Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Lee K.-K. — Building Resilient IP Networks
Lee K.-K. — Building Resilient IP Networks



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Building Resilient IP Networks

Автор: Lee K.-K.

Аннотация:

The practical guide to building resilient and highly available IP networks

An all-in-one introduction to the various new features and developments in building a resilient IP network

A singular source on what Cisco hardware, software products can offer toward resiliency

Learn how a resilient IP network helps deliver mission-critical information, like video, voice services

Configuration examples offer easy-to-follow implementation guides

More and more companies are building networks that are used not only for corporate communication, but most importantly, for doing business. Since the network has become such a strategic business tool, its availbality is of utmost importance to these companies and to their service providers. Therefore, the challenge for network professionals is ensuring networks are up at all times; keeping abreast of the latest technology that helps maintain uptime; and reacting to ever-increasing denial of service attacks. Problems faced by network professionals when meeting these challenges include lack of understanding regarding network availability; ignorance of the latest features and tools; hard-to-find documentation; lack of education programs; savvy black hats who attack networks. Building Resilient IP Networks helps network professionals take on these challenges. First it shows what network availability means and focuses on real-life issues: appreciating the limitations of protocols and understanding what's been done to improve them. Next the book addresses the benefits of modular design and illustrates how modular design contributes to a resilient network. The bulk of the book explores new features and tools that recently developed with respect to modular design.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2005

Количество страниц: 432

Добавлена в каталог: 13.06.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
RANCID (Really Awesome New Cisco Config Differ),      
random early detect (RED),      
Rapid Spanning Tree Protocol (RSTP),      
Rapid-PVST+      
Rapid-PVST+,      
raw availability,      
reachability,      
Really Awesome New Cisco Config Differ (RANCID),      
receive access control list (RACL),      
RED (random early detect),      
redistribute connected      
redistribute connected command,      
redistribute ospf 10      
redistribute ospf 10 command,
Redundancy      
redundancy status      
redundancy,      
release, Cisco IOS,      
reliability,      2nd
remote monitoring (RMON),      2nd
Request For Proposals (RFPs),      
rerouting      
resiliency      
Resilient Packet Ring (RPR),      2nd 3rd
resolution, DNS,      
resources, peering,      
responder-based IP SLA      
responder-based IP SLA operations,      
restarting (graceful restart)
reverse proxy caching      
reverse proxy caching,      
RFC 3623,      
RFPs (Request For Proposals),      
rings, configuring DPR/SPR,      
RMON      
RMON (remote monitoring),      2nd
RNS (root name server),
Root      
root bridges,      2nd
root name server (RNS),
root ports,
RootGuard      
RootGuard,      
route dampening      
route dampening,      
route processor redundancy (RPR)      2nd
Route Processor Redundancy Plus (RPR+)      2nd
routed (aggregation switches)      
routed ports, aggregation switches,
router ospf 10 vrf RED      
router ospf 10 vrf RED command,
router status
router switching      
router switching status      
routers      
routes      
routes (NAT with)
Routing      
Routing protocols      
RPR
RPR (Resilient Packet Ring),      2nd 3rd
RPR (route processor redundancy)      2nd
RPR+
RPR+ (Route Processor Redundancy Plus)      2nd
RPR+ status      
RPR+,      
RPR,      
RSTP      
RSTP (Rapid Spanning Tree Protocol),      
SAA (Service Assurance Agent),      
SAFE (Security Blueprint for Enterprise Networks),      
Scaling
Scheduling      
scheduling downtime,      
scripting (TCL),
SDH (Synchronous Digital Hierarchy),      
Security      
Security Blueprint for Enterprise Networks (SAFE),      
security,      2nd
selecting
selecting root bridges,      
send routing message (SRM),      
serial devices, availability of,      
series components,
server architecture,      
server load balancing (SLB),
server performance,
server size,      
Servers      2nd
servers,      
Service Assurance Agent (SAA),      
service level agreement.      [See SLA]
service optimization      
service optimization,
Services      
sessions, fast peering deactivation,
sham
sham links,
shortest path first.      [See SPF]
shortest-path tree.      [See SPT]
Show
show bfd neigh detail
show bfd neigh detail command,
show commands,      
show ip bgp neighbors
show ip cef      
show ip cef exact-route      
show ip ospf      2nd
show ip ospf neighbor detail      
show ip pim neighbor      
show ip route
show ip rpf events
show isis nsf      
show running-config      
SIA (stuck-in-active) state,      
signals, EOT,
simple backups      
simple hardware      
simple hardware backups,      
Simple Network Management Protocol (SNMP),      
simple network topologies
simple network topologies,
simple network topology availability,
simple system availability,      
simple systems      
simple systems,
simplicity
single line card reload
single line card reload,
site-level
site-level redundancy,      
size,      
sizing windows,
SLA
SLA (service level agreement),      2nd
SLAs
SLB
SLB (server load balancing),
sliding windows
sliding windows (TCP),
SNAPSHOTS
snapshots, taking of inventory,
SNMP      
SNMP (Simple Network Management Protocol),
snooping
snooping (DHCP),      
soft reconfiguration (BGP),
soft reconfiguration,
soft reset refresh,
Software
software error protection,      
software management,
SONET (Synchronous Optical Network)/SDH (Synchronous Digital Hierarchy),
SONET/SDH
SONET/SDH,
Spanning Tree Protocol.      [See STP]
spans
spans of VLANs, limiting,
Spatial reuse protocol      
Spatial Reuse Protocol,
special-use address measures,
speeds, SONET/SDH,      
SPF (IS-IS)      
SPF (shortest path first)      
SPF throttling
SPF throttling,
SPF,
spf-interval
spf-interval command,
spoofing, anti-spoofing measures,
SPT (shortest-path tree),
SRM
SRM (send routing message),      
SSO      
SSO (stateful switchover),      
SSO status      
SSO,
stacking      
stacking labels,
standards, RPR,
standby power equipment,
stateful
stateful NAT      
stateful NAT on HSRP,
stateful NAT,      
stateful switchover (SSO),      
States
static mapping
static mapping with HSRP      
static mapping with HSRP,
static mapping,
static routes
static routes, configuring,
STATUS
steady (STP)
steady state (STP),
STM (Synchronous Transport Module),
storage, IP,
stored routing update information,
STP
STP (Spanning Tree Protocol),      2nd
strategies      
stream data transfers,
STS (Synchronous Transport Signal),
stub (EIGRP)
stub router,
stub routers
stub routers,
stuck-in-active (SIA) state,
switch forwarding
switches
switches,
Switching
switching (SONET/SDH)
switching,
synchronization, global,      
Synchronous Optical Network (SONET)/Synchronous Digital Hierarchy (SDH).      [See SONET/SDH]
Synchronous Transport Module (STM),
Synchronous Transport Signal (STS),
syslog messages
Tables      
TACACS,
Tagging
TCL (Tool Command Language),
TCP
TCP (Transmission Control Protocol),
TDM (time-division multiplexing),
teaming (NIC),      
Telcordia GR-512-Core document
Telcordia GR-512-Core document,
Testing
that use UDP
theoretical availability of
theoretical availability of devices
theoretical availability of devices,
three-tier
three-tier architecture,
Three-way handshakes
three-way handshakes (TCP)
three-way handshakes (TCP),
three-way handshakes,
thresholds
throttling
throttling (IS-IS)
throttling,
time-division multiplexing (TDM),      
timer lsa arrival
timers
timers lsa arrival command,
timers spf spf-holdtime command,
times spf spf-holdtime
Tool Command Language (TCL),
Tools
topologies
topology-based      
topology-based switching,
ToS (type-of-service),
Tracking
Traffic
Traffic Anomaly Detector service
Traffic Anomaly Detector service module,
transferring stream data,
Transient
transient congestion,
Transmission Control Protocol.      [See TCP]
traps, SNMP,
trees, SPT,
triangle topologies,
troubleshooting      
trunking
trunks (aggregation switches)
tunnel mode gre
tunnel mode gre command,
tunnel mode ipip
tunnel mode ipip command,
tunnel mpls traffic-eng fast-reroute
tunnel mpls traffic-eng fast-reroute command,
tunnel path-mtu-discovery      
tunnel path-mtu-discovery command,
Tunneling
tunnels,
turning off autonegotiation,      
two-tier      
two-tier architecture,
type-of-service (TOS),
Types      
types of
types that affect control planes
UDLD
UDLD (Unidirectional Link Detection),
UDLD,      
UDP
UDP (User Datagram Protocol),
uncongested      
uncongested links,      
Unicast Reverse Path Forwarding (uRPF),      
Unidirectional Link Detection (UDLD),      
unidirectional self-healing ring (USHR),
uninterruptible power supply (UPS),      
universal load-sharing
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2026
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте