Flylib.com
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
ISBN: 1558608877
EAN: 2147483647
Year: 2003
Pages: 161
Authors:
James D. McCabe
BUY ON AMAZON
Table of Contents
BackCover
Network Analysis, Architecture, and Design, Second Edition
Foreword
Preface
Roadmap
Acknowledgments
Chapter 1: Introduction
1.2 Preparation
1.3 Background
1.4 Overview of Analysis, Architecture, and Design Processes
1.5 A Systems Methodology
1.6 System Description
1.7 Service Description
1.8 Service Characteristics
1.9 Performance Characteristics
1.10 Network Supportability
1.11 Conclusion
1.12 Exercises
Chapter 2: Requirements Analysis: Concepts
2.2 Preparation
2.3 Background
2.4 User Requirements
2.5 Application Requirements
2.6 Device Requirements
2.7 Network Requirements
2.8 Other Requirements
2.9 The Requirements Specification and Map
2.10 Conclusion
2.11 Exercises
Chapter 3: Requirements Analysis: Process
3.2 Preparation
3.3 Gathering and Listing Requirements
3.4 Developing Service Metrics
3.5 Characterizing Behavior
3.6 Developing RMA Requirements
3.7 Developing Delay Requirements
3.8 Developing Capacity Requirements
3.9 Developing Supplemental Performance Requirements
3.10 Environment-Specific Thresholds and Limits
3.11 Requirements for Predictable and Guaranteed Performance
3.12 Requirements Mapping
3.13 Developing the Requirements Specification
3.14 Conclusion
3.15 Exercises
Chapter 4: Flow Analysis
4.2 Preparation
4.3 Background
4.4 Flows
4.5 Identifying and Developing Flows
4.6 Data Sources and Sinks
4.7 Flow Models
4.8 Flow Prioritization
4.9 The Flow Specification
4.10 Example Application of Flow Analysis
4.11 Conclusion
4.12 Exercises
Chapter 5: Network Architecture
5.2 Preparation
5.3 Background
5.4 Component Architectures
5.5 Reference Architecture
5.6 Architectural Models
5.7 Systems and Network Architectures
5.8 Conclusion
5.9 Exercises
Chapter 6: Addressing and Routing Architecture
6.2 Preparation
6.3 Background
6.4 Addressing Mechanisms
6.5 Routing Mechanisms
6.6 Addressing Strategies
6.7 Routing Strategies
6.8 Architectural Considerations
6.9 Conclusion
6.10 Exercises
Chapter 7: Network Management Architecture
7.2 Preparation
7.3 Background
7.4 Defining Network Management
7.5 Network Management Mechanisms
7.6 Architectural Considerations
7.7 Conclusion
7.8 Exercises
Chapter 8: Performance Architecture
8.2 Preparation
8.3 Background
8.4 Developing Goals for Performance
8.5 Performance Mechanisms
8.6 Architectural Considerations
8.7 Conclusion
8.8 Exercises
Chapter 9: Security and Privacy Architecture
9.2 Preparation
9.3 Background
9.4 Developing a Security and Privacy Plan
9.5 Security and Privacy Administration
9.6 Security and Privacy Mechanisms
9.7 Architectural Considerations
9.8 Conclusion
9.9 Exercises
Chapter 10: Selecting Technologies for the Network Design
10.2 Preparation
10.3 Background
10.4 Developing Goals for the Network Design
10.5 Developing Criteria for Technology Evaluation
10.6 Guidelines and Constraints on Technology Evaluations
10.7 Making Technology Choices for the Network Design
10.8 Conclusion
10.9 Exercises
Chapter 11: Interconnecting Technologies Within the Network Design
11.2 Preparation
11.3 Background
11.4 Shared Medium (No Interconnection)
11.5 Switching
11.6 Routing
11.7 Hybrid Mechanisms
11.8 Applying Interconnection Mechanisms to the Design
11.9 Where to Go from Here
11.10 Conclusion
11.11 Exercises
Glossary of Terms
A-B
C
D-E
F-G
H-I
L-N
O-P
Q-R
S
T-V
W-X
Glossary of Acronyms
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
List of Examples
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
ISBN: 1558608877
EAN: 2147483647
Year: 2003
Pages: 161
Authors:
James D. McCabe
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Network Vulnerability Assessment
Choosing the Best Risk-Assessment Approach
Reducing the Risk of an Attack
A Brief History of Security Tools
Appendix E. SIRT Team Report Format Template
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Introduction to Kanban
Developing a Kanban Design
Auditing the Kanban
Appendix B Kanban Supermarkets
Appendix D Organizational Changes Required for Kanban
Cisco Voice Gateways and Gatekeepers
Implementing MGCP Gateways
Restricting Inbound Calls
Need for DSP Resources
Review Questions
Troubleshooting Gatekeepers
MPLS Configuration on Cisco IOS Software
Cell-Mode MPLS over ATM Overview, Configuration, and Verification
OSPF PE-CE Routing Protocol Overview, Configuration and Verification
Case Study-Inter-AS Implementing Route-Reflector and BGP Confederation in Provider Networks
Carrier Supporting Carriers
L2TPv3 Overview
FileMaker 8 Functions and Scripts Desk Reference
Summary Functions
DayName()
Get(ActiveFieldName)
Last()
Administering FileMaker Server from the Command Line
Python Programming for the Absolute Beginner, 3rd Edition
Threads
Generating Forward-Link Web Pages
Python/Tkinter for Tcl/Tk Converts
PyClock: An Analog/Digital Clock Widget
Section B.4. Running Python Programs
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies