Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Lee K.-K. — Building Resilient IP Networks
Lee K.-K. — Building Resilient IP Networks



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Building Resilient IP Networks

Автор: Lee K.-K.

Аннотация:

The practical guide to building resilient and highly available IP networks

An all-in-one introduction to the various new features and developments in building a resilient IP network

A singular source on what Cisco hardware, software products can offer toward resiliency

Learn how a resilient IP network helps deliver mission-critical information, like video, voice services

Configuration examples offer easy-to-follow implementation guides

More and more companies are building networks that are used not only for corporate communication, but most importantly, for doing business. Since the network has become such a strategic business tool, its availbality is of utmost importance to these companies and to their service providers. Therefore, the challenge for network professionals is ensuring networks are up at all times; keeping abreast of the latest technology that helps maintain uptime; and reacting to ever-increasing denial of service attacks. Problems faced by network professionals when meeting these challenges include lack of understanding regarding network availability; ignorance of the latest features and tools; hard-to-find documentation; lack of education programs; savvy black hats who attack networks. Building Resilient IP Networks helps network professionals take on these challenges. First it shows what network availability means and focuses on real-life issues: appreciating the limitations of protocols and understanding what's been done to improve them. Next the book addresses the benefits of modular design and illustrates how modular design contributes to a resilient network. The bulk of the book explores new features and tools that recently developed with respect to modular design.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 432

Добавлена в каталог: 13.06.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
50-ms
50-ms resiliency      
50-ms resiliency,      
access control lists (ACLs),      2nd
access design      
Access layer      
access layer,      2nd
access,      
accounting      
accounting, management of,      
accumulated outage time (AOT),      
achieving      
achieving high-availability,      
achieving,      
ACLs (access control lists),      2nd
Address Resolution Protocol (ARP),      2nd
Addresses      
addressing/routing      
addressing/routing,      
adjacency      
adjacency tables,      
adjusted availability,      
Adv Rtr      
Adv Rtr (advertising router),      
Aggregation      
aggregation design      
aggregation layer      
aggressive mode, UDLD configuration,      
alerts, PSIRT,      
ALG (Application Level Gateway),      
Algorithms      
Alternate      
alternate ports,      
Analysis      
analyzing      
Anomaly Detection and Mitigation Modules,      
ANS (authoritative name server),      
anti-spoofing,      
AOT (accumulated outage time),      
Application Level Gateway (ALG),      
application-specific gateways,      
application-specific integrated circuit (ASIC),      
applications      
applications with QoS      
applications,      
applying GSS,      
APS (Automatic Protection Switching),      
Architecture      
architecture (switches)      
architecture,      
ARP      2nd
ARP (Address Resolution Protocol),      2nd
as dial backups      
ASIC      
ASIC (application-specific integrated circuit),      
assignment of addresses,      
Attacks      
authoritative name server (ANS),      
auto route injection,      
Automatic Protection Switching (APS),      
autonegotiation, turning off,      
Availability      
avoidance      
avoidance, congestion,      
BackboneFast      
BackboneFast,      
backbones, Gigabit Ethernets,      
Backups      
baselines, establishing,      
baselines.      [See baselines]
BCPs (Best Current Practices),      
Best practices      
BFD      
BFD (Bidirectional Forwarding Detection),      
BFD,      
BGP      
BGP (Border Gateway Protocol),      2nd
BGP convergence      
BGP fast peering session deactivation      
BGP,      
BID (bridge ID),      
Bidirectional Forwarding Detection.      [See BFD]
bidirectional line switch ring (BLSR),      
binding, delayed,      
blade connectivity      
blade server connectivity,      
blade servers      
Blocking      
BLOCKS      
BLSR (bidirectional line switch ring),      
boot codes,      
Border Gateway Protocol.      [See BGP]
BPDU (Bridge Protocol Data Unit),      
BPDUGuard      
BPDUGuard,      
bridge ID (BID),      
Bridge Protocol Data Unit.      [See BPDU]
bridges,      
building blocks      
building blocks (access module),      
building blocks,      
Cables      
Cabling      
cabling,      
caches,      
Calculating      
calculations      
capacity failures,      
cards      
Catalyst switch support      
Catalyst switch support, PVLANs,      
causes of      
causes of network failures,      
CE
CE (customer edge) routers,      2nd
CE routers      
CEF      
CEF (Cisco Express Forwarding),      2nd
central mode      
central mode,      
channeling      
channeling,      
CIDR      
CIDR (classless interdomain routing),      
circuits      
Cisco Component Outage Online (COOL),      
Cisco Express Forwarding.      [See CEF]
Cisco IOS      
Cisco IOS deployment,      
Cisco Networking Services (CNS) events,      
CISCO-OUTAGE-MONITOR      
CISCO-OUTAGE-MONITOR MIB,      
CISCO-PROCESS-MIB, OIDs within,      
Class-Based QoS MIB,      
classes of      
classes of service      
classes of service, DPT/SPR,      
Classification      
classifying      
classless interdomain routing (CIDR),      
client name server (CNS),      
Clustering      
clustering,      
CNS      
CNS (Cisco Networking Services) events,      
CNS (client name server),      
cold restart feature,      
coloring,      
Commands      
Common Spanning Tree (CST),      
community ports,      
community VLANs,      
Complete Sequence Number Packet (CSNP),      
components      
components,      
Conditioning      
conditioning, traffic,      
Configuration      
configuration file management      
Configuring      
configuring,      
Congestion      
Connections      
conserving peering resources,      
Content Switching Module (CSM),      
content switching.      [See SLB]
continuous fault      
continuous fault detection,      
control packets      
control packets, tagging,      
control plane traffic      
control planes      
controller cards,      
Convergence      
convergence,      
cool      
COOL (Cisco Component Outage Online),      
COOL measurements      
Core      
Core layer      
core layer,      
core,      
counter-rotating rings (DPT),      
CRS-1      
CRS-1 router,
CSM (Content Switching Module),      
CSNP      
CSNP (Complete Sequence Number Packet),      
CST (Common Spanning Tree),      
customer edge (CE) routers,      2nd
customization.      [See also configuration]
Cycles      
cycles,      
cycles, STP,      
dampening      
dampening (routes),      
DARPA (Defense Advanced Research Projects Agency),      
Data center      
Data Center module      
Data Center module,      
Data Center network performance      
Data Center networks      
data planes      
datagrams,      [See also UDP]
dCEF      
dCEF (Distributed CEF),      
dCEF,      
debug commands      
debug dampening interface      
debug ip ospf database-timer rate-limit      
debug ip ospf flood      
debug ip ospf spf      2nd
debug isis adj      
debug isis adj-packets      
debug isis nsf      
debug isis snp      
default costs for STP      
default path costs for STP,      
defects-per-million method      
defects-per-million method,      
Defense Advanced Research Projects Agency (DARPA),      
Defining      
delayed binding      
delayed binding,      
demilitarized zone (DMZ) servers,      
denial-of-service (DoS) attacks,      2nd
deploying      
Deployment      
Design      
Designated      
designated IS (DIS),      
designated ports,      
detection,      
device-level      
device-level redundancy,      
device-level resiliency,      2nd
devices      
DHCP      
DHCP (Dynamic Host Control Protocol)      
DHCP servers      
diagrams, cabling,      
dial backup      
dial backup (WAN),      
dial backup,      
dial backups (WAN)      
diameter keyword,      
DiffServ model      
DiffServ model (QoS),      
direct connections (Layer 2),      
directed mode (SLB),      
DIS (designated IS),      
disabled      
disabled ports,      
disabled states,      
disasters (failures),      
discipline, cabling,      
dispatch mode (SLB),      
Distributed CEF (dCEF),      
Distribution layer      
distribution layer,      
distribution,      
DLC (domestic leased circuit),      
DMZ      
DMZ (demilitarized zone) servers,      
DNS (Domain Name System),      
DNSR (DNS resolver),      
documentation, cabling,      
Domain Name System (DNS),      
domains      
domestic leased circuit (DLC),      
DoNotAge      
DoNotAge link-state advertisements,      
DOS      2nd
DoS (denial-of-service) attacks,      2nd
DoS attacks      
downtime      
DPR/SPR rings      
DPT      
DPT (Dynamic Packet Transport),      2nd
duplicate acknowledgment (DUPACK),      
dynamic ARP inspection      
dynamic ARP inspection,      
Dynamic Host Control Protocol.      [See DHCP]
Dynamic Packet Transport.      [See DPT]
dynamic soft reset,      
Early Deployment (ED) release,      
echo      
echo (ICMP),      
ECMP (equal-cost multipath),      2nd
ED (Early Deployment) release,      
EEM      
EEM (Embedded Event Manager),      
effect of Internet growth,      
effect of NAT on      
effect on applications      
EIGRP      
EIGRP (Enhanced Interior Gateway Routing Protocol),      
Embedded Event Manager (EEM),      
Enabling      
Encapsulation      
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте