Introduction |
|
xx | |
Part I Business-Driven Strategic Network Design |
|
1 | (30) |
|
Chapter 1 Network Design Requirements: Analysis and Design Principles |
|
|
3 | (28) |
|
|
4 | (1) |
|
|
5 | (4) |
|
|
6 | (1) |
|
Elasticity to Support the Strategic Business Trends |
|
|
7 | (1) |
|
IT as a "Business Innovation" Enabler |
|
|
8 | (1) |
|
The Nature of the Business |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
10 | (2) |
|
|
12 | (1) |
|
Crafting the Design Requirements |
|
|
13 | (3) |
|
|
16 | (3) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
Network Design Principles |
|
|
19 | (10) |
|
Reliability and Resiliency |
|
|
19 | (1) |
|
|
20 | (1) |
|
Reliable and Manageable Scalability |
|
|
21 | (1) |
|
Fault Isolation and Simplicity |
|
|
22 | (1) |
|
|
23 | (2) |
|
|
25 | (1) |
|
|
25 | (1) |
|
Physical Layout Considerations |
|
|
26 | (3) |
|
|
29 | (1) |
|
|
29 | (2) |
Part II Next Generation - Converged Enterprise Network Architectures |
|
31 | (172) |
|
Chapter 2 Enterprise Layer 2 and Layer 3 Design |
|
|
35 | (84) |
|
Enterprise Layer 2 LAN Design Considerations |
|
|
35 | (8) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
First Hop Redundancy Protocol and Spanning Tree |
|
|
38 | (2) |
|
Enterprise Layer 2 LAN Common Design Options |
|
|
40 | (1) |
|
Layer 2 Design Models: STP Based (Classical Model) |
|
|
40 | (1) |
|
Layer 2 Design Model: Switch Clustering Based (Virtual Switch) |
|
|
41 | (1) |
|
Layer 2 Design Model: Daisy-Chained Access Switches |
|
|
42 | (1) |
|
Layer 2 LAN Design Recommendations |
|
|
43 | (1) |
|
Enterprise Layer 3 Routing Design Considerations |
|
|
43 | (17) |
|
IP Routing and Forwarding Concept Review |
|
|
43 | (2) |
|
Link-State Routing Protocol Design Considerations |
|
|
45 | (1) |
|
Link-State over Hub-and-Spoke Topology |
|
|
45 | (3) |
|
Link-State over Full-Mesh Topology |
|
|
48 | (1) |
|
|
49 | (4) |
|
|
53 | (1) |
|
|
53 | (1) |
|
EIGRP Design Considerations |
|
|
54 | (1) |
|
|
55 | (1) |
|
EIGRP Stub Route Leaking: Hub-and-Spoke Topology |
|
|
56 | (2) |
|
|
58 | (1) |
|
EIGRP: Full-Mesh Topology |
|
|
58 | (1) |
|
EIGRP Route Propagation Considerations |
|
|
59 | (1) |
|
|
60 | (1) |
|
Hiding Topology and Reachability Information Design Considerations |
|
|
60 | (23) |
|
IGP Flooding Domains Design Considerations |
|
|
62 | (1) |
|
Link-State Flooding Domain Structure |
|
|
63 | (6) |
|
EIGRP Flooding Domains Structure |
|
|
69 | (1) |
|
Routing Domain Logical Separation |
|
|
70 | (6) |
|
|
76 | (2) |
|
|
78 | (2) |
|
|
80 | (3) |
|
IGP Traffic Engineering and Path Selection: Summary |
|
|
83 | (2) |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
84 | (1) |
|
Summary of IGP Characteristics |
|
|
84 | (1) |
|
BGP Design Considerations |
|
|
85 | (22) |
|
|
86 | (2) |
|
BGP Attributes and Path Selection |
|
|
88 | (1) |
|
BGP as the Enterprise Core Routing Protocol |
|
|
89 | (1) |
|
Enterprise Core Routing Design Models with BGP |
|
|
90 | (4) |
|
BGP Shortest Path over the Enterprise Core |
|
|
94 | (2) |
|
BGP Scalability Design Options and Considerations |
|
|
96 | (1) |
|
|
96 | (6) |
|
|
102 | (1) |
|
|
103 | (2) |
|
Confederation Versus Route Reflection |
|
|
105 | (1) |
|
|
106 | (1) |
|
Route Redistribution Design Considerations |
|
|
107 | (7) |
|
Single Redistribution Boundary Point |
|
|
107 | (1) |
|
Multiple Redistribution Boundary Points |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
Route Filtering Versus Route Tagging with Filtering |
|
|
110 | (4) |
|
Enterprise Routing Design Recommendations |
|
|
114 | (3) |
|
Determining Which Routing Protocol to Use |
|
|
115 | (2) |
|
|
117 | (2) |
|
Chapter 3 Enterprise Campus Architecture Design |
|
|
119 | (24) |
|
Enterprise Campus: Hierarchical Design Models |
|
|
119 | (2) |
|
|
120 | (1) |
|
|
120 | (1) |
|
Enterprise Campus: Modularity |
|
|
121 | (2) |
|
When Is the Core Block Required? |
|
|
122 | (1) |
|
Access-Distribution Design Model |
|
|
123 | (3) |
|
Enterprise Campus: Layer 3 Routing Design Considerations |
|
|
126 | (2) |
|
EIGRP Versus Link State as a Campus IGP |
|
|
128 | (13) |
|
Enterprise Campus Network Virtualization |
|
|
129 | (1) |
|
Drivers to Consider Network Virtualization |
|
|
129 | (2) |
|
Network Virtualization Design Elements |
|
|
131 | (1) |
|
Enterprise Network Virtualization Deployment Models |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
133 | (3) |
|
|
136 | (5) |
|
|
141 | (1) |
|
|
141 | (2) |
|
Chapter 4 Enterprise Edge Architecture Design |
|
|
143 | (60) |
|
|
143 | (27) |
|
|
144 | (1) |
|
Modem WAN Transports (Layer 2 Versus Layer 3) |
|
|
145 | (1) |
|
|
146 | (2) |
|
|
148 | (3) |
|
Internet as WAN Transport |
|
|
151 | (1) |
|
Internet as WAN Transport Advantages and Limitations |
|
|
152 | (1) |
|
WAN Transport Models Comparison |
|
|
153 | (2) |
|
WAN Module Design Options and Considerations |
|
|
155 | (1) |
|
Design Hierarchy of the Enterprise WAN Module |
|
|
155 | (1) |
|
WAN Module Access to Aggregation Layer Design Options |
|
|
156 | (2) |
|
WAN Edge Connectivity Design Options |
|
|
158 | (2) |
|
Single WAN Provider Versus Dual Providers |
|
|
160 | (1) |
|
Remote Site (Branch) WAN Design Considerations |
|
|
161 | (3) |
|
Internet as WAN Transport (DMVPN Based) |
|
|
164 | (2) |
|
Enterprise WAN Module Design Options |
|
|
166 | (1) |
|
Option 1: Small to Medium |
|
|
166 | (1) |
|
Option 2: Medium to Large |
|
|
167 | (2) |
|
Option 3: Large to Very Large |
|
|
169 | (1) |
|
WAN Virtualization and Overlays Design Considerations and Techniques |
|
|
170 | (14) |
|
|
172 | (2) |
|
Over-the-Top WAN Virtualization Design Options (Service Provider Coordinated/Dependent) |
|
|
174 | (2) |
|
Over-the-Top WAN Virtualization Design Options (Service Provider Independent) |
|
|
176 | (5) |
|
Comparison of Enterprise WAN Transport Virtualization Techniques |
|
|
181 | (2) |
|
WAN Virtualization Design Options Decision Tree |
|
|
183 | (1) |
|
Enterprise WAN Migration to MPLS VPN Considerations |
|
|
184 | (4) |
|
Migrating from Legacy WAN to MPLS L3VPN WAN Scenario |
|
|
184 | (4) |
|
Enterprise Internet Edge Design Considerations |
|
|
188 | (14) |
|
Internet Edge Architecture Overview |
|
|
188 | (2) |
|
Enterprise Multihomed Internet Design Considerations |
|
|
190 | (1) |
|
Multihoming Design Concept and Drivers |
|
|
190 | (2) |
|
BGP over Multihomed Internet Edge Planning Recommendations |
|
|
192 | (1) |
|
BGP Policy Control Attributes for Multihoming |
|
|
192 | (2) |
|
Common Internet Multihoming Traffic Engineering Techniques over BGP |
|
|
194 | (1) |
|
Scenario 1: Active-Standby |
|
|
194 | (5) |
|
Asymmetrical Routing with Multihoming (Issue and Solution) |
|
|
199 | (3) |
|
|
202 | (1) |
Part III Service Provider Networks Design and Architectures |
|
203 | (158) |
|
Chapter 5 Service Provider Network Architecture Design |
|
|
205 | (40) |
|
Service Provider Network Architecture Building Blocks |
|
|
207 | (5) |
|
|
208 | (3) |
|
Service Provider Network Core |
|
|
211 | (1) |
|
Service Provider Control Plane Logical Architectures |
|
|
212 | (15) |
|
IGP in Service Provider Networks |
|
|
212 | (1) |
|
BGP in Service Provider Networks |
|
|
213 | (1) |
|
BGP Route Aggregation (ISP Perspective) |
|
|
213 | (4) |
|
Hot- and Cold-Potato Routing (SP Perspective) |
|
|
217 | (6) |
|
Multiprotocol Label Switching |
|
|
223 | (2) |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
226 | (1) |
|
|
227 | (16) |
|
Business and Technical Drivers |
|
|
227 | (4) |
|
|
231 | (1) |
|
MPLS-TE Strategic Planning Approach |
|
|
231 | (1) |
|
MPLS-TE Tactical Planning Approach |
|
|
232 | (1) |
|
MPLS-TE Design Considerations |
|
|
233 | (1) |
|
Constrained Path Calculation |
|
|
234 | (3) |
|
|
237 | (2) |
|
|
239 | (2) |
|
Forwarding Traffic Via the TE Tunnel |
|
|
241 | (2) |
|
|
243 | (1) |
|
|
244 | (1) |
|
Chapter 6 Service Provider MPLS VPN Services Design |
|
|
245 | (84) |
|
|
245 | (37) |
|
MPLS L3VPN Architecture Components |
|
|
246 | (2) |
|
L3VPN Control Plane Components |
|
|
248 | (3) |
|
|
251 | (2) |
|
L3VPN Design Considerations |
|
|
253 | (1) |
|
Load Sharing for Multihomed L3VPN CE |
|
|
253 | (1) |
|
|
254 | (8) |
|
MP-BGP VPN Internet Routing |
|
|
262 | (2) |
|
PE-CE L3VPN Routing Design |
|
|
264 | (1) |
|
PE-CE Routing Design Considerations |
|
|
265 | (1) |
|
PE-CE Routing Protocol Selection |
|
|
266 | (1) |
|
PE-CE Design Options and Recommendations |
|
|
266 | (16) |
|
|
282 | (33) |
|
|
284 | (3) |
|
Virtual Private Wire Service Design Considerations |
|
|
287 | (1) |
|
|
287 | (2) |
|
|
289 | (2) |
|
Virtual Private LAN Service Design Considerations |
|
|
291 | (1) |
|
VPLS Architecture Building Blocks |
|
|
292 | (1) |
|
VPLS Functional Components |
|
|
292 | (1) |
|
Virtual Switching Instance |
|
|
293 | (1) |
|
|
293 | (1) |
|
|
294 | (4) |
|
|
298 | (1) |
|
|
299 | (2) |
|
H-VPLS with Provider Backbone Bridging |
|
|
301 | (6) |
|
EVPN Design Model (Next-Generation MPLS L2VPN) |
|
|
307 | (4) |
|
EVPN BGP Routes and Extended Communities |
|
|
311 | (3) |
|
Final Thoughts: L2VPN Business Value and Direction |
|
|
314 | (1) |
|
Service Provider Control Plane Scalability |
|
|
315 | (12) |
|
IGP Scalability Considerations |
|
|
316 | (2) |
|
Route Reflection Design Options in SP Networks |
|
|
318 | (1) |
|
Provider Routers as RRs for MPLS-VPN |
|
|
319 | (1) |
|
Separate RR for MPLS-VPN and IPv4/v6 |
|
|
319 | (1) |
|
Separate RR per Service (MPLS-VPN and IPv4/v6) |
|
|
320 | (1) |
|
|
321 | (2) |
|
|
323 | (2) |
|
Hierarchical LSP (Unified MPLS) |
|
|
325 | (2) |
|
|
327 | (1) |
|
|
327 | (2) |
|
Chapter 7 Multi-AS Service Provider Network Design |
|
|
329 | (32) |
|
Inter-AS Design Options and Considerations |
|
|
330 | (14) |
|
Inter-AS Option A: Back-to-Back VRF (VRF-to-VRF) |
|
|
330 | (1) |
|
Inter-AS Option B: ASBR to ASBR with MP-eBGP Approach |
|
|
331 | (1) |
|
Option B-1: Next-Hop-Self Approach |
|
|
331 | (1) |
|
Option B-2: Redistribute Connected Approach |
|
|
332 | (2) |
|
Option B-3: Multi hop MP-eBGP Approach |
|
|
334 | (1) |
|
Inter-AS Option C: Multihop MP-eBGP Between RR |
|
|
335 | (1) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
337 | (1) |
|
|
338 | (5) |
|
|
343 | (1) |
|
Comparison of Inter-AS Connectivity Options |
|
|
344 | (2) |
|
Carrier Supporting Carrier |
|
|
346 | (7) |
|
Non-MPLS Customer over MPLS VPN Carrier |
|
|
346 | (1) |
|
MPLS Customer over MPLS VPN Carrier |
|
|
347 | (1) |
|
MPLS VPN Customer over MPLS VPN Carrier |
|
|
348 | (1) |
|
MPLS VPN Customer over MPLS Carrier |
|
|
348 | (1) |
|
MPLS VPN Customer over IP-Only Carrier |
|
|
349 | (4) |
|
Acquisition of an MPLS-L3VPN Service Provider Design Scenario |
|
|
353 | (5) |
|
|
353 | (1) |
|
|
353 | (1) |
|
Available Interconnection Options |
|
|
354 | (1) |
|
Inter-AS Connectivity Model Selection |
|
|
355 | (1) |
|
|
356 | (2) |
|
Network Merger implementation Plan |
|
|
358 | (1) |
|
|
358 | (3) |
Part IV Data Center Networks Design |
|
361 | (68) |
|
Chapter 8 Data Center Networks Design |
|
|
363 | (66) |
|
Traditional Data Center Network Architecture |
|
|
364 | (3) |
|
STP-Based Data Center Network Architecture |
|
|
365 | (2) |
|
mLAG-Based Data Center Network Architecture |
|
|
367 | (1) |
|
Next-Generation Data Center Network Design |
|
|
367 | (20) |
|
Data Center Virtualization and Cloud-Based Services Overview |
|
|
368 | (1) |
|
Drivers Toward New Fabric-Based Data Center Network Architectures |
|
|
369 | (3) |
|
Modern Data Center Network Architectures and Overlays |
|
|
372 | (2) |
|
|
374 | (2) |
|
|
376 | (1) |
|
|
377 | (3) |
|
|
380 | (3) |
|
|
383 | (4) |
|
Comparison of Data Center Network Architectures |
|
|
387 | (2) |
|
|
389 | (39) |
|
|
392 | (1) |
|
|
393 | (1) |
|
|
394 | (4) |
|
|
398 | (3) |
|
|
401 | (2) |
|
Layer 2 DCI over ME Transport |
|
|
403 | (1) |
|
TRILL-FabricPath-Based DCI |
|
|
404 | (2) |
|
Overlay Transport Virtualization |
|
|
406 | (2) |
|
|
408 | (3) |
|
DCI Design Considerations |
|
|
411 | (3) |
|
|
414 | (3) |
|
DCI Path Optimization Techniques |
|
|
417 | (4) |
|
|
421 | (1) |
|
|
422 | (1) |
|
Locator/ID Separation Protocol |
|
|
423 | (5) |
|
|
428 | (1) |
|
|
428 | (1) |
Part V High Availability |
|
429 | (44) |
|
Chapter 9 Network High-Availability Design |
|
|
431 | (42) |
|
|
434 | (2) |
|
Fate Sharing and Fault Domains |
|
|
436 | (2) |
|
Network Resiliency Design Considerations |
|
|
438 | (31) |
|
|
441 | (2) |
|
Protocol-Level Resiliency |
|
|
443 | (1) |
|
|
444 | (10) |
|
