Lesson 8—Networking BASICS1 Networking BASICS Managing a Local Area Network Unit 2 Lesson 8.

Slides:



Advertisements
Similar presentations
By Rashid Khan Lesson 6-A Place for Everything: Storage Management.
Advertisements

Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens.
Chapter 5: Server Hardware and Availability. Hardware Reliability and LAN The more reliable a component, the more expensive it is. Server hardware is.
REDUNDANT ARRAY OF INEXPENSIVE DISCS RAID. What is RAID ? RAID is an acronym for Redundant Array of Independent Drives (or Disks), also known as Redundant.
Introduction to Network Analysis and Sniffer Pro
Reliability Week 11 - Lecture 2. What do we mean by reliability? Correctness – system/application does what it has to do correctly. Availability – Be.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Chapter 12: Troubleshooting Networking Problems Network+ Guide to Networks Third Edition.
Chapter 3 Chapter 3: Server Hardware. Chapter 3 Learning Objectives n Describe the base system requirements for Windows NT 4.0 Server n Explain how to.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Implementing Disaster Protection
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
LECTURE 14 Operating Systems and Utility Programs
Servers Redundant Array of Inexpensive Disks (RAID) –A group of hard disks is called a disk array FIGURE Server with redundant NICs.
Session 3 Windows Platform Dina Alkhoudari. Learning Objectives Understanding Server Storage Technologies Direct Attached Storage DAS Network-Attached.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Teaching and Learning with Technology  Allyn and Bacon 2002 Introduction to Personal Computers in the Classroom Chapter 3 Teaching and Learning with Technology.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Hands-on Networking Fundamentals
Managing Storage Lesson 3.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
Introduction to Computer Networks Introduction to Computer Networks.
GeoVision Solutions Storage Management & Backup. ๏ RAID - Redundant Array of Independent (or Inexpensive) Disks ๏ Combines multiple disk drives into a.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
Administering Windows 7 Lesson 11. Objectives Troubleshoot Windows 7 Use remote access technologies Troubleshoot installation and startup issues Understand.
Operating Systems Networking for Home and Small Businesses – Chapter 2 – Introduction To Networking.
Chapter 2 Chapter 2: Planning for Server Hardware.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
CSI-09 COMMUNICATION TECHNOLOGY FAULT TOLERANCE AUTHOR: V.V. SUBRAHMANYAM.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
Chapter Fourteen Windows XP Professional Fault Tolerance.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
Chapter 4: Overview of Preventive Maintenance
Software.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 4: Organizing a Disk for Data.
MCTS Guide to Microsoft Windows Vista Chapter 4 Managing Disks.
1 Selecting LAN server (Week 3, Monday 9/8/2003) © Abdou Illia, Fall 2003.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
ITGS Networks. ITGS Networks and components –Server computers normally have a higher specification than regular desktop computers because they must deal.
Network Management. Network management means monitoring and controlling the network so that it is working properly and providing value to its users. A.
Chabot College Chapter 8 Review Semester IIIELEC Semester III ELEC
Chapter 13: LAN Maintenance. Documentation Document your LAN so that you have a record of equipment location and configuration. Documentation should include.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Fault Tolerance and Disaster Recovery. Topics Using Antivirus software Fault tolerance –Power –Redundancy –Storage –Services Disaster Recovery –Backup/Restore.
1/28/2010 Network Plus Malware and Ensuring Availability.
VIRUS.
FIT03.05 Explain features of network maintenance.
Cisco S3C8 Network Management. Documentation diagrams that indicate the path of the physical wiring layout; the type of cable; the length of each cable;
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Install, configure and test ICT Networks
Unit 1: Computing Fundamentals. Computer Tour-There are 7 major components inside a computer  Write down each major component as it is discussed.  Watch.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
1 CEG 2400 Fall 2012 Network Servers. 2 Network Servers Critical Network servers – Contain redundant components Power supplies Fans Memory CPU Hard Drives.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Overview of Preventive Maintenance IT Essentials 5.0.
Network-Attached Storage. Network-attached storage devices Attached to a local area network, generally an Ethernet-based network environment.
Network Management Chapter 8 Semester 3 By Roger Lewis.
Lesson 9: SOFTWARE ICT Fundamentals 2nd Semester SY
Introduction to Operating Systems
UNIT 19 Data Security 2.
Operating Systems Networking for Home and Small Businesses – Chapter 2 – Introduction To Networking.
Seminar on Enterprise Software
Presentation transcript:

Lesson 8—Networking BASICS1 Networking BASICS Managing a Local Area Network Unit 2 Lesson 8

Lesson 8—Networking BASICS2 Objectives List the proactive steps to be taken to keep a network server in operation. Tell how server performance can be monitored. Explain how SNMP and network monitors are used. List and describe the features of common network troubleshooting tools.

Lesson 8—Networking BASICS3 Managing the Server This is one of most important jobs of a network manager. Take steps to prevent errors. Monitor for problems.

Lesson 8—Networking BASICS4 RAID Redundant Array of Independent Drives Fault-tolerant hard drives There are six common levels.

Lesson 8—Networking BASICS5 RAID Levels RAID 0 – Striping across drives. RAID 1 – Disk mirroring and disk duplexing. RAID 2 – Uses error correction code (ECC). RAID 3 – Uses parity error checking.

Lesson 8—Networking BASICS6 RAID Levels

Lesson 8—Networking BASICS7 RAID Levels

Lesson 8—Networking BASICS8 RAID Levels RAID 4 – Larger stripes. RAID 5 – Divides parity checking across drives. Dual-level RAID – Combines multiple hardware RAID arrays. Not all levels are fully supported.

Lesson 8—Networking BASICS9 Backups Backups copy data to another media and store it in a secure location. Optical discs (CD-ROM and DVD) are not often used. Archive bit – This is set when a file is backed up and cleared when a file is changed. It is important to test backups.

Lesson 8—Networking BASICS10 Types of Backups Full backup Differential backup Incremental backup Copy backup Daily copy

Lesson 8—Networking BASICS11 Uninterruptible Power Supply The UPS supplies power to the server if electrical power fails. Power conditioning – Ensures a correct and constant level of power. Surge protector – Prevents spikes from reaching the server.

Lesson 8—Networking BASICS12 Uninterruptible Power Supply

Lesson 8—Networking BASICS13 Virus A virus instructs the computer to perform an operation without the user’s consent or knowledge. Viruses are destructive or non- destructive. Viruses are replicated primarily by .

Lesson 8—Networking BASICS14 Types of Viruses Macro – Attaches to application program and executes. Polymorphic – Changes appearance each time it replicates. Stealth – Hides its presence from detection.

Lesson 8—Networking BASICS15 Monitoring Server It monitors the performance of the server’s CPU. It can be done at one time or as an average. When the CPU is constantly over 90%, that indicates that the server is overloaded.

Lesson 8—Networking BASICS16 Monitoring Server

Lesson 8—Networking BASICS17 Server RAM RAM is divided into page frames. The NOS pages out frames when they are no longer needed or when a frame is needed for other data.

Lesson 8—Networking BASICS18 Page Faults Page fault – Swap data back into RAM page. Soft page fault – Data retrieved from RAM. Hard page fault – Data retrieved from hard drive.

Lesson 8—Networking BASICS19 Page Faults

Lesson 8—Networking BASICS20 Monitoring Network Performance The entire network must be monitored. There are a variety of hardware and software tools available.

Lesson 8—Networking BASICS21 SNMP Simple Network Management Protocol Part of TCP/IP suite Gather data about network performance Software agents sent to management information base

Lesson 8—Networking BASICS22 SNMP

Lesson 8—Networking BASICS23 Network Monitors There are software packages to monitor network health. They identify late collisions, jabber, and negative frame count. They are available for all operating systems.

Lesson 8—Networking BASICS24 Protocol Analyzers They are also called packet sniffing tools. Promiscuous mode – Captures all network packets. Data can be filtered.

Lesson 8—Networking BASICS25 Hardware Tools Multimeter – Measures characteristics of electric current. Cable checker – Determines status of cable. Time domain reflector – Sends signal and records return.

Lesson 8—Networking BASICS26 Summary The role of managing a computer network is the job of the net- work manager and involves two major tasks: taking necessary proactive steps to prevent problems from occurring and watch- ing for symptoms that may indicate something on the network is not right. If a symptom reveals a problem, the problem must be fixed immediately before things get worse. A variety of preventive measures can be taken to make the server as stable as possible. Fault-tolerant server hard drives are based on a standard known as RAID (Redundant Array of Independent Drives). The fundamental idea behind RAID is to install several disk drives inside the server. This array of disk drives appears to the server as a single drive. If one of the drives fails, the other hard drives keep the server and network functioning.

Lesson 8—Networking BASICS27 Summary (continued) There are six common levels of RAID: RAID 0 through RAID 5. Yet RAID does not diminish the need for data backups. Data must be copied regularly to another media and stored in a secure location. Although CD and DVD technology is often used for backups of data stored on client computers, it is rarely used for data backups of network file servers. There are five basic types of backups: full backup, differential backup, incremental backup, copy backup, and daily copy. Many network managers perform a full backup once a week and a differential backup once a day.

Lesson 8—Networking BASICS28 Summary (continued) An uninterruptible power supply (UPS) is an external device located between the outlet for electrical power and the server. The primary purpose of a UPS is to continue to supply power to the server in the event the electrical power fails. Yet the UPS is much more than a large battery. UPS systems interface with the NOS on the server to ensure that an orderly shutdown will occur and “clean” the electrical power before it reaches the server. A computer virus is a computer program that instructs a computer to perform an operation without the user’s knowledge or con- sent. Computer viruses can be either destructive or nondestruc- tive. Computer viruses are usually designed to replicate and quickly infect other computers.

Lesson 8—Networking BASICS29 Summary (continued) Managing the server involves not only taking proactive steps to prevent problems from occurring, but also monitoring the server so any problems that do occur can be quickly identified and solved. Monitoring the performance of the server includes watching the CPU, hard drive, and RAM. Monitoring the per- formance of the CPU can reveal whether the system is training under the load of the network or has power to spare. Programs that monitor the CPU utilization are found on almost every NOS.

Lesson 8—Networking BASICS30 Summary (continued) Compared to the CPU, RAM is the second-most important component in a file server that should be closely watched. Because RAM is so vital to the operation of the server, a server that lacks sufficient RAM can cause all network users to wait unnecessarily long periods of time for their programs to load and for the server to answer their requests. Another important component of the server that needs to be monitored is the hard drive. The total amount of free disk space left on the hard drive is especially important. If the amount of free disk space is 20 percent or less of the entire hard drive, more free space must be found.

Lesson 8—Networking BASICS31 Summary (continued) An array of tools can be used to monitor the performance of the network. The Simple Network Management Protocol (SNMP) is part of the TCP/IP protocol suite. SNMP allows computers and network equipment to gather data about network performance. In addition to SNMP, other software packages can be used to monitor the health of the network. Known as network monitors, these packages provide a wealth of network statistics. Protocol analyzers capture packets so they can be analyzed. They also translate the contents of the packet from a form the computer and network uses to a form humans can read.

Lesson 8—Networking BASICS32 Summary (continued) A variety of hardware tools can also be used for digging deeper to discover the source of a network problem. A multimeter is a tool that measures the characteristics of an electric current. A cable checker is used to determine whether a cable can send and receive packets. A cable tester performs the same function as a cable checker, but also provides additional results. A time domain reflectometer (TDR) is a sophisticated device that sends a signal down a cable and then records the return of the signal. Handheld network analyzers combine the best features of protocol analyzers, multimeters, cable checkers and testers, and TDRs into a single small device.