Network Management.

Claise.

Network Management. - Professional Computing - 1 online resource (669 pages)

Cover -- Contents -- Introduction -- Part I: Data Collection and Methodology Standards -- Chapter 1 Understanding the Need for Accounting and Performance Management -- Definitions and the Relationship Between Accounting and Performance Management -- The Purposes of Accounting -- Purposes of Performance -- Applying the Information to the Business -- Summary -- Chapter 2 Data Collection Methodology -- Data Collection Details: What to Collect -- Defining the User -- Metering Methods: How to Collect Data Records -- Metering Positions: Where to Collect Data Records -- Collection Infrastructure: How to Collect Data Records -- Mediation Device Functionality: How to Process Data Records -- Security Considerations: How to Ensure Data Authenticity and Integrity -- Summary -- Chapter 3 Accounting and Performance Standards and Definitions -- Understanding Standards and Standards Organizations -- Architectural and Framework Standards: The TMN/FCAPS Model (ITU-T) -- Architectural and Framework Standards: the eTOM Model (TMF) -- Informational IETF Standards -- Information Modeling -- Data Collection Protocols: SNMP, SMI, and MIB -- Data Collection Protocols: NetFlow Version 9 and IPFIX Export Protocols -- Data Collection Protocols: PSAMP -- Data Collection Protocols: AAA (RADIUS, Diameter, and TACACS+) -- Data Collection Protocols: IPDR -- Data Collection Protocols: CMISE/CMIP and GDMO -- Service Notions -- Summary -- Part II: Implementations on the Cisco Devices -- Chapter 4 SNMP and MIBs -- MIBs -- IOS Support for SNMP Versions -- net-snmp Utilities -- CLI Operations and Configuration Example for SNMPv2c -- CLI Operations and Configuration Examples for SNMPv3 -- MIB Table Retrieval Example -- MIB Functional Area Comparison Table -- General-Purpose MIBs for Accounting and Performance -- Advanced Device Instrumentation. Technology-Specific MIBs for Accounting and Performance -- Creating New MIB Objects: EXPRESSION-MIB -- Obtaining MIBs -- Chapter 5 RMON -- RMON 1 and RMON 2 MIBs -- DSMON MIB -- SMON MIB -- APM MIB and ART MIB -- Applicability -- Further Reading -- Chapter 6 IP Accounting -- IP Accounting (Layer 3) -- IP Accounting Access Control List (ACL) -- IP Accounting MAC Address -- IP Accounting Precedence -- Applicability -- Chapter 7 NetFlow -- Fundamentals of NetFlow -- CLI Operations -- SNMP Operations with the NETFLOW-MIB -- Example: NetFlow Version 5 on a Router -- Example: NetFlow Configuration on the Catalyst -- Example: NetFlow Version 8 -- Example: NetFlow Version 9 -- New Features Supported with NetFlow Version 9 -- Deployment Guidelines -- Supported Devices and IOS Versions -- Chapter 8 BGP Policy Accounting -- Input BGP Policy Accounting -- Output BGP Policy Accounting -- Summary of All Four BGP Policy Accounting Combinations -- Fundamentals -- BGP Policy Accounting Commands -- SNMP Operations -- Examples (CLI and SNMP) -- Destination-Sensitive Services -- Applicability -- Chapter 9 AAA Accounting -- Fundamentals of AAA Accounting -- High-Level Comparison of RADIUS, TACACS+, and Diameter -- RADIUS -- Diameter Details -- Chapter 10 NBAR -- NBAR Functionality -- Supported Devices and IOS Versions -- NBAR Protocol Discovery (PD) MIB -- NBAR Configuration Commands -- NBAR show Commands -- NBAR Examples (CLI and SNMP) -- NBAR Applicability -- Chapter 11 IP SLA -- Measured Metrics: What to Measure -- Operations: How to Measure -- IP SLA CLI Operations -- SNMP Operations with the CISCO-RTTMON-MIB -- Application-Specific Scenario: HTTP -- Application-Specific Scenario: VoIP -- Advanced Features -- Implementation Considerations -- Chapter 12 Summary of Data Collection Methodology -- Applicability -- Part III: Assigning Technologies to Solutions. Chapter 13 Monitoring Scenarios -- Network Blueprint for Monitoring -- Device and Link Performance -- Network Connectivity and Performance -- Application Monitoring -- Service Monitoring and Routing Optimization -- Chapter 14 Capacity Planning Scenarios -- Link Capacity Planning -- Network Blueprint for Capacity Planning -- Problem Space -- Capacity Planning Tools -- Methods for Generating the Core Traffic Matrix -- Additional Considerations: Peer-to-Peer Traffic -- Summary -- Chapter 15 Voice Scenarios -- Network Blueprint for IP Telephony -- Voice Performance Measurement -- Voice Accounting -- Is Your Network Ready for IP Telephony? -- Chapter 16 Security Scenarios -- Network Blueprint for Security Management -- Security Management Process -- Summary -- Chapter 17 Billing Scenarios -- Network Blueprint for Billing -- Billing Approaches -- Summary -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J-K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W-X-Y-Z.

9788131737606


Electronic books.

004.6
Powered by Koha ILS
Page Design & Customization: Library Web Team CE Thalassery