Network analysis, architecture, and design / (Record no. 650)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 08828cam a22002174a 4500 |
001 - CONTROL NUMBER | |
control field | 1919 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200707121819.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 070502s2007 ne a 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9788131212592 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | PK |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 004.65 |
Edition number | 22 |
Item number | M1211 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | McCabe, James D. |
245 10 - TITLE STATEMENT | |
Title | Network analysis, architecture, and design / |
Statement of responsibility, etc | James D. McCabe. |
250 ## - EDITION STATEMENT | |
Edition statement | 3rd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | New Delhi : |
Name of publisher, distributor, etc | Elsevier/Morgan Kaufmann Publishers, |
Date of publication, distribution, etc | 2008 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xx, 473 p. |
Other physical details | ill. ; |
Dimensions | 25 cm. |
500 ## - GENERAL NOTE | |
General note | Includes index. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Design and construction. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Contents<br/>Foreword viii<br/>Preface xvii<br/>Acknowledgments xix<br/>1 Introduction<br/>1.1 Objectives 3<br/>1.2 Preparation 3<br/>1.3 Background 3<br/>1.4 Overview of Analysis, Architecture, and Design Proceses 6<br/>1.4.1 Process Components 9<br/>1.4.2 Tactical and Strategic Significance 12<br/>1.4.3 Hierarchy and Diversity 14<br/>1.4.4 Importance of Network Analysis 18<br/>1.4.5 Model for Network Analysis, Architecture, and Design 24<br/>1.5 A Systems Methodology 27<br/>1.6 System Description 27<br/>1.7 Service Description 31<br/>1.8 Service Characteristics 33<br/>1.8.1 Service Levels 35<br/>1.8.2 System Components and Network Services 36<br/>1.8.3 Service Requests and Requirements 39<br/>1.8.4 Service Offerings 43<br/>1.8.5 Service Metrics 45<br/>1.9 Performance Characteristics 47<br/>1.9.1 Capacity 47<br/>1.9.2 Delay 48<br/>1.9.3 RMA 48<br/>1.9.4 Performance Envelopes 50<br/>1.10 Network Supportability 51<br/>1.11 Conclusion 53<br/>1.12 Exercises 54<br/>ix<br/>2 Requirements Analysis: Concepts<br/>2.1 Objectives 57<br/>2.1.1 Preparation 57<br/>2.2 Background 58<br/>2.2.1 Requirements and Features 58<br/>2.2.2 The Need for Requirements Analysis 61<br/>2.3 User Requirements 62<br/>2.4 Application Requirements 66<br/>2.4.1 Application Types 67<br/>2.4.2 Application Groups 73<br/>2.4.3 Application Locations 75<br/>2.5 Device Requirements 76<br/>2.5.1 Device Types 77<br/>2.5.2 Performance Characteristics 80<br/>2.5.3 Device Locations 81<br/>2.6 Network Requirements 83<br/>2.6.1 Existing Networks and Migration 84<br/>2.6.2 Network Management and Security 85<br/>2.7 Other Requirements 88<br/>2.7.1 Supplemental Performance Requirements 88<br/>2.7.2 Financial Requirements 89<br/>2.7.3 Enterprise Requirements 90<br/>2.8 The Requirements Specification and Map 90<br/>2.9 Conclusions 94<br/>2.10 Exercises 95<br/>3 Requirements Analysis: Process<br/>3.1 Objectives 99<br/>3.1.1 Preparation 99<br/>3.2 Gathering and Listing Requirements 100<br/>3.2.1 Determining Initial Conditions 100<br/>3.2.2 Setting Customer Expectations 104<br/>3.2.3 Working with Users 105<br/>3.2.4 Taking Performance Measurements 106<br/>3.2.5 Tracking and Managing Requirements 107<br/>3.2.6 Mapping Location Information 109<br/>3.3 Developing Service Metrics 109<br/>3.3.1 Measurement Tools 111<br/>3.3.2 Where to Apply Service Metrics 112<br/>3.4 Characterizing Behavior 113<br/>3.4.1 Modeling and Simulation 113<br/>3.4.2 User Behavior 115<br/>3.4.3 Application Behavior 116<br/>3.5 Developing RMA Requirements 117<br/>3.5.1 Reliability 117<br/>3.5.2 Maintainability 118<br/>3.5.3 Availability 118<br/>3.5.4 Thresholds and Limits 124<br/>3.6 Developing Delay Requirements 125<br/>3.6.1 End-to-End and Round-Trip Delays 129<br/>3.6.2 Delay Variation 130<br/>3.7 Developing Capacity Requirements 130<br/>3.7.1 Estimating Data Rates 130<br/>3.8 Developing Supplemental Performance Requirements 133<br/>3.8.1 Operational Suitability 134<br/>3.8.2 Supportability 137<br/>3.8.3 Confidence 143<br/>3.9 Environment-Specific Thresholds and Limits 145<br/>3.9.1 Comparing Application Requirements 146<br/>3.10 Requirements for Predictable and Guaranteed<br/>Performance 147<br/>3.10.1 Requirements for Predictable Performance 147<br/>3.10.2 Requirements for Guaranteed Performance 148<br/>3.11 Requirements Mapping 149<br/>3.12 Developing the Requirements Specification 151<br/>3.13 Conclusions 155<br/>3.14 Exercises 155<br/>4 Flow Analysis<br/>4.1 Objectives 161<br/>4.1.1 Preparation 161<br/>4.2 Background 162<br/>4.3 Flows 162<br/>4.3.1 Individual and Composite Flows 164<br/>4.3.2 Critical Flows 166<br/>4.4 Identifying and Developing Flows 167<br/>4.4.1 Focusing on a Particular Application 169<br/>4.4.2 Developing a Profile 172<br/>4.4.3 Choosing the Top N Applications 173<br/>4.5 Data Sources and Sinks 175<br/>4.6 Flow Models 180<br/>4.6.1 Peer-to-Peer 181<br/>4.6.2 Client-Server 183<br/>4.6.3 Hierarchical Client¿Server 185<br/>4.6.4 Distributed-Computing 188<br/>4.7 Flow Prioritization 191<br/>4.8 The Flow Specification 193<br/>4.8.1 Flowspec Algorithm 195<br/>4.8.2 Capacity and Service Planning 197<br/>4.9 Example Application of Flow Analysis 197<br/>4.10 Conclusions 205<br/>4.11 Exercises 206<br/>5 Network Architecture<br/>5.1 Objectives 211<br/>5.1.1 Preparation 211<br/>5.2 Background 211<br/>5.2.1 Architecture and Design 213<br/>5.3 Component Architectures 215<br/>5.3.1 Addressing/Routing Component Architecture 220<br/>5.3.2 Network Management Component Architecture 222<br/>5.3.3 Performance Component Architecture 223<br/>5.3.4 Security Component Architecture 225<br/>5.3.5 Optimizing Component Architectures 226<br/>5.4 Reference Architecture 227<br/>5.4.1 External Relationships 229<br/>5.4.2 Optimizing the Reference Architecture 230<br/>5.5 Architectural Models 232<br/>5.5.1 Topological Models 232<br/>5.5.2 Flow-Based Models 234<br/>5.5.3 Functional Models 237<br/>5.5.4 Using the Architectural Models 238<br/>5.6 Systems and Network Architectures 244<br/>5.7 Conclusions 245<br/>5.8 Exercises 246<br/>6 Addressing and Routing Architecture<br/>6.1 Objectives 249<br/>6.1.1 Preparation 249<br/>6.2 Background 250<br/>6.2.1 Addressing Fundamentals 251<br/>6.2.2 Routing Fundamentals 253<br/>6.3 Addressing Mechanisms 257<br/>6.3.1 Classful Addressing 257<br/>6.3.2 Subnetting 259<br/>6.3.3 Variable-Length Subnetting 262<br/>6.3.4 Supernetting 264<br/>6.3.5 Private Addressing and NAT 268<br/>6.4 Routing Mechanisms 269<br/>6.4.1 Establishing Routing Flows 269<br/>6.4.2 Identifying and Classifying Routing Boundaries 270<br/>6.4.3 Manipulating Routing Flows 273<br/>6.5 Addressing Strategies 278<br/>6.6 Routing Strategies 280<br/>6.6.1 Evaluating Routing Protocols 282<br/>6.6.2 Choosing and Applying Routing Protocols 287<br/>6.7 Architectural Considerations 291<br/>6.7.1 Internal Relationships 291<br/>6.7.2 External Relationships 292<br/>6.8 Conclusions 293<br/>6.9 Exercises 293<br/>7 Network Management Architecture<br/>7.1 Objectives 299<br/>7.1.1 Preparation 299<br/>7.2 Background 300<br/>7.3 Defining Network Management 300<br/>7.3.1 Network Devices and Characteristics 302<br/>7.4 Network Management Mechanisms 303<br/>7.4.1 Monitoring Mechanisms 304<br/>7.4.2 Instrumentation Mechanisms 308<br/>7.4.3 Configuration Mechanisms 310<br/>7.5 Architectural Considerations 311<br/>7.5.1 In-Band and Out-of-Band Management 312<br/>7.5.2 Centralized, Distributed, and Hierarchical<br/>Management 315<br/>7.5.3 Scaling Network Management Traffic 318<br/>7.5.4 Checks and Balances 319<br/>7.5.5 Managing Network Management Data 319<br/>7.5.6 MIB Selection 322<br/>7.5.7 Integration into OSS 323<br/>7.5.8 Internal Relationships 323<br/>7.5.9 External Relationships 326<br/>7.6 Conclusions 328<br/>7.7 Exercises 328<br/>8 Performance Architecture<br/>8.1 Objectives 333<br/>8.1.1 Preparation 333<br/>8.2 Background 334<br/>8.3 Developing Goals for Performance 335<br/>8.4 Performance Mechanisms 338<br/>8.4.1 Quality of Service 338<br/>8.4.2 Prioritization, Traffic Management, Scheduling,<br/>and Queuing 342<br/>8.4.3 Service-Level Agreements 348<br/>8.4.4 Policies 351<br/>8.5 Architectural Considerations 351<br/>8.5.1 Evaluation of Performance Mechanisms 352<br/>8.5.2 Internal Relationships 354<br/>8.5.3 External Relationships 354<br/>8.6 Conclusions 355<br/>8.7 Exercises 356<br/>9 Security and Privacy Architecture<br/>9.1 Objectives 359<br/>9.1.1 Preparation 359<br/>9.2 Background 360<br/>9.3 Developing a Security and Privacy Plan 361<br/>9.4 Security and Privacy Administration 362<br/>9.4.1 Threat Analysis 362<br/>9.4.2 Policies and Procedures 365<br/>9.5 Security and Privacy Mechanisms 367<br/>9.5.1 Physical Security and Awareness 368<br/>9.5.2 Protocol and Application Security 369<br/>9.5.3 Encryption/Decryption 371<br/>9.5.4 Network Perimeter Security 373<br/>9.5.5 Remote Access Security 374<br/>9.6 Architectural Considerations 377<br/>9.6.1 Evaluation of Security Mechanisms 377<br/>9.6.2 Internal Relationships 380<br/>9.6.3 External Relationships 380<br/>9.7 Conclusions 381<br/>9.8 Exercises 382<br/>10 Network Design<br/>10.1 Objectives 386<br/>10.1.1 Preparation 386<br/>10.2 Design Concepts 386<br/>10.2.1 Analogy to a Building Design 389<br/>10.2.2 Design Products 390<br/>10.2.3 Input to the Design 393<br/>10.3 Design Process 394<br/>10.4 Vendor, Equipment, and Service-Provider Evaluations 395<br/>10.4.1 Seeding the Evaluation Process 397<br/>10.4.2 Candidate Discussions 398<br/>10.4.3 Data Gathering 399<br/>10.4.4 Criteria Refinement and Ratings Development 401<br/>10.4.5 Ratings and Prioritization 403<br/>10.4.6 Modifying the Set of Candidates 405<br/>10.4.7 Determining the Order of Evaluations 407<br/>10.5 Network Layout 407<br/>10.5.1 Logical Diagrams 408<br/>10.5.2 Network Blueprints 409<br/>10.5.3 Component Plans 419<br/>10.6 Design Traceability 422<br/>10.7 Design Metrics 428<br/>10.8 Conclusions 429<br/>10.9 Exercises 431<br/>GLOSSARY OF TERMS 432<br/>GLOSSARY OF ACRONYMS 450<br/>INDEX 462<br/> |
Withdrawn status | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
UE-Central Library | UE-Central Library | 11.06.2018 | U.E. | 004.65 M1211 | T1919 | 11.06.2018 | 11.06.2018 | Books |