0% found this document useful (0 votes)
27 views7 pages

Network Management

Uploaded by

kevinodhiambo532
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views7 pages

Network Management

Uploaded by

kevinodhiambo532
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

NETWORK MANAGEMENT

Network management is defined as the process of managing a network for fault and performance
using various tools and technologies to keep up with the business requirements. The objective of
network management is to achieve an error free network. In today's environment, multiple network
management tools are employed making the whole process a complex one. It requires automated
network management tools and also a comprehensive data gathering and control tools
SNMP-Simple Network Management Protocol (SNMP) is a popular protocol for network
management. It is used for collecting information from, and configuring, network devices, such as
servers, printers, hubs, switches, and routers on an Internet Protocol (IP) network
ELEMENTS OF NETWORK MANAGEMNET
Includes the following:
 Fault
 Accounting
 Configuration
 Performance
 Security
1. Fault Management
Fault Management detects, fixes, logs, and reports network/system problems. Fault management
involves determining symptoms through measurements and monitoring, and isolating the problem.
When fault occurs
 Determine where
 Isolate rest of network so it can continue to function
 Reconfigure or modify network to minimize impact of operation without failed
components
 Repair or replace failed components
As a user requirement, it is a fast and reliable problem resolution and need immediate notification.
The impact and duration is minimized by redundant components and routes, this is achieved
through fault tolerance (tolerance-is the property that enables a system to continue operating
properly in the event of the failure of (or one or more faults within) some of its components). The
fault management capability should be redundant. After correction, fault management must ensure
problem is truly resolved and no new problems introduced i.e. problem tracking and control and
also there is minimal effect on network performance
2. Accounting Management
Accounting Management which keeps track of usage per account, billing, and ensures resources
are available according to the account requirements.
The individual cost centers or projects are charged for use of network services. Network manager
needs to be able to track use of network
 User or group may be abusing access
 Users may be making inefficient use of network
 Need to plan for network growth
As a user requirement there is a need to specify sort of accounting information recorded at various
nodes
 Interval between successive sendings of information
 Algorithms used in calculating charges
 Accounting reports under network manager control
Also, verifying users' authorization to access and manipulate accounting information
3. Configuration Management

This deals with the set of functions associated with managing orderly changes in a network. The
basic function of managing the equipment in the network belongs to this category. This includes
tracking the equipment in the network and managing the addition/removal of equipment,
including any rerouting of traffic this may involve and the management of software versions on
the equipment.

Another aspect of configuration management is connection management, which deals with


setting up, taking down, and keeping track of connections in a network. This function can be
performed by a centralized management system. Alternatively, it can also be performed by a
distributed network control entity. Distributed network control becomes necessary when
connection setup/take-down events occur very frequently or when the network is very large and
complex.

The network needs to convert external client signals entering the optical layer into appropriate
signals inside the optical layer. This function is adaptation management.

It also involves maintaining an inventory of the network and system configuration information.
This information is used to assure inter-operability and problem detection. Examples of
configuration information include device/system OS name and version, types and capacity of
interfaces, types and version of the protocol stacks, type and version of network/system
management SW, etc.

4. Performance Management

This deals with monitoring and managing the various parameters that measure the performance
of the network. Performance management is an essential function that enables a service provider
to provide quality-of-service guarantees to their clients and to ensure that clients comply with the
requirements imposed by the service provider. It is also needed to provide input to other network
management functions, in particular, fault management, when anomalous conditions are detected
in the network.
Monitoring involves the following:

 Tracks activities
 What is the level of capacity utilization?
 Is there excessive traffic?
 Has throughput been reduced to unacceptable levels?
 Are there bottlenecks?
 Is response time increasing?

It also involves controlling that make adjustments to improve performance

As a user requirement, the performance management must be known in sufficient details to assess
user queries. Because for instance application needs consistent good response time. Performance
statics help planning management and maintenance which recognize bottlenecks before the cause
problems. It also involves capacity planning which is based on performance information.

5. Security Management

It includes administrative functions such as authenticating users and setting attributes such as read
and write permissions on a per-user basis. From a security perspective, the network is usually
partitioned into domains, both horizontally and vertically. Vertical partitioning implies that some
users may be allowed to access only certain network elements and not other network elements.

 For example, a local craftsperson may be allowed to access only the network elements he
is responsible for and no other network elements.
o Horizontal partitioning implies that some users may be allowed to access some
parameters associated with all the network elements across the network.
 For example, a user leasing a lightpath may be provided access to all the performance
parameters associated with that lightpath across all the nodes that the light path traverses.
Security also involves protecting data belonging to network users from being tapped or
corrupted by unauthorized entities. This part of the problem needs to be handled by
encrypting the data before transmission and providing the decrypting capability to
legitimate users.

Security management also controls access to network/system resources according to security


guidelines. Security manager partitions network/system resources into authorized and
unauthorized areas. Users are provided access rights to one or more areas. Security managers
identify sensitive network/system resources (including systems, files, and other entities) and
determine accessibility of users and the resources. Security manager monitors access points to
sensitive network/system resources and log inappropriate access.
NETWORK MANAGEMET SYSTEMS
A network management system (NMS) is a set of hardware and/or software tools that allow an IT
professional to supervise the individual components of a network within a larger network
management framework(Collection of tools for network management)
A network management system (NMS) is an application or set of applications that lets network
administrators manage a network's independent components inside a bigger network management
framework. NMS may be used to monitor both software and hardware components in a network. It usually
records data from a network's remote points to carry out central reporting to a system administrator.

The key benefit to NMS is that it permits users to monitor or manage their entire business operations using
a central computer.
A network management system is useful in:
 Network device discovery - identifying what devices are present on a network.
 Network device monitoring - monitoring at the device level to determine the health of
network components and the extent to which their performance matches capacity plans
and intra-enterprise service-level agreements (SLAs).
 Network performance analysis - tracking performance indicators such
as bandwidth utilization, packet loss, latency, availability and uptime
of routers, switches and other Simple Network Management Protocol (SNMP) -enabled
devices.
 Intelligent notifications - configurable alerts that will respond to specific network
scenarios by paging, emailing, calling or texting a network administrator.
Quality network management systems include the following features:

 Saves money: Only one system admin is required at a single location to monitor and
manage the entire network, which cuts hiring expenditures.
 Saves time: Each IT provider gets direct access to any data when required. All team
members can simply enter or retrieve data using their own workstations. At the same
time, their access may be controlled by the network manager.
 Increases productivity: Helps manage every aspect of the office network, which includes
software, hardware and other peripherals. The NMS identifies an issue as soon as it
occurs it to ensure that there is no productivity slowdown or data loss.

Network Management System Key Elements


 Management station or manager
 Agent
 Management information base
 Network management protocol

i) Management Station
It’s a standalone system or part of shared system with Interface for human network manager. It
has a Set of management applications which involve Data analysis and Fault recovery. The
Interface monitors and control network
The management station translate manager’s requirements into monitoring and control of remote
elements. It also have a database of network management information extracted from managed
entities
The Management workstation gathers information about the network elements in its domain. It
may do this either by polling them, or by having the network element “interrupt” it – which is
known as a trap.
It also contains a user interface which allows a network administrator to configure and view the
status of network elements, and an alarm system to notify people in the event of network faults.
ii) Management Agent
The management agent can be an Hosts, bridges, hubs, routers equipped with agent softwarewhich a
allows them to be managed from management station. It Respond to requests for information and also
Respond to requests for action

iii) Management Information Base


This is the representation of network resources as objects. Each object a variable representing one aspect
of managed object. MIB is collection of access points at agent for management of station. The Objects are
standardized across class of system for instance Bridge, router etc.

iv) Network Management Protocol


— This protocol Link between management station and agent
— TCP/IP uses SNMP
— OSI uses Common Management Information Protocol (CMIP)
— SNMPv2 (enhanced SNMP) for OSI and TCP/IP
Simple Network Management Protocol (SNMP) is a popular protocol for network management. It is used
for collecting information from, and configuring, network devices, such as servers, printers, hubs, switches,
and routers on an Internet Protocol (IP) network
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or
protocol of the Internet. It can also be used as a communications protocol in a private network (either an
intranet or an extranet)
Common Management Information Protocol (CMIP) is a network management protocol built on the
Open Systems Interconnection (OSI) communication model. The related Common Management
Information Services (CMIS) defines services for accessing information about network objects or devices,
controlling them, and receiving status reports from them
The Role of SNMPv1

 Collecting information from network devices


 Configuring network devices
 Managing and monitoring network elements
 Used to communicate management information between the network management station
and the agents in the network elements

SNMP v2
Framework on which network management applications can be built
 e.g fault management, performance monitoring, accounting
Protocol used to exchange management information
Each player maintains local MIB
 Structure defined in standard
At least one system responsible for management
 Houses management applications
Support central or distributed management
In distributes system, some elements operate as manager and agent
Exchanges use SNMP v2 protocol
 Simple request/response protocol
 Typically uses UDP
— Ongoing reliable connection not required
— Reduces management overhead
SNMP v3
— Addresses security issues of SNMP v1/2
— Proposed standard January 1998
— Defines overall architecture and security capability
— To be used with SNMP v2
Provide the following services
 Authentication
Part of User-Based Security (UBS)
Assures that message:
— Came from identified source
— Has not been altered
— Has not been delayed or replayed
 Privacy
— Encrypted messages using DES(Data Encryption Standard)- a symmetric-
key algorithm for the encryption of electronic data
 Access control
— Can configure agents to provide a number of levels of access to MIB
— Access to information
— Limit operations

You might also like