scaling dependencies, 79
scaling network management traffic, 316–317
scheduling, 344
scientific visualization, 185
second-generation networks, 11
secondary storage, 303
secure sockets library (SSL), 371
security, 61, 223
security and privacy architecture, 223–224, 356–383
architectural considerations, 375–380
assets to be protected, 361
classic security considerations, 358
developing a plan, 359–360
encryption/decryption, 369–371
evaluation of security mechanisms, 375–378
external relationships, 379–380
internal relationships, 378–379
network perimeter security, 371–372
physical security, 366–367
policies/procedures, 363–365
protocol and application security, 367–369
reference books, 358
remote access security, 372–375
security and privacy mechanisms, 365–375
security awareness, 367
security zones, 376–378
threat analysis, 360–363
security and privacy mechanisms, 365–375
security awareness, 367
security domains, 270
security from natural disasters, 366–367
security management, 310
security perimeters, 376
security policies and procedures, 363–365
security requirements, 82–83
security task assessment, 82
security zones, 376–378
segmenting the network, 413–418
selecting technology for network design, 384–423
applying evaluation criteria/guidelines, 420
background, 386–387
broadcast/NBMA technologies, 394–399
design goals, 387–391
flow considerations, 405–406
guidelines/constraints on technology evaluations, 406–412
isolating areas (black-box method), 418–420
making the technology choices, 412–420
reference books, 386
segmenting the network, 413–418
technology evaluation, 392–412
technology functions/features, 400–402
selective copying of data, 318–319
server-to-manager flows, 183
server-to-server flows, 183
servers, 73
service characteristics, 26–40
service levels, 28–30
service metrics, 39–40
service offerings, 37–39
service requests and requirements, 33–37
system components and network services, 30–33
service description, 25–26
service-level agreements (SLAs), 11, 346–348
service levels, 28–30
service management, 299
service metrics, 39–40, 105–108
service offering, 27
service offerings, 37–39
service plan, 195
service planning, 389, 406
service-provider architectural model, 235, 236
service request, 27
service requests and requirements, 33–37
service requirements, 30
service switching, 447–448
services, 25
session, 397
shaping, 342–343
shared, multiprocessor computing network, 128
shared-medium mechanism, 429–431
should not/not recommended, 56
should/recommended, 56
Simple Network Management Protocol (SNMP) (Case et al.), 210, 298
simulation, 109
simulation of network performance behavior, 110
single-tier/multitier performance architectural model, 235–236
single-tier performance networks, 99
single-tier performance requirements, 36
sizing the network design, 413–418
SLAs, 11, 346–348
SMDS, 17
Sniffer, 102
SNMP, 302
SNMP, SNMPv2, SNMPv3, and RMON 1 and 2 (Stallings), 297
SNMP security, 369
SNMP version 3 (SNMPv3), 302
soft boundary, 271
soft state, 396
SONET (Goralski), 426
SONET OC levels, 403
sources of information
addressing/routing architecture, 248
basics, 2
flow analysis, 158
interconnection strategies, 425–426
network architecture, 210
network management architecture, 297–298
performance architecture, 332
requirements analysis, 54
security and privacy architecture, 358
selecting technologies, 386
spare and repair parts, 137–138
specialized devices, 74, 75
specification
flow, 191–195
requirements, 57, 85–88, 146–148
SSL, 371
state, 396
stateful, 396
stateless, 396
static NAT, 268, 371
static routes, 282
storage archives, 303
stub network, 282
subnet, 258
subnet mask, 258, 259
subnetting, 258–260
Successful SAP R/3 Implementation: Practical Management of ERP Projects (Welti), 158
supernet mask, 264
supernetting, 262–267
supplemental performance requirements, 83–84, 129–140
support concept, 138
supportability, 45–47, 61, 133–138, 392
Switch Book: The Complete Guide to LAN Switching Technology, The (Seifert), 426
Switched, Fast, and Gigabit Ethernet (Riley/Breyer), 2, 386, 426
switched multimegabit data service (SMDS), 17
switching, 431–443
system, 20
system and component technical documentation, 136
system components and network services, 30–33
system description, 20–25
system OAM&P applications, 70
system state, 398
system with ATM in network, 23, 24
systems architecture, 243
Systems Engineering: Coping with Complexity (Arnold et al.), 54
systems methodology, 19