A Practical Approach to Corporate Networks Engineering

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

A Practical Approach to Corporate Networks Engineering is dedicated to corporate network design and engineering, covering the different levels of network design and deployment. The main theoretical concepts are explained and the different functioning mechanisms are illustrated with practical experiments. Using an open source network simulator that is able to emulate real network equipment and run concrete network scenarios (Graphical Network Simulator), the authors present several realistic network scenarios that illustrate the different network protocols and mechanisms and can be easily replicated by readers at home. Readers will be able to configure the different network equipments, run the scenarios and capture traffic at the different network links on their own, ordinary PC, acquiring a deep knowledge of the underlying network protocols and mechanisms.This interactive and practical teaching approach is very motivating and effective, since students can easily follow the explanations that are given throughout the book, making this work a valuable addition to the existing literature.

Author(s): Antonio Nogueira, Paulo Salvador
Series: River Publishers Series in Communications
Publisher: River Publishers
Year: 2013

Language: English
Pages: 390
City: Gistrup

Cover
Half Title
Series
Title
Copyright
Dedication
Contents
Preface
1 Architectures and Basic Operational Protocols
1.1 Introduction
1.2 The OSI and TCP/IP Reference Models
1.3 Network Design Principles
1.3.1 Network Requirements
1.3.2 Network Design Considerations
1.4 Hierarchical versus Flat Network Design
1.5 Network Redundancy
1.5.1 Redundancy at the Core Layer
1.5.2 Redundancy at the Distribution Layer
1.5.3 Redundancy at the Access Layer
1.6 Network Devices
1.7 Data Link Layer Addressing
1.8 Network Link Layer Addressing
1.8.1 The Internet Protocol, version 4
1.8.2 The Internet Protocol, version 6
1.9 Transition Mechanisms from IPv4 to IPv6
1.10 The Domain Name System
1.11 The Transmission Control Protocol
1.11.1 Connection Establishment Phase
1.11.2 Flow Control Mechanism
1.11.3 Connection Termination Phase
1.11.4 Slow Start
1.11.5 Congestion Avoidance
1.11.6 Fast Retransmit
1.11.7 Fast Recovery
1.11.8 Some of the Different TCP Versions
1.12 The User Datagram Protocol
1.13 Network Address Translation
1.13.1 Controlling NAT/PAT with Access Control Lists
1.13.2 Controlling NAT/PAT with Route Maps
1.13.3 NAT with Multiple ISPs and Asymmetric Routing
1.14 Use case
1.14.1 Problem Description
1.14.2 Addressing Scheme
2 Data Link Layer
2.1 Introduction
2.2 Virtual LANs
2.2.1 End-to-End and Local VLANs
2.2.2 Extending VLANs Between Switches
2.3 Basic Transparent Switching
2.4 Bridging Loops
2.5 The Spanning Tree Protocol
2.5.1 The Root Bridge
2.5.2 The Root Path Cost
2.5.3 STP States
2.5.4 STP Timers
2.5.5 Topology Changes
2.6 The Rapid Spanning Tree Protocol
2.6.1 RSTP Direct and Indirect Failures
2.7 The Multiple Spanning Tree Protocol
2.7.1 MSTP Regions and Instances
2.7.2 MSTI Tree Construction
2.7.3 Common and Internal Spanning Tree (CIST)
2.7.4 CIST Root Bridges Election Process
2.7.5 Mapping MSTIs to CIST
2.7.6 MSTP Multi-Region Design Considerations
2.7.7 Wireless LANs
2.8 Use case
2.8.1 VLAN and Port Mode Configuration
2.8.2 IP Addressing Configuration
3 Network Link Layer
3.1 Routing and Routing Table
3.2 Static Routing
3.3 Route-Maps
3.4 Dynamic Routing
3.5 Distance Vector versus Link State Protocols
3.6 Routing Information Protocol
3.6.1 The Count-to-Infinity Problem
3.6.2 Triggered Updates
3.6.3 RIP Timers
3.6.4 RIP Messages
3.6.5 RIPv2
3.6.6 RIPng
3.6.7 Route Redistribution
3.7 Open Shortest Path First
3.7.1 Route Computation
3.7.2 Neighboring and Adjacencies
3.7.3 OSPF Database
3.7.4 Enabling OSPF on a Router
3.7.5 Authentication
3.7.6 Hierarchical Routing
3.7.7 OSPFv3
3.7.8 OSPF Design Issues
3.8 Multicast Routing
3.8.1 Multicast Addressing
3.8.2 The IGMP Protocol
3.8.3 The MLD Protocol
3.8.4 Multicast Routing Solutions
3.8.5 Multicast Routing Protocols
3.9 Tunneling
3.10 Use case
3.10.1 OSPF Configuration
3.10.2 NAT and SNAT Configuration
4 Quality of Service
4.1 Introduction
4.2 Preliminary Concepts
4.2.1 Leaky Bucket and Token Bucket
4.2.2 Tail Dropping
4.2.3 Traffic Policing and Traffic Shaping
4.3 Congestion Management
4.3.1 First in First Out Queuing
4.3.2 Priority Queuing
4.3.3 Custom Queuing
4.3.4 Weighted Fair Queuing
4.4 QoS Services
4.4.1 Best-Effort Service
4.4.2 Integrated Service
4.4.3 Differentiated Service
4.4.4 How IntServ and DiffServ Determine Network Design
4.4.5 Integration of the IntServ and DiffServ QoS Models
4.5 Use case
4.5.1 DiffServ Configuration
5 Access Control and Secure Communications
5.1 Introduction
5.2 Security Policy
5.3 Network Access Control
5.3.1 Network Firewall
5.3.2 Intrusion Detection and Prevention Systems
5.3.3 Cisco Access Control Lists
5.3.4 Linux IPtables
5.4 Secure Network Communications
5.4.1 Cryptography Basics
5.4.2 IPSec
5.4.3 Virtual Private Networks
5.5 Use case
5.5.1 ACLs Configuration
6 Network Services
6.1 Introduction
6.2 DNS Service
6.2.1 DNS Experiment
6.3 HTTP Service
6.3.1 HTTP Experiment
6.4 TFTP Service
6.4.1 TFTP Experiment
6.5 FTP Service
6.5.1 FTP Experiment
6.6 Email Service
6.6.1 SMTP
6.6.2 SMTP Experiment
6.6.3 POP3
6.6.4 IMAP
6.6.5 POP3 and IMAP Experiments
Bibliography
Index
About the Authors