Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Berquist K., Berquist A. — Managing Information Highways: The PRISM Book: Principles, Methods, and Case Studies for Designing Telecommunications Management Systems
Berquist K., Berquist A. — Managing Information Highways: The PRISM Book: Principles, Methods, and Case Studies for Designing Telecommunications Management Systems



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Managing Information Highways: The PRISM Book: Principles, Methods, and Case Studies for Designing Telecommunications Management Systems

Авторы: Berquist K., Berquist A.

Аннотация:

This monograph constitutes the final report of the EC-sponsored PRISM project, which was devoted to communications management for integrated broadband communications (IBC) within the RACE program. The book introduces and applies the distributed management framework (DMF) developed for the specification and design of multi-domain management systems for controlling, monitoring, and administrating IBC networks. The DMF framework is evaluated in detail and related to other international architectural and specification work aimed at creating advanced communication management systems. Also, a summary of existing platforms potentially supporting PRISM's DMF system, a glossary, a list of acronyms and abreviations, and a detailed subject index are included.


Язык: en

Рубрика: Computer science/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 1996

Количество страниц: 418

Добавлена в каталог: 05.12.2010

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Protocol, security and the DPE platform      193
Protocol, support in platforms      380
Q interfaces in mapping between engineering and technology      113
Q interfaces in securing inter — TMN interactions      135
Q interfaces in securing management systems      158
Q interfaces in service-network management interaction      46
Q interfaces, interface in scenario for communications security      198
Q interfaces, support by computational interfaces      86
Q interfaces, support in platforms      375
Quality of service in management service design      119
Quality of service in supporting trading information      381
Quality of service in VPN engineering viewpoint      289
Quality of service, Computational viewpoint      123
Quality of service, definition      114
Quality of service, designing the QoS of management      120
Quality of service, Engineering viewpoint      125
Quality of service, Enterprise Viewpoint      117
Quality of service, identifying QoS parameters      119
Quality of service, Information viewpoint      121
Quality of service, introduction      113
Quality of service, management parameters      120
Quality of service, policy      117
Quality of service, responsibilities      118
Quality of service, structuring      115
Quality of service, VPN cost and charging management      239
Reference Point, support in platforms      380
Reference Point, viewpoint      96
Reference Point, VPN cost and charging management      280
Regulation      130
Relationships between concepts, Computational viewpoint      88
Relationships between concepts, Engineering viewpoint      97
Relationships between concepts, Enterprise viewpoint      68
Repudiation definition      137
Requirement type      41
Requirements capture description      40 57
Requirements capture description, process      41
Requirements capture description, securing management systems      157—159
Requirements capture description, security analysis method      139
Requirements capture description, UPT service profile management      302
Requirements capture description, VPN bandwidth management      214
Requirements capture description, VPN cost and charging management      227
Risk analysis in capturing security requirements      157
Risk analysis in defining countermeasures      160
Risk analysis in defining enterprise security objectives and policies      146
Risk analysis in describing management services      160
Risk analysis in the Enterprise Viewpoint      148—151
Risk analysis, acceptance and validation      168
Risk analysis, cost/benefit evaluation      166—167
Role in actors and roles scenario      66
Role, definition      56
Role, interaction between generic UPT roles      314
Scenarios, actors and roles      66
Scenarios, enterprise scenario description      65
Scenarios, event-trace diagrams      68
Scenarios, Information viewpoint definition      74
Scenarios, securing management systems      175—179
Scenarios, security communications      198
Scenarios, UPT service profile management      316—321
Scenarios, use cases      68
Scenarios, VPN bandwidth management      218
Scenarios, VPN cost and charging management      238
Security functionality class in security policies      174
Security functionality class, designing in the Enterprise viewpoint      162
Security in VPN engineering viewpoint      289
Security measures, cost/benefit evaluation      166—67
Security measures, designing with Trusted Third Parties      164
Security mechanisms, need for standardising      160
Security mechanisms, shopping for      202
Security of management      17 132
Security policy in the Enterprise Viewpoint      146—148
Security policy, capability based      136
Security policy, description      135
Security policy, identity based      136
Security policy, inter — TMN      141
Security policy, label based      136
Security services, designing in the Enterprise Viewpoint      161
Security services, support in platforms      376
Security services, technologies      196—202
Security sub-profile in security policies      174
Security sub-profile, designing in the Enterprise Viewpoint      163
Security, analysis method      137
Security, applying to the DMF      140—202
Security, comparison of TINA — C to the DMF      362
Security, concepts      133
Security, design issues      43
Security, design techniques      132—40
Security, domains - description      13 4
Security, DPE platform      193—194
Security, infrastructure      145
Security, objectives      133
Security, ONP's impacts      155
Security, overview for management systems      127 129
Security, placement of functionality      195
Security, policies - description      135
Security, policy for UPT service profile management      306
Security, privacy's impacts      153
Security, regulator and legal requirements      151—156
Security, scenarios      175—79
Security, scope in the DMF      132
Security, severity levels      133
Security, standards impacts      156
Security, technologies supporting      196
Security, UPT service profile management computational aspects      339—342
Security, UPT service profile management information model      33
Security, Viewpoint      149—151
Security, VPN cost and charging management      283—288
Security, why secure management systems      17 129—132
Service and Network Management Interaction      46
Service Management      32
Service Profile Management      294—321
Service providers as Trusted Third Parties      172
Service providers in external access      42
Service providers in securing management systems      141
Service providers in VPN case study      208
Service providers, BSP Accounting Model      245
Service providers, UPT service profile management      299—300
Service providers, VASP Accounting Model      246
Severity levels      133
shared management knowledge      46
SMART      20
SNMP in an extended platform supporting the DMF      380
SNMP in supporting communications services      375
SNMP, development      21
SNMP, supporting modularity and open interfaces      381
SNMP, used in Quality of Service      125
SNMP, used in the Engineering Viewpoint      90 112
Software in management systems      6
Spirit      20
State diagram      74
States      74
Static information model description      71
Static information model description, method      72
Static information model description, securing management systems      179—83
Static information model description, UPT service profile management      323—27
Static information model description, VPN cost and charging management      242—48
Structuring the enterprise description      61
Structuring the enterprise description, securing management systems      169
Structuring the enterprise description, UPT service profile management      306
Structuring the enterprise description, VPN bandwidth management      215
Structuring the enterprise description, VPN cost and charging management      236
Stub in modelling transparencies      102
Stub, features      99
Stub, object definition      95
Stub, ODMA support      364
Stub, security and the DPE platform      193
Stub, support in platforms      380
Subclass, Information viewpoint definition      72
Superclass, Information viewpoint definition      72
System Performance definition      114
Technology Viewpoint, comparison of DMF to ODMA      367
Technology Viewpoint, definition      29
Technology Viewpoint, description      103
Technology Viewpoint, introduction      103
Technology Viewpoint, mapping to Engineering viewpoint      112
Technology Viewpoint, method      104
Technology Viewpoint, ODMA      364
Technology Viewpoint, securing management systems      195—202
Technology Viewpoint, support in platforms      380
Telecommunications evolution overview      3
Telecommunications Management      25—27 25—27
Telecommunications Management, organisations      19—22
Telecommunications Management, overview      16—19
Threat, analysis in the Enterprise Viewpoint      416
Threat, security analysis method      139
TINA — C mapping at functional layer      361
TINA-C, architecture overview      357—361
TINA-C, comparison to DMF      361—362
TINA-C, description      21
TINA-C, distributed processing environment (DPE)      360
TINA-C, Object Description Language      381
TINA-C, responsibility layers      362
TINA-C, scope - implementation vs. enterprise      362
TINA-C, TMN mapping at functional layer      361
TINA-C, UPT service profile management      345
TINA-C, VPN cost and charging management      281
TMN, function block definition      85
TMN, functional architecture      85
TMN, functional blocks VPN cost and charging management      280
TMN, functional components      85
TMN, inter — TMN security policy      141
TMN, interface      85
TMN, interface description      40
TMN, interface relating to security domains      135
TMN, interfaces with security domains      135
TMN, mapping to engineering concepts      111
TMN, mapping VPN engineering model      290
TMN, Operation System Function (OSF) definition      39
TMN, Reference point definition      85
TMN, X interface description      37
Transition      74
Transparencies, applying in the Engineering viewpoint      97
Transparencies, modelling access and location transparencies      101
Transparency, support in platforms      376
Trends, demanding security development      130—132
Trusted Third Party in security policies      172—175
Trusted Third Party, access control computational model      187
Trusted Third Party, access control engineering model      192
Trusted Third Party, access control information model      179—181
Trusted Third Party, actors and roles      156
Trusted Third Party, authentication computational model      185
Trusted Third Party, authentication engineering model      190—191
Trusted Third Party, authentication information model      179—181
Trusted Third Party, communication aspects      189
Trusted Third Party, definition      137
Trusted Third Party, description      140
Trusted Third Party, domains      170—172
Trusted Third Party, inter-domain      170
Trusted Third Party, intra-domain      145
Trusted Third Party, introduction      44
Trusted Third Party, need - introduction      37
Trusted Third Party, off-line authentication      164
Trusted Third Party, on-line and off-line scenario      175
Trusted Third Party, on-line authentication      164
Trusted Third Party, service contract      144
Trusted Third Party, trust issues      143
Trusted Third Party, use of      143
TTP service, in-line - description      146
TTP service, off-line - description      146
TTP service, on-line - description      146
Universal Personal Telecommunications applying to the DMF      293
Universal Personal Telecommunications applying to the DMF, architecture example      344
Universal Personal Telecommunications applying to the DMF, Engineering Viewpoint      344—349
Universal Personal Telecommunications applying to the DMF, evolution      13
Universal Personal Telecommunications applying to the DMF, impact on market      12
Universal Personal Telecommunications applying to the DMF, overview      10—15
Universal Personal Telecommunications applying to the DMF, service life cycle      295
Universal Personal Telecommunications applying to the DMF, service profile      296
Universal Personal Telecommunications applying to the DMF, service profile management      294—321
Universal Personal Telecommunications applying to the DMF, use of services      11
UPT service profile management      320
Use Case, description      68
Use Case, securing management systems      175—179
Value Added Service Provider introduction      9
Virtual Channel Connections (VCCs)      210
Virtual circuit (VC)      211
Virtual Path Connections (VPCs)      210
Virtual Private Network, applying to the DMF      206 205
Virtual Private Network, banking application      206
Virtual Private Network, cost and charging management      222—291
Virtual Private Network, dynamic bandwidth management      210—222
Virtual Private Network, evolution      10
Virtual Private Network, overview      7—10
X interface for co-operative management      141
X interface in communications infrastructure for global management      142
X interface in inter — TMN security policy      147
X interface in ONP      155
X interface in scenario for communications security      198
X interface in securing external access      158
X interface in securing inter — TMN interactions      135
X interface in security functionality classes      162
X interface in service-network management interaction      46
X interface in supporting end-to-end security      143
X interface in the Engineering Viewpoint      112
X interface in Trusted Third Party communications      189
X interface in VPN cost and charging management      281
X interface, description      37
X interface, securing VPN cost and charging management      283
1 2 3
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте