|
|
IBM NetView, 637, 674
IEEE 802 service model, 587–91
IEEE 802.1p, 588–91
admission control and, 590
GMRP multicast filtering, 588
interoperability and, 591
issues, 590–91
tag header, 588
traffic class expediting, 588
IEEE 802.3, 591
IEEE 802.5, 591–93
IEEE 802.1Q 588–90
IEEE 802.12, 594–95
defined, 594
frame format support, 595
UPV mapping, 595
Impersonation, 307
In-band management, 677–78
Information
collating, 11–12
database, building, 11
gathering, 10–12
on existing site, 12
on greenfield site, 11–12
Input queuing, 232
Institute of Electrical and Electronics Engineers (IEEE), 16
Integrated bridge router, 44–45
Integrated Services (IS), 562, 598–617, 629
admission control, 599
best-offer support, 617
controlled load service, 602–3
defined, 598
design considerations, 616–17
flows, 601–2
guaranteed service, 598, 603–4
implementation model, 598–601
model, 555
model illustration, 600
packet classifier, 600
packet scheduler, 600
performance, 617
predictive service, 598
pricing model, 616
real-time applications, 617
RSVP, 598–99, 604–16
scalability, 616
service classes, 602–4
traffic shaping, 602
Integrity, 306
Interception techniques, 454–55
Interdomain routing, 287–89
Interface modules, 229–30
Interior Gateway Protocols (IGPs), 157, 159, 572
choosing, 174–77
feature comparison, 174
multiple, 222
selection considerations, 175
selection flowchart, 176
Intermediate systems (IS), 46–47
Internal BGP (iBGP), 208, 209, 210–11
defined, 210
routers, 209
use of, 210
See also Border Gateway Protocol (BGP)
Internal meshing, 423–24
Internal Router (IR), 195
International Organization for Standardization. See ISO
International Telecommunications Union, Telecommunications Sector (ITU-T), 16
Internet Advisory Board (IAB), 15–16
Internet Assigned Numbers Authority (IANA), 66, 67
allocation policies, 71
authority, 68–69
defined, 68
hierarchy of assignment, 69
responsibility, 71
Internet Control Message Protocol (ICMP), 31–32, 102–5
defined, 31, 102
echo interaction, 447
ICMPv4, 103–4
ICMPv6, 104–5
implementation, 102
protocol packet exchanges, 104
redirects, 105, 447
Router Discovery Protocol (IRDP), 217
use, 31
vulnerabilities, 308
Internet Engineering Task Force (IETF), 239
Internet Group Management Protocol (IGMP), 239
building group membership tables, 260–61
defined, 256
field definitions, 256–57
group registration with, 256–64
IGMPvl device compatibility, 263–64
joining multicast group, 261
leaving multicast group, 261–62
local group database, 267
message format, 257–58
multicast distribution, 262–63
multicast router running, 258
operation, 258–64
querier election process, 260
snooping, 248–49
timers, 258–59
Internet Inter-ORB Protocol (IIOP), 24
Internet Key Exchange Protocol (IKE), 371–76
automated negotiation of SAs, 371
digital signatures, 372–73
framework, 371
initializing SAs with, 373–74
ISAKMP vs., 371
operation, 372–75
performance issues, 375
Phase 1, 373–74
Phase 2, 375
preshared keys, 372
with remote access, 376
Internet Key Management Protocol (IKMP), 371
Internet Layer (TCP/IP protocol suite), 30–32
Address Resolution Protocol (ARP), 31
defined, 30
Internet Control Message Protocol (ICMP), 31–32
Internet Protocol (IP), 30–31
Internet Protocol (IP), 30–31
load balancers, 513
MTU, 540
vulnerabilities, 308
See also IP addresses; IP addressing; IPv4; IPv6
Internetwork architecture, 156–61
hierarchical model benefits, 160–61
model, 156–57
network hierarchy, 157–58
router hierarchy, 158–60
Interoperability, 282–87
ATM, 626
CBR, 626–27
CBT, 283
DVMRP, 283
IEEE 802.1p and, 591
MOSPF, 282
PIM, 282
RSVP with, 625–26
Interprocess communication (IPC) facility, 23
Intrusion Detection Systems (IDSs), 348–49
defined, 348
deployment, 348–49
examples, 349
honeypots/burglar alarms, 349
See also Security
Intrusive load-sharing algorithms, 506–7
IP addresses (official), 68–73
allocation guidelines, 71–73
depletion, 69–71
obtaining, 68–69
regional registries, 69
IP addressing, 59–82
ASNs, 81–82
broadcast classes, 64–66
implementation, 59–60
IPng, 74–81
IPv4, 60–64
multicast group addresses, 66–68
official address space, 68–73
private intranet addressing, 73–74
IP address space, 68
IP forward decision, 169–71
forwarding algorithm, 169–71
route lookup, 171
IP Next Generation (IPng). See IPv6
IP protocol suite. See TCP/IP protocol suite
IPSec, 326, 338, 356–80
applications, 376–77
Authentication Header (AH), 362–65
automatic key management, 357
concepts and terminology, 358–62
databases, 360
defined, 356
design considerations, 376–80
development strength, 357
DS with, 626
Encapsulating Security Payload (ESP), 366–69
end-to-end host security design, 377, 378
end-to-end security with VPN support design, 379, 380
example designs, 377–80
framework components, 358
IKE, 371–76
implementation formats, 357–58
network administrator and, 257
protocols, combining, 369–71
remote access design, 379–80
Security Association (SA), 358–59
Security Association (SA) components, 359–60
support, 356
transforms, 367
transport mode, 360–61
tunnel mode, 361
VPN support design, 377–79
See also Security
IP spoofing, 314
IP switching
defined, 557
flows and, 557–59
operation, 558
IPv4
QoS-related fields, 561
Type of Service (ToS), 560
See also Internet Protocol (IP)
IPv4 addresses, 59, 60–64
Class A, 61, 63
Class B, 61, 63, 70
Class C, 61–62, 63, 70–71, 72
Class D, 62
Class E, 62
classes, 60–64
format, 61
masks, 62–63
prefixes, 62–63
ranges, 63
special and reserved, 64
IPv5, 74–75
IPv6, 74–81
address format, 78
addressing model, 76–80
address type representation, 78–80
anycast addresses, 77
Class of Service (CoS) model, 561–62
defined, 74
design, 75
field definitions, 76
header, 75
loopback address, 77
message format, 75–76
migration to, 80–81
multicast addresses, 77
performance, 80
QoS-related fields, 561
unicast address, 77
unspecified address, 77
See also Internet Protocol (IP)
IS-IS, 175, 176
ISO
defined, 15
OSI reference model, 17–19
|
|