
Practical Computer Network Analysis and Design
- 1st Edition - June 20, 2012
- Latest edition
- Author: James D. McCabe
- Language: English
Powerful, mission-critical networks that carry real-time applications, multimedia, or just heavy traffic are increasingly complex and costly to build. Design decisions based on in… Read more
Purchase options

Powerful, mission-critical networks that carry real-time applications, multimedia, or just heavy traffic are increasingly complex and costly to build. Design decisions based on insufficient or flawed analysis can have drastic consequences in both efficiency and expense. Practical Computer Network Analysis and Design prepares you to make the best decisions by applying sound, tested design principles to your network and considering the system-wide effects of each decision. The author provides a step-by-step process for analyzing user requirements, visualizing the network structure in terms of traffic flows, and doing quantitative measurements. Once you have a clear, scientifically based picture of you network environment, he guides you in developing strategies for routing, addressing, security, and network management and then in choosing and integrating technologies to realize your plan.Whether you are expanding an existing network or building a new one from the ground up, Practical Computer Network Analysis and Design is you most valuable resource.
Preface
Chapter 1 A Systems Approach to Network Design
- 1.1 Introduction--Traditional Network Design1.2 The Analysis and Design Processes1.3 Network Services and Services-Based Networking1.4 Systems and Network Services
- 1.4.1 Systems1.4.2 Network Services
- 1.5.1 Service Requests1.5.2 Service Offerings1.5.3 Service Performance Requirements1.5.4 Service Metrics1.5.5 Reservations and Deadline Scheduling
- 2.1 Background for Requirements Analysis2.2 User Requirements2.3 Application Requirements
- 2.3.1 Types of Applications2.3.2 Reliability2.3.3 Capacity2.3.4 Delay2.3.5 Application Groups
- 2.4.1 Types of Hosts and Equipment2.4.2 Performance Characteristics2.4.3 Location Information
- 2.5.1 Existing Networks and Migration2.5.2 Functional Requirements2.5.3 Financial Requirements2.5.4 Enterprise Requirements
- 3.1 Gathering and Listing Requirements
- 3.1.1 Determining Initial Conditions3.1.2 Working with Users3.1.3 Listing Requirements and Mapping Applications
- 3.3.1 Usage Patterns3.3.2 Application Behavior
- 3.4.1 Reliability Requirements3.4.2 Delay Requirements3.4.3 Capacity Requirements3.4.4 Environment-Specific Thresholds3.4.5 Specified Services
- 3.5.1 Guidelines in Distinguishing Services
- 4.1 Templates, Tables, and Maps
- 4.1.1 Application Maps
- 4.2.1 Simplifying Assumption—Only Best-Effort Delivery4.2.2 Simplifying Assumption—Focusing on Highest-Priority Application
- 4.3.1 Background Information4.3.2 Project Definition4.3.3 Requirements Analysis
- 5.1 Background for Flow Analysis5.2 Flows5.3 Data Sources and Sinks5.4 Flow Models5.5 Flow Boundaries5.6 Flow Distributions5.7 The Flow Specification
- 5.7.1 The Flowspec Algorithm5.7.2 Performance Modifiers
- 6.1 Applying the Flow ModelsExample 6.1--Data Mining Environment6.2 Establishing Flow Boundaries6.3 Applying Flow Distributions
- 6.3.1 Guidelines for Flow Distributions6.3.2 Using the Flow Distributions
- 6.5.1 Identifying Flows in the Design Environment
- 6.6.1 Applying Cost Information to Flows
- 7.1 Simplifying the Flow Analysis Process
- 7.1.1 Simplifying Assumption 1: Showing Only Flow-Model-Based Flows7.1.2 Simplifying Assumption 2: Showing Only Backbone Flows7.1.3 Simplifying Assumption 3: Standardizing Flows
- 8.1 Background for Logical Design8.2 Establishing Design Goals8.3 Developing Criteria for Technology Evaluation
- 8.3.1 NBMA and Broadcast Technologies8.3.2 Functions and Features of the Technology8.3.3 Flow Considerations8.3.4 Guidelines and Constraints on Technology Evaluations
- 8.4.1 Sizing the Network8.4.2 Isolating Areas—The Black Box Method8.4.3 Applying Evaluation Criteria and Guidelines
- 8.5.1 An Integrated Design Environment
- 9.1 Background for Logical Design9.2 Shared Medium (No Interconnection)9.3 Switching and Routing: Comparisons and Contrasts9.4 Switching
- 9.4.1 ATM Switching
- 9.6.1 NHRP9.6.2 MPOA9.6.3 Service Switching
- 9.7.1 Hierarchy9.7.2 Redundancy
- 10.1 Integrating Network Management and Security into the Design10.2 Defining Network Management
- 10.2.1 Network Elements and Characteristics10.2.2 Monitoring and Metering10.2.3 Monitoring for Event Notification10.2.4 Monitoring for Metrics and Planning10.2.5 Generating the Characteristics Set
- 10.3.1 Instrumentation Methods
- 10.4.1 In-Band/Out-of-Band Monitoring10.4.2 Centralized/Distributed Monitoring10.4.3 Capacity and Delay Requirements10.4.4 Checks and Balances in Monitoring10.4.5 Flows of Management Data10.4.6 Configuration of Network Management
- 10.5.1 Security Policies10.5.2 Security Risk Analysis
- 10.6.1 Physical Security10.6.2 Security Awareness10.6.3 User Authentication10.6.4 Packet Filters10.6.5 Application Security Mechanisms10.6.6 Encryption10.6.7 Firewalls10.6.8 Security and System Components
- 10.7.1 External Firewall10.7.2 Internal Firewall10.7.3 Distributed Host Security
- 10.8.1 Evaluating and Selecting Resources10.8.2 Evaluating Trade-Offs in Architectures10.8.3 Integration with the Network Design10.8.4 Risk Analysis and Contingency Planning for the Design
- 11.1 Introduction to Physical Design11.2 Evaluating Cable Plant Design Options
- 11.2.1 Wiring in a Campus/MAN Environment11.2.2 Wiring in a Building Environment11.2.3 Choosing a Central Wiring Location11.2.4 Environmental Components
- 11.3.1 Hub Placement11.3.2 Router Placement11.3.3 Switch Placement11.3.4 Circuit-Level Equipment Placement
- 11.4.1 Maintenance of Diagrams11.4.2 Coding Schemes
- 12.1 Introduction to Addressing and Routing12.2 Establishing Routing Flows in the Design Environment
- 12.2.1 Functional Areas12.2.2 Identifying Boundaries12.2.3 Boundaries and Routing Flows
- 12.3.1 Default Route Propagation12.3.2 Route Filtering12.3.3 Route Aggregation12.3.4 Peering12.3.5 Policies and Policy Enforcement
- 12.4.1 Background12.4.2 Subnetting12.4.3 Variable-Length Subnetting12.4.4 Supernetting12.4.5 Applying Addressing Strategies
- 12.5.1 Protocol Analysis12.5.2 Choosing and Applying Routing Protocols
- Edition: 1
- Latest edition
- Published: June 20, 2012
- Language: English
JM
James D. McCabe
James D. McCabe is currently a network architect for NASA. McCabe's interest in network analysis and design dates from the late 1980s, when he first worked on designs for NASA's aerospace supercomputing networks. Subsequent designs for various commercial, government and academic networks led him to develop and publish the processes described in this book, which he also teaches to students at various corporations and conferences. McCabe holds a degree in chemical engineering from the Georgia Institute of Technology.