Free Essay

Network Management System

In: Computers and Technology

Submitted By TonySanchez
Words 733
Pages 3
Network management systems are giving IT professional an advantage on their own networks. This is giving them access to software and hardware at a moment’s notice without leaving the comfort of their desk or home. The NMS consists of a set of software and hardware tools that is integrated into the network. This management system is able to identify devices that are on the network. The NMS can also be used to monitor all devices and rate how the device is performing and if it is matching the device expectations. This system can track the performance of the bandwidth, if there was any packet loss, and the performance of all the routers/switches. The network management system will give the IT department notifications if anything seems to be off with the network. This will give the IT personnel time to isolate or fix before the problem effects the network (Hale, 2013). Cisco is a big company that has a very large network. They manage millions of endpoint devices and with a huge network that require a significant amount of monitoring from the IT department. “Cisco Connected Grid Network Management System is a software platform that helps to enable a clear separation between communications network management and utility operational applications. These include Distribution Management System (DMS), Outage Management System (OMS), and Meter Data Management (MDM)” (Cisco Connected Grid Network Management System, 2014). This management system can monitor multiple networks and all of the security applications needed to protect the network. Cisco claims that their network management system is very secure. They have a modular software platform and a pluggable architecture that gives the network connections “to a multivendor ecosystem of legacy and next-generation power grid devices” (Cisco Connected Grid Network Management System, 2014).

Cisco Systems' free Network Magic Essentials, a software collection full of useful tools designed for home network users who don't have IT experience. You'll find a network map for displaying all of the devices on your network, and vital information about each one, including its IP address, hardware configuration, and software configuration. (Gralla, 2011)

Cisco has additional features included in their network management system. They have a Geographic Information System (GIS). This gives them a map in a virtual sense of their network. This feature will give them alarms that will notify them if something is wrong. This system is very useful in the case of a disaster, the process of recovering loss data, and areas effected in the network. Cisco gives hardware specifications; while having the NMS they recommend using Red Hat Enterprise for an OS; and for hardware having 2 CPU with Intel Dual core Xeon x5000 series. This is for managing field-area networks that have five hundred-thousand smart meters. (Cisco Connected Grid Network Management System, 2014) Cisco has RBAC role-based access control. It allows the operators to group the devices, so if they need to make changes, they are able apply changes to the group instead of individual devices. This system is using IPv6 RF mesh endpoints for the configuration.

Network Management Architecture
The architecture of a network management platform is made up of a common set of relationships and structure that exists between managed devices and a management entity. (J., 2014)

NMS seems to be implemented in Cisco in order to managing a large scale network with little IT personnel. NMS is a set of hardware and software for IT personnel to manage and monitor the network. Not only are the IT departments looking for flaws, but also trouble shooting, upgrading, and replacing pieces of the network. This gives you the chance to be ahead of the security, and advancing of the companies network. They will be able to see where the traffic is going and the time of day so they are able to make adjustments so the traffic doesn’t slow the network down.

Works Cited
Cisco Connected Grid Network Management System. (2014, 05 09). Retrieved from Cisco: http://www.cisco.com/c/en/us/products/cloud-systems-management/connected-grid-network-management-system/index.html
Gralla, P. (2011, 12). Retrieved from PC world: http://www.pcworld.com/article/224999/10_must_have_utilities_for_small_networks.html
Hale, B. (2013, 01). Network management system. Retrieved from WhatsIs.com: http://whatis.techtarget.com/definition/network-management-system
J., C. M. (2014, 05 09). Retrieved from Network Management Architecture: http://flylib.com/books/en/2.59.1.162/1/

Similar Documents

Free Essay

Network Management

...Network Management Template Group Project Tech Corp 5/19/2013 * Table of Contents 1. Introduction 2 1.1 Individual Responsibility 2 2. Configuration Management 3 2.1 Inventory Management 3 2.1.1 Management Criteria 3 2.1.2 Design Overview 3 2.1.3 Usage & Rationale behind the Template 4 2.1.4 Value to Management 4 3. Performance Management 5 3.1 Performance Log 5 3.1.1 Management Criteria 5 3.1.2 Design Overview 5 3.1.3 Usage and Rationale Behind the Template 6 4. Fault Management 7 4.1 Device Fault log 7 4.1.1 Management Criteria 7 4.1.2 Design Overview 7 4.1.3 Usage & Rationale behind the Template 8 4.1.4 Value to Management 8 5. Security Management 9 5.1 Software Security 9 5.1.1 Management Criteria 9 5.1.2 Design Overview 9 5.1.3 Usage and Rationale Behind the Template 10 6. Conclusion 11 7. References 12 Introduction N etwork management is a broader subject of managing the whole network consistently. There are some supportive products like software and hardware to enable the users of network to manage the network properly. It covers a wide area of management such as fault, security, performance, configuration and more. These all aspect of network management has to be accomplished successfully to gain the obvious management of network. To gain these management aspects templates need to be take control as a management tool of network. Each criteria of network has to......

Words: 3847 - Pages: 16

Premium Essay

Multi Network Recharge System

...this as a problem and as a solution we are suggesting a way to recharge all the networks from one card. This will reduce the distribution cost of those companies as well as customers also get benefit from it. Anyone can buy these cards from the various price ranges similarly to normal recharge cards and they can recharge their phone without considering their network. Some shops sell only selected types of cards from networks. Customers have to find their cards of their network here and there. This new system will provide answers for these problems. Project description • Issue a card with a specific PIN available in various price ranges to the customer. • PIN numbers are issued from the created database. • A dongle is connected to computer and customer sending PIN to given number (dongle SIM number). • SMS is checked. If it is valid, message is analyzed and derive network and amount by the server software automatically. • Required amount is sent via a SMS to the customer’s phone number automatically. Objectives • One recharge card for any mobile network. • Provide facility to customers to recharge a SIM of any network from same card. • Reduce distributor cost of mobile companies. Methodology A mobile reload card designed with unique PIN number for different price ranges such as Rs:50,100,500,1000. These PIN numbers are stored in the database of the system. A Java application is designed to handle all the SMS requests from......

Words: 454 - Pages: 2

Free Essay

Network Management System

...01/22/2014 Network Management System Student: xxxxxxxxxxxxxxx Professor: xxxxxx Course: Network 420 DEVRY UNIVERSITY Brief Introduction Network management systems have to be geared toward the work flow of the organization in which they will be utilized and be careful with remote external attack, as many hackers usually aim there attack at service offered to the public. Which means Network management systems department must provide protection to the business' data, with a smooth operation benefits for employees accessing those data. As we know Network management system is based on Client/Server paradigm normally requires transferring large amount of data between the manager and agents, which will consume large amount of data as bandwidth and cause a processing bottleneck at the manager. It become problem and complicated as the Network grow. According to our textbook, Management interoperability, management function, and management layers capture different technical aspects of network management. However, network management also involves a nontechnical . INTRODUCTION Network management systems have to be geared toward the work flow of the organization in which they will utilized the components of the network such as the ( manager, MIB, RMON and Probe ) to secure their organization data. And not forgetting to be mindful of remote external attack, as many hackers usually aim there attack at service offered to the public. Which means Network management ......

Words: 689 - Pages: 3

Free Essay

Network System Admin

...circuit-switching network is the telephone system, which links together wire segments to create a single unbroken line for each telephone call. Packet switching: Refers to protocols in which messages are divided into packets before they are sent. Each packet is then transmitted individually and can even follow different routes to its destination. Leased line: A permanent telephone connection between two points set up by a telecommunications common carrier. Typically, leased lines are used by businesses to connect geographically distant offices. Time-division multiplexing:  a type of multiplexing that combines data streams by assigning each stream a different time slot in a set. TDM repeatedly transmits a fixed sequence of time slots over a single transmission channel. T-carrier system: the name of the combination of different physical line standards(DSO, DSI, DS3 and others), plus circuits switches that use time division multiplexing (TDM) features, that together allowed the phone company to create digital circuits from end to end and create leased line services for customers. DSO: Digital Signal level 0. One of the physical line standards in the T-carrier system, as originally created by the companies of bell system in the united states. DSO runs at 64 Kbps DS1: same as above DS1 runs runs at 1.544 Mbps, with a 193-bit frame, 24 DSO channels, and an 8-Kbps overhead channel. Frame Relay: A packet-switching protocol for connecting devices on a Wide Area Network (WAN).......

Words: 335 - Pages: 2

Premium Essay

Network Systems Administration

...does risk management directly affect? a. Company investments b. Security policy framework c. Security controls d. Number of employees 31. Which of the following is a cipher that shifts each letter in the English alphabet a fixed number of? Positions, with Z wrapping back to A? a. Transposition b. Vigenere c. Caesar d. Vernam 32. Identify a security objective that adds value to a business. a. Revocation b. Authorization c. Anonymity d. Message authentication 33. Which of the following is an asymmetric encryption algorithm? a. AES b. 3DES c. RSA d. RC4 34. Identify a security principle that can be satisfied with an asymmetric digital signature and not by a symmetric signature. a. Nonrepudiation b. Integrity c. Authorization d. Access control 35. Which of the following is a mechanism for accomplishing confidentiality, integrity, authentication, and Nonrepudiation a. Cipher text b. Cryptography c. Access control d. Hashing 36. In which OSI layer do you find FTP, HTTP, and other programs that end users interact with? a. Application b. Network c. Physical d. Data Link 37. Identify the configuration that is best for networks with varying security levels, such general users, a group of users working on a secret research project, and a group of executives. a. Multilayered firewall b. Screened subnet firewall c. Border firewall d. Ordinary firewall 38. Which of the following would you not expect to find on a large network? a.......

Words: 606 - Pages: 3

Free Essay

Principles of Network and System Administration

...Chapter (Self-test Objective) Question # 1: What kinds of issues does system administration cover? Answer: As we discussed in class, a Network System Administrator has to be knowledgeable, has to have customer service skills to be stay calm & collected when a complaint occurs, and must be able to rectify the problem. As the course text book “Principles of Network and System Administration”, by author Mark Burgess mentions in chapter #1 section 1.6 The challenges of system administration : “System administration is not just about installing operating systems. It is about planning and designing an efficient community of computers so that real users will be able to get their jobs done. That means: • Designing a network which is logical and efficient. • Deploying large numbers of machines which can be easily upgraded later. • Deciding what services are needed. • Planning and implementing adequate security. • Providing a comfortable environment for users. • Developing ways of fixing errors and problems which occur. • Keeping track of and understanding how to use the enormous amount of knowledge which increases every year.” The author also mentions that some of the Network System Administrators are responsible for both the hardware of the network and the computers which it connects, i.e. the cables as well as the computers and some are only responsible for the computers. Most importantly a System Administrator must have an understanding of how data flows from......

Words: 337 - Pages: 2

Premium Essay

Network Systems Administrator Tools

...SCIENCE BUSINESS, MANAGEMENT AND TECHNOLOGY DEPARTMENT ITSA 255 – Information Systems Security Assignment 4 – Network System Administrator Tools/Utilities Students are to perform independent Internet research and write a short paragraph describing the functionality and utilization for each of the following Network System Administrator Tools/Utilities: * FileZilla FileZilla is a cross platform File Transfer Protocol (FTP) application software that allows the ability to transfer multiple files over the internet. It is made up of a FileZilla client and a FileZilla server. It is available for use with Windows, Linux and MAC OSX. It supports FTP, SFTP (SSH File Transfer protocol), FTPS (FTP secure). Some of the features include support in IPv6, Drag and Drop, Filename feature, Remote file editing, FTP proxy support and much more. It includes two methods to invoke security which is the explicit method and implicit method. Many bug fixes and vulnerability patches were made over the initial release of June 22, 2001. * Nessus Nessus is a open source cross-platform network vulnerability scanner software developed by Tenable Network Security. First introduced during 1998; it was created to be used as a free remote security scanner to the internet community. It allows for various scanning which scans a computer and raises an alert if it discovers any vulnerability that hackers could use to gain access to a computer that is connected to a network. Nessus scans for a...

Words: 856 - Pages: 4

Free Essay

Netw420 Cisco Network Management System

...Cisco Network Management System NETW-420 Enterprise Network Mgmt Professor Introduction Cisco uses the International Organization for Standardization network management model which defines five functional areas of Network management. The model consists of Fault Management, Configuration Management, Performance Management, Security Management, and Accounting Management. In this paper we will cover the models five functional areas. Fault Management Fault management detects, logs, notifies users of, and tries to automatically fix network problems to keep the network running effectively. Fault management is perhaps the most widely implemented of the ISO network management elements. The reason is because faults can cause downtime or unacceptable network degradation. Fault Management uses a network management platform deployed in an enterprise infrastructure that consists of multivendor network elements. Network management platforms can be viewed as the main console for network operations in detecting faults in the infrastructure. The platform receives and processes events from network elements in the network. Events from servers and other critical resources can also be forwarded to a management platform. A standard management platform consists of Network discovery, Topology mapping of network elements, Event handler, and Performance data collector and graphed. Configuration Management Configuration management monitors network and system configuration...

Words: 646 - Pages: 3

Premium Essay

Network Systems

...Network Attached Storage Network Attached Storage (NAS) is a dedicated hard drive which is set up with its own network address and provides file-level data storage services to other devices on the network. It allows both programming and files to be served faster because they are not competing for processor resources. NAS usually configured with a web browser and do not require a keyboard, mouse or monitor. Unlike other external hard drives, NAS has a processor. Some NAS devices will run using standard operating system like MS Windows, many other NAS devices use their own proprietary operating system. A NAS can store any data that appears in form of files, including email boxes, Web content, remote system backups, etc… Overall the use of a NAS parallels those traditional file servers. NAS devices come in many varieties depending on you build it or purchase it from a vendor. The speed is usually 1GB Ethernet connection but it can be changed to multiple GB to 10GB, fiber optic by adding PCI-e network cards. The capacity range also can be varied. If you have a port replication and add-on hardware drive controller cards, there really isn’t a limit on size. For example: if you have a board with 6 SATA ports which can be replicated (1 to 5 port) allowing 30 drives to be attached. Then if 3TB drives were used in RAID 50 that would be 72TB of storage capacity. As far as fault tolerance, RAID 50 can be quite stable if it’s set-up correctly. While RAID 10 is one of the best set-ups...

Words: 497 - Pages: 2

Free Essay

Network Management

...flow of network traffic or out of the flow. The differences between these two can be explained by their impact on performance, security, and manageability on a network. An in-band network management has to do with managing devices through common protocols. For example, telnet or SSH and the using of the network itself as a media. This is a way to provide identity based access controls, which will provide a better security. The segregation of management traffic is also a good practice, from production customer traffic. This helps in case your network is congested due to real user traffic. It offers you the ability to login into your devices to address the issue. The con here with in-band management is when your network is down or badly degraded, it will be little help. An out-of-band network management is an alternative means to accessing remote devices. An example in which this is handy to have both networks, would be in the case that the in-band network is down or terribly congested. The out-of-band network management can communicate with devices right through its console, without having the administrator having to go to the data center to correct the in-band network management situation. Each of these, out-of-band and in-band network management, have pros and drawbacks. The in-band management is often referred to as a fitting and a cheap way to obtain your system. The out-of-band management is often thought of as the more expensive way to access your network. But......

Words: 764 - Pages: 4

Free Essay

Network Management

...standards used for the various layers in an Ethernet-based network that is managed by the Internet management protocol? Assume that the Ethernet runs on 10 Mbps on an unshielded twisted-pair cable? A) The standards used for the various layers in an Ethernet-based network that is managed by the Internet management protocol are : a. Organizational Model b. Information Model c. Communication Model d. Functional Model The organizational model describes the components of network management and their relationships. The information model is concerned with the structure of information. The communication model describes on how the information is exchanged between systems. The functional model addresses user-oriented applications. 3) 6) Communication between two ATM switches is broken in a private ATM network. You are troubleshooting the problem from a network management station. What M interfaces would you use? A) The M2 interface is used to manage the private ATM network. The management information on ATM links between devices is gathered from ILMI MIB. The ILMI specifications define the administrative and UNI groups of the ATM forum MIB. The administrative group defines a general-purpose registry for locating ATM network services such as the ATM name answer server (ANS). Other subgroups under the administrative group have been deprecated and handled by IEFT specifications. Section – II 1) The basic network monitoring tools that will be used are......

Words: 923 - Pages: 4

Free Essay

Huffman Trucking Network Systems

...Telephone and Data Networks The corporate main office is in Ohio. The office at this location uses Avaya Digital Phone System and is connected to a Cisco 10 MB Hub. All equipments in this location get access to the Avaya Digital Phone System through the 10 MB Hub. The plant at the Ohio location has set up different workstations; each workstation has a wireless bar code, scanner, shipper, and telephone. The office in California is currently using Private Branch eXchange System PBX system as communication system, routing incoming calls to the appropriate extension in the office. The California office uses The Plain Old Telephone Service POTS, with and intercom. The current POTS does not have caller ID nor does Voice Mail. All the connection phones in California’s office are connected to the PBX. The plant in California uses a different phone system than the California office. The California Plant uses the Nortel Digital Phone System. The phone system is Voice-over-IP, which is VOIP; basically this phone system is connected to an Ethernet connection. The office in Missouri is currently using Avaya Digital Phone System; this system is connected to a Cisco 10MB Hub. The Avaya Digital Phone System connects all the phones and faxes in the location. The plant at the Missouri location has set up different workstations. Each workstation has a wireless bar code scanner, printer, shipper, and a telephone. All the workstations are connected to the Cisco 10 MB Hub. The office......

Words: 744 - Pages: 3

Free Essay

Network Attached Storage System

...35%-50%/year decreases in the cost per byte. In recent years, the amount of storage sold almost doubled each year and is expected to sustain annual growth of at least 60%. Secondary storage has a healthy place in future computer systems. While many storage products are directly attached to personal computers, most disk array products (65% and rising) are deployed in local area network file servers. This centralization of storage resources enables effective sharing, better administrative control and less redundancy. However, it also increases dependence on network and file server performance. With the emergence of high-performance cluster systems based on commodity personal computers and scalable network switching, rapidly increasing demands on storage performance are anticipated. Specifically, storage performance must cost-effectively scale with customer investments in client processors, network links and storage capacity. Unfortunately, current distributed file system architectures severely limit scalable storage. In current distributed file systems, all storage bytes are copied through file server machines between peripheral buses (typically SCSI) and client LANs. In essence, these file server machines act as application-level inter-network routers, converting namespaces (disk block versus file range) and protocol layers (SCSI versus RPC/UDP/IP). This is a critical limitation for cost-effective scalable storage. Specifically, the......

Words: 1229 - Pages: 5

Premium Essay

Microsoft Network Operating System

...based on the demand of the company. It comes in different varieties to accommodate what the user needs for the business they are running. Big companies will go and pay the extra money for an operating system that will support many processors and hundreds or thousands of users. But for the small companies that does not have that extra money or do not need the extra feature for such small volumes they made a version just for them as well. By making different sets or versions they gain profits by both parties for what they need and do not need. The significance of each version has its features. For example Windows 2008 datacenter edition has a maximum number of cpu’s at 64 while version Windows 2008 enterprise edition has a maximum number of cpu’s it can handle. There is more info at the end of the paper for more details on them. There are many new features to Windows server 2008 and many things that Windows server 2003 does not have. Some of its new adds on has improved image based installation, deployment and recovery which is always important, improved diagnostics, monitoring, event logging and reporting tools. As for security features it has bitlocker and ASLR, an improved firewall with a secure default configuration, with other features as the core kernel, memory and file system improvements. The reason behind all these new features is because 2008 is built on the same code as Vista so it shares a lot from Vista. A 64-bit is more advantage because it can calculate......

Words: 1031 - Pages: 5

Premium Essay

Network Systems

...Networking operating system It is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions.[2] The network operating system is designed to allow shared file and printer access among multiple computers in a network, typically a local area network (LAN), a private network or to other networks. The most popular network operating systems are Microsoft Windows Server 2003, Microsoft Windows Server 2008, UNIX, Linux, Mac OS X, and Novell NetWare. Multiuser File Sharing A network operating system manages concurrent requests from clients and provides the security necessary in a multiuser environment. A file sharing component is installed in each client machine that interacts with the server to share files and applications as well as devices on the network such as printers, faxes and modems. Peer-to-Peer In a Peer-to-peer network operating system users are allowed to share resources and files located on their computers and access shared resources from others. A peer-to-peer network sets all connected computers equal; they all share the same abilities to utilize resources available on the network. Client/Server Client/server network operating systems allow the network to centralize functions and applications in one or more dedicated file servers. The server is the center of the system, allowing access to resources and instituting security. The network operating system provides the......

Words: 1924 - Pages: 8