Computer Network & Management
Assignment
Title: Structure of Management Information (SMI)
Structure of Management Information (SMI):
In the context of network management, for the Structure of Management Information (SMI):
a) Name its three hierarchical layers.
The Structure of Management Information (SMI) standard is responsible for defining the rules for how the Management Information Base (MIB) objects are structured, described and organized. SMI is a data definition language allows dissimilar devices to communicate by ensuring that they use a universal data representation for all management information. SMI is needed to ensure the syntax and semantics of the network management data are well defined and unambiguous.[TCP/IP Guide]
The three hierarchical layers of the Structure of Management Information are the base data types, object-type and module-identity.
b) Explain the function of each layer.
The Base Data Type layer is use in the SYNTAX clause of the OBJECT-TYPE macro that must be present. It defines the abstract data structure corresponding to the object. It includes the following eleven basic data types: INTEGER, Integer32, Unsigned32, OCTET STRING, OBJECT IDENTIFIER, IPaddress, Counter32, Counter64, Gauge32, TimeTicks, and Opaque. Any restriction on size, range or enumerations specified in this SYNTAX clause represents the maximal level of support which makes "protocol sense".[RFC2578]
The OBJECT-TYPE layer is use to specify the data type, status, and the semantics of managed objects. It has basic of five mandatory characteristics namely, OBJECT-NAME, SYNTAX, MAX ACCESS, STATUS, and DESCRIPTION, optionally with OPTIONAL-CHARACTERISTICS. The OBJECT-NAME is obviously. The SYNTAX clause specifies the basic data type of the object. The MAX-ACCESS clause specifies the managed object either can be read-create, read-write, read-only, accessible for notify only, or not accessible. The STATUS clause specifies the object is current, obsolete or deprecated. The DESCRIPTION clause contains a textual definition of the object. [RFC2578][RFC2013]
The MODULE-IDENTITY layer is used to express concisely the semantics of an information module. It groups related object into a Management Information Base (MIB) module. Each MODULE-IDENTITY contains a number of clauses like the LAST-UPDATED clause, ORGANIZATION clause, CONTACT-INFO clause, DESCRIPTION clause and REVISION clause. Theses clauses document the date of last updated, the organization and contact information of the author of the module, and a textual description of the module, and the revision information such as the date of revision and the revision description.[RFC2012][TCP-IP Guide]
c) For each layer, give four examples of defined entities.
Four examples of Base Data Types
1. Integer/Integer32 [RFC2578]
Integer/Integer32 is a 32-bit signed integer in two¡¦s complement notation, capable of holding a value between ¡V2,147,483,648 and +2,147,483,647.
ASDA's Hierarchial Structure A hierarchical structure has many levels. Each level is controlled by one person. A hierarchical company tends to be a very big company just like ASDA is. In a hierarchical company, instructions are generally passed down from one person to another until it gets to the bottom.
These values are manifest through a simple, five level hierarchical structure. Each plant has three levels - the plant manager, seven area superintendents and front-line staff while a divisional layer oversees the plants and projects by area providing the interaction between the headquarters and plants followed by the CEO.
When starting your own business, there are many different things in which you need to do before opening your doors up for business. From the idea itself, you then must choose a location, finance the business, and figure out what type of business structure your business is. Depending on which type of business structure you are, you have a specific income tax form in which you have to file with. The five types of most common business structures according to the IRS is, Sole Proprietorship, Partnership, Corporation, S Corporation and Limited Liability Company. Each structure has advantages and disadvantages so that is why as a business owner, you should figure out which type of structure is right for you.
All organizations have structure; criminal justice is much like the military in regards to having a chain of command that delegates his/her authority downward from the major command element (Stohr & Collins, 2014).
This type of organisational structure has many levels of management. The organisational structure has been structured according to its own function i.e. marketing, finance, human resources and sales. This is known as a functional organisation. The hierarchical organisational structure of Wednesbury IKEA is very similar to a tall organisation structure.
The first class stereotype is boundary class. The boundary class used to model interaction between the system's surroundings and its inner workings. The boundary class interaction is involves transforming, translating events and noting changes in the system presentation. This class also model the parts of the system that depend on its surroundings. There are also class’s uses to model the parts that are independent of the system's surroundings such as entity classes and control classes. With that, the changing of communication protocol (GUI) mean changing only the boundary classes, not the entity and control classes. The boundary class also use to clarify the system's boundaries. With that, this class make it easier to understand the system. This class also providing a good point of departure for identifying related services for aid d...
The bottom layer would follow the guideline so they can achieve the company objectives. The group structure is Chairman Board of Directors Group of Executives Board of Management Group of General Management The main departments within the group are: Administration Division Business Division Customer Support Division Network Development Division Production Services Division R&D Department Finance Department Human Resources Each division has managers for supervision. The staff in each division needs to follow the managersÂ’ decision. Every member of staff clearly understands their role and responsibility under the hierarchical structure. It is because each layer gets different responsibilities.
ISO 27002: This framework is commonly used by organizations that are interested in deploying and managing an information security management system (ISMS) based on best practices.
Organizational roles and structures are important for hotels and lodges to function efficiently. “The purpose of these structures is to coordinate, communicate, and control individual actions to support the strategy, and to facilitate workflow, permit management control, and create doable jobs” (Enz, 2010). There are many dimensions of organizational structures from hierarchy of authority, degree of centralization, complexity, specialization, formalization and professionalism that needs to be decided upon of being necessary for organizations to operate at best performance. Basic-level structures include functional, project matrix and geographic/customer levels.
Organizational structure refers to the way that an organization arranges people and jobs so that its work can be performed and its goals can be met. When a work group is very small and face-to-face communication is frequent, formal structure may be unnecessary, but in a larger organization decisions have to be made about the delegation of various tasks. Thus, procedures are established that assign responsibilities for various functions. It is these decisions that determine the organizational structure.
The TCP/IP is the most important internet operation protocol in the world. While IP protocol performs the mass of the functions which is needed for the internet to work. It does not have many capabilities which are essential and needed by applications. In TCP/IP model these tasks are performed by a pair of protocols that operate at the transport layer. The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP). These two protocols are vital when it comes to delivering and managing the communication of numerous applications. To pass on data streams to the proper applications the Transport layer must identify the target application. First, to be able to attain this, Transport layer assigns an application an identifier. In the TCP/IP model call this identifier a port number. Every individual software process needing to access the network is assigned a un...
Stair, R. & Reynolds, G. (2003). Fundamentals of Information Systems, Second Edition. [University of Phoenix Custom Edition e-text]. Boston. MA: Course Technology, a division of Thomson Learning, Inc. Retrieved October 1, 2006, from University of Phoenix, Resource, CIS564 ¡V Information Management in Business Course Web site.
Networks in organisation are dynamic and complex entities which can be quite challenging to configure and manage. (Kim & Feamster 2013). These corporate networks consist of multiple routers, switches, firewalls, middleboxes and a particular advantage of network management is the ability to monitor the entire business network. As all the devices are interconnected with many event occurring simultaneously, problems with once device can eventually lead and spread throughout...
The definition of a class is reusable not only by the program for which it is initially created but also by other object-oriented programs (and, for this reason, can be more easily distributed for use in networks).
Most organizations fall under one of three organizational designs: simple structure, bureaucracy and matrix structure. The organizational design of a company suggests who makes executive decisions and how they are enforced. The organizational design is typically decided based on the size of the company and market place.