Chapter 11 Managing a Network

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

June 2010 At A Glance The Room Alert Adapter software in conjunction with AVTECH Room Alert™ devices assists in monitoring computer room environments as.
Lesson 22. Networking Tools. Objective At the end of this Presentation, you will be able to:
Network+ Guide to Networks 5 th Edition Chapter 13 Troubleshooting Network Problems.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Introduction to Network Analysis and Sniffer Pro
Chapter 19: Network Management Business Data Communications, 4e.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Lesson 3 – UNDERSTANDING NETWORKING. Network relationship types Network features OSI Networking model Network hardware components OVERVIEW.
Chapter 15 Chapter 15: Network Monitoring and Tuning.
Network+ Guide to Networks, Fourth Edition
Chapter 12: Troubleshooting Networking Problems Network+ Guide to Networks Third Edition.
Maintaining and Updating Windows Server 2008
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 14: Troubleshooting Windows Server 2003 Networks.
© Folens 2008 Transfer of data in ICT systems Using ICT networks.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
ISDS SearchFeeling Techie? Da’John Dickerson Alathea Pacquet Kevin Tran Troubleshooting Tools.
PPT Networks, Network operating systems. PPT Networking - Basics Network defined Network defined The difference between Standalone and networked.
Click to edit Master subtitle style Chapter 18: Software and Hardware Tools Instructor:
11 SYSTEMS ADMINISTRATION AND TERMINAL SERVICES Chapter 12.
The physical network Unit objective: Identify network cables and connectors, and use networking tools.
Software and Hardware Tools COMP 316. Software Tools.
Hands-on Networking Fundamentals
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Network Design Essentials
Characterizing the Existing Internetwork PART 1
Troubleshooting Tools Cable Performance Testers Voltage Event Recorders Butt Set Crossover Cable Tone Generator & Locator Multimeter Cable Continuity Tester.
Common Devices Used In Computer Networks
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
BAI513 - PROTOCOLS SNMP BAIST – Network Management.
 Spring 2011  CSCI 27 Computer Networking Course Overview.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
Chapter 6 – Connectivity Devices
Module 3: Networking Media Safe Handling and User of a Multimeter Voltage Measurement Resistance Measurement Series Circuits 3.1.9a.
Intro to Network Design
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Network Troubleshooting
Wired and Wireless Networks Chapter 12. Topics General Characteristics for: –Carrier, Speed, Frequency, Transmission type, and Topology Factor that affect:
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Network Management CCNA 4 Chapter 7. Monitoring the Network Connection monitoring takes place every day when users log on Ping only shows that the connection.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Introduction to Computer Networks Introduction to Computer Networks.
Troubleshooting Tools Kyle Broussard and Alexandra Mikolai.
Troubleshooting Network Problems
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
CEG 2400 FALL 2012 Chapter 13 Troubleshooting Network Problems 1.
Lec4: Troubleshooting Network Problems Network+ Guide to Networks 5 th Edition Chapter 13 Troubleshooting Network Problems Organized by: Nada Alhirabi.
Click to edit Master subtitle style Chapter 18: Software and Hardware Tools.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Use appropriate tools for network cabling and connections. Objective – 2%
Class A, B, and now N NFPA 72, 2016 Edition Dan Horon President
Click to edit Master subtitle style
CompTIA Network+ N Authorized Cert Guide
Chapter Objectives In this chapter, you will learn:
Chapter 2: Introduction to Lab Procedures and Tool Use
Industrial communication networks
Instructor Materials Chapter 8: Network Troubleshooting
Transfer of data in ICT systems
Troubleshooting Tools
Network+ Guide to Networks 5th Edition
Troubleshooting Network Communications
Computer Technology Notes #4
Unit 27: Network Operating Systems
DIAGNOSING PHYSICAL PROBLEMS
Chapter 15: Network Monitoring and Tuning
Presentation transcript:

Chapter 11 Managing a Network CompTIA Network + Chapter 11 Managing a Network

Objectives What are some of the more common tools used to physically maintain a network? What components are involved in configuration management? What sorts of networking monitoring tools are available to network administrators, and what type of information are included in various logs?

Managing a Network Even with a network’s increasing dependence on wireless technologies, physical cabling still comprises the critical backbone of a network. A network management, monitoring, and troubleshooting require a familiarity with variety of cable maintenance tools. Another key network-management element is documentation.

Maintenance Tools The number of troubleshooting issues occurring in a network can be reduced by proper installation and configuration of the media and devices. A network administrator, need to be familiar with a collection of maintenance tools to help diagnose, isolate, and resolve the wiring issue.

Bit-Error Rate Tester The bit-error rate tester is used to make sure that the cable can past data with out and errors. Figure 11-1 Bit-Error Rate Tester (BERT) (Photo Courtesy of BBN International [ www.bbnint.co.uk ])

Butt Set Used by telephone technicians Connects to punch- down block Lets the technician butt into a phone call in progress To check the phone lines when troubleshooting connections

Cable Certifier The cable certifier is used by the cable installation technician to verify that a newly installed network cable works correctly. The cable certifier insures that the cable operates at the correct speeds.

Cable Tester The cable tester is used by the cable installation technician to test the continuity of the cable. It verifies that the correct pairs are connected together.

Connectivity Software When you are physical separated from the network you are maintaining or troubleshooting, you might be able to access the network through remote connectivity software Examples, RealVNC, GoToMyPC, Remote Desktop Protocol, TeamViewer, LogMeIn Figure 11-2 Microsoft’s Remote Desktop Connection

Crimper The crimper is use to make the cables. It attaches the RJ-45 ends to the cable. Figure 11-3 Crimper

Electrostatic Discharge Wrist Strap The ESD wrist strap is used to protect the equipment from ESD while you are working in it.

Environmental Monitor A environmental monitor , monitors the temperature and humidity in the server room, alerting the network administrator if ether our out of tolerance.

Loopback Plug A loopback plug allows you to troubleshoot your NIC, to see if it working correctly. Figure 11-4 Fiber-Optic Loopback Plug (Photo Courtesy of Digi-Key Corporation [ www.digikey.com ])

Multimeter When working with copper cabling, a multimeter can check a variety of a cable’s electrical characteristics. These characteristics include; Resistance (Ohms) Current (Amps) Voltage (Volts) Figure 11-5 Multimeter

Protocol Analyzer A protocol analyzer can be a standalone device or software running on a computer. You use a protocol analyzer to capture traffic flowing through a network. By examining the captured packets, you can discern the details of communication flows (session) as they are being setup, maintained, and torn down. Protocol Analyzer is also known as a network sniffer.

Figure 11-6 Wireshark Protocol Analyzer Software

Punch-Down Tool This tool terminating wires on a punch-down block, an insulated wire is inserted between two contact blades. These blades cut through the insulation and make electrical contact with the inner wire. As a result, you do not have to strip off the insulation.

Throughput Tester Figure 11-7 Throughput Tester (Photo Courtesy of NSS Labs [ www.nsslabs.com ])

Time Domain Reflectometer Optical Time Domain Reflectometer Figure 11-8 Optical Time Domain Reflectometer (Photo Courtesy of Coral-i Solutions [ www.coral-i.com ])

Toner and Probe A toner probe allows you to place a tone generator at one end of a connection, and use the probe on a punch down block to audibly detect to which pair of wires the tone generator is connected. Also known as a fox and hound

Configuration Management Configuration Management (CM) focuses on maintaining up-to-date documentation of network’s configuration. CM encompasses a variety of procedures, including the following: Asset Management Baselining Cable Management Change Management Network Documentation Contact information Policies Network Maps Wiring Schematics

Monitoring Resources and Reports Networks administrators routinely monitor network resources and review reports to be proactive in their administration. Monitoring resources and reports come from various sources, such as a syslog server, a Simple Network Management Protocol (SNMP) server, Event Viewer logs or packet captures from a network sniffer. SNMP – manage network nodes, such as network servers, routers, switches and hubs.

SNMP v1 & 2 Figure 11-9 SNMPv1 and SNMPv2c Network-Management Components and Messages Trap: Unsolicited message about a significant event Insecure cleartext transmission of community strings (passwords)

Figure 11-10 SNMPv3 Entities Much better security

SNMP v3

Syslog A variety of network components can send their log information to a common syslog server. By having log information for multiple devices in a common log, network administrators can better correlate events. Syslog-logging solution consists of two primary components: Syslog server Syslog clients

Figure 11-11 Sample Syslog Clients

Syslog Level Name Description Emergencies Emergencies The most severe error conditions, which render the system unusable 1 Alerts Conditions requiring immediate attention 2 Critical A less severe condition, as compared to alerts, which should be addressed to prevent and interruption of service 3 Errors Notifications about error conditions within the system, which do not render the system unusable 4 Warnings Notifications that specific operations failed to complete successfully 5 Notifications Non-errors notifications that alert an administrator about state changes within a system 6 Informational Detailed information about the normal operation of a system 7 Debugging Highly detailed information (for example, information about individual packets), which is typically used for troubleshooting

Figure 11-12 Structure of a Syslog Message

Logs In addition to logs generated by routers, switches, and other infrastructure gear, the operating systems powering network clients and servers generally have the capability to produce log outputs. Microsoft Windows incorporates an Event Viewer application that allows you to view the following logs; Application Security System

Figure 11-13 Application Log

Security Log Figure 11-14 Security Log

System Log Figure 11-15 System Log