Connected: An Internet Encyclopedia
4. Application of the Model

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1445
Prev: 3.3. Generating a Response
Next: 4.1. Non-Secure Minimal Agent Configuration

4. Application of the Model

4. Application of the Model

This section describes how the administrative model set forth above is applied to realize effective network management in a variety of configurations and environments. Several types of administrative configurations are identified, and an example of each is presented.


Next: 4.1. Non-Secure Minimal Agent Configuration

Connected: An Internet Encyclopedia
4. Application of the Model