
Internet Group Management Protocol
Distance Vector Multicast Routing Protocol
Protocol Independent Multicast
Link-Layer Fragmentation and Interleaving
Compressed Real-Time Transport Protocol
Optimizing Network Performance to Meet Quality of Service Requirements
IP Precedence and Type of Service
IP Differentiated Services Field
Common Open Policy Service Protocol
Cisco IOS Features for Optimizing Network Performance
Classic Methods for Layer 3 Packet Switching
Class-Based Weighted Fair Queuing
Weighted Random Early Detection
Chapter 14 Documenting Your Network Design
Responding to a Customer’s Request for Proposal
Contents of a Network Design Document
User Communities and Data Stores
3.131.36.247