SlideShare a Scribd company logo
1 of 19
NETWORK MANAGEMENT
SYSTEM
CONCEPTS
T H E I N T E R N AT I O N A L O R G A N I Z AT I O N F O R
S TA N D A R D I Z AT I O N ( I S O ) N E T W O R K
M A N A G E M E N T F O R U M D I V I D E D N E T W O R K
M A N A G E M E N T I N T O F I V E F U N C T I O N A L
A R E A S :
FA U LT M A N A G E M E N T
C O N F I G U R AT I O N M A N A G E M E N T
S E C U R I T Y M A N A G E M E N T
P E R F O R M A N C E M A N A G E M E N T
A C C O U N T I N G M A N A G E M E N T
NETWORK MANAGEMENT
 Network management is the process of controlling a
complex data network to maximize its efficiency and
productivity
 The overall goal of network management is to help with
the complexity of a data network and to ensure that data
can go across it with maximum efficiency and transparency
to the users
FAULT MANAGEMENT
IS THE PROCESS OF LOCATING PROBLEMS, OR FAULTS, ON
THE DATA NETWORK
IT INVOLVES THE FOLLOWING STEPS:
Detect the fault
Determine exactly where the fault is
Isolate the rest of the network from the failure so that it can
continue to function
Reconfigure or modify the network in such a way as to
minimize the impact
Repair or replace the failed components
Tests: connectivity, data integrity, response-time, ….
CONFIGURATION MANAGEMENT
 THE CONFIGURATION OF CERTAIN NETWORK DEVICES
CONTROLS THE BEHAVIOR OF THE DATA NETWORK
 CONFIGURATION MANAGEMENT IS THE PROCESS OF
FINDING AND SETTING UP (CONFIGURING) THESE
CRITICAL DEVICES
 INVOLVES FOLLOWING STEPS:
 Installation of new hardware/software
 Tracking changes in control configuration
 Who, what and why? - network topology
 Revert/undo changes
 Change management
 Configuration audit
 Does it do what was intended
SECURITY MANAGEMENT
 Is the process of controlling access to information on the data network
 Provides a way to monitor access points and records information on a
periodic basis
 Provides audit trails and sounds alarms for security breaches
 Several security measures are provided:
 Security services: generating, distributing, storing of encryption
keys for services
 Exception alarm generation, detection of problems
 Uniform access control to resources
 Backups, data security
 Security logging
PERFORMANCE MANAGEMENT
 Involves measuring the performance of the network hardware, software, and media
 Examples of measured activities are:
› What is the level of capacity utilization?
› Is there excessive traffic?
› Has throughput been reduced to unacceptable levels?
› Are there bottlenecks?
› Is response time increasing?
› What is the error rates?
› Indicators: availability, response time, accuracy service
throughput, utilization efficiency
ACCOUNTING MANAGEMENT
 Involves tracking individual’s utilization and grouping of network resources to ensure that users have
sufficient resources
 Involves granting or removing permission for access to the network
 Identifying consumers and suppliers of network resources - users and groups
 Mapping network resources consumption to customer identity
 Billing
NETWORK MANAGEMENT
PROTOCOLS
 A simple protocol defines common data formats and parameters
and allows for easy retrieval of information
 A complex protocol adds some change capability and security
 An advanced protocol remotely executes network management
tasks, is independent of the network protocol layer
 Managed objects: functions provided by the network
 Element Management Systems (EMS): managing a specific portion
of the network (may manage a sync lines, multiplexers, routers)
 Managers of Manager Systems (Mom): integrate together
information from several EMS
NETWORK MANAGEMENT PROTOCOLS
So where is technology today?
• The most common protocols are:
• SNMP (Simple Network Management Protocol)
• SNMPv2 (SNMP version 2)
• CMIS/CMIP (Common Management Information Services/Common Management
Information Protocol)
NETWORK MANAGEMENT
REQUIREMENTS
•Example of approach
Controlling strategic assets
Controlling complexity
Improving service
Balancing various needs: performance,
availability, security, cost
Reducing downtime
Controlling costs
ADVANTAGES OF USING SNMP
Standardized
universally supported
Extendible
Portable
allows distributed management access
lightweight protocol
SNMP
 There are two approaches for the management system
to obtain information from SNMP
Traps
Polling
TRAP
T R A P S A R E U N R E Q U E S T E D E V E N T R E P O R T S T H AT A R E S E N T TO A
M A N A G E M E N T S Y S T E M BY A N S N M P A G E N T P R O C E S S
W H E N A T R A P PA B L E E V E N T O C C U RS , A T R A P M E S S A G E I S G E N E R AT E D BY
T H E A G E N T A N D I S S E N T TO A T R A P D E S T I N AT I O N ( A S P E C I F I C ,
C O N F I G U R E D N E T WO R K A D D R E S S )
M A N Y E V E N T S C A N B E C O N F I G U R E D TO S I G N A L A T R A P, L I K E A N E T WO R K
C A B L E FA U LT, FA I L I N G N I C O R H A R D D R I V E , A “G E N E R A L P R OT E C T I O N
FA U LT ”, O R A P OW E R S U P P LY FA I LU R E
T R A P S C A N A L S O B E T H R OT T L E D - - YO U C A N L I M I T T H E N U M B E R O F
T R A P S S E N T P E R S E C O N D F R O M T H E A G E N T
T R A P S H AV E A P R I O R I T Y A S S O C I AT E D W I T H T H E M - - C R I T I C A L , M A J O R ,
M I N O R , WA R N I N G , M A R G I N A L , I N F O R M AT I O N A L , N O R M A L , U N K N OW N
TRAP RECEIVERS
•Traps are received by a management application.
•Management applications can handle the trap in a few ways:
•Poll the agent that sent the trap for more information about the event, and the status of the rest of the
machine.
•Log the reception of the trap.
•Completely ignore the trap.
Management applications can be set up to send off an e-mail, call a voice
mail and leave a message, or send an alpha-numeric page to the network
administrator’s pager that says:
Your PDC just Blue-Screened at 03:46AM. Have a nice day. :)
SNMP MIBS
 Traps are unrequested event reports that are sent to a management system by an SNMP agent process
 When a trappable event occurs, a trap message is generated by the agent and is sent to a trap
destination (a specific, configured network address)
 Many events can be configured to signal a trap, like a network cable fault, failing NIC or Hard Drive, a
“General Protection Fault”, or a power supply failure
 Traps can also be throttled -- You can limit the number of traps sent per second from the agent
 Traps have a priority associated with them -- Critical, Major, Minor, Warning, Marginal, Informational,
Normal, Unknown
SNMP MIBS
•Types of MIB Modules
 Standard: These are the standard MIBS currently designed to capture the core
aspects of the particular technology
 Experimental: Temporary and if achieves standardization then it is placed in
the standard module
 Enterprise-specific: Vendor specific MIBS that provide additional management
capabilities for those features that require it
CIMS/CIMP
THE OSI FRAMEWORK IS AN OBJECT-ORIENTED PARADIGM
Objects have attributes, generate events, and perform
actions
Objects are scoped by numerous hierarchies for the
purpose of inheritance or containment
ALTHOUGH THE OSI MODEL “SOUNDS NEAT”, IT IS MUCH
MORE COMPLICATED AND IS NOT VERY COMMON
THANK YOU

More Related Content

Similar to Rutvik NETWORK MANAGEMENT PROJECT PPT FOR BUSINESS

1st know the features & functions of information systems
1st know the features & functions of information systems1st know the features & functions of information systems
1st know the features & functions of information systems
Bronte666
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
AssadLeo1
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
webhostingguy
 

Similar to Rutvik NETWORK MANAGEMENT PROJECT PPT FOR BUSINESS (20)

1st know the features & functions of information systems
1st know the features & functions of information systems1st know the features & functions of information systems
1st know the features & functions of information systems
 
04 Client Server Technology
04 Client Server Technology04 Client Server Technology
04 Client Server Technology
 
Smart Process Automation - Primer on Implementation and Return on Investment
Smart Process Automation - Primer on Implementation and Return on InvestmentSmart Process Automation - Primer on Implementation and Return on Investment
Smart Process Automation - Primer on Implementation and Return on Investment
 
Case Study - Monitoring and Evaluating the working of Telenor and ZTE
Case Study - Monitoring and Evaluating the working of Telenor and ZTECase Study - Monitoring and Evaluating the working of Telenor and ZTE
Case Study - Monitoring and Evaluating the working of Telenor and ZTE
 
Lost cause analysis - Alarm Management
Lost cause analysis - Alarm ManagementLost cause analysis - Alarm Management
Lost cause analysis - Alarm Management
 
Monitoring of computers
Monitoring of computers Monitoring of computers
Monitoring of computers
 
FIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident ResponseFIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident Response
 
itam_slc
itam_slcitam_slc
itam_slc
 
IIS 5/6 Install and Lockdown v3
IIS 5/6 Install and Lockdown v3IIS 5/6 Install and Lockdown v3
IIS 5/6 Install and Lockdown v3
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
MITRE-Module 3 Slides.pdf
MITRE-Module 3 Slides.pdfMITRE-Module 3 Slides.pdf
MITRE-Module 3 Slides.pdf
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
 
Best practices for building network operations center
Best practices for building  network operations centerBest practices for building  network operations center
Best practices for building network operations center
 
Normal accidents and outpatient surgeries
Normal accidents and outpatient surgeriesNormal accidents and outpatient surgeries
Normal accidents and outpatient surgeries
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
A case for Managed Detection and Response
A case for Managed Detection and ResponseA case for Managed Detection and Response
A case for Managed Detection and Response
 
PAC 2020 Santorin - Stijn Schepers
PAC 2020 Santorin - Stijn SchepersPAC 2020 Santorin - Stijn Schepers
PAC 2020 Santorin - Stijn Schepers
 
Snmp
SnmpSnmp
Snmp
 
ERP IMPLEMENTATION
ERP IMPLEMENTATION ERP IMPLEMENTATION
ERP IMPLEMENTATION
 
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural Analytics
 

Recently uploaded

如何办理加州大学伯克利分校毕业证(UCB毕业证)成绩单留信学历认证
如何办理加州大学伯克利分校毕业证(UCB毕业证)成绩单留信学历认证如何办理加州大学伯克利分校毕业证(UCB毕业证)成绩单留信学历认证
如何办理加州大学伯克利分校毕业证(UCB毕业证)成绩单留信学历认证
a8om7o51
 
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
zifhagzkk
 
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
dq9vz1isj
 
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
Amil baba
 
edited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfedited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdf
great91
 
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotecAbortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
yulianti213969
 
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
jk0tkvfv
 
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
acoha1
 
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
fztigerwe
 

Recently uploaded (20)

如何办理加州大学伯克利分校毕业证(UCB毕业证)成绩单留信学历认证
如何办理加州大学伯克利分校毕业证(UCB毕业证)成绩单留信学历认证如何办理加州大学伯克利分校毕业证(UCB毕业证)成绩单留信学历认证
如何办理加州大学伯克利分校毕业证(UCB毕业证)成绩单留信学历认证
 
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
 
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
如何办理(Dalhousie毕业证书)达尔豪斯大学毕业证成绩单留信学历认证
 
Northern New England Tableau User Group (TUG) May 2024
Northern New England Tableau User Group (TUG) May 2024Northern New England Tableau User Group (TUG) May 2024
Northern New England Tableau User Group (TUG) May 2024
 
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
1:1原版定制伦敦政治经济学院毕业证(LSE毕业证)成绩单学位证书留信学历认证
 
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...
 
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
 
edited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfedited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdf
 
社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token Prediction社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token Prediction
 
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotecAbortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
 
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
 
MATERI MANAJEMEN OF PENYAKIT TETANUS.ppt
MATERI  MANAJEMEN OF PENYAKIT TETANUS.pptMATERI  MANAJEMEN OF PENYAKIT TETANUS.ppt
MATERI MANAJEMEN OF PENYAKIT TETANUS.ppt
 
Digital Marketing Demystified: Expert Tips from Samantha Rae Coolbeth
Digital Marketing Demystified: Expert Tips from Samantha Rae CoolbethDigital Marketing Demystified: Expert Tips from Samantha Rae Coolbeth
Digital Marketing Demystified: Expert Tips from Samantha Rae Coolbeth
 
Aggregations - The Elasticsearch "GROUP BY"
Aggregations - The Elasticsearch "GROUP BY"Aggregations - The Elasticsearch "GROUP BY"
Aggregations - The Elasticsearch "GROUP BY"
 
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
如何办理(UCLA毕业证书)加州大学洛杉矶分校毕业证成绩单学位证留信学历认证原件一样
 
Data Analysis Project Presentation : NYC Shooting Cluster Analysis
Data Analysis Project Presentation : NYC Shooting Cluster AnalysisData Analysis Project Presentation : NYC Shooting Cluster Analysis
Data Analysis Project Presentation : NYC Shooting Cluster Analysis
 
How to Transform Clinical Trial Management with Advanced Data Analytics
How to Transform Clinical Trial Management with Advanced Data AnalyticsHow to Transform Clinical Trial Management with Advanced Data Analytics
How to Transform Clinical Trial Management with Advanced Data Analytics
 
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
如何办理(UPenn毕业证书)宾夕法尼亚大学毕业证成绩单本科硕士学位证留信学历认证
 
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
 
NOAM AAUG Adobe Summit 2024: Summit Slam Dunks
NOAM AAUG Adobe Summit 2024: Summit Slam DunksNOAM AAUG Adobe Summit 2024: Summit Slam Dunks
NOAM AAUG Adobe Summit 2024: Summit Slam Dunks
 

Rutvik NETWORK MANAGEMENT PROJECT PPT FOR BUSINESS

  • 2. CONCEPTS T H E I N T E R N AT I O N A L O R G A N I Z AT I O N F O R S TA N D A R D I Z AT I O N ( I S O ) N E T W O R K M A N A G E M E N T F O R U M D I V I D E D N E T W O R K M A N A G E M E N T I N T O F I V E F U N C T I O N A L A R E A S : FA U LT M A N A G E M E N T C O N F I G U R AT I O N M A N A G E M E N T S E C U R I T Y M A N A G E M E N T P E R F O R M A N C E M A N A G E M E N T A C C O U N T I N G M A N A G E M E N T
  • 3. NETWORK MANAGEMENT  Network management is the process of controlling a complex data network to maximize its efficiency and productivity  The overall goal of network management is to help with the complexity of a data network and to ensure that data can go across it with maximum efficiency and transparency to the users
  • 4. FAULT MANAGEMENT IS THE PROCESS OF LOCATING PROBLEMS, OR FAULTS, ON THE DATA NETWORK IT INVOLVES THE FOLLOWING STEPS: Detect the fault Determine exactly where the fault is Isolate the rest of the network from the failure so that it can continue to function Reconfigure or modify the network in such a way as to minimize the impact Repair or replace the failed components Tests: connectivity, data integrity, response-time, ….
  • 5. CONFIGURATION MANAGEMENT  THE CONFIGURATION OF CERTAIN NETWORK DEVICES CONTROLS THE BEHAVIOR OF THE DATA NETWORK  CONFIGURATION MANAGEMENT IS THE PROCESS OF FINDING AND SETTING UP (CONFIGURING) THESE CRITICAL DEVICES  INVOLVES FOLLOWING STEPS:  Installation of new hardware/software  Tracking changes in control configuration  Who, what and why? - network topology  Revert/undo changes  Change management  Configuration audit  Does it do what was intended
  • 6. SECURITY MANAGEMENT  Is the process of controlling access to information on the data network  Provides a way to monitor access points and records information on a periodic basis  Provides audit trails and sounds alarms for security breaches  Several security measures are provided:  Security services: generating, distributing, storing of encryption keys for services  Exception alarm generation, detection of problems  Uniform access control to resources  Backups, data security  Security logging
  • 7. PERFORMANCE MANAGEMENT  Involves measuring the performance of the network hardware, software, and media  Examples of measured activities are: › What is the level of capacity utilization? › Is there excessive traffic? › Has throughput been reduced to unacceptable levels? › Are there bottlenecks? › Is response time increasing? › What is the error rates? › Indicators: availability, response time, accuracy service throughput, utilization efficiency
  • 8. ACCOUNTING MANAGEMENT  Involves tracking individual’s utilization and grouping of network resources to ensure that users have sufficient resources  Involves granting or removing permission for access to the network  Identifying consumers and suppliers of network resources - users and groups  Mapping network resources consumption to customer identity  Billing
  • 9. NETWORK MANAGEMENT PROTOCOLS  A simple protocol defines common data formats and parameters and allows for easy retrieval of information  A complex protocol adds some change capability and security  An advanced protocol remotely executes network management tasks, is independent of the network protocol layer  Managed objects: functions provided by the network  Element Management Systems (EMS): managing a specific portion of the network (may manage a sync lines, multiplexers, routers)  Managers of Manager Systems (Mom): integrate together information from several EMS
  • 10. NETWORK MANAGEMENT PROTOCOLS So where is technology today? • The most common protocols are: • SNMP (Simple Network Management Protocol) • SNMPv2 (SNMP version 2) • CMIS/CMIP (Common Management Information Services/Common Management Information Protocol)
  • 11. NETWORK MANAGEMENT REQUIREMENTS •Example of approach Controlling strategic assets Controlling complexity Improving service Balancing various needs: performance, availability, security, cost Reducing downtime Controlling costs
  • 12. ADVANTAGES OF USING SNMP Standardized universally supported Extendible Portable allows distributed management access lightweight protocol
  • 13. SNMP  There are two approaches for the management system to obtain information from SNMP Traps Polling
  • 14. TRAP T R A P S A R E U N R E Q U E S T E D E V E N T R E P O R T S T H AT A R E S E N T TO A M A N A G E M E N T S Y S T E M BY A N S N M P A G E N T P R O C E S S W H E N A T R A P PA B L E E V E N T O C C U RS , A T R A P M E S S A G E I S G E N E R AT E D BY T H E A G E N T A N D I S S E N T TO A T R A P D E S T I N AT I O N ( A S P E C I F I C , C O N F I G U R E D N E T WO R K A D D R E S S ) M A N Y E V E N T S C A N B E C O N F I G U R E D TO S I G N A L A T R A P, L I K E A N E T WO R K C A B L E FA U LT, FA I L I N G N I C O R H A R D D R I V E , A “G E N E R A L P R OT E C T I O N FA U LT ”, O R A P OW E R S U P P LY FA I LU R E T R A P S C A N A L S O B E T H R OT T L E D - - YO U C A N L I M I T T H E N U M B E R O F T R A P S S E N T P E R S E C O N D F R O M T H E A G E N T T R A P S H AV E A P R I O R I T Y A S S O C I AT E D W I T H T H E M - - C R I T I C A L , M A J O R , M I N O R , WA R N I N G , M A R G I N A L , I N F O R M AT I O N A L , N O R M A L , U N K N OW N
  • 15. TRAP RECEIVERS •Traps are received by a management application. •Management applications can handle the trap in a few ways: •Poll the agent that sent the trap for more information about the event, and the status of the rest of the machine. •Log the reception of the trap. •Completely ignore the trap. Management applications can be set up to send off an e-mail, call a voice mail and leave a message, or send an alpha-numeric page to the network administrator’s pager that says: Your PDC just Blue-Screened at 03:46AM. Have a nice day. :)
  • 16. SNMP MIBS  Traps are unrequested event reports that are sent to a management system by an SNMP agent process  When a trappable event occurs, a trap message is generated by the agent and is sent to a trap destination (a specific, configured network address)  Many events can be configured to signal a trap, like a network cable fault, failing NIC or Hard Drive, a “General Protection Fault”, or a power supply failure  Traps can also be throttled -- You can limit the number of traps sent per second from the agent  Traps have a priority associated with them -- Critical, Major, Minor, Warning, Marginal, Informational, Normal, Unknown
  • 17. SNMP MIBS •Types of MIB Modules  Standard: These are the standard MIBS currently designed to capture the core aspects of the particular technology  Experimental: Temporary and if achieves standardization then it is placed in the standard module  Enterprise-specific: Vendor specific MIBS that provide additional management capabilities for those features that require it
  • 18. CIMS/CIMP THE OSI FRAMEWORK IS AN OBJECT-ORIENTED PARADIGM Objects have attributes, generate events, and perform actions Objects are scoped by numerous hierarchies for the purpose of inheritance or containment ALTHOUGH THE OSI MODEL “SOUNDS NEAT”, IT IS MUCH MORE COMPLICATED AND IS NOT VERY COMMON