mcgraw-hill©the mcgraw-hill companies, inc., 2000 chapter 16 network management
TRANSCRIPT
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Chapter 16
NetworkManagement
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Understand the importance of configuration management andUnderstand the importance of configuration management andits two components: reconfiguration and documentation.its two components: reconfiguration and documentation.
Understand importance of fault management and its two Understand importance of fault management and its two components: reactive and proactive management. components: reactive and proactive management.
Understand the importance of performance management andUnderstand the importance of performance management andits four measurements: capacity, traffic, throughput, and responseits four measurements: capacity, traffic, throughput, and responsetime.time.
Understand the importance of accounting management and Understand the importance of accounting management and the reason for using it.the reason for using it.
After reading this chapter, the reader should After reading this chapter, the reader should be able to:be able to:
OOBJECTIVESBJECTIVES
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
OOBJECTIVES (continued)BJECTIVES (continued)
Be familiar with the SNMP protocol as a software managementBe familiar with the SNMP protocol as a software managementtool.tool.
Be familiar with hardware management tools such as lineBe familiar with hardware management tools such as linemonitors and protocol analyzers.monitors and protocol analyzers.
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Figure 16-1
Areas of network management
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Business Focus:Business Focus: Network Manager Functions Network Manager Functions
The following are some of the functions The following are some of the functions expected from a network manager: expected from a network manager:
Monitor daily network operationMonitor daily network operation
Support network usersSupport network users
Manage budgetary issuesManage budgetary issues
Keep abreast of the latest networking technologiesKeep abreast of the latest networking technologies
Apply the general networking policy of the organizationApply the general networking policy of the organization
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
CONFIGURATIONCONFIGURATIONMANAGEMENTMANAGEMENT
CONFIGURATIONCONFIGURATIONMANAGEMENTMANAGEMENT
16.116.1
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Figure 16-2
Configuration management
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
FAULTFAULTMANAGEMENTMANAGEMENT
FAULTFAULTMANAGEMENTMANAGEMENT
16.216.2
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Figure 16-3
Fault management
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
PERFORMANCEPERFORMANCEMANAGEMENTMANAGEMENTPERFORMANCEPERFORMANCEMANAGEMENTMANAGEMENT
16.316.3
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Figure 16-4
Performance management
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
ACCOUNTINGACCOUNTINGMANAGEMENTMANAGEMENTACCOUNTINGACCOUNTING
MANAGEMENTMANAGEMENT
16.416.4
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
SECURITYSECURITYMANAGEMENTMANAGEMENT
SECURITYSECURITYMANAGEMENTMANAGEMENT
16.516.5
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
NETWORKNETWORKMANAGEMENTMANAGEMENT
TOOLSTOOLS
NETWORKNETWORKMANAGEMENTMANAGEMENT
TOOLSTOOLS
16.616.6
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Technical Focus:Technical Focus: SNMP VersionsSNMP Versions
SNMP has gone through three different versions:
SNMPv1 was based on the network management principles defined by the OSI model.
SNMPv2 was designed to be totally dependent onthe Internet model.
SNMPv3 is the latest version and adds security management to SNMPv2
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Figure 16-5
SNMP concept
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Technical Focus:Technical Focus: SMISMI
To perform its job, SNMP uses other protocols. One of these protocols is called Structure of Management Information (SMI).
SMI is used to do the following:
1. Universally and uniquely name objects to be managed.
2. Define the type of data that can be stored in objects.
3. Show how to encode data for transmission over the network.
McGraw-Hill ©The McGraw-Hill Companies, Inc., 2000
Technical Focus:Technical Focus: MIBMIB
SMI uses another important protocol called ManagementInformation Base (MIB). SMI defines how a universalcollection of objects should be named and managed. MIB, on the other hand, defines which of these objects should be included in a particular agent.