ActionScripting in Flash MX

C

Cable plans, 13

Cache servers

access network concentrators, 532

in default router, 530–31

deployment, 528–29

deployment location, 529–33

deployment options, 530

international gateway, 532

in Layer 4 switches, 531

nontransparent, 528–29

perimeter gateways, 532

satellite interfaces, 532

semitransparent, 529

transparent, 529

WCCP, 531

Web Hosting/Reverse Proxy Configuration, 531–32

Caching

applications benefiting from, 525–28

basics, 523

capacity planning, 533–35

capacity/responsiveness and, 524

content optimization and, 523–24

defined, 523

DNS, 117, 120

hit ratio, 534

in internetwork, 528–33

management/control and, 524–25

measurement techniques, 535

performance metrics, 534–35

products, 535

reliability/availability and, 524

response time, 534

scalability and, 523, 525

synchronization and, 524

system design issues, 523–25

techniques, 522–35

Capacity planning, 533–35

Capture group, 660

Centralized model, 21–22

Certificate Authorities (CAs), 324–25

Certificate Repositories (CRs), 325

Certificate Revocation Lists (CRLs), 325–26

Challenge Handshake Authentication Protocol (CHAP), 330–31

Channel Service Units (CSUs), 40–41

Christmas tree, 316

Circuit switching

defined, 52

packet switching vs., 52–53

Cisco Group Membership Protocol (CGMP), 249

Class-Based Queuing (CBQ), 497–99, 565

defined, 497–98

effects, 498

with RSVP, 498

strengths, 499

Classless InterDomain Routing (CIDR), 145–48

BGP-4 support, 213

defined, 145–46

implementation, 147–48

policies/guidelines, 146–47

process, 145

route summarization and, 222

service provider types, 147–48

Client/server model, 22–23

applications in, 22–23

defined, 22

workgroup productivity, 22

Clustering, 439–42

defined, 441, 442

software, 441–42

techniques, 441

VRRP, 442

with Web Cache Control Protocol (WCCP), 531

CMIP/CMIS, 637, 661–67, 707

advantages, 666

applications, 662–63

architecture, 662–64

ASN.1, 665

background, 661–62

COTS, 662, 664

defined, 661–62

design, 662

disadvantages, 666–67

implementations, 662

performance, 666

primitives, 664–65

protocols, 664

See also Network management

Command-Line Interface (CLI), 668

Comma Separated Value (CSV) format, 698

Common Management Information Protocol/ Common Management Information Service. See CMIP/CMIS

Common Management Services and Protocol over LAN (CMOL), 664

Common Management Services and Protocol over TCP/IP (CMOT), 664

Common Object Request Broker Architecture (CORBA), 23, 24

Common Open Policy Service (COPS) protocol, 705

Component-level availability, 456–64

backplane design, 457–58

boot/configuration data, 463

disk mirroring, 458–59

hot swap, 458

RAID, 459–60

reliable power, 460–63

standby modules and spares, 463–64

techniques, 456

Compression

design guidelines, 486–87

disk, 542–43

hardware, 486

ITU-T fax, 484

Lempel-Ziv (LZ), 483

MNP, 484

MRU and, 485, 486

in networking, 483–85

proprietary header, 485

ratio, 483

RLE, 483–84

software, 486

Stac LZS, 485–86

TCP header, 484

techniques, 482–87

Computing models, 21–24

centralized, 21–22

client/server, 22–23

decentralized, 22

distributed, 22, 23–24

Confidentiality, 306

Configuration management, 667–70

automation/integration need, 668–69

defined, 635

large-scale, 670

operations, 667

planning and administration, 667

in practice, 667

scalability and, 667

Web-based, 669–70

See also Network management

Configuration scripts, 14

Congestion

control, 295

defined, 523

Congestion avoidance, 499–502

RED gateways, 500–502

taildrop, 500

techniques, 499–500

Connection-Oriented Transport Service (COTS), 662, 664

Connectivity, 50–53

methods, 50–51

switching, 52–53

Conservation law, 487–88

Constraint-Based Routing (CBR), 578–82

defined, 574, 578

with DiffServ, 626

implementation, 578, 581

interoperability with, 626–27

issues, 578

with MPLS, 627

route optimization, 580–82

routing algorithms, 580

routing granularity, 579

routing table structure/size, 580

with RSVP, 626–27

Spanning Trees, 579

summary, 628

topological state information and, 579–80

viable flow path, 581

Controlled load service, 602–3

Core-Based Trees (CBT), 281–82

defined, 281

design issues, 282

example topology, 282

interoperability, 283

operation, 281–82

See also Multicast routing

Cost(s)

of downtime, 394–95, 396

network, exploring, 9

path, 474

port, reducing, 226

Crossbar fabric, 230–31

Cryptography, 320–22

asymmetric, 321

Diffie-Helman (D-H) model, 321

encryption algorithms, 321–22

secret-key, 320

Custom queuing, 495–96

defined, 495

illustrated, 495

uses, 496

Категории