Network Analysis, Architecture and Design / Edition 2

Network Analysis, Architecture and Design / Edition 2

ISBN-10:
1558608877
ISBN-13:
9781558608870
Pub. Date:
05/15/2003
Publisher:
Elsevier Science

Paperback - Rent for

Select a Purchase Option (Older Edition)
  • purchase options

Temporarily Out of Stock Online


Overview

Network Analysis, Architecture and Design / Edition 2

The landscape of networking has changed so that network services have now become one of the most important factors to the success of many third generation networks. It has become an important feature of the designer's job to define the problems that exist in his network, choose and analyze several optimization parameters during the analysis process, and then prioritize and evaluate these parameters in the architecture and design of the system. Network Analysis, Architecture, and Design, 2e, uses a systems methodology approach to teaching these concepts, which views the network (and the environment it impacts) as part of the larger system, looking at interactions and dependencies between the network and its users, applications, and devices. This approach matches the new business climate where customers drive the development of new services and the book discusses how networks can be architected and designed to provide many different types of services to customers. This second edition contains an entirely new focus on network architecture, which completes the process from analysis to design. Network architecture takes the input from network analysis and provides a high-level view of the network, focusing on the relationships between major functions of the network, such as security, network management, performance and addressing and routing. A reference architecture, outlining how these functions are to be addressed within the network, serves as the foundation for the network design. With a number of examples, analogies, instructor tips, and exercises, this book works through the processes of analysis, architecture, and design step by step, giving network designers a solid resource for making good design decisions

Product Details

ISBN-13: 9781558608870
Publisher: Elsevier Science
Publication date: 05/15/2003
Series: The Morgan Kaufmann Series in Networking
Edition description: Older Edition
Pages: 450
Product dimensions: 7.32(w) x 9.62(h) x 1.24(d)

Table of Contents

1Introduction
1.1Objectives1
1.2Preparation1
1.3Background2
1.4Overview of Analysis, Architecture, and Design Processes4
1.4.1Hierarchy and Interconnectivity7
1.4.2Importance of Network Analysis8
1.4.3Model for Network Analysis, Architecture, and Design16
1.5A Systems Methodology19
1.6System Description20
1.7Service Description25
1.8Service Characteristics26
1.8.1Service Levels28
1.8.2System Components and Network Services30
1.8.3Service Requests and Requirements33
1.8.4Service Offerings37
1.8.5Service Metrics39
1.9Performance Characteristics41
1.9.1Capacity41
1.9.2Delay42
1.9.3RMA42
1.9.4Performance Envelopes44
1.10Network Supportability45
1.11Conclusion47
1.12Exercises48
2Requirements Analysis: Concepts
2.1Objectives53
2.2Preparation53
2.3Background54
2.3.1Requirements and Features54
2.3.2The Need for Requirements Analysis56
2.4User Requirements58
2.5Application Requirements62
2.5.1Application Types62
2.5.2Application Groups68
2.5.3Application Locations70
2.6Device Requirements71
2.6.1Device Types72
2.6.2Performance Characteristics74
2.6.3Device Locations76
2.7Network Requirements78
2.7.1Existing Networks and Migration78
2.7.2Network Management and Security80
2.8Other Requirements83
2.8.1Supplemental Performance Requirements83
2.8.2Financial Requirements84
2.8.3Enterprise Requirements85
2.9The Requirements Specification and Map85
2.10Conclusion89
2.11Exercises90
3Requirements Analysis: Process
3.1Objectives95
3.2Preparation95
3.3Gathering and Listing Requirements96
3.3.1Determining Initial Conditions96
3.3.2Setting Customer Expectations100
3.3.3Working with Users100
3.3.4Taking Performance Measurements102
3.3.5Tracking and Managing Requirements103
3.3.6Mapping Location Information104
3.4Developing Service Metrics105
3.4.1Measurement Tools107
3.4.2Where to Apply Service Metrics108
3.5Characterizing Behavior108
3.5.1Modeling and Simulation109
3.5.2User Behavior110
3.5.3Application Behavior112
3.6Developing RMA Requirements113
3.6.1Reliability113
3.6.2Maintainability113
3.6.3Availability114
3.6.4Thresholds and Limits119
3.7Developing Delay Requirements121
3.7.1End-to-End and Round-Trip Delays124
3.7.2Delay Variation125
3.8Developing Capacity Requirements126
3.8.1Estimating Data Rates126
3.9Developing Supplemental Performance Requirements129
3.9.1Operational Suitability130
3.9.2Supportability130
3.9.3Confidence138
3.10Environment-Specific Thresholds and Limits140
3.10.1Comparing Application Requirements141
3.11Requirements for Predictable and Guaranteed Performance143
3.11.1Requirements for Predictable Performance143
3.11.2Requirements for Guaranteed Performance144
3.12Requirements Mapping145
3.13Developing the Requirements Specification146
3.14Conclusion148
3.15Exercises151
4Flow Analysis
4.1Objectives157
4.2Preparation158
4.3Background158
4.4Flows158
4.4.1Individual and Composite Flows161
4.4.2Critical Flows163
4.5Identifying and Developing Flows164
4.5.1Focusing on a Particular Application165
4.5.2Developing a Profile169
4.5.3Choosing the Top N Applications170
4.6Data Sources and Sinks171
4.7Flow Models177
4.7.1Peer-to-Peer178
4.7.2Client-Server180
4.7.3Hierarchical Client-Server182
4.7.4Distributed Computing186
4.8Flow Prioritization189
4.9The Flow Specification191
4.9.1Flowspec Algorithm192
4.9.2Capacity and Service Planning195
4.10Example Application of Flow Analysis195
4.11Conclusion202
4.12Exercise205
5Network Architecture
5.1Objectives209
5.2Preparation209
5.3Background210
5.3.1Architecture and Design211
5.4Component Architectures214
5.4.1Addressing/Routing Component Architecture219
5.4.2Network Management Component Architecture221
5.4.3Performance Component Architecture222
5.4.4Security Component Architecture223
5.4.5Optimizing Component Architectures224
5.5Reference Architecture225
5.5.1External Relationships227
5.5.2Optimizing the Reference Architecture228
5.6Architectural Models229
5.6.1Topological Models231
5.6.2Flow-Based Models233
5.6.3Functional Models235
5.6.4Using the Architectural Models237
5.7Systems and Network Architectures243
5.8Conclusion244
5.9Exercises245
6Addressing and Routing Architecture
6.1Objectives247
6.2Preparation247
6.3Background248
6.3.1Addressing Fundamentals249
6.3.2Routing Fundamentals251
6.4Addressing Mechanisms255
6.4.1Classful Addressing255
6.4.2Subnetting258
6.4.3Variable-Length Subnetting260
6.4.4Supernetting262
6.4.5Private Addressing and NAT267
6.5Routing Mechanisms268
6.5.1Establishing Routing Flows268
6.5.2Identifying and Classifying Routing Boundaries269
6.5.3Manipulating Routing Flows272
6.6Addressing Strategies277
6.7Routing Strategies280
6.7.1Evaluating Routing Protocols282
6.7.2Choosing and Applying Routing Protocols286
6.8Architectural Considerations290
6.8.1Internal Relationships290
6.8.2External Relationships290
6.9Conclusion292
6.10Exercises292
7Network Management Architecture
7.1Objectives297
7.2Preparation297
7.3Background298
7.4Defining Network Management299
7.4.1Network Devices and Characteristics301
7.5Network Management Mechanisms302
7.5.1Monitoring Mechanisms302
7.5.2Instrumentation Mechanisms306
7.5.3Configuration Mechanisms308
7.6Architectural Considerations309
7.6.1In-Band and Out-of-Band Management310
7.6.2Centralized, Distributed, and Hierarchical Management313
7.6.3Scaling of Network Management Traffic316
7.6.4Checks and Balances317
7.6.5Management of Network Management Data318
7.6.6MIB Selection320
7.6.7Integration into OSS321
7.6.8Internal Relationships322
7.6.9External Relationships325
7.7Conclusion326
7.8Exercises327
8Perfromance Architecture
8.1Objectives331
8.2Preparation331
8.3Background332
8.4Developing Goals for Performance333
8.5Performance Mechanisms336
8.5.1Quality of Service336
8.5.2Prioritization, Traffic Management, Scheduling, and Queuing340
8.5.3Service-Level Agreements346
8.5.4Policies348
8.6Architectural Considerations350
8.6.1Evaluation of Performance Mechanisms350
8.6.2Internal Relationships352
8.6.3External Relationships352
8.7Conclusion353
8.8Exercises354
9Security and Privacy Architecture
9.1Objectives357
9.2Preparation357
9.3Background358
9.4Developing a Security and Privacy Plan359
9.5Security and Privacy Administration360
9.5.1Threat Analysis360
9.5.2Policies and Procedures363
9.6Security and Privacy Mechanisms365
9.6.1Physical Security and Awareness366
9.6.2Protocol and Application Security367
9.6.3Encryption/Decryption369
9.6.4Network Perimeter Security371
9.6.5Remote Access Security372
9.7Architectural Considerations375
9.7.1Evaluation of Security Mechanisms375
9.7.2Internal Relationships378
9.7.3External Relationships379
9.8Conclusion380
9.9Exercises381
10Selecting Technologies for the Network Design
10.1Objectives385
10.2Preparation385
10.3Background386
10.4Developing Goals for the Network Design387
10.5Developing Criteria for Technology Evaluation392
10.5.1Broadcast and Nonbroadcast Multiple-Access Methods394
10.5.2Technology Functions and Features400
10.5.3Performance Upgrade Paths402
10.5.4Flow Considerations405
10.6Guidelines and Constraints on Technology Evaluations406
10.6.1Constraints on Candidate Technologies411
10.7Making Technology Choices for the Network Design412
10.7.1Segmenting the Network413
10.7.2Isolating Areas-The Black-Box Method418
10.7.3Applying Evaluation Criteria and Guidelines420
10.8Conclusion421
10.9Exercises421
11Interconnecting Technologies within the Network Design
11.1Objectives425
11.2Preparation425
11.3Background426
11.4Shared Medium (No Interconnection)429
11.5Switching431
11.5.1ATM Switching434
11.6Routing443
11.7Hybrid Mechanisms445
11.7.1NHRP445
11.7.2MPOA446
11.7.3Service Switching447
11.8Applying Interconnection Mechanisms to the Design449
11.8.1Hierarchy449
11.8.2Redundancy450
11.9Where to Go from Here453
11.10Conclusion454
11.11Exercises455
Glossary of Terms459
Glossary of Acronyms479
Index491

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews