Cisco S3C8 Network Management. Documentation diagrams that indicate the path of the physical wiring layout; the type of cable; the length of each cable;

Slides:



Advertisements
Similar presentations
Hard Disks Low-level format- organizes both sides of each platter into tracks and sectors to define where items will be stored on the disk. Partitioning:
Advertisements

What is RAID Redundant Array of Independent Disks.
Chapter 3: Planning a Network Upgrade
Antonio González Torres
RAID Redundant Array of Independent Disks
RAID- Redundant Array of Inexpensive Drives. Purpose Provide faster data access and larger storage Provide data redundancy.
WHAT IS RAID? Christopher J Dutra Seton Hall University.
What to expect.  Linux  Windows Server (2008 or 2012)
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Threaded Case Study - RE Miller (Nick Effler, Brian Ford, Cindy Coultas & Teresa Duchardt) April-May, 2000 b Project Goals Implement WAN Access to connect.
Understand Database Backups and Restore Database Administration Fundamentals LESSON 5.2.
Chapter Thirteen Maintaining and Upgrading a Network.
Cisco – Semester III Documentation. What is it most important component of a good network?  Documentation.
Institute of Technology, Sligo Dept of Computing Network Management Semester 3, Chapter 8.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Copyright 2002 Year 2 - Chapter 4/Cisco 3 - Module 4 LAN Design By Carl Marandola.
I/O Systems and Storage Systems May 22, 2000 Instructor: Gary Kimura.
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
Servers Redundant Array of Inexpensive Disks (RAID) –A group of hard disks is called a disk array FIGURE Server with redundant NICs.
Session 3 Windows Platform Dina Alkhoudari. Learning Objectives Understanding Server Storage Technologies Direct Attached Storage DAS Network-Attached.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Chapter 4: Operating Systems and File Management 1 Operating Systems and File Management Chapter 4.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Rack Mounted Network Equipment Patch Panels Network Switch Router Rack Servers HDD Arrays UPS System Provides circuit protection and an uninterruptable.
November 2009 Network Disaster Recovery October 2014.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
ISA Topic 9: Operations Security ISA 562 Internet Security Theory & Practice.
Security Operations. 2 Domain Objectives Protection and Control of Data Processing Resources Media Management Backups and Recovery Change Control Privileged.
Chapter Sixteen Data Recovery and Fault Tolerance.
Network Management Chapter 18. Objectives Describe how configuration management documentation enables you to manage and upgrade a network efficiently.
Mike Meyers’ CompTIA Network+ ® Guide to Managing and Troubleshooting Networks, Third Edition (Exam N ) © 2012 The McGraw-Hill Companies, Inc. All.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 9 Optimizing and Protecting Hard Drives.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
Installing Microsoft Windows Server 2008 Lesson 2.
Tutorial 11 Installing, Updating, and Configuring Software
N-Tier Client/Server Architectures Chapter 4 Server - RAID Copyright 2002, Dr. Ken Hoganson All rights reserved. OS Kernel Concept RAID – Redundant Array.
CSI-09 COMMUNICATION TECHNOLOGY FAULT TOLERANCE AUTHOR: V.V. SUBRAHMANYAM.
CN2140 Server II Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 12 Windows 2000 Server.
Cisco Threaded Case Study
Chapter Fourteen Windows XP Professional Fault Tolerance.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
Software.
Robert E. Meyers CCNA, CCAI Youngstown State University Cisco Regional Academy Instructor Cisco Networking Academy Program Semester 3, v Chapter.
Redundant Array of Independent Disks.  Many systems today need to store many terabytes of data.  Don’t want to use single, large disk  too expensive.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
LAN DESIGN – first step 5 ISB – school year 2006/07.
Lesson 8—Networking BASICS1 Networking BASICS Managing a Local Area Network Unit 2 Lesson 8.
Chabot College Chapter 8 Review Semester IIIELEC Semester III ELEC
Fault Tolerance and Disaster Recovery. Topics Using Antivirus software Fault tolerance –Power –Redundancy –Storage –Services Disaster Recovery –Backup/Restore.
1/28/2010 Network Plus Malware and Ensuring Availability.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Help Desk Working at a Small-to-Medium Business or ISP – Chapter 2.
Practical Networking.
Install, configure and test ICT Networks
1 Maintaining the Windows O/S. 2 Introduction Virus protection Remove old and unused files Scan hard disk Defragment hard drive Back up and updated recovery.
Copyright 2002Cisco Press: CCNA Instructor’s Manual Year 2 - Chapter 8/Cisco 3 - Module 8 Network Management, Part 1.
2: Operating Systems Networking for Home & Small Business.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Planning a Network Upgrade Working at a Small-to-Medium Business or.
Network-Attached Storage. Network-attached storage devices Attached to a local area network, generally an Ethernet-based network environment.
Week #12 CIS 173 OBJECTIVES Chapter #10 Network Administration.
Network Management Chapter 8 Semester 3 By Roger Lewis.
Working at a Small-to-Medium Business or ISP – Chapter 8
Chapter 6 Application Hardening
Hard disk basics Prof:R.CHARLES SILVESTER JOE Departmet of Electronics St.Joseph’s College,Trichy.
Networking and Telecommunications
Presentation transcript:

Cisco S3C8 Network Management

Documentation diagrams that indicate the path of the physical wiring layout; the type of cable; the length of each cable; the type of termination for the cable; physical location of each wall plate or patch panel, and; a labeling scheme for easy identification of each wire.

Documentation Also includes: –Layout of MDF –Layout of IDF –Physical layout of rack mounts –Auxiliary equipment & servers –Patch panel labels –Identification and configuration of all equipment in MDF and IDF

Documentation Also includes: –Server and workstation configuration details –Physical location –User –Network ID – IP address, MAC address –Subnet, Topology; IRQ, SMA –Software installed –O/S –Repair Record

Documentation / Security Soft –User rights, password, firewall support Hard –Locking MDFs and IDJs –Who has access to MDF and IDF –How hosts are protected –Who has physical access to system Documentation needs to be updated

Data Recovery UPS, Tape Backup, and Disk Arrays –Full, incremental, differential, copy and daily –Tape backup is cheap Sequential Storage Archive Bit –Allows for INCREMENTAL backup Only backup what has changed since last backup date

Disk Redundancy Raid 0stripes data across multiple disks, no parity Raid 1disk mirroring – disk duplexing – writes data to two identical partitions Raid 2writes across multiple disks with error checking Raid 3stripes data one byte at a time- dedicated parity drive Raid 4stripes one sector at a time- dedicated parity drive Raid 5stripes data and parity across multiple disks

Environmental Factors Static Contaminants – smoke, dust and dirt Heat – high temperatures Protection –Isolate transformers; use regulators and line conditions and UPS

Viruses Wormpropagates itself Virusinfects files Trojan disguised as a game, utility or application –Know where software came from –Don’t use unknown disks –Use current virus checker

Network Types Peer-to-peer –Workgroup network Small number of workstations –W95 W98 Lantastic –10 workstations Client Server –Controlled by a NOS (Network Operating System Unix –NFS security, multitasking, kernel, supports many users

Network Control User rights Account numbers Passwords Access

Baseline Measurements Bandwidth used Collisions Broadcast traffic

Scientific Method – Trouble Shooting 1. Identify network/user problem. 2. Gather data about network/user problem. 3. Analyze data to come up with a possible solution to the problem. 4. Implement solution to network to attempt correction to the system. 5. If the problem isn't resolved, undo previous changes and modify data. 6. Go to step 3