T

talker overlap, 521

tariffs, WAN, 293, 315

TCP (Transfer Control Protocol), 18

acknowledgements, 22

expectational acknowledgements, 22

headers, 20

port numbers, 835

segment fields, 19

selective ACK, 325

sequencing, 22

three-way handshakes, 21-22

windowing, 22

TCP/IP protocol suite, 6

application layer, 17 data link layer, 17-18, 27 Internet layer, 17-18

IP datagrams, 25-26 protocols, 25

transmission media, Enterprise Campus networks

network interface layer, 17 physical layer, 17-18 transport layer, 17

port numbers, 20-21 TCP, 18-23 UDP, 18-20

TDM (Time-Division Multiplexing), 299-300, 482

technical constraints (network design methodologies), 81-82 technical goals (network design methodologies), 80-81 telephone lines, voice networks, 488 telephone signaling address signaling, 491 analog signaling, 491 digital signaling CAS, 492 CCS, 492 DPNSS, 492 ISDN, 493 QSIG, 494 SS7, 494-495 echoes, 528

informational signaling, 491 local-loop signaling, 490 supervision signaling, 490 trunk signaling, 490 telephony (IP), 177-178

call-process managers, 178 call processing, 508, 511-514 design goals, 509-510 Enterprise Campus networks, 223 infrastructures, 508 inline power switches, 178 IP phones, 178 multisite WAN

centralized call processing designs, 511-512

distributed call processing designs, 513-514 single site designs, 510 voice gateways, 178 Teleworker networks (Enterprise), WAN

architectures, 353-354, 362-364 terminals, H.323, 504 Test step (network security policies), 668 Threat Defense System (Self-Defending Networks)

infrastructure protection, 686-688 physical security, 683-685 threat detection/mitigation, 688-690

threat detection/mitigation, Self-Defending

Networks, 688-690 three-way handshakes, 21-22 throughput

Enterprise Campus networks, 227 WAN design, 318 tie trunks, voice networks, 488 time estimates (network characterization), network design methodologies, 105-107 token buckets, 331 tokens (security), 166, 676 top-down design (network design methodologies), 107

bottom-up design versus, 108 decison tables, 110-111 documentation, 116 example of, 108-109 network design tools, 114 pilot networks, 115 prototype networks, 115 structured design, 112-113

topology tables, EIGRP, 448 totally stubby areas, OSPF, 452 traffic analysis, network design methodologies, 95 NBAR, 96-98 NetFlow, 96-100 third-party software, 97, 101

traffic engineering (MPLS), 303 traffic policing (bandwidth)

voice networks, 539 WAN design, 330-331

traffic shaping (bandwidth) token buckets, 331 voice networks, 539 WAN design, 330-331

trailers, 849

Transactional Data class (QoS), 358 transformers (hybrid), echoes, 528 transit areas, OSPF, 452 transmission confidentiality, Self-Defending

Networks, 693-695 transmission media, Enterprise Campus networks, 230

cabling example, 234-235 comparison table, 233-234

copper cabling, 231 multimode fiber cabling, 232 optical fiber cabling, 232 wireless cabling, 232 transmit queues. See hardware queues transparent mode (VTP), 251 transport layer

acknowledgements, 22 expectational acknowledgements, 22 four-way handshakes, 23 headers, 20 segment fields, 19 sequencing, 22 three-way handshakes, 21-22 windowing, 22 TCP/IP protocol suite, 17-21 UDP, 18

headers, 20 segment fields, 19

triggered updates, 435 Trojan horses, 653 troubleshooting NAT, 868 trunks capacity, voice traffic engineering, 552 DTP, 251

Enterprise Campus networks, managing in,

251 ports, 251

prefixes (PSTN numbering plans), 497 signaling, 490 VLAN, 49

voice networks, 488-489 trust, Self-Defending Networks, 672-673 tunneling (Layer 3), WAN backups, 341-343 two-factor authentication, Self-Defending

Networks, 676 two-way route redistribution, 467 TxQ (Transmit Queues). See hardware queues

Was this article helpful?

0 0

Post a comment