SlideShare una empresa de Scribd logo
1 de 61
1 / 61
Network Management Systems
in Large Enterprise
by. Nour El-deen Mahmoud Khalifa
2 / 61
3 / 61
4 / 61
Outline
Introduction To Network Management (NM).
Functional Areas of NM.
Network Management Protocols.
Network Management Systems (NMS).
NMS in Large Enterprise.
Case Study.
NMS Products and Live Demo.
5 / 61
Introduction To Network Management (NM)
Network management is the process of controlling a
complex data network to maximize its efficiency and
productivity.
The overall goal is to ensure that complex data can
go across Network with maximum efficiency and
transparency to the users.
6 / 61
Outline
Introduction To Network Management (NM).
Functional Areas of NM.
Network Management Protocols.
Network Management Systems (NMS).
NMS in Large Enterprise.
Case Study.
NMS Products and Live Demo.
7 / 61
Functional Areas of Network Management (NM)
1. Configuration Management.
2. Fault Management.
3. Performance Management.
4. Security Management.
5. Accounting Management.
8 / 61
Configuration Management.
Initializing and configuring network :
1. Network Devices Configuration (bridges, switches,
routers, etc.)
2. Hardware / Software updates to network devices.
3. Workstations and Servers Configuration.
Gracefully shutting down part or all of the network.
Functional Areas of Network Management (NM)
9 / 61
Configuration Management.
How To Configure:
1. A console directly is attached to the device.
2. Remote login across the network.
3. Network Management System.
Functional Areas of Network Management (NM)
10 / 61
Functional Areas of Network Management (NM)
1. Configuration Management.
2. Fault Management.
3. Performance Management.
4. Security Management.
5. Accounting Management.
11 / 61
Fault Management
Is the process of locating problems, or faults on the
data network.
It involves the following steps:
1. Discover the problem.
2. Isolate the problem.
3. Fix the problem (if possible).
Functional Areas of Network Management (NM)
12 / 61
Fault Management
How to Fix The Fault
1. Reconfigure or modify network with Minimal effect
on network performance.
2. Repair or replace failed components.
Functional Areas of Network Management (NM)
13 / 61
Functional Areas of Network Management (NM)
1. Configuration Management.
2. Fault Management.
3. Performance Management.
4. Security Management.
5. Accounting Management.
14 / 61
Performance Management.
Involves measuring the performance of the network
hardware, software, and media.
Examples of measured activities are:
1. Overall throughput.
2. Percentage utilization.
3. Error rates and potential bottlenecks.
4. Response time.
Functional Areas of Network Management (NM)
15 / 61
1. Configuration Management.
2. Fault Management.
3. Performance Management.
4. Security Management.
5. Accounting Management.
Functional Areas of Network Management (NM)
16 / 61
Security Management.
 Is the process of controlling access to information on the data
network.
 Security management includes:
1. Confidentiality.
2. Integrity.
3. Authentication.
4. Availability.
5. Access control.
Functional Areas of Network Management (NM)
17 / 61
Security Management.
 Monitoring and controlling access to computer networks.
 Provides audit trails and sounds alarms for security breaches.
Functional Areas of Network Management (NM)
18 / 61
Functional Areas of Network Management (NM)
1. Configuration Management.
2. Fault Management.
3. Performance Management.
4. Security Management.
5. Accounting Management.
19 / 61
Accounting Management.
 Involves tracking individual’s utilization and network resources
(cost) to ensure that users have sufficient resources.
 Accounting Management trace Network for
1. User or group may be abusing access.
2. Users may be making inefficient use of network.
3. The Need for network growth.
Functional Areas of Network Management (NM)
20 / 61
Accounting Management.
 Accounting management may also place limits on the use of
network resources.
 Verify users' authorization to access and manipulate
accounting information.
Functional Areas of Network Management (NM)
21 / 61
Outline
Introduction To Network Management (NM).
Functional Areas of NM.
Network Management Protocols.
Network Management Systems (NMS).
NMS in Large Enterprise.
Case Study.
NMS Products and Live Demo.
22 / 61
Network Management Protocols.
 A simple protocol defines common data formats and
parameters and allows for easy retrieval of information.
 A complex protocol adds some change capability and security.
 An advanced protocol remotely executes network
management tasks, is independent of the network protocol
layer.
23 / 61
Network Management Protocols.
The most common Network Management Protocols are:
1. SNMP (Simple Network Management Protocol).
2. SNMPv2 and SNMPv3.
3. CMIS/CMIP (Common Management Information
Services/Common Management Information Protocol).
4. RMON (Remote network MONitoring) Version 1 and 2.
24 / 61
Simple Network Management Protocol
(SNMP)
 Proposed in 1989.
 Provides a tool
1. for multi-vendor, interoperable network management.
2. used across a broad spectrum of product types
Included in end systems, bridges, switches, routers and
telecommunications equipment.
 Operate in application layer - Port 161,162.
Network Management Protocols.
25 / 61
SNMP Versions
 SNMP v1
 Introduced 1989
 TCP/IP
 No security consideration
 Not efficient
 SNMP v2
 Introduced 1993
 TCP/IP & OSI
 Protecting Messages from Disclosure
 Multiple Request Problem solved
 Much Layers and More Complex
 SNMP v3
 Introduced 1998
 Built Upon the Two First Versions of SNMP
 Additional Security and Administrative Capabilities
Network Management Protocols.
26 / 61
CMIS/CMIP
 Common Management Information Services/Common
Management Information Protocol
 Run over OSI framework.
 More complicated than other protocols and is not very
common.
Network Management Protocols.
27 / 61
RMON
 Remote network MONitoring
 A supplement to SNMP
 Extend the capabilities of SNMP to include management of
LANs as well as the devices attached to those networks
 RMON 1 issued in 1991
 RMON 2 issued in 1995
Network Management Protocols.
28 / 61
What To Choose
SNMP and CMIP play complementary roles
depending on the size of the network, it may be best
to adopt a network management system that uses
both.
1. SNMP is used to manage specific LANs with RMON.
2. CMIP is used to manage a WAN of LANs.
Network Management Protocols.
29 / 61
Outline
Introduction to Network Management (NM).
Functional Areas of NM.
Network Management Protocols.
Network Management Systems (NMS).
NMS in Large Enterprise.
Case Study.
NMS Products and Live Demo.
30 / 61
Network Management Systems (NMS)
Introduction.
NMS Key Elements.
Network Management platform.
 How To choose Network Management System.
31 / 61
Introduction to Network Management
Systems (NMS)
 Collection of tools for network monitoring and control.
 Single operator interface.
 Powerful, user friendly command set.
 Performing most or all management Functions.
 View entire network as unified architecture.
 Active elements provide regular feedback.
Network Management System (NMS)
32 / 61
 NMS agents reside in the host computers and
communications processors (bridges, routers)
 Two or more network control centers are used
1. High availability (backup).
2. One center is idle or collecting statistics.
3. The other center is used for control.
Introduction to Network Management
Systems (NMS)
Network Management System (NMS)
33 / 61
Network Management Systems (NMS)
Introduction.
NMS Key Elements.
Network Management platform.
 How To choose Network Management System.
34 / 61
NMS Key Elements
 Management station.
 Management Agent.
 Management information base.
 Network management protocol.
Network Management System (NMS)
35 / 61
NMS Key Elements
Management Station
Management Agent
Management Agent
Management Agent
Network management protocol.
MIB
MIB
MIBMIB
36 / 61
1- Management Station
 Stand alone system or part of shared system.
 Interface for human network manager.
 Set of management applications
 Data analysis
 Fault recovery
 Interface to monitor and control network.
 Data base of network management information extracted
from managed entities
Network Management System Key Elements
37 / 61
2- Management Agent
 Hosts, bridges, hubs, routers equipped with agent software
 Allow them to be managed from management station
 Respond to requests for information
 Respond to requests for action
 Asynchronously supply unsolicited information
Network Management System Key Elements
38 / 61
3- Management Information Base
 Representation of network resources as objects.
 is a database used for managing the entities in a
communications network
 MIB is collection of access points at agent for management of
station.
 Objects standardized across class of system
 Bridge, router etc.
Network Management System Key Elements
39 / 61
4- Network Management Protocol
 Link between management station and agent.
 TCP/IP uses SNMP.
 OSI uses Common Management Information Protocol (CMIP).
 SNMPv2 (enhanced SNMP) for OSI and TCP/IP.
Network Management System Key Elements
40 / 61
NMS Key Elements
41 / 61
Network Management Systems (NMS)
Introduction.
NMS Key Elements.
Network Management platform.
 How To choose Network Management System.
42 / 61
Network Management platform
Basic features for any platform to include are:
 Graphical User Interface (GUI)
 Network Map
 Database Management System (DBMS)
 Standard Method to Query Devices
 Customizable Menu System
 Event Log
Network Management System (NMS)
43 / 61
Additional features for a platform include:
 Graphing Tools
 Application Programming Interface (API)
 System Security
Network Management platform
Network Management System (NMS)
44 / 61
Network Management Systems (NMS)
Introduction.
NMS Key Elements.
Network Management platform.
 How To choose Network Management System.
45 / 61
How To choose Network Management
System
 Two major components: the Platform and Applications
 A practical approach follows these steps:
 Perform device inventory
 Prioritize the functional areas of network management
 Survey network management applications
 Choose the network management platform
Network Management System (NMS)
46 / 61
Outline
Introduction to Network Management (NM).
Functional Areas of NM.
Network Management Protocols.
Network Management Systems (NMS).
NMS in Large Enterprise.
Case Study.
NMS Products and Live Demo.
47 / 61
NMS in Large Enterprise.
Large Enterprise International definition :
Over 5,000 Employees.
Annual turnover greater than 1.5 billion Euros
A balance sheet total of more than 2 billion Euros is also
considered to be a large enterprise.
National Institute for Statistics and Economic Studies - France
http://www.insee.fr/en/methodes/default.asp?page=definitions/grande-entreprise.htm
48 / 61
NMS in Large Enterprise.
IT Definition
Small and Midsize Business
 This size organization only has a part-time individual managing its data and/or IT
infrastructure.
 the organization may even outsource this task to a third party contractor.
Small and Midsize Enterprises
 This size organization has one or more full time IT employees dedicated to
managing its data and IT infrastructure.
 IT manager, system administrator or network administrator.
49 / 61
NMS in Large Enterprise.
Large Enterprise.
 This size organizations has grown to the point where it needs dedicated, full time IT
staff
 Hundreds or thousands of people working on PC or lab-tops.
 the organization will have a large amount of data (hundreds of TBs or even PBs,)
 SAN administrator, Exchange administrator, database administrator, etc
50 / 61
NMS in Large Enterprise.
 DNS (Domain Name Service) and AD (Active Directory)
 Servers and DHCP (Dynamic Host Control Protocol)
 firewalls and IDS/IPSs (Intrusion Detection/Prevention Systems)
 Critical connected application servers
 Monitoring devices resources and applications
 Monitoring ports/interfaces
 Setting performance thresholds
 Help desk and trouble ticketing
 Security monitoring and management
51 / 61
NMS in Large Enterprise.
52 / 61
NMS in Large Enterprise.
53 / 61
Outline
Introduction of Network Management (NM).
Functional Areas of NM.
Network Management Protocols.
Network Management Systems (NMS).
NMS in Large Enterprise.
Case Study.
NMS Products and Live Demo.
54 / 61
Case Study.
Financial institution (Allianz)
 Financial institution with 30,000 employees
 Two datacenters and more than 1,700 remote locations along with nearly
a dozen large corporate sites.
Solution:
 NMS with 5,500 routers and switches, 3,500 servers, 150 SAN devices,
3,400 PDUs, 500 firewalls, and over 100 load balancers.
55 / 61
Case Study.
Benefits
200 and 300 users use NMS tools to view dashboards and reports about the
whole network.
 Lowering expenses by improving asset utilization.
 Optimizing network availability and performance.
 Resolve Faults before they damage the reputation of the enterprise.
 Increase The productivity of employees.
56 / 61
Outline
Introduction of Network Management (NM).
Functional Areas of NM.
Network Management Protocols.
Network Management Systems (NMS).
NMS in Large Enterprise.
Case Study.
NMS Products and Live Demo.
57 / 61
 Management Software that exist today
1. HP IMC Enterprise Software Platform
2. Netcool Network Management by IBM
3. ManageEngine OpManager
4. Cisco’s CiscoWorks
5. 3Com’s Transcend
NMS Products and Live Demo.
58 / 61
NMS Products and Live Demo.
http://1milliondemo.opmanager.com/overview.do?sele
ctedTab=Home&fromLogin=true
59 / 61
Review Questions
 List and briefly define the functional areas for network management?
 What are the key elements of Network Management System ?
 What are the differences among SNMPv1, SNMPv2, and SNMPv3?
 What are the most common Network Management System products ?
60 / 61
References
 William Stallings. 1998. Snmp,Snmpv2,Snmpv3,And RMON 1 and 2 (3rd ed.).
Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA.
 M. Subranamian. Network Management: Principles and Practice . Addison-Wesley,
2000.
 Alexander Clemm. Network management fundamentals. Indianapolis: Cisco Press,
2007.
61 / 61
THANKS

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
Network Management System and Protocol
Network Management System and Protocol Network Management System and Protocol
Network Management System and Protocol
 
Snmp
SnmpSnmp
Snmp
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
SNMP AT a GLANCE
SNMP AT a GLANCESNMP AT a GLANCE
SNMP AT a GLANCE
 
IP Addressing and subnetting
IP Addressing and subnettingIP Addressing and subnetting
IP Addressing and subnetting
 
Protocol snmp
Protocol snmpProtocol snmp
Protocol snmp
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
 
MAC Address – All you Need to Know About it
MAC Address – All you Need to Know About itMAC Address – All you Need to Know About it
MAC Address – All you Need to Know About it
 
Network Monitoring Basics
Network Monitoring BasicsNetwork Monitoring Basics
Network Monitoring Basics
 
Subnetting
SubnettingSubnetting
Subnetting
 
Chapter07
Chapter07Chapter07
Chapter07
 
snmp
snmpsnmp
snmp
 
SNMP
SNMPSNMP
SNMP
 
Snmp
SnmpSnmp
Snmp
 
Snmpv3
Snmpv3Snmpv3
Snmpv3
 
enterprise network design architecture
enterprise network design architectureenterprise network design architecture
enterprise network design architecture
 
Sub Netting
Sub NettingSub Netting
Sub Netting
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 

Destacado

Smart Instruments, Fieldbus, Ethernet and Wireless
Smart Instruments, Fieldbus, Ethernet and Wireless Smart Instruments, Fieldbus, Ethernet and Wireless
Smart Instruments, Fieldbus, Ethernet and Wireless Living Online
 
SNMP Network Management the Essentials
SNMP Network Management the EssentialsSNMP Network Management the Essentials
SNMP Network Management the EssentialsLiving Online
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolRajan Pandey
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)Gurjot Singh
 
Network management
Network managementNetwork management
Network managementMohd Arif
 

Destacado (7)

Smart Instruments, Fieldbus, Ethernet and Wireless
Smart Instruments, Fieldbus, Ethernet and Wireless Smart Instruments, Fieldbus, Ethernet and Wireless
Smart Instruments, Fieldbus, Ethernet and Wireless
 
SNMP Network Management the Essentials
SNMP Network Management the EssentialsSNMP Network Management the Essentials
SNMP Network Management the Essentials
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
 
HTTP Basics
HTTP BasicsHTTP Basics
HTTP Basics
 
Network management
Network managementNetwork management
Network management
 
Smtp
SmtpSmtp
Smtp
 

Similar a Network management systems in large enterprise

Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptxtahaazad2
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comProf Ansari
 
Project report
Project reportProject report
Project reportayush13bbm
 
Cisco network management
Cisco network managementCisco network management
Cisco network managementIT Tech
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Alexander Decker
 
