SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
How Network Management
Systems Work

 1; About Network Management system.

 2;The Management Information Base (MIB)

 3; The devices on network

 4;Simple Network Management Protocol
About Network Management system

First, Network Management System is system of manages
administrative information of composition on network, performance,
trouble, account, and security, etc.

As the movement of the system, the managerial system (manager)
inquires administrative information of all management object (agent)
at constant frequency, and the agent reports on the administrative
information that he collected to the manager. The manager displays
administrative information of all agents' individual states of
operation in the display etc. , and informs the manager of
information from the agent who has the trouble by the alarm
function etc. based on the collected administrative information.
The Management Information Base (MIB)

Management Information Base is a kind of the data base to
manage the device in the communication network.

MIB is composed of the aggregation of the objects in a virtual
database used to manage entities (such as routers and switches)
in a network
The devices on network

The devices which is object of management on network are managed
by SNMP.

The target devices for management are sever, bridge, router, switch
etc.

In order to manage, the devices transmit MIB data.

And each device can have a specific MIB data.

In addition, auxiliary devices such as a UPS or printer also can be
managed by SNMP.
Simple Network Management Protocol


The SNMP is a protocol for monitor / to control network
machinery on the IP network.

It is a protocol important to understand the state of the
equipment on the network.

It is used in network management system.
Reference



Wikipedia   http://ja.wikipedia.org/wiki/

Weitere Àhnliche Inhalte

Ähnlich wie Ga10

Protocol snmp
Protocol snmpProtocol snmp
Protocol snmpNzava Luwawa
 
How Network Management Systems Work
How Network Management Systems WorkHow Network Management Systems Work
How Network Management Systems Works1170087
 
Week10
Week10Week10
Week10s1160141
 
How Network Management Systems Work
How Network Management Systems WorkHow Network Management Systems Work
How Network Management Systems Workez8
 
Week10
Week10Week10
Week10dobashi
 
Week10
Week10Week10
Week10s1160123
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comProf Ansari
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management ProtocolAnupomShill
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Abdullaziz Tagawy
 
How network management systems work
How network management systems workHow network management systems work
How network management systems workRyo Yamato
 
SNMP (MV ASHOK)
SNMP (MV ASHOK)SNMP (MV ASHOK)
SNMP (MV ASHOK)Suresh Jenula
 
Widyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementWidyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementDjadja Sardjana
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptxtahaazad2
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Alexander Decker
 
Introduction tosnmp
Introduction tosnmpIntroduction tosnmp
Introduction tosnmpjorlugon
 
web pre-10.pdf
web pre-10.pdfweb pre-10.pdf
web pre-10.pdfs1160122
 

Ähnlich wie Ga10 (20)

Protocol snmp
Protocol snmpProtocol snmp
Protocol snmp
 
How Network Management Systems Work
How Network Management Systems WorkHow Network Management Systems Work
How Network Management Systems Work
 
Week10
Week10Week10
Week10
 
How Network Management Systems Work
How Network Management Systems WorkHow Network Management Systems Work
How Network Management Systems Work
 
Week10
Week10Week10
Week10
 
Week10
Week10Week10
Week10
 
13class0403.ppt
13class0403.ppt13class0403.ppt
13class0403.ppt
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
wk10
wk10wk10
wk10
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
 
How network management systems work
How network management systems workHow network management systems work
How network management systems work
 
SNMP (MV ASHOK)
SNMP (MV ASHOK)SNMP (MV ASHOK)
SNMP (MV ASHOK)
 
Snmp
SnmpSnmp
Snmp
 
Widyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementWidyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-management
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptx
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
 
Introduction tosnmp
Introduction tosnmpIntroduction tosnmp
Introduction tosnmp
 
Week10
Week10Week10
Week10
 
web pre-10.pdf
web pre-10.pdfweb pre-10.pdf
web pre-10.pdf
 

Mehr von s1170143

S1170143 2
S1170143 2S1170143 2
S1170143 2s1170143
 
s1170143txt
s1170143txts1170143txt
s1170143txts1170143
 
Sw3 week12
Sw3 week12Sw3 week12
Sw3 week12s1170143
 
Final portfolio
Final portfolioFinal portfolio
Final portfolios1170143
 
Peer5
Peer5Peer5
Peer5s1170143
 
Peer4
Peer4Peer4
Peer4s1170143
 
Design4
Design4Design4
Design4s1170143
 
Design3
Design3Design3
Design3s1170143
 
Design1
Design1Design1
Design1s1170143
 
Section5
Section5Section5
Section5s1170143
 
Section4
Section4Section4
Section4s1170143
 
Section3
Section3Section3
Section3s1170143
 
Section2
Section2Section2
Section2s1170143
 
Peer1
Peer1Peer1
Peer1s1170143
 
Sw week8
Sw week8Sw week8
Sw week8s1170143
 

Mehr von s1170143 (20)

S1170143 2
S1170143 2S1170143 2
S1170143 2
 
s1170143txt
s1170143txts1170143txt
s1170143txt
 
Sw3 week12
Sw3 week12Sw3 week12
Sw3 week12
 
Final portfolio
Final portfolioFinal portfolio
Final portfolio
 
A
AA
A
 
Peer5
Peer5Peer5
Peer5
 
Peer4
Peer4Peer4
Peer4
 
Design4
Design4Design4
Design4
 
Design3
Design3Design3
Design3
 
Design1
Design1Design1
Design1
 
Section5
Section5Section5
Section5
 
Section4
Section4Section4
Section4
 
Section3
Section3Section3
Section3
 
Section2
Section2Section2
Section2
 
Peer1
Peer1Peer1
Peer1
 
Sw
SwSw
Sw
 
Pre
PrePre
Pre
 
Sw3
Sw3Sw3
Sw3
 
Pre
PrePre
Pre
 
Sw week8
Sw week8Sw week8
Sw week8
 

KĂŒrzlich hochgeladen

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂșjo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

KĂŒrzlich hochgeladen (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Ga10

  • 1. How Network Management Systems Work 1; About Network Management system. 2;The Management Information Base (MIB) 3; The devices on network 4;Simple Network Management Protocol
  • 2. About Network Management system First, Network Management System is system of manages administrative information of composition on network, performance, trouble, account, and security, etc. As the movement of the system, the managerial system (manager) inquires administrative information of all management object (agent) at constant frequency, and the agent reports on the administrative information that he collected to the manager. The manager displays administrative information of all agents' individual states of operation in the display etc. , and informs the manager of information from the agent who has the trouble by the alarm function etc. based on the collected administrative information.
  • 3. The Management Information Base (MIB) Management Information Base is a kind of the data base to manage the device in the communication network. MIB is composed of the aggregation of the objects in a virtual database used to manage entities (such as routers and switches) in a network
  • 4. The devices on network The devices which is object of management on network are managed by SNMP. The target devices for management are sever, bridge, router, switch etc. In order to manage, the devices transmit MIB data. And each device can have a specific MIB data. In addition, auxiliary devices such as a UPS or printer also can be managed by SNMP.
  • 5. Simple Network Management Protocol The SNMP is a protocol for monitor / to control network machinery on the IP network. It is a protocol important to understand the state of the equipment on the network. It is used in network management system.
  • 6. Reference Wikipedia http://ja.wikipedia.org/wiki/