GR-1343-CORE. Contents
|
|
- Frederick Shields
- 5 years ago
- Views:
Transcription
1 1. Introduction Background and Motivation Relationship to AMATPS Documentation Document Presentation Style Summary of GR-1343-CORE Updates Reasons for Issue Reasons for Issue Reasons for Issue Reasons for Issue Reasons for Issue Requirements Terminology Requirement Labeling Conventions Numbering of Requirement and Related Objects Requirement, Conditional Requirement, and Objective Object Identification System Overview System Architecture System Characteristics Near Real-Time Data Availability Specialized Data Processing Sender-Initiated and Receiver-Initiated Data Transfer Standard Centralized System Management Standard Protocols System Component Functionalities Data Server Functionality DPMS Functionality System Manager Functionality System Interfaces System Security Auditing Capabilities AMADNS/AMATPS Inter-Operation Dual DPMS-Collector Dual Data Server-Collector Dual Data Server-AMAT DPMS/Collector Interface AMADNS in Next Generation Networks Data Server Generic Requirements Introduction Overview Logical Architecture Data Organization Data Processing Processing and Transfer Profiles v
2 3.2.2 Processing Environment Core Data Processing Specialized Data Processing File Handling File Creation File Naming File Status File Priority AMA Field Suppression File Integrity Control File Storage Audit Data Assurance of Accurate Date/Time Processing Data Communications Interface Support GDI DDI SMMCI Data Availability for File Transfer File Transfer Initiation File Transfer Initiation Parameters Data Storage Removable Media Compression Administration SNMP Management Functions Simple Network Management Protocol MIB Support SNMP Traps Data Currentness Clock Accuracy and Precision Service Changes Operations Data Modification Program Handling Maintenance General Maintenance Considerations Test File Exchange FTP User Perspective FTP Server Perspective Local Alarms Alarm Definition Alarm Generation Security System and Network Security Threats Component Security Features Security Administration vi
3 3.10 Physical Environment Reliability Component Architecture Reliability Availability General Component Availability Interface Availability General Reliability and Quality System Design and Architecture Manufacturing and Production In-Service Performance and Product Support Performance Processing Power Data Accuracy Communication Support Data Processing and Management System Generic Requirements Introduction Overview Logical Architecture Data Organization Data Processing Processing and Transfer Profiles Processing Environment Core Data Processing Specialized Data Processing File Handling File Creation File Naming File Status File Priority AMA Field Suppression File Integrity Control File Storage AMA Database Audit Data Assurance of Accurate Date/Time Processing Data Communications Interface Support DDI DAI SMMCI Data Availability for File Transfer File Transfer Initiation File Transfer Initiation Parameters Data Storage Removable Media Archiving vii
4 4.7 Compression Administration SNMP Management Functions Simple Network Management Protocol MIB Support SNMP Traps Data Currentness Clock Accuracy and Precision Service Changes Operations Data Modification Program Handling Tape Format AMA File Audit Log Maintenance General Maintenance Considerations Test File Exchange Local Alarms Alarm Definition Alarm Generation Security System and Network Security Threats System Security Features Security Administration Physical Environment Reliability Component Architecture Reliability Availability General Component Availability Interface Availability General Reliability and Quality Performance Processing Power Data Accuracy Communication Support System Manager Generic Requirements Introduction Overview Logical Architecture Data Organization Data Processing Management Framework Support Communities MIB Support Management Applications Auditing Control Clock Synchronization viii
5 Test File Exchange Security Management Software Distribution System Configuration Fault Management Performance Analysis Resource Accounting Management Application Environment Application Programming Interface User Interface Management Database File Handling File Creation File Naming File Status File Priority File Integrity Control File Storage Assurance of Accurate Date/Time Processing Data Communications Interface Support SMMCI System Manager/System Manager Interface File Transfer Initiation File Transfer Initiation Parameters Data Storage Maintenance General Maintenance Considerations Local Alarms Alarm Definition Alarm Generation Security Availability General Component Availability Interface Availability Performance Generating System/Data Server Interface Generic Requirements Introduction GDI Protocol Stack Real-Time Versus Near Real-Time Data Transport Streamlined AMA Files File Creation File Naming File Status File Integrity Control File Transfer Initiation ix
6 6.3 Trivial File Transfer Protocol Normal Operation Error Recovery TFTP Options Middle Layer Protocols User Datagram Protocol Internet Protocol IP Networking IP Security Internet Control Message Protocol Address Resolution Protocol Lower Layer Protocols ATM Switched Multi-Megabit Data Service Frame Relay Integrated Services Digital Network X LAN Protocols IEEE Standard Fiber Distributed Data Interface IEEE Standard Ethernet Version IEEE Standard Data Server/DPMS Interface Generic Requirements Introduction File Transfer Protocol Roles Command Support File Transfer Options Normal Operation File Deposit File Retrieval Connections Replies Error Recovery File State Information File Transfer Completion Detailed Operation FTP User s Perspective FTP Server s Perspective Security Command Restrictions Authentication Event Logging Telnet Roles x
7 7.3.2 Addressing Security Terminal Type Selection Abnormal Connection Release Echoing Control Functions Error Messaging NVT Representation Option Negotiation Middle Layer Protocols Lower Layer Protocols Data Compression DPMS/Application System Interface Generic Requirements Introduction File Transfer Protocol Roles Command Support File Transfer Options Normal Operation Connections Replies Error Recovery Detailed Operation Security Event Logging SQL-Based RDA Roles Transaction Management Functional Units SQL Support Security Authentication Access Control Dialogue Control Miscellaneous Parameter Settings Parameter and Operation Limitations Failure Recovery Event Logging Upper Layer Protocol Support Association Control Service Element OSI Presentation Layer OSI Session Layer Middle Layer Protocols Lower Layer Protocols Data Compression xi
8 9. System Manager/Managed Component Interface Generic Requirements Introduction Simple Network Management Protocol Roles PDU Definitions PDU Generation PDU Handling SNMP Security Operational Tasks PDU Logging File Transfer Protocol Roles Command Support File Transfer Options Normal Operation Connections Replies Error Recovery Detailed Operation Security Event Logging Telnet Roles Addressing Security Terminal Type Selection Abnormal Connection Release Echoing Control Functions Error Messaging NVT Representation Option Negotiation Middle Layer Protocols Lower Layer Protocols Appendix A: Current AMA Environment... A 1 Appendix B: Specialized Processing Modules... B 1 B.1 Aggregation... B 1 B.1.1 Event Aggregation... B 1 B.1.2 Record Aggregation... B 1 B.2 Formatting... B 2 B.3 Validation... B 2 B.4 Surveillance... B 2 B.5 Correlation... B 2 B.6 Expansion... B 3 B.7 Reduction... B 3 B.8 Format Conversion... B 3 xii
9 B.9 Error Correction... B 3 Appendix C: File Structure... C 1 C.1 File Types... C 1 C.1.1 Tape Format AMA Files... C 1 C AMA Data Tape Block Sequence Numbering... C 2 C.1.2 Streamlined AMA Files... C 4 C.1.3 Standard AMA Files... C 4 C.1.4 Error Files... C 4 C.1.5 Program Files... C 6 C.1.6 Test Files... C 6 C.2 File-Naming Convention... C 7 C.2.1 Component Identifier... C 8 C.2.2 File Sequence Number... C 8 C.2.3 File Type... C 10 C.2.4 File Priority Level... C 10 C.2.5 File Sequence Number Restart Indicator... C 10 C.3 AMADNS File Header... C 11 C.3.1 Primary/Secondary Status... C 14 C.3.2 Field Suppression Type... C 15 C.3.3 Data Format Type... C 17 C.3.4 Record Source Information Type... C 18 C.3.5 File Creation Date/Time... C 18 C.3.6 File Last Modification Date/Time... C 19 Appendix D: FTP Replies... D 1 Appendix E: Flowgraph Key... E 1 E.1 State... E 1 E.2 Input... E 1 E.3 Output... E 1 E.4 Decision... E 2 E.5 Task/Event... E 2 Appendix F: Management Information Base...F 1 F.1 Internet-standard MIB Modules...F 1 F.1.1 MIB-II...F 1 F.1.2 Host Resources MIB Module...F 5 F.2 AMADNS MIB Module...F 5 F.2.1 AMADNS MIB Module...F 6 References... References 1 Glossary...Glossary 1 Requirement-Object Index... ROI 1 xiii
10 xiv
11 List of Figures List of Figures Figure 2-1. AMADNS Logical Architecture Figure 2-2. Document Organization Figure 2-3. Data Server Functional Architecture Figure 2-4. DPMS Functional Architecture Figure 2-5. System Manager Functional Architecture Figure 2-6. Mapping of OSI Layers to Substack Categories Figure 2-7. Potential System Interface Configurations Figure 2-8. AMADNS AMA Record Flows Figure 2-9. Dual DPMS-Collector Architecture Figure Dual Data Server-Collector Architecture Figure Dual Data Server-AMAT Architecture Figure DPMS/Collector Interface Architecture Figure 3-1. Data Server Logical Architecture Figure 3-2. Data Availability for File Transfer Figure 3-3. Security Check Points for Component Access Figure 4-1. DPMS Logical Architecture Figure 4-2. Data Availability for File Transfer Figure 5-1. System Manager Logical Architecture Figure 5-2. System Management Framework Figure 5-3. MIB Object Identifier Branches Figure 6-1. Allowable Generating System/Data Server Interface Protocols Figure 6-2. TFTP Write Request Figure 6-3. TFTP Read Request Figure 7-1. Allowable Data Server/DPMS Interface Protocols Figure 7-2. Roles of an FTP User and FTP Server Figure 7-3. Roles of an FTP Sender and FTP Receiver Figure 7-4. File Deposit Sequence of Events Figure 7-5. File Retrieval Sequence of Events Figure 7-6. FTP Session Initiation - FTP User Perspective Figure 7-7. USER Command - FTP User Perspective Figure 7-8. PASS Command - FTP User Perspective Figure 7-9. TYPE Command - FTP User Perspective Figure STRU Command - FTP User Perspective Figure SITE Command - FTP User Perspective Figure PORT Command - FTP User Perspective Figure PASV Command - FTP User Perspective Figure STOR Command - FTP User Perspective Figure RETR Command - FTP User Perspective Figure ABOR Command - FTP User Perspective Figure QUIT Command - FTP User Perspective Figure Retry State - FTP User Perspective Figure FTP Session Initiation - FTP Server Perspective Figure USER Command - FTP Server Perspective Figure PASS Command - FTP Server Perspective xv
12 List of Figures Figure TYPE Command - FTP Server Perspective Figure STRU Command - FTP Server Perspective Figure SITE Command - FTP Server Perspective Figure PORT Command - FTP Server Perspective Figure PASV Command - FTP Server Perspective Figure STOR Command - FTP Server Perspective Figure RETR Command - FTP Server Perspective Figure ABOR Command - FTP Server Perspective Figure Problem State - FTP Server Perspective Figure QUIT Command - FTP Server Perspective Figure Roles of a Telnet User and Telnet Server Figure 8-1. Allowable DPMS/Application System Interface Protocols Figure 8-2. Roles of an RDA Client and RDA Server Figure 9-1. Allowable System Manager/Managed Component Interface Protocols Figure 9-2. Roles of an SNMP Manager and SNMP Agent Figure A-1. AMATPS Logical Architecture... A 2 Figure C-1. The Structure of AMA Data Within a Tape Format AMA File... C 3 Figure C-2. Error Record Header Format... C 5 Figure C-3. Test File Pattern... C 6 Figure C-4. AMADNS File Header Format... C 11 Figure E-1. State Symbol... E 1 Figure E-2. Input Symbol... E 1 Figure E-3. Output Symbol... E 1 Figure E-4. Decision Symbol... E 2 Figure E-5. Task/Event Symbol... E 2 xvi
13 List of Tables List of Tables Table 2-1. System Interface Protocols Table 3-1. Relationship between Data Types and File Types Table 3-2. Audit Table Example Table 3-3. Internet-Standard Traps Table 3-4. Enterprise-Specific Traps Table 3-5. Local Alarm Conditions Table 4-1. Relationship Between Data Types and File Types Table 4-2. Mapping of Tape Format Record Fields to AMADNS Environment Table 4-3. Audit Table Example Table 4-4. Internet-Standard Traps Table 4-5. Enterprise-Specific Traps Table 4-6. Example of a Tape Format AMA File Audit Log Table 4-7. Local Alarm Conditions Table 5-1. Community Profile Information Table 5-2. Local Alarm Conditions Table 7-1. FTP Roles of a Data Server Table 7-2. FTP Roles of a DPMS Table 8-1. FTP Roles of a DPMS Table 8-2. FTP Roles of an Application System Table 8-3. RDA Functional Units Table 9-1. FTP Roles of the System Manager Table 9-2. FTP Roles of a Managed Component Table C-1. Error Record Header Definitions... C 5 Table C-2. Component Type Codes... C 8 Table C-3. File Type Codes... C 10 Table C-4. AMADNS File Header Definitions... C 12 Table C-5. Primary/Secondary Status Codes... C 15 Table C-6. Field Suppression Type Codes... C 16 Table C-7. Data Format Type Codes for Standard AMA and Error Files... C 17 Table C-8. Data Format Type Codes for Test Files... C 17 Table C-9. Record Source Information Type Codes... C 18 Table F-1. Exceptions to MIB-II for AMADNS...F 2 xvii
Contents. 1 Introduction. 2 AMA Process Model and Key Terminology. 3 AMA Data Generation
1 Introduction 1.1 Reasons for GR-508-CORE, Issue 4........................ 1 1 1.1.1 Reasons for GR-508-CORE, Issue 3..................... 1 2 1.2 Purpose and Scope................................. 1
More informationGeneric Requirements for Operations of ATM NEs
GR 1248 CORE Issue 4, November 1998 Contents Contents Contents Preface...Preface-1 1. Introduction...1-1 1.1 Purpose of Document...1-1 1.2 Major Changes From Issue 3 of GR-1248-CORE...1-1 1.3 Scope of
More informationStarKeeper II NMS SNMP Proxy Agent Guide
StarKeeper II NMS SNMP Proxy Agent Guide 255-114-761 Issue 1 Release 10.0 Copyright 1998 Lucent Technologies All Rights Reserved Printed in USA Datakit and StarKeeper are registered trademarks of Lucent
More informationTABLE OF CONTENTS CHAPTER TITLE PAGE
vii TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION ACKNOWLEDGMENT ABSTRACT ABSTRAK TABLE OF CONTENTS LIST OF TABLES LIST OF FIGURES LIST OF APPENDICES ii iv v vi vii xiii xiv xvi 1 OVERVIEW 1 1.1 Introducation
More informationGR 1129 CORE AINGR: Switch - Intelligent Peripheral Interface (IPI) Contents
Issue 8, November 2003 AINGR: Switch - Intelligent Peripheral Interface (IPI) Preface...Preface 1 1. Introduction... 1 1 1.1 Purpose and Scope... 1 1 1.2 Relationship to Other Telcordia AIN GRs and ITU-T
More informationSR-69 CAFD Issue 4 Volume I: General AMA Data December 2000
Volume I: General AMA Data Contents Contents 1. Introduction.................................... 1 1 1.1 Purpose................................... 1 1 1.2 Description.................................
