2
Most read
3
Most read
4
Most read
JSS ACADEMY OF TECHNICAL EDUCATION, NOIDA
DR. APJ ABDUL KALAM TECHNICAL UNIVERSITY, LUCKNOW, U.P
NAME: DHEERAJ PACHAURI
ROLL NO.: 1809113042
BRANCH: IT-1
Topic: Network Management
CONTENT
• Network Management
• Types:
Configuration Management
Fault Management
Performance Management
Security Management
Accounting Management
• Simple Network Management Protocol
• Structure of Management Information(SMI)
• Management Information Bar(MIB)
NETWORK MANAGEMENT
Network Management can be defined as monitoring, testing, configuring, and
troubleshooting network components to meet a set of requirements. To
accomplish this task, a Network Management System uses hardware,
software and humans.
The functions performed by a Network Management System can be divided
into five broad categories:
• Configuration Management
• Fault Management
• Reactive Fault Management
• Security Management
• Accounting Management
Configuration Management
The configuration management system must know the status of each entity and its
relation to other entities at any time. Configuration management can be divided into
two subsystems: reconfiguration and documentation.
Reconfiguration: Reconfiguration, which means adjusting the network compon
ents and features, can be a daily occurrence in a large network. There are three
types of reconfiguration:
• Hardware reconfiguration covers all changes to the hardware.
• Software reconfiguration covers all changes to the software.
• User-account reconfiguration is not simply adding or deleting users on a system.
 Documentation
There must be documentation for hardware, software, and user accounts.
• Hardware documentation normally involves two sets of documents: maps and
specifications
Software documentation includes information such as the software type, the
version, the time installed, and the license agreement.
Fault Management
Fault management is the area of network management that handles the
proper operation of each component individually and in relation to each
other.
An effective fault management system has two subsystems: reactive
fault management and proactive fault management.
• Reactive Fault Management: A reactive fault management system is
responsible for detecting, isolating, correcting, and recording faults. It
handles short-term solutions to faults.
• Proactive Fault Management: Proactive fault management tries to
prevent faults from occurring. Although this is not always possible,
some types of failures can be predicted and prevented.
Performance Management
Performance management tries to monitor and control the network to
ensure that it is running as efficiently as possible. Performance
management tries to quantify performance by using some
measurable quantity such as capacity, traffic, throughput, or response
time.It is closely related to fault management,
Security Management
Security management is responsible for controlling access to the
network based on the predefined policy.
Accounting Management
Accounting management is the control of users' access to network
resources through charges. Under accounting management, individual
users, departments, divisions, or even projects are charged for the
services they receive from the network.
SIMPLE NETWORK MANAGEMENT PROTOCOL
The Simple Network Management Protocol (SNMP) is a framework for
managing devices in an internet using the TCPIIP protocol suite. It
provides a set of fundamental operations for monitoring and maintaining
an internet. SNMP uses the concept of manager and agent.
Manager is a host that runs the SNMP client program.
Agent is a router (or a host) that runs the SNMP server program.
To do management tasks, SNMP uses two protocols:
• Structure of Management Information (SMI)
• Management Information Base (MIB)
Structure of Management Information (SMI)
The Structure of Management Information, version 2 (SMIv2) is a
component for network management.It is a guideline for SNMP. It
emphasizes three attributes to handle an object: name, data type, and
encoding method. Its functions are
1. To name objects
2. To define the type of data that can be stored in an object
3. To show how to encode data for transmission over the network
Management Information Base (MIB)
The Management Information Base, version 2 (MIB2) is the second
component used in network management. Each agent has its own MIB2,
which is a collection of all the objects that the manager can manage.
MIB creates a set of objects defined for each entity similar to a database
(mostly metadata in a database, names and types without values).
REFRENCES
• Behrouz A. Forouzan. Data Communications and
Networking. McGraw- Hill, 2007
• Wikipedia
• GeeksForGeeks
THANK YOU

More Related Content

PPT
Presentation on C.P.U
PDF
Introduction to WebSockets Presentation
PPTX
A basic PPT on Internet Of Things(IOT)
PPTX
Earth and Space- Science 6- Quarter 4- Week 1.pptx
PDF
Management ppt.pdf
PPT
PPT
Network management
PPT
Wireless charging ppt
Presentation on C.P.U
Introduction to WebSockets Presentation
A basic PPT on Internet Of Things(IOT)
Earth and Space- Science 6- Quarter 4- Week 1.pptx
Management ppt.pdf
Network management
Wireless charging ppt

What's hot (20)

PPTX
Unit5 Cloud Federation,
PPTX
IP tables and Filtering
PPT
Cloud computing
PPTX
Service level agreement in cloud computing an overview
PPTX
Cloud federation.pptx
PDF
Google App Engine
PPT
ODP
Distributed operating system(os)
PDF
High Performance & High Throughput Computing - EUDAT Summer School (Giuseppe ...
PPTX
Network Virtualization
PPT
Communications is distributed systems
PPT
Virtualization.ppt
PPTX
Eucalyptus, Nimbus & OpenNebula
PPTX
Cloud service models
PPTX
DeadLock in Operating-Systems
PPTX
Common Standards in Cloud Computing
PPTX
Concurrency Control in Distributed Database.
PPT
Cloud and dynamic infrastructure
PDF
Network Monitoring Tools
Unit5 Cloud Federation,
IP tables and Filtering
Cloud computing
Service level agreement in cloud computing an overview
Cloud federation.pptx
Google App Engine
Distributed operating system(os)
High Performance & High Throughput Computing - EUDAT Summer School (Giuseppe ...
Network Virtualization
Communications is distributed systems
Virtualization.ppt
Eucalyptus, Nimbus & OpenNebula
Cloud service models
DeadLock in Operating-Systems
Common Standards in Cloud Computing
Concurrency Control in Distributed Database.
Cloud and dynamic infrastructure
Network Monitoring Tools
Ad

Similar to Network management ppt (20)

PDF
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
PDF
HOST AND NETWORK SECURITY by ThesisScientist.com
PDF
Network management
PPTX
Net Mng1.pptx
PPT
Network management aa
DOCX
Cisco network management
PPTX
Network management
PPTX
Functions and features network management
PDF
Present and desired network management to cope with the expected expansion, n...
PDF
A novel resource efficient dmms approach for network monitoring and controlli...
PDF
Introdunction to Network Management Protocols - SNMP & TR-069
DOCX
Basic Concepts and Types of Network Management
PPTX
providenetworksystemadministration.pptxhnnhgcbdjckk
PPTX
chp unit 1 Provide Network System Administration.pptx
PPTX
343492490-Network-Management-and-Administration.pptx
PDF
Widyatama.lecture.applied networking.iv-week-12.network-management
PDF
unit1.pdf
PPTX
Resove network problem.pptx
PPTX
Unit 1 network management
PPT
Lecture week8
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
HOST AND NETWORK SECURITY by ThesisScientist.com
Network management
Net Mng1.pptx
Network management aa
Cisco network management
Network management
Functions and features network management
Present and desired network management to cope with the expected expansion, n...
A novel resource efficient dmms approach for network monitoring and controlli...
Introdunction to Network Management Protocols - SNMP & TR-069
Basic Concepts and Types of Network Management
providenetworksystemadministration.pptxhnnhgcbdjckk
chp unit 1 Provide Network System Administration.pptx
343492490-Network-Management-and-Administration.pptx
Widyatama.lecture.applied networking.iv-week-12.network-management
unit1.pdf
Resove network problem.pptx
Unit 1 network management
Lecture week8
Ad

Recently uploaded (20)

PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPTX
Modernising the Digital Integration Hub
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPT
What is a Computer? Input Devices /output devices
PPTX
Chapter 5: Probability Theory and Statistics
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Five Habits of High-Impact Board Members
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
Flame analysis and combustion estimation using large language and vision assi...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Enhancing plagiarism detection using data pre-processing and machine learning...
UiPath Agentic Automation session 1: RPA to Agents
Comparative analysis of machine learning models for fake news detection in so...
sbt 2.0: go big (Scala Days 2025 edition)
Modernising the Digital Integration Hub
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
What is a Computer? Input Devices /output devices
Chapter 5: Probability Theory and Statistics
A proposed approach for plagiarism detection in Myanmar Unicode text
Five Habits of High-Impact Board Members
The influence of sentiment analysis in enhancing early warning system model f...
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
1 - Historical Antecedents, Social Consideration.pdf
OpenACC and Open Hackathons Monthly Highlights July 2025
Getting started with AI Agents and Multi-Agent Systems
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Build Your First AI Agent with UiPath.pptx
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...

Network management ppt

  • 1. JSS ACADEMY OF TECHNICAL EDUCATION, NOIDA DR. APJ ABDUL KALAM TECHNICAL UNIVERSITY, LUCKNOW, U.P NAME: DHEERAJ PACHAURI ROLL NO.: 1809113042 BRANCH: IT-1 Topic: Network Management
  • 2. CONTENT • Network Management • Types: Configuration Management Fault Management Performance Management Security Management Accounting Management • Simple Network Management Protocol • Structure of Management Information(SMI) • Management Information Bar(MIB)
  • 3. NETWORK MANAGEMENT Network Management can be defined as monitoring, testing, configuring, and troubleshooting network components to meet a set of requirements. To accomplish this task, a Network Management System uses hardware, software and humans. The functions performed by a Network Management System can be divided into five broad categories: • Configuration Management • Fault Management • Reactive Fault Management • Security Management • Accounting Management
  • 4. Configuration Management The configuration management system must know the status of each entity and its relation to other entities at any time. Configuration management can be divided into two subsystems: reconfiguration and documentation. Reconfiguration: Reconfiguration, which means adjusting the network compon ents and features, can be a daily occurrence in a large network. There are three types of reconfiguration: • Hardware reconfiguration covers all changes to the hardware. • Software reconfiguration covers all changes to the software. • User-account reconfiguration is not simply adding or deleting users on a system.
  • 5.  Documentation There must be documentation for hardware, software, and user accounts. • Hardware documentation normally involves two sets of documents: maps and specifications Software documentation includes information such as the software type, the version, the time installed, and the license agreement.
  • 6. Fault Management Fault management is the area of network management that handles the proper operation of each component individually and in relation to each other. An effective fault management system has two subsystems: reactive fault management and proactive fault management. • Reactive Fault Management: A reactive fault management system is responsible for detecting, isolating, correcting, and recording faults. It handles short-term solutions to faults. • Proactive Fault Management: Proactive fault management tries to prevent faults from occurring. Although this is not always possible, some types of failures can be predicted and prevented.
  • 7. Performance Management Performance management tries to monitor and control the network to ensure that it is running as efficiently as possible. Performance management tries to quantify performance by using some measurable quantity such as capacity, traffic, throughput, or response time.It is closely related to fault management,
  • 8. Security Management Security management is responsible for controlling access to the network based on the predefined policy.
  • 9. Accounting Management Accounting management is the control of users' access to network resources through charges. Under accounting management, individual users, departments, divisions, or even projects are charged for the services they receive from the network.
  • 10. SIMPLE NETWORK MANAGEMENT PROTOCOL The Simple Network Management Protocol (SNMP) is a framework for managing devices in an internet using the TCPIIP protocol suite. It provides a set of fundamental operations for monitoring and maintaining an internet. SNMP uses the concept of manager and agent. Manager is a host that runs the SNMP client program. Agent is a router (or a host) that runs the SNMP server program. To do management tasks, SNMP uses two protocols: • Structure of Management Information (SMI) • Management Information Base (MIB)
  • 11. Structure of Management Information (SMI) The Structure of Management Information, version 2 (SMIv2) is a component for network management.It is a guideline for SNMP. It emphasizes three attributes to handle an object: name, data type, and encoding method. Its functions are 1. To name objects 2. To define the type of data that can be stored in an object 3. To show how to encode data for transmission over the network
  • 12. Management Information Base (MIB) The Management Information Base, version 2 (MIB2) is the second component used in network management. Each agent has its own MIB2, which is a collection of all the objects that the manager can manage. MIB creates a set of objects defined for each entity similar to a database (mostly metadata in a database, names and types without values).
  • 13. REFRENCES • Behrouz A. Forouzan. Data Communications and Networking. McGraw- Hill, 2007 • Wikipedia • GeeksForGeeks