Network and distributed systems management:
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Wokingham u.a.
Addison-Wesley
1994
|
Ausgabe: | 1. print. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XIX, 666 S. graph. Darst. |
ISBN: | 0201627450 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV009665807 | ||
003 | DE-604 | ||
005 | 19950113 | ||
007 | t | ||
008 | 940622s1994 d||| |||| 00||| eng d | ||
020 | |a 0201627450 |9 0-201-62745-0 | ||
035 | |a (OCoLC)832151615 | ||
035 | |a (DE-599)BVBBV009665807 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-29T |a DE-91 |a DE-634 |a DE-83 |a DE-11 |a DE-188 | ||
082 | 0 | |a 004.6 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
084 | |a DAT 250f |2 stub | ||
245 | 1 | 0 | |a Network and distributed systems management |c ed. by Morris Sloman |
250 | |a 1. print. | ||
264 | 1 | |a Wokingham u.a. |b Addison-Wesley |c 1994 | |
300 | |a XIX, 666 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Verteiltes System |0 (DE-588)4238872-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Verteiltes System |0 (DE-588)4238872-7 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Sloman, Morris |e Sonstige |4 oth | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=006391853&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-006391853 |
Datensatz im Suchindex
_version_ | 1804124010116546560 |
---|---|
adam_text | Contents
Preface v
Part I Introduction
1 Management: What and Why 3
1.1 The network decade 3
1.2 Distributed versus networked systems 4
1.3 What is management 5
1.4 Management example 6
1.4.1 The scenario 6
1.4.2 Required management 6
1.5 Why do we need management? 8
1.6 Evolution of management 9
1.7 Book structure 10
Abbreviations 12
References 13
Part II Enabling Technologies
2 Network Technologies 17
2.1 Network classification and standards evolution 17
2.2 Local area networks 22
2.2.1 CSMA/CD Ethernet 25
2.2.2 Token ring 26
2.2.3 Token bus 29
2.2.4 Protocols 30
2.2.5 FDDI 30
2.2.6 Bridges 31
2.2.7 Remote bridges 34
2.3 Metropolitan area networks 34
2.4 Wide area network 37
2.4.1 Packet switched networks 37
2.4.2 Integrated services digital networks (ISDN) 39
2.4.3 Private network 39
2.5 Internetworks 40
2.5.1 Addresses 41
2.5.2 Network layer structure 42
2.5.3 Routing 43
2.6 Summary 44
Abbreviations 45
Bibliography and further reading 45
3 Distributed Systems 47
3.1 What is a distributed system? 48
3.2 Distributed applications 49
3.3 Distributed system architecture 52
3.4 Language level software structure 54
3.4.1 Software components 54
3.4.2 Interfaces 54
3.4.3 Component instantiation and interconnection 55
3.4.4 Dynamic binding 56
3.5 Language level communication primitives 57
3.5.1 Message receipt 57
3.5.2 Message send 58
3.6 A simplified (network monitoring) example 61
3.7 Some issues common to all layers 62
3.7.1 Naming 62
3.7.2 Synchronization 63
3.7.3 Error control 63
3.7.4 Resource management 63
3.8 Conclusions 64
Abbreviations 64
References 64
Part III Models and Standards for Management
4 OSI Management Model and Standards 69
4.1 Management standards in the OSI context 69
4.2 Systems management and its architecture 73
4.3 Supporting services for management 76
4.3.1 Event handling 77
4.3.2 Logging 78
4.3.3 Access control 79
4.4 Systems management function standards 79
4.4.1 Configuration management 80
4.4.2 Alarm reporting 82
4.4.3 Fault management 83
4.4.4 Audit trails 83
4.4.5 Performance management 83
4.4.6 Accounting management 84
4.4.7 Other functions 84
4.5 Systems management communications 85
4.5.1 The Common Management Information Service 85
4.5.2 The Common Management Information Protocol 87
4.6 Other activities relating to OSI management 90
4.7 Open issues 91
Abbreviations 92
References 92
5 OSI Structure of Management Information 95
5.1 Introduction 95
5.1.1 What is management information 95
5.1.2 The SMI standards 97
5.2 The management information model 98
5.2.1 The purpose of the information model 98
5.3 Managed objects 99
5.3.1 Managed objects in context 99
5.3.2 The concept of a managed object 102
5.3.3 More general object models 103
5.4 Defining managed objects 106
5.4.1 Managed object classes 106
5.4.2 Packages 106
5.4.3 Inheritance 108
5.4.4 Generic managed object definitions 109
5.5 Managed object attributes 109
5.5.1 Single attributes 109
5.5.2 Attribute group 110
5.6 Management operation 110
5.6.1 General purpose operations on attributes 111
5.6.2 Operations on managed objects as a whole 111
