Systems from dif vendors,dif os's,dif comm protocols
A network of components from the same vendor or compatible equip that all run under the same os or nos is what?
What type of network (homo/hetro) is more common
What is a comm network that serves users within a confined geo area?
How many users does a peer to peer network normally service?
How many users does a single server network normally service?
How many users does a multi server network normally service?
How many users does a multi-server high speed backbone network normally service?
How many users does a enterprise network normally service?
What is used for addressing on a physically connected network to identify network nodes?
Numbering system comps use for data
With IP addressing, how many bits are used and how are they broken down?
32bit/4 sets of 8 bits
What is used to designate a part of an ip addy as the net addy, and other parts as the host addy?
network field, host field
Why subnet in ipv4?
improve efficiency in using a limited number of available addy spaces
What is the air force instructions series that covers NM?
What does AFPD 33-1, info resources mgmt establist policy on?
Acquiring, planning, and managing its info resources
What actions does AFI 33-1, Base-level planning and implementation outline?
Standardized mgmt practices and tells how to manage planning and implementation of communications and info systems and the base level infrastructure
What are the 3 areas of distributed responsibility does DICC consist of?
Global, regional, and local levels.
What is NM?
mechanisms for monitoring, control, and coordination of resources within the open systems interconnection enviroment, and osi protocol standards for communicating info pertinent to those resources
What is a NM server?
A bundle of application software designed to significantly improve network efficiency and productivity. The network mgmt server is a network server that runs snmp based mgmt applications
Where should the NM server be located?
Area strictly controlled by the NCC
Briefly describe the three most common NM architectures
centralized(has NM platform on one system at a location thats responsible for all NM duties) Hierarchical(uses multiple systems, with one acting as a central server and others working as clients) Distributed(combines the two, multiple peer platforms)
what are the 4 levels of activity that one must know before applying mgmt to specific services or devices
Inactive, reactive, interactive, proactive
This is the case when no monitoring is accomplished
This is where network support personnel react to a problem after it has occurred yet no monitoring has been applied
This is where you are monitoring components but must interactively trblsht to eliminate side-effect alarms and isolate problems to a root cause
This is where automated monitoring components provide interactive problem analysis, giving a root cause alarm for the problem at-hand, and automatic restorative processes are in place whenever possible to minimize downtime
What is configuration mgmt?
Process of obtaining data from the network and using that data to manage the setup of all managed network devices
2 features of an NMS that alleviate manually configuring a network's devices
auto discovery and auto mapping
What does performance mgmt consist of?
the facilities needed to evaluate the behavior of network objects and the effectiveness of communications activities
List the steps you must take to provide accurate performance mgmt
gather statistical info (tread analysis, maintain and examine logs of system state (history), Determine system performance under natural and artificial conditions, alter system modes of operation for the purpose of conducting performance mgmt
What are the 2 functional categories of performance mgmt? Describe each.
Monitoring-tracks historical data by tracking activities on the net, Tuning-Deals strictly with the adjustment of the parameters on the network devices to improve operation
What is security mgmt?
encompasses protecting sensitive info on devices attached to a data network by controlling access points to that information
2 subsections of security management
network security and nms security
what is fault management?
process of identifying, locating, and correcting network problems (faults)
Fault vs. Error
Faults are abnormal conditions that require NCC personnel to take action to correct or repair. errors sometimes arise on a normal functioning network and do not necessarily require attention.
What are some drawbacks to ICMP piinging as a NM tool?
Unreliable delivery of packets, need for polling, limited info derived from responses.
What is MIB?
A hierarchical, strctured format that defines the NM information available for the network devices.
What are the 2 parts of the labeled node?
An object identifier (OID), short text description
What are the two types of nodes that make up the MIB tree?
Labeled nodes may have subordinate labeled nodes and/or leaf nodes, leaf nodes will never have subordinate. Labeled-word notation(understand what label is pointed to), Leaf-deciman notation(how the NMS tracks info)
What are some examples of what a nose in SNMP can rep?
any device (client, user, pc, server, printer) attached to a data network
Briefly describe the two categories of SNMP
Manager- A computer used to run one or more NMS applications, Agent-responsible for monitoring, collecting, and reporting mgmt data to the mgmt system.
What does the GET operation do?
retrieves the value of one specific instance of management information
what does the set operation do?
modifies the value of one or more instances of management information. Can create new instances and delete existing instances of management information
What is a trap?
Trap is the 4th operation message. unsolicited message from an agent to the manager, does not have a corresponding request message
What are community names?
each snmp community is a group containing one agent and one mgmt system. The logical name assigned to such a group we call the community name
Describe each of the two types of community names
Read-community that is read only, Write-community that allows the manager to remotely change configuration information from the mgmt station or server.
What do the two hierarchies provided by the CIM describe?
Physical hierarchies describe real world components, logical hierarchies are visible through network protocols
What are the three methods for creating a representation of a network topology within the domain managers repository?
Auto-discovery, manual discovery, topology import
What are the 3 main components of SMARTS?
Domain manager, broker, clients
List the 5 different map types that can be accessed through the map console
physical connectivity, ip network connectivity, ip network membership, vlan connectivity, vlan membership
What is the primary console in smarts and what does it display?
Monitoring console; it is used to display the reqults of the domain managers correlation alarms
Briefly describe the differences between the two types of polling used by smarts to gather information
fault and performance data is collected using SNMP while device connectivity is monitored using CMP
What two factors determine if a SMARTS map is opened with r/w or r/o access?
only one user can have a specific map opened with r/w access at any one time. You can use file system (FAT or NTFS) to purposely allow specific users to r/w or r/o access to a map by setting permission to the files
What are the 3 types of notifications used in smarts
problem, compound event, symptomatic event
List eight of the objects that can be tracked through the windows perf monitor