|
[1] Zhou, W. ,“Detecting and tolerating failures in a loosely integrated heterogeneous database system”, July 15, 1999,Computer Communications Volume: 22, Issue: 11, Page: 1056-1067
[2 ] King, A.; Hunt, R. ,“Protocols and architecture for managing TCP/IP network infrastructures”, September 30, 2000, Computer Communications Volume: 23, Issue: 16, Page: 1558-1572
[3] Deri, Luca; Mattei, Eugenio,” An object-oriented approach to the implementation of OSI management “, August, 1995,Computer Networks and ISDN Systems Volume: 27, Issue: 9, Page: 1367-1385
[4] Gavalas, D.; Greenwood, D.; Ghanbari, M.; O'Mahony, M., “Advanced network monitoring applications based on mobile/intelligent agent technology ” , April 1, 2000, ComputerCommunications Volume: 23, Issue: 8, Page: 720-730
[5] O. Wolfson, S. Sengupta, Y. Yemini, “Managing Communication Networks by Monitoring Databases”, 1996, IEEE Transactions on oftware Engineering.
[6] G. Jakobson, M.D. Weissman, “Alarm Correlation”, 1993, IEEE Network, Nov., page: 52-59.
[7] RFC 1155: Structure and Identification of Management Information for TCP/IP-based Internets.
[8] RFC 1157: Simple Network Management Protocol (SNMP).
[9] RFC 1213: Management Information Base for Network Management of TCP/IP-based Internets. MIB-II.
[10] Stalling W. “SNMP, SNMPv2, SNMPv3, and Rmon 1 and 2”, Addison-Wesley: Reading, MA, 1999
[11] Douglas R. Mauro & Kevin J. Schmidt, “Essential SNMP ”, O’REILLY, US , Mar, 2003
[12] Microsoft Operation Manager,Micorosoft Corporation, http://www.microsoft.com/mom
[13] Tivoli, IBM Corporation ,http://www-306.ibm.com/software/tivoli
|