Wednesday , 22 May 2019
Home 4 Book 4 Network Management

Network Management

Morgan Kaufmann is an imprint of Elsevier.| English | 402 pages | PDF | 15.509 KB | Download | Password: network

Network management is the poor cousin of network design and implementation. All too often it is treated as an inconvenience by equipment manufacturers, or forgotten entirely. But the ability to manage network devices is fundamental to their utility, and a successful and functional network can only be built from equipment that can be easily managed and operated.

Management refers to the ability to configure, control, operate, and diagnose equipment. Of course, no vendor ships devices that cannot be managed, but typically each is operated and controlled in a different way. This is not a problem for the vendor, and might not be a problem for a network operator if all equipment in the network is located at the same site and purchased from the same vendor. Obviously, however, networks are dispersed across large distances, have components in unattended sites, and are constructed from switches and routers supplied by various companies. This makes diverse network management approaches a significant hurdle to efficient and effective network operation.

At some level all network devices require some management. Even the most simple devices have physical management needs as they are commissioned and connected to a power supply. But most devices need some form of configuration to tell them what role they are to play in the network and precisely how to behave. Even when auto configuration protocols like the Dynamic Host Configuration Protocol (DHCP) are used to dynamically assign IP addresses and to download basic configuration information, a network operator will still want to use management operations to inspect the devices to discover what addresses they are using.

Many network devices are complex, requiring a large number of configuration parameters. Many, if not most, of these parameters can usually use default values, but fine tuning may be necessary to ensure optimal functioning of the network, and that requires some form of management access to the device. At the same time, it is crucial to the understanding of the operation of a network to be able to inspect each node and observe how it is behaving. What resources are active and how much traffic are they carrying? Who has provisioned those connections that are causing a bottleneck for the CEO’s emails? Why can’t I send any packets to that host? The background information needed to answer these types of question ranges from basic state information about the devices, through detailed data concerning the inner functioning of the devices and thorough statistics recording the number of errors, packets, and bytes.

In order to get the most meaning out of management information retrieved from a device, it is usually decomposed in a logical and modular fashion. So, for example, one might be able to access data about a whole router, the line cards on the router, the interfaces on each line card, the protocol components running on the router, and so on. Conversely, configuration is most flexible when it can be applied to the same logical components of the system. Network management is an area in which most Internet service providers (ISPs) seem to struggle. The nature of their networks is constantly changing, and the market is continually driving them to provide new and different services. These changes put a strain on existing network management tools and require the ISPs to race to adapt their techniques to their customers’ requirements. In previous years, managed Internet services were the highest requirement, but these days.

Enterprises are looking for their ISP to support intranet or extranet services. This means that the service provider needs to provide an entire “network” to an individual enterprise customer and not just a set of simple and unrelated connections to the Internet. The new network services are provided to the customer as virtual private networks (VPNs) across a common shared network infrastructure owned by the ISP. This sharing of network resources provides a new challenge to the network management capabilities of the service provider that must now be able to partition resources and share them between customers.

Check Also

6 stupid office rules that should be banned

Rules in the workplace. Without them we’d have anarchy. Or would we? According to an article by Dr Travis Bradbury in the Huffington Post most companies fall into the trap of instigating morale sapping rules for every employee based upon the inconsiderate actions of a small minority of transgressors. Hardly seems fair does it? Anyway, in this article, Dr …

Digital Forensics for network, internet, and cloud computing

The modern computer environment has moved past the local data center with a single entry …

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: