SlideShare a Scribd company logo
1 of 3
Cisco Network Management
Overview of Network Management
Different people may take network management as different meanings. It may be
considered as solitary network consultant for monitoring network activity using
outdated protocol analyzer. While network management in distributed database
environment, managing network nodes for generating real time graphics and auto
polling of network devices. There are number of tools and applications which are
used for network management to support network administrators to monitor and
maintain networks of all types.

In the early 1980s remarkable growth in field of network deployment was noted and
companies have found productivity and cost benefits by use of network and they
started with networks very fast as new products came into the market. In middle of
1980s specific company’s troubles were increased by the use of different network
technologies.




Network expansion troubles influence the networks day by day as networks grow
and each new network needs some experts for maintaining and troubleshooting it.
At early stages employee requirements for managing network created crisis for some
organizations.

Cisco Network Management Architecture
Basic structure is used in Cisco Network Management Architecture and network
devices such as computer systems, Cisco routers, and Cisco switches run applications
which enable them to find out problems in network. Software are installed on
network devices which are programmed in such a way that upon receiving alerts
these execute number of actions like operator notification, even log, system
shutdown and automatic attempts to repair that device.

These Management tools are also used to check or poll end stations and check values
                                  http://www.router-switch.com/
for specific variables. Polling could be automatic or user initiated while agents in
these managed devices could respond to all polls. Agents are known as applications
or software modules which are used to compile information of managed device and
store this information in management database and generate it proactive or reactive
entities using network management protocol within network management system.
Cisco devices make use of SNMP (simple network management protocol) for this and
management proxies are known as those entities which provide management
information on the basis of other entities.

ISO Network Management Model
ISO has played a big role in standardizing network specifications. ISO model is
basically used to understand the main functions of network management systems.
This model contains the following concepts.
        Performance Management
        Configuration Management
        Fault Management
        Security Management

Performance Management
The main objective of performance management is to calculate the performance
level of network and make it available and this level could be maintained at
acceptable level. Some examples of performance variables consist of network
throughput and user response time and line utilization.

There are three major steps which involve in performance management. First, data is
collected for variables which are according to interest of network administrators.
Secondly, data is analyzed to find out normal levels and finally 3rd step is to find out
suitable for each important variable because increase in thresholds may cause
network problem. Network Management entities are used to monitor network
performance variables on regular basis. Whenever performance of specific threshold
is increased entity will generate an alert signal to network management system.

Every step mentioned above is part of the procedure to make a reactive system.
Performance may be unacceptable due to increase in user defined threshold and
system may react by sending messages. Performance management may allow some
proactive procedures like network simulation which could be used in projects. These
simulations are used to alert administrators to be ready for impending problems and
take necessary measures.

Configuration Management
Configuration Management objective to examine Cisco Network and system
configurations database so that effects on network operation for different versions of
Cisco IOS applications could be managed.


                                    http://www.router-switch.com/
Every Cisco device contains number of versions information which is associated to it
like.
       Internetwork Operating System, Version 12.4
       Ethernet Interface, Version 5.3
       TCP/IP software, Version 2.0
       Netware Software, Version 4.2
       NFS software, Version 5.1
       Serial Communications controller, Version 1.1
       X.25 software, Version 1.0
       SNMP software, Version 3.2

This information is stored in database for easy access without any problems and
when problem occurs database could be searched to take help about specific
problem.

Fault Management
The objective of fault management is to find out, log and notify users on network
and automatically fix problems to keep the network in working position. Network
faults could cause downtime3e and unacceptable network degradation and
implementation of fault management is significant. Fault management may contain
formative symptoms and separating problems. Problems are fixed and solution is
tested and finally problems are detected.

Security Management
Security Management objective is to manage network resources with respect to local
guide and sensitive information could not be accessed without proper authentication.
Security management subsystem can however examine users to logon on network
resources and refuse access to those enter necessary access codes.

Subsystems of security management are working by partitioning network resources
towards authorized and unauthorized areas. Some users have an inappropriate
access to network because they are company outsiders. While internal network users
access information which is generated from specific department.

More Related Cisco Network Topics:
Main Network Hardware’s Difference: Integrated Devices, Router, Network Switch &
Firewall
Wireless Network: How to Configure Wireless Security?
3 WAN Protocols: HDLC, PPP, and Frame-Relay You Should Know
WLAN, WLAN’S Role & Advantages
Self-defending Networks, the Marketing’s Dead, and the Goal’s Alive




                                  http://www.router-switch.com/

More Related Content

What's hot

Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power gridP K Agarwal
 
Closing PCI WiFi Loopholes with AirMagnet Enterprise
Closing PCI WiFi Loopholes with AirMagnet EnterpriseClosing PCI WiFi Loopholes with AirMagnet Enterprise
Closing PCI WiFi Loopholes with AirMagnet Enterprisebagnalldarren
 
Best Network Performance Monitoring Tool
Best Network Performance Monitoring ToolBest Network Performance Monitoring Tool
Best Network Performance Monitoring ToolJoe Shestak
 
What goes into managed security services
What goes into managed security servicesWhat goes into managed security services
What goes into managed security servicesPhreedom Technologies
 
Continuous Monitoring: Getting Past Complexity & Reducing Risk
Continuous Monitoring: Getting Past Complexity & Reducing RiskContinuous Monitoring: Getting Past Complexity & Reducing Risk
Continuous Monitoring: Getting Past Complexity & Reducing RiskTripwire
 
ThirdEye - LinkedIn's Business-wide monitoring platform
ThirdEye - LinkedIn's Business-wide monitoring platformThirdEye - LinkedIn's Business-wide monitoring platform
ThirdEye - LinkedIn's Business-wide monitoring platformAkshay Rai
 
Session 11 Tp 11
Session 11 Tp 11Session 11 Tp 11
Session 11 Tp 11githe26200
 
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
 LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)rver21
 
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin WheelerNTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin WheelerNorth Texas Chapter of the ISSA
 
How to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network MonitorHow to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network Monitor10-Strike Software
 
Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems aswanthmrajeev112
 
PhishingBox Overview
PhishingBox OverviewPhishingBox Overview
PhishingBox OverviewPhishingBox
 

What's hot (19)

Infrastructure control
Infrastructure controlInfrastructure control
Infrastructure control
 
Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power grid
 
Closing PCI WiFi Loopholes with AirMagnet Enterprise
Closing PCI WiFi Loopholes with AirMagnet EnterpriseClosing PCI WiFi Loopholes with AirMagnet Enterprise
Closing PCI WiFi Loopholes with AirMagnet Enterprise
 
Best Network Performance Monitoring Tool
Best Network Performance Monitoring ToolBest Network Performance Monitoring Tool
Best Network Performance Monitoring Tool
 
Sdn
SdnSdn
Sdn
 
What goes into managed security services
What goes into managed security servicesWhat goes into managed security services
What goes into managed security services
 
What is NAC
What is NACWhat is NAC
What is NAC
 
Continuous Monitoring: Getting Past Complexity & Reducing Risk
Continuous Monitoring: Getting Past Complexity & Reducing RiskContinuous Monitoring: Getting Past Complexity & Reducing Risk
Continuous Monitoring: Getting Past Complexity & Reducing Risk
 
ThirdEye - LinkedIn's Business-wide monitoring platform
ThirdEye - LinkedIn's Business-wide monitoring platformThirdEye - LinkedIn's Business-wide monitoring platform
ThirdEye - LinkedIn's Business-wide monitoring platform
 
Session 11 Tp 11
Session 11 Tp 11Session 11 Tp 11
Session 11 Tp 11
 
Quadrant MSSP Doc
Quadrant MSSP DocQuadrant MSSP Doc
Quadrant MSSP Doc
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
 LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
LTS SECURE SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
 
Satish kumar
Satish kumar Satish kumar
Satish kumar
 
RF_NEC
RF_NECRF_NEC
RF_NEC
 
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin WheelerNTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
 
How to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network MonitorHow to Maintain Your Network Operable with Network Monitor
How to Maintain Your Network Operable with Network Monitor
 
Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems
 
PhishingBox Overview
PhishingBox OverviewPhishingBox Overview
PhishingBox Overview
 

Similar to Cisco network management

HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comProf Ansari
 
Network management aa
Network management  aaNetwork management  aa
Network management aaDhani Ahmad
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Alexander Decker
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069William Lee
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptxTadeseBeyene
 
Network management
Network managementNetwork management
Network managementElena Benson
 
343492490-Network-Management-and-Administration.pptx
343492490-Network-Management-and-Administration.pptx343492490-Network-Management-and-Administration.pptx
343492490-Network-Management-and-Administration.pptxbilalazam34
 
Multi agent based network monitoring and management using jade
Multi agent based network monitoring and management using jadeMulti agent based network monitoring and management using jade
Multi agent based network monitoring and management using jadeAlexander Decker
 
Project report
Project reportProject report
Project reportayush13bbm
 
IRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring ToolsIRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring ToolsIRJET Journal
 
Chapter 20.pdf
Chapter 20.pdfChapter 20.pdf
Chapter 20.pdfidrissaeed
 
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...IJNSA Journal
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdfkristinatemen
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system pptashutosh rai
 
Widyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementWidyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementDjadja Sardjana
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcKristen Wilson
 

Similar to Cisco network management (20)

HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
 
Network management aa
Network management  aaNetwork management  aa
Network management aa
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptx
 
Hari proposal
Hari proposalHari proposal
Hari proposal
 
Network management ppt
Network management pptNetwork management ppt
Network management ppt
 
Network management
Network managementNetwork management
Network management
 
343492490-Network-Management-and-Administration.pptx
343492490-Network-Management-and-Administration.pptx343492490-Network-Management-and-Administration.pptx
343492490-Network-Management-and-Administration.pptx
 
Multi agent based network monitoring and management using jade
Multi agent based network monitoring and management using jadeMulti agent based network monitoring and management using jade
Multi agent based network monitoring and management using jade
 
Project report
Project reportProject report
Project report
 
IRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring ToolsIRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring Tools
 
Chapter 20.pdf
Chapter 20.pdfChapter 20.pdf
Chapter 20.pdf
 
Network Monitoring Tools
Network Monitoring ToolsNetwork Monitoring Tools
Network Monitoring Tools
 
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdf
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
 
What is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoTWhat is SCADA system? SCADA Solutions for IoT
What is SCADA system? SCADA Solutions for IoT
 
Widyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementWidyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-management
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
 

More from IT Tech

Cisco ip phone key expansion module setup
Cisco ip phone key expansion module setupCisco ip phone key expansion module setup
Cisco ip phone key expansion module setupIT Tech
 
Cisco catalyst 9200 series platform spec, licenses, transition guide
Cisco catalyst 9200 series platform spec, licenses, transition guideCisco catalyst 9200 series platform spec, licenses, transition guide
Cisco catalyst 9200 series platform spec, licenses, transition guideIT Tech
 
Cisco isr 900 series highlights, platform specs, licenses, transition guide
Cisco isr 900 series highlights, platform specs, licenses, transition guideCisco isr 900 series highlights, platform specs, licenses, transition guide
Cisco isr 900 series highlights, platform specs, licenses, transition guideIT Tech
 
Hpe pro liant gen9 to gen10 server transition guide
Hpe pro liant gen9 to gen10 server transition guideHpe pro liant gen9 to gen10 server transition guide
Hpe pro liant gen9 to gen10 server transition guideIT Tech
 
The new cisco isr 4461 faq
The new cisco isr 4461 faqThe new cisco isr 4461 faq
The new cisco isr 4461 faqIT Tech
 
New nexus 400 gigabit ethernet (400 g) switches
New nexus 400 gigabit ethernet (400 g) switchesNew nexus 400 gigabit ethernet (400 g) switches
New nexus 400 gigabit ethernet (400 g) switchesIT Tech
 
Tested cisco isr 1100 delivers the richest set of wi-fi features
Tested cisco isr 1100 delivers the richest set of wi-fi featuresTested cisco isr 1100 delivers the richest set of wi-fi features
Tested cisco isr 1100 delivers the richest set of wi-fi featuresIT Tech
 
Aruba campus and branch switching solution
Aruba campus and branch switching solutionAruba campus and branch switching solution
Aruba campus and branch switching solutionIT Tech
 
Cisco transceiver module for compatible catalyst switches
Cisco transceiver module for compatible catalyst switchesCisco transceiver module for compatible catalyst switches
Cisco transceiver module for compatible catalyst switchesIT Tech
 
Cisco ios on cisco catalyst switches
Cisco ios on cisco catalyst switchesCisco ios on cisco catalyst switches
Cisco ios on cisco catalyst switchesIT Tech
 
Cisco's wireless solutions deployment modes
Cisco's wireless solutions deployment modesCisco's wireless solutions deployment modes
Cisco's wireless solutions deployment modesIT Tech
 
Competitive switching comparison cisco vs. hpe aruba vs. huawei vs. dell
Competitive switching comparison cisco vs. hpe aruba vs. huawei vs. dellCompetitive switching comparison cisco vs. hpe aruba vs. huawei vs. dell
Competitive switching comparison cisco vs. hpe aruba vs. huawei vs. dellIT Tech
 
Four reasons to consider the all in-one isr 1000
Four reasons to consider the all in-one isr 1000Four reasons to consider the all in-one isr 1000
Four reasons to consider the all in-one isr 1000IT Tech
 
The difference between yellow and white labeled ports on a nexus 2300 series fex
The difference between yellow and white labeled ports on a nexus 2300 series fexThe difference between yellow and white labeled ports on a nexus 2300 series fex
The difference between yellow and white labeled ports on a nexus 2300 series fexIT Tech
 
Cisco transceiver modules for compatible cisco switches series
Cisco transceiver modules for compatible cisco switches seriesCisco transceiver modules for compatible cisco switches series
Cisco transceiver modules for compatible cisco switches seriesIT Tech
 
Guide to the new cisco firepower 2100 series
Guide to the new cisco firepower 2100 seriesGuide to the new cisco firepower 2100 series
Guide to the new cisco firepower 2100 seriesIT Tech
 
892 f sfp configuration example
892 f sfp configuration example892 f sfp configuration example
892 f sfp configuration exampleIT Tech
 
Cisco nexus 7000 and nexus 7700
Cisco nexus 7000 and nexus 7700Cisco nexus 7000 and nexus 7700
Cisco nexus 7000 and nexus 7700IT Tech
 
Cisco firepower ngips series migration options
Cisco firepower ngips series migration optionsCisco firepower ngips series migration options
Cisco firepower ngips series migration optionsIT Tech
 
Eol transceiver to replacement model
Eol transceiver to replacement modelEol transceiver to replacement model
Eol transceiver to replacement modelIT Tech
 

More from IT Tech (20)

Cisco ip phone key expansion module setup
Cisco ip phone key expansion module setupCisco ip phone key expansion module setup
Cisco ip phone key expansion module setup
 
Cisco catalyst 9200 series platform spec, licenses, transition guide
Cisco catalyst 9200 series platform spec, licenses, transition guideCisco catalyst 9200 series platform spec, licenses, transition guide
Cisco catalyst 9200 series platform spec, licenses, transition guide
 
