Download presentation
Presentation is loading. Please wait.
Published byGeorge Myles Walker Modified over 8 years ago
1
Network Management Chapter 8 Semester 3 By Roger Lewis
2
Network Management includes: Network Security Network Security Network Documentation Network Documentation Network Maintenance Network Maintenance Environmental Factors Environmental Factors Server Maintenance Server Administration Network Troubleshooting
3
Documentation includes: Cut-Sheets Diagrams indicating path of physical wiring Diagrams indicating path of physical wiring Type and length of cables Type and length of cables Type of termination of cables Type of termination of cables Physical location of wall plates or patch panels Physical location of wall plates or patch panels A “easy” labeling scheme for cables A “easy” labeling scheme for cables
4
MDF & IDF Layouts Physical and Logical layout of MDF Physical and Logical layout of MDF Physical and Logical layout of IDFs Physical and Logical layout of IDFs Physical layout of rack mounts, auxiliary equipment, and servers Physical layout of rack mounts, auxiliary equipment, and servers Patch Panel Labels identifying cable terminations Patch Panel Labels identifying cable terminations Identification & Configuration details of equipment in MDFs/IDFs. Identification & Configuration details of equipment in MDFs/IDFs.
5
Server & Workstation Configurations Details include: Details include: Make & model of computers including: Make & model of computers including: Serial number Serial number Drives (Floppy, DVD/CD-ROM, Hard) Drives (Floppy, DVD/CD-ROM, Hard) Sound & Network Cards Sound & Network Cards Amount of RAM Memory Amount of RAM Memory Details of computer configuration includingDetails of computer configuration including DMA, IRQ, & Base Memory addressDMA, IRQ, & Base Memory address
6
Software listing for each computer Listing of Standard software including: Listing of Standard software including: Operating System (Windows, Unix, etc) Operating System (Windows, Unix, etc) Any application Software Any application Software Listing of any Special Software Listing of any Special Software
7
Maintenance Records Important to keep records of all repairs to networking equipment. Important to keep records of all repairs to networking equipment.
8
Security Measures Soft Security issues including: Soft Security issues including: User rights User rights Password definition Password definition Firewall support Firewall support Physical or Hard Security including: Physical or Hard Security including: How MDF/IDFs are locked How MDF/IDFs are locked Who has access to MDF/IDFs and why Who has access to MDF/IDFs and why How hosts are protected (security cables-alarms) How hosts are protected (security cables-alarms) Who has access to systems Who has access to systems
9
User Policies How do users interact with Network? How do users interact with Network? What is permissible? What isn’t? What is permissible? What isn’t? What are the consequences of violating policies? What are the consequences of violating policies? What is minimum User ID & Password length? What is minimum User ID & Password length? What are the rules for Users Passwords? What are the rules for Users Passwords? Does management buy into the policies? Does management buy into the policies?
10
Network Documentation Must be updated to be useful Must be updated to be useful Include changes to software and hardware Include changes to software and hardware Don’t forget upgrades Don’t forget upgrades
11
Network Access Keep network safe from unauthorized access. Keep network safe from unauthorized access. Establish security policies Establish security policies Ensure users understand and follow security policies Ensure users understand and follow security policies
12
Network Access Recover data from catastrophic events Recover data from catastrophic events Tape Backup of Data Tape Backup of Data Fault tolerant disk configurations Fault tolerant disk configurations Use of UPS Use of UPS
13
Backup Operations 1. Full Backup* 2. Incremental Backup* 3. Differential Backup* 4. Copy Backup 5. Daily Backup * Most widely used
14
Users workstation backup Individual Tape drive Individual Tape drive Copy data to ZIP or Floppy disk drives Copy data to ZIP or Floppy disk drives Create user directory on servers for users data Create user directory on servers for users data
15
Redundancy Technique RAID RAID Raid 0* Raid 0* Raid 1* Raid 1* Raid 2 Raid 2 Raid 3 Raid 3 Raid 4 Raid 4 Raid 5* Raid 5* * Supported by most OS
16
Environmental Factors Follow owner’s manuals when installing equipment Follow owner’s manuals when installing equipment Take care to prevent ESD Take care to prevent ESD Keep area clear of dirt and dust Keep area clear of dirt and dust No Smoking No Smoking Keep equipment cool Keep equipment cool Keep equipment supported Keep equipment supported
17
Power Conditioning Put network & computer equipment on separate electric circuits Put network & computer equipment on separate electric circuits Isolating transformers Isolating transformers Regulators Regulators Line Conditioners Line Conditioners UPS UPS
18
EMI & RFI EMI can be caused by: EMI can be caused by: Power supplies and monitors Power supplies and monitors Fluorescent lights Fluorescent lights Large Electric motors and electric wiring Large Electric motors and electric wiring RFI can be caused by: RFI can be caused by: Improperly shielded cables Improperly shielded cables Other equipment Other equipment
19
Software Viruses WORM WORM VIRUS VIRUS Trojan Horse Trojan Horse Prevent these by: 1. Being careful about install software you don’t know where it came from. 2. Be careful of other users on your equipment with their own software. 3. Use virus checker
20
Network Performance Network performance is a measurement of network’s quickness and reliability. Network performance is a measurement of network’s quickness and reliability. Establish a baseline Establish a baseline Network Utilization percentage Network Utilization percentage Collision counts Collision counts Frame errors Frame errors Broadcast traffic Broadcast traffic
21
Server Administration Peer-to-Peer Network Peer-to-Peer Network Up to 10 users on network Up to 10 users on network Cheaper to create and operate network Cheaper to create and operate network Allows users to control their own resources Allows users to control their own resources No dedicated server required No dedicated server required No Additional software is required No Additional software is required Disadvantages include: Disadvantages include: No central point of management No central point of management Users create Ids for other users if sharing resources Users create Ids for other users if sharing resources If resource goes down, no one then has access to it If resource goes down, no one then has access to it
22
Server Administration cont Client-Server Network Client-Server Network NOS is heart of system NOS is heart of system Control the resources and management of LAN Control the resources and management of LAN Provides a centralized point of user, security, and resource management. Provides a centralized point of user, security, and resource management. Dedicated Servers provide specific resources to clients Dedicated Servers provide specific resources to clients Provides access to all allowed resources with one network ID and password Provides access to all allowed resources with one network ID and password Disadvantage is single point of failure. Disadvantage is single point of failure.
23
Client-Server OS UNIX UNIX Novell Netware Novell Netware Windows NT Windows NT Windows 2000 Windows 2000
24
Network Control Login Account Login Account User Rights User Rights Assigning Users to groups Assigning Users to groups Assigning rights and permissions to the group Assigning rights and permissions to the group User profiles (Roaming, Mandatory or Local Profile) User profiles (Roaming, Mandatory or Local Profile) Policies Policies
25
Network Troubleshooting Use Dartmouth Design Matrix Use Dartmouth Design Matrix Scientific Method Scientific Method 1. Identify network/user problem 2. Gather data network/user problem 3. Analyze data to come up with possible solution 4. Implement solution 5. If problem isn’t resolve, undo changes and modify data 6. Go to step 3
26
Analyze Network Troubleshooting Always check the easy stuff first! Always check the easy stuff first! Determine if anything change recently which might be causing the problem. Determine if anything change recently which might be causing the problem. Determine if the problem is hardware, software, or the network. Determine if the problem is hardware, software, or the network. Once solve, document the solution. Once solve, document the solution.
27
Network Management The End
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.