Communications Management. 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey)

Size: px
Start display at page:

Download "Communications Management. 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey)"

Transcription

1 Communications Management 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey) 1

2 Communications Management Network Management Overview What is Network Management? Manager Agent Model OSI Management: Comparison to Internet Management Telecommunications Management Network Other approaches to integrated management 2

3 Typical problems for a network administrator What is actually connected to the network? Which nodes should be able to communicate? Why is user traffic performance poor? Why can t these users connect? Where is the fault? How much network capacity is being used? How much capacity is needed? A network manager is a person responsible for the operation and management of a network to ensure to meets its required function, typically connecting users to each other or to some other machines. In managing a network of any size the following problems are typically encountered: Determining the current configuration of the network, what nodes exist in the network, what terminals are attached to the network, which nodes and terminals are actually supposed to be able to communicate with each other. In addition the network manager needs to be able to control such configuration in more precise ways than simply plugging and unplugging wires. Users often experience network response that is less than what would be expected given the capacity of the network nodes and lines connecting them. This is often due to some partial failure or misconfiguration of the systems, and determining the reason for this may sometime require performing measurements at different points in the network. As well as poor performance users can often be cut off completely. This is often the result of a fault somewhere in the network, that has to be located before it can be rectified. Ideally the network manager would like to do this before the user is effected. If a network is not centrally funded, then often it is essential to record the usage of the network from different entities, so they may be charged for this. Equally network planners need to know how much a network is used over time in order to plan changes in network capacity. 3

4 Concerns for Communications Management Systems Geographical separation of systems Concurrent operation of systems Heterogeneity of systems Organisational autonomy of systems and (sub) networks Scale of the system Minimising impact of management on communications systems Network managers often turn to some form of software system to aid them in performing their tasks, which may become very difficult in large, complex networks. Some of the issues faced when designing network management systems are: The systems that are to be managed are by their nature distributed, so network management Software must operated in a distributed manner. The different network nodes being managed all operate concurrently, and it is therefore impossible to determine absolutely the state of all node at any one point in time. The systems being managed come from different vendors and will possess different data representations, different data management techniques, different operating systems etc. Different nodes in networks are often under different administrative authorities, so no-one person may have overall control over all nodes in an end-to-end data path. The network management system will itself be using network resources, but this should not impact too heavily on the availability of those resources for use the networks primary users. The scale of the network to be managed has a major impact on the management systems. The manager of a telecommunications systems with 1,000s of nodes and millions of users has different requirements in terms of performance than the manager of an office LAN. 4

5 The Manager-Agent Model MIS-user (manager role) Communicating Management operations Notifications MIS-user (agent role) Performing management operations Notifications emitted Managed objects TISO Management needs a model to enable it to interact with network elements in an open, network and technology independent fashion. All management models today are based on object-oriented design principles and follow the manager-agent model. According to that model, every network or other equipment that needs to be managed offers an abstract view of its resources as managed objects and enables the co-ordination of access to them through an agent. Applications on manager roles access those objects and perform operations on them in order to implement management policies. All the interactions between a manager and an agent are realised through a network management protocol, which essentially conveys the parameters of operations on objects and returns the results and/or errors. The managed objects in an agent emit notifications according to the operation of the underlying resource they model. These notifications may be forwarded to interested managers. Thus the manager to agent communications is initiated by the manager for all operations apart from the forwarding of notifications. The separation between manager and agent roles serves only the purpose of the model. It is not strong in engineering terms as many applications may be in both roles. This is particularly true in hierarchically organised management environment such as the Telecommunications Management Network (TMN). 5

6 Management Terminology Manager Managing System Management system Workstation Agent Managed System Managed Node Network Element Management Application Operations System There are many terms that are used interchangeably with respect to the roles of the management model. The terms manager and agent are used in most cases while the following terms may be also used: In the OSI management model, the terms managing and managed system are commonly used to denote the manager and agent roles respectively. Occasionally, the term managing application is also used to denote a manager. In the Internet management model, the terms management station and managed node or managed device are used for the same purpose. In the TMN model, the terms workstation and network element are used for much the same purpose. Finally, the term management application is a generic term that describes any application with management responsibilities, in manager, agent or both roles. This is the role of most TMN Operations Systems. 6

7 Elements of Open Communications Management Structure of Management Information + Formal MIB Specifications + Management Protocol + Common underlying protocol stack = Open interoperable framework for multi-vendor, multi-technology management systems Open Interoperable Management The purpose of a well defined management model and a set of specifications for the management protocol and management information related to all types of network resources is to provide an open, interoperable management interface to those resources. In this case, network management technology is vendor independent with network elements and managing applications from different suppliers able to interoperate. The exact requirements for open interoperable management are: A well known set of rules for dictating the structure, definition and naming of management information - this is known as the Structure of Management Information The former provides the framework to formally specify information related to the management of a particular network resource - the formal MIB specifications. A common set of rules for communicating management information between management applications - the management protocol A common agreed set of protocols that support the transport and presentation needs of the management protocols- the underlying protocol stack. If these are common, open interoperable management is possible independent of the vendor and implementation technology. 7

