Flylib.com
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
ISBN: 1558608877
EAN: 2147483647
Year: 2003
Pages: 161
Authors:
James D. McCabe
BUY ON AMAZON
Table of Contents
BackCover
Network Analysis, Architecture, and Design, Second Edition
Foreword
Preface
Roadmap
Acknowledgments
Chapter 1: Introduction
1.2 Preparation
1.3 Background
1.4 Overview of Analysis, Architecture, and Design Processes
1.5 A Systems Methodology
1.6 System Description
1.7 Service Description
1.8 Service Characteristics
1.9 Performance Characteristics
1.10 Network Supportability
1.11 Conclusion
1.12 Exercises
Chapter 2: Requirements Analysis: Concepts
2.2 Preparation
2.3 Background
2.4 User Requirements
2.5 Application Requirements
2.6 Device Requirements
2.7 Network Requirements
2.8 Other Requirements
2.9 The Requirements Specification and Map
2.10 Conclusion
2.11 Exercises
Chapter 3: Requirements Analysis: Process
3.2 Preparation
3.3 Gathering and Listing Requirements
3.4 Developing Service Metrics
3.5 Characterizing Behavior
3.6 Developing RMA Requirements
3.7 Developing Delay Requirements
3.8 Developing Capacity Requirements
3.9 Developing Supplemental Performance Requirements
3.10 Environment-Specific Thresholds and Limits
3.11 Requirements for Predictable and Guaranteed Performance
3.12 Requirements Mapping
3.13 Developing the Requirements Specification
3.14 Conclusion
3.15 Exercises
Chapter 4: Flow Analysis
4.2 Preparation
4.3 Background
4.4 Flows
4.5 Identifying and Developing Flows
4.6 Data Sources and Sinks
4.7 Flow Models
4.8 Flow Prioritization
4.9 The Flow Specification
4.10 Example Application of Flow Analysis
4.11 Conclusion
4.12 Exercises
Chapter 5: Network Architecture
5.2 Preparation
5.3 Background
5.4 Component Architectures
5.5 Reference Architecture
5.6 Architectural Models
5.7 Systems and Network Architectures
5.8 Conclusion
5.9 Exercises
Chapter 6: Addressing and Routing Architecture
6.2 Preparation
6.3 Background
6.4 Addressing Mechanisms
6.5 Routing Mechanisms
6.6 Addressing Strategies
6.7 Routing Strategies
6.8 Architectural Considerations
6.9 Conclusion
6.10 Exercises
Chapter 7: Network Management Architecture
7.2 Preparation
7.3 Background
7.4 Defining Network Management
7.5 Network Management Mechanisms
7.6 Architectural Considerations
7.7 Conclusion
7.8 Exercises
Chapter 8: Performance Architecture
8.2 Preparation
8.3 Background
8.4 Developing Goals for Performance
8.5 Performance Mechanisms
8.6 Architectural Considerations
8.7 Conclusion
8.8 Exercises
Chapter 9: Security and Privacy Architecture
9.2 Preparation
9.3 Background
9.4 Developing a Security and Privacy Plan
9.5 Security and Privacy Administration
9.6 Security and Privacy Mechanisms
9.7 Architectural Considerations
9.8 Conclusion
9.9 Exercises
Chapter 10: Selecting Technologies for the Network Design
10.2 Preparation
10.3 Background
10.4 Developing Goals for the Network Design
10.5 Developing Criteria for Technology Evaluation
10.6 Guidelines and Constraints on Technology Evaluations
10.7 Making Technology Choices for the Network Design
10.8 Conclusion
10.9 Exercises
Chapter 11: Interconnecting Technologies Within the Network Design
11.2 Preparation
11.3 Background
11.4 Shared Medium (No Interconnection)
11.5 Switching
11.6 Routing
11.7 Hybrid Mechanisms
11.8 Applying Interconnection Mechanisms to the Design
11.9 Where to Go from Here
11.10 Conclusion
11.11 Exercises
Glossary of Terms
A-B
C
D-E
F-G
H-I
L-N
O-P
Q-R
S
T-V
W-X
Glossary of Acronyms
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
List of Examples
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
ISBN: 1558608877
EAN: 2147483647
Year: 2003
Pages: 161
Authors:
James D. McCabe
BUY ON AMAZON
Beginning Cryptography with Java
The JCA and the JCE
Message Digests, MACs, and HMACs
Certificate Revocation and Path Validation
CMS and S/MIME
Appendix B Algorithms Provided by the Bouncy Castle Provider
Snort Cookbook
Invisibly Sniffing 100 MB Ethernet
Reloading Snort Settings
Building a Distributed IDS (Encrypted)
Decoding Application Traffic
Securing ACID
Mastering Delphi 7
Multitier DataSnap Applications
Reporting with Rave
Web Programming with WebBroker and WebSnap
The Microsoft .NET Architecture from the Delphi Perspective
Appendix B Extra Delphi Tools from Other Sources
InDesign Type: Professional Typography with Adobe InDesign CS2
Getting the Lead Out
The Glyphs Palette
Applying Styles
Gradient Type
Shaping Text Frames
Java Concurrency in Practice
Liveness and Performance
Composing Objects
The Executor Framework
Why are GUIs Single-threaded?
Summary
Python Programming for the Absolute Beginner, 3rd Edition
The Greps of Wrath
Fixing DOS Line Ends
Part IV: Assorted Topics
Wrapping C Environment Calls
A C Extension Type String Stack
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies