Index_S


S

scaling dependencies, 79

scaling network management traffic, 316–317

scheduling, 344

scientific visualization, 185

second-generation networks, 11

secondary storage, 303

secure sockets library (SSL), 371

security, 61, 223

security and privacy architecture, 223–224, 356–383

architectural considerations, 375–380

assets to be protected, 361

classic security considerations, 358

developing a plan, 359–360

encryption/decryption, 369–371

evaluation of security mechanisms, 375–378

external relationships, 379–380

internal relationships, 378–379

network perimeter security, 371–372

physical security, 366–367

policies/procedures, 363–365

protocol and application security, 367–369

reference books, 358

remote access security, 372–375

security and privacy mechanisms, 365–375

security awareness, 367

security zones, 376–378

threat analysis, 360–363

security and privacy mechanisms, 365–375

security awareness, 367

security domains, 270

security from natural disasters, 366–367

security management, 310

security perimeters, 376

security policies and procedures, 363–365

security requirements, 82–83

security task assessment, 82

security zones, 376–378

segmenting the network, 413–418

selecting technology for network design, 384–423

applying evaluation criteria/guidelines, 420

background, 386–387

broadcast/NBMA technologies, 394–399

design goals, 387–391

flow considerations, 405–406

guidelines/constraints on technology evaluations, 406–412

isolating areas (black-box method), 418–420

making the technology choices, 412–420

reference books, 386

segmenting the network, 413–418

technology evaluation, 392–412

technology functions/features, 400–402

selective copying of data, 318–319

server-to-manager flows, 183

server-to-server flows, 183

servers, 73

service characteristics, 26–40

service levels, 28–30

service metrics, 39–40

service offerings, 37–39

service requests and requirements, 33–37

system components and network services, 30–33

service description, 25–26

service-level agreements (SLAs), 11, 346–348

service levels, 28–30

service management, 299

service metrics, 39–40, 105–108

service offering, 27

service offerings, 37–39

service plan, 195

service planning, 389, 406

service-provider architectural model, 235, 236

service request, 27

service requests and requirements, 33–37

service requirements, 30

service switching, 447–448

services, 25

session, 397

shaping, 342–343

shared, multiprocessor computing network, 128

shared-medium mechanism, 429–431

should not/not recommended, 56

should/recommended, 56

Simple Network Management Protocol (SNMP) (Case et al.), 210, 298

simulation, 109

simulation of network performance behavior, 110

single-tier/multitier performance architectural model, 235–236

single-tier performance networks, 99

single-tier performance requirements, 36

sizing the network design, 413–418

SLAs, 11, 346–348

SMDS, 17

Sniffer, 102

SNMP, 302

SNMP, SNMPv2, SNMPv3, and RMON 1 and 2 (Stallings), 297

SNMP security, 369

SNMP version 3 (SNMPv3), 302

soft boundary, 271

soft state, 396

SONET (Goralski), 426

SONET OC levels, 403

sources of information

addressing/routing architecture, 248

basics, 2

flow analysis, 158

interconnection strategies, 425–426

network architecture, 210

network management architecture, 297–298

performance architecture, 332

requirements analysis, 54

security and privacy architecture, 358

selecting technologies, 386

spare and repair parts, 137–138

specialized devices, 74, 75

specification

flow, 191–195

requirements, 57, 85–88, 146–148

SSL, 371

state, 396

stateful, 396

stateless, 396

static NAT, 268, 371

static routes, 282

storage archives, 303

stub network, 282

subnet, 258

subnet mask, 258, 259

subnetting, 258–260

Successful SAP R/3 Implementation: Practical Management of ERP Projects (Welti), 158

supernet mask, 264

supernetting, 262–267

supplemental performance requirements, 83–84, 129–140

support concept, 138

supportability, 45–47, 61, 133–138, 392

Switch Book: The Complete Guide to LAN Switching Technology, The (Seifert), 426

Switched, Fast, and Gigabit Ethernet (Riley/Breyer), 2, 386, 426

switched multimegabit data service (SMDS), 17

switching, 431–443

system, 20

system and component technical documentation, 136

system components and network services, 30–33

system description, 20–25

system OAM&P applications, 70

system state, 398

system with ATM in network, 23, 24

systems architecture, 243

Systems Engineering: Coping with Complexity (Arnold et al.), 54

systems methodology, 19




Network Analysis, Architecture and Design
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
ISBN: 1558608877
EAN: 2147483647
Year: 2003
Pages: 161

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net