Foreword |
|
xvii | |
Introduction |
|
xviii | |
|
|
3 | (52) |
|
Cisco VoIP Implementations |
|
|
5 | (50) |
|
``Do I Know This Already?'' Quiz |
|
|
5 | (5) |
|
|
10 | (1) |
|
Introduction to VoIP Networks |
|
|
10 | (9) |
|
Benefits of Packet Telephony Networks |
|
|
10 | (1) |
|
Packet Telephony Components |
|
|
11 | (2) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
Distributed Versus Centralized Call Control |
|
|
16 | (3) |
|
Digitizing and Packetizing Voice |
|
|
19 | (8) |
|
Basic Voice Encoding: Converting Analog to Digital |
|
|
19 | (1) |
|
Basic Voice Encoding: Converting Digital to Analog |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
22 | (2) |
|
Compression Bandwidth Requirements and Their Comparative Qualities |
|
|
24 | (1) |
|
Digital Signal Processors |
|
|
25 | (2) |
|
Encapsulating Voice Packets |
|
|
27 | (7) |
|
End-to-End Delivery of Voice |
|
|
27 | (3) |
|
Protocols Used in Voice Encapsulation |
|
|
30 | (2) |
|
|
32 | (2) |
|
|
34 | (8) |
|
Impact of Voice Samples and Packet Size on Bandwidth |
|
|
34 | (3) |
|
|
37 | (1) |
|
Security and Tunneling Overhead |
|
|
37 | (2) |
|
Calculating the Total Bandwidth for a VoIP Call |
|
|
39 | (2) |
|
Effects of VAD on Bandwidth |
|
|
41 | (1) |
|
Implementing VoIP Support in an Enterprise Network |
|
|
42 | (8) |
|
Enterprise Voice Implementations |
|
|
42 | (2) |
|
Voice Gateway Functions on a Cisco Router |
|
|
44 | (1) |
|
Cisco Unified CallManager Functions |
|
|
45 | (1) |
|
Enterprise IP Telephony Deployment Models |
|
|
46 | (1) |
|
|
46 | (1) |
|
Multisite with Centralized Call Processing Model |
|
|
46 | (1) |
|
Multisite with Distributed Call Processing Model |
|
|
47 | (1) |
|
Clustering over WAN Model |
|
|
48 | (1) |
|
Identifying Voice Commands in IOS Configurations |
|
|
48 | (1) |
|
Call Admission Control (CAC) |
|
|
49 | (1) |
|
|
50 | (2) |
|
|
52 | (3) |
|
Part II Quality of Service |
|
|
55 | (174) |
|
|
57 | (36) |
|
``Do I Know This Already?'' Quiz |
|
|
57 | (5) |
|
|
62 | (1) |
|
|
62 | (10) |
|
Converged Network Issues Related to QoS |
|
|
62 | (1) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
66 | (2) |
|
Definition of QoS and the Three Steps to Implementing It |
|
|
68 | (1) |
|
|
69 | (3) |
|
Identifying and Comparing QoS Models |
|
|
72 | (4) |
|
|
72 | (1) |
|
Integrated Services Model |
|
|
73 | (1) |
|
Differentiated Services Model |
|
|
74 | (2) |
|
QoS Implementation Methods |
|
|
76 | (13) |
|
Legacy Command-Line Interface (CLI) |
|
|
76 | (1) |
|
Modular QoS Command-Line Interface (MQC) |
|
|
76 | (3) |
|
|
79 | (2) |
|
Router and Security Device Manager (SDM) QoS Wizard |
|
|
81 | (8) |
|
|
89 | (2) |
|
|
91 | (2) |
|
Classification, Marking, and NBAR |
|
|
93 | (30) |
|
``Do I Know This Already?'' Quiz |
|
|
93 | (4) |
|
|
97 | (1) |
|
Classification and Marking |
|
|
97 | (3) |
|
Layer 2 QoS: CoS on 802.1Q/P Ethernet Frame |
|
|
98 | (1) |
|
Layer 2 QoS: DE and CLP on Frame Relay and ATM (Cells) |
|
|
99 | (1) |
|
Layer 2 1/2 QoS: MPLS EXP Field |
|
|
100 | (1) |
|
The DiffServ Model, Differentiated Services Code Point (DSCP), and Per-Hop Behavior (PHB) |
|
|
100 | (6) |
|
|
102 | (4) |
|
|
106 | (2) |
|
|
108 | (2) |
|
Network Based Application Recognition (NBAR) |
|
|
110 | (2) |
|
Cisco IOS Commands to Configure NBAR |
|
|
112 | (6) |
|
|
118 | (2) |
|
|
120 | (3) |
|
Congestion Management and Queuing |
|
|
123 | (26) |
|
``Do I Know This Already?'' Quiz |
|
|
123 | (4) |
|
|
127 | (1) |
|
Introduction to Congestion Management and Queuing |
|
|
127 | (3) |
|
First-In-First-Out, Priority Queuing, Round-Robin, and Weighted Round-Robin Queuing |
|
|
130 | (2) |
|
|
132 | (6) |
|
WFQ Classification and Scheduling |
|
|
133 | (2) |
|
WFQ Insertion and Drop Policy |
|
|
135 | (1) |
|
Benefits and Drawbacks of WFQ |
|
|
135 | (1) |
|
Configuring and Monitoring WFQ |
|
|
135 | (3) |
|
Class-Based Weighted Fair Queuing |
|
|
138 | (4) |
|
Classification, Scheduling, and Bandwidth Guarantee |
|
|
139 | (1) |
|
Benefits and Drawbacks of CBWFQ |
|
|
140 | (1) |
|
Configuring and Monitoring CBWFQ |
|
|
141 | (1) |
|
|
142 | (4) |
|
|
144 | (1) |
|
Configuring and Monitoring LLQ |
|
|
144 | (2) |
|
|
146 | (1) |
|
|
147 | (2) |
|
Congestion Avoidance, Policing, Shaping, and Link Efficiency Mechanisms |
|
|
149 | (28) |
|
``Do I Know This Already?'' Quiz |
|
|
149 | (4) |
|
|
153 | (1) |
|
|
153 | (10) |
|
Tail Drop and Its Limitations |
|
|
153 | (1) |
|
|
154 | (2) |
|
Weighted Random Early Detection |
|
|
156 | (2) |
|
Class-Based Weighted Random Early Detection |
|
|
158 | (1) |
|
|
158 | (5) |
|
Traffic Shaping and Policing |
|
|
163 | (4) |
|
|
165 | (2) |
|
Cisco IOS Policing and Shaping Mechanisms |
|
|
167 | (1) |
|
Link Efficiency Mechanisms |
|
|
167 | (5) |
|
Layer 2 Payload Compression |
|
|
168 | (1) |
|
|
169 | (2) |
|
Link Fragmentation and Interleaving |
|
|
171 | (1) |
|
Applying Link Efficiency Mechanisms |
|
|
171 | (1) |
|
|
172 | (3) |
|
|
175 | (2) |
|
Implementing QoS Pre-Classify and Deploying End-to-End QoS |
|
|
177 | (24) |
|
``Do I Know This Already?'' Quiz |
|
|
177 | (3) |
|
|
180 | (1) |
|
Implementing QoS Pre-Classify |
|
|
180 | (5) |
|
Virtual Private Networks (VPN) |
|
|
180 | (1) |
|
QoS Pre-Classify Applications |
|
|
181 | (2) |
|
QoS Pre-Classification Deployment Options |
|
|
183 | (2) |
|
|
185 | (9) |
|
QoS Service Level Agreements (SLAs) |
|
|
186 | (2) |
|
Enterprise Campus QoS Implementations |
|
|
188 | (2) |
|
WAN Edge QoS Implementations |
|
|
190 | (2) |
|
Control Plane Policing (CoPP) |
|
|
192 | (2) |
|
|
194 | (4) |
|
|
198 | (3) |
|
|
201 | (28) |
|
``Do I Know This Already?'' Quiz |
|
|
201 | (4) |
|
|
205 | (1) |
|
|
205 | (2) |
|
Implementing and Verifying AutoQoS |
|
|
207 | (8) |
|
Two-Step Deployment of AutoQoS Enterprise on Routers |
|
|
209 | (1) |
|
Deploying AutoQoS VoIP on IOS-Based Catalyst Switches |
|
|
210 | (2) |
|
Verifying AutoQoS on Cisco Routers and IOS-Based Catalyst Switches |
|
|
212 | (3) |
|
AutoQoS Shortcomings and Remedies |
|
|
215 | (7) |
|
Automation with Cisco AutoQoS |
|
|
215 | (3) |
|
|
218 | (1) |
|
Interpreting and Modifying AutoQoS Configurations |
|
|
219 | (3) |
|
|
222 | (5) |
|
|
227 | (2) |
|
|
229 | (90) |
|
Wireless LAN QoS Implementation |
|
|
231 | (24) |
|
``Do I Know This Already?'' Quiz |
|
|
231 | (4) |
|
|
235 | (1) |
|
The Need for Wireless LAN QoS |
|
|
235 | (4) |
|
|
237 | (1) |
|
Split MAC Architecture and Light Weight Access Point |
|
|
238 | (1) |
|
Current Wireless LAN QoS Implementation |
|
|
239 | (4) |
|
Configuring Wireless LAN QoS |
|
|
243 | (4) |
|
|
247 | (5) |
|
|
252 | (3) |
|
Introducing 802.1x and Configuring Encryption and Authentication on Lightweight Access Points |
|
|
255 | (32) |
|
``Do I Know This Already?'' Quiz |
|
|
255 | (3) |
|
|
258 | (1) |
|
Overview of WLAN Security |
|
|
258 | (2) |
|
|
258 | (1) |
|
Evolution of WLAN Security Solutions |
|
|
259 | (1) |
|
802.1x and EAP Authentication Protocols |
|
|
260 | (12) |
|
EAP Authentication Protocols |
|
|
262 | (1) |
|
|
262 | (2) |
|
|
264 | (2) |
|
|
266 | (1) |
|
|
267 | (2) |
|
|
269 | (3) |
|
Configuring Encryption and Authentication on Lightweight Access Points |
|
|
272 | (9) |
|
|
272 | (1) |
|
Static WEP Authentication |
|
|
273 | (1) |
|
|
274 | (2) |
|
|
276 | (2) |
|
|
278 | (3) |
|
|
281 | (4) |
|
|
285 | (2) |
|
|
287 | (32) |
|
``Do I Know This Already?'' Quiz |
|
|
287 | (4) |
|
|
291 | (1) |
|
The Need for WLAN Management |
|
|
291 | (4) |
|
Cisco Unified Wireless Networks |
|
|
291 | (1) |
|
Cisco WLAN Implementation |
|
|
292 | (2) |
|
|
294 | (1) |
|
CiscoWorks Wireless LAN Solution Engine |
|
|
295 | (4) |
|
|
295 | (1) |
|
|
296 | (1) |
|
CiscoWorks WLSE and WLSE Express |
|
|
296 | (1) |
|
Simplified WLSE Express Setup |
|
|
297 | (1) |
|
WLSE Configuration Templates |
|
|
298 | (1) |
|
|
298 | (1) |
|
|
298 | (1) |
|
Cisco Wireless Control System |
|
|
299 | (15) |
|
WCS Location Tracking Options |
|
|
300 | (1) |
|
WCS Base Software Features |
|
|
300 | (1) |
|
WCS Location Software Features |
|
|
301 | (1) |
|
WCS Location + 2700 Series Wireless Location Appliance Features |
|
|
301 | (1) |
|
|
301 | (1) |
|
|
302 | (1) |
|
Cisco WCS System Requirements |
|
|
302 | (1) |
|
|
303 | (1) |
|
Wireless Location Appliance |
|
|
304 | (1) |
|
Wireless Location Appliance Architecture |
|
|
305 | (1) |
|
Wireless Location Appliance Applications |
|
|
305 | (1) |
|
WCS Configuration Examples |
|
|
306 | (1) |
|
|
306 | (1) |
|
Changing the Root Password |
|
|
306 | (1) |
|
Adding a Wireless LAN Controller |
|
|
307 | (1) |
|
Configuring Access Points |
|
|
308 | (1) |
|
|
309 | (1) |
|
|
309 | (1) |
|
|
310 | (2) |
|
Rogue Access Point Detection |
|
|
312 | (1) |
|
Rogue Access Point Alarms |
|
|
312 | (1) |
|
Rogue Access Point Location |
|
|
313 | (1) |
|
|
314 | (3) |
|
|
317 | (2) |
|
|
319 | (35) |
|
Appendix A Answers to the ``Do I Know This Already?'' Quizzes and Q&A Sections |
|
|
321 | (33) |
Index |
|
354 | |