Index_P


P

PADI, 373

PADO, 373

PADR, 373

PADS, 373

parallel computing, 188

path diversity, 450

pathchar, 107

PDPs, 351

Peer-to-Peer: Building Secure, Scalable, and Manageable Networks (Hebeler/Moore), 158

peer-to-peer architectural model, 233

peer-to-peer flow model, 178–180

peering, 220

PEP, 351

per-element characteristics, 301

per-flow funding, 191

per-link characteristics, 301

performance, 222, 332

performance architecture, 222–223, 330–355

architectural considerations, 350–353

background, 332–333

developing goals for performance, 333–336

evaluation of performance mechanisms, 350–351

external relationships, 352–353

internal relationships, 352

performance mechanisms, 336–350

policies, 348–350

prioritization, 340–341

QoS, 336–340

queuing, 344–346

reference books, 332

scheduling, 344

SLAs, 346–348

traffic management, 341–344

performance characteristics, 41–45

capacity, 41–42

delay, 42

devices, 74–76

performance envelopes, 44–45

RMA, 42–44

performance constraints, 79

performance envelope, 44–45

performance envelope with generic thresholds, 129

performance limits, 40

performance management, 310

performance measurements, 102

performance mechanisms, 336–350

performance mechanisms with policies added, 349

performance mechanisms with SLAs added, 349

performance profile, 169–170

performance thresholds, 40

performance upgrade paths, 402–405

persistent addresses, 251, 252

physical security, 366–367

ping, 42, 107, 124, 140, 304

ping loss rate, 140

PKI, 370–371

planned hierarchy, 430

Point-to-Point Protocol (PPP), 373

policies, 11, 273, 348–350

policy decision points (PDPs), 351

policy enforcement points (PEPs), 351

polling intervals, 304

postimplementation costs, 46

postimplementation phases of network life cycle, 46

PPP, 373

PPP over Ethernet (PPPoE), 373

PPPoE active discovery initiation (PADI), 373

PPPoE active discovery offer (PADO), 373

PPPoE active discovery request (PADR), 373

PPPoE active discovery session (PADS), 373

predictable performance requirements, 143–144

predictable service offerings, 38

predictable services, 33

presentation quality, 60

primary storage, 303

prioritization, 340–341

prioritizing flows, 189–191

priority levels, 341

privacy, 223. See also security and privacy architecture

private addresses, 252

private IP address, 251, 267

process of requirements analysis. See requirements analysis, process

profile, 169–170

protocol and application security, 367–369

protocol overhead analysis, 436–439

public addresses, 252

public IP addresses, 251

public key infrastructure (PKI), 370–371




Network Analysis, Architecture and Design
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
ISBN: 1558608877
EAN: 2147483647
Year: 2003
Pages: 161

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net