Exercises

  1. What aspects Network management should be secured, and from what attacks?
  2. How would you apply the management model presented here differently to distributed systems, and to networking entities?