More informationTechnical Brief. Network Port & Routing Requirements Active Circle 4.5 May Page 1 sur 15
Technical Brief Network Port & Routing Requirements Active Circle 4.5 May 2017 Page 1 sur 15 INDEX 1. INTRODUCTION... 3 1.1. SCOPE OF THE DOCUMENT... 3 1.2. AUDIENCE... 3 1.3. ORGANIZATION OF THE INFORMATION...
More informationTable of Contents. Telcordia GR Documentation Information. 1 Introduction. 2 Introduction to Section 2
Telcordia GR-1100 - Documentation Information 1 Introduction 1.1 General......................................... 1 1 1.1.1 Purpose and Scope............................... 1 1 1.1.2 Document Design................................
More informationImplementing X Security Solutions for Wired and Wireless Networks
Implementing 802.1 X Security Solutions for Wired and Wireless Networks Jim Geier WILEY Wiley Publishing, Inc. Contents Introduction xxi Part I Concepts 1 Chapter 1 Network Architecture Concepts 3 Computer
More informationCisco Router Configuration Handbook
Cisco Router Configuration Handbook Second Edition Dave Hucaby, CCIE No. 4594 Steve McQuerry, CCIE No. 6108 Andrew Whitaker Cisco Press 800 East 96th Street Indianapolis, IN 46240 IX Contents Introduction
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationChapter 3 Protocols and the TCP/IP Suite
Chapter 3 Protocols and the TCP/IP Suite 3.1 The Need for a Protocol Architecture need for a standard communication tasks by layers architecture peer protocol: a set of rules or conventions to exchange
More informationComputer Networks. Andrew S. Tanenbaum
Computer Networks Third Edition Andrew S. Tanenbaum 1 ; l Vrije Universiteit Amsterdam, The Netherlands For book and bookstore information Prentice Hall PTR Upper Saddle River, New Jersey 07458 CONTENTS
More informationPT310M: Contents. Preface... xiii. Lesson 1. Pro Tools HD Hardware Configuration... 1
PT310M: Contents Preface... xiii Using the DVD... xiii Prerequisites for This Course... xiii System Requirements... xiv Becoming Avid Certified... xiv Pro Tools Certification... xiv User Certification...
More information21.1 FTP. Connections
21.1 FTP File Transfer Protocol (FTP) is the standard mechanism provided by TCP/IP for copying a file from one host to another. Although transferring files from one system to another seems simple and straightforward,
More informationData Communication and Network. Introducing Networks
Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect
More informationSONET Bidirectional Line-Switched Ring Equipment Generic Criteria
Contents SONET Bidirectional Line-Switched Ring Equipment Generic Criteria Contents Contents 1. Introduction... 1 1 1.1 Update History...1 2 1.2 Scope...1 4 1.3 Criteria...1 5 1.4 Requirement Labeling
More informationInterconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1
Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationOneVision DEFINITY G3 Fault Management Installation and Integration for AT&T OneVision
585-229-109 Issue 1 October, 1995 Table of Contents OneVision DEFINITY G3 Fault Management Installation and Integration for AT&T OneVision Graphics AT&T 1988 Blank Page Contents About This Book vii Intended
More informationOracle RMAN for Absolute Beginners
Oracle RMAN for Absolute Beginners Darl Kuhn Apress Contents About the Author Acknowledgments Introduction xvii xix xxi Chapter 1: Getting Started... 1 Connecting to Your Database 1 Establishing OS Variables
More informationCOPYRIGHTED MATERIAL. Con t e n t s. Chapter 1 Introduction to Networking 1. Chapter 2 Overview of Networking Components 21.
