Principles of computer systems and network management:
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Heidelberg [u.a.]
Springer
2009
|
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018802983&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Umfang: | XV, 260 S. graph. Darst. |
ISBN: | 0387890084 9780387890081 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035945828 | ||
003 | DE-604 | ||
005 | 20100324 | ||
007 | t| | ||
008 | 100111s2009 xx d||| |||| 00||| eng d | ||
020 | |a 0387890084 |c hbk |9 0-387-89008-4 | ||
020 | |a 9780387890081 |c hbk |9 978-0-387-89008-1 | ||
035 | |a (OCoLC)603944269 | ||
035 | |a (DE-599)BVBBV035945828 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
045 | |a 013416324 | ||
045 | |a 013416324 | ||
049 | |a DE-473 | ||
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
100 | 1 | |a Verma, Dinesh Chandra |e Verfasser |4 aut | |
245 | 1 | 0 | |a Principles of computer systems and network management |c by Dinesh Chandra Verma |
264 | 1 | |a Heidelberg [u.a.] |b Springer |c 2009 | |
300 | |a XV, 260 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
546 | |a Text engl. | ||
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-0-387-89009-8 |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018802983&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-018802983 |
Datensatz im Suchindex
_version_ | 1819360523821514752 |
---|---|
adam_text | Contents
1
Introduction
............................................ 1
1.1
Introduction
....................................... 1
1.2
Computer System Life Cycle
.......................... 2
1.3
Shared Hosting Data Center (SHDC)
................... 5
1.4
Large Enterprise
.................................... 7
1.5
Network Service Provider
............................ 9
1.6
History of Systems Management
....................... 12
1.7
Summary
......................................... 14
1.8
Review Questions
................................... 14
References
.............................................. 15
2
Planning and Implementation
............................... 17
2.1
Requirements
......................................
IS
.1
Performance Requirements
...................... 18
.2
Resiliency and Availability Requirements
........... 19
.3
Power and Thermal Requirements
................ 20
.4
Security Requirements
.......................... 21
.5
Manageability Requirements
.................... 22
2.1.6
Backward Compatibility
........................ 22
2.1.7
Other Requirements
........................... 23
2.2
Evaluating Computer Systems
......................... 24
2.2.1
Evaluating Computer Systems
Performance
.................................. 26
2.2.2
Evaluating Resiliency and Availability
............. 37
2.2.3
Power and Thermal Analysis
..................... 43
2.2.4
Computer System Security Analysis
............... 47
2.3
Planning to Satisfy Requirements
...................... 49
2.3.1
Systems Planning Process
....................... 50
2.4
Implementation
.................................... 59
2.5
Summary
......................................... 59
2.6
Review Questions
................................... 60
References
.............................................. 61
Contents
Operations
Management.................................. 63
3.1
Operations
Center.................................. 63
3.2 Management Data.................................. 66
3.3 Manager Agent
Protocols
............................ 69
3.3.1 Remote
Consoles
.............................. 69
3.3.2 Simple Network Management
Protocol
(SNMP).....
70
3.3.3
Common Object Repository Broker Architecture
(CORBA)
.................................... 71
3.3.4
Web-Based Enterprise Management (WBEM)
....... 72
3.3.5
Web Services
................................. 72
3.3.6
NetConf
..................................... 73
3.3.7
Comparison of the Different Management Protocols.
.. 74
3.4
Management Information Structure
.................... 74
3.4.1
Management Information Base
................... 75
3.4.2
Common Information Model
.................... 77
3.4.3
Issues with Standard Representation
.............. 78
3.5
Device Agent Structure
.............................. 80
3.6
Management Application Structure
..................... 81
3.7
Operations Center Function
........................... 83
3.8
Summary
......................................... 86
3.9
Review Questions
................................... 86
References
.............................................. 87
Discovery
.............................................. 89
4.1
Discovery Approaches
............................... 90
4.1.1
Manual Inventory
......,...................... 90
4.1.2
Dictionary/Directory Queries
.................... 91
4.1.3
Self-Advertisement
............................ 91
4.1.4
Passive Observation
............................ 92
4.1.5
Agent-Based Discovery
......................... 92
4.1.6
Active Probing
................................ 93
4.2
Discovery of Specific Types of IT Infrastructure
........... 94
4.2.1
Discovering Servers
............................ 94
4.2.2
Discovering Client Machines.
.................... 97
4.2.3
Discovering Applications on Servers and Clients
..... 98
4.2.4
Discovering Layer-3 Network Devices
............. 100
4.2.5
Discovering Layer-2 Network Devices
............. 101
4.3
Storing Discovered Information
....................... 102
4.3.1
Representing Hierarchical Relationships
........... 103
4.3.2
Representing General Graphs
.................... 106
4.3.3
Representing Generic Relationships
............... 107
4.3.4
Other Types of Databases
....................... 108
4.4
Sammary
......................................... 109
4.5
Review Questions
................................... 109
References
............................................... 110
Contents xiii
5 Monitoring.............................................
ill
5.1
Monitored
Information
,
.............................
Ill
5.2
Generic Model for Monitoring
........................ 112
5.3
Data Collection
.................................... 114
5.3.1
Passive Monitoring
............................ 114
5.3.2
Active Monitoring
............................. 119
5.4
Pre-DB Data Processing
.............................. 123
5.4.1
Data Reduction
............................... 123
5.4.2
Data Cleansing
............................... 124
5.4.3
Data Format Conversion
....................... 127
5.5
Management Database
............................... 129
5.5.1
Partitioned Databases
.......................... 130
5.5.2
Rolling Databases
............................. 131
5.5.3
Load-Balanced Databases.
...................... 131
5.5.4
Hierarchical Database Federation
................ 132
5.5.5
Round-Robin Databases
........................ 134
5.6
Summary
..................................*...... 134
5.7
Review Questions
................................... 134
6
Faalt
Management
....................................... 137
6.1
Fault Management Architecture
.......................
Î
37
6.1.1
Common Types of Symptoms
.................... 139
6.1.2
Common Types of Root Causes
.................. 141
6.2
Fault Diagnosis Algorithms
......,.................... 143
6.2.1
Topology Analysis Methods
..................... 144
6.2.2
Rule-Based Methods
........................... 147
6.2.3
Decision Trees
................................ 148
6.2.4
Dependency Graphs
........................... 149
6.2.5
Code Book
................................... 151
6.2.6
Knowledge Bases
.............................. 152
6.2.7
Case-Based Reasoning
.......................... 153
6.2.8
Other Techniques
..............................
І54
6.3
Self-Healing Systems
................................
Î55
6.3
Л
Autonomie
Computing Architecture
and Variations
................................ 155
6.3.2
An Example of a Self Healing System
..............
і
57
6.4
Avoiding Failures
................................... 158
6.4.Î
Redundancy
.................................. 158
6.4.2
Independeut Monitor
..........................
1
59
6.4.3
Collaborative Monitoring
.......................
Î60
6.4.4
Aged Restarts
...........................------ 160
6.5
Summary
.___...............,..,...,............. 161
6.6
Review Questions
................................... 16!
References
.............................................. 162
Contents
Configuration
Management................................ 165
7.1
Configuration
Management
Overview
................... 165
7.2
Configuration Setting
................................ 167
7.2.1
Reusing Configuration Settings
................... 168
7.2.2
Script-Based Configuration Management
........... 170
7.2.3
Model-Based Configuration Management
.......... 171
7.2.4
Configuration Workflows
....................... 173
7.2.5
Simplifying Configuration Through Higher
Abstractions
.................................. 174
7.2.6
Policy-Based Configuration Management
.......... 175
7.3
Configuration Discovery and Change Control
............ 176
7.3.Î
Structure of the CMDB
......................... 177
7.3.2
Federated CMDB
............................. 178
7.3.3
Dependency Discovery
......................... 178
7.4
Configuration Management Applications
................ 181
7.4.1
Configuration Validation
....................... 181
7.4.2
What-If Analysis
.............................. 182
7.4.3
Configuration Cloning
......................... 183
7.5
Patch Management
.................................. 183
7.5.1
Patch Identification
............................ 183
7.5.2
Patch Assessment
.............................. 184
7.5.3
Patch Testing
................................. 185
7.5.4
Patch Installation
............................. 186
7.6
Summary
......................................... 187
7.7
Review Questions
................................... 188
References
.............................................. 188
Performance and Accounting Management
.................... 191
8.1
Need for operation Time Performance Management
....... 192
8.2
Approaches for Performance Management
............... 192
8.3
Performance Monitoring and Reporting
.................
Î94
8.3.1
Performance Metrics
........................... 195
8.3.2
Addressing Scalability Issues
..................... 196
8.3.3
Error Handling and Data Cleansing
............... 198
8.3.4
Metric Composition
........................... 200
8.3.5
Performance Monitoring Approaches
.............. 202
8.3.6
Performance Reporting and Visualization
.......... 205
8.4
Performance Troubleshooting
......................... 209
8.4.
