Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Handbook of Network and System Administration -

Handbook of Network and System Administration (eBook)

eBook Download: PDF
2011 | 1. Auflage
1028 Seiten
Elsevier Science (Verlag)
9780080553580 (ISBN)
Systemvoraussetzungen
183,43 inkl. MwSt
(CHF 179,20)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
System administration is about the design, running and maintenance of human-computer systems. Examples of human-computer systems include business enterprises, service institutions and any extensive machinery that is operated by, or interacts with human beings. System administration is often thought of as the technological side of a system: the architecture, construction and optimization of the collaborating parts, but it also occasionally touches on softer factors such as user assistance (help desks), ethical considerations in deploying a system, and the larger implications of its design for others who come into contact with it.

This book summarizes the state of research and practice in this emerging field of network and system administration, in an anthology of chapters written by the top academics in the field. The authors include members of the IST-EMANICS Network of Excellence in Network Management.

This book will be a valuable reference work for researchers and senior system managers wanting to understand the essentials of system administration, whether in practical application of a data center or in the design of new systems and data centers.

- Covers data center planning and design
- Discusses configuration management
- Illustrates business modeling and system administration
- Provides the latest theoretical developments
System administration is about the design, running and maintenance of human-computer systems. Examples of human-computer systems include business enterprises, service institutions and any extensive machinery that is operated by, or interacts with human beings. System administration is often thought of as the technological side of a system: the architecture, construction and optimization of the collaborating parts, but it also occasionally touches on softer factors such as user assistance (help desks), ethical considerations in deploying a system, and the larger implications of its design for others who come into contact with it.This book summarizes the state of research and practice in this emerging field of network and system administration, in an anthology of chapters written by the top academics in the field. The authors include members of the IST-EMANICS Network of Excellence in Network Management.This book will be a valuable reference work for researchers and senior system managers wanting to understand the essentials of system administration, whether in practical application of a data center or in the design of new systems and data centers.- Covers data center planning and design- Discusses configuration management- Illustrates business modeling and system administration- Provides the latest theoretical developments

Front cover 1
Handbook of Network and System Administration 4
Copyright page 5
Preface 6
List of Contributors 8
Contents 10
Part 1. The Arena 12
Chapter 1.1 Commentary 12
Chapter 1.2 Scaling Data Centre Services 14
1. Introduction 14
2. Computing services 14
3. Resources 15
4. Servers and workstations 18
5. Designing an application architecture 20
6. Data centre design 28
7. Capacity planning 38
8. Service level estimators 44
9. Network load sharing 47
10. Configuration and change management 49
11. Human resources 51
12. Concluding remarks 52
Acknowledgements 52
References 52
Chapter 1.3 Automating System Administration: Landscape, Approaches and Costs 54
1. Introduction 54
2. What system administrators do 55
3. How to automate 61
4. When to automate 72
5. Conclusions 82
References 82
Chapter 1.4 System Configuration Management 86
1. Introduction 86
2. Relationship with other disciplines 89
3. Configuration management and systems architecture 90
4. Cost models 92
5. Configuration management strategies 96
6. Challenges of configuration management 101
7. High-level configuration concepts 103
8. Low-level configuration concepts 105
9. An operational model of configuration management 111
10. Traditions of configuration management 119
11. Scripting 120
12. Package management 128
13. Declarative specification 129
14. Cloning 133
15. Configuration languages 134
16. Simplifying configuration management 136
17. Critique 139
18. Current challenges 140
19. Conclusion 141
References 142
Part 2. The Technology 146
Chapter 2.1 Commentary 146
Reference 147
Chapter 2.2 Unix and z/OS 148
1. Introduction 148
2. Some history 149
3. User interfaces 150
4. Files and data-sets 151
5. I/O operations 152
6. Task- and resource management 152
7. Platform applicability and typical workloads 153
8. Linux on the mainframe 154
9. The future of the mainframe 154
10. Typical platforms characteristics 155
11. Key terms 156
References 157
Chapter 2.3 Email 158
1. Introduction 158
2. Mail history 158
3. Mail architecture 160
4. Mail routing 167
5. Mail servers and clients 172
6. Mail security 174
7. Relations to other technologies 177
8. Real world email 178
9. Conclusion 181
References 182
Chapter 2.4 XML-Based Network Management 184
1. What is XML-based network management? 184
2. XML technologies 187
3. Applicability of XML technologies to management tasks 189
4. XML-based network management architecture 193
5. Implementation experience 204
6. Concluding remarks 205
References 206
Chapter 2.5 Open Technology 208
1. Introduction 208
2. Open 209
3. Open software as a scientific publication 213
4. Conclusion 214
References 214
Chapter 2.6 System Backup: Methodologies, Algorithms and Efficiency Models 216
1. Introduction 216
2. General backup considerations 218
3. Operational practicalities 226
4. Backup strategies and algorithms 236
5. Numerical models 245
References 247
Chapter 2.7 What Can Web Services Bring to Integrated Management? 252
1. Motivation 253
2. Introduction to Web services 257
3. Advanced Web services 261
4. Web services for management, management of Web services 265
5. Fine-grained Web services for integrated management 268
6. Toward coarse-grained Web services for integrated management 284
7. Conclusion 300
Acknowledgements 301
References 301
Chapter 2.8 Internet Management Protocols 306
1. Introduction 306
2. Management protocol requirements 307
3. Architectural concepts 314
4. Internet management protocols 317
5. Conclusions 336
Acknowledgements 337
References 337
Part 3. Networks, Connections and Knowledge 340
Chapter 3.1. Commentary 340
References 341
Chapter 3.2 Management of Ad-Hoc Networks 342
1. Introduction 342
2. Management paradigms 347
3. Application domains 359
4. Conclusions 367
References 370
Chapter 3.3 Some Relevant Aspects of Network Analysis and Graph Theory 372
1. Introduction - basic concepts 372
2. Centrality on undirected graphs 383
3. EVC, topography and spreading on undirected graphs 390
4. Directed graphs 409
5. Visualization 425
6. Summary 431
Acknowledgement 434
References 434
Chapter 3.4 Knowledge Engineering Using Ontologies 436
1. Introduction and background 436
2. Ontologies to the rescue 444
3. An overview of current ontologies 448
4. Ontology-based knowledge fusion 458
5. Using knowledge fusion in autonomics 460
6. Summary 464
References 465
Chapter 3.5 Application Integration using Semantic Web Services 468
1. Introduction 468
2. Framework and basic technologies 469
3. Integrating applications 478
4. Summary 479
References 480
Part 4. Policy and Constraint 482
Chapter 4.1 Commentary 482
Reference 482
Chapter 4.2 Security Management and Policies 484
1. Introduction 484
2. Policy models 486
3. Applications of the models 512
4. Conclusion 515
References 515
Chapter 4.3 Policy-Based Management 518
1. Overview 518
2. General features and architecture 521
3. Policy models 524
4. Security and trust specification policies 531
5. Management and control policies 546
6. Policy-based management frameworks 553
7. Ponder policy framework 560
8. Policy analysis and refinement 565
9. Research issues 568
10. Summary 569
Acknowledgements 570
References 570
Part 5. Computational Theories of System Administration 576
Chapter 5.1 Commentary 576
