1587051532Index.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

1587051532Index.Pdf 1532xix.fm Page 344 Monday, October 18, 2004 4:38 PM 1532xix.fm Page 345 Monday, October 18, 2004 4:38 PM I N D E X RSVP, 99–101 Numerics TE, 89–90 traffic-handing mechanisms, 81–83 802.11 networks, QoS, 276 work-conserving queuing, 93–96 agents, 146–147, 192 capture, 234 A embedded, 72 enabling, 148 ABR (available bit rate), 294 profiling, 39 Abstract Syntax Notation One (ASN.1), 147 SAA, 72, 158, 199 access. See also security agreements (SLAs) storage-area networks, 269 Cisco NetFlow, 73–74 transactions, 232 defining, 65–66 access control lists (ACLs), 81, 95 delivery, 66–67 accountability, delivery of service, 133 management, 67–68 accounting, 143 monitoring, 76–77 accounts, transactions, 230 profiling, 74–76 acknowledgments (ACKs), 60, 254 requirements, 68–73 ACLs (access control lists), 81, 95 alarms, 142 active agents, 192 algorithms Address Resolution Protocol (ARP), 236 queuing, 82, 91. See also queuing administration. See also management queue-servicing, 81 APM, 5 alignment, business/technical methodologies, 30–32 benefits of, 16 allocation end-to-end systems, 7 ports, 243 isolation, 7–8 QoS, 297 lifecycles, 9 resources, 80–81, 108–109 monitoring SLAs, 9 amalgamation, 62 overview of, 6 analysis sharing information, 8 business-impact, 124 CRM systems, 74 capacity planning, 183–186 oversight, 26 failure, 181 QPM, 109 modeling, 51 SLAs, 67–68 predictive performance, 15 system, 13 queries, 257–258 TCO, 25 root-cause, 142, 150 tools, 79 SLA compliance, 180 configuration, 83–84 systems, 77 DiffServ, 101–102 TCO, 25–27 FIFO, 92–93 thresholds, 49 IntServ, 98–99 triggers, 14 MPLS, 85–88 virtual environments, 176 networks resource allocation, 80–81 analyzers non-work–conserving queuing, 96–98 data, 204 provisioning, 83–84 network, 234 queuing, 91–92 profiling, 38 1532xix.fm Page 346 Monday, October 18, 2004 4:38 PM 346 any-to-any communication any-to-any communication, 270 assessment APIs (application programming interfaces), 190 applications, 14 APMs (application performance management), demarcation points, 128–130 5, 127 new application impact, 52 benefits of, 16 assignment end-to-end systems, 7 associated applications, 24 isolation, 7–8 demarcation points, 128–130 lifecycles, 9 QoS, 134–137 monitoring SLAs, 9 ATM (Asynchronous Transfer Mode), 86 overview of, 6 authentication, 110 services, 132–134 authorized transactions, 230 sharing information, 8 automation application programming interfaces (APIs), 190 capacity planning, 185 application-aware probes, 158 polling, 146 application-development teams, 13 availability, 157 applications, 13, 29 defining, 65–66 analyzers, 38 delivery, 66–67 architecture, 217–219, 256 available bit rate (ABR), 294 assessment, 14 average bytes per frame, viewing, 241 bandwidth-bounded, 42, 59–61 baselining, 48 business-critical, 29 B capture points, 55 characterizing, 45 background classification, 40–42, 289–290 data, 177 coexisting, 28 traffic, 118, 177. See also traffic data flow, 49 backplane utilization, 160 delivery, 11, 61–63 balancing metrics, 154 deployment, 50 bandwidth, 42 end-to-end models, 284–297 application consumption of, 7 interactive, 217 increasing, 61 latency-bounded, 40, 58–59 optimizing, 59–61 mission-critical, 291 priority, 29 monitoring, 198, 205 profiling, 36 probes, 72 windows, 254 status, 43 base networks, building, 118 storage solutions, 272 base transactions, defining, 43, 230. See also threads, 40 transactions turns, 37, 243 baselining, 47–50, 155 web-based, 291 businesses, 122 workloads, 10 collection, 185 architecture environments, 43 applications, 217–219, 256 establishing, 287 delivery requirements, 221–222 infrastructure, 107–108 hub-and-spoke, 135 performance, 173–174 policy management, 109–112 technical baselines, 121 ARP (Address Resolution Protocol), 236 BC (committed burst), 135 ASN.1 (Abstract Syntax Notation One), 147 Be (excess burst), 135 1532xix.fm Page 347 Monday, October 18, 2004 4:38 PM CLEC (competitive local exchange carrier) 347 benchmarking, 121 TCO, 25 benefits of TE, 90 APM, 16 validating, 179 TCO, 27 capacity Berkeley Standard Distribution (BSD), 204 increasing, 61 BGP (Border Gateway Protocol), 83 planning, 66, 174, 183–186 big bang deployments, 119–120 capturing big-picture view, 216 capture points, 55 bits, DE, 135 data, 54 Border Gateway Protocol (BGP), 83 traces, 218–219, 234–235 bottlenecks, identifying, 289 traffic, 218 boundaries, defining transactions, 248 transactions, 236 BPDU (bridge protocol data unit), 204 CAR (committed access rate), 81 branches, transactions, 232 case studies bridge protocol data unit (BPDU), 204 QoS, 259–265 broadcast traffic (etherStatsBroadcastPkts), 161 SLAs, 246–253 BSD (Berkeley Standard Distribution), 204 transactions BSM (business service management), 133 optimizing, 253–259 building profiling, 229–246 baseline environments, 43 categorizing business transactions, 230 baselines, 48 CBR (constant bit rate), 294 business applications, 7 CBWFQ (class-based weighted fair queuing), 81, 95 business baselines, 122 CDP (Cisco Discovery Protocol), 149 business criteria category (SLAs), 68–69 Cell Loss Priority (CLP), 135 business management, 150 cell switching, ATM, 86 business objectives, 132–134 central site (hub), 135 business requirements, 127 channel service unit/data service unit business service management (BSM), 133 (CSU/DSU), 295 business transactions characterizing applications, 45 optimizing, 253–259 CIFS (Common Internet File System), 271 profiling, 229–246 CIR (committed information rate), 135 business-critical applications Cisco Discovery Protocol (CDP), 149 defining, 22–24 Cisco IOS priority, 29–30 show commands, 201 requirements, 27–29 traffic-conditioning mechanisms, 136 TCO, 25–27 Cisco NetFlow, 31, 73–74 technical alignment, 30–32 Cisco Networking Service (CNS), 148, 213 business-impact analysis, 124 Cisco Tag Switching implementations, 86 bytes Cisco Works, 31 transfers, 245 class-based weighted fair queuing (CBWFQ), viewing, 241 81, 95 classification, 81, 84, 135–136 applications, 40–42, 289–290 C devices, 112 management systems, 141–151 calculations clean transactions, 235 measurements, 72 cleaning traces, 236 SPF, 90 CLEC (competitive local exchange carrier), 291 1532xix.fm Page 348 Monday, October 18, 2004 4:38 PM 348 CLI (command-line interface) CLI (command-line interface), 109, 147, metrics, 250 199–204 QoS, 109, 297 client, network, and server (CNS), 148, 213 RSPAN, 164 clients SPAN, 163 overloading, 220 storage-area networks, 269–276 processing time, 252 TCO, 25–27 CLP (Cell Loss Priority), 135 thresholds, 49 CNS (Cisco Networking Service), 148, 213 validation, 180 CNS (client, network, and server), 148, 213 conflict-prevention tools, SLAs, 67 coexisting applications, 28 congestion, troubleshooting, 176 collection congestion-avoidance (WRED) procedures, 135 baselining, 185 connections key date points, 70 any-to-any communication, 270 methods, 72 bandwidth-bounded applications, 42 metrics, 157–165 critical switched ports, 71 points, 246–253 latency, 35 collisions, Ethernet, 161 WLANs, 276–284 command-line interface (CLI), 109, 147 consistency commands APM, 6 debug, 202–203 transaction captures, 236 frame-relay ip rtp header-compression, 263 constant bit rate (CBR), 294 get, 245 constraint-based routing, 90 ip rtp compression-connections, 264 consumption, monitoring, 10 ip rtp header-compression, 263 contingency plans, deployment, 121–124 show, 201 control consoles, reporting to, 192 show processes cpu, 204 conversation, 38 snmpwalk, 49 capture points, 235 committed access rate (CAR), 81 paths, 157, 247 committed burst (Bc), 135 conversational maps, 240 committed information rate (CIR), 135 COPS (Common Open Policy Service), 110 Common Internet File System (CIFS), 271 core devices, QoS, 113 Common Open Policy Service (COPS), 110 core networks, CPE measurements, 72 common sense, 179 correlation of events, 142 communication CPE (customer premises equipment), 72, 295 deployment, 124 CQ (custom queuing), 81, 94 directory systems, 110 credit, SLAs, 66 SLAs, 67 critical switched port connections, 71 comparing trace files, 237–246 CRM (customer relationship management), 74 competitive local exchange carrier (CLEC), 291 cRTP (Real-Time Transport Protocol header complex transactions, 230 compression), 263 compliance, SLA analysis of, 180 CSU/DSU (channel service unit/data service computing resources, forecasting, 10 unit), 295 Compuware Application Vantage, 234 custom queuing (CQ), 81, 94 configuration customer premises equipment (CPE), baselining, 48 72, 295 CLI, 109 customer relationship management (CRM), 74 management, 143 customer service, SLAs, 66 1532xix.fm Page 349 Monday, October 18, 2004 4:38 PM development of application-development teams 349 pyramid model, 139–141 D responsibilities, 12 traffic, 274 data analyzers, 204 troubleshooting, 221–222 data collection, 108. See also baselining verifying, 61–63 data flow, application, 49 demarcation points, assigning, 128–130 data link connection identifier (DLCI), 88 dense wavelength-division multiplexing Data Link Switching (DLSw), 75 (DWDM), 88 data transfers, 290 dependency failures, 220 database administrator (DBA), 211 deployment database management system (DBMS), 160 application-deployment teams, 13 data-collection method, 159 applications, 50, 57 DBA (database administrator), 211 baselining, 155 DBMS (database management system), 160 big bang, 119–120 DE (Discard Eligible) bits, 135 contingency plans, 121–124 debug commands, 202–203 domains, 112–113 defining infrastructure, 107–108 base transactions, 43, 230 NetFlow, 165 business-critical applications,
Recommended publications
  • IBM Tivoli Composite Application Manager for J2EE Operations V6.0
    Software Announcement July 18, 2006 IBM Tivoli Composite Application Manager for J2EE Operations V6.0 and for Internet Service Monitoring V6.0 help monitor the health, availability, and security of business applications Overview Key features of these monitoring products: At a glance Two powerful monitoring products, • IBM Tivoli Composite Application Help proactively monitor IBM Tivoli Composite Application Manager for J2EE Operations V6.0 performance thresholds for Manager for J2EE Operations V6.0 and IBM Tivoli Composite changes in status and IBM Tivoli Composite Application Manager for Internet • Send alerts about potential Application Manager for Internet Service Monitoring V6.0, are problems before brownouts and Service Monitoring V6.0 offer designed to provide real-time outages affect users benefits that help: intelligence and historical trending • on the health, availability, and • Deliver automated action for Increase operational efficiency security of critical business preemptive problem resolution − Training is minimized as the applications. End-to-end visibility products do not require from multiple points of reference can Key prerequisites programming expertise help you quickly isolate the source − Products are highly scalable of application and service problems, Refer to the Software requirements and can help manage large and take rapid corrective action. section. environments Monitoring simulated transactions, − Automated troubleshooting usage, applications, security, and helps deliver fast time-to-resolution other resources
    [Show full text]
  • Acronyms Reference Guide 19.5.R1
    ACRONYMS REFERENCE GUIDE RELEASE 19.5.R1 7450 ETHERNET SERVICE SWITCH 7750 SERVICE ROUTER 7950 EXTENSIBLE ROUTING SYSTEM VIRTUALIZED SERVICE ROUTER ACRONYMS REFERENCE GUIDE RELEASE 19.5.R1 3HE 15078 AAAA TQZZA 01 Issue: 01 May 2019 Nokia — Proprietary and confidential. Use pursuant to applicable agreements. ACRONYMS REFERENCE GUIDE RELEASE 19.5.R1 Nokia is a registered trademark of Nokia Corporation. Other products and company names mentioned herein may be trademarks or tradenames of their respective owners. The information presented is subject to change without notice. No responsibility is assumed for inaccuracies contained herein. © 2019 Nokia. Contains proprietary/trade secret information which is the property of Nokia and must not be made available to, or copied or used by anyone outside Nokia without its written authorization. Not to be used or disclosed except in accordance with applicable agreements. 2 3HE 15078 AAAA TQZZA 01 Issue: 01 ACRONYMS REFERENCE GUIDE RELEASE 19.5.R1 List of tables 1 7750 SR, 7450 ESS, 7950 XRS, and VSR Acronyms....................5 Table 1 Numbers .....................................................................................................5 Table 2 A .................................................................................................................5 Table 3 B .................................................................................................................8 Table 4 C ...............................................................................................................10
    [Show full text]
  • Alcatel-Lucent 7705 SERVICE AGGREGATION ROUTER OS | RELEASE 4.0 OAM and DIAGNOSTICS GUIDE
    Alcatel-Lucent 7705 SERVICE AGGREGATION ROUTER OS | RELEASE 4.0 OAM AND DIAGNOSTICS GUIDE Alcatel-Lucent Proprietary This document contains proprietary information of Alcatel-Lucent and is not to be disclosed or used except in accordance with applicable agreements. Copyright 2010 © Alcatel-Lucent. All rights reserved. Alcatel-Lucent assumes no responsibility for the accuracy of the information presented, which is subject to change without notice. Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective owners. Copyright 2010 Alcatel-Lucent. All rights reserved. Disclaimers Alcatel-Lucent products are intended for commercial uses. Without the appropriate network design engineering, they must not be sold, licensed or otherwise distributed for use in any hazardous environments requiring fail-safe performance, such as in the operation of nuclear facilities, aircraft navigation or communication systems, air traffic control, direct life-support machines, or weapons systems, in which the failure of products could lead directly to death, personal injury, or severe physical or environmental damage. The customer hereby agrees that the use, sale, license or other distribution of the products for any such application without the prior written consent of Alcatel-Lucent, shall be at the customer's sole risk. The customer hereby agrees to defend and hold Alcatel-Lucent harmless from any claims for loss, cost, damage, expense or liability that may arise out of or in connection with the use, sale, license or other distribution of the products in such applications. This document may contain information regarding the use and installation of non-Alcatel-Lucent products.
    [Show full text]
  • A New Alternate Routing Scheme with Endpoint Admission Control for Low Call Loss Probability in Voip Networks
    A NEW ALTERNATE ROUTING SCHEME WITH ENDPOINT ADMISSION CONTROL FOR LOW CALL LOSS PROBABILITY IN VOIP NETWORKS A Thesis by Sandipan Mandal B.E., SGGS Institute of Engineering and Technology, Maharashtra, India, 2000 Submitted to the Department of Electrical and Computer Engineering and the faculty of the Graduate School of Wichita State University in partial fulfillment of the requirements for the degree of Master of Science July 2006 A NEW ALTERNATE ROUTING SCHEME WITH ENDPOINT ADMISSION CONTROL FOR LOW CALL LOSS PROBABILITY IN VOIP NETWORKS I have examined this final copy of this thesis for form and content, and recommend that it be accepted in partial fulfillment of the requirement for the degree of Master of Science with a major in Electrical Engineering. ________________________________ Ravi Pendse, Committee Chair We have read this thesis and recommend its acceptance __________________________________________ John Watkins, Committee Member __________________________________________ Krishna K. Krishnan, Committee Member ii DEDICATION To my parents, my sister, and my dear friends iii If we knew what it was we were doing, it would not be called research, would it? – Albert Einstein iv ACKNOWLEDGMENTS I would like to thank my advisor, Dr. Ravi Pendse, for his personal attention, encouragement, patient guidance and support throughout the course of my study at Wichita State University. I would also like to thank my committee members, Dr. John Watkins and Dr. Krishna K. Krishnan, for their helpful comments and suggestions on all stages of this project. I would like to thank Mr. Amarnath Jasti and Mr. Nagaraja Thanthry for their support, precious time, encouragement, and enthusiastic supervision during this work.
