KEMBAR78
Network management | PPTX
NETWORK
MANAGEMEN
T
AKSHA RADHANPURI
SEM-2 M.LISC
ROLL NO :18
SUBMITTED TO : GAMIT
SIR
WHAT IS NETWORK MANAGEMENT?
• Network management is the process of
controlling a complex data network to
maximize its efficiency and productivity
• The overall goal of network
management is to help with the
complexity of a data network and to
ensure that data can go across it with
maximum efficiency and transparency
to the users
NETWORK MANAGEMENT
REQUIREMENTS
Example of approach
• Controlling strategic assets
• Controlling complexity
• Improving service
• Balancing various needs: performance,
availability, security, cost
• Reducing downtime
• Controlling costs
NETWORK
MANAGEMENT FIVE
FUNCTIONAL AREAS
• The International Organization
for Standardization (ISO)
Network Management Forum
divided network management
into five functional areas:
• Fault Management
• Configuration Management
• Security Management
• Performance Management
• Accounting Management
FAULT MANAGEMENT
• Is the process of locating problems, or faults, on the data network •
It involves the following steps: –
 Detect the fault
 Determine exactly where the fault is
 Isolate the rest of the network from the failure so that it can continue to
function
 Reconfigure or modify the network in such a way as to minimize the impact
 Repair or replace the failed components
 Tests: connectivity, data integrity, response-time, ….
CONFIGURATION MANAGEMENT
• The configuration of certain network devices controls the behavior of the data network •
• Configuration management is the process of finding and setting up (configuring) these critical
devices
• Involves following steps: – Installation of new hardware/software
• Tracking changes in control configuration
• Who, what and why?
• network topology
• Revert/undo changes
• Change management
• Configuration audit
• Does it do what was intended
SECURITY
MANAGEMENT
Is the process of
controlling access to
information on the
data network
Provides a way to
monitor access
points and records
information on a
periodic basis
Provides audit trails
and sounds alarms
for security breaches
Several security
measures are
provided: –
Security services:
generating,
distributing, storing
of encryption keys
for services
Exception alarm
generation,
detection of
problems
Uniform access
control to resources
Backups, data
security
Security logging
PERFORMANCE MANAGEMENT
• Involves measuring the performance of the network hardware, software, and
media •
• Examples of measured activities are: –
• What is the level of capacity utilization?
• Is there excessive traffic?
• Has throughput been reduced to unacceptable levels?
• Are there bottlenecks?
• Is response time increasing?
• What is the error rates?
• Indicators: availability, response time, accuracy service throughput,
utilization efficiency
ACCOUNTING MANAGEMENT
• Involves tracking individual’s utilization and
grouping of network resources to ensure that
users have sufficient resources
• Involves granting or removing permission for
access to the network
• Identifying consumers and suppliers of network
resources - users and groups
• Mapping network resources consumption to
customer identity
• Billing
REDERENCES
• https://www.slideshare.net/patelakash04/n
etwork-management-52141240
• https://www.slideshare.net/mohammedarif
89/network-management-
18480258?from_action=save
Thank you

Network management

  • 1.
  • 2.
    WHAT IS NETWORKMANAGEMENT? • Network management is the process of controlling a complex data network to maximize its efficiency and productivity • The overall goal of network management is to help with the complexity of a data network and to ensure that data can go across it with maximum efficiency and transparency to the users
  • 3.
    NETWORK MANAGEMENT REQUIREMENTS Example ofapproach • Controlling strategic assets • Controlling complexity • Improving service • Balancing various needs: performance, availability, security, cost • Reducing downtime • Controlling costs
  • 4.
    NETWORK MANAGEMENT FIVE FUNCTIONAL AREAS •The International Organization for Standardization (ISO) Network Management Forum divided network management into five functional areas: • Fault Management • Configuration Management • Security Management • Performance Management • Accounting Management
  • 5.
    FAULT MANAGEMENT • Isthe process of locating problems, or faults, on the data network • It involves the following steps: –  Detect the fault  Determine exactly where the fault is  Isolate the rest of the network from the failure so that it can continue to function  Reconfigure or modify the network in such a way as to minimize the impact  Repair or replace the failed components  Tests: connectivity, data integrity, response-time, ….
  • 6.
    CONFIGURATION MANAGEMENT • Theconfiguration of certain network devices controls the behavior of the data network • • Configuration management is the process of finding and setting up (configuring) these critical devices • Involves following steps: – Installation of new hardware/software • Tracking changes in control configuration • Who, what and why? • network topology • Revert/undo changes • Change management • Configuration audit • Does it do what was intended
  • 7.
    SECURITY MANAGEMENT Is the processof controlling access to information on the data network Provides a way to monitor access points and records information on a periodic basis Provides audit trails and sounds alarms for security breaches Several security measures are provided: – Security services: generating, distributing, storing of encryption keys for services Exception alarm generation, detection of problems Uniform access control to resources Backups, data security Security logging
  • 8.
    PERFORMANCE MANAGEMENT • Involvesmeasuring the performance of the network hardware, software, and media • • Examples of measured activities are: – • What is the level of capacity utilization? • Is there excessive traffic? • Has throughput been reduced to unacceptable levels? • Are there bottlenecks? • Is response time increasing? • What is the error rates? • Indicators: availability, response time, accuracy service throughput, utilization efficiency
  • 9.
    ACCOUNTING MANAGEMENT • Involvestracking individual’s utilization and grouping of network resources to ensure that users have sufficient resources • Involves granting or removing permission for access to the network • Identifying consumers and suppliers of network resources - users and groups • Mapping network resources consumption to customer identity • Billing
  • 10.
  • 11.