Details

Analytical Network and System Administration


Analytical Network and System Administration

Managing Human-Computer Networks
1. Aufl.

von: Mark Burgess

107,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 08.04.2005
ISBN/EAN: 9780470861066
Sprache: englisch
Anzahl Seiten: 384

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

Network and system administration usually refers to the skill of keeping computers and networks running properly.  But in truth, the skill needed is that of <i>managing complexity.</i>  This book describes the science behind these complex systems, independent of the actual operating systems they work on.  <p>It provides a theoretical approach to systems administration that:</p> <ul type="disc"> <li>saves time in performing common system administration tasks.</li> <li>allows safe utilization of untrained and trained help in maintaining mission-critical systems.</li> <li>allows efficient and safe centralized network administration.</li> </ul> <p><i>Managing Human-Computer Networks</i>:</p> <ul> <li>Will show how to make informed analyses and decisions about systems, how to diagnose faults and weaknesses</li> <li>Gives advice/guidance as to how to determine optimal policies for system management</li> <li>Includes exercises that illustrate the key points of the book</li> </ul> <p>The book provides a unique approach to an old problem and will become a classic for researchers and graduate students in Networking and Computer Science, as well as practicing system managers and system administrators.</p>
<p>Foreword xi</p> <p>Preface xiv</p> <p><b>1 Introduction 1</b></p> <p>1.1 What is system administration? 1</p> <p>1.2 What is a system? 2</p> <p>1.3 What is administration? 2</p> <p>1.4 Studying systems 3</p> <p>1.5 What’s in a theory? 6</p> <p>1.6 How to use the text 10</p> <p>1.7 Some notation used 10</p> <p><b>2 Science and its methods 13</b></p> <p>2.1 The aim of science 13</p> <p>2.2 Causality, superposition and dependency 16</p> <p>2.3 Controversies and philosophies of science 17</p> <p>2.4 Technology 20</p> <p>2.5 Hypotheses 20</p> <p>2.6 The science of technology 21</p> <p>2.7 Evaluating a system—dependencies 22</p> <p>2.8 Abuses of science 22</p> <p><b>3 Experiment and observation 25</b></p> <p>3.1 Data plots and time series 26</p> <p>3.2 Constancy of environment during measurement 27</p> <p>3.3 Experimental design 28</p> <p>3.4 Stochastic (random) variables 29</p> <p>3.5 Actual values or characteristic values 30</p> <p>3.6 Observational errors 30</p> <p>3.7 The mean and standard deviation 31</p> <p>3.8 Probability distributions and measurement 32</p> <p>3.8.1 Scatter and jitter 35</p> <p>3.8.2 The ‘normal’ distribution 35</p> <p>3.8.3 Standard error of the mean 36</p> <p>3.8.4 Other distributions 37</p> <p>3.9 Uncertainty in general formulae 38</p> <p>3.10 Fourier analysis and periodic behaviour 39</p> <p>3.11 Local averaging procedures 41</p> <p>3.12 Reminder 43</p> <p><b>4 Simple systems 45</b></p> <p>4.1 The concept of a system 45</p> <p>4.2 Data structures and processes 46</p> <p>4.3 Representation of variables 47</p> <p>4.4 The simplest dynamical systems 48</p> <p>4.5 More complex systems 49</p> <p>4.6 Freedoms and constraints 50</p> <p>4.7 Symmetries 51</p> <p>4.8 Algorithms, protocols and standard ‘methods’ 52</p> <p>4.9 Currencies and value systems 53</p> <p>4.9.1 Energy and power 53</p> <p>4.9.2 Money 54</p> <p>4.9.3 Social currency and the notion of responsibility 54</p> <p>4.10 Open and closed systems: the environment 56</p> <p>4.11 Reliable and unreliable systems 58</p> <p><b>5 Sets, states and logic 59</b></p> <p>5.1 Sets 59</p> <p>5.2 A system as a set of sets 61</p> <p>5.3 Addresses and mappings 61</p> <p>5.4 Chains and states 62</p> <p>5.5 Configurations and macrostates 64</p> <p>5.6 Continuum approximation 65</p> <p>5.7 Theory of computation and machine language 65</p> <p>5.7.1 Automata or State Machines 66</p> <p>5.7.2 Operators and operands 68</p> <p>5.7.3 Pattern matching and operational grammars 69</p> <p>5.7.4 Pathway analysis and distributed algorithms 70</p> <p>5.8 A policy-defined state 71</p> <p><b>6 Diagrammatical representations 73</b></p> <p>6.1 Diagrams as systems 73</p> <p>6.2 The concept of a graph 74</p> <p>6.3 Connectivity 77</p> <p>6.4 Centrality: maxima and minima in graphs 77</p> <p>6.5 Ranking in directed graphs 80</p> <p>6.6 Applied diagrammatical methods 84</p> <p><b>7 System variables 91</b></p> <p>7.1 Information systems 91</p> <p>7.2 Addresses, labels, keys and other resource locators 92</p> <p>7.3 Continuous relationships 94</p> <p>7.4 Digital comparison 94</p> <p><b>8 Change in systems 97</b></p> <p>8.1 Renditions of change 97</p> <p>8.2 Determinism and predictability 98</p> <p>8.3 Oscillations and fluctuations 99</p> <p>8.4 Rate of change 102</p> <p>8.5 Applications of the continuum approximation 103</p> <p>8.6 Uncertainty in the continuum approximation 105</p> <p><b>9 Information 109</b></p> <p>9.1 What is information? 109</p> <p>9.2 Transmission 110</p> <p>9.3 Informationandcontrol 111</p> <p>9.4 Classification and resolution 111</p> <p>9.5 Statistical uncertainty and entropy 114</p> <p>9.6 Propertiesoftheentropy 118</p> <p>9.7 Uncertainty in communication 119</p> <p>9.8 A geometrical interpretation of information 123</p> <p>9.9 Compressibility and size of information 127</p> <p>9.10 Information and state 128</p> <p>9.11 Maximum entropy principle 129</p> <p>9.12 Fluctuation spectra. 133</p> <p><b>10 Stability 135</b></p> <p>10.1 Basic notions 135</p> <p>10.2 Types of stability 135</p> <p>10.3 Constancy 136</p> <p>10.4 Convergence of behaviour 137</p> <p>10.5 Maxima and minima 138</p> <p>10.6 Regions of stability in a graph 139</p> <p>10.7 Graph stability under random node removal 141</p> <p>10.8 Dynamical equilibria: compromise 142</p> <p>10.9 Statistical stability 143</p> <p>10.10 Scaling stability 145</p> <p>10.11 Maximum entropy distributions 148</p> <p>10.12 Eigenstates 148</p> <p>10.13 Fixed points of maps 151</p> <p>10.14 Metastable alternatives and adaptability 155</p> <p>10.15 Final remarks 156</p> <p><b>11 Resource networks 159</b></p> <p>11.1 What is a system resource? 159</p> <p>11.2 Representation of resources 160</p> <p>11.3 Resource currency relationships 161</p> <p>11.4 Resource allocation, consumption and conservation 162</p> <p>11.5 Where to attach resources? 163</p> <p>11.6 Access to resources 165</p> <p>11.7 Methods of resource allocation 167</p> <p>11.7.1 Logical regions of systems 167</p> <p>11.7.2 Using centrality to identify resource bottlenecks 168</p> <p>11.8 Directed resources: flow asymmetries 170</p> <p><b>12 Task management and services 173</b></p> <p>12.1 Task list scheduling 173</p> <p>12.2 Deterministic and non-deterministic schedules 174</p> <p>12.3 Human–computer scheduling 176</p> <p>12.4 Service provision and policy 176</p> <p>12.5 Queue processing 177</p> <p>12.6 Models 178</p> <p>12.7 The prototype queue M/M/ 1 179</p> <p>12.8 Queue relationships or basic ‘laws’ 181</p> <p>12.9 Expediting tasks with multiple servers M/M/k 186</p> <p>12.10 Maximum entropy input events in periodic systems 188</p> <p>12.11 Miscellaneous issues in scheduling 189</p> <p><b>13 System architectures 191</b></p> <p>13.1 Policy for organization 191</p> <p>13.2 Informative and procedural flows 192</p> <p>13.3 Structured systems and ad hoc systems 193</p> <p>13.4 Dependence policy 193</p> <p>13.5 System design strategy 195</p> <p>13.6 Event-driven systems and functional systems 200</p> <p>13.7 The organization of human resources 201</p> <p>13.8 Principle of minimal dependency 202</p> <p>13.9 Decision-making within a system 202</p> <p>13.9.1 Layered systems: Managers and workers 202</p> <p>13.9.2 Efficiency 203</p> <p>13.10 Prediction, verification and their limitations 204</p> <p>13.11 Graphical methods 205</p> <p><b>14 System normalization 207</b></p> <p>14.1 Dependency 207</p> <p>14.2 The database model 209</p> <p>14.3 Normalized forms 210</p> <p><b>15 System integrity 215</b></p> <p>15.1 System administration as communication? 215</p> <p>15.2 Extensive or strategic instruction 219</p> <p>15.3 Stochastic semi-groups and martingales 223</p> <p>15.4 Characterizing probable or average error 224</p> <p>15.5 Correcting errors of propagation 226</p> <p>15.6 Gaussian continuum approximation formula 228</p> <p><b>16 Policy and maintenance 231</b></p> <p>16.1 What is maintenance? 231</p> <p>16.2 Average changes in configuration 231</p> <p>16.3 The reason for random fluctuations 234</p> <p>16.4 Huge fluctuations 235</p> <p>16.5 Equivalent configurations and policy 236</p> <p>16.6 Policy 237</p> <p>16.7 Convergent maintenance 237</p> <p>16.8 The maintenance theorem 240</p> <p>16.9 Theory of back-up and error correction 241</p> <p><b>17 Knowledge, learning and training 249</b></p> <p>17.1 Information and knowledge 250</p> <p>17.2 Knowledgeasclassification 250</p> <p>17.3 Bayes’ theorem 252</p> <p>17.4 Belief versus truth 254</p> <p>17.5 Decisions based on expert knowledge 255</p> <p>17.6 Knowledge out of date 259</p> <p>17.7 Convergence of the learning process 260</p> <p><b>18 Policy transgressions and fault modelling 263</b></p> <p>18.1 Faults and failures 263</p> <p>18.2 Deterministic system approximation 265</p> <p>18.3 