Skip to main content

ISO Network Management Model

ISO Network Management Model

The ISO Network Management Model has contributed a great deal to network standardization. Its network management model is the primary means for understanding the major functions of network management systems. This model consists of five conceptual areas.

1. Performance Management

The goal of performance management is to measure and make available various aspects of network performance so that internet work performance can be maintain at an acceptable level because of performance variables that might be provided include network throughput, user response times, and line utilization.

2. Configuration Management

The goal of configuration management is to monitor network and system configuration information so that the effects on network operation of various versions of hardware and software elements can be tracked and managed.

3. Accounting Management

The goal of accounting management is to measure network utilization parameters so that individual or group uses on the network can be regulated appropriately, such regulation minimizes network problems (because network resources can be apportioned based on resource capacities) and maximizes the fairness of network access across all users.

4. Fault Management

The goal of fault management is to detect, log, notify users of, and (to the extent possible) automatically fix network problems to keep the network running effectively, therefore, fault management is perhaps the most widely implemented of the ISO network management elements and the faults can cause downtime or unacceptable network degradation.

5. Security Management

The goal of security management is to control access to network resources according to local guidelines so that the network cannot be sabotaged (intentionally or unintentionally) and sensitive information cannot be accessed by those without appropriate authorization, for example if a security management subsystem can monitor users logging on to a network resource and can refuse access to those who enter inappropriate access codes.

Also Learn About Network Cabling

  

Comments

  1. You have provided a richly informative article about Network Cabling Services. It is a beneficial article for me and also helpful for those who are searching for this type of blog. Thanks for sharing this information here.

    ReplyDelete

Post a Comment

Popular posts from this blog

Interconnecting Devices

Interconnecting Devices An Interconnecting devices is a network device. It used to transfer data from one computer to other computer with the help of network devices. There are five categories of interconnecting devices are such as. Router  Hubs  Switches/Bridge  Repeater  BRouter Repeater: Now I am going to tell you the repeater is an electronic device that used to receive and send a signal. It amplifies the signal and noise. It provides transmission of the signal.  HUB (Hyper User Bus):  In this, it used to link several computers in the same network. It based on broadcasting, and it sends the data to all computers and repeats the signal which receives a signal from one port and copies to other port and traffic are high. Bridge / Switch:  In this, we can see the interconnecting devices which can divide a single network into two or more segment are called Bridge / Switch.  It has multiple ports like 2, 4, 16, and 32. The Switch main...

Virtual Private Network (VPN)

  What is Virtual Private Network (VPN)? A virtual private network (VPN) is a secure connection between two private networks over a public network (in other words, over the Internet). All the data that flows over the VPN is encrypted. So anyone who steals packets from the VPN will find them unintelligible; only the parties on either end of the VPN are able to decrypt the packets. VPN connections are often called tunnels. Because they provide an isolated pathway from one point to another through the Internet. The only way to gain meaningful access to a VPN tunnel is at either end. Example for VPN Connections VPNs are used for There are two common uses for VPNs: To provide remote workers with secure access to your company network: To do that, you set up a VPN on the router, and then provide your remote workers with the credentials necessary to access the VPN. The remote workers can run a software VPN client on their home computers or laptops to connec...

Printer

What is Printer? Another widely used output device is a printer and it is a computer peripheral device. A printer produces a hard copy of a processed text or a result. A hard copy refers to a permanent human-readable text or graphics taken on physical print media such as paper or transparency. A printer will use toner to provide a quality print on paper, a toner is a replaceable material. Once the toner gets empty we can refill it and reuse it.  Most of the printers are used for commercial purposes such as private offices, industries, government offices, photo studios, etc,. Most of the printers are used to print emails, documents, files, images, color photos, color documents, color posts, banners, advertisement posters, etc,. There are the following 5 types of printers such as dot matrix printer, inkjet printer, laser printer, dye-sublimation printer, and plotter printer this are all the printer which uses nowadays for a printing purpose. A printer is characterized by the followin...