This website uses cookies to ensure you have the best experience. Learn more

Cmip Vs. Snmp Network Management Protocols

2247 words - 9 pages

I thought I deserved better for the time I put into it, but the teacher didn't understand it,. so he gave me a B -CMIP vs. SNMP : Network ManagementImagine yourself as a network administrator, responsible for a 2000 user network.This network reaches from California to New York, and some branches over seas. Inthis situation, anything can, and usually does go wrong, but it would be your job as asystem administrator to resolve the problem with it arises as quickly as possible. Thelast thing you would want is for your boss to call you up, asking why you haven't doneanything to fix the 2 major systems that have been down for several hours. How doyou explain to him that you didn't even know about it? Would you even want to tellhim that? So now, picture yourself in the same situation, only this time, you wereusing a network monitoring program. Sitting in front of a large screen displaying amap of the world, leaning back gently in your chair. A gentle warning tone sounds, andlooking at your display, you see that California is now glowing a soft red in color, inplace of the green glow just moments before. You select the state of California, and itzooms in for a closer look. You see a network diagram overview of all the computersyour company has within California. Two systems are flashing, with an X on top ofthem indicating that they are experiencing problems. Tagging the two systems, youpress enter, and with a flash, the screen displays all the statitics of the two systems,including anything they might have in common causing the problem. Seeing that bothsystems are linked to the same card of a network switch, you pick up the phone andgive that branch office a call, notifying them not only that they have a problem, buthow to fix it as well.Early in the days of computers, a central computer (called a mainframe) wasconnected to a bunch of dumb terminals using a standard copper wire. Not muchthought was put into how this was done because there was only one way to do it: theywere either connected, or they weren't. Figure 1 shows a diagram of these earlysystems. If something went wrong with this type of system, it was fairly easy totroubleshoot, the blame almost always fell on the mainframe system.Shortly after the introduction of Personal Computers (PC), came Local AreaNetworks (LANS), forever changing the way in which we look at networked systems.LANS originally consisted of just PC's connected into groups of computers, but soonafter, there came a need to connect those individual LANS together forming what isknown as a Wide Area Network, or WAN, the result was a complex connection ofcomputers joined together using various types of interfaces and protocols. Figure 2shows a modern day WAN. Last year, a survey of Fortune 500 companies showed that15% of their total computer budget, 1.6 Million dollars, was spent on networkmanagement (Rose, 115). Because of this, much attention has focused on two familiesof network management protocols: The Simple Network...

Find Another Essay On CMIP vs. SNMP - Network Management Protocols

Riordan Manufacturing Essay

1036 words - 5 pages Communication protocols are the force by which network devices can communicate with one another. The main protocols used by applications are TCP, UDP, IP protocols, ICMP, IGMP, SCTP and DCCP, ARP, and routing protocols. Each protocol serves its own unique purpose, for example HTTP uses TCP port 80. TCP or Transmission Control Protocol uses a handshake method to make sure that data makes it to a location in full, and in the correct order. This

network processor Essay

724 words - 3 pages . • SNMP (Simple Network Management Protocol). A Multistation Access Unit (MAU) is a special type of hub used for token ring networks ("Networking Devices Hub Switch Router Modem Bridges Brouters Gateways", 2014). A regular hub will use a logical bus topology over a physical star network. The difference in the MAU is that it uses a logical ring topology over a physical star. A packet refers to a way of breaking data into different pieces to send along

Design a Network Infrastructure Because Networks are Configured in Many Ways, Network Systems and Data Communications Analysts are Needed to Design, Test, and Evaluate Systems Such as Local Area...

8965 words - 36 pages Network. The protocols used by X.25 operate in close relation to the Data Link and Physical Layer protocols defined in the OSI Model.Frame RelayFrame relay operates at the Data Link Layer of the OSI Model. One way to look upon Frame Relay is that it was originally developed as a "poor man's" version of the X.25 technology. It is often sold by Telecommunications companies to businesses looking for a cheaper alternative than leased lines. Frame

Networking: Network Security

2472 words - 10 pages Protocols: IPsec vs. TLS/SSL vs. SSH – Part II « K2E Security. 2014. Network Security Protocols: IPsec vs. TLS/SSL vs. SSH – Part II « K2E Security. [ONLINE] Available at: http://www.k2esec.com/secure-communications/network-security-protocols-ipsec-vs-tlsssl-vs-ssh-part-ii. [Accessed 25 March 2014]. Barrett, D. J. and Silverman, R. E. 2001. SSH, the secure shell. Cambridge [Mass.]: O'Reilly. Oppliger, R. 2009. SSL and TLS. Boston: Artech House. Stallings, W. and Stallings, W. 1999. Cryptography and network security. Upper Saddle River, N.J.: Prentice Hall. Rescorla, E. 2001. SSL and TLS. Boston: Addison-Wesley.

Virtual Private Networks

4352 words - 18 pages protocols and options etc., is relatively simple, and can be done from a centralized location making management of the VPN network efficient. Since VPN can take advantage of using the internet as the connection medium, costs can be significantly less than the methods companies were forced to use in years past such as costly leased lines and Frame Relay. Access to the internet is relatively inexpensive and is available virtually from all points of

wimax

751 words - 4 pages , primary, and secondary. A basic connection and primary connection are created for each MS when they join the network. A basic connection is used for short and urgent management message. And a primary connection is used for delay-tolerant management messages. The secondary connection is used for IP summarized management messages such as dynamic host configuration protocol [DHCP], and simple network management protocol [SNMP]. Transport connections can be provisioned or can be recognized on demand. They are used for user traffic flows. Unicast or multicast can be used for transmission.

E. Miller floor Washington School TCS

2415 words - 10 pages computer in the network and 100 Mbps to any server host in the network. Only two OSI layer 3&4 protocols will be allowed to be implemented in this network, they are TCP/IP and Novell IPX.TABLE OF CONTENTSSECTION 1 - Wide Area Network SECTION 2 - Local Area Network & Wiring Scheme SECTION 3 - District Supplied Servers and Functions SECTION 4 - Address and Network Management SECTION 5 - Security SECTION 6 - Internet Connectivity SECTION 7 - User

Voice over Internet Protocol

1082 words - 4 pages infrastructure can support dynamic bandwidth optimization and a fault tolerant design. Consolidation: People are the most significant cost elements in a network, so any opportunity to combine operations and eliminate points of failure and to consolidate accounting systems would be beneficial. In the enterprise, SNMP based management with the appropriate MIB structures can be provided for both voice and date services using VoIP. Universal use of the IP

Corporate Network Management

2150 words - 9 pages human network managers in monitoring/maintaining and running a network. Some network management technologies that aid in network management include Virtual Private Networks (VPN), Directory-Enabled Networking, Remote Monitoring and Simple Network Management Protocol (SNMP) (Cisco 2014). A VPN (Virtual Private Network) assists humans in creating a network that can be accessed from offsite locations to access internal data for remote access. This

Transport Layer Security and Secure Shell

1420 words - 6 pages /f/whatis_SSH.htm [Accessed 19 March 2014]. Linn, M., 2014. wiseGEEK. [Online] Available at: http://www.wisegeek.com/what-are-network-security-protocols.htm [Accessed 14 March 2014]. Maalouf, J., 2009-2012. IPSec vs. TLS/SSL vs. SSH Part II. [Online] Available at: http://www.k2esec.com/secure-communications/network-security-protocols-ipsec-vs-tlsssl-vs-ssh-part-ii [Accessed 26 March 2014]. McKinley, H. L., 2003. SSL and TLS: A

A Wireless Sensor Network

2321 words - 10 pages failed nodes. A) Some schemes only considers permanent faults and avoid intermittent and transient faults in detecting approaches. B) Some frameworks require the external human manager to monitor the network management functionality eg. TINY DB, MOTE-VEW, SNMP C) Fault recovery mechanism are mainly focus on small region and individual nodes that fully scalable. D) Absence of testing tool makes it difficult to test the progression of

Similar Essays

Network Troubleshooting Monitoring Essay

2094 words - 8 pages . Protocols The roots of the network management protocols that are in common use these days are traced back to developments within the late Eighties. Before that point, network management had usually been performed using low-level signaling techniques to send special management info. Receipt of this info would cause receiving hardware to stop traditional operation and enter a special diagnostic mode during which it more responsible commands contained

Shedding The Light On The Network, Transport And Application Layer Protocols Of Osi Model

2406 words - 10 pages Executive Summary This report is a response to an individual assignment to partially fulfill the requirements of (TN6384 Computer Network) module. It aims to shed the light on the Network, transport, and application-layer protocols of OSI Model. The report begins with presenting a relevant background to the topic, presenting the historical perspective of OSI protocols. In addition, it explains the purpose and importance of these protocols

Ntc/406 Cross Layer Or Hybrid Analysis And Recommendations

3489 words - 14 pages TCP utilities the following utilities reside in and utilize the application layer. Some of these are Address Resolution Protocol (ARP), Ping which may check for connectivity issues, and TraceRT which may detect where a possible network failure lies ("How the Application Layer Works", 2008). Another proactive management tool is the Simple Network Management Protocol (SNMP). SNMP can monitor traffic patterns, and reconfigure nodes within a network

Lan Topologies Essay

2369 words - 9 pages AppleTalk filing protocol (AFP), TCP/IP, Telnet, Simple Mail Transfer Protocol (SMTP), Simple Network Management Protocol (SNMP), SNA, File Transfer Protocol (FTP), Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX), NetWare file services, NetWare print services, NetBIOS, and NetBEUI. · Network services -- NOS platforms should provide the functions needed to support large business environments, including support for directory