Presentation is loading. Please wait.

Presentation is loading. Please wait.

Network Management Chapter 18. Objectives Describe how configuration management documentation enables you to manage and upgrade a network efficiently.

Similar presentations


Presentation on theme: "Network Management Chapter 18. Objectives Describe how configuration management documentation enables you to manage and upgrade a network efficiently."— Presentation transcript:

1 Network Management Chapter 18

2 Objectives Describe how configuration management documentation enables you to manage and upgrade a network efficiently Conduct network monitoring to identify performance and connectivity issues Explain how to optimize network performance

3 Overview

4 Introduction to Network Management Complicated networks are vulnerable Configuration management is necessary Configuration management prevents problems when upgrading

5 Three Parts to Chapter 18 Network Configuration Management Monitoring Performance and Connectivity Network Performance Optimization

6 Network Configuration Management

7 –Configuration Management Documentation –Wiring Schematics or Diagrams

8 Configuration Management Documentation –Wiring diagrams –Network diagrams –Baselines –Policies, procedures, and configurations –Regulations

9 Wiring Schematics or Diagrams –Wiring diagram/wiring schematic How the wires connect to various switches, etc. Wiring standards used (CAT53, 568A, fiber, etc.) Every cable run, telecom closet, etc. Cross-connects, demarcs, etc. Telephone runs

10 Figure 18.1 Wiring diagram overview

11 Figure 18.2 Wiring diagram detail

12 Physical and Logical Network Diagrams –Information not included in wiring diagrams

13 Physical Network Diagram –Physical runs –Defines types of connections –Routers, switches, servers, CSU/DSU, etc. –Created by network administrator Using standardized network topology icons Using software utility like MS Visio

14 Figure 18.3 Physical network diagram

15 Figure 18.4 Sample network topology icons

16 Figure 18.5 Visio in action

17 Logical Network Diagram –Broadcast domains (circles) –Internet connections (clouds) –Static IP addresses of significant systems –Only critical switches or routers

18 Figure 18.6 Logical network diagram

19 Baselines –Benchmark of when everything is working correctly –Commit to creating often and comparing –Log of performance indicators CPU usage Network utilization Other performance measurements Windows Performance Monitor

20 Policies –Acceptable use policy What people can and cannot do with network hardware and software –User training –Security policy Level of access for employees Password complexity and much more

21 Procedures –What to do When upgrading components When adding new user accounts

22 Configurations –How software should be configured –How hardware should be configured –Results of the procedures

23 Figure 18.7 Section of SHOW CONFIG

24 Regulations –Rules governing behavior in the workplace –How to keep network and people safe and productive –Included in configuration management documentation

25 Change Management Documentation –CompTIA separates detailed overview of network from how to upgrade it –Normally these are combined into the change management documentation –Consult documentation before major changes

26 Monitoring Performance and Connectivity

27 Monitoring Tasks –Create baselines –Ongoing monitoring –Various logs

28 Monitoring Tools –Windows Performance Monitor (PerfMon) Monitors behavior of hardware and software Monitors locally or remotely

29 Configuring Performance Monitor –Object System Components CPU, memory, disk drives, etc. –Counter A measurable feature of an object –Views A variety of ways of presenting information Real-time or logged

30 Configuring Performance Monitor –Add counters and objects –For logging, must add entire object –Monitor local or remote computer –Save log files for a snapshot of a point in time

31 Figure 18.8 Performance Monitor in action

32 Figure 18.9 Monitoring a remote computer

33 Figure 18.10 Selecting performance objects

34 Figure 18.11 Logging data

35 Figure 18.12 Selecting a log file

36 Figure 18.13 Replaying a log file

37 Create multiple baselines –System at rest –System in use Revisit and monitor changes to baseline

38 Third-party network monitoring tools –Often expensive –Generate baselines –Monitor in real-time –Alert administrator to problems –Can act as intrusion detection systems (IDS) –Example: IPSentry by RGE, Inc.

39 Figure 18.14 IPSentry at work

40 More about logs –Every OS generates logs –Three types (Windows examples) Application logs Security logs System logs

41 Log Viewers –Windows Event Viewer –Linux stores logs in /VAR/LOG Use text editor to view –Mac OSX GUI viewer called Console

42 Figure 18.15 Event Viewer in Windows Vista

43 Network Performance Optimization

44 Overview –Network admin keeps network running –Users notice problems quickly –CompTIA Network+ requirements Caching Controlling data throughput Keeping resources available

45 Caching –Storing requested data in hopes it will be needed again [in the short term] –Works in many ways on a network –Reduces network workload

46 Figure 18.16 Pausing a video on YouTube

47 Figure 18.17 Hulu.com (I love this site!)

48 Controlling Data Throughput –Most networks have limited bandwidth Growing use It will eventually get slower Latency-sensitive applications need consistent bandwidth Apps like streaming video require high bandwidth

49 Methods for Controlling Data Throughput –Throttling bandwidth Quality of Service (QoS) –Priority to certain ports –Layer 2 of the OSI model Traffic Shaping (a.k.a. bandwidth shaping) –Priority by TCP/UDP port number –Layers 3 and 7 of the OSI model

50 Figure 18.18 Traffic shaping on a SOHO router

51 Keeping Resources Available –High availability –Fault tolerance –Data backup

52 Data Backup –Desktop or individual server –Enterprise backup –Backup media Tape Local hard drive Networked storage

53 Figure 18.19 Windows Backup

54 Archive bit –A.k.a. archive attribute –Key to effective backups –Turned “on” when a file is saved –Some applications turn it on when they open a file

55 Figure 18.20 The archive bit on these files is on.

56 Backup programs and the archive bit –Depending on backup function selected Only backs up files with the archive bit on Backs up selected files, ignoring state of archive Turns off archive bit for every file backed up –Archive bit off means file was backed up –Archive bit on means file has been changed

57 Types of backup –Normal backup – all selected files backed up and archive bit turned off –Copy backup – like normal without touching the archive bit –Incremental backup – all selected files with archive bit turned on; turns off bit –Differential backup – all selected files with archive bit turned on; leaves bit as is –Daily backup – all files changed; leaves bit off

58 Figure 18.21 Incremental vs. differential

59 Figure 18.22 Restoring from backups

60 Backup strategies –Must meet organization’s need –Must be able to easily restore –Have a regimen What to do with backup media Rotate media –Grandfather, father, son (GFS)

61 Other factors in a backup strategy –Uninterruptible power supply (UPS) pro- tects against short-term power outages –Backup Generator protects against long- term power outages –RAID and Redundant Hardware System automatically uses redundant component after a failure Works normally and buys time for administrator to replace failed component

62 Redundant Array of Independent Disks (RAID) –RAID 0 Data striping across multiple disks (2 minimum) –RAID 1 Data mirroring (2 disks) –RAID 5 Disk striping with distributed parity (3 minimum)

63 Other Redundant Hardware –Redundant power supplies –Redundant network connections –Cluster Servers and Load Balancing

64 Cluster servers –Multiple identical servers –If a server goes down, others pick up the load –Need cluster-aware operating system, such as Windows Server for the Enterprise


Download ppt "Network Management Chapter 18. Objectives Describe how configuration management documentation enables you to manage and upgrade a network efficiently."

Similar presentations


Ads by Google