Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.

Slides:



Advertisements
Similar presentations
Chapter 3: Planning a Network Upgrade
Advertisements

Communication and Networking Services Networking Services.
Network+ Guide to Networks, Fourth Edition
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
1 Web Server Administration Chapter 3 Installing the Server.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
1 IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer Fall 2005.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 8: Implementing and Managing Printers.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Operating Systems.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Section 2.1 Section 2.2 Compare and contrast clients and servers
November 2009 Network Disaster Recovery October 2014.
Configuring File Services Lesson 6. Skills Matrix Technology SkillObjective DomainObjective # Configuring a File ServerConfigure a file server4.1 Using.
Hands-on Networking Fundamentals
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
Module 9 Review Questions 1. The ability for a system to continue when a hardware failure occurs is A. Failure tolerance B. Hardware tolerance C. Fault.
Operating Systems Networking for Home and Small Businesses – Chapter 2 – Introduction To Networking.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
WINDOWS XP PROFESSIONAL Bilal Munir Mughal Chapter-1 1.
Lecture One An Introduction To Networking. Chapter One Objectives  Examine the objectives of networked computing relative to standalone computing  Identify.
Chapter 2 Network Design Essentials Instructor: Nhan Nguyen Phuong.
1 WHY NEED NETWORKING? - Access to remote information - Person-to-person communication - Cooperative work online - Resource sharing.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
14 Publishing a Web Site Section 14.1 Identify the technical needs of a Web server Evaluate Web hosts Compare and contrast internal and external Web hosting.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Introduction to Networks Ruth Watson
2 Systems Architecture, Fifth Edition Chapter Goals Describe the activities of information systems professionals Describe the technical knowledge of computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Section 2 Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices.
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
SYSTEM ADMINISTRATION Chapter 1 Logical and Physical Network Topologies.
Intro to Network Design
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 12: Planning and Implementing Server Availability and Scalability.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Planning a Network Upgrade Working at a Small-to-Medium Business or ISP – Chapter.
Install, configure and test ICT Networks
Component 8/Unit 9aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 9a Creating Fault Tolerant.
CEG 2400 FALL 2012 Chapter 15 Network Management 1Network Management.
1 CEG 2400 Fall 2012 Network Servers. 2 Network Servers Critical Network servers – Contain redundant components Power supplies Fans Memory CPU Hard Drives.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Planning Server Deployments Chapter 1. Server Deployment When planning a server deployment for a large enterprise network, the operating system edition.
Introduction Chapter 1. Introduction  A computer network is two or more computers connected together so they can communicate with one another.  Two.
An Introduction to Local Area Networks An Overview of Peer-to-Peer and Server-Based Models.
Network-Attached Storage. Network-attached storage devices Attached to a local area network, generally an Ethernet-based network environment.
Network Management Chapter 8 Semester 3 By Roger Lewis.
Chapter 1 Computer Technology: Your Need to Know
Chapter 6: Securing the Cloud
Configuring File Services
Instructor Materials Chapter 8: Network Troubleshooting
Designing and Installing a Network
Introduction to Networks
Migration Strategies – Business Desktop Deployment (BDD) Overview
An Introduction to Computer Networking
Section 14.1 Section 14.2 Identify the technical needs of a Web server
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate knowledge of RAID levels and how to choose between them Identify planning strategies for network growth Describe hardware compatibility issues

Section 11.3 Identify methods to measure server performance Demonstrate OS performance Identify methods to measure network performance

11.1 pp Main Ideas Designing a network requires careful planning. Decisions about an existing network should always be made with future growth in mind. Key Terms budget legacy application patch cable Guide to Reading Network Design

11.1 pp Customer Requirements It is important to lay a good foundation as you build a functional network. Throughout this section, we examine a fictional company that hired you to install a computer network. Keep in mind that the choices we make are based on the requirements of this hypothetical company and do not address every company’s networking situation and needs. Network Design

11.1 pp In addition to the customer’s technical requirements for the network, you also have to work within a budget. Working within the budget often means making difficult decisions regarding all aspects of the network. budget A summary stating how much money and time will be used toward a specific purpose. (p. 313) Customer Requirements Network Design

11.1 pp Peer-to-Peer or Client/Server? The first decision to be made for the new network is whether it should be a peer-to-peer or a client/server network. The factors we need to examine include the following: size of the network level of security type of business level of administrative support available amount of network traffic needs of the network users network budget Network Design

11.1 pp A proper inventory involves at least four categories, including: hardware software (including legacy applications) telecommunications equipment network requirements legacy application Software that may use older technology, which may be considered outdated compared with today’s applications. (p. 316) Taking Inventory Network Design

11.1 pp Building a Map Before a plan is recommended, it is a good idea to make a map of all the elements involved. Consider two aspects of the network: the physical layout, including the location of each piece of hardware and how it relates to the others the physical and logical topology of the proposed network Network Design

11.1 pp The simplest layout for a network in the small-office environment is to use a physical star. After the media are installed, connecting the computers is straightforward, using a patch cable. patch cable A short length of cable with connectors at each end. (p. 318) Installing Network Media Network Design

11.1 pp Designing Within an Existing Infrastructure Network installations within existing infrastructure present many challenges: cost physical factors supporting the new infrastructure Network Design

11.1 pp You Try It Activity 11A – Surveying Network Hardware (p. 314) Activity 11B – Inventorying Software (p. 316) Activity 11C – Determining Network Requirements (p. 317) Activity 11D – Mapping the Facility (p. 317) Network Design

11.2 pp Main Ideas Servers make use of RAID hard drive technology to provide faster disk access and better data security. It is important to plan for change when designing a network. Select hardware carefully to ensure it is compatible with existing hardware. Key Terms array striping mirroring parity pilot deployments Guide to Reading Selecting Hardware

11.2 pp RAID Levels There are several levels of RAID, each with its own specific capabilities. RAID levels are sometimes combined to provide the capabilities of multiple levels at the same time. Selecting Hardware

11.2 pp RAID 0 A technique called striping is used at the RAID 0 level. RAID 1 A technique called mirroring is used at the RAID 1 level. RAID 3 Parity is used at RAID 3. RAID 5 Instead of using a dedicated parity drive, the parity information at the RAID 5 level is distributed among the drives in the array. striping A RAID 0 level technique that spreads data across each drive in an array. Increases the array’s read and write speeds. (p. 321) mirroring A process of duplicating data on the primary drive to the other drive(s) in the array. (p. 322) parity The detecting of errors in information which increases fault tolerance at the RAID 3 level. (p. 322) RAID Levels Selecting Hardware

11.2 pp RAID Levels Here is an example of RAID 0 and RAID 1. Selecting Hardware

11.2 pp Scalability and Planning for Change When a business expands, its networking needs change and scale. Three approaches to consider for scalability are described below: A server may require additional RAM or CPUs to keep up with additional users. More disk space may be needed to provide more storage space. Servers may need to be clustered to meet increased demand. Selecting Hardware

11.2 pp Pilot deployments, also known as test installations, can also make changes easier. For example, new software may be installed on a few user systems. After a period of testing, the software is installed throughout the network. pilot deployment A period of testing new software or program changes before installation on a network. Also known as a test installation. (p. 323) Scalability and Planning for Change Selecting Hardware

11.2 pp Hardware Compatibility Evaluating and selecting hardware is a major part of planning for network implementation. The most common incompatibilities occur between hardware and software. Be certain to address compatibility issues between new software and existing hardware before you start any upgrades. Selecting Hardware

11.2 pp Hardware Compatibility You should consider the following list when implementing new hardware: read the documentation verify that devices are detected during installation check minimum requirements Selecting Hardware

11.3 pp Main Ideas Regular monitoring of server performance can help pinpoint potential problems. Monitoring network traffic can be useful when trying to determine the cause of network problems or deliberate attacks. Key Terms baseline network monitor protocol analyzer Internet Control Message Protocol (ICMP) Denial of Service (DoS) Guide to Reading Server & Network Performance

11.3 pp When the network is first set up, it is very important to create a baseline. This baseline can be used to compare performance over time. baseline A measurement used for determining statistics. For example, a baseline would help determine a server’s performance and traffic flow over a period of time. (p. 326) Server Performance Server & Network Performance

11.3 pp Server Performance The Windows 2000 and XP OSs feature a tool called Performance Monitor. This tool monitors: Processor Time Interrupt Time Privileged Time User Time Server & Network Performance

11.3 pp Network monitors are very useful for establishing part of the network baseline. After the baseline has been established, it is possible to: troubleshoot traffic problems monitor network usage to determine when it is time to upgrade network monitors Software tools, similar to performance monitors, that track all or a selected part of network traffic. (p. 329) Network Performance Server & Network Performance

11.3 pp Protocol analyzers are the tools used most often to monitor network interactivity. Network administrators who work with large networks rely heavily on protocol analyzers. protocol analyzer A tool used to perform real-time network traffic analysis using packet capture, decoding, and transmission data. (p. 330) Network Performance Server & Network Performance

11.3 pp Network Performance Windows 2000 Server includes a utility called Network Monitor that allows a network administrator to analyze network traffic. This utility can be used to analyze a number of different network statistics. This information is often critical when trying to isolate potential intrusions. Server & Network Performance

11.3 pp Certain types of hacker attacks use one of the TCP/IP protocols, called Internet Control Message Protocol (ICMP). It can also be responsible for flooding a network with ICMP messages, creating a Denial of Service (DoS) attack. Information generated by Network Monitor can help an administrator find the exploited machine and close the security hole. Internet Control Message Protocol (ICMP) An Internet protocol used to help hosts control network traffic and respond to various error conditions. (p. 332) Denial of Service (DoS) A type of computer attack that makes it impossible for a receiving computer to function correctly. The attack can cause the recipient to freeze, crash, or reboot, or cause a system to become paralyzed. (p. 332) Network Performance Server & Network Performance

11.3 pp You Try It Activity 11E – Configuring Performance Monitor (p. 327) Activity 11F – Analyzing the Network Using Network Monitor (p. 331) Server & Network Performance

Resources For more resources on this chapter, go to the Introduction to Networks and Networking Web site at Chapter 11