SLA Management in Federated Environments
|
|
|
- Prosper Jonas Park
- 10 years ago
- Views:
Transcription
1 SLA Management in Federated Environments Preeti Bhoj, Sharad Singhal, Sailesh Chutani Internet s and Applications Laboratory HPL December, 1998 federated management, service level agreements, system monitoring Increasingly, services such as E-commerce, web hosting, application hosting, etc., are being deployed over an infrastructure that spans multiple control domains. These end-to-end services require cooperation and internetworking between multiple organizations, systems and entities. Currently, there are no standard mechanisms to share selective management information between the various service providers or between service providers and their customers. Such mechanisms are necessary for end-to-end service management and diagnosis as well as for ensuring the service level obligations between a service provider and its customers or partners. In this paper we describe an architecture that uses contracts based on service level agreements (SLAs) to share selective management information across administrative boundaries. We also describe the design of a prototype implementation of this architecture that has been used by us for automatically measuring, monitoring, and verifying service level agreements for Internet services. Copyright Hewlett-Packard Company 1998
2 1 Introduction Increasingly, services such as E-commerce, web hosting, application hosting, etc., are being deployed over an infrastructure that spans multiple control domains. These end-to-end services require cooperation and internetworking between multiple organizations, systems and entities. As shown in Figure 1, even within a single enterprise, multiple organizations (or geographically distributed sites) can maintain independent management systems that need to share management information. Cross-domain management is especially critical when outsourcing Information Technology (IT) services or when extending business applications to systems in other enterprises in order to form extended enterprises. Managing large-scale applications that cross such administrative boundaries is a problem because current management solutions either allow partners access to all management information (e.g., by providing remote consoles) or deny access to this information. Inter-domain management in competitive environments places two fundamental requirements on the management system: 1. management and diagnosis require the knowledge and view of the end-to-end service. This means that management information has to flow across administrative domain boundaries to provide an end-to-end view. 2. Business requirements restrict information sharing across domains because the details of the service implementation and much of the customer information is considered proprietary by each business. Thus business policies restrict the sharing of details about components and infrastructure used in delivering the service. These policies are particularly stringent if customer data needs to be shared across domains. News Mgmt WFH Web IT Org. of Site 1 Large Enterprise Print Payroll Expense Accounting Purchasing Mgmt Corporate Directory IT Org. of Site 2 Inventory Extended Enterprise IT Outsourcing Web Print Enterprise Mgmt Payroll Inventory Expense Accounting Purchasing Management Outsourcer Helpdesk Business Applications Content Server Disk Farm Web Server Farm Figure 1. Internet Business Environment Meeting these objectives requires that service management systems need to Selectively share information about the components of the overall service only to the extent necessary to ensure overall operation of the service. Hide the details of the system components by abstracting information. Provide mechanisms to ensure that service level obligations provided by the administrative domain to its customers and partners are being met. Over the years, a number of solutions have been proposed for inter-domain management. The telecom industry and the ATM/POS network providers have coordinated and shared information between multiple entities. Unlike the Internet their environments are regulated and are typically designed to offer a single service. Differences between these services and Internet-based services are discussed in [1]. Recently, work has also been done on inter-domain information sharing on the Internet. In [2], a troubleshooting methodology for coordinating network problem diagnosis among peer administrative domains and 1
3 untrusted observers is presented. Mechanisms to manage security in a heterogeneous multi-provider environment are discussed in [3]. Inter-domain communication is discussed in TMN. There are a number of publications in the area of using the TMN model to manage Virtual Private Networks (VPN). The design of a management service for a VPN that addresses multiple domains and heterogeneous systems are discussed in [4]. In [5], approaches in Internet services management are compared to those taken by the telecommunication industry (TMN). It is pointed out that more effort is required to achieve a standard Internet service management strategy to manage all types of internet services as well as non-internet based services such as voice services. When describing service level management, one of the most commonly used service metric is availability. [6] describes methods for testing the availability of distributed applications by constructing a service graph for the description of functional dependencies and applying calculation rules on an instantiated graph to determine the availability of applications. Most published work in this area describes approaches to managing and trouble-shooting network services, and managing security, in an inter-domain environment. A few products (e.g., InfoVista systems [7], Netcool [8], Vital Analysis[9], Network Health Reporter[10], etc.) allow customers to monitor the quality of service offered by providers. While the research and products mentioned above offer a good start towards Internet service management, there still remain unresolved problems: None of the research addresses how to selectively share management information across administrative domain boundaries in a secure way. This capability is particularly important with the introduction of extended enterprises where a service is composed of components from several service providers. There are no tools available to derive measurable aspects from Level Agreements (SLAs). It is unclear how a legal service level agreement document is translated into a measurable specification that can be automatically monitored for compliance. There are no recommendations and policies to define metrics (what they are and how their values are computed) and their bounds (thresholds, baselines, etc.) for service compliance. Work is underway in the IPPM (Internet Protocol Performance Metrics) working group of the IETF, the XIWT (Cross Industry Working Team) and ANSI T1A1 committee to identify Internet service related metrics, and measurement methodologies. We have focussed our work on developing mechanisms to share selective management information across federated domain boundaries, and measuring, monitoring, verifying, and managing service level agreements for Internet services. We expect our solution to complement and work side by side with traditional management solutions, such as HP OpenView, CA Unicenter, and Tivoli TME. We assume that the measurements collected by the management and measurement systems can be combined to service level metrics used in the service level agreements. In section 2, we discuss our overall architecture for sharing information in federated systems. Section 3 describes contracts, which are used in our architecture for encapsulating measurable aspects of service level agreements for the purposes of management. The design of Conformance, a prototype system to monitor SLAs for compliance and provide selective sharing of management information is discussed in section 4. Finally, we describe an example where we have used Conformance to monitor Internet services in section 5 and finish with conclusions in section 6. 2 Federation Architecture A federated system is defined to be a system composed of components within different administrative entities cooperating to provide a service. A service is an application with a well-defined interface and functionality. Federated service management is the management of services that span multiple heterogeneous control domains, and which rely on correct functioning of components across those domains. A control domain is defined to be an administrative domain that is managed by a single administrative entity, typically a business. [1] elaborates on these concepts in greater detail. providers are increasingly using SLAs to define agreements for sharing resources with partners, as well as for offering service quality guarantees to customers. These SLAs contain (along with other legal obligations) details of information that is shared and service level guarantees that are offered by the 2
4 provider. Management systems should contain information about these SLAs, and should use this information both to control access to system resources as well as to monitor the system for compliance with the SLA. Ultimately, the management system should control resources to actively manage the services with the objective of meeting these agreements. We have developed an architecture to allow SLA monitoring and sharing of selective management information across administrative domain boundaries in a secure way. In our architecture we assume that all interactions between federated domains are based on bilateral agreements that can be implemented using verifiable and consistent contracts. A contract is a specification (derived from the SLA) of the service attributes that are meaningful and automatically measurable for correct service behavior. The contract specification contains both the attributes and the bounds within which the attributes must stay in order for the service to behave in a desired manner. Attributes have to be both quantifiable and measurable to be included in a contract. Different domains are likely to contain heterogeneous systems, it is thus important that there be agreement on how contracts will be invoked and how the systems will communicate. We describe contracts in further detail in section 3. Figure 2 shows a high level overview of our architecture. In this section we explain the diagram with general descriptions of each of the components. Domain 1 Level Agreements Verification Interface Repository Domain 2 Manager Model Domain 3 Figure 2. Federation Architecture The ovals represent administrative domains. All external interactions to a given domain happen through one or more Verification Interfaces provided by the domain. level agreements offered by the domain define the nature of information provided at the interface and the security parameters needed for the interaction. The smaller oval at the bottom represents another service domain, which might either be self-contained within a single business entity, or might be federated. The architecture provides a recursive and hierarchical model for communication in a federation, thus providing a scalable solution. It is assumed in the architecture that each domain controls only the service aspects that are provided by it. Inside the domain, the service manager directs the collection of management information using the servicespecific data contained in the service model. The data collection is guided by the contracts in the contract repository. The service model includes a description of the service that this administration is managing. It Identifies the various components that enable a service. For example, if the top level service being managed is electronic mail, the service model would list the components as the server host, the networks connecting the host to the internet, the application itself, the name server used to resolve hostnames to internet addresses, etc. Expresses interdependencies that exist among the different elements of the service. From the above example, all components identified in the service model should function properly for the service to work. The interdependencies capture the cause and effect between the components of a service. 3
5 Identifies the measurements that are available from each component. Thus, the server could identify the number of transactions, and active measurements could be used to get an estimate of the response time seen by clients. The contract repository contains a set of contracts, which this domain has with its providers and customers. It contains information on how to validate an incoming contract verification request and places constraints on what data may be accessed from outside the domain as well as how that data is computed. As mentioned earlier, contracts consist of a specification of attributes and bounds within which the attributes must stay in order for the service to behave correctly. The service manager is the engine responsible for directing the verification task. It has the knowledge of how to evaluate an incoming contract verification request. This would involve interfacing with the contract repository to get the details of the contract, and interfacing with the local resources and local system and service management modules to collect information needed to verify the contract. If evaluation of a contract has dependencies on other external contracts then it uses the contract verification interfaces provided by those external domains to collect the data. Figure 3 shows how the local resources and management systems are coupled to the contract verification interface to expose selected information. The local measurement and management systems collect data from the local infrastructure and applications. Customizable plug-ins allow the service manager to communicate with a variety of systems to extract information about the domain. The plug-ins provide an abstract view of the system to the service manager that is independent of the underlying implementation. The contract evaluation and notification handlers use this abstract view to compare the system behavior to pre-set thresholds and conditions specified in the contracts to monitor the contracts for compliance. Repository Repository Authentication & Authentication & Authorization Authorization Verify Register Notify Verification Verification Interface Interface Evaluation & Notification Handlers Customizable plug-ins Manager Meas. Meas. Resources Resources Mgmt. Mgmt. Apps. Apps. Data Collection from Outside Domain(s) Model Model 3 s Figure 3. Verification Framework s govern the details of which data can be exposed and to whom. In this section, we describe the functionality offered by contracts in more detail. 3.1 Definition Formally, a contract C is defined by the triple (P, M, A), where P is the set of properties associated with the contract, A is the set of assertions agreed upon by the parties, and M is the set of methods (or operations) available on the contract. Properties define information (needed for contract verification) that does not necessarily relate directly to the specific service that is the subject of the contract. Examples of items in P are P = {authentication mechanism, access control, invocation methodology, } Assertions contain service-related agreements or guarantees. The assertion set A consists of A = { (v)} 4
6 where v is a vector of variables that reflect some aspect of the service and (v) is a relationship that constrains those variables according to contract agreements. At any given time, (v) takes on the values TRUE or FALSE depending on whether the constraint described in the relationship is being met or not. Examples of assertions in A may be A = {availability > 99.9%, packet loss < 2% round trip delay < 150 ms, } Methods describe the operations available on the contract at the contract verification interface. They permit the invoker to query the truthfulness of the assertions in the contract, identify assertions that are FALSE, and retrieve the values of associated variables in the assertions. For example, M may consist of M = {verify contract, query variable values, register constraint, notify event, } s are described by a Definition Language (CDL) which gives a formal declaration of the assertions in the contract, and allows the service manager to associate the contract with a number of handlers, which hide the details of the service and the means of verification. structure and verification is discussed further in sections 4 and 5 using examples. 3.2 Content From an operational point of view the set of assertions in the contract defines its content. Each assertion is an atomic group of statements that is agreed upon by the parties defining the contract. At any given time, an assertion may be TRUE or FALSE depending on whether the party is meeting the obligations stated in the assertion or not. Statements in an assertion are made up of logical predicates whose value can be uniquely determined. The logical predicates are composed using variables as well as logical operators such as {,, }, quantifiers {, }, set operations {,, } and constraints such as {,,, = } on those variables. Variables may be simple variables (e.g., current network load), statistical variables (e.g., averages or variances), or trends (time dependent variables such as growth rates). They reflect measures that are meaningful for the operation of the service. A contract is said to be in compliance if all assertions within it are TRUE. This requires that all assertions in the contract should be verifiable and consistent. We call an assertion verifiable if means exist to programmatically compute whether it is true or not at any given time. For a set of assertions to be consistent, we require that no dependencies exist within the set such that compliance of one assertion forces non-compliance in another. 3.3 Verification Interface s are verified using a Verification Interface that describes the set of operations that may be invoked across the domain boundary during system operation. Since contracts govern both the behavior of the interaction between domains as well as the nature of information that is exchanged between domains, the verification interface can potentially be very complex. However, the problem of specifying the interface becomes simpler if we note that not all information in the contract is dynamic. Most of the contract content mentioned in the earlier section is agreed upon ahead of time, and remains static (and known to both domains) during operation. Typically this information includes: What are the service quality metrics and service guarantees and what thresholds will be met? What specific information will be shared across domains, i.e., what parameters will be passed and what results will be returned? What are the methods for communications between systems and what authentication and access control methods are acceptable? What are the arbitration policies and what information will be checked for audits? Thus, this information does not need to be communicated across the domain boundary at run-time but can be defined using an administration interface. A description of the requirements and desired features for such administrative tools is beyond the scope of this paper. At a high level, we believe that only two capabilities need to be supported at the contract verification interface: contract verification and event notification. The interface is described in terms of an API 5
7 consisting of parameters and operations that are invoked across the domain boundary during the operation of the system. 4 Conformance Prototype In the previous sections we described an architecture for sharing information in federated environments based on service level agreements. We also defined a contract-based mechanism to specify the information needed to monitor the SLAs for compliance. interfaces can also be used for sharing other information between administrative domains. The architecture leaves open the exact communication and security mechanisms to be used, as well as methods for specifying contracts and coupling them to local management systems. In this section, we describe Conformance, a prototype implementation of this architecture. Conformance is specifically targeted to allow automatic verification of quality of service guarantees as described in a contract. The implementation of Conformance is web-based, i.e., inter-domain communication uses the HTTP protocol. This allows the use of existing facilities provided by web servers and clients for data encryption using secure socket layers (SSL) and authentication using public key certificates. Conformance is written in Java, and uses a Java-enabled web server as its front-end. The verification requests are authenticated at the web server, and the request parameters are passed back to Conformance through a Java API. Results from Conformance can be passed directly back to the client, or in the form of HTML reports. We have tested our implementation on both NT and Unix platforms. 4.1 Conformance Process Flow Figure 4 shows the process used to create the data necessary for contract verification using Conformance. SLA Specification Parser Assertion Graph Repository Model Customer Dependent Information Customer SLA Data Dictionary Conformance Engine SLA Compliance Dependent Information Measurements Figure 4. Conformance Process Flow The service model describes the service implemented by the domain as well as the dependencies between service components. The Dictionary, which is a part of the service manager, contains the abstract view of the service model in terms of high-level service attributes that are offered to customers. The Dictionary is used to identify the attributes as well as meta-information about the attributes such as which measurement plug-in is used to obtain the attribute value, how often the measurement is made, what parameters are necessary to measure it and so on. Thus, for example, for a packet loss measurement, the attributes could specify that it has a TTL (Time-To-Live) of 15 minutes, that it requires a network segment identification as a parameter, and that it should be obtained using the Network_Measures plug-in. This way the Dictionary isolates the Conformance Engine from the details of the underlying system implementation. For each customer SLA, information about the guarantees (thresholds and bounds on the attributes) as well as information about the service components which impact the service offered to a given customer are 6
8 placed in the Customer SLA Database. An example of the former could be guaranteed availability = 99.9% while an example of the latter would be premises router address = A Definition Language (see section 4.3) is used to specify the assertions in the form of a template that uses the attributes and thresholds as parameters. The contract is compiled into a graph structure that is then added to the Repository. When a contract is to be verified, the contract template is retrieved from the contract repository, and the customer specific information is retrieved from the customer SLA database. This information is then passed to Conformance. Conformance uses the information in the Dictionary to make (or retrieve) the appropriate system measures and computes the compliance with the contract. 4.2 Design of Conformance The overall structure of the Conformance Engine is shown in Figure 5. Report Generator Customer SLA Data Verification Interface Visualization Templates Repository Templates Dictionary Variable Cache Logs Measurement Plug-Ins Figure 5. Design of Conformance Objects that contain contract templates form the core of the engine. Because the same contract could be offered to multiple customers, customer-specific thresholds, bounds, and system parameters are filled in the template at contract evaluation time. This allows the templates to be shared across multiple customers. measurements are accessed through system specific measurement plug-ins. Because the plug-ins hide the details of the underlying system and the measurement protocols from Conformance, new measurements are easy to add to the system. Conformance dynamically loads measurement plug-ins as needed. To minimize measurement traffic, the state of the system is cached in the system variable cache. The cache uses a logical database view of the system, i.e., every system attribute is treated as an entry in a logical database, with the attribute name being used as the key to retrieve its current value. Properties associated with the attribute define how frequently the value is updated in the cache, which parameters are needed to obtain the measurement value, and which measurement plug-in is responsible for obtaining the attribute value. The cache can also store measurement history if needed to compute aggregate values (e.g., time averages) if they are not directly available from the underlying measurement system. When a customer request is received at the verification interface, the following steps occur: 1. The customer specific data is retrieved from the customer SLA database and inserted in the contract templates. 7
9 2. The actual system attribute 1 values are obtained from the system variable cache. If the cached values are stale, measurement plug-ins are used to update the cache before the values are returned. 3. The contract is evaluated by computing the values of the assertions defined in the contract using the attribute values and customer-specific parameters, thresholds and bounds. 4. The compliance results are logged and communicated either programmatically by the verification interface, or through reports generated by the report generator. The reports are typically customized for each customer. The report generator uses the Visualization Templates to create reports. 4.3 Definition Language s can be defined using a formal language such as UML [11]. Other system modeling languages used in CIM [12] and Webm [13] can also be used to describe and collect management data using multiple heterogeneous sources of data such as SNMP, CMIP, DMI, etc. In our implementation, we assume that these data collection mechanisms can be captured in one or more measurement plug-ins and the system attributes can be derived from those measurements. Since we did not need the complexity enabled by UML, we used a declarative language with syntax similar to the C language. A partial description of the grammar used is shown below: : DeclarationList AssertionList [ FilterList ] Declaration : Name Name Variable Type Declarations Assertion : PredicateList AssertionLabel : Predicate Predicate : Assertion expression if (expression) Predicate [else Predicate] expression : unary and binary C expressions; constants; and identifiers identifier: system attribute name, user variable, constant, AssertionLabel Filter Event EventName FilterDescription EventValue Status StatusVariable FilterDescription FilterDescription : expression if(expression) expression [else expression] EventValue : expression if(expression) expression [else expression] Declarations contain meta-information about the contract as well as type specifications for variables used in the contract. The value of the contract is the logical AND of all assertion values. Assertions may optionally be given a label. If an assertion is labeled, it may be verified (computed) independently of the contract within which it resides. In addition, other assertions may refer to its value using its label. Assertions consist of predicates, which are logical expressions formed using system attributes, customer dependent variables, constants, and arithmetic and logical operators. attributes and customer dependent variables are set by the measurement plug-ins and the verification interface respectively, and are thus treated as read-only within the language. Filters can be associated with a contract. Filters may be used to compute various kinds of status information (e.g., expected time to repair, trouble ticket information, etc.) about the contract and/or generate events (e.g., notify operators when a contract is not met) when certain conditions are met. Filters and events are defined using a syntax similar to assertions, and can use any of the variables defined as part of the contract. 1 We use system attributes and system measurements interchangeably. attributes are abstract or derived measurements computed from element level measurements. Examples are service availability, response time, thruput, utilization, etc. 8
10 5 Experience using Conformance We have tested the Conformance prototype using live measurement data we are collecting from the various XIWT member sites and a large ISP. Figure 6 shows the experimental setup. The ISP (a large national ISP) monitors its network, the various servers that compose its service, and the POP (Point of Presence) sites using active and passive measurements. The measurement data is pushed by the ISP to a measurement station outside the HP firewall. Available measurements include availability and response time measurements from DNS, POP sites, mail servers, and NFS. In addition, measurement stations at HP and several partner sites make periodic network delay and packet-loss measurements by pinging one another. Measurement data is pulled through the HP firewall as shown by measurement-specific plug-ins. In our example scenario, we assumed that the following metrics are specified in the service level agreement of interest: Availability service is expected to be available 99% of the time as measured over any day. The network is available 99.9% of the time between 8:00 AM and 5:00 PM. Performance performance is characterized in terms of a) response time < 2.5 seconds when an employee retrieves mail. Network performance is measured by a) round-trip delay < 150 ms and b) packet loss rate < 5% when averaged over daily intervals. Utilization The ISP is expected to reserve sufficient capacity at its POP (Point of Presence) so that employees are not denied access to the service. The ISP is expected to create daily, weekly, and monthly reports on the overall service compliance and the individual service level metric values. POP3 Servers Server Farm DNS Servers Measurement Station at HP HP Firewall Conformance NFS Servers Mailfeps Auth. Server Measurement Station ISP Firewall Internet Web Browser Measurement Stations at Partner Sites POP POP POP POP Figure 6. Example Scenario We now discuss the details of how the service is modeled and how the contract for service is monitored. We have constructed similar contracts for the network access services. Availability Response Time Mail Utilization POP m Availability POPm Dialup Availability Response Time MailFEP i Thruput Delay Terminal Server i POP m Authentication Mail Authentication MailFEP i Authentication MailFEP i NFS Client authentication measures for MailFEP i (Availability, Performance) Performance RM MailFEP i POP3 Server Availability TACAC i Figure 7 Model 9
11 Figure 7. shows a part of the service model for the service provided by the ISP. The model is represented as a dependency graph with measurements (indicated by arrows) associated with each node in the graph. The measurements may be made directly (using active tests or passive monitoring) or may be derived from measurements made at other nodes. For example, mail service availability is derived using availability measurements from the POP m Dialup and the MailFEP i. These in turn depend on the availability of the Authentication, Terminal Server i, MailFEP i Authentication, and so on 2. The service contract is comprised of two service components: the access component (describing the POP and its associated components) and the mail subsystem (describing the mail server and its associated components). A partial description of the contract written in CDL is shown below /* Hosting contract template */ _; _; %% /* POP metrics in SLA- availability, delay, thruput, utilization */ ISP_Access: { %popavailability($popname, ) > $minpopavailability; %popavgdelay($popname, ) < $maxpopdelay; %popthruput($popname, ) > $minpopthruput; %poputilization($dialinserver, ) < $maxpoputilization; } /* Test Mail subsystem for availability and response times*/ Mail_: { %mailavailability($mailserver, ) > $minmailavailability; %mailresponsetime($mailserver, ) < $maxmailresponsetime; } In the contract, %name is used as a notation to identify system attributes and $name is used to identify customer-dependent parameters to be filled in from the SLA database at the time of the evaluation. The customer parameters define both thresholds (e.g., $minpopthruput) as well as parameters necessary for the measurement system (e.g., $mailserver). Thus, the ISP can check if the service is meeting SLAs for different customers by filling in the customer specific thresholds (e.g., $minmailavailability = 99%) and system parameters (e.g., $popname = Atlanta ). Figure 8 shows a sample report generated by Conformance for the service contract on a day when problems occurred in the service. This gives the status for the last 24 hours. The aggregate view pie chart shows the percentage of time the contract was compliant vs. non-compliant over the last day. An hourly behavior of the contract is shown in the bar chart, and the compliance percentage for each service component is shown in the ISP Access, and Mail pie charts. Following other history and detail links gives a historical view of the service, and how the service components are behaving over time. The report contents and frequencies can be customized depending on what has been agreed upon in the SLA between the provider and the customer. We have generated similar reports for network access using measurements of both inbound and outbound traffic. In our experience, Conformance scales well. The hierarchical architecture allows domains to be loosely coupled. In addition, because inter-domain interaction takes place using the web, it is easy to replicate Conformance over multiple web servers and share measurement and compliance data using existing servers in the different domains. Finally, because the details of the measurements are hidden from Conformance by the measurement plug-ins, it is easy to add new measurements and couple to different management and measurement systems. 2 Note that only a small part of the service model is shown in the figure. The leaf nodes on the graph are other services, which have their own service models and associated measurements. 10
12 We have found our current implementation of the CDL be sufficient for most SLAs we have encountered. Although the CDL only provides Boolean values for contract compliance, filters defined in contracts can provide multi-valued status information (e.g., warning, critical etc.) prior to the contract being violated. Our current CDL implementation does not support arrays. This causes the system specification in the Dictionary to become complex for large environments where multiple instances of the same component exist. We are extending our CDL to support arrays to simplify system specification. We believe that both arrays and database support are necessary for a large-scale system. 6 Summary Figure 8: Example of a contract compliance report Internet services such as e-commerce, web hosting, application hosting, etc., require cooperation and internetworking between multiple organizations, systems and entities while maintaining the confidentiality and privacy of management data considered proprietary by each organization. Currently there are no standard mechanisms to share selective management information between the various service providers. These mechanisms are needed to aid in management and diagnosis of end-to-end services. In particular, service providers are using service level agreements as a means of specifying service level attributes that are offered to their partners and customers. This implies that it is necessary to develop tools and techniques to monitor whether providers are meeting their service level obligations, and to enable providers to manage their infrastructure to those agreements. In this paper we describe an architecture to share selective management information across multiple business entities. The architecture can be used for automatically measuring, monitoring, verifying, and managing service level agreements for Internet services. The architecture allows specification of attributes that are quantifiable and measurable in a service contract. This allows a service provider to offer verifiable and meaningful service behavior to their customers. Providers can offer customers the capability to automatically verify the current service behavior against the guarantees, by exposing the values of service parameters as agreed upon in the contract. 11
13 We also described the design and implementation of Conformance, a prototype implementation of this architecture. Conformance is web-based, i.e., uses the standard HTTP protocol, to allow easy inter-domain communication. It isolates the abstractions used in the service level agreements from the details of the service implementation, thus allowing management information to be shared across domain boundaries while hiding the system implementation details. We have used our implementation to demonstrate how service providers can offer SLA monitoring capabilities to their customers for a number of services including and network access services. 7 References 1. Bhoj, P., Caswell, D., Chutani, S., Gopal, G., Kosarchyn, M. (1997) Management of new federated services. Integrated Network Management V. 2. Thaler, D., Ravishankar, C. An Architecure for Inter-Domain Troubleshooting. ICCCN Roscheisen, M., Winograd, Terry. (1997) The FIRM Framework for Interoperable Rights Management. Forum on Technology-based Intellectual Property Management. 4. Lewis, D., Bjerring, L., Thorarensen, I. (1996) An Inter-domain Virtual Private Network Management. IEEE/IFIP Network Operations and Management Symposium (NOMS) Kong, Q., Chen, G., Hussain, R. (1998) A Management Framework for Internet s. IEEE. 6. Irodosek, G., Kaiser, T. (1997) Determining the Availability of Distributed Applications. Integrated Network Management V. 7. Infovista&trade Corp., 8. Micromuse, Inc VitalSigns Software, Inc Concord Corp Unified Modeling Language (UML) Common Information Model (CIM) Wbem 12
Business Application Services Testing
Business Application Services Testing Curriculum Structure Course name Duration(days) Express 2 Testing Concept and methodologies 3 Introduction to Performance Testing 3 Web Testing 2 QTP 5 SQL 5 Load
Integration of Nagios monitoring tools with IBM's solutions
Integration of Nagios monitoring tools with IBM's solutions Wojciech Kocjan IBM Corporation [email protected] 1 Agenda Introduction Integration bottlenecks Why open standards? CIM and WBEM Open
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,
Web-based Internet/Intranet Service Management with QoS Support
Special Issue on New Paradigms in Network Management Web-based Internet/Intranet Service Management with QoS Support Jong-Tae Park and Jong-Wook Baek School of Electronic and Electrical Engineering Kyungpook
Chapter 18. Network Management Basics
Network Management Basics > FCAPS Model Chapter 18. Network Management Basics This chapter covers the following topics: FCAPS Model Network Management Architecture Network Management Protocols An Introduction
Service Virtualization: Managing Change in a Service-Oriented Architecture
Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual
How To Understand The History Of The Network And Network (Networking) In A Network (Network) (Netnet) (Network And Network) (Dns) (Wired) (Lannet) And (Network Network)
COMPUTER NETWORKS LECTURES DR.PETER G. GYARMATI Research professor Lectures of P. G. Gyarmati 1. page 1999.-2006. 1999.-2006. This page is intentionally left blank Lectures of P. G. Gyarmati 2. page 1999.-2006.
Heterogeneous Tools for Heterogeneous Network Management with WBEM
Heterogeneous Tools for Heterogeneous Network Management with WBEM Kenneth Carey & Fergus O Reilly Adaptive Wireless Systems Group Department of Electronic Engineering Cork Institute of Technology, Cork,
DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices. Technical White Paper. April 2014
DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices Technical White Paper April 2014 DDL Systems, Inc. PO Box 1262 Valparaiso, IN 46384 Phone: 866 559-0800 Introduction
WHITE PAPER September 2012. CA Nimsoft For Network Monitoring
WHITE PAPER September 2012 CA Nimsoft For Network Monitoring Table of Contents EXECUTIVE SUMMARY 3 Solution overview 3 CA Nimsoft Monitor specialized probes 3 Network and application connectivity probe
Product Summary RADIUS Servers
Configuration Guide for Cisco Secure ACS with 802.1x Authentication for Avaya 3631 Wireless Telephone This document details how to configure the Cisco Secure ACS (Access Control Server) v3.3 with 802.1x
Research on the Model of Enterprise Application Integration with Web Services
Research on the Model of Enterprise Integration with Web Services XIN JIN School of Information, Central University of Finance& Economics, Beijing, 100081 China Abstract: - In order to improve business
Lecture 5: Foundation of Network Management
Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
AquaLogic Service Bus
AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
TNT SOFTWARE White Paper Series
TNT SOFTWARE White Paper Series Event Log Monitor White Paper: Architecture T N T Software www.tntsoftware.com TNT SOFTWARE Event Log Monitor Architecture 2000 TNT Software All Rights Reserved 1308 NE
Web Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
APPENDIX 8 TO SCHEDULE 3.3
EHIBIT Q to Amendment No. 60 - APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT EHIBIT Q to Amendment No.
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses
Service Level Agreements based on Business Process Modeling
Service Level Agreements based on Business Process Modeling Holger Schmidt Munich Network Management Team University of Munich, Dept. of CS Oettingenstr. 67, 80538 Munich, Germany Email: [email protected]
ManageEngine (division of ZOHO Corporation) www.manageengine.com. Infrastructure Management Solution (IMS)
ManageEngine (division of ZOHO Corporation) www.manageengine.com Infrastructure Management Solution (IMS) Contents Primer on IM (Infrastructure Management)... 3 What is Infrastructure Management?... 3
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot
XpoLog Center Suite Log Management & Analysis platform
XpoLog Center Suite Log Management & Analysis platform Summary: 1. End to End data management collects and indexes data in any format from any machine / device in the environment. 2. Logs Monitoring -
Kaseya Traverse. Kaseya Product Brief. Predictive SLA Management and Monitoring. Kaseya Traverse. Service Containers and Views
Kaseya Product Brief Kaseya Traverse Predictive SLA Management and Monitoring Kaseya Traverse Traverse is a breakthrough cloud and service-level monitoring solution that provides real time visibility into
TimePictra Release 10.0
DATA SHEET Release 100 Next Generation Synchronization System Key Features Web-based multi-tier software architecture Comprehensive FCAPS management functions Software options for advanced FCAPS features
WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks
WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management for Networks 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT FOR NETWORKS ca.com Table of Contents Solution Overview 3 Specialized Probes
HP OpenView Operations 7.x for Windows. Firewall Configuration white paper. Version 2.2. Publication Date: 08/2003
HP OpenView Operations 7.x for Windows Firewall Configuration white paper Version 2.2 Publication Date: 08/2003 Warranty Information The information contained in this document is subject to change without
Stateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
Integrating HP Insight Management WBEM (WMI) Providers for Windows with HP System Insight Manager
Integrating HP Insight Management WBEM (WMI) Providers for Windows with HP System Insight Manager Integration note, 4 th edition Introduction... 2 Utilizing HP WBEM Providers for Windows... 2 Security...
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
Whitepaper. Business Service monitoring approach
Whitepaper on Business Service monitoring approach - Harish Jadhav Page 1 of 15 Copyright Copyright 2013 Tecknodreams Software Consulting Pvt. Ltd. All Rights Reserved. Restricted Rights Legend This document
Company & Solution Profile
Company & Solution Profile About Us NMSWorks Software Limited is an information technology company specializing in developing Carrier grade Integrated Network Management Solutions for the emerging convergent
Building Your Firewall Rulebase Lance Spitzner Last Modified: January 26, 2000
Building Your Firewall Rulebase Lance Spitzner Last Modified: January 26, 2000 Building a solid rulebase is a critical, if not the most critical, step in implementing a successful and secure firewall.
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
GLOBAL SERVER LOAD BALANCING WITH SERVERIRON
APPLICATION NOTE GLOBAL SERVER LOAD BALANCING WITH SERVERIRON Growing Global Simply by connecting to the Internet, local businesses transform themselves into global ebusiness enterprises that span the
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
Information Technology Security Guideline. Network Security Zoning
Information Technology Security Guideline Network Security Zoning Design Considerations for Placement of s within Zones ITSG-38 This page intentionally left blank. Foreword The Network Security Zoning
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
zen Platform technical white paper
zen Platform technical white paper The zen Platform as Strategic Business Platform The increasing use of application servers as standard paradigm for the development of business critical applications meant
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
HP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
Cisco Change Management: Best Practices White Paper
Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Using WebLOAD to Monitor Your Production Environment
Using WebLOAD to Monitor Your Production Environment Your pre launch performance test scripts can be reused for post launch monitoring to verify application performance. This reuse can save time, money
APPENDIX 8 TO SCHEDULE 3.3
APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE
A technical guide for monitoring Adobe LiveCycle ES deployments
Technical Guide A technical guide for monitoring Adobe LiveCycle ES deployments Table of contents 1 Section 1: LiveCycle ES system monitoring 4 Section 2: Internal LiveCycle ES monitoring 5 Section 3:
RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009
Systems Development Proposal Scott Klarman March 15, 2009 Systems Development Proposal Page 2 Planning Objective: RAS Associates will be working to acquire a second location in Detroit to add to their
VMware vcenter Operations Manager Enterprise Administration Guide
VMware vcenter Operations Manager Enterprise Administration Guide vcenter Operations Manager Enterprise 5.0 This document supports the version of each product listed and supports all subsequent versions
TR-304 Broadband Access Service Attributes and Performance Metrics
TECHNICAL REPORT TR-304 Broadband Access Service Attributes and Performance Metrics Issue: 1 Issue Date: February 2015 The Broadband Forum. All rights reserved. Notice The Broadband Forum is a non-profit
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for
Managing a Fibre Channel Storage Area Network
Managing a Fibre Channel Storage Area Network Storage Network Management Working Group for Fibre Channel (SNMWG-FC) November 20, 1998 Editor: Steven Wilson Abstract This white paper describes the typical
Windows Geo-Clustering: SQL Server
Windows Geo-Clustering: SQL Server Edwin Sarmiento, Microsoft SQL Server MVP, Microsoft Certified Master Contents Introduction... 3 The Business Need for Geo-Clustering... 3 Single-location Clustering
Conquering the Challenges of IP Network Management with DHCP and DNS
Conquering the Challenges of IP Network Management with DHCP and DNS A white paper by Incognito Software 2006 Incognito Software Inc. All rights reserved. Page 1 of 9 Conquering the Challenges of IP Network
The Bomgar Appliance in the Network
The Bomgar Appliance in the Network The architecture of the Bomgar application environment relies on the Bomgar Appliance as a centralized routing point for all communications between application components.
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13
Contents I Part I About This Guide 1 Part II Overview 2 Part III Installation & Deployment 4 1 Installation... with Setup 5 2 Management... Console 6 3 Configuration... 7 4 Remote... Update 10 Part IV
Deploying ACLs to Manage Network Security
PowerConnect Application Note #3 November 2003 Deploying ACLs to Manage Network Security This Application Note relates to the following Dell PowerConnect products: PowerConnect 33xx Abstract With new system
Deploying Layered Email Security. What is Layered Email Security?
Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review
Service-Oriented Architectures
Architectures Computing & 2009-11-06 Architectures Computing & SERVICE-ORIENTED COMPUTING (SOC) A new computing paradigm revolving around the concept of software as a service Assumes that entire systems
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye
Best of Breed of an ITIL based IT Monitoring The System Management strategy of NetEye by Georg Kostner 5/11/2012 1 IT Services and IT Service Management IT Services means provisioning of added value for
A Web-Based Real-Time Traffic Monitoring Scheme Using CORBA
A Web-Based Real-Time Traffic Monitoring Scheme Using CORBA Yuming Jiang, Chen-Khong Tham, Chi-Chung Ko Department of Electrical Engineering, National University of Singapore, 10 Kent Ridge Crescent, Singapore
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
OpenAM. 1 open source 1 community experience distilled. Single Sign-On (SSO) tool for securing your web. applications in a fast and easy way
OpenAM Written and tested with OpenAM Snapshot 9 the Single Sign-On (SSO) tool for securing your web applications in a fast and easy way Indira Thangasamy [ PUBLISHING 1 open source 1 community experience
Figure 1: Illustration of service management conceptual framework
Dagstuhl Seminar on Service-Oriented Computing Session Summary Service Management Asit Dan, IBM Participants of the Core Group Luciano Baresi, Politecnico di Milano Asit Dan, IBM (Session Lead) Martin
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
Fundamentals of Windows Server 2008 Network and Applications Infrastructure
Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure
Violin Symphony Abstract
Violin Symphony Abstract This white paper illustrates how Violin Symphony provides a simple, unified experience for managing multiple Violin Memory Arrays. Symphony facilitates scale-out deployment of
Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7. Product Application Guide October 8, 2012
Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7 Product Application Guide October 8, 2012 Table of Contents Introduction...3 Definitions and Abbreviations...3 GroundWork
Introduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
Networking Security IP packet security
Networking Security IP packet security Networking Security IP packet security Copyright International Business Machines Corporation 1998,2000. All rights reserved. US Government Users Restricted Rights
HP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
Application Note. Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1.
Application Note Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1.0 Page 1 Controlling Access to Large Numbers of Networks Devices to
Uptime Infrastructure Monitor Whitepaper THE TRUTH ABOUT AGENT VS. AGENTLESS MONITORING. A Short Guide to Choosing the Right Monitoring Solution.
Uptime Infrastructure Monitor Whitepaper THE TRUTH ABOUT AGENT VS. AGENTLESS MONITORING A Short Guide to Choosing the Right Monitoring Solution. When selecting an enterprise-level IT monitoring solution,
The Ecosystem of Computer Networks. Ripe 46 Amsterdam, The Netherlands
The Ecosystem of Computer Networks Ripe 46 Amsterdam, The Netherlands Silvia Veronese NetworkPhysics.com [email protected] September 2003 1 Agenda Today s IT challenges Introduction to Network
Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.
Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component
Configuring and Managing Token Ring Switches Using Cisco s Network Management Products
Configuring and Managing Token Ring Switches Using Cisco s Network Management Products CHAPTER 12 Cisco offers several network management applications that you can use to manage your Catalyst Token Ring
WHITE PAPER September 2012. CA Nimsoft Monitor for Servers
WHITE PAPER September 2012 CA Nimsoft Monitor for Servers Table of Contents CA Nimsoft Monitor for servers 3 solution overview CA Nimsoft Monitor service-centric 5 server monitoring CA Nimsoft Monitor
ORACLE MOBILE SUITE. Complete Mobile Development Solution. Cross Device Solution. Shared Services Infrastructure for Mobility
ORACLE MOBILE SUITE COMPLETE MOBILE DEVELOPMENT AND DEPLOYMENT PLATFORM KEY FEATURES Productivity boosting mobile development framework Cross device/os deployment Lightweight and robust enterprise service
pc resource monitoring and performance advisor
pc resource monitoring and performance advisor application note www.hp.com/go/desktops Overview HP Toptools is a modular web-based device management tool that provides dynamic information about HP hardware
Module 6. Configuring and Troubleshooting Routing and Remote Access. Contents:
Configuring and Troubleshooting Routing and Remote Access 6-1 Module 6 Configuring and Troubleshooting Routing and Remote Access Contents: Lesson 1: Configuring Network Access 6-3 Lesson 2: Configuring
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
Coveo Platform 7.0. Microsoft Dynamics CRM Connector Guide
Coveo Platform 7.0 Microsoft Dynamics CRM Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing
Lecture 19: Web Based Management
Lecture 19: Web Based Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 19-1 Using the Web for Management Web browser UI connects with the management
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
IBM Bluemix. The Digital Innovation Platform. Simon Moser ([email protected]) @mosersd
IBM Bluemix The Digital Innovation Platform Simon Moser ([email protected]) @mosersd Who am I? - Senior Technical Staff Member at IBM Research & Development Lab in Böblingen, Germany - Bluemix Application
GFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is"
PATROL Internet Server Manager Technical Brief
PATROL Internet Server Manager Technical Brief Contents Why Manage Web Applications?...1 What Is PATROL?...1 The PATROL Agent...2 PATROL Knowledge Modules...2 The PATROL Console...2 PATROL Internet Server
