Nothing Special   »   [go: up one dir, main page]

Cop Network

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Network management is the process of administering and managing computer networks.

Services
provided by this discipline include fault analysis, performance management, provisioning of networks
and maintaining quality of service. 
I. An agent is a software process that responds to SNMP queries to provide status and statistics
about a network node
II. A network management system (NMS) is an application or set of applications that lets network
engineers manage a network's independent components inside a bigger network management
framework and performs several key functions.
III. A management information base is a database used for managing the entities in a
communication network.

ACTIVITIES INVOLVED IN NETWORK MANAGEMENT


Network provisioning can mean either automating the initial configuration of a network device or setting
up a network to be accessed by users, servers in a data center, containers, IoT devices, and more.

Network configuration includes defining the desired state of networks or networked endpoint devices,


and then maintaining them in that state over time. Network configuration and network maintenance
logically follows network provisioning.

Network security includes establishing security systems and security management protocols that protect


networks against attack, damage, or unauthorized access.

Network measurement includes network monitoring and testing, troubleshooting, ensuring availability,


and preparing disaster recovery plans. These processes help maintain network performance, which is the
speed and efficiency at which data is transferred across network devices.

explain service level agreement as used in network management

A service-level agreement (SLA) sets the expectations between the service provider and the customer and
describes the products or services to be delivered, the single point of contact for end-user problems, and
the metrics by which the effectiveness of the process is monitored and approved.

 
Rewiring the network for digital transformation
Digital transformation begins with a strong foundation of securing the core infrastructure and making it
scalable for the challenges of tomorrow.
 Hyperconnected supply chain
Supply chain partners will also require increased interconnection bandwidth to thrive, with an estimated
usage increase of 73%. Interconnecting to these partners will allow businesses to collaborate digitally.
Security
Security remains the most critical vulnerability for all - from CIOs to network administrators. This is one
area which takes up the bulk of the IT spending budget. With new technologies around hybrid/multi cloud
deployments, widespread adoption of blockchain and regulatory pressure, security needs to be
approached with a fresh perspective

The OSI reference network management model categorizes five areas of network management,
sometimes referred to as FCAPS model. Explain them.
1. Fault management is the component of network management concerned with detecting,
isolating and resolving problems.
2. Configuration managemen is a systems engineering method that ensures a product's properties
remain consistent throughout its life cycle. Configuration management is an IT management
technique that tracks individual configuration pieces of an IT system in the realm of technology. 
3. Accounting management is concerned with managing network consumption data in order to bill
or charge individual users, departments, or business units correctly for accounting purposes.
4. Performance management is concerned with the network's efficiency. Throughput, %
utilisation, error rates, and response times are all addressed by the network performance function.
The ability to collect and analyse performance data aids in satisfying SLAs and capacity
planning. 
5. Security management is a Network Management role that focuses on safeguarding the network
as a whole as well as individual devices from malicious or unintentional misuse, illegal access,
and data loss. 
Security Management is also in charge of establishing limitations for each controlled element based on
standards and specifications. 
 Authentication
Authentication is the process of determining a person's identity, usually through the use of a username
and password or, in some situations, biometrics  I.e fingertips.
 Authorization
The process of granting individuals access to system objects based on their identification is known as
authorization. Both authentication and authorisation are obviously necessary to identify the individual
(authentication) and provide him access privileges.
 Segmentation
Network segmentation entails dividing the managed network into logical domains, which are then
allocated to roles or users to limit access to domains and NEs.
 Secure Communication
The term "secure communication" refers to ensuring that the protocols being used are secure or have their
secure features activated. The following is a typical secure communication checklist:
 
Remote Monitoring (RMON) is a standard specification that facilitates the monitoring of network
operational activities through the use of remote devices known as monitors
BENEFITS OF REMOTE MONITORING TO AN ADMINISTRATOR IN MANAGING A
NETWORK
Device Location Doesn't Matter
RMM programs make it possible to see every machine on the network. They can tell what is going on at
all times. This includes desktop or laptop computers, access points and everything in an office.
Remote management and monitoring software makes sure machines are operating properly. These
programs also receive real time information on intrusions or attempted security breaches. For example,
suppose an unauthorized person tried to log in to the network from a laptop.
Limit User Access
A good remote monitoring and management program can be set to determine who can access what. For
example, some applications and sensitive information may require special permission, and this can be
taken care of by the admin.
Your IT Personnel Don't All Have To Be in One Place
For a large network, it might take several IT professionals to monitor all phases of an operation. Thanks
to remote management and monitoring you can use staff in other offices even if they are across the
country or on the other side of the planet. It doesn't make any difference where the server computers are
located.
Save Money on Travel Expenses
Suppose you have problems with a computer or mobile device in a remote area. A tech does not need you
to monitor the activity or check out the system. Everything can be done from one location and there's no
need to find out how things are going on your end, because the tech can see everything from his location.
`
RMON1 only provides visibility into the data link and the physical layers; potential problems that occur
at the higher layers still require other capture and decode tools.

what are the challenges of information technology manegers


1. WORKING WITHIN A TIGHT BUDGET‍
Many small businesses were forced to close their doors due to mandated shutdowns during the pandemic.
Organizations that survived this economic roller coaster simply have to watch their budgets more closely.
Despite the rapid evolution of unique new technology such as machine learning and virtual reality, a large
percentage of small companies cannot afford to invest in new equipment even if it's what they desire. This
scenario means IT managers should emphasize return on investment as a selling point to help encourage
digital transformation.‍
2. MANAGING CYBERSECURITY‍
No longer can any business ignore the potential for a cyberattack. It's important to know that all
businesses are targets of cybercriminals because it's now typical for companies to store confidential
financial data on business networks. So another one of the biggest challenges for IT managers is to
convince decision-makers of companies they must make cybersecurity a top priority.
3. MANAGING WORKLOADS BY ADOPTING AUTOMATION‍
While it's common for large companies to invest in automation to cut costs on labor for repetitive tasks,
not all small businesses are ready to invest in automation. Other may not be able to afford automation
software, small businesses may be hesitant to adopt such technology because of the training involved to
run the equipment. Inevitably, firms that do embrace automation will have a competitive edge over
companies that don't. Automation will be the solution to managing robust workloads.‍
‍4. FOCUSING ON THE RIGHT ANALYTICS‍
A significant drawback to embracing big data is that it can lead to information overkill. So much data is
now being produced that IT analysts can potentially waste time studying irrelevant data when they could
have been looking at more actionable data. The way to beat the problem of information overload is to
prioritize meaningful metrics for a specific business. The purpose of gathering vast amounts of internal
data is to identify and reduce weaknesses to streamline an operation.‍
5. UNDERSTANDING AND INVESTING IN SMART TECHNOLOGY‍
Innovative technology will define the business success stories of the future. Not only does the placement
of IoT sensors throughout a factory and supply chain help cut wasteful elements of a process, but it can
also accelerate troubleshooting and repair. For warehouses, it makes real-time inventory more seamless.
The challenges of promoting innovative technology will involve cost and complexity. But the results will
justify the means, leading to greater sustainability. It's a matter of educating the business community
about the advantages of intelligent technology, which benefit the company and the environment.
 

what is internet organizations and standards working on network management

DATA COMMUNICATION

Standard Organizations for Data Communication :


1) International Standard Organization (ISO) – 
ISO is the International Organization for Standardization. It creates set of rules
and standards for graphics , document exchange , data communication etc.
2) Consultative Committee for International Telephony and Telegraphy
(CCITT) –
CCITT is now standard organization for the United States. CCITT developer’s
recommended set of rules and standards for telephone and telegraph
communication.
It has developed 3 set of specifications :
 V Series for Modern Interfacing.
 X series for Data Communication.
 Q series for Integrated Services Digital Network(ISDN).
3) American National Standard Institute (ANSI) – 
ANSI is primary organization for fostering the development of technology
standards in the United States and providing various set of rules and standard
for  Data Communication.
4) Institute of Electrical and Electronic Engineering (IEEE) –
It is US based professional organization of electronic , computer and
communication engineering. It provides various set of rules and standard in
communication and networking field.
5) Electronic Industries Association(EIA) –  
This organization establish and recommends industrial standards. EIA has
developed the RS(Recommended Standards) series of Standards for data and
telecommunication.
6) Standard Council of Canada (SCC) –
It is an official Standard Agency for Canada . It has Similar responsibilities as
ANSI has.

You might also like