非常详细的企业组目录第一章项目概述51.1项目目标51.1.1总体目标51.1.2阶段目标51.2设计原则6第二章使用分析82.1使用分类82.1.1使用系统总体框架82.1.2业务系统使用分类92.1.3信息管理系统使用分类102.2数据核心及分行定位112.2.1阶段一112.2.2阶段二112.2.3阶段三12第三章设备配置133.1基本原则133.1.1命名规范133.1.2端口分配143.2数据核心153.2.1设备配置153.2.2端口分配153.3数据核心163.3.1设备配置163.3.2端口分配163.4一级分行163.4.1设备配置163.4.2端口分配17第四章网络结构184.1网络结构设计原则184.2网络结构阶段分析184.2.1阶段一184.2.2阶段二204.2.3阶段三224.3分行接入标准234.3.1阶段一234.3.2阶段二244.3.3阶段三24第五章冗余策略265.1拓扑冗余策略265.1.1拓扑冗余策略设计原则265.1.2拓扑冗余策略(阶段一)265.1.3拓扑冗余策略(阶段二)285.1.4拓扑冗余策略(阶段三)305.2运营商、设备、板卡冗余策略335.2.1运营商、设备、板卡冗余策略设计原则335.2.2运营商、设备、板卡冗余策略阶段一、二、三(核心骨干网)335.2.3运营商、设备、板卡冗余策略阶段一、二(一级骨干网)355.2.4运营商、设备、板卡冗余策略阶段三(一级骨干网)36第六章路由策略406.1路由总体设计406.1.1路由协议选择406.1.2路由协议部署(阶段一、二)416.1.3路由协议部署(阶段三)426.2广域网路由策略436.2.1阶段一、二436.2.2阶段三466.3广域区路由策略486.3.1阶段一、二486.3.2阶段三526.4局域网路由策略566.4.1阶段一、二566.4.2阶段三56第七章流量工程587.1流量分布587.1.1阶段一587.1.2阶段二587.1.3阶段三597.2QOS策略607.2.1总体策略607.2.2阶段一、二627.2.3阶段三63第八章网络安全658.1网络安全原则658.2设备安全658.3业务安全688.3.1阶段一、二688.3.2阶段三69第九章IP地址分配719.1IP地址分配原则719.2IP地址具体分配71第十章网络管理7410.1网管系统选择7410.1.1选择原则7410.1.2网元管理软件7410.2网管系统部署75网
本资料共包括以下附件:
combat-lab出品某大型企业广域网项目详细设计方案v2.doc....
(Very Detailed Enterprise Group Catalog Chapter 1 Project Overview 51.1 Project Objectives 51.1.1 Overall Objectives 51.1.2 Phase Objectives 51.2 Design Principles 6 Chapter 2 Usage Analysis 82.1 Usage Classification 82.1.1 Usage System Overall Framework 82.1.2 Business System Usage Classification 92.1.3 Classification of Information Management System Use 102.2 Data Core and Branch Location 112.2.1 Phase One 112.2.2 Phase Two 112.2.3 Phase Three Core 153.2.1 Device Configuration 153.2.2 Port Allocation 153.3 Data Core 163.3.1 Device Configuration 163.3.2 Port Allocation 163.4 Primary Branch 163.4.1 Device Configuration 163.4.2 Port Allocation 17 Chapter 4 Network Structure 184.1 Network Structure Design Principles 184.2 Phase Analysis of Network Structure 184.2.1 Phase 1 184.2.2 Phase 2 204.2.3 Phase 3 224.3 Branch Access Standard 234.3.1 Phase 1 234.3.2 Phase 2 244.3.3 Phase 3 24 Chapter 5 Redundancy Strategy 265.1 Topological Redundancy Strategy 265.1.1 Topology Redundancy Strategy Design Principles 265.1.2 Topology Redundancy Strategy (Phase One) 265.1.3 Topology Redundancy Strategy (Phase Two) 285.1.4 Topology Redundancy Strategy (Phase Three) 305.2 Operators, Equipment, Boards Card Redundancy Strategy 335.2.1 Operator, Equipment, Line Card Redundancy Strategy Design Principles 335.2.2 Operator, Equipment, Line Card Redundancy Strategy Phases 1, 2, and 3 (Core Backbone Network) 335.2.3 Operator, Equipment , Line Card Redundancy Strategy Phases 1 and 2 (first-level backbone network) 355.2.4 Operator, equipment, and board card redundancy strategy Phase 3 (first-level backbone network) 36 Chapter VI Routing Strategy 406.1 Overall Routing Design 406.1.1 Routing Protocol Selection 406.1.2 Routing Protocol Deployment (Phase One and Two) 416.1.3 Routing Protocol Deployment (Phase Three) 426.2 WAN Routing Policy 436.2.1 Phase One and Two 436.2.2 Phase Three 466.3 WAN Routing Policy 486.3.1 Phase 1 and 2 486.3.2 Phase 3 526.4 LAN Routing Policy 566.4.1 Phase 1 and 2 566.4.2 Phase 3 56 Chapter 7 Traffic Engineering 587.1 Traffic Distribution 587.1.1 Phase 1 587.1.2 Phase 2 587.1.3 Phase 3 597.2 QOS Strategy 607.2.1 Overall Strategy 607.2.2 Phases One and Two 627.2.3 Phase Three 63 Chapter Eight Network Security 658.1 Network Security Principles 658.2 Device Security 658.3 Service Security 688.3.1 Phases One and Two 688.3.2 Phase Three 69 Nine Chapter IP Address Allocation 719.1 Principles of IP Address Allocation 719.2 Specific IP Address Allocation 71 Chapter 10 Network Management 7410. 1 Network management system selection 7410.1.1 Selection principles 7410.1.2 Network element management software 7410.2 Network management system deployment 75 Network
This document includes the following attachments:
Combat-lab produced a detailed design plan for a large-scale enterprise WAN project v2.doc....)
[下载]14355309798.rar
|