H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

Distributed Data Processing
Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens.
Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
Chapter 19: Network Management Business Data Communications, 5e.
Telecommunications Management /635 Network Management.
Network Management Basics Network management requirements OSI Management Functional Areas –Network monitoring: performance, fault, accounting –Network.
XProtect® Expert 2013 Product presentation
Network+ Guide to Networks, Fourth Edition
Chapter 19: Network Management Business Data Communications, 4e.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Managing Data Resources
Database Software File Management Systems Database Management Systems.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Chapter 3 : Distributed Data Processing
Chapter 3 : Distributed Data Processing
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
© Copyright 1997, The University of New Mexico The University of New Mexico H-1 Network Management Network management is the process of controlling a complex.
Maintaining and Updating Windows Server 2008
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
WORKFLOWS IN CLOUD COMPUTING. CLOUD COMPUTING  Delivering applications or services in on-demand environment  Hundreds of thousands of users / applications.
Maintaining Windows Server 2008 File Services
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Database Design – Lecture 16
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
CLIENT SERVER VS PEER TO PEER Networks. Lesson objectives Candidates should understand the advantages and disadvantages of: client server networks peer.
Without reference, identify principles relating to Computer Networks with at least 70 percent accuracy.
◦ What is an Operating System? What is an Operating System? ◦ Operating System Objectives Operating System Objectives ◦ Services Provided by the Operating.
NETWORK MANAGEMENT Course Supervisor MUHAMMAD KHALID KHAN.
Additional Security Tools Lesson 15. Skills Matrix.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
LAN Switching and Wireless – Chapter 1
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
INFORMATION MANAGEMENT Unit 2 SO 4 Explain the advantages of using a database approach compared to using traditional file processing; Advantages including.
FireProof. The Challenge Firewall - the challenge Network security devices Critical gateway to your network Constant service The Challenge.
Management Platforms. SMFA In TMN the intent is to define a realitivly common set of what can be supported by CMISE network elements and managed via a.
1 Chapter 12 Enterprise Computing. Objectives Overview Discuss the special information requirements of an enterprise-sized corporation Identify information.
CENTRALISED AND CLIENT / SERVER DBMS. Topics To Be Discussed………………………. (A) Centralized DBMS (i) IntroductionIntroduction (ii) AdvantagesAdvantages (ii)
Distributed database system
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Chapter 13: LAN Maintenance. Documentation Document your LAN so that you have a record of equipment location and configuration. Documentation should include.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Topic Distributed DBMS Database Management Systems Fall 2012 Presented by: Osama Ben Omran.
Introduction to Active Directory
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
IT 5433 LM1. Learning Objectives Understand key terms in database Explain file processing systems List parts of a database environment Explain types of.
Maintaining and Updating Windows Server 2008 Lesson 8.
An Introduction to Local Area Networks An Overview of Peer-to-Peer and Server-Based Models.
Lecture 11. Switch Hardware Nowadays switches are very high performance computers with high hardware specifications Switches usually consist of a chassis.
Chapter 19: Network Management
Data and database administration
TECHNOLOGY GUIDE THREE
Database Systems: Design, Implementation, and Management Tenth Edition
Storage Virtualization
TECHNOLOGY GUIDE THREE
An Introduction to Computer Networking
Network+ Guide to Networks, Fourth Edition
Database System Architectures
Introducing NTFS Reliability Security Long file names Efficiency
TECHNOLOGY GUIDE THREE
Presentation transcript:

H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall goal of network management is to help with the complexity of a data network and to ensure that data can go across it with maximum efficiency and transparency to the users

H-2 Network Management The International Organization for Standardization (ISO) Network Management Forum divided network management into five functional areas: –Fault Management –Configuration Management –Security Management –Performance Management –Accounting Management

H-3 Fault Management Is the process of locating problems, or faults, on the data network It involves the following steps: –Discover the problem –Isolate the problem –Fix the problem (if possible)

H-4 Configuration Management The configuration of certain network devices controls the behavior of the data network Configuration management is the process of finding and setting up (configuring) these critical devices

H-5 Security Management Is the process of controlling access to information on the data network Provides a way to monitor access points and records information on a periodic basis Provides audit trails and sounds alarms for security breaches

H-6 Performance Management Involves measuring the performance of the network hardware, software, and media Examples of measured activities are: –Overall throughput –Percentage utilization –Error rates –Response time

H-7 Accounting Management Involves tracking individual’s utilization and grouping of network resources to ensure that users have sufficient resources Involves granting or removing permission for access to the network

H-8 Network Management Protocols These protocols do not state how to accomplish the goals of network management They give methods to monitor and configure network devices The challenge to analyze the information in an effective manner rests with software engineers who write network management applications

H-9 Network Management Architectures The Network Management Platform can use various architectures to provide functionality The 3 most common are: –Centralized –Hierarchical –Distributed

H-10 Centralized Architecture The Network Management Platform resides on a single computer system For full redundancy, the computer system is backed up by another system Can allow access and forward events to other consoles on network

H-11 Centralized Architecture Used for: –All network alerts & events –All network information –Access all management applications

H-12 Centralized Architecture Pros: –Single location to view events & alerts –Single place to access network management applications and information –Security is easier to maintain

H-13 Centralized Architecture Cons: –Single system is not redundant or fault tolerant –As network elements are added, may be difficult or expensive to scale system to handle load –Having to query all devices from a single location

H-14 Hierarchical Architecture Uses multiple computer systems –One system acting as the central server –Other systems working as clients Central server requires backups for redundancy

H-15 Hierarchical Architecture Key features: –Not dependent on a single system –Distribution of network management tasks –Network monitoring distributed throughout network –Centralized information storage

H-16 Hierarchical Architecture Pros: –Multiple systems to manage the network Cons: –Information gathering is more difficult and time consuming –The list of managed devices managed by each client needs to be predetermined and manually configured

H-17 Distributed Architecture Combines the centralized and hierarchical architectures Uses multiple peer network management systems –Each peer can have a complete database –Each peer can perform various tasks and report back to a central system

H-18 Distributed Architecture Contains advantages from central & hierarchical architectures –Single location for all network information, alerts & events –Single location to access all management applications –Not dependent on a single system –Distribution of network management tasks –Distribution of network monitoring throughout the network