Chapter 5.2 On the Complexity of Change and Configuration Management 578
1. Introduction 578
2. Configuration operations as an automated form of system administration 582
3. A gentle introduction to complexity theory 594
4. Analysis of some configuration problems 601
5. More complexity theory 610
6. More on operators and configuration management 620
7. Conclusions 629
References 632
Chapter 5.3 Complexity of System Configuration Management 634
1. Introduction 634
2. A model of configuration management 635
3. Reproducibility 640
4. Limits on configuration operations 645
5. Complexity of configuration composition 649
6. Configuration management made tractable 654
7. Some theoretical ways to reduce complexity 657
8. Conclusion 660
References 661
Chapter 5.4 Predictable and Reliable Program Code: Virtual Machine-based Projection Semantics 664
1. Introduction 664
2. Semantics of programming languages 666
3. Projection semantics 669
4. Virtual machines and intermediate languages 671
5. The base language 672
6. Extensions of ISLA with labels and goto's, conditional constructs and while loops 675
7. Extension with constructs involving recursion 680
8. Intermediate-level programs 685
9. A high-level program notation HLN 691
10. Concluding remarks 694
Acknowledgements 695
References 695
Part 6. System Science 698
Chapter 6.1 Commentary 698
Chapter 6.2 System Administration and the Scientific Method 700
1. Introduction 700
2. Modelling 701
3. Measurements and scales 702
4. Experiments and data collection 703
5. Errors and uncertainties 704
6. Hypotheses 707
7. Discrete and continuous modelling 708
8. Modelling responses 710
9. Configuration management and maintenance 711
10. The concept of a system 714
11. Diagrammatic modelling 715
12. Discrete streams: information 718
13. Continuous streams: queues 721
14. Workflow and scalability 725
15. Policy modelling and promise theory 729
16. Games - rational decision theory 732
17. Conclusions 737
Acknowledgement 737
References 737
Chapter 6.3 System Administration and Micro-Economic Modelling 740
1. Introduction 740
2. Heuristic goals of business 742
3. De facto standards for human-centric procedures 744
4. System, environment and scales 745
5. Business models 747
6. Service relationships 748
7. Business as a network service 757
8. Demand and capacity: `provisioning' 765
9. Inventory models 770
10. What is the cost of poor system administration? 778
11. Conclusions 781
Acknowledgements 781
References 781
Chapter 6.4 System Reliability 786
1. Introduction 786
2. Probability and risk 787
3. Parallel and serial systems, duality 791
4. Fault trees 793
5. General definitions 796
6. Graph systems 800
7. Dynamic system analysis 805
8. Component importance 810
9. Advanced topics 814
References 819
Part 7. Business and Services 822
Chapter 7.1 Commentary 822
References 823
Chapter 7.2 State-of-the-Art in Economic Management of Internet Services 824
1. Introduction and motivation 825
2. Existing models 827
3. Existing key mechanisms 843
4. Summary and conclusions 858
5. Abbreviations 860
Acknowledgements 862
References 862
Chapter 7.3 Service Provisioning: Challenges, Process Alignment and Tool Support 866
1. Introduction 866
2. Service provider goals and challenges 876
3. Process frameworks and concepts 881
4. Trends in technologies and tools 894
5. Research activities 899
6. Service provisioning in practice and operations 903
7. Summary 909
8. Glossary 910
Acknowledgements 913
References 913
Chapter 7.4 IT Service Management 916
1. Terminology 917
2. Introduction to IT services and IT service management 917
3. Elements of service management 921
4. Phasing the implementation of service level management 934
5. Common misperceptions of service management 938
References 938
Chapter 7.5 Decision and Control Factors for IT-sourcing 940
1. Introduction 940
2. IT-sourcing 945
3. Hypothesis: the sourcing factors 950
4. Field survey: eighteen cases 954
5. Synthesis: the sourcing-factors monitor 954
6. Conclusions 956
References 957
Chapter 7.6 How do ICT Professionals Perceive Outsourcing?Factors that Influence the Successof ICT Outsourcing 958
1. Introduction 958
2. ICT outsourcing research and the ICT professional's perspective 959
3. Method 962
4. Measures 963
5. Results 964
6. Discussion 965
7. Conclusions 967
Acknowledgements 969
References 969
Part 8. Professional and Social Issues 970
Chapter 8.1 Commentary 970
References 971
Chapter 8.2 Systems Administration as a Self-Organizing System: The Professionalization of SA via Interest and Advocacy Groups 972
1. Introduction 972
2. ``Small pieces, loosely joined'' 973
3. The evolution of system administration organizations 974
4. The grain of sand becomes a pearl 974
5. Back to the future? The return of vendor-oriented communities 975
6. History in action: SAGE and LOPSA 976
7. Next steps forward 977
8. A brief timeline of SA organization history in North America 977
References 978
Chapter 8.3 Ethical, Legal and Social Aspects of Systems 980
1. Introduction 980
2. Social aspects of technology 981
3. Ethics 984
4. Professional ethics 987
5. Cyber law 996
6. Educational aspects 1004
7. Summary 1007
References 1008
Subject Index 1010

PDFPDF (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich