- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
The practical guide to building resilient and highly available IP networks Learn from an all-in-one introduction to new features and developments in building a resilient IP network Enable your organization to meet internal service-level agreements (SLAs) for mission-critical resources Understand how a resilient IP network can help in delivering mission-critical information such as video and voice services Work with configuration examples that are based on real-world issues and customer requirements Get tips and best practices from field personnel who have worked on some of the largest networks with stringent uptime requirements and SLAsMore companies are building networks with the intention of using them to conduct business. Because the network has become such a strategic business tool, its availability is of utmost importance to companies and their service providers. The challenges for the professionals responsible for these networks include ensuring that the network remains up all the time, keeping abreast of the latest technologies that help maintain uptime, and reacting to ever-increasing denial-of-service (DoS) attacks.Building Resilient IP Networks helps you meet those challenges. This practical guide to building highly available IP networks captures the essence of technologies that contribute to the uptime of networks. You gain a clear understanding of how to achieve network availability through the use of tools, design strategy, and Cisco IOS (R) Software.With Building Resilient IP Networks, you examine misconceptions about five-nines availability and learn to focus your attention on the real issues: appreciating the limitations of the protocols, understanding what has been done to improve them, and keeping abreast of those changes. Building Resilient IP Networks highlights the importance of having a modular approach to building an IP network and, most important, illustrates how a modular design contributes to a resilient network. You learn how an IP network can be broken down to various modules and how these modules interconnect with one another. Then you explore new network resiliency features that have been developed recently, categorized with respect to the design modules.Building Resilient IP Networks is relevant to both enterprise and service provider customers of all sizes. Regardless of whether the network connects to the Internet, fortifying IP networks for maximum uptime and prevention of attacks is mandatory for anyone's business.This book is part of the Networking Technology Series from Cisco Press (R), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
Contents
IntroductionChapter 1 Rise of the IP Transport SystemThe Internet ExplosionNext-Generation IP ApplicationsVoice over IPIP StorageMPLS: New Kid on the BlockNext-Generation IP Transport SystemContinuous Improvements of ProtocolsChapter 2 Establishing a High-Availability NetworkUnderstanding the Five-Nines Availability DebateDifferentiating Between Reliability and AvailabilityThe Five-Nines ApproachIdiosyncrasies of the Telcordia GR-512-Core DocumentThe Truth About 50-ms ResiliencyA Practical Approach to Achieving High AvailabilityMeasuring AvailabilityDefining a MetricUnderstanding the Issue of Network AvailabilitySetting a Strategy to Achieve High AvailabilityDesigning a Network for High AvailabilityEstablishing Continuous Fault Detection and Measurement of Network AvailabilityMaking Full Use of Scheduled DowntimeInstituting a Disciplined Approach to Network Operation and ProcessesSummaryChapter 3 Fundamentals of IP Resilient NetworksRevisiting IP, TCP, and UDPInternet ProtocolTransmission Control ProtocolTCP Three-Way HandshakeTCP Sliding WindowUser Datagram ProtocolDevice-Level ResiliencyOnline Insertion and Removal (OIR)Single Line Card ReloadHigh System AvailabilityRoute Processor RedundancyRoute Processor Redundancy PlusStateful SwitchoverNonstop ForwardingImpact of Different Switching PathsProcess SwitchingCisco Express Forwarding SwitchingCentral CEFDistributed CEFProtecting the Control Plane and Data PlaneEstablishing a Resiliency StrategyRedundancy StrategyLogical ResiliencyPhysical ResiliencyScaling StrategyKey Principles for Designing Resilient NetworksSimplicityModularitySecuritySummaryChapter 4 Quality of ServiceProtecting the Control Plane with QoSTraffic Types That Affect the Control PlaneTagging Routing Protocol and Layer 2 Control PacketsIP PrecedenceThe pak_priority FlagSelective Packet DiscardReceive ACLControl-Plane PolicingProtecting Applications with QoSUnderstanding the Need for Application QoSLatencyJitterLossDetermining When to Deploy QoSScenario 1: Undercongested LinkScenario 2: Occasionally Congested LinkScenario 3: Badly Congested LinkBuilding Blocks of QoSClassification and MarkingCongestion AvoidanceCongestion ManagementTraffic ConditioningApplication QoS and Control-Plane TrafficQoS Deployment StrategyClassifying ApplicationsDefining PoliciesTesting PoliciesImplementing QoS FeaturesMonitoringSummaryChapter 5 Core ModuleNetwork Convergence in the CoreOSPF EnhancementsShortest Path First (SPF) ThrottlingOSPF LSA ThrottlingOSPF LSA Flooding ReductionOSPF Fast HelloOSPF Update Packet-Pacing TimerOSPF Incremental SPFOSPF Graceful RestartRFC 3623Cisco ImplementationIS-IS EnhancementsIS-IS SPF ThrottlingIS-IS LSP GenerationIS-IS LSA Flooding ReductionIS-IS Fast HellosIS-IS Update Packet-Pacing TimerIS-IS Incremental SPFIS-IS Graceful RestartCisco ImplementationIETF ImplementationEIGRP EnhancementsEIGRP Graceful ShutdownEIGRP Graceful RestartEIGRP Stub Router FunctionalityBidirectional Forwarding Detection (BFD)IP Event DampeningMultipath RoutingLoad BalancingEqual-Cost Multipath (ECMP)Per PacketPer DestinationMPLS Traffic EngineeringFast Reroute Link ProtectionFast Reroute Node ProtectionMulticast Subsecond ConvergenceSummaryChapter 6 Access ModuleMultilayer Campus DesignAccess LayerDistribution LayerCore LayerAccess Module Building BlocksLayer 2 DomainThe Spanning Tree Protocol: IEEE 802.1dPortFastUplinkFastBackboneFastUnidirectional Link Detection (UDLD)RootGuardLoopGuardBPDUGuardVLANs and TrunkingCommon Spanning Tree (CST)Per-VLAN Spanning Tree (PVST)Per-VLAN Spanning Tree Plus (PVST+)IEEE 802.1wIEEE 802.1sChanneling TechnologyLayer 2 Best PracticesSimple Is BetterLimit the Span of VLANsBuild Triangles, Not SquaresProtect the Network from UsersSelecting Root BridgesUse Value-Added FeaturesEtherChannel DeploymentEtherChannel Load BalancingConsistent EtherChannel Port SettingsLayer 2 Setting for EtherChannelTurning Off AutonegotiationLayer 3 DomainHot Standby Routing Protocol (HSRP)Virtual Router Redundancy Protocol (VRRP)Global Load Balancing Protocol (GLBP)Layer 3 Best PracticesAdopt Topology-Based SwitchingUsing Equal-Cost MultipathConserve Peering ResourcesAdopt a Hierarchical Addressing SchemeSummaryChapter 7 Internet ModuleUnderstanding Addressing and Routing in the Internet ModuleAddress-Assignment SchemeRoutingRouting for Internal UsersRouting for External UsersEstablishing Internet Module RedundancyLink-Level RedundancyDevice-Level RedundancyISP-Level RedundancySite-Level RedundancyImplementing Security MeasuresSecurity PolicyFiltering at the Internet ModuleResilient Border Gateway Protocol (BGP) DesignBGP Soft ReconfigurationBGP Convergence OptimizationBGP Next-Hop Address TrackingBGP Support for Fast Peering Session DeactivationBGP Route DampeningNonstop Forwarding with Stateful Switchover (NSF/SSO) for BGPUsing Network Address Translation (NAT)Enhanced NAT ResiliencyNAT with Route MapStatic Mapping with Hot Standby Routing Protocol (HSRP) SupportStateful NATLimiting NAT EntriesMultihoming with NATEffects of NAT on Network and ApplicationsImplications on TCP and ICMP TrafficApplication-Specific GatewaysEffects on Voice over IP (VoIP) TrafficEffects on Router PerformanceEffects on Network SecuritySummaryChapter 8 WAN ModuleLeased LineDomestic Leased Circuit Versus International Private Leased CircuitLeased Circuit EncapsulationEqual-Cost Load BalancingMultilink Point-to-Point Protocol (MPPP)SONET/SDHSONET/SDH FramingPPP over SONET/SDHSONET/SDH Protection SwitchingResilient Packet RingDPT ArchitectureDPT/SRP Classes of ServiceSRP QueuingSRP Fairness AlgorithmRPR StandardsDifferences Between 802.17 and DPT/SRPDial BackupVirtual Private Network (VPN)IP TunnelL2TPv3L2TPv3 DeploymentMPLS-VPNSummaryChapter 9 Data Center ModuleData Center Environmental ConsiderationsCablingTaggingDocumentationDisciplineRack SpaceServer SizePowerNext-Generation Server ArchitectureData Center Network ConsiderationsSecurityServer PerformanceFault-Tolerant Server FeaturesMultifaceted ServerData Center Network ArchitectureAccess Layer DesignNIC TeamingClusteringAggregation Layer DesignTrunk Ports on an Aggregation SwitchRouted Ports on an Aggregation SwitchArchitecture Scaling ConsiderationData Center Network SecurityLayer 2 SecurityPrivate VLANs (PVLANs)VLAN Access Control List (VACL)Port SecurityDynamic ARP InspectionLayer 3 SecuritySwitch Forwarding ArchitectureControl Plane PolicingDHCP Server ProtectionService OptimizationServer Load BalancingGlobal Site SelectorUnderstanding DNS ResolutionUsing GSSWeb Cache Communication Protocol (WCCP)Integrated Service ModulesSummaryChapter 10 Beyond Implemention: Network ManagmentComponents of Network ManagementFault ManagementConfiguration ManagementConfiguration File ManagementInventory ManagementSoftware ManagementAccounting ManagementPerformance ManagementSecurity ManagementACLsUser IDs and PasswordsTACACSEstablishing a BaselineStep 1: Take a Snapshot of InventoryStep 2: Collect Relevant DataMIB Entries and Object IdentifiersMulti-Router Traffic GrapherStep 3: Analyze DataStep 4: Prioritize Problem AreasStep 5: Determine a Course of ActionManaging Cisco IOS DeploymentOverview of IOS ReleasesUnderstanding IOS Naming ConventionIOS Software Life Cycle ManagementPlanningDesignTestingImplementationOperationMoving Toward Proactive ManagementIP Service Level AgreementICMP-Based IP SLA OperationResponder-Based IP SLA OperationNonresponder-Based IP SLA OperationExamples of IP SLA OperationsComponent Outage Online (COOL) MeasurementEmbedded Event Manager (EEM)Next-Generation IOS ArchitectureSummaryEnd NotesAppendix A Calculating Network AvailabilityAppendix BRFCs Relevant to Building a Resilient IP NetworkAppendix CThe Cisco Powered Network ChecklistIndex1587052156TOC112205