DC 9 - 1 DATACOMM John Abbott College JPC Network Management M. E. Kabay, PhD, CISSP Director of Education, ICSA President, JINBU Corp Copyright © 1998.

Slides:



Advertisements
Similar presentations
Personal Computers and Applications
Advertisements

Computer Concepts – Illustrated 8th edition
9-1 Chapter 9 - Communication Principles of Computer Architecture by M. Murdocca and V. Heuring © 1999 M. Murdocca and V. Heuring Principles of Computer.
Computer Networks TCP/IP Protocol Suite.
Chapter 14 Intranets & Extranets. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES Introduction Technical Infrastructure Planning an Intranet.
DC DATACOMM John Abbott College JPC Architectures & Protocols M. E. Kabay, PhD, CISSP Director of Education, ICSA President, JINBU Corp Copyright.
DC DATACOMM John Abbott College JPC Digital Telecomm M. E. Kabay, PhD, CISSP Director of Education, ICSA President, JINBU Corp Copyright © 1998.
The Relational Model and Normalization (3) IS 240 – Database Management Lecture # Prof. M. E. Kabay, PhD, CISSP Norwich University
DC DATACOMM John Abbott College JPC Datacomm Security M. E. Kabay, PhD, CISSP Director of Education, ICSA President, JINBU Corp Copyright © 1998.
DC DATACOMM John Abbott College JPC Overview of Cyberspace M. E. Kabay, PhD, CISSP Director of Education, ICSA President, JINBU Corp Copyright.
DC DATACOMM John Abbott College JPC Basic Concepts M. E. Kabay, PhD, CISSP Director of Education, ICSA President, JINBU Corp Copyright © 1998 JINBU.
DC DATACOMM John Abbott College JPC Data Communications Course Overview M. E. Kabay, PhD, CISSP Director of Education, ICSA President, JINBU Corp.
ATS 5A - 1 The Art of Tech Support John Abbott College How to Work with Vendor Support M. E. Kabay, PhD, CISSP Director of Education, NCSA President, JINBU.
DC DATACOMM John Abbott College JPC Efficiency of Communications M. E. Kabay, PhD, CISSP Director of Education, ICSA President, JINBU Corp Copyright.
Chapter 1 The Study of Body Function Image PowerPoint
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 5 Author: Julia Richards and R. Scott Hawley.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
Reconsidering Reliable Transport Protocol in Heterogeneous Wireless Networks Wang Yang Tsinghua University 1.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
Determine Eligibility Chapter 4. Determine Eligibility 4-2 Objectives Search for Customer on database Enter application signed date and eligibility determination.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
ADDING INTEGERS 1. POS. + POS. = POS. 2. NEG. + NEG. = NEG. 3. POS. + NEG. OR NEG. + POS. SUBTRACT TAKE SIGN OF BIGGER ABSOLUTE VALUE.
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
Communicating over the Network
1 Communication in Distributed Systems REKs adaptation of Tanenbaums Distributed Systems Chapter 2.
Chapter 1 Data Communications and NM Overview 1-1 Chapter 1
Long-Distance and Local Loop Digital Connection Technologies
1 Chapter One Introduction to Computer Networks and Data Communications.
INFORMATION TECHNOLOGY, THE INTERNET, AND YOU
Fact-finding Techniques Transparencies
Chapter 1 Introduction to the Programmable Logic Controllers.
Chapter 1: Introduction to Scaling Networks
Local Area Networks - Internetworking
Fire Alarm Circuit Design and Fire Alarm Control Units
1 Quality of Service Issues Network design and security Lecture 12.
ABC Technology Project
1 Chapter Overview Network Cables Network Interface Adapters Network Hubs.
Chapter 15 Integrated Services Digital Network ISDN Services History Subscriber Access Layers BISDN WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998.
Squares and Square Root WALK. Solve each problem REVIEW:
Do you have the Maths Factor?. Maths Can you beat this term’s Maths Challenge?
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I NETWORK LAYER AND IP Derived From CCNA Network Fundamentals.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 2 Networking Fundamentals.
Global Analysis and Distributed Systems Software Architecture Lecture # 5-6.
Chapter 5 Test Review Sections 5-1 through 5-4.
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
Addition 1’s to 20.
25 seconds left…...
What’s New in WatchGuard Dimension v1.2
Week 1.
Chapter 10 Delivering the System Shari L. Pfleeger Joann M. Atlee 4 th Edition.
We will resume in: 25 Minutes.
Connecting LANs, Backbone Networks, and Virtual LANs
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
How Cells Obtain Energy from Food
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 16 Integrated Services Digital Network (ISDN)
© ABB University - 1 Revision C E x t e n d e d A u t o m a t i o n S y s t e m x A Chapter 20 Import and Export Course T314.
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
Chapter 19: Network Management Business Data Communications, 4e.
1. There are different assistant software tools and methods that help in managing the network in different things such as: 1. Special management programs.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
Network Management. Network management means monitoring and controlling the network so that it is working properly and providing value to its users. A.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Chapter 19: Network Management
Chapter-5 Traffic Engineering.
Presentation transcript:

DC DATACOMM John Abbott College JPC Network Management M. E. Kabay, PhD, CISSP Director of Education, ICSA President, JINBU Corp Copyright © 1998 JINBU Corp. All rights reserved

DC Network Management l Overview l Service Levels l Approaches to Net Management l Diagnostic Methods l Datacomm Test Equipment

DC Network Mgmt Overview l Network monitoring – quickly identify problems l Network control – configuration & addressing – making devices available or unavailable l Network troubleshooting – fix problem quickly – diagnose causes of problems and prevent repetition l Network statistical reporting – optimize use of resources

DC Service Levels l What defines acceptable performance? – industry standards – contracts with users l Elements of service level agreements (SLAs): – Availability – Reliability – Response Time – Throughput

DC Service Levels Availability l Uptime vs downtime l Mean time between failures (MTBF) l Mean time to repair (MTTR) uptime MTBF Availability = = up + down MTBF + MTTR

DC Service Levels Reliability l Defined as rate of data errors l Bit error rate test (BERT) – send known bit pattern – count errors – normal modem BERT = l Block error rate test (BLERT) – number of blocks requiring retransmission – BLERT = 1 - (1-BERT) b where b is the number of bits in the block

DC Service Levels Response Time l How long it takes to receive a response after sending a message – data transmission from workstation to host – host processing – data transmission from host to workstation – completion of presentation l Response time can be defined with different combinations of these factors

DC Service Levels Throughput l Net bandwidth l Number of useful (data) bits transferred per unit of time l Usually significantly lower than total bandwidth because of overhead (control information, protocols, negotiation, handshakes) l Transfer rate of information bits (TRIB) generally used definition of throughput l Transaction processing systems measure transactions per second

DC Network Management Robert Lund (1991). The perils of flying blind. INTERACT 11(7):20. Without managing system resources... l You will not be alerted when it is time to tune the system for better performance l You will miss opportunities to extend the life of your system l You will not see early warning signs that point to a hardware upgrade requirement l You will not know where you have been, where you are, or where you are going l You will not be able to maintain a cool head in a performance crisis.

DC Approaches to Net Mgmt l Non-Automated Net Management l Semi-Automated Net Management l Integrated Network Management

DC Approaches to Net Mgmt Non-Automated Net Management l Users call network control to report problems l Little or no investment in tools l High on-going costs l Portable test equipment l Complex networks difficult to service

DC Approaches to Net Mgmt Semi-Automated Net Management l Automatic network monitoring equipment & software l Trigger alarms when error rates climb above critical levels l Technicians must still diagnose problems l Takes advantage of newer equipment l Dont have to upgrade entire older network

DC Approaches to Net Mgmt Integrated Network Management l Network management protocols – Simple Network Management Protocol (SNMP) for TCP/IP networks – ISO Common Management Information Protocol (CMIP) l Reporting functions in all components l Continuous automated monitoring l Remote manipulation of all components l Extensive graphics l Expert systems

DC Diagnostic Methods l Loopback testing (echo testing) – special connectors feed output signal to input – especially useful for testing terminals l Time Domain Reflectometry – feed pulses into circuit – measure characteristics of reflection – especially important for optical fibre networks

DC Datacomm Test Equipment l Especially important for non-automated and semi-automated network management l Key tools of datacomm problem-solving: – Breakout Box – Datascope & Protocol Analyzers – Analog (phone line) test equipment

DC Datacomm Test Equipment Breakout Box l Light-Emitting Diodes (LEDs) show which wires are hot l Often include wires for patching one line to another

DC Datacomm Test Equipment Datascope (Protocol Analyzers, Sniffers) l Place in datacomm circuit l All functions of breakout box l Display screen shows data and control signals l Data capture in buffers l Phone or page staff on errors l BERT and BLERT l Filters screen data or packets l Sniffers a serious threat to LAN, WAN & Internet security

DC Homework l Read Chapter 9 of your textbook in detail, adding to your workbook notes as appropriate. l Review and be prepared to define or expand all the terms listed at the end of Chapter 9 of your textbook l Answer exercises 9-1 through 9-11 on page 202 of the textbook using a computer word- processing program or absolutely legible handwriting (hand in after quiz tomorrow morning).