Network Management - You Have Been Assigned the Responsibility of Adding a New Vendor’s Components with Its Own Nms to an Existing Network Managed by a Different Nms

In: Other Topics

Submitted By casestudyhelp365
Words 937
Pages 4
WE PROVIDE CASE STUDY ANSWERS, ASSIGNMENT SOLUTIONS, PROJECT REPORTS AND THESIS aravind.banakar@gmail.com ARAVIND - 09901366442 – 09902787224

NETWORK MANAGEMENT

The Engineering Department to twelve persons in a small corporation is on a regular 10 Base-T Ethernet Lan hub with 16 ports. The busy group started complaining because of the slow network performance. The network was operating at 50% utilization, whereas 30% utilization is acceptable. If you are the corporation’s Information Technology Engineer and have to resolve the problem technically,

a. Describe four choices for resolving the problem, maintaining the LAN as an Ethernet LAN.

b. State the advantages and disadvantages of each approach.

1. Two virtual LANs, 145.50.50.1 belonging to NM lab, and 145.50.60.1 belonging to Networking lab, each have three workstations. The former has workstations 145.50.50.11-13, and the latter 145.50.60.21.-23. They are connected to a switched hub on ports 2 through 7. the NICs (network interface cards) associated with ports are made by Cabletron and their MAC addresses start with the vendor’s global prefix 00-00-1D (hexadecimal notation) and end with 11,12,13,21,22, and 23 (same as the fourth decimal position of IP addresses). 2.

a. Create a conceptual matrix table, as shown below, that would be generated by the hub that relates the IP address, MAC address, and port number. 3.

|IP Address |MAC Address |Port Number |
| | | |

b. The workstation 23 is moved from networking lab to NM lab. The appropriate parameter changes…...

Similar Documents

Pinciple Components of Telecommunication Networks

...1. What are the principal components of telecommunications networks and key networking technologies? Describe the features of a simple network and the network infrastructure for a large company. A simple network consists of two or more connected computers. Basic network components include computers, network interfaces, a connection medium, network operating system software, and either a hub or a switch. The networking infrastructure for a large company relies on both public and private infrastructures to support the movement of information across diverse technological platforms. It includes the traditional telephone system, mobile cellular communication, wireless local-area networks, videoconferencing systems, a corporate Web site, intranets, extranets, and an array of local and wide-area networks, including the Internet. This collection of networks evolved from two fundamentally different types of networks: telephone networks and computer networks. Name and describe the principal technologies and trends that have shaped contemporary telecommunications systems. Client/Server computing, the use of packet switching, and the development of widely used communications standards such as TCP/IP are the three technologies that have shaped contemporary telecommunications systems. Client/Server computing has extended to networking departments, workgroups, factory floors, and other parts of the business that could not be served by a centralized architecture. The......

Words: 1554 - Pages: 7

Network Management

...Network Management Template Group Project Tech Corp 5/19/2013 * Table of Contents 1. Introduction 2 1.1 Individual Responsibility 2 2. Configuration Management 3 2.1 Inventory Management 3 2.1.1 Management Criteria 3 2.1.2 Design Overview 3 2.1.3 Usage & Rationale behind the Template 4 2.1.4 Value to Management 4 3. Performance Management 5 3.1 Performance Log 5 3.1.1 Management Criteria 5 3.1.2 Design Overview 5 3.1.3 Usage and Rationale Behind the Template 6 4. Fault Management 7 4.1 Device Fault log 7 4.1.1 Management Criteria 7 4.1.2 Design Overview 7 4.1.3 Usage & Rationale behind the Template 8 4.1.4 Value to Management 8 5. Security Management 9 5.1 Software Security 9 5.1.1 Management Criteria 9 5.1.2 Design Overview 9 5.1.3 Usage and Rationale Behind the Template 10 6. Conclusion 11 7. References 12 Introduction N etwork management is a broader subject of managing the whole network consistently. There are some supportive products like software and hardware to enable the users of network to manage the network properly. It covers a wide area of management such as fault, security, performance, configuration and more. These all aspect of network management has to be accomplished successfully to gain the obvious management of network. To gain these management aspects templates need to be take control as a management tool of network. Each criteria of network has to......

Words: 3847 - Pages: 16

Network Endpoints and Network Devices Have Different Security Considerations and Implications

...NT2580: Week 2 Explore the Importance of Security Policies Analysis 2.1 Testing and Monitoring Security Controls Network endpoints and network devices have different security considerations and implications. A user workstation implies certain security issues that remain in the user domain while network implications remain part of the LAN or LAN-to-WAN domain. However, during the course of investigating an intrusion, you may have to source data from logs kept in routing devices and end-user systems. Suppose an attacker intrudes upon one of your servers. How do you reconstruct the events of a crime? Log files are the first place to check for administrative issues and security activity. Log files help you put together a timeline of events surrounding everything from a performance problem to a security incident. You can also identify bad system or network activities by observing anomalies from baseline behavior or identifying certain suspicious actions. Testing ensures that your control and monitoring facilities work as intended and maintain proper operation. Monitoring ensures that you capture evidence when your testing procedures fail to examine all possibilities or legitimate behavior permits unauthorized activity. Always consider that even legitimate traffic can be used in illegitimate ways, and sometimes, legitimate traffic can appear illegitimate. Protected services can be attacked from the inside or accessed externally through loopholes in firewall rules.......

Words: 497 - Pages: 2

Network Management System

...Network management systems are giving IT professional an advantage on their own networks. This is giving them access to software and hardware at a moment’s notice without leaving the comfort of their desk or home. The NMS consists of a set of software and hardware tools that is integrated into the network. This management system is able to identify devices that are on the network. The NMS can also be used to monitor all devices and rate how the device is performing and if it is matching the device expectations. This system can track the performance of the bandwidth, if there was any packet loss, and the performance of all the routers/switches. The network management system will give the IT department notifications if anything seems to be off with the network. This will give the IT personnel time to isolate or fix before the problem effects the network (Hale, 2013). Cisco is a big company that has a very large network. They manage millions of endpoint devices and with a huge network that require a significant amount of monitoring from the IT department. “Cisco Connected Grid Network Management System is a software platform that helps to enable a clear separation between communications network management and utility operational applications. These include Distribution Management System (DMS), Outage Management System (OMS), and Meter Data Management (MDM)” (Cisco Connected Grid Network Management System, 2014). This management system can monitor multiple networks and all......

Words: 733 - Pages: 3

It245 Intro to Network Management

...IT245 IP5 Introduction to Network Management Individual Project Carol McClellan February 10, 2014 Contents Identifying the Network 4 The Company Considered 4 The Networks Considered 4 Servers Applied 4 Roles of Network managers 4 Diagramming the Network 5 Legend for the Diagram 5 Diagram 6 Network Models 7 The Seven Layers of the OSI Model 7 Physical Layer 7 Data Link Layer 7 Network Layer 7 Transport Layer 7 Session Layer 8 Presentation Layer 8 Application Layer 8 FCAPS 9 Fault Management 9 Configuration Management 9 Accounting 10 Performance 10 Security 10 Protocols and Agents 12 Transport Layer 12 Application Layer 12 Presentation Layer 13 Session Layer 13 Network Layer 13 Data Link Layer 14 Physical Layer 14 Network Security 15 Network Management2 16 FOOTNOTES 18 Identifying the Network The Company Considered I have decided to use Walmart for my individual project. It is an international company with 11,137 retail units in twenty-seven countries on five continents. It employs over two million people around the world. The Networks Considered There are numerous networks that would be needed for an international company such as this. In addition to the ones used nationally, there would be others in relation to language and monetary differences and shipping differences. There would also be a more extensive requirement as far as tariffs and taxes. Some of the national ones would be......

Words: 5551 - Pages: 23

Voice, Video, Network

... VOICE, VIDEO, AND DATA NETWORK CONVERGENCE VOICE, VIDEO, AND DATA NETWORK CONVERGENCE ARCHITECTURE AND DESIGN, FROM VOIP TO WIRELESS JUANITA ELLIS CHARLES PURSELL JOY RAHMAN Amsterdam Boston London New York Oxford San Francisco Singapore Sydney Tokyo Paris San Diego This book is printed on acid-free paper. Copyright 2003, Elsevier Science (USA). All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333, e-mail: permissions@elsevier.com.uk. You may also complete your request on-line via the Elsevier Science homepage (http://elsevier.com), by selecting “Customer Support” and then “Obtaining Permissions.” Explicit permission from Academic Press is not required to reproduce a maximum of two figures or tables from an Academic Press chapter in another scientific or research publication provided that the material has not been credited to another source and that full credit to the Academic Press chapter is given. Academic Press An imprint of Elsevier Science 525 B Street, Suite 1900, San Diego, California 92101-4495, USA http://www.academicpress.com Academic Press 84 Theobald’s Road, London WC1X......

Words: 125371 - Pages: 502

Gsm Network Coverage Functional

...A Study on GSM Network Coverage Functional Operation & Planning Analysis of Banglalink ETE 498 Internship Report Submitted By Md. Akhter Uz Zaman ID: 1020086045 Supervised by Zasim U Mozumder Senior Lecturer, ECE, NSU Department of Electrical and Computer Engineering North South University Fall 2014 DECLARATION I have done my undergraduate Internship on “A Study on GSM Network Coverage Functional Operation & Planning Analysis of Banglalink” in my ETE 498 course. I believe people will get an overall idea of how this division works. I have covered here the rectification and maintenance of telecom equipments and network management center’s work operations. I learned a lot, experienced new stuffs. I have not submitted the matter embodied in this dissertation for the award of any other degree. None of the element, partly or fully, of this has been submitted elsewhere for the award of any Degree or Diploma. Any material reproduced in this paper has been properly acknowledged. Approval It is certified that Md. Akhter Uz Zaman, a student of Department of Electrical & Computer Engineering, North South University, have submitted the project titled “A Study on GSM Network Coverage Functional Operation & Planning Analysis of Banglalink”. It is a partial step upon his completion of the requirements for the award of the degree of Bachelor of Science Degree in Electronic and Telecommunication Engineering. He has approached a......

Words: 8200 - Pages: 33

The Impact of Cloud Computing on Network Management

...Computing on Network Management. Introduction Network management is a process to maximize the reliability and utilization of network components in order to optimize network availability and responsiveness. We see that this definition includes elements of two other processes: * Availability * Performance and tuning Maximizing reliability through the use of Cloud Computing is another way of emphasizing high availability by ensuring network lines and the various components such as routers, switches, and hubs maintain high levels of uptime. Maximizing utilization implies that performance and tuning activities involving these components are optimizing network response. While availability and performance and tuning are the two processes most closely related to, and affected by, this process, network management actually interacts with six other systems management processes, making it one of the most interrelated of all 12 disciplines. Therefore it could be considered one of the most vital and integral parts of any organization. Network management covers an extensive area, including: * Security: Ensuring that the network is secure from unapproved users. * Performance: Removing bottlenecks in the network. * Reliability: Making sure the network is accessible to users and reacting to hardware and software faults. Key Decisions about Network Management Six key decisions need to be made that influence the strategy, direction, and cost of the Network management......

Words: 1101 - Pages: 5

Network Management - a Network Manager Discovers That a Network Component Is Performing Poorly and Issues on Order to the Technician to Replace It

...WE PROVIDE CASE STUDY ANSWERS, ASSIGNMENT SOLUTIONS, PROJECT REPORTS AND THESIS aravind.banakar@gmail.com ARAVIND - 09901366442 – 09902787224 NETWORK MANAGEMENT The Engineering Department to twelve persons in a small corporation is on a regular 10 Base-T Ethernet Lan hub with 16 ports. The busy group started complaining because of the slow network performance. The network was operating at 50% utilization, whereas 30% utilization is acceptable. If you are the corporation’s Information Technology Engineer and have to resolve the problem technically, a. Describe four choices for resolving the problem, maintaining the LAN as an Ethernet LAN. b. State the advantages and disadvantages of each approach. 1. Two virtual LANs, 145.50.50.1 belonging to NM lab, and 145.50.60.1 belonging to Networking lab, each have three workstations. The former has workstations 145.50.50.11-13, and the latter 145.50.60.21.-23. They are connected to a switched hub on ports 2 through 7. the NICs (network interface cards) associated with ports are made by Cabletron and their MAC addresses start with the vendor’s global prefix 00-00-1D (hexadecimal notation) and end with 11,12,13,21,22, and 23 (same as the fourth decimal position of IP addresses). 2. a. Create a conceptual matrix table, as shown below, that would be generated by the hub that relates the IP address, MAC address, and port number. 3...

Words: 937 - Pages: 4

Network Management - a New Lec Is Added to an Atm Lan Containing Other Lecs, Les, Lecs, a Bus, and a Atm Switch. Starting from the Initial Conditions, Six Steps Are Required to Make the

...WE PROVIDE CASE STUDY ANSWERS, ASSIGNMENT SOLUTIONS, PROJECT REPORTS AND THESIS aravind.banakar@gmail.com ARAVIND - 09901366442 – 09902787224 NETWORK MANAGEMENT The Engineering Department to twelve persons in a small corporation is on a regular 10 Base-T Ethernet Lan hub with 16 ports. The busy group started complaining because of the slow network performance. The network was operating at 50% utilization, whereas 30% utilization is acceptable. If you are the corporation’s Information Technology Engineer and have to resolve the problem technically, a. Describe four choices for resolving the problem, maintaining the LAN as an Ethernet LAN. b. State the advantages and disadvantages of each approach. 1. Two virtual LANs, 145.50.50.1 belonging to NM lab, and 145.50.60.1 belonging to Networking lab, each have three workstations. The former has workstations 145.50.50.11-13, and the latter 145.50.60.21.-23. They are connected to a switched hub on ports 2 through 7. the NICs (network interface cards) associated with ports are made by Cabletron and their MAC addresses start with the vendor’s global prefix 00-00-1D (hexadecimal notation) and end with 11,12,13,21,22, and 23 (same as the fourth decimal position of IP addresses). 2. a. Create a conceptual matrix table, as shown below, that would be generated by the hub that relates the IP address, MAC address, and port number. 3...

Words: 937 - Pages: 4

Management Information System - Could the 2004 Athens Olympics Have Been a Success Without All of the Networks and Backup Technologies

...– 09902787224 MANAGEMENT INFORMATION SYSTEM 1. Could the 2004 Athens Olympics have been a success without all of the networks and backup technologies? 2. The 2004 Olympics is a global business. Can a business today succeed without information technology? Why or why not? 3. Claude Philipps said dealing with “crazy scenarios of what might happen in every area: a network problem, staff stopped in traffic jam, security attack…everything that might happen,” was the reason for so much testing. Can you think of other business that would require “crazy scenario” testing? Explain. 4. What is the business value of data warehouse? Use Argosy Gaming as an example. 5. Why did Argosy use a ETL software tool? What benefits and problems arose? How were they solved? 6. What are some of the major responsibilities that business professionals and managers have in data warehouse development? Use Argosy Gaming as an example. 7. What is business intelligence? Why are business-intelligence systems such a popular business application of IT? 8. What is the business value of the various BI applications discussed in the case? 9. Is a business-intelligence system an MIS or a DSS 10. Why do more than a third of all Web self-service customers get frustrated and end up calling a help center? Use the experiences of Blue Cross-Blue Shield and AT & T Wireless to help you answer. 11. What are......

Words: 429 - Pages: 2

Network Management - Describe Four Choices for Resolving the Problem, Maintaining the Lan as an Ethernet Lan

...WE PROVIDE CASE STUDY ANSWERS, ASSIGNMENT SOLUTIONS, PROJECT REPORTS AND THESIS aravind.banakar@gmail.com ARAVIND - 09901366442 – 09902787224 NETWORK MANAGEMENT The Engineering Department to twelve persons in a small corporation is on a regular 10 Base-T Ethernet Lan hub with 16 ports. The busy group started complaining because of the slow network performance. The network was operating at 50% utilization, whereas 30% utilization is acceptable. If you are the corporation’s Information Technology Engineer and have to resolve the problem technically, a. Describe four choices for resolving the problem, maintaining the LAN as an Ethernet LAN. b. State the advantages and disadvantages of each approach. 1. Two virtual LANs, 145.50.50.1 belonging to NM lab, and 145.50.60.1 belonging to Networking lab, each have three workstations. The former has workstations 145.50.50.11-13, and the latter 145.50.60.21.-23. They are connected to a switched hub on ports 2 through 7. the NICs (network interface cards) associated with ports are made by Cabletron and their MAC addresses start with the vendor’s global prefix 00-00-1D (hexadecimal notation) and end with 11,12,13,21,22, and 23 (same as the fourth decimal position of IP addresses). 2. a. Create a conceptual matrix table, as shown below, that would be generated by the hub that relates the IP address, MAC address, and port number. 3...

Words: 937 - Pages: 4

Network Management - the Engineering Department to Twelve Persons in a Small Corporation Is on a Regular 10 Base-T Ethernet Lan Hub with 16 Ports. the Busy Group Started Complaining Because

...WE PROVIDE CASE STUDY ANSWERS, ASSIGNMENT SOLUTIONS, PROJECT REPORTS AND THESIS aravind.banakar@gmail.com ARAVIND - 09901366442 – 09902787224 NETWORK MANAGEMENT The Engineering Department to twelve persons in a small corporation is on a regular 10 Base-T Ethernet Lan hub with 16 ports. The busy group started complaining because of the slow network performance. The network was operating at 50% utilization, whereas 30% utilization is acceptable. If you are the corporation’s Information Technology Engineer and have to resolve the problem technically, a. Describe four choices for resolving the problem, maintaining the LAN as an Ethernet LAN. b. State the advantages and disadvantages of each approach. 1. Two virtual LANs, 145.50.50.1 belonging to NM lab, and 145.50.60.1 belonging to Networking lab, each have three workstations. The former has workstations 145.50.50.11-13, and the latter 145.50.60.21.-23. They are connected to a switched hub on ports 2 through 7. the NICs (network interface cards) associated with ports are made by Cabletron and their MAC addresses start with the vendor’s global prefix 00-00-1D (hexadecimal notation) and end with 11,12,13,21,22, and 23 (same as the fourth decimal position of IP addresses). 2. a. Create a conceptual matrix table, as shown below, that would be generated by the hub that relates the IP address, MAC address, and port number. 3...

Words: 937 - Pages: 4

Network Management - Two Virtual Lans, 145.50.50.1 Belonging to Nm Lab, and 145.50.60.1 Belonging to Networking Lab, Each Have Three Workstations

...WE PROVIDE CASE STUDY ANSWERS, ASSIGNMENT SOLUTIONS, PROJECT REPORTS AND THESIS aravind.banakar@gmail.com ARAVIND - 09901366442 – 09902787224 NETWORK MANAGEMENT The Engineering Department to twelve persons in a small corporation is on a regular 10 Base-T Ethernet Lan hub with 16 ports. The busy group started complaining because of the slow network performance. The network was operating at 50% utilization, whereas 30% utilization is acceptable. If you are the corporation’s Information Technology Engineer and have to resolve the problem technically, a. Describe four choices for resolving the problem, maintaining the LAN as an Ethernet LAN. b. State the advantages and disadvantages of each approach. 1. Two virtual LANs, 145.50.50.1 belonging to NM lab, and 145.50.60.1 belonging to Networking lab, each have three workstations. The former has workstations 145.50.50.11-13, and the latter 145.50.60.21.-23. They are connected to a switched hub on ports 2 through 7. the NICs (network interface cards) associated with ports are made by Cabletron and their MAC addresses start with the vendor’s global prefix 00-00-1D (hexadecimal notation) and end with 11,12,13,21,22, and 23 (same as the fourth decimal position of IP addresses). 2. a. Create a conceptual matrix table, as shown below, that would be generated by the hub that relates the IP address, MAC address, and port number. 3...

Words: 937 - Pages: 4

Network Management - You Are Asked to Do a Study of the Use Pattern of 24,000 Workstations in an Academic Institution. Make the Following Assumptions. You Ping Each Station Periodically

...WE PROVIDE CASE STUDY ANSWERS, ASSIGNMENT SOLUTIONS, PROJECT REPORTS AND THESIS aravind.banakar@gmail.com ARAVIND - 09901366442 – 09902787224 NETWORK MANAGEMENT The Engineering Department to twelve persons in a small corporation is on a regular 10 Base-T Ethernet Lan hub with 16 ports. The busy group started complaining because of the slow network performance. The network was operating at 50% utilization, whereas 30% utilization is acceptable. If you are the corporation’s Information Technology Engineer and have to resolve the problem technically, a. Describe four choices for resolving the problem, maintaining the LAN as an Ethernet LAN. b. State the advantages and disadvantages of each approach. 1. Two virtual LANs, 145.50.50.1 belonging to NM lab, and 145.50.60.1 belonging to Networking lab, each have three workstations. The former has workstations 145.50.50.11-13, and the latter 145.50.60.21.-23. They are connected to a switched hub on ports 2 through 7. the NICs (network interface cards) associated with ports are made by Cabletron and their MAC addresses start with the vendor’s global prefix 00-00-1D (hexadecimal notation) and end with 11,12,13,21,22, and 23 (same as the fourth decimal position of IP addresses). 2. a. Create a conceptual matrix table, as shown below, that would be generated by the hub that relates the IP address, MAC address, and port number. 3...

Words: 937 - Pages: 4