Accounting Management IACT 918 April 2005 Glenn Bewsell/Gene Awyzio SITACS University of Wollongong.

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

Telecommunications Management /635 Network Management.
Cisco 2 - Routers Perrine. J Page 14/30/2015 Chapter 10 TCP/IP Protocol Suite The function of the TCP/IP protocol stack is to transfer information from.
OSI MODEL Maninder Kaur
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
Design Requirements IACT424/924 Corporate Network Design and Implementation.
Performance Measurement and Management IACT 418 IACT 918 Corporate Network Planning.
SNMP IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Parking Space Finder Lucia Wiguno Thursday, April
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Fault Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Configuration Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Network Design and Implementation IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Configuration Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Internet Traffic Analysis for Threat Detection Joshua Thomas, CISSP Thomas Conley, CISSP Ohio University Communication Network Services Joshua Thomas,
A Guide to major network components
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
LAN/WAN Optimization Techniques. Agenda Current Traffic Current Traffic Equipment Inventory and Forecasted Growth Equipment Inventory and Forecasted Growth.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
CH 13 Server and Network Monitoring. Hands-On Microsoft Windows Server Objectives Understand the importance of server monitoring Monitor server.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Windows Server 2008 Chapter 11 Last Update
Internet Traffic Management Prafull Suryawanshi Roll No - 04IT6008.
Chapter 2  Overview of Network Management 1 Chapter 2 Overview  Why is network mgmt necessary?  Network managers job  Network management vocabulary.
1.  TCP/IP network management model: 1. Management station 2. Management agent 3. „Management information base 4. Network management protocol 2.
1 Kyung Hee University Prof. Choong Seon HONG Network Monitoring.
Chapter 4: Managing LAN Traffic
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 12: Routing.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
VLAN Trunking Protocol (VTP)
1. There are different assistant software tools and methods that help in managing the network in different things such as: 1. Special management programs.
BAI513 - PROTOCOLS SNMP BAIST – Network Management.
11 SYSTEM PERFORMANCE IN WINDOWS XP Chapter 12. Chapter 12: System Performance in Windows XP2 SYSTEM PERFORMANCE IN WINDOWS XP  Optimize Microsoft Windows.
Vantage Report 3.0 Product Sales Guide
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Monitoring Windows Server 2012
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
1 CHAPTER 8 TELECOMMUNICATIONSANDNETWORKS. 2 TELECOMMUNICATIONS Telecommunications: Communication of all types of information, including digital data,
PARKING -SMS REVERSE ENTERPRISES PARK SMS. What is SMS Parking How the System Operates The Technology Conclusion The Benefits The System.
MODULE I NETWORKING CONCEPTS.
Module 4: Configuring and Troubleshooting DHCP
Chapter 13: LAN Maintenance. Documentation Document your LAN so that you have a record of equipment location and configuration. Documentation should include.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
VirtuCo :: Authentication and Billing ::. VirtuCo v©v© Authentication schemes –Public key –Username and password –Combination –Additional possibilities.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Page 12/9/2016 Chapter 10 Intermediate TCP : TCP and UDP segments, Transport Layer Ports CCNA2 Chapter 10.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
計量管理 (Accounting Management) 陳彥錚 (Yen-Cheng Chen)
SQL Server 2012 Session: 1 Session: 4 SQL Azure Data Management Using Microsoft SQL Server.
Cisco Router Technology. Overview Topics :- Overview of cisco Overview of cisco Introduction of Router Introduction of Router How Router Works How Router.
PART1 Data collection methodology and NM paradigms 1.
Performance Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
Monitoring Windows Server 2012
Lec 5: SNMP Network Management
Configuring and Troubleshooting DHCP
Printer Admin Print Job Manager
Net 431: ADVANCED COMPUTER NETWORKS
Firewalls Routers, Switches, Hubs VPNs
Lec 5: SNMP Network Management
Cloud computing mechanisms
Computer communications
Chapter 15: Network Monitoring and Tuning
Network and the internet
Presentation transcript:

Accounting Management IACT 918 April 2005 Glenn Bewsell/Gene Awyzio SITACS University of Wollongong

2 Overview Accounting Management is the process of –Gathering data about the utilisation of network resources –Setting usage quotas using metrics –Billing users for their use of the network –Using collected network statistics to assist in resource allocation

3 Benefits of the Accounting Management Process Enables the measurement and reporting of billing information for individuals and groups This information can be used to –Bill those users –Allocate resources –Compute the cost of transmitting data across the network Billing users is essential in recovering costs of building and maintaining network

4 Benefits of the Accounting Management Process Accounting management assists in ensuring that distribution of charges is fair –Quotas and metrics can be used to ensure users have sufficient resources to do jobs Usage information can be used to –Decide when to install new equipment –Allocate time on a time share computer –Determine the cost-effectiveness of technologies

5 Accomplishing Accounting Management Accounting Management consists of the following steps –Gathering data about the utilisation of network resources –Setting usage quotas using metrics –Billing users for their use of the network –Using collected network statistics to assist in resource allocation

6 Gathering Data Time frame for data collection will depend upon storage capacity of devices Information to be gathered includes –Number of total transactions –Total number of bytes or packets sent and received This data can be collected by –Querying activity logs on individual hosts –Gathering traffic counters off bridges, switches or routers

7 Setting Usage Quotas Using Metrics Metrics can be used to –Learn to what extent users network resources As part of Accounting management you need to –Decide which resources to measure –Collect metrics about their use RFC 1272 discusses metrics and setting quotas Metrics work with quotas to help ensure each user gets a “fair share” of network resources –Going ‘over quota’ could be used to deny access to a resource –Increase bill if over quota

8 Billing Users for Their Use of the Network Users are often billed for –One-time installations and monthly fees Accounting management NOT required –Fee based on amount of resources used Requires stats on user network installation The following criteria can be used individually or in combination –Total number of transactions –Total packets –Total bytes

9 Billing Users for Their Use of the Network Total number of transactions data can be used to –Determine number of logins to compute server –Connections made from cluster controller – s sent –Remote login sessions established –This data cannot differentiate between large and small VOLUMES

10 Billing Users for Their Use of the Network Total packets data can be used to –Reflects network usage –Applications that send small packets are billed at a higher rate than those that send LARGE packets

11 Billing Users for Their Use of the Network Total bytes –Overcomes many drawbacks of first two methods –Generally users are billed for data received from the network –Drawbacks may include Users are billed for acknowledgement packets Unsolicited data adds to the users bill Users may be billed for management data –These drawbacks can be negated by using statistical analysis to subtract known data quantities from bill

12 Accounting Management on a Network Management System Simple tool –Monitor for metrics that exceed quotas –Report ONLY that data –Store data and calculate quotas More complex tool –Enable network engineer to perform billing and determine WHERE to poll for billing Advanced tool –Should be able to forecast need for network resources –Assist in metric establishment –Help users predict their billing costs

13 Reporting Accounting Information Can be in the form of –Real-time messages Current value of a metric –Text reports Historical accounting and billing information Network statistics Trend predictions Reports for users (Bills)