13.3.4 Performance Statistics Performance statistics are used in tuning a network,validating a service level agreement(SLA),analyzing use trends, planning facilities,and functional accounting Data are gathered by means of an RMON probe and an RMON MIB for statistics.To be accurate,statistics require large amounts of data sampling,which create overhead traffic on the network and thus have an impact on its performance.One of the enormous benefits of using an RMON probe for collecting statistical data is that it can be done locally without degrading overall network performance
13.3.4 Performance Statistics Performance statistics are used in tuning a network, validating a service level agreement(SLA), analyzing use trends, planning facilities, and functional accounting. Data are gathered by means of an RMON probe and an RMON MIB for statistics. To be accurate, statistics require large amounts of data sampling, which create overhead traffic on the network and thus have an impact on its performance. One of the enormous benefits of using an RMON probe for collecting statistical data is that it can be done locally without degrading overall network performance
13.5 Security Management Security management is both a technical and an administrative consideration in information management.It involves securing access to the network and information flowing in the network,access to data stored in the network,and manipulating the data stored and flowing through the network.The scope of the network and access to it not only covers an enterprise intranet network,but also the Internet. Another area of concern in secure communication is the use of mobile stations.You may be familiar with the embarrassing case of a politician's conversation from a car phone being intercepted by a third party traveling in an automobile.Although that was an analog signal, the same thing could happen in the case of a mobile digital station such as a hand-held stock trading device. An intruder could intercept messages and alter trade transactions either to benefit by them or to hurt the person sending or receiving them
13.5 Security Management Security management is both a technical and an administrative consideration in information management. It involves securing access to the network and information flowing in the network, access to data stored in the network, and manipulating the data stored and flowing through the network. The scope of the network and access to it not only covers an enterprise intranet network, but also the Internet. Another area of concern in secure communication is the use of mobile stations. You may be familiar with the embarrassing case of a politician's conversation from a car phone being intercepted by a third party traveling in an automobile. Although that was an analog signal, the same thing could happen in the case of a mobile digital station such as a hand-held stock trading device. An intruder could intercept messages and alter trade transactions either to benefit by them or to hurt the person sending or receiving them