You are previewing Campus Network Design Fundamentals.
O'Reilly logo
Campus Network Design Fundamentals

Book Description

The all-in-one guide to modern routed and switched campus network design 

  • Understand the network design process and network design models

  • Learn how switches are used in network design

  • Design an IP addressing plan and select appropriate IP routing protocols

  • Apply network security design principles to boost network security

  • Enable WLANs to improve workforce mobility

  • Examine QoS design requirements and tools

  • Unleash the power of voice transport over data networks, including VoIP and IP telephony

  • Use content networking to provide content to users quickly and efficiently

  • Learn how to integrate network management protocols and tools into network designs

  • Understand how to effectively integrate IP multicast, high availability, storage networking, and IPv6 into your network designs

  • Over the past decade, campus network design has evolved many times as new technologies have emerged and business needs have changed. For enterprises to take advantage of cost-saving, productivity-enhancing solutions, such as IP telephony and content networking, their core infrastructures must include the key enabling technologies required by these solutions and provide a resilient, secure foundation that can scale to business needs. As with any architecture, designing a solid foundation is the first step.

    Campus Network Design Fundamentals is an all-in-one guide to key technologies that can be integrated into network design. The book provides insight into why each technology is important and how to apply this knowledge to create a campus network that includes as many or as few of today’s productivity-enhancing applications as are needed in your environment. Topics covered throughout the book include network design process and models, switching, IP routing, quality of service (QoS), security, wireless LANs (WLANs), voice transport, content networking, network management, IPv6, IP multicast, increasing network availability, and storage networking. Sample network designs are included through-out, and the book concludes with a comprehensive case study that illustrates the design process and solutions for headquarters, branch offices, and home office/remote users.

    Whether you need an overview of modern campus technologies or seek advice on how to design switched and routed networks that securely support these technologies, this book is your comprehensive resource to the foundations upon which all modern-day campus networks are based.

    This book is part of the Cisco Press® Fundamentals Series. Books in this series introduce networking professionals to new networking technologies, covering network topologies, example deployment concepts, protocols, and management techniques.

