Advances in Network Management



Similar documents
Advances in Network Management

Development and Management

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup

SOFTWARE TESTING AS A SERVICE

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

Ctfo MANAGEMENT SECURITY PATCH. Felicia M. Nicastro. Second Edition. CRC Press. VC#*' J Taylor & Francis Group / Boca Raton London New York

Implementing the Project Management Balanced Scorecard

Improving Business Process Performance

Customer and Business Analytic

Management. Project. Software. Ashfaque Ahmed. A Process-Driven Approach. CRC Press. Taylor Si Francis Group Boca Raton London New York

Implementation. Business-Driven IT-Wide Agile (Scrum) and Kanban (Lean) Andrew T. Pham and David K. Pham. An Action Guide for Business and IT Leaders

RESILIENT. SECURE and SOFTWARE. Requirements, Test Cases, and Testing Methods. Mark S. Merkow and Lakshmikanth Raghavan. CRC Press

Mining. Practical. Data. Monte F. Hancock, Jr. Chief Scientist, Celestech, Inc. CRC Press. Taylor & Francis Group

CHAPMAN & HALL/CRC INNOVATIONS IN SOFTWARE ENGINEERING AND SOFTWARE DEVELOPMENT. Software Test Attacks to Break Mobile and Embedded Devices

Information Technology and Organizational Learning

Boston University. MET CS 685: Network Management and Performance

Quality Management. Theory and Application PETER D. MAUCH. Ltfi) CRC Press. \ V J Taylor & Francis Group. ^ ^ Boca Raton London New York

Cloud Computing. and Scheduling. Data-Intensive Computing. Frederic Magoules, Jie Pan, and Fei Teng SILKQH. CRC Press. Taylor & Francis Group

Grid Computing FUNDAMENTALS OF. Theory, Algorithms and Technologies. Frederic Magoules. Edited by. CRC Press

Introduction to Supply Chain Management Technologies

SECOND EDITION THE SECURITY RISK ASSESSMENT HANDBOOK. A Complete Guide for Performing Security Risk Assessments DOUGLAS J. LANDOLL

Study Guide. ScrumMaster. The. James Schiel. CRC Press. Taylor & Francis Croup, an Inform* business AN AUERBACH BOOK. CRC Press (s an imprint of the

Engineering Design. Software. Theory and Practice. Carlos E. Otero. CRC Press. Taylor & Francis Croup. Taylor St Francis Croup, an Informa business

Deliuery Networks. A Practical Guide to Content. Gilbert Held. Second Edition. CRC Press. Taylor & Francis Group

ANDROID SECURITY ATTACKS AND DEFENSES ABHISHEK DUBEY I ANMOL MISRA. ( r öc) CRC Press VV J Taylor & Francis Group ^ "^ Boca Raton London New York

THE COMPLETE PROJECT MANAGEMENT METHODOLOGY AND TOOLKIT

Management. ITIL Release. Dave Howard. A Hands-on Guide. CRC Press. Taylor & Francis Group. Taylor St Francis Croup, an Informa business

SOFTWARE TESTING. A Craftsmcm's Approach THIRD EDITION. Paul C. Jorgensen. Auerbach Publications. Taylor &. Francis Croup. Boca Raton New York

The Green and Virtual Data Center

List of approved Universities and Programmes by Yayasan Peneraju

Forensic Accounting Taxation

Networking. Cloud and Virtual. Data Storage. Greg Schulz. Your journey. effective information services. to efficient and.

1 Introduction Services and Applications for HSPA Organization of the Book 6 References 7

Contents. Foreword. Acknowledgments

for Research and Guiding Innovation for Positive R&D Outcomes Lory Mitchell Wingate

Cloud Computing. Implementation, Management, and Security. John W. Rittinghouse James F. Ransome

Requirements Engineering for Software

TTM4128: Network and Service Management - TTM4128: Network and Service Management - Part A.1 : Course Overview and Introduction.

Design of Enterprise Systems

Open Source Data Warehousing and Business Intelligence

Governance Simplified

Market Entry Strategies of Foreign Telecom Companies in India

Green Project Management

Lean Management System LMS:2OI2

Computer Security Literacy

Network System Design Lesson Objectives

Green Energy Technology, Economics and Policy

Cisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education

Introduction. Acknowledgments Support & Feedback Preparing for the Exam. Chapter 1 Plan and deploy a server infrastructure 1

