Network management software

Last updated

Network management software is software that is used to provision, discover, monitor and maintain computer networks.

Contents

Purpose

With the expansion of the World Wide Web and the Internet, computer networks have become very large and complex, making them impossible to manage manually. In response, a suite of network management software was developed to help reduce the burden of managing the growing complexity of computer networks. Network management software usually collects information about network devices (which are called Nodes) using protocols like SNMP, ICMP, CDP etc. This information is then presented to network administrators in an easy to understand and accessible manner to help them quickly identify and remediate problems. Problems may present itself in the form of network faults, performance bottlenecks, compliance issues etc. Some advanced network management software may rectify network problems automatically. Network management software may also help with tasks involved in provisioning new networks, such as installing and configuring new network nodes etc. They may also help with maintenance of existing networks like upgrading software on existing network devices, creating new virtual networks etc.

Functions

Network provisioning: This function enables network managers to provision new network devices in an environment. Automating this step reduces cost and eliminates chances of human error.

Mapping or Discovery: This function enables the software to discover the features of a target network. [1] Some features that are usually discovered are: the nodes in a network, the connectivity between these nodes, the vendor types and capabilities for these nodes, the performance characteristics etc.

Monitoring: This function enables the network management software to monitor the network for problems and to suggest improvements. [2] [3] The software may poll the devices periodically or register itself to receive alerts from network devices. One mechanism for network devices to volunteer information about itself is by sending an SNMP Trap. Monitoring can reveal faults in the network such as failed or misconfigured nodes, performance bottlenecks, malicious actors, intrusions etc.

Configuration management: This function enables the software to ensure that the network configuration is as desired and there is no configuration drift.

Regulatory compliance: This function enables the network management software to ensure that the network meets the regulatory standards and complies with applicable laws.

Change control: This function enables the software to ensure that the network changes are enacted in a controlled and coordinated manner. Change control can enable audit trails which has applications during a forensic investigation after a network intrusion.

Software Asset Management: This function enabled the software to inventory software installed on nodes along with details like version and install date. Additionally, it can also provide software deployment and patch management.

Cybersecurity: This function enabled the software to use all the data gathered from the nodes to identify security risks in an IT environment. [4] [5]

Related Research Articles

A network switch is networking hardware that connects devices on a computer network by using packet switching to receive and forward data to the destination device.

In telecommunication, provisioning involves the process of preparing and equipping a network to allow it to provide new services to its users. In National Security/Emergency Preparedness telecommunications services, "provisioning" equates to "initiation" and includes altering the state of an existing priority service or capability.

Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior. Devices that typically support SNMP include cable modems, routers, switches, servers, workstations, printers, and more.

FCAPS is the ISO Telecommunications Management Network model and framework for network management. FCAPS is an acronym for fault, configuration, accounting, performance, security, the management categories into which the ISO model defines network management tasks. In non-billing organizations accounting is sometimes replaced with administration.

An over-the-air update, also known as over-the-air programming, is an update to an embedded system that is delivered through a wireless network, such as Wi-Fi or a cellular network. These embedded systems include mobile phones, tablets, set-top boxes, cars and telecommunications equipment. OTA updates for cars and internet of things devices can also be called firmware over-the-air (FOTA). Various components may be updated OTA, including the device's operating system, applications, configuration settings, or parameters like encryption keys.

The Intelligent Platform Management Interface (IPMI) is a set of computer interface specifications for an autonomous computer subsystem that provides management and monitoring capabilities independently of the host system's CPU, firmware and operating system. IPMI defines a set of interfaces used by system administrators for out-of-band management of computer systems and monitoring of their operation. For example, IPMI provides a way to manage a computer that may be powered off or otherwise unresponsive by using a network connection to the hardware rather than to an operating system or login shell. Another use case may be installing a custom operating system remotely. Without IPMI, installing a custom operating system may require an administrator to be physically present near the computer, insert a DVD or a USB flash drive containing the OS installer and complete the installation process using a monitor and a keyboard. Using IPMI, an administrator can mount an ISO image, simulate an installer DVD, and perform the installation remotely.

A network tap is a system that monitors events on a local network. A tap is typically a dedicated hardware device, which provides a way to access the data flowing across a computer network.

Database security concerns the use of a broad range of information security controls to protect databases against compromises of their confidentiality, integrity and availability. It involves various types or categories of controls, such as technical, procedural or administrative, and physical.


This is a comparison of notable free and open-source configuration management software, suitable for tasks like server configuration, orchestration and infrastructure as code typically performed by a system administrator.

Mobile device management (MDM) is the administration of mobile devices, such as smartphones, tablet computers, and laptops. MDM is usually implemented with the use of a third-party product that has management features for particular vendors of mobile devices. Though closely related to Enterprise Mobility Management and Unified Endpoint Management, MDM differs slightly from both: unlike MDM, EMM includes mobile information management, BYOD, mobile application management and mobile content management, whereas UEM provides device management for endpoints like desktops, printers, IoT devices, and wearables as well.

The following tables compare general and technical information for a number of notable network monitoring systems. Please see the individual products' articles for further information.

<span class="mw-page-title-main">Junos OS</span> Real-time operating system (RTOS) software

Junos OS is a FreeBSD-based network operating system used in Juniper Networks routing, switching and security devices.

<span class="mw-page-title-main">Storage area network</span> Network which provides access to consolidated, block-level data storage

A storage area network (SAN) or storage network is a computer network which provides access to consolidated, block-level data storage. SANs are primarily used to access data storage devices, such as disk arrays and tape libraries from servers so that the devices appear to the operating system as direct-attached storage. A SAN typically is a dedicated network of storage devices not accessible through the local area network (LAN).

Avaya Unified Communications Management in Computer Networking is the name of a collection of GUI software programs from Avaya. It uses a service-oriented architecture (SOA) that serves as a foundation forunifying the configuration and monitoring of Avaya Unified Communications Servers and data systems.

A data monitoring switch is a networking hardware appliance that provides a pool of monitoring tools with access to traffic from a large number of network links. It provides a combination of functionality that may include aggregating monitoring traffic from multiple links, regenerating traffic to multiple tools, pre-filtering traffic to offload tools, and directing traffic according to one-to-one and many-to-many port mappings.

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.

HP Network Management Center (NMC) is a suite of integrated HP software used by network managers in information technology departments. The suite allows network operators to see, catalog and monitor the routers, switches, and other devices on their network. IT staff is alerted when a network device fails, and it predicts when a network node or connection point may go down. The suite was designed to address operational efficiency.

A number of tools exist to generate computer network diagrams. Broadly, there are four types of tools that help create network maps and diagrams:

PA Server Monitor is a server and network monitoring software from Power Admin LLC. PA Server Monitor focuses primarily on server and network health through numerous resource checks, reports, and alerting options. The agentless, on-premises software can monitor thousands of devices from a single installation. The monitored devices can be desktop computers, servers, routers and other devices.

Endpoint security or endpoint protection is an approach to the protection of computer networks that are remotely bridged to client devices. The connection of endpoint devices such as laptops, tablets, mobile phones, and other wireless devices to corporate networks creates attack paths for security threats. Endpoint security attempts to ensure that such devices follow compliance to standards.

References

  1. "What is a Network Management System (NMS)? - Definition from Techopedia". Techopedia.com. Retrieved 2019-09-26.
  2. SEO, Bradley Mitchell An MIT graduate who brings years of technical experience to articles on; computers; Networking, Wireless. "Network Monitoring Definition and Tools". Lifewire. Retrieved 2019-09-26.
  3. "What is Network Monitoring? How does it work and why do you need it?". Our IT Department Ltd - IT Support in London and East of England. 2016-10-05. Retrieved 2019-09-26.
  4. derekpsneed (2013-12-03). "Network Security Management". Versa Technology. Retrieved 2019-09-26.
  5. "What is network security management? - Juniper Networks". www.juniper.net. Retrieved 2019-09-26.