Hacking Exposed: Network Security Secrets & Solutions (McClure et al.), 358
hard boundary, 270
hard state, 396
hierarchical client-server architectural model, 234
hierarchical client-server flow model, 182–186
hierarchical management, 314–315, 324
hierarchy, 7–8, 12–13, 449–450, 454
hierarchy added to a network, 8, 9
high performance, 36
high-redundancy path, 452–453
High-Speed Networking: A Systematic Approach to High-Bandwidth Low-Latency Communication (Sterbenz/Touch), 332
hot-standby path, 452
human response time (HRT), 122
hybrid mechanisms, 445–448
MPOA, 446–447
NHRP, 445–446
service switching, 447–448