Discuss the types of monitoring and alarms

Assignment Help Computer Networking
Reference no: EM13806922

Assume the following scenario for configuration:

The company you are designing for has the Internet with three subnetworks.

Two of the sub-networks are located in the same building while the other sub-network is at a remote site.

A dedicated management station with RMON management capability is attached to the central LAN.

One of the sub-networks, the RMON Management Information Base (MIB), is implemented in a PC, which may be dedicated to remote monitoring or, if the traffic on the sub-network is light, may perform other duties, such as local network management or a server function.

The Fiber Distributed Data Interface (FDDI) backbone is the second management station with RMON management capability, concerned with management of the networks at that site.

The RMON MIB functions for the token ring LAN are performed by the router that connects that LAN to the rest of the Internet.

Discuss the types of monitoring and alarms necessary in your configuration.

Describe where each one is housed and how it is implemented.

Define any conditions for the alarm as necessary and describe the type of monitoring that is being implemented in each instance.

Reference no: EM13806922

Questions Cloud

Discuss common elements of cultural misunderstandings : Discuss common elements of cultural misunderstandings
Write essay about your experience arriving in new york city : Write an essay paper about your experience arriving in New York City. The first paragraph is a description; the second, a narration; and the third shows process.
The multiple components of crude oil : The multiple components of crude oil are separated by a process called fractionation (fractional distillation) at petroleum refineries.Rank (or arrange) the following petroleum products according to their increasing risk of fire and explosion at room..
Give your opinion as to whether or not you believe that men : Give your opinion as to whether or not you believe that men and women should have equal treatment in sexual harassment issues. Defend your answer with two examples that support your rationale. Suggest four ways that businesses can balance the need fo..
Discuss the types of monitoring and alarms : Discuss the types of monitoring and alarms necessary in your configuration. Describe where each one is housed and how it is implemented
What is reaction to james eastons opening statement : What is your 1st reaction to James Eastons' Opening Statement re: Who is responsible for the 9/11 attacks?What is the premise of the video? Lastly, Do you feel Easton provided enough evidence to prove his theory
Write an essay about your possible selection of a spouse : Write an essay about your possible selection of a spouse. the question is would consider marrying someone of whom your parents did not approve.
The equilibrium price and quantity of generic soft drinks : How will these events impact the equilibrium price and quantity of generic soft drinks?
Remote accessing and related issues : Remote Accessing and Related Issues- An organization's head office is connected to its branch office over the Internet. The network connection works fine without errors. The users at the branch office connect to the head office by using telnet to ..

Reviews

Write a Review

Computer Networking Questions & Answers

  What kind of network to install pieces and components

What kind of network would you install and how would the pieces and components of this network relate to each other? Define each component.

  Define and describe the model including the seven layers

question 1 define and explain the model including the seven layers for the isoosi network reference model.question 2

  Calculating higher data rate in atm line

Dog can travel to your side, wherever you may be, at 18 km/hour. For what range of distances does dog have a higher data rate than 155 Mbps ATM line?

  Design a small network for a new facility

design a small network for a new facility which has three offices, two conference rooms, a networked printer and a receptionist computer.

  Discuss how we use the control panel to configure specific

some commentators have suggested that companies today have not adequately configured computers and network resources

  Describe any of the internetworking equipment that you have

discuss any of the internetworking equipment that you have experience with and the advantages and disadvantages of

  Certificate authority with well-known public key

Suppose there is a Certificate Authority (CA) with well-known public key. Further suppose every user is issued a certificate for his/her public key.

  Explaining security countermeasures against dos attacks

Suppose a future where security countermeasures against DoS attacks are much more widely implemented than at present.

  Develop a wbs and network diagram

You have been assigned to install workstation, software, and networking equipment for a 250-person call center. Develop a WBS, Network Diagram, and Gantt Chart for the project

  What are some merits and demerits of using centralized

question 1. when working on a design what are some of the typical business goals you can expect to find for todays

  Aalyze the security mechanisms needed to protect the dms

write a three to four 3-4 page paper in which you analyze the security mechanisms needed to protect the dms systems

  Describe what happens in getting this request message

Describe what happens in getting this request message to the server and how the server gets the response message back to the client.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd