SlideShare a Scribd company logo
Course Instructor: Parkash Lohana CN506 Network Management  Week 08 SPRING 2010 Revision for Mid-Term Exam  USMAN INSTITUTE OF TECHNOLOGY Hamdard University
Management Scenarios  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Management Functions  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Fault Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fault Management ,[object Object],[object Object],[object Object],[object Object],[object Object]
User requirements for  Fault Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Configuration Management ,[object Object],[object Object],[object Object],[object Object]
Requirements for Configuration Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Accounting Management ,[object Object],[object Object],[object Object]
Accounting Management ,[object Object],[object Object],[object Object],[object Object]
Requirements for  Accounting Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Management Functions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Management Functions ,[object Object],[object Object],[object Object],[object Object],Course Instructor: Parkash Lohana
Management Functions ,[object Object],[object Object],[object Object],[object Object]
Management Functions ,[object Object],[object Object],[object Object],Course Instructor: Parkash Lohana
Management Functions ,[object Object],[object Object],[object Object],[object Object]
Management Functions ,[object Object],[object Object],[object Object],Course Instructor: Parkash Lohana
Management Functions ,[object Object],[object Object],[object Object],[object Object],[object Object]
Management Functions  ,[object Object],[object Object],[object Object],[object Object],[object Object],Course Instructor: Parkash Lohana
Management Functions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Management Functions
Management Functions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Management Functions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Management Functions ,[object Object],[object Object],[object Object],[object Object]
Management Functions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Course Instructor: Parkash Lohana
Management Functions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Management Functions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Management Functions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Course Instructor: Parkash Lohana
 
OSI Architecture and Model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Network Management Information Model Organization Model Functional Model Communication Model OSl Network Management Model
SNMP Architecture and Model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Network Management Information Model Organization Model Functional Model Communication Model OSl Network Management Model
Organizational Model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Two-Tier Model ,[object Object],[object Object],[object Object],[object Object],Manager Managed objects Unmanaged objects Two-Tier Network Mangement Organization Model Agent process MDB MDB  Management Database
Three-Tier Model ,[object Object],[object Object],[object Object],[object Object],Agent / Manager Managed objects Agent process Manager Three-Tier Network Mangement Organization Model MDB MDB MDB  Management Database
Manager of Managers ,[object Object],[object Object],[object Object],MoM Agent Agent NMS Manager Managed objects Managed objects Network Mangement Organization Model with MoM Agent process MDB MDB MDB MoM  Manager of Managers MDB  Management Database Agent Agent NMS Manager
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Management Information Base (MIB) ,[object Object],[object Object],[object Object],[object Object]
Information Base View: An Analogy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Management Data Base / Information Base ,[object Object],[object Object],[object Object],[object Object],[object Object],Network Configuration with Data and Information Base
SNMP Model   ,[object Object],[object Object],[object Object],[object Object],[object Object]
CONCEPT
Concept  ,[object Object],[object Object],[object Object]
Concept
Agent  ,[object Object],[object Object],[object Object]
Manager  ,[object Object],[object Object],[object Object]
Managers and Agents ,[object Object],[object Object],[object Object],[object Object]
Management Components ,[object Object],[object Object],[object Object],[object Object]
Components of network  management on the Internet
SNMP defines the format of packets  exchanged between a manager and  an agent.  It reads and changes the status  (values) of objects (variables) in  SNMP packets. Role of SNMP
SMI defines the general rules for naming objects, defining object types  (including range and length),  and showing how to encode objects and values.  Role of SMI
SMI defines neither the  number of objects an entity  should manage, nor names the  objects to be managed nor  defines the association between  the objects and their values. Role of SMI
MIB creates a collection of named objects,  their types, and their relationships  to each other in  an entity to be managed.  Role of MIB
We can compare the task of network management to the task of writing a program. 1. Both tasks need rules. In network management this is handled by SMI. 2. Both tasks need variable declarations. In network management this is handled by MIB. 3. Both tasks have actions performed by statements. In network management this is handled by SNMP. An Analogy
SNMP ,[object Object],[object Object],[object Object]
SNMP Traps ,[object Object],[object Object],[object Object],[object Object]
SNMP Traps ,[object Object],[object Object]
SNMP Traps ,[object Object],[object Object]
SNMP Traps ,[object Object],[object Object],[object Object],[object Object]
SNMP Polling  ,[object Object],[object Object]
SNMP Polling  ,[object Object],[object Object],[object Object]
SNMP Traps/Polling  ,[object Object],[object Object],[object Object]
SNMP ,[object Object],[object Object],[object Object],[object Object]
SMI  ,[object Object],[object Object],[object Object],[object Object]
The Structure of Management Information ,[object Object],[object Object],[object Object]
Name  ,[object Object],[object Object]
Naming  ,[object Object],[object Object],[object Object],[object Object]
Object  identifier
All objects managed by SNMP  are given an object identifier.  The object identifier always starts  with 1.3.6.1.2.1 . Name
Internet Subnodes Any object in the internet MIB will start with the prefix 1.3.6.1. There four objects under  internet  object
SMI ,[object Object],[object Object]
SNMP ASN.1 Data Type
Primitive Data Types
Defined or Application Data Type
Data types ,[object Object],[object Object],[object Object],[object Object],[object Object]
Constructor or Structured Data Type: SEQUENCE ,[object Object]
Constructor or Structured Data Type: SEQUENCE OF
SMI: Managed Objects  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Managed Object: Structure
Object Identifier ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CCITT ,[object Object]
Object Identifier ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Encoding Method  ,[object Object]
Codes for data types
Length format
Example. OCTET STRING “HI”
SNMP MIBS ,[object Object],[object Object],[object Object]
MIB ,[object Object],[object Object],[object Object]
mib-2
Accessing MIB Variables ,[object Object],[object Object]
udp group
Simple variables  ,[object Object],[object Object],[object Object]
udp variables and tables
Table ,[object Object],[object Object],[object Object],[object Object],[object Object]
SNMP MIBS ,[object Object],[object Object]
SNMP MIBS ,[object Object],[object Object],[object Object]
SNMP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of SNMP packets ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of SNMP packets ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of SNMP packets ,[object Object],[object Object],[object Object],[object Object]
21.5  SNMP SNMP is an application program that allows  1) a manager to retrieve the value of an object defined in an  agent;  2) a manager to store a value in an object defined in an  agent;  and  3) an agent to send an alarm message about an abnormal  situation to the manager The topics discussed in this section include: PDUs  Format  SNMP
SNMP PDUs
 
Overview of PDUs
Example MIB
Get Example
Set
Set Example
Get-Next
Get-Next Example
Trap
Defined Traps
Trap PDU Format
SNMP Message Encoding
SNMP PDU format
Format  ,[object Object]
Format  ,[object Object],[object Object],[object Object],[object Object]
Format  ,[object Object],[object Object],[object Object],[object Object]
Codes for SNMP messages
Types of errors
21.6  MESSAGES Messages A message in SNMP is made of four elements:  version, header, security parameters, and data (which includes the encoded PDU).
SNMP message
[object Object]
Network Management Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object]
Centralized Architecture  ,[object Object],[object Object],[object Object]
Centralized Architecture ,[object Object],[object Object],[object Object],[object Object]
Centralized Architecture ,[object Object],[object Object],[object Object],[object Object]
Centralized Architecture ,[object Object],[object Object],[object Object],[object Object]
Hierarchical Architecture ,[object Object],[object Object],[object Object],[object Object]
Hierarchical Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object]
Hierarchical Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object]
Distributed Architecture ,[object Object],[object Object],[object Object],[object Object]
Distributed Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Management Applications  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Management Applications ,[object Object],[object Object],[object Object]
Choosing a network management system ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking security
Raja Waseem Akhtar
 
Chapter13 -- ensuring integrity and availability
Chapter13  -- ensuring integrity and availabilityChapter13  -- ensuring integrity and availability
Chapter13 -- ensuring integrity and availability
Raja Waseem Akhtar
 
Network management
Network management Network management
Network management
Manali Wadnerkar
 
ICEIC_2017_20161013
ICEIC_2017_20161013ICEIC_2017_20161013
ICEIC_2017_20161013
Thanwarin Pisanprechatam
 
Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17
koolkampus
 
Socio Technical Systems in Software Engineering SE2
Socio Technical Systems in Software Engineering SE2Socio Technical Systems in Software Engineering SE2
Socio Technical Systems in Software Engineering SE2
koolkampus
 
Ch18-Software Engineering 9
Ch18-Software Engineering 9Ch18-Software Engineering 9
Ch18-Software Engineering 9
Ian Sommerville
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
Muhammad Asim
 
IT6701-Information Management Unit 2
IT6701-Information Management Unit 2IT6701-Information Management Unit 2
IT6701-Information Management Unit 2
SIMONTHOMAS S
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
jayussuryawan
 
Depandability in Software Engineering SE16
Depandability in Software Engineering SE16Depandability in Software Engineering SE16
Depandability in Software Engineering SE16
koolkampus
 
Chapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsChapter 2 auditing it governance controls
Chapter 2 auditing it governance controls
jayussuryawan
 
Chapter 11 Enterprise Resource Planning System
Chapter 11 Enterprise Resource Planning SystemChapter 11 Enterprise Resource Planning System
Chapter 11 Enterprise Resource Planning System
Muhammad Azmy
 
Cp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysisCp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysis
Dr Geetha Mohan
 
ANALYSIS OF NETWORK PERFORMANCE MANAGEMENT DASHBOARD
ANALYSIS OF NETWORK PERFORMANCE MANAGEMENT DASHBOARDANALYSIS OF NETWORK PERFORMANCE MANAGEMENT DASHBOARD
ANALYSIS OF NETWORK PERFORMANCE MANAGEMENT DASHBOARD
IAEME Publication
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirements
csk selva
 
Saipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_VitaeSaipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_Vitae
Saipraveen Gottuparthy
 
Ch14 resilience engineering
Ch14 resilience engineeringCh14 resilience engineering
Ch14 resilience engineering
software-engineering-book
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
Seth Nurul
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
IJERA Editor
 

What's hot (20)

Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking security
 
Chapter13 -- ensuring integrity and availability
Chapter13  -- ensuring integrity and availabilityChapter13  -- ensuring integrity and availability
Chapter13 -- ensuring integrity and availability
 
Network management
Network management Network management
Network management
 
ICEIC_2017_20161013
ICEIC_2017_20161013ICEIC_2017_20161013
ICEIC_2017_20161013
 
Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17
 
Socio Technical Systems in Software Engineering SE2
Socio Technical Systems in Software Engineering SE2Socio Technical Systems in Software Engineering SE2
Socio Technical Systems in Software Engineering SE2
 
Ch18-Software Engineering 9
Ch18-Software Engineering 9Ch18-Software Engineering 9
Ch18-Software Engineering 9
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
IT6701-Information Management Unit 2
IT6701-Information Management Unit 2IT6701-Information Management Unit 2
IT6701-Information Management Unit 2
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 
Depandability in Software Engineering SE16
Depandability in Software Engineering SE16Depandability in Software Engineering SE16
Depandability in Software Engineering SE16
 
Chapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsChapter 2 auditing it governance controls
Chapter 2 auditing it governance controls
 
Chapter 11 Enterprise Resource Planning System
Chapter 11 Enterprise Resource Planning SystemChapter 11 Enterprise Resource Planning System
Chapter 11 Enterprise Resource Planning System
 
Cp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysisCp7101 design and management of computer networks-requirements analysis
Cp7101 design and management of computer networks-requirements analysis
 
ANALYSIS OF NETWORK PERFORMANCE MANAGEMENT DASHBOARD
ANALYSIS OF NETWORK PERFORMANCE MANAGEMENT DASHBOARDANALYSIS OF NETWORK PERFORMANCE MANAGEMENT DASHBOARD
ANALYSIS OF NETWORK PERFORMANCE MANAGEMENT DASHBOARD
 
Requirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirementsRequirment anlaysis , application, device, network requirements
Requirment anlaysis , application, device, network requirements
 
Saipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_VitaeSaipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_Vitae
 
Ch14 resilience engineering
Ch14 resilience engineeringCh14 resilience engineering
Ch14 resilience engineering
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
 

Viewers also liked

My Problem Dr. Shriniwas Kashalikar
My Problem Dr. Shriniwas KashalikarMy Problem Dr. Shriniwas Kashalikar
My Problem Dr. Shriniwas Kashalikar
swatinagwekar
 
New Edition Of Our Tour Dr. Shriniwas Kashalikar
New Edition Of Our Tour Dr. Shriniwas KashalikarNew Edition Of Our Tour Dr. Shriniwas Kashalikar
New Edition Of Our Tour Dr. Shriniwas Kashalikar
swatinagwekar
 
Freedom Dr. Shriniwas Kashalikar
Freedom Dr. Shriniwas KashalikarFreedom Dr. Shriniwas Kashalikar
Freedom Dr. Shriniwas Kashalikar
swatinagwekar
 
Unconditoned Happiness Dr. Shriniwas K Ashalikar
Unconditoned Happiness  Dr. Shriniwas K AshalikarUnconditoned Happiness  Dr. Shriniwas K Ashalikar
Unconditoned Happiness Dr. Shriniwas K Ashalikar
swatinagwekar
 
Dr. Kashalikar Shriniwas
Dr. Kashalikar ShriniwasDr. Kashalikar Shriniwas
Dr. Kashalikar Shriniwas
swatinagwekar
 
Accidents Holistic Solutons Dr. Shriniwas Kashalikar
Accidents Holistic Solutons Dr. Shriniwas KashalikarAccidents Holistic Solutons Dr. Shriniwas Kashalikar
Accidents Holistic Solutons Dr. Shriniwas Kashalikar
swatinagwekar
 
Raid+controllers
Raid+controllersRaid+controllers
Raid+controllers
ismaelhaider
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10
ismaelhaider
 
Pal Sailor Circus Power Point
Pal Sailor Circus Power PointPal Sailor Circus Power Point
Pal Sailor Circus Power Point
Pattymom
 
Cryptography intro
Cryptography introCryptography intro
Cryptography intro
ismaelhaider
 
Rsa
RsaRsa
Result Ssc I Science & General 2009
Result Ssc I Science & General 2009Result Ssc I Science & General 2009
Result Ssc I Science & General 2009
ismaelhaider
 
Halloween Folhas Decoradas - Educ@ naWeb
Halloween Folhas Decoradas - Educ@ naWebHalloween Folhas Decoradas - Educ@ naWeb
Halloween Folhas Decoradas - Educ@ naWeb
Albertina Pereira
 

Viewers also liked (13)

My Problem Dr. Shriniwas Kashalikar
My Problem Dr. Shriniwas KashalikarMy Problem Dr. Shriniwas Kashalikar
My Problem Dr. Shriniwas Kashalikar
 
New Edition Of Our Tour Dr. Shriniwas Kashalikar
New Edition Of Our Tour Dr. Shriniwas KashalikarNew Edition Of Our Tour Dr. Shriniwas Kashalikar
New Edition Of Our Tour Dr. Shriniwas Kashalikar
 
Freedom Dr. Shriniwas Kashalikar
Freedom Dr. Shriniwas KashalikarFreedom Dr. Shriniwas Kashalikar
Freedom Dr. Shriniwas Kashalikar
 
Unconditoned Happiness Dr. Shriniwas K Ashalikar
Unconditoned Happiness  Dr. Shriniwas K AshalikarUnconditoned Happiness  Dr. Shriniwas K Ashalikar
Unconditoned Happiness Dr. Shriniwas K Ashalikar
 
Dr. Kashalikar Shriniwas
Dr. Kashalikar ShriniwasDr. Kashalikar Shriniwas
Dr. Kashalikar Shriniwas
 
Accidents Holistic Solutons Dr. Shriniwas Kashalikar
Accidents Holistic Solutons Dr. Shriniwas KashalikarAccidents Holistic Solutons Dr. Shriniwas Kashalikar
Accidents Holistic Solutons Dr. Shriniwas Kashalikar
 
Raid+controllers
Raid+controllersRaid+controllers
Raid+controllers
 
Data+security+sp10
Data+security+sp10Data+security+sp10
Data+security+sp10
 
Pal Sailor Circus Power Point
Pal Sailor Circus Power PointPal Sailor Circus Power Point
Pal Sailor Circus Power Point
 
Cryptography intro
Cryptography introCryptography intro
Cryptography intro
 
Rsa
RsaRsa
Rsa
 
Result Ssc I Science & General 2009
Result Ssc I Science & General 2009Result Ssc I Science & General 2009
Result Ssc I Science & General 2009
 
Halloween Folhas Decoradas - Educ@ naWeb
Halloween Folhas Decoradas - Educ@ naWebHalloween Folhas Decoradas - Educ@ naWeb
Halloween Folhas Decoradas - Educ@ naWeb
 

Similar to Lecture week8

Network Management, Monitoring and Control.pptx
Network Management, Monitoring and Control.pptxNetwork Management, Monitoring and Control.pptx
Network Management, Monitoring and Control.pptx
MaryOyebanji
 
chp unit 1 Provide Network System Administration.pptx
chp unit 1 Provide Network System Administration.pptxchp unit 1 Provide Network System Administration.pptx
chp unit 1 Provide Network System Administration.pptx
TadeseBeyene
 
Widyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementWidyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-management
Djadja Sardjana
 
Network management
Network managementNetwork management
Network management
Elena Benson
 
Functions and features network management
Functions and features network managementFunctions and features network management
Functions and features network management
Flightcase1
 
Network management aa
Network management  aaNetwork management  aa
Network management aa
Dhani Ahmad
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptx
TadeseBeyene
 
It Audit And Forensics
It Audit And ForensicsIt Audit And Forensics
It Audit And Forensics
JED Consulting Services LLC
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
mbmobile
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069
William Lee
 
SDN Federation White Paper
SDN Federation White PaperSDN Federation White Paper
SDN Federation White Paper
Brian Hedstrom
 
Cisco network management
Cisco network managementCisco network management
Cisco network management
IT Tech
 
INTRODUCTION.ppt
INTRODUCTION.pptINTRODUCTION.ppt
INTRODUCTION.ppt
SolomonAnab1
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
Prof Ansari
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Abdullaziz Tagawy
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
Alexander Decker
 
Network management ppt
Network management pptNetwork management ppt
Network management ppt
DheerajPachauri
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
Kristen Wilson
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptx
tahaazad2
 
Performance management strategy
Performance management strategyPerformance management strategy
Performance management strategy
katharine300
 

Similar to Lecture week8 (20)

Network Management, Monitoring and Control.pptx
Network Management, Monitoring and Control.pptxNetwork Management, Monitoring and Control.pptx
Network Management, Monitoring and Control.pptx
 
chp unit 1 Provide Network System Administration.pptx
chp unit 1 Provide Network System Administration.pptxchp unit 1 Provide Network System Administration.pptx
chp unit 1 Provide Network System Administration.pptx
 
Widyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementWidyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-management
 
Network management
Network managementNetwork management
Network management
 
Functions and features network management
Functions and features network managementFunctions and features network management
Functions and features network management
 
Network management aa
Network management  aaNetwork management  aa
Network management aa
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptx
 
It Audit And Forensics
It Audit And ForensicsIt Audit And Forensics
It Audit And Forensics
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069
 
SDN Federation White Paper
SDN Federation White PaperSDN Federation White Paper
SDN Federation White Paper
 
Cisco network management
Cisco network managementCisco network management
Cisco network management
 
INTRODUCTION.ppt
INTRODUCTION.pptINTRODUCTION.ppt
INTRODUCTION.ppt
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
 
Network management ppt
Network management pptNetwork management ppt
Network management ppt
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptx
 
Performance management strategy
Performance management strategyPerformance management strategy
Performance management strategy
 

Recently uploaded

Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 

Recently uploaded (20)

Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 

Lecture week8