SlideShare a Scribd company logo
1 of 32
Network Management and
Administration
By Usman Cheema
Govt. Islamia College Civil Lines, Lahore.
Network Management
 Definition:-
Network management is a discipline that deals with operations,
management and monitoring voice and data on network.
Network Management contains five functional areas :-
1) Configuration management
2) Fault management
3) Performance management
4) Accounting management
5) Security management
Network Management
Case history of Network Management:-
Network management is more than just managing a network .Network
management is also referred to as operations administration,
maintenance and provisioning. Each organization has his own network
engineer to deal with network. Even some organization has number of
specialists of networks to manage their larger networks. The main
purpose of managing network is to provide services to customer and
every organization did not want to compromise on customer services
because they are important assets of their earning. We discus here
some case histories of network management that gives us an idea of
how network specialist deals with network in different situation.
Network Management
Case history of Network Management:-
Following are case histories of Network Management:-
1) Importance of topology
2) Centrally managed network issues
3) Transaction delay in client server network
4) Service impact in End-to-End service of customer
5) Some common network problems.
Network Management
Case history of Network Management:-
1) Importance of topology :-
Each corporate network contains several minicomputers and
about 100 desktop workstation. Sometime network goes down without
any apparent reason all user in company start claiming about network
failure so here the problem arise. In this way we have to check whole
network topology being used and check whether the wire connected
properly. If you did not use a proper topology then it will be very
difficult for you to find reason of network failure it means that
topology is very important for network management operations.
Network Management
Case history of Network Management:-
2) Centrally managed network issue:-
Centrally managed network are
the networks in which we centralize our resources on network. It is
most common e.g. Sharing a printer on network it centrally managed
network there is a DC (Domain controller) that provide login services
to all clients connected with it. For e.g. an organization has thousands
of user login through DC. If DC crash due to some reason then we
single user can login on computer here is a problem occurred how can
user performs their tasks on computers. This problem is solved by
configuring an ADC (Additional Domain Controller) in network when DC
crashes then ADC start services to user without any problem.
Network Management
Case history of Network Management:-
2) Centrally managed network issue:-
Network Management
Case history of Network Management:-
3) Transaction delay in client server network :-
In current nation and global enterprise
organizations application server provide services to thousands of client. Most
common example is banking system where every day thousands of people make
transaction and sometime transaction delay due to load on application server and
this delay problem is solved by adding more servers in networks.
4) Service impact in End-to-End service customer:-
End-to-End services means identify the customer
problem before customer complaints .for e.g. in an optical fiber transport network
that carries thousands of channels, a failure of single component affects service of
hundreds of customer. An End-to-End services break down is to be traced to failure
of single or multiple network elements by finding root cause of failure.
Network Management
Case history of Network Management:-
5) Some common network problems :-
The most common and serious problem in network are
connectivity failure and are handled under the fault management. Fault is generally
interpreted as failure in accessing network and system by users. Network failure
may occur due to physical problem like wire cut, not connected properly, NIC
adapter failure etc. network problem also occur due to load on network for
example sending heavy traffic on low bandwidth channel. Some logical problem may
also cause network failure like IP and MAC address of machines in the network
conflict IP's is also most common problem. All these kind of problem are the
responsibilities of network engineer. Some time when no problem is identified by
network engineer after a lot of attempts then he has only one option left that is
on/off machines.
Network Management
GOALS OF NETWORK MANAGEMENT:-
Following are the goals of network management:
Network Provisioning: - Network provisioning is the first goal of
network management. Network provisioning mean planning and
designing of networks, before implementing network we first plan
network and then start designing network.
Network Operations :- After network provisioning that deals with
network planning and design we start different operation on network
to find failure to configure properly ,make it efficient and secure we
performs network operation like fault management, performance
management, configuration management and security management .
Network Maintenance :- In the network maintenance all equipment
and configuration setting are maintained and improve time-to-time
because networks are not fixed they are growing day by day so be
careful to add new network in existing networks through maintenance
Network Management
NETWORK MANAGEMENT MODELS :-
The OSI network model is an ISO standard and is almost complete of all the model .It is well
structured and addresses all aspect of management. OSI network management model
comprise of four models, each model has its own specifications.
1) Organization model:
The organizational model describe the components of network system their
functions and their infrastructure. It defines term object, agent and manager network
elements like hub, switch, router, bridge etc. They can be classified into managed and
unmanaged object, The managed object have a management process running in them
called an agent while in unmanaged object have no management process is running. For
e.g. if you buy managed hub you don't need to configure it but if you buy unmanaged hub
then you need to configure it before use. No agent (management process) in running in
unmanaged objects. The manager manages the managed objects there is a data base in
manager but not in agent. The manager queries and receive information from agent
about management data and store in its data base called MDB (management database) in
two tier model, there is only one manager and one agent and MDB while in three tier
model there is an intermediate layer acts as both agent and manager. This layer query
information as a manger and store it is MDB and as an agent forward this information to
upper managers.
Network Management
Organization model:
Two Tier Model
Network Management
Organization model:
Three Tier Model
Network Management
2) Information model:
Information model deals with the structure and management of
information. information model contain SMI (structure of management
information) and MIB (management information base).SMI describes how
management information is structured and MIB deals with storages of
management information, SMI deals with structure of information which is
easy to understand and MIB perform storing operation on this information,
MIB used by both manager and agent MIB associated with agent called
"Agent MIB "and MIB associated with manager called "manager MIB" The
manager MIB contain information of whole network while agent MIB
contain only local information of agent, manager has both MDB and MIB
it is important to distinguish between MDB and MIB. MDB is a real data
base and contain the real measured value while MIB is virtual database
and contain the information necessary for process to change information.
For e.g. a hub is added in network information about hub ports and other
information of hub parameter are stored in MIB while the actual value like
'16'ports is stored in MDB.
Network Management
3) Communication model:
we have learnt that information is exchanged between
agent and manager but we don't deals how this information will be
exchanged so communication model deals how information will be
exchanged between agent and manager, Three aspects need to be
addressed in the communication of information between two
entities like .
i) Transport medium of message exchange
ii) message format of communication
iii) Actual message
Network Management
4) Functional model: functional model consist of five model
i) Fault management
ii) Configuration management
iii) Performance management
iv) Accounting management
v) Security management
Fault management model deals with detection and isolation of the
problem causing the failure in the network configuration
management address the setting and changing the configuration of
network object, performance management is connected with the
performance behavior of network. Security management deals with
securing network from external attacks, Accounting management
deals with costing the network equipment’s.
Network Management
SNMP: - Simple Network Management Protocol:
The responsibility of network administrator is to collect accurate
information about whole network and server infrastructure. There
are large number of options and tool available for gathering
information about whole network and SNMP is one of them most
widely used tool SNMP is a protocol is implemented on the
application layer of the networking layers.
The protocol was created as a way of gathering information from
different networks in a constant manner there are different
versions of SNMP protocol the most widely used version is SNMPv1
but it is in secure means that SNMPv1 is not secure. SNMPv3 is more
advanced version providing secure environment SNMP mainly
contain devices like SNMP agent and SNMP manager. SNMP agent is
programs that can gather information about network organize it in
to predefine entries and respond to SNMP protocol.
Network Management
SNMP: - Simple Network Management Protocol:
The responsibility of network administrator is to collect accurate
information about whole network and server infrastructure. There
are large number of options and tool available for gathering
information about whole network and SNMP is one of them most
widely used tool SNMP is a protocol is implemented on the
application layer of the networking layers.
The protocol was created as a way of gathering information from
different networks in a constant manner there are different
versions of SNMP protocol the most widely used version is SNMPv1
but it is in secure means that SNMPv1 is not secure. SNMPv3 is more
advanced version providing secure environment SNMP mainly
contain devices like SNMP agent and SNMP manager. SNMP agent is
programs that can gather information about network organize it in
to predefine entries and respond to SNMP protocol.
Network Management
SNMP: - Simple Network Management Protocol:
SNMP manager query information from agent, all the information
stored in MIB (management information base) by SNMP agent, each
information stored in MIB contain a unique OID (object identifier)
through SNMP manager Query information.
Network Management
SNMP protocol commands:
Following are some command used in SNMP protocol to manage
information’s.
GET: ‘Get’ command is sent by a manager to an agent to request the
value of specific information, this request answered that is sent back to
the manager.
GET NEXT: ‘Get next’ command allow manager to request the next
sequential information in MIB, this is a way in which you don’t worry
about structure of MIB.
Set: ’Set’ command is used by a manager to an agent in order to
change the value of information in MIB; it is also called write options
defined by protocol.
Get Bulk: ‘Get bulk’ command is to use by manager to get multiple
get next request.
Response: Response command is use by an agent to send information
to manager.
Network Management
SNMP protocol commands:
Trap: ‘Trap’ command is sent by an agent to manager to inform
manager about what event to happening on their networking
devices.
Inform: To confirm the receipt of trap, manager send ‘inform’
command to an agent.
Network Management
SNMP Versions:-
SNMPv1: This is first version of SNMP which is not secure.
SNMPv2: This is revised protocol which include enhancement of
SNMPv1 in areas of protocol packet types, MIB structure, it is
also not secure.
SNMPv3: SNMPv3 is secure version of SNMP there is no functional
differences between different versions of SNMP, it provides
authentication, authorization, privacy security services.
SNMP Proxy Server: SNMP proxy server is implemented as a front
end module to the SNMPv2 manager for communication with
SNMPv1 agent. SNMPv2 manager can not directly communicate
with SNMPv1 agent so proxy server is as intermediate between
SNMPv2 manager and SNMPv1 agent. SNMP proxy server perform
same sort of conversions so that communication become easier
between different versions of SNMP manager and agent.
Network Management
SNMP Proxy Server:-
Network Management
NETWORK MANAGEMENT TOOLS:
Different network management tools are available in
operating system for managing network and you can also add some
other tools can be categories into three major monitoring tools.
1) Status Monitoring tools:
Network Management
2) Traffic Monitoring Tools:
Network Management
3) Route Monitoring Tools:
Network Management
Public IP: Public IP provide access to internet, any computer having public IP
can get access to internet, it means that public IP can be accessed by anyone in
the world public IP provide communication over WAN (wide area network)
IANA(Internet Assigned Number Authority) provide following public IP
.
Class A = 1-----------126
Class B = 128--------191
Class C = 192--------223
Class D = 224--------239
Class E = 240--------254
Private IP: Different organization use private IP addresses to make their
private networks private IP can’t be accessed anyone outside the private network.
Private IP’S are used to make LAN in different organization like school and
different companies, for providing secure environment to organizations IANA give
private IP ranges which can be used by different organization to make their
network secure. Following are ranges of private IP address provided by IANA.
10.0.0.0---------------------------------10.255.255.255
172.16.0.0------------------------------172.31.255.255
192.168.0.0----------------------------192.168.255.255
Network Management
ACCESS LISTS (Acls): Access lists (Acls) are basically a set of commands group
together by a name or number that is used to filter traffic entering or leaving
interface.
I) Standard Access lists: Standard access list is simple; it filters packets on
the bases of source and destination address of packet. You can permit or deny
traffic on the bases of source and destination address.
II) Extended Access lists: An extended access list is more powerful than a
standard access list because extended access list filter packets on the source
address port number, protocols, destination address and other parameters.
Network Management
Network Management
RMON (Remote Monitoring):
RMON is a process of remotely monitoring and managing
information between agent and manager, the device which is used
for remote monitoring is called monitor or “Probe”; a monitor or
Probe is devices that perform monitoring operation on whole
network, there may be multiple Probes in a network depend up on
the size of a network. The main goal of remote monitoring devices
is “proactively monitoring” it means that remote monitoring
devices always check whole network events like packet size, error
rate, failure, traffic over network so when there is any possibility of
occurring any kind of error remote monitoring devices start
diagnosing the problem and solve it before any issue occurred,
there are different RMON version working at different layers of
network.
Network Management
RMON1: RMON1 standard is focused at layer2 (Data link layer) and
provide link layer statistics on a variety of ways, it also generate
alarms when threshold are crossed, it also has the ability to filter
packets on network .Following are the components of RMON1.
Statistics group: it contains the statistics of RMON devices means
that statistics group contains measurements of all problems
monitored by RMON devices.
History group: The history group contains periodical records of data
from different types of network media.
Alarm group: Alarm group is responsible for generating alarms when
any event in network cross threshold.
Host group: The host group contains the information of all hosts in
a network like their IP, MAC addresses.
Filter group: Filter group perform packet filtering operations on
packets moving in a network.
Event group: The event group controls the generation and
notification of events from different devices on network.
Network Management
Web Based Management:
Web based management means different
networking devices like hubs, switches, routers, wireless access points can be
accessed by using an embedded web based interface which allow users to manage
any devices from anywhere on the network through a standard browser such as
Netscape, Navigator or Microsoft internet explorer. The web browser acts as a
universal access tool and can communicate directly with the device using HTTP
protocol.

More Related Content

Similar to 343492490-Network-Management-and-Administration.pptx

Chapter 20.pdf
Chapter 20.pdfChapter 20.pdf
Chapter 20.pdfidrissaeed
 
Network management
Network managementNetwork management
Network managementElena Benson
 
Functions and features network management
Functions and features network managementFunctions and features network management
Functions and features network managementFlightcase1
 
Network management
Network managementNetwork management
Network managementsangusajjan
 
Multi agent based network monitoring and management using jade
Multi agent based network monitoring and management using jadeMulti agent based network monitoring and management using jade
Multi agent based network monitoring and management using jadeAlexander Decker
 
Network management aa
Network management  aaNetwork management  aa
Network management aaDhani Ahmad
 
A novel resource efficient dmms approach for network monitoring and controlli...
A novel resource efficient dmms approach for network monitoring and controlli...A novel resource efficient dmms approach for network monitoring and controlli...
A novel resource efficient dmms approach for network monitoring and controlli...ijwmn
 
Localization & management of sensor networks
Localization & management of sensor networksLocalization & management of sensor networks
Localization & management of sensor networksRushin Shah
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management ProtocolAnupomShill
 
Widyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementWidyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementDjadja Sardjana
 
Domain partitioned element management systems employing mobile agents for dis...
Domain partitioned element management systems employing mobile agents for dis...Domain partitioned element management systems employing mobile agents for dis...
Domain partitioned element management systems employing mobile agents for dis...IJCNCJournal
 
Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...IJNSA Journal
 
SDN Federation White Paper
SDN Federation White PaperSDN Federation White Paper
SDN Federation White PaperBrian Hedstrom
 
Network Management
Network ManagementNetwork Management
Network Managementazura787
 
Unified networkmanagement final
Unified networkmanagement finalUnified networkmanagement final
Unified networkmanagement finalMohamad El Charif
 
Network Mnagement for WSN
Network Mnagement for WSNNetwork Mnagement for WSN
Network Mnagement for WSN@zenafaris91
 
Diseño de red isp cisco
Diseño de red isp ciscoDiseño de red isp cisco
Diseño de red isp ciscoJheyson Ayala
 
(Snmp) simple network management protocol
(Snmp)   simple network management protocol(Snmp)   simple network management protocol
(Snmp) simple network management protocolGouasmia Zakaria
 

Similar to 343492490-Network-Management-and-Administration.pptx (20)

Chapter 20.pdf
Chapter 20.pdfChapter 20.pdf
Chapter 20.pdf
 
Network management
Network managementNetwork management
Network management
 
Functions and features network management
Functions and features network managementFunctions and features network management
Functions and features network management
 
Network management
Network managementNetwork management
Network management
 
Multi agent based network monitoring and management using jade
Multi agent based network monitoring and management using jadeMulti agent based network monitoring and management using jade
Multi agent based network monitoring and management using jade
 
Network management aa
Network management  aaNetwork management  aa
Network management aa
 
A novel resource efficient dmms approach for network monitoring and controlli...
A novel resource efficient dmms approach for network monitoring and controlli...A novel resource efficient dmms approach for network monitoring and controlli...
A novel resource efficient dmms approach for network monitoring and controlli...
 
Localization & management of sensor networks
Localization & management of sensor networksLocalization & management of sensor networks
Localization & management of sensor networks
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
Widyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementWidyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-management
 
Domain partitioned element management systems employing mobile agents for dis...
Domain partitioned element management systems employing mobile agents for dis...Domain partitioned element management systems employing mobile agents for dis...
Domain partitioned element management systems employing mobile agents for dis...
 
Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...
 
SDN Federation White Paper
SDN Federation White PaperSDN Federation White Paper
SDN Federation White Paper
 
Network Management
Network ManagementNetwork Management
Network Management
 
Unified networkmanagement final
Unified networkmanagement finalUnified networkmanagement final
Unified networkmanagement final
 
Network Mnagement for WSN
Network Mnagement for WSNNetwork Mnagement for WSN
Network Mnagement for WSN
 
Diseño de red isp cisco
Diseño de red isp ciscoDiseño de red isp cisco
Diseño de red isp cisco
 
En35793797
En35793797En35793797
En35793797
 
Network management
Network management Network management
Network management
 
(Snmp) simple network management protocol
(Snmp)   simple network management protocol(Snmp)   simple network management protocol
(Snmp) simple network management protocol
 

Recently uploaded

247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 

343492490-Network-Management-and-Administration.pptx

  • 1. Network Management and Administration By Usman Cheema Govt. Islamia College Civil Lines, Lahore.
  • 2. Network Management  Definition:- Network management is a discipline that deals with operations, management and monitoring voice and data on network. Network Management contains five functional areas :- 1) Configuration management 2) Fault management 3) Performance management 4) Accounting management 5) Security management
  • 3. Network Management Case history of Network Management:- Network management is more than just managing a network .Network management is also referred to as operations administration, maintenance and provisioning. Each organization has his own network engineer to deal with network. Even some organization has number of specialists of networks to manage their larger networks. The main purpose of managing network is to provide services to customer and every organization did not want to compromise on customer services because they are important assets of their earning. We discus here some case histories of network management that gives us an idea of how network specialist deals with network in different situation.
  • 4. Network Management Case history of Network Management:- Following are case histories of Network Management:- 1) Importance of topology 2) Centrally managed network issues 3) Transaction delay in client server network 4) Service impact in End-to-End service of customer 5) Some common network problems.
  • 5. Network Management Case history of Network Management:- 1) Importance of topology :- Each corporate network contains several minicomputers and about 100 desktop workstation. Sometime network goes down without any apparent reason all user in company start claiming about network failure so here the problem arise. In this way we have to check whole network topology being used and check whether the wire connected properly. If you did not use a proper topology then it will be very difficult for you to find reason of network failure it means that topology is very important for network management operations.
  • 6. Network Management Case history of Network Management:- 2) Centrally managed network issue:- Centrally managed network are the networks in which we centralize our resources on network. It is most common e.g. Sharing a printer on network it centrally managed network there is a DC (Domain controller) that provide login services to all clients connected with it. For e.g. an organization has thousands of user login through DC. If DC crash due to some reason then we single user can login on computer here is a problem occurred how can user performs their tasks on computers. This problem is solved by configuring an ADC (Additional Domain Controller) in network when DC crashes then ADC start services to user without any problem.
  • 7. Network Management Case history of Network Management:- 2) Centrally managed network issue:-
  • 8. Network Management Case history of Network Management:- 3) Transaction delay in client server network :- In current nation and global enterprise organizations application server provide services to thousands of client. Most common example is banking system where every day thousands of people make transaction and sometime transaction delay due to load on application server and this delay problem is solved by adding more servers in networks. 4) Service impact in End-to-End service customer:- End-to-End services means identify the customer problem before customer complaints .for e.g. in an optical fiber transport network that carries thousands of channels, a failure of single component affects service of hundreds of customer. An End-to-End services break down is to be traced to failure of single or multiple network elements by finding root cause of failure.
  • 9. Network Management Case history of Network Management:- 5) Some common network problems :- The most common and serious problem in network are connectivity failure and are handled under the fault management. Fault is generally interpreted as failure in accessing network and system by users. Network failure may occur due to physical problem like wire cut, not connected properly, NIC adapter failure etc. network problem also occur due to load on network for example sending heavy traffic on low bandwidth channel. Some logical problem may also cause network failure like IP and MAC address of machines in the network conflict IP's is also most common problem. All these kind of problem are the responsibilities of network engineer. Some time when no problem is identified by network engineer after a lot of attempts then he has only one option left that is on/off machines.
  • 10. Network Management GOALS OF NETWORK MANAGEMENT:- Following are the goals of network management: Network Provisioning: - Network provisioning is the first goal of network management. Network provisioning mean planning and designing of networks, before implementing network we first plan network and then start designing network. Network Operations :- After network provisioning that deals with network planning and design we start different operation on network to find failure to configure properly ,make it efficient and secure we performs network operation like fault management, performance management, configuration management and security management . Network Maintenance :- In the network maintenance all equipment and configuration setting are maintained and improve time-to-time because networks are not fixed they are growing day by day so be careful to add new network in existing networks through maintenance
  • 11. Network Management NETWORK MANAGEMENT MODELS :- The OSI network model is an ISO standard and is almost complete of all the model .It is well structured and addresses all aspect of management. OSI network management model comprise of four models, each model has its own specifications. 1) Organization model: The organizational model describe the components of network system their functions and their infrastructure. It defines term object, agent and manager network elements like hub, switch, router, bridge etc. They can be classified into managed and unmanaged object, The managed object have a management process running in them called an agent while in unmanaged object have no management process is running. For e.g. if you buy managed hub you don't need to configure it but if you buy unmanaged hub then you need to configure it before use. No agent (management process) in running in unmanaged objects. The manager manages the managed objects there is a data base in manager but not in agent. The manager queries and receive information from agent about management data and store in its data base called MDB (management database) in two tier model, there is only one manager and one agent and MDB while in three tier model there is an intermediate layer acts as both agent and manager. This layer query information as a manger and store it is MDB and as an agent forward this information to upper managers.
  • 14. Network Management 2) Information model: Information model deals with the structure and management of information. information model contain SMI (structure of management information) and MIB (management information base).SMI describes how management information is structured and MIB deals with storages of management information, SMI deals with structure of information which is easy to understand and MIB perform storing operation on this information, MIB used by both manager and agent MIB associated with agent called "Agent MIB "and MIB associated with manager called "manager MIB" The manager MIB contain information of whole network while agent MIB contain only local information of agent, manager has both MDB and MIB it is important to distinguish between MDB and MIB. MDB is a real data base and contain the real measured value while MIB is virtual database and contain the information necessary for process to change information. For e.g. a hub is added in network information about hub ports and other information of hub parameter are stored in MIB while the actual value like '16'ports is stored in MDB.
  • 15. Network Management 3) Communication model: we have learnt that information is exchanged between agent and manager but we don't deals how this information will be exchanged so communication model deals how information will be exchanged between agent and manager, Three aspects need to be addressed in the communication of information between two entities like . i) Transport medium of message exchange ii) message format of communication iii) Actual message
  • 16. Network Management 4) Functional model: functional model consist of five model i) Fault management ii) Configuration management iii) Performance management iv) Accounting management v) Security management Fault management model deals with detection and isolation of the problem causing the failure in the network configuration management address the setting and changing the configuration of network object, performance management is connected with the performance behavior of network. Security management deals with securing network from external attacks, Accounting management deals with costing the network equipment’s.
  • 17. Network Management SNMP: - Simple Network Management Protocol: The responsibility of network administrator is to collect accurate information about whole network and server infrastructure. There are large number of options and tool available for gathering information about whole network and SNMP is one of them most widely used tool SNMP is a protocol is implemented on the application layer of the networking layers. The protocol was created as a way of gathering information from different networks in a constant manner there are different versions of SNMP protocol the most widely used version is SNMPv1 but it is in secure means that SNMPv1 is not secure. SNMPv3 is more advanced version providing secure environment SNMP mainly contain devices like SNMP agent and SNMP manager. SNMP agent is programs that can gather information about network organize it in to predefine entries and respond to SNMP protocol.
  • 18. Network Management SNMP: - Simple Network Management Protocol: The responsibility of network administrator is to collect accurate information about whole network and server infrastructure. There are large number of options and tool available for gathering information about whole network and SNMP is one of them most widely used tool SNMP is a protocol is implemented on the application layer of the networking layers. The protocol was created as a way of gathering information from different networks in a constant manner there are different versions of SNMP protocol the most widely used version is SNMPv1 but it is in secure means that SNMPv1 is not secure. SNMPv3 is more advanced version providing secure environment SNMP mainly contain devices like SNMP agent and SNMP manager. SNMP agent is programs that can gather information about network organize it in to predefine entries and respond to SNMP protocol.
  • 19. Network Management SNMP: - Simple Network Management Protocol: SNMP manager query information from agent, all the information stored in MIB (management information base) by SNMP agent, each information stored in MIB contain a unique OID (object identifier) through SNMP manager Query information.
  • 20. Network Management SNMP protocol commands: Following are some command used in SNMP protocol to manage information’s. GET: ‘Get’ command is sent by a manager to an agent to request the value of specific information, this request answered that is sent back to the manager. GET NEXT: ‘Get next’ command allow manager to request the next sequential information in MIB, this is a way in which you don’t worry about structure of MIB. Set: ’Set’ command is used by a manager to an agent in order to change the value of information in MIB; it is also called write options defined by protocol. Get Bulk: ‘Get bulk’ command is to use by manager to get multiple get next request. Response: Response command is use by an agent to send information to manager.
  • 21. Network Management SNMP protocol commands: Trap: ‘Trap’ command is sent by an agent to manager to inform manager about what event to happening on their networking devices. Inform: To confirm the receipt of trap, manager send ‘inform’ command to an agent.
  • 22. Network Management SNMP Versions:- SNMPv1: This is first version of SNMP which is not secure. SNMPv2: This is revised protocol which include enhancement of SNMPv1 in areas of protocol packet types, MIB structure, it is also not secure. SNMPv3: SNMPv3 is secure version of SNMP there is no functional differences between different versions of SNMP, it provides authentication, authorization, privacy security services. SNMP Proxy Server: SNMP proxy server is implemented as a front end module to the SNMPv2 manager for communication with SNMPv1 agent. SNMPv2 manager can not directly communicate with SNMPv1 agent so proxy server is as intermediate between SNMPv2 manager and SNMPv1 agent. SNMP proxy server perform same sort of conversions so that communication become easier between different versions of SNMP manager and agent.
  • 24. Network Management NETWORK MANAGEMENT TOOLS: Different network management tools are available in operating system for managing network and you can also add some other tools can be categories into three major monitoring tools. 1) Status Monitoring tools:
  • 25. Network Management 2) Traffic Monitoring Tools:
  • 26. Network Management 3) Route Monitoring Tools:
  • 27. Network Management Public IP: Public IP provide access to internet, any computer having public IP can get access to internet, it means that public IP can be accessed by anyone in the world public IP provide communication over WAN (wide area network) IANA(Internet Assigned Number Authority) provide following public IP . Class A = 1-----------126 Class B = 128--------191 Class C = 192--------223 Class D = 224--------239 Class E = 240--------254 Private IP: Different organization use private IP addresses to make their private networks private IP can’t be accessed anyone outside the private network. Private IP’S are used to make LAN in different organization like school and different companies, for providing secure environment to organizations IANA give private IP ranges which can be used by different organization to make their network secure. Following are ranges of private IP address provided by IANA. 10.0.0.0---------------------------------10.255.255.255 172.16.0.0------------------------------172.31.255.255 192.168.0.0----------------------------192.168.255.255
  • 28. Network Management ACCESS LISTS (Acls): Access lists (Acls) are basically a set of commands group together by a name or number that is used to filter traffic entering or leaving interface. I) Standard Access lists: Standard access list is simple; it filters packets on the bases of source and destination address of packet. You can permit or deny traffic on the bases of source and destination address. II) Extended Access lists: An extended access list is more powerful than a standard access list because extended access list filter packets on the source address port number, protocols, destination address and other parameters.
  • 30. Network Management RMON (Remote Monitoring): RMON is a process of remotely monitoring and managing information between agent and manager, the device which is used for remote monitoring is called monitor or “Probe”; a monitor or Probe is devices that perform monitoring operation on whole network, there may be multiple Probes in a network depend up on the size of a network. The main goal of remote monitoring devices is “proactively monitoring” it means that remote monitoring devices always check whole network events like packet size, error rate, failure, traffic over network so when there is any possibility of occurring any kind of error remote monitoring devices start diagnosing the problem and solve it before any issue occurred, there are different RMON version working at different layers of network.
  • 31. Network Management RMON1: RMON1 standard is focused at layer2 (Data link layer) and provide link layer statistics on a variety of ways, it also generate alarms when threshold are crossed, it also has the ability to filter packets on network .Following are the components of RMON1. Statistics group: it contains the statistics of RMON devices means that statistics group contains measurements of all problems monitored by RMON devices. History group: The history group contains periodical records of data from different types of network media. Alarm group: Alarm group is responsible for generating alarms when any event in network cross threshold. Host group: The host group contains the information of all hosts in a network like their IP, MAC addresses. Filter group: Filter group perform packet filtering operations on packets moving in a network. Event group: The event group controls the generation and notification of events from different devices on network.
  • 32. Network Management Web Based Management: Web based management means different networking devices like hubs, switches, routers, wireless access points can be accessed by using an embedded web based interface which allow users to manage any devices from anywhere on the network through a standard browser such as Netscape, Navigator or Microsoft internet explorer. The web browser acts as a universal access tool and can communicate directly with the device using HTTP protocol.