scispace - formally typeset
Search or ask a question

Showing papers on "Network management published in 1983"


Journal ArticleDOI
T. P. Sullivan1
TL;DR: This essay presents the evolution of support included in IBM'S Systems Network Architecture to meet these needs to meet hierarchical growth and diversification of communications networks.
Abstract: Hierarchical growth and diversification of communications networks have imposed new requirements on Communications Network Management. This essay presents the evolution of support included in IBM'S Systems Network Architecture to meet these needs. Four main provisions of network management are discussed: (1) the collection and presentation of downstream network data on behalf of network resources by a Threshold Analysis and Remote Access program; (2) centralized network operator terminal access to local and remote systems by a Terminal Access Facility; (3) unsolicited alerting of the network operator by the presentation of data from networrke sources by a Network Problem Determination Application; and (4) the collection and presentation of data for the logical network by a Network Logical Data Manager.

15 citations


Journal ArticleDOI
G. C. Ebner1, D. G. Haenschke1
TL;DR: Advances in manual controls and real-time network performance monitoring have been accomplished through the introduction of computer-based systems that provide network managers with preprocessed network performance data and with the ability to intervene in problems that require human judgment.
Abstract: This paper describes steps that have been taken to respond to the need for better network management in the evolving telecommunications network. In near-real time, network management functions recognize the onset of an overload and respond with control actions that change normal call routing through expansive or restrictive traffic controls. Emphasis is being placed on improved automatic controls that are built into the network and its switching systems. Advances in manual controls and real-time network performance monitoring have been accomplished through the introduction of computer-based systems that provide network managers with preprocessed network performance data and with the ability to intervene in problems that require human judgment.

6 citations


Journal ArticleDOI
A. L. Scherr1
TL;DR: This is an essay on the dynamics of the relationships between communications and computing, inlcuding those of microprocessors and teleconferencing, and the influence and requirements of several new technologies are presented.
Abstract: Presented is an essay on the dynamics of the relationships between communications and computing. Movement of computer applications from the back office to the front office, from batch to on-line data processing, is illustrated and conclusions are drawn regarding communications protocols, network management, application and data base design, and system generality. The influence and requirements of several new technologies are presented, inlcuding those of microprocessors and teleconferencing.

5 citations


Proceedings ArticleDOI
Ronald Kaufman1
01 Oct 1983
TL;DR: Queuing, additional route access, and exemption from network management controls are capable of providing this grade of service to the precedence user on the public network with minimal impact on public service.
Abstract: A purpose of the Defense Switched Network project is to investigate means of providing government communications systems capable of serving Department of Defense administrative and Command and Control (C2) traffic. This includes the absorption of current AUTOVON traffic. The government customer has a number of unique requirements not reflected in current commercial offerings. One such requirement is precedence treatment for a subset of government users. In times of national emergency, precedence government users require essentially nonblocking service with minimal delay. Queuing, additional route access, and exemption from network management controls are capable of providing this grade of service to the precedence user on the public network with minimal impact on public service. This paper describes these network management techniques and analytically evaluates their effectiveness.

3 citations


Book ChapterDOI
19 Jan 1983
TL;DR: This paper describes a fault-tolerant fiber optic LAN with event driven, decentral and collisionfree access control, called the RDC-Ring, which is based on the ISO Reference Model of Open Systems Interconnections.
Abstract: Nowadays, the tasks of industrial automation of the office and of technical systems become increasingly more voluminous and complex In particular one recognizes a strong trend towards the interconnection of computer aided singular solutions for different applications in process control, industrial management, design and development etc This situation requires the reliable powerful and economic interconnection of distributed computer systems by means of local area networks (LAN’s) This paper describes a fault-tolerant fiber optic LAN with event driven, decentral and collisionfree access control It is called the RDC-Ring The design principles with respect to basic mechanisms influencing the performance characteristics and measures for fault diagnosis and fault tolerance are discussed Then the protocol corresponding to the bottom two layers of the ISO Reference Model of Open Systems Interconnections is described in some detail with all services including the network management services Finally some results and experiences of several industrial control systems are reported

3 citations


Journal ArticleDOI
TL;DR: The setup of the facility is described; the techniques for managing its operation are presented and some of the management techniques apply in an education support facility network.
Abstract: Productive operation of a large computer network serving multiple user facilities in conjunction with several host sites requires the use of network management. As treated here, network management includes an array of such methods as communication systems management, problem management, change management, and inventory management. In this paper the use of some of the management techniques is described as they apply in an education support facility network. The setup of the facility is first described; then some of the techniques for managing its operation are presented.

2 citations


Journal ArticleDOI
W. S. Bartz1, R. W. Patterson1
TL;DR: During periods of network stress, network management (real-time monitoring and control of the network) assures optimum call-carrying capacity and, within minutes, provides a national overview of exceptional conditions.
Abstract: During periods of network stress, network management (real-time monitoring and control of the network) assures optimum call-carrying capacity To assure timely reactions to network overloads and failures, the national Network Operations Center coordinates the activities of a set of network management operations centers Supporting the Network Operations Center, the Network Operations Center System collects data for major network elements and, within minutes, provides a national overview of exceptional conditions

2 citations


Journal ArticleDOI
31 Jul 1983
TL;DR: Users of machi nereadab le data files (MRDF) bear the responsibility to share information about data files as well as to share access to data files.
Abstract: Users of machi nereadab le data files (MRDF) bear the responsibility to share information about data files as well as to share access to data files. Anyone needing a particular data file would find it useful to be able to sit down at a terminal and call up a record of that file by author or title or a variety of control numbers, find out where that data file is and at the same time find out how to access the file, wherever it happens to be. This presumes that someone has entered that record into the database in order to be able to retrieve it.

1 citations


Journal Article
TL;DR: Significant characteristics of the project include the high level of cooperation exerted by many different agencies and institutions, the participation by all acute-care institutions within the state, the initial large expenditure of funds to build resources within individual institutions, and the system development approach to the delivery of RML services.
Abstract: A cooperative effort by a regional medical library (RML) program, a college of human medicine, a university library system, and numerous individual health care institutions to develop a network for the delivery of health sciences information within the state of Wyoming is described This development consisted of four phases: collection building, training of library managers, consortia formation, and establishment of a state-based network management mechanism Significant characteristics of the project include the high level of cooperation exerted by many different agencies and institutions, the participation by all acute-care institutions within the state, the initial large expenditure of funds to build resources within individual institutions, and the system development approach to the delivery of RML services that this project represents

1 citations


Proceedings ArticleDOI
01 Oct 1983
TL;DR: This paper highlights network management and control issues raised by these different uses of national military systems to enhance NATO communications survivability and flexibility across the threat spectrum.
Abstract: NATO is placing increased emphasis on the effective utilization of national military and PTT networks as an approach to achieve an early enhancement of the NATO Integrated Communications System (NICS) presently under implementation. Concepts for interconnection with national military transmission and switched networks are under active consideration to extend NICS services and enhance NICS survivability and flexibility. These concepts necessitate a much greater focus on interoperability aspects and on NATO/national interface arrangements across network boundaries for management and control. This paper highlights network management and control issues raised by these different uses of national military systems to enhance NATO communications survivability and flexibility across the threat spectrum.