Current location - Plastic Surgery and Aesthetics Network - Plastic surgery and medical aesthetics - Campus network design catalogue
Campus network design catalogue
The first part is network design.

Chapter 1 Network Design 3

1. 1 What is Design 3?

1.2 design concept 5

1.2. 1 Determine the demand 6

1.2.2 Analysis of existing networks 7

1.2.3 Preparation of the outline design 8

1.2.4 Final design scheme development completed 8

1.2.5 network deployment 8

1.2.6 monitoring and redesign 9

1.2.7 maintenance design document 9

1.3 Modular Network Design 9

1.3. 1 What is modular design 10?

1.3.2 hierarchical network design 10

1.3.3 Cisco Complex Network Model 12

1.4 summary 16

Part II Technology: What do we need to know and why?

Chapter II Switching Network Design 2 1

2. 1 business application background 2 1

2.2 Exchange Type 22

2.2. 12 layer switch 22

2.2.23 Layer switch 24

2.3 Spanning Tree Protocol 25

2. 3. 65438+ Redundant Network 25 in Layer 2 Switching Network

STP terminology and operation of STP 26

2.4 Virtual LAN 29

2.4. 1VLAN memberships 30

2.4.2 Trunk 3 1

2.4.3STP and VLAN3 1

2.4.4VLAN Trunking Protocol 32

2.4.5 VLAN Inter-VLAN Routing 33

2.5 Multilayer Switching and Cisco Express Forwarding 33

2.5. 1 multilayer switching 34

2.5.2 Cisco Express Forwarding 35

2.6 foreign exchange securities 36

2.6. 1 inherent safety of catalyst 36

2. 6. 2 Safety of Catalyst Hardware 37

2.7 considerations for switching network design 38

2.8 Summary 39

Chapter 3 IPv4 routing design 43

3. 1 business application background 43

3.2IPv4 address planning 44

3.2. 1 Determine the required number of IP addresses 44

3.2.2 Use private and public addresses and NAT44.

3.2.3 How do routers use subnet masks 46

3.2.4 Determining Subnet Mask 46

3.2.5 Hierarchical IP Address Planning and Summary 48

3.2.6 Variable length subnet mask 5 1

3.3IPv4 routing protocol 53

3.3. 1 Routing Protocol Classification

Indicator 57

Convergence time 57

3.3.4 Route summary 58

3.3.5 Comparison of Routing Protocols 58

3.4 Selection of IPv4 Routing Protocol 67

3.4. 1 Routing Protocol 67

3.4.2 Redistribution, filtering and management of distance 68

3.5 Summary 70

The fourth chapter network security design on page 73

4. 1 business application background 73

4.2 Hacking 74

4.3 Security weaknesses 75

4.3. 1 design questions 75

Human factors 76

4.3.3 Implementation issues 76

4.4 Security threats 76

4.4. 1 reconnaissance attack 76

4.4.2 Access attack

4.4.3 Information disclosure attack 77

4.4.4 Denial of service attack 78

4.5 Risk reduction techniques 80

4.5. 1 threat defense 8 1

Secure communication 85

4.5.3 Identity and trust 87

4.5.4 Best measures for network security 89

4.6 Safe Campus Network Design 90

4.7 Summary 92

Chapter 5 Wireless LAN Design 95

5. 1 business application background 95

5.2 Overview of Wireless Network Technology 96

5.2. 1 wireless network standard 97

5.2.2 Wireless Network Components 97

5.3 Wireless Network Security 99

5.3. 1 wireless network security issues 100

5.3.2 Reducing the threat of wireless network 100

5.4 wireless network management 102

5.5 Matters needing attention in wireless network design 103

5.5. 1 station survey 103

5. 5. 2 LAN roaming 104

5.5.3 Point-to-Point Bridge 104

5.5.4 The design of wireless IP phone should consider 105.

5.6 Summary 105

Chapter VI Service Quality Design 109

6. 1 business application background 109

6.2 QoS requirements for voice, data and video services11/

6.3QoS model 1 12

6 . 3 . 1 int serv 1 12

DiffServ 1 12

6.4QoS tools 1 12

6.4. 1 Classification and marking

6.4.2 Control and shaping 1 18

6.4.3 Congestion avoidance 1 19

6.4.4 Congestion Management 120

6.4.5 Special tool for connection 12 1

6.4.6 Automatic QoS 122

6.5 Service Quality Design Guide 122

6.6 Summary 123

Chapter 7 Voice Transmission Design 125

7. 1 What is voice transmission 126

7. 1. 1 digitization 126

7. 1.2 establishing voice message and call processing 127

7. 1.3 session and control service 128

