Авторизация
Поиск по указателям
Berquist K., Berquist A. — Managing Information Highways: The PRISM Book: Principles, Methods, and Case Studies for Designing Telecommunications Management Systems
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Managing Information Highways: The PRISM Book: Principles, Methods, and Case Studies for Designing Telecommunications Management Systems
Авторы: Berquist K., Berquist A.
Аннотация: This monograph constitutes the final report of the EC-sponsored PRISM project, which was devoted to communications management for integrated broadband communications (IBC) within the RACE program. The book introduces and applies the distributed management framework (DMF) developed for the specification and design of multi-domain management systems for controlling, monitoring, and administrating IBC networks. The DMF framework is evaluated in detail and related to other international architectural and specification work aimed at creating advanced communication management systems. Also, a summary of existing platforms potentially supporting PRISM's DMF system, a glossary, a list of acronyms and abreviations, and a detailed subject index are included.
Язык:
Рубрика: Computer science /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 1996
Количество страниц: 418
Добавлена в каталог: 05.12.2010
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
Enterprise Design Task, structuring the enterprise 61
Enterprise Viewpoint, comparison of DMF to Cassiopeia 368
Enterprise Viewpoint, comparison of DMF to ODMA 365
Enterprise Viewpoint, concepts 54
Enterprise Viewpoint, conclusion of application to UPT 350
Enterprise Viewpoint, definition 29
Enterprise Viewpoint, elaboration 53—69
Enterprise Viewpoint, introduction 53
Enterprise Viewpoint, mapping to Computational viewpoint 106
Enterprise Viewpoint, mapping to Engineering viewpoint 108
Enterprise Viewpoint, mapping to Information viewpoint 106
Enterprise Viewpoint, method 54
Enterprise Viewpoint, ODMA 363
Enterprise Viewpoint, quality of service 117
Enterprise Viewpoint, securing management systems 140—179
Enterprise Viewpoint, support in platforms 378
Enterprise Viewpoint, UPT service profile management 294—321
Enterprise Viewpoint, VPN cost and charging management 222—291 223—242
Enterprise Viewpoint, VPN dynamic bandwidth management 210—222
ETSI, description 20
ETSI, UPT service profile concept 296
EURESCOM description 21
European Commission V European Telecommunications Standards Institute (ETSI) description 20
Event — Trace Diagram description 68
Event — Trace Diagram description, mapping Enterprise to Computational viewpoints 106
Event — Trace Diagram description, UPT service profile management 319
Events 74
Evolving to Advanced Systems 35
External access description 42
External access description in securing management systems 158
External access description in security policies 173
External access description, relating to security 131
external users 42
F interface in securing inter — TMN interactions 135
F interface in securing management systems 158
F interface in securing on-line TTPs 176
Federation in actors and roles scenario 68
Federation, definition 62
Function Block definition 85
Function Block definition, VPN cost and charging management 280
Generalisation 72
Generalisation, Information viewpoint definition 72
Generic Relationship Model 75
Graphical notation, building block diagram 87
Graphical notation, computational activity diagram 81 410
Graphical notation, computational object type diagrams 84
Graphical notation, computational objects 80
Graphical notation, detailed information model 76
Graphical notation, engineering object deployment 94
Graphical notation, engineering objects 92
Graphical notation, Enterprise viewpoint 55
Graphical notation, identifying involved parties 56
Graphical notation, OMT 389—391
Graphical notation, policy 65
Graphical notation, requirements capture 59
Graphical notation, structuring the enterprise 65
Guidelines for the Definition of Managed Objects (GDMO) description 75
Guidelines for the Definition of Managed Objects (GDMO) description in mapping to Computational viewpoint 107
Guidelines for the Definition of Managed Objects (GDMO) description in quality of service 123
Guidelines for the Definition of Managed Objects (GDMO) description, notation 76
Guidelines for the Definition of Managed Objects (GDMO) description, supporting functional group interfaces 380
Guidelines for the Definition of Managed Objects (GDMO) description, supporting modularity and open interfaces 381
Guidelines for the Definition of Managed Objects (GDMO) description, use in DMF and ODMA 365
Guidelines for the Definition of Managed Objects (GDMO) description, use in platforms 377
Guidelines for the Definition of Managed Objects (GDMO) description, VPN charging profile model 265
Guidelines for the Definition of Managed Objects (GDMO) description, VPN charging record 256
Guidelines for the Definition of Managed Objects (GDMO) description, VPN tariff model 261
Guidelines for the Definition of Managed Objects (GDMO) description, VPN usage record model 255
Identify Computational Objects description 79
Identify Computational Objects description, securing VPN from traffic observation 283
Identify Computational Objects description, UPT service profile management 334
Identify Computational Objects description, VPN cost and charging management 273
Identifying Involved Parties description 56
Identifying Involved Parties description, securing management systems 156
Identifying Involved Parties description, UPT service profile management 298
Identifying Involved Parties description, VPN bandwidth management 213
Identifying Involved Parties description, VPN cost and charging management 227
IETF, description 21
Implementation eXtra Information for Testing (EXIT) 104
INDEX 411
Information Design Task, abstract information model description 71
Information Design Task, detailed information model description 75
Information highways V overview 4—6
Information Model, access control 182—183
Information Model, authentication 179—181
Information Model, OMG 370
Information Model, UPT service profile management 323
Information Model, UPT service profile management security 331
Information Model, VPN account and profile 264
Information Model, VPN charging policy 257
Information Model, VPN charging record 255
Information Model, VPN contract 266
Information Model, VPN tariff contract 267
Information Model, VPN usage record 248
Information society V Information Viewpoint, comparison of DMF to Casiopeia 368
Information society V Information Viewpoint, comparison of DMF to ODMA 365
Information society V Information Viewpoint, concepts 70
Information society V Information Viewpoint, conclusion of application to UPT 350
Information society V Information Viewpoint, definition 29
Information society V Information Viewpoint, elaboration 70—76
Information society V Information Viewpoint, introduction 70
Information society V Information Viewpoint, managed object definition 39
Information society V Information Viewpoint, mapping to Computational viewpoint 107
Information society V Information Viewpoint, mapping to Enterprise viewpoint 106
Information society V Information Viewpoint, method 70
Information society V Information Viewpoint, ODMA 363
Information society V Information Viewpoint, quality of service 121
Information society V Information Viewpoint, securing management systems 179—183
Information society V Information Viewpoint, static model 71
Information society V Information Viewpoint, support in platforms 378
Information society V Information Viewpoint, UPT service profile management 322—333
Information society V Information Viewpoint, VPN cost and charging management 242—272
Information viewpoint definition 72
Integrated Broadband Communications (IBC) V overview IX Integrity of management 132
Integrated Broadband Communications (IBC) V overview IX Integrity, applied to DPE 193
Integrated Broadband Communications (IBC) V overview IX Integrity, description 133
Integrated Broadband Communications (IBC) V overview IX Integrity, technologies supporting 197
Interceptor 96
Interceptor, support in platforms 380
Interface Description Language (IDL) compiler support in platforms 378
Interface Description Language (IDL) compiler support in platforms, extensions to support building blocks 380
Interface Description Language (IDL) compiler support in platforms, support for Computational Viewpoint 379
Interface Description Language (IDL) compiler support in platforms, support for Engineering Viewpoint 380
Interface Description Language (IDL) compiler support in platforms, use in OMG 372
Interface, description 40
internal users 42
International Standards Organisation (ISO) description 21
International Telecommunications Union description 21
Internet 3
Internet Engineering Task Force (IETF) description 21
Interworking Reference Point 96
Introduce the Environment description 55
ISO, description 21
ITU-T, as part of security analysis method 139
ITU-T, description 21
ITU-T, impacts on security 151—156
ITU-T, Key establishment actors and roles 157
ITU-T, Legacy Systems 35
Links, Information viewpoint definition 71
Links, Managed Object (MO) definition 39
Links, Management Function definition 38 61
Links, mapping between Enterprise and Computational viewpoints 106
Links, securing management systems 168
Links, support in platforms 377
Links, UPT service profile management 305
Links, VPN cost and charging management 235
Management Information Base (MIB) development 21
Management of security 132
Management policy definition 64
Management policy definition, relation to security policy 134
Management policy definition, UPT service profile management 306
Management policy definition, VPN cost and charging management 237
Management responsibility layers business management layer 32
Management responsibility layers business management layer in requirements capture 41
Management responsibility layers business management layer in TINA — C 362
Management responsibility layers business management layer, network element management layer 33
Management responsibility layers business management layer, network management layer 33
Management responsibility layers business management layer, service and network management interaction 46
Management responsibility layers business management layer, service management 32
Management Service Component definition 38 60
Management Service Component definition, securing management systems 168
Management Service Component definition, UPT service profile management 304
Management Service Component definition, VPN cost and charging management 235
Management service decomposing 61
Management service decomposing, definition 38 60
Management service decomposing, describing 59
Management service decomposing, description 59
Management service decomposing, interaction and dependencies 47
Management service decomposing, model description 38
Management service decomposing, relating quality of service 119
Management service decomposing, securing management systems 159—169
Management service decomposing, UPT service profile management 304
Management service decomposing, VPN cost and charging management 235
Management, bandwidth management VPN example 210—222
Management, cost and charging VPN example 222—291
Management, how far can we go 25—27
Management, of security 132
Management, organisations 19—22
Management, Overview 16—19
Management, platform support 373—82
Management, software issues 6
Map computational model into engineering concepts description 92 412
Map computational model into engineering concepts description, UPT service profile management 345
Map computational model into engineering concepts description, VPN cost and charging management 289
Method, building block design 86
Method, Computational viewpoint 78
Method, decomposing management services 61
Method, designing computational activities 81
Method, designing Computational object types 83
Method, desining engineering communications 96
Method, detailed information model 75
Method, dynamic information modelling 74
Method, Engineering object deployment 94
Method, Engineering viewpoint 90
Method, Enterprise viewpoint 54
Method, identifying computational objects 79
Method, identifying involved parties 56
Method, Information viewpoint 70
Method, mapping computational model to engineering 92
Method, policy specification 63
Method, requirements capture 57
Method, security analysis method 137
Method, static information model 72
Method, support in platforms 373
Method, Technology viewpoint 104
MIB in a DMF platform 377
MIB use in VPN QoS management 240
Mobile networks overview 10
Multiplicity, Information viewpoint definition 72
National Security and Public Order 152
Network element management 33
Network Management 33
Network Management Forum 20
Node, definition 39
Node, engineering definition 93
Node, support in platforms 379
Node, UPT service profile management 347
Node, VPN cost and charging management 290
Non-repudiation definition 137
Non-repudiation definition, technologies supporting 198
Nucleus 93
Object Description Language - TINA-C 381
Object Management Group 22
Object Management Group (OMG) description 22
Object Management Group, Management Information Model 75
Object Management Group, RACE 21
Object Management Group, security architecture 195
Object Management Group, TINA — C 21
Object, class definition 71
Object, definition - Information viewpoint 71
Object, instance definition 71
Objectives for security 133
Obligation policy definition 64
ODMA, comparison to the DMF 364—367
ODMA, overview 363—364
ODP, Computational viewpoint definition 29
ODP, Engineering viewpoint definition 29
ODP, Enterprise viewpoint defintion 29
ODP, Information viewpoint definition 29
ODP, Technology viewpoint definition 29
ODP, use in designing security 195
ODP, use in the DMF 27
OMA, comparison to DMF 364—367
OMA, overview 369—370
OMNIPoint 20
OMT, concepts 72
OMT, graphical notation 389—391
OMT, method 73
OMT, object model notation 87
OMT, state diagram 74
One Stop Shopping introduction 9
Open Network Architecture (ONA) in defining domains and policies 37
Open Network Architecture (ONA) in defining domains and policies, objectives 130
Open Network Provisioning (ONP) impact on security 155
Open Network Provisioning (ONP) impact on security in defining domains and policies 37
Open Network Provisioning (ONP) impact on security in securing management systems 130
Open Network Provisioning (ONP) impact on security, objectives 130
Open Services Architecture (OSA) 367
Open systems 34
Open systems, relating to security 132
Operation interfaces 77
Operation signature 78
Operation System Function (OSF) definition 39
Organisations 19—22
Organisations, ACTS 21
Organisations, ATM Forum 21
Organisations, ETSI 20
Organisations, EURESCOM 21
Organisations, IETF 21
Organisations, Internet 21
Organisations, ISO 21
Organisations, ITU — T 21
Organisations, Network Management Forum 20
Ownership domain 37
Peripheral functions 42
Platform, database models and management services 376
Platform, extensions supporting the DMF 380—382
Platform, features support in DMF application services 375
Platform, presentation services 377
Platform, typical modem day management 374—380
Policy in actors and roles scenario 67
Policy, considerations 130
Policy, definition 62
Policy, impact on security requirements 153
Policy, issues 36
Policy, management policy definition 64
Policy, objectives VPN cost and charging management 225
Policy, quality of service 117
Policy, securing management systems 172—175
Policy, security - description 135
Policy, specification method 63
Policy, UPT service profile management 306—311
Policy, VPN bandwidth management 216
Policy, VPN charging information model 257
Policy, VPN cost and charging management 237
Privil ege Attribute Certificate 165
Protocol Adapters 96
Protocol, features 100
Protocol, object definition 96
Protocol, ODMA support 364
Реклама