28
Institute of Technology, Sligo Dept of Computing Network Management Network Management Semester 3, Chapter 8 Semester 3, Chapter 8

Network Management

Embed Size (px)

DESCRIPTION

Network Management. Semester 3, Chapter 8. LAN Management. This chapter deals mainly with the management of LANs. Although the content is not covered on the CCNA exam, it is covered on the Comp TIA Net+ exam. In addition, network management is when the real work begins for a net admin. - PowerPoint PPT Presentation

Citation preview

Institute of Technology,Sligo Dept of Computing

Network ManagementNetwork Management

Semester 3, Chapter 8Semester 3, Chapter 8

LAN ManagementLAN Management This chapter deals mainly with the management of This chapter deals mainly with the management of

LANs. Although the content is not covered on the LANs. Although the content is not covered on the CCNA exam, it is covered on the Comp TIA Net+ exam.CCNA exam, it is covered on the Comp TIA Net+ exam.

In addition, network management is when the real work In addition, network management is when the real work begins for a net admin. begins for a net admin.

Topics covered include:Topics covered include: DocumentationDocumentation SecuritySecurity Network PerformanceNetwork Performance Server AdministrationServer Administration TroubleshootingTroubleshooting

Institute of Technology,Sligo Dept of Computing

Network DocumentationNetwork Documentation

DocumentationDocumentation Documenting the network, including:Documenting the network, including:

Cut sheet diagramsCut sheet diagrams MDF & IDF layoutsMDF & IDF layouts Server/workstation configurationsServer/workstation configurations Software installedSoftware installed Maintenance recordsMaintenance records Security & user policiesSecurity & user policies

...is the most critical component of good network ...is the most critical component of good network management.management.

Documentation is also the least implemented Documentation is also the least implemented component of network administration.component of network administration.

MDF & IDF LayoutsMDF & IDF Layouts

The Physical and Logical layouts of all The Physical and Logical layouts of all wiring closets includes:wiring closets includes: physical location of rack mounts, equipment physical location of rack mounts, equipment

and serversand servers patch panel labeling scheme for identifying patch panel labeling scheme for identifying

cable terminationscable terminations Configuration details of all equipmentConfiguration details of all equipment

Server/Workstation ConfigurationsServer/Workstation Configurations

Includes details about:Includes details about: Hardware specificationsHardware specifications

Make & modelMake & model Number & type of drivesNumber & type of drives Cards installedCards installed

Physical location & Logical addressingPhysical location & Logical addressing IP and MAC addressIP and MAC address SubnetSubnet TopologyTopology

Purchase date and warranty informationPurchase date and warranty information

Software & Maintenance RecordsSoftware & Maintenance Records

Software listings include:Software listings include: All software installed on each computerAll software installed on each computer The standard configuration used for each type The standard configuration used for each type

of workstationof workstation Operating system informationOperating system information

Maintenance records assist net admin to Maintenance records assist net admin to anticipate potential problems and include:anticipate potential problems and include: All repairs and upgrades made to a computerAll repairs and upgrades made to a computer

Security & User DocumentsSecurity & User Documents Physical SecurityPhysical Security

How are MDFs & IDFs lockedHow are MDFs & IDFs locked Who has access to MDFs & IDFsWho has access to MDFs & IDFs How are host devices protected (security cables, etc.)How are host devices protected (security cables, etc.)

Soft SecuritySoft Security User policies & rights outlining what is and what is not User policies & rights outlining what is and what is not

permissible on the networkpermissible on the network Password protectionPassword protection Firewall supportFirewall support

Institute of Technology,Sligo Dept of Computing

Network SecurityNetwork Security

SecuritySecurity

Network security includes two major Network security includes two major components:components: Controlling AccessControlling Access Data Protection and RecoveryData Protection and Recovery

AccessAccess The network policy established during the The network policy established during the

documentation phase determines the criteria used documentation phase determines the criteria used to select passwords, such as:to select passwords, such as: password lengthpassword length aging of passwordsaging of passwords time of day access is allowedtime of day access is allowed

Acceptable Use Policies make sure users are Acceptable Use Policies make sure users are aware of the company’s definition of what is aware of the company’s definition of what is allowed and not allowed on the network. It also allowed and not allowed on the network. It also normally includes consequences for violation of the normally includes consequences for violation of the policy.policy.

Data RecoveryData Recovery Data recovery, the second component of Data recovery, the second component of

security, involves protecting data from losssecurity, involves protecting data from loss Methods for protecting data include:Methods for protecting data include:

Tape backupTape backup Fault toleranceFault tolerance Controlling Environmental FactorsControlling Environmental Factors Power ConditioningPower Conditioning Preventing Virus CorruptionPreventing Virus Corruption

Tape BackupTape Backup Magnetic tapes are the most popular media used Magnetic tapes are the most popular media used

for backing up data because of the cost and for backing up data because of the cost and capacity.capacity. They are much cheaper than removable hard drivesThey are much cheaper than removable hard drives

Tape backups record and restore data sequentially. Tape backups record and restore data sequentially. This can make it difficult to find a particular file. This can make it difficult to find a particular file.

However, tape backups are used to fully restore all However, tape backups are used to fully restore all lost data.lost data.

Most Tape Backup systems use an archive bit set Most Tape Backup systems use an archive bit set to on or off. If the bit is on, then the data has been to on or off. If the bit is on, then the data has been changed since the last backup.changed since the last backup.

Types of Tape Backup SystemsTypes of Tape Backup Systems Several options are available when using tapes.Several options are available when using tapes.

Full backupFull backup--all files are backed up periodically--all files are backed up periodically Incremental and Differential backupsIncremental and Differential backups--uses an archive --uses an archive

bit to determine if a file has been created or modified bit to determine if a file has been created or modified since the last full backup since the last full backup

Copy backupCopy backup--backs up user selected data to tape--backs up user selected data to tape Daily backupDaily backup--backs up data created or modified for --backs up data created or modified for

that daythat day

Fault ToleranceFault Tolerance Fault tolerance involves establishing redundancy Fault tolerance involves establishing redundancy

techniques to keep a system up and running when a techniques to keep a system up and running when a failure occurs.failure occurs.

RAID (Redundant Array of Inexpensive Disks)RAID (Redundant Array of Inexpensive Disks) RAID 0--stripes data across multiple disk; no redundancyRAID 0--stripes data across multiple disk; no redundancy RAID 1--(mirroring) provides redundancy by writing all data to RAID 1--(mirroring) provides redundancy by writing all data to

two or more drivestwo or more drives RAID 2--no longer used because of expenseRAID 2--no longer used because of expense RAID 3/4--stores parity on one disk; 3 stripes at the byte level RAID 3/4--stores parity on one disk; 3 stripes at the byte level

and 4 stripes at the block level across remaining disks.and 4 stripes at the block level across remaining disks. RAID 5--similar to 3/4 but stripes data with parity across RAID 5--similar to 3/4 but stripes data with parity across

multiple drives. Requires at least 3 drives. 5 drives is ideal.multiple drives. Requires at least 3 drives. 5 drives is ideal.

Environmental FactorsEnvironmental Factors Electrical Static Discharge can approach 20,000 volts Electrical Static Discharge can approach 20,000 volts

and fry sensitive computer componentsand fry sensitive computer components Protect against by grounding yourself using grounding Protect against by grounding yourself using grounding

strap before working on computersstrap before working on computers Dust and dirt should be avoided. Periodically clean Dust and dirt should be avoided. Periodically clean

keyboards, monitors, and towerskeyboards, monitors, and towers Avoid excessive heatAvoid excessive heat Follow TIA/EIA 568A standards to avoid EMI and RFI Follow TIA/EIA 568A standards to avoid EMI and RFI

noisenoise For example, Shielded Twisted Pair (STP) cable is a For example, Shielded Twisted Pair (STP) cable is a

possible solution to prevent EMI/RFI corruption of data.possible solution to prevent EMI/RFI corruption of data.

Power ConditioningPower Conditioning Power conditioning is the process of Power conditioning is the process of

implementing procedures to control the power implementing procedures to control the power supplied to your network. They include:supplied to your network. They include: Isolating TransformerIsolating Transformer--to control voltage spikes and --to control voltage spikes and

high frequency noisehigh frequency noise RegulatorsRegulators--to maintain a constant level of voltage--to maintain a constant level of voltage Line ConditionerLine Conditioner--an isolating transformer/regulator --an isolating transformer/regulator

combination.combination. Uninterruptible Power SupplyUninterruptible Power Supply--maintains a charged --maintains a charged

battery to supply voltage to devices in the event of a battery to supply voltage to devices in the event of a power failure.power failure.

Software VirusesSoftware Viruses Preventing software viruses is the final topic under Preventing software viruses is the final topic under

network security. Types include:network security. Types include: WormWorm--a program that spreads across computers and usually --a program that spreads across computers and usually

reproduces copies of itself in a computer’s memoryreproduces copies of itself in a computer’s memory VirusVirus--a program that usually has a negative effect on --a program that usually has a negative effect on

executable programsexecutable programs Trojan HorseTrojan Horse--destructive program disguised as a game, --destructive program disguised as a game,

utility or other applicationutility or other application Preventing viruses includes...Preventing viruses includes...

Know where your data is coming fromKnow where your data is coming from Avoid allowing others to use floppies on your computerAvoid allowing others to use floppies on your computer Maintain updated virus checking softwareMaintain updated virus checking software

Institute of Technology,Sligo Dept of Computing

Network PerformanceNetwork Performance

Monitoring the NetworkMonitoring the Network Part of documenting the network is establishing Part of documenting the network is establishing

baselines for the various performance issues baselines for the various performance issues including...including... Bandwidth utilizationBandwidth utilization Collision countsCollision counts Broadcast trafficBroadcast traffic

A baseline sets the acceptable performance of A baseline sets the acceptable performance of the network, but must be updated as the network the network, but must be updated as the network is updated or expanded.is updated or expanded.

Institute of Technology,Sligo Dept of Computing

Server AdministrationServer Administration

Types of NetworksTypes of Networks Peer-to-Peer NetworksPeer-to-Peer Networks

Also known as a Workgroup Network, it is designed for Also known as a Workgroup Network, it is designed for a small number of users.a small number of users.

No more than 10 devices should be on one peer-to-No more than 10 devices should be on one peer-to-peer network.peer network.

Advantages: relatively easy to configure, users control Advantages: relatively easy to configure, users control resources, no dedicated server neededresources, no dedicated server needed

Disadvantages: no central managementDisadvantages: no central management Client-Server NetworksClient-Server Networks

Uses a dedicated server running a NOS to control Uses a dedicated server running a NOS to control resources and manage the network.resources and manage the network.

Types of Client-Server NOSsTypes of Client-Server NOSs UNIXUNIX

Open standard with proprietary versions Open standard with proprietary versions offered by HP, IBM, and Sun (among others) offered by HP, IBM, and Sun (among others) as well as a free versions (FreeBSD and as well as a free versions (FreeBSD and Linux).Linux).

Multi-user, multi-tasking environment using Multi-user, multi-tasking environment using NFS security.NFS security.

Kernel based which isolates the hardware Kernel based which isolates the hardware layer from improperly operating applications. layer from improperly operating applications.

Types of Client-Server NOSsTypes of Client-Server NOSs NetWareNetWare

various versions as discussed in Ch. 7various versions as discussed in Ch. 7 uses two file services: FAT and DETuses two file services: FAT and DET

Windows NTWindows NT uses domains to control services with a uses domains to control services with a

Primary Domain Controller and Backup Primary Domain Controller and Backup Domain ControllerDomain Controller

Similar to UNIX except uses a different file Similar to UNIX except uses a different file system structuresystem structure

Institute of Technology,Sligo Dept of Computing

Network TroubleshootingNetwork Troubleshooting

Scientific MethodScientific Method Network troubleshooting is a systematic process Network troubleshooting is a systematic process

that uses the scientific method:that uses the scientific method:1.1. Identify the network/user problemIdentify the network/user problem

2.2. Gather data about the network/user problemGather data about the network/user problem

3.3. Analyze data and come up with possible solutionsAnalyze data and come up with possible solutions

4.4. Choose and implement best solutionChoose and implement best solution

5.5. Evaluate solution’s success and modify data Evaluate solution’s success and modify data collected, if necessarycollected, if necessary

6.6. If problem still exists, return to Step 3.If problem still exists, return to Step 3.

Typical Troubleshooting ScenarioTypical Troubleshooting Scenario

1.1. User calls and says he can’t access the network User calls and says he can’t access the network (problem identified).(problem identified).

2.2. Gather data by asking the user questions, Gather data by asking the user questions, checking logs, and hardware configurations.checking logs, and hardware configurations.

3.3. Analyze the data collected to determine possible Analyze the data collected to determine possible solutions. Check the physical layer by pinging the solutions. Check the physical layer by pinging the user. If unsuccessful, ping the NIC from the the user. If unsuccessful, ping the NIC from the the user’s computer using the loopback address: user’s computer using the loopback address: 127.0.0.1. Continue to ping along the network to 127.0.0.1. Continue to ping along the network to find problem. If no problem, then check software.find problem. If no problem, then check software.

Typical Troubleshooting Typical Troubleshooting ScenarioScenario

4.4. Implement the best solution to solve the Implement the best solution to solve the problem.problem.

5.5. Evaluate the implemented solution to see Evaluate the implemented solution to see if the problem has been solved. If not, if the problem has been solved. If not, return to Step 3.return to Step 3.