Contents IntroductionxviiiPart I Designing Networks2Chapter 1
Network Design4What Is Design?5Design Principles7Determining
Requirements9Analyzing the Existing Network11Preparing the
Preliminary Design12Completing the Final Design
Development12Deploying the Network12Monitoring and
Redesigning13Maintaining Design Documentation13Modular Network
Design14What Is Modular Design?14Hierarchical Network Design15The
Cisco Enterprise Composite Network Model18Summary24Part II
Technologies: What You Need to Know and Why You Need to Know
It26Chapter 2 Switching Design28Making the Business Case29Switching
Types30Layer 2 Switching30 Layer 3 Switching33Spanning-Tree
Protocol34Redundancy in Layer 2 Switched Networks35STP Terminology
and Operation36Virtual LANs40VLAN Membership42Trunks42STP and
VLANs44VLAN Trunking Protocol45Inter-VLAN Routing46Multilayer
Switching and Cisco Express Forwarding47Multilayer Switching47Cisco
Express Forwarding49Switching Security50Catalyst Native
Security51Catalyst Hardware Security53Switching Design
Considerations53Summary55Chapter 3 IPv4 Routing Design58Making the
Business Case59IPv4 Address Design60Determining How Many IP
Addresses Are Required61Using Private and Public Addresses and
NAT61How Routers Use Subnet Masks63Determining the Subnet Mask to
Use64Hierarchical IP Address Design and
Summarization67Variable-Length Subnet Masks70IPv4 Routing
Protocols74Classifying Routing Protocols75Metrics79Convergence
Time80Route Summarization81Routing Protocol Comparison82IPv4
Routing Protocol Selection94Choosing Your Routing
Protocol94Redistribution, Filtering, and Administrative
Distance95Summary98Chapter 4 Network Security Design100Making the
Business Case101Hacking103Types of
Hackers104Vulnerabilities104Design Issues105Human
Issues105Implementation Issues105Threats106Reconnaissance
Attacks106Access Attacks106Information Disclosure Attacks107Denial
of Service Attacks108Mitigating Technologies111Threat
Defense111Secure Communication117Trust and Identity121Network
Security Best Practices124SAFE Campus Design125Summary129Chapter 5
Wireless LAN Design130Making the Business Case131Wireless
Technology Overview132Wireless Standards133Wireless
Components135Wireless Security137Wireless Security
Issues138Wireless Threat Mitigation138Wireless
Management141Wireless Design Considerations143Site Survey143WLAN
Roaming144Point-to-Point Bridging145Design Considerations for
Wireless IP Phones145Summary146Chapter 6 Quality of Service
Design148Making the Business Case149QoS Requirements for Voice,
Data, Video, and Other Traffic151QoS
Models153IntServ153DiffServ154QoS Tools154Classification and
Marking155Policing and Shaping161Congestion Avoidance163Congestion
Management164Link-Specific Tools166AutoQoS167QoS Design
Guidelines168Summary170Chapter 7 Voice Transport Design172What Is
Voice Transport?174Digitization175Packetization and Call
Processing176Conversation and Control Traffic177Quality of
Service177VoIP Components178IP Telephony Components179IP
Infrastructure179IP Phones180Video Telephony181Call
Processing181Applications181Voice Gateway182Voice Coding and
Compression Techniques182Voice Compression182Voice Activity
Detection184Compressed Real-Time Transport Protocol184Bandwidth
Requirements185Definitions185Calculating Trunk Capacity or
Bandwidth186Signaling Traffic Bandwidth188IP Telephony
Design188Single-Site IP Telephony Design189Multisite Centralized IP
Telephony Design189Multisite Distributed IP Telephony
Design190Voice Security190IP Telephony Network Security
Concerns191Platform Security Issues191Mitigating to Protect IP
Telephony192Summary193Chapter 8 Content Networking Design196Making
the Business Case197Content Networking198Content Caches and Content
Engines199Transparent Caching200Nontransparent Caching201Reverse
Proxy Caching203Content Routing204Direct Mode204WCCP Mode206Content
Distribution and Management207Content Switching208Designing Content
Networking209School Curriculum209Live Video and Video on Demand for
a Corporation210Summary212Chapter 9 Network Management
Design214Making the Business Case215ISO Network Management
Standard216Network Management Protocols and
Tools216Terminology217SNMP218MIB218RMON220Cisco
NetFlow223Syslog224CiscoWorks225Other Tools225Managing a
Network228Network Management Strategy228SLCs and SLAs228IP
Service-Level Agreements229Network Management
Design230Summary232Chapter 10 Other Enabling Technologies234IP
Multicast235Internet Group Management Protocol (IGMP) and Cisco
Group Management Protocol (CGMP)236Protocol Independent Multicast
(PIM) Routing Protocol237Increasing Network Availability239Storage
Networking242IP Version 6244Summary247Part III Designing Your
Network: How to Apply What You Know250Chapter 11 Case Study
Context: Venti Systems252Background Information and
Context253Network Requirements After Acquisitions Are
Complete257Summary263Chapter 12 Case Study Solution: Venti
Systems264Design Model265Head Office267Branch Office270Remote
Users271User Devices272Servers273Switching273Head-Office
Switching274Branch-Office Switching275Remote User
Switching275Security275Head-Office Security278Branch-Office
Security281Remote User Security281IP Addressing and Routing
Protocol281Head-Office IP Addressing and Routing
Protocol281Branch-Office IP Addressing and Routing
Protocol282Remote User IP Addressing and Routing
Protocol283E-Mail283Head-Office E-Mail283Branch-Office
E-Mail284Remote User E-Mail284QoS and Voice284Head-Office QoS and
Voice284Branch-Office QoS and Voice288Remote User QoS and
Voice288Wireless288Head-Office Wireless288Branch-Office
Wireless288Remote User Wireless288Network Management289Head-Office
Network Management289Branch-Office Network Management291Remote User
Network Management291Future Considerations291Summary291Part
IV Appendixes292Appendix A References294Appendix B Network
Fundamentals300Appendix C Decimal-Binary Conversion340Appendix D
Abbreviations3501587052229TOC121905
For enterprises to take advantage of cost-saving, productivity-enhancing solutions, such as IP telephony and Wireless LANs, their core infrastructure must include the key enabling technologies required by these solutions and provide a resilient, secure foundation that can scale to business needs. As with any architecture, designing a solid foundation is the first step. Over the past decade, campus network design has evolved many times as new technologies have emerged and business needs have changed. IP telephony, IP video, and e-learning, allow enterprises to increase productivity. Wireless LANs expand the workplace to allow information and application access beyond an employee's desktop. Meanwhile, Internet worms and viruses are on the rise, increasing the need to find ways to protect networks and data, and to ensure the availability of the network resources. Campus Network Design Fundamentals is an all-in-one guide to switched Ethernet design that instructs readers on key LAN infrastructure components. The book provides insight into why each technology is important and how to apply this knowledge to create a campus network that includes as many or as few of today's productivity-enhancing applications as are needed in any given environment. Key topics covered through-out the book include switching, IP routing, Quality of Service (QoS), security, wireless LANs, voice transport, content networking, network management, IPv6, IP multicast, and storage networking.
Diane Teare, CCNP(R), CCDP(R), is a 20-year veteran in the networking, training, and e-learning fields. Diane has extensive knowledge of network design and routing technologies and is a Cisco instructor with one of the largest Cisco Learning Partners. Catherine Paquet, CCSP , CCNP, works in the field of internetworking and security. Catherine has in-depth knowledge of security systems, remote-access, and routing technology. She is a Cisco instructor with one of the largest Cisco Learning Partners.
![]() |
Ask a Question About this Product More... |
![]() |