study_admin_l3
"/home/yossef/notes/Su/administration/study_admin_l3.md"
path: Su/administration/study_admin_l3.md
- **fileName**: study_admin_l3
- **Created on**: 2025-03-22 21:57:12
Briefly explain the function of each layer in the OSI model.
- Physical Layer: Transmits raw bits over a medium.
- Data Link Layer: Ensures reliable data transfer between two
directly connected nodes - Network Layer: Handles routing of packets from source to destination.
- Transport Layer: Ensures reliable process-to-process communication.
- Session Layer: Manages and controls connections between applications.
- Presentation Layer: Handles data translation, encryption, and
compression. - Application Layer: Provides network services to the end-user
(e.g., HTTP, FTP).
Discuss the addressing process in the network.
- Physical Address (MAC): Unique address of a network device, used
for local delivery. - Logical Address (IP): Identifies a device across different networks.
- Port Address: Specifies a process/service on a device.
- Application Address: Defines the final destination in a networked
application.
what is osi network management model?
- organization model: descirbie the components of a network management
management system and infrastructure - information model: is concerned with all information structure and how
it's storage - communication model: deals with the way information exchange between
agent and manager - functional model comprises: gone have fun with this
describe functions of network management system?
- configuration management
- reconfiguration
- decumentation
- fault management
- proactive
- reactive
- performence management
- capacity
- traffic
- throughput
- response time
- security management
- accounting management
what is the configuration mangament?
it's the status of each entity and his relation with other entity and can
be devided two documentation and configuration
what is reconfiguration?
adjust the network componenets and feature can daily occurrence in large
network there area three type of configuration hardware,software and user-accounet
configuraion
what is documentation?
must recored every change in hardware or software or user-account configuration
what is Responsibilities of configuration management?
- Setting
- Adding
- Updating
- Maintaining
what is application support?
- client/server support systems
- internet support
- server support
- helpdesk
what is reactive adn proacitve?
- A reactive fault management system is responsible for detecting, isolating,
correcting, and recording faults. It handles short-term solutions to faults. - Proactive Fault Management: Proactive fault management tries to prevent
faults from occurring. Although this is not always possible, some types of
failures can be predicted and prevented
what is difference between fault and error?
- An error is generally a single event. error refers to the difference
between the actual output of software. - A Fault is a condition that causes a system to fail in performing its
required function.
what is performance management?
tries to monitor and control the network to ensure that it is running as
efficiently as possible.
what are Performance management responsible for?
- gather statistical information
- maintain and examine logs of system state histories
- determine system performance under natural and artificial conditions
- alter system modes of operation for conducting performance
management activities
what is security management?
is responseable for controlling access to network based on predefined policy
what is type of security management?
- encipherment: it's converting important data to cipher text
,information into not readable form. - data integrity: check if data from send tarvel for reciver in consits
and accurence way to send (send data == reciver data) - Digital signature: is a way by which the sender can electronically
sign the data and the receiver can electronically verify it. - authentication exchange: to ensure of entity means of information exchange
- Routing control: Enables selection of particular physically secure routes for certain data and
allows routing changes which means selecting and continuously changing
different available routes between the sender and the receiver to prevent the
attacker from traffic analysis on a particular route. - Notarization: The use of a trusted third party to control the
communication between the two parties - Access Control: A variety of mechanisms are used to enforce access
rights to resources/data owned by system
what is accounting management?
is control the user access to the network resourse and data throght charges
what Accounts are Managed for:
- Intrusion detection/prevention
- Charging for Services
- Legal protection of the Organisation
briefly brafiy explain functional IOS model?
- Configuration management
» Keep track of devices
» ( Device, Network) hardware/software configurations - Fault management
» Detect / isolate failures, restore service
» Trouble-ticket administration - Performance management
» Quantify, measure, report, analyze, control performance
» Traffic volume, delay, services (DNS, web/mail server) - Security management
» Control access to network resources
» Firewalls, secure communication, authentication - Accounting management
» Log and control access to network resources
» Quotas, Charging, access privileges
📘 Network Management Review Questions — Answers
1. Briefly explain the function of each layer in the OSI model.
- Physical Layer: Handles the transmission of raw bits over a
physical medium (e.g., cables, radio waves). - Data Link Layer: Ensures reliable node-to-node data transfer,
handles framing and error detection. - Network Layer: Routes packets between different networks using IP addresses.
- Transport Layer: Provides reliable end-to-end communication,
manages error correction and flow control (e.g., TCP, UDP). - Session Layer: Manages sessions between applications — establishes,
maintains, and terminates connections. - Presentation Layer: Translates data formats, handles encryption,
compression, and data encoding. - Application Layer: Provides services directly to user
applications (e.g., HTTP, FTP, SMTP).
Discuss the addressing process in the network.
- Physical Address (MAC): Unique address of a network device, used
for local delivery. - Logical Address (IP): Identifies a device across different networks.
- Port Address: Specifies a process/service on a device.
- Application Address: Defines the final destination in a networked
application.
3. Define network management.
Network management refers to administering, managing, and operating a data
network to ensure it functions efficiently and securely. It includes
performance monitoring, fault detection, and maintaining connectivity.
4. List five functions of network management.
- Configuration Management: Tracks network devices and settings.
- Fault Management: Detects, isolates, and resolves network issues.
- Performance Management: Monitors network performance
(e.g., traffic, response time). - Security Management: Controls access, protects data, prevents
unauthorized access. - Accounting Management: Tracks resource usage, supports billing,
and prevents resource monopolization.
5. Define configuration management and its purpose.
Configuration management ensures network devices' hardware and software
components are tracked and maintained. It records configurations, enabling
quick recovery from failures or changes.
6. List two subfunctions of configuration management.
- Reconfiguration: Adjusting hardware, software, or user accounts to
improve performance or functionality. - Documentation: Keeping detailed records of network configurations
and any changes made.
7. Define fault management and its purpose.
Fault management detects, isolates, and resolves network problems to maintain
uptime and performance. It ensures rapid detection and recovery from failures.
8. List two subfunctions of fault management.
- Reactive Fault Management: Identifies and resolves issues after they occur.
- Proactive Fault Management: Attempts to predict and prevent faults
before they happen.
9. Define performance management and its purpose.
Performance management monitors, analyzes, and optimizes the network to ensure
maximum efficiency. It tracks key metrics like traffic and response
times to prevent bottlenecks.
10. List four measurable quantities of performance management.
- Capacity: The maximum data rate the network can handle.
- Traffic Volume: The total amount of packets or bytes transmitted.
- Throughput: The amount of data successfully delivered over time.
- Response Time: Time from when a user requests a service to when the service responds.
11. Define security management and its purpose.
Security management controls access to the network, prevents unauthorized use,
and protects data. It ensures network confidentiality, integrity, and availability
using tools like firewalls, encryption, and intrusion detection systems.
12. Define account management and its purpose.
Account management regulates user access to network resources. It ensures
fair resource allocation, tracks activities, supports billing, and helps
detect misuse or security breaches.
continue:./study_admin_l4.md
before:./study_admin_l2.md