ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Cloud Native Data Center Networking: Architecture, Protocols, and Tools

دانلود کتاب شبکه‌سازی مرکز داده بومی ابری: معماری، پروتکل‌ها و ابزارها

Cloud Native Data Center Networking: Architecture, Protocols, and Tools

مشخصات کتاب

Cloud Native Data Center Networking: Architecture, Protocols, and Tools

ویرایش: [Original retail ed.] 
نویسندگان:   
سری:  
ISBN (شابک) : 1492045608, 9781492045601 
ناشر: O’Reilly Media 
سال نشر: 22 Nov 2019 
تعداد صفحات: 487 
زبان: English 
فرمت فایل : EPUB (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 7 Mb 

قیمت کتاب (تومان) : 49,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 5


در صورت تبدیل فایل کتاب Cloud Native Data Center Networking: Architecture, Protocols, and Tools به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب شبکه‌سازی مرکز داده بومی ابری: معماری، پروتکل‌ها و ابزارها نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب شبکه‌سازی مرکز داده بومی ابری: معماری، پروتکل‌ها و ابزارها

اگر می خواهید مطالعه کنید، بسازید، یا به سادگی تفکر خود را در مورد مرکز داده، شبکه های مدرن ابری بومی تأیید کنید، این کتاب شماست. چه به دنبال یک ابر خصوصی چند مستاجر باشید، چه شبکه ای برای اجرای یادگیری ماشینی، یا یک مرکز داده سازمانی، نویسنده دینش دات شما را از مراحل لازم برای طراحی یک مرکز داده مقرون به صرفه، ظرفیت بالا، مدیریت آسان، چابک و آسان راهنمایی می کند. قابل اعتماد. ایده آل برای معماران شبکه، اپراتورهای مرکز داده، و توسعه دهندگان برنامه های کاربردی شبکه و کانتینری، این کتاب تئوری را با عمل ترکیب می کند تا شما را از طریق معماری و پروتکل های مورد نیاز برای ایجاد و راه اندازی یک زیرساخت شبکه قوی و مقیاس پذیر راهنمایی کند. این کتاب روشی برای نگاه کردن به طراحی شبکه ارائه می دهد. برای کسانی که علاقه مند به شبکه های باز هستند، این کتاب مملو از مثال هایی با استفاده از نرم افزار منبع باز، از FRR تا Ansible است. در زمینه یک مرکز داده بومی ابری، شما موارد زیر را بررسی خواهید کرد: • توپولوژی Clos • تفکیک شبکه • انتخاب های سیستم عامل شبکه • انتخاب های پروتکل مسیریابی • شبکه کانتینری • مجازی سازی شبکه و EVPN • اتوماسیون شبکه


توضیحاتی درمورد کتاب به خارجی

If you want to study, build, or simply validate your thinking about modern cloud native data center, networks, this is your book. Whether you're pursuing a multitenant private cloud, a network for running machine learning, or an enterprise data center, author Dinesh Dutt takes you through the steps necessary to design a data center that's affordable, high capacity, easy to manage, agile, and reliable. Ideal for network architects, data center operators, and network and containerized application developers, this book mixes theory with practice to guide you through the architecture and protocols you need to create and operate a robust, scalable network infrastructure. The book offers a vendor-neutral way to look at network design. For those interested in open networking, this book is chock-full of examples using open source software, from FRR to Ansible. In the context of a cloud native data center, you'll examine: • Clos topology • Network disaggregation • Network operating system choices • Routing protocol choices • Container networking • Network virtualization and EVPN • Network automation



فهرست مطالب

Copyright
Table of Contents
Preface
	Audience
	How This Book Is Organized
	Software Used in This Book
	Conventions Used in This Book
	Using Code Examples
	O’Reilly Online Learning
	How to Contact Us
	Acknowledgments
Chapter 1. The Motivations for a New Network Architecture
	The Application-Network Shuffle
	The Network Design from the Turn of the Century
		The Charms of Bridging
		Building Scalable Bridging Networks
	The Trouble with the Access-Aggregation-Core Network Design
		Unscalability
		Complexity
		Failure Domain
		Unpredictability
		Inflexibility
		Lack of Agility
	The Stories Not Told
	Summary
Chapter 2. Clos: Network Topology for a New World
	Introducing the Clos Topology
	A Deeper Dive into the Clos Topology
		Use of Homogeneous Equipment
		Routing as the Fundamental Interconnect Model
		Oversubscription in a Clos Topology
		Interconnect Link Speeds
		Practical Constraints
		Fine-Grained Failure Domain
	Scaling the Clos Topology
	Comparing the Two Three-Tier Models
		Application Matchup
		Data Center Build Out
	Implications of the Clos Topology
		Rethinking Failures and Troubleshooting
		Cabling
		Simplified Inventory Management
		Network Automation
	Some Best Practices for a Clos Network
		Use of Multiple Links Between Switches
		Use of Spines as Only a Connector
		Use of Chassis as a Spine Switch
	Host Attach Models
	Summary
	References
Chapter 3. Network Disaggregation
	What Is Network Disaggregation?
	Why Is Network Disaggregation Important?
		Controlling Costs
		Avoiding Vendor Lock-In
		Standardization of Features
	What Made Network Disaggregation Possible Now?
	Difference in Network Operations with Disaggregation
		Purchase and Support
		First Boot
	Open Network Installer Environment
		How Does ONIE Work?
	The Players in Network Disaggregation: Hardware
		Packet-Switching Silicon
		ODMs
		CPU Complex
		The Standards Bodies
	Common Myths About Network Disaggregation
	Some Best Practices for Engaging with Network Disaggregation
	Summary
	References
Chapter 4. Network Operating System Choices
	Requirements of a Network Device
	The Rise of Software-Defined Networking and OpenFlow
		More Details About SDN and OpenFlow
		The Trouble with OpenFlow
		OVS
		The Effect of SDN and OpenFlow on Network Disaggregation
	NOS Design Models
		Location of Switch Network State
		Programming the Switching Silicon
		API
		The Reasons Behind the Different Answers
	User Interface
	Comparing the NOS Models with Cloud Native NOS Requirements
		Illustrating the Models with an Example
	What Else Is Left for a NOS to Do?
	Summary
	References
Chapter 5. Routing Protocol Choices
	Routing Overview
		How Routing Table Lookups Work
		How Routes Are Chosen
		Types of Routing Table Entries
		RIB and FIB
	Routing Protocols Overview
	Distance Vector Protocols Versus Link-State Protocols
		Distance Vector Dissected
		Link-State Dissected
		Summarizing Distance Vector Versus Link-State Route Exchange
	Comparing Distance Vector and Link-State Protocols
		Scaling in Link-State and Distance Vector Protocols
		Multipathing in Distance Vector and Link-State Protocols
		No News Is Good News
		Propagation Delay in Link-State and Distance Vector Protocols
		Multiprotocol Support
		Unnumbered Interfaces
		Routing Configuration Complexity
	Routing Protocols in Clos Networks
		Link-State Versus Distance Vector When Links or Nodes Fail
		Route Summarization in Clos Networks
		Security and Safeguards
	Bidirectional Forwarding Detection
	Requirements of a Routing Protocol in the Data Center
		Basic Requirements
		Advanced Requirements
		Rare or Futuristic Requirements
	Choosing the Routing Protocol for Your Network
	Summary
	References
Chapter 6. Network Virtualization
	What Is Network Virtualization?
	Uses of Network Virtualization in the Data Center
		Forcing Traffic to Take a Certain Path
		Applications That Require L2 Adjacency
		Cloud
	Separating Switch Management Network from Data Traffic
	Network Virtualization Models
		Service Abstraction: L2 or L3
		Inline Versus Overlay Virtual Networks
	Network Tunnels: The Fundamental Overlay Construct
		Benefits of Network Tunnels
		The Drawbacks of Network Tunnels
	Network Virtualization Solutions for the Data Center
		VLAN
		VRF
		VXLAN
		Other Network Virtualization Solutions
	Practical Limits on the Number of Virtual Networks
		Size of Virtual Network ID in Packet Header
		Hardware Limitations
		Scalability of Control Plane and Software
		Deployment Model
	Control Protocols for Network Virtualization
		Relationship of Virtual and Physical Control Plane
		The Centralized Control Model
		The Protocol-Based Control Model
	Vendor Support for Network Virtualization
		Merchant Silicon
		Software
		Standards
	Illustrating VXLAN Bridging and Routing
		VXLAN Bridging Example: H1 to H5
		VXLAN and Routing: H1 to H6
		Summarizing VXLAN Bridging and Routing
	Summary
Chapter 7. Container Networking
	Introduction to Containers
	Namespaces
		Network Namespaces
	Virtual Ethernet Interfaces
	Container Networking: Diving In
		Single-Host Container Networking
		Multihost Container Networking
	Comparing Different Container Network Solutions
	Kubernetes Networking
	Summary
Chapter 8. Multicast Routing
	Multicast Routing: Overview
		The Uses of Multicast Routing
	Problems to Solve in Multicast Routing
		Building a Multicast Tree
		Multicast Routing Protocol
	PIM Sparse Mode
		Rendezvous Point
		Building a Multicast Distribution Tree
		Multiple RPs and MSDP
	PIM-SM in the Data Center
		PIM-SM and Unnumbered
	Summary
Chapter 9. Life on the Edge of the Data Center
	The Problems
	Connectivity Models
		Why Connect to the External World?
		Bandwidth Requirements for External Connectivity
		Connecting the Clos Topology to the External World
		Routing at the Edge
		Services
	Hybrid Cloud Connectivity
	Summary
Chapter 10. Network Automation
	What Is Network Automation?
	Who Needs Network Automation?
	Does Network Automation Mean Learning Programming?
	Why Is Network Automation Difficult?
		The Trouble with IP Addresses and Interfaces
		Scale
		Network Protocol Configuration Complexity
		Lack of Programmatic Access
		Traditional Network OS Limitations
	What Can Network Developers Do to Help Network Automation?
	Tools for Network Automation
	Automation Best Practices
	Ansible: An Overview
		Inventory
		Playbooks
		Ad Hoc Commands
		Structuring Playbooks
	A Typical Automation Journey
		Glorified File Copy
		Automate the Configuration That Was Not Device Specific
		Template the Routing and Interface Configuration
		More Templating and Roles
		Some Observations from Fellow Journeymen
	Validating the Configuration
		Single Source of Truth
		Commit/Rollback in the Age of Automation
		Vagrant and Network Testing
		Automating Verification
	Summary
	References
Chapter 11. Network Observability
	What Is Observability?
	The Current State of Network Observability
		The Disenchantments of SNMP
		Box-by-Box Approach to Network Observability
	Why Is Observability Difficult with Networking?
	Observability in Data Center Networks: Special Characteristics
	Decomposing Observability
	The Mechanics of Telemetry
		What Do We Gather?
		How Do We Gather?
		When Do We Gather?
		Storing the Data
	The Uses for Multiple Data Sources
	Of Alerts and Dashboards
	Summary
	References
Chapter 12. Rethinking Network Design
	Standard, Simple Building Blocks
		Network Disaggregation
	Failure: Missing the Forest for the Trees
		L2 Failure Model Versus L3 Failure Model
		Simple Versus Complex Failures
		Handling Upgrades
	The Pursuit of Less
		How the Right Architecture Helps
		Feature Set Essentialism
	Constraints on the Cloud Native Network Design Principles
	Summary
Chapter 13. Deploying OSPF
	Why OSPF?
	The Problems to Be Addressed
		Determining Link-State Flooding Domains
		Numbered Versus Unnumbered OSPF
		Support for IPv6
		Support for VRFs
		Requirements for Running OSPF on Servers
	OSPF Route Types
		The Messiness of Stubbiness
	OSPF Timers
	Dissecting an OSPF Configuration
		Configuration for Leaf-Spine in a Two-Tier Clos Topology: IPv4
		Configuration for Leaf-Spine in a Two-Tier Clos Topology: IPv6
		Configuration with Three-Tier Clos Running OSPF
		Configuration with Servers Running OSPF: IPv4
		Summarizing Routes in OSPF
		OSPF and Upgrades
	Best Practices
	Summary
Chapter 14. BGP in the Data Center
	Basic BGP Concepts
		BGP Protocol Overview
		BGP Peering
		BGP State Machine
		Autonomous System Number
		BGP Capabilities
		BGP Attributes, Communities, Extended Communities
		BGP Best-Path Computation
		Support for Multiple Protocols
		BGP Messages
	Adapting BGP to the Data Center
		eBGP Versus iBGP
		eBGP: Flying Solo
		Private ASNs
		BGP’s ASN Numbering Scheme
		Multipath Selection
		Fixing BGP’s Convergence Time
	Summary
Chapter 15. Deploying BGP
	Core BGP Configuration Concepts
	Traditional Configuration for a Two-Tier Clos Topology: IPv4
	Peer Group
	Routing Policy
		Route Maps: Implementation of Routing Policy
	Providing Sane Defaults for the Data Center
	BGP Unnumbered: Eliminating Pesky Interface IP Addresses
		A remote-as by Any Name
		How Unnumbered Interfaces Work with BGP
		Final Observations on BGP Configuration in FRR
		Unnumbered BGP Support in Routing Stacks
		Summary
	Configuring IPv6
	BGP and VRFs
	Peering with BGP Speakers on the Host
		BGP Dynamic Neighbors
	BGP and Upgrades
		AS_PATH Prepend
		GRACEFUL_SHUTDOWN Community
		Max-MED
	Best Practices
	Summary
Chapter 16. EVPN in the Data Center
	Why Is EVPN Popular?
	The Problems a Network Virtualization Control Plane Must Address
	Where Does a VTEP Reside?
	One Protocol to Rule Them All, Or…?
		iBGP Characteristics
		Separate Underlay and Overlay Protocols
		eBGP Only
	BGP Constructs to Support Virtual Network Routes
		Route Distinguisher
		Route Target
		FRR’s use of RD and RT
		EVPN Route Types
		Communicating Choice of BUM Handling
	EVPN and Bridging
		EVPN Bridging with Ingress Replication
		EVPN Bridging with Routed Multicast Underlay
		Handling MAC Moves
	Support for Dual-Attached Hosts
		Host-Switch Interconnect Model
		VXLAN Model for Dual-Attached Hosts
		Switch Peering Options
		Handling Link Failures
		Avoiding Duplicate Multidestination Frames
	ARP/ND Suppression
	EVPN and Routing
		Centralized Versus Distributed Routing
		Symmetric Versus Asymmetric Routing
		Route Advertisements
		The Use of VRFs
	Deploying EVPN in Large Networks
	Summary
Chapter 17. Deploying Network Virtualization
	The Configuration Scenarios
	Device-Local Configuration
	Single eBGP Session
	OSPF Underlay, iBGP Overlay
		allowas-in Versus Separate ASN
		PIM/MSDP Configuration
	EVPN on the Host
	Best Practices
	Summary
Chapter 18. Validating Network Configuration
	Validating the Network State
	System Validation
	Cabling Validation
		Using Ansible to Validate Cabling
	Interface Configuration Validation
		Automating Interface Configuration Validation
	Routing Configuration Validation
		Validating an OSPF Configuration
		Validating a BGP Configuration
		Stripping the Private ASNs
	Validating Network Virtualization
	Application’s Network Validation
	Data-Plane Validation
	Summary
Chapter 19. Coda
Glossary
Index
About the Author
Colophon




نظرات کاربران