5.6.3 Multiple operations and synchronization 113
5.7 Notifications 114
5.8 Names and containment 115
5.8.1 Names of properties of managed objects 115
5.8.2 Containment 115
5.8.3 Name structure 116
5.8.4 The local form 116
5.8.5 The global part 117
5.8.6 A naming example 117
5.8.7 Name bindings 119
5.9 Support for management knowledge 120
5.10 Compatibility and allomorphism 121
5.10.1 Requirements and approach 121
5.10.2 Variation within managed object classes 122
5.10.3 Compatibility 122
5.10.4 Best efforts management 123
5.10.5 Allomorphism 124
5.10.6 Remarks 125
5.11 Relationship with Directory standards 125
5.12 Documentation of management information 126
5.12.1 The Definition of Management Information 127
5.12.2 Generic Management Information 127
Abbreviations 128
References 129
6 Guidelines for the Definition of Managed Objects 131
6.1 The purpose of the guidelines 131
6.2 Guidance to managed object definers 132
6.2.1 General principles 132
6.2.2 Global issues 133
6.2.3 A concrete realization of the Management Information
Model 134
6.3 Introduction to the notation 135
6.3.1 Templates 135
6.3.2 References between templates 135
6.3.3 In line templates 136
6.3.4 References to ASN.l modules 136
6.4 The templates 137
6.4.1 Elements of a managed object class definition 137
6.4.2 Managed object class template 137
6.4.3 Package template 139
6.4.4 Parameter template 142
6.4.5 Attribute template 145
6.4.6 Attribute group template 147
6.4.7 Behaviour template 149
6.4.8 Action template 149
6.4.9 Notification template 151
6.4.10 Name binding template 152
6.5 Relationship between managed object 154
6.6 Using the templates 155
6.6.1 The template meta language 156
6.7 Example of a managed object class 157
Abbreviations 163
References 164
7 Simple Network Management Protocol 165
7.1 Background 165
7.1.1 The origins of TCP/IP network management 165
7.1.2 The evolution of SNMP 167
7.1.3 SNMP related standards 169
7.2 Basic concepts 170
7.2.1 Network management 170
7.2.2 Network management protocol architecture 172
7.2.3 Trap directed polling 173
7.2.4 Proxies 173
7.3 SNMPv2 174
7.3.1 The elements of SNMPv2 176
7.3.2 Structure of management information 177
7.3.3 Protocol operation 180
7.3.4 SNMPv2 management information base 184
7.4 SNMPv2 security 185
7.4.1 SNMPv2 parties 186
7.4.2 Message format 186
7.4.3 Privacy 189
7.4.4 Authentication 190
7.4.5 Clock synchronization 193
7.4.6 Access control 194
7.5 SNMPv 1, SNMPv2, and CMIP 194
7.6 What have we gained? 195
Abbreviations 195
References 196
8 Comparison of SNMP and CMIP Management
Architectures 197
8.1 Introduction 197
8.2 Comparison criteria 199
8.3 Information structure 200
8.3.1 Information structuring methodology 200
8.3.2 Object naming 208
8.3.3 Data representation 210
8.3.4 Relationship representation 211
8.4 Management functions 212
8.5 Underlying communications 213
8.5.1 SNMP communications 213
8.5.2 CMIP communications 214
8.6 Conclusion 214
Abbreviations 215
References 215
9 The Telecommunications Management Network (TMN) 217
9.1 Introduction 217
9.2 TMN objectives 219
9.3 TMN activities 221
9.4 TMN applications 223
9.5 TMN functional architecture 225
9.6 TMN physical architecture 229
9.7 TMN management information 231
9.8 Generic network information model 233
9.9 TMN management implementation 234
9.10 Future TMN activities 236
9.11 Closing comment 237
Abbreviations 237
References 238
Part IV Management Functions
10 Name Management and Directory Services 247
10.1 Introduction: the problem of object identification 247
10.2 The evolution of naming schemes 248
10.2.1 Terminology 248
10.2.2 Historical perspectives in naming 249
10.2.3 Distinguished names and X.500 250
10.2.4 Distinguished names at the user interface 252
10.2.5 Other forms of names : object and universal identifiers 253
10.3 Support mechanisms for naming: directory services 255
10.3.1 Definition of centralized and distributed directory 255
10.3.2 The X.500 directory standard 256
10.3.3 Distributed directory operation: an example 260
10.4 Operational aspects of naming 261
10.4.1 Unification of naming spaces 262
10.4.2 Design of a structured name space 264
10.4.3 Construction and operation of the distributed directory 267
10.5 The challenges of future global naming 269
10.6 Summary 270
Abbreviations 270
References 271
11 Quality of Service Management in Distributed Systems 273
11.1 Introduction 273
11.2 Fundamental concepts 274
11.2.1 Activities, dimensions and categories 274
11.2.2 QoS management 275
11.3 QoS in standards 278
11.3.1 ISO s reference model for Open Systems Interconnection 278
11.3.2 CCITT I series recommendations 280
11.3.3 Evaluation 281
11.4 Layer specific QoS 282
11.4.1 Network layer 282
11.4.2 Transport layer 283
11.4.3 Operating system layer 285
11.4.4 Distributed systems platform 289
11.5 Towards an integrated view of QoS 291
11.5.1 SC21 QoS framework 291
11.5.2 Quality of Service Architecture 293
11.5.3 Other QoS research 294
11.6 Conclusion 295
Abbreviations 296
References 296
12 Monitoring Distributed Systems 303
12.1 Introduction 303
12.1.1 What is monitoring 303
12.1.2 Concepts and terminology 304
12.1.3 Monitoring model 307
12.2 Generation of monitoring information 309
12.2.1 Status reporting 309
12.2.2 Event detection and reporting 310
12.2.3 Trace generation 311
12.3 Processing of monitoring information 313
12.3.1 Merging 313
12.3.2 Validation of monitoring information 315
12.3.3 Database updating 316
12.3.4 Combination of monitoring information 316
12.3.5 Filtering of monitoring information 319
12.3.6 Analysis of monitoring information 320
12.4 Dissemination of monitoring information 321
12.5 Presentation of monitoring information 322
12.6 Implementation issues 324
12.6.1 Intrusiveness 324
12.6.2 Global state, time and ordering of events 326
12.7 Some existing monitoring systems 329
12.7.1 ZM4/SIMPLE 329
12.7.2 Meta 333
12.7.3 Monitoring database 335
12.8 OSI management standards 337
12.8.1 OSI 337
12.8.2 Generation of monitoring information 338
12.8.3 Event reporting service 339
12.8.4 Log service 341
12.8.4 Processing of monitoring information 342
12.8.5 Discussion 343
12.9 Summary 343
Abbreviations 344
References 344
13 Network Planning 349
13.1 Introduction 349
13.2 Communication networks fundamental problems and performance
measures 353
13.3 The planning process 355
13.4 Monitoring 357
13.4.1 Network monitoring 358
13.4.2 System monitoring 360
13.5 Modeling techniques 361
13.5.1 Performance modeling 361
13.5.2 Modeling and evaluation techniques 363
13.6 Selection of techniques and tools 367
13.7 Synthesis 368
13.7.1 Overview 368
13.7.2 Mathematical formulation and classification 369
13.7.3 Exact methods 369
13.7.4 Heuristic 373
Abbreviations 376
References 377
14 User Administration and Accounting 381
14.1 Administration overview 382
14.1.1 Services 382
14.1.2 Users 382
14.1.3 Administrative functions 383
14.1.4 Administrative data 385
14.2 Usage accounting overview 386
14.2.1 Resource usage accounting 387
14.2.2 Service usage accounting 387
14.3 Usage accounting mechanisms 389
14.3.1 Basic model 389
14.3.2 Monitoring and metering 390
14.3.3 Logging 391
14.4 Billing and charging 391
14.4.1 Commercial billing 391
14.4.2 Charge generation 392
14.5 Payment and quotas 394
14.6 Usage reconciliation 395
14.6.1 International telephone reconciliation 396
14.6.2 Pan European reconciliation 397
14.6.3 The clearing house 398
14.6.4 Roaming while a call is in progress 399
14.7 Summary 401
Abbreviations 401
References 402
15 Security for Management and Management of Security 403
15.1 Introduction 403
15.2 Network security services 406
15.3 Network security mechanisms 408
15.3.1 Cryptography 409
15.3.2 Confidentiality 410
15.3.3 Integrity 410
15.3.4 Authentication 411
15.3.5 Access control 414
15.3.6 Positioning of security mechanisms within layers 415
15.4 Network security management 416
15.4.1 Key management 416
15.4.2 Authentication management 419
15.4.3 Access control management 420
15.4.4 Notarization 420
15.4.5 Auditing 421
15.5 Security management and network management 422
15.5.1 Network management security 422
15.5.2 Supportive security applications 422
15.5.3 Security management context 423
15.6 Summary 424
Abbreviations 424
References 425
Part V Management Policy
16 Domains: A Framework for Structuring Management
Policy 433
16.1 Requirements for management of large distributed systems 433
16.2 Domains 435
16.2.1 Concepts 435
16.2.2 Domain relationships 436
16.3 Managers and managed objects 437
16.4 Management relationships 439
16.4.1 439
16.4.2 Representing users 441
16.4.3 Manager positions 441
16.5 Application to configuration management 442
16.6 Inter organizational domains 445
16.7 Domain service 447
16.7.1 User and mechanism views 448
16.7.2 Object references 449
16.7.3 Domain operations 449
16.7.4 Implementation 450
16.8 Related work 451
16.9 Summary 452
Abbreviations 452
References 453
17 Specification of Management Policies and Discretionary
Access Control 455
17.1 Management policies 456
17.1.1 The need to model policies 458
17.1.2 Characteristics of management action policies 458
17.1.3 Policy attributes 459
17.1.4 Representing management action policies as objects 460
17.1.5 Relationships between management action policies 461
17.1.6 Other classes of policy 464
17.2 Discretionary access control 465
17.2.1 Access rules 466
17.2.2 Example of access rules 468
17.2.3 Removal of access 469
17.2.4 Implementation issues 470
17.2.5 Domino implementation approach 472
17.3 Delegation of authority 473
17.3.1 Management role 474
17.3.2 Delegation of authority using management role objects 475
17.3.3 Management role objects 476
17.4 Summary 479
Abbreviations 479
References 479
Part VI Implementing Management
18 Configuration of Distributed Systems 483
18.1 Components 483
18.2 Client server systems 484
18.3 Static configuration: 486
18.4 Dynamic configuration 489
18.4.1 Dynamic component instantiation 490
18.4.2 Lazy instantiation 491
18.5 Dynamic configuration evolutionary change 492
Change operations 493
18.6 Configuration and open systems 494
18.7 Conclusion 496
References 497
19 Application of Commercial Databases to Management 499
19.1 Re view of data model 499
19.1.1 CODASYL data model 500
19.1.2 Relational data model 501
19.1.3 Semantic model 502
19.1.4 Object oriented model 503
19.2 Commercially available database 503
19.2.1 Centralized database systems 503
19.2.2 Distributed database systems 504
19.2.3 Database standards 504
19.3 Case study of database system design 506
19.3.1 Database design process 506
19.3.2 Conceptual design example 510
19.3.3 Logical design for a relational data model 512
References 515
20 Graphical Management Interfaces 517
20.1 The purpose of a GMI: what should it try to achieve? 517
20.2 Human factors considerations: the conceptual framework and
expected behaviors 518
20.2.1 User interaction: the object action paradigm 518
20.2.2 Providing information to the GMI user 519
20.2.3 Providing control to the GMI user 522
20.2.4 Making the GMI usable: consistency and standards 524
20.3 A model for the GMI: what is inside 526
20.3.1 Major functional components 526
20.3.2 The Roles Integration Module 528
20.3.3 The Views Presentation Module 530
20.3.4 The Dialog Presentation Module 532
20.3.5 Additional features 534
20.4 Integration of applications with the GMI 534
20.4.1 Separation of presentation from the semantics 534
20.4.2 Levels of integration 535
20.4.3 Means for inter application communication 536
20.5 Summary 536
Abbreviations 537
References 537
21 Artificial Intelligence in Support of Distributed Network
Management 539
21.1 Introduction 539
21.2 Artificial intelligence (AI) technologies 540
21.2.1 Expert systems in support of network operation 541
21.3 Expert system limitations and the need for enabling technologies 545
21.4 Enabling knowledge technologies 546
21.4.1 Providing interoperability through distributed object
management 549
21.4.2 Distributed artificial intelligence 553
21.4.3 Powerful knowledge representation 558
21.4.4 Machine learning for adapting self improving systems 562
21.5 Technology trends in the future network 569
21.5.1 The ultimate network and its evolution 569
21.5.2 An autonomous network scenario 570
21.6 Summary 571
Abbreviations 573
References 573
Part VII Case Studies
22 Digital Equipment Corporation s Enterprise Management
Architecture 581
22.1 The purpose of EMA 581
22.2 The EMA model 582
22.2.1 Directors 583
22.2.2 Entities 584
22.2.3 Common Agent 584
22.2.4 DECmcc 585
22.3 The goals of EMA and their implications 586
22.3.1 Integration 586
22.3.2 Heterogeneity, standards, and interoperability 587
22.3.3 Dynamic extensibility 588
22.3.4 Open, architected application programming interface 589
22.4 DECmcc director 589
22.4.1 Management modules 589
22.4.2 Management information 591
22.4.3 Intermodule calling (mcc_call 593
22.4.4 Reusing DECmcc management module services 594
22.4.5 DECmcc as a distributed application 595
22.4.6 Management domains 596
22.5 DECmcc modules 596
22.5.1 Access modules 597
22.5.2 Function modules 598
22.5.3 Presentation modules 600
22.5.4 Agent PMs and AMs 601
22.6 What you get for free 601
22.7 Conclusions 602
Abbreviations 602
References 603
23 DME Framework and Design 605
23.1 The DME framework 605
23.1.1 Scalability 606
23.1.2 System and network management 607
23.1.3 A coherent user interface 607
23.1.4 Interoperability 607
23.1.5 Distributed management as distributed objects 608
23.2 High level overview of the architecture 608
23.2.1 Related standards and environments 609
23.2.2 Reconciling environments 611
23.2.3 Object framework infrastructure 611
23.2.4 Object services 613
23.2.5 Management services 614
23.3 Implementation of the DME framework 617
23.3.1 Object references 617
23.3.2 DCE client side enhancements 618
23.3.3 DCE server side enhancements 621
23.3.4 Object services 622
23.4 Development approach 625
Abbreviations 626
References 627
24 Managing Change 629
24.1 Introduction 629
24.2 ARCHETYPE 630
24.2.1 AEL Principles 631
24.2.2 AAL Principles 631
24.3 MetaWindow 632
24.3.1 Design with Metawindow 632
24.3.2 Compiling and monitoring 638
24.4 OSI 640
24.4.1 Service access points (SAPs) 640
24.4.2 Peer to peer protocols 642
24.5 Summary 643
Abbreviations 643
References 644
Part VIM Conclusions
25 Future Directions 647
Abbreviations 652
References 653
Index 657
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV009665807 |
classification_rvk | ST 200 |
classification_tum | DAT 250f |
ctrlnum | (OCoLC)832151615 (DE-599)BVBBV009665807 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1. print. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01423nam a2200385 c 4500</leader><controlfield tag="001">BV009665807</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">19950113 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">940622s1994 d||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0201627450</subfield><subfield code="9">0-201-62745-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)832151615</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV009665807</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 250f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network and distributed systems management</subfield><subfield code="c">ed. by Morris Sloman</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. print.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Wokingham u.a.</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">1994</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIX, 666 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Verteiltes System</subfield><subfield code="0">(DE-588)4238872-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sloman, Morris</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=006391853&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-006391853</subfield></datafield></record></collection> |
id | DE-604.BV009665807 |
illustrated | Illustrated |
indexdate | 2024-07-09T17:38:52Z |
institution | BVB |
isbn | 0201627450 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-006391853 |
oclc_num | 832151615 |
open_access_boolean | |
owner | DE-29T DE-91 DE-BY-TUM DE-634 DE-83 DE-11 DE-188 |
owner_facet | DE-29T DE-91 DE-BY-TUM DE-634 DE-83 DE-11 DE-188 |
physical | XIX, 666 S. graph. Darst. |
publishDate | 1994 |
publishDateSearch | 1994 |
publishDateSort | 1994 |
publisher | Addison-Wesley |
record_format | marc |
spelling | Network and distributed systems management ed. by Morris Sloman 1. print. Wokingham u.a. Addison-Wesley 1994 XIX, 666 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Literaturangaben Rechnernetz (DE-588)4070085-9 gnd rswk-swf Verteiltes System (DE-588)4238872-7 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Verteiltes System (DE-588)4238872-7 s DE-604 Sloman, Morris Sonstige oth HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=006391853&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Network and distributed systems management Rechnernetz (DE-588)4070085-9 gnd Verteiltes System (DE-588)4238872-7 gnd |
subject_GND | (DE-588)4070085-9 (DE-588)4238872-7 |
title | Network and distributed systems management |
title_auth | Network and distributed systems management |
title_exact_search | Network and distributed systems management |
title_full | Network and distributed systems management ed. by Morris Sloman |
title_fullStr | Network and distributed systems management ed. by Morris Sloman |
title_full_unstemmed | Network and distributed systems management ed. by Morris Sloman |
title_short | Network and distributed systems management |
title_sort | network and distributed systems management |
topic | Rechnernetz (DE-588)4070085-9 gnd Verteiltes System (DE-588)4238872-7 gnd |
topic_facet | Rechnernetz Verteiltes System |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=006391853&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT slomanmorris networkanddistributedsystemsmanagement |