Intranet System Management Flashcards

1
Q

Motivations for Network Management

A

Computer networks become mission-critical
-Down time in IT systems cause problems for industry
-Organisational asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Goals for Network Management

A

Need responsive network management
-Help desk
-Network support technicians
-Network Systems Management
-Monitors the network
-Providing the ability to diagnose and control the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Network Systems Management

A
  • Runs on a simple workstation (PC)
  • Monitors the network
  • Displays the current situation/status
  • Identifies “trigger points”
  • Notifies Problems as they arise
  • Identifies causes
  • Supports remote diagnostics
  • Intelligent network management
  • Self Healing Networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TCP/IP Network Management

A

Network management involves three distinct needs
- Protocol to write/read critical network management data
- E.G. Event reports
- Database of specific parameters
- e.g. queue-length, throughput etc
- A computer independent definition of the parameters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TCP/IP Network Management met by

A

SNMP: Simple Network Management Protocols
-Read/write protocol between managers and network devices

MIB: Management Information Bases
-The databases of network management information

SMI: Structure of Management Information
-Computer independent notation to describe the data items

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Simple Network Management Protocol (SNMP)

A

The manger needs to be able to monitor and control the agent devices

To be able to:
- Read the value of the individual parameters (SNMP Get)
- Read sequences of table entries (SNMP Get_Next)
- Write into parameter values (SNMP Set)
- Receive unsolicited event reports (SNMP Trap)

These events and parameters are the MIBs which are documents using SMI notation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Remote MONitor (RMON)

A

SNMP MIBs include Remote Monitor capabilities

RMON implementation
- Independent probe devices(software) attached to each LAN segment
- Can be integrated into networking devices
-Has a performance impact!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RMON

A

Available in two forms
-RMON 1 monitors OSI layers 1 and 2
-Collision statistics and error statistics
-RMON 2 includes monitoring of higher levels
-Hosts and what application cause the most traffic etc

Can be cost effective, helps control traffic throughput.

Increases the effectiveness of network management personnel and Identifies where the problems are for trouble shooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network Management Areas

A

OSI identifies five areas of network management:
-Configuration
-Fault management
-Performance management
-Accounting management
-Security management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Configuration Management

A

Includes a wide range of issues
-Address and name assignments to network devices
-Hardware/software updates to Switches, routers
-Software license control etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Configuration Management various parameters

A

-Configure Switch and routers to filter out certain types of traffic

-Multi protocol routers can be configured to run selected protocols

-Configuration of bit rate, parity etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fault Management

A

Fault Management Provides:
-Identification and isolation of faults detected

Tools and Techniques include:
-Bit-Error Rate Test (BERT)
-Time Domain Reflectometer (TDR)
-Optical TDR (OTDR)
-Protocol analyzer (for data links and LANs)
-Used for troubleshooting all protocol layers
-Loopback Tests
-Ping
-Artificial Traffic Generation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fault Isolation – LAN’s

A

Limiting faults is possible by isolating the fault using switches and router configurations

All traffic across the LAN can be monitored

All exceptional conditions can be detected (collisions, lost tokens, etc)

Devices called LAN analyzers (or LAN protocol analyzers) can be attached to the network
-Selectively record information about packets of interest
-May be set up to filter based on address, protocol, or other fields(s) of interest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network performance management:

A

Concerned with statistical data
-Round trip delays
-Throughput
May require prioritization of certain traffic
-Including other QoS capabilities
Tuning of performance (eliminating bottlenecks)
-Buffer size adjustments
-Setting timer values
Establishing a baseline
-Adequate minimum system performance required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Performance Management cont

A

Performance management is also concerned with finding bottlenecks
-Wide area links between remote switches and routers
-Access to servers resources e.g. disk storage
-Parts of the network that are nearing overload

Many fault-management tools are useful in performance management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Accounting Management

A

Can be the billing for network usage

Accounting parameters normally include the
-Number of connections made
-Duration of each connection
-Number of e-mail messages sent and received
-Number of packets sent and received
-Systems that are accessed across the network
-Internet usage.

17
Q

Accounting Management cont

A

-Accounting management may be broadened to include other network attached resources
-Server usage (connect time and disk storage)
-Traffic that needs access to expensive WAN circuits
-Data storage

-Accounting management may also be used to place limits on the use of network resources

-Disc storage space

18
Q

Security Management includes

A

-Confidentiality
-Integrity
-Authentication
-Access control
-Nonrepudiation

19
Q

Security Management Vulnerabilities

A

-Wiretaps placed on cables
-Outsiders intercepting Remote login attempts from across the network
-Introduction of a virus

20
Q

Security protection mechanisms include

A

-Encryption
-Physical protection
-Access-control lists
-Audit data collection