Home > Store

Top-Down Network Design

eBook

  • Your Price: $59.19
  • List Price: $73.99
  • Includes EPUB and PDF
  • About eBook Formats
  • This eBook includes the following formats, accessible from your Account page after purchase:

    ePub EPUB The open industry format known for its reflowable content and usability on supported mobile devices.

    Adobe Reader PDF The popular standard, used most often with the free Acrobat® Reader® software.

    This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

Also available in other formats.

Register your product to gain access to bonus material or receive a coupon.

Description

  • Copyright 2011
  • Dimensions: 7-3/8" x 9-1/8"
  • Edition: 1st
  • eBook
  • ISBN-10: 0-13-343498-2
  • ISBN-13: 978-0-13-343498-9

Objectives

The purpose of Top-Down Network Design, Third Edition, is to help you design networks that meet a customer’s business and technical goals. Whether your customer is another department within your own company or an external client, this book provides you with tested processes and tools to help you understand traffic flow, protocol behavior, and internetworking technologies. After completing this book, you will be equipped to design enterprise networks that meet a customer’s requirements for functionality, capacity, performance, availability, scalability, affordability, security, and manageability.

Audience

This book is for you if you are an internetworking professional responsible for designing and maintaining medium- to large-sized enterprise networks. If you are a network engineer, architect, or technician who has a working knowledge of network protocols and technologies, this book will provide you with practical advice on applying your knowledge to internetwork design.

This book also includes useful information for consultants, systems engineers, and sales engineers who design corporate networks for clients. In the fast-paced presales environment of many systems engineers, it often is difficult to slow down and insist on a top-down, structured systems analysis approach. Wherever possible, this book includes shortcuts and assumptions that can be made to speed up the network design process.

Finally, this book is useful for undergraduate and graduate students in computer science and information technology disciplines. Students who have taken one or two courses in networking theory will find Top-Down Network Design, Third Edition, an approachable introduction to the engineering and business issues related to developing real-world networks that solve typical business problems.

Changes for the Third Edition

Networks have changed in many ways since the second edition was published. Many legacy technologies have disappeared and are no longer covered in the book. In addition, modern networks have become multifaceted, providing support for numerous bandwidth-hungry applications and a variety of devices, ranging from smart phones to tablet PCs to high-end servers. Modern users expect the network to be available all the time, from any device, and to let them securely collaborate with coworkers, friends, and family. Networks today support voice, video, high-definition TV, desktop sharing, virtual meetings, online training, virtual reality, and applications that we can’t even imagine that brilliant college students are busily creating in their dorm rooms.

As applications rapidly change and put more demand on networks, the need to teach a systematic approach to network design is even more important than ever. With that need in mind, the third edition has been retooled to make it an ideal textbook for college students. The third edition features review questions and design scenarios at the end of each chapter to help students learn top-down network design.

To address new demands on modern networks, the third edition of Top-Down Network Design also has updated material on the following topics:

¿ Network redundancy

¿ Modularity in network designs

¿ The Cisco SAFE security reference architecture

¿ The Rapid Spanning Tree Protocol (RSTP)

¿ Internet Protocol version 6 (IPv6)

¿ Ethernet scalability options, including 10-Gbps Ethernet and Metro Ethernet

¿ Network design and management tools

Sample Content

Table of Contents

Introduction

Part I Identifying Your Customer’s Needs and Goals

Chapter 1 Analyzing Business Goals and Constraints 3

Using a Top-Down Network Design Methodology 3

    Using a Structured Network Design Process 5

    Systems Development Life Cycles 6

    Plan Design Implement Operate Optimize (PDIOO) Network Life Cycle 7

Analyzing Business Goals 8

    Working with Your Client 8

    Changes in Enterprise Networks 10

        Networks Must Make Business Sense 10

        Networks Offer a Service 11

        The Need to Support Mobile Users 12

        The Importance of Network Security and Resiliency 12

    Typical Network Design Business Goals 13

    Identifying the Scope of a Network Design Project 14

    Identifying a Customer’s Network Applications 16

Analyzing Business Constraints 19

    Politics and Policies 19

    Budgetary and Staffing Constraints 20

    Project Scheduling 21

Business Goals Checklist 22

Summary 23

Review Questions 23

Design Scenario 24

Chapter 2 Analyzing Technical Goals and Tradeoffs 25

Scalability 25

    Planning for Expansion 26

    Expanding Access to Data 26

    Constraints on Scalability 27

Availability 27

    Disaster Recovery 28

    Specifying Availability Requirements 29

        Five Nines Availability 30

        The Cost of Downtime 31

        Mean Time Between Failure and Mean Time to Repair 31

Network Performance 32

    Network Performance Definitions 33

    Optimum Network Utilization 34

    Throughput 35

        Throughput of Internetworking Devices 36

        Application Layer Throughput 37

    Accuracy 38

    Efficiency 39

    Delay and Delay Variation 40

        Causes of Delay 41

        Delay Variation 43

    Response Time 44

Security 44

    Identifying Network Assets 45

    Analyzing Security Risks 46

        Reconnaissance Attacks 47

        Denial-of-Service Attacks 48

    Developing Security Requirements 48

Manageability 49

Usability 50

Adaptability 50

Affordability 51

Making Network Design Tradeoffs 52

Technical Goals Checklist 54

Summary 55

Review Questions 56

Design Scenario 56

Chapter 3 Characterizing the Existing Internetwork 59

Characterizing the Network Infrastructure 59

    Developing a Network Map 60

        Characterizing Large Internetworks 60

        Characterizing the Logical Architecture 62

        Developing a Modular Block Diagram 64

    Characterizing Network Addressing and Naming 64

    Characterizing Wiring and Media 65

    Checking Architectural and Environmental Constraints 68

        Checking a Site for a Wireless Installation 69

        Performing a Wireless Site Survey 70

Checking the Health of the Existing Internetwork 71

    Developing a Baseline of Network Performance 72

    Analyzing Network Availability 73

    Analyzing Network Utilization 73

        Measuring Bandwidth Utilization by Protocol 75

    Analyzing Network Accuracy 76

        Analyzing Errors on Switched Ethernet Networks 77

    Analyzing Network Efficiency 79

    Analyzing Delay and Response Time 80

    Checking the Status of Major Routers, Switches, and Firewalls 82

Network Health Checklist 83

Summary 84

Review Questions 84

Hands-On Project 85

Design Scenario 85

Chapter 4 Characterizing Network Traffic 87

Characterizing Traffic Flow 87

    Identifying Major Traffic Sources and Stores 87

    Documenting Traffic Flow on the Existing Network 89

    Characterizing Types of Traffic Flow for New Network Applications 90

        Terminal/Host Traffic Flow 91

        Client/Server Traffic Flow 91

        Peer-to-Peer Traffic Flow 93

        Server/Server Traffic Flow 94

        Distributed Computing Traffic Flow 94

        Traffic Flow in Voice over IP Networks 94

    Documenting Traffic Flow for New and Existing Network Applications 95

Characterizing Traffic Load 96

    Calculating Theoretical Traffic Load 97

    Documenting Application-Usage Patterns 99

    Refining Estimates of Traffic Load Caused by Applications 99

    Estimating Traffic Load Caused by Routing Protocols 101

Characterizing Traffic Behavior 101

    Broadcast/Multicast Behavior 101

    Network Efficiency 102

        Frame Size 103

        Windowing and Flow Control 103

        Error-Recovery Mechanisms 104

Characterizing Quality of Service Requirements 105

    ATM QoS Specifications 106

        Constant Bit Rate Service Category 107

        Real-time Variable Bit Rate Service Category 107

        Non-real-time Variable Bit Rate Service Category 107

        Unspecified Bit Rate Service Category 108

        Available Bit Rate Service Category 108

        Guaranteed Frame Rate Service Category 108

    IETF Integrated Services Working Group QoS Specifications 109

        Controlled-Load Service 110

        Guaranteed Service 110

    IETF Differentiated Services Working Group QoS Specifications 111

    Grade of Service Requirements for Voice Applications 112

    Documenting QoS Requirements 113

Network Traffic Checklist 114

Summary 114

Review Questions 114

Design Scenario 115

Summary for Part I 115

Part II Logical Network Design

Chapter 5 Designing a Network Topology 119

Hierarchical Network Design 120

    Why Use a Hierarchical Network Design Model? 121

    Flat Versus Hierarchical Topologies 122

        Flat WAN Topologies 122

        Flat LAN Topologies 123

    Mesh Versus Hierarchical-Mesh Topologies 124

    Classic Three-Layer Hierarchical Model 125

        Core Layer 127

        Distribution Layer 127

        Access Layer 128

    Guidelines for Hierarchical Network Design 128

Redundant Network Design Topologies 130

    Backup Paths 131

    Load Sharing 132

Modular Network Design 133

    Cisco SAFE Security Reference Architecture 133

Designing a Campus Network Design Topology 135

    Spanning Tree Protocol 135

        Spanning Tree Cost Values 136

        Rapid Spanning Tree Protocol 137

        RSTP Convergence and Reconvergence 138

        Selecting the Root Bridge 139

        Scaling the Spanning Tree Protocol 140

    Virtual LANs 141

        Fundamental VLAN Designs 142

    Wireless LANs 144

        Positioning an Access Point for Maximum Coverage 145

        WLANs and VLANs 146

        Redundant Wireless Access Points 146

    Redundancy and Load Sharing in Wired LANs 147

    Server Redundancy 148

    Workstation-to-Router Redundancy 150

        Hot Standby Router Protocol 152

        Gateway Load Balancing Protocol 153

Designing the Enterprise Edge Topology 153

    Redundant WAN Segments 153

        Circuit Diversity 154

    Multihoming the Internet Connection 154

    Virtual Private Networking 157

        Site-to-Site VPNs 158

        Remote-Access VPNs 159

    Service Provider Edge 160

Secure Network Design Topologies 162

    Planning for Physical Security 162

    Meeting Security Goals with Firewall Topologies 162

Summary 163

Review Questions 165

Design Scenario 165

Chapter 6 Designing Models for Addressing and Numbering 167

Guidelines for Assigning Network Layer Addresses 168

    Using a Structured Model for Network Layer Addressing 168

    Administering Addresses by a Central Authority 169

    Distributing Authority for Addressing 170

    Using Dynamic Addressing for End Systems 170

        IP Dynamic Addressing 171

        IP Version 6 Dynamic Addressing 174

        Zero Configuration Networking 175

    Using Private Addresses in an IP Environment 175

        Caveats with Private Addressing 177

        Network Address Translation 177

Using a Hierarchical Model for Assigning Addresses 178

    Why Use a Hierarchical Model for Addressing and Routing? 178

    Hierarchical Routing 179

    Classless Interdomain Routing 179

    Classless Routing Versus Classful Routing 180

    Route Summarization (Aggregation) 181

        Route Summarization Example 182

        Route Summarization Tips 183

    Discontiguous Subnets 183

    Mobile Hosts 184

    Variable-Length Subnet Masking 185

    Hierarchy in IP Version 6 Addresses 186

        Link-Local Addresses 187

        Global Unicast Addresses 188

        IPv6 Addresses with Embedded IPv4 Addresses 189

Designing a Model for Naming 189

    Distributing Authority for Naming 190

    Guidelines for Assigning Names 191

    Assigning Names in a NetBIOS Environment 192

    Assigning Names in an IP Environment 193

        The Domain Name System 193

        Dynamic DNS Names 194

        IPv6 Name Resolution 195

Summary 195

Review Questions 196

Design Scenario 197

Chapter 7 Selecting Switching and Routing Protocols 199

Making Decisions as Part of the Top-Down Network Design Process 200

Selecting Switching Protocols 201

    Switching and the OSI Layers 202

    Transparent Bridging 202

    Selecting Spanning Tree Protocol Enhancements 203

        PortFast 204

        UplinkFast and BackboneFast 204

        Unidirectional Link Detection 205

    LoopGuard 206

    Protocols for Transporting VLAN Information 207

        IEEE 802.1Q 207

        Dynamic Trunk Protocol 208

        VLAN Trunking Protocol 208

Selecting Routing Protocols 209

    Characterizing Routing Protocols 209

        Distance-Vector Routing Protocols 210

        Link-State Routing Protocols 212

        Routing Protocol Metrics 214

        Hierarchical Versus Nonhierarchical Routing Protocols 214

        Interior Versus Exterior Routing Protocols 214

        Classful Versus Classless Routing Protocols 214

        Dynamic Versus Static and Default Routing 215

        On-Demand Routing 216

        Scalability Constraints for Routing Protocols 216

        Routing Protocol Convergence 217

    IP Routing 218

        Routing Information Protocol 218

        Enhanced Interior Gateway Routing Protocol 219

        Open Shortest Path First 221

        Intermediate System-to-Intermediate System 224

        Border Gateway Protocol 225

    Using Multiple Routing Protocols in an Internetwork 225

        Routing Protocols and the Hierarchical Design Model 226

        Redistribution Between Routing Protocols 227

        Integrated Routing and Bridging 229

A Summary of Routing Protocols 230

Summary 231

Review Questions 231

Design Scenario 232

Chapter 8 Developing Network Security Strategies 233

Network Security Design 233

    Identifying Network Assets 234

    Analyzing Security Risks 234

    Analyzing Security Requirements and Tradeoffs 235

    Developing a Security Plan 235

    Developing a Security Policy 236

        Components of a Security Policy 237

    Developing Security Procedures 237

    Maintaining Security 237

Security Mechanisms 238

    Physical Security 238

    Authentication 239

    Authorization 239

    Accounting (Auditing) 240

    Data Encryption 240

        Public/Private Key Encryption 241

    Packet Filters 243

    Firewalls 244

    Intrusion Detection and Prevention Systems 244

Modularizing Security Design 245

    Securing Internet Connections 245

        Securing Public Servers 246

        Securing E-Commerce Servers 247

    Securing Remote-Access and VPNs 248

        Securing Remote-Access Technologies 248

        Securing VPNs 249

    Securing Network Services and Network Management 250

    Securing Server Farms 251

    Securing User Services 252

    Securing Wireless Networks 253

        Authentication in Wireless Networks 254

        Data Privacy in Wireless Networks 258

Summary 261

Review Questions 261

Design Scenario 262

Chapter 9 Developing Network Management Strategies 263

Network Management Design 263

    Proactive Network Management 264

    Network Management Processes 264

        Fault Management 265

        Configuration Management 266

        Accounting Management 266

        Performance Management 266

        Security Management 268

Network Management Architectures 269

    In-Band Versus Out-of-Band Monitoring 270

    Centralized Versus Distributed Monitoring 270

Selecting Network Management Tools and Protocols 271

    Selecting Tools for Network Management 271

    Simple Network Management Protocol 271

        Management Information Bases (MIB) 272

        Remote Monitoring (RMON) 273

    Cisco Discovery Protocol 274

    Cisco NetFlow Accounting 276

    Estimating Network Traffic Caused by Network Management 276

Summary 277

Review Questions 278

Design Scenario 278

Summary for Part II 279

Part III Physical Network Design

Chapter 10 Selecting Technologies and Devices for Campus Networks 283

LAN Cabling Plant Design 284

    Cabling Topologies 284

        Building-Cabling Topologies 285

        Campus-Cabling Topologies 285

    Types of Cables 285

LAN Technologies 289

    Ethernet Basics 290

        Ethernet and IEEE 802.3 290

    Ethernet Technology Choices 291

        Half-Duplex and Full-Duplex Ethernet 292

        100-Mbps Ethernet 292

        Gigabit Ethernet 293

        10-Gbps Ethernet 295

Selecting Internetworking Devices for a Campus Network Design 299

    Criteria for Selecting Campus Internetworking Devices 300

    Optimization Features on Campus Internetworking Devices 302

Example of a Campus Network Design 303

    Background Information for the Campus Network Design Project 303

    Business Goals 304

    Technical Goals 304

    Network Applications 305

    User Communities 306

    Data Stores (Servers) 307

    Current Network at WVCC 307

        Traffic Characteristics of Network Applications 310

        Summary of Traffic Flows 311

        Performance Characteristics of the Current Network 312

    Network Redesign for WVCC 313

        Optimized IP Addressing and Routing for the Campus Backbone 313

        Wireless Network 314

        Improved Performance and Security for the Edge of the Network 315

Summary 316

Review Questions 317

Design Scenario 317

Chapter 11 Selecting Technologies and Devices for Enterprise Networks 319

Remote-Access Technologies 320

    PPP 321

        Multilink PPP and Multichassis Multilink PPP 321

        Password Authentication Protocol and Challenge Handshake

        Authentication Protocol 322

    Cable Modem Remote Access 323

        Challenges Associated with Cable Modem Systems 324

    Digital Subscriber Line Remote Access 325

        Other DSL Implementations 326

        PPP and ADSL 326

Selecting Remote-Access Devices for an Enterprise

    Network Design 327

    Selecting Devices for Remote Users 327

    Selecting Devices for the Central Site 328

WAN Technologies 328

    Systems for Provisioning WAN Bandwidth 329

    Leased Lines 330

    Synchronous Optical Network 331

    Frame Relay 332

        Frame Relay Hub-and-Spoke Topologies and Subinterfaces 333

        Frame Relay Congestion Control Mechanisms 335

        Frame Relay Traffic Control 335

        Frame Relay/ATM Interworking 336

    ATM 337

        Ethernet over ATM 337

    Metro Ethernet 338

    Selecting Routers for an Enterprise WAN Design 339

    Selecting a WAN Service Provider 340

Example of a WAN Design 341

    Background Information for the WAN Design Project 341

    Business and Technical Goals 342

    Network Applications 343

    User Communities 343

    Data Stores (Servers) 344

    Current Network 344

    Traffic Characteristics of the Existing WAN 345

    WAN Design for Klamath Paper Products 346

Summary 348

Review Questions 349

Design Scenario 349

Summary for Part III 350

Part IV Testing, Optimizing, and Documenting Your Network Design

Chapter 12 Testing Your Network Design 353

Using Industry Tests 354

Building and Testing a Prototype Network System 355

    Determining the Scope of a Prototype System 355

    Testing a Prototype on a Production Network 356

Writing and Implementing a Test Plan for Your Network Design 357

    Developing Test Objectives and Acceptance Criteria 357

    Determining the Types of Tests to Run 358

    Documenting Network Equipment and Other Resources 359

    Writing Test Scripts 360

    Documenting the Project Timeline 361

    Implementing the Test Plan 361

Tools for Testing a Network Design 362

    Types of Tools 362

    Examples of Network Testing Tools 363

        CiscoWorks Internetwork Performance Monitor 364

        WANDL Network Planning and Analysis Tools 364

        OPNET Technologies 364

        Ixia Tools 365

        NetIQ Voice and Video Management Solution 365

        NetPredict’s NetPredictor 365

Summary 366

Review Questions 366

Design Scenario 366

Chapter 13 Optimizing Your Network Design 367

Optimizing Bandwidth Usage with IP Multicast Technologies 368

    IP Multicast Addressing 369

    Internet Group Management Protocol 370

    Multicast Routing Protocols 370

        Distance Vector Multicast Routing Protocol 371

        Protocol Independent Multicast 371

Reducing Serialization Delay 372

    Link-Layer Fragmentation and Interleaving 373

    Compressed Real-Time Transport Protocol 374

Optimizing Network Performance to Meet Quality of Service Requirements 374

    IP Precedence and Type of Service 375

        IP Differentiated Services Field 376

    Resource Reservation Protocol 377

    Common Open Policy Service Protocol 379

    Classifying LAN Traffic 379

Cisco IOS Features for Optimizing Network Performance 380

    Switching Techniques 380

        Classic Methods for Layer 3 Packet Switching 381

        NetFlow Switching 382

        Cisco Express Forwarding 382

    Queuing Services 383

        First-In, First-Out Queuing 383

        Priority Queuing 384

        Custom Queuing 384

        Weighted Fair Queuing 385

        Class-Based Weighted Fair Queuing 386

        Low-Latency Queuing 387

    Random Early Detection 388

        Weighted Random Early Detection 388

    Traffic Shaping 389

    Committed Access Rate 389

Summary 389

Review Questions 390

Design Scenario 391

Chapter 14 Documenting Your Network Design 393

Responding to a Customer’s Request for Proposal 394

Contents of a Network Design Document 395

    Executive Summary 396

    Project Goal 396

    Project Scope 396

    Design Requirements 397

        Business Goals 397

        Technical Goals 398

        User Communities and Data Stores 399

        Network Applications 399

    Current State of the Network 399

    Logical Design 400

    Physical Design 400

    Results of Network Design Testing 401

    Implementation Plan 401

        Project Schedule 402

    Project Budget 403

        Return on Investment 403

    Design Document Appendix 404

Summary 404

Review Questions 405

Design Scenario 405

Glossary 407

9781587202834    TOC    8/2/2010

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020