|
Showing 1 - 8 of
8 matches in All Departments
The Art of Network Architecture Business-Driven Design The
business-centered, business-driven guide to architecting and
evolving networks The Art of Network Architecture is the first book
that places business needs and capabilities at the center of the
process of architecting and evolving networks. Two leading
enterprise network architects help you craft solutions that are
fully aligned with business strategy, smoothly accommodate change,
and maximize future flexibility. Russ White and Denise Donohue
guide network designers in asking and answering the crucial
questions that lead to elegant, high-value solutions. Carefully
blending business and technical concerns, they show how to optimize
all network interactions involving flow, time, and people. The
authors review important links between business requirements and
network design, helping you capture the information you need to
design effectively. They introduce today's most useful models and
frameworks, fully addressing modularity, resilience, security, and
management. Next, they drill down into network structure and
topology, covering virtualization, overlays, modern routing
choices, and highly complex network environments. In the final
section, the authors integrate all these ideas to consider four
realistic design challenges: user mobility, cloud services,
Software Defined Networking (SDN), and today's radically new data
center environments. * Understand how your choices of technologies
and design paradigms will impact your business * Customize designs
to improve workflows, support BYOD, and ensure business continuity
* Use modularity, simplicity, and network management to prepare for
rapid change * Build resilience by addressing human factors and
redundancy * Design for security, hardening networks without making
them brittle * Minimize network management pain, and maximize gain
* Compare topologies and their tradeoffs * Consider the
implications of network virtualization, and walk through an
MPLS-based L3VPN example * Choose routing protocols in the context
of business and IT requirements * Maximize mobility via ILNP, LISP,
Mobile IP, host routing, MANET, and/or DDNS * Learn about the
challenges of removing and changing services hosted in cloud
environments * Understand the opportunities and risks presented by
SDNs * Effectively design data center control planes and topologies
Jess Wirth lives a dreary life. He spends most of his time crammed
inside a cubicle, toiling as a network engineer and stewing over
the details of his ugly divorce. But when he finds his co-worker
dead in the basement of their office, Jess's life takes a
surprising-and unpleasant-turn. The police quickly declare the
death a suicide, but Jess isn't so sure. Not long after he begins
digging into the victim's work, another co-worker turns up dead,
convincing him once and for all that something sinister is brewing
behind the cubicle walls. His investigation leads him to a
mysterious woman name Leah, who pushes him to entrust her with the
information he's collected about his dead colleagues. Wary of
Leah's motives yet inexorably drawn to her, Jess keeps her at arm's
length...until an attempt is made on both their lives. Realizing
they are close on the trail of a dangerous criminal, the pair race
to expose a data theft ring before they become the killer's next
victims.
Techniques for optimizing large-scale IP routing operation and
managing network growth * Understand the goals of scalable network
design, including tradeoffs between network scaling, convergence
speed, and resiliency * Learn basic techniques applicable to any
network design, including hierarchy, addressing, summarization, and
information hiding * Examine the deployment and operation of EIGRP,
OSPF, and IS-IS protocols on large-scale networks * Understand when
and how to use a BGP core in a large-scale network and how to use
BGP to connect to external networks * Apply high availability and
fast convergence to achieve 99.999 percent, or five 9s network
uptime * Secure routing systems with the latest routing protocol
security best practices * Understand the various techniques used
for carrying routing information through a VPN Optimal Routing
Design provides the tools and techniques, learned through years of
experience with network design and deployment, to build a
large-scale or scalable IP-routed network.The book takes an
easy-to-read approach that is accessible to novice network
designers while presenting invaluable, hard-to-find insight that
appeals to more advanced-level professionals as well. Written by
experts in the design and deployment of routing protocols, Optimal
Routing Design leverages the authors' extensive experience with
thousands of customer cases and network designs. Boiling down years
of experience into best practices for building scalable networks,
this book presents valuable information on the most common problems
network operators face when seeking to turn best effort IP networks
into networks that can support Public Switched Telephone Network
(PSTN)-type availability and reliability. Beginning with an
overview of design fundamentals, the authors discuss the tradeoffs
between various competing points of network design, the concepts of
hierarchical network design, redistribution, and addressing and
summarization. This first part provides specific techniques, usable
in all routing protocols, to work around real-world problems.The
next part of the book details specific information on deploying
each interior gateway protocol (IGP)-including EIGRP, OSPF, and
IS-IS-in real-world network environments. Part III covers advanced
topics in network design, including border gateway protocol (BGP),
high-availability, routing protocol security, and virtual private
networks (VPN). Appendixes cover the fundamentals of each routing
protocol discussed in the book; include a checklist of questions
and design goals that provides network engineers with a useful tool
when evaluating a network design; and compare routing protocols
strengths and weaknesses to help you decide when to choose one
protocol over another or when to switch between protocols. The
complexity associated with overlaying voice and video onto an IP
network involves thinking through latency, jitter, availability,
and recovery issues. This text offers keen insights into the
fundamentals of network architecture for these converged
environments.-John Cavanaugh, Distinguished Services Engineer,
Cisco Systems(R) This book is part of the Networking Technology
Series from Cisco Press' which offers networking professionals
valuable information for constructing efficient networks,
understanding new technologies, and building successful careers.
|
|