Flylib.com
Network Management, MIBs and MPLS: Principles, Design and Implementation
Network Management, MIBs and MPLS: Principles, Design and Implementation
ISBN: 0131011138
EAN: 2147483647
Year: 2003
Pages: 150
Authors:
Stephen B. Morris
BUY ON AMAZON
Main Page
Table of content
Copyright
Acronyms
Foreword
Preface
Intended Audience
Purpose of This Book
Using This Book
Linked Overviews
Source Code Location
The Four Ms
Outline of the Book
A Note About Abbreviations
Additional Resources
Acknowledgments
Chapter 1. Large Enterprise Networks
Managing Enterprise Networks
Why Use Network Management?
SNMP: The De Facto Network Management Standard
Summary
Chapter 2. SNMPv3 and Network Management
SNMPv3 Structure
SNMPv3 Applications
SNMPv3 Message Formats
Network Elements
Introducing MPLS: First Chunk
The Trend Towards IP
MPLS Concepts
Summary
Chapter 3. The Network Management Problem
Bringing the Managed Data to the Code
Scalability: Today s Network Is Tomorrow s NE
MIB Note: Scalability
Light Reading Trials
Large NEs
Expensive (and Scarce) Development Skill Sets
Linked Overviews
Elements of NMS Development
Expensive (and Scarce) Operational Skill Sets
MPLS: Second Chunk
MPLS and Scalability
Summary
Chapter 4. Solving the Network Management Problem
Filling the Development Skills Gap
Smarter NMS
Smarter MIBs
One Data Model
Smarter NEs
Policy-Based Network Management (PBNM)
Network Management Policies
Directory-Enabled Networking (DEN)
IP QoS and the Enterprise
Summary
Chapter 5. A Real NMS
HP OpenView Network Node Manager (NNM)
Network Discovery and Mapping
Notification Processing
Reporting
Data Warehousing
Backup and Restore of Firmware and Configuration
Java Interface for Remote Access
MIB Support Features
MPLS Support
Policy Support
Reliability Features
Integration with Other Software
Programmability
Workflows and Business Processes
Applications of NMS
The Network Is the True Database
The Network Boundary
Summary
Chapter 6. Network Management Software Components
Fault Server
Configuration Server
Accounting Server
Performance Server
Security Server
Other Servers
Summary
Chapter 7. Rudimentary NMS Software Components
Building a Rudimentary Management System
Configuring SNMP on Windows NT2000
Setup Required for the Visual C Program
Building the Sample Visual C SNMP Manager
The Structure of the Sample Visual C Program
Using the Rudimentary Management System
A Note On Security
The Sample JDMK Java SNMP Manager
Building the Sample Java Manager
Extending the Sample SNMP Programs
Summary
Chapter 8. Case Study: MPLS Network Management
The (Internet Draft) Standard MPLS MIBs
Configuring LSPs Through an LSR
Creating an LSP Using the LSR MIB
Creating a Tunnel Using the TE MIB
Creating LSPs and Tunnels Using an NMS
NextObjectIndex and Synchronization
A Note About Standards
Summary
Chapter 9. Network Management Theory and Practice
MIBs Again
Intelligence in the Network: Manufacturing
Pushing FCAPS into the Network
Service-level Network Components
Generic Objects Realized Using Software Abstraction
The Need for End-to-End Security
Shrink-Wrapped Solutions or Consultancy Buy-In
Integration with OSS Layers: Northbound Interface (NBI)
Developer Note: The Roles of QA, IT, and Developers
Solutions Revisited: Thin Software Layers
Facilitating a Solution Mindset
A Final Word
Appendix A. Terminal Server Serial Ports
Appendix B. Some Simple IP Routing Experiments
B.1 The IP Routing Table
B.2 Ping
B.3 Traceroute
Appendix C. The IP MIB Table
MIB Walk on the IP Table
Appendix D. Visual C Sample Program Source Code
D.1 snmpdefs.h
D.2 snmpmgr.c
Appendix E. JDMK Sample Program Source Code
E.1 synchronousManager.Java
References
Glossary
Index
Index A
Index B
Index C
Index D
Index E
Index F
Index H
Index I
Index L
Index M
Index N
Index O
Index P
Index Q
Index S
Index T
Index U
Index V
Network Management, MIBs and MPLS: Principles, Design and Implementation
ISBN: 0131011138
EAN: 2147483647
Year: 2003
Pages: 150
Authors:
Stephen B. Morris
BUY ON AMAZON
Beginning Cryptography with Java
The JCA and the JCE
Message Digests, MACs, and HMACs
CMS and S/MIME
Appendix A Solutions to Exercises
Appendix B Algorithms Provided by the Bouncy Castle Provider
A Practitioners Guide to Software Test Design
Equivalence Class Testing
State-Transition Testing
Use Case Testing
Section II - White Box Testing Techniques
Appendix A Brown & Donaldson Case Study
Mastering Delphi 7
The Run-Time Library
Core Library Classes
Writing Delphi Components
Libraries and Packages
Web Programming with WebBroker and WebSnap
Sap Bw: a Step By Step Guide for Bw 2.0
Summary
Using a Variable to Access a Hierarchy Node Directly
Installing Business Content Objects and Loading R/3 Data
Generic R/3 Data Extraction
Section A.1. ASAP for BW
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Organizing and Estimating the Work
Making Quantitative Decisions
Risk-Adjusted Financial Management
Quantitative Methods in Project Contracts
VBScript in a Nutshell, 2nd Edition
Functions and Procedures
Why Program Outlook Forms?
The WSH Object Model
The Language Reference
Section B.6. Logical and TriState Constants
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies