scispace - formally typeset
Search or ask a question

Showing papers on "Network management published in 2000"


Book
01 Jan 2000
TL;DR: This book is designed for introductory one-semester or one-year courses in communications networks in upper-level undergraduate programs and assumes a general knowledge of computer systems and programming, and elementary calculus.
Abstract: This book is designed for introductory one-semester or one-year courses in communications networks in upper-level undergraduate programs. The second half of the book can be used in more advanced courses. As pre-requisites the book assumes a general knowledge of computer systems and programming, and elementary calculus. The second edition expands on the success of the first edition by updating on technological changes in networks and responding to comprehensive market feedback. Table of contents 1 Communication Networks and Services 2 Layered Architectures 3 Digital Transmission Fundamentals 4 Circuit-Switching Networks 5 Peer-to-Peer Protocols and Data Link Layer 6 Medium Access Control Protocols and Local Area Networks 7 Packet-Switching Networks 8 TCP/IP 9 ATM Networks 10 Advanced Network Architectures 11 Security Protocols 12 Multimedia Information and Networking Appendix A Delay and Loss Performance Appendix B Network Management

824 citations


Journal ArticleDOI
TL;DR: In this paper, the central concepts of a theory of networks and of network management are discussed, and the authors argue that government's special resources and its unique legitimacy as representative of the common Interest make it the outstanding candidate for fulfilling the role of network manager, a role which means arranging and facilitating interaction processes within networks In such a way that problems of under or non representation are properly addressed and interests are articulated and dealt with in an open, transparent and balanced manner.
Abstract: In this article we address the elaboration of the central concepts of a theory of networks and of network management. We suggest that the network approach builds on several theoretical traditions. After this we clarify the theoretical concepts and axioms of the policy network approach and argue that this framework has important explanatory power both on the level of strategic interaction processes as well as on the level of institutional relations. We argue that government's special resources and its unique legitimacy as representative of the common Interest make it the outstanding candidate for fulfilling the role of network manager, a role which means arranging and facilitating interaction processes within networks In such a way that problems of under or non representation are properly addressed and interests are articulated and dealt with in an open, transparent and balanced manner.

547 citations


Journal ArticleDOI
TL;DR: The Real-Time CORBA specification includes features to manage CPU, network and memory resources and helps decrease the cycle time and effort required to develop high-quality systems by composing applications using reusable software component services rather than building them entirely from scratch.
Abstract: A growing class of real-time systems require end-to-end support for various quality-of-service (QoS) aspects, including bandwidth, latency, jitter and dependability. Applications include command and control, manufacturing process control, videoconferencing, large-scale distributed interactive simulation, and testbeam data acquisition. These systems require support for stringent QoS requirements. To meet this challenge, developers are turning to distributed object computing middleware, such as the Common Object Request Broker Architecture, an Object Management Group (OMG) industry standard. In complex real-time systems, DOC middleware resides between applications and the underlying operating systems, protocol stacks and hardware. CORBA helps decrease the cycle time and effort required to develop high-quality systems by composing applications using reusable software component services rather than building them entirely from scratch. The Real-Time CORBA specification includes features to manage CPU, network and memory resources. The authors describe the key Real-Time CORBA features that they feel are the most relevant to researchers and developers of distributed real-time and embedded systems.

301 citations


Patent
Shallendra Sharma1, Hung Truong1
05 Dec 2000
TL;DR: In this article, a secure communication path is established between the network management server and a mobile wireless capable device, where the network asset is managed via the secure path with the mobile wireless-capable device.
Abstract: Systems and methods of providing mobile network management of assets on a network are presented. In accordance with the method, a network management server is provided to control a network asset on a network. The network asset is connected to the network management server via a connection path. A secure communication path is established between the network management server and a mobile wireless capable device. The network asset is managed via the secure communication path with the mobile wireless capable device. The network is administered via the secure communication path with the mobile wireless capable device.

234 citations


Patent
22 Sep 2000
TL;DR: In this article, a method and apparatus for concurrently displaying from a single window on a network management station the health status of all network devices and objects of a computer network is presented.
Abstract: A method and apparatus for concurrently displaying from a single window on a network management station the health status of all network devices and objects of a computer network. The network devices may be categorized according to state or device type, as determined by the network manager. The method and apparatus provides a network manager with the ability to determine the current state of network devices and objects within an enterprise network and invoke further actions such as configuration, performance, fault, and security management tasks. The network manager can drag and drop icons from one network management system application window to another network management system application window to obtain fault information about network devices and objects, thus allowing multiple network management system applications to run concurrently on the same network management station. The network manager is further able to add new network devices and objects by dragging site, folder or device icons from one network management system application window to a second network management system application window for displaying the health status of the new devices. The dragged-in devices are added to the appropriate status panes within the second window according to the method of the present invention.

196 citations


Proceedings Article
08 Dec 2000
TL;DR: FlowScan analyzes and reports on flow data exported by Internet Protocol routers, an assemblage of perl scripts and modules and is the glue that binds together other freely available components such as a flow collection engine, a high performance database, and a visualization tool.
Abstract: nternet traffic flow profiling has become a useful technique in the passive measurement and analysis field. The prerequisites for flow-based measurements are now available within the network infrastructure - particularly, in popular Cisco network devices. The integration of this feature has enabled the "flow" concept to become a valuable tool for the network administrator, as it had been in the past for the researcher.This paper describes FlowScan, a software package for open systems that is freely available under the terms of the GNU General Public License. FlowScan analyzes and reports on flow data exported by Internet Protocol routers. It is an assemblage of perl scripts and modules and is the glue that binds together other freely available components such as a flow collection engine, a high performance database, and a visualization tool. Once assembled, the FlowScan system produces graph images, suitable for use in web pages. These provide a continuous, near real-time view of the network traffic through a network's border.Although there are now a number of tools available that collect and process flow data, there is a dearth of visualization tools. By utilizing freely available software tools, FlowScan can be readily deployed in most modern educational institution, corporate, and ISP networks. The information presented by FlowScan assists in understanding the nature of the traffic that your network is carrying. It can be useful in the identification and investigation of anomalies such as poor performance and attacks on hosts. It can provide a foundation on which to develop usage-based billing or to verify the effectiveness of Quality-of-Service policies. By understanding the flows of traffic carried by the network, your institution should be able to make informed network management and bandwidth provisioning decisions.

196 citations


Patent
14 Feb 2000
TL;DR: The element management system (EMS) as discussed by the authors addresses the need for effective and efficient management of heterogeneous telecommunications networks that include network elements of different types (i.e., radios and fiber optic devices, made by different manufacturers).
Abstract: The element management system ('EMS') of the present invention addresses the need for effective and efficient management of heterogeneous telecommunications networks that include network elements of different types (530, 531, 532, 533), such as radios and fiber optic devices, made by different manufacturers. This EMS provides a core set of element-independent network management messages that support basic network management functions, such as fault and performance monitoring (503) and configuration management (502). Element-independent messages to an individual network element are mapped to an element-dependent message for that network element; messages from individual network elements are correspondingly mapped into the core set of element-independent messages. Management applications and user interfaces in the EMS thus send and receive network management information using the core set of messages, in the common protocol of those messages. The EMS of the present invention thus supports rapid and low-cost integration of additional network elements of different types and different manufacturers, additional management functionality and additional and modified telecommunications services. The present invention also provides a method for developing the core set of element-independent network management messages for basic telecommunications management functions.

190 citations


Proceedings ArticleDOI
26 Mar 2000
TL;DR: Novel algorithms for discovering physical topology in heterogeneous (i.e., multi-vendor) IP networks are presented, which rely on standard SNMP MIB information that is widely supported by modern IP network elements and require no modifications to the operating system software running on elements or hosts.
Abstract: Knowledge of the up-to-date physical topology of an IP network is crucial to a number of critical network management tasks, including reactive and proactive resource management, event correlation, and root-cause analysis. Given the dynamic nature of today's IP networks, keeping track of topology information manually is a daunting (if not impossible) task. Thus, effective algorithms for automatically discovering physical network topology are necessary. Earlier work has typically concentrated on either: (a) discovering logical (i.e., layer-3) topology, which implies that the connectivity of all layer-2 elements (e.g., switches and bridges) is ignored; or (b) proprietary solutions targeting specific product families. In this paper, we present novel algorithms for discovering physical topology in heterogeneous (i.e., multi-vendor) IP networks. Our algorithms rely on standard SNMP MIB information that is widely supported by modern IP network elements and require no modifications to the operating system software running on elements or hosts. We have implemented the algorithms presented in this paper in the context of a topology discovery tool that has been tested on Lucent's own research network. The experimental results clearly validate our approach, demonstrating that our tool can consistently discover the accurate physical network topology in time that is roughly quadratic in the number of network elements.

183 citations


Patent
Alex Krister Raith1
28 Jul 2000
TL;DR: In this paper, a GPS receiver is used to calculate the position of the user's mobile device and a request processor for processing and selectively responding to requests for information regarding the location of the mobile device.
Abstract: There is provided a device, comprising a positioner configured to determine, at least in part, a position of the device and a request processor for processing and selectively responding to requests for information regarding the position of the device. The positioner comprises a GPS receiver used to calculate the position of the device. A communications network in which the device operates may finally calculate the position. Further, the device may be configured to automatically respond to certain network management location information requests, which are generated by a communications network in which the device operates. The device may also be configured to automatically respond to information requests that result from an emergency communication initiated by the user or that originate from certain specified agencies. Alternatively, the device may be programmed to respond to certain request types depending on input from the user of the device. The request types may be related to services and events that are based on the location of the device or that are based on input from the user.

172 citations


Journal ArticleDOI
TL;DR: The National Laboratory for Applied Network Research is creating a network analysis infrastructure (NAI) to support network research and engineering of high performance research networks and the collection of network management and control data.
Abstract: The National Laboratory for Applied Network Research is creating a network analysis infrastructure (NAI) to support network research and engineering of high performance research networks. The NAI includes a passive monitoring project, an active monitoring project, and the collection of network management and control data. Together these projects have deployed more than 120 monitors around the high-performance research networks in the United States. This article describes NAI and the projects using it. The article concludes with a discussion of the future plans for the infrastructure.

160 citations


Patent
16 Aug 2000
TL;DR: A method and apparatus for network management is described in this paper, where a method comprises collecting performance data having accompanying meta data including information defining the performance management data and information indicating operations to be performed on the performance Management data, and generating output data for display using collected performance management Data according to the information indicating the operations that should be performed.
Abstract: A method and apparatus for network management is described. In one embodiment, a method comprises collecting performance data having accompanying meta data including information defining the performance management data and information indicating operations to be performed on the performance management data, and generating output data for display using collected performance management data according to the information indicating the operations to be performed on the performance management data.

Book
01 Jan 2000
TL;DR: Network management: principles and practice, Network management: Principles and practice , مرکز فناوری اطلاعات £1,000,000; اوشاوρزی £1,500,000.
Abstract: Network management: principles and practice , Network management: principles and practice , مرکز فناوری اطلاعات و اطلاع رسانی کشاورزی

Patent
Darryl Black1, Anne K Winiewicz1
11 Aug 2000
TL;DR: In this article, the authors propose a management system internal to a network device that sends various management data files and corresponding metadata files to an external management system external to the network device.
Abstract: The present invention provides a management system internal to a network device that sends various management data files and corresponding metadata files to a management system external to the network device. The external management system then uses the metadata files to process the management data files. As a result, the external management system dynamically learns how to manage a network device through the metadata files. Moreover, new types of management data files—perhaps corresponding to new hardware within the network device—may be sent from the internal management system to the external management system along with corresponding new metadata files and the external management system will be able to process the new management files without having to be re-booted or restarted. In addition, multiple network devices coupled with the external management system may send various different types of management data to the external management system and using the metadata files from each network device, the external management system will be able to process the various management data types. In one embodiment, the metadata files are JAVA class files.

Journal ArticleDOI
TL;DR: Smart Packets improves the management of large complex networks by moving management decision points closer to the node being managed, targeting specific aspects of the node for information rather than exhaustive collection via polling, and abstracting the management concepts to language constructs, allowing nimble network control.
Abstract: This article introduces Smart Packets and describes the smart Packets architecture, the packet formats, the language and its design goals, and security considerations. Smart Packets is an Active Networks project focusing on applying active networks technology to network management and monitoring. Messages in active networks are programs that are executed at nodes on the path to one or more target hosts. Smart Packets programs are written in a tightly encoded, safe language specifically designed to support network management and avoid dangerous constructs and accesses. Smart Packets improves the management of large complex networks by (1) moving management decision points closer to the node being managed, (2) targeting specific aspects of the node for information rather than exhaustive collection via polling, and (3) abstracting the management concepts to language constructs, allowing nimble network control.

Patent
Glen Tindal1, Jeffery A. Schenk1
06 Dec 2000
TL;DR: In this article, a method and apparatus to configure, monitor and manage network devices without regard for device type and/or manufacturer is disclosed, which includes a network manager unit disposed between the network administrator and the network devices.
Abstract: A method and apparatus to configure, monitor and manage network devices without regard for device type and/or manufacturer is disclosed. One implementation of this embodiment includes a network manager unit disposed between the network administrator and the network devices. The network manager unit allows the administrator to holistically view, configure and manage an entire network without regard to device type and/or manufacturer. The administrator can implement this holistic approach with the use of a central repository for all configuration information and/or a central posting location for all network events.

Patent
15 Feb 2000
TL;DR: In this paper, the authors present a new cost-effective and efficient framework for network management of telecommunications networks by monitoring the network-level concepts of routes and paths, which includes a data collector for collecting data from individual network elements, a management server for processing the routing data collected into manageable route and path objects and a graphical unit interface (GUI) for allowing a user to manage and monitor routes and path in the IP network.
Abstract: The invention provides a new cost-effective and efficient framework for network management of telecommunications networks by monitoring the network-level concepts of routes and paths. The invention is embodied in a route and path management (RPM) system which includes a data collector for collecting data from the individual network elements, a management server for processing the routing data collected into manageable route and path objects and a graphical unit interface (GUI) for allowing a user to manage and monitor routes and paths in the IP network. By monitoring routes and paths, the RPM provides network managers with the added capability of troubleshooting, performance monitoring, service level planning and provisioning packet forwarding paths between any source-destination endpoints in a network.

Patent
Ariel Pashtan1, Raymond M. Liss1
08 Mar 2000
TL;DR: In this paper, a network (300) collects performance data associated with each network element and passes the performance data to a network management element (330), creating a global traffic conditioning control.
Abstract: Network (300) collects performance data associated with each network element, passes the performance data associated with each network element to a network management element (330), creating a global traffic conditioning control, communicates the global traffic conditioning control to at least one of the plurality of network elements, and re-shapes an internal control of at least one of the plurality of network elements based on the global traffic conditioning control. In another aspect, a network (400) detects congestion of a micro communication flow associated with at least one of a plurality of communication traffic flows at a first network element, detects a communication traffic flow priority at a first level associated with the congested micro communication flow, changes at a second network element, in an upstream communication flow in relation with the first network element, the priority from the first level to a second level.

Patent
23 May 2000
TL;DR: In this paper, a method and system are disclosed for efficiently correlating events within a data processing system and then transmitting messages to various network entities in response to an occurrence of a particular network event.
Abstract: A method and system are disclosed for efficiently correlating events within a data processing system and then transmitting messages to various network entities in response to an occurrence of a particular network event. According to the present invention, a network mediation service receives raw message streams from one or more external data sources and passes the streams in real-time to the event notification service. The event notification service then passes the message to the message parsing service for processing. After the message has been parsed by the message parsing service, it is passed back to the event notification service which passes the message along an event channel to the network management service. The message is also passed to the event correlation service for event correlation. A knowledge-based database of message classes that define how to interpret the message text are used by the event correlation service to match correlation rule conditions to the observed events. After event correlation service processes the parsed event, it is passed to the network management service for resolution.

Proceedings ArticleDOI
23 Sep 2000
TL;DR: This work presents an end-to-end data authentication scheme that relies on mutual trust between nodes that uses TCP at the transport layer and a hierarchical architecture at the IP layer so that the number of encryptions needed is minimized, thereby reducing the computational overheads.
Abstract: Ad hoc networks are a new generation of networks offering unrestricted mobility without any underlying infrastructure. In these kinds of networks, all the nodes share the responsibility of network formation and management. As their principle application is in catastrophic environments, security is critical. Authentication, integrity and encryption are key issues pertaining to network security. Traditional authentication schemes cannot be effectively used in such decentralized networks. We present an end-to-end data authentication scheme that relies on mutual trust between nodes. The basic strategy is to take advantage of the hierarchical architecture that is implemented for routing purposes. We have proposed an authentication scheme that uses TCP at the transport layer and a hierarchical architecture at the IP layer so that the number of encryptions needed is minimized, thereby reducing the computational overheads. This also results in substantial savings as each node has to maintain keys for fewer nodes.

Proceedings ArticleDOI
25 Jan 2000
TL;DR: An SNMP based network management interface has been designed and implemented such that the JiNao IDS can be easily integrated with existing network management systems.
Abstract: This paper presents the design, implementation, and experimentation of the JiNao intrusion detection system (IDS) which focuses on the protection of the network routing infrastructure. We used the open shortest path first (OSPF) routing protocol as an implementation example to illustrate our IDS design. However, the system architecture is generic enough that the JiNao IDS can be used for protecting other protocols. The system features attack prevention and intrusion detection with tightly integrated network management components. The prevention module functions like a firewall which consists of a small set of rules. Both misuse (protocol analysis) and anomaly (statistical based) approaches are implemented as detection mechanisms in order to handle both known and unknown attacks. Four OSPF attacks (i.e., MaxSeq, MaxAge, Seq++, and LSID attacks) have been developed for evaluating JiNao's detecting capability. Furthermore, an SNMP based network management interface has been designed and implemented such that the JiNao IDS can be easily integrated with existing network management systems.

Patent
07 Mar 2000
TL;DR: In this paper, a network management system for a multi-layer network having multiple architectural or technological domains includes an inter-domain configuration manager arranged between a set of one or more network service management applications and a subset of network element domain managers, each of the domain managers being associated with a particular domain of the network.
Abstract: A network management system for a multi-layer network having multiple architectural or technological domains includes an inter-domain configuration manager arranged between a set of one or more network service management applications and a set of network element domain managers, each of the domain managers being associated with a particular domain of the multi-layer network. The configuration manager implements network service design and provisioning functions across the domains of the network in conjunction with stored connectivity information characterizing the multi-layer network. The network management system further includes an inter-domain fault manager and an inter-domain capacity manager, which provide respective fault management and transport capacity management functions across the domains of the multi-layer network. The inter-domain configuration manager, inter-domain fault manager and inter-domain capacity manager may be interfaced to the set of network service management applications and the set of network element domain managers through corresponding published Common Object Request Broker Architecture (CORBA) Application Programming Interfaces (APIs).

Proceedings Article
08 Dec 2000
TL;DR: What the flow logs contain, the tools written to store and process these logs, and how the logs have been used to perform network management and security functions at OSU are described.
Abstract: Many Cisco routers and switches support NetFlow services which provides a detailed source of data about network traffic. The Office of Information Technology Enterprise Networking Services group (OIT/ENS) at The Ohio State University (OSU) has written a suite of tools called flow-tools to record, filter, print and analyze flow logs derived from exports of NetFlow accounting records. We use the flow logs for general network planning, performance monitoring, usage based billing, and many security related tasks including incident response and intrusion detection. This paper describes what the flow logs contain, the tools we have written to store and process these logs, and discusses how we have used the logs and the tools to perform network management and security functions at OSU. We also discuss some related projects and our future plans at the end of the paper.

Journal ArticleDOI
TL;DR: A study of three different approaches to integration based on the spatial and temporal proximity of related information objects in ecological displays developed using an abstraction hierarchy analysis found that the most integrated condition, high-space/high-time, resulted in the fastest and most accurate fault diagnosis performance.
Abstract: Computer displays are being designed for increasingly larger industrial systems. As the application domain scales up, maintaining integration across different kinds of views becomes more challenging. This paper presents the results of a study of three different approaches to integration based on the spatial and temporal proximity of related information objects. The domain used for evaluation was a simulation of an industry-scale conventional power plant. All three displays were ecological displays developed using an abstraction hierarchy analysis. Views were integrated in a high-space/low-time, low-space/high-time, and high-space/high-time integration of means-end related objects. During a fault detection and diagnosis task, it was found that a low level of integration, high-space/ low-time, provided the fastest fault detection time. However, the most integrated condition, high-space/high-time, resulted in the fastest and most accurate fault diagnosis performance. Actual or potential applications of this research include computer displays for large-scale systems such as network management or process control, for which problem solving is critical and integration must be maintained.

Journal ArticleDOI
TL;DR: RMTP-II builds on a rich field of existing work, and adds to it the following novel contributions: it differentiates the roles of the nodes in the protocol, provides algorithms for smoothing and control of the return (TRACK) traffic, and provides explicit support for highly asymmetrical networks.
Abstract: This document provides an overview of the reliable multicast transport protocol II, RMTP-II. RMTP-II is a reliable multicast protocol, designed to reliably and efficiently send data from a few senders to large groups of simultaneous recipients. It works over both symmetric networks and asymmetrical network topologies such as those provided by satellite, cable modem, or ADSL carriers. Before sending, each sender must connect with a trusted top node to receive permission and control parameters for its data stream. The top node provides network managers with a single point of control for the senders, allowing them to monitor and control the traffic being sent. RMTP-II builds on a rich field of existing work, and adds to it the following novel contributions. It differentiates the roles of the nodes in the protocol, provides algorithms for smoothing and control of the return (TRACK) traffic, and provides explicit support for highly asymmetrical networks. It provides explicit network management controls through a centralized point of control, a fully distributed membership protocol that enables positive confirmation of data delivery, and fault recovery algorithms which are integrated to the reliability semantics of the protocol. It includes a novel reliability level called time bounded reliability, and offers a unique combination of TRACKs, NACKs, and FEC for increased scalability and real-time performance. Finally, it integrates distributed algorithms for RTT calculation to each receiver, and provides automatic configuration of receiver nodes.

Journal ArticleDOI
TL;DR: Three novel applications are presented, tailored to transfers of bulk network monitoring data, in which MAs are used to perform data aggregation, acquire atomic SNMP table views and support selective retrieval ofSNMP table objects that meet specific selection criteria.

Patent
23 May 2000
TL;DR: In this paper, a method and system are disclosed for efficiently correlating network events within a data processing system and then transmitting messages to various network entities in response to an occurrence of a particular network event.
Abstract: A method and system are disclosed for efficiently correlating network events within a data processing system and then transmitting messages to various network entities in response to an occurrence of a particular network event. According to the present invention, a network mediation service receives raw message streams from one or more external networks and passes the streams in real-time to the event notification service. The event notification service then passes the message to the message parsing service for processing. After the message has been parsed by the message parsing service, it is passed back to the event notification service which passes the message along an event channel to the network management service. The message is also passed to the event correlation service for event correlation. A knowledge-based database of message classes that define how to interpret the message text are used by the event correlation service to match correlation rule conditions to the observed events. After event correlation service processes the parsed event, it is passed to the network management service for resolution.

Patent
09 Jun 2000
TL;DR: In this paper, the authors proposed a method and apparatus for supporting multiple redundancy schemes in a single network device, which allows customers having different availability/redundancy needs to be serviced by same network device.
Abstract: The present invention provides a method and apparatus for supporting multiple redundancy schemes in a single network device. In one network device, various redundancy schemes are supported including 1:1, 1+1, 1:N, no redundancy or a combination of redundancy schemes. In addition, the redundancy scheme or schemes for physical network device cards (i.e., universal port cards) or ports may be different from the redundancy scheme or schemes for forwarding network device cards. For example, a network manager may want to provide 1:1 or 1+1 redundancy for all universal port cards and/or ports but only 1:N redundancy for each N group of forwarding cards. As another example, the network manager may provide certain customers with 1:1 redundancy on both universal port cards (or ports) and forwarding cards to ensure that customer's network availability while providing other customers, with lower availability requirements, with various other redundancy scheme combinations, for example, 1:1, 1+1, 1:N or no redundancy for port cards or ports and 1:N or no redundancy for forwarding cards. The present invention allows customers having different availability/redundancy needs to be serviced by same network device.

Patent
27 Jul 2000
TL;DR: In this paper, a distributed method and system of controlling a communications network having a plurality of spans of interconnected network elements some of which include a network element processor distributes network topology information to respective span databases; stores original fault objects in the respective span database; advertises fault objects to other network element processors in a local span when the original fault affects network elements other than the network element in which the fault occurred.
Abstract: A distributed method and system of controlling a communications network having a plurality of spans of interconnected network elements some of which include a network element processor distributes network topology information to respective span databases; stores original fault objects in the respective span databases; advertises fault objects to other network element processors in a local span when the original fault affects network elements other than a network element in which the fault occurred; advertises alarm objects to other network element processors that are respectively associated with a circuit affected by the original faults; stores the advertised fault and alarm objects in the respective span databases; and performs distributed processing of the advertised fault and alarm objects with the other network element processors and the respective span databases. Aggregation of other faults and alarms that may be occurring on the communications network due to other faults other than the received fault aids in determining causality of the fault. Causality may be determined by correlating other faults and alarms with the received fault. If not a root cause of another fault or alarm, the received fault is sympathetic to another fault or alarm. Sympathetic faults are suppressed while root cause faults are promoted to an alarm and reported to affected network elements. The number of alarms viewed by a network manager as well as the reporting of alarms and underlying faults are reduced by performing such distributed alarm correlation and fault reporting suppression.

Book
01 Jan 2000
TL;DR: Packed with the most up-to-date and complete information on LAN switches, this book explains how switches and bridges operate, explores implementation and performance issues, and discusses the architecture and data flow through a typical switch.
Abstract: From the Publisher: The most in-depth guide to the capabilities, application, and design of LAN switches and switched internetworksWritten by an innovator who has been at the forefront of networking technology for more than two decades, this comprehensive book covers everything you need to know about LAN switching. From understanding switch functions and features to technology integration and network management, it provides valuable insights for network planners, developers, and managers. Seifert helps you gain a clear understanding of the often-complex features and options available in LAN switches, along with detailed explanations of the latest technology enhancements-including previously unpublished information on Link Aggregation, Virtual LANs, and Layer 3 switches. Packed with the most up-to-date and complete information on LAN switches, this book: *Explains how switches and bridges operate, and explores implementation and performance issues *Details how switches can be deployed in both homogeneous and heterogeneous LAN environments *Provides a comprehensive explanation of the Spanning Tree Protocol *Covers source routing, which is available on Token Ring and FDDI networks *Explains full duplex LAN operation and link flow control methods *Looks at the applications and IEEE 802.3ad standard for aggregated links and their effect on system and higher-layer protocol behavior *Introduces Virtual LANs and the IEEE 802.1Q standard *Discusses the Simple Network Management Protocol (SNMP) as well as other forms of itch management *Explores the architecture and data flow through a typical switch, including an analysis of switch fabric options

Proceedings ArticleDOI
Gautam Kar1, A. Keller, S. Calo1
10 Apr 2000
TL;DR: The concept of "service management domains" which are virtual domains built from resources and dependency relationships pertaining to physically monitored domains in the network management layer form the basis for managing fault, performance and service level agreements related to application service offerings.
Abstract: This paper proposes a novel approach for managing IP-based services and applications, reflecting the authors' experience with the IBM Global Network. It describes how one can extend the existing network and systems management paradigms to address problems in the management of application services hosted by network service providers (NSP). We introduce the concept of "service management domains" which are virtual domains built from resources and dependency relationships pertaining to physically monitored domains in the network management layer. They form the basis for managing fault, performance and service level agreements related to application service offerings.