PADI, 373
PADO, 373
PADR, 373
PADS, 373
parallel computing, 188
path diversity, 450
pathchar, 107
PDPs, 351
Peer-to-Peer: Building Secure, Scalable, and Manageable Networks (Hebeler/Moore), 158
peer-to-peer architectural model, 233
peer-to-peer flow model, 178–180
peering, 220
PEP, 351
per-element characteristics, 301
per-flow funding, 191
per-link characteristics, 301
performance, 222, 332
performance architecture, 222–223, 330–355
architectural considerations, 350–353
background, 332–333
developing goals for performance, 333–336
evaluation of performance mechanisms, 350–351
external relationships, 352–353
internal relationships, 352
performance mechanisms, 336–350
policies, 348–350
prioritization, 340–341
QoS, 336–340
queuing, 344–346
reference books, 332
scheduling, 344
SLAs, 346–348
traffic management, 341–344
performance characteristics, 41–45
capacity, 41–42
delay, 42
devices, 74–76
performance envelopes, 44–45
RMA, 42–44
performance constraints, 79
performance envelope, 44–45
performance envelope with generic thresholds, 129
performance limits, 40
performance management, 310
performance measurements, 102
performance mechanisms, 336–350
performance mechanisms with policies added, 349
performance mechanisms with SLAs added, 349
performance profile, 169–170
performance thresholds, 40
performance upgrade paths, 402–405
persistent addresses, 251, 252
physical security, 366–367
ping, 42, 107, 124, 140, 304
ping loss rate, 140
PKI, 370–371
planned hierarchy, 430
Point-to-Point Protocol (PPP), 373
policies, 11, 273, 348–350
policy decision points (PDPs), 351
policy enforcement points (PEPs), 351
polling intervals, 304
postimplementation costs, 46
postimplementation phases of network life cycle, 46
PPP, 373
PPP over Ethernet (PPPoE), 373
PPPoE active discovery initiation (PADI), 373
PPPoE active discovery offer (PADO), 373
PPPoE active discovery request (PADR), 373
PPPoE active discovery session (PADS), 373
predictable performance requirements, 143–144
predictable service offerings, 38
predictable services, 33
presentation quality, 60
primary storage, 303
prioritization, 340–341
prioritizing flows, 189–191
priority levels, 341
privacy, 223. See also security and privacy architecture
private addresses, 252
private IP address, 251, 267
process of requirements analysis. See requirements analysis, process
profile, 169–170
protocol and application security, 367–369
protocol overhead analysis, 436–439
public addresses, 252
public IP addresses, 251
public key infrastructure (PKI), 370–371