HOME BZU Mail Box Online Games Radio and TV Live Cricket Score All Albums
Go Back   BZU PAGES: Find Presentations, Reports, Student's Assignments and Daily Discussion; Bahauddin Zakariya University Multan Institute of Computing Bachelor of Science in Information Technology BsIT 6th Semester Network Security Management

Network Security Management Lecture sharing portion for Network Security Management, Sir Moizuddin

Thread Tools Search this Thread Rating: Thread Rating: 1 votes, 5.00 average. Display Modes
Old 06-03-2010, 06:35 PM
.BZU.'s Avatar


Join Date: Sep 2007
Location: near Govt College of Science Multan Pakistan
Posts: 9,675
Contact Number: Removed
Program / Discipline: BSIT
Class Roll Number: 07-15
.BZU. has a reputation beyond repute.BZU. has a reputation beyond repute.BZU. has a reputation beyond repute.BZU. has a reputation beyond repute.BZU. has a reputation beyond repute.BZU. has a reputation beyond repute.BZU. has a reputation beyond repute.BZU. has a reputation beyond repute.BZU. has a reputation beyond repute.BZU. has a reputation beyond repute.BZU. has a reputation beyond repute
Default Chapter 2 Introduction to Management Approach

In this chapter, we introduce the main functions that should be included in a network management system and give a brief introduction to popular and well-known network management and system management approaches including Simple Network Management Protocol and new approaches Policy-based Network Management and Web-based Enterprise Management approaches.
2.1 Network management system At the earliest, the network is used to printer sharing, so the scale of network is not very large. The main work of network management is connection and configuration between hardware. But the evolution of computer network, network management not only being the monitoring facilities, it needs more efficient monitor and network status control methods to maintain system for daily operation and make a network have its maximum efficiency. For example, if a network is separate to several areas or sub networks, the operator must start up related link by configure routing table according to IP, sub network and subnet mask.
The goal of network management is detect potential problems. Network management must correct problems before system breakdown, reduce the complexity of network management and ensure the maximum rate of packet transmission.

Fig. 2.1 Typical Network Management System Functionality
There are five functions of network management were defined by the ISO (The International Organization for Standardization) in the document of ISO 7498-4, it shows in Fig. 2.1:
  • Configuration Management: Record and maintain network configuration, parameter updating for ensuring correct network operation.
  • Fault Management: Finding problems or errors from network. Including detection and repair.
  • Security Management: Control the process of message access in the network. Provide protection for network resources, services and data to avoid danger. It also provides user privacy.
  • Performance Management: Including performance measurement of hardware, software and the media of transmission in the network. For example, Input, Output flow, error rate.
  • Accounting Management: Handle users charging record by using personal network usage log, and provide necessary service for users when he on the network.
2.2 Common Network Management Architecture
In this session, we discuss a common architecture of network management. Figure 2.2 depicts the basic network management architecture. The management station is mainly consisted of display and network management application components. Display displays the information to the operators and get control from operators, whereas the network management application communicates with the agent to get information from the managed devices. Agent serves as the broker between the management station and managed device, which implements a specific protocol for communication, for example, SNMP. This architecture simplies the management application design by separating the design of "managed-device part" and the "managing part".

Fig. 2.2 Typical two tier structure for network management
We can get specifically understand from Fig. 2.3 to know a client-server model that provides stack of communication protocol and interface between networks. When the Network Management Program send a request, Network Management Protocol encapsulate the request and through encapsulation in each layer. The request will be arrived in managed device and unpacked in each layer and agent can know what data the Network Management Program wants to know. Agent encapsulates the data into a packet by the same method and sends the packet to the Network Management Program.

Fig. 2.3 Relation to the stack of communication protocol and network

.*.*) .*)
(.* (.
Bzu Forum

Don't cry because it's over, smile because it happened
Reply With Quote

approach, chapter, introduction, management

Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes Rate This Thread
Rate This Thread:

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On

Similar Threads
Thread Thread Starter Forum Replies Last Post
Chapter # 7, Using a Modular Approach in Network Design bonfire Telecommunication Network Design 0 15-04-2011 06:05 PM
Chapter # 5, Using the Top-Down Approach to Network Design bonfire Telecommunication Network Design 0 15-04-2011 06:03 PM
Chapter # 1, Introduction bonfire Telecommunication Network Design 0 15-04-2011 05:53 PM
CCNA 640-802 Chapter 2 Introduction to TCP bonfire Networking Fundamentals 0 19-03-2011 09:59 PM
Chapter # 1 (Introduction) bonfire Digital Switching 0 15-11-2010 09:00 PM

Best view in Firefox
Almuslimeen.info | Cloud Computing | Dedicated server hosting
Note: All trademarks and copyrights held by respective owners. We will take action against any copyright violation if it is proved to us.

All times are GMT +5. The time now is 06:32 PM.

Powered by vBulletin® Version 3.8.2
Copyright ©2000 - 2020, Jelsoft Enterprises Ltd.
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.