Network management system

Slides:



Advertisements
Similar presentations
1 Introducing the Specifications of the Metro Ethernet Forum.
Advertisements

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
Operating System Customization
© 2005, QEI Inc. all characteristics subject to change. For clarity purposes, some displays may be simulated. Any trademarks mentioned remain the exclusive.
Chapter 19: Network Management Business Data Communications, 4e.
Documenting the Existing Network - Starting Points IACT 418 IACT 918 Corporate Network Planning.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
1 Pertemuan 12 TMN Matakuliah: H0372/Manajemen Jaringan Tahun: 2005 Versi: 1/0.
Configuration Management Fault Management Performance Management Accounting Management Security Management.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
Factors to be taken into account when designing ICT Security Policies
Network security policy: best practices
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
SOE and Application Delivery Gwenael Moreau, Abbotsleigh.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Information Systems Security Computer System Life Cycle Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Chapter Fourteen Windows XP Professional Fault Tolerance.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Chapter 2 Securing Network Server and User Workstations.
Chapter 13: LAN Maintenance. Documentation Document your LAN so that you have a record of equipment location and configuration. Documentation should include.
Network management system
Module 10: Implementing Administrative Templates and Audit Policy.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
© ITT Educational Services, Inc. All rights reserved. IS3120 Network Communications Infrastructure Unit 10 Network Management—FCAPS.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Tunis, Tunisia, 28 April 2014 Requirements of network virtualization for Future Networks Nozomu Nishinaga New Generation Network Laboratory Network Research.
ConfigMgr Discovering and Organizing Resources Mariusz Zarzycki, Phd, MCT, MCTS, MCITP, MCSE, MCSA.....
Distributed Systems Architectures Chapter 12. Objectives  To explain the advantages and disadvantages of different distributed systems architectures.
FCAPS The Seventh Meeting. TMN (Telecommunication Management Network) Reference Model & FCAPS.
Omniran CF00 1 Investigation on Accounting and Monitoring Date: [ ] Authors: NameAffiliationPhone Hao WangFujitsu R&D
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
ITEC 275 Computer Networks – Switching, Routing, and WANs
Review of IT General Controls
Chapter 19: Network Management
Configuration Management
Create setup scripts simply and easily.
Working at a Small-to-Medium Business or ISP – Chapter 8
OGF PGI – EDGI Security Use Case and Requirements
CIS 332 Course Experience Tradition / snaptutorial.com
OAIS Producer (archive) Consumer Management
Network management system
Relation between information modeling and network operation
Network Load Balancing
IT Roles and Responsibilities
Network Management Functions
THE STEPS TO MANAGE THE GRID
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Tutorial 13 Windows Registry.
Lec3: Network Management
Introduction to Operating Systems
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
Networking for Home and Small Businesses – Chapter 2
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
Functions of an operating system
Networking for Home and Small Businesses – Chapter 2
Bethesda Cybersecurity Club
DEPLOYING SECURITY CONFIGURATION
PLANNING A SECURE BASELINE INSTALLATION
Chapter 15: Network Monitoring and Tuning
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Lec1: Introduction to Network Management
Kyrene Student Acceptable Use Policy Technology Guidelines
Presentation transcript:

Network management system NET324D Network management system

Functions of network management system Configuration management Fault Performance Security Accounting

Management Functional Area (MFA Management Function Set Groups Configuration Network planning, engineering, and installation; service planning and negotiation; discovery; provisioning; status and control Fault Alarm surveillance, fault localization and correlation, testing, trouble administration, network recovery Performance Performance monitoring and control, performance analysis and trending, quality assurance Security Access control and policy; customer profiling; attack detection, prevention, containment, and recovery; security administration Accounting Usage measurement, collection, aggregation, and mediation; tariffing and pricing

Configuration Management Desktop computers may be replaced by others Application software may be updated to a newer version Users may move from one group to another The role of configuration management is to know at any time the status of each entity and its relation to other entities

Configuration Management Configuration Management subsystems: Reconfiguration Documentation

Configuration Management (reconfiguration) Reconfiguration means adjusting the network components and features, and it has three types: Hardware reconfiguration Software reconfiguration User-account reconfiguration

Configuration Management (reconfiguration) Determine the type of reconfiguration for each? An operating system may need updating. A subnetwork may be added or removed from the network A router may need to be moved to another part of the network A user may has read and write permission with regard to some files, but only read permission with regard to other files

Configuration Management (Documentation) The original network configuration and each subsequent change must be recorded meticulously There must de documentation for HW, SW and user accounts

Configuration Management (Documentation) Hardware documentation involves to sets of documents: Maps Specifications

Configuration Management (Documentation)

Configuration Management (Documentation) Network maps: Maps track each piece of hardware and its connection to the network There can be one general map that shows the logical relationship between each subnetwork There can also be a second general map that shows the physical location of each subnetwork For each subnetwork, then, there is one or more maps that show all pieces of equipment

Configuration Management (Documentation) Network specifications There must be a set of specifications for each pieces of hardware connected to the network. These specifications must include information such as Hardware type Serial number Vendor ( address and phone number) Time of purchase Warranty information

Configuration Management (Documentation) Software documentation: It includes information such as The software type The version The time installed The license agreement

Configuration Management (Documentation) User account documentation: Most operating systems have a utility that allows the documentation of user accounts and their privileges The management must make sure that the files with this information are updated and secured Some OS record access privileges in two documents: one shows all files and access types fore each user, the other shows the list of users that have a particular access to a file

Fault management Reactive fault management detecting isolating correcting documenting Reactive fault management

Fault management Proactive fault management It tries to prevent fault from occurring

Determine the type of fault management needed for each? If a manufacturer specifies a lifetime for a component, it is a good strategy to replace it before that time Damaged communication medium The system stops working properly

Reference: Data Communications and networking