Book Image

Implementing Cisco Networking Solutions

By : Harpreet Singh
5 (1)
Book Image

Implementing Cisco Networking Solutions

5 (1)
By: Harpreet Singh

Overview of this book

Most enterprises use Cisco networking equipment to design and implement their networks. However, some networks outperform networks in other enterprises in terms of performance and meeting new business demands, because they were designed with a visionary approach. The book starts by describing the various stages in the network lifecycle and covers the plan, build, and operate phases. It covers topics that will help network engineers capture requirements, choose the right technology, design and implement the network, and finally manage and operate the network. It divides the overall network into its constituents depending upon functionality, and describe the technologies used and the design considerations for each functional area. The areas covered include the campus wired network, wireless access network, WAN choices, datacenter technologies, and security technologies. It also discusses the need to identify business-critical applications on the network, and how to prioritize these applications by deploying QoS on the network. Each topic provides the technology choices, and the scenario, involved in choosing each technology, and provides configuration guidelines for configuring and implementing solutions in enterprise networks.
Table of Contents (12 chapters)

What this book covers

We divided the book into three broad sections as follows:

  • Network design fundamentals, where we review the fundamentals of TCP/ IP and discuss the network life cycle. We will also cover the business relevance of the network, and how networks are keeping up with the challenges of evolving businesses.
  • The second part focuses on the various functional areas in the enterprise network, and covers the technologies and design choices within each functional area.
  • The third section discusses an approach on managing and operating the network, and provide best practices for network management, and finally provide tips on troubleshooting the network.

Chapter 1, Network Building Essentials, provides a quick review the OSI and the TCP/IP stack, talks about the network life cycle, and covers the various life stages of the network from preparing to build the network, planning the network, designing the network, implementing the network, operating it, and finally optimizing the network.

Chapter 2, Networks for Digital Enterprises, talks about the emerging trends in enterprise IT networks, and talks about how changing business models are changing network designs. We will discuss desirable network traits in this section, which will then be used in the design sections.

Chapter 3, Components of the Enterprise Network, discusses the different parts of the enterprise network and lays down the reference architecture to be used throughout the book. This section consists of outlining the different parts of the network, for example, LAN, WAN, DC, and a internet connectivity, and defines the functional requirements from each part of the network. This chapter also introduces the reader to the various networking equipment such as switches and routers, and introduce IOS.

Chapter 4, Understanding and Configuring Campus Network Technologies, reviews IP addressing and basic layer 2 and layer 3 protocols, and discusses the complete design of the local area network in a floor of the building and extends it to the campus. The chapter discusses the design choices for a layer 2/layer 3 boundary, the various protocols used at layer 2, and the various routing protocols.

Chapter 5, Understanding and Configuring Wireless Access Technologies, discusses the various terminologies used in wireless networks, and provides a quick overview of the various wireless standards. The chapter then details on how to configure a wireless network within the enterprise in centralized and flexconnect modes of operation.

Chapter 6, Understanding and Configuring WAN Technologies, discusses the various types of options available for connecting different networks over wide area networks. The chapter describes technologies such as packet switched networks, leased lines, and MPLS VPNs, covering the pros and cons of each approach, and provides guidelines on how to use public networks to build overlay WAN using tunnels.

Chapter 7, Understanding and Configuring Data Center Technologies, describes the functions of a data center, and presents a sample design for how to segment the data center into various segments to ensure the security of the network.

Chapter 8, Understanding and Configuring Network Security, deals with the security aspects of the network infrastructure and provides guidelines on securing the control plane, the management plane, and the data plane in the network. This chapter also provides an overview of technologies involved in securing the network beyond routers and switches.

Chapter 9, Understanding and Configuring Quality of Service, talks about the importance of Quality of Service (QoS), discusses the impact of network degradation on various types of applications, and provides guidance on how to deploy QoS on the network to prioritize business-critical applications.

Chapter 10, A Systematic Approach to Network Operations, provides an introduction to the various models used for network life cycle and discusses an approach that helps to manage the network in a structured manner. The chapter also provides guidelines and best practices for network management.

Chapter 11, Basic Troubleshooting Skills and Techniques, provides an overview of the various issues on the network and provides an approach to troubleshooting the IP network.