Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000004302778 | TK5105.5 M844 2003 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Empowered by today's high-performance computers interconnected over LANs and WANs, companies are faced with the daunting task of bringing workability to the diversity and complexity of today's data communications landscape. This comprehensive resource addresses key network management challenges, showing how to: tie together incompatible LANs; meld legacy systems and LANs; extend the reach of LANs with wireless links; protect information assets from various disaster scenarios; and consolidate multi-protocol traffic over a single WAN backbone in a way that guarantees appropriate service levels.
Author Notes
Nathan J. Muller holds an M.A. in Social and Organizational behavior from George Washington University.
Muller is a managing partner and consultant at the Ascent Solutions Group, LLC in Sterling, VA. He is also the author of IP Convergence: The Next Revolution in Telecommunications, Wireless Data Networking, and Intelligent Hubs (Artech House, 2000, 1999, 1995, 1994). He has 27 years of industry experience. He is the author of 15 books, including Desktop Encyclopedia of the Internet (Artech House, 1998) and over 1,500 published articles. He serves on the editorial board for the International Journal of Network Management.
050
Table of Contents
Preface | p. xvii |
Chapter 1 Local Area Networks | p. 1 |
1.1 Introduction | p. 1 |
1.2 Ethernet | p. 2 |
1.2.1 Frame Format | p. 2 |
1.2.2 Media Access Control | p. 4 |
1.3 10BaseT | p. 6 |
1.3.1 Performance | p. 6 |
1.3.2 Media | p. 7 |
1.3.3 Media Connections | p. 7 |
1.3.4 Hubs | p. 8 |
1.3.5 Management | p. 9 |
1.4 Fast Ethernet | p. 10 |
1.4.1 Compatibility | p. 10 |
1.4.2 Media Choices | p. 10 |
1.5 Gigabit Ethernet | p. 11 |
1.6 Token Ring | p. 13 |
1.6.1 Advantages of Token Ring | p. 14 |
1.6.2 Frame Format | p. 15 |
1.6.3 Operation | p. 16 |
1.6.4 Dedicated Token Ring | p. 17 |
1.6.5 High-Speed Token Ring | p. 17 |
1.7 Other LANs | p. 18 |
1.7.1 ARCnet | p. 19 |
1.7.2 StarLAN | p. 20 |
1.7.3 Fiber Distributed Data Interface | p. 21 |
1.8 Conclusion | p. 27 |
Chapter 2 LAN Administration | p. 29 |
2.1 Introduction | p. 29 |
2.2 Console and Agents | p. 29 |
2.2.1 Intelligent Agents | p. 31 |
2.2.2 Agent Behavior | p. 32 |
2.2.3 Agent Applications | p. 34 |
2.3 Automating Software Distribution | p. 39 |
2.4 Monitoring File Use | p. 41 |
2.5 Virus Scanning | p. 41 |
2.6 Printer Management | p. 42 |
2.7 Storage Management | p. 43 |
2.7.1 Monitoring Disk Use | p. 43 |
2.7.2 Hierarchical Storage Management | p. 44 |
2.7.3 Storage Area Networks | p. 45 |
2.7.4 Outsourcing Storage Management | p. 46 |
2.8 Reporting Bindery Data | p. 47 |
2.9 Process Scheduling | p. 48 |
2.10 Console Text Viewer | p. 49 |
2.11 Tracking Network Activity | p. 50 |
2.12 Integrated Help Desk | p. 52 |
2.13 Conclusion | p. 53 |
Chapter 3 LAN Restoration Planning | p. 55 |
3.1 Introduction | p. 55 |
3.2 Network Reliability | p. 55 |
3.2.1 Star Topology | p. 55 |
3.2.2 Ring Topology | p. 56 |
3.2.3 Bus Topology | p. 56 |
3.3 Network Availability | p. 57 |
3.4 Recovery Options | p. 58 |
3.5 Server Restoration Capabilities | p. 60 |
3.6 Data Protection | p. 62 |
3.6.1 Hardware Solutions | p. 62 |
3.6.2 Software Solutions | p. 63 |
3.6.3 Redundant Arrays of Inexpensive Disks | p. 65 |
3.6.4 Server Blades | p. 67 |
3.6.5 Automated Operations | p. 68 |
3.6.6 Off-Site Data Storage | p. 69 |
3.7 Servers on the WAN | p. 70 |
3.7.1 Load Balancing | p. 70 |
3.7.2 Caching | p. 71 |
3.7.3 Queuing | p. 72 |
3.8 Storage Area Networks | p. 73 |
3.9 Other Considerations | p. 73 |
3.9.1 Uninterruptible Power Supplies | p. 73 |
3.9.2 Generators | p. 74 |
3.9.3 Surge Suppressors | p. 74 |
3.9.4 Spare Parts Pooling | p. 74 |
3.10 Conclusion | p. 75 |
Chapter 4 Storage Network Management | p. 77 |
4.1 Introduction | p. 77 |
4.2 Storage Area Networks | p. 79 |
4.2.1 SAN Advantages | p. 79 |
4.2.2 SAN Evolution | p. 81 |
4.2.3 SAN Components | p. 84 |
4.2.4 Role of Hubs and Switches | p. 85 |
4.2.5 Zoning | p. 86 |
4.2.6 Security | p. 87 |
4.2.7 SAN Management | p. 88 |
4.2.8 Management Interoperability | p. 92 |
4.3 Emerging Role of IP | p. 92 |
4.4 Storage Virtualization | p. 94 |
4.5 Testing | p. 96 |
4.6 Conclusion | p. 96 |
Chapter 5 Managing Bridges, Routers, Gateways | p. 99 |
5.1 Introduction | p. 99 |
5.2 Bridges | p. 100 |
5.2.1 Transparent Bridging | p. 102 |
5.2.2 Source-Route Bridging | p. 103 |
5.2.3 Translation Bridging | p. 103 |
5.2.4 Source-Route Tranlation Bridging | p. 105 |
5.3 Routers | p. 106 |
5.3.1 Types of Routing | p. 107 |
5.3.2 Types of Routers | p. 108 |
5.3.3 Routing Protocols | p. 109 |
5.4 Gateways | p. 116 |
5.4.1 Gateway Applications | p. 117 |
5.4.2 Facilitative Protocols | p. 119 |
5.5 Conclusion | p. 124 |
Chapter 6 Managing the Wireless Infrastructure | p. 127 |
6.1 Introduction | p. 127 |
6.2 Configuration Details | p. 130 |
6.3 Mobile IP | p. 136 |
6.4 Spanning Tree Protocol | p. 138 |
6.5 Performance Monitoring | p. 142 |
6.6 Applying Filters | p. 144 |
6.7 Logs | p. 147 |
6.8 Setting SNMP Traps | p. 147 |
6.9 Conclusion | p. 148 |
Chapter 7 Managing Voice Systems | p. 149 |
7.1 Introduction | p. 149 |
7.2 Historical Perspective | p. 149 |
7.3 PBX Components | p. 152 |
7.3.1 Central Processor | p. 153 |
7.3.2 Memory | p. 153 |
7.3.3 Matrix | p. 153 |
7.4 Centralized Versus Distributed Systems | p. 156 |
7.5 Virtual Networks | p. 158 |
7.5.1 Advantages of VPNs | p. 159 |
7.5.2 VPN Architecture | p. 160 |
7.5.3 VPN Features | p. 161 |
7.5.4 Billing Options | p. 162 |
7.5.5 Network Management | p. 163 |
7.5.6 Local VPN Service | p. 164 |
7.6 Call Detail Reporting | p. 164 |
7.6.1 Benefits | p. 165 |
7.6.2 Operation | p. 165 |
7.6.3 Call Detail Records | p. 167 |
7.6.4 Call Costing | p. 168 |
7.6.5 Outsourcing | p. 169 |
7.6.6 Web-Based Reporting | p. 169 |
7.7 IP PBXs | p. 170 |
7.7.1 Administration | p. 170 |
7.7.2 Managed Services | p. 172 |
7.8 Wireless PBX Systems | p. 172 |
7.8.1 Applications | p. 173 |
7.8.2 System Components | p. 173 |
7.8.3 Call Handoff Scenario | p. 176 |
7.9 Centrex | p. 177 |
7.9.1 Centrex Features | p. 178 |
7.9.2 Customer Premises Equipment | p. 178 |
7.9.3 IP Centrex | p. 179 |
7.10 Conclusion | p. 181 |
Chapter 8 Managing the TDM Infrastructure | p. 183 |
8.1 Introduction | p. 183 |
8.2 Multiplexers | p. 184 |
8.2.1 Time Division Multiplexers | p. 185 |
8.2.2 Statistical Time Division Multiplexing | p. 185 |
8.2.3 Points of Differentiation | p. 187 |
8.3 The Backbone Network | p. 191 |
8.3.1 Private Networking | p. 191 |
8.3.2 Public Networking | p. 192 |
8.4 Public and Private Network Interoperability | p. 193 |
8.5 Voice Compression | p. 194 |
8.6 Data Support | p. 195 |
8.7 Clear Channel Capability | p. 195 |
8.8 ISDN | p. 196 |
8.9 Role of Digital Cross-Connect Systems | p. 198 |
8.9.1 Customer-Controlled Reconfiguration | p. 199 |
8.9.2 Selecting a Carrier-Provided Service | p. 202 |
8.9.3 Implementing a DCS Network | p. 204 |
8.10 Conclusion | p. 205 |
Chapter 9 Managing Link Performance with CSU-DSUs | p. 207 |
9.1 Introduction | p. 207 |
9.2 Digital Data Services | p. 208 |
9.3 CSU Functionality | p. 209 |
9.3.1 Clear Channel Capability | p. 212 |
9.3.2 Diagnostics | p. 213 |
9.3.3 Circuit Maintenance | p. 214 |
9.3.4 Impairment Testing | p. 216 |
9.4 Carrier Testing Services | p. 216 |
9.5 User-Controlled Diagnostics | p. 217 |
9.6 Fractional T1 | p. 218 |
9.7 Integrated Solutions | p. 218 |
9.8 Integral Protocol Analyzers | p. 220 |
9.9 SNMP for Management | p. 221 |
9.10 Disaster Recovery | p. 221 |
9.11 Service-Level Management | p. 222 |
9.12 Conclusion | p. 224 |
Chapter 10 Managing High-Speed Packet Networks | p. 225 |
10.1 Introduction | p. 225 |
10.2 Frame Relay | p. 225 |
10.2.1 Advantages of Frame Relay | p. 226 |
10.2.2 Types of Circuits | p. 227 |
10.2.3 Congestion Control | p. 228 |
10.2.4 Frame Relay Charges | p. 229 |
10.2.5 Voice over Frame Relay | p. 230 |
10.3 Asynchronous Transfer Mode | p. 231 |
10.3.1 Applications | p. 231 |
10.3.2 Quality of Service | p. 232 |
10.3.3 Virtual Circuits | p. 234 |
10.3.4 ATM Layers | p. 236 |
10.3.5 Inverse Multiplexing over ATM | p. 236 |
10.4 IP Networks | p. 239 |
10.4.1 Operating Characteristics | p. 240 |
10.4.2 Addressing | p. 241 |
10.4.3 Services on the Internet | p. 242 |
10.4.4 Management | p. 243 |
10.4.5 Intranets and Extranets | p. 243 |
10.5 Conclusion | p. 253 |
Chapter 11 Network Management Systems | p. 255 |
11.1 Introduction | p. 255 |
11.2 Management System Evolution | p. 256 |
11.3 Management in the Wired World | p. 257 |
11.4 The Mechanics of SNMP | p. 258 |
11.4.1 Management Station | p. 259 |
11.4.2 Management Agents | p. 260 |
11.4.3 Management Information Base | p. 261 |
11.4.4 Remote Network Monitor | p. 263 |
11.4.5 RMON2 | p. 267 |
11.5 Graphical SNMP Tools | p. 269 |
11.6 SNMP on Wireless Networks | p. 270 |
11.6.1 Performance of SNMP | p. 270 |
11.6.2 Platform Support for Wireless | p. 271 |
11.7 Telecommunications Management Network | p. 273 |
11.7.1 Benefits of TMN | p. 274 |
11.7.2 Standards | p. 274 |
11.7.3 Functional Architecture | p. 275 |
11.7.4 Physical Architecture | p. 275 |
11.8 Open Source Management Tools | p. 277 |
11.8.1 Sample Tools | p. 278 |
11.8.2 Risk Factors | p. 283 |
11.9 Conclusion | p. 284 |
Chapter 12 Managing Service Quality | p. 285 |
12.1 Introduction | p. 285 |
12.2 Role of ATM | p. 285 |
12.3 Adding QoS to Frame and IP | p. 287 |
12.4 Policy-Based QoS Management | p. 288 |
12.5 Software Solutions | p. 290 |
12.6 Hardware Solutions | p. 293 |
12.7 Service Level Agreements | p. 296 |
12.7.1 Performance Metrics | p. 297 |
12.7.2 SLA Compliance | p. 298 |
12.8 Conclusion | p. 299 |
Chapter 13 Managing Network Security | p. 301 |
13.1 Introduction | p. 301 |
13.2 Threat Assessment | p. 301 |
13.3 Securing the Workplace | p. 302 |
13.4 Securing the Network | p. 303 |
13.4.1 User Names and Passwords | p. 304 |
13.4.2 Single-Point Logon | p. 305 |
13.4.3 Key and Card Systems | p. 305 |
13.4.4 Biometrics | p. 306 |
13.4.5 Disk and Drive Controls | p. 309 |
13.5 Data Encryption | p. 310 |
13.5.1 Symmetric Versus Asymmetric | p. 311 |
13.5.2 Digital Encryption Standard | p. 311 |
13.5.3 Recommendations for Implementing Encryption | p. 312 |
13.5.4 Encryption Deployment Issues | p. 316 |
13.6 Virus Protection | p. 318 |
13.7 Firewalls | p. 320 |
13.8 Intrusion Detection Systems | p. 326 |
13.9 Remote Access Security | p. 327 |
13.9.1 Security Measures | p. 327 |
13.9.2 Callback Security Systems | p. 328 |
13.9.3 Link Level Protocols | p. 329 |
13.10 Policy-Based Security | p. 330 |
13.11 Network Management System Security | p. 331 |
13.12 Security Personnel | p. 332 |
13.13 Security Training | p. 334 |
13.14 Conclusion | p. 334 |
Chapter 14 Network Planning and Design Tools | p. 337 |
14.1 Introduction | p. 337 |
14.2 Network Documentation Tools | p. 338 |
14.3 Network Design Tools | p. 342 |
14.4 Network-Specific Tools | p. 346 |
14.4.1 Designing IP Nets | p. 347 |
14.4.2 Designing Wireless Nets | p. 348 |
14.4.3 Predicting Network Performance | p. 350 |
14.5 Systems Design | p. 352 |
14.6 Conclusion | p. 355 |
Chapter 15 WAN Restoration Planning | p. 357 |
15.1 Introduction | p. 357 |
15.2 Redundant Carrier Systems | p. 357 |
15.2.1 Switching Systems | p. 358 |
15.2.2 Signal Transfer Points | p. 358 |
15.2.3 Network Control Points | p. 359 |
15.2.4 Digital Interface Frames | p. 359 |
15.2.5 Power Systems | p. 359 |
15.2.6 Cable, Building, and Signaling Diversity | p. 360 |
15.2.7 Real-Time Network Routing | p. 360 |
15.3 Carrier Restoration Services | p. 361 |
15.4 Fiber Network Restoration | p. 362 |
15.5 Packet Data Network Recovery | p. 365 |
15.6 LEC Restoration Services | p. 366 |
15.7 Competitive Access Providers | p. 368 |
15.8 T1 Restoration | p. 369 |
15.8.1 T1 Backup Via ISDN | p. 369 |
15.8.2 Automatic Routing and Rerouting | p. 370 |
15.8.3 Dial Backup | p. 371 |
15.8.4 Network Modeling | p. 372 |
15.8.5 Inverse Multiplexing | p. 373 |
15.9 DDS Dial Backup | p. 373 |
15.10 Intelligent Calling Systems | p. 375 |
15.11 Dial Backup Units | p. 376 |
15.12 Satellite-Based Restoration | p. 376 |
15.13 LAN Internets | p. 377 |
15.14 Conclusion | p. 379 |
Chapter 16 Maintenance and Support Services | p. 381 |
16.1 Introduction | p. 381 |
16.2 Do-It-Yourself Approach | p. 382 |
16.2.1 Resource Requirements | p. 384 |
16.2.2 User Support | p. 384 |
16.2.3 Technical Support | p. 388 |
16.2.4 Operations Management | p. 389 |
16.3 Reporting Requirements | p. 390 |
16.4 Equipment Requirements | p. 391 |
16.4.1 Spares Inventory | p. 392 |
16.4.2 Test Equipment | p. 392 |
16.4.3 Service and Repair Documentation | p. 393 |
16.5 Vendor and Carrier Services | p. 394 |
16.6 Maintenance Firms | p. 395 |
16.7 Cooperative Maintenance Programs | p. 396 |
16.8 Cabling Considerations | p. 397 |
16.8.1 Premises Wiring | p. 397 |
16.8.2 Cable Plant as an Asset | p. 398 |
16.8.3 Cable Planning | p. 399 |
16.8.4 Wireless Extension | p. 400 |
16.9 Operating Systems | p. 401 |
16.10 Conclusion | p. 402 |
Acronyms | p. 405 |
About the Author | p. 423 |
Index | p. 425 |