Wednesday, December 17, 2008

Network Management

Network management is the top-level administration and maintenance of large networks, often in areas such as computers or telecommunications, but not including user terminal equipment. In network management, functions such as security, monitoring, control, allocation, deployment, coordination and planning are executed. Network management is governed by a large number of protocols that exist for its support, including SNMP, CMIP, WBEM, Common Information Model, Java Management Extensions, Transaction Language 1, and Netconf.
Routing, which refers to the process of selecting the paths in a computer network on which to send data, is an important area of network management. In this area of network management, logically addressed packets are passed from their source to their destination through nodes, which are called routers, in a process called forwarding. This is usually based on routing tables that maintain a record of the most efficient routes. Security management is also a key component of network management. Security management protects a network from unauthorized access and includes many sub-functions, such as the authorization of subscriber access, control of the distribution of cryptographic keying material, and the distribution and reporting of security related events.

Configuration management relates to both the security and quality areas of network management. It refers to the management of security features in a network by controlling changes made to the software, hardware, firmware, documentation, and test features in a system. This area of network management keeps the system under control as it evolves and grows, maintaining quality and security. Software configuration management can be divided into two main areas. The first is concerned with storage of entities from a software development project and is sometimes called component repository management. The second area involves production and change to these entities and is often referred to as engineering support.
Successful network management also uses accounting management. Accounting management controls and reports on the financial status of the network. This is done though analysis, planning, control of financial data reporting programs, and reporting for managerial decisions. This area of network management involves bank account maintenance, financial statement development, and analysis of cash flow and financial health.

The networks are computer networks, both public and private, that are used every day to conduct transactions and communications among businesses, government agencies and individuals. The networks are comprised of nodes, which are client terminals individual user PCs and one or more servers and/or "host" computers. They are linked by communication systems, some of which might be private, such as within a company and others which might be open to public access. The obvious example of a network system that is open to public access is the Internet, but many private networks also utilize publicly accessible communications. Today, most companies' host computers can be accessed by their employees whether in their offices over a private communications network, or from their homes or hotel rooms while on the road through normal telephone lines.

Network security involves all activities that organizations, enterprises, and institutions undertake to protect the value and ongoing usability of assets and the integrity and continuity of operations. An effective network security strategy requires identifying threats and then choosing the most effective set of tools to combat them. Threats to network security include Viruses Computer programs written by devious programmers and designed to replicate themselves and infect computers when triggered by a specific event.

Trojan horse programs Delivery vehicles for destructive code, which appear to be harmless or useful software programs such as games. Vandals: Software applications or applets that cause destruction. Attacks: Including reconnaissance attacks (information-gathering activities to collect data that is later used to compromise networks access attacks which exploit network vulnerabilities in order to gain entry to e-mail, databases, or the corporate network; and denial-of-service attacks which prevent access to part or all of a computer system. Data interception: Involves eavesdropping on communications or altering data packets being transmitted. Social engineering: Obtaining confidential network security information through nontechnical means, such as posing as a technical support person.

Network security tools include: Antivirus software packages These packages counter most virus threats if regularly updated and correctly maintained. Secure network infrastructure: Switches and routers have hardware and software features that support secure connectivity, perimeter security, intrusion protection, identity services, and security management. Dedicated network security hardware and software-Tools such as firewalls and intrusion detection systems provide protection for all areas of the network and enable secure connections.

No comments:

Post a Comment