下载 > 资源分类 >  网络技术 >  网络基础 > 自顶向下网络设计(英文版)

自顶向下网络设计(英文版)

内容简介:

《自顶向下网络设计(英文版)(第3版)》是围绕自顶向下网络设计步骤编写的,提供给网络设计者一种系统的结构化网络设计方法。《自顶向下网络设计(英文版)(第3版)》分为4个部分,即客户需求和目标、逻辑网络设计、物理网络设计,以及网络测试、优化和文档编写。4个部分分别对应着网络 设计的各个重要阶段,每个阶段都提供给读者详细的设计指导原则,内容涵盖网络设计的方方面面。《自顶向下网络设计(英文
版)(第3版)》从用户商业和技术目标的分析入手,从而制定出相应的网络流量、负载和QoS需求,进而开发网络的逻辑拓扑结构,然后进入地址规划、协议选择、网络安全和网络管理实施策略制定,最后是对网络设备的选型建议以及网络实施、测试和文档编写。《自顶向下网络设计(英文版)(第3版)》每章以复习题和设计环境作为一章的总结和回顾,理论与实践相结合,从而让读者更好地理解和掌握自顶向下网络设计的思想。
《自顶向下网络设计(英文版)(第3版)》适合Cisco代理商、网络运营商、其他网络设备商的网络部署人员、售后技术支持人员阅读;网络维护人员,以及网络技术爱好者也可以从《自顶向下网络设计(英文版)(第3版)》中获益。
本书目录:

Contents

Introduction xxii

Part I Identifying Your Customers Needs and Goals

Chapter 1 Analyzing Business Goals and Constraints

Using a Top-Down Network Design Methodology

Using a Structured Network Design Process

Systems Development Life Cycles

Plan Design Implement Operate Optimize (PDIOO) Network Life Cycle

Analyzing Business Goals

Working with Your Client

Changes in Enterprise Networks

Networks Must Make Business Sense

Networks Offer a Service

The Need to Support Mobile Users

The Importance of Network Security and Resiliency

Typical Network Design Business Goals

Identifying the Scope 网络设计f a Network Design Project

Identifying a Customers Network Applications

Analyzing Business Constraints

Politics and Policies

Budgetary and Staffing Constraints

Project Scheduling

Business Goals Checklist

Summary

Review Questions

Design Scenario

Chapter 2 Analyzing Technical Goals and Tradeoffs

Scalability

Planning for Expansion

Expanding Access to Data

Constraints on Scalability

Availability

Disaster Recovery

Specifying Availability Requirements

Five Nines Availability

The Cost of Downtime

Mean Time Between Failure and Mean Time to Repair

Network Performance

Network Performance Definitions

Optimum Network Utilization

Throughput

Throughput of Internetworking Devices

Application Layer Throughput

Accuracy

Efficiency

Delay and Delay Variation

Causes of Delay

Delay Variation

Response Time

Security

Identifying Network Assets

Analyzing Security Risks

Reconnaissance Attacks

Denial-of-Service Attacks

Developing Security Requirements

Manageability

Usability

Adaptability

Affordability

Making Network Design Tradeoffs

Technical Goals Checklist

Summary

Review Questions

Design Scenario

Chapter 3 Characterizing the Existing Internetwork

Characterizing the Network Infrastructure

Developing a Network Map

Characterizing Large Internetworks

Characterizing the Logical Architecture

Developing a Modular Block Diagram

Characterizing Network Addressing and Naming

Characterizing Wiring and Media

Checking Architectural and Environmental Constraints

Checking a Site for a Wireless Installation

Performing a Wireless Site Survey

Checking the Health of the Existing Internetwork

Developing a Baseline of Network Performance

Analyzing Network Availability

Analyzing Network Utilization

Measuring Bandwidth Utilization by Protocol

Analyzing Network Accuracy

Analyzing Errors on Switched Ethernet Networks

Analyzing Network Efficiency

Analyzing Delay and Response Time

Checking the Status of Major Routers, Switches, and Firewalls

Network Health Checklist

Summary

Review Questions

Hands-On Project

Design Scenario

Chapter 4 Characterizing Network Traffic

Characterizing Traffic Flow

Identifying Major Traffic Sources and Stores

Documenting Traffic Flow on the Existing Network

Characterizing Types of Traffic Flow for New Network Applications

Terminal/Host Traffic Flow

Client/Server Traffic Flow

Peer-to-Peer Traffic Flow

Server/Server Traffic Flow

Distributed Computing Traffic Flow

Traffic Flow in Voice over IP Networks

Documenting Traffic Flow for New and Existing Network Applications

Characterizing Traffic Load

Calculating Theoretical Traffic Load

Documenting Application-Usage Patterns

Refining Estimates of Traffic Load Caused by Applications

Estimating Traffic Load Caused by Routing Protocols

Characterizing Traffic Behavior

Broadcast/Multicast Behavior

Network Efficiency

Frame Size

Windowing and Flow Control

Error-Recovery Mechanisms

Characterizing Quality of Service Requirements

ATM QoS Specifications

Constant Bit Rate Service Category

Real-time Variable Bit Rate Service Category

Non-real-time Variable Bit Rate Service Category

Unspecified Bit Rate Service Category

Available Bit Rate Service Category

Guaranteed Frame Rate Service Category

IETF Integrated Services Working Group QoS Specifications

Controlled-Load Service

Guaranteed Service

IETF Differentiated Services Working Group QoS Specifications

Grade of Service Requirements for Voice Applications

Documenting QoS Requirements

Network Traffic Checklist

Summary

Review Questions

Design Scenario

Summary for Part I

Part II Logical Network Design

Chapter 5 Designing a Network Topology

Hierarchical Network Design

Why Use a Hierarchical Network Design Model?

Flat Versus Hierarchical Topologies

Flat WAN Topologies

Flat LAN Topologies

Mesh Versus Hierarchical-Mesh Topologies

Classic Three-Layer Hierarchical Model

Core Layer

Distribution Layer

Access Layer

Guidelines for Hierarchical Network Design

Redundant Network Design Topologies

Backup Paths

Load Sharing

Modular Network Design

Cisco SAFE Security Reference Architecture

Designing a Campus Network Design Topology

Spanning Tree Protocol

Spanning Tree Cost Values

Rapid Spanning Tree Protocol

RSTP Convergence and Reconvergence

Selecting the Root Bridge

Scaling the Spanning Tree Protocol

Virtual LANs

Fundamental VLAN Designs

Wireless LANs

Positioning an Access Point for Maximum Coverage

WLANs and VLANs

Redundant Wireless Access Points

Redundancy and Load Sharing in Wired LANs

Server Redundancy

Workstation-to-Router Redundancy

Hot Standby Router Protocol

Gateway Load Balancing Protocol

Designing the Enterprise Edge Topology

Redundant WAN Segments

Circuit Diversity

Multihoming the Internet Connection

Virtual Private Networking

Site-to-Site VPNs

Remote-Access VPNs

Service Provider Edge

Secure Network Design Topologies

Planning for Physical Security

Meeting Security Goals with Firewall Topologies

Summary

Review Questions

Design Scenario

……

Part III Physical Network Design

Part IV Testing, Optimizing, and Documenting Your Network Design
...展开收缩
综合评分:3(1位用户评分)
直接下载 开通VIP会员 免积分下载

评论共有1条

name
luo_0072014-05-26 16:36:37
这是第二版啊,英文的看不懂

评论资源

您不能发表评论,可能是以下原因:

登录后才能评论

待评论资源
 

热门专辑

网络技术热门标签

VIP会员动态

关闭
img

spring mvc+mybatis+mysql+maven+bootstrap 整合实现增删查改简单实例.zip

CSDN VIP年卡 4000万程序员的必选现在开通,立省522元
为了良好体验,不建议使用迅雷下载
下载
img

自顶向下网络设计(英文版)

会员到期时间: 剩余下载个数: 剩余C币:593 剩余积分:786
为了良好体验,不建议使用迅雷下载
VIP下载

积分不足!

资源所需积分/C币 当前拥有积分
您可以选择
开通VIP年卡
4000万
程序员的必选
600万
绿色安全资源
现在开通
立省522元
或者
购买C币兑换积分 C币抽奖
img
资源所需积分/C币 当前拥有积分 当前拥有C币
5 4 45
(仅够下载10个资源)
VIP年卡
全站1200个资源免积分下载
为了良好体验,不建议使用迅雷下载
下载
img
资源所需积分/C币 当前拥有积分 当前拥有C币
5 0 0
VIP年卡
全站1200个资源免积分下载
C币充值开通VIP年卡
img
资源所需积分/C币 当前拥有积分 当前拥有C币
5 4 45
您的积分不足,将扣除 10 C币
VIP年卡
全站1200个资源免积分下载
为了良好体验,不建议使用迅雷下载
下载
下载

兑换成功

你当前的下载分为234开始下载资源
你还不是VIP会员
开通VIP会员权限,免积分下载
立即开通

你下载资源过于频繁,请输入验证码

你下载资源过于频繁,请输入验证码

您因违反CSDN下载频道规则而被锁定帐户,如有疑问,请联络:webmaster@csdn.net!

举报

若举报审核通过,可奖励20下载分

  • 举报人:
  • 被举报人:
  • 举报的资源分:
  • *类型:
  • *详细原因: