Designing for Cisco Internetwork Solutions (DESGN)

ISBN-10: 158720424X

ISBN-13: 9781587204241

Edition: 3rd 2012 (Revised)

Authors: Sean Wilkins

List price: $43.99 Buy it from $26.58 Rent it from $20.87
eBook available
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy


This is Cisco's authorized, self-paced, foundation learning tool for the latest version of the Cisco DESGN exam, required for the current CCDA certification. It brings together the core knowledge professionals need to design routed and switched enterprise network infrastructures within Cisco's best-practice Preparing, Planning, Designing, Implementing, Operating, and Optimizing (PPDIOO) framework. As an Authorized Self-Study Guide, this book fully reflects the content of the newest version of the Cisco DESGN course. Real-world scenarios and a running case study illustrate and reinforce key concepts, and chapter-ending questions help readers assess their understanding as they prepare for the exam. Based on the popular Second Edition, this update fully reflects new developments, including: #xA0; " Borderless networks, including security issues " Data center virtualization " Collaboration for enterprise and commercial customers
Used Starting from $26.58
Rent Starting from $20.87
eBooks Starting from $55.99
Buy eBooks
what's this?
Rush Rewards U
Members Receive:
You have reached 400 XP and carrot coins. That is the daily max!
Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS Word® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS PowerPoint® 2010 Online content $4.95 $1.99
Customers also bought

Book details

List price: $43.99
Edition: 3rd
Copyright year: 2012
Publisher: Pearson Education, Limited
Publication date: 7/31/2011
Binding: Hardcover
Pages: 550
Size: 7.75" wide x 9.50" long x 1.50" tall
Weight: 2.442
Language: English

Network Fundamentals Review
Introduction to Networks
Protocols and the OSI Model
OSI Model
OSI Layers
Physical Layer: Layer 1
Data Link Layer: Layer 2
Network Layer: Layer 3
Transport Layer: Layer 4
Upper Layers: Layers 5 Through 7
Communication Among OSI Layers
LANs and WANs
Network Devices
Terminology: Domains, Bandwidth, Unicast, Broadcast, and Multicast
Physical Interfaces and Ports
Switches Versus Bridges
Introduction to the TCP/IP Suite
TCP/IP Transport Layer Protocols
Port Numbers
TCP Sequencing, Acknowledgment, and Windowing
TCP/IP Internet Layer Protocols
IPv4 Datagrams
IPv6 Datagrams
Routers Work at the Lower Three OSI Layers
Routing Tables
Routing Protocols
Physical Addresses
Logical Addresses
Routing and Network Layer Addresses
IPv4 Addresses
IPv4 Address Classes
Private and Public IPv4 Addresses
IPv4 Subnets
IPv6 Addresses
IPv6 Address Types
Switching Types
Layer 2 Switching
Layer 3 Switching
Spanning Tree Protocol
Redundancy in Layer 2 Switched Networks
STP Terminology and Operation
STP Terminology
STP States
Rapid STP
Virtual LANs
VLAN Membership
Inter-VLAN Routing
Comprehensive Example
Review Questions
Network Design Methodology
Understanding the Network Architectures for the Enterprise
Business Drivers for a New Network Framework
Business Forces
Technology-Related Forces
IT Challenges
Cisco Network Architectures for the Enterprise
Borderless Networks Architecture
Borderless Networks Architecture Approach
Collaboration Architecture Approach
Data Center/Virtualization Architecture Approach
Identifying Design Requirements
Using the PPDIOO Approach for Networks
Benefits of the Lifecycle Approach
Design Methodology
Identifying Customer Design Requirements
Identifying Network Applications and Network Services
Defining Organizational Goals
Identifying Organizational Constraints
Identifying Technical Goals
Assessing Technical Constraints
Characterizing the Existing Network and Sites
Identifying Major Features of the Network
Sample Site Contact Information
Sample High-Level Network Diagram
Auditing the Existing Network
Using Tools for Auditing the Network
RSPAN with VACLs for Granular Traffic Analysis
Analyzing Network Traffic and Applications
Using Tools for Analyzing Network Traffic
Reviewing Network Traffic Information
Analyzing Network Health
Creating a Draft Design Document
Time Estimates for Performing Network Characterization
Using the Top-Down Approach to Network Design
Top-Down Approach to Network Design
Top-Down Design Example
Decision Tables in Network Design
Assessing the Scope of the Network Design Project
Using Structured Design Principles
Logical Structure
Physical Structure
Network Design Tools
Testing the Design
Planning an Implementation
Documenting the Design
Review Questions
Structuring and Modularizing the Network
Designing the Network Hierarchy
Introducing the Hierarchical Network Model
Describing Access Layer Functionality
Campus Access Layer Connectivity
Describing Distribution Layer Functionality
Virtual Switches
Describing Core Layer Functionality
Using a Modular Approach in Network Design
Describing the Enterprise Campus Functional Area
Enterprise Campus Infrastructure Module
Data Center Module
Describing the Enterprise Edge Area
E-Commerce Module
Internet Connectivity Module
WAN and MAN and Site-to-Site VPN Module
Remote Access and VPN Module
Describing the Service Provider Area
ISP Module
Public Switched Telephone Network Module
Frame Relay and ATM Module
Describing the Remote Area
Enterprise Branch Module
Enterprise Data Center Module
Enterprise Teleworker Module
Supporting Services on Borderless Networks
Explaining the Role of Borderless Network Services
Mobility Considerations
Security Infrastructure Services
Designing Security to Protect Against External Threats
Application Performance Considerations
Resolving Application Issues with Cisco Application Network Services
Cisco ANS Components
IP Communications
Voice Transport
High-Availability Network Services
Full-Mesh Versus Partial-Mesh Redundancy
Identifying Network Management Protocols and Features
Network Management Overview
SNMP Message Types
SNMP Version 2
SNMP Version 3
MIB Characteristics
MIB Variable Retrieval
Using RMON
NetFlow Characteristics
NetFlow Versus RMON Information Gathering
Applications Using NetFlow
Cisco Discovery Protocol Features
Syslog Features
Review Questions
Designing Basic Campus and Data Center Networks
Describing Campus Design Considerations
Campus Design Factors
Network Application Characteristics and Considerations
Peer-Peer Applications
Client-Local Server Applications
Client-Data Center Applications
Client-Enterprise Edge Applications
Application Requirements
Environmental Characteristics and Considerations
Intrabuilding Structure
Interbuilding Structure
Distant Remote Building Structure
Transmission Media Considerations
Optical Fiber
Campus Transmission Media Comparison
Transmission Media Cabling Example
Infrastructure Device Characteristics and Considerations
Quality of Service (QoS)
Designing the Campus Infrastructure Module
Design Considerations for the Campus Network
Design Considerations for the Building Access Layer
Managing VLANs and STP
Managing Trunks Between Switches
Managing Default PAgP Settings
Consider Implementing Routing in the Building Access Layer
Design Considerations for the Building Distribution Layer
Best Practices in the Distribution Layer
Using First-Hop Redundancy Protocols
Deploying Layer 3 Routing Protocols
Using the Virtual Switching System at the Distribution Layer
Campus Core Design Considerations
Small and Medium Campus Design Options
Edge Distribution at the Campus Core
Describing Enterprise Data Center Considerations
Describing the Enterprise Data Center Architectures
Cisco Enterprise Data Center Architecture Framework
Server Challenges
Data Center Facility Aspects
Enterprise Data Center Infrastructure
Data Center Access Layer
Data Center Aggregation Layer
Data Center Core Layer
Describing Enterprise Network Virtualization Tools
Virtualization Challenges
What Is Virtualization?
Types of Virtualization
Virtualization Technologies
Network Virtualization Design Considerations
Review Questions
Designing Remote Connectivity
Identifying WAN Technology Considerations
Review of WAN Features
Comparison of WAN Transport Technologies
Time-Division Multiplexing
ISDN Connectivity
Frame Relay
Multiprotocol Label Switching
Metro Ethernet
DSL Technology
Cable Technology
Wireless Technology
SONET and SDH Technology
DWDM Technology
Dark Fiber
WAN Link Categories
WAN Transport Technology Pricing and Contract Considerations
WAN Design Requirements
Response Time
Packet Loss
QoS Considerations for Bandwidth Constraints
Congestion Management
Traffic Shaping and Policing
Link Efficiency
Window Size
Designing the Enterprise WAN
Traditional WAN Designs
Star Topology
Fully Meshed Topology
Partially Meshed Topology
Remote-Access Network Design
VPN Design
Enterprise Versus Service Provider-Managed VPNs
Enterprise Managed VPN: IPsec
Service Provider-Managed VPNs: MPLS
Service Provider-Managed VPNs: Metro Ethernet
Service Provider-Managed VPNs: VPLS
WAN Backup Strategy Design
Using the Internet as a WAN Backup
Selecting the Enterprise WAN Architecture
Cisco Enterprise MAN and WAN Architecture
Selecting Enterprise WAN Components
Hardware Selection
Designing the Enterprise Branch
Enterprise Branch Architecture
Enterprise Branch Design
New Features on the ISR G2 Routers
Small Branch Office Design
Medium Branch Office Design
Large Branch Office Design
Enterprise Teleworker (Cisco Virtual Office Solution) Design
New ISRs for Small Offices and Teleworkers
Review Questions
Designing IP Addressing
Designing IPv4 Addressing
IPv4 Addressing
Private and Public Addressing Guidelines
Recommended Practices for NAT
Developing an Addressing Plan
Planning the IP Addressing Hierarchy
Design Consideration: Route Summarization Groups
Address Blocks by Location
Hierarchical IP Addressing Plan
Recommended Practices for Name Resolution
Locating DHCP and DNS Servers in the Network
IP Address Space Planning Road Map
Designing IPv6 Addressing
IPv6 Addressing
Benefits of IPv6 Addressing
IPv6 Address Types
IPv6 Address Assignment Strategies
Identifying IPv6 Name Resolution
Making the Transition from IPv4 to IPv6
Strategies for IPv6 Deployment
Dual-Stack Model
Hybrid Model
Service Block Model
Review Questions
Designing and Selecting Routing Protocols
Reviewing Enterprise Routing Protocols
Reviewing Routing Protocol Fundamentals
Differentiating Between Distance Vector and Link-State Routing Protocols
Differentiating Between Interior and Exterior Routing Protocols
Differentiating Between Hierarchical and Flat Routing Protocols
Routing Protocol Convergence
Routing Protocols for the Enterprise
Open Shortest Path First
Border Gateway Protocol
IPv6 Routing
Selecting an Enterprise Routing Protocol
When to Choose EIGRP
When to Choose OSPF
Designing a Routing Protocol Deployment
Applying Routing Protocols to a Hierarchical Network Structure
Routing in the Campus Core
Routing in the Building Distribution Layer
Routing in the Enterprise Edge Functional Area
Route Redistribution
Route Redistribution Planning
Remote-Access and VPN and Internet Connectivity Module Route Redistribution
Route Filtering
Route Filtering and Internet Connectivity
Route Summarization
Recommended Practice: Summarize at the Distribution Layer
Recommended Practice: Passive Interfaces for IGP at the Access Layer
IPv6 Route Summarization
Review Questions
Evaluating Security Solutions for the Network
Defining Network Security
Network Security Background
Security Legislation
Threats and Risks
Reconnaissance Attacks
Vulnerability Assessment
Example Threat: Gaining Unauthorized Access to Systems
Example Risk: Loss of Availability
Everything Is a Potential Target
Understanding Network Security Policy and Processes
Definition of a Security Policy
Risk Assessment and Management
Example: Security Policy
Network Security Is a Continuous Process
Integrating Security Design and Network Design
Understanding the Cisco SAFE Approach
Cisco SAFE Architecture
The Network as a Platform for Security
