Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 2: Device and Service Management
Figure 2.1: Basic Toaster Management
Figure 2.2: Kitchen Management
Figure 2.3: Some Management Axes
Figure 2.4: TMN Management Layers
Chapter 3: WBEM and Other Management Systems
Figure 3.1: WBEM Components
Figure 3.2: The Telecommunications Management Network
Figure 3.3: On-Device Comparison of SNMP and WBEM
Figure 3.4: WBEM/CIM's Informal Enthusiasm Curve
Chapter 4: The WBEM Architecture
Figure 4.1: The Management Gap
Figure 4.2: The WBEM Components
Figure 4.3:
mof
Compilation
Figure 4.4: WBEM Server Architecture
Figure 4.5: Different WBEM Server Locations
Figure 4.6: A Hierarchy of WBEM Servers
Chapter 5: CIM and
mof
Figure 5.1: The Role of the Model
Figure 5.2: Fido without an Association
Figure 5.3: Fido with an Association
Figure 5.4: The class
CIM_EthernetPort
Figure 5.5: Part of the SNMP MIB-II Subtree
Figure 5.6: Part of the CIM Network Model
Figure 5.7: UML Representation of a Class
Figure 5.8: UML Representation of an Association
Figure 5.9: UML Representation of an Aggregation
Figure 5.10: UML Representation of a Composition
Figure 5.11: Alternative UML Representation of a Composition
Figure 5.12: A Weak Association
Figure 5.13: An Example of an Ordered List
Figure 5.14: An Example Class Definition
Figure 5.15: An Example Association Definition
Chapter 6: Standard Models
Figure 6.1: Part of the Core Model
Figure 6.2: CIM_SettingData and CIM_ManagedElement
Figure 6.3: The CIM_ElementStatisticalData Association
Figure 6.4: Part of the Network Model
Figure 6.5: Part of the Protocol Endpoint Model
Figure 6.6: The SNMP Sub-Tree
Figure 6.7: Part of the QoS Service Hierarchy
Figure 6.8: Part of the Policy Hierarchy
Figure 6.9: Roles in the Policy Hierarchy
Figure 6.10: Part of the User Model
Figure 6.11: Users: The Chain of Associations
Figure 6.12: The AuthenticationService
Figure 6.13: CIM_Privilege
Chapter 7: The Client/Server Interface
Figure 7.1: The WBEM Client/WBEM Server Interfaces
Figure 7.2: WBEM Client/WBEM Server Interaction
Figure 7.3: A Simple CIM-XML Message
Figure 7.4: The DeepInheritance and LocalOnly Parameters
Figure 7.5: Example XML for EnumerateInstances
Figure 7.6: Example XML for EnumerateClasses
Figure 7.7: Example XML for CreateInstance
Figure 7.8: Example XML for DeleteInstance
Figure 7.9:
mof
for the PositionAtRecord Method
Figure 7.10: XML for Invoking the PositionAtRecord Method
Figure 7.11: XML Returned by PositionAtRecord Method
Figure 7.12: HTTP Authentication Exchange
Chapter 8: The Listener Interface
Figure 8.1: The Indication Mechanism
Figure 8.2: Indication Filters and Handlers
Figure 8.3: The Indication Classes
Figure 8.4: Part of CIM_IndicationFilter
Figure 8.5: Part of CIM_IndicationSubscription
Figure 8.6: Example of Export Format
Chapter 9: Building Your Own Model
Figure 9.1: PBX Interfaces
Figure 9.2: PBX Field-Replaceable Units
Figure 9.3: CIM_System's Children (and Grandchildren)
Figure 9.4: The PBX Class
Figure 9.5: The PBX Device Classes
Figure 9.6: The PBX Statistics Classes
Figure 9.7: The PBX Events Classes
Figure 9.8: Some PBX Service-Related Classes
Figure 9.9: The Collection Hierarchy
Chapter 10: Modelling Tips
Figure 10.1: CIM_POTSModem and its Superclasses
Figure 10.2: Possible Models of Telephones
Figure 10.3: Association Overriding
Chapter 11: Writing Providers
Figure 11.1: WBEM Server/Provider Interface
Figure 11.2: openPegasus WBEM Server/Provider Interface
Chapter 12: Implementing Providers: Example
Figure 12.1:
mof
Code for the Telephone Module
Figure 12.2: XML Generated from the
mof
in Figure 12.1
Figure 12.3:
mof
Code to Create Instance of ACNE_PBX
Figure 12.4: C++ Code to Create Providers PbxMain.cpp
Figure 12.5: C++ Code for
CreateInstance()
Figure 12.6: C++ Code for
EnumeratelnstanceNames()
Figure 12.7: Artificial C++ Code to Build a Dummy Instance
Figure 12.8: C++ Code for
checkKeys()
Figure 12.9: C++ Code for
getInstance()
Figure 12.10: C++ Code for
InvokeMethod()
Figure 12.11: C++ Code for
doReset()
Figure 12.12: C++ Code for
setTheIndicator()
Figure 12.13:
mof
Code to Instantiate a PG_ProviderModule
Figure 12.14:
mof
Code to Instantiate a PG_Provider
Figure 12.15:
mof
Code to Instantiate PG_ProviderCapabilities for Instance Provider
Figure 12.16:
mof
Code to Instantiate PG_ProviderCapabilities for Method Provider
Figure 12.17: XML to Create an ACNE_PBXTelephoneModule
Chapter 13: Writing Clients and Listeners
Figure 13.1: WBEM Server Capabilities
Figure 13.2: Functional Groupings of Intrinsic Methods
Figure 13.3: WBEM Clients
Figure 13.4: Embedding
mof
into a larger language
Chapter 14: Transition to WBEM/CIM
Figure 14.1: A Legacy Management System
Figure 14.2: Encapsulation of a Legacy System
Figure 14.3: Supporting a Legacy Interface
Figure 14.4: Structure of the Command Transliterator
Figure 14.5: Different Mappings
Appendix B: "Is-A" and "Has-A" Relationships
Figure B.1: A Simple Has-A Relationship
Figure B.2: Fido with an Association (Is-A)
Figure B.3: Adding Instances to Has-A
Figure B.4: Connecting the Instances with Has-A
Figure B.5: Adding Another Association with Has-A
Figure B.6: The Class and Instance Trees
Figure B.7: Has-A in CIM
Appendix E: The
MappingStrings
Qualifier
Figure E.1: Example Usage of MappingStrings
Previous page
Table of content
Next page
A Practical Approach to WBEM[s]CIM Management
ISBN: 849323061
EAN: N/A
Year: 2006
Pages: 152
BUY ON AMAZON
MySQL Stored Procedure Programming
Expressions
Iterative Processing with Loops
Error Handling
Using Triggers
Using Stored Procedures with Hibernate
High-Speed Signal Propagation[c] Advanced Black Magic
Going Nonlinear
Useful Fourier Transform-Pairs
Laying Cables in an Uncooled Attic Space
Coaxial Cable Connectors
The Underlying Simulation Engine
VBScript Programmers Reference
Control of Flow
Windows Script Components
Script Encoding
Remote Scripting
Appendix C Coding Convention
Image Processing with LabVIEW and IMAQ Vision
Line-Scan Cameras
CMOS Image Sensors
Camera Interfaces and Protocols
Compression Techniques
Pattern Matching
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
IDS and IPS Architecture
Internet Security Systems RealSecure
Snort
Policy and Procedures
Laws, Standards, and Organizations
Twisted Network Programming Essentials
Adding Twisted Utilities to Your Path
Working with Asynchronous Results
Authentication
Providing IMAP Access to Mailboxes
Providing an Administrative Python Shell
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies