Algorithm 版 (精华区)
发信人: Lerry (life is waiting...), 信区: Algorithm
标 题: 网络管理——原理与实践(影印版)
发信站: 哈工大紫丁香 (2002年11月09日15:20:32 星期六), 站内信件
网络管理——原理与实践(影印版)ISBN 7-04-010049-5/TP.701 P672
Network Management: Principles and Practice
Mani Subramanian,2001.6出版,定价38.00元
本书作者在网络管理、工程及操作上有着丰富的经验,他将这些宝贵的经验与现实
世界中的实例相结合,介绍了网络管理的基本概念及最新技术。本书不是仅讲述某一特
殊专门的网络技术,而是涉及了网络管理的基础,包括背景知识、技术、工具等,这些
是所有网络管理者必须了解的。本书内容包括三个部分:第一部分提供连网及网络技术
的背景知识,如集线器、路由器、网桥、转换器等;第二部分重点介绍了网络管理结构
和协议,讨论了SNMP管理、宽带管理及TMN;第三部分介绍了一些用于监控网络参数、网
络管理应用程序、管理网络及系统等的工具。
内容:I.背景知识(1. 数据通信与网络管理概述 2. 计算机技术回顾)II.SNMP、
宽带与TMN管理(3. 基本概念:标准、建模与语言 4. SNMPv1:组织与信息5. SNMPv1:
通信6. SNMPv27. SNMPv38. RMON9. 宽带网络管理:ATM网络10. 宽带网络管理:访问网
络11. 电信管理网络)III.管理工具、系统及应用(12. 网络管理工具及系统 13. 网络
管理应用程序 14. 基于Web的管理附录 OSI管理)
PREFACE
Changing Role of Network Management in Academia
Imagine that you are leading a group of engineers who are developing app
lication software to provide a sophisticated network printing service for hi
gh-speed plotters. Picture further that the LAN being used to develop the so
ftware is so unstable and hat they are so frustrated they come to you compla
ining about the unsatisfactory information technology (IT) services each tim
e the network goes down. The IT manager and the engineers both think that th
e cause of the problem belongs to the other In this real-world situation bot
h parties, who are closely related to networking in their daily activities,
do not have a handle on the source of the problem. Neither was to blame beca
use they were not knowledgeable about networking tools and network managemen
t, but you have been called upon to sort it out.
It is not uncommon to observe this lack of practical knowledge in bright
young graduates (or even the more experienced ones), who have specialized i
n networking and telecommunications, when they enter the work environment. I
t is obvious that making network management a part of the academic curriculu
m is a necessity to remedy this deficiency. In this book we aim to give you
the background you will need to attack the problems such as the one just pos
ed.
According to a Data Quest report in Information Week, April 1998, the va
lue of information technology services is expected to double in 5 years, rea
ching 5622 billion by 2002. Hardly an organization, public or private, funct
ions today without the deployment of LANs in its networking environment. The
Internet is expanding at such a rate that Webphones will be in many homes w
ithin the next decade. These devices will have to be managed from the centra
lized network operation center of a service provider.
The technical aspects of network, systems, and applications management i
n information technology services have so far been the responsibility of tel
ecommunications and networking industries and standards bodies. Academia par
ticipates peripherally in the work of standards bodies by setting up protoco
l standards. The proliferating use of the Internet and the emerging technolo
gy of network computers and Webphones have spurred a scientific approach to
network management that includes academic research.
Rationale for a Textbook on Network Management
The first step in starting a network management program is to introduce
a course on network management. Although the available books I surveyed for
use as a textbook that satisfied quarter/semester course requirements were g
ood professional books, none met the needs of a textbook for my course. The
reason is that most people learn network management on the job; hence networ
k management books were oriented toward the professional, covering a narrow
field in depth. A textbook on network management was sorely needed.
This book covers management principles, practices, and technologies for
managing networks, systems, applications, and services. A balance between th
eoretical background and the practical aspects of network management is main
tained. The treatment of practical aspects includes real-world examples. If
"a picture is worth a thousand words," this book contains more than a millio
n words! Just as a programming course requires hands-on exercises, so should
a network management course, and we provide them.
