Activity/Service Name xiii
Activities/Services Provided xiv
Determine the traffic characteristics from each source, and their resource requirements. configure the network elements, systems, to meet the requirements. User and application traffic profiling provides a detailed view of the traffic in the network. Some EMSs allow the enterprise managers to analyze and troubleshoot networked applications such as Web traffic, NetWare, Notes, e-mail, database access, Network File System (NFS),etc.
Determine the traffic growth and plan for growth. Capacity planning for the network/system can be done following gathering of traffic statistics such as traffic amount and source and destination IP addresses, Input and output interface numbers, TCP/UDP source port and destination ports, source and destination of administrative groups, etc.
Establishing, maintaining and monitoring Service Level Agreements (SLA)
A service level agreement (SLA) is established between a service provider and its customer on the expected performance level of network/system services. Examples of the performance metrics used in SLA’s are : guaranteed throughput, percentage of time with service availability, packet latency, percentage of packet delivery, outage reporting time, response time to denial of service attacks, service activation time, etc. Set parameters (routing, addressing, etc) in devices to meet policy requirements. Monitor operations according to the policy. Identify policy violations
Authentication and Authorization
Identify users before being allowed to access network/system resources. Authorization provides various level of authority to the user.
Accounting of Security Info
Collect and report security information used for billing, auditing, such as user identities, start and stop times, and executed commands. Accounting enables enterprise managers to track the services that users are accessing as well as the amount of network/system resources they are consuming.
Establish Access Control List
To control access of unauthorized users to network/system resources..
Policy Management, policy specification, translation and distribution.
This activity involves collection and inclusion of the various network/system related policies into the enterprise management activities. The policies include QoS, Security, Address allocation, and routing policies. A policy management tool can assist the enterprise managers in obtaining high level policies and translating them into low level policies that are to be enforced by the network devices, or policy enforcement points. A policy repository , a database of the high and low level policies, is used by these tools.
Accounting management is the process used to measure network/system utilization parameters so that individual or group users on the network/system for accounting or billing. A usage-based accounting and billing system is an essential part of any service level agreement (SLA). It provides both a practical way of defining obligations under an SLA and clear consequences for behavior outside the terms of the SLA. The data can be collected via NMSs. The probes to measure the statistics are places on the edge or access routers at the point of entry to the network/system. Measuring traffic flow (number of bytes, number of packets) for a specific source-destination pair (based on IP addresses). This information can also be used to check for security violations.