Question

In: Computer Science

You work for a large organisation that provides formal training in information technology related topics to...

You work for a large organisation that provides formal training in information technology related topics to clients on a fee-for-service basis. Several systems support this, including a media server (providing videos) and various information systems for providing sales and support to your clients. One of your networks internal links that connects the media server and to your ISP connection has just been damaged, and although still functional, the throughput (rate of data successfully delivered) across this link has reduced. Answer the following questions as a team member in the organisation’s Network Operations Centre:

a. Identify three elements of telemetry data (SNMP, IPFIX, sylog, or other) that might be useful in identifying this problem, and provide a brief explanation of how those data elements could be used to identify the problem.

b. An important concept used for monitoring networks is baselining, i.e., a snapshot of the regular/expected values of telemetry data when the network was operating normally. Explain how baselining could improve the chances of this problem being detected.

Solutions

Expert Solution

a.) Identify three elements of telementry data (SNMP, IPFIX, sylog or other) that might be usefule in identifying this problem , and breif explaination of how those data elements could be used to identify the problem --

  • The detection system monitor network traffic which indicate security threat and misconfiguration.
  • The commercial tools and open source can be used to identify security threats within your network. these tools include --
  • NetFlow, security monitoring, analysis and response system, traffic anomaly detectors, IPS sensor, Network analysis module and open source monitoring tools.
  • And other tools can be used to achieve complete visibility of what is happening within your network.
  • Sylog
  • SNMP
  • IPFIX
  • Sylogs -- It is also called as system logs. it provide information for monitoring and troubleshooting devices within your infrastructure.
  • The sylog can be enabled on networrk devices like -- Routers, switches, firewall, VPN devices.
  • SNMP -- This is most basic form of identifuing the network problem. this is layer 7 protocol which is used to designed to obtain information from network devices.
  • The network problem can be based on following --
  • CPU, memory, Device errors, network traffic statistics, packet rates and paket errors.
  • The SNMP manager control and monitor actiivities of network hosts  

b.) An important concept used for monitoring networks is baselining, snapshot of the regular/expacted how baseline could improve the chances of this problem being detected --

  • The role of baseline in network security is huge. it indicate some kind of volumatric denial of services attacks.
  • For example -- users use normal traffic patterns indicate that the network is being used to access the CRM system, email and internet. suddenly there is traffic which is going from user's computer to accounting server. it can indicate that the computer is hacked and malware is attemting to access financial information.
  • This can help to reduce the risk and minimize damage when breach occurs.
  • Baseline helps to measure imapct of architectural changes.
  • for example -- if company uses traditional network , it can set baseline to understand volume of traffic which is flowing over WAN links.

Related Solutions

2. You work for an organisation that provides counselling for clients with a history of substance...
2. You work for an organisation that provides counselling for clients with a history of substance abuse. A funding opportunity is available, but to be eligible for the funding you have to be able to provide short-term accommodation for your clients while they participate in an accredited rehabilitation program. While you are not able to provide accommodation or treatment, you consider you are in a good position to provide the counselling. What are the motives for collaborating and what services,...
The staff training center at a large regional hospital provides training sessions in CPR to all...
The staff training center at a large regional hospital provides training sessions in CPR to all employees. Assume that the design capacity of this training system is 1200 employees per year. Since the training center was first put in use however, the program has become more complex. As a result, 1050 now represents the most employees that can be trained per year; this represents the effective capacity of the training system. In the past year, 950 employees were actually trained....
You work in the training department for a large international retailer. The company is regularly adjusting...
You work in the training department for a large international retailer. The company is regularly adjusting to new policies and procedures, and they have high employee turnover. the training team must travel often to hold seminars and retain employees. You have set up a meeting with your supervisor to discuss the use of technology in streamlining the training program. Why and how would your organization benefit from e-learning or blended learning training courses?
Building a 21st century work force involves developing training that keeps pace with information technology needs....
Building a 21st century work force involves developing training that keeps pace with information technology needs. One of the main reasons a new HR technology system fails is not providing ample time for training. Whether it’s a necessary system upgrade, implementing a brand-new system, or simply transitioning from one platform to another, members of staff will be faced with change and new ways of doing things. In view of the above, you have been appointed as the training manager of...
You are on the executive board of an information technology firm that provides trafficking software to...
You are on the executive board of an information technology firm that provides trafficking software to the trucking industry. One of the firm’s managers feels the company should grow and has suggested expanding by creating trafficking software for rail shipments or by offering trucking trafficking services online. You know your firm is in a position to expand but are not sure about the best way to do so. Should the firm consider a merger with or an acquisition of a...
Project 1 You are the manager of an organisation that sells and delivers IT training. You...
Project 1 You are the manager of an organisation that sells and delivers IT training. You predominantly offer courses in the Maxihard Office suite and you know that Maxihard are bringing out a new version called Ultimo in six months. Ultimo is being hailed as the new revolution in IT and there is a lot of interest in it from the general public. You have been sent a trial copy of Ultimo by Maxihard but there are no training materials...
What terms are related to information sharing technology? COURSE: Information Technology for the Health Professions
What terms are related to information sharing technology? COURSE: Information Technology for the Health Professions
I sm lioking for more specfic topics on Ethical Issues related to Technology / Genetics /...
I sm lioking for more specfic topics on Ethical Issues related to Technology / Genetics / Healthcare to research snd write on.
You work for a business information firm that provides clients with summaries of publicly available information...
You work for a business information firm that provides clients with summaries of publicly available information on a range of businesses. Your boss comes to you and says that an increasing number of clients have been asking that the firm develop a catalog of company profiles on businesses that have something to do with the oil and gas industry. The clients want this catalog so that they can quickly identify which companies they may want to carry out additional research...
The following table provides data related to the production technology of a firm that use only...
The following table provides data related to the production technology of a firm that use only two inputs – labor and capital – to produce output. Both inputs are variable. Production with Two Variable Inputs Labor Input Capital Input 1 2 3 4 5 1 40 80 110 130 150 2 80 120 150 170 180 3 110 150 180 200 210 4 130 170 200 220 230 5 150 180 210 230 240 Keeping capital on the y-axis and...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT