Web-Based Management of Ip Networks and Systems

Total Page:16

File Type:pdf, Size:1020Kb

Web-Based Management of Ip Networks and Systems WEB-BASED MANAGEMENT OF IP NETWORKS AND SYSTEMS THÈSE No 2256 (2000) PRÉSENTÉE AU DÉPARTEMENT DE SYSTÈMES DE COMMUNICATION ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE POUR L’OBTENTION DU GRADE DE DOCTEUR ÈS SCIENCES PAR Jean-Philippe MARTIN-FLATIN Ingénieur généraliste diplômé de l’ECAM (Lyon, France) de nationalité française acceptée sur proposition du jury: Prof. Jean-Pierre Hubaux, directeur de thèse Prof. Roland Balter, corapporteur Dr. Subrata Mazumdar, corapporteur Prof. André Schiper, corapporteur Prof. Morris Sloman, corapporteur Lausanne, EPFL 2000 ABSTRACT The management of IP networks and systems is currently based on the Simple Network Management Protocol (SNMP) and the SNMP management architecture. This poses a number of problems. Some are related to the efficiency, scalability, latency, and expressiveness of SNMP, others to the way the design of SNMP-based management platforms historically evolved. After reviewing the numerous alternatives that are currently investigated by the research community, including mobile code and intelligent agents, we propose to base the next generation of management applications on a new management architecture: WIMA, the Web-based Integrated Management Architecture. WIMA is based on standard Web technologies. It relies on a push-based organizational model for regular management (i.e., data collection—for offline processing—and monitoring over a long period of time) and notification/event delivery, and a pull-based organizational model for ad hoc management (data retrieval over a very short time period). Its communication model is characterized by (i) the use of persistent HTTP connections between agents and managers (or between mid- and top-level managers in distributed hierarchical management); (ii) the support for any information model (SNMP, CIM, etc.); and (iii) a reversed client-server architecture that facilitates crossing firewalls. In WIMA, the preferred method for representing management data in transit is XML. It is well suited for distributed hierarchical management; it unifies the communication model across the entire range of integrated management (that is, network, systems, application, service, and policy management); and it offers high-level semantics to the management-application designer. All the major problems that we identified in SNMP are solved in WIMA. Our architecture is validated by a prototype: JAMAP, the JAva MAnagement Platform. Keywords: Network Management, Systems Management, Web-Based Management, Internet, Web, Push, WIMA, SNMP, CIM, HTTP, MIME, XML Index Keys in the Computing Research Repository (CoRR): • Area: Computer Science • Subject Classes: Networking and Internet Architecture; Distributed Computing iii RÉSUMÉ La gestion des réseaux et des systèmes IP repose actuellement sur le protocole SNMP (Simple Network Management Protocol) et l’architecture de gestion SNMP. Ceci pose un certain nombre de problèmes. Certains sont liés à l’efficacité, au passage à grande échelle, à la latence et à la puissance d’expression sémantique de SNMP; d’autres sont dûs à la façon dont les plateformes de gestion SNMP ont vu leur conception évoluer avec le temps. Après avoir passé en revue les nombreuses alternatives à SNMP actuellement envisagées par la communauté de recherche, et notamment le code mobile et les agents intelligents, nous proposons de bâtir la prochaine génération de solutions de gestion sur une nouvelle architecture de gestion: WIMA (Web-based Integrated Management Architecture). WIMA est fondée sur les technologies Web. Elle repose sur un modèle organisationnel diptyque utilisant d’une part un modèle push pour la gestion régulière (c’est-à-dire la collecte de données à des fins d’analyse a posteriori et le monitoring, tous deux opérant sur une longue durée) et l’envoi de notifications/évènements, et d’autre part d’un modèle pull pour la gestion ad hoc (gestion au coup par coup, sur une durée très courte). Le modèle de communication de WIMA est caractérisé par (i) des connexions HTTP permanentes entre agents et gestionnaires (ou entre gestionnaires de niveaux supérieur et inférieur en cas de gestion distribuée hiérarchique); (ii) le support de n’importe quel modèle informationnel (SNMP, CIM, ou autre); et (iii) une architecture client-serveur inversée qui facilite la traversée des pare-feux. Dans WIMA, il est recommandé d’utiliser XML pour représenter les données de gestion en transit. XML est bien adapté à la gestion distribuée hiérarchique et permet d’unifier le modèle de communication à travers le spectre entier couvert par la gestion intégrée: gestion de réseaux, de systèmes, d’applications, de services, de politiques, etc. XML offre également un niveau sémantique élevé au concepteur d’applications de gestion. Tous les problèmes majeurs que nous avons identifiés dans SNMP sont résolus dans l’architecture de gestion WIMA. Notre architecture est validée par un prototype: JAMAP (JAva MAnagement Platform). Mots-clés: gestion de réseaux, gestion de systèmes, gestion basée sur les technologies Web, Internet, Web, push, WIMA, SNMP, CIM, HTTP, MIME, XML Classification dans le Computing Research Repository (répertoire international de travaux de recherche en informatique): • catégorie: informatique • sous-catégories: réseaux et architecture de l’Internet; informatique répartie iv ACKNOWLEDGMENTS I would like to thank Jean-Pierre Hubaux for welcoming me on his team and supervising my Ph.D. thesis for four years. Having spent many years in industry, I dreaded becoming a student again. But he patiently put up with my frustration with no longer being in charge, he offered me exceptional working conditions, and he got the best out of me. I am very grateful for the freedom and independence he gave me over these years, and for helping me complete this dissertation on time. I also thank him for arranging the funding of my work by the Swiss National Science Foundation (FNRS) and EPFL. I am grateful to all the members of my Ph.D. committee for the time they spent reviewing my dissertation and the valuable feedback they provided me with. I also thank all my current and past colleagues at EPFL (especially those at ICA, TCOM, LIA, and LSE) for the friendly atmosphere and the good times we spent together. I especially thank Simon Znaty, who taught me how to do research and gave me a goldmine of pointers in network management, and Werner Almesberger, who helped me understand how the Linux kernel works and gave me some precious feedback on Chapter 7. Thanks also to Danielle Alvarez, our ever-smiling secretary, for shielding me from administrative headaches for four years; and thanks to Holly Cogliati for patiently improving my English and teaching me the differences between British and American English. During my Ph.D., I had the chance to meet several people outside EPFL with whom I had regular technical discussions, face to face or via email. They all contributed to improving the quality of my work. Special thanks go to Luca Deri, George Pavlou, Gian Pietro Picco, and Jürgen Schönwälder. I also thank the people I met at AT&T Laboratories, Bell Laboratories, IBM T.J. Watson Research Center, Imperial College, Institut d’Informatique et Mathématiques Appliquées de Grenoble (IMAG), and University of Twente for the multitude of questions they asked me while I was giving seminars there; they helped me consolidate my work. My Ph.D. work would not have been possible without the technical skills that I developed in my previous job. I would like to thank my former colleagues at ECMWF: Ditlef Martens, Otto Pesonen, and Baudouin Raoult, who taught me so much about Unix internals; Tony Bakker and Dick Dixon, who taught me the basics of networking; Walter Zwieflhofer and Claus Hilberg, my former supervisors, who taught me rigor when selling a technical solution to management; and all the others (Pam Prior, Petra Kogel, Matthias Nethe, Mike O’Brien, Hélène and Didier Garçon, etc.) who made my six years in England such a great working and human experience in my life. Further back in time, I am very grateful to Patrick Lachaize, who encouraged me to move into networking in 1989, before I heard of the Internet. What a visionary idea! I also express my deepest gratitude to Gilles Maignaud, Alain Martinez, and François Martin for teaching me, when I was 16–18, that mathematics, physics, and science at large can be great fun. Even in difficult times, I have always strived to take some pleasure in v vi doing my job. Their advice has served me throughout my career, and I am indebted to them for my continued interest in computer science. Finally, I thank my family and friends for their unwavering support throughout these four Ph.D. years. When other people were telling me that I was crazy to go back to university, they supported my project and encouraged me to pursue my childhood’s dream of becoming a researcher. Most of all, I thank my wife, Béatrice, whose daily love made my Ph.D. possible. She supported me when I had difficulties and offered me the family cocoon that enabled me to be creative. She also put up with the long nights and week-ends that I spent at the university and allowed me to commit fully to my work. I knew that I had married a rare pearl... Lausanne, August 11, 2000 DEDICATION To Béatrice To the memory of Louise and Henri vii viii EPIGRAPH Γηρασκωé δ'αιειè διδασκοµενοé s The older I get, the more I learn Solon (~640 – ~558 B.C.) ix x CONTENTS Abstract . iii Résumé. iv Acknowledgments . v Dedication . vii Epigraph . ix Contents . xi List of Figures . xvii List of Tables . xix 1 Introduction . 1 1.1 Background . 1 1.2 Ph.D. Work . 3 1.3 Caveat . 5 1.4 Organization of the Dissertation . 5 2 Problem Statement . 7 2.1 Terminology . 7 2.1.1 IP world vs. telecom world . 8 2.1.2 Network, systems, application, service, policy, and integrated management . 8 2.1.3 Management application, platform, and system.
