Preview

Week 6 Assignment

Good Essays
Open Document
Open Document
596 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week 6 Assignment
Homework Assignment

NETW 420

February 15, 2014

Professor Viviane Ruiz

SNMP stands for Simple Network Management Protocol. SNMP is one example of a management protocol. This is an application layer protocol that helps in administrating and supervising network assets across the web. The SNMP has three key components. They are the managed devices, the agents and the network management system. Show below is the relationship between the managed devices, agents, and NMSs components (Simple Network Management Protocol, 2012).

Managed devices are network nodes that contain the SNMP agent and are connected to the network that is managed. They will gather and store information then they make the information available to the Network Management System by using SNMP. These devices are routers, servers, switches, computers, printers and many other devices. The agent is a network management software module that is installed on a managed device. The agent is knowledgeable of the management information and can make it compatible to the SNMP. The Network Management System implements the applications that will conduct the monitoring and controlling of the managed devices. There is usually more than one NMS on a managed network (Simple Network Management Protocol, 2012).
SNMP uses four basic commands while it monitors and controls a managed device. These four commands are read, write, trap, and the traversal operations. The Network Management System uses the read command to monitor the managed devices. It will study the different variables that are retained by the managed device. It uses the write command to control the device. The NMS can change the values of the variable by using this write command. Alternatively the managed device will send a trap message to the NMS to report certain events that happen on or to the managed device. The Network Management System will use the traversal operations to figure out which variables the managed



References: Clemm, A. (2007). Network Management Fundamentals. Boston, MA: Cisco Press. Simple Network Management Protocol. (2012, Oct 16). Cisco: http://docwiki.cisco.com/wiki/Simple_Network_Management_Protocol SNMP Command Examples. (2010). Oracle: http://docs.oracle.com/cd/E19201-01/820-6413-13/SNMP_commands_reference_appendix.html What Is SNMP? (2003, 03 28). Microsoft: http://technet.microsoft.com/en-us/library/cc776379(v=ws.10).aspx

You May Also Find These Documents Helpful

  • Powerful Essays

    A Network Management system, or NMS is a collection of software to be used as tools to monitor a network of computers. This software performs multiples tasked specifically designed to help keep a network managed properly and running smoothly. There are many components that can make up a Network management system. With all the options out there a network administrator is able to customize what features to utilize depending on their specific needs. This allows for real-time monitoring as well as report generated analyses. However, there are a few cornerstone components that should be explored. The Manager, Agent, MIB, Probe, SNMP, and RMON are probably the most valued components.…

    • 771 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Netw420 Week 4 lab report

    • 726 Words
    • 3 Pages

    This week’s assignment is to describe various event categories and event based transactions that are used by the Network Management System. It would be impossible to categorize all potential causes for alarms in all existing network systems however, understanding some common alerts and categories is essential for any network manager.…

    • 726 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Netw360 Week 7 Lab

    • 872 Words
    • 4 Pages

    We were able to successfully ping 10.27.8.80 to verify we had access to the “managed” device. The batch file was set up with the 10.27.8.80 address and had commands to get information from that address. The name of the device was NPIF9460B and the status of it was “ready to print”. After we downloaded the MIB Browser and entered 10.27.8.80 into the address field, we were able to get the sysUpTime which was 830 hours 13 min and 2 sec.…

    • 872 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 2 Assignment

    • 320 Words
    • 2 Pages

    Before agreeing to the contract I would like to outline some risks that goes with this current project. I will address the concerns by showing you the qualitative and the quantitative risks…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISSC 340

    • 275 Words
    • 2 Pages

    The functions and characteristics of a network operating system or (NOS) for short are explained by the following;…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 2 Assignment

    • 392 Words
    • 2 Pages

    What is a CAFR? What are its main components? The CAFR is known as a comprehensive annual financial report. It consist of more than the basic statements and exceed 200 pages for large cities. Its components are the introductory section, financial section and the statistical section.…

    • 392 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week 3 assignment

    • 850 Words
    • 3 Pages

    From the perspective of six pillars of character, if I were Cindie, I would be honest with Lyndell and tell him what’s been bothering me. Hopefully, by keeping quiet about him leaving early, he will feel that I’m trustworthy enough to tell me his problems, whether it’s drinking or any other problems he is facing in his life. I might be able to help him or at least come up with some ideas to help him. I will also respect him more if he can open up to me and is willing to fix his problems. If he continues to leave early, I would have no choice but to report this situation to the store manager because I would feel responsible if something bad happens to the store while I was on duty alone. Apparently, Lyndell is not a responsible person because he leaves work early and makes Cindie do part of his job. Cindie is responsible because even though it got really busy when 10 Japanese customers came in at the same time one night, she rushed through and was able to satisfy the customers’ needs. It is not fair to Cindie that she has to close up by herself and often work the late shift just because she is the “new kid on the block” (Mintz & Morris, 2011). Everybody should be treated equally (Mintz & Morris, 2011).…

    • 850 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week 1 Assignment

    • 1130 Words
    • 5 Pages

    Please answer the following questions, you can upload your answers in a MS Word file, or Word file. Answer all the questions, and upload the answers back before Sunday March 31, 2013 (before 11: 55 pm):…

    • 1130 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Week 4 Assignment

    • 815 Words
    • 3 Pages

    The scenario I am proposing to test the BCP for the company is a hacker scenario. A hacker attempts to break into the network and access delicate information that shouldn’t be accessible by anyone outside of the company. The combination of business and IT transformation, compliance and governance demands and the onslaught of security threats continues to make the job of safeguarding data assets a serious challenge for organizations of all types—from multinational corporations to independent merchants to government entities. The purpose of this test would be to see how quickly the attack is detected and stopped in addition to tracking to discover the identity of the hacker.…

    • 815 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Week 3 Assignment

    • 349 Words
    • 2 Pages

    The 2 articles I had chosen are on Blackfish and Sea World. The first title is called SeaWorld Questions Ethics of ‘Blackfish’ Investigator. I always thought that there was no doubt in my mind that Sea World was a good place that was until the movie Blackfish came out. This first article is about questioning the ethics that the investigator used to gain his insight on the killer whales that he used for the movie. I feel like this is not a good creditable source because there are many bias issues at hand which tends to lean towards one side which in this article is Sea world. How I can to this decision is the facts at hand which Sea world is only showing their side at hand. To think one sided is very bias because they want the reader to think they are right. The article reveled to me that Sea World has something to hide when they can’t explain why they think that all the investigators information is wrong. With no substantial evidence and/ or qualified personnel.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    10. Paul Korzeniowski. (2001). Using a framework to ease network management. In Copyright 2013 QuinStreet Inc. All Rights Reserved. Retrieved from http://www.enterprisenetworkingplanet.com/netsysm/article.php/777161/Using-A-Framework-To-Ease-Network-Management.htm…

    • 1486 Words
    • 6 Pages
    Best Essays
  • Better Essays

    The arp command is an acronym that stands for address resolution protocol. This command allows technicians to easily find the IP address and physical address of the computer that they are currently on. This command is also a good tool to see which computers are online in a network because if there is more than one network interface that uses arp it will display the machines on it as well by typing “arp a-“Additionally the command prompt text gives some variants of the arp command where you can choose what available information can be viewed. This command is flexible and can be typed in a few different ways to obtain different results. If you wanted just the physical address of the computer you would type “arp eth_addr”. Another useful functionality of this command is that if you type “arp if_addr” you can select an internet address to be modified.…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Snmp - Report

    • 4425 Words
    • 18 Pages

    SNMP is an internet-standard system of digital message format, or protocol, for managing devices on Internet Protocol (IP) networks. Routers, switches, servers, workstations, printers, modems are examples of such devices that support SNMP. It was introduced in 1988 to meet the growing need for managing Internet Protocol (IP) devices [2] and is used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention. SNMP includes an application layer protocol, a database schema, and a set of data objects [1].…

    • 4425 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    How Vsat Network Works

    • 1148 Words
    • 5 Pages

    Content originates at the hub, which features a very large -15 to 36-foot (4,5 -11m)- antenna. The hub controls the network through a network management system (NMS) server, which allows a network operator to monitor and control all components of the network. The NMS operator can view, modify and download individual configuration information to the individual VSATs.…

    • 1148 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Fundamentals of Computer Networking Network protocols and standards Network media Ethernet FOIS Network devices and components Network Addressing RAILNET Data communication on Telephone networks Network Management & Troubleshooting…

    • 14124 Words
    • 57 Pages
    Powerful Essays