X hits on this document





6 / 22

Activity/Service Name xiii

Activities/Services Provided xiv

Traffic management

Determine the traffic characteristics from each source, and their resource requirements. configure the network elements, systems, to meet the requirements. User and application traffic profiling provides a detailed view of the traffic in the network. Some EMSs allow the enterprise managers  to analyze and troubleshoot networked applications such as Web traffic, NetWare, Notes, e-mail, database access, Network File System (NFS),etc.

Capacity planning

Determine the traffic growth and plan for growth. Capacity planning for the network/system can be done following gathering of traffic statistics such as traffic amount and source and destination IP addresses,  Input and output interface numbers, TCP/UDP source port and destination ports, source and destination of administrative groups, etc.

Establishing, maintaining  and monitoring Service Level Agreements (SLA)

A service level agreement (SLA) is established between a service provider and its customer on the expected performance level of network/system services. Examples of the performance  metrics used in SLA’s are : guaranteed throughput, percentage of time with service availability, packet latency, percentage of packet delivery, outage reporting time, response time  to denial of service attacks,  service activation time,  etc. Set parameters (routing, addressing, etc) in devices to meet policy requirements. Monitor operations according to the policy. Identify policy violations

Authentication and Authorization

Identify users before being allowed to access network/system resources.  Authorization provides various level of authority to the user.

Accounting of Security Info

Collect and report  security information used for billing, auditing, such as user identities, start and stop times, and executed commands. Accounting enables enterprise managers to track the services that users are accessing as well as the amount of network/system resources they are consuming.

Establish Access Control List

To control access of unauthorized users to network/system resources..

Policy Management, policy specification, translation and distribution.

This activity involves collection and inclusion of the various network/system  related policies into the enterprise management activities. The policies include QoS, Security, Address allocation, and routing policies. A policy management tool can assist the enterprise managers in obtaining high level policies and translating them into low level policies that are to be enforced by the network devices, or policy enforcement points. A policy repository , a database of the high and low level policies, is used by these tools.

Accounting Management

Accounting management is the process used to measure network/system utilization parameters so that individual or group users on the network/system for accounting or billing. A usage-based accounting and billing system is an essential part of any service level agreement (SLA). It provides both a practical way of defining obligations under an SLA and clear consequences for behavior outside the terms of the SLA. The data can be collected via NMSs. The probes to measure the statistics are places on the edge or access routers at the point of entry to the network/system. Measuring traffic flow (number of bytes, number of packets) for a specific source-destination pair (based on IP addresses). This information can also be used to check for security violations.


Printed 6/18/2004

Document info
Document views89
Page views89
Page last viewedSun Jan 22 21:17:26 UTC 2017