Download presentation
Presentation is loading. Please wait.
1
Network & System Management
Lecture 8: Network & System Management By: Adal ALashban
2
What is Network Management?
Goal: To ensure that the users of a network receive the IT services with the quality of service (QoS) that they expect. - Network management includes the deployment, integration and coordination of the hardware, software, and human elements to monitor, test, configure, analyze, evaluate, and control the network and element resources to meet the real-time, operational performance, and Quality of Service requirements at a reasonable cost.
3
Top-Down View of NM Functions
4
NM Functional Requirements
Fault Management detection, isolation and correction of abnormal operations. 2. Configuration Management identify managed resources and their connectivity, discovery. 3. Accounting Management keep track of usage for charging. 4. Performance Management monitor and evaluate the behavior of managed resources. 5. Security Management allow only authorized access and control. FCAPS
5
1. Fault Management Manages network problems to keep the network running reliably and efficiently.. Fault management process involves the following steps: Detecting the problem symptoms. Isolating the problem. Fixing the problem automatically (if possible) or manually. Logging the detection and resolution of the problem.
6
2. Configuration Management
Configuration Management monitors network and system configuration information and stores it in a configuration management database. The maintenance of this database allows network administrators to track hardware, software, and other network resources.
7
2. Configuration Management (cont.)
Each network device has a variety of information associated with it: Software version information for the operating system, protocol software, or management software. Hardware version information for the interfaces or hardware controllers. Contact information indicating who to contact if problems with the device arise. Location information indicating the physical location of the device.
8
2. Configuration Management (cont.)
CM Information Associated with a Managed Device.
9
3. Accounting Management
Measures network utilization parameters in order to regulate individual and group uses of the network. Minimizes network problems and maximizes fairness of user access to the network because network resources can be portioned based on network capacity and user needs.
10
4. Performance Management
Maintains internetwork performance at acceptable levels by measuring and managing various network performance variables. Performance variables include network throughput, user response times, line utilization, and others. Performance management involves three basic steps: Gathering data relating to key performance variables. Analyzing data to determine the normal (baseline) performance levels. Determining appropriate performance levels for each variable so that exceeding these levels indicates a network problem worthy of attention.
11
4. Performance Management (cont.)
100 80 60 40 20 10 Last 3.000 Average 16.154 Minimum 63.000 Maximum 2.000 Duration 1:40 Color Scale Counter Instance Parent Object Computer 1.000 - - - \\LONDON Processor Process PhysicalDisk Memory FTP Service % Processor Time % Disk Time Page/sec Bytes Received/sec _Total explorer 0 C: D: Default FTP Site Performance Console Window Help Action View Favorites Tree Favorites Console Root System Monitor Performance Logs and Alerts
12
4. Performance Management (cont.)
Reactive: When performance becomes unacceptable (that is, a user-defined threshold is exceeded), the managed device reacts by sending an alert to the network management system (NMS). Reactive PM Components: The management entity continually monitors performance variables in managed devices. When a particular performance threshold is exceeded, the NMS or the managed device detects the problem. If the managed device detects the problem, it generates an alert and sends it to the NMS. The NMS takes an appropriate action, such as alerting the network administrator.
13
4. Performance Management (cont.)
Proactive: Simulation is used to project how network growth will affect performance metrics. These simulations alert administrators to impending problems before they affect network users.
14
Windows Task Manager Windows Task Manager
File Options View Windows Help Applications Processes Performance Task Status Building Schematic - Paint Memo to Supervisor - WordPad Calculator My Computer Running End Task Switch To New Task... Processes: 30 CPU Usage: 2% Mem Usage: K / K Windows Task Manager File Options View Help Processes: 30 CPU Usage: 6% Mem Usage: K / K Applications Processes Performance Image Name PID CPU CPU Time Mem Usage System Idle Process System smss.exe csrss.exe winlogon.exe services.exe lsass .exe svchost .exe spoolsv .exe mspaint .exe msdtc .exe inojobsv .exe dfssvc .exe ismserv .exe llssrv .exe ntfrs.exe regsvc.exe 8 168 196 220 148 160 472 492 624 704 808 824 840 864 880 928 968 96 00 02 4:52:37 0:00:27 0:00:00 0:00:20 0:00:09 0:00:14 0:00:32 0:00:04 0:07:46 0:00:01 16 K 212 K 344 K 1,820 K 4,408 K 8,228 K 15,768 K 2,648 K 4,184 K 352 K 3,428 K 5,704 K 2,336 K 3,416 K 5,348 K 3,860 K 1,108 K 844 K Show processes from all users End Process Windows Task Manager File Options View Help Applications Processes Performance Processes: 30 CPU Usage: 3% Mem Usage: K / K CPU Usage MEM Usage CPU Usage History Memory Usage History Totals Commit Charge (K) Physical Memory (K) Kernel Memory (K) 3% K Handles Threads Total Limit Peak Available System Cache Paged Nonpaged 5932 381 30 130612 27740 50704 101600 310892 116896 22804 15704 7100
15
5. Security Management Access control:
Controls access to network resources, and prevents network sabotage (intentional or unintentional) and unauthorized access to sensitive information. Aids administrators in creating a secure network environment. This includes: partitioning network resources into authorized and unauthorized areas, mapping groups of users to those areas, and monitoring, policing, and logging user access to resources in those areas. Security monitoring: Security event collection. Event analysis, correlation and alert generation. Alert handling.
16
Network Management Systems
- A network management system (NMS) is a collection of tools for network monitoring and control based on the manager-agent paradigm. - NMS typically provides a GUI through which most or all management tasks can be performed. - Many commercial and freely available NMSs exist: 1. Commercial: HP OpenView, IBM NetView, Sun Net Manager, Cisco works and etc. 2. Open source: OpenNMS , Nagios and etc.
17
Standard Management Frameworks
1. Internet Network Management Framework (IETF) SNMPv1 SNMPv2 SNMPv3 2. OSI Network Management Framework (ISO/ITU-T) CMIP (X.700 Series) 3. Telecommunication Management Network (ITU-T) TMN (M.3000 Series)
18
Standard Management Frameworks (cont.)
4. Distributed Management Task Force (DMTF) DMI, CIM, WBEM 5. TeleManagement Forum MTNM, eTOM, and etc.
19
Introduction to Cloud OS & Computing
Lecture 9: Introduction to Cloud OS & Computing By: Adal ALashban
20
What is Cloud Computing?
- Cloud Computing is a general term used to describe a new class of network based computing that takes place over the Internet. - A collection/group of integrated and networked hardware, software and Internet infrastructure (called a platform). - Using the Internet for communication and transport provides hardware, software and networking services to clients. - These platforms hide the complexity and details of the underlying infrastructure from users and applications by providing very simple graphical interface or API (Applications Programming Interface).
21
What is Cloud Computing?
- In addition, the platform provides on demand services, that are always on, anywhere, anytime and any place. - Pay for use and as needed, elastic scale up and down in capacity and functionalities. - The hardware and software services are available to general public, enterprises, corporations and businesses markets.
22
What is Cloud Computing?
- Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. - Cloud computing customers do not own the physical infrastructure. - Cloud computing users avoid capital expenditure (CapEx) on hardware, software, and services when they pay a provider only for what they use. - Low shared infrastructure and costs, low management overhead, and immediate access to a broad range of applications. - Shared pool of configurable computing resources. - On-demand network access. - Provisioned by the Service Provider.
23
Cloud Summary - Cloud computing is an umbrella term used to refer to Internet based development and services. - A number of characteristics define cloud data, applications services and infrastructure: Remotely hosted: Services or data are hosted on remote infrastructure. Ubiquitous: Services or data are available from anywhere. Commoditized: The result is a utility computing model similar to traditional that of traditional utilities.
24
Cloud Service Models and layers
25
Software as a Service (SaaS)
- SaaS is a model of software deployment where an application is hosted as a service provided to customers across the Internet. The benefits of SaaS You can sign up and rapidly start using innovative business apps Apps and data are accessible from any connected computer No data is lost if your computer breaks, as data is in the cloud The service is able to dynamically scale to usage needs
26
Platform as a service (PaaS)
Platform as a service provides a cloud-based environment with everything required to support the complete lifecycle of building and delivering web-based (cloud) applications — without the cost and complexity of buying and managing the underlying hardware, software, provisioning, and hosting. The benefits of PaaS Develop applications and get to market faster Deploy new web applications to the cloud in minutes Reduce complexity with middleware as a service Created By Dr.Najla AlNabhan edited by Maysoon AlDuwais
27
Infrastructure as a service (IaaS)
Infrastructure as a service provides companies with computing resources including servers, networking, storage, and data center space on a pay-per-use basis. The benefits of IaaS No need to invest in your own hardware Infrastructure scales on demand to support dynamic workloads Flexible, innovative services available on demand Created By Dr.Najla AlNabhan edited by Maysoon AlDuwais
28
Advantages of Cloud Computing
Lower computer costs: You do not need a high-powered and high-priced computer to run cloud computing web-based applications. Improved performance: With few large programs hogging your computer's memory, you will see better performance from your PC. Reduced software costs: Instead of purchasing expensive software applications, you can get most of what you need for free-ish!
29
Advantages of Cloud Computing
Instant software updates: Another advantage to cloud computing is that you are no longer faced with choosing between obsolete software and high upgrade costs. Improved document format compatibility: You do not have to worry about the documents you create on your machine being compatible with other users' applications or Oses. Unlimited storage capacity: Cloud computing offers virtually limitless storage.
30
Advantages of Cloud Computing
Increased data reliability: Unlike desktop computing, in which if a hard disk crashes and destroy all your valuable data, a computer crashing in the cloud should not affect the storage of your data. Universal document access: That is not a problem with cloud computing, because you do not take your documents with you. Latest version availability: When you edit a document at home, that edited version is what you see when you access the document at work.
31
Advantages of Cloud Computing
Easier group collaboration: Sharing documents leads directly to better collaboration. Many users do this as it is an important advantages of cloud computing. Device independence: You are no longer tethered to a single computer or network. Changes to computers, applications and documents follow you through the cloud. Move to a portable device, and your applications and documents are still available. .
32
Disadvantages of Cloud Computing
Requires a constant Internet connection: Cloud computing is impossible if you cannot connect to the Internet. A dead Internet connection means no work and in areas where Internet connections are few or inherently unreliable, this could be a deal-breaker. Does not work well with low-speed connections: Similarly, a low-speed Internet connection, such as that found with dial-up services, makes cloud computing painful at best and often impossible.
33
Disadvantages of Cloud Computing
Can be slow: Even with a fast connection, web-based applications can sometimes be slower than accessing a similar software program on your desktop PC. Stored data might not be secure: With cloud computing, all your data is stored on the cloud. Stored data can be lost: Theoretically, data stored in the cloud is safe, replicated across multiple machines. But on the off chance that your data goes missing, you have no physical or local backup.
34
Virtualization - Virtual workspaces: -
An abstraction of an execution environment that can be made dynamically available to authorized clients by using well-defined protocols. Resource quota (e.g. CPU, memory share). Software configuration (e.g. O/S, provided services). -
35
Virtual Machines - VM technology allows multiple virtual machines to run on a single physical machine.. Performance: Para-virtualization (e.g. Xen) is very close to raw physical performance!
36
Advantages of Virtual Machines
Run operating systems where the physical hardware is unavailable. Easier to create new machines, backup machines, etc. Emulate more machines than are physically available. Timeshare lightly loaded systems on one host. Debug problems (suspend and resume the problem machine). Easy migration of virtual machines (shutdown needed or not).
37
Thank You
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.