LEADER 03545nam a2200421Ii 4500 001 991003245819707536 006 m d 007 cr cn||||||||| 008 070806s2002 maua sb 001 0 eng d 020 $a9781555582715 020 $a1555582710 035 $ab13654688-39ule_inst 037 $a96115:96114$bElsevier Science & Technology$nhttp://www.sciencedirect.com 040 $aOPELS$cOPELS 049 $aTEFA 082 04$a004.6$222 100 1 $aKenyon, Tony,$d1960-$0623654 245 10$aData networks$h[electronic resource] :$brouting, security, and performance optimization /$cTony Kenyon. 260 $aBoston :$bDigital Press,$cc2002. 300 $axvi, 807 p. :$bill. ;$c24 cm. 504 $aIncludes bibliographical references and index. 505 0 $aA Review of the Basics; Addressing, Naming, and Configuration; Routing Technology; Multicast Network Design; Designing Secure Networks; Designing Reliable Networks; Network Optimization; Quality of Service; Network Management; Appendices: Mathematical Review; DNS Top Level Domain Codes; IP Protocol Numbers; UDP and TCP Port Numbers; Multicast and Broadcast Addresses; EtherType Assignments; Example MTTR Procedures; Index. 520 $aData Networks builds on the foundation laid in Kenyon's first book, High-Performance Data Network Design, with expanded coverage of routing, security, multicasting, and advanced design topics such as performance optimization and fault tolerance. Kenyon provides strategies for overcoming some of the most challenging problems in network design and management. He provides clear, specific solutions for day-to-day problems facing network designers and IT managers. In this book, you will find optimization advice from an experienced practitioner that you can put to work in your own system. As security and network performance become more and more critical to a company's success, the system administrator's job becomes even more difficult. Use the principles, tips, and techniques Kenyon offers here to enhance and protect the flow of data within your enterprise. Covers Addressing, Routing, Multicasting, and Quality of Service (QoS) design for enterprise network design. Extensive coverage on relevant Security Technologies and Virtual Private Network (VPN) implementation Provides advanced coverage on Risk Assessment, Availability Analysis, Fault Tolerance, Disaster Recovery, and Network Optimization. 533 $aElectronic reproduction.$bAmsterdam :$cElsevier Science & Technology,$d2007.$nMode of access: World Wide Web.$nSystem requirements: Web browser.$nTitle from title screen (viewed on Aug. 2, 2007).$nAccess may be restricted to users at subscribing institutions. 650 0$aRouters (Computer networks) 650 0$aComputer networks$xSecurity measures. 650 0$aHigh performance computing. 655 7$aElectronic books.$2local 776 1 $cOriginal$z1555582710$z9781555582715$w(DLC) 2002019364$w(OCoLC)48571591 856 40$3Referex$uhttp://www.sciencedirect.com/science/book/9781555582715$zAn electronic book accessible through the World Wide Web; click for information 856 42$zPublisher description$uhttp://catdir.loc.gov/catdir/description/els031/2002019364.html 856 41$zTable of contents$uhttp://www.loc.gov/catdir/toc/els031/2002019364.html 907 $a.b13654688$b24-02-22$c24-01-08 912 $a991003245819707536 994 $aC0$bTEF 996 $aData networks$91212791 997 $aUNISALENTO 998 $ale029$b24-01-08$cm$dm $e-$feng$gmau$h0$i0