Matakuliah Tahun Versi : H0372/Manajemen Jaringan : 2005 : 1/0 Pertemuan 09 Model Fungsional 1 Learning Outcomes Pada akhir pertemuan ini, diharapkan mahasiswa akan mampu : • Menyediakan implementasi model Fungsional melalui SNMP 2 Outline Materi • Aspek Fault Management • Aspek Configuration Management • Aspek Performancet Management 3 Functional Model • No formal specs of functions in SNMPv1 • OSI model addresses – configuration – fault – performance – security – accounting 4 Network & Systems Management Business Management Service Management Network Management System Management Element Management Resource Management Network Elements System Resources Networked Information Systems 5 Management Applications • OSI Model • Configuration • Fault • Performance • Security • Accounting • Reports • Service Level Management • Policy-based management 6 Configuration Management • Network Provisioning • Inventory Management • Equipment • Facilities • Network Topology • Database Considerations 7 Fault Management • Fault is a failure of a network component • Results in loss of connectivity • Fault management involves: • Fault detection • Polling • Traps: linkDown, egpNeighborLoss • Fault location • Detect all components failed and trace down the tree topology to the source • Fault isolation by network and SNMP tools • Use artificial intelligence / correlation techniques • Restoration of service • Identification of root cause of the problem • Problem resolution 8 Performance Management • Tools • Performance Metrics • Data Monitoring • Problem Isolation • Performance Statistics • Tools: • Protocol analyzers • RMON • MRTG 9 Performance Metrics • Macro-level • Throughput • Response time • Availability • Reliability • Micro-level • Bandwidth • Utilization • Error rate • Peak load • Average load 10 Performance Statistics • Traffic statistics • Error statistics • Used in • QoS tracking • Performance tuning • Validation of SLA • Trend analysis • Facility planning • Functional accounting 11 Security Management • Security threats • Policies and Procedures • Resources to prevent security breaches • Firewalls • Cryptography • Authentication and Authorization • Client/Server authentication system • Message transfer security • Network protection security 12 Accounting Management • Least developed • Usage of resources • Hidden cost of IT usage (libraries) • Functional accounting • Business application 13 Service Level Management • SLA management of service equivalent to QoS of network • SLA defines • Identification of services and characteristics • Negotiation of SLA • Deployment of agents to monitor and control • Generation of reports • SLA characteristics • Service parameters • Service levels • Component parameters • Component-to-service mappings 14
© Copyright 2026 Paperzz