| Introduction |
|
xiii | |
| SECTION I PLANNING FOR COMMUNICATIONS SYSTEMS |
|
1 | (12) |
|
The New Enterprise Network |
|
|
3 | (10) |
|
|
|
|
|
| SECTION II ENTERPRISE NETWORK ARCHITECTURE |
|
13 | (104) |
|
Gracefully Transitioning from SNA to IP: Why, How, and When? |
|
|
15 | (12) |
|
|
|
|
|
|
One Corporate Network---Dream or Nightmare? |
|
|
27 | (10) |
|
|
|
|
|
|
IPv6: The Next-Generation Internet Protocol |
|
|
37 | (14) |
|
|
|
|
|
|
Moving toward One Network: Practitioner's Steps to Consolidation of Data and Voice |
|
|
51 | (14) |
|
|
|
|
|
|
Integrating Data Centers with Intranets |
|
|
65 | (12) |
|
|
|
|
|
|
A Guide to Internet Telephony |
|
|
77 | (16) |
|
|
|
|
|
|
Implementing and Supporting Extranets |
|
|
93 | (12) |
|
|
|
|
|
|
Internet Site Development in a Bandwidth-Hungry World: An Enterprise Dilemma |
|
|
105 | (12) |
|
|
|
|
|
| SECTION III LAN AND CAMPUS NETWORKING |
|
117 | (116) |
|
|
|
119 | (10) |
|
|
|
|
|
|
Should You Migrate Your Token Ring Network to Ethernet? |
|
|
129 | (12) |
|
|
|
|
|
|
Introduction to 100Base-T: (Fast and Faster) Ethernet |
|
|
141 | (14) |
|
|
|
|
|
|
Understanding Gigabit Ethernet Performance |
|
|
155 | (8) |
|
|
|
|
|
|
Asynchronous Transfer Mode (ATM) Implementation |
|
|
163 | (22) |
|
|
|
|
|
|
|
|
185 | (8) |
|
|
|
|
|
|
|
|
193 | (12) |
|
|
|
|
|
|
Voice and Video on the LAN |
|
|
205 | (10) |
|
|
|
|
|
|
Voice and Data Network Integration |
|
|
215 | (10) |
|
|
|
|
|
|
|
|
225 | (8) |
|
|
|
|
|
| SECTION IV REMOTE ACCESS |
|
233 | (80) |
|
|
|
235 | (6) |
|
|
|
|
|
|
Choosing Asymmetrical Digital Subscriber Lines |
|
|
241 | (8) |
|
|
|
|
|
|
Preparing for Cable Modems |
|
|
249 | (8) |
|
|
|
|
|
|
Virtual Private Networks: Secure Remote Access over the Internet |
|
|
257 | (14) |
|
|
|
|
|
|
ATM Access: The Genesis of a New Network |
|
|
271 | (12) |
|
|
|
|
|
|
|
|
283 | (14) |
|
|
|
|
|
|
Cellular Digital Packet Data: An Emerging Mobile Network Service |
|
|
297 | (16) |
|
|
|
|
|
| SECTION V WIDE AREA NETWORK |
|
313 | (74) |
|
An Overview of the Telecommunications Policy Process |
|
|
315 | (10) |
|
|
|
|
|
|
The Future of Wireless Communications |
|
|
325 | (14) |
|
|
|
|
|
|
Frame Relay Testing and Training |
|
|
339 | (12) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Transporting Legacy SNA Traffic over Frame Relay |
|
|
351 | (10) |
|
|
|
|
|
|
Maximizing Mainframe-Based WAN Resources |
|
|
361 | (12) |
|
|
|
|
|
|
SONET for the Future: Satisfying Today's Users with Tomorrow's Technology |
|
|
373 | (14) |
|
|
|
|
|
| SECTION VI DATA CENTER |
|
387 | (92) |
|
Data Center Security: Useful Intranet Security Methods and Tools |
|
|
389 | (18) |
|
|
|
|
|
|
Why Parallel Sysplex is a Must for Today's IBM Data Centers |
|
|
407 | (12) |
|
|
|
|
|
|
Web-to-Host with VM/ESA: A Viable Platform for the Internet |
|
|
419 | (10) |
|
|
|
|
|
|
|
|
429 | (8) |
|
|
|
|
|
|
LAN-to-Mainframe Connectivity Choices |
|
|
437 | (10) |
|
|
|
|
|
|
|
|
447 | (14) |
|
|
|
|
|
|
Fibre Channel Architecture, Layers, and Services |
|
|
461 | (8) |
|
|
|
|
|
|
Mainframe Shops Falling Behind on E-Commerce Due to Y2K |
|
|
469 | (10) |
|
|
|
|
|
| SECTION VII CLIENTS AND SERVERS |
|
479 | (92) |
|
TN3270 and TN5250 Internet Standards |
|
|
481 | (12) |
|
|
|
|
|
|
Y2K on the Desktop: Where the Enterprise Meets Its Waterloo |
|
|
493 | (8) |
|
|
|
|
|
|
Network Computers: Promises and Reality |
|
|
501 | (12) |
|
|
|
|
|
|
Handheld Network Devices to Access Intranets and Enterprise Networks |
|
|
513 | (14) |
|
|
|
|
|
|
Networking Features of the Java Programming Language |
|
|
527 | (12) |
|
|
|
|
|
|
JavaBeans and Java Enterprise Server Platform |
|
|
539 | (10) |
|
|
|
|
|
|
A Quick Overview of Linux |
|
|
549 | (10) |
|
|
|
|
|
|
Evaluating the Performance of NT-Based Systems |
|
|
559 | (12) |
|
|
|
|
|
| SECTION VIII SECURITY |
|
571 | (106) |
|
Secure Access to Mission-Critical Applications |
|
|
573 | (14) |
|
|
|
|
|
|
Applets and Network Security: A Management Overview |
|
|
587 | (8) |
|
|
|
|
|
|
|
|
595 | (20) |
|
|
|
|
|
|
|
|
615 | (8) |
|
|
|
|
|
|
Creating Firewall Policy Following a Functional Model |
|
|
623 | (12) |
|
|
|
|
|
|
Assessing and Eliminating Virus Threats in Distributed Networks |
|
|
635 | (12) |
|
|
|
|
|
|
|
|
647 | (16) |
|
|
|
|
|
|
|
|
663 | (14) |
|
|
|
|
|
| SECTION IX NETWORK MANAGEMENT |
|
677 | (52) |
|
Network Baselining as a Planning Tool |
|
|
679 | (8) |
|
|
|
|
|
|
Working with TCP/IP Utilities |
|
|
687 | (10) |
|
|
|
|
|
|
Using RMON to Manage Remote Networks |
|
|
697 | (10) |
|
|
|
|
|
|
Proactive Performance Management |
|
|
707 | (10) |
|
|
|
|
|
|
Using Intelligent Agents to Manage Multivendor Environments |
|
|
717 | (12) |
|
|
|
|
|
| Index |
|
729 | |