Data networks routing, security, and performance optimization

Data Networks builds on the foundation laid in Kenyon's first book, High-Performance Data Network Design, with expanded coverage of routing, security, multicasting, and advanced design topics such as performance optimization and fault tolerance. Kenyon provides strategies for overcoming some of...

Descripción completa

Detalles Bibliográficos
Autor principal: Kenyon, Tony, 1960- (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boston : Digital Press c2002.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627699006719
Tabla de Contenidos:
  • Front Cover; Data Networks; Copyright Page; Contents; Preface; Acknowledgments; Chapter 1. A Review of the Basics; 1.1 Network design and performance; 1.2 An overview of the design process; 1.3 Building block 1: The framework; 1.4 Building block 2: Applications; 1.5 Building block 3: Protocols; 1.6 Building block 4: Hardware; 1.7 Building block 5: Physical connectivity; 1.8 Summary; References; Chapter 2. Addressing, Naming, and Configuration; 2.1 The IP addressing model; 2.2 Address mapping and configuration techniques; 2.3 Name-to-address mapping; 2.4 Directory services
  • 2.5 Design techniques for optimizing addressing2.6 Summary; References; Chapter 3. Routing Technology; 3.1 Internetwork architecture and topology; 3.2 Routing algorithms; 3.3 Routing design issues; 3.4 Routing protocols; 3.5 Router addressing issues; 3.6 Route redistribution; 3.7 Router architecture; 3.8 Summary; References; Chapter 4. Multicast Network Design; 4.1 Multicast application and routing concepts; 4.2 Group registration with IGMP; 4.3 Multicast routing with DVMRP; 4.4 Multicast routing with MOSPF; 4.5 Multicast routing with PIM; 4.6 Multicast routing with CBT
  • 4.7 Interoperability and interdomain routing4.8 Multicast support protocols; 4.9 Service and management issues; 4.10 Summary; References; Chapter 5. Designing Secure Networks; 5.1 The driving forces and issues behind security; 5.2 Developing the security policy; 5.3 Security technology and solutions; 5.4 VPN architectures; 5.5 IP Security architecture (IPSec); 5.6 Designing VPNs; 5.7 Summary; References; Chapter 6. Designing Reliable Networks; 6.1 Planning for failure; 6.2 Network resilience; 6.3 Fault-tolerant, high-availability, and clustering systems; 6.4 Component-level availability
  • 6.5 Example resilient network design6.6 Summary; References; Chapter 7. Network Optimization; 7.1 Optimizing network bandwidth; 7.2 System-level traffic engineering; 7.3 Load-splitting and load-sharing techniques; 7.4 Optimizing applications; 7.5 Optimizing protocols; 7.6 Optimizing storage; 7.7 Summary; References; Chapter 8. Quality of Service; 8.1 Quality-of-service models; 8.2 Traffic engineering with policy and QoS constraints; 8.3 LAN and WAN media QoS features; 8.4 Integrated Services (IS); 8.5 Differentiated Services (DS); 8.6 Integrating QoS; 8.7 Summary; References
  • Chapter 9. Network Management9.1 Network management technologies; 9.2 Network troubleshooting tools; 9.3 Policy-based management; 9.4 Summary; References; Appendix A: Mathematical Review; Appendix B: DNS Top Level Domain Codes; Appendix C: IP Protocol Numbers; Appendix D: UDP and TCP Port Numbers; Appendix E: Multicast and Broadcast Addresses; Appendix F: EtherType Assignments; Appendix G: Example MTTR Procedures; Index