SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
How Network Management
    Systems Work

The Peer-to-Peer works without a server

The Peer-to-Peer works with a name server

The Simple Network Management
 Protocol(SNMP)

The Management Information Base
The Peer-to-Peer works without a
                 server
●   A peer-to-peer, commomly
    abbreviated to P2P. Si any
    dictributed network
    architecture composed of
    participants without the
    need for central
    coordination instances .
●   A pure P2P network is only
    equal perr nodes that
    simultaneously function as
    both 'clients' and 'server' to
    the other nodes on the
    network.
The Peer-to-Peer works with a name server
                      ●   Peer-to-peer(P2P)
                          applications have seen an
                          enormous successand
                          recebtly intrduced P2P
                          services have reached tens
                          of millions of users.A
                          feature that significantly
                          contributes to the success
                          of many P2P applications is
                          user anonymity.
                      ●   Anonymity opens the door
                          to possible misuses and
                          abuses,exploiting the P2P
                          network as a way to spread
                          tampered with
                          resources,including Trojan
                          Horses.viruses,and spam.
The Simple Network Management
        Protocol(SNMP)
●   SNMP is a protocol that
    observe routers and
    computers and terminals
    and control them in the
    field of TCP/IP network.
●   When the agents reply,the
    SNMP is used. It treats
    program that aggreagtes
    information.
The Management Information Base

                ●   The MIB is information rule
                    that the networking gear
                    managed with SNMP
                    released to apprise its
                    state to external.
                ●   Manager glean agent's
                    MIBs and control network
                    and device that is observed
                     after he evaluate their
                    condition .
Refereces
●   IT glossary 'e-words'
              http://e-words.jp
●   WIKIMWDIA COMMONS
             http://common.wikimedia.org
●   NEEDLETECH
           http://www.devicelink.com
●   PORTAL
              http:// portal. acm.org/
●   Flickr
               http://www.flickr.com

Contenu connexe

Tendances

ManagedISDNandIPEncryption
ManagedISDNandIPEncryptionManagedISDNandIPEncryption
ManagedISDNandIPEncryption
Al Ewers
 
proVconnect_IntelligentSystems_DataSheet
proVconnect_IntelligentSystems_DataSheetproVconnect_IntelligentSystems_DataSheet
proVconnect_IntelligentSystems_DataSheet
Ravi Mark Venkat
 

Tendances (15)

Point of Sale (POS) Malware: Easy to Spot, Hard to Stop
Point of Sale (POS) Malware: Easy to Spot, Hard to StopPoint of Sale (POS) Malware: Easy to Spot, Hard to Stop
Point of Sale (POS) Malware: Easy to Spot, Hard to Stop
 
Clean dns enus
Clean dns enusClean dns enus
Clean dns enus
 
UTM Basic Rev 1.2 (Modified)
UTM Basic Rev 1.2 (Modified)UTM Basic Rev 1.2 (Modified)
UTM Basic Rev 1.2 (Modified)
 
Secure your network - Segmentation and segregation
Secure your network - Segmentation and segregationSecure your network - Segmentation and segregation
Secure your network - Segmentation and segregation
 
ManagedISDNandIPEncryption
ManagedISDNandIPEncryptionManagedISDNandIPEncryption
ManagedISDNandIPEncryption
 
OwnYIT CSAT + SIEM
OwnYIT CSAT + SIEMOwnYIT CSAT + SIEM
OwnYIT CSAT + SIEM
 
proVconnect_IntelligentSystems_DataSheet
proVconnect_IntelligentSystems_DataSheetproVconnect_IntelligentSystems_DataSheet
proVconnect_IntelligentSystems_DataSheet
 
Could the Attacks on the SWIFT Network Have Been Prevented?
Could the Attacks on the SWIFT Network Have Been Prevented?Could the Attacks on the SWIFT Network Have Been Prevented?
Could the Attacks on the SWIFT Network Have Been Prevented?
 
Seminar
SeminarSeminar
Seminar
 
karsof systems ips technical brochure
karsof systems ips technical brochurekarsof systems ips technical brochure
karsof systems ips technical brochure
 
Case study about voip
Case study about voipCase study about voip
Case study about voip
 
Powerful email protection
Powerful email protectionPowerful email protection
Powerful email protection
 
Global Botnet Detector
Global Botnet DetectorGlobal Botnet Detector
Global Botnet Detector
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
 
Week13pre
Week13preWeek13pre
Week13pre
 

En vedette (7)

Montar un ordenador
Montar un ordenadorMontar un ordenador
Montar un ordenador
 
Jules CesarENGONO
Jules CesarENGONOJules CesarENGONO
Jules CesarENGONO
 
ETech2008 DisasterTech Robbins Maron 20080305a
ETech2008 DisasterTech Robbins Maron 20080305aETech2008 DisasterTech Robbins Maron 20080305a
ETech2008 DisasterTech Robbins Maron 20080305a
 
Get Plugged in to Google Analytics: The New Listening Tool For Social Media ROI
Get Plugged in to Google Analytics: The New Listening Tool For Social Media ROIGet Plugged in to Google Analytics: The New Listening Tool For Social Media ROI
Get Plugged in to Google Analytics: The New Listening Tool For Social Media ROI
 
Thomas Smale Speaking at DCBKK 2016 in Bangkok, Thailand
Thomas Smale Speaking at DCBKK 2016 in Bangkok, ThailandThomas Smale Speaking at DCBKK 2016 in Bangkok, Thailand
Thomas Smale Speaking at DCBKK 2016 in Bangkok, Thailand
 
Meetup 4/10/2016 - Het IoT platform van de stad en security
Meetup 4/10/2016 - Het IoT platform van de stad en securityMeetup 4/10/2016 - Het IoT platform van de stad en security
Meetup 4/10/2016 - Het IoT platform van de stad en security
 
HP Network Management Advances Heighten Performance While Reducing Total Cost...
HP Network Management Advances Heighten Performance While Reducing Total Cost...HP Network Management Advances Heighten Performance While Reducing Total Cost...
HP Network Management Advances Heighten Performance While Reducing Total Cost...
 

Similaire à How Network Management Systems

New microsoft power point presentation (2)
New microsoft power point presentation (2)New microsoft power point presentation (2)
New microsoft power point presentation (2)
Ramla Sheikh
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
MOHD ARISH
 
Week10
Week10Week10
Week10
Hayato
 
How Network Management Systems Work
How Network Management Systems WorkHow Network Management Systems Work
How Network Management Systems Work
ez8
 
How network management systems work
How network management systems workHow network management systems work
How network management systems work
Ryo Yamato
 
Cloud network management model a novel approach to manage cloud traffic
Cloud network management model   a novel approach to manage cloud trafficCloud network management model   a novel approach to manage cloud traffic
Cloud network management model a novel approach to manage cloud traffic
ijccsa
 

Similaire à How Network Management Systems (20)

5-network-management-protocol.pptx
5-network-management-protocol.pptx5-network-management-protocol.pptx
5-network-management-protocol.pptx
 
SNMP
SNMPSNMP
SNMP
 
14 coms 525 tcpip - applications - snmp
14    coms 525 tcpip - applications - snmp14    coms 525 tcpip - applications - snmp
14 coms 525 tcpip - applications - snmp
 
New microsoft power point presentation (2)
New microsoft power point presentation (2)New microsoft power point presentation (2)
New microsoft power point presentation (2)
 
Week10
Week10Week10
Week10
 
Week10
Week10Week10
Week10
 
OpeVPN on Mikrotik
OpeVPN on MikrotikOpeVPN on Mikrotik
OpeVPN on Mikrotik
 
Unit 3 IOT.docx
Unit 3 IOT.docxUnit 3 IOT.docx
Unit 3 IOT.docx
 
Week10
Week10Week10
Week10
 
Week10
Week10Week10
Week10
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
Week10
Week10Week10
Week10
 
How Network Management Systems Work
How Network Management Systems WorkHow Network Management Systems Work
How Network Management Systems Work
 
Network Monitoring Tools
Network Monitoring ToolsNetwork Monitoring Tools
Network Monitoring Tools
 
How network management systems work
How network management systems workHow network management systems work
How network management systems work
 
SNMP
SNMPSNMP
SNMP
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
Cloud network management model a novel approach to manage cloud traffic
Cloud network management model   a novel approach to manage cloud trafficCloud network management model   a novel approach to manage cloud traffic
Cloud network management model a novel approach to manage cloud traffic
 
Secured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRRSecured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRR
 

Plus de Tomoko Nishiuchi (6)

Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week13
Week13Week13
Week13
 
Week12
Week12Week12
Week12
 
How Circuit-Switched Didital Networks Work
How Circuit-Switched Didital Networks WorkHow Circuit-Switched Didital Networks Work
How Circuit-Switched Didital Networks Work
 
Week11
Week11Week11
Week11
 

Dernier

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Dernier (20)

Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 

How Network Management Systems

  • 1. How Network Management Systems Work The Peer-to-Peer works without a server The Peer-to-Peer works with a name server The Simple Network Management Protocol(SNMP) The Management Information Base
  • 2. The Peer-to-Peer works without a server ● A peer-to-peer, commomly abbreviated to P2P. Si any dictributed network architecture composed of participants without the need for central coordination instances . ● A pure P2P network is only equal perr nodes that simultaneously function as both 'clients' and 'server' to the other nodes on the network.
  • 3. The Peer-to-Peer works with a name server ● Peer-to-peer(P2P) applications have seen an enormous successand recebtly intrduced P2P services have reached tens of millions of users.A feature that significantly contributes to the success of many P2P applications is user anonymity. ● Anonymity opens the door to possible misuses and abuses,exploiting the P2P network as a way to spread tampered with resources,including Trojan Horses.viruses,and spam.
  • 4. The Simple Network Management Protocol(SNMP) ● SNMP is a protocol that observe routers and computers and terminals and control them in the field of TCP/IP network. ● When the agents reply,the SNMP is used. It treats program that aggreagtes information.
  • 5. The Management Information Base ● The MIB is information rule that the networking gear managed with SNMP released to apprise its state to external. ● Manager glean agent's MIBs and control network and device that is observed after he evaluate their condition .
  • 6. Refereces ● IT glossary 'e-words' http://e-words.jp ● WIKIMWDIA COMMONS http://common.wikimedia.org ● NEEDLETECH http://www.devicelink.com ● PORTAL http:// portal. acm.org/ ● Flickr http://www.flickr.com