Home > Preview
The flashcards below were created by user
on FreezingBlue Flashcards.
Management Interoperability Subdimensions
- The communication viewpoint
- The function viewpoint
- The information viewpoint
Two persons want to successfully conduct a business interaction
must hear each other and must speak the same language
know what services they can provide
clear about what you are talking about
Communications Rules Need to be Established
How is the agent supposed to react if two messages that seemingly contain the same request are received?
- Introduces common terminology between manager
- and agent
The role of standards is to establish common rules that everyone adheres to.
Management Interoperability Standards
The rules for management message exchange, and the way in which management messages encode information
Management Life Cycle
- -Current and forecasted needs
- –Install, configure, and turn up
- –Monitoring, tuning, statistics
- –Orderly plan to replace or
- eliminate equipment
Telecommunications Management Network
- a set of standards by the International Telecommunications Union (ITU-T)
- related to the principles for how networks used to manage
- telecommunication networks are to be constructed and which standards they should adhere to.
Managing individual devices and keeping them running
Managing relationships and dependencies between elements (devices)
Managing the services provided by the network
Billing, help-desk, business forecasting, etc.
The management agent
Fault, Configuration, Accounting, Performance, Security
Common tasks should follow a predefined template
a branch of mathematics used to protect information.
the mathematical function used to scramble
the message so it can be unscrambled
by the intended recipient, but not by anyone else
the message you wish to send/encrypt
the message after its encrypted
- similar to a password, used to access your data
- Measured in bits
Breaking the code
Brute force (key search) attack
Private Key Cryptography
- Sender and receiver must share a key, which
- must be kept private
Diffie-Hellman Public Key System
- Used frequently in Cisco routers
- Each participant starts with his or her own secret key
- Public key system used by PGP and others
- Key servers server public keys for people over the Internet.
- Plaintext is encrypted with session key
- Session key is a 1-time use symmetrical key randomly generated
The receiver uses
SECRET key to decrypt
The sender uses
PUBLIC key to encrypt the message/text
A message digest function produces a number (with PGP, a 128-bit number) with the message
- Your keys are kept on keyrings
- Your secret key is stored encrypted using IDEA encryption
What would you like to do?
Home > Flashcards > Print Preview