Institute of Technology, Sligo Dept of Computing Network Management Semester 3, Chapter 8.

Slides:



Advertisements
Similar presentations
Data Storage Solutions Module 1.2. Data Storage Solutions Upon completion of this module, you will be able to: List the common storage media and solutions.
Advertisements

Chapter 3: Planning a Network Upgrade
Antonio González Torres
Database Administration and Security Transparencies 1.
Module 5 - Switches CCNA 3 version 3.0 Cabrillo College.
Chapter 5: Server Hardware and Availability. Hardware Reliability and LAN The more reliable a component, the more expensive it is. Server hardware is.
REDUNDANT ARRAY OF INEXPENSIVE DISCS RAID. What is RAID ? RAID is an acronym for Redundant Array of Independent Drives (or Disks), also known as Redundant.
June 23rd, 2009Inflectra Proprietary InformationPage: 1 SpiraTest/Plan/Team Deployment Considerations How to deploy for high-availability and strategies.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
File Management Systems
Cisco – Semester III Documentation. What is it most important component of a good network?  Documentation.
Lesson 3 – UNDERSTANDING NETWORKING. Network relationship types Network features OSI Networking model Network hardware components OVERVIEW.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Institute of Technology, Sligo Dept of Computing LAN Design Semester 3, Chapter 4.
Chapter 12 File Management Systems
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Guide to Linux Installation and Administration, 2e1 Chapter 13 Backing Up System Data.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
November 2009 Network Disaster Recovery October 2014.
Introduction to Networks Networking Concepts IST-200 VWCC 1.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
Network Management Chapter 18. Objectives Describe how configuration management documentation enables you to manage and upgrade a network efficiently.
Mike Meyers’ CompTIA Network+ ® Guide to Managing and Troubleshooting Networks, Third Edition (Exam N ) © 2012 The McGraw-Hill Companies, Inc. All.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
CSCI 1101 Intro to Computers 6. Local Area Networks.
Internet Packet eXchange Protocol (IPX) Network Documentation
Network Structure Students should be aware of what is available in order to –create and use an ICT network: communication devices.
1 Chapter 12 File Management Systems. 2 Systems Architecture Chapter 12.
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section 15.2 Identify guidelines.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 12 Windows 2000 Server.
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
Chapter Fourteen Windows XP Professional Fault Tolerance.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
SYSTEM ADMINISTRATION Chapter 1 Logical and Physical Network Topologies.
Objectives  To define network  To identify use of network  To differentiate major types of network  To identify basic networking terminologies  To.
Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1.
"1"1 Introduction to Managing Data " Describe problems associated with managing large numbers of disks " List requirements for easily managing large amounts.
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
LAN DESIGN – first step 5 ISB – school year 2006/07.
Lesson 8—Networking BASICS1 Networking BASICS Managing a Local Area Network Unit 2 Lesson 8.
Chabot College Chapter 8 Review Semester IIIELEC Semester III ELEC
Network Operating Systems : Tasks and Examples Instructor: Dr. Najla Al-Nabhan
Chapter 13: LAN Maintenance. Documentation Document your LAN so that you have a record of equipment location and configuration. Documentation should include.
LAN Design Semester 3, Chapter 3. Home End Table of Contents Go There! Go There! Go There! Go There! Go There! Go There! Go There! Go There! Go There!
Fault Tolerance and Disaster Recovery. Topics Using Antivirus software Fault tolerance –Power –Redundancy –Storage –Services Disaster Recovery –Backup/Restore.
1/28/2010 Network Plus Malware and Ensuring Availability.
Cisco S3C8 Network Management. Documentation diagrams that indicate the path of the physical wiring layout; the type of cable; the length of each cable;
Install, configure and test ICT Networks
Copyright 2002Cisco Press: CCNA Instructor’s Manual Year 2 - Chapter 8/Cisco 3 - Module 8 Network Management, Part 1.
1 CEG 2400 Fall 2012 Network Servers. 2 Network Servers Critical Network servers – Contain redundant components Power supplies Fans Memory CPU Hard Drives.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Network Operating Systems : Tasks and Examples Instructor: Dr. Najla Al-Nabhan
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Planning a Network Upgrade Working at a Small-to-Medium Business or.
An Introduction to Local Area Networks An Overview of Peer-to-Peer and Server-Based Models.
Network-Attached Storage. Network-attached storage devices Attached to a local area network, generally an Ethernet-based network environment.
Week #12 CIS 173 OBJECTIVES Chapter #10 Network Administration.
Network Management Chapter 8 Semester 3 By Roger Lewis.
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
Working at a Small-to-Medium Business or ISP – Chapter 8
Introduction to Operating Systems
Section 15.1 Section 15.2 Identify Webmastering tasks
Module 5 - Switches CCNA 3 version 3.0.
Web Server Administration
SpiraTest/Plan/Team Deployment Considerations
Course Name : Network Operating System Course Code: CNET 332 These slides are only meant for course delivery. For all your Exams refer to your text book.
Course Name : Network Operating System Course Code: CNET 332
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Institute of Technology, Sligo Dept of Computing Network Management Semester 3, Chapter 8

