network

Published on June 2016 | Categories: Documents | Downloads: 33 | Comments: 0 | Views: 296
of 9
Download PDF   Embed   Report

Comments

Content

M.C.A. DEGREE EXAMINATION, 2008 ( FOURTH SEMESTER ) ( PAPER - XXIV ) 431. NETWORK MANAGEMENT AND ADMINISTRATION ( New Regulations ) ( Including Lateral Entry ) December ] [ Time : 3 Hours Maximum : 100 Marks SECTION - A (8 × 5 = 40) Answer any EIGHT questions. All questions carry equal marks. 1. Discuss briefly about the need for network management. 2. Explain coexistence in detail. 3. What are Procedures ? - Explain. 4. Explain network management RFCs in detail. 5. Explain about Performance Monitoring. 6. What are configuration control standards ? - Explain. 7. Write short notes on MIPs. 8. Explain conformance in detail. 9. Explain Remote Network Monitoring ? 10. Write short notes on RMON 1 standards. SECTION - B (3 × 20 = 60) Answer any THREE questions. All questions carry equal marks. 11. Discuss in detail about the Data Representation in network Management Model. (20) 12. Explain the Administrative and Operational Models in detail. (20) 13. Write short notes on : (2 × 10 = 20) (a) Security Control. (b) Fault Monitoring. 14. Compare SNMP with SNMPV 2 (20) 15. Write short notes on : (2 × 10 = 20) (a) NNM. (b) RMON 2 Devices.

Network Management Network management is the top-level administration and maintenance of large networks, often in areas such as computers or telecommunications, but not including user terminal equipment. In network management, functions such as security, monitoring, control, allocation, deployment, coordination and planning are executed. Network management is governed by a large number of protocols that exist for its support, including SNMP, CMIP, WBEM, Common Information Model, Java Management Extensions, Transaction Language 1, and Netconf. Routing, which refers to the process of selecting the paths in a computer network on which to send data, is an important area of network management. In this area of network management, logically addressed packets are passed from their source to their destination through nodes, which are called routers, in a process called forwarding. This is usually based on routing tables that maintain a record of the most efficient routes. Security management is also a key component of network management. Security management protects a network from unauthorized access and includes many sub-functions, such as the authorization of subscriber access, control of the distribution of cryptographic keying material, and the distribution and reporting of security related events. Configuration management relates to both the security and quality areas of network management. It refers to the management of security features in a network by controlling changes made to the software, hardware, firmware, documentation, and test features in a system. This area of network management keeps the system under control as it evolves and grows, maintaining quality and security. Software configuration management can be divided into two main areas. The first is concerned with storage of entities from a software development project and is sometimes called component repository management. The second area involves production and change to these entities and is often referred to as engineering support. Successful network management also uses accounting management. Accounting management controls and reports on the financial status of the network. This is done though analysis, planning, control of financial data reporting programs, and reporting for managerial decisions. This area of network management involves bank account maintenance, financial statement development, and analysis of cash flow and financial health.

What is a Network?
A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams. The two basic types of networks include:
• •

Local Area Network (LAN) Wide Area Network (WAN)

You may also see references to a Metropolitan Area Networks (MAN), a Wireless LAN (WLAN), or a Wireless WAN (WWAN).

Local Area Network
A Local Area Network (LAN) is a network that is confined to a relatively small area. It is generally limited to a geographic area such as a writing lab, school, or building. Rarely are LAN computers more than a mile apart. In a typical LAN configuration, one computer is designated as the file server. It stores all of the software that controls the network, as well as the software that can be shared by the computers attached to the network. Computers connected to the file server are called workstations. The workstations can be less powerful than the file server, and they may have additional software on their hard drives. On many LANs, cables are used to connect the network interface cards in each computer; other LANs may be wireless. See the Topology, Cabling, and Hardware sections of this tutorial for more information on the configuration of a LAN.

Wide Area Network
Wide Area Networks (WANs) connect larger geographic areas, such as Florida, the United States, or the world. Dedicated transoceanic cabling or satellite uplinks may be used to connect this type of network. Using a WAN, schools in Florida can communicate with places like Tokyo in a matter of minutes, without paying enormous phone bills. A WAN is complicated. It uses multiplexers to connect local and metropolitan networks to global communications networks like the Internet. To users, however, a WAN will not appear to be much different than a LAN.

Advantages of Installing a School Network


• •











Speed. Networks provide a very rapid method for sharing and transferring files. Without a network, files are shared by copying them to memory cards or discs, then carrying or sending the discs from one computer to another. This method of transferring files (referred to as sneaker-net) can be very time-consuming. Cost. Networkable versions of many popular software programs are available at considerable savings when compared to buying individually licensed copies. Security. Files and programs on a network can be designated as "copy inhibit," so that you do not have to worry about illegal copying of programs. Also, passwords can be established for specific directories to restrict access to authorized users. Centralized Software Management. One of the greatest benefits of installing a network at a school is the fact that all of the software can be loaded on one computer (the file server). This eliminates that need to spend time and energy installing updates and tracking files on independent computers throughout the building. Resource Sharing. Sharing resources is another advantage of school networks. Most schools cannot afford enough laser printers, fax machines, modems, scanners, and CD players for each computer. However, if these or similar peripherals are added to a network, they can be shared by many users. Electronic Mail. The presence of a network provides the hardware necessary to install an e-mail system. E-mail aids in personal and professional communication for all school personnel, and it facilitates the dissemination of general information to the entire school staff. Electronic mail on a LAN can enable students to communicate with teachers and peers at their own school. If the LAN is connected to the Internet, students can communicate with others throughout the world. Flexible Access. School networks allow students to access their files from computers throughout the school. Students can begin an assignment in their classroom, save part of it on a public access area of the network, then go to the media center after school to finish their work. Students can also work cooperatively through the network. Workgroup Computing. Collaborative software allows many users to work on a document or project concurrently. For example, educators located at various schools within a county could simultaneously contribute their ideas about new curriculum standards to the same document, spreadsheets, or website.

Disadvantages of Installing a School Network




Expensive to Install. Although a network will generally save money over time, the initial costs of installation can be prohibitive. Cables, network cards, routers, and software are expensive, and the installation may require the services of a technician. Requires Administrative Time. Proper maintenance of a network requires considerable time and expertise. Many schools have installed a network, only to find that they did not budget for the necessary administrative support.







File Server May Fail. Although a file server is no more susceptible to failure than any other computer, when the files server "goes down," the entire network may come to a halt. When this happens, the entire school may lose access to necessary programs and files. Cables May Break. The Topology chapter presents information about the various configurations of cables. Some of the configurations are designed to minimize the inconvenience of a broken cable; with other configurations, one broken cable can stop the entire network. Must Monitor Security Issues. Wireless networks are becoming increasingly common; however, security can be an issue with wireless networks.

What is a Protocol?
A protocol is a set of rules that governs the communications between computers on a network. In order for two computers to talk to each other, they must be speaking the same language. Many different types of network protocols and standards are required to ensure that your computer (no matter which operating system, network card, or application you are using) can communicate with another computer located on the next desk or half-way around the world. The OSI (Open Systems Interconnection) Reference Model defines seven layers of networking protocols. The complexity of these layers is beyond the scope of this tutorial; however, they can be simplified into four layers to help identify some of the protocols with which you should be familiar (see fig 1). OSI Layer 7 6 5 4 3 2 1 Name Application Presentation Session Transport Network Data Link Physical Common Protocols HTTP | FTP | SMTP | DNS TCP IP Ethernet SPX IPX

Fig 1. OSI model related to common network protocols

Advantages of wireless networks:




Mobility - With a laptop computer or mobile device, access can be available throughout a school, at the mall, on an airplane, etc. More an more businesses are also offering free WiFi access. Fast setup - If your computer has a wireless adapter, locating a wireless network can be as simple as clicking "Connect to a Network" -- in some cases, you will connect automatically to networks within range.

• •

Cost - Setting up a wireless network can be much more cost effective than buying and installing cables. Expandability - Adding new computers to a wireless network is as easy as turning the computer on (as long as you do not exceed the maximum number of devices).

Disadvantages of wireless networks:










Security - Wireless networks are much more susceptible to unauthorized use. If you set up a wireless network, be sure to include maximum security. You should always enable WEP (Wired Equivalent Privacy) or WPA (Wi-Fi Protected Access), which will improve security and help to prevent virtual intruders and freeloaders. Interference - Because wireless networks use radio signals and similar techniques for transmission, they are susceptible to interference from lights and electronic devices. Inconsistent connections - How many times have you hears "Wait a minute, I just lost my connection?" Because of the interference caused by electrical devices and/or items blocking the path of transmission, wireless connections are not nearly as stable as those through a dedicated cable. Power consumption - The wireless transmitter in a laptop requires a significant amount of power; therefore, the battery life of laptops can be adversely impacted. If you are planning a laptop project in your classroom, be sure to have power plugs and/or additional batteries available. Speed - The transmission speed of wireless networks is improving; however, faster options (such as gigabit Ethernet) are available via cables. In addition, if set up a wireless network at home, and you are connecting to the Internet via a DSL modem (at perhaps 3 Mbps), your wireless access to the Internet will have a maximum of 3 Mbps connection speed.

What is a Network Operating System?
Unlike operating systems, such as Windows, that are designed for single users to control one computer, network operating systems (NOS) coordinate the activities of multiple computers across a network. The network operating system acts as a director to keep the network running smoothly. The two major types of network operating systems are:
• •

Peer-to-Peer Client/Server

Peer-to-peer network operating systems allow users to share resources and files located on their computers and to access shared resources found on other computers. However, they do not have a file server or a centralized management source

Advantages of a peer-to-peer network:
• •

Less initial expense - No need for a dedicated server. Setup - An operating system (such as Windows XP) already in place may only need to be reconfigured for peer-to-peer operations.

Disadvantages of a peer-to-peer network:
• •

Decentralized - No central repository for files and applications. Security - Does not provide the security available on a client/server network.

In the PRESENT ERA MANAGEMENT of network is very difficult job to do. because in this management you should deliver and ensure a secure communication ,very simple in use steps, high network availability and many different technologies which are used for management of network. Network management model & architecture are designed by keeping support and convenience of users in mind. Different types of models of network management have been developed by the scientists who provide a good networking to clients. Network management model: A special type of model which is used to design the different structures that can support or help in arranging the network is called as network management models. The basic function of network management models are to provide such great networking in the filed of computer networking, telecommunication, business management and are also used for monitoring purposes. There are different models which supports the network management models and architectures are F CAPS, TMN, and OAM &P etc. But the major model of network management model and architecture

which is the base of such networks is FCAPS. It stands for Fault, Configuration, Accounting, Performance and Security. Area function of this model is as follows

Fault: A type of network management model which is used for detecting many kinds fault present in the network is referred as fault management. To remove such faults a special type of fault management technique is used which is based on SNMP or you can contact apopropriate persons for the fixing of such problem. Configuration: Type of management which is used for check the system configuration is called as configuration management. This area of function of network management model plays an important in configuring the hardware or software of system. Accounting: It is a type of management which is used for managing, recording and clearing all the expenses and revenues of a specific firm is called as accounting management. Performance: Performance management is the type of area of model o network management which is used to collect the information from the network and enhance the networking system. Security: Security management is used in these areas to prevent some kind of problems related to networking technology. It resolve the problem by three methods i.e. authentication, association and data encryption.

A network administrator is a person responsible for the maintenance of computer hardware and software that comprises a computer network. This normally includes deploying, configuring, maintaining and monitoring active network equipment. A related role is that of the network specialist, or network analyst, who concentrates on networkdesign and security. The network administrator (or "network admin") is usually the level of technical/network staff in an organization and will rarely be involved with direct user support.[citation needed] The network administrator will concentrate on the overall integrity of the network, server deployment, security, and ensuring that the network connectivity throughout a company's LAN/WAN infrastructure is on par with technical considerations at the network level of an organization's hierarchy. Network administrators are considered tier 3 support personnel that only work on break/fix issues that could not be resolved at the tier 1 (helpdesk) or tier 2 (desktop/network technician) levels. Depending on the company, the Network Administrator may also design and deploy networks.

Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems.[1]








Operation deals with keeping the network (and the services that the network provides) up and running smoothly. It includes monitoring the network to spot problems as soon as possible, ideally before users are affected. Administration deals with keeping track of resources in the network and how they are assigned. It includes all the "housekeeping" that is necessary to keep the network under control. Maintenance is concerned with performing repairs and upgrades—for example, when equipment must be replaced, when a router needs a patch for an operating system image, when a new switch is added to a network. Maintenance also involves corrective and preventive measures to make the managed network run "better", such as adjusting device configuration parameters. Provisioning is concerned with configuring resources in the network to support a given service. For example, this might include setting up the network so that a new customer can receive voice service.

A common way of characterizing network management functions is FCAPS—Fault, Configuration, Accounting, Performance and Security.

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close