Robot Builder's Cookbook: Build and Design Your Own Robots
Author: Owen Bishop
Owen Bishop introduces, through hands-on project work, the mechanics, electronics and programming involved in practical robot design-and-build. The use of the PIC microcontroller throughout provides a painless introduction to programming whilst harnessing the power of a highly popular microcontroller used by students and design engineers worldwide.
This is a book for first-time robot builders, advanced builders wanting to know more about programming robots and students in Further and Higher Education tackling microcontroller-based practical work. They will all find this book a unique and exciting source of projects, ideas and techniques, to be combined into a wide range of fascinating robots.
* Full step-by-step instructions for 5 complete self-build robots
* Introduces key techniques in electronics, programming and construction - for robust robots that work first time
* Illustrations, close-up photographs and a lively, readable text make this a fun and informative guide for novice and expericenced robot builders
Read also Combating Corruption Encouraging Ethics or Administrative Law
End to End QoS Network Design
Author: Tim Szigeti
Best-practice QoS designs for protecting voice, video, and critical data while mitigating network denial-of-service attacks
- Understand the service-level requirements of voice, video, and data applications
- Examine strategic QoS best practices, including Scavenger-class QoS tactics for DoS/worm mitigation
- Learn about QoS tools and the various interdependencies and caveats of these tools that can impact design considerations
- Learn how to protect voice, video, and data traffic using various QoS mechanisms
- Evaluate design recommendations for protecting voice, video, and multiple classes of data while mitigating DoS/worm attacks for the following network infrastructure architectures: campus LAN, private WAN, MPLS VPN, and IPSec VPN
Quality of Service (QoS) has already proven itself as the enabling technology for the convergence of voice, video, and data networks. As business needs evolve, so do the demands for QoS. The need to protect critical applications via QoS mechanisms in business networks has escalated over the past few years, primarily due to the increased frequency and sophistication of denial-of-service (DoS) and worm attacks.
End-to-End QoS Network Design is a detailed handbook for planning and deploying QoS solutions to address current business needs. This book goes beyond discussing available QoS technologies and considers detailed design examples that illustrate where, when, and how to deploy various QoS features to provide validated and tested solutions for voice, video, and critical data over the LAN, WAN, and VPN.
The book starts with a brief background of network infrastructure evolution andthe subsequent need for QoS. It then goes on to cover the various QoS features and tools currently available and comments on their evolution and direction. The QoS requirements of voice, interactive and streaming video, and multiple classes of data applications are presented, along with an overview of the nature and effects of various types of DoS and worm attacks. QoS best-practice design principles are introduced to show how QoS mechanisms can be strategically deployed end-to-end to address application requirements while mitigating network attacks. The next section focuses on how these strategic design principles are applied to campus LAN QoS design. Considerations and detailed design recommendations specific to the access, distribution, and core layers of an enterprise campus network are presented. Private WAN QoS design is discussed in the following section, where WAN-specific considerations and detailed QoS designs are presented for leased-lines, Frame Relay, ATM, ATM-to-FR Service Interworking, and ISDN networks. Branch-specific designs include Cisco® SAFE recommendations for using Network-Based Application Recognition (NBAR) for known-worm identification and policing. The final section covers Layer 3 VPN QoS design-for both MPLS and IPSec VPNs. As businesses are migrating to VPNs to meet their wide-area networking needs at lower costs, considerations specific to these topologies are required to be reflected in their customer-edge QoS designs. MPLS VPN QoS design is examined from both the enterprise and service provider's perspectives. Additionally, IPSec VPN QoS designs cover site-to-site and teleworker contexts.
Whether you are looking for an introduction to QoS principles and practices or a QoS planning and deployment guide, this book provides you with the expert advice you need to design and implement comprehensive QoS solutions.
Table of Contents:
Introduction | xxii | |
Part I | Introduction to QoS | 3 |
Chapter 1 | Introduction to QoS | 5 |
A Brief Historical Perspective | 5 | |
QoS Evolution | 7 | |
User Network Expectations | 9 | |
Understanding QoS | 10 | |
QoS Models | 14 | |
Introduction to the QoS Toolset | 17 | |
Simplifying QoS | 19 | |
If I Have AutoQoS, Why Should I Be Reading This Book? | 26 | |
The Continuing Evolution of QoS | 29 | |
Summary | 29 | |
Further Reading | 30 | |
Chapter 2 | QoS Design Overview | 33 |
QoS Requirements of VoIP | 33 | |
QoS Requirements of Video | 39 | |
QoS Requirements of Data | 42 | |
QoS Requirements of the Control Plane | 48 | |
Scavenger Class | 49 | |
DoS and Worm Mitigation Strategy Through Scavenger Class QoS | 50 | |
Principles of QoS Design | 54 | |
Summary | 63 | |
Further Reading | 64 | |
Part II | QoS Toolset | 67 |
Chapter 3 | Classification and Marking Tools | 69 |
Classification Tools | 70 | |
Marking Tools | 77 | |
Summary | 98 | |
Further Reading | 99 | |
Chapter 4 | Policing and Shaping Tools | 103 |
Token Bucket Algorithms | 105 | |
Policers | 107 | |
Shapers | 118 | |
Further Reading | 128 | |
Chapter 5 | Congestion-Management Tools | 133 |
Understanding Scheduling and Queuing | 134 | |
Legacy Layer 3 Queuing Mechanisms | 136 | |
Currently Recommended Layer 3 Queuing Mechanisms | 139 | |
Layer 2 Queuing Tools | 150 | |
Tx-ring | 152 | |
PAK_priority | 153 | |
Summary | 154 | |
Further Reading | 154 | |
Chapter 6 | Congestion-Avoidance Tools | 159 |
Random Early Detection | 160 | |
Weighted Random Early Detection | 161 | |
DSCP-Based Weighted Random Early Detection | 162 | |
Explicit Congestion Notification | 163 | |
Summary | 166 | |
Further Reading | 166 | |
Chapter 7 | Link-Specific Tools | 169 |
Header-Compression Techniques | 170 | |
Link Fragmentation and Interleaving | 181 | |
Summary | 190 | |
Further Reading | 191 | |
Chapter 8 | Bandwidth Reservation | 195 |
RSVP Overview | 196 | |
MPLS Traffic Engineering | 199 | |
Scalability | 200 | |
RSVP-DiffServ Integration | 200 | |
Endpoints and Proxies | 201 | |
Summary | 201 | |
Further Reading | 201 | |
Chapter 9 | Call Admission Control (CAC) | 205 |
CAC Overview | 205 | |
CAC Defined | 206 | |
CAC Tool Categories | 207 | |
CallManager Locations CAC | 209 | |
Gatekeeper CAC | 211 | |
RSVP | 212 | |
Summary | 218 | |
Further Reading | 218 | |
Chapter 10 | Catalyst QoS Tools | 223 |
Generic Catalyst QoS Models | 224 | |
Catalyst 2950 | 231 | |
Catalyst 3550 | 235 | |
Catalyst 2970, 3650, and 3750 | 242 | |
Catalyst 4500 | 247 | |
Catalyst 6500 | 252 | |
Summary | 263 | |
Further Reading | 266 | |
Chapter 11 | WLAN QoS Tools | 269 |
QoS for Wireless LANs Versus QoS on Wired LANs | 270 | |
Upstream Versus Downstream QoS | 271 | |
IEEE 802.11 DCF | 272 | |
IEEE 802.11e EDCF | 275 | |
IEEE 802.1D Classes of Service | 279 | |
QoS Operation on Cisco APs | 280 | |
Configuring QoS on Cisco APs | 281 | |
Summary | 284 | |
Further Reading | 285 | |
Part III | LAN QoS Design | 287 |
Chapter 12 | Campus QoS Design | 289 |
DoS/Worm-Mitigation Strategies | 292 | |
Call-Signaling TCP/UDP Ports in Use | 295 | |
Access-Edge Trust Models | 302 | |
Catalyst 2950 QoS Considerations and Design | 314 | |
Catalyst 3550 QoS Considerations and Design | 325 | |
Catalyst 2970/3560/3750 QoS Considerations and Design | 342 | |
Catalyst 4500-SupII+/III/IV/V QoS Considerations and Design | 357 | |
Catalyst 6500 QoS Considerations and Design | 372 | |
WAN Aggregator/Branch Router Handoff Considerations | 420 | |
Case Study: Campus QoS Design | 422 | |
Summary | 440 | |
Further Reading | 441 | |
Part IV | WAN QoS Design | 445 |
Chapter 13 | WAN Aggregator QoS Design | 447 |
Where Is QoS Needed over the WAN? | 447 | |
WAN Edge QoS Design Considerations | 448 | |
WAN Edge Classification and Provisioning Models | 453 | |
WAN Edge Link-Specific QoS Design | 467 | |
Case Study: WAN Aggregation Router QoS Design | 505 | |
Summary | 507 | |
Further Reading | 508 | |
Chapter 14 | Branch Router QoS Design | 513 |
Branch WAN Edge QoS Design | 514 | |
Branch Router LAN Edge QoS Design | 517 | |
Case Study: Branch Router QoS Design | 535 | |
Summary | 541 | |
Further Reading | 541 | |
Part V | VPN QoS Design | 545 |
Chapter 15 | MPLS VPN QoS Design | 547 |
Where Is QoS Needed over an MPLS VPN? | 548 | |
Customer Edge QoS Design Considerations | 550 | |
Provider-Edge QoS Considerations | 563 | |
Core QoS Considerations | 582 | |
Case Study: MPLS VPN QoS Design (CE/PE/P Routers) | 616 | |
Summary | 632 | |
Further Reading | 632 | |
Chapter 16 | IPSec VPN QoS Design | 635 |
Site-to-Site V3PN QoS Considerations | 637 | |
Site-to-Site V3PN QoS Designs | 658 | |
Headend VPN Edge QoS Options for Site-to-Site V3PNs | 665 | |
Teleworker V3PN QoS Considerations | 666 | |
Teleworker V3PN QoS Designs | 682 | |
Case Study: IPSec VPN QoS Design | 686 | |
Summary | 696 | |
Further Reading | 697 | |
Appendix | QoS "At-A-Glance" Summaries | 701 |
Index | 713 |
No comments:
Post a Comment