Friday, February 6, 2009

Mathematical Techniques in Multisensor Data Fusion or Network Management

Mathematical Techniques in Multisensor Data Fusion

Author: David L Hall

"Since the publication of the first edition of Mathematical Techniques in Multisensor Data Fusion, advances in algorithms, logic, and software tools have transformed the field of data fusion. This updated edition covers these areas as well as smart agents, human computer interaction, cognitive aides to analysis, and data system fusion control." Besides assisting practitioners in selecting the appropriate algorithm for implementing a data, fusion system, this book offers guidance in determining the trade-offs among competing data fusion algorithms, selecting commercial off-the-shelf (COTS) tools, and understanding when data fusion improves systems processing. Completely new chapters in this second edition explain data fusion system control and the latest applications of data fusion in data warehousing, medical equipment, and defense systems.

Booknews

Research into how to combine data from multiple (and sometimes different) sensors to find out what is going on, has been split between military (battlefield surveillance, etc.) and non-military (robotics, etc.) concerns. The two groups don't speak to each other, and have developed different approaches, techniques, and terminology. Here is a distillation of the mathematics they both use for data- fusion reduced to the bare bones to be comprehensible to researchers and application engineers in many fields. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Read also Middle Path Cookbook or Margaret Fultons Kitchen

Network Management: Accounting and Performance Strategies

Author: Benoit Clais

Network Management: Accounting and Performance Strategies

 

The definitive guide to collecting usage information from Cisco networks

 

Benoit Claise, CCIE® No. 2868

Ralf Wolter

 

Understanding network performance and effectiveness is now crucial to business success. To ensure user satisfaction, both service providers and enterprise IT teams must provide service-level agreements (SLA) to the users of their networks–and then consistently deliver on those commitments. Now, two of the Cisco® leading network performance and accounting experts bring together all the knowledge network professionals need to do so.

 

Network Management: Accounting and Performance Strategies imparts a deep understanding of Cisco IOS® embedded management for monitoring and optimizing performance, together with proven best strategies for both accounting and performance management.

 

Benoit Claise and Ralf Wolter begin by introducing the role of accounting and performance management in today’s large-scale data and voice networks. They present widely accepted performance standards and definitions, along with today’s best practice methodologies for data collection.

 

Next, they turn to Ciscodevices and the Cisco IOS Software, illuminating embedded management and device instrumentation features that enable you to thoroughly characterize performance, plan network enhancements, and anticipate potential problems and prevent them. Network standards, technologies, and Cisco solutions covered in depth include Simple Network Management Protocol (SNMP) and Management Information Bases (MIB), Remote Monitoring (RMON), IP accounting, NetFlow, BGP policy accounting, AAA Accounting, Network Based Application Recognition (NBAR), and IP SLA (formerly known as SAA). For each, the authors present practical examples and hands-on techniques.

 

The book concludes with chapter-length scenarios that walk you through accounting and performance management for five different applications: data network monitoring, capacity planning, billing, security, and voice network performance.

 

Network Management: Accounting and Performance Strategies will be indispensable to every professional concerned with network performance, effectiveness, or profitability, especially NMS/OSS architects, network and service designers, network administrators, and anyone responsible for network accounting or billing.

 

Benoit Claise, CCIE® No. 2868, is a Cisco Distinguished Engineer working as an architect for embedded management and device instrumentation. His area of expertise includes accounting, performance, and fault management. Claise is a contributor to the NetFlow standardization at the IETF in the IPFIX and PSAMP Working Groups. He joined Cisco in 1996 as a customer support engineer in the Technical Assistance Center network management team and became an escalation engineer before joining the engineering team.

 

Ralf Wolter is a senior manager, consulting engineering at Cisco. He leads the Cisco Core and NMS/OSS consulting team for Europe, works closely with corporate engineering, and supports large-scale customer projects. He specializes in device instrumentation related to accounting and performance management.

 

  • Compare accounting methods and choose the best approach for you
  • Apply network performance best practices to your network
  • Leverage built-in Cisco IOS network management system components to quantify performance
  • Uncover trends in performance statistics to help avoid service degradation before it occurs
  • Identify under use of network paths, so you can improve overall network efficiency
  • Walk through hands-on case studies that address monitoring, capacity planning, billing, security, and voice networks
  • Understand Cisco network performance, deliver on your SLAs, and improve accounting and billing

 

This book is part of the Networking Technology Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.



Table of Contents:
Introduction     xxvi
Data Collection and Methodology Standards     3
Understanding the Need for Accounting and Performance Management     5
Definitions and the Relationship Between Accounting and Performance Management     11
Defining Accounting Management     11
Defining Performance Management     13
The Relationship Between Accounting and Performance     17
A Complementary Solution     20
The Purposes of Accounting     22
Network Monitoring     22
User Monitoring and Profiling     24
Application Monitoring and Profiling     26
Capacity Planning     31
Link Capacity Planning     31
Network-Wide Capacity Planning     32
Traffic Profiling and Engineering     34
Peering and Transit Agreements     37
Billing     43
Volume-Based Billing     49
Destination-Sensitive Billing     50
Destination and Source-Sensitive Billing     52
Quality-of-Service Billing     53
Application and Content-Based Billing     55
Time/Connection-Based Billing     55
Voice over IP (VoIP) and IP Telephony (IPT) Billing     55
Security Analysis     57
Purposes of Performance     61
Device Performance Monitoring     62
Network Element Performance Monitoring     63
System and Server Performance Monitoring     64
Network Performance Monitoring     65
Service Monitoring     66
Baselining     68
Fault Management     70
Applying the Information to the Business     74
Summary     80
Data Collection Methodology     85
Data Collection Details: What to Collect     86
What Are the Keys?     89
What Are the Values?     89
Value Versus Key Example: DiffServ Code Point     90
Value Versus Key Example: BGP Autonomous System Path     91
What Are the Required Versus Nice-to-Have Types of Data?     93
Data Types List     93
Example: Application Monitoring     94
Example: Traffic Matrix     98
Example: SLA Monitoring     99
Defining the User     100
Metering Methods: How to Collect Data Records     102
Active Versus Passive Monitoring     103
Passive Monitoring Concepts     104
Full Collection      104
Partial Collection     105
Filtering Versus Sampling     105
Sampling Methods     107
Filtering at the Network Element     118
Active Monitoring Concepts     120
Concepts for Generating Synthetic Traffic     120
Active Monitoring Technologies and Tools: ping, traceroute, and IP SLA     126
Best Practice: How to Position Active and Passive Monitoring     128
Outlook: Passive Monitoring for One-Way Delay Analysis     129
Metering Positions: Where to Collect Data Records     130
Network Element Versus End Device Collection     130
Edge Versus Core Collection     132
Embedded Versus External Device Collection     136
Ingress Versus Egress Collection     138
Flow Destination or Source Lookup     140
Technology-Dependent Special Constraints     141
Collection Infrastructure: How to Collect Data Records     144
Pull Versus Push Model     144
Event-Based Model     145
Export Protocols     146
SNMP     148
NetFlow     149
FTP     150
Authentication, Authorization, and Accounting (AAA) Architecture     151
Network Design for the Collection Infrastructure     151
Communication Concepts     152
Collection Server Concepts     154
Placing the Collection Server (Centralized, Distributed)     154
Real-Time Requirements     156
Mediation Device Functionality: How to Process Data Records     157
Filtering     157
Estimation from Sampling     159
Threshold Monitoring     159
Data Aggregation     160
Data Record Correlation and Enrichment     164
Flow De-Duplication     165
Data Record Formatting and Storage     165
Security Considerations: How to Ensure Data Authenticity and Integrity     167
Source Authentication     167
Ensuring Data and Device Integrity     168
Denial-of-Service (DoS) Attacks     169
Summary     170
Accounting and Performance Standards and Definitions     173
Understanding Standards and Standards Organizations     173
Architectural and Framework Standards: The TMN/FCAPS Model (ITU-T)     176
Fault Management     180
Configuration Management     181
Accounting Management     181
Performance Management     182
Security Management     183
The TMN Framework     184
Architectural and Framework Standards: the eTOM Model (TMF)     185
Informational IETF Standards     189
IETF RFC 2924, Accounting Attributes and Record Formats     189
IETF RFC 2975, Introduction to Accounting Management     189
Information Modeling     190
Data Collection Protocols: SNMP, SMI, and MIB     191
Internet Management Model and Terminology     191
MIB Modules and Object Identifiers     193
SMI Definitions     194
SNMP Versions     196
References for SMIv1 and SMIv2     199
Data Collection Protocols: NetFlow Version 9 and IPFIX Export Protocols     201
NetFlow Version 9 Export Protocol     202
The Template Mechanism     202
The Export Protocol     204
NetFlow Version 9 Export Protocol Example     206
IPFIX     208
The IPFIX Export Protocol     209
Work in Progress     211
IPFIX References     211
Data Collection Protocols: PSAMP     212
PSAMP Protocol Specifications     212
PSAMP References     213
Data Collection Protocols: AAA (Radius, Diameter, and TACACS+)     214
Radius     214
TACACS+     216
Diameter     216
Data Collection Protocols: IPDR     217
Data Collection Protocols: CMISE/CMIP and GDMO     218
Service Notions     219
Summary     222
Implementations on the Cisco Devices     225
SNMP and MIBs     227
MIBs     228
IOS Support for SNMP Versions     229
Net-snmp Utilities     229
CLI Operations and Configuration Example for SNMPv2c     230
SNMPv2c Configuration Example     230
SNMPv2c Data Retrieval     231
Displaying SNMPv2c Statistics     231
CLI Operations and Configuration Examples for SNMPv3     231
authNoPriv SNMP Example     233
authPriv SNMP Example     235
MIB Table Retrieval Example     235
MIB Functional Area Comparison Table     237
General-Purpose MIBs for Accounting and Performance     239
MIB-II (RFC 1213), IF-MIB (RFC 2863), and CISCO-IF-EXTENSION-MIB     240
CISCO-PING-MIB     241
Relevant MIB Objects (Read-Write)     241
Relevant MIB Objects (Read-Only)      242
CISCO-PROCESS-MIB     242
CISCO-ENVMON-MIB and CISCO-HEALTH-MONITOR-MIB     244
CISCO-MEMORY-POOL-MIB     244
CISCO-DATA-COLLECTION-MIB     244
Advanced Device Instrumentation     247
Technology-Specific MIBs for Accounting and Performance     247
Frame Relay     247
MPLS     249
MPLS Label Switch Router (LSR) MIB (RFC 3813)     249
MPLS Traffic Engineering MIB (RFC 3812)     250
IPv6     251
Multicast     252
Interface Group MIB (RFC 2863)     253
RMON-MIB (RFC 1757)     253
Multicast Routing MIB for IPv4 (RFC 2932)     253
VLAN     253
Community String Indexing     254
Additional Monitoring Parameters     254
Traffic Management and Control     255
CISCO-CAR MIB     255
CISCO-CLASS-BASED-QOS-MIB     256
Telephony     257
Dial Control Management MIB (RFC 2128)     259
CISCO-VOICE-DIAL-CONTROL-MIB     260
CISCO-VOICE-COMMON-DIAL-CONTROL-MIB     261
CISCO-CALL-HISTORY-MIB     261
SIP MIB     262
Creating New MIB Objects: EXPRESSION-MIB      265
EXPRESSION-MIB Examples     266
EVENT-MIB Associated with EXPRESSION-MIB     268
Obtaining MIBs     269
RMON     273
RMON 1 and RMON 2 MIBs     273
RMON Principles     277
Supported Devices and IOS Versions     277
Cisco NAM Modules     278
CLI Operations     279
SNMP Operations     280
RMON Row Concept     280
Operations to Activate the Network Layer Host Group from the RMON 2 MIB     282
Examples     282
Initial Configuration     282
Collection Monitoring     282
DSMON MIB     284
DSMON MIB Principles     286
Supported Devices and IOS Versions     286
CLI Operations     286
SNMP Operations     286
Examples     287
SMON MIB     287
Supported Devices and IOS Versions     288
CLI Operations     288
SNMP Operations     288
Examples     289
Collection Monitoring     289
APM MIB and ART MIB     289
Supported Devices and IOS Versions     291
CLI Operations      291
SNMP Operations     291
Examples     291
Collection Monitoring     291
Applicability     292
Further Reading     293
IP Accounting     297
IP Accounting (Layer 3)     298
IP Accounting (Layer 3) Principles     298
Supported Devices and IOS Versions     299
CLI Operations     299
SNMP Operations     300
Examples (CLI and SNMP)     301
Initial Configuration     302
Collection Monitoring     302
IP Accounting Access Control List (ACL)     303
IP Accounting ACL Principles     304
Supported Devices and IOS Versions     304
