It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_nuls

Record ID marc_nuls/NULS_PHC_180925.mrc:326771259:7054
Source marc_nuls
Download Link /show-records/marc_nuls/NULS_PHC_180925.mrc:326771259:7054?format=raw

LEADER: 07054cam 22003258a 4500
001 9921544830001661
005 20150423135122.0
008 030305s2003 caua 001 0 eng
015 $aGBA3-X3708
020 $a1558608877
029 0 $aUKM$bbA3X3708
035 $a(CSdNU)u185117-01national_inst
035 $a(OCoLC)52193592
035 $a(OCoLC)52193592
040 $aUKM$cUKM$dTXA$dIXA$dOrPss
049 $aCNUM
082 04 $a004.65$221
090 $aTK5105.5$b.M398 2003
100 1 $aMcCabe, James D.
245 10 $aNetwork analysis, architecture and design /$cJames D. McCabe.
250 $a2nd ed.
260 $aSan Francisco, Calif. :$bMorgan Kaufmann ;$aOxford :$bElsevier Science,$c2003.
300 $axxi, 501 p. :$bill. ;$c24 cm.
500 $aIncludes index.
505 0 $aOverview of Analysis, Architecture, and Design Processes -- Hierarchy and Interconnectivity -- Importance of Network Analysis -- Model for Network Analysis, Architecture, and Design -- A Systems Methodology -- System Description -- Service Description -- Service Characteristics -- Service Levels -- System Components and Network Services -- Service Requests and Requirements -- Service Offerings -- Service Metrics -- Performance Characteristics -- Capacity -- Delay -- RMA -- Performance Envelopes -- Network Supportability -- Requirements Analysis: Concepts -- Requirements and Features -- The Need for Requirements Analysis -- User Requirements -- Application Requirements -- Application Types -- Application Groups -- Application Locations -- Device Requirements -- Device Types -- Performance Characteristics -- Device Locations -- Network Requirements -- Existing Networks and Migration -- Network Management and Security -- Other Requirements -- Supplemental Performance Requirements -- Financial Requirements -- Enterprise Requirements -- The Requirements Specification and Map -- Requirements Analysis: Process -- Gathering and Listing Requirements -- Determining Initial Conditions -- Setting Customer Expectations -- Working with Users -- Taking Performance Measurements -- Tracking and Managing Requirements -- Mapping Location Information -- Developing Service Metrics -- Measurement Tools -- Where to Apply Service Metrics -- Characterizing Behavior -- Modeling and Simulation -- User Behavior -- Application Behavior -- Developing RMA Requirements -- Reliability -- Maintainability -- Availability -- Thresholds and Limits -- Developing Delay Requirements -- End-to-End and Round-Trip Delays -- Delay Variation -- Developing Capacity Requirements -- Estimating Data Rates -- Developing Supplemental Performance Requirements -- Operational Suitability -- Supportability -- Confidence -- Environment-Specific Thresholds and Limits -- Comparing Application Requirements -- Requirements for Predictable and Guaranteed Performance -- Requirements for Predictable Performance -- Requirements for Guaranteed Performance -- Requirements Mapping -- Developing the Requirements Specification -- Flow Analysis -- Flows -- Individual and Composite Flows -- Critical Flows -- Identifying and Developing Flows -- Focusing on a Particular Application -- Developing a Profile -- Choosing the Top N Applications -- Data Sources and Sinks -- Flow Models -- Peer-to-Peer -- Client-Server -- Hierarchical Client-Server -- Distributed Computing -- Flow Prioritization -- The Flow Specification -- Flowspec Algorithm -- Capacity and Service Planning -- Example Application of Flow Analysis -- Network Architecture -- Architecture and Design -- Component Architectures -- Addressing/Routing Component Architecture -- Network Management Component Architecture -- Performance Component Architecture -- Security Component Architecture -- Optimizing Component Architectures -- Reference Architecture -- External Relationships -- Optimizing the Reference Architecture -- Architectural Models -- Topological Models -- Flow-Based Models -- Functional Models -- Using the Architectural Models -- Systems and Network Architectures -- Addressing and Routing Architecture -- Addressing Fundamentals -- Routing Fundamentals -- Addressing Mechanisms -- Classful Addressing -- Subnetting -- Variable-Length Subnetting -- Supernetting -- Private Addressing and NAT -- Routing Mechanisms -- Establishing Routing Flows -- Identifying and Classifying Routing Boundaries -- Manipulating Routing Flows -- Addressing Strategies -- Routing Strategies -- Evaluating Routing Protocols -- Choosing and Applying Routing Protocols -- Architectural Considerations -- Internal Relationships -- External Relationships -- Network Management Architecture -- Defining Network Management -- Network Devices and Characteristics -- Network Management Mechanisms -- Monitoring Mechanisms -- Instrumentation Mechanisms -- Configuration Mechanisms -- Architectural Considerations -- In-Band and Out-of-Band Management -- Centralized, Distributed, and Hierarchical Management -- Scaling of Network Management Traffic -- Checks and Balances -- Management of Network Management Data -- MIB Selection -- Integration into OSS -- Internal Relationships -- External Relationships -- Perfromance Architecture -- Developing Goals for Performance -- Performance Mechanisms -- Quality of Service -- Prioritization, Traffic Management, Scheduling, and Queuing -- Service-Level Agreements -- Policies -- Architectural Considerations -- Evaluation of Performance Mechanisms -- Internal Relationships -- External Relationships -- Security and Privacy Architecture -- Developing a Security and Privacy Plan -- Security and Privacy Administration -- Threat Analysis -- Policies and Procedures -- Security and Privacy Mechanisms -- Physical Security and Awareness -- Protocol and Application Security -- Encryption/Decryption -- Network Perimeter Security -- Remote Access Security -- Architectural Considerations -- Evaluation of Security Mechanisms -- Internal Relationships -- External Relationships -- Selecting Technologies for the Network Design -- Developing Goals for the Network Design -- Developing Criteria for Technology Evaluation -- Broadcast and Nonbroadcast Multiple-Access Methods -- Technology Functions and Features -- Performance Upgrade Paths -- Flow Considerations -- Guidelines and Constraints on Technology Evaluations -- Constraints on Candidate Technologies -- Making Technology Choices for the Network Design -- Segmenting the Network -- Isolating Areas-The Black-Box Method -- Applying Evaluation Criteria and Guidelines -- Interconnecting Technologies within the Network Design -- Shared Medium (No Interconnection) -- Switching -- ATM Switching -- Routing -- Hybrid Mechanisms -- NHRP -- MPOA -- Service Switching -- Applying Interconnection Mechanisms to the Design -- Hierarchy -- Redundancy.
650 0 $aComputer network architectures.
650 0 $aComputer networks$xDesign.
949 0 $aTK 5105.5 .M398 2003$i31786101578430
994 $a92$bCNU
999 $aTK 5105.5 .M398 2003$wLC$c1$i31786101578430$d12/17/2012$e11/28/2012 $f4/15/2004$g1$lCIRCSTACKS$mNULS$n4$rY$sY$tBOOK$u1/5/2004