下载 > 资源分类 >  网络技术 >  网络基础 > 自顶向下网络设计(英文版)

自顶向下网络设计(英文版)

内容简介:

《自顶向下网络设计(英文版)(第3版)》是围绕自顶向下网络设计步骤编写的,提供给网络设计者一种系统的结构化网络设计方法。《自顶向下网络设计(英文版)(第3版)》分为4个部分,即客户需求和目标、逻辑网络设计、物理网络设计,以及网络测试、优化和文档编写。4个部分分别对应着网络 设计的各个重要阶段,每个阶段都提供给读者详细的设计指导原则,内容涵盖网络设计的方方面面。《自顶向下网络设计(英文版)(第3版)》从用户商业和技术目标的分析入手,从而制定出相应的网络流量、负载和QoS需求,进而开发网络的逻辑拓扑结构,然后
                            进入地址规划、协议选择、网络安全和网络管理实施策略制定,最后是对网络设备的选型建议以及网络实施、测试和文档编写。《自顶向下网络设计(英文版)(第3版)》每章以复习题和设计环境作为一章的总结和回顾,理论与实践相结合,从而让读者更好地理解和掌握自顶向下网络设计的思想。
《自顶向下网络设计(英文版)(第3版)》适合Cisco代理商、网络运营商、其他网络设备商的网络部署人员、售后技术支持人员阅读;网络维护人员,以及网络技术爱好者也可以从《自顶向下网络设计(英文版)(第3版)》中获益。
本书目录:

Contents

Introduction xxii

Part I Identifying Your Customers Needs and Goals

Chapter 1 Analyzing Business Goals and Constraints

Using a Top-Down Network Design Methodology

Using a Structured Network Design Process

Systems Development Life Cycles

Plan Design Implement Operate Optimize (PDIOO) Network Life Cycle

Analyzing Business Goals

Working with Your Client

Changes in Enterprise Networks

Networks Must Make Business Sense

Networks Offer a Service

The Need to Support Mobile Users

The Importance of Network Security and Resiliency

Typical Network Design Business Goals

Identifying the Scope 网络设计f a Network Design Project

Identifying a Customers Network Applications

Analyzing Business Constraints

Politics and Policies

Budgetary and Staffing Constraints

Project Scheduling

Business Goals Checklist

Summary

Review Questions

Design Scenario

Chapter 2 Analyzing Technical Goals and Tradeoffs

Scalability

Planning for Expansion

Expanding Access to Data

Constraints on Scalability

Availability

Disaster Recovery

Specifying Availability Requirements

Five Nines Availability

The Cost of Downtime

Mean Time Between Failure and Mean Time to Repair

Network Performance

Network Performance Definitions

Optimum Network Utilization

Throughput

Throughput of Internetworking Devices

Application Layer Throughput

Accuracy

Efficiency

Delay and Delay Variation

Causes of Delay

Delay Variation

Response Time

Security

Identifying Network Assets

Analyzing Security Risks

Reconnaissance Attacks

Denial-of-Service Attacks

Developing Security Requirements

Manageability

Usability

Adaptability

Affordability

Making Network Design Tradeoffs

Technical Goals Checklist

Summary

Review Questions

Design Scenario

Chapter 3 Characterizing the Existing Internetwork

Characterizing the Network Infrastructure

Developing a Network Map

Characterizing Large Internetworks

Characterizing the Logical Architecture

Developing a Modular Block Diagram

Characterizing Network Addressing and Naming

Characterizing Wiring and Media

Checking Architectural and Environmental Constraints

Checking a Site for a Wireless Installation

Performing a Wireless Site Survey

Checking the Health of the Existing Internetwork

Developing a Baseline of Network Performance

Analyzing Network Availability

Analyzing Network Utilization

Measuring Bandwidth Utilization by Protocol

Analyzing Network Accuracy

Analyzing Errors on Switched Ethernet Networks

Analyzing Network Efficiency

Analyzing Delay and Response Time

Checking the Status of Major Routers, Switches, and Firewalls

Network Health Checklist

Summary

Review Questions

Hands-On Project

Design Scenario

Chapter 4 Characterizing Network Traffic

Characterizing Traffic Flow

Identifying Major Traffic Sources and Stores

Documenting Traffic Flow on the Existing Network

Characterizing Types of Traffic Flow for New Network Applications

Terminal/Host Traffic Flow

Client/Server Traffic Flow

Peer-to-Peer Traffic Flow

Server/Server Traffic Flow

Distributed Computing Traffic Flow

Traffic Flow in Voice over IP Networks

Documenting Traffic Flow for New and Existing Network Applications

Characterizing Traffic Load

Calculating Theoretical Traffic Load

Documenting Application-Usage Patterns

Refining Estimates of Traffic Load Caused by Applications

Estimating Traffic Load Caused by Routing Protocols

Characterizing Traffic Behavior

Broadcast/Multicast Behavior

Network Efficiency

Frame Size

Windowing and Flow Control

Error-Recovery Mechanisms

Characterizing Quality of Service Requirements

ATM QoS Specifications

Constant Bit Rate Service Category

Real-time Variable Bit Rate Service Category

Non-real-time Variable Bit Rate Service Category

Unspecified Bit Rate Service Category

Available Bit Rate Service Category

Guaranteed Frame Rate Service Category

IETF Integrated Services Working Group QoS Specifications

Controlled-Load Service

Guaranteed Service

IETF Differentiated Services Working Group QoS Specifications

Grade of Service Requirements for Voice Applications

Documenting QoS Requirements

Network Traffic Checklist

Summary

Review Questions

Design Scenario

Summary for Part I

Part II Logical Network Design

Chapter 5 Designing a Network Topology

Hierarchical Network Design

Why Use a Hierarchical Network Design Model?

Flat Versus Hierarchical Topologies

Flat WAN Topologies

Flat LAN Topologies

Mesh Versus Hierarchical-Mesh Topologies

Classic Three-Layer Hierarchical Model

Core Layer

Distribution Layer

Access Layer

Guidelines for Hierarchical Network Design

Redundant Network Design Topologies

Backup Paths

Load Sharing

Modular Network Design

Cisco SAFE Security Reference Architecture

Designing a Campus Network Design Topology

Spanning Tree Protocol

Spanning Tree Cost Values

Rapid Spanning Tree Protocol

RSTP Convergence and Reconvergence

Selecting the Root Bridge

Scaling the Spanning Tree Protocol

Virtual LANs

Fundamental VLAN Designs

Wireless LANs

Positioning an Access Point for Maximum Coverage

WLANs and VLANs

Redundant Wireless Access Points

Redundancy and Load Sharing in Wired LANs

Server Redundancy

Workstation-to-Router Redundancy

Hot Standby Router Protocol

Gateway Load Balancing Protocol

Designing the Enterprise Edge Topology

Redundant WAN Segments

Circuit Diversity

Multihoming the Internet Connection

Virtual Private Networking

Site-to-Site VPNs

Remote-Access VPNs

Service Provider Edge

Secure Network Design Topologies

Planning for Physical Security

Meeting Security Goals with Firewall Topologies

Summary

Review Questions

Design Scenario

……

Part III Physical Network Design

Part IV Testing, Optimizing, and Documenting Your Network Design                                                    
...展开收缩
综合评分:3(1位用户评分)
开通VIP C币充值 立即下载

评论共有1条

luo_007 2014-05-26 16:36:37
这是第二版啊,英文的看不懂

登录后才能评论

 
计算机网络自顶向下方法(原书第六版) 英文版(原书,答案,Wireshark 实验,编程题) 立即下载
积分/C币:5
计算机网络:自顶向下方法 第六版英文版 立即下载
积分/C币:12
计算机网络-自顶向下方法第6版中文版+英文版+答案 立即下载
积分/C币:5
《计算机网络自顶向下方法》第三版课后习题答案(英文版) 立即下载
积分/C币:5
计算机网络自顶向下第五版英文版 立即下载
积分/C币:3
计算机网络-自顶向下方法(中文版)(英文版)课后题答案 立即下载
积分/C币:3
计算机网络(自顶向下方法)第四版答案(英文版) 立即下载
积分/C币:3
计算机网络(自顶向下方法)第6版英文版 Computer Networking A Top-Down Approach 6th E 立即下载
积分/C币:2
计算机网络自顶向下方法第六版答案 英文版 立即下载
积分/C币:2
计算机网络:自顶向下方法英文版 立即下载
积分/C币:3
关闭
img

spring mvc+mybatis+mysql+maven+bootstrap 整合实现增删查改简单实例.zip

资源所需积分/C币 当前拥有积分 当前拥有C币
5 0 0
扫码关注并点击右下角获取下载码
输入下载码
为了良好体验,不建议使用迅雷下载
img

自顶向下网络设计(英文版)

会员到期时间: 剩余下载个数: 剩余C币: 剩余积分:
为了良好体验,不建议使用迅雷下载
VIP下载
您今日下载次数已达上限(为了良好下载体验及使用,每位用户24小时之内最多可下载20个资源)

积分不足!

资源所需积分/C币 当前拥有积分
您可以选择
开通VIP
4000万
程序员的必选
600万
绿色安全资源
现在开通
立省522元
或者
购买C币兑换积分 C币抽奖
img

资源所需积分/C币 当前拥有积分 当前拥有C币
5 4 45
(仅够下载10个资源)
为了良好体验,不建议使用迅雷下载
确认下载
img

资源所需积分/C币 当前拥有积分 当前拥有C币
5 0 0
为了良好体验,不建议使用迅雷下载
C币充值 开通VIP
img

资源所需积分/C币 当前拥有积分 当前拥有C币
5 4 45
您的积分不足,将扣除 10 C币
为了良好体验,不建议使用迅雷下载
确认下载
下载

兑换成功

你当前的下载分为234开始下载资源
你还不是VIP会员
开通VIP会员权限,免积分下载
立即开通

你下载资源过于频繁,请输入验证码

您因违反CSDN下载频道规则而被锁定帐户,如有疑问,请联络:webmaster@csdn.net!

举报

若举报审核通过,可奖励5下载分

  • 举报人:
  • 被举报人:
  • 举报的资源分:
  • *类型:
  • *详细原因: