Network Management System

Only available on StudyMode
  • Download(s) : 34
  • Published : February 25, 2013
Open Document
Text Preview
NETWORK MANAGEMENT SYSTEM (NMS)
CHAPTER ONE
INTRODUCTION
Network Management System is simply a concept associated with all the utilities that is designed to allow any network administrator to monitor the network and ensure that it functions properly as designed. It typically monitors the components of both the hardware and software of the network. The utilities of a Network Management System typically records data from remote points on a network for central reporting to an administrator. Network management basically refers to the broad subject of managing computer networks. There exists a wide variety of software and hardware products that help network system administrators manage a network. Network Management covers a wide area, including: * Security: Ensuring that the network is protected from unauthorized users. * Performance: Eliminating bottlenecks in the network.

* Reliability: Making sure the network is available to users and responding to hardware and software malfunctions. In other to do all these effectively and efficiently, the network administrator has to clearly define the following: * The Network Topology

* The type of networks needed
* Security of Wireless Network
* How optimization of WAN will improve the network
* How to deploy Wireless LAN
* The appliances that will secure the network
* What wireless networking standard to use

Network Topologies:
This refers to layout of a network, how different nodes in the network are connected to each other and how they communicate. Examples of topologies commonly used are: 1. Mesh topology: This is simply a connection that entails an interconnection of all nodes.

2. Star topology: In this topology, devices are connected to a central computer called a hub.

3. Bus topology: In this topology, through a main cable, all other devices are connected to the network.

4. Ring topology: In this topology, all of the nodes are connected in a closed loop. Messages travel around the ring, with each node reading those messages addressed to it.

5. Tree topology: This is a "hybrid" topology that combines characteristics of linear bus and star topologies. In a tree network, groups of star-configured networks are connected to a linear bus backbone cable.

Types of Network:
The types of network are basically classified into two (2) wired medium and wireless medium. Wired networks offer many advantages over wireless networks, especially in terms of speed and cost. Wired networks also offer security advantages over wireless networks, but most of the security risks of wireless networks can be controlled with advanced encryption and other security options.   The major advantage in deploying a wireless network is simply the advantage of not needing any wiring at all. It is possible to combine the two types of network. In most cases, a combination of both wired and wireless network connections serves you best, especially if your facility is already wired. Security of Wireless Network:

The most frequently used method for securing a wireless network is to implement encryption, which protects the real-time traffic of the network while also preventing unauthorized access to the data residing on the network's computers and servers.  There are several types of encryption methods being used today, with the most frequent methods being Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2).  Of these methods, WEP is the oldest and the least secure, almost all wireless experts recommends WPA and WPA2 instead of WEP unless the router in use or specific network resources lack support for the new encryption methods (WPA and WPA2). It's quite quick and simple to add encryption to your network through your router's admin interface, but the process is different from router to router, so you'll want to consult your router's documentation for instructions on the procedures of configuration for the...
tracking img