E

E&M (Ear & Mouth) signaling, analog signaling, 491 EAP-FAST (EAP-Flexible Authentication via

Secure Tunneling), UWN, 587 EAP-TLS (EAP-Transport Layer Security), UWN, 587

EAP-TTLS (EAP-Tunneled Transport Layer

Security), UWN, 587 EBGP (External Border Gateway Protocol), 460

echoes echo cancellers, 528-529 echo trails, 529 hybrid transformers, 528 inverse speech, 529 irritation zones, 529 telephones, 528 voice networks, 527-528 ECN (Explicit Congestion Notification), 329-330

E-commerce module (Enterprise

Architecture), 152 Edge Distribution modules, Campus Core layer, 262-263 Edge modules (Enterprise Architecture), 144, 150

E-commerce module, 152 guidelines for, 154

Internet Connectivity module, 152-153 modular voice network design, 180 Remote Access and VPN module, 153 WAN and MAN and Site-to-Site VPN module, 144, 154 Edge networks (Enterprise)

MAN architectures, 343 availability in, 344 Cisco IOS Packaging, 348-352 hardware selection, 348 IP VPN, 346

ISP, 345-346

network growth, support for, 344 network segmentation support, 345 operational complexity, 344 operational expenses, 344 private connectivity migration, costs from, 345 Private WAN, 345 self-deployed MPLS, 346 software selection, 348 SP MPLS, 346 video support, 344 voice support, 344 WAN architecture comparison chart, 346-347 security deployments, 709-711 WAN architectures, 343 availability in, 344 Cisco IOS Packaging, 348-352 hardware selection, 348 IP VPN, 346 ISP, 345-346

MAN architecture comparison chart,

346-347 network growth, support for, 344 network segmentation support, 345 operational complexity, 344 operational expenses, 344 private connectivity migration, costs from, 345 Private WAN, 345 self-deployed MPLS, 346 software selection, 348 SP MPLS, 346 video support, 344 voice support, 344

EGP (Exterior Gateway Protocols), 432-433 EIGRP (Enhanced Interior Gateway Routing Protocol), 420, 434-435 AD, 448

bandwidth usage, 449 characteristics of, 449 convergence, 444, 449 FD, 448

hierarchical routing, 446 multiple network layer protocol support, 449

neighbor tables, 447

routing metrics, 439-440 tables, 448 scalability, 449 selecting, 457 successors current successors, 448 feasible successors, 448 terminology of, 447-448 topology tables, 448 unicast routing protocols, 240 VLSM, 449

EIRP (Effective Isotropic Radiated Power), 570

encapsulation, 9, 849 encryption router performance, effects on, 324 Self-Defending Networks, 692-693 WLAN, UWN, 585-587

endpoints

MGCP, 521

security solutions (integrated security), 705 End-to-End QoS (Quality of Service), 243 Enterprise Architecture, 140

ANS, 183

components of, 184-186 examples of, 184 Enterprise Campus modules, 143, 146 Campus Infrastructure module,

148-149 guidelines for, 150 Server Farm module, 149, 170-172 Enterprise Edge modules, 150 E-commerce module, 152 guidelines for, 154

Internet Connectivity module, 152-153 modular voice network design, 180 Remote Access and VPN module, 153 WAN and MAN and Site-to-Site VPN module, 144, 154 high availability services link redundancy, 175-176 route redundancy, 173-174 Server Farm modules, 170-172 interactive services, 159-161 Remote Enterprise modules

Enterprise Branch modules, 144, 157 Enterprise Data Center modules, 144, 158

Enterprise Teleworker modules, 145, 158

security services external security threats, 166-168 high availability services, 169 internal security, 162-166 Service Provider modules, 155

Frame Relay/ATM module, 156-157 Internet Service Provider module, 156 PSTN module, 156 voice services evaluating data infrastructures, 181

IP telephony, 177-178

voice network design in modular networks, 179-180 VoIP, 177 wireless services, 181-183 Enterprise Branch module (Enterprise

Architecture), 144, 157 Enterprise Branch networks, WAN architectures, 353-355

large branch office design, 361-362 medium branch office design, 360 small branch office design, 356-358

