ok/NM-Basics.html.

Slides:



Advertisements
Similar presentations
IT Technical Support South Nottingham College. Aims Knowledge of the Registry Discuss the tools available to support a technician Gain an understanding.
Advertisements

Steve Lewis J.D. Edwards & Company
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
IBM SMB Software Group ® ibm.com/software/smb Maintain Hardware Platform Health An IT Services Management Infrastructure Solution.
Chapter 19: Network Management Business Data Communications, 5e.
Telecommunications Management /635 Network Management.
Network Management Basics Network management requirements OSI Management Functional Areas –Network monitoring: performance, fault, accounting –Network.
Chapter 19: Network Management Business Data Communications, 4e.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Network Management Management Tools –Desirable features Management Architectures Simple Network Management Protocol.
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
Maintaining and Updating Windows Server 2008
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 14: Troubleshooting Windows Server 2003 Networks.
Guide to TCP/IP, Third Edition Chapter 11: Monitoring and Managing IP Networks.
Performance Management (Best Practices) REF: Document ID
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
 Network Management  Network Administrators Jobs  Reasons for using Network Management Systems  Analysing Network Data  Points that must be taken.
© 2001 by Prentice Hall1-1 Local Area Networks, 3rd Edition David A. Stamper Part 4: Installation and Management Chapter 12 LAN Administration: Reactive.
Network Configuration Management hite_paper0900aecd806c0d88.html.
Remote Monitoring and Desktop Management Week-7. SNMP designed for management of a limited range of devices and a limited range of functions Monitoring.
Hands-On Microsoft Windows Server 2008 Chapter 11 Server and Network Monitoring.
Network Management: Accounting and Performance Strategies - Graphically Rich Book Network Management: Accounting and Performance Strategies by Benoit Claise.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
Windows Server 2008 Chapter 11 Last Update
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
1.  TCP/IP network management model: 1. Management station 2. Management agent 3. „Management information base 4. Network management protocol 2.
Chapter 14 Network Management Business Aspects Architectures Technology.
Virtual Memory Tuning   You can improve a server’s performance by optimizing the way the paging file is used   You may want to size the paging file.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Research on cloud computing application in the peer-to-peer based video-on-demand systems Speaker : 吳靖緯 MA0G rd International Workshop.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
1. There are different assistant software tools and methods that help in managing the network in different things such as: 1. Special management programs.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
Ripple Technologies, Inc 7/98 LogCaster. Ripple Technologies, Inc 7/98 LogCaster NT Real Time System Monitoring.
Introduction: Databases and Database Users
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Network Management Presentation HP Openview Christopher Scott December 10, 2004.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Gathering Network Requirements Designing and Supporting Computer Networks – Chapter.
Event Management & ITIL V3
1 Network Monitoring Mi-Jung Choi Dept. of Computer Science KNU
Computer Emergency Notification System (CENS)
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
SNMP Simple Network Management Protocol SNMP Simple Network Management Protocol Haris Ribic.
Chapter 19: Network Management Business Data Communications, 4e.
1 Introduction to Network Management. chap 1: NMS2 Objective of this chapter Introduction to Network Management Presents a brief overview of network management.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Gathering Network Requirements Designing and Supporting Computer Networks – Chapter.
ENABLING companies to DEPLOY wireless data solutions Application Development Tools Remote Deployment and Management LAN/WAN environments.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Wireless Network Management SANDEEP. Network Management Network management is a service that employs a variety of tools, applications, and devices to.
Role Of Network IDS in Network Perimeter Defense.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 12 Chapter 14 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with.
Topic 11 Network Management. SNMPv1 This information is specific to SNMPv1. When using SNMPv1, the snmpd agent uses a simple authentication scheme to.
SQL Database Management
ITEC 275 Computer Networks – Switching, Routing, and WANs
Chapter 19: Network Management
Chapter 14 Network Management
Lec 5: SNMP Network Management
Hands-On Microsoft Windows Server 2008
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Lec 5: SNMP Network Management
PLANNING A SECURE BASELINE INSTALLATION
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

ok/NM-Basics.html

Chapter Goal  Become familiar with the basic functions of a network management system.

Introduction  This chapter describes functions common to most network-management architectures and protocols.  It also presents the five conceptual areas of management as defined by the International Organization for Standardization (ISO).

Issue to be addressed first  WHAT IS THE MAIN RESOURCE FOR THE OPERATION OF A TELCO?  DESCRIBE WHY!!! ITS NETWORK

Other important resources  Human Capital / Knowledge  Land/properties  Money  Customer database  Frequency We will, most of the sessions focus on operation  network/infrasructure Not telecom specific Radio specific

SO THE MAIN RESOURCES HAVE TO BE BEST MANAGED! WHY DO THEY HAVE TO BE MANAGED? AND HOW? VALUE? IMPORTANT? TIME? LOSS?

What Is Network Management? In some cases, it involves a solitary network consultant monitoring network activity with an outdated protocol analyzer. In other cases, network management involves a distributed database, autopolling of network devices, and high-end workstations generating real- time graphical views of network topology changes and traffic In general, network management is a service that employs a variety of tools, applications, and devices to assist human network managers in monitoring and maintaining networks. Network management means different things to different people

A Historical Perspective 1 The early 1980s saw tremendous expansion in the area of network deployment 2 As companies realized the cost benefits and productivity gains created by network technology, they began to add networks and expand existing networks almost as rapidly as new network technologies and products were 3 By the mid-1980s, certain companies were experiencing growing pains from deploying many different (and sometimes incompatible) network technologies.

