Network Management Chapter 8 Semester 3 By Roger Lewis.

Slides:



Advertisements
Similar presentations
Chapter 3: Planning a Network Upgrade
Advertisements

© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 4 1 Chapter 12: Advanced Troubleshooting IT Essentials v5.0.
LANs and WANs Network size, vary from –simple office system (few PCs) to –complex global system(thousands PCs) Distinguish by the distances that the network.
Maintaining and Troubleshooting Computer Systems Computer Technology.
2.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 2: Installing Windows Server.
Cisco – Semester III Documentation. What is it most important component of a good network?  Documentation.
Lesson 3 – UNDERSTANDING NETWORKING. Network relationship types Network features OSI Networking model Network hardware components OVERVIEW.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Institute of Technology, Sligo Dept of Computing Network Management Semester 3, Chapter 8.
Lesson 4-Installing Network Operating Systems. Overview Installing and configuring Novell NetWare 6.0. Installing and configuring Windows 2000 Server.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Chapter 13 Network Management and Operations. Agenda Objectives Scope Functions Software Security Physical Facility Staffing.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
MAINTAINING AND TROUBLESHOOTING COMPUTER SYSTEMS UNIT 6.
Working with Workgroups and Domains
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
Network Management Chapter 18. Objectives Describe how configuration management documentation enables you to manage and upgrade a network efficiently.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Managing Computerised Offices Operating environment
Network Structure Students should be aware of what is available in order to –create and use an ICT network: communication devices.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 12 Windows 2000 Server.
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
Cisco Threaded Case Study
Chapter Fourteen Windows XP Professional Fault Tolerance.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Chapter 13 Troubleshooting and Maintenance Fundamentals.
CHAPTER Windows NT Server Installation. Chapter Objectives Give an overview of the installation process Outline the pre-installation and post- installation.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 4 1 Chapter 12: Advanced Troubleshooting IT Essentials v5.0.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
SYSTEM ADMINISTRATION Chapter 1 Logical and Physical Network Topologies.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Recover Your Data Quickly: Disaster Recovery Techniques with ARCserve  Disaster Recovery.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
Lesson 8—Networking BASICS1 Networking BASICS Managing a Local Area Network Unit 2 Lesson 8.
Chabot College Chapter 8 Review Semester IIIELEC Semester III ELEC
Chapter 13: LAN Maintenance. Documentation Document your LAN so that you have a record of equipment location and configuration. Documentation should include.
PREVENTIVE COMPUTER MAINTENANCE. Preventive Maintenance regular and systematic inspection, cleaning, and replacement of worn parts, materials, and systems.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Help Desk Working at a Small-to-Medium Business or ISP – Chapter 2.
FIT03.05 Explain features of network maintenance.
Cisco S3C8 Network Management. Documentation diagrams that indicate the path of the physical wiring layout; the type of cable; the length of each cable;
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
Install, configure and test ICT Networks
Systems and Network Design Professional Services for NT Server and NetWare Networks.
Copyright 2002Cisco Press: CCNA Instructor’s Manual Year 2 - Chapter 8/Cisco 3 - Module 8 Network Management, Part 1.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 24 Troubleshooting and Maintenance Fundamentals.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Introduction to Networking.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Planning a Network Upgrade Working at a Small-to-Medium Business or.
CHAPTER Network Operating System Concepts. Chapter Objectives Provide an overview of network operating systems and its functions Explain the concept of.
File-System Management
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
Working at a Small-to-Medium Business or ISP – Chapter 8
Guide to Linux Installation and Administration, 2e
Chapter 4: Overview of Preventive Maintenance
Introduction to Operating Systems
Installing OS.
UNIT 19 Data Security 2.
IBM Software Group | Tivoli Brand Software
Diskless network security
Examining a Windows NT Infrastructure (2)
IS4680 Security Auditing for Compliance
PLANNING A SECURE BASELINE INSTALLATION
The Troubleshooting theory
Presentation transcript:

Network Management Chapter 8 Semester 3 By Roger Lewis

Network Management includes: Network Security Network Security Network Documentation Network Documentation Network Maintenance Network Maintenance Environmental Factors Environmental Factors Server Maintenance Server Administration Network Troubleshooting

Documentation includes: Cut-Sheets Diagrams indicating path of physical wiring Diagrams indicating path of physical wiring Type and length of cables Type and length of cables Type of termination of cables Type of termination of cables Physical location of wall plates or patch panels Physical location of wall plates or patch panels A “easy” labeling scheme for cables A “easy” labeling scheme for cables

MDF & IDF Layouts Physical and Logical layout of MDF Physical and Logical layout of MDF Physical and Logical layout of IDFs Physical and Logical layout of IDFs Physical layout of rack mounts, auxiliary equipment, and servers Physical layout of rack mounts, auxiliary equipment, and servers Patch Panel Labels identifying cable terminations Patch Panel Labels identifying cable terminations Identification & Configuration details of equipment in MDFs/IDFs. Identification & Configuration details of equipment in MDFs/IDFs.

Server & Workstation Configurations Details include: Details include: Make & model of computers including: Make & model of computers including: Serial number Serial number Drives (Floppy, DVD/CD-ROM, Hard) Drives (Floppy, DVD/CD-ROM, Hard) Sound & Network Cards Sound & Network Cards Amount of RAM Memory Amount of RAM Memory Details of computer configuration includingDetails of computer configuration including DMA, IRQ, & Base Memory addressDMA, IRQ, & Base Memory address

Software listing for each computer Listing of Standard software including: Listing of Standard software including: Operating System (Windows, Unix, etc) Operating System (Windows, Unix, etc) Any application Software Any application Software Listing of any Special Software Listing of any Special Software

Maintenance Records Important to keep records of all repairs to networking equipment. Important to keep records of all repairs to networking equipment.

Security Measures Soft Security issues including: Soft Security issues including: User rights User rights Password definition Password definition Firewall support Firewall support Physical or Hard Security including: Physical or Hard Security including: How MDF/IDFs are locked How MDF/IDFs are locked Who has access to MDF/IDFs and why Who has access to MDF/IDFs and why How hosts are protected (security cables-alarms) How hosts are protected (security cables-alarms) Who has access to systems Who has access to systems

User Policies How do users interact with Network? How do users interact with Network? What is permissible? What isn’t? What is permissible? What isn’t? What are the consequences of violating policies? What are the consequences of violating policies? What is minimum User ID & Password length? What is minimum User ID & Password length? What are the rules for Users Passwords? What are the rules for Users Passwords? Does management buy into the policies? Does management buy into the policies?

Network Documentation Must be updated to be useful Must be updated to be useful Include changes to software and hardware Include changes to software and hardware Don’t forget upgrades Don’t forget upgrades

Network Access Keep network safe from unauthorized access. Keep network safe from unauthorized access. Establish security policies Establish security policies Ensure users understand and follow security policies Ensure users understand and follow security policies

Network Access Recover data from catastrophic events Recover data from catastrophic events Tape Backup of Data Tape Backup of Data Fault tolerant disk configurations Fault tolerant disk configurations Use of UPS Use of UPS

Backup Operations 1. Full Backup* 2. Incremental Backup* 3. Differential Backup* 4. Copy Backup 5. Daily Backup * Most widely used

Users workstation backup Individual Tape drive Individual Tape drive Copy data to ZIP or Floppy disk drives Copy data to ZIP or Floppy disk drives Create user directory on servers for users data Create user directory on servers for users data

Redundancy Technique RAID RAID Raid 0* Raid 0* Raid 1* Raid 1* Raid 2 Raid 2 Raid 3 Raid 3 Raid 4 Raid 4 Raid 5* Raid 5* * Supported by most OS

Environmental Factors Follow owner’s manuals when installing equipment Follow owner’s manuals when installing equipment Take care to prevent ESD Take care to prevent ESD Keep area clear of dirt and dust Keep area clear of dirt and dust No Smoking No Smoking Keep equipment cool Keep equipment cool Keep equipment supported Keep equipment supported

Power Conditioning Put network & computer equipment on separate electric circuits Put network & computer equipment on separate electric circuits Isolating transformers Isolating transformers Regulators Regulators Line Conditioners Line Conditioners UPS UPS

EMI & RFI EMI can be caused by: EMI can be caused by: Power supplies and monitors Power supplies and monitors Fluorescent lights Fluorescent lights Large Electric motors and electric wiring Large Electric motors and electric wiring RFI can be caused by: RFI can be caused by: Improperly shielded cables Improperly shielded cables Other equipment Other equipment

Software Viruses WORM WORM VIRUS VIRUS Trojan Horse Trojan Horse Prevent these by: 1. Being careful about install software you don’t know where it came from. 2. Be careful of other users on your equipment with their own software. 3. Use virus checker

Network Performance Network performance is a measurement of network’s quickness and reliability. Network performance is a measurement of network’s quickness and reliability. Establish a baseline Establish a baseline Network Utilization percentage Network Utilization percentage Collision counts Collision counts Frame errors Frame errors Broadcast traffic Broadcast traffic

Server Administration Peer-to-Peer Network Peer-to-Peer Network Up to 10 users on network Up to 10 users on network Cheaper to create and operate network Cheaper to create and operate network Allows users to control their own resources Allows users to control their own resources No dedicated server required No dedicated server required No Additional software is required No Additional software is required Disadvantages include: Disadvantages include: No central point of management No central point of management Users create Ids for other users if sharing resources Users create Ids for other users if sharing resources If resource goes down, no one then has access to it If resource goes down, no one then has access to it

Server Administration cont Client-Server Network Client-Server Network NOS is heart of system NOS is heart of system Control the resources and management of LAN Control the resources and management of LAN Provides a centralized point of user, security, and resource management. Provides a centralized point of user, security, and resource management. Dedicated Servers provide specific resources to clients Dedicated Servers provide specific resources to clients Provides access to all allowed resources with one network ID and password Provides access to all allowed resources with one network ID and password Disadvantage is single point of failure. Disadvantage is single point of failure.

Client-Server OS UNIX UNIX Novell Netware Novell Netware Windows NT Windows NT Windows 2000 Windows 2000

Network Control Login Account Login Account User Rights User Rights Assigning Users to groups Assigning Users to groups Assigning rights and permissions to the group Assigning rights and permissions to the group User profiles (Roaming, Mandatory or Local Profile) User profiles (Roaming, Mandatory or Local Profile) Policies Policies

Network Troubleshooting Use Dartmouth Design Matrix Use Dartmouth Design Matrix Scientific Method Scientific Method 1. Identify network/user problem 2. Gather data network/user problem 3. Analyze data to come up with possible solution 4. Implement solution 5. If problem isn’t resolve, undo changes and modify data 6. Go to step 3

Analyze Network Troubleshooting Always check the easy stuff first! Always check the easy stuff first! Determine if anything change recently which might be causing the problem. Determine if anything change recently which might be causing the problem. Determine if the problem is hardware, software, or the network. Determine if the problem is hardware, software, or the network. Once solve, document the solution. Once solve, document the solution.

Network Management The End