Muutke küpsiste eelistusi

Practical Approach to WBEM/CIM Management [Pehme köide]

(QNX Software Systems, Canada)
  • Formaat: Paperback / softback, 344 pages, kõrgus x laius: 234x156 mm, kaal: 453 g
  • Ilmumisaeg: 05-Sep-2019
  • Kirjastus: CRC Press
  • ISBN-10: 0367394545
  • ISBN-13: 9780367394547
  • Formaat: Paperback / softback, 344 pages, kõrgus x laius: 234x156 mm, kaal: 453 g
  • Ilmumisaeg: 05-Sep-2019
  • Kirjastus: CRC Press
  • ISBN-10: 0367394545
  • ISBN-13: 9780367394547
System architects and engineers in fields such as storage networking, desktop computing, electrical power distribution, and telecommunications need a common and flexible way of managing heterogeneous devices and services. Web-Based Enterprise Management (WBEM) and its Component Information Model (CIM) provide the architecture, language, interfaces, and common models for the management of storage, computing, and telecommunication applications.

Now there is a practical guide for those who design or implement the emerging WBEM systems or produce a CIM model of a device or service. A Practical Approach to WBEM/CIM Management describes in detail WBEM/CIM architecture and explores the standard models developed by the Distributed Management Task Force (DMTF). It explores the interfaces with which your WBEM/CIM code will have to work, and offers examples of applicable models and related code.

This book introduces the components of WBEM architecture, defines models within CIM, and illustrates communication between the WBEM client and server. It also investigates transitioning from SNMP or proprietary systems to WBEM/CIM.

Realizing that the field is undergoing a period of massive growth and change, the author focuses primarily on the areas which have been standardized and which differ little between implementations. He does, however, provide coding examples using the openPegasus implementation, demonstrating concepts common to other C++ and Java-based implementations.
SECTION I MANAGEMENT
1 Introduction
3(4)
The Aim
3(1)
The Subject
3(1)
The Readership
3(1)
The Book
4(1)
The Moving Target
5(1)
WBEM Implementations
6(1)
The DMTF
6(1)
2 Device and Service Management
7(10)
Device and Service Management
7(6)
Frequently Asked Questions
13(4)
3 WBEM and Other Management Systems
17(16)
WBEM and CIM
17(3)
The Need for New Management Standards
20(8)
Frequently Asked Questions
28(5)
SECTION II STRUCTURE
4 The WBEM Architecture
33(14)
Overview
33(4)
Structure of the WBEM Server
37(1)
Architectural Options
38(3)
Example
41(2)
Frequently Asked Questions
43(4)
5 CIM and mof
47(40)
The Concept of a Model
47(4)
Modelling Terms
51(5)
"Is-A" and "Has-A" Relationships
56(2)
UML for CIM
58(6)
The mof Language
64(16)
Frequently Asked Questions
80(7)
6 Standard Models
87(36)
The Core and Common Models
87(1)
Versions of the Model
88(1)
The Logical/Physical Distinction
89(1)
The Core Model
90(8)
The Common Models
98(21)
Frequently Asked Questions
119(4)
SECTION III INTERFACES
7 The Client/Server Interface
123(28)
Introduction
123(2)
A Survey of the Client/Server Interface
125(1)
The Connection/Disconnection Phase
126(1)
CIM Message Transfer
127(1)
Intrinsic Methods
128(12)
Extrinsic Methods
140(2)
Authentication
142(3)
International Support
145(3)
Frequently Asked Questions
148(3)
8 The Listener Interface
151(16)
The Indication Mechanism
151(3)
Indications
154(3)
Indication Filters
157(1)
Handlers
158(2)
Subscriptions
160(1)
Listeners
160(1)
Frequently Asked Questions
161(6)
SECTION IV PRACTICE
9 Building Your Own Model
167(22)
The PBX Example
167(2)
Commercial Decisions
169(1)
Deciding What to Model
170(1)
Modelling Guidelines
171(1)
Constraints on Our Models
172(1)
Naming the Schema
172(1)
Positioning the PBX Class
173(4)
Modelling the PBX's Components
177(2)
Modelling the Statistics
179(1)
Modelling the Events
180(1)
Modelling the Services
181(3)
Adding Unnecessary Classes
184(1)
Adding Properties
184(2)
Frequently Asked Questions
186(3)
10 Modelling Tips
189(12)
Instances and Classes
189(1)
Subclassing or Defining Types
190(1)
References
191(1)
Underscores in CIM Names
192(1)
Keys
192(1)
Overrides
193(2)
CreationClassName and InstanceID
195(2)
Namespaces
197(1)
Boolean Qualifiers
198(1)
Frequently Asked Questions
198(3)
11 Writing Providers
201(10)
Types of Provider
201(7)
Provider/WBEM Server Interfacing
208(3)
12 Implementing Providers: Example
211(36)
Implementing Providers: General Steps
211(1)
The Example
211(1)
A Brief Introduction to openPegasus
212(2)
Step 1 Write and Compile the mof
214(4)
Step 2 Write the Provider Code
218(3)
Step 3 Tie the Provider Code to the PBX Class
221(2)
Invoking the Providers
223(4)
Implementing Indication Providers
227(2)
Frequently Asked Questions
229(18)
13 Writing Clients and Listeners
247(12)
What Clients Are Not
247(1)
Semantic Knowledge
248(1)
Server-Side Client Implementation
249(1)
Discovery
249(5)
Operator-Side Client Implementation
254(3)
Frequently Asked Questions
257(2)
14 Transition to WBEM/CIM
259(10)
Some Upgrade Architectures
260(5)
Some Theoretical Background
265(4)
15 Implementations and Tools
269(10)
WBEM Servers
270(3)
Tools
273(6)
16 Choosing WBEM Software
279(6)
Home Brew
279(1)
Reviewing a Bought-In Product
280(1)
Open Source
281(1)
Commercial
282(3)
SECTION V APPENDICES
A Industry Adoption
285(4)
B "Is-A" and "Has-A" Relationships
289(8)
C FCAPS
297(2)
D Miscellaneous Datatypes
299(1)
The datetime Datatype
299(1)
The string Datatype
300(1)
E The MappingStrings Qualifier
301(1)
Frequently Asked Questions
302(1)
F Installing openPegasus
303(1)
Obtaining openPegasus
303(1)
Setting Environment Variables
304(1)
Compiling openPegasus
305(1)
Loading the Repository
305(1)
Loading an Example Application
305(1)
Running the WBEM Server
305(2)
G Glossary
307(6)
H Licencing
313(2)
Index 315
Chris is a programmer at QNX Software Systems with some 40 years of software development experience. His specialty is Sufficiently Dependable Software, which is software that meets its dependability requirements with the minimum development effort and risk. In particular, he works with software for safety-critical systems that must meet the requirements of international safety standards such as IEC61508, ISO26262, EN50128 and IEC62304. Outside his professional work as a software developer, Chris is the author of several books including Flying Beyond: The Canadian Commercial Pilot Textbook and Embedded Software Development for Safety-Critical Systems.