Telecommunications Management 273-436/635 Network Management.

Slides:



Advertisements
Similar presentations
CSE 413: Computer Networks
Advertisements

Steve Lewis J.D. Edwards & Company
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
IBM SMB Software Group ® ibm.com/software/smb Maintain Hardware Platform Health An IT Services Management Infrastructure Solution.
Distributed Data Processing
Network Management - Introduction. References Communications Network Management, Kornel Terplan Prentice Hall 1992, 2 nd ed. Managing Inter networks with.
Chapter 19: Network Management Business Data Communications, 5e.
CIS : Network Management. Introduction Network, associated resources and distributed applications indispensable Complex systems —More things can.
Network Management Basics Network management requirements OSI Management Functional Areas –Network monitoring: performance, fault, accounting –Network.
Introduction to Network Management
Network+ Guide to Networks, Fourth Edition
Network Management Functions
Chapter 19: Network Management Business Data Communications, 4e.
POSTECH DP&NM Lab 1 Overview of Network Management J. Won-Ki Hong Dept. of Computer Science and Engineering POSTECH
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Manajemen Jaringan dan Network Security Pertemuan 26 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Documenting the Existing Network - Starting Points IACT 418 IACT 918 Corporate Network Planning.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Managing the Information Technology Resource Jerry N. Luftman
Chapter 15 Chapter 15: Network Monitoring and Tuning.
Distributed Systems Management What is management? Strategic factors (planning, control) Tactical factors (how to do support the strategy practically).
1 Pertemuan 26 Manajemen Jaringan dan Network Security Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Network Management Management Tools –Desirable features Management Architectures Simple Network Management Protocol.
Maintaining and Updating Windows Server 2008
Chapter 13 Network Management and Operations. Agenda Objectives Scope Functions Software Security Physical Facility Staffing.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
© 2001 by Prentice Hall1-1 Local Area Networks, 3rd Edition David A. Stamper Part 4: Installation and Management Chapter 12 LAN Administration: Reactive.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
Overview SAP Basis Functions. SAP Technical Overview Learning Objectives What the Basis system is How does SAP handle a transaction request Differentiating.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Oracle10g RAC Service Architecture Overview of Real Application Cluster Ready Services, Nodeapps, and User Defined Services.
Common Devices Used In Computer Networks
1. There are different assistant software tools and methods that help in managing the network in different things such as: 1. Special management programs.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.
An automated diagnostic system to streamline DSM project maintenance Johan du Plessis 15 August 2012.
Module 7: Fundamentals of Administering Windows Server 2008.
Service Transition & Planning Service Validation & Testing
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
1 Network Monitoring Mi-Jung Choi Dept. of Computer Science KNU
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
SNMP Simple Network Management Protocol SNMP Simple Network Management Protocol Haris Ribic.
Chapter 19: Network Management Business Data Communications, 4e.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
Network Management. Network management means monitoring and controlling the network so that it is working properly and providing value to its users. A.
1 Overview of Network Management Mi-Jung Choi Dept. of Computer Science KNU
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
VMware vSphere Configuration and Management v6
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Introduction to Network Management.
Module 9 Planning and Implementing Monitoring and Maintenance.
Network management system
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
Manajemen Jaringan, Sukiswo ST, MT 1 Overview of Network Management Sukiswo
Maintaining and Updating Windows Server 2008 Lesson 8.
Keimyung University 1 Overview of Network Management Hong Taek Ju College of Information and Communication Keimyung University Tel:
Powerpoint Templates Data Communication Muhammad Waseem Iqbal Lecture # 07 Spring-2016.
Chapter 19: Network Management
Network Management Functions
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
An Introduction to Computer Networking
Database System Architectures
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

Telecommunications Management /635 Network Management

Grant Need for Network Management èNetworks and distributed systems are becoming pervasive èNetworks and distributed applications are critical to organizational performance èMore things can go wrong in a network environment to disable the network or downgrade performance èHuman effort alone is not sufficient to manage complex networks èAutomated network management tools are essential

Grant Key areas of Network Management (OSI) èFault management èAccounting management èConfiguration and name management èPerformance management èSecurity management

Grant Fault management The facilities that enable the detection, isolation, and correction of abnormal operation of the OSI environment èFault: an abnormal condition tha t requires management attention to repair èWhen faults occur: l Determine where the fault is l Isolate rest of the network from the failure so it can continue functioning without interruption l Reconfigure or modify network l Repair or replace failed components

Grant Fault management èUser Requirements l Fast and reliable problem resolution l Immediate notification that a problem has occurred l Information on network status and scheduled and unscheduled service disruptions èEntails: l Proactive, rapid and reliable fault detection and diagnosis l Redundant capacity to provide alternatives l Problem tracking and control

Grant Accounting management èTracking network use for l cost accounting l abuse of access privileges l Network use efficiency l Planning network growth èUser requirements l specifying the kinds of information to be recorded at each node and when they should be sent to higher-level management nodes l Specifying the algorithms to be used in calculating charges l Determining and monitoring access privileges to accounting information

Grant Configuration and name management èConcerned with l initializing a network and gracefully shutting down all or part of it. l maintaining, adding, updating the relationships among components èUser requirements l automated startup or shutdown of network operations l identification of network components and desired connectivity level l Ability to change and reconfigure networks in response to new needs and performance evaluation

Grant Performance management èNetwork communications need to take place within certain performance limits èPerformance management: l Monitoring l Controlling èPerformance issues l Level of capacity utilization l Nature of network traffic: excessive or not l Level of throughput l Existence of bottlenecks l Response time

Grant Performance management èUser requirements l Network performance history (response times and reliability l Network performance statistics to assist in planning, managing and maintaining large networks l Statistics help managers to: recognize potential bottlenecksrecognize potential bottlenecks take corrective action such as changing routing tables to balance or redistribute traffic loadtake corrective action such as changing routing tables to balance or redistribute traffic load

Grant Security management èConcerned with l Generating, distributing, and storing encryption keys l Maintaining and distributing password and access control information l Monitoring and controlling access to computer networks l Collecting, storing, examining audit records and security logs èUser requirements l Security of information l Security and integrity of network facilities

Grant Network management systems èAn integrated collection of tools for network monitoring and control, which contains a l Single, user-friendly operator interface l Minimal amount of separate equipment èConsists of incremental hardware and software implemented on existing network components èSoftware resides on host computer èViews the entire network as a unified architecture

Grant Network management entity (NME) èSoftware at each node that perform network management tasks èTasks performed include l Collection of statistics on communications and network-related activities l Local storage of statistics l Response to commands from the network control center l Sending messages to the network control center when local conditions change significantly

Grant Network management application (NMA) èCollection of software that controls network management activity throughout the network èIncludes an operator interface to allow an authorized user to manage the network èResponds to user commands and issues commands to NMEs throughout the network èUses the same communication architecture as other distributed applications

Grant Agents èEnd systems that support user applications l host computers l servers l workstations èNodes that provide a communications service l front-end processors l cluster controllers l bridges l routers

Grant SNA network management architecture èProblem management l problem determination, problem diagnosis, problem bypass and recovery, problem resolution, problem tracking and control èPerformance and accounting management l response-time monitoring, availability monitoring, utilization monitoring, component delay monitoring, performance tuning, performance tracking and control, accounting

Grant SNA network management architecture èConfiguration management l physical/logical resource identification, resource relationship identification èChange management l software change control, microcode change control, hardware change control

Grant Technical control èAvailability - most important characteristic of a network and its services èIncreasing reliance on networks make downtime costly èNetwork technical control involves l Automatic and remote systems testing and monitoring to reduce downtime l Restoring and reconfiguring the system when it fails l Providing network performance and functioning statistics to facilitate

Grant Technical control approaches èComponent-level technical control l monitors network activity at the point of attachment of host systems to the network l Line monitors digitaldigital analoganalog l Protocol analyzers