8 Managed Objects Abstractions of Physical or Logical Resources to be managed Encapsulate the underlying Real Resource Enable manipulation of Real Resource through well defined operation Exhibit behaviour at the object boundary - hiding resource access details Managed objects are abstractions of the physical or logical resources to be managed and can be thought as encapsulating the real resource. This means that access to the real resource for the purpose of management is performed through the managed object, which hides the real resource access details. The concept of managed objects is borrowed from the object-oriented specification and design principles and brings a common method of access through a common set of operations, also termed methods. That way, the associated real resource behaviour to management operations is only exhibited at the object boundary, completely hiding any internal realisation aspects. Managed objects can be used to model physical entities such as multiplexors, concentrators etc. and logical ones such as virtual circuits, associations etc. 8

9 The Managed Object Abstraction ABSTRACT VIEW operations notifications MO RR CONCRETE VIEW operations notifications MO interaction RR The figure above shows the view of a real resource through a managed object for the purpose of management. The interaction with the real resource, which is always implementation specific, is hidden but its manipulation is enabled through a set of abstract operations on the managed object. The associated behaviour is exhibited through the attributes (information) the managed object contains, the actions it may perform and the notifications it may emit. Operations on the attributes and actions are always initiated through well defined methods that operate at the object boundary to trigger its behaviour (encapsulation). In an actual implementation of a management agent, the relationship between the managed object and the associated real resource is shown in the second part of that figure. The managed object is a data structure in engineering terms while the real resource may be the contents of a piece of memory in the operating system's kernel, a communications board etc. The view though for the purpose of management is always through the managed object that encapsulates it and triggers the associated behaviour. For example, a "delete" operation on a virtual circuit managed object may delete the actual virtual circuit, according to the specified behaviour in the managed object definition. 9

10 Managed Objects for Support Not all Managed Objects (MOs) represent resources Some exist to support the needs of the management system itself E.g.: MOs to control notification, logging and access control etc Not all objects in a management system relate to managed real resources. There is a need for managed objects which are needed by the management system itself. As an example, the forwarding of notifications as event reports should be controlled by managing applications. This can be achieved through special managed objects which will enable control to the level of reporting according to criteria that could be altered by the managing system. The benefit of making these managed objects as well is that they can be configured and manipulated remotely using exactly the same mechanism as for those that model real resources. These objects are usually termed management support objects and are used, in varying degrees, by all the management models. The most common support objects are those used for event reporting and logging, access control and workload monitoring (metric objects). 10

11 The Management Information Based (MIB) A virtual information store of all managed objects A highly distributed object-oriented database Dynamic database - MOs are live entities reflecting the current state of the real resource they encapsulate Each application in the agent role handles part of the MIB, i.e. the agent MIB The Management Information Base (MIB) is a virtual information store that comprises all the management information in a managed network. It is in essence a highly distributed object-oriented database of dynamic nature, as the objects reflect the state and operation of the underlying real resource. The term management information base is also sometimes used to describe the portion of the global information base handled by a particular application in agent role. The same term is also used to describe a collection of specification of management information (objects) pertaining to the management of a particular protocol or type of network element. For example, one may refer to the ATM Element MIB meaning the specification for the management of ATM network elements. 11

12 Access Method: The Management Service/Protocol Provides access to Management Information Enables distributed management applications to exchange information Defines a set of operations that can be applied to MOs Management Protocols are typically application layer protocols The management protocol enables the communication between applications in manager and agent roles in a distributed environment. This communication enables the interactions that realise specific management policies. The management protocol carries essentially the parameters of operations to be applied to managed objects and the results and/or errors. It also carries the information of notifications emitted by managed objects when the former are forwarded to interested managers. Since the management protocol defines the operations on managed objects, it is dependent on the set of rules that govern the structure of management information in a particular model. This means that the two have to be defined in accordance and it is not possible to interchange one management protocol for another from a different model, though they may appear similar in functionality. For example, aspects such as naming, the parameters of operations, the structure of results and errors have some similarities in different management models but are different enough to restrict the scope of application within that model. All management protocols are application layer protocols in the sense that they need presentation facilities and enable manipulation of management information related to all the protocol layers in a network. There may however be protocols specific to the management of a particular layer through applications which have a restricted view - these are termed layer management protocols as opposed to the systems management protocols which provide a global view. 12

13 Management Protocol Operations Read: Retrieve MO state for monitoring/awareness Traverse or Discover: Retrieve in Bulk, Check the existence or MOs Write: Change to Configure and Control Action: Imperative command to control MO Create, Delete: Configure and Control Notify: Reporting exceptional events All the management protocols have in essence a set of operations which are similar as they enable to manipulate managed objects remotely. These operations are broadly the following: read which enables to read the information (attributes) of managed objects, providing the capability of monitoring and obtaining management awareness traverse or discover which enables to find out dynamically which objects are supported by a management agent; it may also be used to retrieve management information in bulk write which enables to change the information (attributes) of managed objects, possibly triggering some associated behaviour action which enables to perform an imperative action, affecting possibly the associated resource create which enables to create a managed object e.g. a table entry or other delete which enables to delete a managed object, again possibly affecting the associated resource notify which enables an agent to notify an interested manager that some exception happened Not all of these operations are present in all the management protocols, but the basic ones i.e.. read, traverse/discover, write and notify are. 13

14 The ADI Management Model Management activities can be seen as having three phases: Awareness through read, discover, notify Decision making the Management Intelligence Implementation: intrusive management/control through write, actions, create delete All management activities can be thought as having three phases according to the ADI model: awareness - the phase in which awareness about a management problem is generated decision - the phase in which a decision is made for some action according to the management policy to be carried out implementation - the phase in which the decision is actually implemented In terms of the manager-agent model, awareness is acquired by managers through event reporting or polling mechanisms, the decision phase reflects the application's intelligence and the implementation is achieved by performing operations on managed objects (write, action, create, delete). 14

15 Management Communication Paradigms Connection-Oriented Guarantees reliable delivery, requires connection set up e.g. OSI CMIP/S Connectionless Management applications provide reliability through retransmission e.g. Internet SNMP Connectionless with guaranteed delivery No connection set up, a RPC protocol undertakes retransmission e.g. OMG CORBA There are three different communication paradigms that may be used by different management models to support the management protocol in communicating management information: connection-oriented - in this case the management traffic is guaranteed reliable delivery offered by a connection-oriented transport protocol; connection establishment needs to take place before any instance of actual management communication connectionless - in this case management traffic may be simply lost, it is up to the management applications to provide reliability through retransmission connectionless with guaranteed delivery - in this case communication is connectionless but an underlying application protocol undertakes retransmission; this is the case with Remote Procedure Call based management protocols Each of the above mechanisms has its advantages and drawbacks. The first provides reliability through complex retransmission mechanisms that take into account the state of the network as is the case with current sophisticated transport protocols (OSI TP4, Internet TCP). Connection management is needed though to avoid connections staying open unnecessarily as they may tie up network resources and also to avoid the burden of establishing them too often. An application knows immediately that connectivity is lost. The second mechanism has the advantage of leaving retransmission to the management applications which may have a better global view of the network than a transport protocol and avoiding connection establishment. The problem though is that sophisticated retransmission schemes are very difficult to implement and they duplicate transport layer functionality. Finally, the third has the advantage of being easy to program because of its RPC nature but usually the retransmission schemes used are simplistic; this method is best for highly reliable environments e.g. LAN, MAN etc. 15

16 Management Application Paradigms Event Driven Agents notify exceptions, notifications are configurable by management, e.g. OSI Management Polling based Manager detect changes through periodic polling, e.g. SNMP Mixed approaches are also possible Trade off between management traffic, timeliness and complexity of management applications There are two fundamental approaches to network management: an event driven approach and a polling one. They may be both used by to make management stations aware of extraordinary events. With the event-driven approach, it is the responsibility of the management agent to send an event report to a management station when an extraordinary event occurs, e.g. such as a link going down. Of course this means that after the event the node is still operational (i.e. has not crashed) and reachable. The advantage of such an approach is that it provides an immediate notification. There are disadvantages though: if many extraordinary events occur, a lot of effort may be spent in producing the event reports. With the polling-based approach, the managers periodically poll the agents to know how things are going. The obvious question though is what the frequency of polling should be: if the interval is too small, too much network bandwidth is wasted while if the interval is too long, response to problems needing attention urgently may be slow. The major advantage of this approach lies in the fact that management agents are very simple, exercising an "access-upon-management-request" regime with respect to the real resources they handle through managed objects. Mixed approaches are also possible which could be characterised as event-directed polling. There can be many schemes in between the two extremes, it all depends on the number of notifications that are defined in the management information model for a particular resource. Depending on the level of event-reporting, different requirements on the complexity and power of the managed and managing systems are imposed by these models. In the polling model, agents are very simple and managers quite complex in order to tailor the polling frequency, while in the event-driven model agents are much more complex while managers can concentrate on the management policies they implement. 16

17 The Global Picture Many manageable network elements, services and users Many Management Applications effecting policies A M-N relationship between them Flat or Hierarchical Management System Organisation In a management system related to the management of a large enterprise network, there are a lot of agents providing management capabilities to the real resources that need to be accessed for the management policies to be met and fewer managers implementing those policies. The relationship between managers and agents is many-to-many as the same managed objects may be accessed by different managers for different or even the same reasons. In general, there will be more than one application in a given system that has "manager" (as opposed to "agent") capability. There are essentially two reasons why multiple managers might be required. The first is that it may be desirable to partition the system for management purposes, either physically or logically, based on factors such as the ownership of equipment, the distribution of (human) management responsibility, or the capacity of a particular management station. The second is that it may be desirable to provide spare management capacity (redundancy) to cater for component failures or system expansion. The general structure of the management applications realising the management policies can be flat or hierarchical. 17

18 Centralised Management Organisation manager to agent relationship network element (agent) management station (manager) In this model there is only one centralised management station above the network element level where there exist agents for all the managed elements. This is the typical model of private network (LAN/MAN) management. In telecommunications environments until now is not uncommon to have management stations dedicated to one managed network element. 18

19 Flat Management Organisation manager to agent relationship network element (agent) management application (manager) In this model there is only one level of managers above the network element level where there exist agents for all the managed elements. Those managers may communicate with each other to agree on policies and they may even offer an enhanced information model to each other in terms of management capabilities. For example, a manager from one domain may need to remotely monitor objects within agents in another domain. In this case, it may request the manager of that domain to do that on its behalf and receive notifications upon important changes only. Typically, distribution in the flat model is according to geographical (different subnetworks) or functional (Fault, Configuration, Accounting, Performance, Security - FCAPS) considerations. 19

