Preview

Snmp - Report

Powerful Essays
Open Document
Open Document
4425 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Snmp - Report
Simple Network Management Protocol (SNMP) REPORT

Copyright © WebSatMedia Pte Ltd 2012. All rights reserved

Aaron Tan
14/03/2013

WEBSATMEDIA PTE LTD
Block 750C Chai Chee Road
#04-05 Technopark
Singapore 469003
Tel: 65-67733220
Fax: 65-67733200 Tan, Aaron http://www.websatmedia.com Summary The objectives of this report are to provide the reader with a clearer understanding of network management, the concepts inherent in the Simple Network Management Protocol (SNMP), comparisons of SNMP with other network management protocols, how SNMPs are used in network management, and, finally, to provide the results of experiments carried out using several different modem configurations. SNMP is an internet-standard system of digital message format, or protocol, for managing devices on Internet Protocol (IP) networks. Routers, switches, servers, workstations, printers, modems are examples of such devices that support SNMP. It was introduced in 1988 to meet the growing need for managing Internet Protocol (IP) devices [2] and is used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention. SNMP includes an application layer protocol, a database schema, and a set of data objects [1]. Network management is a general concept that employs the use of various tools and techniques, and systems to aid human beings in managing various devices, system, or networks. One such model of network management is called FCAPS, or Fault Management, Configuration Management, Accounting Management, Performance Management, and Security Management. Under the SNMP system and the FCAPS model, one or more administrative computers, called managers, are tasked to monitor and/or manage one or more pieces of software, called agents, which run on the network device. Specifically, the manager is a



References: 1. Wikipedia: Simple Network Management Protocol (SNMP) Accessed on 21st February, 2013

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Constant stream of multimedia traffic between offices – average file size 25MB; file transfers less than 5 seconds…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISSC340 Week1Assignment

    • 286 Words
    • 1 Page

    A network operating system is a piece of software that is utilized to manage the network resources available to the clients on your network. As a central point of management you have the ability to create and manage user accounts, security templates(group policy), allow users and systems access to file servers and printers, and control any information that is requested from outside your network. Proper utilization and configuration of your network operating system is essential for the security of your network. From the server you can place rules on each of your clients to limit the resources they have access to, while determining how much freedom they will enjoy on their systems.…

    • 286 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    A Network Management system, or NMS is a collection of software to be used as tools to monitor a network of computers. This software performs multiples tasked specifically designed to help keep a network managed properly and running smoothly. There are many components that can make up a Network management system. With all the options out there a network administrator is able to customize what features to utilize depending on their specific needs. This allows for real-time monitoring as well as report generated analyses. However, there are a few cornerstone components that should be explored. The Manager, Agent, MIB, Probe, SNMP, and RMON are probably the most valued components.…

    • 771 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Netw420 Week 4 lab report

    • 726 Words
    • 3 Pages

    Many Network Management Systems have a log and event manager that collects data and logs event data from all of the devices on the network and performs real-time correlation. When an event is initiated an agent initiates an interaction by creating an object describing an event. Event messages from the various distributed components are processed based on a predefined policy. Most event alerts can be categorized as an informational alert, a warning alert or a critical alert.…

    • 726 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    The core of a coaxial cable carries the electronic signals that make up the data. This wire core can be either solid or stranded. If the core is solid, it is usually copper.…

    • 4489 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    MANAGEMENT: Devices dedicated to the management and control of other network resources should be placed in the MANAGEMENT security zone. These devices typically connect to dedicated management ports on other network resources. These connections to allow managers to remotely access a device, modify its configurations or perform administrative tasks on the resource. Additionally, network resources may be configured to send log files, periodic status messages or notifications to an administrator or management device across these…

    • 598 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 5 Lab 1 Answers

    • 4778 Words
    • 20 Pages

    Internetworking Basics Internetworking Models The OSI Reference Model Summary Exam Essentials Written Labs Review Questions Answers to Review Questions Answers to Written Lab 1.1 Answers to Written Lab 1.2 Answers to Written Lab 1.3…

    • 4778 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    ISSC 340

    • 275 Words
    • 2 Pages

    The functions and characteristics of a network operating system or (NOS) for short are explained by the following;…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 4503 Words
    • 19 Pages

    The networking features in Windows Vista have been designed to support high levels of manageability to help reduce the cost of deploying wireless networks and network security policies, as well as to provide quality of service for applications and users. Windows Vista uses Group Policy or command-line scripting via the Network Shell (NETSH) extensively to manage network features, so user don't need to learn or deploy a new management tool, and user can take advantage of existing investment in Active Directory and the Organizational Unit (OU) structure that have already…

    • 4503 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    6. What is the displayed in the inventory > network map tab of the SpiceWorks interface?…

    • 203 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 2250 Words
    • 13 Pages

    User name: Eidson Jr, Jerry Eidson Jr, Jerry Book: Introduction to Networking Lab Manual Page: 5. No part of any book may be reproduced or transmitted by any means without the…

    • 2250 Words
    • 13 Pages
    Satisfactory Essays
  • Good Essays

    Computers use network protocols to communicate with computer network there are many network protocols as Hallberg (2005, p92) said “for example, transmission control protocols/internet protocols (TCP/IP) defines a set of rules used to send data from one node on a network to another node”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Apply network management and security techniques using the FCAPS process. IS3120 Network Communications Infrastructure © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Fault management—SNMP alarms  Configuration management—change control board and procedures  Administration management—asset and inventory management  Performance management—WAN bandwidth and capacity planning  Security management—network infrastructure C-I-A IS3120…

    • 599 Words
    • 9 Pages
    Satisfactory Essays
  • Satisfactory Essays

    software vendor. However, patches are intended to be only temporary solutions until problems can be permanently repaired.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In the cisco environment the network management architectures almost always have the same basics, when it comes to its computer systems network tools and devices or software to help with maintenance, prevention and the recognizing of problems. Problems that can become bigger issues if network management is not in placed, as entities are programmed to take actions.…

    • 553 Words
    • 3 Pages
    Good Essays