Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Lee K.-K. — Building Resilient IP Networks
Lee K.-K. — Building Resilient IP Networks



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Building Resilient IP Networks

Автор: Lee K.-K.

Аннотация:

The practical guide to building resilient and highly available IP networks

An all-in-one introduction to the various new features and developments in building a resilient IP network

A singular source on what Cisco hardware, software products can offer toward resiliency

Learn how a resilient IP network helps deliver mission-critical information, like video, voice services

Configuration examples offer easy-to-follow implementation guides

More and more companies are building networks that are used not only for corporate communication, but most importantly, for doing business. Since the network has become such a strategic business tool, its availbality is of utmost importance to these companies and to their service providers. Therefore, the challenge for network professionals is ensuring networks are up at all times; keeping abreast of the latest technology that helps maintain uptime; and reacting to ever-increasing denial of service attacks. Problems faced by network professionals when meeting these challenges include lack of understanding regarding network availability; ignorance of the latest features and tools; hard-to-find documentation; lack of education programs; savvy black hats who attack networks. Building Resilient IP Networks helps network professionals take on these challenges. First it shows what network availability means and focuses on real-life issues: appreciating the limitations of protocols and understanding what's been done to improve them. Next the book addresses the benefits of modular design and illustrates how modular design contributes to a resilient network. The bulk of the book explores new features and tools that recently developed with respect to modular design.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 432

Добавлена в каталог: 13.06.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
end nodes (L2TP),      
End of Engineering (EOE),      
End of Life (EOL),      
End of Sales (EOS),      
End-of-Table (EOT) signal,      
Enhanced Interior Gateway Routing Protocol.      [See EIGRP]
enhanced NAT resiliency      
enhancements      
enhancements,      
entries      
entries in      
entry limitation      
entry limitation (NAT),      
environmental considerations      
environmental considerations (Data Center module),      
environmental considerations,      
EOE (End of Engineering),      
EOL (End of Life),      
EOS (End of Sales),      
EOT (End-of-Table) signal,      
equal-cost      
equal-cost load balancing      
equal-cost load balancing,      
equal-cost multipath (ECMP),      2nd
errors, software protection,      
establishing baselines,      
EtherChannel      
EtherChannel,      
event dampening      
event dampening (IP),      
event dampening,      
Event Publisher,      
Event Subscriber,      
Events      
execute-on <lot>
execute-on,      
exponential back-off behavior, SPF,      
Extensions      
extensions, graceful restart,      
external users      
external users, routing,      
extranet reachability      
extranet servers, reachability,      
failure,      [See also troubleshooting]
failures      
fairness (SRP)      
fairness algorithms (SRP),      
farms      2nd
farms (servers),      2nd
Fast EtherChannel (FEC),      
Fast Hello      
Fast Hello,      
Fast Hellos      
Fast Hellos,      
fast peering session deactivation      
fast peering session deactivation,      
Fast Reroute (FRR),      
fast reroute link protection      
fast reroute link protection,      
fast reroute node protection      
fast reroute node protection,      
fault      
fault detection,      
Fault Management      
fault management,      
fault-tolerant      
fault-tolerant servers,      
FCIP (Fibre Channel over IP),      
FEC (FastEtherChannel),      
FEC (forwarding equivalence class),      2nd
Fibre Channel over IP (FCIP),      
Field Programmable Gate Array (FPGA) codes,      
file management      
files, configuration management,      
Filtering      
filtering (Internet module),      
filtering,      
Firewall Service Module (FWSM),      
five-nines      
five-nines availability,      
five-nines,      
flags, pak_priority,      
flaps      
flaps (routing),      
flash crowds,      
floating static      
floating static routes,      
flood packet pacing timer      
flood packet pacing timer command,      
flooding      
flooding reduction      2nd
flooding reduction,      
flow-based      
flow-based architecture,      
formatting UDP,      [See also configuration]
forward delay      
forward delay timers,      
Forwarding      
forwarding architecture      
forwarding equivalence class (FEC),      2nd
FPGA (Field Programmable Gate Array) codes,      
framing (SONET/SDH),      
FRR (Fast Reroute),      
functional entities,      
FWSM (Firewall Service Module),      
gateways, application-specific,      
GD (General Deployment) release,      
GEC (Gigabit EtherChannel),      
General Deployment (GD) release,      
generating      
Generation      
Gigabit EtherChannel (GEC),      
Gigabit Ethernet backbones,      
Gigabit Switch Router (GSR),      
GLBP      
GLBP (Global Load Balancing Protocol),      
glbp priority      
glbp priority command,      
Global Load Balancing Protocol (GLBP),      
global server load balancing (GSLB),      
Global Site Selector (GSS),      
global synchronization,      
Graceful Restart      
graceful restart,      
graceful shutdown      
graceful shutdown (EIGRP),      
graceful shutdown,      
graphs, MRTG,      
groups, availability of,      
growth of Internet, effect of,      
GSLB (global server load balancing),      
GSR      
GSR (Gigabit Switch Router),      
GSS (Global Site Selector),      
half      
half circuits,      
Hardware      
headers, ISL,      
heartbeat mechanisms,      
Hello      2nd
Hello intervals      
Hello packets,      
Hello protocol,      2nd
hello timers,      
hierarchical IP addressing schemes,      
high availability      
high system availability (HSA),      
High-Availability      
high-availability networks      
high-availability networks,      
high-density server farms, scaling,      
high-priority services,      
hops, next-hop address tracking (BGP),      
Hot Standby Routing Protocol (HSRP),      2nd
hot swap capability,      
HSA      
HSA (high system availability),      
HSA,      
HSRP      
HSRP (Hot Standby Routing Protocol),      2nd
HSRP,      
human error (failures),      
IANA (Internet Assigned Numbers Authority),      
ICMP      
ICMP (Internet Control Message Protocol)      
IEEE 802.17,      
IEEE 802.1d,      
IEEE 802.1q,      
IEEE 802.1s      
IEEE 802.1s,      
IEEE 802.1w      
IEEE 802.1w,      
IETF (Internet Engineering Task Force),      2nd
IGESM      
IGESM (Intelligent Gigabit Ethernet Switch Module),      
impact of different switching paths,      
implementation.      [See also configuration]
Implementing      
in adjacency tables      
in-service software upgrade (ISSU),      
inbound ACLs,      
inbound soft reset,      
incident response,      
Incremental      2nd
incremental SPF      
incremental SPF,      
inferior BPDU,      
INS (intermediate name server),      
integrated service      
Integrated Service Digital Network.      [See ISDN]
integrated service modules      
integrated service modules,      
Intelligent Gigabit Ethernet Switch Module (IGESM),      
Inter-Switch Link (ISL),      
Interfaces      
intermediate name server (INS),      
Intermediate System-to-Intermediate System (IS-IS),      
internal trouble-ticket      
Internal trouble-ticket events,      
internal users      
internal users, routing,      
international private leased circuit (IPLC),      
International Telecommunication Union-Telecommunication Standardization Sector (ITU-T),      
Internet      
Internet Assigned Numbers Authority (IANA),      
Internet Control Message Protocol.      [See ICMP]
Internet Engineering Task Force (IETF),      2nd
Internet module      
Internet module,      
Internet modules      
Internet Protocol.      [See IP]
Internet Small Computer System Interface (iSCSI),      
intervals,      
Inventory      
IOS deployment,      
IP
IP (Internet Protocol),      
IP accounting      
ip accounting command,      
ip cef load-sharing algorithm original      
ip cef load-sharing algorithm original command,      
IP event dampening      
IP networks      
ip ospf flood-reduction command,      
ip ospf network point-to-point      
ip ospf network point-to-point command,      
IP Precedence      
IP SLA (IP Service Level Agreement),      2nd
IP SLAs      
IP Storage      
IP Storage,      
ip tcp path-mtu-discovery      
ip tcp path-mtu-discovery command,      
IP tunnels      
ip-ospf flood-reduction      
IPLC (international private leased circuit),      
IS-IS
IS-IS (Intermediate System-to-Intermediate System),      2nd
iSCSI      
iSCSI (Internet Small Computer System Interface),      
ISDN      
ISDN (Integrated Service Digital Network)      
ISL      
ISL (Inter-Switch Link),      
ISL trunking      
isolated ports,      
isolated VLANs,      
ISP-level      
ISP-level redundancy (multihoming),      
ISSU (in-service software upgrade),      
ITU-T (International Telecommunication Union-Telecommunication Standardization Sector),      
jitter,      
keywords, diameter,      
L2TP      
L2TP (Layer 2 Tunnel Protocol),
L2TPv3      
Label Distribution Protocol (LDP),      
label edge router (LER),      
label switch router (LSR),      
label switched path (LSP),      2nd
labels      
LAN Management Solution (LMS),      
LATA      
LATA (Local Access and Transport Area) switching systems,      
latency,      
Later 2      
Layer 2      
Layer 2 best practices
Layer 2 domains
Layer 2 domains,
Layer 2 Tunnel Protocol (L2TP),
Layer 3      2nd
Layer 3 domains
Layer 3 domains,
layer design      
Layers      
LD (limited deployment) release,      
Ldp      
LDP (Label Distribution Protocol),      
Leaf      
leaf nodes,      
Learning      
learning states,      
leased circuit      
leased circuit encapsulation      
leased line connections      
leased lines      
leased lines (WAN),      
leased lines,      
LER      
LER (label edge router),      
levels of security breaches,      
life cycle management (IOS)      
life cycle management (IOS),      
life cycles (IOS)      
limitation of entries (NAT),      
Limited Deployment (LD) release,      
limiting spans of VLANs,      
lines cards,      
link local signaling (LLS),      
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте