logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Network Design Management and Technical Perspectives 2nd Edition by Teresa C Piliouras ISBN 9780203508084 0849316081

  • SKU: EBN-1378198
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

0.0

0 reviews
Instant download (eBook) Network Design: Management and Technical Perspectives after payment.
Authors:Teresa C. Piliouras
Pages:696 pages.
Year:2004
Editon:2
Publisher:Auerbach Publications
Language:english
File Size:13.36 MB
Format:pdf
ISBNS:9780203508084, 9780849316081, 0849316081, 0203508084
Categories: Ebooks

Product desciption

(Ebook) Network Design Management and Technical Perspectives 2nd Edition by Teresa C Piliouras ISBN 9780203508084 0849316081

(Ebook) Network Design Management and Technical Perspectives 2nd Edition by Teresa C Piliouras - Ebook PDF Instant Download/Delivery: 9780203508084 ,0849316081
Full download (Ebook) Network Design Management and Technical Perspectives 2nd Edition after payment

Product details:

ISBN 10: 0849316081
ISBN 13: 9780203508084
Author: Teresa C Piliouras

There are hundreds of technologies and protocols used in telecommunications. They run the full gamut from application level to physical level. It is overwhelming to try to keep track of them. Network Design, Second Edition: Management and Technical Perspectives is a broad survey of the major technologies and networking protocols and how they interr
 

(Ebook) Network Design Management and Technical Perspectives 2nd Edition Table of contents:

Chapter 1 Making the Business Case for the Network

1.1 Management Overview of Network Design

1.1.1 Define the Business Objectives

1.1.2 Determine Potential Risks, Dependencies, Costs, and Benefits

1.1.3 Identify Project Requirements

1.1.4 Develop Project Implementation Approach

1.2 Strategic Positioning Using Networks

1.2.1 Case Studies

1.2.2 Calculation of Technology’s Strategic Value

1.3 Dealing with Major Design Challenges

1.3.1 Organizational Concerns and Recommendations

1.3.1.1 Senior Management Involvement and Support

1.3.1.2 Recruiting, Training, and Maintaining Skilled Staff

1.3.1.3 Effective Program and Project Management

1.3.2 Technology Concerns and Recommendations

1.3.2.1 Keeping Abreast of New Developments

1.3.2.2 Maintaining a Secure Networking Environment

1.3.2.3 Managing Complexity

1.4 Similarities and Differences between Voice and Data Network Design and Planning

1.5 Major Trends and Technology Enablers

1.5.1 Societal Trends

1.5.1.1 Computer Literacy

1.5.1.2 Security

1.5.1.3 Legislation and Regulation

1.5.2 Service Provider Trends

1.5.3 Technology Enablers

1.5.3.1 Technology Convergence

1.5.3.2 High-Bandwidth Technologies

1.5.3.3 Wireless Technologies

1.5.3.4 Open Internet Standards

1.5.3.5 Intelligent Technologies

1.6 Summary

Notes

References

Chapter 2 Wide Area Network Design and Planning

2.1 Management Overview of WAN Network Design

2.2 Technical Overview of WAN Network Design

2.2.7 Centralized Network Design

2.2.1.1 Legacy System Network Architecture (SNA)

2.2.1.2 Migration of SNA Networks to Open Networking

2.2.2 Distributed Network Design

2.2.2.1 Metropolitan Area Networks

2.2.2.1.1 IEEE MAN Standards

2.2.2.1.2 Ethernet-to-MAN Connectivity

2.2.2.1.3 SONET, DWDM, RPR, and MPLS Technologies in MANs

2.2.2.1.4 Key Users and Basic MAN Configurations

2.2.2.2 Wide Area Networks

2.2.2.2.1 Private WANs

2.2.2.2.2 Public WANs

2.2.2.2.3 Wireless WANs

2.2.3 Star Topology Networks

2.2.3.1 Overview

2.2.3.2 Design Considerations and Techniques

2.2 3.3 Case Study

2.2.4 Tree Networks

2.2.4. 1 Overview

2.2.4.2 Design Considerations and Techniques

2.2.4.2.1 Kruskal’s Capacitated Minimal Spanning Tree Algorithm

2.2.4.2.1.1 Solution of Sample Problem Using Kruskal’s CMST

2.2.4.2.2 Esau-Williams (E-W) Capacitated Minimal Spanning Tree Algorithm

2.2.4.2.3 Unified Algorithm

2.2.4.2.4 Bin-Packing Algorithms

2.2.4.3 Case Study

2.2.5 Backbone Networks

2.2.5.1 Overview

2.2.5.2 Design Considerations and Techniques

2.2.5.2.1 Center of Mass Algorithm

2.2.5.2.2 Sample COM Problem

2.2.5.2.3 Concentrator/Backbone Placement

2.2.5.3 Case Study

2.2.6 Mesh Networks

2.2.6.1 Overview

2.2.6.2 Design Considerations and Techniques

2.2.6.2.1 Mentor Algorithm Part I

2.2.6.2.2 Mentor Algorithm Part II

2.2.6.2.3 Sample Problem Using Mentor Algorithm

2.2.6.2.4 Solution to Sample Problem Using Mentor Algorithm

2.2.6.2.5 Modification to Mentor Algorithm Using Half-Duplex Lines

2.2.6.3 Case Study

2.2.7 Value-Added Network Services

2.2.7.1 Packet-Switched Networks

2.2.7.1.1 Overview

2.2.7.1.2 Design Considerations

2.2.7.1.3 Case Study

2.2.7.1.4 Advantages, Disadvantages, and Recommended Uses of X.25 Packet-Switched Networks

2.2.7.2 Frame Relay Networks

2.2.7.2.1 Overview

2.2.7.2.2 Design Considerations

2.2.7.2.3 Case Study

2.2.7.2 4 Advantages, Disadvantages, and Recommended Uses of Frame Relay

2.2.7.3 ATM Networks

2.2.7.3.1 Overview

2.2.7.3.2 Design Considerations and Techniques

2.2.7.3.3 Case Study

2.2.7.3.4 Advantages, Disadvantages, and Recommended Uses of ATM Networks

2.2.7.4 VPN Networks

2.2.7.4.1 Technical Overview

2.2.7.4.2 Basic Terminology

2.2.7.4.3 Design Considerations

2.2.7.4.4 Case Study

2.2.7.5 Access Technologies

2.2.7.5.1 Lit Buildings (Fiber): SONET and DWDM

2.2.7.5.2 Small Office/Home Office (SOHO): DSL, Cable, Dial-Up

2.2.7.5.5 ISDN Networks

Notes

References

Chapter 3 Local Area Network Design and Planning Techniques

3.1 Management Overview of Local Area Networks (LANs)

3.1.1 IEEE LAN Standards

3.1.2 Ethernet LANs

3.1.4 Similarities and Differences between WAN and LAN Design and Planning

3.2 LAN Design and Planning

3.2.1 Criteria for Evaluating LAN Design and Modeling Products

3.2.1.1 System Requirements

3.2.1.2 Input Data Requirements

3.2.1.3 Control Parameter Extensions

3.2.1.4 Technology Used

3.2.1.5 Applicability of Live Data

3.2.1.6 Post-Processing

3.2.1.7 Animated Displays

3.2.1.8 Product Maturity

3.2.2 LAN Performance Indicators and Modeling Parameters

3.2.2.1 LAN Modeling Parameters

3.2.2.1.1 Fixed Metrics

1.1.1.2 .2 Variable Metrics

3.2.2.1.3 Performance Measurement Metrics

3.2.2.2 LAN Hubs as Source of Modeling Parameters

3.2.2.2.1 Ethernet Indicators

3.2.2.2.2 Token Ring Indicators

3.2.2.3 Modeling Objects in LANs

3.2.2.3.1 LAN Servers

3.2.2.3.2 LAN Drivers

3.2.2.3.3 LAN Interface Cards

3.2.2.3.4 LAN Operating Systems

3.2.2.3.5 Workstations

3.2.2.3.6 Peripherals

3.2.3 Information Sources for Baseline LAN Models

3.2.4 1 LAN Analyzers and Monitors

3.2.3.1.1 Sniffer Distributed from Network Associates [NETW04]

3.2.3.1.2 NetScout [NETS04]

3.2.3.2 SNMP MIBs as Information Source

3.2.3.3 RMON Probes and RMON MIBs as Information Sources

3.2.3.4 Input from Device-Dependent Applications

3.2.4 LAN Visualization Instruments

3.2.4.7 Graphical LAN Documentation Tools

3.2.4.2 netViz [NETVO4]

3.2.5 LAN Planning and Design Tools

3.3 Summary

Notes

References

Chapter 4 Intranets and Extranets

4.1 Management Overview

4.1.1 Benefits of Intranets

4.1.1.1 The “Less-Paper” Office

4.1.1.2 Improved Customer Service

4.1.1.3 Improved Help Desks

4.1.1.4 Improved Corporate Culture

4.1.1.5 Cross-Platform Compatibility

4.1.2 Intranet Planning and Management

4.1.2.1 Gaining Support

4.1.2.2 Planning The Intranet Strategy

4.1.2.3 Selecting the Implementation Team

4.1.2.3.1 Technical Support Skills Checklist

4.1.2.3.2 Content Development and Design Checklist

4.1.2.3.3 Management Support Skills Checklist

4.1.2.4 Funding Growth

4.1.2.5 Total Quality Management

4.7.2.6 Training Employees

4.7.2.7 Organizational Challenges

4.1.3 Intranets versus Groupware

4.1.4 Management Summary

4.2 Technical Overview

4.2.1 Internet Basics

4.2.1.1 Packet Switching

4.2.1.2 TCP/IP

4.2.1.3 Connecting to the Internet

4.2.2 Basic Terminology

4.2.2.1 The World Wide Web

4.2.2.2 Web Browsers

4.2.2.3 Uniform Resource Locator (URL)

4.2.2.4 Home Pages

4.2.2.5 Client Programs and Browsers

4.2.2.6 Where Web Documents Reside

4.2.2.7 HTML: The Language of the World Wide Web

4.2.2.8 Hypertext and Hyperlinks

4.2.2.9 FTP: File Transfer Protocol

4.2.2.10 Java

4.2.3 Intranet Components

4.2.3.1 Network Requirements

4.2.3.2 Network Operating Systems

4.2.3.2.1 UNIX

4.2.3.2.2 Windows

4.2.3.3 Server Hardware

4.2.3.4 Web Server Software

4.2.3.5.1 UNIX Web Servers

4.2.3.4.2 Windows Web Servers

4.2.3.4.3 Macintosh Web Server

4.2.3.5 Desktop Clients Running TCP/IP

4.2.3.6 Web Browsers

4.2.4 Intranet Implementation

4.2.4.1 Information Organization

4.2.4.2 Content Structure

4.2.4.3 Interface Design

4.2.4.4 Free Clip Art and Images

4.2.4.5 Intranet Functionality

4.2.4.6 Content Management

4.2.4.7 Training And Support

4.2.5 Intranet Deployment

4.2.5.1 Technological Considerations

4.2.5.1.1 Conversion of Paper Documents into Electronic Form

4.2.5.1.2 Interface to Legacy Database(s)

4.2.5.1.3 Use of Multiple Servers

4.2.5.1.4 Standardizing Hardware and Software

4.2.5.2 Maintaining the Information Content on the Intranet

4.2.5.2.1 Automating HTML Authoring

4.2.5.2.2 Managing Document Links

4.2.5.3 Centralized versus Distributed Control

4.2.6 Intranet Security Issues

4.2.6.1 Firewalls

4.2.6.1.1 Network, Application, and Circuit-Level Firewalls

4.2.6.2 Firewall Architectures

4.2.6.2.1 Dual-Homed Host Firewalls

4.2.6.2.2 Screened-Host Firewalls

4.2.6.3 Screened-Subnet Firewalls

4.2.6.4 CGI Scripting

4.2.6.4.1 Encryption

4.2.6.4.1 Public Key Encryption

4.2.6.4.2 Digital Signatures

4.2.6.4.3 Link Encryption

4.2.6.4.4 Document Encryption

4.2.6.4.5 Secure Socket Layer (SSL)

4.2.6.4.6 Secure HTTP (S-HTTP)

4.2.6.5 Intranet Security Threats

4.2.6.5.1 Source-Routed Traffic

4.2.6.5.2 ICMP Redirects (Spoofing)

4.3 Summary

Note

Chapter 5 Client/Server and Distributed Networking

5.1 Overview of Client/Server and Distributed Object Networking

5.2 Motivations for Distributed Networking

5.4 n-Tier Distributed Object Architectures

5.5 Middleware Functions and Implementation

5.6 Middleware Standards

5.6.1 Common Object Request Broker Architecture (CORBA)

5.6.2 Component Object Model (COM)/Distributed Component Model (DCOM)/COM+

5.6.3 Web Services

5.7 Summary of Client/Server and Distributed Object Network Design Considerations

Notes

References

Chapter 6 Outsourcing

6.1 Outsourcing Overview

6.2 Steps in the Outsourcing Process

6.3 Major Considerations in Outsourcing

6.4 6.4 Request for Information

6.5 Request for Proposal

6.6 Vendor Evaluation, Selection, and Checklists

6.7 Strategic Partnerships and Agreements

6.8 Keys to Successful Outsourcing

6.9 Summary

Notes

References

Chapter 7 Automated Design and Network Management Tools

7.1 Network Design Tools

7.2 Network Management Tools

7.2.7 Network Management Protocols (CMISE/CMIP, SNMP, and RMON)

7.2.1.1 Management Agents

7.2.1.2 The Management Station

7.2.1.3 Network Management Protocol

7.2.2 Network Management Implementation

7.2.3 Web-Based Network Management

7.2 4 Other Network Management Strategies

7.3 Summary

Notes

References

