Network Management. (Record no. 25549)

MARC details
000 -LEADER
fixed length control field 05919nam a22003493i 4500
001 - CONTROL NUMBER
control field EBC5125826
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190104154809.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 181231s2007 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788131737606
Qualifying information (electronic bk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC5125826
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL5125826
035 ## - SYSTEM CONTROL NUMBER
System control number (CaONFJC)MIL261005
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1024278794
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23rd
Classification number 004.6
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Claise.
245 10 - TITLE STATEMENT
Title Network Management.
250 ## - EDITION STATEMENT
Edition statement Professional Computing
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (669 pages)
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Contents -- Introduction -- Part I: Data Collection and Methodology Standards -- Chapter 1 Understanding the Need for Accounting and Performance Management -- Definitions and the Relationship Between Accounting and Performance Management -- The Purposes of Accounting -- Purposes of Performance -- Applying the Information to the Business -- Summary -- Chapter 2 Data Collection Methodology -- Data Collection Details: What to Collect -- Defining the User -- Metering Methods: How to Collect Data Records -- Metering Positions: Where to Collect Data Records -- Collection Infrastructure: How to Collect Data Records -- Mediation Device Functionality: How to Process Data Records -- Security Considerations: How to Ensure Data Authenticity and Integrity -- Summary -- Chapter 3 Accounting and Performance Standards and Definitions -- Understanding Standards and Standards Organizations -- Architectural and Framework Standards: The TMN/FCAPS Model (ITU-T) -- Architectural and Framework Standards: the eTOM Model (TMF) -- Informational IETF Standards -- Information Modeling -- Data Collection Protocols: SNMP, SMI, and MIB -- Data Collection Protocols: NetFlow Version 9 and IPFIX Export Protocols -- Data Collection Protocols: PSAMP -- Data Collection Protocols: AAA (RADIUS, Diameter, and TACACS+) -- Data Collection Protocols: IPDR -- Data Collection Protocols: CMISE/CMIP and GDMO -- Service Notions -- Summary -- Part II: Implementations on the Cisco Devices -- Chapter 4 SNMP and MIBs -- MIBs -- IOS Support for SNMP Versions -- net-snmp Utilities -- CLI Operations and Configuration Example for SNMPv2c -- CLI Operations and Configuration Examples for SNMPv3 -- MIB Table Retrieval Example -- MIB Functional Area Comparison Table -- General-Purpose MIBs for Accounting and Performance -- Advanced Device Instrumentation.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Technology-Specific MIBs for Accounting and Performance -- Creating New MIB Objects: EXPRESSION-MIB -- Obtaining MIBs -- Chapter 5 RMON -- RMON 1 and RMON 2 MIBs -- DSMON MIB -- SMON MIB -- APM MIB and ART MIB -- Applicability -- Further Reading -- Chapter 6 IP Accounting -- IP Accounting (Layer 3) -- IP Accounting Access Control List (ACL) -- IP Accounting MAC Address -- IP Accounting Precedence -- Applicability -- Chapter 7 NetFlow -- Fundamentals of NetFlow -- CLI Operations -- SNMP Operations with the NETFLOW-MIB -- Example: NetFlow Version 5 on a Router -- Example: NetFlow Configuration on the Catalyst -- Example: NetFlow Version 8 -- Example: NetFlow Version 9 -- New Features Supported with NetFlow Version 9 -- Deployment Guidelines -- Supported Devices and IOS Versions -- Chapter 8 BGP Policy Accounting -- Input BGP Policy Accounting -- Output BGP Policy Accounting -- Summary of All Four BGP Policy Accounting Combinations -- Fundamentals -- BGP Policy Accounting Commands -- SNMP Operations -- Examples (CLI and SNMP) -- Destination-Sensitive Services -- Applicability -- Chapter 9 AAA Accounting -- Fundamentals of AAA Accounting -- High-Level Comparison of RADIUS, TACACS+, and Diameter -- RADIUS -- Diameter Details -- Chapter 10 NBAR -- NBAR Functionality -- Supported Devices and IOS Versions -- NBAR Protocol Discovery (PD) MIB -- NBAR Configuration Commands -- NBAR show Commands -- NBAR Examples (CLI and SNMP) -- NBAR Applicability -- Chapter 11 IP SLA -- Measured Metrics: What to Measure -- Operations: How to Measure -- IP SLA CLI Operations -- SNMP Operations with the CISCO-RTTMON-MIB -- Application-Specific Scenario: HTTP -- Application-Specific Scenario: VoIP -- Advanced Features -- Implementation Considerations -- Chapter 12 Summary of Data Collection Methodology -- Applicability -- Part III: Assigning Technologies to Solutions.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 13 Monitoring Scenarios -- Network Blueprint for Monitoring -- Device and Link Performance -- Network Connectivity and Performance -- Application Monitoring -- Service Monitoring and Routing Optimization -- Chapter 14 Capacity Planning Scenarios -- Link Capacity Planning -- Network Blueprint for Capacity Planning -- Problem Space -- Capacity Planning Tools -- Methods for Generating the Core Traffic Matrix -- Additional Considerations: Peer-to-Peer Traffic -- Summary -- Chapter 15 Voice Scenarios -- Network Blueprint for IP Telephony -- Voice Performance Measurement -- Voice Accounting -- Is Your Network Ready for IP Telephony? -- Chapter 16 Security Scenarios -- Network Blueprint for Security Management -- Security Management Process -- Summary -- Chapter 17 Billing Scenarios -- Network Blueprint for Billing -- Billing Approaches -- Summary -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J-K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W-X-Y-Z.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Claise
Title Network Management: Accounting And Performance Strategies
Place, publisher, and date of publication Noida : Pearson India,c2007
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5125826">https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5125826</a>
Public note Click to View
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Materials specified (bound volume or other part) Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification Online Access     CENTRAL LIBRARY Digital Library Digital Library 04/01/2019   004.6 CLA-N E0090 04/01/2019 04/01/2019 E- Books
Powered by Koha ILS
Page Design & Customization: Library Web Team CE Thalassery