Stochasticsystemmodels 269</p> <p>18.4 Approximate information flow reliability 273</p> <p>18.5 Fault correction by monitoring and instruction 275</p> <p>18.6 Policy maintenance architectures 279</p> <p>18.7 Diagnostic cause trees 286</p> <p>18.8 Probabilistic fault trees 290</p> <p>18.8.1 Faults 290</p> <p>18.8.2 Conditions and set logic 291</p> <p>18.8.3 Construction 293</p> <p><b>19 Decision and strategy 295</b></p> <p>19.1 Causal analysis 295</p> <p>19.2 Decision-making 296</p> <p>19.3 Game theory 297</p> <p>19.4 The strategic form of a game 301</p> <p>19.5 The extensive form of a game 302</p> <p>19.6 Solving zero-sum games 303</p> <p>19.7 Dominated strategies 304</p> <p>19.8 Nash equilibria 305</p> <p>19.9 A security game 309</p> <p>19.9.1 Zero-sum approximation 310</p> <p>19.9.2 Non-zero sum approximation 313</p> <p>19.10 The garbage collection game 315</p> <p>19.11 A social engineering game 321</p> <p>19.12 Human elements of policy decision 328</p> <p>19.13 Coda: extensive versus strategic configuration management 328</p> <p><b>20 Conclusions 331</b></p> <p><b>A Some Boolean formulae 335</b></p> <p>A.1 Conditional probability 335</p> <p>A.2 Boolean algebra and logic 336</p> <p><b>B Statistical and scaling properties of time-series data 339</b></p> <p>B. 1 Local averaging procedure 339</p> <p>B. 2 Scaling and self-similarity 343</p> <p>B. 3 Scaling of continuous functions 344</p> <p><b>C Percolation conditions 347</b></p> <p>C. 1 Random graph condition 347</p> <p>C. 2 Bi-partite form 350</p> <p>C. 3 Small-graph corrections 351</p> <p>Bibliography 353</p> <p>Index 359</p>
<p><strong>Mark Burgess</strong> is an Associate Professor at University College in Oslo, Norway,
"?a landmark book in the field of network and system administration. For the first time, in one place, one can study the components of network and system administration as an evolving and emerging discipline and science, rather than a set of recipes, practices, or principles." From the Foreword by Dr Alva Couch, Tufts University, USA <p>"Mark Burgess' new book brings an analytical, scientific approach to bear on the general subject of systems and network administration. This original perspective opens up a wealth of ideas and possibilities which will be of interest to both the researcher and advanced practitioner in systems administration." Professor Paul Anderson, University of Edinburgh, UK</p> <p>Network and systems administration usually refers to the skill of keeping computers and networks running properly. But in truth, the skill needed is that of managing complexity - to save time performing common system administration tasks, to allow safe use of untrained and trained help in maintaining mission-critical systems and to enable efficient centralized network administration.</p> <p>Mark Burgess describes the science behind these complex systems, independent of the operating systems they work on. Rather than viewing the subject traditionally as a set of recipes for success or communications technologies for monitoring, Analytical Network and System Administration:</p> <ul> <li>provides models and theoretical tools for analysing the resources, efficiency and security of human-computer systems.</li> <li>gives advice and guidance on how to determine optimal policies for system administration.</li> <li>employs probabilistic rather than Boolean methods.</li> <li>illustrates key points with examples and exercises.</li> </ul> The essence of this book concedes the complexity of human-computer systems and urges readers to make the best of it. Although it tackles many complicated issues, the book offers a lightweight overview, suitable for graduate students and researchers in Networking and Computer Science. Its unique approach to an old problem will also appeal to practicing system managers and administrators. <p>"An unusual book about system administration in that it describes the theory which relates the components - computers and networks to the users and administrators. It is the only book I know that covers the 'science' underpinning systems administration." Professor Morris Sloman, Imperial College London, UK</p>

Diese Produkte könnten Sie auch interessieren:

Digital Communications with Emphasis on Data Modems
Digital Communications with Emphasis on Data Modems
von: Richard W. Middlestead
PDF ebook
171,99 €
Shaping Light in Nonlinear Optical Fibers
Shaping Light in Nonlinear Optical Fibers
von: Sonia Boscolo, Christophe Finot
PDF ebook
127,99 €
Digital Communications with Emphasis on Data Modems
Digital Communications with Emphasis on Data Modems
von: Richard W. Middlestead
EPUB ebook
171,99 €