Ningbo Yuhui Communication Equipment Co., Ltd. |
|
According to iso definition, network management has five functions:
fault management, configuration management, performance management,
security management and billing management. Different functions of
network management software products can be subdivided into five
categories, namely, network fault management software, network
configuration management software, network performance management
software, network service / security management software, network
billing management software.
Let's briefly introduce the familiar network fault management,
network configuration management, network performance management,
network billing management and network security management five
aspects of network management functions:
Iso defines the five major functions of network management in the
iso / iec 7498 - 4 document and is widely accepted. These five
functions are:
( 1 ) fault management
Fault management is one of the most basic functions in network
management. Users want a reliable computer network. When a
component of a network fails, the network manager must quickly find
the failure and troubleshoot it in a timely manner. It is generally
not possible to isolate a fault quickly because the causes of
network failures are often quite complex, especially when the
failure is caused by a combination of multiple networks. In this
case, the network is typically repaired before the cause of the
network failure is analyzed. It is important to analyze the cause
of the failure to prevent the recurrence of similar failures.
Network fault management includes fault detection, isolation and
correction, and should include the following typical functions:
administration of networks
( 1 ) fault monitoring: actively detecting or passively receiving
various event information on the network, identifying the contents
related to network and system faults, keeping track of key parts
thereof, and generating network fault event records.
( 1 ) fault alarm: receiving the alarm information from the fault
monitoring module, driving different alarm programs according to
the alarm strategy, and sending out a network serious fault alarm
by an alarm window / ring ( notifying a first-line network manager
) or an e-mail ( notifying a decision-making manager ).
( 2 ) fault information management: based on the analysis of event
records, define network faults and generate fault cards, record the
troubleshooting steps and attendant logs related to faults,
construct fault-shooting action records, and logically correlate
the events - faults - logs into a whole, so as to reflect all
aspects of the whole process of fault generation, change and
elimination.
( 3 ) debugging support tools: providing a series of real-time
detection tools to managers, testing the condition of the managed
equipment and recording the test results for analysis and debugging
by technicians; According to the existing debugging experience and
the description of the fault status of the administrator to give
tips for troubleshooting action.
( 4 ) retrieval / analysis of fault information: read and query all
database records in the fault management system by keyword
retrieval, collect fault record data on a regular basis, and based
on this, give the reliability parameters of the managed network
system and the managed line equipment.
The detection of network faults is based on the monitoring of the
status of network components. Minor simple failures are usually
recorded in the error log and are not handled specifically; And
some serious failures need to inform the network manager, the
so-called " alarm". General network manager should be based on
relevant information to deal with the alarm, troubleshooting. When
the failure is complex, the network manager should be able to
perform diagnostic tests to identify the cause of the failure.
2 billing management ( accounting management )
Billing management records the use of network resources to control
and monitor the costs and costs of network operations. It is
particularly important for some public business networks. It can
estimate the costs and costs that users may need to use network
resources and the resources that have already been used. The
network administrator can also specify the maximum fees that users
can use, thereby controlling the excessive use and use of network
resources by users. This also improves the efficiency of the
network on the other hand. In addition, when a user needs to use
resources in multiple networks for one communication purpose,
billing management should be able to calculate the total cost.
⑴ billing data acquisition: billing data acquisition is the basis
of the whole billing system, but billing data acquisition is often
restricted by the acquisition equipment hardware and software, but
also related to the network resources for billing.
⑵ data management and data maintenance: accounting management has
strong manual interaction. although many data maintenance systems
are completed automatically, it still needs manual management,
including input of payment fees, maintenance of networking unit
information, and determination of bill style, etc.
( 3 ) billing policy formulation; Since billing policies are often
flexible, it is particularly important to enable users to freely
formulate input billing policies. This requires a friendly
man-machine interface for billing policy formulation and a complete
data model for billing policy implementation.
( 4 ) policy comparison and decision support: billing management
should provide more than one set of billing policy data comparison,
to provide decision-making basis for policy formulation.
5 ] data analysis and cost calculation: use the collected data on
the use of network resources, detailed information of network users
and billing policy to calculate the use of network user resources,
and calculate the fees payable.
[ 6 ] data query: provide each network user with detailed
information about their own use of network resources, network users
can calculate and check their own charges according to this
information.
( 3 ) configuration management
Configuration management is equally important. It initializes the
network and configures it to provide network services.
Configuration management is a set of related functions necessary to
identify, define, control, and monitor objects that make up a
communication network in order to achieve a particular function or
optimize network performance.
( 1 ) automatic acquisition of configuration information: in a
large network, there are more devices to be managed. if the
configuration information of each device depends entirely on the
manual input of management personnel, the workload is quite large,
and there is also the possibility of error. For people unfamiliar
with the network structure, this work can't even be done'
therefore, an advanced network management system should have
automatic access to configuration information. Even in the case of
managers are not very familiar with the network structure and
configuration situation, can through the relevant technical means
to complete the configuration and management of the network. In the
configuration information of network equipment, according to the
acquisition means can be roughly divided into three categories: one
is defined in the MIB network management protocol standard
configuration information ( including SNMP; And cmip protocol );
The second category is configuration information that is not
defined in the network management protocol standard, but is
important for device operation; The three categories are some of
the side information used for management.
( 2 ) automatic configuration, automatic backup and related
technologies: the automatic acquisition function of configuration
information is equivalent to " reading" information from network
equipment, and correspondingly, there is a large amount of "
writing" information demand in network management applications.
Network configuration information is also classified according to
setting means: one type is configuration information that can be
set by methods defined in network management protocol standards,
such as set services in SNMP; The second category is information
that can be configured by automatically logging into the device;
The three categories are administrative configuration information
that needs to be modified.
( 3 ) configuration consistency check: in a large network, due to
the large number of network devices, and due to management reasons,
these devices are likely not to be configured by the same manager.
In fact' even configurations of devices by the same administrator
can cause configuration consistency problems for a variety of
reasons. Therefore, a consistency check of the configuration of the
entire network is necessary. In the network configuration, the
router port configuration and routing information configuration
have the greatest impact on the normal operation of the network.
therefore, it is mainly these two types of information that should
be checked for consistency.
( 4 ) user operation record function: configuration system security
is the core of the whole network management system security,
therefore, must be recorded for each configuration operation of the
user. In configuration management, user actions need to be logged
and saved. Administrators can view specific configuration actions
by specific users at any time during a specific time.
( 4 ) performance management
Performance management evaluates system performance such as system
resource health and communication efficiency. Its capabilities
include mechanisms for monitoring and analyzing the performance of
the managed network and the services it provides. The results of
the performance analysis may trigger a diagnostic test procedure or
reconfigure the network to maintain network performance.
Performance management collects and analyzes data information about
the current state of the managed network and maintains and analyzes
performance logs. Some typical functions include:
⑴ performance monitoring: user - defined managed objects and their
attributes. Managed object types include lines and routers; Managed
object attributes include traffic, latency, packet loss rate, CPU
utilization, temperature, and memory headroom. For each managed
object, performance data is collected at regular intervals, and
performance reports are automatically generated.
⑵ threshold control: the threshold value can be set for each
attribute of each managed object, and for the specific attribute of
a specific managed object, the threshold value can be set for
different time periods and performance indicators
Cpu chip
Row threshold setting. Threshold checking and alerting can be
controlled by setting threshold checking switches to provide
corresponding threshold management and overflow alerting
mechanisms.
⑶ performance bridging: analyze, count and sort out historical
data, calculate performance indicators, judge performance status,
and provide reference for network planning.
( 4 ) visual performance report: scanning and processing the data
to generate a performance trend curve, and reflecting the result of
performance analysis by an intuitive graph.
( 5 ) real - time performance monitoring: a series of real-time
data acquisition is provided; Analysis and visualization tools,
used for real-time detection of traffic, load, packet loss,
temperature, memory, delay and other network equipment and line
performance indicators, can arbitrarily set the data acquisition
interval.
[ 6 ] network object performance query: the performance records of
managed network objects and their properties can be retrieved by
list or by keyword.
5 ] security management
Security has always been one of the weak links in the network, and
the user's demand for network security is quite high, so network
security management is very important. There are several major
security issues in the network:
Privacy of network data ( protecting network data from illegal
acquisition by intruders ),
Authentication ( preventing intruders from sending error messages
over the network ),
Access control ( control access control ( control access to network
resources ).
Accordingly, network security management should include management
of authorization mechanisms, access control, encryption, and
encryption keys, as well as maintenance and inspection of security
logs. Include:
In the process of network management, the management and control
information stored and transmitted is very important to the
operation and management of the network. once leaked, tampered and
forged, it will cause disastrous damage to the network. The
security of network management itself is guaranteed by the
following mechanisms: ( 1 ) administrator identity authentication,
using certificate authentication mechanism based on public key; To
improve system efficiency, simple password authentication can be
used for users in a trusted domain, such as a local area network.
⑵ encryption and integrity of management information storage and
transmission. secure socket layer ( SSL ) transmission protocol is
adopted between web browser and network management server to
encrypt and transmit management information and ensure its
integrity; Internally stored confidential information, such as
login passwords, is also encrypted.
( 3 ) network management user group management and access control,
network management system of the user ( i.e., administrator )
according to the different task is divided into several user
groups, different user groups have different permissions, the
operation of the user by the access control check, ensure that the
user can't ultra vires use network management system.
( 4 ) system log analysis, record all the user's operation, make
the operation of the system and the modification of the network
object is documented, at the same time also help to track and
recover the fault.
Security management of network objects has the following functions:
( 1 ) access control of network resources, through the management
of router access control linked list, complete the management
function of the firewall, namely from the network layer ( 1p ) and
transport layer ( TCP ) control access to network resources,
protect the network internal equipment and application services,
prevent foreign attacks.
2 alarm event analysis, receive the alarm event from the network
object, analyst security related information ( such as router login
information, SNMP authentication failure information ), real-time
alarm to the administrator, and provide the retrieval and analysis
mechanism of historical security events, timely find the ongoing
attack or suspicious signs of attack.
( 3 ) the host system security vulnerability detection, real-time
monitoring of the host system of important services ( such as www,
DNS, etc. ) state, provide security monitoring tools, in order to
search the system may exist security vulnerabilities or security
risks, and make up for the measures are given.
-In 2018,we build new export department,we want to have good start with every distributors and project company,we want to have direct cooperation.
-Established In 1995,we are the leading manufacture of telecommunication parts and equipment in China;
-In past years,100% products is exported to over 50 country in the world,we enjoy high quality and best service and flexible production schedule,meeting your demands;
-We now have new production area,with good convenient conditions,and high efficient workshop;
-We have active team,including management and trading,of course with production;
-We have standard warehouse system,we try to keep less stock to let business running fast;
-We can delivery by sea,and by air,if you need any means,we all accepted;
-We accepted sample and tested,we can supply you samples if you want;
-Our products is OK for series of test,quality is no problem;
-We build QC department and experimental lab,we try to make high quality items;
-We enjoy to be very high trust factory in China,and local administration always give honour to us;
-Let us have a nice start,please type you idea;
-We have active team,including management and trading,of course with production;
-We have standard warehouse system,we try to keep less stock to let business running fast;
-We can delivery by sea,and by air,if you need any means,we all accepted;
-We accepted sample and tested,we can supply you samples if you want;