Supporting views in network management systems
|
|
|
- Jodie Bates
- 10 years ago
- Views:
Transcription
1 Supporting views in network management systems Carlos Palma and Luis Rodrigues Rural Informática, SA, Damaia and Departamento de Informática, Faculdade de Ciências, Universidade de Lisboa, Lisboa In network management systems, a view represents a subset of the management domain tailored to a specific activity or management role. The support for views is extremely relevant in large-scale management systems where it becomes infeasible to centralize all the management information. The paper proposes a model that recognizes the importance and provides support for the coexistence of different management views of a large set of entities. A prototype following the proposed model has been implemented as a set of extensions to the open source Scotty platform. Keywords: Network management, view support, event propagation Introduction The vast majority of current management systems provide the tools needed to describe the set of network components as well as their attributes. However, in a system with a large number of components it becomes infeasible to manage a flat space of components. Therefore, it is extremely important to aggregate components in views that represent different management domains. This paper proposes a model to support the representation of complex networks in management systems. The model, that distinguishes the representation of individual components from the representation of the relationships among these components, is based on a two level architecture: The component level: At this level each network component is described individually. The view level: The view level defines the relationships among components that are specific to a particular management activity. At this level one defines also which attributes of the component are visible in the context of the view. In order to manage and monitor a system, one or more views need to be activated. The management system must ensure that the information provided to different managers is consistent, even if they interact with different views. This is ensured via the two-level architecture: changes in the managed objects are registered at the component level and then reflected at all relevant views. The model also proposes a flexible event propagation mechanism. Event propagation is performed not only within a view but also across different views. Event propagation is used both to apply operations to groups of components and to notify the users of relevant occurrences. A prototype of a system implementing the proposed model has been developed as a Tcl extension to the Scotty platform [SL95]. The paper is organized as follows. In Section 2 we motivate the need for the view support in management systems and Section 3 briefly introduces related work. The proposed model is described in Section 4 and its implementation in Tcl introduced in Section 5. An evaluation of the model is given in Section 6 and Section 7 concludes the paper. Selected portions of this report have been published in the Proceedings of the IFIP/IEEE 2th International Workshop on Distributed Systems: Operations & Management, October, , Nancy, France.
2 2 Carlos Palma and Luis Rodrigues 2 Motivation Any complex system includes a large number of network components such as computers, devices, applications, etc. Each of these components is characterized by a set of attributes that need to be accessed in the course of management activities. However, most of management activities do not need to access all attributes of each component nor the complete set of managed components. The excess of non-relevant information in a given interface may even be detrimental to the efficiency and security of the management activities. Therefore, it is extremely important to define different views of the managed system. Each view is created having a specific activity or role in mind, and should include only the objects (and attributes) relevant for that activity. Consider for instance a system with machines (running a combination of Linux and some proprietary operation system) physically located in different rooms and connected to different LAN segments. For certain activities it is interesting to organize a view of the system according to the geographical deployment of the machines, with an indication of identifier and operating system. For other activities, it is more useful to present the view according to the LAN segments and showing only the machines that run a specific operating system. Therefore, the management system should allow to express these different relations among the management components. The notion of view addresses this need. The view is an abstraction that allows to aggregate and make visible the representation of the managed components that belong to a particular context. Additionally, the view filters the component attributes and behavior, such that only the properties that are relevant in the context of the view are shown to the user. Using a view, the user interface is simplified, since all the information that is non-relevant for a specific management activity may be hidden from the operator. Furthermore, the view can also be used a mechanism to control the access to sensible information, improving the security of the management system. 3 Related work The need for structuring and grouping the managed objects has been present from the beginning in network management platforms. Therefore, most network management systems include some form of representation mechanism. One can distinguish two main classes of network management systems: systems whose elementary unit is the component attribute and systems whose elementary unit is the network component. The first class of approaches considers that each individual attribute is a basic unit of management. Network elements are defined as groups of attributes. It is also possible to create components that mix attributes from several distinct physical devices and that have no direct mapping to concrete network components. We can cite two main examples of this approach: the SNMPQL [Yeo90] that represents the network and a set of relational tables that can be accessed using SQL and the approach described in [KSSZ97] where the network is represented as a spreadsheet. Using these approaches it is difficult to support effectively event propagation and handling mechanisms. A similar approach has been described in [Gol96], where extensions to the SNMP-SMI support the creation of MIB views in an agent. The creation of views is supported trough relational operations (joins, filtering, etc) on SNMP table using a SQL like language. However, these views are restricted to a single MIB. Most of the existing commercial and open source network management system fit into the second category. Our model and implementation can also be classified in this class. Representative examples are the Tkined/Scotty [SL93], the Domains system [SM89, MS93], the CA Unicenter [Ass], and the HP Openview [Pac]. In is interesting to note that the last two commercial systems, despite their strong penetration in the market, do not satisfactorily address the issues addressed by our proposal. The CA Unicenter distinguishes the object model from the topology model. The topology model is concerned with the relations among objects and, to a certain extent, supports the definition of different perspectives of the managed network. The HP Openview also makes a distinction between the representation of the managed objects and its presentation: the same object may be presented using different icons; icons can be grouped in maps that can be linked in a hierarchical manner. However, in both cases, there is no support to refine the presentation of a given object in a view sensitive manner: if an attribute is visible in a view it must be necessarily visible in all views. Both our proposal and the previous examples can be
3 Supporting views in network management systems 3 considered as different application of the Model-View-Controller design pattern [BMHRS96] to network management tools. 4 Model In this section we present a model for the implementation of the view abstraction. Our model intends to combine flexibility, in the sense that the same set of managed objects can be represented in many different views, with the consistency of information provided across views. For instance, if two operators are monitoring the same component using two distinct views and the component changes its status due to an action executed in the context on a view, this change of status should also be visible in the other views. 4. Basic elements The model proposed here uses a composition of the following basic elements: core-elements, links, elements, groups, maps (a map represents a management view), and repositories. A core-element represents a concrete managed object. Typically, it represents a network component (physical or logical) such as a node or a process. Each managed object is represented by a single core-element, no matter in how many maps it is included. The core-element component encapsulates the complete set of attributes and behavior of the managed object. An element represents a core-element in a specific map. Therefore, the element may restrict the number of attributes that are visible and the behavior of the managed object in the context of that map. Note that a single managed object, represented by a core-element, can be associated with multiple elements. A link represents a physical or logical connection among two managed objects in a given context. Therefore, a link connects elements or groups of the same map. A group aggregates elements and other groups allowing to hierarchically structure the map. The group can be used to merely aggregate elements that are logically related or to create a composite component from other components. A map, that represents a management view, is a set of groups, elements and links that together represent a concrete management context. It is possible to associate global constraints that restrict the type of information from the core-elements that can be visible in the map. Note that constraints cannot associated with groups. A repository is a persistent representation of the relevant state of the previous elements. The repository contains the characterization of a set of core-elements and the description of all the maps (with associated elements, links and groups). 4.2 Attributes Each element of our model is characterized by a set of attributes and methods, as described below. An attribute is a variable that represents a property of the managed object. Attributes are simply numbers or strings. The attributes can be used to store management information, parameters that define the way a component is tested and monitored, information required for network access, temporary data resulting from monitoring activities, etc. Some of the attributes can be used to uniquely identify the managed object, such as, for instance, a MAC address or a serial number. The methods define management activities (in our concrete implementation, a management script). These scripts can be executed periodically or only when explicitly invoked (when the attributes are accessed). The methods can be used to return values that are obtained by applying some function to a set of simpler attributes. The methods can also invoke some management protocol to interact with the concrete devices.
4 4 Carlos Palma and Luis Rodrigues Link Group Map Element Repository Management perspective Managed objects perspective Core-Element 4.3 Relationships Fig. : Proposed object model The basic entities of our model may have the following relationships, as illustrated in Figure. A core-element can have one or more attributes and methods. A core-element also maintains a reference to all of its elements. Therefore, the core-element is able to propagate an event created in the context of a given map to all maps to which it belongs. An element maintains a reference to the core-element it represents, a reference to the group in which it is contained and references to all its associated links. All the attributes that describe the state of the managed object are not maintained at the element level; they are always maintained at the level of core-elements to ensure the consistency of information to be provided across different views. Note that not all core-element attributes are visible in every element, since each view defines constraints on the attributes that are visible through the elements of that view. Remember also that each core-element can be identified by the value of some relevant attribute of the managed object that it represents (for instance, a serial number). This unique identifier will be visible in all maps in which the object is represented. A link can have one or more attributes and methods, and references to the elements that it connects. A group can have one or more attributes and methods. A group has a reference to the upper group (or to the map, if it is the root group) and a set of references to all groups, links and elements that it contains. Finally, a map can also have one or more attributes and methods and a reference to a root group. 4.4 Constraints By default, an element represents all attributes and methods of the associated core-element. However, our model foresees the possibility of defining restrictions to the set of attributes visible in a map by defining
5 Supporting views in network management systems 5 Event 2 S6 S4 S5 Event V V G G2 G G2 S S3 S2 S7 G3 G3 S8 S9 S0 S Event 4 S2 S3 V2 V2 G4 G4 S4 S5 S7 S6 Event 3 C C2 C3 C4 C5 C6 C7 C8 C9 C0 C Caption: Map Group Element Link Core-Element Border between levels. Fig. 2: Event propagation example constraints at the map level. Constraints can also restrict the propagation of events. As we have noted previously, these constraints may simplify the management activities and improve the security of the management system. 4.5 Filters Filters are intended as a mechanism to automate and simplify the creation of maps. A filter is a constraint on the characteristics of the core-elements that may belong to a given map. After specifying a filter, one can request the creation of an implicit map, a map that contains all managed objects with the characteristics defined in the filter of the map. The map designer can later can aggregate the resulting elements in groups and link them in different ways. However, she is not allowed to create elements additional in an implicit map. Therefore, the model support two different alternatives to create views: implicit maps, whose content is specified by the filter, and explicit maps, whose elements are added explicitly, one by one, by the view designer. Explicit maps give more configuration possibilities to the map designer but also require a greater deal of effort to define. 4.6 Event model In order to model the behavior of the components, our architecture defines an event processing and propagation model. Events are typed and can be propagated among the objects of active maps according to different policies. Event handlers can be defined at the level of individual components (core-elements, groups, elements, etc). Therefore, it is possible to have fine-grain control on how the events are processed at each level of the hierarchy. There are two main classes of events: internal events and external events. Internal events are raised automatically when there is a change in any component of a repository, such as changes in attributes or addition/removal of elements. Internal events are not propagated and must be processed by the handler associated with the affected group. One of the main goals of using internal events is to trigger the execution of scripts that check the consistency of the components that belong to the repository. For instance, the event
6 6 Carlos Palma and Luis Rodrigues that is triggered whenever a new element is inserted in a view, can be used to if it has the attributes required for that view. External events reflect events associated with one or more managed objects. External events can be propagated within a map and across all maps of a repository. There are three sub-classes of external events that reflect different policies for event propagation, namely: ascendant events, descendant events, and lateral events. Ascendant events are propagated upwards in the group hierarchy defined by the map in which they occur. At each hop, the reception of the event may trigger an appropriate handler. The handler may consume the event (which is not propagated further) or forward the event to the next level after processing. In any case, the propagation of an ascendant event terminates at the map element. Ascendent events can be used to specialize or generalize the processing of specific occurrences: the event can be processed by some specialized handler associated with the element or be propagated upwards and be processed by a global handler that handles all events generated by the lower layers. Descendant events are similar to ascendant events except that they are propagated in the opposite direction, from the group in which the event was raised downwards until a core-element is reached. In the core-element, the descendant event can raise a set of ascendant events in all elements representing that coreelement in different maps. This mechanism eases the task of applying some script to all elements included in a given hierarchy. Additionally, this mechanism supports the propagation of events across maps. Finally, lateral events are propagated across the links that connect the elements of a map. Since these links may form cycles, the event propagation is limited to a configured maximum number of hops. This mechanism can be used to correlate events. For instance, one can correlate the failure of a components to the failure of other objects connected to that component through the propagation of failure notifications through the established connections. Figure 2 illustrates the event propagation policies defined in our event model. The occurrence of Event at the element S can result in the following sequence of events, depending on the event sub-class: If the event is ascendant, it will be handled at the level of the element S, propagated to the group G and, possibly, further propagated and handled in the map V. Note that for many events, a generic handler can be defined at the top level, in the map component. In such case the event is simply propagated to the root and processed there. However, the architecture supports the definition of more specific context-dependent handlers in the lower levels of the hierarchy. If the event is descendant it can be handled at the element S and later handled by the core-element C3. In the core-element the event could be propagated to the remaining elements that represents that core-element. If the event is lateral with a maximum number of hops set to, it will be only propagated to the element S3. Consider now the occurrence of a descendant event, Event 2, at the level of the map V: the event will be propagated among elements belonging to map V including the core-elements that have elements in V. Furthermore, the core-elements may raise an ascendant event that will be propagated to the elements in the map V2. The proposed model for event propagation allows: to represent in a configurable and context-sensitive manner changes in the status of managed objects, in all active maps that include a element of that core-element (ascendant events). to actuate in a large set of items without explicitly naming all the targets (descendant events). to propagate the occurrence of events to all elements that are physically or logically connected (lateral events).
7 Supporting views in network management systems 7 Repo Script Attribute Map Binding Events Messages Item Internal Events Core-Element External Events Scripted Attribute Standard Attribute Link..2 Element..2 Group Constant Attribute Persistent Attribute Non-Persistent Attribute Fig. 3: Data model of Tnm::repo Note that by defining a chain of events and handlers it is possible to model complex propagations of events as suggested in [OMKY97]. However, since our approach does not relies on defining a new language, propagation schemes based on the composition of the three basic modes have to be explicit coded in the handlers while the MODEL [OMKY97] allows these propagation policies to be expressed in a declarative fashion. 5 Implementation In order to validate experimentally our model, we have implemented a prototype as a Tcl extension to the Tnm/Scotty platform [SL95, SL93]. The Scotty platform is a open source network management system that offers a Tcl interface. This system has a large user base since it provides an open and convenient platform for the development of customized network management solutions. The Scotty platform also includes a Tcl module, the Tnm::map [Sch], that intends to support the representation of the managed system. We have opted to implement our model as an extension to the existing Tnm::map module. We have called our new Tcl module Tnm::repo. The new module preserves the functionality supported by the original Tnm::map module and implements a set of new functionality that support the model proposed in this paper, namely the support for definition of different maps and extended event propagation mechanisms. Figure 3 presents the data model of Tnm::repo. The advantages of implementing our model as an extension to the Tnm::map are twofold. To start with, it allows us to reuse much of the management scripts already available for the Tnm/Scotty platform. On the other hand, it promotes the dissemination and usage of our prototype by others. To be compliant with the terminology used in the implementation of Tnm::map, we have opted to maintain some of the terms used in the original implementation. Therefore, in the following text a repository is simply designated by the keyword repo, a map by the keyword map, a core-element by celem, a element by elem, a group by group and a link by link.
8 8 Carlos Palma and Luis Rodrigues The representation of any network is initiated with the creation of a repo object. The repo encapsulates all the celems, scripts and maps that are stored on that repository. Consider the following examples: Example. # Creating a repository set repo [Tnm::repo create -name repo] # Creating Core-Elements set pc00 [$repo create celem -name pc00] set pr00 [$repo create celem -name pr00] #defining attributes $pc00 attribute set :MachineType "pc" $pr00 attribute set :MachineType "printer" # Creating a map explicitly set map [$repo create map -name allpc] set map2 [$repo create map -name allprinters] # Creating an implicit map set map3 [$repo create map -name allelements -filter [list :MachineType!= ""]] #Creating a script #Note: the instruction "set function true" sets the return value of the script set script [$repo create script -name function -script { if { "%T" == "repo" }{ set function true } else { set function false } } #Managing attributes $repo attribute set :Global:Test "test23" set result [$repo attribute get :Global:Test] $repo attribute unset :Global:Test #defining a method $repo attribute set :Global:Var -script $script #listing repo info set myrepomaps [$repo info maps] set myrepocoreelems [$repo info celems] #removing the repository $repo destroy Each network component is represented in the management system by a single core-element (celem). This entity is responsible for storing all relevant information that describes the network component. On a celem object one can perform operations to: read and write its attributes, obtain information about the relevant relationships (which repositories and maps are associated with the celem, which are its elements, etc), as illustrated below: Example 2. #Processing of attributes $pc00 attribute set :SysType == pc set result [$pc00 attribute get :SysType] $pc00 attribute unset :Global:Test The definition of scripts at the level of the repository allows code to be reused in the handling of events and in the implementation of management tasks. The scripts are interpreted at run-time and can include wildcards (a % followed by another character) that are bound when the script is invoked. These wildcards permit to access run-time information such as: the token of the entity associated to the script (%H), type of entity associated with the script (%T), name of the attribute (%V), etc. For instance, in the script function of the previous example, the wildcard %T would be replaced in run-time by the value repo (and the script would return true). Note that these scripts need to be explicitly invoked through the attribute to which they are bound. Is is also possible to execute scripts by defining event handlers, as it will be described below. The map object supports operations such as the access to its attributes, creation of new elements (groups,
9 Supporting views in network management systems 9 elems and links), to list enclosed elements, etc: Example 3. # Creating a Element set elem00 [$map create elem set elem002 [$map2 create elem $pc00 -name pc00] $pr00 -name pr00] # Creating a group set f [$map create group -name group] # Creating a link set l [$map create link -name link] # Listing contents set listelems [$map info elems] # Removing a map $map destroy Note that the explicit creation of new elements is only allowed in explicit maps. In the implicit maps elements are created automatically using the rules defined in the filter associated with the map. The view contents is updated when the view is created or when the update parameter is explicitly invoked. As noted before, the set of attributes that are visible in a map is limited by a constraint that can be defined at the map level: Example 4. # Deny the access to the attributes of all elements in the map # whose name starts with ":Global:Private" $map configure -constraints [list deny :Global:Private] There is also a set of operations that can be performed on most items such as: reading and writing attributes, read information about the item relations (to which map they belong, etc). There are also some operations that are specific to each item. For instance, from the elements one can extract the core-element it represents; from a group we can obtain the parent group, etc. Some examples are given below: Example 5. # Associate an item to a group $item configure -group $gr # Get all elements in a group set objs [$gr info members] # Connect to items using a link $lnk configure -src $item -dst $item2 # Get the endpoints of a link set source_item [$lnk cget -src] set dest_item [$lnk cget -dst] As we have noted before, a fundamental feature of our model is the support provided for event propagation. Events are managed in three distinct phases: definition of scripts, definition of event handlers (binding scripts to events) and raising of events. When an event handler is defined, a script is bound to the event tag; such script will be executed when the event reaches the object where the handler is defined. The occurrence of an event is triggered using the raise command. The following example shows how an event handler can be defined and triggered.
10 0 Carlos Palma and Luis Rodrigues Example 6. # Creating an script set scr2 [$repo create script -name eventhandler -script { if {%T == elem } { %H attribute set:global:error True } } # Defining the handler for an event $item bind :Events:Error -script $scr2 -up # Raising an event $item raise -up :Events:Error Note that only external events can be explicitly raised. Internal events, that are bound to well known predefined names, are raised automatically by the platform. For instance, the following command is invalid: Example 7. # Invalid command, returns an error $repo raise -up :Repo:InternalEvents:CreateCelem In order to validate our model, we have implemented a number of extensions to the Tnm::map package, including: the introduction of the view component which offers the possibility of specifying constraints at the view level, the extension of the event propagation model, and the characterization of each entity through attributes and methods. The resulting Tnm::repo extension is independent of the actual method used to interact with the network components being managed. The integration of the Tnm::repo with existing network management protocols is made at the level of script definition. At this level, all the available TCL extension for network management, such as those provided by Scotty (SNMP, ICMP) or by TCL (HTTP, sockets, etc) can be used. This separation of concerns simplifies the tasks of defining the maps in an abstract manner, independently from the concrete protocols used at the device level. 6 Evaluation In order to evaluate the model proposed in this paper, we have applied the prototype to a concrete network. Additionally, we have compared the resulting management system with the systems obtained from the application of other alternative models, namely the Tnm::map and the HP OpenView, to the same network. A more detailed report of this experiment can be found in [Pal00]. The target network, depicted in Figure 4, was chosen to allow the definition of three different views of the same managed system: the view used by the managers of the MS Windows systems, the view o the Unix managers, and the view of the networking components managers. Each of these views includes different information about the target network. The view used by the managers of the Windows system must only have access to information about machines running this operating system. However, it should also have access to the location of these machines ins terms of LAN segments, default gateways, servers, etc. The view of the Unix managers is similar but covers machines running that specific OS and several particular attributes of this platform. The view of the networking infrastructure managers provides access to information about all inter-networking components (HUB, switches, routers, etc) but no specific information about how the OS of each machine is configured. Note that some components, such as the default gateways need to be included in more than one view, with different levels of detail. The advantages of our model become more clear when we try to model the target network with the other platforms: In the HP OpenView the OpenView Topology manager may be used to group the information according to different views. However, there is no way to restrict the way the object attributes are seen in the different views. The OpenView Postmaster service can also be used to implement the event model. However, the only feature that can be specialized for each view is the color of the icons used to represent the objects. On the contrary, our model allows full specialization of event handling according to the view context.
11 Supporting views in network management systems SMTP Server POP3 Server HTTP Server FTP Server PC0 PC Laser Printer pr Network ( ) Unix Server ux PC03 PC X.25 Addr: SVC: 0 (in/out) Router router WinNT Server nt SQL Server NT Domain Controller X.25 X.25 Addr: SVC: 0 (in/out) Router router PC20 PC Network 2 ( ) Unix Server ux SMTP Server POP3 Server HTTP Server FTP Server Phone Router router PC203 PC Laser Printer pr WinNT Server nt SQL Server NT Domain Controller ISDN Phone Router router Network 3 ( ) PC PC Laser Printer pr Fig. 4: Evaluation network In the Tnm::map one can present different attributes of the same object in different maps through the creation of independent maps. However, when several maps are created, the consistency of the information provided to the users of different maps is no longer ensured. To enforce the desired level of consistency, the user must create complex scripts that explicitly update all maps whenever a change occurs in any of the maps. Naturally, our prototype did not suffer from these limitations. Using tmn:repo it was possible to model the three management views, with specialized constraints and event handling procedures, without compromising the consistency of the information provided regarding the same atributes in different views. Since our prototype is based on the original tmn:map, we were able to measure the performance degradation resulting from the additional complexity required to support our abstractions [Pal00]. When doing comparative tests to measure the time needed to read or update an attribute of a single element of a map, we have observed that our implementation executes 6.5% less operations per minute than the original tmn:map. This overhead is due to the additional tests required to validate if the attribute is visible in that view. We believe that this performance degradation is perfectly acceptable when compared with the functionality gains supported by the model. 7 Conclusion The evolution of the information systems, both in terms of size and heterogeneity, has created the need for management tools that, at the same time, allow to obtain a global perspective of the complete managed system but, on the other hand, allow to define selective views tailored to specific management tasks. We have proposed and implement a new model that satisfies these new requirements. Although some of the aspects covered by our model have been addressed in an independent way in previous systems, our
12 2 Carlos Palma and Luis Rodrigues proposal has the merit of integrating old an new features in a coherent whole. The main properties of the proposed model are: A clear separation between the devices, that represent managed objects, and the entities that represent the context in which the object can be managed (this feature is supported in some commercial platforms such as HP OpenView); An event model that allows to selectively define the behavior of each component with different levels of detail (inspired in the event model offered by the Tnm::map module); Mechanisms that allow to express access control policies (included in the system Domains); The possibility of each view to define constraints on the device attributes that are visible in the view; A new and powerful set of event propagation policies (ascendant, descendant and lateral) that can be used to preserve the consistency of the information provided across multiple views. We have developed a prototype of our model as an extension to the Tnm/Scotty system and we have applied this prototype to some concrete network examples. The experience has shown that complex management structures can be represented and implemented in a much more elegant and efficient manner using a model that, as ours, offers a well defined view abstraction. References [Ass] Computer Associates. Unicenter TNG SDK Programmer s Guide. [BMHRS96] Frank Buschmann, Regine Meuniera, Peter Sommerlad Hans Rohnert, and Michael Stal. Pattern-Oriented Software Architecture, Volume : A System of Patterns. John Wiley & Son Ltd, 996. [Gol96] [KSSZ97] [MS93] [OMKY97] [Pac] G. Goldszmidt. Network management views using delegated agents. Proceedings of the 6th IBM/CAS Conference, Toronto, Canada, 996. P. Kalyanasundaram, A. Sethi, C. Sherwin, and D. Zhu. A spreadsheet-based scripting environment for SNMP J. Moffett and M. Sloman. User and mechanism views of distributed systems management. IEE/IOP/BCS Distributed Systems Engineering, 993. D. Ohsie, A. Mayer, S. Kliger, and S. Yemini. Event modeling with the model language. In Proceedings of the 997 IEEE Integrated Management, San Diego, CA, USA, 997. Hewlett Packard. [Pal00] C. Palma. Suporte para vistas em ambientes de gestão de redes. Master s thesis, Faculdade de Ciências da Universidade de Lisboa, (in Portuguese, available at ler/students/carlospalma.html ). [Sch] [SL93] [SL95] [SM89] [Yeo90] J. Schönwälder. Scotty User Manual. schoenw/scotty/. J. Schönwälder and H. Langendörfer. Ined - an application independent network editor. Technical report, Technical University of Braunschweig, Germany, 993. J. Schönwälder and H. Langendörfer. Tcl extensions for network management applications. In 3rd Tcl/Tk Workshop, Toronto, July 995. M. Sloman and J. Moffett. Domain management for distributed systems. Technical report, 989. W. Yeong. Snmp query language. Technical report, Performance Systems International Inc, 990.
NEC Express5800 Series NEC ESMPRO AlertManager User's Guide
NEC Express5800 Series NEC ESMPRO AlertManager User's Guide 7-2006 ONL-4152aN-COMMON-128-99-0606 PROPRIETARY NOTICE AND LIABILITY DISCLAIMER The information disclosed in this document, including all designs
An Object Model for Business Applications
An Object Model for Business Applications By Fred A. Cummins Electronic Data Systems Troy, Michigan [email protected] ## ## This presentation will focus on defining a model for objects--a generalized
Architectural Patterns. Layers: Pattern. Architectural Pattern Examples. Layer 3. Component 3.1. Layer 2. Component 2.1 Component 2.2.
Architectural Patterns Architectural Patterns Dr. James A. Bednar [email protected] http://homepages.inf.ed.ac.uk/jbednar Dr. David Robertson [email protected] http://www.inf.ed.ac.uk/ssp/members/dave.htm
QAME Support for Policy-Based Management of Country-wide Networks
QAME Support for Policy-Based Management of Country-wide Networks Clarissa C. Marquezan, Lisandro Z. Granville, Ricardo L. Vianna, Rodrigo S. Alves Institute of Informatics Computer Networks Group Federal
How to Keep Track of Your Network Configuration
The following paper was originally presented at the Seventh System Administration Conference (LISA 93) Monterey, California, November, 1993 How to Keep Track of Your Network Configuration J. Schonwalder
WhatsUp Gold v11 Features Overview
WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity
WHITE PAPER September 2012. CA Nimsoft For Network Monitoring
WHITE PAPER September 2012 CA Nimsoft For Network Monitoring Table of Contents EXECUTIVE SUMMARY 3 Solution overview 3 CA Nimsoft Monitor specialized probes 3 Network and application connectivity probe
How To Configure Voice Vlan On An Ip Phone
1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices
Apache Web Server Execution Tracing Using Third Eye
Apache Web Server Execution Tracing Using Third Eye Raimondas Lencevicius Alexander Ran Rahav Yairi Nokia Research Center, 5 Wayside Road, Burlington, MA 01803, USA [email protected] [email protected]
NNMi120 Network Node Manager i Software 9.x Essentials
NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,
BATTLEFIELD NETWORK APPLICATIONS OF THE SHAMAN MANAGEMENT SYSTEM
BATTLEFIELD NETWORK APPLICATIONS OF THE SHAMAN MANAGEMENT SYSTEM Adarshpal S. Sethi Dong Zhu Vasil Hnatyshin Prasanth Kokati Department of Computer and Information Sciences University of Delaware, Newark,
AXIGEN Mail Server Reporting Service
AXIGEN Mail Server Reporting Service Usage and Configuration The article describes in full details how to properly configure and use the AXIGEN reporting service, as well as the steps for integrating it
NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage
AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network
WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks
WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management for Networks 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT FOR NETWORKS ca.com Table of Contents Solution Overview 3 Specialized Probes
How To Create A Distributed Virtual Network Control System
Network Management Framework: A Distributed Virtual NOC Architecture Octavian Rusu RoEduNet Iasi Branch Iasi, Romania [email protected] Abstract Today s networks superpose multiple sets of services belonging
Configure A VoIP Network
Configure A VoIP Network Prof. Mr. Altaf. I. Darvadiya Electronics & Communication C.U.Shah College of Engg. & Tech. Wadhwan(363030), India e-mail: [email protected] Ms. Zarna M. Gohil Electronics & Communication
Virtual LANs. http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/ Raj Jain
Virtual LANs Professor of Computer and Information Sciences Please download and print the handouts from: http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/
How To Write A Composition Engine In A Microsoft Ip System
Service composition in IMS using Java EE SIP servlet containers Torsten Dinsing, Göran AP Eriksson, Ioannis Fikouras, Kristoffer Gronowski, Roman Levenshteyn, Per Pettersson and Patrik Wiss The IP Multimedia
Optimize Application Delivery Across Your Globally Distributed Data Centers
BIG IP Global Traffic Manager DATASHEET What s Inside: 1 Key Benefits 2 Globally Available Applications 4 Simple Management 5 Secure Applications 6 Network Integration 6 Architecture 7 BIG-IP GTM Platforms
Implementation of a Department Local Area Network Management System
Implementation of a Department Local Area Network Management System I-Ping Hsieh Lai-Ming Shiue Shang-Juh Kao Department of Computer Science Department of Applied Mathematics Department of Computer Science
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation
The Software Container pattern
The Software Container pattern Madiha H. Syed and Eduardo B. Fernandez Dept. of Computer and Elect. Eng. and Computer Science Florida Atlantic University, Boca Raton, FL 33431, USA [email protected], [email protected]
WhatsUp Gold v11 Features Overview
WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity
HP Systinet. Software Version: 10.01 Windows and Linux Operating Systems. Concepts Guide
HP Systinet Software Version: 10.01 Windows and Linux Operating Systems Concepts Guide Document Release Date: June 2015 Software Release Date: June 2015 Legal Notices Warranty The only warranties for HP
Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities
Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
In: Proceedings of RECPAD 2002-12th Portuguese Conference on Pattern Recognition June 27th- 28th, 2002 Aveiro, Portugal
Paper Title: Generic Framework for Video Analysis Authors: Luís Filipe Tavares INESC Porto [email protected] Luís Teixeira INESC Porto, Universidade Católica Portuguesa [email protected] Luís Corte-Real
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
Patterns in Software Engineering
Patterns in Software Engineering Lecturer: Raman Ramsin Lecture 7 GoV Patterns Architectural Part 1 1 GoV Patterns for Software Architecture According to Buschmann et al.: A pattern for software architecture
Network Terminology Review
Network Terminology Review For those of you who have experience with IP networks, this document may serve as a reminder of the current lexicon of terms used in our industry. If you re new to it or specialized
Chapter 3 Application Monitors
Chapter 3 Application Monitors AppMetrics utilizes application monitors to organize data collection and analysis per application server. An application monitor is defined on the AppMetrics manager computer
Service Provisioning and Management in Virtual Private Active Networks
Service Provisioning and Management in Virtual Private Active Networks Fábio Luciano Verdi and Edmundo R. M. Madeira Institute of Computing, University of Campinas (UNICAMP) 13083-970, Campinas-SP, Brazil
Basic Unix/Linux 1. Software Testing Interview Prep
Basic Unix/Linux 1 Programming Fundamentals and Concepts 2 1. What is the difference between web application and client server application? Client server application is designed typically to work in a
Configuration Management Models in Commercial Environments
Technical Report CMU/SEI-91-TR-7 ESD-9-TR-7 Configuration Management Models in Commercial Environments Peter H. Feiler March 1991 Technical Report CMU/SEI-91-TR-7 ESD-91-TR-7 March 1991 Configuration Management
Implementation of Virtual Local Area Network using network simulator
1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Oracle SOA Suite: The Evaluation from 10g to 11g
KATTA Durga Reddy TATA Consultancy Services. Oracle SOA Suite: The Evaluation from 10g to 11g Introduction Oracle SOA Suite is an essential middleware layer of Oracle Fusion Middleware. It provides a complete
Protecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
Middleware support for the Internet of Things
Middleware support for the Internet of Things Karl Aberer, Manfred Hauswirth, Ali Salehi School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL) CH-1015 Lausanne,
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
An MDA Approach for the Development of Web applications
An MDA Approach for the Development of Web applications Santiago Meliá Beigbeder and Cristina Cachero Castro {santi,ccachero}@dlsi.ua.es Univesidad de Alicante, España Abstract. The continuous advances
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
Subnetting and Network Management Omer F. Rana. Networks and Data Communications 1
Subnetting and Network Management Omer F. Rana Networks and Data Communications 1 Subnetting Subnetting is an important concept in establishing TCP/IP based networks important in integrating small Local
Firewalls. Ahmad Almulhem March 10, 2012
Firewalls Ahmad Almulhem March 10, 2012 1 Outline Firewalls The Need for Firewalls Firewall Characteristics Types of Firewalls Firewall Basing Firewall Configurations Firewall Policies and Anomalies 2
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
TNT SOFTWARE White Paper Series
TNT SOFTWARE White Paper Series Event Log Monitor White Paper: Architecture T N T Software www.tntsoftware.com TNT SOFTWARE Event Log Monitor Architecture 2000 TNT Software All Rights Reserved 1308 NE
Chapter 7 Application Protocol Reference Architecture
Application Protocol Reference Architecture Chapter 7 Application Protocol Reference Architecture This chapter proposes an alternative reference architecture for application protocols. The proposed reference
Chapter 18. Network Management Basics
Network Management Basics > FCAPS Model Chapter 18. Network Management Basics This chapter covers the following topics: FCAPS Model Network Management Architecture Network Management Protocols An Introduction
Top-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
Product Navigator User Guide
Product Navigator User Guide Table of Contents Contents About the Product Navigator... 1 Browser support and settings... 2 Searching in detail... 3 Simple Search... 3 Extended Search... 4 Browse By Theme...
Simple Network Management Protocol
56 CHAPTER Chapter Goals Discuss the SNMP Management Information Base. Describe SNMP version 1. Describe SNMP version 2. Background The (SNMP) is an application layer protocol that facilitates the exchange
Oracle Warehouse Builder 10g
Oracle Warehouse Builder 10g Architectural White paper February 2004 Table of contents INTRODUCTION... 3 OVERVIEW... 4 THE DESIGN COMPONENT... 4 THE RUNTIME COMPONENT... 5 THE DESIGN ARCHITECTURE... 6
MD Link Integration. 2013 2015 MDI Solutions Limited
MD Link Integration 2013 2015 MDI Solutions Limited Table of Contents THE MD LINK INTEGRATION STRATEGY...3 JAVA TECHNOLOGY FOR PORTABILITY, COMPATIBILITY AND SECURITY...3 LEVERAGE XML TECHNOLOGY FOR INDUSTRY
Basic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
Introduction to Junos Space Network Director
Introduction to Junos Space Network Director Release 2.0 Published: 2015-02-12 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights
Computer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://ti.uni-due.de/ti/en/education/teaching/ss13/netlab Equipment for each group: - 1 Server computer (OS: Windows Server 2008 Standard)
Agile Business Suite: a 4GL environment for.net developers DEVELOPMENT, MAINTENANCE AND DEPLOYMENT OF LARGE, COMPLEX BACK-OFFICE APPLICATIONS
Agile Business Suite: a 4GL environment for.net developers DEVELOPMENT, MAINTENANCE AND DEPLOYMENT OF LARGE, COMPLEX BACK-OFFICE APPLICATIONS In order to ease the burden of application lifecycle management,
Specialized Programme on Internetworking Design and LAN WAN Administration
Specialized Programme on Internetworking Design and LAN WAN Administration A. NAME OF INSTITUTE Centre For Development of Advanced Computing B. NAME/TITLE OF THE COURSE C. COURSE DATES WITH DURATION IN
Network Protocol Configuration
Table of Contents Table of Contents Chapter 1 Configuring IP Addressing... 1 1.1 IP Introduction... 1 1.1.1 IP... 1 1.1.2 IP Routing Protocol... 1 1.2 Configuring IP Address Task List... 2 1.3 Configuring
Communication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Network Architectures Protocol Layering Network architecture concept A network architecture is an abstract model used to describe
Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.
Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with
Basic & Advanced Administration for Citrix NetScaler 9.2
Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios
A Heterogeneous Internetworking Model with Enhanced Management and Security Functions
Session 1626 A Heterogeneous Internetworking Model with Enhanced Management and Security Functions Youlu Zheng Computer Science Department University of Montana Yan Zhu Sybase, Inc. To demonstrate how
KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual
KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/
Access Control and Audit Trail Software
Varian, Inc. 2700 Mitchell Drive Walnut Creek, CA 94598-1675/USA Access Control and Audit Trail Software Operation Manual Varian, Inc. 2002 03-914941-00:3 Table of Contents Introduction... 1 Access Control
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Nimsoft for Network Monitoring. A Nimsoft Service Level Management Solution White Paper
Nimsoft for Network Monitoring A Nimsoft Service Level Management Solution White Paper Nimsoft for Network Monitoring Table of Contents Nimsoft for Network Monitoring Solution Summary... 3 Solution Overview...
Lightweight Data Integration using the WebComposition Data Grid Service
Lightweight Data Integration using the WebComposition Data Grid Service Ralph Sommermeier 1, Andreas Heil 2, Martin Gaedke 1 1 Chemnitz University of Technology, Faculty of Computer Science, Distributed
Monitoring Infrastructure (MIS) Software Architecture Document. Version 1.1
Monitoring Infrastructure (MIS) Software Architecture Document Version 1.1 Revision History Date Version Description Author 28-9-2004 1.0 Created Peter Fennema 8-10-2004 1.1 Processed review comments Peter
Deployment Pattern. Youngsu Son 1,JiwonKim 2, DongukKim 3, Jinho Jang 4
Deployment Pattern Youngsu Son 1,JiwonKim 2, DongukKim 3, Jinho Jang 4 Samsung Electronics 1,2,3, Hanyang University 4 alroad.son 1, jiwon.ss.kim 2, dude.kim 3 @samsung.net, [email protected] 4
Cloud Infrastructure Management - IBM VMControl
Cloud Infrastructure Management - IBM VMControl IBM Systems Director 6.3 VMControl 2.4 Thierry Huche IBM France - Montpellier [email protected] 2010 IBM Corporation Topics IBM Systems Director /
Tools for Attacking Layer 2 Network Infrastructure
Tools for Attacking Layer 2 Network Infrastructure Kai-Hau Yeung, Dereck Fung, and Kin-Yeung Wong Abstract Data Link layer is considered as the weakest link in a secured network. If an initial attack comes
ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control.
ORACLE DATABASE SECURITY Cristina-Maria Titrade 1 Abstract This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource
Glossary of Object Oriented Terms
Appendix E Glossary of Object Oriented Terms abstract class: A class primarily intended to define an instance, but can not be instantiated without additional methods. abstract data type: An abstraction
A Near Real-Time Personalization for ecommerce Platform Amit Rustagi [email protected]
A Near Real-Time Personalization for ecommerce Platform Amit Rustagi [email protected] Abstract. In today's competitive environment, you only have a few seconds to help site visitors understand that you
CA Identity Manager. Glossary. r12.5 SP8
CA Identity Manager Glossary r12.5 SP8 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational
Components and Concepts of the Ambient Networks Architecture
Components and Concepts of the Ambient Networks Architecture Andreas Schieder, Ericsson Deutschland GmbH, Ericsson Allee 1, 52134 Herzogenrath, Germany Lars Eggert, NEC Europe Ltd., Network Laboratories,
Oracle Database: SQL and PL/SQL Fundamentals
Oracle University Contact Us: 1.800.529.0165 Oracle Database: SQL and PL/SQL Fundamentals Duration: 5 Days What you will learn This course is designed to deliver the fundamentals of SQL and PL/SQL along
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
CHAPTER THREE, Network Services Management Framework
CHAPTER THREE, Acronyms and Terms 3-3 List of Figures 3-4 1 Introduction 3-5 2 Architecture 3-6 2.1 Entity Identification & Addressing 3-7 2.2 Management Domain Registration and Information Service 3-7
Wedge Networks: Transparent Service Insertion in SDNs Using OpenFlow
Wedge Networks: EXECUTIVE SUMMARY In this paper, we will describe a novel way to insert Wedge Network s multiple content security services (such as Anti-Virus, Anti-Spam, Web Filtering, Data Loss Prevention,
Easy configuration of NETCONF devices
Easy configuration of NETCONF devices David Alexa 1 Tomas Cejka 2 FIT, CTU in Prague CESNET, a.l.e. Czech Republic Czech Republic [email protected] [email protected] Abstract. It is necessary for developers
Zarządzanie sieciami telekomunikacyjnymi
What Is an Internetwork? An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry,
The ABCs of SNMP. Info Sheet. The ABC of SNMP INTRODUCTION. SNMP Versions
The ABCs of SNMP INTRODUCTION One of the numerous acronyms from the Internet world is SNMP which stands for Simple Network Management Protocol. Of course, anything termed simple is suspect. SNMP is an
Kaseya 2. Quick Start Guide. for VSA 6.1
Kaseya 2 Monitoring Configuration Quick Start Guide for VSA 6.1 January 17, 2011 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Managing a Fibre Channel Storage Area Network
Managing a Fibre Channel Storage Area Network Storage Network Management Working Group for Fibre Channel (SNMWG-FC) November 20, 1998 Editor: Steven Wilson Abstract This white paper describes the typical
Installation & User Guide
SharePoint List Filter Plus Web Part Installation & User Guide Copyright 2005-2011 KWizCom Corporation. All rights reserved. Company Headquarters KWizCom 50 McIntosh Drive, Unit 109 Markham, Ontario ON
About This Document 3. Integration and Automation Capabilities 4. Command-Line Interface (CLI) 8. API RPC Protocol 9.
Parallels Panel Contents About This Document 3 Integration and Automation Capabilities 4 Command-Line Interface (CLI) 8 API RPC Protocol 9 Event Handlers 11 Panel Notifications 13 APS Packages 14 C H A
Authoring for System Center 2012 Operations Manager
Authoring for System Center 2012 Operations Manager Microsoft Corporation Published: November 1, 2013 Authors Byron Ricks Applies To System Center 2012 Operations Manager System Center 2012 Service Pack
Internetworking and Internet-1. Global Addresses
Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties
Oracle Database: SQL and PL/SQL Fundamentals NEW
Oracle University Contact Us: + 38516306373 Oracle Database: SQL and PL/SQL Fundamentals NEW Duration: 5 Days What you will learn This Oracle Database: SQL and PL/SQL Fundamentals training delivers the