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdfQuestion No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdffashiionbeutycare
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management ProtocolNilantha Piyasiri
 
A novel resource efficient dmms approach for network monitoring and controlli...
A novel resource efficient dmms approach for network monitoring and controlli...A novel resource efficient dmms approach for network monitoring and controlli...
A novel resource efficient dmms approach for network monitoring and controlli...ijwmn
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Abdullaziz Tagawy
 
Simple network management protocol
Simple network management protocolSimple network management protocol
Simple network management protocolni35540
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069William Lee
 
group presentation
group presentationgroup presentation
group presentations1120099
 
Snmp chapter7
Snmp chapter7Snmp chapter7
Snmp chapter7jignash
 
5-network-management-protocol.pptx
5-network-management-protocol.pptx5-network-management-protocol.pptx
5-network-management-protocol.pptxAhmedAlRasheed18
 
Network management aa
Network management  aaNetwork management  aa
Network management aaDhani Ahmad
 
Introdunction To Network Management Protocols SNMP & TR-069
Introdunction To Network Management Protocols SNMP & TR-069Introdunction To Network Management Protocols SNMP & TR-069
Introdunction To Network Management Protocols SNMP & TR-069William Lee
 

Similar a Network management systems in large enterprise (20)

Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptx
 
Hp open view
Hp open viewHp open view
Hp open view
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
 
Project report
Project reportProject report
Project report
 
Cisco network management
Cisco network managementCisco network management
Cisco network management
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
 
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdfQuestion No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
Question No. 1What updates have been brought by snmpv2 to SNMPv1 c.pdf
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
A novel resource efficient dmms approach for network monitoring and controlli...
A novel resource efficient dmms approach for network monitoring and controlli...A novel resource efficient dmms approach for network monitoring and controlli...
A novel resource efficient dmms approach for network monitoring and controlli...
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
 
Simple network management protocol
Simple network management protocolSimple network management protocol
Simple network management protocol
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069
 
SNMP
SNMPSNMP
SNMP
 
group presentation
group presentationgroup presentation
group presentation
 
Snmp chapter7
Snmp chapter7Snmp chapter7
Snmp chapter7
 
group G
group Ggroup G
group G
 
a
aa
a
 
5-network-management-protocol.pptx
5-network-management-protocol.pptx5-network-management-protocol.pptx
5-network-management-protocol.pptx
 
Network management aa
Network management  aaNetwork management  aa
Network management aa
 
Introdunction To Network Management Protocols SNMP & TR-069
Introdunction To Network Management Protocols SNMP & TR-069Introdunction To Network Management Protocols SNMP & TR-069
Introdunction To Network Management Protocols SNMP & TR-069
 

Último

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Último (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Network management systems in large enterprise

  • 1. 1 / 61 Network Management Systems in Large Enterprise by. Nour El-deen Mahmoud Khalifa
  • 4. 4 / 61 Outline Introduction To Network Management (NM). Functional Areas of NM. Network Management Protocols. Network Management Systems (NMS). NMS in Large Enterprise. Case Study. NMS Products and Live Demo.
  • 5. 5 / 61 Introduction To Network Management (NM) Network management is the process of controlling a complex data network to maximize its efficiency and productivity. The overall goal is to ensure that complex data can go across Network with maximum efficiency and transparency to the users.
  • 6. 6 / 61 Outline Introduction To Network Management (NM). Functional Areas of NM. Network Management Protocols. Network Management Systems (NMS). NMS in Large Enterprise. Case Study. NMS Products and Live Demo.
  • 7. 7 / 61 Functional Areas of Network Management (NM) 1. Configuration Management. 2. Fault Management. 3. Performance Management. 4. Security Management. 5. Accounting Management.
  • 8. 8 / 61 Configuration Management. Initializing and configuring network : 1. Network Devices Configuration (bridges, switches, routers, etc.) 2. Hardware / Software updates to network devices. 3. Workstations and Servers Configuration. Gracefully shutting down part or all of the network. Functional Areas of Network Management (NM)
  • 9. 9 / 61 Configuration Management. How To Configure: 1. A console directly is attached to the device. 2. Remote login across the network. 3. Network Management System. Functional Areas of Network Management (NM)
  • 10. 10 / 61 Functional Areas of Network Management (NM) 1. Configuration Management. 2. Fault Management. 3. Performance Management. 4. Security Management. 5. Accounting Management.
  • 11. 11 / 61 Fault Management Is the process of locating problems, or faults on the data network. It involves the following steps: 1. Discover the problem. 2. Isolate the problem. 3. Fix the problem (if possible). Functional Areas of Network Management (NM)
  • 12. 12 / 61 Fault Management How to Fix The Fault 1. Reconfigure or modify network with Minimal effect on network performance. 2. Repair or replace failed components. Functional Areas of Network Management (NM)
  • 13. 13 / 61 Functional Areas of Network Management (NM) 1. Configuration Management. 2. Fault Management. 3. Performance Management. 4. Security Management. 5. Accounting Management.
  • 14. 14 / 61 Performance Management. Involves measuring the performance of the network hardware, software, and media. Examples of measured activities are: 1. Overall throughput. 2. Percentage utilization. 3. Error rates and potential bottlenecks. 4. Response time. Functional Areas of Network Management (NM)
  • 15. 15 / 61 1. Configuration Management. 2. Fault Management. 3. Performance Management. 4. Security Management. 5. Accounting Management. Functional Areas of Network Management (NM)
  • 16. 16 / 61 Security Management.  Is the process of controlling access to information on the data network.  Security management includes: 1. Confidentiality. 2. Integrity. 3. Authentication. 4. Availability. 5. Access control. Functional Areas of Network Management (NM)
  • 17. 17 / 61 Security Management.  Monitoring and controlling access to computer networks.  Provides audit trails and sounds alarms for security breaches. Functional Areas of Network Management (NM)
  • 18. 18 / 61 Functional Areas of Network Management (NM) 1. Configuration Management. 2. Fault Management. 3. Performance Management. 4. Security Management. 5. Accounting Management.
  • 19. 19 / 61 Accounting Management.  Involves tracking individual’s utilization and network resources (cost) to ensure that users have sufficient resources.  Accounting Management trace Network for 1. User or group may be abusing access. 2. Users may be making inefficient use of network. 3. The Need for network growth. Functional Areas of Network Management (NM)
  • 20. 20 / 61 Accounting Management.  Accounting management may also place limits on the use of network resources.  Verify users' authorization to access and manipulate accounting information. Functional Areas of Network Management (NM)
  • 21. 21 / 61 Outline Introduction To Network Management (NM). Functional Areas of NM. Network Management Protocols. Network Management Systems (NMS). NMS in Large Enterprise. Case Study. NMS Products and Live Demo.
  • 22. 22 / 61 Network Management Protocols.  A simple protocol defines common data formats and parameters and allows for easy retrieval of information.  A complex protocol adds some change capability and security.  An advanced protocol remotely executes network management tasks, is independent of the network protocol layer.
  • 23. 23 / 61 Network Management Protocols. The most common Network Management Protocols are: 1. SNMP (Simple Network Management Protocol). 2. SNMPv2 and SNMPv3. 3. CMIS/CMIP (Common Management Information Services/Common Management Information Protocol). 4. RMON (Remote network MONitoring) Version 1 and 2.
  • 24. 24 / 61 Simple Network Management Protocol (SNMP)  Proposed in 1989.  Provides a tool 1. for multi-vendor, interoperable network management. 2. used across a broad spectrum of product types Included in end systems, bridges, switches, routers and telecommunications equipment.  Operate in application layer - Port 161,162. Network Management Protocols.
  • 25. 25 / 61 SNMP Versions  SNMP v1  Introduced 1989  TCP/IP  No security consideration  Not efficient  SNMP v2  Introduced 1993  TCP/IP & OSI  Protecting Messages from Disclosure  Multiple Request Problem solved  Much Layers and More Complex  SNMP v3  Introduced 1998  Built Upon the Two First Versions of SNMP  Additional Security and Administrative Capabilities Network Management Protocols.
  • 26. 26 / 61 CMIS/CMIP  Common Management Information Services/Common Management Information Protocol  Run over OSI framework.  More complicated than other protocols and is not very common. Network Management Protocols.
  • 27. 27 / 61 RMON  Remote network MONitoring  A supplement to SNMP  Extend the capabilities of SNMP to include management of LANs as well as the devices attached to those networks  RMON 1 issued in 1991  RMON 2 issued in 1995 Network Management Protocols.
  • 28. 28 / 61 What To Choose SNMP and CMIP play complementary roles depending on the size of the network, it may be best to adopt a network management system that uses both. 1. SNMP is used to manage specific LANs with RMON. 2. CMIP is used to manage a WAN of LANs. Network Management Protocols.
  • 29. 29 / 61 Outline Introduction to Network Management (NM). Functional Areas of NM. Network Management Protocols. Network Management Systems (NMS). NMS in Large Enterprise. Case Study. NMS Products and Live Demo.
  • 30. 30 / 61 Network Management Systems (NMS) Introduction. NMS Key Elements. Network Management platform.  How To choose Network Management System.
  • 31. 31 / 61 Introduction to Network Management Systems (NMS)  Collection of tools for network monitoring and control.  Single operator interface.  Powerful, user friendly command set.  Performing most or all management Functions.  View entire network as unified architecture.  Active elements provide regular feedback. Network Management System (NMS)
  • 32. 32 / 61  NMS agents reside in the host computers and communications processors (bridges, routers)  Two or more network control centers are used 1. High availability (backup). 2. One center is idle or collecting statistics. 3. The other center is used for control. Introduction to Network Management Systems (NMS) Network Management System (NMS)
  • 33. 33 / 61 Network Management Systems (NMS) Introduction. NMS Key Elements. Network Management platform.  How To choose Network Management System.
  • 34. 34 / 61 NMS Key Elements  Management station.  Management Agent.  Management information base.  Network management protocol. Network Management System (NMS)
  • 35. 35 / 61 NMS Key Elements Management Station Management Agent Management Agent Management Agent Network management protocol. MIB MIB MIBMIB
  • 36. 36 / 61 1- Management Station  Stand alone system or part of shared system.  Interface for human network manager.  Set of management applications  Data analysis  Fault recovery  Interface to monitor and control network.  Data base of network management information extracted from managed entities Network Management System Key Elements
  • 37. 37 / 61 2- Management Agent  Hosts, bridges, hubs, routers equipped with agent software  Allow them to be managed from management station  Respond to requests for information  Respond to requests for action  Asynchronously supply unsolicited information Network Management System Key Elements
  • 38. 38 / 61 3- Management Information Base  Representation of network resources as objects.  is a database used for managing the entities in a communications network  MIB is collection of access points at agent for management of station.  Objects standardized across class of system  Bridge, router etc. Network Management System Key Elements
  • 39. 39 / 61 4- Network Management Protocol  Link between management station and agent.  TCP/IP uses SNMP.  OSI uses Common Management Information Protocol (CMIP).  SNMPv2 (enhanced SNMP) for OSI and TCP/IP. Network Management System Key Elements
  • 40. 40 / 61 NMS Key Elements
  • 41. 41 / 61 Network Management Systems (NMS) Introduction. NMS Key Elements. Network Management platform.  How To choose Network Management System.
  • 42. 42 / 61 Network Management platform Basic features for any platform to include are:  Graphical User Interface (GUI)  Network Map  Database Management System (DBMS)  Standard Method to Query Devices  Customizable Menu System  Event Log Network Management System (NMS)
  • 43. 43 / 61 Additional features for a platform include:  Graphing Tools  Application Programming Interface (API)  System Security Network Management platform Network Management System (NMS)
  • 44. 44 / 61 Network Management Systems (NMS) Introduction. NMS Key Elements. Network Management platform.  How To choose Network Management System.
  • 45. 45 / 61 How To choose Network Management System  Two major components: the Platform and Applications  A practical approach follows these steps:  Perform device inventory  Prioritize the functional areas of network management  Survey network management applications  Choose the network management platform Network Management System (NMS)
  • 46. 46 / 61 Outline Introduction to Network Management (NM). Functional Areas of NM. Network Management Protocols. Network Management Systems (NMS). NMS in Large Enterprise. Case Study. NMS Products and Live Demo.
  • 47. 47 / 61 NMS in Large Enterprise. Large Enterprise International definition : Over 5,000 Employees. Annual turnover greater than 1.5 billion Euros A balance sheet total of more than 2 billion Euros is also considered to be a large enterprise. National Institute for Statistics and Economic Studies - France http://www.insee.fr/en/methodes/default.asp?page=definitions/grande-entreprise.htm
  • 48. 48 / 61 NMS in Large Enterprise. IT Definition Small and Midsize Business  This size organization only has a part-time individual managing its data and/or IT infrastructure.  the organization may even outsource this task to a third party contractor. Small and Midsize Enterprises  This size organization has one or more full time IT employees dedicated to managing its data and IT infrastructure.  IT manager, system administrator or network administrator.
  • 49. 49 / 61 NMS in Large Enterprise. Large Enterprise.  This size organizations has grown to the point where it needs dedicated, full time IT staff  Hundreds or thousands of people working on PC or lab-tops.  the organization will have a large amount of data (hundreds of TBs or even PBs,)  SAN administrator, Exchange administrator, database administrator, etc
  • 50. 50 / 61 NMS in Large Enterprise.  DNS (Domain Name Service) and AD (Active Directory)  Servers and DHCP (Dynamic Host Control Protocol)  firewalls and IDS/IPSs (Intrusion Detection/Prevention Systems)  Critical connected application servers  Monitoring devices resources and applications  Monitoring ports/interfaces  Setting performance thresholds  Help desk and trouble ticketing  Security monitoring and management
  • 51. 51 / 61 NMS in Large Enterprise.
  • 52. 52 / 61 NMS in Large Enterprise.
  • 53. 53 / 61 Outline Introduction of Network Management (NM). Functional Areas of NM. Network Management Protocols. Network Management Systems (NMS). NMS in Large Enterprise. Case Study. NMS Products and Live Demo.
  • 54. 54 / 61 Case Study. Financial institution (Allianz)  Financial institution with 30,000 employees  Two datacenters and more than 1,700 remote locations along with nearly a dozen large corporate sites. Solution:  NMS with 5,500 routers and switches, 3,500 servers, 150 SAN devices, 3,400 PDUs, 500 firewalls, and over 100 load balancers.
  • 55. 55 / 61 Case Study. Benefits 200 and 300 users use NMS tools to view dashboards and reports about the whole network.  Lowering expenses by improving asset utilization.  Optimizing network availability and performance.  Resolve Faults before they damage the reputation of the enterprise.  Increase The productivity of employees.
  • 56. 56 / 61 Outline Introduction of Network Management (NM). Functional Areas of NM. Network Management Protocols. Network Management Systems (NMS). NMS in Large Enterprise. Case Study. NMS Products and Live Demo.
  • 57. 57 / 61  Management Software that exist today 1. HP IMC Enterprise Software Platform 2. Netcool Network Management by IBM 3. ManageEngine OpManager 4. Cisco’s CiscoWorks 5. 3Com’s Transcend NMS Products and Live Demo.
  • 58. 58 / 61 NMS Products and Live Demo. http://1milliondemo.opmanager.com/overview.do?sele ctedTab=Home&fromLogin=true
  • 59. 59 / 61 Review Questions  List and briefly define the functional areas for network management?  What are the key elements of Network Management System ?  What are the differences among SNMPv1, SNMPv2, and SNMPv3?  What are the most common Network Management System products ?
  • 60. 60 / 61 References  William Stallings. 1998. Snmp,Snmpv2,Snmpv3,And RMON 1 and 2 (3rd ed.). Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA.  M. Subranamian. Network Management: Principles and Practice . Addison-Wesley, 2000.  Alexander Clemm. Network management fundamentals. Indianapolis: Cisco Press, 2007.