20 Hierarchical Management Organisation manager to agent relationship network element (agent) management application (manager-agent) In this model there may exist many levels of managers, or better, management applications as most of them are both managers and agents: they offer an agent interface to peer and superior managers and they may act themselves as managers with respect to peer or subordinate agents. In such a hierarchy, there are agents only at the lowest level and hybrid units in the other layers, while managers only are also possible. The advantage of such an organisation is that management responsibilities and policies may be organised in such a way as to build on those offered by the layer below. Layered information models offer also the advantage of increased abstraction and scope for higher layers. Such a hierarchical management system organisation is suggested by the ITU-T Telecommunications Management Network (TMN). Hierarchical separation of concerns is according to element, network and service management. Within each layer, there is also horizontal separation following functional (FCAPS) considerations. 20

21 Integration of Foreign Agents through Multi- Stack Managers M API stack1 stack2 A1 A2 element1 element2 Manager to Agent relationship Interworking between manager applications and foreign agents that do not conform to the agreed management model can be achieved by solutions that can be classified into two broad categories: integration in the manager end; and integration in the agent end of the manager-agent model. The integration in the manager end means that one accepts the diversity in the supported technology by managed elements and tries to provide element management applications that understand the different underlying information models and access mechanisms. This approach is often referred to as dual stack manager, since these applications will need to understand both the OSI and Internet management models. However, such an approach is suspect because it is difficult to conceal which model the managing application deals with since both the underlying information models and access mechanisms have important differences. For example, the nature of objects and the naming schemes are different in the two models. This is also the case with respect to the supported communication and access paradigms. Of course, this does not mean that such an approach is not feasible but simply that integration cannot be seamless, increasing significantly the development effort and investment for dual manager applications. 21

22 Integration of Foreign Agent through Protocol Adaptation M A1 ICF A2 application-gateway ICF: Information Conversion Function Manager to Agent relationship element The gateway approach provides the most promising solution for integrating foreign agents. In this, an application acts as a gateway (proxy or adapter are two other terms often used ) for one or more agents, exporting converted information models and providing service conversion from one access method to the other. The Information Conversion Function (ICF) realises the mapping between the information model in the standard framework, e.g. the TMN, to the information model in the foreign framework. Note that this assumes that the foreign element provides a management interface with the functionality required by the standard framework. 22

Management Functional Areas

Management Functional Areas Management Functional Areas Identified in First OSI Systems Management (OSI-SM), also adopted in the TMN Fault Management Configuration Management Accounting Management Performance Management Security

More information

NETWORK AND SERVICES MANAGEMENT AND CONTROL MSc MODULE (EEM.nsm)

NETWORK AND SERVICES MANAGEMENT AND CONTROL MSc MODULE (EEM.nsm) NETWORK AND SERVICES MANAGEMENT AND CONTROL MSc MODULE (EEM.nsm) Lecture Component: The Telecommunications Management Network Lectures 16-18 Prof. George Pavlou Centre for Communication Systems Research

More information

Telecommunications Systems 2

Telecommunications Systems 2 Telecommunications Systems 2 Telecommunications Management Network Sistemas de Telecomunicações II - 4.1 Telecommunications Management Network ITU-T M.3000 M.3599 Sistemas de Telecomunicações II - 4.2

More information

Lecture 5: Foundation of Network Management

Lecture 5: Foundation of Network Management Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information

More information

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper. The EMSX Platform A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks A White Paper November 2002 Abstract: The EMSX Platform is a set of components that together provide

More information

Chapter 18. Network Management Basics

Chapter 18. Network Management Basics Network Management Basics > FCAPS Model Chapter 18. Network Management Basics This chapter covers the following topics: FCAPS Model Network Management Architecture Network Management Protocols An Introduction

More information

Introduction to Network Management

Introduction to Network Management Introduction to Network Management Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network Management Requirement SNMP family OSI management function

More information

Network Management Architectures for Broadband Satellite Multimedia Systems

Network Management Architectures for Broadband Satellite Multimedia Systems Network Architectures for Broadband Multimedia Systems obert J. Mort Systek Consulting Ltd., Havant, UK robert.mort@etsi.org Matteo Berioli DL, Germany matteo.berioli@dlr.de Haitham Cruickshank, University

More information

Telecommunications Management Network (TMN)

Telecommunications Management Network (TMN) Telecommunications Management Network (TMN) Definition The telecommunications management network (TMN) provides a framework for achieving interconnectivity and communication across heterogeneous operating

More information

Lecture 12: Network Management Architecture

Lecture 12: Network Management Architecture Lecture 12: Network Management Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 12-1 Defining Network Management Contains multiple layers: Business

More information

Tik-109/110.300 Telecommunications architectures:

Tik-109/110.300 Telecommunications architectures: Tik-109/110.300 Telecommunications architectures: Network management Hannu H. KARI/Helsinki University of Technology (HUT) TML-laboratory/CS/HUT Tik-109/110.300 Fall 2000 Hannu H. Kari Page 1 Agenda Telecom

More information

2. OSI Systems Management and the Telecommunications Management Network

2. OSI Systems Management and the Telecommunications Management Network 2. OSI Systems Management and the Telecommunications Management Network 2.1 Introduction Chapter 2 of this thesis introduces first OSI Systems Management (OSI-SM) [X700][X701] and the Telecommunications

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

Workflow Management Standards & Interoperability

Workflow Management Standards & Interoperability Management Standards & Interoperability Management Coalition and Keith D Swenson Fujitsu OSSI kswenson@ossi.com Introduction Management (WfM) is evolving quickly and expolited increasingly by businesses

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

WDM network management

WDM network management IO2654 Optical Networking WDM network management Paolo Monti Optical Networks Lab (ONLab), Communication Systems Department (COS) http://web.it.kth.se/~pmonti/ 1! Lecture objectives Overview of the control

More information

Network Discovery Protocol LLDP and LLDP- MED

Network Discovery Protocol LLDP and LLDP- MED Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

(Refer Slide Time: 1:17-1:40 min)

(Refer Slide Time: 1:17-1:40 min) Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 37 Network management Good day, so today we will talk about network management.

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

Management Tools, Systems and Applications. Network Management

Management Tools, Systems and Applications. Network Management Management Tools, Systems and Applications Network Management 13.5.2013 1 Lectures Schedule Week Week 1 Topic Computer Networks - Network Management Architectures & Applications Week 2 Network Management

More information

IEC 61850: Communication Networks and Systems in Substations

IEC 61850: Communication Networks and Systems in Substations IEC 61850: Communication Networks and Systems in Substations Sistemi e strumenti per l'automazione, A. Flammini, AA2011-2012 Background I: Power Grid Sistemi e strumenti per l'automazione A. Flammini,

More information

Operations System. Data Communication Network. Exchange. Telecommunication network

Operations System. Data Communication Network. Exchange. Telecommunication network Introduction to TMN Aiko Pras, Bert-Jan van Beijnum, Ron Sprenkels CTIT Technical Report 99-09 April 1999 University of Twente The Netherlands Copyright 1999 by Aiko Pras, Enschede, The Netherlands This

More information

Cisco Active Network Abstraction Gateway High Availability Solution

Cisco Active Network Abstraction Gateway High Availability Solution . Cisco Active Network Abstraction Gateway High Availability Solution White Paper This white paper describes the Cisco Active Network Abstraction (ANA) Gateway High Availability solution developed and

More information

83-10-41 Types of Firewalls E. Eugene Schultz Payoff

83-10-41 Types of Firewalls E. Eugene Schultz Payoff 83-10-41 Types of Firewalls E. Eugene Schultz Payoff Firewalls are an excellent security mechanism to protect networks from intruders, and they can establish a relatively secure barrier between a system

More information

DigiPoints Volume 2. Student Workbook. Module 10 Network Management

DigiPoints Volume 2. Student Workbook. Module 10 Network Management Network Management Page 10.1 DigiPoints Volume 2 Module 10 Network Management Summary In this module, students learn engineering and operational information about Network Management. Module Objectives

More information

OSI Systems Management, Internet SNMP and ODP/OMG CORBA as Technologies for Telecommunications Network Management

OSI Systems Management, Internet SNMP and ODP/OMG CORBA as Technologies for Telecommunications Network Management OSI Systems Management, Internet SNMP and ODP/OMG CORBA as Technologies for Telecommunications Network Management George Pavlou Dept. of Computer Science, University College London Gower Street, London

More information

52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller

52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller 52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities

More information

TELECOMMUNICATION SERVICE MANAGEMENT

TELECOMMUNICATION SERVICE MANAGEMENT CITR TECHNICAL JOURNAL VOLUME 1 1 TELECOMMUNICATION SERVICE MANAGEMENT QINZHENG KONG, GRAHAM CHEN, AND GLENN HOLLIMAN Abstract The development of standard platform approaches to the management of telecommunication

More information

(Refer Slide Time: 02:17)

(Refer Slide Time: 02:17) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,

More information

Design Document. Offline Charging Server (Offline CS ) Version 1.0. - i -

Design Document. Offline Charging Server (Offline CS ) Version 1.0. - i - Design Document Offline Charging Server (Offline CS ) Version 1.0 - i - Document Scope Objective The information provided in this document specifies the design details of Operations of Offline Charging

More information

ETSI ETR 300-4 TECHNICAL July 1997 REPORT

ETSI ETR 300-4 TECHNICAL July 1997 REPORT ETSI ETR 300-4 TECHNICAL July 1997 REPORT Source: EP-TETRA Reference: DTR/TETRA-01011-4 ICS: 33.020 Key words: TETRA, network management Terrestrial Trunked Radio (TETRA); Voice plus Data (V + D); Designers'

More information

Mobile SCTP Transport Layer Mobility Management for the Internet

Mobile SCTP Transport Layer Mobility Management for the Internet Mobile SCTP Transport Layer Mobility Management for the Maximilian Riegel Siemens AG, Munich, Germany E-mail: maximilian.riegel@icn.siemens.de Dr. Michael Tüxen Siemens AG, Munich, Germany E-mail: michael.tuexen@icn.siemens.de

More information

FAULT MANAGEMENT SERVICE IN ATM NETWORKS USING TINA NETWORK RESOURCE ARCHITECTURE

FAULT MANAGEMENT SERVICE IN ATM NETWORKS USING TINA NETWORK RESOURCE ARCHITECTURE FAULT MANAGEMENT SERVICE IN ATM NETWORKS USING TINA NETWORK RESOURCE ARCHITECTURE Chetan P. Chiba, Setumo Mohapi, Hu Hanrahan Centre for Telecommunications Access and Services 1 Department of Electrical

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

Network Management System (NMS) FAQ

Network Management System (NMS) FAQ Network Management System (NMS) FAQ Q: How does the NMS work? A: The Cooper NMS is a powerful, flexible and highly scalable wireless and fixed network management solution for thousands of network nodes

More information

Zarządzanie sieciami telekomunikacyjnymi

Zarządzanie sieciami telekomunikacyjnymi What Is an Internetwork? An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry,

More information

Simple Network Management Protocol

Simple Network Management Protocol CHAPTER 32 Simple Network Management Protocol Background Simple Network Management Protocol (SNMP) is an application-layer protocol designed to facilitate the exchange of management information between

More information

Managing Dynamic Configuration

Managing Dynamic Configuration White Paper Immediate Network Synchronization with Low Overhead: Cisco Prime Network Reduced Polling VNE Cisco Prime Network's near real-time model relies on accurate information about the managed network

More information

Zarządzanie sieciami telekomunikacyjnymi

Zarządzanie sieciami telekomunikacyjnymi What Is Network Management? In general, network management is a service that employs a variety of tools, applications, and devices to assist human network managers in monitoring and maintaining networks.

More information

SNMP -overview. Based on: W.Stallings Data and Computer Communications

SNMP -overview. Based on: W.Stallings Data and Computer Communications SNMP -overview Based on: W.Stallings Data and Computer Communications Network Management -SNMP Simple Network Management Protocol (not so simple ) Dominant standardized network management scheme in use

More information

ETSI TR 101 303 V1.1.2 (2001-12)

ETSI TR 101 303 V1.1.2 (2001-12) TR 101 303 V1.1.2 (2001-12) Technical Report Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON) Release 3; Requirements definition study; Introduction to service and network

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION ITU-T M.3010 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (02/2000) SERIES M: TMN AND NETWORK MAINTENANCE: INTERNATIONAL TRANSMISSION SYSTEMS, TELEPHONE CIRCUITS,

More information

MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS

MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS Hristo Emilov Froloshki Department of telecommunications, Technical University of Sofia, 8 Kliment Ohridski st., 000, phone: +359 2 965 234, e-mail:

More information

Overview of M*Ware Convergent Manager and the M*Ware Services

Overview of M*Ware Convergent Manager and the M*Ware Services Overview of M*Ware Convergent Manager and the M*Ware Services 2002-2003 Introduction...2 M*Ware Convergent Manager: System Components...4 Network Facing Application s...4 System Management s...4 Databases...5

More information

Efficient Information Retrieval in Network Management Using Web Services

Efficient Information Retrieval in Network Management Using Web Services Efficient Information Retrieval in Network Management Using Web Services Aimilios Chourmouziadis 1, George Pavlou 1 1 Center of Communications and Systems Research, Department of Electronic and Physical

More information

Business case for VoIP Readiness Network Assessment

Business case for VoIP Readiness Network Assessment Business case for VoIP Readiness Network Assessment Table of contents Overview... 2 Different approaches to pre-deployment assessment:.......... 2 Other considerations for VoIP pre-deployment... 3 The

More information

OSI Protocols. Background. Technology Basics. Media Access CHAPTER

OSI Protocols. Background. Technology Basics. Media Access CHAPTER CHAPTER 20 OSI Protocols Background In the early days of intercomputer communication, networking software was created in a haphazard, ad hoc fashion. When networks grew sufficiently popular, the need to

More information

Managing a Fibre Channel Storage Area Network

Managing a Fibre Channel Storage Area Network Managing a Fibre Channel Storage Area Network Storage Network Management Working Group for Fibre Channel (SNMWG-FC) November 20, 1998 Editor: Steven Wilson Abstract This white paper describes the typical

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer 29 Network Management Design A good design can help an organization achieve

More information

The Workflow Management Coalition Specification Workflow Management Coalition Terminology & Glossary

The Workflow Management Coalition Specification Workflow Management Coalition Terminology & Glossary The Workflow Management Coalition Specification Workflow Management Coalition Terminology & Glossary Workflow The automation of a business process, in whole or part, during which documents, information

More information

One of the most important topics in any discussion of TCP/IP is IP. IP Addressing

One of the most important topics in any discussion of TCP/IP is IP. IP Addressing IP Addressing 125 machine, called a RARP server, responds with the answer, and the identity crisis is over. RARP uses the information it does know about the machine s MAC address to learn its IP address

More information

Simple Network Management Protocol

Simple Network Management Protocol Simple Network Management Protocol Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outlines Basic Concepts Protocol Specification Transport-Level Support SNMP Group Practical

More information

END-TO-END CLOUD White Paper, Mar 2013

END-TO-END CLOUD White Paper, Mar 2013 END-TO-END CLOUD White Paper, Mar 2013 TABLE OF CONTENTS Abstract... 2 Introduction and Problem Description... 2 Enterprise Challenges... 3 Setup Alternatives... 4 Solution Details... 6 Conclusion and

More information

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same

More information

Implementing TMN-like Management Services in a TINA Compliant Architecture: A Case Study on Resource Configuration Management

Implementing TMN-like Management Services in a TINA Compliant Architecture: A Case Study on Resource Configuration Management Implementing TMN-like Management Services in a TINA Compliant Architecture: A Case Study on Resource Configuration Management David Griffin, George Pavlou, Thurain Tin University College London, UK Abstract

More information

Comparison of SNMP. Versions 1, 2 and 3

Comparison of SNMP. Versions 1, 2 and 3 Comparison of SNMP 1 Comparison of SNMP Versions 1, 2 and 3 Eddie Bibbs Brandon Matt ICTN 4600-001 Xin Tang April 17, 2006 Comparison of SNMP 2 During its development history, the communities of researchers,

More information

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures

IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction

More information

What is Data Virtualization?

What is Data Virtualization? What is Data Virtualization? Rick F. van der Lans Data virtualization is receiving more and more attention in the IT industry, especially from those interested in data management and business intelligence.

More information

Lecture 18: Telecommunications Management Network (TMN)

Lecture 18: Telecommunications Management Network (TMN) Lecture 18: Telecommunications (TMN) Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 18-1 TMN Necessity for interoperability Need for management of more than

More information

TECHNOLOGY WHITE PAPER. Correlating SDN overlays and the physical network with Nuage Networks Virtualized Services Assurance Platform

TECHNOLOGY WHITE PAPER. Correlating SDN overlays and the physical network with Nuage Networks Virtualized Services Assurance Platform TECHNOLOGY WHITE PAPER Correlating SDN overlays and the physical network with Nuage Networks Virtualized Services Assurance Platform Abstract Enterprises are expanding their private clouds and extending

More information

SNMP Monitoring: One Critical Component to Network Management

SNMP Monitoring: One Critical Component to Network Management Network Instruments White Paper SNMP Monitoring: One Critical Component to Network Management Although SNMP agents provide essential information for effective network monitoring and troubleshooting, SNMP

More information

MOBILE INTELLIGENT AGENTS IN ACTIVE VIRTUAL PIPES SUPPORT FOR VIRTUAL ENTERPRISES

MOBILE INTELLIGENT AGENTS IN ACTIVE VIRTUAL PIPES SUPPORT FOR VIRTUAL ENTERPRISES MOBILE INTELLIGENT AGENTS IN ACTIVE VIRTUAL PIPES SUPPORT FOR VIRTUAL ENTERPRISES Alex Galis , David Griffin , Walter Eaves University

More information

End-to-End Cloud Elasticity

End-to-End Cloud Elasticity End-to-End Cloud Elasticity Whitepaper, July 2011 Maximilian Ahrens Chris Janz Marten Schoenherr Zimory GmbH, Revaler Strasse 100, Warschauer Strasse, 10245 Berlin, Germany Ciena Corporation, 307 Leggett

More information

Network Management - SNMP

Network Management - SNMP Network Management - SNMP Simple Network Management Protocol Networks are indispensable More complexity makes failure more likely Require automatic network management tools Standards required to allow

More information

A Network Management Framework for Emerging Telecommunications Network. asamba@kent.edu

A Network Management Framework for Emerging Telecommunications Network. asamba@kent.edu Symposium on Modeling and Simulation Tools for Emerging Telecommunication Networks: Needs, Trends, Challenges, Solutions Munich, Germany, Sept. 8 9, 2005 A Network Management Framework for Emerging Telecommunications

More information

Frame Relay and Frame-Based ATM: A Comparison of Technologies

Frame Relay and Frame-Based ATM: A Comparison of Technologies White Paper and -Based : A Comparison of Technologies Larry Greenstein Nuera Communications VP, Technology, Forum June 1995 June 27, 1995 i TABLE OF CONTENTS 1. PREFACE...1 2. INTRODUCTION...1 3. INTERWORKING

More information

Stateful Inspection Technology

Stateful Inspection Technology Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions

More information

Event-based middleware services

Event-based middleware services 3 Event-based middleware services The term event service has different definitions. In general, an event service connects producers of information and interested consumers. The service acquires events

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

An Inter-domain Virtual Private Network Management Service

An Inter-domain Virtual Private Network Management Service An Inter-domain Virtual Private Network Management Service David Lewis University College London Computer Science Department, Gower Street, London, WC1E 6BT, UK tel:+44 171 391 1327 fax: +44 171 387 1397

More information

TimePictra Release 10.0

TimePictra Release 10.0 DATA SHEET Release 100 Next Generation Synchronization System Key Features Web-based multi-tier software architecture Comprehensive FCAPS management functions Software options for advanced FCAPS features

More information

FAQs for Oracle iplanet Proxy Server 4.0

FAQs for Oracle iplanet Proxy Server 4.0 FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle

More information

R07. IV B.Tech. II Semester Regular Examinations, April, 2011. NETWORK MANAGEMENT SYSTEMS (Information Technology)

R07. IV B.Tech. II Semester Regular Examinations, April, 2011. NETWORK MANAGEMENT SYSTEMS (Information Technology) Set No. 1 1. a) Discus about network management goals and functions in detail. b) Explain in detail about current status and future of network management. 2. a) Explain the SNMP network management architecture.

More information

NNMi120 Network Node Manager i Software 9.x Essentials

NNMi120 Network Node Manager i Software 9.x Essentials NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,

More information

The evolution of data connectivity

The evolution of data connectivity Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity

More information

Requirements & Reference Models for ADSL Access Networks: The SNAG Document

Requirements & Reference Models for ADSL Access Networks: The SNAG Document Technical Report TR-010 Requirements & Reference Models for ADSL Access Networks: The SNAG Document June 1998 Abstract: This document outlines architectural requirements and reference models for ADSL services

More information

Simple Network Management Protocol

Simple Network Management Protocol A Seminar Report on Simple Network Management Protocol Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science SUBMITTED TO: SUBMITTED BY: www.studymafia.org www.studymafia.org

More information

ABSTRACT INTRODUCTION MATERIALS AND METHODS

ABSTRACT INTRODUCTION MATERIALS AND METHODS JOURNAL OF AGRICULTURE & SOCIAL SCIENCES 1813 2235/2005/01 2 156 160 http://www.ijabjass.org Design and Implementation of Network Operational Management Systems for Integrated and Automated Management

More information

White paper ICM COMPUTER GROUP. Remote Monitoring A modern day IT essential

White paper ICM COMPUTER GROUP. Remote Monitoring A modern day IT essential White paper ICM COMPUTER GROUP Remote Monitoring A modern day IT essential Contents Introduction... 3 The problem... 3 The solution... 3 The need for IT infrastructure monitoring...4 Increased system uptime...

More information

Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation

Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation Solution Overview Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation IT organizations face challenges in consolidating costly and difficult-to-manage branch-office

More information

Integrated management information in utilities

Integrated management information in utilities Integrated management information in utilities Information from Cigré The objective of this article is to assist utilities define, specify and evaluate the high level management systems that form the information

More information

Distributed Systems Architectures

Distributed Systems Architectures Software Engineering Distributed Systems Architectures Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To explain the advantages and disadvantages of different distributed systems

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

Patterns of Information Management

Patterns of Information Management PATTERNS OF MANAGEMENT Patterns of Information Management Making the right choices for your organization s information Summary of Patterns Mandy Chessell and Harald Smith Copyright 2011, 2012 by Mandy

More information

CELTIC Initiative Project Madeira: A P2P Approach to Network Management

CELTIC Initiative Project Madeira: A P2P Approach to Network Management CELTIC Initiative Project Madeira: A P2P Approach to Network Management Martin Zach 1, Daryl Parker 2, Liam Fallon 2, Christian Unfried 1, Miguel Ponce de Leon 3, Sven van der Meer 3, Nektarios Georgalas

More information

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol? Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

More information

ETSI ETR 037 TECHNICAL February 1992 REPORT

ETSI ETR 037 TECHNICAL February 1992 REPORT ETSI ETR 037 TECHNICAL February 1992 REPORT Source: ETSI TC-NA Reference: DTR/NA-043202 ICS: 33.020 Key words: Network, TMN Network Aspects (NA); Telecommunications Management Network (TMN) Objectives,

More information

SNMP Network Management Concepts

SNMP Network Management Concepts SNMP Network Management Concepts Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Background Basic Concepts Summary The Origins of TCP/IP Starts at 1969, and founded

More information

Network Data Management Protocol (NDMP) White Paper

Network Data Management Protocol (NDMP) White Paper Network Data Management Protocol (NDMP) White Paper Summary What is the primary goal of enterprise storage management? To back up and restore information in an intelligent, secure, timely, cost-effective

More information

DC70 NETWORK MANAGEMENT JUN 2015

DC70 NETWORK MANAGEMENT JUN 2015 Q.2 a. Most of the popular host operating systems come with the TCP/IP Suite and are amenable to SNMP management. The current networks management systems, however, suffer from several limitations. Describe

More information

THE MANAGEMENT INFRASTRUCTURE OF A NETWORK MEASUREMENT SYSTEM FOR QOS PARAMETERS

THE MANAGEMENT INFRASTRUCTURE OF A NETWORK MEASUREMENT SYSTEM FOR QOS PARAMETERS THE MANAGEMENT INFRASTRUCTURE OF A NETWORK MEASUREMENT SYSTEM FOR QOS PARAMETERS Alexandru BIKFALVI, Paul PĂTRAŞ, Cristian Mihai VANCEA, Virgil DOBROTĂ Technical University of Cluj-Napoca, Communications

More information

Networking TCP/IP routing and workload balancing

Networking TCP/IP routing and workload balancing System i Networking TCP/IP routing and workload balancing Version 5 Release 4 System i Networking TCP/IP routing and workload balancing Version 5 Release 4 Note Before using this information and the product

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

Base One's Rich Client Architecture

Base One's Rich Client Architecture Base One's Rich Client Architecture Base One provides a unique approach for developing Internet-enabled applications, combining both efficiency and ease of programming through its "Rich Client" architecture.

More information

Application Centric Infrastructure Object-Oriented Data Model: Gain Advanced Network Control and Programmability

Application Centric Infrastructure Object-Oriented Data Model: Gain Advanced Network Control and Programmability White Paper Application Centric Infrastructure Object-Oriented Data Model: Gain Advanced Network Control and Programmability What You Will Learn This document discusses application centric infrastructure

More information

The OSI Network Management Model - Capacity and performance management

The OSI Network Management Model - Capacity and performance management Edith Cowan University Research Online ECU Publications Pre. 2011 2008 The OSI Network Management Model - Capacity and performance management Chompu Nuangjamnong Edith Cowan University Stanislaw P. Maj

More information

D6.1: Service management tools implementation and maturity baseline assessment framework

D6.1: Service management tools implementation and maturity baseline assessment framework D6.1: Service management tools implementation and maturity baseline assessment framework Deliverable Document ID Status Version Author(s) Due FedSM- D6.1 Final 1.1 Tomasz Szepieniec, All M10 (31 June 2013)

More information