Ainwhatwaysarenetworkmanagementandnetworksecurityinter

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: e management, fault management, etc.). Proper network management is a critical component of an efficient network. Network administrators need tools to monitor the functionality of the network devices, the connections between them, and the services they provide. The ISO network management model's five functional areas are listed below. ● Fault Management—Detect, isolate, notify, and correct faults encountered in the network. ● Configuration Management—Configuration aspects of network devices such as configuration file management, inventory management, and software management. ● Performance Management—Monitor and measure various aspects of performance so that overall performance can be maintained at an acceptable level. ● Security Management—Provide access to network devices and corporate resources to authorized individuals. ● Accounting Management—Usage information of network resources. 1. Fault management Fault management refers to detecting, isolating, diagnosing, and correcting problems. It also includes processes for reporting problems to end users and managers, and tracking trends related to problems 2. Configuration management Configuration management helps a network manager keep track of network devices and maintain information on how devices are configured. 3. Accounting management Accounting management facilitates usage­based billing, whereby individual departments or projects are charged for network services. 4. Performance management Performance management allows the measurement of network behavior and effectiveness.This includes examining network application and protocol behavior, analyzing reachability, measuring response time, and recording network route changes. 5. Security management Security management lets a network manager maintain and distribute passwords and other authentication and authorization information. effectiveness.This includes examining network application and protocol behavior, analyzing reachability, measuring response time, and recording network route changes. 5. Security management Security management lets a network manager maintain and distribute passwords and other authentication and authorization information. Question 3: Network management and Network security. a) In what ways are network management and network security interrelated? Network management and network security both are inter...
View Full Document

Ask a homework question - tutors are online