Welcome to UE Central Library

Keep Smiling

Network analysis, architecture, and design / James D. McCabe.

By: Material type: TextTextPublication details: New Delhi : Elsevier/Morgan Kaufmann Publishers, 2008Edition: 3rd edDescription: xx, 473 p. ill. ; 25 cmISBN:
  • 9788131212592
Subject(s): DDC classification:
  • 004.65 22 M1211
Contents:
Contents Foreword viii Preface xvii Acknowledgments xix 1 Introduction 1.1 Objectives 3 1.2 Preparation 3 1.3 Background 3 1.4 Overview of Analysis, Architecture, and Design Proceses 6 1.4.1 Process Components 9 1.4.2 Tactical and Strategic Significance 12 1.4.3 Hierarchy and Diversity 14 1.4.4 Importance of Network Analysis 18 1.4.5 Model for Network Analysis, Architecture, and Design 24 1.5 A Systems Methodology 27 1.6 System Description 27 1.7 Service Description 31 1.8 Service Characteristics 33 1.8.1 Service Levels 35 1.8.2 System Components and Network Services 36 1.8.3 Service Requests and Requirements 39 1.8.4 Service Offerings 43 1.8.5 Service Metrics 45 1.9 Performance Characteristics 47 1.9.1 Capacity 47 1.9.2 Delay 48 1.9.3 RMA 48 1.9.4 Performance Envelopes 50 1.10 Network Supportability 51 1.11 Conclusion 53 1.12 Exercises 54 ix 2 Requirements Analysis: Concepts 2.1 Objectives 57 2.1.1 Preparation 57 2.2 Background 58 2.2.1 Requirements and Features 58 2.2.2 The Need for Requirements Analysis 61 2.3 User Requirements 62 2.4 Application Requirements 66 2.4.1 Application Types 67 2.4.2 Application Groups 73 2.4.3 Application Locations 75 2.5 Device Requirements 76 2.5.1 Device Types 77 2.5.2 Performance Characteristics 80 2.5.3 Device Locations 81 2.6 Network Requirements 83 2.6.1 Existing Networks and Migration 84 2.6.2 Network Management and Security 85 2.7 Other Requirements 88 2.7.1 Supplemental Performance Requirements 88 2.7.2 Financial Requirements 89 2.7.3 Enterprise Requirements 90 2.8 The Requirements Specification and Map 90 2.9 Conclusions 94 2.10 Exercises 95 3 Requirements Analysis: Process 3.1 Objectives 99 3.1.1 Preparation 99 3.2 Gathering and Listing Requirements 100 3.2.1 Determining Initial Conditions 100 3.2.2 Setting Customer Expectations 104 3.2.3 Working with Users 105 3.2.4 Taking Performance Measurements 106 3.2.5 Tracking and Managing Requirements 107 3.2.6 Mapping Location Information 109 3.3 Developing Service Metrics 109 3.3.1 Measurement Tools 111 3.3.2 Where to Apply Service Metrics 112 3.4 Characterizing Behavior 113 3.4.1 Modeling and Simulation 113 3.4.2 User Behavior 115 3.4.3 Application Behavior 116 3.5 Developing RMA Requirements 117 3.5.1 Reliability 117 3.5.2 Maintainability 118 3.5.3 Availability 118 3.5.4 Thresholds and Limits 124 3.6 Developing Delay Requirements 125 3.6.1 End-to-End and Round-Trip Delays 129 3.6.2 Delay Variation 130 3.7 Developing Capacity Requirements 130 3.7.1 Estimating Data Rates 130 3.8 Developing Supplemental Performance Requirements 133 3.8.1 Operational Suitability 134 3.8.2 Supportability 137 3.8.3 Confidence 143 3.9 Environment-Specific Thresholds and Limits 145 3.9.1 Comparing Application Requirements 146 3.10 Requirements for Predictable and Guaranteed Performance 147 3.10.1 Requirements for Predictable Performance 147 3.10.2 Requirements for Guaranteed Performance 148 3.11 Requirements Mapping 149 3.12 Developing the Requirements Specification 151 3.13 Conclusions 155 3.14 Exercises 155 4 Flow Analysis 4.1 Objectives 161 4.1.1 Preparation 161 4.2 Background 162 4.3 Flows 162 4.3.1 Individual and Composite Flows 164 4.3.2 Critical Flows 166 4.4 Identifying and Developing Flows 167 4.4.1 Focusing on a Particular Application 169 4.4.2 Developing a Profile 172 4.4.3 Choosing the Top N Applications 173 4.5 Data Sources and Sinks 175 4.6 Flow Models 180 4.6.1 Peer-to-Peer 181 4.6.2 Client-Server 183 4.6.3 Hierarchical Client¿Server 185 4.6.4 Distributed-Computing 188 4.7 Flow Prioritization 191 4.8 The Flow Specification 193 4.8.1 Flowspec Algorithm 195 4.8.2 Capacity and Service Planning 197 4.9 Example Application of Flow Analysis 197 4.10 Conclusions 205 4.11 Exercises 206 5 Network Architecture 5.1 Objectives 211 5.1.1 Preparation 211 5.2 Background 211 5.2.1 Architecture and Design 213 5.3 Component Architectures 215 5.3.1 Addressing/Routing Component Architecture 220 5.3.2 Network Management Component Architecture 222 5.3.3 Performance Component Architecture 223 5.3.4 Security Component Architecture 225 5.3.5 Optimizing Component Architectures 226 5.4 Reference Architecture 227 5.4.1 External Relationships 229 5.4.2 Optimizing the Reference Architecture 230 5.5 Architectural Models 232 5.5.1 Topological Models 232 5.5.2 Flow-Based Models 234 5.5.3 Functional Models 237 5.5.4 Using the Architectural Models 238 5.6 Systems and Network Architectures 244 5.7 Conclusions 245 5.8 Exercises 246 6 Addressing and Routing Architecture 6.1 Objectives 249 6.1.1 Preparation 249 6.2 Background 250 6.2.1 Addressing Fundamentals 251 6.2.2 Routing Fundamentals 253 6.3 Addressing Mechanisms 257 6.3.1 Classful Addressing 257 6.3.2 Subnetting 259 6.3.3 Variable-Length Subnetting 262 6.3.4 Supernetting 264 6.3.5 Private Addressing and NAT 268 6.4 Routing Mechanisms 269 6.4.1 Establishing Routing Flows 269 6.4.2 Identifying and Classifying Routing Boundaries 270 6.4.3 Manipulating Routing Flows 273 6.5 Addressing Strategies 278 6.6 Routing Strategies 280 6.6.1 Evaluating Routing Protocols 282 6.6.2 Choosing and Applying Routing Protocols 287 6.7 Architectural Considerations 291 6.7.1 Internal Relationships 291 6.7.2 External Relationships 292 6.8 Conclusions 293 6.9 Exercises 293 7 Network Management Architecture 7.1 Objectives 299 7.1.1 Preparation 299 7.2 Background 300 7.3 Defining Network Management 300 7.3.1 Network Devices and Characteristics 302 7.4 Network Management Mechanisms 303 7.4.1 Monitoring Mechanisms 304 7.4.2 Instrumentation Mechanisms 308 7.4.3 Configuration Mechanisms 310 7.5 Architectural Considerations 311 7.5.1 In-Band and Out-of-Band Management 312 7.5.2 Centralized, Distributed, and Hierarchical Management 315 7.5.3 Scaling Network Management Traffic 318 7.5.4 Checks and Balances 319 7.5.5 Managing Network Management Data 319 7.5.6 MIB Selection 322 7.5.7 Integration into OSS 323 7.5.8 Internal Relationships 323 7.5.9 External Relationships 326 7.6 Conclusions 328 7.7 Exercises 328 8 Performance Architecture 8.1 Objectives 333 8.1.1 Preparation 333 8.2 Background 334 8.3 Developing Goals for Performance 335 8.4 Performance Mechanisms 338 8.4.1 Quality of Service 338 8.4.2 Prioritization, Traffic Management, Scheduling, and Queuing 342 8.4.3 Service-Level Agreements 348 8.4.4 Policies 351 8.5 Architectural Considerations 351 8.5.1 Evaluation of Performance Mechanisms 352 8.5.2 Internal Relationships 354 8.5.3 External Relationships 354 8.6 Conclusions 355 8.7 Exercises 356 9 Security and Privacy Architecture 9.1 Objectives 359 9.1.1 Preparation 359 9.2 Background 360 9.3 Developing a Security and Privacy Plan 361 9.4 Security and Privacy Administration 362 9.4.1 Threat Analysis 362 9.4.2 Policies and Procedures 365 9.5 Security and Privacy Mechanisms 367 9.5.1 Physical Security and Awareness 368 9.5.2 Protocol and Application Security 369 9.5.3 Encryption/Decryption 371 9.5.4 Network Perimeter Security 373 9.5.5 Remote Access Security 374 9.6 Architectural Considerations 377 9.6.1 Evaluation of Security Mechanisms 377 9.6.2 Internal Relationships 380 9.6.3 External Relationships 380 9.7 Conclusions 381 9.8 Exercises 382 10 Network Design 10.1 Objectives 386 10.1.1 Preparation 386 10.2 Design Concepts 386 10.2.1 Analogy to a Building Design 389 10.2.2 Design Products 390 10.2.3 Input to the Design 393 10.3 Design Process 394 10.4 Vendor, Equipment, and Service-Provider Evaluations 395 10.4.1 Seeding the Evaluation Process 397 10.4.2 Candidate Discussions 398 10.4.3 Data Gathering 399 10.4.4 Criteria Refinement and Ratings Development 401 10.4.5 Ratings and Prioritization 403 10.4.6 Modifying the Set of Candidates 405 10.4.7 Determining the Order of Evaluations 407 10.5 Network Layout 407 10.5.1 Logical Diagrams 408 10.5.2 Network Blueprints 409 10.5.3 Component Plans 419 10.6 Design Traceability 422 10.7 Design Metrics 428 10.8 Conclusions 429 10.9 Exercises 431 GLOSSARY OF TERMS 432 GLOSSARY OF ACRONYMS 450 INDEX 462
List(s) this item appears in: Computer | Computer_2022
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Books Books UE-Central Library 004.65 M1211 (Browse shelf(Opens below)) Available T1919

Includes index.

Contents
Foreword viii
Preface xvii
Acknowledgments xix
1 Introduction
1.1 Objectives 3
1.2 Preparation 3
1.3 Background 3
1.4 Overview of Analysis, Architecture, and Design Proceses 6
1.4.1 Process Components 9
1.4.2 Tactical and Strategic Significance 12
1.4.3 Hierarchy and Diversity 14
1.4.4 Importance of Network Analysis 18
1.4.5 Model for Network Analysis, Architecture, and Design 24
1.5 A Systems Methodology 27
1.6 System Description 27
1.7 Service Description 31
1.8 Service Characteristics 33
1.8.1 Service Levels 35
1.8.2 System Components and Network Services 36
1.8.3 Service Requests and Requirements 39
1.8.4 Service Offerings 43
1.8.5 Service Metrics 45
1.9 Performance Characteristics 47
1.9.1 Capacity 47
1.9.2 Delay 48
1.9.3 RMA 48
1.9.4 Performance Envelopes 50
1.10 Network Supportability 51
1.11 Conclusion 53
1.12 Exercises 54
ix
2 Requirements Analysis: Concepts
2.1 Objectives 57
2.1.1 Preparation 57
2.2 Background 58
2.2.1 Requirements and Features 58
2.2.2 The Need for Requirements Analysis 61
2.3 User Requirements 62
2.4 Application Requirements 66
2.4.1 Application Types 67
2.4.2 Application Groups 73
2.4.3 Application Locations 75
2.5 Device Requirements 76
2.5.1 Device Types 77
2.5.2 Performance Characteristics 80
2.5.3 Device Locations 81
2.6 Network Requirements 83
2.6.1 Existing Networks and Migration 84
2.6.2 Network Management and Security 85
2.7 Other Requirements 88
2.7.1 Supplemental Performance Requirements 88
2.7.2 Financial Requirements 89
2.7.3 Enterprise Requirements 90
2.8 The Requirements Specification and Map 90
2.9 Conclusions 94
2.10 Exercises 95
3 Requirements Analysis: Process
3.1 Objectives 99
3.1.1 Preparation 99
3.2 Gathering and Listing Requirements 100
3.2.1 Determining Initial Conditions 100
3.2.2 Setting Customer Expectations 104
3.2.3 Working with Users 105
3.2.4 Taking Performance Measurements 106
3.2.5 Tracking and Managing Requirements 107
3.2.6 Mapping Location Information 109
3.3 Developing Service Metrics 109
3.3.1 Measurement Tools 111
3.3.2 Where to Apply Service Metrics 112
3.4 Characterizing Behavior 113
3.4.1 Modeling and Simulation 113
3.4.2 User Behavior 115
3.4.3 Application Behavior 116
3.5 Developing RMA Requirements 117
3.5.1 Reliability 117
3.5.2 Maintainability 118
3.5.3 Availability 118
3.5.4 Thresholds and Limits 124
3.6 Developing Delay Requirements 125
3.6.1 End-to-End and Round-Trip Delays 129
3.6.2 Delay Variation 130
3.7 Developing Capacity Requirements 130
3.7.1 Estimating Data Rates 130
3.8 Developing Supplemental Performance Requirements 133
3.8.1 Operational Suitability 134
3.8.2 Supportability 137
3.8.3 Confidence 143
3.9 Environment-Specific Thresholds and Limits 145
3.9.1 Comparing Application Requirements 146
3.10 Requirements for Predictable and Guaranteed
Performance 147
3.10.1 Requirements for Predictable Performance 147
3.10.2 Requirements for Guaranteed Performance 148
3.11 Requirements Mapping 149
3.12 Developing the Requirements Specification 151
3.13 Conclusions 155
3.14 Exercises 155
4 Flow Analysis
4.1 Objectives 161
4.1.1 Preparation 161
4.2 Background 162
4.3 Flows 162
4.3.1 Individual and Composite Flows 164
4.3.2 Critical Flows 166
4.4 Identifying and Developing Flows 167
4.4.1 Focusing on a Particular Application 169
4.4.2 Developing a Profile 172
4.4.3 Choosing the Top N Applications 173
4.5 Data Sources and Sinks 175
4.6 Flow Models 180
4.6.1 Peer-to-Peer 181
4.6.2 Client-Server 183
4.6.3 Hierarchical Client¿Server 185
4.6.4 Distributed-Computing 188
4.7 Flow Prioritization 191
4.8 The Flow Specification 193
4.8.1 Flowspec Algorithm 195
4.8.2 Capacity and Service Planning 197
4.9 Example Application of Flow Analysis 197
4.10 Conclusions 205
4.11 Exercises 206
5 Network Architecture
5.1 Objectives 211
5.1.1 Preparation 211
5.2 Background 211
5.2.1 Architecture and Design 213
5.3 Component Architectures 215
5.3.1 Addressing/Routing Component Architecture 220
5.3.2 Network Management Component Architecture 222
5.3.3 Performance Component Architecture 223
5.3.4 Security Component Architecture 225
5.3.5 Optimizing Component Architectures 226
5.4 Reference Architecture 227
5.4.1 External Relationships 229
5.4.2 Optimizing the Reference Architecture 230
5.5 Architectural Models 232
5.5.1 Topological Models 232
5.5.2 Flow-Based Models 234
5.5.3 Functional Models 237
5.5.4 Using the Architectural Models 238
5.6 Systems and Network Architectures 244
5.7 Conclusions 245
5.8 Exercises 246
6 Addressing and Routing Architecture
6.1 Objectives 249
6.1.1 Preparation 249
6.2 Background 250
6.2.1 Addressing Fundamentals 251
6.2.2 Routing Fundamentals 253
6.3 Addressing Mechanisms 257
6.3.1 Classful Addressing 257
6.3.2 Subnetting 259
6.3.3 Variable-Length Subnetting 262
6.3.4 Supernetting 264
6.3.5 Private Addressing and NAT 268
6.4 Routing Mechanisms 269
6.4.1 Establishing Routing Flows 269
6.4.2 Identifying and Classifying Routing Boundaries 270
6.4.3 Manipulating Routing Flows 273
6.5 Addressing Strategies 278
6.6 Routing Strategies 280
6.6.1 Evaluating Routing Protocols 282
6.6.2 Choosing and Applying Routing Protocols 287
6.7 Architectural Considerations 291
6.7.1 Internal Relationships 291
6.7.2 External Relationships 292
6.8 Conclusions 293
6.9 Exercises 293
7 Network Management Architecture
7.1 Objectives 299
7.1.1 Preparation 299
7.2 Background 300
7.3 Defining Network Management 300
7.3.1 Network Devices and Characteristics 302
7.4 Network Management Mechanisms 303
7.4.1 Monitoring Mechanisms 304
7.4.2 Instrumentation Mechanisms 308
7.4.3 Configuration Mechanisms 310
7.5 Architectural Considerations 311
7.5.1 In-Band and Out-of-Band Management 312
7.5.2 Centralized, Distributed, and Hierarchical
Management 315
7.5.3 Scaling Network Management Traffic 318
7.5.4 Checks and Balances 319
7.5.5 Managing Network Management Data 319
7.5.6 MIB Selection 322
7.5.7 Integration into OSS 323
7.5.8 Internal Relationships 323
7.5.9 External Relationships 326
7.6 Conclusions 328
7.7 Exercises 328
8 Performance Architecture
8.1 Objectives 333
8.1.1 Preparation 333
8.2 Background 334
8.3 Developing Goals for Performance 335
8.4 Performance Mechanisms 338
8.4.1 Quality of Service 338
8.4.2 Prioritization, Traffic Management, Scheduling,
and Queuing 342
8.4.3 Service-Level Agreements 348
8.4.4 Policies 351
8.5 Architectural Considerations 351
8.5.1 Evaluation of Performance Mechanisms 352
8.5.2 Internal Relationships 354
8.5.3 External Relationships 354
8.6 Conclusions 355
8.7 Exercises 356
9 Security and Privacy Architecture
9.1 Objectives 359
9.1.1 Preparation 359
9.2 Background 360
9.3 Developing a Security and Privacy Plan 361
9.4 Security and Privacy Administration 362
9.4.1 Threat Analysis 362
9.4.2 Policies and Procedures 365
9.5 Security and Privacy Mechanisms 367
9.5.1 Physical Security and Awareness 368
9.5.2 Protocol and Application Security 369
9.5.3 Encryption/Decryption 371
9.5.4 Network Perimeter Security 373
9.5.5 Remote Access Security 374
9.6 Architectural Considerations 377
9.6.1 Evaluation of Security Mechanisms 377
9.6.2 Internal Relationships 380
9.6.3 External Relationships 380
9.7 Conclusions 381
9.8 Exercises 382
10 Network Design
10.1 Objectives 386
10.1.1 Preparation 386
10.2 Design Concepts 386
10.2.1 Analogy to a Building Design 389
10.2.2 Design Products 390
10.2.3 Input to the Design 393
10.3 Design Process 394
10.4 Vendor, Equipment, and Service-Provider Evaluations 395
10.4.1 Seeding the Evaluation Process 397
10.4.2 Candidate Discussions 398
10.4.3 Data Gathering 399
10.4.4 Criteria Refinement and Ratings Development 401
10.4.5 Ratings and Prioritization 403
10.4.6 Modifying the Set of Candidates 405
10.4.7 Determining the Order of Evaluations 407
10.5 Network Layout 407
10.5.1 Logical Diagrams 408
10.5.2 Network Blueprints 409
10.5.3 Component Plans 419
10.6 Design Traceability 422
10.7 Design Metrics 428
10.8 Conclusions 429
10.9 Exercises 431
GLOSSARY OF TERMS 432
GLOSSARY OF ACRONYMS 450
INDEX 462

There are no comments on this title.

to post a comment.
Copyright © 2023, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk