Network+ Guide to Networks 6th Edition

Slides:



Advertisements
Similar presentations
Data Storage Solutions Module 1.2. Data Storage Solutions Upon completion of this module, you will be able to: List the common storage media and solutions.
Advertisements

Chapter 3: Planning a Network Upgrade
A new standard in Enterprise File Backup. Contents 1.Comparison with current backup methods 2.Introducing Snapshot EFB 3.Snapshot EFB features 4.Organization.
Network+ Guide to Networks 5th Edition
Chapter 5: Server Hardware and Availability. Hardware Reliability and LAN The more reliable a component, the more expensive it is. Server hardware is.
REDUNDANT ARRAY OF INEXPENSIVE DISCS RAID. What is RAID ? RAID is an acronym for Redundant Array of Independent Drives (or Disks), also known as Redundant.
Oracle Data Guard Ensuring Disaster Recovery for Enterprise Data
June 23rd, 2009Inflectra Proprietary InformationPage: 1 SpiraTest/Plan/Team Deployment Considerations How to deploy for high-availability and strategies.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Network+ Guide to Networks, Fourth Edition
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Lesson 1: Configuring Network Load Balancing
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Session 3 Windows Platform Dina Alkhoudari. Learning Objectives Understanding Server Storage Technologies Direct Attached Storage DAS Network-Attached.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
November 2009 Network Disaster Recovery October 2014.
Backup Strategy. Backup strategy Backup copy is a second copy saved to another location, usually on a backup device e.g. USB stick.Backup copy is a second.
Security Equipment Equipment for preventing unauthorised access to data & information.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
Introduction to Computer Networks Introduction to Computer Networks.
Network Management Chapter 18. Objectives Describe how configuration management documentation enables you to manage and upgrade a network efficiently.
Lesson 20. Fault Tolerance and Disaster Recovery.
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
Concepts of Database Management Sixth Edition
Ensuring Integrity and Availability
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Chapter Fourteen Windows XP Professional Fault Tolerance.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
IT Infrastructure Chap 1: Definition
© 2001 by Prentice Hall11-1 Local Area Networks, 3rd Edition David A. Stamper Part 4: Installation and Management Chapter 11 LAN Administration: Backup.
MCTS Guide to Microsoft Windows Vista Chapter 4 Managing Disks.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Disaster Recovery and Business Continuity Planning.
"1"1 Introduction to Managing Data " Describe problems associated with managing large numbers of disks " List requirements for easily managing large amounts.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
Chapter2 Networking Fundamentals
Lesson 8—Networking BASICS1 Networking BASICS Managing a Local Area Network Unit 2 Lesson 8.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Group 2 Bernard Smith Thomas Laborde Hannah Prather Fault Tolerance Environment Power Topology and Connectivity Servers Hurricane Preparedness Network.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 12: Planning and Implementing Server Availability and Scalability.
VMware vSphere Configuration and Management v6
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Fault Tolerance and Disaster Recovery. Topics Using Antivirus software Fault tolerance –Power –Redundancy –Storage –Services Disaster Recovery –Backup/Restore.
1/28/2010 Network Plus Malware and Ensuring Availability.
CHAPTER 7 CLUSTERING SERVERS. CLUSTERING TYPES There are 2 types of clustering ; Server clusters Network Load Balancing (NLB) The difference between the.
Install, configure and test ICT Networks
Lec 5 part2 Disk Storage, Basic File Structures, and Hashing.
Component 8/Unit 9aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 9a Creating Fault Tolerant.
CEG 2400 FALL 2012 Chapter 14 Ensuring Integrity and Availability 1Ensuring Integrity and Availability.
1 CEG 2400 Fall 2012 Network Servers. 2 Network Servers Critical Network servers – Contain redundant components Power supplies Fans Memory CPU Hard Drives.
Chapter 13 Ensuring Integrity and Availability. What Are Integrity and Availability? Integrity: soundness of network’s programs, data, services, devices,
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Chapter 14: System Administration Mark Milan. System Administration Acquiring new IS resources Maintaining existing IS resources Designing and implementing.
Network+ Guide to Networks 5 th Edition Chapter 14 Ensuring Integrity and Availability.
Network+ Guide to Networks 5th Edition
Network+ Guide to Networks 5th Edition
An Introduction to Computer Networking
Web Server Administration
SpiraTest/Plan/Team Deployment Considerations
Prepared by Jaroslav makovski
Presentation transcript:

Network+ Guide to Networks 6th Edition Chapter 14 Ensuring Integrity and Availability

Objectives Identify the characteristics of a network that keep data safe from loss or damage Protect an enterprise-wide network from malware Explain fault-tolerance techniques for storage, network design, connectivity devices, naming and addressing services, and servers Discuss best practices for network backup and recovery Describe the components of a useful disaster recovery plan and the options for disaster contingencies Network+ Guide to Networks, 6th Edition

What Are Integrity and Availability? Soundness of network’s programs, data, services, devices, connections Availability How consistently and reliably a file or system can be accessed Uptime Measure of time functioning normally between failures Often expressed as percent uptime Network+ Guide to Networks, 6th Edition

Table 14-1 Availability and downtime equivalents Courtesy Course Technology/Cengage Learning Network+ Guide to Networks, 6th Edition

What Are Integrity and Availability? (cont’d.) Integrity and availability compromised by: Security breaches Natural disasters Malicious intruders Power flaws Human error Follow guidelines to keep network highly available See Pages 646-647 of text Network+ Guide to Networks, 6th Edition

Malware Malicious software Program designed to intrude upon or harm system, resources Examples: viruses, Trojan horses, worms, bots Virus Replicating program intent to infect more computers Copied to system without user knowledge Replicates through network connections or exchange of external storage devices Network+ Guide to Networks, 6th Edition

Malware (cont’d.) Trojan horse (Trojan) Program that disguises itself as something useful Actually harms your system Network+ Guide to Networks, 6th Edition

Malware Types and Characteristics Malware categorized by location and propagation method Boot sector viruses Macro viruses File-infector viruses Worms Trojan horses Network viruses Bots Network+ Guide to Networks, 6th Edition

Malware Types and Characteristics (cont’d.) Malware characteristics Encryption Some viruses, worms, Trojan horses Stealth Hidden to prevent detection Disguised as legitimate programs Polymorphism Change characteristics every time they transfer to new system Use complicated algorithms; incorporate nonsensical commands Network+ Guide to Networks, 6th Edition

Malware Types and Characteristics (cont’d.) Malware characteristics (cont’d.) Time dependence Programmed to activate on particular date Can remain dormant and harmless until date arrives Logic bombs: programs designed to start when certain conditions met Malware can exhibit more than one characteristic Network+ Guide to Networks, 6th Edition

Malware Protection Effective malware protection requires: Choosing appropriate anti-malware program Monitoring network Continually updating anti-malware program Educating users Network+ Guide to Networks, 6th Edition

Malware Protection (cont’d.) Malware leaves evidence Some detectable only by anti-malware software User symptoms Unexplained file size increases Significant, unexplained system performance decline Unusual error messages Significant, unexpected system memory loss Periodic, unexpected rebooting Display quality fluctuations Malware often discovered after damage done Network+ Guide to Networks, 6th Edition

Malware Protection (cont’d.) Anti-malware key software functions Signature scanning Compares file’s content with known malware signatures Integrity checking Compares current file characteristics against archived version Monitoring unexpected file changes Receive regular updates from central network console Consistently report valid instances of malware Network+ Guide to Networks, 6th Edition

Malware Protection (cont’d.) Anti-malware software implementation Dependent upon environment’s needs Key: deciding where to install software Desktop machines Server Balance protection with performance impact Network+ Guide to Networks, 6th Edition

Malware Protection (cont’d.) Anti-malware policies Rules for using anti-malware software Rules for installing programs, sharing files, using external disks Management should authorize and support policy Anti-malware policy guidelines See Pages 651-652 of text Measures designed to protect network from damage, downtime Network+ Guide to Networks, 6th Edition

Fault Tolerance Capacity for system to continue performing Failure Despite unexpected hardware, software malfunction Failure Deviation from specified system performance level Given time period Fault Malfunction of one system component Can result in failure Fault-tolerant system goal Prevent faults from progressing to failures Network+ Guide to Networks, 6th Edition

Fault Tolerance (cont’d.) Degrees of fault tolerance Optimal level depends on file or service criticality Highest level System remains unaffected by most drastic problem Network+ Guide to Networks, 6th Edition

Environment Consider network device environment Protect devices from: Excessive heat, moisture Use temperature, humidity monitors Break-ins Natural disasters Network+ Guide to Networks, 6th Edition

