SlideShare a Scribd company logo
Mehran University of Engineering & Technology, Jamshoro
Department of Computer Systems Engineering
Basic Concepts and Types of
Network Management
Computer Communication & Networking
Presented By: SorathAsnani
Network Management:
Network Management can be defined as
monitoring, testing, configuring and
troubleshooting network components to meet a
set of requirements defined by an organization.
The network management system uses
hardware, software and humans.
Types of Network Management:
The functions performed by a network
management are divided into five broad
categories:
1. Configuration Management
2. Fault Management
3. Performance Management
4. Security Management
5. Accounting Management
Fig 1.Functions of Network Management
1. Configuration Management:
The configuration management deals with the
status of each entity in the network and its
relation to other entities. A large network is
usually made up of hundreds of entities that are
physically or logically connected to each other.
These entities have an initial configuration
when the network is set up, but it can change
with time.
Configuration management can be divided into
two subsystems:
a. Reconfiguration
b. Documentation
a. Reconfiguration:
Reconfiguration means adjusting the network
components and features. There are three
types of reconfiguration: hardware
reconfiguration, software reconfiguration and
user-account reconfiguration.
Hardware Reconfiguration:
It covers all changes to the hardware. Examples
of hardware reconfiguration are: replacing a
desktop computer, moving a router to another
part of the network, adding a sub-network etc.
The hardware reconfiguration is handled
manually.
Software Reconfiguration:
It covers all changes to the software. Examples
of software reconfiguration are: installing new
software on servers or clients, updating an
operating system etc. Software reconfiguration
can be automated.
User-Account Reconfiguration:
It deals with adding or deleting users on a
system, and assigning user privileges.
b. Documentation:
The original network configuration and each
subsequent change must be recorded.
Documentation can be of hardware, software
and user-accounts.
Hardware Documentation:
It involves 2 sets of documents: maps and
specification.
Maps: Map tracks each piece of hardware and
its connection to the network.
Specification:The specification document
includes the information about hardware type,
serial number, and vendor, time of purchase
and warranty information.
Software Documentation:
It includes information about software such as
software type, the version, the time installed,
and the license agreement.
User Account Documentation:
It includes the documentation of user accounts
and their privileges.
2. Fault Management:
The fault is defined as the abnormal condition
u=in the system.The fault management deals
with the proper operation of the individual
components of a complex network. It is further
sub divided into 2 types:
a. Reactive fault Management
b. Proactive fault Management
a. Reactive Fault Management:
The reactive fault management system is
responsible for detecting, isolating, correcting,
and recording faults. It handles short term
solutions to faults.
Steps taken by the Reactive fault management
system:
1. Detect the exact location of the fault.
2. Isolate the fault and notify the affected
users.
3. Correct the fault by replacing or
repairing the faulty components.
4. Finally, the fault is documented.
b. Proactive Fault Management:
The proactive fault management tries to
prevent faults from occurring where it is
possible to predict and prevent the failure.
3. Performance Management:
The performance management monitors and
controls the network to ensure that it is running
as efficiently as possible. The performance of
the system depends upon some measureable
quantities such as:
a. Capacity
b. Traffic
c. Throughput
d. Response time
a. Capacity:
Every network has a limited capacity. The
performance management system must ensure
that it is not used above this capacity.
b. Traffic:
Traffic can be measured in two ways: internally
and externally.
Internal Traffic:It is measured by the number of
packets (or bytes) travelling inside the network.
External Traffic:It is measured by the exchange
of packets (or bytes) outside the network.
When the system is heavily used, blocking may
occur if there is excessive traffic.
c. Throughput:
Performance management monitors the
throughput to make sure that it is not reduced
to unacceptable levels.
d. Response Time:
Response time is measured from the time a
user requests a service to the time the service is
granted. Performance management monitors
the average response time and the peak-hour
response time.
4. Security Management:
Security management is responsible for
controlling access to the network based on the
predefined policy.
5. Accounting Management:
Accounting management is the control of users’
access to network resources through charges.
Under accounting management, individual
users, departments, divisions, or projects are
charged for the services they receive from the
network.

More Related Content

What's hot

install and manage network protocols.pptx
install and manage network protocols.pptxinstall and manage network protocols.pptx
install and manage network protocols.pptx
Jaleto Sunkemo
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
chauhankapil
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
Sam Bowne
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
CAS
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
Toño Herrera
 
Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
Wajahat Rajab
 
Network Security-Module_1.pdf
Network Security-Module_1.pdfNetwork Security-Module_1.pdf
Network Security-Module_1.pdf
Dr. Shivashankar
 
Security technologies
Security technologiesSecurity technologies
Security technologies
Dhani Ahmad
 
Security Management | System Administration
Security Management | System AdministrationSecurity Management | System Administration
Security Management | System Administration
Lisa Dowdell, MSISTM
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards
PECB
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
John Ely Masculino
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
Ramesh Upadhaya
 
Network monitoring system
Network monitoring systemNetwork monitoring system
Network monitoring system
MyPresentations Services
 
Network Management System and Protocol
Network Management System and Protocol Network Management System and Protocol
Network Management System and Protocol
Hamdamboy (함담보이)
 
Fundamental cloud security
Fundamental cloud securityFundamental cloud security
Fundamental cloud security
Asmaa Ibrahim
 
8 drived horizontal fragmentation
8  drived horizontal fragmentation8  drived horizontal fragmentation
8 drived horizontal fragmentation
Mohsan Ijaz
 
Security policy
Security policySecurity policy
Security policy
Dhani Ahmad
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
Cloudflare
 
System Security-Chapter 1
System Security-Chapter 1System Security-Chapter 1
System Security-Chapter 1
Vamsee Krishna Kiran
 

What's hot (20)

install and manage network protocols.pptx
install and manage network protocols.pptxinstall and manage network protocols.pptx
install and manage network protocols.pptx
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Network Security
Network SecurityNetwork Security
Network Security
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Network Security-Module_1.pdf
Network Security-Module_1.pdfNetwork Security-Module_1.pdf
Network Security-Module_1.pdf
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Security Management | System Administration
Security Management | System AdministrationSecurity Management | System Administration
Security Management | System Administration
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
Network monitoring system
Network monitoring systemNetwork monitoring system
Network monitoring system
 
Network Management System and Protocol
Network Management System and Protocol Network Management System and Protocol
Network Management System and Protocol
 
Fundamental cloud security
Fundamental cloud securityFundamental cloud security
Fundamental cloud security
 
8 drived horizontal fragmentation
8  drived horizontal fragmentation8  drived horizontal fragmentation
8 drived horizontal fragmentation
 
Security policy
Security policySecurity policy
Security policy
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
System Security-Chapter 1
System Security-Chapter 1System Security-Chapter 1
System Security-Chapter 1
 

Viewers also liked

Common Protocol Template Executive Summary
Common Protocol Template Executive SummaryCommon Protocol Template Executive Summary
Common Protocol Template Executive Summary
TransCelerateBioPharma
 
Network Management Fundamentals
Network Management FundamentalsNetwork Management Fundamentals
Network Management Fundamentals
SolarWinds
 
Network Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the BasicsNetwork Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the Basics
SolarWinds
 
Chapter 2 The Evolution Of Management Theory
Chapter 2   The Evolution Of Management TheoryChapter 2   The Evolution Of Management Theory
Chapter 2 The Evolution Of Management Theory
management 2
 
Ccna complete notes
Ccna complete notesCcna complete notes
Ccna complete notes
thetechnicalzone
 
CCNA Access Lists Questions
CCNA Access Lists QuestionsCCNA Access Lists Questions
CCNA Access Lists Questions
Dsunte Wilson
 
CCNA CheatSheet
CCNA CheatSheetCCNA CheatSheet
CCNA CheatSheet
Eng. Emad Al-Atoum
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsCCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration Questions
Dsunte Wilson
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
Dsunte Wilson
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay Questions
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
Dsunte Wilson
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
Dsunte Wilson
 
Computer services
Computer servicesComputer services
Computer services
Arz Sy
 
Cisco CCNA module 2
Cisco CCNA module 2Cisco CCNA module 2
Cisco CCNA module 2
Anjar Septiawan
 
Cisco CCNA module 10
Cisco CCNA module 10Cisco CCNA module 10
Cisco CCNA module 10
Anjar Septiawan
 

Viewers also liked (15)

Common Protocol Template Executive Summary
Common Protocol Template Executive SummaryCommon Protocol Template Executive Summary
Common Protocol Template Executive Summary
 
Network Management Fundamentals
Network Management FundamentalsNetwork Management Fundamentals
Network Management Fundamentals
 
Network Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the BasicsNetwork Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the Basics
 
Chapter 2 The Evolution Of Management Theory
Chapter 2   The Evolution Of Management TheoryChapter 2   The Evolution Of Management Theory
Chapter 2 The Evolution Of Management Theory
 
Ccna complete notes
Ccna complete notesCcna complete notes
Ccna complete notes
 
CCNA Access Lists Questions
CCNA Access Lists QuestionsCCNA Access Lists Questions
CCNA Access Lists Questions
 
CCNA CheatSheet
CCNA CheatSheetCCNA CheatSheet
CCNA CheatSheet
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsCCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration Questions
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay Questions
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
 
Computer services
Computer servicesComputer services
Computer services
 
Cisco CCNA module 2
Cisco CCNA module 2Cisco CCNA module 2
Cisco CCNA module 2
 
Cisco CCNA module 10
Cisco CCNA module 10Cisco CCNA module 10
Cisco CCNA module 10
 

Similar to Basic Concepts and Types of Network Management

Unit 1 network management
Unit 1 network managementUnit 1 network management
Unit 1 network management
bhavikaorg
 
Network management ppt
Network management pptNetwork management ppt
Network management ppt
DheerajPachauri
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Abdullaziz Tagawy
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069
William Lee
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
Prof Ansari
 
chp unit 1 Provide Network System Administration.pptx
chp unit 1 Provide Network System Administration.pptxchp unit 1 Provide Network System Administration.pptx
chp unit 1 Provide Network System Administration.pptx
TadeseBeyene
 
Lecture week8
Lecture week8Lecture week8
Lecture week8
ismaelhaider
 
Network management aa
Network management  aaNetwork management  aa
Network management aa
Dhani Ahmad
 
Cisco network management
Cisco network managementCisco network management
Cisco network management
IT Tech
 
Network management
Network managementNetwork management
Network management
Elena Benson
 
Testing
TestingTesting
Testing
BinamraRegmi
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
Kristen Wilson
 
Part 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdfPart 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdf
fashiionbeutycare
 
Markinng schme ICT questions.pdf
Markinng schme ICT questions.pdfMarkinng schme ICT questions.pdf
Markinng schme ICT questions.pdf
UWIZEYIMANAElise
 
Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation Criteria
IJERA Editor
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptx
TadeseBeyene
 
Network management
Network management Network management
Network management
Manali Wadnerkar
 
Network Security & Assured Networks: TechNet Augusta 2015
Network Security & Assured Networks: TechNet Augusta 2015Network Security & Assured Networks: TechNet Augusta 2015
Network Security & Assured Networks: TechNet Augusta 2015
AFCEA International
 
publishable paper
publishable paperpublishable paper
publishable paper
chaitanya451336
 
Railway Reservation System - Software Engineering
Railway Reservation System - Software EngineeringRailway Reservation System - Software Engineering
Railway Reservation System - Software Engineering
Lalit Pal
 

Similar to Basic Concepts and Types of Network Management (20)

Unit 1 network management
Unit 1 network managementUnit 1 network management
Unit 1 network management
 
Network management ppt
Network management pptNetwork management ppt
Network management ppt
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
 
chp unit 1 Provide Network System Administration.pptx
chp unit 1 Provide Network System Administration.pptxchp unit 1 Provide Network System Administration.pptx
chp unit 1 Provide Network System Administration.pptx
 
Lecture week8
Lecture week8Lecture week8
Lecture week8
 
Network management aa
Network management  aaNetwork management  aa
Network management aa
 
Cisco network management
Cisco network managementCisco network management
Cisco network management
 
Network management
Network managementNetwork management
Network management
 
Testing
TestingTesting
Testing
 
Advantages And Disadvantages Of Nc
Advantages And Disadvantages Of NcAdvantages And Disadvantages Of Nc
Advantages And Disadvantages Of Nc
 
Part 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdfPart 1 List the basic steps in securing an operating system. Assume.pdf
Part 1 List the basic steps in securing an operating system. Assume.pdf
 
Markinng schme ICT questions.pdf
Markinng schme ICT questions.pdfMarkinng schme ICT questions.pdf
Markinng schme ICT questions.pdf
 
Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation Criteria
 
Resove network problem.pptx
Resove network problem.pptxResove network problem.pptx
Resove network problem.pptx
 
Network management
Network management Network management
Network management
 
Network Security & Assured Networks: TechNet Augusta 2015
Network Security & Assured Networks: TechNet Augusta 2015Network Security & Assured Networks: TechNet Augusta 2015
Network Security & Assured Networks: TechNet Augusta 2015
 
publishable paper
publishable paperpublishable paper
publishable paper
 
Railway Reservation System - Software Engineering
Railway Reservation System - Software EngineeringRailway Reservation System - Software Engineering
Railway Reservation System - Software Engineering
 

Recently uploaded

Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 

Recently uploaded (20)

Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 

Basic Concepts and Types of Network Management

  • 1. Mehran University of Engineering & Technology, Jamshoro Department of Computer Systems Engineering Basic Concepts and Types of Network Management Computer Communication & Networking Presented By: SorathAsnani
  • 2. Network Management: Network Management can be defined as monitoring, testing, configuring and troubleshooting network components to meet a set of requirements defined by an organization. The network management system uses hardware, software and humans. Types of Network Management: The functions performed by a network management are divided into five broad categories: 1. Configuration Management 2. Fault Management 3. Performance Management 4. Security Management 5. Accounting Management Fig 1.Functions of Network Management 1. Configuration Management: The configuration management deals with the status of each entity in the network and its relation to other entities. A large network is usually made up of hundreds of entities that are physically or logically connected to each other. These entities have an initial configuration when the network is set up, but it can change with time. Configuration management can be divided into two subsystems: a. Reconfiguration b. Documentation a. Reconfiguration: Reconfiguration means adjusting the network components and features. There are three types of reconfiguration: hardware reconfiguration, software reconfiguration and user-account reconfiguration. Hardware Reconfiguration: It covers all changes to the hardware. Examples of hardware reconfiguration are: replacing a desktop computer, moving a router to another part of the network, adding a sub-network etc. The hardware reconfiguration is handled manually. Software Reconfiguration: It covers all changes to the software. Examples of software reconfiguration are: installing new software on servers or clients, updating an operating system etc. Software reconfiguration can be automated. User-Account Reconfiguration: It deals with adding or deleting users on a system, and assigning user privileges. b. Documentation: The original network configuration and each subsequent change must be recorded. Documentation can be of hardware, software and user-accounts. Hardware Documentation: It involves 2 sets of documents: maps and specification. Maps: Map tracks each piece of hardware and its connection to the network. Specification:The specification document includes the information about hardware type, serial number, and vendor, time of purchase and warranty information. Software Documentation: It includes information about software such as software type, the version, the time installed, and the license agreement. User Account Documentation: It includes the documentation of user accounts and their privileges.
  • 3. 2. Fault Management: The fault is defined as the abnormal condition u=in the system.The fault management deals with the proper operation of the individual components of a complex network. It is further sub divided into 2 types: a. Reactive fault Management b. Proactive fault Management a. Reactive Fault Management: The reactive fault management system is responsible for detecting, isolating, correcting, and recording faults. It handles short term solutions to faults. Steps taken by the Reactive fault management system: 1. Detect the exact location of the fault. 2. Isolate the fault and notify the affected users. 3. Correct the fault by replacing or repairing the faulty components. 4. Finally, the fault is documented. b. Proactive Fault Management: The proactive fault management tries to prevent faults from occurring where it is possible to predict and prevent the failure. 3. Performance Management: The performance management monitors and controls the network to ensure that it is running as efficiently as possible. The performance of the system depends upon some measureable quantities such as: a. Capacity b. Traffic c. Throughput d. Response time a. Capacity: Every network has a limited capacity. The performance management system must ensure that it is not used above this capacity. b. Traffic: Traffic can be measured in two ways: internally and externally. Internal Traffic:It is measured by the number of packets (or bytes) travelling inside the network. External Traffic:It is measured by the exchange of packets (or bytes) outside the network. When the system is heavily used, blocking may occur if there is excessive traffic. c. Throughput: Performance management monitors the throughput to make sure that it is not reduced to unacceptable levels. d. Response Time: Response time is measured from the time a user requests a service to the time the service is granted. Performance management monitors the average response time and the peak-hour response time. 4. Security Management: Security management is responsible for controlling access to the network based on the predefined policy. 5. Accounting Management: Accounting management is the control of users’ access to network resources through charges. Under accounting management, individual users, departments, divisions, or projects are charged for the services they receive from the network.