Preview

Netw420 Week 4 lab report

Powerful Essays
Open Document
Open Document
726 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Netw420 Week 4 lab report
Alarms

DeVry University

NETW420

Alexander Davis

Jun 1, 2014

This week’s assignment is to describe various event categories and event based transactions that are used by the Network Management System. It would be impossible to categorize all potential causes for alarms in all existing network systems however, understanding some common alerts and categories is essential for any network manager.
Many Network Management Systems have a log and event manager that collects data and logs event data from all of the devices on the network and performs real-time correlation. When an event is initiated an agent initiates an interaction by creating an object describing an event. Event messages from the various distributed components are processed based on a predefined policy. Most event alerts can be categorized as an informational alert, a warning alert or a critical alert.
An Informational alerts are simply informal messages from different components that are integrated into the EMS LOG. Alerts are delivered to the EMS using Syslog daemon protocol or SNMP traps. The EMS accepts alerts from any kind of monitoring tool or application as long as a predefined protocol is followed. Network managers can define and implement notification policies based upon the criticality of a device or system within Alert Center. EMS logs can also be used as a diagnostic tool when problems occur.
Warning alerts represent items that require attention. When the EMS receives warning messages, they are logged like informational messages and a trouble ticket is created. Trouble ticket system can provide information on the number of alerts received and the speed with which these alerts are addressed.
Critical alerts represent items that require immediate attention. Critical events are also known as "actionable" events. While informational and warning alerts scroll off the EMS with no need for the operator to watch them, critical alerts posted to the held

You May Also Find These Documents Helpful

  • Powerful Essays

    References: 267. Beijtlich, R. (n.d.). The Practice of Network Security Monitoring: understanding incident detection and response. [Books24x7 Version.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    NETW410 Week 2 Lab Report

    • 349 Words
    • 3 Pages

    The technical goals are to build a new IT section onto the admin building to make sure all the servers are centralized. Connect all buildings to the new IT section. Make sure to provide wireless access for all the students in classrooms. Provide high speed wired internet to all faculty offices. Make sure there is a centralized back up of all data. Replace the old phone system with VIOP.…

    • 349 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    A Network Management system, or NMS is a collection of software to be used as tools to monitor a network of computers. This software performs multiples tasked specifically designed to help keep a network managed properly and running smoothly. There are many components that can make up a Network management system. With all the options out there a network administrator is able to customize what features to utilize depending on their specific needs. This allows for real-time monitoring as well as report generated analyses. However, there are a few cornerstone components that should be explored. The Manager, Agent, MIB, Probe, SNMP, and RMON are probably the most valued components.…

    • 771 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    ISSC 340

    • 275 Words
    • 2 Pages

    The functions and characteristics of a network operating system or (NOS) for short are explained by the following;…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hacking2E Lab07 AW

    • 330 Words
    • 2 Pages

    6. Why is it important to use protocol capture tools and protocol analyzers as an information systems…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    p1 unit 14

    • 782 Words
    • 4 Pages

    When looking at the emergency incident responses system. You also have to look at the civil contingencies act 2004. The civil contingencies act is important because it decides who is under what category of response and how urgent the response is. This act gave a new definition to the term emergency. This definition covers many different things for example it covers terrorism and dangers to people’s health. This Act is split in to 3 parts. Part 1 defines the obligations of certain organisations to prepare for various types of emergencies. This puts a legal obligation in place to local authorities and the public services; these are called category 1 responders. The main job which is put in front of them is the job of informing the public of the incident in which has just happened. Part one is all about…

    • 782 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Unit Cu1516 Answers

    • 3348 Words
    • 14 Pages

    * Preparation of food so that service users have choice of food and drink whilst…

    • 3348 Words
    • 14 Pages
    Good Essays
  • Powerful Essays

    Hat1 Task 4

    • 1905 Words
    • 8 Pages

    Introduction to the Incident Command System (ICS 100) for healthcare/hospitals. (2010). Retrieved May 5, 2013, from http://www.training.fema.gov…

    • 1905 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Tda 2.8 1.1

    • 1256 Words
    • 6 Pages

    • that he / she keeps up to date with e-safety technical information in order to effectively carry out their e-safety role and to inform and update others as relevant…

    • 1256 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    In the cisco environment the network management architectures almost always have the same basics, when it comes to its computer systems network tools and devices or software to help with maintenance, prevention and the recognizing of problems. Problems that can become bigger issues if network management is not in placed, as entities are programmed to take actions.…

    • 553 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    What would be the potential needs of the company’s employees when receiving a message about this incident?…

    • 483 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In large-scale medical emergencies, emergency medical service (EMS) officers coordinate ambulatory transportation for victims, while relying heavily on information from responders in the field. EMS may need critical up to date information and procedures in order to structurally respond to the situation.…

    • 592 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Dangerous Occurrences must also be reported immediately by telephone to Health and Safety Officer as above.…

    • 2081 Words
    • 9 Pages
    Good Essays
  • Better Essays

    Response Execution

    • 1829 Words
    • 8 Pages

    References: FEMA, 1999, Incident Command System for Emergency Medical Services, Student Manual. United States Fire Administration National Fire Academy.…

    • 1829 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Emergency and mass notification software is no longer used simply to share a piece of information with a large audience speedily. Rather, it is a conduit for communication flows of various types. The Emergency Communication/Mass Notification Systems (MNS) are evolving significantly, to meet with the demands such as fast message delivery, message prioritization, which are arising out of the increasing emergency situations. Mass notification provides advanced communication technology which alerts the people about the possible danger and also guides them during the situation to be safe. Customers consist of large scale companies, Small and Medium Enterprises (SMEs), educational institutions, healthcare companies, military organizations, emergency response teams and also government. The services provide notification to individuals or groups such as customers, employees, citizens, and government officials.…

    • 664 Words
    • 4 Pages
    Powerful Essays

Related Topics