Client Server Computing

Network Management Architectures for Broadband Satellite Multimedia Systems

CREATING A THIRD EDITION DAVID MANN

EFFECTIVE NON-PROFIT MANAGEMENT

Requirements for the Operations and Management of 4G Networks

Location-Based Information Systems

Contents. Biography. Acknowledgments. List of Abbreviations. List of Symbols

Modelling and Simulation of Human Behaviour in System Control

CLINICAL DATA MANAGEMENT

Information Technology Career Field Pathways and Course Structure

Workflow Administration of Windchill 10.2

Internet Communications Using SIP

OSS for Telecom Networks

Customer Relationship Management

BUSINESS ANALYSIS FDR INTELLIGENCE

Local Area Networks (LANs) Blueprint (May 2012 Release)

Network Technology CMP-354-TE. TECEP Test Description

Fixed/Mobile Convergence and Beyond AMSTERDAM BOSTON. HEIDELBERG LONDON

The Geography of International terrorism

Private Cloud Computing

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

inet Enterprise Features Fact Sheet

Parallel Computing for Data Science

Project Management Concepts, Methods, and Techniques

Business Information Systems and Technology

Overview of the Internet of things

TOYOTA. by TOYOTA. Reflections from the Inside Leaders on the Techniques That Revolutionized the Industry. Edited by Samuel Obara and Darril Wilburn

Data Mining: Concepts and Techniques. Jiawei Han. Micheline Kamber. Simon Fräser University К MORGAN KAUFMANN PUBLISHERS. AN IMPRINT OF Elsevier

Intelligent Networks. John Anderson. Principles and ApplicaHons. The Institution of Electrical Engineers

Networking Tools. Windows. Gilbert Held. Troubleshooting, and Security. The Complete Guide to Management, CRC Press INFORMATIONSBIBLIOTHEK

INFORMATION SECURITY A MULTIDISCIPLINARY. Stig F. Mjolsnes INTRODUCTION TO. Norwegian University ofscience & Technology. CRC Press

Lecture 5: Foundation of Network Management

Computing. Federal Cloud. Service Providers. The Definitive Guide for Cloud. Matthew Metheny ELSEVIER. Syngress is NEWYORK OXFORD PARIS SAN DIEGO

BIOTECHNOLOGY OPERATIONS

Cloud Computing. Theory and Practice. Dan C. Marinescu. Morgan Kaufmann is an imprint of Elsevier HEIDELBERG LONDON AMSTERDAM BOSTON

Contents. Dedication List of Figures List of Tables. Acknowledgments

A Simulation-Based lntroduction Using Excel

Developer's Handbook

Big Data Analytics From Strategie Planning to Enterprise Integration with Tools, Techniques, NoSQL, and Graph

METHODS IN MEDICAL INFORMATICS

Understanding the Pros and Cons of Combination Networks 7. Acknowledgments Introduction. Establishing the Numbers of Clients and Servers 4

Network Management - SNMP

Transcription:

Advances in Network Management Jianguo Ding UC) CRC Press >5^ J Taylor & Francis Croup ^""""^ Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business AN AUERBACH BOOK

Contents List of Figures List of Tables Foreword I Foreword II Preface About the Author Acknowledgments ix xiii xv xvii xxi xxiii xxv 1 Introduction 1 1.1 Motivation of the Book 1 1.2 Structure and Organization of the Book 2 2 Evolution of Networks 3 2.1 Introduction of Networks 3 2.1.1 Definition of Networks 3 2.1.2 Network Topologies and Functions 5 2.1.3 Types of Networks 10 2.2 History of Networks 13 2.2.1 History of Telecommunications Networks 13 2.2.2 History of Computer Networks (Internet) 16 2.3 Network Architectures 24 2.3.1 The OSI Reference Model 24 2.3.2 The TCP/IP Reference Model 28 2.3.3 Comparison of OSI Model and TCP/IP Model 31 2.3.4 Evolution of the Internet Protocol (IP) 31 2.4 Future of Networks 36 2.4.1 Laws Related to Network Evolution 36 2.4.2 Trend of Networks 38

VI Evolution in Network Management 43 3.1 Introduction of Network Management 43 3.1.1 Definition of Network Management 43 3.1.2 Basic Components of Network Management System.. 44 3.2 Network Management Architectures 49 3.2.1 TMN Management Architecture 50 3.2.2 Internet-Based Management Architecture 55 3.2.3 Comparison of TMN- and Internet-Based Management Architecture 65 3.3 Evolution of Network Management Protocols 66 3.3.1 Common Management Information Protocol (CMIP).. 67 3.3.2 Simple Network Management Protocol (SNMP) 71 3.3.3 Comparison of SNMP and CMIP 79 3.3.4 Internet Protocol Flow Information Export (IPFIX).. 81 3.3.5 Network Configuration Protocol (NETCONF) 85 3.3.6 Syslog 87 3.3.7 Other Protocols Related to Network Management... 89 3.4 Evolution in Network Management Functions 90 3.4.1 FCAPS Network Management Functions 90 3.4.2 Expanded Network Management Functions 95 3.4.3 Management Application vs. Management Functionality 104 3.5 Challenges in Network Management 106 Theories and Techniques for Network Management 109 4.1 Policy-Based Network Management 109 4.1.1 Introduction of Policy-Based Management 109 4.1.2 Policy-Based Management Architecture Ill 4.1.3 Policy-Based Network Management 113 4.2 Artificial Intelligence Techniques for Network Management..116 4.2.1 Expert Systems Techniques 117 4.2.2 Machine Learning Techniques '. 122 4.3 Graph-Theoretic Techniques for Network Management 133 4.3.1 Causality Graph Model 133 4.3.2 Dependency Graph Model 134 4.3.3 Decision Trees 135 4.4 Probabilistic Approaches for Network Management 137 4.4.1 Fuzzy Logic 139 4.4.2 Bayesian Networks 140 4.5 Web-Based Network Management 145 4.5.1 Web-Based Network Management 145 4.5.2 Web-Based Enterprise Management 146 4.6 Agent Techniques for Network Management 148 4.6.1 Introduction of Agent 148 4.6.2 Mobile Agents 151 4.6.3 Intelligent Agents 154

VII 4.7 Distributed Object Computing for Network Management... 158 4.7.1 Introduction of Distributed Object Computing 158 4.7.2 Distributed Object Computing for Network Management 158 4.8 Active Network Technology for Network Management 160 4.8.1 Introduction of Active Network 160 4.8.2 Active Network Management 161 4.9 Bio-inspired Approaches 164 4.9.1 Bio-inspired Computing 164 4.9.2 Bio-inspired Network Management 168 4.10 XML in Network Management 169 4.10.1 Introduction of XML 169 4.10.2 XML-Based Network Management 172 4.11 Other Techniques for Network Management 173 4.11.1 Economic Theory 173 4.11.2 Finite-State Machines 175 4.11.3 Model-Traversing Techniques 176 Management of Emerging Networks and Services 179 5.1 Next Generation Networking 179 5.1.1 Introduction of Next Generation Networking 179 5.1.2 Management of Next Generation Networking 183 5.2 Wireless Networks 188 5.2.1 Advances in Wireless Networks 188 5.2.2 Mobile Cellular Networks 192 5.2.3 Management of Mobile Cellular Networks 197 5.2.4 Wireless Ad-Hoc Networks 206 5.2.5 Management of Wireless Ad-Hoc Networks 223 5.3 Optical Networks 232 5.3.1 Introduction of Optical Networks 232 5.3.2 Management of Optical Networks 236 5.4 Overlay Networks 239 5.4.1 Management of Peer-to-Peer Networks 241 5.4.2 Management of VPN (Virtual Private Networks)... 249 5.5 Grid Architectures 254 5.5.1 Introduction of Grid Networks 254 5.5.2 Management of Grid Networks 257 5.6 Multimedia Networks 261 5.6.1 Introduction of Multimedia Networks 261 5.6.2 Management of Multimedia Networks 262 5.7 Satellite Networks 264 5.7.1 Introduction of Satellite Networks 264 5.7.2 Management of Satellite Networks 267 5.8 Storage Networks 271 5.8.1 Introduction of Storage Network 271 5.8.2 Management of Storage Networks 274

5.9 Cognitive Networks 280 5.9.1 Introduction of Cognitive Networks 280 5.9.2 Management of Cognitive Networks 285 5.10 Future Internet 290 5.10.1 Introduction of the Internet 290 5.10.2 Future Internet 292 5.10.3 Management Challenges of Future Internet 295 5.10.4 Management of Future Internet 296 6 Autonomic Computing and Self-Management 307 6.1 Autonomic Computing 307 6.1.1 Introduction of Autonomic Computing 307 6.1.2 Autonomic Computing Architecture 308 6.1.3 Autonomic System 309 6.1.4 Autonomic Networks 314 6.2 Context-Aware Management 316 6.2.1 Context Awareness 316 6.2.2 Context-Aware Network 317 6.3 Self-Management 318 6.3.1 Self-Configuration 318 6.3.2 Self-Healing 319 6.3.3 Self-Optimization 321 6.3.4 Self-Protection 322 6.4 Automatic Network Management 322 6.4.1 Network Automation 323 6.4.2 Requirements for Automatic Network Management... 324 6.4.3 Advantages of Automatic Network Management... 325 A Standard Organizations and Sections in Network Management 329 B SNMPv3 RFCs 331 C ITU-T TMN M.3000 Series for Network Management 333 D IEEE 802 Working Group and Executive Committee Study Group 335 Abbreviations 337 Bibliography 345 Index 360