Cmip Protocol

Read Complete Research Material

CMIP PROTOCOL

Secure Network Management Using CMIP Protocol

Secure Network Management Using CMIP Protocol

Introduction

Computer Networks are becoming more complex, larger, and indispensable to manage in the recent times. This is why the concept of secured network management is giving way to a lot of concern and attention from the network developers. This requires a lot of knowledge about the working methods, protocols and their usage. The network management involves a set of activities, dedicated to controlling and conduct the surveillance of telecommunications infrastructures of a company or operator (Anderson, 2001, p. 45). The key areas in which it operates are configuration management, fault management, security management, performance management, monitoring of network availability, Improve automation, monitoring of response time, security features, redirection of traffic and management accounting.

This essay seeks to identify the issues related to a secured network management using CMIP (Common management information protocol) that was developed for the disposal of computer networks. CMIP is the heart of the OSI model of administration in implementing the requests for information necessary for the administration of a network. CMIS defines a system of communication services management information providing the means to exchange information between a manager and a process agent; and between application entities SAME (System Management Application Entity) to process different agents via CMIP protocol. CMIP defines the mechanisms for performing the exchange of management information. In light of greater openness on the Internet, the networks and the percentage of devices that the process of network management such as routers and protocols (Fultz, Grossklags, 2009, p. 26). Network engineers monitor their equipment and because of their abilities, did not face difficulty in finding a protocol for remote control that gives them secured data efficiency. This is associated with the amount of data transfer within the network and many of the important characteristics of control.

Discussion

Today, the network is becoming mandatory for all field of life. Network management is therefore, essential. The management of computer networks is a problem which the challenge is to ensure the most cost not only the quality of the overall service provided to users but also the responsiveness to change and evolve (Wang, Stolfo, 2004, p. 100). The management of computer networks is defined as all resources used (knowledge, techniques, and methods, tools) to oversee, use and plan their development in accordance with the constraints of cost and quality. Supervisory systems monitor and retrieve information about their condition and behavior, which can be done by periodic polling or rise unsolicited information from the network equipment themselves.

Security in the Life Cycle of Systems Development

Given the difficulty of taking measures to protect IT cost after deployment of a system, and as technology and threats are constantly evolving, departments must address security issues and adjust the security requirements throughout the stages of the development life cycle of the following systems, including the early stages of planning and verification:

Preparation - An initial assessment of threats and risks (TRA) will provide inputs to the requirements of IT ...