7.2 Quality of service 128

7.3 components of VoIP129

7.4IP components of IP phone 129

IP infrastructure 130

7.4.2IP phone 130

7.4.3 videophone 13 1

7.4.4 Call Processing 13 1

7.4.5 Application 13 1

7.4.6 Voice Gateway 132

7.5 Speech Coding and Compression Technology 132

7.5. 1 speech compression 132

7.5.2 Voice activation detection 133

7.5.3 compressed real-time transmission protocol 133

7.6 Bandwidth requirements 134

7.6. 1 Definition

7.6.2 Calculate the trunk capacity or bandwidth 135.

7.6.3 signaling service bandwidth 136

7.7IP design of IP phone 136

7.7. 1 single point IP phone deployment 136

7.7.2 Multi-point centralized deployment 137

7.7.3 Multipoint Distributed Deployment 138

7.8 Voice Security 138

7.8. 1 Influence of network security on IP phone 138

7.8.2 Platform Safety Issues 138

7.8.3 Mitigating Measures for Protecting IP Phones 139

7.9 Summary 139

Chapter 8 Content Network Design 143

8. 1 business application background 143

8.2 Content Network 144

8.3 Content Cache and Content Engine 145

8.3. 1 transparent cache 145

8.3.2 Opaque Cache 146

8.3.3 Reverse proxy cache 147

8.4 Content Routing 148

8.4. 1 direct mode 148

8. 4. 2 wcp mode 149

8.5 Content Distribution and Management 150

8.6 content exchange 15 1

8.7 Content Network Design 152

8.7. 1 school curriculum 152

8.7.2 Company Real-time Video and Video on Demand 153

8.8 Summary 154

Chapter 9 Network Management Design 157

9. 1 business application background 157

9.2ISO network management standard 158

9.3 Network Management Protocols and Tools 158

9.3. 1 term 158

9.3.2SNMP 159

9 . 3 . 3 MB 159

9.3.4RMON 16 1

CiscoNetFlow 163

System log 163

9. 3. 7 Cisco Work 164

Other tools 164

9.4 Management Network 166

9.4. 1 network management strategy

9.4.2SLC and SLA 167

9.4.3IP service level agreement 167

9.5 Network Management Design 168

9.6 Summary 170

Chapter 10 Other implementation technologies 173

10. 1IP multicast 173

10. 1. 1 Internet Group Management Protocol (IGMP) and Cisco Group Management Protocol (CGMP) 173.

10. 1.2 protocol independent multicast (PIM) routing protocol 174

10.2 improving network availability 175

10.3 storage network 178

10.4IPv6 179

10.5 summary 18 1

The third part designs your network: how to apply the knowledge you have mastered.

Chapter 1 1 Case study environment: Venti Systems 185.

1 1. 1 background information 185

1 1.2 post-acquisition network requirements 188

1 1.3 summary 19 1

Chapter 12 Solution of Case Study: Venti Systems Company 193.

12. 1 design model 193

12. 1. 1 head office 194

12. 1.2 branch 196

12. 1.3 remote users 197

12. 1.4 user equipment 198

12. 1.5 server 198

12.2 switching network design 198

12.2. 1 headquarters switching network 198

12.2.2 branch switching network 199

12.2.3 remote subscriber switching network

12.3 network security

12.3. 1 head office network security 20 1

12.3.2 Branch Network Security 203

Network security of remote users 203

12.4IP address assignment and routing protocol203

12.4. 1 IP address assignment and routing protocol of the headquarters network 203.

12.4.2 IP address assignment and routing protocol of the branch network 204.

12.4.3 IP address assignment and routing protocol for remote users 204

E-mail 204

12.5. 1 Headquarters E-mail box 205

12. 5. 2 205 branch email

E-mail for remote users 205

12.6QoS and voice 206

12.6. 1 Headquarters QoS and Voice 206

QoS and voice of branch office 208

QoS and voice of remote users 208

12.7 wireless network 208

12.7. 1 headquarters wireless network 208

12.7.2 branch wireless network 209

Wireless network of remote users 209

12.8 network management 209

12.8. 1 head office network management 209

12.8.2 Branch Network Management 2 10

12.8.3 Remote User Network Management 2 10

12.9 Some considerations for the future 2 1 1

12. 10 Summary 2 1 1

The fourth part appendix

Appendix a reference 2 15

Appendix b network foundation 22 1

Appendix c decimal-binary conversion 247

Appendix d abbreviation 255

……