My Account Log in

1 option

Network management principles and practice

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Subramanian, Mani, Author.
Contributor:
Usha Rani, N., Contributor.
Gonsalves, Timothy A., Contributor.
Language:
English
Subjects (All):
Computer networks--Management.
Computer networks.
Physical Description:
1 online resource (xxvi, [2], 695 p.) : ill.
Edition:
2nd ed.
Place of Publication:
[Place of publication not identified] Dorling Kindersley India 2010
Language Note:
English
System Details:
text file
Summary:
Network Management: Principles And Practice is a reference book that comprehensively covers various theoretical and practical concepts of network management. It is divided into four units. The first unit gives an overview of network management. The
Contents:
Cover
Brief Contents
Contents
Preface
About the Author
Part I: Background
Chapter 1: Data Communications and Network Management Overview
1.1 Analogy of Telephone Network Management
1.2 Data (Computer) and Telecommunication Network
1.3 Distributed Computing Environment
1.4 TCP/IP-Based Networks: Internet and Intranet
1.5 Communication Protocols and Standards
1.5.1 Communication Architectures
1.5.2 Protocol Layers and Services
1.6 Networks, Systems, and Services
1.6.1 Broadband Networks, Systems, and Services
1.6.2 Wide Area Networks
1.6.3 Broadband Access Networks
1.6.4 Home/CPE Networks
1.6.5 Quality of Service in Broadband Systems
1.6.6 Security and Privacy in Broadband Systems
1.7 Case Histories on Network, System, and Service Management
1.7.1 Case History 1: Importance of Topology ("Case of the Footprint")
1.7.2 Case History 2: Centrally Managed Network Issues
1.7.3 Transaction Delays in Client-Server Network
1.7.4 Service Impact in End-to-End Service of Customers
1.7.5 Some Common Network Problems
1.8 Challenges of IT Managers
1.9 Network Management: Goals, Organization, and Functions
1.9.1 Goal of Network Management
1.9.2 Network Provisioning
1.9.3 Network Operations and NOC
1.9.4 Network Installation and Maintenance
1.10 Network Management Architecture and Organization
1.11 Network Management Perspectives
1.11.1 Network Management Perspective
1.11.2 Service Management Perspective
1.11.3 OSS Perspective
1.11.4 e-Business Management
1.12 NMS Platform
1.13 Current Status and Future of Network Management
Summary
Exercises
Chapter 2: Review of Information Network and Technology
2.1 Network Topology
2.2 Local Area Networks
2.2.1 Ethernet
2.2.2 Fast Ethernet
2.2.3 Gigabit Ethernet.
2.2.4 Full-Duplex Ethernet
2.2.5 Switched Ethernet
2.2.6 10-Gigabit Ethernet
2.2.7 Virtual LAN
2.2.8 Token Ring
2.2.9 FDDI
2.2.10 Wireless LAN
2.3 Network Node Components
2.3.1 Hubs
2.3.2 Bridges
2.3.3 Remote Bridge
2.3.4 Transparent Bridge
2.3.5 Source-Routing Bridge
2.3.6 Routers
2.3.7 Gateways and Protocol Converters
2.3.8 Multiprotocol Routers and Tunneling
2.3.9 Half-Bridge Configuration of Router
2.3.10 Edge Routers
2.3.11 Switches
2.4 Wide Area Networks
2.5 Transmission Technology
2.5.1 Introduction
2.5.2 Wired Transmission
2.5.3 Wireless Transmission Media
2.5.4 Transmission Modes
2.6 Integrated Services: ISDN, Frame Relay, and Broadband
Part II: SNMP and Network Management
Chapter 3: Basic Foundations: Standards, Models, and Language
3.1 Network Management Standards
3.2 Network Management Models
3.3 Organization Model
3.4 Information Model
3.4.1 Management Information Tree
3.4.2 Managed Object Perspective
3.5 Communication Model
3.6 Abstract Syntax Notation One: ASN. 1
3.6.1 Terminology, Symbols, and Conventions
3.6.2 Objects and Data Types
3.6.3 Object Name
3.6.4 An Example of Use of ASN.1 from ISO 8824
3.7 Encoding Structure
3.8 Macros
3.9 Functional Model
Chapter 4: SNMPv1 Network Management: Organization and Information Models
4.1 Managed Network: Case Histories and Examples
4.2 History of SNMP Management
4.3 Internet Organizations and Standards
4.3.1 Organizations
4.3.2 Internet Documents
4.4 SNMP Model
4.5 Organization Model
4.6 System Overview
4.7 Information Model
4.7.1 Introduction
4.7.2 Structure of Management Information
4.7.3 Managed Objects
4.7.4 Management of Information Base
Exercises.
Chapter 5: SNMPv1 Network Management: Communication and Functional Models
5.1 SNMP Communication Model
5.1.1 SNMP Architecture
5.1.2 Administrative Model
5.1.3 SNMP Protocol Specifications
5.1.4 SNMP Operations
5.1.5 SNMP MIB Group
5.2 Functional Model
Chapter 6: SNMP Management: SNMPv2
6.1 Major Changes in SNMPv2
6.2 SNMPv2 System Architecture
6.3 SNMPv2 Structure of Management Information
6.3.1 SMI Definitions for SNMPv2
6.3.2 Information Modules
6.3.3 SNMP Keywords
6.3.4 Module Definitions
6.3.5 Object Definitions
6.3.6 Textual Conventions
6.3.7 Creation and Deletion of Rows in Tables
6.3.8 Notification Definitions
6.3.9 Conformance Statements
6.4 SNMv2 Management Information Base
6.4.1 Changes to the System Group in SNMPv2
6.4.2 Changes to the SNMP Group in SNMPv2
6.4.3 Information for Notification in SNMPv2
6.4.4 Conformance Information in SNMPv2
6.4.5 Expanded Internet MIB-II
6.5 SNMPv2 Protocol
6.5.1 Data Structure of SNMPv2 PDUs
6.5.2 SNMPv2 Protocol Operations
6.6 Compatibility with SNMPv1
6.6.1 Bilingual Manager
6.6.2 SNMP Proxy Server
Chapter 7: SNMP Management: SNMPv3
7.1 SNMPv3 Key Features
7.2 SNMPv3 Documentation Architecture
7.3 Architecture
7.3.1 Elements of an Entity
7.3.2 Names
7.3.3 Abstract Service Interfaces
7.4 SNMPv3 Applications
7.4.1 Command Generator
7.4.2 Command Responder
7.4.3 Notification Originator
7.4.4 Notification Receiver
7.4.5 Proxy Forwarder
7.5 SNMPv3 Management Information Base
7.6 Security
7.6.1 Security Threats
7.6.2 Security Model
7.6.3 Message Format
7.7 SNMPv3 User-Based Security Model
7.7.1 Authentication Protocols.
7.7.2 Encryption Protocol
7.8 Access Control
7.8.1 Elements of the Model
7.8.2 VACM Process
7.8.3 VACM MIB
Chapter 8: SNMP Management: RMON
8.1 What is Remote Monitoring?
8.2 RMON SMI and MIB
8.3 RMON1
8.3.1 RMON1 Textual Conventions
8.3.2 RMON1 Groups and Functions
8.3.3 Relationship Between Control and Data Tables
8.3.4 RMON1 Common and Ethernet Groups
8.3.5 RMON Token-Ring Extension Groups
8.4 RMON2
8.4.1 RMON2 Management Information Base
8.4.2 RMON2 Conformance Specifications
8.5 ATM Remote Monitoring
8.6 A Case Study on Internet Traffic Using RMON
Chapter 9: Network Management Tools, Systems, and Engineering
9.1 System Utilities for Management
9.1.1 Basic Tools
9.1.2 SNMP Tools
9.1.3 Protocol Analyzer
9.2 Network Statistics Measurement Systems
9.2.1 Traffic Load Monitoring
9.2.2 Protocol Statistics
9.2.3 Data and Error Statistics
9.2.4 Using MRTG to Collect Traffic Statistics
9.3 MIB Engineering
9.3.1 General Principles and Limitations of SMI
9.3.2 Counters vs. Rates
9.3.3 Object-Oriented Approach to MIB Engineering
9.3.4 SMI Tables
9.3.5 SMI Actions
9.3.6 SMI Transactions
9.3.7 Summary: MIB Engineering
9.4 NMS Design
9.4.1 Functional Requirements
9.4.2 Architecture of the NMS Server
9.4.3 Key Design Decisions
9.4.4 Discovery Module
9.4.5 Performance Manager
9.4.6 Fault Manager
9.4.7 Distributed Management Approaches
9.4.8 Server Platforms
9.4.9 NMS Client Design
9.4.10 Summary: NMS Design
9.5 Network Management Systems
9.5.1 Network Management
9.5.2 System and Application Management
9.5.3 Enterprise Management
9.5.4 Telecommunications Management Systems
Part III: TMN and Applications Management.
Chapter 10: Telecommunications Management Network
10.1 Why TMN?
10.2 Operations Systems
10.3 TMN Conceptual Model
10.4 TMN Standards
10.5 TMN Architecture
10.5.1 Functional Architecture
10.5.2 Physical Architecture
10.5.3 Information Architecture
10.6 TMN Management Service Architecture
10.7 TMN Integrated View
10.8 TMN Implementation
10.8.1 OMNI Point
10.8.2 eTOM
Chapter 11: Network Management Applications
11.1 Configuration Management
11.1.1 Network Provisioning
11.1.2 Inventory Management
11.1.3 Network Topology
11.2 Fault Management
11.2.1 Fault Detection
11.2.2 Fault Location and Isolation Techniques
11.3 Performance Management
11.3.1 Performance Metrics
11.3.2 Data Monitoring
11.3.3 Problem Isolation
11.3.4 Performance Statistics
11.4 Event Correlation Techniques
11.4.1 Rule-Based Reasoning
11.4.2 Model-Based Reasoning
11.4.3 Case-Based Reasoning
11.4.4 Codebook Correlation Model
11.4.5 State Transition Graph Model
11.4.6 Finite State Machine Model
11.5 Security Management
11.5.1 Policies and Procedures
11.5.2 Resources to Prevent Security Breaches
11.5.3 Firewalls
11.5.4 Cryptography
11.5.5 Authentication and Authorization
11.5.6 Client-Server Authentication Systems
11.5.7 Message Transfer Security
11.5.8 Network Protection from Virus Attacks
11.6 Accounting Management
11.7 Report Management
11.8 Policy-Based Management
11.9 Service Level Management
Part IV: Broadband Network Management
Chapter 12: Broadband Network Management: WAN
12.1 Broadband Network and Services
12.2 ATM Technology
12.2.1 Virtual Path-Virtual Circuit
12.2.2 ATM Packet Size
12.2.3 Integrated Service
12.2.4 WAN/SONET
12.2.5 ATM LAN Emulation.
12.3 ATM Network Management.
Notes:
Bibliographic Level Mode of Issuance: Monograph
Includes bibliographical references (p. [673]-682) and index.
Description based on publisher supplied metadata and other sources.
ISBN:
9789332506404
933250640X
OCLC:
1024272078

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account