Skip to:Content
|
Bottom
Cover image for LANs to WANs : the complete management guide
Title:
LANs to WANs : the complete management guide
Personal Author:
Series:
Artech House telecommunications library
Publication Information:
Norwood, Mass. : Artech House, 2003
ISBN:
9781580535724

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000004302778 TK5105.5 M844 2003 Open Access Book Book
Searching...

On Order

Summary

Summary

Empowered by today's high-performance computers interconnected over LANs and WANs, companies are faced with the daunting task of bringing workability to the diversity and complexity of today's data communications landscape. This comprehensive resource addresses key network management challenges, showing how to: tie together incompatible LANs; meld legacy systems and LANs; extend the reach of LANs with wireless links; protect information assets from various disaster scenarios; and consolidate multi-protocol traffic over a single WAN backbone in a way that guarantees appropriate service levels.


Author Notes

Nathan J. Muller holds an M.A. in Social and Organizational behavior from George Washington University.

Muller is a managing partner and consultant at the Ascent Solutions Group, LLC in Sterling, VA. He is also the author of IP Convergence: The Next Revolution in Telecommunications, Wireless Data Networking, and Intelligent Hubs (Artech House, 2000, 1999, 1995, 1994). He has 27 years of industry experience. He is the author of 15 books, including Desktop Encyclopedia of the Internet (Artech House, 1998) and over 1,500 published articles. He serves on the editorial board for the International Journal of Network Management.

