Flylib.com
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
ISBN: 1558608877
EAN: 2147483647
Year: 2003
Pages: 161
Authors:
James D. McCabe
BUY ON AMAZON
Table of Contents
BackCover
Network Analysis, Architecture, and Design, Second Edition
Foreword
Preface
Roadmap
Acknowledgments
Chapter 1: Introduction
1.2 Preparation
1.3 Background
1.4 Overview of Analysis, Architecture, and Design Processes
1.5 A Systems Methodology
1.6 System Description
1.7 Service Description
1.8 Service Characteristics
1.9 Performance Characteristics
1.10 Network Supportability
1.11 Conclusion
1.12 Exercises
Chapter 2: Requirements Analysis: Concepts
2.2 Preparation
2.3 Background
2.4 User Requirements
2.5 Application Requirements
2.6 Device Requirements
2.7 Network Requirements
2.8 Other Requirements
2.9 The Requirements Specification and Map
2.10 Conclusion
2.11 Exercises
Chapter 3: Requirements Analysis: Process
3.2 Preparation
3.3 Gathering and Listing Requirements
3.4 Developing Service Metrics
3.5 Characterizing Behavior
3.6 Developing RMA Requirements
3.7 Developing Delay Requirements
3.8 Developing Capacity Requirements
3.9 Developing Supplemental Performance Requirements
3.10 Environment-Specific Thresholds and Limits
3.11 Requirements for Predictable and Guaranteed Performance
3.12 Requirements Mapping
3.13 Developing the Requirements Specification
3.14 Conclusion
3.15 Exercises
Chapter 4: Flow Analysis
4.2 Preparation
4.3 Background
4.4 Flows
4.5 Identifying and Developing Flows
4.6 Data Sources and Sinks
4.7 Flow Models
4.8 Flow Prioritization
4.9 The Flow Specification
4.10 Example Application of Flow Analysis
4.11 Conclusion
4.12 Exercises
Chapter 5: Network Architecture
5.2 Preparation
5.3 Background
5.4 Component Architectures
5.5 Reference Architecture
5.6 Architectural Models
5.7 Systems and Network Architectures
5.8 Conclusion
5.9 Exercises
Chapter 6: Addressing and Routing Architecture
6.2 Preparation
6.3 Background
6.4 Addressing Mechanisms
6.5 Routing Mechanisms
6.6 Addressing Strategies
6.7 Routing Strategies
6.8 Architectural Considerations
6.9 Conclusion
6.10 Exercises
Chapter 7: Network Management Architecture
7.2 Preparation
7.3 Background
7.4 Defining Network Management
7.5 Network Management Mechanisms
7.6 Architectural Considerations
7.7 Conclusion
7.8 Exercises
Chapter 8: Performance Architecture
8.2 Preparation
8.3 Background
8.4 Developing Goals for Performance
8.5 Performance Mechanisms
8.6 Architectural Considerations
8.7 Conclusion
8.8 Exercises
Chapter 9: Security and Privacy Architecture
9.2 Preparation
9.3 Background
9.4 Developing a Security and Privacy Plan
9.5 Security and Privacy Administration
9.6 Security and Privacy Mechanisms
9.7 Architectural Considerations
9.8 Conclusion
9.9 Exercises
Chapter 10: Selecting Technologies for the Network Design
10.2 Preparation
10.3 Background
10.4 Developing Goals for the Network Design
10.5 Developing Criteria for Technology Evaluation
10.6 Guidelines and Constraints on Technology Evaluations
10.7 Making Technology Choices for the Network Design
10.8 Conclusion
10.9 Exercises
Chapter 11: Interconnecting Technologies Within the Network Design
11.2 Preparation
11.3 Background
11.4 Shared Medium (No Interconnection)
11.5 Switching
11.6 Routing
11.7 Hybrid Mechanisms
11.8 Applying Interconnection Mechanisms to the Design
11.9 Where to Go from Here
11.10 Conclusion
11.11 Exercises
Glossary of Terms
A-B
C
D-E
F-G
H-I
L-N
O-P
Q-R
S
T-V
W-X
Glossary of Acronyms
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
List of Examples
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
ISBN: 1558608877
EAN: 2147483647
Year: 2003
Pages: 161
Authors:
James D. McCabe
BUY ON AMAZON
Certified Ethical Hacker Exam Prep
Summary
Study Strategies
Cryptographic Attacks and Defenses
Encryption Cracking and Tools
Limitation of Liability
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying Project Schedule Risk
Identifying Project Resource Risk
Quantifying and Analyzing Project Risk
Monitoring and Controlling Risky Projects
Appendix A Selected Detail From the PERIL Database
GO! with Microsoft Office 2003 Brief (2nd Edition)
Project 1A. Exploring Outlook 2003
Problem Solving
Business Running Case
Objective 11. Perform What-If Analysis
Objective 1. Create a Presentation
Special Edition Using Crystal Reports 10
Troubleshooting
Creating Crystal Analysis Reports
Crystal Analysis in the Real World MDX
Troubleshooting
Installing the RAS SDK
Microsoft WSH and VBScript Programming for the Absolute Beginner
VBScript Basics
Handling Script Errors
Using the Windows Registry to Configure Script Settings
Appendix B Built-In VBScript Functions
Appendix C Whats on the CD-ROM?
Junos Cookbook (Cookbooks (OReilly))
Setting the Login Authentication Methods
SNMP
Configuring SNMP
Creating Static Routes
Moving IS-IS Traffic off a Router
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies