download

Matakuliah
Tahun
Versi
: H0372/Manajemen Jaringan
: 2005
: 1/0
Pertemuan 09
Model Fungsional
1
Learning Outcomes
Pada akhir pertemuan ini, diharapkan mahasiswa
akan mampu :
• Menyediakan implementasi model Fungsional melalui
SNMP
2
Outline Materi
• Aspek Fault Management
• Aspek Configuration Management
• Aspek Performancet Management
3
Functional Model
• No formal specs of functions in
SNMPv1
• OSI model addresses
– configuration
– fault
– performance
– security
– accounting
4
Network & Systems Management
Business
Management
Service
Management
Network
Management
System
Management
Element
Management
Resource
Management
Network
Elements
System
Resources
Networked Information Systems
5
Management Applications
• OSI Model
• Configuration
• Fault
• Performance
• Security
• Accounting
• Reports
• Service Level Management
• Policy-based management
6
Configuration Management
• Network Provisioning
• Inventory Management
• Equipment
• Facilities
• Network Topology
• Database Considerations
7
Fault Management
• Fault is a failure of a network component
• Results in loss of connectivity
• Fault management involves:
• Fault detection
• Polling
• Traps: linkDown, egpNeighborLoss
• Fault location
• Detect all components failed and trace
down the tree topology to the source
• Fault isolation by network and SNMP tools
• Use artificial intelligence /
correlation techniques
• Restoration of service
• Identification of root cause of the problem
• Problem resolution
8
Performance Management
• Tools
• Performance Metrics
• Data Monitoring
• Problem Isolation
• Performance Statistics
• Tools:
• Protocol analyzers
• RMON
• MRTG
9
Performance Metrics
• Macro-level
• Throughput
• Response time
• Availability
• Reliability
• Micro-level
• Bandwidth
• Utilization
• Error rate
• Peak load
• Average load
10
Performance Statistics
• Traffic statistics
• Error statistics
• Used in
• QoS tracking
• Performance tuning
• Validation of SLA
• Trend analysis
• Facility planning
• Functional accounting
11
Security Management
• Security threats
• Policies and Procedures
• Resources to prevent security breaches
• Firewalls
• Cryptography
• Authentication and Authorization
• Client/Server authentication system
• Message transfer security
• Network protection security
12
Accounting Management
• Least developed
• Usage of resources
• Hidden cost of IT usage (libraries)
• Functional accounting
• Business application
13
Service Level Management
• SLA management of service equivalent to
QoS of network
• SLA defines
• Identification of services and characteristics
• Negotiation of SLA
• Deployment of agents to monitor and control
• Generation of reports
• SLA characteristics
• Service parameters
• Service levels
• Component parameters
• Component-to-service mappings
14