000 | 05919nam a22003493i 4500 | ||
---|---|---|---|
999 |
_c25549 _d25549 |
||
001 | EBC5125826 | ||
003 | MiAaPQ | ||
005 | 20190104154809.0 | ||
006 | m o d | | ||
007 | cr cnu|||||||| | ||
008 | 181231s2007 xx o ||||0 eng d | ||
020 |
_a9788131737606 _q(electronic bk.) |
||
035 | _a(MiAaPQ)EBC5125826 | ||
035 | _a(Au-PeEL)EBL5125826 | ||
035 | _a(CaONFJC)MIL261005 | ||
035 | _a(OCoLC)1024278794 | ||
040 |
_aMiAaPQ _beng _erda _epn _cMiAaPQ _dMiAaPQ |
||
082 |
_223rd _a004.6 |
||
100 | 1 | _aClaise. | |
245 | 1 | 0 | _aNetwork Management. |
250 | _aProfessional Computing | ||
300 | _a1 online resource (669 pages) | ||
505 | 0 | _aCover -- Contents -- Introduction -- Part I: Data Collection and Methodology Standards -- Chapter 1 Understanding the Need for Accounting and Performance Management -- Definitions and the Relationship Between Accounting and Performance Management -- The Purposes of Accounting -- Purposes of Performance -- Applying the Information to the Business -- Summary -- Chapter 2 Data Collection Methodology -- Data Collection Details: What to Collect -- Defining the User -- Metering Methods: How to Collect Data Records -- Metering Positions: Where to Collect Data Records -- Collection Infrastructure: How to Collect Data Records -- Mediation Device Functionality: How to Process Data Records -- Security Considerations: How to Ensure Data Authenticity and Integrity -- Summary -- Chapter 3 Accounting and Performance Standards and Definitions -- Understanding Standards and Standards Organizations -- Architectural and Framework Standards: The TMN/FCAPS Model (ITU-T) -- Architectural and Framework Standards: the eTOM Model (TMF) -- Informational IETF Standards -- Information Modeling -- Data Collection Protocols: SNMP, SMI, and MIB -- Data Collection Protocols: NetFlow Version 9 and IPFIX Export Protocols -- Data Collection Protocols: PSAMP -- Data Collection Protocols: AAA (RADIUS, Diameter, and TACACS+) -- Data Collection Protocols: IPDR -- Data Collection Protocols: CMISE/CMIP and GDMO -- Service Notions -- Summary -- Part II: Implementations on the Cisco Devices -- Chapter 4 SNMP and MIBs -- MIBs -- IOS Support for SNMP Versions -- net-snmp Utilities -- CLI Operations and Configuration Example for SNMPv2c -- CLI Operations and Configuration Examples for SNMPv3 -- MIB Table Retrieval Example -- MIB Functional Area Comparison Table -- General-Purpose MIBs for Accounting and Performance -- Advanced Device Instrumentation. | |
505 | 8 | _aTechnology-Specific MIBs for Accounting and Performance -- Creating New MIB Objects: EXPRESSION-MIB -- Obtaining MIBs -- Chapter 5 RMON -- RMON 1 and RMON 2 MIBs -- DSMON MIB -- SMON MIB -- APM MIB and ART MIB -- Applicability -- Further Reading -- Chapter 6 IP Accounting -- IP Accounting (Layer 3) -- IP Accounting Access Control List (ACL) -- IP Accounting MAC Address -- IP Accounting Precedence -- Applicability -- Chapter 7 NetFlow -- Fundamentals of NetFlow -- CLI Operations -- SNMP Operations with the NETFLOW-MIB -- Example: NetFlow Version 5 on a Router -- Example: NetFlow Configuration on the Catalyst -- Example: NetFlow Version 8 -- Example: NetFlow Version 9 -- New Features Supported with NetFlow Version 9 -- Deployment Guidelines -- Supported Devices and IOS Versions -- Chapter 8 BGP Policy Accounting -- Input BGP Policy Accounting -- Output BGP Policy Accounting -- Summary of All Four BGP Policy Accounting Combinations -- Fundamentals -- BGP Policy Accounting Commands -- SNMP Operations -- Examples (CLI and SNMP) -- Destination-Sensitive Services -- Applicability -- Chapter 9 AAA Accounting -- Fundamentals of AAA Accounting -- High-Level Comparison of RADIUS, TACACS+, and Diameter -- RADIUS -- Diameter Details -- Chapter 10 NBAR -- NBAR Functionality -- Supported Devices and IOS Versions -- NBAR Protocol Discovery (PD) MIB -- NBAR Configuration Commands -- NBAR show Commands -- NBAR Examples (CLI and SNMP) -- NBAR Applicability -- Chapter 11 IP SLA -- Measured Metrics: What to Measure -- Operations: How to Measure -- IP SLA CLI Operations -- SNMP Operations with the CISCO-RTTMON-MIB -- Application-Specific Scenario: HTTP -- Application-Specific Scenario: VoIP -- Advanced Features -- Implementation Considerations -- Chapter 12 Summary of Data Collection Methodology -- Applicability -- Part III: Assigning Technologies to Solutions. | |
505 | 8 | _aChapter 13 Monitoring Scenarios -- Network Blueprint for Monitoring -- Device and Link Performance -- Network Connectivity and Performance -- Application Monitoring -- Service Monitoring and Routing Optimization -- Chapter 14 Capacity Planning Scenarios -- Link Capacity Planning -- Network Blueprint for Capacity Planning -- Problem Space -- Capacity Planning Tools -- Methods for Generating the Core Traffic Matrix -- Additional Considerations: Peer-to-Peer Traffic -- Summary -- Chapter 15 Voice Scenarios -- Network Blueprint for IP Telephony -- Voice Performance Measurement -- Voice Accounting -- Is Your Network Ready for IP Telephony? -- Chapter 16 Security Scenarios -- Network Blueprint for Security Management -- Security Management Process -- Summary -- Chapter 17 Billing Scenarios -- Network Blueprint for Billing -- Billing Approaches -- Summary -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J-K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W-X-Y-Z. | |
590 | _aElectronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. | ||
655 | 4 | _aElectronic books. | |
776 | 0 | 8 |
_iPrint version: _aClaise _tNetwork Management: Accounting And Performance Strategies _dNoida : Pearson India,c2007 |
797 | 2 | _aProQuest (Firm) | |
856 | 4 | 0 |
_uhttps://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5125826 _zClick to View |
942 |
_2ddc _cBK |