Cisco isr 900 series highlights, platform specs, licenses, transition guide
Cisco isr 900 series highlights, platform specs, licenses, transition guideCisco isr 900 series highlights, platform specs, licenses, transition guide
Cisco isr 900 series highlights, platform specs, licenses, transition guide
 
Hpe pro liant gen9 to gen10 server transition guide
Hpe pro liant gen9 to gen10 server transition guideHpe pro liant gen9 to gen10 server transition guide
Hpe pro liant gen9 to gen10 server transition guide
 
The new cisco isr 4461 faq
The new cisco isr 4461 faqThe new cisco isr 4461 faq
The new cisco isr 4461 faq
 
New nexus 400 gigabit ethernet (400 g) switches
New nexus 400 gigabit ethernet (400 g) switchesNew nexus 400 gigabit ethernet (400 g) switches
New nexus 400 gigabit ethernet (400 g) switches
 
Tested cisco isr 1100 delivers the richest set of wi-fi features
Tested cisco isr 1100 delivers the richest set of wi-fi featuresTested cisco isr 1100 delivers the richest set of wi-fi features
Tested cisco isr 1100 delivers the richest set of wi-fi features
 
Aruba campus and branch switching solution
Aruba campus and branch switching solutionAruba campus and branch switching solution
Aruba campus and branch switching solution
 
Cisco transceiver module for compatible catalyst switches
Cisco transceiver module for compatible catalyst switchesCisco transceiver module for compatible catalyst switches
Cisco transceiver module for compatible catalyst switches
 
Cisco ios on cisco catalyst switches
Cisco ios on cisco catalyst switchesCisco ios on cisco catalyst switches
Cisco ios on cisco catalyst switches
 
Cisco's wireless solutions deployment modes
Cisco's wireless solutions deployment modesCisco's wireless solutions deployment modes
Cisco's wireless solutions deployment modes
 
Competitive switching comparison cisco vs. hpe aruba vs. huawei vs. dell
Competitive switching comparison cisco vs. hpe aruba vs. huawei vs. dellCompetitive switching comparison cisco vs. hpe aruba vs. huawei vs. dell
Competitive switching comparison cisco vs. hpe aruba vs. huawei vs. dell
 
Four reasons to consider the all in-one isr 1000
Four reasons to consider the all in-one isr 1000Four reasons to consider the all in-one isr 1000
Four reasons to consider the all in-one isr 1000
 
The difference between yellow and white labeled ports on a nexus 2300 series fex
The difference between yellow and white labeled ports on a nexus 2300 series fexThe difference between yellow and white labeled ports on a nexus 2300 series fex
The difference between yellow and white labeled ports on a nexus 2300 series fex
 
Cisco transceiver modules for compatible cisco switches series
Cisco transceiver modules for compatible cisco switches seriesCisco transceiver modules for compatible cisco switches series
Cisco transceiver modules for compatible cisco switches series
 
Guide to the new cisco firepower 2100 series
Guide to the new cisco firepower 2100 seriesGuide to the new cisco firepower 2100 series
Guide to the new cisco firepower 2100 series
 
892 f sfp configuration example
892 f sfp configuration example892 f sfp configuration example
892 f sfp configuration example
 
Cisco nexus 7000 and nexus 7700
Cisco nexus 7000 and nexus 7700Cisco nexus 7000 and nexus 7700
Cisco nexus 7000 and nexus 7700
 
Cisco firepower ngips series migration options
Cisco firepower ngips series migration optionsCisco firepower ngips series migration options
Cisco firepower ngips series migration options
 
Eol transceiver to replacement model
Eol transceiver to replacement modelEol transceiver to replacement model
Eol transceiver to replacement model
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Cisco network management

  • 1. Cisco Network Management Overview of Network Management Different people may take network management as different meanings. It may be considered as solitary network consultant for monitoring network activity using outdated protocol analyzer. While network management in distributed database environment, managing network nodes for generating real time graphics and auto polling of network devices. There are number of tools and applications which are used for network management to support network administrators to monitor and maintain networks of all types. In the early 1980s remarkable growth in field of network deployment was noted and companies have found productivity and cost benefits by use of network and they started with networks very fast as new products came into the market. In middle of 1980s specific company’s troubles were increased by the use of different network technologies. Network expansion troubles influence the networks day by day as networks grow and each new network needs some experts for maintaining and troubleshooting it. At early stages employee requirements for managing network created crisis for some organizations. Cisco Network Management Architecture Basic structure is used in Cisco Network Management Architecture and network devices such as computer systems, Cisco routers, and Cisco switches run applications which enable them to find out problems in network. Software are installed on network devices which are programmed in such a way that upon receiving alerts these execute number of actions like operator notification, even log, system shutdown and automatic attempts to repair that device. These Management tools are also used to check or poll end stations and check values http://www.router-switch.com/
  • 2. for specific variables. Polling could be automatic or user initiated while agents in these managed devices could respond to all polls. Agents are known as applications or software modules which are used to compile information of managed device and store this information in management database and generate it proactive or reactive entities using network management protocol within network management system. Cisco devices make use of SNMP (simple network management protocol) for this and management proxies are known as those entities which provide management information on the basis of other entities. ISO Network Management Model ISO has played a big role in standardizing network specifications. ISO model is basically used to understand the main functions of network management systems. This model contains the following concepts. Performance Management Configuration Management Fault Management Security Management Performance Management The main objective of performance management is to calculate the performance level of network and make it available and this level could be maintained at acceptable level. Some examples of performance variables consist of network throughput and user response time and line utilization. There are three major steps which involve in performance management. First, data is collected for variables which are according to interest of network administrators. Secondly, data is analyzed to find out normal levels and finally 3rd step is to find out suitable for each important variable because increase in thresholds may cause network problem. Network Management entities are used to monitor network performance variables on regular basis. Whenever performance of specific threshold is increased entity will generate an alert signal to network management system. Every step mentioned above is part of the procedure to make a reactive system. Performance may be unacceptable due to increase in user defined threshold and system may react by sending messages. Performance management may allow some proactive procedures like network simulation which could be used in projects. These simulations are used to alert administrators to be ready for impending problems and take necessary measures. Configuration Management Configuration Management objective to examine Cisco Network and system configurations database so that effects on network operation for different versions of Cisco IOS applications could be managed. http://www.router-switch.com/
  • 3. Every Cisco device contains number of versions information which is associated to it like. Internetwork Operating System, Version 12.4 Ethernet Interface, Version 5.3 TCP/IP software, Version 2.0 Netware Software, Version 4.2 NFS software, Version 5.1 Serial Communications controller, Version 1.1 X.25 software, Version 1.0 SNMP software, Version 3.2 This information is stored in database for easy access without any problems and when problem occurs database could be searched to take help about specific problem. Fault Management The objective of fault management is to find out, log and notify users on network and automatically fix problems to keep the network in working position. Network faults could cause downtime3e and unacceptable network degradation and implementation of fault management is significant. Fault management may contain formative symptoms and separating problems. Problems are fixed and solution is tested and finally problems are detected. Security Management Security Management objective is to manage network resources with respect to local guide and sensitive information could not be accessed without proper authentication. Security management subsystem can however examine users to logon on network resources and refuse access to those enter necessary access codes. Subsystems of security management are working by partitioning network resources towards authorized and unauthorized areas. Some users have an inappropriate access to network because they are company outsiders. While internal network users access information which is generated from specific department. More Related Cisco Network Topics: Main Network Hardware’s Difference: Integrated Devices, Router, Network Switch & Firewall Wireless Network: How to Configure Wireless Security? 3 WAN Protocols: HDLC, PPP, and Frame-Relay You Should Know WLAN, WLAN’S Role & Advantages Self-defending Networks, the Marketing’s Dead, and the Goal’s Alive http://www.router-switch.com/