|
|
Cable plans, 13
Cache servers
access network concentrators, 532
in default router, 530–31
deployment, 528–29
deployment location, 529–33
deployment options, 530
international gateway, 532
in Layer 4 switches, 531
nontransparent, 528–29
perimeter gateways, 532
satellite interfaces, 532
semitransparent, 529
transparent, 529
WCCP, 531
Web Hosting/Reverse Proxy Configuration, 531–32
Caching
applications benefiting from, 525–28
basics, 523
capacity planning, 533–35
capacity/responsiveness and, 524
content optimization and, 523–24
defined, 523
DNS, 117, 120
hit ratio, 534
in internetwork, 528–33
management/control and, 524–25
measurement techniques, 535
performance metrics, 534–35
products, 535
reliability/availability and, 524
response time, 534
scalability and, 523, 525
synchronization and, 524
system design issues, 523–25
techniques, 522–35
Capacity planning, 533–35
Capture group, 660
Centralized model, 21–22
Certificate Authorities (CAs), 324–25
Certificate Repositories (CRs), 325
Certificate Revocation Lists (CRLs), 325–26
Challenge Handshake Authentication Protocol (CHAP), 330–31
Channel Service Units (CSUs), 40–41
Christmas tree, 316
Circuit switching
defined, 52
packet switching vs., 52–53
Cisco Group Membership Protocol (CGMP), 249
Class-Based Queuing (CBQ), 497–99, 565
defined, 497–98
effects, 498
with RSVP, 498
strengths, 499
Classless InterDomain Routing (CIDR), 145–48
BGP-4 support, 213
defined, 145–46
implementation, 147–48
policies/guidelines, 146–47
process, 145
route summarization and, 222
service provider types, 147–48
Client/server model, 22–23
applications in, 22–23
defined, 22
workgroup productivity, 22
Clustering, 439–42
defined, 441, 442
software, 441–42
techniques, 441
VRRP, 442
with Web Cache Control Protocol (WCCP), 531
CMIP/CMIS, 637, 661–67, 707
advantages, 666
applications, 662–63
architecture, 662–64
ASN.1, 665
background, 661–62
COTS, 662, 664
defined, 661–62
design, 662
disadvantages, 666–67
implementations, 662
performance, 666
primitives, 664–65
protocols, 664
See also Network management
Command-Line Interface (CLI), 668
Comma Separated Value (CSV) format, 698
Common Management Information Protocol/ Common Management Information Service. See CMIP/CMIS
Common Management Services and Protocol over LAN (CMOL), 664
Common Management Services and Protocol over TCP/IP (CMOT), 664
Common Object Request Broker Architecture (CORBA), 23, 24
Common Open Policy Service (COPS) protocol, 705
Component-level availability, 456–64
backplane design, 457–58
boot/configuration data, 463
disk mirroring, 458–59
hot swap, 458
RAID, 459–60
reliable power, 460–63
standby modules and spares, 463–64
techniques, 456
Compression
design guidelines, 486–87
disk, 542–43
hardware, 486
ITU-T fax, 484
Lempel-Ziv (LZ), 483
MNP, 484
MRU and, 485, 486
in networking, 483–85
proprietary header, 485
ratio, 483
RLE, 483–84
software, 486
Stac LZS, 485–86
TCP header, 484
techniques, 482–87
Computing models, 21–24
centralized, 21–22
client/server, 22–23
decentralized, 22
distributed, 22, 23–24
Confidentiality, 306
Configuration management, 667–70
automation/integration need, 668–69
defined, 635
large-scale, 670
operations, 667
planning and administration, 667
in practice, 667
scalability and, 667
Web-based, 669–70
See also Network management
Configuration scripts, 14
Congestion
control, 295
defined, 523
Congestion avoidance, 499–502
RED gateways, 500–502
taildrop, 500
techniques, 499–500
Connection-Oriented Transport Service (COTS), 662, 664
Connectivity, 50–53
methods, 50–51
switching, 52–53
Conservation law, 487–88
Constraint-Based Routing (CBR), 578–82
defined, 574, 578
with DiffServ, 626
implementation, 578, 581
interoperability with, 626–27
issues, 578
with MPLS, 627
route optimization, 580–82
routing algorithms, 580
routing granularity, 579
routing table structure/size, 580
with RSVP, 626–27
Spanning Trees, 579
summary, 628
topological state information and, 579–80
viable flow path, 581
Controlled load service, 602–3
Core-Based Trees (CBT), 281–82
defined, 281
design issues, 282
example topology, 282
interoperability, 283
operation, 281–82
See also Multicast routing
Cost(s)
of downtime, 394–95, 396
network, exploring, 9
path, 474
port, reducing, 226
Crossbar fabric, 230–31
Cryptography, 320–22
asymmetric, 321
Diffie-Helman (D-H) model, 321
encryption algorithms, 321–22
secret-key, 320
Custom queuing, 495–96
defined, 495
illustrated, 495
uses, 496
|
|