Free Essay

Network Management

In:

Submitted By deepak4blue
Words 923
Pages 4
Section – I:
1) Explain why the performance of an Ethernet LAN decreases with an increase in the number of stations on the LAN, whereas it increases (at least initially) with the increase in the number of stations in a token-ring LAN?
A) There are too many differences between Token Ring and Ethernet to list out here. You could read more about it from many useful search results for "ethernet vs. token ring." I'll point out a key difference and give you a source answering your question on performance.

Ethernet is based on CSMA/CD (carrier sense multiple access with collision detection), meaning multiple stations sense the carrier at the same time and send data when the carrier is free. However, there might be multiple stations sending a free carrier and send the data at the same time, causing "collision." Collision is the main factor affecting ethernet's performance. The more stations on the same LAN, the higher the collision rate, the lower the performance.

Token Ring, on the other hand, is based on a control/access given to the station owning the "token." Think of a token as the key to the media: whichever station has the token would be allowed to use the ring to send the data. So there would be no collision, just multiple stations competing for the same token. With not too many stations, the wait-for and claim of the token is very efficient (think of a video game with less players waiting to play it.) But if there are too many stations, most would just sit around and wait for the token, hence the flat-out of its performance.
2) What are the standards used for the various layers in an Ethernet-based network that is managed by the Internet management protocol? Assume that the Ethernet runs on 10 Mbps on an unshielded twisted-pair cable?
A) The standards used for the various layers in an Ethernet-based network that is managed by the Internet management protocol are : a. Organizational Model b. Information Model c. Communication Model d. Functional Model The organizational model describes the components of network management and their relationships. The information model is concerned with the structure of information. The communication model describes on how the information is exchanged between systems. The functional model addresses user-oriented applications.
3)

6) Communication between two ATM switches is broken in a private ATM network. You are troubleshooting the problem from a network management station. What M interfaces would you use?
A) The M2 interface is used to manage the private ATM network. The management information on ATM links between devices is gathered from ILMI MIB. The ILMI specifications define the administrative and UNI groups of the ATM forum MIB. The administrative group defines a general-purpose registry for locating ATM network services such as the ATM name answer server (ANS). Other subgroups under the administrative group have been deprecated and handled by IEFT specifications.

Section – II

1) The basic network monitoring tools that will be used are :
a. ping
b. bing
c. tcpdump
d. getethers
e. iptrace
f. ethereal / wireshark
We would be looking at the results for packets containing information on protocol type, length, source and destination.

2) The following group of commands enable Telnet access to the router:
Router(config)# enable password class
Router(config)# line vty 0 4
Router(config-line)# login
Router(config-line)# password cisco

3) The two situations which requires a network administrator to use out-of-band management to change a router configuration are :
a. Network links to the router are down.
b. The network interfaces of the router are not configured with IP addresses.

4) The two approaches which allows network administrators to be able to examine and configure network devices from their homes without increasing vulnerability to external attacks are :
a. Set up VPN access between the home computer and the network.
b. Configure ACLs on the edge routers that allow only authorized users to access management ports on network devices.

5) A network administrator must define specific business processes to implement if a catastrophic disaster prevents a company from performing daily business routines. The portion of the network documentation the administrator is defining will be :
a. business continuity plan

6) A DoS attack crippled the daily operations of a large company for 8 hours. The two options which could be implemented by the network administrator to possibly prevent such an attack in the future are :
a. Install security devices with IDS and IPS at the enterprise edge.
b. Filter packets based on IP address, traffic pattern, and protocol

7) A network manager wants to have processes in place to ensure that network upgrades do not affect business operations. The document / plan that the network manager creates for this purpose is :
a. Network maintenance plan

8) An investment company has multiple servers that hold mission critical data. They are worried that if something happens to these servers, they will lose this valuable information. The type of plan that is needed for this company to help minimize loss in the event of a server crash is:
a. Business security

9) When searching for information about authentication methods and usernames of company personnel, a network administrator can look at :
a. Business Security Plan

10)

11) A network administrator needs to configure Telnet access to a router. Which group of commands enable Telnet access to the router :
a. Router(config)# enable password class
Router(config)# line vty 0 4
Router(config-line)# login
Router(config-line)# password cisco

Similar Documents

Free Essay

Network Management

...Network Management Template Group Project Tech Corp 5/19/2013 * Table of Contents 1. Introduction 2 1.1 Individual Responsibility 2 2. Configuration Management 3 2.1 Inventory Management 3 2.1.1 Management Criteria 3 2.1.2 Design Overview 3 2.1.3 Usage & Rationale behind the Template 4 2.1.4 Value to Management 4 3. Performance Management 5 3.1 Performance Log 5 3.1.1 Management Criteria 5 3.1.2 Design Overview 5 3.1.3 Usage and Rationale Behind the Template 6 4. Fault Management 7 4.1 Device Fault log 7 4.1.1 Management Criteria 7 4.1.2 Design Overview 7 4.1.3 Usage & Rationale behind the Template 8 4.1.4 Value to Management 8 5. Security Management 9 5.1 Software Security 9 5.1.1 Management Criteria 9 5.1.2 Design Overview 9 5.1.3 Usage and Rationale Behind the Template 10 6. Conclusion 11 7. References 12 Introduction N etwork management is a broader subject of managing the whole network consistently. There are some supportive products like software and hardware to enable the users of network to manage the network properly. It covers a wide area of management such as fault, security, performance, configuration and more. These all aspect of network management has to be accomplished successfully to gain the obvious management of network. To gain these management aspects templates need to be take control as a management tool of network. Each criteria of network has to be...

Words: 3847 - Pages: 16

Free Essay

Network Management and Security

...(Name) (Instructors’ name) (Course) (Date) Network Management and Security A telecommunication Management Network, commonly known as TMN, is an infrastructure that provides interfaces for connection between several types of operating systems and telecommunications equipment, so as to manage the telecommunication service and network. This is from Glenn Warnock and Nathoo Amin (215). Also, it enables the functioning of the management information, which is exchanged through these interfaces. On the other hand, 5620 SAM is widely used for developing distributed systems, as it provides the infrastructure for interoperability of several object oriented management applications. With this application, the 5620 enables applications of operating systems to interoperate with the service access manager, allowing it to provide connections, isolate and manage network issues across an Alcatel network (225). With this, users can access management information transparently and independent of the hardware and software platform. This therefore enhances the portability of applications, which are developed across the multiple platforms of management. The principles and concepts of the TMN that can be matched with the features and functions of the 5620 platforms include the specification translation and the interaction translation. Redundancy is also an important feature. It is the automatic transfer of data network to stand by, and protects the network against hardware failure, software failure...

Words: 2230 - Pages: 9

Free Essay

Network Management

...flow of network traffic or out of the flow. The differences between these two can be explained by their impact on performance, security, and manageability on a network. An in-band network management has to do with managing devices through common protocols. For example, telnet or SSH and the using of the network itself as a media. This is a way to provide identity based access controls, which will provide a better security. The segregation of management traffic is also a good practice, from production customer traffic. This helps in case your network is congested due to real user traffic. It offers you the ability to login into your devices to address the issue. The con here with in-band management is when your network is down or badly degraded, it will be little help. An out-of-band network management is an alternative means to accessing remote devices. An example in which this is handy to have both networks, would be in the case that the in-band network is down or terribly congested. The out-of-band network management can communicate with devices right through its console, without having the administrator having to go to the data center to correct the in-band network management situation. Each of these, out-of-band and in-band network management, have pros and drawbacks. The in-band management is often referred to as a fitting and a cheap way to obtain your system. The out-of-band management is often thought of as the more expensive way to access your network. But the...

Words: 764 - Pages: 4

Free Essay

Network Management System

...Network management systems are giving IT professional an advantage on their own networks. This is giving them access to software and hardware at a moment’s notice without leaving the comfort of their desk or home. The NMS consists of a set of software and hardware tools that is integrated into the network. This management system is able to identify devices that are on the network. The NMS can also be used to monitor all devices and rate how the device is performing and if it is matching the device expectations. This system can track the performance of the bandwidth, if there was any packet loss, and the performance of all the routers/switches. The network management system will give the IT department notifications if anything seems to be off with the network. This will give the IT personnel time to isolate or fix before the problem effects the network (Hale, 2013). Cisco is a big company that has a very large network. They manage millions of endpoint devices and with a huge network that require a significant amount of monitoring from the IT department. “Cisco Connected Grid Network Management System is a software platform that helps to enable a clear separation between communications network management and utility operational applications. These include Distribution Management System (DMS), Outage Management System (OMS), and Meter Data Management (MDM)” (Cisco Connected Grid Network Management System, 2014). This management system can monitor multiple networks and all of...

Words: 733 - Pages: 3

Free Essay

Network Management System

...01/22/2014 Network Management System Student: xxxxxxxxxxxxxxx Professor: xxxxxx Course: Network 420 DEVRY UNIVERSITY Brief Introduction Network management systems have to be geared toward the work flow of the organization in which they will be utilized and be careful with remote external attack, as many hackers usually aim there attack at service offered to the public. Which means Network management systems department must provide protection to the business' data, with a smooth operation benefits for employees accessing those data. As we know Network management system is based on Client/Server paradigm normally requires transferring large amount of data between the manager and agents, which will consume large amount of data as bandwidth and cause a processing bottleneck at the manager. It become problem and complicated as the Network grow. According to our textbook, Management interoperability, management function, and management layers capture different technical aspects of network management. However, network management also involves a nontechnical . INTRODUCTION Network management systems have to be geared toward the work flow of the organization in which they will utilized the components of the network such as the ( manager, MIB, RMON and Probe ) to secure their organization data. And not forgetting to be mindful of remote external attack, as many hackers usually aim there attack at service offered to the public. Which means Network management department...

Words: 689 - Pages: 3

Free Essay

Netw420 Cisco Network Management System

...Cisco Network Management System NETW-420 Enterprise Network Mgmt Professor Introduction Cisco uses the International Organization for Standardization network management model which defines five functional areas of Network management. The model consists of Fault Management, Configuration Management, Performance Management, Security Management, and Accounting Management. In this paper we will cover the models five functional areas. Fault Management Fault management detects, logs, notifies users of, and tries to automatically fix network problems to keep the network running effectively. Fault management is perhaps the most widely implemented of the ISO network management elements. The reason is because faults can cause downtime or unacceptable network degradation. Fault Management uses a network management platform deployed in an enterprise infrastructure that consists of multivendor network elements. Network management platforms can be viewed as the main console for network operations in detecting faults in the infrastructure. The platform receives and processes events from network elements in the network. Events from servers and other critical resources can also be forwarded to a management platform. A standard management platform consists of Network discovery, Topology mapping of network elements, Event handler, and Performance data collector and graphed. Configuration Management Configuration management monitors network and system configuration...

Words: 646 - Pages: 3

Premium Essay

The Impact of Cloud Computing on Network Management

...Computing on Network Management. Introduction Network management is a process to maximize the reliability and utilization of network components in order to optimize network availability and responsiveness. We see that this definition includes elements of two other processes: * Availability * Performance and tuning Maximizing reliability through the use of Cloud Computing is another way of emphasizing high availability by ensuring network lines and the various components such as routers, switches, and hubs maintain high levels of uptime. Maximizing utilization implies that performance and tuning activities involving these components are optimizing network response. While availability and performance and tuning are the two processes most closely related to, and affected by, this process, network management actually interacts with six other systems management processes, making it one of the most interrelated of all 12 disciplines. Therefore it could be considered one of the most vital and integral parts of any organization. Network management covers an extensive area, including: * Security: Ensuring that the network is secure from unapproved users. * Performance: Removing bottlenecks in the network. * Reliability: Making sure the network is accessible to users and reacting to hardware and software faults. Key Decisions about Network Management Six key decisions need to be made that influence the strategy, direction, and cost of the Network management process...

Words: 1101 - Pages: 5

Premium Essay

Project Management Networks

...Content Part A1 Network Diagram: AoA or AoN? 1. Introduction …………………………………………………………………….…. 2 2. Comparison Between AoA and AoN …………………………………….……….. 2 3. Network Diagrams with Educational Oriented Discussion …………….…………. 3 4. Conclusion ………………………………………………………………………… 4 Part A2 The machine tool overhaul project Network diagram …………………………………………………………………….. 5 Part B Lean Concept: Value Stream Mapping (VSM) 1. Introduction ……………………………………………………………………..… 5 2. What is Value Stream Mapping ……………...…………………...………………. 5 3. Why Choose VSM and What Are The Benefits ……….…………………...…….. 6 4. Criticism of VSM …………………………………………………………………. 6 5. Conclusion ………………………………………………………………...………. 7 Reference …………………………………………………………………………….. 8 Part A1 Network Diagram: AoA or AoN? 1. Introduction The network diagram provides project managers with information about how the tasks are connected, how long will each task takes and shows all the tasks in the sequential or concurrent way (Taylor, 2008). There are two common methods for constructing network diagrams which are activity-on-arrow (AoA) and activity-on-node (AoN). However, these two methods have some fundamental differences and in practice, the question that which is better, has been asked on many occasions. Hence, this part of essay will analyze the differences between AoA and AoN and carry out some research that why they are different. In addition, these two choices of network diagrams will be illustrated under the academic...

Words: 2148 - Pages: 9

Premium Essay

Network Management Summary

...Network: any interconnected group or system, it comprises nodes and links. Networks are long-term, relationships between interdependent economic actors which are seeking for competitive advantage by forming the cooperation. More complex than alliances; bilateral relationship doesn’t qualify as network. From left to right: Market: “buy”. Network: jv, licensing, outsourcing, equity share, contractual cooperation, joint R&D. Hierarchy: “make” From left to right: Market: “buy”. Network: jv, licensing, outsourcing, equity share, contractual cooperation, joint R&D. Hierarchy: “make” Types of Networks: X & Y: X: Alliances between partners with complementary skills/strengths “closing the gap”. Y: Alliances between partners with mutually reinforcing resources/skills/competences “critical mass alliance”; by joining forces you reach a critical mass. Horizontal, vertical & lateral cooperation: Horizontal: Companies within the same position of the value chain cooperate (e.g. alliance between airlines) Vertical: companies from different positions within the value chain cooperate (eg. Buyer supplier relationships along the supply chain) Lateral: across industries, different players from different industries. Stable & Dinamic: Stable: platform for cooperation. Dinamic: project-based. Virtual factory: dynamic, order processing. Competition: Networks compete to each other; network is the compeititive ...

Words: 4712 - Pages: 19

Free Essay

Ntc/411 Network Management Paper

...Network Management (Your Name) NTC/411 (Current Date) (Instructor’s Name) Network Management Network management is an integral part of any IT system. Managing a network can be a tough task at times and managers have to decide on the best approaches for their network management. In this paper we’ll discuss out-of-band vs. in-band network management. We’ll also provide some examples of some of the protocols that perform in both types of network management and how enterprise systems are affected by the network management techniques along with business intelligence systems. In general, in-band and out-of-band refer to whether the solution or technique sits in the flow of the network traffic or out of the flow. Some IT professionals say that in-band network management provides better security than an out-of-band approach. Before we get into too much detail we need to discuss what an out-of-band and an in-band network management approach are. In-band approaches require devices or hardware to sit in the flow of live network traffic, often where endpoints access the network so that all client traffic has to pass through them. When a network manager decides to deploy an in-band device then they will be able to provide pre-connect and post-connect security. Network adapters are the most common type of in-band remote management hardware devices (Nevis Networks, 2007). In a Windows environment you can use remote access connections to manage servers...

Words: 1099 - Pages: 5

Premium Essay

Juniper Network Quality Management

...Nida Shehzad nidas88@gmail.com BSOP588 Managing Quality Juniper Network Quality Management Richard Sheng October 18, 2014 Juniper Networks, Inc. is an American manufacturer of networking equipment founded in 1996 by Pradeep Sindhu. It is headquartered in Sunnyvale, California, USA. Juniper Networks is in the business of network innovation. Our mission is to connect everything and empower everyone. The service providers, the biggest and busiest wireline and wireless carriers, cable and satellite operators, content and Internet services providers, and cloud and data center providers run on Juniper Networks. Juniper Networks went public on June 25, 1999. It was one of the most successful initial public offerings in history. It continues to grow and innovate, releasing new product, developing new technologies based on customer’s needs, and remaining at the forefront of high-performance networking. Juniper Networks is in the business of network innovation. From devices to data centers, from consumers to cloud providers, Juniper Networks delivers the software, silicon and systems that Transform the experience and economics of networking. The company serves customers and Partners worldwide. Juniper Networks believe the network can create a connected planet that unleashes a great wealth of possibility, innovation, and discovery that cannot be measured. Juniper Networks has developed and productized some of the industry’s most groundbreaking, disruptive innovations...

Words: 2046 - Pages: 9

Premium Essay

Nt1310 Unit 3 Network Management Research Paper

...Network management strategies require you to ensure your network is setup to be able to function properly together. To ensure the network is setup to function correctly, the user rights control, mail server control, network setup are established to secure a network. Control of user rights will enabled the control of information and access across the network. User rights across the network will be controlled by group policies provided by Windows 7 Enterprise. Group policy will control how user access resource on shared drives and allow tunneling access through vpn when on a business trip. Group policy will allow ease of propagation of user rights across the network. It is important to control access on a mail server as spear phishing and other methods could allow access into your network. The control of mail...

Words: 528 - Pages: 3

Premium Essay

Strategic Innovation Management in Global Industry Networks

...Asian Journal of Business Management 2(4): 110-120, 2010 ISSN: 2041-8752 © M axwell Scientific Organization, 2010 Submitted date: August 30, 2010 Accepted date: October 09, 2010 Published date: December 10, 2010 Strategic Innovation Management in Global Industry Networks: The TFT LCD Industry Guenter Boehm and 2 L.J. Fredericks Strategic Marketing, Samsung Electronics Co. Ltd., Yongin-449-711, South Korea 2 The Center of Poverty and Development Studies, Faculty of Economics and Administration, University of M alaya, Kuala Lumpur-5060 3, M alaysia 1 1 Abs tract: This study examines the strategic innovation management of the business creation process across the technology industry value chain in the global thin-film-transistor (TFT) liquid-crystal-display (LCD) industry based on an anonymous online survey of employees in the industry value chain and outside exp erts (universities, consultants, etc.). The study confirms that technology strategy formulation and a strategic center position are key industry concerns. It also affirms the utility of the industry value chain framework to manage technological innovations transcending that of a single company, and that strategic innov ation m anag eme nt in global high technology industries incorporates a shared business creation process structure involving as many industry value chain partners as possible. Key words: Global high technology industry networks, strategic innovation manageme nt, TFT L CD industry INTRODUCTION Globalization...

Words: 7166 - Pages: 29

Premium Essay

Introduction to Network Management

...Section 1: Target Organization 3 My Organization: 3 Section 2: Network Architecture 5 Section 3: Network Model 8 Section 4: Network Protocols 9 Section 5: Network Security 10 Section 6: Network Management 11 Section 7: Network+ Prep Toolkit 12 IP 2 Section 2 16 References: 17 Section 1: Target Organization My Organization: “The organization I am choosing is entirely made up. I’m going to call it Kritical Komputer Repair. (KKR) This isn’t just a small little computer repair shop we are talking about this is Kritical. Kritical has somewhere close to 100 employees; each one of these employee has to have a desktop that is capable of dual booting Linux and Windows 7 Enterprise. The company will have an in house server for file sharing and system maintenance. This company will have an outbound server as well that can speak with the in house server(s) in order to complete orders, and keep track of customer information. Both of these servers run Linux as well. I made this choice for a few different reasons it’s creative, it gives me a chance to learn by creating something new, and it gives me the flexibility that I need to succeed in this course. Kritical Computer was founded in 1991. Kritical Computer specializes in, computerization projects, security policies, consultation and selection of solutions, delivery of hardware and operating systems, installation and commissioning of computer networks, systems integration, implementation, training and technical assistance...

Words: 5964 - Pages: 24

Premium Essay

It245 Intro to Network Management

...IT245 IP5 Introduction to Network Management Individual Project Carol McClellan February 10, 2014 Contents Identifying the Network 4 The Company Considered 4 The Networks Considered 4 Servers Applied 4 Roles of Network managers 4 Diagramming the Network 5 Legend for the Diagram 5 Diagram 6 Network Models 7 The Seven Layers of the OSI Model 7 Physical Layer 7 Data Link Layer 7 Network Layer 7 Transport Layer 7 Session Layer 8 Presentation Layer 8 Application Layer 8 FCAPS 9 Fault Management 9 Configuration Management 9 Accounting 10 Performance 10 Security 10 Protocols and Agents 12 Transport Layer 12 Application Layer 12 Presentation Layer 13 Session Layer 13 Network Layer 13 Data Link Layer 14 Physical Layer 14 Network Security 15 Network Management2 16 FOOTNOTES 18 Identifying the Network The Company Considered I have decided to use Walmart for my individual project. It is an international company with 11,137 retail units in twenty-seven countries on five continents. It employs over two million people around the world. The Networks Considered There are numerous networks that would be needed for an international company such as this. In addition to the ones used nationally, there would be others in relation to language and monetary differences and shipping differences. There would also be a more extensive requirement as far as tariffs and taxes. Some of the national ones would be taking...

Words: 5551 - Pages: 23