Enterprise Campus modules (Enterprise Architecture), 143, 146

Campus Infrastructure module

Building Access layer, 148, 179 Building Distribution layer, 148, 179 Campus Core layer, 149, 180 Server Farm module, 180 guidelines for, 150 Server Farm module, 149, 170-172 Enterprise Campus networks building access layer, 246-247 PAgP management, 252 routing, 252

STP management, 248-250 trunk management, 251 VLAN management, 247 VLAN support, 257 building distribution layer, 253 convergence, 256

deploying Layer 3 routing protocols to

Campus Core switches, 255-256 infrastructure services, 254 performance, 253

redundancy, 253-255 VLAN support on building access layer switches, 257 Campus Core layer, 257-258

deploying Layer 3 routing protocols to building distribution switches, 255-256

Edge Distribution module, 262-263 large campus designs, 259-260 medium campus designs, 260-261 multilayer switches, 260 small campus designs, 260-261 environmental characteristics, 221 network geography, 228-230 transmission media, 230-235 infrastructure device characteristics, 222, 235-236

Cisco Express Forwarding, 238 convergence times, 236 IP multicast, 239-241 load sharing, 244-245 MLS, 237

QoS in LAN switches, 241-244 network application characteristics, 221 application requirements, 227 client-Enterprise Edge applications, 226

client-local server applications,

223-224

client-server farm applications,

224-225 connectivity, 227 high availability, 228 peer-peer applications, 222-223 throughput, 227

total network costs, 228 requirements for, 246 security deployments, 706-707 server placement building access switches, 264 building distribution switches, 264 Campus Core switches, 264 connectivity options, 267 Server Farm modules, 264-267 switch performance, 267

Enterprise Data Center module (Enterprise

Architecture), 144, 158 Enterprise Data Center networks, 268

architecture framework, 269-272 cooling, 276

Data Center Access layer, 274 Data Center Aggregation layer, 274-275 Data Center Core layer, 275 Interactive Services layer, 270 Networked Infrastructure layer, 270 power, 276

security deployments, 708 server density, 276 server scalability, 276 Enterprise Edge modules (Enterprise Architecture), 150

client-Enterprise Edge applications, Enterprise Campus networks, 226 E-commerce module, 152 guidelines for, 154

Internet Connectivity module, 152-153 modular voice network design, 180 Remote Access and VPN module, 153 routing, enterprise architecture deployments, 464 WAN and MAN and Site-to-Site VPN module, 144, 154 Enterprise Edge networks

MAN architectures, 343 availability in, 344 Cisco IOS Packaging, 348-352 hardware selection, 348 IP VPN, 346 ISP, 345-346

network growth, support for, 344 network segmentation support, 345 operational complexity, 344 operational expenses, 344 private connectivity migration, costs from, 345 Private WAN, 345 self-deployed MPLS, 346 software selection, 348 SP MPLS, 346 video support, 344 voice support, 344 WAN architecture comparison chart, 346-347 security deployments, 709-711 WAN architectures, 343 availability in, 344 Cisco IOS Packaging, 348-352 hardware selection, 348 IP VPN, 346 ISP, 345-346

MAN architecture comparison chart,

346-347 network growth, support for, 344 network segmentation support, 345 operational complexity, 344 operational expenses, 344 private connectivity migration, costs from, 345 Private WAN, 345 self-deployed MPLS, 346 software selection, 348 SP MPLS, 346 video support, 344 voice support, 344

Enterprise networks creating, guidelines for, 145 evolution of, 140 Enterprise Teleworker module (Enterprise

Architecture), 145, 158 Enterprise Teleworker networks, WAN

architectures, 353-354, 362-364 ePing tests, mobility groups, 608 Erlang tables BHT, 547

voice traffic engineering, 547-548 examples of, 549-550 off-net calls cost calculation example, 551

trunk capacity calculation example, 550

Ethernet

802.3 Ethernet LAN versus 802.11 WLAN,

576-577 Metro Ethernet, 304, 315 PPPoE, ADSL, 307

expectational acknowledgements, 22 extended access lists, verifying configuration, 842

extended ACL (Access Control Lists)

configuring, 830-839 established keyword, 834 placement of, 839 processing flow, 830

extending classful addresses with subnet masks, 815-816

Application layer attacks, 166-167 DoS attacks, 166-168 IP spoofing, 166 password attacks, 166 Extranet VPN, WAN design, 334

Was this article helpful?

0 0

Post a comment