Home > Store

Web-Based Information Management: For the Enterprise

Register your product to gain access to bonus material or receive a coupon.

Web-Based Information Management: For the Enterprise

  • Published Dec 23, 1998 by Pearson.

Book

  • Sorry, this book is no longer in print.
Not for Sale

Description

  • Copyright 1999
  • Dimensions: 7" x 9-1/4"
  • Pages: 380
  • Edition: 1st
  • Book
  • ISBN-10: 0-13-096018-7
  • ISBN-13: 978-0-13-096018-4

Web technology is revolutionizing network and systems management, making it easy to provide crucial information virtually anywhere, any time. This is the first book to bring together all the components of Web-based management -- explaining the compelling advantages, remaining limitations and practical techniques for serious network professionals.KEY TOPICS:Start with an overview of what Web-based management is, and how it builds on existing SNMP and TCP/IP-based enterprise management technologies. Learn how to create Web-based network and systems management models, and build CORBA-based distributed objects that implement these models. You'll also find detailed coverage of Java management applications and the brand-new Java Management API (JMAPI). There's detailed coverage of how to make sure your Web-based management applications remain secure, a close look at the latest directions and developments in Web-based management, and much more. This is a serious technical book for anyone who wants to leverage the power of Web-based management while minimizing the risks.MARKET:For IT executives, network and systems managers, and developers of standards-based network management products.

Sample Content

Downloadable Sample Chapter

Click here for a sample chapter for this book: 0130960187.pdf

Table of Contents

(NOTE: Each chapter ends with a Summary and References).

I. DEFINING THE PIECES.

1. Introduction to Web-based Management.

Evolving Trends in Enterprise Computing. The Internet and the World Wide Web. The Allure of Web-based Management. Introduction to Java. The Five-Minute College: Object-oriented Technologies.

2. Enterprise Management.

Defining Enterprise Management. Benefits of Enterprise Management. Open, Standards-based Frameworks. Types of Enterprise Management. Simple Network Management Protocol (SNMP). Common Information Management Protocol (CMIP). Telecommunications Management Network (TMN). Transaction Language 1 (TL1). Desktop Management Interface (DMI). Other Desktop Management Standards. Application Response Measurement (ARM). Other Enterprise Management Standards.

3. Network Data Security.

Security Threats. Security Attacks. Security Defenses. Security Services. Security Mechanisms. Enterprise Security Policy. Web-based Security Introduction. Other Security Issues.

4. Defining the Pieces.

The Web Browser. The Web Server. The Communication Protocols. The Hypertext Transfer Protocol (HTTP). The Mark-up Languages. Graphic Formats. Multipurpose Internet Mail Extensions (MIME). Common Gateway Interface (CGI). Web Programming Languages. Web Scripting Languages. ActiveX. Search Engines. Databases. Virtual Reality Modeling Language (VRML). Push Technology. Audio, Video, and Beyond. Other Web-based Technology Pieces.

II. MAKING THE MODELS.

5. Making the Models.

The Types of Models. The General Web-based Management Framework. First-Generation Web-based Management Evolution. Three Possible Web-based Frameworks. Comparing the Web-based Frameworks. Real Web-based Framework Designs.

6. Web-based Network Management.

SNMP and Web-based Management. Remote Network Monitoring (RMON). Other SNMP Efforts. The Death of SNMP? CMIP and Web-based Management. TMN and Web-based Management.

7. Web-based Systems Management.

Another Look at Systems Management. The DMTF and Systems Management. Current DMTF Directions. Thin Clients. Vendor-based Systems Management Efforts. SNMP and Systems Management. Web-based Management and Systems Management.

8. Web-Based Distributed Object Management.

Distributed Object Introduction. The Common Object Request Broker Architecture (CORBA). Distributed Objects and Web-based Management.

9. Java and Web-based Management Applications.

Using the Java Programming Language. Java Applets. Examples of Using Java for Web-based Applications and Applets. Intelligent Agents.

III. USING THE MODELS.

10. Using the Models.

Doing Network Management. Doing Systems Management. Doing Applications Management. Doing Service Management. Doing Other Types of Enterprise Management.

11. Web-based Security.

Web-based Security Issues. Security for Web-based Management Models. Web Client Security. Web Server Security. Web-based Security Assessment.

12. JMAPI: The Java Management API.

Major JMAPI Elements. A Closer Look at the JMAPI Architecture. JMAPI Object Model. JMAPI System Requirements. JMAPI Information on the Web. Current JMAPI Status. Limitations of the Current JMAPI Framework.

13. WBEM: Web-based Enterprise Management.

Introduction to WBEM. WBEM Reference Model. The WBEM Design. Major WBEM Components. WBEM and XML. WBEM Information on the Web. WBEM Implementations. Current WBEM Status. Limitations of the Current WBEM Framework.

14. Web Server Management.

Web Browser Management Basics. SNMP-based Web Server Management.

15. Current Implementations.

Conventional Enterprise Management Vendors. Emerging Web-based Management Product Vendors. Web-based Management Service Providers. Other Associated Web-based Management Efforts. Further Reading and Investigation.

16. Recent Directions and Developments.

Goals of Web-based Management. Realities of Web-based Management. Future Directions. Final Thoughts.

Appendix A: Web-based Management Chronology.
Appendix B: Web-based Management RFC Index.
Appendix C: SNMP RFC Index.
Bibliography and Web Sites.
Glossary with Acronyms.
Index.

Preface

Oh, what a tangled Web we weave, when first we practice to... manage?! The metaphor of comparing the Internet and its World Wide Web (WWW) application to a spider's Web is apropos when discussing the management of today's enterprise. The WWW is the application that uses the Internet's pervasive mesh of hardware and software to present and deliver electronic information. For this information to retain its value, it needs to be managed.

As the information within today's enterprise also expands unabated within the digital world of computers and networks, the management requirements are becoming more and more challenging. Companies are co-evolving the use of internetworking technologies from the Internet with their current practices of information technology and enterprise management. This confluence of Internet technology and enterprise management is creating Web-based management.

We define Web-based management as the use of the World Wide Web technologies to do enterprise management, but its true character is only beginning to take shape. Many people know the Web. They are using a browser and are quite comfortable with this interface. Many people know enterprise management-particularly network and systems management. Various enterprise management frameworks have enjoyed many years of success and these technologies are evolving to meet the current and future demands of the Web-enabled enterprise. SNMP network management stations now control thousands of network devices. Nearly every PC now shipped is DMI-compliant. New software technologies, such as the Java programming language, promise such innovations as platform independence application development to make management processes easier to create and deploy. Intelligent agents are beginning to roam in cyberspace, collecting management information.

So, why not Web-based management?

In a fine bit of marketeering, Computer Associates declare in their ad that "Now You Can Manage The World With A Browser"2. Many companies since the mid-90s have been moving toward using, integrating, and perhaps, replacing their Information Technology (IT) with Internet-based technologies. The Internet is transforming the enterprise. This shift also coincides with the rise of the distributed object model that is competing with a maturing client/server model that has always presented daunting management challenges for controlling information.

Current management platforms and solutions are perceived as difficult to use and costly to maintain. They are also generally considered expensive to purchase. Many have scalability and platform dependency problems. Web-based management promises everything from a new interface to existing management frameworks to a complementary technology to a total replacement for the current conventional distributed enterprise management platform.

Web-based management has a definite cachet. It is new, alluring, exciting, and-immature. This book is an introduction to the current realities of Web-based management. It will hopefully provide information on how wide the gap is between the initial bravado and the reality of emerging Web-based frameworks and point products. There is a great deal of hype surrounding Web-based "anything" and the explosive rise in Internet use has generated a great deal of momentum.

Lewis Caroll once said that the less information you had, the quicker you could form your opinion. Will Web-based management be the "cake and eat it too" solution to enterprise management or should we gather as much data and experience as we can and make a more critical evaluation? Web-based management is a technology that needs to be examined much more closely to focus on whether the reality warrants the hype.

The World Wide Web is influencing nearly every aspect of information creation, gathering, and exchange. We use the Web to talk about the Web and the Internet is one of the best sources for discovering and investigating Web-based management topics and directions. In addition to traditional book and periodical references, the Bibliography refers to several Web sites that contain pertinent information-although, beware, the "links" tend to be less persistent than the paper and ink of hardcopy.

This is the Preface. It contains a general introduction to the book. It includes the goals of the book, the book's audience, how the book is organized, the conventions used, and acknowledgments.

Goals
This book is written to introduce the reader to the many facets of Web-based management. There are several specific goals:

  1. Introduce key definitions and terminology.
  2. Explain the technologies that have come together to create Web-based management. This includes explaining the Internet-based technologies, enterprise management, and the other "pieces" that are arranged to create Web-based management models.
  3. Create Web-based management models that are used for various emerging frameworks and products being developed and deployed by new and traditional enterprise management vendors.
  4. Evaluate the details, as well as the pros and cons of various Web-based management approaches and strategies.
  5. Provide pointers to more information on standards, frameworks, and products.
  6. Indicate the direction for Web-based management and the real-world applications that exist or are currently being developed.

Hopefully, after learning about Web-based management, the reader will know what it is and whether is has relevance and application for their enterprise.

Audience
This book is intended for traditional network administrators who are dealing with or will soon be confronted with the WWW and the dramatic rise in the use and adaptation of Internet technologies into the enterprise. Many more people will find this book interesting and worthwhile also. They include people interested in security such as data, Web security, and electronic commerce. Programmers such as Web programmers, Java programmers, and the various types of enterprise management programmers will find this book interesting and worthwhile. Network, systems, applications, and service management people, people interested in various management standards, and many others interested in the general state of IT and its management via new and emerging technologies will garner new outlooks on what is going on in these areas.

How This Book Is Organized
This book includes a complete discussion of Web-based technologies and enterprise management. It presents the Web-based management pieces, the models, and the current first-generation products and frameworks that are being deployed.

The book is organized into three sections containing a total of 16 chapters. There are three appendices, a bibliography, a glossary and acronyms section, and an index.

SECTION I, Defining the Pieces, introduces Web-based management and defines the various technologies and their components that must work together for this new type of management to be effective.

Chapter 1, Introduction to Web-based Management, contains a look at the evolving trends in enterprise computing and how these affect and will be affected by Web-based management. Key terms are defined. Web-based management is introduced as the union of Web-based technologies, management domains, and the enterprise. The Internet and the World Wide Web are also introduced. Other important technologies are briefly touched upon. These include Java, object-oriented technology, and the Unified Modeling Language (UML).

Chapter 2, Enterprise Management, introduces the various types of management that make up our definition of enterprise management. These include network, systems, application, and service management. Important standards are described and the current frameworks are examined. These standards include SNMP, CMIP, TMN, and DMI.

Chapter 3, Network Data Security, describes an increasingly important aspect of management in the enterprise: network data security. Key standards and technologies are also shown and described.

Chapter 4, Defining the Pieces, introduces the major components that are used in Web-based management. These "pieces" include the Internet browser and server, the communication protocols, including the Hypertext Transfer Protocol (HTTP), and the mark-up languages for Web page composition and presentation. Other pieces described include MIME, CGI, Java, and other programming languages, scripting languages, VRML, audio and video presentation techniques, and "push" technologies.

SECTION II, Making the Models, takes the pieces defined in Section I and uses them to built Web-based management models.

Chapter 5, Making the Models, introduces the main types of models constructed to define Web-based management: the functional model, the data model, the information model, the conformance model, and the security model. These models are in turn used to create three frameworks: the native model framework, the proxy model framework, and the gateway model framework.

Chapter 6, Web-based Network Management, introduces the use of Web-based management with conventional network management frameworks such as SNMP and CMIP.

Chapter 7, Web-based Systems Management, describes how systems management can be done with Web-based management techniques.

Chapter 8, Web-based Distributed Object Management, demonstrates how the Web-based management strategies can be used for the newly evolving distributed object frameworks such as CORBA.

Chapter 9, Java and Web-based Management Applications, introduces the use of the Java programming language with Web-based management. This is especially promising for the area of the development of management applications.

SECTION III, Using the Models, takes the models created in Section II and applies them to newly emerging frameworks, products and other current directions.

Chapter 10, Using the Models, shows how fault, configuration, accounting, performance, and security management can be done with Web-based management schemes.

Chapter 11, Web-based Security, builds on the concepts introduced in Chapter 3 and demonstrates how these types of security are defined and implemented for Web-based management.

Chapter 12, JMAPI: The Java Management API, introduces the management API being defined by Sun Microsystems for the use of Web-based management of devices that contain the Java Virtual Machine (JVM) and this set of management objects. The Web site and other pointers are included.

Chapter 13, WBEM: Web Based Enterprise Management, contains information on the Web-based management initiative called WBEM. This chapter describes the models used in this framework, lists new terminology, and demonstrates how WBEM will be used in the enterprise. Pertinent Web URLs are listed and the current status of the effort are stated.

Chapter 14, Web Server Management, describes the management of Web servers, including the Web-based management effort. This chapter also includes information on standards-based efforts for this task.

Chapter 15, Current Implementations, lists many of the current implementations being offered by various vendors and other parties.

Chapter 16, Current Directions and Developments, describes what is currently going on with various Web-based management efforts and tries to predict near-future developments and general directions.

Appendix A, A Web-based Management Chronology, contains a Web-based management time line.

Appendix B, Web-based Management RFC Index, and Appendix C, SNMP RFC Index, contain the Request for Comment (RFC) lists for Web-based management and SNMP, respectively. The Bibliography contains the list of references used. This includes books, periodicals, and Web sites. Finally there is a section that contains a glossary of terms and their associated acronyms.

Conventions Used in This Book
Listed below are the conventions for the various fonts used in this text.

Constant Width: is used for source code examples, and for quotations from source code within the text, including variable and function names. This font is also used for output printed by a computer and for the contents of files.
Constant Bold: is used for commands typed word for word by the user.
Italic: is used for command names, directory names, and filenames. It is also used for words that are being defined.
Bold: is used for command options. In addition, it is used for vectors in the mathematical sense.

Acknowledgments
I would like to thank my family-my wife Andrea and our three boys, Ryan, Sean, and Andrew-for their love and support throughout this project. I would also like to thank Andrew and Gloria Laspino for the many, many kind favors they have done for me. I would also like to thank my mother, Charlotte Harnedy.

Thanks to all my new friends and everyone I work with at the Excel Switching Corporation in Hyannis, Cape Cod, Massachusetts. I have learned many new and exciting things dealing with telecommunications, open programmable switching, and enterprise management since I started working in Software Engineering under Dave Brajczewski. Thanks also to Bob Madonna.

Finally, I would like to especially thank Kerry Reardon, the production editor, and Mike Meehan and everyone at Prentice Hall PTR who helped see this project through to completion.

Sean J. Harnedy
October 1998
East Sandwich, Massuchussetts

References for Preface
  1. Partington, Angela, (ed.). The Oxford Dictionary of Quotations. Oxford: Oxford University Press, 1996, p. 560.
  2. Advertisement for Computer Associates Unicenter TNG enterprise management product, Network World (January): 8-9, 1998.

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020