    [Show full text]
  • ITCAM for Internet Service Monitoring Agent Installation and Configuration Guide Chapter 2
    IBM Tivoli Composite Application Manager for Internet Service Monitoring agent 7.4.0 Fix Pack 2 IF 04 Installation and Configuration Guide IBM 0000-0000-00 Contents Tables................................................................................................................. vii Chapter 1. Introduction......................................................................................... 1 Chapter 2. Overview of the agent........................................................................... 3 Integration with IBM Tivoli Monitoring .......................................................................................................4 Integration with other products.............................................................................................................7 About Internet Service Monitoring.............................................................................................................. 9 Internet Service Monitoring architecture....................................................................................................9 Chapter 3. Planning your ITCAM for Transactions installation............................... 11 Planning to install Internet Service Monitoring........................................................................................ 11 Hardware and software requirements.................................................................................................11 Installation prerequisites.....................................................................................................................11
    [Show full text]
  • Cisco 5921 Embedded Services Router Data Sheet
    Data Sheet Cisco 5921 Embedded Services Router The Cisco ® 5921 Embedded Services Router (ESR) is a Cisco IOS software router application. It is designed to operate on small, low-power, Linux-based platforms to extend the use of Cisco IOS ® Software into extremely mobile and portable communications systems. You can use the Cisco 5921 ESR in a variety of applications. The Cisco 5921 ESR is part of the Cisco 5900 Series ESRs, all optimized for mobile and embedded networks that require IP routing and services. The flexible, compact form factor of the Cisco 5900 routers, complemented by Cisco IOS Software and Cisco Mobile Ready Net capabilities, provides highly secure data, voice, and video communications to stationary and mobile network nodes across wired and wireless links. Low-Cost Vehicle Communications Systems The Cisco 5921 ESR complements the Cisco 5915 and 5940 ESR hardware routers, providing integrators with a cost-effective solution for addressing smaller, highly-integrated applications. The Cisco 5921 ESR can be combined with system-specific applications onto a single, small, low-power hardware solution. Portable Communications Devices By not restricting the product developer to a specified form factor, the Cisco 5921 ESR offers integrators creative flexibility to design hardware to meet unique market requirements. The router targets low-power systems, making it ideal for use in portable, battery-powered devices. Sensors The Cisco 5921 ESR’s network optimization capabilities support the development of security-protected sensors deployed in self-forming, self-healing, infrastructure-less networks. It provides immediate connection with no pre- configuration of peers required; no need for connectivity to a centralized network; and reach beyond the range of a fixed network.
    [Show full text]
  • Cisco − Measuring Delay, Jitter, and Packet Loss with Cisco IOS SAA and RTTMON Cisco − Measuring Delay, Jitter, and Packet Loss with Cisco IOS SAA and RTTMON
    Cisco − Measuring Delay, Jitter, and Packet Loss with Cisco IOS SAA and RTTMON Cisco − Measuring Delay, Jitter, and Packet Loss with Cisco IOS SAA and RTTMON Table of Contents Measuring Delay, Jitter, and Packet Loss with Cisco IOS SAA and RTTMON..........................................1 Introduction..............................................................................................................................................1 Measuring Delay, Jitter, and Packet Loss for Voice−enabled Data Networks........................................1 The Importance of Measuring Delay, Jitter, and Packet Loss....................................................1 Defining Delay, Jitter, and Packet Loss......................................................................................1 SAA and RTTMON....................................................................................................................2 Deploying Delay and Jitter Agent Routers..............................................................................................2 Where to Deploy.........................................................................................................................2 Simulating a Voice Call..............................................................................................................3 Delay and Jitter Probe Deployment Example.............................................................................3 Sample Data Collections..........................................................................................................................4
    [Show full text]
  • Cisco Ios Ip Service Level Agreements
    Cisco Ios Ip Service Level Agreements RodolpheAntipathetical metallings and canaliculated dazedly. Igor shriek some Everest so interim! Wright corduroy her mustiness scurrilously, aerostatic and platelike. Gynaecocracy The level agreement, like a primary channel by our use of time taken between multiple paths in. IP SLA Timeout or cloud Network Expert. Cisco IOS IP Service lease Agreement Remote Denial of. Ipsla operation type is an option is unavailable. Free account on our default is the target device. Detailed explanation of SLA service lease agreement architecture and chest to. Routerconfig-ip-slaicmp-echo 1010101 source-interface FastEthernet10. The level agreements presentation, such as the responder, monitoring programs to bandwidth consumption of none; for designing network management solution. Exit icmp echo configuration values? Displays history collected in the network performance in. The Cisco IP Service and Agreement IP SLA is that network performance measurement tool heat is embedded in Cisco IOS IP SLA allows the. What debug commands can simulate the level. Url in milliseconds to a specific vpn service levels for all defaults for ensuring continuous availability is cisco security advisory. A vulnerability in the IP Service your Agreement SLA responder feature of Cisco IOS XE Software could conduct an unauthenticated remote. Cisco IOS Software IP Service leave Agreement Denial of Service Vulnerability High Nessus Plugin ID 130092 New Vulnerability Priority Rating. Sets the resources to check the internet connection times between any devices from: what channels are generated. It enables customers? Cisco IP SLAs Service Level Agreements Enterprise community Small. Both the level agreement monitoring for this operation, but older techniques such as described below.
    [Show full text]
  • Cisco IOS Netflow and Service Assurance Agent
    Cisco IOS NetFlow and Service Assurance Agent Paul Kohler ITD Product Marketing Session Number Presentation_ID © 2003 Cisco Systems, Inc. All rights reserved. 1 The Five Facets of Proper Network Management • Addresses the network management applications that reside upon the NMS • OSI model categorizes five areas of function (sometimes referred to as the FCAPS model): Fault Configuration Accounting Performance Security NetFlow 2/04 © 2003 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2 Cisco IOS NetFlow NetFlow 2/04 © 2003 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3 NetFlow Origination • Developed and Patented at Cisco Systems in 1996 • NetFlow is now the primary network accounting technology in the industry • Answers questions regarding IP traffic: who, what, where, when, and how • A detailed view of network behaviour NetFlow 2/04 © 2003 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4 What is a Flow ? Defined by seven unique keys: Traffic •Source IP address Enable NetFlow New •Destination IP address SNMP MIB •Source port Interface •Destination port •Layer 3 protocol type •TOS byte (DSCP) NetFlow Export •Input logical interface Packets (ifIndex) Traditional Export & SNMP Poller Collector GUI NetFlow 2/04 © 2003 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5 NetFlow Cache Example 1. Create and update flows in NetFlow Cache SrcIf SrcIPadd DstIf DstIPadd Protocol TOS Flgs Pkts SrcPort SrcMsk SrcAS DstPort DstMsk DstAS NextHop Bytes/Pkt Active Idle Fa1/0 173.100.21.2 Fa0/0 10.0.227.12 11 80 10 11000 00A2 /24 5 00A2 /24 15 10.0.23.2 1528 1745 4 Fa1/0 173.100.3.2 Fa0/0 10.0.227.12 6 40 0 2491 15 /26 196 15 /24 15 10.0.23.2 740 41.5 1 Fa1/0 173.100.20.2 Fa0/0 10.0.227.12 11 80 10 10000 00A1 /24 180 00A1 /24 15 10.0.23.2 1428 1145.5 3 Fa1/0 173.100.6.2 Fa0/0 10.0.227.12 6 40 0 2210 19 /30 180 19 /24 15 10.0.23.2 1040 24.5 14 • Inactive timer expired (15 sec is default) 2.
    [Show full text]
  • Acronym List
    Acronym List Numerics 3DES Triple Data Encryption Standard A ACD Automatic call distribution AD Active Directory ADSL Asymmetric digital subscriber line AHT Average handle time ANI Automatic Number Identification APG Agent Peripheral Gateway AQT Average queue time ARM Agent Reporting and Management ASA Average speed of answer ASR Automatic speech recognition Cisco Unified Contact Center Enterprise Design Guide, Release 10.0(1) 1 Acronym List AVVID Cisco Architecture for Voice, Video, and Integrated Data AW Administrative Workstation AWDB Administrative Workstation Database B BBWC Battery-backed write cache BHCA Busy hour call attempts BHCC Busy hour call completions BHT Busy hour traffic BOM Bill of materials bps Bits per second Bps Bytes per second C CAD Cisco Agent Desktop CC Contact Center CCE Contact Center Enterprise CG CTI gateway CIPT OS Cisco Unified Communications Operating System Cisco Unified Contact Center Enterprise Design Guide, Release 10.0(1) 2 Acronym List CIR Cisco Independent Reporting CMS Configuration Management Service CPE Customer premises equipment CPI Cisco Product Identification tool CRM Customer Relationship Management CRS Cisco Customer Response Solution CSD Cisco Supervisor Desktop CSS Cisco Content Services Switch CSV Comma-separated values CTI Computer telephony integration CTI OS CTI Object Server CVP Cisco Unified Customer Voice Portal D DCS Data Collaboration Server DES Data Encryption Standard DHCP Dynamic Host Configuration Protocol DID Direct inward dial Cisco Unified Contact Center Enterprise Design
    [Show full text]
  • Beyond Fault Management Implementing a NOC to Maintain High Availability Jim Thompson Jay Thondakudi
    PS-510 © 2001, Cisco Systems, Inc. All rights reserved. 1 Beyond Fault Management Implementing a NOC to Maintain High Availability Jim Thompson Jay Thondakudi © 2001, Cisco Systems, Inc. All rights reserved. 2 MAKING IT INTERACTIVE © 2001, Cisco Systems, Inc. All rights reserved. 3 Copyright © 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID.scr Agenda • Availability Measurement and your business • Overview of a NOC • Network Management Framework • Fault Management • Performance Management • Tool Issues • People, Processes and Procedures • Back to the Concept of the NOC © 2001, Cisco Systems, Inc. All rights reserved. 4 Method for Attaining a Highly Available Network or a road to five 9’s • Establish a Standard Measurement Method • Define Business Goals as Related to Metrics • Categorize Failures, Root Causes, and Improvements • Take Action for Root Cause Resolution and Improvement Implementation © 2001, Cisco Systems, Inc. All rights reserved. 5 Why should we care about network availability? Recent studies by Sage Research determined that US based Service Providers encountered: • Percent of downtime that is unscheduled: 44% • 18% of customers experience over 100 hours of unscheduled downtime or an availability of 98.5% • Average cost of network downtime per year: $21.6 million or $2,169 per minute! Downtime - Costs too much!!! SOURCE: Sage Research, IP Service Provider Downtime Study: Analysis of Downtime Causes,Costs and Containment Strategies, August 17, 2001, Prepared for Cisco SPLO B © 2001, Cisco Systems,
    [Show full text]
  • Cisco Catalyst 3020 Blade Switch for HP C-Class Quickspecs Bladesystem
    Cisco Catalyst 3020 Blade Switch for HP c-Class QuickSpecs BladeSystem Overview The Cisco Catalyst 3020 Blade Switch for HP c-Class BladeSystem provides HP customers with an integrated switching solution from Cisco Systems. This solution provides Cisco resiliency, advanced security and enhanced manageability to the server edge while dramatically reducing cabling requirements. The Catalyst 3020 Blade Switch capitalizes on your current Cisco network infrastructure to reduce the total cost of implementation and ownership. By utilizing the advanced Cisco end-to-end management framework, customers can simplify current and future deployments reducing implementation and management costs. Flexible to fit your needs - The Catalyst 3020 Blade Switch is designed with sixteen internal 1Gb downlinks and eight 1Gb RJ-45 copper uplinks. Up to four uplinks can be optionally configured as fiber SX links. Two uplinks can optionally be configured as internal cross- connects. Figure 1 Catalyst 3020 Front View 1. Switch Module 6. Gigabit Ethernet Port LEDs 2. Release latch 7. Gigabit Ethernet RJ-45 Ports 3. UID LED 8. Health LED 4. SFP Module Port LED 9. Mode Button 5. SFP Module Ports for SX Fiber 10 Switch LED Panel What's New Support for new HP ProLiant G7 server blades DA - 12515 North America — Version 15 — August 16, 2013 Page 1 Cisco Catalyst 3020 Blade Switch for HP c-Class QuickSpecs BladeSystem Overview At A Glance Performance Wire speed switching on sixteen internal 1Gb ports. Wire Speed switching on eight external 10/100/1000BASE-T ports. (Two of these ports can be used as cross-connects to provide failover protection).
    [Show full text]