Structure of Management Information

Structure of Management Information

Length: 1431 words (4.1 double-spaced pages)

Rating: Excellent

Open Document

Essay Preview

More ↓
Computer Network & Management
Assignment



Title:                    Structure of Management Information (SMI)


Structure of Management Information (SMI):

In the context of network management, for the Structure of Management Information (SMI):

a)     Name its three hierarchical layers.

The Structure of Management Information (SMI) standard is responsible for defining the rules for how the Management Information Base (MIB) objects are structured, described and organized. SMI is a data definition language allows dissimilar devices to communicate by ensuring that they use a universal data representation for all management information. SMI is needed to ensure the syntax and semantics of the network management data are well defined and unambiguous.[TCP/IP Guide]

The three hierarchical layers of the Structure of Management Information are the base data types, object-type and module-identity.


b)     Explain the function of each layer.

The Base Data Type layer is use in the SYNTAX clause of the OBJECT-TYPE macro that must be present. It defines the abstract data structure corresponding to the object. It includes the following eleven basic data types: INTEGER, Integer32, Unsigned32, OCTET STRING, OBJECT IDENTIFIER, IPaddress, Counter32, Counter64, Gauge32, TimeTicks, and Opaque. Any restriction on size, range or enumerations specified in this SYNTAX clause represents the maximal level of support which makes "protocol sense".[RFC2578]

The OBJECT-TYPE layer is use to specify the data type, status, and the semantics of managed objects. It has basic of five mandatory characteristics namely, OBJECT-NAME, SYNTAX, MAX ACCESS, STATUS, and DESCRIPTION, optionally with OPTIONAL-CHARACTERISTICS. The OBJECT-NAME is obviously. The SYNTAX clause specifies the basic data type of the object. The MAX-ACCESS clause specifies the managed object either can be read-create, read-write, read-only, accessible for notify only, or not accessible. The STATUS clause specifies the object is current, obsolete or deprecated. The DESCRIPTION clause contains a textual definition of the object. [RFC2578][RFC2013]

The MODULE-IDENTITY layer is used to express concisely the semantics of an information module. It groups related object into a Management Information Base (MIB) module. Each MODULE-IDENTITY contains a number of clauses like the LAST-UPDATED clause, ORGANIZATION clause, CONTACT-INFO clause, DESCRIPTION clause and REVISION clause. Theses clauses document the date of last updated, the organization and contact information of the author of the module, and a textual description of the module, and the revision information such as the date of revision and the revision description.[RFC2012][TCP-IP Guide]


c)     For each layer, give four examples of defined entities.

Four examples of Base Data Types
1.     Integer/Integer32 [RFC2578]
Integer/Integer32 is a 32-bit signed integer in two¡¦s complement notation, capable of holding a value between ¡V2,147,483,648 and +2,147,483,647.

How to Cite this Page

MLA Citation:
"Structure of Management Information." 123HelpMe.com. 17 Feb 2020
    <https://www.123helpme.com/view.asp?id=87436>.

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Management Structure And Strategy Of A Company Essay

- Management and how it is arranged are central to the overall success or failure of a company. The decisions made about management structure and strategy affect every subsequent decision that will be made throughout the organization. It has been generally thought that a traditional management style with clearly defined hierarchical roles and a fairly rigid structure is the best way to organize a company to be successful. Recently, though, holacracy has risen as a viable alternative to the traditional management system....   [tags: Management, Organizational structure]

Research Papers
1235 words (3.5 pages)

Organizational Structure Of The Organization Essay

- 1.1 ORGANIZATIONAL STRUCTURE The typically hierarchical arrangement of lines of authority, communications, rights and duties of an organization. Organizational structure determines how the roles, power and responsibilities are assigned, controlled, and coordinated, and how information flows between the different levels of management. An organizational chart illustrates the organizational structure. http://www.businessdictionary.com/definition/organizational-structure.htm Following are the types of organizational structures that can be observed in the modern business organizations: Bureaucratic Structures maintain strict hierarchies when it comes to people management; Functional Structure the...   [tags: Organizational structure, Organizational culture]

Research Papers
1031 words (2.9 pages)

College Of Business And Economics Major Management Information Systems Essay

- Homework #4 West Virginia University offers a total of one-hundred and thirty three majors, but I have chosen to purse the college of Business and Economics major Management Information Systems. Management Information Systems is the study of people, data, and technology in a business oriented environment. With this major there are three different integrations you can make your focus. These integrations include Business, Technology, or Integrated which is a middle between the both. I plan to use this degree to get into the Business industry, but I do not yet know if I want to be a Technology consultant or someone who manages the data within a corporation....   [tags: Management, Business]

Research Papers
1035 words (3 pages)

Organizational Structure Of An Organization Essay

- An organizations structure is identifiably made up of an array of different individuals who have aspired to be valuable when giving out their opinions, ideas and talents that bring out the best in any organization when it comes to making structural changes. These structural differences have been known to be somewhat beneficial when incorporated with the aspirational aspects of change in the organizations culture which can show it to be indubitable and indissoluble. When one thinks about the culture or structure of an organization it can have a strong influence on the function and potential success or failure of any facility....   [tags: Organization, Structure, Organizational structure]

Research Papers
1209 words (3.5 pages)

The Practice Of Information Security Management Essay example

- The famous cryptographer Bruce Schneier once said that “[p]eople often represent the weakest link in the security chain and are chronically responsible for the failure of security systems” (Schneier, 2000). The practice of Information Security Management is employed by businesses through a variety of standards, best practices, and frameworks to combat this issue. Their adoption of best practices in the public domain allows businesses to strive for improvements through their own interpretation. These best practices are sourced from standards such as ISO/IEC 27000, proprietary knowledge and public frameworks such as COBIT, Six Sigma, or ITIL....   [tags: Information security, Security]

Research Papers
1160 words (3.3 pages)

Management Information System Essay

- It deals with planning for, development, management, and use of information technology tools to help people perform all tasks related to information processing and management. In the above definition you can find the three key resources-information, information technology, and people. You will also find various functions that you as a knowledge worker must undertake to ensure that your origination maximizes its advantages. It doesn't matter if you are preparing to work in the area of finance, human resource management, logistics, marketing or even information technology, you will still have responsibilities that include planning for, developing, managing and using MIS function with in your...   [tags: Computers Business Information Technology MIS]

Research Papers
800 words (2.3 pages)

Walmart Information Management System Essay

- Walmart Information Management System (IMS) Walmart is a retail giant that just about everyone in America has purchased something from them. It is a one stop shop for anything that a person could ever need. Walmart stores can be found anywhere in fact most people are less than an hour drive away from a Walmart store. Walmart’s success has put many companies out of business. The chains success is primarily from low prices and using an information technology system to meet customer demands giving them a competitive advantage....   [tags: information technology and business analysis]

Research Papers
758 words (2.2 pages)

Essay about Information Management

- Information Management Johannessen and Olsen (2010) noted “with this economic landscape, knowledge itself became a factor of production—specifically, knowledge related to identifying and exploiting new ways to establish temporary competitive advantage” (p. 502). Their observation reflects that under today’s business environment, the ability to optimize information is a significant factor that enables such companies to succeed their businesses. However, the use of information is more important than just limited in business practices, also for everyone living and other professional arenas (Badke, 2009; Turusheva, 2009)....   [tags: Technology Information]

Research Papers
1136 words (3.2 pages)

The Economics of Information Essay

- Various Aspects of Economics of Information 3.1 Economics of information in Education According to Farid (2007), economics of information is based on the concept that quality information is a scarce and valuable resource. The production and dissemination of information in education constitute two major economic activities, with associated costs and benefits. The value of information depends on its degree of accuracy, completeness, timeliness, reliability, and relevance to issues under consideration....   [tags: Information Management]

Research Papers
1088 words (3.1 pages)

Organization Structure and Management Essay

- Part 1(question1) In the event, there are three parties and they are all aiming at receiving profits. The first party consists the organizer whose position is to call a famous artist to perform in the event. The second party consist the owner of the venue and the third party is the performer. Part 1(question2) The main profit from the occasion will be from the music that will be played, the alcohol that will be sold as well as selling of tables. Another aim of the event apart from the gaining of profit is to provide people with a chance to listen to the singers from their own country and also foreign singers from foreign countries....   [tags: operations management]

Research Papers
900 words (2.6 pages)

Related Searches


2.      Network Address/IpAddress [RFC2578]
     It is an IP address, encoded as a 4-byte octet string.
3.     TimeTicks [RFC2578]
     Time Ticks is a 32-bit unsigned integer that indicates the number of hundredths of seconds since some arbitrary start date. Used for time stamping and to compute elapsed time.
4.     Counter64 [RFC2578]
Counter64 is a counter of 64 bits wide, allowing a value between 0 to 18,446,744,073,709,551,615.
     
     
     Four examples of Object Type
1)          Total number of input datagrams successfully delivered          
ipInDelivers OBJECT-TYPE
SYNTAX Counter32
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The total number of input datagrams successfully delivered
to IP user-protocols (including ICMP)."
::= { ip 9 }
[RFC2011]

2)          TCP Maximum number of connections
tcpMaxConn OBJECT-TYPE
SYNTAX Integer32 (-1 | 0..2147483647)
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The limit on the total number of TCP connections the entity
can support. In entities where the maximum number of
connections is dynamic, this object should contain the
value -1."
::= { tcp 4 }
[RFC4022]

3)          UDP Local port number
udpLocalPort OBJECT-TYPE
SYNTAX INTEGER (0..65535)
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The local port number for this UDP listener."
::= { udpEntry 2 }
[RFC2013]

4)          Object counter on total number of packets counted on this priority level
smonPrioStatsPkts OBJECT-TYPE
SYNTAX Counter32
UNITS "packets"
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"The total number of packets counted on this priority level."
::= { smonPrioStatsEntry 2 }
[RFC2613]


Four examples of Module Identity
1)           Internet Protocol MIB
ipMIB MODULE-IDENTITY
LAST-UPDATED "9411010000Z"
ORGANIZATION "IETF SNMPv2 Working Group"
CONTACT-INFO
" Keith McCloghrie
Postal: Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
US
Phone: +1 408 526 5260
Email: kzm@cisco.com"
DESCRIPTION
"The MIB module for managing IP and ICMP implementations,
but excluding their management of IP routes."
REVISION "9103310000Z"
DESCRIPTION
"The initial revision of this MIB module was part of MIB-
II."
::= { mib-2 48}
[RFC2011]

2)     Transmission Control Protocol MIB
tcpMIB MODULE-IDENTITY
LAST-UPDATED "200502180000Z" -- 18 February 2005
ORGANIZATION
"IETF IPv6 MIB Revision Team
http://www.ietf.org/html.charters/ipv6-charter.html"
CONTACT-INFO
"Rajiv Raghunarayan (editor)
Cisco Systems Inc.
170 West Tasman Drive
San Jose, CA 95134
Phone: +1 408 853 9612
Email:
Send comments to "
DESCRIPTION
"The MIB module for managing TCP implementations.
Copyright (C) The Internet Society (2005). This version
of this MIB module is a part of RFC 4022; see the RFC
itself for full legal notices."
REVISION "200502180000Z" -- 18 February 2005
DESCRIPTION
"IP version neutral revision, published as RFC 4022."
REVISION "9411010000Z"
DESCRIPTION
"Initial SMIv2 version, published as RFC 2012."
REVISION "9103310000Z"
DESCRIPTION
"The initial revision of this MIB module was part of
MIB-II."
::= { mib-2 49 }
[RFC4022]

3)     User Datagram Protocol MIB
udpMIB MODULE-IDENTITY
LAST-UPDATED "9411010000Z"
ORGANIZATION "IETF SNMPv2 Working Group"
CONTACT-INFO
" Keith McCloghrie
Postal: Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
US
Phone: +1 408 526 5260
Email: kzm@cisco.com"
DESCRIPTION
"The MIB module for managing UDP implementations."
REVISION "9103310000Z"
DESCRIPTION
"The initial revision of this MIB module was part of MIB-
II."
::= { mib-2 50 }
[RFC2013]

4)     MIB module for managing Remote Monitoring device implementations for Switched Networks
switchRMON MODULE-IDENTITY
LAST-UPDATED "9812160000Z"
ORGANIZATION "IETF RMON MIB Working Group"
CONTACT-INFO
"IETF RMONMIB WG Mailing list: rmonmib@cisco.com
Rich Waterman
Allot Networks Inc.
Tel: +1-408-559-0253
Email: rich@allot.com
Bill Lahaye
Xylan Corp.
Tel: +1-800-995-2612
Email: lahaye@ctron.com
Dan Romascanu
Lucent Technologies
Tel: +972-3-645-8414
Email: dromasca@lucent.com
Steven Waldbusser
International Network Services (INS)
Tel: +1-650-318-1251
Email: waldbusser@ins.com"
DESCRIPTION
"The MIB module for managing remote monitoring device
implementations for Switched Networks"
-- revision history
REVISION "9812160000Z" -- 16 Dec 1998 midemight
DESCRIPTION "Initial Version, published as RFC 2613."
::= { rmon 22 }
[RFC2613]

Reference List

[Bradley]Tony Bradley, VPN¡¦s: IPSec vs. SSL, http://netsecurity.about.com/cs/generalsecurity/a/aa111703_p.htm, 2005

[DCCP] E.Kohler, M.Handley & S.Floyd, Datagram Congestion Control Protocol, Internect Engineering Task Fore, November 2004

[Ixia, IPv6] Dean Lee, Elliott Stewart, Internet Protocol version 6 (IPv6) Conformance and Performance Testing, White Paper, Ixia, 2004

[Ixia, IPSec] Ixia, IPSec Virtual Private Networks Conformance and Performance Testing, White Paper, Ixia, 2003

[Kurose & Ross] James F Kurose & Keith W Ross, Computer Networking ¡V A Top Down Approach Featuring the Internet, (2nd Edition), Addision-Wesley, ISBN: 0 321 17644-8 (the International Edition), ISBN 0-201-97699-4.

[Netilla 1] Netilla Networks Inc, A Comparison of VPN Solutions: SSL VS IPSec: A Netilla Networks White Paper, 2003

[Netilla 2] Netilla Networks Inc, A Functional and Cost Comparison of VPN Solutions: SSLvs. IPSec, 2002

[Perkins] Colin Perkins, Building Adaptive Applications: On The Need For Congestion Control, Dec 2004

[POP3] POP3, http://searchexchange.techtarget.com/sDefinition/0,290660,sid43_gci212805,00.html

[RFC768] J. Postel, User Datagram Protocol, RFC768, Aug 1980

[RFC1752] S. Bradner & A. Mankin, The Recommendation for the IP Next Generation Protocol, RFC1752, January 1995

[RFC1939] J. Myers, Carnegie Mellon & M. Rose, Post Office Protocol - Version 3, RFC1939, May 1996

[RFC2011] K. McCloghrie, SNMPv2 Management Information Base for the Internet Protocol using SMIv2, RFC2011, November 1996

[RFC2013] K. McCloghrie, SNMPv2 Management Information Base for the User Datagram Protocol using SMIv2, RFC2013, November 1996

[RFC2131] N R. Droms, Dynamic Host Configuration Protocol, RFC2131, March 1997

[RFC2401] S. Kent, R. Atkinson, Security Architecture for the Internet Protocol, November 1998

[RFC2460]S. Deering, Internet Protocol, Version 6 (IPv6), RFC2460, December 1998

[RFC2578] K. McCloghrie, D. Perkins,J. Schoenwaelder, Structure of Management Information Version 2 (SMIv2), RFC2578, April 1999

[RFC2579] K. McCloghrie, D. Perkins,J. Schoenwaelder, Textual Conventions for SMIv2, RFC2579, April 1999

[RFC2580] K. McCloghrie, D. Perkins,J. Schoenwaelder, Conformance Statements for SMIv2, RFC2580, April 1999

[RFC2613] R. Waterman, B. Lahaye, D. Romascanu, S. Waldbusser, Remote Network Monitoring MIB Extensions for Switched Networks Version 1.0, RFC2613, June 1999

[RFC4022] R. Raghunarayan, Transmission Control Protocol (TCP), RFC4022, Mar 2005

[Router]Curt Franklin, How Routers Work? http://computer.howstuffworks.com/router1.htm, 2003

[TCP/IP Guide] Charles M. Kozierok, The TCP/IP Guide, www.TCPIPGuide.com, Version 2.0, June 7, 2004.

[UTP Cable] Cabling, http://members.tripod.com/barhoush_2/cabling.htm

[UDP Apps] http://www2.rad.com/networks/2004/udp/udpapps.htm


[UDP 1] Roger A. Grimes, UDP vs. TCP, http://www.windowsitpro.com/Article/ArticleID/40315/40315.html, Oct 2003

[VPN]Peter Southwick,Virtual Private Network Implementation and Concepts, http://www.hill.com/archive/pub/papers/papers.asp?yr=2003&mn=08, August 2003




Bibliography
James F Kurose & Keith W Ross, Computer Networking ¡V A Top Down Approach Featuring the Internet, (2nd Edition), Addision-Wesley, ISBN: 0 321 17644-8 (the International Edition), ISBN 0-201-97699-4.

Michael J. Palmer & Robert Bruce Sinclair, Advanced Networking Concepts, Course Technology, ISBN 0-7895-0195-3

Houston H. Carr & Charles A. Snyder, The Management of Telecommunications- Business Solutions to Business Problems, The McGraw-Hill Companies, ISBN 0-256-21961-3

William Stallings & Richard Van Slyke, Business Data Communications, (Third Edition), Prentice Hall, ISBN 0-13-594581-X

Return to 123HelpMe.com