Search /
Advanced search  |  Help  |  Site map
Click for Layer 8! No, really, click NOW!
Networking for Small Business
Where's my gigabit Internet, anyway?
Americans cool with lab-grown organs, but not designer babies
IE6: Retired but not dead yet
Enterprise who? Google says little about Apps, business cloud services in Q1 report
DDoS Attackers Change Techniques To Wallop Sites
Can we talk? Internet of Things vendors face a communications 'mess'
AMD's profitability streak ends at two quarters
Michaels says breach at its stores affected nearly 3M payment cards
Exclusive: Google's Project Loon tests move to LTE band in Nevada
H-1B loophole may help California utility offshore IT jobs
How a cyber cop patrols the underworld of e-commerce
For Red Hat, it's RHEL and then…?
Will the Internet of Things Become the Internet of Broken Things?
Kill switches coming to iPhone, Android, Windows devices in 2015
Israeli start-up, working with GE, out to detect Stuxnet-like attacks
Galaxy S5 deep-dive review: Long on hype, short on delivery
Google revenue jumps 19 percent but still disappoints
Windows XP's retirement turns into major security project for Chinese firm
Teen arrested in Heartbleed attack against Canadian tax site
Still deploying 11n Wi-Fi?  You might want to think again
Collaboration 2.0: Old meets new
9 Things You Need to Know Before You Store Data in the Cloud
Can Heartbleed be used in DDoS attacks?
Secure browsers offer alternatives to Chrome, IE and Firefox
Linksys WRT1900AC Wi-Fi router: Faster than anything we've tested

CIM-plifying net management

Today's breaking news
Send to a friendFeedback

etwork managers have never had an easy job, but management tools aren't helping as much as they could.

Management packages have no standard method of storing management data, critics point out. The packages don't fully take advantage of Web technology, and existing tools don't make it easy to translate business policies directly into network device configurations.

To address these complaints, vendors are putting together the Common Information Model (CIM). The CIM specification will define a standard way to represent management information. But if vendors follow through with their implementation of CIM, the model also has the potential to change the way network management is done.

Management tools could use CIM to describe all kinds of management data, including data from networks and systems. For example, a CIM database could hold information about network devices that has been gathered by using SNMP, as well as information about systems collected from the Desktop Management Interface (DMI). DMI defines PC hardware and software components in a standard fashion. This way, management tools could go to one place for all information.

Coupled with Extensible Markup Language (XML), CIM could become a way to share management data using Web technology. Add policies to it, and CIM could become a tool to set quality-of-service (QoS) levels in routers and switches throughout an enterprise.

"There are no silver bullets, but this is a step in the right direction," says Stephen Elliot, senior analyst at Cahners In-Stat Group in Newton, Mass. As companies start to merge voice onto their data networks, CIM will become more important, he says, because companies will need tools that can look at both system and network performance, as well as guarantee that voice gets the QoS level it needs.

Stealth technology

Although users will benefit from CIM, most won't see it firsthand. Because it is primarily a way for management tools to talk to each other behind the scenes, users don't know much about it.

"Our exposure to CIM is limited to the papers we've seen presented at conferences about what it looks like and how wonderful it's going to be," says Scott Parker, chief technical officer at Southernview Technologies, a Marietta, Ga., consulting firm and user of management software. "I hope it's all true, but we'll withhold judgment on it until we see what it can do."

Ironically, it will take pressure from users to get vendors to fully embrace CIM, industry watchers say. Users need to demand that their vendors share information, says Steve Joyce, vice president of marketing at Ganymede Software in Research Triangle Park, N.C., a developer of performance management software.

Without users' goading, there's not much incentive for vendors to share information, he points out. Vendors today could share data through a platform such as OpenView, but "it just turns out that not many vendors look at others' data," Joyce says.

Vendors would rather have management tools discover network information of their own products, to be on the safe side, he says. Unfortunately, this means that each tool polls the network and maintains its own database, resulting in a lot of redundant work.

Things are looking up

However, other industry watchers point to recent endorsements of CIM by Microsoft and Cisco as proof that CIM will be used heavily. In September, Cisco announced that its CiscoWorks2000 suite of management applications will exchange data with more than 20 vendors using CIM. Microsoft plans to ship a CIM object manager in Windows 2000 to act as a go-between for management applications and the operating system's management kernel.

Widespread use of CIM probably will take root about a year after Windows 2000 is released, says J.P. Corriveau, senior vice president of advanced technology at Computer Associates in Islandia, N.Y. Meanwhile, vendors likely will start to use CIM in isolated cases in conjunction with XML, he says.

Last August, the Desktop Management Task Force (DMTF) specified how to represent CIM data in an XML document. XML is a way of representing structured data, much like HTML is a way of describing a text document.

The next step for the DMTF is to specify how to get information from and put information into a CIM database using XML. The group plans to finish that specification by March.

The DMTF is also working to make policy-based management a part of CIM. The Internet Engineering Task Force and the DMTF are considering identical proposals for a standard way of describing policies, says Jim Turner, chair of the Web-Based Enterprise Management (WBEM) working group in the DMTF. No schedule has been set for standardizing the proposals, he says.

Once the standards are set, any kind of software that is responsible for enforcing policies can go to the CIM database to get information about those policies.

New order

Most established management vendors see CIM as simply a way to share data with other systems. The vendors maintain their proprietary databases but use CIM to extract data from other sources and put that data into their own databases.

But start-up Manage.Com in Santa Clara, Calif., has gone beyond that model, using a native CIM database as the foundation for its management software. As a start-up, any openness in the management area is beneficial, says Bob Quillan, the firm's vice president of marketing.

Each part of Manage.Com's product will be based on standards, Quillan says. By April the company will be making its CIM data avail-able through XML and will be using Java to create agents for any platform. "Java is mobile code, while XML is mobile data," Quillan says. "There's so much power and flexibility in that model."

Related Links

NWFusion offers more than 40 FREE technology-specific email newsletters in key network technology areas such as NSM, VPNs, Convergence, Security and more.
Click here to sign up!
New Event - WANs: Optimizing Your Network Now.
Hear from the experts about the innovations that are already starting to shake up the WAN world. Free Network World Technology Tour and Expo in Dallas, San Francisco, Washington DC, and New York.
Attend FREE
Your FREE Network World subscription will also include breaking news and information on wireless, storage, infrastructure, carriers and SPs, enterprise applications, videoconferencing, plus product reviews, technology insiders, management surveys and technology updates - GET IT NOW.