关于Software Sizing Modle

yczhu 2001-11-16 04:03:36
最近看了一篇Lockheed的资料,提到了SSM(Software Sizing Modle)的四个输入参数PAIRWISE,PERT ,RANKING,SORTING,谁能告诉我是什么意思?
谁知道Subject Estimate除了Pair Comparison还有什么常用方法?
多谢
请与我联系yzhu@safepro.buaa.edu.cn

...全文
117 5 打赏 收藏 转发到动态 举报
写回复
用AI写文章
5 条回复
切换为时间正序
请发表友善的回复…
发表回复
yoboo_yb 2001-11-26
  • 打赏
  • 举报
回复
为什么没人解答呢?我也不会!
yczhu 2001-11-24
  • 打赏
  • 举报
回复
来着有分
yczhu 2001-11-21
  • 打赏
  • 举报
回复
ok idea:
yczhu 2001-11-19
  • 打赏
  • 举报
回复
谁知道ad hoc method是什么意思
yoboo_yb 2001-11-17
  • 打赏
  • 举报
回复
我也想知道!
pdf电子书 出版社: Auerbach Publications (2013年12月9日) 语种: 英语 ISBN: 1466560959 目录 Introduction The Importance and Relevance of Software Security Software Security and the Software Development Lifecycle Quality Versus Secure Code The Three Most Important SDL Security Goals Threat Modeling and Attack Surface Validation Chapter Summary―What to Expect from This Book References The Secure Development Lifecycle Overcoming Challenges in Making Software Secure Software Security Maturity Models ISO/IEC 27034―Information Technology―Security Techniques―Application Security Other Resources for SDL Best Practices SAFECode U.S. Department of Homeland Security Software Assurance Program National Institute of Standards and Technology MITRE Corporation Common Computer Vulnerabilities and Exposures SANS Institute Top Cyber Security Risks U.S. Department of Defense Cyber Security and Information Systems Information Analysis Center (CSIAC) CERT, Bugtraq, and SecurityFocus Critical Tools and Talent The Tools The Talent Principles of Least Privilege Privacy The Importance of Metrics Mapping the Security Development Lifecycle to the Software Development Lifecycle Software Development Methodologies Waterfall Development Agile Development Chapter Summary References Security Assessment (A1): SDL Activities and Best Practices Software Security Team Is Looped in Early Software Security Hosts a Discovery Meeting Software Security Team Creates an SDL Project Plan Privacy Impact Assessment (PIA) Plan Initiated Security Assessment (A1) Key Success Factors and Metrics Key Success Factors Deliverables Metrics Chapter Summary References Architecture (A2): SDL Activities and Best Practices A2 Policy Compliance Analysis SDL Policy Assessment and Scoping Threat Modeling/Architecture Security Analysis Threat Modeling Data Flow Diagrams Architectural Threat Analysis and Ranking of Threats Risk Mitigation Open-Source Selection Privacy Information Gathering and Analysis Key Success Factors and Metrics Key Success Factors Deliverables Metrics Chapter Summary References Design and Development (A3): SDL Activities and Best Practices A3 Policy Compliance Analysis Security Test Plan Composition Threat Model Updating Design Security Analysis and Review Privacy Implementation Assessment Key Success Factors and Metrics Key Success Factors Deliverables Metrics Chapter Summary References Design and Development (A4): SDL Activities and Best Practices A4 Policy Compliance Analysis Security Test Case Execution Code Review in the SDLC/SDL Process Security Analysis Tools Static Analysis Dynamic Analysis Fuzz Testing Manual Code Review Key Success Factors Deliverables Metrics Chapter Summary References Ship (A5): SDL Activities and Best Practices A5 Policy Compliance Analysis Vulnerability Scan Penetration Testing Open-Source Licensing Review Final Security Review Final Privacy Review Key Success Factors Deliverables Metrics Chapter Summary References Post-Release Support (PRSA1–5) Right-Sizing Your Software Security Group The Right Organizational Location The Right People The Right Process PRSA1: External Vulnerability Disclosure Response Post-Release PSIRT Response Post-Release Privacy Response Optimizing Post-Release Third-Party Response PRSA2: Third-Party Reviews PRSA3: Post-Release Certifications PRSA4: Internal Review for New Product Combinations or Cloud Deployments PRSA5: Security Architectural Reviews and Tool-Based Assessments of Current, Legacy, and M&A Products and Solutions Legacy Code Mergers and Acquisitions (M&As) Key Success Factors Deliverables Metrics Chapter Summary References Applying the SDL Framework to the Real World Introduction Build Software Securely Produce Secure Code Manual Code Review Static Analysis Determining the Right Activities for Each Project The Seven Determining Questions Architecture and Design Testing Functional Testing Dynamic Testing Attack and Penetration Testing Independent Testing Agile: Sprints Key Success Factors and Metrics Secure Coding Training Program Secure Coding Frameworks (APIs) Manual Code Review Independent Code Review and Testing (by Experts or Third Parties) Static Analysis Risk Assessment Methodology Integration of SDL with SDLC Development of Architecture Talent Metrics Chapter Summary References Pulling It All Together: Using the SDL to Prevent Real-World Threats Strategic, Tactical, and User-Specific Software Attacks Strategic Attacks Tactical Attacks User-Specific Attacks Overcoming Organizational and Business Challenges with a Properly Designed, Managed, and Focused SDL Software Security Organizational Realities and Leverage Overcoming SDL Audit and Regulatory Challenges with Proper Governance Management Future Predications for Software Security The Bad News The Good News Conclusion References Appendix Index
SAP Process Orchestration The Comprehensive Guide, 2nd Edition SAP流程编制综合指南 1 Introduction to SAP Process Orchestration 1.1 Historical Overview and Evolution 1.1.1 SAP Process Integration 1.1.2 SAP Composition Environment 1.1.3 SAP Process Orchestration 1.1.4 SAP Process Orchestration 7.5 Highlights 1.2 SAP Process Orchestration Components 1.2.1 SAP Process Integration 1.2.2 Business Process Management 1.2.3 Business Rules Management 1.3 Architectural Overview and Positioning 1.3.1 SAP Process Orchestration Positioning 1.3.2 SAP NetWeaver Application Server for Java: System Architecture 1.3.3 SAP NetWeaver AS Java System Logical Layers 1.4 Installation Options 1.4.1 Case 1: SAP Process Integration Dual Stack 1.4.2 Case 2: SAP PI Dual Stack and SAP Composition Environment in Separate Installations 1.4.3 Case 3: SAP PI Single Stack and SAP Composition Environment in Separate Installations 1.4.4 Case 4: SAP PO—SAP PI and SAP Composition Environment in a Single Installation 1.5 Summary 2 Administration and Development Tools 2.1 SAP Process Orchestration Tools 2.1.1 Enterprise Services Repository 2.1.2 Integration Directory 2.1.3 System Landscape Directory 2.1.4 Configuration and Monitoring 2.2 SAP NetWeaver Administrator 2.2.1 Availability and Performance 2.2.2 Operations 2.2.3 Configuration 2.2.4 Troubleshooting 2.2.5 SOA 2.3 SAP NetWeaver Developer Studio 2.3.1 Use and Download 2.3.2 SAP Process Orchestration and SAP NetWeaver Developer Studio 2.4 Summary Part II Advanced Adapter Engine Extended (AEX) 3 Configuring the System Landscape Directory 3.1 System Landscape Directory Components and Features 3.1.1 Landscape 3.1.2 Software Catalog 3.1.3 Development 3.2 Registering Systems to the System Landscape Directory 3.2.1 Connecting to ABAP-Based Systems 3.2.2 Connecting to Java-Based Systems 3.2.3 Connecting to Other Systems 3.3 Administration of the System Landscape Directory 3.3.1 Server 3.3.2 Data and Content 3.4 System Landscape Directory Strategies 3.4.1 Manual Export and Import of Data 3.4.2 Automatic Bridge Forwarding 3.4.3 Full Automatic Synchronization 3.5 Tips and Tricks 3.5.1 Naming Convention 3.5.2 Keeping Your System Landscape Directory Catalogs Up to Date 3.5.3 Self-Registration of a Java-Based System with the SLD 3.5.4 Configuring Data Suppliers from One SLD to Another 3.5.5 Manual Export and Import of Data 3.5.6 Connecting the SLD to CTS+ to Facilitate the Export and Import of SLD Data 3.6 Exercise: Configuring the System Landscape Directory 3.6.1 Exercise Description 3.6.2 Exercise Solution Approach 3.6.3 Exercise Step-by-Step Solution 3.7 Summary 4 Working with the Enterprise Services Repository and Registry 4.1 Basic ES Repository Technical Concepts 4.1.1 Functional Blocks 4.1.2 First Steps in the Enterprise Services Repository 4.1.3 Service Interface 4.1.4 Integration Patterns: Stateful and Stateless Communication 4.1.5 Asynchronous versus Synchronous 4.1.6 Quality of Service 4.2 Design Objects 4.2.1 Software Component Versions 4.2.2 Folders 4.2.3 Namespaces 4.2.4 Mappings 4.2.5 Process Integration Scenario 4.2.6 Actions 4.3 Data Types and Message Types 4.3.1 Data Types 4.3.2 External Definitions 4.3.3 Message Type 4.3.4 Additional Design Objects 4.4 Exercise: Working with the ES Repository and Registry 4.4.1 Exercise Description 4.4.2 Exercise Solution Approach 4.4.3 Exercise Step-by-Step Solution 4.5 Summary 5 Working with the Integration Directory 5.1 Integration Directory Overview 5.2 Collaboration Profiles 5.2.1 Party 5.2.2 Communication Component 5.2.3 Communication Channel 5.2.4 Communication Component without a Party 5.3 Adapter Types 5.3.1 Technical Adapters to Enable Communication with SAP or Third-Party Systems 5.3.2 Application Adapters to Enable Communication with an SAP System 5.3.3 SAP Industry Adapters 5.3.4 Third-Party-Developed Adapters 5.4 Integrated Configuration 5.4.1 Inbound Processing 5.4.2 Receiver 5.4.3 Receiver Interfaces 5.4.4 Outbound Processing 5.5 The XI Message Protocol 5.6 Configuration Scenario 5.6.1 Creating a Configuration Scenario from Scratch (Manually) 5.6.2 Creating a Configuration Scenario from a Model 5.7 Value Mapping 5.7.1 If/Else Logic 5.7.2 Fixed Values 5.7.3 Value Mapping 5.8 Business-to-Business Integration 5.8.1 Business-to-Business On Premise 5.8.2 Business-to-Business Managed Services 5.8.3 Trading Partner Management 5.9 Axis Framework 5.10 Representational State Transfer Adapter 5.11 Message Alerting 5.11.1 Alert Rule Overview 5.11.2 Creating an Alert Rule 5.11.3 Editing or Deleting a Rule 5.12 Publish the Service in the Services Registry 5.13 Integration Directory Programming Interface (Directory API) 5.14 Exercise: Working with the Integration Directory 5.14.1 Exercise Description 5.14.2 Exercise Solution Approach 5.14.3 Exercise Step-by-Step Solution 5.15 Summary 6 Building an Integration Flow 6.1 SAP NetWeaver Developer Studio 6.1.1 Installing SAP NetWeaver Developer Studio 6.1.2 Setting Up SAP NetWeaver Developer Studio 6.1.3 Enterprise Integration Patterns and User-Defined Templates 6.2 Basics of Creating and Configuring an Integration Flow 6.2.1 Creating an iFlow 6.2.2 Configuring an iFlow 6.3 iFlow Example 6.3.1 Creating Products, Software Components, Business Systems, and Technical Systems in the SLD 6.3.2 Importing SLD Objects into the ES Repository in SAP NetWeaver Developer Studio 6.3.3 Create Enterprise Service Repository Objects 6.3.4 Create Directory Objects: Import Business Systems and Create iFlows 6.3.5 Testing the iFlow Scenario 6.3.6 Monitoring the Scenario 6.4 New Features of the Process Integration Designer 6.4.1 Export Objects from the Integration Designer 6.4.2 Automatically Deploy after Import 6.4.3 Version History and Deployment Status 6.5 Supporting Multiple Senders for Your iFlow 6.6 Exercise: Building an Integration Flow 6.6.1 Exercise Description 6.6.2 Exercise Solution Approach 6.6.3 Exercise Step-by-Step Solution 6.7 Summary 7 Administration and Monitoring in AEX 7.1 Administration 7.1.1 Central Administration Tool 7.1.2 SAP NetWeaver Administrator 7.1.3 SAP NetWeaver Application Server Java 7.1.4 SAP Process Integration Monitoring (pimon) 7.1.5 SAP Management Console 7.1.6 Config Tool 7.1.7 Administration Using Telnet 7.2 Monitoring 7.2.1 SAP NetWeaver Administrator 7.2.2 SAP Process Integration Local Monitoring 7.2.3 SAP PI Central Monitoring with SAP Solution Manager 7.2.4 Message Retention 7.2.5 User-Defined Message Search 7.3 Troubleshooting 7.3.1 Configuring Log and Traces 7.3.2 Using the Log Viewer 7.4 Summary 8 Migrating Interfaces from SAP PI Dual Stack to SAP PO 8.1 Migration Strategies 8.2 Migrating System Landscape Directory Content 8.2.1 Products 8.2.2 Software Components 8.2.3 Technical System 8.2.4 Business System 8.3 Migrating Enterprise Services Repository Content 8.3.1 Exporting Objects 8.3.2 Importing Objects 8.4 Migrating Integration Directory Content 8.4.1 Manually 8.4.2 Using the Migration Tool 8.5 Summary Part III Business Process Management and Composition 9 Introduction to SAP BPM and BPMN 2.0 9.1 Managing Business Processes 9.2 SAP Business Process Management 9.2.1 SAP BPM versus SAP Business Workflow 9.2.2 BPM before SAP BPM 9.2.3 SAP BPM Main Components 9.3 Business Process Model and Notation 2.0 9.3.1 Swimlanes 9.3.2 Artifacts 9.3.3 Flow Objects 9.3.4 Connections 9.4 Summary 10 Creating Your First SAP BPM Process 10.1 SAP BPM Positioning and Development Environment 10.1.1 Positioning 10.1.2 Setting Up Your Development Environment 10.2 Creating and Modeling an SAP BPM Process 10.2.1 Demonstration Scenario 10.2.2 Building an SAP BPM Process: Overview 10.2.3 SAP NetWeaver Developer Studio Perspective Concept 10.2.4 Create a Project in SAP NetWeaver Developer Studio 10.2.5 Creating a Process for Your BPMN 10.2.6 Creating a BPMN Model 10.3 Configuring the BPMN Model 10.3.1 Data Objects 10.3.2 Creating Data Structures 10.3.3 Importing XSD and WSDL 10.3.4 Process Pool Properties 10.3.5 BPMN Flow Objects 10.4 Flow Objects 10.4.1 Events 10.4.2 Tasks 10.4.3 Activities 10.4.4 Gateways 10.4.5 Artifacts 10.5 Build and Deploy Your Process 10.5.1 Steps for Building a Process 10.5.2 Steps for Deploying a Process 10.6 Advanced Mapping 10.6.1 Mappings 10.6.2 Options in Mapping Assignment 10.6.3 Automatic Mapping 10.6.4 Custom Functions 10.7 Implementing Error Handling 10.8 Combining SAP BPM and the AEX 10.8.1 Message from SAP BPM to the AEX 10.8.2 Message from the AEX to SAP BPM 10.8.3 Leverage an ES Repository Mapping in SAP BPM 10.9 Exercise: Creating an SAP Business Process Management Process 10.9.1 Exercise Description 10.9.2 Exercise Solution Approach 10.9.3 Exercise Step-by-Step Solution 10.10 Summary 11 Applying Advanced SAP BPM Concepts and Extensions 11.1 Service-Oriented Architecture Configuration 11.1.1 Configuration for an Automated Activity 11.1.2 Configuration for a Start Event or Intermediary Event 11.2 Testing and Running an SAP BPM Process 11.2.1 Process Repository Overview 11.2.2 Process Testing 11.3 Custom Enterprise Java Bean Functions 11.3.1 Create EJB and EAR Development Components 11.3.2 Create the Enterprise Java Bean 11.3.3 Build and Deploy 11.3.4 Create a New Enterprise Java Bean Function 11.4 Using the Claim Check Pattern 11.4.1 Create Interfaces 11.4.2 Create Mappings 11.4.3 Configure the Channel 11.4.4 Retrieve the Large Message from SAP BPM 11.4.5 Update the Status of the Large Message from SAP BPM 11.5 SAP BPM Application Programming Interface 11.5.1 Prerequisite to Using the SAP BPM API 11.5.2 Implementation Aspects and Examples 11.6 SAP Business Process Management OData 11.6.1 OData Services for Tasks and Task Data 11.6.2 Error Handling 11.7 Using the Push API to Access SAP BPM Lifecycle Events 11.7.1 Accessing Events through a Message Driven Bean 11.7.2 Accessing Events through a Java Message Service API 11.8 Debugging and Troubleshooting SAP BPM Processes 11.8.1 Place Breakpoints in the Process 11.8.2 Add a Debug Configuration 11.9 Tuning SAP BPM-Related Performance Parameters 11.10 Best Practices for Your SAP BPM Application 11.10.1 BPMN, Mapping, and Parallelism 11.10.2 Task Related 11.10.3 Gateways 11.10.4 Looping 11.10.5 Data Object 11.10.6 Correlation 11.10.7 Error Handling 11.10.8 Housekeeping 11.11 Exercise: Applying Advanced SAP BPM Concepts and Extensions 11.11.1 Exercise Solution Approach 11.11.2 Exercise Step-by-Step Solution 11.12 Summary 12 Combining SAP BPM and UI Technologies 12.1 Web Dynpro Java User Interface Technology 12.1.1 Generating a Web Dynpro User Interface 12.1.2 Post-Configuration Steps 12.2 Integrating SAPUI5 into an SAP BPM Process 12.2.1 SAPUI5 Technology Platform 12.2.2 Model-View-Controller Concept 12.2.3 SAPUI5 Components 12.2.4 Other SAPUI5 Concepts 12.2.5 Integration Steps 12.3 Other User Interface Technologies 12.3.1 Visual Composer 12.3.2 Adobe Offline Forms 12.3.3 Support for Custom User Interface Technologies 12.4 Summary 13 SAP Business Rules Management 13.1 How Business Rules Work 13.2 SAP Business Rules Management 13.2.1 Rules Composer 13.2.2 Rules Manager 13.2.3 Rules Engine 13.3 Modeling Business Rules with Rules Composer 13.3.1 Create the Rules Composer Development Component 13.3.2 Adding Context to the Rules 13.3.3 Creating a Ruleset 13.3.4 Flow Ruleset 13.4 Testing Business Rules 13.5 Best Practices for Modeling Business Rules 13.5.1 Separate Decision Logic from Other Types of Logic 13.5.2 Reuse and Extend before Building 13.6 Exercise: SAP Business Rules Management 13.6.1 Exercise Solution Approach 13.6.2 Exercise Step-by-Step Solution 13.7 Summary 14 Implementing Java Proxies 14.1 Java Proxy Concept and Considerations 14.2 Implementation Approaches 14.2.1 Outside-In Approach 14.2.2 Inside-Out Approach 14.3 Technical Implementation 14.3.1 Development Environment 14.3.2 Developing a Server Java Proxy 14.3.3 Developing a Client Java Proxy 14.4 Building an Orchestration 14.5 Exercise: Implementing Java Proxies 14.5.1 Exercise Solution Approach 14.5.2 Exercise Step-by-Step Solution 14.6 Summary 15 Administration and Monitoring Message Processing in SAP BPM 15.1 Monitoring 15.1.1 SAP Business Process Management System Overview 15.1.2 Process Repository 15.1.3 Process Management 15.1.4 Task Management 15.1.5 SAP BPM Inbox 15.1.6 Business Logs 15.1.7 SAP BPM Action Monitor 15.1.8 Process Troubleshooting 15.1.9 Rules Business Logs 15.1.10 SAP BPM Analytics Dashboard 15.2 Administration 15.2.1 Process Data Archiving 15.2.2 Log Viewer 15.3 Summary 16 Migrating ccBPM from SAP PI to SAP PO 16.1 Motivation for Migration 16.2 Migration Approach 16.2.1 Analyze the As-Is Integration Processes 16.2.2 Translate and Redesign 16.2.3 Export and Reuse Enterprise Services Repository Objects 16.2.4 Migrate and Adapt Configuration Scenarios 16.3 Recommendations 16.4 Summary Part IV Advanced Concepts 17 SAP Cloud Platform Integration for SAP PO 17.1 Enable Cloud Integration Content in SAP PO 17.2 Reusing Cloud Integration Content 17.2.1 Download Cloud Integration Content 17.2.2 Deploy the Cloud Integration Content 17.3 Monitoring 17.3.1 Monitoring the Integration Gateway Component 17.3.2 Monitoring Messages Related to the Deployment of Cloud Integration Content 17.4 Summary 18 Additional Components for SAP Process Orchestration 18.1 Component Model 18.1.1 Product 18.1.2 Software Components 18.1.3 Development Component 18.1.4 Dependencies among Development Components 18.1.5 Public Parts 18.2 SAP NetWeaver Development Infrastructure 18.2.1 Change Management Services 18.2.2 Design Time Repository 18.2.3 Component Build Service 18.3 SAP Composite Application Framework 18.3.1 Design Time Aspects 18.3.2 Runtime Aspects 18.4 Service Registry 18.5 Enhanced Change and Transport System 18.5.1 SAP PI-Related Transports 18.5.2 Transports for Non-SAP PI Java Objects 18.6 Exercise: Create an SWCV 18.6.1 Exercise Solution Approach 18.6.2 Exercise Step-by-Step Solution 18.7 Summary 19 Landscape Setup Considerations 19.1 Java System Configuration 19.1.1 Java Sizing and Setup Considerations 19.1.2 Java System Architecture 19.1.3 Java Central Services 19.1.4 Java Parameter Tuning 19.2 Handling Certificates 19.2.1 Certificate Key Storage 19.2.2 Encryption of Message Content on Database Level 19.3 Housekeeping 19.3.1 Archiving 19.3.2 Deletion 19.3.3 Restarting 19.3.4 Recovery 19.4 Monitoring 19.4.1 Runtime Workbench 19.4.2 Wily Enterprise Manager 19.4.3 SAP Management Console 19.4.4 SAP Solution Manager Monitoring 19.4.5 Tracing 19.4.6 JVMMON 19.5 Summary A Orchestration Outlook A.1 SAP API Management A.2 SAP Cloud Platform Integration A.2.1 Features and Facts Overview of SAP Cloud Platform Integration A.2.2 Development Guide: Getting Started A.2.3 Monitoring A.3 The Integration Advisor A.3.1 Interface Specifications: Advice from the Advisor A.3.2 Mapping Guideline A.3.3 Runtime A.3.4 Testing A.4 SAP Cloud Platform Workflow as a Service A.4.1 Workflow Service A.4.2 Workflow Modeling A.4.3 SAP Cloud Platform Business Rules A.4.4 Workflow Tasks Management A.4.5 Integration 官方出品,英文原版,可编辑带导航非影印版(总计1866页)
Contents at a Glance Introduction xix Part I OSPF Fundamentals and Communication 3 Chapter 1 Networking and Routing Fundamentals 5 Chapter 2 Introduction to OSPF 47 Chapter 3 OSPF Communication 103 Part II OSPF Routing and Network Design 161 Chapter 4 Design Fundamentals 163 Chapter 5 Routing Concepts and Configuration 225 Chapter 6 Redistribution 339 Chapter 7 Summarization 405 Part III OSPF Implementation, Troubleshooting, and Management 439 Chapter 8 Managing and Securing OSPF Networks 441 Chapter 9 Troubleshooting OSPF 533 Chapter 10 BGP and MPLS in an OSPF Network 655 Part IV Additional OSPF Resources 707 Appendix A OSPF RFCs 705 Index 724 0323FMf.book Page vi Wednesday, March 12, 2003 9:41 AM vii Contents Introduction xix Part I OSPF Fundamentals and Communication 3 Chapter 1 Networking and Routing Fundamentals 5 Foundations of Networking 6 Why Was the OSI Reference Model Needed? 6 Characteristics of the OSI Layers 7 Understanding the Seven Layers of the OSI Reference Model 9 Upper Layers 9 Layer 7—Application 9 Layer 6—Presentation 10 Layer 5—Session 10 Lower Layers 10 Layer 4—Transport 10 Layer 3—Network 11 Layer 2—Data Link 11 Layer 1—Physical 12 OSI Reference Model Layers and Information Exchange 13 Headers, Trailers, and Data 13 TCP/IP Protocol Suite 14 TCP/IP Functions 15 TCP Overview 15 IP Overview 16 Types of Network Topologies 16 Local-Area Networks 16 Wide-Area Networks 17 IP Addressing 21 Class A Addresses 22 Class B Addresses 22 Class C Addresses 23 Class D Addresses 23 Class E Addresses 23 How IP Addresses Are Used 24 Role of IP Addresses 27 How IP Addresses Are Read 27 IP Subnet Addressing 28 Subnet Masking 29 Subnetting Restrictions 31 Explaining the Need for VLSM and CIDR 31 Route Summarization 33 Classful Routing 34 Impact of Classful Routing 34 Classless Routing 34 VLSMs 35 VLSM Design Guidelines and Techniques 36 CIDR 37 Validating a CIDRized Network 37 What Do Those Slashes Mean? 38 Important CIDR Terms 38 IP Classless 39 CIDR Translation Table 39 Manually Computing the Value of a CIDR IP Prefix 40 Case Study: VLSMs 41 Route Aggregation 42 Summary 44 0323FMf.book Page vii Wednesday, March 12, 2003 9:41 AM viii Chapter 2 Introduction to OSPF 47 What Is a Routing Protocol? 48 Basic Routing Protocol Operation 50 Link-State Versus Distance Vector Routing Protocols 51 Link-State Routing Protocols 52 OSPF Characteristics 53 Integrated Intermediate System-to-Intermediate System 54 Distance Vector Routing Protocols 55 Routing Information Protocol Characteristics 56 Conclusion 56 Selecting a Routing Protocol 57 Operational Considerations 57 Protocols Supported 57 Routing Hierarchies 58 IP Address Management 59 IP Encapsulation Support 59 Available Resources 59 Technical Considerations 60 Fast Convergence 60 Routing Updates 61 VLSM and CIDR Support 61 Load Sharing 61 Metrics 61 Scalability 62 Physical Media Support 62 Extensibility 62 Business Considerations 62 Standards 63 Multivendor Environments 63 Proven Technology 63 SPF Overview 63 SPF in Operation 64 SPF Functions 68 Full and Partial SPF Calculations 70 Verifying SPF Operation 70 OSPF Routing Hierarchy 71 Hierarchical Network Design Techniques 71 Routing Types Within an OSPF Network 72 Intra-Area Routing 72 Inter-Area Routing 72 External Routes 73 OSPF Areas 74 Characteristics of a Standard OSPF Area 74 Standard Area Design Rules 74 Area 0: The OSPF Backbone Area 75 Stub Areas 75 Not-So-Stubby Areas 76 OSPF Operational Environment 77 Types of OSPF Routers 77 Internal Routers 78 Area Border Routers 78 Autonomous System Boundary Routers 78 Backbone Routers 79 OSPF Network Types 79 Router Identification 80 Neighbors 81 Adjacencies 82 Neighbor Versus Adjacent OSPF Routers 82 Designated Routers 83 Case Study: Adding a New OSPF Router to a Network 85 0323FMf.book Page viii Wednesday, March 12, 2003 9:41 AM ix Case Study: Developing the Link-State Database 88 Case Study: OSPF Network Evolution and Convergence 95 Configuring Loopback Interfaces 96 Enabling OSPF 96 Verifying OSPF Operation 97 Summary 101 Chapter 3 OSPF Communication 103 Link-State Advertisements 103 Types of LSAs 103 Type 1: Router LSAs 104 Type 2: Network LSAs 105 Type 3: ABR Summary LSAs 107 Type 4: ASBR Summary LSAs 108 Type 5: Autonomous System External LSAs 109 Type 7: Not-So-Stubby Area LSAs 110 Type 9: Opaque LSA: Link-Local Scope 112 Type 10: Opaque LSA: Area-Local Scope 113 Type 11: Opaque LSA: Autonomous System Scope 113 LSA Operation Example 113 Link-State Database Synchronization 116 Speaking OSPF 121 Types of OSPF Packets 121 Hello Process/Protocol 122 Hello Protocol Operational Variations 124 Hello Protocol Packet Format 125 Exchange Process/Protocol 126 Flooding Process/Protocol 127 Manipulating LSAs 128 Understanding LSA Group Pacing 128 How to Configure LSA Group Pacing 130 Understanding OSPF Packet Pacing 131 Blocking LSA Flooding 131 Ignoring MOSPF LSA Packets 132 Altering LSA Retransmissions 132 Altering LSA Transmission Delay 133 Detailed Neighbor Establishment 133 Hello Protocol State Changes 133 Database Exchange State Changes 134 Case Study: OSPF Initialization 138 Case Study: Troubleshooting Neighbor Problems 149 Neighbor Stuck in Init STATE 150 Neighbor Stuck in Exstart/Exchange State 151 What’s the Solution? 156 Neighbor Stuck in 2-Way State 156 Summary 158 Part II OSPF Routing and Network Design 161 Chapter 4 Design Fundamentals 163 OSPF Design Guidelines 164 OSPF Design Goals 164 Functionality 165 Scalability 165 Adaptability 166 Manageability 166 Cost Effectiveness 166 0323FMf.book Page ix Wednesday, March 12, 2003 9:41 AM x OSPF Network Design Methodology 167 Step 1: Analyze the Requirements 168 OSPF Deployment 169 Load Balancing with OSPF 170 OSPF Convergence 170 Step 2: Develop the Network Topology 171 Fully Meshed Topology 171 Hierarchical Topology 171 OSPF Backbone Design in the Hierarchical Model 173 Area Design in the Hierarchical Model 174 Using a Stub Area 175 Example of an OSPF Network with a Hierarchical Structure 177 Step 3: Determine the Addressing and Naming Conventions 180 Public or Private Address Space 180 Plan Now for OSPF Summarization 181 Bit Splitting (Borrowing Bits) 184 Map OSPF Addresses for VLSM 184 Discontiguous Subnets 185 Naming Schemes 186 Step 4: Provision the Hardware 186 Step 5: Deploy Protocol and Cisco IOS Software Features 187 OSPF Features 187 Cisco IOS Software Features 188 Step 6: Implement, Monitor, and Manage the Network 189 OSPF Network Scalability 189 OSPF Network Topology 190 Area Sizing 191 Determining the Number of Areas per ABR 192 Determining the Number of Areas per Router 194 Determining the Number of Neighbors per Router 194 Selecting the Designated Router 195 Fully Meshed Versus Partially Meshed Network Topology 196 Link-State Database Size Considerations 197 Determining Router Memory Requirements 197 Router CPU Requirements 199 Bandwidth Usage 199 OSPF Security 199 Area Design Considerations 200 Area Design Overview 200 Considering Physical Proximity 201 Reducing the Area Size if Links Are Unstable 201 Ensuring Contiguous Areas 201 Using Tunable OSPF Parameters 202 Naming an Area 204 Standard Area Design 205 Golden Rules of Standard Area Design 205 Backbone Area Design 205 Backbone Design Golden Rules 206 Stub Area Design 207 Stub Area Design Golden Rules 208 Stub Area Configuration 208 Totally Stubby Areas 212 Not-So-Stubby Areas 212 NSSA Implementation Considerations 214 OSPF Virtual Links: Bane or Benefit? 215 Mending a Partitioned Area 0 215 Ensuring a Connection to Area 0 216 Golden Rules of Virtual Link Design 217 Virtual Link Configuration Example 217 OSPF Design Tools 230 Altering Neighbor Cost 230 0323FMf.book Page x Wednesday, March 12, 2003 9:41 AM xi Configuring a Neighbor’s Cost on Point-to-Multipoint Broadcast Networks 231 Configuring an Interface as Point-to-Multipoint Nonbroadcast 231 Configuring Route Calculation Timers 232 Suppressing OSPF Updates 232 Summary 232 Case Studies 233 Case Study: Understanding Subinterfaces 233 Point-to-Point Subinterfaces 233 Multipoint Subinterfaces 234 Case Study: Point-to-Multipoint Link Networks 235 Router Configuration Examples 237 Case Study Conclusion 239 Case Study: Designing an OSPF Network 240 New WAN Requirements 242 Determining the Frame Relay PVC Architecture 242 Determining Multiprotocol Support 242 Determining the Traffic Flow 243 Determining the Number of Routers 244 Determining the IP Addressing Scheme 244 Determining Internet Connectivity 244 Determining Enterprise Routing Policies 244 Establishing Security Concerns 244 Implementing Your Design 245 IP Addressing 245 OSPF Area Organization 247 Specifying the OSPF Network Type 248 Implementing Authentication 248 Configuring Link Cost 249 Tuning OSPF Timers 249 Strategizing Route Redistribution 250 Chapter 5 Routing Concepts and Configuration 255 OSPF Routing Concepts 255 OSPF Cost 256 ip cost Interface Command 259 Changing the Reference Bandwidth 259 Altering OSPF Convergence 261 Hello Timers 261 Dead Timers 262 SPF Timers 262 Setting the Router ID 264 Loopback Interfaces 264 Configuring a Loopback Interface 265 Routing Loopback Interfaces 265 Configuring the Designated Router 266 Route Types 266 Which Is Better—E1 or E2 Routes? 268 Controlling Inter-Area Traffic 269 Configuring OSPF 270 Activating OSPF 271 network Command 272 OSPF Router Considerations 273 ABR Considerations 273 ASBR Considerations 274 Backbone Router Considerations 275 Different Network Types and OSPF 276 Configuring the Network Type 276 Broadcast Networks 277 Nonbroadcast Networks 278 Point-to-Multipoint Networks 279 Point-to-Point Networks 283 0323FMf.book Page xi Wednesday, March 12, 2003 9:41 AM xii Area Configuration 284 Normal Area Configuration 285 Stub Area Configuration 289 Totally Stubby Area Configuration 294 Not-So-Stubby-Area (NSSA) Configuration 297 area default-cost Command 306 Area Range 309 Tuning OSPF Operation 313 Altering OSPF Administrative Distance 313 Load Balancing 314 Default Routes 318 Passive Interfaces 321 On-Demand Circuits 322 Implementation Considerations 324 On-Demand Configuration Examples 324 On-Demand Circuits Summary 328 Summary 328 Case Study: Assigning Unique Network Numbers to Each OSPF Area 329 Case Study: OSPF with Multiple Areas 330 Case Study: OSPF with Stub and Totally Stubby Areas 335 Chapter 6 Redistribution 339 OSPF Redistribution 340 Administrative Distance and Metrics 341 Redistribution Golden Rules 342 Redistribution Configuration 343 External Routes 347 Default Routes 347 default-information originate Command 348 Assigning Metrics for Redistributed Protocols 354 Using the redistribute Command to Assign a Metric 354 Using the default-metric Command to Assign a Metric 354 Configuration Example 1: Setting the Default Metric for Redistributed Routes 355 Route Tagging 359 Mutual Redistribution 360 Distribute List Concerns 361 Avoiding Redistribution Loops 364 Route Maps 365 Configuration Example 2: RIP and OSPF 366 Configuring the RIP Network 366 Adding OSPF to the Center of a RIP Network 368 Adding OSPF Areas 372 What If Mutual Redistribution Were Required? 375 Configuration Example 3: Redistributing Connected and Loopback Interfaces 376 Configuration Example 4: Redistributing OSPF and EIGRP 380 OSPF and EIGRP Mutual Redistribution 384 Using Route Maps to Protect Against Routing Loops 385 Using Route Tagging to Protect Against Routing Loops 388 Configuration Example 5: Redistributing OSPF and RIP and Tagging Routes 390 OSPF and RIP Mutual Redistribution 392 Redistributing into OSPF with Route Tagging 393 Configuration Example 6: Controlling Redistribution 396 Altering Link Cost 396 Altering Routes 397 Filtering Routes 398 Distribute Lists and OSPF 398 Chapter Summary 403 0323FMf.book Page xii Wednesday, March 12, 2003 9:41 AM xiii Chapter 7 Summarization with OSPF 405 Summarization with OSPF 406 Benefits of Summarization 408 Summarization Golden Rules 409 Troubleshooting Summarization 410 Types of OSPF Summarization 410 Summarize Area Routes 411 Summarize External Routes 414 Summarizations Effect on the Routing Table 418 Configuration Example 3: Subnetting with Summarization 420 Alternative Area Summarization Example 423 Using Private Addressing to Summarize? 424 Configuration Example 4: Using VLSM with Summarization 426 Summary 431 Final Router Example Configurations 431 Part III OSPF Implementation, Troubleshooting, and Management 439 Chapter 8 Managing and Securing OSPF Networks 441 Network Management 442 Network Management Tools 444 CiscoView 444 CiscoWorks 445 Cisco ConfigMaker 446 Simple Network Management Protocol 446 Introduction to SNMP 450 Network Management System 451 Agents 452 Managed Devices 452 Management Information Base Overview 453 SNMP Operation 455 SNMP Operation Definitions 455 Network Management System Operation 456 Agent Response to NMS Request 458 Cisco’s MIB Extensions+ 459 Access Lists for SNMP 462 Multiple Community Strings 462 OSPF MIBs 462 Network Security 466 Assessing the Need for Security 467 Golden Rules for Designing a Secure Network 467 Document Your Security Plan 468 Know Your Enemy 469 Count the Cost 469 Identify Your Assumptions 470 Control and Limit Your Secrets 470 Remember Human Factors 471 Know Your Weaknesses 472 Limit the Scope of Access 472 Understand Your Environment 472 Limit Your Trust 472 Remember Physical Security 473 Security Is Pervasive 473 Additional Resources on Network Security 473 Securing Your OSPF Network 473 OSPF and Network Devices 474 Cisco IOS Password Encryption 474 Network Impact: User Passwords (vty and Enable) 475 Increasing SNMP Security 477 Network Data Encryption 478 0323FMf.book Page xiii Wednesday, March 12, 2003 9:41 AM xiv OSPF Authentication 479 Benefits of OSPF Neighbor Authentication 480 When to Deploy OSPF Neighbor Authentication 481 How OSPF Authentication Works 481 Configuring OSPF Authentication in an Area 483 Configuring OSPF Authentication on a Virtual Link 489 Changing the Virtual Link Password 492 Restricting Access to Network Devices 493 Controlling Access to Network Equipment 493 Terminal Access Controller Access Control System 497 Nonprivileged Access 498 Privileged Access 498 Privilege Level Security 499 Access Lists to Restrict Access 501 User Authentication to Restrict Access 504 Summary 505 Case Study: IOS Secure Template 506 Case Study: Router and Firewall Deployment 518 Defending Against Attacks Directly to Network Devices 518 Controlling Traffic Flow 519 Configuring the Firewall Router 520 Defining Firewall Access Lists 520 Applying Access Lists to Interfaces 527 Configuring the Communication Server 528 Defining the Communication Server’s Access Lists 528 Applying Access Lists to Lines 529 Spoofing and Inbound Access Lists 529 Additional Firewall Security Considerations 530 File Transfer Protocol Port 530 Chapter 9 Troubleshooting OSPF 533 The Mechanics of Troubleshooting OSPF 533 Preparing for Network Failure 534 Troubleshooting Methodology 535 Step 1: Clearly Define the