Power Blackout Brownout Causes Solution Complete power loss Temporary dimming of lights Causes Forces of nature Utility company maintenance, construction Solution Alternate power sources Network+ Guide to Networks, 6th Edition

Power (cont’d.) Power flaws not tolerated by networks Types of power flaws that create damage Surge Momentary increase in voltage Noise Fluctuation in voltage levels Brownout Momentary voltage decrease Blackout Complete power loss Network+ Guide to Networks, 6th Edition

Power (cont’d.) Uninterruptible power supplies (UPSs) UPS categories Battery-operated power source Directly attached to one or more devices Attached to a power supply Prevents harm to device, service interruption UPS categories Standby Online Network+ Guide to Networks, 6th Edition

Power (cont’d.) Standby UPS (offline UPS) Provides continuous voltage Switches instantaneously to battery upon power loss Restores power Problems Time to detect power loss Device may have shut down or restarted Network+ Guide to Networks, 6th Edition

Power (cont’d.) Online UPS Factors to consider when choosing UPS A/C power continuously charges battery No momentary service loss risk Handles noise, surges, sags Before power reaches attached device More expensive than standby UPSs Factors to consider when choosing UPS Amount of power needed Period of time to keep device running Line conditioning Cost Network+ Guide to Networks, 6th Edition

Figure 14-1 Standby and online UPSs Courtesy of Schneider Electric Network+ Guide to Networks, 6th Edition

Power (cont’d.) Generators Generator choice Powered by diesel, liquid propane, gas, natural gas, or steam Do not provide surge protection Provide electricity free from noise Used in highly available environments Generator choice Calculate organization’s crucial electrical demands Determine generator’s optimal size Network+ Guide to Networks, 6th Edition

Figure 14-2 UPSs and a generator in a network design Courtesy Course Technology/Cengage Learning Network+ Guide to Networks, 6th Edition

Network Design Supply multiple paths for data travel Topology LAN: star topology and parallel backbone provide greatest fault tolerance WAN: full-mesh topology SONET technology Uses two fiber rings for every connection Can easily recover from fault in one of its links Network+ Guide to Networks, 6th Edition

Figure 14-3 Full-mesh WAN Courtesy Course Technology/Cengage Learning Network+ Guide to Networks, 6th Edition

Network Design (cont’d.) Review PayNTime example on Pages 657-658 Possible solutions: supply duplicate connection Use different service carriers Use two different routes Critical data transactions follow more than one path Network redundancy advantages Reduces network fault risk Lost functionality, profits Disadvantage: cost Network+ Guide to Networks, 6th Edition

Network Design (cont’d.) Scenario: two critical links Capacity, scalability concerns Solution Partner with ISP Establish secure VPNs See Figure 14-4 Network+ Guide to Networks, 6th Edition

Figure 14-4 VPNs linking multiple customers Courtesy Course Technology/Cengage Learning Network+ Guide to Networks, 6th Edition

Network Design (cont’d.) Scenario Devices connect one LAN, WAN segment to another Experience a fault VPN agreement with national ISP Single T1 link supports five customers Figure 14-5 Single T1 connectivity Courtesy Course Technology/Cengage Learning Network+ Guide to Networks, 6th Edition

Network Design (cont’d.) Problem with arrangement of Figure 14-5 Many single points of failure T1 link failure Firewall, router, CSU/DSU, multiplexer, or switch Solution Redundant devices with automatic failover Hot swappable devices Immediately assume identical component duties Cold spare Duplicate device on hand, not installed Network+ Guide to Networks, 6th Edition

Figure 14-6 Fully redundant T1 connectivity Courtesy Course Technology/Cengage Learning Network+ Guide to Networks, 6th Edition

Network Design (cont’d.) Failover capable or hot swappable components Desired for switches or routers supporting critical links Adds to device cost Link aggregation (bonding) Combination of multiple network interfaces to act as one logical interface Example: NIC teaming Load balancing Automatic traffic distribution over multiple components or links Network+ Guide to Networks, 6th Edition

Figure 14-7 Link aggregation between a switch and server Courtesy Course Technology/Cengage Learning Network+ Guide to Networks, 6th Edition

Network Design (cont’d.) Naming and addressing services Failure causes nearly all traffic to come to a halt Solution: maintain redundant name servers DNS caching servers Allows local name resolution Faster performance Reduces burden on master name server Network+ Guide to Networks, 6th Edition

Figure 14-8 Redundant name servers Courtesy Course Technology/Cengage Learning Network+ Guide to Networks, 6th Edition

Network Design (cont’d.) DNS can point to redundant locations for each host name Use different IP addresses that all point to identical Web servers Round-robin DNS Use each IP address sequentially Load balancer Dedicated device for intelligent traffic distribution Considers traffic levels when forwarding requests Network+ Guide to Networks, 6th Edition

Figure 14-9 Redundant entries in a DNS zone file Courtesy Course Technology/Cengage Learning Network+ Guide to Networks, 6th Edition

Network Design (cont’d.) CARP (Common Address Redundancy Protocol) Allows pool of computers to share IP addresses Master computer receives request Parcels out request to one of several group computers Network+ Guide to Networks, 6th Edition

Figure 14-10 Round-robin DNS with CARP Courtesy Course Technology/Cengage Learning Network+ Guide to Networks, 6th Edition

Servers Critical servers Server mirroring Contain redundant components Provide fault tolerance, load balancing Server mirroring Fault-tolerance technique One device, component duplicates another's activities Uses identical servers, components High-speed link between servers Synchronization software Form of replication Dynamic copying of data from one location to another Network+ Guide to Networks, 6th Edition

Servers (cont’d.) Server mirroring advantage Disadvantages Flexibility in server location Disadvantages Time delay for mirrored server to assume functionality Toll on network as data copied between sites Hardware and software costs May be justifiable Network+ Guide to Networks, 6th Edition

Servers (cont’d.) Clustering Clustered servers share processing duties Links multiple servers together Act as single server Clustered servers share processing duties Appear as single server to users Failure of one server Others take over More cost-effective than mirroring For large networks Network+ Guide to Networks, 6th Edition

Servers (cont’d.) Clustering advantages over mirroring Each clustered server Performs data processing Always ready to take over Reduces ownership costs Improves performance Network+ Guide to Networks, 6th Edition

Storage Data storage Various methods available Issues of availability and fault tolerance apply Various methods available Ensure shared data and applications never lost or irretrievable RAID (Redundant Array of Independent [or Inexpensive] Disks) Collection of disks Provide shared data, application fault tolerance Network+ Guide to Networks, 6th Edition

Storage (cont’d.) Disk array (drive) RAID drive (RAID array) Group of hard disks RAID drive (RAID array) Collection of disks working in a RAID configuration Single logical drive Network+ Guide to Networks, 6th Edition

Storage (cont’d.) Hardware RAID Software RAID Set of disks, separate disk controller RAID array managed exclusively by RAID disk controller Attached to server through server’s controller interface Software RAID Software implements and controls RAID techniques Any hard disk type Less expensive (no controller, disk array) Performance rivals hardware RAID Several different types of RAID available Network+ Guide to Networks, 6th Edition

Storage (cont’d.) NAS (Network Attached Storage) Difference from RAID Specialized storage device, storage device group Provides centralized fault-tolerant data storage Difference from RAID Maintains own interface to LAN Advantages NAS device contains own file system Optimized for saving, serving files Easily expandable No service interruption Network+ Guide to Networks, 6th Edition

Figure 14-11 Network attached storage on a LAN Courtesy Course Technology/Cengage Learning Network+ Guide to Networks, 6th Edition

Storage (cont’d.) Disadvantage NAS use SANs (Storage Area Networks) No direct communication with network clients NAS use Enterprises requiring fault tolerance, fast data access SANs (Storage Area Networks) Distinct networks of storage devices Communicate directly with each other, other networks Typical SAN contains multiple storage devices Connected to multiple, identical servers Network+ Guide to Networks, 6th Edition

Storage (cont’d.) SAN advantages Fault tolerant Extremely fast Special transmission method Fiber-optic media, proprietary protocols Example: Fibre Channel Install in location separate from LAN served Provides added fault tolerance Highly scalable Faster, more efficient method of writing data Network+ Guide to Networks, 6th Edition

Storage (cont’d.) SAN disadvantages Use High cost Small SAN: $100,000 Large SAN: several million dollars More complex than NAS, RAID Training, administration efforts required Use Environments with huge data quantities requiring quick availability Network+ Guide to Networks, 6th Edition

Figure 14-12 A storage area network Courtesy Course Technology/Cengage Learning Network+ Guide to Networks, 6th Edition

Data Backup Backup Without backup: risk losing everything Copies of data or program files Created for archiving, safekeeping Store off site Without backup: risk losing everything Many backup options available Performed by different software and hardware Use different storage media types Can be controlled by NOS utilities, third-party software Network+ Guide to Networks, 6th Edition

Backup Media and Methods Approach to selecting backup media, methods Ask questions to select appropriate solution Optical media Media storing digitized data Uses laser to write data, read data Examples: CDs, DVDs Backup requirements Recordable CD or DVD drive, software utility Blu-ray Optical storage format Network+ Guide to Networks, 6th Edition

Backup Media and Methods (cont’d.) DVD and Blu-ray DVD disadvantages Writing data takes longer than other media Requires more human intervention than other backup methods Tape backups Copying data to magnetic tape Requirements Tape drive connected to network Management software Backup media Network+ Guide to Networks, 6th Edition

Backup Media and Methods (cont’d.) Small network tape backups Stand-alone tape drives attached to each server Large network tape backups One large, centralized tape backup device Manages all subsystems’ backups Extremely large environments Robots retrieve, circulate tapes from tape storage library Network+ Guide to Networks, 6th Edition

Backup Media and Methods (cont’d.) External disk drives (removable disk drives) Storage device attached temporarily to computer USB, PCMCIA, FireWire, CompactFlash port Simple to use, save, share data Temporary drive appears like any other drive Large data amount requirements Backup control features, higher storage capacity, faster read-write access Network+ Guide to Networks, 6th Edition

Backup Media and Methods (cont’d.) Network backups Save data to another place on network Different server, another WAN location SAN, NAS storage device Online backup (cloud backup) Saves data to another company’s storage array using Internet Implement strict security measures Automated backup, restoration processes Evaluate online back up provider Test speed, accuracy, security, recovery Network+ Guide to Networks, 6th Edition

Backup Strategy Devise a strategy to perform reliable backups Document in accessible area Address various questions Archive bit File attribute Set to on or off On indicates file must be archived Used by various backup methods Network+ Guide to Networks, 6th Edition

Backup Strategy (cont’d.) Full backup All data copied Uncheck archive bits Incremental backup Copy data changed since last full, incremental backup Differential backup Copy only data changed since last backup All data marked for subsequent backup Does not uncheck archive bits Network+ Guide to Networks, 6th Edition

Backup Strategy (cont’d.) Determine best backup rotation scheme Plan specifies when and how often backups occur Goal Provide excellent data reliability without overtaxing network, requiring intervention Grandfather-Father-Son strategy Uses backup sets Daily (son) Weekly (father) Monthly (grandfather) Network+ Guide to Networks, 6th Edition

Figure 14-13 The Grandfather-Father-Son backup rotation scheme Courtesy Course Technology/Cengage Learning Network+ Guide to Networks, 6th Edition

Backup Strategy (cont’d.) Ensure backup activity recorded in backup log Backup date Media identification Type of data backed up Type of backup Files backed up Backup location Establish regular verification schedule Attempt to recover files periodically Network+ Guide to Networks, 6th Edition

Disaster Recovery Disaster recovery Consider possible extremes Restoring critical functionality, data After enterprise-wide outage Affecting more than single system, limited group Consider possible extremes Not relatively minor outages, failures, security breaches, data corruption Network+ Guide to Networks, 6th Edition

Disaster Recovery Planning Account for worst-case scenarios Identify disaster recovery team Provide contingency plans Restore and replace: Computer systems Power Telephony systems Paper-based files Plan contains various sections Lessen critical data loss risk Network+ Guide to Networks, 6th Edition

Disaster Recovery Contingencies Cold site Components necessary to rebuild network exist Not appropriately configured, updated, or connected Warm site Some appropriately configured, updated, and connected Hot site Components exist and match network’s current state All appropriately configured, updated, and connected Network+ Guide to Networks, 6th Edition

Summary Integrity and availability: important concepts Malware aims to intrude upon or harm system Anti-malware software part of network protection Fault tolerance allows system to continue performing despite unexpected malfunction Various types of backup power supplies exist Network design can provide different levels of fault tolerance Mirroring, clustering, RAID, NAS, and SAN can provide fault tolerance Network+ Guide to Networks, 6th Edition