Download presentation
Presentation is loading. Please wait.
Published byBrian Barber Modified over 9 years ago
1
Network Management Chapter 18
2
Objectives Describe how configuration management documentation enables you to manage and upgrade a network efficiently Conduct network monitoring to identify performance and connectivity issues Explain how to optimize network performance
3
Overview
4
Introduction to Network Management Complicated networks are vulnerable Configuration management is necessary Configuration management prevents problems when upgrading
5
Three Parts to Chapter 18 Network Configuration Management Monitoring Performance and Connectivity Network Performance Optimization
6
Network Configuration Management
7
–Configuration Management Documentation –Wiring Schematics or Diagrams
8
Configuration Management Documentation –Wiring diagrams –Network diagrams –Baselines –Policies, procedures, and configurations –Regulations
9
Wiring Schematics or Diagrams –Wiring diagram/wiring schematic How the wires connect to various switches, etc. Wiring standards used (CAT53, 568A, fiber, etc.) Every cable run, telecom closet, etc. Cross-connects, demarcs, etc. Telephone runs
10
Figure 18.1 Wiring diagram overview
11
Figure 18.2 Wiring diagram detail
12
Physical and Logical Network Diagrams –Information not included in wiring diagrams
13
Physical Network Diagram –Physical runs –Defines types of connections –Routers, switches, servers, CSU/DSU, etc. –Created by network administrator Using standardized network topology icons Using software utility like MS Visio
14
Figure 18.3 Physical network diagram
15
Figure 18.4 Sample network topology icons
16
Figure 18.5 Visio in action
17
Logical Network Diagram –Broadcast domains (circles) –Internet connections (clouds) –Static IP addresses of significant systems –Only critical switches or routers
18
Figure 18.6 Logical network diagram
19
Baselines –Benchmark of when everything is working correctly –Commit to creating often and comparing –Log of performance indicators CPU usage Network utilization Other performance measurements Windows Performance Monitor
20
Policies –Acceptable use policy What people can and cannot do with network hardware and software –User training –Security policy Level of access for employees Password complexity and much more
21
Procedures –What to do When upgrading components When adding new user accounts
22
Configurations –How software should be configured –How hardware should be configured –Results of the procedures
23
Figure 18.7 Section of SHOW CONFIG
24
Regulations –Rules governing behavior in the workplace –How to keep network and people safe and productive –Included in configuration management documentation
25
Change Management Documentation –CompTIA separates detailed overview of network from how to upgrade it –Normally these are combined into the change management documentation –Consult documentation before major changes
26
Monitoring Performance and Connectivity
27
Monitoring Tasks –Create baselines –Ongoing monitoring –Various logs
28
Monitoring Tools –Windows Performance Monitor (PerfMon) Monitors behavior of hardware and software Monitors locally or remotely
29
Configuring Performance Monitor –Object System Components CPU, memory, disk drives, etc. –Counter A measurable feature of an object –Views A variety of ways of presenting information Real-time or logged
30
Configuring Performance Monitor –Add counters and objects –For logging, must add entire object –Monitor local or remote computer –Save log files for a snapshot of a point in time
31
Figure 18.8 Performance Monitor in action
32
Figure 18.9 Monitoring a remote computer
33
Figure 18.10 Selecting performance objects
34
Figure 18.11 Logging data
35
Figure 18.12 Selecting a log file
36
Figure 18.13 Replaying a log file
37
Create multiple baselines –System at rest –System in use Revisit and monitor changes to baseline
38
Third-party network monitoring tools –Often expensive –Generate baselines –Monitor in real-time –Alert administrator to problems –Can act as intrusion detection systems (IDS) –Example: IPSentry by RGE, Inc.
39
Figure 18.14 IPSentry at work
40
More about logs –Every OS generates logs –Three types (Windows examples) Application logs Security logs System logs
41
Log Viewers –Windows Event Viewer –Linux stores logs in /VAR/LOG Use text editor to view –Mac OSX GUI viewer called Console
42
Figure 18.15 Event Viewer in Windows Vista
43
Network Performance Optimization
44
Overview –Network admin keeps network running –Users notice problems quickly –CompTIA Network+ requirements Caching Controlling data throughput Keeping resources available
45
Caching –Storing requested data in hopes it will be needed again [in the short term] –Works in many ways on a network –Reduces network workload
46
Figure 18.16 Pausing a video on YouTube
47
Figure 18.17 Hulu.com (I love this site!)
48
Controlling Data Throughput –Most networks have limited bandwidth Growing use It will eventually get slower Latency-sensitive applications need consistent bandwidth Apps like streaming video require high bandwidth
49
Methods for Controlling Data Throughput –Throttling bandwidth Quality of Service (QoS) –Priority to certain ports –Layer 2 of the OSI model Traffic Shaping (a.k.a. bandwidth shaping) –Priority by TCP/UDP port number –Layers 3 and 7 of the OSI model
50
Figure 18.18 Traffic shaping on a SOHO router
51
Keeping Resources Available –High availability –Fault tolerance –Data backup
52
Data Backup –Desktop or individual server –Enterprise backup –Backup media Tape Local hard drive Networked storage
53
Figure 18.19 Windows Backup
54
Archive bit –A.k.a. archive attribute –Key to effective backups –Turned “on” when a file is saved –Some applications turn it on when they open a file
55
Figure 18.20 The archive bit on these files is on.
56
Backup programs and the archive bit –Depending on backup function selected Only backs up files with the archive bit on Backs up selected files, ignoring state of archive Turns off archive bit for every file backed up –Archive bit off means file was backed up –Archive bit on means file has been changed
57
Types of backup –Normal backup – all selected files backed up and archive bit turned off –Copy backup – like normal without touching the archive bit –Incremental backup – all selected files with archive bit turned on; turns off bit –Differential backup – all selected files with archive bit turned on; leaves bit as is –Daily backup – all files changed; leaves bit off
58
Figure 18.21 Incremental vs. differential
59
Figure 18.22 Restoring from backups
60
Backup strategies –Must meet organization’s need –Must be able to easily restore –Have a regimen What to do with backup media Rotate media –Grandfather, father, son (GFS)
61
Other factors in a backup strategy –Uninterruptible power supply (UPS) pro- tects against short-term power outages –Backup Generator protects against long- term power outages –RAID and Redundant Hardware System automatically uses redundant component after a failure Works normally and buys time for administrator to replace failed component
62
Redundant Array of Independent Disks (RAID) –RAID 0 Data striping across multiple disks (2 minimum) –RAID 1 Data mirroring (2 disks) –RAID 5 Disk striping with distributed parity (3 minimum)
63
Other Redundant Hardware –Redundant power supplies –Redundant network connections –Cluster Servers and Load Balancing
64
Cluster servers –Multiple identical servers –If a server goes down, others pick up the load –Need cluster-aware operating system, such as Windows Server for the Enterprise
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.