Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.

Slides:



Advertisements
Similar presentations
Ethernet Switch Features Important to EtherNet/IP
Advertisements

Chapter 1: Introduction to Scaling Networks
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Introducing Campus Networks
Chapter 19: Network Management Business Data Communications, 5e.
CIS : Network Management. Introduction Network, associated resources and distributed applications indispensable Complex systems —More things can.
Telecommunications Management /635 Network Management.
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
Introduction to Network Analysis and Sniffer Pro
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Prototyping the WAN Designing and Supporting Computer Networks – Chapter 8.
Implementing a Highly Available Network
Chapter 19: Network Management Business Data Communications, 4e.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Monitoring a Large-Scale Network: Selecting the Right Tool Sayadur Rahman United International University & Network Manager, Financial Service.
Network Management 2 School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 16, Thursday 4/19/2007)
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Network Management Management Tools –Desirable features Management Architectures Simple Network Management Protocol.
Guide to TCP/IP, Third Edition Chapter 11: Monitoring and Managing IP Networks.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—-6-1 Network Environment Management Discovering Neighbors on the Network.
Nov 9, 2006 IT 4333, Fall IT 4333 – Network Admin & Management RMON From: Byte Magazine, Javvin.com, Cisco.com, Wikipedia, and IETF.
Remote Monitoring and Desktop Management Week-7. SNMP designed for management of a limited range of devices and a limited range of functions Monitoring.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
CIS 460 – Network Analysis and Design Chapter 3 – Characterizing the Existing Internetwork.
1.  TCP/IP network management model: 1. Management station 2. Management agent 3. „Management information base 4. Network management protocol 2.
Chapter 14 Network Management Business Aspects Architectures Technology.
CIS460 – NETWORK ANALYSIS AND DESIGN
1. 2 How do I verify that my plant network is OK? Manually: Watch link lights and traffic indicators… Electronically: Purchase a SNMP management software.
ITEC 275 Computer Networks – Switching, Routing, and WANs
1/28/2010 Network Plus Unit 5 Section 2 Network Management.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Characterizing the Existing Internetwork PART 1
Robert E. Meyers CCNA, CCAI Youngstown State University Manager, Cisco Regional Academy Cisco Networking Academy Program Semester 4, v Chapter 7:
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
1. There are different assistant software tools and methods that help in managing the network in different things such as: 1. Special management programs.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Discovery 2 Internetworking Module 5 JEOPARDY John Celum.
Network Monitoring Chapter 20.
Chapter 6 – Connectivity Devices
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
Chapter 19: Network Management Business Data Communications, 4e.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Exploring the Enterprise Network Infrastructure Introducing Routing and Switching.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
Chapter 3  Network Implementation and Management Strategies 1 Chapter 3 Overview  Why is a network implementation strategy necessary?  Why is network.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
CCDA DESCRIBE THE METHODOLOGY USED TO DESIGN A NETWORK.
Top-Down Network Design Chapter One Analyzing Business Goals and Constraints Copyright 2004 Cisco Press & Priscilla Oppenheimer.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Network Management CCNA 4 Chapter 7. Monitoring the Network Connection monitoring takes place every day when users log on Ping only shows that the connection.
RMON 1. RMON is a set of standardized MIB variables that monitor networks. Even if RMON initially referred to only the RMON MIB, the term RMON now is.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
© 2002, Cisco Systems, Inc. All rights reserved..
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Chapter 19: Network Management
TCP/IP (Original) Application Transport Internet Network Access TCP/IP
Chapter 14 Network Management
RMON.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Network Administration CNET-443
Network Monitoring System
Chapter 8: Monitoring the Network
Data collection methodology and NM paradigms
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer

Network Management Helps an organization achieve availability, performance, and security goals Helps an organization measure how well design goals are being met and adjust network parameters if they are not being met Facilitates scalability –Helps an organization analyze current network behavior, apply upgrades appropriately, and troubleshoot any problems with upgrades

Network Management Design Consider scalability, traffic patterns, data formats, cost/benefit tradeoffs Determine which resources should be monitored Determine metrics for measuring performance Determine which and how much data to collect

Proactive Network Management Plan to check the health of the network during normal operation, not just when there are problems Recognize potential problems as they develop Optimize performance Plan upgrades appropriately

Network Management Processes According to the ISO Fault management Configuration management Accounting management Performance management Security management

Fault Management Detect, isolate, diagnose, and correct problems Report status to end users and managers Track trends related to problems

Configuration Management Keep track of network devices and their configurations Maintain an inventory of network assets Log versions of operating systems and applications

Accounting Management Keep track of network usage by departments or individuals Facilitate usage-based billing Find abusers who use more resources than they should

Performance Management Monitor end-to-end performance Also monitor component performance (individual links and devices) Test reachability Measure response times Measure traffic flow and volume Record route changes

Security Management Maintain and distribute user names and passwords Generate, distribute, and store encryption keys Analyze router, switch, and server configurations for compliance with security policies and procedures Collect, store, and examine security audit logs

Network Management Components A managed device is a network node that collects and stores management information An agent is network-management software that resides in a managed device A network-management system (NMS) runs applications to display management data, monitor and control managed devices, and communicate with agents

Network Management Architecture NMS Management Database Agent Management Database Agent Management Database Agent Managed Devices

Architecture Concerns In-band versus out-of-band monitoring –In-band is easier to develop, but results in management data being impacted by network problems Centralized versus distributed monitoring –Centralized management is simpler to develop and maintain, but may require huge amounts of information to travel back to a centralized network operations center (NOC)

Simple Network Management Protocol (SNMP) Most popular network management protocol SNMPv3 should gradually supplant versions 1 and 2 because it offers better authentication SNMP works with Management Information Bases (MIBs)

Remote Monitoring (RMON) Developed by the IETF in the early 1990s to address shortcomings in standard MIBs –Provides information on data link and physical layer parameters –Nine groups of data for Ethernet –The statistics group tracks packets, octets, packet-size distribution, broadcasts, collisions, dropped packets, fragments, CRC and alignment errors, jabbers, and undersized and oversized packets

Cisco Tools Cisco Discovery Protocol –With the show cdp neighbors detail command, you can display detailed information about neighboring routers and switches, including which protocols are enabled, network addresses for enabled protocols, the number and types of interfaces, the type of platform and its capabilities, and the version of Cisco IOS Software running on the neighbor. NetFlow Accounting –An integral part of Cisco IOS Software that collects and measures data as it enters router or switch interfaces

Summary Determine which resources to monitor, which data about these resources to collect, and how to interpret that data Develop processes that address performance, fault, configuration, security, and accounting management Develop a network management architecture Select management protocols and tools

Review Questions Why is network management design important? Define the five types of network management processes according to the ISO. What are some advantages and disadvantages of using in-band network management versus out-of-band network management? What are some advantages and disadvantages of using centralized network management versus distributed network management?