CLI Operations     304
SNMP Operations     305
Examples (CLI and SNMP)     305
Initial Configuration     305
Collection Monitoring     306
IP Accounting MAC Address     308
IP Accounting MAC Address Principles     308
Supported Devices and IOS Versions     309
CLI Operations     309
SNMP Operations     310
Examples (CLI and SNMP)     311
Initial Configuration     311
Collection Monitoring     311
IP Accounting Precedence     312
IP Accounting Precedence Principles     313
Supported Devices and IOS Versions     313
CLI Operations     314
SNMP Operations     314
Examples (CLI and SNMP)     315
Initial Configuration     315
Collection Monitoring     315
Applicability     317
NetFlow     319
Fundamentals of NetFlow     322
Flow Definition     322
Cache Concept     325
Aging Flows on a Router     327
Aging Flows on a Catalyst     328
Export Version and Related Information Elements     329
The Beginning     330
The Foundation     330
Catalyst-Specific     330
Router-Based Aggregation     332
Flexible and Extensible     336
IPFIX     337
Comparison of Information Elements and NetFlow Version     338
Supported Interfaces     339
Export Protocol: UDP or SCTP     340
NetFlow Device-Level Architecture: Combining the Elements     342
Cisco NetFlow Collector     344
CLI Operations      345
SNMP Operations with the NETFLOW-MIB     346
Example: NetFlow Version 5 on a Router     347
Example: NetFlow Configuration on the Catalyst     348
Example: NetFlow Version 8     350
Example: NetFlow Version 9     350
New Features Supported with NetFlow Version 9     351
SCTP Export     351
Sampled NetFlow     353
Packet-Based Sampling on the Routers     354
Flow-Based Sampled NetFlow on the Catalyst     356
NetFlow Input Filters     358
MPLS-Aware NetFlow     360
BGP Next-Hop Information Element     362
NetFlow Multicast     363
NetFlow Layer 2 and Security Monitoring Exports     365
Top Talkers     366
Flexible NetFlow     370
Fields in Flexible NetFlow     372
Packet Sections     374
Flexible NetFlow Cache Types     374
Comparison of Original NetFlow and Flexible NetFlow     375
CLI Operations     377
Flexible NetFlow Examples     379
Deployment Guidelines     385
Supported Devices and IOS Versions     387
BGP Policy Accounting     389
Input BGP Policy Accounting      390
Output BGP Policy Accounting     391
Summary of All Four BGP Policy Accounting Combinations     392
Fundamentals     393
BGP Policy Accounting Commands     394
SNMP Operations     395
Examples (CLI and SNMP)     396
Initial Configuration     396
Collection Monitoring     397
Destination-Sensitive Services     398
Destination-Sensitive Billing     398
Destination-Sensitive Billing Example     399
Destination-Sensitive Traffic Shaping (DSTS)     399
Destination-Sensitive Traffic Shaping Example     400
Applicability     400
AAA Accounting     403
Fundamentals of AAA Accounting     405
High-Level Comparison of Radius, TACACS+, and Diameter     406
Radius     407
Radius Attributes     409
Radius CLI Operations     415
Voice Extensions for Radius     416
Concept of Call Legs     416
Radius Accounting with the Vendor-Specific Attribute     419
Radius Accounting with the Overloaded Acct-Session-Id     423
Comparing the Vendor-Specific Attribute and the Acct-Session-Id     424
CLI Operations for VoIP Accounting with Radius     425
Diameter Details     428
NBAR     433
NBAR Functionality     434
Distributed NBAR     435
NBAR Classification Details     435
Classification of HTTP by URL, Host, or MIME     436
Classification of Citrix ICA Traffic by Application Name     437
NBAR Packet Description Language Module (PDLM)     437
NBAR Scope     438
Supported Devices and IOS Versions     438
NBAR Protocol Discovery (PD) MIB     439
NBAR Supported Protocols     440
NBAR Protocol Discovery Statistics     440
NBAR Top-N Statistics     441
NBAR Protocol Discovery Thresholds, Traps, and History     442
NBAR Configuration Commands     443
NBAR show Commands     443
NBAR Examples (CLI and SNMP)     445
Basic NBAR Configuration     445
Custom Application Example     446
Limiting Peer-to-Peer Traffic     447
HTTP Requests Payload Inspection     447
NBAR Applicability     449
IP SLA     451
Measured Metrics: What to Measure     453
Network Delay     454
Jitter      454
Packet Loss     455
Measurement Accuracy     455
TCP Connect     456
DHCP and DNS Response Time     456
HTTP Response Time     456
Linking Metrics to Applications     456
Operations: How to Measure     457
Operations Parameters     457
Frequency     457
Number of Packets     458
Interpacket Interval     458
Packet Size     458
Timeout     458
Lifetime     459
Start Time     459
MPLS VPN Awareness     459
IP SLA Responder     459
Operation Types     463
ICMP Operations     464
UDP Operations     468
TCP Connect Operation     470
FTP Operation     470
DHCP Operation     471
DNS Operation     471
HTTP Operation     472
Frame Relay Operation     473
ATM Operation     475
VoIP Gatekeeper Registration Delay Monitoring Operation     476
VoIP Call Setup (Post-Dial Delay) Monitoring Operation     477
RTP-Based VoIP Operation     477
DLSw+ Operation      479
IP SLA CLI Operations     480
SNMP Operations with the CISCO-RTTMON-MIB     482
Application-Specific Scenario: HTTP     483
Application-Specific Scenario: VoIP     486
Advanced Features     488
Scheduling     488
Recurring Function     489
Multiple Operation Scheduling     489
Random Scheduling     491
Distribution of Statistics     491
History Collection     494
Thresholds and Notifications     495
Enhanced Object Tracking for IP SLA     499
Implementation Considerations     501
Supported Devices and IOS Versions     501
Performance Impact     503
Accuracy     504
Security Considerations     506
IP SLA Deployment     507
IP SLA Architecture and Best Practices     508
NMS Applications     511
Summary of Data Collection Methodology     515
Applicability     515
Assigning Technologies to Solutions     523
Monitoring Scenarios     525
Network Blueprint for Monitoring     525
Device and Link Performance     526
Network Connectivity and Performance     530
Application Monitoring     534
Service Monitoring and Routing Optimization     536
Capacity Planning Scenarios     541
Link Capacity Planning     541
Network Blueprint for Capacity Planning     543
Problem Space     544
Capacity Planning Tools     546
Methods for Generating the Core Traffic Matrix     548
NetFlow BGP Next Hop ToS Aggregation     551
Flexible NetFlow     552
MPLS-Aware NetFlow     553
BGP Passive Peer on the NetFlow Collector     554
BGP Policy Accounting     555
Other Methods     556
Additional Considerations: Peer-to-Peer Traffic     557
Summary     557
Voice Scenarios     559
Network Blueprint for IP Telephony     560
Voice Performance Measurement     561
Standards and Technology     561
Mean Opinion Scores (MOS)     562
Impairment/Calculated Planning Impairment Factor (ICPIF)     563
Network Elements in the Voice Path     564
Passive Voice Performance Measurement     564
Active Voice Performance Measurement     565
Cisco CallManager (CCM)     565
Application Examples     570
Network Analysis Module     571
CiscoWorks Unified Operations Manager     572
Voice Accounting     573
Standards and Technology     573
Network Elements in the Voice Path     574
Gateway, Gatekeeper, Multimedia Conference Manager     575
Cisco CallManager (CCM)     575
Application Example     575
Is Your Network Ready for IP Telephony?     577
Security Scenarios     579
Network Blueprint for Security Management     580
Security Management Process     582
Preparation     583
Identification     584
Classification     587
NetFlow     587
Network-Based Application Recognition (NBAR)     589
Network Analysis Module (NAM)     589
Other Attack Classification Features     590
Trace Back     591
Reaction     593
Postmortem     594
Summary     596
Billing Scenarios     599
Network Blueprint for Billing     600
Billing Approaches     602
Time-Based Billing      602
pWLAN     602
Dial-In     603
Volume-Based Billing     603
Residential Broadband Access (DSL or Cable)     603
Transit and Peering Agreements     604
Destination-Sensitive Billing     606
Time- and Distance-Based Billing     606
Service-Based Billing     607
Video on Demand (VoD)     608
Enterprise Departmental Charge Back     608
Flat Rate Billing     609
Summary     609
Index     612

No comments:

Post a Comment