Beruflich Dokumente
Kultur Dokumente
Fault management
problem identification
Troubleshooting
Problem resolution
fault logging
Configuration management
Change Control
Change Management
Inventory Hardware
Inventory Software
Software
Configuration Information
Accounting management
Asset Management
Cost Control
Charge-back.
Performance management
Network-Capacity Planning
Availability
Response time
Accuracy
Throughput
Utilization
Security management
Policy
Authority
Access Level
Exceptions
Logging
Authentication failure
Fault
The goal of fault management is to recognize, isolate, correct and log faults that occur in the
network.
Errors primarily occur in the areas of fault management and configuration management.
Fault management is concerned with detecting network faults, logging this information,
contacting the appropriate person, and ultimately fixing a problem. A common fault management
technique is to implement an SNMP-based network management system - such as HP OpenView
or Sun Solstice (formerly Net Manager) - to collect information about network devices. In turn,
the management station can be configured to make a network administrator aware of problems
(by email, paging, or on-screen messages), allowing appropriate action to be taken.
[edit] Configuration
[edit] Accounting
The goal is to gather usage statistics for users. Accounting management is concerned with
tracking network utilization information, such that individual users, departments, or business
units can be appropriately billed or charged for accounting purposes. While this may not be
applicable to all companies, in many larger organizations the IT department is considered a cost
center that accrues revenues according to resource utilization by individual departments or
business units.
[edit] Performance
The goal is to both prepare the network for the future, as well as to determine the efficiency of
the current network. Performance management is focused on ensuring that network performance
remains at acceptable levels. This area is concerned with gathering regular network performance
data such as network response times, packet loss rates, link utilization, and so forth. This
information is usually gathered through the implementation of an SNMP management system,
either actively monitored, or configured to alert administrators when performance move above or
below predefined thresholds. Actively monitoring current network performance is an important
step in identifying problems before they occur, as part of a proactive network management
strategy.....
[edit] Security
The goal of security management is to control access to assets in the network. It uses firewalls to
monitor and control external access points to one's network.Security management is not only
concerned with ensuring that a network environment is secure, but also that gathered security-
related information is analyzed regularly. Security management functions include managing
network authentication, authorization, and auditing, such that both internal and external users
only have access to appropriate network resources. Other common tasks include the
configuration and management of network firewalls, intrusion detection systems, and security
policies such as access lists.
In network management it is the set of functions that protects telecommunications networks and
systems from unauthorized access by persons, acts, or influences and that includes many
subfunctions, such as creating, deleting, and controlling security services and mechanisms;
distributing security-relevant information; reporting security-relevant events; controlling the
distribution of cryptographic keying material; and authorizing subscriber access, rights, and
privileges.
For the purpose of dealing with IT, there are two main types of IDS:
Fault management is the set of functions that detect, isolate, and correct
malfunctions in a telecommunications network, compensate for
environmental changes, and include maintaining and examining error logs,
accepting and acting on error detection notifications, tracing and identifying
faults, carrying out sequences of diagnostics tests, correcting faults,
reporting error conditions, and localizing and tracing faults by examining and
manipulating database information.
When a fault or event occurs, a network component will often send a
notification to the network operator using a protocol such as SNMP. An alarm
is a persistent indication of a fault that clears only when the triggering
condition has been resolved. A current list of problems occurring on the
network component is often kept in the form of an active alarm list such as is
defined in RFC 3877,the Alarm MIB. A list of cleared faults is also maintained
by most network management systems. Fault management systems may use
complex filtering systems to assign alarms to severity levels. These can
range in severity from debug to emergency, as in the syslog protocol.
A fault management console allows a network administrator or system
operator to monitor events from multiple systems and perform actions based
on this information. Ideally, a fault management system should be able to
correctly identify events and automatically take action, either launching a
program or script to take corrective action, or activating notification software
that allows a human to take proper intervention (i.e. send e-mail or SMS text
to a mobile phone). Some notification systems also have escalation rules that
will notify a chain of individuals based on availability and severity of alarm.
Computer hardware configuration management is the process of creating and maintaining an up-
to-date record of all the components of the infrastructure, including related documentation. Its
purpose is to show what makes up the infrastructure and illustrate the physical locations and
links between each item, which are known as configuration items.
Computer hardware configuration goes beyond the recording of computer hardware for the
purpose of asset management, although it can be used to maintain asset information. The extra
value provided is the rich source of support information that it provides to all interested parties.
This information is typically stored together in a configuration management database (CMDB)
All components of the IT infrastructure should be registered in the CMDB. The responsibilities
of configuration management with regard to the CMDB are:
• identification
• control
• status accounting
• verification
Maintenance systems
Configuration management is used to maintain an understanding of the status of complex assets
with a view to maintaining the highest level of serviceability for the lowest cost. Specifically, it
aims to ensure that operations are not disrupted due to the asset (or parts of the asset)
overrunning limits of planned lifespan or below quality levels.