Компьютерные сети
Компьютерная литература
  • формат pdf
  • размер 14.12 МБ
  • добавлен 13 февраля 2011 г.
Vilemaitis M. HP Network Node Manager 9: Getting Started + Samples
Marius Vilemaitis. HP Network Node Manager 9: Getting Started. Packt Publishing, 2011. - 574 p.

Book Description:
Every organization is on the lookout for ways to improve network availability and performance, and reduce their operating expenses. It’s not funny to have to drive to a client’s premises in the middle of the night without any clue as to what’s going on – whether it’s for an hour or for a whole day. It’s even worse when the client has no or very little knowledge about what just happened because they have no tool to track the problem. Step beyond the default installations and make this tool work for you in the way you want.

This book guides you through the whole network monitoring implementation process. It covers all NNMi features and gives you hints to adapt this management software to your specific needs. It also describes how to use built-in features and adapt them in the most efficient way. It stitches the gap between technical personnel and management, covering subjects in both technical and business languages.

The book guides you from system sizing, edition, and feature selection to system customization as per your staff needs. If you are about to expand your system and bring exteal tools for integration with NNMi, this book is a good source to start from. It has descriptions and examples on why and how NNMi can be integrated. It explains what system designers do while sizing an NNMi system and how your system should be installed. You will also find a description on how you should design and implement your network discovery. You will lea how to create maps for your operators, so any network device that causes issues can be tracked fast, and each device position will tell each device’s purpose.

Incident customization will help you configure which incidents are important for you, instead of receiving the vendor default settings with no clue as to what they mean in your situation. You will lea how to navigate between incidents and maps to reduce troubleshooting time and use your custom created tools within NNMi and become a proactive operator. The least visible but most important task in critical situations is how well you have prepared your system for disasters. This book describes backup, application failover, and clustering techniques with real-world examples. After reading this book, you will be ready to design monitoring and management tools to work along with NNMi in the way you want.

Don’t work for NNMi – make it work for you.
What you will lea from this book :
- Implement the NNMi tool in your infrastructure.
- Customize NNMi to give operators a clear view about what’s going on in a network, keep troubleshooting tools handy, and ensure a smooth workflow between other management tools in your network operations center.
- Tune alarms so that you are notified of important network outages or other changes.
- Take control over managing access to NNMi.
- Configure NNMi to be operational during almost any disaster.
- Monitor your network using NNMi as an operator.
- Personalize menus to your operational center needs.
- Expand NNMi built-in features with your own or additional plugins.
- Integrate NNMi with other management tools in your company.
- Upgrade your old version of NNM to NNMi 9.
- Insert your NNMi’s puzzle piece into the Network Operations Center or Consolidated Data Management Center and foresee the next steps for your operations center development/expansion.
Approach:

This book is a step-by-step guide describing how to implement, maintain, and expand the NNMi management tool. It is a practical guide, based on experience managing networks in a wide scale of network operation centers. It shares best practices and explains a lot of non-technical issues that arise during implementations and operations. Each topic has practical examples where the reader can practice while reading the book.

Who this book is written for:

The book is written for the following audience:

- Monitoring solution designers, who plan how to implement NNMi.
- Network engineers, who plan to start managing their network.
- System administrators, who start administering NNMi.
- Network monitoring operators, who want to lea how to use NNMi.
If you belong to any one of the above professions, then this book is for you. It’s also for professionals who describe themselves as beginners, or intermediate-level professionals. The book is also suitable for old-version NNM users who wish to switch to NNMi.
Похожие разделы
Смотрите также

Chen L., Modiano E. Efficient Routing and Wavelength Assignment for Reconfigurable WDM Ring Networks With Wavelength Converters

  • формат pdf
  • размер 477.61 КБ
  • добавлен 15 апреля 2011 г.
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005. We consider the problem of wavelength assignment in reconfigurable WDM networks with wavelength converters. We then provide a second algorithm that uses more wavelengths yet requires significantly fewer converters. We also develop a method that allows the wavelength converters to be arbitrarily located at any node in the ring. This gives significant flexibility in the design of t...

Droms R. The DHCP handbook

  • формат pdf
  • размер 7.65 МБ
  • добавлен 03 декабря 2009 г.
The Dynamic Host Configuration Protocol (DHCP) provides a way to automate and manage the network configurations of devices that use the TCP/IP protocol suite. Without DHCP, network administrators must manually enter in IP addresses for each computer and network device and then manually change that address each time the device is moved to a different part of the network. The DHCP Handbook, Second Edition is a complete reference for understanding D...

Hagen S. IPv6 essentials

  • формат chm
  • размер 4.42 МБ
  • добавлен 03 декабря 2009 г.
IPv6 Essentials, Second Edition provides a succinct, in-depth tour of all the new features and functions in IPv 6. It guides you through everything you need to know to get started, including how to configure IPv6 on hosts and routers and which applications currently support IPv 6. The new IPv6 protocols offers extended address space, scalability, improved support for security, real-time traffic support, and auto-configuration so that even a novic...

Held G. Network Design Principles and Applications

  • формат pdf
  • размер 23 МБ
  • добавлен 13 февраля 2011 г.
Never has the need for reliable internetworking been greater, yet with networks now comprising differing operating systems, hardware, and software, achieving a reliable network has never been more complex. Network planners and managers face a multitude of difficult decisions-decisions made even more difficult by the need for knowledge from a variety of disciplines. To meet that need, renowned author Gilbert Held assembled a panel of expert practi...

Holt A., Huang Chi-Yu. 802.11 Wireless Networks: Security and Analysis

  • формат pdf
  • размер 5.34 МБ
  • добавлен 02 сентября 2011 г.
Sрringer, 2010. - 212 p. This book shows how to build and analyse wireless networks, exploring how an enterprise wireless network with the highest levels of security can be built. The book also explains how to configure wireless network equipment in order implement various network architectures and levels of security. The contents describe how to set up every component of the network, from the client supplicant and the access-points, through to...

Hunt C. TCP-IP network administration

  • формат chm
  • размер 1.72 МБ
  • добавлен 03 декабря 2009 г.
This complete hands-on guide to setting up and running a TCP/IP network starts with the fundamentals: what protocols do and how they work, how addresses and routing are used, and how to set up your network connection. The book also covers advanced routing protocols and provides tutorials on configuring important network services. The expanded third edition includes sections on Samba, Apache web server, network security, and much more.rn

Li L.(E)., Halpern J., Bahl P., Wang Y., Wattenhofer R. A Cone-Based Distributed Topology-Control Algorithm for Wireless Multi-Hop Networks

  • формат pdf
  • размер 751.02 КБ
  • добавлен 15 апреля 2011 г.
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005. The topology of a wireless multi-hop network can be controlled by varying the transmission power at each node. In this paper, we give a detailed analysis of a cone-based distributed topology-control (CBTC) algorithm. This algorithm does not assume that nodes have GPS information available; rather it depends only on directional information. We propose a set of optimizations that f...

Long L. Home Networking Demystified

  • формат pdf
  • размер 8.35 МБ
  • добавлен 04 апреля 2011 г.
McGraw-Hill/Osborne, 2005. - 309 Pages. The migration of PCs into the home was inevitable. And so it is with the home network. Home networking evolves in four phases. In Phase I you purchase the first PC for the home and, in Phase II, you add a second PC, and, possibly, a third. Phase III begins the moment you recognize you can make life a little easier and save a lot of time and money by sharing computing resources. During Phase III you build a...

Rusen C.A. Network Your Computers & Devices Step by Step

  • формат pdf
  • размер 47.91 МБ
  • добавлен 21 января 2011 г.
Ciprian Adrian Rusen. Network Your Computers & Devices Step by Step. Microsoft Press, 2010. - 554 p. (pdf + epub) Teach yourself how to use the networking features in Windows 7 to connect your home computers, even if they use different operating systems. With Step by Step, you set the pace -- building and practicing the skills you need, just when you need them! - Network your Windows 7-based PCs and set up security. - Add a Mac or Linux-based...

Walter Goralski, The Illustrated Network- How TCP_IP Works in a Modern Network

  • формат pdf
  • размер 9.5 МБ
  • добавлен 28 октября 2009 г.
Название:The Illustrated Network: How TCP/IP Works in a Modern Network, Walter Goralski Издательство:Morgann Kaufman Год: 2009 ISBN-0123745411 A brilliant and unfettered look at modern networking, this book is the true descendant of Richard Stevens' seminal work, TCP/IP Illustrated. "This book provides a diverse and solid foundation that will be immensely beneficial to new network engineers, those looking for a refresher or developers" -- Ala...