Flylib.com
Network Management, MIBs and MPLS: Principles, Design and Implementation
Network Management, MIBs and MPLS: Principles, Design and Implementation
ISBN: 0131011138
EAN: 2147483647
Year: 2003
Pages: 150
Authors:
Stephen B. Morris
BUY ON AMAZON
Main Page
Table of content
Copyright
Acronyms
Foreword
Preface
Intended Audience
Purpose of This Book
Using This Book
Linked Overviews
Source Code Location
The Four Ms
Outline of the Book
A Note About Abbreviations
Additional Resources
Acknowledgments
Chapter 1. Large Enterprise Networks
Managing Enterprise Networks
Why Use Network Management?
SNMP: The De Facto Network Management Standard
Summary
Chapter 2. SNMPv3 and Network Management
SNMPv3 Structure
SNMPv3 Applications
SNMPv3 Message Formats
Network Elements
Introducing MPLS: First Chunk
The Trend Towards IP
MPLS Concepts
Summary
Chapter 3. The Network Management Problem
Bringing the Managed Data to the Code
Scalability: Today s Network Is Tomorrow s NE
MIB Note: Scalability
Light Reading Trials
Large NEs
Expensive (and Scarce) Development Skill Sets
Linked Overviews
Elements of NMS Development
Expensive (and Scarce) Operational Skill Sets
MPLS: Second Chunk
MPLS and Scalability
Summary
Chapter 4. Solving the Network Management Problem
Filling the Development Skills Gap
Smarter NMS
Smarter MIBs
One Data Model
Smarter NEs
Policy-Based Network Management (PBNM)
Network Management Policies
Directory-Enabled Networking (DEN)
IP QoS and the Enterprise
Summary
Chapter 5. A Real NMS
HP OpenView Network Node Manager (NNM)
Network Discovery and Mapping
Notification Processing
Reporting
Data Warehousing
Backup and Restore of Firmware and Configuration
Java Interface for Remote Access
MIB Support Features
MPLS Support
Policy Support
Reliability Features
Integration with Other Software
Programmability
Workflows and Business Processes
Applications of NMS
The Network Is the True Database
The Network Boundary
Summary
Chapter 6. Network Management Software Components
Fault Server
Configuration Server
Accounting Server
Performance Server
Security Server
Other Servers
Summary
Chapter 7. Rudimentary NMS Software Components
Building a Rudimentary Management System
Configuring SNMP on Windows NT2000
Setup Required for the Visual C Program
Building the Sample Visual C SNMP Manager
The Structure of the Sample Visual C Program
Using the Rudimentary Management System
A Note On Security
The Sample JDMK Java SNMP Manager
Building the Sample Java Manager
Extending the Sample SNMP Programs
Summary
Chapter 8. Case Study: MPLS Network Management
The (Internet Draft) Standard MPLS MIBs
Configuring LSPs Through an LSR
Creating an LSP Using the LSR MIB
Creating a Tunnel Using the TE MIB
Creating LSPs and Tunnels Using an NMS
NextObjectIndex and Synchronization
A Note About Standards
Summary
Chapter 9. Network Management Theory and Practice
MIBs Again
Intelligence in the Network: Manufacturing
Pushing FCAPS into the Network
Service-level Network Components
Generic Objects Realized Using Software Abstraction
The Need for End-to-End Security
Shrink-Wrapped Solutions or Consultancy Buy-In
Integration with OSS Layers: Northbound Interface (NBI)
Developer Note: The Roles of QA, IT, and Developers
Solutions Revisited: Thin Software Layers
Facilitating a Solution Mindset
A Final Word
Appendix A. Terminal Server Serial Ports
Appendix B. Some Simple IP Routing Experiments
B.1 The IP Routing Table
B.2 Ping
B.3 Traceroute
Appendix C. The IP MIB Table
MIB Walk on the IP Table
Appendix D. Visual C Sample Program Source Code
D.1 snmpdefs.h
D.2 snmpmgr.c
Appendix E. JDMK Sample Program Source Code
E.1 synchronousManager.Java
References
Glossary
Index
Index A
Index B
Index C
Index D
Index E
Index F
Index H
Index I
Index L
Index M
Index N
Index O
Index P
Index Q
Index S
Index T
Index U
Index V
Network Management, MIBs and MPLS: Principles, Design and Implementation
ISBN: 0131011138
EAN: 2147483647
Year: 2003
Pages: 150
Authors:
Stephen B. Morris
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
ORM Constraints
Mapping ORM Models to Logical Database Models
Conceptual Model Reports
Logical Database Model Reports
Change Propagation and Round Trip Engineering
VBScript Programmers Reference
What VBScript Is and Isn™t!
Control of Flow
The Scripting Runtime Objects
Remote Scripting
Appendix J VBA Features not in VBScript
SQL Hacks
Joins, Unions, and Views
Hack 22. Generate Quarterly Reports
Hack 31. Disaggregate a COUNT
Hack 40. Calculate Rank
Hack 92. Deploy Applications
Data Structures and Algorithms in Java
Timing
Projects
Minimum Spanning Trees
C.6. Constant Factors
D.3. Games
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
Crash Course in the Internet Protocol Suite
Incident Response
Laws, Standards, and Organizations
The Future of Intrusion Detection and Prevention
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Market Orientation and Supply Chain Management in the Fashion Industry
Fashion Logistics and Quick Response
Temperature-Controlled Supply Chains
The Development of E-tail Logistics
Transforming Technologies: Retail Exchanges and RFID
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies