-
Management Interoperability Subdimensions
- The communication viewpoint
- The function viewpoint
- The information viewpoint
-
Analogy
Two persons want to successfully conduct a business interaction
-
communication viewpoint
must hear each other and must speak the same language
-
function viewpoint
know what services they can provide
-
information viewpoint
clear about what you are talking about
-
Communications Rules Need to be Established
How is the agent supposed to react if two messages that seemingly contain the same request are received?
-
Informational
Viewpoint
- Introduces common terminology between manager
- and agent
-
Standards
The role of standards is to establish common rules that everyone adheres to.
-
Management Interoperability Standards
The rules for management message exchange, and the way in which management messages encode information
-
Management Life Cycle
- Plan
- -Current and forecasted needs
- Deploy
- –Install, configure, and turn up
- equipment
- Operations
- –Monitoring, tuning, statistics
- Decommission
- –Orderly plan to replace or
- eliminate equipment
-
Telecommunications Management Network
- a set of standards by the International Telecommunications Union (ITU-T)
- related to the principles for how networks used to manage
- telecommunication networks are to be constructed and which standards they should adhere to.
-
Element management
Managing individual devices and keeping them running
-
Network management
Managing relationships and dependencies between elements (devices)
-
Services management
Managing the services provided by the network
-
Business management
Billing, help-desk, business forecasting, etc.
-
Network element
The management agent
-
(FCAPS)
Fault, Configuration, Accounting, Performance, Security
-
Standardize
Common tasks should follow a predefined template
-
Cryptography
a branch of mathematics used to protect information.
-
cipher
the mathematical function used to scramble
-
encrypt
the message so it can be unscrambled
-
decrypted
by the intended recipient, but not by anyone else
-
Plaintext
the message you wish to send/encrypt
-
Ciphertext
the message after its encrypted
-
Key
- similar to a password, used to access your data
- Measured in bits
-
Breaking the code
Brute force (key search) attack
-
Private Key Cryptography
- Sender and receiver must share a key, which
- must be kept private
-
-
Diffie-Hellman Public Key System
- Used frequently in Cisco routers
- Each participant starts with his or her own secret key
-
RSA Algorithm
- Public key system used by PGP and others
- Key servers server public keys for people over the Internet.
-
PGP
- Plaintext is encrypted with session key
- Session key is a 1-time use symmetrical key randomly generated
-
The receiver uses
SECRET key to decrypt
-
The sender uses
PUBLIC key to encrypt the message/text
-
Digital Signatures
A message digest function produces a number (with PGP, a 128-bit number) with the message
-
PGP
- Your keys are kept on keyrings
- Your secret key is stored encrypted using IDEA encryption
|
|