SlideShare a Scribd company logo
1 of 28
Business Data Communications,
Fourth Edition
Chapter 11: Network
Management
Learning Objectives
• Describe the five levels of network
management described by the ISO
• List and explain the objectives of network
management
• Define the characteristics of the network
that affect user satisfaction
• Describe cost-effective network
management techniques
Chapter 11: Network Management 2
Learning Objectives
• Describe how network management
objectives are met
• Identify the effect that wireless networks
and e-commerce have on network
management
• List and explain the types of network
monitoring software
• Describe the standards used for network
management
Chapter 11: Network Management 3
Introduction
• Network managers have a complex role in the
organization
• Must manage voice and data networks, as well
as e-commerce
• Many tasks must be performed to manage the
networks
• Manager is more visible to the users/customers
• Well-defined objectives will provide good
customer service
Chapter 11: Network Management 4
Network Management and the ISO
Model
• ISO/IEC 7498-4 defines five areas for
network management
– Performance Management
• Bandwidth
• Processor & memory availability
• Network devices
– Fault Management
• Detects and responds to abnormal conditions
• Software defines normal operations of network
Chapter 11: Network Management 5
Network Management and the ISO
Model
• ISO/IEC 7498-4
– Configuration Management
• Hardware and software make-up of network
– Accounting Management
• Charges by IT to other departments for network
use
– Security Management
• Authorized use of the network
• IDs, passwords, firewalls, antivirus software, data
encryption, formal security procedures
Chapter 11: Network Management 6
Objectives of Network
Management
• User Satisfaction
– Methods used vary by application
– Performance
• Response time
• Should be consistent for each application
• Communications time
– Time on the communication line
– Processing time between client and server
• Response time affected by many events
Chapter 11: Network Management 7
Objectives of Network
Management
• User Satisfaction
– Availability
• All components available for use when needed
• Maintenance schedule should be publicized
• Mean Time Between Failures (MTBF)
• Mean Time to Repair (MTTR)
– Reliability
• Errors expected
• Stability of hardware and software
Chapter 11: Network Management 8
Objectives of Network
Management
• User Satisfaction
– Backup
• Software and hardware
• Disk mirroring – two drives, one controller
• Disk duplexing – two drives, two controllers
• Hardware backup depends on the device
Chapter 11: Network Management 9
Chapter 11: Network Management 10
Chapter 11: Network Management 11
Objectives of Network
Management
• User Satisfaction
– Network Uptime
• Patch around the problem
• Replacement
– Modems, PCs, NOT mainframes, FEPs
• Repair
– Depends on the component
– May take a few hours to a few days
Chapter 11: Network Management 12
Objectives of Network
Management
• User Satisfaction
– Information Availability
• Critical to keep users updated on events
• Scheduled downtimes
• Alternative work schedules
• Help desk
Chapter 11: Network Management 13
Objectives of Network
Management
• Cost-Effectiveness
– Prior Planning
• Key to the success of a network project
• Volume and type of data must be considered
• Plan for expansion of the network
• Buying equipment
– Buy only for current needs
– Buy for current and future needs
Chapter 11: Network Management 14
Objectives of Network
Management
• Cost-Effectiveness
– Modular Expansion
• Plan for upgrades
to equipment
• Hubs
Chapter 11: Network Management 15
Objectives of Network Management
• Cost-Effectiveness
–Equipment Expansion
• Buy new equipment for each expansion
–Relocation of Equipment
• Reuse clients and servers in other locations
Chapter 11: Network Management 16
Meeting the Objectives
• Staffing
– Skills required
• Design and configuration
• Diagnosis (Troubleshooting)
• Documentation
Chapter 11: Network Management 17
Meeting the Objectives
• Network Analysis
–Network Statistics
• Performance monitor can gather statistics
• Simulation models
• Workload generator
• Log files
• Transaction mix should be checked
• Circuit utilization can affect performance
Chapter 11: Network Management 18
Meeting the Objectives
• Network Analysis
–Network Changes
• Tuning
– Changes to the network based on the statistics
gathered
• Can change transmission speeds, buffer
sizes
• Change network configuration
Chapter 11: Network Management 19
Network Management for Wireless
Networks and e-Commerce
• Wireless Networks
– Managers must know the technology
– Videoconferencing, data archiving, data
mirroring
– Connecting PDAs and laptop computers to
the LAN
– Bandwidth, security, design issues
Chapter 11: Network Management 20
Network Management for Wireless
Networks and e-Commerce
• Network Traffic Volume
– High volume caused by e-commerce
– Corporate portal is now important to business
– May slow system response
– Bandwidth may need to be increased
– Must monitor network closely
Chapter 11: Network Management 21
Network Management for Wireless
Networks and e-Commerce
• Internet Network Monitoring Tools
– Transaction Monitoring
• End-to-end response time
• Dummy transaction created
– Network Performance Monitoring
• Service level agreements with ISP
– Live-visitor site monitoring
– Human-response monitoring
Chapter 11: Network Management 22
General Network Monitoring
Tools
• Classes of Network Monitoring Software
– Device management software
• Monitors specific devices
– Enterprise management software
• Monitors entire system
– Application management software
• Monitors specific applications
Chapter 11: Network Management 23
General Network Monitoring
Tools
• Network Management Protocols
– Simple Network Management Protocol
(SNMP)
• Collects and reports data on network performance
• Data stored in management information base
(MIB)
• Security is a problem
• Remote monitoring (RMON) extension
– Stores data at a remote site, rather than a central server
Chapter 11: Network Management 24
General Network Monitoring
Tools
• Network Management Protocols
– Common Management Interface Protocol
(CMIP)
• ISO standard
• Newer than SNMP
• More complete monitoring information
• Better security
• Major changes needed to an SNMP system to
implement CMIP, so it has not been done
Chapter 11: Network Management 25
Summary
• Network managers responsible for both
voice and data networks, as well as e-
commerce
• ISO defines five levels of network
management
• User satisfaction is viewed in terms of
response time, equipment availability,
network reliability, and information
• Cost-effectiveness is accomplished
through prior planning
Chapter 11: Network Management 26
Summary
• Staffing and network analysis can be used to
achieve the network managers goals
• Network tuning is used to improve performance
• Network performance for wireless and e-
commerce applications is now needed
• Network monitoring tools allow the manager to
keep track of how the network is performing
• SNMP was originally used, CMIP is newer
Chapter 11: Network Management 27
Chapter 11 Complete

More Related Content

What's hot

Network management
Network managementNetwork management
Network managementMohd Arif
 
Network Virtualization
Network VirtualizationNetwork Virtualization
Network VirtualizationKingston Smiler
 
Network Function Virtualization : Infrastructure Overview
Network Function Virtualization : Infrastructure OverviewNetwork Function Virtualization : Infrastructure Overview
Network Function Virtualization : Infrastructure Overviewsidneel
 
08. networking
08. networking08. networking
08. networkingMuhammad Ahad
 
Implementation levels of virtualization
Implementation levels of virtualizationImplementation levels of virtualization
Implementation levels of virtualizationGokulnath S
 
Query processing strategies in distributed database
Query processing strategies in distributed databaseQuery processing strategies in distributed database
Query processing strategies in distributed databaseShreerajKhatiwada
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Securitylalithambiga kamaraj
 
Lecture 6
Lecture  6Lecture  6
Lecture 6Mr SMAK
 
Network management ppt
Network management pptNetwork management ppt
Network management pptDheerajPachauri
 
Operating System : Ch14.tertiary storage structure
Operating System : Ch14.tertiary storage structureOperating System : Ch14.tertiary storage structure
Operating System : Ch14.tertiary storage structureSyaiful Ahdan
 
IPv4 Addressing Architecture
IPv4 Addressing ArchitectureIPv4 Addressing Architecture
IPv4 Addressing ArchitectureShreehari Dhat
 
Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonIpv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonShailesh Pachori
 

What's hot (20)

Network management
Network managementNetwork management
Network management
 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Distributed Computing ppt
 
Network Virtualization
Network VirtualizationNetwork Virtualization
Network Virtualization
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
 
Network Function Virtualization : Infrastructure Overview
Network Function Virtualization : Infrastructure OverviewNetwork Function Virtualization : Infrastructure Overview
Network Function Virtualization : Infrastructure Overview
 
08. networking
08. networking08. networking
08. networking
 
Implementation levels of virtualization
Implementation levels of virtualizationImplementation levels of virtualization
Implementation levels of virtualization
 
Routing
RoutingRouting
Routing
 
Query processing strategies in distributed database
Query processing strategies in distributed databaseQuery processing strategies in distributed database
Query processing strategies in distributed database
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
IPv6
IPv6IPv6
IPv6
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Lecture 6
Lecture  6Lecture  6
Lecture 6
 
DHCP
DHCPDHCP
DHCP
 
Network management ppt
Network management pptNetwork management ppt
Network management ppt
 
Operating System : Ch14.tertiary storage structure
Operating System : Ch14.tertiary storage structureOperating System : Ch14.tertiary storage structure
Operating System : Ch14.tertiary storage structure
 
IPv4 Addressing Architecture
IPv4 Addressing ArchitectureIPv4 Addressing Architecture
IPv4 Addressing Architecture
 
IIS
IISIIS
IIS
 
Ipv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparisonIpv4 vs Ipv6 comparison
Ipv4 vs Ipv6 comparison
 
Underlying principles of parallel and distributed computing
Underlying principles of parallel and distributed computingUnderlying principles of parallel and distributed computing
Underlying principles of parallel and distributed computing
 

Viewers also liked

Remote Network Monitoring System
Remote Network Monitoring SystemRemote Network Monitoring System
Remote Network Monitoring SystemSidharth Goel
 
Hardware, Software, and Network Management - TCEA 2017
Hardware, Software, and Network Management - TCEA 2017Hardware, Software, and Network Management - TCEA 2017
Hardware, Software, and Network Management - TCEA 2017Diana Benner
 
Network Management
Network ManagementNetwork Management
Network Managementazura787
 
Network Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the BasicsNetwork Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the BasicsSolarWinds
 
Network Management Fundamentals
Network Management FundamentalsNetwork Management Fundamentals
Network Management FundamentalsSolarWinds
 
Distributed network security management
Distributed network security managementDistributed network security management
Distributed network security managementSwati Sinha
 
Network Monitoring Basics
Network Monitoring BasicsNetwork Monitoring Basics
Network Monitoring BasicsRob Dunn
 
Network Monitoring System and Alert System
Network Monitoring System and Alert SystemNetwork Monitoring System and Alert System
Network Monitoring System and Alert SystemSupawit Wannapila
 
Network Monitoring System
Network Monitoring SystemNetwork Monitoring System
Network Monitoring SystemRofiq Fauzi
 
Chapter07 -- wa ns and remote connectivity
Chapter07  -- wa ns and remote connectivityChapter07  -- wa ns and remote connectivity
Chapter07 -- wa ns and remote connectivityRaja Waseem Akhtar
 
Real Time Network Monitoring System
Real  Time  Network  Monitoring  SystemReal  Time  Network  Monitoring  System
Real Time Network Monitoring SystemGirish Naik
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1Zafar Ayub
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksShafaan Khaliq Bhatti
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security ApplicationsHatem Mahmoud
 

Viewers also liked (15)

Remote Network Monitoring System
Remote Network Monitoring SystemRemote Network Monitoring System
Remote Network Monitoring System
 
Hardware, Software, and Network Management - TCEA 2017
Hardware, Software, and Network Management - TCEA 2017Hardware, Software, and Network Management - TCEA 2017
Hardware, Software, and Network Management - TCEA 2017
 
Network Management
Network ManagementNetwork Management
Network Management
 
Network Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the BasicsNetwork Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the Basics
 
Network Management Fundamentals
Network Management FundamentalsNetwork Management Fundamentals
Network Management Fundamentals
 
Distributed network security management
Distributed network security managementDistributed network security management
Distributed network security management
 
Network Monitoring Basics
Network Monitoring BasicsNetwork Monitoring Basics
Network Monitoring Basics
 
Network Monitoring System and Alert System
Network Monitoring System and Alert SystemNetwork Monitoring System and Alert System
Network Monitoring System and Alert System
 
Network Monitoring System
Network Monitoring SystemNetwork Monitoring System
Network Monitoring System
 
Chapter07 -- wa ns and remote connectivity
Chapter07  -- wa ns and remote connectivityChapter07  -- wa ns and remote connectivity
Chapter07 -- wa ns and remote connectivity
 
Network monitoring system
Network monitoring systemNetwork monitoring system
Network monitoring system
 
Real Time Network Monitoring System
Real  Time  Network  Monitoring  SystemReal  Time  Network  Monitoring  System
Real Time Network Monitoring System
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security Applications
 

Similar to Network management objective

14 coms 525 tcpip - applications - snmp
14    coms 525 tcpip - applications - snmp14    coms 525 tcpip - applications - snmp
14 coms 525 tcpip - applications - snmpPalanivel Kuppusamy
 
009694598.pdf
009694598.pdf009694598.pdf
009694598.pdfEidTahir
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Conceptszaisahil
 
Management Tools Desirable features Management Architectures Simple Network ...
Management Tools  Desirable features Management Architectures Simple Network ...Management Tools  Desirable features Management Architectures Simple Network ...
Management Tools Desirable features Management Architectures Simple Network ...jeronimored
 
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11Irsandi Hasan
 
chapter10-120827115414-phpapp02.pdf
chapter10-120827115414-phpapp02.pdfchapter10-120827115414-phpapp02.pdf
chapter10-120827115414-phpapp02.pdfAxmedMaxamuud6
 
Network analysis and design unite_-i.ppt
Network analysis and design unite_-i.pptNetwork analysis and design unite_-i.ppt
Network analysis and design unite_-i.pptasaijohn
 
Tij3103 topic02 architectures
Tij3103 topic02 architecturesTij3103 topic02 architectures
Tij3103 topic02 architecturesnakomuri
 
Chapter 10 System Architecture.Information Technology Project Management pptx
Chapter 10 System Architecture.Information Technology Project Management pptxChapter 10 System Architecture.Information Technology Project Management pptx
Chapter 10 System Architecture.Information Technology Project Management pptxAxmedMaxamuudYoonis
 
Identify and Resolve Ntwork Problems.pdf
Identify and Resolve Ntwork Problems.pdfIdentify and Resolve Ntwork Problems.pdf
Identify and Resolve Ntwork Problems.pdfMeresa Hiluf`
 
CSIR 5G Research
CSIR 5G ResearchCSIR 5G Research
CSIR 5G ResearchSabelo Dlamini
 
unit1.pdf
unit1.pdfunit1.pdf
unit1.pdfidrissaeed
 
Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1WedgeB
 
High Scalability Network Monitoring for Communications Service Providers
High Scalability Network Monitoring for Communications Service ProvidersHigh Scalability Network Monitoring for Communications Service Providers
High Scalability Network Monitoring for Communications Service ProvidersCA Technologies
 
Chapter 5-IT infrastructure(REV 2.0).pptx
Chapter 5-IT infrastructure(REV 2.0).pptxChapter 5-IT infrastructure(REV 2.0).pptx
Chapter 5-IT infrastructure(REV 2.0).pptxMohdSyaifuadJasemi
 

Similar to Network management objective (20)

14 coms 525 tcpip - applications - snmp
14    coms 525 tcpip - applications - snmp14    coms 525 tcpip - applications - snmp
14 coms 525 tcpip - applications - snmp
 
009694598.pdf
009694598.pdf009694598.pdf
009694598.pdf
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Concepts
 
Lecture 1 introduction
Lecture 1   introductionLecture 1   introduction
Lecture 1 introduction
 
Management Tools Desirable features Management Architectures Simple Network ...
Management Tools  Desirable features Management Architectures Simple Network ...Management Tools  Desirable features Management Architectures Simple Network ...
Management Tools Desirable features Management Architectures Simple Network ...
 
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
Ch12
Ch12Ch12
Ch12
 
chapter10-120827115414-phpapp02.pdf
chapter10-120827115414-phpapp02.pdfchapter10-120827115414-phpapp02.pdf
chapter10-120827115414-phpapp02.pdf
 
Network analysis and design unite_-i.ppt
Network analysis and design unite_-i.pptNetwork analysis and design unite_-i.ppt
Network analysis and design unite_-i.ppt
 
Tij3103 topic02 architectures
Tij3103 topic02 architecturesTij3103 topic02 architectures
Tij3103 topic02 architectures
 
Chapter 10 System Architecture.Information Technology Project Management pptx
Chapter 10 System Architecture.Information Technology Project Management pptxChapter 10 System Architecture.Information Technology Project Management pptx
Chapter 10 System Architecture.Information Technology Project Management pptx
 
Identify and Resolve Ntwork Problems.pdf
Identify and Resolve Ntwork Problems.pdfIdentify and Resolve Ntwork Problems.pdf
Identify and Resolve Ntwork Problems.pdf
 
CSIR 5G Research
CSIR 5G ResearchCSIR 5G Research
CSIR 5G Research
 
unit1.pdf
unit1.pdfunit1.pdf
unit1.pdf
 
Chapter09
Chapter09Chapter09
Chapter09
 
Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1
 
High Scalability Network Monitoring for Communications Service Providers
High Scalability Network Monitoring for Communications Service ProvidersHigh Scalability Network Monitoring for Communications Service Providers
High Scalability Network Monitoring for Communications Service Providers
 
Chapter 5-IT infrastructure(REV 2.0).pptx
Chapter 5-IT infrastructure(REV 2.0).pptxChapter 5-IT infrastructure(REV 2.0).pptx
Chapter 5-IT infrastructure(REV 2.0).pptx
 
3-ch02.ppt
3-ch02.ppt3-ch02.ppt
3-ch02.ppt
 

More from Dhani Ahmad

Strategic planning
Strategic planningStrategic planning
Strategic planningDhani Ahmad
 
Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planningDhani Ahmad
 
Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisDhani Ahmad
 
Information system
Information systemInformation system
Information systemDhani Ahmad
 
Information resource management
Information resource managementInformation resource management
Information resource managementDhani Ahmad
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and recordsDhani Ahmad
 
Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behaviorDhani Ahmad
 
Islamic information management
Islamic information managementIslamic information management
Islamic information managementDhani Ahmad
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islamDhani Ahmad
 
The need for security
The need for securityThe need for security
The need for securityDhani Ahmad
 
The information security audit
The information security auditThe information security audit
The information security auditDhani Ahmad
 
Security technologies
Security technologiesSecurity technologies
Security technologiesDhani Ahmad
 
Security policy
Security policySecurity policy
Security policyDhani Ahmad
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnelDhani Ahmad
 
Risk management ii
Risk management iiRisk management ii
Risk management iiDhani Ahmad
 
Risk management i
Risk management iRisk management i
Risk management iDhani Ahmad
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care itDhani Ahmad
 
Physical security
Physical securityPhysical security
Physical securityDhani Ahmad
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issuesDhani Ahmad
 

More from Dhani Ahmad (20)

Strategic planning
Strategic planningStrategic planning
Strategic planning
 
Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planning
 
Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysis
 
Information system
Information systemInformation system
Information system
 
Information resource management
Information resource managementInformation resource management
Information resource management
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and records
 
Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behavior
 
Islamic information management
Islamic information managementIslamic information management
Islamic information management
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islam
 
The need for security
The need for securityThe need for security
The need for security
 
The information security audit
The information security auditThe information security audit
The information security audit
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Security policy
Security policySecurity policy
Security policy
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnel
 
Secure
SecureSecure
Secure
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
 
Risk management i
Risk management iRisk management i
Risk management i
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care it
 
Physical security
Physical securityPhysical security
Physical security
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂşjo
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Network management objective

  • 1. Business Data Communications, Fourth Edition Chapter 11: Network Management
  • 2. Learning Objectives • Describe the five levels of network management described by the ISO • List and explain the objectives of network management • Define the characteristics of the network that affect user satisfaction • Describe cost-effective network management techniques Chapter 11: Network Management 2
  • 3. Learning Objectives • Describe how network management objectives are met • Identify the effect that wireless networks and e-commerce have on network management • List and explain the types of network monitoring software • Describe the standards used for network management Chapter 11: Network Management 3
  • 4. Introduction • Network managers have a complex role in the organization • Must manage voice and data networks, as well as e-commerce • Many tasks must be performed to manage the networks • Manager is more visible to the users/customers • Well-defined objectives will provide good customer service Chapter 11: Network Management 4
  • 5. Network Management and the ISO Model • ISO/IEC 7498-4 defines five areas for network management – Performance Management • Bandwidth • Processor & memory availability • Network devices – Fault Management • Detects and responds to abnormal conditions • Software defines normal operations of network Chapter 11: Network Management 5
  • 6. Network Management and the ISO Model • ISO/IEC 7498-4 – Configuration Management • Hardware and software make-up of network – Accounting Management • Charges by IT to other departments for network use – Security Management • Authorized use of the network • IDs, passwords, firewalls, antivirus software, data encryption, formal security procedures Chapter 11: Network Management 6
  • 7. Objectives of Network Management • User Satisfaction – Methods used vary by application – Performance • Response time • Should be consistent for each application • Communications time – Time on the communication line – Processing time between client and server • Response time affected by many events Chapter 11: Network Management 7
  • 8. Objectives of Network Management • User Satisfaction – Availability • All components available for use when needed • Maintenance schedule should be publicized • Mean Time Between Failures (MTBF) • Mean Time to Repair (MTTR) – Reliability • Errors expected • Stability of hardware and software Chapter 11: Network Management 8
  • 9. Objectives of Network Management • User Satisfaction – Backup • Software and hardware • Disk mirroring – two drives, one controller • Disk duplexing – two drives, two controllers • Hardware backup depends on the device Chapter 11: Network Management 9
  • 10. Chapter 11: Network Management 10
  • 11. Chapter 11: Network Management 11
  • 12. Objectives of Network Management • User Satisfaction – Network Uptime • Patch around the problem • Replacement – Modems, PCs, NOT mainframes, FEPs • Repair – Depends on the component – May take a few hours to a few days Chapter 11: Network Management 12
  • 13. Objectives of Network Management • User Satisfaction – Information Availability • Critical to keep users updated on events • Scheduled downtimes • Alternative work schedules • Help desk Chapter 11: Network Management 13
  • 14. Objectives of Network Management • Cost-Effectiveness – Prior Planning • Key to the success of a network project • Volume and type of data must be considered • Plan for expansion of the network • Buying equipment – Buy only for current needs – Buy for current and future needs Chapter 11: Network Management 14
  • 15. Objectives of Network Management • Cost-Effectiveness – Modular Expansion • Plan for upgrades to equipment • Hubs Chapter 11: Network Management 15
  • 16. Objectives of Network Management • Cost-Effectiveness –Equipment Expansion • Buy new equipment for each expansion –Relocation of Equipment • Reuse clients and servers in other locations Chapter 11: Network Management 16
  • 17. Meeting the Objectives • Staffing – Skills required • Design and configuration • Diagnosis (Troubleshooting) • Documentation Chapter 11: Network Management 17
  • 18. Meeting the Objectives • Network Analysis –Network Statistics • Performance monitor can gather statistics • Simulation models • Workload generator • Log files • Transaction mix should be checked • Circuit utilization can affect performance Chapter 11: Network Management 18
  • 19. Meeting the Objectives • Network Analysis –Network Changes • Tuning – Changes to the network based on the statistics gathered • Can change transmission speeds, buffer sizes • Change network configuration Chapter 11: Network Management 19
  • 20. Network Management for Wireless Networks and e-Commerce • Wireless Networks – Managers must know the technology – Videoconferencing, data archiving, data mirroring – Connecting PDAs and laptop computers to the LAN – Bandwidth, security, design issues Chapter 11: Network Management 20
  • 21. Network Management for Wireless Networks and e-Commerce • Network Traffic Volume – High volume caused by e-commerce – Corporate portal is now important to business – May slow system response – Bandwidth may need to be increased – Must monitor network closely Chapter 11: Network Management 21
  • 22. Network Management for Wireless Networks and e-Commerce • Internet Network Monitoring Tools – Transaction Monitoring • End-to-end response time • Dummy transaction created – Network Performance Monitoring • Service level agreements with ISP – Live-visitor site monitoring – Human-response monitoring Chapter 11: Network Management 22
  • 23. General Network Monitoring Tools • Classes of Network Monitoring Software – Device management software • Monitors specific devices – Enterprise management software • Monitors entire system – Application management software • Monitors specific applications Chapter 11: Network Management 23
  • 24. General Network Monitoring Tools • Network Management Protocols – Simple Network Management Protocol (SNMP) • Collects and reports data on network performance • Data stored in management information base (MIB) • Security is a problem • Remote monitoring (RMON) extension – Stores data at a remote site, rather than a central server Chapter 11: Network Management 24
  • 25. General Network Monitoring Tools • Network Management Protocols – Common Management Interface Protocol (CMIP) • ISO standard • Newer than SNMP • More complete monitoring information • Better security • Major changes needed to an SNMP system to implement CMIP, so it has not been done Chapter 11: Network Management 25
  • 26. Summary • Network managers responsible for both voice and data networks, as well as e- commerce • ISO defines five levels of network management • User satisfaction is viewed in terms of response time, equipment availability, network reliability, and information • Cost-effectiveness is accomplished through prior planning Chapter 11: Network Management 26
  • 27. Summary • Staffing and network analysis can be used to achieve the network managers goals • Network tuning is used to improve performance • Network performance for wireless and e- commerce applications is now needed • Network monitoring tools allow the manager to keep track of how the network is performing • SNMP was originally used, CMIP is newer Chapter 11: Network Management 27