15%
Building Resilient IP Networks (paperback)

Building Resilient IP Networks (paperback)

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

The practical guide to building resilient and highly available IP networks  Learn from an all-in-one introduction to new features and developments in building a resilient IP network Enable your organization to meet internal service-level agreements (SLAs) for mission-critical resources Understand how a resilient IP network can help in delivering mission-critical information such as video and voice services Work with configuration examples that are based on real-world issues and customer requirements Get tips and best practices from field personnel who have worked on some of the largest networks with stringent uptime requirements and SLAs More companies are building networks with the intention of using them to conduct business. Because the network has become such a strategic business tool, its availability is of utmost importance to companies and their service providers. The challenges for the professionals responsible for these networks include ensuring that the network remains up all the time, keeping abreast of the latest technologies that help maintain uptime, and reacting to ever-increasing denial-of-service (DoS) attacks.   Building Resilient IP Networks helps you meet those challenges. This practical guide to building highly available IP networks captures the essence of technologies that contribute to the uptime of networks. You gain a clear understanding of how to achieve network availability through the use of tools, design strategy, and Cisco IOS® Software.   With Building Resilient IP Networks, you examine misconceptions about five-nines availability and learn to focus your attention on the real issues: appreciating the limitations of the protocols, understanding what has been done to improve them, and keeping abreast of those changes. Building Resilient IP Networks highlights the importance of having a modular approach to building an IP network and, most important, illustrates how a modular design contributes to a resilient network. You learn how an IP network can be broken down to various modules and how these modules interconnect with one another. Then you explore new network resiliency features that have been developed recently, categorized with respect to the design modules.   Building Resilient IP Networks is relevant to both enterprise and service provider customers of all sizes. Regardless of whether the network connects to the Internet, fortifying IP networks for maximum uptime and prevention of attacks is mandatory for anyone’s business.   This book is part of the Networking Technology Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.  

Table of Contents:
Introduction Chapter 1 Rise of the IP Transport System The Internet Explosion Next-Generation IP Applications Voice over IP IP Storage MPLS: New Kid on the Block Next-Generation IP Transport System Continuous Improvements of Protocols Chapter 2 Establishing a High-Availability Network Understanding the Five-Nines Availability Debate Differentiating Between Reliability and Availability The Five-Nines Approach Idiosyncrasies of the Telcordia GR-512-Core Document The Truth About 50-ms Resiliency A Practical Approach to Achieving High Availability Measuring Availability Defining a Metric Understanding the Issue of Network Availability Setting a Strategy to Achieve High Availability Designing a Network for High Availability Establishing Continuous Fault Detection and Measurement of Network Availability Making Full Use of Scheduled Downtime Instituting a Disciplined Approach to Network Operation and Processes Summary Chapter 3 Fundamentals of IP Resilient Networks Revisiting IP, TCP, and UDP Internet Protocol Transmission Control Protocol TCP Three-Way Handshake TCP Sliding Window User Datagram Protocol Device-Level Resiliency Online Insertion and Removal (OIR) Single Line Card Reload High System Availability Route Processor Redundancy Route Processor Redundancy Plus Stateful Switchover Nonstop Forwarding Impact of Different Switching Paths Process Switching Cisco Express Forwarding Switching Central CEF Distributed CEF Protecting the Control Plane and Data Plane Establishing a Resiliency Strategy Redundancy Strategy Logical Resiliency Physical Resiliency Scaling Strategy Key Principles for Designing Resilient Networks Simplicity Modularity Security Summary Chapter 4 Quality of Service Protecting the Control Plane with QoS Traffic Types That Affect the Control Plane Tagging Routing Protocol and Layer 2 Control Packets IP Precedence The pak_priority Flag Selective Packet Discard Receive ACL Control-Plane Policing Protecting Applications with QoS Understanding the Need for Application QoS Latency Jitter Loss Determining When to Deploy QoS Scenario 1: Undercongested Link Scenario 2: Occasionally Congested Link Scenario 3: Badly Congested Link Building Blocks of QoS Classification and Marking Congestion Avoidance Congestion Management Traffic Conditioning Application QoS and Control-Plane Traffic QoS Deployment Strategy Classifying Applications Defining Policies Testing Policies Implementing QoS Features Monitoring Summary Chapter 5 Core Module Network Convergence in the Core OSPF Enhancements Shortest Path First (SPF) Throttling OSPF LSA Throttling OSPF LSA Flooding Reduction OSPF Fast Hello OSPF Update Packet-Pacing Timer OSPF Incremental SPF OSPF Graceful Restart RFC 3623 Cisco Implementation IS-IS Enhancements IS-IS SPF Throttling IS-IS LSP Generation IS-IS LSA Flooding Reduction IS-IS Fast Hellos IS-IS Update Packet-Pacing Timer IS-IS Incremental SPF IS-IS Graceful Restart Cisco Implementation IETF Implementation EIGRP Enhancements EIGRP Graceful Shutdown EIGRP Graceful Restart EIGRP Stub Router Functionality Bidirectional Forwarding Detection (BFD) IP Event Dampening Multipath Routing Load Balancing Equal-Cost Multipath (ECMP) Per Packet Per Destination MPLS Traffic Engineering Fast Reroute Link Protection Fast Reroute Node Protection Multicast Subsecond Convergence Summary Chapter 6 Access Module Multilayer Campus Design Access Layer Distribution Layer Core Layer Access Module Building Blocks Layer 2 Domain The Spanning Tree Protocol: IEEE 802.1d PortFast UplinkFast BackboneFast Unidirectional Link Detection (UDLD) RootGuard LoopGuard BPDUGuard VLANs and Trunking Common Spanning Tree (CST) Per-VLAN Spanning Tree (PVST) Per-VLAN Spanning Tree Plus (PVST+) IEEE 802.1w IEEE 802.1s Channeling Technology Layer 2 Best Practices Simple Is Better Limit the Span of VLANs Build Triangles, Not Squares Protect the Network from Users Selecting Root Bridges Use Value-Added Features EtherChannel Deployment EtherChannel Load Balancing Consistent EtherChannel Port Settings Layer 2 Setting for EtherChannel Turning Off Autonegotiation Layer 3 Domain Hot Standby Routing Protocol (HSRP) Virtual Router Redundancy Protocol (VRRP) Global Load Balancing Protocol (GLBP) Layer 3 Best Practices Adopt Topology-Based Switching Using Equal-Cost Multipath Conserve Peering Resources Adopt a Hierarchical Addressing Scheme Summary Chapter 7 Internet Module Understanding Addressing and Routing in the Internet Module Address-Assignment Scheme Routing Routing for Internal Users Routing for External Users Establishing Internet Module Redundancy Link-Level Redundancy Device-Level Redundancy ISP-Level Redundancy Site-Level Redundancy Implementing Security Measures Security Policy Filtering at the Internet Module Resilient Border Gateway Protocol (BGP) Design BGP Soft Reconfiguration BGP Convergence Optimization BGP Next-Hop Address Tracking BGP Support for Fast Peering Session Deactivation BGP Route Dampening Nonstop Forwarding with Stateful Switchover (NSF/SSO) for BGP Using Network Address Translation (NAT) Enhanced NAT Resiliency NAT with Route Map Static Mapping with Hot Standby Routing Protocol (HSRP) Support Stateful NAT Limiting NAT Entries Multihoming with NAT Effects of NAT on Network and Applications Implications on TCP and ICMP Traffic Application-Specific Gateways Effects on Voice over IP (VoIP) Traffic Effects on Router Performance  Effects on Network Security Summary Chapter 8 WAN Module Leased Line Domestic Leased Circuit Versus International Private Leased Circuit Leased Circuit Encapsulation Equal-Cost Load Balancing Multilink Point-to-Point Protocol (MPPP) SONET/SDH SONET/SDH Framing PPP over SONET/SDH SONET/SDH Protection Switching Resilient Packet Ring DPT Architecture DPT/SRP Classes of Service SRP Queuing SRP Fairness Algorithm RPR Standards Differences Between 802.17 and DPT/SRP Dial Backup Virtual Private Network (VPN) IP Tunnel L2TPv3 L2TPv3 Deployment MPLS-VPN Summary Chapter 9 Data Center Module Data Center Environmental Considerations Cabling Tagging Documentation Discipline Rack Space Server Size Power Next-Generation Server Architecture Data Center Network Considerations Security Server Performance Fault-Tolerant Server Features Multifaceted Server Data Center Network Architecture Access Layer Design NIC Teaming Clustering Aggregation Layer Design  Trunk Ports on an Aggregation Switch  Routed Ports on an Aggregation Switch Architecture Scaling Consideration Data Center Network Security Layer 2 Security Private VLANs (PVLANs) VLAN Access Control List (VACL) Port Security Dynamic ARP Inspection Layer 3 Security Switch Forwarding Architecture Control Plane Policing DHCP Server Protection Service Optimization Server Load Balancing Global Site Selector Understanding DNS Resolution Using GSS Web Cache Communication Protocol (WCCP) Integrated Service Modules Summary Chapter 10   Beyond Implemention: Network Managment Components of Network Management Fault Management Configuration Management Configuration File Management Inventory Management Software Management Accounting Management  Performance Management Security Management ACLs User IDs and Passwords TACACS Establishing a Baseline Step 1: Take a Snapshot of Inventory Step 2: Collect Relevant Data MIB Entries and Object Identifiers Multi-Router Traffic Grapher Step 3: Analyze Data Step 4: Prioritize Problem Areas Step 5: Determine a Course of Action Managing Cisco IOS Deployment Overview of IOS Releases Understanding IOS Naming Convention IOS Software Life Cycle Management Planning Design Testing Implementation Operation Moving Toward Proactive Management IP Service Level Agreement ICMP-Based IP SLA Operation Responder-Based IP SLA Operation Nonresponder-Based IP SLA Operation Examples of IP SLA Operations Component Outage Online (COOL) Measurement Embedded Event Manager (EEM) Next-Generation IOS Architecture Summary End Notes Appendix A   Calculating Network Availability Appendix BRFCs Relevant to Building a Resilient IP Network Appendix CThe Cisco Powered Network Checklist Index 1587052156TOC112205


Best Sellers


Product Details
  • ISBN-13: 9781587143687
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Height: 100 mm
  • No of Pages: 432
  • Series Title: English
  • Weight: 100 gr
  • ISBN-10: 1587143682
  • Publisher Date: 03 May 2012
  • Binding: Paperback
  • Language: English
  • Returnable: N
  • Spine Width: 100 mm
  • Width: 100 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Building Resilient IP Networks (paperback)
Pearson Education (US) -
Building Resilient IP Networks (paperback)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Building Resilient IP Networks (paperback)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA