Welcome to UE Central Library

Keep Smiling

Network analysis, architecture, and design / (Record no. 650)

MARC details
000 -LEADER
fixed length control field 08828cam a22002174a 4500
001 - CONTROL NUMBER
control field 1919
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200707121819.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 070502s2007 ne a 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788131212592
040 ## - CATALOGING SOURCE
Transcribing agency PK
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.65
Edition number 22
Item number M1211
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name McCabe, James D.
245 10 - TITLE STATEMENT
Title Network analysis, architecture, and design /
Statement of responsibility, etc James D. McCabe.
250 ## - EDITION STATEMENT
Edition statement 3rd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New Delhi :
Name of publisher, distributor, etc Elsevier/Morgan Kaufmann Publishers,
Date of publication, distribution, etc 2008
300 ## - PHYSICAL DESCRIPTION
Extent xx, 473 p.
Other physical details ill. ;
Dimensions 25 cm.
500 ## - GENERAL NOTE
General note Includes index.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Design and construction.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Contents<br/>Foreword viii<br/>Preface xvii<br/>Acknowledgments xix<br/>1 Introduction<br/>1.1 Objectives 3<br/>1.2 Preparation 3<br/>1.3 Background 3<br/>1.4 Overview of Analysis, Architecture, and Design Proceses 6<br/>1.4.1 Process Components 9<br/>1.4.2 Tactical and Strategic Significance 12<br/>1.4.3 Hierarchy and Diversity 14<br/>1.4.4 Importance of Network Analysis 18<br/>1.4.5 Model for Network Analysis, Architecture, and Design 24<br/>1.5 A Systems Methodology 27<br/>1.6 System Description 27<br/>1.7 Service Description 31<br/>1.8 Service Characteristics 33<br/>1.8.1 Service Levels 35<br/>1.8.2 System Components and Network Services 36<br/>1.8.3 Service Requests and Requirements 39<br/>1.8.4 Service Offerings 43<br/>1.8.5 Service Metrics 45<br/>1.9 Performance Characteristics 47<br/>1.9.1 Capacity 47<br/>1.9.2 Delay 48<br/>1.9.3 RMA 48<br/>1.9.4 Performance Envelopes 50<br/>1.10 Network Supportability 51<br/>1.11 Conclusion 53<br/>1.12 Exercises 54<br/>ix<br/>2 Requirements Analysis: Concepts<br/>2.1 Objectives 57<br/>2.1.1 Preparation 57<br/>2.2 Background 58<br/>2.2.1 Requirements and Features 58<br/>2.2.2 The Need for Requirements Analysis 61<br/>2.3 User Requirements 62<br/>2.4 Application Requirements 66<br/>2.4.1 Application Types 67<br/>2.4.2 Application Groups 73<br/>2.4.3 Application Locations 75<br/>2.5 Device Requirements 76<br/>2.5.1 Device Types 77<br/>2.5.2 Performance Characteristics 80<br/>2.5.3 Device Locations 81<br/>2.6 Network Requirements 83<br/>2.6.1 Existing Networks and Migration 84<br/>2.6.2 Network Management and Security 85<br/>2.7 Other Requirements 88<br/>2.7.1 Supplemental Performance Requirements 88<br/>2.7.2 Financial Requirements 89<br/>2.7.3 Enterprise Requirements 90<br/>2.8 The Requirements Specification and Map 90<br/>2.9 Conclusions 94<br/>2.10 Exercises 95<br/>3 Requirements Analysis: Process<br/>3.1 Objectives 99<br/>3.1.1 Preparation 99<br/>3.2 Gathering and Listing Requirements 100<br/>3.2.1 Determining Initial Conditions 100<br/>3.2.2 Setting Customer Expectations 104<br/>3.2.3 Working with Users 105<br/>3.2.4 Taking Performance Measurements 106<br/>3.2.5 Tracking and Managing Requirements 107<br/>3.2.6 Mapping Location Information 109<br/>3.3 Developing Service Metrics 109<br/>3.3.1 Measurement Tools 111<br/>3.3.2 Where to Apply Service Metrics 112<br/>3.4 Characterizing Behavior 113<br/>3.4.1 Modeling and Simulation 113<br/>3.4.2 User Behavior 115<br/>3.4.3 Application Behavior 116<br/>3.5 Developing RMA Requirements 117<br/>3.5.1 Reliability 117<br/>3.5.2 Maintainability 118<br/>3.5.3 Availability 118<br/>3.5.4 Thresholds and Limits 124<br/>3.6 Developing Delay Requirements 125<br/>3.6.1 End-to-End and Round-Trip Delays 129<br/>3.6.2 Delay Variation 130<br/>3.7 Developing Capacity Requirements 130<br/>3.7.1 Estimating Data Rates 130<br/>3.8 Developing Supplemental Performance Requirements 133<br/>3.8.1 Operational Suitability 134<br/>3.8.2 Supportability 137<br/>3.8.3 Confidence 143<br/>3.9 Environment-Specific Thresholds and Limits 145<br/>3.9.1 Comparing Application Requirements 146<br/>3.10 Requirements for Predictable and Guaranteed<br/>Performance 147<br/>3.10.1 Requirements for Predictable Performance 147<br/>3.10.2 Requirements for Guaranteed Performance 148<br/>3.11 Requirements Mapping 149<br/>3.12 Developing the Requirements Specification 151<br/>3.13 Conclusions 155<br/>3.14 Exercises 155<br/>4 Flow Analysis<br/>4.1 Objectives 161<br/>4.1.1 Preparation 161<br/>4.2 Background 162<br/>4.3 Flows 162<br/>4.3.1 Individual and Composite Flows 164<br/>4.3.2 Critical Flows 166<br/>4.4 Identifying and Developing Flows 167<br/>4.4.1 Focusing on a Particular Application 169<br/>4.4.2 Developing a Profile 172<br/>4.4.3 Choosing the Top N Applications 173<br/>4.5 Data Sources and Sinks 175<br/>4.6 Flow Models 180<br/>4.6.1 Peer-to-Peer 181<br/>4.6.2 Client-Server 183<br/>4.6.3 Hierarchical Client¿Server 185<br/>4.6.4 Distributed-Computing 188<br/>4.7 Flow Prioritization 191<br/>4.8 The Flow Specification 193<br/>4.8.1 Flowspec Algorithm 195<br/>4.8.2 Capacity and Service Planning 197<br/>4.9 Example Application of Flow Analysis 197<br/>4.10 Conclusions 205<br/>4.11 Exercises 206<br/>5 Network Architecture<br/>5.1 Objectives 211<br/>5.1.1 Preparation 211<br/>5.2 Background 211<br/>5.2.1 Architecture and Design 213<br/>5.3 Component Architectures 215<br/>5.3.1 Addressing/Routing Component Architecture 220<br/>5.3.2 Network Management Component Architecture 222<br/>5.3.3 Performance Component Architecture 223<br/>5.3.4 Security Component Architecture 225<br/>5.3.5 Optimizing Component Architectures 226<br/>5.4 Reference Architecture 227<br/>5.4.1 External Relationships 229<br/>5.4.2 Optimizing the Reference Architecture 230<br/>5.5 Architectural Models 232<br/>5.5.1 Topological Models 232<br/>5.5.2 Flow-Based Models 234<br/>5.5.3 Functional Models 237<br/>5.5.4 Using the Architectural Models 238<br/>5.6 Systems and Network Architectures 244<br/>5.7 Conclusions 245<br/>5.8 Exercises 246<br/>6 Addressing and Routing Architecture<br/>6.1 Objectives 249<br/>6.1.1 Preparation 249<br/>6.2 Background 250<br/>6.2.1 Addressing Fundamentals 251<br/>6.2.2 Routing Fundamentals 253<br/>6.3 Addressing Mechanisms 257<br/>6.3.1 Classful Addressing 257<br/>6.3.2 Subnetting 259<br/>6.3.3 Variable-Length Subnetting 262<br/>6.3.4 Supernetting 264<br/>6.3.5 Private Addressing and NAT 268<br/>6.4 Routing Mechanisms 269<br/>6.4.1 Establishing Routing Flows 269<br/>6.4.2 Identifying and Classifying Routing Boundaries 270<br/>6.4.3 Manipulating Routing Flows 273<br/>6.5 Addressing Strategies 278<br/>6.6 Routing Strategies 280<br/>6.6.1 Evaluating Routing Protocols 282<br/>6.6.2 Choosing and Applying Routing Protocols 287<br/>6.7 Architectural Considerations 291<br/>6.7.1 Internal Relationships 291<br/>6.7.2 External Relationships 292<br/>6.8 Conclusions 293<br/>6.9 Exercises 293<br/>7 Network Management Architecture<br/>7.1 Objectives 299<br/>7.1.1 Preparation 299<br/>7.2 Background 300<br/>7.3 Defining Network Management 300<br/>7.3.1 Network Devices and Characteristics 302<br/>7.4 Network Management Mechanisms 303<br/>7.4.1 Monitoring Mechanisms 304<br/>7.4.2 Instrumentation Mechanisms 308<br/>7.4.3 Configuration Mechanisms 310<br/>7.5 Architectural Considerations 311<br/>7.5.1 In-Band and Out-of-Band Management 312<br/>7.5.2 Centralized, Distributed, and Hierarchical<br/>Management 315<br/>7.5.3 Scaling Network Management Traffic 318<br/>7.5.4 Checks and Balances 319<br/>7.5.5 Managing Network Management Data 319<br/>7.5.6 MIB Selection 322<br/>7.5.7 Integration into OSS 323<br/>7.5.8 Internal Relationships 323<br/>7.5.9 External Relationships 326<br/>7.6 Conclusions 328<br/>7.7 Exercises 328<br/>8 Performance Architecture<br/>8.1 Objectives 333<br/>8.1.1 Preparation 333<br/>8.2 Background 334<br/>8.3 Developing Goals for Performance 335<br/>8.4 Performance Mechanisms 338<br/>8.4.1 Quality of Service 338<br/>8.4.2 Prioritization, Traffic Management, Scheduling,<br/>and Queuing 342<br/>8.4.3 Service-Level Agreements 348<br/>8.4.4 Policies 351<br/>8.5 Architectural Considerations 351<br/>8.5.1 Evaluation of Performance Mechanisms 352<br/>8.5.2 Internal Relationships 354<br/>8.5.3 External Relationships 354<br/>8.6 Conclusions 355<br/>8.7 Exercises 356<br/>9 Security and Privacy Architecture<br/>9.1 Objectives 359<br/>9.1.1 Preparation 359<br/>9.2 Background 360<br/>9.3 Developing a Security and Privacy Plan 361<br/>9.4 Security and Privacy Administration 362<br/>9.4.1 Threat Analysis 362<br/>9.4.2 Policies and Procedures 365<br/>9.5 Security and Privacy Mechanisms 367<br/>9.5.1 Physical Security and Awareness 368<br/>9.5.2 Protocol and Application Security 369<br/>9.5.3 Encryption/Decryption 371<br/>9.5.4 Network Perimeter Security 373<br/>9.5.5 Remote Access Security 374<br/>9.6 Architectural Considerations 377<br/>9.6.1 Evaluation of Security Mechanisms 377<br/>9.6.2 Internal Relationships 380<br/>9.6.3 External Relationships 380<br/>9.7 Conclusions 381<br/>9.8 Exercises 382<br/>10 Network Design<br/>10.1 Objectives 386<br/>10.1.1 Preparation 386<br/>10.2 Design Concepts 386<br/>10.2.1 Analogy to a Building Design 389<br/>10.2.2 Design Products 390<br/>10.2.3 Input to the Design 393<br/>10.3 Design Process 394<br/>10.4 Vendor, Equipment, and Service-Provider Evaluations 395<br/>10.4.1 Seeding the Evaluation Process 397<br/>10.4.2 Candidate Discussions 398<br/>10.4.3 Data Gathering 399<br/>10.4.4 Criteria Refinement and Ratings Development 401<br/>10.4.5 Ratings and Prioritization 403<br/>10.4.6 Modifying the Set of Candidates 405<br/>10.4.7 Determining the Order of Evaluations 407<br/>10.5 Network Layout 407<br/>10.5.1 Logical Diagrams 408<br/>10.5.2 Network Blueprints 409<br/>10.5.3 Component Plans 419<br/>10.6 Design Traceability 422<br/>10.7 Design Metrics 428<br/>10.8 Conclusions 429<br/>10.9 Exercises 431<br/>GLOSSARY OF TERMS 432<br/>GLOSSARY OF ACRONYMS 450<br/>INDEX 462<br/>
Holdings
Withdrawn status Damaged status Not for loan Home library Current library Date acquired Source of acquisition Full call number Barcode Date last seen Price effective from Koha item type
      UE-Central Library UE-Central Library 11.06.2018 U.E. 004.65 M1211 T1919 11.06.2018 11.06.2018 Books
Copyright © 2023, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk