Vous êtes sur la page 1sur 9

M.C.A.

DEGREE EXAMINATION, 2008


( FOURTH SEMESTER ) ( PAPER - XXIV )
431. NETWORK MANAGEMENT AND ADMINISTRATION
( New Regulations ) ( Including Lateral Entry )

December ] [ Time : 3 Hours

Maximum : 100 Marks


SECTION - A (8 × 5 = 40)
Answer any EIGHT questions.
All questions carry equal marks.
1. Discuss briefly about the need for network management.
2. Explain coexistence in detail.
3. What are Procedures ? - Explain.
4. Explain network management RFCs in detail.
5. Explain about Performance Monitoring.
6. What are configuration control standards ? - Explain.
7. Write short notes on MIPs.
8. Explain conformance in detail.
9. Explain Remote Network Monitoring ?
10. Write short notes on RMON 1 standards.
SECTION - B (3 × 20 = 60)
Answer any THREE questions.
All questions carry equal marks.
11. Discuss in detail about the Data Representation in network
Management Model. (20)
12. Explain the Administrative and Operational Models in detail. (20)
13. Write short notes on : (2 × 10 = 20)
(a) Security Control.
(b) Fault Monitoring.
14. Compare SNMP with SNMPV 2 (20)
15. Write short notes on : (2 × 10 = 20)
(a) NNM.
(b) RMON 2 Devices.
Network Management

Network management is the top-level administration and maintenance of large


networks, often in areas such as computers or telecommunications, but not
including user terminal equipment. In network management, functions such as
security, monitoring, control, allocation, deployment, coordination and planning
are executed. Network management is governed by a large number of protocols
that exist for its support, including SNMP, CMIP, WBEM, Common Information
Model, Java Management Extensions, Transaction Language 1, and Netconf.

Routing, which refers to the process of selecting the paths in a computer network
on which to send data, is an important area of network management. In this area
of network management, logically addressed packets are passed from their
source to their destination through nodes, which are called routers, in a process
called forwarding. This is usually based on routing tables that maintain a record
of the most efficient routes.

Security management is also a key component of network management. Security


management protects a network from unauthorized access and includes many
sub-functions, such as the authorization of subscriber access, control of the
distribution of cryptographic keying material, and the distribution and reporting of
security related events.

Configuration management relates to both the security and quality areas of


network management. It refers to the management of security features in a
network by controlling changes made to the software, hardware, firmware,
documentation, and test features in a system. This area of network management
keeps the system under control as it evolves and grows, maintaining quality and
security.

Software configuration management can be divided into two main areas. The first
is concerned with storage of entities from a software development project and is
sometimes called component repository management. The second area involves
production and change to these entities and is often referred to as engineering
support.

Successful network management also uses accounting management. Accounting


management controls and reports on the financial status of the network. This is
done though analysis, planning, control of financial data reporting programs, and
reporting for managerial decisions. This area of network management involves
bank account maintenance, financial statement development, and analysis of
cash flow and financial health.
What is a Network?

A network consists of two or more computers that are linked in order to share resources
(such as printers and CDs), exchange files, or allow electronic communications. The
computers on a network may be linked through cables, telephone lines, radio waves,
satellites, or infrared light beams.

The two basic types of networks include:

• Local Area Network (LAN)


• Wide Area Network (WAN)

You may also see references to a Metropolitan Area Networks (MAN), a Wireless LAN
(WLAN), or a Wireless WAN (WWAN).

Local Area Network

A Local Area Network (LAN) is a network that is confined to a relatively small area. It is
generally limited to a geographic area such as a writing lab, school, or building. Rarely
are LAN computers more than a mile apart.

In a typical LAN configuration, one computer is designated as the file server. It stores all
of the software that controls the network, as well as the software that can be shared by the
computers attached to the network. Computers connected to the file server are called
workstations. The workstations can be less powerful than the file server, and they may
have additional software on their hard drives. On many LANs, cables are used to connect
the network interface cards in each computer; other LANs may be wireless. See the
Topology, Cabling, and Hardware sections of this tutorial for more information on the
configuration of a LAN.

Wide Area Network

Wide Area Networks (WANs) connect larger geographic areas, such as Florida, the
United States, or the world. Dedicated transoceanic cabling or satellite uplinks may be
used to connect this type of network.

Using a WAN, schools in Florida can communicate with places like Tokyo in a matter of
minutes, without paying enormous phone bills. A WAN is complicated. It uses
multiplexers to connect local and metropolitan networks to global communications
networks like the Internet. To users, however, a WAN will not appear to be much
different than a LAN.
Advantages of Installing a School Network

• Speed. Networks provide a very rapid method for sharing and transferring files.
Without a network, files are shared by copying them to memory cards or discs,
then carrying or sending the discs from one computer to another. This method of
transferring files (referred to as sneaker-net) can be very time-consuming.
• Cost. Networkable versions of many popular software programs are available at
considerable savings when compared to buying individually licensed copies.
• Security. Files and programs on a network can be designated as "copy inhibit," so
that you do not have to worry about illegal copying of programs. Also, passwords
can be established for specific directories to restrict access to authorized users.
• Centralized Software Management. One of the greatest benefits of installing a
network at a school is the fact that all of the software can be loaded on one
computer (the file server). This eliminates that need to spend time and energy
installing updates and tracking files on independent computers throughout the
building.
• Resource Sharing. Sharing resources is another advantage of school networks.
Most schools cannot afford enough laser printers, fax machines, modems,
scanners, and CD players for each computer. However, if these or similar
peripherals are added to a network, they can be shared by many users.
• Electronic Mail. The presence of a network provides the hardware necessary to
install an e-mail system. E-mail aids in personal and professional communication
for all school personnel, and it facilitates the dissemination of general information
to the entire school staff. Electronic mail on a LAN can enable students to
communicate with teachers and peers at their own school. If the LAN is
connected to the Internet, students can communicate with others throughout the
world.
• Flexible Access. School networks allow students to access their files from
computers throughout the school. Students can begin an assignment in their
classroom, save part of it on a public access area of the network, then go to the
media center after school to finish their work. Students can also work
cooperatively through the network.
• Workgroup Computing. Collaborative software allows many users to work on a
document or project concurrently. For example, educators located at various
schools within a county could simultaneously contribute their ideas about new
curriculum standards to the same document, spreadsheets, or website.

Disadvantages of Installing a School Network

• Expensive to Install. Although a network will generally save money over time,
the initial costs of installation can be prohibitive. Cables, network cards, routers,
and software are expensive, and the installation may require the services of a
technician.
• Requires Administrative Time. Proper maintenance of a network requires
considerable time and expertise. Many schools have installed a network, only to
find that they did not budget for the necessary administrative support.
• File Server May Fail. Although a file server is no more susceptible to failure
than any other computer, when the files server "goes down," the entire network
may come to a halt. When this happens, the entire school may lose access to
necessary programs and files.
• Cables May Break. The Topology chapter presents information about the various
configurations of cables. Some of the configurations are designed to minimize the
inconvenience of a broken cable; with other configurations, one broken cable can
stop the entire network.
• Must Monitor Security Issues. Wireless networks are becoming increasingly
common; however, security can be an issue with wireless networks.

What is a Protocol?

A protocol is a set of rules that governs the communications between computers on a


network. In order for two computers to talk to each other, they must be speaking the same
language. Many different types of network protocols and standards are required to ensure
that your computer (no matter which operating system, network card, or application you
are using) can communicate with another computer located on the next desk or half-way
around the world. The OSI (Open Systems Interconnection) Reference Model defines
seven layers of networking protocols. The complexity of these layers is beyond the scope
of this tutorial; however, they can be simplified into four layers to help identify some of
the protocols with which you should be familiar (see fig 1).

OSI Layer Name Common Protocols


7 Application
6 Presentation HTTP | FTP | SMTP | DNS
5 Session
4 Transport TCP SPX
3 Network IP IPX
2 Data Link
Ethernet
1 Physical

Fig 1. OSI model related to common network protocols

Advantages of wireless networks:

• Mobility - With a laptop computer or mobile device, access can be available


throughout a school, at the mall, on an airplane, etc. More an more businesses are
also offering free WiFi access.
• Fast setup - If your computer has a wireless adapter, locating a wireless network
can be as simple as clicking "Connect to a Network" -- in some cases, you will
connect automatically to networks within range.
• Cost - Setting up a wireless network can be much more cost effective than buying
and installing cables.
• Expandability - Adding new computers to a wireless network is as easy as turning
the computer on (as long as you do not exceed the maximum number of devices).

Disadvantages of wireless networks:

• Security - Wireless networks are much more susceptible to unauthorized use. If


you set up a wireless network, be sure to include maximum security. You should
always enable WEP (Wired Equivalent Privacy) or WPA (Wi-Fi Protected
Access), which will improve security and help to prevent virtual intruders and
freeloaders.
• Interference - Because wireless networks use radio signals and similar techniques
for transmission, they are susceptible to interference from lights and electronic
devices.
• Inconsistent connections - How many times have you hears "Wait a minute, I just
lost my connection?" Because of the interference caused by electrical devices
and/or items blocking the path of transmission, wireless connections are not
nearly as stable as those through a dedicated cable.
• Power consumption - The wireless transmitter in a laptop requires a significant
amount of power; therefore, the battery life of laptops can be adversely impacted.
If you are planning a laptop project in your classroom, be sure to have power
plugs and/or additional batteries available.
• Speed - The transmission speed of wireless networks is improving; however,
faster options (such as gigabit Ethernet) are available via cables. In addition, if set
up a wireless network at home, and you are connecting to the Internet via a DSL
modem (at perhaps 3 Mbps), your wireless access to the Internet will have a
maximum of 3 Mbps connection speed.

What is a Network Operating System?

Unlike operating systems, such as Windows, that are designed for single users to control
one computer, network operating systems (NOS) coordinate the activities of multiple
computers across a network. The network operating system acts as a director to keep the
network running smoothly.

The two major types of network operating systems are:

• Peer-to-Peer
• Client/Server

Peer-to-peer network operating systems allow users to share resources and files located
on their computers and to access shared resources found on other computers. However,
they do not have a file server or a centralized management source
Advantages of a peer-to-peer
network:

• Less initial expense - No need for a dedicated server.


• Setup - An operating system (such as Windows XP) already in place may only
need to be reconfigured for peer-to-peer operations.

Disadvantages of a peer-to-peer network:

• Decentralized - No central repository for files and applications.


• Security - Does not provide the security available on a client/server network.

In the PRESENT ERA MANAGEMENT of network is very difficult job to do. because
in this management you should deliver and ensure a secure communication ,very simple
in use steps, high network availability and many different technologies which are used for
management of network. Network management model & architecture are designed by
keeping support and convenience of users in mind. Different types of models of network
management have been developed by the scientists who provide a good networking to
clients.

Network management model:

A special type of model which is used to design the different


structures that can support or help in arranging the network is called as network
management models. The basic function of network management models are to provide
such great networking in the filed of computer networking, telecommunication, business
management and are also used for monitoring purposes. There are different models which
supports the network management models and architectures are F CAPS, TMN, and
OAM &P etc. But the major model of network management model and architecture
which is the base of such networks is FCAPS. It stands for Fault, Configuration,
Accounting, Performance and Security. Area function of this model is as follows

Fault: A type of network management model which is used for detecting many kinds
fault present in the network is referred as fault management. To remove such faults a
special type of fault management technique is used which is based on SNMP or you can
contact apopropriate persons for the fixing of such problem.

Configuration:
Type of management which is used for check the system configuration is
called as configuration management. This area of function of network management
model plays an important in configuring the hardware or software of system.
Accounting:
It is a type of management which is used for managing, recording and clearing
all the expenses and revenues of a specific firm is called as accounting management.
Performance:
Performance management is the type of area of model o network
management which is used to collect the information from the network and enhance the
networking system.
Security:
Security management is used in these areas to prevent some kind of problems
related to networking technology. It resolve the problem by three methods i.e.
authentication, association and data encryption.
A network administrator is a person responsible for the maintenance of computer
hardware and software that comprises a computer network. This normally includes
deploying, configuring, maintaining and monitoring active network equipment. A related
role is that of the network specialist, or network analyst, who concentrates on
networkdesign and security.

The network administrator (or "network admin") is usually the level of technical/network
staff in an organization and will rarely be involved with direct user support.[citation needed] The
network administrator will concentrate on the overall integrity of the network, server
deployment, security, and ensuring that the network connectivity throughout a company's
LAN/WAN infrastructure is on par with technical considerations at the network level of
an organization's hierarchy. Network administrators are considered tier 3 support
personnel that only work on break/fix issues that could not be resolved at the tier 1
(helpdesk) or tier 2 (desktop/network technician) levels. Depending on the company, the
Network Administrator may also design and deploy networks.

Network management refers to the activities, methods, procedures, and tools that
pertain to the operation, administration, maintenance, and provisioning of networked
systems.[1]

• Operation deals with keeping the network (and the services that the network
provides) up and running smoothly. It includes monitoring the network to spot
problems as soon as possible, ideally before users are affected.
• Administration deals with keeping track of resources in the network and how they
are assigned. It includes all the "housekeeping" that is necessary to keep the
network under control.
• Maintenance is concerned with performing repairs and upgrades—for example,
when equipment must be replaced, when a router needs a patch for an operating
system image, when a new switch is added to a network. Maintenance also
involves corrective and preventive measures to make the managed network run
"better", such as adjusting device configuration parameters.
• Provisioning is concerned with configuring resources in the network to support a
given service. For example, this might include setting up the network so that a
new customer can receive voice service.

A common way of characterizing network management functions is FCAPS—Fault,


Configuration, Accounting, Performance and Security.

Vous aimerez peut-être aussi