Discuss the types of monitoring and alarms

Assignment Help Computer Networking
Reference no: EM13806922

Assume the following scenario for configuration:

The company you are designing for has the Internet with three subnetworks.

Two of the sub-networks are located in the same building while the other sub-network is at a remote site.

A dedicated management station with RMON management capability is attached to the central LAN.

One of the sub-networks, the RMON Management Information Base (MIB), is implemented in a PC, which may be dedicated to remote monitoring or, if the traffic on the sub-network is light, may perform other duties, such as local network management or a server function.

The Fiber Distributed Data Interface (FDDI) backbone is the second management station with RMON management capability, concerned with management of the networks at that site.

The RMON MIB functions for the token ring LAN are performed by the router that connects that LAN to the rest of the Internet.

Discuss the types of monitoring and alarms necessary in your configuration.

Describe where each one is housed and how it is implemented.

Define any conditions for the alarm as necessary and describe the type of monitoring that is being implemented in each instance.

Reference no: EM13806922

Questions Cloud

Discuss common elements of cultural misunderstandings : Discuss common elements of cultural misunderstandings
Write essay about your experience arriving in new york city : Write an essay paper about your experience arriving in New York City. The first paragraph is a description; the second, a narration; and the third shows process.
The multiple components of crude oil : The multiple components of crude oil are separated by a process called fractionation (fractional distillation) at petroleum refineries.Rank (or arrange) the following petroleum products according to their increasing risk of fire and explosion at room..
Give your opinion as to whether or not you believe that men : Give your opinion as to whether or not you believe that men and women should have equal treatment in sexual harassment issues. Defend your answer with two examples that support your rationale. Suggest four ways that businesses can balance the need fo..
Discuss the types of monitoring and alarms : Discuss the types of monitoring and alarms necessary in your configuration. Describe where each one is housed and how it is implemented
What is reaction to james eastons opening statement : What is your 1st reaction to James Eastons' Opening Statement re: Who is responsible for the 9/11 attacks?What is the premise of the video? Lastly, Do you feel Easton provided enough evidence to prove his theory
Write an essay about your possible selection of a spouse : Write an essay about your possible selection of a spouse. the question is would consider marrying someone of whom your parents did not approve.
The equilibrium price and quantity of generic soft drinks : How will these events impact the equilibrium price and quantity of generic soft drinks?
Remote accessing and related issues : Remote Accessing and Related Issues- An organization's head office is connected to its branch office over the Internet. The network connection works fine without errors. The users at the branch office connect to the head office by using telnet to ..

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd