larger cover

Add To My Wish List

Register your product to gain access to bonus material or receive a coupon.

Network Management Fundamentals

eBook (Watermarked)

  • Your Price: $46.39
  • List Price: $57.99
  • About Watermarked eBooks
  • This PDF will be accessible from your Account page after purchase and requires PDF reading software, such as Acrobat® Reader®.

    The eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

    Watermarked eBook FAQ

Also available in other formats.

  • Description
  • Sample Content
  • Updates
  • Copyright 2006
  • Dimensions: 7-3/8" x 9-1/8"
  • Pages: 552
  • Edition: 1st
  • eBook (Watermarked)
  • ISBN-10: 1-58705-280-6
  • ISBN-13: 978-1-58705-280-4

Network Management Fundamentals

A guide to understanding how network management technology really works

Alexander Clemm, Ph.D.

Network management is an essential factor in successfully operating a network. As a company becomes increasingly dependent on networking services, keeping those services running is synonymous with keeping the business running. Network Management Fundamentals provides you with an accessible overview of network management covering management not just of networks themselves but also of services running over those networks.

Network Management Fundamentals explains the different technologies that are used in network management and how they relate to each other. The book focuses on fundamental concepts and principles. It provides a solid technical foundation for the practitioner to successfully navigate network management topics and apply those concepts to particular situations.

The book is divided into four parts:

  • Part I provides an overview of what network management is about and why it is relevant. It also conveys an informal understanding of the functions, tools, and activities that are associated with it.
  • Part II examines network management from several different angles, culminating in a discussion of how these aspects are combined into management reference models.
  • Part III provides more detail into different building blocks of network management introduced in Part II, such as management protocols, management organization, and management communication patterns. 
  • Part IV rounds out the book with a number of management topics of general interest, including management integration and service-level management.

Dr. Alexander Clemm is a senior architect with Cisco®. He has been involved with integrated management of networked systems and services since 1990. He has provided technical leadership for many leading-edge network management development, architecture, and engineering efforts from original conception to delivery to the customer, and he has also served as technical program co-chair of the 2005 IFIP/IEEE International Symposium on Integrated Network Management.

  • Grasp the business implications of network management
  • Examine different management reference models, such as Fault, Configuration, Accounting, Performance, and Security (FCAPS)
  • Understand the building blocks of network management and their purposes
  • Assess the implications and impact of management technologies and put them in perspective
  • Prepare for decisions about network management that require an understanding of the “big picture”

This book is part of the Cisco Press® Fundamentals Series. Books in this series introduce networking professionals to new networking technologies, covering network topologies, example deployment concepts, protocols, and management techniques.

Category: Networking

Covers: Network Management

Table of Contents

Introduction

Part I Network Management: An Overview

Chapter 1 Setting the Stage

Defining Network Management

    Analogy 1: Health Care—the Network, Your Number One Patient

    Analogy 2: Throwing a Party

    A More Formal Definition

The Importance of Network Management: Many Reasons to Care

    Cost

    Quality

    Revenue

The Players: Different Parties with an Interest in Network Management

    Network Management Users

    Network Management Providers

Network Management Complexities: From Afterthought to Key Topic

    Technical Challenges

Organization and Operations Challenges

Business Challenges

Chapter Summary

Chapter Review

Chapter 2 On the Job with a Network Manager

A Day in the Life of a Network Manager

    Pat: A Network Operator for a Global Service Provider

    Chris: Network Administrator for a Medium-Size Business

    Sandy: Administrator and Planner in an Internet Data Center

    Observations

The Network Operator’s Arsenal: Management Tools

    Device Managers and Craft Terminals

    Network Analyzers

    Element Managers

    Management Platforms

    Collectors and Probes

    Intrusion Detection Systems

    Performance Analysis Systems

    Alarm Management Systems

    Trouble Ticket Systems

    Work Order Systems

    Workflow Management Systems and Workflow Engines

    Inventory Systems

    Service Provisioning Systems

    Service Order–Management Systems

    Billing Systems

Chapter Summary

Chapter Review

Chapter 3 The Basic Ingredients of Network Management

The Network Device

    Management Agent

    Management Information, MOs, MIBs, and Real Resources

    Basic Management Ingredients—Revisited

The Management System

    Management System and Manager Role

    A Management System’s Reason for Being

The Management Network

    Networking for Management

    The Pros and Cons of a Dedicated Management Network

The Management Support Organization: NOC, NOC, Who’s There?

    Managing the Management

    Inside the Network Operations Center

Chapter Summary

Chapter Review

Part II Management Perspectives

Chapter 4 The Dimensions of Management

Lost in (Management) Space: Charting Your Course Along Network Management Dimensions

Management Interoperability: “Roger That”

    Communication Viewpoint: Can You Hear Me Now?

    Function Viewpoint: What Can I Do for You Today?

    Information Viewpoint: What Are You Talking About?

    The Role of Standards

Management Subject: What We’re Managing

Management Life Cycle: Managing Networks from Cradle to Grave

    Planning

    Deployment

    Operations

    Decommissioning

Management Layer: It’s a Device… No, It’s a Service… No, It’s a Business

    Element Managment

    Network Management

    Service Management

    Business Management

    Network Element

    Additional Considerations

Management Function: What’s in Your Toolbox

Management Process and Organization: Of Help Desks and Cookie Cutters

Chapter Summary

Chapter Review

Chapter 5 Management Functions and Reference Models: Getting Organized

Of Pyramids and Layered Cakes

FCAPS: The ABCs of Management

    F Is for Fault

    C Is for Configuration

    A Is for Accounting

    P Is for Performance

    S Is for Security

    Limitations of the FCAPS Categorization

OAM&P: The Other FCAPS

FAB and eTOM: Oh, Wait, There’s More

How It All Relates and What It Means to You: Using Your Network Management ABCs

Chapter Summary

Chapter Review

Part III Management Building Blocks

Chapter 6 Management Information: What Management Conversations Are All About

Establishing a Common Terminology Between Manager and Agent

MIBs

    The Managed Device as a Conceptual Data Store

    Categories of Management Information

    The Difference Between a MIB and a Database

    The Relationship Between MIBs and Management Protocols

MIB Definitions

    Of Schema and Metaschema

    The Impact of the Metaschema on the Schema

    A Simple Modeling Example

    Encoding Management Information

Anatomy of a MIB

    Structure of Management Information—Overview

    An Example: MIB-2

    Instantiation in an Actual MIB

    Special MIB Considerations to Address SNMP Protocol Deficits

Modeling Management Information

Chapter Summary

Chapter Review

Chapter 7 Management Communication Patterns: Rules of Conversation

Layers of Management Interactions

    Transport

    Remote Operations

    Management Operations

    Management Services

Manager-Initiated Interactions—Request and Response

    Information Retrieval—Polling and Polling-Based Management

    Configuration Operations

    Actions

    Management Transactions

Agent-Initiated Interactions: Events and Event-Based Management

    Event Taxonomy

    The Case for Event-Based Management

    Reliable Events

    On the Difference Between “Management” and “Control”

Chapter Summary

Chapter Review

Chapter 8 Common Management Protocols: Languages of Management

SNMP: Classic and Perennial Favorite

    SNMP “Classic,” a.k.a. SNMPv1

    SNMPv2/ SNMPv2c

    SNMPv3

CLI: Management Protocol of Broken Dreams

    CLI Overview

    Use of CLI as a Management Protocol

syslog: The CLI Notification Sidekick

    syslog Overview

    syslog Protocol

    syslog Deployment

Netconf: A Management Protocol for a New Generation

    Netconf Datastores

    Netconf and XML

    Netconf Architecture

    Netconf Operations

Netflow and IPFIX: “Check, Please,” or, All the Data, All the Time

    IP Flows

    Netflow Protocol

Chapter Summary

Chapter Review

Chapter 9 Management Organization: Dividing the Labor

Scaling Network Management

    Management Complexity

    Management Hierarchies

    Management Styles

Management Mediation

    Mediation Between Management Transports

    Mediation Between Management Protocols

    Mediation of Management Information at the Syntactic Level

    Mediation of Management Information at the Semantic Level

    Stateful Mediation

Chapter Summary

Chapter Review

Part IV Applied Network Management

Chapter 10 Management Integration: Putting the Pieces Together

The Need for Management Integration

    Benefits of Integrated Management

    Nontechnical Considerations for Management Integration

    Different Perspectives on Management Integration Needs

    The Equipment Vendor Perspective

    Integration Scope and Complexity

Management Integration Challenges

    Managed Domain

    Software Architecture

    Quantifying Management Integration Complexity

Approaches to Management Integration

    Adapting Integration Approach and Network Provider Organization

    Platform Approach

    Custom Integration Approach

Containing Complexity of the Managed Domain

Chapter Summary

Chapter Review

Chapter 11 Service Level Management: Knowing What You Pay For

The Motivation for Service Level Agreements

Identification of Service Level Parameters

    Significance

    Relevance

    Measurability

Defining a Service Level Agreement

    Definition of Service Level Objectives

    Tracking Service Level Objectives

    Dealing with Service Level Violations

Managing for a Service Level

    Decomposing Service Level Parameters

    Planning Networks for a Given Service Level

    Service Level Monitoring—Setting Up Early Warning Systems

    Service Level Statistics—It’s Fingerpointin’ Good

Chapter Summary

Chapter Review

Chapter 12 Management Metrics: Assessing Management Impact and Effectiveness

Network Management Business Impact

    Cost of Ownership

    Enabling of Revenues

    Network Availability

    Trading Off the Benefits and Costs of Network Management Investments

Factors that Determine Management Effectiveness

    Managed Technology—Manageability

    Management Systems and Operations Support Infrastructure

    Management Organization

Assessing Network Management Effectiveness

    Management Metrics to Track Business Impact

    Management Metrics to Track Contribution to Management Effectiveness

    Developing Your Own Management Benchmark

    Assessing and Tracking the State of Management

    Using Metrics to Direct Management Investment

Chapter Summary

Chapter Review

Part V Appendixes

Appendix A Answers to Chapter Reviews

Appendix B Further Reading

Glossary

1587201372    TOC    11/3/2006

 

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.

Overview

Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Cisco Press products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@ciscopress.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security

Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children

This site is not directed to children under the age of 13.

Marketing

Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out

Users can always make an informed choice as to whether they should proceed with certain services offered by Cisco Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.ciscopress.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links

This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020