Mathematical Techniques in Multisensor Data Fusion
Author: David L Hall
"Since the publication of the first edition of Mathematical Techniques in Multisensor Data Fusion, advances in algorithms, logic, and software tools have transformed the field of data fusion. This updated edition covers these areas as well as smart agents, human computer interaction, cognitive aides to analysis, and data system fusion control." Besides assisting practitioners in selecting the appropriate algorithm for implementing a data, fusion system, this book offers guidance in determining the trade-offs among competing data fusion algorithms, selecting commercial off-the-shelf (COTS) tools, and understanding when data fusion improves systems processing. Completely new chapters in this second edition explain data fusion system control and the latest applications of data fusion in data warehousing, medical equipment, and defense systems.
Booknews
Research into how to combine data from multiple (and sometimes different) sensors to find out what is going on, has been split between military (battlefield surveillance, etc.) and non-military (robotics, etc.) concerns. The two groups don't speak to each other, and have developed different approaches, techniques, and terminology. Here is a distillation of the mathematics they both use for data- fusion reduced to the bare bones to be comprehensible to researchers and application engineers in many fields. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Read also Middle Path Cookbook or Margaret Fultons Kitchen
Network Management: Accounting and Performance Strategies
Author: Benoit Clais
Network Management: Accounting and Performance Strategies
The definitive guide to collecting usage information from Cisco networks
Benoit Claise, CCIE® No. 2868
Ralf Wolter
Understanding network performance and effectiveness is now crucial to business success. To ensure user satisfaction, both service providers and enterprise IT teams must provide service-level agreements (SLA) to the users of their networks–and then consistently deliver on those commitments. Now, two of the Cisco® leading network performance and accounting experts bring together all the knowledge network professionals need to do so.
Network Management: Accounting and Performance Strategies imparts a deep understanding of Cisco IOS® embedded management for monitoring and optimizing performance, together with proven best strategies for both accounting and performance management.
Benoit Claise and Ralf Wolter begin by introducing the role of accounting and performance management in today’s large-scale data and voice networks. They present widely accepted performance standards and definitions, along with today’s best practice methodologies for data collection.
Next, they turn to Ciscodevices and the Cisco IOS Software, illuminating embedded management and device instrumentation features that enable you to thoroughly characterize performance, plan network enhancements, and anticipate potential problems and prevent them. Network standards, technologies, and Cisco solutions covered in depth include Simple Network Management Protocol (SNMP) and Management Information Bases (MIB), Remote Monitoring (RMON), IP accounting, NetFlow, BGP policy accounting, AAA Accounting, Network Based Application Recognition (NBAR), and IP SLA (formerly known as SAA). For each, the authors present practical examples and hands-on techniques.
The book concludes with chapter-length scenarios that walk you through accounting and performance management for five different applications: data network monitoring, capacity planning, billing, security, and voice network performance.
Network Management: Accounting and Performance Strategies will be indispensable to every professional concerned with network performance, effectiveness, or profitability, especially NMS/OSS architects, network and service designers, network administrators, and anyone responsible for network accounting or billing.
Benoit Claise, CCIE® No. 2868, is a Cisco Distinguished Engineer working as an architect for embedded management and device instrumentation. His area of expertise includes accounting, performance, and fault management. Claise is a contributor to the NetFlow standardization at the IETF in the IPFIX and PSAMP Working Groups. He joined Cisco in 1996 as a customer support engineer in the Technical Assistance Center network management team and became an escalation engineer before joining the engineering team.
Ralf Wolter is a senior manager, consulting engineering at Cisco. He leads the Cisco Core and NMS/OSS consulting team for Europe, works closely with corporate engineering, and supports large-scale customer projects. He specializes in device instrumentation related to accounting and performance management.
- Compare accounting methods and choose the best approach for you
- Apply network performance best practices to your network
- Leverage built-in Cisco IOS network management system components to quantify performance
- Uncover trends in performance statistics to help avoid service degradation before it occurs
- Identify under use of network paths, so you can improve overall network efficiency
- Walk through hands-on case studies that address monitoring, capacity planning, billing, security, and voice networks
- Understand Cisco network performance, deliver on your SLAs, and improve accounting and billing
This book is part of the Networking Technology Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
Table of Contents:
Introduction xxviData Collection and Methodology Standards 3
Understanding the Need for Accounting and Performance Management 5
Definitions and the Relationship Between Accounting and Performance Management 11
Defining Accounting Management 11
Defining Performance Management 13
The Relationship Between Accounting and Performance 17
A Complementary Solution 20
The Purposes of Accounting 22
Network Monitoring 22
User Monitoring and Profiling 24
Application Monitoring and Profiling 26
Capacity Planning 31
Link Capacity Planning 31
Network-Wide Capacity Planning 32
Traffic Profiling and Engineering 34
Peering and Transit Agreements 37
Billing 43
Volume-Based Billing 49
Destination-Sensitive Billing 50
Destination and Source-Sensitive Billing 52
Quality-of-Service Billing 53
Application and Content-Based Billing 55
Time/Connection-Based Billing 55
Voice over IP (VoIP) and IP Telephony (IPT) Billing 55
Security Analysis 57
Purposes of Performance 61
Device Performance Monitoring 62
Network Element Performance Monitoring 63
System and Server Performance Monitoring 64
Network Performance Monitoring 65
Service Monitoring 66
Baselining 68
Fault Management 70
Applying the Information to the Business 74
Summary 80
Data Collection Methodology 85
Data Collection Details: What to Collect 86
What Are the Keys? 89
What Are the Values? 89
Value Versus Key Example: DiffServ Code Point 90
Value Versus Key Example: BGP Autonomous System Path 91
What Are the Required Versus Nice-to-Have Types of Data? 93
Data Types List 93
Example: Application Monitoring 94
Example: Traffic Matrix 98
Example: SLA Monitoring 99
Defining the User 100
Metering Methods: How to Collect Data Records 102
Active Versus Passive Monitoring 103
Passive Monitoring Concepts 104
Full Collection 104
Partial Collection 105
Filtering Versus Sampling 105
Sampling Methods 107
Filtering at the Network Element 118
Active Monitoring Concepts 120
Concepts for Generating Synthetic Traffic 120
Active Monitoring Technologies and Tools: ping, traceroute, and IP SLA 126
Best Practice: How to Position Active and Passive Monitoring 128
Outlook: Passive Monitoring for One-Way Delay Analysis 129
Metering Positions: Where to Collect Data Records 130
Network Element Versus End Device Collection 130
Edge Versus Core Collection 132
Embedded Versus External Device Collection 136
Ingress Versus Egress Collection 138
Flow Destination or Source Lookup 140
Technology-Dependent Special Constraints 141
Collection Infrastructure: How to Collect Data Records 144
Pull Versus Push Model 144
Event-Based Model 145
Export Protocols 146
SNMP 148
NetFlow 149
FTP 150
Authentication, Authorization, and Accounting (AAA) Architecture 151
Network Design for the Collection Infrastructure 151
Communication Concepts 152
Collection Server Concepts 154
Placing the Collection Server (Centralized, Distributed) 154
Real-Time Requirements 156
Mediation Device Functionality: How to Process Data Records 157
Filtering 157
Estimation from Sampling 159
Threshold Monitoring 159
Data Aggregation 160
Data Record Correlation and Enrichment 164
Flow De-Duplication 165
Data Record Formatting and Storage 165
Security Considerations: How to Ensure Data Authenticity and Integrity 167
Source Authentication 167
Ensuring Data and Device Integrity 168
Denial-of-Service (DoS) Attacks 169
Summary 170
Accounting and Performance Standards and Definitions 173
Understanding Standards and Standards Organizations 173
Architectural and Framework Standards: The TMN/FCAPS Model (ITU-T) 176
Fault Management 180
Configuration Management 181
Accounting Management 181
Performance Management 182
Security Management 183
The TMN Framework 184
Architectural and Framework Standards: the eTOM Model (TMF) 185
Informational IETF Standards 189
IETF RFC 2924, Accounting Attributes and Record Formats 189
IETF RFC 2975, Introduction to Accounting Management 189
Information Modeling 190
Data Collection Protocols: SNMP, SMI, and MIB 191
Internet Management Model and Terminology 191
MIB Modules and Object Identifiers 193
SMI Definitions 194
SNMP Versions 196
References for SMIv1 and SMIv2 199
Data Collection Protocols: NetFlow Version 9 and IPFIX Export Protocols 201
NetFlow Version 9 Export Protocol 202
The Template Mechanism 202
The Export Protocol 204
NetFlow Version 9 Export Protocol Example 206
IPFIX 208
The IPFIX Export Protocol 209
Work in Progress 211
IPFIX References 211
Data Collection Protocols: PSAMP 212
PSAMP Protocol Specifications 212
PSAMP References 213
Data Collection Protocols: AAA (Radius, Diameter, and TACACS+) 214
Radius 214
TACACS+ 216
Diameter 216
Data Collection Protocols: IPDR 217
Data Collection Protocols: CMISE/CMIP and GDMO 218
Service Notions 219
Summary 222
Implementations on the Cisco Devices 225
SNMP and MIBs 227
MIBs 228
IOS Support for SNMP Versions 229
Net-snmp Utilities 229
CLI Operations and Configuration Example for SNMPv2c 230
SNMPv2c Configuration Example 230
SNMPv2c Data Retrieval 231
Displaying SNMPv2c Statistics 231
CLI Operations and Configuration Examples for SNMPv3 231
authNoPriv SNMP Example 233
authPriv SNMP Example 235
MIB Table Retrieval Example 235
MIB Functional Area Comparison Table 237
General-Purpose MIBs for Accounting and Performance 239
MIB-II (RFC 1213), IF-MIB (RFC 2863), and CISCO-IF-EXTENSION-MIB 240
CISCO-PING-MIB 241
Relevant MIB Objects (Read-Write) 241
Relevant MIB Objects (Read-Only) 242
CISCO-PROCESS-MIB 242
CISCO-ENVMON-MIB and CISCO-HEALTH-MONITOR-MIB 244
CISCO-MEMORY-POOL-MIB 244
CISCO-DATA-COLLECTION-MIB 244
Advanced Device Instrumentation 247
Technology-Specific MIBs for Accounting and Performance 247
Frame Relay 247
MPLS 249
MPLS Label Switch Router (LSR) MIB (RFC 3813) 249
MPLS Traffic Engineering MIB (RFC 3812) 250
IPv6 251
Multicast 252
Interface Group MIB (RFC 2863) 253
RMON-MIB (RFC 1757) 253
Multicast Routing MIB for IPv4 (RFC 2932) 253
VLAN 253
Community String Indexing 254
Additional Monitoring Parameters 254
Traffic Management and Control 255
CISCO-CAR MIB 255
CISCO-CLASS-BASED-QOS-MIB 256
Telephony 257
Dial Control Management MIB (RFC 2128) 259
CISCO-VOICE-DIAL-CONTROL-MIB 260
CISCO-VOICE-COMMON-DIAL-CONTROL-MIB 261
CISCO-CALL-HISTORY-MIB 261
SIP MIB 262
Creating New MIB Objects: EXPRESSION-MIB 265
EXPRESSION-MIB Examples 266
EVENT-MIB Associated with EXPRESSION-MIB 268
Obtaining MIBs 269
RMON 273
RMON 1 and RMON 2 MIBs 273
RMON Principles 277
Supported Devices and IOS Versions 277
Cisco NAM Modules 278
CLI Operations 279
SNMP Operations 280
RMON Row Concept 280
Operations to Activate the Network Layer Host Group from the RMON 2 MIB 282
Examples 282
Initial Configuration 282
Collection Monitoring 282
DSMON MIB 284
DSMON MIB Principles 286
Supported Devices and IOS Versions 286
CLI Operations 286
SNMP Operations 286
Examples 287
SMON MIB 287
Supported Devices and IOS Versions 288
CLI Operations 288
SNMP Operations 288
Examples 289
Collection Monitoring 289
APM MIB and ART MIB 289
Supported Devices and IOS Versions 291
CLI Operations 291
SNMP Operations 291
Examples 291
Collection Monitoring 291
Applicability 292
Further Reading 293
IP Accounting 297
IP Accounting (Layer 3) 298
IP Accounting (Layer 3) Principles 298
Supported Devices and IOS Versions 299
CLI Operations 299
SNMP Operations 300
Examples (CLI and SNMP) 301
Initial Configuration 302
Collection Monitoring 302
IP Accounting Access Control List (ACL) 303
IP Accounting ACL Principles 304
Supported Devices and IOS Versions 304
CLI Operations 304
SNMP Operations 305
Examples (CLI and SNMP) 305
Initial Configuration 305
Collection Monitoring 306
IP Accounting MAC Address 308
IP Accounting MAC Address Principles 308
Supported Devices and IOS Versions 309
CLI Operations 309
SNMP Operations 310
Examples (CLI and SNMP) 311
Initial Configuration 311
Collection Monitoring 311
IP Accounting Precedence 312
IP Accounting Precedence Principles 313
Supported Devices and IOS Versions 313
CLI Operations 314
SNMP Operations 314
Examples (CLI and SNMP) 315
Initial Configuration 315
Collection Monitoring 315
Applicability 317
NetFlow 319
Fundamentals of NetFlow 322
Flow Definition 322
Cache Concept 325
Aging Flows on a Router 327
Aging Flows on a Catalyst 328
Export Version and Related Information Elements 329
The Beginning 330
The Foundation 330
Catalyst-Specific 330
Router-Based Aggregation 332
Flexible and Extensible 336
IPFIX 337
Comparison of Information Elements and NetFlow Version 338
Supported Interfaces 339
Export Protocol: UDP or SCTP 340
NetFlow Device-Level Architecture: Combining the Elements 342
Cisco NetFlow Collector 344
CLI Operations 345
SNMP Operations with the NETFLOW-MIB 346
Example: NetFlow Version 5 on a Router 347
Example: NetFlow Configuration on the Catalyst 348
Example: NetFlow Version 8 350
Example: NetFlow Version 9 350
New Features Supported with NetFlow Version 9 351
SCTP Export 351
Sampled NetFlow 353
Packet-Based Sampling on the Routers 354
Flow-Based Sampled NetFlow on the Catalyst 356
NetFlow Input Filters 358
MPLS-Aware NetFlow 360
BGP Next-Hop Information Element 362
NetFlow Multicast 363
NetFlow Layer 2 and Security Monitoring Exports 365
Top Talkers 366
Flexible NetFlow 370
Fields in Flexible NetFlow 372
Packet Sections 374
Flexible NetFlow Cache Types 374
Comparison of Original NetFlow and Flexible NetFlow 375
CLI Operations 377
Flexible NetFlow Examples 379
Deployment Guidelines 385
Supported Devices and IOS Versions 387
BGP Policy Accounting 389
Input BGP Policy Accounting 390
Output BGP Policy Accounting 391
Summary of All Four BGP Policy Accounting Combinations 392
Fundamentals 393
BGP Policy Accounting Commands 394
SNMP Operations 395
Examples (CLI and SNMP) 396
Initial Configuration 396
Collection Monitoring 397
Destination-Sensitive Services 398
Destination-Sensitive Billing 398
Destination-Sensitive Billing Example 399
Destination-Sensitive Traffic Shaping (DSTS) 399
Destination-Sensitive Traffic Shaping Example 400
Applicability 400
AAA Accounting 403
Fundamentals of AAA Accounting 405
High-Level Comparison of Radius, TACACS+, and Diameter 406
Radius 407
Radius Attributes 409
Radius CLI Operations 415
Voice Extensions for Radius 416
Concept of Call Legs 416
Radius Accounting with the Vendor-Specific Attribute 419
Radius Accounting with the Overloaded Acct-Session-Id 423
Comparing the Vendor-Specific Attribute and the Acct-Session-Id 424
CLI Operations for VoIP Accounting with Radius 425
Diameter Details 428
NBAR 433
NBAR Functionality 434
Distributed NBAR 435
NBAR Classification Details 435
Classification of HTTP by URL, Host, or MIME 436
Classification of Citrix ICA Traffic by Application Name 437
NBAR Packet Description Language Module (PDLM) 437
NBAR Scope 438
Supported Devices and IOS Versions 438
NBAR Protocol Discovery (PD) MIB 439
NBAR Supported Protocols 440
NBAR Protocol Discovery Statistics 440
NBAR Top-N Statistics 441
NBAR Protocol Discovery Thresholds, Traps, and History 442
NBAR Configuration Commands 443
NBAR show Commands 443
NBAR Examples (CLI and SNMP) 445
Basic NBAR Configuration 445
Custom Application Example 446
Limiting Peer-to-Peer Traffic 447
HTTP Requests Payload Inspection 447
NBAR Applicability 449
IP SLA 451
Measured Metrics: What to Measure 453
Network Delay 454
Jitter 454
Packet Loss 455
Measurement Accuracy 455
TCP Connect 456
DHCP and DNS Response Time 456
HTTP Response Time 456
Linking Metrics to Applications 456
Operations: How to Measure 457
Operations Parameters 457
Frequency 457
Number of Packets 458
Interpacket Interval 458
Packet Size 458
Timeout 458
Lifetime 459
Start Time 459
MPLS VPN Awareness 459
IP SLA Responder 459
Operation Types 463
ICMP Operations 464
UDP Operations 468
TCP Connect Operation 470
FTP Operation 470
DHCP Operation 471
DNS Operation 471
HTTP Operation 472
Frame Relay Operation 473
ATM Operation 475
VoIP Gatekeeper Registration Delay Monitoring Operation 476
VoIP Call Setup (Post-Dial Delay) Monitoring Operation 477
RTP-Based VoIP Operation 477
DLSw+ Operation 479
IP SLA CLI Operations 480
SNMP Operations with the CISCO-RTTMON-MIB 482
Application-Specific Scenario: HTTP 483
Application-Specific Scenario: VoIP 486
Advanced Features 488
Scheduling 488
Recurring Function 489
Multiple Operation Scheduling 489
Random Scheduling 491
Distribution of Statistics 491
History Collection 494
Thresholds and Notifications 495
Enhanced Object Tracking for IP SLA 499
Implementation Considerations 501
Supported Devices and IOS Versions 501
Performance Impact 503
Accuracy 504
Security Considerations 506
IP SLA Deployment 507
IP SLA Architecture and Best Practices 508
NMS Applications 511
Summary of Data Collection Methodology 515
Applicability 515
Assigning Technologies to Solutions 523
Monitoring Scenarios 525
Network Blueprint for Monitoring 525
Device and Link Performance 526
Network Connectivity and Performance 530
Application Monitoring 534
Service Monitoring and Routing Optimization 536
Capacity Planning Scenarios 541
Link Capacity Planning 541
Network Blueprint for Capacity Planning 543
Problem Space 544
Capacity Planning Tools 546
Methods for Generating the Core Traffic Matrix 548
NetFlow BGP Next Hop ToS Aggregation 551
Flexible NetFlow 552
MPLS-Aware NetFlow 553
BGP Passive Peer on the NetFlow Collector 554
BGP Policy Accounting 555
Other Methods 556
Additional Considerations: Peer-to-Peer Traffic 557
Summary 557
Voice Scenarios 559
Network Blueprint for IP Telephony 560
Voice Performance Measurement 561
Standards and Technology 561
Mean Opinion Scores (MOS) 562
Impairment/Calculated Planning Impairment Factor (ICPIF) 563
Network Elements in the Voice Path 564
Passive Voice Performance Measurement 564
Active Voice Performance Measurement 565
Cisco CallManager (CCM) 565
Application Examples 570
Network Analysis Module 571
CiscoWorks Unified Operations Manager 572
Voice Accounting 573
Standards and Technology 573
Network Elements in the Voice Path 574
Gateway, Gatekeeper, Multimedia Conference Manager 575
Cisco CallManager (CCM) 575
Application Example 575
Is Your Network Ready for IP Telephony? 577
Security Scenarios 579
Network Blueprint for Security Management 580
Security Management Process 582
Preparation 583
Identification 584
Classification 587
NetFlow 587
Network-Based Application Recognition (NBAR) 589
Network Analysis Module (NAM) 589
Other Attack Classification Features 590
Trace Back 591
Reaction 593
Postmortem 594
Summary 596
Billing Scenarios 599
Network Blueprint for Billing 600
Billing Approaches 602
Time-Based Billing 602
pWLAN 602
Dial-In 603
Volume-Based Billing 603
Residential Broadband Access (DSL or Cable) 603
Transit and Peering Agreements 604
Destination-Sensitive Billing 606
Time- and Distance-Based Billing 606
Service-Based Billing 607
Video on Demand (VoD) 608
Enterprise Departmental Charge Back 608
Flat Rate Billing 609
Summary 609
Index 612
No comments:
Post a Comment