KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Network Management Unit 4 Course Name – IT Network Management Instructor – Jan McDanolds, MS, Security+ Contact Information: AIM – JMcDanolds – Office Hours: Tuesday, 7:00 PM ET or Wednesday, 8:00 PM ET
UNIT 3 REVIEW What was covered in Chapter 5 and 6 Fault Detection and Correction and Accounting and Billing F - Fault detection and correction C - Configuration and operation A - Accounting and billing P - Performance assessment and optimization S - Security assurance and protection
UNIT 4 Chapter 7 and Chapter 8 Chapter 7 (Performance Assessment and Optimization) and Chapter 8 (Security) – Last two in FCA PS Performance Assessment – how resources are currently being used and long-term trends, capacity Security – “there is no such thing as a secure computer network” Management goals – protection of resources, control of access and guarantee of confidentiality and safety
UNIT 4 Aspects of Performance What to measure? How to obtain measurements? What to do with the measurements? What can be measured: individual links, network elements, network services and applications Measures: latency, throughput, packet loss, jitter and availability
UNIT 4 Application and Endpoint Sensitivity Not easily measured – end user perception Application sensitivity – remote login, voice (VoIP) or file transfer. Various needs – high throughput, low latency, low jitter, etc. Not one measurement, different paths and equipment
UNIT 4 Congestion Degraded service – from baseline including latency, throughput, lose, and jitter. Also, nonoptimal routes or route flapping. Congestion – high burst rate, queue fills Equation – D = D divided by increase in utilization (if utilization approaches 100%, congestion causes delay)
UNIT 4 Local vs End-to-End Measurements Local – single resources, link, or element End-to-End – behavior of application across the entire network. Not just a calculation of each element/link
UNIT 4 Passive Observation vs Active Probing Passive observation – nonintrusive mechanism to obtain measurements without affecting the network or the traffic. Mostly local. Active probing – intrusive because the probes add additional traffic. Measures end-to-end performance.
UNIT 4 Bottlenecks and Future Planning Two types of performance optimization: - Optimize current network performance (identify bottlenecks - Optimize future network performance (anticipate future needs for throughput, latency, etc. and integrate new equipment/topology)
UNIT 4 Capacity Planning “Capacity planning requires a manager to estimate the size of resources that will be needed to meet anticipated load, taking into account a desired level of performance, a desired level of robustness and resilience, and a bound on cost.” Measurements, guess work, a crystal ball and gut feelings.
UNIT 4 Capacity Planning Six steps: #1 Use measurement of the current network and forecasting to device an estimate of expected load #2 Translate the expected load into a model that can be used with capacity planning software #3 Use the load model plus a description of network resources to compute resource utilization estimates and validate the results #4 Propose modifications to the network topology or routing and compute the new resource utilization estimates. #5 Use resource utilization estimates to derive estimates on the performance needed from network elements and links #6 Use performance estimates to make recommendations for capacity increases and the resulting costs.
UNIT 4 Security The “S” in FCAPS Security as a continual process: Assess potential risks Establish policies to avoid risk Evaluate technologies and mechanisms Deploy appropriate procedures and technologies Measure effective solutions Pg. 98 Security Terminology – Identity, Authentication, Authorization, Data Integrity, Privacy and Confidentiality, and Encryption
UNIT 4 Security Management goals relating to security: protection of resources, control of access and guarantee of confidentiality and safety Risk Assessment: ease-of-use versus risk of misuse Security Policies: documented guidelines for the organization. Statements may focus on personnel, procedures, required handling of data, or results of misuse
UNIT 4 Security Basic Technologies Used: - Encryption technologies - Perimeter control technologies - Content control technologies Security of the Network “In addition to technologies that protect the network itself, a manager needs to find ways to check changes that personnel make because many security problems arise from human error.” Access Control, Audit Trails and Security Logging, and Encryption Key Management provide mechanisms to manage tasks and team members
UNIT 4 OPNet IT Guru Download and install OPNet IT Guru You will need to copy the License Approval Code and paste it into the box. Download the IT475-Manuals.zip file from Doc Sharing Follow the instructions in the to get the lab files installed in a directory.
UNIT 4 Unit 4 Readings Chapter 7 and 8 In Automated Network Management Systems ALSO: Download and install OPNET IT Guru Academic Edition
UNIT 4 Unit 4 Assignment Be sure to do screen captures! any questions: Or you can call me
UNIT 4 Unit 4 Assignments Download the two chapters and Manuals.zip (labs) from Doc Sharing Download and install OPNET IT Guru Read the two chapters Post to Discussion (three topics) Attend Seminar or do alternate essay Complete Assignment using OPNet (show screen captures)