Pertemuan 1 - Network Management Basic
Pertemuan 1 - Network Management Basic
Telecommunication Business
Outline
Goal & summary
Key Resources
Resource Management
Network Management
NM Concept
NM Architectures
NM Model
Basic
function
Network
Management
Basics
Network
management
system
Functions of network-mgt
architectures & protocols
Network
Mgt
Basics
5 areas of management
based on ISO definition
Network
Human Capital
/ Knowledge
Key
Resources
Frequency*) Money
Customer
Database
Loss
Time
Important
Value
Concept
Different things for
General Concept
different people Some cases
A service that
employs a variety of Other cases
tools, applications, Involves a solitary
and devices to assist network consultant
human network monitoring network involves a distributed
managers in activity with an database, autopolling
monitoring and outdated protocol of network devices,
maintaining networks analyzer. and high-end
workstations
generating real-time
graphical views of
network topology
changes and traffic
Configuration
Fault Accounting
Security Performance
Goal
• to monitor network and system configuration information so that the
effects on network operation of various versions of hardware and
software elements can be tracked and managed.
Goal
• to measure network utilization parameters so
that individual or group uses on the network can
be regulated appropriately.
Step
• Measure utilization of all important network
resources
• Analyze usage patterns & usage quota
• On going measurement of resource
Goal
• to detect, log, notify users of, and (to the extent
possible) automatically fix network problems to
keep the network running effectively.
Step
• Determining symptoms & isolating the problem
• Fixed & tested
• Recorded
1/21/2015 Telecommunication Business 16
Security Management
Goals
• to control access to network resources according to local guidelines so that
the network cannot be sabotaged (intentionally or unintentionally) and
sensitive information cannot be accessed by those without appropriate
authorization
Work by
• partitioning network resources into authorized and unauthorized areas.
Function
• Identify sensitive network resources
• Determine mappings between sensitive networks resources & user sets
• Monitor access points to sensitive network resources
• Log in appropriate access to sensitive network resources