A Historical Perspective 4 The problems associated with network expansion affect both day-to-day network operation management and strategic network growth planning. 5 Each new network technology requires its own set of experts 6 An urgent need arose for automated network management integrated across diverse environments. In the early 1980s, the staffing requirements alone for managing large, heterogeneous networks created a crisis for many organizations including what is typically called network capacity planning

Network Management Architecture basic structure and set of relationships End stations (managed devices), such as computer systems and other network devices, run software that enables them to send alerts when they recognize problems Upon receiving these alerts, management entities are programmed to react by executing one, several, or a group of actions operator notification, event logging, system shutdown, and automatic attempts at system repair

Network Management Architecture Management entities also can poll end stations to check the values of certain variables. Polling can be automatic or user- initiated, but agents in the managed devices respond to all polls. Agents are software modules that first compile information about the managed devices in which they reside, then store this information in a management database, and finally provide it (proactively or reactively) to management entities within network management systems (NMSs) via a network management protocol Simple Network Management Protocol (SNMP) and Common Management Information Protocol (CMIP)

A Typical Network Management Architecture Maintains Many Relationships  Management proxies are entities that provide management information on behalf of other entities.

ISO Network Management Model : FCAPS Configur ation Manage ment Accounti ng Manage ment Performa nce Manage ment Security Manage ment Fault Manage ment

Performance Management next The goal of performance management to measure and make available various aspects of network performance so that internetwork performance can be maintained at an acceptable level. Examples of performance variables (that might be provided) network throughput, user response times, line utilization.

Performance Management  Performance management involves three main steps. next First, performance data is gathered on variables of interest to network administrators. Second, the data is analyzed to determine normal (baseline) levels Finally, appropriate performance thresholds are determined for each important variable so that exceeding these thresholds indicates a network problem worthy of attention.

Performance Management  Management entities continually monitor performance variables. next When a performance threshold is exceeded, an alert is generated and sent to the network management system. REACTIVE SYSTEM

Performance Management next Performance management also permits proactive methods: For example, network simulation can be used to project how network growth will affect performance metrics. Such simulation can alert administrators to impending problems so that counteractive measures can be taken.

Configuration Management next The goal of configuration management to monitor network and system configuration information so that the effects on network operation of various versions of hardware and software elements can be tracked and managed.

Configuration Management  Each network device has a variety of version information associated with it. next An engineering workstation, for example, may be configured as follows: Operating system, Version 3.2 Ethernet interface, Version 5.4 TCP/IP software, Version 2.0 NetWare software, Version 4.1 NFS software, Version 5.1 Serial communications controller, Version 1.1 X.25 software, Version 1.0 SNMP software, Version 3.1

Configuration Management next DATABASE Configuration management subsystems store configuration information in a database for easy access. DATA RETRIEVE When a problem occurs, this database can be searched for clues that may help solve the problem.

Accounting Management next The goal of accounting management is to measure network utilization parameters so that individual or group uses on the network can be regulated appropriately Such regulation minimizes network problems and maximizes the fairness of network access across all users. because network resources can be apportioned based on resource capacities

Accounting Management next First, First step toward appropriate accounting management is to measure utilization of all important network resources. Second, Analysis of the results provides insight into current usage patterns, and usage quotas can be set at this point. Some correction, of course, will be required to reach optimal access practices. Finally, From this point, ongoing measurement of resource use can yield billing information as well as information used to assess continued fair and optimal resource utilization.

Fault Management next The goal of fault management detect, log, notify users of, and (to the extent possible) automatically fix network problems to keep the network running effectively. Because faults can cause downtime or unacceptable network degradation, fault management is perhaps the most widely implemented of the ISO network management elements.

Fault Management  Fault management involves first. next First, determining symptoms and isolating the problem Second, Then the problem is fixed and the solution is tested on all-important subsystems Finally, The detection and resolution of the problem is recorded.

Security Management next The goal of security management to control access to network resources according to local guidelines so that the network cannot be sabotaged (intentionally or unintentionally) and sensitive information cannot be accessed by those without appropriate authorization. example A security management subsystem can monitor users logging on to a network resource and can refuse access to those who enter inappropriate access codes.

Security Management .. next Security management subsystems work by partitioning network resources into authorized and unauthorized areas. For some users, access to any network resource is inappropriate, mostly because such users are usually company outsiders. For other (internal) network users, access to information originating from a particular department is inappropriate. Access to Human Resource files, for example, is inappropriate for most users outside the Human Resources department

Security Management next Security management subsystems perform several functions. They identify sensitive network resources (including systems, files, and other entities) and determine mappings between sensitive network resources and user sets. They also monitor access points to sensitive network resources and log inappropriate access to sensitive network resources

NEXT WEEK READING ASSIGNMENT  READ ACCOUNTING MANAGEMENT PARTS OF THE BOOK :  Network Management: Accounting and Performance Strategies, by Benoit Claise - CCIE No. 2686; Ralf Wolter  Publisher: Cisco Press  Pub Date: June 20, 2007  Print ISBN-10:  Print ISBN-13:  Pages: 672