Cisco Security Control Framework
Trust and Identity Management
Access Control
Trust and Identity Management Technologies
Example: Cisco IBNS
Example: Firewall Filtering Using ACLs
Example: Cisco NAC Appliance
Identity and Access Control Deployment Locations
Threat Defense
Incorporating Physical Security
Infrastructure Protection
Threat Detection and Mitigation
Threat Detection and Mitigation Solutions
Example: Cisco IronPort ESA
Example: Cisco IronPort WSA
Secure Connectivity
Encryption Fundamentals
VPN Protocols
Ensuring Privacy
Example: Providing Confidentiality over the Internet
Example: Protecting Communication over the Public Infrastructure
Example: Network Authentication over a VPN
Maintaining Data Integrity
Example: VPN Tunneling for Data Integrity
Example: Implementation of Digital Signatures
Security Management
Selecting Network Security Solutions
Security Integration in Network Devices
Cisco IOS Security
Security Appliances
Intrusion Prevention System
Cisco Catalyst Services Modules
Endpoint Security Solutions
Securing the Enterprise Network
Example: Deploying Identity and Access Control in the Enterprise Campus
Example: Deploying Threat Detection and Mitigation in the Enterprise Campus
Example: Deploying Infrastructure Protection in the Enterprise Campus
Example: Deploying Security in the Enterprise Campus
Example: Deploying Identity and Access Control in the Enterprise Data Center
Example: Deploying Threat Detection and Mitigation in the Enterprise Data Center
Example: Deploying Infrastructure Protection in the Enterprise Data Center
Example: Deploying Security in the Data Center
Example: Deploying Identity and Access Control in the Enterprise Edge
Example: Deploying Threat Detection and Mitigation in the Enterprise Edge
Example: Deploying Infrastructure Protection in the Enterprise Edge
Example: Deploying Security in the Enterprise Edge
Review Questions
Identifying Voice and Video Networking Considerations
Integrating Voice and Video Architectures
Differentiating Between Analog and Digital Signaling
Introducing Voice and Video over IP
Voice and Video Standards
Multipoint Control Units
Introducing VoIP
IP Telephony Design Models
Introducing Video Considerations
Media Application Models
Delivery of Media Application
Architectural Framework for Media Services
Call Control and Transport Protocols
Call Control Functions with H.323
Voice Conversation with RTP
Call Control Functions with SSCP
Call Control Functions with SIP
Call Control Functions with MGCP
Identifying the Requirements of Voice and Video Technologies
Minimizing Delay, Jitter, and Loss
One-Way Network Delay Recommendations
Propagation Delay
Serialization Delay
Processing Delay
Queuing Delay
Dejitter Buffers
Packet Loss
Preventing Echo
Echo Canceller Example
Echo Cancellation Guidelines
Voice Coding and Compression
Codec Complexity, DSPs, and Voice Calls
Bandwidth Considerations
Reducing Voice Traffic with cRTP
Reducing Voice Traffic with VAD
Voice Bandwidth Calculation
Typical Video Resolution and Bandwidth
Using QoS for Voice and Video
QoS Considerations for Voice and Video in the WAN
Call Rerouting Alternatives
Call Admission Control Examples
Implementing CAC with RSVP
Voice Traffic Engineering Overview
Review Questions
Identifying Design Considerations for Basic Wireless Networking
Cisco Unified Wireless Network Review
Cisco Unified Wireless Network Architecture
Cisco Unified Wireless Network Elements
CAPWAP and LWAPP Fundamentals
Split Media Access Control
Local Media Access Control
Access Point Modes
Wireless Infrastructure
Wireless Authentication
Overview of WLAN Controllers
Access Point Support and Scaling
Access Point Scalability Considerations
Multiple AP Manager Interface Example
Link Aggregation (LAG) with a Single AP Manager Interface Example
Wireless Network Controller Technology
Lightweight Access Point Connectivity to a WLC
WLC Selection
Lightweight Access Point Operations
Mobility in the Cisco Unified Wireless Network
Intracontroller Roaming
Intercontroller Roaming-Layer 2
Intercontroller Roaming-Layer 3
Mobility Groups
Mobility Group Requirement Example
Recommended Practices for Supporting Roaming
Controller Redundancy Design
Deterministic Controller Redundancy
Dynamic Controller Redundancy
N + 1 Redundancy Design
N + N Redundancy Design
N + N + 1 Redundancy Design
Radio Resource Management (RRM) and RF Groups
RF Grouping
Access Point Self-Healing
Designing Wireless Networks Using Controllers
RF Site Survey
RF Site Survey Process
Design Considerations for Campus Wireless Networks
CAPWAP Access Point Feature Summary
Controller Placement Design
Campus Cisco Wireless LAN Controller Options
Design Considerations for Branch Wireless Networks
Hybrid REAP
Branch Office Cisco Wireless LAN Controller Options
Design Considerations for Guest Services in Wireless Networks
Design Considerations for Outdoor Wireless Networks
Wireless Mesh Components
Mesh Design Recommendations
Review Questions
Answers to Review Questions
Acronyms and Abbreviations
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.