    Table of Contents

    1. Copyright
      1. Dedications
    2. About the Authors
    3. About the Technical Reviewers
    4. Acknowledgments
    5. Icons Used in This Book
    6. Introduction
    7. I. Designing Networks
      1. 1. Network Design
        1. What Is Design?
        2. Design Principles
          1. Determining Requirements
          2. Analyzing the Existing Network
          3. Preparing the Preliminary Design
          4. Completing the Final Design Development
          5. Deploying the Network
          6. Monitoring and Redesigning
          7. Maintaining Design Documentation
        3. Modular Network Design
          1. What Is Modular Design?
          2. Hierarchical Network Design
            1. Access Layer
            2. Distribution Layer
            3. Core Layer
            4. Limitations of the Hierarchical Model
          3. The Cisco Enterprise Composite Network Model
            1. Enterprise Campus Functional Area
              1. Campus Infrastructure Module
              2. Management Module
              3. Server Module
              4. Edge Distribution Module
            2. Enterprise Edge Functional Area
            3. Service Provider Edge Functional Area
        4. Summary
        5. Endnotes
    8. II. Technologies: What you Need to know and why you Need to know it
      1. 2. Switching Design
        1. Making the Business Case
        2. Switching Types
          1. Layer 2 Switching
          2. Layer 3 Switching
        3. Spanning Tree Protocol
          1. Redundancy in Layer 2 Switched Networks
          2. STP Terminology and Operation
            1. STP Terminology
              1. STP States
            2. STP Options
            3. Rapid STP (RSTP)
        4. Virtual LANs
          1. VLAN Membership
          2. Trunks
          3. STP and VLANs
          4. VLAN Trunking Protocol
          5. Inter-VLAN Routing
        5. Multilayer Switching and Cisco Express Forwarding
          1. Multilayer Switching
          2. Cisco Express Forwarding
        6. Switching Security
          1. Catalyst Native Security
          2. Catalyst Hardware Security
        7. Switching Design Considerations
        8. Summary
        9. Endnotes
      2. 3. Pv4 Routing Design
        1. Making the Business Case
        2. IPv4 Address Design
          1. Determining How Many IP Addresses Are Required
          2. Using Private and Public Addresses and NAT
          3. How Routers Use Subnet Masks
          4. Determining the Subnet Mask to Use
          5. Hierarchical IP Address Design and Summarization
          6. Variable-Length Subnet Masks
        3. IPv4 Routing Protocols
          1. Classifying Routing Protocols
            1. Interior and Exterior Routing Protocols
            2. Distance Vector, Link-State, and Hybrid Routing Protocols
            3. Flat and Hierarchical Routing Protocols
            4. Classful and Classless Routing Protocols
          2. Metrics
          3. Convergence Time
          4. Route Summarization
          5. Routing Protocol Comparison
            1. Routing Information Protocol, Versions 1 and 2
            2. Interior Gateway Routing Protocol
            3. Enhanced Interior Gateway Routing Protocol
            4. Open Shortest Path First
            5. Integrated Intermediate System-to-Intermediate System
            6. Border Gateway Protocol Version 4
        4. IPv4 Routing Protocol Selection
          1. Choosing Your Routing Protocol
          2. Redistribution, Filtering, and Administrative Distance
        5. Summary
        6. Endnotes
      3. 4. Network Security Design
        1. Making the Business Case
        2. Hacking
          1. Types of Hackers
            1. White-Hat Hackers
        3. Vulnerabilities
          1. Design Issues
          2. Human Issues
          3. Implementation Issues
        4. Threats
          1. Reconnaissance Attacks
          2. Access Attacks
            1. Access Subterfuges
          3. Information Disclosure Attacks
            1. Social Engineering
            2. Phishing
          4. Denial of Service Attacks
        5. Mitigating Technologies
          1. Threat Defense
            1. Virus protection
            2. Traffic Filtering
              1. Static Packet Filtering
              2. Dynamic Packet Filtering
            3. Intrusion Detection and Prevention
              1. Intrusion Detection Systems
              2. Network-Based IDSs
              3. Host-Based IDSs
              4. Intrusion Prevention Systems
              5. Target-Based Intrusion Detection Systems
            4. Content Filtering
              1. URL Filtering
              2. E-mail Filtering
          2. Secure Communication
            1. Encrypted VPN
            2. SSL
            3. File Encryption
          3. Trust and Identity
            1. Authentication, Authorization, and Accounting
            2. Network Admission Control
            3. Public Key Infrastructure
          4. Network Security Best Practices
            1. Network Management
            2. Assessment and Audits
            3. Policies
        6. SAFE Campus Design
        7. Summary
        8. Endnotes
      4. 5. Wireless LAN Design
        1. Making the Business Case
        2. Wireless Technology Overview
          1. Wireless Standards
          2. Wireless Components
            1. Wireless Access Points
            2. Integrated Access Point
            3. Wireless Client Devices
              1. User Workstations and Laptops: Ad-Hoc Network
              2. PDAs
              3. Wireless IP Phones
        3. Wireless Security
          1. Wireless Security Issues
          2. Wireless Threat Mitigation
            1. Basic Wireless Security
              1. SSIDs
              2. Wired Equivalent Privacy
              3. MAC Address Verification
            2. Enhanced Wireless Security
              1. 802.1x
              2. Wi-Fi Protected Access
              3. 802.11i
            3. Wireless Intrusion Detection
        4. Wireless Management
        5. Wireless Design Considerations
          1. Site Survey
          2. WLAN Roaming
          3. Point-to-Point Bridging
          4. Design Considerations for Wireless IP Phones
        6. Summary
        7. Endnotes
      5. 6. Quality of Service Design
        1. Making the Business Case
        2. QoS Requirements for Voice, Data, Video, and Other Traffic
        3. QoS Models
          1. IntServ
          2. DiffServ
        4. QoS Tools
          1. Classification and Marking
            1. Classification
            2. Marking
          2. Policing and Shaping
            1. Policing Tools
            2. Shaping Tools
          3. Congestion Avoidance
          4. Congestion Management
          5. Link-Specific Tools
          6. AutoQoS
        5. QoS Design Guidelines
        6. Summary
        7. Endnotes
      6. 7. Voice Transport Design
        1. What Is Voice Transport?
          1. Digitization
          2. Packetization and Call Processing
          3. Conversation and Control Traffic
        2. Quality of Service
        3. VoIP Components
        4. IP Telephony Components
          1. IP Infrastructure
          2. IP Phones
          3. Video Telephony
          4. Call Processing
          5. Applications
          6. Voice Gateway
        5. Voice Coding and Compression Techniques
          1. Voice Compression
          2. Voice Activity Detection
          3. Compressed Real-Time Transport Protocol
        6. Bandwidth Requirements
          1. Definitions
          2. Calculating Trunk Capacity or Bandwidth
          3. Signaling Traffic Bandwidth
        7. IP Telephony Design
          1. Single-Site IP Telephony Design
          2. Multisite Centralized IP Telephony Design
          3. Multisite Distributed IP Telephony Design
        8. Voice Security
          1. IP Telephony Network Security Concerns
            1. Access Attacks
            2. Denial of Service Attacks
          2. Platform Security Issues
          3. Mitigating to Protect IP Telephony
        9. Summary
        10. Endnotes
      7. 8. Content Networking Design
        1. Making the Business Case
        2. Content Networking
        3. Content Caches and Content Engines
          1. Transparent Caching
          2. Nontransparent Caching
          3. Reverse Proxy Caching
        4. Content Routing
          1. Direct Mode
          2. WCCP Mode
        5. Content Distribution and Management
        6. Content Switching
        7. Designing Content Networking
          1. School Curriculum
          2. Live Video and Video on Demand for a Corporation
        8. Summary
        9. Endnotes
      8. 9. Network Management Design
        1. Making the Business Case
        2. ISO Network Management Standard
        3. Network Management Protocols and Tools
          1. Terminology
          2. SNMP
          3. MIB
          4. RMON
            1. RMON 1
            2. RMON2
            3. RMON Extensions
          5. Cisco NetFlow
          6. Syslog
          7. CiscoWorks
          8. Other Tools
        4. Managing a Network
          1. Network Management Strategy
          2. SLCs and SLAs
          3. IP Service-Level Agreements
        5. Network Management Design
        6. Summary
        7. Endnotes
      9. 10. Other Enabling Technologies
        1. IP Multicast
          1. Internet Group Management Protocol (IGMP) and Cisco Group Management Protocol (CGMP)
          2. Protocol Independent Multicast (PIM) Routing Protocol
        2. Increasing Network Availability
        3. Storage Networking
        4. IP Version 6
        5. Summary
        6. Endnotes
    9. III. Designing Your Network: How to Apply What You Know
      1. 11. Case Study Context: Venti Systems
        1. Background Information and Context
        2. Network Requirements After Acquisitions Are Complete
        3. Summary
      2. 12. Case Study Solution: Venti Systems
        1. Design Model
          1. Head Office
            1. Enterprise Campus
            2. Enterprise Edge and Service Provider Edge
          2. Branch Office
          3. Remote Users
          4. User Devices
          5. Servers
        2. Switching
          1. Head-Office Switching
          2. Branch-Office Switching
          3. Remote User Switching
        3. Security
          1. Head-Office Security
          2. Branch-Office Security
          3. Remote User Security
        4. IP Addressing and Routing Protocol
          1. Head-Office IP Addressing and Routing Protocol
          2. Branch-Office IP Addressing and Routing Protocol
          3. Remote User IP Addressing and Routing Protocol
        5. E-Mail
          1. Head-Office E-Mail
          2. Branch-Office E-Mail
          3. Remote User E-Mail
        6. QoS and Voice
          1. Head-Office QoS and Voice
          2. Branch-Office QoS and Voice
          3. Remote User QoS and Voice
        7. Wireless
          1. Head-Office Wireless
          2. Branch-Office Wireless
          3. Remote User Wireless
        8. Network Management
          1. Head-Office Network Management
          2. Branch-Office Network Management
          3. Remote User Network Management
        9. Future Considerations
        10. Summary
        11. Endnotes
    10. IV. Appexdixes
      1. A. References
      2. B. Network Fundamentals
        1. Introduction to Networks
        2. Protocols and the OSI Model
          1. The OSI Model
          2. Protocols
          3. The OSI Layers
            1. Physical Layer (Layer 1)
            2. Data Link Layer (Layer 2)
            3. Network Layer (Layer 3)
            4. Transport Layer (Layer 4)
            5. Upper Layers (Layers 5 through 7)
          4. Communication Among OSI Layers
        3. LANs and WANs
        4. Network Devices
          1. Terminology: Domains, Bandwidth, Broadcast, and Multicast
          2. Hubs
          3. Switches
          4. Routers
        5. Introduction to the TCP/IP Suite
          1. TCP/IP Transport Layer Protocols
            1. Port Numbers
            2. TCP Sequencing, Acknowledgment, and Windowing
          2. TCP/IP Internet Layer Protocols
            1. Protocols
            2. IP Datagrams
        6. Routing
          1. Routers Work at the Lower Three OSI Layers
          2. Routing Tables
          3. Routing Protocols
        7. Addressing
          1. Physical and Logical Addresses
          2. Routing and Network Layer Addresses
          3. IP Addresses
            1. IP Address Classes
            2. Private and Public IP Addresses
            3. Subnets
        8. Comprehensive Example
        9. Summary
      3. C. Decimal-Binary Conversion
        1. Decimal-to-Binary Conversion Chart
        2. Decimal Numbers
        3. Binary Numbers
        4. Converting Binary IP Addresses to Decimal
        5. Converting Decimal IP Addresses to Binary
      4. D. Abbreviations