Flylib.com
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
ISBN: 1558608877
EAN: 2147483647
Year: 2003
Pages: 161
Authors:
James D. McCabe
BUY ON AMAZON
Table of Contents
BackCover
Network Analysis, Architecture, and Design, Second Edition
Foreword
Preface
Roadmap
Acknowledgments
Chapter 1: Introduction
1.2 Preparation
1.3 Background
1.4 Overview of Analysis, Architecture, and Design Processes
1.5 A Systems Methodology
1.6 System Description
1.7 Service Description
1.8 Service Characteristics
1.9 Performance Characteristics
1.10 Network Supportability
1.11 Conclusion
1.12 Exercises
Chapter 2: Requirements Analysis: Concepts
2.2 Preparation
2.3 Background
2.4 User Requirements
2.5 Application Requirements
2.6 Device Requirements
2.7 Network Requirements
2.8 Other Requirements
2.9 The Requirements Specification and Map
2.10 Conclusion
2.11 Exercises
Chapter 3: Requirements Analysis: Process
3.2 Preparation
3.3 Gathering and Listing Requirements
3.4 Developing Service Metrics
3.5 Characterizing Behavior
3.6 Developing RMA Requirements
3.7 Developing Delay Requirements
3.8 Developing Capacity Requirements
3.9 Developing Supplemental Performance Requirements
3.10 Environment-Specific Thresholds and Limits
3.11 Requirements for Predictable and Guaranteed Performance
3.12 Requirements Mapping
3.13 Developing the Requirements Specification
3.14 Conclusion
3.15 Exercises
Chapter 4: Flow Analysis
4.2 Preparation
4.3 Background
4.4 Flows
4.5 Identifying and Developing Flows
4.6 Data Sources and Sinks
4.7 Flow Models
4.8 Flow Prioritization
4.9 The Flow Specification
4.10 Example Application of Flow Analysis
4.11 Conclusion
4.12 Exercises
Chapter 5: Network Architecture
5.2 Preparation
5.3 Background
5.4 Component Architectures
5.5 Reference Architecture
5.6 Architectural Models
5.7 Systems and Network Architectures
5.8 Conclusion
5.9 Exercises
Chapter 6: Addressing and Routing Architecture
6.2 Preparation
6.3 Background
6.4 Addressing Mechanisms
6.5 Routing Mechanisms
6.6 Addressing Strategies
6.7 Routing Strategies
6.8 Architectural Considerations
6.9 Conclusion
6.10 Exercises
Chapter 7: Network Management Architecture
7.2 Preparation
7.3 Background
7.4 Defining Network Management
7.5 Network Management Mechanisms
7.6 Architectural Considerations
7.7 Conclusion
7.8 Exercises
Chapter 8: Performance Architecture
8.2 Preparation
8.3 Background
8.4 Developing Goals for Performance
8.5 Performance Mechanisms
8.6 Architectural Considerations
8.7 Conclusion
8.8 Exercises
Chapter 9: Security and Privacy Architecture
9.2 Preparation
9.3 Background
9.4 Developing a Security and Privacy Plan
9.5 Security and Privacy Administration
9.6 Security and Privacy Mechanisms
9.7 Architectural Considerations
9.8 Conclusion
9.9 Exercises
Chapter 10: Selecting Technologies for the Network Design
10.2 Preparation
10.3 Background
10.4 Developing Goals for the Network Design
10.5 Developing Criteria for Technology Evaluation
10.6 Guidelines and Constraints on Technology Evaluations
10.7 Making Technology Choices for the Network Design
10.8 Conclusion
10.9 Exercises
Chapter 11: Interconnecting Technologies Within the Network Design
11.2 Preparation
11.3 Background
11.4 Shared Medium (No Interconnection)
11.5 Switching
11.6 Routing
11.7 Hybrid Mechanisms
11.8 Applying Interconnection Mechanisms to the Design
11.9 Where to Go from Here
11.10 Conclusion
11.11 Exercises
Glossary of Terms
A-B
C
D-E
F-G
H-I
L-N
O-P
Q-R
S
T-V
W-X
Glossary of Acronyms
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
List of Examples
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
ISBN: 1558608877
EAN: 2147483647
Year: 2003
Pages: 161
Authors:
James D. McCabe
BUY ON AMAZON
Strategies for Information Technology Governance
Integration Strategies and Tactics for Information Technology Governance
Assessing Business-IT Alignment Maturity
Measuring ROI in E-Commerce Applications: Analysis to Action
Managing IT Functions
Governance Structures for IT in the Health Care Industry
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Understanding Cisco Unified CallManager
Configuring Cisco Unified CallManager to Support IP Phones
Introduction to Media Resources
PKI Topologies in Cisco IP Telephony
User Report Configuration
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
The Microsoft Client Library for AJAX
The Pulsing Heart of ASP.NET AJAX
Partial Page Rendering
Remote Method Calls with ASP.NET AJAX
Special Edition Using Crystal Reports 10
Understanding the Crystal Reports Gallery
Troubleshooting
Versions of Crystal Enterprise
Part VII. Customized Report Distribution Using Crystal Enterprise Embedded Edition
Deploying RAS Environments
Java Concurrency in Practice
Instance Confinement
Amdahls Law
Explicit Locks
Managing State Dependence
AbstractQueuedSynchronizer
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Using the System.Management Namespace
Handling WMI Events
The WMI Schema
WMI Security
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies