Free Essay

Network Management System

In:

Submitted By TonySanchez
Words 733
Pages 3
Network management systems are giving IT professional an advantage on their own networks. This is giving them access to software and hardware at a moment’s notice without leaving the comfort of their desk or home. The NMS consists of a set of software and hardware tools that is integrated into the network. This management system is able to identify devices that are on the network. The NMS can also be used to monitor all devices and rate how the device is performing and if it is matching the device expectations. This system can track the performance of the bandwidth, if there was any packet loss, and the performance of all the routers/switches. The network management system will give the IT department notifications if anything seems to be off with the network. This will give the IT personnel time to isolate or fix before the problem effects the network (Hale, 2013). Cisco is a big company that has a very large network. They manage millions of endpoint devices and with a huge network that require a significant amount of monitoring from the IT department. “Cisco Connected Grid Network Management System is a software platform that helps to enable a clear separation between communications network management and utility operational applications. These include Distribution Management System (DMS), Outage Management System (OMS), and Meter Data Management (MDM)” (Cisco Connected Grid Network Management System, 2014). This management system can monitor multiple networks and all of the security applications needed to protect the network. Cisco claims that their network management system is very secure. They have a modular software platform and a pluggable architecture that gives the network connections “to a multivendor ecosystem of legacy and next-generation power grid devices” (Cisco Connected Grid Network Management System, 2014).

Cisco Systems' free Network Magic Essentials, a software collection full of useful tools designed for home network users who don't have IT experience. You'll find a network map for displaying all of the devices on your network, and vital information about each one, including its IP address, hardware configuration, and software configuration. (Gralla, 2011)

Cisco has additional features included in their network management system. They have a Geographic Information System (GIS). This gives them a map in a virtual sense of their network. This feature will give them alarms that will notify them if something is wrong. This system is very useful in the case of a disaster, the process of recovering loss data, and areas effected in the network. Cisco gives hardware specifications; while having the NMS they recommend using Red Hat Enterprise for an OS; and for hardware having 2 CPU with Intel Dual core Xeon x5000 series. This is for managing field-area networks that have five hundred-thousand smart meters. (Cisco Connected Grid Network Management System, 2014) Cisco has RBAC role-based access control. It allows the operators to group the devices, so if they need to make changes, they are able apply changes to the group instead of individual devices. This system is using IPv6 RF mesh endpoints for the configuration.

Network Management Architecture
The architecture of a network management platform is made up of a common set of relationships and structure that exists between managed devices and a management entity. (J., 2014)

NMS seems to be implemented in Cisco in order to managing a large scale network with little IT personnel. NMS is a set of hardware and software for IT personnel to manage and monitor the network. Not only are the IT departments looking for flaws, but also trouble shooting, upgrading, and replacing pieces of the network. This gives you the chance to be ahead of the security, and advancing of the companies network. They will be able to see where the traffic is going and the time of day so they are able to make adjustments so the traffic doesn’t slow the network down.

Works Cited
Cisco Connected Grid Network Management System. (2014, 05 09). Retrieved from Cisco: http://www.cisco.com/c/en/us/products/cloud-systems-management/connected-grid-network-management-system/index.html
Gralla, P. (2011, 12). Retrieved from PC world: http://www.pcworld.com/article/224999/10_must_have_utilities_for_small_networks.html
Hale, B. (2013, 01). Network management system. Retrieved from WhatsIs.com: http://whatis.techtarget.com/definition/network-management-system
J., C. M. (2014, 05 09). Retrieved from Network Management Architecture: http://flylib.com/books/en/2.59.1.162/1/

Similar Documents

Free Essay

Network Management System

...01/22/2014 Network Management System Student: xxxxxxxxxxxxxxx Professor: xxxxxx Course: Network 420 DEVRY UNIVERSITY Brief Introduction Network management systems have to be geared toward the work flow of the organization in which they will be utilized and be careful with remote external attack, as many hackers usually aim there attack at service offered to the public. Which means Network management systems department must provide protection to the business' data, with a smooth operation benefits for employees accessing those data. As we know Network management system is based on Client/Server paradigm normally requires transferring large amount of data between the manager and agents, which will consume large amount of data as bandwidth and cause a processing bottleneck at the manager. It become problem and complicated as the Network grow. According to our textbook, Management interoperability, management function, and management layers capture different technical aspects of network management. However, network management also involves a nontechnical . INTRODUCTION Network management systems have to be geared toward the work flow of the organization in which they will utilized the components of the network such as the ( manager, MIB, RMON and Probe ) to secure their organization data. And not forgetting to be mindful of remote external attack, as many hackers usually aim there attack at service offered to the public. Which means Network management department...

Words: 689 - Pages: 3

Free Essay

Netw420 Cisco Network Management System

...Cisco Network Management System NETW-420 Enterprise Network Mgmt Professor Introduction Cisco uses the International Organization for Standardization network management model which defines five functional areas of Network management. The model consists of Fault Management, Configuration Management, Performance Management, Security Management, and Accounting Management. In this paper we will cover the models five functional areas. Fault Management Fault management detects, logs, notifies users of, and tries to automatically fix network problems to keep the network running effectively. Fault management is perhaps the most widely implemented of the ISO network management elements. The reason is because faults can cause downtime or unacceptable network degradation. Fault Management uses a network management platform deployed in an enterprise infrastructure that consists of multivendor network elements. Network management platforms can be viewed as the main console for network operations in detecting faults in the infrastructure. The platform receives and processes events from network elements in the network. Events from servers and other critical resources can also be forwarded to a management platform. A standard management platform consists of Network discovery, Topology mapping of network elements, Event handler, and Performance data collector and graphed. Configuration Management Configuration management monitors network and system configuration...

Words: 646 - Pages: 3

Premium Essay

Nt1310 Unit 1 Network Security Management System

...• an attempt to access a file or resource is denied due to insufficient privilege. • the permissions of a user or group are changed. • a new processes is created and the system activity related to the process. • a user changes their level of privilege. • when the host-based firewall denies a network connection. • all significant application events. For each audit event logged the system includes sufficient information to investigate the event, including related IP address, timestamp, hostname, username, application name and/or other details as appropriate. System logs are written to a different remote system in such a way that they cannot be altered by any user on the system being logged. Network Security The various departments have both intranets and extranets that are used to share information with...

Words: 913 - Pages: 4

Free Essay

Netw420 Week 1

...08 Fall SOLARWINDS: NETWORK MANAGEMENT SYSTEM VALENTINO ALAN LLEREZA De Vry UNIVERSITY In today’s world, the growth of computer technology has impacted and enhanced the way we communicate with each other and even the way we live. Many companies use this technology to create some type of computer network to be able to get information to and from each other during an ordinary day. As the computer network grows, the requirement for a network administrator increased. The network administrator is tasked with the management and responsibility of keeping the network healthy, at all times. This is accomplished through managing the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance, and provisioning of networked systems(Clemm, 2007). To assist the network administrator, the use of network management system such as the Solarwinds Network Management System helps reduce operational cost while offering a secure and stable network that is crucial to all businesses. It does matter whether you’re a huge corporation or a small business, many computer network issues are unavoidable. The use of Solarwinds Network Management System presents various applications to maintain the simplicity of network management and is the complete package. The management software makes it easy to discover and map network devices, monitor network performance, analyze network traffic, manage and back up network configurations, track IP addresses...

Words: 491 - Pages: 2

Free Essay

Netw420 Week 3 Paper

...the five network management categories that make up the FCAPS. They all have an important role and figure within the network management team, and they all know what to do and what their job description is based on the problem that happens and occurs within the company. FCAPS is a network management framework created by the International Organization for Standardization (ISO). The five network management categories within the FCAPS are: * Fault Management * Configuration Management * Accounting (Administration) * Performance Management * Security Management They all have an important role within the company that they must do, and they all get paid differently based on what they are doing, some of them it can be a job promotion over time, for some of them it can be a demotion. But it all depends on the company. Most companies like to pay all of their workers the same based on their knowledge and skills, and their work performance, or then their job description. At the fault management level, network problems are found and corrected. Potential future problems are identified and steps are taken to prevent them from occurring or recurring. With fault management, the network stays operational, and downtime is minimized. Define thresholds for potential failure conditions. Properly implemented, fault management can keep a network running at an optimum level, provide a measure of fault tolerance and minimize downtime. At the configuration management level, network...

Words: 528 - Pages: 3

Premium Essay

Enter Prise Architecture

...Corporation Ltd. 2.Application Architecture Schematic: Data Management System Data Management System VPN management System VPN management System Accessing data Accessing data Flexilible system Flexilible system Securing data Securing data Providing Secure Network Providing Secure Network Controlling Data flow Controlling Data flow Connecting secured hosts Connecting secured hosts Data entities Data entities Reducing data process and data entry Reducing data process and data entry Centralizing software system Centralizing software system Streamlining Workflows Streamlining Workflows Blocking unauthorized acess Blocking unauthorized acess Supports trust,reliability Supports trust,reliability Access Control system Access Control system Improving business Improving business Increasing Customer Satisfaction Increasing Customer Satisfaction Retaining customers Retaining customers Customer Management System Customer Management System Developing new codes Developing new codes Improving System Performance Improving System Performance Supporting all platforms Supporting all platforms Code Control System Code Control System Employee Employee Manager Manager Project Project Software Planning System Software Planning System Department Task Department Task Organization ...

Words: 252 - Pages: 2

Free Essay

A Fully Functional Network Design for Shelly Fashion

...NETWORKS AND TELECOMMUNICATONS A FULLY FUNCTIONAL NETWORK DESIGN FOR SHELLY FASHION PRESENTED BY: Osazuwa Olufemi George Business requirement Shelly fashion is a clothing boutique that sells clothes to both male and female customers. Their goal is to be the biggest retail clothing store in the country which aims to provide customers from the ages of 5 to 45 years of age a wide variety of quality clothing. The clothing retail store is open six days a week to customers who come in and buy their clothes directly at the store. The transaction is recorded and stored on the store’s computer with a Store Management Software which keeps track of inventory, sales, and computes the profits of the retail store biannually. Shelly fashion is looking to expand its reach using internet technology so it would be able to meet with the growing number of customers and also to connect all its other and future branches together to form a centralized network. With the network the retail store would be able to launch its home delivery option where customers would be able to buy clothes online and have their goods brought to them at their homes without having to be physically present at store. The business owners want to embark on a project to set up a telecommunications network which should be able to reach their business requirements. Shelly fashion’s business requirements for the proposed network are as follows: * Reduce operating cost by cutting cost too make telephone calls...

Words: 2953 - Pages: 12

Free Essay

Fcaps

...dealing with network management systems, reference models are developed to ensure that all aspects of network management have been taken care of during the management process. In other words, the models exist as a conceptual way of looking at, and breaking the network down into smaller, more manageable pieces. One of the most popular, and widely used and accepted network management reference models today is the FCAPS reference model. FCAPS stands Fault management, Configuration management, Accounting management, Performance management, and Security management. This paper will go into some detail to explain these management concepts as they relate to network management. The first management concept in the FCAPS model is fault management. Implementation of fault management ensures that the network continues to operate in the way that it was intended, and that corrective measures react appropriately when it does not. Faults can be described as any event that has a negative effect on or to the network. According to the Network Management Systems web site, “The goal of the fault management is to recognize the fault, isolate the fault, correct the fault and log the faults that occur in the network. Usually when a fault occurs, a network component will send a notification to the network operator so the process can be started to determine what the fault is and what caused it.” (Network Management Systems Nms). The second concept in the FCAPS model is configuration management. Configuration...

Words: 747 - Pages: 3

Premium Essay

Networking

...Department The IT Department is in the third floor of corporate building. From this place the IT department offer supports to the entire corporate building and the rest of the store in U.S. The implementation of news technology indicates the degree of business transformation varies significantly between firms. Improving processes usually involves implementing systems and process management across business function boundaries rather than within functions. IT infrastructure investments can be a constraint where systems are not compatible, or where inconsistent data models have been used in different parts of the business. (Broadbent, M., Weill, P., Clair, Don St, 1999) As companies grow, their IT Infrastructure evolves, requiring additional capacity and process efficiencies. The IT infrastructure required to support a company's operations can quickly exceed available physical space, resources and capabilities provided by the in-house data room or data center. As IT equipment needs increase, companies also must add appropriate staff to monitor and maintain al systems and ensure continues uptime. (Goodwin, Don 2010) The WAN network infrastructure for AAS-Design is composed by five stores, this mean the main office and four...

Words: 4651 - Pages: 19

Free Essay

Netw420

...the five network management categories that make up the FCAPS model. FCAPS is usually a network management tool that is also called the ISO Telecommunications Management Network. FCAPS represents Fault, Configuration, Accounting, Performance and Security which are required to handle a number of groups inside the ISO model's network management tasks. Fault management layer this layer must be configure properly or end users will have many different problems. Fault management can have disruptive application and the system will not work properly. Many problems will happened when IT staffs install devices that needs to reconfigure on the systems. Fault Managing operates by spotting, isolating, fixing and recording faults that might occur from time to time inside a network. This management property utilizes trend analysis to help predict errors and eradicates these risks so the network can function without having faults and lower the risk of faults. Configuration Management has many goals, one of them is to collect information from devices and make it easy for IT managers. In a corporation end users cannot modify their nodes, this has to done by an administrative personal that have right to make changes most application is read only. Database can be queried for information, and as far as the information represents configuration information that is subject to be changed by a manager, the conceptual database can be modified, inserted, and deleted. Configuration management work much...

Words: 504 - Pages: 3

Free Essay

Network Management and Security

...(Name) (Instructors’ name) (Course) (Date) Network Management and Security A telecommunication Management Network, commonly known as TMN, is an infrastructure that provides interfaces for connection between several types of operating systems and telecommunications equipment, so as to manage the telecommunication service and network. This is from Glenn Warnock and Nathoo Amin (215). Also, it enables the functioning of the management information, which is exchanged through these interfaces. On the other hand, 5620 SAM is widely used for developing distributed systems, as it provides the infrastructure for interoperability of several object oriented management applications. With this application, the 5620 enables applications of operating systems to interoperate with the service access manager, allowing it to provide connections, isolate and manage network issues across an Alcatel network (225). With this, users can access management information transparently and independent of the hardware and software platform. This therefore enhances the portability of applications, which are developed across the multiple platforms of management. The principles and concepts of the TMN that can be matched with the features and functions of the 5620 platforms include the specification translation and the interaction translation. Redundancy is also an important feature. It is the automatic transfer of data network to stand by, and protects the network against hardware failure, software failure...

Words: 2230 - Pages: 9

Premium Essay

Business Case

...Business Case THE A-TEAM IIS Network & Communications Infrastructure Plan March 30, 2015 NETW 490 – Senior Project Prof. Nabeel Baig The A-Team Members: Michael Watson Jose Gutierrez Jr. Cory Brown Dean Bennett March 30, 2015 NETW 490 – Senior Project Prof. Nabeel Baig The A-Team Members: Michael Watson Jose Gutierrez Jr. Cory Brown Dean Bennett | Table of Contents | | | Executive Summary 2 Project Overview 3 1.1 Project Overview 3 1.2 Project Description 3 1.3 Alternatives Considered 3 1.4 Recommended Solution 3 1.5 Risks 3 Project Description 4 2.1 Project Background and Opportunity 4 2.2 Business Needs 4 2.3 Project Objectives 4 2.4 Organizational Benefits 15 2.5 Project Scope 5 2.6 Out of Scope 5 Alternatives and Cost/Benefit Analysis 6 3.1 [Possible Solution 1] 7 3.2 [Possible Solution 2] 7 3.3 [Possible Solution 3] 7 3.4 Comparison 7 3.5 Recommended Alternative 7 Project Risk Assessment 8 REFERENCES 9 Executive Summary | | IIS Network & Communications Infrastructure Design Plan IIS prides itself as an industry leader with product lines such as the revolutionary “” Thinking Navigator, which is a first of its kind to integrate GIS and real-time satellite imagery data with proprietary software algorithms. IIS is currently comprised of two division; Consumer and Military Defense Divisions with Corporate headquarters in Dallas and branch offices in Fairfax, Shanghai and London. The Military...