Network Protection Approach |
|
|
454 | (12) |
|
|
466 | (3) |
|
|
469 | (1) |
|
|
470 | (3) |
Part VI Other Network Technologies and Services |
|
473 | (104) |
|
Chapter 10 Design of Other Network Technologies and Services |
|
|
475 | (102) |
|
IPv6 Design Considerations |
|
|
475 | (17) |
|
IPv6 Business and Technical Drivers |
|
|
476 | (1) |
|
IPv6 Addressing Types (Review) |
|
|
477 | (1) |
|
Migration and Integration of IPv4 and IPv6 |
|
|
478 | (1) |
|
|
479 | (1) |
|
Solution Assessment and Planning |
|
|
479 | (5) |
|
|
484 | (4) |
|
Deployment, Monitoring, and Optimization |
|
|
488 | (1) |
|
Transition to IPv6: Scenario |
|
|
488 | (2) |
|
Network Requirements Analysis |
|
|
490 | (1) |
|
|
490 | (2) |
|
|
492 | (1) |
|
IP Multicast Design Considerations |
|
|
492 | (29) |
|
Enterprise Multicast Design Options and Considerations |
|
|
494 | (1) |
|
Application Characteristic |
|
|
494 | (1) |
|
Multicast IP Address Mapping into Ethernet MAC Address |
|
|
494 | (3) |
|
Multicast Layer 3 Routing |
|
|
497 | (9) |
|
|
506 | (1) |
|
Multicast Source Discovery Protocol |
|
|
507 | (2) |
|
|
509 | (1) |
|
SP Multicast Design Options and Considerations |
|
|
510 | (1) |
|
|
510 | (1) |
|
MVPN - Label Switch Multicast |
|
|
511 | (1) |
|
|
512 | (2) |
|
Multicast Resiliency Design Considerations |
|
|
514 | (1) |
|
|
514 | (1) |
|
|
515 | (1) |
|
|
516 | (1) |
|
|
517 | (2) |
|
First Hop Redundancy Protocol-Aware PIM |
|
|
519 | (1) |
|
Final Thoughts on IP Multicast Design |
|
|
520 | (1) |
|
|
520 | (1) |
|
QoS Design Considerations |
|
|
521 | (29) |
|
QoS High Level Design: Business-Driven Approach |
|
|
521 | (2) |
|
|
523 | (1) |
|
QoS DiffSery Architecture and Toolset |
|
|
523 | (2) |
|
Traffic Classification and Marking |
|
|
525 | (3) |
|
Traffic Profiling and Congestion Management |
|
|
528 | (3) |
|
Congestion Avoidance (Active Queue Management) |
|
|
531 | (1) |
|
|
531 | (1) |
|
|
532 | (5) |
|
Enterprise QoS Design Considerations |
|
|
537 | (1) |
|
|
537 | (1) |
|
|
538 | (5) |
|
Service Provider QoS Design |
|
|
543 | (1) |
|
|
543 | (4) |
|
|
547 | (2) |
|
|
549 | (1) |
|
|
550 | (19) |
|
Network Security Design Fundamentals |
|
|
551 | (1) |
|
|
551 | (1) |
|
Security Policy Considerations |
|
|
551 | (1) |
|
Holistic Approach Considerations |
|
|
552 | (1) |
|
Divide-and-Conquer Approach |
|
|
553 | (2) |
|
Security Triad Principle (Confidentiality, Integrity, and Availability) |
|
|
555 | (1) |
|
Network Infrastructure Security Considerations |
|
|
556 | (1) |
|
Network Device Level Security |
|
|
557 | (4) |
|
Layer 2 Security Considerations |
|
|
561 | (2) |
|
Layer 3 Control Plane Security Considerations |
|
|
563 | (1) |
|
Remote-Access and Network Overlays (VPN) Security Considerations |
|
|
564 | (2) |
|
Network-Based Firewall Considerations |
|
|
566 | (2) |
|
|
568 | (1) |
|
|
569 | (7) |
|
Fault, Configuration, Accounting, Performance, and Security |
|
|
570 | (1) |
|
Network Management High-Level Design Considerations |
|
|
571 | (3) |
|
Multitier Network Management Design |
|
|
574 | (2) |
|
|
576 | (1) |
|
|
576 | (1) |
Appendix References |
|
577 | |