unit 4 cyber security_[2]
unit 4 cyber security_[2]
unit 4 cyber security_[2]
Metrics like how many times data is sent again, lost packets, and delays show how the
network is working. Setting limits for these helps find problems.
Data Analysis
Collecting and analyzing performance data helps network managers spot trends, fix issues,
and make changes to improve network performance.
Performance Management: End User Perspective
Response Time Expectations
Users expect network services to have steady and acceptable response times for their apps.
This is important for productivity and keeping users happy.
Reliability and Service Quality
Users depend on network services to be reliable and accessible. Network managers need to
make sure these services meet those expectations.
Performance Reporting
Giving users information about network performance, like average and worst-case response
times, helps them understand what the network can do.
2) FAULT MANAGEMENT
Fault Detection
Fault management focuses on spotting and responding to problems in the network, like
hardware or software failures.
Fault Isolation
When a problem is detected, it's essential to separate the faulty part to avoid more issues in
the network.
Fault Recovery
The network should be adjusted or changed to reduce the effects of the problem and get back
to normal operation as quickly as possible.
Fault Repair
The broken part should be fixed or replaced to return the network to its original state.
FAULT MANAGEMENT: ERRORS VS. FAULTS
Error
A single event that happens sometimes.
Can be fixed with error control methods.
Fault
A lasting problem that needs to be fixed.
Usually shown by repeated errors or system failures.
3) CONFIGURATION MANAGEMENT
Device Tracking
Configuration management means keeping track of the devices on the network, their
hardware setups, and the software installed on them.
Configuration Initialization and Shutdown
Configuration management is in charge of starting up the network and safely shutting down
parts or the entire network.
Component Management
It involves maintaining, adding, and updating the relationships among network components
and their status.
Configuration Reporting
Configuration reports can be created regularly or as needed to give details about network
resources and their setups.
4) ACCOUNTING MANAGEMENT
Usage Tracking
Accounting management tracks network resource usage by individual users, groups, or
departments.
Cost Allocation
Network usage can be used to allocate costs to different departments or projects.
Performance Optimization
Accounting data can help identify inefficient network usage and suggest improvements.
Capacity Planning
Understanding network usage patterns helps network managers plan for future growth and
capacity needs.
5) SECURITY MANAGEMENT
Security management is important for keeping information safe and controlling access on
networks. It includes different tasks, like:
1. Monitoring and Logging
2. Policy Enforcement
3. Resource Protection
4. External Defence
5. Access Control
6. Infrastructure Support
Key Management: Generating, distributing, and storing encryption keys to safeguard data
integrity and confidentiality.
Monitoring and Logging: Collecting, storing, and reviewing audit records and security logs.
This also means turning logging on or off to make sure actions can be tracked.
Policy Enforcement: Implementing security policies that define how access to network
resources is controlled, ensuring these policies are effective and communicated to end users.
Resource Protection: Ensuring that network resources and user information are safeguarded
against unauthorized access.
Infrastructure Support: Working with the Network Installation and Maintenance (I&M)
Group to support the network's physical and technical setup, which helps with
troubleshooting and maintenance.
External Defence: Using firewalls and other security tools to watch over and control access
points to the network, keeping it safe from outside threats.