Con t e n t s Introduction xix Chapter 1 Introduction to Networking 1 Comparing Logical and Physical Networks.... 1 Networking Home Computers........................................... 2 Networking Small
More informationDWDM Network Transport Systems with Digital Tributaries for Use in Metropolitan Area Applications: Common Generic Criteria
Issue 6 January 2003 DWDM Network Transport Systems: Common Generic Criteria Contents DWDM Network Transport Systems with Digital Tributaries for Use in Metropolitan Area Applications: Common Generic Criteria
More informationCOPYRIGHTED MATERIAL. Table of Contents. Assessment Test
10089.book Page xi Monday, July 23, 2007 3:17 PM Introduction Assessment Test xxiii xxxiii Chapter 1 Internetworking 1 Internetworking Basics 4 Internetworking Models 11 The Layered Approach 12 Advantages
More informationCyclades ACS 5000 Advanced Console Server Appliances Release Notes Version September 24 th 2010
Cyclades ACS 5000 Advanced Console Server Appliances Release Notes Version 3.3.0-5 September 24 th 2010 This document outlines: 1. Update Instructions 2. Appliance Firmware Version and Language Support
More informationSystem Administration of PTC Windchill 11.0
System Administration of PTC Windchill 11.0 Overview Course Code Course Length TRN-4830-T 16 Hours In this course, you will gain an understanding of how to perform routine Windchill system administration
More informationNetwoking Essentials
Mark Sportack Walter J. Glenn Sams' Teach Yourself MCSE Netwoking Essentials SAMS PUBLISHING IN 14 DAYS Sams Publishing is an independant entity from Microsoft Corporation, and not affiliated with Microsoft
More informationSummary of Contents LIST OF FIGURES LIST OF TABLES
Summary of Contents LIST OF FIGURES LIST OF TABLES PREFACE xvii xix xxi PART 1 BACKGROUND Chapter 1. Introduction 3 Chapter 2. Standards-Makers 21 Chapter 3. Principles of the S2ESC Collection 45 Chapter
More informationBroadband Access Aggregation and DSL Configuration Guide, Cisco IOS XE Release 3S
Broadband Access Aggregation and DSL Configuration Guide, Cisco IOS XE Release 3S Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408
More informationData Communications. From Basics to Broadband. Third Edition. William J. Beyda
Data Communications From Basics to Broadband Third Edition William J. Beyda University of California Extension, Berkeley Siemens Information and Communication Networks, Inc. Prentice Hall Upper Saddle
More informationITEC 3800 Data Communication and Network. Introducing Networks
ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You
More informationChapter 09 Network Protocols
Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems
More informationIntroduction. Assessment Test
Introduction Assessment Test xix xxxi Chapter 1 Understanding Basic Networking 1 First Things First: What s a Network? 2 The Local Area Network (LAN) 3 Common Network Components 5 Workstations 5 Wide Area
More informationCorrective Action User Walkthrough: New Portal Login
Corrective Action User Walkthrough: New Portal Login The updated URL for the PST Portal is: https://apps.occeweb.com/pstportal There are five scenarios to consider if you are experiencing difficulty logging
More information"Charting the Course... MOC A Developing Microsoft SQL Server 2012 Databases. Course Summary
Course Summary Description This 5-day instructor-led course introduces SQL Server 2012 and describes logical table design, indexing and query plans. It also focuses on the creation of database objects
More informationExam Topics Cross Reference
Appendix R Exam Topics Cross Reference This appendix lists the exam topics associated with the ICND1 100-105 exam and the CCNA 200-125 exam. Cisco lists the exam topics on its website. Even though changes
More informationCisco 6 Routers. Andrew Hamilton John Mistichelli with Bryant G. Tow. San Francisco Paris Düsseldorf Soest London SYBEX
Cisco 6 Routers. Andrew Hamilton John Mistichelli with Bryant G. Tow O SYBEX San Francisco Paris Düsseldorf Soest London Introduction xviii Part 1 Up and Running 1 Chapter 1 A Brief Review of the OSI Model
More informationChapter 12 Network Protocols
Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)
More informationLocal Number Portability (LNP) Capability Specification: Service Provider Portability
Issue 3 November 1997 LNP Capability Specification: Service Provider Portability Local Number Portability (LNP) Capability Specification: Service Provider Portability Preface...Preface 1 1. Introduction...
More informationOneVision DEFINITY G3 Fault Management Installation and Integration for AT&T OneVision
585-229-109 Issue 1 October, 1995 Table of Contents OneVision DEFINITY G3 Fault Management Installation and Integration for AT&T OneVision Graphics AT&T 1988 Contents About This Book vii Intended Audiences
More informationNeed For Protocol Architecture
Chapter 2 CS420/520 Axel Krings Page 1 Need For Protocol Architecture E.g. File transfer Source must activate communications path or inform network of destination Source must check destination is prepared
More informationSymbols INDEX. <cr> baud rates? command xiv. transmit line speed, configuring. buffers. XRemote size TR-224 busy-message command
INDEX Symbols B xv baud rates? command xiv transmit line speed, configuring TR-208 buffers A XRemote size TR-224 busy-message command TR-17 absolute-timeout command TR-2 access-class (LAT) command
More informationContents. Introduction to Networking. Preface...i. Introduction... xix
Contents Introduction to Networking Introduction to Networking Preface...i Key Topics...i Course Objectives...ii Pedagogical Features...ii Learning Objectives, Unit Summaries, Discussion Questions, and
More informationTCP/IP THE TCP/IP ARCHITECTURE
TCP/IP-1 The Internet Protocol (IP) enables communications across a vast and heterogeneous collection of networks that are based on different technologies. Any host computer that is connected to the Internet
More informationContents CHAPTER 1 CHAPTER 2. Recommended Reading. Chapter-heads. Electronic Funds Transfer) Contents PAGE
Contents Foreword Recommended Reading Syllabus Chapter-heads iii v vii ix MODULE I : Technology in bank CHAPTER 1 Banking Environment and Technology u Introduction 3 u Evolution of Banking Technology over
More informationInstalling and Administering a Satellite Environment
IBM DB2 Universal Database Installing and Administering a Satellite Environment Version 8 GC09-4823-00 IBM DB2 Universal Database Installing and Administering a Satellite Environment Version 8 GC09-4823-00
More informationSYLLABUS. Departmental Syllabus
SYLLABUS DATE OF LAST REVIEW: 02/2013 CIP CODE: 11.0801 SEMESTER: COURSE TITLE: Networking I COURSE NUMBER: CIST- 0117 CREDIT HOURS: 3 INSTRUCTOR: OFFICE LOCATION: OFFICE HOURS: TELEPHONE: EMAIL: PREREQUISITE(S):
More informationRyan Stephens. Ron Plew Arie D. Jones. Sams Teach Yourself FIFTH EDITION. 800 East 96th Street, Indianapolis, Indiana, 46240
Ryan Stephens Ron Plew Arie D. Jones Sams Teach Yourself FIFTH EDITION 800 East 96th Street, Indianapolis, Indiana, 46240 Table of Contents Part I: An SQL Concepts Overview HOUR 1: Welcome to the World
More informationInformation and Network Technology Revised Date 07/26/2012 Implementation Date 08/01/2012
Information and Network Technology Ben Eckart Revised Date 07/26/2012 Implementation Date 08/01/2012 COURSE OUTLINE CRT 286 LAN/WAN Implementation and Support 3 Credit Hours Course Description The focus
More informationInterconnecting Networks with TCP/IP
Chapter 8 Interconnecting s with TCP/IP 1999, Cisco Systems, Inc. 8-1 Introduction to TCP/IP Internet TCP/IP Early protocol suite Universal 1999, Cisco Systems, Inc. www.cisco.com ICND 8-2 TCP/IP Protocol
More informationecatcher 4 - New Features
ewon Application User Guide AUG 052 / Rev 1.0 ecatcher 4 - New Features P Contents This document gives an overview of the new features of ecatcher 4 and explains briefly how to use them. Table of Contents
More informationCommunicating over the Network
Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need
More informationTable of Contents. 1 Introduction. 2 User Perspective. 3 Feature Requirements
Table of Contents Table of Contents 1 Introduction 1.1 Structure and Use of This Document........................ 1 1 1.2 Definition....................................... 1 1 1.3 Background......................................
More informationTable of Contents. 1 Introduction
Issue 17, December 2012 BAF Generic Requirements 1 Introduction 1.1 General......................................... 1 1 1.1.1 Purpose and Scope............................... 1 3 1.1.2 Document Design................................
More informationDefining Networks with the OSI Model. Module 2
Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the
More informationIntroduction to Networking
Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI
More informationConnectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)
Lecture (07) OSI layer 4 protocols TCP/UDP protocols By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU Fall2014, Computer Networks II Introduction Most data-link protocols notice errors then discard frames
More informationTCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12
TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group
More informationFacilities Manager Local Device Tracking
Facilities Manager Local Device Tracking The Information Collection Engine (ICE) can track print volumes on all types of devices, whether they are networked or not. Devices that do not support SNMP or
More informationand Networks Data Communications Second Edition Tata McGraw Hill Education Private Limited Managing Director SoftExcel Services Limited, Mumbai
Data Communications and Networks Second Edition ACHYUT S GODBOLE Managing Director SoftExcel Services Limited, Mumbai ATUL KAHATE Senior Consultant Oracle Financial Services Software Limited, Pune Tata
More informationECE4110 Internetwork Programming. Introduction and Overview
ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?
More informationCCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer
CCNA Exploration Network Fundamentals Chapter 04 OSI Transport Layer Updated: 05/05/2008 1 4.1 Roles of the Transport Layer 2 4.1 Roles of the Transport Layer The OSI Transport layer accept data from the
More informationCONTENTS. Computer-System Structures
CONTENTS PART ONE OVERVIEW Chapter 1 Introduction 1.1 What Is an Operating System? 3 1.2 Simple Batch Systems 6 1.3 Multiprogrammed Batched Systems 8 1.4 Time-Sharing Systems 9 1.5 Personal-Computer Systems
More informationHands-On TCP/IP Networking
Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which
More informationLecture (11) OSI layer 4 protocols TCP/UDP protocols
Lecture (11) OSI layer 4 protocols TCP/UDP protocols Dr. Ahmed M. ElShafee ١ Agenda Introduction Typical Features of OSI Layer 4 Connectionless and Connection Oriented Protocols OSI Layer 4 Common feature:
More informationMANCHESTER REGIONAL HIGH SCHOOL. Cisco Networking Academy 1
MANCHESTER REGIONAL HIGH SCHOOL Cisco Networking Academy 1 REVISED SEPTEMBER 2017 Manchester Regional High School Board of Education Mrs. Ellen Fischer, President, Haledon Mr. Douglas Boydston, Vice-President,
More informationIP Networking. Cisco Press. Wendell Odom, CCIE No Indianapolis, IN East 96th Street
IP Networking Wendell Odom, CCIE No. 1624 Cisco Press 800 East 96th Street Indianapolis, IN 46240 iv IP Networking Contents at a Glance Introduction xxx Unit 1: The TCP/IP Model, LANs, WANs, and IP Networks
More informationCopyleft 2005, Binnur Kurt. Objectives
1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe
More informationSAP ABAP. Hands-On Test Projects with Business Scenarios. Sushil Markandeya. Kaushik Roy
SAP ABAP HandsOn Test Projects with Business Scenarios Sushil Markandeya Kaushik Roy Contents About the Authors About the Technical Reviewer Acknowledgments Introduction xxv xxvii xxix xxxi Chapter 1:
More information8. Networks. Why networked embedded systems General network architecture. Networks. Internet-enabled embedded systems Sensor networks
8. Networks Why networked embedded systems General network architecture ISO seven network layers Networks I 2 C, CAN, Ethernet Internet-enabled embedded systems Sensor networks Computers as Components
More informationCajun P220FE Switch Software Release Notes
CHAPTER 1 Cajun P220FE Switch Software Release Notes Software Version 1.2 (November 12, 1998) Document # 610-0064-041 P220FE Overview The Cajun P220FE switch is a stand-alone switch that consists of the
More informationConfiguring the Management Interface and Security
CHAPTER 5 Configuring the Management Interface and Security Revised: February 15, 2011, Introduction This module describes how to configure the physical management interfaces (ports) as well as the various
More information1: Review Of Semester Provide an overview of encapsulation.
1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,
More informationCONTENTS. Cisco Internet Streamer CDS 3.0 Software Configuration Guide iii OL CHAPTER 1 Product Overview 1-1
CONTENTS Preface xvii Document Revision History xvii Audience xvii Objective xviii Document Organization xviii Document Conventions xix Related Publications xx Obtaining Documentation and Submitting a
More informationChapter 3 Managing System Settings
Chapter 3 Managing System Settings Using the System Settings Utility The navigation pane at the top of the web browser interface contains a System tab that enables you to manage your FS700TSSmart Switch
More informationKey Points for the Review
Key Points for the Review Network Basics What is internet and Internet? Does WWW equal to Internet? How do machines communicate with one another on the Internet? What are the major components of Internet?
More informationDISTRIBUTED SYSTEMS. Second Edition. Andrew S. Tanenbaum Maarten Van Steen. Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON.
DISTRIBUTED SYSTEMS 121r itac itple TAYAdiets Second Edition Andrew S. Tanenbaum Maarten Van Steen Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON Prentice Hall Upper Saddle River, NJ 07458 CONTENTS
More informationCompTIA Network+ Course
CompTIA Network+ Course Duration: 5 Days Course Delivery: Classroom Language: English Target Audience Comprehensive approach to both preparing a student for CompTIA's Network+ exam and developing proficiency
More information13. Internet Applications 최양희서울대학교컴퓨터공학부
13. Internet Applications 최양희서울대학교컴퓨터공학부 Internet Applications Telnet File Transfer (FTP) E-mail (SMTP) Web (HTTP) Internet Telephony (SIP/SDP) Presence Multimedia (Audio/Video Broadcasting, AoD/VoD) Network
More information"Charting the Course... MOC B Active Directory Services with Windows Server Course Summary
Description Course Summary Get Hands on instruction and practice administering Active Directory technologies in Windows Server 2012 and Windows Server 2012 R2 in this 5-day Microsoft Official Course. You
More informationReport: A Comparison of Synchrophasor Protocols
J. Ritchie Carroll Grid Protection Alliance Report: A Comparison of Synchrophasor Protocols NASPI Fall Meeting Philadelphia, PA October 24, 2018 Abstract Paper compares three protocols used for continuous
More informationJune This paper assumes knowledge of the following protocols described in the ARPA Internet Protocol Handbook.
IEN 149 RFC 765 J. Postel ISI June 1980 FILE TRANSFER PROTOCOL INTRODUCTION The objectives of FTP are 1) to promote sharing of files (computer programs and/or data), 2) to encourage indirect or implicit
More informationCITY UNIVERSITY OF NEW YORK. Creating a New Project in IRBNet. i. After logging in, click Create New Project on left side of the page.
CITY UNIVERSITY OF NEW YORK Creating a New Project in IRBNet i. After logging in, click Create New Project on left side of the page. ii. Enter the title of the project, the principle investigator s (PI)
More informationInfinite Device Management
Infinite Device Management Tracking Locally Connected Devices - IDM/Print Audit 6 Version: Date: 22 05-Dec-2018 10:37 Please Note: This document is intended for use with Local Device Tracking using Print
More informationQ3. Where can I register DuitNow ID? Login to Bank Islam Internet Banking. Go to Settings > DuitNow ID and click on Add button. Refer to image below.
Q1. What is DuitNow? DuitNow is a new real-time online fund transfer service that allows consumers and business owners to transfer money using an ID called DuitNow ID instead of having to exchange bank
More informationGuide to TCP/IP, Third. Chapter 6: Basic TCP/IP Services
Guide to TCP/IP, Third Edition Chapter 6: Basic TCP/IP Services Objectives Understand how TCP/IP Application layer protocols and services work Explain the capabilities, message types, and request/reply
More informationMicrosoft. Microsoft Visual C# Step by Step. John Sharp
Microsoft Microsoft Visual C#- 2010 Step by Step John Sharp Table of Contents Acknowledgments Introduction xvii xix Part I Introducing Microsoft Visual C# and Microsoft Visual Studio 2010 1 Welcome to
More information"Charting the Course... MOC C: Querying Data with Transact-SQL. Course Summary
Course Summary Description This course is designed to introduce students to Transact-SQL. It is designed in such a way that the first three days can be taught as a course to students requiring the knowledge
More informationVPN Console: Monitoring Menu
CHAPTER 8 This chapter provides an explanation of collection tasks and reports categorized under the Monitoring menu option, as follows: Collect Router Configuration Files, page 8-2 Collect VPN Accounting
More informationConcept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.
113 Chapter 9 TCP/IP Transport and Application Layer Services that are located in the transport layer enable users to segment several upper-layer applications onto the same transport layer data stream.
More informationGE Fanuc Automation. MMS-Ether net Communications for the Series PLC. User s Manual. Programmable Control Products
GE Fanuc Automation Programmable Control Products MMS-Ether net Communications for the Series 90-70 PLC User s Manual GFK-0868 May 1994 Warnings, Cautions, and Notes as Used in this Publication GFL 002
More informationIntroduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks...
Table of Contents Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet... 1 1.1 Computer Networks... 1 1.1.1 Advantages of Computer Networks... 2 1.1.2 Disadvantages of Computer
More information"Charting the Course... Interconnecting Cisco Networking Devices Accelerated 3.0 (CCNAX) Course Summary
Description Course Summary The Cisco CCNA curriculum includes a third course, Interconnecting Cisco Networking Devices: Accelerated (CCNAX), consisting of Interconnecting Cisco Networking Devices, Part
More informationData & Computer Communication
Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects
More informationComputer Networking: A Top Down Approach Featuring the. Computer Networks with Internet Technology, William
Dr. John Keeney 3BA33 TCP/IP protocol architecture with IP OSI Model Layers TCP/IP Protocol Architecture Layers TCP/IP Protocol Suite Application Layer Application Layer Telnet FTP HTTP DNS RIPng SNMP
More informationFoundations of Python
Foundations of Python Network Programming The comprehensive guide to building network applications with Python Second Edition Brandon Rhodes John Goerzen Apress Contents Contents at a Glance About the
More informationFORMULATION AND BENEFIT ANALYSIS OF OPTIMIZATION MODELS FOR NETWORK RECOVERY DESIGN
FORMULATION AND BENEFIT ANALYSIS OF OPTIMIZATION MODELS FOR NETWORK RECOVERY DESIGN Approved by: Dr. Richard Barr Dr. Eli Olinick Dr. Marion Sobol Dr. Jerrell Stracener Dr. Stephen A. Szygenda FORMULATION
More informationOracle Data Integrator: Administration and Development Volume I Student Guide
Oracle Data Integrator: Administration and Development Volume I Student Guide D48459GC30 Edition 3.0 December 2007 D53463 Authors Laura Hofman Miquel FX Nicolas Technical Contributor and Reviewer Sharath
More informationLecture 5: Foundation of Network Management
Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information
More information"Charting the Course... MOC B Updating Your SQL Server Skills to Microsoft SQL Server 2014 Course Summary
Course Summary Description This five-day instructor-led course teaches students how to use the enhancements and new features that have been added to SQL Server and the Microsoft data platform since the
More information