Flylib.com
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
ISBN: 1558608877
EAN: 2147483647
Year: 2003
Pages: 161
Authors:
James D. McCabe
BUY ON AMAZON
Table of Contents
BackCover
Network Analysis, Architecture, and Design, Second Edition
Foreword
Preface
Roadmap
Acknowledgments
Chapter 1: Introduction
1.2 Preparation
1.3 Background
1.4 Overview of Analysis, Architecture, and Design Processes
1.5 A Systems Methodology
1.6 System Description
1.7 Service Description
1.8 Service Characteristics
1.9 Performance Characteristics
1.10 Network Supportability
1.11 Conclusion
1.12 Exercises
Chapter 2: Requirements Analysis: Concepts
2.2 Preparation
2.3 Background
2.4 User Requirements
2.5 Application Requirements
2.6 Device Requirements
2.7 Network Requirements
2.8 Other Requirements
2.9 The Requirements Specification and Map
2.10 Conclusion
2.11 Exercises
Chapter 3: Requirements Analysis: Process
3.2 Preparation
3.3 Gathering and Listing Requirements
3.4 Developing Service Metrics
3.5 Characterizing Behavior
3.6 Developing RMA Requirements
3.7 Developing Delay Requirements
3.8 Developing Capacity Requirements
3.9 Developing Supplemental Performance Requirements
3.10 Environment-Specific Thresholds and Limits
3.11 Requirements for Predictable and Guaranteed Performance
3.12 Requirements Mapping
3.13 Developing the Requirements Specification
3.14 Conclusion
3.15 Exercises
Chapter 4: Flow Analysis
4.2 Preparation
4.3 Background
4.4 Flows
4.5 Identifying and Developing Flows
4.6 Data Sources and Sinks
4.7 Flow Models
4.8 Flow Prioritization
4.9 The Flow Specification
4.10 Example Application of Flow Analysis
4.11 Conclusion
4.12 Exercises
Chapter 5: Network Architecture
5.2 Preparation
5.3 Background
5.4 Component Architectures
5.5 Reference Architecture
5.6 Architectural Models
5.7 Systems and Network Architectures
5.8 Conclusion
5.9 Exercises
Chapter 6: Addressing and Routing Architecture
6.2 Preparation
6.3 Background
6.4 Addressing Mechanisms
6.5 Routing Mechanisms
6.6 Addressing Strategies
6.7 Routing Strategies
6.8 Architectural Considerations
6.9 Conclusion
6.10 Exercises
Chapter 7: Network Management Architecture
7.2 Preparation
7.3 Background
7.4 Defining Network Management
7.5 Network Management Mechanisms
7.6 Architectural Considerations
7.7 Conclusion
7.8 Exercises
Chapter 8: Performance Architecture
8.2 Preparation
8.3 Background
8.4 Developing Goals for Performance
8.5 Performance Mechanisms
8.6 Architectural Considerations
8.7 Conclusion
8.8 Exercises
Chapter 9: Security and Privacy Architecture
9.2 Preparation
9.3 Background
9.4 Developing a Security and Privacy Plan
9.5 Security and Privacy Administration
9.6 Security and Privacy Mechanisms
9.7 Architectural Considerations
9.8 Conclusion
9.9 Exercises
Chapter 10: Selecting Technologies for the Network Design
10.2 Preparation
10.3 Background
10.4 Developing Goals for the Network Design
10.5 Developing Criteria for Technology Evaluation
10.6 Guidelines and Constraints on Technology Evaluations
10.7 Making Technology Choices for the Network Design
10.8 Conclusion
10.9 Exercises
Chapter 11: Interconnecting Technologies Within the Network Design
11.2 Preparation
11.3 Background
11.4 Shared Medium (No Interconnection)
11.5 Switching
11.6 Routing
11.7 Hybrid Mechanisms
11.8 Applying Interconnection Mechanisms to the Design
11.9 Where to Go from Here
11.10 Conclusion
11.11 Exercises
Glossary of Terms
A-B
C
D-E
F-G
H-I
L-N
O-P
Q-R
S
T-V
W-X
Glossary of Acronyms
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
List of Examples
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
ISBN: 1558608877
EAN: 2147483647
Year: 2003
Pages: 161
Authors:
James D. McCabe
BUY ON AMAZON
Qshell for iSeries
Additional Control Structures
The Integrated File System
Scripts - Debugging, Signals, and Traps
Grep
Appendix B Qshell versus DOS
Beginning Cryptography with Java
The JCA and the JCE
Symmetric Key Cryptography
Asymmetric Key Cryptography
CMS and S/MIME
Appendix C Using the Bouncy Castle API for Elliptic Curve
Software Configuration Management
Project Management in a CM Environment
Configuration Status Accounting
Appendix I System Service Request
Appendix N Corrective Action Processing (CAP)
Appendix Y Supplier CM Market Analysis Questionnaire
Snort Cookbook
Installing Snort from Source on Unix
Logging Application Data
Suppressing Rules
Managing Snort Sensors
Port Knocking
Documenting Software Architectures: Views and Beyond
Notations for the Module Viewtype
Discussion Questions
Why to Document Behavior
C4ISR Architecture Framework
Appendix A. Excerpts from a Software Architecture Documentation Package
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Converting Between Numeric Types
Finding the nth Instance of a Substring
XML
Using XML to Save and Restore a Collection of Objects
Miscellaneous
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies