Авторизация
Поиск по указателям
Berquist K., Berquist A. — Managing Information Highways: The PRISM Book: Principles, Methods, and Case Studies for Designing Telecommunications Management Systems
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Managing Information Highways: The PRISM Book: Principles, Methods, and Case Studies for Designing Telecommunications Management Systems
Авторы: Berquist K., Berquist A.
Аннотация: This monograph constitutes the final report of the EC-sponsored PRISM project, which was devoted to communications management for integrated broadband communications (IBC) within the RACE program. The book introduces and applies the distributed management framework (DMF) developed for the specification and design of multi-domain management systems for controlling, monitoring, and administrating IBC networks. The DMF framework is evaluated in detail and related to other international architectural and specification work aimed at creating advanced communication management systems. Also, a summary of existing platforms potentially supporting PRISM's DMF system, a glossary, a list of acronyms and abreviations, and a detailed subject index are included.
Язык:
Рубрика: Computer science /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 1996
Количество страниц: 418
Добавлена в каталог: 05.12.2010
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
Protocol, security and the DPE platform 193
Protocol, support in platforms 380
Q interfaces in mapping between engineering and technology 113
Q interfaces in securing inter — TMN interactions 135
Q interfaces in securing management systems 158
Q interfaces in service-network management interaction 46
Q interfaces, interface in scenario for communications security 198
Q interfaces, support by computational interfaces 86
Q interfaces, support in platforms 375
Quality of service in management service design 119
Quality of service in supporting trading information 381
Quality of service in VPN engineering viewpoint 289
Quality of service, Computational viewpoint 123
Quality of service, definition 114
Quality of service, designing the QoS of management 120
Quality of service, Engineering viewpoint 125
Quality of service, Enterprise Viewpoint 117
Quality of service, identifying QoS parameters 119
Quality of service, Information viewpoint 121
Quality of service, introduction 113
Quality of service, management parameters 120
Quality of service, policy 117
Quality of service, responsibilities 118
Quality of service, structuring 115
Quality of service, VPN cost and charging management 239
Reference Point, support in platforms 380
Reference Point, viewpoint 96
Reference Point, VPN cost and charging management 280
Regulation 130
Relationships between concepts, Computational viewpoint 88
Relationships between concepts, Engineering viewpoint 97
Relationships between concepts, Enterprise viewpoint 68
Repudiation definition 137
Requirement type 41
Requirements capture description 40 57
Requirements capture description, process 41
Requirements capture description, securing management systems 157—159
Requirements capture description, security analysis method 139
Requirements capture description, UPT service profile management 302
Requirements capture description, VPN bandwidth management 214
Requirements capture description, VPN cost and charging management 227
Risk analysis in capturing security requirements 157
Risk analysis in defining countermeasures 160
Risk analysis in defining enterprise security objectives and policies 146
Risk analysis in describing management services 160
Risk analysis in the Enterprise Viewpoint 148—151
Risk analysis, acceptance and validation 168
Risk analysis, cost/benefit evaluation 166—167
Role in actors and roles scenario 66
Role, definition 56
Role, interaction between generic UPT roles 314
Scenarios, actors and roles 66
Scenarios, enterprise scenario description 65
Scenarios, event-trace diagrams 68
Scenarios, Information viewpoint definition 74
Scenarios, securing management systems 175—179
Scenarios, security communications 198
Scenarios, UPT service profile management 316—321
Scenarios, use cases 68
Scenarios, VPN bandwidth management 218
Scenarios, VPN cost and charging management 238
Security functionality class in security policies 174
Security functionality class, designing in the Enterprise viewpoint 162
Security in VPN engineering viewpoint 289
Security measures, cost/benefit evaluation 166—67
Security measures, designing with Trusted Third Parties 164
Security mechanisms, need for standardising 160
Security mechanisms, shopping for 202
Security of management 17 132
Security policy in the Enterprise Viewpoint 146—148
Security policy, capability based 136
Security policy, description 135
Security policy, identity based 136
Security policy, inter — TMN 141
Security policy, label based 136
Security services, designing in the Enterprise Viewpoint 161
Security services, support in platforms 376
Security services, technologies 196—202
Security sub-profile in security policies 174
Security sub-profile, designing in the Enterprise Viewpoint 163
Security, analysis method 137
Security, applying to the DMF 140—202
Security, comparison of TINA — C to the DMF 362
Security, concepts 133
Security, design issues 43
Security, design techniques 132—40
Security, domains - description 13 4
Security, DPE platform 193—194
Security, infrastructure 145
Security, objectives 133
Security, ONP's impacts 155
Security, overview for management systems 127 129
Security, placement of functionality 195
Security, policies - description 135
Security, policy for UPT service profile management 306
Security, privacy's impacts 153
Security, regulator and legal requirements 151—156
Security, scenarios 175—79
Security, scope in the DMF 132
Security, severity levels 133
Security, standards impacts 156
Security, technologies supporting 196
Security, UPT service profile management computational aspects 339—342
Security, UPT service profile management information model 33
Security, Viewpoint 149—151
Security, VPN cost and charging management 283—288
Security, why secure management systems 17 129—132
Service and Network Management Interaction 46
Service Management 32
Service Profile Management 294—321
Service providers as Trusted Third Parties 172
Service providers in external access 42
Service providers in securing management systems 141
Service providers in VPN case study 208
Service providers, BSP Accounting Model 245
Service providers, UPT service profile management 299—300
Service providers, VASP Accounting Model 246
Severity levels 133
shared management knowledge 46
SMART 20
SNMP in an extended platform supporting the DMF 380
SNMP in supporting communications services 375
SNMP, development 21
SNMP, supporting modularity and open interfaces 381
SNMP, used in Quality of Service 125
SNMP, used in the Engineering Viewpoint 90 112
Software in management systems 6
Spirit 20
State diagram 74
States 74
Static information model description 71
Static information model description, method 72
Static information model description, securing management systems 179—83
Static information model description, UPT service profile management 323—27
Static information model description, VPN cost and charging management 242—48
Structuring the enterprise description 61
Structuring the enterprise description, securing management systems 169
Structuring the enterprise description, UPT service profile management 306
Structuring the enterprise description, VPN bandwidth management 215
Structuring the enterprise description, VPN cost and charging management 236
Stub in modelling transparencies 102
Stub, features 99
Stub, object definition 95
Stub, ODMA support 364
Stub, security and the DPE platform 193
Stub, support in platforms 380
Subclass, Information viewpoint definition 72
Superclass, Information viewpoint definition 72
System Performance definition 114
Technology Viewpoint, comparison of DMF to ODMA 367
Technology Viewpoint, definition 29
Technology Viewpoint, description 103
Technology Viewpoint, introduction 103
Technology Viewpoint, mapping to Engineering viewpoint 112
Technology Viewpoint, method 104
Technology Viewpoint, ODMA 364
Technology Viewpoint, securing management systems 195—202
Technology Viewpoint, support in platforms 380
Telecommunications evolution overview 3
Telecommunications Management 25—27 25—27
Telecommunications Management, organisations 19—22
Telecommunications Management, overview 16—19
Threat, analysis in the Enterprise Viewpoint 416
Threat, security analysis method 139
TINA — C mapping at functional layer 361
TINA-C, architecture overview 357—361
TINA-C, comparison to DMF 361—362
TINA-C, description 21
TINA-C, distributed processing environment (DPE) 360
TINA-C, Object Description Language 381
TINA-C, responsibility layers 362
TINA-C, scope - implementation vs. enterprise 362
TINA-C, TMN mapping at functional layer 361
TINA-C, UPT service profile management 345
TINA-C, VPN cost and charging management 281
TMN, function block definition 85
TMN, functional architecture 85
TMN, functional blocks VPN cost and charging management 280
TMN, functional components 85
TMN, inter — TMN security policy 141
TMN, interface 85
TMN, interface description 40
TMN, interface relating to security domains 135
TMN, interfaces with security domains 135
TMN, mapping to engineering concepts 111
TMN, mapping VPN engineering model 290
TMN, Operation System Function (OSF) definition 39
TMN, Reference point definition 85
TMN, X interface description 37
Transition 74
Transparencies, applying in the Engineering viewpoint 97
Transparencies, modelling access and location transparencies 101
Transparency, support in platforms 376
Trends, demanding security development 130—132
Trusted Third Party in security policies 172—175
Trusted Third Party, access control computational model 187
Trusted Third Party, access control engineering model 192
Trusted Third Party, access control information model 179—181
Trusted Third Party, actors and roles 156
Trusted Third Party, authentication computational model 185
Trusted Third Party, authentication engineering model 190—191
Trusted Third Party, authentication information model 179—181
Trusted Third Party, communication aspects 189
Trusted Third Party, definition 137
Trusted Third Party, description 140
Trusted Third Party, domains 170—172
Trusted Third Party, inter-domain 170
Trusted Third Party, intra-domain 145
Trusted Third Party, introduction 44
Trusted Third Party, need - introduction 37
Trusted Third Party, off-line authentication 164
Trusted Third Party, on-line and off-line scenario 175
Trusted Third Party, on-line authentication 164
Trusted Third Party, service contract 144
Trusted Third Party, trust issues 143
Trusted Third Party, use of 143
TTP service, in-line - description 146
TTP service, off-line - description 146
TTP service, on-line - description 146
Universal Personal Telecommunications applying to the DMF 293
Universal Personal Telecommunications applying to the DMF, architecture example 344
Universal Personal Telecommunications applying to the DMF, Engineering Viewpoint 344—349
Universal Personal Telecommunications applying to the DMF, evolution 13
Universal Personal Telecommunications applying to the DMF, impact on market 12
Universal Personal Telecommunications applying to the DMF, overview 10—15
Universal Personal Telecommunications applying to the DMF, service life cycle 295
Universal Personal Telecommunications applying to the DMF, service profile 296
Universal Personal Telecommunications applying to the DMF, service profile management 294—321
Universal Personal Telecommunications applying to the DMF, use of services 11
UPT service profile management 320
Use Case, description 68
Use Case, securing management systems 175—179
Value Added Service Provider introduction 9
Virtual Channel Connections (VCCs) 210
Virtual circuit (VC) 211
Virtual Path Connections (VPCs) 210
Virtual Private Network, applying to the DMF 206 205
Virtual Private Network, banking application 206
Virtual Private Network, cost and charging management 222—291
Virtual Private Network, dynamic bandwidth management 210—222
Virtual Private Network, evolution 10
Virtual Private Network, overview 7—10
X interface for co-operative management 141
X interface in communications infrastructure for global management 142
X interface in inter — TMN security policy 147
X interface in ONP 155
X interface in scenario for communications security 198
X interface in securing external access 158
X interface in securing inter — TMN interactions 135
X interface in security functionality classes 162
X interface in service-network management interaction 46
X interface in supporting end-to-end security 143
X interface in the Engineering Viewpoint 112
X interface in Trusted Third Party communications 189
X interface in VPN cost and charging management 281
X interface, description 37
X interface, securing VPN cost and charging management 283
Реклама