Chapter 8 Technical Considerations in Network Design and Planning

8.1 Overview of the Network Design Process

8.2 Data Collection

8.2.1 Automated Data Generation

8.2.2 Traffic Generators

8.2.3 Cost Generators and Tariff Data

8.3 Technical Requirements Specification

8.3.1 Node Selection, Placement, and Sizing

8.3.2 Network Topology

8.3.3 Routing Strategies

8.3.4 Architectures

8.3.5 Network Management

8.3.6 Security

8.4.1 Definitions and Nomenclature

8.4.1.1 Definition: Graph

8.4.1.2 Definition: Link

8.4.1.3 Definition: Undirected Graph

8.4.1.4 Definition : Arc

8.4.1.5 Definition: Directed Graph

8.4.1.6 Definition: Self-Loop

8.4.1.7 Definition: Parallel Link

8.4.1.8 Definition: Simple Craph

8.4.1.9 Definition: Adjacency

8.4.1.10 Definition: Degree

8.4.1.11 Definition: Incident Link

8.4.1.12 Definition: Path

8.4.1.13 Definition : Cycle

8.4.1.14 Definition: Simple Cycle

8.4.1.15 Definition: Connected Graph

8.4.1.16 Definition: Strongly Connected Graph

8.4.1.17 Definition: Tree

8.4.1.18 Definition: Minimal Spanning Tree

8.4.1.19 Definition: Star

8.5 Introduction to Algorithms

8.5.1 Definition of Algorithms

8.5.2 Greedy Algorithm (Also Known as Kruskal’s Algorithm)

8.5.3 Introduction to Computational Complexity Analysis

8.5.4 Network Design Techniques

8.6 Performance Analysis

8.6.1 Queuing Essentials

8.6.1.1 Standard Queuing Notation:

8.6.2 Analysis of Loss and Delay in Networks

8.6.2.1 M/M/1 Model

8.6.2.1.1 M/M/1 Example of Database Access Delay

8.6.2.1.2 M/M/1 Example of Delay on Communications Link

8.6.2.2 M/M/1/k Model

8.6.2.2.1 M/M/1/5 Example of Jobs Lost in Front-End Processor due to Limited Buffering Size

8.6.2.3 M/M/c Model

8.6.2.3.1 M/M/c Example of Print Server Processing Times

8.6.2.3.2 M/M/1 versus M/M/c Example and Comparison of Expected Service Times

8.6.2.4 M/G/1 Model

8.6.2.4.1 M/G/1 Example of Packet-Switched Transmission Delay

8.6.2.5 M/M/c/k Model

8.6.2.6 Erlang’s Loss Formula

8.6.2.6.1 M/M/c/c/Example of Blocked Phone Lines

8.6.2.7 Total Network Delay

8.6.2.8 Other Types of Queues

8.6.2.9 Summary

8.6.3 Analysis of Network Reliability

8.6.4 Network Costs

Notes

References

Chapter 9 Business Continuity and Disaster Recovery Planning and Design

9.1 Management Considerations

9.1.1 Define the Business Objectives Served by BC/DR Planning

9.1.2 Determine Potential Risks, Dependencies, Costs, and Benefits: Risk Assessment and Business Impact Analysis

9.1.3 Design and Implement BC/DR Plan

9.1.4 Keep Informed about BC/DR Standards and Recommendations

9.2 Technical Considerations

9.2.1 Facilities Solutions

9.2.2 Network Solutions

9.2.3 Data Storage Solutions

9.2.3.1 Tape Backups

9.2.3.2 Network Attached Storage (NAS)

9.2.3.3 Storage Area Networks (SANs)

9.2.3.3.1Storage Platforms

9.2.3.3.2 Server Platforms

9.2.3.3.3 Interconnecting Fabric or Interface for Data Transport

9.2.3.4 Data Storage Practices

9.2.4 Application Level Solutions

9.2.5 Outsourcing Solutions

9.3 Summary

Notes

References

Appendix A Return on Investment (ROI) Calculation

A.1 Case Study Overview

A.2 ROI Analysis

A.3 The ROI Equation

A.4 Depreciation and Capitalization

A.5 Expanded ROI Formula

A.6 ROI Numerator

A.6.1 Net Benefits: Additions

A.6.1.1 Costs Avoided

A.6.1.2 Efficiencies Created

A.6.2 Costs Incurred: Minuses

A.7 ROI Denominator

A.7.1 Project Investment

A.8 Sample ROI Analysis

A.8.1 ROI Numerator

A.8.1.1 Savings and Cost Avoidance Related to Web-Based Project The savings and cost avoidance related to a Web-based project include:

A.8.2 ROI Denominator

A.9 Results

Notes

Appendix B Overview of OSI Model and Comparison with TCP/IP

8.1 Overview of the OSI Model

8.2 Overview of the TCP/IP Model

People also search for (Ebook) Network Design Management and Technical Perspectives 2nd Edition:

    
network design in supply chain management
    
distribution network design in supply chain management
    
network design and management pdf
    
out of band management network design
    
oob management network design

Tags: Teresa C Piliouras, Network Design Management, Technical Perspectives

*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products