Skip to content

Managing Distributed Applications Troubleshooting in a Heterogeneous Environment

Best in textbook rentals since 2012!

ISBN-10: 0130177644

ISBN-13: 9780130177643

Edition: 2001

Authors: Mike Hicks

List price: $39.99
Blue ribbon 30 day, 100% satisfaction guarantee!
Out of stock
We're sorry. This item is currently unavailable.
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Customers also bought

Book details

List price: $39.99
Copyright year: 2001
Publisher: Prentice Hall PTR
Publication date: 11/2/2000
Binding: Mixed Media
Pages: 336
Size: 7.00" wide x 9.00" long x 1.00" tall
Weight: 1.430
Language: English

Preface
Acknowledgments
Introduction: an Overview
Why Distributed Applications?
Current Business Considerations
Managing the Application
Tools of the Trade
Tool Selection
Methodology
Define the Problem
Gather the Facts
Assess the Data
Make a Plan
Implement the Plan
Observe the Results
Summary
Basic Communications
Terminology
Local Area Network (LAN)
Hub
Bridges and LAN Switches
Router
Wide Area Network (WAN)
The Server
Three-tier Architecture
Network Classifications
LAN
WAN
Circuit-switched
Packet-switched
Architectural Configurations
Protocol Types
Physical Layer
Data Link
Network
Transport
Session
Presentation
Protocol Functions
Communications Protocols
Routing Protocols
Routed Protocols
Auxiliary Protocols
Dependencies
Address Resolution Protocol (ARP)
Windows Internet Service (WINS)
Internet Control Message Protocol (ICMP)
Client Configuration
Server Configuration
Security and Authentication
Summary
Distance Vector Protocols
Link State Protocols
File and Print
Overview
Application Basics
Application Operation
Dependencies
Summary
Directory Services
Overview
Protocol Types
Protocol Functions
SNMP
Authentication Services
Policy Management
Policy Framework and Architecture
Infrastructure Interaction
Summary
Security and Authentication
Overview
Policy
What Is to be Protected?
Technical Considerations
Trusted Networks
Untrusted Networks
Unknown Networks
Gateway Functions
User Authentication
Host-to-Host Authentication
Performance
Ports and Sockets
Summary
Web Systems
Overview
Application Basics
Protocols
Hypertext Transfer Protocol (HTTP)
File Transfer Protocol (FTP)
Internet Message Access Protocol (IMAP4)
Lightweight Directory Access Protocol (LDAP)
T.120
H.323
Push and Pull Services
Browsers
Architecture
Middleware
Summary
Messaging Systems
Overview
Protocol Types
Server-side Protocols
Client-side Protocols
Protocol Functions
Message Delivery
Architecture
Client-to-Client Communications
Client-to-Server Communications
Server-to-Server Communication
Fax Servers
Summary
Electronic Commerce Systems
Overview
Architecture
Protocol Types
Protocol Functions
Security and Authentication
Client Communications
Server Communications
Dependencies
Summary
Mainframe Connectivity
Overview
Legacy Connections
Terminal Emulation
Gateway Functions
System Architecture
Protocol Types
Protocol Functions
Transaction Service Layer
Dependencies
Summary
Case Studies
Overview
Case Study One--Connectivity issues
Summary
Case Study Two--Failure to Connect to Application
Make Observations
Summary
Case Study Three--Application Slowdown (partial elements)
Gather the Facts
Fact Gathering, Part Two
Summary
Case Study Four--Application Slowdown (Whole Application)
Define the Problem
Gather the Information
Assess the Data
Make the Plan
Implement the Plan
Is the Problem Solved?
Summary
Case Study Five--Intermittent Application Performance Degradation
Gather the Facts
Making Changes
Digging Deeper
Summary
Glossary
Guide to RFCs
Guide to Standards
Standards Organizations
Guide to Sockets and Ports (RFC 1700)
Microsoft Environment
Ports Used by WLBS and Convoy for Cluster Control
Ports Used by Microsoft Exchange Server Version 5.0
Guide to Organizationally Unique Identifiers (OUIs)
What standards are involved with OUI?
Index