Recommended publications
  • English Arabic Technical Computing Dictionary
    English Arabic Technical Computing Dictionary Arabeyes Arabisation Team http://wiki.arabeyes.org/Technical Dictionary Versin: 0.1.29-04-2007 April 29, 2007 This is a compilation of the Technical Computing Dictionary that is under development at Arabeyes, the Arabic UNIX project. The technical dictionary aims to to translate and standardise technical terms that are used in software. It is an effort to unify the terms used across all Open Source projects and to present the user with consistant and understandable interfaces. This work is licensed under the FreeBSD Documentation License, the text of which is available at the back of this document. Contributors are welcome, please consult the URL above or contact [email protected]. Q Ì ÉJ ªË@ éÒ¢@ Ñ«YË QK AK.Q« ¨ðQåÓ .« èQK ñ¢ ÕæK ø YË@ úæ®JË@ úGñAm '@ ñÓA®ÊË éj èYë . l×. @QK. éÔg. QK ú¯ éÊÒªJÖÏ@ éJ J®JË@ HAjÊ¢Ö Ï@ YJ kñKð éÔg. QK úÍ@ ñÓA®Ë@ ¬YîE .ºKñJ ËAK. éîD J.Ë@ ÐYjJÒÊË éÒj. Óð éÓñê®Ó H. ñAg éêk. @ð Õç'Y®JË ð á ÔgQÖÏ@ á K. H. PAJË@ øXA®JË ,H. ñAmÌ'@ . ¾JÖ Ï .ñÓA®Ë@ éK AîE ú ¯ èQ¯ñJÖÏ@ ð ZAKñÊË ø X @ ú G. ø Q¯ ékP ù ë ñÓA®Ë@ ékP . éJ K.QªËAK. ÕÎ @ [email protected] . úΫ ÈAB@ ð@ èC«@ à@ñJªË@ úÍ@ H. AëYË@ ZAg. QË@ ,á ÒëAÖÏ@ ɾK. I. kQK A Abortive release êm .× (ú¾J.) ¨A¢®K@ Abort Aêk . @ Abscissa ú æJ Absolute address Ê¢Ó à@ñ J« Absolute pathname Ê¢Ó PAÓ Õæ @ Absolute path Ê¢Ó PAÓ Absolute Ê¢Ó Abstract class XQm.× ­J Abstract data type XQm.× HA KAJ K.
    [Show full text]
  • Rethinking Security
    RETHINKING SECURITY Fighting Known, Unknown and Advanced Threats kaspersky.com/business “Merchants, he said, are either not running REAL DANGERS antivirus on the servers managing point- of-sale devices or they’re not being updated AND THE REPORTED regularly. The end result in Home Depot’s DEMISE OF ANTIVIRUS case could be the largest retail data breach in U.S. history, dwarfing even Target.” 1 Regardless of its size or industry, your business is in real danger of becoming a victim of ~ Pat Belcher of Invincea cybercrime. This fact is indisputable. Open a newspaper, log onto the Internet, watch TV news or listen to President Obama’s recent State of the Union address and you’ll hear about another widespread breach. You are not paranoid when you think that your financial data, corporate intelligence and reputation are at risk. They are and it’s getting worse. Somewhat more controversial, though, are opinions about the best methods to defend against these perils. The same news sources that deliver frightening stories about costly data breaches question whether or not anti-malware or antivirus (AV) is dead, as reported in these articles from PC World, The Wall Street Journal and Fortune magazine. Reports about the death by irrelevancy of anti-malware technology miss the point. Smart cybersecurity today must include advanced anti-malware at its core. It takes multiple layers of cutting edge technology to form the most effective line of cyberdefense. This eBook explores the features that make AV a critical component of an effective cybersecurity strategy to fight all hazards targeting businesses today — including known, unknown and advanced cyberthreats.
    [Show full text]
  • Cyren's 2016 Cyberthreat Report
    2016 CYBERTHREAT Report AUTOMATED THREAT INTELLIGENCE: The Key to Preventing, Mitigating, and Identifying Cyber Breaches Introduction .................................................................................................4 The Cloud Sandbox Array: A New Tool Against Cybercrime .....................6 The Benefits of Big Data .......................................................................... 12 2016 Predictions....................................................................................... 14 Malware Newsmakers of 2015 ................................................................ 16 The Criminal Power of the Unknown ...................................................... 22 2015 Statistics: Android, Phishing, Malware, Spam ............................... 26 Table of Contents Table CYREN 2016 CYBERTHREAT REPORT 3 INTRODUCTION Lior Kohavi Chief Technical Officer, CYREN, Inc. There is a false perception that sophisticated attacks are too difficult to prevent and the only alternative is detection. But detection is NOT the new prevention. Cybersecurity professionals must make it their mission to STOP attacks, not just become proficient at detecting them. It's no secret that cybercriminals are willing to spend a lot of time and money to obtain the information they desire. And, the risk that these criminals will be caught and convicted is relatively low. Despite well-publicized botnet takedowns, like that of Darknode this past July, researchers estimate that less than 1% of cybercrimes receive a corresponding conviction.
    [Show full text]
  • BCIS 1305 Business Computer Applications
    BCIS 1305 Business Computer Applications BCIS 1305 Business Computer Applications San Jacinto College This course was developed from generally available open educational resources (OER) in use at multiple institutions, drawing mostly from a primary work curated by the Extended Learning Institute (ELI) at Northern Virginia Community College (NOVA), but also including additional open works from various sources as noted in attributions on each page of materials. Cover Image: “Keyboard” by John Ward from https://flic.kr/p/tFuRZ licensed under a Creative Commons Attribution License. BCIS 1305 Business Computer Applications by Extended Learning Institute (ELI) at NOVA is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted. CONTENTS Module 1: Introduction to Computers ..........................................................................................1 • Reading: File systems ....................................................................................................................................... 1 • Reading: Basic Computer Skills ........................................................................................................................ 1 • Reading: Computer Concepts ........................................................................................................................... 1 • Tutorials: Computer Basics................................................................................................................................ 1 Module 2: Computer
    [Show full text]
  • Malware Primer Malware Primer
    Malware Primer Malware Primer Table of Contents Introduction Introduction ...........................................................................................................................................................................2 In The Art of War, Sun Tzu wrote, “If you know the enemy and know yourself, you need not fear the result of a hundred battles.” This certainly applies Chapter 1: A Brief History of Malware—Its Evolution and Impact ..............................3 to cyberwarfare. This primer will help you get to know cybercriminals by providing you with a solid foundation in one of their principle weapons: Chapter 2: Malware Types and Classifications ....................................................................................8 malware. Chapter 3: How Malware Works—Malicious Strategies and Tactics ........................11 Our objective here is to provide a baseline of knowledge about the different types of malware, what malware is capable of, and how it’s distributed. Chapter 4: Polymorphic Malware—Real Life Transformers .............................................14 Because effectively protecting your network, users, data, and company from Chapter 5: Keyloggers and Other Password Snatching Malware ...............................16 malware-based attacks requires an understanding of the various ways that the enemy is coming at you. Chapter 6: Account and Identity Theft Malware ...........................................................................19 Keep in mind, however, that we’re only able here
    [Show full text]
  • NETSURION DEFENSE AGAINST BACKOFF: How Netsurion Effectively Protected Against Threats
    NETSURION DEFENSE AGAINST BACKOFF: How Netsurion Effectively Protected Against Threats Powering Secure and Agile Networks In the wake of the numerous recent data breaches, many consumers are demanding answers as to the how and why surrounding companies who have inadvertently allowed data to be compromised, given security measures accessible today. After a breach is confirmed, the process typically involves PCI Forensic Investigators spending time researching and investigating compromised networks, logging files, and any other pieces of the system traceable to not only determine how the hackers gained access, but once in control of a machine, how data was removed or retrieved. Investigative reports post-breach have uncovered vast amounts of useful information employed to reactively secure networks going forward. The industry, as a whole, has learned that in many of the instances, the culprit responsible for the data theft is linked to businesses utilizing remote access, or more specifically, insecure remote access. It should come as no surprise then that the method of choice for many blackhats (a.k.a. computer hackers) looking to enter a system has been identifying insecure remote access. This method includes several different remote platforms, of which you can read more about in the DHS article on Backoff: New Point of Sale Malware. Hackers search for vulnerabilities and once located, it is only a matter of moments before they are able to connect to machines remotely, often times gaining administrative privileges in the process. Once they have these privileges, it is quite easy for them to download the Backoff malware on the machine in order to begin sending credit card data to their destination of choice.
    [Show full text]
  • Q3 Internet Threat Trends Report
    INTERNET THREATS TREND REPORT OCTOBER 2014 THE STATE OF CORPORATE SECURITY Lior Kohavi Chief Technical Officer, CYREN, Inc. The Companies—Home Depot, JP Morgan Chase, Target The Information—56 million credit cards, 76 million ‘households,’ 7 million small businesses, and 110 million accounts The Impact—According to recent reports, Home Depot estimates that investigation, credit monitoring, call center, and other costs could top $62 million. Target’s stock fell by almost 14% in the months following news of the breach, with profits down 46% by the end of Q4 2013, and breach-related expenses totaling $146 million. The impact of the JP Morgan Chase data breach has yet to be determined, but early reports suggest the costs could top that of Target. These are just a few of the big names that have hit the headlines recently. But, it’s not just large organizations being hacked. Regional small- to medium-sized businesses (SMBs) are potentially even greater targets, as hackers view SMB security as less sophisticated and easy to breach. According to a 2013 Verizon report, which analyzed 47,000 security incidents, 40% of all confirmed breaches involved companies with fewer than 1,000 employees; more notably, the largest single segment of corporate breach victims among companies with less than 1,000 employees were companies with fewer than 100 employees. When you consider that an estimated 60% of all companies experiencing a cybersecurity breach go out of business within six months of the attack, it is a wonder that all corporations aren’t making cybersecurity a higher priority. Yet, the level of corporate complacency with regard to cybersecurity remains high.
    [Show full text]
  • How to Protect Against Ransomware Attacks 24 May, 2017
    HOW TO PROTECT AGAINST RANSOMWARE ATTACKS 24 MAY, 2017 Visit us at www.ehr20.com [email protected] 866-276 8309 © 2017 EHR 2.0. All rights reserved. To purchase reprints of this document, please email [email protected]. Disclaimer This session has been provided for educational and informational purposes only and is not intended and should not be construed to constitute legal advice. Please consult your attorneys in connection with any fact-specific situation under federal law and the applicable state or local laws that may impose additional obligations on you and your company. © 2017 EHR 2.0. All rights reserved. To purchase reprints of this document, please email [email protected]. Who we are … EHR 2.0 Mission: To assist healthcare organizations develop and implement practices to secure IT systems and comply with HIPAA/HITECH regulations. Education(Training, Webinar & E-Learning) Consulting Services Toolkit(Tools, Best Practices & Checklist) © 2017 EHR 2.0. All rights reserved. To purchase reprints of this document, please email [email protected]. About Craig Petronella • Top cybersecurity expert and IT authority in Raleigh, NC. • Author of multiple books, including How HIPAA Can Crush Your Medical Practice and Peace of Mind Computer Support. • 30+ years advising clients & protecting computer information. • Makes sure your business network works when you need it the most, and is a celebrity in his field and hometown. • Frequently quoted on ABC, CBS, NBC, News14, PRNews Wire, and Newsobserver.com for his expertise in protecting local businesses and medical practice owners from hackers halfway around the world in places such as Ukraine, Russia, and China.
    [Show full text]
  • SBC-Gateway-MSBR Series Release Notes Ver
    Release Notes AudioCodes Gateways, Session Border Controllers (SBC) & Multi-Service Business Routers (MSBR) Session Border Controllers Multi-Service Business Routers Analog & Digital Media Gateways Version 7.2 Release Notes Contents Table of Contents 1 Introduction ....................................................................................................... 17 1.1 Software Revision Record ...................................................................................... 17 1.2 Products Supported in Release 7.2 ........................................................................ 19 2 Gateways and SBCs ......................................................................................... 21 2.1 Version GA .............................................................................................................21 2.1.1 New Features .......................................................................................................... 21 2.1.1.1 New Product - Media Transcoder Device ................................................ 21 2.1.1.2 New GUI for Web-based Management Tool ........................................... 21 2.1.1.3 New CLI Structure ................................................................................... 22 2.1.1.4 Interworking between SIP and SIP-I Endpoints ...................................... 22 2.1.1.5 Maximum Call Duration per Gateway and SBC Calls ............................. 23 2.1.1.6 Protection against Known Malicious Attacks ........................................... 23
    [Show full text]
  • Optimizing Re-Evaluation of Malware Distribution Networks
    Optimizing Re-Evaluation of Malware Distribution Networks by Kyle Zeeuwen A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF APPLIED SCIENCE in The Faculty of Graduate Studies (Electrical and Computer Engineering) THE UNIVERSITY OF BRITISH COLUMBIA (Vancouver) October, 2011 c Kyle Zeeuwen 2011 Abstract The retrieval and analysis of malicious content is an essential task for security researchers. Security labs use automated HTTP clients known as client honeypots to visit hundreds of thousands of suspicious URLs daily. The dynamic nature of malware distribution networks necessitate periodic re-evaluation of a subset of the confirmed malicious sites, which introduces two problems: 1) the number of URLs requiring re-evaluation exhaust available resources, and 2) repeated evaluation exposes the system to adversarial blacklisting, which affects the accuracy of the content collected. To address these problems, I propose optimizations to the re-evaluation logic that reduce the number of re-evaluations while maintaining a constant sample discovery rate during URLs re-evaluation. I study these problems in two adversarial scenarios: 1) monitoring malware repositories where no provenance is available, and 2) monitoring Fake Anti-Virus (AV) distribution networks. I perform a study of the adversary by repeatedly content from the distribution networks. This re- veals trends in the update patterns and lifetimes of the distribution sites and malicious executa- bles. Using these observations I propose optimizations to reduce the amount of re-evaluations necessary to maintain a high malicious sample discovery rate. In the first scenario the proposed techniques, when evaluated versus a fixed interval scheduler, are shown to reduce the number of re-evaluations by 80-93% (assuming a re-evaluation interval of 1 hour to 1 day) with a corresponding impact on sample discovery rate of only 2-7% percent.
    [Show full text]
  • Bladecenter, Linux, and Open Source Blueprint for E-Business on Demand
    Front cover IBM Eserver BladeCenter, Linux, and Open Source Blueprint for e-business on demand Discover open source projects to reduce cost and improve reliability Install and configure Linux and critical open source network services Learn best practices to implement reliable services George Dolbier Peter Bogdanovic Dominique Cimafranca Yessong Johng Rufus Credle Jr. ibm.com/redbooks International Technical Support Organization IBM ^ BladeCenter, Linux, and Open Source: Blueprint for e-business on demand July 2003 SG24-7034-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (July 2003) This edition applies to Red Hat Advanced Server 2.1. © Copyright International Business Machines Corporation 2003. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix The team that wrote this redbook. ix Become a published author . xi Comments welcome. xi Chapter 1. About the book: Blueprint for building an e-business application for BladeCenter. 1 1.1 Building an e-business infrastructure . 2 1.1.1 Materials . 2 1.1.2 Objectives . 3 1.2 IBM eServer™ BladeCenter . 3 1.3 FAStT SAN storage. 3 1.4 BladeCenter business value . 4 1.5 Linux business value. 4 1.6 Open source business value. 4 1.7 Other references . 5 Chapter 2. Architecture: Solution overview . 7 2.1 Open source e-business infrastructure a modular approach . 8 2.2 All construction projects start with a pattern . 8 2.2.1 Industry standard e-business pattern: A three-tier infrastructure .
    [Show full text]
  • Omniswitch AOS Release 6 Switch Management Guide
    Part No. 060638-10, Rev B November 2019 OmniSwitch AOS Release 6 Switch Management Guide 6.7.2.R07 www.al-enterprise.com This user guide documents release 6.7.2.R07 of the OmniSwitch 6350, 6450. The functionality described in this guide is subject to change without notice. The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE. To view other trademarks used by affiliated companies of ALE Holding, visit: www.al-enterprise.com/en/legal/trade- marks-copyright. All other trademarks are the property of their respective owners. The information presented is subject to change without notice. Neither ALE Holding nor any of its affiliates assumes any responsibility for inaccuracies contained herein. 26801 West Agoura Road Calabasas, CA 91301 Service & Support Contact Information North America: 800-995-2696 Latin America: 877-919-9526 EMEA: +800 00200100 (Toll Free) or +1(650)385-2193 Asia Pacific: +65 6240 8484 Web: businessportal2.alcatel-lucent.com Email: [email protected] OmniSwitch AOS Release 6 Switch Management Guide November 2019 ii Contents About This Guide .......................................................................................................... xi Supported Platforms .......................................................................................................... xi Who Should Read this Manual? .......................................................................................xii When Should I Read this Manual? ...................................................................................xii
    [Show full text]