LAN Management  This chapter deals mainly with the management of LANs. Although the content is not covered on the CCNA exam, it is covered on the Comp TIA Net+ exam.  In addition, network management is when the real work begins for a net admin.  Topics covered include:  Documentation  Security  Network Performance  Server Administration  Troubleshooting

Institute of Technology, Sligo Dept of Computing Network Documentation

Documentation  Documenting the network, including:  Cut sheet diagrams  MDF & IDF layouts  Server/workstation configurations  Software installed  Maintenance records  Security & user policies...is the most critical component of good network management.  Documentation is also the least implemented component of network administration.

MDF & IDF Layouts  The Physical and Logical layouts of all wiring closets includes:  physical location of rack mounts, equipment and servers  patch panel labeling scheme for identifying cable terminations  Configuration details of all equipment

Server/Workstation Configurations  Includes details about:  Hardware specifications  Make & model  Number & type of drives  Cards installed  Physical location & Logical addressing  IP and MAC address  Subnet  Topology  Purchase date and warranty information

Software & Maintenance Records  Software listings include:  All software installed on each computer  The standard configuration used for each type of workstation  Operating system information  Maintenance records assist net admin to anticipate potential problems and include:  All repairs and upgrades made to a computer

Security & User Documents  Physical Security  How are MDFs & IDFs locked  Who has access to MDFs & IDFs  How are host devices protected (security cables, etc.)  Soft Security  User policies & rights outlining what is and what is not permissible on the network  Password protection  Firewall support

Institute of Technology, Sligo Dept of Computing Network Security

Security  Network security includes two major components:  Controlling Access  Data Protection and Recovery

Access  The network policy established during the documentation phase determines the criteria used to select passwords, such as:  password length  aging of passwords  time of day access is allowed  Acceptable Use Policies make sure users are aware of the company’s definition of what is allowed and not allowed on the network. It also normally includes consequences for violation of the policy.

Data Recovery  Data recovery, the second component of security, involves protecting data from loss  Methods for protecting data include:  Tape backup  Fault tolerance  Controlling Environmental Factors  Power Conditioning  Preventing Virus Corruption

Tape Backup  Magnetic tapes are the most popular media used for backing up data because of the cost and capacity.  They are much cheaper than removable hard drives  Tape backups record and restore data sequentially.  This can make it difficult to find a particular file. However, tape backups are used to fully restore all lost data.  Most Tape Backup systems use an archive bit set to on or off. If the bit is on, then the data has been changed since the last backup.

Types of Tape Backup Systems  Several options are available when using tapes.  Full backup--all files are backed up periodically  Incremental and Differential backups--uses an archive bit to determine if a file has been created or modified since the last full backup  Copy backup--backs up user selected data to tape  Daily backup--backs up data created or modified for that day

Fault Tolerance  Fault tolerance involves establishing redundancy techniques to keep a system up and running when a failure occurs.  RAID (Redundant Array of Inexpensive Disks)  RAID 0--stripes data across multiple disk; no redundancy  RAID 1--(mirroring) provides redundancy by writing all data to two or more drives  RAID 2--no longer used because of expense  RAID 3/4--stores parity on one disk; 3 stripes at the byte level and 4 stripes at the block level across remaining disks.  RAID 5--similar to 3/4 but stripes data with parity across multiple drives. Requires at least 3 drives. 5 drives is ideal.

Environmental Factors  Electrical Static Discharge can approach 20,000 volts and fry sensitive computer components  Protect against by grounding yourself using grounding strap before working on computers  Dust and dirt should be avoided. Periodically clean keyboards, monitors, and towers  Avoid excessive heat  Follow TIA/EIA 568A standards to avoid EMI and RFI noise  For example, Shielded Twisted Pair (STP) cable is a possible solution to prevent EMI/RFI corruption of data.

Power Conditioning  Power conditioning is the process of implementing procedures to control the power supplied to your network. They include:  Isolating Transformer--to control voltage spikes and high frequency noise  Regulators--to maintain a constant level of voltage  Line Conditioner--an isolating transformer/regulator combination.  Uninterruptible Power Supply--maintains a charged battery to supply voltage to devices in the event of a power failure.

Software Viruses  Preventing software viruses is the final topic under network security. Types include:  Worm--a program that spreads across computers and usually reproduces copies of itself in a computer’s memory  Virus--a program that usually has a negative effect on executable programs  Trojan Horse--destructive program disguised as a game, utility or other application  Preventing viruses includes...  Know where your data is coming from  Avoid allowing others to use floppies on your computer  Maintain updated virus checking software

Institute of Technology, Sligo Dept of Computing Network Performance

Monitoring the Network  Part of documenting the network is establishing baselines for the various performance issues including...  Bandwidth utilization  Collision counts  Broadcast traffic  A baseline sets the acceptable performance of the network, but must be updated as the network is updated or expanded.

Institute of Technology, Sligo Dept of Computing Server Administration

Types of Networks  Peer-to-Peer Networks  Also known as a Workgroup Network, it is designed for a small number of users.  No more than 10 devices should be on one peer-to- peer network.  Advantages: relatively easy to configure, users control resources, no dedicated server needed  Disadvantages: no central management  Client-Server Networks  Uses a dedicated server running a NOS to control resources and manage the network.

Types of Client-Server NOSs  UNIX  Open standard with proprietary versions offered by HP, IBM, and Sun (among others) as well as a free versions (FreeBSD and Linux).  Multi-user, multi-tasking environment using NFS security.  Kernel based which isolates the hardware layer from improperly operating applications.

Types of Client-Server NOSs  NetWare  various versions as discussed in Ch. 7  uses two file services: FAT and DET  Windows NT  uses domains to control services with a Primary Domain Controller and Backup Domain Controller  Similar to UNIX except uses a different file system structure

Institute of Technology, Sligo Dept of Computing Network Troubleshooting

Scientific Method  Network troubleshooting is a systematic process that uses the scientific method: 1. Identify the network/user problem 2. Gather data about the network/user problem 3. Analyze data and come up with possible solutions 4. Choose and implement best solution 5. Evaluate solution’s success and modify data collected, if necessary 6. If problem still exists, return to Step 3.

Typical Troubleshooting Scenario 1. User calls and says he can’t access the network (problem identified). 2. Gather data by asking the user questions, checking logs, and hardware configurations. 3. Analyze the data collected to determine possible solutions. Check the physical layer by pinging the user. If unsuccessful, ping the NIC from the the user’s computer using the loopback address: Continue to ping along the network to find problem. If no problem, then check software.

Typical Troubleshooting Scenario 4. Implement the best solution to solve the problem. 5. Evaluate the implemented solution to see if the problem has been solved. If not, return to Step 3.