About the Contents
This book is divided into three parts. Part I deals with background mate
rial on networking and networking technologies. Part 11 addresses network ma
nagement architectures and protocols. Part ill focuses on tools and systems
for monitoring and managing networks, systems, applications, and services. T
he book concludes with a discussion of the latest in management technology W
eb-based management.
Part I consists of Chapters 1 and 2. Chapter 1 presents an overview of n
etworking and network management. It is intended not only to provide backgro
und and top-down information, but also as a motivation for the student. Chap
ter 2 reviews networking technology, with a slant on its management aspects.
The course for which this textbook is intended is based on the assumption t
hat the student has had a quarter or semester of data communications. Chapte
r 2 can be either skipped or covered in parts by the instructor. Relevant se
ctions of it could also be used when dealing with subjects in Parts II and I
II.
Chapters 3–11 form Part 11. Basic foundations of standards, models, and
language, which are needed to build various network management architecture
s and protocols, are covered in Chapter 3. SNMP-based protocols that manage
TCP/IP networks are covered in Chapters M. Chapters 4 and 5 are devoted to l
earning the concepts and use of SNMP (version 1) in network management. Chap
ters 6 and 7 deal with the additional specifications defined in SNMP version
s 2 and 3. Chapter & extends network management to the use of remote monitor
ing capabilities.
The demarcation of telecommunications and computer communication is beco
ming increasingly fuzzy in broadband communications. The impact of ATM techn
ology on broadband network management is dealt with in Chapter 9. Chapter 10
addresses access networks in broadband services to the home and management
of emerging access technologies. Chapter 11 extends management concepts to c
over the broader aspects of network management from managing network element
s to business management, as addressed in the Telecommunications Management
Network (TMN).
In Part III, Chapter 12 discusses networking and network management tool
s. The architecture and features of some of the widely used network and syst
em management systems are also covered. The knowledge gained of management t
ools and systems--as well as the principles covered in Part II--is applied t
o practical applications in managing fault, configuration, performance, secu
rity, and accounting, which forms the contents of Chapter 13. The impact of
emerging technologies in Web-based management and its influence on distribut
ed network management is addressed in Chapter 14.
Suggestions for Course Syllabus
The contents of the book are more than can be covered in a semester cour
se. We have indicated the dependencies on the contents of the various chapte
rs in Figure P.1 to help the instructor select appropriate material to cover
in a dedicated network management course or as a part of a data communicati
ons course. A project to accompany the course is recommended and suggestions
are given in Appendix B.
For a graduate course with students having a strong background in networ
king, the review of network technology in Chapter 2 may be bypassed. For a g
eneral course on SNMP management of network elements, Chapters 3--5, followe
d by Chapter & on RMON are suggested. Chapters 12 and 13 apply the principle
s introduced to practical aspects of network management.
For an advanced treatment of SAMP management, Chapters 6 and 7, covering
SNMPv2 and SNMPv3, may be used. It telecommunications is emphasized (which
is more likely in computer engineering schools), the instructor may include
ATM management (Chapter 9) and TMN (Chapter 11).
Finally, if the school has a network management research program, the ma
nagement applications in Chapter 13 should be dealt with in depth. In additi
on, adequate treatment of Web-based active and distributed network managemen
t is suggested.
To the instructor
This textbook is for use in senior-level undergraduate or graduate level
courses. Although a chapter is devoted to the review of network technology,
we assume that the student has taken a prerequisite course in either data o
r telecommunication networks or has equivalent knowledge.
Figure P.1 Figure Title
Online Supplements: A Web site provides a solutions manual for the exerc
ises at the end of the chapters. It is available only for the instructors th
rough your Addison Wesley Longman sales representative or by sending an e-ma
il message to aw.cse@awl.com. Please also watch for visual aids far teaching
that would be accessible on the Web site. These aids are PowerPoint present
ations for each chapter, with key figures and bullet-point notes.
To the Student
The book is written as a textbook to be used for a course on network man
agement. Additional information is provided in the book that can serve as a
reference book for you. The basic information presented, along with the refe
rences, serve as a springboard for access to additional details on numerous
specialized network management topics.
You are exposed to current network management technology and commercial
products. Upon completing a course using this book, you could either enter i
ndustry with adequate network management knowledge or pursue further study a
nd research in graduate school. An encouraging sign is that enterprises deal
ing in network management solutions have recently started supporting network
management programs at institutions of higher learning.
The book is also geared toward self-motivated engineers in the industry
are eager to loam network management. If an engineer has access to network r
esources, many of the hands-on exercises could be practiced. At a minimum, i
t provides enough tools and knowledge for the frustrated worker who cannot a
ccess network resources and doesn't know why.
Grateful Acknowledgements
The major impetus fi3r this book has come from students during three cou
rse offerings. It has been reviewed at various levels and to various depths
by many students. Some of the student project reports have been an inducemen
t to include new material. My gratitude goes to Sidharth Bajaj, Kasyapa Bale
marthy. Liang Chu, Lenitra Clay, Minaxi Gupta, Azita Miahman, and David Mont
gomery for their review and suggestions. Brandon Rhodes and Oleg Kolesnikov
provided interesting practical exercises to be included in the book.
Many reviewerers comments and suggestions have contributed to the richne
ss of the book's contents. I owe special gratitude to Lundy Lewis, who has m
ade numerous and specific suggestions for improvement. With the ever-changin
g technology, I thank Subodh Bapat who pointed me to the latest in Web-based
management. Nouri Soued, who used the early manuscript to teach his class a
nd gave me feedback, is also acknowledged. I want to express my appreciation
to Professor Y.Yemini for getting me started right in my first attempt to w
rite a textbook. I would also liks to thank the following for reviewing the
manuscript and making constructive suggestions: Bruce S. Elenbogen. Melody M
oh, Richard Newman, Kihong Park. Adarsh Sethi, Raymond A. Vigeant, Alfred C.
Weaver, Brit Williams, and Taieb B. Znati.
The results of the interviews described in Chapter 1 generated positive
feedback from reviewers and students, and I thank the following for consenti
ng to be interviewed: Cas D’Angelo, Ron Hutchins, Dave Miller.John Mize, an
d John Mullin. Some of the case histories were provided by Rob Beverly, Ron
Hutchins, and Dave Miller.
I would like to add more interesting projects to Appendix B.9. If studen
ts/instructors have suggestions,I would appreciate hearing (manis@cc.gatech.
edu).
My thanks go to Susan Hartman (Acquisitions Editor). Katherine Harutunia
n
(Project Editor), and Patricia Mahtani (Production Supervisor), all of Addis
on Wesley Longman for their ever-willing cooperation in seeing this project
through its successful conclusion.
This hook would not have the seen daylight without the multitude of help
and personal sacrifice of my wife, Ruth. She has contributed to the book by
inputting revisions, acting as the local copy editor, and being production
manager of manuscripts at home.
Thank you, Ruth.
Mani Subramanian
(Mā’ne Sǖ brā mān’e ān)
CONTENTS
PART 1 Background 1
Chapter 1 Data Communications and Network Management Overview 3
1.1 Analogy of Telephone Network Management 4
1.2 Data (Computer) and Telecommunication Network 7
1.3 Distributed Computing Environments 12
1.4 TCP/IP--Based Networks: The Internet and intranets 16
1.5 Communications Protocols and Standards 20
1.5.1 Communication Architectures 21
1.5.2 Protocol Layers and Services 26
1.6 Case Histories of Networking and Management 32
1.6.1 Case History l: The Importance of Topology ("The Case of the Footp
rint") 32
1.6.2 Case History 2: Filtering Does Not Reduce Load on Node 33
1.6.3 Some Common Network Problems 35
1.7 Challenges of information Technology Managers 35
1.8 Network Management: Goals, Organization, and Functions 40
1.8.1 Goal of Network Management 40
1.8.2 Network Provisioning 42
1.8.3 Network Operations and the DOC 42
1.8.4 Network Installation and Maintenance 44
1.9 Network and System Management 44
1.10 Network Management System Platform 48
1.11 Current Status and Future of Network Management 48
Chapter 2 Review of Computer Network T6chnology 55
2.1 Network Topology 56
2.2 Local Area Networks 59
2.2.1 Ethernet 60
2.2.2 Fast Ethernet 62
2.2.3 Gigabit Ethernet 62
2.2.4 Full-Duplex Ethernets 66
2.2.5 Switched Ethernet 67
2.2.6 Virtual LANs 68
2.2.7 Token Ring 69
2.2.8 Fiber Distributed Data interface 72
2.3 Network Node Components 73
2.3.1 Hubs 74
2.3.2 Bridges 75
2.3.3 Remote Bridges 78
2.3.4 Transparent Bridges 78
2.3.5 Source Routing Bridges 80
2.3.6 Routers 80
2.3.7 Gateways and Protocol Converters 82
2.3.8 Multiprotocol Routers and Tunneling 84
2.3.9 Half-Bridge Configuration of Routers 84
2.3.10 Switches 85
2.4 Wide Area Networks 87
2.5 Transmission Technology 88
2.5.1 Wired Transmission 89
2.5.2 Wireless Transmission Media 90
2.5.3 Transmission Modes 90
2.6 Integrated Services: ISDN, Frame Relay, and Broadband 93
PART 2 SNAP, Broadband, and TAN Management 99
Chapter 3 Basic Foundations: Standards, Models. and Language 101
3.1 Network Management Standards 103
3.2 Network Management Model 105
3.3 Organization Model 107
3.4 Information Model 109
3.4.1 Management information Trees 11 1
3.4.2 Managed Object Perspectives 112
3.5 Communication Model 116
3.6 Abstract Syntax Notation One: ASN.1 117
3.6.1 Terminology, Symbols, and Conventions 118
3.6.2 Objects and Data Types 123
3.6.3 Object Names 129
3.6.4 An Example of ASN.1 from ISO 8824 130
3.7 Encoding Structure 132
3.8 Macros 133
3.9 Functional Model 135
Chapter 4 SNMPv1 Network Management: Organization and Information Models 141
4.1 Managed Network: Case Histories and Examples 143
4.2 The History of SNMP Management 148
4.3 Internet Organizations and Standards 149
4.3.1 Organizations 149
4.3.2 Internet Documents 149
4.4 The SAMP Model 152
4.5 The Organization Model 152
4.6 System Overview 155
4.7 The information Model 157
4.7.1 Introduction 157
4.7.2 The Structure of Management information 158
4.7.3 Managed Objects 167
4.7.4 Management information Base IS0
Chapter 5 SNMPv1 N6tWork Management: Corn Communication and Functional Model
s 203
5.1 The SNMP Communication Model 203
5.1.1 The SNMP Architecture 204
5.1.2 The Administrative Model 204
5.1.3 SNMP Protocol Specifications 208
5.1.4 SNMP Operations 211
5.1.5 The SAMP MIB Group 222
5.2 Functional Model 225
Chapter 6 SNW Management: SNWPv2 229
6.1 Major Changes in SNMPv2 230
6.2 SNMPv2 System Architecture 231
6.3 SNMPv2 Structure of Management information 233
6.3.1 SMI Definitions for SNMPv2 236
6.3.2 Information Modules 236
6.3.3 SNMP Keywords 238
6.3.4 Module Definitions 240
6.3.5 Object Definitions 241
6.3.6 Textual Conventions 247
6.3.7 Creation and Deletion of Rows in Tables 252
6.3.8 Notification Definitions 256
6.3.9 Conformance Statements 256
6.4 The SNMPv2 Management information Base 262
6.4.1 Changes to the System Group in SNMPv2 263
6.4.2 Changes to the SNMP Group in SNMPv2 264
6.4.3 Information for Notification in SNMPv2 166
6.4.4 Conformance information in SNMPv2 268
6.4.5 Expanded Internet MIB-II 268
6.5 SNMPv2 Protocol 269
6.5.1 The Data Structure of SNMPv2 PDUs 269
6.5.2 SNMPv2 Protocol Operations 27:
6.6 Compatibility with SNMPv1 277
6.6.1 The Bilingual Manager 277
6.6.2 The SNMP Proxy Server 278
Chapter 7 SNMP Management: SNMPv3 283
7.l SNMPv3 Documentation 284
7.2 SNMPv3 Documentation Architecture 285
7.3 Architecture 287
7.3.1 Elements of an Entity 287
7.3.2 Names 289
7.3.3 Abstract Service Interfaces 290
7.4 SNMPv3 Applications 292
7.4.1 The Command Generator 293
7.4.2 The Command Responder 294
7.4.3 The Notification Originator 296
7.4.4 The Notification Receiver 296
7.4.5 The Proxy Forwarder 296
7.5 SNMPv3 Management information Base 296
7.6 Security 300
7.6.l Security Threats 300
7.6.2 Security Model 301
7.6.3 Message Format 303
7.7 SNMPv3 User-Based Security Model 305
7.7.1 Authentication Protocols 308
7.7.2 Encryption Protocol 310
7.8 Access Control 311
7.8.1 Elements of the Model 311
7.8.2 The VACM Process 312
7.8.3 A VACM MIB 314
Chapter 8 SNMP Management: RMON 321
8.1 What is Remote Monitoring7 322
8.2 RMON SMI and MIB 323
8.3 RMON1 325
8.3.1 RMON1 Textual Conventions 325
8.3.2 RMON1 Groups and Functions 326
8.3.3 Relationship Between Control and Data Tables 329
8.3.4 RMON1 Common and Ethernet Groups 329
8.3.5 RMON Token Ring Extension Groups 333
8.4 RMONZ 334
8.4.1 The RMON2 Management information Base 335
8.4.2 RMON2 Conformance Specifications 337
8.5 ATM Remote Monitoring 338
8.6 A Case Study of Internet Traffic Using RMON 341
Chapter 9 Broadband Network management: ATM Networks 345
9.1 Broadband Networks and Services 345
9.2 ATM Technology 348
9.2.1 Virtual Path--Virtual Circuit 349
9.2.2 ATM Packet Size 351
9.2.3 Integrated Service 351
9.2.4 WAN/SONET 352
9.2.5 ATM LAN Emulation 352
9.2.6 Virtual LAN 356
9.3 ATM Network Management 358
9.3.1 The ATM Network Reference Model 358
9.3.2 The Integrated Local Management interface 359
9.3.3 The ATM Management information Base 361
9.3.4 The Role of SNMP and ILMI in ATM Management 361
9.3.5 MI Interface: Management of ATM Network Element 364
9.3.6 M2 Interface: Management of Private Networks 366
9.3.7 M3 Interface: Customer Network Management of Public Networks 368
9.3.8 M4 Interface: Public Network Management 372
9.3.9 Management of LAN Emulation 381
9.3.10 ATM Digital Exchange interface Management 383
Chapter 10 Broadband Network Management 387
10.1 Broadband Access Networks and Technologies 388
10.1.1 Broadband Access Networks 388
10.1.2 Broadband Access Technology 390
10.2 HFC Technology 391
10.2.1 The Broadband LAN 393
10.2.2 The Cable Modem 394
10.2.3 The Cable Modem Termination System 397
10.2.4 The HFC Plant 397
10.2.5 The RF Spectrum for Cable Modem 397
10.3 Data Over Cable Reference Architecture 399
10.4 HFC Management 401
10.4.1 Cable Modem and CMTS Management 402
10.4.2 HFC Link Management 407
10.4.3 RF Spectrum Management 407
10.5 DSL Technology 405
10.6 Asymmetric Digital Subscriber Line Technology 409
10.6.1 Role of the ADSL Access Network in an Overall Network 411
10.6.2 ADSL Architecture 413
10.6.3 ADSL Channeling Schemes 414
10.6.4 ADSL Encoding Schemes 415
10.7 ADSL Management 415
10.7.1 ADSL Network Management Elements 417
10.7.2 ADSL Configuration Management 417
10.7.3 ADSL Fault Management 419
10.7.4 ADSL Performance Management 420
10.7.5 SNMP-Based ADSL Line MIB 420
10.7.6 MIB Integration with Interfaces Groups in MIB-2 422
10.7.7 ADSL Configuration Profiles 423
Chapter 11 Telecommunications Management Network 429
11.1 Why TMN? 430
11.2 Operations Systems 431
11.3 TMN Conceptual Model 433
11.4 TMN Standards 435
11.5 TMN Architecture 438
11.5.1 Functional Architecture 438
11.5.2 Physical Architecture 441
11.5.3 Information Architecture 442
11.6 TMN Management Service Architecture 443
11.7 An integrated View of TMN 445
11.8 Implementation Issues 446
PART 3 Management Tools, Systems, and Applications 453
Chapter 12 Network Management Tools and Systems 455
12.1 Network Management Tools 457
12.1.1 Tools Catalog 457
12.l.2 Bit Error Rate Tester 461
12.1.3 Basic Software Tools 462
12.l.4 SAMP MIB Tools 469
12.1.5 The Protocol Analyzer 472
12.2 Network Statistics Measurement Systems 474
12.2.1 Traffic Load Monitoring 475
12.2.2 Protocol Statistics 475
12.2.3 Data and Error Statistics 477
12.2.4 Using MRTG to Collect Traffic Statistics 477
12.3 History of Enterprise Management 479
12.4 Network Management Systems 480
12.4.1 Functional Components 480
12.4.2 Multiple NMS Configuration 482
12.4.3 Network Management System Requirements 483
12.5 Commercial Network Management Systems 488
12.5.1 Hewlett-Packard's OpenView Network Node Manager 489
12.5.2 Cabletron's Spectrum Platform 490
12.5.3 Sun Network Management Systems Family 493
12.6 System Management 494
12.6.1 High-End System Management 495
12.6.2 Low-End System Management 495
12.7 Enterprise Management Solutions 496
12.7.1 Computer Associates Unicenter TNG 496
12.7.2 Tivoli Enterprise Manager 497
Chapter 13 Network Management Applications 501
13.1 Configuration Management 504
13.1.1 Network Provisioning 505
13.l.2 Inventory Management 506
13.l.3 Network Topology 506
13.2 Fault Management 509
13.2.1 Fault Detection 510
13.2.2 Fault Location and Isolation Techniques 510
13.3 Performance Management 510
13.3.1 Performance Metrics 511
13.3.2 Data Monitoring 512
13.3.3 Problem Isolation 513
13.3.4 Performance Statistics 513
13.4 Event Correlation Techniques 514
13.4.1 Rule-Based Reasoning 515
13.4.2 Model-Based Reasoning 517
13.4.3 Case-Based Reasoning 519
13.4.4 Codebook Correlation Model 522
13.4.5 State Transition Graph Model 527
13.4.6 Finite State Machine Model 529
13.5 Security Management 530
13.5.1 Policies and Procedures 531
13.5.2 Security Breaches and the Resources Needed to Prevent Them 532
13.5.3 Firewalls 533
13.5.4 Cryptography 535
13.5.5 Authentication and Authorization 541
13.5.6 Client/Server Authentication Systems 541
13.5.7 Message Transfer Security 543
13.5.8 Protection of Networks from Virus Attacks 548
13.6 Accounting Management 548
13.7 Report Management 549
13.8 Policy-Based Management 550
13.9 Service Level Management 552
Chapter 14 Web-Based Management 557
14.1 NMS with Web interface and Web-Based Management 559
14.2 Web interface to SNMP Management 560
14.3 Embedded Web-Based Management 562
14.4 Desktop Management Interface 563
14.5 Web-Based Enterprise Management 566
14.6 WBEM: Windows Management instrumentation 570
14.7 Java Management Extensions 571
14.7.1 Service-Driven Network 571
14.7.2 Java Dynamic Management Kit 572
14.7.3 JMX Architecture 574
14.8 Management of a Storage Area Network: The Jiro Platform 575
14.9 Future Directions 576
Appendix A OSI Network and System Management 579
A.1 OSI Management Standards 580
A.2 System Overview 580
A.3 Organization Model 584
A.4 Information Model 584
A.4.1 Structure of Management information 584
A.4.2 Managed Object Class and instance 585
A.4.3 Inheritance 587
A.4.4 Management Information Trees 588
A.4.5 Guidelines for Definition of Managed Object Templates 590
A.5 The Communication Model 592
A.5.1 System Management Application Entity 592
A.6 Application Functions Management 595
Appendix B Project Suggestions 599
B.1 Project Structure and Evaluation .599
B.2 Projects 600
Selected Bibliography
Index
--
请大声朗读下面的小诗并认真体会其中的意境:
暗石绿,暗石竹,暗石透春绿,暗石透春竹。
※ 来源:·哈工大紫丁香 bbs.hit.edu.cn·[FROM: 218.7.32.75]
Powered by KBS BBS 2.0 (http://dev.kcn.cn)
页面执行时间:211.492毫秒