Top-down network design / (Registro nro. 12841)
[ vista simple ]
000 -Cabecera | |
---|---|
Campo de control de longitud fija | 18859nam a2200301 a 4500 |
003 - Identificador del Número de control | |
Identificador del número de control | AR-sfUTN |
008 - Códigos de información de longitud fija-Información general | |
Códigos de información de longitud fija | 170717b ||||| |||| 00| 0 d |
020 ## - ISBN | |
ISBN | 1587051524 |
040 ## - Fuente de la catalogación | |
Centro transcriptor | AR-sfUTN |
041 ## - Código de lengua | |
Código de lengua del texto | eng |
080 ## - CDU | |
Clasificación Decimal Universal | 004.7 OP5 |
Edición de la CDU | 2000 |
100 1# - Punto de acceso principal-Nombre de persona | |
Nombre personal | Oppenheimer, Priscilla |
245 10 - Mención de título | |
Título | Top-down network design / |
Mención de responsabilidad | Priscilla Oppenheimer. |
250 ## - Mención de edición | |
Mención de edición | 2nd. |
260 ## - Publicación, distribución, etc. (pie de imprenta) | |
Lugar de publicación, distribución, etc. | Indianápolis: |
Nombre del editor, distribuidor, etc. | Cisco, |
Fecha de publicación, distribución, etc. | 2004 |
300 ## - Descripción física | |
Extensión | 566 p. |
336 ## - Tipo de contenido | |
Fuente | rdacontent |
Término de tipo de contenido | texto |
Código de tipo de contenido | txt |
337 ## - Tipo de medio | |
Fuente | rdamedia |
Nombre del tipo de medio | sin mediación |
Código del tipo de medio | n |
338 ## - Tipo de soporte | |
Fuente | rdacarrier |
Nombre del tipo de soporte | volumen |
Código del tipo de soporte | nc |
505 80 - Nota de contenido con formato | |
Nota de contenido con formato | CONTENIDO<br/>Part I. Identifying Your Customer´s Needs and Goals 3<br/>Chapter 1. Analyzing Business Goals and Constraints 5<br/>Using a Top-Down Network Design Methodology 5<br/>Using a Structured Network Design Process 7<br/>Systems Development Life Cycles 7<br/>The Plan Design Implement Operate Optimize (PDIOO) Network Life Cycle 9<br/>Analyzing Business Goals 10<br/>Working with Your Client la Changes in Enterprise Networks 12<br/>Networks Must Make Business Sense 13<br/>The Need to Support Mobile Users 14<br/>The Importance of Network Security and Resiliency 14<br/>Typical Network Design Business Goals 16<br/>Identifying the Scope of a Network Design Project 16<br/>Identifying a Customer's Network Applications 18<br/>Analyzing Business Constraints 21<br/>Politics and Policies 21<br/>Budgetary and Staffing Constraints 23<br/>Project Scheduling 24<br/>Business Goals Checklist 24<br/>Summary 25<br/>Chapter 2. Analyzing Technical Goals and Tradeoffs 27<br/>Scalability 27<br/>Planning for Expansion 27<br/>Expanding Access to Data 28<br/>Constraints on Scalability 29<br/>Availability 29<br/>Disaster Recovery 30<br/>Specifying Availability Requirements 31<br/>Five Nines Availability 32<br/>The Cost of Downtime 34<br/>Mean Time Between Failure and Mean Time to Repair 34<br/>Network Performance 35<br/>Network Performance Definitions 35<br/>Optimum Network Utilization 36<br/>Throughput 39<br/>Throughput of Internetworking Devices 39<br/>Application Layer Throughput 40<br/>Accuracy 42<br/>Efficiency 43<br/>Delay and Delay Variation 45<br/>Causes of Delay 46<br/>Delay Variation 48<br/>Response Time 48<br/>Security 49<br/>Identifying Network Assets 50<br/>Analyzing Security Risks 51<br/>Reconnaissance Attacks 52<br/>Denial-of-Service Attacks 53<br/>Developing Security Requirements 53<br/>Manageability 54<br/>Usability 55<br/>Adaptability 55<br/>Affordability 56<br/>Making Network Design Tradeoffs 57<br/>Technical Goals Checklist 59<br/>Summary 60<br/>Chapter 3. Characterizing the Existing Internetwork 63<br/>Characterizing the Network Infrastructure 63<br/>Developing a Network Map 64<br/>Tools for Developing Network Maps 64<br/>Characterizing Large Internetworks 64<br/>Characterizing the Logical Architecture 66<br/>Developing a Modular Block Diagram 67<br/>Characterizing Network Addressing and Naming 67<br/>Characterizing Wiring and Media 70<br/>Checking Architectural and Environmental Constraints 73<br/>Checking a Site for a Wireless Installation 74<br/>Doing a Wireless Site Survey 75<br/>Checking the Health of the Existing Internetwork 76<br/>Developing a Baseline of Network Performance 77<br/>Analyzing Network Availability 77<br/>Analyzing Network Utilization 78<br/>Measuring Bandwidth Utilization by Protocol 80<br/>Analyzing Network Accuracy 81<br/>Analyzing Errors on Switched Ethemet Networks 82<br/>Analyzing Network Efficiency 84<br/>Analyzing Delay and Response Time 86<br/>Checking the Status of Major Routers, Switches, and Firewalls 87<br/>Tools for Characterizing the Existing Internetwork 89<br/>Protocol Analyzers 89<br/>Network-Monitoring and Management Tools 89<br/>Remote Monitoring Tools 90<br/>Cisco Tools for Characterizing an Existing Internetwork 91<br/>Organizations That Provide Information on Characterizing an Existing Internetwork 92<br/>Network Health Checklist 92<br/>Summary 93<br/>Chapter 4. Characterizing Network Traffic 95<br/>Characterizing Traffic Flow 95<br/>Identifying Major Traffic Sources and Stores 95<br/>Documenting Traffic Flow on the Existing Network 97<br/>Characterizing Types of Traffic Flow for New Network Applications 98<br/>Terminal/Host Traffic Flow 99<br/>Client/Server Traffic Flow 99<br/>Thin Client Traffic Flow 100<br/>Peer-to-Peer Traffic Flow 101<br/>Server/Server Traffic Flow 102<br/>Distributed Computing Traffic Flow 102<br/>Traffic Flow in Voice over IP Networks 103<br/>Documenting Traffic Flow for New and Existing Network Applications 104<br/>Characterizing Traffic Load 105<br/>Calculating Theoretical Traffic Load 106<br/>Documenting Application-Usage Patterns 107<br/>Refining Estimates of Traffic Load Caused by Applications 108<br/>Estimating Traffic Overhead for Various Protocols 109<br/>Estimating Traffic Load Caused by Workstation and Session Initialization 109<br/>Estimating Traffic Load Caused by Routing Protocols 111<br/>Characterizing Traffic Behavior 111<br/>Broadeast/Multieast Behavior 112<br/>Network Efficiency 113<br/>Frame Size 113<br/>Protocol Interaction 114<br/>Windowing and Flow Control 116<br/>Error-Recovery Mechanisms 118<br/>Characterizing Quality of Service Requirements 119<br/>ATM Quality of Service Specifications 119<br/>Constant Bit Rate Service Category 120<br/>Realtime Variable Bit Rate Service Category 121<br/>Non-Realtime Variable Bit Rate Service Category 121<br/>Unspecified Bit Rate Service Category 121<br/>Available Bit Rate Service Category 121<br/>Guaranteed Frame Rate Service Category 122<br/>IETF Integrated Services Working Group Quality of Service Specifications 122<br/>Controlled-Load Service 123<br/>Guaranteed Service 124<br/>IETF Differentiated Services Working Group Quality of Service Specifications 125<br/>Grade of Service Requirements for Voice Applications 126<br/>Documenting QoS Requirements 127<br/>Network Traffic Checklist 128<br/>Summary 128<br/>Summary for Part I 128<br/>Part II. Logical Network Design 131<br/>Chapter 5. Designing a Network Topology 133<br/>Hierarchical Network Design 133<br/>Why Use a Hierarchical Network Design Model? 135<br/>Flat Versus Hierarchical Topologies 136<br/>Mesh Versus Hierarchical-Mesh Topologies 138<br/>The Classic Three-Layer Hierarchical Model 141<br/>The Core Layer 142<br/>The Distribution Layer 142<br/>The Access Layer 143<br/>Guidelines for Hierarchical Network Design 143<br/>Redundant Network Design Topologies 145<br/>Backup Paths 146<br/>Load Sharing 147<br/>Modular Network Design 148<br/>The Enterprise Composite Network Model 148<br/>Designing a Campus Network Design Topology 150<br/>The Spanning Tree Protocol 151<br/>STP Convergence 151<br/>Selecting the Root Bridge 153<br/>The STP Topology Change Process 154<br/>Scaling the Spanning Tree Protocol 155<br/>Rapid Reconfiguration of the Spanning Tree 155<br/>Virtual LANs 156<br/>Fundamental VLAN Designs 157<br/>Wireless LANs 160<br/>Positioning an Access Point for Maximum Coverage 160<br/>WLANs and VLANs 161<br/>Redundant Wireless Access Points 161<br/>Redundancy and Load Sharing in Wired LANs 162<br/>Server Redundancy 163<br/>Workstation-to-Router Redundancy 165<br/>AppleTalk Workstation-to-Router Communication 166<br/>Novell NetWare Workstation-to-Router Communication 167<br/>IP Workstation-to-Router Communication 167<br/>Designing the Enterprise Edge Topology 170<br/>Redundant WAN Segments 170<br/>Circuit Diversity 171<br/>Multihoming the Internet Connection 171<br/>Virtual Private Networking 175<br/>Site-to-Site VPNs 176<br/>Remote-Access VPNs 177<br/>The Service Provider Edge 178<br/>Secure Network Design Topologies 180<br/>Planning for Physical Security 180<br/>Meeting Security Goals with Firewall Topologies 180<br/>Summary 182<br/>Chapter 6. Designing Models for Addressing and Naming 185<br/>Guidelines for Assigning Network Layer Addresses 186<br/>Using a Structured Model for Network Layer Addressing 186<br/>Administering Addresses by a Central Authority 187<br/>Distributing Authority for Addressing 188<br/>Using Dynamic Addressing for End Systems 188<br/>AppleTalk Dynamic Addressing 189<br/>Novell NetWare Dynamic Addressing 190<br/>IP Dynamic Addressing 191<br/>Using Private Addresses in an IP Environment 195<br/>Caveats with Private Addressing 196<br/>Network Address Translation 197<br/>Using a Hierarchical Model for Assigning Addresses 197<br/>Why Use a Hierarchical Model for Addressing and Routing? 198<br/>Hierarchical Routing 198<br/>Classless Interdomain Routing 199<br/>Classless Routing Versus Classful Routing 199<br/>Route Summarization (Aggregation) 201<br/>Route Summarization Example 201<br/>Route Summarization Tips 202<br/>Discontiguous Subnets 203<br/>Mobile Hosts 204<br/>Variable-Length Subnet Masking 204<br/>Hierarchy in IP Version 6 Addresses 205<br/>IPv6 Address Types 206<br/>Strategies for Moving fram IPv4 to IPv6 209<br/>Designing a Model for Naming 209<br/>Distributing Authority for Naming 210<br/>Guidelines for Assigning Names 211<br/>Assigning Names in a NetBIOS Environment 212<br/>NetBIOS in a Bridged or Switched Environment (NetBEUI) 212<br/>NetBIOS in a Novell NetWare Environment (NWLink) 213<br/>NetBIOS in a TCP/IP Environment (NetBT) 213<br/>Assigning Names in an IP Environment 215<br/>The Domain Name System 215<br/>Summary 217<br/>Chapter 7. Selecting Switching and Routing Protocols 221<br/>Making Decisions as Part of the Top-Down Network Design Process 222<br/>Selecting Bridging and Switching Protocols 223<br/>Transparent Bridging 224<br/>Transparent Switching 225<br/>Switching and tue OSI Layers 225<br/>Multilayer Switching 226<br/>Selecting Spanning Tree Protocol Enhancements 227<br/>PortFast 227<br/>UplinkFast and BackboneFast 228<br/>Unidirectional Link Detection 230<br/>Loop Guard 230<br/>Protocols for Transporting VLAN Information 231<br/>Inter-Switch Link Protocol 231<br/>Dynamic Inter-Switch Link Protocol 231<br/>IEEE 802.1Q 232<br/>VLAN Trunk Protocol 233<br/>Selecting Routing Protocols 234<br/>Characterizing Routing Protocols 234<br/>Distance-Vector Versus Link-State Routing Protocols 235<br/>Routing Protocol Metrics 239<br/>Hierarchical Versus Nonhierarchical Routing Protocols 239<br/>Interior Versus Exterior Routing Protocols 239<br/>Classful Versus Classless Routing Protocols 23<br/>Dynamic Versus Static and Default Routing 240<br/>On-Demand Routing 241<br/>Scalability Constraints for Routing Protocols 241<br/>IP Routing 243<br/>Routing Information Protocol 243<br/>Interior Gateway Routing Protocol 244<br/>Enhanced Interior Gateway Routing Protocol 246<br/>Open Shortest Path First 247<br/>Intermediate System-to-Intermediate System 250<br/>Border Gateway Protocol 251<br/>AppleTalk Routing 252<br/>Routing Table Maintenance Protocol 252<br/>AppleTalk Update-Based Routing Protocol 253<br/>EIGRP for AppleTalk 254<br/>Migrating an AppleTalk Network to IP Routing 254<br/>Novell NetWare Routing 254<br/>Internetwork Packet Exchange Routing Information Protocol 255<br/>NetWare Link Services Protocol 255<br/>EIGRP for IPX 256<br/>Migrating a NetWare Network to IP Routing 256<br/>Using Multiple Routing Protocols in an Internetwork 257<br/>Routing Protocols and the Hierarchical Design Model 257<br/>Routing Protocols for the Core Layer 258<br/>Routing Protocols for the Distribution Layer 258<br/>Routing Protocols for the Access Layer 258<br/>Redistribution Between Routing Protocols 259<br/>Integrated Routing and Bridging 261<br/>A Summary of IP, AppleTalk, and IPX Routing Protocols 261<br/>Summary 264<br/>Chapter 8. Developing Network Security Strategies 267<br/>Network Security Design 267<br/>Identifying Network Assets and Risks 268<br/>Analyzing Security Tradeoffs 269<br/>Developing a Security Plan 269<br/>Developing a Security Policy 270<br/>Components of a Security Policy 271<br/>Developing Security Procedures 271<br/>Security Mechanisms 271<br/>Physical Security 272<br/>Authentication 272<br/>Authorization 273<br/>Accounting (Auditing) 274<br/>Data Encryption 274<br/>Public/Private Key Encryption 275<br/>Packet Filters 277<br/>Firewalls 277<br/>Intrusion Detection Systems 278<br/>Modularizing Security Design 278<br/>Securing Internet Connections 279<br/>Securing Public Servers 280<br/>Securing E-Commerce Servers 281<br/>Securing Remote-Access and Virtual Private Networks 281<br/>Securing Dialup Access 282<br/>Securing Virtual Private Networks 283<br/>Securing Network Services and Network Management 284<br/>Securing Server Farms 285<br/>Securing User Services 286<br/>Securing Wireless Networks 287<br/>Authentication in Wireless Networks 28<br/>Data Privacy in Wireless Networks 293<br/>Summary 295<br/>Chapter 9. Developing Network Management Strategies 299<br/>Network Management Strategies 299<br/>Proactive Network Management 300<br/>Network Management Processes 300<br/>Performance Management 301<br/>Fault Management 302<br/>Configuration Management 303<br/>Security Management 304<br/>Accounting Management 304<br/>Network Management Architectures 305<br/>In-Band Versus Out-of-Band Monitoring 306<br/>Centralized Versus Distributed Monitoring 306<br/>Selecting Protocols for Network Management 307<br/>Simple Network Management Protocol 307<br/>Management Information Bases (MIEs) 308<br/>Remote Monitoring (RMON) 309<br/>Cisco Discovery Protocol 311<br/>Estimating Network Traffic Caused by Network Management 312<br/>Selecting Tools for Network Management 312<br/>Cisco Tools 313<br/>Cisco NetFlow Accounting 313<br/>Cisco's Service Assurance Agent (SAA) 314<br/>Summary 315<br/>Summary for Part II 315<br/>Part III Physical Network Design 317<br/>Chapter 10. Selecting Technologies and Devices for Campus Networks 319<br/>LAN Cabling Plant Design 320<br/>Cabling Topologies 320<br/>Building-Cabling Topologies 321<br/>Campus-Cabling Topologies 322<br/>Types of Cables 323<br/>LAN Technologies 325<br/>Ethernet 326<br/>Ethernet and IEEE 802.3 327<br/>Ethernet Technology Choices 328<br/>Campus ATM Networks 339<br/>Selecting Internetworking Devices for a Campus Network Design 341<br/>Optimization Features on Campus Internetworking Devices 344<br/>An Example of a Campus Network Design 344<br/>Background Information for the Campus Network Design Project 345<br/>Business Goals 345<br/>Technical Goals 346<br/>Network Applications 347<br/>User Communities 347<br/>Data Stores (Servers) 349The Current Network at WVCC 349<br/>Traffic Characteristics of Network Applications 352<br/>A Surnmary of Traffic Flows 353<br/>Performance Characteristics of the Current Network 355<br/>The Network Redesign for WVCC 355<br/>Optimized IP Addressing and Routing for the Campus Backbone 355<br/>The Wireless Network 356<br/>Improved Performance and Security for the Edge of the Network 358<br/>Future Enhancements for the WVCC Campus Network 359<br/>Summary 360<br/>Chapter 11. Selecting Technologies and Devices tor Enterprise Networks 363<br/>Remote-Access Technologies 364<br/>Point-to-Point Protocol 365<br/>Multilink PPP and Multichassis Multilink PPP 365<br/>Password Authentication Protocol and Challenge Handshake Authentication Protocol 366<br/>Integrated Services Digital Network 367<br/>ISDN Components 369<br/>Cable Modem Remote Access 370<br/>Challenges Associated with Cable Modem Systems 371<br/>Digital Subscriber Line Remote Access 372<br/>Other DSL Implementations 373<br/>PPP and ADSL 373<br/>Selecting Remote-Access Devices for an Enterprise Network Design 374<br/>Selecting Devices for Remote Users 374<br/>Selecting Devices for the Central Site 375<br/>VPN Concentrators 376<br/>WAN Technologies 377<br/>Systems for Provisioning WAN Bandwidth 377<br/>Leased Lines 379<br/>Synchronous Optical Network 379<br/>Frame Relay 381<br/>Frame Relay Hub-and-Spoke Topologies and Subinterfaces 382<br/>Frame Relay Congestion Control Mechanisms 383<br/>Frame Relay Traffic Control 384<br/>Frame Relay/ATM Interworking 385<br/>ATM Wide-Area Networks 385<br/>Ethernet over ATM 386<br/>Selecting Routers for an Enterprise WAN Design 387<br/>Selecting a WAN Service Provider 387<br/>An Example of a WAN Design 389<br/>Background Information for the WAN Design Project 389<br/>Business and Technical Goals 390<br/>Network Applications 390<br/>User Communities 391<br/>Data Stores (Servers) 392<br/>The Current Network 392<br/>Traffic Characteristics of the Existing WAN 392<br/>The WAN Design for Klamath Paper Products 394<br/>Summary 397<br/>Summary for Part III 398<br/>Part IV. Testing, Optimizing, and Documenting Your Network Design 401<br/>Chapter 12. Testing Your Network Design 403<br/>Using Industry Tests 404<br/>Building and Testing a Prototype Network System 405<br/>Determining the Scope of a Prototype System 405<br/>Writing a Test Plan for the Prototype System 407<br/>Developing Test Objectives and Aeceptance Criteria 407<br/>Determining the Types of Tests to Run 408<br/>Documenting Network Equipment and Other Resources 409<br/>Writing Test Scripts 410<br/>Documenting the Project Timeline 411<br/>Implementing the Test Plan 412<br/>Tools for Testing a Network Design 412<br/>Types of Tools 412<br/>Specific Tools for Testing a Network Design 414<br/>CiscoWorks Internetwork Performance Monitor 414<br/>WANDL's Network-Planning and Analysis Tools 414<br/>OPNET Technologies 415<br/>Agilent's RouterTester 415<br/>NetIQ Voice and Video Management Solution 415<br/>NetPredict's NetPredictor 415<br/>An Example of a Network Design Testing Scenario 416<br/>Background Information for the Design and Testing Project at Umqua Systems, Inc. 416<br/>Goals for the Design and Testing Project 416<br/>Network Applications 417<br/>The Current Network 418<br/>Testing Methods Used 419<br/>Measured Data 419<br/>Load on the FDDI Backbone 419<br/>Load on the DS-1 Circuits 423<br/>Analysis of the New Order-Entry System 424<br/>Delay Characteristics for the New Order-Entry System 425<br/>Conclusions 426<br/>Summary 427<br/>Chapter 13. Optimizing Your Network Design 429<br/>Optimizing Bandwidth Usage with IP Multicast Technologies 430<br/>IP Multicast Addressing 431<br/>The Internet Group Management Protocol 431<br/>Multicast Routing Protocols 432<br/>Multicast Open Shortest Path First 432<br/>Protocol-Independent Multicast 433<br/>Reducing Serialization Delay 435<br/>Link-Layer Fragmentation and Interleaving 435<br/>Compressed Real Time Protocol 436<br/>Optimizing Network Performance to Meet Quality of Service Requirements 437<br/>IP Precedence and Type of Service 438<br/>The IP Precedence Field 439<br/>The IP Type-of-Service Field 439<br/>The IP Differentiated Services Field 440<br/>IP Version 6 QoS 440<br/>The Resource Reservation Protocol 441<br/>The Common Open Policy Service Protocol 443<br/>Classifying LAN Traffic 443<br/>Cisco Internetwork Operating System Features for Optimizing Network Performance 444<br/>Switching Techniques 444<br/>Classic Methods for Layer 3 Packet Switching 445<br/>NetFlow Switching 446<br/>Cisco Express Forwarding 447<br/>Queuing Services 448<br/>First In, First Out Queuing 448<br/>Priority Queuing 449<br/>Custom Queuing 450<br/>Weighted Fair Queuing 451<br/>Class-Based Weighted Fair Queuing 451<br/>Low-Latency Queuing 452<br/>Random Early Detection 453<br/>Weighted Random Early Detection 453<br/>Traffic Shaping 454<br/>Committed Access Rate 454<br/>Summary 455<br/>Chapter 14. Documenting Your Network Design 457<br/>Responding to a Customer's Request for Proposal 458<br/>Contents of a Network Design Document 460<br/>Executive Summary 460<br/>Project Goal 460<br/>Project Scope 460<br/>Design Requirements 461<br/>Business Goals 461<br/>Technical Goals 462<br/>User Communities and Data Stores 463<br/>Network Applications 463<br/>Current State of the Network 463<br/>Logical Design 464<br/>Physical Design 464<br/>Results of Network Design Testing 465<br/>Implementation Plan 465<br/>Project Schedule 466<br/>Project Budget 467<br/>Return on Investment 467<br/>Design Document Appendix 468<br/>Summary 469<br/>Appendix A Characterizing Network Traffic When Workstations Boot 471<br/>Appendix B References and Recommended Reading 479<br/>Glossary 483<br/>Index 535 |
650 ## - Punto de acceso adicional de materia - Término de materia | |
Término de materia | LOGICAL NETWORK DESIGN |
650 ## - Punto de acceso adicional de materia - Término de materia | |
Término de materia | PHYSICAL NETWORK DESIGN |
650 ## - Punto de acceso adicional de materia - Término de materia | |
Término de materia | NETWORK DESIGN |
650 ## - Punto de acceso adicional de materia - Término de materia | |
Término de materia | BUSINESS ENTERPRISES |
650 ## - Punto de acceso adicional de materia - Término de materia | |
Término de materia | SYSTEMS ANALYSIS |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Tipo de ítem Koha | Libro |
Esquema de clasificación | Clasificación Decinal Universal |
Estado | Estado perdido | Estado de conservación | Tipo de préstamo | Biblioteca | Biblioteca | Fecha de adquisición | Origen de la adquisición | Número de inventario | Total Checkouts | ST completa de Koha | Código de barras | Date last seen | Precio efectivo a partir de | Tipo de ítem Koha |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Sólo Consulta | Facultad Regional Santa Fe - Biblioteca "Rector Comodoro Ing. Jorge Omar Conca" | Facultad Regional Santa Fe - Biblioteca "Rector Comodoro Ing. Jorge Omar Conca" | 02/02/2018 | Compra Exp. 21/2009 | 10126 | 004.7 OP5 | 10126 | 02/02/2018 | 02/02/2018 | Libro |