Index_N


N

NAPT, 268, 371

NAT, 276–278, 292, 371–372

native ATM network, 23, 24

native broadcast support, 394–396

natural mask, 31, 32

NBMA technologies, 394–399

network, system, and support service dependencies, 80

network address, 249–251

network address port translation (NAPT), 268, 371

network address translation (NAT), 276–278, 292, 371–372

network analysis, 4–5

network architecture, 5, 6, 208–245

architectural models, 229–243. See also architectural models

architecture/design, contrasted, 211–213

component architectures, 214–225. See also component architectures

reference architecture, 225–229

reference books, 210

systems architecture, 243

what is it, 243–244

network design, 6, 211–213, 386

network device, 301

network-element management, 299

network environment, 5

network file server (NFS), 398

network management, 221, 298–301

network management and security, 80–83

network management architecture, 221–222, 296–329

architectural considerations, 309–326

areas to be addressed, 298

centralized management, 313

chicks and balances, 317

configuration mechanisms, 308–309

distributed management, 313–314

external relationships, 325–326

FCAPS mode, 309–310

hierarchical management, 314–315

in-band/out-of-band management, 310–312

instrumentation mechanisms, 306–308

integration into OSS, 321

internal relationships, 322–324

management of network management data, 318–320

MIB selection, 320–321

monitoring mechanisms, 302–306

network devices/characteristics, 301

network management, defined, 299–301

network management mechanisms, 302–309

reference books, 297–298

scaling network management traffic, 316–317

network management data, 318–320

network management mechanisms, 302–309

network management protocol, 302

network management requirements, 81–82

network management tasks, 80–81

network obsolescence, 80

network perimeter security, 371–372

network privacy, 358. See also security and privacy architecture

network propagation delay, 122

network requirements, 9, 78–83

network security, 358. See also security and privacy architecture

network services, 25–26

network supportability, 45–47

network/system complexity, 11–15

network uptime, 114–121

next generation capabilities, 12

next-hop resolution protocol (NHRP), 445–446

next-hop router, 254

NFS, 398

NHRP, 445–446

99.999% uptime requirement, 119

non-real time applications, 66

nonbroadcast multiple-access (NBMA) technologies, 394–399

nonconforming traffic, 342–343

northbound interface, 321




Network Analysis, Architecture and Design
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
ISBN: 1558608877
EAN: 2147483647
Year: 2003
Pages: 161

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net