Verified Document

Network Alarms Network Events, Alarms, And Alerts Book Report

Related Topics:

Network Alarms Network Events, Alarms, and Alerts

It's not at all difficult to name and describe an event category or event-based transaction that can trigger an alert, alarm, or otherwise cause a network management system to bring something to the attention of a network manager; the difficulty is in limiting the description of such categories and transactions. Depending on the specific needs and architectures of the network and its users, the type of event or event-based transaction that might lead to the notification of a network manager could be pretty much anything. There are, however, some common event categories and event-based transactions that will trigger alarms or other notifications in the network management system and require attention form network managers. Several of these event and transaction types will be identified and described in the following pages, with their relevance discussed.

One broad category of events that commonly triggers alarms are RMON (Remote Network Monitoring) alarms which are typically created when an automatic function built into the information system measures a variable outside of set parameters (Cisco 2007). For example, the RMON could be configured to monitor the level of central processing unit utilization and to create a record of the levels of utilization through continual polling, and if the utilization drops below or rises above a certain...

This type of alarm is utilized to ensure that optimal levels of central processing unit utilization, as defined by the network administrators and applied to the system's parameters, remains in place during system operations.
This specific type of event category can actually cause an unnecessary drain on network bandwidth, thus limiting other capabilities, and so better alternatives that represent a slightly different type of event can be built into the network architecture to serve the same purpose. Using specified time intervals and a measurement of rates in the rise and fall of central processing unit utilization, an RMON can be implemented to trigger an alarm in a measure that is both more proactive -- a level of utilization potentially above or below the set threshold limits can be detected before it actually occurs -- and more efficient, using less bandwidth and fewer network resources to accomplish the same task (Cisco 2011). The alarms triggered by either method fall under the basic category of performance monitoring, which is one of the essential functions of a network management system and, when needed performance adjustments cannot be automated, the network manager.

Interestingly, certain transaction-based events that can trigger network manager-alerting alarms are themselves alarms. That is, there are…

Sources used in this document:
References

Cisco. (2007). Network Management System: Best Practices White Paper. Accessed 20 November 2011. http://www.cisco.com/en/U.S./tech/tk869/tk769/technologies_white_paper09186a00800aea9c.shtml

Tang, C., Li, X. & Zhou, X. (2008). Advanced Data Mining and Applications. new York: Springer.
Cite this Document:
Copy Bibliography Citation

Related Documents

Delineates a Hypothetical Disaster Plan in Response
Words: 1450 Length: 5 Document Type: Essay

delineates a hypothetical disaster plan in response to a major earthquake and tsunami in New York City. The disaster plan includes pre-disaster / pre-event preparations, actions taken during the disaster, resources available during the disaster, and post-disaster / post-event strategies. The scope of the disaster plan includes establishment of a new residence and survival plan for disasters with long-term effects. Additionally, the disaster plan contains two separate components: One

Security - Agip Kazakhstan North
Words: 14948 Length: 35 Document Type: Term Paper

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

Web Pages and Attack
Words: 3908 Length: 12 Document Type: Research Paper

Auditing, Monitoring, Intrusion Prevention, Intrusion Detection, and Penetration Testing "Unlike IP fragmentation (which can be done by intermediate devices), IP reassembly can be done only at the final destination. What problems do you see if IP reassembly is attempted in intermediate devices like routers?" [ ] IP fragmentation is defined as the IP (Internet Protocol) that breaks datagrams into smaller fragment to assist packets passing through links and forming a smaller MTU

Al Qaeda and Attacks
Words: 1949 Length: 6 Document Type: Term Paper

9/11 Terrorism and EMS On 11th September, 2001, a total of nineteen al-Qaeda terrorists took control of four sky-borne airplanes, using them to carry out suicide attacks aimed at American targets. Two planes were guided directly towards the New York World Trade Center's twin towers, one struck the U.S. defense department's headquarters (the Pentagon), and one crashed into a Pennsylvanian field. Known worldwide as the 9/11 terror attacks, this day's events

Healthcare Technology the Bar Code
Words: 670 Length: 2 Document Type: Essay

In respects, it could also reduce lawsuit expense when patients want to sue because of the wrong medication is given or harm is done in the process of medication administration. "We often resist the new way of doing things..." (Thede, 2009, Sept). Behaviors are often aimed at relieving the pressures from change rather than advancing a new approach to the way we do things. We tend to view change as

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now