Configuration Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

Chapter 19: Network Management Business Data Communications, 5e.
Prentice Hall, Database Systems Week 1 Introduction By Zekrullah Popal.
Case Tools Trisha Cummings. Our Definition of CASE  CASE is the use of computer-based support in the software development process.  A CASE tool is a.
Optimizing Windows Vista Performance Lesson 10. Skills Matrix Technology SkillObjective DomainObjective # Introducing ReadyBoostTroubleshoot performance.
Dr Gordon Russell, Napier University Unit Data Dictionary 1 Data Dictionary Unit 5.3.
Objectives Overview Define the term, database, and explain how a database interacts with data and information Define the term, data integrity, and describe.
Chapter 19: Network Management Business Data Communications, 4e.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
SmartSystems™ Foundation Product Overview
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 5: Planning, Configuring, And Troubleshooting DHCP.
Database Software File Management Systems Database Management Systems.
The Hierarchy of Data Bit (a binary digit): a circuit that is either on or off Byte: 8 bits Character: each byte represents a character; the basic building.
Documenting the Existing Network - Starting Points IACT 418 IACT 918 Corporate Network Planning.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Fundamentals of Information Systems, Second Edition 1 Organizing Data and Information Chapter 3.
Requirements Analysis 5. 1 CASE b505.ppt © Copyright De Montfort University 2000 All Rights Reserved INFO2005 Requirements Analysis CASE Computer.
11 3 / 12 CHAPTER Databases MIS105 Lec14 Irfan Ahmed Ilyas.
Fault Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Chapter 9 Database Design
Interpret Application Specifications
Configuration Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Chapter 4: Database Management. Databases Before the Use of Computers Data kept in books, ledgers, card files, folders, and file cabinets Long response.
BUSINESS DRIVEN TECHNOLOGY
Chapter 1 Introduction to Databases
Chapter 3 Software Two major types of software
Installing software on personal computer
Database Systems: Design, Implementation, and Management Ninth Edition
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
1 DATABASE TECHNOLOGIES BUS Abdou Illia, Fall 2007 (Week 3, Tuesday 9/4/2007)
Database Design - Lecture 1
Overview of a Database Management System
1 Advanced Computer Programming Databases. Overview What is a database? Database Basics Database Components Data Models Normalization Database Design.
Module Title? DBMS Introduction to Database Management System.
© Paradigm Publishing Inc. 9-1 Chapter 9 Database and Information Management.
The Asset Inventory Management module assists with data collection and discovery management processes. Collected information is interpreted and automatically.
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS (Cont’d) Instructor Ms. Arwa Binsaleh.
STORING ORGANIZATIONAL INFORMATION— DATABASES CIS 429—Chapter 7.
ITEC 3220M Using and Designing Database Systems
1 Chapter 9 Database Design. 2 2 In this chapter, you will learn: That successful database design must reflect the information system of which the database.
Chapter 7: Database Systems Succeeding with Technology: Second Edition.
Databases and Database Management Systems
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
I Information Systems Technology Ross Malaga 4 "Part I Understanding Information Systems Technology" Copyright © 2005 Prentice Hall, Inc. 4-1 DATABASE.
Chapter 3: Computer Software. Stored Program Concept v The concept of preparing a precise list of exactly what the computer is to do (this list is called.
Storing Organizational Information - Databases
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
MIS 673: Database Analysis and Design u Objectives: u Know how to analyze an environment and draw its semantic data model u Understand data analysis and.
5 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
CHAPTER 3 DATABASES AND DATA WAREHOUSES. 2 OPENING CASE STUDY Chrysler Spins a Competitive Advantage with Supply Chain Management Software Chapter 2 –
FILES AND DATABASES. A FILE is a collection of records with similar characteristics, e.g: A Sales Ledger Stock Records A Price List Customer Records Files.
組態管理 ( Configuration Management) 陳彥錚 (Yen-Cheng Chen)
Database Concepts Track 3: Managing Information using Database.
DATA RESOURCE MANAGEMENT
CASE (Computer-Aided Software Engineering) Tools Software that is used to support software process activities. Provides software process support by:- –
Infrastructure for Data Warehouses. Basics Of Data Access Data Store Machine Memory Buffer Memory Cache Data Store Buffer Bus Structure.
CIS 250 Advanced Computer Applications Database Management Systems.
Copyright (c) 2014 Pearson Education, Inc. Introduction to DBMS.
1 Geog 357: Data models and DBMS. Geographic Decision Making.
Introduction to Databases Angela Clark University of South Alabama.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 6: Active Directory Physical Design.
Presentation on Database management Submitted To: Prof: Rutvi Sarang Submitted By: Dharmishtha A. Baria Roll:No:1(sem-3)
1 CEG 2400 Fall 2012 Network Servers. 2 Network Servers Critical Network servers – Contain redundant components Power supplies Fans Memory CPU Hard Drives.
Configuration Management By Abokor and Alireza. The Overview of Configuration Management  Network Configuration is a process of organising and maintaining.
1 Management Information Systems M Agung Ali Fikri, SE. MM.
( ) 1 Chapter # 8 How Data is stored DATABASE.
Chapter 19: Network Management
Discovering Computers 2010: Living in a Digital World Chapter 14
CHAPTER 3 Architectures for Distributed Systems
Presentation transcript:

Configuration Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong

2 Overview Configuration Definitions –OED: Arrangement of parts or elements in a particular form or figure –OED: The way the constituent parts of a computer system are chosen or interconnected in order to suit it for a particular task or use; the units or devices required for this –Websters: 1 a : relative arrangement of parts or elements: as (1) : Shape (2) : functional arrangement –Webster: 1 b : something (as a figure, contour, pattern, or apparatus) that results from a particular arrangement of parts or components

3 Overview Configuration Management is the process of –Obtaining data from the network –Using that data to manage the setup of all network devices Involves –Gathering information about the current configuration of the network –Using that data to modify the network configuration of devices –Storing the data –Maintaining an up-to-date inventory –Producing reports on that data

4 Benefits of the Configuration Management Process Enhanced control over configuration of network devices –Rapid access to config data Speeds up re-configuration Examples: –Configuration data holds the current setup of each device –If you wanted to add more interfaces to the device you would need to know Current number of interfaces in that device Network addresses assigned to those interfaces –Config management would hold that data and enable rapid access

5 Benefits of the Configuration Management Process Also assists in modification of network devices –Remote deactivation etc –Remote changes Inventory control can be used to –Negotiate vendor contracts –Examine vendor quality

6 Accomplishing Configuration Management Configuration Management steps –Gathering information about the current configuration of the network –Using that data to modify the network configuration of devices –Storing the data –Maintaining an up-to-date inventory –Producing reports on that data

7 Collecting Data Manually Obtaining data often begins with a manual collection –Need to record the devices Serial number Address assignment –Store data in a spreadsheet, database etc –This can be tedious and error prone for large networks

8 Collecting Data Manually Data can be collected automatically –Using network management protocol –Autodiscovery

9 Autodiscovery Can be implemented using ICMP echo (PING) to every possible address –When device answers record details –Advantage: will discover every working device on network –Disadvantage: wasted bandwidth and time querying non-existent devices

10 Autodiscovery Could also find one device and then query it to discover what other devices it has communicated with recently –All network devices discovered in a breadth first search manner –Advantage: works quickly –Disadvantage: May fail to find a device that has not communicated with the network recently Can also help produce a graphical map of the current network

11 Autodiscovery

12 Autodiscovery

13 Modifying data Once configuration management information has been collected it will usually need to be updated and maintained –With a 5000 node network even if 1% of those machines required a change once a week that would be  50 changes per week Addresses are only ONE of the parameters that need to be tracked Manual system are inefficient and error prone –What happens if an engineer forgets to record the changes –Thames vs Thomas Configuration management systems can record these changes automatically

14

15

16

17 Storing Data Configuration management should also provide information storage –Centralised storage provide the network engineer with efficent access to configuration data

18 Storing Data Currently a DBMS is considered the most efficient manner to store this data –Advantages Enables large amounts of data to be stored on a single computer Fast searching Automatic sorting of data Restoration of lost data Data relationships –Disadvantages Complex administration procedures May us its own language Tends to be platform or OS specific (lack of portability)

19 Configuration Management on a Network Management System Simple –Provide central storage of network information Network addresses Serial numbers Physical location –Include an autodiscovery device for finding all devices on network

20 Configuration Management on a Network Management System More Complex –Automatic comparison of current to stored configuration Automatic update??? –Automapping of network –Graphical display of configurations Physical Logical

21 Configuration Management on a Network Management System Advanced –Use a relational database –Automatic generation of reports Inventory reports Change reports Vendor control reports Warranty reports Repair reports –Provide for evaluation Duplication of addresses Duplication of function

22 Generating Configuration Reports Reports should typically include –For devices Name Network address Serial number Manufacturer Operating system Local person responsible Could also list –Circuit numbers –Vendor contact name –Physical location

23 Generating Configuration Reports Reports should typically include –Summary of recent changes Listed by category Include –Who made the changes –When changes were made Categories could include –New devices –Replaced devices –Modified devices

24 Generating Configuration Reports Reports should typically include –Summary of network inventory All details from device report Length and type of warranty Complete upgrade history Service history …