Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Berquist K., Berquist A. — Managing Information Highways: The PRISM Book: Principles, Methods, and Case Studies for Designing Telecommunications Management Systems
Berquist K., Berquist A. — Managing Information Highways: The PRISM Book: Principles, Methods, and Case Studies for Designing Telecommunications Management Systems



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Managing Information Highways: The PRISM Book: Principles, Methods, and Case Studies for Designing Telecommunications Management Systems

Авторы: Berquist K., Berquist A.

Аннотация:

This monograph constitutes the final report of the EC-sponsored PRISM project, which was devoted to communications management for integrated broadband communications (IBC) within the RACE program. The book introduces and applies the distributed management framework (DMF) developed for the specification and design of multi-domain management systems for controlling, monitoring, and administrating IBC networks. The DMF framework is evaluated in detail and related to other international architectural and specification work aimed at creating advanced communication management systems. Also, a summary of existing platforms potentially supporting PRISM's DMF system, a glossary, a list of acronyms and abreviations, and a detailed subject index are included.


Язык: en

Рубрика: Computer science/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 1996

Количество страниц: 418

Добавлена в каталог: 05.12.2010

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Enterprise Design Task, structuring the enterprise      61
Enterprise Viewpoint, comparison of DMF to Cassiopeia      368
Enterprise Viewpoint, comparison of DMF to ODMA      365
Enterprise Viewpoint, concepts      54
Enterprise Viewpoint, conclusion of application to UPT      350
Enterprise Viewpoint, definition      29
Enterprise Viewpoint, elaboration      53—69
Enterprise Viewpoint, introduction      53
Enterprise Viewpoint, mapping to Computational viewpoint      106
Enterprise Viewpoint, mapping to Engineering viewpoint      108
Enterprise Viewpoint, mapping to Information viewpoint      106
Enterprise Viewpoint, method      54
Enterprise Viewpoint, ODMA      363
Enterprise Viewpoint, quality of service      117
Enterprise Viewpoint, securing management systems      140—179
Enterprise Viewpoint, support in platforms      378
Enterprise Viewpoint, UPT service profile management      294—321
Enterprise Viewpoint, VPN cost and charging management      222—291 223—242
Enterprise Viewpoint, VPN dynamic bandwidth management      210—222
ETSI, description      20
ETSI, UPT service profile concept      296
EURESCOM description      21
European Commission V European Telecommunications Standards Institute (ETSI) description      20
Event — Trace Diagram description      68
Event — Trace Diagram description, mapping Enterprise to Computational viewpoints      106
Event — Trace Diagram description, UPT service profile management      319
Events      74
Evolving to Advanced Systems      35
External access description      42
External access description in securing management systems      158
External access description in security policies      173
External access description, relating to security      131
external users      42
F interface in securing inter — TMN interactions      135
F interface in securing management systems      158
F interface in securing on-line TTPs      176
Federation in actors and roles scenario      68
Federation, definition      62
Function Block definition      85
Function Block definition, VPN cost and charging management      280
Generalisation      72
Generalisation, Information viewpoint definition      72
Generic Relationship Model      75
Graphical notation, building block diagram      87
Graphical notation, computational activity diagram      81 410
Graphical notation, computational object type diagrams      84
Graphical notation, computational objects      80
Graphical notation, detailed information model      76
Graphical notation, engineering object deployment      94
Graphical notation, engineering objects      92
Graphical notation, Enterprise viewpoint      55
Graphical notation, identifying involved parties      56
Graphical notation, OMT      389—391
Graphical notation, policy      65
Graphical notation, requirements capture      59
Graphical notation, structuring the enterprise      65
Guidelines for the Definition of Managed Objects (GDMO) description      75
Guidelines for the Definition of Managed Objects (GDMO) description in mapping to Computational viewpoint      107
Guidelines for the Definition of Managed Objects (GDMO) description in quality of service      123
Guidelines for the Definition of Managed Objects (GDMO) description, notation      76
Guidelines for the Definition of Managed Objects (GDMO) description, supporting functional group interfaces      380
Guidelines for the Definition of Managed Objects (GDMO) description, supporting modularity and open interfaces      381
Guidelines for the Definition of Managed Objects (GDMO) description, use in DMF and ODMA      365
Guidelines for the Definition of Managed Objects (GDMO) description, use in platforms      377
Guidelines for the Definition of Managed Objects (GDMO) description, VPN charging profile model      265
Guidelines for the Definition of Managed Objects (GDMO) description, VPN charging record      256
Guidelines for the Definition of Managed Objects (GDMO) description, VPN tariff model      261
Guidelines for the Definition of Managed Objects (GDMO) description, VPN usage record model      255
Identify Computational Objects description      79
Identify Computational Objects description, securing VPN from traffic observation      283
Identify Computational Objects description, UPT service profile management      334
Identify Computational Objects description, VPN cost and charging management      273
Identifying Involved Parties description      56
Identifying Involved Parties description, securing management systems      156
Identifying Involved Parties description, UPT service profile management      298
Identifying Involved Parties description, VPN bandwidth management      213
Identifying Involved Parties description, VPN cost and charging management      227
IETF, description      21
Implementation eXtra Information for Testing (EXIT)      104
INDEX      411
Information Design Task, abstract information model description      71
Information Design Task, detailed information model description      75
Information highways V overview      4—6
Information Model, access control      182—183
Information Model, authentication      179—181
Information Model, OMG      370
Information Model, UPT service profile management      323
Information Model, UPT service profile management security      331
Information Model, VPN account and profile      264
Information Model, VPN charging policy      257
Information Model, VPN charging record      255
Information Model, VPN contract      266
Information Model, VPN tariff contract      267
Information Model, VPN usage record      248
Information society V Information Viewpoint, comparison of DMF to Casiopeia      368
Information society V Information Viewpoint, comparison of DMF to ODMA      365
Information society V Information Viewpoint, concepts      70
Information society V Information Viewpoint, conclusion of application to UPT      350
Information society V Information Viewpoint, definition      29
Information society V Information Viewpoint, elaboration      70—76
Information society V Information Viewpoint, introduction      70
Information society V Information Viewpoint, managed object definition      39
Information society V Information Viewpoint, mapping to Computational viewpoint      107
Information society V Information Viewpoint, mapping to Enterprise viewpoint      106
Information society V Information Viewpoint, method      70
Information society V Information Viewpoint, ODMA      363
Information society V Information Viewpoint, quality of service      121
Information society V Information Viewpoint, securing management systems      179—183
Information society V Information Viewpoint, static model      71
Information society V Information Viewpoint, support in platforms      378
Information society V Information Viewpoint, UPT service profile management      322—333
Information society V Information Viewpoint, VPN cost and charging management      242—272
Information viewpoint definition      72
Integrated Broadband Communications (IBC) V overview IX Integrity of management      132
Integrated Broadband Communications (IBC) V overview IX Integrity, applied to DPE      193
Integrated Broadband Communications (IBC) V overview IX Integrity, description      133
Integrated Broadband Communications (IBC) V overview IX Integrity, technologies supporting      197
Interceptor      96
Interceptor, support in platforms      380
Interface Description Language (IDL) compiler support in platforms      378
Interface Description Language (IDL) compiler support in platforms, extensions to support building blocks      380
Interface Description Language (IDL) compiler support in platforms, support for Computational Viewpoint      379
Interface Description Language (IDL) compiler support in platforms, support for Engineering Viewpoint      380
Interface Description Language (IDL) compiler support in platforms, use in OMG      372
Interface, description      40
internal users      42
International Standards Organisation (ISO) description      21
International Telecommunications Union description      21
Internet      3
Internet Engineering Task Force (IETF) description      21
Interworking Reference Point      96
Introduce the Environment description      55
ISO, description      21
ITU-T, as part of security analysis method      139
ITU-T, description      21
ITU-T, impacts on security      151—156
ITU-T, Key establishment actors and roles      157
ITU-T, Legacy Systems      35
Links, Information viewpoint definition      71
Links, Managed Object (MO) definition      39
Links, Management Function definition      38 61
Links, mapping between Enterprise and Computational viewpoints      106
Links, securing management systems      168
Links, support in platforms      377
Links, UPT service profile management      305
Links, VPN cost and charging management      235
Management Information Base (MIB) development      21
Management of security      132
Management policy definition      64
Management policy definition, relation to security policy      134
Management policy definition, UPT service profile management      306
Management policy definition, VPN cost and charging management      237
Management responsibility layers business management layer      32
Management responsibility layers business management layer in requirements capture      41
Management responsibility layers business management layer in TINA — C      362
Management responsibility layers business management layer, network element management layer      33
Management responsibility layers business management layer, network management layer      33
Management responsibility layers business management layer, service and network management interaction      46
Management responsibility layers business management layer, service management      32
Management Service Component definition      38 60
Management Service Component definition, securing management systems      168
Management Service Component definition, UPT service profile management      304
Management Service Component definition, VPN cost and charging management      235
Management service decomposing      61
Management service decomposing, definition      38 60
Management service decomposing, describing      59
Management service decomposing, description      59
Management service decomposing, interaction and dependencies      47
Management service decomposing, model description      38
Management service decomposing, relating quality of service      119
Management service decomposing, securing management systems      159—169
Management service decomposing, UPT service profile management      304
Management service decomposing, VPN cost and charging management      235
Management, bandwidth management VPN example      210—222
Management, cost and charging VPN example      222—291
Management, how far can we go      25—27
Management, of security      132
Management, organisations      19—22
Management, Overview      16—19
Management, platform support      373—82
Management, software issues      6
Map computational model into engineering concepts description      92 412
Map computational model into engineering concepts description, UPT service profile management      345
Map computational model into engineering concepts description, VPN cost and charging management      289
Method, building block design      86
Method, Computational viewpoint      78
Method, decomposing management services      61
Method, designing computational activities      81
Method, designing Computational object types      83
Method, desining engineering communications      96
Method, detailed information model      75
Method, dynamic information modelling      74
Method, Engineering object deployment      94
Method, Engineering viewpoint      90
Method, Enterprise viewpoint      54
Method, identifying computational objects      79
Method, identifying involved parties      56
Method, Information viewpoint      70
Method, mapping computational model to engineering      92
Method, policy specification      63
Method, requirements capture      57
Method, security analysis method      137
Method, static information model      72
Method, support in platforms      373
Method, Technology viewpoint      104
MIB in a DMF platform      377
MIB use in VPN QoS management      240
Mobile networks overview      10
Multiplicity, Information viewpoint definition      72
National Security and Public Order      152
Network element management      33
Network Management      33
Network Management Forum      20
Node, definition      39
Node, engineering definition      93
Node, support in platforms      379
Node, UPT service profile management      347
Node, VPN cost and charging management      290
Non-repudiation definition      137
Non-repudiation definition, technologies supporting      198
Nucleus      93
Object Description Language - TINA-C      381
Object Management Group      22
Object Management Group (OMG) description      22
Object Management Group, Management Information Model      75
Object Management Group, RACE      21
Object Management Group, security architecture      195
Object Management Group, TINA — C      21
Object, class definition      71
Object, definition - Information viewpoint      71
Object, instance definition      71
Objectives for security      133
Obligation policy definition      64
ODMA, comparison to the DMF      364—367
ODMA, overview      363—364
ODP, Computational viewpoint definition      29
ODP, Engineering viewpoint definition      29
ODP, Enterprise viewpoint defintion      29
ODP, Information viewpoint definition      29
ODP, Technology viewpoint definition      29
ODP, use in designing security      195
ODP, use in the DMF      27
OMA, comparison to DMF      364—367
OMA, overview      369—370
OMNIPoint      20
OMT, concepts      72
OMT, graphical notation      389—391
OMT, method      73
OMT, object model notation      87
OMT, state diagram      74
One Stop Shopping introduction      9
Open Network Architecture (ONA) in defining domains and policies      37
Open Network Architecture (ONA) in defining domains and policies, objectives      130
Open Network Provisioning (ONP) impact on security      155
Open Network Provisioning (ONP) impact on security in defining domains and policies      37
Open Network Provisioning (ONP) impact on security in securing management systems      130
Open Network Provisioning (ONP) impact on security, objectives      130
Open Services Architecture (OSA)      367
Open systems      34
Open systems, relating to security      132
Operation interfaces      77
Operation signature      78
Operation System Function (OSF) definition      39
Organisations      19—22
Organisations, ACTS      21
Organisations, ATM Forum      21
Organisations, ETSI      20
Organisations, EURESCOM      21
Organisations, IETF      21
Organisations, Internet      21
Organisations, ISO      21
Organisations, ITU — T      21
Organisations, Network Management Forum      20
Ownership domain      37
Peripheral functions      42
Platform, database models and management services      376
Platform, extensions supporting the DMF      380—382
Platform, features support in DMF application services      375
Platform, presentation services      377
Platform, typical modem day management      374—380
Policy in actors and roles scenario      67
Policy, considerations      130
Policy, definition      62
Policy, impact on security requirements      153
Policy, issues      36
Policy, management policy definition      64
Policy, objectives VPN cost and charging management      225
Policy, quality of service      117
Policy, securing management systems      172—175
Policy, security - description      135
Policy, specification method      63
Policy, UPT service profile management      306—311
Policy, VPN bandwidth management      216
Policy, VPN charging information model      257
Policy, VPN cost and charging management      237
Privil ege Attribute Certificate      165
Protocol Adapters      96
Protocol, features      100
Protocol, object definition      96
Protocol, ODMA support      364
1 2 3
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте