Just a decade ago, many industry luminaries predicted the collapse of the centralized data center and IT structure. In its place would be a more decentralized client/server model built upon the Open Systems Interconnect (OSI) networking architecture. However, client/server never fully realized all of its promises, and OSI floundered.
Now, instead of client/server and OSI, we have the Web-based model and TCP P. Together, Web-oriented technologies (i.e., browsers, web servers, HTML, Java) and TCP P are completely changing how the enterprise views its network. Instead of serving as primarily an internal utility, the enterprise network is now a vital means of delivering products and services and of tying an enterprise more closely to its customers, partners and suppliers. The impact to the very structure of the enterprise network could not be more profound. Providing extensive coverage of planning, networking, LANs, systems management, communications issues and trends, Communications Systems Management Handbook, 6th Edition is your most reliable source for solid, dependable solutions to real-world data communications problems. The tips, strategies, and case-studies provided do more than just save you time and money. They also save your data communications network, and with it your professional life. This new edition of the Communications Systems Management Handbook provides you with detailed information on the different facets of change in the enterprise network:oEnterprise network architecturesoLAN and campus networkingoRemote accessoWANoData centersoClient and serversoSecurityoNetwork ManagementWhat's more, the New Edition is dramatically restructured, providing a more logical grouping of articles into discrete sections that bring focus to a particular enterprise networking topic. In addition, the content of this edition has been substantially updated. Almost three-quarters of the articles are new to this edition. The common theme throughout the handbook is the change that the enterprise network is undergoing and how to manage it.
The handbook's generous use of illustrations simplifies the technical workings of networks and communications systems. The comprehensive index makes it easy to find the topics you want and related topics. And because each chapter is written by an expert with first-hand experience in data communications, no other book gives you such a full range of perspectives and explanations of the technical, planning, administrative, personnel, and budget challenges of the communication manager's job.
Covering everything from electronic commerce to multimedia, from system design and cost allocation to Ethernet switches and the impact of virtual private networks, this is your one-stop source for the best, most essential data communications expertise to be found anywhere. The Communications Systems Management Handbook serves as an information tool for proven advice and methods on managing ne
Anura Guruge (Gurutech Gilford New Hampshire USA)
, Lisa Gaetta (University of Kentucky
, Lisa M. Lindgren
Auerbach Publishers Inc.
Country of Publication:
6th New edition
25 October 1999
Professional and scholarly
Professional & Vocational
A / AS level
Further / Higher Education
Introduction PLANNING FOR COMMUNICATIONS SYSTEMS The New Enterprise Network, L.M. Lindgren ENTERPRISE NETWORK ARCHITECTURE Gracefully Transitioning from SNA to IP, A. Guruge One Corporate Network-Dream or Nightmare? D. Kidder IPv6: The Next-Generation Internet Protocol, G. C. Kessler Moving toward One Network: Practitioner's Steps to Consolidation of Data and Voice, L. Bobbitt Integrating Data Centers with Intranets, A. Guruge A Guide to Internet Telephony, N.J. Muller Implementing and Supporting Extranets, P.Q. Maier Internet Site Development in a Bandwidth-Hungry World: An Enterprise Dilemma, D. Gonneau LAN AND CAMPUS NETWORKING High-Speed Token Ring, M. Taylor Should You Migrate Your Token Ring Network to Ethernet? R. Campbell Introduction to 100Base-T: (Fast and Faster) Ethernet, C. Mick Understanding Gigabit Ethernet Performance, G. Held ATM Implementation, J.R. Vacca Virtual LANs, G. Held Multicast Networking, C.K. Miller Voice and Video on the LAN, M. Taylor Voice and Data Network Integration, L. Schessel REMOTE ACCESS New Modem Technologies and Trends, N.J. Muller Choosing Asymmetrical Digital Subscriber Lines, G. Held Preparing for Cable Modems, G. Held Virtual Private Networks: Secure Remote Access over the Internet, J. Vacca ATM Access: The Genesis of a New Network, W.R. Koss Portable Network Access, G. Held Cellular Digital Packet Data: An Emerging Mobile Network Service, N.J. Muller WIDE AREA NETWORK An Overview of the Telecommunications Policy Process, L.A. Wrobel The Future of Wireless Communications, R. Rosenbaum Frame Relay Testing and Training, S. Greer, P. Luff, and S. Yarborough Transporting Legacy SNA Traffic over Frame Relay, A. Llana, Jr. Maximizing Mainframe-Based WAN Resources, G. Persil SONET for the Future: Satisfying Today's Users with Tomorrow's Technology, L.A. Wrobel DATA CENTER Data Center Security: Useful Intranet Security Methods and Tools, J.R. Vacca Why Parallel Sysplex Is a Must for Today's IBM Data Centers, A. Guruge Web-to-Host with VM/ESA: A Viable Platform for the Internet, J. Foxworthy Java on the Mainframe, A. Guruge LAN-to-Mainframe Connectivity Choice, L.M. Lindgren Storage Area Networks, J. Morin Fibre Channel Architecture, Layers, and Services, E. Frymoyer Mainframe Shops Falling Behind on E-Commerce Due to Y2K, A. Guruge CLIENTS AND SERVERS TN3270 and TN5250 Internet Standards, E. Bailey Y2K on the Desktop: Where the Enterprise Meets Its Waterloo, R. Angerame Network Computers: Promises and Reality, N.J. Muller Handheld Network Devices to Access Intranets and Enterprise Networks, J.R. Vacca Networking Features of the Java Programming Language, J.P. Slone JavaBeans and Java Enterprise Server Platform, D. Wadsworth A Quick Overview of Linux, R. Rajagopal Evaluating the Performance of NT-Based Systems, G. Held SECURITY Secure Access to Mission-Critical Applications, D. Johnson Applets and Network Security: A Management Overview, A. Berg Intranet Security, J.R. Vacca A Look at Java Security, B. Rothke Creating Firewall Policy Following a Functional Model, J.P. Ceraolo Assessing and Eliminating Virus Threats in Distributed Networks, F. Horwitz Mobile User Security, R.R. Stahl, Jr. NETWORK MANAGEMENT Network Baselining as a Planning Tool, G. Held Working with TCP/IP Utilities, G. Held Using RMON to Manage Remote Networks, G. Held Proactive Performance Management, T. Clark Using Intelligent Agents to Manage Multivendor Environments, N.J. Muller INDEX