Index_R


R

RADIUS, 373

random early detect (RED), 346

rate-critical applications, 63, 64

RBD, 134, 135

readily available, 451

real-time, 65

real-time analysis, 304

real-time applications, 65–66

real-time telemetry stream, 38

RED, 346

red flags, 101–102

redundancy, 114, 392, 450–453, 454

reference architecture, 225–229

reference books. See Sources of information

reference network architecture, 5

regions, 217

rejected requirements, 55

reliability, 42–43, 60, 113

reliability block diagram (RBD), 134, 135

remote access, 372

remote access dial-in user service (RADIUS), 373

remote access security, 372–375

repair and spare parts, 137–138

repairing system failure, 113

requirements, 30, 31, 54

requirements analysis, 52–155

application requirements, 62–71

device requirements, 71–78

enterprise requirements, 85

financial requirements, 84–85

key words/phrases, 56

network requirements, 78–83

process, 94–155. See also Requirements analysis, process

reference books, 54

requirements map, 89

requirements specification, 85–88

supplemental performance requirements, 83–84

user requirements, 58–62

why needed, 56

requirements analysis, process, 94–155. See also requirements analysis

capacity requirements, 126–129

characterizing behavior, 108–112

customer expectations, 100

delay requirements, 121–126

environmental-specific thresholds, 140–142

gathering/listing requirements, 96–104

initial conditions, 96–100

mapping location information, 104

performance measurements, 102

predictable/guaranteed performance, 143–145

requirements mapping, 145–146

requirements specification, 146–148

RMA requirements, 113–121

service metrics, 105–108

supplemental performance requirements, 129–140

tracking/managing requirements, 103–104

working with users, 100–102

Requirements Engineering: A Good Practice Guide (Sommerville et al.), 54

requirements map, 58, 89

requirements mapping, 145–146

requirements specification, 57, 85–88, 146–148

requirements tracking/management, 87, 103–104

resource control, 222

resource reservation protocol (RSVP), 337

RFC, 23

RFC 1918, 267

RFC 2119, 56

RFC 2225, 441

RFC 2474, 332

RFC 2475, 332

RFC 2863, 321

RFC 3261, 342

RIP, 283

RIPv2, 283

risk analysis, 82

RMA, 42–44, 63–64, 133–134

RMA improvement, 404

RMA requirements, 113–121

round-trip delay, 42, 124

route aggregation, 273

route filter, 272

route filtering, 272

route-manipulation techniques, 272–277

routing, 248, 443–445

routing boundaries, 269–271

routing evolution, 14

routing flows, 268–269, 271, 272–277

routing fundamentals, 251–254

Routing in the Internet (Huitema), 210

routing management domains, 269

routing mechanisms, 268–277

routing policies, 220

routing protocols, 252, 270, 281–290

routing strategies, 280–290

RSVP, 337




Network Analysis, Architecture and Design
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
ISBN: 1558608877
EAN: 2147483647
Year: 2003
Pages: 161

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net