Download presentation
Presentation is loading. Please wait.
1
Network Management Lesson 11 1
2
Objectives Exam Objective Matrix Technology Skill Covered
Exam Objective Number What is Network Management and Why Do We Need It? Documentation Describe the purpose of configuration management documentation. • Wire schemes • Network maps • Documentation • Cable management • Asset management • Baselines • Change management 4.5
3
Objectives Exam Objective Matrix Technology Skill Covered
Exam Objective Number Network Monitoring Given a scenario, use the appropriate network monitoring resource to analyze traffic. • SNMP • SNMPv2 • SNMPv3 • Syslog • System logs • History logs • General logs • Traffic analysis • Network sniffer Categorize different types of network security appliances and methods. • NESSUS • nmap 4.4 5.6 Network Optimization Given a scenario, install and configure routers and switches. • QoS 2.1
4
Objectives Exam Objective Matrix Technology Skill Covered
Exam Objective Number Explain different methods and rationales for network performance optimization. • Methods: • QoS • Traffic shaping • Load balancing • High availability • Caching engines • Fault tolerance • CARP • Reasons: • Latency sensitivity • High bandwidth applications (VoIP, video applications, unified communications) • Uptime 4.6
5
What Is Network Management and Why Do We Need It?
Various actions, procedures, and methods related to monitoring, configuring, maintaining, supporting, and updating a network and its infrastructure Importance Detect and correct problems before they become obvious 5
6
Network Management Considerations
Reliability Configuration Accounting Performance Security 6
7
How likely that network will function properly Ensure reliability
Use reliable networking equipment Regularly maintain network equipment Wiring should be neat and orderly Watch over routers Check integrity of file servers 7
8
How network is laid out and how equipment is set up
Configuration How network is laid out and how equipment is set up Ring versus star topology Equipment use and configuration affects network management Virtualization versus actual servers 8
9
Keeping track of activity on network
Accounting Keeping track of activity on network By user Performance measurements Cost-benefit determination of resources and overhead devoted to network 9
10
How well the network is functioning Two components
Performance How well the network is functioning Two components How to determine how the network is performing: Network monitoring; determine where performance overlaps with accounting How to make the network perform better: New equipment, better procedures, and/or more efficient software 10
11
Security is part of network management
What measure to be taken What technologies to use in securing network Wired versus wireless systems Determined by levels of user access to be granted 11
12
Types of Network Documentation
Network maps Baselines Wiring schematics Cable management Asset management 12
13
Policies and procedures
Types of Network Documentation (Cont.) Change management Policies and procedures Configurations Regulations 13
14
Network Maps Network diagrams show either the physical layout or the logical layout of the network Physical network diagrams Logical network diagrams Spreadsheets can be tied to information as an organizational aid to assist in correcting technical problems 14
15
A snapshot of what is going on in your network
Baselines A snapshot of what is going on in your network Comparison point Baseline creation Determine purpose Establish objectives Decide on devices to be included Plan long term goals 15
16
Physical Network diagram
17
Logical Network Diagram
18
Windows 7 Performance Monitoring Software
19
Useful in troubleshooting and repairs
Wiring Schematics Diagram of where all wires in network are in relation to the physical layout of the network facility location Useful in troubleshooting and repairs Wire run locations Jack connections to ports and switches 19
20
Making sure all cabling is well organized and documented
Cable Management Making sure all cabling is well organized and documented Label and document Jacks Patch panels Switches Cables Keep cables neat and orderly Aids in troubleshooting and repairs 20
21
A basic inventory system
Asset Management A basic inventory system Label and document all equipment on a network Aids in: Detecting equipment theft Troubleshooting and repairs 21
22
Documenting changes on the network
Change Management Documenting changes on the network Changes, updates, additions, removals Clarifies planned changes versus fixes Provides technical staff troubleshooting tools Document changes to Hardware Software 22
23
Policies, Procedures, and Configurations
How various devices are configured Policies and procedures Concerning how network policy is documented and implemented Creating network management policies Factor in size of network Consider the job network is to accomplish Determine security needs 23
24
National and industry specific
Regulations Rules and guidelines imposed on the company by outside agencies and/or organizations Affect legal status of operations National and industry specific Strive to meet and exceed standards 24
25
Using Network Documentation
Determined by type of documentation Configuration information Policies and regulations Procedures 25
26
Keeping Network Documentation Up to Date
Out-of-date documentation is worse than no documentation Establish policies and regulations surrounding a regular maintenance program Perform regular inventories of equipment and software Reconcile to documentation 26
27
Act of watching a network and determining its current state
Network Monitoring Act of watching a network and determining its current state Packet sniffers SNMP Connectivity software 27
28
Packet Sniffers Primary function is to capture data packets and deconstruct them to know their protocols and content Shows error packets being sent Creates statistics about types of packets passing and ports used Wireshark is a widely used packet sniffer Legal implications 28
29
Wireshark Capturing Data Packets
30
Monitors network devices
SNMP Monitors network devices Constantly updates on the status of the devices it is running on Can be used to interrogate any device running May be vulnerable to hackers Run only when needed 30
31
Connectivity Software
Connectivity monitoring software Vulnerability testing 31
32
Connectivity Monitoring Software
Designed to monitor and track Computers connecting to network Computer ports is use Protocols used What other computers are connecting to Creates graphical representation of active connections The Dude nmap 32
33
nmap Zenmap of a Local Computer Connected to a Network
34
Vulnerability Testing
The practice of testing a network by looking for ways that a network can be compromised either by accident, circumstances, or deliberate action Additional use is tracking a compromised network to discover and fix breached locations Penetration testing Concerned with specific threats 34
35
Purpose is to test network capacity
Load Testing The act of deliberately putting greater than normal demands on a network or the devices in a network to see how they will behave Purpose is to test network capacity Stress testing is deliberately loading networks or devices beyond the point where they can function properly in order to see what will happen 35
36
Programs that are designed to test the actual throughput of a network
Throughput Testers Programs that are designed to test the actual throughput of a network Tests a private network Speed tests run on public networks Purpose is to determine what the exact throughput is at any given time 36
37
Logs System logs History logs
Data files kept by operating system or its components Records system, device, system event, and driver changes History logs Ongoing record of the activity in a specific device or on the network Reference record of past activities 37
38
Logs (Continued) Event logs Event Viewer
Data files that contain information about events in an operating system, application, or other software component Occurs when software program require a specific action Event Viewer Contains three main logs: Application, Security, and System 38
39
Windows 7 Event Viewer
40
Striking a balance between network performance and network cost
Network Optimization Striking a balance between network performance and network cost Reasons for network optimization Latency sensitivity High bandwidth applications Uptime 40
41
Latency Sensitivity Latency is the time needed for a packet to move from one location to another Causes Propagation Media Transmission Processing Storage delays 41
42
High Bandwidth Applications
Voice over Internet Protocol (VoIP) Allow voice and multimedia sessions Video applications Network video applications Video surveillance Video communications Edutainment Unified communications Multiple technologies on same network 42
43
Uptime The measure of how long a network and/or the devices on it have been running without any outages or being shut down Downtime Maximizing uptime/minimizing downtime Optimizing network Redundancy Compartmentalization 43
44
Quality of Service (QoS)
Methods to Achieve Network Optimization Quality of Service (QoS) Traffic shaping Load balancing High availability Caching engines Fault tolerance 44
45
Quality of Service (QoS)
Network mechanisms allowing a network to reserve resources and control how resources are distributed Bit rates Delays Jitters Packet drop probabilities Bit errors 45
46
Also packet shaping, is a tool for network optimization
Traffic Shaping Also packet shaping, is a tool for network optimization Controls and prioritizes traffic based on type of packet being passed Increases usable bandwidth Guarantees performance Improves latency 46
47
Network management tool intended to minimize impact of high traffic
Load Balancing Network management tool intended to minimize impact of high traffic Spreads traffic evenly Requires all devices to be connected to network in same way Requires software component control Common Address Redundancy Protocol(CARP) Pooled devices use same IP address 47
48
A goal or concept in network optimization
High Availability A goal or concept in network optimization Refers to ability to keep network running reliably with minimal downtime High redundancy Alternate routes (paths) to every major location (segment) on network 48
49
Network caching system
Caching Engines Network caching system Caching server Caching engine Optimizes performance by retrieving data locally Determines data to be stored locally Tracks data commonly asked for 49
50
How a Caching Engine Works
51
Level of fault tolerance determined by cost- benefit analysis
The ability of a network to have a portion of the network fail but still continue to work at some level of functionality Goal of redundancy Level of fault tolerance determined by cost- benefit analysis 51
52
Summary The network management functions of monitoring, configuring, maintaining, supporting, and updating a network are important in detecting and correcting problems Network management considerations include facets of reliability, configuration, accounting, performance, and security Documentation types include network maps; baselines; wiring, cable, asset, and change management; configurations; policies; procedures; and regulations 52
53
Summary (Continued) Using network documentation depends on whether it is configuration information, policies and regulations, or procedures Keep network documentation up-to-date Monitor the network with packet sniffers, SNMP, and connectivity software Connectivity monitoring software is designed to monitor network connections Vulnerability testing is looking for ways that a network can be compromised either by accident, circumstances, or deliberate action 53
54
Summary (Continued) Load and stress testing is putting greater than normal demands on a network to see how it will behave Throughput testers are designed to test and determine the actual throughput of a network Logs—including system, history, event, and event viewers—are data files created to record what a program has done Network optimization is needed due to latency sensitivity, high bandwidth applications, and uptime 54
55
Summary (Continued) High bandwidth applications encompass Voice over Internet Protocol (VoIP), video applications, and unified communications Uptime is maximized through optimization; downtime is minimized through maintenance Quality of Service (QOS), traffic shaping, load balancing, high availability, engine caching, and fault tolerances are methods used to achieve network optimization 55
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.