Articoli correlati a Network Design: Principles and Applications

Network Design: Principles and Applications - Rilegato

 
9780849308598: Network Design: Principles and Applications
Vedi tutte le copie di questo ISBN:
 
 
Never has the need for reliable internetworking been greater, yet with networks now comprising differing operating systems, hardware, and software, achieving a reliable network has never been more complex. Network planners and managers face a multitude of difficult decisions-decisions made even more difficult by the need for knowledge from a variety of disciplines.

To meet that need, renowned author Gilbert Held assembled a panel of expert practitioners to bring you Network Design: Principles and Applications-a comprehensive, single-source reference for network and IT managers. Beginning with the basics of LANs and WANs, it offers in-depth coverage of modern network planning, design, and optimization. Virtual Private Networks, intranets, and extranets all receive detailed treatment, as do traffic analysis and performance, migration issues, tools, techniques, and network security.

Finally, the future of your network and perhaps your job may depend on your knowledge of still evolving network technologies. Network Design: Principles and Applications provides that knowledge with chapters addressing current trends, including IDSL, cable modems, voice and video over LANs, and voice and fax over IP.

Network Design: Principles and Applications is one reference that belongs on the shelf of every network and IT manager. The planning and implementation strategies presented will help you create flexible networks that meet performance goals but at the same time allow for the leveraging of new and maturing technologies.

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

Contenuti:
INTRODUCTION
UNDERSTANDING LANs
LAN Connectivity Options for Small Businesses
Integrating Voice and LAB Infrastructure in Applications
High-Speed Token Ring
Should you Migrate your Token-Ring Network to Ethernet?
Introduction to 100BASE-T
Gigabit Ethernet
ATM LAB Emulation
InterLAN Switching
LAN-to-Mainframe Connectivity Choices
Building Highly Reliable Computer Networks
UNDERSTANDING WANs
US Telecommunications Today
The Voice Network: Still the Bedrock of the Wide Area Network
T1, T3, and Sonet Networks
Remote Access Concepts and Techniques
ATM Access: The Genesis of a New Network
Transport over Frame Relay: Issues and Considerations
Emerging hIgh Bandwidth Networks
Voice and Data Network Integration
ATM Circuity Emulation Services
Routing and Routing Protocols
Convergence of IP, ATM, and SONET/SDH at the Backbone
VPNs, INTRANETS, AND EXTRANETS
Virtual Networking Management and Planning
Putting VPNs to Work for Small Business and Offices
Virtual Private Networks: Secure Remote Access over the Internet
IP Sec VPNs
Integrating Data Centers and Intranets
Implementing and Supporting Extranets
TRAFFIC ANALYSIS AND PERFORMANCE
Enterprise network Monitoring and Analysis in a Mission-Critical Environment
Web Traffic Analysis: Analyzing what is Happening on your Site
Network Architecture and Performance
Performance Engineering in Client/Server Environments
Understanding Gigabit Ethernet Performance
LAN/WAN Interconnection Requirements and Implementation Considerations
Demystifying Network Performance
Planning, Design, and Optimization of Enterprise Networks
Proactive Performance Management
MIGRATION CONSIDERATIONS
Moving the IT Workforce to a Client/Server Environment
Selecting and Deploying E-Mail Migrations Tools and Utilities
Gracefully Transitioning from SNA to IP: Why How, and When
Transporting Legacy SNA Traffic over Frame Relay
SNA over Frame Relay
Planning a Cutover
NETWORKING TOOLS AND TECHNIQUES
A Simulation Method for the Design of Multimedia Networks
Determining Remote Bridge and Router Delays
Network Baselining as a Planning Tool
SECURITY
Working with Cisco Access Lists
Securing your Router
Protecting a Network from Spoofing and Denial of Service Attacks
Internet Security: Securing the Perimeter
Remote Access Authentication
An Overview of Cryptographic Methods
Public Key Infrastructure: Using the Internet as a Virtual Private Network
Making your Web site Hacker safe
Applets and Network Security: a Management Overview
Security Management
CONSIDERING EVOLVING TECHNOLOGIES
Trends in Data Communications Services
The Emergency advantage of XDSL Technology
Preparing for Cable Modems
Voice and Video on the LAN
Internet Voice Applications
Building an IP PBX Telephony Network
Fax over IP
Videoconferencing over IP Networks

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

  • EditoreAuerbach Publications
  • Data di pubblicazione2000
  • ISBN 10 0849308593
  • ISBN 13 9780849308598
  • RilegaturaCopertina rigida
  • Numero edizione1
  • Numero di pagine872
  • RedattoreHeld Gilbert

I migliori risultati di ricerca su AbeBooks

Foto dell'editore

Gil Held
Editore: Taylor & Francis Group (2000)
ISBN 10: 0849308593 ISBN 13: 9780849308598
Nuovo Rilegato Quantità: 1
Da:
Books Puddle
(New York, NY, U.S.A.)
Valutazione libreria

Descrizione libro Condizione: New. pp. xvi + 852. Codice articolo 262508854

Informazioni sul venditore | Contatta il venditore

Compra nuovo
EUR 65,45
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 3,73
In U.S.A.
Destinazione, tempi e costi
Foto dell'editore

Held Gil
Editore: Taylor & Francis Group (2000)
ISBN 10: 0849308593 ISBN 13: 9780849308598
Nuovo Rilegato Quantità: 1
Da:
Majestic Books
(Hounslow, Regno Unito)
Valutazione libreria

Descrizione libro Condizione: New. pp. xvi + 852 Illus. Codice articolo 5371881

Informazioni sul venditore | Contatta il venditore

Compra nuovo
EUR 64,61
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 7,68
Da: Regno Unito a: U.S.A.
Destinazione, tempi e costi