下载 > 资源分类 > 网络技术 > 网络基础 > 自顶向下网络设计(英文版)

自顶向下网络设计(英文版)

内容简介: 《自顶向下网络设计(英文版)(第3版)》是围绕自顶向下网络设计步骤编写的,提供给网络设计者一种系统的结构化网络设计方法。《自顶向下网络设计(英文版)(第3版)》分为4个部分,即客户需求和目标、逻辑网络设计、物理网络设计,以及网络测试、优化和文档编写。4个部分分别对应着网络 设计的各个重要阶段,每个阶段都提供给读者详细的设计指导原则,内容涵盖网络设计的方方面面。《自顶向下网络设计(英文版)(第3版)》从用户商业和技术目标的分析入手,从而制定出相应的网络流量、负载和QoS需求,进而开发网络的逻辑拓扑结构,然后进入地址规划、协议选择、网络安全和网络管理实施策略制定,最后是对网络设备的选型建议以及网络实施、测试和文档编写。《自顶向下网络设计(英文版)(第3版)》每章以复习题和设计环境作为一章的总结和回顾,理论与实践相结合,从而让读者更好地理解和掌握自顶向下网络设计的思想。 《自顶向下网络设计(英文版)(第3版)》适合Cisco代理商、网络运营商、其他网络设备商的网络部署人员、售后技术支持人员阅读;网络维护人员,以及网络技术爱好者也可以从《自顶向下网络设计(英文版)(第3版)》中获益。 本书目录: Contents Introduction xxii Part I Identifying Your Customers Needs and Goals Chapter 1 Analyzing Business Goals and Constraints Using a Top-Down Network Design Methodology Using a Structured Network Design Process Systems Development Life Cycles Plan Design Implement Operate Optimize (PDIOO) Network Life Cycle Analyzing Business Goals Working with Your Client Changes in Enterprise Networks Networks Must Make Business Sense Networks Offer a Service The Need to Support Mobile Users The Importance of Network Security and Resiliency Typical Network Design Business Goals Identifying the Scope 网络设计f a Network Design Project Identifying a Customers Network Applications Analyzing Business Constraints Politics and Policies Budgetary and Staffing Constraints Project Scheduling Business Goals Checklist Summary Review Questions Design Scenario Chapter 2 Analyzing Technical Goals and Tradeoffs Scalability Planning for Expansion Expanding Access to Data Constraints on Scalability Availability Disaster Recovery Specifying Availability Requirements Five Nines Availability The Cost of Downtime Mean Time Between Failure and Mean Time to Repair Network Performance Network Performance Definitions Optimum Network Utilization Throughput Throughput of Internetworking Devices Application Layer Throughput Accuracy Efficiency Delay and Delay Variation Causes of Delay Delay Variation Response Time Security Identifying Network Assets Analyzing Security Risks Reconnaissance Attacks Denial-of-Service Attacks Developing Security Requirements Manageability Usability Adaptability Affordability Making Network Design Tradeoffs Technical Goals Checklist Summary Review Questions Design Scenario Chapter 3 Characterizing the Existing Internetwork Characterizing the Network Infrastructure Developing a Network Map Characterizing Large Internetworks Characterizing the Logical Architecture Developing a Modular Block Diagram Characterizing Network Addressing and Naming Characterizing Wiring and Media Checking Architectural and Environmental Constraints Checking a Site for a Wireless Installation Performing a Wireless Site Survey Checking the Health of the Existing Internetwork Developing a Baseline of Network Performance Analyzing Network Availability Analyzing Network Utilization Measuring Bandwidth Utilization by Protocol Analyzing Network Accuracy Analyzing Errors on Switched Ethernet Networks Analyzing Network Efficiency Analyzing Delay and Response Time Checking the Status of Major Routers, Switches, and Firewalls Network Health Checklist Summary Review Questions Hands-On Project Design Scenario Chapter 4 Characterizing Network Traffic Characterizing Traffic Flow Identifying Major Traffic Sources and Stores Documenting Traffic Flow on the Existing Network Characterizing Types of Traffic Flow for New Network Applications Terminal/Host Traffic Flow Client/Server Traffic Flow Peer-to-Peer Traffic Flow Server/Server Traffic Flow Distributed Computing Traffic Flow Traffic Flow in Voice over IP Networks Documenting Traffic Flow for New and Existing Network Applications Characterizing Traffic Load Calculating Theoretical Traffic Load Documenting Application-Usage Patterns Refining Estimates of Traffic Load Caused by Applications Estimating Traffic Load Caused by Routing Protocols Characterizing Traffic Behavior Broadcast/Multicast Behavior Network Efficiency Frame Size Windowing and Flow Control Error-Recovery Mechanisms Characterizing Quality of Service Requirements ATM QoS Specifications Constant Bit Rate Service Category Real-time Variable Bit Rate Service Category Non-real-time Variable Bit Rate Service Category Unspecified Bit Rate Service Category Available Bit Rate Service Category Guaranteed Frame Rate Service Category IETF Integrated Services Working Group QoS Specifications Controlled-Load Service Guaranteed Service IETF Differentiated Services Working Group QoS Specifications Grade of Service Requirements for Voice Applications Documenting QoS Requirements Network Traffic Checklist Summary Review Questions Design Scenario Summary for Part I Part II Logical Network Design Chapter 5 Designing a Network Topology Hierarchical Network Design Why Use a Hierarchical Network Design Model? Flat Versus Hierarchical Topologies Flat WAN Topologies Flat LAN Topologies Mesh Versus Hierarchical-Mesh Topologies Classic Three-Layer Hierarchical Model Core Layer Distribution Layer Access Layer Guidelines for Hierarchical Network Design Redundant Network Design Topologies Backup Paths Load Sharing Modular Network Design Cisco SAFE Security Reference Architecture Designing a Campus Network Design Topology Spanning Tree Protocol Spanning Tree Cost Values Rapid Spanning Tree Protocol RSTP Convergence and Reconvergence Selecting the Root Bridge Scaling the Spanning Tree Protocol Virtual LANs Fundamental VLAN Designs Wireless LANs Positioning an Access Point for Maximum Coverage WLANs and VLANs Redundant Wireless Access Points Redundancy and Load Sharing in Wired LANs Server Redundancy Workstation-to-Router Redundancy Hot Standby Router Protocol Gateway Load Balancing Protocol Designing the Enterprise Edge Topology Redundant WAN Segments Circuit Diversity Multihoming the Internet Connection Virtual Private Networking Site-to-Site VPNs Remote-Access VPNs Service Provider Edge Secure Network Design Topologies Planning for Physical Security Meeting Security Goals with Firewall Topologies Summary Review Questions Design Scenario …… Part III Physical Network Design Part IV Testing, Optimizing, and Documenting Your Network Design...展开收缩
综合评分:3(1位用户评分)
直接下载 开通vip会员 免积分下载

热门专辑

评论共有1条

name
luo_0072014-05-26 16:36:37
这是第二版啊,英文的看不懂

评论资源

您不能发表评论,可能是以下原因:

登录后才能评论

待评论资源
 

VIP会员动态

关闭
img

spring mvc+mybatis+mysql+maven+bootstrap 整合实现增删查改简单实例.zip

CSDN vip年卡 4000万程序员的必选现在开通,立省540元
下载
img

自顶向下网络设计(英文版)

会员到期时间:剩余下载个数:
VIP下载

积分不足!

资源所需积分 当前拥有积分
您可以选择
开通VIP年卡
4000万
程序员的必选
600万
绿色安全资源
现在开通
立省540元
或者
购买C币兑换积分 做任务赚积分
img
资源所需积分 当前拥有积分
VIP年卡全年1200个资源免积分下载促销价60元,开通立省540元
下载
下载

兑换成功

你当前的下载分为234开始下载资源
你还不是VIP会员
开通VIP会员权限,免积分下载
立即开通

你下载资源过于频繁,请输入验证码

你下载资源过于频繁,请输入验证码

您因违反CSDN下载频道规则而被锁定帐户,如有疑问,请联络:webmaster@csdn.net!

举报

若举报审核通过,可奖励20下载分

  • 举报人:
  • 被举报人:
  • 举报的资源分:
  • *类型:
  • *详细原因: