Flylib.com
Network Management, MIBs and MPLS: Principles, Design and Implementation
Network Management, MIBs and MPLS: Principles, Design and Implementation
ISBN: 0131011138
EAN: 2147483647
Year: 2003
Pages: 150
Authors:
Stephen B. Morris
BUY ON AMAZON
Main Page
Table of content
Copyright
Acronyms
Foreword
Preface
Intended Audience
Purpose of This Book
Using This Book
Linked Overviews
Source Code Location
The Four Ms
Outline of the Book
A Note About Abbreviations
Additional Resources
Acknowledgments
Chapter 1. Large Enterprise Networks
Managing Enterprise Networks
Why Use Network Management?
SNMP: The De Facto Network Management Standard
Summary
Chapter 2. SNMPv3 and Network Management
SNMPv3 Structure
SNMPv3 Applications
SNMPv3 Message Formats
Network Elements
Introducing MPLS: First Chunk
The Trend Towards IP
MPLS Concepts
Summary
Chapter 3. The Network Management Problem
Bringing the Managed Data to the Code
Scalability: Today s Network Is Tomorrow s NE
MIB Note: Scalability
Light Reading Trials
Large NEs
Expensive (and Scarce) Development Skill Sets
Linked Overviews
Elements of NMS Development
Expensive (and Scarce) Operational Skill Sets
MPLS: Second Chunk
MPLS and Scalability
Summary
Chapter 4. Solving the Network Management Problem
Filling the Development Skills Gap
Smarter NMS
Smarter MIBs
One Data Model
Smarter NEs
Policy-Based Network Management (PBNM)
Network Management Policies
Directory-Enabled Networking (DEN)
IP QoS and the Enterprise
Summary
Chapter 5. A Real NMS
HP OpenView Network Node Manager (NNM)
Network Discovery and Mapping
Notification Processing
Reporting
Data Warehousing
Backup and Restore of Firmware and Configuration
Java Interface for Remote Access
MIB Support Features
MPLS Support
Policy Support
Reliability Features
Integration with Other Software
Programmability
Workflows and Business Processes
Applications of NMS
The Network Is the True Database
The Network Boundary
Summary
Chapter 6. Network Management Software Components
Fault Server
Configuration Server
Accounting Server
Performance Server
Security Server
Other Servers
Summary
Chapter 7. Rudimentary NMS Software Components
Building a Rudimentary Management System
Configuring SNMP on Windows NT2000
Setup Required for the Visual C Program
Building the Sample Visual C SNMP Manager
The Structure of the Sample Visual C Program
Using the Rudimentary Management System
A Note On Security
The Sample JDMK Java SNMP Manager
Building the Sample Java Manager
Extending the Sample SNMP Programs
Summary
Chapter 8. Case Study: MPLS Network Management
The (Internet Draft) Standard MPLS MIBs
Configuring LSPs Through an LSR
Creating an LSP Using the LSR MIB
Creating a Tunnel Using the TE MIB
Creating LSPs and Tunnels Using an NMS
NextObjectIndex and Synchronization
A Note About Standards
Summary
Chapter 9. Network Management Theory and Practice
MIBs Again
Intelligence in the Network: Manufacturing
Pushing FCAPS into the Network
Service-level Network Components
Generic Objects Realized Using Software Abstraction
The Need for End-to-End Security
Shrink-Wrapped Solutions or Consultancy Buy-In
Integration with OSS Layers: Northbound Interface (NBI)
Developer Note: The Roles of QA, IT, and Developers
Solutions Revisited: Thin Software Layers
Facilitating a Solution Mindset
A Final Word
Appendix A. Terminal Server Serial Ports
Appendix B. Some Simple IP Routing Experiments
B.1 The IP Routing Table
B.2 Ping
B.3 Traceroute
Appendix C. The IP MIB Table
MIB Walk on the IP Table
Appendix D. Visual C Sample Program Source Code
D.1 snmpdefs.h
D.2 snmpmgr.c
Appendix E. JDMK Sample Program Source Code
E.1 synchronousManager.Java
References
Glossary
Index
Index A
Index B
Index C
Index D
Index E
Index F
Index H
Index I
Index L
Index M
Index N
Index O
Index P
Index Q
Index S
Index T
Index U
Index V
Network Management, MIBs and MPLS: Principles, Design and Implementation
ISBN: 0131011138
EAN: 2147483647
Year: 2003
Pages: 150
Authors:
Stephen B. Morris
BUY ON AMAZON
Strategies for Information Technology Governance
Structures, Processes and Relational Mechanisms for IT Governance
Integration Strategies and Tactics for Information Technology Governance
Assessing Business-IT Alignment Maturity
Measuring ROI in E-Commerce Applications: Analysis to Action
Governance Structures for IT in the Health Care Industry
VBScript Programmers Reference
Data Types
HTML Applications
Server-Side Web Scripting
Adding VBScript to Your VB Applications
Appendix E VBScript Error Codes and the Err Object
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Training
Auditing the Kanban
Appendix F Implementation in Large Plants
Appendix G Intra-Cell Kanban
Appendix H Case Study 1: Motor Plant Casting Kanban
Cisco IOS Cookbook (Cookbooks (OReilly))
Defining Per User Privileges
Increasing the RIP Input Queue
Redistributing Routes into EIGRP
Using RSVP
Dealing with Passive Mode FTP
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
IDS and IPS Architecture
Data Correlation
Incident Response
The Future of Intrusion Detection and Prevention
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
The Pulsing Heart of ASP.NET AJAX
Partial Page Rendering
Built-in Application Services
Building AJAX Applications with ASP.NET
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies