JSS ACADEMY OF TECHNICAL EDUCATION, NOIDA
DR. APJ ABDUL KALAM TECHNICAL UNIVERSITY, LUCKNOW, U.P
NAME: DHEERAJ PACHAURI
ROLL NO.: 1809113042
BRANCH: IT-1
Topic: Network Management
CONTENT
• Network Management
• Types:
Configuration Management
Fault Management
Performance Management
Security Management
Accounting Management
• Simple Network Management Protocol
• Structure of Management Information(SMI)
• Management Information Bar(MIB)
NETWORK MANAGEMENT
Network Management can be defined as monitoring, testing, configuring, and
troubleshooting network components to meet a set of requirements. To
accomplish this task, a Network Management System uses hardware,
software and humans.
The functions performed by a Network Management System can be divided
into five broad categories:
• Configuration Management
• Fault Management
• Reactive Fault Management
• Security Management
• Accounting Management
Configuration Management
The configuration management system must know the status of each entity and its
relation to other entities at any time. Configuration management can be divided into
two subsystems: reconfiguration and documentation.
Reconfiguration: Reconfiguration, which means adjusting the network compon
ents and features, can be a daily occurrence in a large network. There are three
types of reconfiguration:
• Hardware reconfiguration covers all changes to the hardware.
• Software reconfiguration covers all changes to the software.
• User-account reconfiguration is not simply adding or deleting users on a system.
 Documentation
There must be documentation for hardware, software, and user accounts.
• Hardware documentation normally involves two sets of documents: maps and
specifications
Software documentation includes information such as the software type, the
version, the time installed, and the license agreement.
Fault Management
Fault management is the area of network management that handles the
proper operation of each component individually and in relation to each
other.
An effective fault management system has two subsystems: reactive
fault management and proactive fault management.
• Reactive Fault Management: A reactive fault management system is
responsible for detecting, isolating, correcting, and recording faults. It
handles short-term solutions to faults.
• Proactive Fault Management: Proactive fault management tries to
prevent faults from occurring. Although this is not always possible,
some types of failures can be predicted and prevented.
Performance Management
Performance management tries to monitor and control the network to
ensure that it is running as efficiently as possible. Performance
management tries to quantify performance by using some
measurable quantity such as capacity, traffic, throughput, or response
time.It is closely related to fault management,
Security Management
Security management is responsible for controlling access to the
network based on the predefined policy.
Accounting Management
Accounting management is the control of users' access to network
resources through charges. Under accounting management, individual
users, departments, divisions, or even projects are charged for the
services they receive from the network.
SIMPLE NETWORK MANAGEMENT PROTOCOL
The Simple Network Management Protocol (SNMP) is a framework for
managing devices in an internet using the TCPIIP protocol suite. It
provides a set of fundamental operations for monitoring and maintaining
an internet. SNMP uses the concept of manager and agent.
Manager is a host that runs the SNMP client program.
Agent is a router (or a host) that runs the SNMP server program.
To do management tasks, SNMP uses two protocols:
• Structure of Management Information (SMI)
• Management Information Base (MIB)
Structure of Management Information (SMI)
The Structure of Management Information, version 2 (SMIv2) is a
component for network management.It is a guideline for SNMP. It
emphasizes three attributes to handle an object: name, data type, and
encoding method. Its functions are
1. To name objects
2. To define the type of data that can be stored in an object
3. To show how to encode data for transmission over the network
Management Information Base (MIB)
The Management Information Base, version 2 (MIB2) is the second
component used in network management. Each agent has its own MIB2,
which is a collection of all the objects that the manager can manage.
MIB creates a set of objects defined for each entity similar to a database
(mostly metadata in a database, names and types without values).
REFRENCES
• Behrouz A. Forouzan. Data Communications and
Networking. McGraw- Hill, 2007
• Wikipedia
• GeeksForGeeks
THANK YOU

Network management ppt

  • 1.
    JSS ACADEMY OFTECHNICAL EDUCATION, NOIDA DR. APJ ABDUL KALAM TECHNICAL UNIVERSITY, LUCKNOW, U.P NAME: DHEERAJ PACHAURI ROLL NO.: 1809113042 BRANCH: IT-1 Topic: Network Management
  • 2.
    CONTENT • Network Management •Types: Configuration Management Fault Management Performance Management Security Management Accounting Management • Simple Network Management Protocol • Structure of Management Information(SMI) • Management Information Bar(MIB)
  • 3.
    NETWORK MANAGEMENT Network Managementcan be defined as monitoring, testing, configuring, and troubleshooting network components to meet a set of requirements. To accomplish this task, a Network Management System uses hardware, software and humans. The functions performed by a Network Management System can be divided into five broad categories: • Configuration Management • Fault Management • Reactive Fault Management • Security Management • Accounting Management
  • 4.
    Configuration Management The configurationmanagement system must know the status of each entity and its relation to other entities at any time. Configuration management can be divided into two subsystems: reconfiguration and documentation. Reconfiguration: Reconfiguration, which means adjusting the network compon ents and features, can be a daily occurrence in a large network. There are three types of reconfiguration: • Hardware reconfiguration covers all changes to the hardware. • Software reconfiguration covers all changes to the software. • User-account reconfiguration is not simply adding or deleting users on a system.
  • 5.
     Documentation There mustbe documentation for hardware, software, and user accounts. • Hardware documentation normally involves two sets of documents: maps and specifications Software documentation includes information such as the software type, the version, the time installed, and the license agreement.
  • 6.
    Fault Management Fault managementis the area of network management that handles the proper operation of each component individually and in relation to each other. An effective fault management system has two subsystems: reactive fault management and proactive fault management. • Reactive Fault Management: A reactive fault management system is responsible for detecting, isolating, correcting, and recording faults. It handles short-term solutions to faults. • Proactive Fault Management: Proactive fault management tries to prevent faults from occurring. Although this is not always possible, some types of failures can be predicted and prevented.
  • 7.
    Performance Management Performance managementtries to monitor and control the network to ensure that it is running as efficiently as possible. Performance management tries to quantify performance by using some measurable quantity such as capacity, traffic, throughput, or response time.It is closely related to fault management,
  • 8.
    Security Management Security managementis responsible for controlling access to the network based on the predefined policy.
  • 9.
    Accounting Management Accounting managementis the control of users' access to network resources through charges. Under accounting management, individual users, departments, divisions, or even projects are charged for the services they receive from the network.
  • 10.
    SIMPLE NETWORK MANAGEMENTPROTOCOL The Simple Network Management Protocol (SNMP) is a framework for managing devices in an internet using the TCPIIP protocol suite. It provides a set of fundamental operations for monitoring and maintaining an internet. SNMP uses the concept of manager and agent. Manager is a host that runs the SNMP client program. Agent is a router (or a host) that runs the SNMP server program. To do management tasks, SNMP uses two protocols: • Structure of Management Information (SMI) • Management Information Base (MIB)
  • 11.
    Structure of ManagementInformation (SMI) The Structure of Management Information, version 2 (SMIv2) is a component for network management.It is a guideline for SNMP. It emphasizes three attributes to handle an object: name, data type, and encoding method. Its functions are 1. To name objects 2. To define the type of data that can be stored in an object 3. To show how to encode data for transmission over the network
  • 12.
    Management Information Base(MIB) The Management Information Base, version 2 (MIB2) is the second component used in network management. Each agent has its own MIB2, which is a collection of all the objects that the manager can manage. MIB creates a set of objects defined for each entity similar to a database (mostly metadata in a database, names and types without values).
  • 13.
    REFRENCES • Behrouz A.Forouzan. Data Communications and Networking. McGraw- Hill, 2007 • Wikipedia • GeeksForGeeks
  • 14.