Problem 537 Step 2: Gather Facts 537 Step 3: Consider Possible Problems 538 Step 4: Create an Action Plan 539 Step 5: Implement the Action Plan 539 Step 6: Gather Results 539 Step 7: Reiterate the Process 540 Determining That OSPF Is Operating Properly 540 Monitoring the Operation of OSPF 541 Configuring Lookup of DNS Names 541 System Logging (SYSLOG) 543 Configuring SYSLOG 543 Logging OSPF Neighbor Changes 548 OSPF Troubleshooting Commands 549 show ip ospf Command 550 show ip ospf process-id Command 553 show ip ospf interface Command 553 show ip ospf border-routers Command 555 show ip ospf database Command 556 show ip ospf database asbr-summary Command 560 show ip ospf database database-summary Command 563 show ip ospf database external Command 564 show ip ospf database network Command 566 show ip ospf database router Command 568 show ip ospf database summary Command 570 show ip ospf delete Command (Hidden) 572 show ip ospf events Command (Hidden) 575 show ip ospf flood-list Command 579 0323FMf.book Page xiv Wednesday, March 12, 2003 9:41 AM xv show ip ospf maxage-list Command (Hidden) 579 show ip ospf neighbor Command 580 show ip ospf neighbor ip address Command 581 show ip ospf neighbor int ip-address Command 581 show ip ospf neighbor detail Command 581 show ip ospf virtual-links Command 583 show ip ospf stat Command (Hidden) 583 show ip ospf summary-address Command 585 clear ip ospf Command 585 clear ip ospf counters Command 585 clear ip ospf process Command 586 clear ip ospf redistribution Command 587 OSPF debug Commands 587 When to Use debug Commands 587 How to Use debug Commands 588 Timestamping debug Output 589 Complete OSPF debug Commands 589 debug ip ospf adjacency Command 591 debug ip ospf events Command 593 debug ip ospf flood Command 595 debug ip ospf hello Command 597 debug ip ospf lsa-generation Command 598 debug ip ospf monitor Command (Hidden) 599 debug ip ospf packet Command 600 debug ip ospf retransmission Command 602 debug ip ospf spf Command 602 debug ip routing Command 614 Summary 615 Case Study: In the Trenches with OSPF 616 Problem No. 1 616 Step 1: Define the Problem 617 Step 2: Gather Facts 617 Step 3: Consider Possible Problems 621 Step 4: Create an Action Plan 622 Step 5: Implement the Action Plan 622 Step 6: Gather Results 623 Step 7: Reiterate the Process, If Needed, in Steps 4–7 623 Step 4: Create a New Action Plan 624 Step 5: Implement the New Action Plan 624 Step 6 Revisited: Gather Results 625 Step 7: Reiterate Steps 4–6 625 Step 6 Visited Again: Gather Results 627 Problem #2: Performance Issues 628 Step 1: Define the Problem 628 Step 2: Gather Facts 628 Step 4: Create an Action Plan 629 Step 5: Implement the Action Plan 630 Step 6: Gather Results 631 Case Study Conclusion and Design Tips 632 Case Study: OSPF Issues and Teasers 633 OSPF Error Messages 634 What Do %OSPF-4-ERRRCV Error Messages Mean? 635 What Does the Adv router not-reachable Error Message Mean? 635 OSPF Is Having Neighbor and Adjacency Problems 635 OSPF Stuck in INIT 636 OSPF Stuck in EXSTART/EXCHANGE 638 OSPF Stuck in LOADING 641 OSPF Stuck in TWO-WAY 641 OSPF Routes Missing from Routing Table 642 OSPF Routes Are in the Database but Not in the Routing Table 643 0323FMf.book Page xv Wednesday, March 12, 2003 9:41 AM xvi Miscellaneous Known OSPF Issues 647 Why Doesn’t My Cisco 1600 Router Recognize the OSPF Protocol? 647 Why Doesn’t My Cisco 800 Router Run OSPF 647 Why Is the ip ospf interface-retry 0 Configuration Command Added to All Interfaces? 648 How Do I Produce a Stable OSPF Network with Serial Links Flapping? 648 OSPF Routing Issues 648 Chapter 10 BGP and MPLS in an OSPF Network 655 Review of Interior Gateway Protocols and Exterior Gateway Protocols 655 Role of IGPs and EGPs in a Network 656 Introduction to BGP 660 Characteristic Overview of BGP 661 Operational Overview of BGP 662 Preventing Routing Loops 663 Types of BGP 664 BGP and OSPF Interaction 665 Routing Dependencies and Synchronization 667 Synchronization Is Good 668 Synchronization Is Bad 669 Next-Hop Reachability 671 Redistributing OSPF into BGP 673 Redistributing OSPF Internal (Intra- and Inter-Area) Routes into BGP 676 Redistributing OSPF External (Type 1 and 2) Routes into BGP 677 Redistributing Both Internal and External Routes into BGP 679 Redistributing OSPF NSSA-External Routes into BGP 679 Conclusions About BGP 680 Case Study: BGP 680 Problem Description 680 MPLS and OSPF 683 Background of MPLS 684 What Is the Benefit of MPLS? 686 Why Not IP Routing or ATM Switching? 686 Conventional Best Effort Routing 687 MPLS Overview 689 Label Structure 691 Label Placement 692 MPLS Addresses Traffic Engineering 693 Looking up the Label Path 695 Configuring OSPF and MPLS 696 Configuring MPLS 697 Verifying OSPF and MPLS Operation 701 Summary 703 Part IV Additional OSPF Resources 705 Appendix A Overview of the OSPF RFCs 707 0323FMf.book Page xvi Wednesday, March 12, 2003 9:41 AM xvii

1,268

社区成员

发帖
与我相关
我的任务
社区描述
软件工程/管理 管理版
社区管理员
  • 研发管理社区
加入社区
  • 近7日
  • 近30日
  • 至今
社区公告
暂无公告

试试用AI创作助手写篇文章吧