050


Table of Contents

Prefacep. xvii
Chapter 1 Local Area Networksp. 1
1.1 Introductionp. 1
1.2 Ethernetp. 2
1.2.1 Frame Formatp. 2
1.2.2 Media Access Controlp. 4
1.3 10BaseTp. 6
1.3.1 Performancep. 6
1.3.2 Mediap. 7
1.3.3 Media Connectionsp. 7
1.3.4 Hubsp. 8
1.3.5 Managementp. 9
1.4 Fast Ethernetp. 10
1.4.1 Compatibilityp. 10
1.4.2 Media Choicesp. 10
1.5 Gigabit Ethernetp. 11
1.6 Token Ringp. 13
1.6.1 Advantages of Token Ringp. 14
1.6.2 Frame Formatp. 15
1.6.3 Operationp. 16
1.6.4 Dedicated Token Ringp. 17
1.6.5 High-Speed Token Ringp. 17
1.7 Other LANsp. 18
1.7.1 ARCnetp. 19
1.7.2 StarLANp. 20
1.7.3 Fiber Distributed Data Interfacep. 21
1.8 Conclusionp. 27
Chapter 2 LAN Administrationp. 29
2.1 Introductionp. 29
2.2 Console and Agentsp. 29
2.2.1 Intelligent Agentsp. 31
2.2.2 Agent Behaviorp. 32
2.2.3 Agent Applicationsp. 34
2.3 Automating Software Distributionp. 39
2.4 Monitoring File Usep. 41
2.5 Virus Scanningp. 41
2.6 Printer Managementp. 42
2.7 Storage Managementp. 43
2.7.1 Monitoring Disk Usep. 43
2.7.2 Hierarchical Storage Managementp. 44
2.7.3 Storage Area Networksp. 45
2.7.4 Outsourcing Storage Managementp. 46
2.8 Reporting Bindery Datap. 47
2.9 Process Schedulingp. 48
2.10 Console Text Viewerp. 49
2.11 Tracking Network Activityp. 50
2.12 Integrated Help Deskp. 52
2.13 Conclusionp. 53
Chapter 3 LAN Restoration Planningp. 55
3.1 Introductionp. 55
3.2 Network Reliabilityp. 55
3.2.1 Star Topologyp. 55
3.2.2 Ring Topologyp. 56
3.2.3 Bus Topologyp. 56
3.3 Network Availabilityp. 57
3.4 Recovery Optionsp. 58
3.5 Server Restoration Capabilitiesp. 60
3.6 Data Protectionp. 62
3.6.1 Hardware Solutionsp. 62
3.6.2 Software Solutionsp. 63
3.6.3 Redundant Arrays of Inexpensive Disksp. 65
3.6.4 Server Bladesp. 67
3.6.5 Automated Operationsp. 68
3.6.6 Off-Site Data Storagep. 69
3.7 Servers on the WANp. 70
3.7.1 Load Balancingp. 70
3.7.2 Cachingp. 71
3.7.3 Queuingp. 72
3.8 Storage Area Networksp. 73
3.9 Other Considerationsp. 73
3.9.1 Uninterruptible Power Suppliesp. 73
3.9.2 Generatorsp. 74
3.9.3 Surge Suppressorsp. 74
3.9.4 Spare Parts Poolingp. 74
3.10 Conclusionp. 75
Chapter 4 Storage Network Managementp. 77
4.1 Introductionp. 77
4.2 Storage Area Networksp. 79
4.2.1 SAN Advantagesp. 79
4.2.2 SAN Evolutionp. 81
4.2.3 SAN Componentsp. 84
4.2.4 Role of Hubs and Switchesp. 85
4.2.5 Zoningp. 86
4.2.6 Securityp. 87
4.2.7 SAN Managementp. 88
4.2.8 Management Interoperabilityp. 92
4.3 Emerging Role of IPp. 92
4.4 Storage Virtualizationp. 94
4.5 Testingp. 96
4.6 Conclusionp. 96
Chapter 5 Managing Bridges, Routers, Gatewaysp. 99
5.1 Introductionp. 99
5.2 Bridgesp. 100
5.2.1 Transparent Bridgingp. 102
5.2.2 Source-Route Bridgingp. 103
5.2.3 Translation Bridgingp. 103
5.2.4 Source-Route Tranlation Bridgingp. 105
5.3 Routersp. 106
5.3.1 Types of Routingp. 107
5.3.2 Types of Routersp. 108
5.3.3 Routing Protocolsp. 109
5.4 Gatewaysp. 116
5.4.1 Gateway Applicationsp. 117
5.4.2 Facilitative Protocolsp. 119
5.5 Conclusionp. 124
Chapter 6 Managing the Wireless Infrastructurep. 127
6.1 Introductionp. 127
6.2 Configuration Detailsp. 130
6.3 Mobile IPp. 136
6.4 Spanning Tree Protocolp. 138
6.5 Performance Monitoringp. 142
6.6 Applying Filtersp. 144
6.7 Logsp. 147
6.8 Setting SNMP Trapsp. 147
6.9 Conclusionp. 148
Chapter 7 Managing Voice Systemsp. 149
7.1 Introductionp. 149
7.2 Historical Perspectivep. 149
7.3 PBX Componentsp. 152
7.3.1 Central Processorp. 153
7.3.2 Memoryp. 153
7.3.3 Matrixp. 153
7.4 Centralized Versus Distributed Systemsp. 156
7.5 Virtual Networksp. 158
7.5.1 Advantages of VPNsp. 159
7.5.2 VPN Architecturep. 160
7.5.3 VPN Featuresp. 161
7.5.4 Billing Optionsp. 162
7.5.5 Network Managementp. 163
7.5.6 Local VPN Servicep. 164
7.6 Call Detail Reportingp. 164
7.6.1 Benefitsp. 165
7.6.2 Operationp. 165
7.6.3 Call Detail Recordsp. 167
7.6.4 Call Costingp. 168
7.6.5 Outsourcingp. 169
7.6.6 Web-Based Reportingp. 169
7.7 IP PBXsp. 170
7.7.1 Administrationp. 170
7.7.2 Managed Servicesp. 172
7.8 Wireless PBX Systemsp. 172
7.8.1 Applicationsp. 173
7.8.2 System Componentsp. 173
7.8.3 Call Handoff Scenariop. 176
7.9 Centrexp. 177
7.9.1 Centrex Featuresp. 178
7.9.2 Customer Premises Equipmentp. 178
7.9.3 IP Centrexp. 179
7.10 Conclusionp. 181
Chapter 8 Managing the TDM Infrastructurep. 183
8.1 Introductionp. 183
8.2 Multiplexersp. 184
8.2.1 Time Division Multiplexersp. 185
8.2.2 Statistical Time Division Multiplexingp. 185
8.2.3 Points of Differentiationp. 187
8.3 The Backbone Networkp. 191
8.3.1 Private Networkingp. 191
8.3.2 Public Networkingp. 192
8.4 Public and Private Network Interoperabilityp. 193
8.5 Voice Compressionp. 194
8.6 Data Supportp. 195
8.7 Clear Channel Capabilityp. 195
8.8 ISDNp. 196
8.9 Role of Digital Cross-Connect Systemsp. 198
8.9.1 Customer-Controlled Reconfigurationp. 199
8.9.2 Selecting a Carrier-Provided Servicep. 202
8.9.3 Implementing a DCS Networkp. 204
8.10 Conclusionp. 205
Chapter 9 Managing Link Performance with CSU-DSUsp. 207
9.1 Introductionp. 207
9.2 Digital Data Servicesp. 208
9.3 CSU Functionalityp. 209
9.3.1 Clear Channel Capabilityp. 212
9.3.2 Diagnosticsp. 213
9.3.3 Circuit Maintenancep. 214
9.3.4 Impairment Testingp. 216
9.4 Carrier Testing Servicesp. 216
9.5 User-Controlled Diagnosticsp. 217
9.6 Fractional T1p. 218
9.7 Integrated Solutionsp. 218
9.8 Integral Protocol Analyzersp. 220
9.9 SNMP for Managementp. 221
9.10 Disaster Recoveryp. 221
9.11 Service-Level Managementp. 222
9.12 Conclusionp. 224
Chapter 10 Managing High-Speed Packet Networksp. 225
10.1 Introductionp. 225
10.2 Frame Relayp. 225
10.2.1 Advantages of Frame Relayp. 226
10.2.2 Types of Circuitsp. 227
10.2.3 Congestion Controlp. 228
10.2.4 Frame Relay Chargesp. 229
10.2.5 Voice over Frame Relayp. 230
10.3 Asynchronous Transfer Modep. 231
10.3.1 Applicationsp. 231
10.3.2 Quality of Servicep. 232
10.3.3 Virtual Circuitsp. 234
10.3.4 ATM Layersp. 236
10.3.5 Inverse Multiplexing over ATMp. 236
10.4 IP Networksp. 239
10.4.1 Operating Characteristicsp. 240
10.4.2 Addressingp. 241
10.4.3 Services on the Internetp. 242
10.4.4 Managementp. 243
10.4.5 Intranets and Extranetsp. 243
10.5 Conclusionp. 253
Chapter 11 Network Management Systemsp. 255
11.1 Introductionp. 255
11.2 Management System Evolutionp. 256
11.3 Management in the Wired Worldp. 257
11.4 The Mechanics of SNMPp. 258
11.4.1 Management Stationp. 259
11.4.2 Management Agentsp. 260
11.4.3 Management Information Basep. 261
11.4.4 Remote Network Monitorp. 263
11.4.5 RMON2p. 267
11.5 Graphical SNMP Toolsp. 269
11.6 SNMP on Wireless Networksp. 270
11.6.1 Performance of SNMPp. 270
11.6.2 Platform Support for Wirelessp. 271
11.7 Telecommunications Management Networkp. 273
11.7.1 Benefits of TMNp. 274
11.7.2 Standardsp. 274
11.7.3 Functional Architecturep. 275
11.7.4 Physical Architecturep. 275
11.8 Open Source Management Toolsp. 277
11.8.1 Sample Toolsp. 278
11.8.2 Risk Factorsp. 283
11.9 Conclusionp. 284
Chapter 12 Managing Service Qualityp. 285
12.1 Introductionp. 285
12.2 Role of ATMp. 285
12.3 Adding QoS to Frame and IPp. 287
12.4 Policy-Based QoS Managementp. 288
12.5 Software Solutionsp. 290
12.6 Hardware Solutionsp. 293
12.7 Service Level Agreementsp. 296
12.7.1 Performance Metricsp. 297
12.7.2 SLA Compliancep. 298
12.8 Conclusionp. 299
Chapter 13 Managing Network Securityp. 301
13.1 Introductionp. 301
13.2 Threat Assessmentp. 301
13.3 Securing the Workplacep. 302
13.4 Securing the Networkp. 303
13.4.1 User Names and Passwordsp. 304
13.4.2 Single-Point Logonp. 305
13.4.3 Key and Card Systemsp. 305
13.4.4 Biometricsp. 306
13.4.5 Disk and Drive Controlsp. 309
13.5 Data Encryptionp. 310
13.5.1 Symmetric Versus Asymmetricp. 311
13.5.2 Digital Encryption Standardp. 311
13.5.3 Recommendations for Implementing Encryptionp. 312
13.5.4 Encryption Deployment Issuesp. 316
13.6 Virus Protectionp. 318
13.7 Firewallsp. 320
13.8 Intrusion Detection Systemsp. 326
13.9 Remote Access Securityp. 327
13.9.1 Security Measuresp. 327
13.9.2 Callback Security Systemsp. 328
13.9.3 Link Level Protocolsp. 329
13.10 Policy-Based Securityp. 330
13.11 Network Management System Securityp. 331
13.12 Security Personnelp. 332
13.13 Security Trainingp. 334
13.14 Conclusionp. 334
Chapter 14 Network Planning and Design Toolsp. 337
14.1 Introductionp. 337
14.2 Network Documentation Toolsp. 338
14.3 Network Design Toolsp. 342
14.4 Network-Specific Toolsp. 346
14.4.1 Designing IP Netsp. 347
14.4.2 Designing Wireless Netsp. 348
14.4.3 Predicting Network Performancep. 350
14.5 Systems Designp. 352
14.6 Conclusionp. 355
Chapter 15 WAN Restoration Planningp. 357
15.1 Introductionp. 357
15.2 Redundant Carrier Systemsp. 357
15.2.1 Switching Systemsp. 358
15.2.2 Signal Transfer Pointsp. 358
15.2.3 Network Control Pointsp. 359
15.2.4 Digital Interface Framesp. 359
15.2.5 Power Systemsp. 359
15.2.6 Cable, Building, and Signaling Diversityp. 360
15.2.7 Real-Time Network Routingp. 360
15.3 Carrier Restoration Servicesp. 361
15.4 Fiber Network Restorationp. 362
15.5 Packet Data Network Recoveryp. 365
15.6 LEC Restoration Servicesp. 366
15.7 Competitive Access Providersp. 368
15.8 T1 Restorationp. 369
15.8.1 T1 Backup Via ISDNp. 369
15.8.2 Automatic Routing and Reroutingp. 370
15.8.3 Dial Backupp. 371
15.8.4 Network Modelingp. 372
15.8.5 Inverse Multiplexingp. 373
15.9 DDS Dial Backupp. 373
15.10 Intelligent Calling Systemsp. 375
15.11 Dial Backup Unitsp. 376
15.12 Satellite-Based Restorationp. 376
15.13 LAN Internetsp. 377
15.14 Conclusionp. 379
Chapter 16 Maintenance and Support Servicesp. 381
16.1 Introductionp. 381
16.2 Do-It-Yourself Approachp. 382
16.2.1 Resource Requirementsp. 384
16.2.2 User Supportp. 384
16.2.3 Technical Supportp. 388
16.2.4 Operations Managementp. 389
16.3 Reporting Requirementsp. 390
16.4 Equipment Requirementsp. 391
16.4.1 Spares Inventoryp. 392
16.4.2 Test Equipmentp. 392
16.4.3 Service and Repair Documentationp. 393
16.5 Vendor and Carrier Servicesp. 394
16.6 Maintenance Firmsp. 395
16.7 Cooperative Maintenance Programsp. 396
16.8 Cabling Considerationsp. 397
16.8.1 Premises Wiringp. 397
16.8.2 Cable Plant as an Assetp. 398
16.8.3 Cable Planningp. 399
16.8.4 Wireless Extensionp. 400
16.9 Operating Systemsp. 401
16.10 Conclusionp. 402
Acronymsp. 405
About the Authorp. 423
Indexp. 425
Go to:Top of Page