Words: 4121 - Pages: 17

Free Essay

Vgvggg

...Leadership * Troubleshooting * Network Administration * Computer Repair & Updating * Account Management * LAN/WAN * Security Systems Management * Servers * Windows * Software Imaging * Architecture / IT Strategy * Project Management * Information Technology * Team Building & Leadership * Troubleshooting * Network Administration * Computer Repair & Updating * Account Management * LAN/WAN * Security Systems Management * Servers * Windows * Software Imaging * Architecture / IT Strategy * Project Management Derrick Lamont Grays Network Administrator & Information Technology Professional 7206 Jamacha Road, San Diego, Ca 92114 Ph: (619) 549-1914 email: dgrays07@gmail.com CORE STRENGTHS & QUALIFICATIONS * 8+ years of extensive IT strategy experience as a Network Administrator with a proven track record of success. * Network administration skills include backup, security management, user account management, e-mail systems including e-mail web server, internet access, printers, office systems and applications support. * Exceptionally advanced computer knowledge with an ability to manage complex disciplines and circumstances; provides competence under pressure in highly complicated situations. * As a Network Administrator for the United States Navy, managed a Network Operations Center and led a team...

Words: 422 - Pages: 2

Free Essay

Ntc/411 Network Management Paper

...Network Management (Your Name) NTC/411 (Current Date) (Instructor’s Name) Network Management Network management is an integral part of any IT system. Managing a network can be a tough task at times and managers have to decide on the best approaches for their network management. In this paper we’ll discuss out-of-band vs. in-band network management. We’ll also provide some examples of some of the protocols that perform in both types of network management and how enterprise systems are affected by the network management techniques along with business intelligence systems. In general, in-band and out-of-band refer to whether the solution or technique sits in the flow of the network traffic or out of the flow. Some IT professionals say that in-band network management provides better security than an out-of-band approach. Before we get into too much detail we need to discuss what an out-of-band and an in-band network management approach are. In-band approaches require devices or hardware to sit in the flow of live network traffic, often where endpoints access the network so that all client traffic has to pass through them. When a network manager decides to deploy an in-band device then they will be able to provide pre-connect and post-connect security. Network adapters are the most common type of in-band remote management hardware devices (Nevis Networks, 2007). In a Windows environment you can use remote access connections to manage servers...

Words: 1099 - Pages: 5

Premium Essay

Gsm Network Coverage Functional

...A Study on GSM Network Coverage Functional Operation & Planning Analysis of Banglalink ETE 498 Internship Report Submitted By Md. Akhter Uz Zaman ID: 1020086045 Supervised by Zasim U Mozumder Senior Lecturer, ECE, NSU Department of Electrical and Computer Engineering North South University Fall 2014 DECLARATION I have done my undergraduate Internship on “A Study on GSM Network Coverage Functional Operation & Planning Analysis of Banglalink” in my ETE 498 course. I believe people will get an overall idea of how this division works. I have covered here the rectification and maintenance of telecom equipments and network management center’s work operations. I learned a lot, experienced new stuffs. I have not submitted the matter embodied in this dissertation for the award of any other degree. None of the element, partly or fully, of this has been submitted elsewhere for the award of any Degree or Diploma. Any material reproduced in this paper has been properly acknowledged. Approval It is certified that Md. Akhter Uz Zaman, a student of Department of Electrical & Computer Engineering, North South University, have submitted the project titled “A Study on GSM Network Coverage Functional Operation & Planning Analysis of Banglalink”. It is a partial step upon his completion of the requirements for the award of the degree of Bachelor of Science Degree in Electronic and Telecommunication Engineering. He has approached a report...

Words: 8200 - Pages: 33