і
Detecting Performance Problems
................. 209
8.4.2
Correcting Performance Problems
................ 211
8.5
Capacity Planning
.................................. 213
8.5.1
Simple Estimation
............................. 214
8.5.2
ARIMA Models
.............................. 215
8.5.3
Seasonal Decomposition
........................ 216
8.6
Accounting Management
............................. 217
Contents
w
8.7
Summary
......................................... 219
8.8 Review
Questions
................................... 219
References
.............................................. 220
9
Security Management
.................................... 221
9.1
General Techniques
................................. 222
9.1.1
Cryptography and Key Management
.............. 222
9.1.2
Authentication
................................ 226
9.1.3
Confidentiality/Access Control
................... 228
9.1.4
Integrity
..................................... 229
9.1.5
Non-Repudiation
............................. 231
9.1.6
Availability
.................................. 231
9.2
Security Management for Personal Computers
............ 232
9.2.1
Data Protection
............................... 233
9.2.2 Malware
Protection
............................ 234
9.2.3
Patch Management
............................ 235
9.2.4
Data Backup and Recovery
...................... 236
9.3
Security Management for Computer Servers
.............. 237
9.3.1
Password Management
......................... 238
9.3.2
SingleSign-On
................................ 239
9.3.3
Secure Access Protocols
........................ 240
9.4
Security Management for Computer Networks
............ 241
9.4.1
Firewalls
.................................... 242
9.4.2
Intrusion Detection/Prevention Systems
............ 243
9.4.3
Honeypots
................................... 245
9.5
Operational Issues
.................................. 245
9.5.1
Physical Security
.............................. 246
9.5.2
Security Policies
............................... 246
9.5.3
Auditing
..................................... 248
9.6
Summary
......................................... 248
9.7
Review Questions
................................... 249
References
.............................................. 250
10
Advanced Topics
........................................ 251
10.
і
Process Management
............................... 251
10.2
Helpdesk
Systems
.................................. 252
10.3
Web, Web
2.0,
and Management
...................... 254
10.4
Summary.
........................................ 255
10.5
Review Questions
.................................. 255
References
.............................................. 255
Iniex
..................................................... 257
|
any_adam_object | 1 |
author | Verma, Dinesh Chandra |
author_facet | Verma, Dinesh Chandra |
author_role | aut |
author_sort | Verma, Dinesh Chandra |
author_variant | d c v dc dcv |
building | Verbundindex |
bvnumber | BV035945828 |
classification_rvk | ST 200 |
ctrlnum | (OCoLC)603944269 (DE-599)BVBBV035945828 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01248nam a2200337 c 4500</leader><controlfield tag="001">BV035945828</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100324 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">100111s2009 xx d||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0387890084</subfield><subfield code="c">hbk</subfield><subfield code="9">0-387-89008-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387890081</subfield><subfield code="c">hbk</subfield><subfield code="9">978-0-387-89008-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)603944269</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035945828</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="045" ind1=" " ind2=" "><subfield code="a">013416324</subfield></datafield><datafield tag="045" ind1=" " ind2=" "><subfield code="a">013416324</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Verma, Dinesh Chandra</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Principles of computer systems and network management</subfield><subfield code="c">by Dinesh Chandra Verma</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Heidelberg [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XV, 260 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">Text engl.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-0-387-89009-8</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018802983&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018802983</subfield></datafield></record></collection> |
id | DE-604.BV035945828 |
illustrated | Illustrated |
indexdate | 2024-12-20T14:03:18Z |
institution | BVB |
isbn | 0387890084 9780387890081 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018802983 |
oclc_num | 603944269 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG |
owner_facet | DE-473 DE-BY-UBG |
physical | XV, 260 S. graph. Darst. |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer |
record_format | marc |
spellingShingle | Verma, Dinesh Chandra Principles of computer systems and network management |
title | Principles of computer systems and network management |
title_auth | Principles of computer systems and network management |
title_exact_search | Principles of computer systems and network management |
title_full | Principles of computer systems and network management by Dinesh Chandra Verma |
title_fullStr | Principles of computer systems and network management by Dinesh Chandra Verma |
title_full_unstemmed | Principles of computer systems and network management by Dinesh Chandra Verma |
title_short | Principles of computer systems and network management |
title_sort | principles of computer systems and network management |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018802983&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT vermadineshchandra principlesofcomputersystemsandnetworkmanagement |