WS Workstation LAN 1 Node 1 Backbone Node Hub Agent WS Agent Probe Agent Router

Ws workstation lan 1 node 1 backbone node hub agent

This preview shows page 28 - 38 out of 46 pages.

WS = Workstation LAN 1 Node 1 Backbone Node Hub Agent WS Agent Probe Agent Router Agent Router Agent WS Agent Probe Agent LAN 2 Node 2 Router Agent Probe Agent WS Agent LAN 3 Node 3 NMS
Image of page 28

Subscribe to view the full document.

The network diagram above consists of 3 nodes that are LANs and a backbone node which connected LANs nodes Together. In this network the configuration management is centralized to the Network Management Station in the backbone node. The network manager can gather info about LANs by using NMS and SNMP packets to query the agents on the LAN devices. Then the device agent will store info from transmitted and received packets. About the Diagram
Image of page 29
Image of page 30

Subscribe to view the full document.

Distributed Configuration In this type of configuration the LANs are managed by a local NMS while an NMS host connects to the backbone network.
Image of page 31
Probe = Remote Monitor NMS = Network Management System WS = Workstation -------- = In-band or out-of band management communication NMS Probe Agent WS Agent LAN 3 Node 3 Router Agent NMS Backbone Router Agent WS Agent Probe Agent LAN 2 Node 2 NMS LAN 1 Node 1 Hub Agent WS Agent Probe Agent Router Agent NMS
Image of page 32

Subscribe to view the full document.

About the Diagram Distributed NMS is a good choice for enterprise network in which there are more backbone devices and more LAN devices, because its more robust system. In the previous network diagram ,the LANs are managed by a local administrator using the local NMS while a central Administrator manages backbone devices using NMS host attached to backbone network. LAN NMS is the one host that has only the capability necessary to provide type of management required by the network.
Image of page 33
About the Diagram Backbone NMS need to be more comprehensive for its functions . as the diagram shows each node has its own NMS which will maintains a MIB(Management Information Base) for that specific node only, by doing this will reduce the storage requirement for each Management System. Advantage of Distributed NMS: In case of a network fault ,some levels of network management will probably be available.
Image of page 34

Subscribe to view the full document.

SECURITY MANAGEMENT Security Management The process of controlling access to information on the networked system. also… Process of controlling access to network resources with authentication, encryption, authorization policies, firewalls and network intrusion detectors.
Image of page 35
SECURITY MANAGEMENT SUB-CATEGORIES AND RELATED ACTIVITIES Applying Basic Techniques · Identifying hosts that store sensitive information · Management of passwords · Assigning user rights and permissions · Recording failed logins · Setting remote access barrier codes · Employing virus scanning · Identifying Access Methods Used · Electronic Mail · File Transfer · Web Browsing · Directory Service · Remote Login
Image of page 36

Subscribe to view the full document.

SECURITY MANAGEMENT SUB-CATEGORIES AND RELATED ACTIVITIES Using Access Control Methods · Encryption · Packet filtering at routers · Packet filtering at firewalls · Source host authentication · Source user authentication Maintenance · Audits of the activity at secure access points · Executing security attack programs (Network Intrusion Detection) · Detecting and documenting breaches Accessing Public Data Networks · No restrictions - hosts are responsible for securing all access points ·
Image of page 37
Image of page 38
  • Spring '17
  • Henry

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Ask Expert Tutors You can ask 0 bonus questions You can ask 0 questions (0 expire soon) You can ask 0 questions (will expire )
Answers in as fast as 15 minutes