Preview

Network Management System

Powerful Essays
Open Document
Open Document
2030 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Management System
Network Management Systems (NMS)

Network Management System is defined as the collection of tools that assist human network managers in planning, configuring, controlling and monitoring the computer networks. It covers all the activities and safety measures needed to ensure the effective and efficient use of the resources to be managed. Thus, a Network Management System has to address different functional areas of a computer network and has to fulfill the requirements of the users in these areas.
The International Standards Organization (ISO) has defined and categorized functional areas “Management Functional Areas” of a network management system as follows. 1. Fault Management 2. Performance Management 3. Configuration Management 4. Accounting Management 5. Security Management
Fault Management
“The goal of fault management is to detect, log, notify users of, and (to the extent possible) automatically fix network problems to keep the network running effectively.”
Fault management involves: • Determine exact fault location. • Isolate the faulty area from the other working side. • Repair or replace the faulty device. • Fault logging.
Performance Management
ISO defined the Performance Management as.
“The goal of performance management is to measure and make available various aspects of network performance so that inter-network performance can be maintained at an acceptable level.”[2]
Examples of performance variables that might be provided include network throughput, user response times, and line utilization.
SNMP Overview
The Simple Network Management Protocol (SNMP) is an application layer protocol that facilitates the exchange of management information between network devices. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP enables network administrators to manage network performance, find and solve network problems, and plan for network growth.
This chapter briefly



References: [1] Network Management Basics available as http://library.ucsd.edu/~nsu/55018.htm [3] Traceroute - Whitepaper http://www.informatik.uni-trier.de/~smith/networks/tspec.html#INTRO [4] Simple Network Management Protocol available as http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/snmp.htm#xtocid17 [5] Naming in SNMP available as http://www.cs.tcd.ie/Greg.Biegel/nds106/SNMP.html [6] The MIB II structure available as http://www.et.put.poznan.pl/snmp/mib2 [8] For all MIB object names and their OIDs http://www.mibdepot.com/index.shtml

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    network monitoring and maintenance, the need for an additional system administrator, and the risks of not…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ITNW 2335

    • 402 Words
    • 2 Pages

    6. What are three main types of high-bandwidth connection options used by medium- to large-sized businesses?…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Netw420 Week 4 lab report

    • 726 Words
    • 3 Pages

    Many Network Management Systems have a log and event manager that collects data and logs event data from all of the devices on the network and performs real-time correlation. When an event is initiated an agent initiates an interaction by creating an object describing an event. Event messages from the various distributed components are processed based on a predefined policy. Most event alerts can be categorized as an informational alert, a warning alert or a critical alert.…

    • 726 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    MANAGEMENT: Devices dedicated to the management and control of other network resources should be placed in the MANAGEMENT security zone. These devices typically connect to dedicated management ports on other network resources. These connections to allow managers to remotely access a device, modify its configurations or perform administrative tasks on the resource. Additionally, network resources may be configured to send log files, periodic status messages or notifications to an administrator or management device across these…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    ISSC 340

    • 275 Words
    • 2 Pages

    The functions and characteristics of a network operating system or (NOS) for short are explained by the following;…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Netw420 Week 5

    • 526 Words
    • 3 Pages

    References: * Clemm, A. Network Management Fundamentals Edition 1 (1st ed). Pearson Learning Solutions. Retrieved from http://devry.vitalsource.com/books/9781256084068/id/ch02lev2sec9…

    • 526 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Produce a report that justifies the need for network managers to undertake routine performance management activities. Please ensure that your justification for these activities relates to reasons of efficiency and how they affect the quality of the service provided.…

    • 935 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    In the cisco environment the network management architectures almost always have the same basics, when it comes to its computer systems network tools and devices or software to help with maintenance, prevention and the recognizing of problems. Problems that can become bigger issues if network management is not in placed, as entities are programmed to take actions.…

    • 553 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Hrm300 Final

    • 312 Words
    • 2 Pages

    2. Explain the three areas of a needs assessment – as it used to decide if training is the proper approach to an issue, problem – or new program – and what type of training is best.…

    • 312 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The American Civil war as no different yes, it was a war where a nation fought against itself and it is now seen as one of the bloodiest war in U.S. history, but the north (The Union) had modern, more advanced technology in the navy and the army. Whereas the south (The Confederate) was not as advanced and their navy and army lacked the modern weapons that the north had. Modern technology isn't the only reason why the north won the civil war. The north used the modern technology that they had and planned their strategies and tactics around the technology. During the civil war, the introduction of ironclads was only the tip of the iceberg because there also came the development of building submarines, underwater mines, and torpedoes.…

    • 155 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    In order to understand network management effectiveness, factors called metrics have to be put into place that will impact the management bottom line. These metrics have been put into place in order to further gauge, not only the network effectiveness, but also the efficiency of the network. This paper will attempt to address some of these various metrics that are used to gauge network effectiveness and efficiency in meeting organizational goals.…

    • 811 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Network Security

    • 678 Words
    • 3 Pages

    The infrastructure which encompasses the network solution and security considerations is a major consideration for your company. Considering that the company will be expanding from one (1) floor to three (3) floors in the very near future you, as the CIO, are responsible for the design of the infrastructure and security protocols. You have been tasked with designing a network that is stable, redundant, and scalable. In addition, speed and reliability are important considerations. Assumptions should be drawn regarding network usage in relationship to network services and resources. All the established criteria that were set at the onset should be adhered to within your plan. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. Additionally, the security of the network should be in the forefront of your design because protecting your data is a primary consideration.…

    • 678 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    In my opinion, it is people that make businesses more successful. It is people that gives…

    • 2954 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Network Monitoring Tools

    • 672 Words
    • 3 Pages

    Network monitoring tools can have many important functions that can increase the scaleability and usefulness of a network. They ensure that the computers and devices on the network are functioning at the highest level possible, and are available. They also can help increase the productivity and ease of an IT department's job, so it's important that they choose the right product that suits their needs the best.…

    • 672 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Rock

    • 1253 Words
    • 6 Pages

    DHL has installed the Network Management System (NMS) to strengthen the internal network for data transfer and e-mail movement around the world. The installation of the system is expected to reduce the down time and delays in the transfer of shipment details to its various offices in the world, on account of the network failure. The NMS has been designed to enable the IT support staff of the company to continuously monitor the failures in the network and attend to it immediately.It also has a facility to dispatch e-mail or page a message to the concerned staff, informing him or her of the location of a failure in the network.…

    • 1253 Words
    • 6 Pages
    Powerful Essays